8th Biometrics Institute Technology Showcase & Exhibition
27 November 2012 | Hotel Realm, Canberra, Australia
In its 8th year, this one day event will provide an insight into the latest developments in biometric technologies.
Delegates will be given access to leading-edge developments in biometrics technologies that are able to respond to identity management and security issues. Attend to hear supplier presentations, view the technology exhibition and hear from industry experts. In 2011, this included many international guests and delegates from USA, Spain, UK and Singapore. Following the conference will be a two-day training course on The Human Element and Cognition in Biometric Identification” run by international expert, Dr Itiel Dror, University College London (UCL) and Cognitive Consultants International (CCI). See our website www.biometricsinstitute.org for programme updates. All welcome to register and attend. Biometrics Institute members receive discounted rates.
About the Biometrics Institute:
The Biometrics Institute is an independent not-for-profit organisation providing THE meeting place for any organisation interested in biometrics. The mission of the Biometrics Institute is to be a forum for biometric users and other interested parties and to facilitate the responsible use of biometrics. Join over 125 membership organisations from Australia, Europe and beyond including Royal Bank of Scotland Group, British Standards Institute (BSI), Singapore Defence, Australian Customs Service, Australian Department of Immigration and Citizenship and Federal Bureau of Investigation (FBI) (USA) to name a few. It can offer you a number of ways to get involved in the biometrics industry.
Hotel Ream, Canberra, Australia
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright
- FBI concludes North Korea 'responsible' for Sony hack
- What we know about North Korea's cyberarmy