IBM Systems Magazine, Power Systems Edition - September 2012 - (Page 36)

Next What’s new in R&D Open Says-a-Me #JPNFUSJDÁJEFOUJGJFSTÁ XJMMÁTPPOÁBMMPXÁ$*0TÁ UPÁXPSSZÁMFTTÁBCPVUÁ BVUIFOUJDBUJPOÁJTTVFT By Jim Utsler *#.ÁSFDFOUMZÁVOWFJMFEÁJUTÁTJYUIÁ BOOVBMÁ*#.Á"ÁJOÁ"‰JOOPWBUJPOTÁ XJUIÁUIFÁQPUFOUJBMÁUPÁDIBOHFÁ UIFÁXBZÁQFPQMFÁXPSLÁMJWFÁBOEÁ JOUFSBDUÁIBM Systems Magazine EFUBJMTÁUIFTFÁJOOPWBUJPOTÁJOÁ TVCTFRVFOUÁJTTVFTÁÁ ser authentication has always been an issue in the computing environment, but it’s become even more important now that smart mobile devices have entered the picture. This is largely because mobile devices, while handy, are also highly vulnerable to being misplaced or stolen. Although most have a screen lock, many people don’t use them. U tÁ.JOEÁSFBEJOHÁJTÁOPÁMPOHFSÁ TDJFODFÁGJDUJPO tÁ1FPQMFÁQPXFSÁXJMMÁDPNFÁUPÁMJGF tÁ5IFÁEJHJUBMÁEJWJEFÁXJMMÁDFBTFÁ UPÁFYJTU tÁ+VOLÁNBJMÁDPVMEÁCFDPNFÁ QSJPSJUZÁNBJM tÁ:PVÁNBZÁOFWFSÁOFFEÁ BÁQBTTXPSEÁBHBJO Driven by security needs, some CIOs have started setting time limits for inactive devices used by their enterprises. This feeble security measure locks a mobile device after a period of inactivity, which could be 5 to 15 minutes depending on the sensitivity of the device, what’s on it and who’s using it. But again, this security measure is unreliable, inconvenient and—as IBM Fellow and Speech CTO David Nahamoo says—sometimes dangerous. That’s why Nahamoo is working on biometric security measures that will replace passwords. Instead of entering an often forgettable or overly used phrase into a smart device, users will—within five years, according to him—be able to authenticate themselves using their voice, facial features and handwriting. Q. Does the word “speech” in your title refer to actual language? A. One of the biggest facets of speech technologies right now is related to speech recognition, or taking the spoken content and turning it into text. Another one is the reverse, which is taking text and having a device speak it automatically. The third part of the equation involves using speech as part 36 SEPTEMBER 2012

Table of Contents for the Digital Edition of IBM Systems Magazine, Power Systems Edition - September 2012

IBM Systems Magazine, Power Systems - September 2012
Editor's Desk: It's the Economy, Genius
IBM Perspective: Myths and Truths About Cost
Dashboard: Big Bang to Big Data; A Wooden Light Bulb?; CEOs Going Social; Bubble 'Bots
Insider: Virtualization Blends the Best of Disk and Tape
Case Study: Mobile Defender: Jacksonville Public Defender's Office better serves clients with document imaging and mobile access
Cover Story: A Pivotal Position: CFOs link up with CIOs to move business forward
Feature: A New Lease on Your Business Life: Analyst Cal Braunstein offers economic perspective and advice
Focus on Storage: Store More Data With New Real-time Compression Technology
Next: Biometric Identifiers Will Soon Allow CIOs to Worry Less About Authentication Issues
FYI: Hot, Warm and Cold Data Find a Home With Storage Groups
Solutions: SafeNet/i; STORServer Backup Appliance; Robot/SCHEDULE Enterprise; SignHere 1.3.3; Double-Take for AIX 4.0; Presto 4; ARCAD 8.15; Compleo Designer; JD Edwards World A9.3; Change Tracker
Advertisers Index
Snapshot: Enselman Books Through Application Modernization
Reference Point - Global Events, Education, Resources for Power Systems
Women in Technology
Publisher's Letter: Leaders in Technology
CIO Jeanette Horan steers Big Blue into newly charted waters
FIDM's Roxanne Reynolds-Lair explains what makes her tick
IT is right where IBM's Zarina Stanford wants to be
Technology runs in the blood of zNextGener Kristine Harper
Susan Gantner works magic as a programmer and educator
Kirsten Craft enjoys taking on the challenges that come with an IT position
On the Move: These women have also pursued notable IT careers
2012 Power Systems Buyer's Guide Index

IBM Systems Magazine, Power Systems Edition - September 2012