Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

+ - Authentication Maturity Level

Submitted by
zakiakhmad
zakiakhmad writes "Hi! I am trying to do research on several authentication methods, such as: Token, PKI(Public Key Infrastructure), Biometrics, RFID (Radio Frequency Identification) etc. I need to know the correlation between the authentication method with the maturity level for each authentication method. To be precise, I need to know the state of each authentication method: How do the market response? Any data will be very helpful. Thank you for your attention. Zaki Akhmad"

Is it possible that software is not like anything else, that it is meant to be discarded: that the whole point is to always see it as a soap bubble?

Working...