Posts By Author: John Kendall


About the Author

John Kendall is the Director of the Border and National Security Program for the global public sector practice at Unisys. Based in Canberra Australia, John has overall responsibility for Unisys border and national security initiatives around the globe.



Part 4: Biometrics and Wearable Technology – the Inevitable Marriage?
On Point

The first three installments of this series looked at the market for wearable devices and how traditional and non-traditional biometrics can be used with current and emerging wearable technology. This final installment examines the technological and sociological barriers confronting wearable biometrics and wraps-up the discussion with five predictions regarding the future of wearable biometrics.

Posted by: on December 14th, 2016


Part 3: Biometrics and Wearable Technology – The Inevitable Marriage?
On Point

Parts one and two of this series looked at the market for wearable devices and how biometrics can be used with today’s wearable technology. In this installment we will look at revolutionary biosensors of the not too distant future and the impact they will have on biometrics as we know it.

Posted by: on November 15th, 2016


Part 2: Biometrics and Wearable Technology – The Inevitable Marriage?
On Point

In part one of this series we looked at the market outlook for wearable devices. In this installment we will explore how biometrics fits into the world of today’s wearable technology.

Posted by: on November 3rd, 2016


Part 1: Biometrics and Wearable Technology – The Inevitable Marriage?
On Point

Biometrics are fascinating on their own, but consider the combined impact of biometrics and what some believe will be one of the most disruptive technologies of the next decade – wearable technology. This is Part One in a four part series.

Posted by: on August 24th, 2016


Time for Multi-Modal Biometrics at Border Security Checkpoints
On Point

Border security today is facing a perfect storm of challenges that requires every tool available. But when it comes to leveraging biometrics, border security agencies often cling to outdated technologies and inaccurate assumptions.

Posted by: on April 15th, 2016


Part 2: Improved Border Security, Faster Border Clearance and Reduced Cost – “Choose Any Two”?
On Point

In Part 2 of our series on Improved Border Security, we discuss the benefits of using advanced targeting analytics.

Posted by: on July 16th, 2015


Part 1: Improved Border Security, Faster Border Clearance and Reduced Cost – “Choose Any Two”?
On Point

How enabling technologies can help Australia meet enhanced security, faster border clearance and reduced cost.

Posted by: on July 14th, 2015


Redefining National Security to Protect Critical Infrastructure from Cyber Terrorism
On Point

Australians cite a potential terrorism power outage as more disruptive than a critical infrastructure terrorism failure.

Posted by: on March 28th, 2013


When Information Becomes Intelligence Should it be Secret?
Disruptive IT Trends

The massive amounts of data, constantly being published on the internet presents enterprises with both an opportunity and a challenge.

Posted by: on August 16th, 2012


Treat Your Internal Environment as Hostile Territory
Security

Security breaches caused by insiders can be far more damaging than that caused by external threats. The need of the hour – tools to detect potential security breaches by monitoring data access/usage by insiders.

Posted by: on July 5th, 2012


<< Back


We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.