Posts By Author:
About the Author
John Kendall is the Director of the Border and National Security Program for the global public sector practice at Unisys. Based in Canberra Australia, John has overall responsibility for Unisys border and national security initiatives around the globe.
The first three installments of this series looked at the market for wearable devices and how traditional and non-traditional biometrics can be used with current and emerging wearable technology. This final installment examines the technological and sociological barriers confronting wearable biometrics and wraps-up the discussion with five predictions regarding the future of wearable biometrics.
Posted by: John Kendall on December 14th, 2016
Parts one and two of this series looked at the market for wearable devices and how biometrics can be used with today’s wearable technology. In this installment we will look at revolutionary biosensors of the not too distant future and the impact they will have on biometrics as we know it.
Posted by: John Kendall on November 15th, 2016
In part one of this series we looked at the market outlook for wearable devices. In this installment we will explore how biometrics fits into the world of today’s wearable technology.
Posted by: John Kendall on November 3rd, 2016
Biometrics are fascinating on their own, but consider the combined impact of biometrics and what some believe will be one of the most disruptive technologies of the next decade – wearable technology. This is Part One in a four part series.
Posted by: John Kendall on August 24th, 2016
Border security today is facing a perfect storm of challenges that requires every tool available. But when it comes to leveraging biometrics, border security agencies often cling to outdated technologies and inaccurate assumptions.
Posted by: John Kendall on April 15th, 2016
Part 2: Improved Border Security, Faster Border Clearance and Reduced Cost – “Choose Any Two”?
In Part 2 of our series on Improved Border Security, we discuss the benefits of using advanced targeting analytics.
Posted by: John Kendall on July 16th, 2015
Part 1: Improved Border Security, Faster Border Clearance and Reduced Cost – “Choose Any Two”?
How enabling technologies can help Australia meet enhanced security, faster border clearance and reduced cost.
Posted by: John Kendall on July 14th, 2015
Australians cite a potential terrorism power outage as more disruptive than a critical infrastructure terrorism failure.
Posted by: John Kendall on March 28th, 2013
When Information Becomes Intelligence Should it be Secret?
Disruptive IT Trends
The massive amounts of data, constantly being published on the internet presents enterprises with both an opportunity and a challenge.
Posted by: John Kendall on August 16th, 2012
Security breaches caused by insiders can be far more damaging than that caused by external threats. The need of the hour – tools to detect potential security breaches by monitoring data access/usage by insiders.
Posted by: John Kendall on July 5th, 2012