[author : Moshe Yudkowsky]
Voice-based biometric security must support identification, verification, and classification. Moshe presents a verification system in which users' voice models are stored in a database on a VoiceXML server.
[author : Herbert H. Thompson and James A. Whittaker]
Traditional testing techniques are not well equipped to find security bugs. Our authors discuss a fault model that describes a paradigm shift from traditional bugs to security vulnerabilities.
[author : Paulo Marques]
Paulo uses the proxy pattern along with the Java Authentication and Authorization Service API to build secure Java Remote Method Invocation servers that allow only properly authenticated users access to systems.
[author : Linden DeCarmo]
Linden examines how analog and digital interfaces for high-definition television work, focusing on their copy-protection protocols.
[author : Anthony J. Massa]
Anthony integrates the GoAhead WebServer—a portable open-source, small-footprint web server—into Red Hat's eCos real-time operating system.
[author : Bart Van Beneden]
VxWorks AE from Wind River Systems is a real-time operating system designed for embedded applications with demanding requirements.
[author : Michael Swaine]
Being the hermit he is, the idea of community strikes Michael as a novel idea.
[author : Ed Nisley]
A trip along the Erie Canal gives Ed the opportunity to ponder about the permanence of embedded projects.
[author : Jeffrey L. Taylor]
This month, Jeff examines Agile Software Development Ecosystems, by Jim Highsmith.
[author : Jonathan Erickson]
[author : you]
[author : Verity Stob]
[author : Shannon Cochran]
[author : Della Song]
[author : Michael Swaine]