If we wanted to reduce the definition of authentication to its most Zen-like simplicity, we could say authentication is “keeping things real.” To keep something real you need to have some sort of confirmation of its identity, as confirmation is the key (so to speak).… Read More
Author: Bill Boldt
The “Key” to Reality
What is Authentication and Why Should You Care?
Authentication means making sure that something is real, just like it sounds.In the real world, authentication has many uses. One of the most recognizable is anti-counterfeiting, which means validating the authenticity of a removable, replaceable, or consumable client. Examples include system accessories, electronic … Read More
Glasses Refocus Mobile Power Design
Contextual awareness likely will emerge as one of the most exciting new user experiences enabled by wearable products. It happens when a mobile device, carried or worn, senses the user’s surroundings and presents information, offers advice, or controls itself and/or other devices according to that specific environment. This… Read More
Will You Take the Password Pill?
As smartphone and tablet makers desperately search for points of differentiation they will try to push the limits of performance on several fronts to extremes. The password pill and the display-cover display are two of the stranger extreme features on the way.
Extreme inter-connectivity is one of the more useful features that… Read More
Mobile Maturity Leads to Extremes
The smartphone is becoming a commodity, a lifecycle stage where the strong get stronger, the weak get weaker, and the products standardize and start to look alike. This dynamic is driving innovation in existing products to extremes and spawning a new class of wearable devices.
Today two major players are leading the mobile hardware… Read More
Next Generation of Systems Design at Siemens