Featured Articles

Intel refreshes CPU roadmap

Intel refreshes CPU roadmap

Intel has revealed an update to its CPU roadmap and some things have changed in 2015 and beyond. Let’s start with the…

More...
Hands on: Nvidia Shield Tablet with Android 5.0

Hands on: Nvidia Shield Tablet with Android 5.0

We broke the news of Nvidia's ambitious gaming tablet plans back in May and now the Shield tablet got a bit…

More...
Nokia N1 Android tablet ships in Q1 2015

Nokia N1 Android tablet ships in Q1 2015

Nokia has announced its first Android tablet and when we say Nokia, we don’t mean Microsoft. The Nokia N1 was designed…

More...
Marvell launches octa-core 64-bit PXA1936

Marvell launches octa-core 64-bit PXA1936

Marvell is better known for its storage controllers, but the company doesn’t want to give up on the smartphone and…

More...
Nvidia GTX 970 SLI tested

Nvidia GTX 970 SLI tested

Nvidia recently released two new graphics cards based on its latest Maxwell GPU architecture, with exceptional performance-per-watt. The Geforce GTX 970…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Monday, 31 March 2008 11:24

IBM works on ID technologies

Written by Nick Farell

Image

With E.U. cash


Big Blue
has started a three-year project to infuse privacy controls into identity technologies and emerging social networking sites.

The work is being undertaken by IBM Research, with funding help from the European Union, with the idea of creating  technology to ensure users can protect their privacy online for their entire lifetime. The project, called PrimeLife (Privacy and Identity Management in Europe for Life), is a three-year research project funded by the European Union's Seventh Research Framework Programme.

IBM Research wants to create a "toolbox" that amounts to an electronic data manager that gives users an overview of which personal data they use when, where, and how.

Users would be able to define default privacy settings and preferences and would receive prompts of applications seek data for any other purpose.
Last modified on Monday, 31 March 2008 18:36

Nick Farell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments