Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
en:tc_technology [2021/08/14 09:50]
jhlee2
en:tc_technology [2023/08/01 17:11] (current)
mwkim
Line 6: Line 6:
 <WRAP group> <WRAP group>
 <WRAP half column> <WRAP half column>
 +==== What is Failover and Why is it Important ==== 
 +Failover is a function that automatically switches to a standby server, database or network when failure of the primary system is detected. Failover prevents server downtime, data loss and system failure. It can protect mission-critical data 24/7 with no downtime. \\ \\ <button type="​primary"​ size="​xs">​[[tc/​technology/​what_is_failover|READ MORE]]</​button>​
 +
 +\\
 +==== Hardening Guide: Ensuring Server Security ==== 
 +Servers hold confidential organizational data and information. An insecure server is vulnerable to all sorts of security threats and data breaches. Security vulnerabilities can lead to the loss of critical data or loss of control and capability that can jeopardize the whole organization. \\ \\ <button type="​primary"​ size="​xs">​[[tc/​technology/​Suprema_Hardening_Guide|READ MORE]]</​button>​
 +
 +\\
 ==== Guideline for Installation and Enrollment ​ ====  ==== Guideline for Installation and Enrollment ​ ==== 
 ​This article is intended to guide the installation and enrollment of FaceStation F2. To enhance the user experience and achieve exceptional authentication accuracy, it is highly recommended to comply with the guidelines. \\ \\ <button type="​primary"​ size="​xs">​[[tc/​technology/​Guideline_for_Installation_and_Enrollment|READ MORE]]</​button>​ ​This article is intended to guide the installation and enrollment of FaceStation F2. To enhance the user experience and achieve exceptional authentication accuracy, it is highly recommended to comply with the guidelines. \\ \\ <button type="​primary"​ size="​xs">​[[tc/​technology/​Guideline_for_Installation_and_Enrollment|READ MORE]]</​button>​
  
 \\ \\
-==== Guideline for Face Recognition ​ ====  +==== Guideline for Face Authentication ​ ====  
-​This article is intended to guide face recognition. Some advice for face recognition ​of users wearing masks also include. To enhance the user experience and achieve exceptional authentication accuracy, it is highly recommended to comply with the guidelines. \\ \\ <button type="​primary"​ size="​xs">​[[tc/​technology/​Guideline_for_Face_Recognition|READ MORE]]</​button>​+​This article is intended to guide face authentication. Some advice for face authentication ​of users wearing masks also include. To enhance the user experience and achieve exceptional authentication accuracy, it is highly recommended to comply with the guidelines. \\ \\ <button type="​primary"​ size="​xs">​[[tc/​technology/​Guideline_for_Face_Recognition|READ MORE]]</​button>​
  
 \\ \\
Line 22: Line 30:
  
 \\ \\
-==== Security Threats to Face Recognition ​and FaceStation 2 Technology ==== +==== Security Threats to Face Authentication ​and FaceStation 2 Technology ==== 
-The authentication through face recognition ​is as prone to spoofing as fingerprint-based methods. Is its security also vulnerable to similar methods? ​ \\ \\ <button type="​primary"​ size="​xs">​[[tc_technology_fs2_lfd_technology|READ MORE]]</​button>​+The authentication through face authentication ​is as prone to spoofing as fingerprint-based methods. Is its security also vulnerable to similar methods? ​ \\ \\ <button type="​primary"​ size="​xs">​[[tc_technology_fs2_lfd_technology|READ MORE]]</​button>​
  
 \\ \\
Line 51: Line 59:
 <WRAP half column> <WRAP half column>
 ==== Multiple sub-IDs of FaceStation ====  ==== Multiple sub-IDs of FaceStation ==== 
-Face recognition ​is gaining much more attention relative to other biometric recognition technologies due to not only the simple convenience it provides but also its ability to avoid various privacy issues. As facial information is publically displayed, there is little concern for a user to show his face to the device. \\ \\ <button type="​primary"​ size="​xs">​[[tc/​technology/​Multiple sub-IDs of FaceStation|READ MORE]]</​button>​+Face authentication ​is gaining much more attention relative to other biometric recognition technologies due to not only the simple convenience it provides but also its ability to avoid various privacy issues. As facial information is publically displayed, there is little concern for a user to show his face to the device. \\ \\ <button type="​primary"​ size="​xs">​[[tc/​technology/​Multiple sub-IDs of FaceStation|READ MORE]]</​button>​
  
  
Line 60: Line 68:
  
 \\ \\
-==== Adaptive IR Illumination Technology for Face Recognition ​====  +==== Adaptive IR Illumination Technology for Face Authentication ​====  
-Variations in background illumination have always been one of the main challenges for a practical face recognition ​system. Active illumination based face recognition ​techniques are considered to be one of the most promising and practical methods used to solve illumination issues in indoor applications. \\ \\ <button type="​primary"​ size="​xs">​[[tc_technology/​apaptive_ir_illumination|READ MORE]]</​button>​+Variations in background illumination have always been one of the main challenges for a practical face authentication ​system. Active illumination based face authentication ​techniques are considered to be one of the most promising and practical methods used to solve illumination issues in indoor applications. \\ \\ <button type="​primary"​ size="​xs">​[[tc_technology/​apaptive_ir_illumination|READ MORE]]</​button>​
  
  
 \\ \\
-==== Smart Enrollment Technology for Face Recognition ​System ====  +==== Smart Enrollment Technology for Face Authentication ​System ====  
-Human face is one of the most common and non-intrusive biometrics used to identify individuals. It is much more universal, acceptable and easier to access than a fingerprint. Recently, the use of face recognition ​technology in cooperative biometric systems such as access control, time & attendance and PC security is increasing. \\ \\ <button type="​primary"​ size="​xs">​[[tc_technology/​suprema_smart_face_enroll|READ MORE]]</​button>​+Human face is one of the most common and non-intrusive biometrics used to identify individuals. It is much more universal, acceptable and easier to access than a fingerprint. Recently, the use of face authentication ​technology in cooperative biometric systems such as access control, time & attendance and PC security is increasing. \\ \\ <button type="​primary"​ size="​xs">​[[tc_technology/​suprema_smart_face_enroll|READ MORE]]</​button>​
  
 \\ \\
Line 81: Line 89:
  
 \\ \\
 +
  
  
 </​WRAP></​WRAP>​ </​WRAP></​WRAP>​