
To be fair, our results may not scale, or match the experience you will have. Using 500 sample photos on fresh installs of each program, we tracked around how long each of the tools took to process all the photos, as well as some notable hits and misses from each. So, how do these three stack up? To figure that out, we put them to the test. And this time last year, Microsoft released an updated version of its Windows Live Photo Gallery desktop software that could find faces inside of photos, though it couldn't (and still can't) recognize who's in them. In January, Apple unveiled the latest version of iLife, which included an updated version of iPhoto that could detect and recognize faces in your photos. But it wasn't the first free consumer photo-editing software to find faces. Too expensive and unreliable to be implemented for the general public.Last week's Picasa software update from Google brought with it a neat trick-facial recognition.Not 100% accurate if the person changes his or her appearances with glasses, beards and etc.Very hard to hack, ideal for mobile banking and identification.ATM machines with face recognition prevents fraud transaction compared with PIN (Personal Identification Number).Able to scan and recognize groups of people in public area without them knowing, ideal for security purposes.As usual, please don’t forget to rate, comment, and subscribe! Thanks for watching! The Pros and Cons of Using Facial Recognition If you have any questions, feel free to comment them or personal message me. What are you waiting for? This is possibly the best password manager service software ever with no possible way for anyone to break it, unless he or she wore a print out card board cut out mask of your face, you recon it is possible? In this video, I show you how you can get a program that allows you to use your face instead of a password to login to either your mac or windows pc. With the hijackers tracking feature you can view pictures of the culprit. Yes, KeyLemon comes with the ability to retrieve information about who wanted to use your computer.
