Bedanet - perspective in time

November '99 Access Control & Identity Management

Communications structures within and throughout companies are undergoing great change nowadays. The world of recording time and attendance (T&A) is also affected by this trend, as companies today are very much interconnected with one another, and will expose themselves even more as network links continue to proliferate.

The Bedanet Terminal (where 'net' stands for network) has been developed by Kaba Benzing as a time and attendance recording terminal of the next generation. It is based on Java technology and, in its basic form, has already been designed to fully link into the open networks of the future. The new terminal combines a high-tech concept along with design and ergonomics and opens up completely new opportunities for the user.

Says Total Access' Shaun Bosworth, "Bedanet works just like a network computer (NC). The NC draws its application from the network, which is also used to file data as well as to dispatch and provide program updates and function updates. The network can be an intranet, the Internet or an extranet. This concept has been tailored to the special role of recording time and attendance. The Bedanet can be used in standalone mode with data buffering and data sampling which is necessary in the environment of recording time and attendance."

The Bedanet Terminal has a graphic display, which is simple to operate with the integral touch screen. It displays functions to the user with coloured buttons; for instance - coming and going, authorised absence or interrogation of current time balances.

The supplied screen masks clearly display the forward-looking ways of using the Bedanet terminal:

p Compatibility for general use with the Bedas 9000 series of terminals that have already been installed.

p Client-server time management configurations in the lntranet.

p Internet applications for systems throughout companies and corporations.

Benefits for the user:

p Integration into time and attendance recording systems based in the intranet, extranet and Internet.

p Safe investment for the future, as future operation concepts have already been incorporated.

p Simple operation with coloured and graphic user interfaces.

p Easy connection to networks using the integrated Ethernet interface.

p Manufactured from ecological, recyclable certified components.

p Simplified maintenance and start-up.

p Optimum matching to existing EDP structures.

p Guaranteed compatibility with the Bedas 9000 series of terminals that has already been installed.

p Attractive design with a large range of functions.

p Renowned Kaba Benzing quality with a high level of reliability, manufactured in compliance with the quality standard EN ISO 9001.

For details contact Shaun Bosworth of Total Access on tel: (021) 434 8800, fax: (021) 439 8801, e-mail: sbosworth@kaba.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...