Directing heavy traffic Access & Identity Management Handbook 2006 The sheer volume of stock moving through Vector Logistics, a wholly-owned subsidiary of Rainbow Farms, is on a scale that defies imagination.
Vector provides specialist logistic services to the food ...
Farmstyle T&A Access & Identity Management Handbook 2006 Manjoh Ranch is a farm in the Nigel area whose main activities are growing mielies and breeding cattle. The farm also has a mill that is used to convert some of the maize into various products. The ...
Extinguishing the fire Access & Identity Management Handbook 2006 The City of Johannesburg’s Emergency Management Services (EMS) recently installed a state-of-the-art time and attendance (T&A) solution system for all its fire stations. The history
EMS consists ...
Safeguarding a sanctuary Access & Identity Management Handbook 2006 The history
Hatfield Christian Church in Pretoria had been experiencing theft and vandalism in spite of having a full time security company on site. In addition, venues and equipment were being misused.
"We ...
Integrating T&A Access & Identity Management Handbook 2006 The history
Steinmüller Engineering Services, a member of the Babcock Borsig Service Group, decided in 2005 to seek a time and attendance (T&A) solution that could meet the complex needs of the company.
The ...
Facelift for the Mother City Access & Identity Management Handbook 2006 When the City of Cape Town's Information Technology (CCTIT) division looked over its weighty legacy of disparate time and attendance (T&A) solutions and systems, it decided the time had come for a ...
Logical access control October 2006 Big business lies beyond the boundaries of physical access control.
The rapidly growing world of logical access control is leveraging certain established access technologies in a surprising variety of ...
Citect launches new benchmarking service October 2006, News, Integrated Solutions Citect, one of the world's largest, realtime intelligence software companies, announced the launch of a new benchmarking service. This service is designed to support corporate performance benchmarking ...
1G to 3G Access & Identity Management Handbook 2006 The logical transition from today’s typical client/server architecture to third-generation network appliances. The need for remote access
Eighteen months ago, when I was representing a company that ...
2010 - we CAN do it! Access & Identity Management Handbook 2006 In May 2004 South Africa won the bid to host the 2010 FIFA World Cup. Then six years was not considered a lot of time to put so much into place but almost two and a half years later, preparations appear ...
Lighting drivers power up to 20 series-connected LEDs 6 September 2006, Altron Arrow, Power Electronics / Power Management National Semiconductor recently introduced two new, highly-integrated lighting management units (LMUs) that include a high-voltage boost converter and programmable constant-current driver to control up ...
Polophone September 2006, Centurion Systems The design of the polophone handset is state of the art. The hole in the centre of the handpiece allows it to clip over the cradle and merge smoothly into one compact unit.
Each phone can independently ...
Hand vascular pattern recognition system September 2006 The VP-II is a generic access/security control and time and attendance system. The state-of-the-art recognition technology of the VP-II enhances the system usability to 99,98% as opposed to the 95% of ...
Complex gate receiver September 2006, Sherlotronics SA The new Complex gate receiver has a reaction time of 500 milliseconds and up to 1000 rolling code transmitters can be easily programmed. Remotes can be erased if needed. If a valid signal is received, ...
Swing gate operators September 2006, Centurion Systems The R3 and R5 rotary arm swing gate operators are suitable for most swing gates. The wide arc of operation combined with inherent soft acceleration and deceleration provide swift opening and closing of ...
Solo tags September 2006, Centurion Systems The Solo range of proximity tag readers is designed for simple standalone access control applications where security, cost and simplicity is important.
This technology offers tags that are cost effective, ...
DexID Fingerprint DI014 September 2006 The DexID Versatile Fingerprint optical fingerprint reader is an access control time and attendance solution that can be used in almost all environments where a fingerprint security system can work. Users ...
Keyless access control September 2006, Centurion Systems The SmartGuard keypad has been designed to provide all the power and functionality required for high security keyless access control. It is fully weatherproof and manufactured using the latest in high ...
Did you know? CCTV Handbook 2006 New to IP CCTV? Here are some useful facts for you to consider. Security and reliability equivalent or better than analog systems
Security in traditional video solutions is created by the very closed ...
Faultless control August 2006, News & Events "Hello 21st century!" This is how a member of the public reacted at a concert in Johannesburg when he and his party had their two-dimensional Computicket-issued entrance tickets scanned and verified by ...