Access Control & Identity Management



A question of identity - developments around the world
October 2004
Whether activating a cellphone or making an online purchase, the ability to identify ourselves is essential. In the near future, card-based biometrics could be compared with on-the-spot data to certify ...

Read more...
Ideco Technologies - perfection in biometric technology
Access & Identity Management Handbook 2004
Since its creation in 2001, Ideco Technologies has been distributing SAGEM biometric technology throughout SA and in the southern African region. The fingerprint hardware and software perfected over the ...

Read more...
Security at Silicon Smelters
Access & Identity Management Handbook 2004, Turnstar Systems
Project scope    Number of users: 350 employees, 1600 people enrolled eg: contractors and visitors.    Number of enrolment stations: one Sagem MEMS.    Number of biometric readers: eight Sagem MorphoAccess. ...

Read more...
Where to 'access' and why to 'control'
Access & Identity Management Handbook 2004
What is the primary reason to implement an access control solution? In short, it is to properly protect people and assets and to accurately record and manage the requirements of the site where the technology ...

Read more...
Sydney 2000 - lasting Olympic memories
Access & Identity Management Handbook 2004
From touchdown to the stadium, patrons of the Olympics experienced Honeywell reliability and leading technology at every turn. Honeywell was responsible for the access control, building automation, fire ...

Read more...
A sporting chance for security
Access & Identity Management Handbook 2004
Best practices for secured access control in stadia Patrick Ronan is currently the lead drafter of the legislative task team responsible for the drafting of the `Safety at Sports and Recreational Events ...

Read more...
Installers' basic reference table to access control
Access & Identity Management Handbook 2004
All relevant safety requirements should be considered prior to commencement of work. Electrical installation methods are to comply with current national and site regulations. Installation staff should ...

Read more...
Access control - market sectors
Access & Identity Management Handbook 2004
Audio and video-entry systems Audio and video-entry systems are widely used in the household sector and in smaller non-domestic locations. An electronic strike lock is operated remotely by the person ...

Read more...
Improved access control at City Office
Access & Identity Management Handbook 2004
Project scope    Three factories/sites    One biometric enrolment station    Three Sagem MorphoAccess terminals    Approximately 100 employees       The history City Office manufactures a wide range of office ...

Read more...
All the Bells and whistles
Access & Identity Management Handbook 2004
Project scope Time and attendance for 800 hourly paid employees, 400 contractors and 400 monthly paid employees at the Richards Bay site. The SAP HR project team consisted of three Bell employees, one ...

Read more...
Fired up security at MTN
Access & Identity Management Handbook 2004
Project scope The MTN project currently comprises an access control system with a central server, controlling approximately 20 buildings across the country. There are in excess of 60 controllers, with ...

Read more...
uShaka Marine World
Access & Identity Management Handbook 2004, Turnstar Systems
Project scope    R735-million total development with 22 000 m3 of marine tanks, Water Park, 12 000 m2 retail, 475 m beach frontage. Estimated paid attendance of 1,5 million per annum with Design Day of ...

Read more...
Tighter control at Macsteel
Access & Identity Management Handbook 2004, Turnstar Systems
Project scope    Number of users: projected group project 1000. At present +250 users at one site.    Number of buildings: One.    Number of enrolment stations: One Sagem MEMS.    Number of biometric readers:...

Read more...
The role of time and attendance in access control
Access & Identity Management Handbook 2004
Time and attendance is an expensive afterthought to an access control system and vice versa. By pre-planning, one can use their synergies, save money and avoid ending up with incompatible systems that ...

Read more...
Buddy-clocking - a thing of the past
Access & Identity Management Handbook 2004, Turnstar Systems, Impro Technologies
Project scope    Number of users: 300.    Number of buildings: One.    Number of enrolment stations: One Sagem MEMS.    Number of biometric readers: Six Sagem MorphoAccess.    Mode of biometric operation: Identification ...

Read more...
SA technology 'cleaning-up' Hillbrow
Access & Identity Management Handbook 2004
DEX Security Solutions was approached six months ago to help solve many of the problems affecting Hillbrow in Johannesburg.       The problem Hillbrow is notorious as one of SA's largest crime areas where ...

Read more...
An overview of biometrics standards
Access & Identity Management Handbook 2004
The past two years have seen significant developments at an international level in the generation of standards in the field of biometrics. This article gives a brief overview of the current state of affairs ...

Read more...
Protecting their privacy
Access & Identity Management Handbook 2004, Turnstar Systems
Project scope    Residential apartment block with 600 tenants.       The history Providers of accommodation for residential tenants, this is how Gerald Kaplan describes what his company, The Monsy Group, ...

Read more...
Keeping the records straight
Access & Identity Management Handbook 2004, Exys Africa
Project scope    Number of users: Staff 900, visitors 3000.    Number of buildings: One.    Number of enrolment stations: Three Sagem MEMS.    Number of biometric readers: 21 Sagem MorphoAccess.    Mode of biometric ...

Read more...
How to design automated access and parking systems for university campuses
Access & Identity Management Handbook 2004
Identification is the action where an identity is assigned to a specific individual, and authentication the action designed to verify a user's identity. An individual can be identified and authenticated ...

Read more...



<< First   < Previous   Page 143 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.