News & Events



Bits 'n bytes
Access & Identity Management Handbook 2005, Technews Publishing
We are proud to bring you this Access Control Handbook 2005, the second of its kind, the first successfully debuting in 2004. This Handbook once again aims to raise awareness of the different aspects ...

Read more...
Optimal security from Elvey
Access & Identity Management Handbook 2005
Previously, people were combining quality of life with health and fitness. These days, increasingly, people recognise security as the key to quality of life, the idea being, to protect their loved ones ...

Read more...
Softcon focus
Access & Identity Management Handbook 2005
For over 21 years Softcon has provided intelligent, diverse and reliable building management solutions, with the main focus on access control, input/output monitoring, ID card solutions and vending control ...

Read more...
A view of a changed world building relationships
Access & Identity Management Handbook 2005
The increases in the personal freedom and the rights that individuals demand and enjoy have completely changed the world order, social systems and ideologies over the past 25 years. Technology, material ...

Read more...
Fully integrated resource management
Access & Identity Management Handbook 2005
SACO, a wholly-owned subsidiary of the JSE-listed Reunert group of companies is a provider of resource management, access control and RFID tracking solutions, from tags and tracers to readers and SmartMine ...

Read more...
Reports and white papers
Access & Identity Management Handbook 2005
The Smart Card Alliance Secure Personal ID Task Force develops reports and white papers that discuss the role that smartcards play in the implementation of privacy-sensitive secure ID systems. The following ...

Read more...
Can the Global Village speak Zulu?
Access & Identity Management Handbook 2005, Impro Technologies
The Global Village. Probably one of the biggest buzzwords of the 21st century but how simple is the concept? For years the marketing fraternity has been talking about the existence of this village and ...

Read more...
TCO-TCP/IP: analysing the true total cost of ownership of today's modern 3G systems
Access & Identity Management Handbook 2005
In the alphabet soup of acronyms that surround the world of IP communications, there is one that is potentially more important than all of the others: TCO. It stands for total cost of ownership, and it ...

Read more...
Matching security equipment with system requirements
Access & Identity Management Handbook 2005
Time spent planning up front will be repaid many times over in later phases, in implementation costs and system satisfaction. In the immortal words of Sherlock Holmes, "It is a capital mistake to theorise ...

Read more...
Special event security management
Access & Identity Management Handbook 2005
Special event security management is a critical part of successful event planning. Unfortunately, event managers do not always give sufficient emphasis to security considerations in developing their plans, ...

Read more...
Top 10 tech news of the past 10 years
September 2005
Take a walk down memory lane with News.com’s Mike Yamamoto as he highlights the top tech news stories of the past decade

Read more...
Top 10 security products of 1995
September 2005
The following snippets are by no means exhaustive, but they do hark back to the changes that were coming

Read more...
CBR 10 Most Influential - Security
September 2005
Check Point Much-admired Israeli security company, Check Point, has dominated the firewall market since it launched the first commercially available firewall, FireWall-1, way back in 1994. It has hardly ...

Read more...
CBR 10 Most Influential - Networking
September 2005
We have also included some of the players in WAN optimisation and acceleration, as well as in the even more specific niche of wide area file services (WAFS)

Read more...
CBR 10 Most Influential - Storage
September 2005
Nobody should forget the contribution that the US Securities and Exchange Commission, and senators Sarbanes and Oxley have made to the compliance and ILM market

Read more...
ESSA debuts in September 1995
September 2005
This is a list of the first advertisers to walk the road with us all those years ago, and the products of the time

Read more...
2005 Top Security Brands: the selection process
September 2005
HSS's questions were limited to brand awareness (an indication of market position, and basic knowledge and recognition of the brand)

Read more...
Spoornet invites suppliers to participate in a request for information on railway vehicle tracking system
September 2005
Spoornet requires information on available technologies and system configurations

Read more...
Erratum
September 2005
In the August issue of Hi-Tech Security Solutions a Datavision advert, run on page 10, had a typo error in it as a result of a file conversion bug, which misrepresented the advertised price of two products. ...

Read more...
FREE surveillance incident management technologies and processes breakfast
September 2005
Multivid (along with selected partners) invite you to attend a free morning seminar where the latest offerings in terms of surveillance technology, surveillance audit software and incident management processes will be addressed

Read more...



<< First   < Previous   Page 188 of 253   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.