Business intelligence for operational risk July 2004 Only organisations concerned about one, very specific operational risk, such as money laundering, can afford to invest in a niche business intelligence (BI) product. Businesses with broader vision must ...
Customer training earns top honours July 2004, Rockwell Automation, Training & Education, Security Services & Risk Management Rockwell Automation customer trainer products, which form apart of global manufacturing solutions (GMS), have long been focused on improving customers' human assets. Recently, two top US training and ...
Mains-to-DC supply for light curtain July 2004, Electrical Power & Protection, Security Services & Risk Management The SGC 1 is a new power supply unit, housed in a sturdy plastic enclosure, which is to be used in conjunction with the SG 1 self-contained light curtain series. The SGC 1 is intended for installations ...
Hydraulic valve interface module July 2004, Danntech, Pneumatics & Hydraulics, Infrastructure Interfacing to hydraulic valves is generally never simple. To make things a little easier, Danntech has designed a multipurpose hydraulic valve interface module with a variety of inputs, various outputs ...
New generation of linear scales Third Quarter 2004, ATI Systems, Other technologies The newly developed Laserscale, model BL55, is claimed to be the fastest high-resolution scale on the market today. The new design provides a combination of resolution, accuracy and speed that satisfies ...
Low standby power semiconductors 16 June 2004, Electrocomp, Power Electronics / Power Management Infineon Technologies claims its third generation integrated multichip power IC family provides the industry's lowest standby power consumption. The CoolSET F3 family exceeds specifications of such standards ...
Smartcard briefs June 2004, Access Control & Identity Management Excerpts from the newsletter of The Smart Card Society of southern Africa OTI and Atmel assist MasterCard smartly
Atmel Corporation and On Track Innovations (OTI) have been selected for their contactless ...
Combating the cyber criminals June 2004 When access control systems were first introduced, they consisted of control panels, readers, electrically controlled door strikes, cards, and a personal computer. That part has not changed much. In the ...
Identity theft in the corporate network June 2004 The office cleaner wanders around the IT department emptying bins into a black plastic bag. He bends below each desk to look for stray sandwich wrappers and plastic cups. While he is under the desk, it ...
Improved security in Web services possible June 2004 Without proper planning and precaution, an enterprise can experience disastrous security intrusions that can result in lost revenue and decreased productivity, especially from today's new breed of debilitating ...
Move over Batmobile June 2004, CAM/CAE - Computer Aided Manufacturing / Engineering Flying cars might have been considered the true future of the automobile in the 80s, however the concept has evolved into what is known as `intelligent cars', as currently being worked on by the FlexRay ...
Flexible wireless broadband cable 19 May 2004, Hiconnex, Interconnection CommScope's wireless broadband communication cable (WBC) is a low loss highly flexible 50 Ω braided cable, designed for maximum flexibility in demanding sites where curves, bends and twists require a ...
Power and battery management standard product for 3G 19 May 2004, Altron Arrow, Power Electronics / Power Management, Residential Estate (Industry), Conferences & Events The AT73C203 power management standard product for 3G wireless platforms is manufactured on Atmel's low-cost mainstream CMOS process to provide an integrated solution for portable and handheld applications ...
Trends in digital evidence handling May 2004 We still have no clear guidelines on access to sensitive material and this will lead to an unnecessary extra burden on the courts
Early alerting - the key to proactive security May 2004 A study conducted by Qualys and released in July, that correlated nearly 1,5 million scans over the course of a year and a half, found that 80% of exploits are released within 60 days of a vulnerability's announcement
Ericsson inks US$32 million deal for the first EDGE network in Africa May 2004, News + Events Ericsson has been awarded a US$32 million contract to supply cellular equipment and services to Scancom, the leading telecoms operator in Ghana.
The deal will see Scancom implementing GSM networking ...
The truth about online payment methods and who carries the risk May 2004 Online purchasing can become a confusing process for some shoppers - from finding the online store, to choosing the right product and then having to decide on which payment method to use.
Although there ...
Generator controller design helps cut energy consumption by 25% 21 April 2004, Opti-Num Solutions, Design Automation, Products & Solutions To comply with the Kyoto Protocol, governments around the world are working to substantially reduce CO2 emissions. One way to accomplish this is to improve efficiency by combining electricity power stations ...