Optical sensors available in many housing options January 2003, Sensors & Transducers Telco sensors are available in a broad range of housings, suitable for both through-beam and diffuse proximity modes of operation. The remote sensor series consists of both transmitter (LT) and receiver ...
Enhanced integration capabilities for spatial analysis December 2002, GIS - Geographic Information Systems Intergraph Mapping and GIS Solutions announced that it has expanded the company's transportation infrastructure management solutions by offering new interface capabilities that merge Intergraph's GeoMedia ...
Commercially available data warehouse December 2002, PLM - Product Lifecycle Management SmartPlant Foundation is a commercially available, process industry-standard data warehouse using a business object data model for plant information management. This ensures an open system and an independent ...
Sanyo Electric implements PLM solution December 2002, PLM - Product Lifecycle Management Sanyo Electric, Home Appliances Company, motor applied products division, working jointly with Sanyo Electric Software, has implemented EDS's Teamcenter product lifecycle management (PLM) software solution ...
NamITech helps to secure Summit networks November 2002 During the extensive build-up to the World Summit 2002, many valid concerns were raised about the security of the networks for the event and what the potential negative repercussions of a hack would be. ...
Information security solution September 2002 HID's pcProx desktop proximity reader - available locally from Honeywell-TeqTrader - has been integrated into a variety of third-party software offerings specifically geared towards information security.
BioNetrix ...
Physical and environmental protection July 2002, Security Ask any person who has had his or her laptop stolen, and they will tell you that physical security of data is as vital as virtual security of data.
It is two o'clock, Wednesday afternoon, emotions are ...
Metropolitan storage farms - the key to improved business continuance May 2002, Storage One of the key elements of business continuance is the ability to maintain critical business operations by mitigating the effects of downtime. This translates into recovering and restoring computing operations ...
Well-defined security policies essential December 2001 It is not enough merely to secure one's IT infrastructure - telephone systems, physical security and social engineering must also all be considered as part of a comprehensive security policy. "The best ...
Access all areas September 2001 The HR issue of security compliance can and should also supplement any technical safeguards as well motivated staff are less likely to transgress either intentionally or unintentionally
New package to track IT assets June 2001 Local company, FrontRange Solutions (FRS), recently announced the launch of HEAT Asset Tracker, aimed at keeping track of a company's IT investments. FRS is an international supplier of software for automating ...
Network user interface May 2001, Infrastructure The WJ-NT104 from Panasonic is fully equipped with image capture, JPEG and HTTP server functions. It can provide multiple site monitoring which can be conducted from multiple locations (PC), enabling ...
Price alteration: the latest crisis for online shopping May 2001 e-commerce has received a body blow with the revelation that any user with a browser can alter prices of goods online and effectively get them for a steal.
Ian Melamed, Chief Technology Officer of Satellitesafe, ...
Secure m-commerce applications March/April 2001 Comverse, a supplier of software and systems enabling network-based enhanced services, has announced the availability of a solution for end-to-end multi-access security for wireless Internet services.
The ...
MasterCard successfully processes during Leap Year Day 2000 March/April 2000 MasterCard reports the successful passing on leap day - 29 February 2000 - of another important 'Year 2000' milestone.
Because of concerns that computers might misinterpret the value of '02/29/00', ...
Data, not hardware, is a company's most valuable asset March/April 2000 During the first week of March, the offices of no less than six leading legal firms in Johannesburg's northern suburbs were burgled.
Just another South African crime statistic, one may ask?
"No, almost ...
28 frightening IT facts July '99 The recently released 1999 CSI/FBI Computer Crime Survey details what 521 companies from various industries and of various sizes are doing to secure their computer systems. The results highlight why security ...