Facelift for the Mother City Access & Identity Management Handbook 2006 When the City of Cape Town's Information Technology (CCTIT) division looked over its weighty legacy of disparate time and attendance (T&A) solutions and systems, it decided the time had come for a ...
Logical access control October 2006 Big business lies beyond the boundaries of physical access control.
The rapidly growing world of logical access control is leveraging certain established access technologies in a surprising variety of ...
1G to 3G Access & Identity Management Handbook 2006 The logical transition from today’s typical client/server architecture to third-generation network appliances. The need for remote access
Eighteen months ago, when I was representing a company that ...
2010 - we CAN do it! Access & Identity Management Handbook 2006 In May 2004 South Africa won the bid to host the 2010 FIFA World Cup. Then six years was not considered a lot of time to put so much into place but almost two and a half years later, preparations appear ...
Polophone September 2006, Centurion Systems The design of the polophone handset is state of the art. The hole in the centre of the handpiece allows it to clip over the cradle and merge smoothly into one compact unit.
Each phone can independently ...
Hand vascular pattern recognition system September 2006 The VP-II is a generic access/security control and time and attendance system. The state-of-the-art recognition technology of the VP-II enhances the system usability to 99,98% as opposed to the 95% of ...
Complex gate receiver September 2006, Sherlotronics SA The new Complex gate receiver has a reaction time of 500 milliseconds and up to 1000 rolling code transmitters can be easily programmed. Remotes can be erased if needed. If a valid signal is received, ...
Swing gate operators September 2006, Centurion Systems The R3 and R5 rotary arm swing gate operators are suitable for most swing gates. The wide arc of operation combined with inherent soft acceleration and deceleration provide swift opening and closing of ...
Solo tags September 2006, Centurion Systems The Solo range of proximity tag readers is designed for simple standalone access control applications where security, cost and simplicity is important.
This technology offers tags that are cost effective, ...
DexID Fingerprint DI014 September 2006 The DexID Versatile Fingerprint optical fingerprint reader is an access control time and attendance solution that can be used in almost all environments where a fingerprint security system can work. Users ...
Keyless access control September 2006, Centurion Systems The SmartGuard keypad has been designed to provide all the power and functionality required for high security keyless access control. It is fully weatherproof and manufactured using the latest in high ...
Did you know? CCTV Handbook 2006 New to IP CCTV? Here are some useful facts for you to consider. Security and reliability equivalent or better than analog systems
Security in traditional video solutions is created by the very closed ...
Faultless control August 2006, News & Events "Hello 21st century!" This is how a member of the public reacted at a concert in Johannesburg when he and his party had their two-dimensional Computicket-issued entrance tickets scanned and verified by ...
Communication is key August 2006 Three of SA's leading suppliers of access control and T&A products are joining forces to demonstrate the power of biometric security systems and the benefits they are delivering to the mining industry.
According ...
3D capability added August 2006 Cognitec Systems, provider of face recognition technology and systems, has announced that the company has added new capabilities to its FaceVACS technology to process 3-dimensional sensor data in addition ...
Safety for students July 2006, Turnstar Systems Within the confines of the campus students are in a safer environment and equipment in the various departments is more secure due to the turnstiles at entry points into each room containing valuable equipment
Liveness detection in biometric systems July 2006 Liveness detection in a biometric system ensures that only 'real' fingerprints, facial images, irises and other characteristics are capable of generating templates for enrolment, verification and identification
Selecting a biometric technology July 2006 The selection of the appropriate biometric technology will depend on a number of application-specific factors
Wits University July 2006 Limtech Biometric Solutions was approached to provide seven clocking points for the computer science department, one clocking point as well as four CCTV cameras and a DVR for the statistics - sales and ...
Rosebank College July 2006 Rosebank College was looking to improve student access control as well as barrier control on its premises. Limtech Biometric Solutions was approached and came up with a solution comprising five full-height ...