Access Control & Identity Management



Precious metals, precious lives
Access & Identity Management Handbook 2006
Steve Conradie, head of asset protection at Anglo Gold Ashanti, explains the ­difficulties faced by mines, and the ­importance of controlling the access of people into the mines – for safety as well as ...

Read more...
Maintaining security and safety
Access & Identity Management Handbook 2006
Security and access control (AC) has always been a major focus for Lonmin, the world's third largest platinum producer, with four operational mines in South Africa and over 26 000 employees.       The history...

Read more...
Security Port of Tauranga
Access & Identity Management Handbook 2006, Gallagher
At the front line of the supply chain, ports have a critical role to maintain the ­credibility of their country as secure ­trading partners.       The history New Zealand's preferred export gateway and ...

Read more...
Tracking of the containers
Access & Identity Management Handbook 2006, Turnstar Systems
The major challenges facing SETV, a ­division of European-based Bollerey PLC, when it took over the operation of the container terminals from the Ivory Coast Ports authorities, subsequent to the ­privatisation ...

Read more...
The new lager
Access & Identity Management Handbook 2006
Under the previous government, the story of the Voortrekkers was mercilessly driven into the brains of impressionable youngsters. Of the things we were taught was the concept of the lager, in which ...

Read more...
Property protection
Access & Identity Management Handbook 2006
Ithemba Property Trust 2 is a property development company based in Berea, Johannesburg, with several residential properties in the Johannesburg CBD.       The history Crime, overcrowding and hijacking ...

Read more...
Directing heavy traffic
Access & Identity Management Handbook 2006
The sheer volume of stock moving through Vector Logistics, a wholly-owned subsidiary of Rainbow Farms, is on a scale that defies imagination. Vector provides specialist logistic services to the food ...

Read more...
Farmstyle T&A
Access & Identity Management Handbook 2006
Manjoh Ranch is a farm in the Nigel area whose main activities are growing mielies and breeding cattle. The farm also has a mill that is used to convert some of the maize into various products.       The ...

Read more...
Extinguishing the fire
Access & Identity Management Handbook 2006
The City of Johannesburg’s Emergency Management Services (EMS) recently ­installed a state-of-the-art time and ­attendance (T&A) solution system for all its fire stations.       The history EMS consists ...

Read more...
Safeguarding a sanctuary
Access & Identity Management Handbook 2006
The history Hatfield Christian Church in Pretoria had been experiencing theft and vandalism in spite of having a full time security company on site. In addition, venues and equipment were being misused. "We ...

Read more...
Integrating T&A
Access & Identity Management Handbook 2006
The history Steinmüller Engineering Services, a member of the Babcock Borsig Service Group, decided in 2005 to seek a time and attendance (T&A) solution that could meet the complex needs of the company. The ...

Read more...
Facelift for the Mother City
Access & Identity Management Handbook 2006
When the City of Cape Town's ­Information Technology (CCTIT) division looked over its weighty legacy of ­disparate time and attendance (T&A) ­solutions and systems, it decided the time had come for a ...

Read more...
Logical access control
October 2006
Big business lies beyond the boundaries of physical access control. The rapidly growing world of logical access control is leveraging certain established access technologies in a surprising variety of ...

Read more...
Citect launches new benchmarking service
October 2006, News, Integrated Solutions
Citect, one of the world's largest, realtime intelligence software companies, announced the launch of a new benchmarking service. This service is designed to support corporate performance benchmarking ...

Read more...
1G to 3G
Access & Identity Management Handbook 2006
The logical transition from today’s typical client/server architecture to third-­generation network appliances.       The need for remote access Eighteen months ago, when I was representing a company that ...

Read more...
2010 - we CAN do it!
Access & Identity Management Handbook 2006
In May 2004 South Africa won the bid to host the 2010 FIFA World Cup. Then six years was not considered a lot of time to put so much into place but almost two and a half years later, preparations appear ...

Read more...
Lighting drivers power up to 20 series-connected LEDs
6 September 2006, Altron Arrow, Power Electronics / Power Management
National Semiconductor recently introduced two new, highly-integrated lighting management units (LMUs) that include a high-voltage boost converter and programmable constant-current driver to control up ...

Read more...
Polophone
September 2006, Centurion Systems
The design of the polophone handset is state of the art. The hole in the centre of the handpiece allows it to clip over the cradle and merge smoothly into one compact unit. Each phone can independently ...

Read more...
Hand vascular pattern recognition system
September 2006
The VP-II is a generic access/security control and time and attendance system. The state-of-the-art recognition technology of the VP-II enhances the system usability to 99,98% as opposed to the 95% of ...

Read more...
Complex gate receiver
September 2006, Sherlotronics SA
The new Complex gate receiver has a reaction time of 500 milliseconds and up to 1000 rolling code transmitters can be easily programmed. Remotes can be erased if needed. If a valid signal is received, ...

Read more...



<< First   < Previous   Page 132 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.