Smartcard technology gains importance in access control Access & Identity Management Handbook 2005 The advent of contactless personal computer/smartcard (PC/SC) reader technology marks a significant development for the smartcard market in general and the access control segment in particular. Manufacturers ...
Selecting a biometric technology Access & Identity Management Handbook 2005 The selection of the appropriate biometric technology will depend on a number of application-specific factors, including the environment in which the identity verification process is carried out, the ...
When installing card readers: build a pathway to future card-based technologies Access & Identity Management Handbook 2005 The 125 KHz proximity and Wiegand standards currently constitute the majority of the card-based access control market worldwide. The reluctance among these card issuers to move towards the more advanced ...
Security up front Access & Identity Management Handbook 2005 First impressions count! Both the interview candidate and the salesperson dress smartly, shine their shoes and put on their most confident smiles. So too the architect who uses the front lobby of a building ...
Visitor control - the flaw in most access control installations Access & Identity Management Handbook 2005
How often have you been tempted to fill in the Visitors Book with something as equally foolish as the above? Certainly, in strategically important installations they have a security team and without ...
Contactless smart chip technology - the business benefits Access & Identity Management Handbook 2005 This briefing provides an overview of why businesses are implementing contactless smart chip technology in broadly different environments and applications around the world.
Contactless smart chip technology, ...
The where's, when's and why's of wireless access systems Access & Identity Management Handbook 2005 Depending on the application - from regular doors to elevators - wireless locking systems should be a consideration for every installation.
Wireless or RF on-line locking systems are gaining momentum. ...
Upgrading access solutions Access & Identity Management Handbook 2005 Access control systems have, as a general rule, been developed as proprietary systems. System manufacturers are mainly interested in developing a system they believe is better than other systems on the ...
Testing and measuring automatic door and gate safety Access & Identity Management Handbook 2005 According to the latest European standards governing doors and gates, all automatic closing systems are governed by the Machinery Directives.
The aim of the new standards is to define the technical, ...
Enterprise access control over IP Access & Identity Management Handbook 2005 This case study describes how and why Cisco Systems transitioned from standalone access control systems to an IP networked system to help secure its business facilities. Cisco's global security network ...
Access around the world Access & Identity Management Handbook 2005 "At Sun Microsystems we created a new smartcard solution for network security and physical access control called JavaBadge," said Chris Saleh, marketing manager and programme manager for JavaBadge. "We ...
In the heart of Hillbrow Access & Identity Management Handbook 2005, Turnstar Systems Project scope
The Ponte Building in Hillbrow, Johannesburg, has 470 apartments and 2200 residents.
Two main access points, previously controlled by a tag access control system, were replaced by the ...
Residential and retail in one Access & Identity Management Handbook 2005, ISF SFP Project scope
The project consists of two hotels (apartments) in Sandton, each with its own parkade. In total there are 190 apartments in the Michelangelo Towers, with two levels of retail area linking ...
Safety and control at Samancor Manganese Access & Identity Management Handbook 2005 Project scope
1400 employees/contractors have been registered on the system. Processing currently takes place through 11 Sagem Morpho Identification Stations using MSO 300 Xelios scanners. These identification ...
Safety for students Access & Identity Management Handbook 2005, Turnstar Systems Project scope Ensuring the safety and security of 65 000 people occupying 110 buildings under the auspices of the University of the Witwatersrand. The history
Wits University needed to upgrade the ...
Fingers on the pulse Access & Identity Management Handbook 2005 Project definition and scope
The installation of fingerprint clocking points throughout the Pharma Natura organisation to monitor accurate time and attendance recording of staff and export of log data ...