Archive for the ‘Discretionary access control’ Category

Visitor Management System, an Overview

Thursday, September 1st, 2011

Visitor Management System Gone are the days of primitive visitor management! Electronic devices for the process are the need of the day. Areas with a large number of visitors adopt the services of this system to keep a track of the people checking in and out of the building. Schools use the system to prevent… Read more >>

Dual Beam Barcode Scanner

Friday, July 1st, 2011

The BA-220 DualBeam Barcode Reader easily handles the harsh environmental conditions typical at roads and vehicle entrances. The unit is immune to interference or glare from the Sun as well as radio frequency interference from cell phones, radio antennas, power lines and microwave towers. The primary purpose of the BA-220 DualBeam Barcode Reader is to… Read more >>

FINGER PRINT AND ACCESS CONTROL

Wednesday, June 1st, 2011

A fingerprint scanner is an intelligent device which takes place of a human analyst by collecting a Fingerprint sample and comparing it to other samples on record. It has optical scanners and detectors which scans and record the unique pattern of Fingerprint ridges on the skin. A fingerprint scanner system has two basic objectives: (1)…. Read more >>

BARCODE

Monday, May 2nd, 2011

What is Barcode: A barcode is an optical machine-readable representation of data. Barcodes represent data by varying the widths and spacing of parallel lines, and may be referred to as linear or 1 dimensional. Barcodes originally were scanned by special–optical scanners called barcode readers, scanners and interpretive software are available on devices including desktop printers…. Read more >>

LIMIT SWITCH

Thursday, February 3rd, 2011

Limit switches are Mechanical Switch which is used to make or break an electrical circuit during certain positions of a repetitive movement. The Basic purpose of a limit switch is to switch discrete outputs on or off based on the position of a rotating shaft. The point at which an output switches on or off,… Read more >>

INSIDE PROXIMITY CARD

Wednesday, January 26th, 2011

WHAT IS PROXIMITY CARD: In the world of Security System and Access Control, Contactless Proximity Card plays a very vital role. Proximity cards are a custom programmed item. Many companies and organizations use proximity cards for their access control system as well as for the Identification of employees. iWatch Systems offers a wide range of… Read more >>

INFRA RED

Thursday, October 28th, 2010

Infrared Light is electromagnetic radiation with a wavelength between 0.7 and 300 micrometers. They are longer than that of visible light but shorter than that of terahertz radiation microwaves. IR is used in the security system as because Human at normal body temperature radiate chiefly at wavelength around 12 micrometer s. An infrared camera is… Read more >>

INTELLIGENT SYSTEMS

Friday, October 8th, 2010

The incorporation of computer intelligence and network connectivity into devices and systems—the basic convergence influence—allows systems to be of greater and greater real-time benefit to the systems users. The widespread deployment of personal computers and networks has resolved, for all practical purposes, the connectivity barrier. Driven by relentless customer demand for improved systems, a number… Read more >>

CCD TECHNOLOGY

Thursday, September 23rd, 2010

WHAT IS CCD?? A charge coupled device (CCD) camera is an apparatus which is designed to convert optical brightness into electrical amplitude signals using a plurality of CCDs, and then reproduce the image of a subject using the electric signals without time restriction. Charge coupled devices or CCDs are arrays of semiconductor gates formed on… Read more >>

WIRELESS NETWORKING

Thursday, September 16th, 2010

  Now a day over 166 million professionals worldwide, organizations use wireless technologies to solve business problems and create advantages over competitors. Wireless solutions are enabling remote or mobile workers (such as field sales, field service, manufacturing, and logistics personnel) to access information and business applications from more places. With respect to Security System wireless… Read more >>