Thursday, March 8th, 2012
As technology priorities go, RFID seems to be the cheese that slipped off the cracker. You may remember the projections for market adoption that were being tossed around five or six years ago that never came close to reality. As recently as two years ago, the marketing drums still beat loudly. Business focus on cost… Read more >>
Tags: activity, applications, areas, automated, based, business, code, company, cost, data, devices, electronic, electronics, exchange, four, from, hands, high, Information, large, life, manufacturer, market, marketing, match, more, output, over, people, platform, power, process, product, products, proof, reader, reliability, report, risk, serial, service, side, software, standards, supply, survey, system, systems, tags, technology, tracking, warehouse
Posted in RFID •
No Comments »
Friday, October 14th, 2011
We’ve seen headline after headline of victims who’ve suffered a security breach. While the severity may vary, each is an example of the concerned organisation’s security measures being found wanting. And the battle has only just begun as, in recent months, security professionals have amplified the cry following attacks from DigiNotar, Anonymous and WikiLeaks –… Read more >>
Tags: access, alarm, alert, applications, attacks, authentication, biometric, biometrics, cash, code, communication, cost, credit, data, device, different, effective, entry, existing, face, high, identity, intruder, lock, long, mobile, more, multiple, network, password, people, perfect, point, reader, receipt, risk, secure, security, sending, single, software, solution, system, systems, technology, user, virtual
Posted in Access Control •
No Comments »