Posts Tagged ‘data’
Thursday, March 8th, 2012
As technology priorities go, RFID seems to be the cheese that slipped off the cracker. You may remember the projections for market adoption that were being tossed around five or six years ago that never came close to reality. As recently as two years ago, the marketing drums still beat loudly. Business focus on cost… Read more >>
Tags: activity, applications, areas, automated, based, business, code, company, cost, data, devices, electronic, electronics, exchange, four, from, hands, high, Information, large, life, manufacturer, market, marketing, match, more, output, over, people, platform, power, process, product, products, proof, reader, reliability, report, risk, serial, service, side, software, standards, supply, survey, system, systems, tags, technology, tracking, warehouse
Posted in RFID •
No Comments »
Wednesday, February 8th, 2012
Software mines security footage to help business owners see what people do once they’re inside the store. The huge success of online shopping and advertising—led by giants like Amazon and Google—is in no small part thanks to software that logs when you visit Web pages and what you click on. Startup Prism Skylabs offers brick-and-mortar… Read more >>
Tags: alert, based, business, cameras, company, computer, data, device, different, easy, existing, fixed, footage, free, from, higher, Information, level, live, more, multiple, over, owners, people, quality, resolution, security, shopping, small, smart, software, staff, surveillance, technology, temporary, track, tracking, video, view, visitors, wireless
Posted in Video Surveillance •
No Comments »
Wednesday, February 8th, 2012
DALLAS, January 31, 2012 /PRNewswire via COMTEX/ — According to a new market research report “Video Surveillance Market – Global Forecast & Analysis (2011 – 2016): By Products (IP, Analog, Remote, Mobile); Components (Cameras, Storage Devices, Software, System Management); Applications (Infrastructure, Commercial, Institution, Industrial, Residential); System Services” published by MarketsandMarkets ( http://www.marketsandmarkets.com ), the total… Read more >>
Tags: analog, applications, based, business, company, data, digital, from, market, over, remote, report, surveillance, systems, time, video
Posted in Video Surveillance •
No Comments »
Wednesday, February 8th, 2012
Brivo Systems LLC, leader in Software as a Service (SaaS) applications for security management, today announced that Adelante Healthcare, a private non-profit located in Arizona, has standardized on Brivo for access control management at its current and future health care and administration facilities. Adelante Healthcare currently operates seven health centers throughout Maricopa County, offering a… Read more >>
Tags: access, activity, additional, applications, buildings, business, cards, check, Commercial, company, connection, control, data, demonstration, device, different, door, doors, easy, email, employee, employees, entry, footage, from, future, health, healthcare, Information, keyless, keys, live, local, lock, manage, management, monitor, more, multiple, office, over, patients, people, power, products, protected, provider, quality, remote, secure, security, server, services, site, solution, solutions, staff, standalone, system, systems, technology, time, video, view, wide
Posted in Access Control •
No Comments »
Wednesday, February 8th, 2012
Beginning in fiscal year 2012, U.S. government agencies must upgrade their physical and logical access control systems to provide federal employees and contractors with more secure and reliable forms of identification using Personal Identity Verification (PIV) credentials. These credentials must leverage smart card and biometric technology in accordance with National Institute of Standards and Technology… Read more >>
Tags: access, areas, authenticate, authentication, badge, biometric, card, cards, clear, communications, control, credential, credentials, data, define, different, door, easy, employees, enhanced, existing, federal, from, full, function, future, government, high, identification, identity, issuing, keys, level, levels, link, management, members, module, modules, more, multiple, output, panel, panels, passes, point, process, protection, range, reader, readers, relay, reliability, reliable, secure, security, server, single, smart, solution, solutions, standard, standards, strong, system, systems, technology, time, upgrades, vendors, video, visitor
Posted in Access Control •
No Comments »
Monday, November 7th, 2011
The Richardson Police Department in Texas has deployed an RFID asset management system powered by GlobeRanger’s GR AWARE application. The RPD solution runs on GlobeRanger’siMotion platform which enables data capture from current and the next generation of devices. This allows the department to electronically scan and catalog inventory, and obtain real-time visibility on critical assets… Read more >>
Tags: additional, advanced, application, asset, capture, control, data, department, from, management, manual, platform, scan, solution, system, time
Posted in Municipal, RFID •
No Comments »
Monday, November 7th, 2011
Alien Technology is working together will systems integrator CDO Technologies to launch a program designed to increase community recycling levels in the city of Dayton, Ohio. Through the use of RFID technology, residents who make use of their recycling containers are automatically entered in a lottery for one of four $100 prizes. In fact, the… Read more >>
Tags: based, collection, community, data, four, Information, levels, program, resident, residents, solution, systems, tags, usage
Posted in Municipal, RFID •
No Comments »
Monday, October 17th, 2011
The Conficker worm, also known as Downadup, first surfaced in November 2008 and has infected thousands of business networks. The infection attacks unpatched computers by exploiting weak passwords and USB storage devices. The widespread use of USB drives by students has meant that schools and colleges have been particularly badly affected by Conficker – the… Read more >>
Tags: application, attacks, based, business, college, colleges, computers, cost, data, detect, device, devices, easily, Education, existing, flexible, four, internet, large, long, machine, machines, members, memory, network, package, performance, point, protection, schools, security, service, simple, solution, solutions Paste Your Post Content, students, time
Posted in Access Control, Education, Market Use •
No Comments »
Friday, October 14th, 2011
We’ve seen headline after headline of victims who’ve suffered a security breach. While the severity may vary, each is an example of the concerned organisation’s security measures being found wanting. And the battle has only just begun as, in recent months, security professionals have amplified the cry following attacks from DigiNotar, Anonymous and WikiLeaks –… Read more >>
Tags: access, alarm, alert, applications, attacks, authentication, biometric, biometrics, cash, code, communication, cost, credit, data, device, different, effective, entry, existing, face, high, identity, intruder, lock, long, mobile, more, multiple, network, password, people, perfect, point, reader, receipt, risk, secure, security, sending, single, software, solution, system, systems, technology, user, virtual
Posted in Access Control •
No Comments »
Friday, October 14th, 2011
A new report, entitled “Veriphyr’s 2011 Survey of Patient Privacy Breaches”, summarizes the findings of a Veriphyr survey on Protected Health Information (PHI) privacy breaches of compliance and privacy officers at mid to large sized hospitals and healthcare service providers. According to the findings, more than 70 percent of the organizations in the study have… Read more >>
Tags: access, controls, cost, data, detect, detection, employees, equipment, existing, four, healthcare, hospitals, Information, large, medical, monitor, monitoring Paste Your Post Content, patient, service, survey, unauthorized
Posted in Access Control, Health care, Market Use •
No Comments »