Posts Tagged ‘user’
Thursday, March 8th, 2012
A new system based on RFID technology helps retailers link their physical stores to their online social media channels. With the LifeSynk system retailers give RFID smartcards to their customers, who swipe them at a kiosk reader in the store to receive discounts and automatically share their activity via social media channels such as Facebook… Read more >>
Tags: access, activity, analytics, based, cards, check, company, connection, connectivity, control, effective, functions, link, more, over, people, platform, power, reader, server, small, smartcards, software, swipe, system, technology, track, user, view
Posted in RFID •
No Comments »
Thursday, March 8th, 2012
Yedidia Blonde is, a Product Manager at Vizbee RFID Solutions. Vizbee offers RFID applications for multiple industries, including a patient and hospital asset tracking application for healthcare institutions. Here’s what Yedidia had to say about the do’s and dont’s of RFID in hospitals: Radio frequency identification is a very powerful tool for hospital management. With… Read more >>
Tags: abduction, access, application, applications, asset, automatic, based, capabilities, capacity, center, check, checking, clear, computer, degree, display, easily, easy, equipment, existing, from, functions, healthcare, hospital, identification, Information, interface, level, location, machine, management, medical, members, metal, more, multiple, network, nurses, patient, patients, powerful, provider, readers, room, sign, small, software, solution, staff, system, systems, tags, technology, time, track, tracking, usage, user
Posted in RFID •
No Comments »
Thursday, March 8th, 2012
New social networking solution uses RFID technology to connect businesses at physical locations with social media – to be exclusively previewed at next week’s Retail Business Technology Expo. Businesses can now gain control over the level of engagement they have with customers with the use of branded RFID cards which customers can swipe at their… Read more >>
Tags: access, activity, analytics, card, cards, check, connect, connection, connectivity, control, effective, from, functions, Information, level, link, location, monitoring, more, people, platform, power, secure, server, services, single, small, software, solution, stand, swipe, system, technology, track, traffic, user, video, view
Posted in RFID •
No Comments »
Wednesday, February 8th, 2012
BridgePoint™ Systems, the broadest provider of smart-card readers and enrollment software for Physical Access Control Systems (PACs), today announced that Neal Smith Federal Building has implemented its TrustAlert™ PACS (formerly TrustZone PACS). BridgePoint and its partner, EmbarkIT, installed the new system ahead of schedule and within the facility’s budget parameters. TrustAlert PACS is the only… Read more >>
Tags: access, additional, approved, automated, based, biometric, biometrics, building, business, card, check, company, control, controls, cost, different, door, elevator, employees, existing, face, federal, four, from, future, government, higher, identity, installation, integrated, level, levels, long, management, more, network, parking, people, photo, plus, provider, reader, readers, remote, security, server, smart, software, solutions, staff, standards, system, technology, user, verify
Posted in Access Control •
No Comments »
Monday, December 19th, 2011
One of the most heated video surveillance debates is when the market will ‘tip’ to IP cameras, typically defined as the first year when IP camera revenue exceeds analog camera revenue. However, this debate and metric misses the more important shift that has occurred. Already Tipped Right under Our NosesIn the past year, the market… Read more >>
Tags: analog, based, cameras, clear, compatibility, compatible, existing, higher, large, market, megapixel, people, point, powerful, product, report, revenue, size, software, surveillance, systems, technology, user, video
Posted in CCTV, Commercial, Market Use •
No Comments »
Friday, October 14th, 2011
We’ve seen headline after headline of victims who’ve suffered a security breach. While the severity may vary, each is an example of the concerned organisation’s security measures being found wanting. And the battle has only just begun as, in recent months, security professionals have amplified the cry following attacks from DigiNotar, Anonymous and WikiLeaks –… Read more >>
Tags: access, alarm, alert, applications, attacks, authentication, biometric, biometrics, cash, code, communication, cost, credit, data, device, different, effective, entry, existing, face, high, identity, intruder, lock, long, mobile, more, multiple, network, password, people, perfect, point, reader, receipt, risk, secure, security, sending, single, software, solution, system, systems, technology, user, virtual
Posted in Access Control •
No Comments »
Friday, October 14th, 2011
Arizona State University (ASU) manages on-campus housing for approximately 13,000 students living in 34 residence halls. A pilot project is underway at ASU, where a group of students and staff are accessing a campus residence hall and selected resident’s rooms using HID Global’s new iCLASS® SE™ credentials embedded into a variety of popular smartphones connected… Read more >>
Tags: access, additional, advanced, applications, business, campus, cards, carry, cashless, control, convenient, credentials, device, digital, door, doors, enhanced, existing, housing, identity, keys, levels, life, locks, manage, management, mobile, payment, portability, reader, readers, resident, room, secure, security, staff, students, technology, ticket, universities, university, user
Posted in Access Control, Education, Market Use •
No Comments »