339 Articles and 302 related Products found for RFID
Gaming sector demands beyond surveillance
Editor / Provider: Michelle Chu | Updated: 11/27/2014 | Article type: Hot Topics
Fraud and theft are the most common illegal activities that take place in casino facilities, as a large amount of money is handled between staffs and patrons every single day making casino a convenient target. When it comes to casino security deployment, there are many to concern about.
Creative applications illustrate wonders of RFID
Editor / Provider: William Pao, a&s International | Updated: 11/25/2014 | Article type: Tech Corner
In many ways, RFID is like a paintbrush or building blocks, allowing the user to be as creative as they can to solve a particular problem or dilemma. Its technology is quite simple, consisting of only a reader and a tag. But applications can be diverse, wide-ranging, and even wild. This article examines some of the unique and special applications of RFID in different verticals.
Tyco appoints Daryll T. Fogal as CTO and launches "Tyco On" platform
Editor / Provider: TYCO | Updated: 11/24/2014 | Article type: Security 50
Tyco International announced that it has taken important steps to bolster its technology capabilities, appointing Daryll T. Fogal as Chief Technology Officer, launching its new "Tyco On" software solutions platform, and making a strategic investment in Qolsys, a provider of innovative home automation solutions.
Comprehensive access control solutions feature at Secutech 2015
Editor / Provider: Secutech | Updated: 11/18/2014 | Article type: Tech Corner
Access control has long been a vital portion of physical security and can be divided into three categories, namely password-based access control, card-based access control, and biometrics-based access control, according to the system's input, transmission, and control methods. The functions and characteristics of each type of access control are explained here in this article.
Casino x VCA say no to wrong doers
Editor / Provider: Lisa Hsu, a&s International | Updated: 11/18/2014 | Article type: Hot Topics
Everyone knows what surveillance cameras in casinos are for, but no one really worries about them unless they have something to hide, and for people who do, they hide it well. No longer do casinos bet solely on security cameras to spot crime ongoing in their premises, with video content analysis (VCA) to detect any unusual incidents, the house will always win.
Nedap helps to keep the power on in Tennessee
Editor / Provider: Nedap | Updated: 11/7/2014 | Article type: Infrastructure
The TRANSIT system at the entrance of the MTE facility in Murfreesboro was installed through the local security integrator Guardian Systems. “MTE was looking to improve vehicle access control to their facility as well as improve their tracking of high value assets. But they required this to be done in a way that would not impede productivity. That is where the Nedap long range solutions came in,”
Identity management solutions keep intruders at Bay
Editor / Provider: William Pao, a&s International | Updated: 11/4/2014 | Article type: Tech Corner
Identity management has become an increasingly important method of protecting assets, data, and premises by organizations, many of which have thousands of workers on their payroll. Making matters worse, these workers include not only full-time employees but temp workers and contractors as well. Determining whether these people are who they say they are and allowing them access to critical areas or
Wouter Vansteenkiste joins Nedap as Channel Development Manager
Editor / Provider: Nedap | Updated: 10/21/2014 | Article type: Security 50
Nedap has appointed Wouter Vansteenkiste as Senior Channel Development Manager of Nedap Identification Systems, leading specialist in systems for automatic identification of vehicles and people and wireless detection of vehicles in parking bays.
The keys to seamless healthcare solution
Editor / Provider: Michelle Chu | Updated: 10/20/2014 | Article type: Hot Topics
In the terms of security for healthcare vertical, there are different phases needed to be taken care of. Unauthorized access to the patient's medical record or expensive medications and equipment will not only cost the hospital a great fortune but also jeopardize their reputation. However, it is important to make sure that the visitors, patients, and injured are easy to go around in the hospital.
Understanding “Real” PSIM
Editor / Provider: Israel Gogol, a&s International | Updated: 10/15/2014 | Article type: Hot Topics
PSIM (physical security information management) software is a rapidly growing segment in the security market. Its core strengths lie in the ability to integrate disparate systems, creating an intelligencebased situation picture and supplying operators with active policy management. As the market learns more of the benefits PSIM they have the potential to go beyond security and turn into a complete
Custom long range LWIR/MWIR/SWIR FLIR PTZ cooled / uncooled mast, mobile, fixed thermal IR imaging radar tracking stabilized camera gimbal systems
Reaction and Resiliency Inspire Synergy 3 Latest Release
Surveon Protects Cities with Reliable End-to-end Surveillance Solutions
TSict Housings Protect the new Natural Park in Al Dhaid of Sharjah, U.A.E.
What's the Difference Between a Normal Hard Drive and Surveillance Hard Drive?
Copyright © 2016. Messe Frankfurt New Era Business Media Ltd. All rights reserved.