Articles Search Results

744 Articles and 2 related Products found for complex
  • Oil and gas fuel up on safety
    From a safety and security perspective, oil and gas installations are among the most critical and challenging environments. The speed in which an incident can escalate to adisaster means that operators need to get information quickly to be able to react and minimize damages. Advances in video techno
    Editor / Provider: Israel Gogol, freelancer, a&s International | Updated: 12 / 9 / 2014
  • Biometric authentication goes mobile
    Today, there are nearly 7 billion mobile subscribers worldwide, as estimated by the International Telecommunication Union. That is 95.5 percent of the world's population! And in this highly connected world, each and every individual mobile subscriber must be sure that personal data and identities ar
    Editor / Provider: Morpho (Safran) | Updated: 12 / 8 / 2014
  • Creative applications illustrate wonders of RFID
    In many ways, RFID is like a paintbrush or building blocks, allowing the user to be as creative as they can to solve a particular problem or dilemma. Its technology is quite simple, consisting of only a reader and a tag. But applications can be diverse, wide-ranging, and even wild. This article exam
    Editor / Provider: William Pao, a&s International | Updated: 11 / 25 / 2014
  • Tyco appoints Daryll T. Fogal as CTO and launches
    Tyco International announced that it has taken important steps to bolster its technology capabilities, appointing Daryll T. Fogal as Chief Technology Officer, launching its new "Tyco On" software solutions platform, and making a strategic investment in Qolsys, a provider of innovative home automatio
    Editor / Provider: TYCO | Updated: 11 / 24 / 2014
  • HID NFC tag tech delivers proof of presence and reduces fraud in home healthcare market
    HID Global®, one of the worldwide leaders in secure identity solutions, announced the results of its HID Trusted Tag™ Services pilot that successfully demonstrate its ability to provide “proof of presence” and an auditable Electronic Visit Verification (EVV) record of caregivers in patients' homes.
    Editor / Provider: HID Global | Updated: 11 / 12 / 2014
  • HID Global securing enterprise cloud applications
    Applications that reside in the cloud afford enterprises previously unavailable levels of agility, productivity and vital flexibility – all at a crucially lower cost than ever before. However, with many enterprises cloud deployments now successfully up and running, plus the integration of the Bring-
    Editor / Provider: Jordan Cullis, HID Global | Updated: 11 / 5 / 2014
  • Trends in airport security: meeting the challenges
    The challenges facing today's airport security decision makers become ever more complex, as additional processes traditionally outside of their scope of responsibility have to be considered. These include passenger flow management, higher capacity aircraft, differing passenger security classificatio
    Editor / Provider: Sponsored by Siemens Enterprise Security | Updated: 11 / 4 / 2014
  • Nedap reinvests in AEOS with next-generation controllers
    Nedap introduces the new AEOS Blue hardware line. This new generation of controllers builds on the successful AEOS Security Management Platform, the first software-based platform for security management.
    Editor / Provider: Nedap | Updated: 11 / 4 / 2014
  • Networked security system for major hotel development in Turkey
    Bosch Security Systems has delivered a networked security solution for one of Turkey's major hotel developments: the new Hilton complex in Bursa. It combines the 5-star Hilton Bursa Convention Center & Spa with the 3-star Hampton by Hilton Bursa. Located close to Bursa city center, historical herita
    Editor / Provider: Bosch | Updated: 10 / 31 / 2014