Articles Search Results

271 Articles and 70 related Products found for contact
  • Diversity: Hallmark of RFID
    RFID first hit the market in the 1970s and has seen continued improvements over the years, making it an effective technology for tracking and managing goods with applications in a variety of vertical markets. RFID exists in different types and forms. Chief among them are LF, HF, UHF, active, and pas
    Editor / Provider: William Pao, a&s International | Updated: 12 / 23 / 2014
  • Verint forms global strategic partnership with Unify
    Verint Systems announced that it has formed a global strategic partnership with Unify, a well-known enterprise communications software and services firm. The relationship extends the reach and availability of Verint Workforce Optimization™ (WFO) solutions into enterprise contact centers, or customer
    Editor / Provider: Verint Systems | Updated: 11 / 20 / 2014
  • Comprehensive access control solutions feature at Secutech 2015
    Access control has long been a vital portion of physical security and can be divided into three categories, namely password-based access control, card-based access control, and biometrics-based access control, according to the system's input, transmission, and control methods. The functions and char
    Editor / Provider: Secutech | Updated: 11 / 18 / 2014
  • NICE Engage Platform selected by number of companies worldwide
    NICE Systems announced that a number of leading financial institutions, retailers, utility and telecommunication companies worldwide have selected the NICE Engage Platform. With unrivaled scalability and low TCO, this next generation platform will enable these organizations to capture and analyze al
    Editor / Provider: NICE | Updated: 11 / 7 / 2014
  • How security enhances metro emergency management
    Taking public transportation has become a normal way of life for people constantly on the go. Yet despite various safety measures implemented by the operator, disasters, whether natural or caused by human, occur from time to time. Luckily, today's security technologies have evolved to enable better
    Editor / Provider: William Pao, a&s International | Updated: 10 / 6 / 2014