Articles Search Results

1542 Articles and 180 related Products found for hand
  • 9 Access Control Pitfalls
    1. Not Installing Surge Protection. We recommend surge protection on all data lines and reader cables, as well as for plug-in power supplies...
    Editor / Provider: Submitted by Secura Key | Updated: 2012 / 8 / 21
  • Dvtel Adds Sales, Marketing, R&D Executives
    DVTEL, the IP video surveillance technology innovator, announced that it has hired three new business executives to strengthen its sales, ma...
    Editor / Provider: Dvtel | Updated: 2012 / 8 / 17
  •  NFC = Easier, Quicker Multitasking
    Access Management NFC is fully compliant with the ISO standards governing contactless smart cards. A mobile phone equipped with NFC technolo...
    Editor / Provider: Hayden Hsu | Updated: 2012 / 8 / 9
  • Is 3-D for Security?
    Currently, 3-D technology is used in the security industry to create virtual 3-D environments — 3-D mapping — which is then integrated with ...
    Editor / Provider: Alyssa Fann | Updated: 2012 / 8 / 7
  • Technology Tightens Mining Safety
    The fact that mining sites are in remote locations creates significant challenges for service delivery. Long distances, combined with high r...
    Editor / Provider: Tevin Wang | Updated: 2012 / 7 / 31
  • Vivotek Launches 5-Megapixel Fisheye Camera
    Vivotek is launching the FE8172/72V, its first 5-Megapixel fisheye camera, for both indoor and outdoor applications. Equipped with 5-...
    Editor / Provider: Vivotek | Updated: 2012 / 7 / 26
  • HID Printers/Encoders Used by US DoD Card Program
    HID Global, trusted leader in solutions for the delivery of secure identity, announced that it has been selected to supply the U.S. Depart...
    Editor / Provider: HID Global | Updated: 2012 / 7 / 20