Articles Search Results

285 Articles and 244 related Products found for tag
  • Nedap releases invisible retail anti-theft tags
    Nedap Retail, a developer and supplier of innovative solutions for the retail market, in partnership with Kovi, a worldwide printed silicon electronics technology, unveiled a new category of Electronic Article Surveillance (EAS) tags for the retail and fashion industry that can be invisibly embedded
    Editor / Provider: Nedap | Updated: 2012 / 11 / 15
  • NXP enables mass market NFC tag applications
    NXP Semiconductors announced the launch of the NTAG21x family - the 2nd generation of the company's NFC tag IC products - to further expand the deployment of NFC tags for OEMs, inlay customers and end users. As well as increasing RF performance, the new NTAG21x family comes with a choice of memory s
    Editor / Provider: NXP Semiconductors | Updated: 2012 / 11 / 13
  • HID offers cloud service for managing NFC tags
    HID Global, a provider for secure identity solutions, announced a new cloud-based platform for secure NFC tags and services that eliminates the inherent risks of authenticating original documents, processes, data-logging and high-value assets with traditional sign-off procedures. Leveraging the comp
    Editor / Provider: HID Global | Updated: 2012 / 10 / 31
  • Swedish municipality upgrades 2,000 doors in 200 public buildings
    Assa Abloy's ARX access control system is used on a large scale in Sandviken, Sweden where it secures thousands of doors to administrative offices, gyms, concert halls, schools, preschools and homes. Sandviken Municipality has installed ARX or its predecessor, RiTA, in all of its newly constructed o
    Editor / Provider: Assa Abloy | Updated: 2012 / 10 / 26
  • Residential wine estate in South Africa upgrades to IP surveillance and access control
    Franschhoek Valley lies between towering mountains in the spectacular Cape Winelands, South Africa. La Petite Provence, situated in the middle of the resplendent Franschhoek Valley, is a 36-hectare residential wine estate consisting of approximately 150 houses nestled amongst the vines. In order to
    Editor / Provider: Axis Communications | Updated: 2012 / 10 / 23
  • Samsung Techwin launches DIY kits in the U.S.
    Samsung Techwin America made home and business security even easier and more accessible with the introduction of two new, all-in-one CCTV kits, the SDE-4003 and SDE-5003. The SDE-4003 and SDE-5003 do-it-yourself security kits make it easy to keep an eye on a home or business. Boasting high resol
    Editor / Provider: Samsung Techwin | Updated: 2012 / 9 / 25
  • Swedish mines maintain safety and access control with Assa Abloy platform
    ASSA's ARX access control system maintains security and prevents unauthorized access to LKAB's mines in Malmfaten, northern Sweden. On a typical weekday, 1,100 vehicles and more than 2,000 people visit Malmberget – and twice as many visit Kiruna. On occasions when the mines are shut down for repai
    Editor / Provider: Assa Abloy | Updated: 2012 / 9 / 24
  • EMC Back in Physical Security
    EMC provides the systems, software, and services to leverage one of your most strategic assets—your business data. EMC's goal is to optimize your information infrastructure to meet growing demands for enterprise content management, video surveillance, security, archiving, storage, and virtualization
    Editor / Provider: Submitted by EMC | Updated: 2012 / 8 / 23
  • Access Without Borders
    As the number of mobile-payment users grows to surpass 375 million by 2015, demand for devices with near-field communication (NFC) grows as well. Recent research from In-Stat forecasts that adoption of this technology will push global annual shipments of NFC chips to more than 1.2 billion units by 2
    Editor / Provider: Hayden Hsu | Updated: 2012 / 8 / 9
  •  NFC = Easier, Quicker Multitasking
    Access Management NFC is fully compliant with the ISO standards governing contactless smart cards. A mobile phone equipped with NFC technology can be used to carry a portable identity credential and then wirelessly present it to a reader, said Tam Hulusi, Senior VP of Strategic Innovation and Intell
    Editor / Provider: Hayden Hsu | Updated: 2012 / 8 / 9