TITLE

Product Showcase

PUB. DATE
February 2005
SOURCE
Security: Solutions for Enterprise Security Leaders;Feb2005, Vol. 42 Issue 2, p32
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Features several security equipment and supplies available in the U.S. as of February 2005. Small foot-print ID card printer; Radio frequency identification printer from Polaroid; Card printer from Fargo; Watermark printer from Ultra Electronics.
ACCESSION #
15911839

 

Related Articles

  • Outwitting Card Forgers. Blank, Eric // Security: Solutions for Enterprise Security Leaders;May2004, Vol. 41 Issue 5, p36 

    Reports on the risk and potential liabilities of radio frequency identification technologies for card forgers. Aid of the technologies to security management of companies; Need for security to constantly look to more advance methods to protect companies, employees and customers; Offer of a...

  • Combo Those Cards. Blank, Eric // Security: Solutions for Enterprise Security Leaders;Feb2005, Vol. 42 Issue 2, p28 

    Focuses on combining radio frequency identification-enabled plastic cards with advanced card printing and manufacturing techniques for additional security in multiple operations. Addition of hidden patterns and information printed on the surface of a card for another level of security to assess...

  • FYI on RFID. Menzel, John // Security: Solutions for Enterprise Security Leaders;Sep2005, Vol. 42 Issue 9, p34 

    Presents a background on radio frequency identification (RFID) systems. Capability of incorporating the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person; Main components of an RFID...

  • Maximizing Event Security with ID Cards.  // Security: Solutions for Enterprise Security Leaders;May2007, Vol. 44 Issue 5, p42 

    The article discusses the applicability of identification cards (ID) to provide security for special events in the U.S. Most organizations still rely on ID technology which ranges from less expensive barcodes or magnetic strips to more sophisticated radio frequency identification system (RFID)...

  • TI-RFID Used in the Big House.  // Security: Solutions for Enterprise Security Leaders;Dec2003, Vol. 40 Issue 11, p9 

    Reports on the utilization of the security technology from Plano, Texas-based Texas Instruments Radio Frequency Identification Systems by the Pima County Jail in Tucson, Arizona. Product which was adopted by the institution; Use of the product obtained by the penitentiary; Business transactions...

  • The Uproar Over RFID. Mandelblit, Bruce // Security: Solutions for Enterprise Security Leaders;May2004, Vol. 41 Issue 5, p38 

    Reports on the debate about radio frequency identification (RFID). Rapid growth of the technology in the security systems form card access to asset tracking; Benefits of the technology for manufacturers and retailers; Reliance of RFID on miniature and relatively inexpensive microchips.

  • A Digital Security System with Door Lock System Using RFID Technology.  // International Journal of Computer Applications;Aug2010, Vol. 5, p9 

    The article focuses on a study which explores the development and implementation of a digital security system with door lock system using Radio Frequency Identification (RFID) system which can activate, authenticate, and validate the user. Security, asset tracking, and access control application...

  • People Tracking -- It's a Good Thing. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p28 

    The article focuses on people tracking solutions for healthcare facilities in the U.S. Healthcare security executives enlarged the business model to include wandering patients and residents who suffer from dementia, Alzheimer's or similar conditions at risk of wandering off. However, solutions...

  • Security tagging mobile users. Holburt, Jonathan // Enterprise Innovation;Aug/Sep2007, Vol. 3 Issue 4, p32 

    The article discusses how security solutions are tagging mobile device platform users in business enterprises. The author highlights that the security systems ensures that fewer good go missing an employees are more productive. He also points out that no discussion of mobile security would be...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics