Optical Turnstiles as a Portal

Bordes, Roy N.
August 2005
Security: Solutions for Enterprise Security Leaders;Aug2005, Vol. 42 Issue 8, p24
Trade Publication
Focuses on the development of optical turnstile systems. Ability of the system to utilize the technology in a variety of applications; Availability of optical turnstile with retractable glass barriers; Importance of the system's development for security management. INSET: Entrance Technology Gets Fancy.


Related Articles

  • Products.  // Government Security;May2005, Vol. 4 Issue 4, p62 

    Features various security systems. Safe path lighting; MicroSearch's Human Presence Detection System; Wireless drive-alert systems; Access control system; Traffic communication center system; Wireless video surveillance; Common access card program; Multi-technology reader.

  • System Solutions For Design Process. Wicks, Sean // Security: Solutions for Enterprise Security Leaders;May2004, Vol. 41 Issue 5, p30 

    Comments on the system solutions for design process in the U.S. Importance of understanding the specific application requirements of an access control system's electronics; Security systems offered by access control system manufacturers; Flexibility of server-based systems.

  • Controlling Access. Niedholdt, Dan; Lomb, Robert // Consulting-Specifying Engineer;Jul2005, Vol. 38 Issue 1, p57 

    The article reports that there are a variety of access-control credential technologies available on the market today. These credentials employ an encoding, which is transmitted to a security system via contact or contactless operation. There are a variety of advantages, disadvantages and general...

  • Locked…But Is It Secure? Ahrens, Sean A. // Government Security;Jun/Jul2007, Vol. 6 Issue 3, p16 

    The article discusses potential threats to building security caused by the practice of "lock bumping." Lock bumping allows anyone to access keyed locks with a minimum of skill and costs. A discussion of how lock bumping is done, as well as suggestions for maintaining a building's security system...

  • 9 TRENDS IN PRODUCT DISTRIBUTION. Engebretson, Joan // SDM: Security Distributing & Marketing;Jul2006, Vol. 36 Issue 7, p85 

    The article focuses on trends in the distribution of access control products in the U.S. More security system dealers are now handling access control. There is a rise of a recurring revenue model for access control. There is also a need for greater product training. Greater dealer loyalty is...

  • Making the Cut. Turek, Joe // Security: Solutions for Enterprise Security Leaders;May2005, Vol. 42 Issue 5, p36 

    Discusses the importance of biometric devices in security firms, government agencies and other companies in the U.S. Need of access control to protect sensitive areas or data; Invention of new anti-terrorist measures including the recording of biometric information at ports to a country;...

  • Secure homes. Atlas, Randall // Futurist;Mar/Apr88, Vol. 22 Issue 2, p25 

    Discusses future home security measures and devices. Description basic defensible-space strategies, including natural access control, natural surveillance and territorial reinforcement; Current high-technology security systems, including the Kurzweil Voice System, which uses voice recognition...

  • The Walls Have Ears. Schneiderman, R. M.; Yeebo, Yepoka // Newsweek (Pacific Edition);7/25/2005-8/1/2005 (Pacific Edition), Vol. 146 Issue 4/5, p69 

    Focuses on voice-activated devices for the home. Improvement in reliability of such products; Limitations of this technology; Difficulty of learning various commands for different tasks; Description of the devices that Tom Pirelli has installed in his home.

  • Demand for office security systems high. Archer, Rick // Westchester County Business Journal;1/17/2005, Vol. 44 Issue 3, p29 

    Reports on the high-demand for new office security technologies among building owners after the terrorist attacks in the U.S. Cost of services security systems; Installation of biometric system systems which use physical traits to confirm identity and allow access; Cost-effectiveness of...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics