X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 biometric identification


Identix Leads Biometric Authentication
Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the

biometric identification  Windows 2000 and features biometric identification and authentication, BIOS level security, single sign-on and multi-factor security. A pioneer in identification technology, and a worldwide provider of Biometric authentication, Identix was founded in 1982, by then engineer Randy Fowler. Mr. Fowler has been credited with being the person to first patent image capture devices used for authentication purposes making Identix the original pioneer in fingerprint scanning technology. Retiring as CEO this year,

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Evaluate Now

Documents related to » biometric identification

PKI and Biometrics Ready for Take-Off


Expect the new e-signature law to bolster both the PKI and biometric markets. This new law allows documents signed through digital signatures to have the same legal ramifications as documents signed in traditional wet-ink.

biometric identification   Read More

Authenteon Enterprise Server


BioLink's Authenteon Enterprise Server is a high-speed biometric identification search system with a linked credential repository for up to 5,000 people. The Authenteon Enterprise Server is a plug-n-play appliance that integrates into new and existing networks, applications, and systems.

biometric identification   Read More

Time Tracking and Attendance Primer: Beyond the Clock


Punch clocks, clock card machines, Bundy clocks, time recorders. Most organizations are opting for newer methods to track their employees’ time and attendance. Today’s time tracking technology is not just about capturing hours—it’s about where those hours are allocated and how productive they are. TEC analyst Sherry Fox reviews some of the key features of current time tracking software and highlights some popular vendors.

biometric identification   Read More

BioLink Technologies International


BioLink Technologies International, Inc., develops, manufactures, and markets fingerprint biometric products. The company's solutions form the core of biometric authentication solutions for logical access, which includes computers, networks, and Web-based resources; physical access; and large-scale civil identification and law enforcement applications. BioLink's suite of products use its proprietary fingerprint scanning, image processing, and one-to-many identification server technology. BioLink Technologies is based in Miramar, Florida (US).

biometric identification   Read More

RFID Technology: Changing Business Dramatically, Today and Tomorrow


The move to radio frequency identification (RFID) integration may result in high costs, arising from the need to maintain multiple interfaces between RFID and other enterprise systems. This means implementing a software architecture that encompasses current and future technology, combined with a data architecture that enables you to manage massive amounts of data at a low total cost of ownership.

biometric identification   Read More

Beyond the Tag: Finding RFID Value in Manufacturing and Distribution Applications


Radio frequency identification (RFID) has been around for more than thirty years, and today’s manufacturers are using this technology to help connect trading partners and align supply chains. But just as businesses need to look beyond the manufacturing supply chain to see the benefits of investing in RFID, they need to look beyond the tag to understand how RFID will create value and provide a return on investment (ROI).

biometric identification   Read More

Customer Relationship Management Strategies Part Three: Achieving and Maintaining the Competitive Edge


Developing the competitive edge involves information gathering and communicating. Using a continuous feedback loop that incorporates sales, service, and customer satisfaction, will help you realize the benefits of a CRM system.

biometric identification   Read More

How to Transform Your Operations Today with the Technology of the Future


Radio frequency identification (RFID) is the most rapidly growing segment in today's automatic identification industry. The creation of the Auto-ID Electronic Product Code (EPC) Standard coupled with affordable RFID tag costs, and Wal-Mart's mandated adoption of the standard for all its suppliers, will drive rapid deployment. Learn how RFID will evolve as the cost and capability of deploying the system becomes more operationally feasible and economical, and of the benefits it will bring.

biometric identification   Read More

Ivara SUPREAM/EXP


Ivara SUPREAM includes functionality in the areas of asset management, work planning and scheduling, spare parts inventory management, purchasing, and receiving. It also supports features such as asset criticality and risk assessment, asset condition monitoring and performance analysis, work identification and asset maintenance program development, performance metrics identification, and monitoring. Ivara EXP is a single application that incorporates predictive- and condition-based maintenance capabilities to monitor asset conditions and maintain targets. It collects information from on-line sources, predictive maintenance technologies, visual (and other sensory) information and stores, displays, analyzes, and manages asset conditions and information. Ivara EXP displays this information as graphs, inquiries, flashing alarms, on-line or as paper reports.  

biometric identification   Read More

RFID Implementation: Moving Forward through the Four Phases


Implementation of a radio frequency identification system is best approached in four phases to ensure its success. Discussed here are the second and third phases, which deal with testing and validation, and the importance of setting up a pilot implementation.

biometric identification   Read More