Skip to main content

Home/ IT architecture/ Group items tagged and

Rss Feed Group items tagged

Manish Shah

Biometric Face Recognition System - Face Recognition Now and Then - 0 views

  •  
    Biometrics is in existence from very early times. Fingerprints were used as a non-counterfeited mark since 500 BC. Babylonian merchants used it to straighten out business transactions. The undertakings were recorded in clay tablets that also contained fingerprints. Footprints were also used to distinguish children. Early Egyptians differentiated between traders by their physical attributes. Inked fingerprints of children were taken for identification purpose by Chinese merchants during the 14th century.
Manish Shah

Visitor Management System: Installation Operation Maintenance - 0 views

  •  
    Gone are the days of primitive visitor management! Electronic devices for visitor management are the need of the day. Areas with a large number of visitors adopt visitor management system to keep a track of the people checking in and out of the building. Schools use the system to prevent crime against children. Highly secured government offices install this device to control unauthorized access to sensitive data.
Manish Shah

Face Recognition - An Identification Technique - 0 views

  •  
    Biometrics parameters like face, eye cornea, fingerprints or many other parts of human body are used for identification purpose in many security systems or agencies. These biometrics parameters for each and every person have own unique properties.
Manish Shah

Visitor Management System: Installation Operation Maintenance - 0 views

  •  
    Gone are the days of primitive visitor management! Electronic devices for visitor management are the need of the day. Areas with a large number of visitors adopt visitor management system to keep a track of the people checking in and out of the building. Schools use the system to prevent crime against children.
Jacques Bosch

Pranav Mistry: The thrilling potential of SixthSense technology | Video on TED.com - 0 views

  •  
    "At TEDIndia, Pranav Mistry demos several tools that help the physical world interact with the world of data -- including a deep look at his SixthSense device and a new, paradigm-shifting paper "laptop." In an onstage Q&A, Mistry says he'll open-source the software behind SixthSense, to open its possibilities to all."
John Pol

Help With Windows Update for Windows XP/Vista - 0 views

  •  
    Microsoft had launched its series of Windows Operating Systems; it had also released various Windows Updates for all the operating systems along with Microsoft help. Under Microsoft Support it provides complete Windows Help to fix the bugs and issues in t
John Pol

Importance of Internet Security for Businesses - 0 views

  •  
    Internet has come up as an excellent source of marketing for businesses; be it small sized or large sized. This allows them to sell their products and services. This has pushed a fierce competition among online vendors. Good Internet connection is very re
anonymous

Information Architecture Institute > IA Network - Information Architecture Institute - 0 views

  •  
    The Information Architecture Institute is a growing network of active IA specialists. The main goal of our online IA Network is to provide IAs worldwide the opportunity to find local IA networks, meet other IAs, share knowledge and collaborate on projects that move our industry forward.
John Pol

Technical Support Services Professionals Can Be Your Rescue Partner - 0 views

  •  
    What if someday you just woke up and find all your computer files vanished away? Everybody who has been using computers for quite sometime may have encountered numerous pesky errors like blue screen of death. Whether the problem includes software or hard
John Pol

How to Do Spyware Removal - 0 views

  •  
    Computer spyware and adware seem to be taking over computers everywhere these days, but there are some good measures that you can follow to help your computers be at bay from such dangerous malware. Let's throw some light on definitions of these pesky sof
John Pol

Computer Support Services at a Glance - 0 views

  •  
    If you are also a tech or computer enthusiast, you must have experienced technical problems at one point or other. And, it could be no surprise if you have spent hours or money over the phone with your friends to search for a way to resolve all those pesk
John Pol

Computer Repair Help and Support Services - 0 views

  •  
    Avail computer support over the phone or through remote session. Online computer repair resources attend your computer problems on the same-day, so you need not miss your office to have your work done. Just ring to any good online computer repair service
anonymous

Architectures orientées Services (SOA) - 0 views

  •  
    Architecture styles and architecture pattern
anonymous

IBM Redbooks | Patterns for the Edge of Network - 0 views

  •  
    Network and security patterns from ibm redbook
anonymous

Software Architecture - 0 views

  •  
    Software architecture links to documentation related to: System Architecture description Software Architecture Review and Assessment 4+1 view model of software architecture
anonymous

Software Architecture for Software-Intensive Systems - 0 views

  •  
    Software architecture. To learn about the SEI's proven methods and techniques
anonymous

Model-view-controller - Wikipedia, the free encyclopedia - 0 views

  •  
    Model-view-controller (MVC) is both a design pattern and an architectural pattern used in software engineering
anonymous

Viewpoints and Perspectives - Library - 0 views

  •  
    This page contains download links for various documents we've written to support the book. The documents have been gathered into groups according to their type.
John Pol

When It's All About Your Computer Security - 0 views

  •  
    You will never want to compromise on your computer security as it is something you always find yourself concerned about. Well! This requires you to be meticulous about two things: Computer Virus and Safety against computer hackers. Although there are sev
anonymous

Architecture, a definition - 0 views

  •  
    Architecture definition, goals and focus. From an enterprise architecture to technology. Agile architecture.
« First ‹ Previous 81 - 100 of 169 Next › Last »
Showing 20 items per page