Skip to main content

Home/ IT architecture/ Group items tagged in

Rss Feed Group items tagged

Manish Shah

Visitor Management System enhances Safety from Strangers - 1 views

  •  
    Do you know that your fellow visitor's visiting at your place can also be dangerous under various circumstances! So, you should be alerted in any case. But the question is 'how'? How can you protect your premises from unwanted visitors? Are you sure that the place where you are living or working is fully protected? Well!
Manish Shah

Complete Security Solution with Face Recognition System - 0 views

  •  
    In the era of global security threats, we found atmosphere with full of risk both internally and externally. Every organization or individual wants to improve their existing security system. Most of the people need better security system which gives complete security solution.
Manish Shah

Visitor Management System: Installation Operation Maintenance - 0 views

  •  
    Gone are the days of primitive visitor management! Electronic devices for visitor management are the need of the day. Areas with a large number of visitors adopt visitor management system to keep a track of the people checking in and out of the building. Schools use the system to prevent crime against children. Highly secured government offices install this device to control unauthorized access to sensitive data.
Manish Shah

Face Recognition - An Identification Technique - 0 views

  •  
    Biometrics parameters like face, eye cornea, fingerprints or many other parts of human body are used for identification purpose in many security systems or agencies. These biometrics parameters for each and every person have own unique properties.
Manish Shah

Biometric Face Detection System - Face Detection Is a Reliable Technology - 0 views

  •  
    Facial recognition is emerging as the most successful biometric application in use. However, controversies also revolve around the security solution. There have been incidents of biometric face detection systems, not being able to identify correct faces. Not-so-often failures of the device to perform gave rise to debates.
Manish Shah

Visitor Management System: Installation Operation Maintenance - 0 views

  •  
    Gone are the days of primitive visitor management! Electronic devices for visitor management are the need of the day. Areas with a large number of visitors adopt visitor management system to keep a track of the people checking in and out of the building. Schools use the system to prevent crime against children.
Jacques Bosch

Pranav Mistry: The thrilling potential of SixthSense technology | Video on TED.com - 0 views

  •  
    "At TEDIndia, Pranav Mistry demos several tools that help the physical world interact with the world of data -- including a deep look at his SixthSense device and a new, paradigm-shifting paper "laptop." In an onstage Q&A, Mistry says he'll open-source the software behind SixthSense, to open its possibilities to all."
Manish Shah

Face Detection for Identity Verification Is Better than the Rest in the market - 0 views

  •  
    Biometrics has captured the world with a storm! Enhanced security is a promise with this technology. You may forget the conventional means of security. No need to employ human beings for identity verification. It can be done by this system.
Manish Shah

Forget the Conventional Lock and Key and Shift to Biometric Access Control - 1 views

  •  
    Are you among the people who lock your door with a hard metal lock and carry the key with you? You constantly worry whether it is still with you or not! If a legitimate element wants to enter the premise, they will have to wait until you return. Hassles involved in this traditional door lock system are immense.
John Pol

Help With Windows Update for Windows XP/Vista - 0 views

  •  
    Microsoft had launched its series of Windows Operating Systems; it had also released various Windows Updates for all the operating systems along with Microsoft help. Under Microsoft Support it provides complete Windows Help to fix the bugs and issues in t
John Pol

What You Should Know About Disk Defragmenter - 0 views

  •  
    The limitation of the operating system does not permit it to incorporate continuity in the process of storing file as a unit, rather it breaks the file and stores on different locations on the Drives. This is rather random approach and the file may be sto
anonymous

openArchitectureWare.org - Official openArchitectureWare Homepage - 0 views

  •  
    openArchitectureWare (oAW) is a modular MDA/MDD generator framework implemented in Java(TM).
anonymous

chattiness impact latency High Latency Sufficient Bandwidth Latency filetype:doc - Rech... - 0 views

  •  
    Overview of the issues that may be faced when trying to achieve the best network performance and Quality of Service possible. Guidelines for the end-users themselves, in order to understand network performance metrics and to get the most from the network they are working on.
John Pol

What You Should Know About Check Disk - 0 views

  •  
    Chkdsk is a tool to check errors on the hard drive and to fix it. It can fix physical errors and also can recover data that is still readable. The use of check disk is best defined in the Microsoft help. Chkdsk can be run from windows, from command prompt
John Pol

Computer support services is a wide gamut of services offering assistance with technolo... - 0 views

  •  
    Computer support services is a wide gamut of services offering assistance with technology products such as mobile phones, televisions, computers, or other electronic or mechanical goods. In general, computer support services attempt to help computer users
John Pol

Why to Buy Online Data Back Up Services - 0 views

  •  
    Whether you use your computer for personal or business use, your data loss can be extremely disastrous in whatever way. Your information is something that you need to keep secure! This is the reason why you should avail regular data backup!
Philipp Arytsok

REST - Der bessere Web Service? || IT-Republik - JAXenter - Artikel - 0 views

  • REST - Der bessere Web Service?
  •  
    Vor nicht all zu langer Zeit schien es völlig klar, dass der Weg für eine interoperable Kommunikation zwischen Anwendungen mit unterschiedlichen Entwicklungszyklen über Web Services führen muss. In letzter Zeit jedoch ist immer häufiger die Rede von einer leichtgewichtigen, einfacheren Alternative: Web Services auf Basis von REST (REpresentational State Transfer).
anonymous

Download details: Infrastructure Planning and Design - 0 views

  •  
    The Infrastructure Planning and Design (IPD) guides are the next version of Windows Server System Reference Architecture. The guides in this series help clarify and streamline design processes for Microsoft infrastructure technologies, with each guide addressing a unique infrastructure technology or scenario.
anonymous

Architecture Principles - 0 views

  •  
    Principles are general rules and guidelines, intended to be enduring and seldom amended, that inform and support the way in which an organization sets about fulfilling its mission.
anonymous

Public-key cryptography - Wikipedia, the free encyclopedia - 0 views

  •  
    Public-key cryptography, also known as asymmetric cryptography, is a form of cryptography in which the key used to encrypt a message differs from the key used to decrypt it.
‹ Previous 21 - 40 of 78 Next › Last »
Showing 20 items per page