SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
INTEGRATED SYSTEM FOR
SERVICE MANAGEMENT, SAFETY
AND ACCESS CONTROL.
NEIL
 LAND ARMSTRO
DATE ING: 02:5 NG
               6
WEAR : 21.07.19 UTC
     ING: S    69 U
            PACE    TC
                 SUIT
1. SIMSA                                            4. THE SYSTEM

SIMSA IS THE FIRST INTEGRATED SOLUTION FOR          TAG RF-ID:
ACCESS CONTROL, SERVICE MANAGEMENT AND SAFETY       ON THE WORK ORDER: USER OBTAINS DATA FOR
ENFORCEMENT IN INDUSTRIAL ENVIRONMENTS.             THE OPERATION AND THE SPECIFIC SAFETY TOOLS
                                                    REQUIRED ON SAFETY TOOLS: THE SYSTEM IDENTIFIES
2. WORKPLACE SAFETY                                 THE SAFETY TOOLS WORN AND CHECK THEM AGAINST
                                                    A LIST OF SAFETY TOOLS REQUIRED
ALL OVER THE WORLD SAFETY LAWS PROVIDE FOR          ON MACHINERIES: THE SYSTEM IDENTIFIES THE
SOME EMPLOYER’S DUTIES. SIMSA CAN BE USED IN THIS   EQUIPMENT AND LOGS THE PRESENCE OF THE WORKER
SPECIFIC CONTEXT ALLOWING TO:                       ON IT.
  ONL QUALIFIED ( FULLY EQUIPED AND TRAINED )
      Y
  STAFF CAN ENTER INTO HIGH RISK AREAS.             READING DEVICE:
  COMPLY WITH COMPANY RULES ABOUT HEAL        TH,   NOKIA 6212 (OR THE NEW 6216) CELL PHONE INCLUDES
  SAFETY AND USE OF SAFETY TOOLS.                   A NFC MODULE TO EXCHANGE NFC DATA. THE TERMINAL
  NOTIFY QUICKLY THE WORKERS OF IMMEDIATE           IS CHEAPER THAN MOST INDUSTRIAL DEVICES AND HAS
  DANGER AND SHOW HOW TO RESOLVE THE PROBLEM.       A USER FRIENDL INTERFACE ( ALSO VOCAL ).
                                                                   Y
THE ADOPTION OF SIMSA LETS COMPANIES TO SAVE
THEIR MONEY (DEPENDING ON NATIONAL LAWS).           SOFTWARE PLATFORM :
                                                    THIS PLATFORM CAN EXCHANGE DATA WITH THE
3. INTEGRATION                                      EXISTING I T - INFRASTRUCTURE , NOKIA 6212 DEVICES
                                                    AND COMPANY’S ACCESS CONTROL GATES.
THE DATA LOGGED BY SIMSA ( ACCESS TIME, START
AND FINISH OF SERVICE EVENT, EQUIPEMENT WORN ),     5. BACK-END CONNECTION
COULD BE SENT TO A TROUBLE TICKETING SYSTEM, TO
A CMMS OR TO THE HR SYSTEM.                         THE CELL PHONE CAN SEND/RECIVE DATA THROUGH:




                 NEIL ARMST                         6. DEVICE INTERACTIONS
                             R
                 LANDING: 0 ONG
                            2:56 UTC
                 DATE: 20.0                           vocal guide
                            7.1969 UTC
                 WEARING: S                           reading/writing rfid
                            PACESUIT                  cell phone menu
PHASE                      THE OPERATOR                            THE SYSTEM




      BUILDING           OPENS GATES BY NEARING HIS CELL
                                                                 LOGS ACCESS TIME INFORMATIONS
      ACCESS                 PHONE TO THE NFC DEVICE



                                                                     LOGS THE WORK ORDER
                        GETS THE WORK ORDER ON THE CELL           ACCEPTANCE AND SENDS THE
      SERVICE
                        PHONE VIA NFC, DATA CONNECTION OR      OPERATOR ALL SAFETY INFORMATIONS
       EVENT
                                    BLUETOOTH                   (SAFETY INSTRUCTIONS AND TOOLS)
                                                                      THROUGH THE PHONE.



                         IS REQUIRED TO CHECK HIS SAFETY         CHECKS THE SAFETY TOOL READ
    COLLECTING
                          TOOLS BY READING THEM WITH HIS           (VIA NFC) AGAINST SPECIFIC
   SAFETY TOOLS
                                 NFC CELL PHONE                         REQUIREMENTS




                               TRIES TO OPEN GATES                   OPENS GATES ONL IF
                                                                                    Y
 ACCESS TO SPECIFIC
                            BY NEARING HIS CELL PHONE              ALL SAFETY AND SECURITY
       AREA
                                TO THE NFC DEVICE.                REQUIREMENTS ARE SATISFIED




STARTING THE SERVICE   STARTS THE JOB BY NEARING HIS CELL
                                                                LOGS TIME AND OPERATOR’S DATA
       EVENT           PHONE TO A SPECIFIC RF-ID “START” TAG



CLOSING THE SERVICE     CLOSE THE JOB BY NEARING HIS CELL
                                                                LOGS TIME AND OPERATOR’S DATA
       EVENT            PHONE TO A SPECIFIC RF-ID “END” TAG
SAFETY
THE RIGHT AND WELL
INFORMED MAN,
ON TIME ON THE
RIGHT MACHINERY.

                         MAINTENANCE MANAGEMENT
                         FULL SERVICE EVENTS
                         MONITORING WITH SAFETY
                         INFORMATIONS




  ACCESS CONTROL
  ACCESS GRANTED ONLY
  TO TRAINED OPERATORS    SIMSA
  FOR A SAFE AND          INTEGRATED SYSTEM
  SPECIFIC JOB.           FOR SERVICE MANAGEMENT,
                          SAFETY AND ACCESS
                          CONTROL.
INFO@MYTI.IT
MARKETING@LOGITAGTECH.IT

Mais conteúdo relacionado

Mais procurados

2. design and implementation of pyroelectric infrared
2. design and implementation of pyroelectric infrared2. design and implementation of pyroelectric infrared
2. design and implementation of pyroelectric infraredGuddety Srikanth
 
Gsm based home automation using avr
Gsm based home automation using avrGsm based home automation using avr
Gsm based home automation using avrPadmakar Mangrule
 
SenseTek Stratos Micra 25 installers handbook
SenseTek Stratos Micra 25 installers handbookSenseTek Stratos Micra 25 installers handbook
SenseTek Stratos Micra 25 installers handbookHans Bronkhorst
 
Risk & Emergency Management
Risk & Emergency ManagementRisk & Emergency Management
Risk & Emergency ManagementDoug McTighe
 
Kit495 alexor panel
Kit495 alexor panelKit495 alexor panel
Kit495 alexor panelMaxpromotion
 
METROCOM PRPD PRESENTATION BROCHURE
METROCOM PRPD PRESENTATION BROCHUREMETROCOM PRPD PRESENTATION BROCHURE
METROCOM PRPD PRESENTATION BROCHURELarry Gould
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksIcomm Technologies
 
Pir and gsm based house security system
Pir and gsm based house security systemPir and gsm based house security system
Pir and gsm based house security systemKhadarbaba Shaik
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammerharrynik
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Pavan Kumar B S
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & SecurityForgeRock
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkJessilinPercis
 
car security dial up
car security dial upcar security dial up
car security dial upsaurbhsngh
 
Ambient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiAmbient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiWithTheBest
 

Mais procurados (19)

2. design and implementation of pyroelectric infrared
2. design and implementation of pyroelectric infrared2. design and implementation of pyroelectric infrared
2. design and implementation of pyroelectric infrared
 
Gsm based home automation using avr
Gsm based home automation using avrGsm based home automation using avr
Gsm based home automation using avr
 
SenseTek Stratos Micra 25 installers handbook
SenseTek Stratos Micra 25 installers handbookSenseTek Stratos Micra 25 installers handbook
SenseTek Stratos Micra 25 installers handbook
 
nfc
nfcnfc
nfc
 
Ppt
PptPpt
Ppt
 
Risk & Emergency Management
Risk & Emergency ManagementRisk & Emergency Management
Risk & Emergency Management
 
Kit495 alexor panel
Kit495 alexor panelKit495 alexor panel
Kit495 alexor panel
 
METROCOM PRPD PRESENTATION BROCHURE
METROCOM PRPD PRESENTATION BROCHUREMETROCOM PRPD PRESENTATION BROCHURE
METROCOM PRPD PRESENTATION BROCHURE
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
Pir and gsm based house security system
Pir and gsm based house security systemPir and gsm based house security system
Pir and gsm based house security system
 
Elm wifi
Elm wifiElm wifi
Elm wifi
 
BigWP Security Keys
BigWP Security KeysBigWP Security Keys
BigWP Security Keys
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & Security
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
car security dial up
car security dial upcar security dial up
car security dial up
 
Ambient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiAmbient Intelligence - Parham Beheshti
Ambient Intelligence - Parham Beheshti
 

Destaque

ADV 1/2012 - Sommario della rivista
ADV 1/2012 - Sommario della rivista ADV 1/2012 - Sommario della rivista
ADV 1/2012 - Sommario della rivista TVN Media group
 
Location based services - Non è solo una questione di Lat e Lng
Location based services - Non è solo una questione di Lat e LngLocation based services - Non è solo una questione di Lat e Lng
Location based services - Non è solo una questione di Lat e LngFabio Lalli
 
Confronto fra web services framework (open source)
Confronto fra web services framework (open source)Confronto fra web services framework (open source)
Confronto fra web services framework (open source)Alberto Lagna
 
Noleggio Auto a Lungo Termine - Focus sulle auto di lusso
Noleggio Auto a  Lungo Termine - Focus sulle auto di lussoNoleggio Auto a  Lungo Termine - Focus sulle auto di lusso
Noleggio Auto a Lungo Termine - Focus sulle auto di lussoConsulting & Promotion
 
Marketing dei servizi
Marketing dei servizi Marketing dei servizi
Marketing dei servizi Lidia Marongiu
 
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMSPROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMSProQuest
 
Presentacion internet
Presentacion internetPresentacion internet
Presentacion internetcarlosydavid3
 
Astrea Web Agency Napoli
Astrea Web Agency NapoliAstrea Web Agency Napoli
Astrea Web Agency Napoliastreagency
 
Flipped digital classroom
Flipped digital classroomFlipped digital classroom
Flipped digital classroomLaura Antichi
 
IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...
IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...
IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...Audiweb
 
Digital Coach | Brochure
Digital Coach | BrochureDigital Coach | Brochure
Digital Coach | BrochureLuca Papa
 
Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016
Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016
Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016BTO Educational
 
Corso di Digital PR al Master in Social Media e Web di IULM Milano
Corso di Digital PR al Master in Social Media e Web di IULM MilanoCorso di Digital PR al Master in Social Media e Web di IULM Milano
Corso di Digital PR al Master in Social Media e Web di IULM MilanoGianluca Diegoli
 
le PMI nell'era dell'industry 4.0 - Digital Transformation
le PMI nell'era dell'industry 4.0 - Digital Transformationle PMI nell'era dell'industry 4.0 - Digital Transformation
le PMI nell'era dell'industry 4.0 - Digital TransformationRossana Turi
 
Digital Transformation: costruire organizzazioni orientate al cliente
Digital Transformation: costruire organizzazioni orientate al clienteDigital Transformation: costruire organizzazioni orientate al cliente
Digital Transformation: costruire organizzazioni orientate al clienteAlvaro Busetti
 

Destaque (20)

ADV 1/2012 - Sommario della rivista
ADV 1/2012 - Sommario della rivista ADV 1/2012 - Sommario della rivista
ADV 1/2012 - Sommario della rivista
 
Location based services - Non è solo una questione di Lat e Lng
Location based services - Non è solo una questione di Lat e LngLocation based services - Non è solo una questione di Lat e Lng
Location based services - Non è solo una questione di Lat e Lng
 
Confronto fra web services framework (open source)
Confronto fra web services framework (open source)Confronto fra web services framework (open source)
Confronto fra web services framework (open source)
 
Noleggio Auto a Lungo Termine - Focus sulle auto di lusso
Noleggio Auto a  Lungo Termine - Focus sulle auto di lussoNoleggio Auto a  Lungo Termine - Focus sulle auto di lusso
Noleggio Auto a Lungo Termine - Focus sulle auto di lusso
 
Digital pr
Digital prDigital pr
Digital pr
 
Marketing dei servizi
Marketing dei servizi Marketing dei servizi
Marketing dei servizi
 
DEL Executive Program in - Digital Transformation & Innovation
DEL Executive Program in - Digital Transformation & InnovationDEL Executive Program in - Digital Transformation & Innovation
DEL Executive Program in - Digital Transformation & Innovation
 
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMSPROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
 
Presentacion internet
Presentacion internetPresentacion internet
Presentacion internet
 
Astrea Web Agency Napoli
Astrea Web Agency NapoliAstrea Web Agency Napoli
Astrea Web Agency Napoli
 
Folleto pisa-2015
Folleto pisa-2015Folleto pisa-2015
Folleto pisa-2015
 
Location Based Marketing
Location Based MarketingLocation Based Marketing
Location Based Marketing
 
Flipped digital classroom
Flipped digital classroomFlipped digital classroom
Flipped digital classroom
 
IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...
IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...
IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...
 
Digital Coach | Brochure
Digital Coach | BrochureDigital Coach | Brochure
Digital Coach | Brochure
 
Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016
Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016
Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016
 
Service_iOmando_ENG 2
Service_iOmando_ENG 2Service_iOmando_ENG 2
Service_iOmando_ENG 2
 
Corso di Digital PR al Master in Social Media e Web di IULM Milano
Corso di Digital PR al Master in Social Media e Web di IULM MilanoCorso di Digital PR al Master in Social Media e Web di IULM Milano
Corso di Digital PR al Master in Social Media e Web di IULM Milano
 
le PMI nell'era dell'industry 4.0 - Digital Transformation
le PMI nell'era dell'industry 4.0 - Digital Transformationle PMI nell'era dell'industry 4.0 - Digital Transformation
le PMI nell'era dell'industry 4.0 - Digital Transformation
 
Digital Transformation: costruire organizzazioni orientate al cliente
Digital Transformation: costruire organizzazioni orientate al clienteDigital Transformation: costruire organizzazioni orientate al cliente
Digital Transformation: costruire organizzazioni orientate al cliente
 

Semelhante a Brochure Simsa Eng

Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Underwriters Laboratories
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for SmartphoneEditor IJMTER
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxadolphoyonker
 
(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013STO STRATEGY
 
actuator device configuration by NFC
actuator device configuration by NFCactuator device configuration by NFC
actuator device configuration by NFCSandeep P M
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guideSigfox
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
Near field communication
Near field communicationNear field communication
Near field communicationBindu U
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013STO STRATEGY
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013STO STRATEGY
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013STO STRATEGY
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)Aditya Singh
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsAnkit Gupta
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsAnkit Gupta
 
AUTONOMOUS NFC ACCESS CONTROL
AUTONOMOUS NFC ACCESS CONTROLAUTONOMOUS NFC ACCESS CONTROL
AUTONOMOUS NFC ACCESS CONTROLCNRFID
 
Axiros tr069-smartmicrogrid-devicemanagement
Axiros tr069-smartmicrogrid-devicemanagementAxiros tr069-smartmicrogrid-devicemanagement
Axiros tr069-smartmicrogrid-devicemanagementAxiros
 
Air defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAir defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAdvantec Distribution
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSIJNSA Journal
 

Semelhante a Brochure Simsa Eng (20)

Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for Smartphone
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013
 
actuator device configuration by NFC
actuator device configuration by NFCactuator device configuration by NFC
actuator device configuration by NFC
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013
 
Ad enterprise datasheet
Ad enterprise datasheetAd enterprise datasheet
Ad enterprise datasheet
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
 
AUTONOMOUS NFC ACCESS CONTROL
AUTONOMOUS NFC ACCESS CONTROLAUTONOMOUS NFC ACCESS CONTROL
AUTONOMOUS NFC ACCESS CONTROL
 
Axiros tr069-smartmicrogrid-devicemanagement
Axiros tr069-smartmicrogrid-devicemanagementAxiros tr069-smartmicrogrid-devicemanagement
Axiros tr069-smartmicrogrid-devicemanagement
 
Air defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAir defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheet
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
 

Mais de Myti S.r.l.

Myti CloudRM - Cloud Remote Monitor 2015
Myti CloudRM - Cloud Remote Monitor 2015Myti CloudRM - Cloud Remote Monitor 2015
Myti CloudRM - Cloud Remote Monitor 2015Myti S.r.l.
 
Myti Su Brescia Oggi 6 febbraio 2014
Myti Su Brescia Oggi 6 febbraio 2014Myti Su Brescia Oggi 6 febbraio 2014
Myti Su Brescia Oggi 6 febbraio 2014Myti S.r.l.
 
Presentazione skill itinere
Presentazione skill itinerePresentazione skill itinere
Presentazione skill itinereMyti S.r.l.
 
DINAL Ingrosso Tablet APP
DINAL Ingrosso Tablet APPDINAL Ingrosso Tablet APP
DINAL Ingrosso Tablet APPMyti S.r.l.
 
Gefran Gf Project Brochure
Gefran Gf Project BrochureGefran Gf Project Brochure
Gefran Gf Project BrochureMyti S.r.l.
 
No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013
No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013
No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013Myti S.r.l.
 
Bleen - Tutto comincia da una ricerca
Bleen - Tutto comincia da una ricercaBleen - Tutto comincia da una ricerca
Bleen - Tutto comincia da una ricercaMyti S.r.l.
 
Il documentale più usato al mondo
Il documentale più usato al mondoIl documentale più usato al mondo
Il documentale più usato al mondoMyti S.r.l.
 
Bleen- Integrazione sistemi
Bleen- Integrazione sistemiBleen- Integrazione sistemi
Bleen- Integrazione sistemiMyti S.r.l.
 
Quale è il documentale più usato al mondo?
Quale è il documentale più usato al mondo?Quale è il documentale più usato al mondo?
Quale è il documentale più usato al mondo?Myti S.r.l.
 
Whymca nfc presentation
Whymca nfc presentationWhymca nfc presentation
Whymca nfc presentationMyti S.r.l.
 
Whymca nfc presentation
Whymca nfc presentationWhymca nfc presentation
Whymca nfc presentationMyti S.r.l.
 
WEBdeBS NFC Presentation
WEBdeBS NFC PresentationWEBdeBS NFC Presentation
WEBdeBS NFC PresentationMyti S.r.l.
 
GTUG NFC Presentation
GTUG NFC PresentationGTUG NFC Presentation
GTUG NFC PresentationMyti S.r.l.
 
Bleen architecture
Bleen architectureBleen architecture
Bleen architectureMyti S.r.l.
 

Mais de Myti S.r.l. (18)

Myti CloudRM - Cloud Remote Monitor 2015
Myti CloudRM - Cloud Remote Monitor 2015Myti CloudRM - Cloud Remote Monitor 2015
Myti CloudRM - Cloud Remote Monitor 2015
 
Myti Su Brescia Oggi 6 febbraio 2014
Myti Su Brescia Oggi 6 febbraio 2014Myti Su Brescia Oggi 6 febbraio 2014
Myti Su Brescia Oggi 6 febbraio 2014
 
Bleen manuale
Bleen manualeBleen manuale
Bleen manuale
 
Presentazione skill itinere
Presentazione skill itinerePresentazione skill itinere
Presentazione skill itinere
 
Bleen CH Leali
Bleen   CH LealiBleen   CH Leali
Bleen CH Leali
 
DINAL Ingrosso Tablet APP
DINAL Ingrosso Tablet APPDINAL Ingrosso Tablet APP
DINAL Ingrosso Tablet APP
 
Gefran Gf Project Brochure
Gefran Gf Project BrochureGefran Gf Project Brochure
Gefran Gf Project Brochure
 
No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013
No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013
No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013
 
Bleen - Tutto comincia da una ricerca
Bleen - Tutto comincia da una ricercaBleen - Tutto comincia da una ricerca
Bleen - Tutto comincia da una ricerca
 
Il documentale più usato al mondo
Il documentale più usato al mondoIl documentale più usato al mondo
Il documentale più usato al mondo
 
Bleen- Integrazione sistemi
Bleen- Integrazione sistemiBleen- Integrazione sistemi
Bleen- Integrazione sistemi
 
Quale è il documentale più usato al mondo?
Quale è il documentale più usato al mondo?Quale è il documentale più usato al mondo?
Quale è il documentale più usato al mondo?
 
Whymca nfc presentation
Whymca nfc presentationWhymca nfc presentation
Whymca nfc presentation
 
Whymca nfc presentation
Whymca nfc presentationWhymca nfc presentation
Whymca nfc presentation
 
WEBdeBS NFC Presentation
WEBdeBS NFC PresentationWEBdeBS NFC Presentation
WEBdeBS NFC Presentation
 
GTUG NFC Presentation
GTUG NFC PresentationGTUG NFC Presentation
GTUG NFC Presentation
 
Bleen architecture
Bleen architectureBleen architecture
Bleen architecture
 
Bleen Short
Bleen ShortBleen Short
Bleen Short
 

Último

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Brochure Simsa Eng

  • 1. INTEGRATED SYSTEM FOR SERVICE MANAGEMENT, SAFETY AND ACCESS CONTROL.
  • 2. NEIL LAND ARMSTRO DATE ING: 02:5 NG 6 WEAR : 21.07.19 UTC ING: S 69 U PACE TC SUIT
  • 3. 1. SIMSA 4. THE SYSTEM SIMSA IS THE FIRST INTEGRATED SOLUTION FOR TAG RF-ID: ACCESS CONTROL, SERVICE MANAGEMENT AND SAFETY ON THE WORK ORDER: USER OBTAINS DATA FOR ENFORCEMENT IN INDUSTRIAL ENVIRONMENTS. THE OPERATION AND THE SPECIFIC SAFETY TOOLS REQUIRED ON SAFETY TOOLS: THE SYSTEM IDENTIFIES 2. WORKPLACE SAFETY THE SAFETY TOOLS WORN AND CHECK THEM AGAINST A LIST OF SAFETY TOOLS REQUIRED ALL OVER THE WORLD SAFETY LAWS PROVIDE FOR ON MACHINERIES: THE SYSTEM IDENTIFIES THE SOME EMPLOYER’S DUTIES. SIMSA CAN BE USED IN THIS EQUIPMENT AND LOGS THE PRESENCE OF THE WORKER SPECIFIC CONTEXT ALLOWING TO: ON IT. ONL QUALIFIED ( FULLY EQUIPED AND TRAINED ) Y STAFF CAN ENTER INTO HIGH RISK AREAS. READING DEVICE: COMPLY WITH COMPANY RULES ABOUT HEAL TH, NOKIA 6212 (OR THE NEW 6216) CELL PHONE INCLUDES SAFETY AND USE OF SAFETY TOOLS. A NFC MODULE TO EXCHANGE NFC DATA. THE TERMINAL NOTIFY QUICKLY THE WORKERS OF IMMEDIATE IS CHEAPER THAN MOST INDUSTRIAL DEVICES AND HAS DANGER AND SHOW HOW TO RESOLVE THE PROBLEM. A USER FRIENDL INTERFACE ( ALSO VOCAL ). Y THE ADOPTION OF SIMSA LETS COMPANIES TO SAVE THEIR MONEY (DEPENDING ON NATIONAL LAWS). SOFTWARE PLATFORM : THIS PLATFORM CAN EXCHANGE DATA WITH THE 3. INTEGRATION EXISTING I T - INFRASTRUCTURE , NOKIA 6212 DEVICES AND COMPANY’S ACCESS CONTROL GATES. THE DATA LOGGED BY SIMSA ( ACCESS TIME, START AND FINISH OF SERVICE EVENT, EQUIPEMENT WORN ), 5. BACK-END CONNECTION COULD BE SENT TO A TROUBLE TICKETING SYSTEM, TO A CMMS OR TO THE HR SYSTEM. THE CELL PHONE CAN SEND/RECIVE DATA THROUGH: NEIL ARMST 6. DEVICE INTERACTIONS R LANDING: 0 ONG 2:56 UTC DATE: 20.0 vocal guide 7.1969 UTC WEARING: S reading/writing rfid PACESUIT cell phone menu
  • 4. PHASE THE OPERATOR THE SYSTEM BUILDING OPENS GATES BY NEARING HIS CELL LOGS ACCESS TIME INFORMATIONS ACCESS PHONE TO THE NFC DEVICE LOGS THE WORK ORDER GETS THE WORK ORDER ON THE CELL ACCEPTANCE AND SENDS THE SERVICE PHONE VIA NFC, DATA CONNECTION OR OPERATOR ALL SAFETY INFORMATIONS EVENT BLUETOOTH (SAFETY INSTRUCTIONS AND TOOLS) THROUGH THE PHONE. IS REQUIRED TO CHECK HIS SAFETY CHECKS THE SAFETY TOOL READ COLLECTING TOOLS BY READING THEM WITH HIS (VIA NFC) AGAINST SPECIFIC SAFETY TOOLS NFC CELL PHONE REQUIREMENTS TRIES TO OPEN GATES OPENS GATES ONL IF Y ACCESS TO SPECIFIC BY NEARING HIS CELL PHONE ALL SAFETY AND SECURITY AREA TO THE NFC DEVICE. REQUIREMENTS ARE SATISFIED STARTING THE SERVICE STARTS THE JOB BY NEARING HIS CELL LOGS TIME AND OPERATOR’S DATA EVENT PHONE TO A SPECIFIC RF-ID “START” TAG CLOSING THE SERVICE CLOSE THE JOB BY NEARING HIS CELL LOGS TIME AND OPERATOR’S DATA EVENT PHONE TO A SPECIFIC RF-ID “END” TAG
  • 5. SAFETY THE RIGHT AND WELL INFORMED MAN, ON TIME ON THE RIGHT MACHINERY. MAINTENANCE MANAGEMENT FULL SERVICE EVENTS MONITORING WITH SAFETY INFORMATIONS ACCESS CONTROL ACCESS GRANTED ONLY TO TRAINED OPERATORS SIMSA FOR A SAFE AND INTEGRATED SYSTEM SPECIFIC JOB. FOR SERVICE MANAGEMENT, SAFETY AND ACCESS CONTROL.