Mechanical digital locks - Expert commentary

Building the networks for the next wave of connected devices
Building the networks for the next wave of connected devices

The Internet of Things is growing quickly. It has moved far beyond a few smart gadgets at home. Today, connected technology is in homes, factories, hospitals, farms, and cities. Ex...

Elevators - 14 considerations for RFID Reader selection
Elevators - 14 considerations for RFID Reader selection

RFID and emerging mobile access technologies are easy to implement and allow elevator access to be integrated with other access control solutions throughout the building, from buil...

Customisation considerations for embedded system RFID readers
Customisation considerations for embedded system RFID readers

With increasing security and public health concerns, contactless credentials are gaining more and more importance. Contactless credentials can be divided into two main categories:...

Latest TDSi news

What is the most overlooked factor when installing security systems?
What is the most overlooked factor when installing security systems?

Installing physical security systems requires integrating diverse technologies (e.g., cameras, access control, alarms) that often use different protocols and must be adapted to a b...

How should security adapt to the unique aspects of healthcare?
How should security adapt to the unique aspects of healthcare?

The healthcare industry faces unique and significant security challenges. Healthcare security professionals must balance an open, welcoming environment for patients and visitors wi...

TDSi releases GARDiS Pro Software update V3.1
TDSi releases GARDiS Pro Software update V3.1

Integrated access control and security manufacturer - TDSi has announced the release of GARDiS Pro Version 3.1, the latest enhanced iteration of its GARDiS Access Control Managemen...

Related white papers

The critical role of access control in K-12 school security

Wireless Access Control eBook

How plate reader technology increases your perimeter security