Solved

UK suppliers of Biometric devices (fingerprint scanners) with IP connectivity

Posted on 2004-03-23
2
319 Views
Last Modified: 2010-04-26
We are looking for a UK source of basic units for a biometric "Timecard" type device, for allowing the logging of worker`s time in and out of a building.
The device would ideally be addressable over the internet, so would need a NIC and an operating system on flash ram, preferably running an embedded OS, possibly Linux.
I have found a couple of systems, but wonder if there are any I have missed.
Any comments on the software/hardware would be appreciated
0
Comment
Question by:wyliecoyoteuk
2 Comments
 
LVL 3

Accepted Solution

by:
middenface earned 100 total points
ID: 10667979
there are a lot of links to biometric companies in the UK in this site
hope this helps
http://www.afb.org.uk/docs/members.htm
0
 
LVL 21

Author Comment

by:wyliecoyoteuk
ID: 10848573
middenface, sorry I took so long accepting your answer, have been on holiday (and no Internet on wife`s orders while away) :)
The site yielded one very promising contact, Hectrix.
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This is about my first experience with programming Arduino.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

789 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question