SlideShare a Scribd company logo
1 of 6
Download to read offline
INTEGRATED SYSTEM FOR
SERVICE MANAGEMENT, SAFETY
AND ACCESS CONTROL.
NEIL
 LAND ARMSTRO
DATE ING: 02:5 NG
               6
WEAR : 21.07.19 UTC
     ING: S    69 U
            PACE    TC
                 SUIT
1. SIMSA                                            4. THE SYSTEM

SIMSA IS THE FIRST INTEGRATED SOLUTION FOR          TAG RF-ID:
ACCESS CONTROL, SERVICE MANAGEMENT AND SAFETY       ON THE WORK ORDER: USER OBTAINS DATA FOR
ENFORCEMENT IN INDUSTRIAL ENVIRONMENTS.             THE OPERATION AND THE SPECIFIC SAFETY TOOLS
                                                    REQUIRED ON SAFETY TOOLS: THE SYSTEM IDENTIFIES
2. WORKPLACE SAFETY                                 THE SAFETY TOOLS WORN AND CHECK THEM AGAINST
                                                    A LIST OF SAFETY TOOLS REQUIRED
ALL OVER THE WORLD SAFETY LAWS PROVIDE FOR          ON MACHINERIES: THE SYSTEM IDENTIFIES THE
SOME EMPLOYER’S DUTIES. SIMSA CAN BE USED IN THIS   EQUIPMENT AND LOGS THE PRESENCE OF THE WORKER
SPECIFIC CONTEXT ALLOWING TO:                       ON IT.
  ONL QUALIFIED ( FULLY EQUIPED AND TRAINED )
      Y
  STAFF CAN ENTER INTO HIGH RISK AREAS.             READING DEVICE:
  COMPLY WITH COMPANY RULES ABOUT HEAL        TH,   NOKIA 6212 (OR THE NEW 6216) CELL PHONE INCLUDES
  SAFETY AND USE OF SAFETY TOOLS.                   A NFC MODULE TO EXCHANGE NFC DATA. THE TERMINAL
  NOTIFY QUICKLY THE WORKERS OF IMMEDIATE           IS CHEAPER THAN MOST INDUSTRIAL DEVICES AND HAS
  DANGER AND SHOW HOW TO RESOLVE THE PROBLEM.       A USER FRIENDL INTERFACE ( ALSO VOCAL ).
                                                                   Y
THE ADOPTION OF SIMSA LETS COMPANIES TO SAVE
THEIR MONEY (DEPENDING ON NATIONAL LAWS).           SOFTWARE PLATFORM :
                                                    THIS PLATFORM CAN EXCHANGE DATA WITH THE
3. INTEGRATION                                      EXISTING I T - INFRASTRUCTURE , NOKIA 6212 DEVICES
                                                    AND COMPANY’S ACCESS CONTROL GATES.
THE DATA LOGGED BY SIMSA ( ACCESS TIME, START
AND FINISH OF SERVICE EVENT, EQUIPEMENT WORN ),     5. BACK-END CONNECTION
COULD BE SENT TO A TROUBLE TICKETING SYSTEM, TO
A CMMS OR TO THE HR SYSTEM.                         THE CELL PHONE CAN SEND/RECIVE DATA THROUGH:




                 NEIL ARMST                         6. DEVICE INTERACTIONS
                             R
                 LANDING: 0 ONG
                            2:56 UTC
                 DATE: 20.0                           vocal guide
                            7.1969 UTC
                 WEARING: S                           reading/writing rfid
                            PACESUIT                  cell phone menu
PHASE                      THE OPERATOR                            THE SYSTEM




      BUILDING           OPENS GATES BY NEARING HIS CELL
                                                                 LOGS ACCESS TIME INFORMATIONS
      ACCESS                 PHONE TO THE NFC DEVICE



                                                                     LOGS THE WORK ORDER
                        GETS THE WORK ORDER ON THE CELL           ACCEPTANCE AND SENDS THE
      SERVICE
                        PHONE VIA NFC, DATA CONNECTION OR      OPERATOR ALL SAFETY INFORMATIONS
       EVENT
                                    BLUETOOTH                   (SAFETY INSTRUCTIONS AND TOOLS)
                                                                      THROUGH THE PHONE.



                         IS REQUIRED TO CHECK HIS SAFETY         CHECKS THE SAFETY TOOL READ
    COLLECTING
                          TOOLS BY READING THEM WITH HIS           (VIA NFC) AGAINST SPECIFIC
   SAFETY TOOLS
                                 NFC CELL PHONE                         REQUIREMENTS




                               TRIES TO OPEN GATES                   OPENS GATES ONL IF
                                                                                    Y
 ACCESS TO SPECIFIC
                            BY NEARING HIS CELL PHONE              ALL SAFETY AND SECURITY
       AREA
                                TO THE NFC DEVICE.                REQUIREMENTS ARE SATISFIED




STARTING THE SERVICE   STARTS THE JOB BY NEARING HIS CELL
                                                                LOGS TIME AND OPERATOR’S DATA
       EVENT           PHONE TO A SPECIFIC RF-ID “START” TAG



CLOSING THE SERVICE     CLOSE THE JOB BY NEARING HIS CELL
                                                                LOGS TIME AND OPERATOR’S DATA
       EVENT            PHONE TO A SPECIFIC RF-ID “END” TAG
SAFETY
THE RIGHT AND WELL
INFORMED MAN,
ON TIME ON THE
RIGHT MACHINERY.

                         MAINTENANCE MANAGEMENT
                         FULL SERVICE EVENTS
                         MONITORING WITH SAFETY
                         INFORMATIONS




  ACCESS CONTROL
  ACCESS GRANTED ONLY
  TO TRAINED OPERATORS    SIMSA
  FOR A SAFE AND          INTEGRATED SYSTEM
  SPECIFIC JOB.           FOR SERVICE MANAGEMENT,
                          SAFETY AND ACCESS
                          CONTROL.
INFO@MYTI.IT
MARKETING@LOGITAGTECH.IT

More Related Content

What's hot

2. design and implementation of pyroelectric infrared
2. design and implementation of pyroelectric infrared2. design and implementation of pyroelectric infrared
2. design and implementation of pyroelectric infraredGuddety Srikanth
 
Gsm based home automation using avr
Gsm based home automation using avrGsm based home automation using avr
Gsm based home automation using avrPadmakar Mangrule
 
SenseTek Stratos Micra 25 installers handbook
SenseTek Stratos Micra 25 installers handbookSenseTek Stratos Micra 25 installers handbook
SenseTek Stratos Micra 25 installers handbookHans Bronkhorst
 
Risk & Emergency Management
Risk & Emergency ManagementRisk & Emergency Management
Risk & Emergency ManagementDoug McTighe
 
Kit495 alexor panel
Kit495 alexor panelKit495 alexor panel
Kit495 alexor panelMaxpromotion
 
METROCOM PRPD PRESENTATION BROCHURE
METROCOM PRPD PRESENTATION BROCHUREMETROCOM PRPD PRESENTATION BROCHURE
METROCOM PRPD PRESENTATION BROCHURELarry Gould
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksIcomm Technologies
 
Pir and gsm based house security system
Pir and gsm based house security systemPir and gsm based house security system
Pir and gsm based house security systemKhadarbaba Shaik
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammerharrynik
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Pavan Kumar B S
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & SecurityForgeRock
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkJessilinPercis
 
car security dial up
car security dial upcar security dial up
car security dial upsaurbhsngh
 
Ambient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiAmbient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiWithTheBest
 

What's hot (19)

2. design and implementation of pyroelectric infrared
2. design and implementation of pyroelectric infrared2. design and implementation of pyroelectric infrared
2. design and implementation of pyroelectric infrared
 
Gsm based home automation using avr
Gsm based home automation using avrGsm based home automation using avr
Gsm based home automation using avr
 
SenseTek Stratos Micra 25 installers handbook
SenseTek Stratos Micra 25 installers handbookSenseTek Stratos Micra 25 installers handbook
SenseTek Stratos Micra 25 installers handbook
 
nfc
nfcnfc
nfc
 
Ppt
PptPpt
Ppt
 
Risk & Emergency Management
Risk & Emergency ManagementRisk & Emergency Management
Risk & Emergency Management
 
Kit495 alexor panel
Kit495 alexor panelKit495 alexor panel
Kit495 alexor panel
 
METROCOM PRPD PRESENTATION BROCHURE
METROCOM PRPD PRESENTATION BROCHUREMETROCOM PRPD PRESENTATION BROCHURE
METROCOM PRPD PRESENTATION BROCHURE
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
Pir and gsm based house security system
Pir and gsm based house security systemPir and gsm based house security system
Pir and gsm based house security system
 
Elm wifi
Elm wifiElm wifi
Elm wifi
 
BigWP Security Keys
BigWP Security KeysBigWP Security Keys
BigWP Security Keys
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & Security
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
car security dial up
car security dial upcar security dial up
car security dial up
 
Ambient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiAmbient Intelligence - Parham Beheshti
Ambient Intelligence - Parham Beheshti
 

Viewers also liked

ADV 1/2012 - Sommario della rivista
ADV 1/2012 - Sommario della rivista ADV 1/2012 - Sommario della rivista
ADV 1/2012 - Sommario della rivista TVN Media group
 
Location based services - Non è solo una questione di Lat e Lng
Location based services - Non è solo una questione di Lat e LngLocation based services - Non è solo una questione di Lat e Lng
Location based services - Non è solo una questione di Lat e LngFabio Lalli
 
Confronto fra web services framework (open source)
Confronto fra web services framework (open source)Confronto fra web services framework (open source)
Confronto fra web services framework (open source)Alberto Lagna
 
Noleggio Auto a Lungo Termine - Focus sulle auto di lusso
Noleggio Auto a  Lungo Termine - Focus sulle auto di lussoNoleggio Auto a  Lungo Termine - Focus sulle auto di lusso
Noleggio Auto a Lungo Termine - Focus sulle auto di lussoConsulting & Promotion
 
Marketing dei servizi
Marketing dei servizi Marketing dei servizi
Marketing dei servizi Lidia Marongiu
 
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMSPROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMSProQuest
 
Presentacion internet
Presentacion internetPresentacion internet
Presentacion internetcarlosydavid3
 
Astrea Web Agency Napoli
Astrea Web Agency NapoliAstrea Web Agency Napoli
Astrea Web Agency Napoliastreagency
 
Flipped digital classroom
Flipped digital classroomFlipped digital classroom
Flipped digital classroomLaura Antichi
 
IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...
IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...
IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...Audiweb
 
Digital Coach | Brochure
Digital Coach | BrochureDigital Coach | Brochure
Digital Coach | BrochureLuca Papa
 
Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016
Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016
Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016BTO Educational
 
Corso di Digital PR al Master in Social Media e Web di IULM Milano
Corso di Digital PR al Master in Social Media e Web di IULM MilanoCorso di Digital PR al Master in Social Media e Web di IULM Milano
Corso di Digital PR al Master in Social Media e Web di IULM MilanoGianluca Diegoli
 
le PMI nell'era dell'industry 4.0 - Digital Transformation
le PMI nell'era dell'industry 4.0 - Digital Transformationle PMI nell'era dell'industry 4.0 - Digital Transformation
le PMI nell'era dell'industry 4.0 - Digital TransformationRossana Turi
 
Digital Transformation: costruire organizzazioni orientate al cliente
Digital Transformation: costruire organizzazioni orientate al clienteDigital Transformation: costruire organizzazioni orientate al cliente
Digital Transformation: costruire organizzazioni orientate al clienteAlvaro Busetti
 

Viewers also liked (20)

ADV 1/2012 - Sommario della rivista
ADV 1/2012 - Sommario della rivista ADV 1/2012 - Sommario della rivista
ADV 1/2012 - Sommario della rivista
 
Location based services - Non è solo una questione di Lat e Lng
Location based services - Non è solo una questione di Lat e LngLocation based services - Non è solo una questione di Lat e Lng
Location based services - Non è solo una questione di Lat e Lng
 
Confronto fra web services framework (open source)
Confronto fra web services framework (open source)Confronto fra web services framework (open source)
Confronto fra web services framework (open source)
 
Noleggio Auto a Lungo Termine - Focus sulle auto di lusso
Noleggio Auto a  Lungo Termine - Focus sulle auto di lussoNoleggio Auto a  Lungo Termine - Focus sulle auto di lusso
Noleggio Auto a Lungo Termine - Focus sulle auto di lusso
 
Digital pr
Digital prDigital pr
Digital pr
 
Marketing dei servizi
Marketing dei servizi Marketing dei servizi
Marketing dei servizi
 
DEL Executive Program in - Digital Transformation & Innovation
DEL Executive Program in - Digital Transformation & InnovationDEL Executive Program in - Digital Transformation & Innovation
DEL Executive Program in - Digital Transformation & Innovation
 
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMSPROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
 
Presentacion internet
Presentacion internetPresentacion internet
Presentacion internet
 
Astrea Web Agency Napoli
Astrea Web Agency NapoliAstrea Web Agency Napoli
Astrea Web Agency Napoli
 
Folleto pisa-2015
Folleto pisa-2015Folleto pisa-2015
Folleto pisa-2015
 
Location Based Marketing
Location Based MarketingLocation Based Marketing
Location Based Marketing
 
Flipped digital classroom
Flipped digital classroomFlipped digital classroom
Flipped digital classroom
 
IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...
IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...
IAB Forum 2013 - Total digital audience: come cambia il consumo dell'online t...
 
Digital Coach | Brochure
Digital Coach | BrochureDigital Coach | Brochure
Digital Coach | Brochure
 
Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016
Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016
Contactlab | Dal sogno al viaggio al passo con i digital traveller | BTO 2016
 
Service_iOmando_ENG 2
Service_iOmando_ENG 2Service_iOmando_ENG 2
Service_iOmando_ENG 2
 
Corso di Digital PR al Master in Social Media e Web di IULM Milano
Corso di Digital PR al Master in Social Media e Web di IULM MilanoCorso di Digital PR al Master in Social Media e Web di IULM Milano
Corso di Digital PR al Master in Social Media e Web di IULM Milano
 
le PMI nell'era dell'industry 4.0 - Digital Transformation
le PMI nell'era dell'industry 4.0 - Digital Transformationle PMI nell'era dell'industry 4.0 - Digital Transformation
le PMI nell'era dell'industry 4.0 - Digital Transformation
 
Digital Transformation: costruire organizzazioni orientate al cliente
Digital Transformation: costruire organizzazioni orientate al clienteDigital Transformation: costruire organizzazioni orientate al cliente
Digital Transformation: costruire organizzazioni orientate al cliente
 

Similar to Brochure Simsa Eng

Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Underwriters Laboratories
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for SmartphoneEditor IJMTER
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxadolphoyonker
 
(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013STO STRATEGY
 
actuator device configuration by NFC
actuator device configuration by NFCactuator device configuration by NFC
actuator device configuration by NFCSandeep P M
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guideSigfox
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
Near field communication
Near field communicationNear field communication
Near field communicationBindu U
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013STO STRATEGY
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013STO STRATEGY
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013STO STRATEGY
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)Aditya Singh
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsAnkit Gupta
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsAnkit Gupta
 
AUTONOMOUS NFC ACCESS CONTROL
AUTONOMOUS NFC ACCESS CONTROLAUTONOMOUS NFC ACCESS CONTROL
AUTONOMOUS NFC ACCESS CONTROLCNRFID
 
Axiros tr069-smartmicrogrid-devicemanagement
Axiros tr069-smartmicrogrid-devicemanagementAxiros tr069-smartmicrogrid-devicemanagement
Axiros tr069-smartmicrogrid-devicemanagementAxiros
 
Air defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAir defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAdvantec Distribution
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSIJNSA Journal
 

Similar to Brochure Simsa Eng (20)

Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for Smartphone
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013
 
actuator device configuration by NFC
actuator device configuration by NFCactuator device configuration by NFC
actuator device configuration by NFC
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013
 
Ad enterprise datasheet
Ad enterprise datasheetAd enterprise datasheet
Ad enterprise datasheet
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
 
AUTONOMOUS NFC ACCESS CONTROL
AUTONOMOUS NFC ACCESS CONTROLAUTONOMOUS NFC ACCESS CONTROL
AUTONOMOUS NFC ACCESS CONTROL
 
Axiros tr069-smartmicrogrid-devicemanagement
Axiros tr069-smartmicrogrid-devicemanagementAxiros tr069-smartmicrogrid-devicemanagement
Axiros tr069-smartmicrogrid-devicemanagement
 
Air defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAir defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheet
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
 

More from Myti S.r.l.

Myti CloudRM - Cloud Remote Monitor 2015
Myti CloudRM - Cloud Remote Monitor 2015Myti CloudRM - Cloud Remote Monitor 2015
Myti CloudRM - Cloud Remote Monitor 2015Myti S.r.l.
 
Myti Su Brescia Oggi 6 febbraio 2014
Myti Su Brescia Oggi 6 febbraio 2014Myti Su Brescia Oggi 6 febbraio 2014
Myti Su Brescia Oggi 6 febbraio 2014Myti S.r.l.
 
Presentazione skill itinere
Presentazione skill itinerePresentazione skill itinere
Presentazione skill itinereMyti S.r.l.
 
DINAL Ingrosso Tablet APP
DINAL Ingrosso Tablet APPDINAL Ingrosso Tablet APP
DINAL Ingrosso Tablet APPMyti S.r.l.
 
Gefran Gf Project Brochure
Gefran Gf Project BrochureGefran Gf Project Brochure
Gefran Gf Project BrochureMyti S.r.l.
 
No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013
No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013
No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013Myti S.r.l.
 
Bleen - Tutto comincia da una ricerca
Bleen - Tutto comincia da una ricercaBleen - Tutto comincia da una ricerca
Bleen - Tutto comincia da una ricercaMyti S.r.l.
 
Il documentale più usato al mondo
Il documentale più usato al mondoIl documentale più usato al mondo
Il documentale più usato al mondoMyti S.r.l.
 
Bleen- Integrazione sistemi
Bleen- Integrazione sistemiBleen- Integrazione sistemi
Bleen- Integrazione sistemiMyti S.r.l.
 
Quale è il documentale più usato al mondo?
Quale è il documentale più usato al mondo?Quale è il documentale più usato al mondo?
Quale è il documentale più usato al mondo?Myti S.r.l.
 
Whymca nfc presentation
Whymca nfc presentationWhymca nfc presentation
Whymca nfc presentationMyti S.r.l.
 
Whymca nfc presentation
Whymca nfc presentationWhymca nfc presentation
Whymca nfc presentationMyti S.r.l.
 
WEBdeBS NFC Presentation
WEBdeBS NFC PresentationWEBdeBS NFC Presentation
WEBdeBS NFC PresentationMyti S.r.l.
 
GTUG NFC Presentation
GTUG NFC PresentationGTUG NFC Presentation
GTUG NFC PresentationMyti S.r.l.
 
Bleen architecture
Bleen architectureBleen architecture
Bleen architectureMyti S.r.l.
 

More from Myti S.r.l. (18)

Myti CloudRM - Cloud Remote Monitor 2015
Myti CloudRM - Cloud Remote Monitor 2015Myti CloudRM - Cloud Remote Monitor 2015
Myti CloudRM - Cloud Remote Monitor 2015
 
Myti Su Brescia Oggi 6 febbraio 2014
Myti Su Brescia Oggi 6 febbraio 2014Myti Su Brescia Oggi 6 febbraio 2014
Myti Su Brescia Oggi 6 febbraio 2014
 
Bleen manuale
Bleen manualeBleen manuale
Bleen manuale
 
Presentazione skill itinere
Presentazione skill itinerePresentazione skill itinere
Presentazione skill itinere
 
Bleen CH Leali
Bleen   CH LealiBleen   CH Leali
Bleen CH Leali
 
DINAL Ingrosso Tablet APP
DINAL Ingrosso Tablet APPDINAL Ingrosso Tablet APP
DINAL Ingrosso Tablet APP
 
Gefran Gf Project Brochure
Gefran Gf Project BrochureGefran Gf Project Brochure
Gefran Gf Project Brochure
 
No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013
No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013
No sql introduzione. Corso Sistemi Informativi Politecnico di Milano 12-11-2013
 
Bleen - Tutto comincia da una ricerca
Bleen - Tutto comincia da una ricercaBleen - Tutto comincia da una ricerca
Bleen - Tutto comincia da una ricerca
 
Il documentale più usato al mondo
Il documentale più usato al mondoIl documentale più usato al mondo
Il documentale più usato al mondo
 
Bleen- Integrazione sistemi
Bleen- Integrazione sistemiBleen- Integrazione sistemi
Bleen- Integrazione sistemi
 
Quale è il documentale più usato al mondo?
Quale è il documentale più usato al mondo?Quale è il documentale più usato al mondo?
Quale è il documentale più usato al mondo?
 
Whymca nfc presentation
Whymca nfc presentationWhymca nfc presentation
Whymca nfc presentation
 
Whymca nfc presentation
Whymca nfc presentationWhymca nfc presentation
Whymca nfc presentation
 
WEBdeBS NFC Presentation
WEBdeBS NFC PresentationWEBdeBS NFC Presentation
WEBdeBS NFC Presentation
 
GTUG NFC Presentation
GTUG NFC PresentationGTUG NFC Presentation
GTUG NFC Presentation
 
Bleen architecture
Bleen architectureBleen architecture
Bleen architecture
 
Bleen Short
Bleen ShortBleen Short
Bleen Short
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Brochure Simsa Eng

  • 1. INTEGRATED SYSTEM FOR SERVICE MANAGEMENT, SAFETY AND ACCESS CONTROL.
  • 2. NEIL LAND ARMSTRO DATE ING: 02:5 NG 6 WEAR : 21.07.19 UTC ING: S 69 U PACE TC SUIT
  • 3. 1. SIMSA 4. THE SYSTEM SIMSA IS THE FIRST INTEGRATED SOLUTION FOR TAG RF-ID: ACCESS CONTROL, SERVICE MANAGEMENT AND SAFETY ON THE WORK ORDER: USER OBTAINS DATA FOR ENFORCEMENT IN INDUSTRIAL ENVIRONMENTS. THE OPERATION AND THE SPECIFIC SAFETY TOOLS REQUIRED ON SAFETY TOOLS: THE SYSTEM IDENTIFIES 2. WORKPLACE SAFETY THE SAFETY TOOLS WORN AND CHECK THEM AGAINST A LIST OF SAFETY TOOLS REQUIRED ALL OVER THE WORLD SAFETY LAWS PROVIDE FOR ON MACHINERIES: THE SYSTEM IDENTIFIES THE SOME EMPLOYER’S DUTIES. SIMSA CAN BE USED IN THIS EQUIPMENT AND LOGS THE PRESENCE OF THE WORKER SPECIFIC CONTEXT ALLOWING TO: ON IT. ONL QUALIFIED ( FULLY EQUIPED AND TRAINED ) Y STAFF CAN ENTER INTO HIGH RISK AREAS. READING DEVICE: COMPLY WITH COMPANY RULES ABOUT HEAL TH, NOKIA 6212 (OR THE NEW 6216) CELL PHONE INCLUDES SAFETY AND USE OF SAFETY TOOLS. A NFC MODULE TO EXCHANGE NFC DATA. THE TERMINAL NOTIFY QUICKLY THE WORKERS OF IMMEDIATE IS CHEAPER THAN MOST INDUSTRIAL DEVICES AND HAS DANGER AND SHOW HOW TO RESOLVE THE PROBLEM. A USER FRIENDL INTERFACE ( ALSO VOCAL ). Y THE ADOPTION OF SIMSA LETS COMPANIES TO SAVE THEIR MONEY (DEPENDING ON NATIONAL LAWS). SOFTWARE PLATFORM : THIS PLATFORM CAN EXCHANGE DATA WITH THE 3. INTEGRATION EXISTING I T - INFRASTRUCTURE , NOKIA 6212 DEVICES AND COMPANY’S ACCESS CONTROL GATES. THE DATA LOGGED BY SIMSA ( ACCESS TIME, START AND FINISH OF SERVICE EVENT, EQUIPEMENT WORN ), 5. BACK-END CONNECTION COULD BE SENT TO A TROUBLE TICKETING SYSTEM, TO A CMMS OR TO THE HR SYSTEM. THE CELL PHONE CAN SEND/RECIVE DATA THROUGH: NEIL ARMST 6. DEVICE INTERACTIONS R LANDING: 0 ONG 2:56 UTC DATE: 20.0 vocal guide 7.1969 UTC WEARING: S reading/writing rfid PACESUIT cell phone menu
  • 4. PHASE THE OPERATOR THE SYSTEM BUILDING OPENS GATES BY NEARING HIS CELL LOGS ACCESS TIME INFORMATIONS ACCESS PHONE TO THE NFC DEVICE LOGS THE WORK ORDER GETS THE WORK ORDER ON THE CELL ACCEPTANCE AND SENDS THE SERVICE PHONE VIA NFC, DATA CONNECTION OR OPERATOR ALL SAFETY INFORMATIONS EVENT BLUETOOTH (SAFETY INSTRUCTIONS AND TOOLS) THROUGH THE PHONE. IS REQUIRED TO CHECK HIS SAFETY CHECKS THE SAFETY TOOL READ COLLECTING TOOLS BY READING THEM WITH HIS (VIA NFC) AGAINST SPECIFIC SAFETY TOOLS NFC CELL PHONE REQUIREMENTS TRIES TO OPEN GATES OPENS GATES ONL IF Y ACCESS TO SPECIFIC BY NEARING HIS CELL PHONE ALL SAFETY AND SECURITY AREA TO THE NFC DEVICE. REQUIREMENTS ARE SATISFIED STARTING THE SERVICE STARTS THE JOB BY NEARING HIS CELL LOGS TIME AND OPERATOR’S DATA EVENT PHONE TO A SPECIFIC RF-ID “START” TAG CLOSING THE SERVICE CLOSE THE JOB BY NEARING HIS CELL LOGS TIME AND OPERATOR’S DATA EVENT PHONE TO A SPECIFIC RF-ID “END” TAG
  • 5. SAFETY THE RIGHT AND WELL INFORMED MAN, ON TIME ON THE RIGHT MACHINERY. MAINTENANCE MANAGEMENT FULL SERVICE EVENTS MONITORING WITH SAFETY INFORMATIONS ACCESS CONTROL ACCESS GRANTED ONLY TO TRAINED OPERATORS SIMSA FOR A SAFE AND INTEGRATED SYSTEM SPECIFIC JOB. FOR SERVICE MANAGEMENT, SAFETY AND ACCESS CONTROL.