<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-3030416821783379757</atom:id><lastBuildDate>Thu, 02 Apr 2026 09:15:43 +0000</lastBuildDate><category>company strategies</category><category>business trends</category><category>corporate culture</category><category>FingerTec USA</category><category>Finger Scanner</category><category>biometric time clocks</category><category>TimeTec Cloud</category><category>FingerTec</category><category>biometric</category><category>fingerprint access control</category><category>employee clock in software</category><category>attendance system</category><category>cloud computing</category><category>fingerprint door lock</category><category>time attendance</category><category>People Power</category><category>TimeTec</category><category>biometric time clock</category><category>biometrics</category><category>fingerprinting</category><category>time and attendance system</category><category>fingerprint scanner</category><category>fingerprint software</category><category>office</category><category>software</category><category>time attendance system</category><category>Ingress</category><category>corporate culture and strategy</category><category>fingerprints</category><category>scanner</category><category>TimeTec Mobile</category><category>cloud computing IS the future</category><category>fingerprint reader software</category><category>fingerprint time clocks</category><category>access control</category><category>attendance automation</category><category>cloud attendance</category><category>exhibition show</category><category>security</category><category>time clock software</category><category>timetec ta</category><category>Attendance</category><category>Cloud solution</category><category>FingerTec USA Channel</category><category>TCMS V2</category><category>fingerprint</category><category>fingerprint door locks</category><category>Afiq&#39;s 5 Ps in FingerTec</category><category>baik cari buku dari jadi tiga suku</category><category>door access</category><category>fingerprint time clock</category><category>ingressus</category><category>workforce management</category><category>Corporate Social Responsibility (CSR)</category><category>Sales and Marketing</category><category>TimeTecTA</category><category>business trend</category><category>fingerprint attendance system</category><category>support</category><category>time clocks</category><category>world history</category><category>Businessmen</category><category>Cloud solutions</category><category>GUI</category><category>TimeTec solutions</category><category>attendance on cloud</category><category>biometri time clocks</category><category>branding</category><category>business model</category><category>cloud based</category><category>door fingerprint lock</category><category>employee time clock software</category><category>facial recognition</category><category>fingerprint scanners</category><category>fingerprint system</category><category>marketing materials</category><category>origin story</category><category>social media</category><category>Corporate Social Responsibility</category><category>Cost Effective Attendance Solution</category><category>SDK</category><category>TimeTec Attendance</category><category>TimeTec Patrol</category><category>affordable time attendance</category><category>appreciating technical support</category><category>best biometrics</category><category>big data</category><category>biometric scanners</category><category>brand</category><category>cheap cloud solutions</category><category>cloud adoption in office</category><category>cloud is the future</category><category>cloud solution for workforce</category><category>corporate strategy</category><category>door fingerprint locks</category><category>entrepreneur</category><category>face id</category><category>new media</category><category>philosophy</category><category>user generated content</category><category>user website</category><category>ACaaS</category><category>Academia by FingerTec</category><category>Access Control as a Service</category><category>Attendance policy</category><category>BLE</category><category>Cheap Attendance Product</category><category>Controllers</category><category>Customer Relationship Management (CRM)</category><category>FTDP</category><category>FingerTec biometrics</category><category>GE13 Malaysia</category><category>Information Technology</category><category>Ingress is the future</category><category>IngressVMS</category><category>Malaysian General Elections 2013</category><category>Microsoft</category><category>NFC technology</category><category>R3</category><category>SDKs</category><category>SEO</category><category>SaaS</category><category>TA500</category><category>TimeTec VMS</category><category>Webinar</category><category>Website</category><category>access controller</category><category>access via smartphone</category><category>always trying to be better for customers</category><category>best attendance solution</category><category>biometric system</category><category>cloud guard tour system</category><category>cloud magazine</category><category>content creation</category><category>database</category><category>don&#39;t just access and accept knowledge but assess it</category><category>easy data management</category><category>epicamera</category><category>face recognition</category><category>face recognition door locks</category><category>fingerprint door access</category><category>fingerprint locks</category><category>fingerprint scanning</category><category>fingerprint timeclocks</category><category>fingertec data processor</category><category>going green is good</category><category>holiday cheers</category><category>human resources</category><category>importance of attendance</category><category>installation help guide</category><category>internet of things</category><category>labor time thieves</category><category>real-time data</category><category>simple</category><category>staff management application</category><category>tcms v3</category><category>time attendance software</category><category>timekeeping software</category><category>timetec access</category><category>visitor management system</category><category>we go way beyond just biometrics</category><category>we&#39;re moving in the right direction</category><category>you can&#39;t fool biometrics</category><category>&#39;sharing&#39; business concepts between corporations helps learning</category><category>&#39;thanking&#39; the government for a &#39;smart&#39; education policy</category><category>3 Idiots discusses the difference between learning for exams or for the sake of learning</category><category>5g</category><category>API</category><category>APIs</category><category>Adult Life</category><category>Android guard tour</category><category>Ansi 378</category><category>Attendance Apps</category><category>Attendance solution</category><category>BLE-2</category><category>BYOD</category><category>Beacon attendance</category><category>Beyond Biometrics Wireless</category><category>Buddy Punching</category><category>CMMI</category><category>Card System</category><category>Careful what you tweet</category><category>Cloud &amp; DevOps</category><category>Cloud SDK</category><category>Cloud-based attendance</category><category>Contact Tracing</category><category>Content is King</category><category>Cubicle World</category><category>Data in FingerTec</category><category>Deliver</category><category>Dissatisfaction</category><category>E-banking</category><category>FCC</category><category>FREE</category><category>FingerTec Authorized Resellers</category><category>FingerTec Cloud Center</category><category>FingerTec Developer Program</category><category>FingerTec OFIS Y</category><category>FingerTec R3</category><category>FingerTec Resources</category><category>FingerTec awesome</category><category>FingerTec controller</category><category>FingerTec door access</category><category>FingerTec support</category><category>FingerTec way</category><category>FingerTec writes</category><category>General Election</category><category>Globalization</category><category>Goodbye</category><category>Green Walk</category><category>Guard Tour</category><category>Guard Tour app</category><category>Handing over</category><category>Health Screening</category><category>I-Neighbour</category><category>ISO-IEC 19794-2</category><category>IngressVMS video</category><category>Internet</category><category>IoT</category><category>Job applicants</category><category>KMS</category><category>Kadex</category><category>Khaleque&#39;s sense of social responsibilities from the streets</category><category>Launching date</category><category>Leading my example</category><category>Leaving a company isn&#39;t easy</category><category>Leaving your job gracefully</category><category>Letter to CEO</category><category>Malaysia</category><category>Merdeka</category><category>My New Year&#39;s Resolutions</category><category>Neil Armstrong quotes</category><category>Netizens</category><category>Offers</category><category>Official Launching</category><category>Payroll</category><category>Peter Pan</category><category>Professor Wang Xuan you will be missed</category><category>Punch Card</category><category>Q2i</category><category>R2</category><category>RIP Steve Jobs</category><category>Ramadan</category><category>Recruitment</category><category>SME business</category><category>Sales promotions</category><category>Software as a Service</category><category>T-box</category><category>TA200 Plus</category><category>Temperature Reading</category><category>Temperature Record</category><category>Time Beacon</category><category>Time thieves</category><category>TimeTec Security</category><category>TimeTec TA beacon</category><category>Twitter</category><category>UGC</category><category>Using Big data in FingerTec</category><category>We make things easy</category><category>World Cup</category><category>access</category><category>access control system</category><category>access via mobile phone</category><category>accurate work time</category><category>advertising</category><category>afiq jauhari</category><category>afiqpg</category><category>aku tulus jalan lurus mahu BERSIH</category><category>always advocating changes from conventional theories</category><category>animation movies</category><category>annual and monthly support</category><category>annual magazine</category><category>appreciating your country more after overseas trips</category><category>arrested for tweet</category><category>art is present in all we do</category><category>artworks</category><category>attendance cheat</category><category>attendance cheating</category><category>attendance data</category><category>attendance flaws</category><category>attendance labor</category><category>attendance on app</category><category>attendance technology</category><category>attendence system</category><category>banking security</category><category>being good means you can write your way out of a ditch</category><category>being like steve jobs without even knowing it</category><category>being prepared means being ready when one thing leads to another</category><category>best biometric time clock</category><category>biometric fingerprint attendance system</category><category>biometric identification</category><category>biometric legality</category><category>biometric scanner</category><category>biometric security</category><category>biometrics cloud</category><category>biometrics for attendance</category><category>biometrics technology</category><category>blog</category><category>bluetooth</category><category>bluetooth low energy</category><category>body parts</category><category>break</category><category>breaks</category><category>build your power from within</category><category>business intelligence</category><category>casual posts</category><category>centralized management</category><category>change attendance system</category><category>charity</category><category>cheap technology</category><category>cheat</category><category>chinese new year 2014</category><category>chopped fingers</category><category>clock in software</category><category>clock through phone</category><category>clock-in system</category><category>cloud Ecosystem</category><category>cloud is good</category><category>cloud solution for leave</category><category>cloud solution for office</category><category>cloud solution in office</category><category>cloud storage</category><category>cloud systems</category><category>cloud technology</category><category>cloud technology solutions</category><category>cloud time attendance</category><category>come together and integrate</category><category>common sense</category><category>complete workforce data</category><category>computer timeclock</category><category>content is everything</category><category>controller</category><category>cool keys</category><category>coronavirus</category><category>covid-19</category><category>customer confidence</category><category>customer satisfaction is basically the basics of what you need to achieve</category><category>cut cost</category><category>data</category><category>data management</category><category>day type</category><category>design</category><category>designing</category><category>different cultures</category><category>dinner breaks</category><category>do not simply be content with compliments</category><category>doing it yourself may be the easiest way to get things done</category><category>door access controller</category><category>door access fingerprint</category><category>door controller</category><category>drinking as a sign of camaraderie</category><category>ecosystem</category><category>education</category><category>employee profile</category><category>employee schedules</category><category>ethics</category><category>face and fingerprint combine</category><category>face biometrics</category><category>face id 2</category><category>face machine</category><category>face recognition is coming so just face it</category><category>face scanners</category><category>facial</category><category>facing uncertainties has been a welcomed challenge</category><category>fingerprint awesoe</category><category>fingerprint biometrics</category><category>fingerprint solution</category><category>fingerprint technology for attendance</category><category>fingerprint time attendance</category><category>fingerprint timeclock</category><category>fingerscanner</category><category>fingertec software</category><category>flexible schedule</category><category>foot technology</category><category>foottec</category><category>fraud</category><category>free time attendance</category><category>genius</category><category>ghost employee</category><category>good joke: you learn two languages because you speak English to colleagues but Chinese to debt-collectors</category><category>guiding people towards The Guidebook</category><category>hard to dance if you&#39;re following someone else&#39;s pace</category><category>have you liked followed or subscribed?</category><category>having deep thoughts in New York</category><category>help and guide</category><category>hi-tech biometric solution</category><category>high price</category><category>history of fingerprinting</category><category>honest attendance</category><category>honesty</category><category>honesty is still the best policy</category><category>hopefully Malaysia won&#39;t try to build another tall one then</category><category>hoping for another challenging and fruitful decade</category><category>hoping for another good year for the FingerTec family</category><category>hoping i&#39;ll never meet the employee who&#39;d chop off a finger for buddy-punching</category><category>housekeeping</category><category>how to manage absenteeism</category><category>how to manage late staff</category><category>how to tackle late staffer</category><category>human resource</category><category>i &#39;lecture&#39; because care</category><category>i don&#39;t mind admitting when i make a mistake</category><category>i guess bruce would say we make things RIGHT</category><category>i hope he gets the message</category><category>i&#39;m touched</category><category>if fingertec is a religion does that make me the pope?</category><category>imagine a machine that recognizes you by face</category><category>independence day</category><category>informal learning</category><category>integration</category><category>internet exploration</category><category>internet life</category><category>internet marketing</category><category>internet sales</category><category>internet world</category><category>it doesn&#39;t feel right to put any labels this time</category><category>it&#39;s easier to talk to someone if you get prior permission</category><category>it&#39;s gotta be destiny</category><category>it&#39;s hard work being this funny</category><category>just like in marriage the small things ARE the big things</category><category>key smartphone</category><category>keys</category><category>knowledge is all encompassing</category><category>knowledge is key</category><category>labor</category><category>labor law</category><category>labor law compliance</category><category>labour</category><category>language should not be a barrier</category><category>law time</category><category>learning</category><category>learning while my wife is shopping</category><category>leave management on cloud</category><category>leave type</category><category>leaves</category><category>let us bear the pain</category><category>link to payroll</category><category>localization</category><category>logo</category><category>low cost</category><category>lunch</category><category>lunches</category><category>making money during good and bad times</category><category>making or breaking your page</category><category>management</category><category>management strategies</category><category>managing compliance</category><category>market research</category><category>marketing</category><category>marketing is not just about selling</category><category>mechanical lock</category><category>microsites</category><category>mid range market</category><category>minimalist</category><category>mobile advertising</category><category>mobile application</category><category>mobile productivity</category><category>mobility</category><category>more than just newsletters</category><category>moving forward</category><category>myth busters</category><category>new access control</category><category>new house</category><category>newspaper</category><category>not everyone&#39;s fingerprints are worth millions</category><category>not putting all our eggs in one basket</category><category>not the customers</category><category>office attendance</category><category>office automation new technology</category><category>online resources</category><category>our designers matter a lot in the company</category><category>our employees are our customers too</category><category>our products sell itself so to speak</category><category>past things make me strive for the future while still in the present</category><category>payroll fraud</category><category>payroll fraud prevention.</category><category>phone training</category><category>pop up message</category><category>popup error messages</category><category>predicament</category><category>prepare salary</category><category>privacy</category><category>protect your intellectual property</category><category>pugs</category><category>quantity or quality</category><category>questions</category><category>reliable attendance company</category><category>resource sharing</category><category>rotational schedule</category><category>scanning fingerprints</category><category>schedule</category><category>scheduling</category><category>school</category><category>security industry</category><category>selling cloud</category><category>she never really left us</category><category>signs we simply won&#39;t go down the drain</category><category>size only matters if it is in the right place</category><category>smart objects</category><category>smart phones</category><category>smartphone</category><category>smartphone access</category><category>smartphone key</category><category>so near yet so far so good</category><category>social justice</category><category>social media marketing</category><category>software makes the hardware</category><category>some numbers can kill a whole country</category><category>sometimes business students only learn fancy names for things people already use</category><category>spend less now or later?</category><category>standard schedule</category><category>still 25 year old at heart</category><category>still a lot of countries to go</category><category>stories from my favorite people</category><category>survey</category><category>technological advancement is making more cities look alike</category><category>technology for office</category><category>technology office</category><category>the best time management</category><category>the knowledge from books is supposed to free you not confine you</category><category>the times they are changing</category><category>there is no forcing required in love</category><category>there is no such thing as a business theory that fits ALL</category><category>there&#39;s more than one way to fish</category><category>this is how we do it</category><category>time and payroll</category><category>time attendance law</category><category>time attendance mobile</category><category>time is definitely of the essence</category><category>time management</category><category>time stealing</category><category>time system</category><category>time track software</category><category>timeclocks</category><category>timetec profile</category><category>training</category><category>transformation</category><category>travels</category><category>troubleshooting</category><category>tsunamis are not funny</category><category>tv</category><category>tweet</category><category>tweets</category><category>understanding your own country more after overseas business trips</category><category>upgrade clock-in software</category><category>value of fingerprints</category><category>video guide</category><category>we are all family</category><category>we&#39;re all in this together</category><category>web based attendance</category><category>web-based services</category><category>what does charity work mean nowadays?</category><category>what&#39;s better than some humor to get the message across?</category><category>when things go wrong we can still make it right</category><category>where else can you find 8 free treasures that you can share?</category><category>where work and play can co-exist</category><category>who knew apple to apple can be very deceiving eh?</category><category>why cloud</category><category>why people cheat attendance</category><category>why prosper at the expense of others?</category><category>words don&#39;t break me</category><category>work life</category><category>work productivity</category><category>working from home</category><category>writing</category><category>writing skills</category><category>year of the wooden horse. fingertec</category><category>you should never stop learning</category><title>FINGERTEC OFFICIAL BLOGSITE</title><description>Beyond Biometrics</description><link>http://www.fingertecblog.com/</link><managingEditor>noreply@blogger.com (FingerTec Worldwide)</managingEditor><generator>Blogger</generator><openSearch:totalResults>399</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-8373330270258849498</guid><pubDate>Tue, 25 Aug 2020 05:58:00 +0000</pubDate><atom:updated>2020-08-27T17:22:38.776+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TimeTec</category><category domain="http://www.blogger.com/atom/ns#">TimeTec Cloud</category><category domain="http://www.blogger.com/atom/ns#">TimeTec solutions</category><category domain="http://www.blogger.com/atom/ns#">timetec ta</category><title>How TimeTec Workforce Solutions Deliver Value by Automation</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;There was a time when employees reported to work by signing on a logbook located at the front desk. The workforce system was non-existence, and employee matters were handled manually.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjv_3ClO-9adnPOCQZ7WJeDBY7kqmk1ZrThUrqysGrUPdduxhV_2E2Ku4fRj6yHXM-TlR9rrTMG0VjrjejwwN_7J9eDtb_s_v7EadPQES-eJMitCsX-JKVYnk2QMLSvy2BftyDcw9e4-QMv/s2048/pexels-andrea-piacquadio-3808904.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2048&quot; data-original-width=&quot;1541&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjv_3ClO-9adnPOCQZ7WJeDBY7kqmk1ZrThUrqysGrUPdduxhV_2E2Ku4fRj6yHXM-TlR9rrTMG0VjrjejwwN_7J9eDtb_s_v7EadPQES-eJMitCsX-JKVYnk2QMLSvy2BftyDcw9e4-QMv/d/pexels-andrea-piacquadio-3808904.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;i&gt;Fast forward to 2020, have things changed for the better?&amp;nbsp;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;For some, change is natural. For some others, it needs a nudge and eventually a push to seek improvements. Surprisingly, there are still many government and private sector organizations that prefer to stick to what they know and manage their business in the &#39;usual&#39; way. In fact, many are still loyal to a punch card system for time and attendance monitoring, using the physical form to submit leave applications, signing in on a logbook for visitor management, and there goes the list continuing...&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;So, it begs the question of why automation should be appealing to the traditionalists? What are the advantages of this change and is the cost justifiable? Those who prefer the old ways might shy away from exploring new ways due to a lack of knowledge and expertise, and some are concerned about the high investment of a new system. It has to be stressed that the old-fashioned way could cost a business a hefty price and a hindrance to its future growth.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Automation in business comes with numerous advantages. It is not merely a buzzword or a trend in business, and it is not limited to the system in the production line, it is also crucial for workforce management. Improvement in the internal process is the key to healthy growth. Businesses have to welcome automation in all aspects with open arms. Amongst the benefits of automation is the reduction of admin work, which translates to a reduction in the work hours, which eventually reduces the overall operating cost as a whole. Besides, automation streamlines communication, it provides greater visibility to the stakeholders, it offers efficient task management, improves operational stability, improves work quality, and increases employee engagement.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;And let&#39;s explore how TimeTec cloud solutions deliver values from automation.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJlaBAFeeUYxHN8nOiuIxaS0lsRxLY-1typurZbz1jsqeCCEiaWKXrmEQFyF8s-IbwnR1kODdlA_1IPk-E5qPFrTqRHPR6cvlo_fWG4uF6yAChQvLhs1bgM98Z0GNXZRj6dxtaHxyfe_4V/s470/other_ttc_solution.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;470&quot; data-original-width=&quot;470&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJlaBAFeeUYxHN8nOiuIxaS0lsRxLY-1typurZbz1jsqeCCEiaWKXrmEQFyF8s-IbwnR1kODdlA_1IPk-E5qPFrTqRHPR6cvlo_fWG4uF6yAChQvLhs1bgM98Z0GNXZRj6dxtaHxyfe_4V/d/other_ttc_solution.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Data Collection&lt;/b&gt; is a massive problem for many organizations, particularly the ones that have multiple branches locally and abroad. How to get all the data in the system uniform and in a reliable manner? TimeTec delivers automation in data collection through the ability to connect to the data collecting tools at various points. For time attendance solution, as an example, TimeTec TA users can report time through biometrics readers and many ways through the App, and all data collected will be available either in the branch and in the headquarters ready for processing. All these tools are connected seamlessly into the system, making it convenient for both users and administrators. For the leave management system, TimeTec Leave, data comes from the App and the web, centralized for the convenience of the superiors and administrators. Ultimately, TimeTec systems make data collection simple and reliable.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Data Settings/Scheduling&lt;/b&gt; for a manual system is a long process because it has to be done, repeatedly, all over again, month in, month out or depending on the cycle. With TimeTec solutions, administrators need to figure out the settings and the schedules at the beginning of the implementation, and they will be applied for all or selected users until some specific amendments are required. Having all settings and schedules done right once reduces a lot of tedious work by the administrator throughout the year. TimeTec solutions offer versatile settings that fit diverse customer requirements.&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div&gt;&lt;b&gt;Data Processing&lt;/b&gt; is another uphill challenge in a manual system. TimeTec solutions offer automatic data processing based on the settings and schedules that have been preset, making the process easier and quicker. Automation in data processing provides the admin with reliable data for payroll and other human resource purposes at any time of day because of data accessibility and centralization. Data in TimeTec solutions are ever ready for the organization to apply.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;b&gt;Report and Analysis.&lt;/b&gt; The report presents the data as is, while analysis is the interpretation of the data for specific purposes. TimeTec provides a variety of both automatically. It saves time, it is reliable, accurate, and presentable.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;There is no &lt;b&gt;Monitoring&lt;/b&gt; in a manual system. If there is, it has to be manually done and impracticable. TimeTec solutions, on the other hand, provide many tools for the management to automatically monitor workforce activities, performance, and productivity. For example, the GPS clocking in TimeTec TA will provide the company with a contract tracing of the whereabouts of the staff during office hours. Plus, TimeTec provides automatic&lt;b&gt; Notifications&lt;/b&gt; on multiple aspects to alert all the parties involved in the updates.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5vGrWi7GVQ1ZTw2r3hiMNl9zhBiW-xq7KQled1eHqNHdyoRLjwDPJ-oc0p7PYp74l9JO0FO40jVS1Y-fvgipYsnUUKUbpP0bcdGLTOJchzKZWLsVIa4NX6xmT82ANyzqombWyNjnLUYLD/s2048/pexels-alexas-fotos-2277784.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1365&quot; data-original-width=&quot;2048&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5vGrWi7GVQ1ZTw2r3hiMNl9zhBiW-xq7KQled1eHqNHdyoRLjwDPJ-oc0p7PYp74l9JO0FO40jVS1Y-fvgipYsnUUKUbpP0bcdGLTOJchzKZWLsVIa4NX6xmT82ANyzqombWyNjnLUYLD/d/pexels-alexas-fotos-2277784.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div&gt;Switching to an automated and digitized system like TimeTec is no longer a question to contemplate by companies in the 21st century. A small investment for this change will bring about a mountain of benefits to the business operation and sustainability in the long run. There is no room for sentimentalism. The manual system is not cost-effective, to say the least. It is time to chuck them out to achieve better productivity, quality, and engagement in your business. At the end of the day, your business requires data that can provide you with ways to save cost, time, and make informed decisions.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;TimeTec solutions are cloud-based workforce solutions designed to deliver more values to your organizations at an affordable and scalable price. Apart from automation, TimeTec solutions provide more values through their varied features and functions. Explore TimeTec solutions at &lt;a href=&quot;http://www.timeteccloud.com&quot;&gt;www.timeteccloud.com&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgplBHUEITJYbJVS4o-kK1J8C0JHK2gThwQ6t_wPA7C-4Hq0G5TYWjptpmVtNk5mimHoYEEd0mmkMI6cpvRk7c6cQrRWKQERBDVbr-t2kXhi8uwZZzEKmsn8DnADmPzkruZBkYuGHImt_E_/s672/Norana2019.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;202&quot; data-original-width=&quot;672&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgplBHUEITJYbJVS4o-kK1J8C0JHK2gThwQ6t_wPA7C-4Hq0G5TYWjptpmVtNk5mimHoYEEd0mmkMI6cpvRk7c6cQrRWKQERBDVbr-t2kXhi8uwZZzEKmsn8DnADmPzkruZBkYuGHImt_E_/d/Norana2019.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://www.fingertecblog.com/2020/08/how-timetec-workforce-solutions-deliver.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjv_3ClO-9adnPOCQZ7WJeDBY7kqmk1ZrThUrqysGrUPdduxhV_2E2Ku4fRj6yHXM-TlR9rrTMG0VjrjejwwN_7J9eDtb_s_v7EadPQES-eJMitCsX-JKVYnk2QMLSvy2BftyDcw9e4-QMv/s72-c-d/pexels-andrea-piacquadio-3808904.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-8513436350033899753</guid><pubDate>Thu, 23 Jul 2020 06:21:00 +0000</pubDate><atom:updated>2020-07-23T14:21:23.186+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TimeTec</category><category domain="http://www.blogger.com/atom/ns#">timetec access</category><category domain="http://www.blogger.com/atom/ns#">TimeTec Attendance</category><category domain="http://www.blogger.com/atom/ns#">TimeTec Cloud</category><category domain="http://www.blogger.com/atom/ns#">TimeTec solutions</category><category domain="http://www.blogger.com/atom/ns#">TimeTec VMS</category><category domain="http://www.blogger.com/atom/ns#">TimeTecTA</category><title>TimeTec Biometrics Thermal Products</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.timeteccloud.com/&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1280&quot; data-original-width=&quot;1920&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAbHBRc7Gle1a9lHMGr5CTcbUhU4b2PIendmO_abN0025_4pe4O8MTUIzTW8LDoc0oJZ5iZWwb4lsWUx_8y1ikuT7LD0xudHUXt-YJjvbtgYZZB0sW4IA55wMb9MnAnrtvheEGOCreBZST/d/5207.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;When Covid-19 hit, there are plenty of thermal face recognition products out there trying to grab the new opportunity in the new normal, especially when the normal businesses get hit hard.&amp;nbsp;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Almost all the similar products are from the country that first detected the Coronavirus. Nevertheless, these are the transitional products for temporarily measuring the body temperatures during the Covid threat, and they would be literally useless when the crisis is over if it comes without proper software.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;What is the proper software to prolong their life cycles and put them into normal use?&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;The core software:&amp;nbsp;&lt;a href=&quot;https://www.timetecta.com/&quot; target=&quot;_blank&quot;&gt;Time Attendance&lt;/a&gt;&amp;nbsp;&lt;/b&gt;and&lt;b&gt;&amp;nbsp;&lt;a href=&quot;https://www.timetecaccess.com/&quot; target=&quot;_blank&quot;&gt;Access Control&lt;/a&gt;.&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;The supplementary software:&amp;nbsp;&lt;a href=&quot;https://www.timetecvms.com/&quot; target=&quot;_blank&quot;&gt;visitor management&lt;/a&gt;.&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;And frankly, rarely any hardware providers have either one, not to mention both or more. Most of them claimed they have, but proved otherwise. And China manufacturers are good at producing hardware, none of them come up with good software products.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Then who should the customers look for to save their huge investment?&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;font color=&quot;#2b00fe&quot;&gt;TimeTec&lt;/font&gt;&lt;/b&gt;&amp;nbsp;la. Who else?&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;We have been in the market for twenty years, have developed the world-class Windows and cloud-based time attendance, access control system, and visitor management as well, perfectly integrated with biometrics device cum temperature module.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;We help our customers in their Digital Transformation in the workforce management in the new normal&amp;nbsp;with the health screening module, not only confined to the limited short-term purpose temporary body temperature measures without any added value.&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The opportunists’ advertisements shout very loud, but timid in every in-depth deliverable.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;And ya, our products are selling like hotcakes.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGomLH-LZas7139HG449ddKlfhbiMFbgo_ia9p3l9ZTu_SrI1hFlFotN6IM7PrFkGeBhhfw-I1DmZwyC-L3lo_0qjtuPPESLV30cBggBvm57TPj4LWgBSO5g0FsXenkpWhXgDHfltjsmH-/s640/MrTeh2018-2+%25281%2529.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;215&quot; data-original-width=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGomLH-LZas7139HG449ddKlfhbiMFbgo_ia9p3l9ZTu_SrI1hFlFotN6IM7PrFkGeBhhfw-I1DmZwyC-L3lo_0qjtuPPESLV30cBggBvm57TPj4LWgBSO5g0FsXenkpWhXgDHfltjsmH-/d/MrTeh2018-2+%25281%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;i&gt;Teh Hon Seng, Group CEO of TimeTec Group of Companies. Prior to forming TimeTec, Teh led PUC Founder (MSC) Bhd to be listed on MESDAQ (ACE) market of Bursa Malaysia in 2002. Teh initiated the R&amp;amp;D in fingerprint technology in 2000, which later developed into a renowned global brand for commercial fingerprint product known as FingerTec. In 2008, he foresaw the trend of cloud computing and mobile technology, and over the years, he had strategically diversified and transformed its biometric-focused products into a suite of cloud solutions that aimed at workforce management and security industries including smart communities that centered around the cloud ecosystem. Teh has more than 10 patents to his name, and he is also a columnist in a local newspaper and a writer of several books.&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://www.fingertecblog.com/2020/07/timetec-biometrics-thermal-products_23.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAbHBRc7Gle1a9lHMGr5CTcbUhU4b2PIendmO_abN0025_4pe4O8MTUIzTW8LDoc0oJZ5iZWwb4lsWUx_8y1ikuT7LD0xudHUXt-YJjvbtgYZZB0sW4IA55wMb9MnAnrtvheEGOCreBZST/s72-c-d/5207.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-8324231751774479620</guid><pubDate>Tue, 21 Jul 2020 07:04:00 +0000</pubDate><atom:updated>2020-07-21T15:04:15.158+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">timetec ta</category><title>SMEs Digitalization Journey Needs to Start ASAP</title><description>&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiquyfgKie3C7WQ4a0yG6mv_Ry8xIjr0HEt8H8PSEG5ZSMaD3BtoVBtiLLu1Bj9LO1XCIPoRiYXoyttIiA-fXLprIfwk85qxV_eS5kp9zRW0iowOUbgpgO5O03Rla10VDr7wPzUgm9xcw/s2048/photo-of-people-doing-handshakes-3183197.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1367&quot; data-original-width=&quot;2048&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiquyfgKie3C7WQ4a0yG6mv_Ry8xIjr0HEt8H8PSEG5ZSMaD3BtoVBtiLLu1Bj9LO1XCIPoRiYXoyttIiA-fXLprIfwk85qxV_eS5kp9zRW0iowOUbgpgO5O03Rla10VDr7wPzUgm9xcw/d/photo-of-people-doing-handshakes-3183197.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;br /&gt;Digitalization is a buzzword that&#39;s been on many initiatives by the government and government bodies of late. More and more businesses are exploring digitalization, but with all the hype, must the small and medium companies join the bandwagon and start the digitalization journey for their businesses as well? The answer is capital, YES, and there are no two ways about it.&lt;/font&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;br /&gt;&lt;/font&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;When the Covid-19 hit the world, and when governments ordered everything to shut down, many businesses were left without access to data. Work from home means nothing if the crucial data is not available to the teams, and managing business becomes harder without vital information. If the pandemic didn&#39;t teach us anything, nothing would.&amp;nbsp;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;br /&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;I might be biased on digitalization because I supply various digitalization solutions. But, knowing the impact of digitalization on the operation, I recommend all businesses, big and small, to initiate this process the soonest possible as to not to get left behind.&amp;nbsp; In short, digitalization refers to improving processes by using digital technologies and digitized data to your benefits.&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;b&gt;Now, the question is, why and how?&amp;nbsp;&lt;/b&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;br /&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;An organization needs to make&amp;nbsp;&lt;b&gt;informed decisions all the time&lt;/b&gt;, and nothing beats having the right data available at your disposal for that matter. Digitalization delivers data-driven insights to companies through the right solutions they adopt. For example, how do you know that you need to add more headcount to operation? A sharp and consistent increase in overtime work hours is an alarming occasion you should be aware of. How to manage workforce availability during festive periods? Figure out the leave pattern from the existing data and plan accordingly to ensure smooth operation and maintain employee engagement.&amp;nbsp;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;br /&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;To err is human, digitalization is divine. Humans are prone to errors, but it doesn&#39;t mean that humans can&#39;t mitigate those errors with the right solutions.&amp;nbsp;&lt;b&gt;Automation reduces errors to the minimum&lt;/b&gt;&amp;nbsp;and provides the much-needed accuracy that a business desires. Set your solution(s) to the settings your business needs, and let the system provide you with the outcome of expect. For example, workforce management is a tedious work involving multiple areas such as attendance, leave, payroll, claim, etc. It&#39;s only wise for a business to automate tedious processes like clocking time, clocking hours, leave accruals, leave calculations, and focus on more important matters such as staff engagement and development.&amp;nbsp;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;br /&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;Providing all the right digital solutions will&amp;nbsp;&lt;b&gt;empower your staff&amp;nbsp;&lt;/b&gt;to engage with the tasks at hand better and more effectively, and release them from the bore of doing manual tasks. However, while many are familiar to navigate with the latest technologies, companies need to pay attention to the older employees who might shy away from learning the new solutions.&amp;nbsp;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;br /&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;br /&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;br /&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIK1knAWNRbZtamIysoJ0e1dIKaAm_PH2AXmIEfyu293KGxeQroeEWLaKH4Dnufg4xWqKTiYLEf4TKGVaHt8ch0XajD7GTMikMgGP4mSMsi5Z6hokO42C9k3xjgrGw5Q0vCgXzQiM3aVE/s1920/89457+%25281%2529.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1280&quot; data-original-width=&quot;1920&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIK1knAWNRbZtamIysoJ0e1dIKaAm_PH2AXmIEfyu293KGxeQroeEWLaKH4Dnufg4xWqKTiYLEf4TKGVaHt8ch0XajD7GTMikMgGP4mSMsi5Z6hokO42C9k3xjgrGw5Q0vCgXzQiM3aVE/d/89457+%25281%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;font face=&quot;inherit&quot;&gt;Having Smart Attendance on mobile like TimeTec TA improves processes and provides accurate data all the time.&amp;nbsp;&lt;br /&gt;&lt;/font&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;b&gt;Digitalization is necessary to optimize processes&lt;/b&gt;. We can&#39;t continue running businesses today using the past decade&#39;s strategies. Connectivity and accessibility are the keys to running companies in this century. There are plenty of affordable cloud solutions out there that can assist business workflow, consolidation of applications, making data accessible by the right people, at the right price. Digitalization is no longer exclusive to those bigger players with a big budget and a legion of the IT team.&amp;nbsp;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;br /&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;Businesses need to kick start digital transformation as soon as yesterday. It could be a&amp;nbsp;&lt;b&gt;gradual and slow process, unique for every business&lt;/b&gt;, but companies have to start somewhere. Eventually, all businesses should aim to operate digitally in the 21st century because that&#39;s the responsible thing to do to stay relevant in this digitized world.&amp;nbsp;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Note:&amp;nbsp;&lt;/b&gt;TimeTec offers 3-month FREE Smart Attendance to SMEs in Malaysia only. Click this&amp;nbsp;&lt;b&gt;&lt;a href=&quot;https://www.timetecta.com/ta_sme&quot; target=&quot;_blank&quot;&gt;link&lt;/a&gt;&amp;nbsp;&lt;/b&gt;and fill-up the form to redeem yours.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;br /&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp6iRSRlC39IFifJFYw3zufcdue29kDAi-8a9bZbaX6NKDfM3oXKvgUTsnOiOjEcVEkqjhWwP1-k_nEtFUAGU7y3Tt9xxROc3Xni_w9PWTAZjH9j8YpEhvtMkKPQay2i4vp1NHKSCPrBM/s1382/TA_SME.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;922&quot; data-original-width=&quot;1382&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp6iRSRlC39IFifJFYw3zufcdue29kDAi-8a9bZbaX6NKDfM3oXKvgUTsnOiOjEcVEkqjhWwP1-k_nEtFUAGU7y3Tt9xxROc3Xni_w9PWTAZjH9j8YpEhvtMkKPQay2i4vp1NHKSCPrBM/d/TA_SME.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;br /&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;inherit&quot;&gt;&lt;br /&gt;&lt;/font&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW4r8GzVJT4XvqZIrkFOxVppDhjq2Wf9kiEcWaazdOT4ieBTCVU4m4AUjuAdR1awtUju3OufPbNr8A-x6K3ul0SOPA1kqTuFmunfzagGbJZZv8GfjfHrrkfw17CIgQMc6MXWci64t6IZ8/s672/Norana2019.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;202&quot; data-original-width=&quot;672&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW4r8GzVJT4XvqZIrkFOxVppDhjq2Wf9kiEcWaazdOT4ieBTCVU4m4AUjuAdR1awtUju3OufPbNr8A-x6K3ul0SOPA1kqTuFmunfzagGbJZZv8GfjfHrrkfw17CIgQMc6MXWci64t6IZ8/d/Norana2019.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://www.fingertecblog.com/2020/07/smes-digitalization-journey-needs-to.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiquyfgKie3C7WQ4a0yG6mv_Ry8xIjr0HEt8H8PSEG5ZSMaD3BtoVBtiLLu1Bj9LO1XCIPoRiYXoyttIiA-fXLprIfwk85qxV_eS5kp9zRW0iowOUbgpgO5O03Rla10VDr7wPzUgm9xcw/s72-c-d/photo-of-people-doing-handshakes-3183197.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-8500823876469968796</guid><pubDate>Tue, 19 May 2020 02:32:00 +0000</pubDate><atom:updated>2020-05-19T10:32:38.440+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Contact Tracing</category><category domain="http://www.blogger.com/atom/ns#">coronavirus</category><category domain="http://www.blogger.com/atom/ns#">covid-19</category><category domain="http://www.blogger.com/atom/ns#">Health Screening</category><category domain="http://www.blogger.com/atom/ns#">Temperature Reading</category><category domain="http://www.blogger.com/atom/ns#">Temperature Record</category><category domain="http://www.blogger.com/atom/ns#">timetec ta</category><category domain="http://www.blogger.com/atom/ns#">TimeTec VMS</category><title>5 Tips to Revive A Business After A Pandemic Scare</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: inherit; margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjryA-151IJx_tPiVYndJ-cu6JUDc76rb4U_jl-Av2Z-FIKyiiR_1jF5QbhAVWYvX8CVT7JYhN0SFumsYU1RGy0Kwb9uRFhzkMTm8gn11D2CPyzDYAePzkmuLcq-7_X9C5BFLxhr-lq4GY/s1600/10480.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1067&quot; data-original-width=&quot;1600&quot; height=&quot;426&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjryA-151IJx_tPiVYndJ-cu6JUDc76rb4U_jl-Av2Z-FIKyiiR_1jF5QbhAVWYvX8CVT7JYhN0SFumsYU1RGy0Kwb9uRFhzkMTm8gn11D2CPyzDYAePzkmuLcq-7_X9C5BFLxhr-lq4GY/s640/10480.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://www.freepik.com/free-photos-vectors/business&quot; style=&quot;font-family: inherit; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Business photo created by lifeforstock - www.freepik.com&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit; font-size: 11pt; white-space: pre-wrap;&quot;&gt;
So now that the world has gotten used to the fact that Covid-19 will be very much involved in our lives until some scientists ferret out and attest to the universal vaccine that can wipe off this invisible culprit from this universe. Nonetheless, the aftermath of the attack is severe for businesses. The shutdown of more than 3 months for the majority of companies has taken a detrimental toll on their business&#39;s well-being, especially the small-medium enterprises. Many are forced to trim down operations to manage the tight cash flow, and at the same time we have to figure out how to conduct business with the new norm being introduced.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit; font-size: 11pt; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit; font-size: 11pt; white-space: pre-wrap;&quot;&gt;Entrepreneurs are a different breed of people altogether. No matter how bad is the fall, they will find their way back into the scene in no time at all. And for companies that are resuming operations, we return to the new norms that include social distancing, contactless transactions, and extra efforts on personal hygiene.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;b style=&quot;color: #660000; font-family: inherit; font-size: 11pt; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b style=&quot;color: #660000; font-family: inherit; font-size: 11pt; white-space: pre-wrap;&quot;&gt;LET&#39;S FIND OUT THE TIPS TO REVIVE YOUR BUSINESS AMID THE SCARE &lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;color: #660000; font-family: inherit; font-size: 11pt; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b style=&quot;color: #660000; font-family: inherit; font-size: 11pt; white-space: pre-wrap;&quot;&gt;Caring Employer Goes A Long Way&lt;/b&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 11pt; white-space: pre-wrap;&quot;&gt;Be a responsible company, a responsible employer and provide for your employees the necessary protection against the threat of Coronavirus infection. Stock up on masks and &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;sanitisers&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 11pt; white-space: pre-wrap;&quot;&gt;. Distribute the face masks to each employee weekly and place the &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;sanitisers&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 11pt; white-space: pre-wrap;&quot;&gt; strategically for them to use regularly. Don&#39;t resort to cheap or homemade &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;sanitiser&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 11pt; white-space: pre-wrap;&quot;&gt; that is not effective just to save some money or provide one mask a week and be okay with that.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b style=&quot;color: #660000; font-family: inherit; font-size: 11pt; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b style=&quot;color: #660000; font-family: inherit; font-size: 11pt; white-space: pre-wrap;&quot;&gt;Invest in A Good System&lt;/b&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;When times are hard, people are pulling the purse string even tighter. However, having less money to spend doesn&#39;t mean that we need to take an expensive risk instead. Investing in a high-quality fever scanning system could save your company a lot of trouble now and in the future. (&lt;/span&gt;&lt;i&gt;&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Please note that 33&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #4d5156; font-size: 10.5pt; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;°C&lt;/span&gt;&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; or 32.8&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #4d5156; font-size: 10.5pt; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;°C&lt;/span&gt;&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; are not human body temperatures because some body temperature sensors failed to give correct reading at all times&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;) The practice is not going to dissipate post-Covid because the world has learned its lesson. Therefore, having a system that can scan body temperature, scan whether the user has a mask on or not, scan for attendance and door access is something your organisation should consider when resuming your business for the benefit of the majority.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/ntVkJCrtLH0&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;Not only that we need to care about our employees, for those who have restaurants, retail stores and offices that accept visitors, but you also we need to consider a system that can protect premises from any symptoms of Covid-19. Furthermore, some governments like the Malaysian government requires the businesses that open during this pandemic to have records of their customers plus the temperature data to be available to the government any positive Covid-19 patient found, for contact traceability purposes. Even though there are free government initiatives offered to the public, but as a business, we always need to have control over the system as well. Solutions like TimeTec VMS are suitable as it provides us with the health data that the government requires, and the data is also beneficial for our business. Go to &lt;/span&gt;&lt;a href=&quot;https://www.timetecvms.com/b2w_safely&quot; style=&quot;font-size: 14.6667px; white-space: pre-wrap;&quot; target=&quot;_blank&quot;&gt;TimeTec VMS&lt;/a&gt;&lt;span style=&quot;font-size: 14.6667px; white-space: pre-wrap;&quot;&gt; to find out more.&lt;/span&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;


&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;a href=&quot;https://www.timetecvms.com/b2w_safely&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;569&quot; data-original-width=&quot;1346&quot; height=&quot;270&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBluqa26yMMI6JW7Ew_ZeSyH_cXETIoreVrkf2BLMfHEqjW7IvrwrKX74KuNMySAexjputnuR55v-rC1XlNxLs9JD1ODft4xFjZN2-jVICtGhLg1maSXOPAAf1CTAeU_7PZjB_AOoFXfI/s640/Screenshot+2020-05-19+at+9.59.41+AM.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.timetecvms.com/b2w_safely&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;background-color: transparent; font-size: 11pt; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #660000; font-family: inherit;&quot;&gt;&lt;b&gt;The New Norm at Work&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;When the governments around the world impose a lockdown on their citizens, businesses switch to Work From Home mode. Now that many are returning to work, it would be a better and safer choice to embrace WFH in the operation. To have a full workforce capacity at a confined space is definitely NOT a wise decision. Rather, those who can WFH should be advised to continue to lessen the possibility of infection.&amp;nbsp; The best way to go forward is for companies to refine the WFH policy to manage those who practise it effectively.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIOhPK508M11910x0rH0iGIB5cH8L8eU7-f6y2tYNWpclwFjTxp6dPxG8O3weXBBTgQhEzY0bTHpl_fpMXe2MpKGYLdlWnxi8QaPtEadCBwHaZ2O6MBy0ze75xWTIWbj9QQoeZ8o9z0rs/s1600/5064.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1067&quot; data-original-width=&quot;1600&quot; height=&quot;426&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIOhPK508M11910x0rH0iGIB5cH8L8eU7-f6y2tYNWpclwFjTxp6dPxG8O3weXBBTgQhEzY0bTHpl_fpMXe2MpKGYLdlWnxi8QaPtEadCBwHaZ2O6MBy0ze75xWTIWbj9QQoeZ8o9z0rs/s640/5064.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.freepik.com/free-photos-vectors/people&quot;&gt;People photo created by ArthurHidden - www.freepik.com&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; font-size: 11pt; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #660000; font-family: inherit;&quot;&gt;&lt;b&gt;Reduce Travel, Reduce Contact&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;As much as possible, reduce contact, which translates to lessening the face-to-face meetings and visits. Unless it&#39;s something that can&#39;t be discussed over Google Meet or Skype or Zoom, don&#39;t go gallivanting around town for a chance in meeting people to talk about menial matters. However, if your staff have to go, make sure they have a good tool to record their whereabouts and the people they meet on record for contact tracing.&amp;nbsp;&lt;a href=&quot;http://www.timetecta.com/&quot; target=&quot;_blank&quot;&gt;TimeTec TA&lt;/a&gt; is a perfect tool for that purpose. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit; font-size: 11pt; white-space: pre-wrap;&quot;&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/L_ZJ0t7wHpQ&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;color: #660000; font-family: inherit; font-size: 11pt; white-space: pre-wrap;&quot;&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; font-size: 11pt; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #660000; font-family: inherit;&quot;&gt;&lt;b&gt;Establish New Channels to Receive Payment&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Recover that few months lost income with new sales and better collections. Erase the anticipated excuses from your customers such as cannot travel to your place to make payment, by providing more channels to receive payments. Apart from internet banking transfer, provide other alternatives like online payment via credit cards, e-wallet and etc. Get that cash flow healthy again to revive your business the soonest possible.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJHOk7IbQeQKq89A89UCN6gFwwCIGO9hNKdh-3PncSPF0PFovo1g7WXDNIz_XW1bFHKFAJPJtcGL9C4y-jK1vWImPYjz-lt52KotbjPjmZCe8rUgp8jVhrYnVkPmZgN7xDZJH6RaSgjTE/s1600/Norana2019.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;202&quot; data-original-width=&quot;672&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJHOk7IbQeQKq89A89UCN6gFwwCIGO9hNKdh-3PncSPF0PFovo1g7WXDNIz_XW1bFHKFAJPJtcGL9C4y-jK1vWImPYjz-lt52KotbjPjmZCe8rUgp8jVhrYnVkPmZgN7xDZJH6RaSgjTE/s1600/Norana2019.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2020/05/5-tips-to-revive-business-after.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjryA-151IJx_tPiVYndJ-cu6JUDc76rb4U_jl-Av2Z-FIKyiiR_1jF5QbhAVWYvX8CVT7JYhN0SFumsYU1RGy0Kwb9uRFhzkMTm8gn11D2CPyzDYAePzkmuLcq-7_X9C5BFLxhr-lq4GY/s72-c/10480.jpg" height="72" width="72"/><thr:total>24</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-4605869948889760270</guid><pubDate>Wed, 15 Apr 2020 08:35:00 +0000</pubDate><atom:updated>2020-04-15T16:35:30.719+08:00</atom:updated><title>Technologies to Consider Post-Covid</title><description>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2ZG-lOl6kbSt-eCCNIe8OLiXZuqNWX0WYdIhG024VgYwHsKcVNsGS02zjLt0KcMW0sPwgG84Wv_QSoebJvwNtxxYJAqSgKF9cc8tMuVk-OjQWi6Rom_kmaE4LSrPpvN9bMeDqMTvazDNm/s1600/pexels-photo-4031818.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1067&quot; data-original-width=&quot;1600&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2ZG-lOl6kbSt-eCCNIe8OLiXZuqNWX0WYdIhG024VgYwHsKcVNsGS02zjLt0KcMW0sPwgG84Wv_QSoebJvwNtxxYJAqSgKF9cc8tMuVk-OjQWi6Rom_kmaE4LSrPpvN9bMeDqMTvazDNm/s1600/pexels-photo-4031818.jpeg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
We are experiencing the unprecedented. The Covid pandemic has literally brought the world to its knees. Businesses come to a halt abruptly causing a lot of damage and shut down the world over coronavirus. But in true human form, we have always found our ways to thrive and survive no matter what challenges are placed in front of us. The survival instinct, fortunately, is what we are made of. Going forward hopefully, let&#39;s plan for the changes companies should observe post-Covid, and how all of us should proceed with confidence in the next few years.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Contactless is the Safest&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Fear of cross-contamination is not going to dissipate once the world lifts its lockdown. We have to endure it for at least a year or more. Hence, prevention is the way to go. The fear of Covid has put a stop to the use of fingerprint machines in many premises. The concern is real, and the only way to manage it is to go contactless. Face recognition machine is the best option because it still promises the authenticity of biometrics, and it does not promote cross-contamination through a device. In moving ahead post-Covid, companies might want to consider switching to face recognition biometrics products for your company&#39;s time attendance and door access control. And if you need something more advanced with temperature reading and face with mask reading, enquire within. An investment in the right system will help your operation continues with a peace of mind.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuiyz0FVRa_J298z081Z9XESrHaiB8kS8yU1jVn26gZr5C2K6ADxfRPNZqIrgKhfZCuMb-Nljh_lnuP6Au7k_fKRibWZOpGUr7tN1UDJcjRdkxIaxcar_IReHL5eyb5BRXn-XWAWOL4x_Y/s1600/faceid_series.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;667&quot; data-original-width=&quot;1000&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuiyz0FVRa_J298z081Z9XESrHaiB8kS8yU1jVn26gZr5C2K6ADxfRPNZqIrgKhfZCuMb-Nljh_lnuP6Au7k_fKRibWZOpGUr7tN1UDJcjRdkxIaxcar_IReHL5eyb5BRXn-XWAWOL4x_Y/s1600/faceid_series.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Work from Home is the new Norm&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The world has been introduced to Work from Home, famously acronym as WFH, rather forcibly. Some welcome it with open arms, some cringe to the fact that they have to do work inside the house with the family members present. Nonetheless,&amp;nbsp; almost 1 million WFH hashtags flooded Instagram over the past month, indicating how WFH has become a new normal.&amp;nbsp; It works for some industries where the deliverables are not tangible. And, as we are approaching the final stretch (oh how we hope..) of this pandemic, many businesses will continue to embrace Work from Home, to reduce the risk of Covid infection in the workplace. In view of that, companies need to invest in tools to manage employees who are Working from Home. TimeTec TA and TimeTec Leave are great tools to use to monitor and manage employees who WFH. They are App-based attendance and leave system that captures clocking data along with GPS data and in real-time (and with a photo if required so), as well as leave application and approvals via a smartphone.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhglkONxezsJRFyhm_Pk97uwBBxmieRJpwhRx-HbsaEg1d5o6Faq5rZMEa0ChaogicWXrch9A2N8ppIHZyO7wxXMFpqCkL7QuEGusNL8rIrYboQ6eiTnQECCEgqxtiETXEfZHukmlsm5esq/s1600/820x312.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;312&quot; data-original-width=&quot;820&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhglkONxezsJRFyhm_Pk97uwBBxmieRJpwhRx-HbsaEg1d5o6Faq5rZMEa0ChaogicWXrch9A2N8ppIHZyO7wxXMFpqCkL7QuEGusNL8rIrYboQ6eiTnQECCEgqxtiETXEfZHukmlsm5esq/s1600/820x312.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The Wise in Health Screening&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Never have we thought that our food delivery package would have a kitchen crew and delivery person&#39;s temperatures on it. But we did receive that information from McDonald&#39;s and many other deliveries for the past few weeks. It is a safety assurance, a message to say we are free from Covid so you can eat your food without worry. As we move along, a temperature reading is going to be crucial in many places soon. Many premises will make the feature necessary to reduce the risk of getting infected with contagious diseases from employees and visitors alike.&amp;nbsp; Therefore, solutions for the public must have a temperature reading data field for record purposes as a precaution. For example, TimeTec VMS, the full-cloud visitor management system by TimeTec is updated with the temperature data field so premises/buildings can start taking the temperature of its visitors for record purposes and precautionary measures. It is unwise to take a relaxed attitude towards this because one person with the disease can transmit to at least 37 other individuals, who could infect other people exponentially.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglVMoE1d8GmXzyiRz0X0lMTc0UxZ-Oh738MYxRP-LDiZ5a5MrjYbDmQokM2OYp_DtWg1RMQTSJdluV6X8L_h061QNznjg8Ui_VDEGUW42RUTQG4OeYwlPj9M-ilDxNgS2x6DZI9huG6eyz/s1600/Screenshot+2020-04-15+at+9.55.47+AM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;551&quot; data-original-width=&quot;1392&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglVMoE1d8GmXzyiRz0X0lMTc0UxZ-Oh738MYxRP-LDiZ5a5MrjYbDmQokM2OYp_DtWg1RMQTSJdluV6X8L_h061QNznjg8Ui_VDEGUW42RUTQG4OeYwlPj9M-ilDxNgS2x6DZI9huG6eyz/s1600/Screenshot+2020-04-15+at+9.55.47+AM.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Team Collaboration&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
No man is an island. Either you are working in the office or from home or a mixture of both, team collaboration is key to get things done more effectively. Companies can&#39;t stick to the old ways of managing employees in this day and age. Explore team collaboration tools available such as MS Team, Zoom, Skype etc. to get the team together to discuss and finalize on tasks at hand. For the non-tech-savvy boomers, no matter how terrified you are with the latest techs, you need to work on the fear and dive in.&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Reaching Out to Potentials&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Gone were the days where businesses encourage physical meetings at the office or outside unless they are essential. Hence, companies need to figure out how to be creative, reach potential clients and engage them in various ways. This is the time where you can see companies attempt on FB live, Tik Tok, IG live and many more. Doing presentations using technologies or implementing solutions remotely using the latest available technologies. Basically, companies have to pivot to stay relevant.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYeE_OlcRB0iuWSCeVSLxjAp0T1MTCcGi0_CiIZZNoto-qoY5mKfELmYddHiFLC2hGltPhZVblz3CBhgyz1ZiCQFU70lRucikwGJy0_IZ_DD8nBUMcJaud88d7tQJrHaWFppj9Usu4Qmev/s1600/1583980500096.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;784&quot; data-original-width=&quot;1600&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYeE_OlcRB0iuWSCeVSLxjAp0T1MTCcGi0_CiIZZNoto-qoY5mKfELmYddHiFLC2hGltPhZVblz3CBhgyz1ZiCQFU70lRucikwGJy0_IZ_DD8nBUMcJaud88d7tQJrHaWFppj9Usu4Qmev/s1600/1583980500096.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Plan ahead on the changes your company need. Contact us at info@timeteccloud.com for consultation or further information.&lt;br /&gt;
&lt;br /&gt;
Hope to see everybody on the other. Adios.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixTzCs5eZFHH3vFYq1PEWYPCnsedot0rDiJXWkiHBDHWBrz-5TTfann64hQIHlVchyphenhyphenZ9rXjz5brG_Srv0QkmGFqBJLLbll6jaTkoWTpuQ98hhAPVMCA2rgEqJqiDsMxumbfAAV7gKyWr5K/s1600/Norana2019.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;202&quot; data-original-width=&quot;672&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixTzCs5eZFHH3vFYq1PEWYPCnsedot0rDiJXWkiHBDHWBrz-5TTfann64hQIHlVchyphenhyphenZ9rXjz5brG_Srv0QkmGFqBJLLbll6jaTkoWTpuQ98hhAPVMCA2rgEqJqiDsMxumbfAAV7gKyWr5K/s1600/Norana2019.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</description><link>http://www.fingertecblog.com/2020/04/technologies-to-consider-post-covid.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2ZG-lOl6kbSt-eCCNIe8OLiXZuqNWX0WYdIhG024VgYwHsKcVNsGS02zjLt0KcMW0sPwgG84Wv_QSoebJvwNtxxYJAqSgKF9cc8tMuVk-OjQWi6Rom_kmaE4LSrPpvN9bMeDqMTvazDNm/s72-c/pexels-photo-4031818.jpeg" height="72" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-8144549722164695411</guid><pubDate>Thu, 23 Jan 2020 06:40:00 +0000</pubDate><atom:updated>2020-01-23T14:40:07.685+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cloud adoption in office</category><category domain="http://www.blogger.com/atom/ns#">cloud based</category><category domain="http://www.blogger.com/atom/ns#">cloud computing</category><title>The Ride-on The Next Cloud Wave at Intersec, Dubai</title><description>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBUOjZ8biVntV0_-JeJoqsb3vxLjhhyphenhyphenCdfWYvKJ02gbQEhDEA_Z7R-s6wB3mjKiUO1udKmxrdXqOtfxeYA0EB12FsT2CMLzBF_O0R6c49vawv2yfbg80Jy8N9gW58B8alN2zy7qGFbwg-B/s1600/bnr.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;650&quot; data-original-width=&quot;768&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBUOjZ8biVntV0_-JeJoqsb3vxLjhhyphenhyphenCdfWYvKJ02gbQEhDEA_Z7R-s6wB3mjKiUO1udKmxrdXqOtfxeYA0EB12FsT2CMLzBF_O0R6c49vawv2yfbg80Jy8N9gW58B8alN2zy7qGFbwg-B/s1600/bnr.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
While the Big Mac index reflects the purchasing power parity between nations, the Intersec&#39;s performance reflects Dubai economy.&lt;br /&gt;
&lt;br /&gt;
For the past three years, exhibitors get lesser, and crowds get thinner at Intersec, mirroring the fact of the economic downturn in Dubai. Nonetheless, Intersec, as the most significant security tradeshow and congregation hub in the Middle East and North Africa region, still retains its status with quality leads to offer.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Intersec, as always, connects us with our longtime partners &lt;/b&gt;and it was a pleasure meeting Mr Faisal Kan, the CEO of IPTec UAE, Mr Kinan Alfin, the CEO of Link2Tec, Rouaa and Noor Alkhalifa from Ultratech Sudan, Mr Mohan Das Kuttath from Okaz Telecom Saudi, Mr Ibrahim Elshamy from Intelligent Project Qatar, Mr Mahmoud from DLink Kuwait, Benacer Douadi from Safety and Protection Ltd Algeria, and many more to catch up with our latest developments.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZib960lYCciTWLT4np0ZvuhYMpCKAYs8Fm1EUmNm4FzMmCUmfeQdcpGNg51b_7FVtmyWUzlSoY7-ZS_9LaC42yQNbglTS1Q4T5M4kGKbnoReTag5T3PUOJdExiFqugHSVFUjh_mLbHR1P/s1600/exb1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1010&quot; data-original-width=&quot;768&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZib960lYCciTWLT4np0ZvuhYMpCKAYs8Fm1EUmNm4FzMmCUmfeQdcpGNg51b_7FVtmyWUzlSoY7-ZS_9LaC42yQNbglTS1Q4T5M4kGKbnoReTag5T3PUOJdExiFqugHSVFUjh_mLbHR1P/s1600/exb1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
One of the discernible trends I have observed, the main exhibition halls that used to be occupied by the surveillance system and CCTV products have shrunk, many famous brands disappear, lost in the fierce competition. Access control products, the once smaller in size if compared to surveillance, has now seized a larger hall space.&lt;br /&gt;
&lt;br /&gt;
This time around, we exhibited FingerTec products; but highlighted our arrays of cloud solutions. It has marked the transformation of our company, from a hardware-driven company to a software-driven, from outright purchase to subscription-based, from standalone simple biometrics product to a cloud ecosystem company.&lt;br /&gt;
&lt;br /&gt;
I&#39;m proud that we come prepared as compared to many market players to ride on the next wave of cloud computing technology advancement. While many Chinese companies still relentlessly showing their perpetually lower price hardware products; we manage to bring forward a cluster of mature cloud products, under the trademark of TimeTec Cloud City, complemented and integrated with easy-to-connect IoT devices.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Many visitors found TimeTec&#39;s latest QF Master App awe-inspiring.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
We turned a standard Android phone into a face recognition terminal that opens the door. The QF master App scans face for recognition and also scans QR codes for verification. It integrates with the latest TimeTec BLE-2 door controller via Bluetooth communication.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Two parties, one from Saudi Arabia and another from UAE, foresee the massive potential of TimeTec cloud solutions, hence, have proposed joint ventures and investments to foster stronger ties with us. Besides, Assa Abloy of Dubai scheduled a meeting with a prominent housing developer for an integration proposal of the Assa Abloy locks and i-Neighbour cloud intercom system, i-Comm, an integral part of our smart community product, i-Neighbour. And soon, our esteemed distributor of FingerTec, Magnum Connect of Dubai will actively promote TimeTec Cloud solutions with the blessings of the CEO, Mr Nayagam Pillai, to carry this product forward.&lt;br /&gt;
&lt;br /&gt;
February is going to be a busy month for us with proposals to write and follow-ups to make.&lt;br /&gt;
&lt;br /&gt;
Till next time, Intersec.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2VQWQcfuWItZ8GHiSg1S7D1qpA5PcTVGECvrGiGm2i2Ax21-kJ7N7aOfoP9fhyphenhyphenOAAlqrvfC-aWgB021UspfLy3Psut65fw0TDf1I_YE-smnUtOPGfEvDftGTsZricKqYuFxAvIZstKEix/s1600/exb2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;751&quot; data-original-width=&quot;768&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2VQWQcfuWItZ8GHiSg1S7D1qpA5PcTVGECvrGiGm2i2Ax21-kJ7N7aOfoP9fhyphenhyphenOAAlqrvfC-aWgB021UspfLy3Psut65fw0TDf1I_YE-smnUtOPGfEvDftGTsZricKqYuFxAvIZstKEix/s1600/exb2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFRgK0LM5n4MMfwshENUzx7IoVMUdGrjjwn7Sj6o_aJwH6er_Y7rUOCb44j9j82o8emioGyu65agOoSsIekH26xITKpYOrlNzV51NNbHz46W3JTxvOA1aJ8gMBUvZzGRBZsuCwOy3XzIKJ/s1600/MrTeh2018-2+%25281%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;215&quot; data-original-width=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFRgK0LM5n4MMfwshENUzx7IoVMUdGrjjwn7Sj6o_aJwH6er_Y7rUOCb44j9j82o8emioGyu65agOoSsIekH26xITKpYOrlNzV51NNbHz46W3JTxvOA1aJ8gMBUvZzGRBZsuCwOy3XzIKJ/s1600/MrTeh2018-2+%25281%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;color: #444444;&quot;&gt;Teh Hon Seng, Group CEO of TimeTec Group of Companies. Prior to forming TimeTec, Teh led PUC Founder (MSC) Bhd to be listed on MESDAQ (ACE) market of Bursa Malaysia in 2002. Teh initiated the R&amp;amp;D in fingerprint technology in 2000, which later developed into a renowned global brand for commercial fingerprint product known as FingerTec. In 2008, he foresaw the trend of cloud computing and mobile technology, and over the years, he had strategically diversified and transformed its biometric-focused products into a suite of cloud solutions that aimed at workforce management and security industries including smart communities that centered around the cloud ecosystem. Teh has more than 10 patents to his name, and he is also a columnist in a local newspaper and a writer of several books.&lt;/span&gt;&lt;/i&gt;</description><link>http://www.fingertecblog.com/2020/01/the-ride-on-next-cloud-wave-at-intersec.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBUOjZ8biVntV0_-JeJoqsb3vxLjhhyphenhyphenCdfWYvKJ02gbQEhDEA_Z7R-s6wB3mjKiUO1udKmxrdXqOtfxeYA0EB12FsT2CMLzBF_O0R6c49vawv2yfbg80Jy8N9gW58B8alN2zy7qGFbwg-B/s72-c/bnr.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-8846077713795237251</guid><pubDate>Mon, 23 Dec 2019 08:42:00 +0000</pubDate><atom:updated>2019-12-24T09:30:21.384+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Attendance</category><category domain="http://www.blogger.com/atom/ns#">biometrics for attendance</category><category domain="http://www.blogger.com/atom/ns#">fraud</category><category domain="http://www.blogger.com/atom/ns#">ghost employee</category><category domain="http://www.blogger.com/atom/ns#">payroll fraud</category><category domain="http://www.blogger.com/atom/ns#">payroll fraud prevention.</category><category domain="http://www.blogger.com/atom/ns#">time attendance</category><title>Biometrics, the Protection from Ghost Employees </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY4YBO6QjVPHBhowF6wzuESnnPqQgKANkXzerW7Ow_a5LtbmsSe537ru2NZqTltosbPBmLJpscTTK019Ec-Y0MECpylkISsPNIIhfZGhRvTT-ZNSwsUNIyFOpZVpA4VkdEbmVDyeLHt740/s1600/photo-of-person-holding-white-mask-2590621.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1600&quot; data-original-width=&quot;1280&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY4YBO6QjVPHBhowF6wzuESnnPqQgKANkXzerW7Ow_a5LtbmsSe537ru2NZqTltosbPBmLJpscTTK019Ec-Y0MECpylkISsPNIIhfZGhRvTT-ZNSwsUNIyFOpZVpA4VkdEbmVDyeLHt740/s640/photo-of-person-holding-white-mask-2590621.jpg&quot; width=&quot;512&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: #1c1e29; font-family: &amp;quot;spectral&amp;quot; , serif; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-3ad3fc71-7fff-3abc-1358-d793cad159b6&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;It sounds almost comical, ghost employees. No, it&#39;s not referring to the staff who passed. This term refers to names recorded on payroll, but they do not work at the place, like at all. They could be real, actual people or they could also be fictitious characters, depending on who created the records for these spooky, non-existent employees. It is indeed terrifying when these employees can rake a lot of money from a company and even millions from a government. Bizarre? Not so. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-cb3ca950-7fff-bf24-1760-8658a1123979&quot;&gt;&lt;span style=&quot;color: blue; font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;b&gt;In 2016, a Nigerian government cut nearly 24,000 non-existent workers from its payroll and saved $11.5 million a month! Iraq paid a whopping $380million a year for 50,000 soldiers who never reported for duty. Many other cases are affecting nations across the globe as well as corporate companies.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-f6055c84-7fff-4331-add9-541432680e81&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;How could this happen in the first place? You might ask. Dishonest employees and corrupted civil servants pose real damaging risks to businesses and governments alike. And the primary motivation for the perpetrator(s) is money and how to get more money through illegal manners. It could be an individual effort or a collective effort to cheat a system, and the absence or the lack of detailed audit in any system elevates this further. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-8d72e4c5-7fff-359e-b1cc-5c05abf21a66&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Is this crime preventable? It&#39;s easier to prevent if it happens in SME, smaller companies. However, it&#39;s trickier when it occurs in multinational, multibranch, labour-intensive organizations because the larger a company is, the massive the data to audit.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-21506742-7fff-c789-4cab-0ed3013c53a3&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;The good news is, every company can minimize the risk by employing this one simple yet effective tactic in operation.&lt;/b&gt;&lt;/span&gt; Before we dive into the solution, let&#39;s explore how could this ghost employee occurrence happen? Two ways, timecard falsification, and another is a ghost employee presence, where an administrator is giving an avatar or a &#39;life&#39; to an ID in a system. All the perpetrator needs to do is to falsify time for this fake ID, and approves the &#39;work&#39; done to get paid. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;&quot;&gt;Now, let&#39;s talk biometrics.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-4fdb1220-7fff-b7ee-1a42-ef3869354eb0&quot;&gt;&lt;span style=&quot;color: blue; font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;b&gt;What biometrics technology does is, it compares the recorded template of a person&#39;s biometric data with the biometric characteristic of a real person. If you have stored a fingerprint template inside a system, you would have to scan your finger for your data to be verified and recorded. There is two-step to biometric authentication. One, a person needs to register, then he/she needs to verify. Biometrics cannot skip these two steps to provide authentication. Then, apply this biometric technology to time clocking and monitoring to obtain reliable time data for reference and checking. &lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; white-space: pre-wrap;&quot;&gt;Through biometrics, even when an admin who is in charge of the system plans to cheat the system, he needs to figure out whose fingerprints are for which IDs and how would these ghosts come to work to record the time for payroll purposes. If the admin wants to use his fingers, the system will catch him even faster. The ghost needs to clock at the right time with the correct biometrics, and any edit on the attendance data will be highlighted accordingly to prevent data mishandling.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-76f31f59-7fff-fe08-1283-be6feceb8fb1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-24bc2590-7fff-c929-8609-effd63106b67&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;See, biometrics is indeed a simple solution to this problem. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; white-space: pre-wrap;&quot;&gt;If you think that this Ghost Employee phenomenon wouldn&#39;t affect your company, think again. Unless you have installed protection such as biometrics systems in place, no one is safe. And be wary of the people who are against the system because they might have something up their sleeves for quite some time.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 11pt; white-space: pre-wrap;&quot;&gt;Contact us at &lt;a href=&quot;http://www.fingertec.com/&quot;&gt;www.fingertec.com&lt;/a&gt; for biometrics solutions and cloud-based time attendance at &lt;a href=&quot;http://www.timetecta.com/&quot;&gt;www.timetecta.com&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8_camdYwMDXVRZY6GRmzV2WgBH_YhJagn3kmwr-k-cQWF27oHsuFD1ImX96S3cOBQ-1YMVxPqtojDYQeoSTaZauAYJ4ecK8kGJp38RiyPet_LDRgkUcktfraC3r01o7RHV_C4LtOU8W-G/s1600/fingertec.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;338&quot; data-original-width=&quot;969&quot; height=&quot;223&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8_camdYwMDXVRZY6GRmzV2WgBH_YhJagn3kmwr-k-cQWF27oHsuFD1ImX96S3cOBQ-1YMVxPqtojDYQeoSTaZauAYJ4ecK8kGJp38RiyPet_LDRgkUcktfraC3r01o7RHV_C4LtOU8W-G/s640/fingertec.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: #1c1e29; font-family: &amp;quot;spectral&amp;quot; , serif; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyweFFpCI5swYjG5oDAaGPThswi7_X4oY9U2B5oTW7oCwaUNXqBy5Pxgnilb6NZ-FyzHZC5Jyilak-Zeq1ivttLMqImBB1FHG0PB1UQXhjJbLeL8zh4NSTbg-GjYzgxf2QFcwVyiB77pxn/s1600/tamy2019.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;202&quot; data-original-width=&quot;670&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyweFFpCI5swYjG5oDAaGPThswi7_X4oY9U2B5oTW7oCwaUNXqBy5Pxgnilb6NZ-FyzHZC5Jyilak-Zeq1ivttLMqImBB1FHG0PB1UQXhjJbLeL8zh4NSTbg-GjYzgxf2QFcwVyiB77pxn/s640/tamy2019.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: #1c1e29; font-family: &amp;quot;spectral&amp;quot; , serif; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2019/12/biometrics-protection-from-ghost.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY4YBO6QjVPHBhowF6wzuESnnPqQgKANkXzerW7Ow_a5LtbmsSe537ru2NZqTltosbPBmLJpscTTK019Ec-Y0MECpylkISsPNIIhfZGhRvTT-ZNSwsUNIyFOpZVpA4VkdEbmVDyeLHt740/s72-c/photo-of-person-holding-white-mask-2590621.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-1941230615596453896</guid><pubDate>Wed, 06 Nov 2019 03:24:00 +0000</pubDate><atom:updated>2019-11-06T12:04:40.421+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">5g</category><category domain="http://www.blogger.com/atom/ns#">IoT</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">security industry</category><title>New Challenges for Security Industry in the Era of the Internet of Things</title><description>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA_Hzu73rsVo-eU8wyW87lNrDxfNeWDK_gt9T6CU0IJ2UutiZBStuLRNgZ3NkwRt7fOsvk_4ftHr_9l-K8mZw1FP1h45fqg_Q_g6IwD-GoFBkjSQ-c4-xl7JdxNNQPPuNuE8PLq7i2SPPx/s1600/CPSE+.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;310&quot; data-original-width=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA_Hzu73rsVo-eU8wyW87lNrDxfNeWDK_gt9T6CU0IJ2UutiZBStuLRNgZ3NkwRt7fOsvk_4ftHr_9l-K8mZw1FP1h45fqg_Q_g6IwD-GoFBkjSQ-c4-xl7JdxNNQPPuNuE8PLq7i2SPPx/s1600/CPSE+.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Foreword&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The 17th China Public Security Expo held in Shenzhen in 2019 was still as big as the previous years. But I came out of the exhibition halls faster than I did before.&lt;br /&gt;
&lt;br /&gt;
There are more and more homogenized products exhibited at the Expo, and fewer and fewer foreign manufacturers taking part; far less this year. According to a report, only 5%. For China, this is an achievement, because international products have been wiped out and replaced by the locally made products. This trend also means China is capable of producing the same products, as good as its foreign counterparts, and even more economical at that.&lt;br /&gt;
&lt;br /&gt;
But this boasted achievement has quickly become a hidden worry in China.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Outsiders can&#39;t get in; eventually, insiders can&#39;t go out too.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Because we can almost foresee the outcome, in which foreign products have difficulty to enter China, and Chinese products will be harder to export as well in the future. (I will discuss this in the last chapter)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;From the product is king, to the application is king.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The era of “Product is King” has come to an end, “Application is King” is taking the reign.&lt;br /&gt;
&lt;br /&gt;
Now, the products are standalone dotted points, and the applications connect them all, and the connectivity makes the golden age of pure products obsolete. The 4G era of connecting people has completed its mission. The future 5G emerges to connect people and things, things and things. With the rise of IoT or Internet of Things, Internet of Everything, AIoT or Artificial Intelligence of Things, the factories that produce purely standalone objects are getting bitter.&lt;br /&gt;
&lt;br /&gt;
Cheap labour drives the China’s economy. The security industry was initially hardware-driven. Surveillance cameras, access control barriers, clocking readers, and door locks, they all started with hardware. Later, during the era of computerization in the last century, these products were linked to computers. Usually, the front-end of the surveillance camera, access control, etc. is responsible for collecting data. Then the data is transferred into the computer system through some interfaces such as RS232, RS485, TCP/IP for further processing to output the results. From the standalone to the local area network, the manufacturing of products and the programming of software is a division of labour, and the combination of use is also divided. This model is beneficial to China. We witnessed how Hikvision and Dahua have rapidly emerged as international market leaders that dominate the surveillance industry.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;b&gt;Hardware-driven market to software-driven market&amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Because the hardware has a big profit lies beneath, Chinese manufacturers have focused on hardware for their market expansion. The software has become a complementary accessory. It is usually bundled with hardware as a free of charge item, or charged at a minimum fee; hence, the overall software lacks comprehensive R&amp;amp;D planning and real allocation.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
When the arrival of the Internet trend in the late 1990s, China&#39;s security industry was unmoved, security products were hardly in deep association with the Internet or could have many benefits obtained from the Internet technology. Simultaneously, Internet companies were born like rapid fire. The big guys in the security industry are still wandering in their comfort zone, thinking that as long as they are big and strong enough in their fields, they would be perpetually invincible.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Suddenly, big data appears, cloud computing happens, artificial intelligence rises, mobile internet strengthens, and the Internet of Things becomes a reality.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
When these big concepts started to surface, security companies seem never to fail to boast about how their products complement the big technology trends. During the CPSE Exhibition, when we enquired further, we understand that most of them are still in the concept hype stage. The adoption is indeed quite shallow, let alone would cause a paradigm shift in the industry. The hype might fool the capital market, but not the real market and customers. However, this is quite a universal norm for China&#39;s security industry.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
When we say Factory 4.0 or Manufacturing 4.0, strictly speaking, the factory in Factory 4.0 stage is no longer about a factory, but a tech company. The Factory 4.0 is not merely the adoption of cutting-edge IT equipment, or to enhance the automation process so that it can upgrade itself from Factory 3.0 to 4.0, and it is a thorough DNA reengineering process for an organization. For Factory 4.0, it is not only about the products networkability, but the products also have to integrate with various cloud applications to form a comprehensive IoT ecosystem.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
If the progress of 1G to 4G in telecommunications impacted individuals and the B2C consumer market the most, the introduction of 5G is expected to affect B2B significantly, bringing vital change to all industries, the mega smart city projects included. We foresee through interconnectivity between IoTs, and the revolutionary cloud applications, this trend will redefine and rebuild the ecosystems between industries, which is also a massive opportunity for the security industry. It&#39;s just that, are you ready?&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgajjgJAmF5BlYKCFNqKpPfuuwD6vpRVzMIzwHz3ZuzGUBpNYTg5pCV8pQxvUGQRbyKIy2V16rqPb4Y6HUjVdAEeJF10_ufRmMfVZYxsMd7VmZtrDSOw3MzzBJrdCc_v3dJ6DvA6Vzg9mU9/s1600/top-view-smartphone-mockup-workspace_23-2147861030.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;352&quot; data-original-width=&quot;626&quot; height=&quot;359&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgajjgJAmF5BlYKCFNqKpPfuuwD6vpRVzMIzwHz3ZuzGUBpNYTg5pCV8pQxvUGQRbyKIy2V16rqPb4Y6HUjVdAEeJF10_ufRmMfVZYxsMd7VmZtrDSOw3MzzBJrdCc_v3dJ6DvA6Vzg9mU9/s640/top-view-smartphone-mockup-workspace_23-2147861030.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;b&gt;The four elements of the Internet of Things era&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
1. Cloud computing and cloud applications are the life support of IoT; therefore, the cloud is a must for all industries in the 5G era.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
2. IoT is cloud-driven, and therefore, hardware-driven companies have to transform themselves into software-driven companies. For hardware vendors, this is a tough genetic modification project to undertake.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
3. Since cloud computing can do 90% of IoT processing, hardware gets simpler and cheaper. This element is a big blow to manufacturers who merely rely on hardware to generate revenue.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
4. The interconnectivity between objects in multiple scenarios and cross-platforms, spawn new consolidated ecosystems and multiple cloud applications.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBWP03BGg45NyscgM0EOZ4bMnaankp2dWPRRnLJHGgYADlRX_Bm4_0Vsh5ZUofafbpLCK19r_katJbd_hhuHQ8zpx4-6q7IJ2E3z-e_SC22uBNkcDGmOTvRuNGpBdA6kDyQNtfX35_K86d/s1600/professionals-using-high-speed-5g-network_1262-21300.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;377&quot; data-original-width=&quot;626&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBWP03BGg45NyscgM0EOZ4bMnaankp2dWPRRnLJHGgYADlRX_Bm4_0Vsh5ZUofafbpLCK19r_katJbd_hhuHQ8zpx4-6q7IJ2E3z-e_SC22uBNkcDGmOTvRuNGpBdA6kDyQNtfX35_K86d/s1600/professionals-using-high-speed-5g-network_1262-21300.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;b&gt;The secured and unsecured security industry&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
As the 5G era approaches, the IoT era arrives concurrently. The security industry is at the crossroad of innovation. The imminent game-changer is approaching. And big tech companies are more sensitive and ready as compared to the security companies with their infostructure groundwork. And, the siege has begun. Huawei is coming, Baidu is coming, Alibaba is coming, Tencent is coming, there are many more out there making their ways.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
No matter how they enter the arena, either as friends or foes, they will directly or indirectly compete and take up some good slice from the security industry. As foes, they compete directly in your territory, with cooler stuff; as friends, they seem to drive traffic to you from their internet platform, but in the end, they will get the upper hand, bag bigger benefits.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
It is apparent that the platforms built by the Internet giants, such as the enterprise platform of Alibaba’s DingTalk, Tencent’s WeChat and Small Program, have become the pain points of many industries, including security.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Due to a lack of cloud computing full deployment, the hardware-driven security companies continue to provide free software as a strategy. And, this strategy has made them stalling in developing cloud applications that could generate them with direct profit from subscription-based Software as a Service (SaaS) model. At the same time, they are also unable to use the cloud to drive the hardware sales, and they end up losing at both ends.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
China&#39;s tech companies have successfully replaced foreign security products to becoming threats to the security companies. For this new threat, I reckon security companies affected have to succumb and play along.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The game-changer in the domestic market is not affecting the overseas market just yet. Due to the diversity of the international market, the application of IoT does not influence product-oriented sales entirely. Apart from the impact of the Trade War between the United States and China, some market space for overseas products is still available. However, as China&#39;s labour costs rise, the advantage of low-cost products diminishing; and as the IoT and the cloud become mainstream, the export market will be affected tremendously, very soon.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;b&gt;The predicament of China’s export market in the future&amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
Some people may say, why should we separate the traditional Chinese security companies from the incoming Internet companies? If we regard China as a sole force, and these companies merge as one, can they not dominate the world?&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
Otherwise.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
Because of China&#39;s Great Firewall Policy that segregates China&#39;s Internet world from the outside world, it separates the seemingly integrated Internet into two different forms. Extra and tremendous adaptation efforts have to be put in for overseas cloud applications to suit China’s environment, and vice versa for China’s cloud solutions. Integrating an application system is much trickier than adopting individual products; this is the common challenge for the industry players.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;b&gt;The road to moving forward&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
Whether it suits your agenda or otherwise, technology trends and market ecosystems are moving the IoT way. Hence, how should the security industry player react? My brief view is as follows:&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
First, the need to deepen awareness about cross-industries and how it works; second, the need to define new products and standards; third, the need for deep integration of 5G and artificial intelligence, cloud computing and other technologies; fourth, the need for an organization to transform from hardware-driven to software-driven.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
Only by maintaining an open-minded attitude towards new ideas, willingness to cooperate with new partners, walking the talk, only then security industry players can create new values in the new cross-industry and cross-sector security industry.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbIOi0-2tECA1LM5v3H3eOQrBHywqMgFUgerBEiGA7a47c4XxexBz0IODxVVrk3B9v3QlhGi92kjZEKn4g8scbpVKDRebP8I5txiCfYEMR8aK657ojstLw6ONqpLp6a8WRJDrVyTTDmekc/s1600/MrTeh2018-2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;215&quot; data-original-width=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbIOi0-2tECA1LM5v3H3eOQrBHywqMgFUgerBEiGA7a47c4XxexBz0IODxVVrk3B9v3QlhGi92kjZEKn4g8scbpVKDRebP8I5txiCfYEMR8aK657ojstLw6ONqpLp6a8WRJDrVyTTDmekc/s1600/MrTeh2018-2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Teh Hon Seng, Group CEO of TimeTec Group of Companies. Prior to forming TimeTec, Teh led PUC Founder (MSC) Bhd to be listed on MESDAQ (ACE) market of Bursa Malaysia in 2002. Teh initiated the R&amp;amp;D in fingerprint technology in 2000, which later developed into a renowned global brand for commercial fingerprint product known as FingerTec. In 2008, he foresaw the trend of cloud computing and mobile technology, and over the years, he had strategically diversified and transformed its biometric-focused products into a suite of cloud solutions that aimed at workforce management and security industries including smart communities that centered around the cloud ecosystem. Teh has more than 10 patents to his name, and he is also a columnist in a local newspaper and a writer of several books.&lt;/div&gt;
&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2019/11/new-challenges-for-security-industry-in.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA_Hzu73rsVo-eU8wyW87lNrDxfNeWDK_gt9T6CU0IJ2UutiZBStuLRNgZ3NkwRt7fOsvk_4ftHr_9l-K8mZw1FP1h45fqg_Q_g6IwD-GoFBkjSQ-c4-xl7JdxNNQPPuNuE8PLq7i2SPPx/s72-c/CPSE+.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-16501132534277760</guid><pubDate>Thu, 26 Sep 2019 07:59:00 +0000</pubDate><atom:updated>2019-09-30T17:04:08.276+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">attendance automation</category><category domain="http://www.blogger.com/atom/ns#">attendance system</category><category domain="http://www.blogger.com/atom/ns#">best attendance solution</category><category domain="http://www.blogger.com/atom/ns#">best biometric time clock</category><category domain="http://www.blogger.com/atom/ns#">biometric fingerprint attendance system</category><category domain="http://www.blogger.com/atom/ns#">biometric time clock</category><title>IT&#39;S TIME TO CHANGE YOUR ATTENDANCE SYSTEM. LET&#39;S BUY IT RIGHT. </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7kGgBRILkaDs2UL0KWlm2RxvxTWAg0iItGRdKbw7oO2g8Q7uy415kdu1Lm80bdIzB5jvOdxrhip1f_SkwKy4L8zGs66PhmaaeHAXF-kdlsfSrNXlXn1Fl7I3JCnziGaTTueUKAnltofgc/s1600/47024.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;915&quot; data-original-width=&quot;1600&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7kGgBRILkaDs2UL0KWlm2RxvxTWAg0iItGRdKbw7oO2g8Q7uy415kdu1Lm80bdIzB5jvOdxrhip1f_SkwKy4L8zGs66PhmaaeHAXF-kdlsfSrNXlXn1Fl7I3JCnziGaTTueUKAnltofgc/s1600/47024.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;color: #cc0000; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;CAUTION: DON&#39;T CALL ANY SUPPLIERS BEFORE YOU READ OUR FREE TIPS BASED ON A 20-YEAR EXPERIENCE IN THE INDUSTRY&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #cc0000; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Your organization is looking forward to changing the attendance system that has been adopted by your business a gazillion years ago. Everybody knows that it is an ancient system, but somehow the company is taking its good sweet time to replace it. While the management thought that the company could escape the cost (of changing the system), &lt;span style=&quot;color: red;&quot;&gt;the business couldn&#39;t withstand the hassle and the workload that comes with that conventional system.&lt;/span&gt; Okay, now there is no excuse for not changing the system anymore.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;But, the question is, which system to replace the old ones and how can you get the most value out of the investment.&lt;/b&gt; Bear in mind that not all systems are created equal and all you have is that X amount of budget.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Therefore, it is wise to spend a couple more minutes reading these &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;FIVE TIPS&lt;/span&gt;&lt;/b&gt; of choosing the modern best solutions for attendance, to get more values for your money and stretch your investment further.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;(Personally, I have 20 years experience in this industry, and I&#39;ve been marketing time attendance solutions for all those years worldwide. These are my 5 take-home points for buyers to use in their procurement process.)&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;&lt;b&gt;BRAND MATTERS&lt;/b&gt;&lt;/span&gt; and those who say that it&#39;s not is not forward-thinking. I&#39;m not afraid to say so because a well-known, &lt;b&gt;famous brand is almost always associated with good values&lt;/b&gt; and vice versa. Because a brand ONLY becomes strong and established after it is put into the market for a duration, and after it withstood the market pressure. Product quality, service quality and customer experience sum up the brand&#39;s worth eventually. Buying a quick paste-on sticker &#39;brand&#39; risks the company down the road because once the deal is sealed, whatever comes next could or could not be the seller matter anymore. Hence, the buyer must hold the brand accountable for the marketing, the &#39;promises&#39; it makes to the market.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;SUPPORT IS CRUCIAL&lt;/span&gt;&lt;/b&gt; because we know that &amp;amp;^$# happens when it comes to electronic products. While one product is okay, another one could be having a problem right from the start. Apart from warranty offered, support is REALLY REALLY REALLY important because let&#39;s face it, most of your employees do not know (or pretend not to know) how to operate ANY machines. &lt;b&gt;Even though the products come with a warranty, it doesn&#39;t necessarily mean that support is offered.&lt;/b&gt; Support means that someone is there to attend to your problems. And while you are there, check the warranty duration too. The duration tells quality actually.&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;MANAGEMENT SOFTWARE&lt;/span&gt;&lt;/b&gt; has to bundle with the hardware. You do not settle for less and do not accept substandard software. You must list down the purposes of your company buying the new attendance machines, and compare them against the features offered by the management software. If the software features match more than 90% of your requirements, and it&#39;s complimentary, perhaps you have found the perfect system. However, while reviewing the software offered, please bear in mind, tip no. 2 again. Remember this slogan “No support, More headache” going forward.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmmcYcTa_Yry8kqJT6aPkGkx4lPRZYh_6TI0NQBP1G12tURtl8d1YcK8ivbUcf5zOtmp8VOwtLH2v0C6uBME5pIdy00yDCM513LeaepSBWfJ7taCOtNmKBe2RjMbcoQ0U241QwdAucb7wD/s1600/Screenshot+2019-09-30+at+5.00.10+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;338&quot; data-original-width=&quot;969&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmmcYcTa_Yry8kqJT6aPkGkx4lPRZYh_6TI0NQBP1G12tURtl8d1YcK8ivbUcf5zOtmp8VOwtLH2v0C6uBME5pIdy00yDCM513LeaepSBWfJ7taCOtNmKBe2RjMbcoQ0U241QwdAucb7wD/s1600/Screenshot+2019-09-30+at+5.00.10+PM.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;VERSATILITY IS THE KEY&lt;/span&gt;&lt;/b&gt;. Look for a system that can travel through time with you, well at least for a decent period of say, 5 years. And &lt;b&gt;would that system be able to cope with the demand of the working environment 5 years ahead?&lt;/b&gt; You must also explore the possibility of integration with other solutions. How about the possibility of cloud integration? Questions like these need to be asked to get the best value for your money. If you are buying product A for one purpose at X dollars, you need to make sure that no other brands are providing product B for 2 purposes at X dollars with free software.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;ADDED VALUE FOR YOUR MONEY&lt;/span&gt;&lt;/b&gt;. That&#39;s a pretty cliche promise of many brands out there, but &lt;b&gt;YOU as a consumer must be able to list down the values &lt;/b&gt;that are actually offered. If you struggle to write down the additional benefits provided, that phrase is a scam.&amp;nbsp; Factor all your concerns in and compare them against the values you get for your dollars.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color: #073763;&quot;&gt;
All in all, a little research won&#39;t hurt and definitely useful to your organization in the long run. You have more questions? Engage with me at &lt;a href=&quot;mailto:tamy@fingertec.com&quot;&gt;tamy@fingertec.com&lt;/a&gt; and I’ll be there with you. Should you want to try out biometrics as a business, I can consult.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjZs_JJpg831e0c9x56hXPF4kTJgymgY_Huej4alkOrC_gAZ3KXLx5ux8ZbON43F3k0a6OcdiPMvbZRCamNdDP8r400XjPxu5i4BRU9mjTEYlIPHkRYW2xpVotEAIxJPBBYfRugVmiwv_B/s1600/tamy-5.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;202&quot; data-original-width=&quot;670&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjZs_JJpg831e0c9x56hXPF4kTJgymgY_Huej4alkOrC_gAZ3KXLx5ux8ZbON43F3k0a6OcdiPMvbZRCamNdDP8r400XjPxu5i4BRU9mjTEYlIPHkRYW2xpVotEAIxJPBBYfRugVmiwv_B/s1600/tamy-5.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: red; font-family: &amp;quot;roboto&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2019/09/its-time-to-change-your-attendance.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7kGgBRILkaDs2UL0KWlm2RxvxTWAg0iItGRdKbw7oO2g8Q7uy415kdu1Lm80bdIzB5jvOdxrhip1f_SkwKy4L8zGs66PhmaaeHAXF-kdlsfSrNXlXn1Fl7I3JCnziGaTTueUKAnltofgc/s72-c/47024.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-6041143821765309523</guid><pubDate>Fri, 25 Jan 2019 07:18:00 +0000</pubDate><atom:updated>2019-01-25T15:18:24.864+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">attendance on cloud</category><category domain="http://www.blogger.com/atom/ns#">cloud attendance</category><category domain="http://www.blogger.com/atom/ns#">cloud solution for workforce</category><category domain="http://www.blogger.com/atom/ns#">workforce management</category><title>FingerTec Software Makes Way for the Superior Cloud Software. 10 Reasons Why You Should Elevate to Cloud, Now!</title><description>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT6E8hWMwx3bswQw_g4pZcxoK0XPGA50XvHOwwz1YmO6x7nDtLoCVxcnpdSqpYrFouFZ1OiEZEkWt13IwGowIcW14G9SkBOb9d0SiougqVkf5FTadKTaTjCmLrpig5CuvVvlUp9ELIMthc/s1600/10-Reason.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;800&quot; data-original-width=&quot;1200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT6E8hWMwx3bswQw_g4pZcxoK0XPGA50XvHOwwz1YmO6x7nDtLoCVxcnpdSqpYrFouFZ1OiEZEkWt13IwGowIcW14G9SkBOb9d0SiougqVkf5FTadKTaTjCmLrpig5CuvVvlUp9ELIMthc/s1600/10-Reason.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
FingerTec biometrics are bundled with Windows-based software, be it TCMS V3/TCMS V2 for time attendance, or Ingress for door access. For the most part, the Windows-based software is able to fulfill the majority of our worldwide customers requirements. However, there are circumstances whereby the business requires more from a solution and this is where the cloud software like TimeTec steps up.&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;Growing Business Needs Scalable Solutions&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
When the business thrives, the staff count multiplies and the management of employees become more complex for a Windows-based system to handle. Quantity-wise, Windows-based software has its own limitation, for example in Ingress when one customer connects 150 units in a system, real time monitoring is no longer an option and eventually the customer is forced to invest more on servers. The problem worsens particularly when the company has branches in multiple locations, mobile workforce and flexible working hours. With TimeTec TA, not only that it can handle unlimited FingerTec terminal connection regardless of the locations, it also can connect to the mobile App that can capture attendance through other ways apart from biometrics, such as GPS, NFC, Beacon and Wifi. TimeTec TA promotes efficiency with cloud technology.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;Data is King&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
Data is an asset to any organization and people are talking about its importance now, more than ever. While Windows-based software such as TCMS V3 and Ingress contains important data, TimeTec cloud solution offers that and a whole lot more. TimeTec provides huge data storage without having to spend a large amount of money, and there is no limitations set on the number of connected biometrics terminals to connect to TimeTec. Data in TimeTec is accessible and available at all times on web and app for convenience.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;Constant Update&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
How many times do you have to wait for your software to finish updating? Updating on Windows-based software stops you from using the system and worse, you need to repeat the process in every computer. Software update for Windows-based usually take months to be developed, so if there’s any bug or problem, you’d have to wait for the fix in the next few months release. Cloud solution like TimeTec updates automatically, regularly and quick so the next time you log into the system, you can see the changes and updates; time saving and efficient.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;Maintenance Free&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
The common rule when using any software is to perform housekeeping and maintenance by removing or archiving old data. The process is tedious and requires a dedicated personnel to perform this regularly. Software that hasn’t been maintained well will lag and prone to crash. That’s not the case with TimeTec cloud solutions. At TimeTec, the maintenance of servers and database are taken care of at all times. Users will be informed on scheduled maintenance date and time, and the down time will be very minimal to avoid any disruption to its users.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;Better Server Performance&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
The capacity of a server in a Windows-based software depends on the PC, and for a PC to act as a server, a user needs to have a high spec PC; which will be very costly. Even then, there’s still limitation on the memory (RAM) which will reduce the speed of the software, server maintenance and so on. TimeTec solutions runs on the highly reliable and well known Amazon server, which is robust, stable and secure. Its huge storage and server facilities provides smooth and better user experience as a whole. Data in the server is also backed up regularly, keeping all data safe and sound.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;Access from Anywhere&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
Windows-based software is not designed to work with Internet or with different devices such as mobile phone. Connection for Windows-based software is limited and cannot be used for companies with multiple branches from different countries. As TimeTec solutions are cloud based systems, users can access the solutions from anywhere, anytime from a place with&amp;nbsp; Internet connection. TimeTec mobile apps are also available for user to clock and view their attendance, leave information and more.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;Shorter Implementation Time&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
As accessibility for Windows-based software is limited, implementation time for a new system would take much longer time than on cloud. On premise system requires the same implementation to be done at multiple locations, so you have to repeat the setup process every time. With cloud services like TimeTec TA, you can setup for multiple branches a lot more quicker as the setup is shared and will reflect at all branches. Admin also can make changes and it will reflect to all branches within seconds.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;Data Centralization&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Often times organizations face challenges when they have multiple branches in different locations. One of the challenges is data centralization. Admin from different branches need to compile and send information regularly just to update their HQ. TimeTec cloud solution eliminates this process as all data from the company will be in the same account and viewable at any time. Analysis and workforce overview are also available in TimeTec to provide a clear overview of the company’s workforce status.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;Better User Experience&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
FingerTec Windows-based softwares are designed for Admin view only; where the main objective is for Admin to process attendance data or control access devices. Normal employees have no access whatsoever to the system and can only wait for the Admin to confirm on their data. On the contrary, TimeTec cloud solution provides a platform where both Admin and employees can view, edit and approve data, allowing a two-way communication for a more transparent system. In addition, TimeTec solution is complemented with mobile app where the process of view, edit, apply and approve can be done straight from a smartphone.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;Mobile Friendly&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Let’s admit it, mobile phone has become a necessity in our everyday life. That’s why TimeTec solutions offers mobile apps that compliment and complete the solutions. Users can clock their attendance, view schedule, request for OT approval and more directly from TimeTec mobile apps. This is not possible if you are using Windows-based software. Receive notifications, monitor attendance and overview of attendance in real time, straight from your mobile phone when you use TimeTec cloud solutions.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Cloud is the future. Many organizations have moved to cloud and benefit from the system. If you are still have doubts about cloud, we offer 30-day FREE trial at &lt;a href=&quot;http://www.timetecta.com/&quot;&gt;www.timetecta.com&lt;/a&gt; so you can give it a try!&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Free Consultation, contact &lt;a href=&quot;mailto:info@timeteccloud.com&quot;&gt;info@timeteccloud.com&lt;/a&gt; and we’ll be right there with you.&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9pzwV9JgkmKB2p5ty5wmIMir94LU1InrfqjBUUnIlJhNbKctDcZU8pKoY0uHyz4y1stXAdYSXKov2Y19WnSZMyPMjUFrEElrtpHjNzc7ccS29yUK57-F_jdde7Y5tTZKlwO_7FdyVVkJA/s1600/Natt2018+%25282%2529+%25281%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;202&quot; data-original-width=&quot;670&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9pzwV9JgkmKB2p5ty5wmIMir94LU1InrfqjBUUnIlJhNbKctDcZU8pKoY0uHyz4y1stXAdYSXKov2Y19WnSZMyPMjUFrEElrtpHjNzc7ccS29yUK57-F_jdde7Y5tTZKlwO_7FdyVVkJA/s1600/Natt2018+%25282%2529+%25281%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2019/01/fingertec-software-makes-way-for.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT6E8hWMwx3bswQw_g4pZcxoK0XPGA50XvHOwwz1YmO6x7nDtLoCVxcnpdSqpYrFouFZ1OiEZEkWt13IwGowIcW14G9SkBOb9d0SiougqVkf5FTadKTaTjCmLrpig5CuvVvlUp9ELIMthc/s72-c/10-Reason.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-6024812673153079555</guid><pubDate>Thu, 25 Oct 2018 08:35:00 +0000</pubDate><atom:updated>2019-09-26T15:04:05.217+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BLE</category><category domain="http://www.blogger.com/atom/ns#">BLE-2</category><category domain="http://www.blogger.com/atom/ns#">minimalist</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">TimeTec Security</category><title>Security Redefined for the Minimalists</title><description>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNEYtMqblD0RIYVpSYdMP3-eDUVb3YUb7X2i0AQrb7qR5NcEDba4JPFYpqCJ2KhcQlTeHZub9d2hfnaeO_WEGqAyiZuz-3uzKq5imuf_Lf0_OArLrC0q-ERIswrNCT9vlUMcabu15UvQeO/s1600/ble2+%25283%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;600&quot; data-original-width=&quot;768&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNEYtMqblD0RIYVpSYdMP3-eDUVb3YUb7X2i0AQrb7qR5NcEDba4JPFYpqCJ2KhcQlTeHZub9d2hfnaeO_WEGqAyiZuz-3uzKq5imuf_Lf0_OArLrC0q-ERIswrNCT9vlUMcabu15UvQeO/s1600/ble2+%25283%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
What comes to mind when one thinks of security? The image of a heavily guarded premises with tough and muscular bodyguards enters the mind. This kind of representation is not totally wrong though. Security has always been associated with iron shields, vaults, locks and bolts; the image of bravery and security. Nevertheless, secured premises shouldn’t exude cold and uninviting vibe, especially for businesses that rely on the customers presence.&lt;br /&gt;
&lt;br /&gt;
TimeTec BLE-2 and TimeTec Security App duo present a more welcoming feeling that matches the open and minimalistic feature in which modern companies are striving for without compromising the security at all. TimeTec BLE-2 controller can seamlessly be installed out of sight and the system shifts the control entirely to TimeTec Security App on the mobile. Simply connect TimeTec BLE-2 to TimeTec Security and unlock the doors straight from the App via 4 options: Tap to Unlock, Voice Command, Auto Unlock and scan QR Code. Through bluetooth low energy connection, the Mobile App will then send the command to TimeTec BLE-2 controller to unlock the door as well as keep the transaction details for future reference.&lt;br /&gt;
&lt;br /&gt;
Simplicity and minimalist feature of TimeTec BLE and TimeTec Security redefine security for the modern days. Security doesn’t have to be rigid and uninviting, choose TimeTec for a secure, cozy and inviting work premises.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe width=&quot;320&quot; height=&quot;266&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/iEQgh3dFuhM/0.jpg&quot; src=&quot;https://www.youtube.com/embed/iEQgh3dFuhM?feature=player_embedded&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
To enquire or purchase TimeTec BLE-2, contact &lt;a href=&quot;mailto:info@fingertec.com&quot; target=&quot;_blank&quot;&gt;info@fingertec.com&lt;/a&gt; today and enjoy 20% off, offer ends 31 December 2018.&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2018/10/security-redefined-for-minimalists.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNEYtMqblD0RIYVpSYdMP3-eDUVb3YUb7X2i0AQrb7qR5NcEDba4JPFYpqCJ2KhcQlTeHZub9d2hfnaeO_WEGqAyiZuz-3uzKq5imuf_Lf0_OArLrC0q-ERIswrNCT9vlUMcabu15UvQeO/s72-c/ble2+%25283%2529.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-4018489537643360271</guid><pubDate>Fri, 28 Sep 2018 07:26:00 +0000</pubDate><atom:updated>2018-09-28T15:26:24.194+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ACaaS</category><category domain="http://www.blogger.com/atom/ns#">Access Control as a Service</category><category domain="http://www.blogger.com/atom/ns#">best biometrics</category><category domain="http://www.blogger.com/atom/ns#">biometrics cloud</category><category domain="http://www.blogger.com/atom/ns#">Cloud solutions</category><category domain="http://www.blogger.com/atom/ns#">face recognition</category><category domain="http://www.blogger.com/atom/ns#">fingerprint system</category><title>How Does Biometrics Fare Going Forward? </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUjdvlXzzA6HH2RFD4Olqov9rXqlStlsvzAirLT76igLkO5ATsat4irJr3HloyR8624YaeLud5e2R2R5GpFT4XXS3a8ZophOZDTZjUVEcW9nMhm20ygO2zXWDfWHFfLpAA8_jIDxdgkHEk/s1600/bg-faceidx.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;563&quot; data-original-width=&quot;1000&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUjdvlXzzA6HH2RFD4Olqov9rXqlStlsvzAirLT76igLkO5ATsat4irJr3HloyR8624YaeLud5e2R2R5GpFT4XXS3a8ZophOZDTZjUVEcW9nMhm20ygO2zXWDfWHFfLpAA8_jIDxdgkHEk/s640/bg-faceidx.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Commercial biometrics system continues to show growth in years to come. The CAGR for the global biometrics system market is reported at an impressive 16.3% and the main factor for this prediction comes from strong support by the government worldwide to embrace biometrics system deployment in departments and organizations. The increasing demand for better security to combat unauthorized access and attendance fraud is also another factor contributing to the growth. The fact that biometrics is suitable and applicable to varied sectors which includes government, military, transport, logistics, safety &amp;amp; security, healthcare, banking, and so forth, will definitely continue to contribute in the growth as well. Adoption of the biometrics market in smartphone, PCs, and banks also helps to propel the growth of the biometrics market.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Based on the top findings of the IBM Security’s new “Future of Identity Study,” having surveyed nearly 4,000 adults around the globe, Biometrics is becoming mainstream. The study found that 67% of respondents are comfortable using biometrics authentication today, while 87 percent say they’ll be comfortable with these technologies in the near future. And, Millennials are moving beyond passwords. While 75 percent of millennials (respondents between the ages of 20 and 36) are comfortable using biometrics today, less than half are still using complex passwords and 41 percent reuse passwords to access numerous accounts. Older generations showed more care with password creation but were less inclined to adopt biometrics and multi-factor authentication. (Reference: https://securityintelligence.com/new-ibm-study-consumers-weigh-in-on-biometrics-authentication-and-the-future-of-identity/)&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The rosy outlook on biometrics has provided industry players with a promising future, however, complacency has no place in this competitive market. For a brand to stay relevant, it needs to elevate the offerings in order to serve the demands of the current and future market. Due to the growing demands from the government sector, it’s a pressing matter for manufacturers to start offering mammoth-capacity options or solutions to fulfill the huge requirements of the projects. And, with these gigantic-sized government projects, the accompanying solution has to cater to the large requirements and perform at its best or risk major hiccups in its implementation. In addition, in other industries, employee mobility is becoming a norm, and the mounting adoption of mobile solutions in the market has created new demands on features such as data centralization, flexible system operation, real-time data &amp;amp; reports, fast respond, additional mobile apps for mobility and the list of requirements is growing. Therefore, geared towards the future, TimeTec will be launching the Face ID X with bigger capacity and better performance to fulfill a larger installation, and on top, TimeTec has been preaching cloud since 2014 in preparation for the incoming demands for flexible and subscription-based solutions.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://www.timetecta.com/&quot; target=&quot;_blank&quot;&gt;TimeTec TA&lt;/a&gt; caters for cloud-based time attendance solution for the workforce that offers not only integration with FingerTec biometrics, but it is also loaded with other clocking options such as GPS clocking, Wifi clocking, Beacon clocking and NFC for a versatile attendance clocking system. TimeTec TA is gaining traction in the market due to its effectiveness, affordability and the addition of its mobile solution that comes with the system as a value-added feature. TimeTec TA elevates biometrics solution to another level which enables an array of possibilities in the deployment.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
For access control, &lt;a href=&quot;http://www.timetecaccess.com/&quot; target=&quot;_blank&quot;&gt;TimeTec Access&lt;/a&gt;, a mobile authentication cloud-based door access system, is THE solution. With the combination of biometrics, IoT hardware, and cloud solution, TimeTec Access will enable more effective management of access control straight from any Web Browser and operation through Smartphone App. The implementation of TimeTec Access with biometrics will provide companies with remote monitoring ability and instant data &amp;amp; report at all times, and in a long run improves the ROI for the overall door access management.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt5w5foSpopQ6jTgd-YGFwbxOq4Ycb2VafMT5rJbg6-7OQfaRlCgs9tLyIx5655cVJxeBMNmcNj7uiBR-wOKTTS0czB3vnX7DVQfrBytgO_21dSG8onSKf7SPOvrGgSvlHrMY3oA8XM3gC/s1600/img01+%25281%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;274&quot; data-original-width=&quot;478&quot; height=&quot;366&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt5w5foSpopQ6jTgd-YGFwbxOq4Ycb2VafMT5rJbg6-7OQfaRlCgs9tLyIx5655cVJxeBMNmcNj7uiBR-wOKTTS0czB3vnX7DVQfrBytgO_21dSG8onSKf7SPOvrGgSvlHrMY3oA8XM3gC/s640/img01+%25281%2529.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Biometrics is here to stay but in order to stay relevant and forward-looking, a brand has to provide a Unique Selling Proposition (USP) and be able to satisfy the current requirements and more. Explore &lt;a href=&quot;http://www.fingertec.com/&quot;&gt;www.fingertec.com&lt;/a&gt; to find out more.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXG03q0vHjau4zGg_60iuSFqm3JIB4h-KQbWt-Pd81Q5fxZWC-_UjZsYgsceKoa55lUCBZYPC5Awek0k0tue1mMqqRYspfOYqfW_UsKAYBn-CdudCKYFotBSv8Cq190raui-la-aYhKpq4/s1600/Norana2018.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;193&quot; data-original-width=&quot;640&quot; height=&quot;193&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXG03q0vHjau4zGg_60iuSFqm3JIB4h-KQbWt-Pd81Q5fxZWC-_UjZsYgsceKoa55lUCBZYPC5Awek0k0tue1mMqqRYspfOYqfW_UsKAYBn-CdudCKYFotBSv8Cq190raui-la-aYhKpq4/s640/Norana2018.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2018/09/how-does-biometrics-fare-going-forward.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUjdvlXzzA6HH2RFD4Olqov9rXqlStlsvzAirLT76igLkO5ATsat4irJr3HloyR8624YaeLud5e2R2R5GpFT4XXS3a8ZophOZDTZjUVEcW9nMhm20ygO2zXWDfWHFfLpAA8_jIDxdgkHEk/s72-c/bg-faceidx.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-557294647144004666</guid><pubDate>Tue, 04 Sep 2018 07:19:00 +0000</pubDate><atom:updated>2019-09-26T15:16:03.569+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">access via smartphone</category><category domain="http://www.blogger.com/atom/ns#">BLE</category><category domain="http://www.blogger.com/atom/ns#">bluetooth</category><category domain="http://www.blogger.com/atom/ns#">bluetooth low energy</category><category domain="http://www.blogger.com/atom/ns#">key smartphone</category><category domain="http://www.blogger.com/atom/ns#">smartphone access</category><category domain="http://www.blogger.com/atom/ns#">smartphone key</category><title>A Little Black Box of Possibilities</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9o-GZjKMdJb9W2I2b7_nqUKyGVEihFnxTLVUu4tRD3vZcqEm2LpobOZhYyCpFe1iFHQTiQofDpUdnFKMmHsB5Y7nxngZTnfcX_XdwQkcNJCvaE-dv3aE4AXc3KIFzq5BeqCoR3SHjUQMv/s1600/ble2+%25282%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;1000&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9o-GZjKMdJb9W2I2b7_nqUKyGVEihFnxTLVUu4tRD3vZcqEm2LpobOZhYyCpFe1iFHQTiQofDpUdnFKMmHsB5Y7nxngZTnfcX_XdwQkcNJCvaE-dv3aE4AXc3KIFzq5BeqCoR3SHjUQMv/s640/ble2+%25282%2529.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Credentials on a smartphone have been used widely since a few years back with the introduction of barcodes for access in cinemas. At the onset of this trend, cinema assistants would scan the code on your phone before permission was given to enter the movie theater. After some time, cinemas started using QR code so moviegoers can do it themselves by scanning the QR code to access the flap barriers.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
This practice somehow introduces smartphone access slowly but steadily to the masses.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Taking it a step further, TimeTec is now offering door access via smartphone App, TimeTec Security to the market. Just by using TimeTec Security App, a user can access doors and barriers via a smartphone. Not only that you can tap to unlock the door, the App also offers another 3 ways of unlocking method to suit your preference. The introduction of TimeTec Security App replaces the function of a credential and now, the keys to your room are your smartphone. But how would a smartphone App knows which door to open?&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
All of this smart access control is made possible by a little black box known as TimeTec BLE-2. This is a Bluetooth Low Energy controller that makes the connection between the App and the lock possible through BLE signal. The process is simple, install the BLE-2 and connect it with the smartphone as well as configure the door settings via the App. The admin of the locks will then be able to provide access to those authorized, and the App can even contain many locks at once. The deployment of BLE-2 in door access control is not only simple, it’s affordable and the control of it is portable. TimeTec BLE-2 controller is likewise designed to be compatible with access barriers for human traffic and vehicle traffic.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV5Pck_MX78tCVb97mABsl00RKCqE-PRRoGuyXcknmphzeg5KNAHnTdG7XzNE6YhXeqccBitJwEaGqHKUMBKl1oStHvtBvhyphenhyphenR076XMeHHhPNO0tP6E0_9y6vabORb8tQKN0ghE-FDSVqv1/s1600/sept.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;503&quot; data-original-width=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV5Pck_MX78tCVb97mABsl00RKCqE-PRRoGuyXcknmphzeg5KNAHnTdG7XzNE6YhXeqccBitJwEaGqHKUMBKl1oStHvtBvhyphenhyphenR076XMeHHhPNO0tP6E0_9y6vabORb8tQKN0ghE-FDSVqv1/s1600/sept.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Watch these videos for more information about TimeTec BLE-2 and TimeTec Security.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;iframe width=&quot;320&quot; height=&quot;266&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/cS2-jaJgHG4/0.jpg&quot; src=&quot;https://www.youtube.com/embed/cS2-jaJgHG4?feature=player_embedded&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;iframe width=&quot;320&quot; height=&quot;266&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/iEQgh3dFuhM/0.jpg&quot; src=&quot;https://www.youtube.com/embed/iEQgh3dFuhM?feature=player_embedded&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3iqTlYCrPKN7_FzOu6hIz5jeB1mBwn1LVDNqfMFmh0bp0wLHPaX3qRcbMwZC1JwB-Y6ZbqR4ww0bpNd5c0lQP9DbebZQjI681pVPHKUrGzXrjHPcVDHOmdvnBJaTV_Lc1pQnJLevAHGl9/s1600/Norana2018+%25283%2529+%25281%2529+%25282%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;193&quot; data-original-width=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3iqTlYCrPKN7_FzOu6hIz5jeB1mBwn1LVDNqfMFmh0bp0wLHPaX3qRcbMwZC1JwB-Y6ZbqR4ww0bpNd5c0lQP9DbebZQjI681pVPHKUrGzXrjHPcVDHOmdvnBJaTV_Lc1pQnJLevAHGl9/s1600/Norana2018+%25283%2529+%25281%2529+%25282%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2018/09/a-little-black-box-of-possibilities.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9o-GZjKMdJb9W2I2b7_nqUKyGVEihFnxTLVUu4tRD3vZcqEm2LpobOZhYyCpFe1iFHQTiQofDpUdnFKMmHsB5Y7nxngZTnfcX_XdwQkcNJCvaE-dv3aE4AXc3KIFzq5BeqCoR3SHjUQMv/s72-c/ble2+%25282%2529.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-8527617657978012939</guid><pubDate>Tue, 26 Jun 2018 06:25:00 +0000</pubDate><atom:updated>2018-06-26T14:27:24.867+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ACaaS</category><category domain="http://www.blogger.com/atom/ns#">Access Control as a Service</category><category domain="http://www.blogger.com/atom/ns#">access via mobile phone</category><category domain="http://www.blogger.com/atom/ns#">access via smartphone</category><category domain="http://www.blogger.com/atom/ns#">new access control</category><category domain="http://www.blogger.com/atom/ns#">timetec access</category><title>Exploring Access Control in the Smartphone World with TimeTec Access</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: inherit; margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsOCn9sgroqBZowAHuUX50mZVxzQCXIKZ3s_GgwGsWRj6VfwV9rwiRXS7PjmXYTjvOvPJ4lW9DUw6gKSerhaJhl0RZuhFIsJngPpgqqkzUJ0MNj4kTIj_xkmVyr2HZP1M0YTKpOzeRceMk/s1600/annie-spratt-294450-unsplash.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1054&quot; data-original-width=&quot;1600&quot; height=&quot;421&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsOCn9sgroqBZowAHuUX50mZVxzQCXIKZ3s_GgwGsWRj6VfwV9rwiRXS7PjmXYTjvOvPJ4lW9DUw6gKSerhaJhl0RZuhFIsJngPpgqqkzUJ0MNj4kTIj_xkmVyr2HZP1M0YTKpOzeRceMk/s640/annie-spratt-294450-unsplash.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Technology has always brought about change to various industries, and one of the industries impacted by technology is indeed Access Control. The industry has been dominated by smart card deployment and later on, disrupted by biometrics technology, freeing consumers from physical keys dependency. And recently, its development has been more focused towards the wireless market with the adoption of smartphone credential, Bluetooth technology and the usage of Near Field Communication technology is omnipresent in today’s default smartphones. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;According to a research, it is projected that by the year 2020, the number of smartphone users will hit 6.1 billion from the current 2.5 billion users worldwide. There is without a doubt a fast growing and maturing wireless market out there, signalling the importance of mobile device integration for the existing market and beyond, for all kinds of system deployment. When almost everything can be accomplished via the smartphone ’s interconnectedness, access control is left without a choice but to explore its advantages. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjo8OvbDMuaVtzj2IF4lxnprbBQXwslhwBPwRcMP7bh0q-JNKbSVyok3uHyUjL2cn9yDxpcMsx-vrxj0-Gs_yGZ2VmNW0CY8PylLk3RUqIyBNnWSQ8BJc38B2_7Yn-eFEP35h_ptQLYcKfq/s1600/Screen+Shot+2018-06-26+at+2.15.08+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;622&quot; data-original-width=&quot;791&quot; height=&quot;502&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjo8OvbDMuaVtzj2IF4lxnprbBQXwslhwBPwRcMP7bh0q-JNKbSVyok3uHyUjL2cn9yDxpcMsx-vrxj0-Gs_yGZ2VmNW0CY8PylLk3RUqIyBNnWSQ8BJc38B2_7Yn-eFEP35h_ptQLYcKfq/s640/Screen+Shot+2018-06-26+at+2.15.08+PM.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #3d85c6; font-size: 16px;&quot;&gt;Understanding Access Control as a Service, ACaaS&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #3d85c6; font-size: 16px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The trend now is no longer only about convenience in the way we open doors, it has been extended to the convenience of managing the entire spectrum of access control system. Adoption of mobile credential allows door owners to keep digital records of all access activities occurring in his/her premises and on top of that, smartphone credential can be assigned securely via temporary passes issued for certain individuals and for a limited time only, complete with detailed access records. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;And the more important factor that enables all these is the introduction of Access Control as a Service or ACaaS. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Take &lt;a href=&quot;https://www.timetecaccess.com/&quot; target=&quot;_blank&quot;&gt;TimeTec Access&lt;/a&gt;, for example, this solution offers a more simplified version of hardware that has to remain on site; however, the software and all servers will be removed from the customer’s premises and will be managed through cloud servers, with smartphones acting as a major access credential replacing cards and fingerprints. Access credentials or traditionally known as keys to open doors has evolved significantly and with the power of cloud computing and mobile technology; the credential management for physical access control system has been shifted to a smartphone without any hassle because let’s be honest, people are stuck with their smartphones most of the time these days. &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Along with smartphone comes access control Apps that are taking over major access control features effortlessly. Important controller features like interlocking, anti-passback and global anti-passback and many more are now switched over to the Application in the smartphones for convenience and better control. Smartphone credential also offers viewing of activity logs and much more in real-time as well as with so much convenience; it is even possible for a mere normal user to view his/her own activity logs through his/her smartphone, and users can preset all access levels and rights via their individual smartphone. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Another important issue handled by the ACaaS would be data security because the server facilities are located remotely and renowned data centres usually are heavily guarded with video surveillance and other tight security measures to ensure that the data is far from harm and penetration attempts. Cloud-based system allows authorized individuals to access and control from anywhere in the world through the standard internet communications protocols, WiFi or Ethernet infrastructure and using cloud-based access control system, users can utilize the Web Browser or Mobile App to manage access or unlock doors from a distance. By using smartphone access credentials to unlock doors, the Cloud-Based Door Controller authenticates on location and allows access.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Every event at every access point provides a communication report to the Cloud Server allowing monitoring of all facilities in real-time seamlessly. &amp;nbsp;While traditional access control system usually needs to station individual server in each premise for the company that operates in multiple locations, the cloud system can centralize and manage multiple locations’ access control system from one centralized location only, providing a truly convenient modern solution. All communications from TimeTec Access Control System Server are secured with 256-bit AES encryption and through the use of Secure Sockets Layer (SSL) protocol. SSL provides endpoint authentication and communication privacy – preventing eavesdropping, tampering and message forgery. The cloud-based system is built on an open-source platform that is flexible. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhU4YSavWSvUUQPxr7FVChTqlyux0IQoLC-VI2LrAe2O8QTlegZX9MJUDnTRKR3zxTCkVYlbkGJtSuhBwEyR5jRBxpKaJfzAP-Mby-E9W42J2K7U_1ZTTr2M174b26s6qLqcasHso3laMiV/s1600/Integrated_diagram.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1140&quot; data-original-width=&quot;1140&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhU4YSavWSvUUQPxr7FVChTqlyux0IQoLC-VI2LrAe2O8QTlegZX9MJUDnTRKR3zxTCkVYlbkGJtSuhBwEyR5jRBxpKaJfzAP-Mby-E9W42J2K7U_1ZTTr2M174b26s6qLqcasHso3laMiV/s640/Integrated_diagram.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #3d85c6; font-family: inherit;&quot;&gt;Be Secured Without Putting A Hole in Your Account&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;You can implement the solution at the smallest scale, like managing a single door opening at a single location or you can add hundreds of locations and thousands of doors using one system to provide a globally distributed multi-location access control system. The cloud-based access control system does not require huge capital investments because the cloud solution usually offers a monthly or annual subscription pricing model. Hence, the cost of deployment has been reduced to a bare minimum with no hefty contract obligations.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;TimeTec Access deployment incurs a low total investment particularly for facilities with low door count because you neither need to invest in any servers nor the maintenance that comes with it. TimeTec Access is cloud-based, which makes implementation of this solution at various locations with centralized control feasible with minimal equipment. You only pay for what you use, and the price does not fluctuate for a small deployment or a large one because the costs for a cloud-based solution like Time Access are moved from capital expenses to operating expenses. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;TimeTec Access has a highly reliable data centres to maintain entry/exit logs and we maintain a rules-based alert to ensure exception situations get addressed appropriately and in time. TimeTec Access allows system management from anywhere in the world and from any locations. You can manage thousands of credentials and doors, create logical groups across physical locations and manage access schedules in real-time seamlessly and without any worry. Gone were the days where one lost credential could cause havoc and require physical presence to solve it. Application and data in TimeTec Access are hosted in physically secure co-location facilities and we have redundant servers to ensure better uptime and no data loss. All communications are highly encrypted and TimeTec Access deploys our patent-pending two-layer authentication, first in-App verification and followed by a BLE authentication for a secure access.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUgopbH6IIhKFRRSzx9yh5GO7E4t2Qa6e2qn8kQ4M2ERI3jaWGanpnsUk-Az9_vaDKNAXMI1_AGdQi90kf187aEJVO_cfGyYl6MAIX64l_wIuXhDaB6SCKLOnAC83cVzAOB913HgG0ZVVu/s1600/Screen+Shot+2018-06-26+at+2.20.28+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;662&quot; data-original-width=&quot;1135&quot; height=&quot;372&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUgopbH6IIhKFRRSzx9yh5GO7E4t2Qa6e2qn8kQ4M2ERI3jaWGanpnsUk-Az9_vaDKNAXMI1_AGdQi90kf187aEJVO_cfGyYl6MAIX64l_wIuXhDaB6SCKLOnAC83cVzAOB913HgG0ZVVu/s640/Screen+Shot+2018-06-26+at+2.20.28+PM.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Using smartphone as a credential for access control is just the beginning of what’s to come. Developers are using the technology to input more features, making the application more sophisticated and secure than ever and some allow access via proximity, &amp;nbsp;some tap on voice control, and the possibilities are endless. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Explore TimeTec Access and &lt;a href=&quot;http://www.timetecsecurity.com/&quot; target=&quot;_blank&quot;&gt;TimeTec Security&lt;/a&gt; to understand the future of access control. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirqIe5JDMftqZITz4kyUNeK6uJS8hLXkLEQcmeAzOn8Jx1uCqYHQ9G9vT3j7YhBzsyUaqUrSqdhaCSo_5YdcGk4Htmyw8k-4LcvHl_OAnKTM75Z2prGcVpbEaGjmfasU6XaWEi5CJQpRCj/s1600/Norana2018+%25283%2529+%25281%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;202&quot; data-original-width=&quot;670&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirqIe5JDMftqZITz4kyUNeK6uJS8hLXkLEQcmeAzOn8Jx1uCqYHQ9G9vT3j7YhBzsyUaqUrSqdhaCSo_5YdcGk4Htmyw8k-4LcvHl_OAnKTM75Z2prGcVpbEaGjmfasU6XaWEi5CJQpRCj/s640/Norana2018+%25283%2529+%25281%2529.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://www.fingertecblog.com/2018/06/exploring-access-control-in-smartphone.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsOCn9sgroqBZowAHuUX50mZVxzQCXIKZ3s_GgwGsWRj6VfwV9rwiRXS7PjmXYTjvOvPJ4lW9DUw6gKSerhaJhl0RZuhFIsJngPpgqqkzUJ0MNj4kTIj_xkmVyr2HZP1M0YTKpOzeRceMk/s72-c/annie-spratt-294450-unsplash.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-405463782094016626</guid><pubDate>Fri, 22 Jun 2018 06:00:00 +0000</pubDate><atom:updated>2018-06-22T14:00:52.349+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">biometric system</category><category domain="http://www.blogger.com/atom/ns#">cheap cloud solutions</category><category domain="http://www.blogger.com/atom/ns#">cloud adoption in office</category><category domain="http://www.blogger.com/atom/ns#">cloud solution in office</category><category domain="http://www.blogger.com/atom/ns#">technology for office</category><category domain="http://www.blogger.com/atom/ns#">technology office</category><title>Warm Up To Technology for A More Effective Workplace</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzEbTaSGK0fFVV-oQWCMbujK7xcsGE08Kr4ISK860PW9V6NYmtksebiKR8BUpJLJ1EZ-Hg53uFihL6NG9YevEif-Vg1LSfVIVBjNS-eq0sPCHopVCYF_5cL21J4LN_iGv70x7SChQHwEkY/s1600/achievement-agreement-arms-1068523.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1047&quot; data-original-width=&quot;1600&quot; height=&quot;418&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzEbTaSGK0fFVV-oQWCMbujK7xcsGE08Kr4ISK860PW9V6NYmtksebiKR8BUpJLJ1EZ-Hg53uFihL6NG9YevEif-Vg1LSfVIVBjNS-eq0sPCHopVCYF_5cL21J4LN_iGv70x7SChQHwEkY/s640/achievement-agreement-arms-1068523.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Many SMEs shy away from the latest available technologies because most of them are comfortable in doing business the conventional way; not keen on spending more money on software and tools, believing that “if it ain’t broke, don’t fix it”. After spending many years in this business, I learned that it wasn’t easy for customers to switch from one solution to another, let alone wanting to do it voluntarily. Most were reluctant to pick up on new things, holding on to the motto that familiar is always better, when more often than not, it proved otherwise. When FingerTec decided to change the bundled software from the ‘primitive’ FoxPro TCMS V2 to the more advanced TCMS V3, it was a struggle for us to persuade our customers to switch over. The process took us over a year and still, many hoped that the previous system remains. In fact, if SMEs are confident enough to deploy technological advancement in their daily processes, it would bring about a lot of advantages to their business operation for various obvious reasons.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;I lived through the 90s and the early 2000s when telephone lines and facsimile were the two major communication tools in the office and companies spent a huge sum of money paying the bills. Communications with clients were limited to conversations over the phone or face-to-face meetings which proved to be even more costly if the distance between you and the potential customers is great because it adds other costs into the equation such as hotel expenses, meeting rooms, meals, and etc. Let’s face it, the recent technology does not only improves communication, it does so much to improve business’s operations for SMEs and more.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Instead of being indifferent and having a nonchalant attitude towards technology, SMEs need to warm up to technology in order to carve a better future.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;How so?&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;With so many readily available communication tools in the market, technology has changed communication in a big and inexpensive way possible. When in the 90s and early 2000s, the cost of one very short SMS was close to USD0.10, nowadays you can communicate for hours without having to take the cost into consideration. Physical presence is not required anymore when the team can be connected via the likes of WhatsApp, Skype, Quip; making it possible for businesses to be effective, and be able to break that barrier of conducting a&amp;nbsp; ‘formal meeting’ because what’s more important for the SMEs is to get things done quickly and correctly, rather than the formality of things.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Technology can also assist SMEs in keeping things organized, sharing resources and assigning responsibility in a more systematic way by deploying project management software for example or simply utilizing Google Drive for easy collaboration and sharing of resources in real-time and increasing productivity in a major way.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;On the other hand, deployment of Software as a Service, SaaS like &lt;a href=&quot;http://www.timetecta.com/&quot; target=&quot;_blank&quot;&gt;TimeTec TA&lt;/a&gt; for Employee Attendance Management or &lt;a href=&quot;http://www.timetecleave.com/&quot; target=&quot;_blank&quot;&gt;TimeTec Leave&lt;/a&gt; for Employee Leave Management simplifies and makes an operation more effective. SaaS usually is designed to promote automation and by having these tools in the workplace, the operation cost can be reduced significantly thus saving more costly and important resources for the company. In terms of the workers, they can likewise be tasked with different and more difficult tasks which can’t be accomplished via automation. On top of that, automation provides more accurate results and contains audit trail for easy tracking of information whenever the business requires. In short, SaaS tools do not only reduce the overall operation costs, it also provides efficiency that many SMEs are in dire need of.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTS-iO-LXsRm7h1EU4No2-XI3fezvK_3ZQptxed37_Vlkyr1RaHvHggDsDnJLnwMajnUgC-VJSy1SpRSv6dKcKYyxIlP1Ty_piJ71Y5SCt7bCgXIdnYlB1tqd20wqKAP8K_FI985unVuCT/s1600/Screen+Shot+2018-06-22+at+1.39.24+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;553&quot; data-original-width=&quot;1415&quot; height=&quot;250&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTS-iO-LXsRm7h1EU4No2-XI3fezvK_3ZQptxed37_Vlkyr1RaHvHggDsDnJLnwMajnUgC-VJSy1SpRSv6dKcKYyxIlP1Ty_piJ71Y5SCt7bCgXIdnYlB1tqd20wqKAP8K_FI985unVuCT/s640/Screen+Shot+2018-06-22+at+1.39.24+PM.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Advancement in security technology is another breakthrough that provides advantages to the workplace with the adoption of smart card and biometrics for access security. The &lt;a href=&quot;http://www.fingertec.com/&quot; target=&quot;_blank&quot;&gt;biometrics technology&lt;/a&gt; only allows authorised personnel to enter restricted areas by having their credentials verified, and all the verifications come with accurate records that are kept in the system for the longest time. Apart from access control, biometrics has penetrated other areas as well as PC access, time clocking and many more. And when the transaction data can be stored in the cloud, the tampering of the data is not possible, providing businesses with comfort over its security issues.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwijo1l4lGoDKe6PbR6Xwnw9iJdwM_NbnzcSWLHdrmHhwBi6xKUDR_aDR4Oe_C1A-2PzQbspkl6But5UKcZ4RwemRRV7uh_PBiZTX4xrsY9MunchlZjMZVCLUasBDHp2O8_ir2GZeMCOqo/s1600/R3_Ads_P1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;1000&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwijo1l4lGoDKe6PbR6Xwnw9iJdwM_NbnzcSWLHdrmHhwBi6xKUDR_aDR4Oe_C1A-2PzQbspkl6But5UKcZ4RwemRRV7uh_PBiZTX4xrsY9MunchlZjMZVCLUasBDHp2O8_ir2GZeMCOqo/s400/R3_Ads_P1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Another good thing that technology brings is its customizing option. Let’s face it, not one commercialized solution is designed to fit any company like a glove, but with a little tweak here and there, companies can further exploit the technology to better serve their businesses. With the right cost and development time, customization option could benefit SMEs tremendously. The availability of technology presented to us in this time and age has enabled remote working, teleconferencing and co-working space which has completely reshaped the workplace. Everything is literally at the tip of your fingers with the availability of mobile and cloud technology.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Who would have thought that now I could communicate with my client in India or Germany or Lebanon without having to spend a bomb on phone bills? On top of WhatsApp, occasionally we do ‘face-to-face’ Skype video conferencing as well as share resources online accessible across the world by our customers.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;All in all, the impact of technology in the workplace is amazing and rewarding, and it changed the conventional way workplaces used to run. Businesses cannot shy away from or ignore technology, the leaders need to keep up and warm up to it in an efficient manner. Implementation of new technological solutions such as TimeTec and FingerTec biometrics can ensure optimal profitability and productivity at their workplace, hands down.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn4fjkB5OpSf2kQndhchVYwfSWukZkeIc8kJwp6Di9PH8FAZRY4ASVooa3Brfeb9sYd2OAEifmC_2eWE9th31t_fAeOt7-j6QC7bNhn5n04EgHkdU4HGzGX1IqYth3D9hWUrD4vLXWGHYW/s1600/Norana2018+%25283%2529+%25281%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;202&quot; data-original-width=&quot;670&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn4fjkB5OpSf2kQndhchVYwfSWukZkeIc8kJwp6Di9PH8FAZRY4ASVooa3Brfeb9sYd2OAEifmC_2eWE9th31t_fAeOt7-j6QC7bNhn5n04EgHkdU4HGzGX1IqYth3D9hWUrD4vLXWGHYW/s640/Norana2018+%25283%2529+%25281%2529.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://www.fingertecblog.com/2018/06/warm-up-to-technology-for-more.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzEbTaSGK0fFVV-oQWCMbujK7xcsGE08Kr4ISK860PW9V6NYmtksebiKR8BUpJLJ1EZ-Hg53uFihL6NG9YevEif-Vg1LSfVIVBjNS-eq0sPCHopVCYF_5cL21J4LN_iGv70x7SChQHwEkY/s72-c/achievement-agreement-arms-1068523.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-2748555362798683893</guid><pubDate>Tue, 20 Mar 2018 06:49:00 +0000</pubDate><atom:updated>2018-03-20T14:49:06.178+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">attendance automation</category><category domain="http://www.blogger.com/atom/ns#">Attendance solution</category><category domain="http://www.blogger.com/atom/ns#">best attendance solution</category><category domain="http://www.blogger.com/atom/ns#">best biometrics</category><category domain="http://www.blogger.com/atom/ns#">biometrics</category><category domain="http://www.blogger.com/atom/ns#">fingerprint</category><category domain="http://www.blogger.com/atom/ns#">workforce management</category><title>Lean on Biometrics for Efficient Workforce Management </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCvBM6SkYMEpbaPypI5NBxO9JkBo486Dr4eLgRCwwYJkBVGwPDTcvy_FWdty_tExrm05_3G4FY2dWp5ZMewPzLzGcxTKZkERYZ9YpzQEAZ3mSPrLYdbSG-cC3_r2uYfwWvjeT2vVWbTfk-/s1600/BlogLean.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;500&quot; data-original-width=&quot;800&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCvBM6SkYMEpbaPypI5NBxO9JkBo486Dr4eLgRCwwYJkBVGwPDTcvy_FWdty_tExrm05_3G4FY2dWp5ZMewPzLzGcxTKZkERYZ9YpzQEAZ3mSPrLYdbSG-cC3_r2uYfwWvjeT2vVWbTfk-/s640/BlogLean.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: helvetica neue, arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;Biometrics technology measures physical and behavioral characteristics to verify an individual’s identity and the patterns can be anything from fingerprint, facial, voice, palm print, and voice recognition. According to a report by Report Linker, global biometrics market stood at $12.84 billion in 2016 and is projected to reach $29.41 billion by the end of 2022. The increase in biometrics use is observed due to its adoption in an array of recent solutions which include mobile payment, online banking, immigration services, IoT, wearable devices, on top of the existing workforce management, e-Government processes and many more. In general, biometrics-based technology has been largely accepted by the general public due to its feasibility/affordability, and fingerprint technology leads the way by 91% market share as reported by French research firm Yale which finds that fingerprint-based biometrics dominated the $4.45 billion global biometrics market in 2016. 

&lt;b&gt;Biometrics Technology Improves Staff Efficiency &lt;/b&gt;
Biometrics-based technology such as fingerprint verification and facial recognition has been proven to be user-friendly and more reliable than other verification methods such as cards and password systems, and it was introduced to the workforce management system to streamline the collection of attendance data from manual to automated, in addition to some value-added advantages. Hence, the number of biometrics technology deployment as an authentication method for workforce management solutions has increased tremendously over the last 20 years for one simple yet crucial objective of any company: to improve bottom line profitability with better workforce management.

&lt;b&gt;Biometrics Technology Automates Data Collection&lt;/b&gt;
Employees are hired for their different skill sets and this applies to any corporation, organization or government department. Therefore, it’s important for a workforce management system to be able to quantify the amount and types of labor needed to accomplish certain jobs on a daily or hourly basis. By installing biometrics solution that ties to the correct scheduling, employee pay class, and work codes, data collection can be done automatically and accurately thus saving the company not only money but a lot of time as well. With biometrics-based technology, employees can move fluidly throughout the day based on their job tasks or schedule, yet the management doesn’t lose control of the most important matter, time and task performed. 

&lt;b&gt;Biometrics Prevent Time Theft&lt;/b&gt;
Time theft at work is common and is causing companies annual lost in the billions. Some employees steal time intentionally and some don’t even realize that they are doing it because they always fail to see the value of 10-15 minutes extra break a day to the company’s bottom line profitability. Time theft at work happens when an employer has to pay a salary for the work hours that the employee hasn’t even served. For example, if you have a staff making $10 an hour and he has an average short of 2 hour weekly, that adds up to $960 a year of lost time and company money, and that number could simply multiply if there is no effective solution being placed to curb it. Biometrics is designed to measure the features of the body that are unique to each person. They offer greater accuracy in attendance whereby it eliminates “buddy punching” occurrences automatically. 
&lt;b&gt;
Higher ROI with Biometrics&lt;/b&gt;
With all the advantages it brings, biometrics is definitely going strong for workforce management system, because obviously, biometrics promotes ease of use, accuracy, and efficiency way past its investment value, and as we are looking into the future of cloud solutions, AI and big data, there’s no better system that can capture accurate identity of an individual as good as biometrics. 
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.fingertec.com/&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;500&quot; data-original-width=&quot;800&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSXTu7fJchk1QG1vIuuFCgCLL7WSYYapTVTpmqkrpyKGrFaPna5MLxJk8qQA1OSgqyvPKGrCNmH12O0shCXHlwz2yFVDFw6ljPNs9uaBSE_JJ200jTexzujRkeZU1bqAWvYEMc_gHpkW5q/s640/mailer-bnr_1.gif&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;a href=&quot;http://www.fingertec.com/&quot; target=&quot;_blank&quot;&gt;FingerTec&lt;/a&gt; is a global brand in Biometrics for workforce management and door access solution. We offer a range of fingerprint, facial recognition and card products suitable for any type of office and all our hardware comes complimentary with powerful time management software and door access management software. For cloud solutions for time attendance, leave management and many more, visit &lt;a href=&quot;http://www.timeteccloud.com/&quot; target=&quot;_blank&quot;&gt;TimeTec&lt;/a&gt;.
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW646RqxKoTy5KvaSf0NhFkCG05h3yzPUPAyWjA2XMXyo1j4iB6Xsa8fLXuRZ3jJxOL2ezg2BVfGosTpA-_OUg0wxpgjpuMy-5gJBQhTNO7Kc0WdYva8lmWAfkEieZdsQabpjnV924r29Q/s1600/Norana2018+%25283%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;202&quot; data-original-width=&quot;670&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW646RqxKoTy5KvaSf0NhFkCG05h3yzPUPAyWjA2XMXyo1j4iB6Xsa8fLXuRZ3jJxOL2ezg2BVfGosTpA-_OUg0wxpgjpuMy-5gJBQhTNO7Kc0WdYva8lmWAfkEieZdsQabpjnV924r29Q/s640/Norana2018+%25283%2529.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2018/03/lean-on-biometrics-for-efficient.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCvBM6SkYMEpbaPypI5NBxO9JkBo486Dr4eLgRCwwYJkBVGwPDTcvy_FWdty_tExrm05_3G4FY2dWp5ZMewPzLzGcxTKZkERYZ9YpzQEAZ3mSPrLYdbSG-cC3_r2uYfwWvjeT2vVWbTfk-/s72-c/BlogLean.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-1324431788343811392</guid><pubDate>Wed, 21 Feb 2018 06:28:00 +0000</pubDate><atom:updated>2018-02-21T14:28:27.646+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">best biometrics</category><category domain="http://www.blogger.com/atom/ns#">face and fingerprint combine</category><category domain="http://www.blogger.com/atom/ns#">face biometrics</category><category domain="http://www.blogger.com/atom/ns#">face id 2</category><category domain="http://www.blogger.com/atom/ns#">face machine</category><category domain="http://www.blogger.com/atom/ns#">face recognition</category><title>Multimodal Biometrics: Luxury x Complementary</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEju8T97m0OcYOglBOoy5wVKOh6Ytov1d7KTOh232hvdULEn988V_-RlqwARDe6_neAos11OFbYcJ4gJoU58i9vLlqTXSKCuaBNDJnOVV8uc9yCRRaXW97006FqmEGjQr2wbffEqf_vU_S6J/s1600/ftblogfeb1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1294&quot; data-original-width=&quot;1600&quot; height=&quot;517&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEju8T97m0OcYOglBOoy5wVKOh6Ytov1d7KTOh232hvdULEn988V_-RlqwARDe6_neAos11OFbYcJ4gJoU58i9vLlqTXSKCuaBNDJnOVV8uc9yCRRaXW97006FqmEGjQr2wbffEqf_vU_S6J/s640/ftblogfeb1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Unimodal biometrics, such as fingerprint technology, face recognition technology, voice recognition technology has been around in the market for quite sometimes serving diverse industries in various applications. Broadly, unimodal biometrics delivers a high degree of accuracy and authenticity to satisfy customer requirements. Nevertheless, and this runs true to all unimodal biometrics, none of the biometrics technology provides a 100% guarantee of user acceptance. Usually, there is a small degree of incompatibility arise due to variance in ones’ biometrics traits explained by the FAR (False Acceptance Rate) and FRR (False Rejection Rate) of each device.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Even though the percentage of user non-acceptance in unimodal biometrics is very low, it poses an inconvenience to organizations that have to deal with it because as a whole, everybody wants a system that can cater to everybody. There were rare cases of black-henna-ed North African women who couldn’t register their fingerprints because the dark henna covered the characteristic of a fingerprint such as ridges, pores, arches, and making it impossible for the scanner to differentiate those traits from a fingerprint. Some more examples of fingerprint that is hard to register are those of the elderly people, as well as individuals who handle abrasive materials that ruin the traits of their fingerprints. On top, fingers that are too large or too small, dirty fingerprints, cut and damaged fingerprints also could pose some challenges during verification.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Apart from the fingerprint quality, another matter of concern is the device’s operation. As some workers need to work in an environment that does not want them to have contact with devices, a contactless solution is an answer. Mechanics with dirty hands, cooks, servers, factory workers, employers who want to maintain the longevity of the hardware and etc., and this is where multimodal biometrics come handy. Multimodal biometrics is not meant for users to have two biometrics methods in one system just for the sake of having more, it works to complement one biometrics’ deficit and ultimately to provide users with convenience.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb3QAzYzR7olqTR9SV96d1My97qAZdwoTLbOLEwb_b4v337uQ6b_mk1GGph3VOld9jVLN7I9EvuzcglnAWXLyiGJUBNx-klsI_F5wD3nqqKh-EBhMPf26q1q87dqvDrZiV8PToMRvT8Ktb/s1600/faceid2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;774&quot; data-original-width=&quot;1540&quot; height=&quot;321&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb3QAzYzR7olqTR9SV96d1My97qAZdwoTLbOLEwb_b4v337uQ6b_mk1GGph3VOld9jVLN7I9EvuzcglnAWXLyiGJUBNx-klsI_F5wD3nqqKh-EBhMPf26q1q87dqvDrZiV8PToMRvT8Ktb/s640/faceid2.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Options provide users with flexibility and convenience&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Multimodal biometrics refers to the use of a combination of two or more biometric modalities in a verification/identification system for improvement of performance over the individual systems either to work together as a multifactor solution or to allow a multitude of authentication options. The multimodal biometrics can be used separately for different users or you can choose to register few methods for one person to tighten verification process. Some workers could be assigned to only fingerprint verification method and some others can only use face, while another group is given verification combination such as fingerprint first followed by face or the other way around. Besides biometrics, multimodal also allows combinations of biometrics with a password, biometrics with a PIN or/and biometrics and card.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Multimodal biometrics devices like FingerTec Face ID 2 is gaining popularity fast because of the added advantages it brings to the consumer. The price of multimodal biometrics is slightly on the higher side as compared to unimodal biometrics but the extra dollars invested are negligible with the features that it offers.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Read more about &lt;a href=&quot;http://product.fingertec.com/datasheet_faceid2.php&quot; target=&quot;_blank&quot;&gt;Face ID 2&lt;/a&gt; and its deployment stories in &lt;a href=&quot;http://www.fingertec.com/whatsnew/index.php&quot; target=&quot;_blank&quot;&gt;FingerTec Newscenter&lt;/a&gt;.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdH2P3rBRnvwWR1QjOmm7pEjJ5_tpmi5wFMDvjWxC0FrE2I4evdsmYIrV6WIWPLLqgPKyi_CDfLOgYBtw4ErDLLoTAbM629Lqhq3thXXfmAq-tbkUFhGw_I_q8DHuf1SrTQWc5UyVvg6IY/s1600/Norana2018+%25283%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;202&quot; data-original-width=&quot;670&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdH2P3rBRnvwWR1QjOmm7pEjJ5_tpmi5wFMDvjWxC0FrE2I4evdsmYIrV6WIWPLLqgPKyi_CDfLOgYBtw4ErDLLoTAbM629Lqhq3thXXfmAq-tbkUFhGw_I_q8DHuf1SrTQWc5UyVvg6IY/s640/Norana2018+%25283%2529.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2018/02/multimodal-biometrics-luxury-x.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEju8T97m0OcYOglBOoy5wVKOh6Ytov1d7KTOh232hvdULEn988V_-RlqwARDe6_neAos11OFbYcJ4gJoU58i9vLlqTXSKCuaBNDJnOVV8uc9yCRRaXW97006FqmEGjQr2wbffEqf_vU_S6J/s72-c/ftblogfeb1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-2598128166462589252</guid><pubDate>Fri, 29 Dec 2017 09:37:00 +0000</pubDate><atom:updated>2017-12-29T17:37:34.845+08:00</atom:updated><title>TimeTec Says Hello 2018!</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHxpPDuFH6vEjrCGDlt55K6OjaU7e57QM9gwYL8yjEe7REdfYgd6ATriu-iDcEGeDzYqqMJkhnLCUrD-XfEsBv63giXFDRvdvE3PKzvbFLisFDkQ_qhTvXaKHoiJqL0Ud0eQb5DZdp0re2/s1600/TimeTec-Blog-Post_Pink.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1037&quot; data-original-width=&quot;1382&quot; height=&quot;480&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHxpPDuFH6vEjrCGDlt55K6OjaU7e57QM9gwYL8yjEe7REdfYgd6ATriu-iDcEGeDzYqqMJkhnLCUrD-XfEsBv63giXFDRvdvE3PKzvbFLisFDkQ_qhTvXaKHoiJqL0Ud0eQb5DZdp0re2/s640/TimeTec-Blog-Post_Pink.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Avenir;&quot;&gt;&lt;span style=&quot;font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;2017 is a year full of interesting challenges and the major one for us to solidify our footing as a cloud solution provider for the workforce and security industry. In 2017, we have had the pleasure to serve various large corporations from diverse industries in the local market as well as in abroad with TimeTec TA, and this experience has provided us with invaluable feedback from the real consumers for system and feature improvements. The market responds well to our solution and  it&#39;s been accepted around the world without many glitches.  Due to the market growth and our immense enthusiasm for cloud development, our R&amp;amp;D team size has multiplied and we are adding more members into our sales and marketing team to preach cloud to more companies out there. 

More and more amazing features have been added into the solutions to the benefits of our subscribers without imposing them with additional charges and we keep on finding ways to improve on the user experience and the user interface of our solutions. In 2017 as well, i-Neighbour comes along and dangles its sexy ideas of managing visitors into a gated guarded neighbourhood using mobile coupled with the promise of a more modern community living through IoT integration that makes the market salivate for more. The i-Neighbour team has been supremely busy throughout the year meeting interested parties who are keen to explore the solution further. Overall, the rising demand for cloud solutions has made us feel excited to enter into 2018. 

So, what’s in store for 2018. TimeTec workforce management subscribers can look forward to a more wholesome array of solutions which include attendance, leave, profile and recruitment that can be integrated with one another. Customers can pick and choose the solutions suit to their companies and look forward to a more modern and better process automation. i-Neighbour will be introducing more IoT solutions such as smart lock, smart lift, smart barrier and don’t forget to look out for Smart Sensing that can trace the changes in your surrounding environment in order to make informed decisions about your quality of life. 

Yes, bring on 2018. We are thrilled to install more FingerTec biometric solutions around the world and more importantly, we are excited about the prospect of cloud businesses and we’ll strive to achieve cloud-awesomeness in 2018 and beyond.&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2017/12/timetec-says-hello-2018.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHxpPDuFH6vEjrCGDlt55K6OjaU7e57QM9gwYL8yjEe7REdfYgd6ATriu-iDcEGeDzYqqMJkhnLCUrD-XfEsBv63giXFDRvdvE3PKzvbFLisFDkQ_qhTvXaKHoiJqL0Ud0eQb5DZdp0re2/s72-c/TimeTec-Blog-Post_Pink.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-6309640844493811211</guid><pubDate>Mon, 27 Nov 2017 09:39:00 +0000</pubDate><atom:updated>2017-11-27T17:39:19.766+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">attendance on cloud</category><category domain="http://www.blogger.com/atom/ns#">Cheap Attendance Product</category><category domain="http://www.blogger.com/atom/ns#">cheap cloud solutions</category><category domain="http://www.blogger.com/atom/ns#">cloud based</category><category domain="http://www.blogger.com/atom/ns#">Cloud solutions</category><category domain="http://www.blogger.com/atom/ns#">leave management on cloud</category><category domain="http://www.blogger.com/atom/ns#">TimeTec Attendance</category><category domain="http://www.blogger.com/atom/ns#">timetec ta</category><title>Embracing A Mobile-Centric Lifestyle</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicxWYW_q04Mt__m5MCGRCkBSIkdHEaepD0A2Ki-3nFD4x4e4pkFTVT8vh4yolNghUw72Dcb76edxUqG1P5iEpW9xU2pZoqRFqMyB3q0A-dVEA9ppW2RlkAGzafNqs5Nlk1CcpX1Ij01QuG/s1600/blog_post.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;800&quot; data-original-width=&quot;1200&quot; height=&quot;425&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicxWYW_q04Mt__m5MCGRCkBSIkdHEaepD0A2Ki-3nFD4x4e4pkFTVT8vh4yolNghUw72Dcb76edxUqG1P5iEpW9xU2pZoqRFqMyB3q0A-dVEA9ppW2RlkAGzafNqs5Nlk1CcpX1Ij01QuG/s640/blog_post.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;If people were to open a computer every time they want access to their Facebook account or Instagram or Gmail, many people will instead prefer to talk to each other. In 2017, smartphones have become universal, crucial and ubiquitous in the lives of many, simply because phones are now not merely a tool for people to connect to someone, these gadgets are being used for a variety of tasks including but are not limited to information findings, tracking of progress, tracking of locations, playing games, keeping photo albums, and the truth is, the possibilities are endless as we head into the future. In January 2017, there were 2.2 million apps available in the Apple Store while Android offers a whopping 2.8 million apps ready to be downloaded into the smartphones. Ask any question and I’m sure there is an app for you out there. You always forget to drink your daily dose of water? Download a drink water app that reminds you to drink water regularly. You want to keep a diet diary, have at it. You want to make yourself taller, there is even a tall editor to feed your denial and fulfill your illusion. Basically, the app world has what you need and much more. &lt;/span&gt;&lt;/div&gt;
&lt;b id=&quot;docs-internal-guid-ecec8cca-fcc2-8460-a7c9-73fac5b9ec5c&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;I believe that smartphone hasn’t reached its maximum potential just yet. &amp;nbsp;Smartphone users should be aware that with the increase in the computing power of the smartphone and other technologies introduced alongside like BLE, NFC, Wifi, GPS, QR Code and many more, various other actions and transactions can be accomplished through the smartphone. Taking this development into account, the smartphones have not only been useful in taking care of personal matters but now they have also transcended into all aspects of our everyday living including managing our bank accounts and managing our jobs. &lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Online banking, for example, has been around for quite some time, however, banks have been striving to offer services on Mobile Application but with limited features. Of late, more and more features have been added to the app to increase customer&#39;s satisfaction and to serve consumers who do not own a personal computer. Movie tickets, hotel confirmations, flight tickets and much more are made mobile ready, no printing required. At the workplace, Mobile Applications have started to become a norm whereby employees can clock attendance through smartphones, offices can trace employee&#39;s’ whereabouts using GPS, view attendance data in real-time, and etc. Employee leave applications and approvals can be done through smartphones; making all transactions accurate, paperless, effective and traceable. The automation of leave management will enable human resource department to focus on other pressing matters at hand rather than to spend time calculating leave accruals according to staff’s service period and policy. The use of the application in the office promotes two-way communication between the management and the staff which will result in more positive engagement. &lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghGPZZMKJXltUYpybDYaZS8N3HURyE6blszcBDzBtP5pVEj_WxfsDYqN-BvO-ThZmZn6r1K1jA4yMFSVVnF2gUY9-Dfpf8OS6QSHVki3ML_6A1NNdbUy__14iY2Y8AVXygsl7UrFt_yC9e/s1600/Screen+Shot+2017-11-27+at+5.22.27+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;530&quot; data-original-width=&quot;1332&quot; height=&quot;254&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghGPZZMKJXltUYpybDYaZS8N3HURyE6blszcBDzBtP5pVEj_WxfsDYqN-BvO-ThZmZn6r1K1jA4yMFSVVnF2gUY9-Dfpf8OS6QSHVki3ML_6A1NNdbUy__14iY2Y8AVXygsl7UrFt_yC9e/s640/Screen+Shot+2017-11-27+at+5.22.27+PM.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;For more cloud-based solutions for workforce industry, head over to &lt;a href=&quot;http://www.timeteccloud.com/&quot; target=&quot;_blank&quot;&gt;http://www.timeteccloud.com&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;font-family: Avenir; font-size: 12pt; text-align: justify; white-space: pre-wrap;&quot;&gt;The use of smartphone does not only apply to a personal life or at the workplace anymore, it has now also become widespread across the community as well. i-Neighbour, for example, has led the way in combining cloud-based technology with IoT to offer modern communities with a mobile-centric lifestyle that uses a smartphone to manage visitor access as well as to gain access into &lt;/span&gt;many&lt;span style=&quot;font-family: Avenir; font-size: 12pt; text-align: justify; white-space: pre-wrap;&quot;&gt; smart hardware such as smart boom gate, smart elevator, smart lock and many more. The main advantage of Mobile Application on top of convenience is its traceability, whereby nothing is lost in translations and transactions.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Avenir; font-size: 12pt; text-align: justify; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Avenir; font-size: 12pt; text-align: justify; white-space: pre-wrap;&quot;&gt;One might not be keen to embrace a mobile-centric lifestyle but I reckon, when the going gets tough, the mobile phenomenon will win because when life gets more dynamic; time and convenience matters. &lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO16-lvCFalCsvDWubgWZ70Y7MGHZ3TvKn6kUJ037jG8M1nWjENLWlGlC7mDBoPa50H_f5Jiq6NSztsXemGtixuZaUOHQNoLhl1UGcvhBzXkWT7Qlp0N2Crr8424T9OsO55E1mQvtjScTs/s1600/Ana-3+%25281%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;202&quot; data-original-width=&quot;672&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO16-lvCFalCsvDWubgWZ70Y7MGHZ3TvKn6kUJ037jG8M1nWjENLWlGlC7mDBoPa50H_f5Jiq6NSztsXemGtixuZaUOHQNoLhl1UGcvhBzXkWT7Qlp0N2Crr8424T9OsO55E1mQvtjScTs/s1600/Ana-3+%25281%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2017/11/embracing-mobile-centric-lifestyle.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicxWYW_q04Mt__m5MCGRCkBSIkdHEaepD0A2Ki-3nFD4x4e4pkFTVT8vh4yolNghUw72Dcb76edxUqG1P5iEpW9xU2pZoqRFqMyB3q0A-dVEA9ppW2RlkAGzafNqs5Nlk1CcpX1Ij01QuG/s72-c/blog_post.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-8596897695126369347</guid><pubDate>Fri, 27 Oct 2017 03:22:00 +0000</pubDate><atom:updated>2017-10-27T11:22:27.825+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cloud solution for workforce</category><category domain="http://www.blogger.com/atom/ns#">employee profile</category><category domain="http://www.blogger.com/atom/ns#">timetec profile</category><category domain="http://www.blogger.com/atom/ns#">workforce management</category><title>Keep Your Team Together with TimeTec Profile</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyuAuLBOz7tgYNd3u53RlAG4vXATIdlTA2syUD3vPol83dGzLrL4Gfs70UbRWQrqGTqZiShCjbIMqFTZBsUZrlcnCYCgLhhSQuicz3rk5CEA2FGvEfIzdGXIJq69CskxR5j9xg2oH5Wbsd/s1600/org.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;766&quot; data-original-width=&quot;1139&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyuAuLBOz7tgYNd3u53RlAG4vXATIdlTA2syUD3vPol83dGzLrL4Gfs70UbRWQrqGTqZiShCjbIMqFTZBsUZrlcnCYCgLhhSQuicz3rk5CEA2FGvEfIzdGXIJq69CskxR5j9xg2oH5Wbsd/s1600/org.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Employee’s personal and employment information is most of the time private and has to be kept confidential by the Human Resource department. Information such as staff’s remuneration packages and other sensitive information need to be safely guarded by the HR personnel to avoid office crisis and complication.&amp;nbsp; Nevertheless, how do the they (HR) obtain and keep that information, as well as how accessible and updated is the information are the questions management need to ask going forward.&lt;br /&gt;
&lt;br /&gt;
Conventionally, when a candidate comes for an interview, the person needs to fill up a form, bring their certificates and credentials, etc, and the HR personnel will file all the information and documents for future reference. While that has worked in the past, it doesn’t mean it has to be that way to stay relevant. Times have changed and many modern companies are indeed looking for a simpler way to manage employee information and that some information needs to be made accessible to other people apart from the HR personnel to achieve corporate efficiency.&lt;br /&gt;
&lt;br /&gt;
TimeTec Profile has been created to centralize all your team members profiles into one place making it easier for authorized personnel to access into relevant information when required. TimeTec Profile offers employee data online, data intact, data correct and updated at all times.&lt;br /&gt;
&lt;br /&gt;
With TimeTec Profile, all employee details can be keyed into the system straight from the interview phase and the information can be directly assimilated into the company’s profile during onboarding process. No more manual data entry required when TimeTec Profile saves all the information on cloud, online, complete with soft copies of certificates and credentials.&amp;nbsp; &amp;nbsp; Create your company’s own organizational uniqueness by creating relevant fields to your employee’s profile. Get all the relevant details in your system and manage the organizational hierarchy easily through this single solution. No man is an island, and with TimeTec Profile, you can connect your team members effectively and efficiently. Don’t worry about confidentiality or information leak because the admin can determine the access levels of employees to safeguard your company’s confidential information and let different personnel to view different areas.&lt;br /&gt;
&lt;br /&gt;
Through TimeTec Profile also, the company can subscribe to other useful workforce solutions such as TimeTec TA for workforce time attendance and scheduling as well as TimeTec Leave for leave management, and all the solutions can be managed from one place to avoid confusion and mismanagement.&lt;br /&gt;
&lt;br /&gt;
By having everything integrated and accessible through different access levels, TimeTec Profile safeguards all your employee’s information so you can build your organizational structure and keep your team together effectively and affordably.&lt;br /&gt;
&lt;br /&gt;
TimeTec Profile will be available by TimeTec Cloud by December 2017. Rest assured that the solution will be useful to any type of organization at a tiny price. Watch this space for more TimeTec Profile announcement.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTeyuWYPrqkoTkaIiCPTJcEgeMfo_oAeXyfVoQC_fwjlI19UfXAYdOD3rPwdVB2zQqj0Ta8baXqUAJ6h8GGVmEXg93rKeF_rNsVSJb0o7_H2mzO6_SMIPryLiERhpu_e_I-N0v22ORZ7LA/s1600/Natt.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;202&quot; data-original-width=&quot;672&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTeyuWYPrqkoTkaIiCPTJcEgeMfo_oAeXyfVoQC_fwjlI19UfXAYdOD3rPwdVB2zQqj0Ta8baXqUAJ6h8GGVmEXg93rKeF_rNsVSJb0o7_H2mzO6_SMIPryLiERhpu_e_I-N0v22ORZ7LA/s1600/Natt.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2017/10/keep-your-team-together-with-timetec.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyuAuLBOz7tgYNd3u53RlAG4vXATIdlTA2syUD3vPol83dGzLrL4Gfs70UbRWQrqGTqZiShCjbIMqFTZBsUZrlcnCYCgLhhSQuicz3rk5CEA2FGvEfIzdGXIJq69CskxR5j9xg2oH5Wbsd/s72-c/org.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-2605958027250055268</guid><pubDate>Tue, 24 Oct 2017 07:23:00 +0000</pubDate><atom:updated>2017-10-24T15:23:39.560+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cloud solution for office</category><category domain="http://www.blogger.com/atom/ns#">cloud solution for workforce</category><category domain="http://www.blogger.com/atom/ns#">Cloud solutions</category><category domain="http://www.blogger.com/atom/ns#">cloud technology</category><title>You Are Absolutely Right, Cloud Solution Is Expensive!</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNrWV468glYWDN3g2rcfrGjHpDghz1US7qXgKJqhoyXqViYCVc0rdn9j83KACNHIKPE45jhZBTnSVbo16QchhrRqIphcDAHUgXheSDlNjt6dki7CRmSSiLV-94ilI2nk10KuVfxWol6oXl/s1600/timetecblogoct+%25281%2529.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNrWV468glYWDN3g2rcfrGjHpDghz1US7qXgKJqhoyXqViYCVc0rdn9j83KACNHIKPE45jhZBTnSVbo16QchhrRqIphcDAHUgXheSDlNjt6dki7CRmSSiLV-94ilI2nk10KuVfxWol6oXl/s1600/timetecblogoct+%25281%2529.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1066&quot; data-original-width=&quot;1600&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNrWV468glYWDN3g2rcfrGjHpDghz1US7qXgKJqhoyXqViYCVc0rdn9j83KACNHIKPE45jhZBTnSVbo16QchhrRqIphcDAHUgXheSDlNjt6dki7CRmSSiLV-94ilI2nk10KuVfxWol6oXl/s1600/timetecblogoct+%25281%2529.jpeg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
When asked about what is a setback of a cloud deployment within an organization, the answer is that implementation cost always tops the list. Customers often wonder why should they subscribe to a cloud solution when they could just buy a one-off similar Windows solution at a cheaper price? Yeah, why indeed.&lt;br /&gt;
&lt;br /&gt;
There is nothing wrong with the existing Windows software except that of the initial get go, there are many steps involved in the installation such as setting up, user login and etc in which you are required to have an IT expert to run it. Trust me, without this guy, nothing moves. And on top of that, Windows software is also made to be quite rigid when sharing with other computers as well as login from other places are not permitted, because it is designed to be location-specific. Plus, don’t expect data from Windows software to be in real-time because it is not on cloud.&lt;br /&gt;
&lt;br /&gt;
When cloud solutions are introduced, it brings a whole new meaning to the term data management. Cloud solutions promote seamless data management that is not bound by location or time of access. At USD2 per user per month for example, not only will managers be able to access the data from anywhere they want but also at anytime they wish too and the data they receive is in real time, which means that the data is always up to date and relevant. Users, on the other hand, do not need to carry their heavy laptops as cloud developers usually offer the mobile app as an additional tool for user’s convenience. The users of cloud system can be anywhere in the world and whenever they use a cloud system the data are always updated in real time for accuracy.&lt;br /&gt;
&lt;br /&gt;
Of course, cloud solution is expensive. Running a cloud solutions team is definitely not easy on your bank account because you need to have the best team of coders to write the best user experience products your brand could ever deliver. The team must be able to identify problems and bugs at all times and they need to fix the problems the soonest possible and provide feature updates all year long with one objective in mind: To provide the best ever solution to the clients. What’s more, cloud servers also have to be set up, maintained, backed up, and secured from all ends to achieve the same objective for the customers. If all these are not expensive, then what is?&lt;br /&gt;
&lt;br /&gt;
But most important of all, cloud solutions will provide customers with invaluable plus improved processes and amazing user experience that extends beyond its price. Definitely cloud solutions are expensive because of its subscription model, but it is loaded with useful features and convenience that makes the price aspect very minute in the bigger picture. By using cloud, users will no longer need to worry about server condition, maintenance, the IT guy, the database, etc because almost everything rests on the shoulder of the developers. On that note, companies that are reluctant to shift to cloud solutions could find their decision to be costly in the near future when data needs to be at your fingertips at all times.&lt;br /&gt;
&lt;br /&gt;
And for USD2, what can you buy? One Nacho Cheese from Taco Bell. Think about it.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7JsnSQMuWlLk2T2EPxMJHIxBrM3_-6JnANShWZ3UCzIfH_gZqGogul4g00a2J3LtHqecdt9KI80EWhNlW3Wertx-Cue8-zOI1mbL6BwCVJ7lOHFRxw6BMYvDq5NPZoSPTVAm4xXz1U6zY/s1600/Ana-3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;202&quot; data-original-width=&quot;672&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7JsnSQMuWlLk2T2EPxMJHIxBrM3_-6JnANShWZ3UCzIfH_gZqGogul4g00a2J3LtHqecdt9KI80EWhNlW3Wertx-Cue8-zOI1mbL6BwCVJ7lOHFRxw6BMYvDq5NPZoSPTVAm4xXz1U6zY/s1600/Ana-3.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;</description><link>http://www.fingertecblog.com/2017/10/you-are-absolutely-right-cloud-solution.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNrWV468glYWDN3g2rcfrGjHpDghz1US7qXgKJqhoyXqViYCVc0rdn9j83KACNHIKPE45jhZBTnSVbo16QchhrRqIphcDAHUgXheSDlNjt6dki7CRmSSiLV-94ilI2nk10KuVfxWol6oXl/s72-c/timetecblogoct+%25281%2529.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-2573275182726957747</guid><pubDate>Fri, 28 Jul 2017 07:56:00 +0000</pubDate><atom:updated>2017-07-28T15:56:11.720+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cheap cloud solutions</category><category domain="http://www.blogger.com/atom/ns#">cloud adoption in office</category><category domain="http://www.blogger.com/atom/ns#">cloud is the future</category><category domain="http://www.blogger.com/atom/ns#">cloud solution for leave</category><category domain="http://www.blogger.com/atom/ns#">Cloud-based attendance</category><title>Cloud Solutions Adoption: Cost vs Convenience</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyBWxGPO7V0iimofTprTqD0ejVE8umexk85tvfG-YDfNDFRHLB6piRZWjraQpS40LOFOkKk9Binv7TJ0hEdSff3f0fkKR_idj54WLn92ccuLFnlmSuAJ6YScOS34NDWP-5C-bzZWGZAx0o/s1600/Screen+Shot+2017-07-28+at+3.45.17+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;727&quot; data-original-width=&quot;1091&quot; height=&quot;426&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyBWxGPO7V0iimofTprTqD0ejVE8umexk85tvfG-YDfNDFRHLB6piRZWjraQpS40LOFOkKk9Binv7TJ0hEdSff3f0fkKR_idj54WLn92ccuLFnlmSuAJ6YScOS34NDWP-5C-bzZWGZAx0o/s640/Screen+Shot+2017-07-28+at+3.45.17+PM.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Avenir; font-size: 12pt; white-space: pre-wrap;&quot;&gt;Ever casually picked up your smartphone and say “Gee, I’m really glad that my phone has all these awesome functions! Who knows how I’ll live without it?”. No or Maybe. Well, in this modern digital era that we are living in, the aspect of ‘Convenience’ is no longer a luxury but it is instead demanded and expected by the society that we lived in today.&lt;/span&gt;&lt;/div&gt;
&lt;b id=&quot;docs-internal-guid-ff553924-8826-2c9b-f8b3-b460d2e076c6&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;For starters, let’s go back to our old-trusty smartphone, just only a few years back, our mobile phone was considered a revolutionizing device all by itself with only just the ability to make a phone call. Right now, people do not even question the fact that our phones can surf the Internet, take pictures, send an email and so on. The same can be said to business franchises as well. Back in the earlier days, a business operates by setting up a brick and mortar shops and hoping that customers will visit your premises in order for you to offer your services. Yet, businesses nowadays have taken a gigantic leap in reaching their customers through cloud solutions, i.e. offering services to customers right from their smartphones. We know, it’s crazy right! How did they even give it a thought? &lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;In short, all businesses changes, it is their nature to adapt or otherwise get left behind. That’s said, why not start now and take the first step in adopting a cloud solution within your business management. After all, as the saying goes ‘A journey of a thousand miles begins with a single step’. Therefore in a timely manner, here are two major factors to consider before applying a cloud solution. &amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;COST:&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Ah Money! The ‘obstacle’ behind every business. However, what is the price of convenience these days. Not much, is what we could say in terms of adapting into a cloud-based management system. Take for example our smart cloud solution, TimeTec TA which only costs 2 USD per user for a month. To top it off, what you see here is only the beginning as we also offer various discounts depending on the amount of users and the type of payment you choose. As a result, we can say that most of you here who decided to opt for our cloud solutions will definitely be paying much less than what we initially stated. However, we understand that it is only reasonable you would like to first inspect your goods before actually purchasing it. Hence, fret not as we are also giving out FREE 30 days trials for any company or organizations that wish to try what it’s like to be moving to a cloud management system. Better still, we will also be offering 10 FREE user licenses to whomever that decided to try out our wonderful services. Still not convinced? Wait till you hear what we have to say in terms of Convenience. &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;CONVENIENCE:&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Well, you’ll be very surprised! Imagine not having to fill up any physical application forms whenever you are applying for your leave, manually punching your working times on a card machine or the point where HR personnel do not have to keep track of the staffs’ working period in order to administer the exact salary amount. To sweeten the deal, this is only the icing on the cake as our cloud solutions: TimeTec TA and TimeTec Leave are capable of so many more amazing feats which we can’t wait to show it to you. What’s more, all these functions can be executed right from your personal Smartphones thus saving more of your precious time (a valuable resources these days) and further adding to your convenience. &lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Smartphone usage is ubiquitous these day. If you can connect and do everything from a smartphone efficiently, who doesn’t want that convenience.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;To explore more about TimeTec’s Cloud Solutions, click &lt;/span&gt;&lt;a href=&quot;https://www.timeteccloud.com/&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;background-color: transparent; color: #1155cc; font-family: Avenir; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: transparent; color: black; font-family: Avenir; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;. &lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2017/07/cloud-solutions-adoption-cost-vs.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyBWxGPO7V0iimofTprTqD0ejVE8umexk85tvfG-YDfNDFRHLB6piRZWjraQpS40LOFOkKk9Binv7TJ0hEdSff3f0fkKR_idj54WLn92ccuLFnlmSuAJ6YScOS34NDWP-5C-bzZWGZAx0o/s72-c/Screen+Shot+2017-07-28+at+3.45.17+PM.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-8750527255943133031</guid><pubDate>Fri, 26 May 2017 03:30:00 +0000</pubDate><atom:updated>2017-05-26T11:30:47.274+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">attendance automation</category><category domain="http://www.blogger.com/atom/ns#">cloud based</category><category domain="http://www.blogger.com/atom/ns#">cloud is the future</category><category domain="http://www.blogger.com/atom/ns#">Cloud solution</category><category domain="http://www.blogger.com/atom/ns#">TimeTec Cloud</category><category domain="http://www.blogger.com/atom/ns#">workforce management</category><title>Automation Disrupts Everything</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-3uYB9AqcTAHRrir4InK-hw-FDHxqqnxgpyjloVnjCX01WWGh0WvPH-fOtUDuPOKuqdHCGc9t7DmRM0n_9trYvkpTL4TqQkNcvkWnGYcmqV8lRalT90EWQY06hxVMmUZTNhucFLV_ezVB/s1600/Screen+Shot+2017-05-26+at+11.08.10+AM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-3uYB9AqcTAHRrir4InK-hw-FDHxqqnxgpyjloVnjCX01WWGh0WvPH-fOtUDuPOKuqdHCGc9t7DmRM0n_9trYvkpTL4TqQkNcvkWnGYcmqV8lRalT90EWQY06hxVMmUZTNhucFLV_ezVB/s1600/Screen+Shot+2017-05-26+at+11.08.10+AM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;585&quot; data-original-width=&quot;880&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-3uYB9AqcTAHRrir4InK-hw-FDHxqqnxgpyjloVnjCX01WWGh0WvPH-fOtUDuPOKuqdHCGc9t7DmRM0n_9trYvkpTL4TqQkNcvkWnGYcmqV8lRalT90EWQY06hxVMmUZTNhucFLV_ezVB/s1600/Screen+Shot+2017-05-26+at+11.08.10+AM.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Automation wave is coming strong around the world, disrupting all industries and everybody has to respond to it or face the consequences of being left behind. The financial industries are being shaken by automation, regardless of their preference. Robots are replacing people in warehouses and factories. Traditional businesses are rattled by the emerging business models that rely on data and not assets like Airbnb, Uber, Grab, and etc. &lt;br /&gt;
&lt;br /&gt;
Data is being collected at all times from various sources and in different formats to feed organization with the best possible way to react about a decision or to a change that’s been happening. Some view automation as catastrophe for human workforce because they will be replaced by a system but some see it in a positive light where automation will provide employees with more time to focus on the things that matter, and to obtain accurate information without having to deal with human errors and noisy data.&lt;br /&gt;
&lt;br /&gt;
When FingerTec embarked on this biometric journey, data automation was indeed our priority because we could foresee that major change that will take place in the future that will disrupt the equilibrium of the world we knew and data would be KEY. True to form, the world is going gaga about data, and now we are taking it literally to a higher level, the cloud. Having attendance data like biometrics data to be used in Windows software was a breakthrough 10 years back but having data to be used on a centralized cloud solution accessible worldwide is the world we live in today. Dealing with scattered data reduces effectiveness and productivity as opposed to having data at your fingertips at all times.&lt;br /&gt;
&lt;br /&gt;
Workforce automation solutions must focus on providing convenience and practicality to its users so that they can embrace the new solutions without much hassle. In dealing with this disruption, FingerTec embraces change by being ready with not one cloud solution but an array of workforce solutions on cloud that can be deployed individually or as a whole by any company with a single sign-on and matching apps for user convenience.&lt;br /&gt;
&lt;br /&gt;
TimeTec TA cloud-based time and attendance system manages employee work scheduling, clocking, rostering, attendance data, exporting of data to payroll and many more through the web and the app seamlessly. Around the corner, TimeTec Leave is about to be released to handle workforce leave management over the internet and on the app. TimeTec Leave manages leave accrual, balance, application, approval and etc, &amp;nbsp;and a part of our solutions are interlink between one another, providing cohesiveness yet can be accessed by different people with different authority. TimeTec is cooking up TimeTec Hire, cloud-based recruitment solution that giving companies control over their hiring processes to dodge bad hires and save the company a lot of time and money.&lt;br /&gt;
&lt;br /&gt;
Workforce automation has arrived whether you like it or not and data is an asset. People around the world are talking about big data analytics, internet of things, and etc. that requires data to be present, and readily available. There is no time for ‘wait and see’ attitude. Get over your curiosity and start getting in the game. Head over to &lt;a href=&quot;http://www.timeteccloud.com/&quot;&gt;www.timeteccloud.com&lt;/a&gt; and figure out how we could benefit your business or how you could grow the cloud business with us. Let’s!</description><link>http://www.fingertecblog.com/2017/05/automation-disrupts-everything.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-3uYB9AqcTAHRrir4InK-hw-FDHxqqnxgpyjloVnjCX01WWGh0WvPH-fOtUDuPOKuqdHCGc9t7DmRM0n_9trYvkpTL4TqQkNcvkWnGYcmqV8lRalT90EWQY06hxVMmUZTNhucFLV_ezVB/s72-c/Screen+Shot+2017-05-26+at+11.08.10+AM.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-5280395974767447610</guid><pubDate>Wed, 29 Mar 2017 03:17:00 +0000</pubDate><atom:updated>2017-03-29T11:17:17.232+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">attendance automation</category><category domain="http://www.blogger.com/atom/ns#">biometric</category><category domain="http://www.blogger.com/atom/ns#">cloud attendance</category><category domain="http://www.blogger.com/atom/ns#">Cloud solution</category><category domain="http://www.blogger.com/atom/ns#">cloud storage</category><category domain="http://www.blogger.com/atom/ns#">FCC</category><title>FCC Cures Your Data Lost Problem</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUNxhFsnPAycUoLat6_RZxBjUXKmzoV-cRSkb4PAl0J1tZ55gJSaB4R_xzOZXtlFHeAcrnZrmA287Qrgg31595k1hzdRf8FpclVs3XGyh5G2u6pL-DOMNknwQj6JBffzleu4uaHi3HqMPO/s1600/Screen+Shot+2017-03-29+at+11.13.44+AM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUNxhFsnPAycUoLat6_RZxBjUXKmzoV-cRSkb4PAl0J1tZ55gJSaB4R_xzOZXtlFHeAcrnZrmA287Qrgg31595k1hzdRf8FpclVs3XGyh5G2u6pL-DOMNknwQj6JBffzleu4uaHi3HqMPO/s1600/Screen+Shot+2017-03-29+at+11.13.44+AM.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;One of the common problems received by support at FingerTec is data loss. Even though it’s common, it causes panic and a lot of exclamation marks in the support email asking for help. There are various causes of data loss. They include our own fault such as dropping our hardware or deleting a file that we shouldn’t. It could also cause by hardware or system failure and software corruption, that’s out of our control. Data can also go haywire if being attacked by viruses or malware. There are tips to avoid data loss such as using uninterrupted power supply, working in a safe environment and back up your data properly.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;In addition to the precaution that you are taking, FingerTec offers yet another method to eradicate data loss problem with FingerTec Cloud Centre at &lt;a href=&quot;http://fcc.fingertec.com/&quot;&gt;http://fcc.fingertec.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;FCC is a web platform to store all FingerTec terminals&#39; information and data securely on a cloud server. It’s easy. You just need to connect your FingerTec terminals to FCC and stop worrying about data lost because the original data will always be available online for instant retrieval.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;FCC is a platform that enables you to consolidate all your data to Cloud environment for viewing, managing and backing up of data purposes.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;At USD5 per terminal per month, relax and be at ease knowing that all your data is safe on the cloud. Sign up now! &lt;a href=&quot;http://fcc.fingertec.com/register.aspx/&quot;&gt;http://fcc.fingertec.com/register.aspx/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://www.fingertecblog.com/2017/03/fcc-cures-your-data-lost-problem.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUNxhFsnPAycUoLat6_RZxBjUXKmzoV-cRSkb4PAl0J1tZ55gJSaB4R_xzOZXtlFHeAcrnZrmA287Qrgg31595k1hzdRf8FpclVs3XGyh5G2u6pL-DOMNknwQj6JBffzleu4uaHi3HqMPO/s72-c/Screen+Shot+2017-03-29+at+11.13.44+AM.png" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3030416821783379757.post-4482712821891272956</guid><pubDate>Tue, 28 Feb 2017 07:22:00 +0000</pubDate><atom:updated>2017-03-02T11:52:54.256+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android guard tour</category><category domain="http://www.blogger.com/atom/ns#">cloud guard tour system</category><category domain="http://www.blogger.com/atom/ns#">Guard Tour</category><category domain="http://www.blogger.com/atom/ns#">Guard Tour app</category><category domain="http://www.blogger.com/atom/ns#">NFC technology</category><category domain="http://www.blogger.com/atom/ns#">TimeTec</category><category domain="http://www.blogger.com/atom/ns#">TimeTec Cloud</category><category domain="http://www.blogger.com/atom/ns#">TimeTec Patrol</category><title>5 Ways TimeTec Patrol Revolutionizes Guard Tours</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiCvSppIaGrd9HgG2j2eDe2uTV-ma3PfhmpQYmtH8NR1E0D2XzMO7R5tVJRR_NVM5dxSuLxNGGrtFusPiIBFlHemM9WrIVONAhrEZaoSrwBVPcJewQXXoMmwMtVWiqcBJU9m36_JZPPZ9v/s1600/Screen+Shot+2017-02-28+at+3.20.32+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;357&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiCvSppIaGrd9HgG2j2eDe2uTV-ma3PfhmpQYmtH8NR1E0D2XzMO7R5tVJRR_NVM5dxSuLxNGGrtFusPiIBFlHemM9WrIVONAhrEZaoSrwBVPcJewQXXoMmwMtVWiqcBJU9m36_JZPPZ9v/s640/Screen+Shot+2017-02-28+at+3.20.32+PM.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;optima&amp;quot;; mso-ansi-language: EN-MY; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;br /&gt;1. TimeTec Patrol system replaces the traditional Single Function Patrol tools such as&amp;nbsp;the Watchman Clock, and the RFID patrol stick with a smartphone downloaded with TimeTec Patrol app. Patrol guards can mark patrol checkpoints and sends feedback of patrolling activity in real time.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;optima&amp;quot;; mso-ansi-language: EN-MY; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;2. Real-time updates allow security supervisors to be aware of the situation on the&amp;nbsp;ground and react in time when untoward incidents occur. This also means that patrolling guards can rely on their team for timely backup when the situation calls for it.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;optima&amp;quot;; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;3. TimeTec Patrol empowers guards to do more than just marking their rounds, equipped with the Incident Report feature, TimeTec Patrol encourages guards to be proactive in their job, reporting suspecting incidents during their rounds, to ensure the safety of the compound.&lt;/span&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;optima&amp;quot;; mso-ansi-language: EN-MY; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;optima&amp;quot;; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;4. The TimeTec Patrol system lightens the load of Patrol Guards. Carrying a smartphone means carrying a patrol tool, a flashlight, a camera and a walkie talkie - a 4-in-1 Plus device makes TimeTec Patrol a must have.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;optima&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;optima&amp;quot;;&quot;&gt;5. For the
security admin, TimeTec Patrol can be used to assign new route
plans on the go, communicate changes in plans, and establish standards using
the various reports templates readily available on TimeTec Patrol.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt; &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;JA&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
   &lt;w:UseFELayout/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;
   &lt;m:brkBin m:val=&quot;before&quot;/&gt;
   &lt;m:brkBinSub m:val=&quot;&amp;#45;-&quot;/&gt;
   &lt;m:smallFrac m:val=&quot;off&quot;/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val=&quot;0&quot;/&gt;
   &lt;m:rMargin m:val=&quot;0&quot;/&gt;
   &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;
   &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;
   &lt;m:intLim m:val=&quot;subSup&quot;/&gt;
   &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;true&quot;
  DefSemiHidden=&quot;true&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;276&quot;&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; Name=&quot;Default Paragraph Font&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;59&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Table Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Placeholder Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Revision&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;List Paragraph&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; Name=&quot;Bibliography&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt; &lt;style&gt; &lt;!-- /* Font Definitions */ @font-face  {font-family:&quot;ＭＳ 明朝&quot;;  mso-font-charset:78;  mso-generic-font-family:auto;  mso-font-pitch:variable;  mso-font-signature:-536870145 1791491579 18 0 131231 0;} @font-face  {font-family:&quot;Cambria Math&quot;;  panose-1:2 4 5 3 5 4 6 3 2 4;  mso-font-charset:0;  mso-generic-font-family:auto;  mso-font-pitch:variable;  mso-font-signature:-536870145 1107305727 0 0 415 0;} @font-face  {font-family:Cambria;  panose-1:2 4 5 3 5 4 6 3 2 4;  mso-font-charset:0;  mso-generic-font-family:auto;  mso-font-pitch:variable;  mso-font-signature:-536870145 1073743103 0 0 415 0;} @font-face  {font-family:Optima;  panose-1:2 0 5 3 6 0 0 2 0 4;  mso-font-charset:0;  mso-generic-font-family:auto;  mso-font-pitch:variable;  mso-font-signature:-2147483545 0 0 0 1 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal  {mso-style-unhide:no;  mso-style-qformat:yes;  mso-style-parent:&quot;&quot;;  margin:0cm;  margin-bottom:.0001pt;  mso-pagination:widow-orphan;  font-size:12.0pt;  font-family:Cambria;  mso-ascii-font-family:Cambria;  mso-ascii-theme-font:minor-latin;  mso-fareast-font-family:&quot;ＭＳ 明朝&quot;;  mso-fareast-theme-font:minor-fareast;  mso-hansi-font-family:Cambria;  mso-hansi-theme-font:minor-latin;  mso-bidi-font-family:&quot;Times New Roman&quot;;  mso-bidi-theme-font:minor-bidi;  mso-ansi-language:EN-US;} .MsoChpDefault  {mso-style-type:export-only;  mso-default-props:yes;  font-family:Cambria;  mso-ascii-font-family:Cambria;  mso-ascii-theme-font:minor-latin;  mso-fareast-font-family:&quot;ＭＳ 明朝&quot;;  mso-fareast-theme-font:minor-fareast;  mso-hansi-font-family:Cambria;  mso-hansi-theme-font:minor-latin;  mso-bidi-font-family:&quot;Times New Roman&quot;;  mso-bidi-theme-font:minor-bidi;  mso-ansi-language:EN-US;} @page WordSection1  {size:595.0pt 842.0pt;  margin:72.0pt 90.0pt 72.0pt 90.0pt;  mso-header-margin:35.4pt;  mso-footer-margin:35.4pt;  mso-paper-source:0;} div.WordSection1  {page:WordSection1;} --&gt; &lt;/style&gt; &lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
 mso-para-margin:0cm;
 mso-para-margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:12.0pt;
 font-family:Cambria;
 mso-ascii-font-family:Cambria;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Cambria;
 mso-hansi-theme-font:minor-latin;
 mso-ansi-language:EN-US;}
&lt;/style&gt;
&lt;![endif]--&gt; &lt;!--StartFragment--&gt; &lt;!--EndFragment--&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;color: black; font-family: &amp;quot;optima&amp;quot;; mso-ansi-language: EN-MY; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;For better
management of patrolling guards, check out TimeTec Patrol at &lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;optima&amp;quot;; mso-ansi-language: EN-MY; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;a href=&quot;http://www.timetecpatrol.com/&quot;&gt;&lt;span style=&quot;color: #1155cc; mso-bidi-font-family: Arial;&quot;&gt;www.timetecpatrol.com&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;optima&amp;quot;; mso-ansi-language: EN-MY; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt; or email &lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;optima&amp;quot;; mso-ansi-language: EN-MY; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;a href=&quot;mailto:info@timeteccloud.com&quot;&gt;&lt;span style=&quot;color: #1155cc; mso-bidi-font-family: Arial;&quot;&gt;info@timeteccloud.com&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;optima&amp;quot;; mso-ansi-language: EN-MY; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt; for more information.&lt;/span&gt;&lt;/div&gt;
&lt;style&gt; &lt;!-- /* Font Definitions */ @font-face  {font-family:&quot;ＭＳ 明朝&quot;;  mso-font-charset:78;  mso-generic-font-family:auto;  mso-font-pitch:variable;  mso-font-signature:-536870145 1791491579 18 0 131231 0;} @font-face  {font-family:&quot;Cambria Math&quot;;  panose-1:2 4 5 3 5 4 6 3 2 4;  mso-font-charset:0;  mso-generic-font-family:auto;  mso-font-pitch:variable;  mso-font-signature:-536870145 1107305727 0 0 415 0;} @font-face  {font-family:Cambria;  panose-1:2 4 5 3 5 4 6 3 2 4;  mso-font-charset:0;  mso-generic-font-family:auto;  mso-font-pitch:variable;  mso-font-signature:-536870145 1073743103 0 0 415 0;} @font-face  {font-family:Optima;  panose-1:2 0 5 3 6 0 0 2 0 4;  mso-font-charset:0;  mso-generic-font-family:auto;  mso-font-pitch:variable;  mso-font-signature:-2147483545 0 0 0 1 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal  {mso-style-unhide:no;  mso-style-qformat:yes;  mso-style-parent:&quot;&quot;;  margin:0cm;  margin-bottom:.0001pt;  mso-pagination:widow-orphan;  font-size:12.0pt;  font-family:Cambria;  mso-ascii-font-family:Cambria;  mso-ascii-theme-font:minor-latin;  mso-fareast-font-family:&quot;ＭＳ 明朝&quot;;  mso-fareast-theme-font:minor-fareast;  mso-hansi-font-family:Cambria;  mso-hansi-theme-font:minor-latin;  mso-bidi-font-family:&quot;Times New Roman&quot;;  mso-bidi-theme-font:minor-bidi;  mso-ansi-language:EN-US;} .MsoChpDefault  {mso-style-type:export-only;  mso-default-props:yes;  font-family:Cambria;  mso-ascii-font-family:Cambria;  mso-ascii-theme-font:minor-latin;  mso-fareast-font-family:&quot;ＭＳ 明朝&quot;;  mso-fareast-theme-font:minor-fareast;  mso-hansi-font-family:Cambria;  mso-hansi-theme-font:minor-latin;  mso-bidi-font-family:&quot;Times New Roman&quot;;  mso-bidi-theme-font:minor-bidi;  mso-ansi-language:EN-US;} @page WordSection1  {size:595.0pt 842.0pt;  margin:72.0pt 90.0pt 72.0pt 90.0pt;  mso-header-margin:35.4pt;  mso-footer-margin:35.4pt;  mso-paper-source:0;} div.WordSection1  {page:WordSection1;} --&gt; &lt;/style&gt;&lt;style&gt;
&lt;!--
 /* Font Definitions */
@font-face
 {font-family:Arial;
 panose-1:2 11 6 4 2 2 2 2 2 4;
 mso-font-charset:0;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-536859905 -1073711037 9 0 511 0;}
@font-face
 {font-family:&quot;ＭＳ 明朝&quot;;
 mso-font-charset:78;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-536870145 1791491579 18 0 131231 0;}
@font-face
 {font-family:&quot;Cambria Math&quot;;
 panose-1:2 4 5 3 5 4 6 3 2 4;
 mso-font-charset:0;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-536870145 1107305727 0 0 415 0;}
@font-face
 {font-family:Cambria;
 panose-1:2 4 5 3 5 4 6 3 2 4;
 mso-font-charset:0;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-536870145 1073743103 0 0 415 0;}
@font-face
 {font-family:Optima;
 panose-1:2 0 5 3 6 0 0 2 0 4;
 mso-font-charset:0;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-2147483545 0 0 0 1 0;}
 /* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
 {mso-style-unhide:no;
 mso-style-qformat:yes;
 mso-style-parent:&quot;&quot;;
 margin:0cm;
 margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:12.0pt;
 font-family:Cambria;
 mso-ascii-font-family:Cambria;
 mso-ascii-theme-font:minor-latin;
 mso-fareast-font-family:&quot;ＭＳ 明朝&quot;;
 mso-fareast-theme-font:minor-fareast;
 mso-hansi-font-family:Cambria;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:&quot;Times New Roman&quot;;
 mso-bidi-theme-font:minor-bidi;
 mso-ansi-language:EN-US;}
.MsoChpDefault
 {mso-style-type:export-only;
 mso-default-props:yes;
 font-family:Cambria;
 mso-ascii-font-family:Cambria;
 mso-ascii-theme-font:minor-latin;
 mso-fareast-font-family:&quot;ＭＳ 明朝&quot;;
 mso-fareast-theme-font:minor-fareast;
 mso-hansi-font-family:Cambria;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:&quot;Times New Roman&quot;;
 mso-bidi-theme-font:minor-bidi;
 mso-ansi-language:EN-US;}
@page WordSection1
 {size:595.0pt 842.0pt;
 margin:72.0pt 90.0pt 72.0pt 90.0pt;
 mso-header-margin:35.4pt;
 mso-footer-margin:35.4pt;
 mso-paper-source:0;}
div.WordSection1
 {page:WordSection1;}
--&gt;
&lt;/style&gt;</description><link>http://www.fingertecblog.com/2017/02/5-ways-timetec-patrol-revolutionizes.html</link><author>noreply@blogger.com (TimeTec)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiCvSppIaGrd9HgG2j2eDe2uTV-ma3PfhmpQYmtH8NR1E0D2XzMO7R5tVJRR_NVM5dxSuLxNGGrtFusPiIBFlHemM9WrIVONAhrEZaoSrwBVPcJewQXXoMmwMtVWiqcBJU9m36_JZPPZ9v/s72-c/Screen+Shot+2017-02-28+at+3.20.32+PM.png" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>