Professional Documents
Culture Documents
5/24/12
5/24/12
Biometric Solutions
RFID Solutions
5/24/12
Integration among software components and ERP Integrating various devices with software Business process management
Specializes in ERP customization and implementation Oracle - EBS R12 Microsoft Dynamics GP ICILtek eCorpStructur e
5/24/12
Specialized software development using various tools and techniques Website and multimedia presentations Expertise in implementing various content management solution i.e. Joomla, Word press
Expertise in working on and implementing Cognos BI MS Reporting Services BIRT Proven capabilities in programming database thus offers ETL tools development services
5/24/12
5/24/12
ERP Implementation
Enter Resource Planning systems are software applications consists of several integrated modules. Each module is responsible for managing and processing information of a particular business function, it also shares, input to and take output from other modules.
Oracle EBS R-12 Financials [for Large Enterprises] General Ledger, Accounts Receivable, Accounts Payable, Cash Management, Fixed Assets Microsoft Dynamics Great Plan Financials [for Medium Enterprises] - General Ledger, Receivables Management, Payables Management, Cash Flow Management, Collection, Encumbrance. ICILtek eCorpStructure [for Small and Medium Enterprises] Financials, Inventory Control, HRMS, CRM, Point of Sales, Institute Management System
5/24/12
ICILtek offers HRMS on two different platforms Web Based ASP.Net and MySQL Desktop Based Forms and Reports 6i and Oracle Database Consists of following functions / modules Recruitment Personnel Time Attendance Compensation and Payroll Training Can be used as an standalone system or integrated with any ERP or eCorpStructure ERP
5/24/12
5/24/12
ICILtek offers POS on two different platforms Oracle Based Oracle Forms and Reports 6i and Oracle Database Microsoft Based Windows forms using C# and MySQL Consists of following functions / modules Sales Inventory Financials Can be integrated with RFID Barcode Readers
5/24/12
Expert in business analysis Detailed requirement gathering using different techniques Effective project management Experienced with
5/24/12
5/24/12
5/24/12
5/24/12
. Social media channel is a good way of increasing a companys trustworthiness and goodwill which will definitely give the said company and increased and better branding. When companies are able to have conversations with their customers, the result is going to be a great amount of credibility. 2. The lead generation is also another basis for companies to go forSolution & marketing. Since the lead Technology social media System Integration (cont..) generation serves a very important part for a companys success, then using social media marketing for your campaigns help you reach out your targeted lead generation.
Social Marketing/Networking
Theres a lot of reason as to why a certain company needs social media marketing and it will depend on different factors like company profile, the products, and the customers that it is catering to. As the days go by, I would say there is also an increase when it comes to the importance of social media marketing that is very effective for most companies
trustworthiness and goodwill which will definitely give the said company and increased and better branding. When companies are able to have conversations with their customers, the result is going to be a great amount of credibility. 2. The lead generation is also another basis for companies to go for social media marketing. Since the lead generation serves a very important part for a companys success, then using social media marketing for your campaigns help you reach out your targeted lead generation.
5/24/12
Social Marketing/Networking
Social media channels also make it easier and more flexible for companies to engage with its customers. You have to put this on your top priority list since customer engagement is a very crucial since this will help your company retain your existing customers and of course increase your brand credibility
Social media channels are also responsible for generating a highly powerful traffic for your site. You dont even have to worry since theres a lot of social media channels that will be able to help you and would make it easier for you to obtain for your website the relevant and quality traffic that it will need. Your industry is considered to have a backbone if you have total access to customers feedback. This is because the feedback actually helps in improving your products based on what your customers require. Due to the fact that social media channels aid in making customer engagement possible, then customer feedback will always be available for the company to use as basis for improvement. With this, you can always expect customer reviews and feedback that can help you in making your products or services even better.
5/24/12
Social Marketing/Networking
There is no better way or an even cheaper way than a social media channel when it comes to announcing new products or services for your company. Social media will make it easier for you to spread the news regarding a new product or service. You can even include information such as arrival or release dates.
Another importance of social media marketing is the fact that it will allow you to discover your customers preferences so that you will be able to act based on what they want. By knowing their preferences, it will be much easier for you to enhance all of your products and plan your marketing campaigns more effectively.
5/24/12
Identifying critical and key business processes Risk assessment Emergency evacuation planning Communication planning Operations recovery planning BCP drills and testing Maintaining and updating BC plan
Identifying key applications and critical IT processes Risk assessment Back and recovery planning and testing Planning for Hot or Cold recovery site Testing, maintaining and updating
Preparing compatibility report against BCP and IT DR Recommending changes in existing BC and IT DR plan
Updating and maintaining
5/24/12
Offers following services under BCP Business study and identifying critical business processes Determining associated risks and preparing risk matrix against critical processes Planning for emergency response , evacuation, communication and operations recovery Testing plans and giving training to relevant personnel Support - Maintaining and updating plan ICILtek has affiliation with Kingswell UK for BCP
5/24/12
5/24/12
Biometric Solutions
Finger Tip
Palm Vein
Retina Scanning
Face Recognition
Voice Recognition
Based on finger prints, fast in processing Time attendance Access control Replaces manual signatures Can be integrated with software applications
Based on palm vein scanning and recognition Approximately 100% accurate Time attendance Access control Can be integrated with software applications
Based on retina scanning and recognition More secure Access control Can be integrated with software applications
5/24/12
Based on face geometry Accurate recognition More secure Time attendance Access control Can be integrated with software applications Recommended for labor staff
Based on voice More secure Time attendance Access control Can be integrated with software applications
Finger Tip
ACTAtek is a world leader in ID Management solution. It is a leading web based, biometric, RFID smart card platform for enterprise wide solution.
2.8 TFT 256k color screen with slim and compact design Embedded software, no software installation necessary. State of the art embedded, encrypted Linux web server technology. Control, configure & administrate via web browser SSL encrypted communication between units & browser Real time system update & configuration 500 DPI optical scanner Auto-match support up to 500 users (1:N) FAM model Auto-match support up to 3,000 users (1:N) FLI model Operates in Standalone or Network modes Robust and scalable for enterprise-wide deployment IP 65 rated, weather & impact resistant casing (fluid ingress, dust, salt, fog protection) Built-in Video/CMOS camera (optional) 1,000, 3,000 , 5,000 ,10,000, 15,000 or 20,000 users Up to 75,000 event logs Five Modes of authentication o Fingerprint only o Smart Card only o Smart Card + Fingerprint o ID + Fingerprint, and o ID + PIN.
5/24/12
Palm Vein
This system is based on the palm vein-network, since they have multiple features that make each person unique. Specifically on the blood veinspattern, which is unique to every individual, even among identical twins. Moreover, the system needs blood circulation for it to work, ensuring liveness. PalmSecure, technology captures an image from the vein patterns of the hand palm by radiating his/her hand with near-infrared rays. Veins are an internal element of the human body and have many features that make each person unique. Therefore, reducing false acceptance rates close to zero. Everybody has veins in their hands, which makes this technology different from other technologies based on external patterns and does not allow any significant false rejection rate.
5/24/12
Retina Scanning
Ganetec IRIS recognition is a secure, effortless, non contact identity verification on the move. It delivers security of iris recognition in a convenient, high throughput system for access control. This portal configuration has a processing speed of 30 people per minute subjects simply walk through a comfortable place. It also enables onboard enrollment and identifies subjects in less than one second making it ideal for high traffic locations such as airports, mass transit, security checkpoints and other applications that require positive identity verification for large number of people. 5/24/12
Face Recognition
Facial recognition compares the facial features of a person to initiate a trigger. The Trigger can be as simple as marking attendance or granting access to particular place in office. Facial recognition is the most foolproof mechanism for any identity management application. Its uses special algorithms that identify faces by extracting landmarks or features from an image of the subjects face. For example an algorithm may analyze the relative position, size and/or shape of the eyes, nose, cheekbones or jaws. F710 is embedded facial recognition system with leading Dual Sensor Facial recognition algorithm, which is generically used for time attendance and access control application.
5/24/12
Voice Recognition
Voice biometrics products are designed to meet the dynamic security needs of the worlds leading financial institutions, telecom service providers, healthcare insurance companies, large enterprises, and law enforcement and government agencies. Organizations are empowered to improve security and comply with industry Regulations that require higher levels of security for authenticating identity, while reducing costs and delivering increased convenience to those they serve. Nuance voice biometrics technology provides an accurate, non-invasive, cost-effective identity verification solution that seamlessly integrates with existing contact center and VoiceXML platforms.
5/24/12
RFID Solutions
Identification of items through RFID tags Used to automate inventory (items / goods) IN and OUT processes Battery powered tags In case of removing tag illegally from an item, tag inform reader thus an alarm can activate Inventory management of valuable goods i.e. jewelry, machine parts etc.
Identification of items through RFID tags Used to automate inventory (items / goods) IN and OUT processes Reader powered tags Inexpensive Inventory management of goods and fixed assets
5/24/12
RFID Applications
RFID is the use of a wireless non-contact radio system to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered by the radio waves used to read them.
Student Attendance and Tracking: Tag/ Student ID Card is detected by a reader to Mark attendance or determine his/her location
5/24/12
that involve reusable or rental assets such as Containers, Library Items and other supply chain applications where assets circulate through the system. The tags in such cases have to be long life, durable, robust and be able to perform in rough 5/24/12 conditions. It should also have the capability to
Efficiency into car parking management. A RFID tag can be attached anywhere on a Car, as the automobile approaches the barrier or road blocker, the reader detects he tag and detaches or open the barrier granting him Asset access into Tracking for car parking lot. Applications the asset tracking include those
Physically on files can never be discounted. RFID allows For a more secure and efficient way of managing archives. With Tags in the form of sticker attached to the document One can securely ensure that all file are processed maintained in an efficient manner.
providing Information required for product authentication . Pharmaceutical Consumers benefit from improved product safety, quality and availability. Pharmaceutical companies benefit from reduced liability, brand protection and additional revenue that otherwise gets diverted to counterfeit drugs. By adopting a global RFID network businesses can get full visibility, 5/24/12 track and trace capabilities from the birth of the product through to delivery to final customer
distribution Industry where major cost involved is in managing the Inventory. It is a known fact that in distribution centres RFID has been used to eliminate the need to manually Counterfeiting in Track and scan products, reducing labor cost Pharmaceutical level supply chain visibility by by 30% or RFID provides item more. providing Information required for product authentication . Pharmaceutical Consumers benefit from improved product safety, quality and availability. Pharmaceutical companies benefit from reduced liability, brand protection and additional revenue that otherwise gets diverted to counterfeit drugs. By adopting a global RFID network businesses can get full visibility, 5/24/12 track and trace capabilities from the birth of the product through to delivery to final customer
CCTV Solutions
IP Cameras Solutions
Integrated Solutions
(Cameras and Access Control)
5/24/12
Security surveillance through CCTV cameras Less expensive In case of using IP based DVR, streaming can be done on computers HDD Compatibility with existing surveillance infrastructure
IP based Each and every unit is accessible to authorized user over LAN or WAN
Integration among cameras and Access Control Tracking of unauthorized access attempts
5/24/12
IP Camera Solutions
5/24/12
5/24/12
People Counting
5/24/12
Added Object a specific area and prompts if an Monitors object of an Kind is detected in that place 5/24/12
Missing Object Detects an object missing from a specific Location being monitored by the camera.
5/24/12