{"id":12,"date":"2016-08-18T11:19:21","date_gmt":"2016-08-18T10:19:21","guid":{"rendered":"http:\/\/vdsolutions.net\/vds\/?page_id=12"},"modified":"2016-08-18T11:19:21","modified_gmt":"2016-08-18T10:19:21","slug":"access-control-time-attendance","status":"publish","type":"page","link":"http:\/\/vdsolutions.net\/?page_id=12","title":{"rendered":"Access Control &#038; Time Attendance"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: right;\" src=\"http:\/\/vdsolutions.net\/uploads\/images\/access-control-350.jpg\" \/><\/p>\n<p style=\"text-align: justify;\">Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment.<\/p>\n<p style=\"text-align: justify;\">Access control systems perform authorization identification, authentication, access approval, and accountability of entities through login credentials including passwords, personal identification numbers (PINs), biometric scans, and proximity card readers.<\/p>\n<p>VD Solutions Offers:<\/p>\n<ul>\n<li><a title=\"Learn More\" href=\"http:\/\/vdsolutions.net\/access-control-time-attendance\/falcoweb\/\">FALCO Web<\/a><\/li>\n<li><a title=\"Learn More\" href=\"http:\/\/vdsolutions.net\/access-control-time-attendance\/falco-sbox\/\">FALCO SBOX<\/a><\/li>\n<li><a title=\"See Details\" href=\"http:\/\/vdsolutions.net\/uploads\/images\/IN148 Semi-auto turnstile.pdf\" target=\"_blank\">Turnstiles<\/a><\/li>\n<li><a title=\"See Details\" href=\"http:\/\/vdsolutions.net\/uploads\/images\/MX-10 MX-103 MX-105 MX-108 barrier.pdf\" target=\"_blank\">Parking Barriers<\/a><\/li>\n<li><a title=\"See Details\" href=\"http:\/\/vdsolutions.net\/uploads\/images\/Fa-600PoEN LED EM Lock.pdf\" target=\"_blank\">Electromagnetic Door Locks<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment. Access control systems perform authorization identification, authentication, access approval, and accountability of entities through login credentials including passwords, personal identification numbers (PINs), biometric scans, and proximity\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"http:\/\/vdsolutions.net\/?page_id=12\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-12","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/vdsolutions.net\/index.php?rest_route=\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/vdsolutions.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/vdsolutions.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/vdsolutions.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/vdsolutions.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12"}],"version-history":[{"count":1,"href":"http:\/\/vdsolutions.net\/index.php?rest_route=\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":13,"href":"http:\/\/vdsolutions.net\/index.php?rest_route=\/wp\/v2\/pages\/12\/revisions\/13"}],"wp:attachment":[{"href":"http:\/\/vdsolutions.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}