Demand from customers led to the local development of a Web-based time and attendance (T&A) software solution. John Powell, CEO of Powell Tronics, says that feedback from the market three years ago focused on the inflexibility of existing T&A software to be customised to suit specific needs of the customer when being used with popular RFID or biometric access control readers. As a result, Powell Tronics embarked on the introduction of ATOM to alleviate this pre-defined issue.
ATOM was designed to address T&A software issues predominantly within the SME market and is both simple to use and extremely cost effective. "We determined that requests from our customers to implement changes within the available software systems we support were creating increasing frustration for all stakeholders. ATOM needed to not only eliminate these issues, but furthermore needed to provide users with a better and more user-friendly interface. The resultant ATOM range is proving extremely popular and because it is locally developed, it is extremely easy to customise to specific customer needs and support is provided instantaneously," says Powell.
There are three variants of ATOM available, dependent on customer requirements and applications. ATOM CORE is a basic entry-level biometric template distribution system for Morpho readers, with full enrolment via a terminal or Morpho enrolment reader; ATOM CHARGED has all the functionality of ATOM CORE, plus an integrated time and attendance element using Safran Morpho biometric terminals; and ATOM FUSION module has been developed to provide integration with the full Impro software suites as a T&A module.[Full Story.]
Internet / Access Control
Web-based T&A solution from local company Powell Tronics allows customised time management
Last updated: 24 June 2016
Studies have shown the biggest threat to businesses are not criminals trying to get into the network, but rather insiders leaking information to outside of the network. ITWeb reveals what companies need to do to protect their network and information assets through endpoint security technology, network security and user authentication.