{"id":13219,"date":"2018-10-09T09:34:20","date_gmt":"2018-10-09T07:34:20","guid":{"rendered":"https:\/\/www.centsys.co.za\/?p=13219"},"modified":"2018-10-09T09:34:20","modified_gmt":"2018-10-09T07:34:20","slug":"security-and-the-anthropomorphication-of-technology","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/","title":{"rendered":"Security and the &#8220;anthropomorphication&#8221; of technology"},"content":{"rendered":"<table width=\"100%\">\n<tbody>\n<tr>\n<td>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"708\">\n<table width=\"100%\">\n<tbody>\n<tr>\n<td>The Dutch sociologist <strong>Jan van Dijk<\/strong> termed humankind\u2019s relationship with the latest electronic devices as the \u201c<strong>anthropomorphication of technology<\/strong>\u201d, meaning that technology no longer serves as a mere tool used to gratify certain needs, but has become an extension of our very bodies.<\/p>\n<p>Certainly, it is hard to imagine a life without technology. So many aspects of our daily lives rely on the tiny electronic microcosms, the intricate technological ecosystems that provide us with boundless information, education, entertainment and, yes, even <strong>security<\/strong>.<\/p>\n<p>Technology has become such an important ally in the fight against crime that it permeates reality, especially in the context of South Africa, where <a href=\"https:\/\/www.news24.com\/SouthAfrica\/News\/live-police-ministry-releases-20172018-national-crime-statistics-20180911\">crime rates are at an all-time high<\/a>. We interface with <strong>security technology<\/strong> virtually every day, whether through pressing a button on a remote control or passing through a turnstile or<a href=\"https:\/\/www.centsys.co.za\/sector-ii\/\"> traffic barrier<\/a> at our place of work.<\/p>\n<p>As an <strong>access automation market leader<\/strong>, CENTURION has been instrumental with regards to promulgating this innovative technology to Africa and the rest of the world. Having recently added <a href=\"https:\/\/www.centsys.co.za\/access-control\/turnstiles\/\">turnstiles<\/a> to our industrial and commercial product stable, CENTURION has established itself as a truly turnkey provider of reliable access automation solutions. From domestic vehicular and pedestrian access control, to providing security on high-volume sites such as residential estates, sports complexes and airports, CENTURION has become the <em>de facto <\/em>standard for peace of mind.<\/p>\n<p><a href=\"https:\/\/www.centsys.co.za\">Check out our extensive and cutting edge range by visiting our website.<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>The Dutch sociologist Jan van Dijk termed humankind\u2019s relationship with the latest electronic devices as the \u201canthropomorphication of technology\u201d, meaning that technology no longer serves as a mere tool used to gratify certain needs, but has become an extension of our very bodies. Certainly, it is hard to imagine a life without technology. So many [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13221,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[6],"tags":[],"class_list":["post-13219","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-access-automation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Security and the &quot;anthropomorphication&quot; of technology - Centurion Systems French<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Security and the &quot;anthropomorphication&quot; of technology - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"The Dutch sociologist Jan van Dijk termed humankind\u2019s relationship with the latest electronic devices as the \u201canthropomorphication of technology\u201d, meaning that technology no longer serves as a mere tool used to gratify certain needs, but has become an extension of our very bodies. Certainly, it is hard to imagine a life without technology. So many [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2018-10-09T07:34:20+00:00\" \/>\r\n<meta name=\"author\" content=\"Charl Mijnhardt\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Charl Mijnhardt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/security-and-the-anthropomorphication-of-technology\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/security-and-the-anthropomorphication-of-technology\\\/\"},\"author\":{\"name\":\"Charl Mijnhardt\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"headline\":\"Security and the &#8220;anthropomorphication&#8221; of technology\",\"datePublished\":\"2018-10-09T07:34:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/security-and-the-anthropomorphication-of-technology\\\/\"},\"wordCount\":244,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/security-and-the-anthropomorphication-of-technology\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"access automation\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/security-and-the-anthropomorphication-of-technology\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/security-and-the-anthropomorphication-of-technology\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/security-and-the-anthropomorphication-of-technology\\\/\",\"name\":\"Security and the \\\"anthropomorphication\\\" of technology - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/security-and-the-anthropomorphication-of-technology\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/security-and-the-anthropomorphication-of-technology\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2018-10-09T07:34:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/security-and-the-anthropomorphication-of-technology\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/security-and-the-anthropomorphication-of-technology\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/security-and-the-anthropomorphication-of-technology\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/security-and-the-anthropomorphication-of-technology\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security and the &#8220;anthropomorphication&#8221; of technology\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\",\"name\":\"Charl Mijnhardt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"caption\":\"Charl Mijnhardt\"},\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/charl\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security and the \"anthropomorphication\" of technology - Centurion Systems French","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/","og_locale":"en_US","og_type":"article","og_title":"Security and the \"anthropomorphication\" of technology - Centurion Systems French","og_description":"The Dutch sociologist Jan van Dijk termed humankind\u2019s relationship with the latest electronic devices as the \u201canthropomorphication of technology\u201d, meaning that technology no longer serves as a mere tool used to gratify certain needs, but has become an extension of our very bodies. Certainly, it is hard to imagine a life without technology. So many [&hellip;]","og_url":"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/","og_site_name":"Centurion Systems French","article_published_time":"2018-10-09T07:34:20+00:00","author":"Charl Mijnhardt","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Charl Mijnhardt","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/"},"author":{"name":"Charl Mijnhardt","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"headline":"Security and the &#8220;anthropomorphication&#8221; of technology","datePublished":"2018-10-09T07:34:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/"},"wordCount":244,"commentCount":0,"image":{"@id":"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/#primaryimage"},"thumbnailUrl":"","articleSection":["access automation"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/","url":"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/","name":"Security and the \"anthropomorphication\" of technology - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/#primaryimage"},"image":{"@id":"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/#primaryimage"},"thumbnailUrl":"","datePublished":"2018-10-09T07:34:20+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/security-and-the-anthropomorphication-of-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Security and the &#8220;anthropomorphication&#8221; of technology"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23","name":"Charl Mijnhardt","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","caption":"Charl Mijnhardt"},"url":"https:\/\/www.centsys.com\/fr\/author\/charl\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/13219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=13219"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/13219\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=13219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=13219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=13219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}