The MTT-Tracker system includes a series of alerts that can be visualised in various types of mobile devices through the installation of an application. This application notifies the user of the following alerts: Player out Floor to table High impact plays (Player goes all-in, All-in call, …) New player Security Alerts (false chip, etc) These alarms allow a journalist to be in the right place at the right time, and report on the high points of the tournament. They also enable a tournament organizer to be updated on potential conflicts on each table and follow important events within the tournament.Read More →


All in-game objects used in a tournament controlled by the MTT-Tracking platform incorporate a unique id code. This ID is checked constantly by the MMT System integrated into the poker table. For this very reason MTT-Tracker is presented as an anti-fraud system for poker tournaments, as all objects used in the tournament must contain a valid ID. The system avoids the introduction of false or non valid elements as well as allowing the control of stacks, bets and cards.Read More →

Comms entre mesa y cloud

Communications security is achieved by the use of AES 64-bit encryption and the use of an encrypted VPN (Virtual Private Network). Using various levels of encryption increases security and protects crucial hand data. This VPN enables communication between the table component of MTT-Tracker and the central servers that populate the various data output systems (webpage, alerts application, social media, etc.). The following diagram shows the different levels of security integrated into the MTT system in order to guarantee in-game control and data security: (Click on the image to enlarge)Read More →


The poker table component of MTT-Tracker is a closed system. No hand information is sent from the table to external systems until the hand is completely finished and the POT has been distributed. Players’ stacks and bets are calculated and scanned throughout the game. In this way MTT-Tracker obtains information about raises, blinds, etc. However, although card IDs are scanned as well, the true value of a card is unknown to the table system component. Only the player knows the cards in his hand. The central server is the only place where the translation from card ID to card value can be carried out, andRead More →

rfid desarrollo

The RFID read system integrated into the MTT-Tracker multi-table solution has been developed over a period of several years. eXperience IT Solutions has invested heavily in the investigation and analysis of advanced antenna configurations for high density tag populations with reduced footprint and minimal elevation profiles. Additionally, the MTT-Tracker middleware developed specifically for this system includes tag read and data processing algorithms created to optimize high density tag population reads and guarantee very high levels of precision and accuracy,which permit the identification of large tag populations quickly and efficiently.Read More →


RFID Basic Concepts The basic concept of Radio Frequency Identification (RFID) is that a query is sent out over radio waves (“What or who are you?”) and then a subsequent reply is received (“This is what or who I am”). How RFID Works The underlying technology architecture of RFID is based on these components: tag and its associated data structure reader with antenna and the reader’s associated middleware communications protocol suite communications network database – data synchronization A reader with it’s antenna can be either stationary in a fixed state (e.g., mounted above a conveyor belt or in the doorway of an office) or mobileRead More →