You've requested...

Applying RFID Technology in High Volume Manufacturing

If a new window did not open, click here to view this asset.

Download this next:

Track and manage healthcare devices in real-time with RFID

Zebra's RFID technology provides healthcare professionals a tool to track surgical trays and assets. A UK hospital's sterile services used RFID to locate surgical kits, preventing operation delays.

RFID tags resist sterilization, and readers offer real-time asset tracking. This system ensures staff know the readiness of items, enhancing efficiency, reducing risks, and allowing clinicians to prioritize patient care. Healthcare facilities should adopt RFID to improve sterile services.

Discover more about healthcare RFID solutions in this blog.

These are also closely related to: "Applying RFID Technology in High Volume Manufacturing"

  • RFID in healthcare for real-time location tracking

    To help address rising incidents of chronic illness, an ageing population, more expensive drugs and a shortage of clinical staff, Hull University Teaching Hospitals NHS Trust, looks to new technology and is seen as a pioneering and innovative healthcare provider.

    Discover why The Trust chose cloud-based Zebra MotionWorks™ healthcare medical equipment tracking solution for an ambitious safety project in this case study, which is quite possibly the biggest deployment of RFID in healthcare for real-time location tracking in Europe.

  • Top Cloud Trends for IT Leaders

    Cloud computing is no longer just a means for upstarts to disrupt incumbents while avoiding the complexities and costs of operating traditional monolithic IT infrastructures. If anything, the concepts of cloud computing – elasticity, pay-as-you-go consumption model and speed of deployment – have defined how IT should be run in any organization today.

    In this e-guide, read about the market potential for public cloud services in the Asia-Pacific (APAC) region, Oracle’s plans to meet the cloud computing needs of APAC enterprises and how perennial concerns around cloud security are being addressed by the industry.

Find more content like what you just read:

  • Top 10 ANZ IT stories of 2022

    In this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.

    Download

  • Driving Change in the Digital Age

    What separates leaders from laggards in digital transformation? In this e-guide, find out what it takes for CIOs to successfully navigate digital transformation strategy and challenges.

    Download

  • IoT & the Enterprise: Exploring Opportunities and Challenges in Asia

    Going by some industry estimates, the world will connect up 8.4 billion IoT devices by the end of 2017, a momentum that will continue through 2020 when 20.4 billion devices will be in use. Asia, home to two-thirds of the world's population, is expected to be the powerhouse driving global IoT developments.

    Download

  • What to expect in unified communications over the next decade

    This expert E-Guide from SearchUnifiedCommunications.com takes a look at the coming decade and what you can expect from the world of communications and collaboration by the year 2020.

    Download

  • How do cybercriminals steal credit card information?

    Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.

    Download

  • Key findings from a warehousing vision study

    By 2028, experts expect the global footprint of warehouses to increase by 19%. Zebra Technologies conducted a study with over 1,400 warehousing professionals to better understand the future of technology and innovation for warehousing. Download this white paper now to unlock the findings of the study.

    Download

  • IoT buyer's guide: 6 essential wireless features

    Getting your first few connected devices to market can feel like a monumental accomplishment. Luckily this IoT Buyers' Guide is here to help by providing some important questions, options, and best practices regarding cellular connectivity, security, and flexibility for a variety of enterprise IoT use cases.

    Download

  • A 5-step process to optimize PPI

    In recent years, physician preference items (PPI) have become a particularly hot topic, with various PPI selections accounting for 40% to 60% of total supply costs for most hospitals. Read this white paper to access a 5-step process to optimize PPI and help C-suite leaders reduce costs while still ensuring physicians get the tools they need.

    Download

  • Your guide to Artificial Intelligence in ASEAN

    In this e-guide, find out how financial institutions are using AI-powered chatbots to serve customers, what AI means for the future of work and how one Singapore-based startup is using declassified military methodologies to produce data-driven insights.

    Download

  • Reimagine the in-store experience

    The power of Smart Stores. Physical stores still represent 80 percent of retail sales, making exceptional in-store service a modern imperative. With AWS Smart Store capabilities, you can: Update digital technologies in physical stores, empower advanced in-store operations, and provide a seamless checkout experience for customers.

    Download

  • MicroScope - December 2017: Unlock the potential of DaaS

    This month's MicroScope ezine looks at the issues around device as a service (DaaS), the outlook from HP and a report from the UK CompTIA conference.

    Download

  • Pet care leader ups regression tests 25% via full phygital automation

    A pet care leader enhanced regression testing by 25% and cut execution from 8 to 3 days with Qualitest's phygital automation. The white paper details Qualitest's approach to augment customer journey and testing productivity. Learn how phygital automation can advance your regression testing in the full white paper.

    Download

  • The Evolution of the ‘Big Data’ Concept

    Access this exclusive guide to analyze the evolution of the big data concept. Examine how many analysts are coming to believe that the 3-V definition falls short. Continue on to delve further into the big data discussion and discover how Gartner, who originally introduced the 3-V concept, has begun to build on this rudimentary interpretation.

    Download

  • Why self-service is mission critical for today's retailers

    The retail sector is one of the fastest changing markets. While most retailers can only react, the ones that get ahead are the ones who can stay ahead of customer demands. To do that, you need flexibility built into your systems and a POS system that can support whatever configuration or design you can imagine. Read on to learn more.

    Download

  • A Computer Weekly buyer's guide to next-generation retail technology

    Customers' shopping habits were changing long before the coronavirus pandemic accelerated the e-commerce boom. In this 18-page buyer's guide, Computer Weekly looks at the tech innovations retailers are using to adapt and better serve customers.

    Download

  • The future of enterprise IT: Social, social, mobile, analytics and cloud

    Cloud and data technologies are allowing organizations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organizations in South-East Asia.

    Download

  • Computer Weekly – 19 February 2019: When is it best to stick with paper?

    In this week's Computer Weekly, sometimes going digital is not necessarily the best thing to do – we weigh the pros and cons of paper versus technology. Our new buyer's guide examines the challenges of asset management as you move to the cloud. And we look at the growing role of software developers in the future of networking. Read the issue now.

    Download

  • How Sestra Systems achieves consistent cloud connectivity

    As a provider of IOT-based smart beverage dispensers, Sestra Systems needs consistent connectivity to operate—even during network outages. So, how does the business ensure such connectivity? By partnering with Cradlepoint. Dig into this case study to learn how Cradlepoint’s cellular broadband enables connectivity success for Sestra Systems.

    Download

  • BadUSB 2.0: Exploring USB man-in-the-middle attacks

    This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.

    Download

  • Best Practices for mobile authentication

    Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.

    Download

  • 30-page e-book: IoT security benchmark report 2023

    81% of security leaders surveyed by Starfleet Research reported that their business was struck by an IoT-focused attack within the past year. So, how can you boost IoT security at your own organization? Find guidance in this 30-page e-book.

    Download

  • Datacentre Management

    In this e-guide, we've pulled together some of the latest thinking on good datacentre management practice, while shining a light on the tools and technologies that are on the market (or in the pipeline) that can help enterprises run their facilities with greater ease and agility.

    Download

  • Big data analytics & innovation in Australian healthcare

    In this e-guide, find out how healthcare providers in Australia and the rest of APAC have successfully tapped the power of data analytics and other related technologies to advance digital health and better position themselves to cope with the growing demand for healthcare.

    Download

  • Top OT cybersecurity risks & how to defend against them

    As cybercriminals continue to target older operational technology (OT) systems, security leaders are pressed to bolster defenses. To help them do so, this e-book details the top risks associated with OT systems and the ways that businesses can strengthen their security stances. Read on to access these insights.

    Download

  • The pandemic's  e-commerce boom

    The pandemic appears to have solidified e-commerce's ascendancy against the highstreet. Coronavirus has accelerated technology adoption in many sectors, and people have been forced to stay at home, increasing their online shopping habits in a bid to avoid visiting shops.

    Download

  • 8 actions for stronger OT cybersecurity

    Along with digging into the major cybersecurity threats troubling OT, such as IoT botnets and malware attacks, this e-book outlines 8 actions that organizations can take to defend their OT environments. Review the book and elevate your OT security preparedness.

    Download

  • Royal Holloway: Cloud-native honeypot deployment

    Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.

    Download

  • The UK manufacturing sector needs a digital upgrade

    In this week's Computer Weekly, the UK manufacturing sector is lagging behind on digital technology – we examine the challenges for the industry in becoming a global leader. Our buyer's guide looks at enterprise social media and collaboration tools. And we find out how data science is helping to boost cyber security strategies. Read the issue now.

    Download

  • Digital secure remote payment: How Apple Pay can change the future of remote payments

    Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.

    Download

  • 24-page e-book: IoT security in retail

    By 2030, IoT technology in retail is expected to increase to $297 billion, according to a 2023 report by Grand View Research. So, what is driving that massive adoption, and how can retail organizations ensure strong IoT security? Find answers in this 24-page e-book.

    Download

  • A hybrid approach: How the conversation around cloud is changing

    Enterprise cloud migrations used to be discussed in absolute terms.  In this e-guide, we take a look at how the conversation around cloud is changing within the enterprise, as migration habits and preferences are shaped by world events, resiliency and business agility concerns, as well as financial considerations.

    Download

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

    Download

  • Data-driven physical retail: 10-page paper

    To discover how a data-driven approach can revolutionize physical retail experiences, for customers and employees alike, explore this 10-page white paper.

    Download

  • Proactive Field Service Roadmap: 5 Key Priorities

    This report explores transitioning from reactive to proactive field service model, highlighting 5 priorities. Read on to understand them and to see how ServiceNow enhances operations by connecting teams, streamlining tasks, and empowering customers with its platform and Field Service Management app.

    Download

  • Computer Weekly – 30 May 2023: Can the UK cash in on chips?

    In this week's Computer Weekly, the UK government has committed £1bn to the semiconductor sector – but can it ever compete with the US and China? The potential of 5G networking could transform manufacturing – we examine the implications. Read the issue now.

    Download

  • Computer Weekly – 29 January 2019: A vintage digital transformation for Majestic Wines

    In this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.

    Download

  • The Business Bottleneck

    When it comes to digital transformation and making better use of your software solutions, there is often a disconnect between IT and the rest of the business. How a business utilizes their software to enhance the customer experience is what separates them from the competition. Read on to learn how to use software to run and develop your business.

    Download

  • Computer Weekly – 20 June 2023: How to keep network costs affordable

    In this week's Computer Weekly, as demands for networking performance and speed increase, we examine how to keep a handle on costs. Chip makers are investing in PLC flash technology but some think it won't be worth the effort; we investigate. And we listen in as tech industry leaders and politicians discuss the regulation of AI. Read the issue now.

    Download

  • Best Practices for Managing and Understanding Mobile Authentication

    In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.

    Download

  • What Is an AI-driven Enterprise?

    Inside this e-book, “What Is an AI-driven Enterprise?” you’ll learn about the evolution of AI, what constitutes an AI-driven business, and the building blocks that can enable your organization to attain that status.

    Download

  • Royal Holloway: Rowhammer – From DRAM faults to escalating privileges

    Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them

    Download

  • Mobile Payments Using Host Card Emulation with NFC

    In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.

    Download

  • Beginner's guide to Internet of Things

    The adoption of IoT in Asia-Pacific has accelerated over the past few years, spurred by growing digitalisation across the region and the desire to improve business processes. In this e-guide, learn more about IoT developments across the region and how to leverage the technology to drive business outcomes.

    Download

  • 16-page e-book: Digital twins for automotive manufacturing

    With an accelerated shift to electrification, automotive manufacturers are challenged to evolve their processes quickly while delivering consistent, compliant products. So, how can manufacturers approach that incredibly complex undertaking? Dig into this e-book to find out how adopting digital manufacturing technologies can help.

    Download

  • Innovation Awards APAC 2023 - Project of the Year: Mondelez International

    Mondelez operates a large supply chain and manufacturing footprint to produce well-known snacks such as Cadbury chocolates and Oreo biscuits. In this e-guide, read how Mondelez tapped low-code/no-code development, drones and other emerging technologies, to deliver productivity gains, better employee experience and higher production yields.

    Download

  • Bitcoin, App Security, and Oracle's Controversial Licensing Policies

    Discover how blockchain, the tech behind bitcoin, is extending its reach beyond financial services into new industries. Also learn from developers about the pros and cons of componentizing application software, examine what a recent court case shows about Oracle's licensing policies, and more.

    Download

  • Upgrading to 802.11n

    This E-Guide identifies key questions that enterprise customers should ask prospective WLAN vendors and also provides a list of vendors that will suit the needs specific to your business.

    Download