IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

RFID Systems

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An RFID virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID (radio frequency identification) system. The deliberate creation and spreading of this type of virus is called RFID hacking. RFID technology, which uses tiny radio frequency (RF) transmitters and receivers to uniquely identify objects, is an increasingly popular alternative to bar code technology in supply  … 
Definition continues below.
RFID Systems Multimedia (View All Report Types)
 
Ansible Tower 3: An Introductory Look
sponsored by Red Hat
VIDEO: Give your team the power to scale: Learn how to manage complex, multi-tier application deployments and trouble-shooting with an IT automation framework. View now to end repetitive tasks, speed productivity, and scale IT initiatives by centralizing control of your infrastructure.
Posted: 12 Jan 2017 | Premiered: 20 Jul 2016

Red Hat

Azure Security and Identity Management Best Practices
sponsored by Rackspace
WEBCAST: Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rackspace

Free Download: Real-Time, Comprehensive Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015

AlienVault

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Gaining Support for ITAM: Improve IT Operations Through Data Curation
sponsored by BDNA
VIDEO: Tune into this webinar to learn how to enforce enterprise-wide data consistency and improve IT operations with robust ITAM that transforms multi-source data into actionable business insight.
Posted: 03 Nov 2016 | Premiered: 31 Jul 2016

BDNA

Rackspace Customer Story: International payments provider OFX migrates to AWS
sponsored by Rackspace
VIDEO: Tune into this brief video to see OFX, a foreign exchange platform, undertake a transformative migration project to AWS Cloud, and discover how AWS empowers one to deliver the quick, innovative functionality customers are demanding through increased flexibility, scalability and resilience of a cloud environment.
Posted: 19 Apr 2017 | Premiered: 01 Mar 2017

Rackspace

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

Get Cost Visibility and Chargeback for Your Cloud Services
sponsored by Hewlett Packard Enterprise
VIRTUAL ENVIRONMENT: This in-depth webcast, presented by Daniel Galecki, a software veteran and IT asset management guru, covers the IT transformation from a cost center to an IT service broker, and explains why analysts agree that chargeback is critical to the success of your cloud projects.
Posted: 17 Jun 2014 | Premiered: 10 Jun 2014

Hewlett Packard Enterprise

Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

Transform Your Applications, Transform Your Business
sponsored by Hewlett-Packard Enterprise
VIDEO: Learn how to drive innovation, while reducing costs business-wide, by strategically modernizing and managing your digital applications. Gain an idea of what features are most important for your business as you look to move away from a dated legacy platform and select the right technology partner.
Posted: 16 Sep 2016 | Premiered: 02 Aug 2016

Hewlett-Packard Enterprise
 
 
RFID SYSTEMS DEFINITION (continued): …  chain management. RFID does not require direct contact or line-of-sight scanning. Instead, RFID tagging uses small transponders, called tags, for identification and tracking purposes. The total system includes: Transponders placed on or in objects to be identified A set of read/write devices at security checkpoints A host system application for data collection, processing and transmission An identification database, also known as a back-end databaseIf the back-end database is altered or corrupted, an entire security network can be compromised. For example, the system may interpret a bogus … 
RFID Systems definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement