IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

RFID Systems

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An RFID virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID (radio frequency identification) system. The deliberate creation and spreading of this type of virus is called RFID hacking. RFID technology, which uses tiny radio frequency (RF) transmitters and receivers to uniquely identify objects, is an increasingly popular alternative to bar code technology in supply  … 
Definition continues below.
RFID SystemsWhite Papers (View All Report Types)
 
RFID Asset Management Solutions
sponsored by Motorola, Inc.
WHITE PAPER: RFID technology is helping to revolutionize asset management -from small packages to high dollar assets such as shipping containers or expensive IT equipment. Read this white paper to learn more.
Posted: 05 Jun 2007 | Published: 01 Jan 2007

Motorola, Inc.

Mobile RFID Readers: Read Points That Move with Your Assets
sponsored by Motorola, Inc.
WHITE PAPER: Tracking inventory with RFID just got easier. Read this white paper to see how mobile RFID read points are helping increase visibility for company inventory and other assets, regardless of where it is in the supply chain.
Posted: 05 Jun 2007 | Published: 01 Mar 2007

Motorola, Inc.

Automating Industrial Supply Chains
sponsored by Intermec
WHITE PAPER: Read this white paper to learn what total automation can do for an industrial/manufacturing enterprise, how it can dramatically improve operations by providing real-time data to all the interdependent parts of the supply chain.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies

Applying RFID Technology in High Volume Manufacturing
sponsored by Intel Corporation
WHITE PAPER: The recent evolution of global radio frequency identification (RFID) standards is leading many manufacturers to accelerate their investigations of its potential. Read this report to explore how (RFID) technology can be used for high volume manufacturing.
Posted: 20 Aug 2007 | Published: 01 Sep 2005

Intel Corporation

How Professional Services Add Value to Radio Frequency Identification (RFID) Projects
sponsored by Intermec
WHITE PAPER: This white paper shows how qualified service providers can add value to RFID projects, highlights some of the planning issues and considerations that call for experienced advice, and provides guidance to the types of services available and how to differentiate service providers.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

The Diverse and Exploding Digital Universe
sponsored by EMC Corporation
WHITE PAPER: This white paper, sponsored by EMC, is an update of IDC's inaugural forecast of the digital universe published in March 2007. In this year's update we discuss the implications for business, government, and society.
Posted: 28 Aug 2008 | Published: 27 Aug 2008

EMC Corporation

Tightening the Chain - Supply Chain Cost-Cutting Strategies
sponsored by SAP America, Inc.
WHITE PAPER: Maintain operational efficiency while cutting supply chain costs with new approaches, technologies, and methodologies. Third party logistics providers, radio frequency identification rentals, and attribute-based demand planning can help you reduce supply chain costs and boost customer satisfaction.
Posted: 07 Aug 2009 | Published: 07 Aug 2009

SAP America, Inc.

Identity-Aware Networking
sponsored by Extreme Networks
WHITE PAPER: When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Extreme Networks

How Mobile Printers Drive Efficiency Throughout the Supply Chain
sponsored by Zebra Technologies
WHITE PAPER: This paper discusses how supplementing enterprise-printing operations with mobile printers eliminates bottlenecks and boosts accuracy, resulting in better overall performance of manufacturing, warehouse management, and supply chain operations.
Posted: 26 Feb 2010 | Published: 26 Feb 2010

Zebra Technologies
 
 
RFID SYSTEMS DEFINITION (continued): …  chain management. RFID does not require direct contact or line-of-sight scanning. Instead, RFID tagging uses small transponders, called tags, for identification and tracking purposes. The total system includes: Transponders placed on or in objects to be identified A set of read/write devices at security checkpoints A host system application for data collection, processing and transmission An identification database, also known as a back-end databaseIf the back-end database is altered or corrupted, an entire security network can be compromised. For example, the system may interpret a bogus … 
RFID Systems definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement