IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

RFID Systems

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An RFID virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID (radio frequency identification) system. The deliberate creation and spreading of this type of virus is called RFID hacking. RFID technology, which uses tiny radio frequency (RF) transmitters and receivers to uniquely identify objects, is an increasingly popular alternative to bar code technology in supply  … 
Definition continues below.
RFID SystemsWhite Papers (View All Report Types)
 
RFID Reader Options for Better RFID Solution Design
sponsored by Motorola, Inc.
WHITE PAPER: This white paper provides an in-depth look at the three types of Radio Frequency Identification (RFID) readers: handheld, mobile, and fixed. These readers provide solutions that enable enterprises to truly maximize the value of RFID technology.
Posted: 22 Jul 2008 | Published: 01 Jan 2007

Motorola, Inc.

ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Tightening the Chain - Supply Chain Cost-Cutting Strategies
sponsored by SAP America, Inc.
WHITE PAPER: Maintain operational efficiency while cutting supply chain costs with new approaches, technologies, and methodologies. Third party logistics providers, radio frequency identification rentals, and attribute-based demand planning can help you reduce supply chain costs and boost customer satisfaction.
Posted: 07 Aug 2009 | Published: 07 Aug 2009

SAP America, Inc.

Do You Know Where Your Assets Are? Maximizing ROI With Radio Frequency Identification (RFID) Asset Management
sponsored by Intermec
WHITE PAPER: This white paper examines asset tracking with RFID technology by providing a brief overview of technologies available, an explanation of how passive UHF RFID can be used for asset tracking, an exploration of who's using RFID, a discussion on deciding what to track and making a business case for RFID, and a guide to choosing the right RFID partners.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Make the Right Database Investment
sponsored by Sybase, an SAP company
WHITE PAPER: This paper compares the TCO of Oracle11g and Sybase ASE 15 databases, and demonstrates Sybase as the clear winner. Read this paper to learn why enterprises choose Sybase ASE on Linux for mission-critical applications that demand lightning-fast performance.
Posted: 19 Jun 2009 | Published: 19 Jun 2009

Sybase, an SAP company

Debunking the Top Eight Myths Surrounding Small-Business Warehouse Management Systems (WMS)
sponsored by HighJump Software
WHITE PAPER: Learn why companies of all sizes are turning to best-of-breed warehouse management systems (WMS) in an effort to reduce costs and boost productivity in the face of increased globalization, regulation and competition.
Posted: 26 May 2008 | Published: 01 Aug 2007

HighJump Software

Building a Unified Enterprise Mobility Strategy
sponsored by Motorola, Inc.
WHITE PAPER: This paper outlines a step-by-step approach to developing a unified enterprise mobility strategy, enabling a more cost-effective and efficient delivery of network connectivity to a larger mobile workforce.
Posted: 29 Jun 2007 | Published: 01 May 2007

Motorola, Inc.

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies

Infoblox Integrated IP Address Management Solution
sponsored by Infoblox
WHITE PAPER: In this paper, we will explain the importance of IP address management, discuss the different approaches to implementing IP address management solutions.
Posted: 26 Mar 2014 | Published: 26 Feb 2007

Infoblox

Applying RFID Technology in High Volume Manufacturing
sponsored by Intel Corporation
WHITE PAPER: The recent evolution of global radio frequency identification (RFID) standards is leading many manufacturers to accelerate their investigations of its potential. Read this report to explore how (RFID) technology can be used for high volume manufacturing.
Posted: 20 Aug 2007 | Published: 01 Sep 2005

Intel Corporation
 
 
RFID SYSTEMS DEFINITION (continued): …  chain management. RFID does not require direct contact or line-of-sight scanning. Instead, RFID tagging uses small transponders, called tags, for identification and tracking purposes. The total system includes: Transponders placed on or in objects to be identified A set of read/write devices at security checkpoints A host system application for data collection, processing and transmission An identification database, also known as a back-end databaseIf the back-end database is altered or corrupted, an entire security network can be compromised. For example, the system may interpret a bogus … 
RFID Systems definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement