IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

RFID Systems

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An RFID virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID (radio frequency identification) system. The deliberate creation and spreading of this type of virus is called RFID hacking. RFID technology, which uses tiny radio frequency (RF) transmitters and receivers to uniquely identify objects, is an increasingly popular alternative to bar code technology in supply  … 
Definition continues below.
RFID SystemsReports
 
CW buyer's guide: The business advantages of big data
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Big data may appear to be just another bandwagon, but it is important, and needs to be addressed carefully and sensibly.
Posted: 16 Nov 2012 | Published: 16 Nov 2012

ComputerWeekly.com

Applying RFID Technology in High Volume Manufacturing
sponsored by Intel Corporation
WHITE PAPER: The recent evolution of global radio frequency identification (RFID) standards is leading many manufacturers to accelerate their investigations of its potential. Read this report to explore how (RFID) technology can be used for high volume manufacturing.
Posted: 20 Aug 2007 | Published: 01 Sep 2005

Intel Corporation

American Apparel Finds the Right Fit
sponsored by Motorola RFID Solutions
CASE STUDY: The potential benefits of reducing labor and increasing sales from deploying an item-level RFID operation are clear. Read about current capabilities of RFID, including accuracy, performance and adaptability.
Posted: 23 Feb 2010 | Published: 22 Jan 2009

Motorola RFID Solutions

Debunking the Top Eight Myths Surrounding Small-Business Warehouse Management Systems (WMS)
sponsored by HighJump Software
WHITE PAPER: Learn why companies of all sizes are turning to best-of-breed warehouse management systems (WMS) in an effort to reduce costs and boost productivity in the face of increased globalization, regulation and competition.
Posted: 26 May 2008 | Published: 01 Aug 2007

HighJump Software

Top 10 Supply Chain Technology Trends
sponsored by Intermec
WHITE PAPER: This white paper identifies the top 10 technology trends in mobile, industrial and supply chain operations environments and presents results from users who have adapted the technologies to improve their businesses.
Posted: 05 Jun 2008 | Published: 01 Apr 2007

Intermec

Building a Unified Enterprise Mobility Strategy
sponsored by Motorola, Inc.
WHITE PAPER: This paper outlines a step-by-step approach to developing a unified enterprise mobility strategy, enabling a more cost-effective and efficient delivery of network connectivity to a larger mobile workforce.
Posted: 29 Jun 2007 | Published: 01 May 2007

Motorola, Inc.

Automating Industrial Supply Chains
sponsored by Intermec
WHITE PAPER: Read this white paper to learn what total automation can do for an industrial/manufacturing enterprise, how it can dramatically improve operations by providing real-time data to all the interdependent parts of the supply chain.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Infoblox Integrated IP Address Management Solution
sponsored by Infoblox
WHITE PAPER: In this paper, we will explain the importance of IP address management, discuss the different approaches to implementing IP address management solutions.
Posted: 26 Mar 2014 | Published: 26 Feb 2007

Infoblox

Mobile RFID Readers: Read Points That Move with Your Assets
sponsored by Motorola, Inc.
WHITE PAPER: Tracking inventory with RFID just got easier. Read this white paper to see how mobile RFID read points are helping increase visibility for company inventory and other assets, regardless of where it is in the supply chain.
Posted: 05 Jun 2007 | Published: 01 Mar 2007

Motorola, Inc.

Do You Know Where Your Assets Are? Maximizing ROI With Radio Frequency Identification (RFID) Asset Management
sponsored by Intermec
WHITE PAPER: This white paper examines asset tracking with RFID technology by providing a brief overview of technologies available, an explanation of how passive UHF RFID can be used for asset tracking, an exploration of who's using RFID, a discussion on deciding what to track and making a business case for RFID, and a guide to choosing the right RFID partners.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec
 
 
RFID SYSTEMS DEFINITION (continued): …  chain management. RFID does not require direct contact or line-of-sight scanning. Instead, RFID tagging uses small transponders, called tags, for identification and tracking purposes. The total system includes: Transponders placed on or in objects to be identified A set of read/write devices at security checkpoints A host system application for data collection, processing and transmission An identification database, also known as a back-end databaseIf the back-end database is altered or corrupted, an entire security network can be compromised. For example, the system may interpret a bogus … 
RFID Systems definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement