IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

RFID Systems

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An RFID virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID (radio frequency identification) system. The deliberate creation and spreading of this type of virus is called RFID hacking. RFID technology, which uses tiny radio frequency (RF) transmitters and receivers to uniquely identify objects, is an increasingly popular alternative to bar code technology in supply  … 
Definition continues below.
RFID Systems Reports
 
Building trust in the security of RFID systems
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

TOPICS:  RFID | Security
ComputerWeekly.com

Shrinking the Supply Chain Expands the Return: The ROI of RFID in the Supply Chain
sponsored by Motorola, Inc.
WHITE PAPER: There are many business benefits of implementing RFID within your organization. Read this white paper for an in-depth look at the business case for implementing RFID technology within your supply line and what ROI results can be expected from this ...
Posted: 05 Jun 2007 | Published: 01 Aug 2006

Motorola, Inc.

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

Supply Chain Management Strategies
sponsored by Aptean
EGUIDE: In this e-guide from the experts at SearchManufacturingERP.com, uncover essential strategies for creating an effective supply chain plan and learn how to drive supply chain management (SCM) success.
Posted: 12 Sep 2013 | Published: 12 Sep 2013

Aptean

Automating Industrial Supply Chains
sponsored by Intermec
WHITE PAPER: Read this white paper to learn what total automation can do for an industrial/manufacturing enterprise, how it can dramatically improve operations by providing real-time data to all the interdependent parts of the supply chain.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Zebra. We Tag It - E-Book
sponsored by Zebra Technologies
EBOOK: When you tag it, you can see it, measure it, and learn from it. Tagging gives visibility into business to make the right decisions, at the right time, with the right information. Zebra can tag it with everything from bar codes to badges to RFID. Get the right information to do it better. All you have to do is tag it.
Posted: 18 Apr 2011 | Published: 18 Apr 2011

Zebra Technologies

American Apparel Finds the Right Fit
sponsored by Motorola RFID Solutions
CASE STUDY: The potential benefits of reducing labor and increasing sales from deploying an item-level RFID operation are clear. Read about current capabilities of RFID, including accuracy, performance and adaptability.
Posted: 23 Feb 2010 | Published: 22 Jan 2009

Motorola RFID Solutions

Giving Trade Companies a Fast Start
sponsored by SAP AG
PRODUCT LITERATURE: Whether you are a wholesale distributor of furniture, machinery, chemicals, or food and beverages, your success depends on how quickly you adapt to demands from customers and suppliers. You must constantly differentiate your services from the competition while improving operating efficiencies and controlling costs.
Posted: 30 Oct 2009 | Published: 10 Mar 2009

SAP AG

Identity-Aware Networking
sponsored by Extreme Networks
WHITE PAPER: When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Extreme Networks

How Professional Services Add Value to Radio Frequency Identification (RFID) Projects
sponsored by Intermec
WHITE PAPER: This white paper shows how qualified service providers can add value to RFID projects, highlights some of the planning issues and considerations that call for experienced advice, and provides guidance to the types of services available and how to differentiate service providers.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec
 
 
RFID SYSTEMS DEFINITION (continued): …  chain management. RFID does not require direct contact or line-of-sight scanning. Instead, RFID tagging uses small transponders, called tags, for identification and tracking purposes. The total system includes: Transponders placed on or in objects to be identified A set of read/write devices at security checkpoints A host system application for data collection, processing and transmission An identification database, also known as a back-end databaseIf the back-end database is altered or corrupted, an entire security network can be compromised. For example, the system may interpret a bogus … 
RFID Systems definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement