IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

RFID Systems

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An RFID virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID (radio frequency identification) system. The deliberate creation and spreading of this type of virus is called RFID hacking. RFID technology, which uses tiny radio frequency (RF) transmitters and receivers to uniquely identify objects, is an increasingly popular alternative to bar code technology in supply  … 
Definition continues below.
RFID Systems Reports
 
CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Innovative business technologies in a converging world
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This independently researched report investigates converging business technologies, including cloud computing, big data analytics and business intelligence.  
Posted: 18 Feb 2013 | Published: 18 Feb 2013

ComputerWeekly.com

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute

Retail Fashion Market RFID Solutions
sponsored by Motorola, Inc.
WHITE PAPER: This whitepaper explains how Radio Frequency Identification (RFID) provides real-time inventory visibility so you can react quickly to inventory demand and stocking levels, helping ensure that the right product is available for your customers at the right
Posted: 22 Jul 2008 | Published: 01 Jan 2007

Motorola, Inc.

Strategies for Profitable Growth - Aerospace & Defense Manufacturing
sponsored by SAP AG
WHITE PAPER: Examine the comprehensive strategies, solutions, and best practices for the aerospace and defense (A&D) manufacturing industry based on technical and business expertise. Learn best practices and strategies for profitable growth in your business.
Posted: 21 Feb 2008 | Published: 01 Jan 2005

SAP AG

Giving Trade Companies a Fast Start: SAP All-in-One Fast Start Program
sponsored by SAP America, Inc.
PRODUCT LITERATURE: Whether you are a wholesale distributor of furniture, machinery, chemicals, or food and beverages, your success depends on how quickly you adapt to demands from customers and suppliers. You must constantly differentiate your services from the competition while improving operating efficiencies and controlling costs.
Posted: 10 Mar 2009 | Published: 10 Mar 2009

SAP America, Inc.

Leveraging RFID & Other Pervasive Technologies to Achieve Transaction Efficiency in Consumer Retailing
sponsored by Infosys Technologies Limited
WHITE PAPER: Providing customer satisfaction with retail operations allows organizations to gain the most revenue from their customers. Read this paper to learn how pervasive technology can be deployed to optimize operations and enable a superior customer experience.
Posted: 14 May 2007 | Published: 01 May 2006

Infosys Technologies Limited

Long Distance Supply Chain Optimization: Shifting from Local to Global Networks
sponsored by Infor
PRODUCT LITERATURE: A long distance sourcing solution can provide a real-time link between logistics, material planning, manufacturing, inventory control and supply chain execution.
Posted: 10 Nov 2006 | Published: 01 Nov 2006

Infor

Real Time Information for the Pervasive Enterprise
sponsored by Infosys Technologies Limited
PRODUCT LITERATURE: Real-time visibility into operations enables response to market dynamics and competition. Read this paper to learn how to leverage pervasive technologies to transform an organization into a pervasive enterprise.
Posted: 14 May 2007 | Published: 01 Oct 2006

Infosys Technologies Limited

RFID Basics for Retailers
sponsored by Intermec
WHITE PAPER: This white paper illuminates RFID by providing an overview of RFID technology; describing the current status of relevant RFID standards initiatives; illustrating how RFID can be integrated to enhance existing wireless LAN, bar code and mobile computing systems; and providing guidance for selecting and planning RFID pilots and implementations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec
 
 
RFID SYSTEMS DEFINITION (continued): …  chain management. RFID does not require direct contact or line-of-sight scanning. Instead, RFID tagging uses small transponders, called tags, for identification and tracking purposes. The total system includes: Transponders placed on or in objects to be identified A set of read/write devices at security checkpoints A host system application for data collection, processing and transmission An identification database, also known as a back-end databaseIf the back-end database is altered or corrupted, an entire security network can be compromised. For example, the system may interpret a bogus … 
RFID Systems definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement