IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

RFID Systems

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An RFID virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID (radio frequency identification) system. The deliberate creation and spreading of this type of virus is called RFID hacking. RFID technology, which uses tiny radio frequency (RF) transmitters and receivers to uniquely identify objects, is an increasingly popular alternative to bar code technology in supply  … 
Definition continues below.
RFID Systems Reports
CW buyer's guide: The business advantages of big data
sponsored by
ESSENTIAL GUIDE: Big data may appear to be just another bandwagon, but it is important, and needs to be addressed carefully and sensibly.
Posted: 16 Nov 2012 | Published: 16 Nov 2012

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies

Strategies for Profitable Growth - Aerospace & Defense Manufacturing
sponsored by SAP AG
WHITE PAPER: Examine the comprehensive strategies, solutions, and best practices for the aerospace and defense (A&D) manufacturing industry based on technical and business expertise. Learn best practices and strategies for profitable growth in your business.
Posted: 21 Feb 2008 | Published: 01 Jan 2005


Mobile RFID Readers: Read Points That Move with Your Assets
sponsored by Motorola, Inc.
WHITE PAPER: Tracking inventory with RFID just got easier. Read this white paper to see how mobile RFID read points are helping increase visibility for company inventory and other assets, regardless of where it is in the supply chain.
Posted: 05 Jun 2007 | Published: 01 Mar 2007

Motorola, Inc.

Warehouse management tips, techniques, and technologies
sponsored by IQMS
EBOOK: This eBook explains the benefits of warehouse management systems (WMSs) and how to boost their effectiveness through integration with related technologies, such as labor management systems (LMSs) and RFID.
Posted: 05 Sep 2011 | Published: 05 Sep 2011


Real Time Information for the Pervasive Enterprise
sponsored by Infosys Technologies Limited
PRODUCT LITERATURE: Real-time visibility into operations enables response to market dynamics and competition. Read this paper to learn how to leverage pervasive technologies to transform an organization into a pervasive enterprise.
Posted: 14 May 2007 | Published: 01 Oct 2006

Infosys Technologies Limited

Practical Uses for Radio Frequency Identification (RFID) Technology in Manufacturing and Distribution Applications
sponsored by Intermec
WHITE PAPER: More than a great technology, RFID is an excellent business tool that helps manage supply chains, increase margins and profits, and decrease costs.
Posted: 04 Mar 2009 | Published: 04 Mar 2009


The Global Supply Chain: Under New Management
sponsored by SearchManufacturingERP
EBOOK: Get a primer on the supply chain management software and hardware that can help you get a handle on global supply chain risks.
Posted: 30 Mar 2012 | Published: 29 Mar 2012


Make Sense of Sensor Technology
sponsored by SearchManufacturingERP
EBOOK: Sensor technology is improving the supply chain by giving manufacturers insight into their products and their delivery process.
Posted: 06 Jul 2015 | Published: 06 Jul 2015


ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

RFID SYSTEMS DEFINITION (continued): …  chain management. RFID does not require direct contact or line-of-sight scanning. Instead, RFID tagging uses small transponders, called tags, for identification and tracking purposes. The total system includes: Transponders placed on or in objects to be identified A set of read/write devices at security checkpoints A host system application for data collection, processing and transmission An identification database, also known as a back-end databaseIf the back-end database is altered or corrupted, an entire security network can be compromised. For example, the system may interpret a bogus … 
RFID Systems definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement