IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

RFID Systems

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An RFID virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID (radio frequency identification) system. The deliberate creation and spreading of this type of virus is called RFID hacking. RFID technology, which uses tiny radio frequency (RF) transmitters and receivers to uniquely identify objects, is an increasingly popular alternative to bar code technology in supply  … 
Definition continues below.
RFID SystemsReports
 
CW buyer's guide: The business advantages of big data
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Big data may appear to be just another bandwagon, but it is important, and needs to be addressed carefully and sensibly.
Posted: 16 Nov 2012 | Published: 16 Nov 2012

ComputerWeekly.com

Big data: Lessons from the leaders
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This research from the Economist Intelligence Unit assess how far companies have progressed in their use of big data and examines how they can turn it to business advantage.
Posted: 14 Sep 2012 | Published: 14 Sep 2012

ComputerWeekly.com

ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Giving Trade Companies a Fast Start
sponsored by SAP AG
PRODUCT LITERATURE: Whether you are a wholesale distributor of furniture, machinery, chemicals, or food and beverages, your success depends on how quickly you adapt to demands from customers and suppliers. You must constantly differentiate your services from the competition while improving operating efficiencies and controlling costs.
Posted: 30 Oct 2009 | Published: 10 Mar 2009

SAP AG

Supply Chain Management Strategies
sponsored by Aptean
EGUIDE: In this e-guide from the experts at SearchManufacturingERP.com, uncover essential strategies for creating an effective supply chain plan and learn how to drive supply chain management (SCM) success.
Posted: 12 Sep 2013 | Published: 12 Sep 2013

Aptean

RFID Basics for Retailers
sponsored by Intermec
WHITE PAPER: This white paper illuminates RFID by providing an overview of RFID technology; describing the current status of relevant RFID standards initiatives; illustrating how RFID can be integrated to enhance existing wireless LAN, bar code and mobile computing systems; and providing guidance for selecting and planning RFID pilots and implementations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Debunking the Top Eight Myths Surrounding Small-Business Warehouse Management Systems (WMS)
sponsored by HighJump Software
WHITE PAPER: Learn why companies of all sizes are turning to best-of-breed warehouse management systems (WMS) in an effort to reduce costs and boost productivity in the face of increased globalization, regulation and competition.
Posted: 26 May 2008 | Published: 01 Aug 2007

HighJump Software

Do You Know Where Your Assets Are? Maximizing ROI With Radio Frequency Identification (RFID) Asset Management
sponsored by Intermec
WHITE PAPER: This white paper examines asset tracking with RFID technology by providing a brief overview of technologies available, an explanation of how passive UHF RFID can be used for asset tracking, an exploration of who's using RFID, a discussion on deciding what to track and making a business case for RFID, and a guide to choosing the right RFID partners.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Case Study: Trasluz Casual Wear - Stylish Results in Children's Clothing
sponsored by Intermec
WHITE PAPER: Access this white paper today to learn more about how implementing a comprehensive track-and-trace solution brought success in this case study, and consider applying the solution to your own business!
Posted: 17 Oct 2013 | Published: 16 Oct 2013

Intermec

Real Time Information for the Pervasive Enterprise
sponsored by Infosys Technologies Limited
PRODUCT LITERATURE: Real-time visibility into operations enables response to market dynamics and competition. Read this paper to learn how to leverage pervasive technologies to transform an organization into a pervasive enterprise.
Posted: 14 May 2007 | Published: 01 Oct 2006

Infosys Technologies Limited
 
 
RFID SYSTEMS DEFINITION (continued): …  chain management. RFID does not require direct contact or line-of-sight scanning. Instead, RFID tagging uses small transponders, called tags, for identification and tracking purposes. The total system includes: Transponders placed on or in objects to be identified A set of read/write devices at security checkpoints A host system application for data collection, processing and transmission An identification database, also known as a back-end databaseIf the back-end database is altered or corrupted, an entire security network can be compromised. For example, the system may interpret a bogus … 
RFID Systems definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement