IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

RFID Systems

RSS Feed   
DEFINITION: An RFID virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID (radio frequency identification) system. The deliberate creation and spreading of this type of virus is called RFID hacking. RFID technology, which uses tiny radio frequency (RF) transmitters and receivers to uniquely identify objects, is an increasingly popular alternative to bar code technology in supply  … 

RFID Systems definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
RFID Systems Reports
 
CW buyer's guide: The business advantages of big data
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Big data may appear to be just another bandwagon, but it is important, and needs to be addressed carefully and sensibly.
Posted: 16 Nov 2012 | Published: 16 Nov 2012

ComputerWeekly.com

A Computer Weekly buyer's guide to retail technology
sponsored by ComputerWeekly.com
EGUIDE: The retail industry is evolving alongside the emergence of new technologies. In this 15-page buyer's guide, Computer Weekly looks at how retailers are using AI, the importance of good digital customer experience and how mobiles have transformed the purchasing process.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

ComputerWeekly.com

CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

The Diverse and Exploding Digital Universe
sponsored by EMC Corporation
WHITE PAPER: This white paper, sponsored by EMC, is an update of IDC's inaugural forecast of the digital universe published in March 2007. In this year's update we discuss the implications for business, government, and society.
Posted: 28 Aug 2008 | Published: 27 Aug 2008

EMC Corporation

Getting Started with UHF RFID Solutions: The Technology, Applications and Benefits
sponsored by Motorola, Inc.
WHITE PAPER: This white paper explains how Radio Frequency Identification (RFID) can provide the supply chain and asset visibility required for business success through automated identification, location and tracking of your products and assets.
Posted: 01 Sep 2011 | Published: 31 Jul 2011

Motorola, Inc.

Strategies for Profitable Growth - Aerospace & Defense Manufacturing
sponsored by SAP AG
WHITE PAPER: Examine the comprehensive strategies, solutions, and best practices for the aerospace and defense (A&D) manufacturing industry based on technical and business expertise. Learn best practices and strategies for profitable growth in your business.
Posted: 21 Feb 2008 | Published: 01 Jan 2005

SAP AG

Make the Right Database Investment
sponsored by Sybase, an SAP company
WHITE PAPER: This paper compares the TCO of Oracle11g and Sybase ASE 15 databases, and demonstrates Sybase as the clear winner. Read this paper to learn why enterprises choose Sybase ASE on Linux for mission-critical applications that demand lightning-fast performance.
Posted: 19 Jun 2009 | Published: 19 Jun 2009

Sybase, an SAP company

Manufacturing Technology Trends in 2013
sponsored by Sage Software
EGUIDE: How are macro technology trends such as mobile and cloud affecting the manufacturing sector? What implications does the Dodd-Frank Act and an increasing numbers of Millennials in the global workforce have on supply chains? This E-Guide exposes trends to watch out for in 2013 and beyond
Posted: 24 Jul 2013 | Published: 24 Jul 2013

Sage Software

Identity-Aware Networking
sponsored by Extreme Networks
WHITE PAPER: When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Extreme Networks

Supply Chain Management Strategies
sponsored by Aptean
EGUIDE: In this e-guide from the experts at SearchManufacturingERP.com, uncover essential strategies for creating an effective supply chain plan and learn how to drive supply chain management (SCM) success.
Posted: 12 Sep 2013 | Published: 12 Sep 2013

Aptean
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement