RFID is the most significant, game-changing technology that we have seen in several years,” notes Chris Kohne, manager solutions consulting for Manugistics Group, Inc. (www.manugistics.com), a ...
Crash cart trays had to be manually stocked by a technician and then checked by a pharmacist. This was a time-consuming activity that took 20-30 minutes per tray. It ...
I was speaking with a researcher the other day who had been running some tests on the ability to read radio frequency identification tags on a wide variety of individual consumer products in random ...
New rugged MC9190-Z RFID mobile computer delivers best-in-class RFID read range and accuracy for quicker and more accurate inventory counts AUTOMATION FAIR 2012 (Booth #600) - Motorola Solutions, Inc.
A California Polytechnic State University (Cal Poly) research project has found that an RFID-enabled unmanned aerial vehicle (UAV), or drone, can read tags attached to steel drills or utility pipes at ...
In most applications, radio-frequency-identification (RFID) systems are used to store product and process data on, or retrieve it from, a special RFID tag using wireless technologies. Power to operate ...
A hardware hacker has likely broken the world's record for reading an RFID tag from the farthest distance -- 217 feet. Click here for more of Dark Reading's Black Hat articles. Security researcher ...
Vizinex RFID, a developer and manufacturer of high performance RFID tags tailored to specific applications, recently introduced the next generation of its long read range tag, the XLR. The XLR has an ...
Age Steel, a United Arab Emirates (UAE) company that operates multiple steel yards in Dubai, has taken radio frequency identification technology to new heights, through its use of an RFID reader ...
Nokia has developed an optional RFID reader kit for their 5140 phone, pitching it as a tool to automate certain business functions. For instance, RFID tags could be attached to certain waypoints on a ...
A U.K. firm has developed an on/off “switch” for RFID cards that could protect cardholders from being hacked. The cardholder activates the RFID transmission by squeezing the card between his thumb and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results