Many applications are now using radio frequency (RF) chip technology to automatically identify objects or people. These applications range from tracking animals and tagging goods for inventory control ...
MASON CITY, Iowa--(BUSINESS WIRE)--Metalcraft introduced tamper proof DuraDestruct RFID tags for applications needing long read range with durable, secure identity. The tags strengthen RFID access ...
Previously used in military settings for friend-or-foe identification, RFID (Radio Frequency Identification) technology is now widely applied across various industries. Examples include self-checkout ...
The Sokymat IN Tag F-Mem, a 16-Kb RFID tag, targets harsh industrial environments requiring extensive memory-writing endurance. At the heart of the device is a unique ferroelectric random access ...
End users are evaluating RFID for IT asset-tracking and -management applications across a broad spectrum of markets, to increase visibility, improve business processes and reduce costs. A critical ...
Wireless Tracking Leader Expands Cisco Compatibility to Offer Enterprise Customers the Most Cost-Effective, High-Performance Location Solution for Offices or Industrial Environments SANTA CLARA, Calif ...
Most RFID technology is either focused on manufacturing or supply-chain applications. But recent personal experiences, coupled with some timely contract announcements, have made me aware of the scope ...
Avery Dennison and Xtreme RFID partnered to develop a new RFID-based tag for mounting on metal surfaces – the Xtreme Metal Tag. The Xtreme Meta tag features Avery Dennison’s AD-843 ultra-high ...
In this document, MLX90129 has been explained in detail for RFID sensor tag applications. It described the different command sequences to read a sensor and the power check system. The temperature ...
A team of researchers in Scotland has unveiled a RFID tag, which they claim could make the technology cheaper as well as more sustainable. The scientists at the University of Glasgow explain that the ...
At every turn, networks must handle additional traffic from new sources. One of the latest and soon-to-rise sources of increased network traffic arises from the implementation of radio frequency ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results