The RFID Security Alliance, organized to educate stakeholders about issues, legislation and solutions related to securely implementing RFID, will host a panel discussion and two-way dialog with the ...
As providers of healthcare, our organizations want to reduce risk as much as possible. Several particular areas of risk are with infection control, physical security, asset management, real-time ...
A lightweight encryption technology that uses a one-time, self-destructing encryption key will land on RFID chips sometime next year, according to the firm that developed it. Tutarus already sells the ...
Retailers, manufacturers, hospitals, federal agencies and other organizations planning to use radio frequency identification (RFID) technology to improve their operations should also systematically ...
Recognized for its leadership in advancing a global software network that enables the real-time tracking of "smart" cargo containers, Savi Technology recently garnered two major awards from acclaimed ...
Sensormatic Solutions, the retail solutions portfolio of Johnson Controls, can now offer retailers industry-leading radio frequency identification (RFID) source tagging services globally. The ...
As you settle in to read this article, the Fall semester is in full swing and the college ‘rites of passage’ have commenced: students have gotten lost trying to find their classroom, they’ve capped ...
NEUHAUSEN, Switzerland--(BUSINESS WIRE)--Sensormatic Solutions, the leading global retail solutions portfolio of Johnson Controls (NYSE: JCI), can now offer retailers industry-leading radio frequency ...
This article was originally published by RFID Update. July 9, 2007—Israel’s VUANCE today announced the planned acquisition of Security Holding Corp (SHC), whose two subsidiaries SecurityInc and AAID ...
Now that we’ve put together all of the steps and processes as a baseline to address bringing RFID into an organization, we need to discuss the six steps to a reasonably secure implementation, and what ...
In today’s digital age, safeguarding personal information is more critical than ever. The proliferation of identity theft and unauthorized access to personal data through Radio Frequency ...
In order to simplify their installation and operation, modern home security systems must be able to monitor their environments wirelessly. This includes monitoring perimeter security, intrusion ...