Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

Emerging Technologies White Papers

  • Attaining IoT Value: How to Move from Connecting Things to Capturing Insights
    Published December 2014
    Cisco estimates that the Internet of Everything (IoE)—the networked connection of people, processes, data, and things—will generate $19 trillion for the private and public sectors between 2013 and 2022. This white paper, written by Andy Noronha, Robert Moriarty, Kathy O'Connell and Nicola Villa, combines original and secondary research, as well as economic analysis, to provide a roadmap for maximizing value from IoT investments. It also explains why, in the worlds of the IoT and the IoE, the combination of edge computing/analytics and data center/cloud is essential to driving actionable insights that produce improved business outcomes. (20 pages)
  • Food Traceability: Solving the Imperative of Compliance
    Published November 2014
    With the steep increase in FDA food recalls, every second required to respond could mean the difference in consumers' health, and result in the loss of millions of dollars. Honeywell Scanning & Mobility explains how technology-based traceability systems, utilizing mobile computers, scanners and label printers, provide substantial advantages over pen-and-paper methods for small and large businesses in the food chain. Automated track-and-trace systems improve productivity, increase consumer safety and brand protection, and enable compliance with government regulations. (7 pages)
  • Enhancement of Security in RFID Using RSA Algorithm
    Published November 2014
    Jonathan Sangoro, Professor Waweru Mwangi and Dr. Michael Kimwele of Jomo Kenyatta University of Agriculture and Technology's School of Computing and Information Technology address the security challenges of RFID by proposing a Rivest Shamir Aldeman (RSA) algorithm as a viable solution to encrypting data over transmission and authenticating readers and tags.
  • NFC for Embedded Applications
    Published September 2014
    Experts predict an explosion of connected things to occur over the next few years. As more things get connected, concerns regarding data privacy and security will escalate. NXP Semiconductors explains why utilizing Near Field Communication as a communication method can help address some of these concerns. (20 pages)
  • Computer-Aided Drawing (CAD) Design Control & Real-Time (Web) Distributed RFID Location Through Intelligent Software
    Published August 2014
    Transitioning ideas into reality by using CAD-based RFID infrastructure modeling, with a real-time RFID optimization measuring and testing engine, allows users to integrate business intelligence into asset-tracking interaction processes with close-loop predictive analytics automation. Proximus Software Systems explains how businesses can benefit from implementing CAD-based RFID asset-tracking software. (12 pages)
  • Host Card Emulation (HCE) 101
    Published August 2014
    Host card emulation is one of the most talked-about mobile innovations today, offering solution providers a new architecture for implementing convenient mobile Near Field Communication-based solutions. But how does the new architecture impact application security? The Smart Card Alliance considers HCE and NFC opportunities and security considerations in this new white paper. (32 pages)
  • Considering RFID Technology for Your Next Event?
    Published July 2014
    There are several key questions to consider when evaluating the integration of RFID technology for an event: How will customers react? What will it cost? What are the risks? Intellitix provides a framework for the decision-making process. This document outlines what companies need to know, and how they can make the most of their investment in RFID technology at their next event. (8 pages)
  • One Network: A Billion Dreams
    Published June 2014
    The success of the Internet and the World Wide Web has resulted in a variety of fixed and mobile computing devices being connected, and efficient wireless communication has, therefore, become of critical importance. This first Internet/mobile revolution changed the world profoundly, but Sigfox explains how the next disruptive development—in which the majority of data traffic will be generated by things rather than by human initiation—has the potential to change it even more. (17 pages)
  • Bluetooth Low Energy (BLE) 101: A Technology Primer With Example Use Cases
    Published June 2014
    This white paper, developed by the Smart Card Alliance Mobile and NFC Council, defines BLE technology, including key features that can benefit businesses and consumers, and the BLE ecosystem. The document explores BLE's origins and design principles, as well as applications to which it can respond. BLE is discussed in the context of merchant-, venue- and transportation-oriented applications. Example use cases illustrate category-specific issues, and are included to stimulate thought on how to overcome constraints and explore new applications. (32 pages)
  • Understanding the Control Information on EPC Gen 2 Tags
    Published March 2014
    Ram Kishore Chennamsetty, an RFID consultant with Autoplant Systems India Pvt. Ltd., explains the control information in EPC Gen 2 RFID tags that plays a major role in communicating with data-capture applications. (10 pages)
PREMIUM CONTENT
Case Studies Features Best Practices How-Tos
RFID JOURNAL EVENTS
Live Events Virtual Events Webinars
ASK THE EXPERTS
Simply enter a question for our experts.
TAKE THE POLL
JOIN THE CONVERSATION ON TWITTER
Loading
RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations