Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

White Papers

Each month, RFID Journal receives numerous white paper submissions from outside experts. We read each paper carefully and select the most informative articles. Please note that we cannot guarantee the accuracy of facts or claims in these papers.

Choose a Topic

Most Recent White Papers

Viewing Whitepapers: 145-152 of 441

  • A Simpler Architecture: How to Stop a 2.4 GHz RF Link From Hopping Your MCU and Your Development Process
    Published November 2013
    In consumer and industrial applications, end users appreciate the convenience of cable-free connectivity, and the license-free 2.4 GHz ISM band is often a suitable choice. Protocols of technologies such as Bluetooth or ZigBee are robust enough to overcome the interference that 2.4 GHz transceivers encounter, but these protocols are feature-rich, which means they are applicable to a wide range of applications, but are over-specified for simpler applications. What's more, the microcontroller (MCU), normally intended for other functions, must deal with the heavy overhead of running a large protocol software stack. To address these shortcomings, AMS' Prashant Dekate discusses a transceiver architecture that removes almost all processing overhead from the MCU and allows for an easy and quick implementation of the radio network. (6 pages)
  • The Need for Global Standards and Solutions to Combat Counterfeiting
    Published November 2013
    This white paper, from GS1, provides insights into the increasing threats posed by counterfeit and illicit trade, and outlines how the organization's global standards, services and solutions can play a vital role in counteracting the problem. The report highlights key emerging trends and deceptive practices, and discusses how to secure global supply chains against the threats of counterfeit goods, through greater visibility, traceability and transparency. (24 pages)
  • Data-Collection Solutions Are No Longer Optional: Technology Adoption Survey Results
    Published November 2013
    Supply Chain Services and Motorola Solutions asked DC Velocity and Supply Chain Quarterly to conduct a survey of their readerships, regarding the current and future uses of automated data-collection solutions. Companies across multiple industries responded, with manufacturing, wholesale distribution, warehousing, transportation and retail companies most represented. In this white paper, Richard J. Sherman, the president of Gold & Domas Research, interprets the surveys' findings. (11 pages)
  • Project Noah: When It Comes to the Crunch
    Published November 2013
    Fierce competition in the global market, the introduction of products with shorter life cycles and increasingly demanding consumers have forced organizations to focus attention on their supply chains and invest in new technologies to drive value for their business. A multiplicity of supply chain technologies can help achieve this goal, but usage remains low. This latest edition of GS1 Australia's Project Noah series explores why Australian businesses adopt different supply chain technologies, including radio frequency identification. (18 pages)
  • Bar Code & RFID Label Printing: Options for Printing from SAP
    Published October 2013
    Generating bar-code and RFID labels from the SAP environment is not always a straightforward process. The various versions and generations of SAP solutions are oriented to document printing, and do not offer native support for most specialized thermal printers used for bar-code and RFID labeling. This document, from Intermec, profiles the SAP output options for such printers, providing an overview of the five primary methods of producing bar-code and RFID labels from the SAP environment (direct connection, SAPscript programming, XML printing, printer emulation and middleware). It explains which of these options are available for SAP R/3, SAP AII and SAP Business Suite users, and details how Intermec supports each method.
  • Active Solutions for Active Environments: Achieving ROI through Automated Physical IT Asset Tracking
    Published September 2013
    Tracking and managing physical IT assets is a never-ending challenge. The level of difficulty and expense increases dramatically as an organization becomes larger, more complex and distributed across multiple sites and geographic locations. Understanding the source of the costs associated with physically tracking such assets is the key to streamlining the process—an automated solution for performing periodic audits of sensitive IT equipment is the only effective way to achieve a time-independent verification of asset records. This white paper, from RF Code, explains the distinction between tracking enterprise assets and merely collecting inventories of equipment and related static location data, and why this is critical to any company seeking to implement an IT asset-management program. (10 pages)
  • Gaining Efficiencies and Reducing Cost in a Competitive Environment
    Published August 2013
    Innovative RFID and Near Field Communication (NFC) technologies offer increased process efficiency, accuracy and visibility. In this white paper, Motorola and NXP Semiconductors explain how these benefits enable automation and manufacturing flow advances, improved productivity and other benefits throughout the supply chain. (19 pages)
  • Smart Card Technology and the National Strategy for Trusted Identities in Cyberspace
    Published July 2013
    The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a White House initiative to improve on the credentials currently used to access the Internet and authenticate identity online. This white paper, from the Smart Card Alliance, reviews the NSTIC's initiatives and discusses how smart-card technology can provide the advanced credentialing capabilities necessary to enable high assurance in the NSTIC identity ecosystem. Smart cards come in a variety of form factors—including plastic cards, USB devices and secure elements that can be embedded in mobile or other devices—and can be either contact (communicating with a reader through direct physical contact) or contactless (communicating via an RFID air-interface protocol, such as ISO 14443). (23 pages)
    Tags: Security
PREMIUM CONTENT
Case Studies Features Best Practices How-Tos
RFID JOURNAL EVENTS
Live Events Virtual Events Webinars
ASK THE EXPERTS
Simply enter a question for our experts.
JOIN THE CONVERSATION ON TWITTER
Loading
RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations