
Beefing Up Security
A crypto algorithm embedded in an EPC Gen 2 tag could thwart counterfeiters and ensure only supply-chain partners have access to business information.
A crypto algorithm embedded in an EPC Gen 2 tag could thwart counterfeiters and ensure only supply-chain partners have access to business information.
What the not-so-sudden success of Near-Field Communication tells us about the future of other RFID technologies.
The continued evolution of radio frequency identification hardware, software and standards is taking much of the complexity—and risk—out of deploying the technology.
Whether you’re just considering RFID or expanding a current project, it’s now easier, faster and more cost-effective to deploy the technology—and achieve powerful benefits.