Aim for the Worst by Ari Juels | May 14, 2005 | ColumnsThe performance of tags—even those of the same make and model—can vary greatly. To achieve high read rates, design systems to read the weakest tags.
Never Take Physics for an Answer by Kevin Ashton | Feb 1, 2005 | ColumnsHistory shows that lots of things people say are impossible can be achieved.
EPC as an Anti-counterfeiting Tool by Elgar Fleisch and Thorsten Staake | Feb 1, 2005 | ColumnsTags combined with an extended EPCglobal Network could eradicate a scourge.
The Radio-Free EPC by Ross Stapleton-Gray | Feb 1, 2005 | ColumnsThe widespread use of RFID for tagging individual items is a pipe dream, but a viable alternative exists.
Raising the Privacy Issue by Mike Spinney | Feb 1, 2005 | ColumnsGiven concerns about RFID, companies need a high-level privacy strategy.
Go Beyond EDI by Stephen Miles | Oct 1, 2004 | ColumnsA distributed EPC Network architecture based on open standards is needed to enable companies to take advantage of EPC data.
A Midsize Approach to RFID by Ann Grackin | Oct 1, 2004 | ColumnsYou don’t have to be as big as Wal-Mart to benefit from RFID, as long as you think strategically and act tactically.
RFID in Uncertain Times by Kevin Ashton | Oct 1, 2004 | ColumnsSavvy companies will manage the risk around RFID adoption, not avoid it.
What’s Your Tipping Point? by Bob Violino | Jul 20, 2004 | ColumnsManaging the risk of an RFID deployment means knowing when to move from a slap-and-ship approach to a full-scale integration.
Avoid an RFID Identity Crisis by Bob Violino | Jul 20, 2004 | ColumnsFor a deployment to succeed, RFID must be part of a larger digital identity strategy.