Latest In: Asset Tracking

Cloning Cybersecurity Data Data Interception Denial of Service Attacks DoS Attacks Eavesdropping Replay Attacks RFID RFID tags Spoofing Attacks Supply Chain supply chains

5 Cybersecurity Guidelines for RFID-Enabled Supply Chains

RFID technology is essential to supply chain workflows. By enabling real-time visibility and seamless data exchange, companies operate…

Expert Views October 30
BLE Bluetooth Low Energy Buket Yildiz gateway Hospital Izmir City Hospital Kristina Johnson LenelS2 Little Tag Litum Patients QR code real-time location system RTLS SaaS solution-as-a-service Turkey ultrawide band UWB wristband

Hybrid RTLS Solution Tracks Infants in Hospitals

Litum’s new Little Tag leverages the company’s software as a service to manage ultrawide band (UWB) and Bluetooth…

News October 28
Altitude Trampoline Park API BLE Bluetooth Low Energy Chris Kuehn Greg Spittle HF RFID readers Indoor Active Brands Intelliplay IoT LED wristband

Smart Wristbands Gamify Jumping at Trampoline Park

Altitude Trampoline Park is piloting an IoT-based system from Intelliplay that tracks the location and activity of children…

News October 28