Latest In: IT/Infrastructure

Case Study: The “Fugitive” Assets in Oil and Gas

Since 2008, the CIITS lab at the Southern Alberta Institute of Technology has been actively experimenting with, developing…

April 10

RFID Suppliers in the Crosshairs of FCC’s Enforcement Bureau—How to Keep Your Business Safe

The Federal Communications Commission (FCC) has imposed a set of new regulations for RFID technology, including authorization, marketing,…

April 10

Solution Provider Session: Tamper-Evident RFID – When Security Matters

As RFID and BLE technology is increasingly adopted across a number of scenarios, it turns out that a…

April 10

Bluetooth Through the Years and Beyond: Enabling New Location Solutions

During this session, the Bluetooth Special Interest Group (SIG) will look back at the innovations Bluetooth has inspired…

April 10

Using Blockchain Technology in Supply Chain Traceability Systems

Blockchain enables companies to record every event or transaction within a supply chain. This information can then be…

April 18

RFID Visibility Data for Business Applications

To many, RFID data is what comes out of an RFID reader, but routing the raw information from…

Video May 14

RFID Data-Capture Software

RFID allows for data capture without human intervention, and for many tags to be sensed at once. This…

Video May 14

Putting It Together: Architecture, Product Selection and IT Governance

This session will outline how to put together the elements described in the preceding two sessions, in order…

Video May 14

RFID Tag-Data Standards

As RFID tags grow in capacity and sophistication, the possible methods for storing information on them becomes ever…

Video May 14