Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

White Papers

Each month, RFID Journal receives numerous white paper submissions from outside experts. We read each paper carefully and select the most informative articles. Please note that we cannot guarantee the accuracy of facts or claims in these papers.

Choose a Topic

Most Recent White Papers

Viewing Whitepapers: 1-8 of 484

  • MYTHINGS vs. LoRa
    Published September 2019
    This BehrTech report, concluded by Dr. Thomas Lauterbach, purports that in real-world Industrial Internet of Things deployments, the MYTHINGS platform delivers higher interference resilience than LoRa technology, and that in a high-interference environment at the same network range, MYTHINGS loses no messages—whereas there will always be some failed LoRa transmissions, regardless of signal power and range. (9 pages)
  • Making Autonomous Vehicles Accessible to Persons With Disabilities Will Bring New Business Opportunities and Legal Challenges to the Auto Industry
    Published August 2019
    Autonomous vehicles represent the future of driving, with popular manufacturers developing and refining self-driving cars, and with ride-share companies testing such vehicles on their platforms. The CommLaw Group's Michal Nowicki explains why this new market will become more profitable if self-driving cars are built to accommodate those with disabilities. (3 pages)
  • Home Router Security: The Buck Stops Where?
    Published June 2019
    Cybercrime is a major concern, stemming from the inherent vulnerabilities in Internet of Things devices and home routers. Who should consumers look to for home network security? Network operators can provide multi-layered security without users having to carry out elaborate downloads or installations. HardenStance's Patrick Donegan examines why it's up to network operators to offer network-level security to consumers' connected devices. (7 pages)
  • IoT in the Enterprise: An Analysis of Traffic and Threats
    Published May 2019
    Enterprises have been adopting IoT products to improve organizational efficiency, enhance communications and gain insights into system performance, but such rapid adoption has opened up new attack vectors for cybercriminals. Zscaler's ThreatLabZ research team analyzed one month of data for recent IoT device footprints, based on traffic in the Zscaler cloud. This report details the results. (12 pages)
  • IDAct: Towards Unobtrusive Recognition of User Presence and Daily Activities
    Published May 2019
    The Internet of Things promises to revolutionize how people interact with their surrounding environment and the objects within it, by creating a ubiquitous network of physical devices. In this white paper, university researchers explain how to enhance the sensing capabilities of everyday objects using long-range RFID technology. (8 pages)
  • Cybersecurity in Health Care: What Has Changed Two Years After WannaCry
    Published May 2019
    Health-care companies are among the most at risk for cyberattacks. In the two years since the WannaCry attack on the NHS, security investments in the industry have grown, emphasizing IT professionals' understanding of the importance of strong cybersecurity practices. This report from Infoblox details a high-level study on Internet of Things devices in the health-care sector, including several that fall under RFID classification. (5 pages)
  • Intelligent Packaging with RAIN RFID
    Published May 2019
    RFID tags, either embedded or attached, provide value to all categories of packaged goods throughout the supply chain. This white paper from the RAIN RFID Alliance, which offers an introduction to intelligent packaging, covers the terminologies, the most important applications and the expected future developments. (11 pages)
  • Real-Time Tracking Systems Mitigate Personnel Security Risks
    Published May 2019
    Large medical facilities increasingly understand the necessity of implementing an accurate and comprehensive RTLS solution, and of tracking onsite personnel. MGM Computer Systems explains how RTLS technologies can mitigate personnel security risks, which can be substantial in terms of possible human tragedy and subsequent dollar-amount settlements and judgments. (7 pages)
PREMIUM CONTENT
Case Studies Features Best Practices How-Tos
RFID JOURNAL EVENTS
Live Events Virtual Events Webinars
ASK THE EXPERTS
Simply enter a question for our experts.
TAKE THE POLL
JOIN THE CONVERSATION ON TWITTER
Loading
RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations