Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

White Papers

Each month, RFID Journal receives numerous white paper submissions from outside experts. We read each paper carefully and select the most informative articles. Please note that we cannot guarantee the accuracy of facts or claims in these papers.

Choose a Topic

Most Recent White Papers

Viewing Whitepapers: 321-328 of 482

  • Physical Asset Management and IT Security
    Published April 2010
    Information technology involves virtual assets and transactions, but security vulnerabilities may lurk in its physical foundations. Jim Caudill, Xterprise's senior VP of marketing and strategy, explains how identifying, tracking and managing risks to physical servers, storage devices and network hardware can help close security gaps that can not be addressed by electronic asset management. This document outlines RFID methods to integrate IT security across physical and virtual domains.
    Tags: Security
  • IT Asset Management Using RFID
    Published April 2010
    Companies in the financial services, telecommunications and other sectors use IT asset management to improve productivity and service. Support of global operations requires an IT infrastructure, including physical, electrical and HVAC (heating, ventilating and air conditioning). Jim Caudill, Xterprise's senior VP of marketing and strategy, explains how some IT departments are adopting business methodologies, such as RFID, to help manage their IT infrastructure for maximum business value.
  • Realizing the Real Benefits of Asset Tracking and Management Using the Latest Technologies
    Published March 2010
    Using a combination of the latest technologies—RFID, GPS, mobile computing and Web-based applications—asset management can be undertaken reliably and rapidly in a wide array of applications. This white paper, from 4hSolutions Ltd., explores how end-to-end asset management, when implemented properly, can meet the needs of today's cost-conscious and mobile workforce.
  • Using PNR as a New Approach to Enhancing RFID Channel Security Via Direct Sequence Spread Spectrum (DSSS)
    Published March 2010
    Salman Altaf and Mumtaz A. Kamala, of the University of Bradford School of Computing, Information and Media, and Qudoos Yousuf, of Innovation North Leedsmet University, outline how retailers, manufacturers, hospitals, federal agencies and other organizations can use RFID to improve functionality and product quality, and maintain a good checks-and-balances system, without experiencing data security and privacy vulnerabilities. The authors discuss a proposed technique for preventing data leakage and providing protection against eavesdropping and interference, by spreading spectrum over the wideband, utilizing a suitable pseudorandom (PNR) code. (7 pages)
    Tags: Security
  • The Novel Use of Information Technology in Military Medicine and Mass Casualty Situation Training
    Published March 2010
    Jorma Jokela, a student at the University of Tampere, offers an academic dissertation on several novel information technologies, including short video clips, mobile medical information systems (IS) and RFID, which have become an essential part of education in the modern health-care field. In military medicine, there are special needs for novel technologies, especially when optimizing first aid and initial treatment in challenging field situations. Jokela's thesis studies the use of such technologies in the training of military medicine for mass-casualty scenarios. (126 pages)
  • Integrating a Company Logo Into a Tag Antenna Design in RFID Applications
    Published February 2010
    Tatung University's Chi-Fang Huang, Yueh-Ching Lin and Ming-Fu Kuo present a design idea for how a company's logo can be incorporated into an RFID tag antenna, in order to protect the intellectual property (IP) of that firm's tag antenna design. This white paper discusses both antenna design simulation and tag performance evaluation. (5 pages)
  • Archimedes Method and System for Tracking
    Published February 2010
    Archimedes IP Corp. outlines its system for recording location information onto a tag, so that an item's movement history can be accessed without requiring communication with a central database. This system would allow the tracking of location histories for seaborn containers, thereby providing customs officials at the final destination with location information regarding a container's entire journey after it was sealed at the origination point.
  • Leveraging ERP for Supply Chain Execution
    Published January 2010
    Companies considering supply chain execution systems to integrate shop-floor RF scanners and bar-coding within their enterprise resource planning (ERP) systems face a fundamental decision: Which data model will serve as the primary system of record for manufacturing and distribution transactions? In this white paper, TAKE Supply Chain outlines the impact the choice of system architecture has on critical aspects of running a supply chain and maximizing an ERP investment. (7 pages)
PREMIUM CONTENT
Case Studies Features Best Practices How-Tos
RFID JOURNAL EVENTS
Live Events Virtual Events Webinars
ASK THE EXPERTS
Simply enter a question for our experts.
TAKE THE POLL
JOIN THE CONVERSATION ON TWITTER
Loading
RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations