Home
 > search for

Featured Documents related to »  active rfid reader and tag


Active Execution Management--Delivering on the RFID Promise
Active Execution Management captures radio frequency identification (RFID) and electronic product code (EPC) data and integrates it into the supply chain

active rfid reader and tag  on the RFID Promise Active Execution Management captures radio frequency identification (RFID) and electronic product code (EPC) data and integrates it into the supply chain business process. AXM associates individual EPC events (the observation of an EPC tag at an RFID reader) with the supply chain transaction that is currently being executed and then determines if that supply chain transaction is executing as planned. AXM is able to make this determination by comparing key performance indicators of the Read More
Radio Frequency Identification (RFID)
Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID sys...
Start evaluating software now
Country:

 
   

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » active rfid reader and tag


SAP RFID Technology in the Automotive Industry
By using radio frequency identification (RFID) technology, automotive companies can eliminate material shortfalls of containers, which lead to delivery delays

active rfid reader and tag  the transponder: in general, active tags contain more information than passive tags, which contain only one unique number. RFID readers are installed at pick-up and drop-off points where they read the data. Using radio frequency waves, transponders identify each container automatically – without additional handling or human intervention – as it passes through these points, even if the material is packed on a palette within other containers. SAP RFID technology combines the virtual world of Read More
RFID--A New Technology Set to Explode? Part One: RFID Technology
For retailers and the other vertical industries, radio frequency identification (RFID) tags present enormous opportunities to improve supply chain operations

active rfid reader and tag  data collection middleware and Active RFID technology systems, announced a Strategic Partnership Agreement. The partnership will enable RedPrairie to introduce RFID-enabled supply chain applications leveraging RF Code's middleware platform and Active RFID systems. In other words, RedPrairie will employ RF Code's TAVIS technology to enable long-range tracking of mobile assets across the supply chain to streamline and secure supply chain processes. According to the agreement, RedPrairie will become a VAR Read More
RFID Workbench: Understanding the Basics
Radio frequency identification (RFID) helps actualize the perfect integration of logistical and commercial chains and its use is rising in the US and Europe

active rfid reader and tag  also known as : Active RFID System , White Paper RFID , RFID Systems Service , RFID Workbench Analysis , RFID Workbench Simulation , RFID Workbench Middleware , Seeburger RFID Workbench , Advice RFID Implementation , Subset RFID Workbench , RFID Workbench White Papers , Vendor RFID Workbench , Embedded RFID Module , Electronics Workbench , Radio Frequency Identification , Radio Frequency Identification Device , Radio Frequency Identification System , Radio Frequency Identification Systems , Radio Read More
How RFID Technology Can Enhance Your Asset Management Program
Even though the technology has been around in some form since World War II, chances are that you think of Wal-Mart’s supply chain initiative when you hear the

active rfid reader and tag  for a comparison of active and passive RFID tag characteristics. Table 1. Relative Comparison of Active and Passive RFID Tags Passive Tags Active Tags Cost Less expensive ' from a few cents to a few dollars More expensive ' often $20 or more Size Smaller ' some as small as a grain of rice Larger Power Provided by reader Provided by battery Maintenance None required Battery or tag replacement required Useful life Longer ' up to 20 years or more Shorter ' depends on battery life Distance at which tag can Read More
The Middle Kingdom - From Wired to Wireless
Confused about RFID middleware? RFID middleware has a critical role to play in cleaving together and clarifying the signals and intelligence, bidirectionally

active rfid reader and tag  of other information. On active tags today, there is a lot of data written to the devices, from customer coded personal digital assistants (PDA) and readers, as well as very sophisticated middleware that also acts as a true RFID application (Savi, is the key player here.) When you see the proliferation of information that users want, either in the system or on the tag, you see the footprint growing in middleware application. So I (as well as probably you, at this point) am a bit curious as to why RFID Read More
RFID Case Study: Gillette and Provia Part One: Background
The goal of the pilot project was not to see whether RFID tags on pallets and cases could be read automatically (although one should not assume that it is easy

active rfid reader and tag  Case Study: Gillette and Provia Part One: Background Background Radio frequency identification (RFID) is constantly on everyone's lips and every relevant enterprise application vendor is hedging its bets towards becoming RFID-ready (see RFID—A New Technology Set to Explode? ). Provia Software ( www.provia.com ), a privately-held provider of supply chain execution (SCE) software solutions, too can tout the results of its RFID endeavors, as it has already put much effort in terms of the proof of Read More
RFID--A New Technology Set to Explode? Part Two: Early Adopters, Challenges, and User Recommendations
Radio frequency identification or RFID has a potential of becoming a new technology inflection point. It can be a missing piece in the long-lasting puzzle of

active rfid reader and tag  from the readers. More proactive companies are thinking about putting the right business intelligence (BI) and analytic architecture in place to make the most out of RFID data and drive better supply-chain decisions. Users should also check out these vendors' services at their labs that include consulting and integration, as well as painstaking testing multiple vendors' RFID equipment and hardware to simulate real-world supply chain business processes. One of the main obstacles is the lack of Read More
Active Voice Adds Unified Messaging to Cisco’s CallManager
The Cisco CallManager is an IP based telephony system that will utilize Active Voice’s software to deliver a reduced dependency on external hardware to achieve

active rfid reader and tag  Messaging to Cisco’s CallManager Active Voice Adds Unified Messaging to Cisco's CallManager P. Hayes - July 17, 2000 Event Summary (Seattle, Washington, USA-July 26, 2000) - Active Voice Corporation, a global provider of unified messaging and computer telephony software solutions, announced that Unity Enterprise-its Windows NT-based true unified messaging server-will support integration with the latest version of Internet Protocol (IP) telephony call processing software from Cisco Systems, Read More
Integrating Fax and E-mail: An Overview of Exchange, Active Directory, and Group Policy Fax Solutions
When you decide to implement a new fax software solution, you should review how the solution will be implemented and managed, as well as its ability to grow

active rfid reader and tag  An Overview of Exchange, Active Directory, and Group Policy Fax Solutions When you decide to implement a new fax software solution, you should review how the solution will be implemented and managed, as well as its ability to grow with your network. Within a Windows network, critical architectural, administrative, and usage concerns should be thoroughly considered. Review your options with this fax server overview outlining the benefits of different fax servers and e-mail integration. Read More
Frontier Software Ltd
Frontier Software is a human resource (HR) and payroll software vendor. It provides solutions to tier one, two, and three companies with a variation of active

active rfid reader and tag  with a variation of active server pages (ASP), inhouse, and outsourced services. Frontier Software, founded in 1993, has offices on three continents and headquarters in Melbourne, Victoria (Australia). The company has installations in twelve countries and a licensed user base of over 1,300 clients. Read More
Analysis of Active Voice's Acquisition of PhoneSoft, Inc.
Active Voice will integrate all of PhoneSoft's functionality into their existing

active rfid reader and tag  of Active Voice's Acquisition of PhoneSoft, Inc. Event Summary SEATTLE, /PRNewswire/ - Active Voice Corporation (Nasdaq: ACVC), a global provider of unified messaging and computer telephony software solutions announced it has signed a definitive agreement to acquire privately-held PhoneSoft Inc., a leading provider of true unified messaging solutions for Lotus Notes/Domino. Market Impact PhoneSoft, Inc. is a privately held company that focuses on unified messaging solutions (UM), including email, Read More
As Hype Becomes Reality, a Radio Frequency Identification Ecosystem Emerges
Radio frequency identification (RFID) is the latest technology to gain major recognition as being a sizeable market for the future. The RFID ecosystem includes

active rfid reader and tag  , both passive and active, which uniquely identify the object(s) tagged, be it an individual item, case, or pallet of items. They transmit the electronic product codes (EPC) wirelessly to other devices. Antenna and transceiver , which are positioned strategically based on the physical layout for wireless signal recognition of tags Readers , which sense the presence of the tags and, thus of the unique items, at very fast rates and in very large volumes Printers and encoders , which are hardware devices Read More
How to Integrate Active Directory and DNS
The Domain Name System (DNS) plays an important role in providing the information used by the Windows Domain locator service to connect and authenticate with

active rfid reader and tag  to Integrate Active Directory and DNS The Domain Name System (DNS) plays an important role in providing the information used by the Windows Domain locator service to connect and authenticate with Active Directory. But how can organizations with existing configurations using the Berkeley Internet Name Domain (BIND)—the international DNS benchmark—be sure that migration to other server solutions will yield a dependable DNS solution? Read More
Active Escrow: The Technical Verification of Software Source Code
The source code for mission-critical software products is almost never provided to users by the supplier. All the end-user has is a copy of the compiled source

active rfid reader and tag  Escrow: The Technical Verification of Software Source Code The source code for mission-critical software products is almost never provided to users by the supplier. All the end-user has is a copy of the compiled source code—in other words, the object code that can only be read and executed by the computers concerned. That’s why professional escrow is becoming an essential component of operational risk management. Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others