TITLE

Tag Teams: Best-in-Class RFID Applications

AUTHOR(S)
Dubin, Cindy H.
PUB. DATE
March 2011
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2011, Vol. 48 Issue 3, p70
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article examines the importance of radio frequency identification systems (RFID) technology in security applications in every organization. It mentions that the technology can enhance security in restricted areas, tracking employee activity, and improving loss prevention. It also notes that RFID can be used in controlling dams, tracking or identifying cars, and tracking patients.
ACCESSION #
59581876

 

Related Articles

  • Outwitting Card Forgers. Blank, Eric // Security: Solutions for Enterprise Security Leaders;May2004, Vol. 41 Issue 5, p36 

    Reports on the risk and potential liabilities of radio frequency identification technologies for card forgers. Aid of the technologies to security management of companies; Need for security to constantly look to more advance methods to protect companies, employees and customers; Offer of a...

  • Combo Those Cards. Blank, Eric // Security: Solutions for Enterprise Security Leaders;Feb2005, Vol. 42 Issue 2, p28 

    Focuses on combining radio frequency identification-enabled plastic cards with advanced card printing and manufacturing techniques for additional security in multiple operations. Addition of hidden patterns and information printed on the surface of a card for another level of security to assess...

  • Product Showcase.  // Security: Solutions for Enterprise Security Leaders;Feb2005, Vol. 42 Issue 2, p32 

    Features several security equipment and supplies available in the U.S. as of February 2005. Small foot-print ID card printer; Radio frequency identification printer from Polaroid; Card printer from Fargo; Watermark printer from Ultra Electronics.

  • FYI on RFID. Menzel, John // Security: Solutions for Enterprise Security Leaders;Sep2005, Vol. 42 Issue 9, p34 

    Presents a background on radio frequency identification (RFID) systems. Capability of incorporating the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person; Main components of an RFID...

  • Maximizing Event Security with ID Cards.  // Security: Solutions for Enterprise Security Leaders;May2007, Vol. 44 Issue 5, p42 

    The article discusses the applicability of identification cards (ID) to provide security for special events in the U.S. Most organizations still rely on ID technology which ranges from less expensive barcodes or magnetic strips to more sophisticated radio frequency identification system (RFID)...

  • TI-RFID Used in the Big House.  // Security: Solutions for Enterprise Security Leaders;Dec2003, Vol. 40 Issue 11, p9 

    Reports on the utilization of the security technology from Plano, Texas-based Texas Instruments Radio Frequency Identification Systems by the Pima County Jail in Tucson, Arizona. Product which was adopted by the institution; Use of the product obtained by the penitentiary; Business transactions...

  • The Uproar Over RFID. Mandelblit, Bruce // Security: Solutions for Enterprise Security Leaders;May2004, Vol. 41 Issue 5, p38 

    Reports on the debate about radio frequency identification (RFID). Rapid growth of the technology in the security systems form card access to asset tracking; Benefits of the technology for manufacturers and retailers; Reliance of RFID on miniature and relatively inexpensive microchips.

  • A Digital Security System with Door Lock System Using RFID Technology.  // International Journal of Computer Applications;Aug2010, Vol. 5, p9 

    The article focuses on a study which explores the development and implementation of a digital security system with door lock system using Radio Frequency Identification (RFID) system which can activate, authenticate, and validate the user. Security, asset tracking, and access control application...

  • People Tracking -- It's a Good Thing. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p28 

    The article focuses on people tracking solutions for healthcare facilities in the U.S. Healthcare security executives enlarged the business model to include wandering patients and residents who suffer from dementia, Alzheimer's or similar conditions at risk of wandering off. However, solutions...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics