News
If you’ve worked with passive RFID before, you know that most readers only work within inches of the card. In [Fran’s] DEFCON talk this summer he calls it the “ass-grabbing method” of ...
Also called an "RFID interrogator." The maximum distance between the reader's antenna and the tag vary, depending on application. Credit cards and ID badges have to be brought fairly close to the ...
An RFID asset tracking system uses a combination of tags that send radio waves and readers that pick them up, allowing businesses to track all their assets. The best asset tracking companies offer ...
Hosted on MSN1mon
Cardian The Safe Card vs SafeCard RFID Blocking Card – Best Choice for Wireless Data Security in Your WalletRFID skimming is a form of digital theft where cybercriminals use scanners to read information stored on RFID-enabled cards, such as credit cards, IDs, and passports. These scanners can often read ...
Hosted on MSN1mon
Old Navy Adopts Innovative RFID PlatformThe AI-powered Radar technology utilizes disk-shaped overhead scanners that are always on, constantly tracking garments embedded with RFID chips. Store associates receive RFID generated product ...
Bluebird Inc., a global leader in enterprise mobile solutions, has partnered with Teamwork Commerce, a leading provider of retail management software, to launch a next-generation RFID integration that ...
Phoniebox is a software suite and tutorial for building a jukebox controlled through RFID cards ... connect an NFC reader to it, wire up a pair of speakers, and you’re set.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results