Traceability and inventorying relate to the ability of an unauthorized entity to read the identifiers sent by RFID tags without necessarily being concerned as to what the tag is affixed to or who/what is carrying it. In other words just...
The two most common environmental conditions on the minds of RFID practitioners are water and metals such as iron, lead, and aluminum. The pharmaceutical industry is worried about water because many drugs contain some type of moisture. The manufacturing industry...
When shopping for an ID card printer, you’re liable at the outset to be hit with two choices: direct-to-card or reverse image transfer? Making an informed choice depends on what kind and how many cards you’re trying to print. Direct-to-card...
Numerous national and civilian security applications will see improvement in functionality because of newly published biometric standards. Biometrically enabled passports will be made more robust because of new standards that define a general specification for physical characteristics, layout and security....
The design of the antennas used by RFID tags and RFID readers is one of the most critical pieces in RFID infrastructure. This is because the antennas facilitate the communication between an RFID reader and a tag through free space....
The most basic radio frequency identification solution is made up of three main hardware components. These components are the RFID tag, the RFID reader, and the antenna. This is, of course, an over simplification of what it takes to apply...
Keeping track of the bad cards–those that were printed but never issued–is just as important as tracking the good cards when managing your ID card system. For John Ekers, Fargo Electronics’ director of product marketing for software and services, it...
Physical security workhorse begins giving way to contactless as price cuts and multi-technology readers eliminate hurdles By Chris Corum, Executive Editor, AVISIAN Publishing You can do more – and you can do it more securely – with contactless than you...
The pinstriped lines of barcodes past are going the way of the vinyl LP – at least for many applications. Instead of the staid black-and-white bars, you are likely to find a chaotic looking area of scrambled dots. Thanks to...
OTP generators range in size and shape – some are tokens, others can be carried on key chains, and others can be embedded into cell phones. Most, however, work in relatively the same way. A user enters a pre-determined account...
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Attn: friends in the biometrics space. Nominations close Friday for the annual Women in Biometrics Awards. Take five minutes to recognize a colleague or even yourself. http://WomenInBiometrics.com
Feb. 1 webinar explores how mobile ordering enhanced campus life, increased sales at UVA and Central Washington @Grubhub @CBORD