Blog posts

What is Frequency Hopping?

What is Frequency Hopping?

Posted by Kishan Patel on Oct 25, 2018

Preface There are many issues that can arise during the testing phase of an RFID system. One of the most common issues people face is called reader collision. Reader collision occurs when two read
Read More
RSSI’s Role in RFID

RSSI’s Role in RFID

Posted by Russell Hilyer on Mar 12, 2018

Introduction In an UHF RFID system, readers send an interrogation signal to a nearby tag, which responds in turn via backscatter. The reader analyzes the response and reports the tag’s data alo
Read More
RFID Basics: How to Read and Write Tags

RFID Basics: How to Read and Write Tags

Posted by Suzanne Smiley on Feb 06, 2018

[Audio Transcription Below] Introduction Hey guys! My name is Timothy Pribyl and I am a Sales Account Manager at atlasRFIDstore.com. Today I am going to explain a little bit about wha
Read More
RFID vs. EAS

RFID vs. EAS

Posted by Suzanne Smiley on Oct 31, 2017

About Electronic Article Surveillance Electronic Article Surveillance, or EAS is a term used for theft prevention commonly used in libraries and most often, in retail stores. All types of items ca
Read More
Introducing the RFID Insider Podcast Channel

Introducing the RFID Insider Podcast Channel

Posted by Suzanne Smiley on Oct 10, 2017

Introduction For over six years, RFID Insider has produced educational articles, infographics, videos, and guides about the RFID industry. Beginning this month, we’re excited for people to learn abo
Read More
What Is RFID?

What Is RFID?

Posted by Suzanne Smiley on Feb 21, 2017

What Is RFID? Radio Frequency IDentification is a technology that allows almost any object to be wirelessly identified using data transmitted via radio waves. Benefits of RFID The abi
Read More
7 Types of Security Attacks on RFID Systems

7 Types of Security Attacks on RFID Systems

Posted by Suzanne Smiley on Jun 14, 2016

Introduction RFID systems, like most electronics and networks, are susceptible to both physical and electronic attacks. As the technology matures and becomes more widespread, so do hackers who aim
Read More