NFC for iOS 11
Posted by Suzanne Smiley on Sep 18, 2017
Introduction
Available on the iPhone since the iPhone 7, NFC capabilities are now being unlocked for iPhone users with the
iOS 11 update. With Apple’s new framework, Core NFC, users will now be
Read More
Read More
How to Write an NFC Tag
Posted by Suzanne Smiley on Jul 12, 2017
For the purpose of this article, we will be using the NXP TagWriter App available on the Google Play App Store.
Introduction
NXP TagWriter is a general NFC reader/writer application t
Read More
Read More
Auburn RFID Lab – Part 2: Introduction to the Lab & RFID
Posted by Suzanne Smiley on Jun 16, 2017
Introduction
This is part two of a four-part series geared towards learning more about the Auburn RFID lab in general, what goes on there, how it can benefit RFID as an industry, and a quick overv
Read More
Read More
Factoring in the Environment: RFID Deployments
Posted by Suzanne Smiley on Mar 31, 2017
Introduction
Deploying an RFID application without consideration of the environment can potentially lead to thousands of dollars spent with less than stellar read rates. If positive results cannot
Read More
Read More
What Is RFID?
Posted by Suzanne Smiley on Feb 21, 2017
What Is RFID?
Radio Frequency IDentification is a technology that allows almost any object to be wirelessly identified using data transmitted via radio waves.
Benefits of RFID
The abi
Read More
Read More
Custom Protocols & Interfaces: Understanding the Benefits
Posted by Suzanne Smiley on Oct 27, 2016
Protocols
Protocols are a certain set of rules that govern the exchange of data through a communication connection. Most widely used protocols define small data exchanges that occur millions of ti
Read More
Read More
7 Types of Security Attacks on RFID Systems
Posted by Suzanne Smiley on Jun 14, 2016
Introduction
RFID systems, like most electronics and networks, are susceptible to both physical and electronic attacks. As the technology matures and becomes more widespread, so do hackers who aim
Read More
Read More
7 Types of Security Attacks on RFID Systems
Posted by Suzanne Smiley on Jun 14, 2016
Introduction
RFID systems, like most electronics and networks, are susceptible to both physical and electronic attacks. As the technology matures and becomes more widespread, so do hackers who aim
Read More
Read More
UHF RFID Security Measures
Posted by Suzanne Smiley on Jun 08, 2016
Introduction
Class 1 Gen 2 UHF RFID Tags. The gaps in usage of
UHF tags were even more pronounced before the release of Class 1 Gen 2 in 2004, because previous versions such as Class 1 Gen 1 cont
Read More
Read More
Operating Principles: Coupling
Posted by Suzanne Smiley on May 27, 2016
Introduction
Understanding the way that an RFID system communicates, at least on a basic level, is a necessity—especially for deployment. RFID knowledge, together with extensive testing, is
Read More
Read More
UHF RFID Tag Communications: Protocols and Standards
Posted by Suzanne Smiley on May 20, 2016
Introduction
The International Standards Organization
(ISO) and EPCglobal are two organizations that work together to approve standards and protocols in order to provide universal spe
Read More
Read More
RFID Challenges: When to Look for Other Options & When to Keep Moving Forward
Posted by Suzanne Smiley on Apr 07, 2016
Introduction
Facing challenges when installing a new system or procedure is expected, but it helps to consider potential problems before installation. Large and small companies, as well as individ
Read More
Read More