Products & Services

See also: Categories | More Information

More Information Top

Lock Indicates content that may require registration and/or purchase. Powered by IHS Goldfire

  • Novel Algorithms and Techniques in Telecommunications and Networking
    [22] B. Violino, “Eating your own dog food: Cognizant Uses RFID to Track Laptops - The global technology solutions company is currently deploying an asset-tracking system throughout its development facilities worldwide,” RFID Journal, January 21, 2008.
  • Pro RFID in BizTalk Server 2009
    An example of this would be an IT department using RFID to track its laptops and servers.
  • Security and Privacy in Biometrics
    Online tracking provides multi-purpose commercially valuable data not simply allowing RFID asset tracking and association (e.g. of laptops and persons, loca- tion data, permits to access them and so on) but about individuals that can be mined for indeterminate, sometimes …
  • An extensible and ubiquitous RFID management framework over next‐generation network
    To track the current location of the laptop at the RFID reader level, the contact field of the 200 OK message includes the IP address of the RFID reader (i.e. 147.46.0.1) as well as the tag’s SIP URI …
  • SRMS: SIP-based RFID Management System
    To track the current location of the laptop at the RFID reader level, the contact field of the 200 OK message includes the IP address of the RFID reader (i.e., 147.46.0.1) as well as the tag’s SIP URI …
  • Security and Dependability for Ambient Intelligence
    Ambient technol- ogy can help realise and enforce security and privacy requirements; for example, one can label important devices (such as a laptop ) with RFID tags to allow owners with suitable sensors to track such devices.
  • Virtual and Mixed Reality - New Trends
    Also, while not related to people, 16 RFID readers are used to track the location of resources (e.g. books, laptops ) which have RFID tags on them, as they move around the office.
  • Entertainment Computing - ICEC 2010
    Also, while not related to people, 16 RFID readers are used to track the location of resources (e.g. books, laptops ) which have RFID tags on them, as they move around the office.
  • Privacy Enhancing Technologies
    Furthermore, the proliferation of wireless communication (among laptops , cell phones, PDAs, sensors and RFIDs ) drastically lowers the bar for eavesdropping and tracking of both people and their devices.
  • Middleware Extensions for Pervasive Computing
    For example, an inventory tracking system might deploy application code to laptop PCs and PDAs, both of which are equipped with RFID tag readers.