Global RFID Smart Antenna Market 2016-2020 - Emerging Applications for RFID are Driving Growth -: A trend influencing market growth is the emergence of cloud-based RFID solutions.
Advances in technology have led to the expansion of RFID technology in various fields such as the transportation, aerospace, IT, and logistics. However, due to high IT infrastructure requirements such as database, servers, and inter-/intra-network, which adds to its already high deployment and implementation costs, the adoption of RFID has been limited to small and medium-sized retail chains or stores.
The cloud-based RFID solutions offered by various RDIF solution providers such as Terso Solutions, Tellago, and Nedap are providing opportunity for small and medium-sized retailers to avail the benefits of RFID systems, as they reduce the initial procurement cost of servers.
According to the report, a key growth driver is the emerging applications for RFID. RFID smart antennas integrated into RFID systems are selected on the basis of radiation resistance, resistive losses, bandwidth, and feed impedance. RFID smart antennas transmit and emit both electrical and magnetic properties and operate around a wide range of frequencies to contain the reliability of the information collected. As a result, the reliability of RFID systems has increased over time, which, in turn, has resulted in an increase in demand for RFID systems.
RFID systems are used for asset tracking and thus, it was perceived that the major applications of such systems are more useful in retail and logistics environments.
Friday, September 16, 2016
Thursday, July 14, 2016
Tuesday, March 8, 2016
Ask The Experts Forum - RFID Journal
Ask The Experts Forum - RFID Journal: What Are Wet RFID Inlays?
Posted By RFID Journal, 03.07.201
Fred,
A wet inlay is an RFID transponder (a chip with an antenna on a substrate) with an adhesive backing. A dry inlay has no adhesive. Wet inlays are designed to be stuck inside corrugated boxes or on the backs of labels. It's possible that an inlay embedded in concrete might continue to function, but it is likely that the moisture in the concrete would detune the antenna, thereby shortening the read range. Eventually, I think the transponder components would be destroyed.
I recommend that you use a tag with a plastic housing to protect it from moisture and chemicals in the concrete. More than two dozen companies that offer such tags will be exhibiting at RFID Journal LIVE! 2016, which will be held in Orlando, Fla., on May 3-5.
—Mark Roberti, Founder and Editor, RFID Journal
Posted By RFID Journal, 03.07.201
Fred,
A wet inlay is an RFID transponder (a chip with an antenna on a substrate) with an adhesive backing. A dry inlay has no adhesive. Wet inlays are designed to be stuck inside corrugated boxes or on the backs of labels. It's possible that an inlay embedded in concrete might continue to function, but it is likely that the moisture in the concrete would detune the antenna, thereby shortening the read range. Eventually, I think the transponder components would be destroyed.
I recommend that you use a tag with a plastic housing to protect it from moisture and chemicals in the concrete. More than two dozen companies that offer such tags will be exhibiting at RFID Journal LIVE! 2016, which will be held in Orlando, Fla., on May 3-5.
—Mark Roberti, Founder and Editor, RFID Journal
Tuesday, March 31, 2015
EPIC - Electronic Privacy Information Center
EPIC - Electronic Privacy Information Center
The Court held in that case that continuous GPS tracking constituted a search.
The Court held in that case that continuous GPS tracking constituted a search.
Thursday, February 13, 2014
NEXESS: Products & Services | Smart RFID Cabinet is the solution for tool distribution automation.
NEXESS: Products & Services | LinkedIn
NexCap® XL, Smart RFID Cabinet is the solution for tool distribution automation. When identified through its RFID badge, the user can easily access the cabinet to borrow or return a tool. Automatic inventory is done when doors are closed. Our NexCap® XL has been qualified for 100% reading reliability with Xerafy Dot On.
Features: 3 sides hanging tool system, 4 220V plugs inside, interior LED lighting, 15" industrial touch screen, windows, etc.
automatic inventory
access control
RFID tool tracking
FOD tracking
UHF RFID
RFID tag
220V plugs
touch screen
interior LED lighting
NexCap® XL, Smart RFID Cabinet is the solution for tool distribution automation. When identified through its RFID badge, the user can easily access the cabinet to borrow or return a tool. Automatic inventory is done when doors are closed. Our NexCap® XL has been qualified for 100% reading reliability with Xerafy Dot On.
Features: 3 sides hanging tool system, 4 220V plugs inside, interior LED lighting, 15" industrial touch screen, windows, etc.
automatic inventory
access control
RFID tool tracking
FOD tracking
UHF RFID
RFID tag
220V plugs
touch screen
interior LED lighting
Friday, August 30, 2013
Applying RSSI filters for optimal RFID performance - RFID Arena
Applying RSSI filters for optimal RFID performance - RFID Arena: WHAT DOES THE RSSI VALUE TELL US AND WHAT IS IT GOOD FOR?
It's fairly simple. RSSI stands for "Received Signal Strength Indicator" and it tells us the strength of the signal sent from an RFID tag to an RFID reader. But for what do we use that information in real-life?
For estimating the distance between an RFID tag and an RFID reader
For identifying the movement direction of an RFID tag
For setting optimal reading and writing conditions
For analysing and optimizing the environment
For locating lost tags
It's fairly simple. RSSI stands for "Received Signal Strength Indicator" and it tells us the strength of the signal sent from an RFID tag to an RFID reader. But for what do we use that information in real-life?
For estimating the distance between an RFID tag and an RFID reader
For identifying the movement direction of an RFID tag
For setting optimal reading and writing conditions
For analysing and optimizing the environment
For locating lost tags
RF Code Theater: Top 10 Tips for Managing and Making Sense of Big Data
RF Code Theater: Top 10 Tips for Managing and Making Sense of Big Data: RF Code Theater: Top 10 Tips for Managing and Making Sense of Big Data
With big data comes Big Infrastructure. Scalability of the essential facilities, technology and energy required to process data is as important, if not more important, as the data itself. How do you collect, store, analyze and protect big data effectively, but at the same time plan for its continual growth?
With big data comes Big Infrastructure. Scalability of the essential facilities, technology and energy required to process data is as important, if not more important, as the data itself. How do you collect, store, analyze and protect big data effectively, but at the same time plan for its continual growth?
Saturday, June 29, 2013
Nordic ID - Merlin UHF RFID
Nordic ID - Products
State-of-the-art mobile RFID
The Nordic ID Merlin UHF RFID combines identification and communication technologies for professional use. The mobile computer offers ease of use with the individually lit keyboard guiding the user, superior ergonomics and a clear display that enables both in- and outdoors operation.
With innovative UHF RFID technology the Nordic ID Merlin UHF RFID combines high reading performance with the ability to write tags. Nordic ID Merlin UHF RFID can process either individual or a group of tags at a distance of up to 2 meters.
Setting up the Nordic ID Merlin UHF RFID is simple and cost-effective. The intuitively operated Windows interface requires little training, immediately enabling you to work with the new system. The illuminated colour display can be controlled with a touch pen or your finger and ensures good readability under all light conditions.
With innovative UHF RFID technology the Nordic ID Merlin UHF RFID combines high reading performance with the ability to write tags. Nordic ID Merlin UHF RFID can process either individual or a group of tags at a distance of up to 2 meters.
Setting up the Nordic ID Merlin UHF RFID is simple and cost-effective. The intuitively operated Windows interface requires little training, immediately enabling you to work with the new system. The illuminated colour display can be controlled with a touch pen or your finger and ensures good readability under all light conditions.
Friday, June 28, 2013
RFID Product and Vendor Selection
RFID Product and Vendor Selection: Are you currently using or considering RFID technology?
A thirty minute call with one of The RFID Network subject matter experts can save you months of research, the expense of purchasing hardware, software, or RFID tags that do not meet your requirements or operate as the manufacturer claims. We can directly introduce you to the suppliers with the highest customer satisfaction ratings.
Our team is comprised of RFID experts with 10 to 25 years of RFID experience that are hands-on evaluating and testing the latest RFID technology in real world environments.
We provide highly specialized, 3rd party, vendor neutral professional services, unmatched in the industry, which includes:
RFID technology selection (what hardware, software, or RFID tags best fits your requirements)
RFID vendor selection (what companies should you purchase from)
3rd party project review (are you being overcharged for RFID products or consulting services?)
Executive Briefings (how will RFID technology benefit your specific business opreations)
Writing RFP's and reviewing submitted proposals that include RFID
A thirty minute call with one of The RFID Network subject matter experts can save you months of research, the expense of purchasing hardware, software, or RFID tags that do not meet your requirements or operate as the manufacturer claims. We can directly introduce you to the suppliers with the highest customer satisfaction ratings.
Our team is comprised of RFID experts with 10 to 25 years of RFID experience that are hands-on evaluating and testing the latest RFID technology in real world environments.
We provide highly specialized, 3rd party, vendor neutral professional services, unmatched in the industry, which includes:
RFID technology selection (what hardware, software, or RFID tags best fits your requirements)
RFID vendor selection (what companies should you purchase from)
3rd party project review (are you being overcharged for RFID products or consulting services?)
Executive Briefings (how will RFID technology benefit your specific business opreations)
Writing RFP's and reviewing submitted proposals that include RFID
Tuesday, June 11, 2013
RFID Readers - Gen 2 EPC (UHF) : RFID reader, RFID tag, RFID solutions - GAO RFID Inc.
RFID Readers - Gen 2 EPC (UHF) : RFID reader, RFID tag, RFID solutions - GAO RFID Inc.:
RFID Readers - 125kHz (LF)
RFID Tags – 125 kHz (LF)
RFID Readers - 134kHz (LF)
RFID Tags - 134kHz (LF)
RFID Readers - 13.56MHz (HF)
RFID Tags - 13.56MHz (HF)
RFID Readers - 865MHz (UHF)
RFID Tags - 865MHz (UHF)
RFID Readers - 900MHz (UHF)
RFID Tags - 902 to 928MHz (UHF)
RFID Readers - Gen 2 EPC (UHF)
RFID Tags - Gen 2 EPC (UHF)
RFID Active Readers - 433MHz
RFID Active Tags - 433Mhz
RFID Active Readers - 2.45GHz
RFID Active Tags - 2.45GHz
RFID Semi-Passive Readers
RFID Semi-Passive Tags
RFID On-Metal Gen 2 EPC Tags
RFID Portals
RFID Antenna
RFID Peripherals
RFID Embedded Modules
RFID Software
RFID Readers - 125kHz (LF)
RFID Tags – 125 kHz (LF)
RFID Readers - 134kHz (LF)
RFID Tags - 134kHz (LF)
RFID Readers - 13.56MHz (HF)
RFID Tags - 13.56MHz (HF)
RFID Readers - 865MHz (UHF)
RFID Tags - 865MHz (UHF)
RFID Readers - 900MHz (UHF)
RFID Tags - 902 to 928MHz (UHF)
RFID Readers - Gen 2 EPC (UHF)
RFID Tags - Gen 2 EPC (UHF)
RFID Active Readers - 433MHz
RFID Active Tags - 433Mhz
RFID Active Readers - 2.45GHz
RFID Active Tags - 2.45GHz
RFID Semi-Passive Readers
RFID Semi-Passive Tags
RFID On-Metal Gen 2 EPC Tags
RFID Portals
RFID Antenna
RFID Peripherals
RFID Embedded Modules
RFID Software
Sunday, June 9, 2013
Three Cool RFID Projects to Deter Bicycle Thefts : TreeHugger
Three Cool RFID Projects to Deter Bicycle Thefts : TreeHugger: Three Cool RFID Projects to Deter Bicycle Thefts
Sunday, January 13, 2013
Student Appeals Suspension for Refusing to Wear RFID Tracker | Threat Level | Wired.com
Student Appeals Suspension for Refusing to Wear RFID Tracker | Threat Level | Wired.com
A Texas high school student on Friday asked a federal appeals court to overturn a lower court’s order upholding her school suspension for refusing to wear around her neck an RFID-chip student ID she claims is the “Mark of the Beast.”
The Northside Independent School District in San Antonio began issuing the RFID-laden student-body cards when the semester began in the fall. The ID badge has a bar code associated with a student’s Social Security number. The chip monitors pupils’ movements on campus, from when they arrive until when they leave.
A Texas high school student on Friday asked a federal appeals court to overturn a lower court’s order upholding her school suspension for refusing to wear around her neck an RFID-chip student ID she claims is the “Mark of the Beast.”
The Northside Independent School District in San Antonio began issuing the RFID-laden student-body cards when the semester began in the fall. The ID badge has a bar code associated with a student’s Social Security number. The chip monitors pupils’ movements on campus, from when they arrive until when they leave.
Thursday, December 20, 2012
RFID-equipped feeder keeps unauthorized pets out | DVICE
RFID-equipped feeder keeps unauthorized pets out | DVICE:
Do you have a greedy fat cat who likes to steal the food from all your other pets' bowls? This feeder could be the answer, with a locked door that only opens when the right cat steps up for some chow.
Using the same RFID technology as those electronic pet doors, the Gatefeeder cat feeding system has a flap door that only opens when the cat wearing the right RFID tag collar approaches the feeder. This means a cat who often gets bullied out of their food or is on a special diet will always get their meal.
Do you have a greedy fat cat who likes to steal the food from all your other pets' bowls? This feeder could be the answer, with a locked door that only opens when the right cat steps up for some chow.
Using the same RFID technology as those electronic pet doors, the Gatefeeder cat feeding system has a flap door that only opens when the cat wearing the right RFID tag collar approaches the feeder. This means a cat who often gets bullied out of their food or is on a special diet will always get their meal.
Wednesday, October 12, 2011
Design News - Captain Hybrid - New Horizons for RFID
Design News - Captain Hybrid - New Horizons for RFID: For the past decade, the business world has anxiously awaited the day when radio frequency identification (RFID) would step up to the throne and replace the venerable barcode on billions of everyday products.
While the world has been waiting, however, RFID has taken a detour. Today, RFID tags are popping up in places where no one ever dreamed of using barcodes. Take, for example, Coca-Cola's new Freestyle drink vending machine. Freestyle uses RFID to identify drink cartridges, help with inventory, and manage its huge number of flavor variations.
While the world has been waiting, however, RFID has taken a detour. Today, RFID tags are popping up in places where no one ever dreamed of using barcodes. Take, for example, Coca-Cola's new Freestyle drink vending machine. Freestyle uses RFID to identify drink cartridges, help with inventory, and manage its huge number of flavor variations.
Saturday, July 24, 2010
Wal-Mart puts smart tags on men’s clothing
Privacy concerns raised as Wal-Mart puts smart tags on men’s clothing - The Boston Globe
Privacy concerns raised as Wal-Mart puts smart tags on men’s clothing
By Anne D’Innocenzio
Associated Press / July 24, 2010
Sunday, June 7, 2009
Coke's RFID-Based Dispensers
Coke's RFID-Based Dispensers Redefine Business Intelligence -- Business Intelligence
Freestyle will let Coke more easily test new drink flavors and new beverage concepts, such as adding various vitamin combinations to flavored waters and juices. The dispensers each contain 30 cartridges of flavorings that mix up 100 different drink combinations. The cartridges are tagged with radio frequency ID chips, and each dispenser contains an RFID reader. The dispensers collect data on what customers are drinking and how much, and transmit that information each night over a private Verizon wireless network to Coke's SAP data warehouse system in Atlanta. The company will use the data to develop reports that assess how new drinks are doing in the market, identify differences in regional tastes, and help fast-food outlets decide which drinks to serve.
Monday, May 4, 2009
privacy advocates worried about RFID security
Radio frequency technologies are put to tests of security - The Boston Globe
The same technological advances that are making personal computers smaller and phones more energy-efficient are turning gadgets that use radio frequency identification, or RFID, into appealing targets for hackers.
Radio frequency chips and antennae, which typically transmit small amounts of data in quick exchanges with reader devices, are used in E-Z Pass systems on highways. Consumers who tap their MasterCard PayPass bank cards on wireless readers are also using RFID technology.
But as radio frequency chips evolve to store more data and to transmit signals over greater distances, the devices can also be coaxed into giving up personal information, specialists say.
Nicole Ozer, technology and civil liberties policy director at the American Civil Liberties Union of Northern California, is among the privacy advocates worried about RFID security. Ozer said an RFID-enabled passport card issued by the Department of Homeland Security and the State Department, called US Passport Card, is vulnerable to wireless attacks.
Monday, September 8, 2008
Sensor nets are a logical step in the miniaturization of technology
Intel Burrows Inside -
PC Magazine
by Lance Ulanoff 10.29.03
"Sensor nets are a logical step in the miniaturization of technology. Eventually, Intel envisions "a grain of sand that holds computation [and] communication [components], senses vibration, movement, [and more]—all on a single chip." But what a tiny CPU can do is only part of the equation. It has to be cheap, or at least cost-efficient, and be adaptable to a wide variety of uses. And this intelligent sand grain would be grouped with thousands of other grains, "so you need it to be self organizing, self maintaining," {Alan} Mainwaring points out. These grains need to be able to find each other, establish communications, and then work together. Thus, as {Alan} Mainwaring explains it, instead of sensing just the local environment around a single grain, you have an entire desert of sand that is sensing, communicating, and collecting information about a vast area. The goal is for these sensors to then deliver the gathered intelligence to a central server or even a laptop."
"Sensor nets have yet to reach this level of sophistication. In fact, there are still major hurdles to overcome. For now, the individual wireless nodes in a sensor net, known as motes (so-called because the ultimate goal is intelligent dust), are much larger than grains of sand, let alone specs of dust, and getting 1,000 nodes to do something sensible is incredibly complex. The current approach for making even small sensor networks useful is to simply gather their information into databases and run queries to find out what all the sensors are seeing."
"Intel researchers have built individual sensor nodes that weigh just a few ounces and pack an ARM CPU (the hope is to upgrade to StrongARM processors) and Bluetooth radio into a cubic inch. The company calls a collection of motes communicating and working together using Intel's software and hardware an iMote. This iMote platform also works with an 802.11 gateway, making it accessible from a standard laptop. During our meeting, I was able to check out some of these very cool motes. An individual device could fit in the palm of my hand and was encased in white, weather-resistant plastic, making the mote look like some kind of plumbing fixture. To access the technical guts, you unscrew the plastic cap from the mote case."
---
Great Duck Island off the Maine Coast where a test of wireless sensors was conducted:
PC Magazine
by Lance Ulanoff 10.29.03
"Sensor nets are a logical step in the miniaturization of technology. Eventually, Intel envisions "a grain of sand that holds computation [and] communication [components], senses vibration, movement, [and more]—all on a single chip." But what a tiny CPU can do is only part of the equation. It has to be cheap, or at least cost-efficient, and be adaptable to a wide variety of uses. And this intelligent sand grain would be grouped with thousands of other grains, "so you need it to be self organizing, self maintaining," {Alan} Mainwaring points out. These grains need to be able to find each other, establish communications, and then work together. Thus, as {Alan} Mainwaring explains it, instead of sensing just the local environment around a single grain, you have an entire desert of sand that is sensing, communicating, and collecting information about a vast area. The goal is for these sensors to then deliver the gathered intelligence to a central server or even a laptop."
"Sensor nets have yet to reach this level of sophistication. In fact, there are still major hurdles to overcome. For now, the individual wireless nodes in a sensor net, known as motes (so-called because the ultimate goal is intelligent dust), are much larger than grains of sand, let alone specs of dust, and getting 1,000 nodes to do something sensible is incredibly complex. The current approach for making even small sensor networks useful is to simply gather their information into databases and run queries to find out what all the sensors are seeing."
"Intel researchers have built individual sensor nodes that weigh just a few ounces and pack an ARM CPU (the hope is to upgrade to StrongARM processors) and Bluetooth radio into a cubic inch. The company calls a collection of motes communicating and working together using Intel's software and hardware an iMote. This iMote platform also works with an 802.11 gateway, making it accessible from a standard laptop. During our meeting, I was able to check out some of these very cool motes. An individual device could fit in the palm of my hand and was encased in white, weather-resistant plastic, making the mote look like some kind of plumbing fixture. To access the technical guts, you unscrew the plastic cap from the mote case."
---
Great Duck Island off the Maine Coast where a test of wireless sensors was conducted:
Wednesday, June 18, 2008
Privacy Issues and Human-Computer-Interaction
Privacy Issues and Human-ComputerInteraction
Mark S. Ackerman
University of Michigan
Scott D. Mainwaring
Intel Research
"Privacy can be a key aspect of the user experience with computers, online systems, and new technologies. Knowing what to consider about users and their views of computer systems can only improve privacy mechanisms. Human-Computer Interaction (HCI) isthe subfield of Computer Science that studies how people interact with and through computational technologies. This chapter examines what HCI, as a research area, offers to both those designing and those researching privacy mechanisms.
HCI is a large research field in its own right. HCI’s roots were in human factors and the design and evaluation of “man-machine” interfaces for airplanes and other complex and potentially dangerous mechanical systems. The first papers in what would later be known as HCI were in the 1970s and concerned the design of user interfaces in time-sharing systems. The field took off with the advent of personal computers and the single-user interface in the early 1980s. HCI’s roots then were in cognitive-oriented, single-user interfaces – the so-called user interface.
HCI has since expanded to consider a variety of subareas – design methodologies, usability and usability testing, intelligent interfaces, adaptive interfaces, and so on. Of particular interest here will be Computer-Supported Cooperative Work (CSCW), sometimes known as groupware.
Mark S. Ackerman
University of Michigan
Scott D. Mainwaring
Intel Research
"Privacy can be a key aspect of the user experience with computers, online systems, and new technologies. Knowing what to consider about users and their views of computer systems can only improve privacy mechanisms. Human-Computer Interaction (HCI) isthe subfield of Computer Science that studies how people interact with and through computational technologies. This chapter examines what HCI, as a research area, offers to both those designing and those researching privacy mechanisms.
HCI is a large research field in its own right. HCI’s roots were in human factors and the design and evaluation of “man-machine” interfaces for airplanes and other complex and potentially dangerous mechanical systems. The first papers in what would later be known as HCI were in the 1970s and concerned the design of user interfaces in time-sharing systems. The field took off with the advent of personal computers and the single-user interface in the early 1980s. HCI’s roots then were in cognitive-oriented, single-user interfaces – the so-called user interface.
HCI has since expanded to consider a variety of subareas – design methodologies, usability and usability testing, intelligent interfaces, adaptive interfaces, and so on. Of particular interest here will be Computer-Supported Cooperative Work (CSCW), sometimes known as groupware.
Tuesday, June 10, 2008
Week 8 Article Review: Questioning Ubiquitous Computing (Katie Mcdonald's 892 Weblog)
Week 8 Article Review: Questioning Ubiquitous Computing (Katie Mcdonald's 892 Weblog): Katie Mcdonald's weblog for documenting work done in 892 in 2007
This was a very interesting article regarding the whole idea of ubiquitous computing. The beginning gives a clear explanation of where ubiquitous computing has come from and how it compares to artifical intelligence and virtual reality. Basically the author does not believe that we should accept the word of leaders in technology that we want or need ubiquitous computing. In the conclusion he says, 'It appears then, that in the name of “enhancing the world” the proposals for Ubiquitous Computing constitute an attempt at a violent technological penetration of everyday life."
This was a very interesting article regarding the whole idea of ubiquitous computing. The beginning gives a clear explanation of where ubiquitous computing has come from and how it compares to artifical intelligence and virtual reality. Basically the author does not believe that we should accept the word of leaders in technology that we want or need ubiquitous computing. In the conclusion he says, 'It appears then, that in the name of “enhancing the world” the proposals for Ubiquitous Computing constitute an attempt at a violent technological penetration of everyday life."
Sunday, October 21, 2007
Symbol to Bridge Wi-Fi and RFID
Symbol to Bridge Wi-Fi and RFID: "Symbol Technologies announced Nov. 1 at the Mobile Business Expo in Chicago a new switch that, based on its Wi-NG (Wireless Next Generation) architecture, enables users to centrally and simultaneously manage RFID readers along with a Wi-Fi network infrastructure. ADVERTISEMENT Symbol's new RFS7000 Radio Frequency Switch in a sense bridges the gap between Wi-Fi, RFID and other radio frequency-based technologies like 802.11n, mesh, voice over wireless LAN and WiMAX, by enabling users to manage wireless voice, data and infrastructure devices all in the same place. By leveraging Symbol's Wi-NG-based architecture that runs on a Linux operating system, the switch provides a layer of separation between the infrastructure, services, application and management tiers. The RFS700 RF Switch is also designed to evolve as both RFID hardware and Wi-Fi requirements themselves continue to mature. It is 802.11n-ready (in other words, ready for the latest IEEE Wi-Fi standard), and can support up to 256 802.11 a/b/g access ports. eWEEK.com Special Report: RFID It enables a new switch clustering concept, officials said, that provides redundancy and scalability for more than 2,000 access points."
Research - Research Areas - Sensor Nets / RFID - Intel® Mote
Research - Research Areas - Sensor Nets / RFID - Intel® Mote: "The Intel project team has developed a prototype of the next-generation Intel Mote. Further research will focus on additional hardware and software improvements and increased levels of integration. The ultimate goal is to develop an Intel Mote in the form of a single microchip with layered components, including sensor and RF MEMS (micro electro-mechanical systems), nonvolatile storage, digital/analog silicon, and a battery."
The primary objective of the Intel® Mote research project is to build an enhanced generation of the “mote” technology originally developed through the collaborative efforts of the University of California Berkeley and the Intel Research Berkeley laboratory. Motes are tiny, self-contained, battery-powered computers with radio links, which enable them to communicate and exchange data with one another, and to self-organize into ad hoc networks. Motes form the building blocks of wireless sensor networks.
The Intel Mote project team seeks to create a new platform design that delivers a high level of integration as well as low-power operation in a small physical size. Features of the new platform include modular hardware and software design; system power management; and low-cost, high volume production potential.
One major goal of the Intel Mote project is to collaborate with the research community in exploring potential new applications of motes and sensor networks. With that objective in mind, Intel’s mote design will fully support TinyOS* the operating system developed at UC Berkeley for use in sensor networks and other embedded systems. The team is working with TinyOS developers on enhancements that will enable users of the Intel Mote to access its new features.
Intel Motes can serve as the building blocks for wireless sensor networks. These networks are being deployed in a growing number of applications as diverse as agricultural management, structure and earthquake monitoring, industrial controls, and military applications. Potential future markets include transportation and shipping, fire fighting and rescue operations, home automation and even interactive toys.
The primary objective of the Intel® Mote research project is to build an enhanced generation of the “mote” technology originally developed through the collaborative efforts of the University of California Berkeley and the Intel Research Berkeley laboratory. Motes are tiny, self-contained, battery-powered computers with radio links, which enable them to communicate and exchange data with one another, and to self-organize into ad hoc networks. Motes form the building blocks of wireless sensor networks.
The Intel Mote project team seeks to create a new platform design that delivers a high level of integration as well as low-power operation in a small physical size. Features of the new platform include modular hardware and software design; system power management; and low-cost, high volume production potential.
One major goal of the Intel Mote project is to collaborate with the research community in exploring potential new applications of motes and sensor networks. With that objective in mind, Intel’s mote design will fully support TinyOS* the operating system developed at UC Berkeley for use in sensor networks and other embedded systems. The team is working with TinyOS developers on enhancements that will enable users of the Intel Mote to access its new features.
Intel Motes can serve as the building blocks for wireless sensor networks. These networks are being deployed in a growing number of applications as diverse as agricultural management, structure and earthquake monitoring, industrial controls, and military applications. Potential future markets include transportation and shipping, fire fighting and rescue operations, home automation and even interactive toys.
Wednesday, September 19, 2007
real-timetracking in any standard 802.11 wireless networks
We would like to hear from viewers about Ekahau Wi-Fi tags said to be core part of reliable and accurate positioning systems.
Their web site, http://www.ekahau.com/ says Ekahau Wi-Fi tags enables real-timetracking in any standard Wi-Fi network. whilke the Ekahau Positioning Engine software tracks the continuous location and movements of the tags over any standard 802.11 wireless networks.
Your comments are welcomed!
Their web site, http://www.ekahau.com/ says Ekahau Wi-Fi tags enables real-timetracking in any standard Wi-Fi network. whilke the Ekahau Positioning Engine software tracks the continuous location and movements of the tags over any standard 802.11 wireless networks.
Your comments are welcomed!
The truth about RFID printing
The truth about RFID printing: By Frank Romano Jun 1, 2007
"The Holy Grail of RFID is printing right on the product. But the cost would have to come down from 10 cents or more per tag to less than five cents, and close to one cent. The chip alone ranges from a nano cent to about eight cents. This means the circuitry of the chip also would have to be printed, and this technology is years away. But so-called chipless technology is progressing, and every day there are announcements about transistors, capacitors and other electronic components being printed, in many cases using inkjet. Printed batteries are just about ready for prime time. To print the antenna, special conductive inks that contain aluminum, copper or silver are used. In most cases, the ink must be heated after printing. One company, Parelec, showed printing of the antenna directly on corrugated. But the chip still had to be glued to the antenna."
"The Holy Grail of RFID is printing right on the product. But the cost would have to come down from 10 cents or more per tag to less than five cents, and close to one cent. The chip alone ranges from a nano cent to about eight cents. This means the circuitry of the chip also would have to be printed, and this technology is years away. But so-called chipless technology is progressing, and every day there are announcements about transistors, capacitors and other electronic components being printed, in many cases using inkjet. Printed batteries are just about ready for prime time. To print the antenna, special conductive inks that contain aluminum, copper or silver are used. In most cases, the ink must be heated after printing. One company, Parelec, showed printing of the antenna directly on corrugated. But the chip still had to be glued to the antenna."
Frank J. Romano is professor emeritus at RIT. Contact him at fxrppr@rit.edu
RedPrairie and Avery Dennison partnership
"The recent RedPrairie and Avery Dennison partnership helps ensure that RedPrairie's customers have reliable RFID printing/encoding capabilities with Monarch brand printers already pre-integrated into RedPrairie software solutions. 'Avery Dennison shares RedPrairie's vision of delivering RFID solutions that are cost effective, simple to deploy, and built on a robust, scalable technology infrastructure,' said Rick Bauer, Avery Dennison Director of RFID Global Program Development. 'We were excited about the opportunity to combine our RFID capabilities with RedPrairie's software expertise in order to create a turnkey solution that is seamless for our mutual"
full news article:
Print Industry News - 2007-08-09 - Avery Dennison Printer Systems Division and RedPrairie Partner to Provide RFID Solution:
full news article:
Print Industry News - 2007-08-09 - Avery Dennison Printer Systems Division and RedPrairie Partner to Provide RFID Solution:
RFID Technologies group on Google Groups.
This blog is a companion to http://groups.google.com/group/rfid-technologies
RFID Technologies a Google Group.
The Group is a open, independent, forum for RFID technology providers. (i.e.Anyone engaged in: research, development and printing of Active RFID tags).
The group is set up to explore active rfid tags to be integrated as parts of wireless sensor networks and to discuss manufacturing of active tags.
The focus is production, not on privacy or information management.
Group members determine the topics! Join Now!
RFID Technologies a Google Group.
The Group is a open, independent, forum for RFID technology providers. (i.e.Anyone engaged in: research, development and printing of Active RFID tags).
The group is set up to explore active rfid tags to be integrated as parts of wireless sensor networks and to discuss manufacturing of active tags.
The focus is production, not on privacy or information management.
Group members determine the topics! Join Now!
Subscribe to:
Posts (Atom)