An Arduino library for the ST25DV64KC Dynamic NFC/RFID Tag. With this library, you can: Write WiFi credentials to the tag using your smart phone and then have your Arduino board read them via I2C Log ...
Contactless payment is comfortable, but it also has some security issues that criminals can exploit. RFID skimming is a real vulnerability that cybersecurity experts demonstrated several times. It is ...
RFID is widely used for user identification and access control for applications. These 11 considerations will help product managers, embedded system engineers and solution architects when choosing an ...
It can be a pain to wait at a toll booth. Luckily, RFID toll tags can help. RFID toll tags are small devices that drivers attach to their vehicle windshields, usually behind the rearview mirror. Each ...
Modern conveniences such as self-checkout and contactless payments are often taken for granted. Because of this, it’s natural to overlook the critical technology that makes such everyday efficiencies ...
For manufacturers, the efficient handling and management of work- in-process (WIP) goods is critical for maintaining competitiveness and meeting customer demands. While enterprise resource planning ...
GREENSBORO, N.C.--(BUSINESS WIRE)--Guerrilla RF, Inc. (OTCQX: GUER) today announced that its high-efficiency GRF5509 4-watt power amplifier was selected by Impinj (NASDAQ: PI) for use in their ...
This library was created to read the UID of tags presented to a PN5180 RFID reader, such as below: The PN5180 implements the ISO15693 "vicinity" protocol, which typically enables tags to be read at a ...
Automation can take many forms within a manufacturing facility. Xemelgo’s software, combined with RFID tagging technology, enables manufacturers like Sekisui Aerospace to automatically locate and ...
Indian technology company ID Tech Solutions has released its IDT-87 UHF RFID reader to capture tag reads in outdoor, industrial settings such as mine or factory gates and weigh bridges. The reader is ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results