Additional Blogs by Members
cancel
Showing results for 
Search instead for 
Did you mean: 
Former Member
0 Kudos
Radio Frequency IDentification (RFID) is a method of remotely storing and retrieving data using devices called RFID tags or transponder. An RFID tag is a small object, such as an adhesive sticker, that can be attached to or incorporated into a product. RFID tags contain antennas to enable them to receive and respond to radio-frequency queries from an RFID transceiver.

RFID systems can be used just about anywhere, from clothing tags to missiles to pet tags to food - anywhere that a unique identification system is needed. The tag can carry information as simple as a pet owners name and address or the cleaning instruction on a sweater to as complex as instructions on how to assemble a car.
Early Adopters of RFID are beginning to look beyond proof of concept pilots and field trials. Enterprise scale Solution Design and Integration are emerging as key focus areas. Key to success in both of them is the architecture for integrating data from the RFID hardware layer with a multitude of Enterprise Systems. A Large Enterprise piloting RFID in multiple global sites is recognizing the limitations of a traditional Enterprise scale Application Server in performing RFID Middleware functions. A European Specialty Retailer seeking to adopt RFID is grappling with the cost of ownership implications of Point Solutions for RFID integration. Both of these Enterprises are recognizing the need for a RFID Architecture Strategy.

There are two types of RFID tags. Active OR Passive.
Activer tags must have a power source and may have longer ranges and larger memories than passive tags whereas passive tags do not have there own power supply.

An RFID system consists of several components like tags, tag readers, tag programming stations, circulation readers, sorting equipment, and tag inventory wands. Security can be handled in two ways. Security gates can query the ILS (Integrated Logic System) to determine its security status or the tag may contain a security bit which would be turned on and off by circulation or self-check reader stations.

In my future Blogs, I will continue with common usage of RFID in current market and using RFID technology with SAP NetWeaver Mobile Infrastructure.
5 Comments