|
|
CCNA 640-801 Preparation and Exam Review
The CCNA certification equips you with networking skills to design, plan, install, configure and operate small to medium size computer networks. CCNA certified professionals can install, configure, and operate LAN, WAN, and dial access...
Keeping your pc healthy at little or no cost
Protect Your PC
Having problems with your pc?
Do your kids, family or friends fill it with all the stuff they find on the internet?
Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You...
Preparing for a Career in Information Technology
So you want to work in the Information Technology field? In this article i'll provide some advice to those seeking employment in this field. Keep in mind these are my opinions, others may agree or disagree. Mechanic or Engineer? The first...
QArea announces its Wireless Casino ready for stress testing on PDA and cell phones
Kharkov, Ukraine - August 2, 2005 - QArea, the leading developer and tester of applications for PDA's and smart phones also being the originator of the pioneering BugHuntress Test Suite for automated PDA applications testing, announces its...
VoIP Phone Home?
VoIP Phone Home? The movie Extra Terrestrial (ET) coined the phrase “phone home” and each year American’s look for more cost effective ways to do just that. The past 10 years have seen the development and growing popularity of Voice over Internet...
|
|
|
|
|
|
|
|
Wireless Shopping with RFID
So wireless networking has got rid of your network cables and
your USB cables... what can it do next? Well, the answer might
surprise you: wireless is going shopping. There is a small army
of uses for this technology and many are in use at this very
moment.
RFID: Electronic Barcodes
Yes, that's right: RFID (Radio Frequency Identification) is a
replacement for the barcode, using wireless radio technology.
But what's wrong with barcodes, you ask? Well, they need to be
scanned, for a start. Supermarkets and other shops have small
armies of staff in their stores, in fact, doing almost nothing
but scanning barcodes and taking money.
RFID lets barcodes be replaced with radio signals, which can
automatically be scanned. In theory, you could have a shopping
cart full of RFID-labelled products, put it near an RFID
scanner, and the things in your cart would be detected and their
prices added up instantly.
Imagine being able to stop in front of a machine at the
supermarket's exit, and do nothing but put your credit card in a
machine before you leave (if your credit card is RFID-enabled
too, you might not even need to do that). You can checkout in a
matter of seconds! It's a win-win situation: it saves you time,
and it saves the supermarket money. The only people who lose out
are the ones getting paid to sit around scanning barcodes, but
hey, that's technology for you.
How on Earth Does It Work?
Believe it or not, RFID tags contain tiny antennas, allowing
them to transmit small amounts of data by radio. The majority of
tags in use today do not have their own power supply (a power
supply makes the tag larger and more expensive), which means
that they must rely on power they receive through the air by
radio. This is such a tiny amount of power that it is only just
enough to transmit an ID number. This does work, however, from
as much as five metres away.
For shopping use, tags that send numbers are sufficient -- a
barcode is just a number in the form of lines, after all. These
tags are now as cheap as 40 cents, and mass production means the
price is only going to come down -- RFID is likely to become
widespread in the next decade. The smallest RFID tags are
already thin enough to be almost invisible.
Privacy and Other Uses of
RFID
There are privacy concerns around the use of RFID, simply
because it makes it so quick and easy to tag just about anything
-- and the tags can be scanned without any human interaction.
This, however, is also what makes the system very useful.
Pets are already implanted with RFID tags so that they can be
identified if found, and the idea of humans being made to have
RFID implants as a replacement for identity cards isn't as
science fiction as it sounds -- it is possible today. As long
ago as 1998, a professor was able to implant a tag in his arm.
The technology is being considered for used on prisoners. In
countries that already have ID cards or that will have them
soon, RFID tracking probably won't be far behind.
If RFID shopping tags are left on things, then people could
leave tags on their clothes or other products without realising
it. This has all sorts of implications -- someone might be able
to point an RFID scanner at your house and get a list of
everything in it that still has a tag, for example.
RFID is already widely used in many industries. Warehouses use
them to track pallets of goods, some libraries put them in books
and airlines use them to track baggage. Usage is particularly
common in building access control (the ID cards for employees
that open the door automatically).
Travel is another growth area: many parts of the USA have the
option of using RFID cards to pay at toll booth's, and the
London Underground now uses RFID payment cards known as Oyster
cards. There are even RFID car keys that can open the door while
they're still in your pocket, without you doing a thing.
Environmental Concerns
As a footnote to all this, many people are concerned about the
environmental impact RFID could have. Although they are small,
using computer chips as a replacement for barcodes could lead to
the equivalent of many thousands of computers being thrown away
every year.
About the author:
Original Source: Articles-Galore.com
Information supplied and written by Lee Asher of CyberTech SoftShop
Suppliers of the DeadEasy
Ebook Maker and Publishing Wizard.
|
|
|
|
|
Computer networking - Wikipedia, the free encyclopedia |
Network cards such as this one can transmit data at high rates over Ethernet cables. ... Computer networking is sometimes considered a sub-discipline of ... |
en.wikipedia.org |
  |
Social network - Wikipedia, the free encyclopedia |
Social network analysis (related to network theory) has emerged as a key ... Social networking also refers to a category of Internet applications to help ... |
en.wikipedia.org |
  |
Networking on the Network |
Here, then, are some of the fundamentals of professional networking. ... Asking advice from the people in your network is part of the process. ... |
polaris.gseis.ucla.edu |
  |
Computer Networking - Wireless Networks - Home and Wireless ... |
Site offers coverage of computer network technology in basic networks, VPN, Web servers, Intranets and Extranets, tutorials, and troubleshooting. |
compnetworking.about.com |
  |
ITtoolbox Networking Knowledge Base |
A networking community for IT professionals. Focusing on connectivity, network management, network operating systems, security, and other aspects of ... |
networking.ittoolbox.com |
  |
Howstuffworks "How Home Networking Works" |
How home networking works and the different methods to create a home network. |
www.howstuffworks.com |
  |
SmallNetBuilder |
SmallNetBuilder provides networking and IT news, reviews, help and information for professional and "prosumer" SOHO and SMB users. |
www.smallnetbuilder.com |
  |
Network Computing - Computer Networking, Network Security and ... |
Network Computing - Computer Networking, Network Security & Management news. Enterprise product reviews, comparisons and analysis built by IT professionals ... |
www.networkcomputing.com |
  |
CareerJournal | Career Networking - Professional Network ... |
Professional Network - Career networking news and advice from The Wall Street ... Networking tips that will help you advance your job search or career. |
www.careerjournal.com |
  |
Trail: Custom Networking (The Java™ Tutorials) |
The first describes the networking capabilities of the Java platform that you ... The second provides a brief overview of networking to familiarize you with ... |
java.sun.com |
  |
Windows Server 2003, Longhorn Server & Vista Networking Articles |
Features a wealth of tutorials on various Windows networking related topics such as setting up Windows NT/XP/2000/2003 networks, troubleshooting, ... |
www.windowsnetworking.com |
  |
IBM Networking | IBM Networking |
The era of e-business on demand requires superlative networking capability. ... IBM Networking Services provides e-business solutions anywhere in the ... |
www.networking.ibm.com |
  |
Computerworld - Networking - Voip - Bluetooth - Firewall - Wireless |
Computerworld, the 'Voice of IT Management' is your information source for computer networking. Access up to date information on LAN/WAN, hardware/devices, ... |
www.computerworld.com |
  |
HP Networking products and solutions |
HP ProLiant networking products provide high-powered, simple solutions for enterprise, business, or home networking environments, including ProLiant and ... |
www.hp.com |
  |
Monster: Networking |
Networking Networking Timeline. Networking Timeline · Making New Contacts · How to Set Up and Run an Informational Interview · Nurturing and Keeping ... |
content.monster.com |
  |
Access | CNET News.com |
Phone company shrugs off competition concerns over Verizon's Fios network, saying existing copper is doing the bandwidth trick. ... |
news.com.com |
  |
Network Management: Covering today's Network topics |
Find the latest information on Network Management, Network Security, Network Design and more. |
searchnetworking.techtarget.com |
  |
cisco networking academy program |
cisco.netacad.net/ - 1k - Cached - Similar pages |
|
  |
Networking and Your Job Search: The Riley Guide |
Networking starts long before a job search, and you probably don't even realize you are doing it. ... In Terms of a Job Search, Networking is the way to Go! ... |
www.rileyguide.com |
  |
NetworkWorld.com |
Networking news, reviews, opinions and forums from the Leader in Network Knowledge. |
www.networkworld.com |
  |
|