Blog posts

General Purpose Input/Ouput (GPIO) Devices

General Purpose Input/Ouput (GPIO) Devices

Posted by Suzanne Smiley on Oct 18, 2016

Introduction Most fixed RFID readers have a GPIO port, or General Purpose Input / Output port, that enables additional functionality, such as visual or audio signals. Unlike other ports on RFID
Read More
Mercury API SDK C# Documentation

Mercury API SDK C# Documentation

Posted by Russell Hilyer on Sep 26, 2016

Introduction This documentation is for the Mercury API SDK provided by ThingMagic for a .NET application. This specific documentation will be for a C# implementation of the SDK written in Microsof
Read More
The Layers & Parts of an RFID Printer

The Layers & Parts of an RFID Printer

Posted by Suzanne Smiley on Sep 15, 2016

The Basics RFID Printers are designed to save time for mass printing and encoding applications. These devices are basically an RFID reader and a printer combined into one machine. UHF, HF, and NFC
Read More
RFID Tutorial: Impinj Octane SDK

RFID Tutorial: Impinj Octane SDK

Posted by Russell Hilyer on Aug 25, 2016

Introduction This post is written for developing and deploying a simple Windows device application for controlling a passive RFID system using the Impinj Speedway reader and the Impinj O
Read More
RFID Antennas: Beamwidth & Directivity

RFID Antennas: Beamwidth & Directivity

Posted by Suzanne Smiley on Aug 22, 2016

Introduction Even though RFID antennas are not the brains of an RFID system, they are still complex devices that can hinder or benefit an RFID system depending on the application and chosen antenn
Read More
RFID Readers: Basic Options & Features

RFID Readers: Basic Options & Features

Posted by Suzanne Smiley on Jul 12, 2016

Introduction Every year, new RFID readers hit the market with improved usability and features, so it is important to know the pros and cons of each reader as well as any additional features tha
Read More
7 Types of Security Attacks on RFID Systems

7 Types of Security Attacks on RFID Systems

Posted by Suzanne Smiley on Jun 14, 2016

Introduction RFID systems, like most electronics and networks, are susceptible to both physical and electronic attacks. As the technology matures and becomes more widespread, so do hackers who aim
Read More
7 Types of Security Attacks on RFID Systems

7 Types of Security Attacks on RFID Systems

Posted by Suzanne Smiley on Jun 14, 2016

Introduction RFID systems, like most electronics and networks, are susceptible to both physical and electronic attacks. As the technology matures and becomes more widespread, so do hackers who aim
Read More
UHF RFID Security Measures

UHF RFID Security Measures

Posted by Suzanne Smiley on Jun 08, 2016

Introduction Class 1 Gen 2 UHF RFID Tags. The gaps in usage of UHF tags were even more pronounced before the release of Class 1 Gen 2 in 2004, because previous versions such as Class 1 Gen 1 cont
Read More
RFID Journal LIVE! 2016 Compilation

RFID Journal LIVE! 2016 Compilation

Posted by Suzanne Smiley on Jun 01, 2016

In May, we attended RFID Journal LIVE! 2016 located in Orlando, Florida. While we were there, we interviewed manufacturers, solutions providers, and industry speakers in hopes of learning more abou
Read More