Rather than reinvent the wheel, you might want to check out the extremely impressive ESP-RFID project. It’s still based on the ESP8266 we all know and love, but it combines the diminutive WiFi-enabled ...
I just received my RC522 RFID reader and made this simple Arduino access control system that uses the reader, a buzzer for the alarm and a relay shield for the security system. The relay can be used ...
As vehicle access-control systems utilizing UHF RFID are gaining traction among gated communities, parking lots and other controlled areas, the cost has still been challenging. Readers deployed at ...
A partnership between Precision Dynamics and Salto Systems will allow production of RFID wristbands for keyless entry to rooms and storage lockers in hotels, resorts, amusement parks and other ...
A Wisconsin-based company recently made headlines when it announced that it would soon begin offering implantable RFID chips to its employees as a way for them to make cashless payments for snack ...
Today’s senior citizens expect to have as much freedom of movement as possible, in order to protect the quality of their later years, and care providers strive to offer them that freedom as they age, ...
Retailers, manufacturers, hospitals, federal agencies and other organizations planning to use radio frequency identification (RFID) technology to improve their operations should also systematically ...
A critical element in securing your business is controlling access to your business space. While cyber security tends to be front of mind for many businesses, controlling who enters your business and ...
Construction job sites present a unique safety challenge. Equipment moves in and out constantly, crews change shifts, and temporary workers or visitors may arri ...
The team that produced the RFDump research/hacker tool for cloning and altering data stored on radio-frequency ID tags has now come out with a product to thwart RFID hackers. German security ...
There are myriad options available to physical security and facility managers when it comes to selecting an access control solution to address an organization’s threat level and its corporate culture ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results