I accept receiving promo codes and other educational info from this company.
Get My Code
Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.
A 15 page paper. Radio frequency identification (RFID) tags are tiny, miniscule microchips that promise to reshape and revolutionize supply chain management. Since effective supply chain management means knowing where every item is located at any given time, RFID could just accomplish the goal. This essay provides background information on the person who initiated the idea for RFID tags. The technology of radio frequency identification is explained. The essay then comprehensively discusses what RFID can do and how it does it. RFID tags are briefly compared to bar codes. The advantages and benefits of the technology in terms of supply chain management are discussed. Companies that are already using RFID tags are identified and how they are using them. Bibliography lists 12 sources. PGrfid.rtf
The 73 page paper is an in-depth look at the way in which technology may be utilized strategically in the form of a smart card, incorporating both biometric data and RFID technology in order to increase the effectiveness and efficiency of security within an organization. The paper presents an introduction to the subject, includes objectives as well as limitations. The majority the paper is made up of a literature review examining the role of strategy in security, the development and role of smartcards, including the underlying technology, the use of RFID and the value of biometrics. The methodology for research is provided. This is then applied to a case study. The bibliography cites 51 sources.
This 3 page paper discusses DHL's decision to use RFID technology and their most recent idea to equip trucks with RFID. The writer also reports their latest innovation, RFID with temperature sensor. Bibliography lists 4 sources.
This 4 page paper discusses computer security in four areas: auditing and monitoring; cryptosecurity; transmission security; and TEMPEST. Bibliography lists 7 sources.
This 4-page paper discusses the aspect of computer and network security and how much security is too much. Bibliography lists 3 sources.