Network World

research center:

Wireless / Mobile

Search / DocFinder:
Advanced search
Research Centers
Vendor Solutions
Site Resources
Special Issues

Signature SeriesEnterprise All-Stars
Enterprise All-Stars NEW

You in action
You in action

New Data Center The New Data Center: Wireless & Mobility
Wireless & Mobility NEW

The New Data Center: Server Virtualization
Server Virtualization

Error 404--Not Found

Error 404--Not Found

From RFC 2068 Hypertext Transfer Protocol -- HTTP/1.1:

10.4.5 404 Not Found

The server has not found anything matching the Request-URI. No indication is given of whether the condition is temporary or permanent.

If the server does not wish to make this information available to the client, the status code 403 (Forbidden) can be used instead. The 410 (Gone) status code SHOULD be used if the server knows, through some internally configurable mechanism, that an old resource is permanently unavailable and has no forwarding address.

RFID (radio frequency identification)

Radio frequency identification (RFID) technology uses radio waves to transfer data between a reader device and an item, such as clothing or a shipping container. The technology powers myriad applications, from luggage tagging at airports to highway toll collections.

Exxon Mobil uses RFID technology in its Speedpass payment system. Customers wave a small transponder in front of a sensor on a gas pump, debiting their account. Low-frequency RFID applications range from 3 KHz to 300 KHz; Speedpass operates at 134 KHz. High-frequency RFID systems operate between 3 MHz and 30 MHz - many at 13.56 MHz, a frequency reserved for low-power industrial applications.

From Wireless technology reshapes retailers, Network World, 08/12/02.

Additional resources

Raising an RFID ruckus
Radio frequency identification tags might make supply chains infinitely more manageable, but the privacy flap needs settling first. Network World, 09/29/03.

On the leading edge of RFID
Gillette buys 500 million RFID chips. Network World, 12/13/04.

RFID research center
Latest news, analysis and opinion from Network World Fusion.

There are 4 comments:

By Evelyn

1. How new data capture devices such as RFID tags help organizations to accurately identify and segment their customers for activities such as targeted marketing?

By sakthivel m.

Some extra notes & explains need

By Jackie Slim

can you say it will kill the chip!

radio freq id
By BillA Adams

I need to have a handheld device that will locate large items without going to a bar scan.(we have the bar codes but the ware house is stacked up and we cant fing a certain box.)
I need to use a tag of some kind to stick to cardboard and then when its sold remove it and attach it to another box with a differen number.

Add a comment

NOTE: Comments are reviewed by an editor before being posted.

Your rating of this resource (with 5 the best)
1 2 3 4 5


Your user name (what other users will see on the review):

Your real name (for our records only):

Your e-mail (ditto):

Your comments (Use a blank line to separate paragraphs):


Sign up for one of NWW's Wireless & Mobile newsletters.

Wireless in the Enterprise
Cool Tools alert
Wireless News Alert
View all newsletters

Email Address:

Vendor Solutions

White Papers


Research Centers: Applications | Application Development | Applications-Standards | Applications Vendor Solutions | Collaboration | CRM / ERP | Databases | Directories | Grid Computing | Java | Messaging | .Net | RFID | SOAP | Web Services | XML | Convergence & VoIP | Convergence Regulatory | Convergence Services | Convergence Standards | Convergence VoIP Vendor Solutions | Video | IP PBX | SIP | VoIP | VoIP Services | E-Business | DNS | RFID | Supply Chain | Web security LANs & Routers | Acceleration | Gigabit Ethernet | Lans-Standards | Routers | Wireless LANs | Network Management | Application Management | Desktop Management | Management Test Patch Management | Operating Systems | Linux | NetWare | Unix | Windows Outsourcing | Managed Services | Offshoring Security | Firewalls - VPN - Intrusion | Identity management | Patch Management | Microsoft Security | Privacy | Security Standards | Spam & Phishing | Viruses & worms | Web Security | Wireless Security | Servers & Desktop | Backup-Recovery | DataCenter | Desktops | Desktop Management | Grid | Servers | Server Blades | Servers Desktops | Utility Computing | Small & Medium Business | Broadband | Telework | Handhelds & PDAs | Home Networking | Security | Storage | Compliance | Infiniband | Network-Attached Storage | SANs | Storage Management | Storage Virtualization | Virtualization | Vendor News | Bankruptcy | Earnings | Lawsuits | Layoffs | Standards | Start Ups | Vendor Markets | Education | Financial | Healthcare | HIPAA | Manufacturing | Retail | Wide Area Network | Broadband | Carriers | Frame Relay | Metro Ethernet | MPLS | Service providers | Wireless services | Wireless & Mobile | Wireless LANs | PDAs & handhelds | Wireless Security | Wireless Services | Wireless Standards | Wireless Switches | All Company Profiles