This year, RFID entered the
Radio frequency verification technology will be used to measure the run time of athletes at the 2008 Beijing Olympics, attached to the ball to arbitrate the judge properly in controversial situations ...
Radio frequency verification technology will be used to measure the run time of athletes at the 2008 Beijing Olympics, attached to the ball to arbitrate the judge properly in controversial situations .
According to AIM Global Automated Trade Association, this year RFID will appear in many familiar areas of life. At the upcoming Beijing Olympics, marathon athletes will wear this technology card. The running time from the departure time to the destination will be watched by the viewers themselves.
The European Union has also decided, from 2008, farms must start attaching electronic "identity cards" to each animal like goats and sheep. The cost of each card is about 1.5 - 3 USD.
This technology will fill security holes in the global supply chain to avoid counterfeiting such as alcohol, drugs, DVDs ., helping governments control workers and citizens in a border. However, the application of RFID to track people is considered to affect personal freedom and security, especially when card readers can retrieve information from a distance of 100 meters.
Viet Toan
- Smart paper
- US students are fitted with RFID chips
- Korea put RFID into life
- RFID chips can cause cancer
- US warning about 'RFID spy' in Canadian coins
- US attached RFID chip for passport
- Cinnamon cat entered the history of science
- VND 146 billion invested to produce RFID chips
- Norton collaborated on anti-hack jeans
- Mobile giants entered the race to reduce freight at the end of the year
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system