Remove tag rfid-authentication
article thumbnail

IoT: Living at the edge  

OpenText Information Management

VIPER: Well, if IoT was an emoji or an expression, it would be: (1) a cloud with legs, (2) a tornado of devices, or (3) an air-tag tracking anything (keys, dog, purse, avocado). From QR codes to RFID tags to Bluetooth devices, the ability to track and trace physical assets has become much easier. You: What is IoT?

IoT 67
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

When tagging and auto-classifying content, the AI engine can extract metadata to provide context to unstructured content. Blockchain, Provenance, and Authentic Information. In this use case, the provenance of the product from source to destination is essential to help ensure the safety, security, and authenticity of the product.

article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

So what this petty thief did, he walked around Prague looking for a new Mercedes, and then he used his laptop and an RFID antenna to generate all the possible combinations for a Mercedes keycode until one hit and he did it again. I was blinded by that low price tag. And he did it again.