Research on Radio Frequency Identification Technology (RFID) Report (Assessment)

Exclusively available on IvyPanda Available only on IvyPanda

Radio Frequency Identification technology is a programme developed and fitted on computers to monitor the movement of goods across the world. The identification system is fitted with a moveable device (tag) which is used to transmit data (Hunt, Albert and Mike140).

We will write a custom essay on your topic a custom Assessment on Research on Radio Frequency Identification Technology (RFID)
808 writers online

Many organisations across the world use this device to monitor the movement of their products until they are pulled out of the shelves for usage or consumption. Information conveyed by the tag indicates the value and date of purchase of a particular product.

The tag has a transponder fitted with a memory chip with an exceptional electronic code. The interrogator produces signals which trigger the tag to read and write the transferred information. The data can then be transferred to the main computer for processing.

Radio Frequency Identification tags are found in different shapes and sizes depending on the intended purpose. For instance, animal tags are found in smaller shapes compared to anti-theft tags.

Before the introduction of RFID system, identification of items was majorly done by barcodes. Barcodes have been rendered useless since their tags cannot be read from far.

Additionally, they are not visible in areas with snow, fog or ice hence RFID system was considered to be more appropriate (Want 35). Most of the consumer products do not have RFID tags because they are still expensive.

Consequently, the price of the tags is expected to go down due to the increased demand from manufacturers.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

RFID system supplied in the market have greatly advanced as they have huge memory, an extensive reading rage and have a faster rate of processing as compared to the previous versions. The introduction of pervasive commerce has made the demand of RFID system be higher than before.

Pervasive commerce uses tracking machines to obtain information about the regions where most of the customers can be found.

There are four different types of Radio Frequency Identification system, namely: Electronic Article Surveillance, Movable Data Capture, positioning and Networked systems respectively.

Wholesalers majorly use Electronic Article Surveillance technique to detect the movement of products within their stores (Haley, Lynne and Shai 35). Additionally, the stores are fitted with antenna readers at the door to detect the movement of the tagged products.

Portable data capture technique has movable readers hence the system can be used in a number of settings.

In Networked Systems, readers are positioned at particular areas and connected to main computers to interpret the captured data. Positioning systems are majorly used to identify movable objects like tagged vehicles.

Alternative strategies for acquiring IT applications

IT applications can be acquired in a number of ways, but there are two major strategies which can be applied in the process of obtaining these applications. Additionally, an organisation should consider a number of factors before settling on an appropriate strategy.

Remember! This is just a sample
You can get your custom paper by one of our expert writers

IT applications can be obtained through buying, a process called off-the-shelf approach. Most of the qualities needed by information technology applications can be obtained in a number of the software packages sold in the market.

Additionally, buying the software packages directly from the market is cheap and time-saving compared to that which is developed within an organisation (Rainer and Casey 398).

To ensure that the bought software packages are used for a longer period of time, an organisation should make an adequate plan before making the right decision on whether to buy their IT applications or not.

Arguably, an organisation can use a single package to run all its programs. On the other hand, purchasing many software packages is important because an organisation is able to accomplish different needs.

Buying software packages becomes inappropriate when they are not only expensive but also of low quality (Solomon 314). The other alternative strategy for acquiring IT applications is through using software-as-a-service (SaaS) method.

Organisations can obtain their software packages from a vender at a certain fee. The vender can provide an organisation with applications over the internet.

Therefore, companies or customers using the applications are not considered to be the real owners of the software packages, but only pay for the services provided by the designer packages. Through SaaS, organisations do not have to install the software packages in their computers.

This method is cheaper compared to the other alternative strategies since an organisation does not have to spend a lot of money and time in purchasing, operating and servicing the software.

We will write
a custom essay
specifically for you
Get your first paper with
15% OFF

Software Development Life Cycle (SDLC)

Software development life cycle is the step taken by an organisation to establish the most appropriate software for its business projects. The system is majorly common used by companies with large scale information technology projects.

Software development life cycle has six major steps. The first step is the investigation of the system. It provides an organisation with three alternatives. The first option is to continuously use the available system without making changes.

The second option is to make viable changes to the existing system and the last option is to develop a new system. It is important for an organisation to develop their own software as this will give them an opportunity of controlling how it should work.

Software acquired through leasing or purchasing always come with the settings of the developer hence its applications cannot be controlled by the company. An organisation can be accountable for using their developed software in case of any errors or complications.

This is contrary to the leased or purchased software packages where nobody will be held responsible for any irregularities or errors. It will be easy to effectively correct errors and irregularities when the designers of the software packages come from the company.

Consequently, the company will be able to save a lot of money which they could have spent on paying an outside technician. Additionally, their operations will not be interfered with as there will be ready technicians to handle the problems on time.

Disintermediation in e-commerce

Disintermediation in e-commerce is the removal of middlemen from the chain of distribution. This implies that consumers are able to obtain products directly from the producers. Additionally, producers do not need to sell their products through the wholesalers and retailers.

Through internet marketing services, customers can obtain products at a cheaper cost and faster than those obtained through the retailers and wholesalers (May 118).

The internet is slowly changing the system of product delivery as most of the consumers can now obtain direct information regarding the products and services of their choice. Therefore, they can make decisions on the type of goods and services to buy without the services of the middlemen.

A number of people argue that disintermediation has increased the unemployment rate across the world. Conversely, most people, especially consumers, have liked it (Steinfield 217).

Works Cited

Haley, Connie, Lynne. Jacobsen, and Shai Robkin. Radio Frequency Identification Handbook for Librarians. Westport, Connecticut: Libraries Unlimited, 2007. Print.

Hunt, D, Albert Puglia, and Mike Puglia. Rfid: A Guide to Radio Frequency Identification. Hoboken, N.J: Wiley-Interscience, 2007. Print.

May, Paul. The Business of Ecommerce: From Corporate Strategy to Technology. Cambridge: Cambridge Univ. Press, 2000. Print.

Rainer, K, and Casey G. Cegielski. Introduction to Information Systems. Hoboken, N.J: Wiley, 2011. Print.

Solomon, Michael. Security Strategies in Windows Platforms and Applications. Sudbury, Mass: Jones & Bartlett Learning, 2011. Print.

Steinfield, Charles. New Directions in Research on E-Commerce. West Lafayette, Ind: Purdue University Press, 2003. Print.

Want, Roy. Rfid Explained: A Primer on Radio Frequency Identification Technologies. San Rafael, Calif.: Morgan & Claypool, 2006. Print.

Print
Need an custom research paper on Research on Radio Frequency Identification Technology (RFID) written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2019, December 29). Research on Radio Frequency Identification Technology (RFID). https://ivypanda.com/essays/research-on-radio-frequency-identification-technology-rfid/

Work Cited

"Research on Radio Frequency Identification Technology (RFID)." IvyPanda, 29 Dec. 2019, ivypanda.com/essays/research-on-radio-frequency-identification-technology-rfid/.

References

IvyPanda. (2019) 'Research on Radio Frequency Identification Technology (RFID)'. 29 December.

References

IvyPanda. 2019. "Research on Radio Frequency Identification Technology (RFID)." December 29, 2019. https://ivypanda.com/essays/research-on-radio-frequency-identification-technology-rfid/.

1. IvyPanda. "Research on Radio Frequency Identification Technology (RFID)." December 29, 2019. https://ivypanda.com/essays/research-on-radio-frequency-identification-technology-rfid/.


Bibliography


IvyPanda. "Research on Radio Frequency Identification Technology (RFID)." December 29, 2019. https://ivypanda.com/essays/research-on-radio-frequency-identification-technology-rfid/.

Powered by CiteTotal, online citation creator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1