Hot news

Radiant RFID

Current RFID Articles

Video: Radiant RFID's Software Platform

 

Did you know Radiant's platform extends beyond RFID? Our customers use RFID technolgies and others, such as GPS and Bluetooth Low Energy, to keep track of a wide variety of assets - from valves and pipes to servers and IT devices to vehicles and rig components! Learn more about Radiant RFID's software platform in this brief overview video.

 

 

A Platform that Scales with Solutions that Deliver - Infographic

 

Radiant platform

"Behind the scenes" of Radiant's web portal and business applications lies the Radiant Platform, a multi-faceted software engine that determines what and how data is delivered to customers. It turns raw data into business intelligence.

 

Because many customers use a combination of technologies to gain insight into different types of assets, the platform was designed to scale quickly and easily. We can add new types of devices to the reader/device network in days and weeks versus months. For example, the robustness of the platform’s architecture made adding Bluetooth Low Energy technology a relatively fast process. In addition to passive RFID, the platform has scaled to support BLE, GPS and of course, barcode.

 

Once data is received into the platform, the software layers translate and deliver the right information to the right people. Modules are the business applications that address specific customer problems – tracking assets (VAT) vs. event-based mass evacuations (Equis and AHRN), for example. Modules utilize a common platform.

 

A Reporting layer pushes data to customers based on rules that they define. This comes in the form of report subscriptions initiated by triggers, push notifications and alerts for events, and custom notifications. Finally, customers interact with their data using modern tools, including a cloud-based web interface and iOS & Android apps for smart devices.

 

The Radiant team of software and hardware developers is dedicated to innovation, especially in driving our products to deliver meaningful data in modern, easy-to-use ways. The Radiant Platform makes this possible. In the meantime, stay tuned for our Apple Watch interface coming December 2016!

 
To learn more about technology-based asset tracking, go to http://www.radiantrfid.com/asset-tracking.html or contact us

 

Choosing The Right RFID Tags for The Right Assets

From Selection to Delivery: Our 7-Step Process

 

passive rfid tags radiantDid you know that there are thousands of RFID tags in the marketplace today? From basic label tags to specialty applications, manufacturers and converters across the globe are offering passive, semi-passive, active, and battery-assisted RFID tags.

At Radiant, our breadth of RFID engineering experience means the right tags for the right assets. During the sales process, we investigate customer requirements in great detail and then present options based on performance, aesthetics, and size.

What Drives RFID Tag Pricing? Not suprisingly, tag pricing is primarily driven by order volume. For example, on most assets in a corporate or university environment, a customer can utilize one to two types of tags, thereby increasing the volume per order and reducing costs. Most often we can purchase tags through partnerships for less than MSRP and pass the savings on to our customers.

TagTesting-RFIDWith edge-case assets such as DNA samples, radios, microscopes, valves, containers, etc., our R&D expertise benefits customers by bringing a proven, successful tag to their environment.

At our in-house Solution Center, we use RFID testing equipment to independently verify that the manufacturer's specifications will meet our customers' use cases. This knowledge enables customers to fully understand which two or three tags out of thousands available work for their unique applications and environments.

rfid tag quality process

After our customers have selected tags, we negotiate price, advise and ensure quality tag design, then process tags through our extensive Quality Assurance process before delivering them to the customer.
 
To learn more about RFID asset tracking, go to http://www.radiantrfid.com/asset-tracking.html or contact our Sales Team at This email address is being protected from spambots. You need JavaScript enabled to view it. .

 

Video: Virtual Asset Tracker Overview

 

Did you know that VAT can seamlessly integrate with ERP systems such as Oracle, SAP, Sage, Banner, PeopleSoft, and more? Many of our customers appreciate the reliability and visibility that VAT brings to their existing enterprise systems. While others offer ERP integration through manual data import and export, VAT's API automates data flow between our software and yours  - on your timetable. If you're considering RFID technology to reduce labor and errors while increasing visibility, it’s helpful to understand how the software component of an RFID solution handles data flow. Following is an overview of VAT’s advanced capabilities:

 

 

Security in the Radiant Cloud

icoAssetTracking

Were you affected by the Heartbleed virus? Although the numbers of people negatively impacted are still being accounted for, many of us received password reset requests from large institutions like banks, online stores, and subscription services where we regularly do business.

Over the last 10 years, software has steadily moved to the “cloud”. With this great convenience comes the occasional reminder that systems aren't always perfect 100% of the time.

At Radiant, security of our customers' confidential data is a key priority. Our applications leverage the most complete data security protocols to ensure secure data transfer and storage for our customers. Following are just some of the assurances our hosted customers can rely on:


security-cloud

  • Production systems are hosted on Amazon EC2 in a VPC environment
  • Database systems are never directly accessible for external systems or users
  • Intrusion Detection System (IDS) is employed to monitor connections in the application environment
  • Authorization checks are performed for all actions that create, read, update, or delete data
  • Application credentials such as API keys are generated manually
  • SSL is utilized on all network connections
  • Privileged operations (admin, operators) are logged
  • Confidential data such as passwords is always stored encrypted
  • Backups are stored off-site


We will always strive to offer our customers the latest, most secure software and hardware. That being said, if “password” is your password, you may want to visit the Google Safety Center for a quick refresher on maintaining personal security in today’s cloud. 

 

Ready to learn more? Tell us a little about your asset tracking and management challenge, and we will follow up.