{"id":1416,"date":"2005-05-04T00:00:00","date_gmt":"2005-05-04T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/04\/cisco-combines-rfid-location-tools-with-wi-fi\/"},"modified":"2021-12-30T11:39:20","modified_gmt":"2021-12-30T11:39:20","slug":"cisco-combines-rfid-location-tools-with-wi-fi","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/04\/cisco-combines-rfid-location-tools-with-wi-fi\/","title":{"rendered":"Cisco Combines RFID Location Tools With Wi-Fi"},"content":{"rendered":"<p>The Wireless Location Appliance 2700 is a $14,995 1U box that integrates RFID tagging with 802.11 access points, enabling ways for central managers to locate and control assets.  The system can be used in conjunction with voice-over-IP infrastructure, but works best when VoIP has been extended to a voice-over-Wi-Fi environment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cisco Systems Inc. showed off the first fruits of its recent Airespace Inc. acquisition at the Interop show, and the company opted for a more clever integration of tools than a simple rebranding.<\/p>\n<p>Cisco is initially targeting health-care networks to use the locator system to monitor hospital and clinic equipment.<\/p>\n<p>One location system is used for each central enterprise site where aggregation and network policy enforcement is required.  Wi-Fi access points gather received signal strength indicators (RSSI) from 802.11 devices and tags, and Cisco Lightweight Access Point Protocol (LWAPP) controllers serve to aggregate RSSI information.  Sun said the location appliance could, in theory, be integrated with an LWAPP controller, with a Layer 3 switch or an enterprise router, though some customers may want to independent 1U appliance to remain physically separate from these network elements.<\/p>\n<p>Cisco has developed a rich color asset mapper for the WCS software, with mapped assets displayed on a graphic user interface through RFID information collected by the 2700 appliance.<\/p>\n<p>http:\/\/informationweek.com\/story\/showArticle.jhtml?articleID=162101504<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1416","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1416"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1416\/revisions"}],"predecessor-version":[{"id":3903,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1416\/revisions\/3903"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}