{"id":1450,"date":"2005-09-13T00:00:00","date_gmt":"2005-09-13T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/09\/13\/cisco-making-rfid-play\/"},"modified":"2021-12-30T11:39:25","modified_gmt":"2021-12-30T11:39:25","slug":"cisco-making-rfid-play","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/09\/13\/cisco-making-rfid-play\/","title":{"rendered":"Cisco Making RFID Play"},"content":{"rendered":"<p>Cisco Systems unveiled plans to offer integrated RFID capabilities for its switches and routers. Cisco made its announcement at the EPCglobal US Conference 2005, a confab for Electronic Product Code (EPC) and RFID technology being held this week in Atlanta.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On the product front, Cisco is rolling out Application Oriented Network (AON) for RFID, a module that embeds RFID middleware functions into Cisco data center switches and branch office routers.  In the data center, it offers data authentication, additional filtering and aggregation, as well as application protocol bridging, according to the statement.<\/p>\n<p>Cisco&#8217;s AON technology, unveiled in June, aims to better integrate applications with the networks they ride on by reading the messages that flow between applications and basing networking decisions on their content.  The vendor has also added RFID services to its lineup, including network readiness assessments, pilot services and production implementation support.  Other new offerings include planning and design services around the vendor\u2019s 2700 Wireless Location Appliance, a product line introduced earlier this year that tracks up to 1,500 Wi-Fi-enabled RFID tags over the WLAN. <\/p>\n<p>http:\/\/www.networkingpipeline.com\/news\/170702955<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1450","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1450"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1450\/revisions"}],"predecessor-version":[{"id":3937,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1450\/revisions\/3937"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}