SlideShare a Scribd company logo
Inner RFID William Mulligan Inner RFID 11/3/09
Security, its what helps people maintain a sense of well being that they are safe at night where they sleep. It is what gives us a sense of assurance that the people we love, and the things that we work hard for are kept safe.
To maintain this security we use several different locks and keys as a measure towards safe guarding our homes and businesses. However, it is often hard to keep track of all these different keys, as well as knowing which lock goes with what key
Have you ever found yourself at a loss for your identification card to enter your dorm room, house, or place of work? It is so easy to lose things in this fast paced world. One moment you have your keys, and the next moment you’ve misplaced them. If only there was a way too keep your vital security objects on you at all times and not have to worry about losing track of them.
At Inner RFID, our goal is to help our customers never be without a way of obtaining access to their home, college building, or place of work.
To understand our business, you must first understand how RFID, radio frequency identification, security systems work.
RFID technology is applied to security applications by using the computer database to send a signal to a door to unlock when the transceiver comes into close enough contact with the correct transceiver.
This almost seems too good to be true, until you lose track of your transceiver. If you are without a spare then you are locked out of your house, work, or class. There is a need for this technology to be with us at all times, without the need to worry whether or not we have misplaced it.
 At Internal RFID, we have developed a way to make the technology seemingly one with your everyday life by joining it with you. Our technology takes the transceiver of the system, shrinks it to a size less than that of a fingernail and implants it between your thumb and index finger.
Let us assure you, we are not trying to create human cyborgs. It is a simple process that is much like getting a shot, and it is done and over with in less than twenty seconds
Internal RFID is currently only developing this technology for use in home, business, and educational security. However, we do plan on developing the interface for use in automobile use as well.  We appreciate your time, for further information please contact                 William R. Mulligan wrm653@jwu.edu
References http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=2 http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/rfid.htm http://www.rmoroz.com/rfid.html http://www.youtube.com/watch?v=Q0TzRWyWP4I http://www.youtube.com/watch?v=mr0ozY2HWdM

More Related Content

What's hot

Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless Networks
Michael Boman
 
120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012
Bindner
 
Information technology Vs Information security
Information technology Vs Information securityInformation technology Vs Information security
Information technology Vs Information security
S Periyakaruppan CISM,ISO31000,C-EH,ITILF
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1
Mel Savich
 
How your Smart Phone can control your home
How your Smart Phone can control your homeHow your Smart Phone can control your home
How your Smart Phone can control your home
cdobuilders01
 
Autumn Case Study
Autumn Case StudyAutumn Case Study
Autumn Case Study
Rachel Williams
 
Naiki Semesta Product Introduction
Naiki Semesta Product IntroductionNaiki Semesta Product Introduction
Security Awareness Training - IS Workplace Security
Security Awareness Training - IS Workplace SecuritySecurity Awareness Training - IS Workplace Security
Security Awareness Training - IS Workplace Security
Dario Ciro Vietri
 
RFID: Concept and Implementation
RFID: Concept and ImplementationRFID: Concept and Implementation
RFID: Concept and Implementation
Dominique Guinard
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Óscar Ortiz Belén
 

What's hot (10)

Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless Networks
 
120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012
 
Information technology Vs Information security
Information technology Vs Information securityInformation technology Vs Information security
Information technology Vs Information security
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1
 
How your Smart Phone can control your home
How your Smart Phone can control your homeHow your Smart Phone can control your home
How your Smart Phone can control your home
 
Autumn Case Study
Autumn Case StudyAutumn Case Study
Autumn Case Study
 
Naiki Semesta Product Introduction
Naiki Semesta Product IntroductionNaiki Semesta Product Introduction
Naiki Semesta Product Introduction
 
Security Awareness Training - IS Workplace Security
Security Awareness Training - IS Workplace SecuritySecurity Awareness Training - IS Workplace Security
Security Awareness Training - IS Workplace Security
 
RFID: Concept and Implementation
RFID: Concept and ImplementationRFID: Concept and Implementation
RFID: Concept and Implementation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Viewers also liked

It Careers
It CareersIt Careers
It Careers
Maryam A
 
Pace Brochusre Part 2
Pace Brochusre Part 2Pace Brochusre Part 2
Pace Brochusre Part 2
guestdcb540a
 
KGC (BNI) Presentation
KGC (BNI) PresentationKGC (BNI) Presentation
KGC (BNI) Presentation
JackRolfe
 
KGC Power point
KGC Power pointKGC Power point
KGC Power point
JackRolfe
 
Stock Market
Stock MarketStock Market
Stock Market
Maryam A
 
China
ChinaChina
China
Maryam A
 
Val av plattform
Val av plattformVal av plattform
Val av plattform
Kerstin Namuth
 
ban tin sitto viet nam so 16
ban tin sitto viet nam so 16ban tin sitto viet nam so 16
ban tin sitto viet nam so 16
Theerapong Ritmak
 
The ABCs of Webinar success: Building the Bridge to Sales Growth
The ABCs of Webinar success: Building the Bridge to Sales GrowthThe ABCs of Webinar success: Building the Bridge to Sales Growth
The ABCs of Webinar success: Building the Bridge to Sales Growth
360 Thought Leadership Consulting
 
Leveraging the Right Social Media and Digital Marketing Channels to Drve Growth
Leveraging the Right Social Media and Digital Marketing Channels to Drve GrowthLeveraging the Right Social Media and Digital Marketing Channels to Drve Growth
Leveraging the Right Social Media and Digital Marketing Channels to Drve Growth
360 Thought Leadership Consulting
 
Walmart
WalmartWalmart
Walmart
Maryam A
 
Raising Your Cash IQ to Optimize Working Capital - FINAL
Raising Your Cash IQ to Optimize Working Capital - FINALRaising Your Cash IQ to Optimize Working Capital - FINAL
Raising Your Cash IQ to Optimize Working Capital - FINAL
360 Thought Leadership Consulting
 
Subway[1]
Subway[1]Subway[1]
Subway[1]
Maryam A
 
Discovering the Strategic Gold of Effective T&E Expense Management
Discovering the Strategic Gold of Effective T&E Expense ManagementDiscovering the Strategic Gold of Effective T&E Expense Management
Discovering the Strategic Gold of Effective T&E Expense Management
360 Thought Leadership Consulting
 
Jungle Safari Miniature Golf
Jungle Safari Miniature GolfJungle Safari Miniature Golf
Jungle Safari Miniature Golf
Maryam A
 
LaGracia Design | Salon tracker Unilever
LaGracia Design | Salon tracker UnileverLaGracia Design | Salon tracker Unilever
LaGracia Design | Salon tracker Unilever
La Gracia Design
 
Steve Jobs
Steve JobsSteve Jobs
Steve Jobs
Maryam A
 
Impact Of E Commerce On Business
Impact Of E Commerce On BusinessImpact Of E Commerce On Business
Impact Of E Commerce On Business
Maryam A
 

Viewers also liked (18)

It Careers
It CareersIt Careers
It Careers
 
Pace Brochusre Part 2
Pace Brochusre Part 2Pace Brochusre Part 2
Pace Brochusre Part 2
 
KGC (BNI) Presentation
KGC (BNI) PresentationKGC (BNI) Presentation
KGC (BNI) Presentation
 
KGC Power point
KGC Power pointKGC Power point
KGC Power point
 
Stock Market
Stock MarketStock Market
Stock Market
 
China
ChinaChina
China
 
Val av plattform
Val av plattformVal av plattform
Val av plattform
 
ban tin sitto viet nam so 16
ban tin sitto viet nam so 16ban tin sitto viet nam so 16
ban tin sitto viet nam so 16
 
The ABCs of Webinar success: Building the Bridge to Sales Growth
The ABCs of Webinar success: Building the Bridge to Sales GrowthThe ABCs of Webinar success: Building the Bridge to Sales Growth
The ABCs of Webinar success: Building the Bridge to Sales Growth
 
Leveraging the Right Social Media and Digital Marketing Channels to Drve Growth
Leveraging the Right Social Media and Digital Marketing Channels to Drve GrowthLeveraging the Right Social Media and Digital Marketing Channels to Drve Growth
Leveraging the Right Social Media and Digital Marketing Channels to Drve Growth
 
Walmart
WalmartWalmart
Walmart
 
Raising Your Cash IQ to Optimize Working Capital - FINAL
Raising Your Cash IQ to Optimize Working Capital - FINALRaising Your Cash IQ to Optimize Working Capital - FINAL
Raising Your Cash IQ to Optimize Working Capital - FINAL
 
Subway[1]
Subway[1]Subway[1]
Subway[1]
 
Discovering the Strategic Gold of Effective T&E Expense Management
Discovering the Strategic Gold of Effective T&E Expense ManagementDiscovering the Strategic Gold of Effective T&E Expense Management
Discovering the Strategic Gold of Effective T&E Expense Management
 
Jungle Safari Miniature Golf
Jungle Safari Miniature GolfJungle Safari Miniature Golf
Jungle Safari Miniature Golf
 
LaGracia Design | Salon tracker Unilever
LaGracia Design | Salon tracker UnileverLaGracia Design | Salon tracker Unilever
LaGracia Design | Salon tracker Unilever
 
Steve Jobs
Steve JobsSteve Jobs
Steve Jobs
 
Impact Of E Commerce On Business
Impact Of E Commerce On BusinessImpact Of E Commerce On Business
Impact Of E Commerce On Business
 

Similar to Inner RFID

Rfid Blocker Wallet
Rfid Blocker WalletRfid Blocker Wallet
Rfid Blocker Wallet
Nor Azri Nor Hashim
 
Zahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptxZahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptx
Zahida26
 
NewDVR(S)- The Worldwide IOT Based Security System Merchant
NewDVR(S)- The Worldwide IOT Based Security System  MerchantNewDVR(S)- The Worldwide IOT Based Security System  Merchant
NewDVR(S)- The Worldwide IOT Based Security System Merchant
NewDVR(S) Pte Ltd
 
Winferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno: Protecting Personal Information
Winferno: Protecting Personal Information
Winferno
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
Charles Klondike
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
Mustafa Kuğu
 
RFID Tracking Tags
RFID Tracking TagsRFID Tracking Tags
RFID Tracking Tags
Track Seal
 
Enterprise Workflow Management System
Enterprise Workflow Management SystemEnterprise Workflow Management System
Enterprise Workflow Management System
NewDVR(S) Pte Ltd
 
How Can You Preserve Your Virtual Security in 2022 Arizona Attorney Aaron Ke...
How Can You Preserve Your Virtual Security in 2022  Arizona Attorney Aaron Ke...How Can You Preserve Your Virtual Security in 2022  Arizona Attorney Aaron Ke...
How Can You Preserve Your Virtual Security in 2022 Arizona Attorney Aaron Ke...
Aaron Kelly Lawyer
 
Wireless home security
Wireless home securityWireless home security
Wireless home security
morlesharma
 
Narrowband-IoT (NB IoT) Smartlock Presentation
Narrowband-IoT (NB IoT) Smartlock PresentationNarrowband-IoT (NB IoT) Smartlock Presentation
Narrowband-IoT (NB IoT) Smartlock Presentation
Digital Keys
 
Detective Privado - Detctive Privado Argentina on Srinvestigador
Detective Privado - Detctive Privado Argentina on SrinvestigadorDetective Privado - Detctive Privado Argentina on Srinvestigador
Detective Privado - Detctive Privado Argentina on Srinvestigador
Gig Fivers
 
Time attendance machine
Time attendance machineTime attendance machine
Time attendance machine
ZKTecoWA
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
vicenteDiaz_KL
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITY
SecureData Europe
 
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
Rupesh Verma
 
sanfranAIG3
sanfranAIG3sanfranAIG3
RFID
RFIDRFID
RFID
marchawes
 
How Safety Alarms and Methods Help to Combat Crime
How Safety Alarms and Methods Help to Combat CrimeHow Safety Alarms and Methods Help to Combat Crime
How Safety Alarms and Methods Help to Combat Crime
larsondunigan
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
OMNIRISC SECURITY SERVICES
 

Similar to Inner RFID (20)

Rfid Blocker Wallet
Rfid Blocker WalletRfid Blocker Wallet
Rfid Blocker Wallet
 
Zahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptxZahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptx
 
NewDVR(S)- The Worldwide IOT Based Security System Merchant
NewDVR(S)- The Worldwide IOT Based Security System  MerchantNewDVR(S)- The Worldwide IOT Based Security System  Merchant
NewDVR(S)- The Worldwide IOT Based Security System Merchant
 
Winferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno: Protecting Personal Information
Winferno: Protecting Personal Information
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
RFID Tracking Tags
RFID Tracking TagsRFID Tracking Tags
RFID Tracking Tags
 
Enterprise Workflow Management System
Enterprise Workflow Management SystemEnterprise Workflow Management System
Enterprise Workflow Management System
 
How Can You Preserve Your Virtual Security in 2022 Arizona Attorney Aaron Ke...
How Can You Preserve Your Virtual Security in 2022  Arizona Attorney Aaron Ke...How Can You Preserve Your Virtual Security in 2022  Arizona Attorney Aaron Ke...
How Can You Preserve Your Virtual Security in 2022 Arizona Attorney Aaron Ke...
 
Wireless home security
Wireless home securityWireless home security
Wireless home security
 
Narrowband-IoT (NB IoT) Smartlock Presentation
Narrowband-IoT (NB IoT) Smartlock PresentationNarrowband-IoT (NB IoT) Smartlock Presentation
Narrowband-IoT (NB IoT) Smartlock Presentation
 
Detective Privado - Detctive Privado Argentina on Srinvestigador
Detective Privado - Detctive Privado Argentina on SrinvestigadorDetective Privado - Detctive Privado Argentina on Srinvestigador
Detective Privado - Detctive Privado Argentina on Srinvestigador
 
Time attendance machine
Time attendance machineTime attendance machine
Time attendance machine
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITY
 
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
 
sanfranAIG3
sanfranAIG3sanfranAIG3
sanfranAIG3
 
RFID
RFIDRFID
RFID
 
How Safety Alarms and Methods Help to Combat Crime
How Safety Alarms and Methods Help to Combat CrimeHow Safety Alarms and Methods Help to Combat Crime
How Safety Alarms and Methods Help to Combat Crime
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Inner RFID

  • 1. Inner RFID William Mulligan Inner RFID 11/3/09
  • 2. Security, its what helps people maintain a sense of well being that they are safe at night where they sleep. It is what gives us a sense of assurance that the people we love, and the things that we work hard for are kept safe.
  • 3. To maintain this security we use several different locks and keys as a measure towards safe guarding our homes and businesses. However, it is often hard to keep track of all these different keys, as well as knowing which lock goes with what key
  • 4. Have you ever found yourself at a loss for your identification card to enter your dorm room, house, or place of work? It is so easy to lose things in this fast paced world. One moment you have your keys, and the next moment you’ve misplaced them. If only there was a way too keep your vital security objects on you at all times and not have to worry about losing track of them.
  • 5. At Inner RFID, our goal is to help our customers never be without a way of obtaining access to their home, college building, or place of work.
  • 6. To understand our business, you must first understand how RFID, radio frequency identification, security systems work.
  • 7. RFID technology is applied to security applications by using the computer database to send a signal to a door to unlock when the transceiver comes into close enough contact with the correct transceiver.
  • 8. This almost seems too good to be true, until you lose track of your transceiver. If you are without a spare then you are locked out of your house, work, or class. There is a need for this technology to be with us at all times, without the need to worry whether or not we have misplaced it.
  • 9. At Internal RFID, we have developed a way to make the technology seemingly one with your everyday life by joining it with you. Our technology takes the transceiver of the system, shrinks it to a size less than that of a fingernail and implants it between your thumb and index finger.
  • 10. Let us assure you, we are not trying to create human cyborgs. It is a simple process that is much like getting a shot, and it is done and over with in less than twenty seconds
  • 11. Internal RFID is currently only developing this technology for use in home, business, and educational security. However, we do plan on developing the interface for use in automobile use as well. We appreciate your time, for further information please contact William R. Mulligan wrm653@jwu.edu
  • 12. References http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=2 http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/rfid.htm http://www.rmoroz.com/rfid.html http://www.youtube.com/watch?v=Q0TzRWyWP4I http://www.youtube.com/watch?v=mr0ozY2HWdM