Feeds

Cattle branding comes to the 21st Century

High-tech tattoo more than a pretty picture

Next gen security for virtualised datacentres

Somark Innovations, a small company working out of Saint Louis, has successfully tested an RFID tattoo, on cows, mice and rats: enabling an identifying number embedded under the skin to be read from over a meter away.

Implanting identification numbers into animals is nothing new: in the UK pets travelling abroad, and returning, must have an identification chip inside them, but these are expensive and relatively large (12mm by 2mm in diameter), and the readers have a very restricted range.

The system developed by Somark uses an array of needles to quickly inject a pattern of dots into each animal, with the pattern changing for each injection. This pattern can then be read from over a meter away using a proprietary reader operating at high frequency.

Traditional radio frequency identification (RFID) technologies use tags stapled to the ears of animals, but these are much more expensive and have a habit of tearing out too, which is unpleasant for the animal as well as inconvenient for the farmer. The systems currently used for pets are internal, so can't tear out, but are much more expensive again.

Somark are in the process of raising money to exploit the technology, and point out that what works for animals can, of course, also work for people; identifying Military Personnel as one of their secondary markets, after cattle and other livestock.

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.