Feeds

Aircraft boneyard gets tagged

RFID, but not as you know it

Reducing security risks from open source software

The US Air Force is adopting RFID tagging to track tools and aeroplane parts around the aircraft storage and maintenance area at Davis-Monthan Air Force Base in Arizona, but with a site of 110 million square feet traditional tags won't give you much of a location.

RFID is normally used for ranges around 10cm, which would make the technology impractical on a site of this size. But by combining RFID, GPS and Wi-Fi, Redwood-based Aeroscout reckons it can track any component or tool down to within few meters - providing real-time tracking and a central database showing where everything is.

As the RFID Journal reports, Aeroscout won't be tracking every hammer and spanner. The tags being used are about 12cm x 7cm and 3.5cm thick, but they incorporate a GPS receiver as well as Wi-Fi and RFID identification and a motion sensor. The premise is that if a tag can see at least three of the 42 Wi-Fi access points already deployed around the site then it will triangulate its position using those, otherwise it will check the GPS and report its position and RFID identifier. What's more, it will only do so after being moved, saving a good deal of battery life.

GPS might seem to be the only necessary solution, but with parts of the site indoors and the odd aircraft wing getting in the way there's a fair chance of not getting a satellite fix.

With 4,400 aircraft at the site there are lots of wings under which equipment can be left and lots of time wasted looking for this equipment. When the system goes live in January only 1000 of the most frequently lost and valuable items will be tagged, but plans are already underway to expand that number and get everything tagged. After all, there's nothing more embarrassing than losing a B-52 or similar. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.