A turnkey system, it includes tracking software, handheld scanner technology, wireless access points, industrial bar codes, radio frequency identification chips and training and implementation services.
Globe and Mail (2004)
At the edge of the network, wireless access is becoming an expected feature.
Computing (2010)
Another customer discovered a rogue wireless access point had allowed a hacker access to sensitive records.