Wednesday, 31 January 2018

How to Write an NFC Tag

NXP TagWriter is a general NFC reader/writer application that is highly recommended and available on Google Play App store. It only has a few main features such as reading, writing, erasing, and protecting tags which makes it easy-to-use and understand even for first-time NFC users. An interesting feature on this app is the amount of options it gives you when writing a tag. 

Below are all the abilities/formats available for writing to a tag:
Business Card
Link/URL
Wi-Fi
Bluetooth
Email
Telephone Number
Geo Location
Launch an Application
Plain Text
SMS

This tutorial will show how easy using NFC technology can be. For this tutorial, you will need:

Smartphone with NFC enabled
NXP TagWriter (Free download on one of the Google Play App Store)
NFC Tag (Open, not a locked or secured tag)
Because one of the most common uses for NFC tags is to launch websites, we are going to write a Link/URL to the tag so that, when someone taps the tag with their NFC enabled smartphone/device, the phone pulls up the intended URL.

1. Open the NXP TagWriter App and tap “Write Tag”.

2. The menu will display the following options:

New dataset
My datasets
Write from CSV
Copy tag
Copy QR Code

3. Tap “New dataset”.

4. Because we are going to write a URL/Link, tap “Link”.

5. If you want to add a title for your link in the “Description” field you can; if not, leave it blank.

6. The “URL Type” should read “URL Website”.

7. Below the field “URL Website”, type in the intended URL in the field that reads “Enter Website”. NOTE: the website you enter must begin with “https://” in order to work properly.

8. The box below, “Add Tag UID (mirror)”, is a function that adds the tag’s Unique Identifier at the end of the URL to let you know how many people used that NFC tag to go to your website. This is a great function if you have multiple tags with the same URL and want to know which ones perform better than others. If you do not want this tracking ability, simply leave that box blank.

9. The box below, “Add Interaction Counter (mirror)”, is a function that adds an incrementing number to the end of the URL each time someone interacts with that tag. For example, if Person A interacts with the tag first the URL would add a “1” on the end; later, when Person B interacts with the tag, the URL will add a “2” on the end, and so on.

10. Next, tap “Save & Write”.

11. The next screen will feature your Content at the top, followed by options which are laid out and explained below.

Write multiple NFC tags (one by one) – check this box if you wish to write the same content to multiple tags one after another.
Protection – Check this box if you want your NFC tag to be protected. If you check this box a few options of varying levels of protection pop up:
Soft Protection – disables the tag from being over-written by another user; this tag can be re-written by using your erase function.
Password Protection – your tag will be read-only and could only be re-written with a password that you create. When this option is chosen, another screen will pop-up prompting you to create a password.
Lock Tag – this option makes the tag read-only and it can never be re-written. If you chose this option, triple-check your content before you write the tag.
Confirm Overwrite – this box should be selected each time you write a tag so the tag knows to delete the previous data and write the new data.
Enable Interaction Counter – you must click this box IF you added Interaction Counter (mirror) on the previous screen. This just enables the interaction counter to work.

T-Systems, Embratel Announce IoT Partnership

T-Systems, a German provider of IT solutions and services, and Brazil's Embratel have announced a partnership to offer connectivity based on the concept of the Internet of Things (IoT). The agreement will allow Deutsche Telekom Group's IoT Service Portal (already available in such markets as Europe, the United States and China) to be offered in Brazil.
As a result, T-Systems Brazil, an arm of Deutsche Telekom that offers corporate services and global information and communications technology (ICT) solutions and services, will use the network of mobile operator Claro to become a mobile virtual network operator (MVNO) early this year. "Today, every major company needs connectivity to the IoT applications they are looking to implement," says Ideval Munhoz, T-Systems Brazil's president. "Certainly, our partnership with Embratel will enable T-Systems Brazil and the Deutsche Telekom Group to bring innovative services to the Brazilian market."

"Through this partnership, T-Systems will have access to the best technology in the market," says Marcello Miguel, Embratel's executive director of marketing and business. "With Embratel's support, T-Systems will have connectivity, availability and network quality to support the IoT operations of its global customers in Brazil."

Deutsche Telekom's IoT Service Portal makes it easy for its users to operate and control real-time machine-to-machine (M2M) communications, the company reports. This allows businesses to monitor all of their M2M cards with their corresponding data plans and volumes of transmission.

In addition, users can activate, block or disable their M2M SIM cards and change their data plans and features. To control data transmission, alerts are created for each card with automatic notifications. The portal is accessible via a secure connection, and its features promise to be easily integrated with existing IT environments, thanks to application programming interfaces (APIs) that can be used automatically.

Tuesday, 30 January 2018

The 3 Phases of Building an RFID Mass Reading Application

Because UHF RFID has progressed so much since its inception, readers are able to read, on average, about 700 tags per second and interpret the data. This faster, highly efficient RFID tag read rate makes it possible for mass reading applications to emerge in several industries, most prominently in supply chain management.

A mass reading application is a simple way to describe an application that relies on reading a large volume of RFID tags, usually in a specific area within a given timespan. Applications most often fitting this description are applications within a warehouse or a high volume inventory of items within a confined space (e.g. a box).

While the capabilities exist within UHF RFID to make these applications successful, often the planning, purchasing, and set-up of equipment can be time consuming and technical in nature.

Phase I: Planning
It is necessary to start the planning stage with the specific application thoroughly vetted and a reasonable objective or known goal. Without a defined goal, the application could get off track with arbitrary ideas and end prematurely due to lack of funding or scope creep.

In mass reading applications, the goal is to read every single tag – meaning 100% (or near 100%) accuracy. Before purchasing any equipment, the first step is to map out the application area. Each area is going to be unique depending on the items tagged, the width, length, height of the area, and the number of tags in the space.

Once the overall application area has been assessed, it can then be broken down into mappable read zones in order to simplify the process and ensure that every angle is covered. Ensure that no part of a read zone is too wide or too deep so that no tags will be left out. The size of each read zone will determine the number of antennas required to cover it. Small zones, or ones requiring a proximity read, can likely be covered with a single antenna; larger zones may require two or more antennas to capture all tag reads. A few examples of mapped read zones are shown below as well as an image showing staggered zone antennas.

Phase II: Purchasing
Mass reading cannot be accomplished without carefully selecting the right RFID hardware. Below are important points to consider when purchasing the major elements of an RFID system for mass reading.

Antennas

Determining which RFID antennas to use, as well as testing them, will likely be the most time consuming part of the RFID system setup. 

Readers

The best RFID readers for this type of application are fixed, high-performance readers like the Impinj R420, ThingMagic M6, and Alien F800 – all considered workhorses in the RFID industry. 

Tags

The choice of which RFID tag to use will be affected by the material and shape of the tagged item.

Small Children Jam to NFC-Enabled Jukebox

Belgium-based technology startup MuuseLabs is marketing a Near Field Communication (NFC)-enabled music-listening system that enables young children to access songs without becoming immersed in screen-based entertainment. The Jooki—which the company describes as a jukebox for kids—is an intelligent speaker device with a built-in 13.56 MHz NFC reader and Wi-Fi functionality. The device captures the unique ID numbers of NFC-tagged figurines placed on its surface, then plays mixes of music or stories on its speaker. An app enables parents of children using the toy to set up playlists and link them to specific characters.
The smart speaker for kids was brainstormed by Theo Marescaux, the company's co-founder and CEO, following a 2013 incident with his daughters, who were then three and four-and-a-half years old, respectively. They wanted to listen to music—a specific song which he accessed with his smartphone, and which they wanted to hear again and again.

Eventually, Marescaux says, "My phone disappeared and then the kids disappeared from me as well, behind the screen." Like many parents, he adds, he wanted to keep his young children from engaging with screen-based entertainment for as long as possible. However, accessing music was proving almost impossible without a phone, tablet or computer.
Marescaux was the product manager at technology company Barco, and has a background in microelectronics engineering. With some technical knowhow on his side, he decided to develop a technology-based solution for his parenting challenge.

"It was a weekend project for me," Marescaux says, during which he built a webcam into a box, with QR codes attached to wooden blocks and some basic software to enable QR links to specific songs. With QR codes, however, "It didn't work well enough," he states. "It was too hard to align the [QR codes on] the cubes with the optical scanner." In addition, the webcam would make the product too expensive for many families. He and his company's co-founders began exploring NFC technology.

The firm installed an off-the-shelf NFC reader chip and antenna into the speaker device, then applied NFC tags to character figurines that the company developed uniquely for the toy. Each tag's unique ID is stored in the speaker system. (Marescaux declines to name the NFC product manufacturers.)

When a parent or player launches the system, he or she first downloads the Jooki app onto his or her iOS or Android device, or simply uses a computer to open the Jooki Rocks website. The user can upload audio files of music or stories, or their own recordings of themselves reading stories. The parent selects a playlist selects the character he or she wants to link to that playlist.

A child can simply pick up a particular figure and place it on the speaker. The NFC reader will capture each tag ID and forward it, via a Wi-Fi connection, to the Jooki software on its hosted server, and the system will play the music associated with the figurine. In this way, although that child's parent uses an app to enable the system, the child can access music without picking up a phone or other screen-based device.

Monday, 29 January 2018

Animal glass micro tag used for animal management

How to read and write NFC sticker by your mobile phone

RFID Antennas: Beamwidth & Directivity

Even though RFID antennas are not the brains of an RFID system, they are still complex devices that can hinder or benefit an RFID system depending on the application and chosen antenna. For instance, choosing the wrong antenna for a certain application could result in inches of read range instead of feet. Besides the basic guidelines for choosing an antenna like gain and polarization, other factors exist that could take a system’s read range and results to the next level. Beamwidth and directionality are two core principles to grasp in order to make a more informed purchasing decision.

Beamwidth
Beamwidth is defined as “the angle between two points on the same plane where the radiation falls to ‘half power’, or 3 dB below the point of maximum radiation.”¹. It can also be thought of as the peak effective radiated power of the main lobe. Most usually think of beamwidth as the horizontal angle on a radiation pattern, but there are two beamwidths – azimuth (horizontal) and elevation (vertical).

Azimuth vs. Elevation

If the antenna is on a 3D plane, like below, you will be able to accurately see the azimuth and elevation beamwidths. Understanding the azimuth and elevation beamwidths of an RFID antenna enables a person to choose the best antenna for their application. In some applications, a very wide azimuth or elevation beamwidth is needed in order to read all the tagged items lined up in, for example, a small room. In other applications, like a conveyor belt, a thinner, acute beam is better fitted. Some antenna data sheets actually show the 3D model of the azimuth and elevation beamwidths, while other manufacturers’ data sheets show 2D models. The 2D models are more basic, but are still able to clearly show the beamwidth in both planes.

Directivity
The directivity of antenna is defined as “its ability to focus in a particular direction to transmit or receive energy”¹. The way that an antenna directs its energy is a huge factor in both choosing an antenna and setting up an application. If an antenna is set up in an application and the type and radiation pattern is not known, the tagged items might not be read or be affected by absorption, diffraction, reflection, and refraction. Antennas can be grouped in two different sets based on directivity – isotropic or anisotropic, or omni-directional or directional.

Activa-ID Launches 'IoT Place' Project

Activa-ID, a subsidiary of Saint Paul Labels, has launched what it calls the IoT Place project. IoT Place, the company indicates, is intended to encourage the use of new technologies for the Internet of Things (IoT), automation and interactivity in Brazil.

According to Luciana Cabrini, Activa-ID's CEO, "IoT Place is an innovative and audacious project that brings new equipment to Brazil and builds new customized environments with RFID [radio frequency identification], M2M [machine-to-machine], IIOT [Industrial Internet of Things], IoT, Industry 4.0 and NFC [Near Field Communication], among other innovative technologies. "

The project aims to demonstrate the applications of technologies, Luciana says. "Some of the objectives that Activa-ID has been working hard to fulfill here in Brazil," she explains, "are to train integrators and to encourage software development and automation companies to develop software and middleware, in order to meet the new demand and the need to control new hardware and imported equipment."

To demonstrate technologies designed to provide traceability, communication, connectivity and the IoT, for instance, the company prepared specific rooms for each. The Smart Retail and Self-Checkout environment, for example, is based on RFID and demonstrates how to streamline item sales using radio frequency identification tags. There are also demonstrations of inventory control and an anti-theft system.

All of the technology is integrated and features Alexa, a virtual assistant that answers voice commands in English, and allows users to manage lighting, air conditioning and ambient music systems. Soon, a virtual taster will allow an individual to visualize items of clothing on his or her body, as though he or she were actually wearing them.

Another demonstration technology is Bluetooth Low Energy (BLE), by which beacons are strategically spread throughout a store. The devices will be used to share promotions regarding items displayed in the store when a user approaches those products physically. To enable this function, a customer must have installed the app from the store on his or her smartphone. "All environments use GS1 standards," Luciana states.

The initiative has several partners, including RFID technology providers Zebra Technologies and Alien Technology. It has also teamed up with RFID Moura, which provides solutions for manufacturing, logistics, retail and smart shopping; Think Asset, which offers a platform that can be integrated with automation technologies, RFID and beacons; InovaCode, which supplies an inventory solution for small and medium enterprises; TopCode, which has a system for warehouse management; and Ideas Farm, which provides systems utilizing Near Field Communications (NFC) RFID technology.

Custom NFC Tag, NFC Sticker Supplier from Chinese Factory

Sunday, 28 January 2018

How could machine learning algorithms be applied to IoT smart data?

The purpose of Internet of Things, (IoT) is to develop a smarter environment, and a simplified life-style by saving time, energy, and money. Through this technology, the expenses in different industries can be reduced. 

The enormous investments and many studies running on IoT has made IoT a growing trend in recent years. IoT is a set of connected devices that can transfer data among one another in order to optimize their performance; these actions occur automatically and without human awareness or input. 

IoT includes four main components: 
1) sensors
2) processing networks
3) analyzing data 
4) monitoring the system

The most recent advances made in IoT began when radio frequency identification (RFID) tags were put into use more frequently, lower cost sensors became more available, web technology developed, and communication protocols changed.

Smart cities' devices generate data on a continuous manner, indicating that the data gathered from traffic, health, and energy management applications would provide sizable volume. In addition, since the data generation rate varies for different devices, processing data with different generation rates is a challenge. For example, frequency of GPS sensors updating is measured in seconds while, the frequency of updates for temperature sensors may be measured hourly. Whether the data generation rate is high or low, there always exists the danger of important information loss.

Machine learning is a sub field of computer science, a type of Artificial Intelligence, (AI), that provides machines with the ability to learn without explicit programming. Machine learning evolved from pattern recognition and Computational Learning Theory. There, some essential concepts of machine learning are discussed as well as, the frequently applied machine learning algorithms for smart data analysis. (From, IOT and US Community)

Men's Clothing Store Brings RFID Intelligence to Fitting Room

Casual men's apparel brand UNTUCKit is piloting an RFID-based solution at its store on New York City's Fifth Avenue that tracks when sample shirts are tried on. The system also monitors when the sizing fits and how that compares against purchase information.
The system, known as the VISION retail platform, consists of RFID tags, readers and software provided by SATO Global Solutions, a subsidiary of SATO Holdings, as well as overhead traffic counters from RetailNext, paired with UNTUCKit's point-of-sale (POS) software. The pilot, which launched this week, may lead to a full deployment of RFID technology across all of the company's 25 stores and the additional 20 locations slated for 2018 in the United States, as well as in Toronto and London.


UNTUCKit launched in 2011 as a solution for fashion-conscious men who enjoy the comfort of keeping their shirts untucked. Although men have been moving away from tucking in their button-down shirts, the company explains, the shirts they had to work with were not made for that style trend. Aaron Sanandres, UNTUCKit's CEO, and Chris Riccobono, the company's co-founder and executive chairman, opened a business offering 15 styles of tailored shirts to be sold online. Each is designed with a contoured hemline and a tailored fit so it can be worn untucked, with a polished look.
The company served as a rallying cry, Sanandres says, for men who struggled with finding a clean, polished-looking, untucked shirt. By 2015, the business had grown enough that the founders began looking into launching brick-and-mortar stores. The firm also expanded to providing other products, such as polos and T-shirts, and by last year it was offering shirts for women as well.

The physical stores offer several benefits, Sanandres says. For one thing, many first-time buyers wanted to see and feel the fabric and try on the shirts before making a purchase. What's more, there was an added level of trust for online shoppers if they knew there were physical stores where they could view, try on or return products. But the company wanted to leverage technology to ensure that the physical stores could provide the same kind of analytics regarding shopper behavior—including products that were of interest, compared against those purchased—that online shopping could.

The Fifth Avenue location, UNTUCKit's fourth New York City-based store, will serve as its flagship site. With that in mind, Sanandres says, the company wanted to trial RFID and sensor technologies that would offer analytics data and, ultimately, a better shopping experience.

The store comes with four fitting rooms, each equipped with a UHF RFID reader from SATO, explains Brent Paulsen, UNTUCKit's managing director and head of retail. At the store's entrance, a RetailNext camera-based traffic counter is mounted on the ceiling. Approximately 50 "try-on" shirts are on display, he says, each representing a unique size and category. A UHF RFID tag is built into each shirt's label, encoded with a serialized global trade item number (SGTIN), a GS1-standard ID number linked to that shirt's stock-keeping unit (SKU) information. The SGTIN consists of a global trade item number, along with a unique product or serial number.

Thursday, 25 January 2018

Harness The Full Potential Of Your Trade Show With RFID

During a trade show, you will meet hundreds of people, take down dozens of names, and hope to come away with a few viable leads. Without any technology involved, a booth manned by one person can limit the benefits of going to the trade show in the first place. Using RFID to track all conference attendees and the booths they visited on the show floor can increase leads and information to help promote your company post-show.

USING RFID: From the Host’s Eyes
Hosting a trade show or convention encompasses months of work focused on planning every miniscule detail for the event. While some trade shows or events have no way of providing exhibitors with helpful and detailed information, RFID-enabled events offer a unique value to these exhibitors. The value-add is the ability to have attendance and attendee interest information collected. Increasing the value of a trade show can help to retain exhibitors and attract new exhibitors in the future. In turn, growing the exhibitor profile can enhance the experience and attract more attendees.

USING RFID: From the Exhibitor’s Eyes
Most companies know that trade shows are incredibly important for brand awareness and lead generation, but another important fact is that 81% of trade show attendees have buying authority1. If 81% of attendees have buying authority at a 5,000 person show, then there are 4,050 attendees that each company needs to be meeting to build those leads. Chances are an undermanned trade show booth is not going to capture all those leads within a few days. If the exhibitor is at a conference with RFID-enabled attendee tracking, lead generation can be an automated process. Depending on the trade show, the exhibitors may be given the associated email address of every attendee that stops at their booth. Alternatively, they may even have two separate email lists—one for attendees entering the booth and another for more qualified leads.

Setting up a general email list with each attendee’s email address associated with the unique EPC read in the booth would require a developer or software solution. Next, the developer can add any rules for more specific email blasts or lead information (e.g. targeted email blast is sent to all attendees that spend over 5:00 minutes inside a booth). With a hardware system and software solution in place, exhibitors are able to set up email blasts, contests, giveaways, and other lead generation techniques to promote sales.

Using the IoT as a Crystal Ball

Disasters are inevitable, no matter the industry—whether it's unexpected equipment failure, a major weather event, a security hack or some other crisis that affects business continuity, the unexpected happens every day. While we can't predict every disaster before it happens, we can be proactive in maintaining equipment health. Technology enhancements around the Internet of Things (IoT) and data analytics enable service companies to preemptively get ahead of problems, minimizing—or even averting—the impact felt by customers when disaster does eventually strike.
While it may sound simple, monitoring thousands or even millions of pieces of equipment and identifying errors before they occur is a complex science that can quickly become overwhelming. To help simplify the process, I've broken it up into two distinct phases: data collection and data analysis.

Data Collection: Understanding Which Information Matters
IoT sensors allow for large volumes of data to be collected and stored, providing companies with insight into equipment health, performance and failures. Every unit can generate hundreds of thousands of data points every minute. The challenge at this stage is to figure out how to organize and prioritize all this data. Performing data analytics on all this information is not feasible, nor is it an efficient use of resources since some of the data being collected holds little value in determining asset health.
Companies need to consider what data to prioritize so that they can more quickly identify maintenance needs. For instance, a telecommunications provider monitoring a cell tower may be tracking the volume of calls being picked up through that specific tower, but call volume is not indicative of how well that tower is performing. However, if the telco is alerted to an increase in dropped calls associated with that tower before the problem swells, they may have an opportunity to pinpoint and rectify the issue early. Now consider a massive storm that is expected to hit where this cell tower is located—being able to repair and address tower issues in advance of the storm minimizes maintenance efforts in the face of this weather disaster.

Data Analysis: Establishing Maintenance Indicators
Once data is collected and the key monitoring metrics are defined, analytics are applied in order to convert the data into actionable, useful information. Analyzing historical data, particularly around equipment failures and past service activities, allows service companies to identify patterns that might indicate a future error.

For instance, for a utilities company, temperature is one of the most widely measured parameters in a power plant because overheating can cause serious damage to equipment and can pose dangers to service professionals working to repair the equipment. By looking at past maintenance activities and patterns in temperature changes, companies have the insight needed to schedule preemptive maintenance when temperatures rise to levels that have led to failures in the past.

A 21st Century Look into the Future of Vehicle Customer Service

A car drives on the lot at a car dealership and immediately that car’s information, history, customer preferences, and almost anything else a dealership desires to see displays on the service manager’s screen. Too good to be true? Well, this is happening today in cities all around the world.

To employ such functionality requires an RFID system where the car in question utilizes an RFID windshield tag as its means of identification. Car dealerships, service stations, car washes, and many vehicle-centric companies can use RFID to drive down wait and service times, which enhances the overall customer experience. Below are a few examples of information that can be displayed when a tag is read on a vehicle:

The car’s make, model, and year.
The car’s mileage at last service.
Purchase information.
Relevant account information about the car such as owner’s name, billing information, and any automated services listed on the account for the vehicle.
Assigned account representative and/or service technician.
The date of the last reported service.
Any problems the car was experiencing at the last reported service.

RFID Antennas positioned to read a vehicle’s UHF tag on arrival (as pictured above) generally have a high gain and read range giving them the ability to read tags at different heights and speeds. An RFID system can be placed just about anywhere on a lot depending on which pieces of information are valuable to the company as well as when the company wishes to capture the information. If customer service is critical to a company, a system can be placed at the entrance to the lot and setup to read the vehicle’s tag upon entrance. Within such a system, the vehicle’s owner can be greeted by name and the vehicle’s information is already located, saving the customer time.

An RFID windshield tag or rearview mirror hang tag are the best options for vehicle customer service-based applications because these tags are tuned to be read through glass and come in convenient form factors for use on vehicles. Similar to the label placed on the windshield inside of a car after an oil change, RFID tags are adhered on the inside of a windshield. Because these tags are almost never removed from the vehicle, it is important to choose a tag that will not hinder everyday driving – windshield tags are small and rearview mirror hand tags can be easily removed.

Companies Testing IoT System When Goods Are 'On the Road'

Two companies have begun testing a new Internet of Things (IoT)-based solution from Barcoding Inc., leveraging technology from telematics provided by CalAmp that aims to fill the gaps in traditional RFID-based supply chain visibility—namely, when goods are in transit. Barcoding's Active Asset Tracker (AAT) solution employs CalAmp's sensor technology—the SC1004 sensor device and Bluetooth Low Energy (BLE) enabled iOn Tag—to allow Barcoding's customers to view, in real time, the locations and conditions of assets and cargo, even in places where RFID technology infrastructure isn't feasible.
The U.S. companies currently testing the technology are a waste-disposal organization and a high-value goods logistics company. Both firms have asked to remain unnamed.

Barcoding Inc.'s AAT solution traditionally leverages active RFID-based sensors that transmit data regarding the locations of the goods and assets to which they are attached, explains Tom O'Boyle, Barcoding Inc.'s director of RFID. The solution helps companies, such as manufacturers, logistics providers and retailers, manage the movement, storage and condition of goods passing through facilities. However, once RFID-tagged goods are loaded onto a truck, and until they are received at another location with the necessary RFID receivers or other location-based technology infrastructure, they are not visible to the software.

As a telematics company, Irvine, Calif.-based CalAmp offers solutions that capture data about shipments from smart sensor devices and tags far beyond RFID receivers. Its customers use the CalAmp solution for safety and compliance, as well as for supply chain visibility, and include pharmaceutical companies and manufacturers and retailers of perishable foods. The CalAmp SC1004 tag comes with a built-in sensor, as well as GPRS, GPS and Wi-Fi functionality, in addition to the iOn Tag's BLE feature. In that way, the device continues to forward data about its location and environment, wherever it may be, using cellular connections.

With the new solution, data transmitted by the SC1004 and iOn Tags is captured on CalAmp's SC iOn Command Portal. The software analyzes the data and reports actionable business intelligence back to the user. For instance, says Jeff Newman, CalAmp's VP of business development, the CalAmp SC1004 device can be placed inside a cargo container. When combined with the iOn Tag smart sensors at the pallet level, information including temperature and humidity, as well as shock or light, are gathered to better capture incidents, such as a fallen box or pallet, or the opening of a container (based on the presence of light).

The software stores the historical data, provides analytics and then, through integration, can forward this information to Barcoding's AAT software, which displays that data and can alert the company's management. Users, Newman says, "can create a whole set of perimeters around the cargo and create a history of environmental conditions," for instance, as well as its real-time location.
CalAmp's SC1004 and iOn Tagscan also leverage the BLE functionality to create a parent-child relationship for tagged containers, pallets and products moving through a supply chain. For instance, a "parent" SC1004 tag can be affixed inside a container, and the iOn Tags can be attached to pallets or cartons of goods loaded within that container. In that way, the parent SC1004 can forward data to the server, including the ID numbers of its child tags and the locations and conditions reported by each. If an item were removed from the container, the child iOn Tag would no longer be detected.

Tuesday, 23 January 2018

5 Examples of RFID Tool Tracking

1. Holt-Cat Tracking for Tool Maintenance
Problem: Holt-Cat’s Machine Division is in charge of maintaining tens of thousands of tools ranging in price from a few dollars up to $18,000. With 16 separate facilities in the state of Texas, the movement of these tools without proper tracking was resulting in loss of money and employee productivity.

Solution: Omni-ID UHF RFID tags on every tool and HF RFID tags on each employee badge enabled Holt-Cat’s software to read and associate the employee with the tool removed from the tool room. By using a portal-type RFID system at each entrance/exit of a tool room, Holt-Cat was able to monitor the employees and tools without adding additional processes that could have slowed down productivity.

Notable Take-away: By using an RFID tool tracking system, Holt-Cat was able to see a return on investment in less than eight months.

2. Greenville Hospital Keeping up with Expensive Equipment
Problem: The loss of expensive surgical equipment in the 90,000 square foot Greenville Hospital was resulting in lost time and money due to the time spent looking for and/or replacing equipment. The staff was experiencing the greatest amount of tool loss after usage in patients’ rooms and operating rooms.

Solution: Each hospital room is thoroughly cleaned after the patient leaves, so portal systems developed by Jamison and ThingMagic were placed in all laundry and decontamination rooms. All tools were tagged with RFID tags­, so when a tagged tool was read at a portal location, an alert was triggered to notify the staff that a tool was in the wrong location. Handheld readers deployed to staff members were designed to locate specific tagged equipment and read the usage history of each tool.

Notable Take-away: With the reduction in equipment loss and wasted time, Greenville Hospital expects a return on investment within one year and is currently expanding their system.

3. Motorola Increasing Employee Productivity
Problem: Wasted time and money spent staffing an equipment/tool room with employees in order to maintain inventory and prevent lost or stolen tools.

Solution: Pressure sensitive mats alert the RFID reader to scan the employee’s badge, which allows the employee access to the tool room. All the tools are tagged, and when the employee is leaving the room, the doorway reader and antenna system scan the employee’s badge as well as the tool’s RFID tag.

Notable Take-away: With an initial $250,000 return on investment, and growing, Motorola has seen boosted productivity, less employee hours in equipment rooms, and no equipment losses.

4. Grunnarbeid Reducing Daily Tool Deliveries by 80%
Problem: On a daily basis, Grunnarbeid has thousands of tools waiting to be delivered to different construction sites. Tools are often lost during transportation, and many man hours are wasted searching for them. As a result of the delivery delay, other employees are forced to waste time waiting for the lost tools.

Solution: All high-value tools are tagged with Omni-ID tags, and when read, the tag’s information as well as longitude and latitude (from the reader) are uploaded to the software component. Dock doors are fitted with portal systems, delivery vehicles have fixed reader systems, and the warehouse staff is provided with handheld readers.

Notable Take-away: From information gathered from the pilot program, it is estimated that Grunnarbeid will reduce daily deliveries (consisting of employee hours and company money) by 80 percent.