BEYOND THE BARCODE Beyond the Barcode.

Slides:



Advertisements
Similar presentations
Configuration management
Advertisements

1 Survey Technology. Data Collection Tools Available in the Market 1. Paper Survey 2. Smart Paper 3. Cell Phones 4. Personal Digital Assistants - PDAs.
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
BarCodes. In 1973 the grocery industry established a standard method for the identification of products using printed bar codes, now known as the Universal.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
Jewelry Inventory Management Software Your Logo Here Welcome to a demonstration of Del Mar Data Systems Jewelry Inventory Management.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
AutoID Automatic Identification Technologies at the MIT Media Lab Gregory Chittim – ES 112 – 03S.
R adio F requency Id entification Ta’Tyana McElroy Jeffrey Tuma.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
Barcoding in the supply chain
Project “Sea and Air Container Track and Trace Technologies: Analysis and Case Studies” TPT 01/2002T DRAFT FINAL REPORT.
RFID tagging Stephanie Allen, Gina Calcaterra, Michael Gray, Rahul Nair, Sumit Pahwa, Edward Robertson MGT 6772.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
RFID in the postal logistics
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Developing RFID Application In Supply Chain
Overview  What is RFID?  How to use it?  Relevant links  Future Trends  Bibliography.
ICT in Organisations. ICT used in Sales Customer Databases Computerised order systems Analysis of sales patterns and trends.
The Influential Role Of Information Technology In SCM Prepared By : Inas M. Srour Arwa El Masri Arwa El Masri Zeiad Ramadan Zeiad Ramadan Supervised By:
Clifford Poulard Team C – Cliff Po
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
Trends in apparel supply chain management. Supply chain Supply chain consists of all the parties involved directly or indirectly in fulfilling a customers.
مدیریت تولید پیشرفته جلسه پنجم : Introduction: CIM, RFID
EPC Standards EPC System elements : EPC Coding structure The reader/ tag Protocols Savant platform The Object Numbering Service (ONS) PML server.
RFID Myths, Facts and Reality. What is RFID? Radio frequency identification or RFID Generic term for technologies that use radio waves to automatically.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
Lesson Title: EPCglobal and ISO/IEC Item Management Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Computer Basic Vocabulary
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
Break Even Analysis.
Integrated Logistics Scenarios April 15, Integrated Logistics Scenarios 2005 RosettaNet. All Rights Reserved. Synergy of Integrated Standards.
Information Systems in Organizations 4.1 Supply Chain Management Systems.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
An essential part of any business is being able to track inventory and sales. In order for a business to be successful, the inventory control system must.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
Understanding Different Types of Website Monitoring Services.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
BUSINESS 1 Marketing in a Changing World: Creating Customer Value and Satisfaction.
DATABASE’S Dave McDonald Student No /05/2016 Unit 10 task 1.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Components of Computer. Memory Unit Most important part of the computer Used to store data and instructions that are currently in use Main memory consists.
Databases and Database User ch1 Define Database? A database is a collection of related data.1 By data, we mean known facts that can be recorded and that.
UNIT C The Business of Fashion
UNIT C The Business of Fashion
English for Advance Learners I
Database Fundamentals
Ishaque P K Electronics & Communication S3, Roll No 38
Designing a Production Plan
Radio Frequency Identification (RFID)
MARKETING DEFINING THE MARKET MARKET SEGMENTS MARKETING MIX
History of compiler development
Open Minds ESL Electronic Shelf Label
Database Fundamentals
What is Price? What is Unit Comparison? (Give an example)
Compiler Construction
Teaching slides Chapter 8.
Information Systems in Organizations 4
Crossing the Chasm Toward RFID and Bar Code Co-existence
Types and components of a computer system
Teaching slides Chapter 6.
Automatic Identification and Data Collection Technology
Database Fundamentals
RFID (Radio-Frequency Identification)
Presentation transcript:

BEYOND THE BARCODE Beyond the Barcode

Introduction The radio tag, a technology that is capable of tracking objects in real-time The technology has been around for decades, but had never managed to penetrate the consumer market yet. Why? Just too expensive. There are hopes that when the price barrier is finally broken, communication between tag, and manufacturer databases could be achieved allowing for production on demand. With these radio tags, huge supply chains evolve into intelligent and self-maintaining entities. Beyond the Barcode

Penny Barrier The cost of production for such radio tags will not be cheap Once the barrier has been broken, bar codes will become the thing of the past Beyond the Barcode

Penny Barrier Bar Code drawbacks: Though it is cheap, bar code only identify the classes of products. Where else the radio tag can assign each individual item a unique identity Bar codes have to be scanned at certain orientations, where else radio tags only need to be within the range of the reader Beyond the Barcode

Penny Barrier Radio Tag drawbacks: As before mentioned to main reason why radio tags are not used commercially is because of its high cost Manufacturers want the cost to go below a dollar The high cost comes from the silicon chip, antenna and metal coil Beyond the Barcode

Penny Barrier After some research, a method known as capacitive coupling was used It works not by magnetic forces like previous tags, but uses electrostatic charges emitted by the reader. Carbon ink was used instead of the metal coil which was the cost driver of the previous design This allowed the price to drop below 50 cents Beyond the Barcode

Penny Barrier Motorola’s ‘capacitive coupling’ radio tag Beyond the Barcode

Range Issues Motorola released the first capacitive coupling radio tag Unfortunately, it’s low range didn’t make it practical, at 1cm. Higher cost tags had ranges up to 5m but price was a limiter Even so, some companies still go for the more expensive tags, to reduce profit lost due to stolen, lost, or spoiled goods. They can monitor their goods closely, with these tags Beyond the Barcode

Range Issues The radio tag helps to create more realistic picture of how products through the supply chain in the real world Beyond the Barcode

Online linking and EPC Researchers at MIT’s Auto-ID center are attempting to develop a system that will in future, enable manufacturers to monitor products as well as update product information when necessary. The system consists of three entities: - Electronic Product Code - Object Naming Service - Product Markup Language Beyond the Barcode

Online linking and EPC Electronic Product Code (EPC): Consists of: 8-bit header, 2 sets of 24 bits identifying manufacturer and product type, and a 40-bit serial number. These combined give trillions upon trillions of different possible identities to identify objects with. Beyond the Barcode

Online linking and EPC Object Naming Service: When the product containing EPC is read, the information goes to this service. The system then directs the information to the manufacturers server address. Beyond the Barcode

Online linking and EPC Product Markup Language: In the not so distant future, files written in this format will contain vital information about the product. Instructions can be put in and dynamic data files can keep track of physical changes to the product. Beyond the Barcode

Get personal The uses for this technology are endless. Users can take a mobile reader in a supermarket and retrieve particular information about the product. Household items like fridges could auto-notify the user what item in the fridge is running low etc. Beyond the Barcode

But, are we ready? Privacy becomes a main issue. Do we really want our buying habits to be so closely monitored? Accumulation of such data will give manufacturers a detailed record of our lifestyles. Beyond the Barcode

Conclusion No doubt, this is an interesting piece of technology, but we currently do not have the infrastructure to support it. Privacy may not be such a big problem after all, since EPC only monitors products, and not the people using them. Hopefully, with further refinement and development, this technology could be successfully implemented in the not so distant future. Beyond the Barcode

:|END|: Beyond the Barcode