1 / 37

Computers in Libraries, March 15, 2005

Computers in Libraries, March 15, 2005. The Future Library – Now! RFID Technology. Contact Information. Chicago State University LIS2 (Library and Information Services Learning and Instructional Services) Connie Haley chaley@csu.edu http://library.csu.edu/cil2005. Objectives.

shayla
Download Presentation

Computers in Libraries, March 15, 2005

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computers in Libraries, March 15, 2005 The Future Library – Now! RFID Technology

  2. Contact Information Chicago State University LIS2 (Library and Information Services Learning and Instructional Services) Connie Haley chaley@csu.edu http://library.csu.edu/cil2005

  3. Objectives • How to manage the RFID project • How to select a vendor • Components of the RFID technology • RFID standards • Advantages of implementing RFID technology in your library • Disadvantages of implementing RFID technology in your library

  4. Radio frequency identification (RFID) technology is the utilization of a tag, a reader with an application to communicate information from a single bit to several kilo-bytes over the airwaves. What is RFID Technology

  5. How to Manage the RFID Project • Needs Assessment • Project Approval • Project Design • Project Planning • Equipment Ordering • Conversion Training • Staffing and Scheduling • Project Evaluation

  6. Needs Assessment • Establishing purpose of the project • Staff shortage • Tight budgets • Excellent services • Anticipated circulation increase, such as a new library • Labor intensive process • Becoming knowledgeable about RFID technology, market, and environment • Identifying resources, sources of information

  7. Project Approval • Determine approval dates/times • Engage support of authorities • Produce documents and make presentations as needed • Address patron privacy issues

  8. Project Design • Exploring project ideas • Generating project ideas – contact vendors and RFID libraries, vendor demo, field trips, RFP, etc. • Prioritizing ideas • Insuring measurable outcomes • Focus on action plan

  9. Project Planning • Coordination –circulation, cataloging, media services, other projects(such as ARS,bc, weeding, bindery), selectors, and department heads. • Reports for planning, such as volumes of each selector or format, oversize books, etc. • Reports for weeding • Tasks – conversion, shelf-reading,etc. • Budgeting • Equipment, maintenance, volumes • Labor (staff, volunteer, outsource-see also Staffing and Scheduling), wages, rate of conversion • Prioritizing – which format starts first • Supervision – periodic checking for quality • Gantt chart

  10. Equipment Ordering • Price quotes - Price comparison • Negotiation – such as returning defective tags • Ordering – buying vs. leasing, storage area • Profiling – location information • Testing – RFID and ILS SIP2, RFIDand ARS • Technical support – library and vendor

  11. Staff Training • Vendor’s video • Presentation • Hands-on training • Questions and answers • Weekly meeting • Party

  12. Staffing and Scheduling • Hiring see Project Planning • Rate – tags/hour • Schedule sheet

  13. Project Evaluation • Evaluation objectives - Success (deadlines, accuracy) - Procedures - Efficiency • Techniques - Interview - Case study - Documentation of procedures

  14. How to Select a Vendor • Vendors • Criteria to Select a Vendor • Why did we Select Integrated Technology Group (ITG)

  15. Vendors • 3M • CheckPoint • Luctron’s Biblioteca • Tech Logic • VTLS • Integrated Technology Group - Vernon

  16. Criteria to Select a Vendor • Vendor’s viability • Services - Customer Services - Technical Services - Other such as warranty • Price - Tags - Equipment - Maintenance - Rewarding programs • Products - A complete chain of products - Standards used on current products - Strategies for future products

  17. Why did we Select ITG • Good reputation • A decade of experience • Excellent customer and technical services • Competitive price • Rewards Program • Contributed to the ISO 18000 • Reader reads multiple standards. • Security gates operates multiple standards. • Excellent customer services and technical support • Multiple modes – RFID, bar code, and/or magnetic strip • Satisfaction

  18. Tags Readers Applications - Interface Circulation stations Self-check stations Conversion stations Applications Shelf reading (inventory, search, identifying mis-shleved items) - Security gates - Automated check-in and sorting stations Components RFID Technology

  19. Tags • A tag is also known as a transponder with a silicon chip and an antenna

  20. More …Tags • Two types of tags: active and passive - Active tags have their own battery power to transmit a signal. Such as Ipass, tracking shipments in the War. - Passive tags have a tiny semiconductor that “wakes up” when a radio frequency passes over it. • Four type of RF tags: - Low frequency 125-134.5 KHz - High frequency 13.56 MHz - Ultra HF 868-956 MHz - Microwave 2.45 GHz • Tags used in libraries are passive operating at 13.56 MHz.

  21. Readers

  22. More… Readers • Readers can check in and check out multiple items. • Readers can check in and check out only one item at a time. • Readers that can operate multiple standards

  23. Interface • The interface is a software application that ties the item identification number to the ILS, Standard Interface Protocol (SIP2) or NISO Circulation Interchange Protocol (NCIP). • It can operate in online or batch modes.

  24. Circulation stations • Check in/out one item at a time. SIP is not required, such as ITG’s DirectReader application. • Check in/out multiple items simultaneously. SIP2 is needed for operation. • Staff, selfcheck, and and manual assistant sorting workstations

  25. Self-check stations

  26. Conversion stations • Conversion or programming • Readers, tags, conversion software, and conversion station. • Buy or lease?

  27. Security gates • Security status is on the tag, ILS does not register the security. • Does not need a separate security server. • Multiple standard security gates. • Some concerns.

  28. Manual Assistant sorting stations • Indicates shelf location information so books can be sorted quickly and effectively.

  29. As materials are returned to the drop box, they are automatically checked in and security is activated. Meanwhile the library’s database is updated. The sorting system may be combined with a conveyor to separate reserved materials and assign other items to bins based on their appropriate location codes. Automated return with sorting systems

  30. RFID Standards • Interoperability • Radio frequency: 13.56 MHz. • Proprietary protocols-TagSys Folio 220 • ISO 15693 • ISO 18,000 – TagSys Folio 320

  31. More… RFID Standards • ISO/IEC 18000-3:2004 relates solely to systems operating at 13,56 MHz. It provides physical layer, collision management system and protocol values for RFID systems for item identification in accordance with the requirements of ISO 18000-1. • ISO 18,000 does not cover everything. • Does not define the data structure. • Does not define the content of different tags. • For example, 100 bit of memory, read/write, security field. • Will communicate the same way, but could be different things.

  32. Identify an item without line of sight. Speed up check-in process. A built-in security bit. Simplify the check-in and check-out process. Prevent staff from repetitive motion injuries. Advantages of Using RFID

  33. More…Advantages of Using RFID • Reduce the amount of time of material processing and circulation. • Reduce the costs of inventory. • Keep track of library material usage. • Increase a user’s privacy.

  34. Disadvantages of Using RFID • Proprietary standards - Tags and equipment – not compatible. • High price • More staff training. • Easy to remove the tags.

  35. Concerns of Using RFID • Challenges for a consortia. • Health concerns • Higher loss rate • Privacy invasion

  36. For Further Information • Contact Connie Haley: chaley@csu.edu • www.csu.edu/library/cil2005/

  37. Budgeting Exercise

More Related