Upload
petersam67
View
389
Download
0
Tags:
Embed Size (px)
Citation preview
A Classy TechnologyUpgrading to RFID
Debra Van TasselLouisville Public Library
John F. McCarthy3M Library Systems
CAL Conference 2006 - A ClassiCAL Celebration
Agenda
• Who are we?
• What is RFID and how does RFID work?
• Advantages and Disadvantages
• Setting Library Goals
• Choosing RFID technology : You & Your Vendor
• Convincing the Powers That Be
• Vendor Agreements
Agenda 2
• Conversion Process
• Handheld Scanning Devices
• Circulation with RFID
• Security with RFID
• Workflow Considerations
• Reminder
Louisville Public Library
• Located 25 miles northwest of Denver, the Louisville Public Library serves the City’s nearly 19,000 residents as well as residents in surrounding areas.
• New building opened August 7, 2006: 32,500 sq ft
• Library Registrations: 18,216
• Items including periodicals: 73,000
• Circulation: 350,000 annually 18.34 per capita
• Staff: 14.5 fte
Partner with the leader in security, productivity and information management solutions
COMMITMENT3M was founded in 1902 and we have provided library solutions for over 35 years.
SERVICEWe’re committed to satisfying libraries with superior quality, value and service.
RESPECTWe respect our social and physical environment.
INNOVATIONWe are committed to innovation and research.
GUARANTEEWe have 100% performance guarantee.
PRIDEWe are a company and division that our employees are proud to be a part of. We are consistently rated as one of the most respected companies due to our ethics and community service.
COMMUNITYWe donate over $1.5 million annually to libraries and millions globally as a company. We employ and manufacture products in your state.
The fastest, easiest, most efficient way to track, locate and manage library materials. You’ll be amazed at what it can do for your productivity, from processing multiple items simultaneously to pinpointing misplaced materials in
seconds.
Components of an RFID System
• Tags• Chip
• Antenna
• Adhesive
• Customization
• Standards
• Readers• Conversion Workstation
• Circulation Workstation
• Self Check Machines
• Security Gates
• Handheld Devices
RFID Tags
Productivity
Security
Information Management
Components of an RFID System
• Tags• Chip
• Antenna
• Adhesive
• Customization
• Standards
• Readers• Conversion Workstation
• Circulation Workstation
• Self Check Machines
• Security Gates
• Handheld Devices
Productivity
Security
Information Management
RFID Tags
• ISO 15693-3 and 18000-3 Mode 1 compliant
• 2,048 bits of memory• Fully rewriteable• Flip-chip bonded• Archival quality adhesive • No tag assembly required• Security status stored on tag • Optional tag platforms available to fit
library's needs • Fully guaranteed for life of the item it is
originally affixed toNot all RFID Tags are equal
Components of an RFID System
• Tags• Chip
• Antenna
• Adhesive
• Customization
• Standards
• Readers• Conversion Workstation
• Circulation Workstation
• Self Check Machines
• Security Gates
• Handheld Devices
RFID System
Productivity
Security
Information Management
How Does RFID Work?
Productivity
Security
Information Management
1 RFID Tag enters radio frequency field
2 RFID reader's signal powers the tag
3 Reader sends a modulated signal
4 Tag demodulates the signal and returns its data to reader
5 Reader sends data to the computer
6 The computer transmits new data through reader to tag
Advantages
• No line of sight needed• Tags have read / write memory capability• Tags are user programmable• Multiple tags can be read at once• Long tag life• Rapid Charging / Discharging• Readers are highly reliable• Hand-held devices enable shelf-side scanning• Enables automated materials handling
Disadvantages
• High cost• Metal interferes with RF transmission• Vulnerable to removal or compromise• Exit sensor reliability• Perceived invasion of patron privacy
• 3M supports library privacy best practices
• RFID tags typically store only barcode numbers
• Books / media can’t be tracked after leaving the library
• Educate staff and customers
Setting Your Library’s Goals
• What systems does your library have in place?
• How well do these systems meet your needs?
• Each library has different needs/goals
• What does your library want to achieve?
• How will RFID and/or Vendor meet those goals?
Why we chose RFID
• High Circulation
• No increase in staff
• Streamline Self Check
• Enable a security system
• Collection Management / Inventory
• Funding from New Library Building Project
• Possible Materials Handling System
Choosing a Vendor• Create a list of possible vendors
• Investigate compatibility with ILS
• RFP or RFI process
• Vendor demonstrations• Bring it On
• Evaluating Proposals (handout)• Matrix• Matrix Reloaded• Matrix Revolutions
• Check References
Convincing the Powers that Be
• Executive Summary• Matrix, the sequel• A picture is worth a thousand words
• Multimedia is worth a million words
Vendor Agreements
• Contracts
• Delivery Timelines
• Communication Protocols
• Implementation Plan
• Maintenance
• Support & Enhancements
Conversion Process
• Workstation(s) – Staff / Conversion
• Written Conversion Plan Overview (handout)
• Training – Vendor & Staff
• Testing
• Resources - staff and volunteer teams
• Schedule & Logs (handout)
• Weeding while Converting
Handheld Scanning Device• Uses
• Shelf Order Check• Pull Lists• Search Lists• Inventory• Identifying Unsecured Items• Identifying Untagged Items
• Creating Lists• ILS → Export → Data Software → Import → DLA
• Training Staff
Circulation with RFID – Staff Workstation
Multifunctional
• Checkout and Check-in
• Barcodes and RFID Tags
• Processes multiple items
• Secures/Unsecures items
• Barcode-to-RFID Conversion
Circulation with RFID – Self Check
• Graphical User Interface – customizable
• Touch screen control
• Optional languages available
• Checkout or Checkin
• Processes bar coded and RFID-tagged items
• Store & Forward feature
• Minimal training for customers
• So simple, even a child can operate
Security System
• Visible and audible alarms
• False alarm rate of less than 0.1%
• Read range at least 18” either direction
• No application server required
• Integrated traffic counter
• Corridor width is ADA-compliant
Library Workflow Considerations
• Tagging new acquisitions• Checkout/Checkin moves from staff to customers• Staff Checkout/Checkin speed increased• Results in shelving backlogs• Security monitoring• Creating/Exporting/Importing Data for DLA• Use of handheld scanning device• Training for both staff and customers
Reminder
“Implementation of any new technology always requires more resources, not less”
--Edward Tenner
Why Things Bite Back:
Technology and the Revenge of Unintended Consequences
New York : Knopf, 1996
0679425632
Louisville Public LibraryWeb: www.ci.louisville.co.us/libraryEmail: [email protected]
Web: www.3M.com/us/libraryPhone: 1-800-328-0067