Presentation slides


Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Presentation slides

  1. 1. A Classy Technology Upgrading to RFID Debra Van Tassel Louisville Public Library John F. McCarthy 3M Library Systems CAL Conference 2006 - A ClassiCAL Celebration
  2. 2. Agenda <ul><li>Who are we? </li></ul><ul><li>What is RFID and how does RFID work? </li></ul><ul><li>Advantages and Disadvantages </li></ul><ul><li>Setting Library Goals </li></ul><ul><li>Choosing RFID technology : You & Your Vendor </li></ul><ul><li>Convincing the Powers That Be </li></ul><ul><li>Vendor Agreements </li></ul>
  3. 3. Agenda 2 <ul><li>Conversion Process </li></ul><ul><li>Handheld Scanning Devices </li></ul><ul><li>Circulation with RFID </li></ul><ul><li>Security with RFID </li></ul><ul><li>Workflow Considerations </li></ul><ul><li>Reminder </li></ul>
  4. 4. Louisville Public Library <ul><li>Located 25 miles northwest of Denver, the Louisville Public Library serves the City’s nearly 19,000 residents as well as residents in surrounding areas. </li></ul><ul><li>New building opened August 7, 2006: 32,500 sq ft </li></ul><ul><li>Library Registrations: 18,216 </li></ul><ul><li>Items including periodicals: 73,000 </li></ul><ul><li>Circulation: 350,000 annually 18.34 per capita </li></ul><ul><li>Staff: 14.5 fte </li></ul>
  5. 5. <ul><li>COMMITMENT </li></ul><ul><li>3M was founded in 1902 and we have provided library solutions for over 35 years. </li></ul>Partner with the leader in security, productivity and information management solutions SERVICE We’re committed to satisfying libraries with superior quality, value and service. RESPECT We respect our social and physical environment. INNOVATION We are committed to innovation and research. GUARANTEE We have 100% performance guarantee. PRIDE We are a company and division that our employees are proud to be a part of. We are consistently rated as one of the most respected companies due to our ethics and community service. COMMUNITY We donate over $1.5 million annually to libraries and millions globally as a company. We employ and manufacture products in your state.
  6. 6. <ul><li>The fastest, easiest, most efficient way to track, locate and manage library materials. You’ll be amazed at what it can do for your productivity, from processing multiple items simultaneously to pinpointing misplaced materials in seconds. </li></ul>
  7. 7. Components of an RFID System <ul><li>Tags </li></ul><ul><ul><ul><li>Chip </li></ul></ul></ul><ul><ul><ul><li>Antenna </li></ul></ul></ul><ul><ul><ul><li>Adhesive </li></ul></ul></ul><ul><ul><ul><li>Customization </li></ul></ul></ul><ul><ul><ul><li>Standards </li></ul></ul></ul><ul><li>Readers </li></ul><ul><ul><ul><li>Conversion Workstation </li></ul></ul></ul><ul><ul><ul><li>Circulation Workstation </li></ul></ul></ul><ul><ul><ul><li>Self Check Machines </li></ul></ul></ul><ul><ul><ul><li>Security Gates </li></ul></ul></ul><ul><ul><ul><li>Handheld Devices </li></ul></ul></ul>
  8. 8. RFID Tags Productivity Security Information Management
  9. 9. Components of an RFID System <ul><li>Tags </li></ul><ul><ul><li>Chip </li></ul></ul><ul><ul><li>Antenna </li></ul></ul><ul><ul><li>Adhesive </li></ul></ul><ul><ul><li>Customization </li></ul></ul><ul><ul><li>Standards </li></ul></ul><ul><li>Readers </li></ul><ul><ul><li>Conversion Workstation </li></ul></ul><ul><ul><li>Circulation Workstation </li></ul></ul><ul><ul><li>Self Check Machines </li></ul></ul><ul><ul><li>Security Gates </li></ul></ul><ul><ul><li>Handheld Devices </li></ul></ul>
  10. 10. RFID Tags <ul><li>ISO 15693-3 and 18000-3 Mode 1 compliant </li></ul><ul><li>2,048 bits of memory </li></ul><ul><li>Fully rewriteable </li></ul><ul><li>Flip-chip bonded </li></ul><ul><li>Archival quality adhesive </li></ul><ul><li>No tag assembly required </li></ul><ul><li>Security status stored on tag </li></ul><ul><li>Optional tag platforms available to fit library's needs </li></ul><ul><li>Fully guaranteed for life of the item it is originally affixed to </li></ul>Productivity Security Information Management Not all RFID Tags are equal
  11. 11. Components of an RFID System <ul><li>Tags </li></ul><ul><ul><li>Chip </li></ul></ul><ul><ul><li>Antenna </li></ul></ul><ul><ul><li>Adhesive </li></ul></ul><ul><ul><li>Customization </li></ul></ul><ul><ul><li>Standards </li></ul></ul><ul><li>Readers </li></ul><ul><ul><li>Conversion Workstation </li></ul></ul><ul><ul><li>Circulation Workstation </li></ul></ul><ul><ul><li>Self Check Machines </li></ul></ul><ul><ul><li>Security Gates </li></ul></ul><ul><ul><li>Handheld Devices </li></ul></ul>
  12. 12. RFID System Productivity Security Information Management
  13. 13. How Does RFID Work? Productivity Security Information Management 1 RFID Tag enters radio frequency field 2 RFID reader's signal powers the tag 3 Reader sends a modulated signal 4 Tag demodulates the signal and returns its data to reader 5 Reader sends data to the computer 6 The computer transmits new data through reader to tag
  14. 14. Advantages <ul><li>No line of sight needed </li></ul><ul><li>Tags have read / write memory capability </li></ul><ul><li>Tags are user programmable </li></ul><ul><li>Multiple tags can be read at once </li></ul><ul><li>Long tag life </li></ul><ul><li>Rapid Charging / Discharging </li></ul><ul><li>Readers are highly reliable </li></ul><ul><li>Hand-held devices enable shelf-side scanning </li></ul><ul><li>Enables automated materials handling </li></ul>
  15. 15. Disadvantages <ul><li>High cost </li></ul><ul><li>Metal interferes with RF transmission </li></ul><ul><li>Vulnerable to removal or compromise </li></ul><ul><li>Exit sensor reliability </li></ul><ul><li>Perceived invasion of patron privacy </li></ul><ul><ul><li>3M supports library privacy best practices </li></ul></ul><ul><ul><li>RFID tags typically store only barcode numbers </li></ul></ul><ul><ul><li>Books / media can’t be tracked after leaving the library </li></ul></ul><ul><ul><li>Educate staff and customers </li></ul></ul>
  16. 16. Setting Your Library’s Goals <ul><li>What systems does your library have in place? </li></ul><ul><li>How well do these systems meet your needs? </li></ul><ul><li>Each library has different needs/goals </li></ul><ul><li>What does your library want to achieve? </li></ul><ul><li>How will RFID and/or Vendor meet those goals? </li></ul>
  17. 17. Why we chose RFID <ul><li>High Circulation </li></ul><ul><li>No increase in staff </li></ul><ul><li>Streamline Self Check </li></ul><ul><li>Enable a security system </li></ul><ul><li>Collection Management / Inventory </li></ul><ul><li>Funding from New Library Building Project </li></ul><ul><li>Possible Materials Handling System </li></ul>
  18. 18. Choosing a Vendor <ul><li>Create a list of possible vendors </li></ul><ul><li>Investigate compatibility with ILS </li></ul><ul><li>RFP or RFI process </li></ul><ul><li>Vendor demonstrations </li></ul><ul><ul><li>Bring it On </li></ul></ul><ul><li>Evaluating Proposals (handout) </li></ul><ul><ul><li>Matrix </li></ul></ul><ul><ul><li>Matrix Reloaded </li></ul></ul><ul><ul><li>Matrix Revolutions </li></ul></ul><ul><li>Check References </li></ul>
  19. 19. Convincing the Powers that Be <ul><li>Executive Summary </li></ul><ul><li>Matrix, the sequel </li></ul><ul><li>A picture is worth a thousand words </li></ul>• Multimedia is worth a million words
  20. 20. Vendor Agreements <ul><li>Contracts </li></ul><ul><li>Delivery Timelines </li></ul><ul><li>Communication Protocols </li></ul><ul><li>Implementation Plan </li></ul><ul><li>Maintenance </li></ul><ul><li>Support & Enhancements </li></ul>
  21. 21. Conversion Process <ul><li>Workstation(s) – Staff / Conversion </li></ul><ul><li>Written Conversion Plan Overview (handout) </li></ul><ul><li>Training – Vendor & Staff </li></ul><ul><li>Testing </li></ul><ul><li>Resources - staff and volunteer teams </li></ul><ul><li>Schedule & Logs (handout) </li></ul><ul><li>Weeding while Converting </li></ul>
  22. 22. Handheld Scanning Device <ul><li>Uses </li></ul><ul><ul><li>Shelf Order Check </li></ul></ul><ul><ul><li>Pull Lists </li></ul></ul><ul><ul><li>Search Lists </li></ul></ul><ul><ul><li>Inventory </li></ul></ul><ul><ul><li>Identifying Unsecured Items </li></ul></ul><ul><ul><li>Identifying Untagged Items </li></ul></ul><ul><li>Creating Lists </li></ul><ul><ul><li>ILS -> Export -> Data Software -> Import -> DLA </li></ul></ul><ul><li>Training Staff </li></ul>
  23. 23. Circulation with RFID – Staff Workstation <ul><li>Multifunctional </li></ul><ul><ul><ul><li>• Checkout and Check-in </li></ul></ul></ul><ul><ul><ul><li>• Barcodes and RFID Tags </li></ul></ul></ul><ul><ul><ul><li>• Processes multiple items </li></ul></ul></ul><ul><ul><ul><li>• Secures/Unsecures items </li></ul></ul></ul><ul><ul><ul><li>• Barcode-to-RFID Conversion </li></ul></ul></ul>
  24. 26. Circulation with RFID – Self Check <ul><li>Graphical User Interface – customizable </li></ul><ul><li>Touch screen control </li></ul><ul><li>Optional languages available </li></ul><ul><li>Checkout or Checkin </li></ul><ul><li>Processes bar coded and RFID-tagged items </li></ul><ul><li>Store & Forward feature </li></ul><ul><li>Minimal training for customers </li></ul><ul><li>So simple, even a child can operate </li></ul>
  25. 28. Security System • Visible and audible alarms • False alarm rate of less than 0.1% • Read range at least 18” either direction • No application server required • Integrated traffic counter • Corridor width is ADA-compliant
  26. 29. Library Workflow Considerations <ul><li>Tagging new acquisitions </li></ul><ul><li>Checkout/Checkin moves from staff to customers </li></ul><ul><li>Staff Checkout/Checkin speed increased </li></ul><ul><li>Results in shelving backlogs </li></ul><ul><li>Security monitoring </li></ul><ul><li>Creating/Exporting/Importing Data for DLA </li></ul><ul><li>Use of handheld scanning device </li></ul><ul><li>Training for both staff and customers </li></ul>
  27. 30. Reminder <ul><li>“ Implementation of any new technology always requires more resources, not less” </li></ul><ul><li>--Edward Tenner </li></ul><ul><li>Why Things Bite Back: </li></ul><ul><li>Technology and the Revenge of Unintended Consequences </li></ul><ul><li>New York : Knopf, 1996 </li></ul><ul><li>0679425632 </li></ul>
  28. 31. Louisville Public Library Web: Email: [email_address] Web: Phone: 1-800-328-0067