SlideShare a Scribd company logo
Introducing Help Alert! - David Bart, Account Executive
About RF Technologies ,[object Object]
 Strong Engineering + R&D
 Privately OwnedRF Technologies, 3125 North 126th Street, Brookfield, WI USA PinPoint®  Hospital Senior Living OEM Wi-Fi RTLS ,[object Object]
Web Training
On-site Training
First Wandering Management System
First RFID Infant Security System
Over 10,000 Installations Globally
First To Integrate Zigbee
Creator Of Cut Band Technology
Over 26 Issued Patents ,[object Object]
Rapid wireless deployment model
Systems that work together or independently
Low Total Cost of Ownership
Fast Return on Investment,[object Object]

More Related Content

What's hot

Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118
Erik Ginalick
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
gueste0b5fe
 
Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systems
gigamon
 

What's hot (20)

Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Network Configuration and Audit Simplified
Network Configuration and Audit SimplifiedNetwork Configuration and Audit Simplified
Network Configuration and Audit Simplified
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118
 
Network Audit
Network AuditNetwork Audit
Network Audit
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviour
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
Saner 2.0 product sheet
Saner 2.0   product sheetSaner 2.0   product sheet
Saner 2.0 product sheet
 
Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systems
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
 
Securing Electric Utility Infrastructure
Securing Electric Utility InfrastructureSecuring Electric Utility Infrastructure
Securing Electric Utility Infrastructure
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
Consequence Informed Cyber Security
Consequence Informed Cyber Security Consequence Informed Cyber Security
Consequence Informed Cyber Security
 
Oissg
OissgOissg
Oissg
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers
 
RSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTRSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APT
 

Viewers also liked

2º ESO PP ACTIVITIES HEAT
2º ESO PP ACTIVITIES HEAT2º ESO PP ACTIVITIES HEAT
2º ESO PP ACTIVITIES HEAT
beabio75
 
2º ESO UNITt 1 HEAT. NOTES
2º ESO UNITt 1 HEAT. NOTES2º ESO UNITt 1 HEAT. NOTES
2º ESO UNITt 1 HEAT. NOTES
beabio75
 
UNIT 2 EARTH'S INTERNAL ENERGY.
UNIT 2 EARTH'S INTERNAL ENERGY.UNIT 2 EARTH'S INTERNAL ENERGY.
UNIT 2 EARTH'S INTERNAL ENERGY.
beabio75
 
UNIT 2 EARTH'S INTERNAL ENERGY
UNIT 2 EARTH'S INTERNAL ENERGYUNIT 2 EARTH'S INTERNAL ENERGY
UNIT 2 EARTH'S INTERNAL ENERGY
beabio75
 
Perancangan strategik 2012
Perancangan strategik 2012Perancangan strategik 2012
Perancangan strategik 2012
Azhar Abu
 
Rancangan aktiviti kelab sejarah
Rancangan aktiviti kelab sejarahRancangan aktiviti kelab sejarah
Rancangan aktiviti kelab sejarah
Azhar Abu
 

Viewers also liked (13)

2º ESO PP ACTIVITIES HEAT
2º ESO PP ACTIVITIES HEAT2º ESO PP ACTIVITIES HEAT
2º ESO PP ACTIVITIES HEAT
 
2º ESO UNITt 1 HEAT. NOTES
2º ESO UNITt 1 HEAT. NOTES2º ESO UNITt 1 HEAT. NOTES
2º ESO UNITt 1 HEAT. NOTES
 
UNIT 2 EARTH'S INTERNAL ENERGY.
UNIT 2 EARTH'S INTERNAL ENERGY.UNIT 2 EARTH'S INTERNAL ENERGY.
UNIT 2 EARTH'S INTERNAL ENERGY.
 
UNIT 2 EARTH'S INTERNAL ENERGY
UNIT 2 EARTH'S INTERNAL ENERGYUNIT 2 EARTH'S INTERNAL ENERGY
UNIT 2 EARTH'S INTERNAL ENERGY
 
Dealerguide
DealerguideDealerguide
Dealerguide
 
Perancangan strategik 2012
Perancangan strategik 2012Perancangan strategik 2012
Perancangan strategik 2012
 
Rancangan aktiviti kelab sejarah
Rancangan aktiviti kelab sejarahRancangan aktiviti kelab sejarah
Rancangan aktiviti kelab sejarah
 
Krišjāņa Kariņa prezentācija, 3.decembris 2010
Krišjāņa Kariņa prezentācija, 3.decembris 2010Krišjāņa Kariņa prezentācija, 3.decembris 2010
Krišjāņa Kariņa prezentācija, 3.decembris 2010
 
Mārtiņš Kazāks Kariņa konferencē
Mārtiņš Kazāks Kariņa konferencēMārtiņš Kazāks Kariņa konferencē
Mārtiņš Kazāks Kariņa konferencē
 
Brochure of the Fondation Chirac Prize for Conflict Prevention
Brochure of the Fondation Chirac Prize for Conflict PreventionBrochure of the Fondation Chirac Prize for Conflict Prevention
Brochure of the Fondation Chirac Prize for Conflict Prevention
 
Plaquette gb
Plaquette gbPlaquette gb
Plaquette gb
 
Omega 3
Omega 3Omega 3
Omega 3
 
PP 3º ESO UNIDAD 1.
PP 3º ESO UNIDAD 1.PP 3º ESO UNIDAD 1.
PP 3º ESO UNIDAD 1.
 

Similar to Linked In

Aeroscout Wwt Wireless Mobilityin Hc Webcast
Aeroscout   Wwt Wireless Mobilityin Hc WebcastAeroscout   Wwt Wireless Mobilityin Hc Webcast
Aeroscout Wwt Wireless Mobilityin Hc Webcast
Marc
 
6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution
Steve Lim
 
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
Tammy Clark
 
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
Pierre Ketels
 

Similar to Linked In (20)

Aeroscout Wwt Wireless Mobilityin Hc Webcast
Aeroscout   Wwt Wireless Mobilityin Hc WebcastAeroscout   Wwt Wireless Mobilityin Hc Webcast
Aeroscout Wwt Wireless Mobilityin Hc Webcast
 
RTLS_CutSheet_AssetTag.pdf
RTLS_CutSheet_AssetTag.pdfRTLS_CutSheet_AssetTag.pdf
RTLS_CutSheet_AssetTag.pdf
 
Beka Technology
Beka TechnologyBeka Technology
Beka Technology
 
6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution
 
[GITSN] wireless data security system
[GITSN] wireless data security system[GITSN] wireless data security system
[GITSN] wireless data security system
 
Extronics Advance AeroScout Real Time Worker Location use case
Extronics Advance AeroScout Real Time Worker Location use caseExtronics Advance AeroScout Real Time Worker Location use case
Extronics Advance AeroScout Real Time Worker Location use case
 
Help alert
Help alertHelp alert
Help alert
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Indoor Positioning Systems and Positioning System Analytics Help Your Business
Indoor Positioning Systems and Positioning System Analytics Help Your BusinessIndoor Positioning Systems and Positioning System Analytics Help Your Business
Indoor Positioning Systems and Positioning System Analytics Help Your Business
 
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023
 
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
 
UWB precision location system
UWB precision location systemUWB precision location system
UWB precision location system
 
Healthcare Assets Management Solution
Healthcare Assets Management SolutionHealthcare Assets Management Solution
Healthcare Assets Management Solution
 
RF_NEC
RF_NECRF_NEC
RF_NEC
 
Cloud managed networking
Cloud managed networkingCloud managed networking
Cloud managed networking
 
5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program
 
Dolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. ProfileDolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. Profile
 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security Risks
 

Linked In

  • 1. Introducing Help Alert! - David Bart, Account Executive
  • 2.
  • 4.
  • 8. First RFID Infant Security System
  • 11. Creator Of Cut Band Technology
  • 12.
  • 14. Systems that work together or independently
  • 15. Low Total Cost of Ownership
  • 16.
  • 17. Immediate Help is Now within Reach! Rapidly respond to staff duress alerts with Help Alert®! Help Alert® is a location system that leverages existing Wi-Fi resources to conveniently and cost-effectively enable staff to discreetly send alerts with the touch of a wearable pendant. Protect your staff, instill confidence, improve productivity, attract and retain nursing staff, and make your security team more efficient. Immediately identify location of safety incident Reduce response time to employee distress Discretely call for assistance from security personnel Deter adverse events Improve staff moral and retention
  • 18. Easy to Use… Help Alert’s RTLS (real time location system) software provides precise location information for quick security response. This unique wireless safety solution leverages your existing Wi-Fi resources allowing for a convenient and cost-effective installation and deployment of a real time staff duress solution.
  • 19. RTLS Tags receive signals from combination of Access Points and PinPoint Wireless Reference Tag Enables Room level visibility with existing Wi-Fi infrastructure PinPoint RTLS R R
  • 20. GPS device on earth receives signals from orbiting satellites Time synch enabled algorithms determine distance traveled by each signal Device knows where satellites should be at the instance data was received Knowing satellite positions and relative distance, GPS device can “self locate” itself at a specific location on the earth GPS (an analogy to RTLS)
  • 21. Easy to Implement… From the campus view Help Alert: Quickly identifies alarms at wing, zone or campus accuracy Provides photo, name and other detail of person needing assistance
  • 23. Easy to Appreciate… From the floor plan view Help Alert: Provides room level detail of the incident Sends real time updates of staff member’s current location Notifies the staff member that help is on the way
  • 24.
  • 25. Easy to Manage… From the statistics report window Help Alert: Monitors alert details by shift Identifies areas of reoccurrence Tracks your team’s response times to incident
  • 26. Why PinPoint RTLS? Utilizes existing Wi-Fi infrastructure 100% Wi-Fi – no IR or Sonic interference issues Location algorithm accounts for the unique physical structure of each facility Reference tag infrastructure Automates accuracy tuning Mesh Network capable
  • 27. Help Alert Benefits Immediately identify location of safety incidents Reduce response time to employee distress Discretely call security personnel for assistance Deter adverse events Improve staff moral, retention and marketability
  • 28. Questions David Bart 262.349.1026 dbart@rft.com