You are at : Search > Articles Search Results

Articles Search Results

276 Articles and 252 related Products found for RFID

Assa Abloy/HID expands RFID tag family for quick mount to irregular surfaces

Assa Abloy/HID expands RFID tag family for quick mount to irregular surfaces

Editor / Provider: HID Global | Updated: 6/28/2013 | Article type: Security 50

HID Global announced it has expanded its SlimFlex Tag family of broadband UHF RFID transponders with the addition of the new SlimFlex Standard 200 and Standard 301. Designed for flexibility and durability, SlimFlex Tag transponders are among the most versatile UHF RFID tags available, enabling greater adaptability for a range of RFID tag placement options.

The SlimFlex Standard 200 and Standard 301 tags are designed for quick, secure mounting using standard cable ties and can attach snugly to round or irregular surfaces, such as cylindrical containers, plastic pipes, bags, helmets or trees. An important feature is avoiding the use for screw holes on tagged objects, such as pipes, that could otherwise leak fluids and become inoperable. Like all SlimFlex tags, the new solutions are waterproof, food compatible and designed to perform in the harshest conditions. Additionally, the Standard 200 and Standard 301 tags are a high-visibility yellow for excellent color contrast when laser-engraved with a barcode, text or logo.

“Due to the flexible and durable housing the SlimFlex tag family offers, customers can now quickly and conveniently mount UHF transponders to irregular surfaces improving the reliability and performance of existing systems,” said Richard Aufreiter, Director of Product Management, Identification Technologies at HID Global. “By applying these tags with a simple cable tie, customers gain better traceability of items where traditional inflexible transponders could not be used.”

“The new tags have read ranges up to 26.3 ft (8 m) when mounted flush to plastic or wooden surfaces. Due to its vertical mount option, the Standard 200 tag delivers comparable read range performance even on wet or metal surfaces. Built with a unique thermoplastic elastomer (TPE) housing, the tags tolerate bending and exposure to harsh chemicals and temperatures. The SlimFlex family of tags provide high resistance to aggressive liquids and UV rays, and deliver reliable performance and reading stability in heat up to 158° F (70° C) and sub-freezing temperatures to -40° F (-40° C).

Assa Abloy/HID Global awarded as contractor for 2013 US Green Card program

Assa Abloy/HID Global awarded as contractor for 2013 US Green Card program

Editor / Provider: Assa Abloy | Updated: 6/26/2013 | Article type: Security 50

The U.S. Citizenship and Immigration Services (USCIS), an agency of the U.S. Department of Homeland Security, has selected HID Global as the prime contractor for the USCIS Permanent Resident Card – commonly known as the “Green Card.”

Chosen for its capabilities in delivering end-to-end secure ID solutions,HID Global will be responsible for the secure production, delivery and storage of up to two million Green Cards in 2013. The Green Card incorporates state-of-the-art technology to prevent counterfeiting and obstruct tampering, while facilitating quick and accurate authentication of the card. The Green Card is also the world's first secure ID credential combining HID Global's LaserCard optical security media with RFID tags for accelerated border crossing.

HID Global will continue to manufacture the Green Card in conjunction with its expanded responsibilities as the program's prime contractor. LaserCard Corporation, which was acquired in 2011 by HID Global, played a strategic role in redesigning the card for maximum security and rapid border crossing in 2010. The Green Card is one of the most secure national ID cards in the world with a digital security that has never been compromised.

“HID Global's new role as prime contractor for the secure production and delivery of the card is a natural evolution of our relationship with the U.S. Department of Homeland Security,” said Denis Hébert, president of HID Global.

“With our dedicated team of security experts managing every key aspect of the program and our continuing role as manufacturer of the Green Card, HID Global will deliver significant added value by reducing overall program risks while achieving greater efficiencies for USCIS.”

Argentinean highway toll booths operator identifies vehicles with smarts

Argentinean highway toll booths operator identifies vehicles with smarts

Editor / Provider: Axis Communications | Updated: 6/18/2013 | Article type: Infrastructure

Four Aumar-operated toll plazas along the 647 kilometer corridor of highways in the province of Buenos Aires in Argentina recently deployed eight Axis Communications network cameras with Neurallabs ALPR to help identify about 16,000 vehicles that are exempt from tolls or qualify for special rates. The system was designed by system integrator Telectronica.

In July 2011, a new concession was created for highway linking Routes 2, 11, 63, 56, and 74. Within this corridor there are four tollbooths: Samborombón, La Huella, Gral Madariaga, and Mar Chiquita. The Concession Agreement stipulates that users residing within a 10 kilometer radius of a toll plaza are exempt from tolls, and there is a different rate for those who live in certain parts of the coast.

At first, different technologies such as ID cards or RFID tags were considered to meet this need. However, these options involve high investment costs that are difficult to recuperate. It was therefore decided to test ALPR technology with different types and brands of cameras. After several tests, Neurallabs ALPR was completed with Axis network cameras, with image control and shutter control software. Initially eight sets were installed: four at the La Huella toll plaza, two at the Madariaga plaza, and two at the Mar Chiquita plaza.

With the implementation of ALPR technology and Axis IP cameras, Aumar succeeded in automating vehicle identification for most residents within the zone in question, and the system achieved an extremely high recognition rate. Furthermore, the solution allowed the concessionaire to improve both its auditing processes and security.

“At first we were a little skeptical regarding recognition rates and processing speed after everything was integrated into the toll collection system; we even thought that cars might have to stop for the system to recognize and authorize them,” said Claudio Reynaga, System Administrator, Aumar. “But the numbers show us that the recognition rates are excellent, and users can go through the plazas without stopping, just as if there was a free-flow type system in place.”

Following these excellent results, AUMAR evaluated the use of the same technology for other applications. “ALPR technology is very interesting to us and allows us to think of many applications: for example, to measure average vehicle speed between toll stations, or using it as a backup in electronic toll lanes when the device tag is not recognized but the license plate is,” said Reynaga.

Identive introduces NFC tags for retail shelf labeling

Identive introduces NFC tags for retail shelf labeling

Editor / Provider: Identive Group | Updated: 6/13/2013 | Article type: Security 50

Identive Group, a provider of solutions and services for the identification, security and RFID industries, announced that Store Electronic Systems (SES), the supplier in Electronic Shelf Labeling (ESL) systems for food and non-food retail, has selected Identive's NFC tags to power innovative electronic shelf labels that allow consumers to access a wealth of information about product pricing, composition, origin and manufacturing, through a smartphone. Three million Identive NFC tags have been ordered for this ground-breaking retail application, which is the world's largest of its kind.

“For the launch of our patent-pending NFC electronic shelf labels, we were looking for a partner that could provide us with a proven and reliable NFC solution that would in turn ensure a quick and hassle-free experience for our retailer clients around the world. We turned to Identive because of their reputation as one of the most experienced and responsive suppliers in the transponder industry and as a leader in NFC in particular,” said Philippe Bottine, CTO of Store Electronic Systems. “Identive's focus on performance, interoperability, reliability and quick-turn production has enabled us to offer NFC capabilities across the full range of our electronic shelf label offerings. This capability is yet another differentiator for SES as we work to help large retailers improve their sales and operational performance.”

Identive's NFC tags are embedded in SES's electronic shelf labels and give easy access to a cutting-edge retail experience for consumers. Using any NFC-enabled smartphone, it takes only a few seconds for consumers to download the retailer's NFC mobile app when they first enter the store. They can then tap their phones to store shelf labels to view product information and receive coupons and loyalty benefits that can be redeemed from their phones at checkout. The NFC tags can also trigger a health alert on the phone's screen for products that contain ingredients such as dairy or nuts. Retailers can also use the NFC-tag to store information used for product and shelf management.

“We are very pleased to work with SES on the launch of their NFC shelf labels, which are a simple yet dramatic innovation in retail shopping,” said David Holmes, VP of  Mobility & NFC Solutions at Identive Group. “NFC is becoming a standard feature on new smartphones and soon will be virtually everywhere. With this new global concept for large retailers, SES is leveraging the convenience of NFC in a practical application that has wide appeal. SES's innovative use of NFC technology helps consumers make better decisions, brings brands and consumers closer together and enables retailers to lower their operational costs.”

Security innovations to be driven by compliance

Security innovations to be driven by compliance

Editor / Provider: Memoori Business Intelligence | Updated: 6/7/2013 | Article type: Hot Topics

Memoori Business Intelligence recently interviewed Adlan Hussain, Global Head of Marketing at CNL Software, to discuss innovations in security in the next five years.

1. Where will the major innovations in security come from in the next 5 years? Let us start by stating the speed of innovation in this internet era makes it difficult to predict innovation for five years forward. There are trends such as processors and storage for computers that will get substantially smarter and cost less, but when we talk about innovation, we are thinking about game changing technologies that will disrupt the industry. We think two things will drive key changes in security: technology and compliance;

Compliance: Large-scale solutions are becoming ever larger and with a mix of private and public applications and devices, there is an even stronger need for truly intelligent front-end software solutions managing authentication as well as compliance to pre-determined memorandums of understanding. Armed with logical capabilities to use public systems in the event of an emergency, we are seeing safe city projects embracing the idea of connecting security systems from all the schools in their district for example, but this is dependent on the ability to manage and enforce compliance through strong software technology.

Evidence trail, audit trails, hardened data retrieval and export, authentication, potentially through logical gateways will all be the norm within the next few years as system owners recognize that software solutions can quickly, consistently and cost effectively process the huge amounts of data generated from their security systems. With the real estates growing to hundreds of thousands of devices and operators, technology is fundamental to managing and ensuring the compliance to all laws and procedures.

Technology: The two main technologies that will drive innovation are highly linked. Firstly, hardware will continue to evolve radically with more and more networked devices delivering ever-increasing capability. Secondly, the advancement of integration and management software needed to manage all these intelligent devices on the network.

A good example would be surveillance cameras. The growing capacity to store footage locally means that soon terabytes of storage at the edge will be an affordable option. With advances in analytics, the camera will have its own recording “rules” managed by a main suite of programs deciding: what recordings stay at the edge, what goes to a central library and what is deleted. This will not be a man managed video real estate, but a computer program that uses risk and probability analytics to determine what stays and what goes.

While this sounds a radical step, it is not at all and quite a few former NVR suppliers are already moving their systems from centralized recording to recording at the edge or on a managed set of SCSI disk libraries that take recording directly from the camera. This increases performance, reduces the bottleneck created at centralized servers and decreases the overall cost of a solution, while simultaneously reducing bandwidth requirement. Now that cameras are moving towards extreme high image densities, intelligent management of locally held video data will emerge as one of the newest and most important innovations that will eradicate the current DVR and NVR mentality.

Looking at access control and winding forward to when all the ironmongery needed for access control for example is network attached, powered by network connection and will probably include a mass of new devices managed by the access control system. We see that it is no longer a card presented to a door but can be a phone, tablet, RFID, biometric, VPN; in fact, the whole real estate of authentication ought to move to a self-managed model, reducing costs and need for security guards or personnel staff.

While it is difficult to look beyond the next twelve months to see what is going to happen in hardware. VMS and ACS systems as we know them are already being surpassed by smarter technologies, solving bigger problems on a wider scale. It is easy to forecast that existing suites of VMS or ACS applications will either get smarter or die a death as standalone applications.

Just like in the IT world, siloed applications died when users realized they could manage their businesses much better with integrated suites that improved company efficiencies and reduced costs. In a world where the demand to do more for less is increasing, the only fact we can be sure of is that this is a perfect environment for technology. Reducing cost has to be based on reduction of overheads, but without increasing the risk.

What we can say is it is unlikely to be the traditional installer equipment manufacturer who creates these innovations. The innovators will be those forward thinking manufacturers who are prepared to defy the past and provide new, smarter and cheaper hardware, which will require new software solutions to harness their intelligence.

2. Is the security industries' resistance to change creating opportunities for Startup businesses? For other industries, a reluctance to invest in innovation may only affect operational efficiency offered to clients, but in the security space, it means those intent on causing harm are able to catch up; and this is not good for any of us.

As we have seen in the last decade, the majority of this disruptive innovation will continue to come from smaller, agile and entrepreneurial companies. This is especially true in the electronic security industry, where the larger companies are often very cautious to adopt anything new.

Typically, these large organizations prefer to acquire technology rather than to risk the development process. This is good news for bright minds, as it leaves the door open for them to create game changing innovations that can help to secure each and every one of us. As we have seen ourselves, once a technology is proven and is seen to be commercially viable, there are plenty of companies who like to follow genuine innovators.

If you want to prove this, the next time you attend a tradeshow, walk down the back of the hall and look at the small shell scheme stands, I can assure you that you will find far more innovation there than you will on the manufacturer islands at the front of the hall. We are also seeing large companies offering these small start-ups money to invest into their innovation; the value to them is an early opportunity to look for the next new thing with less risk.

3. As platforms for sensing and analyzing data, video cameras, security sensors, biometrics etc has enormous potential. How will they fit into the ‘Internet of Things'? Firstly, as with the internet the security industry is finding that the real value lies not in the hardware or the device you are using, but in the software that is pulling everything together. Analytics or biometrics on their own will provide part of the picture, but pull them together with other systems, apply some intelligence and suddenly you have a stronger, tighter defense and improved security system.

Secondly, the move to the cloud will see a lot of change within the electronic security industry and will provide opportunities for new ideas and companies to grow, who offer a better service for less. How these two tends will meet will be interesting and PSIM will play a role here. Limited bandwidth, edge storage, coupled with rich data will mean an intelligent engine will be needed to ensure only the most relevant data is pushed to a reducing number of security operators.

Identive launches online training program

Identive launches online training program

Editor / Provider: Identive Group | Updated: 6/7/2013 | Article type: Security 50

Identive Group, a provider of solutions and services for the identification, security and RFID industries, announced that the award winning training programs for its Hirsch access control and security systems are now available online. Targeted online courses are available to introduce Identive products and solutions to new users, explore the feature and capabilities of new technology or enhance users' skills and knowledge. This new online offering allows dealers, channel partners and users to complete courses at convenient times and at their own pace as an alternative to attending live classes at Identive's training facilities in California and Germany.

Identive's online access control courses encompass the full breadth of topics included in the Company's classroom-based training program, including:
- Velocity Security Management Software System Administration;
- System Architecture;
- Optimizing System Design;
- Controller Capabilities and Installation;
- Wiring and Wire Requirements;
- Locking Systems and Lock Power Calculation;
- Readers and Biometrics; and
- Surveillance Video and Other Integrations.

“Our new online learning program gives customers and channel partners significant flexibility to obtain the knowledge they need to be successful with their security projects,” said Scott Chillemi, Technical Training and Publications Manager of Identive. “Educating technicians and front-line users is key to successful system implementations and produces long-term benefits. Training is critical to allow our partners to design bid and install their systems faster and more smoothly, limit expensive callbacks and corrective changes, and deliver more satisfactory performance. Our online courses eliminate barriers to obtaining training such as travel costs and time restrictions to ensure that our end-users can achieve optimal results with their systems.”

Identive's online training courses are available to customers and dealers globally and meet the continuing accreditation requirements of the Hirsch certification program.

Abu Dhabi seaport and industrial zone set sail to advanced access management

Abu Dhabi seaport and industrial zone set sail to advanced access management

Editor / Provider: CEM Systems | Updated: 5/31/2013 | Article type: Infrastructure

The Khalifia Port and Industrial Zone (KPIZ) in Abu Dhabi recently deployed CEM Systems, a Tyco Security Products company, access control and gate management system to secure its perimeters. The access control system consists of 700 card readers and fingerprint readers, portable card readers, and more than 300 PoE door interface units (DIU), were installed by Tyco Fire & Security in United Arab Emirates.

Khalifa Port was officially opened in December 2012. The port is crucial to the Abu Dhabi Ports Company megaproject which includes Khalifa Industrial Zone Abu Dhabi. Featuring the latest technology and designed to accommodate the world's largest ships. Upon completion of all construction phases, the port will be at an estimated size equivalent to two-thirds of Singapore.

“This was an exciting yet challenging project for CEM who delivered not one but two systems for the port; the access control system and a highly customized gate management system, providing high level integration to multiple port security systems to ensure the monitoring and control of vehicles coming onsite,” said Philip Verner, Regional Sales Director, EMEA, CEM.

The gate management solution integrates with a number of third party systems all interfaced to ensure multiple checks are made before a vehicle can enter site. The driver first swipes their card then passive or active long range RFID tags are used on trucks and light vehicles and then finally ALPR recognition is utilized and the gate opens. “Khalifa Port required a highly secure and flexible access control system, which could be used for more than just access control” said Craig Menzies, Security Division Manager, UAE, Tyco Fire & Security.

The multi-technology IP card readers installed at the port are IP 66 rated to protect against dust and water. The reader features a keypad for additional PIN code security, and features an internal database for offline card validation. The database holds up to 200,000 card holder records internally and up to 8,000 records offline. This means that should communication be temporarily lost at the seaport, staff can still validate cards throughout the port at all times.

Fingerprint readers will also be installed on critical doors/areas throughout the port. For high security areas users will be prompted for three identity checks (card, PIN and biometric verification) using one device. Being such a large and expansive site, the port required mobile security. The portable reader is ideal for roaming security. The reader can be used at remote port sites or temporary entrances which have no power during the construction phases. 

PoE DIUs was chosen by the port authorities to ensure cabling was kept to a minimum. The DIU utilizes PoE technology to power readers and heavy duty maglocks on two doors. This created sizable cost savings on the project as it eliminated the need to fit mains power supplies/ fused spurs above each door. The security management system was also used to its maximum efficiency taking advantage of software applications such as alarm event display, visual image pass ID badging system and visitor management module

Assa Abloy/HID tags OK'd for use in explosive environments

Assa Abloy/HID tags OK'd for use in explosive environments

Editor / Provider: HID Global | Updated: 5/31/2013 | Article type: Security 50

HID Global announced it has achieved ATEX certification for its field-proven Logi Tag family of industrial RFID tags that are highly water, chemical and shock resistant, and withstands peak temperatures. This certification adds to the company's expansive offering of innovative IN Tag and industrial Glass Tags that are certified for safe use in potentially explosive environments.

ATEX* certification validates that HID Global RFID tags operate without danger of directly causing or contributing to an explosion when used in offshore drilling platforms, petrochemical plants, mines, flour mills and other flammable environments. This also extends to other process industries in which there is a mixture of gases, vapors, mists or dust in the air that can ignite at specific temperatures or under certain operating conditions. ATEX certification ensures safe deployment of automated systems in these potentially hazardous conditions and also validates that HID Global's RFID tags perform while maintaining surface temperatures low enough to prevent the risk of ignition.

“Pursuing ATEX certification for our tags is an example of how HID Global works to anticipate and exceed customer needs across a wide range of environments and use cases,” said Richard Aufreiter, Director of Product Management for Identification Technologies at HID Global. “Our integrator partners and their customers must meet rigorous safety standards for their complex systems, and HID Global's RFID tags that are pre-certified to meet those standards help organizations save time and reduce costs.” HID Global and its worldwide network of integrator partners help end customers optimize data accuracy, achieve compliance and optimize critical systems by employing RFID tagging products that align with the demands of a broad spectrum of industries and applications.

*From the French Appareilsdestines a etreutilises en ATmospheresEXplosives, which translates as “equipment cleared for explosive environments.”

Changing tides

Changing tides

Editor / Provider: John Shi, a&s Editorial Director | Updated: 5/29/2013 | Article type: Hot Topics

With the successful conclusion of the three major international physical security trade shows ISC, SECUTECH, and IFSEC this year, new waves of change rippling through the industry were reflected at the show floors. Here are some major trends observed at the exhibitions:

1. Regional market shifts
The US security market is rebounding especially in the education and government vertical markets, with school administrators and parents being especially supportive of security investments. The stabilization of the US economy and the conclusion of the presidential elections, has contributed to the increase of security budgets. In contrast, the European market appears to be more conservative. Nevertheless, Northern Europe, Germany, and Eastern Europe markets still remain promising. The Middle East's security demands are driven by its continual infrastructure investments. There is also a higher quota for IP applications in this region, as the technology has not been implemented in the past.

2. High-end market saturation
Affected by tightened security budgets and a highly competitive market, the security industry's high-end market is gradually becoming saturated. Manufacturers have taken two extreme approaches, with some climbing upwards to even more sophisticated markets, such as Genetec's migration from VMS to solution-based projects, or Nice Systems promotion of PSIM products highlighting event management capacities. Others have chosen to move into entry-mid level markets, for instance Milestone Systems's release of Arcus, an entry-level VMS that can be embedded into cameras or NVRs. Axis Communications has also released cameras with front-end storage and back-end cloud services, while many other companies have promoted price/performance ratio products.

3. No new technologies
There has been a lack of major developments in video surveillance technology and products. Instead, video surveillance cameras have turned to more functions, easy-installation, user-friendly, and maintenance-friendly.

4. Diverse back-end storage
Unlike the CCTV era, where DVRs was the only storage method, there are now five different types of storages—storing directly on camera memory cards (decentralized system), server grade storage, NAS, embedded NVR, cloud-based storage or services. How these storages technologies will evolve in the future is worth following up on.

5. Access control shines
Similar to the video surveillance industry three to five years ago, the access control sector is quickly shifting towards IP. Besides integration demands, of special interest is the integration of new technologies, for instance, wireless door locks that are easy to install, RFID technology for asset management or employee management, biometric identification (including fingerprint, facial and iris), identity management for government and financial industries, and lastly NFC. The introduction of these technologies will urge the upgrade of access control devices, and drive market adaption, especially in universities, hospitals, and government agencies.

6. HD demand evident
IP-based video surveillance has established itself as the mainstream technology in U.S, due to good IP infrastructure and mature cloud services. However, labor remains expensive in U.S, which is why IP over coaxial cable solutions is still highly popular. SDI technology is still in the minority, but there is still market for the product. Some have observed the lack of Internet concepts among most engineering companies and no Internet maintenance at the end-user level. Compared to the limitations of HD-SDI transmission, storage, and costs for one cable per camera, Taiwan IC company's ccHDtv solution can connect 16 cameras over 500 meters.

Major European security markets that have made large investments in CCTV in the past, such as UK, Germany and France, are more keen on HD-SDI. Although, UK's acceptance for IP technology has increased since last year, demands for HD-SDI remain high. Recently London upgraded 4 million analog cameras to HD.

7. Civilian security
The rapid growth of smartphones and hand held devices has propelled the demand for home security and cloud-services. Companies trying to tap into the home market include telecommunication companies, Internet companies, civilian cloud-based services, and security companies. The targeted users are homeowners and SMBs, which is expected to spur large demands for entry-level surveillance cameras, and even impact 4-channel DVR manufacturers market and distribution channels.

8. Chinese manufacturers
Hikvision Digital Technology's performance in many countries reflects the results of setting up local branches, while Dahua Technology has invested heavily at major security trade shows, greatly increasing its visibility.

9. Asian manufacturers
Asian manufacturers have increased their presence at international trade shows, by staging independent exhibition booths or joining country pavilions.

10. US analog market
Although analog video surveillance has a 70 percent market share in U.S, profits remain extremely low. Will it be possible for a professional manufacturer to take on this highly standardized field in the future?

11. Smart buildings and safe cities
IP integration has brought forth two major technologies, smart buildings (energy efficient and green) and safe cities. Compared to Taiwan, most countries safe cities have developed at a much slower pace and at a smaller scale.

12. Factors accelerating change
Challenges in product value and IP network applications is accelerating industry changes, whether it is the reshuffling of major security component manufacturers and the rise of Hilsilcon; the restructuring of foreign companies and traditional distribution channels; the convergence of IT channels that are rapidly entering the security market; or Asian manufacturing companies in China, Taiwan and South Korea that are facing pricing or technology reshuffling and replacements.

13. Fierce competition
As China's cheap products pour into the international market, the result is most companies have earned little. Domestic sales account for most of Hikvision and Dahua's profits.

European apparel retailer expands RFID rollout to minimize loss

European apparel retailer expands RFID rollout to minimize loss

Editor / Provider: Checkpoint Systems | Updated: 5/29/2013 | Article type: Commercial Markets

European fashion apparel retailer C&A in Germany recently expanded its RFID system for retail loss prevention and inventory tracking from five to 25 stores. As part of the C&A project, Checkpoint Systems is providing RF/RFID antennas, POS solution, inventory management software and consulting services. C&A already implemented source tagging with Checkpoint for RF electronic article surveillance several years ago, as a stepping stone for a potential RFID deployment.

The aim of the project is to ensure that the merchandise is available on C&A store shelves in the right color, size and fit. Implementing RFID in store means that retailers are able to manage inventory more efficiently and enhance loss prevention efforts. C&A selected Checkpoint for the project to analyze processes and procedures for store deliveries, replenishment and inventories.

“The objective is to improve the movement of merchandise from the supply chain to the store and from the back room to the sales floor inside the store,” said Joachim Wilkens, Supply Chain Development, C&A Group. “We have already noticed a clear reduction in out of stocks and increase in the availability of items on store shelves for purchase by our customers where the Checkpoint RFID solution has been installed.”

Checkpoint's AutoID software provides real-time accurate inventory visibility in the receiving area, in the back room and on the sales door. On a day-to-day basis, this means that C&A store employees are able to cycle count with a Motorola handheld RFID reader, equipped with inventory management software, allowing employees to maintain accurate inventory. The software's integrated reporting facility includes sales, stock and replenishment data for the apparel retailer to get real time and full visibility of its merchandise and sales.

Checkpoint's RF/RFID exit door solutions for C&A deliver loss prevention and inventory visibility, and have been designed with aesthetics that fit in the apparel retail environment. Either discreetly attached to the ceiling or installed on each side of shop doors, the solution enhances loss prevention integrity as the antennas will only alarm if an item that has not been paid for moves through the store's exit doors.

POS in stores were equipped with the RFID reader solution, employees can place several items onto the counter simultaneously, where they are automatically read and processed during the transaction. This reduces the risk of an employee forgetting to scan an item. The RF/RFID labels are then deactivated by Checkpoint's deactivation solution, enabling consumers to walk out of the store without setting off alarms.

 “As apparel retailers and brand owners increasingly adopt RFID-based solutions, they are looking for scalable, deployable and operational solutions,” said Per Levin, President, Shrink Management and Merchandise Visibility Solutions, Checkpoint Systems.

First Page< Prev< | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 >Next >Last Page