You are at : Search > Articles Search Results

Articles Search Results

272 Articles and 252 related Products found for RFID

Security innovations to be driven by compliance

Security innovations to be driven by compliance

Editor / Provider: Memoori Business Intelligence | Updated: 6/7/2013 | Article type: Hot Topics

Memoori Business Intelligence recently interviewed Adlan Hussain, Global Head of Marketing at CNL Software, to discuss innovations in security in the next five years.

1. Where will the major innovations in security come from in the next 5 years? Let us start by stating the speed of innovation in this internet era makes it difficult to predict innovation for five years forward. There are trends such as processors and storage for computers that will get substantially smarter and cost less, but when we talk about innovation, we are thinking about game changing technologies that will disrupt the industry. We think two things will drive key changes in security: technology and compliance;

Compliance: Large-scale solutions are becoming ever larger and with a mix of private and public applications and devices, there is an even stronger need for truly intelligent front-end software solutions managing authentication as well as compliance to pre-determined memorandums of understanding. Armed with logical capabilities to use public systems in the event of an emergency, we are seeing safe city projects embracing the idea of connecting security systems from all the schools in their district for example, but this is dependent on the ability to manage and enforce compliance through strong software technology.

Evidence trail, audit trails, hardened data retrieval and export, authentication, potentially through logical gateways will all be the norm within the next few years as system owners recognize that software solutions can quickly, consistently and cost effectively process the huge amounts of data generated from their security systems. With the real estates growing to hundreds of thousands of devices and operators, technology is fundamental to managing and ensuring the compliance to all laws and procedures.

Technology: The two main technologies that will drive innovation are highly linked. Firstly, hardware will continue to evolve radically with more and more networked devices delivering ever-increasing capability. Secondly, the advancement of integration and management software needed to manage all these intelligent devices on the network.

A good example would be surveillance cameras. The growing capacity to store footage locally means that soon terabytes of storage at the edge will be an affordable option. With advances in analytics, the camera will have its own recording “rules” managed by a main suite of programs deciding: what recordings stay at the edge, what goes to a central library and what is deleted. This will not be a man managed video real estate, but a computer program that uses risk and probability analytics to determine what stays and what goes.

While this sounds a radical step, it is not at all and quite a few former NVR suppliers are already moving their systems from centralized recording to recording at the edge or on a managed set of SCSI disk libraries that take recording directly from the camera. This increases performance, reduces the bottleneck created at centralized servers and decreases the overall cost of a solution, while simultaneously reducing bandwidth requirement. Now that cameras are moving towards extreme high image densities, intelligent management of locally held video data will emerge as one of the newest and most important innovations that will eradicate the current DVR and NVR mentality.

Looking at access control and winding forward to when all the ironmongery needed for access control for example is network attached, powered by network connection and will probably include a mass of new devices managed by the access control system. We see that it is no longer a card presented to a door but can be a phone, tablet, RFID, biometric, VPN; in fact, the whole real estate of authentication ought to move to a self-managed model, reducing costs and need for security guards or personnel staff.

While it is difficult to look beyond the next twelve months to see what is going to happen in hardware. VMS and ACS systems as we know them are already being surpassed by smarter technologies, solving bigger problems on a wider scale. It is easy to forecast that existing suites of VMS or ACS applications will either get smarter or die a death as standalone applications.

Just like in the IT world, siloed applications died when users realized they could manage their businesses much better with integrated suites that improved company efficiencies and reduced costs. In a world where the demand to do more for less is increasing, the only fact we can be sure of is that this is a perfect environment for technology. Reducing cost has to be based on reduction of overheads, but without increasing the risk.

What we can say is it is unlikely to be the traditional installer equipment manufacturer who creates these innovations. The innovators will be those forward thinking manufacturers who are prepared to defy the past and provide new, smarter and cheaper hardware, which will require new software solutions to harness their intelligence.

2. Is the security industries' resistance to change creating opportunities for Startup businesses? For other industries, a reluctance to invest in innovation may only affect operational efficiency offered to clients, but in the security space, it means those intent on causing harm are able to catch up; and this is not good for any of us.

As we have seen in the last decade, the majority of this disruptive innovation will continue to come from smaller, agile and entrepreneurial companies. This is especially true in the electronic security industry, where the larger companies are often very cautious to adopt anything new.

Typically, these large organizations prefer to acquire technology rather than to risk the development process. This is good news for bright minds, as it leaves the door open for them to create game changing innovations that can help to secure each and every one of us. As we have seen ourselves, once a technology is proven and is seen to be commercially viable, there are plenty of companies who like to follow genuine innovators.

If you want to prove this, the next time you attend a tradeshow, walk down the back of the hall and look at the small shell scheme stands, I can assure you that you will find far more innovation there than you will on the manufacturer islands at the front of the hall. We are also seeing large companies offering these small start-ups money to invest into their innovation; the value to them is an early opportunity to look for the next new thing with less risk.

3. As platforms for sensing and analyzing data, video cameras, security sensors, biometrics etc has enormous potential. How will they fit into the ‘Internet of Things'? Firstly, as with the internet the security industry is finding that the real value lies not in the hardware or the device you are using, but in the software that is pulling everything together. Analytics or biometrics on their own will provide part of the picture, but pull them together with other systems, apply some intelligence and suddenly you have a stronger, tighter defense and improved security system.

Secondly, the move to the cloud will see a lot of change within the electronic security industry and will provide opportunities for new ideas and companies to grow, who offer a better service for less. How these two tends will meet will be interesting and PSIM will play a role here. Limited bandwidth, edge storage, coupled with rich data will mean an intelligent engine will be needed to ensure only the most relevant data is pushed to a reducing number of security operators.

Identive launches online training program

Identive launches online training program

Editor / Provider: Identive Group | Updated: 6/7/2013 | Article type: Security 50

Identive Group, a provider of solutions and services for the identification, security and RFID industries, announced that the award winning training programs for its Hirsch access control and security systems are now available online. Targeted online courses are available to introduce Identive products and solutions to new users, explore the feature and capabilities of new technology or enhance users' skills and knowledge. This new online offering allows dealers, channel partners and users to complete courses at convenient times and at their own pace as an alternative to attending live classes at Identive's training facilities in California and Germany.

Identive's online access control courses encompass the full breadth of topics included in the Company's classroom-based training program, including:
- Velocity Security Management Software System Administration;
- System Architecture;
- Optimizing System Design;
- Controller Capabilities and Installation;
- Wiring and Wire Requirements;
- Locking Systems and Lock Power Calculation;
- Readers and Biometrics; and
- Surveillance Video and Other Integrations.

“Our new online learning program gives customers and channel partners significant flexibility to obtain the knowledge they need to be successful with their security projects,” said Scott Chillemi, Technical Training and Publications Manager of Identive. “Educating technicians and front-line users is key to successful system implementations and produces long-term benefits. Training is critical to allow our partners to design bid and install their systems faster and more smoothly, limit expensive callbacks and corrective changes, and deliver more satisfactory performance. Our online courses eliminate barriers to obtaining training such as travel costs and time restrictions to ensure that our end-users can achieve optimal results with their systems.”

Identive's online training courses are available to customers and dealers globally and meet the continuing accreditation requirements of the Hirsch certification program.

Abu Dhabi seaport and industrial zone set sail to advanced access management

Abu Dhabi seaport and industrial zone set sail to advanced access management

Editor / Provider: CEM Systems | Updated: 5/31/2013 | Article type: Infrastructure

The Khalifia Port and Industrial Zone (KPIZ) in Abu Dhabi recently deployed CEM Systems, a Tyco Security Products company, access control and gate management system to secure its perimeters. The access control system consists of 700 card readers and fingerprint readers, portable card readers, and more than 300 PoE door interface units (DIU), were installed by Tyco Fire & Security in United Arab Emirates.

Khalifa Port was officially opened in December 2012. The port is crucial to the Abu Dhabi Ports Company megaproject which includes Khalifa Industrial Zone Abu Dhabi. Featuring the latest technology and designed to accommodate the world's largest ships. Upon completion of all construction phases, the port will be at an estimated size equivalent to two-thirds of Singapore.

“This was an exciting yet challenging project for CEM who delivered not one but two systems for the port; the access control system and a highly customized gate management system, providing high level integration to multiple port security systems to ensure the monitoring and control of vehicles coming onsite,” said Philip Verner, Regional Sales Director, EMEA, CEM.

The gate management solution integrates with a number of third party systems all interfaced to ensure multiple checks are made before a vehicle can enter site. The driver first swipes their card then passive or active long range RFID tags are used on trucks and light vehicles and then finally ALPR recognition is utilized and the gate opens. “Khalifa Port required a highly secure and flexible access control system, which could be used for more than just access control” said Craig Menzies, Security Division Manager, UAE, Tyco Fire & Security.

The multi-technology IP card readers installed at the port are IP 66 rated to protect against dust and water. The reader features a keypad for additional PIN code security, and features an internal database for offline card validation. The database holds up to 200,000 card holder records internally and up to 8,000 records offline. This means that should communication be temporarily lost at the seaport, staff can still validate cards throughout the port at all times.

Fingerprint readers will also be installed on critical doors/areas throughout the port. For high security areas users will be prompted for three identity checks (card, PIN and biometric verification) using one device. Being such a large and expansive site, the port required mobile security. The portable reader is ideal for roaming security. The reader can be used at remote port sites or temporary entrances which have no power during the construction phases. 

PoE DIUs was chosen by the port authorities to ensure cabling was kept to a minimum. The DIU utilizes PoE technology to power readers and heavy duty maglocks on two doors. This created sizable cost savings on the project as it eliminated the need to fit mains power supplies/ fused spurs above each door. The security management system was also used to its maximum efficiency taking advantage of software applications such as alarm event display, visual image pass ID badging system and visitor management module

Assa Abloy/HID tags OK'd for use in explosive environments

Assa Abloy/HID tags OK'd for use in explosive environments

Editor / Provider: HID Global | Updated: 5/31/2013 | Article type: Security 50

HID Global announced it has achieved ATEX certification for its field-proven Logi Tag family of industrial RFID tags that are highly water, chemical and shock resistant, and withstands peak temperatures. This certification adds to the company's expansive offering of innovative IN Tag and industrial Glass Tags that are certified for safe use in potentially explosive environments.

ATEX* certification validates that HID Global RFID tags operate without danger of directly causing or contributing to an explosion when used in offshore drilling platforms, petrochemical plants, mines, flour mills and other flammable environments. This also extends to other process industries in which there is a mixture of gases, vapors, mists or dust in the air that can ignite at specific temperatures or under certain operating conditions. ATEX certification ensures safe deployment of automated systems in these potentially hazardous conditions and also validates that HID Global's RFID tags perform while maintaining surface temperatures low enough to prevent the risk of ignition.

“Pursuing ATEX certification for our tags is an example of how HID Global works to anticipate and exceed customer needs across a wide range of environments and use cases,” said Richard Aufreiter, Director of Product Management for Identification Technologies at HID Global. “Our integrator partners and their customers must meet rigorous safety standards for their complex systems, and HID Global's RFID tags that are pre-certified to meet those standards help organizations save time and reduce costs.” HID Global and its worldwide network of integrator partners help end customers optimize data accuracy, achieve compliance and optimize critical systems by employing RFID tagging products that align with the demands of a broad spectrum of industries and applications.

*From the French Appareilsdestines a etreutilises en ATmospheresEXplosives, which translates as “equipment cleared for explosive environments.”

Changing tides

Changing tides

Editor / Provider: John Shi, a&s Editorial Director | Updated: 5/29/2013 | Article type: Hot Topics

With the successful conclusion of the three major international physical security trade shows ISC, SECUTECH, and IFSEC this year, new waves of change rippling through the industry were reflected at the show floors. Here are some major trends observed at the exhibitions:

1. Regional market shifts
The US security market is rebounding especially in the education and government vertical markets, with school administrators and parents being especially supportive of security investments. The stabilization of the US economy and the conclusion of the presidential elections, has contributed to the increase of security budgets. In contrast, the European market appears to be more conservative. Nevertheless, Northern Europe, Germany, and Eastern Europe markets still remain promising. The Middle East's security demands are driven by its continual infrastructure investments. There is also a higher quota for IP applications in this region, as the technology has not been implemented in the past.

2. High-end market saturation
Affected by tightened security budgets and a highly competitive market, the security industry's high-end market is gradually becoming saturated. Manufacturers have taken two extreme approaches, with some climbing upwards to even more sophisticated markets, such as Genetec's migration from VMS to solution-based projects, or Nice Systems promotion of PSIM products highlighting event management capacities. Others have chosen to move into entry-mid level markets, for instance Milestone Systems's release of Arcus, an entry-level VMS that can be embedded into cameras or NVRs. Axis Communications has also released cameras with front-end storage and back-end cloud services, while many other companies have promoted price/performance ratio products.

3. No new technologies
There has been a lack of major developments in video surveillance technology and products. Instead, video surveillance cameras have turned to more functions, easy-installation, user-friendly, and maintenance-friendly.

4. Diverse back-end storage
Unlike the CCTV era, where DVRs was the only storage method, there are now five different types of storages—storing directly on camera memory cards (decentralized system), server grade storage, NAS, embedded NVR, cloud-based storage or services. How these storages technologies will evolve in the future is worth following up on.

5. Access control shines
Similar to the video surveillance industry three to five years ago, the access control sector is quickly shifting towards IP. Besides integration demands, of special interest is the integration of new technologies, for instance, wireless door locks that are easy to install, RFID technology for asset management or employee management, biometric identification (including fingerprint, facial and iris), identity management for government and financial industries, and lastly NFC. The introduction of these technologies will urge the upgrade of access control devices, and drive market adaption, especially in universities, hospitals, and government agencies.

6. HD demand evident
IP-based video surveillance has established itself as the mainstream technology in U.S, due to good IP infrastructure and mature cloud services. However, labor remains expensive in U.S, which is why IP over coaxial cable solutions is still highly popular. SDI technology is still in the minority, but there is still market for the product. Some have observed the lack of Internet concepts among most engineering companies and no Internet maintenance at the end-user level. Compared to the limitations of HD-SDI transmission, storage, and costs for one cable per camera, Taiwan IC company's ccHDtv solution can connect 16 cameras over 500 meters.

Major European security markets that have made large investments in CCTV in the past, such as UK, Germany and France, are more keen on HD-SDI. Although, UK's acceptance for IP technology has increased since last year, demands for HD-SDI remain high. Recently London upgraded 4 million analog cameras to HD.

7. Civilian security
The rapid growth of smartphones and hand held devices has propelled the demand for home security and cloud-services. Companies trying to tap into the home market include telecommunication companies, Internet companies, civilian cloud-based services, and security companies. The targeted users are homeowners and SMBs, which is expected to spur large demands for entry-level surveillance cameras, and even impact 4-channel DVR manufacturers market and distribution channels.

8. Chinese manufacturers
Hikvision Digital Technology's performance in many countries reflects the results of setting up local branches, while Dahua Technology has invested heavily at major security trade shows, greatly increasing its visibility.

9. Asian manufacturers
Asian manufacturers have increased their presence at international trade shows, by staging independent exhibition booths or joining country pavilions.

10. US analog market
Although analog video surveillance has a 70 percent market share in U.S, profits remain extremely low. Will it be possible for a professional manufacturer to take on this highly standardized field in the future?

11. Smart buildings and safe cities
IP integration has brought forth two major technologies, smart buildings (energy efficient and green) and safe cities. Compared to Taiwan, most countries safe cities have developed at a much slower pace and at a smaller scale.

12. Factors accelerating change
Challenges in product value and IP network applications is accelerating industry changes, whether it is the reshuffling of major security component manufacturers and the rise of Hilsilcon; the restructuring of foreign companies and traditional distribution channels; the convergence of IT channels that are rapidly entering the security market; or Asian manufacturing companies in China, Taiwan and South Korea that are facing pricing or technology reshuffling and replacements.

13. Fierce competition
As China's cheap products pour into the international market, the result is most companies have earned little. Domestic sales account for most of Hikvision and Dahua's profits.

European apparel retailer expands RFID rollout to minimize loss

European apparel retailer expands RFID rollout to minimize loss

Editor / Provider: Checkpoint Systems | Updated: 5/29/2013 | Article type: Commercial Markets

European fashion apparel retailer C&A in Germany recently expanded its RFID system for retail loss prevention and inventory tracking from five to 25 stores. As part of the C&A project, Checkpoint Systems is providing RF/RFID antennas, POS solution, inventory management software and consulting services. C&A already implemented source tagging with Checkpoint for RF electronic article surveillance several years ago, as a stepping stone for a potential RFID deployment.

The aim of the project is to ensure that the merchandise is available on C&A store shelves in the right color, size and fit. Implementing RFID in store means that retailers are able to manage inventory more efficiently and enhance loss prevention efforts. C&A selected Checkpoint for the project to analyze processes and procedures for store deliveries, replenishment and inventories.

“The objective is to improve the movement of merchandise from the supply chain to the store and from the back room to the sales floor inside the store,” said Joachim Wilkens, Supply Chain Development, C&A Group. “We have already noticed a clear reduction in out of stocks and increase in the availability of items on store shelves for purchase by our customers where the Checkpoint RFID solution has been installed.”

Checkpoint's AutoID software provides real-time accurate inventory visibility in the receiving area, in the back room and on the sales door. On a day-to-day basis, this means that C&A store employees are able to cycle count with a Motorola handheld RFID reader, equipped with inventory management software, allowing employees to maintain accurate inventory. The software's integrated reporting facility includes sales, stock and replenishment data for the apparel retailer to get real time and full visibility of its merchandise and sales.

Checkpoint's RF/RFID exit door solutions for C&A deliver loss prevention and inventory visibility, and have been designed with aesthetics that fit in the apparel retail environment. Either discreetly attached to the ceiling or installed on each side of shop doors, the solution enhances loss prevention integrity as the antennas will only alarm if an item that has not been paid for moves through the store's exit doors.

POS in stores were equipped with the RFID reader solution, employees can place several items onto the counter simultaneously, where they are automatically read and processed during the transaction. This reduces the risk of an employee forgetting to scan an item. The RF/RFID labels are then deactivated by Checkpoint's deactivation solution, enabling consumers to walk out of the store without setting off alarms.

 “As apparel retailers and brand owners increasingly adopt RFID-based solutions, they are looking for scalable, deployable and operational solutions,” said Per Levin, President, Shrink Management and Merchandise Visibility Solutions, Checkpoint Systems.

Four cross-industry technologies changing global mobility

Four cross-industry technologies changing global mobility

Editor / Provider: World Economic Forum and Boston Consulting Group | Updated: 5/28/2013 | Article type: Hot Topics

By 2025, innovations based on more integrated cross-industry cooperation that capitalizes on mostly existing technologies and preventive data analytics will radically improve how people travel and transport goods, according to a new report by the World Economic Forum, produced in collaboration with the Boston Consulting Group.

Based on the Forum's Connected World project, a yearlong research effort involving more than 50 leading companies from the travel, transportation, and information and communications technologies (ICT) industries, the report identifies several innovations that hold great promise for revolutionizing the travel and transportation ecosystem. Some of them have the potential to provide significant business opportunities and societal benefits. From an initial list of 100, the following four have been highlighted:

  • An integrated proactive intermodal travel assistant would create one seamless ticket across road, railway, and air. Users would access the solution through voice- or gesture-controlled data glasses (or even contact lenses) that would offer real-time information on travel plans. Big data and artificial intelligence would allow a user confronted by a major flight delay, for example, to select from a variety of travel options -- possibly a flight to an alternative airport and a car rental.
  • A condition-based megacity traffic-management system would integrate and process up-to-the-minute information from vehicles, travel infrastructure, individuals, surveillance cameras, and the environment to manage traffic in the largest cities around the world. Before congestion on a major highway hits problematic levels, for example, the system would automatically reroute drivers or adjust tolls to encourage alternate routes. Services such a system could offer also include forecasting air pollution levels, blocking access to areas caused by environment or emergency issues, and even smart parking. Rio de Janeiro in Brazil has already rolled out such a system three years ago, gathering traffic information from 400 surveillance cameras. China's Langfang city has also rolled out a similar smart traffic system recently, utilizing 178 cameras. Current research indicates the market for smart traffic systems could reach US$ 12 billion by 2025.
  • A fully automated check-in, security, border-control, and smart-visa system would harness technology to eliminate the long lines at airport screening points and border crossings, simultaneously enhancing security. Visa applications would be standardized across multiple countries with data available to officials in all participating nations. Check-in for a flight would be expedited by replacing paper documents with an electronic passport, as well as biometric traveler identification through fingerprints, facial recognition, or an iris scan. New sophisticated behavioral risk-based screening systems would speed up security checks, allowing luggage to be scanned with liquids still packed. And boarding and customs processing would be made dramatically faster by the same biometric identity checks. While Dubai has one of the most advanced automated iris checking systems implemented since 2012, the world is still far away from implementing a fully automated check-in system at an airport. The International Air Transport Association's has scheduled pilot projects in 2014.
  • A tracking and transparency-based logistics optimizer would solve some of the thorniest "last-mile" challenges associated with product deliveries. Under this system, cheap and ubiquitous RFID chips would be incorporated into product packaging and used to track not only the real-time location of items as they are moved but also factors such as the average temperature during shipping and the CO2 emissions associated with the production and shipping of the product. Such a system would both allow more efficient transportation of products and give consumers valuable information on the quality and environmental impact of the items in their shopping carts.

"These solutions will be game changers, and the technological know-how to make them a reality largely exists," said BCG Senior Partner Antonella Mei-Pochtler, who is also codirector of the Connected World project. "It is only through an integrated approach across industries and through active support by the public stakeholders that we can realize them. Business leaders need to create the prerequisites; strengthening data analytics is one of them."

The Forum and BCG are currently working with companies, governments, and other stakeholders throughout the world to map out plans for developing these solutions.

Challenges to Implementation Are Surmountable

Although many of the technologies exist today, successful implementation will depend on surmounting several institutional barriers. The main obstacles, according to the report, are a lack of cooperation across industries and various public agencies. At the same time, the challenges that typically surround hyperconnectivity -- including data ownership, data privacy, and resilience against cyberattacks -- create additional hurdles. The Forum's push to bring corporate and government leaders together to promote development of these solutions is aimed at addressing such challenges.

In addition to the four highlighted solutions, the report notes eight others for their potential to shape the future of travel and transportation. They include: holographic communication platforms, mobile living rooms and virtual offices, integrated intermodal mobility providers, driverless swarm-car service, logistics drones, mobile pop-up hotels, preventive vehicle-maintenance systems, and vehicle operator and passenger health analytics.

The Connected World project and report are part of the Forum's Hyperconnectivity Initiative, which aims to provide insight into how the increasing prevalence and speed of connections around the globe will impact issues such as security, cybercrime, and privacy.

HID Global earns security printer certification from global standards body Instergraf

HID Global earns security printer certification from global standards body Instergraf

Editor / Provider: HID Global | Updated: 5/24/2013 | Article type: Security 50

HID Global announced that its card manufacturing operation in Rastede, Germany has earned the Security Management System for Secure Printing certification from Intergraf, the global standards body for the security printing industry. The certification validates the achievement of a strict security standard for security printers based on data security, print quality and processes as well as on-site facility security. HID Global is one of only a few card manufacturers producing identity credentials for the government-to-citizen market to hold this distinctive status in the world.

“Global security concerns are driving nations to invest in ultra-secure ID systems, which require dedicated security at every step of development and deployment, including the complex high-security printing phase,” said Rob Haslam, vice president of Government ID Solutions with HID Global. “While our highly skilled and experienced team has been delivering state-of-the-art printing at this facility for decades, this certification means that our customers can trust their ID credentials and equipment are built to the highest standards of printing within the card manufacturing market.”

The Rastede facility was accredited after a certification process that included screening, risk inventory and a security audit by an accredited certification body. The certification applies to Rastede's entire product line, including plastic cards, ID badges, ePassport datapages and chip cards (including RFID). Additionally, the auditors certified HID Global Rastede's ID production, access control and loyalty systems as well as its card production equipment and all related services.

“Our dedication to achieving maximum security in the manufacturing and printing of secure documents is evident in major Government ID programs worldwide, including the U.S. Green Card, Angola National ID Card, Italian Federal Police Card, Saudi Arabia National ID Card and Costa Rica Foreign Resident Card,” said Haslam.

HID Global's European manufacturing and R&D operations also includes a facility in Galway, Ireland that designs and produces electronic passport inlays and datapages as well as electronic ID components. The high-security facility is independently certified through the Common Criteria Standard EAL 5+ by the BSI and it complies with Quality Assurance System ISO9001: 2008 Certificate issued by SGS.

152 US veteran affairs hospitals track assets in real time with RFID

152 US veteran affairs hospitals track assets in real time with RFID

Editor / Provider: Checkpoint Systems | Updated: 5/13/2013 | Article type: Commercial Markets

Oatsystems, a division of Checkpoint Systems has been selected as a subcontractor to HP Enterprise Services' maximum value US$543 million indefinite delivery indefinite quantity real time location system (RTLS) contract with the U.S. Department of Veterans Affairs (VA) to procure and deploy a RFID asset management system at 152 of its hospitals that will assist in the automation and improvement of operations and veteran healthcare services. Oat will supply RFID software and readers to more than 7,500 read points across VA medical centers.

“Oat's passive RFID solutions provide us with up to the minute inventory and asset data across multiple facilities, supporting our vision to improve health care efficiency across the VA enterprise,” said Kimberly Brayley, Director, RTLS Project Management Office, Veterans Health Administration.

Oat's RFID software platform and RFID enabled use cases provide the flexibility needed to track a wide range of assets within a medical facility, from capital assets to low cost consumables. The technology enables instant location and up to the minute availability of medical assets for primary care (incubators, diagnostic supplies, sterilizing equipment) and facility operations (laboratory equipment, uninterruptable power supplies, biological safety cabinets), improving patient care while reducing excess inventory. Oat passive RFID solutions will also be used to track IT assets (smartphones, laptops, network routers) across VA facilities, to improve operational efficiency and asset utilization.

“Oatsystems is a key member of the HP team, as it brings an enterprise class RFID platform, innovative RFID asset tracking solutions and has a broad scale and scope of passive global RFID deployments”, said Don Picard, federal healthcare VP, HP Enterprise Services, US Public Sector.

“Healthcare providers are increasingly deploying RFID and RTLS technology to improve operational performance and patient care, and the VA is leading the way with nationally standardized solutions.” said Prasad Putta, EVP and GM of Merchandise Visibility and RFID, Checkpoint Systems.

Assa Abloy unveils RF-shielding openings

Assa Abloy unveils RF-shielding openings

Editor / Provider: Assa Abloy | Updated: 5/10/2013 | Article type: Security 50

Radio frequency shielding has come a long way since its inception by Michael Faraday in 1836. The method involves the use of copper shielding to absorb radio and magnetic waves in buildings where blocking these emissions from interference is critical. Ceco Door , Curries, Fleming, and Security Metal Products have developed an RF shielding door and frame opening for use in MRI rooms, test labs, emergency call centers, data and IT storage, RFID scanning areas, government, and military facilities. The conductive surfaces of the opening help to restrict interference from local RF transmitters (such as radio towers, radar, and broadcasting units), and, in turn, avoid the compromise of confidential information.

The RF opening consists of the door and frame (up to 4'0'x8'0') with shielded seals and surfaces, a Pemko threshold, conductive caulk, installation instructions, and expert customer support to assist in installing and maintaining this innovative product.

The Assa Abloy Door Group brands have put this product through rigorous testing prior to release, and have certified the opening using Military Standard Attenuation Measurements, as developed by the Department of Defense. The assembly is designed to provide RFI/EMI shielding of 40db at 10 kHz-10 GHz per MIL-STD-285 and was third party certified.

Hybrid versions of this product are available, making the RF shielding opening a one of a kind innovation. The opening is offered with a sound rating of up to STC 50, a fire rating of up to 90 minutes, and a bullet rating up to level 8. Special options such as blast resistance and lead lining can also be produced with the RF shielded opening.

The launch of RF shielding openings aims to assist facility managers, architects, healthcare professionals, and military members with privacy protection where it's needed most, leaving the end user feeling safe and sound.

First Page< Prev< | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 >Next >Last Page