Follett 2500 RFID Training.

Slides:



Advertisements
Similar presentations
NexSentry Imaging Solutions
Advertisements

RFID Access Control System March, 2003 Softrónica.
RFID IN UNIVERSITY OF JAMMU RFID is used in libraries primarily to automate the book handling process including checkout, inventory maintenance, and check-in.
INPUT-OUTPUT ORGANIZATION
JED Microprocessors Pty Ltd Presenting the JED T430 low-cost Projector Controllers Nov 22nd, 2009.
The Widest Range of Bluetooth Barcode Scanners
FieldSpec® HH UV/VNIR HandHeld Spectroradiometer.
Networking By: Matt Motl… Programmer Brent Everson… Programming Mentor.
May 2013 Prepared by the Computer Lab Montgomery County-Norristown Public Library.
M100 M100 Overview Preparation & Testing. M100 Overview  The M100 is a computerized tabulator that optically reads then counts and totals specially designed.
Unit Test Calibration Training
Data Collection Device (DCD) Job Aid – Burn-in In DOIS Log onto DOIS. Click Options on the DOIS menu bar. Click on Utilities. Click DCD Software Burn-In.
RFID & III API MENA IUG 3rd Annual Meeting November 18 – 19, 2008 American University of Sharjah United Arab Emirates Huguette Yaghmour Director of Library.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
Virtual Wallet Gates Winkler Yin Shen Jordan Samuel Fei /23/2009 A handheld device that saves time and money through smart budget management and.
A simpler way to shop!. Tuesday, January 31 st 2oo6 Capstone, Spring 2oo6 The system is made up of three different modules: Product Two different types.
Stubbornsoft. Point of Sale Application Retail & POS Management Solution supports bar code readers for faster checkout and inventory control, printing.
Energy Smart Room GROUP 9 PRESENTERS DEMO DATE SPECIAL THANKS TO ADVISOR PRESENTERS Thursday April 19, 2007 Department of Electrical and Systems Engineering.
RFID Implementation in IIT Madras: A Case Study Dr. Harish Chandra Librarian Indian Institute of Technology Madras URL:
Serial Communications Standards (Partly Excerpted from Simpl Primer) Cabling Configuration Protocol.
RFID What is RFID? The Georgetown Experience Technical Considerations
Plex Training. 2 Course Objectives Learn how to Log on and Change Passwords in Plex Learn the Common Functions on the Control Panel Learn how to Log into.
Ethernet Data Gateway EDG Enables Information Boundary-less Over Ethernet.
How To Activate Your New iPod Mini Print Ready Documentation.
DWR-113 FAQ’s 3G WiFi Router.
Introduction to USB Development. USB Development Introduction Technical Overview USB in Embedded Systems Recent Developments Extensions to USB USB as.
BY: ZACHARY ALEXANDER, JT BAGWELL, BOBBY DINI, NIXY OSORIO, DARREN RINGER AND TRENT ROLING SMART ATTENDANCE.
RFID Inventory Management And Tracking System Greg McDaniel Hashem Garner Adam Kesner Thomas Harris.
The physical parts of a computer are called hardware.
Khanh Huynh Project Leader Dat Tu Systems Analyst Sandy Fung Team Representative Patrick de Leon Lead Programmer Ching Fei Chan Documentation Specialist.
RFid Technology TELE 480 Presentation. What is RFid? RFid is an ADC technology that uses radio- frequency waves to transfer data between a reader and.
Radio Frequency Identification The next thing…. Some definitions Self service –Patrons checking material in and / or out themselves either using barcode.
Radio Frequency Identification  RFID technology is made up of a tag and a reader.  Tags used in libraries are “passive” – they do not contain a battery.
A C JOSHI LIBRARY A C Joshi Library is considered to be one of the best libraries of India: Annual budget approx 5 Crores Annual budget approx 5 Crores.
PLVN – Resource Sharing Presentation Presented by: Andrew Powell – General Manager Operations Imran Qazi – Software Development Manager.
Ethernet and Wifi Chapter 7 & 8. Send and Receive Data network adapter or network interface NIC card the most common wired Ethernet network interfaces.
® Features and Benefits V3.1. TurboTag ® Features Temperature logger size of credit card Uses RFID reading protocols with EPC product codes More accurate.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
RFID TECHNOLOGY IN BABARIA INSTITUTE OF TECHNNOLOGY (BIT):an OVERVIEW BY BINAL H JOSHI LIBRARIAN BABARIA INSTITUTE OF TECHNOLOGY VADODARA.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Copyright 2003 The McGraw-Hill Companies, Inc CHAPTER The System Unit computing ESSENTIALS    
Introduction to Vexnet
Modems How They Work. Modem A device used by a PC to communicate over a phone line or cable A device used by a PC to communicate over a phone line or.
JDS5 Training Guide. On Start Up you will see this screen click the OK button Click OK.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Information Management System based on RFID technology in District Court in Warsaw Warsaw 2015.
Revised: 12/16/2015 Prepared by the Computer Lab Montgomery County-Norristown Public Library.
Input / Output Input - An input is data that a computer receives. Computers only work with digital information. Any input that a computer receives.
Computer Basics Just How Does a Computer Work?
Run the on your PC to start the firmware configuration process Run IP Config Tool.
Hardware Configuration Guide Configuring Dongles and Creating Barcodes for Devices Used with VSC.
Introducing RFID system in BRAC University Library.
What does LinkConnect do?
After Construction Name: Per #:.
Introduction to Vexnet
English for Advance Learners I
Wireless Technologies
Always Connected introduces Tigo SMART 3.0 This guide is interactive!
Radio Frequency Identification (RFID)
2N® Access Unit Bluetooth
Introduction to Computers
Welcome to Digital Electronics using the Arduino Board
Network Models, Hardware, Protocols and number systems
Always Connected introduces Tigo SMART 3.1 This guide is interactive!
Instructions for tracking booth sales
- Dylan Leintz - Dr. Davies
Mobile Computing Lecture Materials By Bintang Eka Putera.
RFID used for real-time tracking Physics 490 seminar 4/15/2019
Introduction Communication Modes Transmission Modes
Presentation transcript:

Follett 2500 RFID Training

RFID Overview Radio Frequency Identification (RFID) has existed for over 40 years RFID tags are similar to barcodes, except that books with RFID tags inside can be read without being visible to the scanner. RFID tags can be read one at a time or several at once. This makes checking books in or out faster (including self-checkout stations) and performing inventory much faster. RFID tags can also act as security tags. Lastly, for very large library collections, RFID tags make book return sorting automation possible. How it works: Each book or DVD is labeled with an RFID tag encoded with a unique ID number (just like a barcode tag). RFID readers send out a signal that energizes the tag which in turn bounces back the unique ID code. Once received by the library system, the code can be processed in the same manner as a barcode. One added benefit is that RFID tags are also used as security tags being turned on or off during the check-in or check-out process.

What We Sell ENCODER READER w/ ANTENNA PAD GATES BLADE SCANNER

Follett RFID User Conference Exhibit - “Self Checkout Station” SR10 Follett RFID Reader 1000 Follett RFID Reader 1000 Follett RFID Encoder 1000 Follett RFID Security Gates Follett RFID Blade Scanner

RFID Highlights The Follett 2500 RFID system is the first standard RFID reader with keyboard output that makes the integration of RFID with your existing Destiny Library system as simple as barcode technology. The system provides for easier book circulation (including self-checkout), faster inventory, and simpler security. Book circulation is made easy as 1-2-3 as anyone can 1) start the process and scan their ID 2) select Check-In/Out and pass their books over the RFID pad, and then 3) select Done. It’s that easy and makes Self-Check-Out a breeze. Inventory is multiple times faster as our new innovative Blade Scanner eliminates the need to remove books from their shelves or book carts and dramatically improves scanner read accuracy. Lastly, RFID tags have security built right in, eliminating the need to additional, and costly, EM (electromagnetic) strips.

What We Sell (continued) RFID Security Gates Bolt down to floor, Power up with standard 110v electrical power. An alarm will sound whenever an RFID tag with security set to “On” is passed through the RFID electromagnetic field around the gates.

What We Sell (continued) Honeywell 5100/1300g Special Configuration Required for Encoding RS-232 Interface (Serial Cable NOT USB) 9600 (baud rate barcode) 8 Data, 1 Stop, Parity Odd (Data bit, stop bit, and parity bit) Clear All Suffixes (Clears the CR/LF) Honeywell was able to create us a special barcode that sets all of these values with one barcode. RS-232 SERIAL

Encoder Rear View

Reader Rear View No Power Adapter Required / Runs off USB power.

Reader Front View

Blade Scanner -Flexible Antenna. -Long Battery Life. -Bluetooth Class 2. -Seemless integration with the Bluetooth Smart Reader

Blade Scanner Specifics Follett 2500 Inventory RFID Scanner - Cordless Innovative “Blade Scanner” Design is specifically designed for performing library inventories. Unique Blade antenna is inserted between shelved books “On-The-Shelf” or “On-the-Cart” to maximize RFID tag detection and greater accuracy. All redundant duplicate RFID tags read are eliminated Cordless Bluetooth transmits data for up to 10 meters (33 feet) to the Follett 2500 RFID Reader (required). Lithium Ion Battery allows for full 6 to 8 hour operation Data is them uploaded into Destiny Library Manager via the batch mode function.

Blade Scanner Instructions 1) Blade antenna is inserted between shelved books 2) Select… Button I - Performs a read of the RFID data from the books that are on the shelf and sends the information to the local computer through Follett 2500 RFID Tag Reader. This mode requires that the Follett 2500 RFID Tag Reader is connected to a local PC/Mac. Button II - Performs read of the RFID data from the books that are on the shelf BUT buffers the data inside the Follett 2500 RFID Tag Reader for later transmission to the local computer. This mode does require a Follett 2500 RFID Reader but does not require that the Follett 2500 RFID Tag Reader be connected to a local computer. In such case the Follett 2500 RFID Tag Reader must be powered through a power supply.

Blade Scanner Instructions Button III – Performs a “dump function” of the buffered RFID data held in the Follett 2500 RFID Reader connected to the local PC/Mac. When this button is pressed, the unit looks for saved data from prior buffered inventory scans. If any saved data is found, it is read and routed into the computer, the data is then removed from the saved buffer. This button should only be pressed when Follett 2500 RFID Tag Reader is powered through a local computer. Button IV – The Follett 2500 Blade Scanner loads in Automatic backlight mode. This means that the Blade Scanner display backlight turns itself off automatically if there are no new RFID scans. As soon as there is a new RFID tag scanned, the light comes on. Note: Pressing Button IV will toggle the back light status from Automatic to Always On to facilitate longer battery operation.

CALL DRIVER – (BLADE SCANNER PAIRING) The blade scanner has its own Bluetooth MAC address that is NOT setup out of the box. Connect the reader (grey box) to the LAN port, open notepad, and press buttons 1 & 3 simultaneously. This will output the IP address. Using a browser, type in the IP. Username will always be (admin/admin)

Getting Bluetooth MAC from Blade Press and hold Button 1 and Power, then let go of power and continue to hold button 1

READER DEVICE SETTINGS

Self Checkout The reader unit is configured to be used for DLM circulation command codes. We would need to manipulate the command codes in the firmware to support DTM/DAM circulation command codes. Technical processes for making these adjustments will be available in Tungsten.

RFID Overview Public libraries have changed. Many public libraries now ‘merchandise’ themselves much like retail bookstores with multiple copies of the latest best sellers, focusing on ”giving the patron what they want” with DVDs, eBooks, and community presentations, while still offering a host of research databases and reference support. It has become almost commonplace for public libraries to have self-checkouts, automated book returns, security gates, and more. Bottom-line, Libraries are providing more services with less resources and much of this improvement has been driven by RFID technology.

RFID Tags Sold in rolls of 2000 27 cents per tag $540 for a roll We may offer a encoding service in the future, but currently we are selling blank tags only. Tags can be encoded an unlimited amount of times.

Get Ready To Encode Place RFID Tags on every book in your Collection by using the RFID Encoder with the Serial Barcode scanner device. Simply scan the book’s barcode, wait for the RFID tag to be encoded, then place the RFID tag randomly inside the back or front cover of the book. The EAS security will automatically be set to “ON”.

Tag Placement

RFID Circulation Plug in RFID Reader into circulation desk computer (no software needs to be installed). Check Out books by pressing “Start” then “Check-Out” Scan the Patron card barcode, pass books one at a time over the RFID antenna pad. Select “Done’ when the transaction is complete. Check In books at anytime simply by pressings “Start” and then “Check-In”. Books are then passed one at a time over the RFID antenna pad. Note: The EAS security setting will be turned Off or On as appropriate.

Questions? What do YOU think?