Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

Nordic ID Monitor Self monitoring system. Nordic ID Monitor –self monitoring system BACKGROUND There is new legislation for controlling food quality and.
Communication is the way information is sent and received Business success depends on clear and effective communications within and between organisations.
Mobile GIS.
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 16 Integrating Wireless Technology in business.
Presentation on RFID and GPS
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
Parking Space Finder Lucia Wiguno Thursday, April
Near Field Communication By Van Logan HTM 304. What is Near Field Communication Short range wireless communication technology between electronic devices.
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin BUSINESS PLUG-IN B20 Mobile Technology.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Topic 6 – Wireless Technology and handheld devices 1)TechMed scenario covers The uses of wireless technologies and handheld devices In the scenario: “Some.
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
Basic Data Communication
Communications & Networks
Your Interactive Guide to the Digital World Discovering Computers 2012.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Module Designing Computer-based Information Systems
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Copyright 2005 Agilis Systems, Inc. All rights reserved. intelligent Business Integration System Agilis Systems, Inc. Phone: (314) Fax: (314)
A questionnaire is a effective way of gaining information quickly and directly from an audience, and the results from a questionnaire can be displayed.
Objectives Overview Discuss the purpose of the components required for successful communications and identify various sending and receiving devices Differentiate.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
DATA COLLECTION METHODS CONTENT PAGE How data is collected via questionnaires. How data is collected via questionnaires. How data is collected with mark.
Data Collection Methods Libby Wise Contents Content Questionnaires Optical Mark Recognition Sensors Optical Character Recognition Bar codes Quick Response.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
DOES YOUR BUSINESS MAKE USE OF A NEARMISS SYSTEM?  Is your Nearmiss Register stored electronically in a safe and secure centralised location?  Can ALL.
Ignite Presentation: Near Field Communication Harry Yang.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
By Blake Stratton. Data Chapter The questionnaire is Printed on paper. People write or tick the boxes. Someone needs to type it in the computer. Some.
How Does BlueStar Define Mobility? What is Mobility? Mobility can be a broad term and mean different things to different organizations. It may best be.
GPS Survey Equipment City Planning Construction Environmental Studies.
Business Driven Technology Unit 4 Building Innovation Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
OCR CAMBRIDGE NATIONALS UNIT 1 - UNDERSTANDING COMPUTER SYSTEMS DATA CAPTURE METHODS.
. There are 2 ways in which Cable Ties can use the technicians smartphone to track their current location. 1. GPS – uses satellites to triangulate the.
OCR CAMBRIDGE NATIONALS UNIT 1 - UNDERSTANDING COMPUTER SYSTEMS DATA CAPTURE METHODS.
Contents Introduction What are Location-based services Working of Location-based services Location Tracking Technologies Power profiling a mobile phone.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
An intro about wimax and gps. INTRODUCTION WiMAX, the Worldwide Interoperability for Microwave Access, is a telecommunications technology that provides.
Unit 1 Understanding computer systems: How to work with information and data to meet specific business needs OCR Cambridge Nationals in ICT Level 1/2 ©
Payment systems. Debit or Credit cards  Let the customers pay by taking money directly form their account  Allow the money to borrow the money and the.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
MY NEST A TECHNOLOGICAL OVERVIEW. NECKLACE Reason: Hidden Less like being tagged and branded (jail)
Location-Sensing and Location Systems 1. A positioning system provides the means to determine location and leaves it to the user device to calculate its.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Unit 2 Technology Systems
English for Advance Learners I
Implications of Digital Technology for Business and Customers
NFC AND WIRELESS COMMUNICATION STANDARDS
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
Electromagnetic Spectrum
Electromagnetic Spectrum Notes
Presentation transcript:

Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable Ties technician to a customer. O There are many different types of automated data technologies including: 1. Bar codes 2. Matrix bar codes 3. RFID tags 4. Near Field communications 5. GPS

Cable Ties Automated Data Capture O Bar codes 1. All packages being delivered will have a bar code on them. 2. The bar code contains data that can uniquely identify the item. 3. When the bar code is scanned by the technician’s hand-held computer, the data is read and sent to Cable Ties’ network to confirm delivery.

Cable Ties Automated Data Capture O Matrix bar codes. 1. Matrix bar codes have data coded in two dimensions and are also known as QR (quick response) codes. 2. This code consists of black modules arranged in a square pattern on a white background, which can carry more data and can be read much faster than a conventional bar code. 3. QR codes have in recent years become more commonly used in packaging items for delivery, because they can be read by a variety of hand- held devices and can link directly to the business’s network.

Cable Ties Automated Data Capture O RFID tags 1. Radio frequency identification tags – are small devices that use radio waves to transfer data from the tag to the computer system, in order to identify it. 2. RFID tags - could be used by Cable Ties to automatically track and identify packages as they move around their warehouse. 3. Cable Ties could use RFID to ensure the correct package is put onto the correct technician’s van, ready for delivery to the customer. 4. RFID tags are more secure bar codes, because they smaller, easily attached, can be read at a distance, are not easily damaged and can set off an alarm if they are removed from the warehouse.

Cable Ties Automated Data Capture O GPS – Global Positioning System. 1. GPS is a satellite based system used to find positions and locations anywhere on the Earth. 2. The location information is received by the technicians smartphone via signals from satellites. 3. This means the location of the technician can be monitored by Cable Ties. 4. A GPS device records its location at set intervals and this data can be transmitted wirelessly (3G) back to Cable Ties’ computer network. 5. This data can be stored on Cable Ties’ computers and displayed on a map, to show where the technician has been.

Other Automated Data Capture O Near Field Communications (NFC) 1. Near field communications – are used in smartphones and credit cards to create radio links over a very short range. 2. NFC devices can be used to quickly pay for goods, by waving a phone/credit card close to a receiver. 3. Payment is contactless and quick.

Why use automated data capture methods? O When collecting data for use in a computer system, various factors will affect why automated data capture is chosen. 1. Nature of information - simple text, quicker than a human writing it down. 2. Cost – hardware compared to humans 3. Ease of use– Easy to automatically collect data. Bar code/RFID on package/GPS System. 4. Security – Easier to track and monitor packages. Back up data on the computers to prevent loss.

Why an employer may use GPS to monitor its employees 1. Employees feel safer/protected. 2. Employer can track the employee is on schedule and contact a customer to tell them the technician is on the way to them. 3. Employer has a legal “duty of care” towards its employees. 4. Employer shows it is taking care of its employees 1. Should an employer track employees during their breaks? 2. Is it spying on employees, should you trust them? 3. Could it be used to gather evidence against an employee if they weren’t where they should be.

Monitoring of workers by employers MethodDescription CCTV Cookies Key logging Telephone calls Mobile phone positioning