SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Are You Experienced?
Exploring User Experience
in Public Libraries
Barcodes and RFID
Barcodes and RFID?
Why do we need a lecture on them?
Why wouldn’t you want
to know about those
things that are on or in
almost every item in a
library?
I think I understand
barcodes…why not
just study RFID?
The majority of libraries still use barcodes,
especially smaller public libraries. Barcodes
are cheap and have worked for decades.
But is it finally time to consider the next
step?
Take a look at barcode technology:
Barcode Types
Smart barcodes:
the item info is printed on its own barcode
Smart barcodes are easy to implement
(carry and attach it to the item).
But production costs are high, and human
error can cause major problems.
Barcode Types
Dumb barcodes:
the barcode is not pre-linked to a particular item
Dumb barcodes are less expensive than smart
barcodes, less chance of mislinking, better for
certain types of items such as serials and
multivolume sets
But dumb barcodes are more difficult to implement
(the barcode must be attached to an item and then
linked to it, which usually involves transporting the
item to a computer station).
How can you obtain barcodes?
Print them yourself: You control the
process (library systems often provide a
barcode printing function as part of the
Acquisitions or Cataloguing module). But
accuracy and reliability (due to the actual
printing process) may suffer.
Have them printed for you: Accuracy and
reliability should be very high
So how do they work?
If you really want to know, study the next
slide. But I have warned you…
1. Laser beams emitted from the laser diode hit
the polygon mirror and scan a bar code.
2. The light-receiving element (photodiode)
receives the light of diffuse reflection from the
bar code.
3. The diffuse reflection looks like an analog
waveform as illustrated.
4. The bar code reader converts the waveform
from analog to digital (A/D conversion).
5. The bar code reader identifies the
narrow/wide bars and narrow/wide
spaces using digital signals.
6. The bar code reader converts the
signal combination of the bars
and spaces into data according to
the bar code rules (decoding). It
outputs the decoded data to the
external unit through RS-232C or
an equivalent interface.
http://www.keyence.com.sg/topics/barcode/bar_code/t_guide.php
So that’s it?
All the barcode does is make its number
readable by scanner to automate a repetitive
process. Lacking a scanner, simply type in
the number printed on the barcode.
Isn’t that enough?
What could go wrong?
A few annoyances:
1. You must have line-of-sight to read a
barcode with a scanner.
2. Constantly looking for a barcode to scan
and manipulating an item is a repetitive
and sometimes difficult process.
3. It is almost impossible to have Automated
Materials Handling (AMH) with barcodes.
Do barcodes provide
any security?
No. If you are using barcodes you need an
additional security system. The most popular
security system technologies are:
• EM (Electromagnetic)
• RF (Radio Frequency)
• RFID (Radio Frequency Identification)
EM (Electromagnetic)
Targets are strips of metal with magnetic
particles for degaussing (desensitizing and
resensitizing).
Ex. 3M Tattle Tape
Targets (the tape) are passed by an
electrical unit with high–powered magnets to
desensitize (release the security signal) or
resensitize (enable the security signal).
Loads of fun…
RF (Radio Frequency)
Targets (the small tags) are applied to
circulating library materials.
Target cleverly
hidden behind
pocket!
Shhhhh!
To disable the target you cover it using a
card that interrupts the signal so that there is
no alarm when the item goes by the door
gates.
And patrons who
use their pocket
cards as bookmarks
wonder why the
alarm sounds when
they return their
stuff to the library.
Got 'em!
And RFID is a security system?
Radio Frequency IDentification
RFID is a way to store data on a tag
(transponder) that can be automatically
received by a reader when the tag comes
within range of the reader.
And it can also act as a security system!
What is an RFID tag?
A tag contains a silicon chip and flexible
antenna on a plastic label that can be
attached to an object.
What data is on the RFID tag?
In a library capacity, an RFID tag contains
anywhere from 74 to 256 bits of data (can
be more, can be less).
A tag can be write-once or rewriteable.
But most tags include only the barcode
number and no other data (for privacy
reasons…and less data is easier to transmit,
too).
What kinds of RFID tags exist?
• Active tags: tags that have their own
battery power supply
• Passive tags: tags that have no power
supply and depend on a reader to activate
them
Note: Libraries use passive tags. If we
wanted to tag and track whales, we would
use active tags. But that is not our job.
How does a passive
RFID tag work?
1. The reader emits an electromagnetic signal.
2. When a passive tag comes within range of the reader, this
signal excites the tag, and the tag broadcasts its data.
3. The reader converts the radio waves to digital data and
passes it on to a computer.
4. The computer processes the data and performs some action
(checks the item out, stores the data, sounds an alarm, etc.)
Can a reader "read" more than one
tag at a time?
Depending on the anti-collision algorithm,
readers can appear to read several items at
one time. Tags are read in a matter of
milliseconds. Short answer: No
What is the range for a reader to
read a tag?
Security gates need to read from
longer distances -- 24 inches.
The typical reader for
circulation purposes reads
from within 8 inches.
What renders an RFID tag
unreadable?
Wood? –no
Plastic? –no way
Human flesh? –now that’s just gross
I am invincible!
Metal!
Any metal interferes with reception.
(FYI: Damaging the antenna or chip can also render a tag useless.)
Oh oh!
What are the advantages of RFID?
• RFID tags do not need line-of-sight to be read.
• Several RFID tags can be read within a very short
period.
• RFID can act as a security system.
• Self-check is simplified for patrons.
• RFID tags can be read/write (i.e., reprogrammable).
• RFID is less physically labor-intensive for staff to
check in/check out.
• RFID can make possible large-scale automatic
handling of library materials.
• RFID allows scanning items on the shelves without
needing the items removed.
An RFID reader-wand
can scan the shelves to
find items with the
barcodes we wish to find.
Or even collect barcodes.
Too bad those darn
bookshelves are made
out of metal – but since
they don’t cover the tag,
they just slow us down.
They don’t stop us.
What are the disadvantages
of RFID?
• RFID is relatively new for libraries, and
standards are still being developed.
• RFID tags are much more expensive than
barcodes (.25-.50 cents apiece vs. less
than 1 cent!).
• Patrons have (mainly unfounded) privacy
concerns. You know, radio waves and all
that.
“True Confessions” time
At my library we were early adopters of
RFID (c. 2004) and we bet on a vendor that
itself bet on a standard for RFID technology.
But library RFID technology was still
evolving….
And when our vendor was bought by a
larger vendor in 2009, we had to buy…
All. New. Equipment.
Non-technical explanation: the old stuff did
not work with the new stuff.
Libraries have still not reached complete
interoperability with RFID technology, but
the standards process is now helping.
Oh, and besides the new equipment, we had
to re-tag every one of our items! I hope
never to have to do that again…
What did we lose besides money and time?
Well, that about sums it up.
old tag new tag
So how does RFID
security work?
Tags can contain security bits (turned off
and on by RFID circulation reader pads or
self-check machines).
…and an RFID system that can query an ILS
database if it senses an “on” bit item passing the
security gates can quickly show staff what
sounded the alarm (remember that the RFID tag
has a barcode number in memory).
So RFID tags will replace
barcodes, right?
No, not completely.
• RFID tags still fail because they are easy
to damage. Just see how long your tags
last on children’s board books…
• Books with those cool-looking metallic-
base covers also block the signal (so
anything from Danielle Steel and Nora
Roberts!).
• Barcodes are a necessary backup.
RFID and barcodes…inseparable friends.
But RFID is growing…
so be aware
“Considering RFID? Consider This,” by Stephanie Handy: Computers in
Libraries. Vol. 34 No. 9 November 2014
www.infotoday.com/cilmag/nov14/Handy--Considering-RFID.shtml

Weitere ähnliche Inhalte

Was ist angesagt?

Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
musicalmood
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Onyebuchi nosiri
 
RFID for Modern libraries
RFID for Modern libraries RFID for Modern libraries
RFID for Modern libraries
K L universityH
 
RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacy
Shahryar Ali
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
Cecile Tan
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
Positive Hack Days
 

Was ist angesagt? (20)

Bar code VS RFID
Bar code VS RFIDBar code VS RFID
Bar code VS RFID
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
RFID TECHNOLOGY
RFID TECHNOLOGYRFID TECHNOLOGY
RFID TECHNOLOGY
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
 
The Skinny on RFID and Automated Materials Handling in Library
The Skinny on RFID and Automated Materials Handling in Library The Skinny on RFID and Automated Materials Handling in Library
The Skinny on RFID and Automated Materials Handling in Library
 
RFID for Modern libraries
RFID for Modern libraries RFID for Modern libraries
RFID for Modern libraries
 
RFID AND LIBRARIES
RFID AND LIBRARIESRFID AND LIBRARIES
RFID AND LIBRARIES
 
Tag! You're It: RFID in the NCSU Libraries
Tag! You're It: RFID in the NCSU LibrariesTag! You're It: RFID in the NCSU Libraries
Tag! You're It: RFID in the NCSU Libraries
 
RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacy
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 
Working of barcode reader
Working of barcode readerWorking of barcode reader
Working of barcode reader
 
My best effort
My best effortMy best effort
My best effort
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid application
 
Wnl 160 introducing rfid technology by anupam
Wnl 160 introducing rfid technology by anupamWnl 160 introducing rfid technology by anupam
Wnl 160 introducing rfid technology by anupam
 
Rfid library management
Rfid library managementRfid library management
Rfid library management
 
Technology :: Barcode Scanners Description and Products
Technology :: Barcode Scanners Description and ProductsTechnology :: Barcode Scanners Description and Products
Technology :: Barcode Scanners Description and Products
 
IRJET- RFID based Book Shelving System
IRJET- RFID based Book Shelving SystemIRJET- RFID based Book Shelving System
IRJET- RFID based Book Shelving System
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
RFID for Modern Libraries
RFID for Modern Libraries RFID for Modern Libraries
RFID for Modern Libraries
 
Seminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemSeminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin System
 

Ähnlich wie 6 - Barcodes and RFID

Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
Liz Sims
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
Positive Hack Days
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
saeed001
 

Ähnlich wie 6 - Barcodes and RFID (20)

Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Rfid seminar
Rfid seminarRfid seminar
Rfid seminar
 
Space Cycles Rfid Primer
Space Cycles Rfid PrimerSpace Cycles Rfid Primer
Space Cycles Rfid Primer
 
Rfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisRfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | Identis
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
RFID-SECURITY_Vatsalya
RFID-SECURITY_VatsalyaRFID-SECURITY_Vatsalya
RFID-SECURITY_Vatsalya
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identification
 
wireless technology (RFID)
wireless technology (RFID)wireless technology (RFID)
wireless technology (RFID)
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rfid
RfidRfid
Rfid
 
Ioe module 2
Ioe module 2Ioe module 2
Ioe module 2
 
Secondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID IndustrySecondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID Industry
 
Asset Management on RFID.pptx
Asset Management on RFID.pptxAsset Management on RFID.pptx
Asset Management on RFID.pptx
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 

Mehr von William Helling (7)

7 - keeping up
7  - keeping up7  - keeping up
7 - keeping up
 
2 - ILS failure
2  - ILS failure2  - ILS failure
2 - ILS failure
 
0 - Introduction
0 - Introduction0 - Introduction
0 - Introduction
 
5 - Networking
5 - Networking5 - Networking
5 - Networking
 
4 - Standards
4  - Standards4  - Standards
4 - Standards
 
3 - Discovery-systems
3  - Discovery-systems3  - Discovery-systems
3 - Discovery-systems
 
1 - ILS components
1  - ILS components1  - ILS components
1 - ILS components
 

Kürzlich hochgeladen

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 

Kürzlich hochgeladen (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

6 - Barcodes and RFID

  • 1. Are You Experienced? Exploring User Experience in Public Libraries Barcodes and RFID
  • 2. Barcodes and RFID? Why do we need a lecture on them? Why wouldn’t you want to know about those things that are on or in almost every item in a library?
  • 3. I think I understand barcodes…why not just study RFID? The majority of libraries still use barcodes, especially smaller public libraries. Barcodes are cheap and have worked for decades. But is it finally time to consider the next step? Take a look at barcode technology:
  • 4. Barcode Types Smart barcodes: the item info is printed on its own barcode Smart barcodes are easy to implement (carry and attach it to the item). But production costs are high, and human error can cause major problems.
  • 5. Barcode Types Dumb barcodes: the barcode is not pre-linked to a particular item Dumb barcodes are less expensive than smart barcodes, less chance of mislinking, better for certain types of items such as serials and multivolume sets But dumb barcodes are more difficult to implement (the barcode must be attached to an item and then linked to it, which usually involves transporting the item to a computer station).
  • 6. How can you obtain barcodes? Print them yourself: You control the process (library systems often provide a barcode printing function as part of the Acquisitions or Cataloguing module). But accuracy and reliability (due to the actual printing process) may suffer. Have them printed for you: Accuracy and reliability should be very high
  • 7. So how do they work? If you really want to know, study the next slide. But I have warned you…
  • 8. 1. Laser beams emitted from the laser diode hit the polygon mirror and scan a bar code. 2. The light-receiving element (photodiode) receives the light of diffuse reflection from the bar code. 3. The diffuse reflection looks like an analog waveform as illustrated. 4. The bar code reader converts the waveform from analog to digital (A/D conversion). 5. The bar code reader identifies the narrow/wide bars and narrow/wide spaces using digital signals. 6. The bar code reader converts the signal combination of the bars and spaces into data according to the bar code rules (decoding). It outputs the decoded data to the external unit through RS-232C or an equivalent interface. http://www.keyence.com.sg/topics/barcode/bar_code/t_guide.php
  • 9. So that’s it? All the barcode does is make its number readable by scanner to automate a repetitive process. Lacking a scanner, simply type in the number printed on the barcode. Isn’t that enough?
  • 10. What could go wrong? A few annoyances: 1. You must have line-of-sight to read a barcode with a scanner. 2. Constantly looking for a barcode to scan and manipulating an item is a repetitive and sometimes difficult process. 3. It is almost impossible to have Automated Materials Handling (AMH) with barcodes.
  • 11. Do barcodes provide any security? No. If you are using barcodes you need an additional security system. The most popular security system technologies are: • EM (Electromagnetic) • RF (Radio Frequency) • RFID (Radio Frequency Identification)
  • 12. EM (Electromagnetic) Targets are strips of metal with magnetic particles for degaussing (desensitizing and resensitizing). Ex. 3M Tattle Tape
  • 13. Targets (the tape) are passed by an electrical unit with high–powered magnets to desensitize (release the security signal) or resensitize (enable the security signal). Loads of fun…
  • 14. RF (Radio Frequency) Targets (the small tags) are applied to circulating library materials. Target cleverly hidden behind pocket! Shhhhh!
  • 15. To disable the target you cover it using a card that interrupts the signal so that there is no alarm when the item goes by the door gates. And patrons who use their pocket cards as bookmarks wonder why the alarm sounds when they return their stuff to the library. Got 'em!
  • 16. And RFID is a security system? Radio Frequency IDentification RFID is a way to store data on a tag (transponder) that can be automatically received by a reader when the tag comes within range of the reader. And it can also act as a security system!
  • 17. What is an RFID tag? A tag contains a silicon chip and flexible antenna on a plastic label that can be attached to an object.
  • 18. What data is on the RFID tag? In a library capacity, an RFID tag contains anywhere from 74 to 256 bits of data (can be more, can be less). A tag can be write-once or rewriteable. But most tags include only the barcode number and no other data (for privacy reasons…and less data is easier to transmit, too).
  • 19. What kinds of RFID tags exist? • Active tags: tags that have their own battery power supply • Passive tags: tags that have no power supply and depend on a reader to activate them Note: Libraries use passive tags. If we wanted to tag and track whales, we would use active tags. But that is not our job.
  • 20. How does a passive RFID tag work? 1. The reader emits an electromagnetic signal. 2. When a passive tag comes within range of the reader, this signal excites the tag, and the tag broadcasts its data. 3. The reader converts the radio waves to digital data and passes it on to a computer. 4. The computer processes the data and performs some action (checks the item out, stores the data, sounds an alarm, etc.)
  • 21. Can a reader "read" more than one tag at a time? Depending on the anti-collision algorithm, readers can appear to read several items at one time. Tags are read in a matter of milliseconds. Short answer: No
  • 22. What is the range for a reader to read a tag? Security gates need to read from longer distances -- 24 inches. The typical reader for circulation purposes reads from within 8 inches.
  • 23. What renders an RFID tag unreadable? Wood? –no Plastic? –no way Human flesh? –now that’s just gross I am invincible!
  • 24. Metal! Any metal interferes with reception. (FYI: Damaging the antenna or chip can also render a tag useless.) Oh oh!
  • 25. What are the advantages of RFID? • RFID tags do not need line-of-sight to be read. • Several RFID tags can be read within a very short period. • RFID can act as a security system. • Self-check is simplified for patrons. • RFID tags can be read/write (i.e., reprogrammable). • RFID is less physically labor-intensive for staff to check in/check out. • RFID can make possible large-scale automatic handling of library materials. • RFID allows scanning items on the shelves without needing the items removed.
  • 26. An RFID reader-wand can scan the shelves to find items with the barcodes we wish to find. Or even collect barcodes. Too bad those darn bookshelves are made out of metal – but since they don’t cover the tag, they just slow us down. They don’t stop us.
  • 27. What are the disadvantages of RFID? • RFID is relatively new for libraries, and standards are still being developed. • RFID tags are much more expensive than barcodes (.25-.50 cents apiece vs. less than 1 cent!). • Patrons have (mainly unfounded) privacy concerns. You know, radio waves and all that.
  • 28. “True Confessions” time At my library we were early adopters of RFID (c. 2004) and we bet on a vendor that itself bet on a standard for RFID technology. But library RFID technology was still evolving….
  • 29. And when our vendor was bought by a larger vendor in 2009, we had to buy… All. New. Equipment. Non-technical explanation: the old stuff did not work with the new stuff. Libraries have still not reached complete interoperability with RFID technology, but the standards process is now helping.
  • 30. Oh, and besides the new equipment, we had to re-tag every one of our items! I hope never to have to do that again… What did we lose besides money and time? Well, that about sums it up. old tag new tag
  • 31. So how does RFID security work? Tags can contain security bits (turned off and on by RFID circulation reader pads or self-check machines).
  • 32. …and an RFID system that can query an ILS database if it senses an “on” bit item passing the security gates can quickly show staff what sounded the alarm (remember that the RFID tag has a barcode number in memory).
  • 33.
  • 34. So RFID tags will replace barcodes, right? No, not completely. • RFID tags still fail because they are easy to damage. Just see how long your tags last on children’s board books… • Books with those cool-looking metallic- base covers also block the signal (so anything from Danielle Steel and Nora Roberts!). • Barcodes are a necessary backup.
  • 36. But RFID is growing… so be aware “Considering RFID? Consider This,” by Stephanie Handy: Computers in Libraries. Vol. 34 No. 9 November 2014 www.infotoday.com/cilmag/nov14/Handy--Considering-RFID.shtml