Episodit

  • In this talk of the Connected Supply Chain, operating systems are the focal point. As a result of the majority of traditional Windows Mobile platforms having grown obsolete, there is considerable buzz in the tech world about the need for the migration of older generation technologies to newer operating systems and platforms. Mark Steger, Principal Solution Architect for AB&RÂź, lays out the details of what to expect, some strategies for handling operating system migration (as well as data migration), and the overall scope for the future of Windows Mobile, which has an “end-of-life” date set for the year 2020.

    Mark explains that in the last eighteen years, since the Windows Embedded Compact days, there have been an innumerable amount of applications that still ran on variations of the same Microsoft systems. A lot of the older programs could be retrofitted and still run, but because Microsoft is ending their involvement on the mobile front, those applications could be at considerable risk. This means that the applications will still run, as Mark points out, but those same applications won’t be backed by a robust security infrastructure i.e. Microsoft. So, Microsoft wouldn’t be liable for a security breach and many companies probably wouldn’t support the use of the applications because of the risk of those security breaches.

    In addition to the security considerations for the Microsoft OS circumstances, there are other needs for upgrading to a new OS. Mark spells out what this would mean by going over various approaches. The most common of these being terminal emulation. To start, terminal emulation is a strategy which implements software to emulate the terminals of obsolete computers or devices which still valuable data and records that have continued relevance. Think of it as an updated terminal via software to keep the same sort of system and data in place that was there before, but was perhaps too outdated to properly maintain before the emulation was set in place. Later in the talk, Mark also states that approaching the migration through web applications isn’t the best idea because of inefficiency; it probably isn’t as scalable as a doing a complete rewrite and overhaul for the migration of old data onto a new platform. Less time-consuming, but the easy way out isn’t usually the best method. And then the talk logically leads to cell phone providers and their networks and what they are doing with the older, outdated generations that aren’t being fully-utilized.

  • This episode of the Connected Supply Chain is a special look into Radio Frequency Identification. Within the episode, Principal Solution Architect for AB&RÂź, Mark Steger, provides context on the history, specifications, and future of RFID for its supply chain implementation. To start, Mark explains that RFID is chiefly utilized for the identification of assets, inventory items, people, and even pets. He likens the technology to a “talking barcode”; where a standard barcode is a more or less static thing, RFID is much more versatile and responsive in its implementation.

    Mark continues the talk by explaining that there are two types of RFID: active and passive. The former typically have a battery, a tag with a small transponder for receiving radio signals, and are open and responsive. Passive on the other hand, as the name suggests, is a much more closed system--one which emits a diverse range of frequencies and which doesn’t have the functionality of an active RFID. An example of a passive type would be a chip that is implanted inside a pet, and which functions as a barcode of sorts that can be scanned and identification can be validated that way. And this leads to the next factor that differentiates active and passive from another: the amount of Kilohertz that each type emit. And Mark states that there are quite a few different frequency ranges for different functions. For instance, opening a door would be a short-range function with varying ranges of low to high frequency. But most of the passive world runs on ultra-high frequency ranges. The take-home message being that ranges will vary with the application.

    And lastly, Mark explains RFID’s relevance from a supply chain perspective, showing how it can help with tracking real-time data and products, and how it is about 10 times cheaper than a standard barcode. But this does not mean that a barcode system should just be replaced overnight. There are definite logical uses for barcodes over RFID; So, instead of any talks of replacing the traditional barcode system, RFID and barcodes can and should be used together, as complements, for the time being.

  • Puuttuva jakso?

    Paina tästä ja päivitä feedi.

  • Key Links

    Product page for Zebra ZC10L

    -------------------------------------------

    In this fascinating episode, the Zebra ZC10L large-format card & badge printer is showcased in all of its technological glory by guest Ted Morgan, a twenty-five year veteran of AB&R¼ and an expert on the technology. The crux of the whole episode centers on the implications of the printer’s RFID capability and how this will revolutionize event spaces. As Ted relays to listeners, event spaces like trade shows, concerts or sporting events, have the opportunity to become much more memorable because of the large-format printer featured in this episode. Ted talks about how leaders in event spaces are looking for ways to make the attendee experience as enjoyable and special as possible.

    Using the bland and boring paper credentials that are often handed out for low profile events as an example, Ted compares this to a badge that the Zebra ZC10L is able to print. And because of the cutting-edge techniques utilized with this large-format printer, each card is capable of Radio-Frequency Identification (RFID) tracking both nearfield and long range. This innovation was a result of the collaboration between Zebra and AB&RÂź to integrate RFID into the ZC10L. This decision was unanimously made because RFID is so important for event spaces: Ted explains that people would gain access to events with the credentials they are given, they are allowed access with high frequency technology, and then there is the option to track event attendees with ultra-high frequency capability embedded within the credential. Not to mention this makes for some very secure events.

    Ted then goes on to explain some of the hurdles that he and Zebra faced with the printer, especially with the thinness of the card stock-- The much thinner stock made it difficult to embed the RFID inlays into the sim card without creating any blemishes on the surface of the card. Ending the episode with the positives for RFID in product and people tracking, the future looks quite exciting in this offshoot of the supply chain.