Past LIVE! Events
RFID Deployment StrategiesSenior executives at companies within every industry are faced with a challenge: how to deploy RFID in a way that reduces costs and improves efficiencies today, while also enabling them to meet long-term goals. In this track, industry experts will share their secrets for creating a well-thought-out strategy and executing it effectively.
May 1, 2013
1:30 PM—Track Session
A Business-Driven Enterprise Architecture Approach to Transformation
A business-driven enterprise architecture approach is essential to enabling transformation using auto-ID technologies. Learn why a purely technology- and solution-driven approach is destined to fail. Hear how Bell Helicopter was able to achieve better business results and maximize the benefits offered by RFID technology. Bell Helicopter, a wholly owned subsidiary of Textron Inc., is an industry-leading producer of commercial and military, manned and unmanned vertical-lift aircraft and the pioneer of the revolutionary tiltrotor aircraft. Globally recognized for world-class customer service, innovation and superior quality, Bell Helicopter's global workforce serves customers flying Bell Helicopter aircraft in more than 120 countries.
Speaker:Chuck Blucher, Information Technology Architect, Bell Helicopter
2:20 PM—Track Session
Building a Flexible RFID Data Infrastructure
Many businesses enter into an RFID implementation plan hoping to realize significant cost savings, as well as supply chain visibility and efficiency gains. But achieving those goals may be difficult, as there are many application-development, integration and deployment challenges. Developing an RFID infrastructure can be complicated and time-consuming. This session will provide the practical knowledge you need to move ahead with a realistic delivery plan, ensuring that you've chosen the proper data infrastructure.
Speaker:Ken Traub, Ph.D., President, Ken Traub Consulting, LLC
3:10 PM—Track Session
How to Manage Serialized Data
Serialization makes it possible to trace individual products using RFID to identify products, because unlike bar codes, the technology allows multiple tags to be read simultaneously as they move through the supply chain. An RFID tag's defining feature is its ability to identify items by assigning unique serial numbers to them. In this session, the presenter will explain how serial numbers are assigned and encoded, and share various methods that can be employed by a variety of organizations. Gain an understanding of the fundamentals for successfully tagging assets, as well as how to manage serialized product identifiers.
Speaker:Justin Patton, RFID Research Center Managing Director, University of Arkansas
4:00 PM—Track Session
Overcoming Cultural and Institutional Barriers to RFID
Large organizations are typically slow to embrace change. Learn how the RFID project leaders at the U.S. Department of Energy (DOE) and Argonne National Lab were able to get a hazardous material application approved and deployed at several DOE sites. Hear the obstacles the project faced, and how they were overcome. Learn how the DOE has transferred the technology to the private sector for commercialization.
Speakers:Dr. Yung Y. Liu, Manager, DOE/PCP Radio Frequency Identification (RFID) Technology Program, Argonne National Laboratory
May 2, 2013
9:00 AM—Track Session
Implementing RFID in Europe: Privacy and Security Standards Guidelines
In 2008, the European Commission issued a standardization mandate in the field of information and communication technologies applied to RFID. Since March 2009, the European Committee for Standardization (CEN) and the European Telecommunications Standards Institute (ETSI) have been preparing their response to the mandate, as it relates to the protection of data security and citizen privacy when RFID systems are being designed, implemented and operated. The first phase of the work, completed in 2010, identified a list of tasks for which new standards and new guidance for RFID operators were required. The second phase of the program began in January 2012, with the formation of five project teams coordinated by CEN TC225 Automatic Data Capture Technologies. Learn how the group is developing the creation of frameworks and templates to assist both large and small enterprises in Europe, in order to identify and quantify risk to client data captured by RFID systems. Gain an in-depth understanding of the existing EU data- and privacy-protection laws. And discover how your organization can mitigate risk, as well as how to prepare and maintain a record of compliance.
Speaker:Stephane Pique, Director of RFID Industry Solutions Group, Motorola Solutions
9:45 AM—Track Session
Managing Risk in RFID Projects
The application of emerging technology within an organization carries considerable risk, which is compounded in RFID deployments in which users are often faced with both technology-selection and project risks. This session will discuss ways in which an organization can minimize risks and increase the probability of success for RFID implementations.
Speaker:Pankaj Sood, Founder, McMaster RFID Applications Lab
RFID Journal LIVE! 2013 is produced by RFID Journal, the World's RFID Authority.
All conference sessions are subject to change, and RFID Journal reserves the right to alter dates, programs and speakers at any time, as circumstances dictate. Sessions without assigned speakers indicate a target topic; every effort will be made to ensure that a program of equivalent standard and value is available.
RFID Journal Network:
RFID Journal / RFID Journal Brasil / RFID Journal Espanol / Events Home Page / Europe 2014 / Energy, Mining & Construction / LIVE! Brasil 2014 / Health Care 2014
© 2016 RFID Journal, LLC.