RFID for IT Professionals
RFID systems are not just another data-input source for a business' back-end systems. For companies to get the most value from an RFID investment, it's essential that they have a robust software architecture for capturing data and turning it into information that can be used by business applications—in a way that provides for changing technology and business requirements. This seminar will explain how to build a complete software architecture, including the structure of RFID-based visibility data that enterprise applications consume, the data-capture software that creates this information, and the various architecture and product choices that an IT architect faces in building and deploying a successful system. The presenters will also explain how to employ RFID to track data-center assets.
Apr. 8 › 10:30 AM
New to RFID? This optional session for all preconference attendees provides an introduction to the fundamentals of the technology. The differences between the various classes of tags will be explained, including active and passive systems, and the need for additional IT systems to build upon RFID in real-world applications will be highlighted. The session will also include a brief overview of the EPCglobal network, the future of ISO standards, ETSI reader regulations and the latest standardization efforts worldwide. Finally, the relationship between different standards in the area of EPC RFID, including the latest EPC Gen 2 standard, will be presented.
Speaker: Mark Roberti, Founder and Editor, RFID Journal
Apr. 8 › 11:30 AM
RFID Visibility Data for Business Applications
To many, "RFID data" is what comes out of an RFID reader, but routing the raw information from a reader directly to a business application is a sure path to problems. The business application is locked into the way that information is captured, and the capture operations on the factory floor cannot be upgraded without disturbing the business applications. This session will show how to design RFID visibility data in a way that decouples data capture by RFID readers and other devices from information used by business applications. The result is an agile architecture in which a company can effectively respond to changing business-information needs, and exploit ever-improving RFID hardware. The role of the EPC Information Services (EPCIS) standard will be discussed, and the presenter will explain how that standard can be used effectively, even in closed-loop applications and by those not utilizing Electronic Product Codes.
Apr. 8 › 12:15 PM
Apr. 8 › 1:00 PM
RFID Data-Capture Software
RFID allows for data capture without human intervention, and for many tags to be sensed at once. This makes RFID data capture significantly more complex than reading bar codes or human data entry. Capturing meaningful data often requires developing or customizing software in order to orchestrate RFID devices with other sensors, human interaction and back-end systems. At the same time, the data-capture infrastructure must manage many RFID interrogators and keep them running, even if unattended. This session will explore how to architect a well-layered software system that separates these concerns, and illustrates typical RFID data-capture paradigms. Such understanding is essential to selecting and deploying the many commercially available data-capture hardware and software products currently on the market. The presenter will also introduce several data-capture standards, including LLRP, ALE, RM and DCI.
Apr. 8 › 1:45 PM
Putting It Together: Architecture, Product Selection and IT Governance
This session will outline how to put together the elements described in the preceding two sessions, in order to create a complete enterprise-scale software architecture for RFID-based visibility. With such a setup, an enterprise can define architectural plans that meet business requirements and provide for growth and change, and then use those plans to drive the selection of commercial hardware and software products, rather than the other way around. The presenter will also explain the role of IT governance, and describe a design methodology to ensure that RFID is implemented consistently, and with scalability across an enterprise and the supply chain.
Apr. 8 › 2:30 PM
Apr. 8 › 2:45 PM
RFID Tag-Data Standards
As RFID tags grow in capacity and sophistication, the possible methods for storing information on them becomes ever more complex. Whereas tags carried just a simple "license plate" identifier in the past, they now have a full random-access "user memory" that can be employed by applications to store a variety of business data. This session will provide an overview of the myriad of data standards that have evolved to take advantage of these features, including the popular Electronic Product Code (EPC); the ISO/IEC 15962 standard for user memory and its variations, including the latest "packed objects" standard; and the different data systems, including GS1 Application Identifiers (AIs), ANSI Data Identifiers (DIs) and aerospace Text Element Identifiers (TEIs).
Apr. 8 › 3:30 PM
RFID Data-Capture Standards: LLRP and ALE
The first task in many RFID implementations is to interface with RFID interrogators—which is significantly more complex than interfacing with a bar-code scanner. Fortunately, there are widely adopted standards that can help ease the task, and that enable developers to focus on the business problem they are trying to solve. The Low-Level Reader Protocol (LLRP) provides a standardized interface to RFID interrogator devices, and the Application-Level Events (ALE) standard defines a standardized way for application business logic to obtain the data it requires from a network of RFID devices. This session will explore these two standards in detail, outline their use in commercial products, and show how developers can utilize them to rapidly build robust, vendor-independent RFID systems.