Friday, June 27, 2008

Thermal Printers


Thermal Bluetooth receipt printers have become the standard offering on the majority of point of sale systems today. Especially in the restaurant industry it is hard to find a point of sale system that does not have a thermal receipt printer. For the most part thermal receipt printers cost more. Here are 5 reasons why a thermal receipt printer is superior to a dot matrix receipt printer.

1. Speed
The average Dot matrix printer will print around 3 lines per second while Thermal printers average in excess of 20 lines per second.

2. Print Quality
Thermal receipt printers have a much better image and prints sharp quality text and especially when printing logos. Just go and line up at any POS Malaysia offices and get a sample queue receipt.


3. Connectivity
Thermal receipt printers have this options to communicate wireless with PDA through Bluetooth or WiFi. This makes it very convenient as no more messy wires dangling everywhere.

4. Reliability
MTBF stands for Mean Time Between Failure. This is the standard for measuring the average time between failure for any device. In the case of printers it is either the average number of lines printed before a failure occurs or the average feet of paper that can be printed before a failure occurs. In either case, the thermal receipt printers win across the board. There are some thermal receipt printers that are better than others, but dot matrix printers simply do not have the staying power of a thermal printer. This is due to fewer moving parts on a thermal printer and the fact that dot heads break due to the dot pins snagging on ribbons or are damaged when coins are dropped into the printer mechanism.


5. Cost of Ownership
This goes beyond simply the cost of supplies. This analysis should also include downtime and the cost of repairs. Thermal paper does cost more than dot matrix paper. However, the added cost of ribbons for the dot matrix printer sends the cost of ownership for supplies higher for the dot matrix receipt printer. When you add in the cost of repairs and the more frequent repairs for the dot matrix receipt printers the cost of ownership clearly swings in favor of thermal receipt printers.

Tuesday, June 24, 2008

Citibank RFID credit card


Fancy that, Citibank came out with the genius idea of RFID credit card, you can hook your keys in it too. Replacing the thin credit card type, i think it is great. Now where did i put those keys?!!

Microsoft Tech.Ed 2008 is upon us.


Microsoft Tech.Ed 2008 is happening in Malaysia again, this time around catch what is happening in the software development world! Set your date: August 11-14 ,2008 at KLCCC

Monday, June 23, 2008

NFC Phone by Nokia




Nokia has been experimenting NFC or Near Field Communications, when the phone detects the compatible rfid tags (reader is at base of phone, time takes around 2~3 seconds to read), the phone will prompt - either you can call, go url or website or sms the numerb. As phones increasingly become replacements for ‘contactless cards’, it seems likely that this interaction will become more habitual and natural.

Sure Reach Courier goes RFID


Our very own local courier, Sure Reach has gone RFID! The new facility at Bukit Raja, Shah Alam can store, identify, track and retrieve records using rfid labels. Working with Microsoft, HP and software ONeil from Australia the project worth around RM2 million. What is Records Management? or RM for short, is the practice of identifying, classifying, archiving, preserving, and destroying records. The ISO 15489: 2001 standard defines it as "The field of management responsible for the efficient and systematic control of the creation, receipt, maintenance, use and disposition of records, including the processes for capturing and maintaining evidence of and information about business activities and transactions in the form of records". The law states that records have to be kept for 7 years after completion of transaction and when audit requires for it, records have to be inspected. Passive tags are source from US and South Korea costing at 30cents and 50cents (around RM0.95 and RM1.60 each).

Protect Your Mobile Device!

The following are some tips for organisations and staff to protect their mobile device:

1. Keep track of mobile devices. Companies should keep track of any mobile devices that connect either directly to organisation's network or attached to an employee's computer.

2. Limit employees to mobile devices. Identify staff entitled to own mobile devices, i.e. laptops. Administrative and desktop bound workers can use a desktop computer instead of notebook. The lesser the usage of mobile devices, the lesser risk for your company.

3. Educate employees. Awareness programme should be conducted to train those staff owning mobile devices. They must know how to protect their devices for example, the use of locking devices for laptops and password requirements. Training sessions should focus on security threats and actions they need to implement to help company reduce security risks.

4. Introduce guidelines for copying data to removable device. Produce step-by-steps for employees to transfer their files to mobile devices. Most staff freely and simply move documents on portable USB thumb drives, external hard disks, and writeable CDs and DVDs and do not how to safe guard these devices.

5. Rules on usage of personal mobile devices on the premise. Impose rules on employees who bring mobile devices to workplace. Employees should also be encouraged to contact IT department if they want to access organization's applications via personal device.

6. Communicate with employees what is at stake if they lost their mobile device. Not only company's reputation is at risk, but their personal information, such as credit cards details, may be used by unauthorized person.

7. Run antivirus and firewall program on all mobile devices, as the device can introduce virus and malicious code to organisation's network. Many antivirus manufacturers nowadays support mobile devices.

8. Enforce password. Notebooks usually are easy to be equipped with passwords, but PDAs are often left without one. Employees tend to store sensitive information such as customers' name and contact numbers in PDAs, which is valuable to competitors.

Thursday, June 19, 2008

You can beat the slowdown!


Everyone responds differently to an economic slowdown. Money gets tighter and decision making slows down. Top management runs scared, purchasing now requires more review steps and justification, buyers want more concessions and longer payment terms, bad debts likely to increase.
Below are 9 test ideas for increased sales:-
1. Go on the offensive
2. Put incentive programs on the front burner
3. Cut the fat out of the travel budget
4. Sharpen your marketing - Add promotions!
5. Collaborate with your customers
6. The old fact - Spend more time selling
7. Retrain your Sales team to win
8. Restore confidence in each sales person
9. Last, Work smarter and Harder!!! - Use the internet, tech-tool as PDA, etc

UPS


Mobile technology helps UPS ensure efficiency, reliability and reduce errors in more than 200 countries. United Parcel Service Inc. (UPS) will use the first handheld computer to include built-in wireless connectivity options to ensure maximum data transmission flexibility for its extensive fleet of UPS drivers. The introduction of this wireless component will ultimately result in customers having the most up-to-the-minute tracking information available at all times. The multiple wireless connectivity options can support personal, local or wide-area networks.
Pioneer StatusUPS pioneered the use of handheld computers in the shipping industry in 1991 when it introduced the first Delivery Information Acquisition Device (DIAD). Since then, each successive generation of the device has broken new ground, opening the door to the comprehensive package tracking UPS customers enjoy today.
The fourth generation of the Delivery Information Acquisition Device, or DIAD IV, incorporates new radio communication links that allow it to communicate almost anywhere, anytime; dramatically expanded memory, and a color screen that allows alert messages to be color-coded for drivers. Each DIAD IV will feature wireless local area network connectivity (WiFi), a built-in Global Packet Radio Service (GPRS) or Code Division Multiple Access radio (CDMA) - depending on location and an acoustical modem for dial-up access. These will enable transmissions within a nearby UPS center. The device also features a Bluetooth wireless personal area network and an infrared port to communicate with peripheral devices and customer personal computers.

Friday, June 13, 2008

WiFi Electricity

So it's done - MIT has managed to get wireless electricity to work. Research chappies transmitted electricity from "a power source to a 60 watt light bulb more than two metres away using magnetic resonators". If it works well, can be scaled and commercialised then this could be a truly revolutionary development.

Imagine no more batteries. Instead of having to charge battery-powered devices you can walk down the street with your mobile/PDA/iPod/etc automatically charging from resonators mounted on power poles. Link the cost of powering your device back to your home electricity bill and bingo. How about "mobile" power tools - charged from nearby resonators and never requiring battery charge. Or electric cars - charged as they drive - the cost added to your home electricity bill. The potential is truly endless. Amazing stuff.

What cool mobile application!


The customer using Windows mobile application wants to do the following:

Proof of delivery - route delivery
Route assignments
Customer's payment status
Customer's details
Work Order Dispatch
Inventory Tracking
Identifies nearest source of additional inventory (mobile or warehouse)
New product orders
Fleet tracking (odometer readings, driver logs, hours of service)
Critical message (alerts) - requires driver to read before continuing
Planagrams - Mobile application tells the driver how much product to deliver to each customer and on what date
Preventative maintenance planning and service tickets

What product did they choose to deploy the application that is complex and huge, yet the processing speed is still very good? Why the Psion Teklogix Workabout Pro G2 , of course. It comes with the following goodies like...
· Processor PXA270 520MHz
· Memory : 128MB RAM, 128MB Flash Memory
· Display 3.6” Full VGA, 640 x 480 Touchscreen display
· Sunlight readable (outdoor use)
· Expansion : SD/MMC slot, CF slot, 100 pin support for PCMCIA, GSM/GPRS EDGE and other third party module
· Bluetooth, Option : WiFi 802.11b/g
· Option : 1D/2D imagers, laser scanners
· Option : RFID readers for LF, HF and UHF
· IP65 rating— rain and dust resistant
· Withstand 5 feet drop to concrete
· 3000mAh High capacity battery pack
Now that's cool!

Quality Audits


The mobile application is can help the Quality Audits (Q&A) department improve their visibility into the manufacturing being done in hundreds of different locations around the world. The Q&A department is responsible for the quality and safety of both their employees and customers around the world. The mobile application allows internal company quality auditors to inspect an operation and synchronize the data to the corporate Q&A database in near-real time. This allows the data from thousands of inspections around the world to be quickly analyzed for trends and problems. Once the data is collected on mobile devices and synchronized to the corporate Q&A database, business analytic software can be used to understand the data and its impact on quality. Issues can be identified, policies implemented and problems resolved before they grow larger and become a public issue.

Slow economic is an Opportunity!!!

Slow economic periods are a time for reflection for many companies. With the recent fuel hike of RM2.70 in Malaysia has cause us to rethink how to do business. Understanding how to react to an economic downturn is one of the hardest tasks for a manager. The focus must be on accomplishing more with less and reducing inefficiencies. How can you provide more services per person, lower administrative costs and reduce expenses while at the same time providing quality work and good customer services? Put on your "thinking caps" and start the process of self-evaluation - to explore where inefficiencies may be lurking in your own unique business environment.

The use of mobile technology, in the context of field service automation, is most often driven by the following 12 business motivations:

1. Efficiencies in communicating information between the office and the remote service technician or jobsite
2. Efficiencies in planning and scheduling work based upon location, parts and expertise needed
3. Reducing fuel costs
4. Reducing travel time
5. Reducing time consuming and error prone data entry activities in the office
6. Increasing productivity – more average service calls per service technician in a day
7. Increasing service contract sales
8. Increasing equipment upgrade sales
9. Increasing collections with mobile invoicing, mobile printing of invoices and onsite collections
10. Improving inventory control and management - visibility to parts needed, the location of inventory and parts used on each job or service ticket
11. Reduced risks by reminding service technicians of safety hazards and safety procedures on the job
12. Improving management visibility into work done in the field to ensure quality services

Thursday, June 12, 2008

Car Tint Monitoring Application


The Tint-meter measures the light transmittence on car windows especially in front windshield and side windows, normally used by enforcement police or JPJ, it displays the value on the meter. If the values exceeds +/-5% of recommended values set by law, the officer will printout the summons receipt on the spot using Citizen portable printer via RS232 or Bluetooth. But don't worry, all your VKool car users are safe!!!

Wednesday, June 4, 2008

The Art of Deploying RFID: Three Tips

Just as you'd take a map and driving directions on a cross-country trip, you need the same kind of planning in an RFID deployment. RFID in the supply chain has emerged so quickly and forcefully that there has been little time for companies to consider all aspects of an implementation.
3 factors are key:

The capabilities of different RFID technologies must be considered in relation to specific applications. In the supply chain, RFID data is captured differently than traditional bar code data and consequently must be managed differently You need an RFID solutions provider that has experience with the technology and the ability to provide low-risk and systematic solutions.

Relate RFID to the Application at Hand

Many pilot RFID implementations have failed from a technical perspective because the technology's limitations were not considered. Different RFID frequencies provide varying capabilities. In the supply chain, Ultra High Frequency (900 MHz) has been chosen for RFID compliance initiatives with the DoD and Wal-Mart and is a primary focus of the EPCglobal initiative. Although UHF delivers long read ranges and high data throughput rates, it has a limited ability to penetrate liquid or metal objects. Given the varying types of goods that pass through the supply chain (i.e. metal products, items packaged in foil, and liquid products), expect varying read success rates. You need to consider how to deploy EPC-compliant RFID solutions that take into account limitations of the technology.
Another consideration for RFID supply chain deployments is tag type. Today you can choose from UHF class 0 read-only tags or class 0+ and class 1 tags having both read and write capabilities. These different classes are currently not interoperable. You must use consistent technology throughout the supply chain. However, this is a short-term problem. EPCglobal's UHF Gen2 is a collaborative effort between most industry players to devise a universal protocol. In the interim, "agile readers" that read multiple protocols are necessary.
In closed-loop, non-compliance applications like baggage handling, there is a greater spectrum of RFID technologies to consider. Each provides unique capabilities. For example, Low Frequency (125-134 KHz) delivers a high capability to penetrate metal and liquid objects, but at the expense of read range and a requirement for tags with a larger antenna that results in higher costs. High Frequency (13.56 MHz) sits between UHF and LF and offers slightly greater read range than LF but less than UHF. Likewise, HF has less expensive tags than LF but more expensive tags than UHF. HF also offers greater read range than LF, but significantly less than UHF. Further, because a closed-loop system denotes a single "owner," the lack of prevalent global standards is not an issue. Different RFID technologies have different capabilities and each is suited to different applications. Choose the right technology for the application.
One example of a closed loop implementation is Fraport AG, owner and operator of Frankfurt Airport. With 50 million passengers, nearly 460,000 aircraft movements, and 1.6 million metric tons of air freight per year, Frankfurt is one of the world's largest international airports. In managing the airport, Fraport AG is required by law to regularly inspect primary technical components, service or repair them, and provide a record of proof. To keep up with the high volume of traffic and service expectations, Fraport AG replaced its time-consuming manual inspection process with SAP's Mobile Asset Management software and Psion Teklogix's netpad with an integrated HF (13.56 MHz) RFID reader. For Fraport AG, RFID delivered a high-value solution: a more efficient inspection process with greater data accuracy.

RFID Data Must Be Managed Differently Than Bar Code Data

One benefit of RFID over bar codes is its ability to read multiple tags simultaneously, and without the need for line-of-sight transmission. RFID tags can be read through cardboard, plastic, or paint, allowing tags to be embedded into pallets or cases, thus giving greater flexibility in their placement. By contrast, bar codes require line-of-sight transmission so they must be affixed to a visible, typically stationary, location.
However, RFID data capture capabilities pose challenges because of the large quantities of data captured in a short time. Make provisions to collect and filter data coming from multiple sources, manipulate and evaluate the data, and then forward the refined data to a management system. If these provisions are not made, the accuracy of the data obtained through the RFID system cannot be validated and the management system could potentially be overwhelmed with data.

Choose an Experienced RFID Solutions Provider

A critical step is the selection of an RFID solutions provider. Look for companies that have experience with the technology, an understanding of your business needs, and the ability to provide low-risk and systematic solutions.
Embark on the process knowing the facts. In the supply chain, RFID may require a company commitment to new business processes and logistical reorganization. In closed loop applications, RFID often replaces manual data entry methods. By performing due diligence and aligning RFID decisions with business strategies, organizations can expect to reap the benefits of RFID.

Pricing for RFID labels

https://www.digikey.my/product-detail/en/avery-dennison-rfid/700067/1543-1052-ND/5135122