Dedicated to information regarding PDA products, Mobile Applications, RFID, etc
Monday, December 29, 2008
Application for Barcode
For those of you who don't know where to start applying for barcode especially for factories or manufacturer, check out www.fmm.org.my for more information.
Wednesday, December 17, 2008
New Printer from Intermec
Well, Intermec has came out with the new portable printer and guess what? What struck me was it look exactly like Extech printer. Thermal direct printing with Bluetooth functions...what can i say? www.intermec.com for more information.
Thursday, December 4, 2008
Wednesday, November 26, 2008
U Mobile phones
U mobile 018 is giving out free phones, but terms and conditions apply. check this out at www.u.com.my
Denso 2D scanners
Monday, October 27, 2008
Xmas Eve Charity Concert 2008
Good News!
In aid of HOPE Worldwide, a Live Charity Concert featuring the New York Harlem singers and many more, will be held at Genting Highlands, Arena of Stars on Christmas Eve in Malaysia.
Ticket sales are available through Ticket Axcess: Web: http://www.axcess.com.my
Hotline: +603-7711 5000
Tuesday, September 23, 2008
Google Phone
Sunday, September 7, 2008
RFID in Hospital
The article taken from The Star, discussed the application of RFID in hospital. Some of the facts discussed:
1. RFID tag stores information
2. Doctors and nurses carrying RFID tag readers, perhaps attached to Portable PCs or personal digital assistants (PDAs), could retrieve up-to-date information from the patient’s wristband if the hospital information system is down.
3. Convenient for doctors who could refer to or update patient records from the bedside, as they make clinical observations, prescribe medication or order medical procedures.
4. Implementing RFID in a hospital information system could help cut down on errors as well as reduce the clerical workload for nurses, freeing them to get on with actual nursing.
5. RFID tags are more physically robust than barcode tags, are reusable.
However, the limitations faced are:
1. Not all Malaysian private hospital has converted from its barcode-based information system to an RFID-based one.
2. Cost is an issue, with RFID tagging systems costing over twice as much as barcode-based ones. RFID tags cost from 15 cents (54 sen) to over US$30 (RM100) each – depending on data capacity and whether the tag is “active” (carries a radio transmitter), among other things – as compare to barcode tag only costs as much as the paper it is printed on.
3. Issuing doctors and nurses with additional IT equipment ranging from Tablet PCs to PDAs.
adding to the implementation costs to the hospital,
4. Raise potential security and privacy risks for confidential patient data if the devices are lost or stolen.
Sooner or later, RFID will be a common application in hospitals, and may be in schools, Theme Parks, Car parks, you name it.
1. RFID tag stores information
2. Doctors and nurses carrying RFID tag readers, perhaps attached to Portable PCs or personal digital assistants (PDAs), could retrieve up-to-date information from the patient’s wristband if the hospital information system is down.
3. Convenient for doctors who could refer to or update patient records from the bedside, as they make clinical observations, prescribe medication or order medical procedures.
4. Implementing RFID in a hospital information system could help cut down on errors as well as reduce the clerical workload for nurses, freeing them to get on with actual nursing.
5. RFID tags are more physically robust than barcode tags, are reusable.
However, the limitations faced are:
1. Not all Malaysian private hospital has converted from its barcode-based information system to an RFID-based one.
2. Cost is an issue, with RFID tagging systems costing over twice as much as barcode-based ones. RFID tags cost from 15 cents (54 sen) to over US$30 (RM100) each – depending on data capacity and whether the tag is “active” (carries a radio transmitter), among other things – as compare to barcode tag only costs as much as the paper it is printed on.
3. Issuing doctors and nurses with additional IT equipment ranging from Tablet PCs to PDAs.
adding to the implementation costs to the hospital,
4. Raise potential security and privacy risks for confidential patient data if the devices are lost or stolen.
Sooner or later, RFID will be a common application in hospitals, and may be in schools, Theme Parks, Car parks, you name it.
CISC Tag emulator
This Tag emulator will be able to set various tag parameters as per the intended application and the emulated tags could be fully controlled and adjusted as per parameters decided upon. The performance and timing parameters can be adjusted to match different situations. Not only common test scenarios but even reader evaluation at the edge of specifications can be achieved. If it had been the normal RFID tags evaluation would have been difficult since borderline parameters could not be adjusted in this case. What else the Emulator can even imitate complex standards such as EPCglobalTM Class 1 Gen 2 UHF RFID Protocol and even upcoming protocols. Looks pretty good to me!!
Thursday, September 4, 2008
New Blackberry Bold
Great News for Blackberry users in Malaysia! Maxis and Celcom is going to launch the latest Blackberry Bold PDA by September 2008. With a 624MHz processor and using HSDPA network for fast email anytime. So hurry up and log onto www.blackberry.com for more information.
Wednesday, September 3, 2008
Curious about Mobile Number Portability
What is MNP?
It is the ability for users to switch to a new mobile service provider while retaining their existing mobile number. Remember, porting your number cost RM25 and plus other expenses...
I mean, how many times do you want to port over?
Below are the list of Malaysians Service Providers:-
Celcom (Malaysia) Berhad Website : www.celcom.com.myHotline: 1300 111 000
DiGi Telecommunications Sdn Bhd Website : www.digi.com.myHotline: 016 221 1800
Maxis Communications Berhad Website : www.maxis.com.myHotline : 1800 821 123
U Mobile Sdn Bhd Website : www.u.com.myHotline : 018 388 1318
It is the ability for users to switch to a new mobile service provider while retaining their existing mobile number. Remember, porting your number cost RM25 and plus other expenses...
I mean, how many times do you want to port over?
Below are the list of Malaysians Service Providers:-
Celcom (Malaysia) Berhad Website : www.celcom.com.myHotline: 1300 111 000
DiGi Telecommunications Sdn Bhd Website : www.digi.com.myHotline: 016 221 1800
Maxis Communications Berhad Website : www.maxis.com.myHotline : 1800 821 123
U Mobile Sdn Bhd Website : www.u.com.myHotline : 018 388 1318
Thursday, August 28, 2008
P1 WiMax Roll out!
Packet One Networks is the first to roll out WiMax in Malaysia! Minister of Energy, Water and Communications Datuk Shaziman Abu Mansor officiate the opening, flanked by Puan (left) and Lai of P1.
The service offers fixed WiMAX connectivity at speeds of 400Kbps (kilobits per second), 700Kbps, 1.2Mbps (megabits per sesond) and 2.4Mbps. Prices range between RM69 and RM209 per month. But now you can get as low as RM89 plus free modem worth RM999!!! Valid till 30th Sept 08
Tuesday, August 19, 2008
Patient tracking by UKM
This was taken from Imagine Cup finals 2006 sponsored by Microsoft. There were few team presenting their ideas, particularly from the UKM team. The RFID used was passive, not active so actual tracking was not real-time. I felt using Ekahau system would accomplish the purpose as WiFi to track patients is cheaper as compare to using RFID readers on every room. And also you can also upload the actual floor plan to the system. Plus, you can also track doctors, nurses, medical equipments, PCs, PDAs etc. you name it.
Monday, August 18, 2008
Hospital Drug tracking using RFID
check out the Video by Magellan on Hospital - drug tracking with RFID
www.magellan-rfid.com/pages/downloads/play_pharmaceutical.html
www.magellan-rfid.com/pages/downloads/play_pharmaceutical.html
RFID document tracking
Document management systems require the reliable monitoring of important unique documents which move around in companies, public or legal offices: on desks, in shelves, in cabinets and in archives.
Only Magellan's PJM StackTag® technology is capable to identify, read and write to all RFID labeled documents when they stack without any separation – even in stacks of many hundreds.
PJM stands for Phase Jitter Modulation. It can provide fast read data rates upto 100 - 400 times faster than other rfid data rates. Hey, law firms here i come!!!
Only Magellan's PJM StackTag® technology is capable to identify, read and write to all RFID labeled documents when they stack without any separation – even in stacks of many hundreds.
PJM stands for Phase Jitter Modulation. It can provide fast read data rates upto 100 - 400 times faster than other rfid data rates. Hey, law firms here i come!!!
Wednesday, August 6, 2008
Psion Teklogix Workabout Pro Gen2 slot
Tuesday, August 5, 2008
Waste Management using PDA
WRS in UK came out with a ingenious idea. Using Psion Teklogix iKon PDA for waste management system. The operator will scan the barcode on waste bin to record the conditions of bins. Collected data is uploaded to main server and report can be generated to educate the households on promoting the importance of recycling. It can also take photos of the bin.
Sunday, July 27, 2008
RFID in USB casing
Develop by local company MDT Innovations Sdn Bhd, the UMR300 represents a new standard in ultra compact lightweight RFID devices that can be deployed in a plug and play manner to host computers, handhelds, phones and smart phones. Easy and fast firmware upgrades can be made via the USB Interface. Demo software and a full SDK for developers are also provided with UMR300. It enables users to quickly and cheaply explore the benefits of RFID. The SDK has a complete application interface library with wrappers for desktop and handheld devices running Microsoft Windows™, Microsoft Windows Mobile™ and .NET operating systems. Web-based application developers can use the ActiveX™ control to create web browser applications that talk to the reader. UMR300 is able to read/write ISO 15693, ISO18000-3 and ISO14443 compliant RFID tags; it has an integrated single channel multiplexer for the direct connection to antenna. The reader has a maximum output power of 38mW. UMR300 is ideal for many applications, including product authentication and identification, data collection, tag encoding, and information access in mobile environments.
Graduating in RFID Style!
Universiti Tun Hussein Malaysia decided to use RFID for the convocation whereby a graduate would pass by the RFID reader on stage as they go and collect their scrolls. This eliminates mistaken identities of graduates as the names are read out by officiator in the past. The graduates will have access cards, once reader verifies it - will display the their own photo on the "Big" screen. At same time, the voice recording will also say out the name of graduate. Way to go!!!
Wednesday, July 23, 2008
Tuesday, July 22, 2008
PDA use in HACCP documentation
Why achieve Hazard Analysis and Critical Control Points (HACCP) certification? HACCP certification is a food safety system that reduces or eliminates the risk of food hazards. The system checks food starting from selection, preparation and production processes. The HACCP method is not commonly used in convention centers and 5-Star hotels but it is used by the airline and food & beverage industry. HACCP consultants are in high demand. Think about the recent food contamination scare in Malaysia. Using a data collection software in PDA, you can actually track the food movement from feed to fork or monitor the temperature on daily basis with a wireless temp. probe link to PDA.
Monday, July 21, 2008
Windows Mobile Vs Iphone (Part 2)
Read Edward J. R. of MsMobiles “12 reasons to buy Windows Mobile phone instead of iPhone 3G” and decide for yourself:
1) 3rd party applications in iPhone 3G cannot run in background: only one application can run at any given time in iPhone 3G so no background running of applications possible! In Windows Mobile phone several (many) applications can run at the same time so it is possible for example to simultaneously run in Windows Mobile: a) downloading a 50 MB MP3 file with a podcast, b) IM chatting with somebody including native Skype client for windows Mobile or native Live Messenger from Microsoft, c) edit Office documents, d) browse Internet, e) make a phone call, etc.
2) iPhone 3G has resolution of only 480×320 what is 2 times less than VGA (640×480) and W-VGA (wide VGA = 800×480) used in several Windows Mobile phones, what practically means: you can read more text on the display at once and everything is sharper
3) camera in iPhone 3G is inferior to camera in many Windows Mobile phones: it has only 2 megapixels compared to 3 to 5 megapixels in Windows Mobile phones and it does not have auto-focus - also present in many Windows Mobile phones
4) one cannot record videos with built-in camera of iPhone 3G, what is possible up to resolution of 640×480 pixels and 30 FPS (frames per second) in Windows Mobile phones
5) iPhone 3G supports HSDPA of maximal speed only 3.6 MB/second, while some Windows Mobile phones (including HTC Touch Diamond) suppport HSDPA of speed 7.2 MB/second
6) iPhone 3G does not have exchangeable battery that all Windows Mobile phones have, but only built-in battery so if you run out of battery you cannot replace it to prolong battery life - as it is possible with Windows Mobile phones
7) Original (i.e. from Microsoft) Office Mobile is built-in in each Windows Mobile phone and allows not only for viewing but also for editing of Office documents, so there is no need ot buy 3rd party software for it
8) There is much more 3rd party applications (programs) for Windows Mobile: over 20,000 compared to 500 for iPhone 3G
9) To make applications for Windows Mobile one needs either PC computer or Mac but to make applications for iPhone 3G one needs to buy a Mac computer - if you don’t have Mac computer then you cannot develop applications for iPhone 3G
10) Most Windows Mobile phones come without SIM lock so they can be used at any operator in given country and with SIM cards from abroad (important when traveling and you want to use local prepaid SIM card to avoid International roaming fees) while iPhone 3G has SIM lock and can work with only this operator at which it has been purchased
11) iPhone 3G has capacitive touch-screen meaning that it must be used with fingers and that it cannot be used with stylus or fingernails (what women like)
12) iPhone 3G has no physical keyboard or keypad, so users have no choice but to use virtual keyboards on the display while Windows Mobile offers phones in various form-factors, including such that have both touch-screen and a physical QWERTY keyboard
1) 3rd party applications in iPhone 3G cannot run in background: only one application can run at any given time in iPhone 3G so no background running of applications possible! In Windows Mobile phone several (many) applications can run at the same time so it is possible for example to simultaneously run in Windows Mobile: a) downloading a 50 MB MP3 file with a podcast, b) IM chatting with somebody including native Skype client for windows Mobile or native Live Messenger from Microsoft, c) edit Office documents, d) browse Internet, e) make a phone call, etc.
2) iPhone 3G has resolution of only 480×320 what is 2 times less than VGA (640×480) and W-VGA (wide VGA = 800×480) used in several Windows Mobile phones, what practically means: you can read more text on the display at once and everything is sharper
3) camera in iPhone 3G is inferior to camera in many Windows Mobile phones: it has only 2 megapixels compared to 3 to 5 megapixels in Windows Mobile phones and it does not have auto-focus - also present in many Windows Mobile phones
4) one cannot record videos with built-in camera of iPhone 3G, what is possible up to resolution of 640×480 pixels and 30 FPS (frames per second) in Windows Mobile phones
5) iPhone 3G supports HSDPA of maximal speed only 3.6 MB/second, while some Windows Mobile phones (including HTC Touch Diamond) suppport HSDPA of speed 7.2 MB/second
6) iPhone 3G does not have exchangeable battery that all Windows Mobile phones have, but only built-in battery so if you run out of battery you cannot replace it to prolong battery life - as it is possible with Windows Mobile phones
7) Original (i.e. from Microsoft) Office Mobile is built-in in each Windows Mobile phone and allows not only for viewing but also for editing of Office documents, so there is no need ot buy 3rd party software for it
8) There is much more 3rd party applications (programs) for Windows Mobile: over 20,000 compared to 500 for iPhone 3G
9) To make applications for Windows Mobile one needs either PC computer or Mac but to make applications for iPhone 3G one needs to buy a Mac computer - if you don’t have Mac computer then you cannot develop applications for iPhone 3G
10) Most Windows Mobile phones come without SIM lock so they can be used at any operator in given country and with SIM cards from abroad (important when traveling and you want to use local prepaid SIM card to avoid International roaming fees) while iPhone 3G has SIM lock and can work with only this operator at which it has been purchased
11) iPhone 3G has capacitive touch-screen meaning that it must be used with fingers and that it cannot be used with stylus or fingernails (what women like)
12) iPhone 3G has no physical keyboard or keypad, so users have no choice but to use virtual keyboards on the display while Windows Mobile offers phones in various form-factors, including such that have both touch-screen and a physical QWERTY keyboard
Sunday, July 13, 2008
HP launch RFID Service for Servers
HP today introduced a new service that enables customers to reduce property loss, increase security and improve audit controls in the data center with radio frequency identification (RFID) technology. The HP Factory Express RFID Service tracks critical data center assets, such as HP factory-built servers, storage devices and rack enclosures, so customers can continuously monitor the equipment as soon as it is received at their facilities.
When deployed as part of a full RFID solution from HP and its partners, the service automates and tracks device movement, providing an accurate inventory of all assets throughout their lifecycle. Over the next year, HP plans to extend the service to customers worldwide via HP Factory Express locations in Singapore, Brazil and the United Kingdom. HP's RFID tagging process allows technology devices to be scanned from the factory to the customer without requiring workers to manually inventory each asset. Customers can then quickly locate and maintain devices with minimal employee intervention, saving time and reducing loss or theft of valuable technology assets.
"Escalating customer demand for automated tracking led to HP's development of this service," said Tim Wilkinson, Regional Manager, RFID & Supply Chain COE. "As an early adopter of RFID in our own supply chain and a world leader in RFID, HP is uniquely qualified to help customers lower their total cost of ownership and mitigate security risks through RFID services and solutions."
The service costs between $5 and $10 for each individual tag, which can be affixed to the outside of HP ProLiant and HP Integrity server systems, HP StorageWorks Enterprise Virtual Array products, HP StorageWorks Modular Smart Arrays, HP server enclosures and HP rack infrastructure
When deployed as part of a full RFID solution from HP and its partners, the service automates and tracks device movement, providing an accurate inventory of all assets throughout their lifecycle. Over the next year, HP plans to extend the service to customers worldwide via HP Factory Express locations in Singapore, Brazil and the United Kingdom. HP's RFID tagging process allows technology devices to be scanned from the factory to the customer without requiring workers to manually inventory each asset. Customers can then quickly locate and maintain devices with minimal employee intervention, saving time and reducing loss or theft of valuable technology assets.
"Escalating customer demand for automated tracking led to HP's development of this service," said Tim Wilkinson, Regional Manager, RFID & Supply Chain COE. "As an early adopter of RFID in our own supply chain and a world leader in RFID, HP is uniquely qualified to help customers lower their total cost of ownership and mitigate security risks through RFID services and solutions."
The service costs between $5 and $10 for each individual tag, which can be affixed to the outside of HP ProLiant and HP Integrity server systems, HP StorageWorks Enterprise Virtual Array products, HP StorageWorks Modular Smart Arrays, HP server enclosures and HP rack infrastructure
Wednesday, July 9, 2008
Comparison Garmin GPS vs PDA Integrated GPS
2 units are used here : Garmin unit (average unit, eg. GPSMAP 60CS, 76CS) and PDA with integrated GPS (eg. Asus A636 )
When choosing there are PDA, there are many choices, eg. integrated camera, cellphone, with BT, WiFi. Also, choice of the newer (better ?? no definite conclusion yet) SiRF III chip and OS (WM 2005). So, make your comparison of several PDA and choose wisely.
The Pros and Cons of using the PDA Integrated GPS is given below.
Pros
All-in-one ; carry one for all functions (at least PDA+GPS, +camera+cellphone depending on model)
Bigger screen (compared to average Garmin unit)
Touch screen (compared to average Garmin unit)
Most come with SiRF III chip (Garmin catching up…)
Lovely voice (nRoute) ; easily changeable to other voice sets (foreign language – French sounds kinda sexy, male/female voice)
Unlimited memory (well… depends on memory card)
Unlimited tracking/tracklog (GPSProxy)
Form factor smaller and thinner (compared to average Garmin unit)
PDA functions (eg. MP3 music) + cellphone (PDA dependent) + camera (PDA dependent)
Ability to use other maps (eg. MapKing) but who needs them when we have Malsingmaps
Ability to load/select different basemaps (but who really needs them ?)
Ease of manipulating different file/map sets and versions
Last longer on single battery charge (generally)
VGA mode (PDA dependent)
Won't get branded a Geek if spotted with alien-looking Garmin unit (worse still, to those uninitiated, may think it's outdated cellphone model)
Can have Gps trackable maps for anywhere in the world using OziExplorer(CE), Gps navigation usage is not limited to availability of Gpsr device compatible maps.
Cons
Not as rugged - if no external antenna, have to expose to the sun to get good signal - not sure if PDA's were built for this. Think about leaving your PDA exposed to sunlight from say, KL to Singapore.
If your PDA fries in the sun, all your data on it is fried as well ... the more data you have on your PDA, the greater the pain if this happens!
Not waterproof (unless enclose in ziplock or pay for one of those special cases)
Not as shockproof (test at your own risk)
No barometer/altimeter, compass features
No proximity warning
Not as user friendly for Geocaching
Totally useless if your car having a V-kool tinting (and some other brand) with no external antenna or SirfIII.
When choosing there are PDA, there are many choices, eg. integrated camera, cellphone, with BT, WiFi. Also, choice of the newer (better ?? no definite conclusion yet) SiRF III chip and OS (WM 2005). So, make your comparison of several PDA and choose wisely.
The Pros and Cons of using the PDA Integrated GPS is given below.
Pros
All-in-one ; carry one for all functions (at least PDA+GPS, +camera+cellphone depending on model)
Bigger screen (compared to average Garmin unit)
Touch screen (compared to average Garmin unit)
Most come with SiRF III chip (Garmin catching up…)
Lovely voice (nRoute) ; easily changeable to other voice sets (foreign language – French sounds kinda sexy, male/female voice)
Unlimited memory (well… depends on memory card)
Unlimited tracking/tracklog (GPSProxy)
Form factor smaller and thinner (compared to average Garmin unit)
PDA functions (eg. MP3 music) + cellphone (PDA dependent) + camera (PDA dependent)
Ability to use other maps (eg. MapKing) but who needs them when we have Malsingmaps
Ability to load/select different basemaps (but who really needs them ?)
Ease of manipulating different file/map sets and versions
Last longer on single battery charge (generally)
VGA mode (PDA dependent)
Won't get branded a Geek if spotted with alien-looking Garmin unit (worse still, to those uninitiated, may think it's outdated cellphone model)
Can have Gps trackable maps for anywhere in the world using OziExplorer(CE), Gps navigation usage is not limited to availability of Gpsr device compatible maps.
Cons
Not as rugged - if no external antenna, have to expose to the sun to get good signal - not sure if PDA's were built for this. Think about leaving your PDA exposed to sunlight from say, KL to Singapore.
If your PDA fries in the sun, all your data on it is fried as well ... the more data you have on your PDA, the greater the pain if this happens!
Not waterproof (unless enclose in ziplock or pay for one of those special cases)
Not as shockproof (test at your own risk)
No barometer/altimeter, compass features
No proximity warning
Not as user friendly for Geocaching
Totally useless if your car having a V-kool tinting (and some other brand) with no external antenna or SirfIII.
Friday, June 27, 2008
Thermal Printers
Thermal Bluetooth receipt printers have become the standard offering on the majority of point of sale systems today. Especially in the restaurant industry it is hard to find a point of sale system that does not have a thermal receipt printer. For the most part thermal receipt printers cost more. Here are 5 reasons why a thermal receipt printer is superior to a dot matrix receipt printer.
1. Speed
The average Dot matrix printer will print around 3 lines per second while Thermal printers average in excess of 20 lines per second.
The average Dot matrix printer will print around 3 lines per second while Thermal printers average in excess of 20 lines per second.
2. Print Quality
Thermal receipt printers have a much better image and prints sharp quality text and especially when printing logos. Just go and line up at any POS Malaysia offices and get a sample queue receipt.
Thermal receipt printers have a much better image and prints sharp quality text and especially when printing logos. Just go and line up at any POS Malaysia offices and get a sample queue receipt.
3. Connectivity
Thermal receipt printers have this options to communicate wireless with PDA through Bluetooth or WiFi. This makes it very convenient as no more messy wires dangling everywhere.
Thermal receipt printers have this options to communicate wireless with PDA through Bluetooth or WiFi. This makes it very convenient as no more messy wires dangling everywhere.
4. Reliability
MTBF stands for Mean Time Between Failure. This is the standard for measuring the average time between failure for any device. In the case of printers it is either the average number of lines printed before a failure occurs or the average feet of paper that can be printed before a failure occurs. In either case, the thermal receipt printers win across the board. There are some thermal receipt printers that are better than others, but dot matrix printers simply do not have the staying power of a thermal printer. This is due to fewer moving parts on a thermal printer and the fact that dot heads break due to the dot pins snagging on ribbons or are damaged when coins are dropped into the printer mechanism.
MTBF stands for Mean Time Between Failure. This is the standard for measuring the average time between failure for any device. In the case of printers it is either the average number of lines printed before a failure occurs or the average feet of paper that can be printed before a failure occurs. In either case, the thermal receipt printers win across the board. There are some thermal receipt printers that are better than others, but dot matrix printers simply do not have the staying power of a thermal printer. This is due to fewer moving parts on a thermal printer and the fact that dot heads break due to the dot pins snagging on ribbons or are damaged when coins are dropped into the printer mechanism.
5. Cost of Ownership
This goes beyond simply the cost of supplies. This analysis should also include downtime and the cost of repairs. Thermal paper does cost more than dot matrix paper. However, the added cost of ribbons for the dot matrix printer sends the cost of ownership for supplies higher for the dot matrix receipt printer. When you add in the cost of repairs and the more frequent repairs for the dot matrix receipt printers the cost of ownership clearly swings in favor of thermal receipt printers.
This goes beyond simply the cost of supplies. This analysis should also include downtime and the cost of repairs. Thermal paper does cost more than dot matrix paper. However, the added cost of ribbons for the dot matrix printer sends the cost of ownership for supplies higher for the dot matrix receipt printer. When you add in the cost of repairs and the more frequent repairs for the dot matrix receipt printers the cost of ownership clearly swings in favor of thermal receipt printers.
Tuesday, June 24, 2008
Citibank RFID credit card
Microsoft Tech.Ed 2008 is upon us.
Monday, June 23, 2008
NFC Phone by Nokia
Nokia has been experimenting NFC or Near Field Communications, when the phone detects the compatible rfid tags (reader is at base of phone, time takes around 2~3 seconds to read), the phone will prompt - either you can call, go url or website or sms the numerb. As phones increasingly become replacements for ‘contactless cards’, it seems likely that this interaction will become more habitual and natural.
Sure Reach Courier goes RFID
Our very own local courier, Sure Reach has gone RFID! The new facility at Bukit Raja, Shah Alam can store, identify, track and retrieve records using rfid labels. Working with Microsoft, HP and software ONeil from Australia the project worth around RM2 million. What is Records Management? or RM for short, is the practice of identifying, classifying, archiving, preserving, and destroying records. The ISO 15489: 2001 standard defines it as "The field of management responsible for the efficient and systematic control of the creation, receipt, maintenance, use and disposition of records, including the processes for capturing and maintaining evidence of and information about business activities and transactions in the form of records". The law states that records have to be kept for 7 years after completion of transaction and when audit requires for it, records have to be inspected. Passive tags are source from US and South Korea costing at 30cents and 50cents (around RM0.95 and RM1.60 each).
Protect Your Mobile Device!
The following are some tips for organisations and staff to protect their mobile device:
1. Keep track of mobile devices. Companies should keep track of any mobile devices that connect either directly to organisation's network or attached to an employee's computer.
2. Limit employees to mobile devices. Identify staff entitled to own mobile devices, i.e. laptops. Administrative and desktop bound workers can use a desktop computer instead of notebook. The lesser the usage of mobile devices, the lesser risk for your company.
3. Educate employees. Awareness programme should be conducted to train those staff owning mobile devices. They must know how to protect their devices for example, the use of locking devices for laptops and password requirements. Training sessions should focus on security threats and actions they need to implement to help company reduce security risks.
4. Introduce guidelines for copying data to removable device. Produce step-by-steps for employees to transfer their files to mobile devices. Most staff freely and simply move documents on portable USB thumb drives, external hard disks, and writeable CDs and DVDs and do not how to safe guard these devices.
5. Rules on usage of personal mobile devices on the premise. Impose rules on employees who bring mobile devices to workplace. Employees should also be encouraged to contact IT department if they want to access organization's applications via personal device.
6. Communicate with employees what is at stake if they lost their mobile device. Not only company's reputation is at risk, but their personal information, such as credit cards details, may be used by unauthorized person.
7. Run antivirus and firewall program on all mobile devices, as the device can introduce virus and malicious code to organisation's network. Many antivirus manufacturers nowadays support mobile devices.
8. Enforce password. Notebooks usually are easy to be equipped with passwords, but PDAs are often left without one. Employees tend to store sensitive information such as customers' name and contact numbers in PDAs, which is valuable to competitors.
1. Keep track of mobile devices. Companies should keep track of any mobile devices that connect either directly to organisation's network or attached to an employee's computer.
2. Limit employees to mobile devices. Identify staff entitled to own mobile devices, i.e. laptops. Administrative and desktop bound workers can use a desktop computer instead of notebook. The lesser the usage of mobile devices, the lesser risk for your company.
3. Educate employees. Awareness programme should be conducted to train those staff owning mobile devices. They must know how to protect their devices for example, the use of locking devices for laptops and password requirements. Training sessions should focus on security threats and actions they need to implement to help company reduce security risks.
4. Introduce guidelines for copying data to removable device. Produce step-by-steps for employees to transfer their files to mobile devices. Most staff freely and simply move documents on portable USB thumb drives, external hard disks, and writeable CDs and DVDs and do not how to safe guard these devices.
5. Rules on usage of personal mobile devices on the premise. Impose rules on employees who bring mobile devices to workplace. Employees should also be encouraged to contact IT department if they want to access organization's applications via personal device.
6. Communicate with employees what is at stake if they lost their mobile device. Not only company's reputation is at risk, but their personal information, such as credit cards details, may be used by unauthorized person.
7. Run antivirus and firewall program on all mobile devices, as the device can introduce virus and malicious code to organisation's network. Many antivirus manufacturers nowadays support mobile devices.
8. Enforce password. Notebooks usually are easy to be equipped with passwords, but PDAs are often left without one. Employees tend to store sensitive information such as customers' name and contact numbers in PDAs, which is valuable to competitors.
Thursday, June 19, 2008
You can beat the slowdown!
Everyone responds differently to an economic slowdown. Money gets tighter and decision making slows down. Top management runs scared, purchasing now requires more review steps and justification, buyers want more concessions and longer payment terms, bad debts likely to increase.
Below are 9 test ideas for increased sales:-
1. Go on the offensive
2. Put incentive programs on the front burner
3. Cut the fat out of the travel budget
4. Sharpen your marketing - Add promotions!
5. Collaborate with your customers
6. The old fact - Spend more time selling
7. Retrain your Sales team to win
8. Restore confidence in each sales person
9. Last, Work smarter and Harder!!! - Use the internet, tech-tool as PDA, etc
UPS
Mobile technology helps UPS ensure efficiency, reliability and reduce errors in more than 200 countries. United Parcel Service Inc. (UPS) will use the first handheld computer to include built-in wireless connectivity options to ensure maximum data transmission flexibility for its extensive fleet of UPS drivers. The introduction of this wireless component will ultimately result in customers having the most up-to-the-minute tracking information available at all times. The multiple wireless connectivity options can support personal, local or wide-area networks.
Pioneer StatusUPS pioneered the use of handheld computers in the shipping industry in 1991 when it introduced the first Delivery Information Acquisition Device (DIAD). Since then, each successive generation of the device has broken new ground, opening the door to the comprehensive package tracking UPS customers enjoy today.
The fourth generation of the Delivery Information Acquisition Device, or DIAD IV, incorporates new radio communication links that allow it to communicate almost anywhere, anytime; dramatically expanded memory, and a color screen that allows alert messages to be color-coded for drivers. Each DIAD IV will feature wireless local area network connectivity (WiFi), a built-in Global Packet Radio Service (GPRS) or Code Division Multiple Access radio (CDMA) - depending on location and an acoustical modem for dial-up access. These will enable transmissions within a nearby UPS center. The device also features a Bluetooth wireless personal area network and an infrared port to communicate with peripheral devices and customer personal computers.
Pioneer StatusUPS pioneered the use of handheld computers in the shipping industry in 1991 when it introduced the first Delivery Information Acquisition Device (DIAD). Since then, each successive generation of the device has broken new ground, opening the door to the comprehensive package tracking UPS customers enjoy today.
The fourth generation of the Delivery Information Acquisition Device, or DIAD IV, incorporates new radio communication links that allow it to communicate almost anywhere, anytime; dramatically expanded memory, and a color screen that allows alert messages to be color-coded for drivers. Each DIAD IV will feature wireless local area network connectivity (WiFi), a built-in Global Packet Radio Service (GPRS) or Code Division Multiple Access radio (CDMA) - depending on location and an acoustical modem for dial-up access. These will enable transmissions within a nearby UPS center. The device also features a Bluetooth wireless personal area network and an infrared port to communicate with peripheral devices and customer personal computers.
Friday, June 13, 2008
WiFi Electricity
So it's done - MIT has managed to get wireless electricity to work. Research chappies transmitted electricity from "a power source to a 60 watt light bulb more than two metres away using magnetic resonators". If it works well, can be scaled and commercialised then this could be a truly revolutionary development.
Imagine no more batteries. Instead of having to charge battery-powered devices you can walk down the street with your mobile/PDA/iPod/etc automatically charging from resonators mounted on power poles. Link the cost of powering your device back to your home electricity bill and bingo. How about "mobile" power tools - charged from nearby resonators and never requiring battery charge. Or electric cars - charged as they drive - the cost added to your home electricity bill. The potential is truly endless. Amazing stuff.
Imagine no more batteries. Instead of having to charge battery-powered devices you can walk down the street with your mobile/PDA/iPod/etc automatically charging from resonators mounted on power poles. Link the cost of powering your device back to your home electricity bill and bingo. How about "mobile" power tools - charged from nearby resonators and never requiring battery charge. Or electric cars - charged as they drive - the cost added to your home electricity bill. The potential is truly endless. Amazing stuff.
What cool mobile application!
The customer using Windows mobile application wants to do the following:
Proof of delivery - route delivery
Route assignments
Customer's payment status
Customer's details
Work Order Dispatch
Inventory Tracking
Identifies nearest source of additional inventory (mobile or warehouse)
New product orders
Fleet tracking (odometer readings, driver logs, hours of service)
Critical message (alerts) - requires driver to read before continuing
Planagrams - Mobile application tells the driver how much product to deliver to each customer and on what date
Preventative maintenance planning and service tickets
What product did they choose to deploy the application that is complex and huge, yet the processing speed is still very good? Why the Psion Teklogix Workabout Pro G2 , of course. It comes with the following goodies like...
Proof of delivery - route delivery
Route assignments
Customer's payment status
Customer's details
Work Order Dispatch
Inventory Tracking
Identifies nearest source of additional inventory (mobile or warehouse)
New product orders
Fleet tracking (odometer readings, driver logs, hours of service)
Critical message (alerts) - requires driver to read before continuing
Planagrams - Mobile application tells the driver how much product to deliver to each customer and on what date
Preventative maintenance planning and service tickets
What product did they choose to deploy the application that is complex and huge, yet the processing speed is still very good? Why the Psion Teklogix Workabout Pro G2 , of course. It comes with the following goodies like...
· Processor PXA270 520MHz
· Memory : 128MB RAM, 128MB Flash Memory
· Display 3.6” Full VGA, 640 x 480 Touchscreen display
· Sunlight readable (outdoor use)
· Expansion : SD/MMC slot, CF slot, 100 pin support for PCMCIA, GSM/GPRS EDGE and other third party module
· Bluetooth, Option : WiFi 802.11b/g
· Option : 1D/2D imagers, laser scanners
· Option : RFID readers for LF, HF and UHF
· IP65 rating— rain and dust resistant
· Withstand 5 feet drop to concrete
· 3000mAh High capacity battery pack
· Memory : 128MB RAM, 128MB Flash Memory
· Display 3.6” Full VGA, 640 x 480 Touchscreen display
· Sunlight readable (outdoor use)
· Expansion : SD/MMC slot, CF slot, 100 pin support for PCMCIA, GSM/GPRS EDGE and other third party module
· Bluetooth, Option : WiFi 802.11b/g
· Option : 1D/2D imagers, laser scanners
· Option : RFID readers for LF, HF and UHF
· IP65 rating— rain and dust resistant
· Withstand 5 feet drop to concrete
· 3000mAh High capacity battery pack
Now that's cool!
Quality Audits
The mobile application is can help the Quality Audits (Q&A) department improve their visibility into the manufacturing being done in hundreds of different locations around the world. The Q&A department is responsible for the quality and safety of both their employees and customers around the world. The mobile application allows internal company quality auditors to inspect an operation and synchronize the data to the corporate Q&A database in near-real time. This allows the data from thousands of inspections around the world to be quickly analyzed for trends and problems. Once the data is collected on mobile devices and synchronized to the corporate Q&A database, business analytic software can be used to understand the data and its impact on quality. Issues can be identified, policies implemented and problems resolved before they grow larger and become a public issue.
Slow economic is an Opportunity!!!
Slow economic periods are a time for reflection for many companies. With the recent fuel hike of RM2.70 in Malaysia has cause us to rethink how to do business. Understanding how to react to an economic downturn is one of the hardest tasks for a manager. The focus must be on accomplishing more with less and reducing inefficiencies. How can you provide more services per person, lower administrative costs and reduce expenses while at the same time providing quality work and good customer services? Put on your "thinking caps" and start the process of self-evaluation - to explore where inefficiencies may be lurking in your own unique business environment.
The use of mobile technology, in the context of field service automation, is most often driven by the following 12 business motivations:
1. Efficiencies in communicating information between the office and the remote service technician or jobsite
2. Efficiencies in planning and scheduling work based upon location, parts and expertise needed
3. Reducing fuel costs
4. Reducing travel time
5. Reducing time consuming and error prone data entry activities in the office
6. Increasing productivity – more average service calls per service technician in a day
7. Increasing service contract sales
8. Increasing equipment upgrade sales
9. Increasing collections with mobile invoicing, mobile printing of invoices and onsite collections
10. Improving inventory control and management - visibility to parts needed, the location of inventory and parts used on each job or service ticket
11. Reduced risks by reminding service technicians of safety hazards and safety procedures on the job
12. Improving management visibility into work done in the field to ensure quality services
The use of mobile technology, in the context of field service automation, is most often driven by the following 12 business motivations:
1. Efficiencies in communicating information between the office and the remote service technician or jobsite
2. Efficiencies in planning and scheduling work based upon location, parts and expertise needed
3. Reducing fuel costs
4. Reducing travel time
5. Reducing time consuming and error prone data entry activities in the office
6. Increasing productivity – more average service calls per service technician in a day
7. Increasing service contract sales
8. Increasing equipment upgrade sales
9. Increasing collections with mobile invoicing, mobile printing of invoices and onsite collections
10. Improving inventory control and management - visibility to parts needed, the location of inventory and parts used on each job or service ticket
11. Reduced risks by reminding service technicians of safety hazards and safety procedures on the job
12. Improving management visibility into work done in the field to ensure quality services
Thursday, June 12, 2008
Car Tint Monitoring Application
The Tint-meter measures the light transmittence on car windows especially in front windshield and side windows, normally used by enforcement police or JPJ, it displays the value on the meter. If the values exceeds +/-5% of recommended values set by law, the officer will printout the summons receipt on the spot using Citizen portable printer via RS232 or Bluetooth. But don't worry, all your VKool car users are safe!!!
Wednesday, June 4, 2008
The Art of Deploying RFID: Three Tips
Just as you'd take a map and driving directions on a cross-country trip, you need the same kind of planning in an RFID deployment. RFID in the supply chain has emerged so quickly and forcefully that there has been little time for companies to consider all aspects of an implementation.
3 factors are key:
The capabilities of different RFID technologies must be considered in relation to specific applications. In the supply chain, RFID data is captured differently than traditional bar code data and consequently must be managed differently You need an RFID solutions provider that has experience with the technology and the ability to provide low-risk and systematic solutions.
Relate RFID to the Application at Hand
Many pilot RFID implementations have failed from a technical perspective because the technology's limitations were not considered. Different RFID frequencies provide varying capabilities. In the supply chain, Ultra High Frequency (900 MHz) has been chosen for RFID compliance initiatives with the DoD and Wal-Mart and is a primary focus of the EPCglobal initiative. Although UHF delivers long read ranges and high data throughput rates, it has a limited ability to penetrate liquid or metal objects. Given the varying types of goods that pass through the supply chain (i.e. metal products, items packaged in foil, and liquid products), expect varying read success rates. You need to consider how to deploy EPC-compliant RFID solutions that take into account limitations of the technology.
Another consideration for RFID supply chain deployments is tag type. Today you can choose from UHF class 0 read-only tags or class 0+ and class 1 tags having both read and write capabilities. These different classes are currently not interoperable. You must use consistent technology throughout the supply chain. However, this is a short-term problem. EPCglobal's UHF Gen2 is a collaborative effort between most industry players to devise a universal protocol. In the interim, "agile readers" that read multiple protocols are necessary.
In closed-loop, non-compliance applications like baggage handling, there is a greater spectrum of RFID technologies to consider. Each provides unique capabilities. For example, Low Frequency (125-134 KHz) delivers a high capability to penetrate metal and liquid objects, but at the expense of read range and a requirement for tags with a larger antenna that results in higher costs. High Frequency (13.56 MHz) sits between UHF and LF and offers slightly greater read range than LF but less than UHF. Likewise, HF has less expensive tags than LF but more expensive tags than UHF. HF also offers greater read range than LF, but significantly less than UHF. Further, because a closed-loop system denotes a single "owner," the lack of prevalent global standards is not an issue. Different RFID technologies have different capabilities and each is suited to different applications. Choose the right technology for the application.
One example of a closed loop implementation is Fraport AG, owner and operator of Frankfurt Airport. With 50 million passengers, nearly 460,000 aircraft movements, and 1.6 million metric tons of air freight per year, Frankfurt is one of the world's largest international airports. In managing the airport, Fraport AG is required by law to regularly inspect primary technical components, service or repair them, and provide a record of proof. To keep up with the high volume of traffic and service expectations, Fraport AG replaced its time-consuming manual inspection process with SAP's Mobile Asset Management software and Psion Teklogix's netpad with an integrated HF (13.56 MHz) RFID reader. For Fraport AG, RFID delivered a high-value solution: a more efficient inspection process with greater data accuracy.
RFID Data Must Be Managed Differently Than Bar Code Data
One benefit of RFID over bar codes is its ability to read multiple tags simultaneously, and without the need for line-of-sight transmission. RFID tags can be read through cardboard, plastic, or paint, allowing tags to be embedded into pallets or cases, thus giving greater flexibility in their placement. By contrast, bar codes require line-of-sight transmission so they must be affixed to a visible, typically stationary, location.
However, RFID data capture capabilities pose challenges because of the large quantities of data captured in a short time. Make provisions to collect and filter data coming from multiple sources, manipulate and evaluate the data, and then forward the refined data to a management system. If these provisions are not made, the accuracy of the data obtained through the RFID system cannot be validated and the management system could potentially be overwhelmed with data.
Choose an Experienced RFID Solutions Provider
A critical step is the selection of an RFID solutions provider. Look for companies that have experience with the technology, an understanding of your business needs, and the ability to provide low-risk and systematic solutions.
Embark on the process knowing the facts. In the supply chain, RFID may require a company commitment to new business processes and logistical reorganization. In closed loop applications, RFID often replaces manual data entry methods. By performing due diligence and aligning RFID decisions with business strategies, organizations can expect to reap the benefits of RFID.
3 factors are key:
The capabilities of different RFID technologies must be considered in relation to specific applications. In the supply chain, RFID data is captured differently than traditional bar code data and consequently must be managed differently You need an RFID solutions provider that has experience with the technology and the ability to provide low-risk and systematic solutions.
Relate RFID to the Application at Hand
Many pilot RFID implementations have failed from a technical perspective because the technology's limitations were not considered. Different RFID frequencies provide varying capabilities. In the supply chain, Ultra High Frequency (900 MHz) has been chosen for RFID compliance initiatives with the DoD and Wal-Mart and is a primary focus of the EPCglobal initiative. Although UHF delivers long read ranges and high data throughput rates, it has a limited ability to penetrate liquid or metal objects. Given the varying types of goods that pass through the supply chain (i.e. metal products, items packaged in foil, and liquid products), expect varying read success rates. You need to consider how to deploy EPC-compliant RFID solutions that take into account limitations of the technology.
Another consideration for RFID supply chain deployments is tag type. Today you can choose from UHF class 0 read-only tags or class 0+ and class 1 tags having both read and write capabilities. These different classes are currently not interoperable. You must use consistent technology throughout the supply chain. However, this is a short-term problem. EPCglobal's UHF Gen2 is a collaborative effort between most industry players to devise a universal protocol. In the interim, "agile readers" that read multiple protocols are necessary.
In closed-loop, non-compliance applications like baggage handling, there is a greater spectrum of RFID technologies to consider. Each provides unique capabilities. For example, Low Frequency (125-134 KHz) delivers a high capability to penetrate metal and liquid objects, but at the expense of read range and a requirement for tags with a larger antenna that results in higher costs. High Frequency (13.56 MHz) sits between UHF and LF and offers slightly greater read range than LF but less than UHF. Likewise, HF has less expensive tags than LF but more expensive tags than UHF. HF also offers greater read range than LF, but significantly less than UHF. Further, because a closed-loop system denotes a single "owner," the lack of prevalent global standards is not an issue. Different RFID technologies have different capabilities and each is suited to different applications. Choose the right technology for the application.
One example of a closed loop implementation is Fraport AG, owner and operator of Frankfurt Airport. With 50 million passengers, nearly 460,000 aircraft movements, and 1.6 million metric tons of air freight per year, Frankfurt is one of the world's largest international airports. In managing the airport, Fraport AG is required by law to regularly inspect primary technical components, service or repair them, and provide a record of proof. To keep up with the high volume of traffic and service expectations, Fraport AG replaced its time-consuming manual inspection process with SAP's Mobile Asset Management software and Psion Teklogix's netpad with an integrated HF (13.56 MHz) RFID reader. For Fraport AG, RFID delivered a high-value solution: a more efficient inspection process with greater data accuracy.
RFID Data Must Be Managed Differently Than Bar Code Data
One benefit of RFID over bar codes is its ability to read multiple tags simultaneously, and without the need for line-of-sight transmission. RFID tags can be read through cardboard, plastic, or paint, allowing tags to be embedded into pallets or cases, thus giving greater flexibility in their placement. By contrast, bar codes require line-of-sight transmission so they must be affixed to a visible, typically stationary, location.
However, RFID data capture capabilities pose challenges because of the large quantities of data captured in a short time. Make provisions to collect and filter data coming from multiple sources, manipulate and evaluate the data, and then forward the refined data to a management system. If these provisions are not made, the accuracy of the data obtained through the RFID system cannot be validated and the management system could potentially be overwhelmed with data.
Choose an Experienced RFID Solutions Provider
A critical step is the selection of an RFID solutions provider. Look for companies that have experience with the technology, an understanding of your business needs, and the ability to provide low-risk and systematic solutions.
Embark on the process knowing the facts. In the supply chain, RFID may require a company commitment to new business processes and logistical reorganization. In closed loop applications, RFID often replaces manual data entry methods. By performing due diligence and aligning RFID decisions with business strategies, organizations can expect to reap the benefits of RFID.
Thursday, May 29, 2008
Mobile device security
According to a new report by Datamonitor, which is a leading provider of online data, analytic and forecasting platforms for key vertical sectors, with headquarters in London.
The report “Enterprise Mobility: Trend Analysis to 2012” also predicts global enterprise expenditure on mobile devices will grow from US$6 billion (S$8.15 billion) today to an estimated US$17 billion by 2012.
The report highlights that this kind of growth underlines the need for IT managers to begin to implement mobile device policies. “Enterprises are fighting a losing battle against employees when it comes to mobile devices and they should consider supporting a limited selection of devices rather than banning them outright”, says Daniel Okubo, technology analyst with Datamonitor and the report’s author.
According to the independent market analyst, security concerns are the largest barrier to mobility deployments. In a Datamonitor survey of 467 IT managers, Chief Information Officers and IT decision makers conducted in March 2007 to establish issues that are currently preventing enterprises from investing in mobility solutions, the majority of the 467 respondents rated security as the greatest barrier to adoption of mobility solutions. According to the study, as mobile devices like the iPhone are increasingly becoming popular among end users, enterprises are finding that employees want to be able to integrate their personal device with their corporate email account and other applications. They do not want one device for personal use and an IT issued device for work. However, according to the report, so far very few IT departments have yielded to these changing scenarios and are refusing to be responsible for managing such a wide variety of mobile devices. It also notes that the iPhone has set a new standard for device userability and the trend of ‘consumerization’ is going to continue.
The report “Enterprise Mobility: Trend Analysis to 2012” also predicts global enterprise expenditure on mobile devices will grow from US$6 billion (S$8.15 billion) today to an estimated US$17 billion by 2012.
The report highlights that this kind of growth underlines the need for IT managers to begin to implement mobile device policies. “Enterprises are fighting a losing battle against employees when it comes to mobile devices and they should consider supporting a limited selection of devices rather than banning them outright”, says Daniel Okubo, technology analyst with Datamonitor and the report’s author.
According to the independent market analyst, security concerns are the largest barrier to mobility deployments. In a Datamonitor survey of 467 IT managers, Chief Information Officers and IT decision makers conducted in March 2007 to establish issues that are currently preventing enterprises from investing in mobility solutions, the majority of the 467 respondents rated security as the greatest barrier to adoption of mobility solutions. According to the study, as mobile devices like the iPhone are increasingly becoming popular among end users, enterprises are finding that employees want to be able to integrate their personal device with their corporate email account and other applications. They do not want one device for personal use and an IT issued device for work. However, according to the report, so far very few IT departments have yielded to these changing scenarios and are refusing to be responsible for managing such a wide variety of mobile devices. It also notes that the iPhone has set a new standard for device userability and the trend of ‘consumerization’ is going to continue.
Monday, May 26, 2008
Psion Teklogix in Pep Stores
Pep Stores is part of the PEPKOR Group, one of the world leaders in the retailing industry. With 1100 stores in South Africa announced that using Psion’s TekSpeech system has benefited by moving from RF technology to a hands-free picking solution in order to maintain and even improve picking and distribution levels.
This shows that hardware companies need software to accelerate the sale of their hardware. As Bill Gates once said, “Its the Software - Stupid!”
This shows that hardware companies need software to accelerate the sale of their hardware. As Bill Gates once said, “Its the Software - Stupid!”
RFID Chips Go Edible
Hitachi recently came up with tiny "powder" RFID chips. Well tiny's fine, but what if you want to eat your chips? You're in luck. Kodak just filed a patent for edible RFID chips. They're designed for monitoring a patient's gastric tract and are covered in a harmless gelatin, which eventually dissolves.
What's more important than that they can be ingested is that these prove that RFID chips embedded deep in the body can be read by a scanner. But Kodak is also saying that pills could be manufactured with these chips inside them, so that doctors or nurses can confirm a patient took them.
While this might seem a bit scary, they might possibly be used for early-stage Alzheimer patients that are still living by themselves. Because of their use, however, these chips would (hopefully) not be used for food supply chain management. My question, what is Kodak, a maker of photography products, doing coming up with such a chip?
What's more important than that they can be ingested is that these prove that RFID chips embedded deep in the body can be read by a scanner. But Kodak is also saying that pills could be manufactured with these chips inside them, so that doctors or nurses can confirm a patient took them.
While this might seem a bit scary, they might possibly be used for early-stage Alzheimer patients that are still living by themselves. Because of their use, however, these chips would (hopefully) not be used for food supply chain management. My question, what is Kodak, a maker of photography products, doing coming up with such a chip?
Thursday, May 22, 2008
RFID Sushi
Two of my favorite things, technology and raw fish! I never really thought these two things would go together so well. At Pintokona, a Kaiten Sushi (conveyer belt sushi) restaurant in Roppongi all the plates are fitted with RFID chips. These chips serve two purposes. First, the chips are used to track how long the fish has remained on the conveyer belt. After 30 minutes the chefs are alerted and the fish is removed ensuring only fresh sushi as the plates pass by. The second function makes adding up the cost a simple wave of a magic wand. Normally at Kaiten sushi they count up the plates based on color and tally the total - sometimes may lead to overcharges or undercharges, but here all they have to do is pass a RFID scanner over the plates. The UHF tags embedded under the plate can take even hot dishwashing cycles. Now that's way i called eating my sushi in technological style! When is Malaysia gonna implement this?
Thursday, May 15, 2008
Mobile software development
A strong expertise in Mobile Software development is required to build applications for mobile phones. Those who are engaged in building applications for organizations which incorporate their software into their product offerings should be well versed with the latest mobile phone software development and software programming tools and technologies. The programming expertise one needs to have is in the following fields mentioned Windows CE, Windows mobile, .NET Compact Framework, Symbian and the list goes on. The programming languages used for the mobile phone software development is C#, C++, Java. One has to obtain expertise in Windows CE and Windows Mobile (Pocket PC’s and Smart phones), Symbian (Smart phones), J2ME (J2ME enabled Smart Phones), BREW (mobile phones), Blackberry OS if one want to build career in Mobile Phone Software development. The field of Mobile Phone Software development provides excellent avenues & revenues to grow and high salary packages attract lot of people to jump into this field. Check out the companies like Optegra and Newspage.
Tuesday, May 13, 2008
Animal Tracking using RFID
The harsh environment of animal identification makes high demands upon the quality and reliability of electronic devices. AGRIDENT Readers and transponders are developed and designed for that challenge from the beginning and have proved since many years their extraordinary reliability in many applications. The disk transponder was the first transponder on the market that survived the slaughterhouse process for pigs, including the flames, without any additional shielding. AGRIDENT has brought the RF/ID Technology into a new dimension of reliability and cost/benefit ratio. Here the picture showing Agrident with Psion Teklogix Workabout with LF reader. The AIR200 Reader contains a configurable interface to the Workabout PRO and enables the user to integrate transponder data very easily in his OS WINDOWS application. The data are available in different data formats. The reader modules fits easily in Gen 1 and Gen 2 of the Workabout PRO handheld computer using the X-Mod interface and are compatible to the different operating systems of WIN CE.NET and Windows Mobile.
Cell phone Boarding Pass
Pretty soon you'll be able to board Continental Airlines flights with a boarding pass stored on your phone. As part of a new pilot program, Continental will be testing the using of electronic passes that could signal the end of the paper passes we know and love. The three month trial will be available for passengers flying out of Houston for now. A unique barcode is sent to a user's phone by the system. It is encrypted and tied directly to the user's handset, so the chances for fraud are low. When you get to the gate all you have to do is open up the message on your screen, the gate attendant will scan it using the Psion Teklogix Workabout Pro Gen2 handheld with barcode reader, and you can proceed to your uncomfortable seat. Though this makes perfect sense, and I could see it being rolled out quickly across a number of airlines. Make sure you don't forget to bring your cell phone...
RFID Malaysia: Passport to new beginning
Raja Azahar said that the Ministry has taken steps to tighten up security measures regarding the movement of both local and foreign citizens, particularly between the northern states of Perlis, Kedah, Perak and Kelantan that border Thailand.
The main concern of the Ministry was border crossings without passports – just a border pass as the only travel document.
“This was the loophole in our system. The minister said that we had to tighten procedures for foreigners because undesired elements could enter the country without any record.
“The border pass was just a piece of paper without any security features – not even a photograph,” he said.
This has changed effective Jan 1,2008 this year.
Raja Azahar explained that those who apply for a border pass have to pre-register themselves and enter their thumbprint into the department's biometric system. But rather than being an inconvenience, it actually makes subsequent crossings easier.
In the case of a six-month pass, he said, “They do not have to show a border pass – they only have to enter their thumbprint. If everything is according to the profile, we allow them to enter or leave the country.”
He reveals that there are approximately 2,000 entries in the database at the moment.
Raja Azahar assured that there were no serious security issues, but the measures were meant to stop those taking advantage of the lax enforcement of immigration laws.
“Anybody who crosses the border will need a travel document and we will have a record of all border crossings. At the same time, we have improved the security element by means of the biometric system.”
Another issue is the potential use of RFID (radio frequency identification device) in visas and passports, which the Ministry is looking into at the moment.
“The whole idea of using RFID is to enhance the security of travel documents, but it can also translate into convenience for the holders.
“We are in talks with Singapore to embed RFID in passports to facilitate faster clearance (through immigration checkpoints). With RFID we can capture all information – we will know if they have a valid passport or even capture their photo.”
However, the use of RFID will not replace biometric systems.
RFID technology is best utilised when it is embedded in visas attached to passports of foreigners entering the country.
The main concern of the Ministry was border crossings without passports – just a border pass as the only travel document.
“This was the loophole in our system. The minister said that we had to tighten procedures for foreigners because undesired elements could enter the country without any record.
“The border pass was just a piece of paper without any security features – not even a photograph,” he said.
This has changed effective Jan 1,2008 this year.
Raja Azahar explained that those who apply for a border pass have to pre-register themselves and enter their thumbprint into the department's biometric system. But rather than being an inconvenience, it actually makes subsequent crossings easier.
In the case of a six-month pass, he said, “They do not have to show a border pass – they only have to enter their thumbprint. If everything is according to the profile, we allow them to enter or leave the country.”
He reveals that there are approximately 2,000 entries in the database at the moment.
Raja Azahar assured that there were no serious security issues, but the measures were meant to stop those taking advantage of the lax enforcement of immigration laws.
“Anybody who crosses the border will need a travel document and we will have a record of all border crossings. At the same time, we have improved the security element by means of the biometric system.”
Another issue is the potential use of RFID (radio frequency identification device) in visas and passports, which the Ministry is looking into at the moment.
“The whole idea of using RFID is to enhance the security of travel documents, but it can also translate into convenience for the holders.
“We are in talks with Singapore to embed RFID in passports to facilitate faster clearance (through immigration checkpoints). With RFID we can capture all information – we will know if they have a valid passport or even capture their photo.”
However, the use of RFID will not replace biometric systems.
RFID technology is best utilised when it is embedded in visas attached to passports of foreigners entering the country.
Monday, May 12, 2008
Qualiti Alam
Tuesday, May 6, 2008
Fancy 2D-Tag on Magazines
What is Semapedia?
To accomplish this, we invite you to create Semapedia-Tags which are in fact cellphone-readable physical hyperlinks. You can create such 2D Barcode Tags easily yourself by choosing and pasting a Wikipedia URL into the form above. Once created, you put the Tags up at their according physical location. You just hyperlinked your world! Others can now use their cellphone to 'click' your Tag and access the information you provided them. Pretty cool!
The goal is to connect the virtual and physical world by bringing the right information from the internet to the relevant place in physical space.
To accomplish this, we invite you to create Semapedia-Tags which are in fact cellphone-readable physical hyperlinks. You can create such 2D Barcode Tags easily yourself by choosing and pasting a Wikipedia URL into the form above. Once created, you put the Tags up at their according physical location. You just hyperlinked your world! Others can now use their cellphone to 'click' your Tag and access the information you provided them. Pretty cool!
Barcode Art
I thought I was one of the few who thought that barcodes had a place in art. Looks like I'm not alone. Even our pals at GS1 are behind this modest effort. Obviously not our pals in Fremont trying to lay claim to a patentable idea themselves. This is further proof the idea is universal. Barcodes are now contemporary visual memes. Try barcoding Mona Lisa?!!
Sunday, May 4, 2008
On-spot billing
Wednesday, April 23, 2008
HP iPAQs new line
You can view the talk with HP's David Fishman about the newly designed HP iPaq line.
Monday, April 21, 2008
What do you want to incorporate in your phone?
Mobile phone has evolved tremendously. Now you have camera phones, music phones, gaming phones, smartphones and multimedia phones. And there are phones of varying designs, colours, shapes and sizes. What do you look for in a mobile phone?
DO you remember your first mobile phone? Mine was just a simple phone capable of making and receiving calls and messages during a time when you could only send a message to a person who is only on the same network. Since then, the mobile phone has evolved tremendously. And there are phones of varying designs, colours, shapes and sizes. So many choices! Having plenty of choices is a good thing. But what do you look for in a mobile phone? Do you want a nice-looking phone or a feature-packed phone?Some look at design while others look at features and their bank account balance, credit card or easy payment plan options. Some want a music player in their phone while others want a camera.Eventually, we all will come up with a phone that we’re willing to buy, but it’s hard to find that ultimate ideal phone, one that offers that perfect blend of form, functionality and pricing. It’s always one or the other. A phone with all the features may not be in that slim, cool and sleek feature; a phone that looks cool and sleek may not have all the features. Or if there is that perfect blend of form and function, the phone may not be within your price range!But this doesn’t mean that there are many people who aren’t satisfied with their mobile phone. Still, it’s important to know what you’re looking for in a mobile phone, how you’ll be using it, and what price you’re willing to pay for it. It may not be the perfect phone, but if it has most of the criteria that you’ve set, your purchase should be a satisfactory one.Personally, there are three basic criteria that I look for in a mobile phone – features, price and design. I have a list of things that I know I want to do on a mobile phone, so picking a phone based on this list makes it easier. I know that I want a phone that’s an extension of my computer but not a desktop replacement.Fortunately, it has come to that point in time when a mobile phone can become an extension of my online life. For example, e-mailing and chatting are available and Web browsing is possible, if not perfect. I would like a phone that’s easy to carry around.As for price, eventually I’d have save up enough money to be able to buy it. And that’s usually when a newer phone with better features and a higher price tag becomes available. Of course, that would then be the phone that I now want!
DO you remember your first mobile phone? Mine was just a simple phone capable of making and receiving calls and messages during a time when you could only send a message to a person who is only on the same network. Since then, the mobile phone has evolved tremendously. And there are phones of varying designs, colours, shapes and sizes. So many choices! Having plenty of choices is a good thing. But what do you look for in a mobile phone? Do you want a nice-looking phone or a feature-packed phone?Some look at design while others look at features and their bank account balance, credit card or easy payment plan options. Some want a music player in their phone while others want a camera.Eventually, we all will come up with a phone that we’re willing to buy, but it’s hard to find that ultimate ideal phone, one that offers that perfect blend of form, functionality and pricing. It’s always one or the other. A phone with all the features may not be in that slim, cool and sleek feature; a phone that looks cool and sleek may not have all the features. Or if there is that perfect blend of form and function, the phone may not be within your price range!But this doesn’t mean that there are many people who aren’t satisfied with their mobile phone. Still, it’s important to know what you’re looking for in a mobile phone, how you’ll be using it, and what price you’re willing to pay for it. It may not be the perfect phone, but if it has most of the criteria that you’ve set, your purchase should be a satisfactory one.Personally, there are three basic criteria that I look for in a mobile phone – features, price and design. I have a list of things that I know I want to do on a mobile phone, so picking a phone based on this list makes it easier. I know that I want a phone that’s an extension of my computer but not a desktop replacement.Fortunately, it has come to that point in time when a mobile phone can become an extension of my online life. For example, e-mailing and chatting are available and Web browsing is possible, if not perfect. I would like a phone that’s easy to carry around.As for price, eventually I’d have save up enough money to be able to buy it. And that’s usually when a newer phone with better features and a higher price tag becomes available. Of course, that would then be the phone that I now want!
Sunday, April 20, 2008
Uncle Chili Amcorp Mall
Not to be mistaken with the other Uncle Chili's at PJ Hilton, this Uncle Chili is located at the basement of Amcorp Mall. It basically serves local dishes especially Chinese style dishes and best of all it's halal. The last I went there with my friends, they ran the place from a double shoplot but now they have expanded. I've tasted their Chinese dishes and find they're delicious, prices reasonable. Most of all, the waiters use Palm PDA to take order!!!
Thursday, April 17, 2008
Smartphone marketshare
The statistics were interesting, but I had also asked people to share the reasons they bought a smartphone in the first place, and whether they liked their current model. Most people did in fact like their current phone. The Windows Mobile users probably grumbled the most about their devices, but still, more than half of them were happy with their experience.
Most people bought their smartphones because they wanted to access e-mail, Web browsing, and telephone calls on a single device, as might be expected. I had thought going in to this survey that most respondents would mostly be using their phones for business, but an overwhelming number of people said they used their devices both for business and pleasure.
The BlackBerry users might have obtained their phone to check their corporate e-mail, but that doesn't mean they don't check sports scores in between meetings, or plot directions to the campground on the weekend. This will be the next big source of growth for smartphones, devices that can balance multimedia consumer desires with business needs. People aren't going to want to carry multiple devices for fun and work: that's why they got a smartphone in the first place. Iphone -here i come, baby!
Most people bought their smartphones because they wanted to access e-mail, Web browsing, and telephone calls on a single device, as might be expected. I had thought going in to this survey that most respondents would mostly be using their phones for business, but an overwhelming number of people said they used their devices both for business and pleasure.
The BlackBerry users might have obtained their phone to check their corporate e-mail, but that doesn't mean they don't check sports scores in between meetings, or plot directions to the campground on the weekend. This will be the next big source of growth for smartphones, devices that can balance multimedia consumer desires with business needs. People aren't going to want to carry multiple devices for fun and work: that's why they got a smartphone in the first place. Iphone -here i come, baby!
Subscribe to:
Posts (Atom)
Pricing for RFID labels
https://www.digikey.my/product-detail/en/avery-dennison-rfid/700067/1543-1052-ND/5135122
-
A strong expertise in Mobile Software development is required to build applications for mobile phones. Those who are engaged in building app...
-
What is MNP? It is the ability for users to switch to a new mobile service provider while retaining their existing mobile number. Remember, ...
-
Good News! In aid of HOPE Worldwide, a Live Charity Concert featuring the New York Harlem singers and many more, will be held at Genting Hig...