Monday, September 30, 2019

Dell Company Background Essay

DELL is a multinational information technology corporation based in Round Rock, Texas, United States, that develops, sells and supports computers and related products and services. Bearing the name of its founder, Michael Dell, the company is one of the largest technological corporations in the world, employing more than 96,000 people worldwide. Dell had 46,000 employees as of Jan. 30. About 22,200 of those, or 48.3 percent, were in the United States, while 23,800 people, or 51.7 percent, worked in other countries, according to a filing with the Securities and Exchange Commission.[citation needed] Dell is listed on the Fortune 500 (2010). Fortune also lists Dell as the most admired company in its industry. Dell has grown by both organic and inorganic means since its inception—notable mergers and acquisitions including Alienware (2006) and Perot Systems (2009). As of 2009, the company sold personal computers, servers, data storage devices, network switches, software, and computer peripherals. Dell also sells HDTVs, cameras, printers, MP3 players and other electronics built by other manufacturers. The company is well known for its innovations in supply chain management and electronic commerce. On May 3, 2010, Fortune Magazine listed Dell as the 38th largest company in the United States and the 5th largest company in Texas by total revenue. It is the 2nd largest non-oil company in Texas (behind AT&T) and the largest company in the Austin area. DELL SWOT Analysis Strength †¢ Customer oriented marketing strategies. †¢ Well-Known for online selling of Computers. †¢ Listed in the fortune 500 companies as the 25th largest company. †¢ Dell Company employs more than 76000 thousand people. †¢ Provide quality PCs, Laptops and computer peripherals at low price. †¢ Low manufacturing cost. †¢ Dell offer computers with AMD and Dell processor. †¢ Dell has nine of manufacturing plants. †¢ Offer wide range of PC, Server, Laptops, Monitors and LCDs, Data storage devices, network switches and software. †¢ Dell built computer on customer provided specifications. †¢ Dell always keen to embed latest technology in its products. †¢ It has a reliable support and service. †¢ The company website at least receives 25 million visits. †¢ Efficient Inventory management. †¢ Dell became the first company in the information technology industry to establish a product-recycling goal. Weaknesses †¢Elimination of bonuses in 2006 to increase the company financial performance. †¢ Closure of Dell’s biggest call center in April, 2003 terminating 1100 employees. †¢ On January 8, 2009 Dell announced the closing of its manufacturing plant in Limerick, Ireland with the loss of 1,900 jobs and the shift of production to its plant in Poland. †¢ Dell not able to attract the students of schools and colleges, this segment earn only 5% of total revenues. †¢ Lot of criticism against the Dell’s claim of world’s most secured notebooks. †¢ Dell willingly discontinued the â€Å"world’s most secure laptops† advertisement after the declaration of the NAD investigation. †¢ Dell have no proprietary technology, the currently used technology by dell are shared by the other major competitors. †¢ Dell is dependent on its suppliers Opportunities †¢ India, Pakistan and Bangladesh are the untapped markets. †¢ Market penetration in education and Government markets. †¢ Cost reduction in latest technology. †¢ Partnership or acquiring of suppliers. †¢ Dell has opportunity to sell computer directly to retailers. Threats †¢ Fluctuation in currency outside US. †¢ Major competitors in the market. †¢ Most of the countries are hit by recession which may result in the reduction of revenues. †¢ Government Policies. †¢ Bargaining of Suppliers. †¢ Rapid change in technology obsoletes the product in small span of time. †¢ Aggressive marketing by competitors.

Sunday, September 29, 2019

“Everyday Use ” Summary by Alice Walker

â€Å"Everyday Use† In â€Å"Everyday Use†, author, Alice Walker uses the backdrop of a small town family using characters Maggie and Dee and Mama to symbolize the dynamics of the greater African American color, educational and class struggle in America. She uses the family because it is an institution that every reader can identify with. This is a story of what it really means to â€Å"make it† in the Black family and Black community. Mama typifies the single parent who is functioning in the dual role of mother and father. Walker makes no mention of Dee and Maggie’s father in the story but rather characterizes Mama as a â€Å"big-boned woman with man-working hands†(1) and gives Mama all the physical qualities and skills of a man but embodied in a woman. Mama can slaughter and prepare hogs and bull calves; she can bust up blocks of ice to get the water needed in the house for washing. And she can do all of these things as â€Å"mercilessly as a man†(1). From the beginning of the story, Mama’s character takes on the strength and hardness of presencenormally represented in a man. With Mama, the author shows the daily struggles and assimilation of the dual role that single mothers must embody on a daily basis inthe absence of a father figure. The outward display of Mama’s strength is a foreshadowing of the strength that she will have to summon at the end of the story when she must ultimately decide which daughter will receive the quilts. Mama’s children, Dee and Maggie have their own set of paradoxical differences which are juxtaposed against each other not unlike their mother. There is the conflict of light skinned versus darker skinned; well spoken and educated versus reticent and ignorant. A shapely body with perfect feet versus a skinny and badly burned girl with no style. Brazen and head strong versus cowering and confused. Dee and Maggie are polar opposites of each other, with all of the positive attributes in the favor of the older sister, Dee. The author is illustrating how society has createsa disparity in the Black community with Dee and Maggie. Dee represents the portion of Black America that has tried to â€Å"make it† but has not leant a helping hand down to the people who have paid the way to make it possible for them to succeed in society and to get an education. Dee has forgotten about all of the sacrifices Mama and Maggie have made which have allowed her to enjoy the benefits of her Neo-African-Islamic renaissance. It was Mama and Maggie who took part in raising money for Dee to live out her dream. Dee is symbolic of that portion small portion of society that refuses to both acknowledge and to give back to their families and communities. The only message that they can ever seem to offer is one of criticism and blame. The most vivid imagery of this is when the first house burns down; Dee is the only one who has made it outside safely. She does not yell for help or try to ensure the safety of her mother and sister. She is transfixed on the flames and is seemingly hoping for the house and all of its inhabitants to be consumed as well. Dee stands out in the safety of the sweet gum tree while her mother and sister literally have to run for their lives. Walker shows us the paradox of a person who, having obtained safety, will not extend concern for similar struggles that will be shared by the family. The fire in the previous house beat Maggie’s spirit down. The fire represents the world having beat Maggie because she was not Dee. Neither Maggie nor Mama had the good fortune to be of a fairer complexion like Dee. Maggie already had one strike against her by being dark, which would be made worse by being scarred by her environment (the house fire). Maggie has accepted that she is not bright like Dee and has resigned herself to her mundane life of poverty. She is ashamed of her scars and life experience so she cowers in the presence of strength and in the cruelty of society. Maggie’s natural inclination is to acquiesce. She realizes that she is no match for the likes of Dee and so she concedes the quilts that Mama has promised her to Dee. Neither Dee nor Mama has realized that Maggie does have something to offer to the world. She has a capability and intelligence that are all her own. It is Maggie who knows the family history: she knew the name of Big Dee’s first husband, Stash and that he had whittled the butter dash(3); she made the observation that Dee has never had any friends; she has learned the art of family preservation through quilting with Grandma Dee and Big Dee. â€Å"Maggie knows how to quilt†(4). Maggie’s resourcefulness and knowledge are never acknowledged in the presence of Dee. She can never shine quite as bright as Dee can. Society will never fully lay credit to all that Maggie can offer to the world because Maggie does not look like a person of value should look to us. Alice Walker has raised some challenging issues for us to ponder. How is value both assessed and ascribed? Does skin complexion still both afford some and exclude others from certain opportunities? Walker uses the most protected place on earth, the family structure, to show what some may be afraid to see within ourselves and in our society.

Saturday, September 28, 2019

Transportation Management Sytems Essay Example | Topics and Well Written Essays - 500 words

Transportation Management Sytems - Essay Example The first step towards achieving this integration is the dissemination of complete information among suppliers, retailers and carriers. The TMS should plan and manage multiple transportation modes, multiple carriers, multiple routes and multiple tariffs for timely supply of goods at low cost. When the GIV is efficiently operated, it will result in low cost throughout various stages of supply chains. Under GIV, time consumption, labour expenditure along with the handling costs could also be reduced due to a reduction in the number of personnel required to complete the task. Reduced lead time availability is the main benefit from the GIV. It leads to implementation of creative policies resulting in improved product quality and increased customer service. (Hopp and Spearman, 1996). The virtual warehouse (VW) concept, aimed at maintaining real -time global visibility for logistics assets, was pioneered by Global Concepts, Inc. (Stuart et al., 1995; Landers et al., 2000).Real-time information and real-time decision algorithms are the basic things in the VW that provide operating efficiencies. But as proved by the simulation model, conducted for an auto-parts supplier’s (company) multi product supply chain, the GIV could achieve these efficiencies in a single class warehouse (Stuart et al., 1995). The simulation model was experimented with three types of items known as slow moving items, regular items and fast moving items. They are automobile engines, automobile tires and motor oil items respectively.

Friday, September 27, 2019

Laws of Physics behind Aikido Research Paper Example | Topics and Well Written Essays - 1750 words

Laws of Physics behind Aikido - Research Paper Example Aikido methods comprise of entering and turning movements, which readdress the force or energy of an opponents attack, and a joint or throw lock that ceases the technique (Mroczkowski, 2012). Even though, it derives largely from the martial arts of DaitÃ… -ryÃ… « Aiki-jÃ… «jutsu, it started to deviate from it in the late 20s, partially because of Ueshibas association to the Ã…Å'moto-kyÃ…  religious conviction. His initial students writings have the phrase aiki-jÃ… «jutsu (Mroczkowski, 2012). However, his senior students have unique approaches to the fighting method, relying partially on when they learnt with him. Today, the style is seen all over the world in countless methods, with a couple of interpretation and stress. Nevertheless, they all share methods that were developed by Ueshiba and a majority have apprehension for the safety of the attacker. Because the technique involves force and reaction, physics is normally involved when it comes to the execution of its techniques. Th is paper will discuss the laws of physics behind Aikido and how things like force, momentum, rotational speed, direction, impulse and conservation of energy can work for or against a person. Similar to Judo, Aikido is a form of martial arts, which demands an intuitive comprehension of the physics of forces, stability, torques plus rotational motion (Mroczkowski, 2012). The grace that each needs is not simply conveyed, but each and every method can be split into components, which can be assessed in reference to classical physics. Aikido seeks to surmount a rival’s stability. It is a fairly modern type of martial art, which integrates methods from a couple of other martial art methods. It is differentiated by its firm code of making sure that you do not injury the opponent. Thus, it is mainly a type of self-defense when compared to other martial arts methods such as judo (Mroczkowski, 2012). It incorporates no methods, which can be deemed as attacks and many critics have deemed it as the

Thursday, September 26, 2019

Hospitality and tourism industry economy in Australia Essay

Hospitality and tourism industry economy in Australia - Essay Example Although, this segment comprises of a cluster of small firms or hotels that offers extremely attractive holiday packages to spend leisure or recreational times, religion or health, business and professional purposes at a quite affordable ranges. Due to this, its competitiveness enhanced to a significant rate as compared to others. Thus, from the above graphs, it might be depicted that the outlook of hospitality or tourism industry in Australia changed to a certain extent. The entire credit of such a market scenario of hospitality and tourism industry of Australia is due to the changing demographics. However, in-spite of benefits, it also had to face varied types of challenges as well. This paper mainly focuses about the challenges regarding the type of jobs and talents required for the individual getting engaged in the hospitality and tourism industry in Australia due to changing demographics. Along with this, it also describes the appropriate human resource approaches essential to retain the employees as well as to attract new talented ones towards the industry of tourism. In this today’s era, maximum extent of the employees desire to establish his or her own identity and image in the organization or industry, engaged with. This is mainly due to the changes of the attitudes and behaviours of the generation x and y candidates as compared to baby boomers. So, in order to retain the employees of generation x and y within the organization or industries for a longer period of time, varied types of human resource approaches are maintained. These approaches might lead to the betterment of this industry. So, they are described below one by one. Succession Management- according to Philips (2012), it is a constant process of identifying, assessing and developing varied leaders within the organization so as to improve the level of performance, dedication

Wednesday, September 25, 2019

Multimedia Coursework Example | Topics and Well Written Essays - 4000 words

Multimedia - Coursework Example rsity in the development of massive open online course (MOOC) that use multimedia in engaging learners in an interactive online training and educational program The most generally used multimedia applications are World Wide Web, hypermedia courseware, video conferencing, video-on-demand, interactive TV, groupware, online shops, games, virtual reality, digital video editing and production systems, multimedia database (Marshall, 2001a, p. 1). Experts posit that the broadly used applications are hypermedia systems through world wide web; multicast backbone that is strategically digitizing TV and radio streaming; and the enabling technologies which composed of carrier, switching, protocol, application, coding or compression, database, processing, system integration technologies (Marshall, 2001a, p. 1). Multimedia is also about developing a visual design hence, those who’d be working on website development for the Training Company must have deep knowledge on themes and styles which could either be comic, or simply informative or interesting, or must have some great ability for morphing, texture tastes and some techie explosions to make it attractive and impressive in its construction (Marshall, 2001b, p. 1). a. Social networks- this encourage creation of personalized pages and connect this to friends and associates or organizations to share content, statuses, photos, shouts, and ideas. This is also called as microblogs. The largest networks considered are, Facebook, Twitter, MySpace and LinkedIn (W3Schools, 2012, p. 1). b. Blogs- this is a web space where a person can register and subscribe to write their stories, opinions and experiences. Blogs can either be personal, political, business, ‘almost media’, and mainstream media (W3Schools, 2012, p. 1). c. Wikis – this is a web where people and institution provide information, reports, and data as communal database. The most prominent wiki is Wikipedia that has been considered as the leading online

Tuesday, September 24, 2019

Research Paper Example | Topics and Well Written Essays - 750 words - 5

Research Paper Example as a key driver behind the phenomenal success that the company has been able to achieve in the past decade or so. Certainly, when one views Apple Inc.’s extensive product portfolio in the technology industry, the immediate reaction that is garnered with regards to the success of the product reflects upon the idea that the triumph of the product is only attributable to innovation and creativity. More so, one also feels that Apple Inc. has been able to stand out in the market because time and again the organization has been able to beat competitors like Microsoft and Samsung by deliberating what the customer wants and then acting upon that deliberation. However, innovation in product design and execution is not something that happens by chance and it most certainly is not one facet of organizational success. Through this article I learned that it is in fact possible for a company to base its future direction on the design of the product that appeals the market and reaches out to the customer. I believe that the crux of Heracleous’s analysis regarding Apple Inc.’s product design and associated decisions lies in emphasizing upon how the company is able to develop a convergence. As noted by the author, â€Å"†¦the company has helped to accelerate the blurring of industry boundaries through the spread of devices that offer convergent technologies† (Heracleous 3). In this segmnent of the discussion the author emphasizes upon the need to take such product design decisions that demonstrate risk and audacity through the integration of a surprise element. Many a times while conducting research that is related to operations management and enhancing the issues that are associated with process management, companies choose to ignore the minor faults in the product design itself which maybe hindering the successful execution of tasks. Discussing the matter with respect to process decision making at Apple Inc. it can be identified that the company basis its

Monday, September 23, 2019

Outline Assignment Example | Topics and Well Written Essays - 250 words

Outline - Assignment Example He is no more an authoritative director who was supposed to give orders and merely direct subordinates as in the past. Today's fast growing world has new and revolutionary demands for leaders. A leader today has to be a charismatic being who does not shy away from doing work himself, rather enjoys putting valuable effort in the teamwork. Action Learning helps in producing such leaders (Rigg, & Richards, 2006). Paragraph 2: Development of leaders and effective leadership through action learning The practical approach of the Action Learning motivates the leaders to indulge in the work themselves to better perceive the situation. It makes them realize that they cannot win a war by standing on the edge. They will have to step into the arena to understand the demands of particular events and to decide and direct their subordinates accordingly. They will have to observe their own actions, analyze their motives and scrutinize their own experiences in order to find out the ways to improve th eir performances further. Thus, action learning teaches men to use their insight along with their knowledge and intelligence to perform better. And these very attributes have let Action Learning emerged as one of the most influential and valuable tools that is used worldwide for developing leaders nowadays.

Sunday, September 22, 2019

The Tuskegee Syphilis Study Term Paper Example | Topics and Well Written Essays - 1500 words

The Tuskegee Syphilis Study - Term Paper Example The study was based on the hypothesis that black and white people differed in their response to the disease. Before the study was initiated in 1928, the U.S Public Health Services (PHS) had already completed a study in Mississippi in which 25% of the participants who were all black had tested positive for the disease. The PHS intended to expand and continue the study in rural black population and set up a treatment program with aid from the Julius Rosenwald Fund. Though the study initially intended to improve the health of the African American population by providing doses of metals which was used to treat the disease during that period, the coming of the great depression drastically lowered the funds for the project. And it was then that the PHS decided to conduct a study based on the aforementioned hypothesis that racial variation plays a role in the effects of syphilis. The objective of the study was to compare the natural progression of syphilis in untreated poor African American s who were followed up for a period of 40 years with a healthy control population who were free of the disease. While the initial study was designed to last for a year and where participants with syphilis were given minimal treatment which would have definitely not cured them, the extended study examined men with untreated syphilis over the 40 year period and in case they died during that period their bodies autopsied to study the exact course of the infection (Angell, 1997; Sugarman, 2002).  

Saturday, September 21, 2019

The economic problem and how different groups attempt to solve it Essay Example for Free

The economic problem and how different groups attempt to solve it Essay The economic problem can be described as attempting to satisfy the unlimited and ever changing wants of the consumer with limited resources. As these wants can never be satisfied, all individuals, businesses and governments are faced with the choice of what to obtain with those resources. As each consumer groups wants and resources varies greatly, each deals with trying to solve the economic problem in a different way. The choices made by each individual are unique, depending on income, age, gender, living situations, education, voting, retirement and personal expectations. In order to deal with the economic problem, individuals must show preference for one good or service over another and be prepared to sacrifice many of the things that they desire. The individual must also plan how much of his/her income they will spend and how much they will save. This ratio can be difficult to establish and can change at any time. Each individual is faced with the economic problem many times daily, and will continue to be faced with the challenge of choices. Businesses too face the economic problem, but on a more complex level than the individual. A company must first decide what area of business that they will specialise in order to generate the most success. As businesses have limited resources they must focus these on a product or service that will hopefully generate a profit in order to continue operating. Once that is decided, the company must first price the product and then try to allocate its resources (land, labour, capital or enterprise) in order to maximise efficiency. In order to minimise costs, a company may have to choose between quality and quantity which can lead to difficult decisions purchasing equipment, employing/ paying reliable employees and obtaining supplies. Unlike the individual, a business must also contend with the problem of industrial relations, such as wages, contracts, managing employees and union agreements, creating more choices and intensifying the economic problem. The Government not only faces the economic problem itself, but can influence the choices of both individuals and businesses by placing taxes on some items (making them more expensive and generating revenue) or making some goods and services cheaper. Governments also have the power to restrict and  regulate economic behaviour by prohibiting some behaviours and enforcing fines. The choices a government makes in answer to the economic problem have large implications on the community they serve. A national Government for instance, may choose to concentrate on defence plans and forgo other areas such as education. Although this satisfies the immediate wants, in the future it may lead to low economic activity, affecting the entire nation. Governments often find this a problem when trying to be more popular with voters (the individual consumer). The Government has the largest influence on the economy; therefore careful consideration must take place when making choices in response to the economic problem. Although individuals, businesses and governments all come across the economic problem in different ways, the only way to deal with it is resource allocation: choosing what to spend the limited resources in order to gain maximum satisfaction. This is often organised as a budget, whether within a household or the Governments National Budget for the year. However this is only a way of dealing with the problem, it does not solve it. As the wants of consumers are unlimited and ever changing, they can never be satisfied with the limited resources of the consumer or group. A budget simply aims to make the best choices, taking the wants and resources into account.

Friday, September 20, 2019

Main Components Of Marketing Management Marketing Essay

Main Components Of Marketing Management Marketing Essay The industrial world has come a long was from the early days of industrial revolution. As the industrial world has grown tremendously, it has become more complicated and a subject of academic study. Business concepts have evolved and new findings and ideas have been recorded continuously. Different organizations have different business strategies and plans. Marketing management has become an essential part of a business strategy. Marketing management is the proper use of marketing techniques, resources and activities by a company or organization to promote its products (Kotler et al, 2006). This report aims at explaining the main components of strategic marketing management. For better understanding the report then concentrates on the newspaper industry in particular. It explains how internet has become a key challenge for the newspaper industry. Also the author demonstrates the ability to apply marketing theory by doing a SWOT analysis of the newspaper industry. Main Components of Marketing Management Marketing is one of the main aspects of business management. It is also one of the most powerful in that it has the potential to significantly impact the entire business management process that few of the other aspects of business management can match. Marketing and its management is almost as diverse a field as business management itself. The main components of marketing consist of analysis, planning, implementation and control (Czinkota Ronkainen, 2007). These are the components no matter what the kind of industry or service the target of marketing might be. Situational/Strategic Analysis Strategic analysis is mainly about analyzing the strengths of organization and the external factors that can influence the business position. It is necessary to understand the current environment before defining specific marketing activities (Lamb et al, 2008). It involves in assessing what a particular organizations position is with respect to its customers, how the business is functioning within and its competition outside. Various qualitative and quantitative methods of data collection are used for marketing research to be carried out. Sources of data will consist of primary and secondary, with the secondary ones being those that are already available i.e. reports, journals, articles, etc and the primary sources being surveys, questionnaires to the target audience, etc that will reveal product specific or service specific information at the desired time period. Analysis is also required of the external conditions to take account of the changes in technology, changes in governmenta l policies that could impact the industry, etc. Customer analysis is equally important which includes customer buying trends, continual assessment of the target customers to increase the base of potential customers. Various tools that can be used to carry out the analysis are: PEST analysis, scenario planning, SWOT analysis, market segmentation, etc. Strategy Planning The situation following in depth analysis and data gathering leads to one that requires intense planning and simulation. Due to knowledge of the opportunities and risks gathered from the analysis stage the company must now plan its actions based on its objectives that will involve long term strategic decisions, tactical decisions that affect mid term goals and operational decisions that affect daily operations of a company (Czinkota Ronkainen, 2007). By rigorous cost and profit estimates on various models of action, the company will be best able to judge which model to choose. The model chosen might require that necessary changes be made in the existing organizational structure or a complete revamp in some cases to help achieve the goals and objectives set. It is also imperative that at this point in time, the company comes out with alternative plans in order to meet its goals and objectives in case the primary plan does not work out. Strategy Implementation and Control These are probably the most important phases in the marketing plan since no matter how much effort is put into the analysis and planning phases, the implementation needs to be carried out according to plan with appropriate control. The implementation should be carefully carried out since often times it is found that plans are hardly adhered to. The implementation and control must also allow for adequate flexibility for tackling with unexpected and undesired situations. Strategy implementation directly affects everybody associated in an organization (David, 2006). By frequent monitoring and control of the implemented plans, the company can gauge the effectiveness of a particular plan or change it accordingly based on the effects it is having. Marketing Management and other Aspects of Business Management As mentioned above marketing is an important part of the overall business management and plays an important role in the organizations success. An organizations success depends on how it can satisfy its customers through its products and services. This is where marketing plays an important role. It is the marketing plan of an organization that decides how an organization goes by in making its products and services available to its customers. Also marketing plan is what decides in which market the organization is going to compete and what are the steps to be taken to meet and satisfy the customers needs. Hence, the success of all other aspects of business management is directly or indirectly dependent on the success of the marketing strategy. For example staffing and production or a part of the business management. So these factors are directly dependent how an organizations products and services fares in the market. As mentioned marketing strategy plays an important role in the market success of a product or a service. Hence, all the other aspects of business management are closely related and dependent on the marketing strategy. Key Challenges Affecting Marketing Strategy of the Newspaper Industry Newspaper industry has been one of oldest and dynamic industry that has enjoyed great success for a very long time. Newspaper industry has played a dominant role in public communication in the past century. It has seen tremendous growth and financial success in the second half of the 20th century. Even though the main purpose of the newspaper industry is to make news available to public, its main source of income has been advertising, especially, retail and classified advertising (Picard, 2008). 75 to 85 percent of income of an average newspaper in the Unites States and European countries is accounted by advertising. Newspaper advertising has witnessed a strong and consistent growth in the 20th century and also a relationship was observed between advertising spending and GDP (Gross Domestic Product). All this was possible as there was literally very little competition in the advertising sector (Picard, 2008). The impeccable success of the newspaper industry is now on a decline. The debate over the end of the newspaper industry has been doing rounds since the last decade of the 20th century and early 21st century. But now there have been observable effects of this decline around the world. In the US alone, The Rocky Mountain News and the Ann Arbor have completely shut down wherein Seattle Post Intelligencer has stopped printing and has completely adopted web only model. The Detroit Free Press and The Detroit News have cut down their publishing to 3 days a week (Barbara, 2009). In the UK, all national newspapers have recorded a year on year fall. Pearsons financial daily and Independent News Medias the Independent have both recorded a 3.17% and 14.02% year on year drop respectively (Busfield, 2009). There also has been a drop in the number of people employed by the newspaper industry. The number of people employed by the newspaper industry has gone down by 18% over a 14 year period from 19 90 to 2004 (Barbara, 2009). As per Pew Project findings, 14,000 reporting jobs have been lost during 2001 to 2009 (Entman, 2010). All this is a strong indicator of the demise of the newspaper industry. One of the key challenges or reasons for the decline of the news paper industry has been the internet. The situation is best summed up by Will Manley (2008), when he states Thanks to the Internet, the entire newspaper industry is fighting for its life. The internet has hit the core of the industry. It has diverted both the advertisers and the readers away from the newspaper industry. The development of internet and its advertising abilities are now substituting the traditional newspaper classified advertising (Picard, 2008). Internet advertising model has taken away a major chunk of the newspapers primary source of income which is the classified and display advertising and also it has led to a decrease in the readership as well (Gardner, 2009). The newspaper share in the total advertising expenditure has decreased by one third. Clearly the newspaper industry is losing its dominance over the advertising world. First, lets consider the effect of the internet on the readership. Internet has achieved great penetrability today on a global stage and has connected the world like no other communication means in the past. The internet, growing mobility and dropping costs have lead the access of global multimedia networks which link individuals, groups and news organizations (Entman, 2010). This has given the readers access to world news at absolutely no cost. It gives them an opportunity to refine the news topics as per their individual interests and also to search news articles from previous issues if required. These advantages have started diverting readers from the traditional print newspapers to digital news websites on the internet. There is a drastic increase in the number of prole going online or using wireless devices to get news and information (Gardner, 2009). According to research news sites and digital newspapers are among the most widely demanded and visited web sites among the Intern et community worldwide (Flavian Gurrea, 2008). News portals like Google News and Yahoo! News have contributed immensely to this drastic diversion in readership. They dont just offer aggregated news content but also are available 24/7 to anyone who has access to internet from anywhere in the world (Barbara, 2009). Internet news portals and websites have an added advantage. They allow an interaction between the readers and also with the journalist who reports and edits the stories which is not possible in the traditional news papers (Entman, 2010). This is in sync with the trend that a great number of investigative stories about the government wrong doing have appeared on various news and opinion bloggers than in the newspapers (Manley, 2008). This indicates the trend that readers are looking for online resources for news and information. Internet is now being accessed by mobile phones and wireless devices which are not helping the newspaper industrys cause. All these reasons combine d, have lead to a decrease in the readership of newspapers. Lets now consider the threat posed by internet on the newspaper advertising which is the financial back bone of the newspaper industry. Internet has come out with a dynamic advertising model which has proved to be more effective for classified advertising than in the newspapers. This has made a damaging impact on the newspaper industry as classified advertising has been the primary category of advertising sales and growth (Picard, 2008). The decline in readership and the advantages that internet advertising offers has made advertisers reconsider their overall advertising spending patterns. Concerns over the effectiveness of advertising took more momentum due to the economic downturn and recessions. This made advertisers explore new media for advertising and internet was a great substitute (Picard, 2008). Internet had great advertising models which attracted traffic and also advertisers could target their customers which were not possible through newspapers. Models like Google AdSense are a great example of this business model where people were paid for displaying ads on their personal websites and for increasing the traffic. Also there are agencies that pay people for viewing ads which means the advertisements have maximum reach. Huge revenues generated by Google, Yahoo, MSN are an indicator where the advertisers are channeling their dollars (Barbara, 2009). The newspaper industry is no more interesting to the advertisers as it was a couple of decades ago. Newspaper publishers seem to have taken the hardest hit from the technological and economic challenges of publishing (Barbara, 2009). The decline in readership and newspaper advertising has made the newspaper industry less financially interesting for investors as they are looking for profits and assets growth (Picard, 2008). Strategic Analysis of the Newspaper Industry As mentioned above, strategic analysis is the main and foremost component of marketing management. A strategic analysis must analyze all the factors that influence the marketing strategy of an organization. Below is the SWOT analysis of the newspaper industry. SWOT Analysis SWOT (Strength, Weakness. Opportunities, Threats) analysis helps an organization to determine where it is doing well and where it needs improvement. SWOT analysis must be made relative to the market needs and competition (Ferrell Hartline, 2007). Following is the SWOT analysis of the newspaper industry: Strengths: The strength of the newspaper industry is that it targets a wide range of customers across the globe. Newspaper industry has penetration remote parts of the globe where there are no other sources of world news. This is great strength as this gives the newspaper industry a large customer base. Weakness: The cutting of trees for paper has become a global issue under the global warming context. The dependence of newspaper industry on paper has become its biggest weakness as there is huge support from world wide for e-books and papers. The newspaper industry must come up with an alternative to paper. Opportunities: There is a huge opportunity for the newspaper industry to venture into other markets and use advanced technologies to reach the customers or readers. Newspaper industry can join hands with electronic media to come up new business strategies and plans. But this is an opportunity which has to be used. Threats: As mentioned above electronic media is an opportunity if used but right now it is a threat to the newspaper industry especially in developed countries. Electronic media have gained popularity in the last couple of decades and have become a serious threat to the newspaper industry. Conclusion Strategic marketing management is very important for the success of any organization. The marketers must understand the importance of this and use the various tools and ideas at their disposal to come up with ideas and strategies that will help the organization to beat the competition and succeed. Being innovative in formulating strategies is the need of the hour for every organization in order to survive in todays highly competitive industrial world. In particular, newspaper industry has to adopt new ways and methods to overcome the challenges posed by the technological advancements, particularly ineternet. The importance of marketing management can not be stressed any further and its high time that the organizations world wide realizes and implements marketing management in their business model.

Thursday, September 19, 2019

Storage Media: DVD-RW :: Technology Computer Essays

Storage Media: DVD-RW The evolution of faster computers and larger computer programs has made it necessary to develop newer and faster ways to store large masses of data. Constant advances from 5 Â ¼ inch floppies, to 3 Â ½ inch floppies, to high capacity floppies, to zip drives, to CD-RW drives make it seem like by the time you upgrade, the technology is already obsolete. So what is the near future of storage media. The newest storage media that is rapidly advancing on the CD-RW is the DVD-RW. DVD-RW drives are decreasing in price, almost as fast as they’re increasing in speed. Over the last 18 months, their price has cut in half, and it’s easy to see that in the near future, DVD-RW drives will be the standard for storage media. According to J. B. Miles of Government Computer News, Rewritable DVD drives are on their way to becoming indispensable tools for PC users. It won't be long until they replace rewritable CD drives. DVD rewritables are hard to beat when it comes to capacity and versatility. They can read, write and rewrite up to 4.7G of information per disk side and will read both DVD-ROM disks and most CDs, so those music CDs you've collected won't be wasted. (Miles 2002) Currently there are two major formats competing to become the standard in DVD-R and RW. The formats are DVD+R and DVD-R. In the past it’s been hard to decide which to invest in when purchasing a new DVD-RW drive, however, recently released DVD-RW drives such as Sony’s DRU-500A are able to write in both formats. Not only does this new Sony drive write DVD+RW and +R at 2.4X, it also writes the competing DVD-R and DVD-RW formats at 4X and 2X, twice as fast as current dedicated DVD-R and DVD-RW drives. On top of that it is also able to burn CD-Rs at 24X and CD-RWs at 10X. This could be very beneficial considering the low cost of CD-Rs compared to DVD-Rs. The technology doesn’t stop with the DVD Drives. The actual DVDs will be experiencing upgrades as well. Faster and faster write speeds will cut down on the time it takes to write you 4.7 Gigabytes. Maxell has recently announced they are releasing their newest DVD line in February 2002.

Wednesday, September 18, 2019

How To Upgrade You Computers Memory Essay -- Process Essays

How to Upgrade Your PC's Memory A memory upgrade is the easiest and most cost-effective upgrade that you can make to increase the performance of your personal computer (PC). The RAM, or random access memory, temporarily holds data and instructions as the central processing unit (CPU) processes them. As you increase your PC's RAM, its performance will be faster, and it will have fewer program or system crashes. When you purchase a PC, it usually will not come with the maximum amount of RAM possible, leaving you room to upgrade the amount. The process of adding additional RAM memory modules is relatively easy to do yourself if you have a basic understanding of how to operate a computer and how to operate Windows XP. Because Windows XP is the most commonly used Operating System, it is assumed that it is installed on your computer. If you are unsure of your skills, consult a PC Technician for the installation. It is possible to damage a PC while installing new components. The first step that you should take is to determine how much RAM that is currently installed in your PC. First, click on the Start button. Next, you should right-click on My Computer. On the Shortcut menu, select Properties. Finally, click on the General tab. This will display the version of Windows that the PC is running, the PC's processor type, and the amount of RAM that is installed. The second step is to check your PC's documentation or the manufacturer's website to gather important information. This is a very important step because not all memory modules work in all PC's. There are different types. You should find out the type, speed, and category of RAM that can be installed, the maximum amount of RAM that your PC can handle, and where the memory modules... ...ct slots in the correct position. When you have the module lined up, insert it into the slot. Gently push straight down with firm force. The module will lock in, and the supporting arms on the slot will lock into place. If the module is not going in properly, do not force it. Instead, remove it and try again. For the final step, replace the side panel and screws. Reconnect the monitor, keyboard, mouse, and any other cables that you disconnected earlier. Then reconnect the power cord to the PC and plug it in an outlet. Turn on your PC. When the computer powers up, it will automatically count the memory present and show it onscreen. Check that the number is correct. You can also repeat step one to confirm that that correct amount of memory is installed. If the number is correct, and you receive no error messages, you have successfully upgraded your computers' memory!

Tuesday, September 17, 2019

Peter in da Vincis Last Supper Essays -- Leonardo da Vinci Last Supp

Leonardo's The Last Supper depicts the sequence of events before Jesus's betrayal and crucifixion. Rather than merely a snapshot in time, The Last Supper seems to be a continuous sequence of events, and a foreshadow of events to come. Two interpretations of the subject of the painting come to mind: the betrayal announcement and the first communion. Observing the impulsive Simon Peter's interactions with Judas and John, Jesus and Thomas, it is clear that The Last Supper represents a conjoint presence of both the betrayal announcement and the institution of the Eucharist. The main theme behind The Last Supper is Jesus's death. Jesus came to earth to be crucified as the sacrifice for the sins of mankind. Man cannot become righteous by his own works and are thus condemned to hell. But Jesus comes as a sacrifice to pay for those sins and thus all who trust in him and give their lives to God will be forgiven of their sins. This is what the Eucharist represents. The bread is Jesus's body broken for man, and it symbolizes Jesus's sacrifice on the cross. From a secular viewpoint, the Eucharist means nothing, so the main theme is obviously Jesus's announcement of the betrayal. Jesus already knows that Judas will betray him and accepts it because the betrayal is but one part of God's plan. The reactions of the apostles as seen in the painting seem to differ, as some react to the betrayal while others appear to be receiving communion. Peter's placement on the left side of the painting and his placement between John and Judas reflects his character. The painting is divided with six apostles on either side of Jesus. The ones on the right are beside a lighted wall, whereas the ones on the left sink into the shadows. Peter is on the darke... ...himself claims: "Your tongue will be paralyzed... before you predict with words what the painter shows in a moment" (Steinberg, p. 53). Yet The Last Supper has become a masterpiece that has sparked many debates. Does it depict the first Holy Communion, or the prediction of the betrayal? Many have argued either way, and there are valid arguments for both. By examining the interactions of Peter with John, Judas, Jesus and Thomas, we see that indeed both events are represented. Instead of choosing to capture a single moment, Da Vinci's masterpiece covers past, present and future events and both the institution of the Eucharist and the betrayal announcement. The Last Supper is truly complete work of art in every way. Works Cited Holy Bible. Wheaton: Tyndale House Publishers Inc., 1996. Steinberg, Leo. Leonardo's Incessant Last Supper. New York: Zone Books, 2001.

Monday, September 16, 2019

The Future Energy Systems Environmental Sciences Essay

The resources of biomass are limited and a deficiency of adequate available cultivated lands may be the major ground to curtail biofuel development in the long term [ 12 ] . Guaranting nutrient security has been and will ever be a national scheme for China, sing China has a monolithic population but a cultivated country per capita which is even less than half of the universe norm. China has set the biomass development rule that â€Å" developments of biomass are non allowed to vie with nutrient supply every bit good as lands, on which nutrients are supposed to be cultivated † [ 19 ] . Therefore, the potency of available fringy land resources is one of the influential factors to find the possible production of purpose-grown energy harvests. Agricultural and forestry wastes in China will play a important function in the future biomass development, in which the usage of biofuels in conveyance will hold to vie with the biomass usage of other sectors, such as electricity and heat c oevals [ 20 ] . Electricity is another AVF which drives vehicles to travel by utilizing electric motors. The application of electricity in vehicles greatly improves the vehicles ‘ energy efficiency and reduces vehicle fumes emanations, which is peculiarly of import in urban countries. Today, many trains and urban rail theodolite systems have been electrified. Electricity is provided straight from a public grid, where energy storage is by and large non a concern [ 21 ] . BEVs have drawbacks of a limited drive distance, comparatively long recharging clip, a high initial vehicle monetary value, low constituent continuances every bit good as demands of a to the full developed reloading substructure, etc. [ 22,23 ] . Plug-in intercrossed electric vehicles ( PHEVs ) emerged as a possible intermediate measure towards a to the full electric manner. Most obstructions which BEVs have to get the better of now are related to the battery engineering. This engineering is expected to optimize the bing Li bat teries in the short term and to develop new battery chemical science with significantly higher energy densenesss to enable the usage of BEVs and PHEVs with a longer all-electric scope in the long term [ 24 ] . If discoveries of the battery engineering can be obtained in the hereafter, electricity may be the most promising AVF in conveyance, due to the bear downing substructure is non basically different from the substructure of the current conveyance system. Hydrogen, an energy bearer, serves as another opportunity to replace the oil usage in conveyance. Combined with fuel cell engineering, H is transformed to electricity which is so used by electric motors to impel wheels. Advantages of a H fuel cell vehicle ( HFCV ) are observed, such as a long drive scope and zero emanation in a tank-to-wheels point of position provided H is stored on-board and produced off-board. There is another type of HFCV with on-board transforming of fuels, such as methyl alcohol, to hydrogen but with emanations from transforming fuels and a more complex on-board transforming system [ 23 ] . Today, the commercial degree of HFCVs is far behind the degree of biofuels, PHEVs and BEVs [ 25 ] . Many challenges of developing HFCVs demand to be overcome in the hereafter including efficiency betterments of fuel cell engineering and cut downing the high initial monetary value of the vehicles by maturating their on-board power system, in which batteries are besides needed today to gaining control and shop electricity, etc. However, the most ambitious issue of developing HFCVs is the deployment of the H substructure due to both the diverseness of the H production tract and dearly-won H distribution processes [ 26 ] . Replacement of oil usage, decrease of fuel ingestion every bit good as a lessening of CO2 emanations from the tank-to-wheels position are three direct benefits of utilizing electricity and H in conveyance. However, the last two benefits may lose in the electricity and H production procedure sing most current energy systems are dominated by fossil fuels. For case, electricity from the mean Chinese grid has the CO2 emanation strength ( measured as the CO2 emanation divided by the energy demand ) similar to that of a gasolene tract although a comparatively lower dodo energy ingestion strength ( measured as the dodo energy ingestion divided by the energy demand ) [ 27,28 ] . Another survey indicates that if H is produced with U.S. mean electricity ( more than 50 % of which is generated from coal-burning power workss ) , its usage, even in efficient HFCVs, can still ensue in increased CO2 emanations ; in contrast, if renewable electricity, such as air current power, is used for H producti on, the usage of H in any vehicle engineering will ensue in riddance of green house gas ( GHG ) emanations [ 29 ] . It has been shown that benefits of the oil usage replacing and the limited GHG emanation decrease can be obtained in the conveyance sector by using AVFs which are produced from dodo fuel dominated energy systems [ 30,31 ] . However, those benefits are non sufficient and current dodo fuel energy systems can non prolong the development of sustainable conveyance. It is necessary to place engineerings and schemes in conveyance, by which the oil usage can be replaced and options can be produced based on renewable energy beginnings. Consequences of implementing such engineerings and schemes in conveyance should be analysed in the context of the energy system.Future energy systemsAs discussed above, the development of sustainable conveyance with a large-scale decrease of GHG emanations and an use of oil independent options demands solutions from an overall renewable energy system. It can non be seen as an isolate development mark as the resources of biomass are limited and other options, el ectricity and H, are strongly connected with the remainder of the energy system. Most current energy systems are dominated by fossil fuels. This has posed many known challenges chiefly caused by the burning of these fossil fuels, such as clime alteration, insecure energy supply every bit good as environmental taint [ 32 ] . Those challenges will go terrible along with the addition of the dodo fuel monetary value and the growing of the energy demand in the universe. As an option, a suited substructure for the execution of renewable energy may function as a long-run sustainable solution. Future energy systems may hold at least three features compared to current dodo fuel dominated energy systems in footings of energy supply, energy transition every bit good as energy demand ( see Fig. 1-2 and Fig. 1-3 ) . Fossil Fuel 1 Power Plant Fossil Fuel 2 CHP OilaˆÂ ¦aˆÂ ¦aˆÂ ¦Heat Boiler Electricity Heat Conveyance Energy supply Energy transition Energy demand Fig. 1. A simplified illustration of a current dodo fuel dominated energy system. Abbreviations used in the figure: CHP, combined heat and power. RE 1 Intermittent Plant RE 2 CHP RheniumaˆÂ ¦aˆÂ ¦aˆÂ ¦Intermittent Heat Electricity Heat Conveyance Energy supply Energy transition Energy transition and demand POLY RE 3aˆÂ ¦aˆÂ ¦aˆÂ ¦Fig. 1. A simplified illustration of a hereafter energy system. Abbreviations used in the figure: RE, renewable energy ; POLY, poly-generation works for bio-transport fuel, heat and electricity coevals ; CHP, combined heat and power. On the energy supply side, large-scale renewable energy beginnings are expected to be utilised as primary energy in future energy systems. Renewable energy beginnings consist of renewable beginnings of electric power, such as air current power, solar power and hydropower, etc. ; renewable beginnings of thermic power, such as geothermal, solar thermal, etc. ; and biomass resources which can be converted into many signifiers including liquid fuels, bio-gas every bit good as solid fuels. Bio-energy can be utilised in assorted energy transition processes to bring forth electricity, to provide heat every bit good as to bring forth fuels for conveyance energy usage [ 3 ] . With regard to energy transition, more efficient transition and storage engineerings will be widely needed in future energy systems in which the energy transition procedure becomes more diversified and complex. One energy demand, such as electricity, can be converted from primary energy by utilizing engineerings for illustration intermittent power workss, CHPs ( in footings of steam turbines, fuel cells, etc. ) and poly-generation workss [ 33 ] . One energy demand can be converted into another such as change overing electricity to heat by utilizing heat pumps and electric boilers, etc. [ 34 ] . One signifier of the energy demand can be converted into other signifiers, such as change overing solid fuels into gas or liquid fuels by the usage of electrolysers or biogas and biofuel workss [ 35 ] . Energy storage engineerings serve as the necessary addendum through which benefits of the efficiency betterment of the transition procedure in the energy system may be reached [ 36,37 ] . On the energy demand side, the function of a concluding energy user may alter due to the execution of alternate engineerings, which respond to the demand of bettering energy efficiency in future energy systems. One illustration could be the conveyance sector which used to be the concluding oil user in the current dodo fuel dominated energy system ; nevertheless, in future energy systems it connects to the remainder of the energy system and likely starts to play functions as both nomadic energy storage and a new power beginning by implementing engineerings of EVs and vehicle-to-grid ( V2G ) [ 38,39 ] . Renewable energy engineerings, more efficient energy transition engineerings and energy economy engineerings are three cardinal elements for the hereafter sustainable energy development. Two major challenges of renewable energy schemes for sustainable energy development have been identified [ 40,41 ] . One challenge is to incorporate a high portion of intermittent renewable energy beginnings into the energy system, particularly the electricity supply. The other is to include the conveyance sector in the schemes. The intermittence of renewable energy gives rise to jobs of run intoing the uninterrupted energy demand, procuring the transmittal grid stabilization every bit good as avoiding extra electricity production, etc. [ 32,35 ] . Flexible engineerings and equal storage are both needed to ease integrating of intermittent renewable energy every bit much as possible in order to extenuate the force per unit area on the biomass use and accordingly cut down the competition for land and H 2O usage between biomass and nutrient supply. The high dependance on oil merchandises and the deficiency of mature options based on renewable energy make the conveyance sector one of the most hard sectors to be included in the renewable energy schemes. The sustainable conveyance development is an of import and necessary portion of implementing a hereafter renewable energy system.

Sunday, September 15, 2019

Radio Frequency Identification automated Technology

Radio Frequency Identification automated TechnologyIntroductionRFID or Radio Frequency Identification is a contactless automated engineering that makes the usage of wireless moving ridges to place physical objects. It is grouped under the wide class of automatic designation engineerings which besides include saloon codifications, optical character readers and some biometric engineerings, such as retinal scans. All these engineerings are used to cut down the sum of clip and labour needed to input informations manually and to better informations truth. While some of the auto-ID engineerings, like saloon codification systems, frequently require a individual to manually scan a label or ticket, RFID captures informations on tickets and transmits it to a computing machine system without necessitating a individual to be involved. The RFID [ 1 ] system consists of a ticket which is made up of a micro chip with a coiled aerial fixed to an object and a reader or inquisitor with an aerial. The micro chip in the ticket has an integrated circuit for hive awaying and treating information, modulating and demodulating a radio-frequency signal. The bit can hive away every bit much as 2 Ks of informations. The intent of aerial is to have and convey the signal. The reader is needed to recover the informations stored on RFID ticket. It has one or more aerials that emit wireless moving ridges and receive signals back from the ticket. This information is so passed in digital signifier to a computing machine system by the reader. There are three types of RFID Tags- active, inactive or semi-passive. While active RFID ticket usage a battery to power the micro chip ‘s circuitry and broadcast signals to the reader, inactive tickets are powered by the electromagnetic moving ridges sent out by the reader. The 3rd type i.e. semi-passive utilizations both their ain batteries and moving ridges from the reader. Since active and semi-passive tickets are more expensive, they are typically used for higher-value goods that are scanned over longer distances. Though several companies have been utilizing RFID [ 2 ] for more than a decennary, its cost had limited its usage in the yesteryear. For many applications, such as tracking parts for just-in-time fabrication, companies could warrant the cost of tags- a dollar or more per tag- by the nest eggs an RFID system generates. Besides when RFID was used to track assets or reclaimable containers within the company ‘s ain premises, the tickets could be reused doing it cost effectual. But the high cost prevented its big graduated table usage in unfastened supply ironss for tracking goods. In these instances, RFID tickets are put on instances and palettes of merchandises by one company and read by another, due to which they ca n't be reused. However, in recent times due to be efficient production, RFID has started to be used in Retail industry to extinguish long client charge waiting lines, aircraft industry for luggage direction and so on.HistoryRFID Technology has been around for a long c lip about from the early decennaries of the 18th century – its beginning can be approximately traced to around 1920. It was developed in MIT [ 3 ] as a agency of communicating between automatons. The popular predecessors of RFID could be argued to the following two cases:  § Radio frequence was used for designation intents in the IFF transponder installed in aircraft. The IFF [ 4 ] significance Identification, Friend or Foe – was used to place if the winging aircraft was a friend or a enemy. This application was used in World War II by the British to separate between returning flights as enemy occupied the district which was less than 25 stat mis off. This engineering is used boulder clay day of the month in commercial aircraft.  § In 1945, Leon Theremin, created an espionage tool for the Soviet Union. Though this innovation carried no ticket as in RFID, it retransmitted radio frequence with audio information. In 1948, a paper by Harry Stockman titled â€Å" Communication by Means of Reflected Power † ( Proceedings of the IRE, pp 1196-1204, October 1948 ) explored the use of RFID. Stockman predicted that â€Å" †¦ considerable research and development work has to be done before the staying basic jobs in reflected-power communicating are solved, and before the field of utile applications is explored.† [ 5 ] With Uranium and atomic engineering deriving importance in the 1960ss, the deathly nature of Uranium led to safety concerns. So employees and equipments were tagged to extenuate such concerns and RFID came into image therefore. This was done in Los Alamos National Laboratory ( LANL ) on the petition of Energy section of U.S. Government. Transponders were installed in trucks and readers at the Gatess. The gate aerial would wake up the transponder in the truck, which would react with an ID and potentially other informations, such as the driver ‘s ID. In the 1950ss and 1960ss, RF engineering was researched extensively. Scientists from assorted states demonstrated how distant objects could be identified. This was used in electronic surveillance – this is in usage even today. Objects carry a 1-bit ticket which is turned on or off depending on whether the client has paid or non. The first patent to RFID engineering as used today was registered in 1973 by Mario Cardullo ‘s. Detailss of the patent are as follows: U.S. Patent 3,713,148 on January 23, 1973. The patented merchandise was a inactive wireless transponder with memory, powered by the interrogating signal. It was demonstrated in 1971 to the New York Port. It consisted of a transponder with 16 spot memory for usage as a toll device. The basic Cardullo patent covers the usage of RF, sound and visible radiation as transmittal media. The ticket used had rewritable memory. In 1973, Los Alamos National Laboratory ( LANL ) demonstrated the usage of inactive and semi-passive RFID ticket. Around 1977, the engineering was leveraged for civilian intents from LANL – the transferred to two companies – Amtech in New Mexico and Identronix Research in Santa Cruz, California. Therefore, assorted utilizations started acquiring explored. One of the few experiments carried out was put ining a RFID transponder in a diary cow to supervise ID and temperature. This would assist in analyzing the cow ‘s wellness and prevent overfeeding. Railwaies shifted to RFID after unsuccessful use of Bar codification to maintain path of turn overing stock. By the 1880ss, use of RFID shifted to treat betterment. Cost decrease & A ; size decrease were certain illustrations. Over old ages, these devices were commercialized and companies moved to higher frequence range- which offered faster transportation rates. Today, 13.56 MHz RFID systems are used for entree control, payment system and smart cards. In the early 1990s, applied scientists from IBM patented an ultra-high frequence RFID system. UHF offered longer read scope and faster informations transportation. Wide graduated table axial rotation out was initiated by the Army forces – the largest deployment of active RFID was seen in the US Department of Defense. They use active tickets on more than a million transportation containers that travel outside the state.HOW THE TECHNOLOGY WORKSComponents and ProcedureThe basic RFID engineering makes usage of the undermentioned constituents [ 6 ] : 1. Active tags – Active tickets require a power beginning. They are either connected to a powered substructure or utilize energy stored in an incorporate battery. 2. Passive tags – The life-time of a inactive ticket is limited by the stored energy, balanced against the figure of read operations the device must undergo. Passive RFID is of involvement because the tickets do n't necessitate batteries or care. The ticket besides have an indefinite operational life and are little plenty to suit into a practical adhesive label. 3. Tag reader * The ticket reader is responsible for powering and pass oning with a ticket * The reader emits wireless moving ridges in scopes of anyplace from one inch to 100 pess or more, depending upon its power end product and the wireless frequence used. * When an RFID ticket base on ballss through the electromagnetic zone, it detects the reader ‘s activation signal. * The reader besides decodes the information encoded in the ticket ‘s integrated circuit ( silicon bit ) and the information is passed to the host computing machine for processing. 4. Tag Antenna * The aerial emits wireless signals to trip the ticket and to read and compose informations to it. * It captures energy and transportations the ticket ‘s ID. * The encapsulation maintains the ticket ‘s unity and protects the aerial and bit from environmental conditions or reagents. The encapsulation could be a little glass phial or a laminal plastic substrate with adhesive on one side to enable easy fond regard to goods.RFID V BarcodeBarcode RFID RFID Benefit Example Line of sight Required Not Required No demand to orientate scanned points Number of points that can be scanned One Multiple Very fast stock list count Automation and Accuracy Multiple read mistakes and prone to lose floging Fully automated and extremely accurate Error free stock list count Designation Merely series or type Unique point degree Targeted callback Data Storage Merely a meaningless codification Upto several kilobits Real clip informations entree in any locationRFID StandardsWhen an administration trades globally and intends utilizing RFID systems across national boundaries, criterions and ordinances are more of import to guarantee safety and the interoperability of tickets and readers between merchandising spouses. Where an orgainisation wants to run a ‘closed-loop ‘ system which is entirely intended for internal usage within the one administration – so it is comparatively easy to choose and optimize a system for those specific internal demands. RFID is non regulated by one trade organic structure – nevertheless it is in fact influenced by a figure of official organic structures for different facets. Frequencies, power degrees and operating rhythms are regulated in Europe by the European Telecommunications Standards Institute ( ETSI ) and in the UK by OFCOM. Protocols for communicating between tickets and readers are proposed by a figure organic structures and equipment makers. An administration that is new to the topic of RFID frequently believes that there is one criterion engineering called ‘RFID ‘ when in fact there are assorted frequences, criterions, power degrees, protocols, ticket types and architectures with differing operational and public presentation features.Advantage · ?Line of sight? [ 7 ] is non required to read a RFID ticket as against a barcode. RFID tagged points can be read even if they are behind other points. There is no demand for physical contact between the informations bearer and the communicating device.  · Because line-of-sight is non required to read RFID tickets, stock list can be performed in a extremely efficient method. For illustration, palettes in a warehouse can be read, inventoried, and their location can be determined no affair where the ticket is placed on the palette. This is because the wireless waves from the reader are strong plenty for the ticket to react regardless of location.  · Line of sight demands besides limit theruggedness of barcodesas good as thereusability of barcodes. ( Since line of sight is required for barcodes, the printed barcode must be exposed on the exterior of the merchandise, where it is capable to greater wear and rupture. ) RFID tickets can besides be implanted within the merchandise itself, vouching greater huskiness and reusability.  · The readability of barcodes can be impaired by soil, wet, scratch, or packaging contours. RFID tickets are non affected by those conditions.  · RFID tickets are really simple to install/inject inside the organic structure of animate beings, therefore assisting to maintain a path on them. This is utile in carnal farming and on domestic fowl farms. The installed RFID tickets give information about the age, inoculations and wellness of the animate beings.  · Barcode [ 8 ] scannershave repeatedly failed in supplying security to gems and jewelries in stores. But presents, RFID tickets are placed inside jewelry points and an dismay is installed at the issue doors.  · Barcodes have no read/write capableness ; that is, you can non add to the information written on a printed barcode. RFID ticket, nevertheless, can be read/write devices ; the RFID reader can pass on with the ticket, and alter as much of the information as the ticket design will let. The RFID tickets can hive away informations up to 2 KB whereas ; the saloon codification has the ability to read merely 10-12 figures.  · An RFID ticket could place the point ( non merely its maker and class ) . Bar codes merely supply a maker and merchandise type. They do n't place alone points.  · RFID engineering is better than saloon codifications as it can non be easy replicated and hence, it increases the security of the merchandise.  · Human intercession is required to scan a barcode, whereas in most applications an RFID ticket can be detected ?hands off.?  · RFID engineering is a labor-saving engineering. This translates to be nest eggs. Using saloon codification engineering costs, on norm, 7 cents in human labour to scan a saloon codification. In add-on, labour is required to set each label right on each plastic crate holder or panel. Add a cost for label alterations and replacings for â€Å" non clear † codifications. And add another for administrative costs for labels that are n't read decently, which causes stock list mistakes and non-compliant returns and punishments.  · Tags are available in a great scope of types, sizes and stuffs  · [ 9 ] Relatively low care cost  · Highly low mistake rateDisadvantage · Dead countries and orientation problems- RFID works similar to the manner a cell phone or radio web does. Like these engineerings, there may be certain countries that have weaker signals or intervention. In add-on, hapless read rates are sometimes a job when the ticket is rotated into an orientation that does non aline good with the reader. These issues are normally minimized by proper execution of multiple readers and usage of tickets with multiple axis aerial.  · Since RFID systems make usage of the electromagnetic spectrum ( like WiFi webs or cellular telephones ) , they are comparatively easy to throng utilizing energy at the right frequence. This could be black in environments like infirmaries or in the armed forces in the field. Besides, active RFID ticket ( those that use a battery to increase the scope of the system ) can be repeatedly interrogated to have on the battery down, thereby interrupting the system.  · Interference [ 10 ] has been observed if devices such as forklifts and walky-talkies are in the locality of the distribution centres. The presence of nomadic phone towers has been found to interfere with RFID wireless moving ridges. Wal-Mart, the retail sector giant, has installed one million millions of RFID tickets in their merchandises throughout the universe and they have encountered such jobs.  · Security concerns- Because RFID is non a line-of-sight engineering like bar-coding, new security issues could develop. For illustration, a rival could put up a high-gain directional aerial to scan tickets in trucks traveling to a warehouse. From the informations received, this rival could find flow rates of assorted merchandises. Additionally, when RFID is used for high-security operations such as payment methods, fraud is ever a possibility.  · Ghost tickets [ 11 ] – In rare instances, if multiple tickets are read at the same clip the reader will sometimes read a ticket that does non be. Therefore, some type of read confirmation, such as a CRC, should be implemented in either the ticket, the reader or the informations read from the ticket.  · Proximity issues [ 12 ] – RFID tickets can non be read good when placed on metal or liquid objects or when these objects are between the reader and the ticket. About any object that is between the reader and the ticket reduces the distance the ticket can be read from.  · High cost- Because this engineering is still new, the constituents and tickets are expensive compared to barcodes. In add-on, package and support forces needed to put in and run the RFID reading systems ( in a warehouse for illustration ) may be more dearly-won to use.  · Unread tags- When reading multiple tickets at the same clip, it is possible that some tickets will non be read and there is no certain method of finding this when the objects are non in sight. This job does non happen with barcodes, because when the barcode is scanned, it is immediately verified when read by a bleep from the scanner and the informations can so be entered manually if it does non scan.  · Vulnerable to damage- Water, inactive discharge or high-octane magnetic rushs ( such as lightning work stoppage ) may damage the ticket.  · Global Standards: RFID has been implemented in different ways by different makers. There still does non be a individual planetary criterion.  · Consumers may besides hold jobs with RFID criterions. For illustration, ExxonMobil ‘s SpeedPass system is a proprietary RFID system. If another company wanted to utilize the convenient SpeedPass they would hold to pay to entree it. On the other manus, if every company had their ain â€Å" SpeedPass † system, a consumer would necessitate to transport many different devices with them.ApplicationsWAL-MART ( RETAIL )Retail is one country where RFID has been used extensively. It helps in cut downing cost, increasing gross and leads to increased client satisfaction. Increased and accurate information leads to lesser stock list and stock list cost as a consequence goes down. Other than electronic surveillance, stock list trailing, RFID is used for Brand hallmark as good which guarantee that inexpensive replacements are non sold to clients therefore guaranting client satisfactions. Another application of RFID in retail sector is Promotional show deployment. This was a alter nate to analyzing selling impact. Asset tracking applications were besides possible through RFID in retail sector. It is used in the undermentioned applications: In-store stock list Management: Physical stock list is clip devouring – using RFID to take stock of stock list reduces clip taken by physical stock pickings by 90 % . This is more accurate and stock pickings can be done several times a twenty-four hours. Therefore, cost is greatly reduced.Brand Authentication:This is used to look into counterfeiting of high-value cosmetics, electronics, dress and pharmaceuticals. This helps in protecting trade name unity by avoiding inexpensive extras. It enhances client satisfaction by guaranting quality and retaining assurance.Asset Trailing:This is used to happen lost assets and path assets – this would assist in more efficient use of assets. This would take to back uping concern processed with lesser figure of assets.Inventory Visibility in the Supply Chain:The prompt stock list tracking prevents stock outs and loss of client satisfaction. This provides sellers with real-time visibleness of stock list in the supply concatenation, bettering prognosis truth and muff ling the stock list whipsaw consequence. [ 13 ]Case survey of WAL-MARTWal-Mart and U.S. Department of Defence are the chief drivers of RFID engineering. Wal-Mart could drive this engineering to about everyone who did concern with them due to immense graduated table of operations and really high bargaining power. The retail concatenation gave a deadline to all its providers to go RFID enabled by 2005. The quiver of this move was seen in India and package companies in India gained from this move as they got a batch of undertakings. RFID do n't look to be as popular in India because RFID can last in organized retail sector and unorganized retail seems the order of the twenty-four hours in this state.How RFID helped:Wal-Mart implemented RFID in 2005 ab initio in seven shops.â€Å"The company has installed RFID readers at the having docks at the dorsum of the edifice, near the rubbish compactors and between the back room and the retail floor. For the instances of goods that are shipped to the shops with RFID tickets, Wal-Mart records their reaching by reading the ticket on each instance and so reads the tickets once more before the instances are brought out to the gross revenues floor. By utilizing gross revenues informations from its bing point-of-sales system, which is non utilizing RFID, Wal-Mart subtracts the figure of instances of a peculiar point that are sold to clients from the figure of instances brought out to the gross revenues floor. Software proctors which points will shortly be depleted from the shelves. It automatically generates a list of points that need to be picked from the back room in order to refill the shop shelves. By reading the tickets on the instances that are brought out from the back room, we ‘re able to see what points have really been replenished [ 14 ] † says Langford, caput RFID engineering Wal-Mart Supply concatenation is besides expeditiously managed with RFID engineering – Once the client picks the information, the provider is informed about the purchase. This helps cut down BULLWHIP EFFECT. This is achieved through Wal-Mart ‘s Retail Link extranet. Retail employs immense work force in In-Store Receiving, Stocking, look into out and taking stock list. This can be freed with employment of RFID. It would cut down cases of Fraud, stock-outs. It improves supplier-retailer relationship, client service & A ; plus direction – â€Å"The right merchandises are available at the right shops at the right time†WESTERN STAR TRUCKS ( FREIGHTLINER )Freightliner-Western Star Trucks is the taking heavy-duty truck maker headquartered in Portland, USA. The production installations span across united States, which produce a broad scope of heavy responsibility building and public-service corporation trucks, long haul main road tractors, mid scope trucks for distribution and service, and exigency service setup and recreational hauliers.Problems faced [ 15 ] :Freightliner was confronting jobs in footings of increasing costs. It therefore wanted to better efficiency and truth of its resources managing in order to better control fabrication costs. It wanted to follow the motion of assorted parts right from stock list to the mill floor in Portland works. It wanted to accomplish a trailing system that has the undermentioned characteristics: * It should be automatic, so that labor costs associated with stock list handling and trailing could be reduced * It has to be accurate and efficient, so that expensive holds caused by misdirected and erroneous parts managing could be eliminated * It should be easy integrable with bing plus direction databases, in order to farther streamline stock list refilling and resource direction * It should be scalable in order to enable enterprise-wide extension after it is proven in Portland Integration of the bing procedures into the new system was their major job. This called for parts needed on the production line to be put into stock list carryalls, placed on nomadic jerks and so transferred onto the store floor. The empty carryalls were so returned to the warehouse. The Portland installation used about 750 carryalls of different sizes.How RFID helped [ 16 ] :RFID was implemented to work out the above job. RFID tickets were attached to the jerks. The tickets were encoded with the GRAI format that is intended for assignment to single objects and is the corporate criterion for tote designation. The new system identified each carryall and jerk with RFID tickets. Tote and tug motion was so tracked as each passed through one of the two dock door portals equipped with RFID readers and aerials. A dealing reception was so automatically generated and sent to the database on the corporate waiter. The reception inside informations the location, day of the month and clip the dealing occurred, every bit good as the carryall and tug information. The complete parts tracking solution delivered the needful efficiency, truth and ability to pare labour costs. This solution instantly paid off. It reduced labour costs significantly. Inventory pick mistakes reduced in figure and, mis-ships and production lines started having seasonably and right parts.LOCKHEED MARTIN ( DEFENSE ) [ 17 ]Problems faced:Most naval forcess in the US antecedently employed some type of a decoy-launching system, which had been available for many decennaries. The ALEX ( Automated Launch of Expendables ) systems were designed to counter inward enemy anti-ship missiles. When it determined that an anti-ship missile is headed its manner, based on cues from shipboard detectors, the steerers were fired consequently. Decoys deploy stuff such as chaff—aluminum-coated strands of glass or other stuff that emit infrared waves—thus making false marks to confound or counter nearing ASMs, and deviate them from their intended mark. One job naval forcess faced is how to guarantee the right steerer is fired to counter a particular missile menace under conflict condition s. Because there are many types of steerer cartridges, all of a similar size and form, there is a possible for errors being made during the procedure of lading a launcher. Typically, the crew of the combat information centre ( CIC ) room relied on informations provided on paper, or over a voice nexus with the steerer lading crew.How RFID helped:The RFID engineering offered ship ‘s forces real-time visibleness into which types of steerers were deployed, every bit good as which barrels they were installed in, and helped guarantee that the proper unit of ammunition is fired off, potentially in a split-second determination, while the vas is under onslaught. The RFID-enabled automatic round-identification system ( ARID ) had been successful with the naval forcess of some states, motivating Lockheed Martin to supply the same characteristic to all of its clients throughout the universe. Mounted onboard the naval forces ‘s battler vass, the steerer launchers, provided by Lockhee d Martin, were outfitted with RFID readers, and decoy cartridges were fitted with RFID tickets. Each Lockheed Martin steerer launcher ( typically two, four or six launchers per battler, depending on ship size ) had a set of six tubings, leting 12, 24 or 36 steerers per ship to be loaded and fired. Each launcher contained a low-frequency RFID reader with six channel options for redundancy. The reader was wired to six aerials, one at the base of each barrel. Naval forces attach a little discoid ticket, compliant with the ISO 11784/5 criterions and encoded with a alone ID figure, to the underside of each steerer cartridge. Sailors could so utilize a handheld inquisitor to read the ticket ‘s ID figure and associate it to the type of steerer to which that ticket is attached. When the tagged cartridge is loaded in the launch barrel, the reader identifies the ticket ‘s alone ID figure and transmits that information to the ALEX system. â€Å"To guarantee the RFID system would run decently in the strict environment of a vas at sea, Lockheed Martin put the system through heavy testing† , Porter ( Chief Engineer ) says. â€Å"This included quiver, daze, temperature and wet exposure, every bit good as proving for electromagnetic intervention ( EMI ) with other systems on a ship. The maritime environment is really rugged, so the testing had to be rather strict, † he adds.MUNICH AIRPORT ( AEROSPACE ) [ 18 ]picture_rfid_technology.jpgMunich Airport, the 7th busiest in Europe, served more than 15 million riders and moved more than 100,000 metric dozenss of cargo in the first half of 2009. In July 2009, the airdrome began a trial utilizing Aero Scout ‘s T6 GPS-enabled Wi-Fi active RFID ticket to track cargo dollies, and to incorporate that information into its airdrome procedure direction ( APM ) package. The end was to enable directors to turn up dollies immediately, and to cognize instantly which were available for usage. After acquiring positive consequences from a current pilot undertaking using radio frequence designation to track lading and rider luggage dollies as they move about its outdoor incline, apron and gate countries, Munich Airport has decided to go on utilizing the engineering after the pilot ends in December 2009. The trial showed that tracking cargo dollies prevents holds or breaks due to mislay or lost dollies, improves plus management—by enabling the airdrome to be after in progress for the dollies ‘ usage, every bit good as brand sure they are in the right topographic point at the clip they are needed—and optimizes stock list and care procedures by extinguishing drawn-out hunts for dollies that need to be repaired or inspected due to regulative demands. In add-on, the airdrome will besides be able to bear down lading companies more accurately, based on their usage of rented dollies. As portion of its trial, the airdrome outfitted about 80 freight dollies with RFID tickets. In add-on, it attached tickets to 10 dollies for LD-2 containers, which are used to hive away up to 120 three-dimensional pess of lading, and to two luggage dollies. The tickets were attached to a dolly ‘s frame or to the enlistment used to link one dolly to another.The battery-operated tickets include GPS faculties for finding a dolly ‘s location out-of-doorss. This GPS information is transferred to the cardinal database by the airdrome ‘s bing Wi-Fi web, which covers 15 million square metres of the installation, including the terminuss, aprons, Gatess, hangers and track borders. If a dolly is inside the installation, its ticket detects this, and the system switches manners to cipher the plus ‘s location, based on the specific Wi-Fi entree points that receive the ticket ‘s signal.SOUTHEASTERN CONTAINER ( MANUFACTURING ) [ 19 ]Southeast Container was formed in 1982 as a in private owned company under the ownership of a group of Coca-Cola ® Bottling companies. Today the company operates as a fabricating cooperative with 10 fabricating locations bring forthing plastic bottles. Southeast Container handles about 70 per centum of the bottle production for Coca-Cola in the U.S. and besides works with bottle makers outside of the cooperative. The company keeps quality and service high with a focal point on uninterrupted betterment.Problems faced:With roots in the southeasterly U.S. , Southeastern Container now has ten fabricating installations across the East Coast, Illinois and Wisconsin. At the company ‘s three injection modeling installations, bottle spaces called preforms are manufactured. The plastic preforms are blown into bottles at Southeastern Container ‘s blow-molding installations and at bottle makers outside of the cooperative. The preforms are shipped to bottle fabrication workss in composition board containers or bing plastic bins. Ideally, these containers are returned empty to the injection modeling installations to reiterate the rhythm. However, jobs with this return procedure were bing Southeastern Container 1000s of dollars each twelvemonth. Some containers are lost or damaged in theodolite and must be replaced. In add-on, the design of the bing containers prohibits Southeastern Container from maximising the capacity of transporting dawdlers, ensuing in the company paying to transport â€Å"air† for each burden. Finally, composition board containers are frequently pre-assembled to salvage clip, and the to the full assembled containers take up warehouse floor infinite. In the procedure of transporting one million millions of preforms, these issues add up.How RFID helped:Southeast Container planned to turn to these jobs by replacing the bing containers with a new version— a specialised returnable plastic bin. While the new folding bins were designed to significantly cut down costs and increase efficiency, each of them is about 10 times the cost of a composition board container. Therefore, rhythm numeration was introduced to track bin life-times against the figure of rhythms guaranteed by the maker. â€Å"We decided to rhythm count for stock list control, traceability, and to formalize bin life-time, and we chose RFID tracking as the most effectual method, † said John Underwood, Engineering Manager, Southeastern Container, Inc. â€Å"We already use barcoding extensively, and have looked at RFID on a figure of occasions during the old ages. RFID was the right pick now because it ‘s low-cost and the engineering is at a point where it can supply the dependability and truth we need, † he explained. Southeast Container worked with its spouse, Decision Point systems, to architect an full end-to-end solution to undertake this challenge. The system execution started with a pilot RFID system for rhythm numbering the new bins. The solution includes Motorola fixed RFID readers, Motorola RFID aerial, Motorola RFID rugged hand-held readers, and OAT Systems ‘ Oat Asset Track package. In add-on, Southeastern Container relies on the Motorola Service from the Start plan for fix coverage for its Motorola RFID handheld readers. â€Å"We worked really difficult to analyse the RFID ticket choice with the Motorola devices to maximise successful reads for both full and empty bins, † said Gary Lemay Senior Solutions Architect for Decision Point systems. â€Å"We besides had great success custom-making the Oat Systems package to update both the SQL Server database and supply a web service connexion to Southeastern Container ‘s warehouse system.† The pilot at one injection-molding installation was really successful, and Southeastern Container is continuing with a phased rollout across its operations. When the system was to the full deployed, each of the about 30,000 bins were for good identified with an RFID ticket and tracked utilizing Motorola XR440 fixed RFID readers. In add-on to utilizing the handheld RFID reader at Southeastern Container, the company besides supplies them to the bin maker. As bins were produced, the maker captured the barcode and RFID tag information for each one, enabling Southeast Container to associate the two for guarantee trailing and seller enfranchisement. â€Å"The pilot was really smooth, and the system has proved to be dependable. Once this was to the full rolled out, the ROI improved in less than two old ages, † Underwood said.The benefits included:†¢ Salvaging 1000s of dollars a twelvemonth in transit costs †¢ Reducing container loss and guaranting traceability †¢ Achieving ROI within two old ages of full execution †¢ Supplying accurate informations on bin life-times for guarantee contracts †¢ Establishing a successful use-case with RFID engineering to leverage with a broad scope of future warehouse and stock list control attempts Looking in front, they are even be aftering to see a similar RFID system for real-time trailing of outward cargos.SAIPEM ( ENGINEERING AND CONSTRUCTION ) [ 20 ]Problems faced:Saipem is an Italian technology and building company for subsea oil and gas production. It began seeking a solution to cut down labour hours spent seeking for losing points, every bit good as to diminish the incidence of holds caused by equipment non geting at the right location at the proper clip, or traveling losing wholly. The other challenge Saipem wanted to turn to was safety. The company wanted to happen a system that would extinguish the demand for field operators to mount onto equipment in order to visually turn up a consecutive figure on an point, which they would so hold to manually enter.How RFID helped:The house chose an RFID solution that would enable its direction to cognize the location of equipment on offshore sites throughout the universe, every bit good as allow employees to safely place equipm ent. The solution, installed by Milan systems planimeter ACM-e, includes inactive ultrahigh-frequency ( UHF ) ticket provided by Omni-ID, which can be read from a distance of 8 metres ( 26 pess ) or more. The ticket needed to be tough, so that they could non merely be read in the presence of steel and H2O, but besides withstand temperatures runing from -60 grades to +50 grades Celsius. Therefore, the tickets were enclosed in an impact- and crush-resistant proprietary stuff specifically chosen for this application. Saipem fastened Omni-ID Max tags to its ain assets, foremost labeling its steel points, so puting tickets on musca volitanss and buoys. When a piece of equipment was found without a ticket, operators could plan a new one, inputting informations sing the point to be linked to the ticket ‘s alone ID number—such as its consecutive figure, description and manufacturer—and so bolting or welding it to the plus. The information related to that point is stored in Saipem ‘s ain proprietary logistics support package, known as NAMASTE. Saipem ‘s staff used a Motorola handheld computing machine with a constitutional RFID inquisitor around the work site, to turn up losing points and to find which points the company had on site. Using the handhelds, workers were able to identity points without mounting onto hemorrhoids of equipment, or the vehicles onto which they are loaded. When a piece of equipment was needed, it was foremost requested from its storage location ( based on stock list informations maintained in the NAMASTE package ) , where its ticket is scanned with a hand-held reader to make a record of its cargo. When that point reached the shore of the boring site, the plus was once more scanned to bring forth a record of which points have been sent to the offshore site. Once an plus was returned to storage, that same procedure is carried out, with the tickets being scanned as they reach shore, and one time more when they are placed in one of Saipem ‘s storage installations. The Motorola handheld computing machine could hive away the read informations, which was so uploaded to a Personal computer at the terminal of a twenty-four hours via a USB connexion.Saipem ‘s employees could log into the NAMASTE system to see what had been shipped out of storage or to the offshore site, and when. The system could besides alarm users if a requested po int had non been shipped, or if a piece of equipment destined for one location was received at a different one.The tickets were besides scanned when assets were certified by an inspector as safe for usage, and recertified one time they leave the drill site and are once more inspected. In this manner, the company ‘s direction knows when each piece of equipment was last certified, and can supply that record for insurance intents, if necessary. The RFID system went unrecorded in November 2009, with the purpose of tracking 20,000 points, including offshore vass ( used to entree oil boring site ) , every bit good as Cranes, boring rigs, steel pipe, slings, bonds and buoys. Approximately 1,000 points have been tagged. Saipem expects the RFID system to cut down the pattern of geting extra stock list due to points stoping up losing. The company besides expects the system will diminish the sum of waste it generates. Without an RFID-based trailing system, assets frequently had to be scrapped, because it was impossible to follow how old they were, or when they had been inspected and certified. The RFID solution, utilizing Omni-ID tickets, improved safety and security, and helped the employees better perform their occupations in a unsafe environment. That was the biggest benefit gained by Saipem. [ 1 ] hypertext transfer protocol: //www.rfidjournal.com/article/articleview/1339/1/129/ [ 2 ] hypertext transfer protocol: //en.wikipedia.org/wiki/Radio-frequency_identification [ 3 ] hypertext transfer protocol: //www.rattei.org/CSCI3921W/history.html [ 4 ] hypertext transfer protocol: //members.surfbest.net/eaglesnest/rfidhist.htm [ 5 ] hypertext transfer protocol: //en.wikipedia.org/wiki/RFID [ 6 ] hypertext transfer protocol: //www.aimglobal.org/technologies/rfid/what_is_rfid.asp [ 7 ] hypertext transfer protocol: //www.activewaveinc.com/technology_rfid_advantage.php [ 8 ] hypertext transfer protocol: //www.usingrfid.com/news/read.asp? lc=s44325nx1433zg [ 9 ] hypertext transfer protocol: //www.databrokers.net/body_why_rfid.html [ 10 ] hypertext transfer protocol: //www.technovelgy.com/ct/Technology-Article.asp? ArtNum=20 [ 11 ] hypertext transfer protocol: //www.idautomation.com/rfid_faq.html # RFID_Advantages [ 12 ] hypertext transfer protocol: //www.buzzle.com/articles/advantages-and-disadvantages-of-rfid-technology.html [ 13 ] hypertext transfer protocol: //www.alientechnology.com/docs/SB_RFID_Retail.pdf [ 14 ] www.rfidjournal.com/article/view/1385 [ 15 ] MIKOH Corp. ( 2007 ) , â€Å"RFID Case Profiles† [ 16 ] hypertext transfer protocol: //www.aimglobal.org/members/news/articlefiles/3497-Freightliner_cs.pdf [ 17 ] hypertext transfer protocol: //www.rfidjournal.com/article/view/7272/2 [ 18 ] Ref: hypertext transfer protocol: //www.rfidjournal.com/article/view/5316/2 [ 19 ] hypertext transfer protocol: //www.aimglobal.org/members/news/articlefiles/3500-Southeastern-Container-cs.pdf [ 20 ] hypertext transfer protocol: //www.rfidjournal.com/article/view/7432/3