SecurityWorldMarket

02/01/2017

RFID improves asset management

Dallas, Tx

Assets are part of every business operation, from the plant floor to the office, and from the oil field to the operating room. However, according to Xerafy traditional asset management approaches are often error-prone or labor intensive.

Manual methods are time-consuming and can lead to mistakes (such as transposed serial numbers). While barcode scanning solutions are more accurate, they require line-of-sight scanning, which can be difficult when it comes to heavy equipment or items with difficult to reach labeling (like servers installed on a crowded rack at a data center). RFID improves asset management. RFID tags can be combined with enterprise asset management software to provide a faster, more efficient, and much more accurate solution for maintaining asset location and condition records.

The types of rugged, passive RFID tags that Xerafy provides can be attached to a wide array of difficult to tag assets (such as metal equipment or curved items) and in extreme environments (where the tags are exposed to shock, vibration, chemicals, liquids, and extreme temperatures).

Using handheld or fixed RFID readers, companies can quickly capture data from large numbers of assets at once, which can reduce data collection from hours down to seconds. By strategically placing readers in doorways, companies can even gain a near real-time view of asset locations.

With faster and more accurate data, companies can institute asset optimisation programmes that help improve utilisation, ensure maintenance is conducted in a timely manner, and monitor asset conditions so that equipment can be safely repaired or retired when necessary.

Xerafy customers are already using RFID to monitor assets such as medical equipment, IT assets, and critical tools and equipment in oil drilling operations.


Tags

Business News

Cyber security vulnerability check list advises on best practice

Farpointe Data has just posted the first radio frequency identification(RFID) Cybersecurity Vulnerability Checklist for access control manufacturers, distributors, integrators and end users to use to protect their access control systems from becoming hacker gateways to their facilities and IT systems. Knowing what to do is especially important now that government agencies, such as the United States Federal Trade Commission, have begun filing lawsuits against businesses that do not provide good cybersecurity practices.

Product Suppliers
Back to top