Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Tag! You're It: RFID in the NCSU Libraries
1. Tag, You’re It: RFID in the
NCSU Libraries
Mara Mathews
University Library Technician, User Experience
NCSU Libraries
mamathew@ncsu.edu
Christee Pascale
Associate Head, Acquisitions & Discovery
NCSU Libraries
cpascal@ncsu.edu
North Carolina Library Association
Technology and Trends Round Table
February 25, 2014
2. NCSU RFID Implementation Timeline
• 2011: Hunt RFID Team formed
• February 2012: 3M selected at RFID vendor
• August 2012: Textiles RFID Hold Shelf Pilot
• October 2012: Hunt Collection Tagging Project
Planning
• November 2012:
– RFID hardware/software arrives & installed
– Staff RFID training
– Hunt Collection Tagging Project kick-off
– Technical Services staff move to Hunt
• December 2012:
– Hunt Collection Tagging Project complete (12/12)
– Collections moved to Hunt (began 12/17)
3. Radio Frequency IDentification
• Wireless data transfer
• Inventory systems, product tracking, access
control, etc.
• Library uses:
– Check-in and checkout, including self-checkout
– Inventory management
– Security
4. Library RFID Components
1. RFID tags
2. Tag reader /
Encoding stations
3. Self-checkout
stations
4. Hand-held RFID
readers
6. RFID Tag Data
• Primary ID
• Owner library/institution
• Set info (number of parts)
• Media format
• Usage – circulating, reference
• Shelf location
• Title
ALA Privacy & Confidentiality Guidelines:
http://www.ala.org/offices/oif/statementspols/otherpoli
cies/rfidguidelines
7. Encoding Stations
• Conversion station
• Pad staff workstation
1. Computer
2. Barcode scanner
3. RFID pad
4. Software (conversion
and/or workstation)
5. RFID printer (optional)
8. Encoding a Tag
1. Open 3M Conversion Station software and
place a blank RFID tag on the pad
2. Scan barcode using barcode reader
3. Place the RFID tag on the item
4. Done!
12. Converting the NCSU Collection
• Subset of entire collection
– Hunt Open Shelving Collection
– Hunt Reference Collection
– Hunt niche collections (e.g. Faculty Publications,
Science in Fiction, etc.)
• Move materials to single location
• Plan the project, create documentation, etc.
• Train staff
• Tag, tag, tag
14. The Pilot Launch
Information Campaign
continues
Staff Training
LIVE September 2012
• RFID Conversion of
Open Hold materials
• Open Hold Shelf
• Self-Checkout service
15. The Pilot: the before
Project Objectives
Provide a working prototype that could be transplanted to our new
James B. Hunt, Jr. Library
Identify some of the physical and logistical limits of setup
Suggest a smooth, detailed workflow for RFID Conversion, the Open
Hold Shelf service, and the self-checkout service
Provide valuable guidance for training, troubleshooting and patron
support to be applied at our new James B. Hunt, Jr. Library
16. RFID at Hunt Library Spring 2013
What’s New?
3M RFID checkout
3M RFID self-check kiosks
3M RFID security gates
Electronically printed hold slips
Specialization of tasks -- circulation/processing split
17. The (Happily Ever) After: The Now…
RFID Tagging at Hunt Library
Books which live in our open stacks
Books and non-media items requested from the BookBot
Books placed on the Open Hold Shelf
Books that are on Course Reserve and/or part of our Textbook
Collection
24. Concerns
1. Preserving patron privacy and transaction confidentiality
2. Browsing of the Open Hold Shelf
3. Removal of RFID tags from books
4. Proximity of Open Hold Shelf to service desk
5. Self-Service Kiosk located on 4th floor near Open Stacks area
6. People leaving the library with unchecked-out materials
25. Challenges
1. Cradle-style self-checkout kiosk with barcode scanner and desensitizer
2. Proximity and positioning of Open Hold Shelf to integrated service point
3. Two RFID tags on one material
4. Defective tags
5. No RFID tags on material
6. Printed endpapers, front and back pages of book
7. RFID reader set properly to work in combination with our ILS (Sirsi)
8. Closing ILS windows upon transaction completion due to pad sensitivity
9. Multi-item RFID tag scan
10.Interference with our security gates from metal construction scaffolding
11.Patrons with multiple last names
12.Normal human error and technical glitches