Active RFID is being used more and more to track containers as they move across oceans, provide real-time location of containers in maritime yards, help product flow through customs, reduce demurrage, and increase the throughput of constrained ports.
Article
With retail mandates like those from Target and Wal-Mart continuing to put the spotlight on the use of passive RFID tags, active tags have escaped the limelight. That might be about to change, as active tags appear primed to make a big push in the next several years. A new industry research report says that one million active RFID tags will go into use over the next five years, and that active RFID technology looks set to increase massively before the end of the decade.
By adding sensors, long range communication, and other exciting technologies to RFID and short range communications, there is an opportunity to achieve improvements in a wide range of industries such as real time tracking of items and remote diagnostics.
According to the IDTechEx RFID Knowledgebase study, there are now 210 applications that rely on the use of active RFID tags, up from 121 applications a year ago. Europe has the largest number of active RFID case studies, while the U.S. Department of Defense continues to invest heavily in active RFID systems. Japan and Korea are setting the pace for innovation with new concepts such as Ubiquitous Sensor Networks.
The maritime industry is another area where active tags are expected to see much greater use going forward. According to a research study on the application of RFID in the maritime market by ChainLink Research, RFID is being used more and more to track containers as they move across oceans, provide real-time location of containers in maritime yards, help product flow through customs, reduce demurrage, and increase the throughput of constrained ports.
Surprisingly, the report says that trace and tracking capabilities are far more important to executives than security initiatives. That’s understandable when you consider the financial implications involved.
"Above and beyond Homeland Security concerns, firms report over $50 billion in losses due to lost or damaged freight and equipment on the high seas or in ports," says Ann Grackin, the main author of the ChainLink study. "The executives we surveyed rated supply chain objectives like trace and track and supply chain effectiveness as more important motivators for use of RFID than container security."
Of the 106 companies surveyed by ChainLink Research, 92 percent said the first priority for their RFID project was trace and track capabilities. Primarily, many hope to address the chain of custody for products as they move through the supply chain, and have identified RFID as one way of doing that. "The customer doesn’t want to own the product until they’ve sold it, and the shipper doesn’t want to own it, but with Sarbanes Oxley these things need to be accounted for," says Grackin. "The big issue with trace and track includes determining the financial custodian for the products being shipped."
The survey also revealed a renewed desire to fulfill issues around diversion of assets, and being able to deploy products to a new destination when they are already en route within the supply chain. Although total asset visibility is common in military applications, Grackin says she sees consumer product goods manufacturers making use of the application as well. She says that Proctor & Gamble, for example, wants to be able to easily divert several pallets of laundry detergent to a different Wal-Mart distribution center at the last minute, or to a different retailer altogether. That application would make use of passive tags, not the active tags required for most maritime and military applications.
Reprinted from
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.