Getting a Read on Book Inventories
At Boekhandels Groep Nederland's Selexyz bookstores, taking an inventory typically requires closing the doors for a day and paying 25 employees to take every book off the shelf and scan each one individually. With a new system that takes advantage of RFID technology, two workers can inventory a store in just two hours. RFID scanners can read each book's RFID tag without employees removing it from the shelf -- and the store can remain open during the inventory process.
Jan Vink, IT director at Selexyz
While other retailers are experimenting with RFID or are tagging pallets or boxes, Selexyz was one of the first to tag individual items -- at a cost of about 19 cents per item -- and go live with a storewide deployment. "It's one of the first real store implementations out there," says Jeff Woods, an analyst at Gartner Inc.
RFID tags mounted on books at Selexyz.
Selexyz's distribution challenge is fairly unique, says Woods. "A typical retailer would impose on the warehouse to ship orders correctly. They have a kind of unique supply chain problem, and this is the right answer for it," he says. But the system also has another benefit: "When [a store] receives inventory, they're able to count it and sort it very quickly," says Woods.
IT director Jan Vink describes the RFID scanning tunnel as "a sort of a metal box with three antennas in it and a reader." While the tunnel receives and sorts the contents of incoming shipment boxes, portable readers (background) are used to scan books intended for specific shelves within specific departments.
Photos Courtesy of Selexyz
The RFID scanning system also solves another problem: sorting out special orders from the rest of the stock. Not only does the system flag special orders, but customers are also automatically notified. "The customer receives an SMS or an e-mail indicating that the book is ready," says Vink.
Once received at the store, the books are carried to the correct department, and each one is scanned again as it is placed on the shelf to establish its location. Because the RFID system continuously reads each tag, Vink uses Progress Software's Apama event-stream processing tool to filter out duplicate reads and ensure that every book is counted just once.
The project, which took about four months to complete, ran into its share of glitches. Some security functions were missing, and network bandwidth had to be bumped up from 512Kbit/sec. to 4Mbit/sec. to accommodate real-time flows of data to the back-end systems in Selexyz's corporate headquarters. Initially, the ASN was missing some data, Short Messaging Service was unstable, and wireless coverage to support scanners in the stores was incomplete. Vink also spent time debating what type of RFID labels to use and what type of glue to use to affix them securely to books. "If delay is not an option, you must reconsider things and come up with work-around solutions," he says. While Vink is still working with vendors to tune the systems, overall "the core technology is working as expected," he says.
Selexyz tracks books until they are sold to the customer; the tags are deactivated at the time of sale because of privacy requirements. "We don't want to have a link between the RFID and the customer information," Vink says.
Next, Selexyz plans in-store customer information kiosks. Driven by Progress Software's EasyAsk software, the kiosks will give customers access to book availability and location data provided by the RFID scanning system. "When a customer comes in, they can more accurately know whether a book is in stock. Or if a book is in stock but not on the shelf, you can find it," says Mark Palmer, vice president of event stream proc¿essing at Bedford, Mass.-based Progress.
While Vink says the transition has been worthwhile, he cautions others to be thoroughly prepared before moving forward.
"As an IT decision-maker, you are making a strategic decision," he says. Once you've committed, he warns, "you can't back out."
Read more about Mobile Apps in Computerworld's Mobile Apps Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Performance Management: The Mobile App Development Playbook This comprehensive 16 page Forrester Research, Inc. report, authored by Jeffrey Hammond, Forrester VP and Principal Analyst, details a number of valuable, commonly...
- New Problems Require Innovative Solutions The mobile market is expected to be worth $25 billion by 2015
- Getting Agnostic about Mobile Devices The idea of being able to interact with customers, prospects, and stay attuned to competitive pressures is not new, but the velocity at...
- Gartner 2013 Magic Quadrant for Enterprise Backup/Recovery Software See why CommVault was positioned as the #1 leader in Gartner's 2013 Magic Quadrant for Enterprise Backup/Recovery software for the 3rd year in...
- Four Myths of High-Productivity App Dev Debunked Debunk the main myths surrounding high-productivity application development and how both platforms have overcome them.
On-Demand Webcast: 7 Reasons to Choose VoIP
Thinking about a new phone system for your business?
Be sure to watch this informative webcast. Steve Strauss, small business columnist for USA...
All Mobile Apps White Papers |
As emerging technologies evolve they often find an initial niche in highly specialized scenarios, or in specific industry verticals, before expanding to wider areas of applicability. Within these initial niches, the early adopters can be anything from digital enthusiasts to fashionistas, or they can be folks simply using the technology because it serves a specific need extremely well. (free registration required) more