SlideShare une entreprise Scribd logo
1  sur  20
RFID Applications in Healthcare

      exponent Consulting Group
            22nd February 2011
Introduction
 •   Introduction to exponent
      – Who we are
      – Our business model

 •   Overview of RFID Technology
      – Principle of Operation
      – Components – Tags, Readers, Antennas, Software
      – Tag Classes, Properties & capabilities

 •   Healthcare Applications for RFID
      – Patient Tracking & Record Management
      – Medication & Inventory Management

 •   Partner Implementation & Management Model
      – Implementation - Project & Change Management Processes
      – Infrastructure Management
      – Service Provisioning
Exponent Consulting Group

INTRODUCTION TO EXPONENT
Introduction to exponent

  • Management Consultancy Group based in Chicago, USA, specializing in:
      – RFID Storage
      – Cloud Network Storage Solutions


  • Implementation expertise provided by our technical partners:
      – Entigral Systems (www.entigral.com)
      – Cleversafe (www.cleversafe.com)


  • Employ a unique business model:
      – Partner with our clients
      – Share the risks of implementation
      – Provide an optional support and technology management role
Introduction to exponent

  • Exponent recognizes the challenges of new technologies
      – Risks associated with implementation
      – Questionable ROIs
      – Continued technological expertise post-implementation

  • Exponent addresses all these by adopting a “partner-model” as opposed
    to a typical “vendor-model”
      – Allows you to concentrate on your core expertise – Healthcare management
      – Allows us to focus on ours – RFID management

  • Permits the greatest level of flexibility and comfort for our partners
      – Clients can acquire Infrastructure, Training, Maintenance and Support services
      – Clients can acquire Infrastructure while outsourcing Maintenance & Support
      – Clients can acquire an Infrastructure-as-a-Service (IaaS) – with minimum CAPEX
Exponent Consulting Group

RFID TECHNOLOGY OVERVIEW
RFID Technology Overview

  •   Radio Frequency Identification

  •   Utilizes the principles of electromagnetic radio waves to transmit, interrogate
      and receive information from RFID tags:
       – Near Field Inductive Coupling
       – Far Field Backscatter Propagation


  •   The RFID tags are associated with assets and come in two flavours:
       – Active – have their own power source, capable of communicating directly
       – Passive – no internal power source, can only respond to a reader request


  •   This information can be processed to provide real time asset visibility:
       – Location/Proximity of Tag
       – ID of Tag, linked via system to asset details
       – Physical Status of Tag – temperature, humidity level etc.
RFID Technology Overview

  • Any RFID system is composed of a set of discrete components:
      – Tags
      – Readers/Antennas – also known as Interrogators
      – Application Software & Middleware
RFID Technology Overview

  • Tags are classified by EPC Global (an Industry Standards Body) and are
    known as Generation-2 or Gen-2 tags:
                                    Active – Rewritable with adhoc network
                   Class 5                     capability with all tag classes
                                  Active – Rewritable with adhoc networking
                   Class 4
                                             capability with other class 4 tags

                   Class 3              Semi-passive with integrated sensors

                   Class 2        Passive – Authenticated Access Control only

                   Class 1                Passive – Read and Write Once only


                   Class 0                                  Passive – Read only
RFID Technology Overview

   • Can replace or be used in conjunction with barcodes:
       –   Allows Item level tracking as opposed to class level
       –   Can be processed at greater distances than a barcode
       –   Supports bulk processing as opposed to single item scanning
       –   Can store more information about the item
       –   Allows information updates to be stored on the tags
RFID Technology Overview

   • RFID Tag Structure & Applications
       –   Can be implanted
       –   Can be swallowed
       –   Can be embedded
       –   Can be pasted
RFID Technology Overview

  • Readers are classified as being:
      –   Hand Held
      –   Fixed
      –   Vehicle Mounted
      –   Printer
      –   Utility


    •Antennas (which are also effectively readers) come in a variety of form
    factors but are configured as per tag functionality:
RFID Technology Overview

  • Software is often needed at the middle tier to provide connectivity with
    Hospital legacy systems (patient records, pharmacy, inventory etc.):
      – Traxware
      – Other Entigral products
Exponent Consulting Group

HEALTHCARE IMPLEMENTATION
SCENARIOS
RFID in Healthcare - Scenarios

  • Healthcare implementations of RFID revolve around high value asset
    tracking with minimal human involvement:
      – Patient Tracking
           •   Where are our patients spending most of their time?
           •   How much time do they spend waiting to be served?
           •   Where are the patient records?
           •   Can reports, samples, tests all be reliably linked to the correct patient?


      – Asset Tracking & Inventory Management
           •   Where are our beds, wheelchairs, mobile medical equipment located right now?
           •   Which items are missing and when did they go missing?
           •   Which items are below the threshold level and need to be ordered?


      – Medication Tracking
           •   Which pharmaceuticals are located on each floor of my hospital?
           •   Which of these drugs will expire within the next 6 months?
           •   How much of each medicine is consumed on a daily basis?
RFID in Healthcare – Patient Tracking
                                                            Data
                                                            Center



            Reception




   Clinic
                        Laboratory   Radiology   Pharmacy
RFID in Healthcare – Medicine Tracking
                                     Receptacle
 Supplier   Hospital                  Ward 6
             Store




                       Data Center

                                     Medicine
                                     Cabinet –
                                      Ward 6
Exponent Consulting Group

PARTNER IMPLEMENTATION &
MANAGEMENT MODEL
Partner Implementation & Management Model

  • Such a model necessitates a careful selection of partners

  • With any new technology adoption comes “change”. This is always
    accompanied by “pain”

  • Exponent needs to know if its partners can bear this “pain” for the greater
    good of the enterprise

  • We thus proceed cautiously in a rational, staged manner maintaining the
    greatest level of transparency:
      – Conduct a thorough RFID Readiness Assessment – RRA
      – Conduct a detailed site survey to understand the scope of the project - RSS
      – Study and document the Business Process Reengineering required - RBPR
Partner Implementation & Management Model

  • On review an acceptance of the findings of the RRA, RSS and RBPR, only
    then is a detailed Project & Change Management Plan – PCMP drawn up

  • The PCMP always includes a staged introduction of the technology:
      –   Begins with a pilot implementation
      –   Proceeds to allow the pilot to be tested and stabilized
      –   Allows for a pilot rebuild if acceptance criteria are not met
      –   Proceeds to iterate on subsequent stage builds to finalize in complete solution

Contenu connexe

Tendances

Transforming healthcare with information technology
Transforming healthcare  with information technologyTransforming healthcare  with information technology
Transforming healthcare with information technology
vrushali
 
Transforming healthcare with information technology
Transforming healthcare  with information technologyTransforming healthcare  with information technology
Transforming healthcare with information technology
Satya Patri
 
RFID Application
RFID ApplicationRFID Application
RFID Application
RainySiu
 
13213792 pps7
13213792 pps713213792 pps7
13213792 pps7
JannyC
 
BayNexusBrochure 2014-04 EN
BayNexusBrochure 2014-04 ENBayNexusBrochure 2014-04 EN
BayNexusBrochure 2014-04 EN
Jason Liu
 

Tendances (20)

Smart hospitalization based on rfid technology
Smart hospitalization based on rfid technologySmart hospitalization based on rfid technology
Smart hospitalization based on rfid technology
 
IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
 
RFID in Blood Transfusion Project Briefing
RFID in Blood Transfusion Project BriefingRFID in Blood Transfusion Project Briefing
RFID in Blood Transfusion Project Briefing
 
A3 RMT An Introduction
A3 RMT An IntroductionA3 RMT An Introduction
A3 RMT An Introduction
 
MedITEX IVF with RFID
MedITEX IVF with RFIDMedITEX IVF with RFID
MedITEX IVF with RFID
 
Transforming Healthcare with Information Technology - Impetech HMS
Transforming Healthcare with Information Technology - Impetech HMSTransforming Healthcare with Information Technology - Impetech HMS
Transforming Healthcare with Information Technology - Impetech HMS
 
Transforming healthcare with information technology
Transforming healthcare  with information technologyTransforming healthcare  with information technology
Transforming healthcare with information technology
 
Transforming healthcare with information technology
Transforming healthcare  with information technologyTransforming healthcare  with information technology
Transforming healthcare with information technology
 
15220680 pss7-ans
15220680 pss7-ans15220680 pss7-ans
15220680 pss7-ans
 
16224213 pss7
16224213 pss716224213 pss7
16224213 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
Ensuring Integrity for Medical Tissues and Devices
Ensuring Integrity for Medical Tissues and DevicesEnsuring Integrity for Medical Tissues and Devices
Ensuring Integrity for Medical Tissues and Devices
 
13213792 pps7
13213792 pps713213792 pps7
13213792 pps7
 
Vari cura 2014v1 (Medical Panel PC)
Vari cura 2014v1 (Medical Panel PC)Vari cura 2014v1 (Medical Panel PC)
Vari cura 2014v1 (Medical Panel PC)
 
Hospital Information Management Software
Hospital Information Management SoftwareHospital Information Management Software
Hospital Information Management Software
 
xArray - Gateway to Item Inteligence
xArray - Gateway to Item InteligencexArray - Gateway to Item Inteligence
xArray - Gateway to Item Inteligence
 
BayNexusBrochure 2014-04 EN
BayNexusBrochure 2014-04 ENBayNexusBrochure 2014-04 EN
BayNexusBrochure 2014-04 EN
 
IOT Application in Medical
IOT Application in MedicalIOT Application in Medical
IOT Application in Medical
 
IRJET-Intelligent Medicine box for disabled peoples
IRJET-Intelligent Medicine box for disabled peoplesIRJET-Intelligent Medicine box for disabled peoples
IRJET-Intelligent Medicine box for disabled peoples
 
Case study RFID Intelligent Cabinet
Case study   RFID Intelligent Cabinet Case study   RFID Intelligent Cabinet
Case study RFID Intelligent Cabinet
 

Similaire à Healthcare presentation pilot

Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
ILA SHARMA
 
An introduction to RFID
An introduction to RFIDAn introduction to RFID
An introduction to RFID
Miguel Pardal
 
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final PresentationRfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
blkirkwood
 
12201731 PSS7
12201731 PSS712201731 PSS7
12201731 PSS7
kayiwendy
 

Similaire à Healthcare presentation pilot (20)

Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
RFID implementation in libraries
RFID implementation in librariesRFID implementation in libraries
RFID implementation in libraries
 
Rfid3
Rfid3Rfid3
Rfid3
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
RFID and its Applications
RFID and its ApplicationsRFID and its Applications
RFID and its Applications
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
An introduction to RFID
An introduction to RFIDAn introduction to RFID
An introduction to RFID
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
 
Paul Laronde - Making Standards and Technology Work
Paul Laronde - Making Standards and Technology WorkPaul Laronde - Making Standards and Technology Work
Paul Laronde - Making Standards and Technology Work
 
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final PresentationRfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
12201731 PSS7
12201731 PSS712201731 PSS7
12201731 PSS7
 
NISO Webinar: RFID Systems in Libraries Part 1: An Introduction
NISO Webinar: RFID Systems in Libraries Part 1: An IntroductionNISO Webinar: RFID Systems in Libraries Part 1: An Introduction
NISO Webinar: RFID Systems in Libraries Part 1: An Introduction
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID
RFIDRFID
RFID
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identification
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Healthcare presentation pilot

  • 1. RFID Applications in Healthcare exponent Consulting Group 22nd February 2011
  • 2. Introduction • Introduction to exponent – Who we are – Our business model • Overview of RFID Technology – Principle of Operation – Components – Tags, Readers, Antennas, Software – Tag Classes, Properties & capabilities • Healthcare Applications for RFID – Patient Tracking & Record Management – Medication & Inventory Management • Partner Implementation & Management Model – Implementation - Project & Change Management Processes – Infrastructure Management – Service Provisioning
  • 4. Introduction to exponent • Management Consultancy Group based in Chicago, USA, specializing in: – RFID Storage – Cloud Network Storage Solutions • Implementation expertise provided by our technical partners: – Entigral Systems (www.entigral.com) – Cleversafe (www.cleversafe.com) • Employ a unique business model: – Partner with our clients – Share the risks of implementation – Provide an optional support and technology management role
  • 5. Introduction to exponent • Exponent recognizes the challenges of new technologies – Risks associated with implementation – Questionable ROIs – Continued technological expertise post-implementation • Exponent addresses all these by adopting a “partner-model” as opposed to a typical “vendor-model” – Allows you to concentrate on your core expertise – Healthcare management – Allows us to focus on ours – RFID management • Permits the greatest level of flexibility and comfort for our partners – Clients can acquire Infrastructure, Training, Maintenance and Support services – Clients can acquire Infrastructure while outsourcing Maintenance & Support – Clients can acquire an Infrastructure-as-a-Service (IaaS) – with minimum CAPEX
  • 6. Exponent Consulting Group RFID TECHNOLOGY OVERVIEW
  • 7. RFID Technology Overview • Radio Frequency Identification • Utilizes the principles of electromagnetic radio waves to transmit, interrogate and receive information from RFID tags: – Near Field Inductive Coupling – Far Field Backscatter Propagation • The RFID tags are associated with assets and come in two flavours: – Active – have their own power source, capable of communicating directly – Passive – no internal power source, can only respond to a reader request • This information can be processed to provide real time asset visibility: – Location/Proximity of Tag – ID of Tag, linked via system to asset details – Physical Status of Tag – temperature, humidity level etc.
  • 8. RFID Technology Overview • Any RFID system is composed of a set of discrete components: – Tags – Readers/Antennas – also known as Interrogators – Application Software & Middleware
  • 9. RFID Technology Overview • Tags are classified by EPC Global (an Industry Standards Body) and are known as Generation-2 or Gen-2 tags: Active – Rewritable with adhoc network Class 5 capability with all tag classes Active – Rewritable with adhoc networking Class 4 capability with other class 4 tags Class 3 Semi-passive with integrated sensors Class 2 Passive – Authenticated Access Control only Class 1 Passive – Read and Write Once only Class 0 Passive – Read only
  • 10. RFID Technology Overview • Can replace or be used in conjunction with barcodes: – Allows Item level tracking as opposed to class level – Can be processed at greater distances than a barcode – Supports bulk processing as opposed to single item scanning – Can store more information about the item – Allows information updates to be stored on the tags
  • 11. RFID Technology Overview • RFID Tag Structure & Applications – Can be implanted – Can be swallowed – Can be embedded – Can be pasted
  • 12. RFID Technology Overview • Readers are classified as being: – Hand Held – Fixed – Vehicle Mounted – Printer – Utility •Antennas (which are also effectively readers) come in a variety of form factors but are configured as per tag functionality:
  • 13. RFID Technology Overview • Software is often needed at the middle tier to provide connectivity with Hospital legacy systems (patient records, pharmacy, inventory etc.): – Traxware – Other Entigral products
  • 14. Exponent Consulting Group HEALTHCARE IMPLEMENTATION SCENARIOS
  • 15. RFID in Healthcare - Scenarios • Healthcare implementations of RFID revolve around high value asset tracking with minimal human involvement: – Patient Tracking • Where are our patients spending most of their time? • How much time do they spend waiting to be served? • Where are the patient records? • Can reports, samples, tests all be reliably linked to the correct patient? – Asset Tracking & Inventory Management • Where are our beds, wheelchairs, mobile medical equipment located right now? • Which items are missing and when did they go missing? • Which items are below the threshold level and need to be ordered? – Medication Tracking • Which pharmaceuticals are located on each floor of my hospital? • Which of these drugs will expire within the next 6 months? • How much of each medicine is consumed on a daily basis?
  • 16. RFID in Healthcare – Patient Tracking Data Center Reception Clinic Laboratory Radiology Pharmacy
  • 17. RFID in Healthcare – Medicine Tracking Receptacle Supplier Hospital Ward 6 Store Data Center Medicine Cabinet – Ward 6
  • 18. Exponent Consulting Group PARTNER IMPLEMENTATION & MANAGEMENT MODEL
  • 19. Partner Implementation & Management Model • Such a model necessitates a careful selection of partners • With any new technology adoption comes “change”. This is always accompanied by “pain” • Exponent needs to know if its partners can bear this “pain” for the greater good of the enterprise • We thus proceed cautiously in a rational, staged manner maintaining the greatest level of transparency: – Conduct a thorough RFID Readiness Assessment – RRA – Conduct a detailed site survey to understand the scope of the project - RSS – Study and document the Business Process Reengineering required - RBPR
  • 20. Partner Implementation & Management Model • On review an acceptance of the findings of the RRA, RSS and RBPR, only then is a detailed Project & Change Management Plan – PCMP drawn up • The PCMP always includes a staged introduction of the technology: – Begins with a pilot implementation – Proceeds to allow the pilot to be tested and stabilized – Allows for a pilot rebuild if acceptance criteria are not met – Proceeds to iterate on subsequent stage builds to finalize in complete solution

Notes de l'éditeur

  1. Identify need of the customerMap our technology to your needsAdd CleversafeDon’t commit on models or pricing – remove slidesSend versions end of daySend to mf for entigral