classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


RFID solution for mining
October 2018, This Week's Editor's Pick, Asset Management, EAS, RFID, Mining (Industry)

Aury Africa has introduced a radio-frequency identification (RFID) audit and inspection solution aimed at mining applications. These include inspecting plant equipment, mining machines, pumps, valves and pipes, in fact, most equipment that may require regular inspection and, in some cases, regulatory requirements.

“Aury Africa is currently integrating the RFID solution with our equipment through the assistance of our technical partner, Thembekile Asset Management Solutions, which has many years’ experience in digitising workflow processes. This ensures that customers have access to real-time information, and also cuts down on unnecessary paperwork,” Aury Africa director, Sydney Parkhouse explains.

RFID tags each have their own unique identifier to ensure they can never be duplicated. The system requires a proof of presence, as the person undertaking the inspection has to be within proximity range of the tag with the scanning device to communicate the information securely.

These RFID mobile devices are fit-for-purpose, with apps available for iOS or Android operating systems. One of the key features of the system is that the tag and the scanner do not have to be in direct line of sight for the transfer of communication to occur.

Through the use of the specialised mobile scanning device, one can identify and perform inspections on equipment and conduct in-field certifications. The mobile device has additional features that enable users to capture GPS coordinates of assets, and keep track of where they have been previously deployed.

In addition, fixed readers can be used to create ‘gateways’ whereby tagged equipment passing through the gateway can be read automatically. Typical uses of this functionality would be, for example, the transfer of equipment from one location to another.

Digital images of failures, hazards, and processes can be captured using the device’s digital camera. This allows mines to keep a record of the status of the equipment, while the device allows users to access documentation and equipment manuals. Upon completion of the inspection, the results are synchronised automatically to the cloud for secure capture.

Thembekile Business Development Director, Dean Parkhouse, explains that individual items can be accessed to view the actual asset and all related details. The information contained in the cloud includes images and diagrams. The RFID cloud software system can be integrated into most enterprise resource planning (ERP) systems.

Reporting is carried out in real time. Standard reports are available, while customised reports can be generated upon request. The reports can be emailed, and even delivered according to a defined schedule. Exception reporting functionality is also available. The reports can also be printed out if required, in addition to being stored safely in the cloud. The system generates a summary report that can be sent out after the inspection, or at the end of the shift.

The benefits of the system include that it provides for an effective asset management register, ensures compliance with inspection requirements, and enables skills transfer, while allowing mines to develop both a digital and hard copy logbook.

For more information, contact Aury Africa, +27 11 026 6642, syd@auryafrica.co.za, www.auryafrica.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Managing who, what and why
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • The expanding role of IT in access control
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    What role is IT playing in the world of physical access control and how far will its role expand in future?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • Tracking biometrics into a brave new digital world
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
  • A better approach to fingerprint biometrics
    November 2018, This Week's Editor's Pick, Access Control & Identity Management
    Not all optical biometric fingerprint scanners are created equal. The type of sensor used has a powerful impact on speed, accuracy, reliability and portability.
  • The right access decisions
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management
    Making the right access control decision depends on what you want secured and how secure it should be.
  • Identifying good visitor management practices
    November 2018, Excellent ID, Access Control & Identity Management, Asset Management, EAS, RFID
    There are a number of factors that security managers need to consider when implementing visitor management and access control protocols.
  • Digital channels and the evolution of ID
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    While the concept of identity (ID) remains unchanged, the rapid evolution of digital technology has dramatically extended both its application and form factor.
  • Fingerprints protect privacy for AIDS testing
    November 2018, This Week's Editor's Pick, Access Control & Identity Management
    A creative, progressive NGO uses biometric fingerprint scanning to redefine confidentiality and AIDS treatment in South Africa.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.