Government Technology

Crandall, N.Y., Public Library to Install RFID Tags in Circulating Collection



June 20, 2008 By

The expansion of the Crandall Public Library will offer patrons more than additional space. The expanded library will also include radio frequency identification (RFID) technology. The system will include RFID-activated security pedestals, wand-based inventory and an automated materials handling system for sorting returned books, CDs, DVDs and other items.

"The planning process for expanding our space prompted us to want to do business in a new way," said Christine McDonald, director of the Crandall Public Library. "I have been looking at RFID for the past 15 years, and it seems at this point that the technology has come a long way, making it more feasible to implement without being a 'test' library."

Crandall Public Library, in New York, is the central reference library of the Southern Adirondack Library System, which serves Warren, Washington, Saratoga and Hamilton Counties. The library is in the process of renovating a historic 1930s Beaux Arts building and creating additional space for a total of 52,000 square feet. Currently operating in a temporary space in a YMCA building, the library plans to reopen in the renovated building in late November 2008. Since the library's last expansion in 1969, the population of the service area has increased by 30 percent and library services have grown by 45 percent.

"Patrons will really benefit from the RFID implementation," said Bill Schickling, president and CEO of Polaris Library Systems, the company that provided the software that enables the planned system. "Leveraging RFID technology for automated materials handling means that popular materials can circulate quicker, and the patron self-service kiosks will increase efficiencies during check out."

 


| More

You May Also Like

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
Best Practice Guide for Cloud and As-A-Service Procurements
While technology service options for government continue to evolve, procurement processes and policies have remained firmly rooted in practices that are no longer effective. This guide, built upon the collaborative work of state and local government and industry executives, outlines and explains the changes needed for more flexible and agile procurement processes.
View All

Featured Papers