Why the London Riots Created a Greater Business Travel Threat Than a Terrorist Attack

Introduction to the London riots threat

If you have business travel to London, you need to read this article. In this article you will discover why the London riots created a greater travel threat than a terrorist attack. We will examine the threat posed by the London riots and demonstrations, terrorist attacks and resulting travel delays, disruptions and changes. At the end of this article, you will have a specific understanding of the required business travel management response and awareness as to why this will happen again.

The London riots and demonstrations has resulted in one of the largest business travel disruptions of 2011.

London Riots and Demonstrations

The London riots and demonstrations have come as a complete surprise to many. It is not a unique event and certainly not unique to the UK. The scale, violence, fire and failure of the authorities is often something expected in other countries but the lack of preparedness for destinations like the UK is common and widespread. Therefore, the lack of preparedness and last-minute scramble to respond and the inability to avoid major business travel disruptions are widespread as a result.

Due to the footprint of disruption, many routes and modes of transport have been negatively affected. Simple commute from the airport, trains and ports to planned accommodation options have been altered and continuous review of hazard or threat assessment are required. Furthermore, travel support providers such as taxis, hotels, restaurants, emergency services an other basic amenities have also been affected, to varying degrees.

Travel and risk managers need to immediately identify:

  • Affected areas,
  • Degree of threat,
  • Affected and exposed (inbound and outbound) business travellers,
  • Arrival/departure points,
  • Safe and non-affected areas,
  • Mitigation or eradication options,
  • Cost of implementation,
  • Funds available,
  • Emergency support,
  • Accommodation options,
  • On-going or developing events,
  • Social or non-business activity,
  • Insurance claims and compliance requirements,
  • Cancellation criteria,
  • Resumption of travel criteria,
  • Extended event plans,
  • Travel alternatives (domestic and international)

The London riots have affected multiple support systems related to business and leisure travel. Any leisure travel disruptions will further compound business travel threats such as decreased accommodation options, airport congestion and increased public transport demand. Even simple actions like withdrawing money from an ATM will prove a challenge and compound the hazard/s.

The London riots have had a prolonged affect on UK business travel sector, far greater than the majority of terrorist attacks. Further affects such as planning and preparation for the 2012 Olympics will also contribute to the lingering affects.

A lack of planning and subsequent response capability by businesses could constitute a failure of duty of care, due diligence, corporate social responsibility, workplace health and safety or other related legislation.

Terrorist attacks less of a threat than London riots

With the exception of the Mumbai terrorist attacks, most have limited travel disruption and only affect a narrow band of travelers. Inclusive of the Mumbai terror attack, terrorist attacks typically have clearly defined threat elements (terrorist, bombings, gunfire, etc) whereas the London riots is a constantly changing and unclear threat. Most business travelers will be unprepared for such decision-making demands and lack sufficient experience to make consistent and safe decisions.

Most contemporary business risk management systems focus on location and plausible event threats, then seek to inform or prepare travelers for the best results to mitigate or eliminate the hazards and threats. Therefore, the bulk of business travelers will not be prepared or educated on how to respond in London, with such wide spread disruption and threats. Few will have residual knowledge from information and preparation for such events in other locations, considered more likely to be medium to high risk. Many of the supporting business travel management departments and managers will be equally unprepared and resourced.

A terrorist attack and other similar violent crimes would have a much smaller footprint of disruption, not affected such a wide business travel demographic, not affect business travel support providers so comprehensively or have such a prolonged impact on all exposed.

Routine travel delays, disruptions and changes represent one of the most persistent and probable travel risk management issues.

Travel delay, disruption and changes

Change management and the decision-making involved is one of the most commonly accepted workplace hazard concerns. This is equally relevant to business travel and business travel threats.

The instinctive and guided response of travelers to any delay, disruption or change can significantly affect the outcome of any spontaneous or new hazard as it presents. Particularly when this is the first level of response, before support options and resources can be activated or come into affect.

Travel delays have been triggered due to airport and airline workers unable to get to work, taxi drivers not able to refuel vehicles, hotels and staff overwhelmed, business travelers unprepared and convergence of business and leisure travelers upon all available exit travel nodes.

Access to information, at all levels, the ability to consume and process all the options and explore alternatives is imperative in this and similar travel disruption events. Crisis leadership will succeed more frequently than simple crisis management, to which are dependent upon timely and accurate information from all available resources.

Unfortunately, many will fail to fully understand the gravity of the events, the threats posed and respond or prepare accordingly. While many others exposed will chalk it up to another force majeure or random act that is just part of the rich experience of international travel. Courts, business travelers and peer review increasingly do not share this flippant view.

This scenario and lack of preparedness has been played out numerous times in recent history. Volcanos, volcanic ash affects, Japan’s tsunami, airport closures, airline failure and many others have caught business travelers and managers alike unprepared. This disturbing trend will continue.

Conclusion: London riots threat

You should now see why the London riots have a far greater impact and threat to travelers than you may have originally thought. We have examined the business travel threat posed by the London riots, terrorist attacks and resulting travel delays. You now have a specific plan for this and similar events and the required business travel management and response. This will happen again. Perhaps not in London, perhaps not a city wide demonstration but this kind and scale of business travel disruption event will happen more than once before the end of 2011. Review your plan and make the necessary enhancements now.

School Bus Safety – What To Teach Your Kids

Over 20 million children nationwide ride the school bus every day. While school buses are regulated to some extent by federal law, not all states have the same safety standards. For example, New York, New Jersey, and Florida all have state laws in place which require school buses to have lap belts installed for student use. No federal law exists, however, which makes this a national standard. In fact, the debate over seat belts in school buses has been going on for years.

That being said, school buses do not have a bad safety record. According to the National Highway Traffic Safety Administration, school buses have some of the best safety records on the road in terms of deaths per distance traveled – just 0.2 deaths per 100 million miles. Furthermore, while some 30,000 people died in passenger vehicles crashes during 2004 alone, only 71 school bus passengers have died in accidents in the past eleven years combined.

Of course, as scintillating as the statistics may be, no one can argue that they are perfect. Children are society’s most valued resource, and it only takes the death of one child to make a significant impact on a family and community. One must also consider that many more children die as a result of being hit by buses than do while passengers on a bus. Even though bus drivers are required to undergo safety training and to take extra precautions due to the nature of their job, accidents happen. Nearby drivers may also be at fault. Despite laws which require motorists to stop for school buses, thousands upon thousands of irresponsible drivers ignore these laws daily, creating a serious safety risk for children getting off the bus.

As a parent, one of the best things you can do is reinforce bus safety guidelines with your child. Even though such rules may already be communicated in school, children often look to their parents to give the final word on issues. Be ready to answer questions your child may have, and make sure he or she understands how to be safe around buses.

– When waiting for the bus, stand several feet away from the curb. Do not enter the street or attempt to board the bus until it has come to a complete stop and opened its doors.

– While riding the bus, do not distract or otherwise aggravate the driver. Keep backpacks, lunchboxes, and other objects out of the aisle, as these create tripping hazards.

– When getting off the bus, use the handrail and watch your step. Try not to cross in front of the bus. If you must do so, walk several feet ahead of the bus and wait for the driver to signal for you to cross. Watch out for passing motorists when crossing the street.

– Never, under any circumstances, crawl under the bus. Not even to retrieve lost property.

Teaching your child to respect these safety guidelines can reduce the chance of a devastating accident on the bus, at the bus stop, or at school.

Hello Spring! Time to Update Your House and Home Furniture in Four Easy Steps

As the spring season is here, it is time to update your house and home furniture to modern and fun! In the past years I’ve learned some great easy and quick ways to update my home as the seasons change to liven up my space. Here are some of those amazing ways to make your home fun and chic:

  1. Change the pillow covers or add pillows if you are lacking in your living room. There are so many home decorating stores that offer super affordable decorating pillows for your living room and bedroom. You can also create your own pillows and all you need to do is purchase that beautiful pillow cover that offers color and texture to any room in your home and stuff it with cotton. I can’t have enough pillows, I am currently at nine pillows in my living room and seven pillows in my bedroom (many are different textures, sizes, and colors in harmony). I would love to add to my pillow collection so I am always on the lookout for more. Your bedroom is your sanctuary so I would not skip on buying high quality pillows and pillow covers since you spend a quarter of your day sleeping on it.
  2. Move around your night, side, or end tables and mix them up or stop by your nearest home decorating store to purchase an affordable little table. If you want to change or retouch a table, you can purchase a cheap plastic wardrobe and use it as a spray painting tent to avoid the hassle of covering everything up when you spray paint something. Moving your tables around will feel as though you purchased new home furniture and if you change the colors it will definitely liven up your personal space.
  3. Lately I’ve been into small plants! I just love how affordable they are and these add such a unique touch to your home. You can place them pretty much anywhere and there are a variety of textures, sizes, and colors. Most indoor plants are also super low maintenance. You can use colored pencil buckets, old wine and beer wooden boxes, or even galvanized steel tubs to use as pots for your plants. If it does not have any drainage, make sure to add gravel at the bottom to help absorb leftover water.
  4. Rearrange your frames! I have seen some amazing decorating ideas in house and home magazines such as monochromatic frames of all size placed on one wall (approximately 15 to 20 frames). You can place them in one clutter or arrange them throughout an accent wall or plain wall and even add a large and beautiful mirror in the center to create the illusion of a bigger space. You can purchase used frames of all types in Craigslist, yard sales, swap meets, or flea markets and spray paint them all with one color using the tent described above. You can pretty much paint them with any one color.

Have fun re-decorating your home for the spring season! And remember, spring time allows you to go bold with colors and textures!

Love Story Movie – Fashion Style

This must surely be one of my most favorite, movie fashion inspirations. It certainly had tons of style in every shot of Ali MacGraw, without being unduly influenced by fashion. When the weather is cold outside and with a roaring fire indoors, I always think of this movie. The 1970 classic ‘Love Story’ movie, inspires the kind of perfect love one can only dream about. With the radiance of American Ivy League as a backdrop, the classic white, stone-washed buildings and bright sun against knee-deep snows, it all seems to reflect Ali’s beauty.

Her enviable wardrobe provided inspiration for fashion designers in future years. Her clothing evokes the classic ‘preppy’ style and today is accessible to everyone. Playing a poor scholarship student, Jenny Cavaleri, Ali became a style icon that made that American style, famous and trendy. Classic designers like Michael Kors and Calvin Klein certainly took lots of inspiration from the movie for their subsequent collections.

Ali constantly wore amazing coats with classic masculine lines, like the fantastic camel colored, cashmere coat, that wrapped around her sporty figure so well. There was also the deep blue, pea coat with the shiny buttons, teamed with lovely turtlenecks peeping from beneath. The masterful color arrangements of her outfits contributed a lot to the success of this unforgettable style. The beige with black and red check skirt, worn as she moved in and out of the school building, flowed alongside her fast wit and humorous banter with Ryan O’Neal.

I think the constant appearance of short skirts was intentional, since the movie was made in the 1970s, therefore just at the end of the 60s ‘mini mania’. It certainly fitted her independent free spirit and brilliant, sparkling personality. For her wedding, she wore the same check mini skirt, intimating so much personal casual chic. It tells me that clothes don’t have to be serious, but love is. Her fantastic accessory collection is also a reminder for us that it is so important not to forget matching hats, or even what a whimsical fur hat will do for an outfit.

I can see them both in his convertible, top down, driving towards her new in-laws’ vast estate. She is wearing her classic camel coat and black tights, ready to grace the old dark, wood-panelled rooms of the huge mansion. As she reveals her beautiful, lipstick-red silk dress, it makes me want to go out and get a dress just like it and grow my hair to have a side parting. Although maybe we cannot star in a film, at least we can all style ourselves classic and pretty.

How to Become a Group Leader and Travel Free

If travel is your passion, and you can’t visualize yourself sitting at a desk all day, answering question about travel destinations which you would rather be visiting, becoming a Group Leader, may be your best solution.

The cruise line industry caters to the group sales methodology to fill up cruise cabins. Most of the major cruise companies will provide a free cruise for a Group Leader who sells 8 cabins or 15 full paying passengers. Some cruise companies require the group leader to pay for taxes, fees and upgrades. Smart group leaders, usually will book themselves, into an Interior cruise cabin. That way no one in the group has a less expensive cabin.

The Group Leader can sell his/her cruise or, cruise for free. This option is what makes the group leader’s opportunity so popular.

Experienced Tour Conductors, usually generate multiple methods to market their cruises or group travel events. The most common way is to locate established groups, who want to save money by traveling together. Other successful groups include special interest travel.

Because the majority of Group Leaders are not, travel agents, they may have regular jobs, and belong to social organizations and church groups which puts them in touch with hundreds of potential travelers.

There are a number of ways to get started as a Travel, Group Leader. If you are a junkie traveler, you can use your own experiences to build your confidence and your sales.

If you have a limited travel background, yet travel is a passion, you can take a home study course, or enroll in a couple of classes at your local junior college. There are also courses online, which are extremely affordable. Travel is a billion dollar industry and there are many options for learning different phases of the travel industry.

My own path through this maze was to enroll in a UC Berkeley Extension (Berkeley, Ca) course, on Group Travel. My instructor was one of the most successful group travel professionals in the country, at that time. My next step was to volunteer as a group leader for a social club who was attending an annual ski summit in Vale.

It is not necessary to spend lots of money on schooling be become an effective Group Leader. However, it is mandatory that you learn everything you can about your destination and the travel involved.

Once you have secured a basic knowledge of the type of group travel you want to offer, you can then seek out a host agency. A Host Agency is a licensed, bonded travel agency which allows travel agents or outside travel agents to book travel using their company name. There is a split in the commission, as the host agency is the legal business which allows you to book travel for your clients. Most host agencies charge a fee, and an annual fee, but not all. Fees for joining a Hosting Agency can range from zero dollars, up to $500.

Another option is to contact your local travel agency and let them know you want to work as an outside agent. Be prepared to explain what types of travel you want to offer and to what type of groups you want to specialize in. The agency owner, or manager, will provide you with the commission structure, if any, policies and procedures. Some travel agencies only offer free travel to group leaders, while others offer, free travel, and commissions.

When first starting out, it is almost always better to join a group in process, or, create a fun, 2 day trip, to get experience. My own experience included learning the procedure for a particular cruise ship. For about 5 years, every time a Princess Cruise ship docked in San Francisco, I thought I should further my travel education and be aboard ship when it cruise under the Golden Gate Bridge and out to sea. My efforts landed me in the Captain’s Circle and qualified me as a Platinum Cruise Member.

It is easy to find clients. Below is a list of ways to market your travel events.

1. Informing your family, friends, neighbors, co-workers, church members, club members, organizations, friends of friends, twitter pals, and your personal email buddies, is a great way to find new clients.

2. The second best way is to invite friends, neighbors over for a travel party or a cruise party. Ask the cruise line or the resort, for a video tape and free promotional material to share with the guest. Provide guest with snacks and (cheap) wine. Keep the wine coming! No need to be aggressive. Travel sells itself, especially, if the destination and price is of interest. You can provide your clients with a bottle of fine wine aboard ship.

Remember to ask for a deposit. Stay focused, your job is to provide information and collect checks. Ask friends to sponsor a travel party. The more parties you have, the more people you sign up. It’s that simple!

3. Make announcements at your church and your organization. Include the information in the church bulletin or your organization’s newsletter, as many times as possible.

4. Have flyers made up, but not before you have business cards printed, with your name, contact numbers, email address, name of travel event, dates and starting cost.

5. Distribute flyers, at public places or public events.

6. Use classified ads, online and offline to promote your travel event.

7. Pass out your cards, everywhere you go. Doctor’s office, cleaners, grocery store, beauty shop, stores where you shop, your children’s school, your favorite neighborhood bar, and eating establishments.

Paper work is extremely important and without it, nothing happens. Paper work must be completed correctly and forwarded to the host agency or travel agency in a timely manner. Failure to do so could result in an ugly situation, which could escalate into a legal battle.

Checks should be made out to the host agency or the travel agency. Even if the travel agency says its OK for your clients to make the check out to you, don’t do it. Get you commissions from the host agency, unless you have a Seller of Travel license. One you turn in your deposits and payments, the host agency or travel agency, will provide you with your commissions, based on your agreement.

Outside travel agents usually work under an Independent Contractor Agreement and are issued a 1099-MISC at the end of the year.

Answer Your the Eldercare Questions Online

Finding the right way to care for aging members of the family can be tough job. There are a variety of online resources for researching your options so you can make a choice that will benefit everyone.

The aging of America has led to a booming industry providing for the care of our seniors. It has also led to difficulties with Medicare and dire threats of the collapse of Social Security. What is important however is that the medical establishment has responded in a variety of ways to support the special needs of people in their final years.

The omnibus site provided by the Department of Health and Human Services is. This site provides a thorough selection of choices for locating eldercare services in your community. The site is multilingual and provides both online support and phone numbers that can be utilized.

A sponsored site with good information can be found at. It is sponsored by QuietCare, a security warning device for seniors living at home. Nevertheless, the site has a good collection of “how to” articles for both seniors and those family members who feel charged with guiding them through the lifestyle changes leading to eldercare.

An extremely well organized site that provides the same guidance and a library of other online resources is at. This site takes the caregiver from first steps right through facility selection and legal issues. Perhaps the most valuable portion of the site is a list of related online sites, broken out by category. Divisions include Assisted Living; Food and Nutrition; Legal Issues; Equipment and Personal Health Supplies; Financial Issues; and several others. For each of these categories the site provides a dozen or more major web sites as references. A few are commercial; more of them, however, appear to be sites put up by professional associations in the industry or non-profits that give unbiased recommendations on resources.

There is a National Long Term Care Ombudsman Resource Center (ORC) established and supported by the Federal Government. This organization is an excellent starting point for localized resources. You can click on a map on their web site and select a state where you’ll find listings for such offices as the State and Regional Ombudsmen, Office of License (where you can check on Long Term Care facilities); Medicaid Fraud Control; and so forth. The site is located at.

Ancillary issues facing our senior population today is what sort of long term care insurance is best for them, and the question of whether or not they should pursue home equity conversion, a “reverse mortgage,” to finance their final years. There are increasing numbers of online resources relating to both these areas.

One site that covers both issues and several other related matters – such as wills, trusts and powers of attorney; assist technology and remote monitoring – is the National Care Planning Council’s Guide to Long Term Care Planning at. The site includes 35 in-depth chapters totaling over 670 printable pages covering virtually all areas of long-term care planning. It also provides numerous lists of care providers, advisers and specialized services in four categories of care needs. For the role of Medicare in Long Term Care, go to the government site at.

Finally, the AARP provides some basic information on reverse mortgages at. HUD has a reverse mortgage program that is insured by the FHA and is outlined at. Reverse mortgages are expensive, and not without complications. The FHA insists that reverse mortgages on loans they’ve insured not be provided without a counseling session between an FHA or HUD professional and the homeowners.

Improving Travel In Our National Parks: The Transportation Scholars Program

As the population of the United States continues to increase, so do transportation issues in our national parks. In the past three decades, park visitation has jumped more than 83 percent; almost all of these additional visitors have traveled to and through the parks in privately owned vehicles. Roads and parking facilities that were once adequate are now overwhelmed, especially during peak travel seasons.

The resulting congestion both degrades visitor experiences and imperils the natural and cultural resources the National Park Service (NPS) is committed to protecting. The result is further strain on an agency already stretched by small budgets and over-worked staff.

In 2001, in an attempt to help the NPS find innovative solutions to this problem, the National Park Foundation (NPF), the Ford Motor Company Fund, and Eno Transportation Foundation teamed up with the NPS to establish the National Park Transportation Scholars Program. Today the program continues under the guidance of the National Park Foundation, the National Park Service, the Federal Highway Administration, the Paul S. Sarbanes Transit in Parks and Technical Assistance Center, and the Eno Transportation Foundation.

The Transportation Scholars Program provides parks with transportation professionals who assist in developing transportation systems to help parks reduce traffic, congestion, and pollution while improving park visitor experiences. The Scholars Program pairs transportation professionals and graduate students with NPS staff seeking expert assistance with projects involving transportation planning and analysis, public outreach, intergovernmental coordination, environmental impact assessment, and other transportation-related tasks. Assignments generally begin in early summer and last either six or twelve months.

The Transportation Scholars Program provides the Park Service with much-needed transportation expertise at a fraction of the cost of hiring consultants or bringing on full-time staff. The Parks derive significant advantages from having Transportation Scholars located on-site versus using off-site assistance, and Scholars benefit parks by serving as single points of contact on transportation matters for consultants, contractors, and local communities. Scholars also bring a fresh perspective to the Park Service, while taking away valuable personal and professional experiences.

Jacqueline Lowey, Deputy Chief of Staff at the U.S. Department of Transportation (USDOT) from 1996 to 1997, and Deputy Director of the NPS from 1997-2001, conceived the idea for the Transportation Scholars Program. “I think that transportation is absolutely key to protecting park resources,” said Lowey. “Transportation is the nexus of how you preserve parks while enabling visitors to experience the parks’ incredible natural and historical treasures now and in the future.”

To be eligible for consideration, parks must have a specific transportation-related project ready to begin or already underway. A committee made up of representatives from the NPS, the NPF, and the Eno Foundation reviews park applications that meet these basic requirements; final park selections are made by the NPF’s Board of Directors.

Parks with projects connected to well-developed, long-term transportation plans and involving innovative approaches to addressing park transportation issues are given priority. Examples of such innovative approaches include projects incorporating alternative transportation systems, community involvement, sustainable transportation, transportation master planning, multi-modal access, and non-motorized transportation. The scholar selection process is administered by the Eno Foundation, which assembles a selection panel with representatives from the NPS, the USDOT-Federal Lands Highway, and other organizations with a transportation focus. The panel reviews the project proposals of parks selected by the National Park Foundation, and matches the best qualified candidate with each project.

Transportation Scholars have come from a diverse range of educational and professional backgrounds; several have been working professionals in transportation-related fields. Others have been graduate students pursuing PhD or masters degrees in civil engineering, landscape architecture, urban planning, public policy, and business administration. Most Scholars are given assignments of between 3 months and 1 year, though some have worked for the same park for multiple years.

At the end of their term, the scholars are required to submit a report to the NPF detailing their accomplishments, providing guidance to NPS decision makers, and describing the significance of their findings for other park units and the larger transportation community.

Use of RFID Technology in Libraries: An Automated Metheod of Circulation, Security, Tracking and…

1. Introduction

RFID is an acronym for Radio Frequency Identification. It is a technology that allows an item, for example a library book to be tracked and communicated with by radio waves. This technology is similar in concept to a Cell Phone.

Radio frequency identification, or RFID, is a broad term for technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna (the chip and the antenna together are called an RFID transponder or an RFID tag). The antenna enables the chip to transmit the identification information to a reader. The reader converts the radio waves reflected back from the RFID tag into digital information that can then be passed on to computers that can make use of it.

2.Concept of RFID for Libraries

RFID (Radio Frequency Identification) is the latest technology to be used in library circulation operations and theft detection systems. RFID-based systems move beyond security to become tracking systems that combine security with more efficient tracking of materials throughout the library, including easier and faster charge and discharge, inventorying, and materials handling.

This technology helps librarians reduce valuable staff time spent scanning barcodes while checking out and checking in borrowed items.

RFID is a combination of radio -frequency-based technology and microchip technology. The information contained on microchips in the tags affixed to library materials is read using radio frequency technology regardless of item orientation or alignment (i.e., the technology does not require line-of-sight or a fixed plane to read tags as do traditional theft detection systems). The RFID gates at the library exit(s) can be as wide as four feet because the tags can be read at a distance of up to two feet by each of two parallel exit gate sensors.

2.1 Components of an RFID System

A comprehensive RFID system has four components:

(1) RFID tags that are electronically programmed with unique information;

(2) Readers or sensors to query the tags;

(3) Antenna; and

(4) Server on which the software that interfaces with the integrated library software is loaded.

2.1.1Tags

The heart of the system is the RFID tag, which can be fixed inside a book’s back cover or directly onto CDs and videos. This tag is equipped with a programmable chip and an antenna. Each paper-thin tag contains an engraved antenna and a microchip with a capacity of at least 64 bits. There are three types of tags: “read only”, “WORM,” and “read/write.

“Tags are “read only” if the identification is encoded at the time of manufacture and not re-writable.

“WORM” (Write-Once-Read-Many)” tags are programmed by the using organization, but without the ability of rewriting them later.

“Read/write tags,” which are chosen by most libraries, can have information changed or added. In RFID library, it is common to have part of the read/write tag secured against rewriting, e.g., the identification number of the item.

2.1.2 Readers

The reader powers an antenna to generate an RF field. When a tag passes through the field, the information stored on the chip in the tag is interpreted by the reader and sent to the server, which, in turn, communicates with the Integrated library system when the RFID system is interfaced with it.

RFID exit gate sensors (readers) at exits are basically two types. One type reads the information on the tag(s) going by and communicates that information to a server. The server, after checking against the circulation database, turn on an alarm if the material is not properly checked-out. Another type relies on a “theft” byte in the tag that is turned on or off to show that the item has been charged or not. It is then not necessary to communicate with the circulation database.

Readers in RFID library are used in the following ways:

Conversion station-where library data is written to the tag;

Staff workstation at circulation- used to charge and discharge library materials;

Self check-out station-used to check-out library materials without staff assistance;

Self check-in station-used to check in books etc. without staff assistance;

Exit sensors- to verify that all the books etc. leaving the library have been checked-out;

Book-drop reader- used to automatically discharge library materials and reactivate security.

Sorter and conveyor-automated system for returning books etc. to proper area of library;

Hand-held reader-used for inventorying and verifying that books etc. are shelved correctly.

2.1.3 Antenna

The antenna produces radio signals to activate the tag and read and write data to it. Antennas are the channels between the tag and the reader, which controls the system’s data acquisitions and communication. The electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continually. Antennas can be built into a doorframe to receive tag data from person’s things passing through the door.

2.1.4 Server

The server is the heart of some comprehensive RFID systems. It is the communications gateway among the various components. It receives the information from one or more of the readers and exchanges information with the circulation database. Its software includes the SIP/SIP2 (Session Initiation Protocol), APIs (Applications Programming Interface) NCIP or SLNP necessary to interface it with the integrated library software. The server typically includes a transaction database so that reports can be produced.

2.2 Optional Components

Optional RFID system includes the following three components:

1. RFID Label Printer

2. Handheld Reader

3. External Book Return

1. RFID label Printer

An RFID-printer is used to print the labels with an individual barcode, library logo etc. When the print is applied, it simultaneously programmed the data in to the chip. After this process, the RFID label is taken from the printer and self-adhered to the book. It also checks each RFID label for function.

2. Handheld Reader/Inventory Wand

The portable Handheld Reader or inventory wand can be moved along the items on the shelves without touching them. The data goes to a storage unit, which can be downloaded at a server later on, or it can go to a unit, which will transmit it to the server using wireless technology. The inventory wand will cover three requirements:

· Screen the complete book collection on the shelves for inventory control.

· Search for books, which are mis-shelved.

· Search for individual book requested.

Other applications can be written for the inventory wand, since the system utilizes a personal data terminal (PDT).

3. External Book Return

Libraries can offer a distinct service, which is very useful for users like ability to return books during off hours. External book return is a machine with a slot with a chip RFID reader integrated into the wall. It works the same way as the Self Check –Out Station. The user identifies himself/herself (if required by the library), and then puts the book(s) in to the slot. Upon completing his/her return, the user will receive a receipt showing how many and which books were returned. Since they have already been checked-in, they can go directly back onto the shelves. These units can also be used with sorter and conveyor systems.

3. Key Features of RFID in library

The reliability of the system, its ease of operation, and the flexibility of tagging all kinds of media easily, is important criteria in choosing an RFID system. The main aim for today’s libraries to adopt RFID is the need to increase efficiency and reduce cost. Automation and self-service can help libraries of all sizes toward achieving these aims, and RFID has the added advantage that it can also provide security for the range of different media on offer in libraries. The technology can also improve circulation and inventory control, which helps to optimize the allocation of labor and financial resources. This means that libraries can relieve their professional employees of routine work and operational tasks.

All of the tags used in RFID technology for libraries are “passive.” The power to read the tags comes from the reader or exit sensor (reader), rather than from a battery within the tag.

A few libraries use “smart” card, which is an RFID card with additional encryption, is an alternative to merely adding an RFID tag on staff and user identification cards. Not only does that identify users for issue and return of library materials, but also for access to restricted areas or services. This would make it possible to make it into a “debit” card, with value added upon pre-payment to the library and value subtracted when a user used a photocopier, printer, or other fee-based device, or wished to pay fines or fees.

3.1 Speedy and Easy User self-charging/discharging

The use of RFID reduces the amount of time required to perform circulation operations. This technology helps librarians eliminate valuable staff time spent scanning barcodes while checking out and checking in borrowed items. For the users, RFID speeds up the borrowing and returns procedures. The Library professionals, instead of scanning bar codes all day long in front of a queue of users, are released for more productive and interesting duties. Staff is relieved further when readers are installed in book drops.

3.2 Reliability

The readers are highly reliable. Several vendors of RFID library systems claim an almost 100 percent detection rate using RFID tags.

Some RFID systems have an interface between the exit sensors and the circulation software to identify the items moving out of the library. Were a library user to run out of the library and not be catched, the library would at least know what had been stolen. If the user card also has an RFID tag, the library will also be able to determine who removed the items without properly charging them.

Other RFID systems encode the circulation status on the RFID tag. This is done by designating a bit as the “theft” bit and turning it off at time of charge and on at time of discharge. If the material that has not been properly charged is taken past the exit gate sensors, an immediate alarm is triggered. Another option is to use both the “theft” bit and the online interface to an integrated library system, the first to signal an immediate alarm and the second to identify what has been taken out.

3.3 High-speed inventorying

A unique advantage of RFID systems is their ability to scan books on the shelves without tipping them out or removing them. A hand-held inventory reader can be moved rapidly across a shelf of books to read all of the unique identification information. Using wireless technology, it is possible not only to update the inventory, but also to identify items, which are out of proper order.

3.4 Automated materials handling

Another application of RFID technology is automated materials handling. This includes conveyor and sorting systems that can move library materials and sort them by category into separate bins or onto separate carts. This significantly reduces the amount of staff time required to ready materials for re-shelving.

3.5 Tag life

RFID tags last longer than barcodes because, the technology does not require line-of-sight. Most RFID vendors claim a minimum of 100,000 transactions before a tag may need to be replaced.

4. Demerits of RFID Systems

4.1 High cost

The major disadvantage of RFID technology is its cost. While the readers and gate sensors used to read the information typically cost around $1,500 to $2,500 each; and the tags cost $.40 to $.75 each.

4.2 Accessibility to compromise

It is possible to compromise an RFID system by wrapping the protected material in two to three layers of ordinary household foil to block the radio signal. It is also possible to compromise an RFID system by placing two items against one another so that one tag overlays another. That may cancel out the signals. This requires knowledge of the technology and careful alignment.

4.3 Removal of exposed tags

RFID tags are typically affixed to the inside back cover and are exposed for removal. This means that there would be problems when users become more familiar with the role of the tags. In Indian libraries this is a major challenge to keep the tags intact.

4.4 Exit gate sensor (Reader) problems

While the short-range readers used for circulation charge and discharge and inventorying appear to read the tags 100 percent of the time, the performance of the exit gate sensors is more problematic. They always don’t read tags at up to twice the distance of the other readers. There is no library that has done a before and after inventory to determine the loss rate when RFID is used for security.

4.5 Invasion of User Privacy

Privacy concerns associated with item-level tagging is another significant barrier to library use of RFID tags. The problem with today’s library RFID system is that the tags contain static information that can be relatively easily read by unauthorized tag readers. This allows for privacy issues described as “tracking” and “hot-listing”.

Tracking refers to the ability to track the movements of a book (or person carrying the book) by “correlating multiple observations of the book’s bar code” or RFID tag. Hot-listing refers to the process of building a database of books and their associated tag numbers (the hot-list) and then using an unauthorized reader to determine who is checking out items in the hot-list.

4.6 Reader collision

One problem meet with RFID is the signal from one reader can interfere with the signal from another where coverage overlaps. This is called reader collision. One way to avoid the problem is to use a technique called time division multiple access, or TDMA. In simple terms, the readers are instructed to read at different times, rather than both trying to read at the same time. This ensures that they don’t interfere with each other. But it means any RFID tag in an area where two readers overlap will be read twice.

4.7 Tag collision

Another problem readers have is reading a lot of chips in the same field. Tag clash occurs when more than one chip reflects back a signal at the same time, confusing the reader. Different vendors have developed different systems for having the tags respond to the reader one at a time. Since they can be read in milliseconds, it appears that all the tags are being read simultaneously.

4.8 Lack of Standard

The tags used by library RFID vendors are not compatible even when they conform to the same standards because the current standards only seek electronic compatibility between tags and readers. The pattern of encoding information and the software that processes the information differs from vendor to vendor, therefore, a change from one vendor’s system to the other would require re-tagging all items or modifying the software.

5. Best Practices guidelines for Libraries

As libraries are implementing RFID systems, it is important to develop best practices guidelines to utilize the technology in best way and to keep the privacy concern away. The following may be the best practices guidelines for library RFID use:

· The Library should be open about its use of RFID technology including providing publicly available documents stating the rational for using RFID, objectives of its use and associated policies and procedure and who to contact with questions.

· Signs should be pasted at all facilities using RFID. The signs should inform the public that RFID technology is in use, the types of usage and a statement of protection of privacy and how this technology differs from other information collection methods.

· Only authorized personnel should have access to the RFID system.

· No personal information should be stored on the RFID tag.

· Information describing the tagged item should be encrypted on the tag even if the data is limited to a serial number

· No static information should be contained on the tag (bar code, manufacturer number) that can be read by unauthorized readers.

· All communication between tag and reader should be encrypted via a unique encryption key.

· All RFID readers in the library should be clearly marked.

· ISO 18000 mode-2 tags should be used rather than ISO 15693.

6. Installations

While there are over 500,000 RFID systems installed in warehouses and retail establishments worldwide, RFID systems are still relatively new in libraries. Fewer than 150 had been installed as of the 2004.

Most installations are small, primarily in branch libraries. The University of Connecticut Library; University of Nevada/Las Vegas Library, the Vienna Public Library in Austria, the Catholic University of Leuven in Belgium, and the National University of Singapore Library are the only sites that appear to have tagged more than 500,000 items each.
So far in India only two University libraries have Installed the RFID system. First among them is Jayakar Library of Pune University and second is Dhanvantri Library of Jammu University. The use of RFID throughout Indian libraries will take at least four to five years.

7. Recent Developments

Recent developments in hardware and software for RFID systems have increased the potential of this technology in library automation and security. ‘Today, the one important result for libraries is the ability to use non-proprietary systems, now that the new generation of RFID-chips with standard ISO 15693 (to be integrated into ISO 18000-3) is available,’ explains Dr Christian Kern, system development manager of Bibliotheca RFID Library Systems, a Swiss company specializing in such systems for libraries. ‘With this technology, libraries do not have to depend on one single supplier for tags. As libraries make a long-term investment, which mainly consists of the quantity of tags needed, this is a very important requirement.’

8. Vendors

The products of six manufacturers of library RFID systems are available in India through their business associates: Bibliotheca, Checkpoint, ID Systems, 3M, X-ident technology GmbH represented by Infotek software and systems in India and TAGSYS— the last represented by Tech Logic, Vernon, Libsys in India and VTLS .

There are several other companies that provide products that work with RFID, including user self-charging stations and materials handling equipment.

Conclusion

It is quite clear from the above discussion that an RFID system may be a comprehensive system that addresses both the security and materials tracking needs of a library. RFID in the library is not a threat if best practices guidelines followed religiously, that it speeds up book borrowing and inventories and frees staff to do more user-service tasks. The technology saves money too and quickly gives a return on investment.

As far as privacy issue is concerned it is important to educate library staff and library users about the RFID technology used in libraries before implementing a program.

It may be good for librarians to wait and watch the developments in RFID for some time before the cost of tags comes down to $.20 or less, the figure which librarians has determined is the key to their serious consideration for the use of technology.

While library RFID systems have a great deal in common with one another, including the use of high frequency (13.56 MHz), passive, read-write tags. Lack of Standard and Compatibility of tags produced by different vendors is a major problem in implementation of RFID in Libraries. Current standards (ISO 15693) apply to container level tagging used in supply chain applications and do not address problems of tracking and hot listing. Next generation tags (ISO 18000) are designed for item level tagging. The newer tags are capable of resolving many of the privacy problems of today’s tags. However, no library RFID products are currently available using the new standard. Apart from that cost of the RFID Tags and equipment is also a major problem for libraries to implement the same in a developing country like India.

Family Medicine And Family Physicians

To become a family physician, men and women go through a four-year degree program, they study in an accredited family medical medicine residency program, and an additional three years of training before becoming board certified. A family physician is your one-stop healthcare expert. They treat everyone in the family and they exam, research, and diagnose medical conditions from head to toe. This type of care is called integrated care where a family doctor devises individualized health plans to treat mom, dad, and children of all ages. Family doctors treat a wide range of health conditions and they can be your primary care physicians at any point in your life. Unlike other specialties, family medicine involves coordinating all types of healthcare issues, from a common cold, pregnancies, to treating an acute or chronic illness.

Family physicians must practice at the highest level of medical care throughout the world. They are required to become re-certified around every six years, through American institutions like The American Board of Family Medicine, The American Academy of Family Physicians or the Accreditation Council for Graduate Medical Education, all of which have reciprocity agreements throughout the globe for family medicine training. A few of the advantages in being seen by a primary care physician, includes the following:

• family doctors have all of your personal and family medical history because they have been treating you for years.

• physicians that have seen generations of family members can help in researching various genetic diseases, like cancer, if it appears more than once in a generation.

• doctors involved in family medicine environments can perform minor surgical procedures without the added cost of seeing a specialist.

• they improve the lives of the under served in America and abroad.

Research and clinical studies have proven that U.S. and worldwide primary care physicians have been responsible for lowering the world mortality rates in diseases, such as in cardiovascular diseases, cancer, diabetes, low birth weight issues, obesity, and many other illnesses and health conditions. The statistical results associated with the care provided by family physicians, have proven that they help to increase life spans and control diseases from spreading. Their participation in healthcare has reduced healthcare expenditures, they help to lower hospital admissions, emergency room admissions, and they help to reduce surgical costs.

A family doctor focuses on preventive care, community oriented care, global health, plus they diagnose and manage a wide range of health problems to improve the quality of care in local, rural, urban, and large city health. Even if people are generally healthy, patients benefit by keeping a relationship with their primary care physicians. The physicians support individuals to stay healthy through dietary programs, they encourage their patient’s to exercise to stay physically and mentally healthy.

One of the main reasons that family medicine works, is the relationship that patients have with their doctors. This specialized and confidential relationship is great for individuals who feel comfortable in talking about their medical health with their physicians. Physicians around the world, are available to answer their patient’s questions in a way that forms a trusting bond. This bond creates a trusting relationship, whereby patients will listen and follow their healthcare provider’s advice and directions, thus decreasing chances of spreading contagions.

Family medicine is all about treating the whole person, not just their symptoms. A family physician has a profound effect on the physical, mental, environmental, emotional, and spiritual health of each of their patient’s. Physicians with an intimate knowledge of their patients can help introduce the healing power of hope, love, faith, and trust, as life presents challenges that can evoke depression, fear, grief, and anger. Also, if a physician’s patient requires the need to see a specialist, a family doctor will help coordinate your care. Patients can often feel frustrated and confused when they have to manage the healthcare system on their own. With a family healthcare provider on your side, the whole medical care journey is made easier and less frightening of the unknown.

Refugees have always fled to foreign countries, including the U.S. for a chance of better opportunities for themselves and their family. The present global news events are following refugees today, who are fleeing from their native countries for various reasons. Before being accepted for resettlement, all refugees must pass medical screening examinations, which is often performed by primary care physicians. The physicians perform a thorough examination of a variety of health problems that involve the mental and social health of the refugees. The family doctor’s check for infectious diseases, chronic illnesses, the refugee’s overall musculature system, and parasites, thus providing immunizations. The information that they gather is shared with that country’s main health agency, which in the U.S. Is the Centers for Disease Control and Prevention.