To reduce the overhead of full-scale manufacturing facilities, a popular practice among design companies and large-scale brand name organisations is to outsource all, or a portion, of their manufacturing operations to specialised contract manufacturers. Using this approach, organisations reduce or eliminate the expenses of specialised engineering labour, equipment maintenance, inventory carrying costs, and product testing facilities while increasing efficiencies such as speed of project delivery and volume of throughput.

Based in Cornwall, Ontario, Canadian electronics contract manufacturer, SigmaPoint Technologies, Inc., provides full turnkey, end-to-end assembly services for highly-complex electronic products, and specialises in the Radio Frequency (RF) industry. Customers simply submit their project specifications and design and SigmaPoint sells the customer the components and assembles the finished products.

The company relies heavily on a unique high-tech approach using SigmaTrack (a proprietary full-scale Intranet application suite). The state-of-the-art paperless system is used to drive production, quality, supply chain, engineering, sales and reporting. The suite resides on an Adobe ColdFusion MX-enabled web server that further handles all web-based communication. This company-wide network allows employees to communicate interdepartmentally, as well as with customers and suppliers.

Improving efficiency and automating job cost tracking

SigmaPoint wanted to improve efficiency and automate job cost tracking to more effectively allocate resources for future projects down to the job level"

While SigmaPoint provides high-quality engineering manufacturing services, the company had been unable to quantify whether their employee resources were optimally allocated. SigmaPoint employee time and attendance records had been handled manually, with employees turning in manually-recorded, paper timesheets on a bi-weekly basis. This manual system did not allow SigmaPoint to automate timesheet collection via SigmaTrack or keep accurate records on employee time spent on each manufacturing project, and on which tasks. The company needed a system to facilitate data analysis and summarization for estimating future jobs.

According to Adam Lauzon, Applications Developer, SigmaPoint, “SigmaPoint wanted to improve efficiency and automate job cost tracking to more effectively allocate resources for future projects down to the job level, and more importantly, to determine more accurate project quotes.

Cost-effective solution to use with existing ID cards

Working with Ron Fiedler, Sales Manager of HID Connect Partner, RF IDeas, Inc., Adam specified a simple, cost-effective solution able to piggyback on their existing employee ID card and support future high-frequency RFID technology applications growth—without requiring custom RFID interfacing software programming. To meet this need, SigmaPoint selected RF IDeas’ AIR ID Log-on solution, coupled with HID iCLASS Contactless Smart Adhesive Tags. 

For improved efficiency and automation, SigmaPoint’s applications developer designed new applications enabled by RF IDeas’ AIR ID Log-on solution with iCLASS tags. They include:

  • A new SigmaTrack Time and Attendance module to automate accurate recording; and
  • Accu-Quote, the new SigmaTrack module responsible for seamless capture of work order labour.

SigmaPoint has a contactless smart card with industry-standard encryption technology, reducing the risk of compromised data and duplicate tags

To use the new system, the SigmaPoint administrator applies a coin-sized, disk-shaped, self-adhesive HID iCLASS transponder to each employee’s plastic photo ID, laminating it within the card. Instantly, SigmaPoint has a contactless smart card with industry-standard encryption technology, reducing the risk of compromised data and duplicate tags.

Enhanced security with 125 kHz proximity technology

Additionally, the durable iCLASS tag’s passive, no-battery design allows for an estimated minimum of 100,000 reads. Because they are strong, flexible and resistant to cracking and breaking, SigmaPoint’s investment in iCLASS Adhesive Tags is a solid one. Securely separated application areas in the iCLASS Tags are each protected by 64-bit diversified read/write keys adding enhanced security that would not have been possible with standard 125 kHz proximity technology. 

Next, using RF IDeas’ AIR ID Writer and AIR ID Card Manager software, the administrator enters each user’s unique SigmaTrack UserID into a secure application area of the iCLASS Tag, automatically encrypting the employee ID data. Using this new system, it is no longer necessary for employees to remember, or even be aware of, their own ID numbers, providing a more secure defence for corporate assets and information. The plug-and-play AIR ID Playback readers simply connect to the employee entrance terminals via USB ‘keyboard wedges’.

Automatically tracking over-time, holidays

The system also provides SigmaPoint with the capability to automatically track overtime, double-time, holidays and vacation time

For capturing work order labour, the Accu-Quote module of SigmaTrack makes the time spent on each element of each project trackable, from the minute the employee logs into the work centre on the production floor. The system also provides SigmaPoint with the capability to automatically track overtime, double-time, holidays and vacation time. All this valuable data is stored in a central database that can be used for sophisticated management reporting.

Plus, the timesheet data can be exported to SigmaPoint’s human resources software package. Together, the two systems enable SigmaPoint to determine the most efficient manner to allocate its resources, and correct potential slowdown areas critical to a project’s success.

Monitoring employees’ productivity

SigmaPoint is now able to automate tracking employee time and attendance records and monitor productivity/time allocation to individual manufacturing projects, streamlining operations. In addition, SigmaPoint upgraded to the benefits of 13.56 MHz iCLASS contactless smart credentials without having to re-badge all its employees, and may consider scalable future applications. SigmaPoint did not have to migrate a database to the new system because it was backwards compatible with the legacy employee ID database.

Based on the success of the initial deployment, SigmaPoint soon plans to roll out similar solutions in two of their other facilities, a warehouse and RF testing centre.

Download PDF version

In case you missed it

Unifying the mobile experience: cloud, IoT and the AI evolution of access control in 2019
Unifying the mobile experience: cloud, IoT and the AI evolution of access control in 2019

The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions. 

What characteristics do salespeople require in the physical security industry?
What characteristics do salespeople require in the physical security industry?

A basic tenet of sales is ABC – always be closing. But it's a principle that most professional salespeople would say oversimplifies the process. Especially in a sophisticated, high-tech market such as physical security, the required sales skills are much more involved and nuanced. We asked this week's Expert Panel Roundtable: What unique characteristics are required of salespeople in the arena of physical security systems?

Can microchip implants replace plastic cards in modern access control?
Can microchip implants replace plastic cards in modern access control?

A futuristic alternative to plastic cards for access control and other applications is being considered by some corporate users in Sweden and the United Kingdom. The idea involves using a microchip device implanted into a user’s hand. About the size of a grain of rice and provided by Swedish company Biohax, the tiny device employs passive near field communication (NFC) to interface with a user’s digital environment. Access control is just one application for the device, which can be deployed in lieu of a smart card in numerous uses. Biohax says more than 4,000 individuals have implanted the device. Using the device for corporate employees Every user is given plenty of information to make an informed decision whether they want to use the deviceCurrently Biohax is having dialogue with curious corporate customers about using the device for their employees. “It’s a dialogue, not Big Brother planning to chip every employee they have,” says Jowan Österlund, CEO at Biohax. Every user is given plenty of information to make an informed decision whether they want to use the device. Data capture form to appear here! “Proof of concept” demonstrations have been conducted at several companies, including Tui, a travel company in Sweden that uses the device for access management, ID management, printing, gym access and self-checkout in the cafeteria. Biohax is also having dialogue with some big companies in the United Kingdom, including legal and financial firms. Österlund aims to have a full working system in place in the next year or so. A Swedish rail company accepts the implanted chip in lieu of a paper train ticket. They accept existing implants but are not offering to implant the chips. Österlund says his company currently has no plans to enter the U.S. market. The device is large enough to locate easily and extract if needed, and small enough to be unobtrusive Access control credential The device is inserted/injected below the skin between the index finger and the thumb. The circuitry has a 10-year lifespan. The device is large enough to locate easily and extract if needed, and small enough to be unobtrusive. The only risk is the possibility of infection, which is true anytime the skin is pierced, and the risk is mitigated by employing health professionals to inject the chip. Use of the device as an access control credential or any other function is offered as a voluntary option; any requirement by an employer to inject the device would be illegal, says Österlund. It’s a convenient choice that is made “based on a well-informed decision by the customer.” Aversion to needles, for example, would make some users squeamish to implant the device. More education of users helps to allay any concerns: Some 10% of employees typically would agree quickly to the system, but a larger group of 50% to 60% are likely to agree over time as they get more comfortable with the idea and understand the convenience, says Österlund. Protection of information The passive device does not actively send out any signals as you walk. It is only powered up by a reader if a user has access rightsIn terms of privacy concerns, information contained on the device is in physical form and is protected. The passive device does not actively send out any signals as you walk. There is no battery. It is only powered up by a reader if a user has access rights. With use of the device being discussed in the United Kingdom, there has been some backlash. For example, Frances O’Grady, general secretary of the Trades Union Congress (TUC), has said: “Microchipping would give bosses even more power and control over their workers.” A big misconception is that the chip is a tracking device, says Österlund. It isn’t. “We love people to get informed,” says Österlund. “If they’re scared or apprehensive, they can just read up. It’s not used to control you – it’s used to give you control.”