RFID CASE STUDY

Assignment Help Basic Computer Science
Reference no: EM133026865

RFID CASE STUDY

People love sports statistics and the more the better. Responding to this customer demand, the NFL increased the quality and quantity of statistics available to coaches and fans with radio frequency identification (RFID) chips.

Player RFID Project

When the 2015 National Football League played its first game in New England, each player was equipped with a set of RFID sensors. Each sensor, about the size of a quarter, is embedded in players' shoulder pads and remits a unique radio frequency. Every stadium used by the NFL is equipped with 20 receivers to pick up the RFID signals and pinpoint every player on the field. It also records speed, distance traveled, acceleration in real time, and the direction the player is facing.

The NFL plans to use the data it collects to power an Xbox One and Windows NFL apps to allow fans to call up stats for each player tied into the highlight clips posted on the app. The data will also be fed to broadcasters, leveraged for in-stadium displays, and provided to coaching staff and players.

"We've always had these traditional NFL stats," says Matt Swensson, senior director of Emerging Products and Technology at the NFL. "The league has been very interested in trying to broaden that and bring new statistics to the fans. Along the way, there's been more realization about how the data can be leveraged to make workflow more efficient around the game."

Zebra Technologies Software Vendor

The NFL's technology partner in its IoT push was Zebra Technologies of Lincolnshire, Illinois.

Zebra was well known for its manufacturing and selling, marking, tracking, and printing technologies such as thermal barcode label and receipt printers, RFID smart label printer/encoders, and card and kiosk printers. As it moved into IoT and M2M applications, Zebra launched its MotionWorks Sports Solution, which powers the NFL IoT initiative. Zebra was able to develop RFID tags that blink up to 85 times per second to track motion of athletes in subseconds. Then it had to find a customer for the product-so it turned to the biggest fish in the pond-the NFL. Zebra trialed the tags by equipping more than 2,000 players, 18 NFL stadiums and officials, markers, and pylons. Over the course of the season, more than 1.7 billion sets of XY player coordinates were measured, transmitted, and stored during the games. Every stadium was connected to a command station in San Jose, California, that controls when the data are collected, where they are sent, and stores them in the cloud.

The Need for the Right People

An important lesson that Zebra learned is that generic data scientists weren't sufficient to gain insight into the data. Zebra needed football experts. "When you look at analytics in football, you really need people. We had to go out and hire football people. The analytics from manufacturing weren't the same as the analytics from football. We could see correlations in the data that seemed important and then found out they weren't. We had to bring in people that had the football expertise who could say, ‘Look, this is why it matters'," said Jill Stelfox, Zebra Technologies Vice President and General Manager, Location Solutions.

The latest development in this IoT initiative is its integration with NFL's fantasy football offerings.

QUESTIONS

1. Why did NFL equip its players with RDIF tags?

2. What factors contributed to the success of the IoT initiative at the NFL?

3. What other types of IoT applications can you think of that could be used in sports stadiums?

4. Is it ethical to insert the RFID tags into the players? Why or why not?

Reference no: EM133026865

Questions Cloud

What are pros and cons of being entrepreneur : What are the pros and cons of being an entrepreneur? What challenges do they face and how do they address them?
About entrepreneurship in global economy : Describe the organization's environment, and evaluate its preparedness to go global, if not already, and it's strategy for staying global if it is.
Cybersecurity best practices : Examine the laws, regulations, and standards that organizations use to align with government requirements around cybersecurity best practices
Business intelligence and analytics : What is the current industry? What is the name of the organization? How is it currently functioning today?
RFID CASE STUDY : Why did NFL equip its players with RDIF tags? What factors contributed to the success of the IoT initiative at the NFL?
Characteristics of anomaly detection : What are the characteristics of anomaly detection? What are the detection problems and methods?
Business analytics system : Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one?
Cloud computing-describe virtualization : Define and describe virtualization. Defend the following statement: Virtualization is not a new concept within computer science
Some benefits of collaboration : Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Why the business needs to drive the IG strategy

Why the business needs to drive the IG strategy and why there must constantly be an alignment.

  Devise plan for accommodating conflicting responses

Devise a plan for accommodating conflicting responses for the same procedure from two different people you interviewed.

  Give and explain all steps involved in sdlc

Give and explain all steps involved in SDLC. The paper should be in MLA formatting.

  New to computer science would understand

Give an original detailed description of ROP and code injection that someone new to computer science would understand.

  Python program for this problem using python idle editor

Your company sales its software for $48 a unit. If customers purchase more than $350, they receive a 10% discount.

  Write a driver program with a main method to read in data

"Using the PetRecord class stored on the K: drive, write a driver program with a main method to read in data for five Pets and display the following data.

  Compute the key pairs kao and kbo

We reconsider the Diffie-Hellman key exchange protocol. Assume now that Oscar runs an active man-in-the-middle attack against the key exchange as explained in Sect. 13.3.1.

  Compute a min hash value using hash function

Suppose data is in a file that is distributed over many processors. Show how you would use the map-reduce framework of Section 20.2 to compute a min hash value, using a single hash function,

  Produce a distributed database design for this system

Using the ER diagram from the previous question, produce a distributed database design for this system

  Concept of 3-f method

The concept of 3-F Method is introduced. Discuss the purpose of this concept and how it is calculated.

  Discuss the factors that affect query decomposition

How is the decomposition of an update request different from the decomposition of a query? How are guard conditions and attribute lists of fragments used during the decomposition of an update request?

  What improvements would you make to the overall ERM

How did KPIs help in the success of the program? What improvements would you make to the overall ERM?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd