Auto Dimensioning is Revolutionizing Warehousing

Auto Dimensioning 

Auto dimensioning technology is changing warehousing from receiving to shipping. At receiving by automatically capturing the size of an object to optimize warehouse space and configuration.  At shipping, by quickly and accurately taking the size and weight of an object. 

Newcastle Systems, our hardware partner, has a mobile auto dimensioning solution.

The Power to Dimension Product Anywhere in Your Warehouse from Newcastle Systems

Volume, not weight, has always been the limiting resource in storage and distribution, but – because scales are inexpensive and fast – weight has been used as an inexact stand-in. Now that dimensioning equipment is reaching new levels of efficiency, volume can be managed directly and accurately, bringing savings to warehouses, DCs, and logistics operators.

The Atlas Series Mobile Dimensioning Stations™ 

Screen Shot 2018-03-09 at 4.18.20 PM.png

were designed to enable quick and accurate dimensioning directly at your product location. The rugged Atlas Series consists of 30” and 48” long workstations that hold and power the QubeVu DimStation™ and other hardware including scales, laptops/thin clients, and printers up to 12+ hours at a time or 24/7 operation.


  • Enhance speed and data capture for the optimization of warehouse space, trailer/truckloads and identifying best packaging solutions
  • Decrease shipping charges & costly charge backs
  • Dimension directly at product location; increase productivity up to 50% by eliminating costly motion, touches and transportation waste
  • Reduce operator fatigue and potential injury as carrying/moving parcels to fixed station is eliminated
  • With multiple units, quickly process increased volume due to business growth, seasonal peaks & more
  • Workstation can also accommodate most other dimensioning units on the market

Atlas Series Auto Dimensioning Stations Data Sheet

QubeVu DimStation Data Sheet




What do Barcoding and the Olympics have in Common?

Technology of Course!

So many amazing moments at the Olympics! We sure enjoyed the games! And behind the many inspired performances were an intertwined combination of talent, training and technology.


Take speed skating for example; for years Under Armour has been fine-tuning the “technology” behind the body suits speed skaters wear. It’s all about reducing the amount of air resistance and making the skater more aerodynamic. The combination of unique materials and their precise construction, makes a difference. And in a sport where a fraction of a second can be the difference between gold and silver, even the slightest advantage is important.    

Similarities can be drawn with automated data collection though time savings with barcodes are typically measured in minutes rather than fractions of a second. However, the desired goal for both speed skating and automated data collection is to streamline the activity to get the maximum result.

The Business Process Analysis

One of the tools ADI use to uncover inefficiencies is the Business Process Analysis or BPA.  A Business Process Analysis is a methodology used by Adaptive Data to get to know your business. We: 

  1. Review your business processes
  2. Document the current state
  3. Identify areas of inefficiency
  4. Suggest potential time-saving solutions by using barcode and/or RFID 

What to Expect from a BPA

The BPA entails us physically coming to your facility, rolling up our sleeves and diving into the daily operations of your organization. 

  • We observe your workflows

  • We talk to your employees

  • And we ask a lot of questions

Why?  First and foremost, we want to understand your culture and priorities to insure we work within those boundaries. Secondly, we want to thoroughly understand how things work now, keeping an eye out for opportunities to reduce cost and improve efficiency in your organization.  Specifically, we are looking for Non-Value Added Labor (NVAL) activities.  

Stop Watch.jpeg

Productivity Killers

The old adage 'time is money" holds true. So uncovering and eliminating NVAL activities is a priority. What is NVAL? Non-Value Added Labor is any activity performed that does not add value to, reduce the cost of or improve in anyway the products and/or services you provide.

We put NLAL into 2 categories:

1. Time spent manually collecting and handling data

Examples include:

  • Time spent handwriting log sheets, forms, spreadsheets and the like for any area of your organization including: production receipts, inventory movement, scheduling, job tracking etc
  • Time spent collecting, translating, and key entering the data from log sheets, forms spreadsheets and the like   
  • Time spent clarifying data                                           

Shaving time off any process means you have to minimize errors. Errors are a productivity killer and data that is key entered is a major source of errors. A highly skilled key entry operator will make one key error in every 400 strokes, and that’s if the data being entered is clearly readable.

2. Time spent validating data and correcting mistakes

Examples include:

  • Time spent searching for inventory
  • Time spent expediting orders to make up for yesterday’s mistakes
  • Time spent hunting down order status 

Consider this scenario:
A customer places an order for 2 widgets which your system says are in stock.  But when you go to pull the order, the inventory is not there. The next day you have to expedite the order to fulfill the customer’s request.  

The list could go on and on, but you get the idea. Like errors, these types of activities are productivity killers. 

Evaluating current processes is the first and most important step in a BPA. Documentation and analysis follow and finally a solution or solutions are presented.  

Is Non-Value Added Labor killing productivity in your organization? Give us a call to find out!


Uncertainty in the Paper Market

Supply and Demand are Causing Uncertainty

The once relatively stable paper market, is no more. This is due in large part to two unrelated, yet significant factors, that are disrupting the paper market worldwide. 

Direct Thermal Paper Shortage

An interruption in the production of thermal paper is causing worldwide concern. Connect Chemical, the world’s largest supplier of Leuco Dye, is shutting down their plant in China due to environmental concerns. The plant supplies approximately 50% of the worldwide supply of Leuco Dye, an activation ingredient used in the making of thermal paper. The shutdown will significantly limit the supply of thermal paper for the foreseeable future, resulting in potential material allocation and inevitable price increases on direct thermal label stocks and receipt paper.

The Rising Cost of Paper

In 2011, pulp and paper prices hit a 30-year high. Since then, the paper market has continued its upward trend and four short years later, pulp and paper prices were at record highs again. According to IBISWorld, this inflationary trend will continue. They are forecasting “the price of wood pulp to rise even further at an annualized rate of 5.1% in the two years to 2019”.

Surprisingly, three positive economic indicators are contributing to the rising cost of paper:

  1. Stable unemployment and increased confidence in the economy is leading to a rise in consumer spending. This growth in demand for discretionary and non-discretionary goods are often packaged with paper-based product, contributing to an increase in demand.
  2. Related to the rise in consumer spending, is the growth of e-commerce. This trend was validated by the estimated $6.6 billion spent this year on Cyber Monday and likely those on-line purchases were packaged and shipped using paper-based products.
  3. Growth in industrial production, by both existing and new businesses, is driving demand up for paper-based packaging products used in the production and wide-spread distribution of these products.

ADI is working closely with our paper coaters and convertors to maintain label pricing levels and will raise pricing only when it is absolutely necessary.

3 Things to Know About Scanning Barcodes with Your Smart Phone

3 Things to Know About Scanning Barcodes with Your Smart Phone

In 2017, the number of cell phones being used worldwide is estimated to be 4.77 billion which means that just about everyone has a low-cost, high-resolution digital camera at their fingertips. With that said, you might be thinking “Why not use something I already own for barcode scanning”?

Honeywell Goes Green with Battery-Free, Wireless Imager

Honeywell Goes Green with Battery-Free, Wireless Imager

With Earth Day on April 22nd, we thought we'd take a look at the newest battery-free scanner from Honeywell . . .  introducing the Xenon 1902g-bf. This image scanner has really gotten our attention! And PerformanceConvenience & Versatility are just 3 reasons why! 

The OS Landscape for Enterprise Mobility

The OS Landscape for Enterprise Mobility

The likelihood of your mobile devices running on either Windows CE or Windows Mobile is a pretty sure thing.  And much like death and taxes, the other sure thing is MicroSoft is ending support of both versions in 2020. 

ADI Celebrates 15 Years of Technology

ADI Celebrates 15 Years of Technology

February marks a milestone for Adaptive Data . . . our 15th anniversary, though unofficially we've been around for longer than that.  ADI takes a fun look at technology; past present and future and weighs in how the Internet of Things is a game changer.

Protecting Pets with RFID


In August many of us celebrate National Dog Day to honor our four-legged friends. Technology continues to merge with almost every aspects of our lives and that includes our pets. To be exact, RFID (Radio Frequency Identification) is the technology used in micro-chipping our pets. The specific technology used is Passive RFID, which is relatively inexpensive. Other advantages of Passive RFID are its lifespan (around 25 years) and its size (about the size of a grain of rice), making inserting the microchip a very simple procedure that doesn't require anesthesia.  

Passive vs Active RFID

Two basic and very different types of RFID exist, both with unique advantages and disadvantages.

  • Passive RFID - A Passive RFID tag does not have a power source within the tag, but instead relies on the RFID reader for power. Because of this simple fact, Passive RFID tags are very inexpensive, making it affordable to tag down to the item level of more than just high-value items.
  • Active RFID - On the other hand, an Active RFID tag has a battery within the tag itself, making them considerably more expensive than Passive RFID tags. On the up-side, however, Active RFID tags have very long read ranges.

Which type of RFID is right for you? To learn more go to our Solution Page or Contact Us.


Barcode Label Printing Automates an Unlikely Venue

Barcode Printing Automates Church Raffle

For many of us the weekends are a time to push away from our desks for a few days.  But on at least one weekend a year, ADI sales rep Mike Barker takes his knowledge of label printing systems into the weekend for his church’s festival. 

The festival at St. John’s is the largest public event in the city of West Chester, Ohio with crowds topping 30,000 visitors over the 3-day event.  Mike is using barcode printing to automate ticket purchases for the basket raffle which has grown to more than 90 baskets.

An Evolving Print Solution

St. John’s festival has been going on for over 20 years, but it wasn’t until 12 years ago that automating the ticket process began.  “Lazy Label” was created, which printed contact information on a laser label that was then adhered to the raffle ticket. “Nobody wants to write their name and phone number hundreds of times” says Mike.  This first step in automation added a “convenience factor” and buyers were more than willing to pay the $1 premium for this service.    

Three years ago, the process was upgraded again to laser printed tags, eliminating the need for both a label and a ticket, but the process was still somewhat slow and the cost of the tag was expensive.  

Automation is Driving Ticket Sales

150 raffle tickets print in seconds!

The current solution, put in place last year, uses a four-inch wide industrial printer, printing a direct thermal tag.  Along with contact information, a barcode is also printed, allowing raffle winners to be validated by scanning the winning ticket. And with the addition of the barcode, it is much harder to counterfeit tickets, making the current printing solution fast, low-cost and secure.  

Expediting the process has increased ticket sales, which have steadily grown over the years. This year Mike estimates they will print 150,000 raffle tickets, validating that automation, even in a "non-traditional" application, leads to positive results.  

IT Policy for BYOD is Essential for Data Security

BYOD Policies are Becoming the Norm

So you've made the decision to allow your employees to bring their personal devices to work. You're in the majority!  According to Honeywell, embracing this policy is a "win-win proposition." 

The upside of a BYOD policy is twofold.  User's are familiar with their own devices and productivity typically increases, as little to no education is required to get up and running and device acquisition costs are lower.    

The downside, and it's a big one, can be comprised security if an IT policy specific to personal devices, is not put in place.  

BYOD Security  

The following is an except from an Application Brief recently published by Honeywell, discussing what a BYOD policy does in terms of IT security for your company.

"To keep your organization and its data safe, consider just a few of the many problems that a BYOD policy can help you mitigate:

  • A system for registering devices has to be in place; otherwise, unsecured devices might compromise your network.
  • Ultimately, users will be responsible for following the rules of securing their devices. You’ll have to monitor and enforce compliance.
  • Without proper safeguards, users might lose or unknowingly compromise your sensitive data, or they may introduce viruses that spread across your network.
  • You’ll need ways to prevent users from removing security controls or copying sensitive data from email, calendar and contact applications to other applications on the device or to another unregistered device."  

Sage advice!  Included in the application brief from Honeywell is a template for creating a BYOD policy for your organization. Read the full brief.

For more information on choosing rugged or consumer devices, read our blog from February 2015

Creating "Chain of Custody" with Barcoding

What is “Chain of Custody” and Why is it Important?

In the legal system, chain of custody is defined as “the chronological documentation or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of physical or electronic evidence”. – Wikipedia 

Chain of custody ensures only authorized individuals come in contact with evidence, from beginning to end.  In a criminal case, where a defendant’s guilt or innocence is, in part, decided based on evidence, the importance of a tightly controlled chain of custody process cannot be overstated.    

Though the terminology is different, barcoding creates an automated "digital" trail, creating documentation on what something is , where it is or where it's been, who has it, where it's going etc. 

Automation is the Key to Success

Recently, ADI partnered with 2GO software to deliver "chain of custody" control for specimen tracking.  The application required tightly controlled documentation of a courier responsible for the daily pick-up, transport and delivery of lab specimens. Using Honeywell's Dolphin Black and 2Go’s Proof of Delivery software, ADI found the perfect solution.  Easily scalable and customizable, the POD software automates the courier process and with signature capture and GPS time-stamp features on the Dolphin Black, the solution provides complete visibility and traceability throughout the process.   

Going back to the definition of chain of custody, here are some of the features that provide checks and balances for each of these critical steps in the process.

Seizure (specimen pickup) – signature capture provides proof of when a specimen is picked up.  The time-stamp feature pinpoints the exact time the specimen was received.  The software also allows a photo to be taken of the item being tracked, linking the photo to the data, to show condition or other attirbutes of the item.

Additionally, the 2Go software can use GPS to map the most economical route for specimen pick-up.   

Custody - At any time, a driver’s whereabouts and the specimens in his custody can be monitored.

Control - Transaction history provides a documented history of where and when the specimen was transferred from one control point/person to another during the entire process, pickup to delivery.

Transfer - Signature is captured at the time the specimen is delivered to the designated final location, closing the loop on the process.

"Chain of Custody" in Your Business

Beyond this example for specimen tracking, chain of custody is used in a diverse number of ways.  Some examples are: file tracking for law firms, insurance and mortgage companies, tracking of high-end retail items such as jewelry and in manufacturing for tracking tooling and calibration devices to name a few.  Even in the art industry, chain of custody documentation can be used to augment “provenance” for a piece of artwork.  I’ll admit, some of these applications are more obscure than others, but all equally important to the people requiring chain of custody documentation.   

What do the terms Seizure, Custody, Control and Transfer translate to in your business?  Receipt, Inventory Move, WIP, Sale . . .

How could an automated "chain of custody" process help your business? 

What You Should Know About Charging your Enterprise Mobile Device

All Chargers Are Not Created Equal!

We’ve all been there . . . you need to make a call, but your phone only has one bar and there isn’t a wall plug in sight. Borrowing or swapping chargers between devices is common practice, especially for consumer devices and most of the time this is a solution that works. 

Many non-iOS devices (consumer and enterprise) use micro USB ports for charging.  One might assume that a standard cell phone charger and cable would suffice to charge a mobile handheld device with a larger battery, multiple radios etc.  This may or may not be the case, because all chargers, nor cables, are created equal.    

Though the form-factor and user interface of an enterprise handheld device is similar to a retail Smartphone, the similarities stop there. The functionality of a multi-radio mobile computer draws power at a much higher rate than a Smartphone.  Add extended battery options commonly used for enterprise applications, and the amount of power required to charge an enterprise device in a reasonable time period becomes more significant.    

Guidelines for Charging

Many cell phone wall chargers and 12v volt car adapters typically provide charging/operating power ranging from 5 volts @ .5 amp (500 milliamps) up to .9 amp (900 milliamps).  Some are higher. USB ports on PCs, laptops and USB hubs typically provide charging/operating power at 5v @.5 amp (500 milliamps) also.  Theoretically, these types of chargers would eventually charge an enterprise handheld device, but at a considerably slower rate.  But if the device requires 2 or more amps and is on and “running”, the mobile device may not charge at all, even when connected to a low power charger.

Optimum charging for most enterprise handheld devices, is best at an input voltage of 5v @ 2.0 amps or higher (or as called out on the device rating plate).  In addition, the USB cable should be a 28/26 or 28/24 cable to achieve the best results (faster charging times).  Thin (28/28) inexpensive retail cables (28/28) may reduce the benefit of using a more powerful charging due to the wire size. 

The same holds true for many of the more sophisticated SmartPhones, tablets and the like. Like enterprise mobile computers, they may require a charger that provides more amperage to achieve the fastest possible charge time.  Check the power specs on your mobile device and compare it to the power specs on you wall charger.  The charger should always be in the same voltage range and at an amperage output equal to or higher than the mobile device.

The Bottom Line

Consideration of battery needs and charging options is a critical part of the mobile computing solution.  The time it takes to fully charge a device can be as important as the amount of active use time you get from the battery charge itself.      

Piecing Together the GHS Compliance Puzzle

Piecing Together the GHS Compliance Puzzle

For many, compliance with the new GHS labeling guidelines is a reality and has been for some time.  However, there are many paths to compliance and the choices can be overwhelming.  But when perfectly pieced together, GHS compliance can be integrated seamlessly into an organization.

Wireless Site Survey

In the world of manufacturing and distribution there is a seemingly endless combination of facility layout, equipment, inventory, and network infrastructure that affects a good wireless implementation. That's why the importance of a site survey cannot be overstated.  Read more about your options . . .


Play Ball!!

It’s that time of year again!  The boys of summer take the field for six glorious months of America’s favorite past time!  Here in Cincinnati, Opening Day is a National Holiday and the city comes out in a big way for the home team.  I’m sure it’s the same for baseball cities across the US.   

So what does Opening Day have to do with the technology space we play in?  These days, barcode and RFID technologies are playing a more important role not only in baseball, but across professional sports. 

 Security and Convenience   

For years, possibly decades, tickets to sporting events have been bar coded.  This greatly automates the processes of entering the sporting venue, and adds an invaluable degree of security if you decide either to buy or sell tickets from a third party source. 

Beyond the traditional barcode, RFID is enhancing the fan experience.  “RFID technology provides event organizers and team personnel a way to rethink the fan experience and make every part of it more efficient. With RFID technology, there is no need for a barcode to be scanned entering the stadium. As long as fans have a chip embedded somewhere in their clothing, wallet, or purse, they can simply enter through an RFID-enabled turnstile with relative ease compared to an old-school ticket”


Contact ADI to see how we can help you enhance your "fan experience"!!