Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Transport for London builds customer profiles using RFID data analytics

17/11/2014 by Sharon Shahzad

W1siziisijiwmtqvmtevmtcvmtivmjyvmzmvnzg1l1ryyw5zcg9ydf9mb3jftg9uzg9ux1rmtc5qcgcixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

Cards have become more important than cash in moving around London. In July 2014,Transport for London (TfL) stopped accepting cash on its buses, telling commuters they had to use Oyster cards, or debit or credit cards with a contactless payment chip. It also began to accept cards on its Underground and rail services.

TfL flagged up the customer convenience angle and acknowledged the change would make big savings over time – but the move to card payments will also provide more data it can use for long-term planning.

It demonstrates the potential to tap data from near field communication (NFC) cards and radio frequency identification (RFID) tags for analytics at macro and micro levels. The current norm is for RFID middleware to filter the data it reads into an enterprise system to monitor activity; but it is also possible to direct it towards a business intelligence system for analysis. There is even a basic analytical capability in some middleware, such as Checkpoint’s OAT Foundation Suite and Xterprise Clarity.

It is still early days but, as people make more small payments by swipe card and companies attach RFID tags to more goods, there will be a torrent of information on customer behaviour. This is going to prompt more organisations to look at how they use that data.

Transport analytics

TfL has been gleaning information from Oyster cards for 12 years. Sashi Verma, its director of customer experience, says the cards provide data for “demand profiles”, showing how many people enter and exit the transport network at specific points, and where the peak load develops on any route. They can tell TfL where people get on buses, and where they get on and off trains.

This makes it possible to construct a picture of individual journeys and how the bus and train networks are used by the public.  

“The Oyster Card advantage over survey data is that the information is much more granular,” Verma says. “I can conduct any kind of demand analysis for any day of the year.

“If you want an analysis for yesterday I can give it to you today. If you want analysis for unusual events we can study those across the network.”

He says it is possible to create any number of metrics.

“Every time you touch your card we get the card number and time and location of use, from which you can construct any metric – the demand profile of a particular bus stop or station, the load profile of sections of train lines or bus routes, the off-peak profile of demand, the day-by-day profile over a week, seasonal profiles, and so on. There’s no shortage of what you can construct.

This article has been extracted from http://www.computerweekly.com, please click on this link to read the article in full http://www.computerweekly.com/feature/Transport-for-London-builds-customer-profiles-using-RFID-data-analytics

Montash is a multi-award winning, global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy & Technologies, Demand IT and Business Engagement, Digital and E-commerce, Leadership Talent, Infrastructure and Service Delivery, Project and Programme Delivery.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...

W1siziisijiwmtcvmdkvmtgvmtavmtivndyvodeyl1dvbwvuigluihrly2ggkdiplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Tech is for girls... and always has been!

2017-09-18 10:00:00 +0100

Today, it's hard to deny that the IT and tech industry is a male-dominated field. Women earn only 28%[1] of computer science degrees, while the quit rate for women in the high tech industry is 41%[2], twice as high as it is for men. These two statistics would suggest that perhaps women aren't just discouraged from entering the tech field, but may find it a challenging environment to work in both in terms of treatment and pay. Facebook chief operating of...