Download PDF version Contact company
Bodega Norton also discovered that the new RFID and NFC driven system generates more detailed, real-time information

The HID Global Solution helped optimize the use of resources and improve productivity

Located among the foothills of the lush Andes Mountains, Bodega Norton boasts a magnificent heritage of over 100 years, and a mission as lofty as Andes themselves: “To be the best winery in Argentina known for the quality of its wines, professionalism and honesty of its team, while continuing to maintain its characteristic passion and excellence in wine production.”

The winery cultivates 1,730 acres (700 hectares) of vineyards and harvests grapes from almost the entire spectrum of grape varieties available in the Argentinean region. Bodega Norton vines have an average age of 30 years and many acres contain 80-year-old vines.

Each vine is under the watchful eye of Pablo Minatelli, vineyard manager at Bodega Norton. Minatelli is responsible for all aspects of grape production, from planting and cultivation to the harvest process, including the management of all workers collecting grapes. In this part of his job, he maintains a great respect for the role of human resources in achieving Norton’s potential. “Hand picking is the only way to harvest grapes properly, ensuring the best wine,” said Minatelli. “At Bodega Norton, people bring to life the winery and its wine. As we say, ‘Men’s hands contain nature, protecting and caring for her with their work.’ If you cultivate the best people, they will help you produce the best wine.”

Challenges

Norton’s 150 harvesters are paid based on the number of bins each fills. Simply put, the more bins one fills, the greater ones earnings.

However, like most wineries in the region, Bodega Norton was using a decades-old system for tracking compensation owed to each worker during the harvest season. This system consisted of thousands of aluminum or plastic chips of different colors and shapes, signifying the amount of grapes picked. A harvester would collect an appropriate chip from a supervisor each time they picked a full bin of grapes and delivered it to a collection site. The harvester would pocket the chip, then return to gather another bin full. At the end of a workweek, each harvester would present their chips to a manager, who would tally them and issue a voucher which would be exchanged for payment.

In some cases, pocketed chips were dropped and lost as harvesters moved through the rows of vines throughout the course of their workdays. As harvesters brought chips home after a day’s work, there was also the chance of the chips being misplaced or stolen. Often, the chips were used as currency between workers to settle personal debts between paydays.

“There was always a disparity between the number of chips distributed and the number returned,” said Minatelli. “It was impossible to know where they went, and difficult to ensure each worker received proper credit for their work.”

The chip system presented other inherent administrative and logistical difficulties as well. The paper-based system required that one day each week be set aside for collecting, counting and processing the chips. On that day, harvesters were unable to earn compensation collecting grapes and the winery did not have grapes to proceed with wine production.

Solutions

HID Global radio frequency identification (RFID) technology combined with near field communication (NFC)

"Beginning with the grape harvest, HID and FAB can help Norton improve quality, optimize data accuracy and streamline critical systems at every stage of the wine production and distribution process"

interoperability brings 21st century expertise to age-old processes and Bodega Norton can focus more time and attention on winemaking.

“We sat down with the people at Bodega Norton and reviewed the entire production process, from vine to bottle, to identify how HID’s RFID technology could help improve efficiency, accuracy and productivity, while still ensuring the highest quality finished product,” said Guillermo Ibarraran, sales manager, Latin America, Identification Technologies with HID Global. “Based on Norton’s philosophy that people bring life to the wine, we decided it was important to begin with the harvesters.”

First, the cumbersome, inefficient chips were eliminated. Instead, each harvester was issued an armband equipped with a contactless ISO MIFARE card that uniquely identifies each worker. These cards are resistant to moisture and fluctuating temperatures, ensuring that they withstand daily use and exposure to outdoor elements while being worn in the fields.

Each harvester now gathers grapes into a collection bin and when the collection bin is full, the grapes are transferred to receiving bins that are tagged with HID Epoxy Disc tags. Epoxy Disc tags are ruggedised transponders that perform very well in outdoor environments.

Fundación Ada Byron (FAB), the system integrator partnering with HID Global on the Norton project, outfitted vineyard supervisors with NFC-enabled cellular phones. Each supervisor now simply places his phone next to the harvester’s armband and then near the Epoxy Disc tag on the receiving bin he has filled. An audible tone assures both the harvester and supervisor that each collection bin has been counted and credited to the appropriate harvester.

“Incorporating NFC technology enabled cost-efficient software development and eliminated the need to invest in dedicated RFID readers — thanks to interoperable HID Global cards and tags,” said Héctor Franco, of Fundación Ada Byron. “More importantly, they allow us to incorporate Internet access and the integration of applications, such as GPS and accounting into the system.” Using NFC technology made it possible for the new system to be introduced through familiar smartphones that supervisors were already accustomed to keeping with them in the field.

Results

The HID Global and FAB solution drastically improved Bodega Norton’s productivity, through more efficient use of resources. Norton’s 150 harvesters and their supervisors are now able to devote one additional day each week to gathering grapes. That day was previously spent unproductively collecting chips and issuing vouchers — a time and expense that added no value to the wine-making process.

For supervisors, gone is the disparity between chips issued and chips collected. They can generate balanced records of credits distributed and accurate forecasts of salary payments. In addition, they can precisely evaluate harvest yields on an individual basis, rewarding those who work most quickly and efficiently.

The harvesters appreciate the faster, easier system. They no longer fear lost or misplaced chips, reporting the new system to be more reliable and secure. As a result, they are more satisfied that they are being compensated fairly, and motivated by knowing their efforts will be properly rewarded. Further, by eliminating the day that used to be needed to for Norton supervisors to collect chips and issue vouchers, each harvester can now devote more time to earning.

Satisfied harvesters is one reason Bodega Norton was recognized in 2010 by the consulting firm Great Place to Work, as amongst the best companies to work for in Argentina — the only winery to appear in this ranking.

Harvester satisfaction yields better results for all parties involved, and according to Mr. Minatelli, “Thanks to the efficiencies of the new RFID system, we pay better than other vineyards, and that means we attract the best harvesters. With the best people, and reduced administrative time and expense, we get a better harvest and better yield.”

Bodega Norton also discovered that the new RFID and NFC driven system generates more detailed, real-time information that can be used to guide better management decisions. Replacing the error-prone paper-based system provides a clearer picture of who is working, where and when they are working, and how many bins of grapes are being harvested.

“Ultimately, HID Global’s technology is helping Bodega Norton achieve our mission of presenting the best wines to our customers,” said Minatelli.

Cultivating Benefits for the Future

Bodega Norton plans to apply RFID technology and automation to improve quality, productivity and efficiency at virtually every stage of the process from grapevine to glass.

“HID Global is uniquely qualified to assist Bodega Norton as they expand their use of RFID technology,” said Richard Aufreiter, director of product marketing, Identification Technologies with HID Global. “We offer the industry’s most diverse and flexible line of interoperable RFID tags and transponders, plus proven expertise and a global network of integrator partners. Beginning with the grape harvest, HID and FAB can help Norton improve quality, optimize data accuracy and streamline critical systems at every stage of the wine production and distribution process.”

"Ultimately, the multi-tiered, RFID electronic tracking and recording system we are implementing with the help of HID Global and Fundación Ada Byron is designed to produce a singular result"

For example, Bodega Norton uses a process of precision viticulture to ensure each plant reaches maximum potential. The system maps “vineyards within vineyards” subdividing the Norton plantation into small work plots, which are each worked in a specific and individual way as to cultivate them to full potential. Norton will tag each row of its expansive vineyards to precisely identify and manage vine care, feeding and growth. In addition, tracking each grape harvest from row to bottle will enable the winemakers to trace an individual bottle to the day and time the grapes were picked and even identify the harvester who picked them. Norton can trust a number of highly durable HID Global disc shaped tags to perform reliably in this application, such as the Epoxy Disc family or IN Tag family of RFID tags.

There are many additional areas at Bodega Norton that have been identified for enhancement using HID’s RFID technology. Real-time access to detailed reporting enables management to reap the data needed to produce more informed decisions.

For example, pruning is a critical concern to the viticulturist as it affects grape yield and quality. Proper pruning will lower the yield but produce a higher quality grape — grapes that will have a stronger concentration of flavor which is ideal for wine making. Using RFID, wineries can track which pruner does which row and give feedback on the yield and quality year-to-year. As with the harvesters, it is best to attract the best pruners who take pride in their work. When these workers prune the same row every year the winery can provide feedback on the results for ongoing improvement of the vineyard. Other systems to be integrated via RFID and electronic recordkeeping may include:

  • Horticultural management – tracking and reporting of plowing, planting, fertilization, irrigation, weather conditions and vine care.
  • Raw materials inventory and transportation – real-time reporting of grape varieties and volume as they move through processing.
  • Production logistics – more accurate monitoring of the aging process.
  • Finished goods inventory and distribution – UHF tags can enable an entire truckload of wine to be accounted for in seconds while the truck rolls past a reader station.

According to Minatelli, “Ultimately, the multi-tiered, RFID electronic tracking and recording system we are implementing with the help of HID Global and Fundación Ada Byron is designed to produce a singular result: The best wine for Bodega Norton customers.”

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)
Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)

Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualization platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analyzed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualization. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centers of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualization and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Center, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organization’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favor of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centers, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centers. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organizations with physical and cyber security needs.

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.