{"id":2030,"date":"2021-05-11T13:41:11","date_gmt":"2021-05-11T12:41:11","guid":{"rendered":"https:\/\/checkpointsstg.wpengine.com\/nl\/?p=2030"},"modified":"2024-05-27T08:49:43","modified_gmt":"2024-05-27T06:49:43","slug":"source-tagging-made-easy-with-checkpoint","status":"publish","type":"post","link":"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/","title":{"rendered":"Source Tagging made easy with Checkpoint"},"content":{"rendered":"<p>Tagging products with EAS security labels is proven to reduce shrink<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a> which in turn can lead to increased sales<a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a>. Some products are coming into retailer's stores already tagged. The benefits of source tagging are proven, and to maximize them retailers can expand the population of tagged products by implementing their own source tagging program.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2>What is source tagging and why should retailers be doing it?<\/h2>\n<p>Source tagging is the application of security labels at the point of manufacture. The further upstream in the supply chain the EAS labels can be applied the less cost impact there is on the products. Today\u2019s retailers do not have excess store labels for the application of EAS labels in store. This labor is better spent with customer-facing activities.<\/p>\n<p>Moving the tagging process away from stores to source provides consistent protection that meets compliance standards. By applying the label in a consistent place on the product, retailers increase their chances of providing an appealing customer experience. Brand and product integrity are not compromised by inconsistent and random EAS label applications.<\/p>\n<p>Source tagging is ultimately about control. Controlling the type of tag applied, and where it is applied on the product. It also allows retailers to track, measure, and monitor products across the entire scope of their supply chain. Rather than waiting for the products to be delivered to the store or DC before they can be tagged, tagging them at source means that there are no gaps in supply chain visibility.<\/p>\n<p>&nbsp;<\/p>\n<h2>Checkpoint Systems, source tagging leaders<\/h2>\n<p>Checkpoint Systems is the global leader in providing retail merchandise protection solutions, with over 30 years driving retailers and brand owners source tagging programs.<\/p>\n<p>We are a vertically integrated solution provider for retail, delivering intelligent solutions that bring clarity and efficiency to the retail environment anytime, anywhere. Our Micro EAS labels allow for product protection without interfering with a brand owner's brand aesthetics. We have the infrastructure and resources to work collaboratively with retailers to determine which of our security labels will work for optimal detection and deactivation in the Checkpoint EAS systems found in retail.<\/p>\n<p><a href=\"https:\/\/checkpointsystems.com\/nl\/security-labels-tagging\/source-tagging\/\">Discover our solutions<\/a><\/p>\n<p><img decoding=\"async\" class=\"lazyload  wp-image-1138 aligncenter\" src=\"https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/IMG_8858.jpg\" data-orig-src=\"https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/IMG_8858.jpg\" alt=\"\" width=\"470\" height=\"353\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27470%27%20height%3D%27353%27%20viewBox%3D%270%200%20470%20353%27%3E%3Crect%20width%3D%27470%27%20height%3D%27353%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/IMG_8858-200x150.jpg 200w, https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/IMG_8858-300x225.jpg 300w, https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/IMG_8858-400x300.jpg 400w, https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/IMG_8858-500x375.jpg 500w, https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/IMG_8858-600x450.jpg 600w, https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/IMG_8858-667x500.jpg 667w, https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/IMG_8858-768x576.jpg 768w, https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/IMG_8858-800x600.jpg 800w, https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/IMG_8858-1000x750.jpg 1000w, https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/IMG_8858-1024x768.jpg 1024w, https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/IMG_8858.jpg 1184w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 470px) 100vw, 470px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2>Why should retailers even tag in the first place?<\/h2>\n<p>Retailers have the technology at their fingertips to deter theft, reduce shrink, and improve on-shelf availability which in turn could mean increased inventory accuracy, and enhanced omnichannel. That technology is tagging. So why not use it and enjoy the benefits?<\/p>\n<p>Accurate inventory forecasting and replenishment is a major challenge for retailers, achieved through better on-shelf availability. Most retailers replenish inventory based on point-of-sale data. Shoplifting completely undermines this system, leaving stores low on stock and the store unaware that they are about to run out. Empty shelves are a blight for retailers, damaging customer experience and negatively impacting customer loyalty.<\/p>\n<p>Applying tags is a great response to this challenge. Yet doing so in-store has its drawbacks. Store labor is very valuable and best spent elsewhere, such as dealing with customer requests and generally improving the customer experience. Source tagging allows for the delivery of shelf-ready EAS-protected labels freeing up in-store labor for other tasks.<\/p>\n<p>At Checkpoint, we are the industry leader in the application of EAS labels at source, making it a smooth process for the retailers. We currently manage over 1,000 brands facilitating source tagging. These brands represent over 10,000 items protected at source. The Checkpoint global team can support programs locally or at the point of manufacturer.<\/p>\n<p>&nbsp;<\/p>\n<h2>What should a retailer know before getting started?<\/h2>\n<p>Getting started doesn\u2019t have to be a big deal. Checkpoint\u2019s expert Source Tagging teams are on hand to guide retailers through the 5 steps to implementing a successful source tagging program are to use the data, collaborate, test, manage for the long term, and audit:<\/p>\n<h3><strong>USING DATA<\/strong><\/h3>\n<p>Analyzing available data is crucial before deciding to implement a Source Tagging program. This will enable retailers to make informed choices of what products are most at risk and should be selected for trial.<\/p>\n<h3><strong>TEAM COLLABORATION<\/strong><\/h3>\n<p>From factory staff to loss prevention managers to category managers team, collaboration and communication is essential to a successful project. Checkpoint has the resources globally and locally to support retailers at each step.<\/p>\n<h3><strong>TESTING is KEY <\/strong><\/h3>\n<p>Tags only work if they can be detected. Once tagged, a sample of products will be tested at Checkpoint\u2019s laboratory to check whether the detection and deactivation is suitable for the stores in which they will be sold.<\/p>\n<h3><strong>LONG-TERM SOLUTIONS<\/strong><\/h3>\n<p>Once testing is complete, the source tagging program is ready to be rolled out.<\/p>\n<p>A successful project is not a short-term solution. The ultimate objective should be that the program is easily scaled up to include all future product lines.<\/p>\n<h3><strong>IN-STORE PRODUCT AUDIT<\/strong><\/h3>\n<p>The source tagging program should deliver speed-to-shelf, helping to reduce out-of-stock scenarios and increase sales.<\/p>\n<p>It\u2019s important for the retailer to ensure compliance through regular checking of the source-tagged products arriving in store.<\/p>\n<p>&nbsp;<\/p>\n<h2>Checkpoint is here to help<\/h2>\n<p>As RF technology specialists, the Checkpoint source tagging team will support retailers on every step of their journey, ensuring two main objectives:<\/p>\n<ol>\n<li>The products will be delivered to the stores tagged according to the requirements defined by the retailer.<\/li>\n<li>The tagging will be easy for the manufacturer, ensuring that the original manufacturing process is impacted as little as possible.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>As a global provider Checkpoint can provide the same advisory services wherever you are, including retailers with multinational supply chains. We ensure the same level of support and the same outstanding result. Use our experience and expertise to get the results that you are looking for from source tagging.<\/p>\n<p>If you think that source tagging might be for you, contact your local Checkpoint representative<a href=\"https:\/\/checkpointsystems.com\/nl\/contact\/\"> here<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> Sidebottom, A., Thornton, A., Tompson, L.\u00a0<em>et al.<\/em>\u00a0<a href=\"https:\/\/crimesciencejournal.biomedcentral.com\/articles\/10.1186\/s40163-017-0068-y#citeas\">A systematic review of tagging as a method to reduce theft in retail environments<\/a>.\u00a0<em>Crime Sci<\/em>\u00a0<strong>6,\u00a0<\/strong>7 (2017).<\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> CashTech, <a href=\"https:\/\/www.cashtechcurrency.com\/blog\/6-effects-of-shrinkage\">6 Effects of Retail Shrinkage<\/a>, March 2020<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tagging products with EAS security labels is proven to reduce  [&#8230;]<\/p>\n","protected":false},"author":4,"featured_media":2031,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,26],"tags":[],"class_list":["post-2030","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-label-oplossingen"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Source Tagging made easy with Checkpoint - Checkpoint Systems Netherlands<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Source Tagging made easy with Checkpoint - Checkpoint Systems Netherlands\" \/>\n<meta property=\"og:description\" content=\"Tagging products with EAS security labels is proven to reduce [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/\" \/>\n<meta property=\"og:site_name\" content=\"Checkpoint Systems Netherlands\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-11T12:41:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-27T06:49:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/Source-Tagging-Wine-Header.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"746\" \/>\n\t<meta property=\"og:image:height\" content=\"559\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Dickinson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Dickinson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/blog\\\/source-tagging-made-easy-with-checkpoint\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/blog\\\/source-tagging-made-easy-with-checkpoint\\\/\"},\"author\":{\"name\":\"Simon Dickinson\",\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/#\\\/schema\\\/person\\\/7b47c53c3cd6aed4b251bf41087c7058\"},\"headline\":\"Source Tagging made easy with Checkpoint\",\"datePublished\":\"2021-05-11T12:41:11+00:00\",\"dateModified\":\"2024-05-27T06:49:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/blog\\\/source-tagging-made-easy-with-checkpoint\\\/\"},\"wordCount\":985,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/blog\\\/source-tagging-made-easy-with-checkpoint\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/wp-content\\\/uploads\\\/sites\\\/20\\\/Source-Tagging-Wine-Header.jpeg\",\"articleSection\":[\"Blog\",\"Label oplossingen\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/blog\\\/source-tagging-made-easy-with-checkpoint\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/blog\\\/source-tagging-made-easy-with-checkpoint\\\/\",\"url\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/blog\\\/source-tagging-made-easy-with-checkpoint\\\/\",\"name\":\"Source Tagging made easy with Checkpoint - Checkpoint Systems Netherlands\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/blog\\\/source-tagging-made-easy-with-checkpoint\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/blog\\\/source-tagging-made-easy-with-checkpoint\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/wp-content\\\/uploads\\\/sites\\\/20\\\/Source-Tagging-Wine-Header.jpeg\",\"datePublished\":\"2021-05-11T12:41:11+00:00\",\"dateModified\":\"2024-05-27T06:49:43+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/#\\\/schema\\\/person\\\/7b47c53c3cd6aed4b251bf41087c7058\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/blog\\\/source-tagging-made-easy-with-checkpoint\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/blog\\\/source-tagging-made-easy-with-checkpoint\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/blog\\\/source-tagging-made-easy-with-checkpoint\\\/#primaryimage\",\"url\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/wp-content\\\/uploads\\\/sites\\\/20\\\/Source-Tagging-Wine-Header.jpeg\",\"contentUrl\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/wp-content\\\/uploads\\\/sites\\\/20\\\/Source-Tagging-Wine-Header.jpeg\",\"width\":746,\"height\":559},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/blog\\\/source-tagging-made-easy-with-checkpoint\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Source Tagging made easy with Checkpoint\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/\",\"name\":\"Checkpoint Systems Netherlands\",\"description\":\"RFID oplossingen voor uw toekomst\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/checkpointsystems.com\\\/nl\\\/#\\\/schema\\\/person\\\/7b47c53c3cd6aed4b251bf41087c7058\",\"name\":\"Simon Dickinson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b088b5fbbf92711c43c44d59c50b568f0ae953278da9fe56bbc90d1a0cfc8e02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b088b5fbbf92711c43c44d59c50b568f0ae953278da9fe56bbc90d1a0cfc8e02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b088b5fbbf92711c43c44d59c50b568f0ae953278da9fe56bbc90d1a0cfc8e02?s=96&d=mm&r=g\",\"caption\":\"Simon Dickinson\"},\"sameAs\":[\"https:\\\/\\\/checkpointsystems.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Source Tagging made easy with Checkpoint - Checkpoint Systems Netherlands","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/","og_locale":"en_GB","og_type":"article","og_title":"Source Tagging made easy with Checkpoint - Checkpoint Systems Netherlands","og_description":"Tagging products with EAS security labels is proven to reduce [...]","og_url":"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/","og_site_name":"Checkpoint Systems Netherlands","article_published_time":"2021-05-11T12:41:11+00:00","article_modified_time":"2024-05-27T06:49:43+00:00","og_image":[{"width":746,"height":559,"url":"https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/Source-Tagging-Wine-Header.jpeg","type":"image\/jpeg"}],"author":"Simon Dickinson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Simon Dickinson","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/#article","isPartOf":{"@id":"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/"},"author":{"name":"Simon Dickinson","@id":"https:\/\/checkpointsystems.com\/nl\/#\/schema\/person\/7b47c53c3cd6aed4b251bf41087c7058"},"headline":"Source Tagging made easy with Checkpoint","datePublished":"2021-05-11T12:41:11+00:00","dateModified":"2024-05-27T06:49:43+00:00","mainEntityOfPage":{"@id":"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/"},"wordCount":985,"commentCount":0,"image":{"@id":"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/#primaryimage"},"thumbnailUrl":"https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/Source-Tagging-Wine-Header.jpeg","articleSection":["Blog","Label oplossingen"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/","url":"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/","name":"Source Tagging made easy with Checkpoint - Checkpoint Systems Netherlands","isPartOf":{"@id":"https:\/\/checkpointsystems.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/#primaryimage"},"image":{"@id":"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/#primaryimage"},"thumbnailUrl":"https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/Source-Tagging-Wine-Header.jpeg","datePublished":"2021-05-11T12:41:11+00:00","dateModified":"2024-05-27T06:49:43+00:00","author":{"@id":"https:\/\/checkpointsystems.com\/nl\/#\/schema\/person\/7b47c53c3cd6aed4b251bf41087c7058"},"breadcrumb":{"@id":"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/#primaryimage","url":"https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/Source-Tagging-Wine-Header.jpeg","contentUrl":"https:\/\/checkpointsystems.com\/nl\/wp-content\/uploads\/sites\/20\/Source-Tagging-Wine-Header.jpeg","width":746,"height":559},{"@type":"BreadcrumbList","@id":"https:\/\/checkpointsystems.com\/nl\/blog\/source-tagging-made-easy-with-checkpoint\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/checkpointsystems.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Source Tagging made easy with Checkpoint"}]},{"@type":"WebSite","@id":"https:\/\/checkpointsystems.com\/nl\/#website","url":"https:\/\/checkpointsystems.com\/nl\/","name":"Checkpoint Systems Netherlands","description":"RFID oplossingen voor uw toekomst","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/checkpointsystems.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/checkpointsystems.com\/nl\/#\/schema\/person\/7b47c53c3cd6aed4b251bf41087c7058","name":"Simon Dickinson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/b088b5fbbf92711c43c44d59c50b568f0ae953278da9fe56bbc90d1a0cfc8e02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b088b5fbbf92711c43c44d59c50b568f0ae953278da9fe56bbc90d1a0cfc8e02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b088b5fbbf92711c43c44d59c50b568f0ae953278da9fe56bbc90d1a0cfc8e02?s=96&d=mm&r=g","caption":"Simon Dickinson"},"sameAs":["https:\/\/checkpointsystems.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/checkpointsystems.com\/nl\/wp-json\/wp\/v2\/posts\/2030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/checkpointsystems.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/checkpointsystems.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/checkpointsystems.com\/nl\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/checkpointsystems.com\/nl\/wp-json\/wp\/v2\/comments?post=2030"}],"version-history":[{"count":0,"href":"https:\/\/checkpointsystems.com\/nl\/wp-json\/wp\/v2\/posts\/2030\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/checkpointsystems.com\/nl\/wp-json\/wp\/v2\/media\/2031"}],"wp:attachment":[{"href":"https:\/\/checkpointsystems.com\/nl\/wp-json\/wp\/v2\/media?parent=2030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/checkpointsystems.com\/nl\/wp-json\/wp\/v2\/categories?post=2030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/checkpointsystems.com\/nl\/wp-json\/wp\/v2\/tags?post=2030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}