Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] P2P (Peer-to-Peer) programming techniques package deliveries, documenta authentication packaging tags 2nd partnerships (vendor comparison criteria) passive tags passive tags. [See also tags] passports, document authentication patient care payment cards 2nd 3rd Peer-to-Peer (P2P) programming techniques people-monitoring 2nd personal data, disclosure of 2nd phases build and deploy solutions 2nd 3rd business problem identification 2nd 3rd 4th defining and piloting solutions 2nd 3rd 4th knowledge bases 2nd sustain and improve 2nd Philips Semiconductors physical destruction of tags Physical Markup Language (PML) 2nd piloting solutions 2nd 3rd 4th placement of antennae 2nd PM-AIT (U.S. Army Program Manager-Automatic Identification Technology) PML (Physical Markup Language) 2nd policies privacy Policy Steering Committee (PSC) porcesses optimization premises, securing preparation costs of tags. [See also cost-benefit analysis] primary contractors. [See also vendors] privacy 2nd 3rd 4th distinguishing differences between security 2nd 3rd legislation process efficiency applications 2nd industrial automation supply chain integration 2nd 3rd tracking/tracing 2nd 3rd processes discovery organizational mobilization 2nd institutionlization of results and lessons 2nd leadership focus 2nd project adoption curves 2nd 3rd shared vision communications 2nd 3rd processing procurement product coed networks products optimization projects adoption curves 2nd 3rd Proof of Concept (PoC) proprietary protocol, implementation of security protocols implementation of proprietary (security) readers PSC (Policy Steering Committee) purpose of personal data disclosure |