Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] access control history of access. [See also security] accuracy antennae 2nd acquisition cost of tags. [See also cost-benefit analysis] active tags. [See also tags] adapters Sun EPC Event Manager adherence to standards (vendor comparison criteria) Administered Objects adoption deployment frameworks 2nd build and deploy solutions 2nd 3rd business problem identification 2nd 3rd 4th defining and piloting solutions 2nd 3rd 4th knowledge bases 2nd sustain and improve solutions 2nd project adoption curves 2nd 3rd Afghanistan, Operation Enduring Freedom/Operation Iraqi Freedom (OEF/OIF) case study 2nd 3rd 4th 5th aggregation 3PL management AIN (American Identification Numbering) system AIT (Automatic Identification Technologies) alliances (vendor comparison criteria) alternative tag designs 2nd American Identification Numbering (AIN) system\ American National Standards Institute (ANSI) analysis business plans cost-benefit 2nd 3rd antennae business process reengineering characterization of applications 2nd determinants of benefits 2nd elements of cost host applications host computers 2nd installation integration maintenance middleware readers 2nd support tags types of benefits 2nd markets (service vendors) security distinguishing differences between privacy 2nd 3rd stakeholders ANSI (American National Standards Institute) antennae 2nd 3rd 4th cost-benefit analysis packaging anti-collision applications anti-counterfeiting measures applications authentication. [See also security] components hosts 2nd middleware 2nd systems 2nd convenience payment and loyalty cards 2nd 3rd cost-benefit analysis EPCglobal networks 2nd 3rd frequencies host computers. [See also host computers] privacy 2nd 3rd 4th process efficiency 2nd industrial automation supply chain integration 2nd 3rd tracking/tracing 2nd 3rd safety environment sensing 2nd patient care people-monitoring 2nd security distinguishing differences between privacy 2nd 3rd documents 2nd EAS electronic drug pedigrees 2nd risk assessment risk assessment. [See also risk assessment] solutions 2nd 3rd 4th 5th vulnerability of components Smart Shelves technological advancements alternative tag designs 2nd architecture 2nd business process innovations 2nd 3rd consumer application innovations 2nd legislation and standards 2nd packaging (tags) sensory tags 2nd vendors architecture business operational description of 2nd 3rd Sun EPC network 2nd 3rd 4th 5th 6th 7th 8th 9th 10th technical technological advancements of 2nd vendor comaprison criteria arhitecture organizational assessment vendors asset mangement attachment tags attcks. [See also security] authentication 2nd applications documents 2nd EAS electronic drug pedigrees 2nd authorization authorization. [See also security] Auto-ID Center Auto-ID EPC deployment 2nd Automatic Identification Technologies (AIT) automation industrial |