A


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

access
    control
         history of
access. [See also security]
accuracy
     antennae 2nd
acquisition cost of tags. [See also cost-benefit analysis]
active tags. [See also tags]
adapters
     Sun EPC Event Manager
adherence to standards (vendor comparison criteria)
Administered Objects
adoption
     deployment frameworks 2nd
         build and deploy solutions 2nd 3rd
         business problem identification 2nd 3rd 4th
         defining and piloting solutions 2nd 3rd 4th
         knowledge bases 2nd
         sustain and improve solutions 2nd
     project adoption curves 2nd 3rd
Afghanistan, Operation Enduring Freedom/Operation Iraqi Freedom (OEF/OIF) case study 2nd 3rd 4th 5th
aggregation
     3PL management
AIN (American Identification Numbering) system
AIT (Automatic Identification Technologies)
alliances (vendor comparison criteria)
alternative tag designs 2nd
American Identification Numbering (AIN) system\
American National Standards Institute (ANSI)
analysis
     business plans
     cost-benefit 2nd 3rd
         antennae
         business process reengineering
         characterization of applications 2nd
         determinants of benefits 2nd
         elements of cost
         host applications
         host computers 2nd
         installation
         integration
         maintenance
         middleware
         readers 2nd
         support
         tags
         types of benefits 2nd
     markets (service vendors)
    security
         distinguishing differences between privacy 2nd 3rd
     stakeholders
ANSI (American National Standards Institute)
antennae 2nd 3rd 4th
     cost-benefit analysis
     packaging
anti-collision applications
anti-counterfeiting measures
applications
     authentication. [See also security]
     components
         hosts 2nd
         middleware 2nd
         systems 2nd
     convenience
         payment and loyalty cards 2nd 3rd
     cost-benefit analysis
     EPCglobal networks 2nd 3rd
     frequencies
     host computers. [See also host computers]
     privacy 2nd 3rd 4th
     process efficiency 2nd
         industrial automation
         supply chain integration 2nd 3rd
         tracking/tracing 2nd 3rd
     safety
         environment sensing 2nd
         patient care
         people-monitoring 2nd
     security
         distinguishing differences between privacy 2nd 3rd
         documents 2nd
         EAS
         electronic drug pedigrees 2nd
         risk assessment
         risk assessment. [See also risk assessment]
         solutions 2nd 3rd 4th 5th
         vulnerability of components
     Smart Shelves
     technological advancements
         alternative tag designs 2nd
         architecture 2nd
         business process innovations 2nd 3rd
         consumer application innovations 2nd
         legislation and standards 2nd
         packaging (tags)
         sensory tags 2nd
     vendors
architecture
     business
     operational description of 2nd 3rd
     Sun EPC network 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
     technical
     technological advancements of 2nd
     vendor comaprison criteria
arhitecture
     organizational
assessment
     vendors
asset mangement
attachment
     tags
attcks. [See also security]
authentication 2nd
     applications
         documents 2nd
         EAS
         electronic drug pedigrees 2nd
authorization
authorization. [See also security]
Auto-ID Center
Auto-ID EPC deployment 2nd
Automatic Identification Technologies (AIT)
automation
     industrial



RFID Field Guide(c) Deploying Radio Frequency Identification Systems
RFID Field Guide: Deploying Radio Frequency Identification Systems
ISBN: 0131853554
EAN: 2147483647
Year: 2006
Pages: 112

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net