Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] case studies Inventory Tracking Pilot 2nd 3rd Michigan Department of Agriculture 2nd 3rd 4th Operation Enduring Freedom/Operation Iraqi Freedom (OEF/OIF) 2nd 3rd 4th 5th Smart and Secure Tradelanes (SST) 2nd 3rd 4th 5th Woolworths (reducing theft and shrinkage) 2nd 3rd case studies;Woolworths (reducing theft and shrinkage) categories of vendors 2nd 3rd certification service vendors characterization of applications, cost-benefit analysis 2nd China standardization initiatives Chip Multi-Threading (CMT) chipless tags chipless tags. [See also tags] circular reader antennae Client Runtime CMT (Chip Multi-Threading) Code Division Multiplex Access (CDMA) colleciton collisions anti-collision applications commands Kill 2nd commuication security solutions 2nd 3rd 4th 5th communication antennae 2nd limitation of 2nd organizational mobilization 2nd institutionlization of results and lessons 2nd leadership focus 2nd project adoption curves 2nd 3rd shared visions 2nd 3rd readers solutions vulnerabilties comparison criteria (vendor selection) 2nd competitive assessment, business problem identification components 2nd applications hosts 2nd middleware 2nd systems 2nd cost-benefit analysis. [See also cost-benefit analysis] costs Electronic Animal Identification (EID) EPCglobal networks 2nd 3rd frequencies hardware antennae 2nd host computers linitations of communication 2nd readers 2nd 3rd 4th 5th 6th tags 2nd 3rd 4th 5th 6th operational description of 2nd 3rd Sun EPC Event Manager Sun EPC Information Server vulnerabilities of componentsJava Enterprise System computer systems vendors confidential data, protection of. [See also security] configuration access vulnerabilties ConnectionFactory objects connections EDI EPCglobal networks 2nd 3rd development EPC implementation 2nd functions 2nd ISO standards 2nd standardization initiatives 2nd standards 2nd 3rd 4th 5th host computers readers defining operating frequencies consent (privacy) consumer applications innovations 2nd privacy risk assessment of consumer applications, [See also applications] consumer packaged goods (CPG) convenience applications payment and loyalty cards 2nd 3rd corrrection error cost-benefit analysis 2nd 3rd determinants of benefits 2nd elements of cost antennae business process reengineering characterization of applications 2nd host applications host computers installation integration maintenance middleware readers 2nd support tags tuning types of benefits 2nd costs tags counterfeiting electronic drug pedigrees coupling devices. [See also antennae] CPG (consumer packaged goods) crwod control currency document authentication customer references (vendor comparison criteria) |