Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] IAG (E-ZPass Interagency Group) IC (integrated circuit) vulnerabilities ID system identification cards, document authentication Identification Friend-or-Foe (IFF) system identity management IFF (Identification Friend-or-Foe) system implementation EPC 2nd of proprietary protocols (security) implications for suppliers (DoD mandates) implications for suppliers (Wal-Mart mandates) implications for vendors (Wal-Mart mandates) In-transit Visibility (ITV) Network industrial automation industry experience (vendor comparison criteria) injection of tags under skin installation cost-benefit analysis institutionlization of results and lessons 2nd integrated circuit (IC) vulnerabilities integration cost-benefit analysis loosely coupled organizational mobilization 2nd institutionlization of results and lessons 2nd leadership focus 2nd project adoption curves 2nd 3rd shared vision communications 2nd 3rd real-time data sharing supply chains 2nd 3rd tightly coupled vendors 2nd intellectual property rights (vendor comparison criteria) interfaces Java Naming and Directory Interface (JNDI) readers. [See also readers] interference 2nd International Organization for Standardization. [See ISO] interoperability EPCglobal networks 2nd 3rd standards 2nd EPC implementation 2nd EPCglobal networks 2nd 3rd 4th 5th interrogators interrogators. [See readers] intrusion detection inventory real-time management inventory control Inventory Tracking Pilot case study 2nd 3rd Iraq, Operation Enduring Freedom/Operation Iraqi Freedom (OEF/OIF) case study 2nd 3rd 4th 5th ISO EPCglobal networks 2nd ISO (International Organization for Standardization) IT outsourcing item-level tags ITV (In-transit Visibility) Network |