| | | Copyright |
| | | About the Authors |
| | | Preface |
| | | Part I: What Is RFID? |
| | | | Chapter 1. A Better Way of Doing Things |
| | | | Security and Authentication |
| | | | Safety |
| | | | Convenience |
| | | | Process Efficiency |
| | | | Summary |
| | | | Chapter 2. The History and Evolution of RFID |
| | | | RFID Technology and the Radio |
| | | | The Early Days of RFID |
| | | | From Detection to Unique Identification |
| | | | RFID Flourishes Across the Globe |
| | | | Summary |
| | | | Chapter 3. Components of RFID Systems |
| | | | Operational Description of RFID Systems |
| | | | Hardware Components |
| | | | Software Components |
| | | | The EPCglobal Network |
| | | | Summary |
| | | Part II: How to Deploy RFID |
| | | | Chapter 4. Standards Related to RFID |
| | | | Role of Standards in Technology Advancement and Adoption |
| | | | Standards and RFIDAn Overview of EPCglobal |
| | | | ISO and RFID Standards |
| | | | Other Standardization Initiatives |
| | | | Recommendations for the Practitioner |
| | | | Summary |
| | | | Chapter 5. Framework for Deployment |
| | | | Introducing RFID Deployment Framework |
| | | | Identify Business Problem |
| | | | Define and Pilot Solution |
| | | | Build and Deploy Solution |
| | | | Sustain and Improve |
| | | | Knowledge Base |
| | | | Summary |
| | | | Chapter 6. Organizational Mobilization |
| | | | Achieving Organizational Mobilization |
| | | | Provide Leadership Focus |
| | | | Communicate Shared Vision |
| | | | Engage Support and Resistance |
| | | | Institutionalize Results and Lessons |
| | | | Summary |
| | | | Chapter 7. Cost-Benefit Analysis |
| | | | Analyzing Benefits |
| | | | Elements of Cost |
| | | | Cost-Benefit Characterization of Selected Applications |
| | | | Summary |
| | | | Chapter 8. Vendor Considerations and Landscape |
| | | | Vendor Selection Approach |
| | | | Vendor Comparison Criteria |
| | | | Vendor Categories |
| | | | Vendor Guide |
| | | | Summary |
| | | Part III: The Path Ahead |
| | | | Chapter 9. Mandates As Business Catalysts |
| | | | Wal-Mart and RFID |
| | | | U.S. Department of Defense and RFID |
| | | | Recommendations for Suppliers of Wal-Mart, Other Retailers, and the DoD |
| | | | RFID Initiatives at Other Organizations |
| | | | Summary |
| | | | Chapter 10. Security and Privacy |
| | | | Distinguishing Between Security and Privacy Issues |
| | | | Security Challenges |
| | | | Privacy Considerations |
| | | | Summary |
| | | | Chapter 11. Emerging Trends in RFID |
| | | | Technological Advancements |
| | | | Business Process Innovations |
| | | | Evolving Standards and Legislation |
| | | | Consumer Application Innovations |
| | | | Summary |
| | | Appendix A |
| | | | Case Study: Michigan Department of Agriculture |
| | | | Case Study: Sun Microsystems |
| | | | Case Study: Operation Enduring Freedom / Operation Iraqi Freedom (OEF/OIF) |
| | | | Case Study: Woolworths, Plc. |
| | | | Case Study: Smart & Secure TradelanesPhase One Review |
| | | Appendix B |
| | | | The Sun EPCglobal Network Architecture |
| | | References and Recommended Reading |
| | | Index |