RFID Field Guide: Deploying Radio Frequency Identification Systems

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

access

    control         history of

access. [See also security]accuracy

     antennae 2nd acquisition cost of tags. [See also cost-benefit analysis]

active tags. [See also tags]adapters

     Sun EPC Event Manager

adherence to standards (vendor comparison criteria) Administered Objectsadoption

     deployment frameworks 2nd

         build and deploy solutions 2nd 3rd

         business problem identification 2nd 3rd 4th

         defining and piloting solutions 2nd 3rd 4th         knowledge bases 2nd

         sustain and improve solutions 2nd

     project adoption curves 2nd 3rd Afghanistan, Operation Enduring Freedom/Operation Iraqi Freedom (OEF/OIF) case study 2nd 3rd 4th 5th

aggregation     3PL management

AIN (American Identification Numbering) system AIT (Automatic Identification Technologies)

alliances (vendor comparison criteria)

alternative tag designs 2nd

American Identification Numbering (AIN) system\

American National Standards Institute (ANSI)

analysis

     business plans

     cost-benefit 2nd 3rd

         antennae

         business process reengineering

         characterization of applications 2nd

         determinants of benefits 2nd

         elements of cost

         host applications

         host computers 2nd         installation         integration

         maintenance

         middleware         readers 2nd

         support

         tags

         types of benefits 2nd

     markets (service vendors)

    security

         distinguishing differences between privacy 2nd 3rd     stakeholders

ANSI (American National Standards Institute) antennae 2nd 3rd 4th

     cost-benefit analysis     packaging

anti-collision applications anti-counterfeiting measures

applications

     authentication. [See also security]     components         hosts 2nd

         middleware 2nd

         systems 2nd

     convenience

         payment and loyalty cards 2nd 3rd     cost-benefit analysis

     EPCglobal networks 2nd 3rd

     frequencies     host computers. [See also host computers]

     privacy 2nd 3rd 4th     process efficiency 2nd

         industrial automation         supply chain integration 2nd 3rd

         tracking/tracing 2nd 3rd

     safety

         environment sensing 2nd

         patient care

         people-monitoring 2nd

     security

         distinguishing differences between privacy 2nd 3rd

         documents 2nd

         EAS

         electronic drug pedigrees 2nd

         risk assessment

         risk assessment. [See also risk assessment]

         solutions 2nd 3rd 4th 5th

         vulnerability of components     Smart Shelves     technological advancements

         alternative tag designs 2nd

         architecture 2nd         business process innovations 2nd 3rd

         consumer application innovations 2nd

         legislation and standards 2nd

         packaging (tags)

         sensory tags 2nd

     vendors

architecture     business

     operational description of 2nd 3rd     Sun EPC network 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

     technical     technological advancements of 2nd

     vendor comaprison criteriaarhitecture

     organizational

assessment     vendors asset mangement

attachment

     tags

attcks. [See also security]

authentication 2nd     applications

         documents 2nd

         EAS         electronic drug pedigrees 2nd

authorization authorization. [See also security]

Auto-ID Center Auto-ID EPC deployment 2nd

Automatic Identification Technologies (AIT)

automation

     industrial

Категории