RFID Field Guide: Deploying Radio Frequency Identification Systems

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

case studies

     Inventory Tracking Pilot 2nd 3rd     Michigan Department of Agriculture 2nd 3rd 4th

     Operation Enduring Freedom/Operation Iraqi Freedom (OEF/OIF) 2nd 3rd 4th 5th     Smart and Secure Tradelanes (SST) 2nd 3rd 4th 5th

     Woolworths (reducing theft and shrinkage) 2nd 3rd case studies;Woolworths (reducing theft and shrinkage)

categories     of vendors 2nd 3rd

certification

     service vendors characterization of applications, cost-benefit analysis 2ndChina

     standardization initiatives

Chip Multi-Threading (CMT)

chipless tags

chipless tags. [See also tags] circular reader antennae

Client Runtime

CMT (Chip Multi-Threading) Code Division Multiplex Access (CDMA)

collecitoncollisions

     anti-collision applicationscommands

     Kill 2nd

commuication

     security solutions 2nd 3rd 4th 5th

communication

     antennae 2nd

     limitation of 2nd

     organizational mobilization 2nd

         institutionlization of results and lessons 2nd

         leadership focus 2nd

         project adoption curves 2nd 3rd

         shared visions 2nd 3rd

     readers

     solutions

     vulnerabilties comparison criteria (vendor selection) 2nd competitive assessment, business problem identification

components 2nd

     applications         hosts 2nd

         middleware 2nd

         systems 2nd

     cost-benefit analysis. [See also cost-benefit analysis]

     costs

     Electronic Animal Identification (EID)

     EPCglobal networks 2nd 3rd     frequencies

     hardware         antennae 2nd

         host computers         linitations of communication 2nd

         readers 2nd 3rd 4th 5th 6th         tags 2nd 3rd 4th 5th 6th

     operational description of 2nd 3rd

     Sun EPC Event Manager     Sun EPC Information Server     vulnerabilities of

componentsJava Enterprise System

computer systems

     vendors

confidential data, protection of. [See also security]configuration

     access vulnerabilties

ConnectionFactory objectsconnections

     EDI     EPCglobal networks 2nd 3rd

         development         EPC implementation 2nd

         functions 2nd

         ISO standards 2nd

         standardization initiatives 2nd

         standards 2nd 3rd 4th 5th

     host computers

    readers

         defining operating frequencies

consent (privacy)

consumer applications

     innovations 2nd

     privacy

     risk assessment of

consumer applications, [See also applications]

consumer packaged goods (CPG) convenience applications     payment and loyalty cards 2nd 3rd

corrrection

     error cost-benefit analysis 2nd 3rd

     determinants of benefits 2nd

     elements of cost

         antennae

         business process reengineering

         characterization of applications 2nd

         host applications         host computers

         installation         integration

         maintenance         middleware

         readers 2nd         support

         tags

         tuning     types of benefits 2ndcosts

     tags

counterfeiting

     electronic drug pedigrees

coupling devices. [See also antennae] CPG (consumer packaged goods)

crwod control

currency     document authentication

customer references (vendor comparison criteria)

Категории