Nevertheless, most suppliers were ready to beat the January 1 2005 deadline while others were in the pilot study stages (RFID). For Wal-Mart however, deployment was slow due to the overwhelming data available for the firm. This overwhelming data was a result of failure to adopt an incremental approach in the deployment of RFID. In comparison, METRO Group, Nestle, and Albertsons each used an incremental approach and effectively succeeded in deploying the technology (RFID). RFID deployment ensures a higher profit margin for a business. However, firms should use three critical areas to gauge the effectiveness of the technology. The first area is the maturity of the organization using the Capability Maturity Model. Secondly, organizations should gauge the effectiveness of investing in RFID by a better inventory management and control. Finally, another area to gauge the investment is by gauging the effectiveness of the automated method in manufacture of the passive tags (RFID). The U.S. DoD implemented the RFID technology in 2003. Importantly, DoD’s suppliers use either the passive program or the active RFID program. In this regard, this technology helps the DoD monitor the flow of supply along the frontlines. In addition, the technology is crucial to reduce losses and misplacement of its supplies. Finally, the technology is crucial in enabling a constantly moving force replenish its stocks through a better system of inventory (RFID). 2.1.2 RFID Technology: Basics, Advantages, and Disadvantages The passive RFID market is growing at a faster rate in comparison to the active RFID markets since the products are smaller and easier to use. In effect, their small size ensures small data storage capacity in comparison to the active RFID products that allows multiple files stored in the database. Consequently, active RFID products have a quick transfer rate of data in comparison to passive RFID products. However, both products are easily mounted on a plane surface and are flexible enough (RFID). Programming RFID tags enhances security levels on who can read what part of the data. On the other hand, the level of programming is useful to allow only a few people gain the access to the operation and handle the RFID tags since the power to the chip has to meet a certain threshold for operation to take place. However, there is a limitation in the level of programming. In this regard, effective programming requires connection to a network (RFID). In addition, some tags have security features that act as anti-theft deterrents. The battery power capabilities vary in different RFID tags. On one hand, active tags draw their power from readers with a ten-year limit of battery life while passive tags have no battery power. On the other hand, semi-active tags, also known as semi-passive tags, have flexible and low-cost battery used to run the chip’s circuitry. However, unlike the active tags, they do not boost the radio frequency range though they offer a better range in comparison to the passive tags. The failures in battery have been crucial in slowing the growth of active RFID tags.