Blog: William McKnight Subscribe to this blog's RSS feed!

William McKnight

Hello and welcome to my blog!

I will periodically be sharing my thoughts and observations on information management here in the blog. I am passionate about the effective creation, management and distribution of information for the benefit of company goals, and I'm thrilled to be a part of my clients' growth plans and connect what the industry provides to those goals. I have played many roles, but the perspective I come from is benefit to the end client. I hope the entries can be of some modest benefit to that goal. Please share your thoughts and input to the topics.

About the author >

William is the president of McKnight Consulting Group, a firm focused on delivering business value and solving business challenges utilizing proven, streamlined approaches in data warehousing, master data management and business intelligence, all with a focus on data quality and scalable architectures. William functions as strategist, information architect and program manager for complex, high-volume, full life-cycle implementations worldwide. William is a Southwest Entrepreneur of the Year finalist, a frequent best-practices judge, has authored hundreds of articles and white papers, and given hundreds of international keynotes and public seminars. His team's implementations from both IT and consultant positions have won Best Practices awards. He is a former IT Vice President of a Fortune company, a former software engineer, and holds an MBA. William is author of the book 90 Days to Success in Consulting. Contact William at wmcknight@mcknightcg.com.

Editor's Note: More articles and resources are available in William's BeyeNETWORK Expert Channel. Be sure to visit today!

Recently in Tagging Things Category

Link.

Of all the RFID uses I've heard of, this one is the most unnerving because there's no clue who is behind it. And while chips in coins is seemingly ineffective given what we think we know about reader technology, it leaves open the possibility that there is stronger reader technology out there under the radar.

Then again, it was probably a targeted operation for the individuals given the coins, perhaps by a program accepting the short-term nature of the association of person and coin and perhaps simply for detecting if the individual passed a certain, specific reader. Of course, I'm wandering off into James Bond land here, but, given the cost and trouble to do the coin tagging and plant them, I suspect it was hopeful about something someone deemed important.

Technorati tags: RFID


Posted January 22, 2007 1:12 PM
Permalink | 1 Comment |

Throughout '06, I posted some interesting, and some of my favorite, uses of RFID. Here is an article which is titled "The best, worst... and craziest uses of RFID" that also outlines some of the more progressive uses of RFID throughout the world.

One example is "Marks and Spencer has long been associated with being at the forefront of flogging ladies' undies. It's also now at the forefront of item-level tagging, having chipped some of its men's clothes. The retailer has avoided questions of privacy protection by attaching the tag to a label on the suit that can be cut off."

I have posted this link, as well as many others I thought you may like to know about in the links section of my channel fyi.

Technorati tags: RFID


Posted January 4, 2007 1:37 PM
Permalink | No Comments |

Do you have a problem with the RFID tags in your credit card? Many do and, as a result, some have decided to shield their cards from readers so they are not targets of the new breed of stealth cross-marketing. I blogged previously about the "Hello Kitty" shield in my industry update. Here's another shield blocker. This one is transparent.

According to the company, "The RFID Shield consists of a plastic credit card with a metal side and the plastic sleeve. The metal in the card serves to block the RF transmission from any RFID reader. The plastic sleeve keeps the RFID Shield and your credit card (or ID card) together. When the 2 cards are physically near each other, the RFID tag will not be able to receive RF transmissions so your RFID tagged data will not be transmitted.

The beauty of the RFID Shield is that it's simple and protects your information."

Technorati Tags: RFID, RFID tag, tag blocking


Posted November 6, 2006 9:28 AM
Permalink | No Comments |

On the lighter side of RFID comes this story of a different type of RFID chip implant. A dog, George, ate the chip which had to be in vicinity of the owner’s car to get it started. I am getting a Prius which has a similar “smart key” RFID entry. I will make sure a dog doesn’t eat my chip.

The poop scooping for George will involve more than turning a bag inside out until the chip is found. If there’s ever a time to over-feed George, it may be now.


Posted September 29, 2006 1:44 PM
Permalink | No Comments |

Thanks to Craig Mullin's blog, I learned that yet another computer has gone missing from the Veterans Administration. Embarrassing and dangerous asset losses such as this could be prevented. For a video on how, click on the graphic at http://www.axcessinc.com/. Companies and agencies with sensitive information likely to be on computers and latops need automated protection of those assets.

The pharmaceutical industry is tracking its sensitive assets - the drugs themselves. The FDA has a December deadline for pedigree tracking all the way from manufacture to consumer sale. The technology component of the solution is the same as for asset protection - RFID.


Posted August 9, 2006 10:13 AM
Permalink | No Comments |
PREV 1 2 3

   VISIT MY EXPERT CHANNEL

Search this blog
Categories ›
Archives ›
Recent Entries ›