Counterfeit parts have proliferated dramatically in recent years, presenting huge challenges for electronics manufacturing and specifically military and aerospace application. This session will offer unique new market trends, observations, and best practices on the issue of economics, semiconductor value chains, obsolescence, counterfeit electronics, and market impacts such as fact-based insight into market indicators like correlation among counterfeits, semiconductor factory utilization, component obsolescence, semiconductor availability, price volatility, and supply-and-demand equilibrium.
The document provides details on two surveys conducted in May 2020 regarding public opinion in the US on issues related to the COVID-19 pandemic.
The first survey was conducted from May 12-14 and included 1,012 respondents. The second survey was conducted from March 25-30 and included 1,209 respondents. Both surveys were weighted to represent the overall US population.
The document then summarizes some of the key findings from the surveys, which include a strong desire to bring more manufacturing to the US from other countries, a focus on supply chain issues, and a desire for more government scrutiny of large corporate mergers. It also discusses changing perceptions of different industries and how companies have responded to the pandemic.
The economic impact of cybercrime and cyber espionageBee_Ware
The document discusses estimating the economic costs of cybercrime and cyber espionage. It identifies six components that contribute to these costs: loss of intellectual property, direct financial losses from cybercrime, loss of sensitive business information, opportunity costs from disruptions and security spending, reputational damage, and additional costs of securing networks and recovering from attacks. Previous estimates of total annual global losses vary widely from billions to hundreds of billions due to data limitations. The document attempts to break down cost components and uses analogies to other crimes to estimate a range of probable total global costs in the hundreds of billions of dollars annually, which would be a fraction of a percent of global GDP. It emphasizes further analysis is needed on the full effects on trade,
The Emerging Cobalt Challenge - RCS briefing paperRCS Global
The next few years will see worldwide consumption of cobalt rise signifcantly as nascent demand from the electric vehicle market comes on line. For both electric vehicle and tech manufacturers, cobalt forms an essential ingredient of the ubiquitous lithium-ion battery in cars, mobiles and computers.
But there is a catch. While demand is rising, the worldwide supply and future reserves of cobalt are increasingly concentrated into one major market: the Democratic Republic of Congo (DRC).
This market produces 60% of the world’s cobalt supply, but suffers from crumbling infrastructure and signifcant human rights challenges. These challenges are increasingly putting companies in the cobalt supply chain under scrutiny from
campaigners, regulators and the media. It is within this context that companies must now secure their supply chains of cobalt-based, lithiumion batteries. Simply put, the battery technology
which is central to the imminent large-scale commercialisation of the electric vehicle industry and the revolution in consumer technology is dependent on Congolese supply to meet demand.
This briefing paper, derived from RCS Global’s own recent research on Congolese cobalt supply chains, aims to:
• Provide insight on the risks associated with
DRC production that represents approximately
60% of global cobalt output and half the world’s
known reserves;
• Unpack the associated regulatory challenges
linked to DRC cobalt;
• Provide a road map for companies seeking to
mitigate their risk exposure.
Texas Instruments’ Acquisition of National SemiconductorKaran Jaidka
The document discusses Texas Instruments' acquisition of National Semiconductor in 2011. It provides background on the two companies, analyzes the analog industry and rationale for the deal. The transaction details included TI paying a 78% premium to acquire NSM for $6.5 billion. Valuation using relative multiples and DCF supported the price. Significant synergies from the combination were expected in revenues, margins, products, customers, and costs. The integration aimed to benefit from NSM's analog strengths and TI's large sales network.
- Texas Instruments (TI) is a global leader in semiconductor manufacturing and relies heavily on sales of semiconductors.
- TI uses both original equipment manufacturers and electronics distributors as channels to sell semiconductors. Distributors faced increased buying power from consolidation in the distribution industry.
- Distributors pushed for standardized global pricing of semiconductors to simplify forecasting and lower costs, but manufacturers faced differing production costs between regions.
The range of exposures facing directors and officers (D&Os) – as well as the resultant claims scenarios – have increased significantly in recent years.
With corporate management under the spotlight like never before, Allianz Global Corporate & Specialty (AGCS) experts provide both a reflection of the current state of the D&O insurance market and also point the lens forward to five mega trends which lie ahead, impacting risk managers, their D&Os and their broker partners.
- The motor insurance industry is undergoing significant upheaval due to changes in regulation, economic conditions, technology, and customer behavior.
- Regulation like Solvency II has increased complexity for insurers while unintended consequences of other regulations have increased costs.
- Economic uncertainty and a slow recovery has led insurers to be risk averse and delay investments in innovation.
- Market competition is increasing as new digital entrants may disrupt the industry and consolidate auto repair shops are changing insurer-repairer relationships.
- Insurers face challenges from legacy IT systems that inhibit their ability to respond to changes and compete with new digital competitors.
The document provides details on two surveys conducted in May 2020 regarding public opinion in the US on issues related to the COVID-19 pandemic.
The first survey was conducted from May 12-14 and included 1,012 respondents. The second survey was conducted from March 25-30 and included 1,209 respondents. Both surveys were weighted to represent the overall US population.
The document then summarizes some of the key findings from the surveys, which include a strong desire to bring more manufacturing to the US from other countries, a focus on supply chain issues, and a desire for more government scrutiny of large corporate mergers. It also discusses changing perceptions of different industries and how companies have responded to the pandemic.
The economic impact of cybercrime and cyber espionageBee_Ware
The document discusses estimating the economic costs of cybercrime and cyber espionage. It identifies six components that contribute to these costs: loss of intellectual property, direct financial losses from cybercrime, loss of sensitive business information, opportunity costs from disruptions and security spending, reputational damage, and additional costs of securing networks and recovering from attacks. Previous estimates of total annual global losses vary widely from billions to hundreds of billions due to data limitations. The document attempts to break down cost components and uses analogies to other crimes to estimate a range of probable total global costs in the hundreds of billions of dollars annually, which would be a fraction of a percent of global GDP. It emphasizes further analysis is needed on the full effects on trade,
The Emerging Cobalt Challenge - RCS briefing paperRCS Global
The next few years will see worldwide consumption of cobalt rise signifcantly as nascent demand from the electric vehicle market comes on line. For both electric vehicle and tech manufacturers, cobalt forms an essential ingredient of the ubiquitous lithium-ion battery in cars, mobiles and computers.
But there is a catch. While demand is rising, the worldwide supply and future reserves of cobalt are increasingly concentrated into one major market: the Democratic Republic of Congo (DRC).
This market produces 60% of the world’s cobalt supply, but suffers from crumbling infrastructure and signifcant human rights challenges. These challenges are increasingly putting companies in the cobalt supply chain under scrutiny from
campaigners, regulators and the media. It is within this context that companies must now secure their supply chains of cobalt-based, lithiumion batteries. Simply put, the battery technology
which is central to the imminent large-scale commercialisation of the electric vehicle industry and the revolution in consumer technology is dependent on Congolese supply to meet demand.
This briefing paper, derived from RCS Global’s own recent research on Congolese cobalt supply chains, aims to:
• Provide insight on the risks associated with
DRC production that represents approximately
60% of global cobalt output and half the world’s
known reserves;
• Unpack the associated regulatory challenges
linked to DRC cobalt;
• Provide a road map for companies seeking to
mitigate their risk exposure.
Texas Instruments’ Acquisition of National SemiconductorKaran Jaidka
The document discusses Texas Instruments' acquisition of National Semiconductor in 2011. It provides background on the two companies, analyzes the analog industry and rationale for the deal. The transaction details included TI paying a 78% premium to acquire NSM for $6.5 billion. Valuation using relative multiples and DCF supported the price. Significant synergies from the combination were expected in revenues, margins, products, customers, and costs. The integration aimed to benefit from NSM's analog strengths and TI's large sales network.
- Texas Instruments (TI) is a global leader in semiconductor manufacturing and relies heavily on sales of semiconductors.
- TI uses both original equipment manufacturers and electronics distributors as channels to sell semiconductors. Distributors faced increased buying power from consolidation in the distribution industry.
- Distributors pushed for standardized global pricing of semiconductors to simplify forecasting and lower costs, but manufacturers faced differing production costs between regions.
The range of exposures facing directors and officers (D&Os) – as well as the resultant claims scenarios – have increased significantly in recent years.
With corporate management under the spotlight like never before, Allianz Global Corporate & Specialty (AGCS) experts provide both a reflection of the current state of the D&O insurance market and also point the lens forward to five mega trends which lie ahead, impacting risk managers, their D&Os and their broker partners.
- The motor insurance industry is undergoing significant upheaval due to changes in regulation, economic conditions, technology, and customer behavior.
- Regulation like Solvency II has increased complexity for insurers while unintended consequences of other regulations have increased costs.
- Economic uncertainty and a slow recovery has led insurers to be risk averse and delay investments in innovation.
- Market competition is increasing as new digital entrants may disrupt the industry and consolidate auto repair shops are changing insurer-repairer relationships.
- Insurers face challenges from legacy IT systems that inhibit their ability to respond to changes and compete with new digital competitors.
A talk I gave at the Science Communication Conference 2011. For more information see the blog post at http://marthasadie.wordpress.com/2011/05/25/gaming-science-scientific-games-my-scc2011-talk-scc2011/
The document provides information about Starwood Hotels & Resorts locations in Austria, Hungary, Czech Republic, and Slovakia. It summarizes key details about Vienna, Salzburg, Budapest, Prague, and Bratislava, including locations, attractions, and featured Starwood properties in each city. Photos and descriptions of Hotel Imperial, Hotel Bristol, Le Meridien Wien in Vienna and properties in other cities like Hotel Goldener Hirsch and Sheraton Salzburg in Salzburg are given.
This short document contains quotes from four individuals about creativity, with Albert Szent-Györgyi stating that discovery involves seeing what is obvious but thinking differently about it, Paul Palnik asserting that creativity continuously reinvents itself, Thomas Disch describing creativity as seeing connections where there are none, and Julia Cameron claiming creativity originates from a place of obscurity like human life.
Playful Learning : how to turn any IP into a successful educational app or gameMartha Henson
Slides from the Playful Learning workshop on creating good educational games from existing IP at the Children's Media Conference 2014. By Martha Henson and Kirsten Campbell-Howes of #LEGup and edugameshub.com.
More details http://www.thechildrensmediaconference.com/sessions/wednesday-workshop-playful-learning. Write up http://www.thechildrensmediaconference.com/blog/2014/07/03/wednesday-workshop-playful-learning-report/.
Creating compelling museum games (We Are Museums 2016)Martha Henson
The document discusses challenges with museum games and provides guidance on effective game design. It notes that museum games often fail due to lack of games expertise, small budgets, and poor understanding of audiences. It emphasizes the importance of a clear objectives-driven design process that incorporates iterative testing and allows flexibility. A good game is defined as having compelling mechanics, balanced challenge, satisfying experience, and optional extrinsic motivation. The key to good educational games is identifying learning objectives first and designing mechanics to meet those, then prototyping and revising based on testing before finalizing.
How we got millions of people to play our games and learn stuff (Digital Shor...Martha Henson
Wellcome Collection is a free visitor destination in London that explores connections between medicine, life, and art. To reach new audiences, they collaborated with game developers to create educational games based on their collections and knowledge. Their most popular game, High Tea, has been played over 3 million times and stimulated discussion both in-game and online about the 19th century opium trade. Their game Axon on neurons and the brain has also seen almost 4 million plays while effectively teaching players about the subject matter. Through games, Wellcome Collection has been able to engage millions of new people with their content in an enjoyable way.
Counterfeiting is not a new term for electronic industry as counterfeit electrical and electronic products now occupy second place after pharmaceuticals estimated to range anywhere between US$11 billion to $20 billion worldwide
every year. However, counterfeit electronic parts have been much in the public eye in recent weeks. On March 28, 2014 one of Indian Air Force Aircraft (C-130J Super
Hercules) crashed near Gwalior city killing five crew members. There were controversial news reported
in media about the counterfeit electronics being the reason for C-130J air crash. Over the past several years the electronics industry has seen a marked increase in the
availability of counterfeit electronic components. Counterfeiters have attacked every commodity of electronics, from simple components such as capacitors,
to complex integrated circuits such as microprocessors. In expensive commercial devices, as well as high cost military components, have seen counterfeiting on the rise. This article highlights the serious risk, its impact and the possible proactive steps that can be taken to curb this menace.
Beware! Counterfeit Components Put Safety and Security at RiskDaren Saroop
The counterfeiting market has grown out of control and infiltrated all areas including the electronic components industry. This White Paper will unveil the risks involved and the financial and economic implications.
Counterfeit components and the risks involvedDorine Vidal
The counterfeiting market has grown out of control and infiltrated all areas including the electronic components industry. This White Paper will unveil the risks involved and the financial and economic implications.
Counterfeit parts prevention kristal snider and kevin beardKristal Snider
The document discusses counterfeit parts prevention and the role of industry standards like AS9100 and AS5553. It provides an overview of the counterfeit parts problem, how they enter the supply chain, their impact, and industry efforts to address it. Key points discussed include the definition of counterfeit parts, their origins in the e-waste industry in China, methods of entry into the supply chain, effects on the military, and the role of organizations like G-19 and standards like AS5553 in preventing counterfeits. It also examines how counterfeit part prevention can be audited under the AS9100 quality standard.
The document discusses observations from experiences detecting counterfeit electronic components. It finds that industry inspection methods are designed to verify authentic parts, not detect counterfeits. Many counterfeit cases trace back to sources in China through independent distributors. Effective detection requires visual, documentation, and electrical testing methods tailored to uncover various counterfeiting techniques like remarking, refurbishing, and bogus documentation. Authentic parts may show signs of prior testing or poor storage, so additional validation is needed to ensure reliability.
Mitigating the Risk of Counterfeit ICT in the DoD Supply ChainKyrl Erickson
This document discusses the risks of counterfeit information and communication technology entering the Department of Defense supply chain. It notes that globalization has increased risks by making supply chains more complex and less visible. Counterfeit ICT poses national security risks as it can contain malicious code or hardware vulnerabilities. The document recommends that the government and industry collaborate to develop standards for information sharing and supplier monitoring throughout the entire lifecycle of ICT systems, from acquisition to maintenance, to improve visibility and mitigate risks of counterfeits entering the supply chain. It also calls for standards in counterfeit detection methods and avoidance techniques.
First whitepaper on the application of GS1 global standards as foundational layers in the fight against counterfeiting. Document was published in February 2013 by GS1 Global Office.
Content coordinator/editor/technical writer/author: John G. Keogh
ELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense ElectronicsSVCAVET
WHERE Globalization started:
National Defense University, The Industrial College of the Armed Forces, Washington, DC, 20319
ABSTRACT: The commercial semiconductor industry is characterized by fierce competition, large fluctuations in demand, increasing performance, and falling prices. Defense electronics has become a miniscule part of the semiconductor industry (less than 1%), but is essential to national security. However, U.S. commercial and defense semiconductor production is losing ground. The industry faces a number of challenges, including: rising capital costs, rapidly evolving technology, future workforce shortages, increasing offshore design and production, infringement of intellectual property rights, and ineffective export controls that hinder U.S. global competitiveness.
++ Globalization and the rise of the Asia-Pacific region
CONCLUSIONS:
The semiconductor industry and the defense electronics industry are inextricably linked. Every new weapons system in production will rely on semiconductors as its core component. A healthy, robust, and leading edge semiconductor industry is essential for defense needs and indeed for all elements of national security. Several broad conclusions can be drawn from our study.
• There is growing concern regarding the offshore flight of intellectual capital and semiconductor production facilities. Some argue that the ability of the U.S. to maintain access to cutting-edge technology will be adversely affected. The decline of technical talent among U.S. students contributes to these concerns.
The Threat of Counterfeit Devices: Complicity vs VigilanceWaqas Tariq
Challenges that arise as a result of high mobile phone penetration in developing countries such as counterfeiting and increasing product complexity, have largely been tackled from the supply side. This study explores this issue from the demand side by investigating the relationship between socio-demographic characteristics and levels of Intellectual property vigilance as well as brand and quality awareness among urban mobile technology consumers in Botswana. Implications for both corporate and public policy are discussed at the end of this paper.
The document summarizes a report on the smart grid and consumers. It finds that while the smart grid aims to establish two-way communication between utilities and consumers, consumer applications have lagged behind. Early smart meter rollouts faced consumer resistance over costs and privacy issues. Surveys show consumers are open to energy management technologies but unwilling to pay much for them. The market for smart grid consumer applications is projected to grow to over $70 billion globally by 2014, but this depends on overcoming challenges in consumer acceptance and engagement.
Aon Retail & Wholesale Inperspective Nov 2016Graeme Cross
A rapidly shifting social, business, political and economic environment is placing UK retailers on continuous watch as they adapt and react to new threats and challenges.
Historic risk management norms like crime and security are giving way to external threats in the registers of modern companies; but many of these are intangible such as protecting brand equity and are often considered very hard to measure or mitigate.
Meanwhile the increasing influence of technology affects almost every corner of the industry from distribution and the way shoppers interact with a brand; to the supply chain and its continuing search for peak efficiency.
As a result, technology, rather than store networks or stock, is becoming one of the single greatest assets and vulnerabilities identified by the industry’s risk management community.
Global teleprotection market insights, forecast to 2025Bertha000
The Global Teleprotection Market Report 2019 Gives A Holistic View Encompassing Production, Consumption, Import And Export For Key Regions And Countries. The Study Includes The Profiles Of Key Players In The Market With A Significant Global Presence In Coming Years.
A talk I gave at the Science Communication Conference 2011. For more information see the blog post at http://marthasadie.wordpress.com/2011/05/25/gaming-science-scientific-games-my-scc2011-talk-scc2011/
The document provides information about Starwood Hotels & Resorts locations in Austria, Hungary, Czech Republic, and Slovakia. It summarizes key details about Vienna, Salzburg, Budapest, Prague, and Bratislava, including locations, attractions, and featured Starwood properties in each city. Photos and descriptions of Hotel Imperial, Hotel Bristol, Le Meridien Wien in Vienna and properties in other cities like Hotel Goldener Hirsch and Sheraton Salzburg in Salzburg are given.
This short document contains quotes from four individuals about creativity, with Albert Szent-Györgyi stating that discovery involves seeing what is obvious but thinking differently about it, Paul Palnik asserting that creativity continuously reinvents itself, Thomas Disch describing creativity as seeing connections where there are none, and Julia Cameron claiming creativity originates from a place of obscurity like human life.
Playful Learning : how to turn any IP into a successful educational app or gameMartha Henson
Slides from the Playful Learning workshop on creating good educational games from existing IP at the Children's Media Conference 2014. By Martha Henson and Kirsten Campbell-Howes of #LEGup and edugameshub.com.
More details http://www.thechildrensmediaconference.com/sessions/wednesday-workshop-playful-learning. Write up http://www.thechildrensmediaconference.com/blog/2014/07/03/wednesday-workshop-playful-learning-report/.
Creating compelling museum games (We Are Museums 2016)Martha Henson
The document discusses challenges with museum games and provides guidance on effective game design. It notes that museum games often fail due to lack of games expertise, small budgets, and poor understanding of audiences. It emphasizes the importance of a clear objectives-driven design process that incorporates iterative testing and allows flexibility. A good game is defined as having compelling mechanics, balanced challenge, satisfying experience, and optional extrinsic motivation. The key to good educational games is identifying learning objectives first and designing mechanics to meet those, then prototyping and revising based on testing before finalizing.
How we got millions of people to play our games and learn stuff (Digital Shor...Martha Henson
Wellcome Collection is a free visitor destination in London that explores connections between medicine, life, and art. To reach new audiences, they collaborated with game developers to create educational games based on their collections and knowledge. Their most popular game, High Tea, has been played over 3 million times and stimulated discussion both in-game and online about the 19th century opium trade. Their game Axon on neurons and the brain has also seen almost 4 million plays while effectively teaching players about the subject matter. Through games, Wellcome Collection has been able to engage millions of new people with their content in an enjoyable way.
Counterfeiting is not a new term for electronic industry as counterfeit electrical and electronic products now occupy second place after pharmaceuticals estimated to range anywhere between US$11 billion to $20 billion worldwide
every year. However, counterfeit electronic parts have been much in the public eye in recent weeks. On March 28, 2014 one of Indian Air Force Aircraft (C-130J Super
Hercules) crashed near Gwalior city killing five crew members. There were controversial news reported
in media about the counterfeit electronics being the reason for C-130J air crash. Over the past several years the electronics industry has seen a marked increase in the
availability of counterfeit electronic components. Counterfeiters have attacked every commodity of electronics, from simple components such as capacitors,
to complex integrated circuits such as microprocessors. In expensive commercial devices, as well as high cost military components, have seen counterfeiting on the rise. This article highlights the serious risk, its impact and the possible proactive steps that can be taken to curb this menace.
Beware! Counterfeit Components Put Safety and Security at RiskDaren Saroop
The counterfeiting market has grown out of control and infiltrated all areas including the electronic components industry. This White Paper will unveil the risks involved and the financial and economic implications.
Counterfeit components and the risks involvedDorine Vidal
The counterfeiting market has grown out of control and infiltrated all areas including the electronic components industry. This White Paper will unveil the risks involved and the financial and economic implications.
Counterfeit parts prevention kristal snider and kevin beardKristal Snider
The document discusses counterfeit parts prevention and the role of industry standards like AS9100 and AS5553. It provides an overview of the counterfeit parts problem, how they enter the supply chain, their impact, and industry efforts to address it. Key points discussed include the definition of counterfeit parts, their origins in the e-waste industry in China, methods of entry into the supply chain, effects on the military, and the role of organizations like G-19 and standards like AS5553 in preventing counterfeits. It also examines how counterfeit part prevention can be audited under the AS9100 quality standard.
The document discusses observations from experiences detecting counterfeit electronic components. It finds that industry inspection methods are designed to verify authentic parts, not detect counterfeits. Many counterfeit cases trace back to sources in China through independent distributors. Effective detection requires visual, documentation, and electrical testing methods tailored to uncover various counterfeiting techniques like remarking, refurbishing, and bogus documentation. Authentic parts may show signs of prior testing or poor storage, so additional validation is needed to ensure reliability.
Mitigating the Risk of Counterfeit ICT in the DoD Supply ChainKyrl Erickson
This document discusses the risks of counterfeit information and communication technology entering the Department of Defense supply chain. It notes that globalization has increased risks by making supply chains more complex and less visible. Counterfeit ICT poses national security risks as it can contain malicious code or hardware vulnerabilities. The document recommends that the government and industry collaborate to develop standards for information sharing and supplier monitoring throughout the entire lifecycle of ICT systems, from acquisition to maintenance, to improve visibility and mitigate risks of counterfeits entering the supply chain. It also calls for standards in counterfeit detection methods and avoidance techniques.
First whitepaper on the application of GS1 global standards as foundational layers in the fight against counterfeiting. Document was published in February 2013 by GS1 Global Office.
Content coordinator/editor/technical writer/author: John G. Keogh
ELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense ElectronicsSVCAVET
WHERE Globalization started:
National Defense University, The Industrial College of the Armed Forces, Washington, DC, 20319
ABSTRACT: The commercial semiconductor industry is characterized by fierce competition, large fluctuations in demand, increasing performance, and falling prices. Defense electronics has become a miniscule part of the semiconductor industry (less than 1%), but is essential to national security. However, U.S. commercial and defense semiconductor production is losing ground. The industry faces a number of challenges, including: rising capital costs, rapidly evolving technology, future workforce shortages, increasing offshore design and production, infringement of intellectual property rights, and ineffective export controls that hinder U.S. global competitiveness.
++ Globalization and the rise of the Asia-Pacific region
CONCLUSIONS:
The semiconductor industry and the defense electronics industry are inextricably linked. Every new weapons system in production will rely on semiconductors as its core component. A healthy, robust, and leading edge semiconductor industry is essential for defense needs and indeed for all elements of national security. Several broad conclusions can be drawn from our study.
• There is growing concern regarding the offshore flight of intellectual capital and semiconductor production facilities. Some argue that the ability of the U.S. to maintain access to cutting-edge technology will be adversely affected. The decline of technical talent among U.S. students contributes to these concerns.
The Threat of Counterfeit Devices: Complicity vs VigilanceWaqas Tariq
Challenges that arise as a result of high mobile phone penetration in developing countries such as counterfeiting and increasing product complexity, have largely been tackled from the supply side. This study explores this issue from the demand side by investigating the relationship between socio-demographic characteristics and levels of Intellectual property vigilance as well as brand and quality awareness among urban mobile technology consumers in Botswana. Implications for both corporate and public policy are discussed at the end of this paper.
The document summarizes a report on the smart grid and consumers. It finds that while the smart grid aims to establish two-way communication between utilities and consumers, consumer applications have lagged behind. Early smart meter rollouts faced consumer resistance over costs and privacy issues. Surveys show consumers are open to energy management technologies but unwilling to pay much for them. The market for smart grid consumer applications is projected to grow to over $70 billion globally by 2014, but this depends on overcoming challenges in consumer acceptance and engagement.
Aon Retail & Wholesale Inperspective Nov 2016Graeme Cross
A rapidly shifting social, business, political and economic environment is placing UK retailers on continuous watch as they adapt and react to new threats and challenges.
Historic risk management norms like crime and security are giving way to external threats in the registers of modern companies; but many of these are intangible such as protecting brand equity and are often considered very hard to measure or mitigate.
Meanwhile the increasing influence of technology affects almost every corner of the industry from distribution and the way shoppers interact with a brand; to the supply chain and its continuing search for peak efficiency.
As a result, technology, rather than store networks or stock, is becoming one of the single greatest assets and vulnerabilities identified by the industry’s risk management community.
Global teleprotection market insights, forecast to 2025Bertha000
The Global Teleprotection Market Report 2019 Gives A Holistic View Encompassing Production, Consumption, Import And Export For Key Regions And Countries. The Study Includes The Profiles Of Key Players In The Market With A Significant Global Presence In Coming Years.
Cybersecurity A Community Approach - 20151109Frank Backes
This document proposes that Colorado Springs becomes the "Cybersecurity Capital of the World" due to existing cybersecurity organizations and expertise in the region. It identifies several military and academic institutions in Colorado Springs related to cybersecurity and divides the cybersecurity market into five submarkets - consumer/small business, business/enterprise, industrial, military/intelligence, and ethical offensive cyber. The document argues that understanding these submarkets is important for suppliers to tailor their strategies and that Colorado Springs is well-positioned to bring together resources across sectors to strengthen its position in the cybersecurity field.
The document summarizes key findings from a report on cyber threats targeting the financial services sector. The top three findings are:
1. Financial services encounters security incidents 300% more frequently than other industries due to being a prime target.
2. 33% of all reconnaissance and lure attacks target financial services, indicating large efforts to compromise financial institutions.
3. Credential stealing attacks are prominent, with the top threats like Rerdom, Vawtrak, and Geodo having credential theft capabilities. Geodo is seen 400% more in financial services.
The document provides an overview of electronics manufacturing services (EMS). It discusses that EMS involves designing, manufacturing, testing, and distributing electronic components and assemblies for original equipment manufacturers. It also explores the growth of the EMS market, key applications in areas like medical, industrial and aerospace, and the benefits of outsourcing electronics manufacturing to an EMS provider, such as reducing costs and improving speed to market. Additionally, it examines trends in the electronics industry like increasing automation and demand for more eco-friendly manufacturing solutions.
discuss how the types of threats discussed in the article.docxbkbk37
The document discusses cyber threats against critical national infrastructure like pipelines that transport fuel and gas. Such attacks could significantly disrupt the economy by interrupting essential services and causing shortages. Implementing diversity and common practices across organizations could help mitigate these threats by making systems more resilient and better able to share information on threats and solutions. Having diverse teams and recruiting from a variety of backgrounds would also strengthen cybersecurity defenses.
This white paper discusses cyber security predictions and trends for the next 18 months. It outlines 5 trends: 1) major mobile exploits due to increased mobility and devices, 2) open source vulnerabilities as adversaries target these, 3) supply chain attacks remaining critical as vendors are easier targets, 4) increased industry-specific attacks and malware, and 5) greater privacy legislation in response to public concerns about data collection. The paper recommends organizations assess their use of open source software, supply chain security policies, industry-specific defenses, and data privacy practices to address these evolving threats.
Product tracking and tracing with Blockchain and Internet of ThingsMurali Venkatesh
Infosys and Oracle published a white paper regarding our Blockchain and IoT solution
URL: https://www.infosys.com/Oracle/insights/Documents/product-tracking-tracing.pdf
Similar to Counterfeiting and Semiconductor Value Chain Economics by Mr. Rory King - IHS Inc. (20)
EV Charging at MFH Properties by Whitaker JamiesonForth
Whitaker Jamieson, Senior Specialist at Forth, gave this presentation at the Forth Addressing The Challenges of Charging at Multi-Family Housing webinar on June 11, 2024.
Charging and Fueling Infrastructure Grant: Round 2 by Brandt HertensteinForth
Brandt Hertenstein, Program Manager of the Electrification Coalition gave this presentation at the Forth and Electrification Coalition CFI Grant Program - Overview and Technical Assistance webinar on June 12, 2024.
Charging Fueling & Infrastructure (CFI) Program by Kevin MillerForth
Kevin Miller, Senior Advisor, Business Models of the Joint Office of Energy and Transportation gave this presentation at the Forth and Electrification Coalition CFI Grant Program - Overview and Technical Assistance webinar on June 12, 2024.
Understanding Catalytic Converter Theft:
What is a Catalytic Converter?: Learn about the function of catalytic converters in vehicles and why they are targeted by thieves.
Why are They Stolen?: Discover the valuable metals inside catalytic converters (such as platinum, palladium, and rhodium) that make them attractive to criminals.
Steps to Prevent Catalytic Converter Theft:
Parking Strategies: Tips on where and how to park your vehicle to reduce the risk of theft, such as parking in well-lit areas or secure garages.
Protective Devices: Overview of various anti-theft devices available, including catalytic converter locks, shields, and alarms.
Etching and Marking: The benefits of etching your vehicle’s VIN on the catalytic converter or using a catalytic converter marking kit to make it traceable and less appealing to thieves.
Surveillance and Monitoring: Recommendations for using security cameras and motion-sensor lights to deter thieves.
Statistics and Insights:
Theft Rates by Borough: Analysis of data to determine which borough in NYC experiences the highest rate of catalytic converter thefts.
Recent Trends: Current trends and patterns in catalytic converter thefts to help you stay aware of emerging hotspots and tactics used by thieves.
Benefits of This Presentation:
Awareness: Increase your awareness about catalytic converter theft and its impact on vehicle owners.
Practical Tips: Gain actionable insights and tips to effectively prevent catalytic converter theft.
Local Insights: Understand the specific risks in different NYC boroughs, helping you take targeted preventive measures.
This presentation aims to equip you with the knowledge and tools needed to protect your vehicle from catalytic converter theft, ensuring you are prepared and proactive in safeguarding your property.
Charging Fueling & Infrastructure (CFI) Program Resources by Cat PleinForth
Cat Plein, Development & Communications Director of Forth, gave this presentation at the Forth and Electrification Coalition CFI Grant Program - Overview and Technical Assistance webinar on June 12, 2024.
Implementing ELDs or Electronic Logging Devices is slowly but surely becoming the norm in fleet management. Why? Well, integrating ELDs and associated connected vehicle solutions like fleet tracking devices lets businesses and their in-house fleet managers reap several benefits. Check out the post below to learn more.
Expanding Access to Affordable At-Home EV Charging by Vanessa WarheitForth
Vanessa Warheit, Co-Founder of EV Charging for All, gave this presentation at the Forth Addressing The Challenges of Charging at Multi-Family Housing webinar on June 11, 2024.
Welcome to ASP Cranes, your trusted partner for crane solutions in Raipur, Chhattisgarh! With years of experience and a commitment to excellence, we offer a comprehensive range of crane services tailored to meet your lifting and material handling needs.
At ASP Cranes, we understand the importance of reliable and efficient crane operations in various industries, from construction and manufacturing to logistics and infrastructure development. That's why we strive to deliver top-notch solutions that enhance productivity, safety, and cost-effectiveness for our clients.
Our services include:
Crane Rental: Whether you need a crawler crane for heavy lifting or a hydraulic crane for versatile operations, we have a diverse fleet of well-maintained cranes available for rent. Our rental options are flexible and can be customized to suit your project requirements.
Crane Sales: Looking to invest in a crane for your business? We offer a wide selection of new and used cranes from leading manufacturers, ensuring you find the perfect equipment to match your needs and budget.
Crane Maintenance and Repair: To ensure optimal performance and safety, regular maintenance and timely repairs are essential for cranes. Our team of skilled technicians provides comprehensive maintenance and repair services to keep your equipment running smoothly and minimize downtime.
Crane Operator Training: Proper training is crucial for safe and efficient crane operation. We offer specialized training programs conducted by certified instructors to equip operators with the skills and knowledge they need to handle cranes effectively.
Custom Solutions: We understand that every project is unique, which is why we offer custom crane solutions tailored to your specific requirements. Whether you need modifications, attachments, or specialized equipment, we can design and implement solutions that meet your needs.
At ASP Cranes, customer satisfaction is our top priority. We are dedicated to delivering reliable, cost-effective, and innovative crane solutions that exceed expectations. Contact us today to learn more about our services and how we can support your project in Raipur, Chhattisgarh, and beyond. Let ASP Cranes be your trusted partner for all your crane needs!
Counterfeiting and Semiconductor Value Chain Economics by Mr. Rory King - IHS Inc.
1. - 1 -
Counterfeiting and
Semiconductor Value
Chain Economics
Supply Chain Risk Insight
into Market Sense and
Respond Actions of
Counterfeiters
Rory King
Global Director, Supply Chain, IHS Inc.
321 Inverness Drive South
Englewood, Colorado, 80112
Abstract
Counterfeit parts have proliferated dramatically in recent years, presenting
huge challenges for electronics manufacturing and specifically military and
aerospace application. This session will offer unique new market trends,
observations, and best practices on the issue of economics, semiconductor
value chains, obsolescence, counterfeit electronics, and market impacts such as
fact-based insight into market indicators like correlation among counterfeits,
semiconductor factory utilization, component obsolescence, semiconductor
availability, price volatility, and supply-and-demand equilibrium.
2. - 2 -
1. Introduction
While counterfeiting is a decades old issue, growing safety and securing concerns as well as
scrutiny over supply chain and procurement practices around counterfeit or suspect counterfeit
electronics become widely known as a result of the November 8, 2011 hearing of the U.S.
Senate Armed Services Committee on Counterfeit Electronic Parts in the Department of
Defense Supply Chain. Subsequent to the hearing, the National Defense Authorization Act
(NDAA) of 2012 included Section 818, Counterfeit Detection & Avoidance. Generally
speaking, some key supply chain implications considered at all tiers of the global defense supply
chain included:
Contractor responsibility for detecting and avoiding the use or inclusion of counterfeit
electronic parts or suspect counterfeit parts
Contractor responsibility for any rework or corrective action that may be required to
remedy the use or inclusion of such parts
Defense contracts no longer allowing the cost of counterfeit electronic parts and suspect
counterfeit electronic parts or the cost associated with rework or corrective action to
resolve the use or inclusion of such parts
Qualification procedures and processes must be established to use trusted suppliers and
procure electronics from authorized suppliers
Cost is a major concern for the defense industry. As publicized at the U.S. Senate Armed
Services Committee (SASC) hearings in 2012, a single counterfeit incident – like that of the
THAAD missile system – can cost in excess of $2 million dollars. According to the Missile
Defense Agency, if the devices had failed, the THAAD missile itself would likely have failed.
“The cost of that fix was nearly $2.7 million,” stated Senator Carl Levin (D-MI).i
Human safety and national security also come to the forefront when the potential impact of
counterfeiting is assessed. Counterfeits not only pose an increasing risk to the safety of men and
women in uniform, but they also endanger civilians in other parts applications subject to
counterfeiting such as medical devices, consumer products, or perhaps automobiles.
Counterfeiting is a challenge to companies of all sizes and across all industries – from the small
domestic manufacturer to the global organization, and all entities in between. This paper
discusses supply chain risk and an apparent relationship between counterfeit supplier behaviours
to rapidly sense and respond to semiconductor market economic conditions, as measured
through counterfeit incident reports and component production, inventory, and obsolescence
insight -- over time.
2. Sophistication of Counterfeiters
As Vivek Kamath, Vice President for Supply Chain Operations for Raytheon Company stated,
“What keeps us up at night is the dynamic nature of this threat because by the time we’ve
figured out how to test for these counterfeits, they’ve figured out how to get around it. And it’s
literally on almost a daily basis they change and the sophistication of the counterfeiting is
amazing to us.”ii
To illustrate the apparent sophistication of counterfeiters to sense and respond to market
conditions, consider the Lehman Brothers bankruptcy filing in the United States and resultant
downturn of the global economy. As the largest bankruptcy filing in U.S. history, the incident –
which took place on September 15, 2008 – correlates with a pronounced decline in
3. - 3 -
semiconductor factory production. In Figure 1 you can see that semiconductor factory utilization
remained fairly steady until the economic collapse triggered by Lehman Brothers filing Chapter
11 bankruptcy, after which there was an immediate precipitous drop in semiconductor factory
utilization. This is the reaction of semiconductor producers to demand side weakness.
Figure 1 – Total Semiconductor Factory Utilization
Original Component Manufacturers (OCMs) responded to the event by trying to maintain
profitability in the face of big slashes in demand and cancellations of orders. They also started
issuing end of life (EOL) notices to discontinue their products. IHS tracks these notices and, as
you can see in Figure 2, the number of EOLs skyrocketed just after the filing by Lehman
Brothers, which at the time was holding over $600 billion in assets. This pronounced spike
illustrates how component manufacturers ultimately discontinued their products in an effort to
work smarter and leaner in the midst of a tumultuous business environment.
Figure 2—Manufacturer Product EOL vs. Total Semiconductor Factory Utilization
4. - 4 -
So how did counterfeiters respond to the bankruptcy filing and subsequent increase
in EOLs? As illustrated in Figure 3, counterfeiters responded to the event as an
opportunity supply counterfeit product to buyers, many of whom may not have been
aware of authentic product being discontinued by the OCMs.
Figure 3—Manufacturer Product EOL vs. Counterfeit Incidents
Now, much discussion over counterfeit parts is around obsolete components, but in
reality the problem runs much deeper. As reported by IHS, a total of 57 percent of
counterfeit-part reports from 2001 through 2012 have involved obsolete or end-of-
life (EOL) components, as presented in the figure below. Another 37 percent were
active parts.iii
If you look at Figure 4 you’ll see overall inventory trends (in the shaded areas of the
chart) and a line showing counterfeit products trending along with ebbs and flows in
inventory. This represents inventory of active, commercial electronic components.
Keep these points in mind as we move on to Figure 5.
Figure 4—Total Semiconductor Industry Inventory vs. Counterfeit Incidents
5. - 5 -
In Figure 5, you will notice that semiconductor factory utilization is the top line, but
instead of EOLs what you now see are the counterfeit trends. The interesting
correlation is how these trends fluctuate right along with the ups and downs of
semiconductor factory utilization. As utilization ebbs and flows, the counterfeiting
activity reacts similarly.
In other words, the counterfeiters are sensing market demand and supply factors
much like the original manufacturers of components. Counterfeit suppliers
introduce a greater number of counterfeit products to market (as measured by
counterfeit incident reports) in concert with legitimate producers responding to an
uptick or forecast of semiconductor demand. As the market picks up, the counterfeit
incidents increase.
Figure 5—Total Semiconductor Utilization vs. Counterfeit Incidents Reported
3. Top Counterfeit Parts Classes
Counterfeiters are more prolific than ever in a handful of parts classes. Entering
2012, the top five commodities subject to counterfeiting according to IHS were:iv
Transistors – 7.6%
Programmable Logics Integrated Circuits – 8.3%
Memory Integrated Circuits – 13.1%
Microprocessor Integrated Circuits – 13.4%
Analog Integrated Circuits – 25.2%
In Figure 6, using IHS iSuppli Application Market Forecast Tool (AMFT), one can
plot the counterfeit incidents by component classes against the semiconductor
application markets where those components are consumed. The top five
6. - 6 -
component families are listed on the left side of the chart while the relative
percentage distribution of where those products are used is reflected on the graphic’s
horizontal axis. For example, 14% of analog integrated circuits products are in the
industrial market; 17% in automotive; 21% in consumer; 29% in wireless; 6% in
wired; and 14% in compute. (It’s important to note that medical device, military and
civil aerospace components fall under the industrial market segment or the 14% of
the analog integrated circuits products.)
Cumulatively, analog integrated circuits are the biggest target for counterfeiters and
represent a roughly $47.7 billion semiconductor application market. It is possible to
imagine the potential risk and cost implications of issues associated with damages
resulting from those counterfeit parts. While a great deal of attention is placed on
defense supply chains, the issue plainly doesn’t just threaten the men and women in
armed services or national security, but it poses potential risk and disruption to
businesses and consumers who rely on products throughout these application
markets.
The potential challenges are apparent for other application markets. The consumer
electronics segment in 2011 consumed $9.8 billion worth of analog integrated
circuits, or 21 percent of the global market. Automotive electronics amounted to $8
billion, or 17 percent; computing represented $6.7 billion, or 14 percent; industrial
electronics was at $6.5 billion, or 14 percent; and wired communications was $2.9
billion, or 6 percent.
Figure 6—Percent Distribution of Total Market Revenue by Application Market for
Most Commonly Counterfeited Product Types in 2011
4. High-Risk Suppliers
Even in the face of increasing government regulation and scrutiny, the number of high-risk
suppliers abounds. These firms engage in high-risk, fraudulent, and suspect counterfeit product
or conduct, as identified by the U.S. government. There are literally tens of thousands of these
7. - 7 -
high-risk providers, and their numbers are growing daily. They push the issue of counterfeiting
well beyond just the production of fake parts. As you can see in Figure 7, we’re talking about
thousands of organizations emerging on an annual basis, and not just in an aggregated,
collective fashion either. The environment literally changes daily and impacts every link in the
supply chain.
Figure 7—High Risk Suppliers from 2002-2011
5. The Monetary Impacts of Counterfeiting
Concerns over the impact of counterfeits are well known throughout industry. One general
example draws from an IHS and Supply & Demand Chain Executive survey of 1,001
practitioners, executives, academics, vendors and other industry professionals. Summarized key
findings on the impact of counterfeits experienced or believed by these survey respondents
include those shown in Figure 8. As was apparent, counterfeits cause a wide range of potential
issues from serious financial and brand consequences to daily operational cost, service, and
safety disruption.
Figure 8—Significant Costs of Counterfeit Riskv
8. - 8 -
6. Conclusions
Counterfeiting concerns and impacts continue to be widely discussed, documented,
and shared throughout industry on a worldwide basis. Through unique information
and insight now available to plot real counterfeit incidents reported by industry
against semiconductor factory utilization, inventory, product lifecycle, and
application market forecasts one can begin to see the degree to which counterfeit
behaviours appear to correlate with semiconductor industry responses to
marketplace economics.
When this insight is analyzed, it seems apparent that counterfeiters sense and
respond to marketplace dynamics in a sophisticated manner, by taking such action as
supplying counterfeit product to market in concert with semiconductor factories
increasing capacity to do satisfy demand. While these correlations seem apparent,
other interesting questions that cannot be proved emerge as well – for instance,
could these factories (or their equipment or entire replicas thereof) be the sources of
illegitimate product entering the counterfeit supply chain?
In conclusion, some key points can be considered as organisation assess risk
vulnerabilities and implement counterfeit detection and avoidance measures:
Counterfeiters are not simple individuals with rudimentary
capabilities; they are sophisticated operators and they are in tune
with the market.
Counterfeiting is not exclusively a military and defense parts
issue, but rather counterfeit parts impact all commercial &
military markets.
Counterfeiting is not restricted to old, obsolete components, but
rather counterfeiting impacts active components (in fact, nearly
half are active parts).
Counterfeit detection and avoidance is not just a “cost burden,”
but counterfeit risk mitigation creates significant cost avoidance.
Counterfeit mitigation is not just about “the parts,” but
counterfeit mitigation requires knowledge of high-risk suppliers.
i HEARING TO RECEIVE TESTIMONY ON THE COMMITTEE’S
INVESTIGATION INTO COUNTERFEIT ELECTRONIC PARTS IN THE
DEPARTMENT OF DEFENSE SUPPLY CHAIN, Tuesday, November 8, 2011, U.S.
SENATE COMMITTEE ON ARMED SERVICES, Washington, DC
ii HEARING TO RECEIVE TESTIMONY ON THE COMMITTEE’S
INVESTIGATION INTO COUNTERFEIT ELECTRONIC PARTS IN THE
DEPARTMENT OF DEFENSE SUPPLY CHAIN, Tuesday, November 8, 2011, U.S.
SENATE COMMITTEE ON ARMED SERVICES, Washington, DC
iii Rory King and Mark Snider, IHS Inc. with ERAI Inc., 2012
iv Rory King and Mark Snider, IHS Inc. with ERAI Inc., 2012
v Supply & Demand Chain Executive and IHS Inc., Benchmarking Counterfeits and
Inferior Grade Components, 2009