This webcast covered counterfeiting, obsolescence, and supply chain risk. Attendees were encouraged to complete a survey at the end for a chance to win an Amazon Kindle. The speakers discussed predictive obsolescence and how applying predictive forecasting tools like life-cycle codes and years to end of life estimates can help mitigate the effects of component obsolescence. Examples of counterfeit incidents were provided and it was noted that over 50 counterfeiting incidents had been reported in the last 14 days. Best practices for avoiding supply chain risk through vetting suppliers and qualifying parts from trusted sources within the approved supply chain were also discussed.
DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk MitigationRory King
Rory King and Greg Jaknunas provide a briefing on expertise, tools, and best practices to enable anti-counterfeit, supply chain risk mitigation and problem-resolution capabilities within Parts Management. It will discuss methods integrating standards management, predictive and reactive obsolescence forecasting, and counterfeit databases and reporting mechanisms. It will illustrate how GIDEP and ERAI alerts, reports, and analysis can be integrated within traditional BOM obsolescence management processes. It will also illustrate how widely-deployed tools such as IHS Haystack, Standards Expert, and BOM Manager can enable and support efforts such as SAE AS5553 Counterfeit Electronic Parts; Avoidance, Detection, Mitigation, and Disposition. Attendees will learn methods to manage EOL cases, qualify and approve suppliers and parts, as well as methods to minimize cost and avoid risks from counterfeiting and obsolescence.
Counterfeit electronics pose serious economic, national security, and safety threats, while reports of counterfeits have soared dramatically in recent years. This presents huge challenges for electronics manufacturing at a time when the United States has created strict new regulations for the detection and avoidance of counterfeit electronic parts.
In the National Defense Authorization Act (NDAA) for Fiscal 2012, the U.S. now requires that members at all tiers of its global defense supply chain put in place systems and processes to address counterfeits. It’s not exclusively a U.S. concern. The regulation and its mandatory flow down requirements will impact international companies participating in global defense and electronics value chains.
If matters couldn’t be more challenging, the semiconductor industry’s infamous silicone cycle is forecasted to enter into growth period in 2012 characterized by extended lead times, higher prices, and potential shortages – a vulnerable situation for counterfeiting to take off.
Join Supply & Demand Chain Executive as they host experts from IHS and ERAI who will share trends, insight, and information on new defense regulations, counterfeit electronics, and the semiconductor industry. They will discuss what you need to know about counterfeits, regulations, and risk in 2012.
- What are U.S. regulations for the detection and avoidance of counterfeit electronic parts?
- What tools, processes, and insight can be used to comply with regulations and avoid risk?
- What is the relationship between semiconductor industry trends and counterfeiting?
- Could industry price and availability metrics foretell pending counterfeit activity?
What products will have the greatest risk in the near future?
Serious cost, risk, and regulations threaten to transcend fragile supply chains already strained by natural disasters, Geo-political turmoil, and economic instability. Don't miss this chance to learn how to combat electronics price and counterfeit risk while helping comply with regulations. Join now.
Rick PiersonRick Pierson - Senior Analyst, Semiconductors/CPT, IHS iSuppli
Rick carries with him 21 years of combined experience in the semiconductor industry with an extensive background in semiconductor product manufacturing. Leading IHS iSuppli’s Component Price Tracking (CPT) Service, Rick is responsible for leading, creating and delivering research and analysis on the electronics components market. Rick delivers business analysis and actionable advice to the suppliers and buyers of electronic components used across the electronics value chain.
Rick PiersonKristal Snider - Vice President, ERAI, Inc.
With almost two decades of experience, Kristal Snider has developed a keen understanding of the problems affecting the global electronics supply chain. Kristal is responsible for mana
Illinois Tool Works Inc. (ITW) is a leading diversified manufacturing company with nearly 100 years of history. ITW designs and produces highly engineered fasteners, components, equipment, and specialty products for customers around the world through its 700 decentralized business units located in 48 countries. The document provides an overview of ITW's manufacturing segments, product categories, major businesses, end markets, financial highlights, and strategies for revenue growth through both base business expansion and acquisitions.
Josh Corman discusses adopting a software supply chain approach to accelerate development in a secure and efficient manner. This involves treating open source and third party components like a manufacturing supply chain by having fewer, high quality suppliers, and visibility into components used. This enables faster development by reducing interruptions and issues, and improves quality by avoiding known vulnerable components. As software and connected technologies grow critical, such rigor around software supply chains will be increasingly important for security and safety.
RS Components and DesignSpark launch a new tool that can help OEMs and product developers to manage the problem of obsolescence, and plan for when the End-of-Life (EOL) notices are placed on parts that will soon cease to be produced, repaired and supported by component vendors.
Find out more here: https://www.rs-online.com/designspark/obsolescence-manager
The document discusses spare parts criticality assessment methods. It defines spare parts and their importance for minimizing machine downtime. A criticality assessment determines which spare parts are most important to processes. The document then describes models for classifying spare parts as critical or non-critical based on factors like failure rate and procurement lead time. It also outlines several assessment methods like analytic hierarchy process and gray prediction models. Inventory analysis methods like FSN, HML and VED are introduced to help optimize spare part management.
The secondary market is often the supply chain of last recourse when a component product goes obsolete or is under production constraints. While it is possible to get high quality, genuine parts, it is also possible to get nonconforming, reworked, or counterfeit components. What is most frustrating is that it is increasingly difficult to differentiate genuine parts from their counterfeit equivalents.
Historically, the secondary market provided a mechanism for finding parts in short supply or at reduced cost. Today, high-reliability system manufacturers are less willing to risk contamination of their supply chain with potentially substandard parts in order to save a few dollars on the cost of a part. The proliferation of counterfeit components has led to a contraction of the secondary market and an increase in the cost of parts in the marketplace.
This document summarizes a study on material management and safety stock keeping conducted at Bosch Ltd., Nashik plant. It discusses various material management techniques like ABC analysis, VED analysis, and safety stock concepts. It describes the objectives of material management as maintaining steady material flow, cost reduction, quality consistency, and reducing inventory investment. The document also covers topics like inventory classification, store management functions, inventory carrying costs, procurement costs, and stockout costs. It emphasizes the importance of selective inventory control based on criteria like cost, criticality, lead time etc.
DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk MitigationRory King
Rory King and Greg Jaknunas provide a briefing on expertise, tools, and best practices to enable anti-counterfeit, supply chain risk mitigation and problem-resolution capabilities within Parts Management. It will discuss methods integrating standards management, predictive and reactive obsolescence forecasting, and counterfeit databases and reporting mechanisms. It will illustrate how GIDEP and ERAI alerts, reports, and analysis can be integrated within traditional BOM obsolescence management processes. It will also illustrate how widely-deployed tools such as IHS Haystack, Standards Expert, and BOM Manager can enable and support efforts such as SAE AS5553 Counterfeit Electronic Parts; Avoidance, Detection, Mitigation, and Disposition. Attendees will learn methods to manage EOL cases, qualify and approve suppliers and parts, as well as methods to minimize cost and avoid risks from counterfeiting and obsolescence.
Counterfeit electronics pose serious economic, national security, and safety threats, while reports of counterfeits have soared dramatically in recent years. This presents huge challenges for electronics manufacturing at a time when the United States has created strict new regulations for the detection and avoidance of counterfeit electronic parts.
In the National Defense Authorization Act (NDAA) for Fiscal 2012, the U.S. now requires that members at all tiers of its global defense supply chain put in place systems and processes to address counterfeits. It’s not exclusively a U.S. concern. The regulation and its mandatory flow down requirements will impact international companies participating in global defense and electronics value chains.
If matters couldn’t be more challenging, the semiconductor industry’s infamous silicone cycle is forecasted to enter into growth period in 2012 characterized by extended lead times, higher prices, and potential shortages – a vulnerable situation for counterfeiting to take off.
Join Supply & Demand Chain Executive as they host experts from IHS and ERAI who will share trends, insight, and information on new defense regulations, counterfeit electronics, and the semiconductor industry. They will discuss what you need to know about counterfeits, regulations, and risk in 2012.
- What are U.S. regulations for the detection and avoidance of counterfeit electronic parts?
- What tools, processes, and insight can be used to comply with regulations and avoid risk?
- What is the relationship between semiconductor industry trends and counterfeiting?
- Could industry price and availability metrics foretell pending counterfeit activity?
What products will have the greatest risk in the near future?
Serious cost, risk, and regulations threaten to transcend fragile supply chains already strained by natural disasters, Geo-political turmoil, and economic instability. Don't miss this chance to learn how to combat electronics price and counterfeit risk while helping comply with regulations. Join now.
Rick PiersonRick Pierson - Senior Analyst, Semiconductors/CPT, IHS iSuppli
Rick carries with him 21 years of combined experience in the semiconductor industry with an extensive background in semiconductor product manufacturing. Leading IHS iSuppli’s Component Price Tracking (CPT) Service, Rick is responsible for leading, creating and delivering research and analysis on the electronics components market. Rick delivers business analysis and actionable advice to the suppliers and buyers of electronic components used across the electronics value chain.
Rick PiersonKristal Snider - Vice President, ERAI, Inc.
With almost two decades of experience, Kristal Snider has developed a keen understanding of the problems affecting the global electronics supply chain. Kristal is responsible for mana
Illinois Tool Works Inc. (ITW) is a leading diversified manufacturing company with nearly 100 years of history. ITW designs and produces highly engineered fasteners, components, equipment, and specialty products for customers around the world through its 700 decentralized business units located in 48 countries. The document provides an overview of ITW's manufacturing segments, product categories, major businesses, end markets, financial highlights, and strategies for revenue growth through both base business expansion and acquisitions.
Josh Corman discusses adopting a software supply chain approach to accelerate development in a secure and efficient manner. This involves treating open source and third party components like a manufacturing supply chain by having fewer, high quality suppliers, and visibility into components used. This enables faster development by reducing interruptions and issues, and improves quality by avoiding known vulnerable components. As software and connected technologies grow critical, such rigor around software supply chains will be increasingly important for security and safety.
RS Components and DesignSpark launch a new tool that can help OEMs and product developers to manage the problem of obsolescence, and plan for when the End-of-Life (EOL) notices are placed on parts that will soon cease to be produced, repaired and supported by component vendors.
Find out more here: https://www.rs-online.com/designspark/obsolescence-manager
The document discusses spare parts criticality assessment methods. It defines spare parts and their importance for minimizing machine downtime. A criticality assessment determines which spare parts are most important to processes. The document then describes models for classifying spare parts as critical or non-critical based on factors like failure rate and procurement lead time. It also outlines several assessment methods like analytic hierarchy process and gray prediction models. Inventory analysis methods like FSN, HML and VED are introduced to help optimize spare part management.
The secondary market is often the supply chain of last recourse when a component product goes obsolete or is under production constraints. While it is possible to get high quality, genuine parts, it is also possible to get nonconforming, reworked, or counterfeit components. What is most frustrating is that it is increasingly difficult to differentiate genuine parts from their counterfeit equivalents.
Historically, the secondary market provided a mechanism for finding parts in short supply or at reduced cost. Today, high-reliability system manufacturers are less willing to risk contamination of their supply chain with potentially substandard parts in order to save a few dollars on the cost of a part. The proliferation of counterfeit components has led to a contraction of the secondary market and an increase in the cost of parts in the marketplace.
This document summarizes a study on material management and safety stock keeping conducted at Bosch Ltd., Nashik plant. It discusses various material management techniques like ABC analysis, VED analysis, and safety stock concepts. It describes the objectives of material management as maintaining steady material flow, cost reduction, quality consistency, and reducing inventory investment. The document also covers topics like inventory classification, store management functions, inventory carrying costs, procurement costs, and stockout costs. It emphasizes the importance of selective inventory control based on criteria like cost, criticality, lead time etc.
Panel Discussion - Counterfeit Electronics and the Defense Authorization BillIHS
The document summarizes a live panel discussion on counterfeit electronics and the defense authorization bill held on December 8, 2011. The panel was moderated by Barry Hochfelder and Rory King from Supply & Demand Chain Executive and included experts from aviation, electronics manufacturing, and supply chain risk analysis organizations. The panel discussed the impacts of counterfeit electronics including risks to safety, security, operations, and financial performance. Examples highlighted how counterfeits can damage aircraft, nuclear plants, and military equipment by causing failures. The panel also noted impacts like loss of life and harm to national security.
Avoiding Counterfeit Risk: How to mitigate part and supplier risk IHS
Just one counterfeit incident poses risk ranging from catastrophic brand damage to costly halts in production or unnecessary design and development. Your supply chain is under assault and may already be infiltrated.
It's time to act. Join Supply & Demand Chain Executive magazine as they host experts from ERAI and IHS and L-3 Communications who will share best practices, tools, and technique for mitigating electronics value chain risks.
Original event date: 2-23-11
There is a strong relationship between issues like supply/demand volatility, obsolescence and counterfeits. Today, Supply & Demand Chain Executive magazine will host experts from ERAI, IHS and L-3 Communications who will share best practices, tools, and techniques for mitigating counterfeit electronics and broader issues facing the electronics value chain today.
Creating alcohol-free environments to increase productivity and save lives. That is the mission of Boulder, CO-based SOBRSafe, Inc. The company is integrating a preventative detection technology platform through partnership, licensing and acquisitions, and is in protype phase with its launch product: the patented, proprietary SOBRSafe® device - a non-invasive, touch-based identity verification and alcohol detection solution.
Website attacks continue to prevail despite the best efforts of enterprises to fight them. Websites are an ongoing business concern and security must be assured all the time, not just at a point in time. And yet, most websites were exposed to at least one serious vulnerability every day of 2010, leaving valuable corporate and customer date at risk. Why?
In this report, Jeremiah will explore a new way to measure website security, Windows of Exposure, that tracks an organization’s current and historical website security posture. Window of Exposure is a useful combination of vulnerability prevalence, how long vulnerabilities take to get fixed, and the percentage of them that are remediated. By carefully tracking these metrics, an organization can determine where resources would be best invested.
Using data from WhiteHat’s 11th Website Security Statistics Report, based on assessments of over 3,000 websites, Grossman will reveal the most secure (and insecure) vertical markets and the Windows of Exposure of each. Find out how your industry ranks, and the top ten vulnerabilities plaguing your peers. Learn how to determine which metrics are critical to increasing their remediation rates, thereby limiting their Window of Exposure. The good news is that companies that take this approach are increasing remediation rates by 5 percent per year.
The document discusses the risks of IoT devices and the need for improved security practices. It notes that many applications contain inherited vulnerabilities from reused components and fail to meet basic security standards. The document outlines UL's new 2900 security certification for network-connected products which evaluates vendors' risk management processes and requires documentation of a product's design, use, vulnerabilities, and security controls.
This document provides an overview of a SPV investment in TransBiotec, Inc., which is soon to be renamed SOBRSafe, Inc. Key points include:
- The SPV was formed to invest in TransBiotec, a publicly traded company developing a non-invasive alcohol detection and identity verification technology.
- SOBRSafe plans to address the problems of alcohol in the workplace and on roadways using its technology and analytics capabilities.
- The presentation outlines SOBRSafe's technology, strategic growth plan, target markets, leadership, and financial projections, with the goal of raising up to $2.2 million for the company.
As businesses search for lower costs, supply chains have evolved from local to regional to global, and are increasing levels for offshoring of component suppliers and contract manufacturers. As a result, new risks associated with Intellectual Property (IP) have been introduced into design and supply chains. Mitigating these risks is essential for the successful commercialization of new products.
Gain 5 valuable insights about:
• IP Leakage and where it typically happens
• Where does it happen?
• Current Supply Chain models
• Key product considerations
• Structural solutions to protect IP
Biometrics - The Key for Effective, Secure & Smart IdentificationIDEX ASA
The document discusses biometrics and fingerprint biometrics specifically as an effective solution for identity management and fraud prevention. It then summarizes IDEX's Smartfinger film fingerprint sensor technology. The technology uses a thin, flexible fingerprint swipe sensor that works by acquiring fingerprint data, reconstructing the image, extracting features, and verifying matches. It has advantages like being very small, low cost, and high performance. The sensor can be integrated into various applications like smart cards, ID cards, and access control devices to provide biometric authentication.
- Business technology purchasing is complex, involving many influencers across a long sales cycle. Buyers seek information from various sources like peers, analysts, and vendors.
- Influence is fueled by unique and trusted content online, rather than just search and portals. The moderately connected now have more influence than the highly connected.
- Marketers can span the purchasing funnel by engaging buyers through content sponsorship, expert blogs, polls, and activating peer influence at each stage from awareness to purchase. Impact can be measured through tools tracking topics, vendors and user engagement across the funnel.
DevOps Will Save The World! : Public Safety, Public Policy, and DevOps In Context
Joshua Corman, CTO, Sonatype
Link to video: https://www.youtube.com/watch?v=K-hskShNyoo
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Felipe Lamus
The document discusses the concept of Fast IT, which is described as the IT operating model needed for the Internet of Everything (IoE) era. It summarizes findings from a survey of over 1,400 IT leaders and interviews with experts on how IoE is increasing IT complexity and the challenges IT organizations face in enabling business innovation. The key to Fast IT is simplifying infrastructure, creating intelligent services, and securing everything dynamically to fuel business growth while liberating IT from costs and management burdens.
DevOps for Highly Regulated EnvironmentsDevOps.com
Financial institutions, medical groups, governmental organizations, automotive companies… these types of entities all have unique and sometimes difficult-to-meet regulations. You may be required to have fine-grained auditability of your SDLC or maintain specific third-party integrations. Security models may be heightened, or certain types of compliance processes maintained. So how are we supposed to “do the DevOps” when we have so many things to worry about? In this webinar, we’ll explore some ways that you can adopt DevOps best practices and even (gasp!) thrive when building your DevOps and DevSecOps pipelines in highly-regulated industries.
The webinar discusses cybersecurity trends for small and medium enterprises (SMEs) and professional accountants in light of the COVID-19 pandemic. It will provide an overview of pre-pandemic cybersecurity trends and risks, examine how the pandemic has influenced these trends and risks, and offer practical insights for SMEs to respond proactively. A panel of cybersecurity experts from Deloitte, KPMG and Cherry Bekaert will discuss topics like the global state of cybersecurity in SMEs before the pandemic, the impact of widespread remote working during the pandemic, and key considerations for cybersecurity in a post-pandemic environment.
Avoiding IT Litigation with Great IT & Software Development ContractsWarren S. Reid
Outlines a "Systems Approach to IT Contracting" that, based on their own personal experiences and expertise, better serves many IT contract purposes. This approach quite thoroughly flushes out and documents the responsibilities and risks each party is willing (and able) to accept and the deliverables / deliverable quality each party will produce and approve, how to get a project back on track, and the renedies for failure to deliver.
Done properly with dedicated IT Contracting Teams, this approach to IT Contracting will generally produce:
(a) much better contracts,
(b) stronger long term working relationships between the parties that can be very helpful if and when a disputes arise, and,
(c) more understanding and control over planning, developing, and managing IT systems and project: estimates; schedules; staffing; progress awareness and reporting; functional AND performance requirements (scope creep); better testing regiments; quality assurance; project specific risks and stakeholder expectations.
Creating Great Computer & Software Contracts that Protect All PartiesWarren S. Reid
Outlines a "Systems Approach to IT Contracting" that thoroughly flushes out and documents the responsibilities & risks each party is willing (and able) to accept and the deliverable quality each party will produce and approve, how to get a project back on track, and the remedies for failure to deliver.
Done properly with dedicated IT Contracting Teams, this approach to IT Contracting will generally produce:
(a) much better contracts,
(b) stronger long term working relationships between the parties that can be very helpful if and when a disputes arise, and,
(c) more understanding and control over planning, developing, and managing IT systems and project: estimates; schedules; staffing; progress awareness and reporting; functional AND performance requirements (scope creep); better testing regiments; quality assurance; project specific risks and stakeholder expectations.
This is the annual STKI IT Market in Israel study. It is released to the public but when using data or graphs the source or attribution should be attached. We will prosecute users of the data that do not do the above.
The document provides an overview of the 2013 IT market in Israel from Dr. Schwarzkopf's research firm STKI. Some key points:
- STKI conducted 210 interviews with CIOs across 16 industries and collected sales data from 310 vendors across 106 categories to develop an "equilibrium model" of the Israeli IT market.
- The report examines areas like software/hardware revenues, new vs continuing projects, work done by vendors vs outsourcing, and project pricing models.
- It also provides relevant economic context on Israel's GDP, inflation, unemployment, and comparison to OECD countries. Tables show numbers of companies and employees paying taxes from 2010-2012.
- STKI aims to give a
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Blancco
Data brings value that informs the mobile device journey, helps businesses make key processing decisions, improves processing efficiency and dictates disposition path across the omni-channel. By harnessing the power of this data across the mobile device lifecycle, you can optimize value by shortening the time your devices spend in the warehouse.
Join this session to learn how to:
Simplify grading, erasure, and diagnostics across the device ecosystem
Enable solution-focused API integration with existing ERP / WMS / AMS systems
Employ lean processing principals
WhitePaper_Supply-Chain-Risk-2.0-Understanding-Supplier-Networks-and-Supply-C...Tevia Arnold
1) Understanding supply chain risks beyond direct suppliers to include suppliers' networks and connections is critical for mitigating risks like disruptions and costs fluctuations.
2) A comprehensive supplier risk program uses insights into markets, geographies, suppliers and trends to recognize risks and provide transparency into the multi-tier supply chain.
3) When unexpected disruptions occur, having deep information on suppliers and supply connections beforehand allows companies to make swift, informed decisions to ensure business continuity.
Organizations often overlook fundamentals when evaluating supply chain risk and opportunities, leading to wrong decisions. A framework is proposed to accurately assess risk and pricing in different countries. It involves analyzing individual country risk profiles based on factors like contract enforcement and corruption. Price forecasts are then combined with risk scores to identify overall sourcing opportunities, revealing opportunities to avoid risk and expand supply chains effectively.
More Related Content
Similar to IHS Webcast - Counterfeiting, Obsolescence, and Risk
Panel Discussion - Counterfeit Electronics and the Defense Authorization BillIHS
The document summarizes a live panel discussion on counterfeit electronics and the defense authorization bill held on December 8, 2011. The panel was moderated by Barry Hochfelder and Rory King from Supply & Demand Chain Executive and included experts from aviation, electronics manufacturing, and supply chain risk analysis organizations. The panel discussed the impacts of counterfeit electronics including risks to safety, security, operations, and financial performance. Examples highlighted how counterfeits can damage aircraft, nuclear plants, and military equipment by causing failures. The panel also noted impacts like loss of life and harm to national security.
Avoiding Counterfeit Risk: How to mitigate part and supplier risk IHS
Just one counterfeit incident poses risk ranging from catastrophic brand damage to costly halts in production or unnecessary design and development. Your supply chain is under assault and may already be infiltrated.
It's time to act. Join Supply & Demand Chain Executive magazine as they host experts from ERAI and IHS and L-3 Communications who will share best practices, tools, and technique for mitigating electronics value chain risks.
Original event date: 2-23-11
There is a strong relationship between issues like supply/demand volatility, obsolescence and counterfeits. Today, Supply & Demand Chain Executive magazine will host experts from ERAI, IHS and L-3 Communications who will share best practices, tools, and techniques for mitigating counterfeit electronics and broader issues facing the electronics value chain today.
Creating alcohol-free environments to increase productivity and save lives. That is the mission of Boulder, CO-based SOBRSafe, Inc. The company is integrating a preventative detection technology platform through partnership, licensing and acquisitions, and is in protype phase with its launch product: the patented, proprietary SOBRSafe® device - a non-invasive, touch-based identity verification and alcohol detection solution.
Website attacks continue to prevail despite the best efforts of enterprises to fight them. Websites are an ongoing business concern and security must be assured all the time, not just at a point in time. And yet, most websites were exposed to at least one serious vulnerability every day of 2010, leaving valuable corporate and customer date at risk. Why?
In this report, Jeremiah will explore a new way to measure website security, Windows of Exposure, that tracks an organization’s current and historical website security posture. Window of Exposure is a useful combination of vulnerability prevalence, how long vulnerabilities take to get fixed, and the percentage of them that are remediated. By carefully tracking these metrics, an organization can determine where resources would be best invested.
Using data from WhiteHat’s 11th Website Security Statistics Report, based on assessments of over 3,000 websites, Grossman will reveal the most secure (and insecure) vertical markets and the Windows of Exposure of each. Find out how your industry ranks, and the top ten vulnerabilities plaguing your peers. Learn how to determine which metrics are critical to increasing their remediation rates, thereby limiting their Window of Exposure. The good news is that companies that take this approach are increasing remediation rates by 5 percent per year.
The document discusses the risks of IoT devices and the need for improved security practices. It notes that many applications contain inherited vulnerabilities from reused components and fail to meet basic security standards. The document outlines UL's new 2900 security certification for network-connected products which evaluates vendors' risk management processes and requires documentation of a product's design, use, vulnerabilities, and security controls.
This document provides an overview of a SPV investment in TransBiotec, Inc., which is soon to be renamed SOBRSafe, Inc. Key points include:
- The SPV was formed to invest in TransBiotec, a publicly traded company developing a non-invasive alcohol detection and identity verification technology.
- SOBRSafe plans to address the problems of alcohol in the workplace and on roadways using its technology and analytics capabilities.
- The presentation outlines SOBRSafe's technology, strategic growth plan, target markets, leadership, and financial projections, with the goal of raising up to $2.2 million for the company.
As businesses search for lower costs, supply chains have evolved from local to regional to global, and are increasing levels for offshoring of component suppliers and contract manufacturers. As a result, new risks associated with Intellectual Property (IP) have been introduced into design and supply chains. Mitigating these risks is essential for the successful commercialization of new products.
Gain 5 valuable insights about:
• IP Leakage and where it typically happens
• Where does it happen?
• Current Supply Chain models
• Key product considerations
• Structural solutions to protect IP
Biometrics - The Key for Effective, Secure & Smart IdentificationIDEX ASA
The document discusses biometrics and fingerprint biometrics specifically as an effective solution for identity management and fraud prevention. It then summarizes IDEX's Smartfinger film fingerprint sensor technology. The technology uses a thin, flexible fingerprint swipe sensor that works by acquiring fingerprint data, reconstructing the image, extracting features, and verifying matches. It has advantages like being very small, low cost, and high performance. The sensor can be integrated into various applications like smart cards, ID cards, and access control devices to provide biometric authentication.
- Business technology purchasing is complex, involving many influencers across a long sales cycle. Buyers seek information from various sources like peers, analysts, and vendors.
- Influence is fueled by unique and trusted content online, rather than just search and portals. The moderately connected now have more influence than the highly connected.
- Marketers can span the purchasing funnel by engaging buyers through content sponsorship, expert blogs, polls, and activating peer influence at each stage from awareness to purchase. Impact can be measured through tools tracking topics, vendors and user engagement across the funnel.
DevOps Will Save The World! : Public Safety, Public Policy, and DevOps In Context
Joshua Corman, CTO, Sonatype
Link to video: https://www.youtube.com/watch?v=K-hskShNyoo
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Felipe Lamus
The document discusses the concept of Fast IT, which is described as the IT operating model needed for the Internet of Everything (IoE) era. It summarizes findings from a survey of over 1,400 IT leaders and interviews with experts on how IoE is increasing IT complexity and the challenges IT organizations face in enabling business innovation. The key to Fast IT is simplifying infrastructure, creating intelligent services, and securing everything dynamically to fuel business growth while liberating IT from costs and management burdens.
DevOps for Highly Regulated EnvironmentsDevOps.com
Financial institutions, medical groups, governmental organizations, automotive companies… these types of entities all have unique and sometimes difficult-to-meet regulations. You may be required to have fine-grained auditability of your SDLC or maintain specific third-party integrations. Security models may be heightened, or certain types of compliance processes maintained. So how are we supposed to “do the DevOps” when we have so many things to worry about? In this webinar, we’ll explore some ways that you can adopt DevOps best practices and even (gasp!) thrive when building your DevOps and DevSecOps pipelines in highly-regulated industries.
The webinar discusses cybersecurity trends for small and medium enterprises (SMEs) and professional accountants in light of the COVID-19 pandemic. It will provide an overview of pre-pandemic cybersecurity trends and risks, examine how the pandemic has influenced these trends and risks, and offer practical insights for SMEs to respond proactively. A panel of cybersecurity experts from Deloitte, KPMG and Cherry Bekaert will discuss topics like the global state of cybersecurity in SMEs before the pandemic, the impact of widespread remote working during the pandemic, and key considerations for cybersecurity in a post-pandemic environment.
Avoiding IT Litigation with Great IT & Software Development ContractsWarren S. Reid
Outlines a "Systems Approach to IT Contracting" that, based on their own personal experiences and expertise, better serves many IT contract purposes. This approach quite thoroughly flushes out and documents the responsibilities and risks each party is willing (and able) to accept and the deliverables / deliverable quality each party will produce and approve, how to get a project back on track, and the renedies for failure to deliver.
Done properly with dedicated IT Contracting Teams, this approach to IT Contracting will generally produce:
(a) much better contracts,
(b) stronger long term working relationships between the parties that can be very helpful if and when a disputes arise, and,
(c) more understanding and control over planning, developing, and managing IT systems and project: estimates; schedules; staffing; progress awareness and reporting; functional AND performance requirements (scope creep); better testing regiments; quality assurance; project specific risks and stakeholder expectations.
Creating Great Computer & Software Contracts that Protect All PartiesWarren S. Reid
Outlines a "Systems Approach to IT Contracting" that thoroughly flushes out and documents the responsibilities & risks each party is willing (and able) to accept and the deliverable quality each party will produce and approve, how to get a project back on track, and the remedies for failure to deliver.
Done properly with dedicated IT Contracting Teams, this approach to IT Contracting will generally produce:
(a) much better contracts,
(b) stronger long term working relationships between the parties that can be very helpful if and when a disputes arise, and,
(c) more understanding and control over planning, developing, and managing IT systems and project: estimates; schedules; staffing; progress awareness and reporting; functional AND performance requirements (scope creep); better testing regiments; quality assurance; project specific risks and stakeholder expectations.
This is the annual STKI IT Market in Israel study. It is released to the public but when using data or graphs the source or attribution should be attached. We will prosecute users of the data that do not do the above.
The document provides an overview of the 2013 IT market in Israel from Dr. Schwarzkopf's research firm STKI. Some key points:
- STKI conducted 210 interviews with CIOs across 16 industries and collected sales data from 310 vendors across 106 categories to develop an "equilibrium model" of the Israeli IT market.
- The report examines areas like software/hardware revenues, new vs continuing projects, work done by vendors vs outsourcing, and project pricing models.
- It also provides relevant economic context on Israel's GDP, inflation, unemployment, and comparison to OECD countries. Tables show numbers of companies and employees paying taxes from 2010-2012.
- STKI aims to give a
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Blancco
Data brings value that informs the mobile device journey, helps businesses make key processing decisions, improves processing efficiency and dictates disposition path across the omni-channel. By harnessing the power of this data across the mobile device lifecycle, you can optimize value by shortening the time your devices spend in the warehouse.
Join this session to learn how to:
Simplify grading, erasure, and diagnostics across the device ecosystem
Enable solution-focused API integration with existing ERP / WMS / AMS systems
Employ lean processing principals
Similar to IHS Webcast - Counterfeiting, Obsolescence, and Risk (20)
WhitePaper_Supply-Chain-Risk-2.0-Understanding-Supplier-Networks-and-Supply-C...Tevia Arnold
1) Understanding supply chain risks beyond direct suppliers to include suppliers' networks and connections is critical for mitigating risks like disruptions and costs fluctuations.
2) A comprehensive supplier risk program uses insights into markets, geographies, suppliers and trends to recognize risks and provide transparency into the multi-tier supply chain.
3) When unexpected disruptions occur, having deep information on suppliers and supply connections beforehand allows companies to make swift, informed decisions to ensure business continuity.
Organizations often overlook fundamentals when evaluating supply chain risk and opportunities, leading to wrong decisions. A framework is proposed to accurately assess risk and pricing in different countries. It involves analyzing individual country risk profiles based on factors like contract enforcement and corruption. Price forecasts are then combined with risk scores to identify overall sourcing opportunities, revealing opportunities to avoid risk and expand supply chains effectively.
Market-Insight_Chinese Manufacturings Low-Cost RunTevia Arnold
- China's low labor costs have attracted manufacturers for years, but wages are growing rapidly and are expected to outpace countries like Indonesia, Vietnam, and Mexico by the end of the decade. Currently 10% of U.S. wages, Chinese wages will rise to 25% of U.S. wages by 2015.
- Productivity gains in China have nearly doubled since 2005, but wages are still expected to more than double in the next 10 years, threatening China's competitive advantage for low-cost, labor intensive manufacturing.
- While China still retains some manufacturing advantages and costs are still lower than the U.S., the margins are narrowing rapidly. Manufacturers need to consider total costs and look at alternative countries
Brochure_IHS Cost and Procurement Solutions Upstream Oil and GasTevia Arnold
IHS provides supply chain, procurement, and sourcing solutions for the upstream oil and gas industry. They deliver timely market insights and analysis on prices, costs, and fundamentals to help companies identify inefficiencies and opportunities. IHS solutions combine expertise from multiple sources to provide a complete cost picture and help organizations make more informed procurement decisions and achieve cost savings. Case studies show how IHS analysis helped companies avoid unnecessary costs and rely on IHS for market intelligence and decision-making.
Brochure_Pricing-and-Purchasing-CorporateTevia Arnold
The document provides information on the IHS Pricing and Purchasing Service which enables supply chain cost savings through timely and accurate cost and price analysis. It has a database of over 500,000 historic prices and thousands of price, wage and input cost forecasts covering categories like materials, transportation, and electronics. The service provides tools for clients to analyze purchases, negotiate contracts, benchmark costs, estimate project costs, and evaluate pricing. Case studies show how clients in various industries were able to achieve millions in cost savings by applying insights from IHS analyses to strategic purchasing decisions and contract negotiations.
CapitalizeFallingPrices_Benchmarking Report_March2015Tevia Arnold
The document is a benchmarking report from IHS that summarizes the key findings of a survey of procurement professionals. Some of the main points from the survey include:
- Over 65% of respondents actively negotiate 40% or more of their total spend and expect this to increase in 2015.
- Respondents cited "better market intelligence" as their primary method for capturing cost savings.
- The top spend categories expected for 2015 are ferrous metals, nonferrous metals, and transportation.
- 89% of respondents still report some level of risk for their spend categories despite low commodity prices.
- Common savings targets for 2015 were 2-5% and 5-10%, and 64
Procurement executives struggle to effectively manage costs and risks due to a lack of visibility into material input costs, market dependencies, and volatility. This leaves companies vulnerable and unable to meet strategic goals. IHS provides a consistent pricing platform with 500,000 historic prices and 4,000 forecasts to help procurement standardize processes globally. Their analytical tools and expert insights can help procurement enhance capabilities, quantify supply chain price changes, and develop sourcing strategies to consistently meet targets and manage risks.
IHS Webcast - Green Products and Supply Chain DisruptionTevia Arnold
The document discusses a research study on conflict minerals and the Dodd-Frank Act requirements regarding conflict minerals. Key findings from the original research on conflict minerals are presented. The research surveyed 190 global organizations to understand awareness of and preparedness for the conflict minerals legislation. It assessed supply chain exposure and identified strategies for complying with Dodd-Frank requirements. The research was conducted from July to September 2010 with practitioner peer review and a report published in October 2010.
IHS Webcast - Tools and Techniques to Effectively Manage EHS Regulatory Compl...Tevia Arnold
Join regulatory experts from IHS and Citation Technologies as they discuss the complexity of the global EHS regulatory environment and offer very simple and straightforward advice to help companies eliminate cost and risk associated with ever-changing environmental, occupational health, physical facility security and safety regulations.
IHS Webcast - Aftershocks in the Supply Chain Tevia Arnold
This document provides an overview and analysis of the impact of the 2011 Japan earthquake on the global electronics supply chain. It discusses how different parts of the electronics industry, such as data processing, wired communications, wireless communications, consumer electronics, automotive electronics, and industrial electronics were affected. It identifies key Japanese suppliers and manufacturers of components like semiconductors, displays, resins, and chemicals that were disrupted. Maps show the locations of affected material production sites and semiconductor fabrication plants in Japan.
IHS Webcast - Navigating Today’s Global Regulatory Environment Tevia Arnold
This document summarizes a presentation on navigating today's global regulatory environment and best practices for managing compliance. The presentation discusses the top 10 regulations companies face, how the regulatory landscape is constantly evolving, and the broadening view of sustainability beyond just regulations. It emphasizes that compliance is key to business value drivers like time to market, cost, quality and innovation. A framework is provided for a systematic approach to compliance, covering areas like identifying requirements, capturing product data, analyzing compliance, and documenting the process. Options for tracking regulations include doing it internally, hiring consultants, or using a regulatory management system.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Physiology and chemistry of skin and pigmentation, hairs, scalp, lips and nail, Cleansing cream, Lotions, Face powders, Face packs, Lipsticks, Bath products, soaps and baby product,
Preparation and standardization of the following : Tonic, Bleaches, Dentifrices and Mouth washes & Tooth Pastes, Cosmetics for Nails.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
IHS Webcast - Counterfeiting, Obsolescence, and Risk
1. Welcome to Today’s Webcast
Counterfeiting, Obsolescence, and Risk
Solutions to mitigate cost, risk, theft and security disruptions in your supply chain
April 7, 2010
3. Supply & Demand Chain Executive
The executive’s user manual for
successful supply and demand chain
transformation, providing analysis,
viewpoints and case studies to steer
executives and supply management
professionals through the world of
supply and demand chain enablement
to gain competitive advantage.
www.SDCExec.com
twitter.com/SDCExec
www.linkedin.com/in/andrewkreese
4. An Era of Counterfeiting
“We estimate that, based on
2008 data, the total global
economic value of counterfeit
and pirated products is as
much as $650 billion every
year…
…estimates imply that the
global value of counterfeit and
pirated products could be up to
$1.77 trillion by 2015.”
Frontier Economics, February 2011
4
5. Supply Chain Risk is High
SC BENCHMARK STUDY
What do counterfeits do
Increase warranty/maint. costs 65%
Reduce expected product life 64%
Inhibit sales / customer satisfaction 62%
Add to individual unit costs 51%
Increase development time/costs 38%
What do counterfeits cause?
Product quality/reliability failures 84%
Customer returns/recalls 67%
Production line stoppages 57%
Product launch delays 36%
What do counterfeits impact?
Damage brand / reputation 71%
Product safety / legal liability 55%
Expose contractual liability 42%
Compromise security 37%
Undermine compliance claims 44% “Jeopardize our missions
Source: “Benchmarking Counterfeit & Inferior Grade Components”,
Supply & Demand Chain Executive, 2009
and soldiers safety.”
6. Industry Fights Back
SAE International forms G-19 Committee that leads to AS5553
Purpose
This SAE Aerospace
Standard standardizes
practices to:
maximize availability of
authentic parts,
procure parts from reliable
sources,
assure authenticity and
conformance of procured
parts,
control parts identified as
counterfeit,
and report counterfeit parts
to other potential users
and Government
investigative authorities.
7. GIDEP and ERAI Counterfeit Reports
90% of all incidents reported by ERAI
SAE AS5553 Names Two
Primary Sources: ERAI and Reported Counterfeit Incidents
GIDEP
8. Congress Investigation Launched
“The presence of counterfeit
electronic parts in the Defense
Department’s supply chain is a
growing problem that government
and industry share a common
interest in solving.”
Carl Levin, D-Michigan, and
Sen. John McCain, R-Arizona
March 2011
9. Effects of the Japan Crisis
Panic Buying, Shortages, and Pricing Issues?
Source: IHS iSuppli 2011
10. Brokers Gone Wild… Already?
Already, calls into brokers are finding big increases in
pricing, with pricing increases of more than 100% seen
by several of the sourcing pros I spoke to this past week.
One of the challenges in using brokers in these emergency
situations is that the initial calls themselves can serve to
intensify pricing pressure.
As such, VPs and Directors of Direct would be very wise
to control, aggregate, and actively manage all calls to
brokers in an attempt to avoid what could be called “self-
competition.”
Brokers Wild – Pressure on Japanese Supply Chain Intensifies
Posted by Andrew Bartolini on April 1st, 2011
CPO Rising
11. Today’s Speakers
Mark Snider
President
ERAI, Inc
Daniel Bronstein
Solution Engineer, Electronic
Products & Solutions Group
IHS
11
12. Predictive
Obsolescence
Danny Bronstein
Solution Engineer - Direct Parts
Electronic Products & Solutions
Phone: +1 909 481 4150
Email: daniel.bronstein@ihs.com
INFORMATION
+
INSIGHT
=
KNOWLEDGE
33. Best Practices in Supplier and
Parts Risk Mitigation
Mark Snider, President
ERAI
34. My Commitment is Personal
Solving counterfeits is critical to our family
35. About ERAI Inc.
A World of Information at Your Fingertips
• Founded in 1995, ERAI is an information services organization that
monitors, investigates and reports issues affecting the global
electronics supply chain.
• ERAI provides tools to mitigate risks on substandard parts, counterfeit
parts, vendors and even customers.
• Subscribers include OEMs, CMs, Distributors, OCMs, government
agencies and industry associations.
• Actively involved in a number of committees and task forces
addressing the counterfeit issue.
• Founding participant in SAE International G-19 Counterfeit Electronic
Components Committee and several sub-groups
36. IHS and ERAI are Exclusive Partners
One provider of counterfeit alerts and supply chain risk mitigation
36
42. How difficult are these to detect?
Let’s look at another: Asiliant Technologies M69000
43. Very difficult… and getting worse.
“it wouldn’t take much more to make it perfect”
44. How Risk Enters Your Supply Chain
Intended and unintended ports of entry for counterfeits
1. Many unsafe part & supplier “sources”
• Online Broker Search Engines
• Maverick procurement methods or spending limits
• Google
2. These are counterfeit ports of entry
• Rapid access to millions of parts
• Minimal membership requirements
• Quick & easy access to a large audience of buyers
Request for Quote
Request for Quote
3. Are you creating your own shortages? Request for Quote
…
…
• Multiple RFQ’s create false demand signals …
…
Request for Quote
• Leads to price increases and incentive for counterfeiting
45. Best Practices to Avoid Risk
Stay Within Your Trusted Supply Chain
1. Direct from the Factory
2. Your Approved Vendor / Manufacturer (AVL / AML)
3. Other Franchised and Authorized Sources
4. Approved Independent Distributors
5. ERAI Members
6. Valid Alternate Parts or Sources
• Distributors, Aftermarket Sources
• Alternate Parts - Upgrades, Downgrades, Equivalents…
• Manufacturers and Products sanctioned by qualifying authorities
• Government QML/QPL
Contractually define your expectations. Test accordingly.
47. Vet the Open Market
Qualify your suppliers
ASK YOUR SUPPLIERS…
Industry Membership and Reporting?
Quality System and Processes?
Warranty and Insurance?
Supplier Qualification and Purchasing Process?
Non-Conforming Material Control?
Inspection and Test?
Efforts made to verify a Parts’ Authenticity before use?
48. Vet Real Stock from “Available” Parts
It limits risk exposure from fake sources and price games
49. Many Types of Supplier Risk Occur
A wide range of incidents pose serious business problems
50. “Where there’s a will, there’s a way.”
Past due invoices, wire fraud, faulty product for example…
51. “Where there’s a will, there’s a way.”
Company aliases are changing all the time
52. “Where there’s a will, there’s a way.”
Relationships exist across “new” supplier entities as well
53. BOM analysis is where our clients begin
It’s where “the rubber meets the road” to assess risk exposure
54. Risks are detected and monitored
Problems are immediately flagged and the BOM can be monitored thereafter
Actual Medical Devices Bill of Material (4 of 94 electronic components)
“IC's were failing to boot up.”
“Maxim stated in writing that they did not manufacture the product shown in the below noted
photographs. The lack of a country of origin and other visual nonconformities suggest the parts in
question have been remarked by an unauthorized third party.”
“Test report shows parts not performing up to spec, incorrect voltage.”
55. Conclusion: Address How You Buy
Explicitly tackle the difficult decisions head on
1. Are all open market sources the same? No
2. Does real stock versus “available stock” matter? Yes
3. Will a blanket policy preventing open market source
eliminate risk? Some
4. Do vetted open market suppliers require less
testing? No
5. Is buying only from authorized distribution practical
or technically feasible? Not always
Stay within your trusted supply chain.
56. Free Offer for Attendees: Risk Analysis
We will do a BOM risk assessment for webcast attendees
Fill Out Our Survey and Specify “YES” to Free Analysis
Or Send Email with Subject Line “April 7th Webcast Offer” to ProductMarketing@ihs.com
Limited to qualified electronics value chain entities.