Outsourcing and globalization have numerous benefits, but there is a downside—the proliferation of counterfeits and sales through unauthorized channels. This paper demonstrates the impact of counterfeits on electronics companies and gives solutions for finding the violators as well as a four-step roadmap for recovering revenue lost to counterfeits.
E-Business is the electronic connection of business operations to customers, suppliers, employees and other partners. E-Business refers to a broader definition of e-commerce, not just the buying and selling of goods and services, but also servicing customers, collaborating with business partners, conducting e-learning, and processing electronic transactions.
The making of counterfeit electronic parts have become a very big business across the globe. In fact, counterfeit electrical and electronic products now occupy second place after pharmaceuticals. Worldwide counterfeiting of electrical products is estimated to range anywhere between US $11 billion to US $20 billion annually. In North America
alone, the electrical product counterfeiting is estimated
to be in the US $300 million to US $ 400 million range and
rapidly growing. Research from the Mobile Manufacturers
Forum (MMF) says around 148 million counterfeit or
substandard mobile phones were sold worldwide in 2013,
mostly in developing countries. Our current issue highlights the “Issue of Electrical and Electronic products Counterfeiting” and needs of an effective anti-counterfeiting strategy to combat this problem. Apart from this the issue also covers industry updates including news, patents and events.
E-Business is the electronic connection of business operations to customers, suppliers, employees and other partners. E-Business refers to a broader definition of e-commerce, not just the buying and selling of goods and services, but also servicing customers, collaborating with business partners, conducting e-learning, and processing electronic transactions.
The making of counterfeit electronic parts have become a very big business across the globe. In fact, counterfeit electrical and electronic products now occupy second place after pharmaceuticals. Worldwide counterfeiting of electrical products is estimated to range anywhere between US $11 billion to US $20 billion annually. In North America
alone, the electrical product counterfeiting is estimated
to be in the US $300 million to US $ 400 million range and
rapidly growing. Research from the Mobile Manufacturers
Forum (MMF) says around 148 million counterfeit or
substandard mobile phones were sold worldwide in 2013,
mostly in developing countries. Our current issue highlights the “Issue of Electrical and Electronic products Counterfeiting” and needs of an effective anti-counterfeiting strategy to combat this problem. Apart from this the issue also covers industry updates including news, patents and events.
کسب و کار الکترونیکی،پیاده سازی کسب و کار الکترونیکی،E-business،تجارت الکترونیک،آموزش تجارت الکترونیکی،E-commerce،ایمیل مارکتینگ،Email marketing،بهینه سازی سایت،سئو،افزایش بازدید سایت،SEO،بازاریابی شبکه های اجتماعی،Social Net Work Marketing،بازاریابی محتوایی،Content Marketing،بازاریابی شبکه های اجتماعی،تولیدمحتوا،تبلیغات آنلاین،تبلیغات اینترنتی،Internet advertising،بازاریابی اینترنتی،بازاریابی آنلاین،کسب درآمد از طریق اینترنت طراحی، ساخت و پیاده سازی کسب و کارهای مبتنی بر وب
A extensive slideshow by
Rudi Vansnick – ISOC Belgium/EURALO
Garth Bruen – Knujon.com / NARALO
Discussion of the problems with Domain Registrations leading to ECRIME
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?Bernard Marr
By 2020, the Chinese social credit score system will be fully operational and have searchable records and a social credit score to rate trustworthiness for each of its 1.4 billion citizens. We review what the Chinese social credit score system is, how it's generated, and the implications.
کسب و کار الکترونیکی،پیاده سازی کسب و کار الکترونیکی،E-business،تجارت الکترونیک،آموزش تجارت الکترونیکی،E-commerce،ایمیل مارکتینگ،Email marketing،بهینه سازی سایت،سئو،افزایش بازدید سایت،SEO،بازاریابی شبکه های اجتماعی،Social Net Work Marketing،بازاریابی محتوایی،Content Marketing،بازاریابی شبکه های اجتماعی،تولیدمحتوا،تبلیغات آنلاین،تبلیغات اینترنتی،Internet advertising،بازاریابی اینترنتی،بازاریابی آنلاین،کسب درآمد از طریق اینترنت طراحی، ساخت و پیاده سازی کسب و کارهای مبتنی بر وب
A extensive slideshow by
Rudi Vansnick – ISOC Belgium/EURALO
Garth Bruen – Knujon.com / NARALO
Discussion of the problems with Domain Registrations leading to ECRIME
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?Bernard Marr
By 2020, the Chinese social credit score system will be fully operational and have searchable records and a social credit score to rate trustworthiness for each of its 1.4 billion citizens. We review what the Chinese social credit score system is, how it's generated, and the implications.
Open source plays a key role in the development of standards for the web. With open source, new technologies, or extensions to existing technologies, may be experimented and demonstrated during the early stages of standard development. This provides feedback to standard bodies during the design phase, making stadards more robust. This also makes sure that implementations are available as soon as the standard is finished, thus facilitating early adoption of new standards. We analyze in this talk the benefits that open source brings to open standards and conversely, based on the experience gained with the Amaya project that is conducted jointly by W3C and INRIA.
The next time your mobile phone
buzzes in your pocket, think tungsten.
The hard, steel-grey mineral is crucial to
the component that makes phones
vibrate. It is also used in ballpoint pens,
lightbulbs and in the wiring of heated
car windscreens.
Since last year, any listed US company
making such items has been required to
report exactly where its tungsten comes
from. Tungsten, along with tantalum,
tin and gold (collectively known as
3TG), is a “conflict mineral”, often
mined under exploitative conditions in
the Democratic Republic of Congo and
sold to fund warfare in the region.
To stop money going to these kinds of
producers, the 2010 Dodd-Frank Act
requires US manufacturers to audit
their supply chains and report on the
origins of their minerals.
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
Exploring new mobile and cloud platforms without a governance strategy can
have consequences.
At the beginning of my IT career, I witnessed a number of decisions and project management practices which, at the
time, just didn't seem to make sense. But I was young, and I often thought to myself that the people involved must have
some other reasoning, some justification for their actions that I was just not privy to.
In short, I remained quiet when I should have spoken up. What two decades of experience has taught me is that there
is rarely reasoning or justification behind actions that, at a gut-level, are clearly bad IT practices. We inherently
recognize when common sense has taken a back seat.
There is most definitely a dark side to BYOD. For the most part, I am an advocate for the consumerization of IT (using
non-standard apps and tools as a way to increase end user engagement and productivity) and support the bring-your-
own-device model.
However, as a seasoned manager and IT operations leader, I recognize the risks that come with the model if
organizations do not properly plan out their strategies, putting sufficient protections and governance practices in place
to manage the potential risks that could come from these unsupported devices and applications. End users often want
what’s NEW, but there are valid reasons for imposing and enforcing safeguards when giving mobile business users
access to your otherwise secure, scalable, and compliant systems.
Some people equate governance with bureaucracy and hierarchical systems, but those perceptions often come from a
lack of appreciation for the potential risks involved. Governance is about checks and balances -- supporting the tools
and systems your end users want, but in a way that is manageable and which follows defined protocols.
Examples of rogue IT practices
A (http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it-costing-us-organizations-almost-2b)recent uSamp survey
(http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it-costing-us-organizations-almost-2b) found that 41% of US mobile business
users have used unsanctioned services to share or sync files, despite 87% saying they are aware that their company
has a document sharing policy that prohibits this practice. And, 27% of mobile business users who “went rogue”,
reported immediate and direct repercussions, from lost business to expensive lawsuits and financial penalties that cost
$2 billion.
While most IT professionals understand these risks viscerally, some business users need to crash and burn before
they are willing to adjust their risky behaviors, which is not a message your employer wants to hear. Luckily, there is
another way: learning from the mistakes of others. This month, I am one of six mobile security and IT experts judging a
(http://www.rogueitstories.com/)"Rogue IT" contest (http://www.rogueitstories.com/). We’re collecting anonymous stories from the
community ...
Just how much device makers are on the hook for in patent licensing payouts is one of the most debated questions in the IP community. While a complete answer may remain elusive, an analytical approach can help manufacturers assess their risk.
Cisco has estimated that the Internet of Things (IoT) has the potential to generate about $19 trillion of value over the coming years. The staggering potential size-of-the-prize has certainly caught the attention of the world’s business community. In a recent survey of senior business leaders around the globe, 96% said their companies would be using IoT in some way within the next 3 years. However, there is a catch – most organizations are yet to derive significant commercial value from IoT. Our research shows that 70% of organizations do not generate service revenues from their IoT solutions. We have looked at why organizations are falling short in monetizing the IoT, and have tried to capture some initial observations on monetization models in what is still a very fast-developing marketplace.
Internet of Things in Reach Companies Rush Into Devices Li.docxmariuse18nolet
'Internet of Things' in Reach
Companies Rush Into Devices Like Smart Door Locks, Appliances,
but Limitations Exist
Wall Street Journal, January 5, 2014
By Don Clark
Workers prepare to hang the LG Electronics logo in preparation for the 2014 Consumer
Electronics Show at the Las Vegas Convention Center. Reuters
From meat thermometers monitored with a smartphone to Wi-Fi-equipped dog collars, devices and
services in homes and businesses are increasingly being connected to the Internet, a long-awaited
trend that is causing a surge of optimism in the tech sector.
Large and small companies are churning out a number of Internet-connected gadgets, a central theme
as the Consumer Electronics Show opens this week in Las Vegas.
Devices on the market or the drawing board include smart door locks, toothbrushes, wristwatches,
fitness trackers, smoke detectors, surveillance cameras, ovens, toys and robots.
But the much-ballyhooed Internet of Things still is largely a collection of possibilities. Sales of the
new-wave products are threatened by a number of stumbling blocks that could slow investment—
from conflicting wireless-communications standards to debates about how much processing power
should be built into gadgets.
Some industry executives say privacy concerns may be even more serious, without a consensus on
how to exploit all the data that could be generated by a flood of new sensors and Internet-connected
video cameras.
"Big data is worth absolutely nothing without big judgment," says Joseph Bradley, director of what
Cisco Systems Inc. calls its "Internet of Everything" consulting practice.
Nonetheless, heavyweights like General Electric Co, Intel Corp and Qualcomm Inc are jockeying for
position.
"I've never seen our industry go as fast as it is, or create as much value," says Marc Benioff, chief
executive of Salesforce.com Inc. "It's a very magical time."
Cisco estimates that the number of devices connected to the Internet will swell from about 10 billion
today to 50 billion by 2020, as wireless links spread beyond smartphones and PCs to many other
kinds of devices. The Silicon Valley giant's chief executive, John Chambers, is expected to discuss
the opportunities Tuesday in a keynote speech at CES.
Gartner Inc. puts the number of connected devices at fewer than 30 billion, but sees $309 billion in
additional revenue for product and service suppliers by 2020 and $1.9 trillion in total economic
impact from cost savings, improved productivity and other factors.
The vision of a world of smart gadgets emerged even before the Web. A.C. "Mike" Markkula, a co-
founder of Apple Computer Inc., had a brainstorm in the mid-1980s about combining functions for
networking and controlling devices on a single chip. Those "neurons," as they came to be called,
were expected to spread widely once their cost fell to around $1. But the company he founded,
Echelon Corp, didn't hit that target and has had a bumpy.
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Adler Law Group
Affiliate marketing is one of the most cost-effective techniques for monetizing web site traffic and driving sales. Unfortunately, it has a reputation for high risk. While the industry is unlikely to ever be risk-free, it is possible to manage risk by: (1) understanding how techniques like behavioral and contextual targeting affect consumers, affiliates and merchants, (2) understanding the legal and regulatory environment, (3) understating risks involved with prospective marketing partners, (4) using and maintaining proper contracts that allocate risk and provide appropriate indemnifications, and (5) keeping informed about the changes in technology, marketing practices and the regulatory environment. Attendees will learn how to identify these issues and develop policies and procedures to keep informed about the current technology, marketing strategies and regulatory compliance.
Topics covered include:
Behavioral/Contextual Advertising
Regulatory/Industry Compliance : FTC Guides & Enforcement Actions
CAN-SPAM compliance
IP Law: Rules governing use of others™ Trademarks/Keywords, Right of Publicity/Endorsement Issues.
Identifying, protecting against, and disputing accusations of Click-Fraud
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...Jeffrey Funk
This article will show that the current bubble has produced few profitable startups and involved few if any new digital technologies, nor technologies involving recent scientific advances, and thus it is unlikely that much that is productive will be left once the dust settles. There is a growth in old technologies such as e-commerce but little in new technologies such as AI. The startup losses are also much larger than in the past suggesting that fewer of today’s startups will still exist in a few years than those of 20 years ago.
GDPR: A Threat or Opportunity? www.normanbroadbent.Steven Salter
With General Data Protection Regulation (GDPR) a legal requirement for all UK companies from May 2018, there have been numerous articles written either demonstrating the confusion surrounding the new regulations, or detailing the downsides of the legislation.
Importance of Combating Gray Market ActivityNEW Momentum
In a study conducted recently by Components Director for a well known semiconductor supplier of both digital and analog devices, found out that over 90 million units of the products that got sold were gray market sales.
Counterfeiting – a major threat to the brandsNEW Momentum
Wikipedia refers to counterfeit products as “fake replicas of the real product and describes the forgeries of currency and documents, as well as the imitations of works of art, toys, clothing, software, pharmaceuticals, watches, electronics, handbags and shoes”.
The term “gray market” can be used in multiple ways. The two primary usages of this term indicate a market for legal goods that is carried on in a manner that is not intended by the original manufacturer of the goods.
How to Stop Gray Market and Counterfeit PiracyNEW Momentum
Theft. Piracy. Counterfeits. Gray market activity. These words and their implied threat to any company’s bottom line intimidate even the most intrepid executive.
"Outsourcing and globalization have numerous benefits, but they have a significant downside—the proliferation of counterfeits and sales through unauthorized channels."
Ways to End Gray Market Sales & Its EffectNEW Momentum
In today’s fast evolving global economy, gray market diversion is gradually becoming an acute concern that most brands encounter. Unlike black market practices, were refurbished, counterfeit or stolen products are sold as authentic brand products, gray market activities involve unauthorized movement of commerce across multiple territories by fake distributors and channel partners.
Strategies to combat grey market salesNEW Momentum
Developments in internet technology have made it possible for online shopping and ecommerce to flourish successfully. You have a wide selection of products today to choose from and some of them come with attractive discounts.
How to Stop Gray Market and Counterfeit PiracyNEW Momentum
This white paper discusses gray market issues and challenges; presents an overview of Archstone’s strategic approach, process and techniques for combating product diversion; and demonstrates the capabilities and effectiveness of New Momentum’s ERM software solutions in a plan of attack against diverters.
Impact of counterfeits on electronics companiesNEW Momentum
Outsourcing and globalization have numerous benefits, but there is a downside—the proliferation of counterfeits and sales through unauthorized channels. This paper demonstrates the impact of counterfeits on electronics companies and gives solutions for finding the violators as well as a four-step roadmap for recovering revenue lost to counterfeits.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Impact of counterfeits on electronics companies
1. IP Fraud Protection
Author: Chris Jensen is a Vice President at New Momentum (Irvine, CA), a company that
provides brand/IP Protection software to the electronics industry.
Email: cjensen@newmo.com
2. Abstract
Outsourcing and globalization have numerous benefits, but there is a downside—the proliferation
of counterfeits and sales through unauthorized channels. In 2006 U.S. Customs recorded over 15
billion IC imports. With one out of ten IT products containing counterfeits, according to a study
by AGMA and KPMG, 1.5 billion of those imported ICs are likely counterfeit. Unfortunately,
most semiconductor manufacturers don’t realize the extent of their revenue and reputation lost to
counterfeits. This paper demonstrates the impact of counterfeits on electronics companies and
gives solutions for finding the violators as well as a four-step roadmap for recovering revenue lost
to counterfeits.
3. IP FRAUD PROTECTION
Do You Know What Counterfeits are Costing Your Company?
Outsourcing and globalization have numerous benefits, but they have a significant downside—the
proliferation of counterfeits and sales through unauthorized channels. Semiconductor
manufacturers are losing billions every year to counterfeits and the gray market. In 2006, U.S.
Customs recorded more than 15 billion IC imports‐‐about 500 every second. Results of a study
conducted by AGMA (Association for Abatement of Gray Market and Counterfeits) and KPMG
showed that one out of every ten IT products contains counterfeit semiconductors. That means
1.5 billion of those imported ICs are likely counterfeit…about 50 counterfeits every second
flooding into the US. Do you know how many of those 1.5 billion (and the number is growing all
the time) are yours? Most semiconductor manufacturers don’t realize the extent of their revenue
loss to counterfeits.
And, revenues are not all you are losing. Company and product reputations are being eroded, and
legitimate channel partners lost. Jobs are also being lost. Especially painful in today’s economy,
counterfeits are believed to have cost 750,000 jobs in the US alone. The goal of this paper is to
demonstrate the impact counterfeits have on electronics companies, as well as provide solutions
to stop these unauthorized sales. And most important, this paper will show you why electronic
component manufacturers need to take action now before revenues and reputation are eroded
even further.
4. Here’s how counterfeits have impacted five semiconductor companies
The Semiconductor Industry Association (SIA) recently formed an Anti‐Counterfeiting Task
Force that conducted a study with these results:
Company A: Over 100 part numbers have been counterfeited in the past 5 years
Company B: 19 cases reported with 97,000 units
Company C: Since June 2006 there have been 4 US Customs seizures of counterfeits of
our products by US Customs; units seized ranged from 6,000 to 60,000
Company D: We estimate that 2‐3% of the purchases of our brand are counterfeit
Company E: A broker website indicated 40,000 of our devices available, but our
company had only made 200 units of that device with the specified date code. If all
40,000 were available, it would result in a $34-million loss.
5. Can your company afford these kinds of losses? By the way, this is the activity these
companies found without using the advanced technologies discussed later in this paper, which
would give them even greater visibility into counterfeit activity.
Why is now the time to take action?
Once thought to be too complex and sophisticated for counterfeiters, semiconductors, electronics,
and IT (information technology) products are now hot-ticket items in counterfeit manufacturing.
Lost sales, however, only account for a fraction of what companies sacrifice when their
intellectual property (IP) is stolen and their products are illegally produced. Counterfeiters steal
IP backed by million‐dollar investments in research and development, marketing, and
manufacturing. Moreover, illegitimate or substandard chips present the company with additional
costs to repair or replace defective products carrying their brand name.
6. A number of factors have coalesced to create a business environment in which manufacturing
counterfeit IP is not only lucrative, but also much more attainable than ever before. Counterfeiters
are becoming increasingly tech savvy, and their ability to obtain more advanced manufacturing
machinery and techniques has been one of the most crucial factors in fueling the production of
illegal high tech goods.
During the past decade, billions of dollars in foreign direct investment (FDI) have flowed into a
number of developing countries, such as China, leading to the proliferation of sophisticated
manufacturing processes and capabilities to produce high tech products. Counterfeit components
have long been a problem in the electronics industry, but as of late, companies are finding
themselves increasingly challenged with having to deal with counterfeit semiconductor
components. A second contributing factor is the popularity of e‐commerce. Many counterfeiters
are using the Internet to reach potential buyers. Without regulatory bodies able to police and
govern all product‐listing sites or advertisements sent out over email, the Web has become a
bastion for illegal sales of counterfeit products.
Why is the problem becoming more serious for semiconductor
companies?
Remarking one of the biggest problems
In the SIA study, remarking was the most common method of counterfeiting. Remarking involves
scraping a label off a chip package and printing on a new label. This can involve a different and
higher-priced brand, or a faster chip speed, or a military grade lot number on a commercial chip.
Most of the problem is coming from Shenzhen China, located on the border with Hong Kong.
You can find anything in Shenzhen—original, fake, new, and old components. It’s common to
7. find shops making fake “Samsung, Motorola,” etc. labels. The Chinese vendors say that making
the labels is easy—they simply select the specific component maker’s label from the program
library and then modify the data. The label quality is excellent.
Other counterfeiting tricks include incorrect die, inferior packaging materials, reproduction of
chip designs, packages without die, different labels on packages, and false RoHS (Restriction on
Hazardous Substances) notifications. Inaccurate notifications of whether a chip has lead can
affect a semiconductor manufacturer in two different, yet significant ways. First, if the chip
contains lead but has a false RoHS notification, the semiconductor manufacturer may have
products restricted from sale in some countries, face a lawsuit, and experience significant bad
publicity. Of greater concern, however, is when a part does not contain lead and the counterfeiter
asserts that it does. Parts without lead have reliability problems when used in applications in outer
space such as satellites or NASA flights.
How can you solve this problem?
There are several key areas you can focus on to reduce your company’s revenue erosion from
counterfeits: legal, operational, and technology (web search, encryption, lock & key).
What can you do through the legal system?
While many big players in the IT industry are making headlines as they break up crime rings,
small to midsize enterprises face a tough fight in their struggle to protect their IP. A number of
internal and external issues challenge companies’ ability to find, identify, and persecute
transgressors. How about encouraging US Customs to make semiconductor counterfeiting a
priority? While it may be easier to spot counterfeit luxury goods, fake semiconductors can result
much more dangerous (even deadly in the case of medical devices) situations.
8. How about the operational approach?
One important step in reducing counterfeiting is to focus on illegal sales on the gray market.
While some gray market brokers are legitimate, the gray market is an excellent outlet for
counterfeits. AGMA suggests examining companies trying to enter distribution channels and
monitoring contract manufacturers and distributors already in the supply chain. The organization
recommends thoroughly interviewing companies and investigating their background before
allowing them to become resellers or distributors. Once they enter the supply chain, AGMA
advises organizations to establish strict contracts, perform extensive auditing, and maintain close
relationships with its outsourcing partnerships.
Though the listings may be hidden in the deep recesses of the Internet, a couple effective search
words can bring up product listing after product listing of both legitimate and counterfeit goods.
Technology web search
Many companies that have resorted to manually scouring the Web for unauthorized product
listings and counterfeit goods have found this process time-consuming, tedious, and ineffective.
The up‐and‐coming technology is based on the collection and organization of unstructured data.
Unstructured data is information collected from a number of electronic sources that hasn’t been
arranged or organized into an understandable form. In the context of seeking out product listings,
this data can come from a number of sources including market Web sources, XML data sources,
B2B sites, forums, auctions, and emails advertising gray market sales.
Software solutions like this bring a number of benefits to manufacturers. Not only do they
eliminate the significant number of man-hours and resources manual searching required, these
9. systems can tap into information sources previously out of reach by traditional search methods
and thereby increase the amount of “area” a company can keep a watch on the marketplace. They
also highlight other market activity exceptions, such as new sellers entering the market and an
unexpected amount of selling or buying in a particular geographical region. When looking for an
IP-protection solution, make sure all reports and data collected are accessible through a Web
portal and that the supplier is a Software as a Service (SaaS) supplier. This makes data
immediately without any extensive installation processes and, more important, without the
involvement of other departments that may slow the deployment down.
Case Study
One Tier 1 fabless semiconductor manufacturer has already deployed this kind of system and saw
an immediate return on investment. In the first 30 days, the manufacturer found 500 cases of
unauthorized sales or counterfeit products previously undetected by its traditional monitoring
systems. Over a year’s time, if 6,000 unapproved transactions were prevented, the manufacturer
could save itself millions of dollars in lost revenue.
Collecting data and reports, however, doesn’t necessarily result in a decrease in counterfeiting;
the information needs to be put into action. Often when companies manage to receive timely
data on counterfeits or illegal gray market sales, they simply don’t know what to do with it. The
above manufacturer handled one if its instances of unauthorized sales through an unconventional
route: It tried to turn unauthorized distributors into legitimate ones.
The benefit of this strategy is two‐fold. First, if the distributor agrees to join the manufacturer’s
authorized channels, the manufacturer can then more easily monitor buying and selling activities
and more effectively ensure the products distributed are authentic. Second, in the event the
10. distributor declines the offer, its managers know the company has been identified as a
counterfeiter or an unauthorized sales channel and will likely stop selling the manufacturer’s
product.
How much revenue can a manufacturer expect to recover?
.
The four steps to recovering revenue
The roadmap to revenue recovery consists of visibility, plan development, plan
implementation, and the measurement of results.
Visibility – Step one on the map is a concentration on visibility. That means visibility into
the counterfeit and gray markets that require seeing who is doing what where and how much.
This search can isolate data that weeds out duplicate offerings, separates the players
(counterfeit, gray, suspect, etc.) and formats this information into meaningful metrics.
Typically, use of the advanced technologies mentioned earlier are combined with a
company’s investigation team or a company that specializes in high tech counterfeit
11. investigations. The technology is used to drill down not like a Google search or other search
companies, but taking it to the next level, and takes it to a dashboard and beyond to
compilation. When companies are exposed to the extent of their counterfeiting problem, their
eyes are opened.
Visibility depends upon data analysis and consequently cost analysis. This means identifying the
scope of the violations, and the first step is to identify where and with whom your products are
being sold. This translates into identifying counterfeit activity and gray market activity and their
estimated loss to the enterprise. Part of the loss may be unquantifiable as the public perception of
a brand is critical. The accuracy and speed of this information is critical. The technology needs to
find the comprehensive and unstructured market data from websites, email, file transfers as it
incorporates the information from your ERP data, PLM data, transactions history and run it
though data filtering and cleansing. The right market intelligence will help your team focus on
where you will get the highest return on your efforts. You will need to incorporate specific
technology solutions that will allow you to load your products and prices, allow for data analysis,
identify the scope of the violations and be able to report the return on investment (ROI) to
management.
Plan – Step two in revenue recovery is to develop a plan. When investigators work with a client,
they expect them to subscribe to one of the new advanced technologies and thus establish the
means to having visibility and intelligent data structure for creating a plan.
Many organizations underestimate the significance of the proper plan development. The more
time and effort the enterprise places in creating a comprehensive plan, the better the
implementation and results. Like any strong plan, the enterprise will need to set goals and
12. measure frequently. Its goals need to be realistic and cover a one- to two-year time frame. A
concentration on due-diligence investigations comes next. Tom McWeeney, senior VP of a high
counterfeit investigation agency, Corporate Risk International (CRI), says, “Each company we
investigate for has a different system and we work back and forth with them in a customized
manner.” An enterprise will want to plan every aspect of its program including test purchases and
due diligence. After reviewing the data, they will decide exactly how they will go about
approaching the seller that can lead to a buy. Initial questions that need to be answered include: Is
this a massive problem? Is it long-term? How much does the enterprise want to buy it for? What
quantity will allow it to become evidence if the enterprise decides to take civil/criminal action?
Do they need to purchase at a certain price? Is there a price that will strengthen their role as
evidence in future civil/criminal action? Should they get customs, FBI, Customs and Border
Patrol (CBP), and Immigration & Customs Enforcement (ICE) involved?
How should they maintain the evidence and for what time period? A test purchase can lead to the
need for test purchase engineering examination and in time to either civil action or criminal
action, or both. The enterprise may need to set goals for each of its sellers. The goal does not
always need to be civil or criminal action. An enterprise’s goal may be to make life so difficult
for the counterfeiters that they drop their product and move on to something else.
Implement plan – The third revenue recovery step is an implementation plan that carries out the
conclusions of the planning process. During this activity Tom McWeeney says, “Actionable
intelligence from the technology solution leads to whether to do buys or not.” With the right
information as background, the implementation is ready to begin. In this phase, the enterprise will
need to prioritize targets, follow through on plan, and incorporate the ability to consistently add
new data that could alter the actions that are to be taken. The enterprise should not be afraid to
outsource certain parts of its implementation to corporate risk specialists to the extent that such a
13. decision makes sense. With a comprehensive plan in place, the manufacturer can start assigning
due-diligence investigations and conduct strategic under cover test purchases in regard to high-
volume targets. This process identifies whether the subject in question is legally registered, has a
history of counterfeiting, or has a questionable general business profile. This step also may
include engineering analysis, civil action, and criminal action. The enterprise may want to do
some of this work with inside capabilities, but outsourcing is a viable alternative. When doing a
test purchase, CRI recommends a wire transfer because it allows the enterprise to have access to
valuable data on the counterfeiter’s financial institution.
This information may be helpful when taking civil and criminal action. Engineering analyses of
test purchases may lead to civil actions (cease and desist letters, lawsuit, etc.). The outsourced
undercover purchase of a product or part may require setting an undercover company. When
engaging in pursuit of criminal action, there may be a liaison with FBI, or CBP and ICE or all
three. Whatever actions are taken need to be coordinated in-house and with outside counsel. In
the long run, purchasing may require re-purchasing to ensure that the counterfeiters have actually
ceased their illegal activity.
Measure results
Step four is measure the results. Revenue recovery happens by intelligent discovery or as a
famous detective once said, “Just the facts Ma’am.” The measurement of the revenue recovery is
an outtake, a result of the process undergone. Part of any revenue recovery program needs to
include a method to consistently measure results. On a weekly basis, for instance, an enterprise
has to determine the value of the product on and off the market. They will want to record the
amount recovered through test purchases and document progress. They will take note of the
criminal and civil actions taken and their results. The enterprise’s management team needs to take
14. an active role in the revenue recovery process -- continually reviewing results data and
determining changes when needed. Or as Tom McWeeney reminds us, “Not all sales in a gray
market reflect back upon the OEM or legitimate distributor. The price has to be seen in the
context of market price and manufactured price.”
Data value requires close examination, and there are not necessarily experts in each part or
product. Companies need to look for sale prices that are not reasonable. They may do a buy, or
not, depending upon the discount. Is it a price that can lead to profit?
The results have to be presented to enterprise management. At the customer’s request, the
advanced technologies mentioned earlier can implement a monitoring process around an analysis
designed to produce a standard set of outputs that are “meeting” or “boardroom” ready. Armed
with these outputs, an intelligence group can attend high-level or even board-level meetings to
discuss changes in the gray market landscape, new brand, IP, or counterfeiting risks which may
be appearing. These risks can then be reduced with follow-up or ongoing legal action and an
overall strategy for setting priorities based on product families or technology groups. These
reports, which are provided in both a summary and detail level, consist of trending charts across
all product families; by customer assigned product family types showing change in market
activity; by individual part or part family within the product family; by geographical region for
quantity, number of buy/sell offers and number of new companies interested in the customer’s
products. The reports also include top-ten-style rankings of individual companies that trade in the
largest quantities of the customer’s products and that do the most number of transactions,
regardless of total quantity. All of the summaries and analytics above can always “drill” back to
the original open market buy/sell transaction that contributed to the total or summary. This data is
maintained historically and archived so that as patterns of activity or risk emerge in the analytics,
record-by-record research can be done back to the original time period where the pattern started.
15. An ongoing activity
Protecting brands and intellectual property from fraud is not a once in a lifetime event. It is an
ongoing activity. The steps above make it clear that an enterprise has to first understand its
problem and then it must develop a plan to mitigate the problem and this means getting a
management buy-in. Given the go-ahead, the plan must be implemented. After the findings and
action, the plan should be evaluated for its effectiveness.
But, the first and most critical step is to not underestimate the impact of counterfeits on revenues,
brand and distributor loyalty. A significant obstacle to successfully addressing counterfeiting
problems has been underestimating the problem due to the lack of dialogue and understanding of
the enormity of the problem in the electronics industry. Typically, companies grappling with
counterfeiting shy away from publicizing the problem. This relative silence has led many in the
industry to underestimate the enormity of counterfeiting and the amount of assets at stake. Now is
the time to take a stand against counterfeiting and push forward toward effective solutions to this
problem.