Phone: 925.456.9900 Request for Quote
GDCA

Pioneer in Obsolescence Management and Legacy Sustainment for embedded technology

GDCA
GDCA

As the pioneer in COTS obsolescence management, GDCA is authorized by our OEM partners to continue to manufacture and repair the embedded legacy products critical to long-lasting applications. Using OEM-authorized IP and original specifications, GDCA provides repair, long-term customer support, manufacturing, and sustainment for over three thousand End-of-Life, COTS, and custom-embedded computer boards and systems.

  • The JTAG Interrogator: The Arrival of a New Counter-Counterfeiting Tool

    The JTAG Interrogator: The Arrival of a New Counter-Counterfeiting Tool

    The extent of component counterfeiting can be staggering when you think about it:

    • Unmarked refurbished units
    • Salvaged components dressed up to look new
    • Illegal clones or second-run components
    • Tainted components  manufactured with malicious hidden features

    If non-authentic components have made their way into your production line, then each such situation represents a unique set of potentially life-threatening risks and vulnerabilities even beyond cost and schedule slippage. Today, thanks to the developers at Corelis, Inc., the good guys have a new anti-counterfeiting weapon in their arsenal: the JTAG Interrogator.

  • US Navy: Sailing Full Steam Ahead… and Making Petro-Fuels Obsolete?

    US Navy: Sailing Full Steam Ahead… and Making Petro-Fuels Obsolete?

    Earlier this spring, scientists at the US Naval Research Laboratory (NRL) announced a prototype process for producing liquid hydrocarbon fuel from seawater. NRL’s proprietary process uses a modular reaction system to remove CO2 from seawater (with 92% efficiency) while producing hydrogen gas. Once separated, the nickel-supported catalyst conversion system combines them again into liquid hydrocarbon […]

  • DARPA’s Defense Against Counterfeiting: SHIELD

    DARPA’s Defense Against Counterfeiting: SHIELD

    At DARPA’s Microsystems Technology Office (MTO), proposals are already being accepted for the new Supply Chain Hardware Integrity for Electronics program, aka SHIELD. The SHIELD program will be the DOD’s response to component counterfeiting in the supply chain and will include the use of a “a small (100 micron x 100 micron) component, or dielet, that authenticates the provenance of electronics components. Proposed dielets should contain a full encryption engine, sensors to detect tampering and would readily affix to today’s electronic components such as microchips.” The goal, according to MTO Program Manager Kerry Bernstein is to provide a chip that monetarily and technically deincentivizes counterfeiting, yet can be produced for less than a penny per unit.

  • Microgrid Death Spiral: The Argument Over “Obsolete” Power Infrastructure

    Microgrid Death Spiral: The Argument Over “Obsolete” Power Infrastructure

    In January of 2013, the Edison Electric Institute released a report titled “Disruptive Challenges: Financial Implications and Strategic Responses to a Changing Retail Electric Business”, which outlined a variety of challenges traditional power utilities will face in the upcoming years. The current power infrastructure in the United States wasn’t constructed with end-user power generation in mind, so the increasing power independence of households and businesses creates threats of “irreparable damages to revenues and growth prospects.” Chief among new technologies are advanced renewable energy sources, including solar, and the growth of grid-independent distributed power generators, aka microgrids.

  • Counterfeit Components Hurt More Than Military Applications

    Counterfeit Components Hurt More Than Military Applications

    When reading the news around counterfeit components, much of the dialogue is driven by the defense industry. When you are dealing with systems that protect our national security and the lives of the people out in the field – you’re not dealing with counterfeits in a bunch of trivial electronics. You’re taking necessary steps to protect the lives of men and women who depend on the systems for their safety. Since 2011 more than 1800 cases of counterfeit components were reported in defense applications, including mission computers operating the THAAD missile system, in the Air Force’s C-27J, in the Navy’s P-8A, and in electromagnetic interference filters on an SH-60B helicopter.

    However, the trouble with counterfeits isn’t limited to the defense industry and the military. They’re just currently the ones driving the conversation and legislation such as the 2012 National Defense Authorization Act, Sec. 818.

  • A Tale of Two SHIELDS: Marvel Comics, DARPA, and Counterfeiting

    A Tale of Two SHIELDS: Marvel Comics, DARPA, and Counterfeiting

    Marvel Comic’s SHIELD (Strategic help Homeland Intervention, Enforcement, and Logistics Division) and, slick as it is, it is more likely to wind up counterfeited than prevent counterfeiting

    It is a program devised by a secretive government agency. Its purpose is to organize and motivate the top actors in their fields to come together to prevent crimes that threaten not only the economy but our national security. It focuses its attention on producing cutting-edge technologies. It is SHIELD, and it is becoming a reality.

    No . . . no . . . not that SHIELD. That’s Marvel Comic’s SHIELD (Strategic help Homeland Intervention, Enforcement, and Logistics Division) and, slick as it is, it is more likely to wind up counterfeited than prevent counterfeiting. We’re talking about the Supply Chain Hardware Integrity for Electronics Defense program being initiated by DARPA, and rather than placing a series of gigantic floating gun platforms in the upper atmosphere, it’s looking to place tiny 100 micron by 100 micron authentication dielets on all the electronic components used in Department of Defense programs.

  • Obsolescence: Too Soon or Not Soon Enough?

    Obsolescence: Too Soon or Not Soon Enough?

    It is strange how onboarding the concept of legacy sustainment can change the way you look at the world around you. On a recent road trip along one of the nation’s many two-lane highways, I found myself wondering about the thousands upon thousands of wooden utility poles dotting the landscape. How often are they repaired? […]

  • Keys to Managing DMSMS: A Clear Assessment of Obsolescence Risk

    Keys to Managing DMSMS: A Clear Assessment of Obsolescence Risk

    “Proactively consider DMSMS through[out] a system’s life cycle by anticipating potential DMSMS occurrences and taking appropriate logistics, acquisition, and budgeting steps to prevent DMSMS from adversely affecting readiness or total ownership cost.” SD-22 DMSMS Guidebook Continued from a previous post: Being Proactive While obsolescence management traditionally starts after products become mature, that is really waiting […]

Newsletter Signup