Working with a second source of supply is a favorable alternative in obsolescence management. Sanctioned by the original equipment manufacturer (OEM) with original IP, a second source of supply rebuilds and maintains the supply chain of prime contractors, supporting primes and their customers. New sources of supply can predict and resolve obsolescence issues before they […]
Reassessing your company’s approach to legacy sustainment is a critical step in minimizing stress and maximizing profits. Since the early 1950s, product life-cycle management (PLM) has been the commercial best practice for managing value and lifetime profitability of products and systems. However, as technology has advanced exponentially, so have the needs of managing products with […]
Obsolescence and Changing Our Minds You’ve got to know when to hold ’em Know when to fold ’em Know when to walk away And know when to run “The Gambler” – Kenny Rogers Maybe the writing is on the wall. Maybe the truth is hidden in between the lines of your BOM. Maybe you really […]
Innovative ways of thinking are tantamount to making changes in procedural methods. Just in Time (JIT) procurement for acquiring EOL’d embedded boards is often not an option for Legacy Equipment Manufacturing (LEM). Once an EOL notice has been issued and the parts for your system are no longer in production you’ll want to know the […]
When you need an embedded board that is still in production, it is easy to call the OEM, order what you want, and receive delivery. Because everything needed to produce your product is still readily available, you don’t have to worry about issues like accessibility, documentation, or counterfeit parts. However, after the point when an […]
Embedded World 2017 was a blast! After 2 weeks on the road of sub-zero temperatures in DC, Boston, Ottawa, and Montreal it was great to see spring for the first time in 2017 in Nürnberg (Nuremberg! German beer is best consumed in the sunshine!) At the fair, all the OEMs I spoke with were jam packed with […]
Those who have been keeping up know the threat counterfeiting poses to the embedded world. To this point, most of our conversations regarding counterfeits have been focused on the damage they can do to projects, the costs incurred to replace them, and the threat they pose to the security of the supply chain. However, there […]
At DARPA’s Microsystems Technology Office (MTO), proposals are already being accepted for the new Supply Chain Hardware Integrity for Electronics program, aka SHIELD. The SHIELD program will be the DOD’s response to component counterfeiting in the supply chain and will include the use of a “a small (100 micron x 100 micron) component, or dielet, that authenticates the provenance of electronics components. Proposed dielets should contain a full encryption engine, sensors to detect tampering and would readily affix to today’s electronic components such as microchips.” The goal, according to MTO Program Manager Kerry Bernstein is to provide a chip that monetarily and technically deincentivizes counterfeiting, yet can be produced for less than a penny per unit.
In January of 2013, the Edison Electric Institute released a report titled “Disruptive Challenges: Financial Implications and Strategic Responses to a Changing Retail Electric Business”, which outlined a variety of challenges traditional power utilities will face in the upcoming years. The current power infrastructure in the United States wasn’t constructed with end-user power generation in mind, so the increasing power independence of households and businesses creates threats of “irreparable damages to revenues and growth prospects.” Chief among new technologies are advanced renewable energy sources, including solar, and the growth of grid-independent distributed power generators, aka microgrids.
When reading the news around counterfeit components, much of the dialogue is driven by the defense industry. When you are dealing with systems that protect our national security and the lives of the people out in the field – you’re not dealing with counterfeits in a bunch of trivial electronics. You’re taking necessary steps to protect the lives of men and women who depend on the systems for their safety. Since 2011 more than 1800 cases of counterfeit components were reported in defense applications, including mission computers operating the THAAD missile system, in the Air Force’s C-27J, in the Navy’s P-8A, and in electromagnetic interference filters on an SH-60B helicopter.
However, the trouble with counterfeits isn’t limited to the defense industry and the military. They’re just currently the ones driving the conversation and legislation such as the 2012 National Defense Authorization Act, Sec. 818.