Archive by Author

ITAR Requirements

ITAR Requirements

ITAR Requirements (International Trade in Arms Regulations) ITAR Compliance places requirements on companies entering markets with defense related applications.  To establish an effective ITAR program all segments of a business must be involved.  Important features of an ITAR program include the following: Registration with the Directorate of Defense Trade Controls (DDTC) Establishing an Export Compliance […]

Cybersecurity

Cybersecurity Threats

Cybersecurity Threats Cybersecurity threats continue to evolve.  In its 2018 Cyber Incident Breach Trends Report the Online Trust Alliance (OTA) listed some of the latest trends.  The report found that 95 percent of all breaches could have been easily prevented through simple and common-sense approaches to improving security.  The following are some of the more […]

COTS for Military Applications

COTS for Military Applications

COTS for Military Applications The Defense Department is integrating more Commercial Off the Shelf (COTS) components for military applications including mission critical systems.  While this is a fantastic opportunity for businesses to gain access to a lucrative market, it also poses some serious challenges. Once approved for a military application the manufacturer of the COTS […]

Capital One Cyberattack

Capital One Cyberattack

Capital One Cyberattack The Capital One cyberattack is a concern for small businesses.  Capital One said Monday that the personal information of approximately 106 million card customers and applicants had been compromised.  This is one of the largest cyberattacks on a big bank. The information of customers and applicants compromised included small businesses.  The Wall […]

Export Compliance, ITAR, and EAR

Export Compliance, ITAR, and EAR

Export Compliance, ITAR, and EAR Export Compliance can be a daunting task, but recent events illustrate the importance of vigilance.  On Tuesday, July 23, 2019 the Department of Justice indicted four Chinese nationals and a Chinese company for conspiracy to defraud the United States and evade sanctions.  The indictment alleges that the defendants sought to […]

ISO 27001 Cybersecurity

ISO 27001 Cybersecurity

ISO 27001 provides businesses effective cybersecurity against today’s threats.  Microsoft notified nearly 10,000 customers, in 2018 that they had been targeted.  Most of these customers were businesses.  The Director of National Intelligence (DNI) has identified Russia, China, Iran, and North Korea as nation-states responsible for most cyberattacks.  Other players include corporate competitors, organized crime, and […]

FCC approval

FCC Approval Process

FCC Streamlines Approval Process The FCC approval process has been streamlined for unintentional radiators.  Most electronic devices create radio frequency (RF) energy.  This energy can interfere with devices.  Intentional radiators are devices which communicate by way of radio frequencies (Bluetooth, Wi-Fi, radio).  Unintentional radiators create RF energy from their power supplies and digital components.  These […]

ISO 27001 Prevents Cyberattacks

ISO 27001 Prevents Cyberattacks

ISO 27001 Prevents Cyberattacks Implementing an ISO 27001 Information Security Management System (ISMS) prevents cyberattacks.  The Ponemon Institute in a 2017 study found that a typical firm experiences 130 security breaches each year.  Mitigating these breaches requires more than advanced IT practices, it requires a dedicated management system.  ISO/IEC 27001 is such a system.  It […]

EMC Test Plans

EMC Test Plans

EMC Test Plans EMC Test Plans are important in preparing for your trip to the lab.  The test plan should communicate all relevant information about the nature of the system to be tested.  This will allow the test lab to sufficiently assess the requirements needed to complete testing.  These requirements include: size of chamber, number […]

Developmental Test and Evaluation

Developmental Test and Evaluation

Developmental Test and Evaluation Developmental Test and Evaluation (DT&E) is normally conducted by designers of military equipment to verify that the product will meet specifications.  These tests are generally performed on the component level in a laboratory setting.  Testing is conducted early in the acquisition process.  Properly conducted, this testing can decrease the costs and […]

Counterfeit Parts

Counterfeit Parts and Quality Management Systems

Counterfeit Parts and Quality Management Systems (QMS) AS9100 and AS5553, provide a Quality Management System (QMS) approach to the problem of counterfeit parts for the aviation, space, and defense industries.  Unfortunately, counterfeit parts threaten every sector of manufacturing, most especially the electronics industry. Counterfeit Parts pose a Threat to OEMs The best product design is […]

Radiated Emissions Testing

EMI Emissions Test Failures Cost Time and Money

EMI emission test failures are a major cause of product development delays.  The fact is most products fail in their first trip to the lab.  Radiated Emissions is the most common problem and one that is difficult to fix.  This is true for both military and commercial products. EMI Emission Design Issues Application of ferrites […]

Quality Management System Documentation

Quality Management System Documentation

ISO 9001: 2015 Quality Management System Requirements Proper documentation is the cornerstone of ISO 9001:2015.  Creating a system of documentation that is appropriate to your company’s requirements is crucial.  This is because the documentation defines the manner in which it will conduct business.  Paying attention to the design of your Quality Management System (QMS) at […]

Using the tailoring process in MIL-STD-810

Using the Tailoring Process in MIL-STD-810

The Evolution of the Tailoring Process in MIL-STD-810 MIL-STD-810 is a standard for environmental developmental test and evaluation.  Its purpose is to provide guidance for the development of analysis and test criteria to evaluate materiel, identify deficiencies and defects, and demonstrate compliance.  The tailoring process develops valid test criteria for evaluation of materiel in MIL-STD-810. […]

Monitoring of Operational Testing

Monitoring of Operational Testing and MIL-STD-810

Monitoring of Operational Tests Monitoring of operational tests and the recording of all critical performance parameters has become a requirement in MIL-STD-810H. Operational testing has been a part of MIL-STD-810 since Revision C in 1975.  It refers to testing the item in a manner that represents service use as documented in the mission profile.  Successive […]

CVG Strategy - experts in Quality | ITAR | Test & Evaluation