Counterfeit Electronics Detection – An Ontonix Success Story

From a Hill’s article: “… counterfeit electronics that threaten the reliability of military hardware and our critical infrastructure for telecommunications, energy and transportation. A study by the Senate Armed Services Committee found more than 1,800 cases of suspected counterfeits in advanced missile systems, helicopters, submarines and more. Because our company provides counterfeit detection services and…

Complexity-based Control of Dynamic Systems

Complexity-based control is possible because complexity can be measured in real-time using specifically developed hardware. The concept is illustrated below, whereby a QCM block is used to drive the complexity of a given system to desired levels. Because high complexity can lead to instability and fragility, the goal of QCM control is to drive complexity…

Complexity of Car Electronics: Testing and Reliability

In an interesting article¬†entitled Reliability Paradox for Worldwide Automotive Electronics and published in: 2017 Annual Reliability and Maintainability Symposium (RAMS), one may read: “Automotive Electronics is growing ever since the technological advancement has brought about a revolution in the Automotive Semiconductor and Telematics industry, especially in the past decade. Utilization of microelectronics and hence circuits’…

Complexity and Revisiting Anomaly Detection

Wikipedia: “In data mining, anomaly detection (also outlier detection) is the identification of rare items, events or observations which raise suspicions by differing significantly from the majority of the data. Typically the anomalous items will translate to some kind of problem such as bank fraud, a structural defect, medical problems or errors in a text.…

Why ICT Systems Implode

  Remember the recent British Airways IT meltdown? Problems with power supply are believed to have caused the crisis. Note the word “believed”. According to the mentioned source, when the power came back online, it did so in an uncontrolled manner, damaging the IT system and initiating a sequence of events that plunged the system…