A Q&A on API Technologies’ New RF/Microwave Engineering Online Design Tool with Molly Weis, RF/Microwave & Microelectronics (RF2M) Marketing Manager

by Jaymie Murray 15. October 2014 16:19

With the launch of API’s brand new RF/Microwave product configuration tool, engineers can now modify API’s standard RF/Microwave products to fit their individual requirements. The interactive tool allows for changes to existing designs, such as noise figure, frequency range, and power supply voltage and provides package style options.

Molly Weis, API’s RF/Microwave & Microelectronics (RF2M) Marketing Manager, has managed this project from the start, and has some insight as to what makes this tool so special.

Q: What was the motivation behind creating this tool?

A: Recently, API has begun offering more standard configurable products, such our new line of affordable surface mount synthesizers and we wanted to offer users an interactive tool that would allow them to explore all of our product capabilities. This tool puts the engineer in the driver’s seat, providing a way to design a product that fits user specifications with minimal effort.

Q: What are some of the tool’s benefits?

A: After the parameters are entered into the tool, it creates a printable, custom design summary based on the user’s specifications. The system supplies a permalink to the configuration, allowing the user to return to their design and make modifications as necessary. This link can then be easily shared among team members via email or social media, facilitating collaboration. 

Also, by having the engineer customize the product to their unique specifications up-front, we are able to shorten lead times and reduce costs. 

Q: Do you have any plans to expand the tool’s capabilities in the future?  

 A: Absolutely. As we continue to grow our configurable product offerings, the tool’s capabilities will be upgraded to include ways to modify those products to suit customer requirements. The beauty of this tool is that is extremely flexible and can be programmed to configure a multitude of variables.

Start using API's new configuration tool now!

Tags: , ,

RF/Microwave & Microelectronics

Can Certain Third Party Data Hacks be Prevented?

by Tara Condon 14. October 2014 13:03

By: Tara Condon & Henry Gold

 

Last fall, John Gainor, President and Chief Executive Officer of DQ, posted a memo for Dairy Queen and Orange Julius customers regarding a recent data hack. At its centerpiece, was the revelation that a third party vendor compromised account credentials and gained access to customer data.  DQ should be applauded for its thorough investigation following the attack and its forthright communication to customers regarding the same. However, the question remains for CISOs everywhere: Can this type of hack be prevented?

 

Third parties regularly access networks for legitimate reasons.

Companies regularly allow third party access to internal systems. Common reasons for enabling this access include systems administration and programming. Increasingly more common is the granting access of to information technology and communication service providers who troubleshoot, fix, and maintain computers, web sites, networking resources, and voice systems. Often, these third parties require administrator-level access to complete their work. Many times, access to these systems are not secured or well implemented using simple password authentication which is easily breached.

 


But, companies often have little control over third party activity on the network.

Companies typically control the front-end of vendor access with passwords or more robust security measures, such as software tokens or PKI based authentication (two-factor). However, once the third party is on the network, they typically have unmonitored, and often unfettered access, to a variety of systems. Here is where the risk of data theft or system breach is significantly increased. Even if the company ends its relationship with a third party, this risk is often undiminished as backdoors can be opened to a variety of network resources.

 

Companies spend a good deal of time and money to vet and hire employees. One hopes their third party vendors do the same, but that is not always the case. Companies may never meet or even see the wide network of third party employees who regularly work on their system. As such, gauging risk becomes nearly impossible.

 

A system that offers control and visibility is good for companies and third parties.

The ideal system provides controlled third party access along with visibility and monitoring. The good news is that these systems are available today. A company should be able to define and control who is on the network, what they may access, and what they are permitted to do. The system would then provide visibility into activities on the network and alert company representatives in the case of suspicious activity.

 

One would think that third parties bristle about added controls. However, many third parties have wholeheartedly embraced the concept. Having a third party access system in place makes their jobs easier: These third parties can focus on service delivery instead of concerning themselves with network access. Furthermore, the added visibility lets third parties demonstrate – in real time – the value they provide.

 

For more information on this and other security-related topics, follow our Secure Systems & Information Assurance (SSIA) team on LinkedIn.

 

About the Authors:

Tara Flynn Condon (@api_taracondon) is a published writer and Vice President of API Technologies Corp.

Henry Gold is an expert and frequent speaker on security topics and General Manager of SSIA North America for API Technologies Corp. 

Tags: , ,

Secure Systems & Information Assurance

API Technologies & European Microwave Week 2014: A Preview

by Jaymie Murray 2. October 2014 14:34

API will be exhibiting at this year’s European Microwave Week, held in Rome, Italy October 7-9. Here's a preview of API's RF/Microwave products and solutions on display at stand #177. We hope to see you in Rome!

For more info on any of these products, Contact an Engineer or Request a Quote.

Tags:

Month List

Tag cloud