SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
Integrated Methods of Predictive
Obsolescence, Standards Management,
and Counterfeit Avoidance




Mr. Rory King, Design & Supply Chain, IHS Inc.
Mr. Greg Jaknunas, Design & Supply Chain, IHS Inc.
Thursday, September 01, 2011
DMSMS Standardization 2011
3:30 PM to 5:00 PM Concurrent Sessions
Standards and Databases for Counterfeit Mitigation
Session Chair: Mr. James Stein - Defense Standardization Program Office
 Copyright © 2011 IHS Inc. All Rights Reserved.
About IHS Inc.
 A Leading Information Provider

  • Founded in 1959: To provide product                            •   Tens of thousands of customers and hundreds
    catalogs for aerospace engineers
                                                                       of thousands end-users in 180+ countries
  • Today: Leading global source of critical                       •   Customers include nearly 70% of US
    information and insight dedicated to                               Fortune1000; 80% of Global Fortune 500
    providing the most complete and trusted
    information and expertise                                      Strong, Growing Products and Financials:
                                                                   • Public, NYSE:                IHS              (2005)
  • Employs 5,100 people in 30 countries                           • Revenue:                     $1.1B            (2010)

                                                 Areas of Expertise & Content
          Energy &                       Design &       Defense, Risk &   EHS &            Country & Industry   Commodities,
          Power                          Supply Chain   Security          Sustainability   Forecasts            Pricing & Cost




                                 2
Copyright © 2011 IHS Inc. All Rights Reserved.
Counterfeits by the Numbers
Magnitude of a growing, global problem

   $1.7 Trillion = Total Value of Global Counterfeits & Pirated Products
   …and 2.5 Million = Jobs Lost or Not Created as a Result
          According to: Frontier Economics, 2011



   $100 Billion or 10% = Amount of Global Technology Counterfeited
          According to: Alliance for Gray Market and Counterfeit Abatement and KPMG International, 2005



   $1.4 Billion = The Retail MSRP of U.S. Counterfeit Seizures in 2010
          According to: US Customs & Border Protection, US Immigration and Customs Enforcement, 2011



   40% Impacted = Percent of U.S. Defense Impacted by Fake and/or
     Damaged Parts
          According to: U.S. Government Accountability Office (GAO) , 2010



   26,794 = Counterfeit Electronics Incidents Reported from 2005-2008
          According to: U.S. Department of Commerce, Bureau of Industry & Security, OTE, January 2010


Copyright © 2011 IHS Inc. All Rights Reserved.
A Big Deal
   Risks to Company, Brand, and Performance

                                       What is the Impact of Counterfeit Electronics?
                                                     (% Respondents)
                               Undermine compliance claims                                               44%
COMPANY




                         Compromise device/product security                                       37%
 BRAND




                                   Expose contractual liability                                        42%
   &




                         Expose product safety / legal liability                                                   55%
                                   Damage brand / reputation                                                                      71%
PERFORMANCE OPERATIONS




                                        Product launch delays                                    36%
             PRODUCT




                                    Production line stoppages                                                        57%
                &




                                     Customer returns/recalls                                                                 67%
                             Product quality/reliability failures                                                                               84%
                           Increase product dev’pt time/costs                                      38%
  FINANCIAL




                                              Add to unit costs                                                51%
                                   Inhibit sales / customer sat                                                          62%
      &




                                Reduce expected product life                                                               64%
                               Increase warranty/maint. costs                                                               65%

                                                                    0%   10%   20%      30%      40%      50%      60%       70%      80%       90%
                                                                               Source: Benchmarking Counterfeit & Inferior Grade Components,
                                                                                       Supply & Demand Chain Executive & IHS Inc., April 2009
 Copyright © 2011 IHS Inc. All Rights Reserved.                                                                                                   4
A Huge Deal
Loss of Life and National Security in Jeopardy




                                                                      Shown: DailyTech LLC, June 17, 2011
      Source: Benchmarking Counterfeit & Inferior Grade Components,
      Supply & Demand Chain Executive & IHS Inc., April 2009

Copyright © 2011 IHS Inc. All Rights Reserved.                                                      5
Where are they going?
 U.S. Defense Electronic Parts Supply Chain




Copyright © 2011 IHS Inc. All Rights Reserved.   6
No Supplier is Immune from Risk
 Lack of accountability and traceability allows counterfeits to enter

                                                  “It is not uncommon, however,
                                                   for authorized distributors to
                                                   purchase parts outside of the
                                                   OCM supply chain in order to
                                                  fulfill customer requirements –
                                                  58 percent purchase parts from
                                                            other sources.

                                                    Specifically, 47 percent of
                                                 authorized distributors procure
                                                      parts from independent
                                                 distributors, 29 percent procure
                                                  from brokers, and 27 percent
                                                 procure from Internet-exclusive
                                                              sources.”
                                                      Source: U.S. Department of Commerce,
                                                             Office of Technology Evaluation,
                                                              Counterfeit Electronics Survey,
                                                                            November 2009.
                                                                                         7
Copyright © 2011 IHS Inc. All Rights Reserved.
Objective: Stay in the Trusted Supply Chain
 Best practices suggest a cascading level of degrees of risk


          1.         Direct from the Factory (OCM)
          2.         Approved Vendor / Manufacturer (AVL / AML)
          3.         Franchised and Authorized Distributors
          4.         Approved Independent Distributors & Brokers
          5.         ERAI Members
          6.         Low Risk and Qualified and Sources of Supply
                 •         valid sources of real stock, replacements, or alternate designs
                 •         from qualified government suppliers & manufacturers
                 •         with healthy supply chain, inventory, and lifecycle status
                 •         and vetted for bad supplier conduct or counterfeit part incidents
          ----------------------------------------------------------------------------------------
Stop      Below this line is high cost risk! Redesign and emulation are “lower”
             cost than (high risk) low cost unknown parts/sources.
Copyright © 2011 IHS Inc. All Rights Reserved.
SAE International:
 G-19 committee develops set of standards to mitigate counterfeits




            IHS Standards Expert™ is a standards management solution providing desktop access to critical standards,
  specifications, codes, and related documents from professional societies, trade associations, and national/international
                   standards developing organizations, with tools to manage standards across departments and divisions.

Copyright © 2011 IHS Inc. All Rights Reserved.                                                                               9
Purchasing Process Shall…
 Assess risk… including reports from GIDEP and ERAI




Copyright © 2011 IHS Inc. All Rights Reserved.        10
Defense Adoption and Counterfeit Incidents
 GIDEP and ERAI are the counterfeit reporting entities


           DOD Adoption: August 31, 2009         Incidents: 91% of reports via ERAI




                                                                   Source: IHS Inc. 2011
Copyright © 2011 IHS Inc. All Rights Reserved.
Link Between Counterfeits and Obsolescence
 Greatest risk from counterfeiters targeting obsolete parts




                                                 As of May 2011, a minimum of
                                                 54% of IHS-ERAI reported
                                                 counterfeit incidents were
                                                 component lifecycle status of
                                                 EOL/Lifebuy or Discontinued.

                                                               Source: IHS Inc. 2011
Copyright © 2011 IHS Inc. All Rights Reserved.                                     12
Obsolescence Mgt: Component Level
 Decision Support Research, Simulation, and Analysis
                    Semiconductor and Component Lifecycle                                        Component Management tools, like
      New Product                     Product Change                    End of Life (EOL) or
   Introduction (NPI)                Notification (PCN)               Discontinuance (PDN)
                                                                                                    IHS Parts Universe, combine
                                                                LTB Notice                        obsolescence forecasts, lifecycle
                                          Maturity
                         Growth
                                                          Decline
                                                                                                 documentation, and other decision-
                                                                                          LTB


          Introduction
                                            YTEOL                     Phase-out                 support information to automate and
                                  Today
                                                                               Obsolete
                                                                                                improve obsolescence management.




     IHS 4DOnline Parts Universe provides single-point access to current technical, lifecycle, compliance and sourcing information for
   millions of electronic components from over 1000 suppliers. It includes cross-references, datasheets, and environmental documents .

Copyright © 2011 IHS Inc. All Rights Reserved.                                                                                  13
Obsolescence Mgt: Entire BOM/Platform
 Decision Support Research, Simulation, and Analysis




                                                                 Leveraging BOM Tools In PLM, PDM, Or In
                                                                  This Case IHS BOM Manager Helps Move
                                                                              From MPN To Affected BOM

                                                                    With BOM Identified, End Unit Exposure
                                                                                         Can Be Correlated



             IHS BOM Manager monitors components in your bill of material for availability, regulatory compliance, obsolescence and
           counterfeit risks and cost reduction for a strategic, program-wide approach to component supply and logistics management .


Copyright © 2011 IHS Inc. All Rights Reserved.
Disasters: What About the Unpredictable?
 Japan produces over 50% of silicon wafers globally

                                                                                    Semiconductor Fabs
      Silicon Wafer Production                                 3                    1     Aizu Wakamatsu, Fukushima
      A Shin-Etsu Kamisu, Ibaraki
                                                                                           ON Semiconductor (Logic)
                                                                                           Fujitsu (Analog, Discrete, Memory)
      B Shin-Etsu Nishigo, Fukushima                                                       Texas Instruments (Analog, Optical)
                                                                                    2     Atsugi, Kanagawa
      C MEMC Utsunomiya, Tochigi
                                                                    6                      Mitsumi (Analog, Logic)
      D SUMCO Yonezawa, Yamagata                                                    3    Goshogawara, Aomori
                                                                                          Renesas (Logic)
                                                          13     10 9
                                                                                    4    Gunma
                                                                11
      Display Manufacturing                                 D                             ON Semiconductor (Discrete, Logic)
       Hitachi Displays                                     1          Epicenter         Renesas (Analog, Discrete)
       Panasonic LCD                                      B                        5    Hitachinaka, Ibaraki
       Tohoku Pioneer                                                                    Renesas (Logic, Micro, Memory)
                                                                                    6    Iwate
                                                     4
                                                          14       Fukushima              Fujitsu (Micro, Memory)
      Resins, Films, Chemicals,                          12 C                             Toshiba (Discrete)
      Copper Clad Laminate…                                 5
                                                          8 A                       7    Kof u, Yamanashi
                                                 7                                        Renesas (Analog, Logic, Micro)
                                                     2    Tokyo                     8    Miho, Ibaraki
                                                                                          Texas Instruments (Analog, Optical)
                                                                                    9    Miyagi
                                                                                          Fujitsu (Logic, Micro)
                                                                                          Rohm (Discrete, Micro)
                                                                                    10   Sendai, Miyagi
                                                                                          Freescale (Logic)
                                                                                    11   Shiroishi, Miyagi
                                                 Source: IHS iSuppli 2011                 Sony Semiconductor (Logic)
                                                                                    12   Tsukuba, Ibaraki
                                                                                          Rohm (Discrete)
                                                                                    13   Tsuruoka, Yamagata
                                                                                          Renesas (Logic)
                                                                                    14   Utsunomiya, Tochigi
                                                                                          Matushita (Discrete)


Copyright © 2011 IHS Inc. All Rights Reserved.
BOM Alert/Notification Tools Offer Warning
 Shown: Damaged tooling in the earthquake leads to obsolescence




                                                                                                   Source: IHS Inc. 2011

      IHS PCNalert Daily updates of PCNs, End of Life Notices , Supply Chain and Regulatory Events, as well as Counterfeit
                       Alerts for AVL parts to effectively monitor and quickly analyze potential sourcing and compliance risks

Copyright © 2011 IHS Inc. All Rights Reserved.
Applying Product and Supply Chain Events
 Tools can aggregate all events that may impact your BOM/Program




                                                                                       Counterfeit




 Design / Lifecycle                              Supply Chain     Regulatory       Counterfeit Part or
      Event                                        Failures     Compliance Event    Supplier Event



Copyright © 2011 IHS Inc. All Rights Reserved.                                                           17
Immediate Counterfeit Notification
 Part, BOM, Program alert to potential counterfeit risk in the market




                                                            Alert!




       IHS-ERAI solution includes value-added services, critical information, and risk assessment tools about thousands of
                               parts and suppliers in order to profile potential counterfeit, substandard, and high risk parts.

Copyright © 2011 IHS Inc. All Rights Reserved.                                                                               18
These go to Industry & Government Reports
 IHS exclusively provides single access to ERAI and GIDEP reports




                                                                AUTHORIZATION
                                                                  REQUIRED
                                                                   AUTHORIZATION
                                                                     REQUIRED




                                                 ERAI notices   GIDEP notices
Copyright © 2011 IHS Inc. All Rights Reserved.
Who is ERAI? Exclusive Partner of IHS
 Leader in Counterfeit Part & Supplier Market Intelligence


                                    ERAI Offers Thousands of Supplier & Part Incidents
                                                 An averages 25+ counterfeit incidents reported each week




Reported Parts

                                     Reported Suppliers
Copyright © 2011 IHS Inc. All Rights Reserved.                                                              20
Detailed ERAI Counterfeit Incident Detail
 Part, Date Code, Lot Code, Photos, Documents, etc.




Copyright © 2011 IHS Inc. All Rights Reserved.        21
Disqualify or Be Alerted to Bad Suppliers
 Past due invoices, wire fraud, faulty product for example…




Copyright © 2011 IHS Inc. All Rights Reserved.
Used to Locate Potential Vetted Suppliers
 Independent Distributors and Brokers in good standing




                                                 Assess Capabilities and Test Accordingly
                                                 Industry Membership and Reporting?
                                                 Quality System and Processes?
                                                 Warranty and Insurance?
                                                 Supplier Qualification and Purchasing Process?
                                                 Non-Conforming Material Control?
                                                 Inspection and Test?
                                                 Efforts made to verify a Parts’ Authenticity before use?




Copyright © 2011 IHS Inc. All Rights Reserved.
Who are trusted supply chain sources?
 What are all of the parts that meet our design criteria?




OCM & Aftermarket Sources


     AVL/AML Approved Suppliers


                           Authorized & Franchised Distributors

                                                            Approved Independents & Vetted Open Market Sources
Copyright © 2011 IHS Inc. All Rights Reserved.                                                                   24
So, what alternate sources exist?
 What are all of the parts that meet our design criteria?




    Functionally Equivalent?
    Equivalent Parts?
    Upgrades? Downgrades?
    Technical Specifications?
    Compliance Information?
Copyright © 2011 IHS Inc. All Rights Reserved.              25
Locate Cataloged Items in 3rd-Party Reference Sources

  What about Procurability and Qualification?
  Government catalogued parts and sourcing data for millions of items




             IHS Haystack Gold: Haystack Gold logistics management system contains parts and sourcing data for millions of items in the
             U.S. Federal Supply Catalog and over 70 U.S. Army, Navy, Air Force and related databases. Augment existing component and
                                               supplier data in internal PDM and ERP systems with XML and standard transport protocols

 Copyright © 2011 IHS Inc. All Rights Reserved.
Determine Procure-ability – Look for Problem Items

    Applying Procurement Intelligence
    Zeroing in on supply chain risk to BOM and Platforms




Weapon System Platform                              Metrics
                 Total Platform NIINs               148,865
    Matching Haystack Part Numbers                  667,884
                 NIINs with Inventory                10,500
      Parts found in QPD for all NIINs              490,134
     NFTD Part Numbers for all NIINs                 12,477
        Part Number with 5/9 Status                 159,838
  NIINs with Status Other than Active                10,304
                     NIINs still in HSG               9464
          Replacement NIINs in SegK                     771
               Inactive NIINs in NFTD                    98
             Total NIINs with No Data                    69
   Copyright © 2011 IHS Inc. All Rights Reserved.             27
Locate Cataloged Items in 3rd-Party Reference Sources

  Government Qualified Products Database (QPD)
  Parts and Vendors qualified to military specifications




 Copyright © 2011 IHS Inc. All Rights Reserved.            28
Find Qualified Sources of Supply

  Vendor Qualification
  Part Numbers, Stock Numbers ,and Vendors Meeting Criteria




 Copyright © 2011 IHS Inc. All Rights Reserved.               29
Find Government Qualified Parts, based on Military or Industry
Specifications

  Qualification Requirements Analysis




          IHS Military Specs & Standards: Collection of over 107,000 documents from U.S. Department of Defense (DoD) and related
          government/federal agencies. DoD standards state requirements in performance terms in order to make maximum use of non-
                                                       Government standards and commercial technologies, products, and practices.

 Copyright © 2011 IHS Inc. All Rights Reserved.                                                                              30
View Governing Specifications


  Qualification Requirement: MIL-PRF




 Copyright © 2011 IHS Inc. All Rights Reserved.   31
View Related Documents to the Governing Specification

  Single Access to Related Standards
  Cross-references to related documents




 Copyright © 2011 IHS Inc. All Rights Reserved.         32
Additional Qualification Requirements:
 Program Implementation of AS5553




Copyright © 2011 IHS Inc. All Rights Reserved.   33
Agility thru Tools and Decision-Support
Quickly and efficiently mitigate counterfeits and part/supplier risk




                                                    Supply Chain
                                                    and Lifecycle




                                           Design             Procurement




 Copyright © 2011 IHS Inc. All Rights Reserved.                             34
“In skating over thin ice
                                                  our safety is our speed”
                                                             Ralph Waldo Emerson




Copyright © 2011 IHS Inc. All Rights Reserved.
Thank You
Mr. Rory King, Design & Supply Chain, IHS Inc.
Rory.King@ihs.com

Mr. Greg Jaknunas, Design & Supply Chain, IHS Inc.
Greg.Jaknunas@ihs.com

Copyright © 2011 IHS Inc. All Rights Reserved.

Contenu connexe

En vedette

External Anti-counterfeit standards July 14th 2015
External Anti-counterfeit standards July 14th 2015External Anti-counterfeit standards July 14th 2015
External Anti-counterfeit standards July 14th 2015Jo_Vann
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3NTT Innovation Institute Inc.
 
Rendere flessibili e trasformare architetture IT di vecchio tipo: passaggio d...
Rendere flessibili e trasformare architetture IT di vecchio tipo:passaggio d...Rendere flessibili e trasformare architetture IT di vecchio tipo:passaggio d...
Rendere flessibili e trasformare architetture IT di vecchio tipo: passaggio d...Emanuele Della Valle
 
Anti-Counterfeit Primer
Anti-Counterfeit PrimerAnti-Counterfeit Primer
Anti-Counterfeit PrimerShantalla
 
Risk Mitigation Epics Purdue 10 Sept 2008
Risk Mitigation Epics Purdue 10 Sept 2008Risk Mitigation Epics Purdue 10 Sept 2008
Risk Mitigation Epics Purdue 10 Sept 2008enginerd
 
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingCisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingZivaro Inc
 
Strategic Management In Product Lifecycle
Strategic Management In Product LifecycleStrategic Management In Product Lifecycle
Strategic Management In Product Lifecycledivlekha
 
Market Intelligence Briefing and Government Panel: Cloud Sales Opportunities
Market Intelligence Briefing and Government Panel: Cloud Sales OpportunitiesMarket Intelligence Briefing and Government Panel: Cloud Sales Opportunities
Market Intelligence Briefing and Government Panel: Cloud Sales OpportunitiesimmixGroup
 
Big Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better TogetherBig Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better TogetherZivaro Inc
 
eCommerce Warehouse Management System and Robotics
eCommerce Warehouse Management System and RoboticseCommerce Warehouse Management System and Robotics
eCommerce Warehouse Management System and RoboticsXp3rtCM0
 
Oshkosh 1070 f heavy equipment transporter, united kingdom
Oshkosh 1070 f heavy equipment transporter, united kingdomOshkosh 1070 f heavy equipment transporter, united kingdom
Oshkosh 1070 f heavy equipment transporter, united kingdomhindujudaic
 
Automatic car speed +rf control (1)
Automatic car speed +rf control (1)Automatic car speed +rf control (1)
Automatic car speed +rf control (1)Vikrant Verma
 
Getting hired 101 | Lessons from Where's Waldo
Getting hired 101 | Lessons from Where's WaldoGetting hired 101 | Lessons from Where's Waldo
Getting hired 101 | Lessons from Where's WaldoBenjamin W. Jackson
 
Dematic Logistics Review Volume3
Dematic Logistics Review Volume3Dematic Logistics Review Volume3
Dematic Logistics Review Volume3Joe Bui
 
CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementTim Bass
 
SandeepKumar _Resume
SandeepKumar _ResumeSandeepKumar _Resume
SandeepKumar _ResumeSandeep Kumar
 
Dematic Logistics Review #5
Dematic Logistics Review #5Dematic Logistics Review #5
Dematic Logistics Review #5hagenbucksw
 
Value Acceleration Eikenzande
Value Acceleration EikenzandeValue Acceleration Eikenzande
Value Acceleration EikenzandePaul Van Doorn
 

En vedette (20)

External Anti-counterfeit standards July 14th 2015
External Anti-counterfeit standards July 14th 2015External Anti-counterfeit standards July 14th 2015
External Anti-counterfeit standards July 14th 2015
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
 
Rendere flessibili e trasformare architetture IT di vecchio tipo: passaggio d...
Rendere flessibili e trasformare architetture IT di vecchio tipo:passaggio d...Rendere flessibili e trasformare architetture IT di vecchio tipo:passaggio d...
Rendere flessibili e trasformare architetture IT di vecchio tipo: passaggio d...
 
Anti-Counterfeit Primer
Anti-Counterfeit PrimerAnti-Counterfeit Primer
Anti-Counterfeit Primer
 
Risk Mitigation Epics Purdue 10 Sept 2008
Risk Mitigation Epics Purdue 10 Sept 2008Risk Mitigation Epics Purdue 10 Sept 2008
Risk Mitigation Epics Purdue 10 Sept 2008
 
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingCisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined Networking
 
Strategic Management In Product Lifecycle
Strategic Management In Product LifecycleStrategic Management In Product Lifecycle
Strategic Management In Product Lifecycle
 
Balancing Chemical Equations
Balancing Chemical EquationsBalancing Chemical Equations
Balancing Chemical Equations
 
Market Intelligence Briefing and Government Panel: Cloud Sales Opportunities
Market Intelligence Briefing and Government Panel: Cloud Sales OpportunitiesMarket Intelligence Briefing and Government Panel: Cloud Sales Opportunities
Market Intelligence Briefing and Government Panel: Cloud Sales Opportunities
 
Big Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better TogetherBig Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better Together
 
eCommerce Warehouse Management System and Robotics
eCommerce Warehouse Management System and RoboticseCommerce Warehouse Management System and Robotics
eCommerce Warehouse Management System and Robotics
 
Oshkosh 1070 f heavy equipment transporter, united kingdom
Oshkosh 1070 f heavy equipment transporter, united kingdomOshkosh 1070 f heavy equipment transporter, united kingdom
Oshkosh 1070 f heavy equipment transporter, united kingdom
 
Automatic car speed +rf control (1)
Automatic car speed +rf control (1)Automatic car speed +rf control (1)
Automatic car speed +rf control (1)
 
Getting hired 101 | Lessons from Where's Waldo
Getting hired 101 | Lessons from Where's WaldoGetting hired 101 | Lessons from Where's Waldo
Getting hired 101 | Lessons from Where's Waldo
 
Dematic Logistics Review Volume3
Dematic Logistics Review Volume3Dematic Logistics Review Volume3
Dematic Logistics Review Volume3
 
CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk Management
 
Mareck Resume
Mareck ResumeMareck Resume
Mareck Resume
 
SandeepKumar _Resume
SandeepKumar _ResumeSandeepKumar _Resume
SandeepKumar _Resume
 
Dematic Logistics Review #5
Dematic Logistics Review #5Dematic Logistics Review #5
Dematic Logistics Review #5
 
Value Acceleration Eikenzande
Value Acceleration EikenzandeValue Acceleration Eikenzande
Value Acceleration Eikenzande
 

Similaire à DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk Mitigation

Counterfeit risk mitigation 06 21 2011 (2)
Counterfeit risk mitigation 06 21 2011 (2)Counterfeit risk mitigation 06 21 2011 (2)
Counterfeit risk mitigation 06 21 2011 (2)Kristal Snider
 
Avoiding Counterfeit Risk: How to mitigate part and supplier risk
Avoiding Counterfeit Risk: How to mitigate part and supplier risk Avoiding Counterfeit Risk: How to mitigate part and supplier risk
Avoiding Counterfeit Risk: How to mitigate part and supplier risk IHS
 
Avoiding Counterfeit Risk
Avoiding Counterfeit RiskAvoiding Counterfeit Risk
Avoiding Counterfeit RiskKristal Snider
 
How to reach business professionals online
How to reach business professionals onlineHow to reach business professionals online
How to reach business professionals onlineSAP
 
August 2010 Presentation
August 2010 PresentationAugust 2010 Presentation
August 2010 PresentationIntact
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)Jeremiah Grossman
 
Converge protecting the supply chain
Converge protecting the supply chainConverge protecting the supply chain
Converge protecting the supply chainConvergeComponents
 
Brand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBrand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBilcareltd
 
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)Mark Heid
 
UL Product Mindset Industry Report Household Chemicals
UL Product Mindset Industry Report Household ChemicalsUL Product Mindset Industry Report Household Chemicals
UL Product Mindset Industry Report Household ChemicalsUL
 
Counterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsCounterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsIHS
 
Accelerate Life Sales with Smarter Process Technology
Accelerate Life Sales with Smarter Process TechnologyAccelerate Life Sales with Smarter Process Technology
Accelerate Life Sales with Smarter Process TechnologyMichelle Dufty
 
Customer Experience Mega Trends For Financial Services
Customer Experience Mega Trends For Financial ServicesCustomer Experience Mega Trends For Financial Services
Customer Experience Mega Trends For Financial ServicesIntelliResponse Systems Inc.
 
ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training Kristal Snider
 
Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Thomas Roider
 
Supply Chain Risk Mitigation
Supply Chain Risk MitigationSupply Chain Risk Mitigation
Supply Chain Risk MitigationIHS
 
Insights unlimited
Insights unlimitedInsights unlimited
Insights unlimitedLen Starnes
 
Information securitysurveyreportnovninefinal
Information securitysurveyreportnovninefinalInformation securitysurveyreportnovninefinal
Information securitysurveyreportnovninefinalDilpreeta Vasudeva
 
Motorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in HealthcareMotorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in Healthcare3GDR
 

Similaire à DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk Mitigation (20)

Counterfeit risk mitigation 06 21 2011 (2)
Counterfeit risk mitigation 06 21 2011 (2)Counterfeit risk mitigation 06 21 2011 (2)
Counterfeit risk mitigation 06 21 2011 (2)
 
Avoiding Counterfeit Risk: How to mitigate part and supplier risk
Avoiding Counterfeit Risk: How to mitigate part and supplier risk Avoiding Counterfeit Risk: How to mitigate part and supplier risk
Avoiding Counterfeit Risk: How to mitigate part and supplier risk
 
Avoiding Counterfeit Risk
Avoiding Counterfeit RiskAvoiding Counterfeit Risk
Avoiding Counterfeit Risk
 
How to reach business professionals online
How to reach business professionals onlineHow to reach business professionals online
How to reach business professionals online
 
August 2010 Presentation
August 2010 PresentationAugust 2010 Presentation
August 2010 Presentation
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
 
Converge protecting the supply chain
Converge protecting the supply chainConverge protecting the supply chain
Converge protecting the supply chain
 
Brand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBrand Protection & Security of Engineering Components
Brand Protection & Security of Engineering Components
 
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
 
UL Product Mindset Industry Report Household Chemicals
UL Product Mindset Industry Report Household ChemicalsUL Product Mindset Industry Report Household Chemicals
UL Product Mindset Industry Report Household Chemicals
 
Counterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsCounterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense Regulations
 
Accelerate Life Sales with Smarter Process Technology
Accelerate Life Sales with Smarter Process TechnologyAccelerate Life Sales with Smarter Process Technology
Accelerate Life Sales with Smarter Process Technology
 
Customer Experience Mega Trends For Financial Services
Customer Experience Mega Trends For Financial ServicesCustomer Experience Mega Trends For Financial Services
Customer Experience Mega Trends For Financial Services
 
ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training
 
Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Demandware tco webinar final 12122012
Demandware tco webinar final 12122012
 
Auto component
Auto componentAuto component
Auto component
 
Supply Chain Risk Mitigation
Supply Chain Risk MitigationSupply Chain Risk Mitigation
Supply Chain Risk Mitigation
 
Insights unlimited
Insights unlimitedInsights unlimited
Insights unlimited
 
Information securitysurveyreportnovninefinal
Information securitysurveyreportnovninefinalInformation securitysurveyreportnovninefinal
Information securitysurveyreportnovninefinal
 
Motorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in HealthcareMotorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in Healthcare
 

Dernier

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk Mitigation

  • 1. Integrated Methods of Predictive Obsolescence, Standards Management, and Counterfeit Avoidance Mr. Rory King, Design & Supply Chain, IHS Inc. Mr. Greg Jaknunas, Design & Supply Chain, IHS Inc. Thursday, September 01, 2011 DMSMS Standardization 2011 3:30 PM to 5:00 PM Concurrent Sessions Standards and Databases for Counterfeit Mitigation Session Chair: Mr. James Stein - Defense Standardization Program Office Copyright © 2011 IHS Inc. All Rights Reserved.
  • 2. About IHS Inc. A Leading Information Provider • Founded in 1959: To provide product • Tens of thousands of customers and hundreds catalogs for aerospace engineers of thousands end-users in 180+ countries • Today: Leading global source of critical • Customers include nearly 70% of US information and insight dedicated to Fortune1000; 80% of Global Fortune 500 providing the most complete and trusted information and expertise Strong, Growing Products and Financials: • Public, NYSE: IHS (2005) • Employs 5,100 people in 30 countries • Revenue: $1.1B (2010) Areas of Expertise & Content Energy & Design & Defense, Risk & EHS & Country & Industry Commodities, Power Supply Chain Security Sustainability Forecasts Pricing & Cost 2 Copyright © 2011 IHS Inc. All Rights Reserved.
  • 3. Counterfeits by the Numbers Magnitude of a growing, global problem $1.7 Trillion = Total Value of Global Counterfeits & Pirated Products …and 2.5 Million = Jobs Lost or Not Created as a Result According to: Frontier Economics, 2011 $100 Billion or 10% = Amount of Global Technology Counterfeited According to: Alliance for Gray Market and Counterfeit Abatement and KPMG International, 2005 $1.4 Billion = The Retail MSRP of U.S. Counterfeit Seizures in 2010 According to: US Customs & Border Protection, US Immigration and Customs Enforcement, 2011 40% Impacted = Percent of U.S. Defense Impacted by Fake and/or Damaged Parts According to: U.S. Government Accountability Office (GAO) , 2010 26,794 = Counterfeit Electronics Incidents Reported from 2005-2008 According to: U.S. Department of Commerce, Bureau of Industry & Security, OTE, January 2010 Copyright © 2011 IHS Inc. All Rights Reserved.
  • 4. A Big Deal Risks to Company, Brand, and Performance What is the Impact of Counterfeit Electronics? (% Respondents) Undermine compliance claims 44% COMPANY Compromise device/product security 37% BRAND Expose contractual liability 42% & Expose product safety / legal liability 55% Damage brand / reputation 71% PERFORMANCE OPERATIONS Product launch delays 36% PRODUCT Production line stoppages 57% & Customer returns/recalls 67% Product quality/reliability failures 84% Increase product dev’pt time/costs 38% FINANCIAL Add to unit costs 51% Inhibit sales / customer sat 62% & Reduce expected product life 64% Increase warranty/maint. costs 65% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Source: Benchmarking Counterfeit & Inferior Grade Components, Supply & Demand Chain Executive & IHS Inc., April 2009 Copyright © 2011 IHS Inc. All Rights Reserved. 4
  • 5. A Huge Deal Loss of Life and National Security in Jeopardy Shown: DailyTech LLC, June 17, 2011 Source: Benchmarking Counterfeit & Inferior Grade Components, Supply & Demand Chain Executive & IHS Inc., April 2009 Copyright © 2011 IHS Inc. All Rights Reserved. 5
  • 6. Where are they going? U.S. Defense Electronic Parts Supply Chain Copyright © 2011 IHS Inc. All Rights Reserved. 6
  • 7. No Supplier is Immune from Risk Lack of accountability and traceability allows counterfeits to enter “It is not uncommon, however, for authorized distributors to purchase parts outside of the OCM supply chain in order to fulfill customer requirements – 58 percent purchase parts from other sources. Specifically, 47 percent of authorized distributors procure parts from independent distributors, 29 percent procure from brokers, and 27 percent procure from Internet-exclusive sources.” Source: U.S. Department of Commerce, Office of Technology Evaluation, Counterfeit Electronics Survey, November 2009. 7 Copyright © 2011 IHS Inc. All Rights Reserved.
  • 8. Objective: Stay in the Trusted Supply Chain Best practices suggest a cascading level of degrees of risk 1. Direct from the Factory (OCM) 2. Approved Vendor / Manufacturer (AVL / AML) 3. Franchised and Authorized Distributors 4. Approved Independent Distributors & Brokers 5. ERAI Members 6. Low Risk and Qualified and Sources of Supply • valid sources of real stock, replacements, or alternate designs • from qualified government suppliers & manufacturers • with healthy supply chain, inventory, and lifecycle status • and vetted for bad supplier conduct or counterfeit part incidents ---------------------------------------------------------------------------------------- Stop Below this line is high cost risk! Redesign and emulation are “lower” cost than (high risk) low cost unknown parts/sources. Copyright © 2011 IHS Inc. All Rights Reserved.
  • 9. SAE International: G-19 committee develops set of standards to mitigate counterfeits IHS Standards Expert™ is a standards management solution providing desktop access to critical standards, specifications, codes, and related documents from professional societies, trade associations, and national/international standards developing organizations, with tools to manage standards across departments and divisions. Copyright © 2011 IHS Inc. All Rights Reserved. 9
  • 10. Purchasing Process Shall… Assess risk… including reports from GIDEP and ERAI Copyright © 2011 IHS Inc. All Rights Reserved. 10
  • 11. Defense Adoption and Counterfeit Incidents GIDEP and ERAI are the counterfeit reporting entities DOD Adoption: August 31, 2009 Incidents: 91% of reports via ERAI Source: IHS Inc. 2011 Copyright © 2011 IHS Inc. All Rights Reserved.
  • 12. Link Between Counterfeits and Obsolescence Greatest risk from counterfeiters targeting obsolete parts As of May 2011, a minimum of 54% of IHS-ERAI reported counterfeit incidents were component lifecycle status of EOL/Lifebuy or Discontinued. Source: IHS Inc. 2011 Copyright © 2011 IHS Inc. All Rights Reserved. 12
  • 13. Obsolescence Mgt: Component Level Decision Support Research, Simulation, and Analysis Semiconductor and Component Lifecycle Component Management tools, like New Product Product Change End of Life (EOL) or Introduction (NPI) Notification (PCN) Discontinuance (PDN) IHS Parts Universe, combine LTB Notice obsolescence forecasts, lifecycle Maturity Growth Decline documentation, and other decision- LTB Introduction YTEOL Phase-out support information to automate and Today Obsolete improve obsolescence management. IHS 4DOnline Parts Universe provides single-point access to current technical, lifecycle, compliance and sourcing information for millions of electronic components from over 1000 suppliers. It includes cross-references, datasheets, and environmental documents . Copyright © 2011 IHS Inc. All Rights Reserved. 13
  • 14. Obsolescence Mgt: Entire BOM/Platform Decision Support Research, Simulation, and Analysis Leveraging BOM Tools In PLM, PDM, Or In This Case IHS BOM Manager Helps Move From MPN To Affected BOM With BOM Identified, End Unit Exposure Can Be Correlated IHS BOM Manager monitors components in your bill of material for availability, regulatory compliance, obsolescence and counterfeit risks and cost reduction for a strategic, program-wide approach to component supply and logistics management . Copyright © 2011 IHS Inc. All Rights Reserved.
  • 15. Disasters: What About the Unpredictable? Japan produces over 50% of silicon wafers globally Semiconductor Fabs Silicon Wafer Production 3 1 Aizu Wakamatsu, Fukushima A Shin-Etsu Kamisu, Ibaraki  ON Semiconductor (Logic)  Fujitsu (Analog, Discrete, Memory) B Shin-Etsu Nishigo, Fukushima  Texas Instruments (Analog, Optical) 2 Atsugi, Kanagawa C MEMC Utsunomiya, Tochigi 6  Mitsumi (Analog, Logic) D SUMCO Yonezawa, Yamagata 3 Goshogawara, Aomori  Renesas (Logic) 13 10 9 4 Gunma 11 Display Manufacturing D  ON Semiconductor (Discrete, Logic)  Hitachi Displays 1 Epicenter  Renesas (Analog, Discrete)  Panasonic LCD B 5 Hitachinaka, Ibaraki  Tohoku Pioneer  Renesas (Logic, Micro, Memory) 6 Iwate 4 14 Fukushima  Fujitsu (Micro, Memory) Resins, Films, Chemicals, 12 C  Toshiba (Discrete) Copper Clad Laminate… 5 8 A 7 Kof u, Yamanashi 7  Renesas (Analog, Logic, Micro) 2 Tokyo 8 Miho, Ibaraki  Texas Instruments (Analog, Optical) 9 Miyagi  Fujitsu (Logic, Micro)  Rohm (Discrete, Micro) 10 Sendai, Miyagi  Freescale (Logic) 11 Shiroishi, Miyagi Source: IHS iSuppli 2011  Sony Semiconductor (Logic) 12 Tsukuba, Ibaraki  Rohm (Discrete) 13 Tsuruoka, Yamagata  Renesas (Logic) 14 Utsunomiya, Tochigi  Matushita (Discrete) Copyright © 2011 IHS Inc. All Rights Reserved.
  • 16. BOM Alert/Notification Tools Offer Warning Shown: Damaged tooling in the earthquake leads to obsolescence Source: IHS Inc. 2011 IHS PCNalert Daily updates of PCNs, End of Life Notices , Supply Chain and Regulatory Events, as well as Counterfeit Alerts for AVL parts to effectively monitor and quickly analyze potential sourcing and compliance risks Copyright © 2011 IHS Inc. All Rights Reserved.
  • 17. Applying Product and Supply Chain Events Tools can aggregate all events that may impact your BOM/Program Counterfeit Design / Lifecycle Supply Chain Regulatory Counterfeit Part or Event Failures Compliance Event Supplier Event Copyright © 2011 IHS Inc. All Rights Reserved. 17
  • 18. Immediate Counterfeit Notification Part, BOM, Program alert to potential counterfeit risk in the market Alert! IHS-ERAI solution includes value-added services, critical information, and risk assessment tools about thousands of parts and suppliers in order to profile potential counterfeit, substandard, and high risk parts. Copyright © 2011 IHS Inc. All Rights Reserved. 18
  • 19. These go to Industry & Government Reports IHS exclusively provides single access to ERAI and GIDEP reports AUTHORIZATION REQUIRED AUTHORIZATION REQUIRED ERAI notices GIDEP notices Copyright © 2011 IHS Inc. All Rights Reserved.
  • 20. Who is ERAI? Exclusive Partner of IHS Leader in Counterfeit Part & Supplier Market Intelligence ERAI Offers Thousands of Supplier & Part Incidents An averages 25+ counterfeit incidents reported each week Reported Parts Reported Suppliers Copyright © 2011 IHS Inc. All Rights Reserved. 20
  • 21. Detailed ERAI Counterfeit Incident Detail Part, Date Code, Lot Code, Photos, Documents, etc. Copyright © 2011 IHS Inc. All Rights Reserved. 21
  • 22. Disqualify or Be Alerted to Bad Suppliers Past due invoices, wire fraud, faulty product for example… Copyright © 2011 IHS Inc. All Rights Reserved.
  • 23. Used to Locate Potential Vetted Suppliers Independent Distributors and Brokers in good standing Assess Capabilities and Test Accordingly Industry Membership and Reporting? Quality System and Processes? Warranty and Insurance? Supplier Qualification and Purchasing Process? Non-Conforming Material Control? Inspection and Test? Efforts made to verify a Parts’ Authenticity before use? Copyright © 2011 IHS Inc. All Rights Reserved.
  • 24. Who are trusted supply chain sources? What are all of the parts that meet our design criteria? OCM & Aftermarket Sources AVL/AML Approved Suppliers Authorized & Franchised Distributors Approved Independents & Vetted Open Market Sources Copyright © 2011 IHS Inc. All Rights Reserved. 24
  • 25. So, what alternate sources exist? What are all of the parts that meet our design criteria? Functionally Equivalent? Equivalent Parts? Upgrades? Downgrades? Technical Specifications? Compliance Information? Copyright © 2011 IHS Inc. All Rights Reserved. 25
  • 26. Locate Cataloged Items in 3rd-Party Reference Sources What about Procurability and Qualification? Government catalogued parts and sourcing data for millions of items IHS Haystack Gold: Haystack Gold logistics management system contains parts and sourcing data for millions of items in the U.S. Federal Supply Catalog and over 70 U.S. Army, Navy, Air Force and related databases. Augment existing component and supplier data in internal PDM and ERP systems with XML and standard transport protocols Copyright © 2011 IHS Inc. All Rights Reserved.
  • 27. Determine Procure-ability – Look for Problem Items Applying Procurement Intelligence Zeroing in on supply chain risk to BOM and Platforms Weapon System Platform Metrics Total Platform NIINs 148,865 Matching Haystack Part Numbers 667,884 NIINs with Inventory 10,500 Parts found in QPD for all NIINs 490,134 NFTD Part Numbers for all NIINs 12,477 Part Number with 5/9 Status 159,838 NIINs with Status Other than Active 10,304 NIINs still in HSG 9464 Replacement NIINs in SegK 771 Inactive NIINs in NFTD 98 Total NIINs with No Data 69 Copyright © 2011 IHS Inc. All Rights Reserved. 27
  • 28. Locate Cataloged Items in 3rd-Party Reference Sources Government Qualified Products Database (QPD) Parts and Vendors qualified to military specifications Copyright © 2011 IHS Inc. All Rights Reserved. 28
  • 29. Find Qualified Sources of Supply Vendor Qualification Part Numbers, Stock Numbers ,and Vendors Meeting Criteria Copyright © 2011 IHS Inc. All Rights Reserved. 29
  • 30. Find Government Qualified Parts, based on Military or Industry Specifications Qualification Requirements Analysis IHS Military Specs & Standards: Collection of over 107,000 documents from U.S. Department of Defense (DoD) and related government/federal agencies. DoD standards state requirements in performance terms in order to make maximum use of non- Government standards and commercial technologies, products, and practices. Copyright © 2011 IHS Inc. All Rights Reserved. 30
  • 31. View Governing Specifications Qualification Requirement: MIL-PRF Copyright © 2011 IHS Inc. All Rights Reserved. 31
  • 32. View Related Documents to the Governing Specification Single Access to Related Standards Cross-references to related documents Copyright © 2011 IHS Inc. All Rights Reserved. 32
  • 33. Additional Qualification Requirements: Program Implementation of AS5553 Copyright © 2011 IHS Inc. All Rights Reserved. 33
  • 34. Agility thru Tools and Decision-Support Quickly and efficiently mitigate counterfeits and part/supplier risk Supply Chain and Lifecycle Design Procurement Copyright © 2011 IHS Inc. All Rights Reserved. 34
  • 35. “In skating over thin ice our safety is our speed” Ralph Waldo Emerson Copyright © 2011 IHS Inc. All Rights Reserved.
  • 36. Thank You Mr. Rory King, Design & Supply Chain, IHS Inc. Rory.King@ihs.com Mr. Greg Jaknunas, Design & Supply Chain, IHS Inc. Greg.Jaknunas@ihs.com Copyright © 2011 IHS Inc. All Rights Reserved.