Counterfeit Electronics Detection – An Ontonix Success Story

From a Hill’s article: “… counterfeit electronics that threaten the reliability of military hardware and our critical infrastructure for telecommunications, energy and transportation. A study by the Senate Armed Services Committee found more than 1,800 cases of suspected counterfeits in advanced missile systems, helicopters, submarines and more. Because our company provides counterfeit detection services and…

The Resilience Rating of Easter Island

Easter Island (Chilean territory), is a remote volcanic island in Polynesia. Its native name is Rapa Nui. It’s famed for archaeological sites, including nearly 900 monumental statues called moai, created by inhabitants during the 13th–16th centuries. The moai are carved human figures with oversize heads, often resting on massive stone pedestals called ahus. Ahu Tongariki…

Best Way to Protect Intellectual Property

Intellectual Property (from Wikipedia) “is a category of property that includes intangible creations of the human intellect, ….. such as copyrights, patents, trademarks, and trade secrets.” Creating new Intellectual Property is a very lengthy process: To start with, it requires plenty of IP to create new IP. It is not something you simply decide to…

Simplifying a Business is … Like Alchemy

Trying to simplify a business without being able to measure its complexity (simplicity) is like a doctor who proposes a weight loss diet but has no means of measuring the weight of his patients. If one has no complexity metric then we’re talking of subjective opinions, sensations, feelings, certainly not science. The silly images such…

Complexity-based Control of Dynamic Systems

Complexity-based control is possible because complexity can be measured in real-time using specifically developed hardware. The concept is illustrated below, whereby a QCM block is used to drive the complexity of a given system to desired levels. Because high complexity can lead to instability and fragility, the goal of QCM control is to drive complexity…

Increasing Cybersecurity. Locally.

A recent blog by CISCO speaks of how QCM – Quantitative Complexity Management – is used in anomaly detection in highly complex systems and contexts. In particular, it speaks of QCM as being able to detect the existence of an anomaly without having seen it before. Such capability goes beyond Machine Learning in that QCM…

Reinventing Anti-Money Laundering with Complexity

Beyond Madoff: Anti-Money Laundering with Quantitative Complexity Management. By JB Beckett, Author of ‘New Fund Order’. Foreword by Jacek Marczyk. Foreword: “Our society depends on a number of highly complex and highly interconnected networks that process and distribute energy, information, goods, etc. They form an immense system of systems that has one key characteristic –…