Design Con 2015
VELOCITY     Accelerating Your Supply Chain Success
The leader in global supply chain solutions

Technology Transfer Fuels Counterfeiting

NO RATINGS
View comments: newest first | oldest first | threaded
Page 1 of 2   Next >   Last >>
Jacob
User Rank
Supply Network Guru
Re: counterfeiting Technology
Jacob   2/17/2013 10:58:20 PM
NO RATINGS
1 saves

Adenji, this is one of the issues faced by most of the corporate world. In your company have you adopted any necessary measures to stop leak outing corporate secrets or technology?

Jacob
User Rank
Supply Network Guru
Re: counterfeiting Technology
Jacob   2/17/2013 10:51:04 PM
NO RATINGS
1 saves

"how bad is it in the Middle East as compared to China? I guess there are a lot of outsourcing companies there too."

Alex, now Chinese people are doing more hacking with companies located outside china. This will help them to grab the technology without spoiling their countries name. In Taiwan, Hong Kong, Malaysia, Singapore etc are some of their targeted manufacturing/development hub.

t.alex
User Rank
Supply Network Guru
Re: counterfeiting Technology
t.alex   2/14/2013 7:52:24 PM
NO RATINGS

Jacob, how bad is it in the Middle East as compared to China? I guess there are a lot of outsourcing companies there too.

Douglas Alexander
User Rank
Blogger
Re: counterfeiting Technology
Douglas Alexander   2/12/2013 7:33:35 PM
NO RATINGS

@Michael,  I think there is still a major part of the USA's R&D braintrust that believes that China isn't as sophisticated as they truly are. In fact, their technology sector is highly advanced with the latest test and production equipment, software, and management systems that allows them to be in transition to a "Created in China" from a "Made in China" operation. Take a look at Jan's Popular Science on "China's Arsenal" as it informs us on the advanced warfare capabilities in place and what products are underway that will help patrol and enforce their claims to China Sea's disputed international bounderies. Good to hear from you Michael.

Michael Kirschner
User Rank
Blogger
Re: counterfeiting Technology
Michael Kirschner   2/12/2013 6:55:21 PM
NO RATINGS

Yes, I did lots of reverse engineering of competitors products as well, both as a manufacturer and as a consultant. Always fascinating.

Don't forget that China has also been trying to force (material composition) testing of components in Chinese labs - along with a complete bill of materials - in order to qualify products as compliant with restrictions in phase 2 of China RoHS...that phase has yet to begin because the electronics industry pushed back hard on that. There is now a voluntary approach defined instead. One of industry's concerns was, indeed, the amount of information that could be gleaned from this practice by the labs, with counterfeiting - at the component or product level - one of the key risks. This is one approach to getting around "Technology Transfer".

Adeniji Kayode
User Rank
Production Synthesizer
Re: counterfeiting Technology
Adeniji Kayode   2/11/2013 3:44:42 PM
NO RATINGS

@ Jacob; I agree with you on that , sometimes this could also be as a result of a worker that got laid off which must also make ends meet.

Jacob
User Rank
Supply Network Guru
Re: counterfeiting Technology
Jacob   2/11/2013 8:57:14 AM
NO RATINGS

t.alex, I agree that there is no any technology protection in China. But it's not only in china, in some of the Middle East countries too. That's the one reason most of the companies are handholding the R&D division and main manufacturing unit without any outsourcing.

Jacob
User Rank
Supply Network Guru
Re: counterfeiting Technology
Jacob   2/11/2013 8:54:31 AM
NO RATINGS
1 saves

Adenji, itís not a matter of place, itís all about the integrity and credibility of employees. Most of the secrets are leaking through a small percentage of employees, for some marginal money. This is happening all over in world

Cryptoman
User Rank
Blogger
Secrecy never ensures security
Cryptoman   2/10/2013 12:01:45 PM
NO RATINGS

I agree that in this day and age, there cannot be any well hidden secrets unless you are prepared to invest large sums into ensuring that the secret stays as a secret. (One good example of this is how what goes around in Area 51 is still a big secret.) Not being able to have well kept secrets is the price we all have to pay as a result of transforming the world into a global village.

Regarding "reverse engineering" practices mentioned in the article, I know many companies do this. I was never involved in reverse engineering a competitor's product directly but I do know of cases where other colleagues were assigned to carry out such tasks. However, reverse engineering may not necessarily be a threat if your product has unique features that are difficult to mimic. One good example of this is a metal detector. You can take a metal detector and cut open the detector coil but you will find it hard to mimic all features of that particular coil to achieve the same performance. All you can do is to simply stare at it in awe appreciating what a good job the competitor has done.

There are other cases where some competitors do not feel confident and prefer to take any action (reasonable or not) to prevent others from accessing the inner secrets of their product. One extreme case I came across in the past was one radio equipment manufacturer refused to sell their products to any employee of a competitor purely to avoid the risk of reverse engineering.

 

 

t.alex
User Rank
Supply Network Guru
Re: counterfeiting Technology
t.alex   2/10/2013 8:10:02 AM
NO RATINGS

I have heard from some young startup mentioned that one of the lessons they learnt is that their business will be doomed if they outsource manufacturing to china without any means of IP protection.

Page 1 of 2   Next >   Last >>


More Blogs from Best-Practices
We asked Ronald Kleijwegt, Hewlett-Packard's director of logistics for Europe, the Middle East, and Africa, for his take on major shipping trends of the past decade.
The robotics revolution has transformed industries from cars to electronics. Now it's optimizing a supply chain near you.
Conflict minerals research expedited by third-party services and tools will become as essential as the polluted air you breathe.
Companies fighting conflict mineral rules face an uphill battle. By embracing these rules, they can rebuild the public trust and please investors.
Radio frequency identification device technology is rapidly gaining interest by assuring the integrity of supply chains through rules-based management.
Latest Poll
EBN Newswire
Twitter Feed
EBN Online Twitter Feed