Latest Articles

RSS
Barb Wert

Barb Wert

Compliance Engineer

Regulatory Compliance 101 – The European Union

Welcome back to Compliance 101!  Previous articles of this series dealt with the various regulatory requirements for Information Technology Equipment (ITE) in the United Stated.  Today, we will look at regulations for ITE in the European Union. 

Read More

Ritesh Seth

Ritesh Seth

Marketing Director

What Established Businesses Can Learn From Lean Start-ups

Lean management techniques help minimize waste and create value at an organization, department and even at the product level. Lean Start-ups have successfully implemented these practices into their business model to efficiently utilizes scarce resources and build products that customers truly want. In this article, we explore a few techniques that established businesses can learn from lean start-ups.

Read More

Barb Wert

Barb Wert

Compliance Engineer

Regulatory Compliance 101 - UL

Welcome back to Compliance 101!  In our first article of the series, we learned about the FCC and electromagnetic compatibility (EMC).  Today, we will look at safety regulations for Information Technology Equipment (ITE) in the United States.  We will highlight other types of regulatory compliance for the country as well. 

Read More

Steven Wirt

Steven Wirt

Information Security Engineer

Antivirus vs. Whitelisting – Which Should You Use?

Antivirus software protects against known threats by comparing files on a system against a list of known threats stored in virus definition files. It will generally allow all applications to execute if they are not identified as malware in the virus definitions. On the other hand, Whitelisting software, sometimes referred to as application whitelisting or application control, only allows items that are explicitly allowed by the system administrators that configured the software. Both antivirus and whitelisting have their advantages and disadvantages. Each type of application offers protections that are complementary to the other, and using both can be a good defense-in-depth approach to securing a system.

Read More

Jim Farley

Jim Farley

Electro-Mechanical Engineer

How Does FoxGuard Perform Pre-Compliance Testing?

In the first part of this article, we discussed Electro Magnetic Compatibility (EMC) and the benefits of pre-compliance testing. In this installment, we will explore the equipment and procedures used to perform the tests, and the rationale used to evaluate the test results.

Read More

Barb Wert

Barb Wert

Compliance Engineer

Regulatory Compliance 101- FCC

Have you ever wondered what all of those marks on the bottom of your keyboard or power strip mean, or why they are even there?  FoxGuard Solutions presents a new blog series, “Regulatory Compliance 101,” as an introduction to the purpose of these marks and the testing and certification behind them.  In this first installment of our series, we’ll be taking a closer look at compliance with the FCC.

Read More

Justin Grubb

Justin Grubb

Associate Systems Engineer

Top 5 Touch Screen Interfaces

All touch screen interfaces have advantages and disadvantages, depending on their application. For the industrial use, there typically are requirements and nuances that lend better to certain types of touch screen interfaces.

Read More

Monta Elkins

Monta Elkins

Security Architect

NERC CIP Ports & Services Part 2

In part 2 of our Ports and Services white paper we will discuss the NERC CIP definition of the term “ports and services”, and how to comply with NERC CIP documentation requirements...

Read More

Jim Farley

Jim Farley

Electro-Mechanical Engineer

Pre-Compliance EMC Testing

The Federal Communication Commission (FCC) and the Conformité Européenne (CE) are the two major conformity standards for products sold in the United States and the European Union respectively. To insure compliance with these specifications, EMC testing must be conducted by certified laboratories that possess the facilities and equipment as proscribed by the applicable standards. 

Read More

Matthew Gilbert

Matthew Gilbert

Engineering Technician

Brief History of Critical Infrastructure Vulnerability: 1960-1989

To understand the current state of cyber vulnerabilities, it's helpful to have a good working knowledge of the development of computer infrastructure. Not sure where to start? Read our article on the history of critical infrastructure vulnerability from 1960-1989.

Read More