SPK and Associates co-founder Chris McHale spoke with PLM expert Oleg Shilovitsky, founder of BeyondPLM.com, to get his top three product lifecycle management (PLM) predictions for 2015. PLM vendors will encounter greater complexity when delivering cloud solutions New...
Compliance & Regulatory
Challenges of Managing a BOM Across the Product Life Cycle (Part 2)
SPK and Associates co-founder Chris McHale spoke with PLM expert Oleg Shilovitsky of BeyondPLM, on the difficulty of BOMs across engineering disciplines. In part two of the discussion, they focus in on the difficulty of BOMs across the product life cycle.
SPK Accelerates Fortune 100 MedDevice Product Sale
Our client is Fortune 100 Medical Device manufacturer. SPKAA acts as a product cybersecurity managed service provider for their hospital products which have embedded Windows or Windows OS. Fortune 100 MedDevice Problem For over 10 years, SPK has provided ongoing...
How To Complete Computer Systems Validation (FDA)
What is Computer Systems Validation (CSV)? Additionally, why does the Food & Drug Administration (FDA) require them for the Medical Device industry? More importantly, how can CSVs be efficiently completed and managed? Let’s explore why you can’t skip that...
Use Nessus To Harden Your Cybersecurity
Cybersecurity should be baked into the onset of IT and product development processes. Additionally, treating cybersecurity as an afterthought opens your organization up to vulnerabilities and risk. Therefore hardening your IT product cybersecurity with a tool like...
DevOps and CloudBees Accelerate Banking Innovation Part 2
In Part 1 of this article, we talked about the banking innovation industry threats and market conditions. We discussed how DevOps and CI/CD tools can help to mitigate threats. We also discussed why tools like Jenkins, CloudBees CD/RO and CloudBeesSoftware Delivery...
Computer Systems Validation: How To Avoid FDA Warning Letters C.F.R. 820.70(i)
Computer systems validation (CSV) is a standard regulatory exercise Med Device companies are required to complete. This is not new news. In fact, the content in this article may not be “new news” for you either, but as with other regulatory requirements, it’s useful...
CloudBees and DevOps Accelerate the Banking Industry Time to Market, Part 1
The Threats and Market Conditions The banking and financial industry faces some tough challenges that many other industries do not. The continually increasing regulations. The continuous threat of cyber-attacks. The disruptive innovation from outside of the sector....
9 Things You Need To Know About Cybersecurity and Protected Health Information (PHI) breaches
In the past 18 months, there have been breaches of security related to protected health information (PHI) at Broward Health, Florida Healthy Kids, and the Accellion FTA Hack. In turn, these breaches resulted in 11 more healthcare organizations getting exploited. ...
5 Best Practices That Could Have Protected You From Log4J
Log4j: What Is It? On December 9, 2021, a critical exploit named "Log4j" was disclosed to the world. This exploit was particularly harrowing due to the fact that the software library which it targeted is so widely utilized. “Log4Shell” (CVE-2021-44228,...
Problems that Engineers in Regulated Industries Face
https://www.youtube.com/watch?v=Og6826J7EOo Video Transcript: I'm Carlos Almeida, VP of Engineering at SPK and Associates. I've spent most of my professional life doing software engineering. 25 years plus in the world of high tech in the electronic design automation...
Risk Management in Windchill RV&S (formerly PTC Integrity Lifecycle Manager)
An important part of creating any product intended for use in any regulated industry vertical is that the manufacturer should have identified all of the risks involved in using the device. Then, they must have done their best to mitigate those risks before their...