The Internet of Things is revolutionizing the medical device field. However, it’s also introducing new compliance headaches. What’s more, large-scale medical hacks loom large in the background. Medical device manufacturers can’t ignore the Internet of Things, but nor...
Cybersecurity
Podcast: Can IoT Jump These Five Hurdles? Episode 2 – Sensor Interfaces and Smart Devices
In the second episode of our podcast series "Can IoT Jump These Five Hurdles?", we transition from a broad introduction of these five hurdles to a deeper dive into each challenge facing the Internet of Things. Let's begin with the smart device itself and it's digital...
Podcast: Can IoT Jump These Five Hurdles? Episode 3 – IOT Device Serviceability and Environmental Impacts
In the third episode of our podcast series "Can IoT Jump These Five Hurdles?”, SPK & Associates' Chief Strategy Officer, Rajiv Mistry, explains the challenges of IOT device serviceability and environmental impacts. To see all published episodes, scroll down this...
Today’s Growing IoT Problem: Embedded Software Security – An Interview with Cambashi’s Peter Thorne
When it comes to the Internet of Things (IoT) and connectivity, embedded software security is a top concern for a growing number of manufacturing companies and their software engineers. The worldwide market for embedded security software is forecasted to rise to $2.95...
Are You Asking The Right Cloud Security Questions?
In my most recent blog articles, I discussed a few aspects an organization might want to consider when looking at a cloud-based solution. Security is one of the top issues on the list. Regardless of whether your application consists of highly sensitive patient data...
Modern Medical Device Design in the IoT Era
In the past, medical device design focused on a standalone unit or a group of a couple devices that worked together. While that was a great idea, the number of compatibility issues that could occur also blocked connectivity to other devices. With the stream of new...
Cyber Security in Medical Device Design
With the push by big technology players (Cisco, Google, Intel, etc.) towards connectivity in everyday devices, cyber security is becoming more and more crucial. This push is even seen in medical device design as the industry begins to move toward cloud-integrated and...
PLM in the Cloud: Computer System Validation in FDA Regulated Industries
Product lifecycle management (PLM) systems have evolved from being custom-built, on-premise applications to cloud-based, off-the-shelf solutions. As adoption for PLM in the cloud increases, system validation approaches in FDA/GXP regulated industries have had to...
Top 3 Engineering Outsourcing Trends of 2013 from Industry Experts
Predictions are hard to make in any area of life, however short term forecasting is not impossible. Ask a meteorologist for the weather in the next twenty-four hours and you will get a fairly accurate prediction. Ask for the outlook over the next 30 days and you will...
How to Install Snort on a Redhat 6 Box
Snort is used for performing security checks on network boundaries. This can be done on the outside Untrust network but is sometimes more useful to look at what’s getting through your firewall into the web servers. Follow our step-by-step instructions on how...
Blog: Leveraging PTC’s Integrity Platform for IEC 62304 Compliance
SPK and Associates leverage PTC’s Integrity platform to help Medical Device companies develop software efficiently while achieving IEC 62304 compliance.
Using SSH to Securely Tunnel a TCP Application
Often times, I'm caught in a situation where an application or service is not directly accessible to me from the network I'm currently on. For instance, if I'm at a customer site, I may need VNC or RDP access to a collocated server. Sure, I could open up port 5901...