09Oct
29Aug
RF Shielded Bags and Pouches-many Benefits!
RF Shielded Bags and Pouches-many Benefits! In our increasingly connected world, safeguarding our wireless devices and private information is paramount! RF shielded pouches and bags, often called Faraday bags or RFID blocking bags, make this task a lot easier to accomplish! Beyond their primary function of protecting wireless devices from hacking, these innovative accessories offer a range of valuable benefits. First and foremost, these bags act as a powerful shield against electromagnetic interference (EMI). By blocking electromagnetic signals and radiofrequency...
27Jun
Nothing is “simple” anymore-needs Change!
Nothing is "simple" anymore-needs Change! When I first came to VTT, our manufacturing product line was fairly simple. RF Shielded Enclosures, RF Shielding Curtains, RF Shielding Garments were about it! Today, we find that our customers are always finding new and different needs for our conductive textile products. An RF Shielded enclosure has become a "suite" of rooms with more isolation than ever. Requests for Foyers, removable walls, are routine requests rather than unusual. RF Shielding Curtains are now "arrays...
14Jun
Rack Systems protect your Server’s Data!
Rack Systems protect your Server's Data! We live in a "wireless world", so many transactions take place over the airwaves! That's a nice convenience of living in a digital world! Life is simpler when we can take care of so many of our responsibilities without leaving home. That ease comes with a potential cost. There are many people who "earn" their livings by stealing or misappropriating digital information. We often hear of people who have had terrible experiences such as...
31May
RF Shielded Enclosures-Testing at Home!
RF Shielded Enclosures-testing at Home! Preparing for Final Compliance EMC Testing is difficult. One of the best ways to prepare for this test is to prepare your product during development. Testing your product in your home environment during development builds EMC into your device from the start and is the best way to proceed. Pre-Compliance EMC Testing can be done easily at your development site. It actually saves time in development, by intercepting EMC issues along the way rather than...
10May
Have a Product Idea-We’ll help!
Have a Product Idea-We'll help! Our metalized conductive textiles are useful in many ways! We have the world's largest standing inventory of conductive textiles. If you have a new idea on how to use them, our Research and Development team will help turn your idea into reality! Our team can help you find the ideal textile for your project. The help doesn't stop there, we will assist you in producing a prototype of your project. V Technical Textiles, Inc. is...
25Apr
RF Shielded Pouches protect your Privacy!
RF Shielded Pouches protect your Privacy! We live in a digital world where we can access our information easily from our electronic devices. The problem with that is that there are "digital criminals" out there trying to hack your devices for nefarious reasons. Identity theft, fraudulent emails asking for you to give your private information for any number of reasons. Credit Card numbers, bank account numbers, and even your identity information are what they're after. Identity theft can be devastating...
21Mar
RF Shielded Enclosures-Test with Confidence!
RF Shielded Enclosures-Test with Confidence! Pre-Compliance EMC Testing requires a low ambient environment for accurate testing. The only Source of interference in the testing enclosure should be the Device Under Testing (DUT). RF Shielded enclosures are based on the Faraday Cage Principle which states that electromagnetic fields approach the outside of the enclosure, they will not pass through the walls of the enclosure. The interior of the testing enclosure should have no ambient RF radiation higher than the level that...
08Mar
Protect Digital Data-use a Pouch!
Protect Digital Data-use a Pouch! Many of us have our private digital data with us at any given moment on a portable wireless device. That device can be a cell phone, a PDA, a tablet, or a laptop computer. We take it for granted that the private data is safe in the device. The truth is that there are people out there who's mission in life is to steal that data for nefarious purposes. They could be stealing your identity...
19Oct