14Mar
08Mar
Protect Digital Data-use a Pouch!
Protect Digital Data-use a Pouch! Many of us have our private digital data with us at any given moment on a portable wireless device. That device can be a cell phone, a PDA, a tablet, or a laptop computer. We take it for granted that the private data is safe in the device. The truth is that there are people out there who's mission in life is to steal that data for nefarious purposes. They could be stealing your identity...
22Feb
Military uses for Conductive Textiles!
Military uses for Conductive Textiles! The Department of Defense has many uses for Conductive Textiles. Obviously, the military has many sophisticated electronic devices in their vehicles, whether planes, tanks, or boats. The lives of the soldiers depend on these devices working smoothly without any interference from RFI or EMI. Proper RF Shielding allows these devices to work together efficiently in a shared electromagnetic environment. Conductive textiles are the best shielding materials for vehicles due to their light...
08Feb
RF Shielded Curtain or Enclosure?
This may seem like a difficult question, in some cases the correct answer is BOTH! One of the beautiful things about an RF Shielded Curtain is that it can multitask! An RF Shielded curtain can isolate an area from RF radiation. This comes in handy in repairing or testing an electronic device's performance "in situ" when the "Device Under Testing" (DUT) won't fit into a RF Shielded Enclosure or can't get to one. An RF Shielded Curtain is...
24Jan
VTT Hook and Loop now Buy American Act and Berry Amendment Compliant!
VTT Hook and Loop now Buy American Act and Berry Amendment Compliant! VTT is now able to offer Hook and Loop/Velcro® that meets the requirements of the Buy American Act and the Berry Amendment! These laws apply to purchases by Federal Government purchases for public use in the United States and for Department of Defense spending respectively. The Berry Amendment is very specific and requires that the product must have of 100% domestic content with NO EXCEPTIONS. ...
11Jan
Digital Evidence must be Secure and Preserved in order to be Admissible!
Digital Evidence must be Secure! The wireless digital world has created a whole new landscape for criminals. Inadvertently, criminals accidentally keep detailed records of their criminal activity in their electronic devices. GPS keeps an accurate track of where the device or phone has been. Oddly, Criminals feel that if their data is safe in these devices and that no one can get at it. We are all aware that people can wirelessly access to sensitive information. That's how hackers make...
07Dec
RF Shielded Pouches-Privacy Bags!
RF Shielded Pouches-Privacy Bags! Security of private digital information is important today. The number of forms of passwords and levels of verification are ever increasing. Obviously, there are more nefarious attempts than ever before to access digitally stored information. Banks, email accounts, credit cards, and medical records require several levels of proof of identity before allowing access to accounts. Though it is time consuming, these levels add protection to your important information. Many of us carry electrical devices on which...
29Nov
RF Shielded Curtains create Security and Isolation!
RF Shielded Curtains create Security and Isolation! Today's electronic world relies heavily on wireless transmission of information. Wireless access to information makes transactions and transmission easy. Unfortunately, wireless access sometimes allows access to private or important information when it shouldn't be! Examples of data security include credit card information, passwords stored on wireless devices, even vital signs in a telemetry unit in a hospital to make sure that this private information is secure and directed to the proper location. Practical...
19Oct
Digital Device Security-RF Shielded Pouches!
Digital Device Security-RF Shielded Pouches! Our digital devices are wonderful, they allow us easy access to our private information all the time! We don't leave home without them, and always have them nearby. Unfortunately, this private information is also accessible by nefarious others. In today's world, there are people who make a living by illegally wirelessly accessing personal digital devices. They access the information using unsecure Wi-Fi connections such as internet cafes or guest connections in restaurants and hotels. It...
12Oct