12Jul
28Jun
RF Shielded Bags and Pouches-Security!
RF Shielded Bags and Pouches-Security! In today's wireless world, devices communicate with each other using RF. This is much more convenient than communicating through wires! This convenience comes with a price. Wireless devices are convenient for hackers to. The game of wireless security goes back and forth. Hackers figure out a new way to beat cyber security, cyber security figures out a way to block the new attack sites! Fortunately, one thing hackers can't access wirelessly is a device secure...
17May
Require Isolation- RF Curtains work!
Require Isolation-RF Curtains work! When RF Isolation is necessary during an electronic system diagnosis and repair there often isn't a large enough RF Shielded Enclosure present. Isolation may be possible by using an array of several RF Shielded Curtains. This approach facilitates diagnosis and repair in situ, where it originally arose. There are many situations that require RF isolation. Warehouses and storage facilities where inventory management involves constant monitoring with RFID. In order to avoid " RFID...
03May
Garments, Pouches, Shielding,-Conductive Textiles!
Garments, Pouches, and Shielding-Conductive Textiles! The uses of conductive fabrics are many and varied. Originally, the primary use of conductive metalized textiles was RF Shielding, allowing electronic devices to work together smoothly a shared electromagnetic environment. All electronic devices emit electromagnetic radiation. Depending on the frequency of the EMI/RFI, electronic devices can work together smoothly. RF Shielding uses conductive textiles to block the offending frequencies that disturb normal function of a device. Engineers love the flexibility of...
25Apr
RF Shielded Pouches protect your Privacy!
RF Shielded Pouches protect your Privacy! We live in a digital world where we can access our information easily from our electronic devices. The problem with that is that there are "digital criminals" out there trying to hack your devices for nefarious reasons. Identity theft, fraudulent emails asking for you to give your private information for any number of reasons. Credit Card numbers, bank account numbers, and even your identity information are what they're after. Identity theft can be devastating...
19Apr
Digital Forensic Evidence-Handle with Care!
Digital Forensic Evidence-Handle with Care! Digital Evidence is evidence that is present on devices in binary code that is "of interest" to the legal system. This evidence is found on computer hard drives, mobile phones, security cameras, email and other digital media including text messages and social media. Binary evidence is relevant to many events of interest to the legal system, including traffic violations, accidents, white collar crime, up to terrorism and murder. Digital Forensic Evidence-Handle with Care. Binary evidence requires...
14Mar
Conductive Textiles are used Everywhere!
Conductive Textiles are used Everywhere! The medical field has many uses for conductive textiles. Conductive metalized textiles act as sensors, measuring vital functions such as brain waves, and temperature. Hospital beds become smart, sensing a patient leaving the bed. Pressure sensing buttons summon nurses to the patient's room when necessary. These even detect wetness of the bedding! Metalized textiles are useful in physical therapy as electrodes applying current to stimulate muscles or nerves as...
01Feb
Who uses Conductive Metalized Textiles-Everyone!
Who uses Conductive Metalized Textiles-Everyone! Until I came to work at V Technical Textiles, Inc., I didn't know anything about them. Today, I am amazed at the number of ways metalized textiles are involved in our lives. One of the first uses of them made it possible for me to listen to an FM radio in my car! I recall FM radios seemed particularly sensitive to RFI (Radio Frequency Interference) and were not easy to listen to. This due to...
07Dec
RF Shielded Pouches-Privacy Bags!
RF Shielded Pouches-Privacy Bags! Security of private digital information is important today. The number of forms of passwords and levels of verification are ever increasing. Obviously, there are more nefarious attempts than ever before to access digitally stored information. Banks, email accounts, credit cards, and medical records require several levels of proof of identity before allowing access to accounts. Though it is time consuming, these levels add protection to your important information. Many of us carry electrical devices on which...
12Oct