Bringing Security to Legacy Systems for Modern Missions
Upgraded systems require security to be built-in to protect sensitive mission information and maintain warfighter technology advantage.
Creating the Data Fabric for Tactical Edge with Software-Defined Wide Area Networking
A software-defined WAN (SD-WAN) can establish a data fabric capable of dealing with any tactical edge scenario where reliable WAN is needed.
Lowering the Cost of Upgrading C5ISR Systems with the Standardized A-Kit/Vehicle Envelope (SAVE) for Army Vehicles
SAVE is intended to simplify the installation of C5ISR systems in Army vehicles.
Making Ethernet Deterministic: Time-sensitive Networking for Digital Backbones
TSN is a set of standards and capabilities that enable hard real-time use cases over standard Ethernet networks.
Energy Storage for Military Applications Faces Demands for More Power
Mobile electronics for the battlefield go hand-in-hand with batteries, and have done so for years. It’s not news that electronics that can’t be plugged-in relies on the energy-storage medium of batteries.
Migrating Legacy Software from Obsolete Hardware to Modern System Environments
Virtualization software and model-based design provide a path that not only enables system designers to maintain legacy software for avionics and other mission-critical systems.
Secure Wireless Communication Supports Mounted and Dismounted Connectivity
Secure wireless communications (SWC) technology for vehicle-to-vehicle (V2V) and vehicle-to-end user device (V2E) communication is useful for tactical environments as it improves network flexibility and operational maneuverability while reducing management complexity and cost.
Enabling Technologies for Image and Video Processing
The latest high-performance embedded computing image and video processors rely heavily on general-purpose graphics processing units (GPGPUs) to capture as much detail as possible.
Secure Wireless Solutions for Tactical, Expeditionary, + Deployable Communications
U.S. Department of Defense (DoD) tactical/expeditionary networking and command post programs have widely acknowledged the critical need to improve mobility.
Having a Rugged Pi Day
It's 3-14, which is also known as Pi Day. And to help ring in the occasion, Curtiss-Wright’s rugged mission computer, targeted at applications such as avionics and UAVs, is built around a Raspberry Pi.
Sensor Open Systems Architecture (SOSA), Unmanned Vehicles, and Trusted Computing
Today, with the increasing use of unmanned platforms to host intelligence, surveillance, and reconnaissance [ISR] sensor applications, system integrators need to ensure that the sensor systems and the critical data they collect and store are protected from falling into the wrong hands.