Showing 1 - 8 of 50
Trusted Computing for National Defense

Trusted Computing for National Defense

Computer experts are deepening their defenses against cyber attack and information security breaches.

12/02/2023
Military Embedded Systems Magazine

Design Challenges for Naval Equipment Enclosures

New and efficient approaches to cabinet and console design, fabrication, integration, and qualification are enabling prime defense contractors to quickly equip the U.S. Navy with better electronics technology and enclosures while increasing return on investment.

09/08/2023
Trusted Computing for National Defense

Trusted Computing for National Defense

Cyber security enters the realm of zero trust, as military forces seek to safeguard sensitive military technologies from enemy cyber hackers and spoofers.

12/21/2022
Military Embedded Systems Magazine

Sensor Open Systems Architecture (SOSA), Unmanned Vehicles, and Trusted Computing

System integrators need to ensure that the sensor systems and the critical data they collect and store are protected from falling into the wrong hands.

08/16/2022
Shephard

Sensing Trouble: How CMS are Lifting the Fog of War

New technologies such as virtualisation, sensor improvements and data fusion are enhancing the effect of CMS on modern fleets, allowing greater range and faster transfer of critical information.

07/04/2022
Military Embedded Systems

Sensor Open Systems Architecture (SOSA), Unmanned Vehicles, and Trusted Computing

Today, with the increasing use of unmanned platforms to host intelligence, surveillance, and reconnaissance [ISR] sensor applications, system integrators need to ensure that the sensor systems and the critical data they collect and store are protected from falling into the wrong hands.

03/08/2022
military and aerospace electronics

Embedded Computing Enclosures go Standard, and go Small

Industry standards and guidelines such as MOSA, SOSA, CMOSS, SAVE, and FACE are driving the latest developments in enclosures, chassis, and backplane databuses, as small for factors are ready to take center stage.

02/24/2022
Military & Aerospace Electronics

Cyber Battlegrounds: Trusted Computing, Cyber Warfare, and Cyber Security for National Defense

The threat categories are many. Vehicle loss or capture, data loss or transport, nation state hackers or internal threats all can threaten or intercept data at rest.

01/10/2022