Showing 1 - 8 of 73
Trusted Computing for National Defense

Trusted Computing for National Defense

Computer experts are deepening their defenses against cyber attack and information security breaches.

12/02/2023
Avionics International

Open or Out: U.S. Military Requirements for Modular Open Systems Architectures

Now that the Army has chosen its preferred Future Long Range Assault Aircraft in Bell’s V-280 advanced tiltrotor, the race is on to populate it with mission systems that will allow the machine to operate through adversaries’ sophisticated air defense systems.

03/21/2023
Understanding GCIA

Understanding GCIA: A Paradigm Shift for Establishing an Overall Ground-combat Vehicle Architecture

The U.S. Army has long pursued a standardized infrastructure and architecture for ground-combat vehicle hardware and networking.

02/16/2023
Trusted Computing for National Defense

Trusted Computing for National Defense

Cyber security enters the realm of zero trust, as military forces seek to safeguard sensitive military technologies from enemy cyber hackers and spoofers.

12/21/2022
DoD’s MOSA Mandate Drives CMOSS Approach to A-PNT

DoD’s MOSA Mandate Drives CMOSS Approach to A-PNT

The U.S. Army’s Mounted Assured PNT System (MAPS) program was initiated to replace existing GPS receivers and antennas in most of the Army’s ground vehicle variants.

12/01/2022
Military Embedded Systems

Unified Network Communications Management: The Next Step to Realizing MOSA

Because MOSA (Modular Open Systems Approach) is an approach and not itself a standard, solutions that support this vision can be achieved through many different means as long as interfaces and communications protocols are based on open standards.

08/24/2022
Military Embedded Systems Magazine

Sensor Open Systems Architecture (SOSA), Unmanned Vehicles, and Trusted Computing

System integrators need to ensure that the sensor systems and the critical data they collect and store are protected from falling into the wrong hands.

08/16/2022
Military Embedded Systems Magazine

Bringing Security to Legacy Systems for Modern Missions

Upgraded systems require security to be built-in to protect sensitive mission information and maintain warfighter technology advantage.

06/24/2022