Showing 1 - 8 of 70
Cores and Threads: Hybrid Processors for Today’s Multitasking World

Cores and Threads: Hybrid Processors for Today’s Multitasking World

Taken to the extreme, today’s high-end graphics processors (GPUs) can execute thousands of simultaneous operations, which is fundamental for highly parallel 3D visualizations and complex AI [artificial intelligence] processing tasks.

02/13/2024
Trusted Computing for National Defense

Trusted Computing for National Defense

Computer experts are deepening their defenses against cyber attack and information security breaches.

12/02/2023
The Future of High-Performance Embedded Computing

The Future of High-Performance Embedded Computing

Much of the innovation in high-performance embedded computing starts with microprocessors.

10/24/2023
Trusted Computing for National Defense

Trusted Computing for National Defense

Cyber security enters the realm of zero trust, as military forces seek to safeguard sensitive military technologies from enemy cyber hackers and spoofers.

12/21/2022
Secure Mesh Wireless Networks Drive Command Post Mobility

Secure Mesh Wireless Networks Drive Command Post Mobility

For years, the goal of our armed forces has been mobility at the command post, with Army leaders setting the standard to be able to move hourly, with the command post’s network ready, powered up and receiving in five minutes.

11/30/2022
Military Embedded Systems Magazine

Sensor Open Systems Architecture (SOSA), Unmanned Vehicles, and Trusted Computing

System integrators need to ensure that the sensor systems and the critical data they collect and store are protected from falling into the wrong hands.

08/16/2022
Milsat Magazine

Secure Wireless Solutions for Tactical, Expeditionary, + Deployable Communications

U.S. Department of Defense (DoD) tactical/expeditionary networking and command post programs have widely acknowledged the critical need to improve mobility.

03/23/2022
Military Embedded Systems

Sensor Open Systems Architecture (SOSA), Unmanned Vehicles, and Trusted Computing

Today, with the increasing use of unmanned platforms to host intelligence, surveillance, and reconnaissance [ISR] sensor applications, system integrators need to ensure that the sensor systems and the critical data they collect and store are protected from falling into the wrong hands.

03/08/2022