Showing 1 - 8 of 56
Rugged SOSA-aligned 6U VPX Embedded Computing Module Introduced by Curtiss-Wright

Rugged SOSA-aligned 6U VPX Embedded Computing Module Introduced by Curtiss-Wright

The CHAMP-XD4 features dual Intel Xeon D-2700 processors, and is for demanding intelligence, surveillance and reconnaissonce (ISR) system architectures.

01/02/2024
Trusted Computing for National Defense

Trusted Computing for National Defense

Computer experts are deepening their defenses against cyber attack and information security breaches.

12/02/2023
The Future of High-Performance Embedded Computing

The Future of High-Performance Embedded Computing

Much of the innovation in high-performance embedded computing starts with microprocessors.

10/24/2023
100-Gigabit Ethernet Done Right

100-Gigabit Ethernet Done Right

COTS suppliers have focused on increasing connectivity speeds within and between systems for decades, following the introduction of the VPX standard.

08/31/2023
Trusted Computing for National Defense

Trusted Computing for National Defense

Cyber security enters the realm of zero trust, as military forces seek to safeguard sensitive military technologies from enemy cyber hackers and spoofers.

12/21/2022
Military Embedded Systems Magazine

Sensor Open Systems Architecture (SOSA), Unmanned Vehicles, and Trusted Computing

System integrators need to ensure that the sensor systems and the critical data they collect and store are protected from falling into the wrong hands.

08/16/2022
Military Embedded Systems

Sensor Open Systems Architecture (SOSA), Unmanned Vehicles, and Trusted Computing

Today, with the increasing use of unmanned platforms to host intelligence, surveillance, and reconnaissance [ISR] sensor applications, system integrators need to ensure that the sensor systems and the critical data they collect and store are protected from falling into the wrong hands.

03/08/2022
Military & Aerospace Electronics

Cyber Battlegrounds: Trusted Computing, Cyber Warfare, and Cyber Security for National Defense

The threat categories are many. Vehicle loss or capture, data loss or transport, nation state hackers or internal threats all can threaten or intercept data at rest.

01/10/2022