- Tactical Communications
- Data Storage
- Trusted Computing
- Data Acquisition
- Flight Test
- Mission Management
- Flight Recording
- Space COTS
- Video Recording
- Artificial Intelligence
- Aiming and Stabilization
- Aircraft Monitoring
- Curtiss-Wright Defense Solutions
- Link 16
- Electronic Warfare
- Cockpit Voice Recorder
- Green Hills
- Machine Learning
- Small form-factor (SFF)
- Air Data System
- Operation Flight Instrumentation
- 360 Situational Awareness
- Development Flight Instrumentation
- Modified COTS
- Power Architecture
- Train Tilting Technology
- Vertical Takeoff
- Video Management
- 6U VME Processor Boards (196)
- Ammunition Handling
- Black Box
- Missile Test
- Motion Control
- Radiation Tolerance
- Radio Frequency
- System Integration
- Vita 47
- Wind River
Meeting Program Schedules in a Time of Supply-chain Uncertainty
These days, program managers are trying to figure out how best to mitigate the potentially harmful effects of supply-chain disruption, while protecting their customer’s program schedule and supporting the warfighter.
Embedded Computing Enclosures go Standard, and go Small
Industry standards and guidelines such as MOSA, SOSA, CMOSS, SAVE, and FACE are driving the latest developments in enclosures, chassis, and backplane databuses, as small for factors are ready to take center stage.
Intel CPUs Power Processor Cards at the Edge
Designed with Intel® Xeon® D processor architecture, Curtiss-Wright's CHAMP-XD1 processor card is ideally suited for compute-intensive aerospace and defense applications, meeting the high performance, reliability, and security standards these industries require.
Protecting and Analyzing Data from Unmanned Platforms at the Edge of the Battlefield
A key driver for the use of unmanned platforms is their ability to collect data without putting warfighters in harm's way.
What You Need to Know About the Telemetry Network Standard
The TmNS is an emerging technology for the major flight-test ranges in the U.S. By allowing for bidirectional data and control, this upgraded ground infrastructure is a significant step forward for the flight-test community.
Open Source SDR: a Faster, Better Way to Develop and Deploy EW Capabilities
Maintaining dominance of the electromagnetic spectrum has never been more critical to mission success. The challenge facing system designers is how to accelerate the transition of new communications and electronic warfare (EW) capabilities from concept to the laboratory and then expedite the deployment of those new capabilities to the warfighter.
SAVE this Space: Defining the C5ISR Space for Army Vehicles
To lower the cost and help speed the pace of technology upgrades for C5ISR [command, control, computers, communications, cyber, intelligence, surveillance, and reconnaissance] systems on Army vehicles, the U.S. Army’s Program Executive Officer (PEO) for Ground Combat Systems (GCS) has issued an Interface Description Document (IDD).
What System Designers Should Know About MOSA Standards
In today’s technology-rich battlefield, new threats emerge and change quickly. Rapidly responding to new threats in this dynamic environment is one of the primary drivers behind the DoD mandate to adopt a Modular Open Systems Approach (MOSA) for procurement across the Army, Air Force, and Navy.
Rugged Computing Takes on the Battlefield Networking Challenge
Connectivity, networking, SWaP, and thermal management are among the highest priorities of rugged computing designers to support mobile warfighters at the edge.
Optimizing Performance, Security, and SWaP at the Tactical Edge
Optimized for performance, speed, security, and SWaP, Curtiss-Wright CHAMP-XD1 processor cards leverage Intel® Xeon® D processor architecture to meet the high demands of modern defense missions.
In Touch Anywhere
US services are keen to provide SATCOM to frontline units and enable communication on the move worldwide. Shephard speaks to industry experts to identify the capabilities and limitations of this emerging technology.
Cyber Battlegrounds: Trusted Computing, Cyber Warfare, and Cyber Security for National Defense
The threat categories are many. Vehicle loss or capture, data loss or transport, nation state hackers or internal threats all can threaten or intercept data at rest.