Showing 49 - 60 of 220

Latency and Determinism, and Which Is More Important for Your Application?

Latency is different from determinism, which is knowing exactly when an instruction will execute. It’s an important distinction to be aware of when building embedded systems.


Planning to Export Data-at-Rest Storage with Encryption?

In applications where data flows need to take place in nanoseconds, the delay between when an instruction is received and when it executes, known as latency, is very important.


Comparing Encryption Standards and Associated Countries

When it comes to protecting classified data, each encryption standard has a testing authority and an approval authority. This blog talks about the most influential and well-known standards for securing data-at-rest (DAR) and what it takes to protect classified information.


White Paper Series: Data-At-Rest Encryption

The Data-At-Rest Encryption Series white papers provide engineers, system architects, and program managers with background information, technical details, and a methodology for selecting a data-at-rest (DAR) security approach.


Is Fiber Optic Networking Technology More Secure Than Copper?

Because optical connections transmit data using light, they don’t radiate signals that can be intercepted. Security for traditional copper Ethernet connections can now be significantly enhanced, however, thanks to end-to-end encryption standards.


The Effects of Extended Temperatures on Flash Endurance and Data Retention

The electrical charge stored in a flash memory cell degrades over time, and will degrade much faster at extended temperatures. This degradation has been modelled to follow the Arrhenius Equation, degrading exponentially as temperature rises.


White Paper Series: Trusted Computing for Aerospace and Defense

Looking for the latest on Trusted Computing for aerospace and defense? Our white paper series, Trusted Computing: The COTS Perspective, examines the technologies and trends protecting today’s critical systems from cybersecurity and physical threats.


Selecting the Right System Integration Partner

There’s an art to selecting the right COTS system integration partner. When system integrators partner with the right solution vendor, they gain access to the capabilities, skills, and knowledge that comes from decades of experience.


NAND vs NOR Flash: Types of Flash Memory

There are two primary types of non-volatile flash memory devices in use today: NOR and NAND flash. Below we look at the differences between NAND and NOR flash devices, and explore types of NAND flash, including SLC, MLC, and TLC.


Flash SSD & the Evolution of Storage and Backups

Aaron Frank reflects on the evolution of storage and backups, and ponders the long-term reliability of SSDs for data storage.


Infographic: Why Developing Link 16 Solutions Requires TCG BOSS

Download the infographic to learn the 5 ways TCG BOSS® can help in the development of Link 16 solutions.


Coronavirus Statement

Curtiss-Wright Defense Solutions (CWDS) is taking proactive steps to address business concerns and maintain a safe workplace to protect the health of employees, customers, visitors and others.