Showing 49 - 60 of 220

Latency and Determinism, and Which Is More Important for Your Application?

Latency is different from determinism, which is knowing exactly when an instruction will execute. It’s an important distinction to be aware of when building embedded systems.

11/13/2020

Planning to Export Data-at-Rest Storage with Encryption?

In applications where data flows need to take place in nanoseconds, the delay between when an instruction is received and when it executes, known as latency, is very important.

11/12/2020

Comparing Encryption Standards and Associated Countries

When it comes to protecting classified data, each encryption standard has a testing authority and an approval authority. This blog talks about the most influential and well-known standards for securing data-at-rest (DAR) and what it takes to protect classified information.

09/28/2020

White Paper Series: Data-At-Rest Encryption

The Data-At-Rest Encryption Series white papers provide engineers, system architects, and program managers with background information, technical details, and a methodology for selecting a data-at-rest (DAR) security approach.

08/27/2020

Is Fiber Optic Networking Technology More Secure Than Copper?

Because optical connections transmit data using light, they don’t radiate signals that can be intercepted. Security for traditional copper Ethernet connections can now be significantly enhanced, however, thanks to end-to-end encryption standards.

08/19/2020

The Effects of Extended Temperatures on Flash Endurance and Data Retention

The electrical charge stored in a flash memory cell degrades over time, and will degrade much faster at extended temperatures. This degradation has been modelled to follow the Arrhenius Equation, degrading exponentially as temperature rises.

08/10/2020

White Paper Series: Trusted Computing for Aerospace and Defense

Looking for the latest on Trusted Computing for aerospace and defense? Our white paper series, Trusted Computing: The COTS Perspective, examines the technologies and trends protecting today’s critical systems from cybersecurity and physical threats.

08/06/2020

Selecting the Right System Integration Partner

There’s an art to selecting the right COTS system integration partner. When system integrators partner with the right solution vendor, they gain access to the capabilities, skills, and knowledge that comes from decades of experience.

08/05/2020

NAND vs NOR Flash: Types of Flash Memory

There are two primary types of non-volatile flash memory devices in use today: NOR and NAND flash. Below we look at the differences between NAND and NOR flash devices, and explore types of NAND flash, including SLC, MLC, and TLC.

07/27/2020

Flash SSD & the Evolution of Storage and Backups

Aaron Frank reflects on the evolution of storage and backups, and ponders the long-term reliability of SSDs for data storage.

05/22/2020

Infographic: Why Developing Link 16 Solutions Requires TCG BOSS

Download the infographic to learn the 5 ways TCG BOSS® can help in the development of Link 16 solutions.

05/05/2020

Coronavirus Statement

Curtiss-Wright Defense Solutions (CWDS) is taking proactive steps to address business concerns and maintain a safe workplace to protect the health of employees, customers, visitors and others.

03/26/2020