Showing 1 - 8 of 52
Rugged Deployed VPX-based Systems Get Added Cybersecurity Assurance

Rugged Deployed VPX-based Systems Get Added Cybersecurity Assurance

Curtiss-Wright Defense Solutions offers the XMC-529 AMD Ultrascale+ MPSoC XMC mezzanine card, part of the company's line of Enhanced TrustedCOTS plug-in modules designed to bring addtionally secure processing to rugged deployed VPX-based systems.

02/20/2024
Rugged SOSA-aligned 6U VPX Embedded Computing Module Introduced by Curtiss-Wright

Rugged SOSA-aligned 6U VPX Embedded Computing Module Introduced by Curtiss-Wright

The CHAMP-XD4 features dual Intel Xeon D-2700 processors, and is for demanding intelligence, surveillance and reconnaissonce (ISR) system architectures.

01/02/2024
The Future of High-Performance Embedded Computing

The Future of High-Performance Embedded Computing

Much of the innovation in high-performance embedded computing starts with microprocessors.

10/24/2023
Military Embedded Systems

Tactical Decision-Making Demands Increasing Speeds and Volume of Data Processing

For defense applications, responsiveness, accuracy, and precision have never been more critical to mission success.

08/03/2023

Quality First

Engineers adopt different approaches to ensure data quality in aerospace testing. They employ best practice techniques to data acquisition and management to keep data accurate and results reliable.

07/25/2023
Military Embedded Systems

Optimizing 100G VPX

Currently, there are two options for VITA 46.30 connectors: the TE Connectivity RT3 and Amphenol R-VPX EVO2 connectors, both of which meet the ANSI/VITA 46.30 standard intended for 100G (4-lanes @ 25 Gbaud) systems, and potentially beyond.

03/20/2023
OEMs Target Cleaner, Greener Cabin Air Conditioning

OEMs Target Cleaner, Greener Cabin Air Conditioning

A new generation of cabin air conditioning systems is emerging, prompted by a focus on reliability, air quality and sustainability.

02/09/2023
Trusted Computing for National Defense

Trusted Computing for National Defense

Cyber security enters the realm of zero trust, as military forces seek to safeguard sensitive military technologies from enemy cyber hackers and spoofers.

12/21/2022