Showing 9 - 16 of 66
Wind River and Curtiss-Wright Collaborate on Cybersecurity Protections for Defense Systems

Wind River and Curtiss-Wright Collaborate on Cybersecurity Protections for Defense Systems

Wind River Titanium Security Suite integrated, tested, and validated on Curtiss-Wright OpenVPX™ module portfolio.

01/05/2021
Military & Aerospace Electronics

New Frontiers in Real-Time Software

Efficient execution is key to real-time mission-critical operating systems software, yet new demands are emerging such as safety-critical operations for avionics and other life-critical applications.

07/23/2020
Military & Aerospace Electronics

Radiation Tolerance Meets Commercial Space

The wave of commercially developed communications and remote-sensing satellites seeks to balance costs, capability, size, weight, and power consumption in the latest new space designs.

06/20/2020
Military Embedded Systems

Contested Space, Small Sats, and the Gamble on COTS in Space

Contested space, where nations compete for military dominance outside Earth’s atmosphere, is driving many military space platforms, but commercial space and small satellites continue to change the way the military suppliers of space electronics approach radiation-hardened component design from testing to deployment.

06/04/2020
Avionics International

Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft Systems?

Aviation cybersecurity mandates by the European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) are coming in the next two years.

04/09/2020
Military & Aerospace Electronics

Designers of Small Rugged Computers for the Battlefield Balance Size, Performance, and Cooling

Commercial off-the-shelf (COTS) components are being embraced so the technology can be serviced at the base instead of waiting for specialized parts or sending the system back state-side.

02/03/2020
Military & Aerospace Electronics

Military Cyber Security: Threats and Solutions

U.S. government and military are taking a lead role in protecting sensitive computers from cyber attack, and solutions finally are on the horizon.

12/18/2019
Military & Aerospace Electronics

Trusted Computing: An Overview

Attacks are getting sophisticated. Examples include Rowhammer, Meltdown, Spectre, and others. System designers need to consider many attack vectors.

12/18/2019