Article Military Cyber Security: Threats and Solutions U.S. government and military are taking a lead role in protecting sensitive computers from cyber attack, and solutions finally are on the horizon. 12/18/2019
Article Trusted Computing: An Overview Attacks are getting sophisticated. Examples include Rowhammer, Meltdown, Spectre, and others. System designers need to consider many attack vectors. 12/18/2019
Article What is a Tensor and Why Should I Care? The magic of tensors comes from their special transformational properties that enable them to describe the same physics in all reference frames. 12/09/2019
Article Understanding Cyber Attacks in Embedded Computing Enables Integrators and Suppliers to Consider Options The trusted computing task is to apply practical measures that can mitigate the effects of known cyber threats to aerospace and defense systems. 08/21/2019
Article Using Frameworks in Machine Learning This column will focus on frameworks that work with NVIDIA’s TensorRT, a tool for deploying high-performance deep neural networks. 08/13/2019
Press release Curtiss-Wright and PacStar Collaborate to Demo Single Pane of Glass Dashboard for Management of VICTORY Networks The demo features PacStar’s IQ-Core Software network management software running on Curtiss-Wright rugged mission computers. 08/13/2019
Press release Curtiss-Wright Showcases Latest Avionics, Vetronics, and Naval Solutions for Canadian Defense Programs at CANSEC 2019 Curtiss-Wright will highlight a wide range of its products designed and manufactured at its Ottawa and Mississauga facilities. 05/29/2019
Article New Developments in Aviation Cybersecurity and Next-Generation Crash Recorders Paul Hart discusses the latest EASA regulations for cybersecurity and DO-326A Airworthiness Security Process Specifications. 05/17/2019