GPU and FPGA go Head-to-Head
Today’s embedded-system designers have a great variety of processor types to select from, with FPGAs and GPUs adding their own various advantages and disadvantages for consideration in contrast to the more familiar CPUs.
Curtiss-Wright and Concurrent Real-Time Team to Bring RedHawk Linux to the Parvus DuraCOR 312 Mission Computer
RedHawk Linux RTOS validated for use with DuraCOR 312, rugged COTS mission computer integrating NVIDIA® Jetson TX2i
Curtiss-Wright Debuts NVIDIA Jetson AGX Xavier-based Rugged SFF Mission Computer for AI/Neural Network Applications
New Parvus DuraCOR AGX-Xavier brings high-performance NVIDIA® GPU-accelerated processing to deployable rugged mission computer for aerospace and defense applications.
Curtiss-Wright Selected to Provide Ultra Small Form Factor Flight Computer and Ethernet Switch for New All-Electric Air Taxi
Parvus® DuraCOR® 311 embedded computer and Parvus DuraNET® 20-11 8-port GbE switch to be used during flight test stage of new eVTOL aircraft’s development.
Robotic Combat Vehicles: Putting the Brains Behind the Brawn
A new era of Robotic Combat Vehicles (RCV) is about to begin. The U.S. Army is getting ready to evaluate competing candidates to meet requirements for light and medium versions of a new class of modular unmanned ground vehicle (UGV).
Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft Systems?
Aviation cybersecurity mandates by the European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) are coming in the next two years.
Designers of Small Rugged Computers for the Battlefield Balance Size, Performance, and Cooling
Commercial off-the-shelf (COTS) components are being embraced so the technology can be serviced at the base instead of waiting for specialized parts or sending the system back state-side.
Military Cyber Security: Threats and Solutions
U.S. government and military are taking a lead role in protecting sensitive computers from cyber attack, and solutions finally are on the horizon.
Trusted Computing: An Overview
Attacks are getting sophisticated. Examples include Rowhammer, Meltdown, Spectre, and others. System designers need to consider many attack vectors.
Understanding Cyber Attacks in Embedded Computing Enables Integrators and Suppliers to Consider Options
The trusted computing task is to apply practical measures that can mitigate the effects of known cyber threats to aerospace and defense systems.
Curtiss-Wright and PacStar Collaborate to Demo Single Pane of Glass Dashboard for Management of VICTORY Networks
The demo features PacStar’s IQ-Core Software network management software running on Curtiss-Wright rugged mission computers.
New Developments in Aviation Cybersecurity and Next-Generation Crash Recorders
Paul Hart discusses the latest EASA regulations for cybersecurity and DO-326A Airworthiness Security Process Specifications.