Showing 65 - 72 of 80
Military & Aerospace Electronics

Trusted Computing Hardware Features for Maintaining Cyber Security During Operation

We look at the hardware features built-in to the most popular defense and aerospace processor architectures to ensure the continued cyber security of a trusted computing system.

04/25/2018
Military & Aerospace Electronics

Trusted Boot: A Key Strategy for Ensuring the Trustworthiness of an Embedded Computing System

Steve Edwards looks at how Trusted Boot is a key strategy for ensuring the trustworthiness of an embedded computing system against cyber attacks.

04/25/2018
Curtiss-Wright Debuts Industry’s First 8th Gen Intel Xeon-based 3U OpenVPX SBC

Curtiss-Wright Debuts Industry’s First 8th Gen Intel Xeon-based 3U OpenVPX SBC

Curtiss-Wright Debuts Industry’s First 8th Gen Intel Xeon-based 3U OpenVPX Single Board Computer.

04/03/2018
Aerospace Testing International

Validation with High-Speed Cameras

In flight test instrumentation applications, high-speed cameras are essential for conducting photogrammetric studies to validate performance prediction models. Read about Curtiss-Wright's recently introduced high-speed camera.

03/01/2018
Curtiss-Wright to Provide Sikorsky with Air Data Computers and Windshield Anti-Ice Controllers

Curtiss-Wright to Provide Sikorsky with Air Data Computers and Windshield Anti-Ice Controllers

Curtiss-Wright to Provide Sikorsky with Air Data Computers and Windshield Anti-Ice Controllers for use on UH-60M and other variants of the Black Hawk Helicopter.

02/27/2018
Military & Aerospace Electronics

COTS-Based Trusted Computing: Getting Started in Next-Generation Mission-Critical Electronics

Trusted computing involves technologies protect mission-critical embedded electronics from physical and remote attacks and from hardware and software failures.

02/21/2018
trusted computing security

Trusted Computing: A Layered Approach to Security

Aaron Frank looks at how security must be implemented at every layer of each solution to create a system that can be fully trusted.

01/30/2018
Military Embedded Systems

Establishing a Root of Trust: Trusted Computing and Intel-based Systems

Steve Edwards looks at trusted computing solutions that carry effective protections against cyberattacks.

08/03/2017