Showing 17 - 24 of 60
Military & Aerospace Electronics

Military Cyber Security: Threats and Solutions

U.S. government and military are taking a lead role in protecting sensitive computers from cyber attack, and solutions finally are on the horizon.

12/18/2019
Military & Aerospace Electronics

Trusted Computing: An Overview

Attacks are getting sophisticated. Examples include Rowhammer, Meltdown, Spectre, and others. System designers need to consider many attack vectors.

12/18/2019
Military & Aerospace Electronics

Understanding Cyber Attacks in Embedded Computing Enables Integrators and Suppliers to Consider Options

The trusted computing task is to apply practical measures that can mitigate the effects of known cyber threats to aerospace and defense systems.

08/21/2019
Curtiss-Wright and PacStar Collaborate to Demo Single Pane of Glass Dashboard for Management of VICTORY Networks

Curtiss-Wright and PacStar Collaborate to Demo Single Pane of Glass Dashboard for Management of VICTORY Networks

The demo features PacStar’s IQ-Core Software network management software running on Curtiss-Wright rugged mission computers.

08/13/2019
SAE MOBILUS

New Developments in Aviation Cybersecurity and Next-Generation Crash Recorders

Paul Hart discusses the latest EASA regulations for cybersecurity and DO-326A Airworthiness Security Process Specifications.

05/17/2019
thermal management computer

Keeping Cool When Things Heat Up

Ruggedized mission computer systems face unique challenges for keeping cool in extreme environments. Read more about thermal management.

05/14/2019
Curtiss-Wright to Demonstrate DO-254/DO-178C DAL A Safety-Certifiable Avionics Modules at IDEF 2019

Curtiss-Wright to Demonstrate DO-254/DO-178C DAL A Safety-Certifiable Avionics Modules at IDEF 2019

Demo highlights DO-178 safety-certifiable VxWorks® 653 3.0.1.1 RTOS on Curtiss-Wright VPX3-152 SBC and graphics modules and cost-effective development path

04/30/2019
Military & Aerospace Electronics

Trends in Trusted Computing and Network Security in Aerospace and Defense Embedded Computing Applications

In a constantly evolving threat environment, where new attacks arrive virtually every day, system architects must design networks to be as secure as possible.

03/28/2019