Showing 57 - 64 of 108
Curtiss-Wright Protects Critical Data on New Arm-based 3U VPX SBC with TrustedCOTS Security

Curtiss-Wright Protects Critical Data on New Arm-based 3U VPX SBC with TrustedCOTS Security

Rugged VPX3-1707 SBC features 16-Core NXP Arm Layerscape processor and advanced security features to protect against cyber-attacks and reverse engineering.

10/14/2019
article

Managing Next-Generation Open Standard Vehicle Electronics Architectures

Newer on-vehicle integrated networks will be composed of heterogeneous networks in the form of software and equipment from multiple commercial vendors.

10/02/2019
Curtiss-Wright and L3Harris Technologies to Demonstrate Breakthrough Advancements in ISR Data-at-Rest Encryption

Curtiss-Wright and L3Harris Technologies to Demo Breakthrough Advancements in Data-at-Rest Encryption

A live demonstration presenting certification-ready encryption of intelligence, surveillance, and reconnaissance (ISR) data with a read/write throughput of 10/17 Gbps (nominal/maximum) per data channel.

09/17/2019
Curtiss-Wright, Green Hills, and L3Harris Technologies Demo FACE Conformant Software Running on 7th Generation Intel Xeon Platform

Curtiss-Wright, Green Hills, and L3Harris Technologies Demo FACE Conformant Software Running on 7th Gen Intel Xeon Platform

The demo features L3Harris’s FliteScene® Digital Moving Map Software, Green Hills Software INTEGRITY-178® tuMP RTOS, and Curtiss-Wright Single Board Computers and Graphics Modules.

09/17/2019
Curtiss-Wright’s Latest 3U OpenVPX DSP Module is First to Deliver the Power of Intel Xeon D and Xilinx MPSoC FPGA Processing with TrustedCOTS Security

Curtiss-Wright’s Latest 3U OpenVPX DSP Module is First to Deliver the Power of Intel Xeon D and Xilinx MPSoC FPGA Processing with TrustedCOTS Security

Curtiss-Wright's latest 3U OpenVPX DSP module is the first to deliver the power of Intel® Xeon® D and Xilinx® MPSoC FPGA processing with TrustedCOTS security.

09/10/2019
Military & Aerospace Electronics

Understanding Cyber Attacks in Embedded Computing Enables Integrators and Suppliers to Consider Options

The trusted computing task is to apply practical measures that can mitigate the effects of known cyber threats to aerospace and defense systems.

08/21/2019
Military & Aerospace Electronics

Trusted Computing and the Challenges of Cryptographic Algorithms in Quantum Computing

Quantum computing processes an algorithm by configuring quantum gates and initializing the qubits. Taking a measurement resolves the quantum states.

07/24/2019
Military & Aerospace Electronics

Trusted Computing Can Depend on Asymmetric Cryptography Algorithms to Assure the Integrity of Protected Data

Asymmetric algorithms enable systems designers to pair keys to facilitate more novel cryptographic operations than traditional symmetric algorithms.

06/26/2019