Showing 13 - 24 of 78
Military & Aerospace Electronics

The Ever-Shrinking World of Small-Form-Factor Embedded Computing

New computer boards offer high performance, thermal management, and peripherals in a smaller size than 3U VPX, with artificial intelligence (AI) and GPGPU processing.

04/01/2021
Military & Aerospace Electronics

Challenges of Risk Management Framework for Cyber Security and Trusted Computing in Embedded Computing

The RMF establishes security and privacy controls, and contains more than 800 controls to select from, many of which don't apply to embedded systems.

01/27/2021
Honeywell, Curtiss-Wright Receive EASA Certification for 25-Hour Cockpit Recorder for the Air Transport Market

Honeywell, Curtiss-Wright Receive EASA Certification for 25-Hour Cockpit Recorder for the Air Transport Market

New Cockpit Voice Recorder receives EASA Technical Standard Order.

01/19/2021
Military & Aerospace Electronics

The Essentials of Trusted Computing and Cyber Security

U.S. military and government information security experts try to hold the line against determined hackers seeking to break into critical computing systems from foreign governments and non-state bad actors.

01/06/2021
Military & Aerospace Electronics

Speed and Security for Military Data Storage

Rugged data storage systems for aerospace and defense applications are moving to new data interfaces for unparalleled speed and capacity, while trusted computing and information security are driving trends.

01/06/2021
Military & Aerospace Electronics

Cyber Security Robustness of an Embedded Computing System with Trusted Computing Measures Built-in

Cyber Security Robustness of an Embedded Computing System with Trusted Computing Measures Built-in

12/16/2020
article

The Case for Distributed and Remote Management of Open Standards-Based Tactical Networks for Vehicles

To exploit the potential benefits of new technologies such as artificial intelligence (AI), robotics, video analysis, Internet of Things (IoT), augmented reality and virtual reality, and other innovative technologies on mobile platforms at the tactical edge, Department of Defense (DoD) communications programs must effectively deploy advanced IT infrastructure, connectivity, and compute resources.

11/19/2020

Planning to Export Data-at-Rest Storage with Encryption?

In applications where data flows need to take place in nanoseconds, the delay between when an instruction is received and when it executes, known as latency, is very important.

11/12/2020
Military Embedded Systems

Creating a Trusted Platform for Embedded Security-critical Applications

Security-critical applications, such as cross-domain solutions (CDS), require a secure, trusted platform on which to execute, spanning software, firmware, and hardware. The lowest layer that the application interacts with directly is a trusted operating system (OS).

10/08/2020

White Paper Series: Data-At-Rest Encryption

The Data-At-Rest Encryption Series white papers provide engineers, system architects, and program managers with background information, technical details, and a methodology for selecting a data-at-rest (DAR) security approach.

08/27/2020

White Paper Series: Trusted Computing for Aerospace and Defense

Looking for the latest on Trusted Computing for aerospace and defense? Our white paper series, Trusted Computing: The COTS Perspective, examines the technologies and trends protecting today’s critical systems from cybersecurity and physical threats.

08/06/2020
Military & Aerospace Electronics

New Frontiers in Real-Time Software

Efficient execution is key to real-time mission-critical operating systems software, yet new demands are emerging such as safety-critical operations for avionics and other life-critical applications.

07/23/2020