Showing 73 - 80 of 136
Curtiss-Wright and Green Hills Collaborate to Demo INTEGRITY-178 tuMP Safety-Certifiable RTOS on Arm VPX3-1703 SBC

Curtiss-Wright and Green Hills Collaborate to Demo INTEGRITY-178 tuMP Safety-Certifiable RTOS on Arm VPX3-1703 SBC

Green Hills Software’s field-proven INTEGRITY-178 tuMP safety- and security-critical multi-core real-time operating system (RTOS) will be demonstrated for the first time running on the Curtiss-Wright VPX3-1703.

04/15/2019
Military & Aerospace Electronics

Trends in Trusted Computing and Network Security in Aerospace and Defense Embedded Computing Applications

In a constantly evolving threat environment, where new attacks arrive virtually every day, system architects must design networks to be as secure as possible.

03/28/2019
data acquisition system

A Monitoring Solution for Variable Frequency Power Generators

The Axon data acquisition system and the Axon AXN/ADC/408 module is the industry’s only solution to support 1.8 Msps sampling rates.

03/11/2019
Military & Aerospace Electronics

Optimizing Cyber Security and Trusted Computing on Today’s Connected Military and Commercial Aircraft

If not properly protected by taking trusted computing measures, every system on an aircraft can create a potential vulnerability. Paul Hart talks about optimizing cyber security on today’s connected military and commercial aircraft.

02/27/2019
The Cyber Edge

Architecting Cybersecurity Into Embedded Systems

Curtiss-Wright's anti-tamper and cyber resiliency expert offers insight to understanding interplay between cybersecurity techniques and embedded solutions.

01/01/2019
Military & Aerospace Electronics

A Guide to International Authorities for Global Trusted Computing Standards Certification

Trusted computing standards are evolving constantly within the United States, which can be confusing enough. International trusted computing standards can be even more difficult.

12/19/2018
Military & Aerospace Electronics

Military Organizes for Cyber Warfare

J.R. Wilson from Military & Aerospace looks closely at how U.S. warfighters work aggressively to protect computers and networks, just as they would do to protect territory, airspace, sea lanes, and access to space.

12/01/2018
Military & Aerospace Electronics

Introduction to Certification Authorities for Trusted Computing in Military and Avionics Products

In the world of security and trusted computing, there are many different disciplines involved. With a constantly evolving set of standards, learn what certifications might apply.

11/29/2018