Showing 13 - 24 of 90
Aerospace & Defense Technology

Designing Rugged SWaP-Optimized MOSA Solutions for UUVs

As the U.S. Navy increases its investment in its fleet of unmanned undersea vehicles (UUV), suppliers of rugged commercial-off-the-shelf (COTS) subsystems, providing solutions for mission computers, network switches, and routers, and data storage are meeting the needs of these unique platforms.

Military & Aerospace Electronics

The Ever-Shrinking World of Small-Form-Factor Embedded Computing

New computer boards offer high performance, thermal management, and peripherals in a smaller size than 3U VPX, with artificial intelligence (AI) and GPGPU processing.

Military & Aerospace Electronics

Challenges of Risk Management Framework for Cyber Security and Trusted Computing in Embedded Computing

The RMF establishes security and privacy controls, and contains more than 800 controls to select from, many of which don't apply to embedded systems.

Military & Aerospace Electronics

The Essentials of Trusted Computing and Cyber Security

U.S. military and government information security experts try to hold the line against determined hackers seeking to break into critical computing systems from foreign governments and non-state bad actors.

Military & Aerospace Electronics

Speed and Security for Military Data Storage

Rugged data storage systems for aerospace and defense applications are moving to new data interfaces for unparalleled speed and capacity, while trusted computing and information security are driving trends.

Military & Aerospace Electronics

Cyber Security Robustness of an Embedded Computing System with Trusted Computing Measures Built-in

Cyber Security Robustness of an Embedded Computing System with Trusted Computing Measures Built-in


The Case for Distributed and Remote Management of Open Standards-Based Tactical Networks for Vehicles

To exploit the potential benefits of new technologies such as artificial intelligence (AI), robotics, video analysis, Internet of Things (IoT), augmented reality and virtual reality, and other innovative technologies on mobile platforms at the tactical edge, Department of Defense (DoD) communications programs must effectively deploy advanced IT infrastructure, connectivity, and compute resources.


Planning to Export Data-at-Rest Storage with Encryption?

In applications where data flows need to take place in nanoseconds, the delay between when an instruction is received and when it executes, known as latency, is very important.

Military Embedded Systems

Creating a Trusted Platform for Embedded Security-critical Applications

Security-critical applications, such as cross-domain solutions (CDS), require a secure, trusted platform on which to execute, spanning software, firmware, and hardware. The lowest layer that the application interacts with directly is a trusted operating system (OS).


White Paper Series: Data-At-Rest Encryption

The Data-At-Rest Encryption Series white papers provide engineers, system architects, and program managers with background information, technical details, and a methodology for selecting a data-at-rest (DAR) security approach.


White Paper Series: Trusted Computing for Aerospace and Defense

Looking for the latest on Trusted Computing for aerospace and defense? Our white paper series, Trusted Computing: The COTS Perspective, examines the technologies and trends protecting today’s critical systems from cybersecurity and physical threats.

Military & Aerospace Electronics

New Frontiers in Real-Time Software

Efficient execution is key to real-time mission-critical operating systems software, yet new demands are emerging such as safety-critical operations for avionics and other life-critical applications.