Showing 729 - 736 of 1219
Curtiss-Wright Introduces its First Tri-Band (L/S/C) Multimode Transmitter for Aerospace Instrumentation Applications

Curtiss-Wright Introduces its First Tri-Band (L/S/C) Multimode Transmitter for Aerospace Instrumentation Applications

Curtiss-Wright Introduces its First Tri-Band (L/S/C) Multimode Transmitter for Aerospace Instrumentation Applications.

05/09/2018
military tank networking

Switch vs Router: What’s the Difference?

Understanding what distinguishes between “switch” and “router” is key to selecting the right networking solution.

05/02/2018
Aerospace & Defense Technology

Protecting Critical Data on Unmanned Underwater Platforms

merging mission requirements from global defense forces are driving new programs and applications for Unmanned Underwater Vehicle (UUV) platforms.

05/01/2018
article

Pushing Airborne ISR Data Recorders to New Performance Heights

Paul Davis looks at how it’s now possible to design digital data recorders that can absorb upwards of 6 GB per second of streaming data, 400 percent more bandwidth then the fastest SFPDP recorder could handle.

04/30/2018
Electronic Products

Defense Spending Opens Door to System Technology Innovations

Mike MacPherson looks at where that budget will be spent and what areas may present opportunities for designers to innovate to close current and future technology gaps.

04/27/2018
Flight safety UAV

Serial Implementations of Flight Termination Systems

We take a look at how switching to a serial wiring approach on flight termination systems can reduce wiring and allow for additional features.

04/26/2018
Military & Aerospace Electronics

Trusted Computing Hardware Features for Maintaining Cyber Security During Operation

We look at the hardware features built-in to the most popular defense and aerospace processor architectures to ensure the continued cyber security of a trusted computing system.

04/25/2018
Military & Aerospace Electronics

Trusted Boot: A Key Strategy for Ensuring the Trustworthiness of an Embedded Computing System

Steve Edwards looks at how Trusted Boot is a key strategy for ensuring the trustworthiness of an embedded computing system against cyber attacks.

04/25/2018