← Back To News Center RSS Feed

Decomposing System Security to Prevent Cyber Attacks in Trusted Computing Architectures

September 26, 2018

Trusted computing systems designers should consider system security early in the design process to prevent cyber attacks.

trusted computing, anti tamper, data-at rest, cybersecurity, system design

Advances in Switching Bring Rugged 1/10 GbE Networking to Embedded Platforms

September 07, 2018

Mike Southworth looks at how the availability of 10 GbE Layer 3 switch technology will help eliminate data bottlenecks by bringing enterprise-class networking to the warfighter.

10 GBE networking, Cybersecurity, ISR, ESS technlogy, Electromagnetic Interference

Cooling the Beast: Heat-Dissipation Techniques for Next-Gen Processors

August 29, 2018

Jeremy Banks looks at how newer-generation processing devices offer hugely boosted capability for military applications such as airborne data processing, shipboard electronics, and ground vehicle systems.

FPGA, Air Flow Through Cooling, 3U VPX

The Trusted Computing Implications of Interfaces, and How They Can Influence System Performance

August 22, 2018

Steve Edwards and David Sheets explore the implications of how interfaces influence system design in trusted computing.

trusted computing, data-at rest, cybersecurity, system design

VITA 76.0 Solves 10G Cabling Need

August 21, 2018

The VITA 76.0 connector ensures exceptional signal integrity for high-speed interconnects over maximum cable length on (SWaP)-constrained ground, airborne, and naval platforms.

VITA 76, Small form factor, sff, signal integrity

Bringing VxWorks Support to Intel Xeon D-based EW Systems

August 07, 2018

Denis Smetana looks at the advantages that the Intel Xeon processor D-1500 product family brings to compute-intensive embedded electronic warfare (EW) system design.

VxWorks, Intel Xeon D, Electronic warfare, EW, C4ISR

The State of Cyber Resiliency Metrics on Embedded Systems

August 01, 2018

David Sheets looks at how the ability of an embedded system to identify, prevent, and respond to cyberattacksis defined by measuring its level of cybersecurity and cyber resiliency.

Cyber Resiliency, cybercrime, trusted computing,

Developing a Secure COTS-based Trusted Computing System: An Introduction

July 25, 2018

In this article, Steve Edwards and David Sheets look at how system security should start in system design as security touches every element of the system.

anti-tamper, cyber security, trusted computing

Trusted Computing: Application Development, Testing, and Analysis for Optimal Security

June 27, 2018

David Sheets looks at Trusted Computing in application development, testing and analysis for optimal security.

Cyber security, anti tamper, data at rest, Trusted Computing, safety critical

A Fully Integrated COTS Approach for PNT to Ground Vehicles in GPS-Denied Environments

June 07, 2018

David Jedynak looks at new deployed approaches for detecting threats to GPS and providing position, navigation, and timing (PNT) information to the warfighter in GPS-denied environments.

Electronic Warfare, electronic warfare army, electronic warfare equipment, position, navigation, and timing (PNT), VICTORY, C4ISR, , GPS-denied environment,

1   2   3   4  

Connect With Curtiss-Wright Connect With Curtiss-Wright Connect With Curtiss-Wright


Contact our sales team today to learn more about our products and services.





Our support team can help answer your questions - contact us today.