Trusted computing systems designers should consider system security early in the design process to prevent cyber attacks.
Mike Southworth looks at how the availability of 10 GbE Layer 3 switch technology will help eliminate data bottlenecks by bringing enterprise-class networking to the warfighter.
Jeremy Banks looks at how newer-generation processing devices offer hugely boosted capability for military applications such as airborne data processing, shipboard electronics, and ground vehicle systems.
Steve Edwards and David Sheets explore the implications of how interfaces influence system design in trusted computing.
The VITA 76.0 connector ensures exceptional signal integrity for high-speed interconnects over maximum cable length on (SWaP)-constrained ground, airborne, and naval platforms.
Denis Smetana looks at the advantages that the Intel Xeon processor D-1500 product family brings to compute-intensive embedded electronic warfare (EW) system design.
David Sheets looks at how the ability of an embedded system to identify, prevent, and respond to cyberattacksis defined by measuring its level of cybersecurity and cyber resiliency.
In this article, Steve Edwards and David Sheets look at how system security should start in system design as security touches every element of the system.
David Sheets looks at Trusted Computing in application development, testing and analysis for optimal security.
David Jedynak looks at new deployed approaches for detecting threats to GPS and providing position, navigation, and timing (PNT) information to the warfighter in GPS-denied environments.