Showing 25 - 36 of 48
The Impact of Protecting I/O Interfaces on System Performance

The Impact of Protecting I/O Interfaces on System Performance

A trusted computing system can ensure security at the potentially vulnerable entry points of system interfaces, yet this may compromise performance through design trade-offs that systems designers must compensate for.

06/11/2019
Machine Learning and Artificial Intelligence in Defense and Aerospace Applications - What You Need to Know

Machine Learning and Artificial Intelligence in Defense and Aerospace Applications - What You Need to Know

This white paper discusses the terminology, applications, challenges, and technology enablers for machine learning, deep learning, and artificial intelligence (AI) in the embedded computing market.

05/29/2019
Thermal Management in Rugged Computer Systems

Thermal Management in Rugged Computer Systems

This white paper looks at the different cooling techniques available including conduction, convection, Air-Flow-Through (AFT), Liquid-Flow-Through (LFT), and Fluid-Flow-Through (FFT).

05/07/2019
Developing a Secure COTS-Based Trusted Computing System

Developing a Secure COTS-Based Trusted Computing System

System-level security is more than simply the sum of its parts. Read about key protections that must be considered when developing a secure COTS-based Trusted Computing system.

03/29/2019
Ground Vehicle Modernization with VICTORY and GVA

Ground Vehicle Modernization with VICTORY and GVA

Read about key similarities and differences between GVA and VICTORY and the benefits of using such frameworks in land vehicle upgrades and new builds.

03/06/2019
The Financial Impact of Late Delivery and How to Accelerate Your Time-to-Market

The Financial Impact of Late Delivery and How to Accelerate Your Time-to-Market

This white paper discusses the financial impact of late delivery and how to accelerate your time-to-market in the aerospace and defense industry.

02/07/2019
Beyond Trusted Computing

Beyond Trusted Computing

Read the white paper by Curtiss-Wright TCOTS experts and learn about our holistic approach to Trusted Computing that applies rigorous protection standards at every stage of the development process.

12/12/2018
Considering the Role of Hardware in Securing OS and Hypervisor Operation

Considering the Role of Hardware in Securing OS and Hypervisor Operation

This white paper by David Sheets explores the role that hardware plays in ensuring the security of operating systems (OS) and hypervisors.

11/28/2018
A Matter of Trust: Reducing Program Risk with Dependable Solutions

A Matter of Trust: Reducing Program Risk with Dependable Solutions

Tactical advantage on the battlefield of the future will be based on trust and personnel will need a higher level of trust that all systems will work as needed in any situation.

10/23/2018
Trusted Boot

Trusted Boot

This white paper looks at Trusted Boot, a key strategy for ensuring that the trustworthiness of an embedded system begins with the very first software instruction at system startup in order to protect against attacks.

09/06/2018
Introduction to COTS-based Trusted Computing

Introduction to COTS-based Trusted Computing

This white paper looks at the use of open standards-based commercial-off-the-shelf (COTS) technologies to address Trusted Computing requirements in deployable embedded systems for aerospace and defense applications.

08/15/2018
Small Form Factor (SFF) Mission System Modularity Enables Choice of Distributed or Consolidated Architectures

Small Form Factor (SFF) Mission System Modularity Enables Choice of Distributed or Consolidated Architectures

This white paper explores how some of the use-case considerations and technological advances are driving system integrators to pursue a distributed over a consolidated system architecture and visa-versa.

06/27/2018