Showing 1 - 12 of 62
Understanding the Power-to-Performance Capabilities of Intel Processors White Paper

Understanding the Power-to-Performance Capabilities of Intel Processors

There is a popular industry misconception that Intel processors draw more power than Power Architecture and Arm processors. This paper discusses how that is not the case.

04/17/2024
DAR Series Part 3: NSA Type 1 Encryption

DAR Series Part 3: NSA Type 1 Encryption

A Type 1 product is a classified or Controlled Cryptographic Item (CCI) endorsed by the NSA for securing classified and sensitive U.S. government information.

04/02/2024
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the NSA CSfC program, data at rest encryption, capability package, protection profiles, components & layers, and trusted integrators.

03/13/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation.

01/04/2024
Solving the Tactical Communications Challenge

Solving the Tactical Communications Challenge

Building connected and workable communications in remote environments presents unique challenges, but the right technology can keep users connected in even contested and harsh environments.

10/03/2023
SOSA UAV

The SOSA Technical Standard and Trusted Computing for Defense Systems

The SOSA Technical Standard combines MOSA principles with security to enable secure sensor processing systems to be quickly developed and deployed in a low-risk environment.

03/09/2023

How to Lower the Cost and Risk of a New Tactical Data Link Solution

By using a proven, easy-to-use, comprehensive technology suite, ROI is increased, and greater capability is delivered with less downtime incurred.

11/15/2022

Securing Communications at the Tactical Edge Using HSMs

Hardware Security Modules (HSMs) - why their use is critical for today’s secure networks in the datacenter and at the tactical edge.

11/11/2022
Defining the C5ISR Space for Army Vehicles

Defining the C5ISR Space for Army Vehicles

To lower the cost and help speed the pace of technology upgrades for command, control, computers, communications, cyber, intelligence, surveillance and reconnaissance (C5ISR) systems on Army vehicles – while supporting the U.S.

05/04/2022
Optimize Network Access at the Tactical Edge with Software-Defined Wide Area Networking

Optimize Network Access at the Tactical Edge with Software Defined Wide Area Networking

This paper illustrates the current barriers to communication and situational understanding (SA) and orients the reader to tools that are available today to break down these barriers. Today’s warfighters can’t be impaired by a lack of information.

04/28/2022
The MOSA Imperative

Modular Open Systems Approach: The MOSA Imperative

This paper aims to put MOSA (Modular Open Systems Approach) into perspective and enable you, whether a defense contractor, a decision-maker at the DoD, or a public policymaker, to put the increasingly relevant MOSA to use better.

04/06/2022
Intelligent Sensor Data Analytics at the Tactical Edge

Intelligent Sensor Data Analytics at the Tactical Edge

Whether centralized or at the edge, one of the biggest military needs existing today is the imperative for a common operating picture (COP) with support for pattern of life (POL) analysis across all relevant data sets.

04/05/2022