Showing 1 - 12 of 45
Meeting DAL A Challenges with Dissimilar Redundant Architecture

Meeting DAL A Challenges with Dissimilar Redundant Architecture

This white paper examines how building a system with a dissimilar redundant architecture can help overcome the challenges of meeting DO-254/178 DAL A requirements.

05/22/2024
Defining the C5ISR Space for Army Vehicles

Optimizing Army Vehicle Interoperability with Open Architecture

The goal of reducing the cost of equipping Army vehicles with new capabilities, while adding increasing interoperability and flexibility of operation, can be accomplished through the use of a Modular Open Systems Approach (MOSA), a technical and business strategy for designing an affordable and adaptable system.

05/10/2024
Using NetBoot to Reduce Maintenance and SWaP-C in Embedded Systems

Using NetBoot to Reduce Deployed System Maintenance and SWaP-C

This white paper looks at how NetBoot brings new efficiencies, better security, and significant savings to teams that are tasked with maintaining software on embedded systems.

04/16/2024
DAR Series Part 3: NSA Type 1 Encryption

DAR Series Part 3: NSA Type 1 Encryption

A Type 1 product is a classified or Controlled Cryptographic Item (CCI) endorsed by the NSA for securing classified and sensitive U.S. government information.

04/02/2024
Certifying Multi-Core Processing Following AMC 20-193/AC 20-193 Objectives

Certifying Multi-Core Processing Following AMC 20-193/AC 20-193 Objectives

This white paper examines the key challenges multi-core processors present in safety-certifiable systems, and the traditional and newer, more effective techniques for alleviating them to ensure MCP-based systems will safely perform their intended functions.

04/01/2024
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the NSA CSfC program, data at rest encryption, capability package, protection profiles, components & layers, and trusted integrators.

03/13/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation.

01/04/2024
ground vehicle header image

Ground Vehicle Mission Management Systems

Mission management systems that meet ever-present size, weight, and power (SWaP) demands while providing the scalability and flexibility to handle all of the mission tasks today’s warfighter may encounter.

10/26/2023
System Solutions Brochure

System Solutions Brochure

Whether looking for a modular, SFF LRU or a scalable VPX system designed to meet your program requirements, Curtiss-Wright computing systems are built rugged to perform optimally in the harshest deployed environments on land, in the air, or at sea.

07/12/2023
High-Speed Data Recording Insights for the Military Embedded Industry

High-Speed Data Recording Insights for the Military Embedded Industry

This paper covers encryption approaches for high-speed networks and solutions, taking into consideration a recording system’s size and power requirements.

05/22/2023
TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing

TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing

TrustedCOTS™ and Enhanced Trusted COTS technologies use an OSA for embedding security, enabling customers to leverage S-SOTA technologies.

03/09/2023

Securing Communications at the Tactical Edge Using HSMs

Hardware Security Modules (HSMs) - why their use is critical for today’s secure networks in the datacenter and at the tactical edge.

11/11/2022