Showing 1 - 12 of 78
Understanding the Power-to-Performance Capabilities of Intel Processors White Paper

Understanding the Power-to-Performance Capabilities of Intel Processors

There is a popular industry misconception that Intel processors draw more power than Power Architecture and Arm processors. This paper discusses how that is not the case.

04/17/2024
DAR Series Part 3: NSA Type 1 Encryption

DAR Series Part 3: NSA Type 1 Encryption

A Type 1 product is a classified or Controlled Cryptographic Item (CCI) endorsed by the NSA for securing classified and sensitive U.S. government information.

04/02/2024
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the NSA CSfC program, data at rest encryption, capability package, protection profiles, components & layers, and trusted integrators.

03/13/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation.

01/04/2024
Solving the Tactical Communications Challenge

Solving the Tactical Communications Challenge

Building connected and workable communications in remote environments presents unique challenges, but the right technology can keep users connected in even contested and harsh environments.

10/03/2023
DSP

Right-Sizing Embedded Digital Signal Processing

Delivering more predictable processing through a balance of performance, memory, and power is essential to harness the digital signal processing capabilities for ISR applications.

03/14/2023
SOSA UAV

The SOSA Technical Standard and Trusted Computing for Defense Systems

The SOSA Technical Standard combines MOSA principles with security to enable secure sensor processing systems to be quickly developed and deployed in a low-risk environment.

03/09/2023
TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing

TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing

TrustedCOTS™ and Enhanced Trusted COTS technologies use an OSA for embedding security, enabling customers to leverage S-SOTA technologies.

03/09/2023

Securing Communications at the Tactical Edge Using HSMs

Hardware Security Modules (HSMs) - why their use is critical for today’s secure networks in the datacenter and at the tactical edge.

11/11/2022
Software Defined Radio Demo Walk Through AUSA 2022

Software Defined Radio Demo Walk Through AUSA 2022

The VPX3-E320 3U VPX ruggedized, user-programmable software-defined radio card is ideal for low-to-medium bandwidth RF applications

10/27/2022
The Open Group Sensor Open Systems Architecture (SOSA) and CMOSS Brochure

The Open Group Sensor Open Systems Architecture and CMOSS Brochure

Technical standards like SOSA and CMOSS alleviate interoperability, sustainability, and SWaP challenges by efficiently reusing proven technology.

05/26/2022
COTS Boards Brochure

COTS Boards Brochure

COTS products and open-architecture solutions for mission computing, signal processing, graphics, communication fabrics, system and sensing I/O, and data storage.

05/16/2022