Showing 1 - 12 of 83
A COTS Approach to DAR Encryption Onboard an UUV

A COTS Approach to Data-at-Rest Encryption Onboard an Unmanned Underwater Vehicle (UUV)

Curtiss-Wright develops network-attached storage (NAS) devices for an unmanned underwater vehicle (UUV).

07/26/2024
Total LifeCycle Management

Total LifeCycle Management Brochure

With Total LifeCycle Management (TLCM), our team of experts draw from decades of experience to manage the entire lifecycle of your program components.

07/18/2024
DAR Series Part 4: NSA CSfC vs. Type 1 Encryption

DAR Series Part 4: NSA CSfC vs. Type 1 Encryption

Explore the differences and benefits of Type 1 and CSfC encryption approaches. Use this guide to make informed decisions for your program requirements.

07/03/2024
COTS Boards Brochure

COTS Boards Brochure

COTS products and open-architecture solutions for mission computing, signal processing, graphics, communication fabrics, system and sensing I/O, and data storage.

06/25/2024
Deploying Secure and Efficient NAS Solutions for a UAV

Deploying Secure and Efficient NAS Solutions for a UAV

To accelerate program development with no NRE investment and enable rapid integration, a UAV developer required a ready-to-deploy network attached storage system with reliable, redundant Ethernet network interfaces and expandable storage capacity with security.

06/12/2024
Simplified Replacement of Older Flight Data Recorders to Meet New Regulations and Data Collecting Needs

Simplified Replacement of Older Flight Data Recorders to Meet New Regulations and Data Collecting Needs

Operators of aircraft may find they need to upgrade existing flight recorder for a variety of reasons.

05/23/2024
Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

Review the challenges for deploying QR encryption and how to implement DAR and data-in-transit QR encryption solutions using commercial FPGA devices and off-the-shelf hardware.

05/22/2024
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

The goal of post-quantum cryptography is to develop cryptographic systems that are secure and can interoperate with existing communications protocols and networks.

05/22/2024
Navigating the Unseen: Mitigating Degraded Visual Environments

Navigating the Unseen: Mitigating Degraded Visual Environments

Using a Degraded Visual Environment (DVE) system enables aircraft pilots to visualize the landing area in poor conditions, allowing them a safe, on-time descent to their target destination.

05/01/2024
Using NetBoot to Reduce Maintenance and SWaP-C in Embedded Systems

Using NetBoot to Reduce Deployed System Maintenance and SWaP-C

This white paper looks at how NetBoot brings new efficiencies, better security, and significant savings to teams that are tasked with maintaining software on embedded systems.

04/16/2024
5th Generation Fighter Finds Room for Aircraft Monitoring Instrumentation

5th Generation Fighter Finds Room for Aircraft Monitoring Instrumentation

This case study describes how an operator of a 5th generation fighter found room to install aircraft monitoring instrumentation to help examine performance and rapidly identify any future issues.

04/03/2024
DAR Series Part 3: NSA Type 1 Encryption

DAR Series Part 3: NSA Type 1 Encryption

A Type 1 product is a classified or Controlled Cryptographic Item (CCI) endorsed by the NSA for securing classified and sensitive U.S. government information.

04/02/2024