Filter by:

Showing 205 - 216 of 479
Successful COTS Solution for Space Vehicle Onboard Recording & Audio Handling

Successful COTS Solution for Space Vehicle Onboard Recording and Audio Handling

This case study describes how a space vehicle designer was able to rapidly implement a system to collect all of the data from onboard computers and accommodate late changes to requirements.

04/23/2020
Establishing a Trusted Supply Chain

Establishing a Trusted Supply Chain

This paper examines the best practices commercial off-the-shelf (COTS) hardware vendors must employ to establish a trusted supply chain, including managing obsolescence, counterfeit parts mitigation, secure manufacturing, and design integrity.

04/22/2020
Mission Recorder With Secure Data Storage for Utility Helicopter

Mission Recorder With Secure Data Storage for Utility Helicopter

Gathering and analyzing mission data onboard a utility helicopter requires secure data recording and storage.

04/17/2020
Degraded Visual Environment (DVE) video

Degraded Visual Environment (DVE)

Degraded Visual Environment systems provide pilots with the advanced visual technology needed to safely land their aircraft. See how our DVE systems can help you!

04/09/2020
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation. DAR is particularly at risk during missions if the deployed vehicle is lost but is also at risk during transport to and from the vehicle.

03/31/2020
USFF Mission Processors and Network Switches for ISR UAV Targeting System

USFF Mission Processors and Network Switches for ISR UAV Targeting System

As unmanned vehicles become more powerful and complex, their electronics payloads must adapt to match new mission objectives. This often forces aerospace and defense system integrators to push for reductions in size, weight, power, and cost (SWaP-C).

03/19/2020
Decomposing System Security Requirements

Decomposing System Security Requirements

This white paper guides decomposing system security requirements and mapping a security plan to physical components to build a truly trusted system.

03/11/2020
Use Case: Advanced Tactical Data Link Gateway for the Modern Warfighter

Use Case: Advanced Tactical Data Link Gateway for the Modern Warfighter

TCG HUNTR software installed on a Parvus DuraCOR 8043 mission computer, displayed on a GVDU mission display, provides operators with a rugged, small form factor solution that can be used on the battlefield with minimal training and almost no expertise.

03/04/2020
Next Generation Data Acquisition System for a Sounding Rocket

Next Generation Data Acquisition System for a Sounding Rocket

Sounding rockets can carry experiments to altitudes that are often unsuitable for balloons and satellites and are much more cost-efficient since they do not require expensive boosters or extended telemetry and tracking coverage.

02/14/2020
Rugged, Encrypted Data Storage for an ISR Pod

Rugged, Encrypted Data Storage for an ISR Pod

A customer sought a secure data storage solution that could maintain reliability under extreme temperatures and vibration, and be available off the shelf.

02/04/2020
The Wright Data: Enhancing Aircraft System Monitoring and Reducing Unscheduled Maintenance

The Wright Data: Enhancing Aircraft System Monitoring and Reducing Unscheduled Maintenance

This white paper discusses the problem of inefficient maintenance, lack of access to the right data, and how aircraft can be retrofitted with instrumentation to more quickly identify impending failures, rapidly repair them, and minimize aircraft downtime.

01/31/2020
Saab’s Target Towing Video System Upgrade

Saab's Target Towing Video System Upgrade

The project involved upgrading their existing video system that helped provide situational awareness during the target towing process.

01/17/2020