Filter by:

Showing 241 - 252 of 484
Video System Upgrade on Aerial Support Aircraft

Video System Upgrade on Aerial Support Aircraft

The rapid change in both sensor and video system technology in the last decade has pushed aircraft operators to evaluate their system architecture to maximize performance and reduce complexity and system weight.

08/06/2019
High Speed NAS for a Wide-Area Persistent Surveillance Pod

High Speed NAS for a Wide-Area Persistent Surveillance Pod

TCG HUNTR software installed on a Parvus DuraCOR 8043 mission computer, displayed on a GVDU mission display, provides operators with a rugged, small form factor solution that can be used on the battlefield with minimal training and almost no expertise.

06/20/2019
The Impact of Protecting I/O Interfaces on System Performance

The Impact of Protecting I/O Interfaces on System Performance

A trusted computing system can ensure security at the potentially vulnerable entry points of system interfaces, yet this may compromise performance through design trade-offs that systems designers must compensate for.

06/11/2019
Powerful Recorder Solution Meets New Rotorcraft Regulations

Powerful Recorder Solution Meets New Rotorcraft Regulations

This case study describes how a rotorcraft manufacturer upgraded its existing flight data recorders with one designed to accommodate enhanced data acquisition needs and meet current and upcoming regulations.

06/05/2019
Pre-integrated, Rugged COTS Computers Reduce AEW&C Program Costs and Time to Market

Pre-integrated, Rugged COTS Computers Reduce AEW&C Program Costs and Time to Market

When 30-year-old airborne surveillance and control equipment mounted on the underside of an aging helicopter required replacement, the manufacturer needed a partner they could rely on to provide mission-critical processing technology in harsh environments.

06/03/2019
5th Generation Fighter Finds Room for Aircraft Monitoring Instrumentation

5th Generation Fighter Finds Room for Aircraft Monitoring Instrumentation

This case study describes how an operator of a 5th generation fighter found room to install aircraft monitoring instrumentation to help examine performance and rapidly identify any future issues.

05/30/2019
Machine Learning and Artificial Intelligence in Defense and Aerospace Applications - What You Need to Know

Machine Learning and Artificial Intelligence in Defense and Aerospace Applications - What You Need to Know

This white paper discusses the terminology, applications, challenges, and technology enablers for machine learning, deep learning, and artificial intelligence (AI) in the embedded computing market.

05/29/2019
Protecting Data-at-Rest with NSA CSfC Approved Encryption on a UAV

Protecting Data-at-Rest with NSA CSfC Approved Encryption on a UAV

When a large system integrator needed a SWaP optimized, rugged, network-attached storage system with NSA-approved encryption, a UAV contacted Curtiss-Wright for a trusted, proven solution.

05/23/2019
Thermal Management in Rugged Computer Systems

Thermal Management in Rugged Computer Systems

This white paper looks at the different cooling techniques available including conduction, convection, Air-Flow-Through (AFT), Liquid-Flow-Through (LFT), and Fluid-Flow-Through (FFT).

05/07/2019
Boeing MQ-25 Unmanned Tanker for the U.S. Navy

Boeing MQ-25 Unmanned Tanker for the U.S. Navy

This video (courtesy of The Boeing Company) introduces you to the MQ-25 unmanned tanker. Curtiss-Wright provides leading-edge solutions to The Boeing Company for this platform.

04/23/2019
PacStar Tactical Communications Solutions Video

PacStar Tactical Communications Solutions Video

Curtiss-Wright's PacStar hardware, software, and integrated solutions enhance communications for defense, government, commercial organizations, and incident response teams in rugged and remote locations around the world.

04/01/2019
Developing a Secure COTS-Based Trusted Computing System

Developing a Secure COTS-Based Trusted Computing System

System-level security is more than simply the sum of its parts. Read about key protections that must be considered when developing a secure COTS-based Trusted Computing system.

03/29/2019