Showing 13 - 24 of 33
Certification Authorities for Trusted Computing in Military and Avionics Products

Certification Authorities for Trusted Computing in Military and Avionics Products

This white paper provides an overview of certification authorities involved in Trusted Computing, explores which disciplines they oversee, and gives guidance on when to get these certification authorities involved.

06/25/2020
Partnering to Reduce Risk and Accelerate Development

Partnering to Reduce Risk and Accelerate Development

This white paper discusses using a joint approach to an increasingly challenging marketplace; system integrators and vendors have new opportunities to win more business, increase customer satisfaction, and strengthen their financial position.

04/30/2020
Decomposing System Security Requirements

Decomposing System Security Requirements

This white paper guides decomposing system security requirements and mapping a security plan to physical components to build a truly trusted system.

03/11/2020
Consolidate LRUs While Considering Strict SWaP Constraints

Consolidate LRUs While Considering Strict SWaP Constraints

Despite the current budget woes of defense departments, the demand continues for delivering more performance and improved functionality from rugged computers and communications subsystems to fulfill mission requirements.

10/29/2019
The Impact of Protecting I/O Interfaces on System Performance

The Impact of Protecting I/O Interfaces on System Performance

A trusted computing system can ensure security at the potentially vulnerable entry points of system interfaces, yet this may compromise performance through design trade-offs that systems designers must compensate for.

06/11/2019
Machine Learning and Artificial Intelligence in Defense and Aerospace Applications - What You Need to Know

Machine Learning and Artificial Intelligence in Defense and Aerospace Applications - What You Need to Know

This white paper discusses the terminology, applications, challenges, and technology enablers for machine learning, deep learning, and artificial intelligence (AI) in the embedded computing market.

05/29/2019
Thermal Management in Rugged Computer Systems

Thermal Management in Rugged Computer Systems

This white paper looks at the different cooling techniques available including conduction, convection, Air-Flow-Through (AFT), Liquid-Flow-Through (LFT), and Fluid-Flow-Through (FFT).

05/07/2019
Developing a Secure COTS-Based Trusted Computing System

Developing a Secure COTS-Based Trusted Computing System

System-level security is more than simply the sum of its parts. Read about key protections that must be considered when developing a secure COTS-based Trusted Computing system.

03/29/2019
Ground Vehicle Modernization with VICTORY and GVA

Ground Vehicle Modernization with VICTORY and GVA

Read about key similarities and differences between GVA and VICTORY and the benefits of using such frameworks in land vehicle upgrades and new builds.

03/06/2019
The Financial Impact of Late Delivery and How to Accelerate Your Time-to-Market

The Financial Impact of Late Delivery and How to Accelerate Your Time-to-Market

This white paper discusses the financial impact of late delivery and how to accelerate your time-to-market in the aerospace and defense industry.

02/07/2019
Beyond Trusted Computing

Beyond Trusted Computing

Read the white paper by Curtiss-Wright TCOTS experts and learn about our holistic approach to Trusted Computing that applies rigorous protection standards at every stage of the development process.

12/12/2018
Considering the Role of Hardware in Securing OS and Hypervisor Operation

Considering the Role of Hardware in Securing OS and Hypervisor Operation

This white paper by David Sheets explores the role that hardware plays in ensuring the security of operating systems (OS) and hypervisors.

11/28/2018