Showing 37 - 48 of 52
Considering the Role of Hardware in Securing OS and Hypervisor Operation

Considering the Role of Hardware in Securing OS and Hypervisor Operation

This white paper by David Sheets explores the role that hardware plays in ensuring the security of operating systems (OS) and hypervisors.

11/28/2018
High Speed Signal Integrity Capabilities

High Speed Signal Integrity Capabilities

Ivan Straznicky and Luke Falconer look at the implementation of high-speed serial fabric signaling on VPX/OpenVPX platforms.

10/31/2018
A Matter of Trust: Reducing Program Risk with Dependable Solutions

A Matter of Trust: Reducing Program Risk with Dependable Solutions

Tactical advantage on the battlefield of the future will be based on trust and personnel will need a higher level of trust that all systems will work as needed in any situation.

10/23/2018
Trusted Boot

Trusted Boot

This white paper looks at Trusted Boot, a key strategy for ensuring that the trustworthiness of an embedded system begins with the very first software instruction at system startup in order to protect against attacks.

09/06/2018
Introduction to COTS-based Trusted Computing

Introduction to COTS-based Trusted Computing

This white paper looks at the use of open standards-based commercial-off-the-shelf (COTS) technologies to address Trusted Computing requirements in deployable embedded systems for aerospace and defense applications.

08/15/2018
Getting Secure, Intel-Based Solutions to Market Faster - Why the Hardware Vendor’s Boot Security Implementation Is So Important

Getting Secure, Intel-Based Solutions to Market Faster - Why the Hardware Vendor’s Boot Security Implementation Is So Important

This white paper looks at how solutions with the required boot security features built-in can reduce risks and get secure products to market faster.

06/27/2018
Finding a Path Through the Woods: Choosing a Parallelization Technique

Finding a Path Through the Woods: Choosing a Parallelization Technique

In this white paper, Tammy Carter explores the options available in choosing the right parallelization technique.

06/01/2018
Combining Multiple Video Sources onto a Single Screen

Combining Multiple Video Sources onto a Single Screen

This white paper discusses how modern, powerful, and flexible video processing technology addresses the need for combining video and graphics using video scaling and windowing solutions in a rugged environment. Download the free paper!

05/15/2018
Linking Outside the Box: Connecting Embedded Systems to Wide-Area Networks

Linking Outside the Box: Connecting Embedded Systems to Wide-Area Networks

This white paper looks at the challenge of connecting embedded systems to wide-area networks(WAN) requiring features that ensure security and reliability over long-distance links.

04/26/2018
A New Era for Embedded Computing: Why Arm Processors Are Ideal for Defense, Aerospace, and Rugged Embedded Applications

A New Era for Embedded Computing: Why Arm Processors Are Ideal for Defense, Aerospace, and Rugged Embedded Applications

Why Arm processors are ideal for defense, aerospace, and rugged embedded applications.

02/28/2018
The Many Faces of Trusted Computing

The Many Faces of Trusted Computing

Defense and aerospace systems may be exposed to many security threats before, during, and after deployment. As a result, every system needs the right level of protection to ensure that it cannot be hacked or expose sensitive information.

01/10/2018
Staying Connected: High Availability Embedded Networking

Staying Connected: High Availability Embedded Networking

Embedded systems are increasingly connected to local and wide-area networks to share data and may be unable to complete mission-critical functions if connectivity is lost. This white paper looks at high-availability networking.

01/08/2018