Showing 281 - 288 of 415
Embedded Computing Design

Testing Safety-Certifiable Software

Given its complexity and the critical applications for which it is designed, embedded avionics software must undergo a rigorous approval and testing process before it can be approved as airworthy.

10/25/2018
Military & Aerospace Electronics

Establishing a Trusted Supply Chain for Embedded Computing Design

Read how the Curtiss-Wright trusted computing services are one example of the processes and procedures essential for protecting the supply chain of embedded computing components.

10/24/2018
Aerospace Testing International

Ethernet IP Camera for Airborne Applications

Russ Moore discusses Ethernet IP cameras used for flight test instrumentation and the need for them to be ruggedized and use the latest compression technology and network equipment to provide excellent results.

10/23/2018
Military Embedded Systems

Milestone in Abstracting the Hardware: Realizing the Promise of FACE

With the wide adoption of FACE, system integrators can reap tremendous benefits in interoperability and cost.

10/17/2018
Military & Aerospace Electronics

Thermal Management for High-Performance Embedded Computing

Ivan Straznicky explains how liquid cooling is becoming more efficient and affordable to give systems designers a leg-up in the battle against electronics heat.

10/01/2018
article

ISR Signal Processing Brings Performance to Sensors and Enables AI at the Edge

Military intelligence, surveillance, and reconnaissance (ISR) applications continue to make demands on signal-processing designers. Read about how Curtiss-Wright is enabling such performance.

09/28/2018
Marine Corps Times

Get Ready To Ditch Miles of Cables ― This Will Give Marines a Secure LTE Network in the Field

Todd Smith demonstrate PacStar’s groundbreaking Secure Wireless Command Post for classified communications over Wi-Fi and LTE at Modern Day Marines 2018.

09/26/2018
Military & Aerospace Electronics

Decomposing System Security to Prevent Cyber Attacks in Trusted Computing Architectures

Trusted computing systems designers should consider system security early in the design process to prevent cyber attacks.

09/26/2018