Showing 57 - 64 of 135
Curtiss-Wright Expands Industry Leading Flight Test Data Recorder Family with Enhanced Ethernet Recorder/Field Configurable DAU Chassis

Curtiss-Wright Expands Flight Test Data Recorder Family with Enhanced Ethernet Recorder/Field Configurable DAU Chassis

Compact SSR/CHS/001 Ethernet Multi-Role Recorder that supports up to four KAM-500 data acquisition modules adds PTP v2 grandmaster and slave support.

06/23/2020
Nextgov

The Case for Using Commercial Tools to Allow Classified Telework

Programs like the National Security Agency’s Commercial Solutions for Classified could be a path to transmit classified information without specialized hardware.

06/05/2020
Avionics International

Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft Systems?

Aviation cybersecurity mandates by the European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) are coming in the next two years.

04/09/2020
Military Embedded Systems

Changing Landscape for Rugged Data Storage

Awareness is mounting regarding the importance of protecting data-at-rest (DAR) on deployed military platforms.

04/07/2020
Military & Aerospace Electronics

Designers of Small Rugged Computers for the Battlefield Balance Size, Performance, and Cooling

Commercial off-the-shelf (COTS) components are being embraced so the technology can be serviced at the base instead of waiting for specialized parts or sending the system back state-side.

02/03/2020
Avionics International

Industry Responds to New Security Regulations, Vulnerabilities Facing Embedded Suppliers

All aviation stakeholders now must comply with the emerging aviation cybersecurity standards known as “Airworthiness Security Process Specification,” identified and first introduced as DO-326A in the US and ED-202A in Europe.

01/20/2020
Military & Aerospace Electronics

Military Cyber Security: Threats and Solutions

U.S. government and military are taking a lead role in protecting sensitive computers from cyber attack, and solutions finally are on the horizon.

12/18/2019
Military & Aerospace Electronics

Trusted Computing: An Overview

Attacks are getting sophisticated. Examples include Rowhammer, Meltdown, Spectre, and others. System designers need to consider many attack vectors.

12/18/2019