Showing 33 - 40 of 338
Avionics International

Open or Out: U.S. Military Requirements for Modular Open Systems Architectures

Now that the Army has chosen its preferred Future Long Range Assault Aircraft in Bell’s V-280 advanced tiltrotor, the race is on to populate it with mission systems that will allow the machine to operate through adversaries’ sophisticated air defense systems.

03/21/2023
Military Embedded Systems

Optimizing 100G VPX

Currently, there are two options for VITA 46.30 connectors: the TE Connectivity RT3 and Amphenol R-VPX EVO2 connectors, both of which meet the ANSI/VITA 46.30 standard intended for 100G (4-lanes @ 25 Gbaud) systems, and potentially beyond.

03/20/2023
ARMADA International

March Radio Roundup

Curtiss-Wright has unveiled new PacStar Radio Chassis models designed to accommodate either three or four radios.

03/09/2023
Understanding GCIA

Understanding GCIA: A Paradigm Shift for Establishing an Overall Ground-combat Vehicle Architecture

The U.S. Army has long pursued a standardized infrastructure and architecture for ground-combat vehicle hardware and networking.

02/16/2023
PacStar MRC

PacStar Radio Chassis Deploy Wide Range of Radio Types to Eliminate Communications Gaps in Military and Civil Operations

Tactical, mobile PacStar Radio Chassis speed and simplify the bridging of analog radio and IP communications at the edge of the battlefield.

02/07/2023
The Next Generation of Open-systems Embedded Computing Standards

The Next Generation of Open-systems Embedded Computing Standards

The SOSA technical standard for embedded computing hardware and software is beginning to provide tangible benefits for early adopters.

01/25/2023
Rugged Computers Take on the Shock and the Heat

Rugged Computers Take on the Shock and the Heat

Designers of rugged embedded computing systems, laptop computers, and tablet computers balance the need to operate in harsh conditions, as well as meet growing requirements for open-systems standards.

01/09/2023
Trusted Computing for National Defense

Trusted Computing for National Defense

Cyber security enters the realm of zero trust, as military forces seek to safeguard sensitive military technologies from enemy cyber hackers and spoofers.

12/21/2022