Showing 225 - 232 of 290
New PacStar 444 Small GigE Switch Module with Cisco High Speed Technology Enables Easy, Secure Network Connectivity in Austere Environments

New PacStar 444 Small GigE Switch Module with Cisco High Speed Technology Enables Easy, Secure Network Connectivity in Austere Environments

PacStar expands its suite of small form-factor solutions with new switch module designed to connect multiple devices to tactical vehicle and aircraft-mounted networks at high speeds

08/20/2018
Curtiss-Wright and Green Hills Collaborate to Demonstrate INTEGRITY-178 tuMP RTOS on the VPX3-1220 SBC Module

Curtiss-Wright and Green Hills Collaborate to Demo INTEGRITY-178 tuMP RTOS on the VPX3-1220 SBC Module

Intel Quad-Core Xeon processor-based VPX3-1220 RTCA/DO-254 safety-certifiable COTS SBC supports Green Hills Software RTCA/DO-178B Level A certifiable multi-core RTOS.

08/14/2018
space launch system

Putting Data Acquistion Units on a Diet for Small Launcher Applications

We look at how ruggedized Data acquisition units, used in aerospace flight test, can provide a low cost solution for some space mission systems.

08/03/2018
Curtiss-Wright Debuts Compact, EW RF Tuner Mission Computer Featuring Silver Palm Technologies 20 MHz-6 GHz Quad Channel SP-8344 Tuner

Curtiss-Wright Debuts Compact, EW RF Tuner Mission Computer Featuring Silver Palm Technologies 20 MHz-6 GHz Quad Channel SP-8344 Tuner

New MPMC-9323 EWS-Silver Palm mission computer speeds development/deployment of high-performance EW/RF applications with COTS-based open architecture solution.

08/02/2018
Military Embedded Systems

The State of Cyber Resiliency Metrics on Embedded Systems

We look at how the ability of an embedded system to identify, prevent, and respond to cyber attacks is defined by measuring its level of cybersecurity and cyber resiliency.

08/01/2018
Military & Aerospace Electronics

Developing a Secure COTS-based Trusted Computing System: An Introduction

Security and trusted computing, at the end of the day, really are all about the system. While the pieces and parts, such as the individual modules, operating system, and boot software, all are important, system security is not an additive process; it can’t simply be bolted-on to make the system secure.

07/25/2018
Military & Aerospace Electronics

Trusted Computing Article: Application Development, Testing, and Analysis for Optimal Security

We look at Trusted Computing in application development, testing, and analysis for optimal security.

06/27/2018
Military & Aerospace Electronics

Computer Hardware's Role in Securing Operating Systems and Hypervisors in Trusted Computing Applications

Many software applications run on “least privilege,” which means that software only receives minimal access to hardware, other applications, and other system resources.

05/30/2018