Showing 481 - 488 of 1250
Electronic Design

Should You Send a CPU to Do a GPU’s Job?

Which is better for machine-learning applications: 2nd Generation Intel Xeon Scalable Processors or Nvidia’s T4? A head-to-head comparison helps explain whether a CPU or a GPU is best for your high-performance ML solution.

01/29/2020
PacStar Continues Strong Revenue Growth, Promoting and Hiring New Leaders to Expand Company’s Ops and Pursue Customer Opportunities

PacStar Continues Strong Revenue Growth, Promoting and Hiring New Leaders to Expand Company’s Ops and Pursue Customer Opportunities

PacStar Continues Strong Revenue Growth, Promoting and Hiring New Leaders to Expand Company’s Ops and Pursue Customer Opportunities

01/28/2020
Curtiss-Wright Showcases AI-Based Solution for ISR/EW Situational Awareness and Data Encryption at Tri-Service Open Architecture Interoperability Demonstration

Curtiss-Wright Showcases AI-Based Solution for ISR/EW SA and Data Encryption at TSOA-ID

OSA Interoperability Demo Features Fully Integrated COTS Solution for AI-based Threat Detection and High-Speed Type 1 Top Secret Data Encryption.

01/27/2020
Avionics International

Industry Responds to New Security Regulations, Vulnerabilities Facing Embedded Suppliers

All aviation stakeholders now must comply with the emerging aviation cybersecurity standards known as “Airworthiness Security Process Specification,” identified and first introduced as DO-326A in the US and ED-202A in Europe.

01/20/2020
Military Embedded Systems

Today’s Military Data Storage Goes Far Beyond Rugged

It’s not just about shielding data drives from shock and vibration; designers also are looking for the latest in speed and capacity, and want encryption to protect data at rest, and security to foil tampering.

12/18/2019
Military & Aerospace Electronics

Military Cyber Security: Threats and Solutions

U.S. government and military are taking a lead role in protecting sensitive computers from cyber attack, and solutions finally are on the horizon.

12/18/2019
Military & Aerospace Electronics

Trusted Computing: An Overview

Attacks are getting sophisticated. Examples include Rowhammer, Meltdown, Spectre, and others. System designers need to consider many attack vectors.

12/18/2019
Military Embedded Systems

What is a Tensor and Why Should I Care?

The magic of tensors comes from their special transformational properties that enable them to describe the same physics in all reference frames.

12/09/2019