Here's what the battlefield tech industry predicts for 2019
The new year will likely bring a new secretary of defense, a renewed emphasis on changing how the Pentagon buys weapons systems and a continued focus on watching technological development.
Curtiss-Wright's anti-tamper and cyber resiliency expert offers insight to understanding interplay between cybersecurity techniques and embedded solutions.
A Guide to International Authorities for Global Trusted Computing Standards Certification
Trusted computing standards are evolving constantly within the United States, which can be confusing enough. International trusted computing standards can be even more difficult.
Optimizing Avionics Reliability With Dissimilar Redundant Architectures
Rick Hearn explains how the key computing elements of an avionics system must all be designed with safety in mind and endure stringent testing to prove they can meet the required Design Assurance Level (DAL).
J.R. Wilson from Military & Aerospace looks closely at how U.S. warfighters work aggressively to protect computers and networks, just as they would do to protect territory, airspace, sea lanes, and access to space.