Showing 1 - 2 of 2
Bringing Near Real-Time Threat Identification and Location Information to the Entire Coalition

Bringing Near Real-Time Threat Identification and Location Information to the Entire Coalition

This case study is the application example of CESMO, which a white paper has been written on. CESMO is a digital protocol that NATO has adopted to support EW operations.

01/19/2021
Building a Truly Trusted Computing Solution with COTS Hardware and Intel Security Capabilities

Building a Truly Trusted Computing Solution with COTS Hardware and Intel Security Capabilities

A manufacturer of secure aerospace & defense systems sought a COTS SBC with a robust & proven security profile for its new Trusted Computing solution.

01/22/2019