A trusted computing system can ensure security yet this may compromise performance through design trade-offs that systems designers must compensate for.
Machine Learning and Artificial Intelligence in Defense and Aerospace Applications - What You Need to Know
This white paper discusses the terminology, applications, challenges and technology enablers for machine learning, deep learning and artificial intelligence (AI) in the aerospace and defense markets.
This white paper looks at the different cooling techniques available including conduction, convection, Air-Flow-Through (AFT), Liquid-Flow-Through (LFT), and Fluid-Flow-Through (FFT) and aims to provide clarity on how to choose the best solution.
Electromagnetic warfare and wireless communications continue to evolve. An opportunity exists to leverage modern technology to improve military signals intelligence to enable our own forces to be more lethal, agile, and survivable.
This white paper helps systems integrators and end users explore some of the key networking capabilities available in modern Ethernet switches and router systems designed to support intra- and inter-vehicle/aircraft network architectures.
System-level security is more than simply the sum of its parts. Read about key protections that must be considered when developing a secure COTS-based Trusted Computing system.
This white paper discusses the details of the requirements for an FDR, how they can be built and how Wi-Fi enabled aircraft can be used to stream FDR data.
Read this white paper to learn more about high-speed cameras and how they can provide users with the ability to conduct in-depth, quantitative analysis of their high-speed images.
Read how a Permanent Test Instrumentation Equipment (PTIE) can be installed onto an aircraft at production, or rapidly post production as the need arises, to gather data in a minimally intrusive manner.
Read about key similarities and differences between GVA and VICTORY and the benefits of using such frameworks in land vehicle upgrades and new builds.