Meeting Recommended, Likely, and Newly Introduced Recorder Regulations for Light Aircraft and Rotorcraft
This white paper looks at the motivations behind introducing requirements for some form of flight recorders, what options are available, and discusses what may be the best choice.
This white paper examines the key challenges multi-core processors (MCPs) present in safety-certifiable systems, as well as techniques for alleviating them in order to ensure MCP-based systems will safely perform their intended functions.
This white paper explores the Commercial Solutions for Classified (CSfC) program, data-at-rest encryption, terminology including what is the inner vs. outer layer of protection.
This white paper explores types of flash memory devices and how factors such as reads, extended temperatures, and Program/Erase (P/E) cycles impact their long-term reliability. It also examines a variety of considerations and techniques for extending the endurance of flash memory devices.
The CSfC data-at-rest (DAR) capability package has evolved over the last five to six years. Starting with the initial draft version 0.8 in July 2014, the DAR CP has matured as expected with the ever increasing CSfC-based storage applications in the field.
This white paper shows that when system integrators partner with a trusted and proven solution vendor, they are freed from the time commitment and burden of trying to complete every development stage themselves. As a result, they are in a better position to keep projects on spec, on...
This paper examines the best practices commercial off-the-shelf (COTS) hardware vendors must employ for establishing a trusted supply chain, including those regarding managing obsolescence, counterfeit parts mitigation, secure manufacturing, and design integrity.
Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation. DAR is particularly at risk during missions if the deployed vehicle is lost, but is also at risk during transport to and from the vehicle.
This white paper provides guidance on decomposing system security requirements and mapping a security plan to physical components in order to build a truly trusted system.
The combination of uncertainty and delayed images can cause hesitancy when responding to threats, collision with obstructions or humans, or to unknowingly drive the vehicle into a dangerous situation or landscape.