Steve Edwards and David Sheets explore the implications of how interfaces influence system design in trusted computing.
The VITA 76.0 connector ensures exceptional signal integrity for high-speed interconnects over maximum cable length on (SWaP)-constrained ground, airborne, and naval platforms.
Denis Smetana looks at the advantages that the Intel Xeon processor D-1500 product family brings to compute-intensive embedded electronic warfare (EW) system design.
David Sheets looks at how the ability of an embedded system to identify, prevent, and respond to cyberattacksis defined by measuring its level of cybersecurity and cyber resiliency.
In this article, Steve Edwards and David Sheets look at how system security should start in system design as security touches every element of the system.
David Sheets looks at Trusted Computing in application development, testing and analysis for optimal security.
David Jedynak looks at new deployed approaches for detecting threats to GPS and providing position, navigation, and timing (PNT) information to the warfighter in GPS-denied environments.
Mariana Iriarte looks at the solution Curtiss-Wright developed for High Performance Embedded Computing (HPEC) systems that deal with ISR applications based on the Wind River VxWorks real-time operating system (RTOS).
Computer Hardware's Role in Securing Operating Systems and Hypervisors in Trusted Computing Applications
David Sheets looks at the role of computer hardware in securing operating systems and hypervisors in trusted computing applications.
Russell Moore looks at how photogrammetric high-speed camera missions capture sixdegree-of-freedom motion data that enable completion of airborne certification programs.