David Sheets looks at Trusted Computing in application development, testing and analysis for optimal security.
David Jedynak looks at new deployed approaches for detecting threats to GPS and providing position, navigation, and timing (PNT) information to the warfighter in GPS-denied environments.
Mariana Iriarte looks at the solution Curtiss-Wright developed for High Performance Embedded Computing (HPEC) systems that deal with ISR applications based on the Wind River VxWorks real-time operating system (RTOS).
Computer Hardware's Role in Securing Operating Systems and Hypervisors in Trusted Computing Applications
David Sheets looks at the role of computer hardware in securing operating systems and hypervisors in trusted computing applications.
Russell Moore looks at how photogrammetric high-speed camera missions capture sixdegree-of-freedom motion data that enable completion of airborne certification programs.
Mike Southworth looks at protecting critical data on unmanned underwater platforms.
Paul Davis looks at how it’s now possible to design digital data recorders that can absorb upwards of 6 GB per second of streaming data, 400 percent more bandwidth then the fastest SFPDP recorder could handle.
Mike McPherson looks at where that budget will be spent and what areas may present opportunities for designers to innovate to close current and future technology gaps.
David Sheets looks at the hardware features built-in to the most popular defense and aerospace processor architectures to ensure the continued cyber security of a trusted computing system.
Steve Edwards looks at how Trusted Boot is a key strategy for ensuring the trustworthiness of an embedded computing system against cyber attacks.