Rick Hearn explains how the key computing elements of an avionics system must all be designed with safety in mind and endure stringent testing to prove they can meet the required Design Assurance Level (DAL).
In the world of security and trusted computing, there are many different disciplines involved. With a constantly evolving set of standards, learn what certifications might apply.
High-performance computing means the use of multiple cores and parallel processing, but there are many ways to address the software implementation. Read the article by Tammy Carter to find out how it's done.
Val Chrysostomou looks at the challenges of adding advanced surveillance capabilities to rotorcraft and the solution.
John Mannarino looks at how embedded avionics software must undergo a rigorous approval and testing process before it can be approved as airworthy.
Read how the Curtiss-Wright trusted computing services are one example of the processes and procedures essential for protecting the supply chain of embedded computing components.
Russ Moore discusses Ethernet IP cameras used for flight test instrumentation and the need for them to be ruggedized and use the latest compression technology and network equipment to provide excellent results.
Mark Grovak looks at the wide adoption of the Future Airborne Capability Environment (FACE) Consortium, and how system integrators can reap tremendous benefits in interoperability and cost.
Military intelligence, surveillance, and reconnaissance (ISR) applications continue to make demands on signal-processing designers. Read about how Curtiss-Wright is enabling such performance.
Trusted computing systems designers should consider system security early in the design process to prevent cyber attacks.