System-level security is more than simply the sum of its parts. Read about key protections that must be considered when developing a secure COTS-based Trusted Computing system.
This white paper discusses the details of the requirements for an FDR, how they can be built and how Wi-Fi enabled aircraft can be used to stream FDR data.
Read this white paper to learn more about high-speed cameras and how they can provide users with the ability to conduct in-depth, quantitative analysis of their high-speed images.
Read how a Permanent Test Instrumentation Equipment (PTIE) can be installed onto an aircraft at production, or rapidly post production as the need arises, to gather data in a minimally intrusive manner.
Read about key similarities and differences between GVA and VICTORY and the benefits of using such frameworks in land vehicle upgrades and new builds.
This white paper describes the move from constant to variable frequency power (VFP) systems and how these can be monitored using equipment designed to meet the ISO 12384 VFP standard.
Using Software Full Disk Encryption and Disk Partitioning to Protect and Isolate Network Attached Storage Functions
Through disk partitioning and commercial off-the-shelf (COTS) data-at-rest (DAR) encryption, this paper proposes a solution that reduces risk of data loss, corruption, and accessibility if intercepted.
Steve Edwards and David Sheets explore securing data transfer, performing testing, and leveraging existing processor features for trusted and secure application software.
This white paper analyzes ground vehicle video system integration challenges and proposes a winning solution.
This white paper discusses the financial impact of late delivery and how to accelerate your time-to-market in the aerospace and defense industry.