Curtiss-Wright's anti-tamper and cyber resiliency expert, David Sheets, offers insight to understanding interplay between cybersecurity techniques and embedded solutions.
David Sheets and Paul Hart provide a guide to the international government agencies that perform security accreditation for equipment used in military applications.
Rick Hearn explains how the key computing elements of an avionics system must all be designed with safety in mind and endure stringent testing to prove they can meet the required Design Assurance Level (DAL).
J.R. Wilson from Military & Aerospace looks closely at how U.S. warfighters work aggressively to protect computers and networks, just as they would do to protect territory, airspace, sea lanes, and access to space.
In the world of security and trusted computing, there are many different disciplines involved. With a constantly evolving set of standards, learn what certifications might apply.
High-performance computing means the use of multiple cores and parallel processing, but there are many ways to address the software implementation. Read the article by Tammy Carter to find out how it's done.
Val Chrysostomou looks at the challenges of adding advanced surveillance capabilities to rotorcraft and the solution.
John Mannarino looks at how embedded avionics software must undergo a rigorous approval and testing process before it can be approved as airworthy.
Read how the Curtiss-Wright trusted computing services are one example of the processes and procedures essential for protecting the supply chain of embedded computing components.
Russ Moore discusses Ethernet IP cameras used for flight test instrumentation and the need for them to be ruggedized and use the latest compression technology and network equipment to provide excellent results.