Trends in Trusted Computing and Network Security in Aerospace and Defense Embedded Computing Applications
Andrew McCoubrey and David Sheets discuss network security in embedded computing for airborne networks.
Paul Davis looks at the Commercial Solutions for Classified (CSfC) Program, the CSfC approval process and the benefits of being on the CSfC component list.
Tammy Carter talks about how employing strategies such as GPUDirect, PCIe Device Lending, and implementing SISCI API can help system integrators optimize ISR solutions.
Bringing the benefits of multicore processors to safety-critical systems is challenging. Read how Curtiss-Wright and Green Hills Software are up to the challenge.
Optimizing Cyber Security and Trusted Computing on Today’s Connected Military and Commercial Aircraft
If not properly protected by taking trusted computing measures, every system on an aircraft can create a potential vulnerability. Paul Hart talks about optimizing cyber security on today’s connected military and commercial aircraft.
Mike Southworth explains how in recent years, fiber optics has lost its exclusivity in regards to 10 GbE support. Formerly limited to 1 Gbit speeds, copper is now a viable alternative to fiber for 10 GbE using MACsec encryption.
Tammy Carter and David Jedynak discuss how huge data demands are pushing radar and electronic warfare (EW) developers to seek new ways to deliver multifunction systems that also meet strict size, weight, and power (SWaP) requirements.
Paul Bundick explains the two major challenges that confront developers of military radar-processing systems and how Curtiss-Wright is meeting those challenges with configurable FPGAs.
Curtiss-Wright's anti-tamper and cyber resiliency expert, David Sheets, offers insight to understanding interplay between cybersecurity techniques and embedded solutions.
David Sheets and Paul Hart provide a guide to the international government agencies that perform security accreditation for equipment used in military applications.