Traditional defense and aerospace systems rely on older, proven technologies such as MIL-STD-1553, ARINC 429, and CANBus to support time-critical communications. However, those legacy data buses have not evolved to meet the challenge of ever-faster system operating speeds.
Mobile electronics for the battlefield go hand-in-hand with batteries, and have done so for years. It’s not news that electronics that can’t be plugged-in relies on the energy-storage medium of batteries.
Secure wireless communications (SWC) technology for vehicle-to-vehicle (V2V) and vehicle-to-end user device (V2E) communication is useful for tactical environments as it improves network flexibility and operational maneuverability while reducing management complexity and cost.
Virtualization software and model-based design provide a path that not only enables system designers to maintain legacy software for avionics and other mission-critical systems but also makes it possible to migrate that code to modern higher-performance processing platforms, for example...
CESMO and the Power of EW Interoperability - knowing the precise location of threats and friendly forces is essential to increasing warfighter survivability.
The latest high-performance embedded computing image and video processors rely heavily on general-purpose graphics processing units (GPGPUs) to capture as much detail as possible.
The current state of the art for tent-based command posts requires hours or days of setup, which includes thousands of feet of copper wiring that delays network availability.
It's 3-14, which is also known as Pi Day. And to help ring in the occasion, Curtiss-Wright’s rugged mission computer, targeted at applications such as avionics and UAVs, is built around a Raspberry Pi.
Today, with the increasing use of unmanned platforms to host intelligence, surveillance, and reconnaissance [ISR] sensor applications, system integrators need to ensure that the sensor systems and the critical data they collect and store are protected from falling into the wrong hands.
See more, detect more, and decode more – these are the primary requirements being asked of unmanned systems in the military, and proprietary hardware and software can make achieving those goals a challenge.