Newer on-vehicle integrated networks will be composed of heterogeneous networks in the form of software and equipment from multiple commercial vendors.
FPGA-enabled trusted boot is part of building security into every aspect of trusted computing architectures
FPGAs can defend against reverse engineering and offers capabilities such as black key storage or side channel resistant cryptography in some devices.
Tactical data link translation gateway for secure military command and control introduced by Curtiss-Wright
HUNTR provides warfighters and command and control centers with real-time access to accurate operational data in the field.
The HUNTR software application integrates a number of TDLs, including Link 16.
Understanding cyber attacks in embedded computing enables integrators and suppliers to consider options
The trusted computing task is to apply practical measures that can mitigate the effects of known cyber threats to aerospace and defense systems.
This column will focus on frameworks that work with NVIDIA’s TensorRT, a tool for deploying high-performance deep neural networks.
The design of rugged mission-critical computer systems must consider thermal management as a system-level issue.
Quantum computing processes an algorithm by configuring quantum gates and initializing the qubits. Taking a measurement resolves the quantum states.
OEMs are reacting to customer demand by pushing radar technology toward a more user-friendly experience
Trusted computing can depend on asymmetric cryptography algorithms to assure the integrity of protected data
Asymmetric algorithms enable systems designers to pair keys to facilitate more novel cryptographic operations than traditional symmetric algorithms.