MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Military & Aerospace Electronics
February 2009
Courtney E. Howard
Information is under attack Malicious attacks on information and information systems occur at an alarming rate all over the world. mark for My Articles similar articles
Military & Aerospace Electronics
May 2009
Courtney E. Howard
War in the Information Age Secure operating systems and code verification tools are the front line when it comes to protecting mission-critical and classified information on today's digital battlefield. mark for My Articles similar articles
Military & Aerospace Electronics
December 2007
Courtney E. Howard
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. mark for My Articles similar articles
Military & Aerospace Electronics
April 2006
J.R. Wilson
Real-Time Software Providers Zero-in on Safety-Critical Issues Creating operating systems and kernels that are blazingly fast simply does not make the grade today, as systems integrators increasingly demand software that not only runs quickly, but also will not crash, will not damage other programs, and is secure from hackers. mark for My Articles similar articles
Military & Aerospace Electronics
December 2005
John McHale
Security and Certification Necessary for Mission-Critical Software Speakers at the third annual Green Hills Embedded Software Summit last month touted security and certification as necessary for software used in military applications such as the F/A-22 fighter-bomber and the F-35 Joint Strike Fighter. mark for My Articles similar articles
Military & Aerospace Electronics
April 2007
John Keller
Developers of Real-Time Embedded Software Take Aim at Code Complexity Safety, security, reliability, and performance dominate the discussion of real-time embedded operating systems as software developers aim for multiprocessor architectures with smaller size, lighter weight, and lower power consumption. mark for My Articles similar articles
Military & Aerospace Electronics
September 2004
Is your RTOS safe and secure? Vendors of real-time operating systems find themselves being pulled in two directions at once. Defense contractor customers demand lower costs while, at the same, time more security and safety certification than ever before. Linux is a point of heated discussion. mark for My Articles similar articles
Military & Aerospace Electronics
January 2007
Courtney Howard
Green Hills Software Introduces Secure Networking Platform Green Hills Software announced its platform for secure networking and an enhanced, 10th anniversary edition of its Integrity real-time operating system (RTOS). mark for My Articles similar articles
Military & Aerospace Electronics
April 2005
Ben Ames
POSIX: reveling in its popularity Looking to save money and reuse software, Pentagon planners are turning to POSIX. If all real-time operating systems work with POSIX, then soldiers can swap code from a broken computer to a new one. mark for My Articles similar articles
Military & Aerospace Electronics
December 2008
Courtney E. Howard
Driving the Demand for Data Storage Sensors span the battlefields, producing a wealth of mission-critical data that must be kept at once readily available and secure. mark for My Articles similar articles
Military & Aerospace Electronics
March 2010
Courtney E. Howard
Empowering embedded computing Mainstream, COTS technologies combine with aerospace and defense industry innovations to deliver increased performance in compact electronics designs mark for My Articles similar articles
Military & Aerospace Electronics
December 2009
Courtney E. Howard
Secure Information Storage Military and aerospace equipment designers have a wealth of options available to fill the ever-increasing need for secure data storage in the field. mark for My Articles similar articles
Military & Aerospace Electronics
June 2006
Courtney E. Howard
Industry Forces Take MILS Architecture to the Edge in Public Demonstration Systems integrators and commercial-off-the-shelf vendors are combining technologies to demonstrate a secure multiple independent levels of security (MILS) software architecture that protects military and intelligence communications networks on the global information grid. mark for My Articles similar articles
Military & Aerospace Electronics
December 2008
John McHale
Green Hills Software Obtains EAL 6+ Operating System Security Certification Officials from Green Hills Software in Santa Barbara, Calif., say their Integrity real-time operating system (RTOS) achieved the U.S. National Security Agency's highest level for software security. mark for My Articles similar articles
Military & Aerospace Electronics
January 2008
Courtney E. Howard
Rugged Electronics Empower Tomorrow's Technology Technology companies enable our military's net-centric vision through smaller, faster, stronger computers. mark for My Articles similar articles
Military & Aerospace Electronics
May 2008
Courtney E. Howard
Hypervisors and Software Virtualization Pique Interest at Embedded Systems Conference Significant trends and technologies involving embedded hypervisors and software virtualization for military and aerospace applications stood out at the annual Embedded Systems Conference (ESC) mark for My Articles similar articles
Military & Aerospace Electronics
November 2009
Software Development Tools for Safety-Critical Applications Enhanced by Green Hills Green Hills Software is enhancing its Platform for Industrial Safety, by adding support for the Green Hills Secure Virtualization Architecture and expanding the existing networking, file system, and target hardware options. mark for My Articles similar articles
Military & Aerospace Electronics
November 2005
John Keller
Open Systems, Reliability, and Security Are Primary Drivers in Software Development Environments The increasing size, complexity, and proliferation of software code throughout military and aerospace electronic and optoelectronic systems is driving software developers toward industry-standard products, which are often compatible with open-systems software tool interfaces. mark for My Articles similar articles
National Defense
May 2010
Dunderdale & Tyliszczak
Is It Possible to Both Share and Protect Sensitive Data? The Defense Department must be able to communicate critical intelligence across agencies and geographic boundaries quickly and securely. mark for My Articles similar articles
Military & Aerospace Electronics
October 2007
John Keller
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? mark for My Articles similar articles
National Defense
October 2005
Joe Pappalardo
As Military Becomes More Reliant On Networks, Vulnerabilities Grow If problems are not addressed, the Pentagon could spend $200 billion during the next 10 years on a network with serious vulnerabilities, according to security experts. mark for My Articles similar articles
Military & Aerospace Electronics
June 2007
John Keller
Software Middleware Providers Acknowledge the Need for Security and Safety Middleware bridges the gaps between different software applications and different sets of hardware. Now, middleware is beginning to bridge the gaps between different levels of systems security. mark for My Articles similar articles
Military & Aerospace Electronics
September 2005
In Brief BAE systems to develop on-board generator for Humvee... Navy P-3C aircraft use data link from Lockheed Martin... Northrop Grumman tests software for Webb Space Telescope... Air Force eyes state-of-the-art jet fighter targeting pods... etc. mark for My Articles similar articles
National Defense
November 2013
Sandra I. Erwin
Changing World Blazes New Trails For Military Technology A striking array of challenges is reshaping the course of defense technology. The United States is entering an era characterized by fiscal austerity and the rise of "non-state" actors as enemies of nation states. mark for My Articles similar articles
InternetNews
August 29, 2007
David Needle
No Secret: NSA Taps VMware For Virtualization Defense contractor General Dynamics has tapped VMware as a sub-contractor for development of a highly secure workstation based on commercial products. mark for My Articles similar articles
Military & Aerospace Electronics
June 2006
John Keller
Safety and Security Are Top Priorities for Providers of Embedded Operating Systems Now more than ever, software industry experts say, military and aerospace systems designers are looking for safety-critical embedded operating systems-and in nonmilitary applications in which safety-critical code historically has not been an issue. mark for My Articles similar articles
IEEE Spectrum
November 2008
Robert N. Charette
What's Wrong with Weapons Acquisitions? Escalating complexity, a shortage of trained workers, and crass politicization mean that most programs to develop new military systems fail to meet expectations. mark for My Articles similar articles
Parameters
Summer 2006
David W. Barno
Challenges in Fighting a Global Insurgency Strategy in a global counterinsurgency requires a new level of thinking. A world of irregular threats and asymmetrical warfare demands that we Americans broaden our thinking beyond the norms of traditional military action once sufficient to win our wars. mark for My Articles similar articles
Military & Aerospace Electronics
January 2010
Embedded Software Components for Hypervisor and Separation Kernel Introduced by LynuxWorks Real-time software specialist LynuxWorks Inc. is introducing the newest version of its LynxSecure 3.1 separation kernel and embedded hypervisor software components. mark for My Articles similar articles
National Defense
June 2015
Ted Girard
How Defense Agencies Can Better Cope With Big Data The Defense Information Systems Agency's five-year strategic plan says big data capabilities are becoming essential to modern warfare. mark for My Articles similar articles
National Defense
October 2005
Joe Pappalardo
Protecting Global Information Grid Requires New Strategy The cornerstone of future defense programs is information technology, but that foundation may contain cracks that endanger the entire effort, according to security experts within the government. mark for My Articles similar articles
National Defense
May 2004
Lawrence P. Farrell Jr.
`Information Fusion' Key to Winning Wars What made a huge difference in the Iraq and Afghanistan wars, said Roche, was the fusion of information. mark for My Articles similar articles
Military & Aerospace Electronics
November 2006
Real-time operating system with time and space partitioning The LynxOS-SE time-space partitioned hard real time operating system (RTOS) offers Posix and Linux support for performance and safety-critical environments in military and aerospace applications. mark for My Articles similar articles
Parameters
Autumn 2006
Michael R. Melillo
Outfitting a Big-War Military with Small-War Capabilities Unfortunately, it took the tragedy of 9/11 and the challenges posed by an adaptive enemy for the U.S. to realize it was not prepared to fight war on terms other than its own choosing. mark for My Articles similar articles
Military & Aerospace Electronics
April 2006
Courtney E. Howard
Network-Centric Operations and Technology Take Center Stage at MTC 2006 A top U.S. Air Force expert stressed the importance of the U.S. military's move from a weapons-centric to a network-centric model of future warfare in a keynote address he delivered at the 2006 Military Technologies Conference. mark for My Articles similar articles
Parameters
Autumn 2008
Mark Cancian
Contractors: The New Element of Military Force Structure The purpose of this article is to examine what battlefield contractors do, consider how we got to the situation we are in today, and provide force planners with some useful insight regarding the future. mark for My Articles similar articles
Military & Aerospace Electronics
May 2006
Industry, DOD technology cooperation is key to realizing network-centric warfare Col. David W. Madden, director of the enterprise integration group at the Air Force Electronic Systems Center at Hanscom Air Force Base, discusses his group's most pressing technological priorities. mark for My Articles similar articles
Parameters
Summer 2005
R. D. Hooker
Beyond Vom Kriege: The Character and Conduct of Modern War While the methods used to wage war are constantly evolving, the nature and character of war remain deeply and unchangeably rooted in the nature of man. mark for My Articles similar articles
InternetNews
April 23, 2009
Alex Goldman
VMware Ecosystem Gets Busy While VMware got all of the attention earlier this week with its announcement of vSphere 4.0, its partners had some important news, too. mark for My Articles similar articles
InternetNews
May 9, 2007
Clint Boulton
VMware Goes 'Back in Time' With Upgrade VMware adds a record and playback feature to help programmers squash more bugs. mark for My Articles similar articles
Military & Aerospace Electronics
September 2009
Rugged FPGA for Aerospace and Military Embedded Systems Introduced by Xilinx The Virtex-5Q family of field-programmable gate arrays is for aerospace and military embedded systems involving secure military communications, electronic warfare, aircraft avionics and vetronics, radar technology, and missiles. mark for My Articles similar articles
Military & Aerospace Electronics
July 2006
LynuxWorks LynxOS-178 to Control F-35 Joint Strike Fighter Panoramic Cockpit Display Avionics designers at L-3 Communications needed a safety-critical real-time operating system for a portion of the Lockheed Martin F-35 Joint Strike Fighter aircraft. They found their solution in the LynxOS-178 DO-178B-certifiable ARINC-653 and POSIX-conformant RTOS from LynuxWorks. mark for My Articles similar articles
Parameters
Autumn 2007
Gregory L. Cantwell
Nation-Building: A Joint Enterprise When America's Army is at war, is the nation also at war? mark for My Articles similar articles
Parameters
Autumn 2008
Steven L. Schooner
Why Contractor Fatalities Matter Apprising the American public that the true human cost associated with military operations includes contractors and exceeds 6,000 is critical to making informed decisions for the future. mark for My Articles similar articles
InternetNews
December 27, 2007
Larry Barrett
Virtualization Craze Brings Business, Security Risks Virtualized datacenters save energy, time and money but they also bring some new - and old - security and planning issues to the fore. mark for My Articles similar articles
InternetNews
June 5, 2006
Clint Boulton
VMware: Hardware Ain't What it Used to Be VMware has completed an overhaul of its virtualization software, a technology that now seems to embody many of the traits of utility computing scenarios. mark for My Articles similar articles
Reason
February 2002
Chris Bray
The Media and GI Joe How the press gets the military wrong -- and why it matters... mark for My Articles similar articles
InternetNews
April 21, 2009
Alex Goldman
VMware Aims for the Cloud Enterprises that are already using virtualization will now have a clear cloud adoption road map for their datacenters, thanks to vSphere 4.0. mark for My Articles similar articles
InternetNews
March 5, 2007
Clint Boulton
VMWare Launches Virtual PC Tools VMWare takes the second version of its ACE mobile virtual machines tool to beta. mark for My Articles similar articles
CIO
September 15, 2005
Fred Hapgood
The Virtues of Virtualization Using software to model the future of IT may free CIOs from the risks and limitations of all that annoying hardware. mark for My Articles similar articles