Similar Articles |
|
Military & Aerospace Electronics February 2009 Courtney E. Howard |
Information is under attack Malicious attacks on information and information systems occur at an alarming rate all over the world. |
Military & Aerospace Electronics May 2009 Courtney E. Howard |
War in the Information Age Secure operating systems and code verification tools are the front line when it comes to protecting mission-critical and classified information on today's digital battlefield. |
Military & Aerospace Electronics December 2007 Courtney E. Howard |
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. |
Military & Aerospace Electronics April 2006 J.R. Wilson |
Real-Time Software Providers Zero-in on Safety-Critical Issues Creating operating systems and kernels that are blazingly fast simply does not make the grade today, as systems integrators increasingly demand software that not only runs quickly, but also will not crash, will not damage other programs, and is secure from hackers. |
Military & Aerospace Electronics December 2005 John McHale |
Security and Certification Necessary for Mission-Critical Software Speakers at the third annual Green Hills Embedded Software Summit last month touted security and certification as necessary for software used in military applications such as the F/A-22 fighter-bomber and the F-35 Joint Strike Fighter. |
Military & Aerospace Electronics April 2007 John Keller |
Developers of Real-Time Embedded Software Take Aim at Code Complexity Safety, security, reliability, and performance dominate the discussion of real-time embedded operating systems as software developers aim for multiprocessor architectures with smaller size, lighter weight, and lower power consumption. |
Military & Aerospace Electronics September 2004 |
Is your RTOS safe and secure? Vendors of real-time operating systems find themselves being pulled in two directions at once. Defense contractor customers demand lower costs while, at the same, time more security and safety certification than ever before. Linux is a point of heated discussion. |
Military & Aerospace Electronics January 2007 Courtney Howard |
Green Hills Software Introduces Secure Networking Platform Green Hills Software announced its platform for secure networking and an enhanced, 10th anniversary edition of its Integrity real-time operating system (RTOS). |
Military & Aerospace Electronics April 2005 Ben Ames |
POSIX: reveling in its popularity Looking to save money and reuse software, Pentagon planners are turning to POSIX. If all real-time operating systems work with POSIX, then soldiers can swap code from a broken computer to a new one. |
Military & Aerospace Electronics December 2008 Courtney E. Howard |
Driving the Demand for Data Storage Sensors span the battlefields, producing a wealth of mission-critical data that must be kept at once readily available and secure. |
Military & Aerospace Electronics March 2010 Courtney E. Howard |
Empowering embedded computing Mainstream, COTS technologies combine with aerospace and defense industry innovations to deliver increased performance in compact electronics designs |
Military & Aerospace Electronics December 2009 Courtney E. Howard |
Secure Information Storage Military and aerospace equipment designers have a wealth of options available to fill the ever-increasing need for secure data storage in the field. |
Military & Aerospace Electronics June 2006 Courtney E. Howard |
Industry Forces Take MILS Architecture to the Edge in Public Demonstration Systems integrators and commercial-off-the-shelf vendors are combining technologies to demonstrate a secure multiple independent levels of security (MILS) software architecture that protects military and intelligence communications networks on the global information grid. |
Military & Aerospace Electronics December 2008 John McHale |
Green Hills Software Obtains EAL 6+ Operating System Security Certification Officials from Green Hills Software in Santa Barbara, Calif., say their Integrity real-time operating system (RTOS) achieved the U.S. National Security Agency's highest level for software security. |
Military & Aerospace Electronics January 2008 Courtney E. Howard |
Rugged Electronics Empower Tomorrow's Technology Technology companies enable our military's net-centric vision through smaller, faster, stronger computers. |
Military & Aerospace Electronics May 2008 Courtney E. Howard |
Hypervisors and Software Virtualization Pique Interest at Embedded Systems Conference Significant trends and technologies involving embedded hypervisors and software virtualization for military and aerospace applications stood out at the annual Embedded Systems Conference (ESC) |
Military & Aerospace Electronics November 2009 |
Software Development Tools for Safety-Critical Applications Enhanced by Green Hills Green Hills Software is enhancing its Platform for Industrial Safety, by adding support for the Green Hills Secure Virtualization Architecture and expanding the existing networking, file system, and target hardware options. |
Military & Aerospace Electronics November 2005 John Keller |
Open Systems, Reliability, and Security Are Primary Drivers in Software Development Environments The increasing size, complexity, and proliferation of software code throughout military and aerospace electronic and optoelectronic systems is driving software developers toward industry-standard products, which are often compatible with open-systems software tool interfaces. |
National Defense May 2010 Dunderdale & Tyliszczak |
Is It Possible to Both Share and Protect Sensitive Data? The Defense Department must be able to communicate critical intelligence across agencies and geographic boundaries quickly and securely. |
Military & Aerospace Electronics October 2007 John Keller |
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? |
National Defense October 2005 Joe Pappalardo |
As Military Becomes More Reliant On Networks, Vulnerabilities Grow If problems are not addressed, the Pentagon could spend $200 billion during the next 10 years on a network with serious vulnerabilities, according to security experts. |
Military & Aerospace Electronics June 2007 John Keller |
Software Middleware Providers Acknowledge the Need for Security and Safety Middleware bridges the gaps between different software applications and different sets of hardware. Now, middleware is beginning to bridge the gaps between different levels of systems security. |
Military & Aerospace Electronics September 2005 |
In Brief BAE systems to develop on-board generator for Humvee... Navy P-3C aircraft use data link from Lockheed Martin... Northrop Grumman tests software for Webb Space Telescope... Air Force eyes state-of-the-art jet fighter targeting pods... etc. |
National Defense November 2013 Sandra I. Erwin |
Changing World Blazes New Trails For Military Technology A striking array of challenges is reshaping the course of defense technology. The United States is entering an era characterized by fiscal austerity and the rise of "non-state" actors as enemies of nation states. |
InternetNews August 29, 2007 David Needle |
No Secret: NSA Taps VMware For Virtualization Defense contractor General Dynamics has tapped VMware as a sub-contractor for development of a highly secure workstation based on commercial products. |
Military & Aerospace Electronics June 2006 John Keller |
Safety and Security Are Top Priorities for Providers of Embedded Operating Systems Now more than ever, software industry experts say, military and aerospace systems designers are looking for safety-critical embedded operating systems-and in nonmilitary applications in which safety-critical code historically has not been an issue. |
IEEE Spectrum November 2008 Robert N. Charette |
What's Wrong with Weapons Acquisitions? Escalating complexity, a shortage of trained workers, and crass politicization mean that most programs to develop new military systems fail to meet expectations. |
Parameters Summer 2006 David W. Barno |
Challenges in Fighting a Global Insurgency Strategy in a global counterinsurgency requires a new level of thinking. A world of irregular threats and asymmetrical warfare demands that we Americans broaden our thinking beyond the norms of traditional military action once sufficient to win our wars. |
Military & Aerospace Electronics January 2010 |
Embedded Software Components for Hypervisor and Separation Kernel Introduced by LynuxWorks Real-time software specialist LynuxWorks Inc. is introducing the newest version of its LynxSecure 3.1 separation kernel and embedded hypervisor software components. |
National Defense June 2015 Ted Girard |
How Defense Agencies Can Better Cope With Big Data The Defense Information Systems Agency's five-year strategic plan says big data capabilities are becoming essential to modern warfare. |
National Defense October 2005 Joe Pappalardo |
Protecting Global Information Grid Requires New Strategy The cornerstone of future defense programs is information technology, but that foundation may contain cracks that endanger the entire effort, according to security experts within the government. |
National Defense May 2004 Lawrence P. Farrell Jr. |
`Information Fusion' Key to Winning Wars What made a huge difference in the Iraq and Afghanistan wars, said Roche, was the fusion of information. |
Military & Aerospace Electronics November 2006 |
Real-time operating system with time and space partitioning The LynxOS-SE time-space partitioned hard real time operating system (RTOS) offers Posix and Linux support for performance and safety-critical environments in military and aerospace applications. |
Parameters Autumn 2006 Michael R. Melillo |
Outfitting a Big-War Military with Small-War Capabilities Unfortunately, it took the tragedy of 9/11 and the challenges posed by an adaptive enemy for the U.S. to realize it was not prepared to fight war on terms other than its own choosing. |
Military & Aerospace Electronics April 2006 Courtney E. Howard |
Network-Centric Operations and Technology Take Center Stage at MTC 2006 A top U.S. Air Force expert stressed the importance of the U.S. military's move from a weapons-centric to a network-centric model of future warfare in a keynote address he delivered at the 2006 Military Technologies Conference. |
Parameters Autumn 2008 Mark Cancian |
Contractors: The New Element of Military Force Structure The purpose of this article is to examine what battlefield contractors do, consider how we got to the situation we are in today, and provide force planners with some useful insight regarding the future. |
Military & Aerospace Electronics May 2006 |
Industry, DOD technology cooperation is key to realizing network-centric warfare Col. David W. Madden, director of the enterprise integration group at the Air Force Electronic Systems Center at Hanscom Air Force Base, discusses his group's most pressing technological priorities. |
Parameters Summer 2005 R. D. Hooker |
Beyond Vom Kriege: The Character and Conduct of Modern War While the methods used to wage war are constantly evolving, the nature and character of war remain deeply and unchangeably rooted in the nature of man. |
InternetNews April 23, 2009 Alex Goldman |
VMware Ecosystem Gets Busy While VMware got all of the attention earlier this week with its announcement of vSphere 4.0, its partners had some important news, too. |
InternetNews May 9, 2007 Clint Boulton |
VMware Goes 'Back in Time' With Upgrade VMware adds a record and playback feature to help programmers squash more bugs. |
Military & Aerospace Electronics September 2009 |
Rugged FPGA for Aerospace and Military Embedded Systems Introduced by Xilinx The Virtex-5Q family of field-programmable gate arrays is for aerospace and military embedded systems involving secure military communications, electronic warfare, aircraft avionics and vetronics, radar technology, and missiles. |
Military & Aerospace Electronics July 2006 |
LynuxWorks LynxOS-178 to Control F-35 Joint Strike Fighter Panoramic Cockpit Display Avionics designers at L-3 Communications needed a safety-critical real-time operating system for a portion of the Lockheed Martin F-35 Joint Strike Fighter aircraft. They found their solution in the LynxOS-178 DO-178B-certifiable ARINC-653 and POSIX-conformant RTOS from LynuxWorks. |
Parameters Autumn 2007 Gregory L. Cantwell |
Nation-Building: A Joint Enterprise When America's Army is at war, is the nation also at war? |
Parameters Autumn 2008 Steven L. Schooner |
Why Contractor Fatalities Matter Apprising the American public that the true human cost associated with military operations includes contractors and exceeds 6,000 is critical to making informed decisions for the future. |
InternetNews December 27, 2007 Larry Barrett |
Virtualization Craze Brings Business, Security Risks Virtualized datacenters save energy, time and money but they also bring some new - and old - security and planning issues to the fore. |
InternetNews June 5, 2006 Clint Boulton |
VMware: Hardware Ain't What it Used to Be VMware has completed an overhaul of its virtualization software, a technology that now seems to embody many of the traits of utility computing scenarios. |
Reason February 2002 Chris Bray |
The Media and GI Joe How the press gets the military wrong -- and why it matters... |
InternetNews April 21, 2009 Alex Goldman |
VMware Aims for the Cloud Enterprises that are already using virtualization will now have a clear cloud adoption road map for their datacenters, thanks to vSphere 4.0. |
InternetNews March 5, 2007 Clint Boulton |
VMWare Launches Virtual PC Tools VMWare takes the second version of its ACE mobile virtual machines tool to beta. |
CIO September 15, 2005 Fred Hapgood |
The Virtues of Virtualization Using software to model the future of IT may free CIOs from the risks and limitations of all that annoying hardware. |