MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Military & Aerospace Electronics
July 2008
Courtney E. Howard
iWar Technology companies devise innovations to help combat the growing threat of information warfare. mark for My Articles similar articles
Military & Aerospace Electronics
May 2009
Courtney E. Howard
War in the Information Age Secure operating systems and code verification tools are the front line when it comes to protecting mission-critical and classified information on today's digital battlefield. mark for My Articles similar articles
Military & Aerospace Electronics
September 2004
Is your RTOS safe and secure? Vendors of real-time operating systems find themselves being pulled in two directions at once. Defense contractor customers demand lower costs while, at the same, time more security and safety certification than ever before. Linux is a point of heated discussion. mark for My Articles similar articles
Military & Aerospace Electronics
January 2007
Courtney Howard
Green Hills Software Introduces Secure Networking Platform Green Hills Software announced its platform for secure networking and an enhanced, 10th anniversary edition of its Integrity real-time operating system (RTOS). mark for My Articles similar articles
Military & Aerospace Electronics
April 2006
J.R. Wilson
Real-Time Software Providers Zero-in on Safety-Critical Issues Creating operating systems and kernels that are blazingly fast simply does not make the grade today, as systems integrators increasingly demand software that not only runs quickly, but also will not crash, will not damage other programs, and is secure from hackers. mark for My Articles similar articles
Military & Aerospace Electronics
April 2007
John Keller
Developers of Real-Time Embedded Software Take Aim at Code Complexity Safety, security, reliability, and performance dominate the discussion of real-time embedded operating systems as software developers aim for multiprocessor architectures with smaller size, lighter weight, and lower power consumption. mark for My Articles similar articles
Military & Aerospace Electronics
December 2007
Courtney E. Howard
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. mark for My Articles similar articles
Military & Aerospace Electronics
December 2005
John McHale
Security and Certification Necessary for Mission-Critical Software Speakers at the third annual Green Hills Embedded Software Summit last month touted security and certification as necessary for software used in military applications such as the F/A-22 fighter-bomber and the F-35 Joint Strike Fighter. mark for My Articles similar articles
Military & Aerospace Electronics
April 2005
Ben Ames
POSIX: reveling in its popularity Looking to save money and reuse software, Pentagon planners are turning to POSIX. If all real-time operating systems work with POSIX, then soldiers can swap code from a broken computer to a new one. mark for My Articles similar articles
Military & Aerospace Electronics
December 2009
Courtney E. Howard
Secure Information Storage Military and aerospace equipment designers have a wealth of options available to fill the ever-increasing need for secure data storage in the field. mark for My Articles similar articles
Military & Aerospace Electronics
January 2008
Courtney E. Howard
Rugged Electronics Empower Tomorrow's Technology Technology companies enable our military's net-centric vision through smaller, faster, stronger computers. mark for My Articles similar articles
Military & Aerospace Electronics
April 2008
Courtney E. Howard
Software Code and COTS Developers harness the latest software engineering tools to deliver reliable, mission-critical, real-time embedded software to mil-aero users. mark for My Articles similar articles
Military & Aerospace Electronics
March 2010
Courtney E. Howard
Empowering embedded computing Mainstream, COTS technologies combine with aerospace and defense industry innovations to deliver increased performance in compact electronics designs mark for My Articles similar articles
Military & Aerospace Electronics
December 2008
Courtney E. Howard
Driving the Demand for Data Storage Sensors span the battlefields, producing a wealth of mission-critical data that must be kept at once readily available and secure. mark for My Articles similar articles
Military & Aerospace Electronics
June 2006
Courtney E. Howard
Industry Forces Take MILS Architecture to the Edge in Public Demonstration Systems integrators and commercial-off-the-shelf vendors are combining technologies to demonstrate a secure multiple independent levels of security (MILS) software architecture that protects military and intelligence communications networks on the global information grid. mark for My Articles similar articles
Military & Aerospace Electronics
December 2008
John McHale
Green Hills Software Obtains EAL 6+ Operating System Security Certification Officials from Green Hills Software in Santa Barbara, Calif., say their Integrity real-time operating system (RTOS) achieved the U.S. National Security Agency's highest level for software security. mark for My Articles similar articles
Military & Aerospace Electronics
November 2005
John Keller
Open Systems, Reliability, and Security Are Primary Drivers in Software Development Environments The increasing size, complexity, and proliferation of software code throughout military and aerospace electronic and optoelectronic systems is driving software developers toward industry-standard products, which are often compatible with open-systems software tool interfaces. mark for My Articles similar articles
National Defense
February 2006
Stew Magnuson
Network Vulnerabilities Worry Pentagon Pentagon officials call the Defense Department's global communications network its weakest link. The question is how to manage the risk, and create a balance between security and the necessity of working with international partners and the private sector. mark for My Articles similar articles
Military & Aerospace Electronics
May 2008
Courtney E. Howard
Hypervisors and Software Virtualization Pique Interest at Embedded Systems Conference Significant trends and technologies involving embedded hypervisors and software virtualization for military and aerospace applications stood out at the annual Embedded Systems Conference (ESC) mark for My Articles similar articles
National Defense
November 2013
Sandra I. Erwin
Changing World Blazes New Trails For Military Technology A striking array of challenges is reshaping the course of defense technology. The United States is entering an era characterized by fiscal austerity and the rise of "non-state" actors as enemies of nation states. mark for My Articles similar articles
Military & Aerospace Electronics
November 2009
Software Development Tools for Safety-Critical Applications Enhanced by Green Hills Green Hills Software is enhancing its Platform for Industrial Safety, by adding support for the Green Hills Secure Virtualization Architecture and expanding the existing networking, file system, and target hardware options. mark for My Articles similar articles
InternetNews
August 29, 2007
David Needle
No Secret: NSA Taps VMware For Virtualization Defense contractor General Dynamics has tapped VMware as a sub-contractor for development of a highly secure workstation based on commercial products. mark for My Articles similar articles
National Defense
October 2005
Joe Pappalardo
As Military Becomes More Reliant On Networks, Vulnerabilities Grow If problems are not addressed, the Pentagon could spend $200 billion during the next 10 years on a network with serious vulnerabilities, according to security experts. mark for My Articles similar articles
Popular Mechanics
September 2008
Glenn Derene
The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back In the modern American military, digital telecommunication is so integral to command and control of forces and equipment that the disruption of data can do more to disable a fighting force than a thousand bombs mark for My Articles similar articles
InternetNews
September 29, 2009
Controls Key in Virtualization Frenzy: Study CA and VMware study identifies key process controls, practices and problems for enterprise customers racing to virtualize production servers and desktop apps. mark for My Articles similar articles
National Defense
June 2015
Ted Girard
How Defense Agencies Can Better Cope With Big Data The Defense Information Systems Agency's five-year strategic plan says big data capabilities are becoming essential to modern warfare. mark for My Articles similar articles
Military & Aerospace Electronics
June 2006
John Keller
Safety and Security Are Top Priorities for Providers of Embedded Operating Systems Now more than ever, software industry experts say, military and aerospace systems designers are looking for safety-critical embedded operating systems-and in nonmilitary applications in which safety-critical code historically has not been an issue. mark for My Articles similar articles
Military & Aerospace Electronics
October 2007
John Keller
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? mark for My Articles similar articles
Military & Aerospace Electronics
January 2010
Embedded Software Components for Hypervisor and Separation Kernel Introduced by LynuxWorks Real-time software specialist LynuxWorks Inc. is introducing the newest version of its LynxSecure 3.1 separation kernel and embedded hypervisor software components. mark for My Articles similar articles
Parameters
Summer 2006
David W. Barno
Challenges in Fighting a Global Insurgency Strategy in a global counterinsurgency requires a new level of thinking. A world of irregular threats and asymmetrical warfare demands that we Americans broaden our thinking beyond the norms of traditional military action once sufficient to win our wars. mark for My Articles similar articles
InternetNews
November 16, 2010
Cisco Rolls Out Virtual Desktop Initiative Cisco sees opportunity in the enterprise market in putting desktops on the same path to virtualized infrastructure as servers running in the cloud. mark for My Articles similar articles
T.H.E. Journal
April 2009
John K. Waters
Virtualize Me! K-12's burgeoning interest in cost-cutting, productivity-boosting virtualization technologies has vendors starting to take notice. mark for My Articles similar articles
Military & Aerospace Electronics
November 2006
Real-time operating system with time and space partitioning The LynxOS-SE time-space partitioned hard real time operating system (RTOS) offers Posix and Linux support for performance and safety-critical environments in military and aerospace applications. mark for My Articles similar articles
Military & Aerospace Electronics
May 2009
Lockheed Martin looks to LynxOS for MEADS missile system MEADS protects maneuvering ground combat forces and provides homeland defense against tactical ballistic missiles, cruise missiles, unmanned aerial vehicles, and aircraft. mark for My Articles similar articles
Insurance & Technology
July 16, 2007
Peggy Bresnick Kendler
Virtualization: Does It Have A Positive Impact On Insurance Operations? How can insurance enterprises benefit from virtualization. mark for My Articles similar articles
Parameters
Autumn 2006
Michael R. Melillo
Outfitting a Big-War Military with Small-War Capabilities Unfortunately, it took the tragedy of 9/11 and the challenges posed by an adaptive enemy for the U.S. to realize it was not prepared to fight war on terms other than its own choosing. mark for My Articles similar articles
InternetNews
December 27, 2007
Larry Barrett
Virtualization Craze Brings Business, Security Risks Virtualized datacenters save energy, time and money but they also bring some new - and old - security and planning issues to the fore. mark for My Articles similar articles
National Defense
May 2010
Dunderdale & Tyliszczak
Is It Possible to Both Share and Protect Sensitive Data? The Defense Department must be able to communicate critical intelligence across agencies and geographic boundaries quickly and securely. mark for My Articles similar articles
InternetNews
December 26, 2008
Richard Adhikari
Enterprise Opportunities & Challenges in 2009 Money-saving technologies will be strong, cybercriminals will rev up and business intelligence solutions will spread. mark for My Articles similar articles
InternetNews
September 5, 2008
Sean Michael Kerner
KVM vs. Xen vs. VMware. Is it a Hypervisor War? Competitors weigh in on the open source virtualization market shakeup. mark for My Articles similar articles
Military & Aerospace Electronics
May 2006
Industry, DOD technology cooperation is key to realizing network-centric warfare Col. David W. Madden, director of the enterprise integration group at the Air Force Electronic Systems Center at Hanscom Air Force Base, discusses his group's most pressing technological priorities. mark for My Articles similar articles
InternetNews
November 3, 2009
Red Hat Enterprise Virtualization Gets Managed Standalone hypervisor and management solution released as Linux vendor takes on Microsoft and VMware. mark for My Articles similar articles
InternetNews
February 23, 2009
Sean Michael Kerner
Red Hat Lays Out Its Virtualization Play Linux vendor Red Hat is getting serious about aiming for a bigger slice of the virtualization pie. mark for My Articles similar articles
InternetNews
January 22, 2008
Stuart J. Johnston
Microsoft Readies Virtualization Blitz Months away from releasing final code for its Hyper-V virtualization technology, Microsoft is busy revving up its marketing machine. mark for My Articles similar articles
InternetNews
July 17, 2009
Intel Exec Talks Virtualization Security Too many companies are adopting virtualization without considering the security implications, one expert said. mark for My Articles similar articles
InternetNews
May 13, 2010
HP Debuts Thin Client Virtualization Offerings At Citrix Synergy 2010 conference, Hewlett-Packard showcases new suite of client virtualization products, including mobile thin clients and support for Citrix Xen software. mark for My Articles similar articles
Popular Mechanics
June 30, 2008
Glenn Derene
Inside NSA Red Team Secret Ops With Government's Top Hackers Highly skilled firewall-crackers help the government keep the bad guys out of the country's computer systems. mark for My Articles similar articles
CIO
February 24, 2010
Joab Jackson
Citrix's Vision for the Virtualized Enterprise Virtualization software vendor Citrix bets partnerships with rivals will help it capture a larger share of the enterprise. mark for My Articles similar articles
Military & Aerospace Electronics
April 2006
Courtney E. Howard
Network-Centric Operations and Technology Take Center Stage at MTC 2006 A top U.S. Air Force expert stressed the importance of the U.S. military's move from a weapons-centric to a network-centric model of future warfare in a keynote address he delivered at the 2006 Military Technologies Conference. mark for My Articles similar articles
InternetNews
October 20, 2006
Erin Joyce
Is The Desktop Ready For Virtualization? A virtual world of virtualization is taking hold of the IT industry. mark for My Articles similar articles