Similar Articles |
|
Military & Aerospace Electronics July 2008 Courtney E. Howard |
iWar Technology companies devise innovations to help combat the growing threat of information warfare. |
Military & Aerospace Electronics May 2009 Courtney E. Howard |
War in the Information Age Secure operating systems and code verification tools are the front line when it comes to protecting mission-critical and classified information on today's digital battlefield. |
Military & Aerospace Electronics September 2004 |
Is your RTOS safe and secure? Vendors of real-time operating systems find themselves being pulled in two directions at once. Defense contractor customers demand lower costs while, at the same, time more security and safety certification than ever before. Linux is a point of heated discussion. |
Military & Aerospace Electronics January 2007 Courtney Howard |
Green Hills Software Introduces Secure Networking Platform Green Hills Software announced its platform for secure networking and an enhanced, 10th anniversary edition of its Integrity real-time operating system (RTOS). |
Military & Aerospace Electronics April 2006 J.R. Wilson |
Real-Time Software Providers Zero-in on Safety-Critical Issues Creating operating systems and kernels that are blazingly fast simply does not make the grade today, as systems integrators increasingly demand software that not only runs quickly, but also will not crash, will not damage other programs, and is secure from hackers. |
Military & Aerospace Electronics April 2007 John Keller |
Developers of Real-Time Embedded Software Take Aim at Code Complexity Safety, security, reliability, and performance dominate the discussion of real-time embedded operating systems as software developers aim for multiprocessor architectures with smaller size, lighter weight, and lower power consumption. |
Military & Aerospace Electronics December 2007 Courtney E. Howard |
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. |
Military & Aerospace Electronics December 2005 John McHale |
Security and Certification Necessary for Mission-Critical Software Speakers at the third annual Green Hills Embedded Software Summit last month touted security and certification as necessary for software used in military applications such as the F/A-22 fighter-bomber and the F-35 Joint Strike Fighter. |
Military & Aerospace Electronics April 2005 Ben Ames |
POSIX: reveling in its popularity Looking to save money and reuse software, Pentagon planners are turning to POSIX. If all real-time operating systems work with POSIX, then soldiers can swap code from a broken computer to a new one. |
Military & Aerospace Electronics December 2009 Courtney E. Howard |
Secure Information Storage Military and aerospace equipment designers have a wealth of options available to fill the ever-increasing need for secure data storage in the field. |
Military & Aerospace Electronics January 2008 Courtney E. Howard |
Rugged Electronics Empower Tomorrow's Technology Technology companies enable our military's net-centric vision through smaller, faster, stronger computers. |
Military & Aerospace Electronics April 2008 Courtney E. Howard |
Software Code and COTS Developers harness the latest software engineering tools to deliver reliable, mission-critical, real-time embedded software to mil-aero users. |
Military & Aerospace Electronics March 2010 Courtney E. Howard |
Empowering embedded computing Mainstream, COTS technologies combine with aerospace and defense industry innovations to deliver increased performance in compact electronics designs |
Military & Aerospace Electronics December 2008 Courtney E. Howard |
Driving the Demand for Data Storage Sensors span the battlefields, producing a wealth of mission-critical data that must be kept at once readily available and secure. |
Military & Aerospace Electronics June 2006 Courtney E. Howard |
Industry Forces Take MILS Architecture to the Edge in Public Demonstration Systems integrators and commercial-off-the-shelf vendors are combining technologies to demonstrate a secure multiple independent levels of security (MILS) software architecture that protects military and intelligence communications networks on the global information grid. |
Military & Aerospace Electronics December 2008 John McHale |
Green Hills Software Obtains EAL 6+ Operating System Security Certification Officials from Green Hills Software in Santa Barbara, Calif., say their Integrity real-time operating system (RTOS) achieved the U.S. National Security Agency's highest level for software security. |
Military & Aerospace Electronics November 2005 John Keller |
Open Systems, Reliability, and Security Are Primary Drivers in Software Development Environments The increasing size, complexity, and proliferation of software code throughout military and aerospace electronic and optoelectronic systems is driving software developers toward industry-standard products, which are often compatible with open-systems software tool interfaces. |
National Defense February 2006 Stew Magnuson |
Network Vulnerabilities Worry Pentagon Pentagon officials call the Defense Department's global communications network its weakest link. The question is how to manage the risk, and create a balance between security and the necessity of working with international partners and the private sector. |
Military & Aerospace Electronics May 2008 Courtney E. Howard |
Hypervisors and Software Virtualization Pique Interest at Embedded Systems Conference Significant trends and technologies involving embedded hypervisors and software virtualization for military and aerospace applications stood out at the annual Embedded Systems Conference (ESC) |
National Defense November 2013 Sandra I. Erwin |
Changing World Blazes New Trails For Military Technology A striking array of challenges is reshaping the course of defense technology. The United States is entering an era characterized by fiscal austerity and the rise of "non-state" actors as enemies of nation states. |
Military & Aerospace Electronics November 2009 |
Software Development Tools for Safety-Critical Applications Enhanced by Green Hills Green Hills Software is enhancing its Platform for Industrial Safety, by adding support for the Green Hills Secure Virtualization Architecture and expanding the existing networking, file system, and target hardware options. |
InternetNews August 29, 2007 David Needle |
No Secret: NSA Taps VMware For Virtualization Defense contractor General Dynamics has tapped VMware as a sub-contractor for development of a highly secure workstation based on commercial products. |
National Defense October 2005 Joe Pappalardo |
As Military Becomes More Reliant On Networks, Vulnerabilities Grow If problems are not addressed, the Pentagon could spend $200 billion during the next 10 years on a network with serious vulnerabilities, according to security experts. |
Popular Mechanics September 2008 Glenn Derene |
The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back In the modern American military, digital telecommunication is so integral to command and control of forces and equipment that the disruption of data can do more to disable a fighting force than a thousand bombs |
InternetNews September 29, 2009 |
Controls Key in Virtualization Frenzy: Study CA and VMware study identifies key process controls, practices and problems for enterprise customers racing to virtualize production servers and desktop apps. |
National Defense June 2015 Ted Girard |
How Defense Agencies Can Better Cope With Big Data The Defense Information Systems Agency's five-year strategic plan says big data capabilities are becoming essential to modern warfare. |
Military & Aerospace Electronics June 2006 John Keller |
Safety and Security Are Top Priorities for Providers of Embedded Operating Systems Now more than ever, software industry experts say, military and aerospace systems designers are looking for safety-critical embedded operating systems-and in nonmilitary applications in which safety-critical code historically has not been an issue. |
Military & Aerospace Electronics October 2007 John Keller |
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? |
Military & Aerospace Electronics January 2010 |
Embedded Software Components for Hypervisor and Separation Kernel Introduced by LynuxWorks Real-time software specialist LynuxWorks Inc. is introducing the newest version of its LynxSecure 3.1 separation kernel and embedded hypervisor software components. |
Parameters Summer 2006 David W. Barno |
Challenges in Fighting a Global Insurgency Strategy in a global counterinsurgency requires a new level of thinking. A world of irregular threats and asymmetrical warfare demands that we Americans broaden our thinking beyond the norms of traditional military action once sufficient to win our wars. |
InternetNews November 16, 2010 |
Cisco Rolls Out Virtual Desktop Initiative Cisco sees opportunity in the enterprise market in putting desktops on the same path to virtualized infrastructure as servers running in the cloud. |
T.H.E. Journal April 2009 John K. Waters |
Virtualize Me! K-12's burgeoning interest in cost-cutting, productivity-boosting virtualization technologies has vendors starting to take notice. |
Military & Aerospace Electronics November 2006 |
Real-time operating system with time and space partitioning The LynxOS-SE time-space partitioned hard real time operating system (RTOS) offers Posix and Linux support for performance and safety-critical environments in military and aerospace applications. |
Military & Aerospace Electronics May 2009 |
Lockheed Martin looks to LynxOS for MEADS missile system MEADS protects maneuvering ground combat forces and provides homeland defense against tactical ballistic missiles, cruise missiles, unmanned aerial vehicles, and aircraft. |
Insurance & Technology July 16, 2007 Peggy Bresnick Kendler |
Virtualization: Does It Have A Positive Impact On Insurance Operations? How can insurance enterprises benefit from virtualization. |
Parameters Autumn 2006 Michael R. Melillo |
Outfitting a Big-War Military with Small-War Capabilities Unfortunately, it took the tragedy of 9/11 and the challenges posed by an adaptive enemy for the U.S. to realize it was not prepared to fight war on terms other than its own choosing. |
InternetNews December 27, 2007 Larry Barrett |
Virtualization Craze Brings Business, Security Risks Virtualized datacenters save energy, time and money but they also bring some new - and old - security and planning issues to the fore. |
National Defense May 2010 Dunderdale & Tyliszczak |
Is It Possible to Both Share and Protect Sensitive Data? The Defense Department must be able to communicate critical intelligence across agencies and geographic boundaries quickly and securely. |
InternetNews December 26, 2008 Richard Adhikari |
Enterprise Opportunities & Challenges in 2009 Money-saving technologies will be strong, cybercriminals will rev up and business intelligence solutions will spread. |
InternetNews September 5, 2008 Sean Michael Kerner |
KVM vs. Xen vs. VMware. Is it a Hypervisor War? Competitors weigh in on the open source virtualization market shakeup. |
Military & Aerospace Electronics May 2006 |
Industry, DOD technology cooperation is key to realizing network-centric warfare Col. David W. Madden, director of the enterprise integration group at the Air Force Electronic Systems Center at Hanscom Air Force Base, discusses his group's most pressing technological priorities. |
InternetNews November 3, 2009 |
Red Hat Enterprise Virtualization Gets Managed Standalone hypervisor and management solution released as Linux vendor takes on Microsoft and VMware. |
InternetNews February 23, 2009 Sean Michael Kerner |
Red Hat Lays Out Its Virtualization Play Linux vendor Red Hat is getting serious about aiming for a bigger slice of the virtualization pie. |
InternetNews January 22, 2008 Stuart J. Johnston |
Microsoft Readies Virtualization Blitz Months away from releasing final code for its Hyper-V virtualization technology, Microsoft is busy revving up its marketing machine. |
InternetNews July 17, 2009 |
Intel Exec Talks Virtualization Security Too many companies are adopting virtualization without considering the security implications, one expert said. |
InternetNews May 13, 2010 |
HP Debuts Thin Client Virtualization Offerings At Citrix Synergy 2010 conference, Hewlett-Packard showcases new suite of client virtualization products, including mobile thin clients and support for Citrix Xen software. |
Popular Mechanics June 30, 2008 Glenn Derene |
Inside NSA Red Team Secret Ops With Government's Top Hackers Highly skilled firewall-crackers help the government keep the bad guys out of the country's computer systems. |
CIO February 24, 2010 Joab Jackson |
Citrix's Vision for the Virtualized Enterprise Virtualization software vendor Citrix bets partnerships with rivals will help it capture a larger share of the enterprise. |
Military & Aerospace Electronics April 2006 Courtney E. Howard |
Network-Centric Operations and Technology Take Center Stage at MTC 2006 A top U.S. Air Force expert stressed the importance of the U.S. military's move from a weapons-centric to a network-centric model of future warfare in a keynote address he delivered at the 2006 Military Technologies Conference. |
InternetNews October 20, 2006 Erin Joyce |
Is The Desktop Ready For Virtualization? A virtual world of virtualization is taking hold of the IT industry. |