MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Military & Aerospace Electronics
July 2008
Courtney E. Howard
iWar Technology companies devise innovations to help combat the growing threat of information warfare. mark for My Articles similar articles
Military & Aerospace Electronics
February 2009
Courtney E. Howard
Information is under attack Malicious attacks on information and information systems occur at an alarming rate all over the world. mark for My Articles similar articles
Military & Aerospace Electronics
April 2008
Courtney E. Howard
Software Code and COTS Developers harness the latest software engineering tools to deliver reliable, mission-critical, real-time embedded software to mil-aero users. mark for My Articles similar articles
Military & Aerospace Electronics
September 2004
Is your RTOS safe and secure? Vendors of real-time operating systems find themselves being pulled in two directions at once. Defense contractor customers demand lower costs while, at the same, time more security and safety certification than ever before. Linux is a point of heated discussion. mark for My Articles similar articles
Military & Aerospace Electronics
April 2006
J.R. Wilson
Real-Time Software Providers Zero-in on Safety-Critical Issues Creating operating systems and kernels that are blazingly fast simply does not make the grade today, as systems integrators increasingly demand software that not only runs quickly, but also will not crash, will not damage other programs, and is secure from hackers. mark for My Articles similar articles
Military & Aerospace Electronics
December 2005
John McHale
Security and Certification Necessary for Mission-Critical Software Speakers at the third annual Green Hills Embedded Software Summit last month touted security and certification as necessary for software used in military applications such as the F/A-22 fighter-bomber and the F-35 Joint Strike Fighter. mark for My Articles similar articles
Military & Aerospace Electronics
April 2005
Ben Ames
POSIX: reveling in its popularity Looking to save money and reuse software, Pentagon planners are turning to POSIX. If all real-time operating systems work with POSIX, then soldiers can swap code from a broken computer to a new one. mark for My Articles similar articles
Military & Aerospace Electronics
April 2007
John Keller
Developers of Real-Time Embedded Software Take Aim at Code Complexity Safety, security, reliability, and performance dominate the discussion of real-time embedded operating systems as software developers aim for multiprocessor architectures with smaller size, lighter weight, and lower power consumption. mark for My Articles similar articles
Military & Aerospace Electronics
January 2007
Courtney Howard
Green Hills Software Introduces Secure Networking Platform Green Hills Software announced its platform for secure networking and an enhanced, 10th anniversary edition of its Integrity real-time operating system (RTOS). mark for My Articles similar articles
Military & Aerospace Electronics
December 2008
John McHale
Green Hills Software Obtains EAL 6+ Operating System Security Certification Officials from Green Hills Software in Santa Barbara, Calif., say their Integrity real-time operating system (RTOS) achieved the U.S. National Security Agency's highest level for software security. mark for My Articles similar articles
Military & Aerospace Electronics
August 2005
John McHale
Aonix hard-real-time Java technology useful for command and control Aonix engineers have demonstrated hard-real-time Java that reaches the run-time efficiency of C, which makes it able to meet the needs of command-and-control applications. mark for My Articles similar articles
Military & Aerospace Electronics
December 2007
Courtney E. Howard
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. mark for My Articles similar articles
Military & Aerospace Electronics
June 2006
Courtney E. Howard
Industry Forces Take MILS Architecture to the Edge in Public Demonstration Systems integrators and commercial-off-the-shelf vendors are combining technologies to demonstrate a secure multiple independent levels of security (MILS) software architecture that protects military and intelligence communications networks on the global information grid. mark for My Articles similar articles
Military & Aerospace Electronics
September 2005
In Brief BAE systems to develop on-board generator for Humvee... Navy P-3C aircraft use data link from Lockheed Martin... Northrop Grumman tests software for Webb Space Telescope... Air Force eyes state-of-the-art jet fighter targeting pods... etc. mark for My Articles similar articles
Military & Aerospace Electronics
November 2009
Software Development Tools for Safety-Critical Applications Enhanced by Green Hills Green Hills Software is enhancing its Platform for Industrial Safety, by adding support for the Green Hills Secure Virtualization Architecture and expanding the existing networking, file system, and target hardware options. mark for My Articles similar articles
Military & Aerospace Electronics
November 2005
John Keller
Open Systems, Reliability, and Security Are Primary Drivers in Software Development Environments The increasing size, complexity, and proliferation of software code throughout military and aerospace electronic and optoelectronic systems is driving software developers toward industry-standard products, which are often compatible with open-systems software tool interfaces. mark for My Articles similar articles
Military & Aerospace Electronics
May 2008
Courtney E. Howard
Hypervisors and Software Virtualization Pique Interest at Embedded Systems Conference Significant trends and technologies involving embedded hypervisors and software virtualization for military and aerospace applications stood out at the annual Embedded Systems Conference (ESC) mark for My Articles similar articles
Military & Aerospace Electronics
January 2010
Embedded Software Components for Hypervisor and Separation Kernel Introduced by LynuxWorks Real-time software specialist LynuxWorks Inc. is introducing the newest version of its LynxSecure 3.1 separation kernel and embedded hypervisor software components. mark for My Articles similar articles
Military & Aerospace Electronics
May 2008
Products Martek Power offers high-power, multichannel power modules... Aeroflex offers Battery Electronic Unit family of Li-Ion cell balancing products... Elmo offers board-mounted servo drive with 5 kilowatts continuous power... etc. mark for My Articles similar articles
National Defense
October 2005
Joe Pappalardo
As Military Becomes More Reliant On Networks, Vulnerabilities Grow If problems are not addressed, the Pentagon could spend $200 billion during the next 10 years on a network with serious vulnerabilities, according to security experts. mark for My Articles similar articles
InternetNews
April 29, 2004
Jim Wagner
Red Hat Charts Security Roadmap Standards and certification mark the path to security, according to the popular Linux distribution. mark for My Articles similar articles
Military & Aerospace Electronics
June 2006
John Keller
Safety and Security Are Top Priorities for Providers of Embedded Operating Systems Now more than ever, software industry experts say, military and aerospace systems designers are looking for safety-critical embedded operating systems-and in nonmilitary applications in which safety-critical code historically has not been an issue. mark for My Articles similar articles
InternetNews
April 8, 2005
Michael Singer
HP's Open View Seeks Common Criteria Blessing Hewlett Packard submits its Open View software to the government's NIAP Common Criteria security certification program. mark for My Articles similar articles
InternetNews
July 12, 2010
Wind River Pushes Linux Security Further The soon-to-be-released EAL 4+ certified 'secure' embedded Linux from Wind River could result in new market opportunities. mark for My Articles similar articles
National Defense
October 2005
Joe Pappalardo
Protecting Global Information Grid Requires New Strategy The cornerstone of future defense programs is information technology, but that foundation may contain cracks that endanger the entire effort, according to security experts within the government. mark for My Articles similar articles
InternetNews
February 27, 2006
Sean Michael Kerner
SSL-VPNs Certified For Government Work Juniper claims it's the first to get common criteria certification for an SSL-VPN product line. Competitors aren't far behind. mark for My Articles similar articles
Military & Aerospace Electronics
March 2007
Courtney E. Howard
QinetiQ to Play Strategic Role in United Kingdom Taranis UAV Technology Demonstrator Program Computer experts at QinetiQ in Farnborough, England, will provide flight-critical software for the United Kingdom initiative to develop a world-class unmanned aerial vehicle (UAV) technology demonstrator called Taranis. mark for My Articles similar articles
Military & Aerospace Electronics
March 2008
Nielsen & Plans
Java Computer Language Eyes Safety-Critical, Real-Time Applications A new drive in the Java community seeks to expand the language's applicability to safety-critical where failure puts lives at risk. mark for My Articles similar articles
Military & Aerospace Electronics
May 2007
Aonix Enhances ObjectAda Real-Time Software Tools ObjectAda Real-Time Raven implements the Ravenscar profile, a runtime environment for applications requiring safety certification or a high level of confidence in proven and fully tested runtime execution predictability. mark for My Articles similar articles
Popular Mechanics
June 30, 2008
Glenn Derene
Inside NSA Red Team Secret Ops With Government's Top Hackers Highly skilled firewall-crackers help the government keep the bad guys out of the country's computer systems. mark for My Articles similar articles
InternetNews
June 15, 2007
Sean Michael Kerner
IBM Helps Red Hat to EAL 4 Certification The latest version of Red Hat Enterprise Linux gets a higher level of labeled security certification. mark for My Articles similar articles
InternetNews
September 27, 2005
Sean Michael Kerner
Red Hat EAL To Get Government Blessing IBM sponsors the yet to be released Red Hat Enterprise Linux 5 for EAL4 certification. mark for My Articles similar articles
InternetNews
November 1, 2007
Sean Michael Kerner
HP Backs Red Hat in Government Biz Bid Linux vendor Red Hat is hoping for a larger portion of the government's multi-billion dollar IT spending with its widest-ever array of security certifications, thanks to assistance from HP. mark for My Articles similar articles
JavaWorld
September 19, 2003
Java Product News Espial integrates with Macromedia Flash... Metanology joins Eclipse... Aonix releases PERC 1.4 platform... etc. mark for My Articles similar articles
JavaWorld
January 2, 2004
Humphrey Sheil
In pursuit of perfection If we could just address Java's weak points, we might make Java that mythical beast -- the perfect technology platform. So then, what are those changes? Is there such a thing as the perfect technology platform, and does Java have the potential to become it? mark for My Articles similar articles
InternetNews
June 11, 2009
Paul Rubens
Is Vista the Safest OS for Business? As for Vista being the most secure OS on the planet, consider these wise words: "Just because Microsoft says something doesn't mean that it's true." mark for My Articles similar articles
Salon.com
January 21, 2003
Farhad Manjoo
Is there hope for Java? A judge has ordered Microsoft to make it easy for Sun's popular programming language to work with Windows. But the remedy may be too little, too late. mark for My Articles similar articles
Military & Aerospace Electronics
June 2006
L-3 Modernizes Embedded System with Aonix Virtual Machine L-3 Communications is updating its System 550 by replacing the existing Java virtual machine with the Aonix PERC virtual machine. mark for My Articles similar articles
Military & Aerospace Electronics
February 2009
Aonix Brings Ada Kernel Certification Kit to Market Officials at Aonix have released a certification kit for the ObjectAda RAVEN software tool to provide the evidence and tools necessary to certify software solutions to DO-178B Level A as well as other standards. mark for My Articles similar articles