
Energy Storage for Military Applications Faces Demands for More Power
Mobile electronics for the battlefield go hand-in-hand with batteries, and have done so for years. It’s not news that electronics that can’t be plugged-in relies on the energy-storage medium of batteries.
Secure Wireless Communication Supports Mounted and Dismounted Connectivity
Secure wireless communications (SWC) technology for vehicle-to-vehicle (V2V) and vehicle-to-end user device (V2E) communication is useful for tactical environments as it improves network flexibility and operational maneuverability while reducing management complexity and cost.
Migrating Legacy Software from Obsolete Hardware to Modern System Environments
Virtualization software and model-based design provide a path that not only enables system designers to maintain legacy software for avionics and other mission-critical systems but also makes it possible to migrate that code to modern higher-performance processing platforms, for example...
Strength in Numbers
CESMO and the Power of EW Interoperability - knowing the precise location of threats and friendly forces is essential to increasing warfighter survivability.
Enabling Technologies for Image and Video Processing
The latest high-performance embedded computing image and video processors rely heavily on general-purpose graphics processing units (GPGPUs) to capture as much detail as possible.
Secure Wireless Solutions for Tactical, Expeditionary, + Deployable Communications
The current state of the art for tent-based command posts requires hours or days of setup, which includes thousands of feet of copper wiring that delays network availability.
Having a Rugged Pi Day
It's 3-14, which is also known as Pi Day. And to help ring in the occasion, Curtiss-Wright’s rugged mission computer, targeted at applications such as avionics and UAVs, is built around a Raspberry Pi.
Sensor Open Systems Architecture (SOSA), Unmanned Vehicles, and Trusted Computing
Today, with the increasing use of unmanned platforms to host intelligence, surveillance, and reconnaissance [ISR] sensor applications, system integrators need to ensure that the sensor systems and the critical data they collect and store are protected from falling into the wrong hands.
Unmanned ISR Payloads Leverage MOSA Designs
See more, detect more, and decode more – these are the primary requirements being asked of unmanned systems in the military, and proprietary hardware and software can make achieving those goals a challenge.
Meeting Program Schedules in a Time of Supply-chain Uncertainty
These days, program managers are trying to figure out how best to mitigate the potentially harmful effects of supply-chain disruption, while protecting their customer’s program schedule and supporting the warfighter.