Military Embedded Systems


Articles 1 - 8

Pushing airborne ISR data recorders to new performance heights - Story

April 30, 2018
Capturing wire rate data from today's compute-intensive intelligence, surveillance, and reconnaissance (ISR) sensor platforms brings new meaning to the old metaphor "drinking from a fire hose." Airborne ISR systems may have hundreds of cameras and other sensors that generate data that needs to be captured and stored for later analysis. Such sensor systems can't be slowed down to let the recording system to catch up with the flow of data.

Getting up to speed on NSA-approved two-layer commercial encryption - Story

November 15, 2017
The National Security Agency/Central Security Service (NSA/CSS) created the Commercial Solutions for Classified (CSfC) Program to enable the use of commercial data protection in layered solutions to protect classified National Security Systems (NSS) data. Thanks to CSfC, system designers can now deploy a commercial off-the-shelf (COTS) solution with encrypted data protection in a matter of months and at a fraction of the cost, compared to the multiple years and millions of dollars typically required to achieve certification for more sensitive Type 1 products. Type 1 products, certified by the NSA to cryptographically secure classified U.S. Government information, use approved NSA algorithms. These products are typically designed and certified by the NSA through a rigorous and often very lengthy process.

The advantages of netbooting for embedded systems - Story

September 01, 2017
As a greater number of intelligent systems are deployed on platforms such as ground vehicles, aircraft, unmanned aerial vehicles (UAVs), and unmanned undersea vehicles (UUVs), it becomes increasingly challenging to ensure that each of the platform's multiple embedded computers has been updated with the latest and correct version of runtime and/or mission software. Unfortunately, the process of installing the required software onto an embedded module or intelligent system can be labor- and cost-intensive.

NSA-approved two-layer encryption approach slashes cost and development time - Story

September 16, 2016
In today's world, it is becoming increasingly important to be able to protect classified data-at-rest with encryption for critical data, such as that captured and stored during airborne intelligence, surveillance, and reconnaissance (ISR) missions. For some programs with limited budgets and schedule, using National Security Agency (NSA)-approved Type 1 encryption, the highest level of data protection, may prove impractical due to the high cost - typically several millions of dollars for a new development - and long process - typically two to three years that it takes to reach full certification. The cost and schedule required to deliver Type 1 encrypted hardware has meant that industry's ability to provide robust data protection has lagged far behind the demand.

Future-proofing your high-density encrypted storage solution - Story

June 09, 2014
Encrypted storage designers must plan ahead - taking into consideration the probable creep in requirements for storage, I/O, and encryption -when architecting a new system that requires data storage. The likelihood of needing to accommodate increased demands makes it prudent to choose a Network Attached Storage (NAS) device or recorder that can grow with those demands.

"Keys" to COTS encrypting of data-at-rest - Story

March 10, 2014
Data security is a major concern for all businesses these days. One only has to follow the news coverage of data breaches at large retailers, major corporations, and government agencies to see the financial and security fallout from these attacks. However, for deployed military applications, data security has always been a concern and thanks to new Commercial Off-The-Shelf (COTS) options, data-at-rest security has become more efficient and affordable.

COTS data recorders with FIPS 140-2 encryption provide secure lockdown - Story

September 10, 2013
In deployed defense and aerospace applications, Data Recorders (DRs) are used to capture critical data. DRs are often deployed in harsh military environments, on platforms such as fixed-wing aircraft, helicopters, and armored vehicles that require a hi...
Articles 1 - 8