Military Embedded Systems

Articles 1 - 3
Cyber

Can sensitive data for tactical military environments be protected in the cloud? - Story

April 19, 2012
When storing, accessing, and disseminating military data in the cloud, top concerns include security, data reliability and redundancy, and data location. The good news is that these can be delivered when secure virtualization pairs with a distributed cloud computing scenario.
Cyber

Secure virtualization combines traditional desktop OSs and embedded RTOSs in military embedded systems - Story

May 31, 2010
Advances in software and hardware technologies now make it feasible to use both embedded and desktop operating systems in a secure military system. Robert examines enablers such as a secure separation kernel and an embedded software hypervisor, then explains uses of desktop OSs in secure military systems. (470th Military Intelligence Brigade Public Affairs photo by Gregory Ripps)
Articles 1 - 3