Military Embedded Systems



Open Source: More eyes, fewer vulnerabilities, greater security - Blog

February 27, 2015
The Open Source Way Blog: Welcome to the first in a series of quarterly posts about using open source technologies as a part of your embedded systems solutions to speed up your development efforts, reduce project costs, and create collaborative environments for innovation.

Record number of cyber attacks hit Lockheed Martin in 2014 - Blog

February 18, 2015
ARLINGTON, VA. Lockheed Martin President and CEO Marillyn Hewson, announced that Lockheed Martin was hit by 50 cyber attacks during 2014, the most the company has ever seen directed against it and Hewson says she expects the number to only increase.

Defining fifth generation warfare - Blog

February 05, 2015
WARFARE EVOLUTION BLOG: Discussing fifth generation warfare (5GW) makes me think of this quote from the Bible: "I beheld, and lo, there was no man, and all the birds of the heavens were fled."--Jeremiah 4:25. This defines 5GW, non-contact warfare in the present context. Since Sept. 11, 2001 the U.S. has performed more than 500 targeted killings on identified terrorists using armed unmanned aircraft.

Link aggregation: A cool tip for better bandwidth & redundancy on Ethernet switches - Blog

February 04, 2015
ETHERNET EVERYWHERE BLOG: Have you ever worried that your existing 1G link may not be cutting the mustard for some data transmission? What about link redundancy and failover with your existing Ethernet device? Wouldn’t it be nice to know that you you’ll always have failover?

Can Agile environments accelerate embedded software verification and certification? - Blog

January 27, 2015
CODE QUALITY BLOG: Although Agile development is being adopted by most software development organizations, most embedded developers, especially those seeking certification, continue to resist using Agile methodologies. Developers perceive more risks with an iterative Agile approach versus the traditionally regimented methodologies and artifacts required to achieve certification. Specific concerns stem from how requirements are captured in an Agile process, and how the test early-and-often principles of Agile development can be fulfilled prior to the embedded systems hardware being available.
From The Editor

The proliferation of COTS acronyms - Blog

January 12, 2015
More than two decades have passed since Secretary of Defense William Perry issued the “COTS memorandum,” dictating that the military must procure commercial-off-the-shelf (COTS) technology. Since that time in 1994 we’ve seen budget cuts, defense buildups, sequestration, three presidents and a plethora of COTS acronym spinoffs.

Evolution of 4th generation warfare - Blog

January 12, 2015
WARFARE EVOLUTION BLOG: Our first, second, and third entries in this series covered the early evolution of warfare up through the Vietnam War, where fourth generation warfare (4GW) took hold. In this installment we discuss 4GW and how its foundational ideas of 4GW were originally written by Mao Tse Tung and his co-commander, Zhu De, in 1928.

The 31 flavors of Ethernet - Blog

January 06, 2015
ETHERNET EVERYWHERE BLOG: Our last blog covered the basic subject of why Ethernet is a good choice for military and embedded applications. Now that Why has been explained, I thought that I would spend some time talking about the What? Most people are often surprised by the different flavors, so to speak, of Ethernet that exist. I’m not sure that there are actually 31 flavors, but for this discussion, it is close enough.

Warfare Evolution Blog: Defeating 3rd generation warfare - Blog

January 02, 2015
WARFARE EVOLUTION BLOG: We looked at the how the Blitzkrieg (3GW) defeated the Maginot Line (2GW) in Part 2 of this series. As U.S. Army Gen. George S. Patton once said, "a good plan violently executed now is better than a perfect plan executed at some indefinite time in the future." That axiom was proved true when 2GW was overwhelmed in World War II (WWII). Now, let's look at how 3GW can be defeated while continuing to support Patton's statement.

CODE QUALITY BLOG: Is 100 percent code coverage analysis essential? - Blog

November 19, 2014
CODE QUALITY BLOG: Safety-critical software standards focus very highly on how to test software effectively. They state that effective software testing requires a disciplined approach in which code coverage is used to provide feedback on the effectiveness of the testing to date. The level of testing rigor applied to a system must be driven by the impact of a system failure. The more significant the consequences, the more rigorous the testing has to be.


November 12, 2014
ETHERNET EVERYWHERE BLOG: This is a first in a series of blogs covering the latest and greatest information surrounding Ethernet. However, I thought I’d start out the first blog answering the question “Why Ethernet?" and then, I’ll proceed through a series discussing the latest innovations, standards, and applications.

SAFETY CRITICAL BLOG: Microkernels, de-centralized government and social order - Blog

October 29, 2014
SAFETY CRITICAL BLOG: In the early days, we lived in a physical world. Everything ran in supervisor mode, much like a commune. Unfortunately, with no leader, if was difficult to preserve order and contain errant and malicious code, so chaos and mischief ensued. A bad pointer was all that was needed to bring the most sophisticated equipment to its knees, witness the Mars Rover and its maddening encounter with that nettlesome rock.

CODE QUALITY BLOG: Is code coverage analysis necessary? - Blog

October 20, 2014
CODE QUALITY BLOG: When programmers discuss testing, a question that often comes up is how much is enough? Do I need to get 100 percent coverage? Let’s first address the elephant in the room: it’s impossible to fully test a piece of software. Don’t believe me? A 100-line program described by Glennford Myers in the 1976 book "Software Reliability: Principles and Practices" had as many as 1018 unique paths. In reality when you realize that contemporary software often exceeds hundreds of thousands, if not millions of lines of code and you quickly realize how impractical it is to completely test a piece of software.

Unmanaged vs. managed Ethernet switches for modern warfare applications - Blog

October 16, 2014
In today's modern warfare – where survivability and mission success is dependent on data acquisition, analysis, and instruction – a growing number of Ethernet-based devices supporting missions must be connected to the central mission computer, and often to each other. Ethernet switches are needed throughout military infrastructure as a common means of making such connections. Customers often ask us whether they need a managed or unmanaged switch. Let's go through the basic capabilities of each.