Military Embedded Systems

Op-Eds

Comms

War with Iran - Blog

May 28, 2016
WARFARE EVOLUTION BLOG: Previously, we looked at the military capabilities of our primary conventional enemies: Russia, China, and North Korea. Now, let?s take a look at our final conventional enemy, Iran. Iran stands accused of being the state sponsor of terrorism in the Middle East, through their support of terrorist groups in Iraq (Taliban), Afghanistan (al Qaeda), Yemen (Houthis), Lebanon (Hezbollah), and the Palestinians (Hamas).
Cyber

Avionics standards and cybersecurity highlighted Aviation Electronics Europe - Blog

April 27, 2016
As an Advisory Board Member for the Aviation Electronics Europe show it is always a fun time when the show finally arrives -- seeing the results of our committee's work and preparation. Pre-registration for the event was up this year and we put together an exciting program. The exhibit floor was also well represented by the avionics industry.
Comms

War with North Korea - Blog

April 27, 2016
WARFARE EVOLUTION BLOG: Previously we've looked at what wars with Russia and China might look like. Now, let?s look at a war with North Korea.
Comms

War with China - Blog

March 29, 2016
EVOLUTION OF WARFARE Blog. In the last installment, we looked at how we stood in a war with Russia. Now, let?s take a look at China, from publicly available information.
Avionics

Solving the safety certification challenge for multicore? - Blog

March 09, 2016
CODE QUALITY Blog: It?s no secret that multicore systems have continued to be an attractive option for the military and aerospace fields. With the drive toward reducing the size, weight, and power (SWaP) of embedded systems, the push to rely on multicore systems continues.
Comms

In a war with Russia - Blog

February 26, 2016
EVOLUTION OF WARFARE Blog. In my previous posts I've discussed the different generations of warfare and where the U.S. military falls today and how it clearly is still the most powerful military. That said Russia has been flexing its muscle in Eastern Europe the last couple years and I thought it would be good to do an analysis of their military capability and see which generation of warfare their capability falls under. We will start by looking at the basic stats.
Cyber

Real hardware, real software, real-time performance: Real-Time Linux - Blog

February 25, 2016
Interactions with the physical world can be tricky ? even dangerous! Let's say you have an Internet of Things (IoT) application controlling a chemical process - perhaps exotic chemicals for an aerospace mission. The IoT devices include sensors for temperature, pressure, flow rate, and tank levels and actuators for pumps, heaters and valves ? including a dump valve ready to vent high pressure. In this situation it's likely you would have analysis and reporting software running, be receiving sensor readings, and have control of the various pumps, heaters and valves. With IoT, computing can be pushed to the edge via gateways and controllers often running sophisticated applications.
Comms

Defining Abaco - Blog

February 18, 2016
As I write this we are on our seventh week ?being Abaco.? If you haven?t heard of Abaco Systems, we?re a brand new company formed when GE spun out its rugged embedded computing business. In the mil/aero market, we were known as GE Intelligent Platforms for the past decade. Our roots go back thirty years, to companies like Radstone Technology, VMIC, SBS Technologies, and Condor Engineering. We?re also a company in transformation - a company that is channelling the energy that comes from acquiring a new identity and new ownership to raise the bar for ourselves, with a laser focus on serving customers.
From The Editor

Remembering the Space Shuttle Challenger explosion - Blog

January 29, 2016
Televisions were rolled into classrooms at our high school when the news spread about the crash of the Challenger Space Shuttle. We watched the coverage all day, the launch, the explosion, and President Reagan’s speech. Seeing the pictures of Christa McAulliffe on the news casts yesterday morning that were commemorating the 30th year anniversary of her death along with 6 NASA astronauts when their spacecraft disintegrated moments after liftoff, brought it all back.
Avionics

Intel integrating Wind River subsidiary even more in 2016 - Blog

January 29, 2016
Earlier this month Fortune magazine reported that Wind River's run as it's own brand under the Intel umbrella will end as the company absorbs it completely. The news is not surprising as Intel is finishing up it's acquisition of FPGA-maker Altera and doing away with that brand as Altera is becoming Intel the Programmable Solutions Group (PSG).
From The Editor

Will gender neutral job titles introduce change in a culture? - Blog

January 15, 2016
Navy Secretary, Ray Mabus ordered the review of Navy job titles and a report to be completed no later than April 1, 2016. This comes after two West Point alumni graduated Ranger School back in August of last year, therefore breaking standards that once were thought impossible. This particular event, I believe, allowed the opening of all combat roles to women. Now, the Navy begins its long process of assessing and more than likely changing certain job titles to be more gender neutral.
Comms

Counterfeit electronics persistent threat to business and lives - Blog

December 22, 2015
Counterfeit electronics is a persistent matter that will be not easily go away, says Michael Cacheiro, vice president, supply chain management at Lockheed Martin. Incidents will continue to increase, as “counterfeit electronics used by the military increased by 250 percent between 2005-2008 and quadrupled from 2009-2012,” and 21 percent comes from authorized distributers.
Comms

Cryptology, cryptography, and cryptanalysis - Blog

December 22, 2015
EVOLUTION OF WARFARE BLOG: Cryptography is a broad, sticky, and mathematically complex, but interesting subject and an integral part of the evolution of warfare. So let’s get some definitions out of the way first. Cryptology is the study of codes, both creating and solving them. Cryptography is the art of creating codes. Cryptanalysis is the art of surreptitiously revealing the contents of coded messages, breaking codes, that were not intended for you as a recipient.
Radar/EW

Top military embedded blogs of 2015 - Blog

December 22, 2015
The most popular blogs on Mil-Embedded.com in 2015 covered topics including the sale of GE Embedded to Veritas Capital, legal snags for long-range radar, cyber attacks, manipulating space and time, the Internet of Things, and more. Check out the top ten below.
Radar/EW

Curing the longevity of supply blues - Blog

December 21, 2015
POWER ARCHITECTURE TODAY Blog: Longevity of supply is a concern that can keep embedded military program managers up at night for a long, long time. That’s because the time scale for deployed military systems is impressively lengthy. It’s not unusual for RFPs received today to require single board computers (SBC) that need to be supplied in production volumes into 2025-2030. That support period actually starts at the back-end of production, after an SBC has already been designed in and deployed. The time that it takes to get a selected SBC designed, and the software application written, for a new program can be as long as three to four years.