The VITA 47 standard describes the boundary of the module as a maximum, with different values depending on the class.
Military Embedded Systems
Op-Eds
GIVING BACK: Operation Second Chance - Blog
September 09, 2022Each issue, the editorial staff of Military Embedded Systems will highlight a different charitable organization that benefits the military, veterans, and their families. We are honored to cover the technology that protects those who protect us every day.
GUEST BLOG: Five steps to take when securing your data with multi-factor authentication - Blog
September 06, 2022Computer data exists in different states at different times: data in transit (information flowing through a network); data in use (active data that is being accessed and manipulated by a computer program); and data-at-rest, known as DAR, or data that is physically housed in a storage device like a solid-state drive. Many cybersecurity solutions focus on securing data in transit and data in use, but neglect securing DAR.
The Air Force, ABMS, and the Kill Web - Blog
July 28, 2022WARFARE EVOLUTION BLOG. So far, we have covered the Army (IBCS), the Navy (CEC), and the Space Force (SF-ABMS) programs. So now it’s time to explore what the Air Force is doing to join the Kill Web. Their primary effort is called ABMS (Advanced Battle Management System), that seeks to connect all their aircraft, weapons, and sensors together into a tactical mesh network where they can talk to each other in real time. Maybe the best way to present this information is by comparison to what the other services have been doing. That might be more informative.
GIVING BACK: Forever Young Veterans - Blog
July 22, 2022Each issue, the editorial staff of Military Embedded Systems will highlight a different charitable organization that benefits the military, veterans, and their families. We are honored to cover the technology that protects those who protect us every day.
GUEST BLOG: Key to JADC2: Converging strategic and tactical communications - Blog
July 21, 2022In March 2022, Deputy Defense Secretary Kathleen Hicks signed the Joint All Domain Command and Control (JADC2) Implementation Plan, noting that JADC2 will be critical as the military works to keep pace with the volume and complexity of data in modern warfare.
GIVING BACK: Our Military Kids - Blog
June 22, 2022Each issue, the editorial staff of Military Embedded Systems will highlight a different charitable organization that benefits the military, veterans, and their families. We are honored to cover the technology that protects those who protect us every day.
Thoughts from the Satellite 2022 show: MILSATCOM trends and buzz on the show floor - Blog
May 31, 2022By Jeff Lessner, Vice President, Defense and Intelligence Systems Division, Hughes Network Systems.
Walking the floors and attending the sessions at the Satellite 2022 show I found that the buzz within the military satellite industry continues to be the deep need for greater resilience in the Department of Defense (DoD) communications architecture. But discussion these days isn’t just about the need for it, it’s about technologies that can deliver it.
The Space Force, Lagrange points, xenomorphs, and the Kill Web - Blog
April 28, 2022WARFARE EVOLUTION BLOG. So far, we have studied how the U.S. Army (IBCS) and Navy (CEC) programs have been conducting experiments, to integrate their weapons and ISR (intelligence, surveillance, and reconnaissance) systems into the Kill Web mesh network. Now, let’s take a look at what the Space Force is doing. The Space Force was formed as the fourth armed service in 2019 and operates under the Air Force.
Rationalizing the Army’s “Need for Speed” - Blog
April 13, 2022For most of the last decade, both the U.S. Department of Defense (DoD) and the U.S. Congress have bemoaned the slow pace of weapons-systems acquisition for equipping the country’s warfighters. A 2020 study from the Center for Strategic and International Studies (CSIS) found the average cycle time for a major defense acquisition program (MDAP) – defined as the time it takes from Milestone B (the official start of a program) to the declaration of Initial Operational Capability (IOC) – to be nearly seven years.
GIVING BACK: The Battle Buddy Foundation - Blog
March 03, 2022Each issue, the editorial staff of Military Embedded Systems will highlight a different charitable organization that benefits the military, veterans, and their families. We are honored to cover the technology that protects those who protect us every day.
The Navy, CEC, Project Overmatch, and the Kill Web - Blog
February 26, 2022WARFARE EVOLUTION BLOG. Last time, we looked at the Army’s IBCS (Integrated Battle Command System) program and Project Convergence exercises, through the eyes of their advanced AI (artificial intelligence) Kill Web algorithms (Rainmaker, Prometheus, FIRESTORM, and SHOT). Unfortunately, the Navy doesn’t talk much about AI algorithms, so that forces us to reluctantly abandon the trusted engineering principle of consistent analytical continuity and view their progress through what they do talk about: their platforms.
Don't let supply-chain disruptions knock your projects off schedule – navigate roadblocks and stay on track - Blog
February 09, 2022In today’s unusually challenging environment, companies may need to look for workarounds to stay on track regarding supply chain and delivery. Some electronics companies are learning the hard way that supply-chain resilience is a critical qualification for doing business, whether in their own or in their business partners' and suppliers' operations. These lessons will change the way organizations consider procurement and production decisions for the future.
Enabling tactical-edge data dominance over near-peer adversaries - Blog
February 08, 2022During the summer of 2021, U.S. Army leaders articulated the vision of Capability Set (CS) 25, which is the third in the Army’s iterative series of integrated tactical communications packages for delivery to soldiers. While each CS has had a different capability focus, the overarching objective is to realize “...the multidomain capable network of 2028, which seeks to enable information dominance against a peer or near-peer adversary.”
Three strategies defense manufacturers should use to cut sourcing lead times - Blog
February 08, 2022Today’s global semiconductor shortage has stretched procurement lead times to unforeseen lengths.
-
Rugged mission displays for surveillance applications
March 30, 2010
-
Software warranties -- A new era?
September 23, 2009
-
Solving the processor challenges for safety-critical software
October 12, 2011
-
Remote test equipment solves problems in avionics bus systems
June 24, 2008
Unmanned
-
COM Express enables application-specific data acquisition systems
October 12, 2011
-
Enhanced Full-Motion Video advances military UAS surveillance - Multistream image processing and routing in real time
October 06, 2010
-
COTS vendors, while concerned about extensive DoD budget cuts, see opportunities for retrofits, unmanned systems
October 12, 2011
-
Deploying ruggedized platforms for unmanned vehicles
June 20, 2011
-
Open standards ease Multi-Level Security (MLS) systems integration
July 27, 2011
-
Domain-specific property checking with advanced static analysis
February 17, 2011
-
Should we put up with software that doesn't work?
September 02, 2011
-
Protecting integrated circuits from silicon Trojan horses
February 10, 2009
Comms
-
DNA protects electrical components against counterfeiting
June 16, 2011
-
OtterBox arms the military with rugged technology
February 18, 2009
-
Navy's NMCI network speeds warfighter's chance to get inside the adversary's OODA loop: An exclusive interview with HP's Bill Toti,
April 29, 2011
-
Obsolescence management: Another perspective
February 10, 2009