February 28, 2017
The Embedded Tech Trends (ETT) conference, organized by the VITA standards organization and held last month in New Orleans ? a city which folklore says has the reputation for dark powers, Voodoo rituals, and magic. It was also a filming location for the James Bond movie ?Live and Let Die? and one of the fun parts of these Bond movies is the new gadgets given to Bond to help his fight against evil. So, New Orleans seemed an appropriate location for the some of the world?s leading providers to the embedded markets to mingle and promote their latest magical innovative technologies for tomorrow?s applications.
February 27, 2017
A-PNT, or assured position, navigation, and timing, is a relatively new buzz phrase in military navigation systems. It enhances existing selective availability anti-spoofing module (SAASM) GPS navigational technologies (which are already immune to spoofing) with other PNT methods that are not susceptible to signal loss, jamming or satellite destruction. A-PNT?s lofty goal is to give soldiers the ability to identify and communicate accurate location, course, and time without countermeasure interference.
February 27, 2017
The switch to commercial-off-the-shelf (COTS) products can be beneficial for the consumer and manufacturer with new military environmental testing methods.
January 31, 2017
The recent activities in the South China Sea of the seizure and subsequent return by China of a U.S. unmanned underwater vehicle (UUV) ? also known as an ?ocean glider drone? - has once again brought drone security into the spotlight. Securing data collected as part of Internet of Things (IoT) environments is top of mind, and never more so than in military applications.
January 31, 2017
WARFARE EVOLUTION BLOG:It?s 2017, and I?m back. After enduring uncomfortably-deep probing and evaluation of my literary skills and technical analysis capabilities, along with a comprehensive DNA test, my masters here at OpenSystems Media have decided to keep me on as a writer, to ply you with another year of fascinating and intriguing next-generation warfare articles. For 2017 I will write with an emphasis on present capabilities of the U.S. and our enemies, as well as new platforms and strategies under development.
December 20, 2016
WARFARE EVOLUTION BLOG: Speculating a war in space is a perplexing subject, so let?s wade into it with a heathy level of trepidation, looking at treaties, space courts, and potential battle scenarios.
November 21, 2016
CODE QUALITY BLOG: The discussion of coverage analysis can bring up a number of different assumptions that do not always agree. Does it mean checking that all the code has been executed? Does it mean that all requirements have been exercised and tested? Does it bring up some number other than 100 percent that can be relied upon for functioning code? What we want to do is to assure ourselves that a program has been thoroughly tested to the point it can be relied upon, even in life-threatening situations. How do we achieve this and what aspect of ?coverage? will allow us to rest easy?
October 31, 2016
The long-sought era of machine learning in finally at hand. The potential benefit to the warfighter of deep learning techniques both enormous and profound. With defense systems trending towards greater application autonomy, deep learning techniques too complex to implement with more traditional processing technologies can now help to significantly drive advancements in on-platform processing of streaming signal or image data. These techniques are proving useful for pattern recognition tasks such as natural language processing and image feature detection, producing highly reliable autonomous decisions based on huge data sets.
October 30, 2016
CODE QUALITY BLOG: You?ve secured your Internet of Things (IoT)-connected system with components for authentication such as password, retina scan, physical key, plus encryption/decryption and more. But building these things in is not enough. You?ve got to be certain that they all work together properly and that the code doesn?t contain any flaws that could grant access to hackers. Security needs to be built in at the very start of the project by using secure protocols and continuing on up to functional elements in the application. One powerful tool for gaining this assurance is dynamic analysis.
September 29, 2016
The next generation of wireless communications systems is driving a new level of technology integration. Higher data rates, massive connectivity for systems like the Internet of Things (IoT), lower power consumption, and other ambitious goals can only be achieved by combining advanced digital, RF, and antenna technologies. Traditionally, each of these components has been designed separately, only to be integrated, tested, and debugged after the first hardware prototype is built. The days of this approach, with domain experts working separately, using separate tools, are numbered.
September 29, 2016
THE OPEN SOURCE WAY BLOG. Secure, real-time communication technology is an essential requirement for military Internet of Things (IoT) solutions. There are numerous protocols for communication between IoT devices, and between the devices and back-end systems. Messaging solutions should be able to to support these various protocols across heterogeneous, physically distributed systems while enabling the security and integrity of information flows. They should also be highly scalable, able to accommodate potentially hundreds of millions of devices. And since delay or loss of data is not an option, they should feature strict availability and reliability requirements.
September 29, 2016
September 28, 2016
We are being inundated with new computing and networking models for all the wrong reasons -- from cloud computing to blockchain. This is a topic that distorts my normally congenial and pleasant demeanor, so let?s take a look at what is really going on and clear the air.
August 24, 2016
The summer heat has not been confined to the weather. U.S. Customs and Border Protection (CBP) officials are warming up the import world with more audits and enforcement actions. To accomplish this objective, CBP Regulatory Audit has started to deviate from its traditional audit program, the Focused Assessment, and intends to conduct more audit surveys and comprehensive audits in lieu of Focused Assessments.
- GUEST BLOG: What’s the difference between IFF and Micro IFF?
- Avionics suite designed by NGC to bolster F-35 warfighting capability
- GlobalEye surveillance system garners another contract for Saab
- Remote ID included in final rules for drone operation announced by FAA
- Next Generation of Industry-Leading 3U VPX FPGA Board Designed to Align With SOSA Technical Standard
- Epiq Solutions Announces Sidekiq VPX400, a Multi-Channel, Phase Coherent RF Transceiver Solution in a Single 3U VPX Form Factor Aligned to SOSA Technical Standards
- Joint STARS radar system for E-8C fleet to undergo modification work
- Emerging threats drive RF and microwave component design trends for electronic warfare
- AI and ML performance to be boosted with ruggedized storage devices
- Top 10 military AI stories of 2020
- AI-powered air-to-surface systems in development under Rafael contract
- AI in government calls for more coordinated approach and leveraging partnerships, forum attendees assert
- Hardware win for Abaco Systems to support Space Force tactical satellite communication program
- Rugged Ethernet switch selected to equip Canadian Armored Combat Support Vehicle
- Seamless integration and management of all telemetry range assets in an intuitive user-friendly interface!
- Vehicular tactical computers to be supplied to RNLA by Elbit Systems