Military Embedded Systems

Company Directory

Curtiss-Wright

20130 Lakeview Center Plaza
Suite 200
Ashburn, Virginia 20147
[email protected]
https://www.curtisswrightds.com/
Curtiss-Wright
Articles related to Curtiss-Wright
Comms

Getting up to speed on NSA-approved two-layer commercial encryption - Story

November 15, 2017
The National Security Agency/Central Security Service (NSA/CSS) created the Commercial Solutions for Classified (CSfC) Program to enable the use of commercial data protection in layered solutions to protect classified National Security Systems (NSS) data. Thanks to CSfC, system designers can now deploy a commercial off-the-shelf (COTS) solution with encrypted data protection in a matter of months and at a fraction of the cost, compared to the multiple years and millions of dollars typically required to achieve certification for more sensitive Type 1 products. Type 1 products, certified by the NSA to cryptographically secure classified U.S. Government information, use approved NSA algorithms. These products are typically designed and certified by the NSA through a rigorous and often very lengthy process.
Comms

Ethernet for synchronization: It's about time - Story

October 17, 2017
Today's embedded systems often include several counters and clocks that keep track of time, and ensuring that they are accurate - and synchronized across multiple devices - can be critical. For example, synchronized clocks can be used to partition shared resources (such as network links) in distributed systems with critical real-time requirements.
Avionics

Partnerships, VITA, avionics computers featured by Curtiss-Wright at AUSA 2017 - News

October 12, 2017
WASHINGTON ? AUSA. Officials at Curtiss-Wright Defense Solutions made several announcements during this year?s Association of the United States Army Exhibition (AUSA) that include partnerships, covering the latest information on the VITA cooling standard, and the introduction of the SPIRIT family for airborne computer applications.
Cyber

Zen and the art of HPEC software debugging - Story

September 18, 2017
The age-old debate regarding art versus science: Some engineers take a romantic approach, while others take a more traditional approach. Whether debugging is an art or a science or a combination of both will continue to be debated, but all sides can agree the tools can make all the difference between timely success and riding a metaphorical motorcycle down the road of failure.
Unmanned

The advantages of netbooting for embedded systems - Story

September 01, 2017
As a greater number of intelligent systems are deployed on platforms such as ground vehicles, aircraft, unmanned aerial vehicles (UAVs), and unmanned undersea vehicles (UUVs), it becomes increasingly challenging to ensure that each of the platform's multiple embedded computers has been updated with the latest and correct version of runtime and/or mission software. Unfortunately, the process of installing the required software onto an embedded module or intelligent system can be labor- and cost-intensive.
Avionics

Augmented reality and video-management systems - Story

August 09, 2017
Over the last few years, the concept of augmented reality, in which computer-generated imagery is combined with views of the real world, has become mainstream. Formerly found only in very high-end applications, such as helmet-based heads-up displays for fighter-jet pilots, this next-generation graphics capability is poised to revolutionize applications such as search and rescue (SAR) and airborne surveillance.
Cyber

Establishing a root of trust: Trusted computing and Intel-based systems - Story

August 03, 2017
In the global defense-electronics market there is a growing demand for trusted computing solutions that carry effective protections against cyberattacks. Users want to be confident that when they power up their deployed embedded system, the code that their system is running can be trusted. In this sense,"trusted" means that the system is running only the software code that the system integrator intends it to, and that no other code - malicious or otherwise - has been added to it.