Military Embedded Systems

Company Directory

Red Hat

Articles related to Red Hat

GUEST BLOG: How the military can speed data mobility for smart decisions on the move - Blog

February 03, 2023

The military is producing ever-larger amounts of valuable data from embedded systems at the edge. Now it needs more effective ways to share, understand, and act on that data – at or near the user and as close as possible to real time. By leveraging available technologies like containerization and tools to manage them, warfighters have the opportunity to make faster, smarter decisions where and when they’re needed to help achieve battlespace dominance.


Three keys to frictionless zero-trust security - Blog

August 23, 2021

By Mike Epley, Red Hat

The U.S. Department of Defense (DoD) was already headed toward a completely perimeter-less security environment before the COVID-19 pandemic hit. Now, the agency has gone full-fledged into a virtually wide-open landscape where physical constraints that used to exist have been largely eradicated, and new types of threats against its workforce, tools, supply chains, and operations abound.


Cloud-computing models provide an edge on the connected battlefield - Story

February 10, 2021

By Mike Epley

The ability to collect and analyze data from radar; intelligence, surveillance, and reconnaissance (ISR); electronic warfare (EW); and other sensors at the edge can offer the U.S. military a decisive advantage on the battlefield. Yet resource and operational constraints continue to stand in the way. Applying cloud-native models can help overcome these constraints and improve decision-making while in theater.


Securing military embedded systems is a giant challenge - Story

October 08, 2020

Updating and patching security vulner­abilities to limit the attack surface for the military’s embedded systems – especially legacy ones – can be a daunting task.


F-22 Raptor fleet upgrades process is accelerated through Lockheed Martin, Red Hat partnership - News

May 08, 2019
BOSTON. Lockheed Martin teamed up with Red Hat to to modernize the application development process to bring new capabilities to the U.S. Air Force?s fleet of F-22 Raptor fighter jets.

Integrity of embedded systems - Blog

February 28, 2019

It is critical to be able to verify the integrity of systems used in military and other applications to ensure that they have not been modified or corrupted. It is of course best to prevent a system from being tampered with. If this can't be done, it is vital to detect tampering. In many cases it is better to prevent a system from operating at all if you can't be sure it hasn't been modified. In all cases it is vital to protect information on the system and especially critical secrets like crypto keys.