Military Embedded Systems

Company Directory

Red Hat

Articles related to Red Hat
Cyber

Where did that software come from? - Story

October 09, 2017
Where did the software on your embedded system come from? Can you prove it? Can you safely update systems in the field? Cryptography provides the tools for verifying the integrity and provenance of software and data. There is a process as to how users can verify the source of software, if it was tampered with in transit, and if it was modified after installation.
Cyber

Using a hardware root of trust to decode software security - Blog

May 25, 2017
Quis custodiet ipsos custodes? ? ?who will guard the guardians?? ? is a question as old as the Roman Empire. This question, with its underlying bearing on trust in general, is still relevant today. And it is directly applicable to computer systems.
Cyber

Navy agrees to $133 million buy of Red Hat software and services - News

February 20, 2017
WASHINGTON. The Department of the Navy has signed a five-year blanket purchase agreement (BPA) with DLT Solutions for the government IT contractor to provide the Navy and Marine Corps with Red Hat software and services. The $133.4 million agreement includes a one-year base ordering period with four one-year optional ordering periods, to be in force through December 2021.
Cyber

Choosing an OS for military IoT systems - Blog

May 31, 2016
OPEN SOURCE WAY BLOG: The parameters for choosing an operating system (OS) for IoT deployments vary significantly from those for embedded systems of the past. These embedded systems served a specialized function, often having proprietary interfaces to other devices through custom hardware and software that included the operating system. In contrast, IoT systems are open by design, composed of standard building blocks, and connected to other devices using open interfaces. Obviously, not all IoT systems are built the same way, but the core technologies are similar.
Cyber

Real hardware, real software, real-time performance: Real-Time Linux - Blog

February 25, 2016
Interactions with the physical world can be tricky ? even dangerous! Let's say you have an Internet of Things (IoT) application controlling a chemical process - perhaps exotic chemicals for an aerospace mission. The IoT devices include sensors for temperature, pressure, flow rate, and tank levels and actuators for pumps, heaters and valves ? including a dump valve ready to vent high pressure. In this situation it's likely you would have analysis and reporting software running, be receiving sensor readings, and have control of the various pumps, heaters and valves. With IoT, computing can be pushed to the edge via gateways and controllers often running sophisticated applications.
Cyber

IoT: Embedded and Secure - Blog

November 23, 2015
OPEN SOURCE WAY BLOG: Last time I wrote about how the Internet of Things (IoT) is impacting the design of military embedded systems; this month, I'd like to address IoT and security. Specifically, I want to address the security processes involved in managing IoT gateways, which are vital to the successful operation of critical applications.