Military Embedded Systems

Company Directory

Red Hat

Articles related to Red Hat
Avionics

F-22 Raptor fleet upgrades process is accelerated through Lockheed Martin, Red Hat partnership - News

May 08, 2019
BOSTON. Lockheed Martin teamed up with Red Hat to to modernize the application development process to bring new capabilities to the U.S. Air Force?s fleet of F-22 Raptor fighter jets.
Cyber

Integrity of embedded systems - Blog

February 28, 2019

It is critical to be able to verify the integrity of systems used in military and other applications to ensure that they have not been modified or corrupted. It is of course best to prevent a system from being tampered with. If this can't be done, it is vital to detect tampering. In many cases it is better to prevent a system from operating at all if you can't be sure it hasn't been modified. In all cases it is vital to protect information on the system and especially critical secrets like crypto keys.

Cyber

IBM to acquire Red Hat for approximately $34 billion - News

October 29, 2018
ARMONK, N.Y. and RALEIGH, N.C. Red Hat and IBM officials entered into a definitive agreement, under which IBM will acquire all of the issued and outstanding common shares of Red Hat for $190.00 per share in cash, representing a total enterprise value of approximately $34 billion.
Cyber

Where did that software come from? - Story

October 09, 2017
Where did the software on your embedded system come from? Can you prove it? Can you safely update systems in the field? Cryptography provides the tools for verifying the integrity and provenance of software and data. There is a process as to how users can verify the source of software, if it was tampered with in transit, and if it was modified after installation.
Cyber

Using a hardware root of trust to decode software security - Blog

May 25, 2017
Quis custodiet ipsos custodes? ? ?who will guard the guardians?? ? is a question as old as the Roman Empire. This question, with its underlying bearing on trust in general, is still relevant today. And it is directly applicable to computer systems.