Military Embedded Systems

Company Directory

Red Hat

Articles related to Red Hat
Cyber

Embedded systems, meet the Internet of Things - Blog

August 20, 2015
OPEN SOURCE WAY BLOG: In many ways, embedded systems are the progenitor of the Internet of Things (IoT) – and now IoT is changing key aspects of how we design and build military embedded systems. In fact, the new model for embedded systems within IoT might best be described as design, build, maintain, update, extend, and evolve.
Comms

The fascinating world of containers - and why the military should care - Blog

May 14, 2015
OPEN SOURCE WAY BLOG: Quarterly posts about using open source technologies as a part of your embedded systems solutions to speed up your development efforts, reduce project costs, and create collaborative environments for innovation.
Cyber

Open Source: More eyes, fewer vulnerabilities, greater security - Blog

February 27, 2015
The Open Source Way Blog: Welcome to the first in a series of quarterly posts about using open source technologies as a part of your embedded systems solutions to speed up your development efforts, reduce project costs, and create collaborative environments for innovation.
Cyber

Deploy warfighter applications faster with open source Platform-as-a-Service - Story

May 02, 2013
Up-and-coming Web startups are leapfrogging each other to market using Internet-hosted Platform-as-a-Service (PaaS) technologies. PaaS allows these startups to innovate rapidly by focusing more time on their mission and less time managing hardware and software. Can the warfighter benefit from PaaS too? Yes, if the warfighter controls the PaaS stack - and open source delivers that control.
Comms

Raytheon releases software data transfer solution for cross-domain mobile and tactical information sharing - News

November 08, 2012
WASHINGTON – Raytheon has released the software-based Small Format Guard (SFG), a cross-domain data transfer solution for SWaP-C-minded mobile tactical forces. The adaptable, multi-level data transfer solution is operable on AdvancedTCA (ATCA) processor boards, Single Board Computers (SBCs), or other rugged 64-bit x86 architectures, and supports a variety of security protocols for mission-specific requirements.
Cyber

Secure virtualization for tactical environments - Story

April 19, 2012
Virtualization has proven its value in the data center, but can it work in tactical environments? Yes, but only if it?s secure.