Radar & Electronic Warfare
 
 
 
 
 
 
 
 
Best in Show
 
 
 
 
 
 
Article Image
 
S. TUCKER TAFT, ADACORE
 
The Common Weakness Enumeration (CWE), a category system for software weakness and vulnerability, is now in use to provide a common vocabulary for source-code analysis tools for those developing mission-critical embedded systems. Some distinct groupings of CWE items – such as those that are associated with general coding practices – are focused on security-specific parts of a software system, including authentication and encryption...
 
 
 
 
 
 
Article Image
 
PAUL DAVIS, CURTISS-WRIGHT CONTROLS DEFENSE SOLUTIONS
 
Type 1 products, certified by the National Security Agency (NSA) to cryptographically secure classified U.S. government information, use approved NSA algorithms. These controlled products are designed to NSA standards and certified by the NSA through a rigorous and often very lengthy evaluation process.
 
 
 
 
 
 
Article Image
 
LISA DAIGLE, ASSISTANT MANAGING EDITOR
 
ATLAS Space Operations has signed an agreement with the Department of Defense (DoD) Defense Innovation Unit (DIU) to develop its LINKS platform in a rapid-prototyping fashion that will deliver a complete satellite communications platform tailored to the U.S. Air Force’s Multi-Band Multi-Mission requirements, as outlined by the Space and Missile Systems Center’s Range and Network Systems Division.
 
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
U.S. Air Force (USAF) officials selected Northrop Grumman Corp. to deliver Cyber Enterprise Services (CES) on U.S. Cyber Command’s Unified Platform. Northrop Grumman is one of five companies each awarded $24 million over two years to perform the work.
 
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
Mobile hardware security solutions provider, Privoro, received a U.S. Air Force mobile security prototyping contract via the Air Force Research Lab (AFRL) and AFWERX effort to streamline the Small Business Innovation Research (SBIR) process.
 
 
 
 
 
 
 
 
Mercury Systems
 
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
Perspecta Inc.'s innovating applied research unit, Perspecta Labs, has received a $5.7 million contract modification for continued work on the Defense Advanced Research Projects Agency (DARPA) Edge-Directed Cyber Technologies for Reliable Mission Communication (EdgeCT) program.
 
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
U.S. Navy officials selected Charles River Analytics to build a cyber detection system to safeguard the Navy's mission-critical system under the Detecting Anomalies in Application Memory Space (DAAMS) effort. The contract -- with options exercised -- is worth approximately $1.5 million.
 
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
Military and commercial aviation communities are pushing for stricter certifications of unmanned aerial systems (UAS), known colloquially as drones, as the national airspace (NAS) becomes more congested. 
 
 
 
 
 
 
 
 
 
 
 
Sponsored by: ADLINK Technology, LCR Embedded Systems
VIEW NOW
 
 
 
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
Officials at Mercury Systems, Inc. announced the acquisitions of The Athena Group, Inc. (Athena) and Syntonic Microwave LLC (Syntonic) for an all-cash price valued at $46 million in total.
 
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
U.S. Air Force officials announced at that the Reliability and Maintainability Information System program office at Wright-Patterson Air Force Base, underwent an intentional hack by certified ethical hackers hired under a contract to conduct an analysis of what would happen if an insider “went rogue.”
 
 
 
 
 
 
Article Image
 
MARIANA IRIARTE, TECHNOLOGY EDITOR
 
Defense Advanced Research Projects Agency (DARPA) officials modified an existing contract with Perspecta Labs for Phase 2 of the agency's Secure Handhelds on Assured Resilient networks at the tactical Edge (SHARE) program.
 
 
 
 
 
 
Screenshot 2019-05-01 10.28.50.png
 
nVENT/Schroff
 
Military equipment - such as shipboard, surveillance, mobile artillery and control stations, combat aircraft and unmanned air vehicles—often consists of highly technological and sensitive electronics. It is likely that these electronics could be exposed to harsh environments, including extreme heat, dust, moisture, shock and vibration. 
 
 
 
 
 
 
 
 
MES
 
 
 
 
 
Facebook
 
Twitter
 
Linkedin