Subscribe
Magazine
Videos
White Papers
Webinars
Buyer's Guide
EDGE Awards
Innovators Awards
Computers
Trusted Computing
Uncrewed
Sensors
RF/Analog
Power
Communications
Test
Commercial Aerospace
Home
Trusted Computing
ID 93944491 © Wave Break Media Ltd | Dreamstime.com
Trusted Computing
Leidos joins DARPA INGOTS project to use artificial intelligence (AI) to fix cyber security vulnerabilities
John Keller
Feb. 20, 2025
INGOTS aims to harden systems against exploit chains by identifying and fixing these vulnerabilities before attackers can capitalize on them.
Computers
Rugged computers struggle with environmental requirements
John Keller
Feb. 19, 2025
ID 38813251 © Steve Allen | Dreamstime.com
Sensors
Military researchers approach industry for bonding single-crystal thin films for sensing and communications
John Keller
Feb. 19, 2025
Computers
Making sense out of chaotic skies
Jamie Whitney
Feb. 18, 2025
ID 355509524 © MikkiOrso | Dreamstime.com
Communications
Network security, secure information, and trusted computing are aims of Air Force Networking The Fight job
John Keller
Feb. 18, 2025
ID 341826102 © Ahmadrizal7373 | Dreamstime.com
Computers
Researchers approach industry for commercial software dashboard to link legacy databases for decision-making
John Keller
Feb. 18, 2025
Trusted Computing
ID 360338795 © Dragoscondrea | Dreamstime.com
Computers
Air Force approaches industry for automated data analysis of vast amounts of heterogeneous information
John Keller
Feb. 17, 2025
RF/Analog
Hard cases with EMI shielding for electronics in-transit offered by Gemstar and V Technical Textiles
Gemstar Custom Hard Cases
Feb. 14, 2025
ID 341607318 © Aleksandr Zamuruev | Dreamstime.com
Computers
Researchers eye quantum, photonic, and bio/organic integrated circuits for next-gen transistor technology
John Keller
Feb. 13, 2025
ID 51714183 © Denisismagilov | Dreamstime.com
Computers
Researchers consider expMath to use artificial intelligence (AI) for fundamentally reshaping mathematics
John Keller
Feb. 13, 2025
Computers
STMicro offers microcontrollers and Rust programming language compilers for safety-critical applications
STMicroelectronics Inc
Feb. 13, 2025
ID 354603274 | Ai © Dzmitry Auramchik | Dreamstime.com
Trusted Computing
Industry briefings set for military research program into cyber security for artificial intelligence (AI)
John Keller
Feb. 12, 2025
ID 352224078 © Pressmaster | Dreamstime.com
Trusted Computing
Military researchers eye project to assess vulnerabilities of artificial intelligence (AI) to cyber attack
John Keller
Feb. 11, 2025
ID 357048490 © Andrey Popov | Dreamstime.com
Trusted Computing
Four companies tapped to use artificial intelligence (AI) to find and fix cyber security vulnerabilities
John Keller
Feb. 11, 2025
INGOTS aims to harden systems against exploit chains by identifying and fixing these vulnerabilities before attackers can capitalize on them.
ID 93297972 © Leowolfert | Dreamstime.com
Computers
Military researchers ask industry's advice on trusted computing approaches to ensure predictable behavior
John Keller
Feb. 4, 2025
DARPA request for information asks for feedback on the emerging Formal Methods to Deliver Resilient Systems (FMDRS) -- also called the FMDRS Guide.
Computers
High-speed Ethernet data recorder for use in demanding flight test programs introduced by Curtiss-Wright
Curtiss-Wright Defense Solutions
Jan. 31, 2025
The HSDR-2512 recorder supports full line-rate data capture on its 12 10 Gigabit Ethernet inputs to deliver 16.5 gigabytes per second write speed.
Computers
Trusted computing encryption and cyber security for Linux embedded computing software introduced by SYSGO
SYSGO
Jan. 29, 2025
The decryption keys are stored and retrieved securely from the TPM during system boot. TPM also includes tools to manage board-specific devices.
ID 13103361 © Natalia Siverina | Dreamstime.com
Trusted Computing
Military researchers eye future project for on-system cyber security in bus-based embedded computing
John Keller
Jan. 28, 2025
Red-C envisions a distributed approach to on-system detection and repair of cyber attacks, implemented on bus-based hardware via firmware updates.
Load More Content