Military Embedded Systems

Op-Eds

Comms

Cloud, fog, mist, fluid, blockchain, and other things that irritate me - Blog

September 28, 2016
We are being inundated with new computing and networking models for all the wrong reasons -- from cloud computing to blockchain. This is a topic that distorts my normally congenial and pleasant demeanor, so let?s take a look at what is really going on and clear the air.
Comms

CBP increases import audits and enforcement actions - Blog

August 24, 2016
The summer heat has not been confined to the weather. U.S. Customs and Border Protection (CBP) officials are warming up the import world with more audits and enforcement actions. To accomplish this objective, CBP Regulatory Audit has started to deviate from its traditional audit program, the Focused Assessment, and intends to conduct more audit surveys and comprehensive audits in lieu of Focused Assessments.
Comms

ARPA, DARPA, and Jason - Blog

August 24, 2016
WARFARE EVOLUTION BLOG: After the success of the Manhattan Project, that ended World War II in the Pacific, the Pentagon significantly reduced expenditures on research and development of weapons as the world enjoyed peace. That was a mistake considering the actions taken by the Russians in the following decade.
Comms

In a nuclear war... - Blog

July 28, 2016
WARFARE EVOLUTION BLOG: In this space we have discussed different generations of warfare, potential warfare against countries such as Iran, Russia, China, and North Korea, as well as the war on terror, but there is one are we haven't touched on until now -- nuclear warfare.
Unmanned

Enabling live video feeds in UAVs - Blog

June 30, 2016
As the president of a technology company, I have seen my share of equipment innovations and trends, some which can be used across a wide spectrum of users. Drones ? to be more specific, unmanned aerial vehicles (UAVs) ? fit that description perfectly. Used broadly, the term can apply to toys that can be used to annoy the family cat in a YouTube video, or it can apply to military and industrial reconnaissance and situational awareness applications that are often matters of life and death. There are some obvious reliability and durability factors that must be in place for the latter.
Comms

War on terrorism - Blog

June 29, 2016
WARFARE EVOLUTION BLOG: Previously, we took a cursory look at the warfare capabilities of Russia, China, North Korea, and Iran in a potential war with the U.S. All these enemies would wage conventional third generation warfare (3GW) conflicts for the most part. Now, let?s take a look at the war against terrorism, or GWOT (Global War On Terrorism), a term first coined by President George W. Bush in 2001.
Cyber

Choosing an OS for military IoT systems - Blog

May 31, 2016
OPEN SOURCE WAY BLOG: The parameters for choosing an operating system (OS) for IoT deployments vary significantly from those for embedded systems of the past. These embedded systems served a specialized function, often having proprietary interfaces to other devices through custom hardware and software that included the operating system. In contrast, IoT systems are open by design, composed of standard building blocks, and connected to other devices using open interfaces. Obviously, not all IoT systems are built the same way, but the core technologies are similar.
Avionics

New technology helps multicore meet safety-critical standards - Blog

May 31, 2016
CODE QUALITY Blog: With industry's drive to reduce the size, weight, and power (SWaP) of embedded systems, multicore systems are becoming the go-to for military and aerospace fields.
Comms

War with Iran - Blog

May 28, 2016
WARFARE EVOLUTION BLOG: Previously, we looked at the military capabilities of our primary conventional enemies: Russia, China, and North Korea. Now, let?s take a look at our final conventional enemy, Iran. Iran stands accused of being the state sponsor of terrorism in the Middle East, through their support of terrorist groups in Iraq (Taliban), Afghanistan (al Qaeda), Yemen (Houthis), Lebanon (Hezbollah), and the Palestinians (Hamas).
Cyber

Avionics standards and cybersecurity highlighted Aviation Electronics Europe - Blog

April 27, 2016
As an Advisory Board Member for the Aviation Electronics Europe show it is always a fun time when the show finally arrives -- seeing the results of our committee's work and preparation. Pre-registration for the event was up this year and we put together an exciting program. The exhibit floor was also well represented by the avionics industry.
Comms

War with North Korea - Blog

April 27, 2016
WARFARE EVOLUTION BLOG: Previously we've looked at what wars with Russia and China might look like. Now, let?s look at a war with North Korea.
Comms

War with China - Blog

March 29, 2016
EVOLUTION OF WARFARE Blog. In the last installment, we looked at how we stood in a war with Russia. Now, let?s take a look at China, from publicly available information.
Avionics

Solving the safety certification challenge for multicore? - Blog

March 09, 2016
CODE QUALITY Blog: It?s no secret that multicore systems have continued to be an attractive option for the military and aerospace fields. With the drive toward reducing the size, weight, and power (SWaP) of embedded systems, the push to rely on multicore systems continues.
Comms

In a war with Russia - Blog

February 26, 2016
EVOLUTION OF WARFARE Blog. In my previous posts I've discussed the different generations of warfare and where the U.S. military falls today and how it clearly is still the most powerful military. That said Russia has been flexing its muscle in Eastern Europe the last couple years and I thought it would be good to do an analysis of their military capability and see which generation of warfare their capability falls under. We will start by looking at the basic stats.