SAE International is inviting global participation in its AeroTech® aerospace and defense technology conference and exhibition, which is for the first time co-located with ASM International’s AeroMat, at the Pasadena Convention Center in Pasadena, California, March 15 through 17, 2022.
The Commonwealth Center for Advanced Manufacturing (CCAM), a non-profit consortium based in Prince George County, Virginia, uses a 3D visualization lab to expand beyond the walls of its 62,000-square-foot brick and mortar facility and deliver a collaborative development for researchers in industry, academia, and government.
Lockheed Martin Corporation cyber security experts have released a new Cyber Resiliency Level (CRL) model. CRL a risk-based, mission-focused and cost-conscious framework that provides a structured set of methodologies and processes to help measure risk across six categories.
Austrian telematics company, Dolphin Technologies GmbH, has created a new cryptocurrency that could lead to less mobile phone-related traffic accidents. The company’s Mobilio app rewards drivers with points when they ignore their mobile phones while driving.
ArmorFlash provides non-volatile memory (NVM) storage of encrypted and integrity-protected assets for for artificial intelligence (AI)-based Level 2+ advanced driver assistance systems (ADAS) through Level 5 autonomous driving solutions.
The Mobility Open Blockchain Initiative – a global nonprofit working to create standards in blockchain, distributed ledgers, and related technologies for consumers, smart cities, and mobility – has launched the industry's first vehicle identification (VID) standard incorporating blockchain technology into a digital vehicle identification system.
Sometimes mandatory, often voluntary, security frameworks are created to provide federal and commercial organizations with an effective roadmap for securing information technology (IT) systems. The goal is to reduce risk levels and prevent or mitigate cyberattacks. To accomplish this task, security frameworks typically provide a series of documented, agreed upon, and understood policies, procedures, and processes necessary to secure the confidentiality, integrity, and availability of information systems and data.
Argus, a global leader in automotive cybersecurity, has upgraded its stand-alone Fleet Protection backend platform and is now providing continuous live monitoring of both automotive and commercial aircraft fleets.
Airbus intends to closely cooperate with start-ups in order to unlock new technologies in artificial intelligence, data analytics, and cyber security for France and Germany’s Future Combat Air System (FCAS) program.
SAE International’s two-day course, DO-326A and ED-202A: An Introduction to the New and Mandatory Aviation Cyber-Security Essentials, introduces attendees to industry best practices for real-world aviation cybersecurity risk assessment, development, assurance. ...SAE International’s two-day course, DO-326A and ED-202A: An Introduction to the New and Mandatory Aviation Cyber-Security Essentials, introduces attendees to industry best practices for real-world aviation cybersecurity risk assessment, development, assurance.
Almost exactly seven months after Unites Technologies Corporation (UTC) completed its acquisition of Rockwell Collins (now Collins Aerospace), the aerospace conglomerate announced its merger with the Raytheon Company.
Through this work, Wind River and Airbiquity look to enable secure and intelligent software updates and data management for these vehicles through over-the-air (OTA) programming technology. The work may also lead to similar solutions for traditional aerospace and unmanned aircraft system (UAS) industries.
Agencies involved in the operation obtained a special exemption from the Federal Aviation Administration’s national security flight restrictions over the airspace above the event, for purposes of keeping the crowds, drivers, and race personnel safe.
The researchers at the COE for Assured Autonomy in Contested Environments – all of which histories of innovation for Department of Defense problems of interest – will focus on the availability, integrity, and effective use of information by leveraging its diverse expertise in dynamics, mathematics, control theory, information theory, communications, and computer science.