Refine Your Search

Topic

Search Results

Article

Nvidia partners with AdaCore to secure self-driving firmware

2019-02-14
As mobility software becomes increasingly complex and connected, so does the risk of human error and system safety. To combat this, New York-based software company AdaCore will work with Nvidia Corporation of Santa Clara, California to apply open-source Ada and SPARK programming languages for select software security firmware elements in highly-complex, safety-critical systems like Nvidia’s DRIVE AGX automated and autonomous vehicle solutions.
Article

OneWeb ramps up satellite production with new round of funding

2019-03-21
OneWeb has secured $1.25 billion in its latest funding round. The company, which seeks to deploy a satellite communication network by 2021 that will enable global high-speed, low-latency Internet access, has now raised a total of $3.4 billion to fund its mission. Tokyo-based Softbank Group Corp., Mexico’s Grupos Salinas, San Deigo-based Qualcomm Technologies Inc., and the Government of Rwanda led the last round of funding.
Article

Abaco’s new avionics platforms transfer data up to 40Gbps with Thunderbolt 3 connectivity

2019-04-02
Abaco Systems Inc. is launching a new family of avionics devices for test and simulation, development, and dataloading that feature Thunderbolt 3 interfaces. The new portable, high-speed, low-latency avionics devices – RCEI-830A-TB and QPM-1553-TB – are designed for a broad range of avionics applications and include Thunderbolt 3-to-PMC/XMC interfacing with ARINC 429 and MIL-STD-1553 protocols.
Article

Sikorsky’s autonomous Black Hawk helicopter takes flight

2019-06-06
Sikorsky tested a new full-authority, fly-by-wire flight control technology kit for the first time on a Sikorsky UH-60 Black Hawk medium-lift utility helicopter. The flight marked the beginning of the flight test program for the soon-to-be optionally piloted rotorcraft.
Article

Addressing configuration controls in an era of multiple security frameworks

2019-07-04
 Sometimes mandatory, often voluntary, security frameworks are created to provide federal and commercial organizations with an effective roadmap for securing information technology (IT) systems. The goal is to reduce risk levels and prevent or mitigate cyberattacks. To accomplish this task, security frameworks typically provide a series of documented, agreed upon, and understood policies, procedures, and processes necessary to secure the confidentiality, integrity, and availability of information systems and data.
Article

FLYHT and Spectralux Avionics integrate systems to deliver FANS-over-Iridium satellite communications to airlines

2018-09-14
FLYHT Aerospace Solutions and Spectalux Avionics have teamed up to integrate FLYHT’s Automated Flight Information Reporting System (AFIRS) 228S component into Spectralux’s Envoy Future Air Navigation System (FANS) Data Link Unit (DLU). Together the systems offer a streamlined upgrade option for airlines to obtain a cost-effective, FANS-over-Iridium (FOI) solution – a requirement for flying over the world's oceanic regions.
Article

General Atomics moves towards global RPA flight certification for MQ-9B SkyGuardian

2019-04-10
A General Atomics Aeronautical System, Inc. (GA-ASI) MQ-9B SkyGuardian remotely piloted aircraft (RPA) was controlled – from takeoff to landing – by an operator using a GA-ASI certifiable ground control station (CGCS), marking the first time a CGCS was used to control an end-to-end flight and the first step in type-certifying the unit.
Article

Software needs security, and security needs software: a scientific overview

2019-04-22
Software needs security. That's a consequence of using software to control critical systems. It's difficult because software is inherently a complex artifact, even when the code just consists of a single sequential program in a single programming language, with well-defined inputs and outputs. Of course, actual software rarely if ever has such a simple structure. Security needs software. That's a consequence of the complexity just mentioned. No process can ensure security at scale unless it is automated by using software itself: programming languages, verification tools, software platforms.
X