Requirements for trusted computing are focus of Webcast at 2 p.m. eastern time on Monday 4 Dec. 2017

NASHUA, N.H. – If you're concerned about meeting guidelines for trusted computing systems in aerospace and defense applications, then you'll want to tune-in a Webcast called Trusted computing hardware: what you need to know, which will air at 2 p.m. eastern time on Monday 4 Dec. 2017.

By Mil & Aero staff
By Mil & Aero staff

NASHUA, N.H. – If you're concerned about meeting guidelines for trusted computing systems in aerospace and defense applications, then you'll want to tune-in a Webcast called Trusted computing hardware: what you need to know, which will air at 2 p.m. eastern time on Monday 4 Dec. 2017.

Presenters Curtiss-Wright Defense Solutions and Mercury Systems will outline some of the most important aspects of the trusted computing market today, some of the most influential applications, and the applications niches these companies serve in trusted computing.

This Webcast is the first in a series of Military & Aerospace Electronics events to advance the industry's understanding of trusted computing, its most important aspects, how to comply with current and future requirements, the industry's applicable trusted computing standards.

This Webcast will focus on hardware aspects of trusted computing, while future Webcasts will focus on software issues of trusted computing, and on separate Trusted Computing topics like precision timing, cyber security, safety-critical computing, cyber defenses, anti-tamper, precision networking, encryption, any other kind of hardware and software architecture, design, tool, algorithm, or anything else that will ensure the validity of computing results.

Related: Trusted computing: it's not just cyber security anymore

This on-line event will seek to answer questions like what is trusted computing for aerospace and defense applications; what are the requirements for trusted computing in aerospace and defense applications today, and how would you expect that to evolve in the future; what do defense contractors and subcontractors have to know about trusted computing today to participate effectively defense programs; what are the primary pieces of trusted computing for aerospace and defense applications; and niches do different companies serve in trusted computing technologies.

Presenters are notable trusted computing experts Richard Jaenicke, director of strategic marketing and alliances at Mercury Systems; and Paul Hart, chief technology officer at the Curtiss-Wright Corp. Defense Solutions Division.

Join the discussion by attending the Webcast Trusted computing hardware: what you need to know, which will air at 2 p.m. eastern time on Monday 4 Dec. 2017. Register for the free event online at www.militaryaerospace.com/webcasts/2017/12/trusted-computing-hardware-what-you-need-to-know.html.

Ready to make a purchase? Search the Military & Aerospace Electronics Buyer's Guide for companies, new products, press releases, and videos

More in Computers