MAE Trusted Computing - Feb 2nd, 2023
 
 
MAE Trusted Computing | View online
 
February 2, 2023
THE BIG STORY
Cyber security enters the realm of zero trust, as military forces seek to safeguard sensitive military technologies from enemy cyber hackers and spoofers.
TRUSTED TECH TRENDS
QuICC seeks to improve computing performance by two orders of magnitude using quantum computing techniques called quantum-inspired solver systems.
Howard will lead a consortium of historically black colleges with engineering and technology research for military tactical autonomy applications.
The SOSA standard doesn't aim at creating new design guidelines, but instead seeks to incorporate as many existing industry standards as possible.
ANGSTRM seeks to develop rad-hard non-volatile memory that combines packaging and radiation-hardening with state-of-the-art commercial technology.
TRUSTED BUSINESS
The Next Generation Hub uses USB 2.0 for data communication among devices, and distributes power from two power input ports to provide network power.
Apogee will provide program management, configuration management, technical standardization, mission engineering analysis, and architecture support.
EUDM employs a secure real-time operating system (RTOS) rated at Evaluation Assurance Level 6+ from Green Hills INTEGRITY Global Security (IGS)
Project seeks to prevent reverse-engineering that may compromise critical program information leading to technology transfer, or system alteration.
ADDITIONAL RESOURCES
Mercury will provide 35 data transfer units, 15 secret encryption module cables, 157 high-definition video recorders, and 72 data transfer devices.
University of Rochester experts will develop quantum-inspired solver systems that solve realistic problems for military missions.
The Air Force is considering the Anti-Tamper Executive Agent Program Office Multiple Award Indefinite Delivery/Indefinite Quantity Contract (MAC ID/IQ).
Designers of rugged embedded computing systems, laptop computers, and tablet computers balance the need to operate in harsh conditions, as well as meet growing requirements for open-systems standards.