Navy combat, C4ISR [command, control, communications, computers, intelligence, surveillance, and reconnaissance], and machinery control systems are characterized by a wide range of programs, all of which have their own system architecture, configuration, and composition, mostly program-specific and irrespective of adjacent systems. This disconnected environment creates roadblocks to cost-effective technology refresh and generates institutional inefficiencies, resulting in increased program expense in the long term and less effective warfighting capabilities overall. However, open computing strategies – such as those initiated by social media giants Facebook and LinkedIn – as well as manufacturing practices common in the auto and freight transport industry can be leveraged by the Navy embedded computing industry to solve the interoperability and long-term cost challenges created by these disparate systems.
- Dev Tools & OS
- Machine Learning
- Reference Designs
- System Block Diagrams
- Dev Kit Selector
- White Papers
- Webcasts & Events
- Product Search
- Embedded World
Home » White Papers PDFs » Managing Life Cycle and Network Interoperability Challenges on Navy Platforms
Previous White Paper
The Impacts of File System Fragmentation on Automotive Storage Performance
Could fragmentation be your storage performance bottleneck? Check out Tuxera's latest #whitepaper, discussi...
Most Recent Flipbooks
Bare-Metal High Performance Computing in the Cloud
This whitepaper introduces different types of cloud computing, presents benefits and disadvantages and shows how “bare metal cloud” mitigates the disadvantages, and describes SkyScale’s Accelerated...
Accelerated Genomic Analysis – Applying Massive Parallel Computing to Genomics Secondary Analysis
This whitepaper presents results from a new method developed by Parabricks run on a SkyScale Accelerated Cloud system with up to 16 NVIDIA Tesla V100 GPUs that greatly reduces that time...
Use Intel® SSF to Remove Bottlenecks to AI
Machine learning and AI push the limits of processing, data transport, and storage. To achieve performance and scalability while containing cost, desi...
"Zero Touch" IoT Security Is Key to Continued Growth
By now it’s clear that the IoT will miss the much-touted target of 50B connected devices by 2020. The problem? IT managers are so worried about secu...
IoT Security (Finally) Delivers ROI
To protect sensitive device data and networks as a whole, developers should consider both hardware and software. Hardware security modules can enable...
Connected Railways Bring New Efficiencies and Amenities
A secure, unified communications system boosts railway efficiency, lowers costs, and improves the passenger experience. Collecting data leads to new i...
Securing the IIoT with Flexible Firewalls
Traditional IT firewalls don’t translate well to the factory floor, necessitating a new class of industrial firewall appliances. Industrial firewall...
Building a Smart City? Start with Smart Streetlights
Smart streetlights are an efficient and easy way to modernize your city while also providing a return on investment.
Machine Vision Makes Industrial Robots See and Improve
How emerging technologies like CV and real-time 3D video capture can help improve productivity and efficiency in robotics applications
A 4-Step Guide to Security Assurance for IoT Devices copy
Teams need to rethink how they deliver software quickly – with security, safety, and quality in mind from design to deployment. But “rethinking” should not be “restarting.”
Finding Concurrency Errors with GrammaTech Static Analysis
Multithreading adds entirely new classes of potential bugs to those that must be considered by developers.
Making Safety-Critical Software Development Affordable with Static Analysis
Safety-critical software is becoming exceedingly expensive to develop and manufacturers are looking for solutions that increase developer productivity. Static analysis tools are indispensable for safe
Protecting Against Tainted Data in Embedded Apps with Static Analysis
This paper describes a static analysis technique – taint analysis – that can be used to find how potentially hazardous inputs can flow through a program to reach sensitive parts of code, empowering...
Containerized Linux: The Secret to IoT Security
A desire in the development community to use Linux is often at odds with the security requirements of an organization, leaving a gap between a company’s goals and the skill sets of its engineers.
Designing a system-on-chip (SoC) with an Arm Cortex-M processor
Are you integrating an Arm Cortex-M processor for the very first time? This comprehensive whitepaper will take you through the process of including a Cortex-M processor into your SoC design
RFSoC for Radar and Electronic Warfare
Radar and electronic warfare systems of the future...
Critical Techniques for High-Speed A/D Converters in Real-Time Systems
An A/D (Analog-to-Digital) converter, frequently abbreviated as ADC, accepts an analog voltage at the input and produces a digital representation of that voltage at the output that’s called a “sample”
Strategies for Deploying Xilinx's Zynq UltraScale+ RFSoC
On February 21st, 2017, Xilinx® announced the introduction of a new technology called RFSoC with the rather dramatic headline “Xilinx Unveils Disruptive Integration and Architectural Breakthrough for
Putting VPX and Open VPX to Work
OpenVPX presents a formal, well-organized system for defining all components in VPX systems. Many of the figures and the profiles in this handbook were derived from the full OpenVPX specification.
Accelerating the Product Development Lifecycle with Faster Test: Navigating the V Diagram