Nov/Dec 2015

Fusing IT and Real-Time Tactical

Download Entire Nov/Dec 2015 Issue (PDF 10MB)

View Online Digital Flipbook Version (Requires Adobe Flash)

Table of Contents
(click below to download individual articles from the Nov/Dec 2015 issue)

From the Sponsor
by Al Kaniss
Download Article (PDF)

Cybersecurity and Modern Tactical Systems
by C. Warren Axelrod, Ph.D.
A look at mitigating cybersecurity risks when interconnecting legacy embedded systems with modern-day tablets or laptops.
Download Article (PDF)

Augmenting the Remotely Operated Automated Mortar System with Message Passing
by Zachary J. Ramirez, Raymond W. Blaine, and Suzanne J. Matthews
How the Message Passing Interface (MPI) can assist a prototype U.S. Army vehicle mounted mortar launcher system called the Automated Direct Indirect Mortar (ADIM).
Download Article (PDF)

Massive Storage in a Miniature (Embedded) Package
by Anthony Massa
Examining the fundamentals of an embedded data storage system, the thoughts behind the design decisions, and different features to incorporate in an embedded data storage system.
Download Article (PDF)

International Partners with Multi-Site Thin Client Interconnectivity
by Brendan Conboy
With thin client and VPN technology you can save on time and travel costs while being able to more tightly integrate software and system changes.
Download Article (PDF)

Threat Modeling for Aviation Computer Security
by Abraham O. Baquero, Andrew J. Kornecki, and Janusz Zalewski
Threat Modeling is a technique that assists software engineers to identify and document potential security threats associated with a software product.
Download Article (PDF)

Extending Life Cycle Models for a Repeatable Innovation Strategy
by Duffy Nobles and Kevin MacG. Adams, Ph.D.
A life cycle methodology with the necessary attributes can increase the probability for achieving a repeatable process for innovation.
Download Article (PDF)

Mobile and Embedded Security Mitigations for Counterfeit Threats and Software Vulnerabilities
by Jon Hagar
Mobile and embedded software teams, users and stakeholders have historically underestimated the risk of security threats.
Download Article (PDF)

by David A. Cook,
Download Article (PDF)