Armed forces operating in remote and austere battlefield environments must overcome a range of emerging threats and vulnerabilities that can result in disruptions to critical mission connectivity.
Joint All-Domain Command and Control (JADC2) aims to connect sensors from the Army, Air Force, and Navy into a single cloud-like network that will enable swifter, more informed decision making. Learn more in this blog.
The Modular Open Systems Approach (MOSA) directive has accelerated the adoption of a variety of MOSA supporting standards, including SOSA, CMOSS, FACE, VICTORY, and GVA, by the Army, Air Force, and Navy.
The concept of edge computing describes how data can be processed by distributed local computational resources that are physically close to the sensors collecting the data.
MOSA supporting standards dramatically improve the in-vehicle situation by reframing the boundary between the A-kit (the fairly permanent set of equipment on the vehicle) and B-kit (the more variable set of equipment installed based on the vehicle variant or specific mission).
Learn more about Vehicle Integration for C4ISR/EW Interoperability (VICTORY) and Generic Vehicle Architecture (GVA).
IQ-Core Network Communications Manager (NCM) Helps Overcome Critical Network Operational Requirements in Complex and Contested Environments
Whether employing fixed, deployed, or mobile communications infrastructures, end users can be faced with multiple vendor user interfaces that require extensive training requirements. Learn about reducing configuration errors, set up times, and downtime.
By integrating NVIDIA’s industrial Jetson technology into Curtiss-Wright’s hyper-rugged, scalable mission computers, today’s defense and aerospace system integrators are able to deploy Mil-grade, low-SWaP computing solutions at the edge of the battlefield.
According to the DoD, the use of MOSA solutions will "support a more rapid evolution of capabilities and technologies throughout the product life cycle." This blog discusses the benefits of MOSA.
Tactical networking programs face intense pressure to utilize COTS technologies, including technologies to secure communications over untrusted networks. Read this blog to learn more about solutions for PKI-enabled VPN.