Close Advertisement

On The Softer Side

Most Recent

Featured Article

Safety-Critical Software Standards

MILS: High-Assurance Security at Affordable Costs

Over the past five years market forces have coalesced to support a dramatically simpler foundational architecture, called “MILS,” for building high-assurance systems that must surviveRead More...

Past Articles

Article Image

Safety-Critical Software Standards

Ada 2005 Strengthens Ada's Safety-Critical Muscles

Certain kinds of applications leave no margin for error. Software that flies an aircraft or that controls a nuclear reactor must work correctly, or the results could be catastrophic;Read More...

Article Image

POS/NAV/GPS and Timing

Keeping Precision Time When GPS Signals Stop

The U.S. military requires accurate timekeeping to navigate, communicate and distribute information. All branches of the service operate systems that rely on precise timekeeping toRead More...

Article Image

User Interface in the Military

Net-Centric Trend Drives Need for Advanced Graphics Interfaces

The U.S. Military's efforts toward Network-centric Operations will drive more than just demand for the electronic systems that provide data communications. All the many end-nodes of aRead More...

Article Image

User Interface in the Military

Rugged GUI Design Faces Challenges

In military applications, graphic displays significantly enhance an application's ability to provide information. At the same time, Graphic User Interface (GUI) design createsRead More...

Article Image

User Interface in the Military

Standards, Tools Drive Next-Gen Military User Interface HMI Apps

Crafted from a foundation of high-performance graphics subsystems, tomorrow's Human-Machine Interface (HMI) displays will require a level of sophistication and capability quite unlikeRead More...

Article Image

Software Reuse and Application Portability

How to Achieve Application Software Portability

Software applications used in military embedded computing may need to be ported between several different types of platforms. These may include various SBCs, different CPUs andRead More...

Article Image

Software Reuse and Application Portability

Model-Driven Development for Component-Based Application Portability

Portability and reusability have been two main goals of software engineering since the 1960s. The idea of building software systems by reusing existing pieces of software code that areRead More...

Article Image

Software Reuse and Application Portability

Reusing Safety-Critical Software Components

Safety-critical software continues to make its way into military embedded application environments beyond avionics flight systems, such as weapons systems and communications equipment.Read More...

Article Image

Java in the Military

Java Suits Military's Net-Centric Plans

The Java language has become entrenched as the preferred language for new software development in today’s military programs. Among the key motivations for the military’s interest inRead More...

Article Image

Java in the Military

Scoped Memory Scheme Empowers Real-Time Java

Given that the defense community spends over a billion dollars annually on the development and maintenance of real-time software, there has been a strong desire to apply the benefitsRead More...

Article Image

RTOS Update

RTOS Vendors Balance Security and Openness

Today’s leading real-time operating system (RTOS) vendors are practically unrecognizable compared to the lean “garage shop” RTOS companies of a decade ago. Among the most conspicuousRead More...

Article Image

RTOS Update

Open Tools Offer New Choices for Developers

The complexity of device software is increasing rapidly across multiple industries, including aerospace and defense, consumer electronics, medical devices and telecommunications.Read More...

Article Image

Linux in the Military

Linux Breaks Down Barriers to Acceptance

Now that many within the defense community have warmed to the idea of using Linux, it’s important for them to understand the tradeoffs between the open source OS and traditional RTOSs.Read More...

Article Image

Linux in the Military

Openness of Linux Attracts Military Following

For more than a decade now, the military has recognized the many benefits of moving away from “stovepipe” single proprietary solutions to more open commercial-off-the-shelf (COTS)Read More...

Article Image

Linux in the Military

Hard Real-Time with Linux Poses a Challenge

For many applications, hard real-time capabilities are non-negotiable requirements. Fitting that category are sub-segments of military applications ranging from simulations toRead More...

Article Image

Modeling and Middleware

DDS Spec Outfits Publish-Subscribe Technology for the GIG

Easy access to information ranks as a central goal of the military’s networked future. The DoD’s vision, called the Global Information Grid (GIG), calls for connecting systems acrossRead More...

Article Image

Modeling and Middleware

Agile MDA Speeds Development of Complex Code: Part II

A model compiler takes a set of executable UML models and weaves them together according to a consistent set of rules. This task involves executing the mapping functions between theRead More...

Article Image

Modeling and Middleware

Code Generator Schemes Aid Safety-Critical Code Development

As the volume of software deployed into safety-critical systems continues to multiply, the need for controlling this development increases proportionally. To address this demand, theRead More...

1 | 2 | 3 | 4 Next >>