×

Please register to view this content

First Name
Last Name
Company
Job Title
Country
State
Opt me in to receive communications from Mercury Systems
Thank you
Error - something went wrong!

Data Security for Enabling Trusted Networks Systems for CJADC2

September 19, 2024

Future CJADC2 architectures and systems will need a strong and robust approach to security. Enabling trusted computing and data integrity will be critical for every software or hardware component in these networks and their underlying sensor systems to encrypt, process, and disseminate information. In this session, Taymor Kamrany demystifies CJADC2, discusses security protocols, and the importance of secure processing, cross-domain solution, encryption, and anti-tamper technologies.

WHO WE ARE

FOLLOW US ON SOCIAL MEDIA

Previous Video
Technology advancements in data storage and system interfaces for high-speed data recording
Technology advancements in data storage and system interfaces for high-speed data recording

This Mercury Systems and Microwaves & RF webinar discusses the evolution of SATA and transition to NVME, il...

Next Video
Bringing MOSA to C5ISR SOSA-aligned direct RF technology, RFS1140 Direct RF Chiplet
Bringing MOSA to C5ISR SOSA-aligned direct RF technology, RFS1140 Direct RF Chiplet

Rodger Hosking talks about SOSA standards, technology requirements, Direct RF architectures, AMD ACAP techn...