Systel launches the Raven-Strike™ high performance rugged computer (sponsored video)
At the AUSA 2018 exhibition in Washington DC in October, Systel will launch its latest product in the embedded computing field.
Raven-Strike™ is a fully rugged, high-performance computing solution, purpose-built for combat vehicles, which is packaged in a robust enclosure for minimal SWaP and maximum CPU and GPU core density.
To learn more on the development of next-generation mission computers for combat vehicles and Systel's solutions in this field, see the company at AUSA booth #9221.
More from Digital Battlespace
-
AUSA 2024: General Micro Systems adds four new products to the X9 Spider family
The airborne three-domain, the two ground-based and the ¼ ATR OpenVPX-based cross-domain systems were engineered to provide real-time security across multi-domain operations.
-
BAE Systems gets go-ahead for second phase of mission communications programme
DARPA’s Mission-Integrated Network Control (MINC) programme was set up to develop an autonomous tactical network and enable critical data flow in contested environments.
-
Just Released: Space Technology Report
Why space is an essential part of modern military capabilities
-
Work-from-home warfare: the power of mixed reality
Defence-secure mixed reality headsets can save hours, or even weeks, of travel time to fix defunct equipment or get subject experts effectively “on-site” where they are needed.
-
Northrop Grumman receives follow-on contract for CUAS and C-IED systems
The Joint Counter Radio-Controlled Improvised Explosive Device Electronic Warfare (JCREW) counter-improvised explosive device (C-IED) and Drone Restricted Access Using Known Electromagnetic Warfare (DRAKE) counter-UAS (CUAS) systems are mounted and dismounted RF jammers.
-
Adarga’s Vantage AI software selected for UK Strategic Command’s Defence Support
Adarga’s Vantage information analysis tool is in service with the UK MoD and individual UK forces. It builds on the company’s Knowledge Platform which processes, organises and analyses open source material, as well as information held by the user’s military, security and intelligence services.