CommercialMH370 Wreckage Remains a Mystery as Seabed Scouring Wraps Seabed searching company Ocean Infinity’s hunt for the husk of Malaysian Airlines Flight 370 is coming to an end, with the elusive aircraft still at large. Operating the Norwegian Seabed Constructor ship,…
ConnectivityAre You Ready for August 1, 2018? At publication, there are 20 months remaining until the FAA’s Jan. 1, 2020, ADS-B Out equipage deadline. But there’s another crucial date associated with ADS-B coming up this year. By Aug. 1,…
CommercialAvionics for 2020s eVTOL and Supersonic Aircraft According to AHS International, more than 50 companies around the world are in the process of researching and developing electric vertical takeoff and landing (eVTOL) aircraft. The majority of these concepts
Embedded AvionicsSmart Sensors Expand in Variety, Scope As the aviation industry drives toward predictive maintenance and operational and aftermarket efficiencies, intelligent sensors have expanded in variety and scope. Meanwhile the overall defense and aerospace
MilitaryEMARSS: The Hawker Beechcraft Turned Spy Plane Intelligence, surveillance and reconnaissance (ISR) aircraft, i.e. platforms, are sorted according to many metrics — intel-gathering sensors, form-factor, size, configuration, endurance (“loiter time”)
CommercialEtihad's International ADS-B Upgrade Strategy At the 2018 AMC/AEEC annual conference, an ADS-B symposium allowed Avionics to gain a first-person perspective on ADS-B mandate compliance upgrades from an Etihad Airways engineer that is on the ground dealing
MilitaryLockheed Taps BAE for F-35 Electronic Warfare Lockheed Martin has awarded BAE Systems a five-year deal to manage the AN/ASQ-239 electronic warfare (EW) system for the F-35 Lightning II Joint Strike Fighter. Under the contract, announced Tuesday, BAE will handle supply…
Business & GASatcom Direct Stresses Cybersecurity with Live Hacks at EBACE 2018 Satcom Direct is hosting ethical hackers performing live hacks at EBACE 2018. The white hat hackers from Shorebreak Security are demonstrating how identity theft, password cracking and system compromise occur to explain the potential…