Category Archive: Uncategorized

Embedded Computing Systems in the Simulated Training Environment

A highly engineered, embedded computing system is critical to powering the simulated training industry. Compute systems and the integration teams require the necessary understanding of the product dynamics, modeling, image generation,content, and the hardware driving the simulator.

These advanced simulation systems power 3D content to produce a synthetic environment to realistically represent the types of challenges faced by a user. The use of embedded computing in simulation enables product engineers to carry out extensive training exercises without losing time and resources to preparation and execution failures. Consider the risks for sending a young pilot on a training exercise in real aircraft. The risks are obvious for life safety and costs.

Considerations for Military Training and Simulation Systems

Earlier simulation systems used for military training relied on inefficient coding that made them expensive and inflexible. Technological advances such as embedded computing systems and distributed compute models have greatly streamlined simulated training software, allowing easier incorporation into existing training and testing programs.

Recent developments in simulated training systems have benefited the following areas:

  • Storage
  • Compute processing
  • Display
  • Network architecture
  • Image rendering
  • Virtualization

New training systems incorporate centralized distributed storage systems, enabling simulations to meet key requirements for virtual training, including information integration, interoperability,and composability. Distributed storage enhances computing speed and scalability in training by gathering all essential information in one place, enabling awide range of scenarios to operate within the same framework.

Simulated training environments have improved processes surrounding compute and image rendering as well. These improved approaches appoint different subsystems to render images and deliver content. This distributed approach allows better display management and improved selection of types of images to be rendered, ensuring faster training speeds.

When coupled with embedded computers, distributed systems enable a point-of-need approach that incorporate real-world devices such as tools and weapons to provide more realistic simulated scenarios. These high-fidelity synthetic environments work with a fully networked architecture, enabling higher processing speeds, greater precision, and a higher form of realism for the user.

Distributed and embedded simulation systems will improve flexibility and introduce centralized databases to your training network, reducing operational costs without compromising the quality of instruction.

Superior Simulation and Training

Before the introduction of simulation systems, engineers resorted to live field training with expensive weapons or aircrafts, risking the loss of valuable personnel and equipment to real-world accidents. Embedded computing in simulation greatly reduces the risk of injury and loss of  resources by providing high-quality theoretical models to iron out the kinks in new projects before testing them in the real world.

Increasingly, military,transportation, and aerospace engineers use custom dedicated computing software,hardware, and graphic processing units (GPUs) to produce high-fidelity and realistic simulation scenarios for flight training and the military.

Currently, a wide range of state-of-the-art simulators based on embedded computing offer crucial preliminary training and testing for a broad range of military and flight applications. These systems are allowing more individuals and equipment to meet rigorous quality standards while maintaining facility safety.

Understanding the key features

Simulated training based on embedded computing systems provide the following features:

  • Compelling representation of temporal, spatial, seasonal, geographic, and specular features in high-resolution simulated environments
  • Preloaded training data for numerous synthetic environments allows users to add geo-specific content to create realistic simulations across a variety of fully fleshed out templates
  • Real-time combination and alteration of geo-specific information such as land data andelevation with geo-typical data dynamically assembles simulations for globaltraining experiences
  • 3Dcontent libraries and databases offering thousands of themes and scenarios to help users train and learn better

Learn more about the unparalleled simulation technology

The world’s most innovative training and simulation products are powered by highly engineered embedded computing systems.. These systems enable users to create realistic simulations based on synthetic environments without having to change underlying infrastructure or worry about hardware limitations. The flexibility, adaptability, and mobility of embedded computing–based simulations render thema viable alternative for equipment testing and personnel training in the military and aviation industries.

To learn more about embedded computing systems, contact Dedicated Computing.

Deep Learning: Creating Impact in Training and Simulation

Is the Modeling, Simulation, and Training (MS&T) market ready for machine learning? Our latest white paper covers five key considerations for MS&T OEMs as they explore emerging technologies such as deep learning and artificial intelligence.

  1. Understanding the Technologies
  2. Comparing GPU vs CPU Performance
  3. Embracing the Deep Learning Advantage
  4. Breaking Barriers in Training and Simulation
  5. Tapping into Competitive Value

Currently, training and simulation OEMs focus on getting the most from modern GPU architectures, tapping into steady advances to open up new possibilities for both quality and performance. This cycle has been routinely proven by the remarkable application accomplishments of the last few decades. Now an entirely new set of cognitive technologies is poised to further reshape the industry, including tools such as machine learning and artificial intelligence (AI).

Click HERE to download the full white paper.

If you’re interested in other Dedicated Computing related content, be sure to check out our other blog posts (HERE) or other white papers in our library (HERE).

The Dedicated Difference in 4:40 — Watch the Video

Dedicated Computing recently released a new video taking virtual visitors behind the scenes of their 130,000 sq. ft. Milwaukee-based facility. The 4-minute video provides a view into the company’s design and engineering facility, their performance analysis lab, and manufacturing facility.

For more videos from Dedicated, please visit our youtube page.

Medical Device Vulnerabilities and Tomorrow’s Security Threats

In an era where unprecedented data breaches are affecting corporate and government entities, the devices used in hospitals and other medical settings represent an often overlooked, yet vital source of vulnerability. For years, security researchers have cautioned the healthcare industry about their exposed medical devices.

Too often these devices are internet-capable or networked internally without encryption technology, cloud computing safeguards, or even password protection. This makes them an easy target for hackers who have the ability to steal data, disable medical devices responsible for providing life-saving care, or launch a widespread cyber attack that can affect every device on a particular network.

The Food and Drug Administration issued new guidelines in 2014 covering medical devices in the market. These guidelines stated that all such devices should be secure, be able to easily update to correct any flaws, and have safeguards in place to protect care in the event the device is hacked or otherwise compromised. The guidelines also mandated that, ideally, medical devices should include the ability to be updated and be accompanied by a list of software components that would allow hospitals to check the device for any vulnerabilities.

A Constant Threat

Infusion pumps make up almost half of all medical devices, according to the Zingbox 2018 Threat Report, making them the largest potential source of attack for cyber-related threats. Currently the industry standard is to segment these types of devices, which limits any potential cyber intrusions to an individual device. Yet, this practice also makes it more difficult to provide widespread automatic security updates to such devices.

The individual operators and medical personnel themselves leave another unyielding source of vulnerability. The above study discovered that the most common security risks originated from user practice issues, which included using web browsers on medical workstations for personal online browsing, chatting, and downloading content.

The Way Forward

The FDA offers a series of recommendations to prevent and otherwise fortify medical devices against the life threatening and/or privacy violating compromises that can result from a targeted attack. These include preemptive mitigation of cybersecurity risks early before they can be taken advantage of by hackers, as well as adopting a coordinated vulnerability disclosure policy and practice. They also encourage healthcare providers to put policies and procedures in place that will enable them to understand and evaluate risks, and discover any vulnerabilities in equipment or software.

According to the guidelines, healthcare providers must also have a plan in place to not only mitigate threats, but to respond and recover quickly and efficiently to limit patient risk. IT personnel in healthcare must be empowered to locate and neutralize cybersecurity threats, which means they must have established procedures in place for discovery and elimination of vulnerabilities.

Finally, it is always incumbent upon those managing healthcare IT systems to apply the five core principles put forth in the 2014 NIST voluntary Framework for Improving Critical Infrastructure Cybersecurity:

  1. Identify
  2. Protect
  3. Detect
  4. Respond
  5. Recover

Cybersecurity for IoT and Beyond

The burden on the industry to protect medical devices is great. Those who produce and utilize medical devices need IoT development partners who will work with them through the life of their devices, rather than supplying a basic framework before abandoning them to configure and manage the updates and security threats or breaches that occur on their own.

Contact Dedicated Computing today to learn more about the cloud computing solutions that will keep your systems current and free of vulnerabilities to threats.

How The Military Is Leveraging Game-Like Scenarios

The military has long used simulations to test and refine theories of warfare in an environment that replicates battlefield conditions without causing injury or necessitating the loss of human life. Under ideal conditions these simulations are rendered as realistically as possible in order to provide measurable and repeatable results.

Traditionally, there are two types of military simulations. Heuristic simulations are conducted for research and problem-solving purposes, and are not necessarily designed to provide empirical solutions. Meanwhile, stochastic simulations incorporate the element of random chance events to provide variability within the scenarios.

Today the military has found a new model for their combat and myriad other virtual testing scenarios. This new model draws from a popular consumer source of inspiration long thought to be for recreational use only. That wellspring is video games.

Turning Gamers Into Soldiers (and Vice Versa)

Video games have come a long way, particularly in terms of military use. When the Patriot missile system was introduced in 1981, most video games were played in arcades or on the first wave of home consoles such as the Atari 2600. Almost 40 years later, that same Patriot system, now a relic of the Cold War, is still in operation and a video game has been developed around it to train U.S. service members on the weapon’s use in a virtual environment.

According to major defense contractor Raytheon, soldiers move their virtual avatars through a simulated landscape and “manipulate digital versions of real-life equipment” for training purposes. Raytheon, which builds surface-to-air missile systems, contends that it makes perfect sense to develop game-based simulations and technology for the current generation of military recruits who grew up with video game controllers in their hands.

The Virtual Path Forward

The modern military is finding a wide range of uses for their game-inspired digital modeling and simulations. Defense planning, training and exercises, and operational planning are three major areas that heavily utilize these next-generation virtual environments. The military is also actively employing virtual reality packages to create safe, realistic, and interactive simulations for tactical training and mission rehearsals. Simulations continue to offer the benefit of conserving time, money, and – most importantly – human life.

These new virtual scenarios offer the further advantage of more scientific biometrics around equipment training that will enable head-mounted systems with the same level of efficiency as end users get from traditional live or simulated training.

Though the technology is here, challenges remain. Limited bandwidth, narrow fields of vision, and inefficient resolutions are all obstacles to maximizing the value and capabilities of these new virtual tools. Complex computing solutions will be essential to smooth the path forward.

The Ultimate Advantage

The many advantages of these game-based virtual scenarios are undeniable. They offer unmatched flexibility and scalability and are wholly adaptable to the size of the training audience. By utilizing internet, cloud-based technology, and on-premise hybrid-cloud models, these applications are accessible from anywhere in the world, making them ideal for field training.

Contact Dedicated Computing today to discover more about the powerful computing solutions behind the military’s game-based virtual simulations.

DC to Host Series of Power Sessions at I/ITSEC

Dedicated Computing will once again host a series of 20-minute Power Sessions on Tuesday and Wednesday (11/27 and 11/28) during I/ITSEC 2018, the world’s largest modeling, simulation, and training conference.

Dedicated will be showcasing solutions that meet the needs of OEMs providing the best training equipment and simulation technologies for armed forces, skilled operators, and healthcare providers.

Power Sessions include:

Cybernet Security Solutions: 

Authority-to-Operate – Navigating DoD Cybersecurity Compliance: Hear from Cybernet Systems as they discuss the methods for baking-in Cybersecurity compliance, taking your system from the design phase to Authority-to-Operate designation.


Two ground-breaking sessions from NVIDIA: “Training’ for Simulation. AI applications for MS&T” and “Ray Tracing: How to Prepare for this Game Changing Technology.”  To get a short preview of the NIVIDA/DC Ray Tracing power session, please Click Here to listen to the latest webcast.

Join DC and NVIDIA to discuss how these emerging technologies will dramatically accelerate design and simulation/training workflows.

Intel Corporation:

“VR as a Fatality Prevention Training Tool” — Hear how Intel Corp. piloted a VR fatality prevention program enabling 11,000 trainees in 11 sites all over the world.


For the full power session schedule, Click Here