AUGUST 2020Secure components for legacy softwareU.S.military researchers are looking for ways to protect legacy software against cyber attacks.PAGE 4Sensor and signal processingHigh-performance embedded computing,open-systems standards,FPGAs,and artificial intelligence are leading the way.PAGE RELEVANT.TRUSTED.ENABLING TECHNOLOGIES.ARTIFICIAL INTELLIGENCE&QUANTUM COMPUTINGNew technology generations promise advances in machine automation and computer security.PAGE 102008MAEc1-c2.indd 17/30/20 5:27 PM