Blogs and Podcasts
The people, ideas, trends and topics at the intersection of high tech and defense

BLOG MENU
  • Blogs
  • Podcasts
  • Vodcasts
  • View All
That’s classified! The history and future of NSA Type 1 encryption

That’s classified! The history and future of NSA Type 1 encryption

The NSA Type 1 encryption program has a rich and complex history, shaped by evolving threats, technological advancements, and…

Shaza Khan

April 11, 2024

Read More
Bring on the edge

Blog

Bring on the edge

We’ve moved beyond the cloud – the demands for near real-time insights outpace its inherent speed challenges. But more…

Mercury Systems

March 28, 2024

Read More
Intercepted communications: Encryption standards for the defense edge

Blog

Intercepted communications: Encryption standards for the defense edge

Encryption is a critical component of data security, providing a reliable method for ensuring the security and…

Shaza Khan

March 18, 2024

Read More
Advancing the frontiers of space science: The James Webb Space Telescope and next-generation observatories

Blog

Advancing the frontiers of space science: The James Webb Space Telescope and next-generation observatories

Larger payloads in space directly translate to the ability to design and deploy telescopes with larger apertures and more…

Vincent Pribble

February 2, 2024

Read More
Blogs & Podcasts
Modular RF Architectures

Blog

Modular RF Architectures

Let’s start with the traditional approach. After spending the morning helping production with some tuning on an amplifier, you finally start reading through the 120-page RFP, SCD, and SOW for the new up-converter. At the end of the source control drawing there is an oddly shaped mechanical outline. The control signal is routed through a […]

Mario LaMarche

June 12, 2018

Read More
Hypervisor Part 2

Blog

Hypervisor Part 2

Welcome back! Today we will look at Full Virtualization, using either Software assisted full or Hardware assisted full. Full Virtualization: Virtual machine simulates hardware to allow an unmodified guest OS to be run in isolation. There are two types of Full virtualizations in the enterprise market. On both full virtualization types, the guest operating system’s source information […]

Kevin O’Malley

June 7, 2018

Read More
Military-Grade Secure Solid State Drives Part 2: Encryption Decoded

Blog

Military-Grade Secure Solid State Drives Part 2: Encryption Decoded

In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result is the same, the implementation of self-destruct in the real world can be a bit different than in Hollywood. In military-grade […]

Jennifer Keenan

June 4, 2018

Read More