The NSA Type 1 encryption program has a rich and complex history, shaped by evolving threats, technological advancements, and…
Shaza KhanApril 11, 2024
Read MoreBlog
Bring on the edgeWe’ve moved beyond the cloud – the demands for near real-time insights outpace its inherent speed challenges. But more…
Mercury SystemsMarch 28, 2024
Read MoreBlog
Intercepted communications: Encryption standards for the defense edgeEncryption is a critical component of data security, providing a reliable method for ensuring the security and…
Shaza KhanMarch 18, 2024
Read MoreBlog
Advancing the frontiers of space science: The James Webb Space Telescope and next-generation observatoriesLarger payloads in space directly translate to the ability to design and deploy telescopes with larger apertures and more…
Vincent PribbleFebruary 2, 2024
Read MoreFeatured
Blog
CHIPS Part 1: National security and the state of domestic chip manufacturingThe international chip-supply situation is putting U.S. security at risk and driving the need for the ...
March 8, 2023
Read MoreBlogs & Podcasts
Blog
Modular RF ArchitecturesLet’s start with the traditional approach. After spending the morning helping production with some tuning on an amplifier, you finally start reading through the 120-page RFP, SCD, and SOW for the new up-converter. At the end of the source control drawing there is an oddly shaped mechanical outline. The control signal is routed through a […]
Mario LaMarcheJune 12, 2018
Read MoreBlog
Hypervisor Part 2Welcome back! Today we will look at Full Virtualization, using either Software assisted full or Hardware assisted full. Full Virtualization: Virtual machine simulates hardware to allow an unmodified guest OS to be run in isolation. There are two types of Full virtualizations in the enterprise market. On both full virtualization types, the guest operating system’s source information […]
Kevin O’MalleyJune 7, 2018
Read MoreBlog
Military-Grade Secure Solid State Drives Part 2: Encryption DecodedIn my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result is the same, the implementation of self-destruct in the real world can be a bit different than in Hollywood. In military-grade […]
Jennifer KeenanJune 4, 2018
Read More