Blogs and Podcasts
The people, ideas, trends and topics at the intersection of high tech and defense

BLOG MENU
Managing data securely in cross-domain solutions

Blog

Managing data securely in cross-domain solutions

Cross-domain solutions (CDSs) allow for the secure transfer of information between different security domains, ensuring the…

Mercury Systems

April 28, 2025

Read More
Raising the bar: Why cross-domain solutions are critical to data security

Blog

Raising the bar: Why cross-domain solutions are critical to data security

Cross-domain solutions (CDSs) are a vital component when it comes to the security of our most important digital-based…

Mercury Systems

April 16, 2025

Read More
Electromagnetic spectrum superiority in modern defense

Blog

Electromagnetic spectrum superiority in modern defense

The electromagnetic spectrum is an integral part of our daily lives, yet its complexity often goes unnoticed. In defense, the…

Mercury Systems

November 25, 2024

Read More
Delivering processing innovation for the air and space domains

Vodcast

Delivering processing innovation for the air and space domains

Mercury’s chief operating officer, Roger Wells, sat down for an interview with Air & Space Forces Magazine to discuss the…

Mercury Systems

September 13, 2024

Read More
Blogs & Podcasts
City Year - Spring Into Service

City Year - Spring Into Service

“Volunteers do not necessarily have the time; they just have the heart.”– Elizabeth Andrew On a rainy March day, 5 Mercury employees based in Andover trekked into Boston to participate in our first Boston City Year volunteer event.

Mercury Systems

April 1, 2019

Read More
Enabling Edge Processing in Military Intelligent Sensors

Enabling Edge Processing in Military Intelligent Sensors

In military environments, seconds can be the difference between life or death and mission success or failure. A soldier in hostile territory needs their mobile system to rapidly process sensor data to accurately analyze threats and take action. Intelligent sensor systems using artificial intelligence (AI) to make automatic critical decisions without human intervention rely on […]

Jennifer Keenan

March 14, 2019

Read More
Encryption Keys: The Cliff Notes Version, Part 4

Encryption Keys: The Cliff Notes Version, Part 4

In my prior three posts, I provided an overview of encryption key fundamentals and the various encryption key mode strategies that can be implemented in a Mercury secure SSD. If you did not read those, stop everything and go back to them now!

Jennifer Keenan

March 8, 2019

Read More
Sailing Through the Fog into the Edge

Sailing Through the Fog into the Edge

Cloud, Fog and Edge Computing for Defense Applications.

Shaza Khan

March 5, 2019

Read More