Blogs and Podcasts
The people, ideas, trends and topics at the intersection of high tech and defense

BLOG MENU
Managing data securely in cross-domain solutions

Blog

Managing data securely in cross-domain solutions

Cross-domain solutions (CDSs) allow for the secure transfer of information between different security domains, ensuring the…

Mercury Systems

April 28, 2025

Read More
Raising the bar: Why cross-domain solutions are critical to data security

Blog

Raising the bar: Why cross-domain solutions are critical to data security

Cross-domain solutions (CDSs) are a vital component when it comes to the security of our most important digital-based…

Mercury Systems

April 16, 2025

Read More
Electromagnetic spectrum superiority in modern defense

Blog

Electromagnetic spectrum superiority in modern defense

The electromagnetic spectrum is an integral part of our daily lives, yet its complexity often goes unnoticed. In defense, the…

Mercury Systems

November 25, 2024

Read More
Delivering innovative technologies to support Army modernization and transformation efforts

Vodcast

Delivering innovative technologies to support Army modernization and transformation efforts

Dr. Eric Gans, Mercury's business development director for advanced technology, shares how Mercury supports the U.S. Army…

Mercury Systems

November 8, 2024

Read More
Blogs & Podcasts
Sailing Through the Fog into the Edge

Sailing Through the Fog into the Edge

Cloud, Fog and Edge Computing for Defense Applications.

Shaza Khan

March 5, 2019

Read More
The Military Digital Convergence

The Military Digital Convergence

Since the Wright Brothers first free-powered flight in 1903, air vehicles have relied upon discrete, analog sensors to supply the information required by their pilots. These sensors and their dashboard-clustered indicators may be regarded as the first and the analog approach to platform situational awareness.

John Bratton

March 5, 2019

Read More
Encryption Keys: The Cliffs Notes Version, Part 2

Encryption Keys: The Cliffs Notes Version, Part 2

In my first post of this series, I explained terms relating to encryption keys and the standards that exist governing encryption key algorithms. Now I will spend some time on ATA passwords and how they correlate to encryption keys.

Jennifer Keenan

February 15, 2019

Read More