Blogs & Podcasts

June 18, 2018
Read More
Let’s start with the traditional approach. After spending the morning helping production with some tuning on an amplifier, you finally start reading through the 120-page RFP, SCD, and SOW for the new up-converter. At the end of the source control drawing there is an oddly shaped mechanical outline. The control signal is routed through a […]
Mario LaMarcheJune 12, 2018
Read More
Welcome back! Today we will look at Full Virtualization, using either Software assisted full or Hardware assisted full. Full Virtualization: Virtual machine simulates hardware to allow an unmodified guest OS to be run in isolation. There are two types of Full virtualizations in the enterprise market. On both full virtualization types, the guest operating system’s source information […]
Kevin O’MalleyJune 7, 2018
Read More
In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result is the same, the implementation of self-destruct in the real world can be a bit different than in Hollywood. In military-grade […]
Jennifer KeenanJune 4, 2018
Read More