Blogs and Podcasts
The people, ideas, trends and topics at the intersection of high tech and defense

BLOG MENU
X CLEAR RESULTS
  • Blogs
  • Podcasts
  • Vodcasts
  • View All
Blogs & Podcasts
Assured signal integrity in stacked, high-speed DDR4 and DDR5 memory

Blog

Assured signal integrity in stacked, high-speed DDR4 and DDR5 memory

Edge processing architectures in today’s autonomous and AI military systems, process an ever growing amount of sensor data. Many of these systems or devices used for edge processing applications in forward-deployed environments need to be small, rugged and agile.

Jennifer Keenan

June 18, 2019

Read More
#PAS19: Cleared for Takeoff!

Blog

#PAS19: Cleared for Takeoff!

Day one of the Paris Air Show is in the books and it was all systems go. Our stand was packed with our product displays and partners from Daedalean attracting a crowd. Watch this short video of Daedalean’s Boris Videnov talking through their demo and you’ll see why.

Mercury Systems

June 18, 2019

Read More
#PAS19: Forklifts and Nail Guns and Drills, Oh My!

Blog

#PAS19: Forklifts and Nail Guns and Drills, Oh My!

Arriving on the scene at le Bourget today, was akin to being immersed in the first sketch of a pointillist painting dotted with “hi-vis” yellow and orange safety vests. Those wearing them are the smart, safety-conscious people who are working to get the 53rd International Paris Air Show ready for launch (pun intended).

Mercury Systems

June 15, 2019

Read More
Safe AND secure avionics? You can do that? Yup!

Blog

Safe AND secure avionics? You can do that? Yup!

Although we all love connectivity and the benefits it brings us, there is a downside. By now, we’ve all heard about cars that have been hacked. Wired magazine even has an entire section of their website dedicated to the subject. Anytime you connect to a network, you open up your system to vulnerabilities.

Mercury Systems

April 19, 2019

Read More
City Year - Spring Into Service

Blog

City Year - Spring Into Service

“Volunteers do not necessarily have the time; they just have the heart.”– Elizabeth Andrew On a rainy March day, 5 Mercury employees based in Andover trekked into Boston to participate in our first Boston City Year volunteer event.

Mercury Systems

April 1, 2019

Read More
Enabling Edge Processing in Military Intelligent Sensors

Blog

Enabling Edge Processing in Military Intelligent Sensors

In military environments, seconds can be the difference between life or death and mission success or failure. A soldier in hostile territory needs their mobile system to rapidly process sensor data to accurately analyze threats and take action. Intelligent sensor systems using artificial intelligence (AI) to make automatic critical decisions without human intervention rely on […]

Jennifer Keenan

March 14, 2019

Read More
Encryption Keys: The Cliff Notes Version, Part 4

Blog

Encryption Keys: The Cliff Notes Version, Part 4

In my prior three posts, I provided an overview of encryption key fundamentals and the various encryption key mode strategies that can be implemented in a Mercury secure SSD. If you did not read those, stop everything and go back to them now!

Jennifer Keenan

March 8, 2019

Read More
Sailing Through the Fog into the Edge

Blog

Sailing Through the Fog into the Edge

Cloud, Fog and Edge Computing for Defense Applications.

Shaza Khan

March 5, 2019

Read More
The Military Digital Convergence

Blog

The Military Digital Convergence

Since the Wright Brothers first free-powered flight in 1903, air vehicles have relied upon discrete, analog sensors to supply the information required by their pilots. These sensors and their dashboard-clustered indicators may be regarded as the first and the analog approach to platform situational awareness.

John Bratton

March 5, 2019

Read More
Encryption Keys: The Cliffs Notes Version, Part 2

Blog

Encryption Keys: The Cliffs Notes Version, Part 2

In my first post of this series, I explained terms relating to encryption keys and the standards that exist governing encryption key algorithms. Now I will spend some time on ATA passwords and how they correlate to encryption keys.

Jennifer Keenan

February 15, 2019

Read More
Women in STEM

Blog

Women in STEM

A few months ago, Mercury partnered with the Society of Women Engineers to host our first Women in Technology Night at our headquarters in Andover. I was fortunate enough to have panelists Star Dargin, CEO of Star Leadership and Susan Macchia, Senior Manager at Endeavor Robotics join me in giving insight on our career progression, […]

Leadership Team

February 7, 2019

Read More
The Inside Scoop: Joining Mercury

Blog

The Inside Scoop: Joining Mercury

From the interview process to now working at Mercury, I’ve found that the company holds true to its high ratings on Glassdoor. I interviewed in person at the San Jose office for my first post-graduation role. There were many aspects I enjoyed about the interview, but the honesty, energy, and thoughtfulness in the questions asked really […]

Jacky Huynh

February 7, 2019

Read More
Encryption Keys: The Cliffs Notes Version, Part 1

Blog

Encryption Keys: The Cliffs Notes Version, Part 1

Jennifer Keenan

January 31, 2019

Read More
Multi-Domain Operations: Becoming Today's Swiss Army Knife

Blog

Multi-Domain Operations: Becoming Today's Swiss Army Knife

Defense News recently released their annual Outlook . If you haven’t seen it yet, I highly recommend it. It’s a great read consisting of a few dozen essays by world leaders looking at the trends and issues, like multi-domain operations, that will most impact the global defense industry.

Mercury Systems

January 25, 2019

Read More
Embedding Data Center Compute Capability at the Tactical Edge with Open Systems Architectures

Blog

Embedding Data Center Compute Capability at the Tactical Edge with Open Systems Architectures

At a high level, the vast majority of contemporary compute processing hardware may be divided into two domains: powerful data center processors and smaller, embedded devices. Embedded devices have the support of their data center big brothers via a network connection, giving them access to big data applications

John Bratton

January 23, 2019

Read More
Electronic Protection: An Overview of Electronic Warfare Part 5

Blog

Electronic Protection: An Overview of Electronic Warfare Part 5

In the first post of this series, we discussed the history of electronic warfare as it was being developed during WWII. While much has changed in the last 80 years, one constant remains true—the cat-and-mouse game to develop the superior technology that grants the owner control over the electromagnetic spectrum (EMS).

Mario LaMarche

January 18, 2019

Read More
Key Takeaways from the 55th Annual AOC Symposium and Conference

Blog

Key Takeaways from the 55th Annual AOC Symposium and Conference

Sometimes it’s hard to believe how quickly technology progresses. It’s only been about a decade since Steve Jobs announced the first iPhone. And today, between checking email, navigating to a new restaurant, sharing photos with family and turning the lights on or off in my kid’s room, it’s hard to image life without a smart […]

Mario LaMarche

December 20, 2018

Read More
The Three C's of Talent Attraction

Blog

The Three C's of Talent Attraction

As we embark on the digital age of recruiting we must, more than ever, ensure we are delivering on the key elements of talent attraction that serve to optimize hiring manager satisfaction, while also providing a best-in-class experience for the candidate.

Jamie Durkin

December 17, 2018

Read More