Blogs and Podcasts
The people, ideas, trends and topics at the intersection of high tech and defense

BLOG MENU
Blogs & Podcasts
Hypervisor Part 2

Blog

Hypervisor Part 2

Welcome back! Today we will look at Full Virtualization, using either Software assisted full or Hardware assisted full. Full Virtualization: Virtual machine simulates hardware to allow an unmodified guest OS to be run in isolation. There are two types of Full virtualizations in the enterprise market. On both full virtualization types, the guest operating system’s source information […]

Kevin O’Malley

June 7, 2018

Read More
Military-Grade Secure Solid State Drives Part 2: Encryption Decoded

Blog

Military-Grade Secure Solid State Drives Part 2: Encryption Decoded

In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result is the same, the implementation of self-destruct in the real world can be a bit different than in Hollywood. In military-grade […]

Jennifer Keenan

June 4, 2018

Read More
Innovative RF Engineering Teams

Blog

Innovative RF Engineering Teams

Mario LaMarche

May 29, 2018

Read More
Hypervisor - Part 1

Blog

Hypervisor - Part 1

The Engineers in Mercury’s SMP department have been adding to Mercury’s many capabilities and offerings on both Mercury’s 6U and 3U product lines. I will be featuring some of these over the next few weeks and months to show the commitment and ingenuity that our engineers have for our customers’ needs. One of these capabilities […]

Kevin O’Malley

May 24, 2018

Read More
Military-Grade Secure Solid State Drives Part 1: Hollywood Imagination or Reality?

Blog

Military-Grade Secure Solid State Drives Part 1: Hollywood Imagination or Reality?

This message will self-destruct in five seconds… Who knew that concept was anything but Hollywood imagination? It is very real, particularly in today’s modern threat environment. Protection including destruction of mission critical data has never been more relevant to the success of our military and government forces. As our adversaries become more skilled in hacking […]

Jennifer Keenan

May 21, 2018

Read More
Welcome to the MRCY Blog!

Blog

Welcome to the MRCY Blog!

Deuteronomy Rabbah said, “In vain have you acquired knowledge if you fail to impart it to others.” So with this blog, consider us doing our part! Through the MRCY blog, we are pleased to bring you content and perspective from some of our own. You’ll hear from a multitude of subject matter experts – everyone […]

Mercury Systems

May 16, 2018

Read More