-
Intercepted communications: Encryption standards for the defense edge
Encryption is a critical component of data security, providing a reliable method for ensuring the security and confidentiality of sensitive data for government, defense, and aerospace...
-
Intercepted communications: Encryption standards for the defense edge
Encryption is a critical component of data security, providing a reliable method for ensuring the security and confidentiality of sensitive data for government, defense, and aerospace...
-
The criticality of DO-254 and DO-178C standards for future Army autonomous vehicles
The future of warfare is rapidly evolving, with the advent of autonomous vehicles and the increasing integration of artificial intelligence (AI) technologies. By 2030, the Army is likely to look...
-
The criticality of DO-254 and DO-178C standards for future Army autonomous vehicles
The future of warfare is rapidly evolving, with the advent of autonomous vehicles and the increasing integration of artificial intelligence (AI) technologies. By 2030, the Army is likely to look...
-
Creating the next generation of mission computers
Next-generation mission computers align with the future direction of defense: chip-scale processing and compact and reduced weight microelectronics that will allow the Army and other service...
-
Creating the next generation of mission computers
Next-generation mission computers align with the future direction of defense: chip-scale processing and compact and reduced weight microelectronics that will allow the Army and other service...
-
2:00
Mercury Systems Presents: Mission Success
Mercury’s cutting-edge avionics and mission-critical solutions make airspace the safest space to ensure flight and mission success. Open, safe and secure, our solutions enhance awareness and accuracy.
-
Can you trust your computer? Three ways your system may already be unsafe
Did you know your computer could be untrustworthy, even before you take it out of the box? Read more about how trust is compromised through the supply chain and ways you can prevent it.
-
Can you trust your computer? Three ways your system may already be unsafe
Did you know your computer could be untrustworthy, even before you take it out of the box? Read more about how trust is compromised through the supply chain and ways you can prevent it.
-
White Paper: Building Safe and Secure Systems for Tomorrow's Autonomous Platforms
DAL (design assurance) flight-safety certification and systems security engineering (SSE) is required to protect systems and mitigate risk for future smart and autonomous platforms
-
Ready for take-off? Let’s set your electronics to airplane mode.
Unlike cellphones that can be easily switched to airplane mode, critical aircraft electronics must prove they’re ready for flight through extensive safety certification processes. Learn more about...
-
Ready for take-off? Let’s set your electronics to airplane mode.
Unlike cellphones that can be easily switched to airplane mode, critical aircraft electronics must prove they’re ready for flight through extensive safety certification processes. Learn more about...
-
Ready for take-off? Let’s set your electronics to airplane mode.
Unlike cellphones that can be easily switched to airplane mode, critical aircraft electronics must prove they’re ready for flight through extensive safety certification processes. Learn more about...
-
Webinar: Enabling Tomorrow's Avionics with Multi-Core Certifiable Computing
Intel and Mercury discuss building rugged, open, DAL-certifiable processing boards and subsystems for mission systems and AI workloads.
-
Intel and Mercury Talk DAL-Certifiable Computing for Future Avionics
Intel and Mercury Systems discuss their longstanding partnership and collaboration in building DAL-Certifiable DO-254 and DO-178C computing for future avionics
-
White Paper: Safety Certifiable Computing for Tomorrow's Avionics
Modern sensors and AI need powerful flight-ready computing, but creating safe multi-core processing systems is difficult to achieve. Learn why Intel-based solutions are suited for AI and FVL.
-
Webinar: AI at the Tactical Edge: Protecting Machine Learning with Data Security
In this webinar, learn how Mercury Systems and Intel are working together to design secure AI edge solutions to protect data and machine learning in the field.
-
Sailing Through the Fog into the Edge
Cloud, Fog and Edge Computing for Defense Applications.
-
Sailing Through the Fog into the Edge
Cloud, Fog and Edge Computing for Defense Applications.
-
Sailing Through the Fog into the Edge
Cloud, Fog and Edge Computing for Defense Applications.
- Loading More...