Avionics and Flight Safety

Learn how flight safety certifiable solutions using SWaP-optimized computing design with advanced security enable some of the most advanced commercial and defense, manned and unmanned platforms around the world.

  • Building in flight-safety certification into secure, mission-critical processing subsystems

    Building in flight-safety certification into secure, mission-critical processing subsystems

    Mercury, contracted by Airbus D&S is supplying processing subsystems as part of the EGNOS common computing platform.

    Read Now
  • COTS DAL Certifiable BuiltSAFE Building Blocks

    COTS DAL Certifiable BuiltSAFE Building Blocks

    Our expertise and experience in Design Assurance Level (DAL) safety-certifiable solutions has been built on successful execution on dozens of programs over three decades.

    Read Now
  • Safe AND secure avionics? You can do that? Yup!

    Safe AND secure avionics? You can do that? Yup!

    Although we all love connectivity and the benefits it brings us, there is a downside. By now, we’ve all heard about cars that have been hacked. Wired magazine even has an entire section of their...

    Read Article
  • The Military Digital Convergence - enables next-generation military platforms

    The Military Digital Convergence - enables next-generation military platforms

    Military digital transformation enables platforms to shrink and become more capable and adaptable for mission autonomy.

    Read Now
  • Next-Generation Custom Microelectronics

    Read the Post!
  • Mercury Systems acquires Geco Incorporated3:28

    Mercury Systems acquires Geco Incorporated

    Mercury acquires Geco’s integration, test and software capabilities to produce mission-critical aerospace processing solutions requiring proven security and flight safety certification.

    Watch Video
  • Artificial Intelligence for Military Applications

    Learn More
  • A Low-risk, COTS Approach to Building Safety Certifiable Processing Subsystems

    A Low-risk, COTS Approach to Building Safety Certifiable Processing Subsystems

    How to affordably decrease safety critical processing subsystem development time and program risk using DO-178 / DO-254 certifiable off-the-shelf building blocks.

    Read Now
  • Embedded Cognitive Computing & Artificial Intelligence - part 1

    Embedded Cognitive Computing & Artificial Intelligence - part 1

    This white paper describes AI and cognitive computing (CC) and introduces the underlying largely commercially developer IP that enables them.

    Read Now
  • Follow us on Twitter!

    Go Now!
  • Military-Grade Microelectronics Packaging for the 21st Century

    Military-Grade Microelectronics Packaging for the 21st Century

    We discuss our proposal for a new microelectronics packaging platform addressing the practical needs of the defense market for the 21st century.

    Read Now
  • EnsembleSeries Open System Architecture Embedded Processing Building Blocks

    EnsembleSeries Open System Architecture Embedded Processing Building Blocks

    We champion open systems architectures that support our customers' need for affordability and interoperability while infusing differentiating innovation into every compute element we build.

    Read Now
  • Enabling edge processing with stacked, high-speed DDR4 and DDR5 memory

    Enabling edge processing with stacked, high-speed DDR4 and DDR5 memory

    The real-time processing of data requires fastest FPGA devices and multicore processors. These devices cannot provide peak performance without highly dense and high-speed DDR4 and DDR5 memory.

    Read Now
  • Embedding data center compute capability at the tactical edge with OSA

    Embedding data center compute capability at the tactical edge with OSA

    At a high level, the vast majority of contemporary compute processing hardware may be divided into two domains: powerful data center processors and smaller, embedded devices.

    Read Now
  • Demystifying Hardware Full Disk Encryption Technology for Military Data Storage

    Demystifying Hardware Full Disk Encryption Technology for Military Data Storage

    Maximum protection, and full compliance with CSfC program guidelines, can only be achieved with proven diversity in the selection of security components.

    Read Now
  • Military-Grade Custom Microelectronics1:19

    Military-Grade Custom Microelectronics

    Our tightly integrated engineering, manufacturing and test resources enable production velocity and reduce security vulnerabilities and program risk.

    Watch Video
  • Mercury BuiltSECURE SiP4:19

    Mercury BuiltSECURE SiP

    Watch Video
  • Military Grade Solid State Drives (SSD)6:05

    Military Grade Solid State Drives (SSD)

    Learn about the differences between a commercial grade SSD and military-grade (Mercury) solid state drive. SLC, MLC and TLC NAND Flash variant are all rugged, secure (encrypted AES 256), and designed

    Watch Video
  • Innovation That Protects Mercury SSDs7:41

    Innovation That Protects Mercury SSDs

    Mercury Systems is the preeminent commercial supplier of Secure Solid-State Drives (SSD) with the most robust embedded security and performance-enhancing algorithms.

    Watch Video
  • Mercury Memory4:22

    Mercury Memory

    Mercury Systems specializes in three-dimensional packaging of commercial memory technologies to produce military-grade, high reliability high density secure memory solutions. Designed and manufacture

    Watch Video
  • Next Generation Airborne Video Servers

    Next Generation Airborne Video Servers

    This white paper describes the contemporary challenges facing all airborne integrators as they leverage next generation technology for airborne mission critical operations.

    Read Now
  • Safe guarding Mission Critical Data with Secure Solid State Drives

    Safe guarding Mission Critical Data with Secure Solid State Drives

    NAND flash, packaged as a Solid State Drives (SSD), are now a common component in defense equipment. Add security and SSDs become the ideal big-data secure storage solution for defense application.

    Read Now
  • Unlocking the True Value of Encryption and Key Management Modes

    Unlocking the True Value of Encryption and Key Management Modes

    Only by understanding the mechanics of the various key management mode methodologies can the military system architect choose the optimal strategy for each mission or program.

    Read Now
  • loading
    Loading More...