Secure Processing
Security of mission-critical platforms and missions has never been more important. Learn about Mercury's built-in fourth-gen security framework and how it secures the most advanced systems.
-
Enabling Big Data Processing and AI-Powered Everything, Everywhere
Learn how Mercury and Intel collaborate to scale and deploy composable data center capabilities across the fog and edge layers with high performance embedded edge computing (HPEEC)
-
Modern Processing Approaches for JADC2
Listen to the latest MercuryNOW podcast as we discuss the challenges for JADC2 implementation and the role Mercury is playing to help make it a reality – from data center processing at the edge to...
-
2:13
Rugged Edge Servers – The Box that Checks All the Boxes
Mercury's rugged edge servers accelerate compute-heavy mission-critical applications like artificial intelligence (AI), signals intelligence (SIGINT), virtualization and big data analytics.
-
A New Paradigm for Defense-Grade Advanced Microelectronics
The Department of Defense has shifted priorities as new threats emerge and the U.S. seeks to secure innovative solutions, placing advanced microelectronics at the forefront of its agenda.
-
Next-Generation Custom Microelectronics
Read the Post! -
Next-Gen Safe and Secure Processing Systems for Aerospace and Defense
This whitepaper discusses how new holistic systems security engineering and flight-safety certification design approaches are enabling smarter platforms to be deployed anywhere.
-
How Mercury Systems and Intel Collaborate to Bring AI to Defense
Mercury and Intel collaborate, bringing their own unique sets of technological know-how, to develop and implement AI applications for quicker deployment and integration in the field to enhanc
-
1:01
Rugged HPE Servers - RES-XR6 Alliance
Sam Ceccola, HPE's DoD CTO, speaks about how Mercury Systems' RES-XR6 Alliance rugged, high-performance servers bring the performance of HPE's server platforms to the harshest military environments.
-
2:21
Rugged Edge Servers - Built for Every Inhospitable Corner of the Globe
Mercury's rugged edge servers accelerate Artificial Intelligence (AI), Cybersecurity, Signals Intelligence (SIGINT) and C4ISR tactical edge computing workloads.
-
Advantages of Mercury's Modified Off-The-Shelf (MOTS) Product Approach
Our approach to building products for enhanced durability under extreme environmental conditions, including repeated temperature cycling over wide temperature ranges.
-
Secure Processing Solutions for the Defense and Intelligence Industry
There is a gap within the community for reliable providers of secure, scalable and affordable subsystems that can support critical programs. Learn how we fill this gap with our "built-in" security.
-
Space-Qualified Microelectronics
Whether you application demands space-level reliability for RF components or storage devices, we have the design, manufacturing and test expertise to deliver the right solution.
- Go Now!
-
The Big Data Battlefield
Learn what big data is and why the military relies on big data data pipelines to drive artificial intelligence and ensure mission success in the multi-domain battlefield.
-
CANGuard™ Defending Automotive Vehicle Data Networks Against Malicious Vehicle Intrusion
Our CANGuard solution is a transparent CAN filtering technology that can efficiently differentiate messages a given device is authorized to transmit and receive from messages it is not.
-
Enabling a Trusted Domestic Microelectronics Ecosystem
Mercury Systems is a next-generation defense electronics company making commercial technologies profoundly more accessible to aerospace and defense. Watch the interactive virtual conversation with...
-
Sailing Through the Fog into the Edge
Learn about the trends, requirements, and limitations of Defense Fog and Edge Computing. Our blog post compares fog and edge processing layer resources in commercial and defense markets
-
Encryption Keys: The Cliff Notes Version, Part 3 – Key Management Modes
In the first two posts of this series, I reviewed fundamental terms and concepts of encryption key classifications and discussed roles of passwords versus keys and hash algorithms. In this post,...
-
Military-Grade Secure Solid State Drives Part 2: Encryption Decoded
In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result...
-
Making 5G Secure and Reliable
For the modern battlefield with hypersonic weapons, “real-time” answers enabled by 5G are critical. Learn the promises and pitfalls of 5G and how it can be made secure and reliable.
-
Safe guarding Mission Critical Data with Secure Solid State Drives
NAND flash, packaged as a Solid State Drives (SSD), are now a common component in defense equipment. Add security and SSDs become the ideal big-data secure storage solution for defense application.
-
Redefining Sensor Edge Processing with 2.5D System-in-Package Technology
By working at the chip level and leveraging new 2.5D system-in-package capabilities, designers can combine complex semiconductor dies into a single component while maintaining trust and security.
-
Loading More...