Mercury Systems is partnering with Intel to develop high-performance, ruggedized edge computing solutions capable of bringing computational power where it's needed: close to the data source. Using the latest Intel® Xeon® Scalable processors and Intel® Distribution of OpenVINO™ toolkit, Mercury Systems has created servers and OpenVPX systems that allow mission-critical edge computing tasks to be
Learn how Mercury and Intel collaborate to scale and deploy composable data center capabilities across the fog and edge layers with high performance embedded computing (HPEC)
Cloud-scalable cross-domain solution methodologies, challenges and implementations for rapid, secure and correct information transfer between multiple security domains.
What do you think of when you hear the word ‘compromise’? Possibly an agreement made between children where one begrudgingly agrees to take out the trash for a week if the other mows the...
Ten years ago, cloud computing hadn’t yet hit the mainstream. Amazon Web Services was only a few years old, Apple’s iCloud didn’t yet exist, and the “as-a-service” markets (IaaS, PaaS, SaaS) were...
As the DoD shifts to a new paradigm for future modernization, see how Mercury Systems is collaborating with our semiconductor partners to make the most advanced commercial microelectronics...
There is a gap within the community for reliable providers of secure, scalable and affordable subsystems that can support critical programs. Learn how we fill this gap with our "built-in" security.
Taking secure computing to the tactical edge requires a built-in multilayered security approach from system startup to system availability. Listen in as Mercury and Intel discuss their collaboration
Mercury subsystems solve big data processing problems for platforms operating at the tactical edge. Our system design and integration experts deliver solutions that meet all your application needs
Mercury's rugged edge servers accelerate compute-heavy mission-critical applications like artificial intelligence (AI), signals intelligence (SIGINT), virtualization and big data analytics.
This whitepaper discusses how new holistic systems security engineering and flight-safety certification design approaches are enabling smarter platforms to be deployed anywhere.
Mercury and Intel collaborate, bringing their own unique sets of technological know-how, to develop and implement AI applications for quicker deployment and integration in the field to enhanc
Mercury's rugged edge servers accelerate Artificial Intelligence (AI), Cybersecurity, Signals Intelligence (SIGINT) and C4ISR tactical edge computing workloads.
Whether you application demands space-level reliability for RF components or storage devices, we have the design, manufacturing and test expertise to deliver the right solution.
Learn what big data is and why the military relies on big data data pipelines to drive artificial intelligence and ensure mission success in the multi-domain battlefield.
Mercury Systems is a next-generation defense electronics company making commercial technologies profoundly more accessible to aerospace and defense. Watch the interactive virtual conversation with...
In the first two posts of this series, I reviewed fundamental terms and concepts of encryption key classifications and discussed roles of passwords versus keys and hash algorithms. In this post,...
In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result...
For the modern battlefield with hypersonic weapons, “real-time” answers enabled by 5G are critical. Learn the promises and pitfalls of 5G and how it can be made secure and reliable.
NAND flash, packaged as a Solid State Drives (SSD), are now a common component in defense equipment. Add security and SSDs become the ideal big-data secure storage solution for defense application.
By working at the chip level and leveraging new 2.5D system-in-package capabilities, designers can combine complex semiconductor dies into a single component while maintaining trust and security.