Next-generation defense and aerospace applications are smarter and increasingly more autonomous. To be trusted and deployable anywhere, they require both proven systems security engineering (SSE) and the assurance of flight-safety certification. This whitepaper discusses the challenges and evolving methods of combining the often-competing but equally required assurance of private SSE and “public” flight-safety certification that is enabling modern processing systems to be deployed anywhere.
Mercury's rugged edge servers accelerate compute-heavy mission-critical applications like artificial intell...
Did you know your computer could be untrustworthy, even before you take it out of the box? Read more about how trust is compromised through the supply chain and ways you can prevent it.
Assurance of DAL flight-safety certification and systems security engineering (SSE) is required to protect systems and mitigate risk for future smart and autonomous platforms
There is a gap within the community for reliable providers of secure, scalable and affordable subsystems that can support critical programs. Learn how we fill this gap with our "built-in" security.
Whether you application demands space-level reliability for RF components or storage devices, we have the design, manufacturing and test expertise to deliver the right solution.
Mercury Systems is partnering with Intel to develop high-performance, ruggedized, and secure edge computing solutions that enable mission-critical applications in the harshest environments.
Our servers are designed from the ground up for C5ISR and other mission-critical applications where performance, reliability and availability are crucial. View our entire rugged server offering.
What do you think of when you hear the word ‘compromise’? Possibly an agreement made between children where one begrudgingly agrees to take out the trash for a week if the other mows the...
Learn how Mercury and Intel collaborate to scale and deploy composable data center capabilities across the fog and edge layers with high performance embedded computing (HPEC)
Cloud-scalable cross-domain solution methodologies, challenges and implementations for rapid, secure and correct information transfer between multiple security domains.
Ten years ago, cloud computing hadn’t yet hit the mainstream. Amazon Web Services was only a few years old, Apple’s iCloud didn’t yet exist, and the “as-a-service” markets (IaaS, PaaS, SaaS) were...
Taking secure computing to the tactical edge requires a built-in multilayered security approach from system startup to system availability. Listen in as Mercury and Intel discuss their collaboration
Mercury subsystems solve big data processing problems for platforms operating at the tactical edge. Our system design and integration experts deliver solutions that meet all your application needs
Mercury's rugged edge servers accelerate compute-heavy mission-critical applications like artificial intelligence (AI), signals intelligence (SIGINT), virtualization and big data analytics.
Mercury and Intel collaborate, bringing their own unique sets of technological know-how, to develop and implement AI applications for quicker deployment and integration in the field to enhanc
Mercury's rugged edge servers accelerate Artificial Intelligence (AI), Cybersecurity, Signals Intelligence (SIGINT) and C4ISR tactical edge computing workloads.
Learn what big data is and why the military relies on big data data pipelines to drive artificial intelligence and ensure mission success in the multi-domain battlefield.
Mercury Systems is a next-generation defense electronics company making commercial technologies profoundly more accessible to aerospace and defense. Watch the interactive virtual conversation with...
As the DoD shifts to a new paradigm for future modernization, see how Mercury Systems is collaborating with our semiconductor partners to make the most advanced commercial microelectronics...
In the first two posts of this series, I reviewed fundamental terms and concepts of encryption key classifications and discussed roles of passwords versus keys and hash algorithms. In this post,...
In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result...