This paper describes the engineering considerations and design techniques used to develop a small form factor rugged recorder that can handle the extremely high data rates associated with very wide bandwidth RF signal recording. It is intended to provide engineers with ideas on how to bring this capability into confined and often extreme environments while focusing on military specification compliance, SWaP and ease of use with confidence.

Interested in our technology? Contact Sales
Recommended

Use the latest technology that allow real-time recording systems to keep up with the ever-increasing speed requirements of wide-bandwidth data capture in modern military systems.
Today's space imaging systems require radiation-tolerant NAND flash components with advanced error correction, packaged in lightweight, rugged VPX form factors.
Explore our portfolio of rugged, high-density solid-state drives and radiation-tolerant data recorders with our quick reference guide detailing the size, organization, data rate and more.

I used to work for a company that required us to remove any proprietary data from our laptop hard drive prior to traveling to some countries overseas. I didn’t know if it was because they could...
NAND flash, packaged as a Solid State Drives (SSD), are now a common component in defense equipment. Add security and SSDs become the ideal big-data secure storage solution for defense application.

Imagine a US operative on a covert mission is comprised in enemy territory. His laptop, now in the hands of the enemy, contains highly sensitive data stored on the factory-installed SSD and...

In my first post of this series, I explained terms relating to encryption keys and the standards that exist governing encryption key algorithms. Now I will spend some time on ATA passwords and how...

In the first two posts of this series, I reviewed fundamental terms and concepts of encryption key classifications and discussed roles of passwords versus keys and hash algorithms. In this post,...

In my prior three posts, I provided an overview of encryption key fundamentals and the various encryption key mode strategies that can be implemented in a Mercury secure SSD. If you did not read...
Maximum protection, and full compliance with CSfC program guidelines, can only be achieved with proven diversity in the selection of security components.
Whether you application demands space-level reliability for RF components or storage devices, we have the design, manufacturing and test expertise to deliver the right solution.
Only by understanding the mechanics of the various key management mode methodologies can the military system architect choose the optimal strategy for each mission or program.

Have you ever forgotten your password for your work laptop and had to go to your IT guy for help to reset it? Imagine if it was that easy when the data on the hard drive was classified or top...

In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result...

This message will self-destruct in five seconds… Who knew that concept was anything but Hollywood imagination? It is very real, particularly in today’s modern threat environment. Protection...