RDS and Future Vertical Lift: Putting a data center in the sky
Transforming into a multi-domain force requires modernizing an entire helicopter fleet. Determining the onboard technology needed for Future Vertical Lift is one piece of the development puzzle....
Read Article
RF Signal Acquisition Demo
Mercury supports the most critical application development with signal chain solutions from a single vendor that can be integrated with interchangeable tuners, data acquisition cards and recorder...
Read Article
Military-Grade Secure Solid State Drives Part 5: The Backdoor VIPs Don’t Know About
I used to work for a company that required us to remove any proprietary data from our laptop hard drive prior to traveling to some countries overseas. I didn’t know if it was because they could...
Read Article
Encryption Keys: The Cliffs Notes Version, Part 1
Imagine a US operative on a covert mission is comprised in enemy territory. His laptop, now in the hands of the enemy, contains highly sensitive data stored on the factory-installed SSD and...
Read Article
Encryption Keys: The Cliffs Notes Version, Part 2
In my first post of this series, I explained terms relating to encryption keys and the standards that exist governing encryption key algorithms. Now I will spend some time on ATA passwords and how...
Read Article
Encryption Keys: The Cliff Notes Version, Part 3 – Key Management Modes
In the first two posts of this series, I reviewed fundamental terms and concepts of encryption key classifications and discussed roles of passwords versus keys and hash algorithms. In this post,...
Read Article
Encryption Keys: The Cliff Notes Version, Part 4
In my prior three posts, I provided an overview of encryption key fundamentals and the various encryption key mode strategies that can be implemented in a Mercury secure SSD. If you did not read...
Read Article