Blog
Intercepted communications: Encryption standards for the defense edgeEncryption is a critical component of data security, providing a reliable method for ensuring the security and…
Shaza KhanMarch 18, 2024
Read MoreBlog
Advancing the frontiers of space science: The James Webb Space Telescope and next-generation observatoriesLarger payloads in space directly translate to the ability to design and deploy telescopes with larger apertures and more…
Vincent PribbleFebruary 2, 2024
Read MoreBlog
Taking the cloud to new heights: Secure airborne data serversAs the U.S. Army develops the next generation of attack-reconnaissance rotorcraft, reliable, easy, and secure access to data…
Mercury SystemsNovember 1, 2023
Read MoreBlog
5G: Architecting for the edgeAdoption of new technology is always phased across the military – it’s simply too expensive and risks readiness to upgrade…
Dr. Bill ConleyOctober 26, 2023
Read MoreFeatured
Blog
CHIPS Part 1: National security and the state of domestic chip manufacturingThe international chip-supply situation is putting U.S. security at risk and driving the need for the ...
March 8, 2023
Read MoreBlogs & Podcasts
Blog
Modular RF ArchitecturesLet’s start with the traditional approach. After spending the morning helping production with some tuning on an amplifier, you finally start reading through the 120-page RFP, SCD, and SOW for the new up-converter. At the end of the source control drawing there is an oddly shaped mechanical outline. The control signal is routed through a […]
Mario LaMarcheJune 12, 2018
Read MoreBlog
Hypervisor Part 2Welcome back! Today we will look at Full Virtualization, using either Software assisted full or Hardware assisted full. Full Virtualization: Virtual machine simulates hardware to allow an unmodified guest OS to be run in isolation. There are two types of Full virtualizations in the enterprise market. On both full virtualization types, the guest operating system’s source information […]
Kevin O’MalleyJune 7, 2018
Read MoreBlog
Military-Grade Secure Solid State Drives Part 2: Encryption DecodedIn my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result is the same, the implementation of self-destruct in the real world can be a bit different than in Hollywood. In military-grade […]
Jennifer KeenanJune 4, 2018
Read More