Modular RF Architectures

Let’s start with the traditional approach. After spending the morning helping production with some tuning on an amplifier, you finally start reading through the 120-page RFP, SCD, and SOW for the new up-converter. At the end of the source control drawing there is an oddly shaped mechanical outline. The control signal is routed through a hermetic mico-D connector with a custom defined pin-out. While not ideal, the locations of the RF ports are manageable. The eight-month timeline to CDR appears reasonable. However, six months in and it becomes clear that it will take longer and cost more than anticipated. The back and forth iterations with the engineer supporting the custom designed digital control board seem to go on forever. The engineer working on the output module determines that she will need a new heat-sink to keep the devices from becoming too hot. The mixer is generating a spur that wasn’t predicted and somewhere a gain stage is oscillating. The frustrated program manager has to add this project to the long list of development jobs with irate customers.

Read More

Hypervisor- Virtual Machine

Hypervisor Part 2

Welcome back!

Today we will look at Full Virtualization, using either Software assisted full or Hardware assisted full.

Full Virtualization:
Virtual machine simulates hardware to allow an unmodified guest OS to be run in isolation. There are two types of Full virtualizations in the enterprise market. On both full virtualization types, the guest operating system’s source information will not be modified.
• Software assisted full virtualization
• Hardware assisted full virtualization

Software Assisted Full Virtualization:
Software-assisted full virtualization completely relies on binary translation to trap and virtualize the execution of sensitive, non-virtualizable instructions sets. It emulates the hardware using the software instruction sets. Due to binary translation, it is often criticized for performance issue. Here is the list of software which will fall under software assisted (BT).

• VMware workstation (32Bit guests)
• Virtual PC
• VirtualBox (32-bit guests)
• VMware Server

Hardware Assisted Full Virtualization:
Hardware-assisted full virtualization eliminates the binary translation and it directly interrupts with hardware using the virtualization technology which has been integrated on X86 processors since 2005 (Intel VT-x and AMD-V). Guest OS’s instructions might allow a virtual context execute privileged instructions directly on the processor, even though it is virtualized.
Here is the list of enterprise software which supports hardware-assisted – Full virtualization which falls under hypervisor type 1 (Bare metal).

• VMware ESXi /ESX
• Hyper-V
• Xen

The following list fall under hypervisor type 2 (Hosted).
• VMware Workstation (64-bit guests only )
• Virtual Box (64-bit guests only )
• VMware Server (Retired )

Here’s a great write up explaining Para virtualization vs Full virtualization vs Hardware assisted Virtualization in more detail.

Stay tuned for Part 3 of the Hypervisor blog!

AES256bit encryption

Military-Grade Secure Solid State Drives Part 2: Encryption Decoded

In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result is the same, the implementation of self-destruct in the real world can be a bit different than in Hollywood.  In military-grade solid state drives, self-destruction of data or a data storage device happens through sophisticated non-thermal events. Advanced algorithms are used to erase encryption keys, non-volatile NAND flash memory, and controller firmware.  Other mechanisms can be employed to wipe the drive by high powered magnetic exposure. In these scenarios the data and device will be rendered useless with no chance of reverse engineering, but no flames or bodily harm will ensue. Read More

Innovative RF Engineering Teams

In this series of blog posts I will explore various topics in the growing space that is the intersection of the commercial communications industry and the RF/Microwave defense industry. Gone are the days of plentiful cost-plus, multi-year development contracts and in their place we find an emerging competitive landscape. Nimble, technology-focused companies are taking the tools ubiquitous in the fast-paced world of commercial businesses and applying them to a new set of challenges found in the defense and aerospace industries. Just as commercial communication standards fueled rapid growth by allowing the re-use of modular components, disruptive companies are now working to apply these same methods to the RF defense industry. However, to be successful is no easy task. With a much smaller available market, these innovative companies need a thorough understanding of current and future market trends in order to define their technology road-map. We are now in a critical time for the defense industry with massive growth opportunities for innovative companies and a slow decline for those who fail to adapt.

It’s become a common story throughout the RF defense industry. The same conversations are heard in the lunch room, whispered in cubicles and discussed over dinner after a conference. The subject matter experts are retiring. Other engineers are leaving to build the next smartphone app. It’s becoming harder and harder to recruit the next generation of engineers with competition from companies like Google and Facebook. The once cutting-edge RF/microwave design houses are limping along by making minor updates to legacy programs, and in the process, keeping their limited engineering resources busy with paperwork.

Read More

Security hypervisor

Hypervisor – Part 1

The Engineers in Mercury’s SMP department have been adding to Mercury’s many capabilities and offerings on both Mercury’s 6U and 3U product lines. I will be featuring some of these over the next few weeks and months to show the commitment and ingenuity that our engineers have for our customers’ needs. One of these capabilities is the availability of Hypervisor. Development, Quality and Test Engineers have been looking for this type of capability on these platforms for a long time. With this product, you are able to control the level of security, isolation, authentication and protection to critical software, hardware and components within your system. You determine what level, depending on your or your customer’s needs. Read More

Military-Grade Solid State Drives

Military-Grade Secure Solid State Drives Part 1: Hollywood Imagination or Reality?

This message will self-destruct in five seconds…

Who knew that concept was anything but Hollywood imagination?  It is very real, particularly in today’s modern threat environment.  Protection including destruction of mission critical data has never been more relevant to the success of our military and government forces.

As our adversaries become more skilled in hacking and reverse-engineering, the impact of stolen or captured mission, classified, secret or top secret data can be catastrophic. Military systems and networks must continually incorporate innovative security protocols to combat the bombardment of attacks. Whether in forward-deployed unmanned systems or laptops used in office environments, data security must be in the forefront of design all the way down to the microelectronics.  Military grade microelectronics, including solid state drives, must embed security at the lowest level with sophisticated algorithms and design techniques.  Security cannot be bolted on.   When these capabilities are coupled with trusted design and manufacturing disciplines, military grade SSDs provide an unparalleled approach to data security.

In this blog I’ll address how Mercury is uniquely positioned as the trailblazer of secure military grade SSDs through our leading edge technologies and business practices.  In my upcoming posts Encryption Decoded and Diamonds are Forever. Encryption Keys Last Longer, I’ll explore the security advancements in military-grade secure SSDs.

MRCY Blog Banner

Welcome to the MRCY Blog!

Deuteronomy Rabbah said, “In vain have you acquired knowledge if you fail to impart it to others.” So with this blog, consider us doing our part!

Through the MRCY blog, we are pleased to bring you content and perspective from some of our own. You’ll hear from a multitude of subject matter experts – everyone from our CEO, to engineers, to marketers, like me – on a variety of topics including RF/M, secure storage, mission computing, avionics, software and AI, secure processing, company culture, engagement and so much more.

We’ll enable commenting soon and when we do, we encourage you to join the conversation, ask questions and request specific topics. We’re looking forward to hearing from you! Bear in mind, we’ll reserve the right to remove comments containing profanity, spam, and/or obscene, indecent, sexually explicit and discriminatory materials. We’ll also reserve the right to remove false, misleading, infringing, or unlawful material or information and anything protected by intellectual property rights (unless you control the rights or have received necessary consent).

Now that that’s out of the way, we’re ready to go. Enjoy!

Sincerely, -Tarrah