Blogs & Podcasts
At a high level, the vast majority of contemporary compute processing hardware may be divided into two domains: powerful data center processors and smaller, embedded devices. Embedded devices have the support of their data center big brothers via a network connection, giving them access to big data applications
John BrattonJanuary 23, 2019
Read MoreFrom the interview process to now working at Mercury, I’ve found that the company holds true to its high ratings on Glassdoor. I interviewed in person at the San Jose office for my first post-graduation role. There were many aspects I enjoyed about the interview, but the honesty, energy, and thoughtfulness in the questions asked really […]
Jacky HuynhFebruary 7, 2019
Read MoreA few months ago, Mercury partnered with the Society of Women Engineers to host our first Women in Technology Night at our headquarters in Andover. I was fortunate enough to have panelists Star Dargin, CEO of Star Leadership and Susan Macchia, Senior Manager at Endeavor Robotics join me in giving insight on our career progression, […]
Leadership TeamFebruary 7, 2019
Read MoreIn my first post of this series, I explained terms relating to encryption keys and the standards that exist governing encryption key algorithms. Now I will spend some time on ATA passwords and how they correlate to encryption keys.
Jennifer KeenanFebruary 15, 2019
Read More