Blogs & Podcasts
Cloud, Fog and Edge Computing for Defense Applications.
Shaza KhanMarch 5, 2019
Read MoreFebruary 27, 2019
Read MoreIn my prior three posts, I provided an overview of encryption key fundamentals and the various encryption key mode strategies that can be implemented in a Mercury secure SSD. If you did not read those, stop everything and go back to them now!
Jennifer KeenanMarch 8, 2019
Read MoreIn military environments, seconds can be the difference between life or death and mission success or failure. A soldier in hostile territory needs their mobile system to rapidly process sensor data to accurately analyze threats and take action. Intelligent sensor systems using artificial intelligence (AI) to make automatic critical decisions without human intervention rely on […]
Jennifer KeenanMarch 14, 2019
Read More