Blogs and Podcasts
The people, ideas, trends and topics at the intersection of high tech and defense

BLOG MENU
Raising the bar: Why cross-domain solutions are critical to data security

Raising the bar: Why cross-domain solutions are critical to data security

Cross-domain solutions (CDSs) are a vital component when it comes to the security of our most important digital-based…

Mercury Systems

April 16, 2025

Read More
Electromagnetic spectrum superiority in modern defense

Blog

Electromagnetic spectrum superiority in modern defense

The electromagnetic spectrum is an integral part of our daily lives, yet its complexity often goes unnoticed. In defense, the…

Mercury Systems

November 25, 2024

Read More
Delivering innovative technologies to support Army modernization and transformation efforts

Vodcast

Delivering innovative technologies to support Army modernization and transformation efforts

Dr. Eric Gans, Mercury's business development director for advanced technology, shares how Mercury supports the U.S. Army…

Mercury Systems

November 8, 2024

Read More
Delivering processing innovation for the air and space domains

Vodcast

Delivering processing innovation for the air and space domains

Mercury’s chief operating officer, Roger Wells, sat down for an interview with Air & Space Forces Magazine to discuss the…

Mercury Systems

September 13, 2024

Read More
Blogs & Podcasts
The Military Digital Convergence

The Military Digital Convergence

Since the Wright Brothers first free-powered flight in 1903, air vehicles have relied upon discrete, analog sensors to supply the information required by their pilots. These sensors and their dashboard-clustered indicators may be regarded as the first and the analog approach to platform situational awareness.

John Bratton

March 5, 2019

Read More
Encryption Keys: The Cliffs Notes Version, Part 2

Encryption Keys: The Cliffs Notes Version, Part 2

In my first post of this series, I explained terms relating to encryption keys and the standards that exist governing encryption key algorithms. Now I will spend some time on ATA passwords and how they correlate to encryption keys.

Jennifer Keenan

February 15, 2019

Read More
Women in STEM

Women in STEM

A few months ago, Mercury partnered with the Society of Women Engineers to host our first Women in Technology Night at our headquarters in Andover. I was fortunate enough to have panelists Star Dargin, CEO of Star Leadership and Susan Macchia, Senior Manager at Endeavor Robotics join me in giving insight on our career progression, […]

Leadership Team

February 7, 2019

Read More