Blog
Electromagnetic spectrum superiority in modern defenseThe electromagnetic spectrum is an integral part of our daily lives, yet its complexity often goes unnoticed. In defense, the…
Mercury SystemsNovember 25, 2024
Read MoreVodcast
Delivering innovative technologies to support Army modernization and transformation effortsDr. Eric Gans, Mercury's business development director for advanced technology, shares how Mercury supports the U.S. Army…
Mercury SystemsNovember 8, 2024
Read MoreVodcast
Delivering processing innovation for the air and space domainsMercury’s chief operating officer, Roger Wells, sat down for an interview with Air & Space Forces Magazine to discuss the…
Mercury SystemsSeptember 13, 2024
Read MoreBlog
Seeing the unseen: How synthetic aperture radar is revolutionizing space and military operationsImagine a technology that allows you to see through clouds, darkness, and even soil. That’s the magic of synthetic aperture…
Shaza KhanSeptember 9, 2024
Read MoreFeatured
Blog
CHIPS Part 1: National security and the state of domestic chip manufacturingThe international chip-supply situation is putting U.S. security at risk and driving the need for the ...
March 8, 2023
Read MoreBlogs & Podcasts
By now, I’m sure both your work and personal email inboxes have overflowed with GDPR-initiated emails around “updated privacy policies” and new “we protect your data” messages. I know mine have.
Mercury SystemsJuly 3, 2018
Read MoreAt the end of last year, I had the privilege of attending the Reagan National Defense Forum in Simi Valley, CA. One of the topics that caught my attention was around the DoD’s new modernization strategy and how it would build off the upcoming National Defense Strategy to align DoD labs and innovation centers. According […]
Leadership TeamJuly 18, 2018
Read MoreWhat is the NSA hiding from us??? Hopefully all classified, secret and top secret data! As part of their recent initiative to leverage commercial technologies in a sophisticated layered approach, the NSA is enabling an alternative to traditional Type 1 security solutions for the protection of data up to the Top Secret level. By adopting […]
Jennifer KeenanJuly 6, 2018
Read More