The simple solution for big data is all-flash, network-attached rugged data storage capable of handling multi-petabytes of data.
Recommended
Learn about Mercury's data recorder solutions for sophisticated technologies to manage and analyze vast amounts of data, which is increasingly critical for defense and security operations in space.
Mercury and VAST Data Federal bring commercial data center innovation to aerospace and defense, enabling the rapid transformation of data into decisions at the edge.
Transforming into a multi-domain force requires modernizing an entire helicopter fleet. Determining the onboard technology needed for Future Vertical Lift is one piece of the development puzzle....
The RDS system from Mercury Systems delivers VAST's Universal Storage in an all-flash, ruggedized edge system to enable fast and reliable access to big data, AI, and machine learning.
Mercury and VAST make cutting-edge data center technology available for defense and other harsh-environment applications, enabling low-latency processing, scalability and data security in the field.
Development Tactics and Techniques for Small Form Factor RF Signal Recorders
Mercury supports the most critical application development with signal chain solutions from a single vendor that can be integrated with interchangeable tuners, data acquisition cards and recorder...
Mercury's lightweight, rugged, radiation-tolerant NAND flash components are furthering space imaging missions in LEO, MEO and GEO with reliable data storage. Learn more in this white paper.
Explore our portfolio of rugged, high-density solid-state drives and radiation-tolerant data recorders with our quick reference guide detailing the size, organization, data rate and more.
I used to work for a company that required us to remove any proprietary data from our laptop hard drive prior to traveling to some countries overseas. I didn’t know if it was because they could...
NAND flash, packaged as a Solid State Drives (SSD), are now a common component in defense equipment. Add security and SSDs become the ideal big-data secure storage solution for defense application.
Imagine a US operative on a covert mission is comprised in enemy territory. His laptop, now in the hands of the enemy, contains highly sensitive data stored on the factory-installed SSD and...
In my first post of this series, I explained terms relating to encryption keys and the standards that exist governing encryption key algorithms. Now I will spend some time on ATA passwords and how...
In the first two posts of this series, I reviewed fundamental terms and concepts of encryption key classifications and discussed roles of passwords versus keys and hash algorithms. In this post,...
In my prior three posts, I provided an overview of encryption key fundamentals and the various encryption key mode strategies that can be implemented in a Mercury secure SSD. If you did not read...
Maximum protection, and full compliance with CSfC program guidelines, can only be achieved with proven diversity in the selection of security components.
Only by understanding the mechanics of the various key management mode methodologies can the military system architect choose the optimal strategy for each mission or program.
Have you ever forgotten your password for your work laptop and had to go to your IT guy for help to reset it? Imagine if it was that easy when the data on the hard drive was classified or top...
This message will self-destruct in five seconds… Who knew that concept was anything but Hollywood imagination? It is very real, particularly in today’s modern threat environment. Protection...
In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result...