<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">
Brett Daniel

Brett Daniel

Brett Daniel is Trenton Systems' content marketer.

Posts by Brett Daniel

Edge Computing vs. Fog Computing: Is There a Real Difference?

A series of network connections

Graphic: Edge computing is here to stay. Are you prepared for the changes it will bring? Table of Contents Background: the Internet of Things (IoT) & cloud computing are driving the edge The benefits of edge computing/fog computing Edge computing vs. fog computing: Is there an act …

Read Story

Trenton Systems supplies Lockheed Martin with $500,000 computer systems provision for Aegis Combat System

A Trenton PCIe backplane and Trenton processor board superimposed over a navy background

Graphic: Trenton Systems is continuing its long-term support for the Aegis Combat System with a recent $500,000 provision. Trenton Systems, a manufacturer of cybersecure, rugged, made-in-USA computing solutions, has supplied Lockheed Martin with $500,000 worth of high-performance comp …

Read Story

Trenton Systems supplies L3Harris with SFF mission computer in multimillion-dollar provision for DoD aircraft program

A TAC embedded computer, manufactured by Trenton Systems, surrounded by military aircraft at the tactical edge

Graphic: a Tactical Advanced Computer (TAC) system, coming soon Trenton Systems, a manufacturer of cybersecure, rugged, made-in-USA computing solutions, is supplying its Tactical Advanced Computer (TAC) to L3Harris Technologies in a multimillion-dollar provision for a Department of De …

Read Story

In-House vs. Outsourced Technical Support: The Pros & Cons

A team of technical support agents in uniform

The unfortunate has happened. You've encountered a problem with your computer. You go to the manufacturer's website and navigate to the support page. You dial the number listed. You get the company's automated customer assistance system, which forces you to state a series of commands …

Read Story

What Are Embedded Systems?

Embedded systems

Photo: Discover whether an embedded system is right for your program or application. As the demand for faster and more efficient high-performance computers increases, the dimensions of the form factors that contain them continue to decrease. For years now, computer engineers have been …

Read Story

Trenton Systems announces development of Tactical Advanced Computer (TAC) family

A photo of a Tactical Advanced Computer (TAC)

Read Story

What Is Zero Trust Security?

Abstract representation of zero trust computing systems distributed throughout a metropolitan area

Graphic: We're hearing more and more about zero trust security, but why? Table of Contents What is zero trust? How does zero trust work? How do you achieve zero trust? Why do we need zero trust? Is adopting zero trust unrealistic? Why is a zero trust architecture ultimately more effec …

Read Story

Trenton Systems welcomes Robert Haag as Executive Vice President

Robert Haag, Trenton Systems' Executive Vice President.

Photo: Robert (Bob) Haag, Trenton Systems' new Executive Vice President Lawrenceville, Georgia, Wednesday, May 19, 2021 - Trenton Systems is pleased to announce and welcome Robert Haag as its new Executive Vice President. Haag will be responsible for working across the company to help …

Read Story

Symmetric vs. Asymmetric Encryption: What's the Difference?

This is a graphic that reads "symmetric vs. asymmetric encryption."

Graphic: In this blog post, we discuss the differences between symmetric encryption, a single-key encryption technique, and asymmetric encryption, also known as public-key cryptography, which uses private- and public-key pairs of encryption keys. To transmit a key or not to transmit a …

Read Story

What Is FIPS 140-2?

A custom cryptographic padlock symbolizing FIPS 140-2 encryption

Graphic: The official name for FIPS 140-2 is "Security Requirements for Cryptographic Modules." Table of Contents What is FIPS 140-2? What does it mean to be compliant with FIPS 140-2? How do FIPS 140-2 levels work? How do you become compliant with FIPS 140-2? What algorithms are comp …

Read Story

Subscribe by email