<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

Blogs by Trenton Systems

Securing the Computer Supply Chain with Design & Life Cycle Management

A supply chain technician looks at a computer screen while holding a processor board

Photo: Rigorously managing the computer design and life cycle management processes should be a primary focus in every high-performance computer manufacturer's supply chain security plan. Recent high-profile security breaches in government and industry have underscored the importance o …

Read Story

Computers Made in the USA: Why Should It Matter to Non-USA Customers?

A person points toward the USA on a world map

Graphic: Trenton Systems has customers around the world, so we feel it's important to explain what purchasing a truly made-in-USA computer means for their programs and applications. What does "made by Trenton Systems in the USA" mean for non-USA customers? Yes, Trenton Systems designs …

Read Story

What Is Zero Trust Security?

Abstract representation of zero trust computing systems distributed throughout a metropolitan area

Graphic: We're hearing more and more about zero trust security, but why? Table of Contents What is zero trust? How does zero trust work? How do you achieve zero trust? Why do we need zero trust? Is adopting zero trust unrealistic? Why is a zero trust architecture ultimately more effec …

Read Story

Why the Armed Forces Must Prioritize Secure, Made-In-USA GPU Computers

This is a graphic showcasing NVIDIA GPUs and Trenton rugged computers superimposed over a military/space background. NVIDIA's and Trenton Systems' logos are also pictured.

Graphic: GPU-intensive AI is and will continue to be an integral part of many military deployments. Bearing this in mind, It's crucial that the Armed Forces prioritize the procurement and acquisition of cybersecure, made-in-USA GPU computing platforms that defend the integrity of mili …

Read Story

Trenton Systems welcomes Robert Haag as Executive Vice President

Robert Haag, Trenton Systems' Executive Vice President.

Photo: Robert (Bob) Haag, Trenton Systems' new Executive Vice President Lawrenceville, Georgia, Wednesday, May 19, 2021 - Trenton Systems is pleased to announce and welcome Robert Haag as its new Executive Vice President. Haag will be responsible for working across the company to help …

Read Story

What is NVMe? A Guide to Non-Volatile Memory Express

An NVMe M.2 SSD, for high-speed, PCIe-based data storage

Photo: An M.2 NVMe SSD, for used high-speed, PCIe-based reading and writing of data Non-volatile storage media has long been one of the most restrictive bottlenecks in high-performance computing. Humanity generates 2.5 quintillion bytes of data daily. That data has to be stored somewh …

Read Story

Symmetric vs. Asymmetric Encryption: What's the Difference?

This is a graphic that reads "symmetric vs. asymmetric encryption."

Graphic: In this blog post, we discuss the differences between symmetric encryption, a single-key encryption technique, and asymmetric encryption, also known as public-key cryptography, which uses private- and public-key pairs of encryption keys. To transmit a key or not to transmit a …

Read Story

What Is FIPS 140-2?

A custom cryptographic padlock symbolizing FIPS 140-2 encryption

Graphic: The official name for FIPS 140-2 is "Security Requirements for Cryptographic Modules." Table of Contents What is FIPS 140-2? What does it mean to be compliant with FIPS 140-2? How do FIPS 140-2 levels work? How do you become compliant with FIPS 140-2? What algorithms are comp …

Read Story

System Hardening: An Easy-to-Understand Overview

System hardening is all about protecting your server or workstation.

Graphic: System hardening is all about protecting your server or workstation. Did you know that the U.S. government allocated an estimated $18.78 billion for cybersecurity spending in 2021? The reason why is made clear in the U.S. Department of Defense's Cyber Strategy Report: Competi …

Read Story

Trenton Systems releases cybersecure 3U BAM Server

The secure 3U BAM Server by Trenton Systems

Photo: The 3U BAM Server Lawrenceville, Georgia, April 6, 2021 -- Trenton Systems, a manufacturer of cybersecure, rugged, made-in-USA computing solutions, has released its long-awaited 3U BAM Server, a dynamic, high-performance military computer designed to perform seamlessly at the e …

Read Story

Subscribe by email