Securing the Computer Supply Chain with Design & Life Cycle Management
by Jason Barr on Jun 29, 2021 10:26:50 AM
Photo: Rigorously managing the computer design and life cycle management processes should be a primary focus in every high-performance computer manufacturer's supply chain security plan. Recent high-profile security breaches in government and industry have underscored the importance o …
Computers Made in the USA: Why Should It Matter to Non-USA Customers?
by Philippe Weber on Jun 3, 2021 1:45:46 PM
Graphic: Trenton Systems has customers around the world, so we feel it's important to explain what purchasing a truly made-in-USA computer means for their programs and applications. What does "made by Trenton Systems in the USA" mean for non-USA customers? Yes, Trenton Systems designs …
What Is Zero Trust Security?
by Brett Daniel on Jun 1, 2021 10:20:51 AM
Graphic: We're hearing more and more about zero trust security, but why? Table of Contents What is zero trust? How does zero trust work? How do you achieve zero trust? Why do we need zero trust? Is adopting zero trust unrealistic? Why is a zero trust architecture ultimately more effec …
Why the Armed Forces Must Prioritize Secure, Made-In-USA GPU Computers
by Robert Haag on May 21, 2021 8:34:43 AM
Graphic: GPU-intensive AI is and will continue to be an integral part of many military deployments. Bearing this in mind, It's crucial that the Armed Forces prioritize the procurement and acquisition of cybersecure, made-in-USA GPU computing platforms that defend the integrity of mili …
Trenton Systems welcomes Robert Haag as Executive Vice President
by Brett Daniel on May 19, 2021 9:31:32 AM
Photo: Robert (Bob) Haag, Trenton Systems' new Executive Vice President Lawrenceville, Georgia, Wednesday, May 19, 2021 - Trenton Systems is pleased to announce and welcome Robert Haag as its new Executive Vice President. Haag will be responsible for working across the company to help …
What is NVMe? A Guide to Non-Volatile Memory Express
by Will Shirley on May 13, 2021 11:30:00 AM
Photo: An M.2 NVMe SSD, for used high-speed, PCIe-based reading and writing of data Non-volatile storage media has long been one of the most restrictive bottlenecks in high-performance computing. Humanity generates 2.5 quintillion bytes of data daily. That data has to be stored somewh …
Symmetric vs. Asymmetric Encryption: What's the Difference?
by Brett Daniel on May 4, 2021 9:30:00 AM
Graphic: In this blog post, we discuss the differences between symmetric encryption, a single-key encryption technique, and asymmetric encryption, also known as public-key cryptography, which uses private- and public-key pairs of encryption keys. To transmit a key or not to transmit a …
What Is FIPS 140-2?
by Brett Daniel on Apr 22, 2021 4:20:12 PM
Graphic: The official name for FIPS 140-2 is "Security Requirements for Cryptographic Modules." Table of Contents What is FIPS 140-2? What does it mean to be compliant with FIPS 140-2? How do FIPS 140-2 levels work? How do you become compliant with FIPS 140-2? What algorithms are comp …
System Hardening: An Easy-to-Understand Overview
by Brett Daniel on Apr 14, 2021 4:04:57 PM
Graphic: System hardening is all about protecting your server or workstation. Did you know that the U.S. government allocated an estimated $18.78 billion for cybersecurity spending in 2021? The reason why is made clear in the U.S. Department of Defense's Cyber Strategy Report: Competi …
Trenton Systems releases cybersecure 3U BAM Server
by Brett Daniel on Apr 6, 2021 11:00:00 AM
Photo: The 3U BAM Server Lawrenceville, Georgia, April 6, 2021 -- Trenton Systems, a manufacturer of cybersecure, rugged, made-in-USA computing solutions, has released its long-awaited 3U BAM Server, a dynamic, high-performance military computer designed to perform seamlessly at the e …