What is an FPGA (Field Programmable Gate Array)?
by Christopher Trick on Mar 24, 2023 10:51:57 AM
Due to the complex, data intensive nature of HPC workloads, computing infrastructures must be equipped to accelerate and enhance these tasks while being tailored to an end user's application needs. In this blog, you'll learn more about what an FPGA is, how it works, various use cases, …
Trenton Systems partners with Raytheon to bolster resilient, zero-trust architected computing
by Christopher Trick on Dec 15, 2022 10:58:19 AM
International prime contractor chooses Trenton Systems for autonomous maritime program
by Christopher Trick on Oct 16, 2022 3:00:00 PM
What is FIPS 140-3?
by Christopher Trick on Oct 12, 2022 3:12:44 PM
With advanced cyberattacks on the rise, technology that handles and encrypts critical data must be secure and reliable at all times, at all levels. In this blog, you'll learn more about FIPS 140-3, why it's important, and how it differs from FIPS 140-2 to enhance protection of data-at …
What is a Cross Domain Solution (CDS)?
by Christopher Trick on Sep 21, 2022 9:08:47 AM
Data often moves between areas with varying classification and security levels, prompting the need for a solution that can guard critical data, irrespective of where it is traveling, from unauthorized access. In this blog, you'll learn what a cross domain solution (CDS) is, how it wor …
Intel® PFR, SGX, and TME in Action: Use Cases and Applications
by Christopher Trick on Sep 7, 2022 12:18:44 PM
As cyberattacks increase in sophistication, security measures must evolve to boost protection against these ever-evolving threats to create a secure foundation, guard workloads, and enhance software resilience. In this blog, we'll take a look at three Intel® hardware-enabled technolog …
Top Cybersecurity Technologies for 2023
by Christopher Trick on Mar 23, 2022 9:00:00 AM
As our world becomes increasingly digitized, protecting critical mission systems across the hardware, firmware, and software layer stack is vital. In this blog, you'll learn about the technologies necessary to secure your high-performance computing solutions (HPCs) against unauthorize …
How to Secure Your Operating System (OS)
by Christopher Trick on Mar 22, 2022 9:13:31 AM
Failure to protect your operating system, perhaps the most important software on a computer, can lead to various kinds of cyberattacks, impeding performance and compromising critical data. In this blog, you'll learn how to secure your OS in order to protect its confidentiality, functi …
What is Full-Disk Encryption (FDE)?
by Christopher Trick on Mar 22, 2022 9:12:50 AM
Disks and drives store massive amounts of critical data, making their security against cybercriminals a top priority. In this blog, you'll learn what full-disk encryption (FDE) is and why it is critical to the protection of an entire disk volume and all files on a drive against unauth …
What is IPMI? A Guide to Intelligent Platform Management Interface
by Christopher Trick on Mar 21, 2022 11:03:45 AM
A BMC (Baseboard Management Controller), which is an embedded computer that can access and control all of a server's resources, uses remote management capabilities to increase efficiency but can be hacked at any time, posing security risks. In this blog, you'll learn what IPMI (Intell …