Brett Daniel is Trenton Systems' content marketer. You can reach him at bdaniel@trentonsystems.com.
Recent Posts by Brett Daniel:
by Brett Daniel, on Sep 27, 2021 10:08:32 AM
Graphic: Trenton Systems is continuing its long-term support for the Aegis Combat System with a recent $500,000 provision. Trenton Systems, a manufacturer of cybersecure, rugged, made-in-USA computing solutions, has supplied …
Read Storyby Brett Daniel, on Sep 20, 2021 3:08:24 PM
Graphic: a Tactical Advanced Computer (TAC) system, coming soon Trenton Systems, a manufacturer of cybersecure, rugged, made-in-USA computing solutions, is supplying its Tactical Advanced Computer (TAC) to L3Harris Technologies in …
Read Storyby Brett Daniel, on Aug 16, 2021 10:48:58 AM
Photo: It's no mistake that some companies prefer in-house over outsourced technical support teams and vice versa. We'll explore the pros and cons of both in this blog post. The …
Read Storyby Brett Daniel, on Jul 22, 2021 4:33:25 PM
Photo: Discover whether an embedded system is right for your program or application. As the demand for faster and more efficient high-performance computers increases, the dimensions of the form factors …
Read Storyby Brett Daniel, on Jul 13, 2021 11:24:42 AM
Graphic: TAC mission systems, a family of small-form-factor embedded computers Trenton Systems, a manufacturer of cybersecure, ruggedized, made-in-USA computing solutions, is pleased to announce the development of the Tactical Advanced …
Read Storyby Brett Daniel, on Jun 1, 2021 10:20:51 AM
Graphic: We're hearing more and more about zero trust security, but why? Table of Contents What is zero trust? How does zero trust work? How do you achieve zero trust? …
Read Storyby Brett Daniel, on May 19, 2021 9:31:32 AM
Photo: Robert (Bob) Haag, Trenton Systems' new Executive Vice President Lawrenceville, Georgia, Wednesday, May 19, 2021 - Trenton Systems is pleased to announce and welcome Robert Haag as its new …
Read Storyby Brett Daniel, on May 4, 2021 9:30:00 AM
Graphic: In this blog post, we discuss the differences between symmetric encryption, a single-key encryption technique, and asymmetric encryption, also known as public-key cryptography, which uses private- and public-key pairs …
Read Storyby Brett Daniel, on Apr 22, 2021 4:20:12 PM
Graphic: The official name for FIPS 140-2 is "Security Requirements for Cryptographic Modules." Table of Contents What is FIPS 140-2? What does it mean to be compliant with FIPS 140-2? …
Read Storyby Brett Daniel, on Apr 14, 2021 4:04:57 PM
Graphic: System hardening is all about protecting your server or workstation. Did you know that the U.S. government allocated an estimated $18.78 billion for cybersecurity spending in 2021? The reason …
Read StoryOur blogs cover the latest ruggedized computing news and company updates.