<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">
Brett Daniel

Brett Daniel

Brett Daniel is Trenton Systems' content marketer. You can reach him at bdaniel@trentonsystems.com.

Recent Posts by Brett Daniel:

by Brett Daniel, on Jul 22, 2021 4:33:25 PM

Photo: Discover whether an embedded system is right for your program or application. As the demand for faster and more efficient high-performance computers increases, the dimensions of the form factors …

Read Story
Topics:embedded computersembedded systemsWhat are embedded systems?

by Brett Daniel, on Jul 13, 2021 11:24:42 AM

Graphic: TAC mission systems, a family of small-form-factor embedded computers Trenton Systems, a manufacturer of cybersecure, ruggedized, made-in-USA computing solutions, is pleased to announce the development of the Tactical Advanced …

Read Story
Topics:Mission-critical systemsTactical Advanced Computer (TAC)embedded computersembedded systemsmission computers

by Brett Daniel, on Jun 1, 2021 10:20:51 AM

Graphic: We're hearing more and more about zero-trust security, but why? BUZZ! BUZZ! BUZZ! The intrusive buzzing of the latest cybersecurity buzzword, “zero trust,” is almost palpable. It’s evident why …

Read Story
Topics:zero trustzero trust networkzero trust architecture

by Brett Daniel, on May 19, 2021 9:31:32 AM

Photo: Robert (Bob) Haag, Trenton Systems' new Executive Vice President Lawrenceville, Georgia, Wednesday, May 19, 2021 - Trenton Systems is pleased to announce and welcome Robert Haag as its new …

Read Story
Topics:Trenton SystemsLeadershipPress Release

by Brett Daniel, on May 4, 2021 9:30:00 AM

Graphic: In this blog post, we discuss the differences between symmetric encryption, a single-key encryption technique, and asymmetric encryption, also known as public-key cryptography, which uses private- and public-key pairs …

Read Story
Topics:EncryptionSymmetric encryptionAsymmetric encryption

by Brett Daniel, on Apr 22, 2021 4:20:12 PM

Graphic: The official name for FIPS 140-2 is "Security Requirements for Cryptographic Modules." Table of Contents What is FIPS 140-2? What does it mean to be compliant with FIPS 140-2? …

Read Story
Topics:Federal Information Processing Standards (FIPS)FIPS 140-2

by Brett Daniel, on Apr 14, 2021 4:04:57 PM

Graphic: System hardening is all about protecting your server or workstation. Did you know that the U.S. government allocated an estimated $18.78 billion for cybersecurity spending in 2021? The reason …

Read Story
Topics:CybersecuritySystem hardeningSystem hardening best practices

by Brett Daniel, on Apr 6, 2021 11:00:00 AM

Photo: The 3U BAM Server Lawrenceville, Georgia, April 6, 2021 -- Trenton Systems, a manufacturer of cybersecure, rugged, made-in-USA computing solutions, has released its long-awaited 3U BAM Server, a dynamic, high-performance military computer designed …

Read Story
Topics:Rugged computersRugged serversIntelCybersecurityEdge serversPlatform Firmware Resilience (PFR)software securityhardware securityfirmware security3U BAM ServerSoftware Guard Extensions (SGX)

by Brett Daniel, on Mar 31, 2021 4:36:39 PM

Graphic: The Advanced Encryption Standard, or AES, is the modern gold standard for data encryption. We'll answer your frequently asked questions and tell you everything you need to know in …

Read Story
Topics:EncryptionAdvanced Encryption Standard (AES)AES encryption

by Brett Daniel, on Mar 23, 2021 2:30:00 PM

Photo: PCIe slots on a motherboard Table of Contents What is PCIe 4.0? What does PCIe 4.0 do? When will PCIe 4.0 come out? What's the difference between PCIe 40 …

Read Story
Topics:Peripheral Component Interconnect Express (PCIe)PCIe 4.0

Trenton Systems Blog

Our blogs cover the latest ruggedized computing news and company updates.

More...

Subscribe to Updates