<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

Blogs by Trenton Systems

Seas of Change: How Virtualization and Containerization are Revolutionizing Naval Operations

Seas of Change: How Virtualization and Containerization are Revolutionizing Naval Operations

As systems across all domains of the battlespace become increasingly software-based, virtualization and containerization will play a critical role in their implementation. In this blog, you will learn more about the differences between virtualization and containerization, how they pla …

Read Story

PCIe 5.0 and CXL: A Technical Breakdown for Naval Operations

PCIe 5.0 and CXL: A Technical Breakdown for Naval Operations

As virtualization and containerization increase in use for modern naval operations, compute architectures must handle the increased speeds and feeds required to move from hardware-based systems to software-based systems. In this blog, you will learn more about how PCIe 5.0 and CXL can …

Read Story

What is an end-to-end (E2E) solution?

What is an end-to-end (E2E) solution?

The increasing complexity of modern systems and the need for seamless integration between hardware and software components have led to the growing popularity of end-to-end solutions.

Read Story

What are the different types of cross-domain solutions?

What are the different types of cross-domain solutions?

Because different environments have different security requirements, the security measures needed to protect sensitive information must vary. To this end, there are different kinds of cross-domain solutions that can be used to fit the circumstances. In this blog, you'll learn more abo …

Read Story

Five Common Challenges Posed by Air Gaps, and How They Can Be Solved

Five Common Challenges Posed by Air Gaps, and How They Can Be Solved

While air gaps are a reliable means of protecting against cyberthreats, there are several challenges associated with their use that may warrant investing in additional measures to secure computing and network architectures. In this blog, you'll learn more about what air gaps are, the …

Read Story

Virtualization vs. Containerization: What's the Difference?

Virtualization vs. Containerization: What's the Difference?

As systems across the commercial, military, and critical infrastructure sectors become increasingly software-based, virtualization and containerization will play a key role in their implementation. In this blog, you will learn more about the differences between virtualization and cont …

Read Story

What is mixed criticality?

What is mixed criticality?

Systems for the military, DoD, and critical infrastructure sectors run complex applications and services with different levels of criticality. This requires that workloads be isolated from one another to reduce interference or intrusion. In this blog, you'll learn more about what mixe …

Read Story

What is an FPGA (Field Programmable Gate Array)?

What is an FPGA (Field Programmable Gate Array)?

Due to the complex, data intensive nature of HPC workloads, computing infrastructures must be equipped to accelerate and enhance these tasks while being tailored to an end user's application needs. In this blog, you'll learn more about what an FPGA is, how it works, various use cases, …

Read Story

Integrating SATCOM with 5G: What You Need to Know

Integrating SATCOM with 5G: What You Need to Know

While 5G offers high-speed wireless connectivity with low latency, it has certain limitations that make it less suitable for long-distance military communication and data transfer needs. In this blog, you'll learn more about why SATCOM is being integrated within the 5G ecosystem, how …

Read Story

Trenton Systems partners with Raytheon to bolster resilient, zero-trust architected computing

Trenton Systems partners with Raytheon to bolster resilient, zero-trust architected computing

Read Story

Subscribe by email