<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

Blogs by Trenton Systems

Why the Armed Forces Must Prioritize Secure, Made-In-USA GPU Computers

This is a graphic showcasing NVIDIA GPUs and Trenton rugged computers superimposed over a military/space background. NVIDIA's and Trenton Systems' logos are also pictured.

Graphic: GPU-intensive AI is and will continue to be an integral part of many military deployments. Bearing this in mind, It's crucial that the Armed Forces prioritize the procurement and acquisition of cybersecure, made-in-USA GPU computing platforms that defend the integrity of mili …

Read Story

Trenton Systems welcomes Robert Haag as Executive Vice President

Robert Haag, Trenton Systems' Executive Vice President.

Photo: Robert (Bob) Haag, Trenton Systems' new Executive Vice President Lawrenceville, Georgia, Wednesday, May 19, 2021 - Trenton Systems is pleased to announce and welcome Robert Haag as its new Executive Vice President. Haag will be responsible for working across the company to help …

Read Story

What is NVMe? A Guide to Non-Volatile Memory Express

An NVMe M.2 SSD, for high-speed, PCIe-based data storage

Photo: An M.2 NVMe SSD, for used high-speed, PCIe-based reading and writing of data Non-volatile storage media has long been one of the most restrictive bottlenecks in high-performance computing. Humanity generates 2.5 quintillion bytes of data daily. That data has to be stored somewh …

Read Story

Symmetric vs. Asymmetric Encryption: What's the Difference?

This is a graphic that reads "symmetric vs. asymmetric encryption."

Graphic: In this blog post, we discuss the differences between symmetric encryption, a single-key encryption technique, and asymmetric encryption, also known as public-key cryptography, which uses private- and public-key pairs of encryption keys. To transmit a key or not to transmit a …

Read Story

Subscribe by email