Trenton Systems supplies Lockheed Martin with $500,000 computer systems provision for Aegis Combat System
by Brett Daniel on Sep 27, 2021 10:08:32 AM
Graphic: Trenton Systems is continuing its long-term support for the Aegis Combat System with a recent $500,000 provision. Trenton Systems, a manufacturer of cybersecure, rugged, made-in-USA computing solutions, has supplied Lockheed Martin with $500,000 worth of high-performance comp …
Trenton Systems supplies L3Harris with SFF mission computer in multimillion-dollar provision for DoD aircraft program
by Brett Daniel on Sep 20, 2021 3:08:24 PM
Graphic: a Tactical Advanced Computer (TAC) system, coming soon Trenton Systems, a manufacturer of cybersecure, rugged, made-in-USA computing solutions, is supplying its Tactical Advanced Computer (TAC) to L3Harris Technologies in a multimillion-dollar provision for a Department of De …
In-House vs. Outsourced Technical Support: The Pros & Cons
by Brett Daniel on Aug 16, 2021 10:48:58 AM
The unfortunate has happened. You've encountered a problem with your computer. You go to the manufacturer's website and navigate to the support page. You dial the number listed. You get the company's automated customer assistance system, which forces you to state a series of commands …
What Are Embedded Systems?
by Brett Daniel on Jul 22, 2021 4:33:25 PM
Photo: Discover whether an embedded system is right for your program or application. As the demand for faster and more efficient high-performance computers increases, the dimensions of the form factors that contain them continue to decrease. For years now, computer engineers have been …
Trenton Systems announces development of Tactical Advanced Computer (TAC) family
by Brett Daniel on Jul 13, 2021 11:24:42 AM
What Is Zero Trust Security?
by Brett Daniel on Jun 1, 2021 10:20:51 AM
Graphic: We're hearing more and more about zero trust security, but why? Table of Contents What is zero trust? How does zero trust work? How do you achieve zero trust? Why do we need zero trust? Is adopting zero trust unrealistic? Why is a zero trust architecture ultimately more effec …
Trenton Systems welcomes Robert Haag as Executive Vice President
by Brett Daniel on May 19, 2021 9:31:32 AM
Photo: Robert (Bob) Haag, Trenton Systems' new Executive Vice President Lawrenceville, Georgia, Wednesday, May 19, 2021 - Trenton Systems is pleased to announce and welcome Robert Haag as its new Executive Vice President. Haag will be responsible for working across the company to help …
Symmetric vs. Asymmetric Encryption: What's the Difference?
by Brett Daniel on May 4, 2021 9:30:00 AM
Graphic: In this blog post, we discuss the differences between symmetric encryption, a single-key encryption technique, and asymmetric encryption, also known as public-key cryptography, which uses private- and public-key pairs of encryption keys. To transmit a key or not to transmit a …
What Is FIPS 140-2?
by Brett Daniel on Apr 22, 2021 4:20:12 PM
Graphic: The official name for FIPS 140-2 is "Security Requirements for Cryptographic Modules." Table of Contents What is FIPS 140-2? What does it mean to be compliant with FIPS 140-2? How do FIPS 140-2 levels work? How do you become compliant with FIPS 140-2? What algorithms are comp …
System Hardening: An Easy-to-Understand Overview
by Brett Daniel on Apr 14, 2021 4:04:57 PM
Graphic: System hardening is all about protecting your server or workstation. Did you know that the U.S. government allocated an estimated $18.78 billion for cybersecurity spending in 2021? The reason why is made clear in the U.S. Department of Defense's Cyber Strategy Report: Competi …