<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

Blogs by Trenton Systems

Trenton Systems welcomes Robert Haag as Executive Vice President

Robert Haag, Trenton Systems' Executive Vice President.

Photo: Robert (Bob) Haag, Trenton Systems' new Executive Vice President Lawrenceville, Georgia, Wednesday, May 19, 2021 - Trenton Systems is pleased to announce and welcome Robert Haag as its new Executive Vice President. Haag will be responsible for working across the company to help …

Read Story

What is NVMe? A Guide to Non-Volatile Memory Express

An NVMe M.2 SSD, for high-speed, PCIe-based data storage

Photo: An M.2 NVMe SSD, for used high-speed, PCIe-based reading and writing of data Non-volatile storage media has long been one of the most restrictive bottlenecks in high-performance computing. Humanity generates 2.5 quintillion bytes of data daily. That data has to be stored somewh …

Read Story

Symmetric vs. Asymmetric Encryption: What's the Difference?

This is a graphic that reads "symmetric vs. asymmetric encryption."

Graphic: In this blog post, we discuss the differences between symmetric encryption, a single-key encryption technique, and asymmetric encryption, also known as public-key cryptography, which uses private- and public-key pairs of encryption keys. To transmit a key or not to transmit a …

Read Story

What Is FIPS 140-2?

A custom cryptographic padlock symbolizing FIPS 140-2 encryption

Graphic: The official name for FIPS 140-2 is "Security Requirements for Cryptographic Modules." Table of Contents What is FIPS 140-2? What does it mean to be compliant with FIPS 140-2? How do FIPS 140-2 levels work? How do you become compliant with FIPS 140-2? What algorithms are comp …

Read Story

System Hardening: An Easy-to-Understand Overview

System hardening is all about protecting your server or workstation.

Graphic: System hardening is all about protecting your server or workstation. Did you know that the U.S. government allocated an estimated $18.78 billion for cybersecurity spending in 2021? The reason why is made clear in the U.S. Department of Defense's Cyber Strategy Report: Competi …

Read Story

Trenton Systems releases cybersecure 3U BAM Server

The secure 3U BAM Server by Trenton Systems

Photo: The 3U BAM Server Lawrenceville, Georgia, April 6, 2021 -- Trenton Systems, a manufacturer of cybersecure, rugged, made-in-USA computing solutions, has released its long-awaited 3U BAM Server, a dynamic, high-performance military computer designed to perform seamlessly at the e …

Read Story

Everything You Need to Know About PCIe 4.0

This is a photo of PCIe slots on a motherboard.

Photo: PCIe slots on a motherboard Table of Contents What is PCIe 4.0? What does PCIe 4.0 do? When will PCIe 4.0 come out? What's the difference between PCIe 4.0. and PCIe 3.0? Is PCIe 4.0 backward compatible? Is PCIe 4.0 worth the upgrade? Conclusion: Upgrade to PCIe Gen 4 with Trent …

Read Story

What Is Intel VROC (Virtual RAID on CPU)?

These are photos of a Trenton Systems server and JBOD storage enclosure with an "Intel Xeon Inside" logo in the middle, superimposed over an abstract data background.

Graphic: Intel Virtual RAID on CPU (VROC) lets you manage your RAID storage without any additional hardware or the need to sacrifice a precious PCIe slot. When it comes to choosing a RAID storage solution for your server or workstation, there's a lot to consider. How many drives can g …

Read Story

Trenton Systems Supplies 500+ Rugged Computers for Military SATCOM

This is a photo of a Trenton Systems 2U server and Trenton Systems logo superimposed over a military satellite communications background.

Graphic: Trenton Systems has supplied hundreds of secure rugged computers to a major technology company in support of an Army SATCOM program. Trenton Systems has supplied more than 500 2U rugged computers with Trenton-custom Windows Management Instrumentation (WMI) software to a major …

Read Story

Computer Security: Guarding Hardware, Firmware, Software Holistically

This is a photo of a lock on a piece of computer hardware.

Graphic: Trenton Systems and its security partners strongly believe in comprehensive cybersecurity solutions, starting with the hardware that underlies your server or workstation. Recent high-profile cyberattacks and shocking revelations about supply chain security are causing militar …

Read Story

Subscribe by email