Category: BUYSEMPERFI

  • Top 15 Siouxland Public Media Podcasts You Must Follow in 2021


    1. Morning Edition

    Sioux City, Iowa, United States About Podcast NPR’s Morning Edition is the best way to begin your day! News, sports, business news and features, hosted by Steve Inskeep and Renee Montagne. Frequency 7 episodes / day Podcast kwit.org/programs/morning-ed..
    Twitter followers 410 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact

    2. Siouxland Public Media News

    Siouxland Public Media News

    Sioux City, Iowa, United States About Podcast Your daily dose of local news. Frequency 30 episodes / month Podcast kwit.org/programs/siouxland-..
    Twitter followers 410 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact

    3. Siouxland Public Media Interviews and Features

    Siouxland Public Media Interviews and Features

    Sioux City, Iowa, United States About Podcast We talk with the people in our community who are making art, news, music, and more. Frequency 23 episodes / month Podcast kwit.org/programs/siouxland-..
    Twitter followers 410 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact

    4. Siouxland Public Media News: Oromo

    Siouxland Public Media News: Oromo

    Sioux City, Iowa, United States About Podcast News for the Siouxland region in Oromo. Produced in partnership with the Mary J Treglia Community House . Frequency 30 episodes / month Podcast kwit.org/programs/siouxland-..
    Twitter followers 410 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact

    5. Weekend Edition

    Weekend Edition

    Sioux City, Iowa, United States About Podcast Weekend Edition is NPR’s weekend morning news program, featuring the latest headlines and news features. Frequency 13 episodes / month Podcast kwit.org/programs/weekend-ed..
    Twitter followers 410 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact

    6. Wait, Wait, Don’t Tell Me

    Wait, Wait, Don't Tell Me

    Sioux City, Iowa, United States About Podcast Wait Wait… Don’t Tell Me ! is NPR’s weekly hour-long quiz program. Each week on the radio you can test your knowledge against some of the best and brightest in the news and entertainment world while figuring out what’s real news and what’s made up. On the Web, you can play along too. Frequency 18 episodes / month Podcast kwit.org/programs/wait-wait-..
    Twitter followers 410 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact

    7. Ten O’clock Blues

    Ten O'clock Blues

    Sioux City, Iowa, United States About Podcast Nighttime is the right time to have the blues and KWIT-KOJI dutifully brings them to you each Saturday Evening with ‘Stumpy’ Steve Smith and the 10 O’Clock Blues. Frequency 19 episodes / quarter Podcast kwit.org/programs/ten-oclock..
    Twitter followers 410 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact

    8. Small Wonders

    Small Wonders

    Sioux City, Iowa, United States About Podcast Browse the Small Wonders Collection at the Siouxland Public Media store. Frequency 29 episodes / quarter Podcast kwit.org/programs/small-wonders
    Facebook fans 2.6K ⋅ Twitter followers 410 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact

    9. The Exchange

    The Exchange

    Sioux City, Iowa, United States About Podcast The Exchange from Siouxland Public Media is a weekly news and culture program hosted by Mary Hartnett. Each episode explores significant issues impacting the upper-midwest and celebrates the arts and culture of the region. Frequency 8 episodes / month Podcast kwit.org/programs/exchange
    Twitter followers 410 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact

    10. Check It Out

    Check It Out

    Sioux City, Iowa, United States About Podcast Check It Out is a weekly spotlight on literature and book culture that Siouxland Public Media co-produces with the Sioux City Public Library. Frequency 1 episode / week Podcast kwit.org/programs/check-it-out
    Twitter followers 410 ⋅ Social Engagement 15 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact

    11. World Cafe

    World Cafe

    Sioux City, Iowa, United States About Podcast From live in-studio performances and interviews with top musicians to new and undiscovered artists from around the globe, World Cafe is the place to hear contemporary popular music! Frequency 28 episodes / month Podcast kwit.org/programs/world-cafe
    Twitter followers 410 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact

    12. First Fifty Pages

    First Fifty Pages

    Sioux City, Iowa, United States About Podcast The First Fifty Pages is the Sioux City Public Library’s podcast about books, library culture, and current reading trends. Each month, Kelsey Patterson and Jenn Delperdang discuss what they’re reading, what’s popular in our community, and what’s happening at the Library! Who knows, they might even help you find your next great read! Highlighting the amazing work that libraries do, and why you should be using your library, this podcast is not to be missed! Produced by Siouxland Public Media. Frequency 5 episodes / quarter Podcast kwit.org/programs/first-fift..
    Twitter followers 410 ⋅ Social Engagement 29 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact

    13. Mix Tape Dance Party

    Mix Tape Dance Party

    Sioux City, Iowa, United States About Podcast A weekly radio show decades in the making – featuring eclectic music from the past, present, and future. Frequency 25 episodes / quarter Podcast kwit.org/programs/mix-tape-d..
    Twitter followers 410 ⋅ Social Engagement 1 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact

    14. We Are Not A Monolith

    We Are Not A Monolith

    Sioux City, Iowa, United States About Podcast We Are Not A Monolith produces weekly news and culture content about African Americans in the Siouxland Community. Frequency 3 episodes / year Podcast kwit.org/programs/we-are-not..
    Twitter followers 410 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact

    15. B Sides

    B Sides

    Sioux City, Iowa, United States About Podcast Public Radio from Sioux City, Iowa. Your source for news and music. Features and interviews lovingly produced by your local public radio station. Podcast kwit.org/programs/b-sides
    Twitter followers 410 ⋅ Social Engagement 35 ⋅ Alexa Rank 3.5M View Latest Episodes Get Email Contact



    Source link

  • Top 10 WUWM Podcasts You Must Follow in 2021


    1. WUWM News

    Milwaukee, Wisconsin, United States About Podcast WUWM 89.7 FM Milwaukee Public Radio provides local in-depth news, unbiased reporting and NPR programs. Frequency 1 episode / day Podcast wuwm.com/podcast/wuwm-news
    Twitter followers 14.6K ⋅ Alexa Rank 90.5K View Latest Episodes Get Email Contact

    2. UWM Today

    UWM Today

    Milwaukee, Wisconsin, United States About Podcast Meet the people behind the creativity and discoveries at the University of Wisconsin – Milwaukee. Frequency 10 episodes / month Podcast wuwm.com/podcast/uwm-today
    Facebook fans 26.1K ⋅ Twitter followers 14.6K ⋅ Alexa Rank 90.5K View Latest Episodes Get Email Contact

    3. Lake Effect: Full Show

    Lake Effect: Full Show

    Milwaukee, Wisconsin, United States About Podcast Lake Effect is WUWM’s local show about what matters most now to people in Milwaukee and southeast Wisconsin. It goes beyond the headlines and connects listeners to the community. Frequency 1 episode / week Podcast wuwm.com/podcast/lake-effect
    Twitter followers 14.6K ⋅ Alexa Rank 90.5K View Latest Episodes Get Email Contact

    4. Lake Effect: Segments

    Lake Effect: Segments

    Milwaukee, Wisconsin, United States About Podcast Lake Effect is WUWM’s local show about what matters most now to people in Milwaukee and southeast Wisconsin. It goes beyond the headlines and connects listeners to the community. Frequency 1 episode / day Podcast wuwm.com/podcast/lake-effect..
    Twitter followers 14.6K ⋅ Alexa Rank 90.5K View Latest Episodes Get Email Contact

    5. Capitol Notes

    Capitol Notes

    Milwaukee, Wisconsin, United States About Podcast There’s never a shortage of political news in Wisconsin, from the governor’s office to the Legislature to the state’s elected officials in Washington, DC. Join WUWM’s Marti Mikkelson and Wispolitics.com editor JR Ross each week as they highlight and provide context to the latest developments. Frequency 1 episode / week Podcast wuwm.com/podcast/capitol-notes
    Twitter followers 14.6K ⋅ Alexa Rank 90.5K View Latest Episodes Get Email Contact

    6. How Did You Do That?

    How Did You Do That?

    Milwaukee, Wisconsin, United States About Podcast What does it take for an entrepreneur to go from an idea to a successful startup? Host Kathleen Gallagher talks with Wisconsin entrepreneurs about how and why they’ve succeeded. Frequency 1 episode / month Podcast wuwm.com/podcast/how-did-you..
    Twitter followers 14.6K ⋅ Alexa Rank 90.5K View Latest Episodes Get Email Contact

    7. Lake Effect: Spotlight

    Lake Effect: Spotlight

    Milwaukee, Wisconsin, United States About Podcast Lake Effect Spotlight features some of our favorite conversations about what matters most now to people in Milwaukee and southeast Wisconsin. Frequency 2 episodes / month Podcast wuwm.com/podcast/spotlight
    Twitter followers 14.6K ⋅ Social Engagement 1 ⋅ Alexa Rank 90.5K View Latest Episodes Get Email Contact

    8. Bubbler Talk

    Bubbler Talk

    Milwaukee, Wisconsin, United States About Podcast What’s got you scratching your head about Milwaukee and the region? Bubbler Talk is a series that puts your curiosity front and center. How it works: You ask, we investigate, and together we unveil the answers. Ask away: What have you always wanted to know about the Milwaukee area’s people, places, or culture that you want WUWM to explore? Frequency 3 episodes / month Podcast wuwm.com/bubbler-talk
    Facebook fans 26.1K ⋅ Twitter followers 14.6K ⋅ Alexa Rank 90.5K View Latest Episodes Get Email Contact

    9. Beats Me

    Beats Me

    Milwaukee, Wisconsin, United States About Podcast Beats Me answers your questions about how education, the environment, race and innovation impacts life in southeastern Wisconsin. Podcast wuwm.com/podcast/beats-me-wh..
    Twitter followers 14.6K ⋅ Alexa Rank 90.5K View Latest Episodes Get Email Contact



    Source link

  • Top 15 WAMC Podcasts You Must Follow in 2021


    1. WAMC News Podcast

    Albany, New York, United States About Podcast If you’re tired of missing the news from your backyard and the rest of the Northeast because you can’t catch all of Midday Magazine and Northeast Report, you can do something about it: subscribe to our new podcast. The WAMC News Podcast offers regular updates downloaded right to your smartphone, as well as exclusive interviews and more. Frequency 12 episodes / month Podcast wamcpodcasts.org/wamc-news-p..
    Twitter followers 9.6K ⋅ Social Engagement 8 ⋅ Alexa Rank 3M View Latest Episodes Get Email Contact

    2. The Media Project

    The Media Project

    Albany, New York, United States About Podcast The Media Project is an inside look at media coverage of current events with The Times Union’s Rex Smith, WAMC’s Alan Chartock, University at Albany Professor Rosemary Armao, and Daily Freeman Publisher Emeritus Ira Fusfeld. Frequency 9 episodes / month Podcast wamc.org/programs/media-project
    Twitter followers 9.6K ⋅ Alexa Rank 281.8K View Latest Episodes Get Email Contact

    3. The Capitol Connection

    The Capitol Connection

    Albany, New York, United States About Podcast Each week on The Capitol Connection, you can keep yourself abreast of political developments and gain a little insight into how New York State’s politicians think when you listen in as political scientist Dr. Alan Chartock holds conversations with members from the Assembly and Senate, and others each week on The Capitol Connection. Frequency 7 episodes / month Podcast wamc.org/programs/capitol-co..
    Twitter followers 146 ⋅ Alexa Rank 281.8K View Latest Episodes Get Email Contact

    4. The Best Of Our Knowledge

    The Best Of Our Knowledge

    Albany, New York, United States About Podcast Produced and hosted by radio veteran Bob Barrett, this show examines education from the classroom to state education departments. Bob interviews various educators about the subjects they teach, and will, every now and again, throw in a surprise, like speaking to the family behind ‘Dracula.’ Frequency 5 episodes / month Podcast wamc.org/programs/best-our-k..
    Twitter followers 159 ⋅ Social Engagement 1 ⋅ Alexa Rank 281.8K View Latest Episodes Get Email Contact

    5. The Legislative Gazette

    The Legislative Gazette

    Albany, New York, United States About Podcast Each week on The Legislative Gazette, the award-winning WAMC News Team combines forces to bring you a wrap-up of the week’s political news, the goings on in and around the legislature, and the stories that will keep you well-informed and in the know. Frequency 12 episodes / month Podcast wamc.org/programs/legislativ..
    Twitter followers 90 ⋅ Alexa Rank 281.8K View Latest Episodes Get Email Contact

    6. The Academic Minute

    The Academic Minute

    Albany, New York, United States About Podcast The Academic Minute features researchers from colleges and universities around the world, keeping listeners abreast of what’s new and exciting in the academy and of all the ways academic research contributes to solving the world’s toughest problems and to serving the public good. Frequency 6 episodes / week Podcast academicminute.org
    Twitter followers 2.5K ⋅ Social Engagement 7 ⋅ Alexa Rank 2.2M View Latest Episodes Get Email Contact

    7. WAMC’s In Conversation With…

    WAMC's In Conversation With...

    Albany, New York, United States About Podcast WAMC’s Alan Chartock speaks with artists, politicians, writers and people from various backgrounds to get to the heart of their lives, and contributions to the world. Frequency 11 episodes / month Podcast wamc.org/programs/wamcs-conv..
    Twitter followers 9.6K ⋅ Social Engagement 11 ⋅ Alexa Rank 281.8K View Latest Episodes Get Email Contact

    8. Any Questions?

    Any Questions?

    Albany, New York, United States About Podcast WAMC’s Friday quiz segment, Any Questions?, puts news director Ian Pickus in the hot seat, as he and listeners field questions from resident quizzer Mike Nothnagel. Frequency 12 episodes / month Podcast wamc.org/programs/any-questions
    Twitter followers 9.6K ⋅ Alexa Rank 281.8K View Latest Episodes Get Email Contact

    9. Vox Pop

    Vox Pop

    Albany, New York, United States About Podcast Vox Pop is WAMC’s live call-in talk program. Guests with expertise in areas ranging from Astronomy to George Washington speak with WAMC’s hosts and answer questions posed by WAMC listeners. Frequency 27 episodes / month Podcast wamc.org/programs/vox-pop
    Twitter followers 1K ⋅ Alexa Rank 281.8K View Latest Episodes Get Email Contact

    10. The Roundtable

    The Roundtable

    Albany, New York, United States About Podcast WAMC’s The Roundtable is an award-winning, nationally recognized eclectic talk program. The show airs from 9am to noon each weekday and features news, interviews, in-depth discussion, listener call-ins, music, and much (much) more! Frequency 30 episodes / month Podcast wamc.org/programs/roundtable
    Twitter followers 9.6K ⋅ Alexa Rank 281.8K View Latest Episodes Get Email Contact

    11. The Book Show

    The Book Show

    Albany, New York, United States About Podcast Each week on The Book Show, host Joe Donahue interviews authors about their books, their lives and their craft. It is a celebration of both reading and writers. Frequency 7 episodes / month Podcast wamc.org/programs/book-show
    Twitter followers 9.6K ⋅ View Latest Episodes Get Email Contact

    12. 51%

    51%

    Albany, New York, United States About Podcast Host Allison Dunne talks to experts in their field for a wide-ranging, entertaining discussion of issues that not only fall into the traditional ‘women’s issues’ category, but topics that concern us all as human beings and citizens of the global community. Frequency 9 episodes / monthAlso in Feminist Podcasts Podcast wamc.org/programs/51
    Twitter followers 244 ⋅ Alexa Rank 281.8K View Latest Episodes Get Email Contact

    13. Earth Wise

    Earth Wise

    Albany, New York, United States About Podcast From green business and new environmental legislation to how nature impacts our environment in ways never before considered, Earth Wise offers a look at our changing environment every day on the radio and online. Host Dr. Randy Simon brings decades of scientific background to the microphone to narrate essays and talk to experts. Earth Wise is produced by WAMC Northeast Public Radio. Frequency 1 episode / dayAlso in Environmental Podcasts Podcast earthwiseradio.org
    Twitter followers 214 ⋅ Social Engagement 1 ⋅ Alexa Rank 6.6M View Latest Episodes Get Email Contact

    14. Postcards From The Road

    Postcards From The Road

    Albany, New York, United States About Podcast Postcards from the Road is a travel podcast that shares the stories of people from all walks of life from the passenger seat of a 1980’s Land Rover traveling across three continents, to a school teacher adjusting to the cultural differences of the Northeast and Southwest United States public school systems. Whether it’s across the country or around the world, there is always a good story to hear; you just have to ask the right questions. Frequency 19 episodes / year Podcast wamcpodcasts.org/postcards-f..
    Twitter followers 9.6K ⋅ Social Engagement 33 ⋅ Alexa Rank 3M View Latest Episodes Get Email Contact

    15. A New York Minute In History

    A New York Minute In History

    Albany, New York, United States About Podcast A New York Minute In History is a podcast about the history of New York and the unique tales of New Yorkers. It is hosted by Devin Lander, the New York State Historian and Saratoga County Historian Lauren Roberts. Original episodes were co-hosted by Don Wildman of Mysteries at the Museum on Travel Channel. Jesse King and Jim Levulis of WAMC Northeast Public Radio produce the podcast. Frequency 18 episodes / year Podcast wamcpodcasts.org/a-new-york-..
    Twitter followers 442 ⋅ Alexa Rank 3M View Latest Episodes Get Email Contact



    Source link

  • 10 Shocking Facts About Counterfeit Electronics [Defense & Aerospace]

    10 Shocking Facts About Counterfeit Electronics [Defense & Aerospace]


    Photo: Counterfeit electronic parts can have direct, sudden, and devastating effects on national security and critical infrastructure if not identified, removed, and replaced during manufacturing.

    Table of Contents

    The use of counterfeit electronic parts in defense systems can compromise performance and reliability, risk national security, and endanger the safety of military personnel.

    We’ve discussed the multibillion-dollar black market that is the counterfeit electronic parts industry and how it continues to adulterate the defense and aerospace supply chain.

    If that blog post wasn’t enough to disturb you, take a moment to absorb these 10 shocking facts about counterfeit electronic parts and their impact on the defense and aerospace markets.

    Stick around to learn more about what Trenton Systems is doing to prevent counterfeit electronics infiltration.

    10 Shocking Facts About Counterfeit Electronics

    1. A 2011 Senate Armed Services Committee investigation found that China is the dominant source country for counterfeit electronic parts infiltrating the defense supply chain. More than 70 percent of the suspect parts analyzed during this investigation were traced back to the country.
    2. That same 2011 Senate Armed Services Committee investigation also identified 1,800 cases of counterfeit electronic parts throughout the defense supply chain, the vast majority of which went unreported to the DoD or criminal authorities. These cases amounted to more than 1 million suspected counterfeit electronic parts.
    3. In the semiconductor industry, an estimated $7.5 billion is lost in revenue each year because of counterfeit parts, according to the Semiconductor Industry Association (SIA).
    4. Counterfeit electronic parts cost the American taxpayer $2.7 million in 2010 when the Missile Defense Agency (MDA) learned that mission computers for Terminal High Altitude Area Defense (THAAD) missiles contained counterfeit memory devices. The MDA had no choice but to replace the parts to prevent a potentially catastrophic missile failure.
    5. An estimated 15 percent of all spare and replacement electronic parts purchased by The Pentagon are counterfeit.
    6. The Senate Armed Services Committee investigation also discovered numerous counterfeit electronic parts from China in the Air Force’s largest cargo plane, in assemblies intended for Special Operations helicopters, and in a Navy surveillance plane.
    7. The Senate Armed Services Committee investigation also found that 84,000 suspect counterfeit electronic parts were inserted into the DoD supply chain by a single electronic parts supplier, Hong Dark Electronic Trade, of Shenzhen, China. These parts were found in Traffic Alert and Collision Avoidance Systems (TCAS) intended for the C-5AMP transport aircraft, C-12 logistics support aircraft, and the Global Hawk remotely piloted aircraft (RPA).
    8. In 2011, L3Harris Technologies reported that the U.S. Air Force Joint Cargo Aircraft C-27J program had experienced four instances of suspect counterfeit electronic parts since the program’s inception in 2007. These parts were found in avionics systems, Color Multipurpose Display Units (CMDU), and a Type 1 Bus Adapter Unit (BAU).
    9. Raytheon had to pay $750,000 to remediate a counterfeit part intended for the Stryker mobile gun system vehicle.
    10. Raytheon also reported in 2011 that a total of 32 counterfeit parts had entered into its supply chain during the previous two years.

    BONUS FACTS:

    1. Hundreds of thousands of American jobs are lost each year because of counterfeiting.
    2. U.S. companies lose $200-250 billion in revenue each year because of counterfeit parts.

    Sources: The Senate Armed Services Committee’s Investigation Into Counterfeit Electronic Parts In the Department of Defense Supply ChainSenate Armed Services Committee Releases Report on Counterfeit Electronic Parts

    This is a photo of discarded computer electronics.

    Photo: The Pentagon has several initiatives in place to prevent counterfeit electronics infiltration, but prevention efforts also fall on the shoulders of contractors and their suppliers.

    What can be done about counterfeit electronics?

    The proliferation of counterfeit electronic parts within the DoD supply chain is difficult to control because counterfeit parts are designed to appear legitimate and function somewhat adequately, at least for a little while.

    But such parts are ultimately unreliable, unvetted, and in the case of the defense, aerospace, and government markets, could quickly and suddenly destabilize critical infrastructure, compromise national security, and cause severe injury or death. They also pose a significant cybersecurity threat.

    The Pentagon continues to focus on cutting down the number of counterfeit electronic parts that enter the defense supply chain with measures like plant DNA, the Trusted Foundry program, the Supply Chain Hardware Integrity for Electronics Defense (SHIELD) program, and more recently, a zero-trust approach.

    This is a photo of a Trenton Systems processor board.

    Photo: Trenton Systems has numerous policies, procedures, and practices in place to avoid counterfeit electronics infiltration, supply chain attacks, and the resulting cybersecurity ramifications.

    What is Trenton Systems doing to avoid counterfeit electronics?

    Trenton Systems, a supplier of secure, high-performance computing solutions for military primes, aerospace companies, and other defense contractors and subcontractors, has several policies, practices, and procedures in place that protect our hardware against supply chain attacks and counterfeit electronic parts infiltration.

    Number one is our supplier quality surveys, which involve vetting and verifying our suppliers’ quality control systems, procedures, practices, and certifications.

    We vet and qualify all of our suppliers so that we can add them to our approved vendor list (AVL). With anyone that we purchase from, whether it’s a physical product or a service, we must have official documentation from that company, and from us, on file that outlines that vetting process. Part of this process involves send out a five-page survey that provides us with an overview of the company’s capabilities and quality system, including what processes and procedures they have in place, what certifications they have, whether they’re an ISO facility, and other critical supply chain factors that determine whether they’re a trusted source with whom to do business.

    This is a photo of Toni Hauck, Trenton Systems' Director of Quality Control        Toni Hauck, Director of Quality Control, Trenton Systems

    Number two is our Counterfeit Protection Program (CPP). The purpose of the CPP is employee awareness, training, and understanding of counterfeit electronic parts, such as learning how counterfeit electronic parts enter the industrial supply chain, and how we, as a leading manufacturer of made-in-USA rugged computing solutions, can avoid, inspect, detect, identify, document, remove, and replace suspected counterfeit electronics.

    We have an entire counterfeit assessment, known as a risk mitigation evaluation, intended to test, quarantine, and report suspect counterfeit electronic parts before they ever leave our facility, should they even be able to enter in the first place. 

    Counterfeit prevention guidelines that Trenton adheres to include AS5553 and ARP6328, which focus on avoidance, detection, mitigation, and disposition of counterfeit electronic parts. 

    Trenton Systems also has an ongoing membership with GIDEP, is TAA-compliant, undergoes internal and external audits to ensure adherence to the CPP, and has a purchasing philosophy of buying directly from original equipment manufacturers (OEMs), original component manufacturers (OCMs), and vetted, authorized distributors.

    Not to mention, our rugged computing solutions are made in the USA in our secure facility in Lawrenceville, Georgia. We also control both the design and manufacturing of our solutions, ensuring that we maintain a continuously tight grip on our supply chain.

    For more information on Trenton Systems’ quality control system, visit our Policies, Compliance, and Government Information webpage or reach out to us directly. We’re more than happy to answer your questions and tell you how we’re securing your rugged computer every step of the way.

    Speak With Our Team Today





    Source link

  • Top 10 Boise State Public Radio Podcasts You Must Follow in 2021


    1. Idaho Matters

    Boise, Idaho, United States About Podcast Idaho Matters is the place on-air and online where folks with different views can talk with each other, exchange ideas, debate with respect and come away richer out of the experience. Frequency 30 episodes / month Podcast npr.org/podcasts/605235114/i..
    Twitter followers 7.1K ⋅ Alexa Rank 542 View Latest Episodes Get Email Contact

    2. Reader’s Corner

    Reader's Corner

    Boise, Idaho, United States About Podcast Welcome to Reader’s Corner, a weekly radio show and podcast hosted by Boise State University president emeritus and former Illinois Lieutenant Governor Bob Kustra. Reader’s Corner features lively conversations with leading writers, including Pulitzer, National Book Award, and Nobel Prize winners and many best-selling authors. Listen each week for thoughtful interviews about issues and ideas that matter. Frequency 1 episode / week Podcast boisestatepublicradio.org/pr..
    Twitter followers 671 ⋅ Alexa Rank 299.6K View Latest Episodes Get Email Contact

    3. Facing West

    Facing West

    Boise, Idaho, United States About Podcast We explore the ever-changing face of the Mountain West, sometimes in a car, sometimes on a bike, maybe on a horse but always with an open ear. Produced by the Mountain West News Bureau , a consortium of NPR member stations covering the region. Frequency 5 episodes / quarter Podcast boisestatepublicradio.org/to..
    Twitter followers 81 ⋅ Alexa Rank 299.6K View Latest Episodes Get Email Contact

    4. Grouse

    Grouse

    Boise, Idaho, United States About Podcast Grouse is a show about the most controversial bird in the West and what it can teach us about hope, compromise and life in rural America. Hosted by Ashley Ahearn, Grouse is an eight-part podcast series produced in partnership with BirdNote Presents and distributed in collaboration with Boise State Public Radio. Frequency 30 episodes / year Podcast boisestatepublicradio.org/to..
    Facebook fans 7.4K ⋅ Twitter followers 7.1K ⋅ Alexa Rank 299.6K View Latest Episodes Get Email Contact

    5. You Know The Place

    You Know The Place

    Boise, Idaho, United States About Podcast Every day, you drive by hundreds of businesses you’ve never stopped at, shopped at or (sometimes) even noticed. That’s where we come in. From crematories to coffee buses, bee farms to bodegas, shooting ranges to scuba lessons, You Know The Place explores the Idaho stores, shops, clubs, and pubs you always pass by, but never seem to visit. Frequency 17 episodes / year Podcast npr.org/podcasts/594129043/y..
    Twitter followers 7.1K ⋅ Alexa Rank 542 View Latest Episodes Get Email Contact

    6. Wanna Know Idaho

    Wanna Know Idaho

    Boise, Idaho, United States About Podcast Wanna Know Idaho is a listener-generated podcast from Boise State Public Radio’s newsroom that is driven by YOU! No matter how quirky or serious your question might be, we want to know: What sparks your curiosity about the Gem State, Idaho culture or the people who call it home? Join this curious collective by subscribing, sharing and reviewing this podcast. Frequency 8 episodes / year Podcast boisestatepublicradio.org/to..
    Twitter followers 7.1K ⋅ Alexa Rank 299.6K View Latest Episodes Get Email Contact



    Source link

  • System Hardening in 2021: An Easy-to-Understand Overview


    Graphic: System hardening is all about protecting your server or workstation.

    Did you know that the U.S. government allocated an estimated $18.78 billion for cybersecurity spending in 2021?

    The reason why is made clear in the U.S. Department of Defense’s Cyber Strategy Report:

    As such, many companies supporting and selling servers and workstations to the DoD are turning to advanced system hardening tools and best practices to improve the security of their servers and other computer systems, oftentimes as a prerequisite for doing business with the DoD.

    In this blog post, we’ll discuss system hardening, its importance, the types of system hardening, how system hardening is achieved, and more. By the end, you should know what steps to take to begin or expand upon your system hardening processes and procedures.

    Graphic: System hardening involves reducing a server’s or workstation’s attack surface.

    What does system hardening mean?

    System hardening is the process of securing a server or computer system by minimizing its attack surface, or surface of vulnerability, and potential attack vectors. It’s a form of cyberattack protection that involves closing system loopholes that cyberattackers frequently use to exploit the system and gain access to users’ sensitive data.

    One official definition of system hardening, according to the National Institute of Standards and Technology (NIST), is that it’s “a process intended to eliminate a means of attack by patching vulnerabilities and turning off non-essential services.”

    Part of the system hardening elimination process involves deleting or disabling needless system applications, permissions, ports, user accounts, and other features so that attackers have fewer opportunities to gain access to a mission-critical or critical-infrastructure computer system’s sensitive information.

    But at its core, system hardening is a method for protecting a system against attacks perpetrated by cybercriminals. It involves securing a computer system’s software mainly but also its firmware and other system elements to reduce vulnerabilities and a potential compromise of the entire system.

    Now you know why system hardening exists, but you might be wondering about its practical purpose and why businesses and organizations implement system hardening practices.

    The basic purpose of implementing system hardening techniques and practices is to simply minimize the number of potential entryways an attacker could use to access your system and to do so from inception. This is oftentimes referred to as following a secure-by-design philosophy.

    There are a few different types of system hardening, but they're all interrelated.

    Graphic: There are a few different types of system hardening, but they’re all interrelated.

    What are the types of system hardening?

    System hardening involves securing not only a computer’s software applications, including the operating system, but firmware, databases, networks, and other critical elements of a given computer system that an attacker could exploit.

    There are five main types of system hardening:

    • Server hardening
    • Software application hardening
    • Operating system hardening
    • Database hardening
    • Network hardening

    It’s important to note that the types of system hardening are broad enough to be universal and translate well across different server and computer system configurations; however, the methods and tools used to practically achieve a hardened or secure-by-design state vary widely.

    But for now, let’s review the purpose of each type of system hardening.

    Server hardening

    Server hardening is a broad and overarching system hardening process that involves securing the data, ports, components, functions, and permissions of a server using advanced security measures at the hardware, firmware, and software layers.

    These advanced security measures include, but are not limited to:

    • Keeping a server’s operating systems patched and updated
    • Regularly updating third-party software essential to the operation of the server and removing third-party software that doesn’t conform to established cybersecurity standards
    • Using strong and more complex passwords and developing strong password policies for users
    • Locking user accounts if a certain number of failed login attempts are registered and removing needless accounts
    • Disabling USB ports at boot
    • Implementing multi-factor authentication
    • Using self-encrypting drives or AES encryption to conceal and protect sensitive information
    • Using firmware resilience technology, memory encryption, antivirus and firewall protection, and advanced cybersecurity suites specific to your operating system, such as Titanium Linux

    Software application hardening

    Software application hardening, or just application hardening, involves updating or implementing additional security measures to protect both standard and third-party applications installed on your server.

    Unlike server hardening, which focuses more broadly on securing the entire server system by design, application hardening focuses on the server’s applications, specifically, including, for example, a spreadsheet program, a web browser, or a custom software application used for a variety of reasons.

    At a basic level, application hardening involves updating existing or implementing new application code to further secure a server and implementing additional software-based security measures.

    Examples of application hardening include, but are not limited to:

    • Patching standard and third-party applications automatically
    • Using firewalls
    • Using antivirus, malware, and spyware protection applications
    • Using software-based data encryption
    • Using CPUs that support Intel Software Guard Extensions (SGX)
    • Using an application like LastPass to manage and encrypt passwords for improved password storage, organization, and safekeeping
    • Establishing an intrusion prevention system (IPS) or intrusion detection system (IDS)

    Operating system hardening

    Operating system hardening involves patching and implementing advanced security measures to secure a server’s operating system (OS). One of the best ways to achieve a hardened state for the operating system is to have updates, patches, and service packs installed automatically.

    OS hardening is like application hardening in that the OS is technically a form of software. But unlike application hardening’s focus on securing standard and third-party applications, OS hardening secures the base software that gives permissions to those applications to do certain things on your server.

    Oftentimes, operating system developers, such as Microsoft and Linux, do a fine and consistent job of releasing OS updates and reminding users to install these updates. These frequent updates –  and we’ve all ignored them – can actually help keep your system secure and resilient to cyberattacks.

    Other examples of operating system hardening include:

    • Removing unnecessary drivers
    • Encrypting the HDD or SSD that stores and hosts your OS
    • Enabling and configuring Secure Boot
    • Limiting and authenticating system access permissions
    • Limiting or eliminating the creation and logging in of user accounts

    Database hardening

    Database hardening involves securing both the contents of a digital database and the database management system (DBMS), which is the database application users interact with to store and analyze information within a database.

    Database hardening mainly involves three processes:

    1. Controlling for and limiting user privileges and access
    2. Disabling unnecessary database services and functions
    3. Securing or encrypting database information and resources

    Types of database hardening techniques include:

    • Restricting administrators and administrative privileges and functions
    • Encrypting in-transit and at-rest database information
    • Adhering to a role-based access control (RBAC) policy
    • Regularly updating and patching database software, or the DBMS
    • Turning off needless database services and functions
    • Locking database accounts if suspicious login activity is detected
    • Enforcing strong and more complex database passwords

    Network hardening

    Network hardening involves securing the basic communication infrastructure of multiple servers and computer systems operating within a given network.

    Two of the main ways that network hardening is achieved are through establishing an intrusion prevention system or intrusion detection system, which are usually software-based. These applications automatically monitor and report suspicious activity in a given network and help administrators prevent unauthorized access to the network.

    Network hardening techniques include properly configuring and securing network firewalls, auditing network rules and network access privileges, disabling certain network protocols and unused or unnecessary network ports, encrypting network traffic, and disabling network services and devices not currently in use or never in use.

    Using these techniques in combination with an intrusion prevention or intrusion detection system reduces the network’s overall attack surface, and thus, bolsters its resistance to network-based attacks.

    The NIST maintains one of several system hardening standards.

    Photo: The NIST maintains one of several system hardening standards.

    What are some system hardening standards?

    Several industry standards and guidelines for system hardening exist. The National Institute of Standards and Technology (NIST), the Computer Information Security (CIS) Center for Internet Security, and Microsoft, for example, all maintain standards for system hardening best practices.

    For example, system hardening best practices outlined by the NIST in Special Publication (SP) 800-123, a document focused entirely on system hardening, include:

    • Establishing a system security plan
    • Patching and updating the OS
    • Removing or disabling unnecessary services, applications, and network protocols
    • Configuring OS user authentication
    • Configuring resource controls appropriately
    • Selecting and implementing authentication and encryption technologies

    Another example of a system hardening standard is CIS Benchmarks, an expansive collection of more than 100 system hardening configuration guidelines addressing vendor-specific desktops and web browsers, mobile devices, network devices, server operating systems, virtualization platforms, the cloud, and commonly used software applications.

    The CIS Center’s system hardening standards are accepted by government, business, industry, and academia, and are available for download free of charge on the organization’s Free Benchmarks PDFs webpage.

    There are a few different ways to harden your server or workstation. They involve addressing different aspects of the system.

    Graphic: There are a few different ways to harden your server or workstation. They involve addressing different aspects of the system.

    How can I harden my system?

    System hardening is a dynamic and variable process. One of the best ways to begin or expand upon the system hardening process is to follow a system hardening checklist or a system hardening standard, such as those published by the NIST or CIS Center.

    Generally, how you harden your system depends on your server’s configuration, operating system, software applications, hardware, among other variables.

    The system hardening standards and guidelines published by the NIST and CIS Center for Internet Security, for example, discuss system hardening techniques specific to Microsoft Windows, Unix, and Linux.

    So, if you’re curious about how to begin the system hardening process, reading the NIST’s Special Publication 800-123 and the CIS Center for Internet Security’s free benchmark PDFs is a good place to start. You can then, if necessary, consult with an experienced cybersecurity professional on how to move forward with implementing these standards’ recommended processes and best practices within your business or organization.

    This is a product photo of Trenton Systems' 3U BAM Server, a hardened, cyber-resilient rugged server.

    Photo: Trenton Systems’ 3U BAM Server, a hardened, cyber-resilient rugged server.

    Conclusion: Trenton Systems hardens its servers from inception.

    Trenton Systems partners with leading cybersecurity companies and is able to make changes to its server hardware, firmware, and software in an effort to further secure, or harden, its servers and workstations.

    The 3U BAM Server is our most recent shining example of trusted computing and system hardening. The BAM is secured by Intel PFR, Intel SGX, and Intel TME, and we can even make changes to its ports, further secure its BIOS, among other enhancements, to ensure that your BAM server is as cyber-resilient as possible.

    In addition, Star Lab, a Wind River company and Trenton Systems software technology partner, offers the Titanium Security Suite for Linux operating systems. Through our partnership with Star Lab, we can incorporate this suite for customers upon request. We can also incorporate FUTURA Cyber’s self-encrypting drive security manager to assist with the management of FIPS 140-2 SEDs.

    For more information about acquiring a hardened rugged server or workstation, reach out to us. Our in-house cybersecurity experts and cybersecurity technology partners are here to assist you every step of the way.

    Speak With Our Team Today





    Source link

  • Why Do Computer Manufacturers Disable Them?


    Photo: Like other system hardware, USB ports need a bit of tender, loving protection.

    Table of Contents

    There are a lot of security measures you can take to protect your high-performance computer (HPC), from implementing FIPS self-encrypting drives (SEDs) to installing comprehensive security suites and so on.

    But cyberattackers are beginning to focus more on attacks, whether in-person or originating from supply chain infiltration, that target a system’s hardware. One of these attack methods involves USB ports, which some security-conscious computer manufacturers, like Trenton Systems, disable to protect their customers.

    In this blog post, we’ll explain why disabling USB ports makes sense, how cyberattackers target USB ports, and what you can do to protect them.

    (more…)

  • Top 10 IIoT Podcasts You Must Follow in 2021 (Industrial IoT)


    1. Industrial IoT Spotlight

    Shanghai, Shanghai, China About Podcast The IIoT Spotlight Podcast shines a light on Industrial IoT solutions that are impacting businesses today. In every episode, we interview an expert about a specific IoT use case. Our goal is to provide insight into the planning and implementation of IIoT systems, from new business models to technology architecture selection to data ownership and security. The IIoT Spotlight is produced by IoT ONE, an information platform that provides market insight, partner development, and go-to-market support for technology providers, end-users, and investors. Frequency 1 episode / month Since Dec 2020 Podcast iotone.com/podcasts
    Alexa Rank 373K View Latest Episodes Get Email Contact

    2. Intellic Podcast

    Intellic Podcast

    Carrollton, Texas, United States About Podcast Walker Reynolds and Zack Scriven share their knowledge and insights on Industry 4.0, IIoT, and Digital Transformation in this podcast from 4.0 Solutions. Frequency 2 episodes / week Since May 2019 Podcast anchor.fm/intellic-podcast
    Social Engagement 1 ⋅ Alexa Rank 2.7K View Latest Episodes Get Email Contact

    3. The Fourth Generation Podcast

    The Fourth Generation Podcast

    About Podcast Each episode of The Fourth Generation Podcast will treat you to an in-depth interview with some of the world’s leading IIoT practitioners where we really dive deep into technical and actionable details of building Industrial IoT Solutions. Frequency 1 episode / week Since Nov 2020 Podcast industry40tv.podbean.com
    View Latest Episodes Get Email Contact

    4. Fluke Reliability Radio

    Fluke Reliability Radio

    Everett, Washington, United States About Podcast Integrated solutions from Fluke Reliability are built for the present and the future. Our products and services are designed for the assets and team you already have in place. We meet you where you are and deliver rapid results on your current challenges. On top of that, our Accelix IIoT platform enables you to add new solutions that can be instantly integrated with your existing technology. Frequency 3 episodes / month Since Apr 2020 Podcast accelix.com/fluke-reliabilit..
    Twitter followers 856 ⋅ Alexa Rank 1.3M View Latest Episodes Get Email Contact

    5. IoT at the Edge

    IoT at the Edge

    United States About Podcast Advantech’s mission is to enable an intelligent planet with Automation and Embedded Computing products and solutions that empower the development of smarter working and living. With Advantech, there is no limit to the applications and innovations our products make possible! Frequency 2 episodes / quarter Since Jan 2020 Podcast soundcloud.com/iotattheedge
    Social Engagement 3 ⋅ Alexa Rank 133 View Latest Episodes Get Email Contact

    6. ShookIOT IIoT Talks

    ShookIOT IIoT Talks

    Edmonton, Alberta, Canada About Podcast ShookIOT’s Melissa Guglich sat down with Geoffrey Cann to discuss how the Industrial Internet of Things (IIoT) is transforming the industries around the globe. Listen in and learn how digital transformation is underway and what companies need to know to prepare for Industrial 4.0. Frequency 1 episode / quarter Since Feb 2021 Podcast feeds.buzzsprout.com/819022
    Alexa Rank 4.1K View Latest Episodes Get Email Contact



    Source link

  • How Revision Control Secures Your Computer


    Photo: Working with a computer hardware manufacturer with a strict revision control system in place is an essential aspect of further securing your cybersecure computing solution.

    Table of Contents

    The fact that Trenton Systems designs its own processor boards in Atlanta, Georgia, allows the company to have control of the hardware down to the minutiae, from the resistors all the way up to the CPU.

    Trenton’s computers must be the same form, fit, and function over the life of the product, and we average over 11 years of availability compared to three years from our competitors.

    Maintaining hardware revision control is no easy task for products that can consist of thousands of discrete parts, but a long-life, revision-controlled processor board is ideal for embedded military applications that cannot change over the life of the program.

    And because every revision control system is different, we’ve decided to focus on our own for the purposes of this blog post.

    Trenton has a 31-year proven history of developing and manufacturing high-performance computers and ensuring consistent revision control, and this blog post will highlight some of those required processes and procedures.

    (more…)
  • Top 10 Embedded Systems Podcasts You Must Follow in 2021


    1. Embedded Insiders

    Scottsdale, Arizona, United States About Podcast Embedded Insiders Podcast is a fun talk show for electronics engineers. Each week, Rich Nass, Brandon Lewis, Alix Paultre, and Laura Dolan of Embedded Computing Design tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, and other technology marketplaces in a light and accessible format. Frequency 2 episodes / month Since May 2016 Also in IoT (Internet of Things) Podcasts Podcast buzzsprout.com/280493
    Facebook fans 5.2K ⋅ Twitter followers 24.8K ⋅ Social Engagement 1 ⋅ Alexa Rank 13K View Latest Episodes Get Email Contact

    2. Embedded

    Embedded

    About Podcast Embedded in the show for people who love gadgets. Making them, breaking them, and everything in between. Weekly interviews with engineers, educators, and enthusiasts. Frequency 1 episode / week Podcast embedded.fm
    Twitter followers 5.5K ⋅ Social Engagement 1 ⋅ Alexa Rank 1.6M View Latest Episodes Get Email Contact

    3. Embedded Executive

    Embedded Executive

    Scottsdale, Arizona, United States About Podcast The Podcasts discuss various embedded systems impacting the globe. Frequency 1 episode / week Since May 2019 Podcast buzzsprout.com/280498
    Twitter followers 24.8K ⋅ Alexa Rank 4.1K View Latest Episodes Get Email Contact

    4. The McHale Report Podcast

    The McHale Report Podcast

    Scottsdale, Arizona, United States About Podcast The Military Embedded Systems publications are the most complete resources for developers and integrators of embedded military systems. The Resource Guide, website, and the limited production magazine can be used as year-round resources for engineers, companies, and decision-makers looking for embedded products ranging from software, development tools, hardware, systems, commercial off-the-shelf (COTS), technology insertion, end of life mitigation, and myriad other military-specific technical subjects. Frequency 1 episode / month Since Jan 2018 Podcast militaryembedded.com/podcasts
    Twitter followers 8K ⋅ Alexa Rank 673.4K View Latest Episodes Get Email Contact

    5. The Agile Embedded Podcast

    The Agile Embedded Podcast

    About Podcast Learn how to get your embedded device to market faster AND with higher quality. Join Luca Ingianni and Jeff Gable as they discuss how agile methodologies apply to embedded systems development, with a particular focus on safety-critical industries such as medical devices. Frequency 2 episodes / month Since Jan 2021 Podcast agileembeddedpodcast.com
    View Latest Episodes Get Email Contact

    6. Embedded System Podcast

    Embedded System Podcast

    About Podcast A Hobbyist and Enthusiast and working towards expertise in the embedded domain. Frequency 1 episode / month Since Mar 2011 Podcast iitestudent.blogspot.com
    Alexa Rank 6.4M View Latest Episodes Get Email Contact



    Source link