Why is refurbishing Hardware Good?

We have noticed that whenever we have contact with a potential client, they are a bit hesitant in buying a "refurbished" hardware.

At the end of the day, purchasing refurbished hardware is smart. Buying used IT equipment is a lot like buying a used car. It offers the best quality at its price point. Due to multiple quality tests, refurbished equipment tends to have better performance ratings than new equipment. Used equipment is also backed by warranties, support, and maintenance plans. Furthermore, restored equipment is the best option if a business has a lean IT budget and needs to purchase quality equipment at a fair price.

Refurbished hardware offers high quality and warranties at the lowest cost. Not only will it save your business’ bottom line, it will help save the planet. Instead of quality used products wasting away in landfills, renewed equipment recycles quality hardware.


WhatsApp Business

Our Customers has been wondering what the WhatsApp icon is doing on our website.

WhatsApp is building new tools to help people and businesses communicate with each other. Since we launched the WhatsApp Business app people have told us that it's quicker and easier to chat with a business than making a call or sending an e-mail. Today we are expanding our support for businesses that need more powerful tools to communicate with their customers.

Here's how people can connect with a business:

  • Request helpful information: When you need a shipping confirmation or boarding pass, you can give your mobile number to a business on their website, on their app, or in their store to send you information on WhatsApp.
  • Start a conversation: You may see a click-to-chat button on a website or Facebook ad to quickly message a business.
  • Get support: Some businesses may provide real-time support on WhatsApp to answer questions about their products or help you resolve an issue.

With this approach, you will continue to have full control over the messages you receive. Businesses will pay to send certain messages so they are selective and your chats don't get cluttered. In addition, messages will remain end-to-end encrypted and you can block any business with the tap of a button.


New Technology Trend: Cloud and AI Centric Processors

Every week we will be presenting you with the technology trends that we think will be here to stay. This week, we are presenting the Cloud and AI centric Processors

 

Image result for AI centric processors

While your phones are not full of AI specific hardware (though they have a little of that), there are places where this specialized equipment is poised to make a considerable impact: cloud and data centers.

Google is one of many that want to leverage hardware to make AI calculations faster. This makes sense if you compare the price of services to the cost of the device. As the price of the equipment drops, the amount of profit that services will make starts to warrant the design of custom hardware. Here, each small improvement in power or speed will translate directly into money saved and earned. It’s no wonder the likes of Facebook and Google are spending so much effort in this arena. Facebook even wants the open source community to help out in its efforts.


The General Data Protection Regulation GDPR (EU)

2016/679 is a regulation in EU law on data protection and privacy for all individuals within the European Union and the European Economic Area. It also addresses the export of personal data outside the EU and EEA. The GDPR aims primarily to give control to citizens and residents over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU. Superseding the Data Protection Directive, the regulation contains provisions and requirements pertaining to the processing of personally identifiable 

information of data subjects inside the European Union. Business processes that handle personal data must be built with privacy by design and by default, meaning that personal data must be stored using pseudonymisation or full anonymization, and use the highest-possible privacy settings by default, so that the data is not available publicly without explicit consent, and cannot be used to identify a subject without additional information stored separately. No personal data may be processed unless it is done under a lawful basis specified by the regulation, or if the data controller or processor has received explicit, opt-in consent from the data's owner. The business must allow this permission to be withdrawn at any time.

A processor of personal data must clearly disclose what data is being collected and how, why it is being processed, how long it is being retained, and if it is being shared with any third-parties. Users have the right to request a portable copy of the data collected by a processor in a common format, and the right to have their data erased under certain circumstances. Public authorities, and businesses whose core activities center around regular or systematic processing of personal data, are required to employ a data protection officer (DPO), who is responsible for managing compliance with the GDPR. Businesses must report any data breaches within 72 hours if they have an adverse effect on user privacy.

It was adopted on 14 April 2016 and after a two-year transition period, becomes enforceable on 25 May 2018. Because the GDPR is a regulation ling legislation and is directly binding and applicable.


THE BEST WAY TO BE GREEN : REFURBISHMENT

As every Tuesday, Easy Hardware Trading presents a new way to become a green company.

The topic of today is very important for us because it represents the main activity of how EHT operates and shows that the involvement of Easy Hardware Trading in the green world is very high.

The green activity that we are going to be presenting today is called refurbishment. This process involves old and obsolete hardware presenting itself as one of the best ways to recycle material, help the environment, and it represents the most efficient use of resources.

- Performance: the refurbished product will be equivalent to the new or same configuration.

 

The US Environmental Protection Agency wrote that “Two million tons of used electronics are discarded yearly- only 18 percent of computers and television are recycled”. The process of refurbishment consists of cleaning, testing, reconfiguring and warranting the product for further use, instead of just throw it away and waste its potential.

Companies choosing refurbished products instead of new ones will have significant benefits:

- Cost savings: a refurbished product is cheaper than a new one.

- Reliability: the product is tested to identify defects and repaired them. In this way, even if the product is not new, it will be able to perform well for several years.

- Availability: there is a high availability of refurbished products to choose from.

- Value: buying the refurbished product will not represent a loss of value.

- Environmentally friendly: buying a refurbished product will help the environment since the overall carbon footprint deriving from the production of the new product will decrease and the carbon emission will decline.

In the picture, it is shown a part of the refurbishment process at Easy Hardware Trading.


A NEW FREE TOOL TO FIGHT MALWARE ATTACKS

 

SentinelOne released Blacksmith, a free Linux tool that can detect meltdown vulnerability exploitation attempts. The Blacksmith tool influences the performance counting feature on modern chipsets. This lets Blacksmith monitor processes to detect malicious behavior. The Meltdown vulnerability generates these patterns during exploitation. Blacksmith reports detected exploitation attempts by email, which allows each admin to take individual action to clean up the exploitation. Linux is one of the preferred world’s supercomputer’s brand, and this makes it a high-value target for attackers. Therefore, it was urgent finding a solution to secure Linux computers from malware attacks and meltdown, since several businesses and working places could have been affected by them.  Meltdown creates a vulnerability that puts Linux powered computers at risk. The flaw is in the kernel that controls the chip performance that allows commonly used programs to access the contents and layout of a computer's protected kernel memory areas. This tool represents one of the safest and most reliable solution to fight malware attacks and meltdowns at a very fair price.


Easy Hardware Trading going green: meeting the standards of EU WEEE Directive

Easy Hardware Trading is active in the green world and the recycling services offered meet the strict standards of the EU Waste of Electrical and Electronic Equipment (WEEE) Directive. The EU estimated that the waste of electrical and electronic equipment (WEEE) will grow to more than 12 million tonnes by 2020. One of the main reason causing this phenomenon is that the production of modern electronics requires the use of scarce and expensive resources that, if not properly managed, can cause environmental and health problems. To improve the environmental management of this mixture of potentially dangerous materials and components, treatment and recycling of electronics at the end of their life is needed.

To address these problems a legislation has been set up and divided into two main Directives: the Directive on waste electrical and electronic equipment (WEEE Directive) and the Directive on the restriction of the use of certain substances in electrical and electronic equipment (RoHS Directive).

The first WEEE Directive was founded in February 2003. The Directive created schemes where consumers return their WEEE free of charge with the aim to increase the recycling of WEEE and re-use. To fight the fast increase waste stream, in 2008 the new WEEE Directive was proposed and implemented on the 13th of August 2012 and became effective on 14 February 2014.

EU legislation restricting the use of potentially dangerous substances in electrical and electronic equipment (RoHS Directive) entered into force in February 2003. The legislation requires heavy metals (lead, mercury, cadmium, and flame retardants such as polybrominated biphenyls) to be replaced by safer alternatives. The updated RoHS Directive became effective on 3 January 2013.

In 2017 a common methodology has been established for the calculation of the weight of electrical and electronic equipment (EEE) placed on the national market in each Member State and also a common methodology for the calculation of the quantity of Waste of Electrical and Electronic Equipment (WEEE) generated by weight in each Member State.

Meeting the requirements of this EU Directives is helping Easy Hardware Trading to show its green spirit to several clients. The meeting of these requirements is hardly recommended to each type of companies with the aim to reduce the electronic waste and being more environmentally friendly.


ARTIFICIAL INTELLIGENCE IN THE CITY

Hello, today we want to talk to you about the future. We are already living in the future without realizing it. This is all made

possible with the help of software and hardware constantly evolving.

Artificial intelligence, smart cities and robots:

Here’s how the future applications will be: self-managing and adaptive to our needs, which is the era of digital cohesion – according to the study by Juniper Networks, a company specialized in ethernet network switch. The era of self-aware machines is coming – Juniper Networks stated. The company as an expert in scalable and secure networks, has calculated the advantages of learning machine and AI, virtual reality and augmented reality. Just think about wandering around the city to watch the sky and see the routers in every corner, repeaters, cameras, HUB, SWITCH, ROUTER, all interconnected, which managing the public lightning or controlling the pressure of the sewage system. We can presume that in the near future, we will increasingly find ourselves submerged with AI and smart cities.

Self-managing application

According to Juniper Networks, we are in full Digital Cohesion, an era in which technology can self-manage, adapt to the user’s behavior and enterprise needs. Learning features are incorporated into the chips will greatly increase the intelligence of machinery. At the beginning of 2016, Juniper predicted that 80% of corporate networks have adopted a form of open networking. In the survey, 84% of professionals claim to have self-managing application within the company.

10.3 million devices connected to the cellular network

The 2016 data come from Istat shows that 69.2% of Italian households have access to the Internet at home. The year before, the percentage reached 66.2 percent. There is no reason to believe the trend would stop. Not only villas and apartments will be connected, but also domestic appliances. According to the Internet of Things Observatory of the Milan Polytechnic, the market in Italy has reached 2 billion euros and there are about 10.3 million devices connected by the cellular network.

Robots in companies

The robot will dethrone us. A McKinsey & Company study indicates that more than 5% of human workers will be replaced by computers. Employment contracts will not end up in trash: while the machines deal with repetitive tasks, the technicians will have time to devote themselves to strategic initiatives, or improving competitiveness, increase efficiency and bringing benefits to the business. In the coming years, with the automation of many basic technology activities, several frictions within the IT group will be eliminated, allowing the staff to follow other tasks.


THE ADVENT OF INTERNET ERA IS A REAL HELP FOR THE ENVIRONMENT

 

WWF explained how the deforestation is a real problem since forests produce vital oxygen and 1.6 billion people rely on benefits that forests offer. The advent of internet era helped people to use less paper compared to the past years, simply because nowadays it is possible to work entirely online without being worried about printing pages but just sending emails and documents with a click on a computer. A good example of how technology helps to save the planet are the schools. Nowadays, students are used to working with tablets and computers, instead, make use of the traditional printed books. This simple use of technology helps to reduce the deforestation since the demand for paper will diminish and, subsequently, also the need to cut thousands of trees every day will be reduced. To connect all the computers an important hardware needed is a switch. Schools will also need a router to connect the wi-fi and let students be able to work and study using the computers.


Intrusion issues? No problem with “Intrusion Prevention Sensor”

An IPS can be considered as an intrusion prevention mechanism.

Intrusion detection and prevention systems provide us with the first line of defense against harmful intruders. We must not consider an IPS as a substitute for IDS (it is a different case if the same tool provides all the functions of both instruments). IPS and IDS provide the control and visibility required by any company to protect their infrastructure from attack and take-over.

One of the most important factors to take in consideration when using an IPS / IDS is a correct insertion into the infrastructure through distribution. Improper implementation will lead to a huge network slowdown and improper management.

The main function of an IPS is therefore to identify the harmful activities, to try to block or cease their activity, to report the activity.

The IPS, therefore, provides a valid security prevention. The IPS detects an intrusion into network traffic.

An IPS should not be confused or confused as a substitute for another network security measure, in particular: the firewall. The task of a firewall is to restrict access to a network/system and is generally unable to detect and prevent an intrusion.