Best Hardware Review: Cisco 8865 IP Phone Review

The Cisco 8865 IP Phone is the latest California-based multi-national tool available to increase further the ability of discerning business users to communicate and cooperate. With annual revenue of around $49,24 billion, one of the world's leading telco developers (in 2016), Cisco is very expected, but how does the 8865 IP Phone meet these expectations? To find out what it offers, what advantages it can offer businesses and which companies can benefit most from investing in it, we have decided to write a detailed review.

Appearance

With stunning, rear lights, high-resolution color view, 8865 comes in an attractive, ergonomic design, with a choice of black and silver or silver and silver.

Key Features

  • Cisco Smart Proximity means that you can work with your desk and your mobile phones
  • The 8865 has five line keys that can be programmed. You can adjust keys to either support multiple directory numbers or call functions like speed dial
  • The 8865 has a VGA backlit widescreen display with a 5-inch high resolution (800 x 480). Local language support to meet the requirements of global users, including right-to-right screen text
  • A five-way browser cluster allows users to easily move through the menus
  • Acoustic keys that are backlit provide flexibility for audio path choice and switching
  • The phone offers a built-in Gigabit Ethernet switch for both network connection and your PC connection
  • The phone also supports locations with 802.11a/b/g/n/ac wireless LAN (WLAN) enabled
  • Comes as standard with 2 USB ports so you can charge other devices
  • Can be wall-mounted if needed with the addition of the optional wall-mount kit
  • Expand physical keys and display features with the 8800 series Key Expansion Module range
  • Expand physical keys and display features with the 8800 series Key Expansion Module range

Who is it for

To the discerning business user who wants ' always reliability ' with his mobile device's additional telephony integration bonus.

EHT Opinion

With the 8865 IP Phone from Cisco, users are able to operate more freely. They can communicate both internally and externally at a much more advanced level and implement it in the infrastructure of a company that already uses telephones from the 8800 series. Did you have any experiences you want to share with the 8865 IP phone? Do you feel that it lives up to the international reputation of Cisco? Please feel free to submit them to our comment & review section below if you have any thoughts that you want to share.


Old tech reveals personal data of past owner

Did you wipe all your data properly before getting rid of your computer hardware?

In order to discover how well businesses wipe data on end of life devices, Researcher Josh Frantz from Rapid7 purchased 85 used IT hardware including computers, flash drives, phones, and hard drives from businesses. In total, he paid $600.

Astonishingly, only two devices were wiped properly, and three devices were encrypted. He was able to retrieve 214,019 images, 3,406 documents, and 148,903 email messages from all the devices he purchased.

In an attempt to sift through all these data for potentially private information, he used Python script and PowerShell to identify social security numbers, dates of birth, credit card numbers, and phone numbers. He ended up collecting 611 email addresses, 50 dates of birth, 41 Social Security numbers, 19 credit-card numbers, 6 driver’s license numbers, and 2 passport numbers.

So, how much do these data worth?

To research further about the black market value of the data, Frantz was surprised to learn how cheap it is to buy people's information on the Darknet. Social security number cost around $1 apiece, while full documents cost around $3. It is obvious to say that data leakage is so common that it has driven down the cost of the data itself.

How to safely dispose of your IT hardware?

From this experiment, we learned the importance of wipe your data properly before dispose of your hardware.  At Easy Hardware Trading, we offer IT hardware a second life so it has always been our priority to have professionals wipe out all the data in the devices when we receive used hardware.


Awair 2nd Edition

AWAIR launched the latest solution for better air quality and the environment- Awair 2nd edition.

 

Indoor air can be 5 times more polluted than outside, due to factors like paint, furniture, carpet, air fresheners, toys...etc. These are the factors that cause allergies, asthma, concentration, sleep quality, skin health, and many more health problems.

Nowadays, people spend a lot of times in the offices which consist of many such factors. These factors could affect health and thus hinder productivity. It is of great importance for companies to provide a better working environment to ensure the health of employees.

 

Awair 2nd edition helps companies to track the air quality factors that affect health, including:

Chemicals: Known as volatile organic compounds, can be found in everyday materials. They can cause skin and respiratory irritation.

CO2: Indoor exposure can hinder productivity and decision making.

Temperature: Influence comfort and mood.

Humidity: Unproportional humidity is a risk for toxic mold.

Fine Dust: Known as PM2.5. Exposure to fine dust can trigger asthma, allergies and heart failure. Fine Dust is incredibly common from everyday activities such as cooking and heaters.

Along with tracking air quality, Awair 2nd edition also includes more personalized tips and recommendations to help improve health goals. All these are done through Awair App.

 

Don't hesitate and contact us for this life-saving product!

 


Solution for cyber attack

"It has already happened, it is happening now and if we do not change it it will happen in the future"

Dutch cybersecurity scientist Volkan Kaya stated that the x.509 standard PKI which determines the format of digital certificates is weak. With years of experiences working in the banking industry and graduated from Cyber Security Academy, he can easily shut down the entire Internet. In The Netherlands, the vulnerability of the Internet had also shown by the DigiNotar attack.

 

Certification protocols should be exist based on the 'truth' instead of 'trust'. 

X.509 issue digital certificates through e-mail. The e-mail message protocol (smtp) is not a secure protocol and can be intercepted by attackers.

The x.509 issues multiple certificates by using different key pairs at the same time for a specific domain name. Kaya: "The flexibility of having multiple valid certificates for the same host computer at the same time makes it possible to issue false valid certificates without knowledge of the host computer itself."

 

Kaya came up with new PKI certificate so-called ConsensusPKI. 

The certificates authorities in ConsensusPKI are collectively responsible for the identity of the normal computers and also the identity of all certificate authorities. Only the most recently issued certificate is a valid certificate. The certificate issuance process requires authentication of the CVRs by multiple CAs. All verifications performed during the certificate issuance must be broadcast to other CAs so that the verified CVRs can be saved to the related certificate blockchain. They can in turn issue a verified certificate.

For the interpretation of the certificates, CAs have to interrogate their database by client systems. The CAs must retain all blocking data that represent all certificates in the ecosystem that are stored in the CA infrastructure. The CAs must protect the blocking data that they store so that they can respond fairly to the incoming questions.

Finally, the certificates in the ConsensusPKI do not carry signatures of the issuing CAs. ConsensusPKI requires CAs to be honest during the use and issuance of certificates. The PKQuery and fetch processes of the ConsensusPKI ensure that the core of ConsensusPKI is maintained.

 


How to recycle computer equipment

What normal company does

  • Donate to non-profits
  • Return products to the manufacturer
  • Take to professional disposal waste
  • Resell to the original seller

What Eht does

  • Buy used/obsolete computer equipment
  • Sell refurbished computer to other company

 

What are the benefits of choosing EHT?

  • Reduce waste and save the environment 
  • Optional Data Wiping: We offer an option to wipe out all your data
  • Cost Effectiveness: Stretch your budget further by buying certified pre-owned hardware, giving you all the functionality and capabilities of a new system, for a fraction of the price.
  • Shorter Lead Times: With an extensive multi-million-pound stock holding, Easy Hardware Trading can get you the part or system you need, when you need it.
  • Time-Efficiency: In order to make IT managers time efficient, we look for fair hardware prices on the market

 


Cloud Makes Video Surveilance Smart

Programming for the investigation of video pictures and man-made consciousness (computerized reasoning, ai) decide the eventual fate of camera reconnaissance. Dean Drako, the co-founder of Barracuda Systems, points with his Eagle-Eye Systems for a future in which cameras work cleverly as well as assume control over a great deal of work. "At that point less protects will be required."

According to Dean Drako of Eagle Eye Networks, the new ai-driven cloud applications bring safety to the workplace, in stores and factories, to a higher level. Security is largely automated. The monitoring and giving of alarms are automatic. According to Dean Drako of Eagle Eye Systems, the new ai-driven cloud applications convey wellbeing to the working environment, in stores and industrial facilities, to a more elevated amount. Security is to a great extent computerized. The checking and giving of alerts are programmed.

Camera frameworks serve security as well as help enhance business forms. As of now, just a single in every hundred cameras has an unexpected capacity in comparison to wellbeing. Yet, that is moving. "40% of the cameras will add to business insight," predicts Drako.


New Sony patent on PlayStation 5

Sony is at the stage of development of a new patent, which will be compatible with PlayStation 5. The patent will have all of the consoles from previous versions of PlayStation. In fact, fans of PlayStation should love this idea!

Theoretically, PlayStation 5 might run software from the legacy devices like PlayStation 4, PlayStation 3, PlayStation 2,  and PSone. The idea is that the patent will be tricking the legacy software that it runs on the original device. It will imitate the behavior of the previous version of PlayStation in order for the new hardware to function with the old one. The PlayStation 5 will have the console with 8-core Ryzen CPU and a custom GPU based on AMD's Navi architecture.

 

 


Google and Maurithuis collaborate on the project

Google and Maurithuis stepped into the project in order to incorporate famous works of the painter Johannes Vermeer into a virtual environment. With the project "Meet Vermeer",  visitors will experience what a virtual museum is. They can physically walk in the virtual museum through the augmented reality and view 36 paintings by zooming them in. In past, Google already worked with Maurithuis on the French project " Arts & Culture". This is the second time that Google and Maurithuis will collaborate on the same project from Paris.

However, five developers from Google will create the virtual exhibition with paintings of Vermeer for "Arts & Culture" project, so that people all around the world can view masterpieces of the painter. The most interesting element for the creation of the virtual museum is visitor's contribution. People can build the museum themselves. For that purpose, they can use a tour creator by Google, Poly Tours. The tour creator allows using formats ar and vr. To view paintings, visitors should have ARCore (Android) or ARKit (iOS) platforms downloaded on their phones. They can also use normal vr mode on phones.

Furthermore, Google developed the Art Camera two years ago. This robot camera is used for providing people with a virtual view of the paintings of Vermeer. More than that, the camera scan and take a photo of a painting on a distance in 1 meter and uses laser and sonar for a good focus. Therefore, it is possible to zoom in the paintings to view them better. However, paintings can be zoomed only outside of the ar platform.

The "Meet Vermeer" project is a brilliant idea to view and enjoy masterpieces of the great painter Johannes Vermeer!


Review for the Razer Blade Stealth 13 laptop

The new Razer Blade Stealth 13 laptop is now released. The model comes with an Intel Core i7-8565U processor and a 13.3-inch 1080p display. Therefore, it can increase up to 4X performance that is important for businesses when creating content.  The laptop packs a 256GB SATA SSD and 8GB of RAM. The laptop has a new Razer Chroma keyboard and therefore, it combines style and power, which ideally suits for work.

Razer Blade Stealth is also a great opportunity for businesses to work from the laptop as the speed of Intel Core i7-8565U processor reaches 4.6GHZ and up to 16GB RAM. The unibody frame of the Razer Blade Stealth 13 laptop is made of high-grade aluminum, which has good durability. The logo of Razer is in a black color, which makes it very elegant and stylish. The 4K display has 100% of sRGB compatible colors, which produces high-quality visuals and a touchscreen with better productivity.

 

 

 


Cyber Hygiene

Cyber hygiene is the way for data being protected. This helps to protect devices from malware. The data is stored safely from theft and cyber attacks. Cyber hygiene is a sort of instruction and practices, which users of devices can do for the benefit of a system's health and security. There are several practices to follow to protect data and secure functioning devices:

  1. Hardware, software, and applications should be documented. Make a list where you will document it.
  2. From the list, you will see which equipment is not used, software and some apps need to be updated or even uninstalled.
  3. All of the practices for cyber hygiene can be noted down. It can be created a policy for users. The policy might contain information about password changes, software or hardware updates, new installs, back up information, etc.

Users should folow these simple practices to avoid any issues with cybersecurity in future.