THE BEST WAY TO BE GREEN : REFURBISHMENT

As every Tuesday, Easy Hardware Trading presents a new way to become a green company.

The topic of today is very important for us because it represents the main activity of how EHT operates and shows that the involvement of Easy Hardware Trading in the green world is very high.

The green activity that we are going to be presenting today is called refurbishment. This process involves old and obsolete hardware presenting itself as one of the best ways to recycle material, help the environment, and it represents the most efficient use of resources.

- Performance: the refurbished product will be equivalent to the new or same configuration.

 

The US Environmental Protection Agency wrote that “Two million tons of used electronics are discarded yearly- only 18 percent of computers and television are recycled”. The process of refurbishment consists of cleaning, testing, reconfiguring and warranting the product for further use, instead of just throw it away and waste its potential.

Companies choosing refurbished products instead of new ones will have significant benefits:

- Cost savings: a refurbished product is cheaper than a new one.

- Reliability: the product is tested to identify defects and repaired them. In this way, even if the product is not new, it will be able to perform well for several years.

- Availability: there is a high availability of refurbished products to choose from.

- Value: buying the refurbished product will not represent a loss of value.

- Environmentally friendly: buying a refurbished product will help the environment since the overall carbon footprint deriving from the production of the new product will decrease and the carbon emission will decline.

In the picture, it is shown a part of the refurbishment process at Easy Hardware Trading.


A NEW FREE TOOL TO FIGHT MALWARE ATTACKS

 

SentinelOne released Blacksmith, a free Linux tool that can detect meltdown vulnerability exploitation attempts. The Blacksmith tool influences the performance counting feature on modern chipsets. This lets Blacksmith monitor processes to detect malicious behavior. The Meltdown vulnerability generates these patterns during exploitation. Blacksmith reports detected exploitation attempts by email, which allows each admin to take individual action to clean up the exploitation. Linux is one of the preferred world’s supercomputer’s brand, and this makes it a high-value target for attackers. Therefore, it was urgent finding a solution to secure Linux computers from malware attacks and meltdown, since several businesses and working places could have been affected by them.  Meltdown creates a vulnerability that puts Linux powered computers at risk. The flaw is in the kernel that controls the chip performance that allows commonly used programs to access the contents and layout of a computer's protected kernel memory areas. This tool represents one of the safest and most reliable solution to fight malware attacks and meltdowns at a very fair price.


Easy Hardware Trading going green: meeting the standards of EU WEEE Directive

Easy Hardware Trading is active in the green world and the recycling services offered meet the strict standards of the EU Waste of Electrical and Electronic Equipment (WEEE) Directive. The EU estimated that the waste of electrical and electronic equipment (WEEE) will grow to more than 12 million tonnes by 2020. One of the main reason causing this phenomenon is that the production of modern electronics requires the use of scarce and expensive resources that, if not properly managed, can cause environmental and health problems. To improve the environmental management of this mixture of potentially dangerous materials and components, treatment and recycling of electronics at the end of their life is needed.

To address these problems a legislation has been set up and divided into two main Directives: the Directive on waste electrical and electronic equipment (WEEE Directive) and the Directive on the restriction of the use of certain substances in electrical and electronic equipment (RoHS Directive).

The first WEEE Directive was founded in February 2003. The Directive created schemes where consumers return their WEEE free of charge with the aim to increase the recycling of WEEE and re-use. To fight the fast increase waste stream, in 2008 the new WEEE Directive was proposed and implemented on the 13th of August 2012 and became effective on 14 February 2014.

EU legislation restricting the use of potentially dangerous substances in electrical and electronic equipment (RoHS Directive) entered into force in February 2003. The legislation requires heavy metals (lead, mercury, cadmium, and flame retardants such as polybrominated biphenyls) to be replaced by safer alternatives. The updated RoHS Directive became effective on 3 January 2013.

In 2017 a common methodology has been established for the calculation of the weight of electrical and electronic equipment (EEE) placed on the national market in each Member State and also a common methodology for the calculation of the quantity of Waste of Electrical and Electronic Equipment (WEEE) generated by weight in each Member State.

Meeting the requirements of this EU Directives is helping Easy Hardware Trading to show its green spirit to several clients. The meeting of these requirements is hardly recommended to each type of companies with the aim to reduce the electronic waste and being more environmentally friendly.


ARTIFICIAL INTELLIGENCE IN THE CITY

Hello, today we want to talk to you about the future. We are already living in the future without realizing it. This is all made

possible with the help of software and hardware constantly evolving.

Artificial intelligence, smart cities and robots:

Here’s how the future applications will be: self-managing and adaptive to our needs, which is the era of digital cohesion – according to the study by Juniper Networks, a company specialized in ethernet network switch. The era of self-aware machines is coming – Juniper Networks stated. The company as an expert in scalable and secure networks, has calculated the advantages of learning machine and AI, virtual reality and augmented reality. Just think about wandering around the city to watch the sky and see the routers in every corner, repeaters, cameras, HUB, SWITCH, ROUTER, all interconnected, which managing the public lightning or controlling the pressure of the sewage system. We can presume that in the near future, we will increasingly find ourselves submerged with AI and smart cities.

Self-managing application

According to Juniper Networks, we are in full Digital Cohesion, an era in which technology can self-manage, adapt to the user’s behavior and enterprise needs. Learning features are incorporated into the chips will greatly increase the intelligence of machinery. At the beginning of 2016, Juniper predicted that 80% of corporate networks have adopted a form of open networking. In the survey, 84% of professionals claim to have self-managing application within the company.

10.3 million devices connected to the cellular network

The 2016 data come from Istat shows that 69.2% of Italian households have access to the Internet at home. The year before, the percentage reached 66.2 percent. There is no reason to believe the trend would stop. Not only villas and apartments will be connected, but also domestic appliances. According to the Internet of Things Observatory of the Milan Polytechnic, the market in Italy has reached 2 billion euros and there are about 10.3 million devices connected by the cellular network.

Robots in companies

The robot will dethrone us. A McKinsey & Company study indicates that more than 5% of human workers will be replaced by computers. Employment contracts will not end up in trash: while the machines deal with repetitive tasks, the technicians will have time to devote themselves to strategic initiatives, or improving competitiveness, increase efficiency and bringing benefits to the business. In the coming years, with the automation of many basic technology activities, several frictions within the IT group will be eliminated, allowing the staff to follow other tasks.


Intrusion issues? No problem with “Intrusion Prevention Sensor”

An IPS can be considered as an intrusion prevention mechanism.

Intrusion detection and prevention systems provide us with the first line of defense against harmful intruders. We must not consider an IPS as a substitute for IDS (it is a different case if the same tool provides all the functions of both instruments). IPS and IDS provide the control and visibility required by any company to protect their infrastructure from attack and take-over.

One of the most important factors to take in consideration when using an IPS / IDS is a correct insertion into the infrastructure through distribution. Improper implementation will lead to a huge network slowdown and improper management.

The main function of an IPS is therefore to identify the harmful activities, to try to block or cease their activity, to report the activity.

The IPS, therefore, provides a valid security prevention. The IPS detects an intrusion into network traffic.

An IPS should not be confused or confused as a substitute for another network security measure, in particular: the firewall. The task of a firewall is to restrict access to a network/system and is generally unable to detect and prevent an intrusion.