• IT Outsourcing 2
  • Data Recovery
  • Digital Signage
  • Green Initiatives
  • Tablets
  • Web Hosting 2
  • GPU Workstations
  • Custom Integration
  • NBD Systems

Windows 7 End-of-Sales Date & End of Mainstream Support Date

xp eos

 

With End of Support for Windows XP looming – only 26 days to go – it is clear that Microsoft doesn’t intend to keep supporting their operating systems forever, regardless of their popularity. Recently they have updated their Windows lifecycle fact-sheet to include two very important dates regarding their customer’s beloved Windows 7.

Read more...

Intel Reveals 800Gbps Cables for Data Centres & Supercomputers

 

In the second half of 2014 Intel plans to release specialty cables designed for supercomputers and cloud datacentres that are capable of transmitting upwards of 800Gbps. To put that in perspective that is about 100 gigabytes per second – or the contents of two full Blu-Ray discs transferred in one second.

Read more...

Technology Showcase Recap

 

This year on February 13th and 14th we held our Annual Technology Showcases at both University of Guelph, and Western University – and thanks to all of the wonderful faculty and staff from both Campuses that attended – our Showcases were better than ever.

This year we hosted vendors from Lenovo, OKI, Ergotron, YouRHere, Targus, and more. All of our vendor representatives have said that the turn-outs at these events enabled them to get the word out on both Campuses about their products and promotions.

Read more...

Oki’s March Madness Promotion

 

image002OKI is one of our preferred options for multi-function and printing solutions, not only because they enable us to pass on great deals to our customers, but because they provide quality products and excellent service – something we strive for every day.

Read more...

Systems Give Away Their Own Encryption Keys

Researchers from Tel Aviv University have used "Acoustic Cryptanalysis" to acquire the encryption key to a 4096-bit RSA encrypted laptop. The method of attack involves recording the sounds generated by a system while it is accessing the sensitive information, the reason that this is possible is that the system generates unique low-frequency sounds during the decryption process. Originally when the researchers presented their findings in 2004, they had only noted that the systems generated this noise but it wasn't until now that they were able to prove that the encryption keys could be extracted in under an hour.

Read more...