Encom Blog

  • Intel® Threat Detection Technology (Intel® TDT)

    Intel uses built-in graphics to scan for viruses, making your processor run faster Laptops should hopefully see battery life benefits, as well Intel uses built-in graphics to scan for viruses, making your processor run faster and laptops should hopefully see battery life benefits...

    Intel® Threat Detection Technologies suite of hardware assisted technologies can be incorporated into ISV security solutions to augment their existing capabilities to improve the detection of advanced cyber threats and exploits.

    Techradar's Darren Allan discusses the new technology below

    Intel has announced new technology for its processors to help combat malware more effectively, and to improve the performance of a PC while doing so by offloading virus scanning duties to the integrated GPU.

    Intel explains that its new Threat Detection Technology (TDT) uses functionality built-in at the silicon-level to help defeat exploits, and the first line of defense introduced is something called Accelerated Memory Scanning.

    Rick Echevarria, VP of platform security at Intel, stated: “Current scanning technologies can detect system memory-based cyber-attacks, but at the cost of CPU performance. With Accelerated Memory Scanning, the scanning is handled by Intel’s integrated graphics processor, enabling more scanning, while reducing the impact on performance and power consumption.”

    Intel’s own early tests show that the amount of processor resources used in scanning drops from 20% to 2% in the best case scenario, which is obviously a huge step forward in terms of efficiency.

    Less CPU usage will in turn help on the power consumption front, of course, so hopefully this could mean a little bit of extra battery life when it comes to the likes of notebooks.

    This technology will be available to those who are running 6th-generation Intel processors or newer, so in other words, Skylake and onwards.

    Other firms could also be able to benefit from Accelerated Memory Scanning, and on the software front, Microsoft is going to integrate this tech into Windows Defender Advanced Threat Protection’s antivirus armoury.

    Machine learning

    Furthermore, Intel also took the wraps off Advanced Platform Telemetry, another security-oriented tech driven by machine learning and capable of detecting advanced threats (while minimizing any false positive detections). This is aimed at businesses, though, and will be used by Cisco’s Tetration platform (which delivers security for data centers).

    Obviously, all this goes some way to underlining how hard Intel is working to make its processors more secure, in light of the recent chaos caused by the far-reaching Spectre and Meltdown bugs.

    Threat Detection Technology’s toted performance improvements certainly won’t hurt in fighting all the flak Intel has had fired at it over the slowdown caused by the Spectre and Meltdown patches, which could have a substantial impact on some systems.

    See Techradar article

  • 8th Generation Intel® Core™ vPro™ Platform

    Get the data-driven performance, hardened security, and flexible management your business needs to stay ahead of what’s next. All with new 8th Generation Intel® Core™ vPro™ processor-based computers. Get the data-driven performance, hardened security, and flexible management your business needs to stay ahead of what’s next. All with new 8th Generation Intel® Core™ vPro™ processor-based computers.

    • Performance: Reduce latency, enable multitasking, and boost performance. Experience a premium Computing Experience by increasing productivity with amazingly responsive computing systems.
    • Security: Defend your business with hardware-enhanced security. Strengthen endpoint security with a deeper layer of built-in protection.
    • Manageability: Get remote maintenance, wireless manageability, and out-of-band capabilities. Flexible Management: Save time and reduce expenses with powerful, efficient remote management.
    • Stability: Manage endpoint lifecycle complexities. Consistent Computing Infrastructure: Avoid problems with a stable common platform that enables device choice.

    Enhance the Client Experience with Next-Generation Enterprise PCs

    Organizations today are undertaking tremendous digital transformations. They are adopting new technologies to identify new marketplace opportunities, enhance the customer experience, increase internal efficiencies and more. Enterprise PCs play a key role in supporting and accelerating these digital transformations. As organizations look to refresh their existing fleets, they need to select PCs that help boost employee productivity and meet evolving employee expectations while addressing rigorous enterprise IT requirements. Organizations worldwide are facing new challenges in improving employee productivity. They must support an increasingly mobile workforce, enabling employees to work anytime, anywhere. In selecting enterprise PCs, organizations need systems that can offer the robust performance for a wide range of demanding applications, the flexibility to accommodate a diverse array of working styles and the connectivity to support employees on the move.

  • Access Control and GDPR

    With GDPR deadlines fast approaching now is the time to take a fresh look at the physical aspects of security to ensure that you meet your obligations. With GDPR deadlines fast approaching now is the time to take a fresh look at the physical aspects of security to ensure that you meet your obligations.

    Much emphasis is placed on ensuring that passwords, personal information and back-up data is secured but a vital component of GDPR is to ensure Physical Security meets the regulations.

    • Axis Access Control is a cost effective way to manage access to offices, comms rooms, servers and anywhere sensitive or personal data is stored.
    • Easy to set-up and install, you can secure spaces with a Network Door Controller, Card Readers and Mobile Phone Access Control.
    • Axis Open Interface integrates easily with your existing security systems and hardware.
    • Full flexibility from adding a single door in a small office to integrating a large facility.
    • Easily add and remove users and change access rights to different locations.

  • Video Surveillance and GDPR


    "At a time when technology, including smart cameras, allows companies to collect much more sensitive information about individuals, more stringent supervision of the protection of personal data is certainly needed. A video recording of an identifiable person naturally forms part of an individual’s personal data. The General Data Protection Regulations (GDPR), which will apply throughout the European Union from May 2018, will therefore affect camera system operators."

    Mgr. Eva Škorničková, training and consulting website, GDPR.cz,

    • As regards camera systems, with the advent of the GDPR there is no longer an obligation to notify the Office for Personal Data Protection.
      • On the other hand, GDPR introduces some new obligations, such as keeping records of activities. Record keeping is a kind of substitute for the cancelled registration duty under the current Act Since operating a camera system cannot be considered occasional processing, each CCTV operator should prepare for this new duty in time. Just like today’s Section 13 of Act No. 101/2000 Coll., the GDPR contains a separate section dealing with data security, which concerns the obligations of the administrator.
    • People who find themselves being filmed by a camera have a new right to more accurate information about their data processing
      • According to the GDPR, the administrator should take all appropriate measures to provide the monitored persons with information in a brief, transparent, comprehensible and easily accessible manner concerning the processing of their data by the camera system, especially when it comes to data about children. This means that when I enter a shop where cameras are watching me, besides the sign with information about cameras, I have the right to know the details of the recording, and the administrator should make this information available in writing or by other means in printed or electronic form.
    • Another new obligation under the GDPR is mandatory reporting of data leaks to the Office for Personal Data Protection.
      • The reporting of breaches of personal data to the Surveillance Authority (Article 33) is a new obligation under which the administrator must report any breach of personal data security to the competent supervisory authority under Article 55 without undue delay and, if possible, within 72 hours of becoming aware of the breach, unless it is unlikely that the breach would result in a risk to the rights and freedoms of natural persons. This new duty will definitely apply to the camera system operator, so it is essential that they take full account of the secure processing of these records.
    • Does the GDPR make employee monitoring harder?
      • The same rules that the Office for Personal Data Protection already define in its opinion will apply. Employees must therefore be informed about the location of the camera system, but there is no need to ask employees for their consent, as this involves processing of personal data on the basis of the employer’s legitimate interest. The working group also issued further guidance on employee monitoring at the workplace under Article 29 in June 2017.
    • Consider appointing an Officer
      • A final consideration if you offer video as a service. Consider appointing an Officer. The GDPR specifies the role of the administrator, who has the primary responsibility for the handling of personal data, and the role of the processor. The current trend in video surveillance is a model where the entire solution, including cameras and other hardware, software and data storage, are the property of the processor (outsourcing company), while the administrator only rents the service. The supplier company is likely to be a specialist in the processing of personal data, and in addition, according to the GDPR, it must appoint a so-called data protection officer, a person who acts as a consultant and mediator for all data security issues.
  • Samsung SMART Signage DME-BR Series

    The Samsung SMART Signage DME-BR Series is ready-to-use, all-in-one E-board display for corporate and educational organizations. The Samsung SMART Signage DME-BR Series is ready-to-use, all-in-one E-board display for corporate and educational organizations.

    • Interactive whiteboard style design with a pre-assembled touch overlay from factory
    • Infrared touch screens that allows for dual drawing capabilities, enabling up to 10 touch points
    • All-in-one, PC-less E-board display solution with an embedded MagicIWB S2 software
    • Compatibility with an optional MagicIWB I2 software for advanced E-board functionality
    • A Smoother, More Interactive Writing Experience Using Touch:
      Featuring a pre-assembled Touch Overlay and a variety of collaboration-enhancing capabilities, the Samsung e-Board display alleviates misconceptions that digital display writing is complex and unnatural. Instead, the DME-BR’s touchscreen offers a smooth and comfortable writing experience. The DME-BR display’s hand touch function enables up to 10 different participants to touch the display’s screen using two fingers to make content selections, comments or edits, with those individual actions easily recognizable to the entire group. This versatile usability promotes efficiency and productivity by compiling individual feedback within a single source and offering greater visibility to all participants of discussed content.
      For added convenience, the Samsung e-Board display also comes with a hand eraser tool useful for erasing larger areas of the screen. Instead of users having to search for and work through a specific removal function key, the simple and intuitive hand eraser makes content revision fast and user-friendly.
    • A More Engaging, Interactive Content Management Experience: dm82e-br02
      The Samsung SMART Signage e-Board display’s embedded MagicIWB S2* interactive content management software solution transforms a traditional presentation into a dynamic business or educational experience. As an all-in-one touch solution, Samsung’s free MagicIWB S2 program delivers added flexibility for extensive collaboration before, during and after meetings or classes without requiring the use of separate dedicated PCs or additional devices. A touch-activated floating menu enables users to independently control, display and shuffle between multiple screens and various text, image, audio and video content files. Once sessions conclude, MagicIWB S2’s compatibility with standard office software programs lets users update, save, capture, print and share files for later viewing. With the support of the MagicIWB S2 solution, the Samsung e-Board display enhances the overall knowledge-sharing process through deeper engagement and all-inclusive file management.

      *Note : Samsung’s MagicIWB I2 software, an advanced version of MagicIWB, is available for e-Board display users, but requires a separate PC for operation.


    • Versatile Usability with Extensive Connectivity and Easy-to-Use Touch Capability:
      Today’s business and educational environments require advanced compatibility for users to easily read and share content. Through its enhanced and versatile connectivity, Samsung’s e-Board display allows users to access, share and revise content via their own laptops, tablets and smartphones. This superior connectivity stems from the display being equipped to support a range of signal input sources, including HDMI, D-Sub, DisplayPort (DP), DVI and USB ports, which are compatible with nearly all external devices.

      Furthermore, the Samsung e-Board display’s auto switching for the touch function eliminates the headache of needing two different cables to use touch with a notebook PC. Instead, the display features an easily assessable touch out cable (USB upstream) on the side of the front pen tray. Users just need to plug the single touch cable into the USB, connect the cable to the notebook PC and setup source. Together, these integrated solutions simplify multi-device setup and connectivity, as well as ensure convenient utilization of the display’s advanced touch capability.


    • An Intuitive Design that Promotes Efficiency and Usability:
      The Samsung SMART Signage e-Board display’s pre-assembled design allows users to comfortably install, control and work with the all-in-one e-Board solution. As part of its professional-grade design, the Samsung e-Board display incorporates a front pen tray for convenient storage and easy access to display components. With a design format resembling that of an analog white board, the Samsung e-Board helps ensure user familiarly and seamless technology adoption, while also bringing design sophistication and advanced functionality to business and educational environments. Additionally, the display’s design positions simplified hot keys on the front and side of the pen tray. The shortcut hot keys allow users to easily locate and select frequently-used functions, including touch on/off, quick menu, power on/off, touch out USB and HDMI, with the simple push of a button.

      With the Samsung SMART Signage e-Board, business professionals and educators can economically utilize space while delivering the functionality essential for effective collaboration and productivity.

      Click here for more information on Samsung E-Boards

      Call Us: 01 4545 465

  • Password Free Solutions and Biometric Identifiers

    The infrared camera in Microsoft Surface devices isn’t just taking your photo for facial identification, says Rob Lefferts, director of program management for Windows Enterprise and Security. “It’s actually building a 3D map of your face. It has depth and characteristics, and we use multi-spectrum analysis so we’re getting multiple images of your face from different perspectives. The infrared camera in Microsoft Surface devices isn’t just taking your photo for facial identification, says Rob Lefferts, director of program management for Windows Enterprise and Security. “It’s actually building a 3D map of your face. It has depth and characteristics, and we use multi-spectrum analysis so we’re getting multiple images of your face from different perspectives.

    In the article below Microsoft's Suzanne Choney writes about Microsoft's drive to secure devices and secure individuals. 'Verifying your identity based on physical characteristics like a face or a fingerprint will remove the requirement for complicated, difficult to remember passwords'.

    FIDO (Fast IDentity Online) Alliance is the World’s Largest Ecosystem for Standards-Based, Interoperable Authentication with the aim to provide better security for online services, reducing costs and making it safer for consumers.
    More than 250 cross-industry, global leader member organizations belong to the FIDO Alliance. With Microsoft on the alliance’s board of directors, the organisation includes Intel, Google, Samsung, Qualcomm, Visa, PayPal, eBay, Bank of America, MasterCard, American Express and Verizon.

    Stolen passwords are so commonplace among criminals that they can easily buy 1,000 usernames and passwords for less than $20 on the dark web – and can inflict a good amount of financial damage for such a small investment.

    The standard approach to passwords – change them frequently, and make sure they include a combination of capital letters, numbers and special characters – is based on guidance issued in 2003 by the National Institute of Standards and Technology (NIST).

    Microsoft sees a better way forward. Through intelligence, innovation and partnerships, the company is helping to drive an industry-wide shift beyond passwords.

    The underlying technologies are advanced, but the approach couldn’t be simpler: Instead of making you remember a list of passwords, Microsoft is making you the password.

    “For several decades, the industry has focused on securing devices,” says Bret Arsenault, Microsoft’s corporate vice president and chief information security officer. “That model needs a makeover. Securing devices is important, but it’s not enough. We should also be focused on securing individuals. We can enhance your experience and security by letting you become the password.”

    Microsoft began a major move to eliminate passwords with Windows Hello, introduced in Windows 10. Windows Hello is designed to work on any Windows 10 device with biometric sensors to verify your identity based on physical characteristics like a face or a fingerprint.

    For example, the infrared camera in Microsoft Surface devices isn’t just taking your photo for facial identification, says Rob Lefferts, director of program management for Windows Enterprise and Security. “It’s actually building a 3D map of your face. It has depth and characteristics, and we use multi-spectrum analysis so we’re getting multiple images of your face from different perspectives.”

    Another approach to eliminating passwords is to incorporate other objects or devices you have with you. For example, if you’ve got an iOS or Android device, you can use the Microsoft Authenticator App to sign into your Microsoft account with a PIN (personal identification number) or fingerprint as verification. Businesses will soon be able to offer employees the same, easy phone-based authentication for corporate apps and internal resources through Azure Active Directory and Microsoft 365.

    These newer systems are easy to use, and that’s crucial when it comes to encouraging people to switch from a widely adopted security system, like passwords, that may be bad, but is also familiar.

    “We are encouraging users to try it, and see for themselves that it is easier to use than passwords,” says Lefferts. “I think one of the fears that people have is that new technology is just going to be more complicated, and not realize that we’ve pushed to make it simpler and better.”

    Already, roughly 70 percent of Windows 10 users with biometric-enabled devices are choosing Windows Hello over traditional passwords.

    Getting rid of passwords is front and center for the FIDO (Fast IDentity Online) Alliance, a nonprofit consortium of industry leaders, including Microsoft, that has developed open standards for simpler, stronger authentication. Specifications and certifications from the FIDO Alliance have enabled a broad ecosystem of hardware-, mobile- and biometrics-based authenticators that can be used with many apps and websites.

    “We are committed to solving this problem across the industry, which is why we’re collaborating with others in the technology industry via the Fast IDentity Online Alliance,” says Arsenault. “We’ve built a blueprint for the technology, now known as FIDO 2.0, shared it, and participated in its evolution through open collaboration with others in the alliance.”

    FIDO applications are already enabled on many of the top global manufacturers’ handsets, and more than 350 products are now FIDO Certified, giving enterprises and online service providers a variety of interoperable FIDO authentication solutions to choose from.

    “We wanted to replace passwords, so we needed the same kind of scalability that passwords have,” says Brett McDowell, executive director of the FIDO Alliance. “You can use a password anywhere, and we needed a technology that would work not only anywhere, but eventually, everywhere. And so we knew we needed to have an open industry standard. That was the first step.”

    The next step? “We had to make sure that the secrets were never shared, so we built on the ‘proof of possession’ model established in public key cryptography as the basis of the FIDO security model,” McDowell says.

    The private key stays on your personal device; “it is never shared over the internet, it is never put in a database,” McDowell says. “Instead of a password being stored on the server, only the public key for that account is ever shared with the online application so it can be used to verify what is called a ‘cryptographic signature’ from the user’s device during future authentication challenges.” This process confirms “proof of possession” of the private key without ever sharing the private key itself, he says, “thus ending phishing for credentials and/or reusing stolen credentials from a data breach.”

    “You’re using a cryptographic credential bound to a device, unlocked by an on-device biometric challenge,” McDowell says. “And that is exactly how Microsoft’s Windows Hello system works.”

    While Windows Hello and FIDO are key to extending password-free solutions to the general public, in many ways enterprises like Microsoft have been leading the movement. By using Azure Active Directory’s built-in identity protection in concert with Windows Hello, Microsoft has been giving commercial customers a new approach to security that uses threat intelligence and machine learning to shift the focus from securing the corporate perimeter to securing individuals and their identities.

    This new way of thinking enables IT to better protect data and documents, while simultaneously reducing end user friction with simpler password-free sign ins and access to corporate apps and services wherever they are.

    Arsenault says much of what Microsoft has learned about what it takes to move people beyond passwords “comes from our experiences in securing Microsoft’s own 125,000 employees in more than 100 subsidiaries worldwide, who serve over a billion people worldwide every day.”

    “Like any other company or household, human error and weak passwords make the easiest targets for criminals,” Arsenault says.

    Today, “the majority of Microsoft employees already log in to their computers using Windows Hello for Business instead of passwords,” he says. “Very soon we expect all of our employees will be able to go completely password free.”

    Microsoft has a long history of making futuristic technology available to all. Delivering password-less technology through the world’s most popular operating system and intelligent commercial software, building companion solutions for a growing range of devices, and a willingness to share learnings with the industry along the way give Microsoft a unique ability to dramatically accelerate the transition away from the No. 1 source of data theft – passwords.

    Lefferts says Microsoft is committed to helping all customers live in a “password-less world.”

    “It will take time for all the parties, all the important websites and all the important line-of-business applications to adopt this technology, and it will take even more time for users, customers and organizations to make the cultural shift required so that people can really live in this new world,” he says. “But we have the blueprint for accelerating the move away from passwords. The key to success is making sure that the user experience is actually easier and better than what they have with passwords today.”

  • GDPR for Individuals

    The GDPR specifies the roles, processes and technologies organizations must have in place to ensure the personal data of EU residents is secure, accessible, is used appropriately and with consent. The GDPR specifies the roles, processes and technologies organizations must have in place to ensure the personal data of EU residents is secure, accessible, is used appropriately and with consent.

    GDPR for individuals

    The General Data Protection Regulation (GDPR) from 25th May 2018 will replace current data protection laws in the European Union.

    • The new law will give individuals greater control over their data by setting out additional and more clearly defined rights for individuals whose personal data is collected and processed by organisations. The GDPR also imposes corresponding and greatly increased obligations on organisations that collect this data.
    • Personal data is any information that can identify an individual person. This includes a name, an ID number, location data (for example, location data collected by a mobile phone) or a postal address, online browsing history, images or anything relating to the physical, physiological, genetic, mental, economic, cultural or social identity of a person.
    • The GDPR is based on the core principles of data protection which exist under the current law. These principles require organisations and businesses to:
      • collect no more data than is necessary from an individual for the purpose for which it will be used;
      • obtain personal data fairly from the individual by giving them notice of the collection and its specific purpose;
      • retain the data for no longer than is necessary for that specified purpose;
      • to keep data safe and secure; and
      • provide an individual with a copy of his or her personal data if they request it.
    • Under the GDPR individuals have the significantly strengthened rights to:
      • obtain details about how their data is processed by an organisation or business;
      • obtain copies of personal data that an organisation holds on them;
      • have incorrect or incomplete data corrected;
      • have their data erased by an organisation, where, for example, the organisation has no legitimate reason for retaining the data;
      • obtain their data from an organisation and to have that data transmitted to another organisation (Data Portability);
      • object to the processing of their data by an organisation in certain circumstances;
      • not to be subject to (with some exceptions) automated decision making, including profiling.
    • Organisations and businesses collecting and processing personal data will be required to meet a very high standard in how they collect, use and protect data. Very importantly, organisations must always be fully transparent to individuals about how they are using and safeguarding personal data, including by providing this information in easily accessible, concise, easy to understand and clear language.
    • For organisations and businesses who breach the law, the Data Protection Commissioner is being given more robust powers to impose very substantial sanctions including the power to impose fines. Under the new law, the DPC will be able to fine organisations up to €20 million (or 4% of total global turnover) for the most serious infringements.
    • The GDPR will also permit individuals to seek compensation through the courts for breaches of their data privacy rights, including in circumstances where no material damage or financial loss has been suffered.
    • Call Us: 01 4545 465

  • General Data Protection Regulations (GDPR)

    The GDPR specifies the roles, processes and technologies organizations must have in place to ensure the personal data of EU residents is secure, accessible, is used appropriately and with consent. The GDPR specifies the roles, processes and technologies organizations must have in place to ensure the personal data of EU residents is secure, accessible, is used appropriately and with consent.

    On May 25th 2018 organisations and businesses face increased obligations and responsibilities for how they collect, use and protect personal data. The General Data Protection Regulation (GDPR) comes into law and requires organisations and businesses to be fully transparent about how they are using and safeguarding personal data, and to be able to demonstrate accountability for their data processing activities.

    Click here for more on GDPR for Individuals

    1. Becoming Aware

    It is imperative that key personnel in your organisation are aware that the law is changing to the GDPR, and start to factor this into their future planning. They should start to identify areas that could cause compliance problems under the GDPR. Initially, data controllers should review and enhance their organisation’s risk management processes, as implementing the GDPR could have significant implications for resources; especially for more complex organisations. Any delay in preparations may leave your organisation susceptible to compliance issues following the GDPR’s introduction.

    2. Becoming Accountable

    Make an inventory of all personal data you hold and examine it under the following headings:

    • Why are you holding it?
    • How did you obtain it?
    • Why was it originally gathered?
    • How long will you retain it?
    • How secure is it, both in terms of encryption and accessibility?
    • Do you ever share it with third parties and on what basis might you do so?

    This is the first step towards compliance with the GDPR’s accountability principle, which requires organisations to demonstrate (and, in most cases, document) the ways in which they comply with data protection principles when transacting business. The inventory will also enable organisations to amend incorrect data or track third-party disclosures in the future, which is something that they may be required to do.

    3. Communicating with Staff and Service Users

    Review all current data privacy notices alerting individuals to the collection of their data. Identify any gaps that exist between the level of data collection and processing your organisation engages in, and how aware you have made your customers, staff and services users of this fact. If gaps exist, set about redressing them using the criteria laid out in ‘2: Becoming Accountable’ as your guide.

    Before gathering any personal data, current legislation requires that you notify your customers of your identity, your reasons for gathering the data, the use(s) it will be put to, who it will be disclosed to, and if it’s going to be transferred outside the EU.

    Under the GDPR, additional information must be communicated to individuals in advance of processing, such as the legal basis for processing the data, retention periods, the right of complaint where customers are unhappy with your implementation of any of these criteria, whether their data will be subject to automated decision making and their individual rights under the GDPR. The GDPR also requires that the information be provided in concise, easy to understand and clear language.

    4. Personal Privacy Rights

    You should review your procedures to ensure they cover all the rights individuals have, including how you would delete personal data or provide data electronically and in a commonly used format.

    Rights for individuals under the GDPR include:

    • subject access
    • to have inaccuracies corrected
    • to have information erased
    • to object to direct marketing
    • to restrict the processing of their information, including automated decision-making
    • data portability

    On the whole, the rights individuals will enjoy under the GDPR are the same as those under the Acts, but with some significant enhancements. Organisations who already apply these principles will find the transition to the GDPR less difficult.

    Review your current procedures. How would your organisation react if it received a request from a data subject wishing to exercise their rights under the GDPR?

    • How long to locate (and correct or delete) the data from all locations where it is stored?
    • Who will make the decisions about deletion?
    • Can your systems respond to the data portability provision of the GDPR, if applicable where you have to provide the data electronically and in a commonly used format?

    5. How will Access Requests change?

    You should review and update your procedures and plan how you will handle requests within the new timescales. (There should be no undue delay in processing an Access Request and, at the latest, they must be concluded within one month).

    The rules for dealing with subject access requests will change under the GDPR. In most cases, you will not be able to charge for processing an access request, unless you can demonstrate that the cost will be excessive. The timescale for processing an access request will also shorten, dropping significantly from the current 40 day period. Organisations will have some grounds for refusing to grant an access request. Where a request is deemed manifestly unfounded or excessive, it can be refused. However, organisations will need to have clear refusal policies and procedures in place, and demonstrate why the request meets these criteria.

    You will also need to provide some additional information to people making requests, such as your data retention periods and the right to have inaccurate data corrected. If your organisation handles a large number of access requests, the impact of the changes could be considerable. The logistical implications of having to deal with requests in a shorter timeframe and provide additional information will need to be factored into future planning for organisations. It could ultimately save your organisation a great deal of administrative cost if you can develop systems that allow people to access their information easily online.

    6. What we mean when we talk about a ‘Legal Basis’

    You should look at the various types of data processing you carry out, identify your legal basis for carrying it out and document it. This is particularly important where consent is relied upon as the sole legal basis for processing data. Under the GDPR, individuals will have a stronger right to have their data deleted where customer consent is the only justification for processing. You will have to explain your legal basis for processing personal data in your privacy notice and when you answer a subject access request.

    For government departments and agencies, there has been a significant reduction in the number of legal bases they may rely on when processing data. It will no longer be possible to cite legitimate interests. Instead, there will be a general necessity to have specific legislative provisions underpinning one or more of the methods organisations use to process data. All organisations need to carefully consider how much personal data they gather, and why. If any categories can be discontinued, do so. For the data that remains, consider whether it needs to be kept in its raw format, and how quickly you can begin the process of anonymisation and pseudonymisation.

    7. Using customer consent as a grounds to process data

    If you do use customer consent when you record personal data, you should review how you seek, obtain and record that consent, and whether you need to make any changes. Consent must be ‘freely given, specific, informed and unambiguous’. Essentially, your customer cannot be forced into consent, or be unaware that they are consenting to processing of their personal data. They must know exactly what they are consenting to, and there can be no doubt that they are consenting. Obtaining consent requires a positive indication of agreement – it cannot be inferred from silence, pre-ticked boxes or inactivity.

    If consent is the legal basis relied upon to process personal data, you must make sure it will meet the standards required by the GDPR. If it does not, then you should amend your consent mechanisms or find an alternative legal basis. Note that consent has to be verifiable, that individuals must be informed in advance of their right to withdraw consent and that individuals generally have stronger rights where you rely on consent to process their data. The GDPR is clear that controllers must be able to demonstrate that consent was given. You should therefore review the systems you have for recording consent to ensure you have an effective audit trail.

    8. Processing Children’s Data

    If the work of your organisation involves the processing of data from underage subjects, you must ensure that you have adequate systems in place to verify individual ages and gather consent from guardians.

    The GDPR introduces special protections for children’s data, particularly in the context of social media and commercial internet services. The state will define the age up to which an organisation must obtain consent from a guardian before processing a child’s data. It should be noted that consent needs to be verifiable, and therefore communicated to your underage customers in language they can understand.

    9. Data Protection Impact Assessments (DPIA) and Data Protection by design and default

    A DPIA is the process of systematically considering the potential impact that a project or initiative might have on the privacy of individuals. It will allow organisations to identify potential privacy issues before they arise, and come up with a way to mitigate them. A DPIA can involve discussions with relevant parties/stakeholders. Ultimately such an assessment may prove invaluable in determining the viability of future projects and initiatives. The GDPR introduces mandatory DPIAs for those oganisations involved in high-risk processing; for example where a new technology is being deployed, where a profiling operation is likely to significantly affect individuals, or where there is large scale monitoring of a publicly accessible area.

    Where the DPIA indicates that the risks identified in relation to the processing of personal data cannot be fully mitigated, data controllers will be required to consult the DPC before engaging in the process. Organisations should now start to assess whether future projects will require a DPIA and, if the project calls for a DPIA, consider:

    • Who will do it?
    • Who else needs to be involved?
    • Will the process be run centrally or locally?

    It has always been good practice to adopt privacy by design as a default approach; privacy by design and the minimisation of data have always been implicit requirements of the data protection principles. However, the GDPR enshrines both the principle of ‘privacy by design’ and the principle of ‘privacy by default’ in law. This means that service settings must be automatically privacy friendly, and requires that the development of services and products takes account of privacy considerations from the outset.

    10. Reporting data breaches

    You should make sure you have the right procedures in place to detect, report and investigate a personal data breach.

    Some organisations are already required to notify the DPC when they incur a personal data breach. However, the GDPR will bring in mandatory breach notifications, which will be new to many organisations. All breaches must be reported to the DPC, typically within 72 hours, unless the data was anonymised or encrypted. In practice this will mean that most data breaches must be reported to the DPC. Breaches that are likely to bring harm to an individual – such as identity theft or breach of confidentiality – must also be reported to the individuals concerned. Now is the time to assess the types of data you hold and document which ones which fall within the notification requirement in the event of a breach. Larger organisations will need to develop policies and procedures for managing data breaches, both at central or local level.

    It is worth noting that a failure to report a breach when required to do so could result in a fine, as well as a fine for the breach itself.

    11. Data Protection Officers

    The GDPR will require some organisations to designate a Data Protection Officer (DPO). Organisations requiring DPOs include public authorities, organisations whose activities involve the regular and systematic monitoring of data subjects on a large scale, or organisations who process what is currently known as sensitive personal data on a large scale.

    The important thing is to make sure that someone in your organisation, or an external data protection advisor, takes responsibility for your data protection compliance and has the knowledge, support and authority to do so effectively.

    Therefore you should consider now whether you will be required to designate a DPO and, if so, to assess whether your current approach to data protection compliance will meet the GDPR’s requirements.

    12. Cross-border processing and the one stop shop

    The GDPR includes the one stop shop (OSS) mechanism, which will be in place for data controllers and data processors that are engaged in cross-border processing of personal data.

    The OSS will allow your organisation to deal with a single lead supervisory authority (LSA) for most of your processing activities. Your LSA will be the supervisory authority of the country in which you have your main establishment.
    For the OSS to apply to your organisation, you must be engaged in cross-border processing and be established in the European Union.

    The way you will identify your main establishment depends on whether you are a data controller or a data processor, but in general it will be helpful for you to map out where your organisation makes its decisions about data processing.

    Click here for some useful links and more information

  • 10 technology trends that will shape 2018


    As Greek philosopher Heraclitus said, “the only one constant in life is change”. And this is certainly true for anyone working in areas related to or based upon technology (and few don’t these days). The pace of technological innovation is such that even the most fantastic of imagined futures seem like they could easily become reality.

    As existing technologies reach maturity, unforeseen developments arrive ever more quickly, and innovations make the leap from consumer applications to business (and vice versa) it’s imperative that we constantly seek to find those that have the potential to add value to our own business and those of our customers. As we look ahead to 2018, I’ve been working with my colleagues to identify some trends that we think will have an impact on our business and industry.
    Author Johan Paulsson is CTO of Axis Communications.


    1. A move towards the edge: Two trends of recent years that have become familiar – cloud computing and the Internet of Things – have delivered undeniable benefits to businesses and consumers alike. But they also come with implications: namely the huge increase in the amount of data being transferred from connected devices to the data center for processing and storage, and the associated bandwidth needed. Edge computing alleviates this issue by performing data processing at the ‘edge’ of the network, near the source of the data. Doing so significantly reduces the bandwidth needed between sensors and devices and the data center. A further drive towards edge computing relates to potential concerns around data integrity and privacy: anonymizing and creating encrypted data within the device at the edge before it is transferred to the data center will be a likely response to these concerns.

      As network cameras, audio and other sensors – the devices on the edge of the network –become ever more sophisticated and of higher quality, the need to balance both cloud computing and edge computing domains will be imperative to deliver refined, reliable and usable data (and for a an understanding of the differences, see here).

    2. 10-technology-trends--2

    3. Cloud-to-cloud: Despite the move towards edge computing, as outlined above, cloud computing will still play a significant role in IT infrastructures. But while cloud computing can give the impression of a single entity, there are, of course, multiple ‘clouds’ being used around the globe. As an increasing number of companies offer cloud-based services, the cloud eco system is increasingly becoming the preferred point of integration, rather than the traditional on-premise systems.

      One benefit of integration between clouds is a significant potential reduction of in-house IT services required. Further, however, advanced composite services from multiple providers can be created and deployed through rich service APIs, including data analytics, content management, and storage, reducing time-to-market and rapidly increasing scale. Any organization delivering cloud-based services should be investigating the opportunity for integration with related services to add value to customers and partners.

    4. 10-technology-trends--3

    5. Deep and machine learning: We have now reached a stage whereby the full benefits of deep learning architectures and machine learning can start to be realized: we have huge sets of data to analyze, the processing power available to do so within reasonable timeframes, sophisticated algorithms, and a weight of use cases to learn from. When some of the most impressive demonstrations of the application of deep learning have been related to image interpretation, speech recognition, and decision support, the potential for analytics in the safety and security sector are obvious.

      At a relatively basic level, deep learning applications will improve video motion detection, facial recognition (and area where Axis partner Herta is doing some leading work), individual tracking and suppression of false alarms. It will aid system design, configuration, optimization and device management. Beyond this, as applications develop, there is significant opportunity for predictive analytics leading to incident prevention: from terrorist incidents to slip and fall accidents; from traffic issues to shoplifting; and even the tragedy of rail suicides.

      It is still early days, however. Development is currently fast and unpredictable, and the demands on processing power are massive, but the potential for deep learning, which may ultimately lead to autonomous systems, is huge.

    6. 10-technology-trends--4

    7. Personalization vs. privacy: One of the potential applications for deep learning could be in the delivery of highly personalized services. Imagine a retail environment where a customer’s face is recognized upon entering a store, and then offers are pushed to their mobile device based on previous purchases, preferences, or even their recent browsing history. But then, just because something can be done doesn’t necessarily mean that it should be, and this example immediately highlights increasing concerns around privacy, and how personal data is being used by businesses and other organisations.

      Legislation is being created to address these concerns. In the European Union, the forthcoming General Data Protection Regulation (GDPR) – the deadline for compliance with which is May 2018 – will unify the protection of data for individuals within the EU, wherever that data is held or used.

      But whether motivated by legislation or simply wanting to do the right thing by customers and citizens, balancing increased personalization with the protection of an individual’s data and privacy will be a tightrope all organizations will walk this coming year.

    8. 10-technology-trends-5

    9. Cybersecurity: Once again, as it did last year, cybersecurity must appear on the list of trends for the next 12 months and beyond. The constant enhancement of cybersecurity will be a never-ending task, because well-resourced cybercriminals will never stop looking to exploit vulnerabilities in any new technology. And as the number of connected devices grows exponentially, so too do the potential flaws that, if left unaddressed, could provide the opportunity for networks to be breached, ransomware to be planted or, more simply, costly downtime to occur. 2018 will no doubt see more attacks and vulnerabilities exposed. The answer is proactivity and a systematic process for ensuring that patches are implemented as soon as they are available (Axis Hardening Guide is a useful resource).
    10. 10-technology-trends-6

    11. Platforms to realize the full benefits of IoT: Speaking of the IoT (and I’ve looked at its implications for security previously) it has reached a point where to scale, collect and analyse data, and manage the network of connected devices effectively, it is crucial to use a scalable architecture. Such a so-called IoT platform allows equipment from different node vendors to coexist and easily exchange information to form smart systems using existing network infrastructure. There are numerous companies, both well-established providers of technology and new market entrants, enabling platforms to support IoT devices, and the next year will see further maturation. However, what will also be important for the future will be new international or de facto standards to enable interoperability between the different IoT platforms, and which will support true vendor-agnostic systems.
    12. 10-technology-trends-7

    13. The blockchain: more than Bitcoin: For many, blockchain and Bitcoin have become synonymous. In reality, they are quite separate and while Bitcoin uses blockchain as its foundation, the potential for blockchain to verify almost anything that has a value is almost limitless. As an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way, the coming year will start to see blockchain being tested in multiple applications across numerous sectors.

      In our industry, given that blockchain enables the authentication of any content, blockchain could be used to verify video content from multiple sources – such as public mobile phones and law enforcement body-worn cameras – for use within forensic investigations. Beyond video data, blockchain could also be used to verify the authenticity of devices connected to the camera network.

    14. 10-technology-trends-8

    15. Breaking down smart city silos: The concept of a smart city (and safe cities as a result) isn’t a new one. For several years, the increasing number of sensors of different types being placed throughout urban environments are helping to solve specific use cases, from law enforcement to monitoring air quality. As the world’s population is increasingly housed in cities – 25% more people will live in a city in 2050 than do today – the use of sensors to help create more liveable, sustainable and safe environments will only increase.

      However, a true smart city is a vision for urban development that integrates information, data, communications and Internet of Things (IoT) technology in a secure fashion to manage a city’s assets. These assets include government departments’ information systems, schools, libraries, transportation systems, hospitals, power plants, water supply networks, waste management, law enforcement and emergency services, and other community services.

      Traditionally, most of these individual services have operated in silos. And this is holding back the realization of the vision for smart cities. A city can only truly be ‘smart’ when all of its data is open and usable across every service. Dealing with urban challenges such as safety and security for citizens, traffic congestion, aging infrastructure, and responses to events such as natural disasters and terrorist attacks, requires coordinated analysis of available data in order to deliver an appropriate and effective response.

    16. 10-technology-trends-9

    17. Non-visual sensors bring new dimensions: Until recently, the primary – if not only – data available to surveillance operators was video which obviously only delivers a two-dimensional perspective. With the use of new, non-visual sensors, this view will become multi-dimensional, providing a richness of data that will enable for more rapid and accurate assessment of situations and, therefore, faster escalation, the activation of an appropriate response and the minimization of false alarms.

      Radar technology, for instance, uses electromagnetic waves to detect movement. Radar is not sensitive to the things that normally trigger false alarms – like moving shadows or light beams, small animals, raindrops or insects, wind, and bad weather – and it can provide detail about any object’s exact position and direction of travel. And while thermal imaging is a non-visual technology already relatively well-established, advances in the accuracy of sound detection, whether a window smashing, or raised, aggressive voices – mean that audio will bring another useful input that may be missed in a purely video-based solution.


    • 10. Virtual assistants and augmented reality leap into business: The last year has seen significant consumer adoption of virtual assistants. Amazon Alexa, Google Home, Apple Siri, and Microsoft’s Cortana have all gained momentum as technology to help people manage their daily lives, and forthcoming technologies such as Facebook M will only build on this. It is inevitable that these same technologies will start to find their way into the business environment, as consumers expect the same levels of technological help at work as they now get at home. Particularly for the providers of any sophisticated or complex technology-based products and services, virtual support in specification, installation, configuration, and management will become more than simply expected; it will become an imperative.

      Similarly, augmented reality (AR) is a technology that has largely existed in specific niches to date, such as the military and aviation, but again shows enormous potential in the business arena, particularly now it is available as a technology in mobile devices and in an increasing number of wearables.

      One of the obvious opportunities for AR in the business arena is in the installation and maintenance of technological solutions, where visual instructions can be overlaid on the real-world view of technicians to aid them in the work. In specific relation to our own business, with the growing use of non-visual sensors and analytics to add accuracy and further perspectives to visual information, consumers of video surveillance will be using AR to bring these sources of data together in a single view, enabling a more rapid and appropriate response.

    Author Johan Paulsson is CTO of Axis Communications.

  • HP-Laser Jet Printers



    HP LaserJet Pro M130nw
    Black & White Wireless Multifunction Printer

    Keep things simple with HP’s smallest LaserJet MFP – powered by JetIntelligence Toner cartridges. Print professional documents from a range of mobile devices, plus scan, copy, and help save energy with a wireless MFP designed for efficiency.

    • Mono Printer - Perfect for 1 to 5 users
    • Print, copy, scan
    • A4; A5; A6; B5 (JIS)
    • Hi-Speed USB 2.0 port (device); Built-in Fast Ethernet 10/100Base-TX network port; Wireless
    • Up to 10,000 pages


    HP LaserJet Pro MFP M181fw
    Color, Wireless Multifunction printer with Fax

    Get vibrant colour, wireless versatility, easy mobile printing, and fast print speeds to drive efficiency – for a great value.

    • Colour Printer - Perfect for 1 to 5 users
    • Print, Copy, Scan, Fax
    • Paper Size - A4
    • Connectivity - dual band Wi-Fi®, AirPrint, Network, USB
    • 35-sheet Automatic Document Feeder
    • Easy to use control panel

  • Toshiba Laptops




    • Windows 10 Pro 64-bit
    • 7th generation Intel® Core™ i5-7200U processor
    • 39.6cm (15.6”) , Toshiba HD non-reflective High Brightness display with LED backlighting and 16 : 9 aspect ratio
    • Solid State Drive 128 GB
    • Graphite Black
    • 4,096 MB, DDR4 RAM (2133MHz)
    • Intel® HD Graphics 620
    • maximum life : up to 9h15min (MobileMark™ 2014 running Windows 10) MobileMark is a trademark of Business Applications Performance Corporation.
    • weight : starting at 2 kg
    • W x L x H : 379 x 258 x 23.95 mm



    • Windows 10 Pro 64-bit
    • 6th Generation Intel® Core™ i3-6006U Processor
    • 39.6cm (15.6”) , Toshiba HD non-reflective High Brightness display with LED backlighting and 16 : 9 aspect ratio
    • Hard disk 500 GB
    • Graphite Black
    • 4,096 (1x) MB, DDR3L RAM (1,600 MHz)
    • Intel® HD Graphics 520
    • maximum life : up to 8h00min (Mobile Mark™ 2014)
    • weight : starting at 2.1 kg
    • W x D x H : 379 x 258 x 23.95 mm

    Call Us: 01 4545 465

  • Jabra Headset - Evolve 80

    Professional headset with active noise cancelation. Stay focused even in very noisy environments. Control your calls through a dedicated control unit. Professional headset with active noise cancelation. Stay focused even in very noisy environments. Control your calls through a dedicated control unit.

    The best headset for concentration in the open office

    • More concentration, greater productivity
    • Stay in the zone and avoid interruptions
    • Find inspiration in sound
    • Made for Voice and Music
      • World-class speakers are built for both voice and music. Switch easily between conversations and listening to your favorite tracks.
    • Active noise cancellation
      • Eliminate unwanted low-frequency background noise at the touch of a button. This lets you stay focused even in noisy office environments.
    • Passive Noise Cancellation
      • Simply wear the headset to eliminate high-frequency noise, such as human voices - all thanks to the specially designed ear cushions. We call this “passive noise cancellation.”
    • Easy call management
      • In-line call controller gives you easy access with large buttons and LED indicators. Pick up or end calls, control volume, or simply mute the line.
    • Busy light
      • The special “busy light” turns red to let people know when you’re on the phone. You can also turn it on manually when you don’t want to be disturbed.
    • Discreet Boom Arm
      • When you’re not on a call, you can tuck the boom arm away into the headband to keep it out of the way.
    • Works with All Mobile Devices
      • The 3.5mm jack lets you connect to a PC, smartphone, tablet, or any other personal device.
    • Listen-in
      • Listen-in function lets you hear your surroundings without taking your headset off. Simply press a button when you need to “listen in.”

    Call Us:01 4545 465

  • Lenovo ThinkPad T470s


    Business-Ready. And Then Some.

    Light and thin, the ThinkPad T470s is designed to boost productivity, wherever your business takes you. Powered by a high-performance processor and operating system, this rugged laptop boasts an

    • All-day battery life.
    • Plenty of storage.
    • Oodles of RAM.
    • 14" FHD display.
    • Stereo speakers.
    • Hi-res webcam.

    All of this, plus the legendary ThinkPad reliability and support.

    Performance You Can Count On

    With the responsiveness and efficiency of 7th generation Intel® Core™ processors, the Lenovo ThinkPad T470s lets you switch effortlessly between your favorite apps—increasing your productivity, creativity, or entertainment levels along the way.

    Super Fast SSD Storage

    Unlike a regular mechanical hard drive, a Solid-State Drive (SSD) has no moving parts and performs faster—including booting up (nearly 3X quicker), opening files (as much as 30% faster), and transferring files (around 200 MB/s, compared to 50-120 MB/s). As well as being quieter, it’s also more reliable, more rugged, and more secure.

    Tested for Battle, Built for Success

    Every ThinkPad laptop undergoes 12 stringent military tests and over 200 quality checks. So, you can rest easy knowing that your T470s is more than capable of surviving the bumps and bruises of everyday life.

    User-Friendly, Business-Friendly

    Easy to set up and roll out, the T470s is also quick to service, upgrade, and secure. From an everyday user to an IT technician, this business laptop is designed to make life (and work) easier for everyone.

    Less is the New More

    The T470s is available with Microsoft Windows 10 Pro Signature Edition. Now, you can say goodbye to unwanted trial ware, apps, or distractions. And hello to a faster laptop, from startup to shut down and everything in-between.

    Forgot Your Password? Just Smile

    With Windows Hello’s advanced facial recognition and fingerprint technology, there’s no need to worry about remembering your password. Simply smile at the infrared camera or touch the fingerprint reader to log in, quickly and securely.

    Get Closer to the Action

    By configuring your T470s with an optional touchscreen, you can interact more with your work—and have more fun during your downtime.

    Make Light Work of Long Days

    With its two batteries and Power Bridge technology, the T470s gives you greater flexibility and up to 10.5 hours of power on a single charge. That's more than enough juice to help you burn the midnight oil or binge watch your favorite shows.

    For On-the-Go Productivity and Entertainment

    Weighing around 1.3 kg and under 19 mm thin, the T470s gives you portability, without sacrificing performance. Its 14" FHD display delivers sharp, vibrant visualsperfect for working on the go or kicking back to enjoy a movie.

    Stay Connected, Even When You’re Not

    With super-fast LTE-A (4G) connectivity, the T470s gives you prompt access to all your cloud data and apps—even if you are out of WiFi range.

    Look Sharp, Sound Sharper

    The T470s has an HD web camera and dual array microphones (with background noise reduction) as standard—ideal for whether you're on a call in a busy open plan office or a bustling coffee shop.

    Clearer Desk, Clearer Thinking

    Ultra-fast and very secure, the ThinkPad WiGig Dock (optional) can connect effortlessly, wirelessly, and instantly to your T470s and all its peripherals, such as a monitor or backup storage device. Simply place your laptop within six feet of the dock and it will do the rest. As well as reducing desktop clutter, this easy-to-use dock can even power all your other devices.

    Rest Easy Wherever Life Takes You

    The T470s comes with a worldwide warranty as standard, enabling you to seek expert assistance and help in 160 countries across the globe.

    Enhanced, Smoother Interaction

    By constantly listening to our customers, we have been able to refine the T470’s TrackPad and TrackPoint. With an improved design that lessens jumps or gaps when scrolling, these pointing devices offer a smoother, cleaner, and more accurate experience. Together with the award-winning ergonomic ThinkPad keyboard, the T470s will soon help you make light work of hard work.

    Prepare to Be Thunderstruck

    The T470s includes Intel® Thunderbolt™ 3—the technology that brings lightning-fast Thunderbolt to USB-C at speeds up to 40 Gbps. Connect a cable from your USB-C port to a Thunderbolt 3-enabled device, and get four times the data and twice the video bandwidth of any other port type, while also supplying power. So you get Thunderbolt, USB-C, and DisplayPort. Plus, you can even output to two 4K displays with the Thunderbolt Dock.

  • Iiyama Display Monitors


    Iiyama ProLite

    Stylish 40” screen with 4K resolution and USB hub

    • The ProLite X4071UHSU-B1 is an impressive 4K (3840 x 2160) monitor, offering a gigantic viewable area with 4 times more information and work space than a Full HD screen.
    • Due to the high DPI (dots per inch) the monitor displays an incredibly sharp and crisp image.
    • The VA panel technology offers exceptional colour performance, high contrast (5000:1) and wide viewing angles.
    • PIP and PBP features allow users to easily create their own work space by displaying and manipulating multiple applications.
    • USB 3.0 HUB, integrated speakers, headphone socket and hook, ensure compatibility across various devices and media platforms for a real multimedia experience.
    • The ProLite X4071UHSU-B1 suits a massive range of applications including desktop publishing, CAD/CAM drawing, gaming, photographic and web design.


    Iiyama G-MASTER
    GB2888UHSU-B1 Gold Phoenix

    28” G-MASTER 4K monitor supporting FreeSync™ technology

    • The 28" G-MASTER GB2888UHSU known as Gold Phoenix, features 4K (3840 x 2160) resolution, offering a gigantic viewable area with 4 times more information and workspace than a Full HD screen.
    • Due to the high DPI (dots per inch) the monitor displays an incredibly sharp and crisp image.
    • Featuring 1ms response time and FreeSync™ technology, it ends choppy gameplay ensuring fluid and accurate transition between images.
    • With the Black Tuner functionality the brightness and the dark shades can be adjusted, giving greater viewing performance in shadowed areas.
    • USB 3.0 HUB, integrated speakers and a headphone socket ensure compatibility with any Desktop PC or Notebook.
    • The GB2888UHSU is perfect for gamers and demanding users who settle only for the best specifications.

    Call Us: 01 4545 465

  • Intel Core X Series CPU


    The Intel® Core™ i9 Extreme Edition Processor

    The dawn of a new breed of extreme desktop processors is here, elevating everything you do to new heights. Powered by a massive 18 cores and 36 threads, this processor enables extreme single-threaded performance with the updated Intel® Turbo Boost Max Technology 3.0. This technology now identifies the two best performing cores to provide increased single and dual-core performance. The new Extreme Edition boasts 44 PCIe lanes and support for multiple discrete graphics cards, Thunderbolt™ technology, and high-speed storage like Intel® Optane™ technology. And of course, it is fully unlocked for extreme performance.

    The ultimate platform with unprecedented scalability. The ultimate platform with unprecedented scalability.

    Intel® Core™ X-Series Processor Family

    Something for every enthusiast! The new Intel® Core™ X-series processor family is designed to scale to your performance needs by delivering options between 4 to 18 cores for extreme performance, the latest technological advancements, and headroom for the future. This platform comes ready to install Intel® Optane™ memory and Intel® Optane™ SSDs for amazing system responsiveness. Support for immersive 4K visuals, four channel DDR4 2666 memory, Thunderbolt™ 3 delivering a 40Gb/s bi-directional port for almost any peripheral you want to connect and up to 8 SATA ports for a RAID storage array makes this the ultimate desktop platform.

    Game, Stream, Record

    Enter the realm of extreme performance where game play is so life-like it is difficult to tell where reality ends and the game begins. Surrounded by multiple high-res displays and premium audio sound, you are totally immersed in the action of your AAA game title or the latest virtual reality thriller. Play extreme, live extreme, game extreme on a computer with an unlocked Intel® Core™ X-series processor. And because modern gaming extends beyond just gameplay, you want to simultaneously share your gameplay with the community and the world. Record all the action capturing that once in a life-time maneuver that brought you to victory, and convert your game play into a sharable format to immediately post on your social media page. That is extreme mega tasking and the power of the Intel® Core™ X-series processor.


    Unleash Your Ultimate Creative Genius Now with an Intel® Core™ X-Series Processor

    Your creativity is limitless, and once you are in the flow of ideas, you need a system that will keep up. You need the uncompromising performance in a PC powered by the Intel® Core™ X-series processor. The Intel® Core™ X-series processor family with 8, 12 or even 18 cores delivers amazing performance when multiple real-time workloads are stacked. Spend more time creating while your Intel® Core™ X-series processor powered system simultaneously handles uploading massive 4K files, rendering effects and other compute intensive workloads in the background. And with the updated Intel® Turbo Boost Max Technology 3.0, you have the control to give priority to the apps that need the power of the two best performing cores. Quad channel memory also delivers improved responsiveness and decreases start up time when you are working with large files and content creation applications. With an Intel® Core™ X-series processor you can focus on creating with the confidence that your results will be as remarkable as you imagined.

    Quad-Core Newcomers to the Family

    The new family of Intel® Core™ X-series processors introduces two quad core processors for broader expandability of the platform. The Intel® Core™ i5-7640X and Intel® Core™ i7-7740X enable customers to invest in a more powerful enthusiast platform that provides more headroom and scalability up the X-series stack when they are ready. These two processors will start with a slightly higher base frequency and provide all of the ingredients, like higher memory speed and larger socket, for better overclocking performance compared to their mainstream counterparts.

    Intel® X299 Chipset and Intel® Core™ X-Series Processors for the Ultimate Platform

    The Intel® X299 chipset paired with the Intel® Core™ X-series processors provide a world class platform for gaming, content creation, and over-clocking. Whether it is responsiveness, expandability or performance you crave, this platform has you covered. Integrated USB 3.0 makes moving files to your tablet and smartphone blazing fast. The platform also provides RAID support on PCI Express and Serial ATA storage devices, fast data transfers with support for PCIe 3.0 storage devices and finally, Intel® Optane™ memory support. Want to push the envelope with overclocking? The Intel® X299 chipset and Intel® Core™ X-series processor family bring new unlocked base clock capabilities. Unlock your individual cores and memory frequencies to amazing levels while having the flexibility to keep other areas within specification. With support for Intel® Extreme Memory Profile (Intel® XMP), Intel® Extreme Tuning Utility (Intel® XTU), and the Intel® Performance Tuning Protection Package Plan the capabilities of the Intel® X299 chipset and new Intel® Core™ X-series processors are a threat to every overclocking world record.


    Call Us:01 4545 465

Items 1 to 15 of 138 total

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. ...
  7. 10