The COVID-19 pandemic has placed an overwhelming burden on CDO Technology, and it is with deep sadness that we have decided to close our operation. We would like to thank our customers for allowing us to be part of your lives during our 22 years of operation in Greenville. We wish you all health, success, and prosperity.

We would like to refer our business customers to Greenville IT Services for their Business IT Services including: Onsite Service, Remote IT Service, Networking, Backup Services, Structured Cabling, Surveillance Camera Systems, and Managed IT Services.

Check out Greenville IT Services at:

GreenvilleITS.com

20 Years! Happy Birthday CDO Technology!

20 Years! Happy Birthday CDO Technology!

Happy Birthday CDO Technology – 20 Years in Business!

CDO Technology has been a custom-builder of business and consumer computers, a parts retailer, and a service center in Greenville, SC since 1998. From a humble beginning, CDO now keeps well over 20,000 parts in stock, has some of the very best technical staff in this region and custom-builds both entry level and professional grade servers, professional workstations and gaming desktops for our customers. Our tech repair shop does data recovery and transfers, complete laptop repairs including internal component replacement, mobile device repair, repairs state-of-the-art computers as well as repairs legacy systems, and builds, installs, and maintains business servers and networks. CDO Technology takes the mystery and frustration out of technology by providing solutions to each customer’s specific technology problems. We micro-manufacture computers similar to the way the micro-brewers brew their beer. We use high quality components and blend that with experience and expertise to provide the highest quality customized servers, professional workstations, and computers that run better longer. We also provide a FREE consultation for our business customers on how to make their specific computer systems and technology work better and easier for them.

Most computer manufacturers don’t design and build their computers for the long haul. CDO Technology does! We design our servers, professional workstations, and business systems for each business customer’s specific needs, professionally choose the parts, hand-build them, and provide lifetime service on every system. Our professional workstations are used by engineers, architects, graphic designers, day-traders, web designers, manufacturing product designers, animators, and many more professionals.

Our computers are NOT throw-away or disposal products. Since we design and build our computers for sustainability, they perform at high levels with maximum uptime for many productive years. We also extend the productive life of our computers through proactive maintenance and upgrades with our Lifetime Service Warranty. Sustainability doesn’t just mean long lasting. In our case, it means that they cost less over their productive life than other manufacturer’s computers. The original cost of the computer, the cost of maintenance and computer downtime, the cost of poor performance, and finally the cost of replacement when it prematurely fails all make up the lifecycle cost of a computer system. We complete each computer’s lifecycle by providing a 100% take back or recycling policy for all the computers we sell. We believe our servers, professional workstations, and business systems offer one heck of a value when considering their competitive pricing, long life, and dependable and outstanding performance.

We have a great website, www.CDOTechnology.com where we offer servers, professional workstations, and business systems as well as consumer and game enthusiast computers. They both will provide you with an easy, informative, and pleasurable online shopping experience. While you are there, checkout our online System Configurator where you can choose, customize, and buy your server, professional workstation, gaming desktop or computer to meet your specific needs and budget. For those who want to work with a real person, you can always call, email or come into our storefront for the advice and service from one of our sales experts.

CDO Technology believes that by giving support and advice, selling quality products at a great price, providing fantastic service, and “doing the right thing every time” will keep our customers coming back year after year. And it works! It’s the same reason our sales people will sometimes tell you NOT to buy something from us if they don’t think it’s what you need, and are happy to tell you where to make the purchase if we don’t have what you’re looking for. As of 2018, after 20 years, we’re still growing and grateful to have the opportunity to help those in our community while doing something we love to do.

 

Benefits of Purchasing Non-Proprietary Workstations

Benefits of Purchasing Non-Proprietary Workstations

Before delving into the benefits to be gained from purchasing non-proprietary workstations for your company, an explanation of what is meant by proprietary is necessary. Many people don’t realize the difference prior to choosing new workstations but it’s a very important consideration.

A proprietary workstation is built from components that are exclusive to a single vendor or entity. In order to make any changes, repairs or upgrades, a company will need to deal with that entity for any replacement or upgraded parts. A good example of this concept can be found in Adobe software. You must use Adobe Reader to be able to work with Adobe Acrobat PDF documents. While this situation isn’t encountered as often with hardware, it does happen.

A workstation built from open standard products, on the other hand, do not require a company to deal with a specific vendor or limit the technology available. Generally speaking, open standard (non-proprietary) hardware is easy to find, through a wide variety of stores or vendors.

There are a couple of important benefits to purchasing non-proprietary workstations that companies should keep in mind:

  • Non-proprietary workstations are easier and often less expensive to repair or upgrade with new technologies.
    When a company needs to repair a workstation or upgrade it, there are definite drawbacks when dealing with proprietary hardware. Only that specific vendor will have the parts needed to fix or upgrade the computers. This often means delays, as a company must work on the vendor’s timetable without regard to their own needs. It also means that a company cannot shop around for best price or any other considerations.The expense of repairing or upgrading a proprietary workstation isn’t limited to just the cost of the special parts, either. Any time that a workstation is down, it will cost a company money because the employee is unable to do their work properly. Since workstations are rather finely tuned to specific jobs, employees often can not work on a different machine.
  • Non-proprietary workstations are much lighter on the environment.
    For many companies today, greener is the goal. They want to be socially responsible citizens and make less of an imprint on the environment. Even when the company itself isn’t concerned, their customers can be quite vocal for this cause.
    Non-proprietary hardware and systems result in less waste overall. With a proprietary system, when one part is replaced, other parts often have to be replaced as well. These other parts may work just fine but with technology moving so quickly today, when one is replaced, it tends to be better than the old and have more features.This often makes the new part incompatible with older parts and peripherals, necessitating that they also be replaced. Not only does this send more physical goods to landfills, it also costs the companies a lot more money.

For these two reasons alone, non-proprietary workstations make a lot of sense. Unless a company absolutely must use a specific vendor for a specific piece of technology, they will benefit far more from using non-proprietary workstations. Companies save time, money and the environment, not to mention it’s just plain easier.

How to Choose Parts for a Professional Workstation

How to Choose Parts for a Professional Workstation

Creating the perfect Performance Workstation that will do what you need it to do can be very difficult. To do this, you have to understand how the different hardware parts affect workstation performance for your specific work tasks. The key hardware choices you have to make are the CPU, graphics processing unit (GPU), RAM, and hard drive.

PROCESSOR
The processor choice is simply a decision between CPU frequency (speed) and number of cores. Typical performance workstations range from four to 36 CPU cores and up to 72 CPU threads. Generally, there are twice as many threads as cores and threads are ordered sequences of instructions that specify what the CPU should do. Speed is measured in GHz and typically fewer core count processors run at a faster frequency while higher core processors typically run at lower frequencies.

The creating and manipulating 3D object portion of applications like SolidWorks, 3ds Max, and Maya need higher frequency CPUs more than increased core count, whereas rendering and simulation applications want more cores for peak performance. Safely over clocked Intel processors can provide up to 25% more performance for modeling and design applications than the standard processors. Intel Xeon processor(s) have up to 36 cores and 72 threads and these processors are fantastic for rendering and simulations.

GPU
The GPU is responsible for creating the image you see on your LCD. The GPUs are responsible for setting up polygons and applying lighting, texture and color to a 3D image. Nvidia and AMD produce the professional grade graphics cards for these applications. They are designed to run 24/7 at peak workload without failure through their strict quality control and use of better manufacturing parts. They also have tested and certified intermediary software (drivers) that tell the graphics card to how to run flawlessly with the operating system and the application software that professionals use for the work.

Design & Modeling
The interactive portions of applications like SolidWorks, Revit, Maya, and 3ds Max don’t gain advantage from multiple GPUs and run fine with basic to mid-range NVIDIA Quadro or AMD FirePro graphics cards. The GPU holds frame rates up for smooth panning, zooming and rotating when creating and working 3D objects.

Simulation & Rendering
GPU rendering engines like V-Ray RT, Octane, and Iray and simulation applications like CATIA and ANSYS can use the GPU to work in the background rendering and simulating – working exponentially faster than the CPU in these applications. Buying higher-end GPUs and in many cases running multiple GPUs will increase performance and be well worth the money.

Large & High Resolution Display Screens
High resolution displays require high GPU memory that is only available on top end cards. Especially when running many monitor resolutions and 4K displays, multi-graphics cards are a good idea. Adding a second graphics card doesn’t double performance; typically you will see a 25-50% increase.

RAM
It is much better to have more memory than not enough but it is hard to tell how much is enough. More RAM allows you to multitask without getting bogged down. It is recommend to have at least 16GB of RAM to start with and much more for such jobs as: simulating large data sets, textures in 3D graphics, complex video editing, large scenes with lots of polygons, and complex part product design. A rule of thumb is having a 25% buffer of RAM usage while doing very intensive jobs.

HARD DRIVES
Properly configuring the OS and data drives in each workstation and then using SSDs to increase data reading times and decrease seek times is very important. Sustained read time can be more than four to five times higher on an SSD. Seek times are also much faster; consequently the faster SSDs are rated nanoseconds instead of milliseconds like SATA drives. This increased speed can have noticeable impact on your daily project completion times. A 250GB SSD is recommended for the operating system and program installation and a SATA drive for storing data and work.

Well Spec’d-out PC is a Must for VR Gaming in 2016

Well Spec’d-out PC is a Must for VR Gaming in 2016

For gamers and tech-addicts, 2016 is shaping up to be a storm of incredible leaps forward in virtual reality technology. Although many consoles are taunting potential virtual reality players with cheap models, those who want the full experience know that a spec’d-out PC is a must for the full experience.

Building a VR-ready PC for the Oculus Rift might seem intimidating and expensive at first, but with our guide, you can get in on the fun with any budget:

Important Components:

GPU: Your graphics-processing unit will make or break your VR experience. To sustain the 90FPS world of VR gaming, you need a GPU that won’t slow down at crucial times. Rift developers recommend running either the NVIDIA GTX 970 or AMD R9 390 when using the Oculus Rift.

RAM: Normally, you want a minimum of 8GB onboard ram for optimal game performance. This spec holds true when building a VR-ready console, but investing in an upgrade to 16GBs of onboard ram will guarantee your machine runs smoothly.

CPU: The slowest processor that can get the job done is the Intel i5-4590, or another power-equivalent CPU. Overall, your build can get away with running on a lower-end CPU, as long as you account for potential bottlenecking. Only consumers looking to build a high-end VR machine will warrant investing in an expensive CPU.

Motherboard: Although the motherboard doesn’t directly affect your VR experience, it provides the backbone for the rest of your hardware. Be sure to check the compatibility of any motherboard you are considering with the additional components of your build. Finding a motherboard that supports USB 3.0 is highly recommended.

PSU: When choosing your power supply unit, it’s best to plan ahead. VR setups run power usage-heavy peripherals, and you want to ensure the high-end graphic cards you upgrade to in the future will run properly. Having a PSU powerful enough to prevent immersion-breaking fan-noise is a must.

Storage: Running either a SSD or HDD will work when building a VR-ready PC. However, an investment in an SSD will speed up game performance, keeping you fully immersed in your VR worlds.

Recommended Specs:

Official Oculus Minimum Specs:

  • CPU: Intel Core i5-6500 equivalent or greater
  • GPU: NVIDIA GTX 970 / AMD 290 equivalent or greater
  • RAM: 8GB+ RAM
  • 2x USB 3.0 ports
  • Windows 7 SP1 or newer
  • Compatible HDMI 1.3 video output

Solid Specs:

  • CPU:Intel Core i5-6500
  • GPU:GeForce GTX 980 or Radeon R9 390X
  • Storage 1:128 GB SSD
  • Storage 2:1TB HDD
  • RAM:8GB DDR4

Mid-Range:

  • CPU:Intel Core i5-6600K
  • GPU:GTX 980 Ti
  • Storage 1:250GB SSD
  • Storage 2:2TB SATA HDD
  • RAM:16GB DDR4

High-End:

  • CPU:Intel Core i7-6700K
  • GPU:GTX 980 Ti (alternative: 2x GTX 980 Ti)
  • Storage 1:512GB Samsung 950 Pro PCIe M.2 SSD
  • Storage 2:4TB HDD
  • RAM:16GB DDR4

 

Ransomware Explored: CryptoLocker/CryptoWall

Ransomware Explored: CryptoLocker/CryptoWall

Perhaps one of the most frustrating malware infections found today is file encryption ransomware. The two notable ones are CryptoLocker and CryptoWall. These are classified as malware; they are not technically viruses. Ransomware often infect a computer by being downloaded in a seemingly harmless file. They then encrypt one’s personal data and demand payment in exchange for a decryption key that is stored on a remote server. There is deadline by which payment must be received before the key is deleted; after which, access to the encrypted data is impossible.

Initially it is important to have a basic understanding how one is infected and how ransomware works. Both CryptoLocker and CryptoWall need to be downloaded, and are most commonly received as email attachments; although, they can also be downloaded from websites. These websites are often advertising or media sharing sites. To be infected the file need only be downloaded; it does not need to be opened. The infected files in email attachments often appear as zipped files, but these too need only be downloaded. Once downloaded, the malware uses an asymmetrical algorithm design to generate encryption keys. This means there two keys. One is called the public key which is used to encrypt files, and the other is called the private key which is used to decrypt files. The private key is stored on a remote server controlled by the attacker. It is notable that CryptoLocker and CryptoWall do not lock users out of their computers, as is the case with many other kinds of ransomware. They only encrypt data files.

The Crypto ransomwares usually have a list of file types that it searches for to encrypt. These are primarily different formats of image and text files. Depending on the malware sometimes music is encrypted, and a new version of CryptoWall targets game files. Both CryptoLocker and CryptoWall are aggressive and can infect baked up files on external hard drives and network devices when they are connected to the infected computer and turned on. Some ransomware also sends itself to other people via email from the originally infected computer. When access to an encrypted file is attempted by the owner, a message will be given informing the customer that they need to pay a specific amount of money within a certain period of time to get the private key and gives instructions on how to make payment. Typically 72 hours is the period of time given, but in some cases it will give the owner a few weeks and the cost will rise every week. Both CryptoLocker and CryptoWall usually display a countdown timer with the message. The amount of money asked for is usually around $300 to $500. In certain cases, people have been charged up to around $1000. Some versions of ransomware, especially in the case of CryptoWall, ask for payment in bitcoin. Bitcoin is an unregulated digital currency that can be mined (process of creating new bitcoins) and can be used in certain transactions and exchanged for other currency. Sometimes payment is required through cash card or prepaid credit card because such cards are untraceable. When the specified period of time passes and if payment has not been made, the private key is deleted from the remote server and the owner can never access their files again.

Although very similar, there are some small differences between CryptoLocker and CryptoWall. It is important to note that CryptoLocker is older than its counterpart and is currently rarer. An international, joint law enforcement operation shut down the majority of servers that were being utilized to distribute CryptoLocker when they took out the Gameover Zeus botnet. Additionally, CryptoLocker has been reverse engineered and many private keys have been recovered giving those infected some hope. There are also still several copycat versions of CryptoLocker in circulation; although few neither are as sophisticated nor do these have any design improvements over the original malware.

CryptoWall became more prominent after the demise of CryptoLocker. CryptoWall infects computers in much same way as CryptoLocker; although, it utilizes weaknesses in websites and employs exploit kits to infect users. It can also be contracted in downloads and emails. As before mentioned, CryptoWall demands only bitcoin as payment and typically charges a higher base amount than CryptoLocker. CryptoWall usually provides a website through which infected people can pay. This website is designed to make tracing difficult. CryptoWall is not yet as widespread as CryptoLocker. The primary concern with CryptoWall is that there is no way to recover the files it encrypts without paying the criminals behind it. CryptoWall can always be removed, but documents and images will remain encrypted.

There are some simple but important ways to reduce the risk of infection. The first order of business is to maintain a good anti-virus on one’s computer. Additional tools that target malware are also helpful to keep the system clean. Backing up all of one’s user data, especially text and picture files, is essential. External hard drives and similar devices should be turned off or disconnected from the computer when not in use. This is important because, after the computer is infected, ransomware can easily infect any connected data storage device(s). Caution should be used when surfing the internet and when checking email. Any program or file that is downloaded from the internet should come from the original source, and third party download sites should be avoided. If an email is received that is not recognizable, do not download any attachments from it. All these guidelines are helpful for general protection, as well as ransomware.

CryptoWall is definitely more feared because it is the only ransom malware from which your files cannot be saved if you chose not to pay for the private key. However, the majority of other ransomwares can all be removed without data loss. CryptoLocker is much less of a threat since its downfall; although, it can still cause significant harm as can its copy cat counterparts. Caution and regular backup of files are the two most important pillars to avoid the frustration that encryption ransomware presents.