tech blog header

Free Whitepaper

Follow Us

Your email:

Blog Topics

Cloud Computing, Exchange 2013

Current Articles | RSS Feed RSS Feed

Is the Blackberry Dead?

 
BYOD IT serviceBlackberry has enjoyed a long and dominant role in the mobile world, but its star seems to be fading. Consumers seem to be moving away from Blackberry and towards other mobile devices, such as Android and iOS. Considering that the issue isn’t necessarily with Blackberry but with its maker, RIM (who has recently announced it is changing its name to Blackberry), and its ability to stay afloat in such a fickle and quickly changing marketplace, who would want to purchase BYOD devices or develop apps for a company that may not last?

To counteract this feeling and avoid playing catch-up, RIM decided to innovate by recently launching a new beta platform to help Blackberry regain a hold both in the consumer marketplace, and with the emergence of BYOD, in the workplace too – but is this strategy working? Considering that the official release isn’t until 2013, a general consensus is that both users and developers are tired of waiting for this new platform. The excitement has waned to annoyance. But has it really?

If the user base is dwindling, one can easily assume that the number of developers creating apps, especially in a BYOD enviroment, would also dwindle, after all, who wants to develop apps for a company with a shrinking user base? But here are a few things to consider:  

While some corporate clients are starting to move away from Blackberry towards Android and iOS, many aren’t. Not only is there a strong loyal base, but the cost to change devices would be expensive.





Coming Soon: Internet Protocol Version 6 (IPv6)

 
Internet Protocol version 6 (IPv6)

The internet, as originally conceived and constructed, was built around a protocol known as Internet Protocol version 4 (IPv4).  This system allows the American Registry for Internet Numbers to assign numerical addresses to each computer server providing information to users of the world wide web.  Contrary to common understanding, when users type in an address such as the one for Google, the computer contacts a domain name server to resolve the alphabetic address into a numerical one.  This system has worked fairly well for many years, but is now in danger of running up against a logical limit: the sheer quantity of numbers available.

The Difference Between Cloud and Virtualization

 
Cloud vs Virtualization

With so many technological developments happening at lightning speed nowadays, it's understandable that many people often confuse specific terminology used.  Among the most common terminology confusions is the difference between cloud and virtualization.

IT Solutions: Understanding ‘Software as a Service’ (SaaS)

 
SaaS

A relatively new approach to meeting the computing needs of a small or medium-sized business is the phenomenon known as "Software as a Service", most commonly referred to as SaaS.  In the SaaS approach, businesses connect with the software they need via cloud computing.  This frees them from the necessity to install and maintain their own software.  Instead, those responsibilities are handed over to a managed services provider contracted to keep the software updated and maintained.

IT Support: Using Authentication To Protect Company Resources

 
IT Support

Even people who routinely work with computers may confuse authentication and password protection, but the two actually refer to different security functions.  All that password protection can do is ascertain if a given entity, such as a user trying to log in, has the required code that will enable access.  Authentication, in contrast, is a security measure that attempts to ascertain that information such as a password is originating from a source that can be trusted.  The two techniques used in combination provide better security than just one used in isolation.

Working Effectively With IT Consulting Firms

 
IT Consulting

Many companies that have worked with IT consulting firms report the experience to be a generally positive one from start to finish.  A small number, however, have encountered difficulties in working effectively with third-party providers attempting to assist them to move forward to meet technology needs.  Often, the difference between the two situations arises from the ways in which different businesses examine and select an IT consulting firm in the first place.

A Network Trace With IT Support Spots Poor Workstation Performance

 
Network Trace

When client computers in a networked environment are experiencing performance issues, the root cause of the problem may not reside in the client computer at all.  Instead, overall network performance may be the issue.  This is because computers functioning as part of a domain require access to many different kinds of resources from folders and the documents they contain to applications stored on the main server; they also require access to hardware resources such as printers and network-linked copy machines.

All Posts