Blog

July 20th, 2009

article_netbooks

Market research organization Techaisle recently released a study forecasting that SMBs worldwide will purchase 1.1 million Netbooks in 2009, jumping to 3.5 million units in 2010. Between 22 and 30 percent of SMBs said that they are considering Netbook purchases as they upgrading core desktops and notebooks. Designed primarily for wireless communication and access to the Internet, Netbooks are small portable laptop computers equipped with wireless connectivity, no optical disk drive, a small keyboard, and screens usually no larger than 10 inches. According to the survey, this interest in Netbooks is fueled by the global economic crisis forcing companies to rein in IT spending, as well as by increased interest in easy and low-cost access to mobile computing. The study suggests that while some are considering Netbooks as a possible replacement for desktops and notebooks, it is more likely that they will be used to augment those items. Contact us for ideas on how Netbooks might benefit your own business operations.

Related links:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
July 20th, 2009

arcticle_diskdefragment

When most people want to purchase a new computer or upgrade their current one, they focus on finding a CPU with the quickest speed, the most computing cores, or the most RAM they can afford. However, they may be overlooking the most likely reason for computing slowdowns: fragmentation in the disks.

Disk drives claim the dubious distinction of being the slowest component on today’s computers, and the more fragmented they are, the more they drag down the performance of the entire system. Fragmentation is the scattering or fragmenting of files on a hard drive from continually writing, deleting, and resizing them. The more you use your computer, the more these bits of data get scattered about. As this happens, it takes longer for the computer to retrieve this data as it reads back from the disk. Defragmentation is the process in which a special software utility is run to arrange all of this data into contiguous spaces on the disk.

Today, frequent defragmentation is becoming more and more important as drive capacities become larger and we start to use our disks more heavily. We now regularly store and retrieve various forms of media such as photos, images, music and videos from our computer disks. Thousands of media files dramatically increase disk fragmentation. We also use our systems to run “virtualized” guest operating systems, which also dramatically increases file fragmentation as these operating systems perform simultaneous read/write operations on the disk. Resident antivirus programs will also slow down disk operation if it is made to continuously read fragmented files. In a business maintaining several computers, these operations will significantly shorten the life span of the drives, and will also contribute to work slowdowns and productivity loss.

So before spending money on a new CPU or RAM upgrade, try defragmenting first. Let us help you implement a schedule and procedures to better manage this important process.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
July 14th, 2009

Surprise, surprise! According to Forrester Research, an analyst firm, small businesses buy and use software differently than their larger brethren. More than 2,200 IT executives and technology decision-makers in North America and Europe were polled, and the findings show that:

  • small businesses are more likely to purchase software than build their own
  • they are wary of open source software because of security and support issues
  • interest in SaaS is growing but total cost of ownership is a concern
  • they are more optimistic than big businesses and will allocate a greater portion of their IT spend on software

These conclusions come from the recent Forrester Research report The State Of SMB Software: 2009 and data from Forrester’s Enterprise and SMB Software Survey “Enterprise Versus SMB: Who Influences Your Software Purchasing Decisions?” and “Software Budget Outlook And Preferred Purchasing Channels By Company Size: 2008 To 2009”. You can purchase the research at Forrester’s website or go to bMighty to read a summary. Do you agree with the findings? Let us know – we’re interested in what you think.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
July 14th, 2009

New research from security firm Secunia reveals that the average PC user has over a dozen insecure applications on his or her computer. They found that the typical user installs over 80 applications on his or her desktop, and around 15% are vulnerable to attack due to failure to patch the applications in a timely manner. Vendors normally release updates or patches to fix known vulnerabilities in their applications. This is an acute problem for software which connects to the Internet, especially if it hosts sensitive or private data. Only 2% of users make it a point regularly update their applications. For businesses, the problem could be greater with the need to manage multiple PCs. Protect your network today by letting us implement software patch management tools to manage and automate this process for you.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
June 23rd, 2009

article_pdfPDF stands for Portable Document Format, a file format that originated in print publishing as a tool for proofing print jobs before sending them to the printer. Today, it has become the standard for sharing print-ready documents via the Internet.

The format was developed by Adobe and was originally available only to owners of the company’s Acrobat software. During the mid-90s, Adobe began distributing Acrobat Reader software, a free tool for viewing PDF files – making it a popular choice for authors, publishers, and designers who wanted to get around the formatting limitations of HTML. PDF is now accepted as an open standard, and is widely supported by other software vendors.

Several characteristics of PDF make it a great choice for sharing or publishing documents over the Internet.

  1. Ability to retain formatting. PDF allows the original presentation and formatting of any document to remain exactly as its original author intended it to look, including images, fonts, and layout. This is a distinct advantage over other formats such as Microsoft Office documents or HTML, which can change the document’s appearance according to the software and fonts installed on the computer used to view the document.
  2. Security. With PDF documents, you have full control over users’ ability to open, print, copy,modify, or share documents. You can selectively enable or disable these actions for each document according to your preferences.
  3. Easy to create. Because PDF has become an open standard, many software vendors support the format.You don’t necessarily need Adobe’s Acrobat software to create PDF documents. Many plug-ins for Microsoft Office, print drivers, or online conversion services are available free or for a fee and make it easy and convenient to publish or export to the format.
  4. Compressible. PDF file sizes can be shrunk to suit the needs of target users. PDF documents can be packaged and compressed while retaining the original quality, or can be down-sampled and compressed to dramatically reduce file size, making it quick to download over the web.
  5. Powerful and flexible. You can add interactive elements including form fields, hyperlinks,electronic signatures, and multimedia such as sounds and videos to your PDF documents. Although these features are also available with other formats,they are not as easy to package and share as PDF.

So consider switching to PDF when you want to share or publish documents over the Internet. If you need assistance, let us know – we can help.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
June 22nd, 2009

As if the scare from the Swine Flu virus were not enough, some opportunistic and malicious hackers have started spreading a computer virus with emails of the same name. Otherwise also known as the Navia.a virus, it seems to have surfaced during the height of the Avian Flu scare. However, the computer virus may have started spreading again. Initial reports from Japan say that the country’s National Institute of Infectious Diseases (NIID) posted on its website that a suspicious Japanese-language email message purportedly coming from them has been circulating with an attached file called “information on swine flu”. The email, originating from senders in the “@yahoo.co.jp” domain, seemed to be sent to random Internet users, the institute said. Users, as always, are advised to avoid opening attachments from suspicious-looking emails to prevent infecting their PCs with malware.While we can’t protect you from the real swine flu virus, we can help you protect your PCs from its new malicious online cousin. Contact us today to find out how.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
June 22nd, 2009

Cyber-Ark Software, a security solutions company, recently released a survey showing that as much as 35 percent of people within an organization (that’s one out of three) admit to accessing corporate information without authorization. Furthermore, an alarming 74 percent claim they could circumvent the controls currently in place to prevent that access. The study polled over 400 IT administrators at the Infosecurity Europe 2009 and RSA USA 2009 conferences. While certainly a cause for concern, this is not surprising. Because of their technical knowledge and access to sensitive corporate information, internal IT staff are capable of circumventing internal policies and controls. If this is a cause for concern within your organization, don’t delay in giving us a call. We can help you secure your information and computing assets today.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
June 22nd, 2009

What are the key technology lessons that small and mid-sized businesses can learn from large enterprises?

Be proactive. Be prepared. Take security concerns seriously. Always watch for ways to cut costs.

That just might sum up the advice that enterprise-grade IT shops would give smaller businesses about how to avoid costly IT mistakes.

But what are some specific technology lessons that smaller fry can learn from the big fish? We asked the experts, and here’s a partial list:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
June 22nd, 2009

Rumors abound that we may soon see Microsoft’s Office suite on mobile devices. Some people are speculating that it may even be made available to the (gasp!) Apple iPhone. What is sure is the ubiquitous office productivity suite is making its way online, onto to the Internet cloud, and one day may even be provided free with an advertising supported model.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
June 22nd, 2009

With the continuous proliferation of data and its increasing importance to business, it has become critical to implement measures to safeguard it. One such measure is to make sure you have a data protection, backup, and recovery system in place. The threat of data loss from hardware failure, malware, or disaster is very real. A little proactive effort will go a long way in ensuring the integrity and continuous availability of your critical company data. Talk to your IT consultant to find out more.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share