Search
Call Us: 703-715-4930
Get Informed About IT

Network Alliance Blog

June 3, 2015

By Ted Brown, Vice President of IT Operations.

Here’s the deal. We’re all looking at it the wrong way.

The PC isn’t dead or dying. It simply is.

With the PC’s ubiquity, it’s tough these days to find a home without one and almost impossible to find a business without one. As my colleague said, you can’t match the functionality of a mouse and keyboard. And a Pew Internet and America Life  report indicates that 35% of Americans ages 16 and over own a tablet—a testament to their  practicality and cost-effectiveness.

So, tablets, smartphones, and other post-PC devices a...

June 3, 2015

By Lourdes Ashamalla, VP of Service Assurance

Yes, over the last few years, we’ve seen the demand for personal computers declining, although not nearly at the level that analysts and experts forecast. My Network Alliance colleague Ben Martin bid “Sayonara” to th­­e PC in the previous post in this series. Do I agree?  Sort of.

In certain marketing circles, there’s a saying (I’m paraphrasing): “People don’t buy hammers because they want hammers; people buy hammers because they’re trying to drive a nail.” In the same way you choose a hammer for driving nails, you purchase computing solutions that will ensure your abili...

June 3, 2015

By Ben Martin, VP of Client Support

Forty years in the tech industry is an eternity so, the PC had a pretty good run, didn’t it?

Ok, I hear you: “When push comes to shove, you’ll always want a PC to do your heavy lifting.” That’s fair.

Except…

Most people don’t do heavy lifting on their computers. Email and internet browsing are by far the most popular computer activities, and neither requires state-of-the-art technology.

“But, professionals need a PC as a hub!” Sure, I can see that. “Gamers who want to milk every bit of graphical fidelity must have their 8-core processors and $700 video cards?” You're right, a tablet can’t do that.

But…if you think about it, tha...

June 3, 2015

Since the mid-to-late ‘70s, the personal computer (PC) has been the device for computing needs. Ease of use and strong functionality transformed the PC from a niche, hobbyist product to a global consumer-friendly phenomenon. Following the development of devices like the Commodore 64 and the Apple II, the PC quickly became a staple in businesses and homes. Never before had the power of a computer been offered in such a small form.

While early PCs didn’t offer the sheer power of mainframes, most businesses and consumers realized they didn’t need it. Instead, they simply wanted to play a computer game,...

June 3, 2015

A lot of people are concerned over Google’s decision to discontinue Postini services, and rightly so. For a (very) quick recap for those that don’t know, Postini is an email and Web security service that provides email encryption and spam and malware filtering. Google bought Postini in 2007 and announced in mid-2012 that it would be discontinued by the end of the year, with its users being rolled over into Google Apps. Postini has been largely successful but has apparently outlived its current form’s usefulness to Google.

Things to note:

  • If your organization is switching from Postini, ...
June 3, 2015

“We have to move to a new office.”

How near to the top of the “Things I’d rather not hear” list is that for you?

Already concerned with the typical questions of “Where,” “When,” and “How” of the move, team leaders must also worry whether or not their data (documents, files, emails, contacts, etc.) will find its way to the new location quickly enough to mitigate losses to productivity; it is, of course, impossible for team members to work without their resources. Moving equipment requires an IT professional (who can cost over $100 an hour to provide service), which many small to medium-sized organizations don’t have, and, even, if you do, any time you move equipment, it is in jeopardy of being lost,...

June 3, 2015

By Lourdes Ashamalla, Vice President of Service Assurance

I’ll be honest. When Microsoft first announced the launch of its newest operating system, Windows 8, I was skeptical. I mean, I have LOVED Windows 7 since I first had a chance to play around with it.

On the surface,  Windows 7 perfected an operating system that had been relatively unchanged in almost 15 years. So, I thought, why mess with success? Would I lose any functionality?  Would I have to relearn everything?

Rumors of Windows 8’s functionality and features only became more extreme as the launch date approached....

June 3, 2015

“Cloud” has become a buzzword that can mean different things to different people. In this video we’ve boiled down the concept of cloud computing to a straightforward explanation that takes away the mystery.
 
The cloud is like having a virtual PC to store all your important assets.  Where are they? In a secure data center – or distributed across multiple data centers. You can access them from any device that connects to the Internet and never worry about losing them.  The cloud takes the burden of managing IT infrastructure off you, so you can focus on your business.
 
Watch the video and learn how the cloud works.
 

...

June 3, 2015

If you’ve been following our security series, hopefully, you’ve taken steps to incorporate your team into your security policies and set up protections against malware such as firewalls and virus-protection. Maybe you’ve even hired a white-hat hacker to see how strong your security really is.

Even after taking these steps, you’ll still need to constantly improve your security approach. Remem...

June 3, 2015

Ever gotten an email from a long-lost friend with a message telling you, “Hey, you’ve got to see this!” and a link or an attachment to download? It’s great to hear from the friend, right? Well, maybe not. This could actually be an attempt by a hacker to trick you into loading malware, malicious software designed to access your computer, disrupt operation or steal information.

Clicking on the link or opening the attachment could let in a virus, malware that is self-replicating. It copies itself to any files it can and attempts to jump hosts, moving from computer to computer. If it’s a “worm,” you don’t even need to take action fo...

 

 OUR PARTNERS

 3CX Partner      Cisco Partner

 OUR AWARDS

       

 OUR CERTIFICATIONS

   

 

Drupal 7 Appliance - Powered by TurnKey Linux