Posts tagged "laptop"

laptop tablet hybrid guide

Buying A Laptop-Tablet 2-in-1 Computer?

November 7th, 2017 Posted by Devices 0 thoughts on “Buying A Laptop-Tablet 2-in-1 Computer?”

Best Tablet/Laptop Hybrid for Small Business?

If you’re “of a certain age,” you might remember the classic candy commercial with a chocolate bar and a jar of peanut butter. The chocolate bar ends up stuck in the peanut butter, and the kids argue over whether the chocolate is in the peanut butter, or whether the peanut butter is on the chocolate… Either way, I think we can agree it’s a delicious combination, right?

Speaking of fantastic combinations… Recent trends in technology are making the tablet-laptop computer hybrid an increasingly common piece of equipment in many small businesses. The hybrid is powerful enough to do office-based work, but lightweight and portable enough to be carried along for conferences, to job sites, and on sales calls. Whether you use it mostly as a tablet or laptop doesn’t really matter. The big deal is that it can serve either function, depending on what you need.

You may be wondering whether your business should incorporate some laptop/tablet hybrids into its tech arsenal. Here are some tips to help you make a decision on what’s the best 2-in-1 laptop might be best for your business.

Flexible and Powerful

These hybrid tablet/laptops truly offer the best of both worlds, with no compromise involved. Find out why they’re the fastest-growing category in laptops and which models are the best fit for your business with our 2-in-1 buyers guide.

Why should I choose a 2-in-1 laptop?

The most obvious benefit of combining a laptop with a tablet is that you don’t need to buy both. Not to mention only having to bring one device to and from the office and freeing up your power sockets.

The hybrid approach has other advantages too, depending on what you need your business laptop to do.

PC performance

If you’ve dreamed of owning a tablet that’s fast enough to handle your workload, 2-in-1 laptops offer the high performance and full operating system of a laptop in slim tablet packaging. There’s nothing a standard laptop can do better than a range-topping 2-in-1.

You’ll also benefit from a true ergonomic keyboard (detachable or reversible) and have a full set of I/O ports to play with.

Tablet convenience

2-in-1 tablets will generally be a little heftier than your iPad, but they’re a lot lighter than standard laptops if you’re commuting.

If portability is a factor, there are some very light options on the market. For example, models with detachable keyboards are a sure way to lighten your load.

With a work tablet, you won’t have to keep switching your brain between touchscreen mode and traditional mode, or wish you could quickly swipe rather than having to reach for the mouse every time. Touchscreens aren’t exclusive to tablets, of course. But if you’ve used a touchscreen laptop before, you’ll know it doesn’t feel quite right. 2-in-1 laptops offer the true tablet experience.

And let’s not forget one of the greatest advantages tablets have over their laptop counterparts: most 2-in-1s have long-lasting batteries.

laptop tablet hybrid guideHow much should I spend?

Cheap 2-in-1 laptops like Chromebooks can be bought for as little as US$300. But like any tech investment, you get what you pay for.

For most business needs, you’ll more likely be looking above US$600 for a good all-rounder, or over US$1000 for premium performance and a 1TB hard drive.

If you’re considering a higher end model, you won’t be paying much more for a 2-in-1 laptop than you would for an equivalent standard laptop.

Need More Advice?

We can help you navigate the options and price points of 2-in-1 laptop/tablet computers. Get in touch and let’s get started! Email sales@thinknettech.com or Contact Us.

How Secure Is Your BYOD Policy?

August 8th, 2017 Posted by Best Practices, byod, Data, Devices, Networks, Newsletters, Phone, Security, Staff 0 thoughts on “How Secure Is Your BYOD Policy?”

It only takes one unsecured device that’s plugged into your network to lead to a network breach. That’s why it’s so important to have a bring your own device (BYOD) policy.

BYOD has its pros and cons, and organizations that already have a policy in place or are contemplating implementing one need to tick some boxes to make sure it runs as smoothly and securely as possible.

 

The Upside

BYOD has obvious advantages for staff who like the convenience and familiarity of working on their own devices. It could also lead to productivity gains, as users have an affinity for their own personal devices and how they use them.

Personal laptops, tablets and smartphones are usually more cutting edge, given that companies often don’t update their desktops for years on end. BYOD also allows staff to carry only one or two devices around with them, rather than different ones for work and personal use.

BYOD policies can save organizations money, as they don’t have to spend as much on their IT hardware while allowing workers increased mobility.

 

The Downside

Having said that, BYOD practices are not free from security concerns. More and more mobile devices provide greater scope for ways to breach a company’s IT infrastructure.

Some employees may not be as stringent as they should be about the information they bring home that could be highly sensitive or confidential. Once they take it out of the office, there’s nothing stopping them from sharing it across devices, networks, emails or even showing it to their family and friends.

Disgruntled employees about to walk out the door pose an even bigger threat. If they are leaving to work for a competitor, BYOD makes it easier for them to take intellectual property with them. Alternatively, if an employee uses a smartphone to access the company network then loses it or it’s stolen, an unauthorized person could retrieve unsecured data on the device. Staff can also sell their devices or give them away and forget to wipe company data beforehand.

 

And the Essentials

A good BYOD policy should contain two critical components: an application or software program for managing the devices connected to your organization’s networks, and a written agreement that clearly states the responsibilities of employers and staff.

For example, IT departments wishing to monitor the use of personal devices must ensure that they only monitor activities that access company information.

Software developers and device manufacturers are constantly releasing security patches and updates for threats such as viruses and malware. BYOD policies should have the necessary processes in place to automatically apply those patches across all the agreed BYOD devices.

Additionally, organizations can simplify the whole process by limiting the number or make of devices allowed in their BYOD programs and the systems they have to support. Supporting a broad range of devices could become an administrative nightmare.

The IT department should also have permission to remotely wipe the device if it’s lost, the employee leaves or if it detects a data breach, virus or any other threat to its infrastructure.

BYOD should satisfy employees and management alike, as long as there’s a clear understanding of everyone’s responsibilities. Before settling on the best BYOD policy for your organization, it’s worth getting input from HR, IT, finance, legal and anyone else who has a stake in the matter.

 

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

CONTACT US

888.98.THINK
970.247.1885
3067 Main Ave. Durango, CO
101 W. Main St. Farmington, NM
7483 E. Visao Dr. Scottsdale, AZ
5700 Washington St. Denver, CO

JOIN OUR TEAM

Join our team of hard-working, fun-loving, technology experts.

View Careers

CONNECT

FacebookTwitterInstagramLinkedIn

© 2018 Think Network Technologies, LLC. All rights reserved.