Technology Articles from MPA Networks

Latest Popular Smartphones Significantly Dip in Drop Test Performance

November 22nd, 2017 by admin

iOS device with cracked and broken screen in the bottom left side

After years of improving smartphone glass durability, a shift design is bringing back the perils of dropping the device only to discover the glass has cracked on impact. The newly released iPhone 8 and iPhone X aren’t doing well in drop tests, with screens...

Read Full Story »

Posted in: Hardware and Software

The System Is Down: How To Stay Online When Your Service Provider Is Offline

September 12th, 2017 by admin

Stylized icons that indicate free WiFi is available

It's easy to take a functional Internet connection for granted until it's no longer working. When that Internet connection inevitably goes down, your business could be left scrambling to figure out how to keep working until service is restored. The best...

Read Full Story »

Posted in: Solutions, Hardware and Software

Adobe Flash: The Rumors of My Death Have Been Greatly Exaggerated...Until 2020

August 29th, 2017 by admin

Finger pressing a pale blue touchscreen of icons against a pixelated background

Adobe Flash, the web content standard the Internet loves to hate, will soon meet its ultimate demise: Adobe will finish phasing out the platform in 2020. Flash, first introduced in the early 2000s, has been on a gradual decline for almost as long as it...

Read Full Story »

Posted in: Hardware and Software

The Internal SMB IT Security Threat: Overconfidence In Cyber Security Preparedness

August 15th, 2017 by admin

Email application displaying '1 New Message' on a smartphone screen

According to a 2017 published study by Advisen and Experian, one of the biggest threats facing small businesses comes from within, such as overconfidence in the organization's ability to protect itself and recover from cyber security attacks. While businesses...

Read Full Story »

Posted in: Cyber and Data Security

79% of Businesses Were Hacked in 2016. Was Yours One of Them?

June 27th, 2017 by admin

Stylized graphic of a computer monitor with a pane of glass shattering in front of the screen

Getting caught off-guard in a cyber security attack is a disaster for any business, large or small—and the frequency of attacks is only getting worse. According to the CyberEdge 2017 Cyberthreat Defense Report, hackers successfully compromised...

Read Full Story »

Posted in: Cyber and Data Security

The Cost of Memory: Trends to Impact Your Upgrade Cycle

June 6th, 2017 by admin

Close up view of a 16Gb G-die DDR3 SDRAM chip K4B1G0846G

Computer memory market trends could play a role in your business’s decision on when to upgrade or replace employee computers. According to PC World, the technology research experts at Gartner predict that prices for both RAM and Solid State Drives (SSDs)...

Read Full Story »

Posted in: Hardware and Software

Android and IOS: Is the Device Just Old, or Is It Obsolete?

May 23rd, 2017 by admin

Relief drawing of a pocket watch with roman numerals I through XII

When trying to determine if a piece of technology is simply old or completely obsolete, keep in mind that there are different criteria for Android and iOS devices than for desktop and laptop computers. An employee stuck using an obsolete device is likely,...

Read Full Story »

Posted in: Hardware and Software

The Dock Returns: Anticipating Trends for Productivity Potential

April 19th, 2017 by admin

Stylized graphic of a desktop monitor, tablet, and smartphone, in black and white

Samsung's March 2017 announcement that its flagship smartphone would support first-party peripheral that makes the device work like a desktop computer could mean big changes for how people look at their productivity devices. While this is not the first...

Read Full Story »

Posted in: Hardware and Software

Mesh Networking for SMB Offices

March 28th, 2017 by admin

Stylized representation of a wireless radio antenna with radio signals emanating from it

If the sounds of disgruntled employees complaining about poor Wi-Fi connectivity are all too familiar in your SMB, it's time to consider switching to a mesh network. Unlike traditional Wi-Fi networks that use a single point of origin and optional...

Read Full Story »

Posted in: Hardware and Software

A Primer on Common, Helpful Device Adapters

November 11th, 2016 by admin

An iPhone 7 resting on a table top

In September 2016, Apple announced that the iPhone 7 will not feature a 3.5mm jack—meaning anyone who wants to use standard headphones (or the credit-card scanning Square Reader) will need an adapter. Only time will tell if removing the century-old...

Read Full Story »

Posted in: Hardware and Software

Low Battery Life: Bringing Productivity to a Halt

October 26th, 2016 by admin

Stylized graphic of a AA battery with a green cape flying through the air

Work-disrupting messages like “please connect charger” and “plug in or find another power source” can be a huge source of frustration—not to mention a major productivity killer—for employees on the go. Nobody wants to see their phone battery go belly-up...

Read Full Story »

Posted in: Hardware and Software

Troubleshooting Step 1: Reboot

October 12th, 2016 by admin

Stylized graphic of two power buttons side-by-side, the one on the right one lit up in blue

While modern computers are much more stable than their ancestors, trying to get work done on a slow, malfunctioning computer is still a business world rite of passage. Troubleshooting bad behavior on your work computer can, of course, be a tedious...

Read Full Story »

Posted in: Hardware and Software

Overloaded, Weak Signals: Alleviating Common Wi-Fi Bottlenecks

September 28th, 2016 by admin

Cartoon graphic of a hand holding a tablet with a Wi-Fi symbol on the screen

If your staff is complaining about slow Internet access at your office, it’s time to consider how well the Wi-Fi network is configured. Slow Wi-Fi is best known, after all, for transforming an otherwise ideal work environment into a slow-boiling pot...

Read Full Story »

Posted in: Hardware and Software

Water-Resistant Smartphones Are Here: What You Need to Know

September 13th, 2016 by admin

Graphic of an iPhone with an image of water droplets on the screen

Water-resistance probably isn’t on the feature checklist for your employee smartphones—but judging by how many of these devices meet an untimely end via liquid damage, it should be. It probably doesn't come as a surprise that dropping the device...

Read Full Story »

Posted in: Hardware and Software

Are Chromebooks Right for YOUR Business?

September 7th, 2016 by admin

White Acer laptop sitting on a white table, with a yellow flower in a glass to the side

Google’s Chromebook platform has the potential to replace traditional laptops and increase productivity for businesses, much like it has in the consumer market at large. For the uninitiated, Chromebooks are Cloud-oriented laptops that run most operations...

Read Full Story »

Posted in: Hardware and Software

The “Wearable Revolution”: Is Your Company Prepared?

July 7th, 2016 by admin

A man's forearm wearing a smart watch displaying numerous colorful icons

It's a fair bet that one of your employees has already shown off a trendy new wearable gadget around the office. What began with Bluetooth earpieces would branch off into smartwatches, smart glasses, wrist-worn fitness trackers, and even smart clothing...

Read Full Story »

Posted in: Hardware and Software

Are Your Smartphones Properly “Containerized”?

April 26th, 2016 by admin

Cartoon of a brown picket fence with green grass in front and shrubs on the other side

Earlier today the cashier at the local drive-thru miskeyed the amount of cash I gave him into his register. Somewhat sheepishly, he asked if I had a smartphone so I could verify the correct amount of change. Fortunately, I never leave home without it....

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

iPhone “Backdoor”? It Already Exists! Why Your Company Needs It

March 8th, 2016 by admin

Close up of a woman with pink fingernails using an iPhone while carrying a black bag

February's big story in the tech world was the conflict between Apple and the FBI over the creation of a "backdoor" to retrieve encrypted data on iPhones. The government is looking for any clue as to what—or, more specifically, who—motivated Syed Farook,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

The Death (and Second Life) of a Replaced Business Smartphone

March 2nd, 2016 by admin

Two iPhones against a shiny black background, one with a red case and the other pale blue

When it’s time to upgrade employee smartphones, your business needs to worry about backing up data, clearing the memory, and figuring out the best way to get rid of the old devices. According to Business Insider, the average smartphone upgrade cycle...

Read Full Story »

Posted in: Hardware and Software

Blurring the Lines: Hybrid Devices in the Workplace

December 10th, 2015 by admin

Wooden desk with a gray MacBook Pro, Apple display, iPad, and Mac peripherals sitting on it

Apple announced the iPad Pro in September of 2015. Microsoft announced the Surface Book just a month later. Both devices are blurring the lines between tablets and laptops, offering interesting new opportunities for technology use in the workplace and...

Read Full Story »

Posted in: Hardware and Software

Mobile Security Exploits: Surviving the BYOD Environment

November 19th, 2015 by admin

Businessman using a smartphone with his right hand

IT professionals are more concerned than ever about malicious software infections since smart mobile devices hit the mainstream. Many businesses have been relatively open to the idea of integrating smart devices into their workflow as a way to...

Read Full Story »

Posted in: Hardware and Software

3 Incredible Benefits of Protecting Your Cloud Data with Two-Step Verification

October 16th, 2015 by admin

Cartoon graphic of a yellow padlock with a white number '2' overlaid

Online security breaches can be expensive and productivity-killing events. When a nefarious third party acquires an employee password, it’s no party at all. Many online businesses have begun using Two-Step Verification, also known as Two-Factor Authentication,...

Read Full Story »

Posted in: Cyber and Data Security

BYOD Is Here: Where’s Your Company Policy?

September 11th, 2015 by admin

Android phone displaying an orange 'Google Play' screen, resting on a gray table next to an Apple keyboard

Once upon a time, IT administrators offered company-issued hardware to employees based upon something akin to Henry Ford's "Model T" approach: "You can have any equipment you want, as long as it's whatever we have for you." In light of the...

Read Full Story »

Posted in: Hardware and Software

DaaS and the Virtual Workspace: The Next Big Thing?

July 30th, 2015 by admin

Hand holding a graphic of colorful gears and cogs, against a background of a blue sky with a single cloud

We've recently received quite a few questions regarding "virtual workspaces." Particularly in light of the imminent release of the next version of Windows (which, as we've discussed, won't come cheaply for enterprise users), will virtual workspaces...

Read Full Story »

Posted in: Hardware and Software

Surprising New Study: Email an Essential Cross-Generational Business Asset

February 12th, 2015 by admin

Red background with outline of a desktop monitor and mouse, screen displaying '@' sign and icon of an envelope

What was cutting-edge in the 1990s is still relevant today — at least, when it comes to Email technology. According to a new PewResearch report, 61 percent of office workers say Email is “very important” to their work productivity. That same study placed...

Read Full Story »

Posted in: Hardware and Software

Handling Your Growing Network with IT Managed Services

October 31st, 2014 by admin

Eleven colorful network cables arranged like an increasing bar graph

Small and medium-sized business (SMB) computer networks are more of a living project than a one-and-done IT expense. Network-focused IT managed services guides you through the possibilities and challenges presented by changes in personnel and office...

Read Full Story »

Posted in: Solutions, Hardware and Software