Have any question?
Call (516) 403-9001
Call (516) 403-9001
Blog
Businesses go through a lot of technology, but how does your organization dispose of electronics that are no longer in use? Let’s discuss this incredibly important topic, as the improper disposal of devices could not only put your organization at risk, but also the environment.
There are several reasons why you don’t want to just throw your technology in the trash.
It doesn’t matter what the processes or policies of your recycling facility are; you should always go out of your way to make sure that your devices have been appropriately wiped so that any data found on them is inaccessible moving forward—especially if you are recycling the device. It’s also worth asking whoever is disposing of your device if they plan to erase this data and destroy the hard drives so that nothing can be recovered. Chances are this isn’t the case, and if so, we’re happy to assist.
Once a computer has been delivered to a reputable recycling center,it will be broken down. Recycling companies will disassemble the device and process the various components and parts. Each of these parts will then be recycled according to best practice. This is also the process for removing hazardous materials from these devices.
These disassembled components are then processed and renewed. These materials are used to create new devices, cutting out waste that would otherwise sit unused in a landfill elsewhere.
Technology is an incredibly important part of running any business, and we want to make sure that you are getting the most out of yours. For help with this, reach out to MSPNetworks at (516) 403-9001.
Historically there have been several methods to transfer data from one system to the next, and while the cloud has rendered many of them irrelevant and unnecessary, that doesn’t mean they aren’t used by people looking to move data quickly. Many professionals still opt to use USB flash drives to keep certain data close at hand, but how at risk does this put the data on these drives?
Quite a bit, actually. Let’s discuss some of the many challenges that businesses face when dealing with USB flash storage and how it pertains to network and information security.
Consider how small many of these flash drives are. This makes them compact and easy to carry around, and they can store a surprisingly large amount of data for their size. Unfortunately, when a business owner heavily uses a USB flash drive for any reason, they are constantly putting that data at risk of being lost or stolen. What would happen if the user accidentally dropped it while out and about? While some USB flash drives allow for encryption and passcodes to lock access as needed, this is not always the case. For this reason, many users prefer alternative methods of data transfer.
When USB devices are used to transfer data and take it away from the workplace or off of the company network, tracking where, why, and how it is used can become quite problematic, especially when it comes to sensitive data that is governed by the various data privacy guidelines in specific industries. In particular, you should be wary of employees taking information such as customer data, financial information, intellectual property, source code, and other important assets out of the office; just imagine the fallout that could happen if employees were to lose their drive, or worse, sell the information themselves to make a quick buck. It’s just one other reason to not use USB flash drives, or at least partitioning off data based on user roles within your organization.
Just because USB drives are pretty low-tech compared to more modern solutions does not mean that they are any less immune to security threats. In fact, infected USB flash drives can become vehicles for security threats to access networks. Consider the fact that these devices are used to transfer or copy files from one location to another. The more endpoints a flash drive connects to, the more likely it is to become infected. The possibility of these types of threats becoming problematic has been detailed in the past through tactics such as the BadUSB firmware hack, so they must be taken seriously.
Ultimately, it is much easier to secure a cloud-based data storage system and the devices used to access it, but you know what they say: old habits die hard. Do you still use a USB storage device, and if so, did you learn a thing or two about how to keep them secure? If you don’t want to worry about USB technology being used in such a controversial way, we recommend that you implement a cloud-based data storage system that eliminates the need to use physical hardware that could be corrupted or damaged in transit.
Do you routinely use USBs to transfer data from one place to another? If so, the knowledgeable professionals at MSPNetworks can help you move past antiquated hardware and provide the means to keep your data safe. Give our consultants a call today at (516) 403-9001.
Most of us take streaming media for granted. Whether you are streaming a movie on Netflix, binge-watching a show on Hulu, or using one of the growing number of streaming television networks to stream sports, shows, and news, there is quite a bit of interesting technology fueling your entertainment. Today, we thought we’d briefly go through some of the tech that makes these streaming services, and their millions of simultaneous streaming feeds, possible.
If you asked the average streaming service subscriber how they are able to get their entertainment on demand, they would answer that the companies that do it simply push it over the Internet. You have to be connected to the Internet to get the content so it stands to reason that they just beam it over the network connection, right?
As it turns out, about 85 percent of internet bandwidth is streaming video. That’s a lot of data to send across the internet, to the point where it would be wildly expensive to host these services in the traditional sense and expect it to work effectively for millions of users every day.
So how do they do it? The streaming services have spent a lot of time and money building out streaming infrastructure. Think about how you use your streaming services. You file through a catalog and then select something to play. Nearly instantaneously, the title you’ve chosen plays; on any device you want to view/hear it on. The process used to make this possible is called over-the-top (OTT) streaming.
OTT streaming is the act of delivering content to the user on a particular device. It has five steps. They are:
For streaming services—just like your business—keeping their customers’ personal and financial information secure is undeniably important. In fact, nearly 70 percent of businesses are now investing in some sort of video and audio streaming. As a result, finding vulnerabilities in the video dissemination process can be fruitful for the modern hacker. Moreover, for large-scale streaming services they also run into the issue of people frequently sharing their passwords, which is always a red-flag for cybersecurity professionals looking to keep networks secure.
These companies, like many others, also deal with your standard hacks, but when you consider how many people are lackadaisical about their Netflix or Hulu security, it can be much harder for these organizations. Let’s take a look at some of the hacks these organizations frequently deal with:
Streaming media is one of the most utilized services and the number of people using it is growing rapidly. What are your thoughts on the technology used by streaming media? Do you utilize it regularly? Leave your thoughts in the comments section below and return to our blog for more great technology information.
With such a heavy focus on remote work over the past year or so, if you have tried to procure equipment or technology solutions during this period, you may have noticed that it is much harder than usual to do so. The global chip shortage has led to many challenges for organizations, chief among them getting the parts needed to put together critical technology solutions. This opens up a whole other set of issues, though, particularly in regards to disruption of the supply chain.
First, a little bit of background regarding this issue. With the COVID-19 pandemic disrupting the world so profoundly, the increase in demand for remote technology triggered a massive shortage in the global semiconductor market. So many companies and organizations rushed to purchase new technology to keep their own operations from sinking that the companies responsible for manufacturing semiconductors simply could not keep up with the demand. This demand for semiconductors has had significant impacts on manufacturers of just about all electronics, including the appliance and automobile industries.
Gartner predicts that this shortage will likely last well into 2022, a notion that has turned many organizations and businesses toward finding alternative solutions to their semiconductor shortage woes, lest they suffer from an inability to continue operations. Industry professionals, however, worry that this shortage of parts might open up opportunities for scammers to manufacture and sell fraudulent components.
According to ZDNet, the possibility for fraudsters to take advantage of this opportunity by producing counterfeit products is a very real issue that cannot be avoided. ZDNet reports that there is a precedent for this happening, like with the 2011 earthquake and tsunami that hit Japan; this triggered a shortage of capacitors for medical devices, a shortage that fraudsters took advantage of by producing counterfeit products.
As for whether or not these counterfeit products are problematic, the answer is a resounding “yes,” but probably not for the reasons that you might suspect. In most cases, the counterfeit semiconductors themselves are either manufactured to appear legitimate or to imitate the real deal, or they are components that have been stripped of all branding and repackaged for resale. In both cases, according to ZDNet, these fraudulent components are not subject to the rigorous quality control procedures that large manufacturers have in place, meaning that they might pass basic quality control checks, but are simply not sustainable long-term.
Now, consider what might happen to businesses or manufacturers who procure these counterfeit products and integrate them into their supply chain and processes. Suddenly these components are actively being used in the same way that real components that have been tested are. What happens when these components fail and lead to disaster? It’s a position that no business wants to find itself in.
When it comes to procuring equipment for your business, you can trust that MSPNetworks will help you get the best deals and the best components for your business. We work with trusted vendors to ensure that you are not shortchanged by unfortunate trends in the market, and since we only work with vendors we trust, you can know with confidence that you are getting devices and components that are legitimate.
To learn more about what we can do for your business, reach out to us at (516) 403-9001.
If you’ve ever used technology, the power button has had a pretty consistent appearance, and an even more consistent use. However, there’s a reason that the power symbol we’re so familiar with looks the way it does. Furthermore, there’s more that the power button can ultimately do.
The symbol that appears on the power button looks somewhat unique. However, this makes more sense when you consider that it’s just what you get when you smoosh the “|” for on and the “O” for off into a single symbol.
Hopefully, you’ve already learned that your power button should really only be used to power up your system, or—if no other options are available—to power off the device after all your work is saved and your programs are all closed out (again, only as a last resort). Whenever you can, it is better to use the shut down option nestled into the operating system.
We take this so seriously because abusing the power button is just a convenient means to abuse the device itself. Improperly powering down your system in this way can lead to file corruption and potentially give the device a hard time when you start it back up.
Of course, with help from a technician, it is possible to remap your power button to do something different when it is pressed if you so choose.
You have the capability to change your power button’s functionality, allowing you to set it to do something other than turn off your system when it is pressed—or, if you’re working with your laptop, your lid is closed when it's plugged in or running on stored battery power. In your Control Panel, under Hardware and Sound, find your Power Options and Choose what the power button does.
Your options as to its function include:
Make sure you Save changes so that your settings are properly applied.
Interested in finding out more about your technology and how it can most benefit your business? Give MSPNetworks a call at (516) 403-9001 to find out more.
The laptop is one of the great productivity tools in modern business. Their portability gives them immense value. There are some cons to using a laptop, however. One is the trackpad. While they have improved over the years, they are still not ideal, which is why you see many people who use a laptop for productivity bring along a wireless mouse. One of the biggest problems people run into is that they have a hard time with the click-and-drag feature on the trackpad and this makes working in certain programs maddening. Today, we have a tip to make this process much simpler.
Disclaimer: You will have to change your settings for this tip, so if you don’t feel comfortable changing things inside your Windows OS, let your IT provider know and they will assist you.
ClickLock is a feature offered inside Windows that eliminates the frustration of the click-and-drag problems you have on your laptop, as it allows you to start and stop your drag option by simply pressing your left button a little longer.
It works like this:
You will immediately see the improvement. Like many options that don’t come by default, you have to activate it in your settings.
To use ClickLock, you need to first navigate to your Control Panel, from your Start Menu:
We hope this will help you be more productive and reduce your frustration when working on your laptop. For more great tips and tricks return to our blog soon.
Quick, off the top of your head, how many network switches are in use at your office? How many wireless access points? How many routers are past their warranty or no longer getting support?
That’s not a question most business owners are asked on a regular basis, and we don’t really expect you to be able to rattle off the answers. You should have all of that information documented though.
Documenting your entire IT infrastructure saves you a ton of time and hassle later. It can help with insurance, it can help simply keep track of everything you are supposed to be keeping secure, and it can help prevent you from buying something you don’t need.
While it’s going to depend a little bit from device to device, you’ll at least want to track some of the basics.
Device Name: Pretty straightforward—the name of the device on the network, if it has one, or give it a descriptor name if it doesn’t, such as “Conference Room Network Switch.”
Device Model and Serial Number: You’ll want this for support and warranty issues. It’s easier to have it written down than having to find the tiny label on the device after it is in place and hooked up.
Installation Date: When was the device purchased and installed?
Who Installed It: It never hurts to know—if a particular company or employee set it up, and it wasn’t set up properly, you’ll want to know who to reach out to.
Warranty Information: How long does the manufacturer’s warranty last? Did you purchase extended warranty? Does the device have an estimated end of life date?
Vendor Information: Is there a support number? Did you purchase the device directly from the vendor or a third party?
Location: Where is the device located in the office? Is it in the server room, or behind the reception desk?
Service History: This one is huge, and the hardest information to keep up with. If work is done on the device, it should be documented. That includes the initial setup and ongoing administrative changes. If the device has a tendency to fail often, your documentation will show this as you audit your network.
Documenting your IT is a huge part of keeping your IT running smoothly. You don’t need to do this by yourself. At MSPNetworks, we document every piece of hardware and software we touch and keep a very clear historical record of the work we do so we can always adjust our processes and help business owners make informed IT-related decisions.
Want to learn more? Give us a call at (516) 403-9001.
A lot of people never stop and consider how their data is saved. It’s something we all have, from old photos of our family vacations to the files kept on the server back at the office, but not many people know the actual mechanics behind it. Today, we wanted to go over these specifics, and hopefully make it clear why we always advocate for backup practices.
The traditional hard disk drive, often shortened to HDD, works a little bit like a phonograph or gramophone did. Platters inside the drive store your data, layered on top of one another and magnetized. A small mechanical arm sits over them to read and write data to the drive, just as a record player had its needle to coax out the sound.
Much as a record would on a record player, these platters spin. However, rather than having a rate of 33 or 78 rotations per minute, the platters on a hard drive generally reach 7200 RPM. This speed creates a cushion of air that holds up the arm and keeps it from making contact, which would destroy the data the drive contains.
There are actually a lot of reasons that data could be lost if it is stored on a hard drive. As a mechanical system, plenty of issues could arise and cause the drive to fail entirely. The motor that spins the platters could burn out, the arm could catch, or the platters themselves could even break if not handled with care. Whatever the reason, once the drive is rendered inaccessible, the data stored on it is as good as gone.
Once you consider how much you rely on your hard drive to do (like opening, editing, and saving files, surfing the web, and countless other general utilities) the importance of the data on your hard drive is only too clear.
(To be clear, we are not referring to SSD drives right now. As they don’t rely on any moving parts, they are a little sturdier, but certainly not impervious.)
Despite this clear vulnerability, we put our trust in these devices each and every day. Your laptop or computer will have at least one or two, while a business server will use many more. Some of us carry our data around in external hard drives.
Do you really feel comfortable putting all that trust in some fragile moving parts and a tiny cushion of air? And, assuming the answer is no…
Seriously. If you only have one copy of your data stored on a single one of these hard drives, it is at a higher-than-you’d-expect risk of data loss.
Thankfully, this is very simple to mitigate, especially with our help. We’ve helped many businesses generate backup solutions that are tested to be trustworthy, ensuring that their data isn’t going to be lost if some circumstance were to strike. By storing a second copy of their data on another device in the office, as well as a third (and fourth, and fifth, if possible) offsite in the cloud, we allow these businesses the confidence that comes with knowing that their data isn’t going to be completely lost to them.
To learn more about how we accomplish this, reach out to us directly at (516) 403-9001!
Once a mobile device outlives its presumed usefulness, the default assumption is that there is nothing left to do but dispose of it. However, before you do so, reconsider. There may be other ways that your device could show its utility. For today’s tip, we’ll review a few ways that an aged-out smartphone or tablet can still be handy for you (even in the office)!
Keep in mind that these are all only suggestions, and should all be run by your IT resource for approval before you try to tweak anything.
While we can help you where solutions that allow your team to access their workstations from home are involved, you and your users may find yourself needing the opposite connectivity at times. There are many apps that, when installed on both devices, allow you to turn your Android device into a terminal tied to your home system.
With a few older devices, you can easily create a video communications network to collaborate with others in the office, or even others across the world. A stand, a power source, and a Wi-Fi connection are all you need, and you’ll have a reliable means of reaching out via video.
Real productivity isn’t possible in a completely sterile environment, so why not jazz up your workspace with a photograph. Find out if the cloud service of your choice has a slideshow function (as Google Photos does) and let your phone rotate out your photos. Alternatively, there are webcam apps that can deliver a livestream of some remote location directly to your desk, if you prefer.
If you’d like something with some more functionality, you could always set up your old smartphone to be a desk clock or calendar to give yourself a quick-access reference point for these needs.
If there’s something special you want to keep an eye on while you’re at the office (or again, vice versa), you can also set up your mobile device to act as an impromptu security camera. Various applications are available that will allow you to stream a live feed from your mobile device to a web browser, keeping you in-the-know of everything that is happening while you’re away. This isn’t really a replacement for physical security for your business, but it’s a great way to keep tabs on your dog at home.
Of course, if your mobile device is ready for retirement, you should at least dispose of it responsibly and properly. Reach out to our team to learn more about recycling your electronics securely, and for any other IT-related questions, at (516) 403-9001.
The curious thing about information technology is that, while it improves as any other technology would, the environment can accelerate the various changes made to it at various rates. As a result, knowing when your business needs to upgrade its technology isn’t always so cut-and-dry. To help, we’re sharing a few clear indicators that hint that the time has come.
Or, more specifically, they are always scrambling to fix problems as they pop up. Older technology is prone to issues like this (and others, as we will get into). So, if your internal team is always chasing down problems, or you’ve been calling in the local IT guy almost every day, it will be more helpful to upgrade your technology. More up-to-date solutions will be less susceptible to these kinds of difficulties, so the costs saved in maintenance and remediation will likely offset the financial burden of an upgrade.
One of the most reassuring things about most job processes is the fact that there is a process at all, so if your technology no longer allows your set processes to be followed, how do you think your employees will react to it? They aren’t going to be happy, that’s for sure, and in order to accomplish what they are responsible for, they might resort to finding their own, less efficient (and less secure) methods to complete their objectives… methods that might be laden with problems. Improved tools can eliminate this need by providing a set, company-approved and secure process for employees to follow.
Speaking of things that frustrate your users, slow technology is perhaps public enemy number one in the office. Whether workstations are taking too long to boot up, the Internet connection is flaky, you deal with slow application load times, or too many other examples to list here, lagginess is generally best resolved by a replacement. This is very closely related to our next warning sign…
It’s simple math, really. If each task takes longer to complete, fewer tasks can be completed throughout the day, which usually translates to reduced revenue overall. At the same time, your employees will still be paid their usual wage, meaning that you’re spending the same amount of money to generate less income. It doesn’t take an economics degree to see that this isn’t good.
Investing in an upgrade can help you improve your productivity, which gives you the potential to generate increased amounts of revenue. So, instead of working for less money, you have the chance to see some significant returns from your investment.
Here’s the worst of it: as technology improves, so do the cyberattacks that bad actors will use to undermine it. By using older technology, you are effectively welcoming cybercriminals to attack you--especially if your tools have passed their end of support date. Updating your software, whether it’s your security solution or the productivity tools you rely on, helps to reinforce your overall security by reducing a particularly potent weakness.
So, when all is said and done, keeping up on your IT upgrades is a bit of a no-brainer. For more information on whether or not you need to upgrade your IT, or assistance in doing so, reach out to MSPNetworks! Our professionals are just a call to (516) 403-9001 away.
We hear a lot about the benefits of moving your business to the cloud. It can reduce that big expense on new infrastructure and the ongoing management costs. The cloud can increase the effectiveness of your IT budget. It can add functionality and increase user satisfaction.
Businesses are rapidly moving all or portions of their IT to the cloud, and for a lot of good reasons, but before you do, it is important to remember the following:
Depending on how you look at it, this is either a pro or a con. If you are hosting your data in the cloud, you are essentially entrusting someone else to manage your data. That might mean that the data is in better hands - a professional data center with top-notch security, climate control, near-perfect uptime, and certified staff to manage the hardware, software, and network equipment is usually a big step up from most small business management.
That said, anyone can sell cloud storage. Anyone can lease out a portion of a data center, or keep a shared server on their premise and sell you cloud computing resources from it.
Before you pull the trigger, you’ll want to understand what kinds of SLAs (service level agreement) you have, how emergencies are handled, and make sure you are getting the computing resources you need.
Migrating your infrastructure to the cloud could be a fairly straightforward process, or it could require a lot of time and labor. Don’t get fooled by the low monthly price - there will often be some legwork to move the data, configure the environment, train your users, and make tweaks.
That migration time doesn’t mean you don’t have access to your data, but the transition could take time, and anytime users need to change their regular everyday processes, it can slow things down.
Today, most businesses can benefit from at least some degree of cloud computing, whether it be some basics like hosted email and document management (like G Suite or Office 365), data backups, or a line-of-business app, to moving most of your infrastructure to a hosted environment.
The problem most businesses run into is when a cloud implementation isn’t planned out properly, or is handled poorly.
We’d love to talk to you about the cloud. Give us a call at (516) 403-9001 and set up an appointment!
With technology being deployed to help businesses solve all manners of operational inefficiency, it’s often difficult to pinpoint what IT will work best for your business. Organizations of all types look to technology; and, at some point you need to ask yourself if your technology is set up to help reach your business’ potential.
If you are like many other businesses, IT is a crucial part of your business’ day-to-day operations and it stands to reason that it should be a priority to understand just how it functions to do so. This process, while pretty transparent, is not always cut and dry. With a simple IT assessment, you can get a clear look at how your organization’s IT functions, how it works to tie your business together, and get an idea how it can be improved. Today, we’ll take a look at an IT assessment and how it can be the first step on a path to improving your operations.
In order to get the most comprehensive look at how your IT is functioning for your business, you need to take a look at core functions those technologies are used for. They typically include human resources, financial information, hardware, software, specific needs of your business, governance (compliance), managing risk, and the ever-prominent security of said network.
Before we get started going through what to expect from an IT assessment, there are a couple terms that you need to understand:
These two metrics will come into play frequently during the IT assessment.
You have to know why you would need an IT assessment in the first place. An IT assessment, or IT audit, is going to be the basis for the decisions that will come after. For that reason it is extremely important that you have trained technicians who know exactly what they are looking at, conducting the audit. It’s crucial that the people who conduct the assessment understand how IT should be used as a part of your business’ workflow, not aside from it.
The first thing that will happen during an IT assessment is to put together something called the Asset Detail Report. The Asset Detail Report lists all computers, servers, virtualized computing platforms, printers, switches, routers, and any other hardware and software that you have or pay for. This will present the age of all the hardware systems your organization has; provide the names of software, when it was installed, and what versions you’re working with; the status of endpoint security; where, and how much, data is stored; IP addresses and much, much more.
At this time, it may be advantageous to create a site diagram. A site diagram shows you how your data flows through your network and devices. This visual representation of your IT infrastructure will give you a map of sorts of your organization’s network. The IT technicians at MSPNetworks can assist you with any part of the IT assessment process.
Next the IT SWOT analysis, which is a metric that separates the strengths, weakness, opportunities, and threats affecting your business’ IT network. First, technicians will identify internal and external factors that are considered favorable or unfavorable to the network and infrastructure health--including security--of the organization’s IT. Next, the techs will use the SWOT results to make recommendations on how to improve network security and suggest what types of investments will be needed to reduce organizational risk, promote rapid and sustainable ROI, and maintain a positive TCO. These suggestions will then be put into an actionable plan with the design to help a business make the right technology decisions.
Finally, the assessment will produce a risk report from an evaluation of:
...and more
This report will identify domain controllers and online statuses, list users in Active Directory, a user’s last login, identify potential security issues such as weak passwords and machines that haven’t had their software updates, and provide the known vulnerabilities found on the network. With this report you will understand everything you need to know about your organization’s IT infrastructure and networking; and, their relationship to your team’s ability to be productive.
Your organization’s IT is often what holds it all together. For more information about an IT assessment, or to schedule our knowledgeable technicians to complete one for you, call MSPNetworks today at (516) 403-9001.
Make no mistake about it, Huawei is one of the largest technology companies in the entire world. It employs over 200,000 people and in 2018 saw revenues of over $100 billion. Over the past few years, their devices have been pushing the boundaries of what is possible in tech all while being relatively unavailable to one of the major technology markets in the world, the United States. The fact is that outside the U.S., Huawei is a major player.
The reason the tech giant has been shut out of the hungry U.S. tech market has been because there are very legitimate fears of collusion with the Chinese government. This is something that U.S. leaders clearly understand. The U.S., who has been at the forefront of digital surveillance, understands that the more data that is tracked, catalogued and analyzed, the more information is learned. For lawmakers in the U.S., providing the communist Chinese government in Beijing an in to collect information about American industry, U.S. citizens, and the like is looked on as oversharing.
On May 16, the United States doubled down. They added Huawei to their U.S. Commerce Department’s Bureau of Industry and Security’s “entity list”, effectively barring U.S. companies from doing business with Huawei unless they get explicit permission from Washington. The official reasoning? Huawei “is engaged in activities that are contrary to U.S. national security or foreign policy interest.” Most people in the know have made mention to the ongoing trade war with China being the actual impetus behind the move.
Whatever the reasoning, this act set off a firestorm for the Chinese manufacturer. Huawei’s smartphones run on Android, their computers run Windows 10, these are obviously products of U.S.-owned properties Google and Microsoft, respectively. This means that after August 19, the tech giant will no longer have access to the operating systems their devices run on; and, if you consider all the other U.S. companies they have agreements with (such as NVIDIA and Qualcomm), the decision to put Huawei on the entity list puts a lot of pressure on the company.
Huawei has announced that they have been developing their own OS for a while now, but by having to pivot that abruptly, it will be extraordinarily costly for the company. Since Android is an open-sourced software, they could still use a custom version of that, but they wouldn’t be supported by Google’s terms of service, meaning those customers wouldn’t have access to Google products, including the Google Play store which fuels Android mobile devices. More than any other issue, not having access to apps can sink a mobile platform, just ask Blackberry. In fact, some of the largest companies in the world have tried to create App stores, and only Apple and Google have done it proficiently.
Moreover, even if they were somehow going to figure out the App store situation, not having access to American-developed applications will leave an undeniable hole in the offering, at least in the short term. Apps like Google Chrome, Gmail, Facebook, Twitter, YouTube, and others of the like wouldn’t be available on the environment. While individual users could still use these services through their web browser, apps help mobile function.
It will be interesting to see what Huawei’s strategy will be over the upcoming months to try and mitigate a massive revenue loss; or, if it can convince the U.S. lawmakers that have taken this measure that the company isn’t in Beijing’s pocket. Only time will tell. Have you ever used any Huawei devices? What do you think of the U.S.’s plan? Leave your thoughts on these questions and more in the comments below.
Learn more about what MSPNetworks can do for your business.
MSPNetworks
1111 Broadhollow Rd Suite 202
Farmingdale, New York 11735