Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft Takes a Business-Centric Approach With Its Mobile Strategy, Part I

b2ap3_thumbnail_windows_tablet_productivity1_400.jpgJust like the personal computer before it, smartphones have become essential pieces of technology that are practically required in order to complete mission-critical tasks. However, the primary advantage that these devices have over the popular PC is that they’re vastly more mobile and designed for use on the go. Are users able to increase productivity by using Windows tablets?

Unlike Apple, who produces hardware with exclusive software installed on it, Microsoft rarely produces actual Windows-based hardware. As a matter of fact, one of Microsoft’s best marketing strategies was to concentrate almost exclusively on producing software solutions, like operating systems and productivity applications. These pieces of software are then partnered with hardware manufacturers like Dell, Lenovo, and HP, who are deemed original equipment manufacturers (OEMs) for the purpose of profiting off of the software distribution. Thanks to this ingenuity, over 95 percent of all desktop and laptop PCs use the Windows operating system.

Other software manufacturers, like Google and Apple, have found success in the mobile market, with Android and iOS respectively. This prompted Microsoft’s 2012 entry into the mobile race with their Surface line of tablets. Using the metro user interface similar to the one found in Windows 8, the original idea was to enhance mobile work capabilities. But, as everyone in the business world knows, nothing goes as smoothly as we might expect it to. Windows 8 RT was incapable of supporting legacy software, and there was a significant lack of mobile applications that could be run on the original Surface tablet. The two combined were basically a death blow to the fledgeling tablet series, which made mobile users consider devices other than the new Windows-based tablets.

This all changed when Microsoft released their first tablet with a full version of the Windows 8 operating system: the Surface Pro. Because it ran a complete version of Windows 8, any piece of software that would run on a Windows PC could, in theory, be used on the tablet, so long as the software meets the specifications of the device. Since that fateful day, Microsoft and its partners have continued to release tablets that have these capabilities. Despite the lack of applications, this got users interested in the new line of Windows Surface tablets, and provided Microsoft a niche in the competitive mobile computing market.

It took yet another update to make the Surface tablets viable for business. The first service pack, titled Windows 8.1, enhanced the integrity of Windows 8 on tablets with increased security and networking capabilities. The update added BYOD enhancements, improvements to device mobility (VPN, mobile hotspot integration), and security improvements (remote management, enhanced encryption). All of these options are practically essential in today’s business environment, so this update made business owners finally take notice in the mobile Windows 8.1 platform.

After years of toil and hard work, Microsoft’s Surface tablets have finally caught up with the application development and security features that made Android and iOS so popular in the mobile sector. Yet, due to Microsoft dragging their heels on these imperative features, many OEMs haven’t developed or pushed mobile devices that run Windows 8.1. Despite its current lack of popularity, Windows 8.1 tablets hold a unique advantage in terms of building a modern office.

In part two, we will provide specific examples and suggest devices that can work to securely increase your company’s mobility; but in the meantime, why not share some of your thoughts in the comments?

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Data Backup Ransomware Outsourced IT Windows 10 Data Recovery Office Cloud Computing Server Save Money Windows 10 Passwords Virtualization Saving Money Holiday Gadgets Tech Term Social Media Chrome Managed IT Services Managed Service Automation Microsoft Office Computers Artificial Intelligence Facebook Operating System Cybercrime BYOD Internet of Things Mobile Device Management Networking IT Support Wi-Fi Hacking Health Spam Remote Information Office 365 Alert Telephone Systems Managed Service Provider Information Technology Covid-19 Router BDR Bandwidth Social Engineering Mobility Recovery Employer-Employee Relationship Mobile Computing Remote Monitoring Law Enforcement Application App History Password Money Big Data Encryption Human Resources Applications Data Breach Remote Computing Government Blockchain Mobile Office Paperless Office Private Cloud How To Managed IT Office Tips Training Data Storage Apps Patch Management VPN Marketing WiFi Mouse Avoiding Downtime HaaS IT solutions Entertainment Website Data Security Budget Infrastructure Bring Your Own Device Voice over Internet Protocol Wireless Data Management Work/Life Balance Vulnerability Gmail Windows 7 Word Settings Google Drive Two-factor Authentication Flexibility Servers Apple Keyboard Social User Error Telephone System Staff Software as a Service Meetings USB Machine Learning Connectivity Remote Work Save Time Risk Management Hacker Vendor Cleaning Managed Services Display The Internet of Things Lithium-ion battery Conferencing End of Support Scam Employee/Employer Relationship Data Protection Education Physical Security RMM Firewall Safety Sports HIPAA Vendor Management Redundancy Virtual Reality Unsupported Software Business Technology Content Management Proactive IT Access Control Charger Digital Signage Network Congestion Best Practice eWaste Virtual Assistant Compliance YouTube Printer OneNote Authentication Computer Care Black Market Bluetooth Current Events Procurement Telephony Workplace Strategy Samsung Net Neutrality Document Management Wearable Technology Solid State Drive Help Desk Wireless Technology Retail Update Hard Drives Printing How to Value Downtime IT Consultant Instant Messaging Robot Excel Spam Blocking Electronic Medical Records Google Docs Humor Data storage Identity Theft Biometrics Virtual Desktop Automobile Managed Services Provider Hiring/Firing Database Computing Infrastructure DDoS Augmented Reality Remote Workers Going Green SharePoint Fraud Processor Remote Worker Business Intelligence Battery Hard Drive Shadow IT Customer Service Cryptocurrency Audit Legal Worker Environment IT Management Internet Exlporer Fax Server Virus Botnet Computing Comparison Unified Threat Management IT Plan PDF SaaS CES Computer Accessories Messaging Wire IBM Cabling Relocation Evernote Hypervisor IaaS Smart Technology Maintenance Travel Cameras Flash Policy Dark mode Printers Trend Micro Video Games Millennials Bloatware Wireless Charging Software Tips SMS Worker Commute Smart Office Supercomputer Default App Emails Saving Time Tablets Sync Procedure Experience dark theme Virtual Private Network Shopping Scalability Google Search Workforce Entrepreneur Cables AI Business Owner IT Infrastructure Netflix Two Factor Authentication Bing NarrowBand Shortcut Printer Server FinTech Project Management Root Cause Analysis Social Network Search Nanotechnology Telecommuting Cost Management Cortana Music Social Networking HBO Knowledge Investment iPhone Employee/Employer Relationships Digital Signature Skype Employees Windows 365 Warranty Data loss ISP Google Apps Troubleshooting Outlook Video Conferencing HVAC Leadership ROI Files Running Cable Bitcoin Analysis Shortcuts Chromecast Memory Start Menu Sales Point of Sale Administrator Screen Mirroring Personal Devices Loyalty Cryptomining Books Uninterrupted Power Supply Frequently Asked Questions Supply Chain Management Enterprise Content Management Colocation MSP Windows 10s Batteries Accountants Mobile Monitoring Windows 8.1 Microchip Cast Digitize Thought Leadership Monitor Credit Cards Password Manager Emergency Consultant Science Tip of the week Password Management webinar Windows Server 2008 R2 Customer relationships Public Cloud Employer Employee Relationship Multi-Factor Security Analytics Professional Services Streaming Media Email Best Practices Search Engine IT Assessment Twitter Assessment Manufacturing Reputation Distributed Denial of Service Business Mangement Tech Support Customer Relationship Management Best Available Windows Server 2008 Content NIST Tools Computer Tips Managed IT Service Techology Smart Tech Security Cameras Laptop Trending WIndows 7 Analyitcs Programming Virtual CIO OneDrive Addiction Television Biometric Security Customers Amazon Recycling Peripheral Audiobook Digital Security Cameras Wiring Using Data Practices Touchpad Copiers Cache Public Computer 5G Antivirus Amazon Web Services Advertising Criminal Transportation Windows 8 Regulations Quick Tip Politics Safe Mode Ergonomics Windows Media Player GDPR Computer Fan Hosted Computing Rootkit Smartwatch IT service User PowerPoint Notifications Development Wireless Internet OLED Online Shopping Workers Virtual Machine Benefits Tablet PCI DSS File Sharing 2FA Camera FENG Fiber Optics Inventory Employee Domains Specifications Managing Stress

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code