Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft Takes a Business-Centric Approach With Its Mobile Strategy, Part I

b2ap3_thumbnail_windows_tablet_productivity1_400.jpgJust like the personal computer before it, smartphones have become essential pieces of technology that are practically required in order to complete mission-critical tasks. However, the primary advantage that these devices have over the popular PC is that they’re vastly more mobile and designed for use on the go. Are users able to increase productivity by using Windows tablets?

Unlike Apple, who produces hardware with exclusive software installed on it, Microsoft rarely produces actual Windows-based hardware. As a matter of fact, one of Microsoft’s best marketing strategies was to concentrate almost exclusively on producing software solutions, like operating systems and productivity applications. These pieces of software are then partnered with hardware manufacturers like Dell, Lenovo, and HP, who are deemed original equipment manufacturers (OEMs) for the purpose of profiting off of the software distribution. Thanks to this ingenuity, over 95 percent of all desktop and laptop PCs use the Windows operating system.

Other software manufacturers, like Google and Apple, have found success in the mobile market, with Android and iOS respectively. This prompted Microsoft’s 2012 entry into the mobile race with their Surface line of tablets. Using the metro user interface similar to the one found in Windows 8, the original idea was to enhance mobile work capabilities. But, as everyone in the business world knows, nothing goes as smoothly as we might expect it to. Windows 8 RT was incapable of supporting legacy software, and there was a significant lack of mobile applications that could be run on the original Surface tablet. The two combined were basically a death blow to the fledgeling tablet series, which made mobile users consider devices other than the new Windows-based tablets.

This all changed when Microsoft released their first tablet with a full version of the Windows 8 operating system: the Surface Pro. Because it ran a complete version of Windows 8, any piece of software that would run on a Windows PC could, in theory, be used on the tablet, so long as the software meets the specifications of the device. Since that fateful day, Microsoft and its partners have continued to release tablets that have these capabilities. Despite the lack of applications, this got users interested in the new line of Windows Surface tablets, and provided Microsoft a niche in the competitive mobile computing market.

It took yet another update to make the Surface tablets viable for business. The first service pack, titled Windows 8.1, enhanced the integrity of Windows 8 on tablets with increased security and networking capabilities. The update added BYOD enhancements, improvements to device mobility (VPN, mobile hotspot integration), and security improvements (remote management, enhanced encryption). All of these options are practically essential in today’s business environment, so this update made business owners finally take notice in the mobile Windows 8.1 platform.

After years of toil and hard work, Microsoft’s Surface tablets have finally caught up with the application development and security features that made Android and iOS so popular in the mobile sector. Yet, due to Microsoft dragging their heels on these imperative features, many OEMs haven’t developed or pushed mobile devices that run Windows 8.1. Despite its current lack of popularity, Windows 8.1 tablets hold a unique advantage in terms of building a modern office.

In part two, we will provide specific examples and suggest devices that can work to securely increase your company’s mobility; but in the meantime, why not share some of your thoughts in the comments?

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Users Business Management Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Server Save Money Data Recovery Windows 10 Passwords Saving Money Holiday Tech Term Social Media Gadgets Chrome Virtualization Managed Service Automation Managed IT Services Microsoft Office Facebook Operating System Cybercrime Artificial Intelligence Computers BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Health Wi-Fi Information Office 365 Telephone Systems Covid-19 Information Technology Managed Service Provider Alert Spam Remote Router Bandwidth BDR Recovery Employer-Employee Relationship Social Engineering Mobility Encryption Applications Application App History Law Enforcement Data Breach Big Data Human Resources Password Money Remote Monitoring Mobile Computing Office Tips Data Storage Patch Management Government Training Private Cloud VPN Managed IT Remote Computing Blockchain Apps Paperless Office Mobile Office How To IT solutions Entertainment Website Google Drive Budget Infrastructure Voice over Internet Protocol Wireless Avoiding Downtime Vulnerability Windows 7 Word Gmail Settings Servers Bring Your Own Device Two-factor Authentication Data Management Work/Life Balance Flexibility Data Security Mouse Marketing HaaS WiFi Meetings Education Physical Security Connectivity Remote Work Safety USB Sports HIPAA Redundancy Vendor Risk Management Hacker Keyboard Managed Services Display Conferencing The Internet of Things Scam Lithium-ion battery Employee/Employer Relationship Data Protection RMM Save Time Firewall Vendor Management Virtual Reality Cleaning Apple Social Staff Software as a Service Telephone System User Error End of Support Machine Learning Help Desk Update Printer Bluetooth Printing Internet Exlporer Spam Blocking Wearable Technology Electronic Medical Records Retail Hard Drives Google Docs Instant Messaging Excel Identity Theft Hiring/Firing Robot PDF Managed Services Provider Biometrics IT Consultant Proactive IT Database Virtual Desktop Best Practice Augmented Reality Remote Workers YouTube Humor DDoS Fraud Black Market Processor Business Intelligence SharePoint Remote Worker Audit Worker Cryptocurrency Hard Drive IT Management Document Management Solid State Drive Botnet Wireless Technology Customer Service How to Environment Downtime IT Plan Computing Comparison Fax Server Data storage Unsupported Software CES Automobile SaaS Charger Content Management Business Technology Virus Access Control Digital Signage Compliance Computing Infrastructure Going Green OneNote Unified Threat Management Computer Care Current Events Network Congestion Virtual Assistant Computer Accessories Telephony Authentication eWaste Samsung Battery Procurement Shadow IT Net Neutrality Workplace Strategy Legal Value Digital Signature Leadership Troubleshooting Cost Management Employees Employee/Employer Relationships Outlook Warranty Start Menu ISP Politics Social Networking Windows 365 Advertising Video Conferencing HVAC ROI Screen Mirroring Google Apps Loyalty Printer Server Analysis Shortcuts Books Sales Bitcoin Frequently Asked Questions Notifications Administrator Personal Mobile Devices Cryptomining Windows 10s Running Cable Point of Sale Memory Supply Chain Management Enterprise Content Management Cast Accountants webinar Emergency Monitoring Relocation MSP Batteries Tip of the week Microchip Digitize Professional Services Thought Leadership Public Cloud Credit Cards Employer Employee Relationship Windows 8.1 Video Games Password Management Windows Server 2008 R2 Password Manager Assessment Multi-Factor Security Worker Commute Customer relationships Windows Server 2008 Email Best Practices Science Search Engine IT Assessment Tools Twitter Manufacturing Experience Scalability NIST Business Mangement Television Managed IT Service Smart Tech Security Cameras Trending Business Owner Computer Tips Virtual CIO OneDrive NarrowBand Addiction Biometric Security Distributed Denial of Service Amazon Customer Relationship Management Public Computer Search Analyitcs Peripheral Consultant Recycling Using Data Regulations Analytics Practices Transportation Programming Digital Security Cameras iPhone Wiring Copiers Cache 5G Computer Fan Amazon Web Services Rootkit Quick Tip Best Available Safe Mode Criminal Hosted Computing Smartwatch Workers Antivirus Benefits Ergonomics Files WIndows 7 GDPR Windows 8 Development Chromecast Wireless Internet OLED FENG Online Shopping IBM IT service PCI DSS File Sharing Virtual Machine Camera Fiber Optics Flash Uninterrupted Power Supply Inventory Employee Specifications Smart Technology 2FA Colocation Tablet Messaging Wire Cabling Evernote Supercomputer Domains Travel Policy Monitor Hypervisor Software Tips Printers Trend Micro Sync PowerPoint Emails Windows Media Player Millennials Dark mode User SMS Smart Office Default App IaaS Wireless Charging Maintenance Bloatware Procedure Reputation Saving Time Streaming Media Virtual Private Network Shopping Tech Support Google Search Netflix Workforce Two Factor Authentication Content dark theme Managing Stress Techology Tablets AI Laptop IT Infrastructure Root Cause Analysis Cables Bing Knowledge Music Entrepreneur FinTech Customers HBO Cameras Project Management Social Network Skype Nanotechnology Telecommuting Audiobook Shortcut Touchpad Investment Data loss Cortana

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code