Skip to main content

NPD: Nearly three fourths of small businesses are eyeing tablets for 2012

Apple-iPad-2-Newsstand
Image used with permission by copyright holder

According to new research from the NPD Group, approximately seventy-three percent of small to medium businesses with less than 1,000 employees are planning on purchasing tablets over the next twelve months. This constitutes a five percent increase in businesses when the same question was asked during the second quarter of 2011. According to the research, the average investment in tablets will be more than $21,000 for small businesses over 2012 and 90 percent of respondents believe that they will spend at least that amount, if not more, on new tablet technology. In addition, the top preference within the tablet category is the Apple iPad, according to the survey.

motorola-xoom-frontSmall businesses with less than 50 employees plan to budget about $2,000 on new technology this year, but just over half are interested in tablets. In addition, those organizations are less likely to invest in the Apple iPad. Small businesses with 50 to 200 employees have about a $10,000 budget for technology and companies with 201 to 500 employees are looking to spend ab out $27,000. Medium businesses with 501 to 999 employees have an average budget of nearly $40,000 during 2012 and nearly 90 percent of these businesses are looking to invest in tablets over the next twelve months. 

Recommended Videos

Less than 20 percent of respondents plan on spending less on technology during 2012 compared to the current year. In addition, ten percent of all respondents don’t plan on spending any money on new desktop computers, laptops or tablets. This percentage increases significantly in the fewer than 50 employee companies as these organizations plan on cutting all spending related to computer technology over the next twelve months. This data was collected during a quarterly survey in September 2011, thus tablets like Amazon’s Kindle Fire haven’t been included in the survey. However, the appeal of the Kindle Fire is squarely targeted at consumers rather than attempting to attract businesses. 

Mike Flacy
By day, I'm the content and social media manager for High-Def Digest, Steve's Digicams and The CheckOut on Ben's Bargains…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more