• 2025 TOP 10 SMB BUSINESS ISSUES, IT PRIORITIES, IT CHALLENGES

    2025 TOP 10 SMB BUSINESS ISSUES, IT PRIORITIES, IT CHALLENGES

  • 2025 TOP 10 PREDICTIONS

    2025 TOP 10 PREDICTIONS

    SMB & Midmarket Predictions
    READ
  • SIMPLIFY. EXPAND. GROW.

    SIMPLIFY. EXPAND. GROW.

    SMB. CORE MIDMARKET. UPPER MIDMARKET. ECOSYSTEM
    LEARN MORE
  • ARTIFICIAL INTELLIGENCE

    ARTIFICIAL INTELLIGENCE

    SMB & Midmarket Analytics & Artificial Intelligence Adoption
    LEARN MORE
  • IT SECURITY TRENDS

    IT SECURITY TRENDS

    SMB & Midmarket Security Adoption Trends
    LATEST RESEARCH
  • CHANNEL PARTNER RESEARCH

    CHANNEL PARTNER RESEARCH

    Channel Partner Trends
    LATEST RESEARCH
  • FEATURED INFOGRAPHIC

    FEATURED INFOGRAPHIC

    2024 Top 10 SMB Business Issues, IT Priorities, IT Challenges
    LEARN MORE
  • CHANNEL INFOGRAPHIC

    CHANNEL INFOGRAPHIC

    2024 Top 10 Partner Business Challenges
    LATEST RESEARCH
  • 2024 TOP 10 PREDICTIONS

    2024 TOP 10 PREDICTIONS

    Channel Partner Predictions
    READ
  • CLOUD ADOPTION TRENDS

    CLOUD ADOPTION TRENDS

    SMB & Midmarket Cloud Adoption
    LATEST RESEARCH
  • FUTURE OF PARTNER ECOSYSTEM

    FUTURE OF PARTNER ECOSYSTEM

    Networked, Engaged, Extended, Hybrid
    DOWNLOAD NOW
  • BUYERS JOURNEY

    BUYERS JOURNEY

    Influence map & care-abouts
    LEARN MORE
  • DIGITAL TRANSFORMATION

    DIGITAL TRANSFORMATION

    Connected Business
    LEARN MORE
  • MANAGED SERVICES RESEARCH

    MANAGED SERVICES RESEARCH

    SMB & Midmarket Managed Services Adoption
    LEARN MORE
  • WHITE PAPER

    WHITE PAPER

    SMB Path to Digitalization
    DOWNLOAD

Techaisle Blog

Insightful research, flexible data, and deep analysis by a global SMB IT Market Research and Industry Analyst organization dedicated to tracking the Future of SMBs and Channels.
Anurag Agrawal

Older vs Newer PCs – Cost and Productivity Impact for SMBs in Asia-Pacific

Increasing profitability, improving workforce productivity and reducing operational costs are among the top five business issues for SMBs in the Asia/Pacific region. Cost is sometimes a tricky item to nail down as too often SMBs focus on short term costs. In most cases this approach is absolutely valid but it can lead to situations that cost them more. The choice between maintaining older PCs and replacing them with newer PCs is one such area. Techaisle, conducted a Pan-Asia survey of 2156 SMBs in five countries to understand the comparative differences in costs of maintaining older & newer PCs and associated quantifiable productivity lost and the impact of newer PCs. Findings from the survey, commissioned by Microsoft & Intel, and driving Microsoft’s “Make the Shift Campaign” in the Pan-Asian region, uncovers that the cost of upkeeping a PC older than four years can be used to purchase at least two new Modern PCs.

The study reveals that the cost of owning a 4 year or older PC by an SMB is US$2,736 which is 2.7 times the cost for a PC that is less than 4 years old. The study also revealed that an average of 112 hours is lost due to downtime of an older PC, a number that is 3.1X of newer PCs. This is a “stealth” cost that drains cash flow and adds to the operating cost of an SMB which they can hardly afford. Cost implications vary for SMBs of different sizes.

Cost of owning an older PC

Anurag Agrawal

SMB Productivity improvement: finding hard numbers in soft benefits

We know that productivity is a very important business goal for your organization. And that not only employee productivity but also group and organizational productivity is of importance. The IT industry is abuzz with discussion of how to improve productivity – and the number of suggestions is logarithmically proportional to the number of IT suppliers. But you need to find that trusted advisor, an unbiased supplier who can sift through the hype. We know that there is an ongoing change, a shift towards business value & employee empowerment. These refer to the new priorities among SMBs to invest in tools and technologies that allow their users to make better business decisions, improve market reaction time and better serve their customers. In other words, SMB firm leaders like yourself, are looking to improve return on Human Capital as a way forward.

Drilling down beyond the hype – how can you use technology to augment your organizations’ ability to compete tasks and decrease process friction?

Productivity

Techaisle found that SMB business leaders are believers in the connection between technology and productivity: 55% see “creating processes that constitute a better way of doing business” as a key benefit of IT, 57% credit IT with “facilitating better automation of core business processes,” just over half report that IT creates “better coordination across functional areas,” and an even 60% state simply that technology “improves employee productivity”.

Anurag Agrawal

Techaisle Take – HPE vs Dell SMB IT solution stack

Comparing Dell and HPE offerings and ecosystems against the Techaisle SMB IT solution stack model

Techaisle’s latest report is designed to help SMB buyers and suppliers identify IT stack requirements, and to compare the offerings and ecosystems of the two current market leaders, Dell and HPE, against Techaisle’s definition of essential SMB & midmarket business technologies. The report is structured in three parts:

  • The IT stack: the report begins by outlining the technologies that SMBs require – and require integration across – in order to support current and emerging business requirements
  • Vendor comparison: an evaluation of Dell and HPE offerings, including core products, non-core products and partner-delivered capabilities, against the stack requirements
  • Evaluating stack suppliers: advice on how to use the stack comparison, and additional Techaisle research findings, to evaluate Dell and HPE strengths
Tags:
Anurag Agrawal

Connected Security is essential for empowering Future of Work

Security is a feature that needs to be present within each layer of the stack. Security, needs to permeate all layers of an IT solution stack. IT security isn’t a discrete category – it is a ubiquitous factor in all aspects of IT/business infrastructure. 

The most important IT-related development in 2018 and beyond will be a focus on connectedness – connected cloud, edge, applications, security, collaboration, workspaces and insights. Internet and the web are the navigation routes that we have been developing since the 1970s; the always-on, everywhere-connected Interwork© platform is the destination that we will be creating in 2018 and for years to come. Please read Future of Work - Interwork: the next step in connected businesses

If there is an evident downside to ubiquitous and constant connectivity, it’s security. In conventional IT environments, security followed a ‘castle keep’-type approach: IT security staff gathered all critical information assets at the core of the environment, and focused their resources on hardening the perimeter, in much the same way that ancient castles used a moat and wall to safeguard people and assets within a central tower.

Today, of course, nations do not use castles as fortifications – and in truth, the traditional approach to security is scarcely better attuned to contemporary IT security needs. With the rise of mobility, cloud and connected supply chains reaching from component suppliers to OEMs to distribution and consumers, there is no perimeter to harden; any sizeable enterprise will have literally thousands of shifting entry points capable of accessing one or more corporate systems. And the rise in the value of information has spawned a sophisticated cyber theft industry: ‘bad actors’ use many different types of tactics and advanced technology to infiltrate corporate IT environments, with an eye towards stealing customer credit card data or internal financial or engineering information, hijacking corporate IT resources or obtaining some other form of benefit.

Security is the most amorphous of IT market categories. Virtually all other technologies occupy a defined position within the solution stack. Today’s security strategies no longer resemble a ‘wrapper’ around assets – they are built into each element of the corporate IT stack and rely on connectedness to (as the NIST framework recommends ) identify threats, protect against attacks, detect intruders if/when they breach perimeter defenses, respond to security events, and recover information lost to theft, loss and/or malware. 

Research You Can Rely On | Analysis You Can Act Upon

Techaisle - TA