Ever since the term ‘rip-off Britain’ gained popularity in the ‘90s, there’s been a lingering suspicion that UK consumers and businesses pay over the odds for some items.
Now new research from Which? seems to suggest that the concept of rip-off Britain is still alive and well. The consumer organisation has found that UK buyers are paying considerably more for tech products than US consumers.
The Which? research compared the prices of identical tech products in the UK and US. It found UK consumers pay more virtually across the board. In some cases, price differences run into hundreds of pounds.
And not all of that difference is accounted for by UK VAT, which — at 20% — tends to be a higher than sales taxes in the US. The research examined tax-free prices, revealing stark differences.
Here are a few examples:
Richard Lloyd, executive director at Which?, is predictably frustrated by these pricing disparities:
“UK consumers are getting a raw deal by paying up to hundreds of pounds more for the same tech products on sale in the US. Manufacturers should play fair and explain why consumers are paying more for buying in the UK.”
Although this research confirms what many have long suspected, there’s not much you can actually do about it if you’re in the market for new technology.
When you run a business, there comes a time when you have to invest. At that point, the cost of not spending a bit of cash will almost certainly be greater than the cost of your new IT.
To cut costs, you can — of course — shop around. There are often considerable differences in prices between retailers.
And when you’re buying software, consider whether there are any free alternatives to which you could switch. This strategy is particularly useful when looking for software you’re only likely to use occasionally.
But where business is concerned, it can be dangerous to focus on the sticker price above all else. Actually, you want to know the ‘total cost of ownership’ — TCO, for short.
This gives you some idea of what a piece of technology will cost you over its lifetime. So, if you’re buying a laptop that you expect to last five years, the TCO includes what it will cost to buy, maintain and so on.
Gartner research suggests that 80% of IT costs occur after the initial purchase, demonstrating that TCO is the figure that really matters.
Printers are a great example of this. A basic laser printer could set you back £100. But if you’re going to be spending £50 every time you need to replace the toner cartridge, what’s most important is the price of the toner, not the price of the printer.
Sadly, there is no easy way to calculate TCO. It depends on what technology you’re buying and how your business uses it.
And that’s where our last piece of advice comes in: your choice of IT supplier is most important of all. If your company doesn’t have IT expertise in-house, it’s definitely worth finding a local supplier that does.
Yes, it will cost you a bit of money. But the investment could pay for itself many times over in terms of efficiency gains and effective technology use.
How do you open an ISO file? For that matter, what is an ISO file?
We explain in IT for Donuts, our regular Friday feature where we answer tricky questions about business IT.
An ISO file is a disc image. This means it contains all the files and folders that were on a disc. You can think of an ISO file much like a ZIP file — it's lots of files and folders, packaged neatly into a single file.
ISO files are usually used to create CDs or DVDs. For instance, when you buy software online, you may get the option to download an ISO file. You can burn this to a CD in order to install the software on a computer.
So, how do you open an ISO file? If you've downloaded one to your computer and you're not sure what to do with it, you have two main options.
You can burn the ISO file to a CD or DVD. This will create a disc holding all the files and folders that are in the ISO.
If you use Windows 7 or 8, the included Windows Disc Image Burner software can do this:
After a few minutes, your CD or DVD will be ready. You can read this on your computer just like any other disc.
If you don't want to burn the file to a physical disc, you can instead open the ISO by creating a 'virtual disc' on your computer.
If you use Windows 8, it's simple to do this. Right-click the ISO file, then choose Mount. You'll then be able to access and browse the files held in the file.
On earlier versions of Windows, creating a virtual disc requires extra software. The best option is usually Microsoft's Virtual CD-ROM Control Panel.
Some pieces of software can open an ISO file without creating any kind of disc. This approach can be a good way to find a single file within the ISO.
Once you've downloaded, installed and opened the program, use the Open option within the software to view the ISO file. Easy!
Google's busy making changes to its ranking algorithm again. This time, the search giant has decided that websites which use a secure connection as standard should get a boost in search results.
Historically, secure connections have only been used to transfer sensitive information, like credit card details. The secure, encrypted connection is signified by https:// at the beginning of the website address, and a small padlock shown somewhere in your web browser.
There's a good argument for using secure connections more widely. Perhaps most significantly, they're an effective way to prevent 'man in the middle' attacks. These occur when an attacker intercepts data as it travels between a user's computer and a web server.
When a website uses a secure connection, attackers may still be able to intercept the data. But because it's encrypted, they won't be able to understand it.
As well as protecting data from attackers, this change may also represent something of a shift in attitudes around security.
Jason Hart, VP at SafeNet, reckons this change by Google will have a significant impact on how organisations secure their websites:
"Every company wants to rank favourably on Google, so it’s in their best interest to ensure web pages are encrypted."
And although using encryption can hit website performance, these days the affect is negligible. "There are now high speed encryption technologies available that mean cost and speed need no longer be an issue," continues Jason.
"So there really is no excuse for any data to be transmitted or stored in plain text."
If your website doesn't currently use a secure connection, there's no need to panic. At present, the same is true for the majority of websites.
In its blog post summarising the changes, Google also confirmed that, initially, security will have a very small influence on search rankings. However, it may become a more significant factor in time, so it's a good idea to think about how to add a secure connection to your website.
To secure your website, you need an SSL certificate. The SSL stands for secure sockets layer. SSL certificates are available from most web hosting companies, and are sometimes included with web hosting services.
Although you don't need to act now, this latest move by Google definitely means it's worth finding out what it will take to make your website more secure.
Copyright: Radu Bercan
Office 365 is Microsoft's cloud-based version of the classic Microsoft Office. It includes all the core software you're used to, like Word, Outlook, Excel and PowerPoint. And it adds some nifty online features to make it easier to work together.
Although Office 365 shares elements of previous versions, there's a learning curve with any new software. Office 365 is no different.
In particular, you might miss some of the features designed to make your business more connected — like these three:
Microsoft Word was conceived to create documents to be printed out. But increasingly, we write text that people will read online.
As part of a drive to make digital tasks easier, you can now publish blog posts from Microsoft Word.
In word, just go to the File menu and choose Publish as blog post. If you've not published to your blog before, Word will walk you through the process of connecting your blog to the software.
This function works with most popular content management systems (CMS), including WordPress.
Historically, sharing Excel spreadsheets has been tricky. With a spreadsheet saved on a central server, usually only one person could edit it at a time. Other users had to make do with viewing a read-only version.
But in Office 365, several people can edit a spreadsheet at the same time, via their web browser.
This is achieved via SharePoint, the Office 365 tool that can help you create an intranet. You can save your Excel file in SharePoint, then email a link to the people you're working with.
They just have to follow the link and then choose Edit in browser to edit the spreadsheet. And everyone can see everyone else's changes in real time.
It's common for people's contact lists to transcend their address books. These days, you may have contacts on LinkedIn, Twitter, Facebook and other social networks.
With Office 365, Outlook includes what Microsoft call the Outlook Social Connector. This acts as a centralised social networking feed. When you select one of your contacts, you can see all their recent updates from different networks.
To connect your social media accounts, open Outlook. Go to View > People Pane > Account Settings. Choose which social networks you want to link and select Connect. Then choose Finish.
Do you use Office 365? Has it connected your business more effectively?
This post is from Cobweb Solutions, Europe's biggest independent Hosted Exchange provider.
IT for Donuts is our weekly feature where we explain a tech term or answer a question about business IT.
This week, we explain how a new iPad app from Adobe makes it really easy to create simple videos for your website.
It's designed to help you tell stories by creating videos. Adobe's team has clearly put a lot of work into making it easy and intuitive to use.
We put together the simple video shown above in less than an hour. We also used Voice to create the video used in last week's IT for Donuts.
It's very easy to pick up the basics of Voice. When you open the app, you'll see a big label to Create a New Story. Tap this and you can enter a name for your story.
If you're using Voice for the first time, a tutorial will guide you through the next stages.
You'll be prompted to choose a structure for your story. You can flip through the options or just choose Make Up My Own:
You can always customise your video later, so it doesn't matter too much what you choose.
Next you'll see a screen that allows you to add various elements to your video.
Each video is made up of a number of segments, shown at the bottom of the screen. You can edit each individually, choosing a layout and adding images and icons.
You can also tap and hold the microphone icon to record commentary for the video:
You can build your video up segment by segment. Just tap the play button at the bottom left when you want to see how it's coming together.
Voice gives you access to a large number of photos and icons to use in your video.
When you tap the icon or photo options, you can search these. You can also add photos from your iPad, and from other sources.
When you're happy with your video, tap the share button (top right) to upload the video to Adobe's sharing platform. Once the video is ready, you can embed it within other web pages, as we've done above.
You'll probably need to experiment with different themes, content and timings before you have a video you're happy with. But if you're willing to invest a little effort, the results can be suprisingly slick.
While Voice may lack the flexibility offered by other video creator tools, it's very easy to use. If need a short video to tell a story or explain how to do something, Voice is a great way to do it.
If there’s one piece of IT security advice that’s generally not up for debate, it’s that you need to use strong passwords.
Some of the most common passwords are things like ‘password’ and ‘123456’. Hackers can guess these in minutes, so it’s a really bad idea to use them.
The usual advice is to use passwords that:
For instance, a password like ‘YY6^nUCFT/g}k3Cb’ is going to be hard for hackers to guess. You can get advice about choosing strong passwords here.
But now Microsoft researchers have recommended (PDF link) we use and reuse weak passwords on low-risk websites that don’t hold valuable information.
The theory goes something like this: by not having to struggle to remember complicated passwords for every single website, we can focus more of our efforts on creating and memorising strong passwords on the websites that really matter.
On the face of it this sort of makes sense, but it starts falling apart when you try to actually put it into practice. Here’s why:
Although Microsoft’s intentions are good, research like this risks causing more problems than it solves.
As other security experts have argued, you’re probably better off using a password manager to create strong passwords and keep track of them all.
Blog by John McGarvey, IT Donut editor