Blog

When Apples and Oranges Seem Alike

It is a common marketing practice for software vendors to utilize product comparisons that invariably help their software appear to be the best choice. However, these comparisons may actually provide an inaccurate profile of the software’s actual advantages and disadvantages. There are several different ways of comparing software, in this post we are going to delve into the most commonly used comparison methods to determine which can provide the most accurate picture of a software’s real capabilities.

The importance of selecting the right comparison method is best illustrated by a comparison of apples and oranges. Everyone knows that apples and oranges are very different, however, depending on the method of comparison they can appear very similar. For instance, both are fruit, edible, somewhat round, nutritious, have skins and seeds, and grow on trees. If one were to end the comparison here, someone who has never seen or eaten an apple and an orange might erroneously think that they are quite similar. However, with the proper questions and applied method of comparison it is very easy to illustrate the differences between apples and oranges.

Read more...

4 Tips to Evaluate Software for Business

This post is about evaluating business software. We will consider four major factors that together may lead to the popularity and success of a software product. Since a popular product is not necessarily the one that satisfies your business needs, with each factor below we’ve also included a tip. The purpose is to stimulate critical thinking and help you avoid “crowd-thinking”.

Success Factor 1: Free, Free, Free

Very commonly when something is free there is a good chance it will quickly gain in popularity. Although being free does not guarantee true success – after all a software vendor needs money to continue developing and supporting their program – it can help influence customer perception in a positive way. It also greatly contributes to virality, especially when the quality of the program is good enough to make people feel the urge to share their experience with others.


What is the proverbial fly in the ointment here? Product X might not be as free as it seems. First, there can be a really annoying “Buy me” window that nags you every time you run the program. Second, and this pertains specifically to remote desktop software, your free sponsored remote session might get disconnected after a while right in the middle of you helping your grandpa with his urgent computer task.

Read more...

The True Cost of “Easy” Software

Regardless of the services or products your organization provides, the right software is integral to your business success. In this digital age, your software is part of a toolkit that helps your business meet its goals and objectives. Because of this, software purchases are frequently made based on technical features or functionality. However, software has three important components that are interconnected: ease-of-use, functionality, and security. These are often referred to as a triad or triangle.

Ease-of-Use vs. Functionality vs. Security

The basic premise of the Ease-of-Use/Functionality/Security triad is that changing the capabilities of one component will have a direct effect on the other two. For instance:

  • An increase in a software’s Security will result in less Functionality and Usability
  • An increase in a software’s Functionality will result in lower Security and Usability
  • And, of course, an increase in Usability will diminish Security and Functionality

Read more...

Remote Access Software and Erroneous Virus Detection Problem

The problem of mistakenly identifying a particular program as a virus is as old as the Internet, especially for developers of remote access software. For example, we often receive complaints from users that an antivirus program has blocked Remote Utilities.

The antivirus program's extensive authority over the user's computer lies at the root of the problem. Moreover, the user usually trusts the antivirus program completely. A user doesn't continue installing or launching a program marked as "suspicious". On one hand, the user is indeed protected against launching malicious programs. On the other hand the antivirus program degrades the user's experience when it prevents him from accessing a remote computer or places executable files into quarantine -- or even deletes them.

Read more...

 

© 2016 Usoris Systems LLC. Remote Utilities and Remote Utilities logo are either registered trademarks or trademarks of Usoris Systems LLC in the United States and/or other countries. All rights reserved.