Barney's Blog

Blog archive

Is BlackBerry a Black Eye?

The New York Times has an article discussing how BlackBerry users are so embarrassed about their devices that they hide them when in public. Now I've complained loads about my BlackBerry but that means I admit to the world that I have one.

The folks in the Times' article are worried that Android and iPhone users will think less of them. Poppycock! These are the same folks that have to a fancy, new car when their old one was perfectly fine, and have to have everything their neighbors have. Shallow.

If your BlackBerry works, use it. I hate mine but I've had the option to get a new phone for free from Verizon for eight months and still haven't pulled the trigger.

In the meantime I'll use my BlackBerry openly, mainly for e-mail but less frequently for voice. I'd browse, but the Internet is pretty much useless on the darn thing.

Am I too good or too rough on the Blackberry? You tell me at dbarney@redmondmag.com.

Posted by Doug Barney on 10/29/2012 at 1:19 PM


Featured

  • Microsoft Publishes Windows Deadlines on Upgrading to SHA-2

    Microsoft on Friday described its 2019 timeline for when it will start distrusting Shell Hashing Algorithm-1 (SHA-1) in supported Windows systems, as well as in the Windows Server Update Services 3.0 Service Pack 2 management product.

  • Performing a Storage Refresh on Windows Server 2016, Part 1

    To spruce up some aging lab hardware, Brien decided to make the jump to all-flash storage. Here's a walk-through of the first half of the process.

  • Datacenters Are Cooling Down as Buildouts Heat Up

    Tech giants Google, Apple and others are expanding their datacenter footprints at a rapid rate, and it's pushing the industry to find better ways to power all that infrastructure.

  • Vendors Issue Patches for Linux Container Runtime Flaw Enabling Host Attacks

    This week, the National Institute of Standards and Technology (NIST) described a high-risk security vulnerability (CVE-2019-5736) for organizations using containers that could lead to compromised host systems.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.