Dedicated server package details:

HP Dual Xeon 5160

This is a true story. You can't get this much speed and power at such a low cost anywhere else. This is a Limited offer, act fast.
Operating system pre-installed on the server.
Windows Server 2003/2008 Standard
CPU brand and type of the server.
Intel Xeon 5160 Dual Core 3.0GHz
Disk space:
Amount of storage space available on the server.
Available RAM size on the server.
Internet bandwidth transfer limit.
Physical location of the data center.
One-time setup fee the hosting provider charges.
Whether the hosting provider can manage the server for you.
Superb Internet
There are no user reviews for Superb Internet.
See more badges...

Superb Internet

Superb.NET is a wholly owned division of Superb Internet Corporation, a world-class, award-winning web hosting company founded in 1996. Ever since then, Superb Internet has been consistently rated as one of the very best web hosts by all web host rating agencies, such as Web Hosting Magazine. These awards have been in all areas, especially customer support and reseller services. As the hosting division of Superb Internet; Superb.NET provides a complete range of managed web hosting services, from virtual hosting through to high-volume, mission-critical dedicated service solutions. At the core of Superb.NET is a focus approach to customer service and continuous service improvement, as a part of its commitment to staying "Ahead of the Rest®”
Company Info:
Company title:
The public name of the company.
Superb Hosting
Company description:
A short description of this company.
SuperbHosting.Net is a wholly owned division of Superb Internet Corporation, a world-class, award-winning web hosting company founded in 1996. Since 1996, Superb Internet has been consistently rated as one of the very best web hosts by all web host rating agencies, such as Web Hosting Magazine, in all areas, especially customer support and reseller services. As the hosting division of Superb Internet; SuperbHosting provides a complete range of managed web hosting services, from virtual hosting through to high-volume, mission-critical dedicated service solutions. SuperbHosting's core focus is customer service, and continuous service improvement, as a part of its commitment to staying "Ahead of the Rest."®
Company ownership type.
Privately Held
Estimated annual revenue of this company.
$1 - 10M ($5,000,000 estimated) Ranked 27 at HostMonk
Estimated number of employees of this company.
25 - 100 (50 estimated) Ranked 23 at HostMonk
Owned domains:
List of other domain names that are owned by the same owner as this site.,,,,,,,,,,,,,,,,,,,,,,,,,
Supported product types:
Hosting package types supported by this provider.
Dedicated server, Web hosting
Payment options:
Available payment options supported by this provider.
Credit card, PayPal
Number of public contacts listed at
37 contacts at Jigsaw
Jigsaw company details:
Description of this company available at

About Us

We are a world-class web hosting company founded in 1996. We've led the industry ever since, because our top priority is meeting the needs of our customers. Most customers who come on board, never look back. Some may leave temporarily to try the competition, seeking lower price-points or taking advantage of short-term promotions, but in almost every case, they come back to Superb. Why? For the sake of quality: our reliable service, reliable network, and reliable solutions.

Site Info:
Online since:
The date the domain of this site was first registered.
Alexa traffic rank:
A measure of the site's popularity. The rank is calculated using a combination of average daily visitors and pageviews over the past 3 months. The site with the highest combination of visitors and pageviews is ranked #1.
Alexa traffic rank in US:
A measure of the site's popularity in US. The rank is calculated using a combination of average daily visitors and pageviews from users from US over the past 3 months. The site with the highest combination of visitors and pageviews is ranked #1 in US.
Unique monthly visitors:
The Unique Visitors metric only counts a person once no matter how many times they visit a site in a given month. Unique Visitors are typically used to determine how popular a site is.
3,776 ( Ranked 58 at HostMonk
Sites linking in:
Average load time:
Median website load time and percent of known sites that are slower.
1.974 Seconds, 67% of the sites are faster Ranked 55 at HostMonk
Site keywords:
List of top keywords of this website.
Opportunities, Partners Programs, Amazon Associates Program
Contact Info:
Twitter profile:
Name and description of the official Twitter profile of this company.
superbinternet (8502 followers)
"Your #1 web host since 1996 - w/ Data Centers across the US - Dedicated Servers, Managed Hosting, Shared Web Hosting, Domains!"
Ranked 8 at HostMonk
Physical address of this company.
999 Bishop St. #1850, Honolulu, HI 96813-4457, USA
999 Bishop St. #1850, Honolulu, HI 96813-4457, USA
Official phone number of this company.
Official email:
Official email address of this company.
Support email:
Support email address of this hosting provider.
Terms of service:
Link to the "Terms of service" page published by this hosting provider.
Status page:
Link to the status page of the various services of this provider.
User Reviews:
There are no user reviews for Superb Internet.
Blog posts
Recent posts from Superb Internet blog:
What Acai Berry & the Cloud Have in Common
Dec 19, 2014
This article will look at marketing hype that fuels misconception of the cloud. To get there, we will first look at what the technology has in common with a particular berry that has been a source of great, unbridled, loopy excitement for those in the natural food industry. We will progress as follows: Ambiguity & Marketing Jargon – Superfruits Money Falling from the Sky: False Cloud Advertising Ridiculous Imagery Studies & Perspectives – Citrix, Microsoft & Oracle Right terminology for a Transparent Cloud Ambiguity & Marketing Jargon – Superfruits If you are in the world of natural health, you are probably familiar with the term “superfruit.” We should not be surprised to see the acai berry at the top of a list of superfruits. The pomegranate also recently experienced a surge of popularity when it was realized that it was not simply a fruit but possessed strange powers, as with these other impossibly healthy fruits. The truth is that superfruit is a word that has been used in marketing and labeling but does not have a standardized definition used by science or government agencies such as the Food and Drug Administration (although many now consider the latter to be a...
Is Edward Snowden Right About Amazon?
Dec 17, 2014
Sure, it’s easy to dislike the dominant player in your field. They sneeze, and journalists scramble to collect the airborne discharge and analyze it. However, the power of the big dogs is often left unchecked. We see that in both the public sector and private sector, and sometimes in relationships between the two. In this article, we will look at the relationship between Amazon Web Services (AWS) and the Central Intelligence Agency (CIA), as follows: It Wasn’t Us: Red “Delete” Button Shoddy Intelligence: Cooking the Books on Torture CIA & Amazon: So Happy Together Is Amazon “Morally Irresponsible”? Partnering with a Company You Can Trust It Wasn’t Us: Red “Delete” Button The CIA’s publicity director has been having trouble keeping the brand’s sparkling reputation untarnished lately. A couple of leading legislators bolstered opposition to a CIA proposal, which goes something like this: “Hey, we’ve got a great idea to cut fat from the federal government’s data storage: get rid of our emails.” Julian Hattem reported in The Hill on December 1 that Texas Sen. John Cornyn, “the No. 2 Senate Republican,” had co-written a letter with Senate Judiciary Chairman Patrick Leahy of Vermont. The two senators crossed the aisles, shook hands, and...
Big Brother Down Under Demands Cloud
Dec 16, 2014
This report discusses the Australian federal government’s adoption of the cloud, as detailed by a December 9 article in The Australian (see source below). The Department of Education seems to be ahead of other governmental branches with cloudification: its entire ecosystem should be “cloud-ready” by 2019. Other government departments with huge IT budgets, including Health and Immigration, are progressively shifting to the cloud as well. We will cover these topics: Australia – 5-year Cloud-Readiness Plan Department of Education Department of Health Immigration and Border Protection Australian Taxation Office (ATO) Are You Cloud-Ready? Australia – 5-year Cloud-Readiness Plan Fran Foo of The Australian spoke with directors of major federal government agencies to determine the extent of their cloud adoption, essentially getting the answers to two questions: What portion of their systems were currently prepared for cloud migration? What portion of their systems would be cloud-ready by 2019? Most of the departments said that they were getting as much of their technology as possible ready for migration to cloud virtual machines and securely accessible on the web. The Australian government’s move to the cloud provides an opportunity for tech contractors to get agencies prepared for on-demand computing, moving IT systems from the...
2015 Cloud Forecast – The Thrill is Gone
Dec 15, 2014
This report, which looks at the cloud computing industry via an Information Age list of annual projections, includes the following sections: Overview – The Thrill is Gone Trend #1: SDN/NSV Adoption Trend #2: Location, Location, Location Trend #3: Platforms on the Rise Trend #4: Container Obsession Trend #5: Internet of Things & Widespread Hair-Pulling Key Takeaways – Speed and Security Overview – The Thrill is Gone Chloe Green reports in Information Age that location is becoming a major factor for the development of IT infrastructures. Cloud meets the obvious need of speed at a low cost, but Green sees the cloud becoming less nebulous as the way in which “it is tethered to the ground will matter more than ever.” In other words, the thrill is gone. Cloud isn’t fluffy anymore. It’s functional. Here are Green’s five specific trends: Trend #1: SDN/NSV Adoption Over the past few years, the telecommunications industry has increasingly used software defined networking (SDN) and network functions virtualization (NSV) to automate the delivery of their services. In the typical large company, though, traditional networking hardware such as switches, routers, and firewalls are commonplace. The game changer is that SDN and NSV are now being built in...
Survey: Running for Our Lives from Content Marketing
Dec 12, 2014
This report will look at how content marketing is changing the landscape within the content delivery network (CDN) industry. Our overview will contain the following components: Limelight: Content is King Kapost: No, Content is an Avalanche (help!) Forbes: 2014 State of the User Experience Limelight: Launching Products with Content Superb Internet: The Customers Are Right Limelight: Content is King We all know that content marketing is huge, but sometimes it helps to see things on the ground. 5000-foot views provide general illumination, but first-person accounts and examples serve as spotlights. To better understand the CDN market, Columbia University Professor Ava Seave conducted a couple of interviews of Limelight CMO Kirby Wadsworth for Forbes, one on driving sales and the other on the power of content marketing. The content marketing article is of particular interest since it is a relatively new and evolving concept that is making such a sweeping impact on business. Essentially, Wadsworth argues that the incorporation of content marketing into a CDN business (as in many other fields) allows “customers to be more successful,” which in turn improves the end-user experience. Below is a broad overview of content marketing, followed by an in-depth look at the role of...
Despite Considerable Kool-Aid Consumption, Security Heads for the Cloud
Dec 11, 2014
This article looks at cloud as the final frontier for security, exploring the topic as follows: CSO: 5 Ways Security Solutions Will Change Change #1 – Web as Network Perimeter Change #2 – SaaS Beats Out Endpoint Solutions: Swig of Kool-Aid Change #3 – Integration of Network and Endpoint Protection Change #4 – Transition from Alerts to Smart Use of Data Change #5 – Internet of Things Will Use Cloud Protections as Its Basis Superb Internet: Audited and Certified CSO: 5 Ways Security Solutions Will Change Security isn’t running away from the cloud but moving toward it. After all, the third platform (cloud, social, big data, and mobile) is where the action is. That’s the thrust of a message by Paul Lipman of iSheriff, who wrote in CSO magazine last week that the standard methods businesses have used for security in the past are “insufficient for modern businesses.” While the third platform continues to build and overtake the second platform (personal computers) as the primary means through which the Internet is used, across-the-board security systems can help companies to streamline their operations and scale effectively. Lipman argues that the current, highly disruptive state of technology – led by red-hot segments...
Cloud Mythos & Deception: 5 More Provider Fibs
Dec 10, 2014
This article is a follow-up to a companion piece about misleading statements that are made during the sales and marketing of cloud products. We will cover the following topics: Review: Who Can We Believe? 5 Other Common Cloud Lies Conclusion: Peace-of-mind in the Cloud Review: Who Can We Believe? When we previously looked at lies told to potential customers during the cloud sales process, we mentioned that some providers have allowed the proliferation of certain misunderstandings that benefit the adoption of their technology. Marketing material can sometimes include preposterous claims, but the most likely situation in which you will hear half-truths is one-on-one with a salesperson. Those individual interactions aren’t carefully vetted by the company and offer a shady organization an opportunity to displace responsibility. Marketing has become more complex these days as well, though, as evidenced by the source material for this pair of pieces: a December 2nd article from ForbesBrandVoice. This portion of the Forbes website runs through the Google News feed even though it’s marketing material, in the process discrediting the Forbes brand (after all, if they are presenting advertisements as news, then who’s to say their “legitimate content” doesn’t also fall within the advertisement category?). Nonetheless,...
Cloud Mythos & Deception: The 5 Biggest Fibs Told By Providers
Dec 09, 2014
This report looks at common fabrications perpetrated against consumers of cloud services. We will proceed with the following sections: Introduction: Fantastical Sales Messages You Can’t Trust Anyone These Days 5 Biggest Cloud Lies Conclusion: Cloud Without Confusion Introduction: Fantastical Sales Messages Many cloud service providers (CSP’s) have taken advantage of the confusion surrounding the cloud to build a bogus mythos around the technology. That’s clear sometimes in misleading marketing strategies, but it’s most obvious in the way that salespeople talk directly to potential customers. As we all know, when a 100% commission sales guy has to eat, he will say the darndest things! Of course, lies proliferate in seedy environments characterized more by cash-grabbing than relationship development. You Can’t Trust Anyone These Days Here’s the funny thing: our source material – the place where these top lies were initially suggested – is itself a hotbed of deception, where we must always watch our footing so that we don’t sink into the quicksand of marketing blather. I have made fun of Forbes?BrandVoice in the past for watering down the credibility of the Forbes brand, making it difficult to differentiate between subjective marketing articles and objective news reports. However, Forbes is just...
2015 Enterprise Tech Trends – Endpoint Security & Machine Learning
Dec 08, 2014
This report looks at the developing enterprise tech landscape – practices and systems that are becoming more widely adopted, prevalently enough to be considered business trends. We will proceed with the following sections: Introduction: Additional 2015 Trends Endpoint Security Advances for Better Protection Machine Learning for Intelligent Automation Devops for Increased Agility Nixing Network Switches for Streamlined Systems Conclusion: Open Source Theme Guaranteed Open Source Cloud VPS. Introduction: Additional 2015 Trends In our most recent article, we explored several ideas from a list of 2015 trends compiled by InfoWorld editor Eric Knorr, summarized as follows: Infrastructure as a service – Companies have started to realize that due to the rate of cloud advances, it makes sense to choose a provider over an internal datacenter. Containers – Docker has created an easy-to-use system that makes it much faster to move applications from development to testing to production, or between clouds. Microservices architecture – The ability to use microservices, simple applications meant to fulfill specific needs within more complex applications, was also given a huge boost by Docker. Liquid computing – This concept, first introduced by InfoWorld’s Galen Gruman, refers to the ability to move seamlessly between one’s different devices, as with...
2015 Enterprise Tech Trends – Containers, Microservices & Liquid Computing
Dec 05, 2014
The world of enterprise tech is changing rapidly. A list of top trends by Eric Knorr of InfoWorld indicates just how quickly the landscape is adjusting: many of the technology practices and systems that started to become prevalent in 2014 were hardly noticeable in 2013. Knorr thinks a great deal of those technological advances are here to stay, “which indicates a pace of change that’s much quicker than usual.” Here are the top enterprise technological shifts, according to Knorr (released December 1). They can be compared to the Computerworld predictions that were featured in our last post. Let it be known now that enterprise use of federally funded, algorithmically controlled drone bots has again not yet become trendy enough to make the 2015 list, but perhaps next year. 1. Cloud Providers More Sophisticated The way that private cloud is commonly understood is as a system that is created with its own specific infrastructure for one organization (versus public, in which many different companies are accessing one vast network of virtualized processing power). Knorr instead speaks of these two different varieties of cloud in terms of their location: private as “on premises” at a company, and public as provided through a...
Decree: Cloud, Analytics & Security Will Dominate 2015
Dec 05, 2014
Well, it’s that time of year again, folks. No, I don’t mean the Holiday Season. And no, I don’t mean the Consumer Confidence Season. I mean the Trend List Season. Every year, experts stick out their necks from every hill and dell to let us know that the industry is changing. The lists are often a little redundant, both of the concurrent offerings and of all the trend lists written the year before. However, these mini-reports on the industry are actually incredibly helpful. They at least encompass the major, developing points of focus for the industry. Because the lists are typically created by independent parties, the blogosphere and social media have generally objective fodder for conversation. Forbes’ Louis Columbus just wrote a piece that was published Wednesday, summarizing the Computerworld 2015 predictions from its Forecast Study 2015. Let’s look at the key findings from that report. What’s Ahead for the Cloud Computing World Major areas of investment for business are a trio: cloud technology, big data analytics, and security. Other essential elements of the third platform, mobile tech and social media, will continue to grow rapidly as well – although the latter does not fall under the umbrella of this...
Jetstream Research Cloud Soars with $6 Million Award
Dec 02, 2014
This article looks at a multimillion-dollar grant awarded to Indiana University (IU) for the creation of an academic research cloud, after first exploring IU’s relationship with supercomputers. It covers the following topics: Big Red II: Supercomputers Versus Cloud Jetstream: Jet Packs for Research Superb Internet: Cloud Sans Confusion Big Red II: Supercomputers Versus Cloud Indiana University is well-deserving of research funds in the area of cloud computing. The institution is a center for high-speed information technology. Its Bloomington headquarters is the home of Big Red II, a supercomputer that is theoretically capable of 1 petaFLOP, equivalent to 1000 trillion floating-point operations per second. It is one of the most high-performing research supercomputers on the planet, and it helps researchers in diverse university departments – including medicine, fine arts, and global climate research – access information more quickly, and process big data more seamlessly. I often reference the case of Indiana University because its leadership is clearly interested in supercomputing but advocates the cloud as well. Geoffrey C. Fox, PhD, who serves as the associate dean of research at IU’s School of Informatics & Computing and directs its Digital Science Center, told the Association of American Medical Colleges (AAMC) last year...
Is Your Organization Moving to the Cloud? No, Your Data Is.
Nov 24, 2014
In order to talk about tech concepts, as with any field, we have to come up with overarching terms. Although those terms might be helpful to simplify everything into an easily understandable structure, it can sometimes trick us into oversimplification. Marketers also have a vested interest in convincing us that technology is fast, easy, and straightforward: in other words, “Don’t worry about it, kid.” One such example is cloud computing or simply the cloud. Although the term cloud is a nice refreshing one-syllable nugget of language, the products delivered through the virtualized model – including software, infrastructure, and platforms – can create complications and disruptions in the monitoring of data; access and authorization; and deployment of new systems. The reason, says Richi Jennings in Forbes on November 19, is that “Data doesn’t like to move.” In the report, Jennings describes how he feels that savvy CIOs are developing competitive advantage for their companies by serving as brokers of IT services. IT to Drive your Competitive Edge Business is moving faster than ever, and as more businesses become interconnected workspaces or globally integrated enterprises, the entire way we conceive of business practices must be adapted. Switching to groundbreaking technologies is one...
Six Hours of Downtime: Is the Tag #AzureFAIL or #AzureTITSUP?
Nov 20, 2014
? Microsoft suffered a major failure starting at 00:52 GMT on November 19. The incident sparked at least one funny headline in the popular press, with London’s The Register calling the worldwide outage of Azure a “TITSUP cloud FAIL” – a turn of phrase using military slang that abbreviates a Total Inability to Support Usual Performance. The opinionated Register report described global users of Azure storage, cloud servers, SQL databases, and directory service Active Directory as “sucker-punched” by the incident. Azure Meltdown News reporters obviously do their best to be objective, but this outage should be considered unacceptable from an organization that charges a premium for its reputation and reliability. Faults that occurred within Azure effectively shut down thousands of independent websites and made parts of Microsoft’s own site inaccessible. An official statement from Azure notes that the errors were experienced worldwide. The corporation’s systems in Europe experienced longer downtime than anywhere else. Two of the computing company’s top services, Office 365 (business applications) and Xbox Live (interactive game platform) were disrupted. Undoubtedly, this massive failure will not help with Azure sales. As the BBC reports, Microsoft – like IBM and Google – is trying to oust AWS from the...
Earth to Cloud: AWS is Not “Winning” the Race to Zero
Nov 20, 2014
Sometimes it seems that large tech news sites would rather discuss Amazon, Microsoft, and Google – profiting off the name recognition and staying on universally comprehensible ground – than make sense. A well-framed and assumedly well-intentioned article in Business Insider named some rather ridiculous front-runners in the as-a-service market’s “race to zero.” Julie Bort explained the general scenario aptly on November 9: the cloud sector is so incredibly crowded that the prices keep getting lower and lower. Meanwhile, resource thresholds on typical plans continue to increase. Actually the term race to zero has been around at least since December 2010, and it is a little more complicated than affordability. Joshua Geist of recovery-as-a-service (RaaS) firm Geminare coined the term and defined it as “the time when commodity pricing is driven so low that the only way to drive continued market value is by focusing on the value over and above the core commodity offering – the applications the commodity enables.” He elaborates that as this process occurs, gradually applications start to trump the supportive backend. That shift in turn leads to widespread acceleration within the industry (i.e. more businesses using the cloud and investing in it more substantially). Why the...
Study: Business is Not Properly Securing the Cloud
Nov 18, 2014
A study conducted by SafeNet Research and the Ponemon Institute demonstrates the struggle ICT (information and communications technology) personnel experience with security in cloud environments: Computing professionals are having a hard time with cloud data oversight, with two out of five distributed virtual systems managed by third parties. Enterprises don’t have one unified “single point of accountability” for protection of their multi-cloud environments. Safeguards that have worked in traditional infrastructures are challenging to deploy in cloud settings, so firms are using multi-factor authentication and various encryption tactics. Most IT executives do not have comprehensive details on the information security of cloud architectures, a blind spot that has created an area of vulnerability for sensitive data. A study funded by the data protection firm SafeNet and conducted by the Ponemon Institute arrived at that disturbing conclusion after polling almost 2000 IT decision-makers around the globe. The study determined that firms are getting more of their operational power from “as a service” cloud plans than ever before, and IT personnel are not able to control the applicable data as well as they would like. Less than two out of every five companies (38%) have policies in place that establish titles and responsibilities to...
Bring Your Own Disgruntlement: the New Meaning of BYOD
Nov 15, 2014
This article will cover the following: Introduction – BYOD vs. BYOB Bring Your Own Platform Bring Your Own Disgruntlement Atmosphere of Honesty Welcome to On-Call Nation Conclusion – Plug BYOD Leakage Introduction – BYOD vs. BYOB Bring your own device sounds innocuous enough. Typically shortened to BYOD, it’s the computing version of BYOB. Sure, in many cases you have to foot the cost of the phone yourself, and no one likes that. However, you have the freedom to choose whatever phone you want, just like you can bring whatever beverages you want to a BYOB party. That’s typically where the analogy ends. After all, we aren’t talking about beer here. We’re talking about mobile devices that collect big data based off our use. More than that, we’re talking about a blurring of the line between business and personal. Workers have had enough. Bring Your Own Platform I have referenced the rise of the third platform – especially as it’s expressed via Mark Neistat for the computing professional association Technology First – repeatedly in this blog. The report describes the third platform, considered to be the next major computing environment following a 20-year reign by personal computing, which was in turn...
Big Data is Wild, and Washington Wonks Want to Set It Free
Nov 14, 2014
This article will cover the following: Introduction – Big Data Role & Skepticism Third Platform Poker – Big Data is Wild Big Data Versus Underground Railroad – Skeptic’s Corner Conclusion – Let’s Be Careful Introduction – Big Data Role & Skepticism Big data, like “cloud,” is kind of a stupid term, but, well, it’s what we have to work with. By the way, if you ever need a definition of big data, don’t trust anyone who doesn’t include either the word humongous or gargantuan in their description. The word massive simply isn’t extreme enough to befit the scope of this treasure trove of computing information. It is not small or average in size. Now that I’ve gotten that out of my system, let’s look at big data within the context of the third platform, what Mark Neistat of US Signal Company calls “the next phase of the IT revolution.” Then we can explore a November 7 Slate piece that questions the wisdom of collecting every possible piece of information (on a personal level, regardless the benefits for government and industry). Third Platform Poker – Big Data is Wild Neistat describes the third platform (which I discussed previously in this blog),...
Worldwide, Systemic Disruption Accompanies 3rd Platform
Nov 11, 2014
Research firm IDC (International Data Corporation) released its projections last December for the development of the ICT (information and communications technology) market in 2014. The forecast was shaped considerably by the rise of the third platform (a.k.a. the 3rd platform), which represents a new phase of computing based in part on rapid-fire processing. The platform is an amalgam of mobile device access, distributed virtualization (a.k.a. cloud), predictive analytics (i.e., big data), and social media. As noted previously in this blog, Mark Neistat of cloud provider US Signal Company explored the topic of the third platform on behalf of professional association Technology First in May 2013. Here are three key characteristics of the platform from his perspective: Virtual & Lightweight – The third platform, which started to emerge in about 2005, followed a twenty-year reign for the second platform, the PC (personal computer), which in turn was preceded by the original platform, mainframe computing. Business Anywhere – Of the four technologies that compose the third platform, the most fundamental – or as Neistat calls it, “the biggest plank” – is mobile device access. Analytics, cloud, and social networking are all performed within mobile environments. The New Normal – Tablets, cell phones,...
Third Platform Will Cause Havoc in Business
Nov 09, 2014
Introduction – Smashing Timeworn Paradigms We are now entering the age of the third platform. Famed 19th-century philosopher Friedrich Nietzsche once wrote that when our intellect “smashes, jumbles, and ironically reassembles [the conceptual] framework, pairing what is most foreign and separating what is closest, it reveals that it has no use for such makeshifts of need and that it will no longer be guided by concepts.” We must be careful not to follow that format when transitioning to the so-called “third platform” of computing (defined and described below). Let’s not crush anything, and let’s certainly not construct our new environments ironically. Although Nietzsche’s comments may not be relevant to conscientious computing transitions, they came to my mind on the topic of the third platform because of the extent to which it is effecting disruption throughout the business world. Third Platform – Trending #hereitcomes In a report published December 2013 (explored in this blog previously), research firm IDC forecast that 2014 would be a year in which the third platform (or the “3rd Platform,” as IDC and computing professional association Technology First call it) – which encompasses the use of mobile devices, cloud technology, predictive modeling and analytics, and social media...
Information sources: Alexa Jigsaw