?
Solved

Statistics on age of business pcs

Posted on 2004-10-15
2
Medium Priority
?
229 Views
Last Modified: 2012-05-05
Hi Experts

Can anyone point me in the direction of any recent statistics on the age of PCs used in US businesses? I want to rule out a couple of factors in the execution performance of some software.
0
Comment
Question by:metalaureate
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 13

Assisted Solution

by:Caseybea
Caseybea earned 400 total points
ID: 12326011
While I have not seen anything in WRITING---    in many businesses I have been exposed to that do ANY sort of life-cycling of computer hardware, the typical lifetime for business PC equipment is 5 years.    Some recycle and get new gear after 4 years-- some at 6.  
0
 
LVL 14

Accepted Solution

by:
tmj883 earned 1600 total points
ID: 12326104
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
New style of hardware planning for Microsoft Exchange server.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question