Tagged - Apple

Jamf's Year of Subverting Unified Endpoint Management

Jamf has had a busy year improving and expanding its product. It’s convincing many organizations to avoid the siren song of unified endpoint management.

Apples Are No Longer on the Menu: Apple's Move to Clean up Its App Store

Apple is enforcing a clause in its App Store terms of service that will result in the ban of templated apps. Be prepared to focus on an improved mobile browsing experience...

Case Study: HHS

The influx of consumer devices has brought along a variety of potential security risks through the consumer applications that end users have on their devices. Hamilton...

Special Alert: Interpreting Google's MOT Move

A great number of electrons have been accelerated in describing Google's move to purchase Motorola Mobility Holdings for about $12.5B. During a dinner I shared with MS...

BlackBerry PlayBook: First Look

The PlayBook is in the unfortunate position of having a lot of potential while its competitors, or at least competitor, have already reached theirs. It leaves a mixed first...

The iPad 2: Apple's Magic Tablet Continues Enterprise Domination

The iPad 2 doesn't have any revolutionary new business features, but its cameras, in addition to increased comfort and speed, provide an incremental benefit to the already...

The Impact of Shared Devices

A friend of mine gave the gift of a new Kindle for Christmas. Being the thoughtful type, he told the recipient he would leave it on his own Amazon account, and that she...

Faking ROIs, Warping Markets

This week, after 15 years of being either one thing or another, Salon.com announced that it was up for sale. According to its SEC filing, the firm showed $1.4 million in...

Globe and Mail - Do iPhones have what it takes?

(22-Nov-10) When Apple launched the iPhone in 2007, information technology experts declared it unsuitable for business use – not least because of security...

Personal Mobile Device Remote Wipe Waiver

Developing and enforcing a personal mobile device acceptable use policy is critical to maintaining corporate network security. Use the Personal Mobile Device Remote Wipe...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us