686.8 KB | 3 files | PDF, DOC
"iPhone at Work: Increasing Productivity for Busy Professionals" is a book that shows you how to become much more efficient and productive at work. This excerpt contains all of Chapter 6, which focuses on using work e-mail with the iPhone; and part of Chapter 9, which focuses on Microsoft Exchange.
The iPhone is cool, and the iPhone is fun, but the iPhone also means serious business. For those of you who bought your iPhones to help get your lives organized and free yourselves from the ball and chain of desktop computing. "iPhone at Work: Increasing Productivity for Busy Professionals" is a book that shows you how to complete all the traditional smartphone tasks, like to-do lists, calendars, and e-mail, and become much more efficient and productive at work. You'll learn mechanisms for developing effective workflows specific to the features of the iPhone and also efficient strategies for dealing with the specialized aspects of business and professional lifestyles.
From the introduction and throughout the book, author Ryan Faas targets professional users of the iPhone. You'll tour the built-in applications and configuration options, always with work and productivity in mind, and discover all of the enterprise features of the iPhone, learning how to configure and use each one.
This book excerpt contains the entire Chapter 6, which focuses on using work e-mail with the iPhone; and part of Chapter 9, which focuses on Microsoft Exchange.
The attached Zip file includes:
In this excerpt, Dr. John R. Patrick explores how cultural attitudes toward consumer-initiated health care are changing and how technology is enabling this transition. ... More >>
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use. ... More >>
The purpose of this document is to help organizations understand the process for vetting the security of mobile applications, plan for the implementation of an app vetting process, develop app security requirements, and understand the types of app vulnerabilities and the testing methods used to detect those vulnerabilities. ... More >>