Challenged by the deployment of Apple iPads in your enterprise? It's not surprising when Gartner estimates that media tablet sales reached 19.5 million units in 2010, driven by sales of the iPad. Media tablets and the iPad will fuel even faster growth in the category of mobile PCs, already 55 percent of industry shipments in 2009 and forecasted to reach 70 percent by 2012, according to Gartner.
As a result, many Fortune 2000 enterprise CIOs and SMB IT directors are caught reacting to the immediate need to integrate Apple iPads and iPhones for mobile executives and sales teams.
Charles Edge, director of technology for 318, Inc., a technology IT consulting and development firm, has authored a new book entitled Enterprise iPhone and iPad Administrator's Guide, which focuses on securely integrating Apple in the enterprise.
“The difficulty of securely and efficiently deploying Apple in the enterprise is that IT teams in most organizations are more familiar with deploying Microsoft solutions,” said Edge. “Even something as basic as opening a Microsoft Word document stored on a server, changing it on the iPad and saving it back to the server cannot be done out-of-the box. Unfortunately, the timelines for most IT organizations are such that they need to have mass integration done yesterday.”
This slideshow highlights how 318’s team is advising clients who are trying to bring iPads and iPhones into enterprise environment.
12 Best Places to Work in 2010 Glassdoor.com names the 12 best tech places to work.
10 Hot Windows Phone 7 Business Apps 10 of the most downloaded apps for Windows Phone 7.
Top 10 Tech Trends to Watch in 2011 According to CIOs, CTOs Logicalis highlights the top tech trends for 2011.
Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ... More >>
Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ... More >>
Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ... More >>