Pixar is looking for a good Mac nerd to join its support team.
If you’ve ever dreamed of working for one of the most iconic animation companies in the world, but don’t have any actual animation skills, this might be your best chance.
Pixar is looking for a good Mac nerd to join its support team.
If you’ve ever dreamed of working for one of the most iconic animation companies in the world, but don’t have any actual animation skills, this might be your best chance.
This post is brought to you by VMware AirWatch.
Let’s face it: Asking a person to carry around two devices all the time, one for work and one for play, is just inefficient. When organizations implement overbearing management or ignore privacy concerns, they almost force users to carry a device for work and a device for personal use.
While a few employees may enjoy the air-gap separation of church and state, most people buckle under the stress of having two separate devices to potentially forget in a cab or leave on the airport bathroom sink (true story!).
This post is brought to you by VMware AirWatch.
If you know what the word “containerization” means, you probably work in IT (or you’re tech-savvy and adventurous enough to run afoul of your IT department on a regular basis). Containerization is the method of securing a device for corporate use by putting a part of it behind some type of authentication — without managing the actual device.
It’s a common practice in the corporate world, especially for bring your own device (or BYOD) environments, because containerization is often viewed as more lightweight than mobile device management, aka MDM. Users also may assume that MDM is overly intrusive and that containerization is a good compromise.
However, many of these issues are already solved for iOS. By leveraging Apple’s built-in privacy protections, AirWatch allows IT departments to preserve the native device experience while protecting corporate data.
Thinking about a new career in IT management and security, but not sure where to start? We’ve made it easy. This bundle from iCollege packages together four essential certification courses that train you exactly on what you need to know. Get it for $59 at Cult of Mac Deals today—at 94% off, a deal this good doesn’t come around often.
While many Apple fans and IT professionals that support iOS devices in the workplace are eagerly awaiting tomorrow’s Apple announcement, a group of Apple in the enterprise experts are meeting at MacSysAdmin 2012 – a conference for European IT professionals tasked with managing Macs and iOS devices in business, education, and other workplace settings. The annual conference traditionally posts videos of its sessions online for free (as does the Penn State MacAdmins Conference that was held in the U.S. this spring).
That isn’t the only major conference for Mac and iOS IT professionals, however. October brings two other major events (one of them free) and there are a number of excellent smaller events scheduled throughout the fall.
With the release of iOS 6, Apple will offer business users a range of new features. A few of which are VIP email filtering (already in Mountain Lion) with custom notifications, more options when declining a phone call on the iPhone, much-needed privacy options, and Apple’s new Do Not Disturb feature – which should help some mobile professionals to “switch off” after work and maybe even get a good night’s sleep.
iOS updates are generally designed to be user-friendly and easy enough that anyone can manage to install them. As with any major OS or business critical software upgrade, however, there may be unforeseen issues with iOS 6 – particularly when it comes to internal iOS apps and iOS access to enterprise systems.
An iOS 6 upgrade policy and strategy is something that every IT department should have in place before Apple releases iOS 6. For businesses that actively support user devices in the workplace through a BYOD (bring your own device) program, that upgrade strategy is even more critical.
One of the first secure business solutions for the iPhone and iPad was Good for Enterprise, a secure collaboration tool that allows companies to separate business email, calendar, and contact systems from Apple’s standard Mail, Calendar, and Contacts apps. Going beyond simply separating work accounts and data from a user’s personal accounts, Good’s alternatives securely encrypt all data and must be unlocked using credentials other than the passcode used to unlock an iOS device.
Good released a significant update to Good for Enterprise this week, one that makes the solution more streamlined, user-friendly, and offers powerful new features – some of which are worth considering for their business functionality as well as their innate security.
It’s been over two years since Apple unveiled iOS 4 with mobile management features designed to make the iPhone and iPad a significantly better corporate citizen. During those years, the landscape of business and enterprise mobility has changed dramatically. RIM has collapsed and will never truly recover, Microsoft has doubled down on the interface it launched late in 2010 with no guarantee of success, and Android has become much more enterprise friendly. Perhaps more important is the fact that idea of mobile management and security has shifted from a focus on devices to a focus on securing data and managing mobile apps.
As all this has happened, Apple’s mobile management framework, which is the system that all mobile management vendors plug into in order to secure and manage iOS devices, has essentially stagnated. With iOS 6 on the horizon, lets look at the areas that Apple needs to address if it wants iOS to remain one of the preferred mobile platforms for business.
VMWare announced the newest version of VMWare Fusion, its Mac virtualization product, this week. In doing so it also launched its first business or enterprise version of the popular tool for running Windows and other operating systems on Mac workstations. Dubbed Fusion Professional, the new solution has a range of features that are likely to appeal to IT professionals in both business and education.
Many school districts around the country are embarking on new territory this back to school season – deploying hundreds or thousands of iPads to students. Most of the deployments will be one-to-one initiatives where every student receives a school-owned iPad to use for this school year or their entire scholastic career. Planning such a roll out isn’t easy, but schools and districts making the shift this year have the advantage of looking what worked and didn’t work from counterparts that pioneered the iPad in the classroom last year.
One school district, Lexington County School District One of South Carolina, has served as a model for many other schools around the country. The district offers a lot of insight into the technical requirements, education policy issues, and roll out processes in such a colossal undertaking.