POPULARITY
Joe Mach, CEO of North America at Castles Technology, reveals how this fourth-largest player in payment terminals has captured massive market share while flying under the radar. Their secret? Over 60% of everything they sell doesn't bear their name - it's white-labeled for partners who trust them enough to put their own brands on the technology.Castles' success stems from their deep technical expertise and customer-first approach. Based in Taiwan ("Technology Island"), they innovate faster than legacy providers, delivering not just hardware but comprehensive solutions tailored to specific industry challenges. Their movement from basic terminal management to true Mobile Device Management capabilities enables remote troubleshooting, geofencing for security, and even AI-powered predictive maintenance.Looking forward, Mach identifies three transformative trends: the rising influence of specialized software vendors, seamless integration of AI with payments, and the emergence of SoftPOS technologies on consumer devices. These innovations address the expectations of younger consumers who simply won't tolerate friction in their shopping experiences.As an "accidental CEO" who rose through sales and commercial roles, Mach's leadership philosophy centers on growth - not just for shareholders, but as a vehicle to create opportunities for employees. Listen now to discover how Castles Technology is transforming the payment landscape for merchants of all sizes.
The MacVoices Live! panel looks at who the reports of the M4 chip's problems with virtualization affect and why. Microsoft is in the crosshairs of a new FTC look into Microsoft's business practices, and Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Eric Bolden, Jeff Gamet, Marty Jencius, Jim Rea, and Web Bixby share some of their experiences with products that are the focus of the investigation. Then we transition into a discussion of Mobile Device Management by both Apple and Microsoft and what they mean if you are using a machine owned by your employer. This edition of MacVoices is brought to you by our Patreon supporters. Support the show and get access to the MacVoices Slack and Discord aw well as MacVoices After Dark by joining in at Patreon.com/macvoices. Show Notes: Chapters: 00:05 Introduction to Mac Voices04:47 Virtualization Challenges with M4 Chip14:24 Microsoft and FTC Investigations20:29 Mobile Device Management Insights Links: M4 Macs can't run virtual machines with older versions of macOS https://9to5mac.com/2024/11/18/m4-macs-virtual-machines-macos/ UK consumer rights group sues Apple for maintaining an 'unlawful' iCloud monopoly https://www.macrumors.com/2024/11/13/apple-releases-final-cut-pro-11-for-mac/ Microsoft May Face FTC Investigation Over Azure https://www.pcmag.com/news/microsoft-may-face-ftc-investigation-over-azure Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
The MacVoices Live! panel looks at who the reports of the M4 chip's problems with virtualization affect and why. Microsoft is in the crosshairs of a new FTC look into Microsoft's business practices, and Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Eric Bolden, Jeff Gamet, Marty Jencius, Jim Rea, and Web Bixby share some of their experiences with products that are the focus of the investigation. Then we transition into a discussion of Mobile Device Management by both Apple and Microsoft and what they mean if you are using a machine owned by your employer. This edition of MacVoices is brought to you by our Patreon supporters. Support the show and get access to the MacVoices Slack and Discord aw well as MacVoices After Dark by joining in at Patreon.com/macvoices. Show Notes: Chapters: 00:05 Introduction to Mac Voices 04:47 Virtualization Challenges with M4 Chip 14:24 Microsoft and FTC Investigations 20:29 Mobile Device Management Insights Links: M4 Macs can't run virtual machines with older versions of macOS https://9to5mac.com/2024/11/18/m4-macs-virtual-machines-macos/ UK consumer rights group sues Apple for maintaining an 'unlawful' iCloud monopoly https://www.macrumors.com/2024/11/13/apple-releases-final-cut-pro-11-for-mac/ Microsoft May Face FTC Investigation Over Azure https://www.pcmag.com/news/microsoft-may-face-ftc-investigation-over-azure Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Zastanawiałeś się dlaczego na smartfonie
In this episode of Business Ninjas, host Andrew Lippman sits down with David Kinlough, Head of The Solution Business Division at Samsung SDS America. As a leader in the tech industry, Samsung SDS is at the forefront of digital transformation, driving innovative solutions that are reshaping the way businesses operate.David shares insights into how Samsung SDS is leveraging cutting-edge technologies like AI, IoT, and cloud computing to deliver tailored solutions for their clients. We explore the challenges and opportunities in the rapidly evolving tech landscape and how Samsung SDS is helping businesses stay ahead of the curve.From enhancing operational efficiency to driving customer engagement, this episode is packed with valuable information for anyone looking to understand the future of business technology.
As reliance on these devices grows, the importance of managing and securing them has become paramount for businesses and organizations of all sizes. In this context, the pivotal importance of Mobile Device Management is evident.
Technology has become a weapon for perpetrators of abuse. And, in our digitally intertwined lives, cyber forensics has become an essential step in almost all aspects of criminal investigation, particularly cases involving child exploitation and family violence. Cyber forensic expert, Rose MacDonald, has made it her life's mission to combat this insidious form of abuse. Her work ensures the complex process of evidence preservation of spyware-infested devices and encrypted apps brings these offenders to justice. This episode contains references to intimate partner violence, coercive control, and child abuse, for support, dial 1800 RESPECT on 1800 737 732. See omnystudio.com/listener for privacy information.
Weldon Dodd, Senior Vice President of Kandji, joins us to discuss why mobile device management (MDM) has become so important in the enterprise, and their new partnership with ServiceNow. Weldon covers why Kandji is an Apple-focused MDM provide and this partnership that will help streamline how their team interacts with IT departments as well as front-line Apple device users. Today's MacVoices is supported by Backblaze. MacVoices listeners get a fully featured no risk free trial at Backblaze.com/macvoices. Go there, play with it, start protecting yourself from potential bad times! Start Today! Show Notes: Chapters: 0:00:00 Introduction to Kanji and New Partnership 0:03:55 Factors Impacting Mobile Device Management 0:07:57 Focus on Apple Devices and User Experience 0:13:47 Integration with ServiceNow and Asset Management 0:23:30 Impact of Automation on IT Departments 0:27:13 Balancing User and Admin Needs in Updates 0:27:46 Where to Learn More about Kanji and Partnership Guests: Weldon Dodd is Senior Vice President at Kandji. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Sebastian Taphanel has spent his life on the cutting edge of technology and innovation. This week on Tech Transforms, Sebastian is sharing tales and lessons learned from his 20 years in DoD Special Ops and intelligence and 20 years implementing sound security engineering practices focused on implementing zero trust and highly resilient environments. Join Sebastian as he recounts his time in Special Forces taking his units out of the dark ages from secure fax communications to setting up an intranet, and how he continued with that innovative spirit through his 40-year career. He also shares his new passion, encouraging the industry to utilize disabled veterans to help fill both the cybersecurity and AI workforce gaps. They, after all, already have a call for the mission.Key Topics03:38 ODNI CIO responded quickly with Microsoft Azure.07:03 Protecting data via application container, expanding capabilities.11:01 Zero Trust redrawn cybersecurity model, data-centric approach.13:57 Developing zero trust plan for downstream organizations.18:50 Ensuring security while sharing information and protecting IP.21:35 APIs, containers enable fluid, flexible data access.24:20 Data protection systems allow secure sharing and storage.27:02 Addressing cybersecurity workforce gap and AI need.29:39 In 1998, new commander requests secure WAN.33:49 Applied for certified protection professional, highest security certification.36:28 Passionate about supporting disabled vets in cybersecurity.39:55 Mentoring government employees for cybersecurity and AI/ML.45:32 Using advanced generative AI solutions for copywriting.47:19 Update cybersecurity tools and systems for new threats.49:50 Respect for those dedicated to automation.Enhancing Secure Communication and Cloud Environments in Special OpsSpecial Ops Agility: Adapting to Remote Collaboration with Secure Cloud-Based WorkspacesSebastian Taphanel's experience spans twenty years in DOD Special Ops and Intelligence, followed by consulting in security engineering. The focal point of this episode is his role in advancing cybersecurity practices at the ODNI. Particularly emphasizing resilient cloud-based environments.Sebastian describes the quick adaptation during the pandemic which led to the rollout of an ad hoc cloud-based workspace to ensure the ODNI's mission could endure despite the workforce being remote. GCC High, or Government Commercial Cloud High as conceived by Microsoft, is revealed as the successor to the initial setup. Providing a more secure platform managed strictly by U.S. persons. The approach highlighted the agility of cloud technology for remote collaboration within federal agencies.Cybersecurity in Intelligence Sharing: "Essentially, reciprocity is a process and also a culture of accepting each other's risks. And that's really the bottom line on all that." — Sebastian TaphanelUnfolding the GCC High EnvironmentThe intricacies of implementing Microsoft Azure and M365 (Office 365) are detailed as Sebastian underlines their pivotal use in creating an intranet with controlled document sharing and editing. These implementations include robust Mobile Device Management. Then a BYOD Mobile Application Management system that protects sensitive data in government and personal devices. Thereby, ensuring operational security and flexibility.Special Ops Communication EvolutionSebastian advanced from using secure faxes for interstate communication within military units to establishing a multi-state secure WAN. This resulted in a significant leap in communication efficacy for special operations. Sebastian shared the...
Greetings and Welcome to another Potentially Useful episode of the TCAPSLoop Podcast. TCAPS Executive Director of Technology, Evan O'branovic is about to cover dangerous terrain like a digital Bear Grylls. On todays episode our unflinching guide will lead us through the edtech thicket that is Mobile Device Management to the promise land of iPads and chromebooks living together in the same tech ecosystem. Moment of Zen: “Never fear quarrels, but seek hazardous adventures.” ― Alexandre Dumas The Rundown: What is an MDM and why is it important? How has Mosyle changed our Technology Departments attitude about iPads Mobile device vs. Laptop/Chromebook What should you look for in an MDM? Please rate and review the podcast on your app of choice and leave us a comment on LinkedIn, Twitter, Facebook, or Instagram Thank you so much for listening and inspiring! Hosts: Evan Obranovic, Larry Burden Um and Ramble Editing: Larry Burden Cover art created with help from Adobe Firefly.
Podcast: ICS Pulse PodcastEpisode: Ep. 39: Dom Lombardi on Mobile Device ManagementPub date: 2023-12-19As more people work from home and use their own devices, the threat landscape is increasing exponentially. Your networks should never go down because someone wants to watch their personal Netflix account. On this podcast, Dom Lombardi of Kandji discusses why mobile device management is necessary, why security needs to understand business goals and how to move slowto go fast.The podcast and artwork embedded on this page are from Industrial Cybersecurity Pulse, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: ICS Pulse PodcastEpisode: Ep. 39: Dom Lombardi on Mobile Device ManagementPub date: 2023-12-19As more people work from home and use their own devices, the threat landscape is increasing exponentially. Your networks should never go down because someone wants to watch their personal Netflix account. On this podcast, Dom Lombardi of Kandji discusses why mobile device management is necessary, why security needs to understand business goals and how to move slowto go fast.The podcast and artwork embedded on this page are from Industrial Cybersecurity Pulse, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Welcome back to another exciting episode of Data Center Therapy, where the digital device management seas are stormy but the DCT deck crew are always ready for a challenge! While Matt ‘Hard to Starboard' Cozzolino is out on PTO this week, your reliable and experienced Captain, Mr. Matt ‘Engines Steady at Quarter Impulse' Yette welcomes IVOXY End User Computing Consultants Mr. Ryan ‘Magnum VDI' Grelck and Mr. Aaron ‘Active Directory Animal' Hagman to the virtual DCT studios, for a chat about all things Microsoft Intune. In this episode, you, our adventurous listeners, will get to hear about: What Microsoft 365 traditionally encompasses and how offerings beyond M365 integrate into the usual core technologies (Exchange, Sharepoint, OneDrive and Teams). How Microsoft Intune can be helpful for hybrid work and remote/travelling sales teams, and how SCCM relates. Mobile Device Management, including some old stories of MobileIron, and what Intune is capable of doing for the new corporate end user's experience and data management (including conditional access). How Azure Active Directory (now Entra) can integrate with on-premises infrastructure and clients and what happens when the Internet goes out. After listening, if you're excited to join the September 19th through 21st Intune class (with Office Hours on September 22nd) then please be sure to reach out to your IVOXY Account Manager or podcasts@ivoxy.com so you can register yourself. If you enjoyed this episode, please be sure to like, share and subscribe wherever quality podcasts like DCT are found. Thanks as always for listening, and stay safe, get your (Windows) Autopilot on, stay (mobile) managed and catch you on the next fun and informative episode of Data Center Therapy!
Kisa ki on Mobile Device Management --- Support this podcast: https://anchor.fm/teknolojik/support
Heute erzählt uns Finn etwas zu den fünf ersten Themen die man auf dem Schirm haben sollte, wenn man sich auf eine Sicherheits-Zertifizierung wie die ISO 27001 oder **TiSAX** (VDA ISA) vorbereitet. Oder noch besser: Wenn sich Unternehmen mehr mit dem Thema beschäftigen wollen und jetzt bei der IT-Sicherheit einen drauf setzen wollen. Sortiert auch dem großen Faktor "Zeit": 1. **Mobile Device Management** (MDM) 2. **Patch Management** (Updates) 3. **Verschlüsselung** (Lebenszyklus einer Datei) 4. **Network Access** Control (NAC) 5. **Event Logging** (Auswertbares Logging) Heute als Gast: IT-Profi Finn Nickelsen, Managing Partner bei Nextwork. Mehr Infos auf: https://www.marcopeters.de oder https://www.nextwork.de
In the final segment of this MacVoices Live! discussion, Chuck Joiner, Jim Rea, David Ginsburg, Warren Sklar, Mark Fuccio, and Jeff Gamet dig deeper into the encryption and mobile device management aspects of the lost Secret Service messages, and whether text messages are only stored on your iPhone. (Part 3) This edition of MacVoices is supported by MacVoices After Dark, our newest benefit for all Patreon supporters. Uncensored, off-topic, and always off the wall. Show Notes: Links: iMessage encryption was one reason why Secret Service lost January 6 texts, may prevent employees from using iMessage in future:https://9to5mac.com/2022/07/30/imessage-encryption-january-6-riots/ About Managed Apple IDs for business:https://support.apple.com/en-us/HT210737 About Managed Apple IDs for education:https://support.apple.com/en-us/HT205918 Apple Business Essentialshttps://www.apple.com/business/essentials/ Guests: Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter on LinkedIn. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, and jeffgamet on LinkedIn., and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. Jim Rea has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. Follow Jim at provue.com and via @provuejim on Twitter. Warren Sklar helps host the Mac to The Future Group on Facebook, and is the co-host of In Touch With iOS with David Ginsburg. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
In the final segment of this MacVoices Live! discussion, Chuck Joiner, Jim Rea, David Ginsburg, Warren Sklar, Mark Fuccio, and Jeff Gamet dig deeper into the encryption and mobile device management aspects of the lost Secret Service messages, and whether text messages are only stored on your iPhone. (Part 3) This edition of MacVoices is supported by MacVoices After Dark, our newest benefit for all Patreon supporters. Uncensored, off-topic, and always off the wall. Show Notes: Links: iMessage encryption was one reason why Secret Service lost January 6 texts, may prevent employees from using iMessage in future:https://9to5mac.com/2022/07/30/imessage-encryption-january-6-riots/ About Managed Apple IDs for business:https://support.apple.com/en-us/HT210737 About Managed Apple IDs for education:https://support.apple.com/en-us/HT205918 Apple Business Essentialshttps://www.apple.com/business/essentials/ Guests: Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter on LinkedIn. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, and jeffgamet on LinkedIn., and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. Jim Rea has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. Follow Jim at provue.com and via @provuejim on Twitter. Warren Sklar helps host the Mac to The Future Group on Facebook, and is the co-host of In Touch With iOS with David Ginsburg. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
"Not long ago, companies didn't allow employees to take their work devices home, or even out of the network. Companies relied on the network security for these devices. In the past few years, we have all been forced to shift and figure out - how do we still keep work secure?"Mobile device management is a heavy lift. Security teams recognize the risks posed by laptops, tablets, smartphones, and other mobile devices. Because of our increasingly remote working environment and the ongoing challenges posed by the use of personal devices for work, many companies have needed to find other solutions to help them in their security effort.Listen to learn:-How to work from home securely-Tools and software to manage remote devices-Security solutions for your companyHosted by Jen Stone (MCIS, CISSP, CISA, QSA) with guest Mike McNeil (Founder/CEO of FleetDM)Notes - -https://www.youtube.com/watch?v=UIDb6VBO9os-https://www.loom.com/share/ecb223c0f2ff497195961a7ba5e77b2b[Disclaimer] Before implementing any policies or procedures you hear about on this or any other episodes, make sure to talk to your legal department, IT department, and any other department assisting with your data security and compliance efforts.
In today's episode, we dive into the admin world in the Reaktor context. For that, we invited Robin Laurén, a full-stack admin, who's been with Reaktor for over nine years. We talk about what qualities make a great sysadmin and why empathy and people skills are as necessary as tech skills. We touch upon the topics of data security and mobile device management (MDM). Finally, Robin shares some fascinating stories from his years of experience working in IT. GuestRobin Laurén is a full-stack admin who's been delivering hugs to users, workstations, servers, and networks since 2001. Robin aspires to provide usable and honest security. His main objective is to enable people to do their best work. Outside of work, Robin is interested in singing, theatre, IoT and home automation, photography, radio, and video production.Hosts Anna Fröblom is a great programmer, problem-solver, hobby photographer, lego enthusiast, and simply a nice person.Esko Lahti is an engineer who now works in the company that got him into Clojure. Now, his party trick at meetups is to rapid-fire through an extensive list of parentheses jokes.ReferencesRobin's ex-boss: José Ramos-Horta (then foreign minister, now president, of Timor-Leste)Robin's theatre gigs: Fallåker (soon playing Panik på kliniken - it runs in the family)Finns (now playing Pinocchio
In this episode, we speak with Simo Salmensuu CEO, Miradore, the Mobile Device Management platform that provides a smarter way to securely manage both company-owned and personal Android, iOS, macOS, and Windows devices. Today, they are trusted by over 10,000 organizations in more than 180 countries, with 10m+ Euro in ARR. We talk to Simo about their international expansion, and specifically how their first international market was the US. Contrary to many other Nordic players going first into another Nordic country, or maybe taking on some European Miradore decided to take on the US first thing! It all comes down to acting local, across the entire organization in order to be successful! Tune in and be inspired by Miradore's international journey!
What's better than having a Security-minded Consultant guest on Data Center Therapy, sharing their tips on how to manage endpoints and access in your network? Why, having TWO of them, of course! Matt “Tech Debt Crusher” Yette and Matt “Magnificent Bastion” Cozzolino welcome back to the virtual studios one Mr. Quinton Barber, Security Consultant for IVOXY as well as one Mr. Hoppy Shaw, End-User Technology Consultant for IVOXY, as they discuss the challenges of remote work and zero trust. Some of the concepts, you, our loyal listeners will hear on this episode include multi-factor authentication, identity management, device compliance and control, mobile device management solutions, Active Directory to Azure migrations, and much, much more. BYOD for iPhones and Android phones? Yep, we've got that too. Please be sure to like, share and subscribe wherever quality podcasts are found. Do you have challenges with securing some of your endpoints? Reach out to your local IVOXY Account Manager and we'll be able to help secure the devices that you previously didn't have the time or willpower to tackle on your own. Thanks for listening! Stay secure, stay (Windows Server) updated, stay (Microsoft) InTune-d in, and stay informed DCT fans! Catch you again on our next topical episode. Ciao for now.
Most industries understand the value of using enterprise mobile devices over consumer options, but are they properly caring for, storing, and maintaining them to maximize their potential? This week, Randy Murphy from Zebra joins the pod to discuss that very problem and a simple solution—deploying “intelligent” cabinets. What's the need here? What options are available? What does the ROI and benefits look like? It's the episode that reminds you that Sheriff ZAM is watching! #VARValue – How does selling/deploying intelligent cabinets and storage options help VARs sell more devices and services in general? Bon AppeTech is Back! TEConnecting with us: Randy - Bringing broadband to the world Dean - MIT Top Potential Tech Breakthroughs John - Resurrecting the Tasmanian Tiger Talk to us! Twitter - @TEConnectPod Email - TEConnect@bluestarinc.com Submit Your Topic Suggestions: https://www.bluestarinc.com/us-en/landing-pages/podcast-topics.html Sponsored by: Zebra Intelligent Cabinets
Mobile Geräte gehören zu den am wenigsten geschützten Geräten in Unternehmen. Egal ob es sich dabei um Firmengeräte oder um private Geräte handelt, kann ein Mobile Device Management ein entscheidender Schritt zur Verbesserung der IT-Sicherheit sein. Denn auf Smartphones und Tablets liegen häufig die gleichen sensiblen Daten vor wie auf Laptops und Servern. Bei einem Verlust eines Smartphones droht somit neben dem Verlust von persönlichen Daten auch der Verlust von sensiblen Firmendaten. Wir erklären, worauf es dabei ankommt und was sich hinter BYOD, COBO und COPE verbirgt. Für eine individuelle Beratung zu diesem oder anderen Themen, buchen Sie sich Ihren persönlichen Termin unter https://www.hagel-it.de/termin! Hier geht's zu unserem kostenlosen Merkblatt zum Thema Cyber Risko: https://www.hagel-it.de/hat-ihr-unternehmen-ein-grosses-risiko-gehackt-zu-werden.html.
Frontline workers need mobile devices that improve their experiences to do their jobs efficiently. Yet, managing a large portfolio of distributed devices at scale is complex. In this episode, Shash Anand, VP of Product Strategy at SOTI, talks about the benefits of a Mobile Device Management (or MDM) solution to empower frontline workers with seamless provisioning, security, and support.
The edWeb podcast is sponsored by Lenovo.The webinar recording can be accessed here. Virtual reality (VR) is a transformative technology that can inspire students and empower educators to take their teaching to the next level. VR has also been shown to lead to better outcomes such as greater engagement of students, increased focus on learning material, and better retention of information. This edWeb podcast shows you how to make VR work in your classroom, giving an overview of the technology, tips and techniques, and lessons learned from years of real-world implementations in both K-12 and higher education settings. Listeners learn how to:Get started teaching with VR and learn about the benefits VR can bring to your classroomDeploy a Mobile Device Management system to easily manage a fleet of VR headsetsCreate VR content with tools like Uptale, A-Frame, and Mozilla HubsLeverage tools like Veative as content for teaching STEMAssess immersive learning experiencesIn this edWeb podcast, Lenovo is providing guidance on VR solutions in education. Lenovo is the creator of VR Classroom, a combination of hardware, software, and services to drive new learning opportunities and skills for students. This edWeb podcast is of interest to K-12 and higher education teachers, librarians, school and district leaders, and education technology leaders. Lenovo Lenovo EDU blends hardware, software and services to provide a comprehensive learning environment.
Guest Name: Shash Anand, Vice-President of Product Strategy at SOTI. Language: English, Publication date: Aug, 27. 2021 As Vice-President of Product Strategy at SOTI, Shash Anand oversees the company's evolution from a single product centered around Mobile Device Management to an integrated platform that solves many of the challenges around enterprise mobility and IoT management. Shash holds a degree in Computer Engineering from the University of Toronto, and an MBA from the Rotman School of Management. After working for IBM as a Technical Support Engineer and Business Operations Manager, Shash joined SOTI to lead the company's global expansion. Throughout his tenure with the company, Shash has worked across both technical and operational teams, overseeing key departments within the business. With diverse experience across the organization, including: Professional Services & Support, Product Management, Product Marketing, Business Development & Sales, and Strategic Alliances, Shash has extensive expertise building global teams from start-up to scale-up success. Shash also sits on the Board of Directors as the Vice Chair of MCIS Language Solutions, a non-profit organization whose mission is to remove language barriers and improve access to critical information and services through high-quality language solutions. ——— Some of the highlights of questions from the podcast including: SOTI just recently launched the report “Mobilizing the delivery workforce: state of mobility in T&L 2021”; what is the report telling us about? What are some key findings of the report that are relevant to what happens in the T & L industry? What are your thoughts on the technology development that helps retail and T&L organizations integrate with each other? What advice can you offer to the decision makers in this sector of T&L on how they understand the trends and then drive the organization to adapt to the major disruption of covid19 Some other key takeaways. Download the report of “Mobilizing the delivery workforce: state of mobility in T&L 2021” by SOTI - here Connect with Shash on Linkedin: https://www.linkedin.com/in/shashanand/ --- Send in a voice message: https://anchor.fm/bicarasupplychain/message
We welcome back Jeremy Butcher from Apple to talk about Declarative Management, Apple's new framework for Mobile Device Management, as well as macOS Monterey, Erase all Contents and Settings, and why the M1 Macs are changing enterprise Mac deployment for the better. Hosts: Tom Bridge - @tbridge777 Charles Edge - @cedge318 Marcus Ransom - @marcusransom Emily Kausalik-Whittle - @emilyooo Guests: Jeremy Butcher, Product Marketing at Apple Links New Mac page on Apple's business website What's New for Business – WWDC 2021 [PDF] new findings from Forrester looking at the Total Economic Impact of Mac in the Enterprise Video: What's new in managing Apple Devices WWDC21 – https://developer.apple.com/videos/play/wwdc2021/10130/ Video: Meet declarative device management WWDC21 – https://developer.apple.com/videos/play/wwdc2021/10131 Sponsors: Kandji Secureframe Alectrona Patch Watchman Monitoring If you're interested in sponsoring the Mac Admins Podcast, please email podcast@macadmins.org for more information. Get the latest about the Mac Admins Podcast, follow us on Twitter! We're @MacAdmPodcast! The Mac Admins Podcast has launched a Patreon Campaign! Our named patrons this month include Weldon Dodd, Damien Barrett, Justin Holt, Chad Swarthout, William Smith, Stephen Weinstein, Seb Nash, Dan McLaughlin, Joe Sfarra, Nate Cinal, Jon Brown, Dan Barker, Tim Perfitt, Ashley MacKinlay, Tobias Linder Philippe Daoust, AJ Potrebka, Adam Burg, & Hamlin Krewson
Ein Social Intranet ohne eine Lösung für Smartphones funktioniert heute nicht mehr. Ein modernes Intranet muss mobil zugänglich und gut nutzbar sein, denn die Tage, in denen Menschen nur am physischen Büroarbeitsplatz Wissen, Unternehmensinformationen und Zusammenarbeitsfunktionen brauchen und nutzen, sind längst vorbei. Aus dieser Entwicklung ergeben sich ein paar interessanten Fragen für ein Intranet-Projekt: Ist es sinnvoll, hier einer Mobile-first-Strategie zu folgen? Oder gleich "Mobile only"? Wie rollt man eine Mobile-Lösung an die Mitarbeiter aus? Wie praktisch ist ein offizielles Mobile-Device-Management des Unternehmens und welche Alternativen gibt es? Antworten bietet die vierte Folge unserer aktuellen Podcast-Staffel mit dem Hörbuch "Das Social Intranet".
Ein Social Intranet ohne eine Lösung für Smartphones funktioniert heute nicht mehr. Ein modernes Intranet muss mobil zugänglich und gut nutzbar sein, denn die Tage, in denen Menschen nur am physischen Büroarbeitsplatz Wissen, Unternehmensinformationen und Zusammenarbeitsfunktionen brauchen und nutzen, sind längst vorbei. Aus dieser Entwicklung ergeben sich ein paar interessanten Fragen für ein Intranet-Projekt: Ist es sinnvoll, hier einer Mobile-first-Strategie zu folgen? Oder gleich "Mobile only"? Wie rollt man eine Mobile-Lösung an die Mitarbeiter aus? Wie praktisch ist ein offizielles Mobile-Device-Management des Unternehmens und welche Alternativen gibt es? Antworten bietet die vierte Folge unserer aktuellen Podcast-Staffel mit dem Hörbuch "Das Social Intranet".
Kickass Software, Rock 'n' Roll Teams - Der Podcast von Seibert Media!
Ein Social Intranet ohne eine Lösung für Smartphones funktioniert heute nicht mehr. Ein modernes Intranet muss mobil zugänglich und gut nutzbar sein, denn die Tage, in denen Menschen nur am physischen Büroarbeitsplatz Wissen, Unternehmensinformationen und Zusammenarbeitsfunktionen brauchen und nutzen, sind längst vorbei. Aus dieser Entwicklung ergeben sich ein paar interessanten Fragen für ein Intranet-Projekt: Ist es sinnvoll, hier einer Mobile-first-Strategie zu folgen? Oder gleich "Mobile only"? Wie rollt man eine Mobile-Lösung an die Mitarbeiter aus? Wie praktisch ist ein offizielles Mobile-Device-Management des Unternehmens und welche Alternativen gibt es? Antworten bietet die vierte Folge unserer aktuellen Podcast-Staffel mit dem Hörbuch "Das Social Intranet".
Ein Social Intranet ohne eine Lösung für Smartphones funktioniert heute nicht mehr. Ein modernes Intranet muss mobil zugänglich und gut nutzbar sein, denn die Tage, in denen Menschen nur am physischen Büroarbeitsplatz Wissen, Unternehmensinformationen und Zusammenarbeitsfunktionen brauchen und nutzen, sind längst vorbei. Aus dieser Entwicklung ergeben sich ein paar interessanten Fragen für ein Intranet-Projekt: Ist es sinnvoll, hier einer Mobile-first-Strategie zu folgen? Oder gleich "Mobile only"? Wie rollt man eine Mobile-Lösung an die Mitarbeiter aus? Wie praktisch ist ein offizielles Mobile-Device-Management des Unternehmens und welche Alternativen gibt es? Antworten bietet die vierte Folge unserer aktuellen Podcast-Staffel mit dem Hörbuch "Das Social Intranet".
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 26 today we are discussing about Bring Your Own Device is a policy that a lot of organizations have been adopting.This means when you come to work,you can bring your own device, and use it on their network.This may be your laptop, your tablet, your cellphone,keyboards, mice, or any other type of device.Some organizations have fully adopted Bring Your Own Device,and others are fully against it.We're going to talk about both,and why you should consider it,or decide not to use it in your organization.Now, when you use Bring Your Own Device,it brings a lot of security issues for you to consider.If I have somebody's laptop that now gets plugged into my network,I'm also introducing all of the vulnerabilities that device had.So, if you took your laptop home,plugged it into your network, downloaded a game,installed the game, and got malware and now you plug it into work the next day,you can bring that malware into work with you.This is a major concern with Bring Your Own Device because as an organization, I don't control your device,and so I don't know the security of it.And, that's one of the major risks with Bring Your Own Device.Now, on the flip side, a lot of companies really like Bring Your Own Device because it means they don't have to buy laptops, and cellphones,and all those type of devices for their employees because the employee is bringing their own.And, while that might save them money,and it's good for the bottom line, there are concerns.When the data goes on your device, who's data is it?Is it the company's data, or do you have rights to it?Where do you draw the line between what's personal data,and what's business data? A lot of organizations that have adopted Bring Your Own Device, will use storage segmentation.This will create a clear separation between personal,and company data on a single device.Now, there's lots of different ways to create this segmentation.There are highly technical solutions,and then there's highly procedural solutions.For example, you might have an application on your phone that says work, and when you click on that,it opens up a virtual environment, and all of your work is done from within there.And, when you exit that, you're now back into your personal device.That would be a clear technological limitation between the two.Now, you don't always have to use a highly technical solution.In my company, we're very small,we use personal devices as work devices,and so on my phone in particular, I have two email clients.I have one that's on Apple Mail that I use for my personal email, and then I have another one,which is Gmail, using the Gmail app that I use for my company email.That gives me a clear separation between my personal stuff,and my business stuff, and keeps them in separate buckets.Now, again, there's nothing really that would prevent me from loading up my business email inside Apple Mail if I wanted to.Except that we have a policy that says we won't do that.So, we've chosen an administrative control,as opposed to a technical control.Another concern you have with mobile devices under the Bring Your Own Device policy,is how do you ensure that device is always up to date?We talked about how important it is for patches,and updates to be installed on your mobile devices.I can push out software policies to you,prevent you from installing applications,and install updates remotely without your use.But, when I do Bring Your Own Device,are you going to let me install Mobile Device Management on your system?You might not.And, so this is why a lot of companies are now switching from a Bring Your Own Device,because of all those security issues,into a Choose Your Own Device, or CYOD model.CYOD gives the employee a choice of a couple of phones.We might have four, or five models that we support,and we say you can pick any one of these,and we'll pay for it for you. And Thankyou byebye
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 25 today we are discussing about Security of Apps.How do you know the app you want to install is secure?How do you know it's not going to be spying on you?How do you know there's no malware embedded in it?Well, you don't.But the best way to ensure that you don't get those type of things is by installing applications from the official mobile stores only.If you're using an Android device,that's the Google Play store.If you're using an Iphone,that's going to be the App Store.Now, some people have taken their phones and done what's called jail breaking it or rooting it.On an Apple device,jail breaking it means you're going to remove the security protections that Apple has put in place so that you can take it from your wireless carrier to a different wireless carrier or install third party apps outside of the App Store.As you can probably guess,these are both bad security practices and should not be done.Now, we you have an Android device we don't call jail breaking it,we call it rooting it.The reason is because Android is at heart a Linux operating system.So if you root the device,you now have administrative permissions over it.And you can install whatever applications you want and make the phone do things that it wasn't necessarily designed to do.Again, making sure that you don't jail break or root your device is a good first step to ensuring you have a secure device.Next, you want to think about what browser and what applications you're actually running.For example, if you're using the Chrome browser,that's a fairly secure web browser.But if you decide to get a third party web browser,you don't know who it is that put that out there and if you can trust them.Maybe they're giving you this web browser but they're also taking a copy of all your data going through it.To avoid those type of issues,always get official applications when possible.And speaking of web browsers,one of the things you want to ensure is whenever browsing the web on your mobile device,you're always going to the secure version of a website.That's denoted by the https at the front of the web address.This ensures that you have a TLS tunnel created between your phone and the server.What's TLS?Well, it's Transport Layer Security.It's going to put a encryption layer and a tunnel between your device and the server to ensure you have confidentiality and nobody is conducting a man in the middle attack from you.Now as businesses, we are increasingly going mobile all of the time.An Enterprise Mobility has a couple of things that we need to think about when we talk about securing our apps as well.One of those, is making sure we have control over those devices and what apps are installed.If your organization is going to be providing the cellphone to its employees,you have the right to install mobile device management software. MDM or Mobile Device Management is a centralized software solution that allows your system administrators to create and enforce policies across all of the mobile devices.This can ensure that people don't install games like Angry Birds or they don't put a third party apps or that they could only go to certain websites.
In today's episode, I want to learn more about the role mobility plays in enabling employees to be productive as the nature of work continues to evolve given the pandemic. Joseph Boyle is a listener of the show and also CEO of Truce software and is the perfect person to talk discuss these topics. Truce provides a contextual mobile device management (CMDM) platform so businesses can ensure safe and appropriate device use by employees at work. In February new research gauged workforce sentiment on whether employees believe mobile devices enable or inhibit productivity at work. It also looked at how workers' views of mobility have shifted over the past year due to the pandemic evolving the nature of work for many (e.g. fewer people going into physical offices, as one example) and whether they believe increased usage is leading to more blurred lines between work and personal lives. They found, for example, that 62% of respondents said they agree mobile phones or tablets play a key role in helping them be productive at work. Over a third said their mobile device usage at work has increased more or significantly more than a year ago. Another interesting finding: 56% of those surveyed believe it's their right to use their personal device on the job.
Pre-show: Join us in our Clubhouse! (That’s a joke; not happening. —Ed.) Chatroulette Party line Newton’s cradle Should Apple remove the Contacts framework? Follow-up: Living outside the east coast… or America. The UK explained The Concert for Charlottesville was posted Should timers sync? (via Richard Harris) What can Mobile Device Management really do? (via Chris Harper) Support article Helpful PDF An alternate way to think about RAM vs. SSD-wear tradeoffs (via Jonathan Dietz) Example M1 smartctl results dd fs_usage Ada and MISRA C for car-computer safety T568A vs. T568B myths revisited (via Jon B.) Stack overflow theories iPhone 13 rumors Live Tiles Marco’s microsuction mounting tape Post-show: Casey’s new toy Several-year-old Mavic footage Marco’s old toy Sponsored by: Flatfile: Spend less time formatting spreadsheet data, and more time using it. Mack Weldon: Reinventing men’s basics with smart design, premium fabrics, and simple shopping. Get 20% off your first order with code atppodcast. Linode: Instantly deploy and manage an SSD server in the Linode Cloud. New accounts get a $100 credit. Become a member for ad-free episodes and our early-release, unedited “bootleg” feed! Become a member!
Topics: -Command Control Power is very pleased to be joined by the co-authors of the macOS Support Essentials books, Arek Dreyer and Adam Karneboge. -Adam takes us through his origins in the business and how he met Arek. -Adam was originally a tech editor for the books -Previously, Adam & Arek had worked on another book called Managing Apple Devices. -Sam asks about the pressures of not only being an authoring, but being a tech editor. -Arek talks about an eBook version which allows corrections or changes after publishing the hard copy. -On the last version of Managing Apple Devices, Arek talks about a last minute change he regrets. -Writing a book while an operating system is going through the beta process is a challenge. -The authors explain how they split up the work in terms of exercises, reference guide, and lessons. -Steve Leebove gets props for his incredible tech editing skills, as well as the team at Peachpit. -Joe talks about feedback, both good and bad, that can come in response from putting your work out there. -“Life or death for data” -Jerry blows some sunshine to Arek & Adam and compliments their hard efforts. -Arek talks about hearing the positive feedback and how much that encourages them to step up to the plate again and write the next version. -Joe talks about John Siracusa’s technical reviews -Arek talks about Apple Silicon and macOS Recovery during the writing process. -Adam speaks to the positivity in the Apple community. -At one point in the series of books, the at home learner was incorporated into the steps. Sam asks Adam about the challenges of writing for those scenarios. -Apple Silicon startup options have changed and Arek speaks a bit about those changes. -Time Machine differences are interesting… -We talk a little about Mobile Device Management as well as changes in security and privacy. -We talk about Steve Leebove’s discovery about holding down the Option key while clicking the Advanced button in Network Preferences. Specifically, Arek wanted to know more about the grayed out SSIDs on Joe’s computer. The mystery has not been solved yet. -A lot of thanks go around
Host Jeremy Cherny interviews Max Palzewicz, Director of Operations at Rocketman Tech “I started out my career in public accounting, primarily working and advising small business owners. I got my CPA and I was able to join my dad and uncle's business coaching firm, Action Coach of Southeastern Wisconsin, where I worked for a few years. I carved out a niche for myself focusing on the financials for business owners, teaching business owners, how to be financially literate, how to read and analyze their financial statements, also how to process good numbers so they could make sound decisions with them. After that chapter, I realized I wanted to actually do it myself and I wanted to go out and prove that I could build a business on my own. A friend tossed out the idea to me in late 2018, that I should learn how to implement a software called Jamf Pro. What they do is they have a mobile device management software that specializes in Apple devices, so Mac OS, and iOS. So that's what we started doing and I got certified to implement the software. But something happened in early 2019, where Jamf Pro stopped requiring the onboarding engagement for clients to use the software. So our whole business model of doing these one-off software implementations had been turned on its head. What we did instead was we turned his Rolodex of 200 or so companies and we turned it into a CRM, and we started email marketing. From that, I realized that not only was his skill set highly sought after, but these system administrators that are Mac OS specific also make upwards of six figures or more in a lot of businesses that they work in. So it's a sought after skill and position, but it's also highly transferable where people are frequently job-hopping in this space and they tend to leave in that wake of procedures that were poorly documented because it was in their job security, it was in their best interest to do everything themselves in the Mac OS management space and not really document well. We realized there was a great need for a service IT company to specialize in this. A lot of IT companies try to be all things to all people so they'll do an entire vertical of services for their clients. We decided to just focus on this one thing, and that was managing Apple devices for enterprise companies.” I don't know if all our listeners know exactly what mobile device management is nor where it fits in with security. Can you say a bit more about that? MDM (Mobile Device Management) is kind of one of those pillars that you look for when you do a SOC to a compliance test or any of those security benchmarks or standards, whether you're getting a SOC to audit, or an ISO 27001 audit, or if you're just trying to follow the CIS benchmarks. Generally, you need mobile device management software to meet that compliance framework. So where MDM comes in, and Jamf Pro specifically is it's a software that's designed to interact with the management framework on iOS and Mac OS devices. So it allows IT to remotely interact and provision these devices so you can push down things like configuration profiles, where you might interact with System Preferences. You can also push out policies where you're deploying software or deploying different objects to the computers. But the whole idea is to allow IT to remotely interact at scale, with hundreds of thousands of devices so they don't have to do the old sneakernet of going around and troubleshooting each device individually. What about mobile device management has improved security for people? Security is always evolving, how does Rockinman Tech stay on top of those security threats? What we've noticed is the modern standard for enterprise, especially in this remote work environment, is to move towards something called zero-touch deployment with a cloud identity provider through your MDM. So what most of these enterprise companies are doing and I mean, the market share tends to lean heavily towards Microsoft Azure AD for Cloud Identity. There are probably five or six other major players in there, Google has one, Ping has one, OKTA is a great one for startups and smaller companies. But Azure AD seems to be the gold standard for the fortune 500. Conversely, for Apple device management, Jamf Pro seems to be the best in class for managing Mac OS. So all these companies are striving towards this goal that's just barely out of reach, called zero-touch deployment. The reason it's out of reach is that they have security teams that were initially developed to manage a primarily Windows environment. But what we've seen over the last couple of decades, with executives, marketing teams, design teams, and then different developers, you start to have an influx of Mac OS, computers in the enterprise space, and you still need to have those computers be in compliance and be secure when they're connecting to the local area network or VPN, or just using sensitive information. But what we've seen is as we onboard those first few hundred computers that are Macs and not Windows PCs, it creates kind of a wild west environment. So the security team that was used to managing the Windows environment is trying to extrapolate or apply those windows requirements for the Apple devices or Mac OS computers. We find that in some cases that isn't quite appropriate, and it can cause some snags and that goal of getting to zero-touch. What's an example of something that gets in the way of that, which would be a Windows thing that doesn't apply to the world of Mac? I think that's a good segue into what are the differences between Mac OS and Windows when you talk about security because a lot of antivirus and malware and firewall stuff has been created for the Windows environment. Whereas Mac OS has a number of built-in security features that are unique to them which are built-in, meaning they don't need third party software to operate effectively. So for firewalls, Windows will use McAfee, you'll use the web proxy and the agent. But Mac OS has a built-in network firewall. On the windows side, you might use something called a Kaspersky to scan applications you download from the internet. Mac OS has something called gatekeeper that checks for a developer certificate and then checks now for a notarisation from Apple too. You might have malware removal and protection. So something like Symantec for Windows, Apple has X Protect that's already built into the framework and that will detect and download files and scan for malware as it comes in. Bitdefender is a market leader on the Windows side too for interacting with the management framework of Windows. Apple has system integrity protection so that third-party software can't really modify or overwrite any system files. That's where we saw kernel extensions with High Sierra 10.13 and system extensions now with Catalina. What are you seeing as the future of information security? That's a great question that can go in a number of directions. At least for the Apple side, I see that Apple devices will continue to gain market share, and prevalence in enterprise environments because generally, our workforce is growing for the millennial cohort and that cohort tends to lean more heavily to wanting to use a Mac versus a PC. That's basically what we've done for a lot of these enterprise companies is we've created that proof of concept for the first 50 to 200, or 300 Macs to say, "Hey, these can work in your environment, and they can work securely, and they're going to improve productivity in the long run, because you're going to have fewer helpdesk tickets, and your users are going to be more satisfied." So number one, I see that trend is going to Apple is going to continue to gain market share in the enterprise space, because they've probably tapped out the consumer in terms of what they can sell to them. I'm sure they've got a few more tricks up their sleeve, but I think this is really the next frontier for them. That's also what we see in the MDM landscape because Jamf Pro seized that monopolistic market share at first. But now we see these other companies like Addigy and Kandji, starting to get funding and create MDMs that are similar, if not better than Jamf Pro and start to chip away at that market share. So those are a couple of trends I see continuing, more globally. This might be a hot take, based on what we've seen with the congressional hearings and big tech, but I can see Azure, potentially being split off from Amazon and Microsoft respectively, being separate companies. The same Telecom and Internet. Those companies have been trying to merge for years because they want to gain those efficiencies. I think it's very possible that Telecom, Internet, 5g and cloud hosting all that storage becomes more closely resembled a public utility. Because it might just be in the public's best interest to allow those to operate as monopolies. But they would have to more closely resemble public utility then. Do you have any other side projects or fun activities besides Rocketman Tech you would like to share? I've always been kind of enamored with creating something that can work without you. For the most part, I've done that with my role at Rockman by handing over the business development and sales to someone else, recruiting and onboarding another engineer to help with the project management, and the execution of projects. So for about the last 10 months, I've been kind of acting as a scrum master on a startup that has been making a mobile app for the music industry. It's an app that functions similar to Google Calendar, but it allows users to be on the same calendar domain so different users can see each other's availability, and then create events and schedule with each other. I'm a musician on the side too, I play saxophone and keys. So I wanted to create something that would make our lives a lot easier for networking. So I've been acting as a scrum master, where I kind of lead the designer and developer and product owner to get the app, stable, free of bugs, develop new features, consider the user design, and the feedback there. Now we're looking at releasing it on the App Store and Google Play probably in quarter 2 of 2021 right around when the weather starts turning again, and we see music happening outside again in the Midwest.
The DroidDevCast is a weekly podcast brought to you by the team at Esper, where we explore all things Android, DevOps, and open source software development. In this episode, Esper Platform Evangelist Rin Oliver spoke with Siyata Mobile, Inc. VP of Sales Jason DePue to learn more about the variety of Android devices available in the public sector brought to North American markets by Siyata, and the intersections of the logistics industry and Android.On this Episode of The DroidDevCast: 02:03 - What makes the UV350 device unique? 03:23 - Exploring the software applications available on the UV35005:07- An introduction to FirstNet07:38 - How 5G technology will impact the public sector10:16 - What role does application management play in the public sector13:09 - Is the public sector still focused on on-premise solutions, or are they moving to the cloud15:02 - The steps public sector operations can take to transition to the cloud
On today's episode of The DroidDevCast, Esper Platform Evangelist Rin Oliver is joined by Esper Vice President of Customer Success Chris Stirrat. They set out to answer the overall question, “What does it mean to be customer-obsessed?” Throughout the show, they also touch on cloud-based alerting, monitoring, Esper's approach to customer obsession, and customer success strategies for sales and marketing teams in the technology industry.In this Episode of The DroidDevCast: 00:55 - What would you define as the ideal customer experience in the Android and MDM space?01:37 - What are some things that sales and marketing teams can do to ensure that they're focusing on not only acquiring customers, but nurturing their relationships with their existing customer base that they have already?03:12 - What do you think makes it really special for customers when they're interacting with a business, especially in the cloud-based services?05:58 - How Esper handles cloud-based alerts11:52 - How are we analyzing customer data here at Esper?14:37 - What are some key takeaways you'd like to offer our listeners who might be hoping for some tips on how to approach customer obsession from a marketing and sales standpoint
The DroidDevCast is a weekly podcast brought to you by the team at Esper, where we explore all things Android, mobile #DevOps, and open source software development. On this episode, Esper Content Marketing Manager and podcast host Rin Oliver is joined by Esper COO and Co-Founder Shiv Sundar to discuss best practices business owners and decision makers need to consider when shopping for purpose built #Android devices. Watch and Subscribe onYouTube: Learn more about Esper's custom Android solutions: https://bit.ly/37eM9jE
Mobile Device Management increases security, reduces risk and plays an important role in Government certified assurance models. Holly Grace discusses the role of device management for Cyber Essentials, and the challenges that come with employees using their own devices at work. Key points: 1'08 What is Mobile Device Management (MDM)? 3'05 Device Management for Cyber Essentials 8'27 Bring your own device (BYOD) 11'30 Passwords, pass codes and pin numbers Listening Time: 14 minutes Hosted by: Holly Grace Williams, Managing Director at Secarma
Ende Juni hat Apple das Unternehmen Fleetsmith gekauft, einen cloud-basierten Anbieter von Mobile Device Management (MDM) für Apple-Geräte. Patrick und Ben unterhalten sich heute über diese moderne Art der Geräteverwaltung, die Vorteile der ‚Supervision‘, häufig genutzte Funktionen, und mehr.
Today I will discuss: 1. What is MDM? 2. What are the different phases of MDM? 3. How is it helping the companies to achieve the security? Watch
This week Blake and James break out another 3 letter acronym in the IT world. This time its MDM. What is Mobile Device Management, why do you need it, and how does it help! Tune in to find out!!Instacart - Groceries delivered in as little as 1 hour. Free delivery on your first order over $35.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.
Wir bekommen immer mehr Anfragen von Mitarbeitern in Unternehmen, die wissen wollen, was die neuen Tools eigentlich alles für Auswertungs-Möglichkeiten haben. Und spätestens seit die Arbeit im Homeoffice zur täglichen Routine geworden ist und der Chef einem nicht mehr auf die Finger schaut, stellen sich viele die Frage: “Kann man Leute über Softwaretools im Homeoffice ausspionieren?„ Die Antwort lautet: Ja. Man kann. Und wie. Wer generell ein komisches Gefühl hat, wie das eigene Unternehmen diese Themen handhabt, sollte ebenfalls beim DSB nachfragen und sich bestätigen lassen, dass keine Überwachung stattfindet. Der DSB ist verpflichtet, Auskunft zu erteilen. Wenn er das nicht kann, ist es seine Aufgabe, es herauszufinden, und ggf. etwas gegen unerlaubtes Tracking zu unternehmen. Auch kann es für die Geschäftsführung nicht schaden, in der IT-Abteilung nachzufragen, ob die relevanten Einstellungen der Kollaborationstools, des Mobile Device Management oder der Cloud Lösung wirklich korrekt sind. And you'll see why 1984 won't be like “1984”.
This week, Content Marketing Manager and host Rin Oliver was joined by Karthik Gaekwad, who is Head of Cloud Native Engineering at Verica and a devopsdays organizer. This podcast episode explores Karthik's journey to extreme testing, continuous verification, QA best practices, and some stellar resources.
Welcome to the History of Computing Podcast, where we explore the history of information technology. Because by understanding the past, we're better prepared for the innovations of the future! Today we're going to talk about Apple's Mobile Device Management; what we now call Mobility. To kick things off we'll take you back to the year 2001. 2001 was the year Nickelback released How You Remind Me. Destiny's Child was still together. Dave Matthews released The Space Between, and the first real Mobile Device Management was born. The first real mobile management solution to gain traction was SOTI, which launched in 2001 with an eye towards leveraging automation using mobile devices and got into device management when those options started to emerge. More and more IT departments wanted “Over The Air” management, or OTA management. So Airwatch, founded by John Marshall in 2003 as Wandering Wi-Fi, was the first truly multi-platform device management solution. This time, rather than try to work within the confines of corporate dogma surrounding how the business of IT was done, Apple would start to go their own way. This was made possible by the increasing dominance of the iPhone accessing Exchange servers and the fact that suddenly employees were showing up with these things and using them at work. Suddenly, companies needed to manage the OS that ships on iPhone, iOS. The original iPhone was released in 2007 and iOS management initially occurred manually through iTunes. You could drag an app onto a device and the app would be sent to the phone over the USB cable, and some settings were exposed to iTunes. Back then you had to register an iOS device with Apple by plugging it into iTunes in order to use it. You could also backup and restore a device using iTunes, which came with some specific challenges, such as the account you used to buy an app would follow the “image” to the new device. Additionally, if the backup was encrypted or not determined what was stored in the backup and some information might have to be re-entered. This led to profiles. Profiles were created using a tool called the iPhone Configuration Utility, released in 2008. A Profile is a small xml file that applies a given configuration onto an iOS device. This was necessary because developers wanted to control what could be done on iOS devices. One of those configurations was the ability to install an app over the air that was hosted on an organization's own web server, provided the .ipa mime type on the web server was defined. This basically mirrored what the App Store was doing and paved the way for internal app stores and profiles that were hosted on servers, both of which could be installed using in-house app stores. During that same time-frame, Jamf, Afaria (by SAP), and MobileIron, founded by Ajay Mishra and Suresh Batchu, in the previous year, were also building similar OTA profile delivery techniques leveraging the original MDM spec. At this point, most OTA management tasks (such as issuing a remote wipe or disabling basic features of devices) were done using Exchange ActiveSync (EAS). You could control basic password policies as well as some rudimentary devices settings such as disabling the camera. With this in mind, Apple began to write the initial MDM specifications, paving the way for an entire IT industry segment to be born. This was the landscape when the first edition of the Enterprise iPhone and iPad Administrator's Guide was released by Apress in 2010. Additional MDM solutions were soon to follow. TARMAC released MDM for iOS devices using a server running on a Mac in late 2011. AppBlade and Excitor was also released in 2011. Over the course of the next 8 years, MDM became one part of a number of other lovely acronyms: • Mobile Content Management, or MCM, is really just a Content Management System that sends content and services to mobile devices. • Mobile Identity Management, or MIM, refers to where the SIM card of one's mobile phone works as an identity • Enterprise Mobility Management, or EMM, gets more into managing apps and content that gets put on devices • Unified Endpoint Management, or UEM, brings traditional laptops and then desktops into the management feature, merging EMM with traditional device management. X-Men First Class came in 2011, although the mail server by the same name was all but gone by then. This was a pivotal year for Apple device management and iOS in the enterprise, as Blackberry announced that you would be able to manage Apple devices with their Blackberry Enterprise Server (BES), which had been created in 1999 to manage Blackberry devices. This legitimized using Apple's mobile devices in enterprise environments and also an opportunistic play for licensing due to the fact that the devices were becoming such a mainstay in the enterprise and a shift towards UEM that would continue until 2018, when BlackBerry Enterprise Server was renamed to BlackBerry Unified Endpoint Manager. An explosion of MDM providers has occurred since Blackberry added Apple to their platform, to keep up with the demand of the market. Filewave and LANrev added MDM to their products in 2011 with new iOS vendors NotifyMDM and SOTI entering into the Apple Device Management family. Then Amtel MDM, AppTrack, Codeproof, Kony, ManageEngine (a part of Zoho corporation), OurPact, Parallels, PUSHMANAGER, ProMDM, SimpleMDM, Sophos Mobile Control, and Tangoe MDM were released in 2012. MaaS360 was acquired by IBM in 2013, the same year auralis, CREA MDM, FancyFon Mobility Center (FAMOC), Hexnode, Lightspeed, and Relution were released, and when Endpoint Protector added MDM to their security products. Citrix also acquired Zenprise in 2013 to introduce XenMobile. Jamf Now (originally called Bushel), Miradore, Mosyle, and ZuluDesk (acquired by Jamf in 2018 and being rebranded to Jamf School) were released in 2014, which also saw VMware acquired Airwatch for $1.54 billion dollars and Good Technology acquire BoxTone, beefing up their Apple device management capabilities. 2014 also saw Microsoft extend Intune to manage iOS devices. Things quieted down a bit but in 2016 after Apple started publishing the MDM specifications guide freely, an open source MDM called MicroMDM was initially committed to github, making it easier for organizations to build their own fork or implement that should they choose. Others crept on the scene as well during those year, such as Absolute Manage MDM, AppTech 360, Avalanche Mobility Center, Baramundi, Circle by Disney, Cisco Meraki (by way of the Cisco acquisition of Meraki), Kaseya EMM, SureMDM, Trend Micro Mobile Security, and many others. Each one of these tools has a great place in the space. Some focus on specific horizontal or vertical markets, while others focus on integrating with other products in a company's portfolio. With such a wide field of MDM solutions, Apple has been able to focus efforts on building a great API and not spend a ton of time on building out many of the specific features needed for every possible market. A number of family or residential MDM providers have also sprung up, including Circle by Disney. The one market Apple has not made MDM available to has been the home. Apple has a number of tools they believe help families manage devices. It's been touted as a violation of user privacy to deploy MDM for home environments and in fact is a violation of the APNs terms of service. Whether we believe this to be valid or not, OurPact, initially launched in 2012, was shut down in 2019 along with a number of other screen time apps for leveraging MDM to control various functions of iOS devices. The MDM spec has evolved over the years. iOS 4 in 2010 saw the first MDM and Volume Purchase Program. iOS 5 in 2011 added over the air os updates, Siri management, and provided administrators with the ability to disable the backups of iOS devices to Apple's iCloud cloud service. iOS 6 saw the addition of APIs for 3rd party developers, managed open in for siloing content, device supervision (which gave us the ability to take additional management tasks on devices we could prove the ownership of) and MDM for the Mac. That MDM for the Mac piece will become increasingly important over the next 7 years. Daft Punk weren't the only ones that got lucky in 2013. That year brought us iOS 7 for macOS 10.9. The spec was updated to manage TouchID settings, give an Activation Lock bypass key for supervised devices, and the future of per-app settings management came with Managed App Config. 2014 gave us iOS 8 and MacOS 10.10. Here, we got the Device Enrollment Program which allows devices to enroll into an MDM server automatically at setup time and and Apple Configurator enrollments, allowing us to get closer to zero touch installations again. 2015 brought with it The Force Awakens and awakened Device-based VPP in iOS 9 and macOS 2015, which finally allowed administrators to push apps to devices without needing an AppleID, the B2B App Store which allowed for pushing out apps that weren't available on the standard app store, supervision reminders which are important as it was the first inkling of prompting users in an effort to provide transparency around what was happening on their devices, the ability to enable and disable apps, the ability to manage the home screen, and kiosk mode, or the ability to lock an app into the foreground on a device. The pace continued to seem frenzied in 2016, when Justin Timberlake couldn't stop the feeling that he got when in iOS 10 and macOS 10.12 he could suddenly restart and shut down a device through MDM commands. And enable Lost Mode. This was also the year Apple shipped their first operating system in a long, long time when APFS was deployed to iOS. Millions of devices got a new filesystem during that upgrade, which went oh so smoothly due to the hard work of everyone involved. iOS 11 with macOS 10.13 saw less management being done on the Mac but a frenzy of updates bringing us Classroom 2 management, FaceID management, AirPrint management, the ability to add devices to DEP through Apple Configurator, QR code based enrollment, User Approved Kernel Extension Loading for Mac and User Approved MDM enrollment for Mac. These last two meant that users needed to explicitly accept enrollment and drivers loading, again trading ease of use out for transparency. Many would consider this a fair trade. Many administrators are frustrated by it. I kinda' think it is what it is. 2018 saw the Volume Purchase Program, the portal to build an Apple Push Notification certificate, and the DEP portal collapsed into Apple Management Programs, with the arrival of Apple Business Manager. We also got our first salvo of Identity providers with oauth for managed Exchange Accounts, we got the ability to manage tvOS apps on devices and we could start restricting password auto-fill. And this year, we get new content caching configuration options, bluetooth management, autonomous single app mode, os update deferrals, and the automatic renewal of Active Directory Certificates. This year we also get a new enrollment type which uses a Managed Apple ID and then separate encrypted volumes for data storage. What's so special about Apple's MDM push? Well, for starters, they took all that legacy IT industry dogma from the past 30 years and decided to do something different. Or did they? The initial MDM options looked a lot like At Ease, a tool from the 1980s. And I mean some of the buttons say the same thing they said on the screens for Newton management. The big difference here is that Push Notifications needed to be added as you couldn't connect to a socket on a device running on your local network. Because most of the iPhones weren't on that network. But the philosophy of managing only what you have to to make the lives of your coworkers better means pushing settings, not locking users from changing their background. Or initially it meant that at least. The other thing that is so striking is that this was the largest and fastest adoption of enterprise technology I've seen. Sometimes the people who have survived this era tend to get a bit grumpy because the cheese is moved… EVERY YEAR! But keep in mind that Apple has sold 1.4 billion iPhones as have 423 million iPads, and don't forget a couple hundred million Macs. That's over 2 billion devices we've had to learn to cope with. Granted, not all of them are in the enterprise. But imagine this: that's more than the entire population of China, the US, and Indonesia. How many people in those three out of the top 5 populated countries in the world go to work every day. And how many go to school. It's been a monumental and rapid upheaval of the IT world order. And it's been fun to be a part of!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Enriching Radare2 and x64dbg malware analysis with statically decoded strings https://isc.sans.edu/forums/diary/Enriching+Radare2+and+x64dbg+malware+analysis+with+statically+decoded+strings/24146/ Weaknesses in Apple's Mobile Device Management https://duo.com/labs/research/mdm-me-maybe LoJax UEFI Rootkit https://www.welivesecurity.com/2018/09/27/lojax-first-uefi-rootkit-found-wild-courtesy-sednit-group/
ipad4productivity - Produktiver mit dem iPad im Unternehmen mit Thorsten Jekel
In dieser Episode geht es um ein ganz einfaches MDM. Mit JAMF können Sie bis zu drei Geräte sogar gratis verwalten. Wenn Sie die Links zu den besprochenen Podcasts haben wollen, schicken Sie mir einfach eine kurze E-Mail an t.jekel@jekelteam.de. Dieser Podcast hilft Ihnen mit dem iPad wirklich Ihre Produktivität im Unternehmen zu steigern. Mehr Informationen und alle Links zu den vorgestellten Apps erhalten Sie auch unter http://www.ipad4productivity.com