Security practitioners like me shy away from absolutes. That being said, I do not have a problem drawing some comparisons across the leading mobile device platforms, specifically Symbian, BlackBerry, iOS, Windows Mobile 7 and Android.
Every two weeks the Customer Platform Services team at Fiberlink hosts a webinar on topics of interest to mobile IT professionals. On November 4, we presented a webinar on Enabling Android in the Enterprise. The webinar was meant to provide practical advice to IT practitioners that wanted or needed to take advantage of the new Exchange features supported in Android 2.2 (Froyo) like remote-wipe and password policy enforcement.
For the last follow-up in my series of Five Ways to Reduce Wireless Spend I d like go into more detail about how to Enable User Self Management.
For the third follow-up in my series of Five Ways to Reduce Wireless Spend I d like go into more detail about Developing your Wireless Strategy and Leveraging Tools for Enforcement.
Imagine this: putting away your handheld and your laptop, for an entire day. (Please remember to breathe.)
I recently posted a blog entitled Five Ways to Reduce Wireless Spend. When I wrote it I had to pare down a lot of the content in order to keep it easily digestible. Now I am following up my original blog with more data.
I admit I need help. I can’t get the Wonder Pets song out of my head. You know, the Nickelodeon show where a baby duck, a guinea pig, and turtle save everything from a mermaid to a cow in outer space. It’s amusing and astounding to me (download it off iTunes—you’ll see). I think about them every day, not so much because my youngest daughter watches the show nonstop, but mostly because my office phone literally … doesn’t… stop… ringing.