IT will have a love-hate relationship with iOS 7, OS X Mavericks and iCloud
With updated OSes and iCloud, Apple will please some, annoy others
Computerworld - Apple certainly showed that it's still in business and isn't going anywhere during this year's keynote address at the Worldwide Developers Conference. In a presentation lasting more than two hours, Apple execs gave developers -- and everyone tuned in to the live webcast -- clear signs that the company intends to remain a major player in technology for years to come.
Consumers and business users alike will find things to love about OS X Mavericks and iOS 7. Road warriors will like the amazing battery life -- 12 hours for the 13-in. model -- promised by the newest MacBook Air laptops. And hardcore power users are salivating over the forthcoming -- and completely unconventional, even by Apple standards -- Mac Pro. Even iCloud seems to have several promising prospects on the horizon as Apple offers to sync all your security credentials and credit card data across devices and join Google and Microsoft in the cloud productivity market with iWork for iCloud.
For enterprise IT pros, however, the announcements represented more of a mixed bag. Apple barely mentioned enterprise or even business features, though it managed to subtly announce several big features that have been on the IT wish list by including them on some of the keynote slides. In other cases, some of the features Apple highlighted as great for consumers should raise red flags in the minds of CIOs, security specialists and other IT professionals.
What IT will love
Activation Lock -- Activation Lock is a powerful security tool and potential theft deterrent for both consumers and business users. Even though this isn't a specifically enterprise-oriented feature, it will ease many of IT's bring-your-own-device (BYOD) concerns, particularly when paired with complex passcode rules and remote wipe capability. Apple could even extend that capability further by creating an enterprise-enabled version of Lost Mode that would require users' enterprise credentials in addition to their Apple ID to reactivate a lost or stolen device.
App Store Volume Purchasing -- One of the biggest complaints that businesses and schools have about iOS is the lack of true volume licensing options. The company's current Volume Purchase Program leaves a lot to be desired. Because it's based around the same redemption code system that powers iTunes gift cards, the current system ties a company-purchased app to an employee's iTunes account. When a code is used, the app -- and the license to run it -- are assigned to the employee and can't be reclaimed when he or she leaves the company. It seems likely that Apple, having heard complaints about this process for years, will move toward a more traditional licensing method. Organizations will still need to purchase the licenses in bulk and deploy the apps, but a license model would allow them to revoke the license for an app when a user leaves the organization and reuse it. Whether the process would delete the app completely or simply encourage the user to buy a personal license isn't clear. I'd put money on the latter.
OS X Mavericks
- Apple kicks off public OS X beta testing
- Apple patches Secure Transport, but not because of Heartbleed
- Free OS X Mavericks now powers half of all Macs
- Apple slates WWDC for June 2-6, sets up ticket lottery
- Google Now alerts hit desktop Chrome, OS subversion continues
- Apple patches critical 'gotofail' bug with Mavericks update
- German security firm offers unauthorized patch for critical encryption bug in OS X Mavericks
- The ROI of free OS updates: Who wins, Apple or Microsoft?
- Apple edges back toward the data center
- OS X Mavericks adoption steps on the brakes
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Logicalis eBook: SAP HANA: The Need for Speed Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All iOS White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!