Ryan Faas

Contributing Writer

Ryan Faas is a technology journalist and author who had been writing about Apple, business and enterprise IT topics, and the mobile industry for over a decade. He is author and/or editor of ten technology books. He is a prolific freelance writer whose work has been featured on Computerworld, Enterprise Mobile Today, InformIT, Peachpit Press, Cult of Mac, Cult of Android, About.com, and Datamation. In 2008 he was awarded a Neal National Business Journalism award for his work featured in Computerworld's "Week of Leopard" series.

In addition to writing, Ryan has spent a large portion of the past fifteen years in the systems/network engineering and IT management fields as an IT director, systems administrator, trainer, and all round multi-platform and mobile device technology consultant. His client list ranges from human services agencies, small non-profits, and private schools to fortune 500 hundred companies and major media agencies. He also worked for mobile management provider MobileIron from November 2014 until October 2015.

When shadow IT goes remote: How to keep workers in the fold

Amid the pandemic, using trust to fight shadow IT

Amid the pandemic, using trust to fight shadow IT

With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.

Shadow IT goes home: How to reduce the risk

Shadow IT goes home: How to reduce the risk

As workers were forced home due to the COVID-19 crisis, the potential for shadow IT went with them to their remote offices. However, it doesn't need pose a risk. In fact, it could prove to be an asset.

How to create a mobile policy for iOS devices

How to create a mobile policy for iOS devices

When developing a mobile policy for iPhones and iPads, it’s important to keep in mind that from an EMM perspective, Apple’s biggest goal ( beyond privacy) is delivering a single seamless iOS experience.

How to create a mobile policy for Android devices

How to create a mobile policy for Android devices

Android has become a viable enterprise platform and in some ways is beating Apple in terms of enterprise functionality. This means that IT departments supporting Android devices need to create and implement effective policies.

Apple eyes changes to iOS device management

Apple eyes changes to iOS device management

At last week's developers conference, Apple rolled out a number of changes to the way iPhones, iPads and other devices are handled. Here's what those changes mean.

How to craft an MDM policy BYOD workers will actually follow

How to craft an MDM policy BYOD workers will actually follow

Locking down corporate data and apps on employee devices can be a chore — especially when the biggest stumbling block is workers themselves. Here's how to ensure mobile devices actually get managed properly.

Where’s Apple’s collaboration service?

Where’s Apple’s collaboration service?

Across a range of software and apps, the company already has many of the pieces of a full-service collaboration suite in place. It needs to get busy tying them all together.

After Apple's guidance revision, time to focus on enterprise

After Apple's guidance revision, time to focus on enterprise

Apple's surprising announcement that earnings this quarter will come in less than expected highlight the company's need to expand in other areas. Beyond services, it should continue to push into the workplace.

Apple in 2019: Expect more focus on enterprise identity, device ownership

Apple in 2019: Expect more focus on enterprise identity, device ownership

Apple has done much in recent years to make it easier for IT admins to deploy, provision and manage all manner of Macs, iPhones and iPads. Here's how it did so, and what's likely to come next.

For Apple, 2018 meant a new enterprise tack

For Apple, 2018 meant a new enterprise tack

Though it's often seen as a consumer-centric company, Apple now touches a wide variety of enterprise IT operations. That growing corporate influence is likely to continue, and may even accelerate, in 2019.

What Apple's T2 security chip brings to the enterprise table

What Apple's T2 security chip brings to the enterprise table

Apple’s T2 security processor offers a real measure of data protection, even as it requires changes in how Apple hardware is imaged, updated or copied. But on balance, the T2 presages good things from the company.

Load More