Thursday, March 6, 2008
Enterprise Users Get their iPhone
Starting in June, Apple iPhones will be able to receive push email, calendar and contact information from Microsoft Corp.'s Exchange server. Apple has licensed Exchange ActiveSync from Microsoft and is building it right into the iPhone, so that iPhone will connect out-of-the-box to Microsoft Exchange Servers 2003 and 2007 for secure over-the-air push email, contacts, calendars and global address lists.
The iPhone 2.0 software provides a configuration utility that allows IT administrators to easily and quickly set up many iPhones, including password policies, VPN setting, installing certificates, email server settings and more.
Once the configuration is defined it can be easily and securely delivered via web link or email to the user. To install, all the user has to do is authenticate with a user ID or password, download the configuration and tap install. Once installed, the user will have access to all their corporate IT services.
Built-in Exchange ActiveSync support also enables security features such as remote wipe, password policies and auto-discovery.
The iPhone 2.0 software supports Cisco IPsec VPN to ensure the highest level of IP-based encryption, as well as the ability to authenticate using digital certificates or password-based, multi-factor authentication.
The addition of WPA2 Enterprise with 802.1x authentication enables enterprise customers to deploy iPhone and iPod touch with the latest standards for protection of Wi-Fi networks.
Those are features most enterprise information technology managers require before a device is approved for widespread use, and represent a huge potential opportunity for Apple to penetrate enterprise accounts.
Some even think the iPhone is about to become an envied thing: a "platform."
“Think about it," says venture capitalist John Doerr, who has launched a $100 million fund to back iPhone-related application companies. "In your pocket, you have something that's broadband and connected all the time. It's personal. It knows who you are and where you are. That's a big deal. A really big deal. It's bigger than the personal computer."
Gary Kim has been a digital infra analyst and journalist for more than 30 years, covering the business impact of technology, pre- and post-internet. He sees a similar evolution coming with AI. General-purpose technologies do not come along very often, but when they do, they change life, economies and industries.
Subscribe to:
Post Comments (Atom)
What Declining Industry Can Afford to Alienate Half its Customers?
Some people believe the new trend of major U.S. newspapers declining to make endorsements in presidential races is an abdication of their “p...
-
We have all repeatedly seen comparisons of equity value of hyperscale app providers compared to the value of connectivity providers, which s...
-
It really is surprising how often a Pareto distribution--the “80/20 rule--appears in business life, or in life, generally. Basically, the...
-
Is there a relationship between screen size and data consumption? One might think the answer clearly is “yes,” based on the difference bet...
No comments:
Post a Comment