Get Better Gear!

Premier Sponsors

Other World Computing

TechRestore

Top 5 Free Apps

Release Date: August 05, 2009
Genre: Games
Release Date: May 22, 2009
Genre: Games
Release Date: August 29, 2009
Genre: Games
Release Date: March 27, 2009
Release Date: August 07, 2009

iTunes New Music Releases

Release Date: September 29, 2009
Genre: Rock
Release Date: September 20, 2009
Release Date: September 15, 2009
Release Date: August 25, 2009
Genre: Rock
Release Date: August 25, 2009

Top 5 Paid Apps

Release Date: April 22, 2009
StickWars $0.99
Release Date: March 31, 2009
Genre: Games
Bloons $0.99
Release Date: April 05, 2009
Genre: Games

Discover New Music

  • Bowie at Beeb: Best of BBC Radio 68-72

    • 10 out of 10
    • David Bowie
    • The companion CD to a BBC television concert, BBC Radio Theatre has some of the best renditions of many of Bowie's best songs throughout his career. "I'm Afraid of Americans" is substantial

  • Spilt Milk

    • 10 out of 10
    • Jellyfish
    • The second and final album from this power-pop group makes me wish Jellyfish had been able to make just one more record together. The album is best enjoyed as a whole piece, flowing from one track to
  • Velocifero

    • 6 out of 10
    • Ladytron
    • "Back to the future" isn't the right turn of phrase for Ladytron's newest album,

  • Haunted

    • 10 out of 10
    • Poe
    • Dropping like a bomb on some of the blah musical offerings of her contemporaries, Haunted was one of the best albums of 2000, obliterating the competition.

      Ostensibly a tie-in to her brot

  • Plans

    • 8 out of 10
    • Death Cab for Cutie
    • With the introduction of Plans, Death Cab for Cutie became a new addition to many user's Artist list after the single "Soul Meets Body" became a hit on iTunes. Offering a fresh alternativ

Reader Specials

Visit Deals On The Web for the best deals on all consumer electronics, iPods, and more!

News

Gartner Reports iPhone Enterprise Ready - with Caveats

There have been several conflicting reports on the suitability of the iPhone for the enterprise, even with Apple’s enterprise portfolio of features in the iPhone 2.0 software. Gartner looked at OS X iPhone 2.0 and sized up its readiness according to a set of minimum requirements and found the iPhone to be "ready for the enterprise".

The report, written by Gartner’s Ken Dulaney, and obtained by iPO had these key findings:

  • The iPhone meets our minimum requirements and can be moved to the appliance- support level, which means support is limited to a narrow set of applications, such as voice, e-mail, personal information manager (PIM) and browsing.
  • The iPhone can be wiped clean via the issuance of a standard instruction from Exchange, and can force the use of a complex password if the alphanumeric setting is checked on the Exchange 2003 SP2 or 2007 administrative console.
  • Our tests of the complex password and the "wipe feature enforcement" indicate that the iPhone reacts the same as a Windows Mobile device, forcing the use of a complex password and clearing the device contents when the password policy is violated.

The report noted that even though iTunes must be deployed on the end user desktop because it plays a key role in enterprise management and security, Apple offers the ability for IT managers to control which functions iTunes can perform. [Note: Ryan Faas at Computerworld has written a detailed report on how to use the OS X iPhone Configuration Utility to lock down and configure various functions of the iPhone in accordance with enterprise policies.]

On the security side, the report noted that "The iPhone only implements four of the up to 46 Exchange security policies depending on the Exchange version ... If an enterprise is using any of these extensions, then it must reconcile the downgrade of these policies if deploying the iPhone."

Mr. Dulaney also wrote: "...in tests conducted by Gartner contacts, we have discovered that the product works via an unencrypted, distributed XML file which could be changed by the end user. Apple indicates that the profiles can be signed, warning the user of their legitimacy, but the most trusted management tools don’t empower the user to make these types of security decisions. We would like to see this application become a formal product and expanded to support the management and security features found in RIM’s BlackBerry Enterprise Server and in Microsoft’s System Center Mobile Device Manager."

In the remainder of the nine page report, Mr. Dulaney delved into some of the technical issues and inconveniences IT managers may want to consider: Battery Life, handling of attachments compared to the BlackBerry, calendar and e-mail problems, lack of cut-and-paste, and emergency dialing operations. On the positive side, the report said, "Apple has improved the overall e-mail experience with a separate contact application and contact search, and the iPhone has always offered the most readable e-mail. We consider its method for combining a global address list and a contact search for names to be the best we have seen."

The report concluded with this summary:

"Apple has delivered an iPhone that is acceptable for business use at the appliance level. Most prospective iPhone users will judge the device based on consumer appeal. The AppStore applications and the iPhone’s excellent browser are supplemented with an e-mail client, which provides acceptable business capability with excellence in some areas. "Those who previously used a BlackBerry Windows Mobile or Nokia smartphone device should note that the iPhone will require an assessment of trade-offs in hardware design and onboard functionality ... However, each enterprise will view iPhone through its own lens, which will be heavily tinted by the organization’s security and management needs. Enterprises should approach expanded use of the iPhone slowly and with close examination."

One of they important findings in the report is that the configuration and deployment of a complex smartphone is indeed a function of enterprise needs. What one company considers vital, another will opt to bypass for the sake of other features. In other words, as Mr. Dulaney concluded: "...each enterprise will view iPhone through its own lens, which will be heavily tinted by the organization’s security and management needs."

Post Your Comments

  Remember Me  Forgot your password?

Not a member? Register now. You can post comments without logging in, but they'll show up as a "guest" post.

Commenting is not available in this section entry.