Apple Computer Inc.’s iPad family of iOS-powered tablets have been popular in many educational settings for several years. Today, technologies from Apple and Ivanti are helping educators and classroom technology administrators to ease and speed deployment, management, sharing, and integration …Read more
Every teacher and curriculum developer faces the same challenge. How best to deliver instruction that acknowledges and works with individual students’ needs and differences, yet maximizes success for the entire class? Increasingly, teachers and technology administrators face analogous challenges where …Read more
Are USB flash drives passé? You might think so given that computing and storage are increasingly moving to the cloud. However, Lifewire’s Patrick Hyde writes:
“With the growth of cloud computing and storage, physical memory is less essential for transporting …Read more
What do managing Macs and the song “Mack the Knife” (“Mackie Messer” in German) by Bertolt Brecht and Kurt Weill have in common? The final verse contains a clue. This verse wasn’t included in the original play “The Threepenny Opera” …Read more
For its recent study, “Unified Endpoint Management: Simplifying the Security and Support of PC and Mobile Devices,” Enterprise Management Associates® (EMA™) surveyed more than 100 IT directors. The results of that survey identify multiple benefits of unified endpoint management (UEM), …Read more
For its recent study, “Unified Endpoint Management: Simplifying the Security and Support of PC and Mobile Devices,” Enterprise Management Associates® (EMA™) surveyed more than 100 IT directors. The results of that survey indicate multiple points of confluence between user desires …Read more
UEM and cybersecurity are separate specialties within many enterprises and IT teams. However, these two important disciplines are inextricably intertwined. Herewith, some thoughts on those interdependencies and what they mean to your UEM and security management efforts.
Security Begins at… Read more
UEM and ITSM are separate specialties within many enterprises and IT teams. However, there is one critical link that connects these two important disciplines: users. Herewith, some thoughts on that connection and what it means to your ITSM and UEM …Read more
It caused confusion and panic. A handful of actors led by Orson Welles, captivated radio listeners all over the country on Halloween-eve 1938 with a chilling account of an alien invasion.
I hesitate to call it a hoax. Welles’ audio …Read more