Feeds
80%
Apple_iPad_001_SM

Apple iPad

It's in our hands - should it be in yours?

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

Review Curse those Icelanders and their volcanoes. I wasn’t surprised when Apple delayed the iPad's UK launch, as friends in the US had told me that the initial shipments in their local Apple Stores had sold out very quickly.

Apple iPad

iPad: touchy-feely like only Apple can make 'em

Unfortunately, my cunning plan to get one shipped over from New York was derailed by the Icelandic apocalypse and I had to endure a fortnight of frustrated techno-lust before I was able to get my hands on one.

But now I have, and sitting before me is the 16GB Wi-Fi only model.

The basic technical details of the iPad’s design are now thoroughly well-known, including its 9.7in touch-sensitive screen, ARM-based A4 processor, and Apple’s extended hissy-fit with Adobe over Flash support. What the tech specs don’t convey is the experience of using the iPad.

Apple iPad and iPad 3g

If only the Wi-Fi only iPad (left) both had the 3G model's wireless window

But just take a look at the ad on Apple’s web site. You’ll notice that the video doesn’t show the faces of any of the people using the iPad. All you see are fingers and legs – fingers flicking across the touch-sensitive screen, while the legs are kicked up on the sofa. The iPad, in short, is all about comfort.

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.