Feeds

Apple in the workplace

Do you love it or loathe it?

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Mini Poll Apple's success as a manufacturer of consumer electronics is beyond question. The kit has become an accepted part of many people's lives, and the brand is one of the most well respected and desired on the planet.

You might think this is good or bad. You might not care. This is secondary to the fact that the Apple phenomenon is with us and it has consequences that cannot be ignored.

While some point to Apple's innovation and knack for making technology and services highly accessible for the masses as a force for good, others highlight its controlling and often proprietary behaviour - arguably stimulating the reversal of a 20 year old trend towards openness and interoperability.

But what happens when all of this spills over into the world of business IT? We used to talk about "Mac creep" taking place in different parts of the organisation as users made unilateral decisions, independently of IT, to acquire Apple via local budgets or expense accounts. More recently, with the iPhone, it seems less of a creep and more of explosion - at least that's the perception, as Apple handhelds are apparently getting hooked up to corporate Exchange and Domino servers across the world. There is then the iPad, which comes out of the box almost begging to be hooked into the corporate network.

Many people are so taken with Apple kit that they naturally want to bring it into the workplace or persuade their organisations to "go Apple" in preference to Microsoft, Nokia and other corporate incumbents. It's the most prominent example of the consumerisation of IT in action.

What's not to like? After all, if users get the kit they want, they are more likely to make full use of it for business advantage, aren't they? And if they are willing to spend their own money to acquire it, that's even better, isn't it?

If you have thoughts on the Apple phenomenon, tell us what you think in our latest Reg reader survey - and rest assured, we have left space for you to express your opinions as openly and freely as you like. ®

Beginner's guide to SSL certificates

More from The Register

next story
Bono apologises for iTunes album dump
Megalomania, generosity and FEAR of irrelevance drove group to Apple deal
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Arab States make play for greater government control of the internet
Nerds told to get lost in last-minute power grab bid at UN meeting
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
Zippy one-liners, broken promises: Doctor Who on the Orient Express
Series finally hits stride, but Clara's U-turn is baffling
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.