Pokey succulent

  • 1 Post
  • 11 Comments
Joined 2 years ago
cake
Cake day: June 16th, 2023

help-circle
  • I think this idea could be true for some businesses, primarily those that only use their endpoints (laptops) for simple documentation tasks and/or as gateways to web-based tools. However, in addition to “user demand” there needs to be an adequate business case ($$ savings) plus enough technical knowledge on the IT implementation side to made the move. I’ve worked in shops moving from a large Microsoft Windows footprint to Apple products and it is not always an easy transition, even with tools like Jamf.

    Since companies will still have to rely on a Windows- or Linux-based backend (on prem or cloud) they’ll need admins that can handle integrating those macOS and iOS devices into their MDM systems alongside the Windows systems. There are also a lot of users out there who may have no experience with using a Mac, either for personal or business use, that will need re-training to use a Mac laptop. Both integration / transition of systems and users will introduce delays and downtime into a company’s business processes, increasing the cost to transition.

    None of the above is a reason not to move from Microsoft to Apple, but it’s definitely not a simple process and that can lead to slow (or no) transitions for large businesses, no matter how many users ask for it.












  • This is good advice if your phone is actively being hacked in real time when you turn it off. Otherwise all you’re doing is delaying or temporarily interrupting any data collection that’s going on in the background. Any apps that are sophisticated enough to run undetected by a normal user are also going to restart themselves as soon as the phone boots up again.

    Also, if you are being targeted by a hacker that is knowledgeable enough to actively get into your device (especially an iPhone) without physical access then you’re better off destroying it and buying a new one, along with doing a full reset of all of your passwords, 2FA setup, and anything else you think you’re relying on for “security”.