Dave Siederer

Mobility Solutions Architect

Dave Siederer, SHIDave Siederer here from SHI’s Hardware & Advanced Solutions department. As Mobility Solutions Architect, I have an intimate, technical familiarity with mobile operating systems and management solutions. My expertise extends across Android, BlackBerry, and Windows 8, as well as a number of mobile device management solutions. I have particularly in-depth experience with Apple, since prior to my current position, I was one of SHI’s Apple Systems Engineers, and earlier in my career, I worked for Apple as a Mac Genius.

I’m always looking to help companies figure out their mobile environments, so feel free to reach out to me either by email or on Twitter at any time. You can also catch me on the radio — I deejay a local music radio show on the weekends called “The Decline” — although if you reach me there, I hope you’ll keep all requests related to the music!

Here’s how to take advantage of the Apple-Cisco partnership

wifiWe’ve been anxiously awaiting the fruits of the Apple-Cisco partnership and now we finally have the details.

Apple and Cisco have integrated their mobile and networking technologies to give users optimized Wi-Fi connectivity and streamlined VoIP capabilities, all while prioritizing business traffic. That means more reliable and faster speeds for employees connected to Cisco wireless networks.

Cisco and Apple have laid the groundwork for these enhancements, but system administrators will need to check a few boxes to make sure their users are up and running.

Let’s run through what network admins must know about these capabilities and how to enable them. (more…)

You may also be interested in:

2017 IT Preview: What to expect from our top partners in the new year We’re only a couple of weeks into 2017, but we’ve already got a lot of technology to look forward to. From the launch of new products to updates of ol...
Here’s how to build a cost-effective network and maximize E-Rate funding Armed with E-Rate funding, schools and libraries are bolstering their wireless networks by upgrading routers and adding access points. Many schools us...
5 components of a strong defense in depth IT environment If you knew your network had been breached, what would you do differently? If the answer is anything short of re-examining your entire arsenal of defe...

Here’s how to capitalize on iOS 9’s best new feature

devicesWhen Apple introduced iOS 9 in September, an unheralded but significant feature was included: the ability to assign apps to unique device identifiers rather than specific Apple IDs. This functionality allows companies to distribute apps to individual devices with little to no intervention on behalf of the end user.

Previously an absolute requirement of nearly any deployment, the Apple ID was doubly important since nearly every Mobile Device Management solution (MDM) requires an “agent.” Once downloaded from the App Store, agents patrol for common security breaches, such as “jailbreaking” devices, and allow devices to be found on a map through geolocation; without an agent, these imperative abilities are nonexistent. (more…)

You may also be interested in:

4 things you need to know before using Apple DEP Big business likes Apple -- most smartphones and tablets used in the corporate world bear the Apple logo (72 percent and 90 percent respectively). But...
A new option for organizations considering Apple’s Device Enrollment Program It’s the beginning of a new year, and organizations are rolling out new IT initiatives and goals for the next 12 months. If that means a migration to ...
6 Apple product upgrades that can impact your business Apple’s “Hey Siri, Give us a Hint” event on Sept. 9 gave us plenty of ideas about how businesses can use the new lineup of Apple devices. Updated mode...

Why enterprise iOS adoption surged before Apple’s mobile device management tools

iPad at workApple recently introduced a mobile device management enrollment solution for iOS that would make it easier for enterprise and education customers to roll out mass numbers of fully configured iPads or iPhones to employees without ever touching the device. For many in enterprise IT, this makes iOS a lot more appealing.

But that’s not to say the enterprise has ignored iPads and iPhones until now. In fact, Apple has made significant headway into the enterprise market over the last five years, with sales surging more than 1,000 percent at SHI. Not to mention that iOS activations made up 73 percent of total device activations in the fourth quarter of 2013 among enterprises.

Even before a solution existed for a smooth enterprise deployment, many pioneering organizations sought out iOS anyway, a testament to the strengths of Apple’s products. But still, having every user install the necessary apps and configure settings would have been a major drain on time and resources. (more…)

You may also be interested in:

Is your retail store ready for new tech? The National Retail Federation's Big Show was the biggest one yet, as 35,000 retail professionals flooded the Javits Center in New York City to see th...
What the Apple Watch and wearable tech mean for IT staff (Hint: BYOW) One million devices. That’s the estimate for how many Apple Watches were pre-ordered on the first day of pre-sale. This may sound like a large number,...
2013: The year of enterprise IT Remember when Wall Street was bullish over the future of IT? When the Nasdaq soared 40 percent over 12 months, outpacing both the S&P 500 and the ...

What iOS 7’s Activation Lock means for the enterprise

One of the bigger stories out of Apple’s introduction of iOS 7 at its Worldwide Developers Conference (WWDC) was its Activation Lock feature. Law enforcement officials have been calling on Apple and other phone manufacturers to proactively deter theft of their products as cellphone thefts rise, and Activation Lock seems to be Apple’s answer.

Activation Lock, if you haven’t yet heard, allows a user to lock a lost or stolen iPhone. The phone can’t be reactivated or wiped and resold without the user’s Apple ID and password. Law enforcement and users seem to like the change, but what about enterprises? What does Activation Lock mean to IT? Here are two major takeaways:

  1. Activation Lock creates a small risk. The one problem with Activation Lock in the enterprise is its potential to be misused by a disgruntled or laid off employee, who could conceivably turn in his or her phone, put an Activation Lock on it, and leave the company a brick as a farewell gift. This is unlikely but possible based on what we know about the feature. Apple, however, is probably aware of the potential sensitivities, and the feature will likely have safeguards, like a reclamation feature that would restore a phone that was improperly locked. But, we still don’t know all the details.
  2. Activation Lock is for users, not businesses. While it makes sense that average iPhone users would want a way to lock their phone in the event it’s lost or stolen, enterprises are less concerned about the reselling of a stolen phone. Higher on the list of IT priorities is data loss or leaks. And these companies should already have MDM solutions in place to remote wipe devices that go missing. (more…)

You may also be interested in:

Why enterprise iOS adoption surged before Apple’s mobile device management tools Apple recently introduced a mobile device management enrollment solution for iOS that would make it easier for enterprise and education customers to r...
When will mobility become the norm in business? I love the stat from Xcube Labs that found 67 percent of CIOs believe mobility will impact their businesses more than the Internet did in the 1990s. I...
The Lenovo Helix: The next step in enterprise mobility How many devices do you need in a typical workday to do your job well? If a Forrester study from last year is any indication, 74 percent of you use tw...

Mobile device management at the application layer

In this era of tech-savvy business people using their personal devices to work, employees are concerned that if they lose their device — or if it’s stolen — the company will wipe it clean to protect any sensitive company data. Now, it’s not a mobile device management (MDM) manager’s job to care if a few personal pictures get lost, but they should realize that end users do care, and as a result might attempt to circumvent the MDM to keep their personal contacts, photos, and other information safe.

MDM suppliers are looking to secure smart devices from the application layer because of this shift in mentality to keep personal and corporate information separate. It’s a double-edged sword, because employees want an unobtrusive tool that doesn’t contain a lot of oversight but also allows IT to stay up-to-date on their organization’s security requirements.

Can you be non-intrusive and secure?

The most requested feature of 2012 we heard from customers was the ability to wipe corporate data off of a device without deleting the contents of the entire device. That’s been the problem so far with most MDM solutions – they treat the device as a single container and make it work in a way that the organization dictates. With the shift to managing the applications, you give the user a chance to use the device as they intended, while allowing for extra management of content and security.

One problem that arises when you look further into application management is that app markets like the Google Play Store do very little in terms of vetting applications before they’re made available to the public. Though they’re making a more concerted effort now than a few months ago, the amount of oversight is still fairly low. From an MDM perspective, if you knew the name of an application you could add it to a blacklist, but malicious applications tend to multiply by the thousands every day. It would be nearly impossible to block them all. (more…)

You may also be interested in:

Why enterprise iOS adoption surged before Apple’s mobile device management tools Apple recently introduced a mobile device management enrollment solution for iOS that would make it easier for enterprise and education customers to r...
4 steps to mobile device management for small businesses There's no denying or avoiding the proliferation of personal mobile devices in the workplace. In fact, Gartner predicts that by 2017, half of all empl...
6 Apple product upgrades that can impact your business Apple’s “Hey Siri, Give us a Hint” event on Sept. 9 gave us plenty of ideas about how businesses can use the new lineup of Apple devices. Updated mode...