You may have thought that last week was InfoWorld's official "Week of Apple" -- what with all the WWDC (Worldwide Developers Conference) coverage, reviews of Parallels Desktop 3.0, VMware Fusion Beta 4, Apple TV, Tom Yager's iPhone analysis, plus his Mac OS X Leopard developer preview. But we're not done with Apple just yet. Tomorrow we're posting part 3 of our extended Leopard preview. Also on that day, keep your eye out for a preview of the new Santa Rosa MacBook Pro.
Why all this attention paid to little old Apple? Conspiracy theorists (you know who you are) might blame it on Chief Technologist Yager, a card-carrying Mac partisan who may have overimbibed at the Cupertino Kool Aid dispenser. But the truth is far simpler than that: Apple's technology impresses us. What it lacks in market share, it makes make up for in great ideas, design, and products. As Yager puts it, "Macs are stable, standardized, and secure, equipped by default for remote and centralized management, extremely power efficient, ruggedly built and full peers in settings with any combination of Windows, Unix, Linux, and Mac clients, servers and services. Give any user a choice (and I think that professionals should be offered the choice now that full Windows compatibility makes the Mac a can't-lose choice), and they'll opt for a Mac." Well, maybe yes and maybe no. But at least InfoWorld readers will understand their options.
If you're not part of the Steve Jobs booster club and marching society, don't despair. We have plenty of non-Mac content for you to dig into. For starters, senior writer Matt Hines explores the sensitive topic of data security in "Helping retailers wipe ID data issue." In doing reporting for the story, Hines came to the realization that although enterprises have spent years implementing technologies to secure sensitive data, they’ve largely failed. If you want proof of that failure, consider all the highly publicized data loss incidents of the recent past. "Companies are really just beginning to wrap their arms around the need for an overarching data security strategy," Hines says. Yet despite all their best efforts, he adds, "Enterprises still lack visibility into data security."