RIP. It’s been coming for a while, and Control Panel will likely be on hospice for a few more years, but it will be a sad day when control panel is gone.
RIP. It’s been coming for a while, and Control Panel will likely be on hospice for a few more years, but it will be a sad day when control panel is gone.
While there are some really cool things coming (spatial video, action button, etc), the only reason to recommend an upgrade this year is for Apple Intelligence features. If your phone is old and it’s just your time to upgrade, then it’s a great year for it. But if you’ve got a newer phone, don’t rush for the upgrade.
MDMs already allow business to manage security permissions for apps. I don’t see why this would be any different. If the company has an MDM, this change should have no impact on their users. If they don’t have an MDM, they really need to get one, not just for this, but a lot of other security and usability reasons.
This will really suck for users of personal devices, though.
My team has a cost estimate for Azure Stack HCI as that was the winner for us. However, cost to switch is high and we’re just waiting for now. We will see if that waiting is a mistake….
I love spatial audio itself, but I do turn off the head tracking. Leaving spatial audio on but turning tracking off gives the pseudo “surround sound” experience without the sound changing direction on you.
As someone that has managed MDM platforms before, I absolutely agree with this. If it’s a work laptop, then yeah they have the right to install MDM on it. If it’s a personal laptop, I really wouldn’t recommend it.
MDM gives the admins full control over the device. They can run commands to wipe the device, install software, set policies, gather inventory data, or any custom action they want.
The MDM platforms I’ve used can’t be used to spy on people, but they absolutely have the power to install software or run scripts that can spy on you. IT probably doesn’t have time to actually watch individual employees, but anything they do likely has a built in report that can give data on who did what, prioritizing based on whatever the company is looking for.
Always assume that companies are monitoring everything going on with the computers and WiFi networks that they own. They likely are checking things out to make sure activity is safe and appropriate.