{"id":429,"date":"2010-06-02T00:00:00","date_gmt":"2010-06-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/06\/02\/iphone-and-ipad-integration-for-businesses\/"},"modified":"2021-12-30T11:37:18","modified_gmt":"2021-12-30T11:37:18","slug":"iphone-and-ipad-integration-for-businesses","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/06\/02\/iphone-and-ipad-integration-for-businesses\/","title":{"rendered":"iPhone and iPad Integration for Businesses"},"content":{"rendered":"<p>Companies can now integrate the iPhone and iPad into their IT infrastructure with equinux&#8217;s safe and cost effective solution.  TARMAC is the first professional provisioning tool tailored specifically for the Apple platform.  With TARMAC medium to large enterprises can securely set up and manage their iPhones and iPads over-the-air.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Installation requires an Intel-based Mac running Mac OS X 10.5 or newer (Client and Server).<\/p>\n<p>Administrators and consultants can register on the equinux website to try out a demo installation of TARMAC.<\/p>\n<p>http:\/\/www.earthtimes.org\/articles\/show\/iphone-and-ipad-integration-for-businesses,1326954.shtml<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-429","post","type-post","status-publish","format-standard","hentry","category-mobility"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=429"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/429\/revisions"}],"predecessor-version":[{"id":2916,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/429\/revisions\/2916"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}