SlideShare a Scribd company logo
University	of	New	Mexico	Extension,	HSC	iPad	Orienta;on	Course.	
Abstract	
This	course	is	to	familiarize	members	of	the	audience	with	5ile	management,	security,	
calendaring,	messaging,	storage	and	care	for	Apple’s	iPad.	
Overview	
Mobile	computing	has	changed	the	way	all	of	us	interact	even	in	such	high-touch	
environments	as	medicine	and	education.		Although	the	industry	has	overtaken	the	world	
by	storm,	it	still	requires	a	slightly	different	strategy	compared	to	laptops	or	desktops.		
These	devices	are	highly	agile	and	powerful	which	can	enable	powerful	treatment	of	clients.		
Yet	at	that	same	time	that	power	can	result	in	unwanted	exposures	for	both	regulated	
(HIPPA,	SOX,	HiTECH)	and	non-regulated	industries.	
Top	Level	Domains	
These	are	some	of	the	core	topics	included	in	the	training.	
• File	Management	
o iCloud,	SkyDrive,	VNext	Cloud	
o Transferring	5iles	to	and	from	the	device	
• Security	and	Pro5iles	
• Passcode	Security	
o Passcode	lengths	and	automatic	wipe	
• Remote-Wipe,	Find	My	iPad	
• WiFi	Security	and	Distribution	
• WebClips,	Bookmarks	and	Shortcuts	
• Common	Web	Browsing	Tools	(Safari,	Chrome,	Dolphin)	
• Cleaning	and	Protecting,	Ruggedization	
• Battery	care	and	management.	
• Remote	Desktop	Access	(RDP),	Citrix,	LogMeIn	
• Calendaring,	sharing	calendars,	“amion,”	synchronizing	calendars	
• Multimedia,	Facetime,	Skype,	Facebook	chatting	
• Mobile	Provisioning:		Sprint,	Verizon,	AT&T	
• Application	Purchasing,	Installing,	Security	
• Backup	of	Data,	Apps	
• Styluses:		Wacom	Bamboo	$30,	Targus	$15,	Grif5in	$9		
Summary	
The	topics	above	illustrate	the	goal	of	the	training,	which	is	to	not	only	make	the	medical	
staff	familiar	and	comfortable	with	the	new	mobile	devices,	but	to	also	apprise	them	of	
security	measures	designed	to	easily	and	transparently	protect	them.	
About	the	Instructor	
NM	Extension	has	provisioned	instructor	Gouthum	Karadi	of	Virtual	Nexus	to	familiarize	
medical	staff	with	their	modern	iPad	tablets.		Virtual	Nexus	is	the	only	Apple	Certi5ied	
Consultancy		with	the	Mobility	Technical	Competency	(MTC)	within	300	miles	as	well	as	a	
Microsoft	Partner.		Furthermore	they	have	done	designs	and	rollouts	for	thousands	of	the	
devices	at	health	providers	nationwide.

More Related Content

Similar to UNM iPad Training 2013 - VirtualNexus

dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
ssusera76ea9
 
Cloud Backup Overview
Cloud Backup OverviewCloud Backup Overview
Cloud Backup Overview
ddaragh
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
UL Transaction Security
 
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Faindra Jabbar
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
Brad Deflin
 
MerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptxMerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptx
VijayIthape3
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
Domenico Catalano
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.
CIOEastAfrica
 
Are you ready for Mobile?
Are you ready for Mobile?Are you ready for Mobile?
Are you ready for Mobile?
Exadel
 
Optimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT StrategyOptimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT Strategy
Advanced Technology Consulting (ATC)
 
Databases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeDatabases & Challenges of a Digital Age
Databases & Challenges of a Digital Age
Wendy Lile
 
Best Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsBest Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security Products
Estuate, Inc.
 
CipherGraph Networks: Cloud Access Gateway
CipherGraph Networks: Cloud Access GatewayCipherGraph Networks: Cloud Access Gateway
CipherGraph Networks: Cloud Access Gateway
CipherGraph Networks
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
UL Transaction Security
 
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Dell World
 
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforceStorware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Pawel Maczka
 
melding digital asset management
melding digital asset managementmelding digital asset management
melding digital asset managementDavid Miller
 
Corporate Mobility Insights
Corporate Mobility InsightsCorporate Mobility Insights
Corporate Mobility Insights
Joe Robens
 
Redrawing the Cyber Defense Frontier
Redrawing the Cyber Defense FrontierRedrawing the Cyber Defense Frontier
Redrawing the Cyber Defense Frontier
Joe Hage
 
HulaDrive
HulaDriveHulaDrive
HulaDrive
henry1526
 

Similar to UNM iPad Training 2013 - VirtualNexus (20)

dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Cloud Backup Overview
Cloud Backup OverviewCloud Backup Overview
Cloud Backup Overview
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
 
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
MerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptxMerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptx
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.
 
Are you ready for Mobile?
Are you ready for Mobile?Are you ready for Mobile?
Are you ready for Mobile?
 
Optimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT StrategyOptimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT Strategy
 
Databases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeDatabases & Challenges of a Digital Age
Databases & Challenges of a Digital Age
 
Best Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsBest Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security Products
 
CipherGraph Networks: Cloud Access Gateway
CipherGraph Networks: Cloud Access GatewayCipherGraph Networks: Cloud Access Gateway
CipherGraph Networks: Cloud Access Gateway
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
 
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforceStorware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
 
melding digital asset management
melding digital asset managementmelding digital asset management
melding digital asset management
 
Corporate Mobility Insights
Corporate Mobility InsightsCorporate Mobility Insights
Corporate Mobility Insights
 
Redrawing the Cyber Defense Frontier
Redrawing the Cyber Defense FrontierRedrawing the Cyber Defense Frontier
Redrawing the Cyber Defense Frontier
 
HulaDrive
HulaDriveHulaDrive
HulaDrive
 

UNM iPad Training 2013 - VirtualNexus