Macs go to work

 

Connecting state and local government leaders

Apple Macintosh computers, riding the benefits of Intel processors and the popularity of the company's other products, are gradually finding their way into the workplace.

Capitol Mac

When you think of the Apple Macintosh, you might think of a smooth-running, elegantly designed, though comparatively expensive, laptop or desktop computer that is used largely in homes. But can Macs also play a part in the workplace?

The answer seems to be, increasingly, yes. For instance, the Orange County, Calif., Sheriff’s Department recently purchased 175 iMacs and MacBook laptops, which will work within the department's Microsoft Windows environment. "They are used in regular office space for all types of assignments," said Assistant Sheriff James McDonald.  "We also use them in the training room and we use some for video editing and podcasting."

Orange County is not alone. A recent study conducted by analyst firm Information Technology Intelligence Corp. (ITIC) seems to suggest Apple is creeping into the enterprise. A survey of 700 organizations — about 9 percent of which were government agencies — found that 23 percent reported that they have a significant number of Macs in their organizations. Significant, in this study, means more than 50 percent of the desktop computers.

"There is a distinct, discernible trend" of more Apple hardware use in the enterprise, said Laura DiDio, a principal at ITIC.

The rise of Macs seems to be the result of several factors. One, of course, is the quality of Apple — its products are renowned for their relative ease-of-use and secure settings. But perhaps more pertinent is that Apple's recent shift from using IBM PowerPC to Intel microprocessors lets users run Microsoft Windows programs, either through a dual-boot or virtualization arrangement.

Other factors include the Apple iPhone and iPod. Consumers have flocked to these devices, and a few were so impressed with them that they bought Macs.

"You had a situation where the consumers who loved Apple came into the office and asked the IT manager to use a Mac for work," DiDio said.

Daily use
Many government offices that have Macs are using them for specialized functions.

For instance, one of the largest clinics of the Veterans Affairs Department, the VA Palo Alto Health Care System, uses about 80 Macs for CT scans.

The clinic's doctors found that 3-D images provide far more information than 2-D ones, though 3-D images require more processing power. At first, the clinic set up its 3-D imaging software, OsiriX, on a set of Windows 2000 servers. This caused delays, however. So, instead, the unit equipped each doctor with a Mac powerful enough to run OsiriX, said Dr. Roy Soetikno, chief of the clinic's Gastrointestinal Section and Endoscopy Unit.

"Now we can have hundreds of people doing imaging on their desktops," Soetikno said.

The Army Research Laboratory in Aberdeen, Md., uses Macs to run modeling and simulation projects to help create safer vehicles for soldiers. The Army Aberdeen Test Center uses a fleet of Mac Pros for high-definition video editing. Forensics labs also seem to like Macs. Both the New York State Police and the Miami-Dade County Forensic Labs use them for computer forensic analysis. San Antonio just completed a proof-of-concept evaluation of whether it could use Macs for city operations.

The Mobile County, Ala., District Attorney's Office runs only Apple hardware. It has about 100 employees, all of whom use Apple MacBooks or MacBook Pro computers, said Lisa Lemler, the office's technology administrator.

The office’s IT staff has only three people, so the use of Apple computers helps streamline a lot of the low-level configuration duties that often besiege Microsoft Windows or Unix administrators. The Macs are "ready to go out of the box," Lemler said. Instead of Active Directory and Microsoft Exchange Server, the department uses Apple Open Directory and Apple Mail Server. "Information is granted based on the account on the laptop, so someone can't come in from the outside and jump on the network," Lemler said.

The district attorney's office uses iCal server for calendaring, and the tech team uses Apple Remote Desktop for updates and troubleshooting. The computers run Microsoft Office for Macs as the productivity suite.

File formats used to be a bigger problem than they are now, said District Attorney John Tyson. Microsoft Office documents now work reliably on PCs and Macs, and a lot more people use Web-based formats that all computers can understand.

"With people going more and more Web-based, it is a nonissue," Tyson said.

Enterprise support
Systems administrators suffer the enthusiasms of their users, trying to make some shiny new gadget or software work safely within the network. For this reason, they might mistrust Macs. But they should not fear the Apple. Contrary to popular belief, Macs have enterprise support tools and can coexist in a Windows world.

"Is there enough enterprise-management software [for Macs]? No, there is never enough," said ITIC’s DiDio. “Are there some? Yes.”

The first product any administrator should consider is Apple Mac OS X Server, which can act as a console for managing all the Macs on your network. It has a number of features that can streamline routine management tasks.

After installing the Macs, administrators will need some tools to keep them humming. Apple Remote Desktop can be a Swiss army knife for administrators. It can inventory all the Macs on a network and report on memory size and component use. It can download software to a large number of machines and be used to take control of a client's machine for remote diagnostics and repair. Administrators also can use the software to execute routine scripts that automatically perform actions across all the machines on a network.

Another essential tool is Apple's Workgroup Manager. Think of it as Active Directory for an Apple network. It allows administrators to set permissions for everyone on the network by specifying which users and groups of users can access which folders and programs. "Say you had a bank of machines that you wanted to prevent people from burning CDs on," said Eric Zelenka, senior worldwide product manager at Apple. “You can [specify] that these machines won't burn CDs and DVDs.”

The underlying technology for setting permissions for Macs is Open Directory, which is available on OS X Server. Open Directory uses Kerberos network authentication protocols and Lightweight Directory Access Protocol. Because both are open standards, administrators can also use third-party tools to set permissions for Macs.

A Mac in a Windows world
Administrators who have been around for a while might remember past headaches caused by integrating Macs into a Microsoft Windows environment. However, before they reach for the aspirin, they should take a look at what Apple and others have done to establish a peaceful coexistence with the software offerings from Redmond, Wash.

For example, OS X clients have the option of using Active Directory as the authenticating agent. So when a user logs in, the Microsoft Exchange server grants the necessary permissions.

"You point your client or your server at Active Directory, and your [operating system] will call Active Directory whenever its needs to view a user group lookup or any sort of authentication," Zelenka said. "Your Mac will adhere to whatever the security policies were that was set by Active Directory."

File sharing also has gotten easier in recent years. Mac OS X and OS X Server now include the Server Message Block client and server software, which allows authorized Mac users to browse files on Microsoft Windows computers. It also allows Microsoft Windows users to do the same on Mac computers.

Even if your organization uses Microsoft Exchange for e-mail, Mac users can easily send and receive e-mail messages. Exchange supports the Internet Message Access Protocol, and Mac uses IMAP to download and send messages through Apple's Mail client, the e-mail client in Microsoft Office for Mac or any other e-mail client that supports the protocol.

For better or worse, most enterprise networks are deployed from a Microsoft Windows environment. So it would be nice for the administrator to control all the Macs in the shop from a Microsoft Windows machine. To this end, a consortium of vendors have banded together as the Enterprise Desktop Alliance to offer a coherent toolset for managing Macs from a Windows environment. Companies include Centrify (for identity management), Parallels (for virtualization), Atempo (data security) and GroupLogic (for file and print services).

Steps to go
Although plenty of software is available for Apple enterprise support, questions remain about Apple's ability to support the hardware and software. A quick browse of the Apple Fed-talk mailing list finds no shortage of government employees trying to find answers to problems they've encountered as they try to get Macs to work in official environments.

Apple is "in position to support large sales of MacBooks," DiDio said. "I'm not sure they are in a position to...provide the large-scale technical support to the enterprise, should issues arise." As one IT manager told DiDio, "Look, I can't have people running to the mall when I have a problem."

Historically, Apple has been slow to support government-led standardization initiatives, such as the Common Access Card for military users. Apple now offers a guide for equipping Macs for CAC use, but not before more than a few administrators tried tackling the problem.

The Navy Marine Corps Intranet, for example, doesn't support Macs. Mac users can still access the Web-facing portions of their NMCI services. However, since 2006, logging on to NMCI services requires a digital certificate on a CAC or USB key drive. And Mac users with such certificates have found it difficult to access NMCI services, especially if their computers run the Tiger (OS X 10.4) or Leopard (OS X 10.5) operating systems. Fortunately, Dennis Hayes, chief technology officer at EDS, which manages NMCI, recently posted a set of procedures so Mac users can access NMCI's public-facing Web services, such as e-mail and calendar functions.

Hayes and other members of the EDS team worked with Apple's federal office to create a standard process for certifying NMCI users. EDS and Apple spent about two months creating, documenting and testing the procedure, Hayes said.

Apple has some catching up to do on the Federal Desktop Core Configuration, too. FDDC is a set of secure configurations for operating systems that federal agencies are mandated to use. Microsoft and the National Institute of Standards and Technology have hammered out a Windows configuration, but one is not in place for Mac OS X. The good news is that a team in the Army's chief information office is in the early stages of developing a comparable configuration model for Apple Macs.

The price of intangibles
When you buy Apple computers, you pay top dollar. DiDio said the price disparity between Macs and Windows computers has shrunk in the last few years, but a disparity still exists.

A recent scan through the General Services Administration's GSA Advantage finds that a MacBook could be acquired for as little as $1,900. This model, from reseller Portable One, has a 2.16 GHz processor, a 13.3-inch screen, 1G of working memory, a 120G hard drive, and a DVD read-and-write drive. A Windows laptop with a roughly similar set of attributes, an Acer Aspire 5315, could be acquired for $738.

Can this additional cost be justified? Some think so.

Mobile County’s Tyson said Macs establish an environment in which employees can think more creatively. "There are few people as creative as lawyers preparing their cases for trial and assembling their facts and various bits of evidence for their arguments," Tyson said. Having an operating system that supports a creative environment helps the agency tackle novel problems with greater ingenuity, the argument goes.

Apple Macs and their software have long been loved by creative types — a factor that is perhaps hard to quantify but easy to recognize by the degree of enthusiasm expressed by their users.

At the Embedded Systems Conference in Boston last fall, influential software developer Joel Spolsky talked about many of the intangibles that come with IT products.

For instance, he looked at the iPhone and the MacBook Air, both of which look totally seamless. "From an engineering perspective, you get the feeling if you accidentally swallowed [an iPhone] it'd go right down," he said. It wasn’t an engineering necessity to remove all the protrusions that break the lines of other laptops and phones, but the psychological effect does translate into greater sales and greater perceived satisfaction among users.

Can such psychological effects lead to real performance improvement?

"In order to marshal the resources necessary to [take on our] fights, we have to reach well beyond the limitations of our agency," Tyson said. "You can immediately see the advantages of having a robust and clever technology that allows successful communication across the board."

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.