Hi. I am new to the i-technology. I need to perform a security assessment of the device, so I am feverishly reading this site for information. Great source of goodies!
How to deploy it to business users so they don't expose company information. I am also trying to find any weird behaviors in the device. Most users have security as their last concern.