The iPhone 2.0 and its App Store roil the multitudes while we get serious about Mac security Apple just keeps hogging the spotlight. The run-up to iPhone 2.0’s Fabulous Friday reached its climax Thursday morning when Caroline McCarthy, a CNet blogger, speculated that the launch of the divine device might actually be bad for social networking. Why? Because the hype around the new iPhone App Store might eclipse the hype around big social networking sites. Well, I’ll add that to my list of things to worry about. Meanwhile, at InfoWorld, we’re sobering up this party with “Ten enterprise apps for the iPhone,” which overlooks Super Monkey Ball and AOL Radio in favor of CRM, business intelligence, and even a Web development tool. A little stodgy of us? Maybe. But we figure you’ll find the goofy stuff easily enough and turn to us when you’re ready to get down to business. Executive Editor Galen Gruman was already moving in that direction when he wrote “How to make the new iPhone work at work” last month. By the time you read this, Tom Yager, InfoWorld’s chief technologist, will have been running the new iPhone through its paces; stay tuned for his InfoWorld Test Center review. I have no idea what to expect. Tom’s fans will recall that last year he was wildly enthusiastic about the first iPhone — until he got his hands on one and analyzed the pricing. Then, reviewing the device from an enterprise user perspective, he gave it a 4.9 out of a possible 10, which resulted in so many flaming e-mails Tom almost had to join a witness protection program. With iPhone 2.0, Apple has answered almost all of Tom’s objections. Will he like it? Stay tuned. As you devour all things iPhone, be sure to check out another Apple delicacy: contributor Glenn Fleishman’s feature story, “How to secure Macs in business.” Security? For the Mac? Come on, that’s for those Windows guys to worry about. But for the Mac to realize its newfound potential in the enterprise — a windfall courtesy of the Vista fiasco — the security angle must be taken seriously. Glenn lists seven security flaws the Mac must overcome, each one followed by actionable advice. The iPhone may be entering the enterprise through the backdoor in droves (more accurately in the front pocket), but laying out the logistics of deploying Macs in the enterprise represents a different kind of triumph. Apple is moving beyond its niche in business computing to play a transformational role. That surprising development is turning out to be a lot of fun to watch. Technology Industry