(Source: TechRepublic) … user’s needs, and this entailed a separate network, additional software, the necessity of complying with various Apple-related security standards, and so forth.