LogMeIn Lets Mac Users Control Their Computers RemotelyLogMeIn Lets Mac Users Control Their Computers Remotely
LogMeIn also released in beta LogMeIn Rescue for the Mac, a software-as-a-service offering that gives support technicians remote access for diagnostics and repair.
December 4, 2007
LogMeIn on Tuesday released free software that makes it possible to remotely control an Apple Mac from another Mac or from a PC running Windows or Linux.
In addition, the company released in beta LogMeIn Rescue for the Mac, a software-as-a-service offering that gives support technicians remote access for diagnostics and repair. LogMeIn Free for the Mac requires the user to install the LogMeIn software, which is available through the company's Web site. Once deployed, the software lets users control their Macs from any computer by recreating the Mac's user interface in the accessing computer's Web browser. The service, which has been available for some time for Windows PCs, was extended to the Mac because of the latter machine's increasing use in homes and businesses, LogMeIn said. More than 30,000 Mac owners joined the company's beta program. In October, Apple reported that record Mac sales helped boost profits in its fourth fiscal quarter, ended Sept. 30, 67% from the same period a year ago to $904 million. The company said sales of Mac computers rose 34% over a year ago. Apple shipped a 2.2 million Macs in the quarter, 400,000 more units than its previous quarterly record. LogMeIn Rescue for the Mac requires the download of an applet to the remote machine before a support technician can gain control. Once the applet is installed, a technician can perform diagnostics and repair the machine. The Web-based software tool is available through the LogMeIn Web site. Both products are available for Mac OS X 10.4, called Tiger; and for version 10.5, Leopard. LogMeIn software works on Power PC and Intel-based Macs. In the summer, LogMeIn introduced remote connectivity and support tools for smartphones. The SaaS offering recreates a replica of the smartphone's user interface on the technician's computer screen.
About the Author(s)
You May Also Like
Cloud Security Maturity Model: Vision, Path, Execution
Implementing Privacy by Design into Information Systems
Edge Computing Bridges IT and OT People, Process, and Technology
Checklist: 7 Essentials for Securing Modern Applications
Top Six Recommendations to Improve User Productivity with a Hybrid Architecture