Apple Touch OS 3.0 사용자 설명서

다운로드
페이지 153
Similarly, when you disable contacts or calendars in an MobileMe or Exchange account, 
or if you delete an account, iPod touch asks if you want to keep information or delete it.
You can add contacts using an LDAP account if your company or organization 
supports it. See “Adding Contacts” on page 79.
You can subscribe to CalDAV or iCal (.ics) calendars. See “Subscribing to Calendars”  
on page 70.
Push Accounts
MobileMe, Microsoft Exchange, and Yahoo! Mail are known as “push” accounts. When 
new information is available, such as the arrival of an email message, the information 
is automatically delivered (pushed) to iPod touch. (In contrast, “fetch” services require 
your email software to periodically check with your service provider to see if new 
messages have arrived, and then request them to be delivered.) MobileMe and 
Exchange also use push to sync your contacts, calendars, and bookmarks (MobileMe 
only) if you have those items selected in the account settings. 
Synced information is transferred automatically over your wireless connection; you 
don’t need to connect iPod touch to your computer to sync. iPod touch can receive 
pushed data over a Wi-Fi connection only when iPod touch is awake (the screen is on, 
or iPod touch is connected to your computer or a power adapter).
Installing Configuration Profiles
If you’re in an enterprise environment, you may be able to set up accounts and 
other items on iPod touch by installing a configuration profile. Configuration profiles 
provide a way for system administrators to quickly set up your iPod touch to work 
with the information systems at your company, school, or organization. For example, a 
configuration profile might set up your iPod touch to access the Microsoft Exchange 
servers at work, enabling iPod touch to access your Exchange email, calendars, and 
contacts.
Configuration profiles can configure multiple settings on iPod touch all at once. For 
example, a configuration profile can set up your Microsoft Exchange account, VPN 
account, and certificates for secure access to your company’s network and information. 
A configuration profile may turn on the Passcode Lock, requiring you to create and 
enter a passcode for using iPod touch.
Your system administrator may distribute configuration profiles by email or by putting 
them on a secure webpage. A system administrator may also install a configuration 
profile directly on iPod touch for you.
 
14 
 
Chapter 1    
Getting Started