MacTech Pro Events are the next incarnation of MacTech’s successful one-day, single-track, regional hotel-based seminars with a specific focus on the needs of professional Apple IT Pros, techs and consultants. These events are specifically designed for those that support others using Apple technologies ... including small-to-medium sized business, organization support staff, and specialized Apple consultants.
With an all new curriculum built from the ground up, the event benefits both return attendees and those that have never attended a MacTech event. Best yet, this in person event maximizes attendees chance to meet with peers, find critical vendor contacts, and foster the type of collaborative networking that the Apple community is famous for.
Included: Packed schedule. All sessions. Expert speakers. Lunch and breaks. Vendor interaction. See more (in general) about MacTech Pro, or below for this specific city's event.
More info about...
About the Event
Date: April 3, 2019
Time: All Day. See Detailed Schedule.
Registration at 8:30am
Sessions start at 9am. Day ends by 6pm.
Sheraton Commander Hotel
16 Garden St.
Cambridge MA 02138
Sessions Chair: Andy Espo
Andy Espo, Call Andy! Macintosh ConsultingIn 1988, while running a successful event production company, Andy Espo realized his business' need for a computer system. 'At that time, the only choices available were DOS and Mac,' commented Andy, 'It was a pretty easy decision!' With experience in professional audio, video, theatrical lighting and scenery, Andy was determined to add the automation of his own business to his technical repertoire. As his company grew, so too did his reputation for knowing Macs. In 1998, Andy transitioned out of event production and into being the full-time, 'Mac-Guy'. Today, Call Andy! Macintosh Consulting retains an array of clients in the public relations, retail, legal, marketing, architecture, advertising and design sectors. Andy is a member of the Apple Consultants Network.
Leon Lincoln, VF CorporationLeon Lincoln is a Solutions Delivery Engineer - Elevated Design at VF Corporation which is an American worldwide apparel and footwear company founded in 1899 and headquartered in Greensboro, North Carolina; VF owns brands such as Jansport, Kipling, Lee, Majestic, Napapijri, Reef, The North Face, Timberland, Vans, Wrangler and Dickies. Stationed at Timberlands HQ in Stratham, NH, Leon supports the Macintosh infrastructure environment, operational support and device management leveraging JAMF Pro environment along with global support for the designers. With over thirty years experience in developing and managing the Mac environment for such companies as the Broad Institute of MIT and Harvard, New England Journal of Medicine/Mass Medical Society and many different printing companies, Leon has worked as a System Administrator and Desktop Support Engineer over the years and has worked with every Mac OS from Apple since 1984 to Present.
Jack-Daniyel Strong, Strong SolutionsJack is the President of J-D Strong Consulting, Inc. and Strong Solutions. As a member of the Apple Consultants Network, grew from a one-man consultancy into an Apple Authorized Reseller and Service Provider for the Eastern Washington and Northern Idaho area. JD joined the team of Watchman Monitoring two years ago to help with documentation and support. JD continues to run a small MSP in his free time.
Dave Hamilton, The Mac Observer & BackBeat MediaSince 1998, Dave Hamilton has been at the heart of the Apple community. Dave is the President and co-Founder of The Mac Observer, BackBeat Media, and Mac Geek Gab. In addition to his publishing career -- and, perhaps, at the heart of it -- Dave has extensive experience with macOS and iOS. He has a background in providing tech support services to both businesses and individuals, as well as working on projects for much larger clients such as Citibank. TL;DR: Dave loves helping people get those most out of their technology, and it shows.
Avery Chipka, Circle Technology Collective InternationalAvery Chipka is a Senior Partner, and the Chief Security Officer at CTCI. CTCI provides enterprise level IT solutions to private and public sector organizations throughout the world, and specializes in the delivery of managed services and single point of contact IT solutions. Avery has over twenty years of experience in the Apple admin community, and has been speaking at IT and security focused events and conferences since 2002. Avery holds an extensive number of certifications from organizations including, but not limited to, DHS, FEMA, Apple, Microsoft, Cisco, Dell, Adobe, and CompTIA.
Neil Ticktin, MacTech MagazineNeil not only plays host for all MacTech events, but aids the session chairs for all MacTech events (over 100 events since 2010). Neil has been the Editor-in-Chief and Publisher of MacTech Magazine since 1992. With both a technical and business background, Neil has authored hundreds of articles including most of MacTech's well known benchmarking articles on productivity applications, virtualization, and performance products.
Max Buxton, CircleMax Buxton is the Manager of IT for Circle, a consumer finance startup shaking up the global economy by making money simple. With us, you can send money like a text -- instant, secure and free -- whether your friend is across the table or across the ocean. Unlike existing systems that are closed and proprietary, Circle uses open internet standards and protocols, including the blockchain. Max manages IT for Circle's worldwide offices, utilizing a purely cloud-based infrastructure for a lean, efficient group of solutions. In his spare time, he enjoys motorcycle touring, logging thousands of miles each year.
Kyle Crawshaw, Circle Internet FinancialKyle is an IT Systems Administrator for Circle Internet Financial.
Josh Long, IntegoJoshua Long (@theJoshMeister), Intego's Chief Security Analyst, is a renowned security researcher and writer. Josh has a master's degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Business Administration and Computer and Information Security. His research has been featured by many fine publications such as CNET, CBS News, ZDNet UK, Lifehacker, CIO, Macworld, The Register, Naked Security, The Mac Security Blog, and MacTech Magazine.
- Support Desk Systems
Managing communication with your users and your team becomes exponentially more difficult as communication methods increase. Email, phone calls, voicemail, text messages, Facebook messenger, Twitter, Slack and more continue to vie for your attention. How best to share that direct message with your team? How do you stay on message, but let everyone feel heard and in the loop? Support Desk systems with some work can become your communication hub, helping your team be more efficient, stay on message, and be in the loop. Learn how to build your process to increase your productivity, get more done, and helps your organization be more efficient, profitable, and effective while at the same time providing better serving to those that you support.
- What does "Good Wi-Fi" mean in 2019?
Wi-Fi has been known by 802.11g/n/ac, now the Wi-Fi Alliance has introduced Wi-Fi 6. We’ve had Wi-Fi around for quite some time, but we’re heading into a new era for Wi-Fi. We are rewriting the book on how to have reliable and performant Wi-Fi. In addition, Wi-Fi networks are playing more and more of a role in mobile services with that important growing as 5G, IoT and more become more prevalent. The days Wi-Fi being relatively simple are gone, and it’s the responsibility of both consultants and IT to be ready. This session will help you answer the call for “good Wi-Fi” in 2019.
- Backup Strategies for a Cloud Infrastructure
Cloud, cloud, cloud. The image is meant to convey advanced, cushy, flexible and extensible solutions. But, with all the benefits, there are some real dangers that many have just ignored. Forefront of the list is how do you create a backup strategy when everything is in the cloud? Are you currently relying on that single source provider providing cloud services to also backup your data -- mission critical or otherwise? The tools have been limited to date, but we’re finally seeing some good methodologies to backup the cloud. Come hear about the ingredients you need to know to create the right recipe for those you support.
- Continuity Planning and Their Everyday Benefits
With all that we’ve seen in recent years with disasters: fires, hurricanes, storms and more -- continuity planning is no longer a nicety, it’s a very real need. Planning for continuity also can also play into how you can be “Cyber Resilient” as part of a security plan. Continuity Planning can be daunting because there are so many ways things can go wrong, but with today’s technologies, it’s actually easier than ever. Even better, there’s daily benefits that have nothing to do with continuity or disaster. In this session, we’ll talk about how you can ensure that things can keep running when disaster strikes, and their everyday benefits.
- Swiftly Scripting the Command Line
The command line is one of the most useful tools for techs, but it can be daunting for some. And, even those that have mastered it have been looking for a way for users to benefit from their magic. Finally, we have a real solution. Apple’s Swift programming language is most widely used for iOS and macOS development in Xcode. Swift can also be used like a traditional Unix shell script. This session will cover the basics of getting started with Swift at the command line. It’s easier in a lot of ways than bash scripts, and you can now create a double clickable application for use by those you support.
- Zero Trust Networking
Security concerns are everywhere -- and the regular stream of news about breaches validates the concern. Yet despite that, 90% of small business don’t use any data protection, and when they are attacked, 60% go out of business within six months of the breach. Enterprises get this too -- but also aren’t as thorough. We understand the problem, but what’s the solution? Security needs to be simple, usable, and without getting in our way. The old mantra of “inside = trusted” is an antiquated concept as network breaches continue to soar. Zero Trust Networking (ZTN) is a more Mac like way of thinking about security -- helping to integrate security from the ground up, not bolted on after the fact. This session will lay the foundation for ZTN, and help you to understand the successful ways to protect those that rely on you.
- Realities of Mobile Warrior and iOS
With Apple’s latest introduction of the iPad Pro, what does this mean going forward for mobile users? In this session we will explore how this platform can integrate into your daily workflow and see how working with this new platform brings new concepts on storage along with opportunities to integrate parts of your business you may not be aware you can do from this new mobile computer.
- Replacing OS X Server: What are your options?
With each recent version of macOS, Apple has moved more and more of the services in OS X Server to the base macOS. Often, the technology is the same, but the user interface for these services is different and geared more towards a general use case, than what you’d like as a server. Time Machine, File Server, and even security features have all been removed from the Server App interface -- and it’s likely time for people to consider replacements. As Apple signals the sunset of OS X Server, we will cover potential replacements including open source alternatives, cloud-based services, network attached storage, Security as a Service, and/or other solutions.