About MacTech Pro Events?


MacTech Pro Events are the next incarnation of MacTech’s successful one-day, single-track, regional hotel-based seminars with a specific focus on the needs of professional Apple IT Pros, techs and consultants. These events are specifically designed for those that support others using Apple technologies ... including small-to-medium sized business, organization support staff, and specialized Apple consultants.

With an all new curriculum built from the ground up, the event benefits both return attendees and those that have never attended a MacTech event. Best yet, this in person event maximizes attendees chance to meet with peers, find critical vendor contacts, and foster the type of collaborative networking that the Apple community is famous for.

Included: Packed schedule. All sessions. Expert speakers. Lunch and breaks. Vendor interaction. See more (in general) about MacTech Pro, or below for this specific city's event.

More info about...


City and Event Details


San Francisco

 

About the Event

Date: August 29, 2018
Time: All Day. See Detailed Schedule.
   Registration at 8:30am
   Sessions start at 9am. Day ends by 6pm.

Location:
The Westin San Francisco Airport
1 Old Bayshore Highway
Millbrae CA 94030

Sessions Chair: JD Strong

Registration Now Closed. if you register now. (How pricing works.)


Sessions Chairs




Jack-Daniyel Strong, Strong Solutions

Jack is the President of J-D Strong Consulting, Inc. and Strong Solutions. As a member of the Apple Consultants Network, grew from a one-man consultancy into an Apple Authorized Reseller and Service Provider for the Eastern Washington and Northern Idaho area. JD joined the team of Watchman Monitoring two years ago to help with documentation and support. JD continues to run a small MSP in his free time.


Neil Ticktin, MacTech Magazine

Neil not only plays host for all MacTech events, but aids the session chairs for all MacTech events (over 100 events since 2010). Neil has been the Editor-in-Chief and Publisher of MacTech Magazine since 1992. With both a technical and business background, Neil has authored hundreds of articles including most of MacTech's well known benchmarking articles on productivity applications, virtualization, and performance products.



Speakers




Jack-Daniyel Strong, Strong Solutions

Jack is the President of J-D Strong Consulting, Inc. and Strong Solutions. As a member of the Apple Consultants Network, grew from a one-man consultancy into an Apple Authorized Reseller and Service Provider for the Eastern Washington and Northern Idaho area. JD joined the team of Watchman Monitoring two years ago to help with documentation and support. JD continues to run a small MSP in his free time.


Andrew McDonnell, IOActive

Andrew McDonnell, Security Advisor with IOActive, has over fifteen years of experience in information security and technology. Utilizing a unique composition of skills and expertise, Andrew has worked with numerous enterprise customers to improve application, network, and organizational security practices. Andrew has designed and deployed enterprise vulnerability management programs, embedded robust security practices into software development life cycles (SDLCs), and led the response to critical security incidents. Andrew's work prior to IOActive included tenures with Veracode, Qualys, AppSec Consulting, and the U.S. Department of Energy.


Neil Ticktin, MacTech Magazine

Neil not only plays host for all MacTech events, but aids the session chairs for all MacTech events (over 100 events since 2010). Neil has been the Editor-in-Chief and Publisher of MacTech Magazine since 1992. With both a technical and business background, Neil has authored hundreds of articles including most of MacTech's well known benchmarking articles on productivity applications, virtualization, and performance products.


David Mercer, David Mercer Consulting, Inc.

David Mercer has worked in the industry since the 1990's and runs a consulting company based in the Napa Valley. He's been Apple, Google, and Microsoft certified, and likes to get into the deep tech side of things. David is heavily focused on agile cloud based services, and practices what he preaches.


Sean Colins, CoreQuick

    Sean began his technology career at Disney Imagineering before starting his first technology consulting business The Answer Company in 1995. Sean eventually moved into a full time position as Publishing Systems Manager at Weider Publications, where he managed the Y2K remediation, and led the worlds largest fitness publishing company to transition their IT systems to the Macintosh platform. In 2002, he launched Core Professional Services AKA CoreQuick to channel his years of experience to benefit the most people possible by consulting with companies anywhere the work would take him. In 2006, company founder Lynda Weinman approached Sean to author content for Lynda.com, and as a result of the LinkedIn acquisition Sean's work may now be viewed in the collection at LinkedIn Learning. Now an award-winning author and public speaker with an established international audience, Sean continues to work with world-class business customers as a consultant and business coach, employing his many years of experience, training, and his proven instincts to empower executives to course correct their organizations.


Jennifer Westfall, Watchman Monitoring

Jennifer is a wrangler of many and a new member of the Watchman Monitoring team. From setting up websites to organizing teams with Asana, she has run her own consulting company for 3 years. Currently cooking in the Los Angeles fire season of 100 plus degree weather, she's looking forward to moving north to the Pacific Northwest.


Invest in yourself. Don't wait.




Sessions and Topics


  • Settings and Preferences: Reduce Headaches by doing it your way.
    As a seasoned tech, you know the setup that helps your users. There are specific settings and preferences that you may want to make sure that a specific user, or the users you support in general, are using for their systems and applications. What’s best practices for manipulating plists and launch daemons? How do you push these configurations out to your users’ computers? What are some of the most common settings to address? What are some of the options you have that can make it easier to user-proof systems?

  • Imaging is dead. No more cloning. Now what?
    The days of getting that perfect image in place, and cloning it are gone. New systems will not be able to be cloned in the way you’ve done for decades. There’s no choice moving forward but to use some type of deployment mechanism -- whether MDM, EMM, RMM, MDE or any one of the many TLAs (three-letter acronyms) that come down to solutions for managing and deploying devices. Bottom line, if you don’t get on understanding the new landscape now, you’ll be in a world of hurt as new systems are released. The good news is that Apple is finally unifying deployment schemes. Come find out why DEP is critical, your options, and what kernel extensions are all about?

  • Infrastructure and Design: IoT for Small Business and Home.
    Many people think of IoT as home automation, or appliances of the future. The reality is that IoT is so much more than that, and as the technologist responsible for supporting your users, there’s opportunity, not to mention, responsibility for you in supporting users. Best yet, as you define plans, there are incredible opportunities for not just having IoT smarten the details of our lives, but money that can be saved for your users. And, whether that’s adding to your job responsibilities as an IT Pro, or an expanded opportunity for your consultancy to profit, it’s something for you to pay attention to.

  • Group Discussion: Preparing Users for Security, Breaches.
    The people you support rely on you to keep them functioning. They don’t necessarily care about the specific technologies, they instead want to focus on what they do. What are the best ways to “have the talk” about security, and help users and decision makers to understand why security needs to be important to them? What are the things that they, the users, need to do to be a part of the solution? What training tools and security tests should you have in place? How do you get people to understand being resilient, because breaches will happen.

  • APFS: It’s here. It’s now. It’s different. What you need to know.
    Apple doesn’t do it often, but about once every 15 years, completely changes the underpinnings of its operating systems … the file system. Apple File System (APFS) is the new file system for macOS, iOS, tvOS and watchOS. How is it different? What are the benefits? What is “snapshotting”? How has encryption changed? How does this impact the ways you maintain and monitor the disks and storage that users have on their systems? There’s a whole lot that you know from HFS+ that no longer applies or has changed -- here’s your chance to make sure you are on top of what APFS is about, and what it means for your users.

  • Providing Managed Services for your organization and clients.
    Keeping all your users’ computers and devices up to date and on a level playing field is just one of many goals for providing managed services for those you support. It is always a win if you are seeing problems before they become a disaster, scheduling downtime and upgrades, and being proactive. We will not only explore ways to manage computers, but other services that could help ease your burden of supporting users, providing that routine maintenance for users, and keep you from calling the tow truck to haul the computer in for repair.

  • Getting the Mail Through.
    Neither snow nor rain nor heat nor gloom of night … well that’s the goal at least. These days email continues to be the holy grail of communication, but it’s harder and harder to get the mail through. We’ll talk about SPF, DKIM, DMARC - what are they, and how do you use and monitor them. There are several common pitfalls to mail service configuration that even the most seasoned tech will run into, and we’ll cover them in this session as well as how to troubleshoot email delivery. Inherent in this discussion is how to secure an email server, and keep it from being used in nefarious ways.

  • The Tools You Should Use for Troubleshooting and Security.
    This year is more different for Apple techs than any year in recent history. Changes to the file system, deployment, massive security concerns, IoT, and more. “Different” and “Changes” means that you need to be ready to support users -- figuring out if the tools you already know will still work, or finding new tools needs to be done before you need them, not at the time you need them. This session will help you update your toolbox for both troubleshooting and security needs. And, we’ll hear from the group if there’s additional favorites in the community, and the pros/cons of the tools available.


Invest in yourself. Don't wait.





Sponsors



MacTech Pro events have carefully selected sponsors to interact with you with the most useful products and services for you, the professional Apple tech and consultant.
 

National Sponsors

 
Matias
Landing Zone
VMware
DriveSavers
Watchman Monitoring
FLEXdesk – Rooted Consulting
 

 
 

Event Sponsors

 
BMS Law Practice
LearnQuest