All new content for 2014!

Whether you’ve been to any MacTech event prior, or are new to MacTech events, MacTech BootCamp III will benefit you. All new content. All new curriculum. All new line up. All designed specifically for the Apple tech.

MacTech BootCamp III: Boston, MA 2014

MacTech BootCamp III is a one day event targeted at the issues facing techs supporting small-to-medium sized businesses, small office, and home office (often referred to as SMB or SOHO markets), as well as consumers. Specifically, it is for anyone providing support services as a consultant or part of an organization. MacTech BootCamp’s sessions cover a variety of topics from those in the know about the topics below, all of which are designed to make BootCamp attendees more successful in supporting these markets.

Who Should Attend?

MacTech BootCamp is a one day event for those that support the small business market, small office/workgroup clients, or those supporting others in larger organizations.

MacTech BootCamp is a single-track, hotel based seminar that is specifically geared to serve the needs of consultants and techs wanting to better serve their base. MacTech BootCamp is perfect for those that already support small-to-medium sized businesses, communities, organizations, provide services to systems integrators or government clients, consumers, or that want to become a consultant supporting these areas.

Packed Schedule.

Using MacTech’s proven “running order” approach, we pack in the maximum number of sessions into the time available. Session titles below. At MacTech BootCamp, you learn from the experts and get to ask questions of those “in the know.”

See more details below.

May 21, 2014
Boston Common Hotel & Conference Center
40 Trinity Pl
Boston, MA 02116
(One block from Copley Square)

Registration at 8:15am (no earlier please).

Sessions begin at 9am.

Day ends by 6pm.

Microsoft Office Accreditation. If you register for this event, you can attend the Microsoft Office accreditation event from 2pm-6pm the day prior at no additional charge. Space is limited.

Don’t wait. Space is limited. Register today.


Sessions Chairs

Andy Espo, Call Andy!

In 1988, while running a successful event production company, Andy Espo realized his business’ need for a computer system. “At that time, the only choices available were DOS and Mac,” commented Andy, “It was a pretty easy decision!” With experience in professional audio, video, theatrical lighting and scenery, Andy was determined to add the automation of his own business to his technical repertoire. As his company grew, so too did his reputation for knowing Macs. In 1998, Andy transitioned out of event production and into being the full-time, “Mac-Guy”. Now in it’s sixteenth year, Call Andy! Macintosh Consulting retains an array of clients in the public relations, marketing, architecture, retail, business, advertising and design sectors. Andy was one of the earliest consultants to be certified in Mac OS X. Andy has been an Apple Consultants Network (ACN) member since 1998, and has served on the ACN Advisory Council.

Leon Lincoln III, Broad Institute

Currently a System Administrator for the Broad Institute of MIT and Harvard where he designs and implements the Mac computer deployment images, manages the Mac Server environment and assists with supporting both Unix/Linux and Windows systems. With over thirty years experience in doing some form of IT work from his early beginnings in the printing industry where he worked when the Apple Macintosh was first introduced, to working with Publishing companies supporting weekly production of Journals like the New England Journal of Medicine to straight IT work for the past 12 years, Leon has worked with every Mac OS from Apple since 1984 to Present.

Neil Ticktin, MacTech Magazine

Neil not only emcees the event, but oversees the session chairs and content for each MacTech event. Neil has been the Editor-in-Chief and Publisher of MacTech Magazine since 1992. With both a technical and business background, Neil has authored hundreds of articles including most of MacTech’s well known benchmarking articles on productivity applications, virtualization, and performance products.


Ed Marczak, Google

Ed is the Executive Editor of MacTech Magazine, the author of several books, and Worldwide Mac Operations Dude at Google. As MacTech Conference’s Sessions Chair, Ed heads up the sessions, and lab content.

Dave Hamilton, The Mac Observer / Mac Geek Gab

Since 1998, Dave Hamilton has been at the heart of the Apple community. Dave is the President and co-Founder of The Mac Observer, BackBeat Media, and Mac Geek Gab. But aside from Apple market publishing, Dave has extensive experience with OS X and iOS — and he has a background in providing tech support services to both businesses and individuals, as well as working on projects for much larger clients such as Citibank.

Allen Hancock, Watchman Monitoring

Allen Hancock earned his degree in Early Childhood Education. Although he’s no longer teaching preschool, education remains a focus in his career. In January of 2000, Allen began a one-person consultancy in Baton Rouge, Louisiana. By 2008, Hancock Consulting had grown into the Mac Consulting Group, Inc: a full service Apple Specialist and Authorized Training Center. During this time, after watching too many clients suffer data loss due to failed backups, Allen founded Watchman Monitoring. Installing the monitoring software on end-users’ computers means that a consultant is able to be notified when problems such as stale backups or impending drive failures begin. This level of Proactive Support means less downtime and quicker resolution when problems to come up.

Leon Lincoln III, Broad Institute

Currently a System Administrator for the Broad Institute of MIT and Harvard where he designs and implements the Mac computer deployment images, manages the Mac Server environment and assists with supporting both Unix/Linux and Windows systems. With over thirty years experience in doing some form of IT work from his early beginnings in the printing industry where he worked when the Apple Macintosh was first introduced, to working with Publishing companies supporting weekly production of Journals like the New England Journal of Medicine to straight IT work for the past 12 years, Leon has worked with every Mac OS from Apple since 1984 to Present.

Josh Turiel, JH Turiel & Associates

Josh Turiel is owner of JH Turiel & Associates, Inc., a 10-year-old consulting company specializing in small business and Mac/Windows integration. Josh had a long career in corporate IT before starting his company, so he brought that structured approach to smaller businesses. JH Turiel is a Microsoft Partner, a Kerio Preferred Partner, and a member of the Apple Consultants Network (for starters) – so we can handle whatever technologies your office depends on.

Max Buxton, Call Andy!

Max Buxton has been a full time Macintosh consultant for over fifteen years. Before working as a consultant, Max honed his troubleshooting skills working as a software tester and application engineer for computer software development companies. Upon realizing he enjoyed working with end users as much as the technology, he transitioned to system administration, supporting groups of users and refining his “consulting” chops. In the late 1990′s, Max decided to become an independent consultant and concentrate on what he enjoys most: helping Macintosh users get the most out of their systems. He’s been a certified member of the Apple Consultants Network since 2003. He’s been a peer, colleague and friend of Andy for much of that time, and has finally been persuaded to join the Call Andy! team. Max is excited to apply his experience in systems, networking, training and general good humor to the Call Andy! brand.

Mark Ayotte, Ayacht Technology Solutions

Mark Ayotte is the CEO of Ayacht Technology Solutions based in Lancaster, MA. His duties include day-to-day management and sales with customers, along with customer service, field work and major project management. With a BS in Management from Quinnipiac University, numerous certifications with world-leading technology companies and more than 20 years of IT consulting experience, Mark has the business and technology acumen our clients have come to depend on for tailor-made IT solutions. He has been deploying indoor and outdoor wireless networks since 2000 in some of the most demanding environments. Some of his notable customers are the Boston Red Sox, Colorado Rockies, Wynn Las Vegas Resorts and La Quinta Resort in Palm Springs. In his time away from the office, Mark enjoys coaching soccer and family activities with his wife, son and daughter. He also enjoys skiing, fishing, boating and working outside around the farm.

Rob Holz, Call Andy!

Rob Holz brings many years of Apple experience to the Call Andy! team. He began using Apple products at the age of two with an Apple IIc. In 2004 Rob was hired by Apple Inc. as a Mac Genius. “It changed my life. It allowed me to build a career that I am passionate about.” While working for Apple, Rob received numerous performance awards and was selected to attend weekly conference calls with the iPod development team to help improve Apple’s #1 selling music player. In 2010 he joined Call Andy! and is excited to be a part of the Apple Consultants Network. He has an extensive background in Pro Video and Audio production and knows the in’s and outs of all of Apple’s product offerings.

Kyle Van Son, Microsoft

Kyle Van Son is a Senior Trainer for Microsoft who has also been involved in the Apple community since 2010. With a passion for communicating ideas, Kyle loves to discuss technology and to inspire users to make the most out of it.

Sessions and Topics

Sessions are 30-50 minutes long, with most sessions at about 40 minutes. There are nine sessions in the 2014 curriculum.

Topics Covered

The topics covered will include:

  • PKI, encryption, certificates and you.

  • The World of Apple IDs.

  • Profiles.

  • WiFi: Best Practices.

  • Deployment.

  • Backups and Storage.

  • Office for Mac: Collaboration Tools.

  • Security: Keeping Them Out.

  • Security: Letting Them In.

  • and more…

Read on for more details.

How Do the Key Building Blocks for Today’s Consultant Fit Together

What does today’s Apple consultant need to know to be effective in serving everyone from small business to Enterprise, support personnel, or even home users and networks.

PKI, encryption, certificates and you.

Secure encryption of data influences how we all use technology, and the assumptions we make about the privacy of our data both on our devices and when our data leaves our devices in email, in the cloud, when we shop, and in countless other ways that extend further into our private lives with every new technology we adopt. Learn about the technology that underlies our false sense of security, how it works and what you can do as a consultant to manage that security for your clients.

The World of Apple IDs

Apple is continually changing the rules for Apple IDs, iTunes accounts, and more. Learn the latest rules, how devices are treated, migrating to new hardware, dealing with multiple IDs, and iCloud. Find out how iTunes Match works, how Mac App Store differs from iTunes, and the right way for working with deployment and imaging. Learn the restrictions for merging Apple IDs and how to combine them.


We work on Apple technology in a privileged time. We have the ability to enroll our Macs and our iOS devices into device management. We have the ability to nearly magically send instructions over the air almost instantly to enrolled devices from a server. We can send special profiles that users cannot remove from applications like Apple Configurator to devices connected over a USB connection. So many management opportunities exist today, one can hardly fit all of the options into a single 40 minute talk, but in this Profiles session, we will do our very best.

WiFi. Best practices.

Wi-Fi has rapidly become the network connection of choice. This choice means the Wi-Fi network must be reliable at all times. Wi-Fi is no longer a “nice to have” – downtime or poor performance is not an option. This session presents factors that affect Wi-Fi performance and how to use them as part of your Wi-Fi design, deployment and troubleshooting.


Deployment was once a question of how to get the same software and configuration on a bunch of computers. Today it can mean so much more to you and your customers. Does it mean handing out iPads that are already configured and ready to go? Does it mean building a “perfect” computer and replicating it to dozens, hundreds or thousands of others? Does it mean building a clever array of installers, scripts and preference files to install in sequence to create a lightweight and flexible computer customization system? Today deployment means all of the above, and the well prepared consultant needs to understand them all.

Backups and Storage

Let’s face it people don’t back up their stuff. The fact is that is probably not your fault. The problem is if you don’t find a way to make it your problem eventually someone is going to blame you when they lose their stuff. This session is all about you saving the day. You will learn the tools, the techniques, and the tricks to make sure your customers are backing up their data, and that you can get their data back when disaster strikes.

Office for Mac: Collaboration Tools

You have options for collaboration productivity tools. What are the pros and cons of each? Do you know how to use web apps vs. applications effectively? Microsoft Office is at the core of how people work, yet many people don’t know what Office for Mac can do, let alone take advantage of it. Did you know that Office includes collaborative editing features both through the web and the cloud? Learn from Microsoft experts how you can not only make the most of Office for yourself, but those that you support.

Security. Keeping them out.

With the significant increase in cyber threats – particularly in the SMB and mid-market size companies, an understanding of systems security as well as the relevant threat is becoming increasingly essential in the marketplace. With the belief that “OS X is inherently secure,” it is our responsibility to ensure that our network and operations are as secure as anticipated. With a selection of core technologies, we can radically decrease the asymmetric threat.

Security. Letting them in.

So you’ve locked down your business – secured your data and network to eliminate any possible threat. Now the hard part – how do we let in specific users on specific devices to access our data. We must differentiate authorization and authentication to ensure access to specific resources and maintain our data integrity. By identifying the gap between user’s needs and our security requirements, we can ensure the data security while allowing real work to get done.


MacTech selects key vendors to be a part of the event. Sponsors will be speaking and attending the event, and can talk to you about the solutions they offer. It’s a unique opportunity to make contacts within these companies and get your questions answered. Interested in sponsoring a MacTech event? See our sponsorship page.


Media Support

These great publications support MacTech Events in a variety of different ways.

Don’t wait. Register today by clicking here.

Note: All information is approximate and projected, but it does evolve. All sessions, speakers and descriptions are subject to change at any time without notice.