Site icon MacTech.com

MacTech BootCamp III: San Francisco, CA – August 27, 2014

BMS 2013.jpg

All new content for 2014!

Whether you’ve been to any MacTech event prior, or are new to MacTech events, MacTech BootCamp III will benefit you. All new content. All new curriculum. All new line up. All designed specifically for the Apple tech.

MacTech BootCamp III: San Francisco, CA 2014

MacTech BootCamp III is a one day event targeted at the issues facing techs supporting small-to-medium sized businesses, small office, and home office (often referred to as SMB or SOHO markets), as well as consumers. Specifically, it is for anyone providing support services as a consultant or part of an organization. MacTech BootCamp’s sessions cover a variety of topics from those in the know about the topics below, all of which are designed to make BootCamp attendees more successful in supporting these markets.

Who Should Attend?

MacTech BootCamp is a one day event for those that support the small business market, small office/workgroup clients, or those supporting others in larger organizations.

MacTech BootCamp is a single-track, hotel based seminar that is specifically geared to serve the needs of consultants and techs wanting to better serve their base. MacTech BootCamp is perfect for those that already support small-to-medium sized businesses, communities, organizations, provide services to systems integrators or government clients, consumers, or that want to become a consultant supporting these areas.

Packed Schedule.

Using MacTech’s proven “running order” approach, we pack in the maximum number of sessions into the time available. Session titles below. At MacTech BootCamp, you learn from the experts and get to ask questions of those “in the know.”

See more details below.

August 27, 2014
Location

Sheraton Fisherman’s Wharf Hotel

2500 Mason Street

San Francisco, CA 94133

Hotel Website

Registration at 8:15am (no earlier please).

Sessions begin at 9am.

Day ends by 6pm.
Subscribe to iCal calendar. -->

Microsoft Office Accreditation. If you register for this event, you can attend the Microsoft Office accreditation event from 2pm-6pm the day prior at no additional charge. Space is limited.

Don’t wait. Space is limited. Register today.

“;
?>


Sessions Chairs


Neil Ticktin, MacTech Magazine

Neil not only emcees the event, but oversees the session chairs and content for each MacTech event. Neil has been the Editor-in-Chief and Publisher of MacTech Magazine since 1992. With both a technical and business background, Neil has authored hundreds of articles including most of MacTech’s well known benchmarking articles on productivity applications, virtualization, and performance products.


Kevin Lockey, Lockey Solutions

Kevin has been using Macintosh computers since the first 512e that he bought. As a Manager in several positions with CopyMat/CPI and BMUG he gained practical knowledge that he has applied for the last decade in my Macintosh Consulting practice. Working in retail for 9 years has given him unique perspective in helping business owners decide the best solution for their Inventory Management and Point of Sale Systems. Having taught High School for 5 years he understands the situation that both educators face in dealing with computer technology. As a parent of a college student and an elementary school student he knows first-hand how technology affects our daily lives as parents. As a small business owner he survives on his customer service and geek translation skills. He looks to his network of people in Linkedin to provide the watercooler to talk around and also to extend his network.


Kim Manitt, MacDivas

Kim Manitt is owner of MacDivas. Kim first started working with the Macintosh operating system in her 14 year career in printing and graphics. During that time she became familiar with troubleshooting IT issues. In 1998, Kim left the printing industry to pursue her love for computers. She went back to school to become a Microsoft Certified System engineer. After leaving the Seattle area and moving to Long Island, Kim went to work for Stimpson Corp as the in-house IT person. There she was responsible for installing and maintaining a Citrix Farm, JD Edward software with an AS 400 unix based OS, 200 Macintosh computers and 60 Windows-based computers, along with web and mail servers and 4 filemaker servers. In 2002, Kim formed MacDivas and ventured on her own and has built her business of loyal clients from small businesses to the Enterprise cooperate world. In addition to providing Apple certified support for servers, Kim offers mobility solutions and point of sale systems.



Speakers


Sean Costello, Background Backup

Sean Costello has supported Macs in business since 1993. Based in Ottawa, ON, Sean represents the Canadian perspective on the Apple Consultant’s Network.He is a member of the ACN Advisory Council, he works with resellers, consultants and business owners across North America to better navigate today’s challenges surrounding IT deployment and support. Sean is an expert with CrashPlan Pro, and he excels at helping other consultants learn how to use, to sell and to deploy CrashPlan solutions for their customers.


Russell Poucher, Creative Resources Technology Group

Russell Poucher, President and Founder of Creative Resources Technology Group, takes pride in the knowledge that his firm is committed to providing strong technical support, customer service and product knowledge to customers. Prior to starting CRTG, Russell worked as a Macintosh System Administrator for several leading pre-press firms in Orange and Los Angeles Counties. He has numerous certifications in networking, security and system administration as they relate to the Macintosh environment. By combining his knowledge of the pre-press and printing industries, Russell is able to provide fully integrated technical solutions to his customers. In more than 17 years since opening its doors, CRTG has been heralded for its unique blend of technical expertise and customer service.
Mr. Poucher, has been recruited by Apple, Adobe and Dell over the last 15 years to help with numerous initiatives. Those would include writing curriculum for Apple’s technical certification classes, presiding and managing an Apple Certified Training Center as well as being an Apple Certified Trainer. CRTG is contracted as an Apple Professional Services provider and put in charge of training Apple Consultants from Orange and San Diego counties.


Nick McSpadden, Schools of the Sacred Heart, San Francisco

Nick McSpadden is the Client Systems Manager at Schools of the Sacred Heart, San Francisco. He is in charge of the deployment of all client workstations and devices, including the faculty laptops and the school’s 1:1 iPad program. He’s used to working with different models for deployment and management of iOS devices alongside OS X devices.


David Ball, Command Prompt

David Ball is a Senior Consultant and co-owner at Command Prompt, which can be found in balmy Santa Barbara. He’s made a career out of supporting the Mac in business environments since 1995 after realizing that the only way to make a small fortune in working in the radio production industry is to start with a large one. In the last 19 years he’s worked with Fortune 500 companies (although, admittedly, not many of the really cool ones) and enjoyed all the inherent pleasures of supporting multiple desktop environments in an organization that consisted chiefly of very angry people who would fly all over the world and leave all their chargers, adaptors, and occasionally their devices in undisclosed locations. Thankfully, he now gets to work with a broad range of clients in the medical, industrial and creative fields who usually stay in one place. Recently he’s started working with iPad point of sale solutions in restaurant environments. Mostly this is because of all the free food.


Sean Colins, Corequick

Sean Colins is the founder of CoreQuick LLC, a professional services company specializing in Apple’s constantly evolving set of products. In addition to professional services, CoreQuick is evolving to provide professional development training for teachers, and to develop and license educational materials for K-12 schools. You may recognize Sean’s voice from the popular OS X Server series he authored and presented for publisher lynda.com, or if you are a long time Apple Consultants Network member you may remember him as the Regional Champion for the southwest United States many years ago. Within the MacTech BootCamp community Sean is known as the “curriculum Godfather”, an unofficial title that makes him chuckle inside every time he thinks about it. Sean recently started a column in MacTech Magazine, and is always looking for new opportunities to write professionally. Sean’s wife is the creative director of her dance company DRDT, and Sean’s two children Natasha and Nicholas attend school near their home in Beverly Hills, California. Sean’s dog Duncan makes occasional appearances at events, but only when he’s being a very good boy.


Eric Ullman, CX Alchemy

A devoted Mac user for more than 25 years, Eric Ullman became a backup geek after joining Dantz Development—the creators of Retrospect—in the late ’90s. Eric’s intimate understanding of the challenges faced by individuals and organizations alike informs his belief that inertia is often the biggest hurdle that must be overcome when developing or improving a recovery strategy. Eric is co-owner of Retrospect, Inc. and the founder of CX Alchemy, a consultancy focused on helping small and midsize businesses become loved by their customers.


Chris Dawe, Wheelwrights

Born and raised in Texas, Chris studied history at the University of Chicago before getting sidetracked into the world of Apple, networking, and IT. A member of the Seattle consulting community since 1999 and Principal Systems Engineer for Wheelwrights since 2007, Chris provides planning, solutions, support, and training for a variety of business and education customers in Western Washington. In his off hours, Chris can be found mucking about in the kitchen, usually with sharp knives and unseemly amounts of butter.


Andrew McDonnell, AsTech Consulting

Andrew McDonnell, Principal Security Consultant with AsTech Consulting, has over ten years of experience in information security and technology. Utilizing a unique composition of skills and expertise, Andrew has worked with numerous enterprise customers to improve application, network, and organizational security practices. Andrew has designed and deployed enterprise vulnerability management programs, embedded robust security practices into software development life cycles (SDLCs), and led the response to critical security incidents. Andrew’s work prior to AsTech included tenures with Veracode, Qualys, AppSec Consulting, and the U.S. Department of Energy.


Bobby Toledo, Microsoft

Bobby Toledo was first introduced to Apple in 2007 where he worked in Apple retail for 6.5 years. While at the Apple Store, Bobby facilitated market-wide core trainings and led his store in development. During the last two years at Apple, Bobby helped manage the Genius team as a Genius Administrator where he furthered his technical knowledge. In 2013, Bobby transitioned to a Danish wireless speaker company as the North American Western Regional Sales Manager where he refined his sales and business acumen skills. With his passion for training and technology, Bobby Toledo is now a Microsoft trainer who loves to motivate others.



Sessions and Topics


Sessions are 30-50 minutes long, with most sessions at about 40 minutes. There are nine sessions in the 2014 curriculum.

Topics Covered

The topics covered will include:

Read on for more details.

Keynote:
How Do the Key Building Blocks for Today’s Consultant Fit Together


What does today’s Apple consultant need to know to be effective in serving everyone from small business to Enterprise, support personnel, or even home users and networks.

PKI, encryption, certificates and you.


Secure encryption of data influences how we all use technology, and the assumptions we make about the privacy of our data both on our devices and when our data leaves our devices in email, in the cloud, when we shop, and in countless other ways that extend further into our private lives with every new technology we adopt. Learn about the technology that underlies our false sense of security, how it works and what you can do as a consultant to manage that security for your clients.

The World of Apple IDs


Apple is continually changing the rules for Apple IDs, iTunes accounts, and more. Learn the latest rules, how devices are treated, migrating to new hardware, dealing with multiple IDs, and iCloud. Find out how iTunes Match works, how Mac App Store differs from iTunes, and the right way for working with deployment and imaging. Learn the restrictions for merging Apple IDs and how to combine them.

Profiles


We work on Apple technology in a privileged time. We have the ability to enroll our Macs and our iOS devices into device management. We have the ability to nearly magically send instructions over the air almost instantly to enrolled devices from a server. We can send special profiles that users cannot remove from applications like Apple Configurator to devices connected over a USB connection. So many management opportunities exist today, one can hardly fit all of the options into a single 40 minute talk, but in this Profiles session, we will do our very best.

WiFi. Best practices.


Wi-Fi has rapidly become the network connection of choice. This choice means the Wi-Fi network must be reliable at all times. Wi-Fi is no longer a “nice to have” – downtime or poor performance is not an option. This session presents factors that affect Wi-Fi performance and how to use them as part of your Wi-Fi design, deployment and troubleshooting.

Deployment


Deployment was once a question of how to get the same software and configuration on a bunch of computers. Today it can mean so much more to you and your customers. Does it mean handing out iPads that are already configured and ready to go? Does it mean building a “perfect” computer and replicating it to dozens, hundreds or thousands of others? Does it mean building a clever array of installers, scripts and preference files to install in sequence to create a lightweight and flexible computer customization system? Today deployment means all of the above, and the well prepared consultant needs to understand them all.

Backups and Storage


Let’s face it people don’t back up their stuff. The fact is that is probably not your fault. The problem is if you don’t find a way to make it your problem eventually someone is going to blame you when they lose their stuff. This session is all about you saving the day. You will learn the tools, the techniques, and the tricks to make sure your customers are backing up their data, and that you can get their data back when disaster strikes.

Office for Mac: Collaboration Tools


You have options for collaboration productivity tools. What are the pros and cons of each? Do you know how to use web apps vs. applications effectively? Microsoft Office is at the core of how people work, yet many people don’t know what Office for Mac can do, let alone take advantage of it. Did you know that Office includes collaborative editing features both through the web and the cloud? Learn from Microsoft experts how you can not only make the most of Office for yourself, but those that you support.

Security. Keeping them out.


With the significant increase in cyber threats – particularly in the SMB and mid-market size companies, an understanding of systems security as well as the relevant threat is becoming increasingly essential in the marketplace. With the belief that “OS X is inherently secure,” it is our responsibility to ensure that our network and operations are as secure as anticipated. With a selection of core technologies, we can radically decrease the asymmetric threat.

Security. Letting them in.


So you’ve locked down your business – secured your data and network to eliminate any possible threat. Now the hard part – how do we let in specific users on specific devices to access our data. We must differentiate authorization and authentication to ensure access to specific resources and maintain our data integrity. By identifying the gap between user’s needs and our security requirements, we can ensure the data security while allowing real work to get done.


Sponsors


MacTech selects key vendors to be a part of the event. Sponsors will be speaking and attending the event, and can talk to you about the solutions they offer. It’s a unique opportunity to make contacts within these companies and get your questions answered. Interested in sponsoring a MacTech event? See our sponsorship page.


 

Media Support

These great publications support MacTech Events in a variety of different ways.



Don’t wait. Register today by clicking here.



Note: All information is approximate and projected, but it does evolve. All sessions, speakers and descriptions are subject to change at any time without notice.

Exit mobile version