MacTech BootCamp is specifically targeted at the issues facing techs supporting small to medium sized businesses, small office, and home office (often referred to as SMB or SOHO markets), as well as home users (consumers). Specifically, it is not for Enterprise nor developers (those topics are covered at the annual MacTech Conference). MacTech BootCamp’s sessions cover a variety of topics from those in the know about the following topics: all designed to make BootCamp attendees more successful in supporting these markets.
Sessions are 30-50 minutes long, with most sessions at about 40 minutes. There are nine sessions in the 2014 curriculum.
The topics covered will include:
- PKI, encryption, certificates and you.
- The World of Apple IDs.
- WiFi: Best Practices.
- Backups and Storage.
- Office for Mac: Collaboration Tools.
- Security: Keeping Them Out.
- Security: Letting Them In.
- and more…
Read on for more details.
How Do the Key Building Blocks for Today’s Consultant Fit Together
What does today’s Apple consultant need to know to be effective in serving everyone from small business to Enterprise, support personnel, or even home users and networks.
PKI, encryption, certificates and you.
Secure encryption of data influences how we all use technology, and the assumptions we make about the privacy of our data both on our devices and when our data leaves our devices in email, in the cloud, when we shop, and in countless other ways that extend further into our private lives with every new technology we adopt. Learn about the technology that underlies our false sense of security, how it works and what you can do as a consultant to manage that security for your clients.
The World of Apple IDs
Apple is continually changing the rules for Apple IDs, iTunes accounts, and more. Learn the latest rules, how devices are treated, migrating to new hardware, dealing with multiple IDs, and iCloud. Find out how iTunes Match works, how Mac App Store differs from iTunes, and the right way for working with deployment and imaging. Learn the restrictions for merging Apple IDs and how to combine them.
We work on Apple technology in a privileged time. We have the ability to enroll our Macs and our iOS devices into device management. We have the ability to nearly magically send instructions over the air almost instantly to enrolled devices from a server. We can send special profiles that users cannot remove from applications like Apple Configurator to devices connected over a USB connection. So many management opportunities exist today, one can hardly fit all of the options into a single 40 minute talk, but in this Profiles session, we will do our very best.
WiFi. Best practices.
Wi-Fi has rapidly become the network connection of choice. This choice means the Wi-Fi network must be reliable at all times. Wi-Fi is no longer a “nice to have” – downtime or poor performance is not an option. This session presents factors that affect Wi-Fi performance and how to use them as part of your Wi-Fi design, deployment and troubleshooting.
Deployment was once a question of how to get the same software and configuration on a bunch of computers. Today it can mean so much more to you and your customers. Does it mean handing out iPads that are already configured and ready to go? Does it mean building a “perfect” computer and replicating it to dozens, hundreds or thousands of others? Does it mean building a clever array of installers, scripts and preference files to install in sequence to create a lightweight and flexible computer customization system? Today deployment means all of the above, and the well prepared consultant needs to understand them all.
Backups and Storage
Let’s face it people don’t back up their stuff. The fact is that is probably not your fault. The problem is if you don’t find a way to make it your problem eventually someone is going to blame you when they lose their stuff. This session is all about you saving the day. You will learn the tools, the techniques, and the tricks to make sure your customers are backing up their data, and that you can get their data back when disaster strikes.
Office for Mac: Collaboration Tools
You have options for collaboration productivity tools. What are the pros and cons of each? Do you know how to use web apps vs. applications effectively? Microsoft Office is at the core of how people work, yet many people don’t know what Office for Mac can do, let alone take advantage of it. Did you know that Office includes collaborative editing features both through the web and the cloud? Learn from Microsoft experts how you can not only make the most of Office for yourself, but those that you support.
Security. Keeping them out.
With the significant increase in cyber threats – particularly in the SMB and mid-market size companies, an understanding of systems security as well as the relevant threat is becoming increasingly essential in the marketplace. With the belief that “OS X is inherently secure,” it is our responsibility to ensure that our network and operations are as secure as anticipated. With a selection of core technologies, we can radically decrease the asymmetric threat.
Security. Letting them in.
So you’ve locked down your business – secured your data and network to eliminate any possible threat. Now the hard part – how do we let in specific users on specific devices to access our data. We must differentiate authorization and authentication to ensure access to specific resources and maintain our data integrity. By identifying the gap between user’s needs and our security requirements, we can ensure the data security while allowing real work to get done.
Note: All information is approximate and projected, but it does evolve. All sessions, speakers and descriptions are subject to change at any time without notice.