Event Schedule 2019 – Thu
Please note: This schedule WILL be changing. Don't depend on precise times yet.
In week view, click on >> to go to a calendar for just that single day. You can access the schedule in these ways:
Week-at-a-Glance | Tue | Wed | Thu | Fri | Best Method: Subscribe to iCal Calendars
Hover over or tap on items for full description of each item. If you use AutoPkg (with or without AutoPkgr), you will have inevitably found that one of the pieces of software you deploy is not covered by a public AutoPkg recipe, or perhaps there is a download recipe but not a child recipe that you require for your management system (e.g., .pkg, .jss, .filewave). Even if you only write the occasional recipe, you still need to know how to read recipes to effectively implement trust verification. In this session, we will break down the AutoPkg recipe format, discuss the various types of recipes (parent, child, stub, override), teach you the various ways you can write a recipe (e.g., copying another recipe, Recipe Robot, new-recipe verb), discuss basic debugging techniques, offer some (opinionated) suggestions on how best to write your recipe chains, and examine the various Microsoft Office recipes as a case study on different approaches to writing AutoPkg recipes. In this day and age, everyone from the Fortune 500 company to small business to even home users is a target for network intrusions. This session will introduce you to the first steps to take, when you become the victim of a targeted attack. We will cover first steps for both Blue Team (Defensive) and Red Team (Offensive) counter measures to limit the damage caused by the intrusion and digital evidence preservation for post incident investigation. In this session, we’ll talk about preparation you can take before attacks happen, attack prevention and defenses, and post incident procedures. We’ll touch on review and penetration testing procedures. Most, if not all, IT Pros and consultants at one point or another have been asked about “phone service.” Whether using older terms like VoIP, or the current names like Unified Communications, UCaaS, CCaaS, etc… the essence of today’s telecom services is, more than ever, related to what IT does. More so, the services are converging with what we all do. In this session, we’ll go through the most important terms used today, endpoint options, device choices, and even the types of configuration deployment tools. We’ll cover about integration, collaboration products, network needs and performance. We’ll discuss areas of concern including remote offices, connectivity, configuration for robustness (including SD-WAN, MPLS and the place for VPNs). In the end, you’ll be armed with what you need to know as an IT Pro looking to do the right thing for your organization, or a consultant looking to take care of your clients. Using FileMaker’s scripting and API capabilities to forge tools that integrate various web/cloud services to enhance workflows. In this session, we will look at how FileMaker can interact with REST APIs to both update websites and to have websites update FileMaker. After laying the groundwork we will showcase three successful in-house tools: a FileMaker tool to automate Dark Web Scanning and generate fully formatted PDF summary reports for clients; a FileMaker tool to automate the gathering of domain and SSL expiration info and automatically populate a Watchman Monitoring Dashboard all at the click of a button; and a FileMaker tool to replace GUI functionality that Apple deprecated and then removed from macOS Server; – in just a few seconds. We will also look at the API integration capabilities of the new Claris Connect. A new year. A new Wi-Fi standard. Wi-Fi 6, also known as 802.11ax, is shipping but do you really need it? Join us for a hearty bowl of Wi-Fi alphabet soup and a critique of how and when you can benefit from investing in the latest networking standard. NAS has long been thought about as storage – after all, it’s in the name: Networked Attached Storage (NAS). But what you really have with NAS is another computer on your network, and that computer can be used for private cloud (host your own Dropbox!), virtualization, media management (Plex and iTunes streaming), backup (including Time Machine), chat server, file sharing, and more. In this session, we’ll talk about the types of differentiators to look for when selecting a NAS, as well as specific ways to implement some of the more popular and useful features and engines to make the most of your network. Welcome to the next generation of Security Policies! Have you thought about what you need to be aware of before you roll out macOS 10.15 or iOS 10.13? With Apple’s latest OSes, the kernel is basically untouchable, kext popups will confront users, and app access to devices. This session will dive into these and many more issues, while giving your Enterprise users the experience you’d like them to have. While having an arsenal of Mac troubleshooting techniques is great, being able to quickly assess where to start is an equally valuable skill. We often make things more complicated than they are, and everyone has a story about how a simple fix created chaos. This session breaks down a variety of Mac problems, and shows how applying different viewpoints to each benefits the decision-making process. Based on these proven concepts, one can make sense of Mac issues quicker, and start off with a clearer perspective. In addition to real life support examples, this session also includes a few unique approaches to common Mac troubleshooting situations. Apple has long shipped Python 2 with macOS, and it’s become a favorite tool of Mac admins — used for many popular Mac admin tools. With Python 2’s end-of-life coming in January 2020, Apple has announced that a future version of macOS will no longer include Python by default. For those that use Python, you will probably need to do something new! You might need to install Python yourself, you might need to convert scripts to Python 3, or you might need to move to Swift or some other language for some tools you depend on. In this session, we’ll discuss what you can do to adapt and survive changes with Python and from Apple. Databases are one of computing’s oldest uses – and yet, today’s databases often follow some design principles dated well back into the 1970’s. With today’s hardware, and the explosion in RAM on even the most basic of computers, there’s no reason to continue to handcuff capabilities, and performance. In-memory database technology is now being adopted by some of the largest players in this market, including Oracle, Microsoft, IBM and SAP, as well as newcomers like RedisSQL, MemSQL, VoltDB and others. It’s clear that if you’re willing to think differently about your approach, you can actually get something that’s far, far more capable while shedding the vast majority of overhead and database size. In this talk, we’ll look at different ways to take advantage of memory technology in database applications, from simple tricks that will give you some benefit without much effort today, to hybrid approaches that will give you more benefits. We’ll then talk about how completely re-thinking your approach will allow you build superfast, vastly smaller databases with the most capability. With a modern approach, you’ll see the types of usage that you’ve always wanted, but never really considered with a handcuffed design. In the end, you’ll walk away with immediately implementable performance gains, and we’ll help open your mind to new approaches that will release the true power of your databases. Automation legend Sal Soghoian will give an insider’s look at Apple Provisioning Utility, it’s advancement and explosive growth. You’ll hear about how organizations in all fields and industries are integrating mobile devices as mission-critical appliances, and deploying them to staff and clients. You’ll find out how the Apple Provisioning Utility (APU) can deliver robust onsite management of mobile devices using a simple plug-and-go process. We’ll examine the practical aspects of incorporating a shared-use device strategy. You’ll learn how to use and customize APU to address a wide variety of deployment scenarios: from business, education and professional services, to healthcare and retail team support. Josh has had a long history in Security as a renowned security researcher and writer. And as Intego’s Chief Security Analyst, he’s continued his path of research in Information Security. Come hear Josh’s insights on today’s security issues — you’ll likely walk away with a different perspective than you may have had in the past. Led by Phil Goodman and Ben Levy, here’s your chance to discuss getting started as an Apple sysadmin with subject matter experts in the room. Bring your challenges for group discussions and hopefully suggestions! Led by Greg Neagle, here’s your chance to discuss Munki with subject matter experts in the room. Bring your challenges for group discussions and hopefully suggestions! Led by Ed Marczak, here’s your chance to discuss security with subject matter experts in the room. Bring your challenges for group discussions and hopefully suggestions! Led by JD Strong, here’s your chance to discuss help desk systems with subject matter experts in the room. Bring your challenges for group discussions and hopefully suggestions! Led by Jeanette Lee, here’s your chance to discuss Wi-Fi with subject matter experts in the room. Bring your challenges for group discussions and hopefully suggestions! Led by John Kirn, here’s your chance to discuss debugging and troubleshooting with subject matter experts in the room. Bring your challenges for group discussions and hopefully suggestions! Test your Apple knowledge against your peers in the TidBITS TechUp, the interactive game show. Created by Adam and Tonya Engst of TidBITS, the TechUp features a wide range of questions about Apple products and services across the company’s history. Everyone can participate. Will you make it to the final round?
Thu
Oct 17