Conference Sessions

MacIT offers two-and-a-half days of intensive content for attendees to identify pragmatic, sustainable, and competitive iOS and OS X enterprise advancements, along with network with other enterprise managers facing similar issues in the real world.

Click on the dates below to scroll through specific details on each session taking place.

Wednesday, March 26, 2014
Thursday, March 27, 2014
Friday, March 28, 2014

 

Wednesday, March 26, 2014

9:00am – 9:30am

General Session: Welcome & MacIT 2014 Overview
MacIT Content Advisory Board:
Content Lead: Dan O’Donnell, Consultant
Advisors: Arek Dreyer, President, Dreyer Network Consultants; Ben Greisler, President, Kadimac, Inc.; Nadyne Richmond, Staff Researcher, VMware, John C. Welch, Head of IT, The Zimmerman Agency; Kevin White, Apple Authorized Tranier, Macjutsu, Inc.
As both OS X and iOS have penetrated more deeply into enterprise environments and general business usage, both administrators and IT managers need current and relevant information on how to provision these for enterprise use. The security environment for all computing has changed, so understanding security and knowing how to use it has become an absolute must. Also, we still need to know how to use some of the features that are deep in the operating system. Knowing how to navigate and use some of Apple’s own corporate support systems have become important factors for managing any kind of organization, from SMB to education to Enterprise. The 2014 MacIT Conference will focus on these issues and delve in to topics highlighting Apple, Deep OS X, Security, User Management, Enterprise Services, Deployment and more.

 Back to Top

9:40am – 10:25am

Keynote: What the Enterprise Needs from Apple – IT Execs Speak Out
Moderator: John Gallant, Senior Vice President and Chief Content Officer, IDG Communications U.S.
Panelists: Ben Bajarin, Principal, Creative Strategies, Inc.
Jeff Cary, Enterprise Architect, Technology Management and Architecture, Chevron Information Technology Company
Marc Touitou, CIO, San Francisco
Apple doesn’t talk much about enterprise IT, but its products are reshaping the enterprise landscape. Companies are not only learning to manage and secure all those iPhones and iPads, they’re rebuilding their end-user computing strategies and retooling their products and services to take advantage of Apple gear. In this special panel discussion led by IDG Communications’ Chief Content Officer John Gallant, leading IT executives and a top Apple analyst share their views on what the enterprise needs from Apple. What gaps exist in current Apple offerings? How does IT want to deal with – or not deal with – Apple? How can enterprise IT and Apple build a more fruitful partnership that makes life easier for the business and helps Apple build even better products for a future in which the line is increasingly blurred between work and the rest of our lives? The session will highlight opportunities for Apple and other companies to improve the Apple ecosystem at work.

 Back to Top

10:35am – 11:20am

General Session: Mac IT – The Hacker Way - Enterprise Client Administration at Facebook
Ajay Chand, Client Platform Engineer, Facebook
Mike Dodge, Client Platform Engineer, Facebook
There is always more than one way to solve a problem. Try the hacker way. We are able to scale with code, because we stopped scripting and started coding! See our version of IT BI 2.0, leveraging Splunk to focus on impact, and make data driven decisions. Efficiency is profitable! When you’re on-boarding hundreds of people a month every minute counts. See how you can configure a Mac from start to finish with just one click.

Back to Top

11:30am – 12:00pm

Keynote: Mac IT
(hosted by JAMF Software)
Chip Pearson, CEO and Managing Director, JAMF Software

Back to Top

12:00pm – 2:00pm

Sponsor Showcase & Networking Lunch

The following presentations will take place in the Sponsor Showcase during lunch. Specific details coming soon for each.

12:15pm - 12:35pm - Mac IT Security: Reality or Just Hype?, Cameron Camp, Security Researcher, ESET
12:40pm-1:00pm - Presentation by Absolute Software
1:05pm-1:25pm - Presentation by Lantronix
1:30pm-1:50pm - Data Loss Prevention (DLP) on Mac OS X, Zoran Cocoară, Endpoint Protector Evangelist, CoSoSys Ltd.

Back to Top

2:00pm – 2:30pm

Keynote
(hosted by Code42)

Back to Top

2:40pm – 3:25pm

TBGS1: Apple Empowers Productivity though Enterprise Mobility
Session hosted by AirWatch
Mobile technologies such as Apple are changing the way companies do business. With the increase of Apple products such as iPads and iPhones in the enterprise, IT leaders in large enterprises are forced to address several challenges, from supporting a large number of those devices across multiple mobile platforms, to developing business applications. AirWatch in conjunction with the Apple Volume Purchase Program (VPP) provides a way for businesses using Apple products to purchase apps in bulk and distribute them across their enterprise securely while saving time and money. Administrators are able to streamline deploying, managing and tracking apps purchased through the VPP with AirWatch. AirWatch integration with the VPP enables administrators to centrally manage app redemption codes, manage licenses and track app installation. Today’s mobile users demand applications that connect them to enterprise resources for businesses.  AirWatch will discuss strategies to manage internal, public and purchased apps, while ensuring mobile security and compliance as it relates to Apple products.

TBGS2: How to Control and Manage Macs with Existing Infrastructure and Leverage Your Windows Stack Investment- session hosted by Parallels
Jack Zubarev, President, Parallels
Yury Averkiev, Program Manager, Parallels
Adam Kostrzak, IT Director, Lytro
William Udovich, Client Services Engineer, Loyola University
Today IT teams need practical solutions for controlling and managing the Macs in their networks.  In this session, Parallels, the experts in Mac for Business, presents real-world guidance for supporting Macs in cross-platform environments.  Join President Jack Zubarev for a practical comparison of solutions, a discussion on results from our 2014 Macs in IT market study, and demonstrations on the performance and usability of Parallels Desktop for Mac and Parallels Mac Management.  Additionally, you will hear other IT pros share their experiences and successes with tackling this growing challenge in weeks rather than years.  Learn how a customer used their existing Microsoft System Center Configuration Manager (SCCM) infrastructure with Parallels Mac Management plug-in to manage Macs just like they do PCs.  If you really want answers to your Mac questions, don’t miss this session.

Back to Top

3:35pm - 4:20pm     Breakout Sessions

IT801: Managing Apple IDs
Weldon Dodd, Owner, Rewind Technology
In this session we will walk through the various ways in which Apple IDs are used for both personal, business and institutional use. Beyond just reviewing the vast list of services that rely on Apple IDs, we will explain the difference between a personal and a business ID and when business IDs are required. We will also call out institutional IDs used for GSX, VPP, APNS, and so on. If you were confused about Apple IDs before, this session will help you chart out a plan for which Apple IDs you will need to create and manage. We’ll cover tips for personal use (e.g. sharing iTunes purchases in your family), business (e.g. business programs with Apple that you don’t want to share with your personal ID), and institutional use (e.g. programs that require corporate control or business relationships with Apple). If you need to mass create a large number of Apple IDs for your organization, we will explain your options. This session will also include specific information related to the new process for creating Apple IDs for students under the age of 13.

Back to Top

IT802: Using DTrace to Instrument Your System
Max Bruning, Training Director, Joyent
This session will examine the use of DTrace for performance profiling and debugging of applications running on OS X, including the DTrace features of Instruments. DTrace can be used to determine what your application is doing at any given time. Attendees will be able to follow along by using DTrace on their MacBooks. The session will examine some DTrace scripts that Instruments uses, and how to add new DTrace instrumentation to Instruments. The talk will start with a brief description of DTrace in terms of what it is, what it can be used for, and how it works. Then various applications will be examined. DTrace lends itself to a “drill down” approach to problem solving. This technique will be covered by looking at examples. At the conclusion, some ideas for ways to extend DTrace on OS X will be described.

Back to Top

IT804: Managing Mavericks’ FileVault2 with fdesetup
Rich Trouton, Lead Help Desk Technician, Howard Hughes Medical Institute
With the release of OS X Mavericks, Apple has added new capabilities to the fdesetup utility first introduced in Mountain Lion. This tool offers a number of command-line abilities for administrators to manage FileVault 2 and Apple’s changes for Mavericks have made fdesetup even more versatile.

In this session, we’ll cover how how FileVault 2′s cryptographic keys work as well as examine fdesetup’s major functions in OS X Mavericks.

Back to Top

4:30 - 5:15pm           Breakout Sessions

IT811: Building Better Users
Cliff Hirtle, Senior Desktop Engineer, Bain Capital
Better users are not born, they are created. Traditional ivory tower IT that focuses on improving customer service KPIs over walking in your personnel’s shoes can become a longterm liability in a world of mobile-first, BYO(Everything), and 24/7 global teams. Transformation is more than metrics but reconsidering the very rules of the game. In this session we look at alternatives in both structures and channels of technology support that can accelerate the transition of your IT from reactive fixer to proactive engager. Structurally via innovation partnerships, early adoption initiatives, and local champions. Logistically via alternative support channels: from traditional IT KB SOPs to dynamic Evernotes, iBooks, podcasts, checklists, and comic books. Questions we will address: How can you better position you and/or your organization to support your users whenever and wherever they are? What tools are available to you that are ubiquitous, updatable, and scalable? What horrors or happy endings have others had that can help steer you away from a costly six month dead-end POC? Plus: an interactive match-up of attendees by channel, structure, and experience: where do you want to go and who’s here right now who’s been there, done that? Whether your IT is a small shop with a big heart of a big shop with a head start, you will absolutely see at least one thing you have never seen before or your your money back. This free session brought to you by Clif Hirtle, Senior Desktop Engineer at Bain Capital in Boston, MA.

Back to Top

IT812: Grown-Up IT: Scaling Up
Nigel Kersten, CTO, Puppet Labs
Handcrafted, artisanal: These can be great ways to describe beer or cheese, but if that’s how you’re building and managing systems you’re working way too hard for suboptimal results. This session will talk about how you scale up, using version control and configuration management (with a dose of change management theory) to build reproducible, reliable and manageable systems while leaving yourself plenty of time for the tasty handcrafted things in life. This session will be tool-agnostic; the point is to discuss techniques and concepts that you can use to move your environment into the manageable and managed future.

Back to Top

IT813: How I Learned to Stop Worrying and Love IPv6
Phillip Remaker, Distinguished Engineer, Services, Cisco Systems, Inc.
Although OS X and iOS have supported IPv6 for a long time, we are just starting to see serious adoption at ISPs and major websites. In this talk we will review some benefits of using IPv6 (including Back to My Mac and NAT bypass) as well as strategies to for deploying and monitoring IPv6 in your wired and wireless network infrastructure. We will review concepts like DHCPv6 (stateful and stateless), SLAAC, First Hop Security (FHS) and Firewall configuration. We will look at some native tools, Apps, plug-ins and useful websites to aid in your rollout and monitoring. We will also share some recent trends and statistics about the growth and deployment of IPv6, as well as some anecdotes from World IPv6 Launch in 2012. We will then look at some subsequent experiences seen during IPv6 rollouts in enterprise networks as well as broadband, mobile, and hosting service providers in order to help you get maximum benefit from your deployment of IPv6. We will pay special attention to coexistence issues with IPv4 including “Happy Eyeballs” style race conditions, DNS quirkiness, and dealing with IPv6 broken sites.

Back to Top

IT814: An IT Experts’ Guide to Managing Your Users Successfully
Phil Goodman, Owner, Goodman Consulting; Steve Leebove, Owner, MacRescue; Benjamin Levy, Owner, Solutions Consulting
In this session we will walk through the various ways in which Apple IDs are used for both personal, business and institutional use. Beyond just reviewing the vast list of services that rely on Apple IDs, we will explain the difference between a personal and a business ID and when business IDs are required. We will also call out institutional IDs used for GSX, VPP, APNS, and so on. If you were confused about Apple IDs before, this session will help you chart out a plan for which Apple IDs you will need to create and manage. We’ll cover tips for personal use (e.g. sharing iTunes purchases in your family), business (e.g. business programs with Apple that you don’t want to share with your personal ID), and institutional use (e.g. programs that require corporate control or business relationships with Apple). If you need to mass create a large number of Apple IDs for your organization, we will explain your options. This session will also include specific information related to the new process for creating Apple IDs for students under the age of 13.

 Back to Top

5:15pm - 7:15pm

Networking Showcase / Reception

Back to Top

Thursday, March 28, 2014

9:00am - 9:10am

Opening Remarks
MacIT Content Advisory Board

Back to Top

9:10am - 9:40am

Session Details to Come

Back to Top

9:50am - 10:35am   Breakout Sessions

IT821: Fundamental ESXi
John Welch, Director of IT, The Zimmerman Agency
Most Mac IT folks are familiar with virtualization, especially in terms of desktop functionality. VMware Fusion, Parallels, and others are well-known entities in the Mac IT space. But there’s the other side of things, namely server virtualization. Why would you even want to virtualize servers when hardware’s cheap? Well, there are some real advantages to server virtualization, and this session will help explain why, then move into the basics of implementing server virtualization on Apple hardware via VMware ESXi. This session will go over the reasons for virtualizing servers, including the real cost and time savings that can come from it. We’ll then move into basics of ESXi on Apple hardware, covering “get it up and running” functionality on both supported and unsupported hardware, management tips and tricks, and resources to help you get the most out of your hypervisor from both VMware and the (Mac)IT community at large. A bare metal hypervisor is a great way to get the most for your hardware dollar, and this session will help you get started in a useful fashion.

Back to Top

IT822: Encryption, Email and OSX
Dan O’Donnell, Consultant
This session will describe some basics of modern encryption and then talk about specifics on how to encrypt email in OS X. The talk will cover symmetric encryption and how to use that between two different people, as well as how to use it for one person’s files. (Example will be an encrypted disk image.) Then we will go to asymmetric public key encryption and describe how to use it between two people, as well as how it can be uses in an enterprise setting. The major demonstration will be how to set up GnuPrivacyGuard and MacGPG Suite for Apple Mail, and how to exchange encrypted email between two people using that technique. Rather than doing a live demo, I will use screenshots to illustrate the set up and configuration. This is a lot of material to cover, even in :45 minutes, so the session will move quickly.

Back to Top

IT823: DNS: The Painless Way
Ben Greisler, Owner, Kadimac Corp
This session approaches practical DNS in a way that all admins can appreciate and use the learned knowledge right away. We will review DNS used in standard internal networks and how to deal with outside DNS requirements. Time will be spent taking questions and using examples from the audience for that real life approach.

Back to Top

IT824: What You Need To Do When Deploying iOS 7
Randy Saeks, Network Manager, Glencoe School District 35
iOS 7 has been around for a bit now and with new changes to the OS come new methods and procedures for deploying and supporting the new OS. Some Come to this session to learn about some of the new technologies you need to know for the successful deployment of today and tomorrows devices.

Back to Top

10:45am - 11:30am             Breakout Sessions

IT831: Virtualization for Testing - The Good, The Bad, and The Weird
Sara Porter, QA Engineer, iovation
John Soward, Manager, Research Initiatives, Dataseam
Virtualization is a great way to test those OS and application upgrades and gives you a good option for testing mobile devices. Learn these advantages and some of the caveats between different environments, underlying hardware challenges, and things to keep your app from exploding on your mobile device. Topics covered will include virtualizing environments with VirtualBox, Vmware, Parallels; development environments with Xcode, Android SDK, Windows Mobile or Blackberry (if time); emulation & compatibility with SheepShaver and Crossover; third-party clouds like SauceLabs and Azure.

Back to Top

IT832: Essential Security & Risk Fundamentals
Alison Gianotto, CTO/CSO, noise
Security and risk management should be baked in, not bolted on. Learn core security principles and process, and how to manage risk in ways that still encourage innovation within your organization – and don’t leave you looking like the bad guy! Starting every project with a foundation of security and risk management can actually provide a more creative and collaborative environment, especially when you learn how to make the right thing the easy thing, from what hosts your database can connect to, to the way you deploy software. This talk will explore security and risk management from a holistic, practical perspective (while still zeroing in on specific implementation best-practices), to help you learn the *why* as well as the *what*.

Back to Top

IT833: iOS 7 in K-12 Education
Matthew Winkler, Network Administrator, Fort Thomas Independent Schools
iOS 7 has opened many new doors for education including iOS configuration, deployment, and management of iOS devices. Experience a MDM solution using only Apple tools including Server 10.9, Apple Configurator, and iOS 7. In a cash strapped K-12 education market it is essential to find solutions that do not break the budget while also getting the most out of your MDM solution. Using Apple tools in can save school districts a substantial amount of money and allow a customized solution. The education market has benefited from the release of iOS 7 with lots of changes geared towards the education market. With over 20 years IT education experience, Matthew and Andrew have unlocked and discovered critical components to a successful MDM solution. With a limited budget we were forced to find a solution that would give us similar results to a paid MDM solution. Making mistakes, finding problems, and failed deployments were all part of the process but pushing forward was essential to the discovery of a relatively free MDM solution. While our solution is not perfect, it will allow you the flexibility that schools deserve and demand in a constantly changing iOS market. With a previous successful FREE iOS 6 MDM solution in over 35 school districts using a few iOS devices to a few thousand iOS devices, it was time to experience iOS 7. Enhancing the MDM solution for education with iOS 7 is just the beginning what iOS 7 can offer education and the reason we want to share our findings with you. Come join us for an informative K-12 iOS 7 session that will be packed full of information and lessons learned. See what Apple tools can do for your district. As time allows, a question and answer segment along with demos will be offered.

Back to Top

IT834: Scripting Service Controls on Mavericks Servers
Charles Edge, Chief Technology Officer, 318 Inc / krypted.com
Mavericks Server continues to refine how we manage services in the era of app based services. In this session, we’ll cover what’s new in Mavericks for those who use Server with scripted automations and a few options that haven’t changed in a long time as well. We’ll look at DNS, profiles, deployment, calendars, DHCP, Time Machine and other services. We’ll also look at the new Xcode service and automations to ease the development cycle. This session isn’t just Apple-provided tools. We’ll also look at some open source tools and how those can be leveraged to automate as much as you can and make you look as awesome as you possibly can!

Back to Top

11:40am - 12:10pm

Session Details to Come

Back to Top

12:10pm - 2:15pm

Sponsor Showcase & Networking Lunch

The following presentations will take place in the Sponsor Showcase during lunch. Specific details coming soon for each.

12:25pm - 12:45pm - Printer Management for Mac and Mobile Users, Jarrett Taylor, Product Manager PrinterLogic
12:50pm-1:10pm - A Seamless Integration for the Mobile Enterprise with Secure Apple Deployments - Hosted by AirWatch
1:15pm-1:35pm - Adobe Creative Cloud for Enterprise—Strategies for IT Success - Hosted by Adobe
1:40pm-2:00pm - Session TBD

Back to Top

2:15pm - 3:00pm     Breakout Sessions

IT851: Advanced WiFi
Bill Wiecking, Director HPA Energy Lab, Hawaii Prep Academy
Attendees will see Dr. Bill Wiecking discuss and demonstrate the deep intricacies of 802.11 hardware, software and protocols, with emphasis on how to make them secure. There will be gadgets to handle and examine, and there will be some exercises to do with laptops. There is always a lively discussion during Bill’s sessions.

Back to Top

IT852: Recombinant Deployment and Management for Mac and iOS
Phil Goodman, Owner, Goodman Consulting
Steve Leebove, Owner, MacRescue
Ben Levy, Owner, Solutions Consulting

Deployment isn’t a single solution endevour. To get complete and workable results for deployment and management it’s often necessary to combine elements from a variety of sources to handle imaging, software installation, management and changes and updates. In this session we will use a small school deployment as an example to outline the decision-making process to solve specific ongoing goals using a variety of solutions, including Mac OS X Server, DeployStudio, Absolute Manage, Prey, Composer and Apple Remote Desktop. We will begin with the initial first year deployment and the lessons learned and then progress through the reasoning that brought together the full collection of software and management in the second year. Attendees will learn how to decide which Mobile Device Management features should guide them to the right MDM vendor, important considerations for how and when to deploy software, how to achieve needed configurations on machines and what to consider for asset-tracking, remote support and updates.

Back to Top

3:10pm - 3:55pm     Breakout Sessions

IT841: Analyzing OS X Systems Performance with the USE Method
Brendan Gregg, Lead Performance Engineer, Joyent
This talk is about systems performance on OS X, and introduces the USE Method to check for common performance bottlenecks and errors. This methodology can be used by beginners and experts alike, and begins by constructing a checklist of the questions we’d like to ask of the system, before reaching for tools to answer them. The focus is resources: CPUs, GPUs, memory capacity, network interfaces, storage devices, controllers, interconnects, as well as some software resources such as mutex locks. These areas are investigated by a wide variety of tools, including vm_stat, iostat, netstat, top, latency, the DTrace scripts in /usr/bin (which were written by Brendan), custom DTrace scripts, Instruments, and more. This is a tour of the tools needed to solve our performance needs, rather than understanding tools just because they exist. This talk will make you aware of many areas of OS X that you can investigate, which will be especially useful for the time when you need to get to the bottom of a performance issue.

Back to Top

IT842: What’s New in Configuration Profiles
Weldon Dodd, Owner, Rewind Technology
You may be managing your OS X and iOS deployment with configuration profiles today, but new options have been made available in OS X Mavericks and iOS 7. In this session, we will take a detailed look at the new commands, queries, configuration profiles and payload options that are available in OS X, iOS, and more from Apple including Apple TV. New Commands New Queries New Configuration Options We’ll cover options for both supervised devices, unsupervised, and BYOD devices.

Back to Top

IT843: Managing Apple in the Enterprise: Why MDM and WLAN Management Go Hand-in-Hand
Matthew Gast, Director of Product Management, Aerohive Networks; Jake Mosey, Manager, Product Management, JAMF Software
In 2007, Steve Jobs stood on a stage and introduced the iPhone to the world. In a mere six years, this tiny device has changed communication and spurred technological innovation across global markets. From how children learn, to how healthcare is delivered, to how we conduct business everyday all over the globe. Today, mobile devices have infiltrated every aspect of business, making security a top concern for IT departments across all industries—from an accounting firm struggling to protect confidential data on employee-owned iPhones, to a mobile-savvy school district needing to centrally manage student iPads. Mobile device management (MDM) solves some of the monitoring and management challenges of this mobile explosion—but is MDM alone enough? Many IT departments rely on agent-based MDM solutions, installing agents or profiles on the devices themselves to ensure compliance. Meanwhile on the networking side, IT administrators use context-based information such as device type, identity, etc. to enforce network permissions and guarantee airtight security across their environment. But today’s sophisticated mobile devices may require IT departments to deploy a more comprehensive solution to ensure corporate networks are completely protected. A hybrid approach, combining agent-based MDM and network management is the next wave for IT departments looking to effectively and efficiently manage Apple in the enterprise. This speaking session, presented by Jake Mosey of JAMF and Matthew Gast of Aerohive, will discuss why MDM and WLAN management should be implemented in tandem. Speakers will explain the benefits of this two-pronged approach, draw from real-world use cases and discuss best practices for managing Apple in the enterprise.

Back to Top

IT844: Mobile Security, Strategy and Contextual Mobility
Rick Wylie, CEO, KeyOptions
The world is changing and Mobile Computing is coming like a bullet train. With this changing world there are numerous challenges for both corporate provided devices, and those that are BYOD, Bring Your Own Device, or if you are in corporate, Bring Your Own Disaster! This session will look at successful strategies that that need to be considered to allow the successful deployment and security of mobile devices in the four key areas of: * device security, * data and content security, * voice security, and * location security The session will be based on a number of successful deployments in Corporate and Government. A number of solutions will be discussed and demonstrated that will allow attendees to gain insight to new and emerging technologies that will solve the mobility security problems of tomorrow. The session will include live demonstration of contextual mobility location and management.

Back to Top

4:05pm - 4:50pm     Breakout Sessions

IT851: Access Directory Services from the Command Line
William Smith, Solutions Architect, 318, Inc.
Network directory services not only provide name and password services allowing users to log in to their computers but also store loads of information about each user, computer, printer and other objects. This session will cover the handful of command line “ds” tools available to access network directory services (dscl, dseditgroup, dsmemberutil and others) and the wealth of information they can return. These commands are useful interactively to browse the company directory system but are far more powerful when incorporated into scripts to automate and customize a user’s experience or when used in Mac management systems such as Apple Remote Desktop using its Send UNIX command. This session will demonstrate how to use the command line to bind a Mac to a directory system (Active Directory and Open Directory) and add its directory groups to a Mac to control access to specific services. It will also provide real world examples of how to extract information from a user’s record such as his email address and put it into a script to configure settings such as email and instant messaging.

Back to Top

IT852: Your BYOD Policy: You Have One and Don’t Even Know It!
Craig Cohen, Senior Systems Engineer/Technical Training Specialist, HCS Technology Group
As the evolution/revolution of iOS Devices continues, the traditional IT mindset is in a state of anarchy. This session will talk about the tools available and real scenarios to help the IT team and Business owners secure and control their intellectual property. Including: Mobile Device Management Mobile Content Management Mobile Application Management Mobile Expense Management Mobile Email Management Setting realistic expectations and achievable goals.

Back to Top

T853: IPv6 - Real Soon Now (Said Everyone Since 2005)
Pam Lefkowitz, Owner, Core Computing Technologies, Inc.
IPv6 has been “any day now” since at least 2005. In this session we’ll look at what we need to know about it and why. We’ll consider the impact of running out of IPv4 addresses impact us. We’ll look at designing and managing an IPv6 network. We’ll talk about strategies for web services and making sure we limit (and hopefully eliminate) any downtime. And, of course, we’ll talk about DNS.

Back to Top

IT854: SNMP Fundamentals
John Welch, Director of IT, The Zimmerman Agency
Every IT person can benefit from knowing what is going on with their network. Unfortunately, “knowing what’s going on” can be devilishly frustrating. However, there is a standard (literally) way to manage this need: SNMP, the Simple Network Management Protocol. This session will help anyone with basic networking experience go from zero to functional with SNMP and help them build their own system so that they can really “know what’s going on.”

Back to Top

4:50pm - 7:00pm

Networking Showcase

Back to Top

Friday, March 28, 2014

9:00am - 9:30am

Session Details to Come

Back to Top

9:40am - 10:10am             Breakout Sessions

IT881: UI in a Unix World
Arek Sokol, Enterprise Systems Engineer / Co-Founder, Code42 / macbrained.org
This session will describe UI tools available for creating notification and interaction in the Enterprise with real world examples. We’ll cover jamfHelper; cocoaDialog; AppleScript; Custom cocoa interfaces; terminal-notifier and more.

Back to Top

IT882: Your IT World on iPad
Phil Goodman, Owner, Goodman Consulting
Benjamin Levy, Owner, Solutions Consulting
End users are flocking to iPads as their go-to mobile solutions for everything from web browsing, email, business documents and more because those are the tools they use in their everyday work. Well, as an IT professional, why not you? There are a plethora of IT related applications for iOS and many of them work great. In this session, we’ll review an arsenal of apps any iOS-toting IT pro should have on hand. These will include tools for networking, server administration, server access, remote access and control, remote desktops, terminal sessions and more. With these apps and tools at your ready, your life in IT support shouldn’t be restricted to you being chained to a desk.

Back to Top

10:20am - 11:05am             Breakout Sessions

IT861: Automating the Human Element of IT
Ben Greiner, President, Forget Computers
IT configuration and management works best when computer automation is involved. However, we can’t ignore the human element when delivering IT services. Automation allows IT teams to consistently deliver quality service at a fast pace with few mistakes. In the complex world of IT, automating the human element may sound impossible (and boring), however it’s completely possible (and really exciting)! In this session, Ben Greiner will present how he leads a team of Mac and iOS experts with various expertise, to consistently deliver quality service across a variety of clients. Learn to improve your delivery process. Learn how to work faster and smarter with fewer mistakes. Learn how to streamline training and leverage less experienced team members on complex projects. Walk away with a whole new perspective on the world as you wonder aloud, “How did I even got out of bed this morning without a checklist?”

Back to Top

IT862: Troubleshooting Email
William Smith, Solutions Architect, 318, Inc.
Just as English is the most common second language of the world, email is the most common second application. It’s also one of the most complex technologies we use with a multitude of protocols, servers and clients available–all to simply get a message from sender to recipient. When you’re dealing with a customer whose email “doesn’t work” where do you start troubleshooting? Snake through the plumbing and learning how Point A is connected to Point B by protocols, ports and networks. This will overview the communications necessary in a working email infrastructure. Understand what kinks can stop the flow of communication. Is the server serving? Is the network networking? This will overview how to test various layers of communication when the pipes are clogged. We’ll review some real world scenarios where email has stopped working and what troubleshooting steps can get things flowing again.

Back to Top

IT863: App Store License Management
Weldon Dodd, Owner, Rewind Technology
Apple has introduced a new method of managing app licenses that allows your organization to manage volume purchases and assign licenses to users that can be returned to the organization and reused in the future. In this session, we will explore the process of creating a volume purchase account, the difference between buying licenses and redemption codes, how to assign and revoke licenses using Apple’s tools and popular MDM solutions, and the process and policy considerations. At the end of this session, you will have the information you need to manage apps for both OS X and iOS apps, or to add license management to your existing redemption code distribution procedures.

Back to Top

IT864: Apple’s Bug Reporter
Mike Boylan, Systems Engineer, Robert Morris University
Often times in IT, challenges are faced whose causes are due to bugs in software and whose resolutions are completely dependent upon fixes that need to be released by vendors. Apple provides a free, easy to access, and incredibly valuable resource to IT professionals and developers alike that many companies do not, and that is a publicly available bug reporting tool. The value of Apple’s bug reporter is often underestimated; Apple’s bug reporter enables a direct communication path to Apple product engineering that can help get important business-impacting issues resolved within your company or organization. In this session, attendees will learn a bit about the bug reporting process with Apple, why it’s so valuable, and what’s required to be able file a bug with Apple. Bug-filing best practices will be discussed and the process of filing a bug will be demonstrated. IT novices and pros alike are welcome to come to learn and to discuss previous experiences related to filing bugs with Apple. Session disclaimer: Session presenter does not work for Apple, and although the practice of filing thorough bugs with Apple has benefited his organization immensely, he cannot guarantee the same for any other company or organization. Responses to bugs and impact assessments are handled at Apple’s discretion on a bug-by-bug basis.

Back to Top

11:15am - 1:00pm

General Session: MacIT “UN”CONFERENCE Session - The Inmates Take Over the Asylum
Join MacIT speakers, Advisory Board members, and your peers in this grand finale session dedicated to addressing your most important open issues and take this opportunity to challenge some of what you’ve heard! This session takes form in real-time, featuring instant break-outs and small group discussions as well as general audience sharing. The “unconference” format is an opportunity to engage with speakers and ensures that everyone at MacIT goes home with actionable iOS and OS X insights and deployment strategies.

Back to Top