Latest Articles

Having Mac Troubles Running Apple Diagnostics May Help Identify the Problem

If your Mac is acting up and you suspect a hardware problem, there's an easy first step that you can---and should---try before calling for tech support: Apple Diagnostics. (On Mac models released before June 2013, Apple instead included a similar set of diagnostics called Apple Hardware Test.) This diagnostic tool will help identify any potential issues with your computer's hardware and provide troubleshooting steps to resolve the problem.

COVID19 Work From Home Dangers & Scams

The COVID-19 crisis has forced many organizations and businesses to work from home. Are you aware of the cybersecurity risks to your business with your employees working remotely? With more employees accessing company data and systems from personal devices, there is a higher risk of data breaches and cyber attacks. This shift in work environment requires careful consideration of security measures to protect against these threats.

Tips for Setting Up a Comfortable and Effective Home Work Space

Vast numbers of people who previously reported for work at an office every day are now working from home due to the COVID-19 pandemic. That's sensible, and if you're included in that group, there was probably even a little thrill of "I get to work from home!" at first. But as those who have telecommuted for years know, it's not as simple as settling down on the couch with your laptop. Here are a few tips.​

COVID19 Scam Alert Stimulus Checks

It's really sad that we live in a time when scammers are still so active in the face of such hardship and adversity. However, it is the environment where people are often at their most vulnerable, struggling to make ends meet or dealing with personal crises, making them an easy target for those looking to take advantage of them.

Create Your Own Chat Group Via Slack

Whether you're working from home or just stuck at home, it can be tough to communicate with colleagues, friends, or family. Sure, there's email, but that gets hard to manage quickly, and it can be difficult to stay focused with so much news rolling in. For friends and family, Facebook might seem to be the digital town square. However, many people avoid Facebook due to its impressive record of abusing its users' privacy, failure to protect that user data from hackers, and exploitation by foreign governments. And it's wildly inappropriate...

Apple Introduces New iPhone SE Starting at $399

Four years after the release of the original iPhone SE, Apple has introduced a second-generation iPhone SE{:rel="nofollow"} with aggressive pricing that starts at just \$399. Whereas the original model used the svelte, easy-to-hold iPhone 5s case design with a 4-inch screen, this new iPhone SE repurposes the larger iPhone 8 design with its 4.7-inch screen. But Apple didn't just rebrand the iPhone 8. The new iPhone SE sports several important updates that make it a compelling purchase for the price, including a new processor and eSIM capability.

Prev 1 ... 78 79 80 81 82 ... 147 Next

ABM Warranty 0.4.1 Walkthrough: Wrap-Up and Beta

In this final ABM Warranty 0.4.1 walkthrough, I’m wrapping up the last features I had not covered directly in the earlier videos and then focusing on support, community, and the beta program. I also want to show where the support resources live inside the app so you know where to go if you need help, documentation, or a way to send useful feedback. Additionally, I'll be covering some of the key features that were updated since the previous version, including any bug fixes or improvements made to existing functionality.

Read more

ABM Warranty 0.4.1 Walkthrough: Managed Preferences

In this part of the ABM Warranty 0.4.1 walkthrough series, I'm focusing on managed preferences and the credential packaging workflow. In the last video, I covered multiple credentials inside the app itself. In this one, I'm showing how to package those credentials so they can be deployed securely through MDM. This process is a crucial step in ensuring that your credentials are properly configured and protected within your organization's mobile device management system.

Read more

Low Profile Walkthrough and Review

Today I’m walking through Low Profile, a utility from Nindi Gill that I use when I want to inspect profiles already installed on a Mac and figure out whether those profiles contain issues I need to clean up. The value is that Low Profile gives me a straightforward way to inspect profiles installed on any Mac. This simplicity makes it easy for me to identify and address potential problems, which is especially useful when working with multiple machines or troubleshooting complex profile configurations.

Read more

ABM Warranty 0.4.1 Walkthrough: Multiple Credentials

In this part of the ABM Warranty 0.4.1 walkthrough series, I’m focusing on multiple credentials. In the first video, I showed the basic setup and how to add a single credential. Now, I want to explore what happens when I remove a credential, what changes occur when I add more than one, and how the app behaves once there are multiple contexts in play. This will help clarify any potential issues or inconsistencies that may arise with multiple credentials.

Read more

ABM Warranty 0.4.1 Walkthrough: Introduction

In this first ABM Warranty 0.4.1 walkthrough, I want to show you what the app actually does before I get into the more specific feature videos. This is the broad introduction. I’m walking through the dashboard, how I think about the warranty cards, how released devices are handled, how the filters work, how to add credentials, where the data is stored locally, and what the logging and security model looks like.

Read more

ABM Warranty 0.4.1

The 0.4.x release series for ABM Warranty is focused on operational scale. The earlier 0.3 releases were about trust, correctness, and stabilizing the foundation. Version 0.4.1 builds directly on that work by making the app more practical for consultants, internal IT teams, and managed service providers who need to support multiple environments without losing isolation, control, or visibility. This includes improvements to user interface and workflow, as well as enhanced reporting capabilities to help these users manage their workflows more efficiently.

Read more

Why Apple Fleet Risk Isn’t a Security Problem—Until It Is

Security and risk are often treated as interchangeable concepts in modern IT environments, but they are not the same discipline. Security focuses on controls, enforcement, and prevention. Risk management, by contrast, is concerned with likelihood, impact, and consequence across operational, financial, and organizational domains. Frameworks such as those published by NIST make this distinction explicit: risk assessment is not a technical exercise, but a business one. Technology informs risk decisions, but it does not define them.

Read more

ABM Warranty 0.3.1

The 0.3.x release series for ABM Warranty is about tightening guarantees. Where earlier releases focused on surfacing data and making long-running operations observable, 0.3.x focuses on ensuring that what you see is complete, consistent, and safe to trust—particularly as the app is used in larger, slower, and more varied environments. This shift in focus aims to provide a more reliable foundation for users who require higher levels of assurance from their warranty management system.

Read more

ABM Warranty 0.2.0

ABM Warranty 0.2.0 is a feature release focused on visibility, safety, and scale. This version does not change what ABM Warranty is meant to be, but it significantly improves how the app behaves under real-world conditions—large device counts, API throttling, long-running imports, and the kinds of failure modes Apple IT admins actually encounter. The improvements in this release are designed to make the app more reliable and efficient, allowing it to handle complex scenarios without breaking or becoming unresponsive.

Read more

ABM Warranty 0.4.1 Walkthrough: Wrap-Up and Beta

In this final ABM Warranty 0.4.1 walkthrough, I’m wrapping up the last features I had not covered directly in the earlier videos and then focusing on support, community, and the beta program. I also want to show where the support resources live inside the app so you know where to go if you need help, documentation, or a way to send useful feedback. Additionally, I'll be covering some of the key features that were updated since the previous version, including any bug fixes or improvements made to existing functionality.

Read more

ABM Warranty 0.4.1 Walkthrough: Managed Preferences

In this part of the ABM Warranty 0.4.1 walkthrough series, I'm focusing on managed preferences and the credential packaging workflow. In the last video, I covered multiple credentials inside the app itself. In this one, I'm showing how to package those credentials so they can be deployed securely through MDM. This process is a crucial step in ensuring that your credentials are properly configured and protected within your organization's mobile device management system.

Read more

QuickPKG - More to Unpack

A few days ago I released a review of QuickPKG, a tool I love and use almost daily. What I really love about packaging and QuickPKG is that no matter what Mobile Device Management (MDM) solution I'm working with at any given moment, it provides a universal way to create a quick package to import into JAMF, Mosyle, or any MDM. This consistency is particularly valuable when switching between projects or environments, as the process remains the same regardless of the specific MDM being used.

Read more

Low Profile Walkthrough and Review

Today I’m walking through Low Profile, a utility from Nindi Gill that I use when I want to inspect profiles already installed on a Mac and figure out whether those profiles contain issues I need to clean up. The value is that Low Profile gives me a straightforward way to inspect profiles installed on any Mac. This simplicity makes it easy for me to identify and address potential problems, which is especially useful when working with multiple machines or troubleshooting complex profile configurations.

Read more

ABM Warranty 0.4.1 Walkthrough: Multiple Credentials

In this part of the ABM Warranty 0.4.1 walkthrough series, I’m focusing on multiple credentials. In the first video, I showed the basic setup and how to add a single credential. Now, I want to explore what happens when I remove a credential, what changes occur when I add more than one, and how the app behaves once there are multiple contexts in play. This will help clarify any potential issues or inconsistencies that may arise with multiple credentials.

Read more

QuickPKG Walkthrough and Review

I use QuickPKG when I need to turn an application, DMG, or ZIP file into a package quickly without wasting time in a heavier packaging workflow. This post follows the same path as my video: what QuickPKG is, where to get it, how I run it, what a simple packaging example looks like, and where I think admins need to be careful about potential pitfalls that can arise from using this tool.

Read more

ABM Warranty 0.4.1 Walkthrough: Introduction

In this first ABM Warranty 0.4.1 walkthrough, I want to show you what the app actually does before I get into the more specific feature videos. This is the broad introduction. I’m walking through the dashboard, how I think about the warranty cards, how released devices are handled, how the filters work, how to add credentials, where the data is stored locally, and what the logging and security model looks like.

Read more

Secure Software, Secure Career: How I Passed the CSSLP

After passing the CISSP earlier this year, I decided to follow it up with the **Certified Secure Software Lifecycle Professional (CSSLP)** certification. For those unfamiliar, CSSLP is an ISC2 certification that focuses specifically on secure software development practices across the full SDLC—from requirements and design to coding, testing, deployment, and maintenance. My goal in pursuing this certification was to further develop my skills in ensuring the security of software throughout its entire lifecycle.

Read more

Amphetamine: The Ultimate Mac Utility to Keep Your Computer Awake

In today's fast-paced digital world, keeping your computer awake during important tasks is crucial. Enter **Amphetamine**, a powerful utility designed specifically for Mac users. This app ensures that your system remains active, preventing it from going to sleep or activating the screensaver when you need it most. In this article, we will explore the features of Amphetamine, how to use it effectively, and why it’s a must-have for Mac admins and everyday users alike.

Read more

Why Focusing ON Your Business Can Lead to Greater Success

One of the hardest transitions for a business owner is moving from constant delivery work toward the kind of leadership that allows the business to scale. It is difficult to focus on the business when you are still carrying too much of the day-to-day burden yourself. Even when growth creates more resources, that does not automatically mean the work can be shared effectively right away. In fact, it's common for owners to struggle with delegating tasks and trusting others to handle responsibilities, leading to a prolonged period of burnout and...

Read more

The Importance of Effective Team Communication in Dynamic Environments

Effective team communication becomes far more important as a business moves from a small, familiar operating rhythm into a larger and more dynamic environment. When you are used to running a business as an owner-operator, much of the context lives in your head. Decisions move quickly because you already know the clients, the priorities, and the reasons behind each choice. In a larger organization, that same instinct does not scale without stronger communication.

Read more

Clearing Up Misconceptions: How Mergers Can Benefit Clients

When clients hear that a company has merged, their first assumption is often that the change is being driven by money rather than service. That reaction is understandable. If the business already seemed stable, a merger can look like a move that benefits ownership far more than it benefits the customer. That is why one of the most important parts of any merger is proving, through action, that the client experience will improve rather than decline.

Read more

Why Building a Strong Team is Essential for Post-Merger Success: Our Experience

Building a strong team after a merger is rarely as simple as adding headcount. From the outside, it can seem like joining a larger organization should immediately create more capacity, more support, and a clearer path to growth. In practice, that is not always how it works. A merger may provide a stronger platform, but it does not automatically come with an instant staffing plan or a perfect roadmap for how responsibilities will be divided.

Read more

Embracing the Change: How I Transitioned from Independent Operator to Employee

Transitioning from business owner to employee is one of the hardest identity shifts an entrepreneur can make. Running your own company means you are used to setting priorities, making final decisions, and carrying direct responsibility for the outcome. After an acquisition, that changes quickly. You may still have leadership responsibilities, but you are now operating inside a larger structure where authority is shared and not every decision is yours to make.

Read more

Bridging the Gaps: Our Focus on Unifying for Success

Acquisition changes more than ownership. It changes how you work, how you lead, and how much control you have over the decisions that shape the business every day. That shift can be harder than many owners expect, especially when you have spent years operating with full authority and direct accountability for every client relationship. As a result, it's not uncommon for acquired businesses to experience an adjustment period during which they adapt to new systems, processes, and expectations.

Read more

How SMS Can Revolutionize Your Client Assistance - Here's Why

One of the most practical ways to improve client support is to meet people where they already communicate. For many clients, that means text messaging. When used correctly, SMS can become a fast, effective support channel that reduces friction, improves response times for simple issues, and creates a cleaner record of day-to-day interactions. This approach also allows support teams to respond quickly to urgent matters, while keeping the conversation history organized and easily accessible for future reference.

Read more

Revolutionizing Tech Support with Apple Messages for Business

Apple Business Chat is one of the most practical examples of how modern tech support can become faster, cleaner, and easier for both clients and technicians. For support teams that already rely on SMS-style communication, it is not just another channel. It is a more structured way to bring real-time support into the Apple ecosystem while keeping the business side of the interaction organized. This approach allows support teams to maintain control over the conversation flow, ensuring that issues are resolved efficiently and effectively without unnecessary back-and-forth.

Read more

The Pitfalls of Growing A Team: Lessons Learned

Growing a team sounds straightforward on paper, but in practice it introduces costs and complexity that many business owners underestimate. It is easy to model growth by assuming that one additional person will quickly become productive, bill enough work, and create immediate operational relief. What often happens instead is that the owner has to spend significant time training, onboarding, and correcting work before that new hire becomes a true net gain.

Read more

Enhancing Cybersecurity on macOS: Empowering Users for a Safer Digital Journey!

macOS has earned a strong reputation for built-in security, but the real value of the platform is not just that protections exist. It is that Apple continues pushing the operating system toward more context-aware security decisions that help users make better choices before a problem becomes a breach. This approach allows users to understand and mitigate potential risks in real-time, rather than simply reacting to threats after they've occurred.

Read more