Latest Articles

Use AirPods to Improve Your Hearing

An ever-increasing number of people have hearing loss due to exposure to loud noise and age. If you're in that group, but don't yet need hearing aids, try using your AirPods to help you hear better in certain situations. iOS's Live Listen feature uses your iPhone's mic to pick up specific sounds and then sends that audio directly to your AirPods, helping you focus on what you want to hear. To enable Live Listen, go to Settings \> Control Center \> Customize Controls and tap the green + button next...

Six Tips for Writing Better Email

Apple has put a lot of effort into Mail, providing lots of features you can employ to get through your email more quickly. But one of the most effective ways to improve your email productivity has nothing to do with an email app. Instead, train yourself to write better email and you'll cut down on a lot of unnecessary back-and-forth and confusion. Remember, email is not chat---you say things in an interactive conversation that could take days to untangle in an email thread. Here are some of the top ways...

Need to Restart a Mac That Has Frozen? Here’s How

It's extremely uncommon for a Mac to freeze or crash these days, but it can happen. What should you do if your Mac locks up and becomes completely unresponsive to the mouse and keyboard? The trick is to press and hold the power button until the Mac turns off. Wait 5 or 10 seconds, and press it again to turn the Mac back on. You will lose any unsaved changes if you do this, so use it only as a last resort when you can't restart normally. Look for the...

Migrate Your Data from an Old iPhone to a New One with iOS 12

Most people are probably waiting until September to buy a new iPhone, but Apple is laying the groundwork for making the migration from an old phone to a new one even easier this time around. In iOS 12.4, Apple introduced a new way to migrate your data directly from one iPhone to another. This is an extension of the iOS 11 Quick Start feature that helps you set up a new iPhone with settings from your current device. All you have to do is turn on the new iPhone and...

Learn How to Autofill SMS Login Codes in iOS 12 and Mojave

An ever-increasing number of Web sites boost their security via two-factor authentication (2FA), which requires you to type in a short numeric code to complete a login after entering your username and password. It's a big win because that code is generated on the fly and is good for only a short time (often 30 seconds). So even if your username and password were revealed in a data breach, your account is safe if you use 2FA. We recommend using it whenever possible.

Go Beyond External Hard Drives with Network-Attached Storage

If you've filled up your external hard drives or become frustrated by their limitations, it's time to look into a network-attached storage (NAS) device. What's a NAS? It's an intelligent storage device that can accept one or more hard drives or SSDs and connects to your network via Ethernet. A NAS provides centralized storage for all devices on the network, allowing multiple users to access shared files without cluttering individual computers with redundant data.

Prev 1 ... 91 92 93 94 95 ... 147 Next

ABM Warranty 0.4.1 Walkthrough: Wrap-Up and Beta

In this final ABM Warranty 0.4.1 walkthrough, I’m wrapping up the last features I had not covered directly in the earlier videos and then focusing on support, community, and the beta program. I also want to show where the support resources live inside the app so you know where to go if you need help, documentation, or a way to send useful feedback. Additionally, I'll be covering some of the key features that were updated since the previous version, including any bug fixes or improvements made to existing functionality.

Read more

ABM Warranty 0.4.1 Walkthrough: Managed Preferences

In this part of the ABM Warranty 0.4.1 walkthrough series, I'm focusing on managed preferences and the credential packaging workflow. In the last video, I covered multiple credentials inside the app itself. In this one, I'm showing how to package those credentials so they can be deployed securely through MDM. This process is a crucial step in ensuring that your credentials are properly configured and protected within your organization's mobile device management system.

Read more

Low Profile Walkthrough and Review

Today I’m walking through Low Profile, a utility from Nindi Gill that I use when I want to inspect profiles already installed on a Mac and figure out whether those profiles contain issues I need to clean up. The value is that Low Profile gives me a straightforward way to inspect profiles installed on any Mac. This simplicity makes it easy for me to identify and address potential problems, which is especially useful when working with multiple machines or troubleshooting complex profile configurations.

Read more

ABM Warranty 0.4.1 Walkthrough: Multiple Credentials

In this part of the ABM Warranty 0.4.1 walkthrough series, I’m focusing on multiple credentials. In the first video, I showed the basic setup and how to add a single credential. Now, I want to explore what happens when I remove a credential, what changes occur when I add more than one, and how the app behaves once there are multiple contexts in play. This will help clarify any potential issues or inconsistencies that may arise with multiple credentials.

Read more

ABM Warranty 0.4.1 Walkthrough: Introduction

In this first ABM Warranty 0.4.1 walkthrough, I want to show you what the app actually does before I get into the more specific feature videos. This is the broad introduction. I’m walking through the dashboard, how I think about the warranty cards, how released devices are handled, how the filters work, how to add credentials, where the data is stored locally, and what the logging and security model looks like.

Read more

ABM Warranty 0.4.1

The 0.4.x release series for ABM Warranty is focused on operational scale. The earlier 0.3 releases were about trust, correctness, and stabilizing the foundation. Version 0.4.1 builds directly on that work by making the app more practical for consultants, internal IT teams, and managed service providers who need to support multiple environments without losing isolation, control, or visibility. This includes improvements to user interface and workflow, as well as enhanced reporting capabilities to help these users manage their workflows more efficiently.

Read more

Why Apple Fleet Risk Isn’t a Security Problem—Until It Is

Security and risk are often treated as interchangeable concepts in modern IT environments, but they are not the same discipline. Security focuses on controls, enforcement, and prevention. Risk management, by contrast, is concerned with likelihood, impact, and consequence across operational, financial, and organizational domains. Frameworks such as those published by NIST make this distinction explicit: risk assessment is not a technical exercise, but a business one. Technology informs risk decisions, but it does not define them.

Read more

ABM Warranty 0.3.1

The 0.3.x release series for ABM Warranty is about tightening guarantees. Where earlier releases focused on surfacing data and making long-running operations observable, 0.3.x focuses on ensuring that what you see is complete, consistent, and safe to trust—particularly as the app is used in larger, slower, and more varied environments. This shift in focus aims to provide a more reliable foundation for users who require higher levels of assurance from their warranty management system.

Read more

ABM Warranty 0.2.0

ABM Warranty 0.2.0 is a feature release focused on visibility, safety, and scale. This version does not change what ABM Warranty is meant to be, but it significantly improves how the app behaves under real-world conditions—large device counts, API throttling, long-running imports, and the kinds of failure modes Apple IT admins actually encounter. The improvements in this release are designed to make the app more reliable and efficient, allowing it to handle complex scenarios without breaking or becoming unresponsive.

Read more

ABM Warranty 0.4.1 Walkthrough: Wrap-Up and Beta

In this final ABM Warranty 0.4.1 walkthrough, I’m wrapping up the last features I had not covered directly in the earlier videos and then focusing on support, community, and the beta program. I also want to show where the support resources live inside the app so you know where to go if you need help, documentation, or a way to send useful feedback. Additionally, I'll be covering some of the key features that were updated since the previous version, including any bug fixes or improvements made to existing functionality.

Read more

ABM Warranty 0.4.1 Walkthrough: Managed Preferences

In this part of the ABM Warranty 0.4.1 walkthrough series, I'm focusing on managed preferences and the credential packaging workflow. In the last video, I covered multiple credentials inside the app itself. In this one, I'm showing how to package those credentials so they can be deployed securely through MDM. This process is a crucial step in ensuring that your credentials are properly configured and protected within your organization's mobile device management system.

Read more

QuickPKG - More to Unpack

A few days ago I released a review of QuickPKG, a tool I love and use almost daily. What I really love about packaging and QuickPKG is that no matter what Mobile Device Management (MDM) solution I'm working with at any given moment, it provides a universal way to create a quick package to import into JAMF, Mosyle, or any MDM. This consistency is particularly valuable when switching between projects or environments, as the process remains the same regardless of the specific MDM being used.

Read more

Low Profile Walkthrough and Review

Today I’m walking through Low Profile, a utility from Nindi Gill that I use when I want to inspect profiles already installed on a Mac and figure out whether those profiles contain issues I need to clean up. The value is that Low Profile gives me a straightforward way to inspect profiles installed on any Mac. This simplicity makes it easy for me to identify and address potential problems, which is especially useful when working with multiple machines or troubleshooting complex profile configurations.

Read more

ABM Warranty 0.4.1 Walkthrough: Multiple Credentials

In this part of the ABM Warranty 0.4.1 walkthrough series, I’m focusing on multiple credentials. In the first video, I showed the basic setup and how to add a single credential. Now, I want to explore what happens when I remove a credential, what changes occur when I add more than one, and how the app behaves once there are multiple contexts in play. This will help clarify any potential issues or inconsistencies that may arise with multiple credentials.

Read more

QuickPKG Walkthrough and Review

I use QuickPKG when I need to turn an application, DMG, or ZIP file into a package quickly without wasting time in a heavier packaging workflow. This post follows the same path as my video: what QuickPKG is, where to get it, how I run it, what a simple packaging example looks like, and where I think admins need to be careful about potential pitfalls that can arise from using this tool.

Read more

ABM Warranty 0.4.1 Walkthrough: Introduction

In this first ABM Warranty 0.4.1 walkthrough, I want to show you what the app actually does before I get into the more specific feature videos. This is the broad introduction. I’m walking through the dashboard, how I think about the warranty cards, how released devices are handled, how the filters work, how to add credentials, where the data is stored locally, and what the logging and security model looks like.

Read more

Secure Software, Secure Career: How I Passed the CSSLP

After passing the CISSP earlier this year, I decided to follow it up with the **Certified Secure Software Lifecycle Professional (CSSLP)** certification. For those unfamiliar, CSSLP is an ISC2 certification that focuses specifically on secure software development practices across the full SDLC—from requirements and design to coding, testing, deployment, and maintenance. My goal in pursuing this certification was to further develop my skills in ensuring the security of software throughout its entire lifecycle.

Read more

Amphetamine: The Ultimate Mac Utility to Keep Your Computer Awake

In today's fast-paced digital world, keeping your computer awake during important tasks is crucial. Enter **Amphetamine**, a powerful utility designed specifically for Mac users. This app ensures that your system remains active, preventing it from going to sleep or activating the screensaver when you need it most. In this article, we will explore the features of Amphetamine, how to use it effectively, and why it’s a must-have for Mac admins and everyday users alike.

Read more

Why Focusing ON Your Business Can Lead to Greater Success

One of the hardest transitions for a business owner is moving from constant delivery work toward the kind of leadership that allows the business to scale. It is difficult to focus on the business when you are still carrying too much of the day-to-day burden yourself. Even when growth creates more resources, that does not automatically mean the work can be shared effectively right away. In fact, it's common for owners to struggle with delegating tasks and trusting others to handle responsibilities, leading to a prolonged period of burnout and...

Read more

The Importance of Effective Team Communication in Dynamic Environments

Effective team communication becomes far more important as a business moves from a small, familiar operating rhythm into a larger and more dynamic environment. When you are used to running a business as an owner-operator, much of the context lives in your head. Decisions move quickly because you already know the clients, the priorities, and the reasons behind each choice. In a larger organization, that same instinct does not scale without stronger communication.

Read more

Clearing Up Misconceptions: How Mergers Can Benefit Clients

When clients hear that a company has merged, their first assumption is often that the change is being driven by money rather than service. That reaction is understandable. If the business already seemed stable, a merger can look like a move that benefits ownership far more than it benefits the customer. That is why one of the most important parts of any merger is proving, through action, that the client experience will improve rather than decline.

Read more

Why Building a Strong Team is Essential for Post-Merger Success: Our Experience

Building a strong team after a merger is rarely as simple as adding headcount. From the outside, it can seem like joining a larger organization should immediately create more capacity, more support, and a clearer path to growth. In practice, that is not always how it works. A merger may provide a stronger platform, but it does not automatically come with an instant staffing plan or a perfect roadmap for how responsibilities will be divided.

Read more

Embracing the Change: How I Transitioned from Independent Operator to Employee

Transitioning from business owner to employee is one of the hardest identity shifts an entrepreneur can make. Running your own company means you are used to setting priorities, making final decisions, and carrying direct responsibility for the outcome. After an acquisition, that changes quickly. You may still have leadership responsibilities, but you are now operating inside a larger structure where authority is shared and not every decision is yours to make.

Read more

Bridging the Gaps: Our Focus on Unifying for Success

Acquisition changes more than ownership. It changes how you work, how you lead, and how much control you have over the decisions that shape the business every day. That shift can be harder than many owners expect, especially when you have spent years operating with full authority and direct accountability for every client relationship. As a result, it's not uncommon for acquired businesses to experience an adjustment period during which they adapt to new systems, processes, and expectations.

Read more

How SMS Can Revolutionize Your Client Assistance - Here's Why

One of the most practical ways to improve client support is to meet people where they already communicate. For many clients, that means text messaging. When used correctly, SMS can become a fast, effective support channel that reduces friction, improves response times for simple issues, and creates a cleaner record of day-to-day interactions. This approach also allows support teams to respond quickly to urgent matters, while keeping the conversation history organized and easily accessible for future reference.

Read more

Revolutionizing Tech Support with Apple Messages for Business

Apple Business Chat is one of the most practical examples of how modern tech support can become faster, cleaner, and easier for both clients and technicians. For support teams that already rely on SMS-style communication, it is not just another channel. It is a more structured way to bring real-time support into the Apple ecosystem while keeping the business side of the interaction organized. This approach allows support teams to maintain control over the conversation flow, ensuring that issues are resolved efficiently and effectively without unnecessary back-and-forth.

Read more

The Pitfalls of Growing A Team: Lessons Learned

Growing a team sounds straightforward on paper, but in practice it introduces costs and complexity that many business owners underestimate. It is easy to model growth by assuming that one additional person will quickly become productive, bill enough work, and create immediate operational relief. What often happens instead is that the owner has to spend significant time training, onboarding, and correcting work before that new hire becomes a true net gain.

Read more

Enhancing Cybersecurity on macOS: Empowering Users for a Safer Digital Journey!

macOS has earned a strong reputation for built-in security, but the real value of the platform is not just that protections exist. It is that Apple continues pushing the operating system toward more context-aware security decisions that help users make better choices before a problem becomes a breach. This approach allows users to understand and mitigate potential risks in real-time, rather than simply reacting to threats after they've occurred.

Read more