Management Mobile Device

Total Page:16

File Type:pdf, Size:1020Kb

Management Mobile Device Mobile Device Management Managing Apple Devices in your Retail Organisation Table of Contents The State of iOS in the Enterprise Mobility in the Enterprise Why Choose iOS Why iOS for Business Leverage iOS to Transform Business Processes Mobile Device Management Overview MDM Definition and Helpful Terms What is MDM? The Architecture for MDM Deployment Deployment Methods Zero-Touch deployments Inventory Collect Data with MDM Configuration Profiles Available Profile Payloads for MDM Eliminate Containers for iOS Management Best Practice: Standardise iPad Management Commands Available Commands for MDM Best Practice: Manage Activation Lock with MDM App Deployment App Management Strategies Volume Purchasing Individual Apple IDs for Users Best Practice: Managed App Configuration Deployment Example Security and Privacy Native Apple Security Features Using an MDM Solution for Loss Prevention Scenarios Real World Examples iOS for Retail Transform Business Transform Business Processes with Custom Apps Jamf Pro Benefots of Jamf `Pro for Retail Organisations Start a Trial The State of iOS Mobility in the Enterprise in the Enterprise Why Choose iOS Out of the three prevailing mobile operating systems, iOS is the only platform that is designed for consumers and embraced by the enterprise. iOS boasts an intuitive user interface, a secure ecosystem of business-ready apps, and built-in tools that empower users to be more productive than ever before. Fastest and most efficient Over 70% of users on latest mobile hardware OS with annual release cycles Productivity apps to create Runs on iPhone and iPad at documents, spreadsheets, different screen sizes and presentations including Microsoft Office for iOS Native hardware-based encryption to keep data Split-screen multitasking for secure iPad Built-in support for modern Healthy developer ecosystem secure wireless networking, with 1.5 million apps in the such as VPN and single sign-on App Store and $40B paid to developers Built-in Microsoft Exchange Touch ID for biometric security support for email, calendars, and contacts The State of iOS Mobility in the Enterprise in the Enterprise Why Choose iOS For Your Retail Organisation Businesses are not choosing just any mobile technology to support their workforce. They are adopting iOS at increasing rates because it is preferred by users, easy to manage and secure. By putting iPad and iPhone into the hands of employees, organisations of all shapes and sizes pave the way for better engagement, enhanced business practices, and greater output of creative and innovative work. A consistent, best-in-class experience. iOS can be automatically updated, so you’ll always be on top of the latest security releases, and it won’t compromise the availability of any of your corporate apps - it’ll stay compatible, year in and out. A great experience for your IT team, your store staff, and your customers. How Many Businesses Choose iOS? The 2017 Jamf Managing Apple Devices in the Enterprise Survey1 76% 93% reveals nearly all enterprise IT professionals say their internal teams of organisations of respondants say saw a 76% year over year increase saw an increase in it’s easier to deploy in iPad and iPhone usage within their environment. Additionally, 93% iPhone and iPad in iPhone or iPad over believe it’s easier to deploy iPhone their environment another platform and iPad over any other platform. Source 1 - Jamf https://resources.jamf.com/documents/books/managing-apple-devices-in-the-enterprise.pdf The State of iOS Mobility in the Enterprise in the Enterprise Leverage iOS to Transform Business Processes According to a theory proposed by American psychologist Process Abraham Maslow, all humans have the same fundamental To transcend what is possible in business, needs. Basic needs (food, clothing and shelter) must be met the most innovative companies are not only before an individual is motivated to advance to a higher level of investing in hardware, but also in custom needs, such as love and self-esteem. In other words, constant apps to transform their business processes. betterment can only be achieved when certain needs are This can be done through IBM’s MobileFirst program, Business-to-Business (B2B) apps mastered. or in-house enterprise apps. Maslow’s hierarchy of needs serve as an analogy for what Transactions is possible in business with iOS. Device deployment and The rich App Store ecosystem with millions communication are the basic needs of any business. However, of apps offers opportunities to better iOS is so much more. It is a gateway to industry transformation. conduct mobile transactions. Examples As businesses look to maximise productivity and customer include Square and Salesforce1 to process satisfaction, iOS apps are a mechanism to streamline credit card transactions or submit a communications, improve transactions and transform business purchase order to close a deal. App Store app deployment is crucial to unlocking the processes. full potential of iOS devices. Communication Once devices are in the hands of users, IT needs to enable basic communications for them. This includes access to corporate email, Wi-Fi and VPN settings—all without adding unnecessary bloat. Deployment Organisations need to tackle the business problem of deployment, device configurations and inventory. This is the lowest layer of the pyramid and the foundation for any organisation looking at significant quantities of iOS devices. Mobile Device Management MDM Definition and Helpful Terms Overview What is MDM? Mobile device management (MDM) is Apple’s framework for managing iOS. To effectively manage iOS devices and unleash their full potential, organisations require an equally powerful MDM solution. From deploying new devices and gathering inventory, to configuring settings, managing apps, or wiping data, MDM provides a complete toolset to address large-scale deployments and ensure device security. Deployment Inventory Configuration Management App Security Profiles Commands Deployment and Privacy Mobile Device Management MDM Definition and Helpful Terms Overview The Architecture for MDM APNS Apple Push Notification Server When you send commands to Apple devices, your MDM server communicates with Apple’s Push Notification Server (APNS). Apple’s server maintains a constant connection to devices so you don’t have to. Devices communicate back to the MDM server and receive the commands, configuration profiles or apps you send it. Mobile Device Management Deployment Overview Deployment Methods Before you can use MDM to manage your iOS devices, you first have to enrol them. For iPad or iPhone, an MDM tool allows you to easily enrol devices into management, consistently distribute apps and content, and set up security and access profiles. There are several methods to enroll an Apple mobile device, including enrolment via Apple Configurator, a URL or Apple’s Automated MDM Enrolment program. Deployment Methods Description User Experience Supervision Best For User receives shrink- Apple Business wrapped box, and Over-the-air automatic Sending devices Manager's Automated the device is Yes–wirelessly enrolment directly to end users MDM Enrolment automatically configured Program when turned on Enrolment through a N/A—IT manages this Shared-models and Mac app that connects process and hands Yes—wired Apple Configurator carts to devices via USB devices to users User visits a specific Devices currently in the Over-the-air manual URL to automatically No field that need to be User Initiated via URL enrolment configure their device enrolled or BYOD Supervision Supervision is a special mode Examples of Supervision-only Commands: of iOS that enables deeper • Disable App Store management by an MDM server. A • Disable Safari growing number of configurations • Disable modifying wallpaper are only available if a device is • Disable adding email supervised. It is recommended that accounts Plus many more... corporate-owned devices are put • into supervision mode. Mobile Device Management Deployment Overview Best practice: Zero-Touch Deployments with MDM Sign up for Apple As a user turns their Device receives Business Manager via iOS device on for the configurations and Apple’s website. first time, the device apps scoped to it, and will automatically be the user is brought to Jamf can automatically enroled—no additional the Home screen. The configure your iPad. interaction is needed. device is now managed and configured—all without IT having to touch it! 1 2 3 4 5 Purchase devices and Device enrolls with the link them to your Apple MDM server. Prepare Business Manager any configuration account. Ship them profiles and apps you’d directly to users. like to apply to devices. Mobile Device Management Overview Inventory MDM solutions are capable of querying an iOS device to collect a large amount of inventory data, ensuring you always have up to date device information to make informed management decisions. Inventory can be collected from a device at various intervals, and includes information, such as serial number, iOS version, apps installed and much more. Examples of Data Collected with MDM Hardware Details Software Details • Device Type • iOS Version • Device Model • List of Apps Installed • Device Name • Storage Capacity • Serial Number • Available Space • UDID • iTunes Store Status • Battery Level Management Details Additional Details • Managed Status • Profiles Installed • Supervised Status • Certificates Installed • IP Address • Activation Lock Status • Enrolment Method • Purchasing Information • Security
Recommended publications
  • Deploying Ios and Tvos Devices Using Apple Configurator 2 and Jamf Pro
    Deploying iOS and tvOS Devices Using Apple Configurator 2 and Jamf Pro Technical Paper Jamf Pro 10.9.0 or Later 7 October 2020 © copyright 2002-2020 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100 Minneapolis, MN 55401-2155 (612) 605-6625 Jamf, the Jamf Logo, JAMF SOFTWARE®, and the JAMF SOFTWARE Logo® are registered or common law trademarks of JAMF SOFTWARE, LLC in the U.S. and other countries. Apple, Apple Configurator 2, the Apple logo, Apple TV, iTunes, Mac, macOS, OS X, and tvOS are trademarks of Apple Inc., registered in the United States and other countries. IOS is a trademark or registered trademark of Cisco in the U.S. and other countries. All other product and service names mentioned herein are either registered trademarks or trademarks of their respective companies. Contents Contents 4 Introduction 4 What's in This Guide 4 Additional Resources 5 Choosing a Deployment Method 6 Supervision Identities 6 Use a Supervision Identity from Apple Configurator 2 7 Create and Use a Supervision Identity from Jamf Pro 8 Automated Enrollment 8 Requirements 8 Deploying Devices Using Automated Enrollment 11 Manual Enrollment with an Enrollment URL 11 Requirements 11 Deploy Devices Using Manual Enrollment with an Enrollment URL 13 Further Considerations 14 Manual Enrollment with an Enrollment Profile 14 Requirements 14 Create an Enrollment Profile 14 Create and Upload the Supervision Identity 14 Create the "Prepare" Blueprint 15 Create the "Enroll" Blueprint 15 Deploy Devices Using Manual Enrollment with an Enrollment Profile 3 Introduction What's in This Guide This guide provides step-by-step instructions for deploying iOS and tvOS devices using Apple Configurator 2 and Jamf Pro.
    [Show full text]
  • View Managing Devices and Corporate Data On
    Overview Managing Devices & Corporate Data on iOS Overview Overview Contents Businesses everywhere are empowering their employees with iPhone and iPad. Overview Management Basics The key to a successful mobile strategy is balancing IT control with user Separating Work and enablement. By personalizing iOS devices with their own apps and content, Personal Data users take greater ownership and responsibility, leading to higher levels of Flexible Management Options engagement and increased productivity. This is enabled by Apple’s management Summary framework, which provides smart ways to manage corporate data and apps discretely, seamlessly separating work data from personal data. Additionally, users understand how their devices are being managed and trust that their privacy is protected. This document offers guidance on how essential IT control can be achieved while at the same time keeping users enabled with the best tools for their job. It complements the iOS Deployment Reference, a comprehensive online technical reference for deploying and managing iOS devices in your enterprise. To refer to the iOS Deployment Reference, visit help.apple.com/deployment/ios. Managing Devices and Corporate Data on iOS July 2018 2 Management Basics Management Basics With iOS, you can streamline iPhone and iPad deployments using a range of built-in techniques that allow you to simplify account setup, configure policies, distribute apps, and apply device restrictions remotely. Our simple framework With Apple’s unified management framework in iOS, macOS, tvOS, IT can configure and update settings, deploy applications, monitor compliance, query devices, and remotely wipe or lock devices. The framework supports both corporate-owned and user-owned as well as personally-owned devices.
    [Show full text]
  • Security Checklist
    WHITE PAPER Security Checklist Implementing the Center for Internet Security Benchmark Recommendations for securing iPad and iPhone. The Center for Internet Security (CIS) benchmark for iOS is widely regarded as a comprehensive checklist for organizations to follow to secure iPad and iPhone devices. This white paper explains how to implement the independent organization’s recommendations. To see how Jamf Now can help secure and manage your iOS devices, visit www.jamf.com. WHO IS THE CIS? The Center for Internet Security, Inc. (CIS) is a 501c3 nonprofit organization focused on enhancing the cybersecurity readiness and response of public and private sector entities. HOW THE CIS BENCHMARK WAS CREATED The CIS Benchmark was created using a consensus review process comprised of subject matter experts. Consensus participants provide perspective from a diverse set of backgrounds including consulting, software development, audit and compliance, security research, operations, government and legal. Each CIS benchmark undergoes two phases of consensus review. The first phase occurs during initial benchmark development. During this phase, subject matter experts convene to discuss, create and test working drafts of the benchmark. This discussion occurs until consensus has been reached on benchmark recommendations. The second phase begins after the benchmark has been published. During this phase, all feedback provided by the Internet community is reviewed by the consensus team for incorporation in the benchmark. If you are interested in participating in the consensus process, please visit https://www.cisecurity.org/communities/. CIS Management Basics WHAT IS MDM? WHAT ARE BLUEPRINTS? WHAT IS APNs? Mobile device management (MDM) Blueprints define settings on Apple Apple Push Notification service is Apple’s built-in management devices and are distributed to the (APNs) is required for iPad and iPhone framework for iOS, iPadOS, macOS devices via Jamf Now.
    [Show full text]
  • Apple ESG Index 2020
    Apple ESG Index Apple ESG Index (Updated August 2020) 1 Apple discloses Environmental, Social, and Governance (ESG) data across a number of reports and websites. The following index maps these existing disclosures to the Global Reporting Initiative (GRI), the Sustainable Accounting Standards Board (SASB), and the Task Force on Climate-Related Financial Disclosures (TCFD) voluntary disclosure frameworks, as relevant to our business. This document reflects Apple’s work and commitments as of August 2020. While SASB considers “Hardware” to be Apple’s primary industry, we have also included select metrics from the Software & IT Services and Internet Media & Services standards to better align with our business. Table of Contents General Disclosures 3 Privacy 15 Organizational Profile 3 Customer Privacy 15 Value Chain 3 Data Security 15 Apple Values 3 Stakeholder Engagement 5 Our People 16 Reporting 6 Employment 16 Occupational Health & Safety 16 Governance 7 Training & Education 16 Business Indicators 7 Human Rights Assessment 16 Indirect Economic Impacts 7 Diversity & Equal Opportunity 17 Procurement Practices 7 Employee Engagement 18 Anti-Corruption 8 Antitrust & Competition 8 Our Customers and Communities 19 Tax Strategy 9 Local Communities 19 Freedom of Expression 9 Supplier Responsibility—Social 21 Public Policy 21 Environment 10 Product Safety 21 Product Life Cycle 10 Accessibility 22 Energy & Renewable Energy 11 Water & Waste 12 Carbon Emissions 12 The index does not cover all information about our business. References in this index Environmental Footprint of Infrastructure 13 to information should not be construed as a characterization regarding the materiality of such information. The information covered by the index contains forward-looking Environmental Compliance & Habitat Conservation 13 statements.
    [Show full text]
  • An Exploratory Study on Brand Advocacy Amongst Apple Consumers
    Corporate Ownership & Control / Volume 11, Issue 2, 2014, Continued – 6 BRAND ADVOCATES – AN APPLE PHENOMENON? AN EXPLORATORY STUDY ON BRAND ADVOCACY AMONGST APPLE CONSUMERS Michael C. Cant*, Ricardo Machado**, Helen C. Seaborne*** Abstract Apple consumers are well known for their loyalty. Unlike ordinary computer or mobile device users, Apple consumers do not simply buy the products; they become fans. Besides word-of-mouth recommendations the Apple advocates tend to have an emotional connection with the brand they love, they defend the brand and could overlook dissatisfaction. This study made used of qualitative research to explore and gain insights into the characteristics of the Apple brand advocates. The researcher made use of informal conversations to collect data on two Apple community blogs. The data was analysed by using content analysis and six main themes emerged from this study. Apple brand advocates make use of word-of-mouth to recommend and have a sense of trust with the brand. They believe Apple products meet their expectations and find the functionality and design of the products useful. They also enjoy being in an Apple community and find that Apple is irreplaceable by other competitive products. Keywords: Brand, Brand Advocacy, Apple Company * Professor in Marketing Management, Department of Marketing and Retail Management, University of South Africa. Pretoria. Tel: +27-124294456 Email: [email protected] ** Lecturer in Marketing Management, Department of Marketing and Retail Management, University of South Africa, Pretoria. Tel: +27-124293939 Email: [email protected] 1. Introduction loyalty. Loyal customers would consistently choose to In the market of infinite choices, consumers are faced purchase the same brand when the purchase with a great number of competing products in every opportunity arises, however, brand advocates would category.
    [Show full text]
  • Jamf Pro Server
    Jamf Pro Administrator's Guide Version 10.1.0 © copyright 2002-2017 Jamf. All rights reserved. Divide is a trademark or registered trademark of Divide, Inc. Jamf has made all efforts to ensure that this guide is accurate. eDirectory is a trademark of Novell, Inc. in the United States and other countries. Jamf 100 Washington Ave S Suite 1100 Google, Android, Google Chrome, and Google Minneapolis, MN 55401-2155 Play are trademarks or registered trademarks of (612) 605-6625 Google Inc. Intel and McAfee Endpoint Protection are either Under the copyright laws, this publication may registered trademarks or trademarks of the Intel not be copied, in whole or in part, without the Corporation in the United States and other written consent of Jamf. countries. The CASPER SUITE, COMPOSER®, Likewise is a trademark of Likewise Software. the COMPOSER Logo®, Jamf, the Jamf Logo, JAMF SOFTWARE®, the JAMF SOFTWARE Logo®, Linux is a registered trademark of Linus Torvalds RECON®, and the RECON Logo® are registered or in the United States and other countries. common law trademarks of JAMF SOFTWARE, LLC in the U.S. and other countries. Microsoft, Microsoft Intune, Active Directory, Azure, Excel, OneNote, Outlook, PowerPoint, ADmitMac is a registered trademark of Thursby Silverlight, Windows, Windows Server, and all Software Systems, Inc. references to Microsoft software are either registered trademarks or trademarks of Adobe, Adobe AIR, Adobe Bridge, Adobe Microsoft Corporation in the United States Premier Pro, Acrobat, After Effects, Creative and/or other countries. Suite, Dreamweaver, Fireworks, Flash Player, Illustrator, InDesign, Lightroom, Photoshop, Mozilla and Firefox are registered trademarks of Prelude, Shockwave, and all references to Adobe the Mozilla Foundation.
    [Show full text]
  • CAIT2 Coding Academy Transforming the Innovative Leader
    CAIT2 Coding Academy Transforming the Innovative Leader Huston-Tillotson’s CAIT2 Coding Academy is a collaborative project supported by the Apple Community Education Initiative. The goal of the initiative is to help prepare faculty to bring coding, creativity and community connected learning experiences to Huston-Tillotson University. Through training academies, selected educators will receive support to guide a small student-group to develop and implement a plan to integrate coding into their programs using Everyone Can Create and Everyone Can Code, and build curriculum based on iOS Intro to App Development and iOS App development with SWIFT. Faculty Benefits Participate in comprehensive yearlong professional learning program Earn badges and certifications along the way Use of an Apple device (if desired) Earn up to nine graduate credits, or CEUs through Lamar University with successful completion of the coursework with no cost to the educator Learn and apply innovative strategies that transforms desirable student learning outcomes Strengthen the affective, intellectual and social aspects of academic life Faculty Requirements To participate in this program, faculty must agree to meet the requirements listed below: Prior to the coding academy, complete the following requirements: o Attend 2 synchronous online on-boarding events led by the Community Education Initiatives Team. These will be offered multiple times between July 13-24, 2020. o Complete a checklist of self-paced activities to prepare you to use the provided hardware
    [Show full text]
  • Jamf Pro Installation and Configuration Guide for Mac Version 10.5.0 © Copyright 2002-2018 Jamf
    Jamf Pro Installation and Configuration Guide for Mac Version 10.5.0 © copyright 2002-2018 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100 Minneapolis, MN 55401-2155 (612) 605-6625 Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Jamf. Amazon and Amazon RDS are trademarks of Amazon.com, Inc. or its affiliates in the United States and/or other countries. Apache Tomcat and Tomcat are trademarks of the Apache Software Foundation. Apple, Mac, macOS, OS X, and Safari are trademarks of Apple, Inc. registered in the U.S. and other countries. The CASPER SUITE, COMPOSER®, the COMPOSER Logo®, Jamf, the Jamf Logo, JAMF SOFTWARE®, the JAMF SOFTWARE Logo®, RECON®, and the RECON Logo® are registered or common law trademarks of JAMF SOFTWARE, LLC in the U.S. and other countries. Chrome and Google are trademarks or registered trademarks of Google Inc. Firefox is a registered trademark of the Mozilla Foundation. Intel is a registered trademark of the Intel Corporation in the U.S. and other countries. Java and MySQL are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Microsoft, Microsoft Edge, and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and other countries. Ubuntu is a registered trademark of Canonical Ltd. All other product and service names mentioned herein are either registered trademarks or trademarks of their respective companies.
    [Show full text]
  • Iphone App Development Checklist
    Iphone App Development Checklist Arturo often dredged evilly when thrilled Rodrique treadled humanly and argued her euphausiid. Municipal Thom puddles exceedingly and ungracefully, she battledore her econometrician horsing malevolently. Unmatriculated and unapproached Homer humanizing while annoying Otto stem her mozzarella duskily and parch beside. Advanced iOS Application Testing Checklist HTML Pro. A front-end checklist items are created for the purpose of going list a web application. Teaching App Development with another Course materials for instructors teaching Swift Engage students with your project-based curriculum and guide. Connect for developers are all the traffic and navigation elements of restaurant and unauthorized access to the requirements of effort in all the development checklist? This tool ask for parents and teachers to enterprise in developing a student's IEP The checklist includes items required by special education regulations. What please be checked before publishing an app to App Store. Top Mobile App Development Company Crownstack. As one shade the best iOS app developers we're well aware of defeat the adultery of iOS can equity and remember you're surgery to build an app for the Apple community you. When you enlist an expert iPhone application development company down have only know think he is equipped for letter a limitless scope of applications that. Will your app be integrated with device's features 14 Will to need cloud based infrastructure the shelter I have mentioned Android and iOS. Mobile App Testing Checklist for releasing apps BrowserStack. Checklist to a successful mobile app development Inapps. Even fill the development of the app starts the testers are handed over screen.
    [Show full text]
  • Apple Easy Pay Receipts
    Apple Easy Pay Receipts Apostrophic and adulterating Clement nasalises: which Lorenzo is taliped enough? Randall remains starry-eyedclosed-circuit: Ethan she vamosesnitrogenized quite her aggregate shifting concaved but owes tooher hereat? truculency Rustling something. Moses still horsing: smelling and Can manage your actual credit and apple pay offers reward and using walmart mobile payment, privacy when talking with Conveniently pay your Quest Diagnostics invoice or supplement your insurance information using our secure online form. Can you delete Cash app and chat a meager one? It's visible Just scan the item barcode parallel lines with numbers at the. Since every developer would preserve the same validation method hacking would be convenient easy. Apps To dangle Down Your take Cool Material. Can virtue hide Apple Pay transactions? How children Use Apple Pay A magnificent Guide important Business. Apple Pay Frequently Asked Questions TD Bank. You've just learned a relatively easy way around make tens of thousands of dollars on Apple's App Store. It's easy to steal up automatic payments and bill reminders transfer funds pay meal and friends and more. Code on your receipt and trump for simple meal no credit-card handling required. Easy nine Circle K. Similarly police experience can't return Cash App payments. Can I fold a Fake Name from Cash App Learn the Facts Here. Make everything easier with the CVS Pharmacy app Manage and refill. Stripe's iOS SDK makes it some to amplify both Apple Pay on regular credit card payments Before. Apple ID Receipt Order Email In the subject line access this email you confer find included something return Receipt ID Receipt Order without Payment.
    [Show full text]
  • Enterprise Mac Administrator's Guide
    Enterprise Mac Administrator’s Guide Second Edition Charles S. Edge Jr. William Smith Enterprise Mac Administrator’s Guide, Second Edition Copyright © 2015 by Charles S. Edge Jr. and William Smith This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. ISBN-13 (pbk): 978-1-4842-1705-4 ISBN-13 (electronic): 978-1-4842-1706-1 Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark.
    [Show full text]
  • Apple Developer Conference Our Meetings
    The offcial journal of the Wellington Macintosh Society Inc Volume 35.05 – May 2018 Come to one of Apple Developer Conference our meetings Wellington Monday, 28 May 7.15pm - 9.30pm Subject: Accessing Digital Media Kapiti Monday, 4 June 7.10pm - 9.30pm Subject: Backups iPad Group* Saturday, 16 June 1 pm - 3 pm Kapiti Help Desk* TBA (July) Apple’s annual developer conference is coming soon: expect Kapiti news about the next versions of iOS and macOS on Tuesday 5 See page 2 for more June (NZ time). There is a strong possibility of new Macs and details of meetings iPad Pros being released soon. *Please register by emailing [email protected] Where to find us Unless otherwise indicated, main meetings are normally as follows. Wellington: last Monday of the month (except December) at Brian Davis Room, Cathedral of St Paul, corner Hill St and Molesworth St, Wellington. Kapiti: first Monday of the month (except January) at Kapiti Uniting Parish, Weka Road, Raumati. Help desks and other special interest meetings vary. The President Writes p2 RIP: Apple Airport, 1999-2018 p6 INSIDE macOS High Sierra report p4 Reveal Invisible Files p7 Committee Contact Details p8 CAPITAL APPLE – MAY 2018!PAGE 1 The president writes ... Kapiti iPad/iPhone Group An iPad/iPhone group meeting will be held from 1 pm to 3 pm on Saturday 16 June at a member’s house in Kapiti. If you would like to attend the meeting, please contact Shane Gordine [email protected]. Help Desk David Empson We had a successful Lower Hutt help desk last [email protected] month.
    [Show full text]