- About MacNews
- Category Reviews
- Tech Support
- Connect Tools
In response to viewer requests for us to feature a real organization adopting Office 365, today we kick off a special series featuring the IT staff of the Lotus F1 Team to follow their implementation. The roll out spans their race, engineering, operations and design teams.
In this episode, I visit them at their Enstone headquarters in the middle of the race season where all focus is first and foremost on making the car faster and technology decisions are not taken lightly.
This first show explores the decisions around their IT implementation of Office 365. Having started almost a year ago, they began with Azure Active Directory integration, email and Skype for Business. The team share their tips for choosing between identity options, service configurations, hybrid architectures and discuss their mobile strategy.
Over 20 percent of their users are mobile, either racing, testing or designing the car or managing team logistics and operations, with at least 100... | Read more »
Confession time: back when I was a consultant, I didn’t always use best practices. I know – that’s a loaded phrase anyway, but this wasn’t good. My name is Allister Banks, and I set up autopkg to run as root with a launchdaemon. In my defense, it was on an in-warranty Xserve, and I hadn’t seen Greg’s presentation at MacSysadmin.se 2013 where he showed that he had set it up with Jenkins… because that talk was still months in the future at that point.
When writing autopkg recipes I'm often glad that doesn't run as root. #macadmin pic.twitter.com/NWLIxuxarL
— Ipcress Rowley (@toofrag) December 1, 2014
Phew! Feels good, I feel lighter. Ok, now on to what I’d much rather you remember from this post.
Autopkg and Reposado both fit into the Jenkins model for me, as it’s something I want to run on a... | Read more »
It probably comes as no surprise to most business owners that email is a primary way hackers can gain access to sensitive company data and information. But it may alarm you to know that small businesses are particularly vulnerable. Specifically, overall cyber-attacks on companies with 250 or fewer employees doubled in the first six months of last year—and the loss per attack was more than $188,000 on average. The effect of cyber-attacks on the American economy as a whole is a high cost of $100 billion annually, according to the Center for Strategic and International Studies.
That’s one reason the great Sony email hack of 2014 was such a big deal—it left every business wondering how they could avoid the same fate. It... | Read more »
You loved your Apple Watch. It was awesome. But then something happened. Maybe it got glitchy. Maybe it got weird. Maybe you want to sell it and so just want to get it back to factory defaults first. Well, either way it’s easy. To reset your watch, open the Settings app.
Open the General app.
Tap Reset at the bottom of the list.
When prompted, tap Erase All Content and Settings on the Apple Watch.
Once done, unless you’re getting rid of the watch, you’ll want to pair it again. To do so, follow the instructions in this article: http://krypted.com/apple-watch/set-up-your-new-apple-watch... | Read more »
Today’s post on Office 365 was written by Mike McNamara, chief information officer at Tesco.
In late 2014, I participated as a judge in a Tesco Hackathon. I’ve done this before, but this time there was something new about the competition. Instead of just asking developers to come up with an exciting new app in 24 hours, we used Yammer to involve more non-technical Tesco colleagues. Suddenly, out of nowhere, a group of young retail colleagues in the North of England got a team together and presented a great idea to make our Store Locator app more social and friendly; when you look up the location of the nearest Tesco, along with the usual opening hours and whether or not the store has a pharmacy, you get a glimpse into the human side of our company, with colleagues’ stories and pictures. It’s a brilliant idea... | Read more »