|By Tad Anderson||
|November 24, 2012 10:45 AM EST||
|This book is a great addition to my collection of Mac how to books. I like this one because it steps over the line into the more technical side of Mac features than most of the Mountain Lion guide books do.
The book is broken down into seven parts. I have listed the parts below along with the chapters they each contain.
I. Back to Basics
1. The Best Shortcuts (and How to Make Your Own)
2. Starting Applications Automatically at Login
3. Finding Files and Folders Fast
4. Organizing Windows
5. Cleaning House
6. Adjusting Energy and Display Settings
II. Boosting Productivity
7. Launching Applications Fast
8. Customizing Trackpad and Mouse Gestures
9. Connecting Multiple Displays to Your Mac
10. Talking to Your Mac
11. Automating Tasks with Macros
12. Automating Tasks with AppleScript
13. Creating a Bluetooth Proximity Monitor
14. Automating File and Folder Actions
15. Triggering Location-Based Actions
IV. Managing Your Life
16. Managing Your Email
17. Killing Spam
18. Creating Quick and Easy Alerts
19. Managing Your Music
V. Internet and Networks
20. Creating Your Own Safari Extension
21. Turning Websites into Applications
22. Storing Files in the Cloud
23. Accessing Your Mac Remotely
24. Turning Your Mac into a Web and FTP Server
25. Wirelessly Sharing a Printer and Hard Drive
26. Synchronizing Files Between Computers
VI. Serious Security
27. Creating Strong Passwords and Storing Them Securely
28. Enabling Firmware Password Protection
29. Encrypting Your Mac’s Internet Connection
30. Enabling Firewalls
31. Preserving Your Anonymity Online
32. Encrypting Your Hard Disks and Backups
VII. Monitoring, Troubleshooting, and Maintenance
33. System and Process Monitoring
34. Repairing Disk Permissions
35. Verifying and Repairing the Hard Disk
36. Making Better File Backups
37. Maintaining a MacBook’s Battery
38. Creating an Emergency USB Drive
One of the things I like about the book is the way it is laid out. It has a very comfortable and easy to read format. Each chapter starts with an overview of the topic, the project goal for the chapter, and a What You'll be using section. The author then digs into the details of the topic.
At the beginning of each chapter there is a "What You'll be Using" section. This section lists all the tools the author takes advantage of in the chapter. The tools are not all free open source tools. There are some tools listed that must pay for, but I would rather have the tools that get the job done right, than just partial open source tools. Some books I've read have only used open-source tools and a lot of times they've been limited in their functionality.
The author's writing style makes the topics at hand very easy to understand and makes the book a very easy read. It not only can be read from cover to cover, it also make a great reference.
Some of the chapters that were a pleasant surprise were Turning Your Mac into a Web and FTP Server, Preserving Your Anonymity Online, Encrypting Your Mac’s Internet Connection, Creating Your Own Safari Extension, Automating Tasks with AppleScript, and Creating a Bluetooth Proximity Monitor.
The author covers downloading, installing, and configuring MAMP. The author helps you get Apache and MySQL up and running in no time at all.
I love that the author introduces the Tor Browser Bundle and Vidalia Bundle in the Preserving Your Anonymity Online chapter. Not many people know about it. I have used it several time when running through white hat hack attacks during security testing.
This book will stay in my backpack. I highly recommend it to anyone who wants to take the Mac user skills to the next level.
Master Your Mac
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. In his session at @DevOpsSummit, Haseeb Budhani, CEO and Co-founder of Soha, shared five common approaches that DevOps teams follow to secure access to applications deployed in AWS, Azure, etc., and the friction an...
Jul. 28, 2015 03:30 PM EDT Reads: 455
Take the Long View with Digital Transformation By @IoT2040 | @ThingsExpo #IoT #M2M #API #Microservices #InternetOfThings
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
Jul. 28, 2015 03:00 PM EDT Reads: 1,042
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
Jul. 28, 2015 03:00 PM EDT Reads: 441
Jul. 28, 2015 02:00 PM EDT Reads: 262
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affect t...
Jul. 28, 2015 02:00 PM EDT Reads: 1,147
This week, I joined SOASTA as Senior Vice President of Performance Analytics. Given my background in cloud computing and distributed systems operations — you may have read my blogs on CNET or GigaOm — this may surprise you, but I want to explain why this is the perfect time to take on this opportunity with this team. In fact, that’s probably the best way to break this down. To explain why I’d leave the world of infrastructure and code for the world of data and analytics, let’s explore the timing...
Jul. 28, 2015 01:45 PM EDT Reads: 314
[session] The Container New World By @KeGilpin | @DevOpsSummit #DevOps #Docker #Containers #Microservices
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at DevOps Summit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Jul. 28, 2015 01:00 PM EDT Reads: 1,036
Microservices Total Cost of Ownership: Too Soon? By @Aruna13 | @DevOpsSummit #DevOps #Docker #Containers #Microservices
Microservices are hot. And for good reason. To compete in today’s fast-moving application economy, it makes sense to break large, monolithic applications down into discrete functional units. Such an approach makes it easier to update and add functionalities (text-messaging a customer, calculating sales tax for a specific geography, etc.) and get those updates / adds into production fast. In fact, some would argue that microservices are a prerequisite for true continuous delivery. But is it too...
Jul. 28, 2015 01:00 PM EDT Reads: 661
[video] Infrastructure as a Toolbox By @SoftLayer at @CloudExpo New York | #IoT #API #Containers #Microservices
Countless business models have spawned from the IaaS industry. Resell Web hosting, blogs, public cloud, and on and on. With the overwhelming amount of tools available to us, it's sometimes easy to overlook that many of them are just new skins of resources we've had for a long time. In his General Session at 16th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, broke down what we've got to work with and discuss the benefits and pitfalls to discover how we can best use them to d...
Jul. 28, 2015 01:00 PM EDT Reads: 1,936
You often hear the two titles of "DevOps" and "Immutable Infrastructure" used independently. In his session at DevOps Summit, John Willis, Technical Evangelist for Docker, covered the union between the two topics and why this is important. He provided an overview of Immutable Infrastructure then showed how an Immutable Continuous Delivery pipeline can be applied as a best practice for "DevOps." He ended the session with some interesting case study examples.
Jul. 28, 2015 12:15 PM EDT
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Jul. 28, 2015 11:45 AM EDT Reads: 384
Puppet Labs has published their annual State of DevOps report and it is loaded with interesting information as always. Last year’s report brought home the point that DevOps was becoming widely accepted in the enterprise. This year’s report further validates that point and provides us with some interesting insights from surveying a wide variety of companies in different phases of their DevOps journey.
Jul. 28, 2015 10:00 AM EDT Reads: 146
[video] An Interview with @ProfitBricksUSA CEO @AchimWeiss | @CloudExpo #DevOps #Docker #Containers #Microservices
"ProfitBricks was founded in 2010 and we are the painless cloud - and we are also the Infrastructure as a Service 2.0 company," noted Achim Weiss, Chief Executive Officer and Co-Founder of ProfitBricks, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 28, 2015 09:15 AM EDT Reads: 1,081
One of the ways to increase scalability of services – and applications – is to go “stateless.” The reasons for this are many, but in general by eliminating the mapping between a single client and a single app or service instance you eliminate the need for resources to manage state in the app (overhead) and improve the distributability (I can make up words if I want) of requests across a pool of instances. The latter occurs because sessions don’t need to hang out and consume resources that could ...
Jul. 28, 2015 09:00 AM EDT Reads: 141
Node.js is an open source runtime environment for server-side and network based applications. Node.js contains all the components needed to build a functioning website. But, you need to think of Node.js as a big tool box. As with any other art form, going to the tool box over and over to perform the same task is not productive. The concept of tool reuse is used in all forms of artistry and development is no exception.
Jul. 28, 2015 09:00 AM EDT Reads: 131
What we really mean to ask is whether microservices architecture is SOA done right. But then, of course, we’d have to figure out what microservices architecture was. And if you think defining SOA is difficult, pinning down microservices architecture is unquestionably frying pan into fire time. Given my years at ZapThink, fighting to help architects understand what Service-Oriented Architecture really was and how to get it right, it’s no surprise that many people ask me this question.
Jul. 28, 2015 08:45 AM EDT Reads: 359
The Internet of Things. Cloud. Big Data. Real-Time Analytics. To those who do not quite understand what these phrases mean (and let’s be honest, that’s likely to be a large portion of the world), words like “IoT” and “Big Data” are just buzzwords. The truth is, the Internet of Things encompasses much more than jargon and predictions of connected devices. According to Parker Trewin, Senior Director of Content and Communications of Aria Systems, “IoT is big news because it ups the ante: Reach out ...
Jul. 28, 2015 04:00 AM EDT Reads: 358
Cloud Migration Management (CMM) refers to the best practices for planning and managing migration of IT systems from a legacy platform to a Cloud Provider through a combination professional services consulting and software tools. A Cloud migration project can be a relatively simple exercise, where applications are migrated ‘as is’, to gain benefits such as elastic capacity and utility pricing, but without making any changes to the application architecture, software development methods or busine...
Jul. 27, 2015 10:00 PM EDT Reads: 1,308
[video] Logging and Monitoring with @Sematext Founder @OtisG | @DevOpsSummit #DevOps #Logging #Monitoring
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 27, 2015 09:45 PM EDT Reads: 977
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Opening Keynote at 16th Cloud Expo, S...
Jul. 27, 2015 09:00 PM EDT Reads: 2,029