Greetings everyone! So… most of us have learned a few things about Android in the enterprise environment especially in regulated environments: It’s a major pain in the ass The business users that use it have high expectations It’s impossible to manage Ironically, in my career usually like 5% of our users actually use it and […]Read More Breaking Down Workspace ONE’s Android SSO
Hello Virtual Friends! As I sit here on the majestic JetBlue flight to Vegas, I have been pondering what should I write to pass the time as I reflect and prepare for one of the most pivotal moments of my career. I came from humble beginnings that logical should not have me as a key […]Read More My Journey and Vision to Presenting at VMWorld 2018
We are quickly seeing that convergence of endpoints in the technology space today. No longer is it about SCCM or MDM or the other million acronyms that make normal people cringe. We have quickly entered the world of “Unified Endpoint Management” aka UEM. VMWare has been this clear with their ditching of AirWatch for WorkspaceONE […]Read More Perfecting a Zero-Touch Deployment of MacOS via MDM
Introduction Hi there everyone! This is something that I have been thinking about doing for quite some time. I will be honest with you…this article is going to be part venting, part projecting, and completely honest. Yeah I know the word “honest” twice in one sentence…I suck! The point of this blog post is to […]Read More The Life of a Mobility Engineer
Hi everyone! So, who hates OVAs?! ::raises hand:: I’ve been able to work a few back channels and get access to installers for VMWare Identity Manager that are non-OVA running on Windows instances. Here’s the catch, it REALLY sucks to build it. I’m going to document to full process end-to-end to give you a better […]Read More Building VMWare Identity Manager OnPrem
Hi Guys, Gals, and Quadrupeds! Once a year for my amazing firm I do an assessment of Intune. I think it’s important to take a long/hard look at things and just because its Microsoft doesn’t mean its overpriced and bad. Honestly, it has come a long way. I will talk about the basic requirements every one […]Read More Mobile Jon’s 2017 Intune Assessment
Hi there! Yeah like everyone else in IT I am also a Game of Thrones nerd and that’s okay. I think the sheer amusement of Faceless men and Face ID is an entertaining anecdote. For those of you living in a cave, I’m talking about this guy! So moving on, I wanted to take some […]Read More Can a faceless man use FaceID?
Well, here we go again! It’s been awhile since I posted anything, but that’s sort of how things go. I felt like it was time to share and document the right away to secure an email proxy. I know there is plenty of documentation out there on this, but I thought it would be helpful […]Read More Security Hardening of an Email Proxy 101