🔒 Patreon Special

IT Pros: exclusive shows await you on Patreon, focusing on the more challenging aspects of running your practice and working with clients and employees.


423: Dress Your Best & Billable Rates

Topics:

  • Jerry talks about the used Mcintosh amplifier from 1967 he recently got for himself.

  • He gives a warning about energizing older products like this because it can be dangerous.

  • What is appropriate to wear on the job?

  • Sam shares a story about his clients dog ripping his brand new corduroys.

  • There’s a certain value you provide when you dress the part.

  • Joe shares some of his favorite button down shirts.

  • The group discusses raising rates and how to communicate that you are doing so with clients.

  • Sam explains that he has stopped giving discounts to new clients to win them over because he charges what his services are worth.

  • Jerry likes to slowly creep his rates up so it isn’t a huge jump.

  • Sam recently increased his hourly rates and he explains how he’d rather have longer term relationships with his clients and his pricing shows that.

  • Adding valuable monthly services helps you to bill outside of hourly labor.

  • The group discusses billing for network monitoring.

422: 2015 Interview With Alsoft Makers Of Disk Warrior

Topics:

For this week’s episode of Command Control Power, we have decided to run a little experiment. We are making this episode a patron only feature. You can find this episode if you are a supporter of Command Control Power on Patreon. You can also click on the Support link in the menu above. Sign up if you are not yet a supporter. If you are a supporter of the show, you can simply log in to Patreon and you will be able to enjoy this week’s episode which we promise is extra juicy. It has some interesting client issues and interactions and we think you will enjoy hearing it. Let us know your feedback if you do. In the meantime, enjoy a highlight from an older episode.

420: Floppy Emu

https://www.dropbox.com/s/0edy8orrdqin6g3/MacSE_DataTransfer.mov?dl=0

https://www.dropbox.com/s/0edy8orrdqin6g3/MacSE_DataTransfer.mov?dl=0

Thank you to our VIP sponsors!

Special Thanks to our friends:


Topics:

-A family approaches Jerry about retrieving data from a Mac SE. The story has some depth to it outside of the technical. 
-Jerry gets an assist with the Emu, which behaves exactly like a real disk drive, requiring no special software or drivers: https://www.bigmessowires.com/floppy-emu/
-A tool available in Windows to view these files was http://a2ciderpress.com
-Another win was an online file converter called http://convertio.co
-Joe had some anecdotes about older Mac computers and accessories he had in high school. 
-WWJD (What Would Joe Do)?
-TextExpander was proving to be troublesome for Jerry and he was given an interesting workaround involving Mission Control. 
-Some other tools we like are Keyboard Maestro and Alfred
-Jerry puts Joe on the hot seat about taxes. Joe actually has a story to tell about dealing with the IRS. 
-Are chicken coops tax deductible?
-Pro Tip - fast.com for speed tests. 
-Joe recommends Proton Mail for secure email communication. Especially for data at rest. 
-mail-tester.com is recommended by Proton Mail to test security of your email messages. 

Thank you to our Patreon sponsors!

Thank you to our Patreon sponsors!

419: When Jiggled by The Jiggler

Season 8 is here!

  • Thank you to our long time sponsor, Jon Brown of Grove Technologies for his continued and increased support of Command Control Power.

  • If you would like to contribute to the show, please visit http://patreon.com/cmdctrlpwr

  • In the latest “I should have known this” corner, Joe learned something new about widgets from the TidBITs newsletter.

  • Sam adds another TidBITs tip about AirTags.

  • Jerry revisits the Mouse Jiggler app from Episode 246: Let Go Of My Echo or Echo Location that helped his Fusion Drive encryption proceed, and shares some excellent feedback from Tom Bridge re: encryption requiring the mouse to be moving. Tom suspected Apple is "using the entropy from the mouse cursor to do part of the encryption" which is apparently the case in High Sierra with APFS (although Jerry's drive was not APFS). 

  • Jiggler 1.9 : No-Doz for your Mac

    http://sticksoftware.com/software/Jiggler.html

  • A benefit to working remotely is that the client won’t see every time you have to google an answer!

  • Sam purchased a 13 inch MacBook pro M1 and then somehow a random serial number got added to his apple business manager.

  • He made the mistake of not listening to Joe’s rules for making a new migration work properly.

  • Joe and Sam are both very happy with their newer M1 computers since they finally have devices that can keep up with everything they do.

  • Jerry suggests Synology Migration Assistant because it works very well for him.

  • While completing a migration Jerry ran into a password problem.

  • Both Joe & Jerry have gathered a treasure-trove of knowledge from a series of YouTube videos from SpaceRex. He has put out helpful videos that can improve Synology performance like this one: https://www.youtube.com/watch?v=AYEEfAI-Upo

  • Little tips like disabling SMB1 or SMB encryption on Synology to increase speeds have been helpful.

  • Jerry also talks about the realities link aggregation.

  • Always consider the quality of drives you add to your drive array.

  • Avoid SMR (Shingled Magnetic Recording) drives and look instead for CMR (Conventional Magnetic Recording) drives.

  • “Cache” is king.

  • Jerry has a real issue with terrible unboxing videos.

  • Jerry would love to have a better partner relationship with Synology.

  • Joe wants to talk more about ransomware, malware, and protecting your data more in future episodes.

  • Important tip: Always have a backup!

  • There are risks to relying solely on backups without an “air gap”.

  • Sam and Joe highly recommends the Security Advisor on Synology


418: Interview With James Chiappetta, Security Expert From Better Appsec

Topics:

1601730206349.jpeg

Consumer empowerment. The individual should be able to actively manage their own data via consent, access, and correction mechanisms. In the event of a lack of adherence to these principles, there must be a way for the individual to address the breach without negative consequences. >> https://lolokaufman.medium.com/is-privacy-by-design-enough-12aa4fddb747