As usual we plan to present you with great line up
of speakers with interesting topics.
Countdown timer visibleon larger screens.Turn your device sidewaysor go bigger.
Twenty years ago Apple Computer Inc. (they wouldn’t drop “Computer” from the name until 2007) was in the middle of one of the most remarkable turnarounds in tech history. The company, which had flirted with irrelevance in the 1990s, was being reshaped into a powerhouse under the leadership of its co-founder Steve Jobs, who had returned in 1997.
In June 2005, Jobs made the bold move to announce Apple would switch from PowerPC to Intel processors. This was a massive technical and strategic shift, signaling Apple’s ambition to further compete in the mainstream computing market.
Apple was rapidly growing its digital media empire. The iPod had become a cultural phenomenon, and iTunes was dominating digital music sales.
Apple released the Mac Mini in 2005 as a low-cost, small-form-factor computer, aiming to attract Windows users to the Mac ecosystem.
By 2005, Apple management had built the foundation for what would soon become the company’s most successful decade. The seeds of the iPhone were already being planted, and the executive team — though small — was tightly aligned around a shared vision: to build beautiful, integrated products that "just work."
Twenty years ago security was very much reactive, focused on cleanup after infection rather than proactive prevention. Compared to today’s security landscape — with zero trust architectures, behavioral analytics, cloud security, and endpoint detection and response (EDR) — those times seems like the digital wild west.
The term “hacker” still had an underground feel. Tools like Metasploit were just emerging, and Wireshark (formerly Ethereal) was widely used by network pros. Most attacks were done for bragging rights, mischief, or political messages — cybercrime was just starting to become professionalized.
Computer security for most users centered around installing antivirus software and using a basic firewall. Norton and McAfee were among the most popular antivirus programs. Firewalls were either third-party software or built-in, like Windows XP's Service Pack 2, which had just introduced a more robust Windows Firewall. These tools focused mostly on detecting known viruses, worms, and trojans. Signature-based detection was the norm.
Phishing was starting to become more sophisticated, often mimicking banks or PayPal. Drive-by downloads and malicious browser toolbars spread through Internet Explorer, which had many vulnerabilities. Before ransomware became a buzzword, spyware and adware were the biggest nuisances.
In enterprise environments, security focused heavily on the network perimeter. Firewalls, intrusion detection systems (IDS), and VPNs were common defenses. Security policies often didn’t extend far beyond the corporate firewall—there was little concept of "zero trust.
Mobile security and cloud security weren’t even considerations for most. The iPhone was still two years away, and cloud computing hadn’t gone mainstream. Laptops were increasing in use, but few had encryption enabled, and data theft from lost or stolen devices was common.
Twenty years ago Apple device management was a very different landscape compared to today. At that time, the Apple ecosystem was still largely centered around the Mac, with the iPod being its most popular consumer device.
Apple’s primary devices in the enterprise or educational space were Macs. Organizations that used Macs often did so in creative departments and they were often isolated from the broader Windows-based IT infrastructure.
There was no concept of managing Apple devices over-the-air. Everything had to be done manually, locally, or with the help of rudimentary network-based tools. If a Mac needed new software or configuration changes, IT administrators often had to touch each machine physically.
One of the most common management strategies was disk imaging. Admins would create a master image of a Mac setup—complete with operating system, apps, and settings—and clone it onto other Macs using tools like NetBoot/NetInstall or Carbon Copy Cloner.
ARD was powerful for its time, but it only worked over local networks and wasn’t designed for mobile or internet-based management.
macOS updates had to be manually installed or pushed using scripts or custom workflows. There were no built-in policies or tools to enforce updates across fleets of devices. Automation was rare, and software update strategies were usually reactive rather than proactive.
Managing Apple devices in back then meant: - Heavy use of manual processes - Reliance on imaging and physical access - Minimal enterprise integration - No MDM or remote management for mobile devices
It was a very hands-on, Mac-only world—and nothing like the streamlined, cloud-based Apple device management we see today with tools like Jamf, Apple Business Manager, MDM profiles, and Automated Device Enrollment.
Twenty years ago computer deployment looked vastly different from today’s landscape. Back then, the digital world was transitioning from early internet usage to more connected, centralized systems, but many practices were still rooted in older models of IT management and deployment.
On-premise servers were standard. Companies maintained their own server rooms or data centers, complete with cooling systems and backup power supplies. IT staff had to physically manage, upgrade, and troubleshoot hardware — no cloud computing, no virtual machines at scale.
Software was often distributed on CDs or DVDs, and installations were done manually, one machine at a time. System administrators might use scripts or disk imaging tools to speed up deployment, but full automation was rare. Patch management was a manual and time-consuming process — IT had to track security bulletins and apply updates by hand unless third-party patching tools were in place.
In short, computer deployment 20 years ago was more manual, hardware-dependent. IT teams were more hands-on, physically interacting with devices far more than today, where virtualization, cloud services, and automation rule.
It was a time of transition, setting the stage for the massive technological shift that would accelerate in the 2010s and beyond.
The event starts with registration from 9 AM Tuesday morning and will end at approximately 3 PM Friday afternoon.