Thomas Hatch and Jimmy Chunga are The Hacks! Join them every week as they talk about nerd stuff. If you’re into cybersecurity, DevSecOps, SecOps, DevOps, all the Ops, infrastructure automation, network automation, configuration management, and open source then subscribe now. This will be your new favorite podcast! Because we know you’re thinking it...NO, they don’t live in their moms’ basements...this month.
…
continue reading
Pulling the Strings is your guide to everything DevOps, from unpacking breaking trends to sharing helpful how-tos that make your life easier. In quick, casual conversations, Puppet engineers, open source community members, and global DevOps luminaries cover what you never knew you needed to know about DevOps. Whether it’s unpacking the latest tooling to sharing tips for getting buy-in from your team, Pulling the Strings is built for the DevOps devotees in all of us.
…
continue reading
Cybersecurity focus with an emphasis on industry vendor products that help solve cybersecurity challenges.
…
continue reading
APM Project Management Qualification
…
continue reading
The IpX True North Podcast is a global industry resource for all things people, processes, systems, and technology created to share conversations with our network of thought leaders, innovators, and founders changing the shape of the digital future. Here we share their stories, impact, vision and tools for success in the areas of process optimization, engineering, the model based enterprise, operational excellence, and digital transformation.
…
continue reading
Welcome to the ExpedITioners podcast brought to you by Fleet. This podcast is dedicated to helping IT and security professionals get ahead of the curve and prepare themselves and their organizations for what lies ahead. In each episode, Zach Wasserman will interview an IT or security leader to learn how they are succeeding at managing their devices today and how they are preparing for tomorrow.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Raising Your Standards: Innovations in Accreditation Management with ARMATURE Fabric
ARMATURE Solutions Corporation
Welcome to 'Raising Your Standards: Innovations in Accreditation Management with ARMATURE Fabric', where we explore cutting-edge innovations in accreditation management. Hosted by Andrew Bryden, we uncover the secrets to exceeding standards with ARMATURE Fabric, the leading accreditation management software. Join us to elevate your accreditation game and set new benchmarks for excellence. Subscribe now!
…
continue reading
Join Steve Crowe and Mike Oitzman each week for discussions with leading roboticists, innovative robotics companies, and other key members of the robotics community.
…
continue reading
On The Manufacturing Executive podcast, we’ll explore the strategies and experiences that are driving midsized manufacturers forward. You’ll hear conversations with passionate manufacturing leaders who have compelling stories to share about their successes and struggles. You’ll also hear interviews with B2B Sales and Marketing experts about what’s working on the business development front and how to make these ideas actionable. Episodes will feature topics related to industrial marketing and ...
…
continue reading
Do you often wonder what’s the best way to architect, upgrade, or configure your monitoring solution? The BMC Performance and Availability Business Unit is providing a series of best practices content for its BMC ProactiveNet Performance Management (BPPM) and TrueSight Infrastructure Management solutions. Content delivered in each session gives guidance for specific areas of the solution and functionality for the releases by version. Each recording is designed to provide a solid foundation f ...
…
continue reading
Cutting through the noise for Canadian VARs and MSPs
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Humorous technology demonstrations tackling design, implementation, and support of IT infrastructures. Presented by our resident geeks using video and screencasting. Nicky Curtis an IT consultant, and Microsoft Certified Trainer specialises in enterprise technologies. Nicholas Hill introduces alternative open source solutions.
…
continue reading
Stop living in the past. With technology changing, it's important to be aware of the latest features, functionality, and best practices. Join Steve Beals as he interviews the tech experts that helped design, build and deploy the latest Citrix technology. They'll help you understand how the magic works so you can impress others with your Citrix knowledge and expertise. So subscribe, tune in, and geek out with us on The Click-Down. Follow Steve Beals on X (formally Twitter) @SRBeals
…
continue reading
A podcast series where Mark Burgess (@markburgess_osl ) and John Willis (@botchagalupe) discuss futuristic concepts of IT. Mark has a PHD in physics among other things and I barely finished high school. We, therefore, seem to make an unlikely pair for discussion. However, we have found over the years our discussions on such subjects make for great dialog (at least we enjoy it). We have decided to see if other's agree. RSS Feed: http://feeds.soundcloud.com/users/soundcloud:users:245384055/sou ...
…
continue reading
Editor of Post Magazine Marc Loftus interviews the industry's top professionals giving a window into the world of post production and filmmaking that is rarely seen
…
continue reading
Automation Alley is Michigan’s leading nonprofit technology and manufacturing business association, connecting industry, academia and government to fuel Southeast Michigan’s economy and accelerate innovation. Automation Alley focuses its efforts on innovation and technology, entrepreneurship, talent development, defense and international business, providing resources, funding and actionable intelligence to help members grow and prosper in the digital age. Automation Alley programs and servic ...
…
continue reading
Welcome to Modern Digital Business—a podcast for corporate technology decision makers and executives looking to create or extend their digital business with the help of modern applications, processes, software architecture, and organizational modernization. Your host for Modern Digital Business is a recognized industry thought leader and author, Lee Atchison. Lee specializes in application modernization, cloud-native applications, architecture, and modern organizations. To learn more, visit ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 156: Security Configuration Management, Change and Communication Best Practices (Domain 7.3)
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46
Send us a Text Message. Is a four-year college degree necessary to break into the world of cybersecurity? Discover why practical experience and industry certifications might just be your golden ticket to a thriving career in IT. In this episode of the CISSP Cyber Training Podcast, host Sean Gerber unpacks Domain 7.3 of the CISSP exam, emphasizing t…
…
continue reading
Tom is taking a much needed break. Before he left on his extended holiday, he and Chunga had a chat about the decline of remote work in the tech space. This is one of those rare subjects of which Tom and Chunga passionately disagree. Recently, it has come to light that as many as 25% of tech companies have admitted to using a manditory "return to o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
When and How to Implement a Warehouse Management System w/ Casey Winans
38:39
38:39
Play later
Play later
Lists
Like
Liked
38:39
Warehouse management systems. What exactly are they? What's different from the features in your ERP? Or your MES? Who truly needs a warehouse management system? When do you know you'll be ready for one? And how do you choose the right one for you? CEO of Fullstride, Casey Winans, is here to answer all of these questions and more.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 155: Practice CISSP Questions - Security Assessments, Account Management, Backup Verification (Domain 6)
24:06
24:06
Play later
Play later
Lists
Like
Liked
24:06
Send us a Text Message. Ever wondered how to secure your SaaS environment while mastering essential security testing techniques? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as we navigate the complexities of cybersecurity, starting off with some personal July 4th reflections and an insightful Forbes article on the pressing threats and…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
When Engineering and Marketing are in Sync w/ Adam Beck and Jeffrey Abell
35:31
35:31
Play later
Play later
Lists
Like
Liked
35:31
In most companies, experts are hired to do a specific job. Engineering does engineering. Marketing does marketing. Sales does sales. And so on. But what happens when each of those departments does their respective jobs in silos, without a common mission, and in the absence of collaboration? In today's conversation, Jeffrey Abell (engineer) and Adam…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 154: Security Assessments, Account Management, and Backup Verification (Domain 6.3.1-5)
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34
Send us a Text Message. Ever wondered how to fortify your organization against cyber threats? Join Sean Gerber as we uncover the essentials of Domain 6.3 of the CISSP exam, from security assessments to account management and backup verification. Learn about tools like Nessus and Qualys and the role of ethical hacking in identifying vulnerabilities.…
…
continue reading
CISOs are typically not the owner of their organization's most critical (or even non-critical) assets and data. There are usually business unit leaders assigned to that, and the CISO's role is to help reduce the risk to those assets. If the CISO does have direct access to those assets, it's a bad architectural design. That's today's #CyberSunday to…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Pushing the limits of warehouse inventory management
1:14:33
1:14:33
Play later
Play later
Lists
Like
Liked
1:14:33
On today's episode, we catch up with Oana Jinga, co-founder, Chief Commercial and Product Officer for Dexory to learn all about the Dexory warehouse inventory management solution. Also on this episode, we feature a conversation between editorial director Gene Demaitre and Garret Place, Business Development for robotic perception at ifm.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 153: CISSP Practice Questions - Ransomware Attacks and Understanding IoT Trustworthiness (Domain 5)
22:08
22:08
Play later
Play later
Lists
Like
Liked
22:08
Send us a Text Message. Could a seemingly minor breach at a smaller bank signal bigger vulnerabilities in our financial system? On this episode of the CISSP Cyber Training Podcast, we deliver eye-opening insights on a recent cybersecurity incident involving the notorious ransomware group LockBit. While the U.S. Federal Reserve remained untouched, E…
…
continue reading
Chunga made an observation recently. He says we're in the tech industry "silly season"! Every single day, there's a new, completely crazy, earth-shattering story coming out of a big tech company, somewhere. Tom partially agrees with Chunga, it has been nuts, but he says when it comes to the tech space, it's always the silly season! One of the bigge…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Benefits of an Employee-Ownership Culture w/ Brian Baker
43:57
43:57
Play later
Play later
Lists
Like
Liked
43:57
If you were out at a nice dinner with your significant other and you had the choice to be served by whichever waitress or waiter usually services your table OR the owner of the restaurant, who would you choose? In today's conversation, CEO and President of Sentry Equipment Brian Baker talks about the benefits of an employee-ownership culture. As a …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 152: Federated Identities and Credential Management for the CISSP Exam (Domain 5.3)
32:59
32:59
Play later
Play later
Lists
Like
Liked
32:59
Send us a Text Message. Want to ensure your organization's sensitive data remains secure in today's mobile-centric world? Tune in to our latest CISSP Cyber Training Podcast episode, where we unravel the complexities of federated identities and robust credential management. Learn from the high-profile data breach involving Change Healthcare and disc…
…
continue reading
Security conferences and events are often built with a certain audience in mind. Some are for a a general audience, and others are focused on the CISO. But if an event has a focus on the CISO, it should be for a good reason. I discuss some of those reasons in today's #CyberSunday. Things Mentioned: https://www.linkedin.com/posts/kane-n_its-sad-to-s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 151: CISSP Practice Questions - Unraveling Multi-Layer Protocols and Data Encapsulation (Domains 4.1.4 & 4.1.5)
22:38
22:38
Play later
Play later
Lists
Like
Liked
22:38
Send us a Text Message. Ready to conquer the CISSP exam? This episode promises to arm you with crucial insights into the OSI model and its real-world applications. We kick things off by unraveling the intricacies of VPN tunnels and the pivotal role the data link layer plays in encapsulating data packets for secure internet travel. Next, you'll gras…
…
continue reading
For a long time, Tom has wanted to do an episode of The Hacks that's centered around what he refers to as data center "bloopers". Chunga isn't entirely sure what he means by this. Tom has always been amazed by the cathedral like way in which data centers are built. If you think about it, most data centers are built up and modified over a long perio…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Moving From Custom-Engineered to Configuration-Based Products w/ Henrik Hulgaard
37:04
37:04
Play later
Play later
Lists
Like
Liked
37:04
In this conversation, Vice President of Product Management and co-founder of Configit, Henrik Hulgaard, talks about moving from a custom-engineered to configuration-based product offering. Specifically, he unpacks the benefits both to the customer AND the manufacturer of making this shift.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 150: Unraveling Multi-Layer Protocols and Data Encapsulation for the CISSP Exam (Domains 4.1.4 & 4.1.5)
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23
Send us a Text Message. Are multi-layer protocols the key to safeguarding our digital world amidst the rising tide of cyberattacks? Join me, Sean Gerber, as I unravel the complexities of these protocols and their vital role in cybersecurity, drawing from the CISSP ISC² domains 4.1.4 and 4.1.5. By sharing my firsthand experiences and highlighting th…
…
continue reading
Does practice make perfect? Probably not perfect, but it does make you better. That also applies when performing tabletop exercises. But is it feasible to practice as much as you SHOULD when everyone has other jobs to do? That's what Michael is talking about in today's #CyberSunday. Things Mentioned: · Peter Sacawaker’s LinkedIn Post - https://www.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Advancing the capabilities and standards of indoor and outdoor autonomous systems
1:11:29
1:11:29
Play later
Play later
Lists
Like
Liked
1:11:29
Stratom President and CEO Mark Gordon joins us today on the podcast. Stratom is a military contractor that makes robots for various divisions of the US armed forces.The company has also expanded to the commercial sector with its field robotics solutions, including applications such as mining and construction.Listen in as our friend Aaron Prather fr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 149: Practice CISSP Questions - Threat Modeling & STRIDE for CISSP Exam Success (D3.1)
12:09
12:09
Play later
Play later
Lists
Like
Liked
12:09
Send us a Text Message. Ready to conquer the CISSP exam? Unlock the secrets of threat modeling with our latest episode! Join me, Sean Gerber, as we break down the STRIDE methodology—Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. Learn how to decode these critical security concepts and master…
…
continue reading
Chunga saw an article a few days ago, and it really surprised him! This particular article said that agile software has had a 268% failure rate... 268%. While Chunga is shocked to his this news, Tom isn't surprised at all! How is this possible from and industry perspective? In what world is a 268% failure rate ever accepted? For the record, Tom is …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
What the U.S. Can Learn From the German Manufacturing Model w/ Jon DeSouza
30:50
30:50
Play later
Play later
Lists
Like
Liked
30:50
Following a few decades of sending manufacturing across seas to drive down costs, big reshoring movements are in full force throughout the American manufacturing sector. But meanwhile in Germany, much of that manufacturing never left in the first place. Through strategies that have included embracing automation, localizing manufacturing operations …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 148: Understanding and Implementing Threat Modeling for the CISSP Exam (Domain 3.1)
42:37
42:37
Play later
Play later
Lists
Like
Liked
42:37
Send us a Text Message. What if you could transform your cybersecurity skills and become an expert in threat modeling? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as I guide you through the critical elements of threat modeling, a key topic for any cybersecurity professional gearing up for the CISSP exam. We'll discuss why grasping the…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Gathering warehouse inventory data - plus a look at Electrocraft motion solutions
1:15:49
1:15:49
Play later
Play later
Lists
Like
Liked
1:15:49
On the show today, we talk to Sankalp Arora, CEO and co-founder of Gather.ai, and learn about Gather’s view of warehouse inventory management using drones.The second feature on the show today is an interview with Jake Hall, the Manufacturing Millenial, and Scott Sizemore, Director of Commercial Marketing at Electrocraft.Links:https://www.gather.ai/…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 147: Practice CISSP Questions - Defense in Depth and Secure Defaults (D3.1.2-3)
17:27
17:27
Play later
Play later
Lists
Like
Liked
17:27
Send us a Text Message. What if your organization's data could be breached through an exposed API in your modem? Join me, Sean Gerber, in this week's CISSP Cyber Training Podcast as we unravel the hidden dangers of API connections and dive into the latest security flaws found in Cox modems. We'll also kick off our thrilling CISSP Question Thursday,…
…
continue reading
Tom loves to innovate, it's who he is, and for him, its an unquenchable thrist. The pressure he puts on himself to create something new, is sometimes unhealthy. At the same time, Tom will also tell you that if he would've understood how hard it was going to be to turn Salt into what it is today, he wouldn't have done it. Innovation from an emotiona…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Closing the Loop: Configuration Management in the Age of Digitalization with Faruk Oğuz
28:04
28:04
Play later
Play later
Lists
Like
Liked
28:04
#TrueNorth Podcast | Join our host, IpX's Joseph Anderson and Faruk Oğuz, Engineering Manager of Configuration Management at Turkish Aerospace and CM2-P, as they dive into the intricate world of aerospace innovation, digitalization, and the indispensable role of configuration management. They explore the challenges and opportunities within the indu…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Getting Inside the Minds of the Next Generation w/ Meaghan Ziemba
46:34
46:34
Play later
Play later
Lists
Like
Liked
46:34
We all know that we need to find ways to engage the next generation so we can build the manufacturing workforce of the future. And it's no secret to anyone listening that this next generation uses technology differently, interacts with people differently and collects information differently. But they also have different core values and care about d…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 146: Defense in Depth and Secure Defaults for the CISSP Exam (Domains 3.1.2 & 3.1.3)
36:12
36:12
Play later
Play later
Lists
Like
Liked
36:12
Send us a Text Message. Curious about how to implement robust cybersecurity measures and avoid costly breaches? In our latest episode of the CISSP Cyber Training Podcast, we unravel the intricacies of defense in depth and secure defaults as outlined in domains 3.1.2 and 3.1.3 of the CISSP exam. Starting with a weather update from Kansas, we shift g…
…
continue reading
In mentorship, it's often thought that the mentor is doing the teaching and the mentee is doing the learning. But mentors should also be open to and seek out lessons that they can take from the mentee. In this #CyberSunday, I talk about how tenured #cybersecurity professionals can learn about new tech and new concepts from those who are newer to th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The inside scoop on food manufacturing with Chef Robotics
1:35:53
1:35:53
Play later
Play later
Lists
Like
Liked
1:35:53
On the show this week, we get the inside scoop on automating food manufacturing with Chef Robotics founder and CEO Rajat Bhageria. He takes us through the evolution of the Chef Robotics roadmap and the complexities of handling a variety of precooked food items with a robot.Check out Chef Robotics:Also on the show this week, Meaghan Ziemba, host of …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 145: Practice CISSP Questions - Data Classification and Protection for the Exam (Domain 2.1.1)
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30
Send us a Text Message. Ever wondered how to navigate the complexities of data classification within your organization? Get ready to sharpen your cybersecurity skills and elevate your knowledge as we dissect CISSP Question Thursday, focusing on domain 2.1.1. This week, we also bring you an intriguing piece of news about ARPA-H, a groundbreaking new…
…
continue reading
Hey everybody, its Toms birthday! Happy Birthday old man!! Today on The Hacks, Chunga wants to talk about tech's dirty little secret. This secret, by the way, is how much of the tech industry actually survives! He's talking about "shelfware" and the "cloud shell game". Tom says between the two, the cloud shell game is actually worse, and more damag…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How to Adapt in a Changing B2B Manufacturing Buying Landscape w/ Joe Sullivan
16:31
16:31
Play later
Play later
Lists
Like
Liked
16:31
For many B2B manufacturing organizations, what got them where they are today won’t get them where they want to go in the years ahead. In this concise solo episode, The Manufacturing Executive's host Joe Sullivan draws on over a decade of experience advising manufacturing leaders to share his own perspective about how the buying landscape has change…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 144: Data Classification and Protection for the CISSP Exam (Domain 2.1.1)
38:38
38:38
Play later
Play later
Lists
Like
Liked
38:38
Send us a Text Message. As we honor the memory of those who have served and sacrificed, we also acknowledge the ever-present battlefield of cybersecurity. Today, we dissect the essentials of data classification, an integral aspect of Domain 2 in the CISSP exam, while paying tribute to Memorial Day. Join me, Sean Gerber, for a candid conversation wh…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 143: Practice CISSP Questions - All Domains
22:14
22:14
Play later
Play later
Lists
Like
Liked
22:14
Send us a Text Message. Unlock the doors to a fortified cybersecurity career with me, Sean Gerber, as we navigate the complex landscape of CISSP concepts tailored for those aspiring to conquer the CISSP exam. We're not just scratching the surface; we're burrowing into the depths of what it takes to understand and tackle real-world security challeng…
…
continue reading
In this episode of The Robot Report Podcast, Steve Crowe and Mike Oitzman discuss the news of the week, then we hear recent interviews with Mike Oitzman and Ting Ming Ling, founder and CEO of OTSAW. Then we hear Eugene Demaitre interview Etienne Lacroix, CEO and founder of VENTION at the recent Robotics Summit.Links from the show:https://vention.io…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Tom Hatch Exits Broadcom, But Will Stay With Salt Forever!
44:30
44:30
Play later
Play later
Lists
Like
Liked
44:30
One thing that's constant in life is change... It's been a bittersweet few days to say the least. In this episode of The Hacks, Tom Hatch, the creator of Salt, talks with Chunga about the changes taking place in his life and announces his exit from Broadcom. Yep, the time has come for Tom to explore some new opportunities! In this episode of The Ha…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Simulation Technology is Reshaping Product Design w/ Dr. Masha Petrova
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37
For years, product development has meant designing a few things, and then manufacturing them in the thousands or millions. But CEO of Nullpace, Dr. Masha Petrova, will tell you, we're quickly moving in a direction where we can design thousands of things and then manufacture just a few of them. She'll dive into the ways design engineering technology…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 142: Navigating Contractual Law, Cybersecurity Legislation, and Computer Crime Acts (D1)
40:16
40:16
Play later
Play later
Lists
Like
Liked
40:16
Send us a Text Message. Dive deep into the legal intricacies of cybersecurity with me, Sean Gerber, as I guide you through the maze of laws and scams impacting our digital world. Prepare to arm yourself with knowledge that stretches far beyond the CISSP exam, as we tackle the multi-million-dollar repercussions of cybercrimes and the collaborative g…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
When Will IT Security Escape the Cat-and-Mouse Game? with Sean Atkinson, CISO of CIS
34:01
34:01
Play later
Play later
Lists
Like
Liked
34:01
When Sean Atkinson says that “We’re on a trajectory to have the most vulnerabilities ever identified in a single year, starting this year,” take note: As Chief Information Security Officer for the Center for Internet Security, he knows what he’s talking about. He’s referring to the ever-increasing tide of weaknesses and flaws that undermine the sec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 141: Practice CISSP Questions - Business Impact Analysis (D1.8.1)
23:12
23:12
Play later
Play later
Lists
Like
Liked
23:12
Send us a Text Message. Fend off cyber extortionists with cutting-edge insights from our latest cyber training podcast, where Sean Gerber and I dissect the sophisticated methods to recover data from ransomware's icy grip. Inspired by a Sophos News article, we navigate through six data retrieval strategies that could save your business in a pinch, e…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
2024 Robotics Summit recap / Interviews with RBR50 Winners
1:28:40
1:28:40
Play later
Play later
Lists
Like
Liked
1:28:40
In this episode, Steve Crowe, Mike Oitzman and Eugene Demaitre discuss highlights from the 2024 Robotics Summit and Expo that took place in Boston earlier in the month. Also featured in this episode are interviews with Agility Robotics co-founder and Chief Robotics Officer, Jonathan Hurst, along with Brightpick co-founder and CEO, Jan Zizka. Agilit…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
IBM Buys HashiCorp! Seismic Industry Shift, or... Meh.
43:36
43:36
Play later
Play later
Lists
Like
Liked
43:36
It looks like the rumors were true! Recently, IBM announced that they are buying HashiCorp (and Terraform) for a cool 6.4 billion dollars, in cash. Tom and Chunga both find themselves asking the question, "Why did IBM choose to do this?" They already own Red Hat and Ansible. Did they buy HashiCorp / Terraform because they could, or did they buy it …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Empowering a Self-Directed Workforce w/ Matthew Rassi
28:16
28:16
Play later
Play later
Lists
Like
Liked
28:16
Quite a few manufacturing leaders that I talk to – whether through interviews on this show or in marketing consultations that I conduct – are leading second or third-generation family-owned businesses. They've built successful companies, but have struggled to let go of responsibilities, to delegate and to empower their people to play a role in shap…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 140: Business Impact Analysis and the CISSP Exam (D1.8.1)
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35
Send us a Text Message. Unlock the mysteries of cybersecurity and business continuity with me, Sean Gerber, as we navigate the treacherous waters of cyber threats, including the dark reality of ransomware's impact on our critical infrastructure. Tune in for an intricate look at the geopolitical cyber chessboard, where nations could be gearing up fo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Ingram Micro’s configuration centre adds value to Lenovo ISG products
11:51
11:51
Play later
Play later
Lists
Like
Liked
11:51
In this special bonus episode of the podcast from Ingram Micro Canada, Lenovo Canada’s Bill Tirpkos interviews Ingram’s Ayon Khan and Roger Silvestre about the relationship between the vendor and the distributor, and how Ingram adds value to Lenovo’s data centre lineup. Tune in to find out what partners can get from the configuration centres at Ing…
…
continue reading
In this episode, I discuss the recently announced Citrix VDA for macOS public tech preview and answer several questions that have been asked since the announcement.By Citrix
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 139: Practice CISSP Questions (All 8 Domains)
26:24
26:24
Play later
Play later
Lists
Like
Liked
26:24
Send us a Text Message. Cybersecurity isn't just about the tech; it's about making tough calls under pressure, and this episode is your field guide to navigating those high-stakes scenarios. I'm Sean Gerber, and today we dissect not only the ins and outs of crucial security measures like multi-factor authentication—underscored by the UnitedHealthca…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Future of the Forge: Unpacking the Big (and Small) Changes
41:15
41:15
Play later
Play later
Lists
Like
Liked
41:15
It’s all good news, we promise! The Forge has always been the go-to spot for Puppet users to find, download, and update content and modules. On this episode, we're revealing a few of the exciting changes that are going to make the Forge even easier and more valuable for all Puppet users, like personalization, filters, and features to track module v…
…
continue reading