CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Cloud Backup Podcasts
We provide email recovery, cloud backup, and data migration tools worldwide. User can also test the free demo version before purchasing the solution.
…
continue reading
Welcome to the eFolder Channel Chat. These short, unscripted conversations are real stories from real channel partners moderated by Ted Hulsy, VP Marketing eFolder. eFolder is a leading supplier of cloud data protection, business continuity, cloud file sync solutions, and cloud to cloud backup for MSPs, cloud service providers, system integrators, and VARs. Delivered as wholesale services to the channel, eFolder enables its partners to provide branded data protection and file sync services a ...
…
continue reading
A new beginning in IT
…
continue reading
We will be doing podcasts about data storage, backup & disaster recovery, and cloud storage solutions
…
continue reading
The Sudo Show covers topics ranging from Open Source in business to deep dives into complex technoloyg. The Sudo Show is a proud member of the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
Venyu Solutions Podcast (Video)
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Our Define Tomorrow podcast focuses on the latest technical insights covering the modern workspace, hybrid cloud and security.
…
continue reading
On The Workflow Show, CHESA's Jason Whetstone and Ben Kilburg offer media workflow therapy and address overarching trends and specific tech topics to help guide you through these challenging yet exciting times of unprecedented change within the realm of digital workflows. CHESA is a full-service provider of technology systems and solutions that specializes in optimizing media workflows from creation to distribution and preservation. CHESA’s expert architects design pioneering asset managemen ...
…
continue reading
Beyond Downtime: The Verito Advantage is the podcast for tax and accounting professionals who refuse to let IT issues interrupt their business. Hosted by the experts behind Verito.com, each episode explores the real risks behind "good enough" technology and how to build a firm that just works. Securely. Join us as we dive into real-world stories, compliance must-knows (like the FTC Safeguards Rule, IRS Pub 4557, WISP), and emerging tech shaping the future of financial practices. From ransomw ...
…
continue reading
Trilio Insights delves into the dynamic world of data protection and cloud-native technologies. In addition to Trilio experts, we will bring together practitioners, innovators, and visionaries to explore the evolving landscape of data protection, backup, and recovery. From unraveling the complexities of multi-cloud environments to navigating the challenges of data governance, each episode of Trilio Insights serves to share expertise and experience for Product Engineering, It Ops, Dev Ops, Ar ...
…
continue reading
IT Support Services relied by world industry leaders. Our IT support specialist and technical support engineer can deliver IT solutions to businesses. Our Products - Managed services - Backup and disaster recovery, - Cloud computing - Sofware/system selection, - IT consulting - IT security - IT support - IT upgrades and migrations - Maintenance and monitoring - Network installation and upgrades - Server and desktop virtualisation - Server and network documentation - CargoWise EDI data entry ...
…
continue reading
Raising Tech is your guide to understanding the role technology plays in your community, where to invest to transform culture, and how to bring your team and residents along the journey. Tune in to explore the latest tech trends, dive into hot topics, and hear from industry experts, community leaders, and innovative vendors shaping the senior living tech landscape. Each episode is packed with practical insights and real-world stories to help you spark change and level up your community’s tec ...
…
continue reading
Speaking in Tech: "Where Enterprise Tech meets Consumer Tech...". Speaking in Tech is hosted by Peter Smallbone, Josh Atwell and Melissa Gurney Greene. Topics include popular tech, data storage, cloud computing, networking, storage virtualization, server virtualization, backup, disaster recovery and anything else interesting in the tech world. Disclosure: Speaking in tech does not receive support directly or indirectly from vendors or guests. Vendor relationships are disclosed on the podcast.
…
continue reading
The Tech+ Audio Course is a complete audio study companion for the CompTIA Tech+ (FC0-U71) certification exam, designed to guide learners through every domain and objective. Each episode delivers clear explanations, practical examples, and exam-focused insights to help you build confidence and technical readiness. Whether you are new to IT or preparing for your first certification, this PrepCast provides structured support from start to finish.
…
continue reading
Blueprint Synergy Solutions proudly offers premium Managed IT Services in Denver, CO, designed to help businesses thrive in an increasingly digital world. Whether you're a small business or an enterprise-level organization, our IT solutions are built to scale with your needs while maintaining peak performance, security, and compliance. We provide 24/7 proactive monitoring, real-time threat detection, and seamless system updates to ensure your infrastructure is always secure and operational. ...
…
continue reading
The Business of Fatherhood is hosted by author, speaker, and Dad coach Ben Killoy. A five-day-a-week daily dad podcast inspiring and helping busy dads get excited about pulling into the driveway of their home. I help dads grow through generational trauma, redefine the parameters for living, and create a lasting legacy of change. Schedule your free call > https://www.benkilloy.com/breakthecycle
…
continue reading
Tech topics, stories, and guests, for the everyday techy.
…
continue reading
…
continue reading
Welcome to Hostinghome.in We are the number one web hosting company in India. We are providing cheapest hosting services like shared hosting, VPS hosting, dedicated server, cloud hosting with GSuite. Dedicated hosting starts from only Rs 2699/- per month Providing Free Managed Support, Free Firewall Protection with Free D Dos Protection, Free Backup, Free instant WhatsApp Support, Chat Support, Email Support and Ticket Support.
…
continue reading
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
…
continue reading
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
This video podcast offers sample trailers of recorded presentations from recent Gartner Events. At Gartner Events, information technology experts provide raw insight, strategy, advice and research in a conference environment. Visit "gartner.com/events" to find an event that's right for you and your role. Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. We deliver the technology-related insight necessary for our clients to make the right de ...
…
continue reading
Author commentary for the Star Wars anthology book, From A Certain Point of View: The Empire Strikes Back. Listen to the contributors discuss the inspiration and creative process behind their short stories with members of the Star Wars Books editorial team! The perfect companion to your From a Certain Point of View experience. Note: Spoilers ahead! We encourage listeners to read the book before diving into this audio companion.
…
continue reading
A gumbo of insights and information about Cybersecurity and Data Protection
…
continue reading
Employing an outside company to handle all payroll-related duties is known as outsourcing payroll services in a business. The main reasons for using payroll management services are to cut costs and free up time when handling payroll-related financial operations. Employing a third party to handle payroll operations frees up a company from having to recruit and educate a sizable in-house payroll team, buy suitable payroll software, and keep up with complicated tax regulations. All business typ ...
…
continue reading

1
105. Resident Exclusives- Backups, Storage, and the Cloud
14:03
14:03
Play later
Play later
Lists
Like
Liked
14:03In this practical and informative episode, Tech@Home technician James Peck walks listeners through everything they need to know about backing up and managing files on their smartphones and other devices. From cloud storage to flash drives, James outlines simple, user-friendly methods to keep your digital memories safe and your devices running smoot…
…
continue reading

1
Managing Vendor Incidents with Mandi Walls
31:45
31:45
Play later
Play later
Lists
Like
Liked
31:45You're down - is it your servers, or someone else's? While at the Kansas City Developers Conference, Richard sits down with Mandi Walls from Pager Duty about her experiences dealing with incidents involving vendor services. It might be your cloud provider, or some other SaaS element of a pipeline, or even an open-source library dependency in an imp…
…
continue reading

1
107. The AI Culture Shift with Steve Mika
37:38
37:38
Play later
Play later
Lists
Like
Liked
37:38Host Amber Bardon sits down with Steve Mika, the commercial lead for Data & AI at Fresche Solutions, a Microsoft-focused data and AI consulting firm. Together, they break down the current and future state of AI in senior living, focusing on realistic, strategic implementation that can drive outcomes. Steve dives deep into how senior living operator…
…
continue reading
The days of the one-year SSL certificate are coming to an end - are you ready? Richard chats with Todd Gardner about the upcoming requirement from the Certification Authority Browser Forum to limit SSL certs to 200 days starting March 2026 - and they keep getting shorter until by 2029, certificates will last no longer than 47 days! If you haven't a…
…
continue reading
How do you get your organization trained up to use AI tools? Richard talks to Stephanie Donahue about her work implementing AI tools at Avanade and with Avanade's customers. Stephanie discusses how many workers are bringing their own AI tools, such as ChatGPT, to work and the risks that represent to the organization. Having an approved set of tools…
…
continue reading

1
106. Integrating Tech to Empower Residents and Staff with Heather Tussing
19:11
19:11
Play later
Play later
Lists
Like
Liked
19:11Matt Reiners sits down with Heather Tussing, President of The Aspenwood Company, to explore how innovation, strategy, and a people-first approach are shaping the future of senior living. With over two decades of experience in the industry, Heather shares lessons learned, evolving technology trends, and how Aspenwood is thoughtfully embracing tech w…
…
continue reading
Episode 1000! Richard Campbell invites Paul Thurrott to join him to celebrate the milestone episode and answer questions from listeners. From the creation of the podcast to the role of Windows in the modern world, the impact of ARM, Cloud, and many other technologies - all addressed in this super-sized episode. And yes, artificial intelligence is p…
…
continue reading
In this episode, KJ Burke and Qaiser Habib, head of engineering, Canada at Snowflake, discuss the challenges and strategies for unlocking the power of data within organizations. They explore the evolution of data management, the changing role of IT teams, the importance of data quality, and the shift towards unstructured data. The conversation also…
…
continue reading
What are common mistakes folks are making with their Azure tenant(s)? While at the Kansas City Developers Conference, Richard chatted with Scott Sauber to run down his top ten list of issues he checks on for all his customers using Azure. From tenant ownership to naming conventions, policies, identities, and cost controls - there are a lot of thing…
…
continue reading
In this episode, we're not just talking about data, we're talking about everything that comes with it. The challenges, the misconceptions, the frameworks and compliance. Data is the foundation of so many businesses. Get it right, and you can unlock information that can propel your company forward. But get it wrong, and the challenges it can bring c…
…
continue reading

1
104. Inside the Mind of a Scammer: Kitboga Fights Back
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13In this episode of Raising Tech, host Matt Reiners talks with the legendary Kitboga, a cybersecurity crusader and content creator known for baiting and exposing online scammers. With over 3.74 million YouTube subscribers and more than a billion views across platforms, Kitboga shares how he transforms tech knowledge into entertaining education. From…
…
continue reading
How do you secure your organization's data to let AI technologies work safely? Richard chats with Martina Grom about her experiences helping sysadmins responsibly bring the power of Microsoft M365 Copilot into their organizations. Martina discusses setting up security and monitoring with tools like Microsoft Purview, enabling visibility into where …
…
continue reading

1
Episode 58: Wireless Security Settings: SSID, WPA2, and WPA3
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51This episode covers the essential security settings for configuring a small wireless network. We explain how to change the default SSID, set strong passwords, and choose between encryption standards such as WPA2 and WPA3. You will learn the differences between open, pre-shared key, and enterprise-level authentication options. We also provide real-w…
…
continue reading

1
Episode 57: Encryption Use Cases: Data at Rest vs. Data in Transit
15:29
15:29
Play later
Play later
Lists
Like
Liked
15:29This episode explains how encryption protects data in two primary states—when stored (data at rest) and when moving across networks (data in transit). We define plaintext and ciphertext, along with encryption methods for securing files, disks, mobile devices, emails, and web traffic. Understanding these concepts is vital for identifying when and ho…
…
continue reading

1
Episode 56: Password Management: Complexity, Rotation, and Managers
11:29
11:29
Play later
Play later
Lists
Like
Liked
11:29This episode examines best practices for creating and managing secure passwords. We explain why password length, complexity, and uniqueness are essential to reducing the risk of compromise. You will learn how to implement policies for password history, expiration, and avoiding reuse across different accounts. These guidelines help maintain system s…
…
continue reading

1
Episode 55: Safe Browsing: Certificates, Sites, and AI Risks
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10This episode focuses on safe browsing practices to protect user data and system integrity. We explain how to verify website security using valid certificates, recognize potentially malicious sites, and configure browser settings for safer operation. Privacy considerations include managing cookies, limiting personal information shared online, and un…
…
continue reading

1
Episode 54: Software Practices: Licensing, Sources, and Updates
13:42
13:42
Play later
Play later
Lists
Like
Liked
13:42This episode covers the best practices for managing software, from verifying licensing compliance to ensuring secure sourcing and regular updates. We explain the differences between open source, proprietary, subscription, and perpetual licenses, along with the importance of product keys and serial numbers. We also emphasize downloading software fro…
…
continue reading

1
Episode 53: Device Security: Phishing, Malware, and Hardening
12:50
12:50
Play later
Play later
Lists
Like
Liked
12:50This episode addresses key strategies for securing devices against common threats. We cover security awareness measures, such as recognizing phishing attempts, and the importance of anti-malware tools, firewalls, and regular patching. You will learn how to implement physical protections like cable and USB locks, as well as software-based safeguards…
…
continue reading

1
Episode 52: Authentication and Authorization: Models and Logging
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17This episode focuses on the processes of authentication and authorization, explaining how they verify identity and determine permissions. We outline common authentication methods, from single-factor to multifactor, and introduce models such as least privilege and role-based access control. You will also learn how proper logging supports accounting …
…
continue reading

1
Episode 51: Security Concepts: CIA, Privacy, and Frameworks
14:07
14:07
Play later
Play later
Lists
Like
Liked
14:07This episode explores the foundational concepts of information security, beginning with the CIA triad—confidentiality, integrity, and availability. We explain how each principle guides security decisions and policies, from controlling access to ensuring data accuracy and maintaining system uptime. You will also learn about privacy considerations, s…
…
continue reading
This episode introduces the Security domain, which covers essential principles, best practices, and protective technologies for safeguarding systems and information. You will learn how this domain addresses confidentiality, integrity, availability, privacy, authentication, and authorization concepts. Its coverage is broad, touching areas from devic…
…
continue reading

1
Episode 49: Backup Strategies: File, System, and Storage Locations
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29This episode covers the principles of data backup, including file-level backups, full system backups, and restore procedures. We explain different storage locations, from local media like external drives and SD cards to cloud-based storage solutions, and discuss the pros and cons of each approach. We also present examples of backup scheduling, such…
…
continue reading

1
Episode 48: Database Structures: Relational and Non-relational Explained
12:36
12:36
Play later
Play later
Lists
Like
Liked
12:36This episode compares relational and non-relational database structures, explaining when each is most effective. We define relational components such as tables, rows, columns, and keys, as well as non-relational formats like key/value and document databases. Understanding these distinctions is crucial for recognizing how data should be organized in…
…
continue reading

1
Episode 47: Databases in Action: Usage, Speed, and Structure
14:04
14:04
Play later
Play later
Lists
Like
Liked
14:04This episode focuses on the practical uses of databases, including creating, querying, and generating reports. We explain the advantages of databases over flat files, such as scalability, speed, and support for multiple concurrent users. You will also learn about data persistence, availability, and the trade-offs between cloud and local database ho…
…
continue reading

1
Episode 46: Data Value: Analytics, Reporting, and Monetization
11:18
11:18
Play later
Play later
Lists
Like
Liked
11:18This episode explains how organizations treat data as a valuable asset, exploring its role in decision-making, reporting, and revenue generation. We cover the difference between critical and non-critical data, how data is collected, and how it is correlated to identify trends and insights. You will learn how analytics and meaningful reporting influ…
…
continue reading

1
Episode 45: Data and Database Fundamentals: Domain Overview
10:56
10:56
Play later
Play later
Lists
Like
Liked
10:56This episode introduces the Data and Database Fundamentals domain, explaining how it addresses the value of data, database structures, and backup concepts. You will learn why this domain is crucial for understanding how information is stored, managed, and secured, and how it connects to other exam areas like software, networking, and security. We a…
…
continue reading

1
Episode 44: Code Organization: Pseudocode, Flowcharts, and Logic
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04This episode explains organizational techniques used in programming, including pseudocode, flowcharts, and logic structures. We describe how pseudocode provides a language-agnostic plan for development, how flowcharts visually map program flow, and how logical structures like branching and looping control execution. These tools help programmers des…
…
continue reading

1
Episode 43: Programming Concepts: Variables, Functions, and Objects
11:57
11:57
Play later
Play later
Lists
Like
Liked
11:57This episode covers the core concepts of programming, focusing on variables, functions, and objects. We explain how variables store and manipulate data, how functions encapsulate reusable logic, and how objects combine properties and methods to model real-world entities in code. Understanding these concepts is essential for interpreting how program…
…
continue reading

1
Episode 42: Data Types: Char, String, Integer, Float, Boolean
12:40
12:40
Play later
Play later
Lists
Like
Liked
12:40This episode reviews the fundamental data types used in programming, including characters, strings, integers, floating-point numbers, and Boolean values. We define each type, explain its purpose, and describe how data types influence program behavior. This understanding is critical for writing accurate code and avoiding type-related errors, which c…
…
continue reading

1
Episode 41: Programming Language Types: Interpreted, Compiled, and More
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21This episode explains the different categories of programming languages, including interpreted, compiled, scripting, markup, and query languages. We discuss how interpreted languages execute code line-by-line, compiled languages translate entire programs into machine code before execution, and how scripting and markup languages serve specific autom…
…
continue reading

1
Episode 40: Software Development Concepts: Domain Overview
13:07
13:07
Play later
Play later
Lists
Like
Liked
13:07This episode provides an overview of the Software Development Concepts domain, outlining the skills and knowledge areas it covers. You will learn about programming language categories, fundamental data types, programming concepts, and organizational techniques. The domain’s focus is on helping you understand the building blocks of software and how …
…
continue reading