The CompTIA IT Fundamentals+ Audio Course is your step-by-step guide to building a rock-solid foundation in IT, covering hardware, software, networking, databases, and security in a way that’s clear and approachable. Designed for beginners and those looking to prepare for more advanced certifications, each episode turns exam objectives into practical lessons you can follow with confidence. Produced by BareMetalCyber.com, this series gives you the knowledge and momentum to pass the exam and l ...
…
continue reading
Cybersecurity Fundamentals Podcasts
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
In a world where security threats evolve daily, staying informed isn't just smart—it's essential. Welcome to the security breif, the podcast that cuts through the noise of the security industry. Each episode, we dive deep into the latest articles, trends, and expert insights, breaking down complex topics into clear, actionable advice. From the future of CCTV and AI-powered analytics to the fundamentals of access control and cybersecurity, we use real-world blog posts as our launchpad for dis ...
…
continue reading
The Tech+ Audio Course is your complete, on-demand study companion for mastering the CompTIA Tech+ (FC0-U71) certification exam. Designed for those beginning their journey into information technology, it guides you step by step through every domain and objective of the official exam blueprint. Each episode transforms complex IT concepts into clear, relatable lessons filled with practical examples, definitions, and real-world applications. Whether you’re learning about hardware components, so ...
…
continue reading
The A+ Audio Course is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this Audio Course breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most, helping you understand, retain, and apply essential IT concepts—from hardware and networking to operating systems, security, troubleshooting, and professi ...
…
continue reading
This podcast is about the news and events surrounding the tech industry. It will also talk about jobs like but not limited to Cybersecurity, Web Development, and Network Fundamentals.
…
continue reading
…
continue reading
We bring you manufacturing news, insights, discuss opportunities, and cutting edge technologies. Our goal is to inform, educate, and inspire leaders and workers in manufacturing, automation, and related fields.
…
continue reading
Practical, efficient and fun, The Legal Department podcast delivers the bottom line of what busy in-house attorneys need to know to level up their career. Whether you’re the general counsel or just starting a career in a corporate law department, The Legal Department podcast is the place to get real world advice from leading legal executives, executive coaches, and other thought leaders on how to grow your career and deliver more value to your clients. Through conversations with prominent ge ...
…
continue reading
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
…
continue reading
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
…
continue reading
Welcome to Techstrong Unplugged, the go-to podcast for young adults stepping into the immersive world of technology. Brought to you by Techstrong, this series demystifies the tech industry and empowers the next generation. Whether you’re a digital native looking to expand your knowledge or a tech enthusiast eager to explore new trends, Techstrong Unplugged is your bridge to understanding the fundamentals and beyond. In each episode, we’ll dive into the latest in tech, from AI breakthroughs t ...
…
continue reading
If you’re concerned about revenue at your hospital, then The Hospital Finance podcast is your go-to source for information and insights that can help you protect and enhance the revenue your hospital has earned. From regulatory changes to revenue cycle optimization, readmissions to bundled payments, you’ll get important perspectives, news and strategies from leading experts in healthcare finance. For show notes and additional resources from BESLER, visit https://www.besler.com/podcasts
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
1
MS-900 :Microsoft 365 Fundamentals: Exam Cram Notes
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43A comprehensive overview of Microsoft 365 and related cloud concepts. The text thoroughly explains cloud computing fundamentals, including the benefits, economic models, and types like IaaS, PaaS, and SaaS. A significant portion details the diverse Microsoft 365 services covering productivity, collaboration (Teams, Viva, SharePoint), endpoint manag…
…
continue reading
1
Cybersecurity Fundamentals. Inside The Locks And Gates Of The Network Chapter 9
24:58
24:58
Play later
Play later
Lists
Like
Liked
24:58[email protected] Security that actually holds under pressure starts long before passwords and antivirus. We pull back the rack door and walk through the parts that make a network resilient: switches that enforce port security, routers that block spoofed traffic, servers that stay patched and locked down, and load balancers that keep services…
…
continue reading
1
Cloud Native Applications with Jakarta EE: Build, Design, and Deploy Cloud-Native Applications and Microservices with Jakarta EE
15:55
15:55
Play later
Play later
Lists
Like
Liked
15:55Focuses on building, designing, and deploying cloud-native applications and microservices. The book covers foundational concepts like cloud computing basics, major cloud providers (AWS, Azure, Google Cloud), and cloud-native design principles, including the shift from monolithic to microservices architecture. Significant attention is paid to Jakart…
…
continue reading
1
Alarm Maintenance Keeps Insurance Valid Prevents Failure
32:55
32:55
Play later
Play later
Lists
Like
Liked
32:55You’ve invested thousands in a state-of-the-art intruder alarm. You see the keypads and sensors every day, so you assume you're protected. But what if that system has a hidden fault? In this critical episode of The Security Brief, we investigate the single most overlooked factor in security: ongoing professional maintenance. We reveal how a "false …
…
continue reading
1
The UK Alarm Rulebook: Securing Police Response After the 2025 Switch-Off
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04In this deep-dive episode of The Security Brief, we are exploring the definitive rulebook for professional intruder alarms in the UK. What is the real difference between a certified, police-responsive system and one that an insurer won't even recognize? The answer lies in a complex web of standards, urgent deadlines, and strict operational rules. T…
…
continue reading
1
IP CCTV systems vs analogue CCTV: Which is better for your business in 2025?
30:53
30:53
Play later
Play later
Lists
Like
Liked
30:53Are you a business owner in 2025 wondering if your security cameras are up to the job? The world of CCTV has split in two: the reliable, old-school Analogue systems versus the smart, high-tech IP network cameras. Sticking with what's cheap and simple might seem smart, but could it be costing you more in the long run? In this episode, we cut through…
…
continue reading
1
Ep. 234 - What Students Learn When They Build Ignition Projects in Seventy Two Hours
30:54
30:54
Play later
Play later
Lists
Like
Liked
30:54In this conversation recorded at the Ignition Community Conference, Vlad, Dave, and their guest David Grussenmeyer from Inductive Automation explore one of the most important and inspiring stories in the world of industrial automation education. David leads the Educational Engagement Program at Inductive Automation and has spent the last several ye…
…
continue reading
1
Can AI Run Your SOC Better Than You? with Ahmed Achchak
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48What if your security team never missed a single alert and actually had time to think strategically? In this episode, Ahmed Achchak, CEO and Co-Founder of Qevlar AI, reveals how autonomous SOCs are reshaping security operations worldwide. From tackling alert fatigue to empowering analysts with intelligent AI-driven investigations, Ahmed shares the …
…
continue reading
1
Cloud Computing Simplified: Explore Application of Cloud, Cloud Deployment Models, Service Models and Mobile Cloud Computing
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43A comprehensive overview of cloud computing concepts, including its history, characteristics, advantages, and disadvantages. The book extensively details the cloud service models (SaaS, PaaS, IaaS) and deployment models (public, private, hybrid, and community), along with a comparative study of the latter. Furthermore, the source material explores …
…
continue reading
1
Episode 20- From Patients to Products: Cybersecurity Across Sectors. With Brent Yax
36:31:08
36:31:08
Play later
Play later
Lists
Like
Liked
36:31:08Cyber threats don’t just steal data—they halt care, cancel clinics, and shake trust. I sat down with Brent Yax, founder and CEO of Aweccom Technologies to unpack the hard truth: today’s attackers are profit-driven, organized, and focused on disrupting operations until we pay. We trace how the threat landscape shifted from amateur mischief to a matu…
…
continue reading
1
AWP: The Optometry Imposter: Rediscovering Self-Worth in the Fundamentals
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25----------------------- Go to MacuHealth.com and use the coupon code PODCAST2024 at checkout for special discounts Let's Connect! Follow and join the conversation! Instagram: @aaron_werner_visionBy Christopher Wolfe, OD, FAAO, Dipl. ABO
…
continue reading
In this episode, Christina Brown, BESLER's VP-Reimbursement, provides a glimpse into BESLER's free Webinar, Reimbursement Updates 2025, live on Wed., Nov. 19, at 1 PM ET.By Kelly Wisness
…
continue reading
1
Linux Device Driver Development: Everything you need to start with device driver development for Linux kernel and embedded Linux
15:56
15:56
Play later
Play later
Lists
Like
Liked
15:56This technical resource is intended for experienced users like embedded engineers and kernel hackers and requires prior knowledge of C programming and Linux commands. The content offers comprehensive instruction on developing Linux drivers for kernel version v5.10 and embedded Linux systems, covering essential topics such as setting up the developm…
…
continue reading
1
Enterprise DevOps for Architects: Leverage AIOps and DevSecOps for secure digital transformation
13:22
13:22
Play later
Play later
Lists
Like
Liked
13:22A comprehensive guide for architects and engineers on implementing and scaling modern DevOps practices within large enterprises, focusing heavily on automation, quality assurance, and security. Key topics covered include defining DevOps architecture, managing IT delivery in sourcing models, leveraging AIOps (Artificial Intelligence for IT Operation…
…
continue reading
1
Five Principles for Deploying and Managing Linux in the Cloud
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46A comprehensive guide for migrating and optimizing Linux environments in cloud architectures, with a specific focus on Microsoft Azure but also referencing AWS and other cloud vendors. The content is structured around five core principles, addressing critical topics such as cloud readiness assessment, high availability, performance monitoring, secu…
…
continue reading
1
The Chris Wolfe Podcast: Overcoming Headwinds with Adam Cmejlia
46:32
46:32
Play later
Play later
Lists
Like
Liked
46:32https://integratedpwm.com/ ------------------- For our listeners, use the code 'EYECODEMEDIA22' for 10% off at check out for our Premiere Billing & Coding bundle or our EyeCode Billing & Coding course. Sharpen your billing and coding skills today and leave no money on the table! [email protected] https://docs.google.com/forms/d/e/…
…
continue reading
1
Implementing Always On VPN: Modern Mobility with Microsoft Windows 10 and Windows Server 2022
18:25
18:25
Play later
Play later
Lists
Like
Liked
18:25A practical implementation guide for information technology administrators seeking to plan, design, and deploy Always On VPN using current best practices and various Microsoft technologies. Key technical topics covered include infrastructure prerequisites such as certificate management with PKI and Intune, network configuration with Routing and Rem…
…
continue reading
1
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success
13:43
13:43
Play later
Play later
Lists
Like
Liked
13:43A comprehensive guide for individuals aiming to become Security Operations Center (SOC) analysts, covering the essential knowledge, prerequisite technical skills like networking and endpoint security, and the tools critical to the role, such as SIEM and SOAR platforms. The chapters discuss the high demand and career trajectory within the cybersecur…
…
continue reading
1
Losing the Cybersecurity War And What We Can Do to Stop It
15:38
15:38
Play later
Play later
Lists
Like
Liked
15:38A fundamental shift in cybersecurity strategy toward a Zero Trust architecture. The author, an experienced former CIO, identifies five critical battlefields where defenders are currently disadvantaged: Education, Technology, Information, Economics, and Leadership. Testimonials and content previews affirm that the book details the history of this di…
…
continue reading
1
Making Cybersecurity Marketing Creative (and a Little Sexy) with Maria Velasquez
30:04
30:04
Play later
Play later
Lists
Like
Liked
30:04Who said cybersecurity had to be serious? The future of cyber is creative, human, and even a little sexy. In this special 400th episode, Ron Eddings celebrates six incredible years of Hacker Valley Studio with one of cyber’s most creative voices, Maria Velasquez, Co-Founder of the Cybersecurity Marketing Society and Co-Host of Breaking Through in C…
…
continue reading
1
Mastering Go: Harness the power of Go to build professional utilities and concurrent servers and services
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25An extensive overview of the Go programming language. It introduces fundamental concepts such as variables, functions, packages, program flow control, and data types like arrays and slices. Advanced topics covered include Go concurrency with goroutines and channels, systems programming, file I/O, networking (TCP/IP, HTTP, WebSockets, RESTful APIs),…
…
continue reading
1
S2 E7: ICS/OT Security Operations Centers
25:56
25:56
Play later
Play later
Lists
Like
Liked
25:56The growing need for visibility and response in industrial environments is driving more organizations to consider ICS/OT Security Operations Centers — but what does that actually look like for small and medium-sized operations? In this episode of Simply ICS Cyber, Don and Tom sit down with Dan Gunter, CEO and founder of Insane Cyber, to discuss how…
…
continue reading
1
Deep Dive on Processing the Cost Report Webinar
5:22
5:22
Play later
Play later
Lists
Like
Liked
5:22In this episode, Christina Brown, BESLER's VP of Reimbursement Services, provides a glimpse into BESLER's next The Hospital Finance Academy Webinar, Deep Dive on Processing the Cost Report, live on Wed., Nov. 12, at 1 PM ET.By Kelly Wisness
…
continue reading
[email protected] Ever wonder how your phone grabs an IP address the instant you join Wi‑Fi? We break down the invisible handshake that makes it happen: DORA. From discovery to acknowledgement, we map each step of the DHCP exchange, explain lease timers, and show how networks hand out addresses at scale without stepping on their own toes. Alo…
…
continue reading
1
Do This Before You Spend $$$ on Legal Tech With Lyndsey Cain Of LegalEng [E79]
35:50
35:50
Play later
Play later
Lists
Like
Liked
35:50Attention all legal operations professionals! This episode is for you. Legal Ops consultant Lyndsey Cain of LegalEng is in The Legal Department to talk about how to make your legal tech implementation a success. From identifying a non-IT leader, knowing your goals, having a comms plan, and an ongoing governance structure, Lyndsey shares that succes…
…
continue reading
A comprehensive career guide for individuals in or entering the cybersecurity field. The book structures its advice around common career stages, addressing topics such as finding one's "why" for pursuing a security role, developing necessary technical and soft skills like emotional intelligence and effective communication, and strategies for managi…
…
continue reading
1
AWP: Year-End Tax Planning: What the “One Big Beautiful Bill” Means for Practice Owners
1:31:25
1:31:25
Play later
Play later
Lists
Like
Liked
1:31:25As 2025 winds down, Aaron sits down with Refractional CFO’s Jackson Pace and Kevin Dang to break down the major tax changes from the “One Big Beautiful Bill.” They unpack what practice owners need to know about bonus depreciation, Section 179, QBI updates, ERC audits, and new deductions and credits—from child tax to senior benefits. Whether you lov…
…
continue reading
1
Red Hat Enterprise Linux 8 Administration: Master Linux administration skills and prepare for the RHCSA certification exam
20:18
20:18
Play later
Play later
Lists
Like
Liked
20:18A comprehensive guide for Red Hat Enterprise Linux 8 (RHEL8) administration, detailing various system management topics. The sources cover initial RHEL8 installation on both physical and virtual machines, including advanced options like cloud deployments and automated installation techniques. A significant portion focuses on core administration ski…
…
continue reading
1
The Chris Wolfe Podcast: What Happens When Medicine Becomes Marketing
21:21
21:21
Play later
Play later
Lists
Like
Liked
21:21Dr. Chris Wolfe examines how dry eye disease became linked with aesthetic treatments like IPL and radiofrequency. While these light-based therapies show real benefits for inflammation and gland function, marketing them as cosmetic services blurs the line between medical care and elective treatment. ------------------- For our listeners, use the cod…
…
continue reading
1
History of Modern Technology: Cards, Codes, And Courage
25:35
25:35
Play later
Play later
Lists
Like
Liked
25:35[email protected] A census solved with cardboard, a company remade by a $5 billion gamble, and a tiny firmware layer that cracked open the PC market—this is the human story behind how computing became a platform, not a product. We go from Hermann Hollerith’s 1890 insight to IBM’s sales-first system that taught the world to think in fields and…
…
continue reading
1
Solutions Architect's Handbook: Kick-start your solutions architect career by learning architecture design principles and strategies
13:39
13:39
Play later
Play later
Lists
Like
Liked
13:39A comprehensive overview of the role and responsibilities of a Solutions Architect, focusing heavily on cloud computing environments. The text explores various architectural principles, including the importance of scalability and elasticity, security and compliance, and operational excellence in solution design. It details several architectural pat…
…
continue reading
1
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery)
16:13
16:13
Play later
Play later
Lists
Like
Liked
16:13Focused on mastering the Secure Shell (SSH) protocol, primarily using OpenSSH and the Windows client PuTTY. The book is designed to guide both system administrators and general users beyond basic command-line usage, covering advanced topics such as encryption fundamentals, server and client configuration (including specific files like sshd_config a…
…
continue reading
Aims to teach the Go programming language through an engaging, "brain-friendly" approach. It covers fundamental Go concepts such as variables, data types (including arrays, slices, maps, and structs), functions, packages, and control flow (conditionals and loops). The text also introduces advanced topics like pointers, methods, interfaces, error ha…
…
continue reading
1
Ep. 233 - From Controls to Full-Scale Robotics Integration How Bright IA Leads in Automation
1:18:25
1:18:25
Play later
Play later
Lists
Like
Liked
1:18:25In this episode of Manufacturing Hub, hosts Vladimir Romanov and Dave Griffith sit down with Davide (David) Pascucci, founder of Bright IA (https://brightiatx.com/), for an in-depth conversation about what it truly takes to build, grow, and succeed in the world of robotics integration and industrial automation. Davide shares his incredible journey …
…
continue reading
51
How to See Your Organization Like a Hacker with Chris Dale
25:18
25:18
Play later
Play later
Lists
Like
Liked
25:18To defend like a human, you first have to think like a hacker. In this episode, Ron Eddings sits down with Chris Dale, Co-Founder and Chief Hacking Officer at River Security, to explore the human side of hacking, where curiosity, persistence, and vigilance meet defense. Chris shares how the traditional idea of penetration testing has evolved into a…
…
continue reading
1
HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide
16:27
16:27
Play later
Play later
Lists
Like
Liked
16:27A comprehensive overview of healthcare information security and privacy for practitioners, focusing on the HCISPP certification. It covers critical areas such as medical coding systems (DRG, ICD, SNOMED CT), revenue cycle management, and workflow management in clinical and business settings. A significant portion addresses the regulatory environmen…
…
continue reading
1
Episode 19- Building Resilient Cyber Communities in Healthcare: A Conversation with Drex DeFord
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17Dan Dodson hosts Drex DeFord, a leader in healthcare cybersecurity, to discuss the evolution and current state of cybersecurity in healthcare. Drex shares his career journey from a hospital administrator in the Air Force to leading roles in various healthcare organizations and consulting for tech companies. He describes how the rapid digitization o…
…
continue reading
1
How Hospital Pharmacies Can Plan for Seasonal Disruption--Smarter Forecasting and Real-time Visibility
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35In this episode, Valerie Bandy, VP Pharmacy Solutions at Tecsys, discusses how hospital pharmacies can plan for seasonal disruption, smarter forecasting & real-time visibility.By Kelly Wisness
…
continue reading
1
AWP: Eyewear’s Next Chapter with Christine Yeh
44:33
44:33
Play later
Play later
Lists
Like
Liked
44:3320/20 Magazine’s Christine Yeh joins Aaron to unpack Oakley’s 50th, the rise of smart glasses beyond the “fad,” how eyewear became the ultimate accessory, and where print and social media, fashion, and AI are taking optical—while keeping it real for patients. To connect with Christine: 20/20 Magazine Instagram @2020mag LinkedIn --------------------…
…
continue reading
1
Hands-on Pipeline as YAML with Jenkins: A Beginner's Guide to Implement CI/CD Pipelines for Mobile, Hybrid, and Web Applications
26:33
26:33
Play later
Play later
Lists
Like
Liked
26:33A beginner's guide to implementing CI/CD pipelines using Jenkins and YAML for various applications, including mobile, hybrid, and web. The author, a DevOps engineer, emphasizes DevOps as a cultural transformation driven by people, processes, and tools. The text introduces Jenkins, its evolution, and different pipeline types like Scripted, Declarati…
…
continue reading
[email protected] The mic feels heavier at 100—not from gear, but from history. We started with a doctoral dare, a $40 class, and a shaky first recording. We built a library that helped learners pass A+, Network+, and Security+ while connecting the dots between hardware, operating systems, storage, networking, and the human choices behind eve…
…
continue reading
1
Hacking with Spring Boot 2.4: Classic Edition
21:46
21:46
Play later
Play later
Lists
Like
Liked
21:46A structured approach to developing applications using Spring Boot. It covers foundational concepts like building web apps, data access, and developer tools, while also exploring advanced topics such as testing, production operations (including Docker and GraalVM), and building robust APIs. The book further examines messaging solutions and securing…
…
continue reading
A comprehensive overview of fundamental networking concepts. It introduces various network components like RAM, NICs, hubs, switches, and routers, explaining their functions and interactions within a network. The material also details network topologies, including bus, ring, and star, alongside logical and physical implementations. A significant po…
…
continue reading
1
The Chris Wolfe Podcast: Beyond the Retina: Reclaiming the Diabetic Eye Exam
16:55
16:55
Play later
Play later
Lists
Like
Liked
16:55In this episode, Chris discusses the evolving landscape of diabetic eye exams, particularly the shift towards fundus photography and the implications of AI in this space. He emphasizes the importance of comprehensive eye care beyond just fundus imaging, highlighting the limitations of such technology and the need for a holistic approach to patient …
…
continue reading
1
A History of Modern Technology: Bletchley To Binary
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20[email protected] A quiet country house. A noisy war. And a handful of people who turned logic into a lifeline. We take you inside Bletchley Park to follow the thread from Poland’s algebraic assault on Enigma, through Alan Turing’s audacious vision for the Bombe, to Tommy Flowers’ all‑electronic Colossus that read Germany’s secrets at machine…
…
continue reading
1
From GSM to LTE-Advanced Pro and 5G: An Introduction to Mobile Networks and Mobile Broadband
19:26
19:26
Play later
Play later
Lists
Like
Liked
19:26A comprehensive exploration of mobile network technologies, detailing the evolution from GSM and UMTS to LTE and 5G New Radio. It outlines the intricate architecture, protocols, and operational procedures that underpin these wireless communication systems, including channel structures, mobility management, and call establishment. Furthermore, the t…
…
continue reading
1
Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders
26:38
26:38
Play later
Play later
Lists
Like
Liked
26:38Provides an extensive overview of modern cybersecurity strategies, emphasizing the evolving role of the Chief Information Security Officer (CISO) from a technical expert to a strategic business leader. It covers critical aspects such as building a culture of security, managing diverse threat actors (nation-states, cybercriminals, hacktivists, and i…
…
continue reading
1
Coding by Vibe: The Future of AI-Built Security with Ron Eddings
20:22
20:22
Play later
Play later
Lists
Like
Liked
20:22When code meets intuition, innovation gets personal. But what happens when we let AI vibe with our ideas? In this episode, Ron Eddings covers the rise of AI-driven development from Vibe Coding, where natural language shapes real code, to the emerging Model Context Protocols (MCPs) that redefine how apps talk to AI. He breaks down the recent Figma M…
…
continue reading
1
Secure Access Service Edge (SASE) For Dummies
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40Serves as an in-depth guide to Secure Access Service Edge (SASE). It explores the evolution of network security from traditional WANs to modern, cloud-centric architectures, emphasizing the need for SASE in today's distributed and dynamic enterprise environments. The source details SASE's foundational components, including SD-WAN, various security …
…
continue reading
1
Ep. 232 - Future of Automation with Siemens: Industrial AI, Virtual PLCs, and Digital Twin Factories
1:48:04
1:48:04
Play later
Play later
Lists
Like
Liked
1:48:04At Automate 2025, Vlad and Dave take Manufacturing Hub inside the Siemens booth to explore how one of the world’s largest industrial technology companies is shaping the future of manufacturing. From the latest S7-1200 G2 PLC to industrial copilots powered by AI, digital twins that simulate entire factories, and virtual PLCs redefining automation, t…
…
continue reading