Exploring React Native Together
…
continue reading
Mobile Device Management Podcasts
The Enterprise Mobility Roundup takes a look at mobility in the enterprise, focusing on workforce devices, business applications and the technology behind them.
…
continue reading
Would you like to download Freedom Scientific’s audio training content on your smart phone or mobile device? Want the convenience of listening to the step by step instructional demos we provide on your Amazon Echo or Google Home device? The Freedom Scientific Training podcast places hours of free audio training content right at your fingertips. You can listen to free lessons on a variety of topics ranging from basic Windows 10 to Advanced tasks in Microsoft Excel. Simply subscribe wherever y ...
…
continue reading
The Innovators & Investors Podcast: Connecting the Startup Ecosystem. We are on a mission to bridge the gap between founders, investors, and industry leaders across the early-stage ecosystem. By bringing together visionaries from cutting-edge startups, venture capitalists, family offices, angel investors, accelerators, and studios, we offer a platform for sharing invaluable insights, market trends, and first-hand experiences. Whether you’re an entrepreneur navigating the challenges of buildi ...
…
continue reading
In agriculture, things change fast and growers need on time, on task, and on target weather, crop and pest information. To meet this need, the Michigan State University Extension (MSUE) Field Crops team will provide farmers and agribusiness with timely podcasts. "In the weeds" will be discussing critical issues facing our farming industry every other week.‘Virtual Breakfasts’ occurs each week during the growing season with in-the-season updates.You can participate by phone, mobile device or ...
…
continue reading
Every organization needs to see and control the mobile devices entering their enterprise, whether they are provided by the company or part of a Bring Your Own Device (BYOD) program. MaaS360 mobile device management (MDM) is the fastest and most comprehensive way to get devices configured for enterprise access and to secure corporate data on smartphones and tablets.
…
continue reading
Tools and APIs required to build applications for the iPhone and iPad platforms using the iOS SDK. User interface design for mobile devices and unique user interactions using multi-touch technologies. Object-oriented design using model-view-controller paradigm, memory management, Swift programming language. Other topics include: object-oriented database API, animation, mobile device power management, multi-threading, networking and performance considerations.
…
continue reading
"Care Team Conversations", is a monthly patient safety focus podcast that provides a forum for Clinical Professionals to talk about best practices, innovations and solutions.
…
continue reading
Tune into our IFPA Wrap podcast and gain professional insights by listening to informed discussion with industry experts about current issues in tax, super and the broader financial services industry. Earn self-assessed CPD/CPE points while listening online at your computer or on the go with your mobile device. Ask questions and have your say on issues discussed on the show via social media or email us at [email protected]. Introducing a dynamic new contributor to IFPA's The Wrap Podcast ...
…
continue reading
ATFAQ – Assistive Technology Frequently Asked Questions
…
continue reading
A weekly tutorial-style video podcast for Axosoft OnTime users. This podcast is in SD and is designed for viewing on a mobile device. For high-definition viewing on a PC, try our HD podcast.
…
continue reading
Allison Sheridan's technology geek podcast with an EVER so slight Apple bias
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading

1
The Alanis Business Academy Podcast: Business Education for Everyone Else | Matthew Alanis
Matthew Alanis
Alanis Business Academy is devoted to providing universal access to a quality business education. In addition to accessing hundreds of lectures through YouTube, listeners can learn a variety of business concepts directly on their mobile device. Studying for an exam, or perhaps looking to learn something new? The Alanis Business Academy Podcast, hosted by Matthew Alanis, will explore some of the well known--and lesser known--areas of business.
…
continue reading
Disclaimer. Do not use any handheld radio, telephone, mobile phone, computer, listening, or other device while operating any type of vehicle or transportation. Before you begin to download any episode and/or listen to Groovy Outdoors, you agree to this and failure may result in litigation against you or your agent in the event you are held liable or responsible for operating any type of device while operating any type of vehicle or transportation. In short, do not use a device and attempt to ...
…
continue reading
The Business of Apps podcast brings you actionable insights from the leaders of the global app industry and the world’s fastest growing apps. App marketing professionals, product managers and developers share the latest approaches to building, marketing and monetizing mobile apps. Every Monday we have a candid conversation with app industry professionals about specific topic that may cover app marketing, mobile advertising or app development and we also help our listeners to get to know our ...
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
Covering everything you need to know about rugged computing solutions in an enterprise environment. Each episode features industry thought leaders and rugged solution providers discussing industry challenges, mobile computing, vertical use-cases, and comprehensive rugged computing solutions.
…
continue reading
Join executives of major corporations and find out how they are incorporating iPhone into their business. You'll learn how they are using third-party applications as well as developing their own internal apps to streamline workflows that help their employees be more productive.
…
continue reading
Interarbor Solutions' Briefings Direct: Unique B2B informational podcasts that offer the value of objective perspectives from leading industry analyst Dana Gardner. Briefings Direct delivers actionable knowledge on the latest enterprise IT subjects to those who need to know the most about the business of IT now.
…
continue reading
The Fragmented Podcast is the leading Android developer podcast started by Kaushik Gopal & Donn Felker. Our goal is to help you become a better Android Developer through conversation & to capture the zeitgeist of Android development. We chat about topics such as Testing, Dependency Injection, Patterns and Practices, useful libraries, and much more. We will also be interviewing some of the top developers out there. Subscribe now and join us on the journey of becoming a better Android Developer.
…
continue reading
A weekly podcast show about Indian startups, entrepreneurs, and more! Hosted by Neil Patel & Friends
…
continue reading

1
ToolShell: SharePoint Zero-Day Chain Gives Hackers Full Remote Access
58:23
58:23
Play later
Play later
Lists
Like
Liked
58:23A new wave of zero-day attacks—collectively known as ToolShell—is actively targeting Microsoft SharePoint servers, with two vulnerabilities (CVE-2025-53770 and CVE-2025-53771) allowing unauthenticated remote code execution and identity control bypass. First observed in high-value targets across government, critical infrastructure, and manufacturing…
…
continue reading

1
CVE-2025-54309: CrushFTP Zero-Day Exploited in Global Admin Access Attacks
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13A critical zero-day vulnerability in CrushFTP (CVE-2025-54309) is being actively exploited, giving attackers administrative access to over a thousand unpatched servers globally. This severe security flaw—caused by improper validation in the AS2 protocol—has exposed enterprise-managed file transfer (MFT) systems across the US, Europe, and Canada. Se…
…
continue reading

1
Dell Breach by World Leaks: Extortion Attempt Hits Demo Platform
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49Dell Technologies is the latest target in a growing trend of data extortion attacks as threat actors pivot away from traditional ransomware. The cybercrime group known as World Leaks—a rebrand of the former Hunters International gang—has claimed responsibility for breaching Dell’s Customer Solution Centers (CSC), a sandbox environment used primaril…
…
continue reading

1
Critical VPN Vulnerability: ExpressVPN Exposed IPs via RDP Misrouting
59:16
59:16
Play later
Play later
Lists
Like
Liked
59:16A critical vulnerability in ExpressVPN’s Windows client has put a spotlight on the often-overlooked dangers of debug code making its way into production software. This episode dives into how a debug configuration error allowed Remote Desktop Protocol (RDP) traffic to bypass the VPN tunnel, potentially exposing users’ real IP addresses and compromis…
…
continue reading

1
Dior Data Breach Exposes U.S. Customer Info in LVMH Vendor Attack
41:11
41:11
Play later
Play later
Lists
Like
Liked
41:11In this episode, we unpack the January 2025 data breach at Dior, the iconic luxury fashion house, which exposed sensitive personal information of U.S. customers—including names, addresses, and even Social Security and passport numbers. Although payment data remained secure, the incident's impact is substantial, both in terms of customer trust and c…
…
continue reading

1
StrongestLayer Raises $5.2M to Fight AI-Powered Phishing with TRACE
52:49
52:49
Play later
Play later
Lists
Like
Liked
52:49In an era where generative AI is being used not just for productivity but for precision cybercrime, a San Francisco-based startup, StrongestLayer, is taking a bold stand. Backed by $5.2 million in seed funding from Sorenson Capital and others, the company is pioneering a radically new approach to cybersecurity with its AI-native platform TRACE (Thr…
…
continue reading

1
750,000 Records Exposed: Inside the TADTS Data Breach by BianLian
1:03:29
1:03:29
Play later
Play later
Lists
Like
Liked
1:03:29In July 2024, The Alcohol & Drug Testing Service (TADTS), a Texas-based company handling sensitive employment-related data, suffered a catastrophic data breach. Nearly 750,000 individuals had personal information compromised—Social Security numbers, financial data, driver’s licenses, health insurance info, and even biometric identifiers. The attack…
…
continue reading

1
SS7 Is Still Broken: How Surveillance Firms Are Bypassing Telco Defenses
50:12
50:12
Play later
Play later
Lists
Like
Liked
50:12A new attack technique is exposing just how vulnerable global mobile networks remain in 2025. Cybersecurity firm Enea has discovered a surveillance operation that bypasses SS7 firewalls by exploiting a subtle weakness in the TCAP encoding layer—allowing stealth location tracking of mobile users across borders. The method? Tampering with the IMSI fi…
…
continue reading

1
Navigating Startup Success: Insights on Venture Capital, Market Disruption, and Mentorship
46:43
46:43
Play later
Play later
Lists
Like
Liked
46:43In this insightful episode of The Innovators & Investors Podcast hosted by Kristian Marquez, we welcome Sriram Sundararajan, founder and managing partner of Hyper Growth Labs Capital and marketing faculty at Santa Clara University. Sriram shares his extensive journey from engineer to management consultant, angel investor, and venture capitalist, em…
…
continue reading

1
ATFAQ198 – Q1. Video Modeling Apps, Q2. AT for Cooking, Q3. AT for Learning Disabilities, Q4. AI Tools for Dyslexia, Q5. Wildcard: Everyday products that should be marketed as AT
52:43
52:43
Play later
Play later
Lists
Like
Liked
52:43Panelists: Brian Norton, Josh Anderson, Belva Smith ATFAQ198 – Q1. Video Modeling Apps, Q2. AT for Cooking, Q3. AT for Learning Disabilities, Q4. AI Tools for Dyslexia, Q5. Wildcard: Everyday products that should be marketed as AT —– Transcript Starts Here —– Speaker 2: I have a question. Speaker 1: Huh? Speaker 2: Like what? […]…
…
continue reading

1
NC #1054 More Sindre Sorhus Apps on ScreenCastsONLINE, Apple Watch SOS PSA, Macstock 2024, Security Bits
1:12:23
1:12:23
Play later
Play later
Lists
Like
Liked
1:12:23For Mac Eyes Only Even More Sindre Sorhus Apps — ScreenCastsONLINE Tutorial PSA — SOS Button for Apple Watch Fall Detection is a SLIDER! Macstock 2025 — Learning, Teaching, Laughter, and Joy Macstock 2025: Unleash the Power of Apple Photos on macOS Macstock 2025: Chain of Happiness - Share Your Knowledge Support the Show Security Bits — 20 July 202…
…
continue reading

1
Ten Tips for Increasing Productivity with Google Docs and JAWS
33:40
33:40
Play later
Play later
Lists
Like
Liked
33:40In this episode, Liz and Rachel walk you through 10 essential tips for using Google Docs more efficiently with JAWS. Learn how to adjust accessibility settings, navigate documents with ease, create and rename files, use Find and Replace, get dictionary definitions, format text, manage tabs, and use JAWS Quick Keys for streamlined editing. Whether y…
…
continue reading

1
Navigating the Complexities of Venture and Growth Equity Deals: Insights from Norton Rose Fulbright
37:33
37:33
Play later
Play later
Lists
Like
Liked
37:33In this insightful episode of The Innovators & Investors Podcast, host Kristian Marquez sits down with Anastasia Slivker, partner at global law firm Norton Rose Fulbright, to explore the evolving landscape of venture capital and growth equity investments. Anastasia shares her unique global perspective on the challenges and opportunities companies a…
…
continue reading

1
The UNFI Cyberattack: How Hackers Disrupted the U.S. Food Supply Chain
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30In June 2025, United Natural Foods, Inc. (UNFI)—the primary distributor for Whole Foods and tens of thousands of retailers across North America—suffered a major cyberattack that halted deliveries, emptied shelves, and forced core operations offline. The financial damage? Between $350 and $400 million in net sales lost, and up to $60 million in redu…
…
continue reading

1
Zuckerberg on Trial: The $8 Billion Data Privacy Reckoning
21:28
21:28
Play later
Play later
Lists
Like
Liked
21:28More than five years after the Cambridge Analytica scandal, the legal and financial consequences are still playing out—this time in Delaware’s Chancery Court, where Mark Zuckerberg and Meta executives are being sued by investors seeking over $8 billion in damages. This landmark class-action lawsuit argues that Meta’s leadership knowingly violated a…
…
continue reading

1
Operation Eastwood: Inside the Takedown of NoName057(16)
21:17
21:17
Play later
Play later
Lists
Like
Liked
21:17A major Europol-led crackdown—Operation Eastwood—has disrupted one of the most active pro-Russian hacktivist collectives in Europe: NoName057(16). Known for a relentless barrage of DDoS attacks targeting NATO allies and Ukraine-supporting nations, this ideologically driven group ran a global network powered by gamified recruitment, cryptocurrency i…
…
continue reading

1
Virtual Breakfast 2025. Episode 17. White Mold and Tar Spot with Marty Chilvers
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02Welcome to the 17th episode of the 2025 season! Eric Anderson, MSU Extension Soybean Educator, will host Dr. Marty Chilvers, MSU Extension Pathology Specialist, on determining your risk for tar spot and white mold this season. Also, a weather update from Dr. Jeff Andresen . To learn more and register for the live event, check out the MSUE Virtual B…
…
continue reading

1
Phished and Exposed: What the Co-op Hack Reveals About Retail Cybersecurity
21:37
21:37
Play later
Play later
Lists
Like
Liked
21:37In April 2025, The Co-op—one of the UK’s largest retailers—confirmed a data breach that exposed the personal information of 6.5 million members. No financial data was taken, but the attack hit at the core of trust, with CEO Shirine Khoury-Haq calling it a “personal attack on our members and colleagues.” This wasn’t just a technical failure—it was a…
…
continue reading

1
FileFix Attacks Are Here: How Interlock’s Ransomware is Skipping Your Defenses
21:52
21:52
Play later
Play later
Lists
Like
Liked
21:52In this episode, we break down how Interlock, a fast-moving ransomware group launched in late 2024, has evolved from using web injectors and clipboard tricks (like ClickFix) to an even more covert social engineering technique that abuses Windows File Explorer’s address bar to execute malicious code without triggering security prompts or downloads. …
…
continue reading

1
Ontinue Uncovers SVG-Based Phishing: Why Your Browser Could Be the Weak Link
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58Ontinue has uncovered a stealthy new phishing campaign that’s flipping conventional defenses on their head—weaponizing SVG image files to silently redirect victims to malicious websites, without requiring file downloads, macros, or even user clicks. In this episode, we break down how attackers are exploiting the JavaScript-capable structure of Scal…
…
continue reading

1
Exein Raises €70M: Defending the IoT-AI Frontier with Embedded Security
17:35
17:35
Play later
Play later
Lists
Like
Liked
17:35Exein, the Italian cybersecurity company specializing in embedded IoT defense, has raised €70 million in Series C funding, marking a significant milestone in the race to secure AI-connected infrastructure. Backed by Balderton and a roster of prominent investors, this round pushes Exein’s total funding past $106 million and fuels its global expansio…
…
continue reading

1
Salt Typhoon Strikes Again: National Guard, Telecoms, and a Crisis in U.S. Cyber Defense
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58Salt Typhoon, a sophisticated Chinese state-sponsored cyber threat actor, is conducting one of the most aggressive and sustained espionage campaigns ever uncovered against U.S. critical infrastructure. This episode explores how the group—linked to China's Ministry of State Security—compromised a U.S. state’s Army National Guard, infiltrated telecom…
…
continue reading

1
Revolutionizing Application Security: Transforming Risk Management and Facilitating Startup Success
44:25
44:25
Play later
Play later
Lists
Like
Liked
44:25In this insightful episode of The Innovators & Investors Podcast hosted by Kristian Marquez, we sit down with Greg Martin, CEO and co-founder of Ghost Security, to explore groundbreaking advancements in application security. Greg shares how Ghost Security’s innovative AI-driven agentic model is revolutionizing risk management by continuously identi…
…
continue reading

1
DragonForce Ransomware Hits Belk: 150GB Data Leak and Operational Chaos
1:20:33
1:20:33
Play later
Play later
Lists
Like
Liked
1:20:33In this episode, we dive into the May 2025 ransomware attack on Belk, the iconic U.S. department store chain, orchestrated by the DragonForce ransomware group—a fast-rising player in the ransomware-as-a-service (RaaS) ecosystem. The cyberattack brought down Belk’s online and in-store operations for days, exfiltrated over 156GB of sensitive data, an…
…
continue reading

1
NVIDIA Issues Urgent Rowhammer Warning: Enable ECC or Risk AI Integrity
40:39
40:39
Play later
Play later
Lists
Like
Liked
40:39In this episode, we dissect a major hardware-level cybersecurity warning issued by NVIDIA, one that directly affects data center operators, AI researchers, and enterprise IT teams using GPU infrastructure. The threat: Rowhammer—a physical DRAM vulnerability that’s now been successfully exploited on GPUs through a new attack method known as GPUHamme…
…
continue reading

1
Zip Security Secures $13.5M to Simplify and Scale Cyber Defense
48:43
48:43
Play later
Play later
Lists
Like
Liked
48:43In this episode, we spotlight Zip Security, a rising New York-based cybersecurity startup that just closed a $13.5 million Series A funding round, led by Ballistic Ventures. This brings the company’s total raised to $21 million, underscoring growing investor confidence in Zip’s mission: to make enterprise-grade cybersecurity accessible, automated, …
…
continue reading

1
Century Support Services Breach: 160,000 Identities Compromised in Silent Cyberattack
32:03
32:03
Play later
Play later
Lists
Like
Liked
32:03In this episode, we examine the major data breach at Century Support Services—also operating under the name Next Level Finance Partners—that exposed the personal information of over 160,000 individuals. While the company discovered indicators of a cyberattack as early as November 2023, it wasn’t until May 2024 that investigators confirmed sensitive…
…
continue reading

1
Whats in the July 2025 Release of JAWS ZoomText and Fusion
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23In this episode, we highlight the newest features and enhancements in JAWS, ZoomText, and Fusion A key update across all three products is support for time-based Software Maintenance Agreements (SMAs), which let users run any version of the software released within their SMA period—offering more flexibility for perpetual license holders. For JAWS a…
…
continue reading

1
Bridging Pediatric Mental Health Gaps: The Hybrid Care Model with Blackbird Health
38:01
38:01
Play later
Play later
Lists
Like
Liked
38:01In this insightful episode of The Innovators & Investors Podcast, host Kristian Marquez sits down with Dr. Matt Keener, co-founder of Blackbird Health, to explore innovative solutions in pediatric mental health care. Dr. Keener discusses the fragmented and confusing landscape families face when seeking mental health support for their children, high…
…
continue reading
2025-07-01 DMS RT SSheary Super CatchesBy The Institute of Financial Professionals Australia
…
continue reading
2025-07-08 DMS RT PMiron Pvt CreditBy The Institute of Financial Professionals Australia
…
continue reading
2025-06-24 DMS RT JBott Notifiable EventsBy The Institute of Financial Professionals Australia
…
continue reading
2025-06-10 DMS RT JBott Tax Time Govt PaymentsBy The Institute of Financial Professionals Australia
…
continue reading
2025-06-17 DMS RT SSheary 3mil super taxBy The Institute of Financial Professionals Australia
…
continue reading
2025-07-15 DMS RT AInwood Trump 2.0By The Institute of Financial Professionals Australia
…
continue reading

1
Unlocking Multifamily Real Estate Success: Direct Investment Strategies and Insights with Veritas Equity Partners
41:43
41:43
Play later
Play later
Lists
Like
Liked
41:43In this insightful episode of The Innovators & Investors Podcast, host Kristian Marquez sits down with Alex Burch, partner at Veritas Equity Partners, to explore multifamily real estate investing in Washington state. Alex shares the firm’s strategic focus on workforce housing in tertiary markets near Seattle, emphasizing direct ownership in specifi…
…
continue reading

1
TikTok, China, and the EU: The Battle Over Data Sovereignty
58:06
58:06
Play later
Play later
Lists
Like
Liked
58:06In this episode, we explore the mounting scrutiny TikTok faces over its handling of European user data, with the EU’s Data Protection Commission (DPC) launching a fresh investigation into alleged transfers of data to China. TikTok, owned by Beijing-based ByteDance, is once again in the crosshairs for possible violations of the General Data Protecti…
…
continue reading

1
RNR 337 - Meta Quest for React Native w/ Markus Leyendecker
39:18
39:18
Play later
Play later
Lists
Like
Liked
39:18Jamon sits down with Markus Leyendecker from Meta to talk about using React Native on Meta Quest. They cover what’s already working, what’s still coming together, and why mixed reality might be the next big frontier for React Native developers. Spoiler alert: Jamon might have purchased a headset after the recording of this episode! Show Notes Meta …
…
continue reading

1
Booz Allen Invests in Corsha: Defending Machine-to-Machine Communication at Scale
33:00
33:00
Play later
Play later
Lists
Like
Liked
33:00As the cybersecurity landscape shifts toward hyperautomation and AI-driven autonomy, a new frontier has emerged: the identity and access security of machines. In this episode, we explore Booz Allen Ventures’ strategic investment in Corsha, a company at the forefront of Machine Identity Provider (mIDP) technology. Their collaboration marks a pivotal…
…
continue reading

1
WSUS Meltdown: Global Sync Failures and the Shift Toward Cloud Patch Management
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45Windows Server Update Services (WSUS) has long been a cornerstone of enterprise patch management—but recent global synchronization failures have raised serious questions about its future viability. In this episode, we dissect the widespread outage that left organizations unable to sync critical Windows updates, unpacking both the technical cause an…
…
continue reading

1
Cracking eSIM: Exposing the Hidden Threats in Next-Gen Mobile Security
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43eSIM technology has transformed the way we connect—but has it also introduced new vulnerabilities into the heart of modern telecommunications? In this deep-dive episode, we dissect the security architecture, remote provisioning systems, and critical attack surfaces of embedded SIM (eSIM) technology, now deployed in billions of mobile, consumer, and…
…
continue reading

1
Hedge Venture Capital: Innovating Risk Management in Early-Stage Investing with Fuel Venture Capital
44:11
44:11
Play later
Play later
Lists
Like
Liked
44:11In this insightful episode of The Innovators & Investors Podcast, host Kristian Marquez sits down with Maggie Vo, Managing Partner and Chief Investment Officer at Fuel Venture Capital, to explore a groundbreaking approach to venture investing called “hedge venture.” Maggie shares her unique journey from a global hedge fund manager to a venture capi…
…
continue reading

1
Qantas Breach and Beyond: Cybersecurity Risks in Australia’s Digital Supply Chains
1:03:23
1:03:23
Play later
Play later
Lists
Like
Liked
1:03:23As Australia contends with a growing wave of cybersecurity incidents, this episode explores the intersection of national privacy laws, global supply chain vulnerabilities, and public trust in digital security. The recent Qantas data breach—affecting over 5 million customers—was the latest high-profile case to expose how fragile third-party service …
…
continue reading

1
Virtual Breakfast 2025. Episode 16. Hot Topic
56:11
56:11
Play later
Play later
Lists
Like
Liked
56:11Welcome to the 16th episode of the 2025 season! Monica Jean, MSU Extension Field Crops Educator, will host MSU Extension Field Crops specialists on a hot topic episode. Many topics were discussed and some examples were diseases, insects, irrigation scheduling and wheat harvest . Also, a weather update from Dr. Jeff Andresen . To learn more and regi…
…
continue reading