Exploring React Native Together
…
continue reading
Mobile Device Management Podcasts
The Enterprise Mobility Roundup takes a look at mobility in the enterprise, focusing on workforce devices, business applications and the technology behind them.
…
continue reading
Would you like to download Freedom Scientific’s audio training content on your smart phone or mobile device? Want the convenience of listening to the step by step instructional demos we provide on your Amazon Echo or Google Home device? The Freedom Scientific Training podcast places hours of free audio training content right at your fingertips. You can listen to free lessons on a variety of topics ranging from basic Windows 10 to Advanced tasks in Microsoft Excel. Simply subscribe wherever y ...
…
continue reading
In agriculture, things change fast and growers need on time, on task, and on target weather, crop and pest information. To meet this need, the Michigan State University Extension (MSUE) Field Crops team will provide farmers and agribusiness with timely podcasts. "In the weeds" will be discussing critical issues facing our farming industry every other week.‘Virtual Breakfasts’ occurs each week during the growing season with in-the-season updates.You can participate by phone, mobile device or ...
…
continue reading
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
…
continue reading
Every organization needs to see and control the mobile devices entering their enterprise, whether they are provided by the company or part of a Bring Your Own Device (BYOD) program. MaaS360 mobile device management (MDM) is the fastest and most comprehensive way to get devices configured for enterprise access and to secure corporate data on smartphones and tablets.
…
continue reading
Tools and APIs required to build applications for the iPhone and iPad platforms using the iOS SDK. User interface design for mobile devices and unique user interactions using multi-touch technologies. Object-oriented design using model-view-controller paradigm, memory management, Swift programming language. Other topics include: object-oriented database API, animation, mobile device power management, multi-threading, networking and performance considerations.
…
continue reading
"Care Team Conversations", is a monthly patient safety focus podcast that provides a forum for Clinical Professionals to talk about best practices, innovations and solutions.
…
continue reading
Tune into our IFPA Wrap podcast and gain professional insights by listening to informed discussion with industry experts about current issues in tax, super and the broader financial services industry. Earn self-assessed CPD/CPE points while listening online at your computer or on the go with your mobile device. Ask questions and have your say on issues discussed on the show via social media or email us at [email protected]. Introducing a dynamic new contributor to IFPA's The Wrap Podcast ...
…
continue reading
ATFAQ – Assistive Technology Frequently Asked Questions
…
continue reading
A weekly tutorial-style video podcast for Axosoft OnTime users. This podcast is in SD and is designed for viewing on a mobile device. For high-definition viewing on a PC, try our HD podcast.
…
continue reading
Allison Sheridan's technology geek podcast with an EVER so slight Apple bias
…
continue reading

1
The Alanis Business Academy Podcast: Business Education for Everyone Else | Matthew Alanis
Matthew Alanis
Alanis Business Academy is devoted to providing universal access to a quality business education. In addition to accessing hundreds of lectures through YouTube, listeners can learn a variety of business concepts directly on their mobile device. Studying for an exam, or perhaps looking to learn something new? The Alanis Business Academy Podcast, hosted by Matthew Alanis, will explore some of the well known--and lesser known--areas of business.
…
continue reading
Disclaimer. Do not use any handheld radio, telephone, mobile phone, computer, listening, or other device while operating any type of vehicle or transportation. Before you begin to download any episode and/or listen to Groovy Outdoors, you agree to this and failure may result in litigation against you or your agent in the event you are held liable or responsible for operating any type of device while operating any type of vehicle or transportation. In short, do not use a device and attempt to ...
…
continue reading
The Business of Apps podcast brings you actionable insights from the leaders of the global app industry and the world’s fastest growing apps. App marketing professionals, product managers and developers share the latest approaches to building, marketing and monetizing mobile apps. Every Monday we have a candid conversation with app industry professionals about specific topic that may cover app marketing, mobile advertising or app development and we also help our listeners to get to know our ...
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
Covering everything you need to know about rugged computing solutions in an enterprise environment. Each episode features industry thought leaders and rugged solution providers discussing industry challenges, mobile computing, vertical use-cases, and comprehensive rugged computing solutions.
…
continue reading
Join executives of major corporations and find out how they are incorporating iPhone into their business. You'll learn how they are using third-party applications as well as developing their own internal apps to streamline workflows that help their employees be more productive.
…
continue reading
Interarbor Solutions' Briefings Direct: Unique B2B informational podcasts that offer the value of objective perspectives from leading industry analyst Dana Gardner. Briefings Direct delivers actionable knowledge on the latest enterprise IT subjects to those who need to know the most about the business of IT now.
…
continue reading
The Fragmented Podcast is the leading Android developer podcast started by Kaushik Gopal & Donn Felker. Our goal is to help you become a better Android Developer through conversation & to capture the zeitgeist of Android development. We chat about topics such as Testing, Dependency Injection, Patterns and Practices, useful libraries, and much more. We will also be interviewing some of the top developers out there. Subscribe now and join us on the journey of becoming a better Android Developer.
…
continue reading
A weekly podcast show about Indian startups, entrepreneurs, and more! Hosted by Neil Patel & Friends
…
continue reading

1
NC #1055 15 Years of Hazel, Another Brother PSA, Another MagGo Testimonial, Virtual Monitor HDMI Dongles, Adam Engst on New Mac Migration
1:20:50
1:20:50
Play later
Play later
Lists
Like
Liked
1:20:5015 Years of Hazel PSA — Your Brother Printer's Password May Have Been Reset MagGo 3-in-1 Charger + Sharge Retro 67 = Magic for Travel Virtual Monitor HDMI Dongles Solve Many Problems Support the Show CCATP #818 — Adam Engst on New Mac Migration Transcript of NC_2025_07_27 Join the Conversation: [email protected] podfeet.com/slack Support the Show…
…
continue reading

1
RNR 338 - React Native Enterprise Framework w/ Michał Pierzchała
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40Michał Pierzchała from Callstack joins Jamon and Robin to talk about the React Native Enterprise Framework, why it’s built for large teams, and how it helps enterprises ship React Native apps at scale. Show Notes RNEF Website: https://www.rnef.dev/ RNEF Github: https://github.com/callstack/rnef Mike Grabowski’s tweet about the RN CLI in 2016: https…
…
continue reading

1
Virtual Breakfast 2025. Episode 18. Cover Crops after Wheat with Brook Wilke
57:28
57:28
Play later
Play later
Lists
Like
Liked
57:28Welcome to the 18th episode of the 2025 season! Sarah Zeiler, MSU Extension Environmental Management Educator, will host Dr. Brook Wilke, Associate Director for Science and Agronomy, KBS LTAR, will discuss cover crop options and management decisions following wheat harvest. Also, a weather update from Dr. Jeff Andresen . To learn more and register …
…
continue reading

1
ATFAQ198 – Q1. Video Modeling Apps, Q2. AT for Cooking, Q3. AT for Learning Disabilities, Q4. AI Tools for Dyslexia, Q5. Wildcard: Everyday products that should be marketed as AT
52:43
52:43
Play later
Play later
Lists
Like
Liked
52:43Panelists: Brian Norton, Josh Anderson, Belva Smith ATFAQ198 – Q1. Video Modeling Apps, Q2. AT for Cooking, Q3. AT for Learning Disabilities, Q4. AI Tools for Dyslexia, Q5. Wildcard: Everyday products that should be marketed as AT —– Transcript Starts Here —– Speaker 2: I have a question. Speaker 1: Huh? Speaker 2: Like what? […]…
…
continue reading

1
NC #1054 More Sindre Sorhus Apps on ScreenCastsONLINE, Apple Watch SOS PSA, Macstock 2024, Security Bits
1:12:23
1:12:23
Play later
Play later
Lists
Like
Liked
1:12:23For Mac Eyes Only Even More Sindre Sorhus Apps — ScreenCastsONLINE Tutorial PSA — SOS Button for Apple Watch Fall Detection is a SLIDER! Macstock 2025 — Learning, Teaching, Laughter, and Joy Macstock 2025: Unleash the Power of Apple Photos on macOS Macstock 2025: Chain of Happiness - Share Your Knowledge Support the Show Security Bits — 20 July 202…
…
continue reading

1
Ten Tips for Increasing Productivity with Google Docs and JAWS
33:40
33:40
Play later
Play later
Lists
Like
Liked
33:40In this episode, Liz and Rachel walk you through 10 essential tips for using Google Docs more efficiently with JAWS. Learn how to adjust accessibility settings, navigate documents with ease, create and rename files, use Find and Replace, get dictionary definitions, format text, manage tabs, and use JAWS Quick Keys for streamlined editing. Whether y…
…
continue reading

1
Virtual Breakfast 2025. Episode 17. White Mold and Tar Spot with Marty Chilvers
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02Welcome to the 17th episode of the 2025 season! Eric Anderson, MSU Extension Soybean Educator, will host Dr. Marty Chilvers, MSU Extension Pathology Specialist, on determining your risk for tar spot and white mold this season. Also, a weather update from Dr. Jeff Andresen . To learn more and register for the live event, check out the MSUE Virtual B…
…
continue reading

1
Whats in the July 2025 Release of JAWS ZoomText and Fusion
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23In this episode, we highlight the newest features and enhancements in JAWS, ZoomText, and Fusion A key update across all three products is support for time-based Software Maintenance Agreements (SMAs), which let users run any version of the software released within their SMA period—offering more flexibility for perpetual license holders. For JAWS a…
…
continue reading
2025-06-10 DMS RT JBott Tax Time Govt PaymentsBy The Institute of Financial Professionals Australia
…
continue reading
2025-07-15 DMS RT AInwood Trump 2.0By The Institute of Financial Professionals Australia
…
continue reading
2025-06-24 DMS RT JBott Notifiable EventsBy The Institute of Financial Professionals Australia
…
continue reading
2025-07-08 DMS RT PMiron Pvt CreditBy The Institute of Financial Professionals Australia
…
continue reading
2025-06-17 DMS RT SSheary 3mil super taxBy The Institute of Financial Professionals Australia
…
continue reading
2025-07-01 DMS RT SSheary Super CatchesBy The Institute of Financial Professionals Australia
…
continue reading

1
RNR 337 - Meta Quest for React Native w/ Markus Leyendecker
39:18
39:18
Play later
Play later
Lists
Like
Liked
39:18Jamon sits down with Markus Leyendecker from Meta to talk about using React Native on Meta Quest. They cover what’s already working, what’s still coming together, and why mixed reality might be the next big frontier for React Native developers. Spoiler alert: Jamon might have purchased a headset after the recording of this episode! Show Notes Meta …
…
continue reading

1
Virtual Breakfast 2025. Episode 16. Hot Topic
56:11
56:11
Play later
Play later
Lists
Like
Liked
56:11Welcome to the 16th episode of the 2025 season! Monica Jean, MSU Extension Field Crops Educator, will host MSU Extension Field Crops specialists on a hot topic episode. Many topics were discussed and some examples were diseases, insects, irrigation scheduling and wheat harvest . Also, a weather update from Dr. Jeff Andresen . To learn more and regi…
…
continue reading

1
NC #1053 Anker MagGo, Astrophotography by Stealth Part 4, Battery Evolution and EVs, CarPlay Screen for $40
45:24
45:24
Play later
Play later
Lists
Like
Liked
45:24Appearance on Clockwise Anker MagGo Wireless Charging Station — By Sandy Foster Astrophotography by Stealth Part Four — by Brian Hoffman George from Tulsa Talks About Battery Evolution and Impact on EVs Support the Show Can You Add (Good) CarPlay and Android Auto to Older Cars with the 7" LAMTTO Display? Transcript of NC_2025_07_09 Join the Convers…
…
continue reading

1
#238: Stand out with smarter mobile messaging with Jason Lyman, Chief Marketing Officer at Customer.io
23:38
23:38
Play later
Play later
Lists
Like
Liked
23:38In today’s crowded, AI-fueled landscape, it’s not enough to just have messaging — it has to stand out. In this episode, I’m joined by Jason from Customer.io to unpack what makes great mobile messaging work: from building frameworks rooted in value and differentiation, to using first-party data to deliver the right message at the right moment. We’ll…
…
continue reading
In this final episode of the prepcast, we shift focus from content to performance. You’ve learned the material—now it's time to master the test. We walk through proven strategies for final review, including how to prioritize domains, balance study time, and simulate test conditions. You’ll get tips on memory recall, cognitive pacing, and avoiding e…
…
continue reading

1
Episode 69: Vendor Risk Oversight and Auditing
11:19
11:19
Play later
Play later
Lists
Like
Liked
11:19Vendor relationships introduce risk far beyond basic performance metrics—and in this episode, we dive into the executive oversight practices required to manage those risks. You’ll learn how to assess third-party risk using tiered models, risk questionnaires, and onsite audits. We also discuss how to require evidence of compliance, conduct assessmen…
…
continue reading

1
Episode 68: Vendor Contracts, SLAs, and Performance Metrics
10:55
10:55
Play later
Play later
Lists
Like
Liked
10:55Securing a vendor is only the beginning—the real work lies in managing performance, risk, and accountability. This episode focuses on the contractual elements that govern third-party relationships, including service level agreements (SLAs), key performance indicators (KPIs), penalties for non-compliance, and confidentiality clauses. You’ll learn ho…
…
continue reading

1
Episode 67: Security Procurement: RFPs, RFIs, and Vendor Selection
11:21
11:21
Play later
Play later
Lists
Like
Liked
11:21Procurement is more than just purchasing tools—it’s a strategic process that shapes your organization's security ecosystem. In this episode, we walk you through the essentials of security procurement, including how to develop Requests for Proposals (RFPs) and Requests for Information (RFIs), establish evaluation criteria, and conduct vendor due dil…
…
continue reading

1
Episode 66: ROI and Cost-Benefit Analysis for Security Investments
12:01
12:01
Play later
Play later
Lists
Like
Liked
12:01As cybersecurity budgets grow, so does the need to justify investments with clear, measurable value. In this episode, we explore how CISOs evaluate the return on investment (ROI) of security initiatives, technologies, and services. You’ll learn how to calculate ROI using both quantitative and qualitative factors, including risk reduction, productiv…
…
continue reading

1
Episode 65: Security Budgeting Essentials: Managing and Adjusting Budgets
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56Security budgeting doesn’t end once funding is approved—CISOs must continuously manage, adjust, and defend their budgets in the face of shifting priorities and evolving threats. In this episode, we explore the fundamentals of dynamic budget management, including tracking expenditures, reallocating resources, and responding to unexpected events such…
…
continue reading

1
Episode 64: Financial Management Principles for Security Leaders
10:39
10:39
Play later
Play later
Lists
Like
Liked
10:39Financial fluency is essential for every CISO—and in this episode, we break down the core principles of financial management in the context of enterprise cybersecurity. You’ll learn how to interpret balance sheets, manage operational and capital expenditures, and build forecasts that align with multi-year strategic plans. We explain how to calculat…
…
continue reading

1
Episode 63: Strategic Security Planning Frameworks (TOGAF, SABSA)
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05Effective security leaders think in frameworks—and in this episode, we explore two of the most influential planning models for enterprise architecture: TOGAF (The Open Group Architecture Framework) and SABSA (Sherwood Applied Business Security Architecture). You’ll learn how these frameworks guide long-term security strategy by aligning governance,…
…
continue reading

1
Episode 62: Aligning Security with Organizational Objectives
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55Security is no longer a siloed function—it must be embedded in business strategy. In this episode, we examine how CISOs align cybersecurity initiatives with overarching organizational goals. You’ll learn how to interpret business drivers, engage with other executive leaders, and shape security programs that enable growth, agility, and competitive a…
…
continue reading

1
Episode 61: Autonomous Security Operations Centers and Future Trends
9:58
9:58
Play later
Play later
Lists
Like
Liked
9:58As security operations evolve, the idea of the autonomous SOC is moving from concept to implementation. In this episode, we explore what defines an autonomous Security Operations Center and how automation, AI, machine learning, and orchestration platforms are converging to reduce human intervention. You’ll learn about the architectural components o…
…
continue reading

1
Episode 60: Emerging Tech in Security: AI and Machine Learning
10:01
10:01
Play later
Play later
Lists
Like
Liked
10:01Artificial intelligence and machine learning are rapidly reshaping the cybersecurity landscape—and CISOs must understand both their potential and their limitations. In this episode, we explore how AI and ML are used in security solutions, from behavioral analytics and anomaly detection to automated threat hunting and decision support. You’ll learn …
…
continue reading

1
Episode 59: Virtualization Security Overview
9:51
9:51
Play later
Play later
Lists
Like
Liked
9:51Virtualized environments introduce a unique set of security concerns that CISOs must understand and manage. In this episode, we break down how hypervisors, virtual machines, and containers work—and how these technologies change the security landscape. You’ll learn about hypervisor attacks, inter-VM threats, virtual network segmentation, and the imp…
…
continue reading

1
Episode 58: Mobile Device Security Essentials
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35With mobile devices becoming core tools for business productivity, they also represent a growing attack surface that CISOs must manage. In this episode, we examine the risks posed by smartphones, tablets, and other portable devices, and the controls needed to secure them. You’ll learn how to implement mobile device management (MDM), containerizatio…
…
continue reading
While cybersecurity often dominates the conversation, physical security remains an essential component of any comprehensive security program. In this episode, we explore how physical controls—like access badges, surveillance systems, security guards, and biometrics—support the protection of data centers, executive offices, and other sensitive facil…
…
continue reading

1
Episode 56: Encryption Principles and Practices
10:26
10:26
Play later
Play later
Lists
Like
Liked
10:26Encryption is a cornerstone of data protection, and in this episode, we break down its role in securing data both at rest and in transit. You’ll learn about the key encryption types—symmetric, asymmetric, and hashing—and how each serves a distinct purpose in confidentiality, integrity, and authentication strategies. We explore how encryption is app…
…
continue reading

1
Episode 55: Data Security and Privacy Basics
10:17
10:17
Play later
Play later
Lists
Like
Liked
10:17Data is the crown jewel of most organizations—and protecting it is a central responsibility of the CISO. In this episode, we explore the foundational practices for securing sensitive and regulated data, including classification, labeling, access controls, encryption, and secure disposal. You’ll learn how to define data handling requirements by type…
…
continue reading
As organizations migrate more infrastructure and services to the cloud, CISOs must adapt their strategies to manage risk in cloud environments. This episode introduces the core principles of cloud security, including shared responsibility models, identity federation, encryption of data at rest and in transit, and secure API design. You'll learn abo…
…
continue reading

1
Episode 53: Network Security for Executives
10:39
10:39
Play later
Play later
Lists
Like
Liked
10:39Network security remains a foundational element of cybersecurity architecture, even as perimeter boundaries blur in cloud-first and remote-enabled environments. In this episode, we provide a comprehensive overview of modern network security strategies, including segmentation, firewall deployment, IDS/IPS, secure tunneling, and zero trust network ac…
…
continue reading
Endpoints represent one of the largest attack surfaces in modern organizations, making endpoint protection a critical priority. In this episode, we cover the foundational components of endpoint security—including antivirus, EDR (Endpoint Detection and Response), application whitelisting, configuration hardening, and data loss prevention (DLP). You’…
…
continue reading

1
Episode 51: Best Practices for Access Control
10:54
10:54
Play later
Play later
Lists
Like
Liked
10:54Once you've selected the right access control model, the challenge shifts to enforcing it consistently across systems, users, and environments. In this episode, we walk through best practices for implementing, maintaining, and auditing access control systems in complex enterprises. You'll learn how to enforce least privilege, manage role creep, and…
…
continue reading

1
Episode 50: Access Control Models Overview
10:31
10:31
Play later
Play later
Lists
Like
Liked
10:31Access control is foundational to every security program, and this episode introduces the core models used to govern who can access what, when, and under what conditions. We examine the primary access control models—Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (…
…
continue reading

1
Episode 49: Advanced Threat Hunting Concepts
10:20
10:20
Play later
Play later
Lists
Like
Liked
10:20Building on the previous episode, we now explore more advanced threat hunting concepts that CISOs must understand to support elite detection capabilities. You'll learn how mature organizations move beyond one-off hunts to establish sustained, repeatable hunting programs with custom detection logic, automation pipelines, and continuous telemetry tun…
…
continue reading

1
Episode 48: Threat Hunting Basics for Executives
10:23
10:23
Play later
Play later
Lists
Like
Liked
10:23Threat hunting goes beyond traditional alert-driven detection by proactively searching for indicators of compromise within the environment. In this episode, we explore what threat hunting is, why it's becoming a critical capability, and how CISOs support and guide hunting programs. You’ll learn about the use of hypotheses, the importance of telemet…
…
continue reading

1
Episode 47: Threat Intelligence for Executives
11:07
11:07
Play later
Play later
Lists
Like
Liked
11:07By Dr Jason Edwards
…
continue reading

1
NC #1052 Screenshot of Screenshot App, Eufy Outdoor Cams and HomeBase 3, Security Bits
56:17
56:17
Play later
Play later
Lists
Like
Liked
56:17Screenshot of Screenshot.app Eufy Part 2 - Outdoor Cam E220, S380 HomeBase, and Wireless SoloCam S340s Support the Show Security Bits — 6 July 2025 Transcript of NC_2025_07_06 Join the Conversation: [email protected] podfeet.com/slack Support the Show: Patreon Donation Apple Pay or Credit Card one-time donation PayPal one-time donation Podfeet Po…
…
continue reading

1
Episode 46: Vulnerability Management Essentials
10:52
10:52
Play later
Play later
Lists
Like
Liked
10:52Vulnerability management is the process of identifying, evaluating, and remediating weaknesses in systems, applications, and configurations before they can be exploited. In this episode, we break down the key stages of an effective vulnerability management program, from scanning and prioritization to patching and verification. You’ll learn how to c…
…
continue reading