The official Society for Laboratory Automation and Screening (SLAS) podcast explores advances in automation, cellular imaging, big data and what's coming in the spaces between traditional scientific disciplines. Guests often include members of SLAS along with innovators, leading experts and other members of the global scientific community to highlight technology and even career stories. Episodes are released every week and subscribe to New Matter - available on all podcast players.
…
continue reading
SLAS Podcasts
We invite you to "get behind the science" with SLAS Technology Editorial Board Member and Podcast Editor Dave Pechter, M.S.M.E. (PerkinElmer, Cambridge, MA) and hear from our featured SLAS Technology authors! This podcast series is a chance for readers to meet the people behind the journal science and hear directly from them about their work, their motivations, as well as the context and potential impact of their work. Watch for a new featured author interview with each published issue!
…
continue reading
Podcast for those who want to take IT Experience Management (ITXM) in use and improve Employee Experience of IT Services in large enterprises. We talk about Human-Centric IT, how does it change the culture of IT Departments from SLAs to Experience Metrics and XLAs. If you use ServiceNow or other enterprise service management system to provide services to end-users, then this is for you. To learn more about Human-Centric IT Experience Management visit https://happysignals.com/
…
continue reading
An opinion column for developers. Brutally honest, no pulled punches.
…
continue reading
Learn the latest Business updates in the tech world.
…
continue reading
News and information for improving IT experiences. Ticket Volume connects a community of Service Management professionals with new ideas and perspectives. Powered by InvGate. New episodes soon!
…
continue reading
The only podcast about political economy and anime.
…
continue reading
Bringing you and your business the right insight, tips, and ideas for the future of workforce management and employee productivity.
…
continue reading
Chats with experts across the world of Life Science, Pharma and Bio-Pharma on all things related to Drug Discovery, Development, Manufacturing, Leadership, Entrepreneurship, Marketing, Events and other topics I love talking about!
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO ...
…
continue reading
The Future of Application Security is a podcast for ambitious leaders who want to build a modern and effective AppSec program. Doing application security right is really hard and we want to help other experts build the future of AppSec by curating the best industry insights, tips and resources. What’s the most important security metric to measure in 2024? It’s Mean Time to Remediate (MTTR). Download our new MTTR guide: https://lnkd.in/evjcf4Vt
…
continue reading

1
Crafting Effective SLAs That Build Trust With Customers
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10This story was originally published on HackerNoon at: https://hackernoon.com/crafting-effective-slas-that-build-trust-with-customers. the importance of SLAs in building trust, as well as strategies for crafting effective SLAs, common pitfalls to avoid, and examples of impactful SLAs that have Check more stories related to business at: https://hacke…
…
continue reading

1
The MO:BOT from mo:re | SLAS Europe 2025 New Product Award Winner with Lukas Gaats, MBA, MSc
12:38
12:38
Play later
Play later
Lists
Like
Liked
12:38Send us a text Live from SLAS Europe 2025 in Hamburg, host Emily Yamasaki, PhD, speaks with Lukas Gaats, MBA, MSc, CEO of mo:re (Modern Research) who is a winner of the SLAS Europe 2025 New Product Award. Based in Hamburg, mo:re is revolutionizing 3D cell culture automation with a modular, biology-first platform designed for organoids, spheroids, a…
…
continue reading

1
You're Not an Introvert: How to Build High-Value Connections Online
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25This story was originally published on HackerNoon at: https://hackernoon.com/youre-not-an-introvert-how-to-build-high-value-connections-online. Think you’re an introvert? Wrong. In the digital age, weak networking isn’t a personality trait — it’s a skill issue you can fix. Check more stories related to business at: https://hackernoon.com/c/business…
…
continue reading

1
Measuring and Improving Service Reliability with SLOs
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35This story was originally published on HackerNoon at: https://hackernoon.com/measuring-and-improving-service-reliability-with-slos. Uncover strategies for setting and achieving business goals, discuss best practices for tracking SLOs, and identify areas for improvement. Check more stories related to business at: https://hackernoon.com/c/business. Y…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/how-to-choose-right-slis-for-your-service. Key considerations and best practices for choosing SLIs that are relevant, meaningful, and effective in driving your service towards excellence Check more stories related to business at: https://hackernoon.com/c/business. You can …
…
continue reading

1
30 Growth Hacking Examples to Accelerate Your Business
16:37
16:37
Play later
Play later
Lists
Like
Liked
16:37This story was originally published on HackerNoon at: https://hackernoon.com/30-growth-hacking-examples-to-accelerate-your-business. Discover 30 powerful growth hacks from companies like Airbnb and Hotmail, revealing how creative strategies turned obstacles into viral success stories. Check more stories related to business at: https://hackernoon.co…
…
continue reading

1
The Ruthless Logic of Scarcity: How Marketers Weaponize Desire in the Attention Economy
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37This story was originally published on HackerNoon at: https://hackernoon.com/the-ruthless-logic-of-scarcity-how-marketers-weaponize-desire-in-the-attention-economy. Scarcity isn't persuasion, it's psychological warfare. Marketers weaponize lack to dominate the attention economy. Check more stories related to business at: https://hackernoon.com/c/bu…
…
continue reading

1
Customer-Centric Marketing and Revenue Management: Looking at Growth Beyond ARR
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34This story was originally published on HackerNoon at: https://hackernoon.com/customer-centric-marketing-and-revenue-management-looking-at-growth-beyond-arr. ARR is not enough to measure SaaS growth. Check more stories related to business at: https://hackernoon.com/c/business. You can also check exclusive content about #marketing, #branding, #digita…
…
continue reading

1
The Death of Persuasion: Why Future Marketers Must Master Psychological Warfare
4:29
4:29
Play later
Play later
Lists
Like
Liked
4:29This story was originally published on HackerNoon at: https://hackernoon.com/the-death-of-persuasion-why-future-marketers-must-master-psychological-warfare. AI ads bypass logic and target the psyche. A strategist's view on how persuasion has evolved into psychological warfare in modern marketing. Check more stories related to business at: https://h…
…
continue reading

1
The Economics of Self-Isolation: A Game-Theoretic Analysis of Contagion in a Free Economy
3:37
3:37
Play later
Play later
Lists
Like
Liked
3:37This story was originally published on HackerNoon at: https://hackernoon.com/the-economics-of-self-isolation-a-game-theoretic-analysis-of-contagion-in-a-free-economy. Exploring how the costs of a pandemic can lead to a self-enforcing lockdown in a networked economy, analyzing the resulting changes in network structure Check more stories related to …
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/12-best-proxy-service-providers-in-2025. Discover the top 12 proxy providers of 2025, tested and ranked. Compare pricing, features, and performance to find the perfect proxy service for your needs. Check more stories related to business at: https://hackernoon.com/c/busines…
…
continue reading

1
Social Justice in Economics: A New Framework for a Free Economy with Inclusion
4:44
4:44
Play later
Play later
Lists
Like
Liked
4:44This story was originally published on HackerNoon at: https://hackernoon.com/social-justice-in-economics-a-new-framework-for-a-free-economy-with-inclusion. This article explores a new model for a free economy that integrates social justice and inclusion with traditional principles of market justice. Check more stories related to business at: https:…
…
continue reading

1
The Evolution of Marketing Laws: From Comfort to Psychological Warfare
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02This story was originally published on HackerNoon at: https://hackernoon.com/the-evolution-of-marketing-laws-from-comfort-to-psychological-warfare. A dark strategist's lens on the evolution of marketing laws - where psychology, power, and AI shape today's brutal marketplace. Check more stories related to business at: https://hackernoon.com/c/busine…
…
continue reading

1
The Monotonicity Theorem: How a Simple Condition Guarantees Equilibrium Uniqueness and Efficiency
2:31
2:31
Play later
Play later
Lists
Like
Liked
2:31This story was originally published on HackerNoon at: https://hackernoon.com/the-monotonicity-theorem-how-a-simple-condition-guarantees-equilibrium-uniqueness-and-efficiency. Further demonstrating that if the economy is strictly monotonic, the equilibrium is Pareto-efficient and also unique Check more stories related to business at: https://hackern…
…
continue reading

1
How Marketing Ops, Sales Ops, and RevOps Work Together to Help Your Business Grow
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45This story was originally published on HackerNoon at: https://hackernoon.com/how-marketing-ops-sales-ops-and-revops-work-together-to-help-your-business-grow. Learn how Marketing Ops, Sales Ops, and RevOps work together to cut friction, align teams, and create steady growth with a smoother customer journey. Check more stories related to business at:…
…
continue reading

1
The Nash Equilibrium of a Fair Economy: A Non-Cooperative Game Theory Perspective
2:31
2:31
Play later
Play later
Lists
Like
Liked
2:31This story was originally published on HackerNoon at: https://hackernoon.com/the-nash-equilibrium-of-a-fair-economy-a-non-cooperative-game-theory-perspective. This article demonstrates a fundamental result in economic theory: that a free and fair economy always has a pure strategy Nash equilibrium. Check more stories related to business at: https:/…
…
continue reading

1
Cross-Platform Design Wrapped Part 1: How to Anchor Every UX Decision
13:46
13:46
Play later
Play later
Lists
Like
Liked
13:46This story was originally published on HackerNoon at: https://hackernoon.com/cross-platform-design-wrapped-part-1-how-to-anchor-every-ux-decision. This article explains three key principles every designer should consider and keep in mind when making UX decisions. Check more stories related to business at: https://hackernoon.com/c/business. You can …
…
continue reading

1
Planning With Lighthouses - and Why You Need Delulu Goals
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39This story was originally published on HackerNoon at: https://hackernoon.com/planning-with-lighthouses-and-why-you-need-delulu-goals. Discover the Lighthouses framework: set clear milestones, add bold delulu goals, and plan your path from today to the impossible. Check more stories related to business at: https://hackernoon.com/c/business. You can …
…
continue reading
How should you adapt to a new manager? What should you discuss at your first one-on-one?By Eric Brechner
…
continue reading

1
127. From AI Hype to Human-Centred IT: Jaro Tomik from CDW
40:50
40:50
Play later
Play later
Lists
Like
Liked
40:50CDW chief technologist Jaro Tomik joins host Sakari Kyrö to unpack two seismic shifts rocking enterprise IT: the rise of AI-washing and the pivot to experience-led service management. Hear how Jaro’s “escape-room for IT” workshops flip roles, surface hidden bottlenecks and turn data visibility into a zero-ticket, proactive support vision—all while …
…
continue reading

1
101. What Makes Teams Replace IT Tools? Triggers You Shouldn’t Ignore
54:38
54:38
Play later
Play later
Lists
Like
Liked
54:38When is it really time to replace IT tools? In this episode of Ticket Volume – IT Podcast, we dive into the warning signs, triggers, and challenges that push organizations to switch IT software. Host Matt Beran sits down with Ignacio Harriague (Director of Product Marketing at InvGate), Linda Lenox (Program Delivery Director at Hall's Culligan Wate…
…
continue reading

1
126. Hasse Eranka - Clarity Over Complexity: The New Rule for IT Leaders
29:19
29:19
Play later
Play later
Lists
Like
Liked
29:19Communications strategist Hasse Eranka joins HappySignals’ Sakari Kyrö to reveal why IT teams often lose business audiences—and how a few audience-first storytelling habits can fix it fast. From cutting information overload to turning feedback loops into word-of-mouth advocacy, Hasse shares practical tools any CIO, service-desk lead or ITSM owner c…
…
continue reading

1
2025 SLAS Graduate Education Fellowship Grant Recipient | Vasu Rao, MS, PhD Candidate
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54Send us a text New Matter host Emily Yamasaki, PhD, speaks with Vasumitra “Vasu” Rao, MS, PhD candidate–recipient of the 2025 SLAS Graduate Education Fellowship Grant–about his innovative research at the Jensen Lab (University of Michigan). Vasu’s work focuses on AI-driven characterization of non-model oral bacteria (e.g., Streptococcus mutans), ai…
…
continue reading

1
125. Clarity, Common Sense & Storytelling — Paul Brandvold on Keeping ITSM Human
24:11
24:11
Play later
Play later
Lists
Like
Liked
24:11LinkedIn’s rising IT-service-management voice Paul Brandvold joins HappySignals host Sakari Kyrö to unpack why plain-language storytelling, real-world leadership, and a healthy dose of common sense are reshaping how internal IT support shows value. From the hidden pressures driving talent away to the grassroots expertise you’ll need when rolling ou…
…
continue reading

1
Student Perspectives on Research, Networking and Global Impact at Scientific Conferences
32:55
32:55
Play later
Play later
Lists
Like
Liked
32:55Send us a text In this episode, we look at a forward-thinking program that brought undergraduate and graduate students from Mexican universities to the SLAS2025 International Conference & Exhibition in San Diego. Host Emily Yamasaki, PhD is joined by: Cris Herrera Ramirez, a biotech engineer and U.S. Air Force veteran, who spearheaded the program t…
…
continue reading

1
124. 2025 Global IT Experience Benchmark: Uncovering the 13 % of Tickets Behind 80 % of Lost Productivity
20:50
20:50
Play later
Play later
Lists
Like
Liked
20:50Launched in May at London’s iconic The Gherkin tower, HappySignals’ Pasi Nikkanen sits down with benchmark lead Sakari Kyrö to unpack the brand-new 2025 Global IT Experience Benchmark Report. Together, they explore why employee-focused support still tops the happiness charts, how finance services can be both the happiest and the slowest, and why re…
…
continue reading
In this final episode of the prepcast, we shift focus from content to performance. You’ve learned the material—now it's time to master the test. We walk through proven strategies for final review, including how to prioritize domains, balance study time, and simulate test conditions. You’ll get tips on memory recall, cognitive pacing, and avoiding e…
…
continue reading

1
Episode 69: Vendor Risk Oversight and Auditing
11:19
11:19
Play later
Play later
Lists
Like
Liked
11:19Vendor relationships introduce risk far beyond basic performance metrics—and in this episode, we dive into the executive oversight practices required to manage those risks. You’ll learn how to assess third-party risk using tiered models, risk questionnaires, and onsite audits. We also discuss how to require evidence of compliance, conduct assessmen…
…
continue reading

1
Episode 68: Vendor Contracts, SLAs, and Performance Metrics
10:55
10:55
Play later
Play later
Lists
Like
Liked
10:55Securing a vendor is only the beginning—the real work lies in managing performance, risk, and accountability. This episode focuses on the contractual elements that govern third-party relationships, including service level agreements (SLAs), key performance indicators (KPIs), penalties for non-compliance, and confidentiality clauses. You’ll learn ho…
…
continue reading

1
Episode 67: Security Procurement: RFPs, RFIs, and Vendor Selection
11:21
11:21
Play later
Play later
Lists
Like
Liked
11:21Procurement is more than just purchasing tools—it’s a strategic process that shapes your organization's security ecosystem. In this episode, we walk you through the essentials of security procurement, including how to develop Requests for Proposals (RFPs) and Requests for Information (RFIs), establish evaluation criteria, and conduct vendor due dil…
…
continue reading

1
Episode 66: ROI and Cost-Benefit Analysis for Security Investments
12:01
12:01
Play later
Play later
Lists
Like
Liked
12:01As cybersecurity budgets grow, so does the need to justify investments with clear, measurable value. In this episode, we explore how CISOs evaluate the return on investment (ROI) of security initiatives, technologies, and services. You’ll learn how to calculate ROI using both quantitative and qualitative factors, including risk reduction, productiv…
…
continue reading

1
Episode 65: Security Budgeting Essentials: Managing and Adjusting Budgets
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56Security budgeting doesn’t end once funding is approved—CISOs must continuously manage, adjust, and defend their budgets in the face of shifting priorities and evolving threats. In this episode, we explore the fundamentals of dynamic budget management, including tracking expenditures, reallocating resources, and responding to unexpected events such…
…
continue reading

1
Episode 64: Financial Management Principles for Security Leaders
10:39
10:39
Play later
Play later
Lists
Like
Liked
10:39Financial fluency is essential for every CISO—and in this episode, we break down the core principles of financial management in the context of enterprise cybersecurity. You’ll learn how to interpret balance sheets, manage operational and capital expenditures, and build forecasts that align with multi-year strategic plans. We explain how to calculat…
…
continue reading

1
Episode 63: Strategic Security Planning Frameworks (TOGAF, SABSA)
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05Effective security leaders think in frameworks—and in this episode, we explore two of the most influential planning models for enterprise architecture: TOGAF (The Open Group Architecture Framework) and SABSA (Sherwood Applied Business Security Architecture). You’ll learn how these frameworks guide long-term security strategy by aligning governance,…
…
continue reading

1
Episode 62: Aligning Security with Organizational Objectives
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55Security is no longer a siloed function—it must be embedded in business strategy. In this episode, we examine how CISOs align cybersecurity initiatives with overarching organizational goals. You’ll learn how to interpret business drivers, engage with other executive leaders, and shape security programs that enable growth, agility, and competitive a…
…
continue reading

1
Episode 61: Autonomous Security Operations Centers and Future Trends
9:58
9:58
Play later
Play later
Lists
Like
Liked
9:58As security operations evolve, the idea of the autonomous SOC is moving from concept to implementation. In this episode, we explore what defines an autonomous Security Operations Center and how automation, AI, machine learning, and orchestration platforms are converging to reduce human intervention. You’ll learn about the architectural components o…
…
continue reading

1
Episode 60: Emerging Tech in Security: AI and Machine Learning
10:01
10:01
Play later
Play later
Lists
Like
Liked
10:01Artificial intelligence and machine learning are rapidly reshaping the cybersecurity landscape—and CISOs must understand both their potential and their limitations. In this episode, we explore how AI and ML are used in security solutions, from behavioral analytics and anomaly detection to automated threat hunting and decision support. You’ll learn …
…
continue reading

1
Episode 59: Virtualization Security Overview
9:51
9:51
Play later
Play later
Lists
Like
Liked
9:51Virtualized environments introduce a unique set of security concerns that CISOs must understand and manage. In this episode, we break down how hypervisors, virtual machines, and containers work—and how these technologies change the security landscape. You’ll learn about hypervisor attacks, inter-VM threats, virtual network segmentation, and the imp…
…
continue reading

1
Episode 58: Mobile Device Security Essentials
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35With mobile devices becoming core tools for business productivity, they also represent a growing attack surface that CISOs must manage. In this episode, we examine the risks posed by smartphones, tablets, and other portable devices, and the controls needed to secure them. You’ll learn how to implement mobile device management (MDM), containerizatio…
…
continue reading
While cybersecurity often dominates the conversation, physical security remains an essential component of any comprehensive security program. In this episode, we explore how physical controls—like access badges, surveillance systems, security guards, and biometrics—support the protection of data centers, executive offices, and other sensitive facil…
…
continue reading

1
Episode 56: Encryption Principles and Practices
10:26
10:26
Play later
Play later
Lists
Like
Liked
10:26Encryption is a cornerstone of data protection, and in this episode, we break down its role in securing data both at rest and in transit. You’ll learn about the key encryption types—symmetric, asymmetric, and hashing—and how each serves a distinct purpose in confidentiality, integrity, and authentication strategies. We explore how encryption is app…
…
continue reading

1
Episode 55: Data Security and Privacy Basics
10:17
10:17
Play later
Play later
Lists
Like
Liked
10:17Data is the crown jewel of most organizations—and protecting it is a central responsibility of the CISO. In this episode, we explore the foundational practices for securing sensitive and regulated data, including classification, labeling, access controls, encryption, and secure disposal. You’ll learn how to define data handling requirements by type…
…
continue reading
As organizations migrate more infrastructure and services to the cloud, CISOs must adapt their strategies to manage risk in cloud environments. This episode introduces the core principles of cloud security, including shared responsibility models, identity federation, encryption of data at rest and in transit, and secure API design. You'll learn abo…
…
continue reading

1
Episode 53: Network Security for Executives
10:39
10:39
Play later
Play later
Lists
Like
Liked
10:39Network security remains a foundational element of cybersecurity architecture, even as perimeter boundaries blur in cloud-first and remote-enabled environments. In this episode, we provide a comprehensive overview of modern network security strategies, including segmentation, firewall deployment, IDS/IPS, secure tunneling, and zero trust network ac…
…
continue reading
Endpoints represent one of the largest attack surfaces in modern organizations, making endpoint protection a critical priority. In this episode, we cover the foundational components of endpoint security—including antivirus, EDR (Endpoint Detection and Response), application whitelisting, configuration hardening, and data loss prevention (DLP). You’…
…
continue reading

1
Episode 51: Best Practices for Access Control
10:54
10:54
Play later
Play later
Lists
Like
Liked
10:54Once you've selected the right access control model, the challenge shifts to enforcing it consistently across systems, users, and environments. In this episode, we walk through best practices for implementing, maintaining, and auditing access control systems in complex enterprises. You'll learn how to enforce least privilege, manage role creep, and…
…
continue reading

1
Episode 50: Access Control Models Overview
10:31
10:31
Play later
Play later
Lists
Like
Liked
10:31Access control is foundational to every security program, and this episode introduces the core models used to govern who can access what, when, and under what conditions. We examine the primary access control models—Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (…
…
continue reading

1
Episode 49: Advanced Threat Hunting Concepts
10:20
10:20
Play later
Play later
Lists
Like
Liked
10:20Building on the previous episode, we now explore more advanced threat hunting concepts that CISOs must understand to support elite detection capabilities. You'll learn how mature organizations move beyond one-off hunts to establish sustained, repeatable hunting programs with custom detection logic, automation pipelines, and continuous telemetry tun…
…
continue reading

1
Episode 48: Threat Hunting Basics for Executives
10:23
10:23
Play later
Play later
Lists
Like
Liked
10:23Threat hunting goes beyond traditional alert-driven detection by proactively searching for indicators of compromise within the environment. In this episode, we explore what threat hunting is, why it's becoming a critical capability, and how CISOs support and guide hunting programs. You’ll learn about the use of hypotheses, the importance of telemet…
…
continue reading

1
Episode 47: Threat Intelligence for Executives
11:07
11:07
Play later
Play later
Lists
Like
Liked
11:07By Dr Jason Edwards
…
continue reading