Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Ventilator Management Podcasts

show episodes
 
Artwork
 
Zero Ambitions is a consultancy and weekly podcast about sustainability and the built environment. We find interesting and experienced guests who know what they're talking about, usually to discuss how we navigate the complexity of decarbonisation and sustainability in the built environment and its many related sectors. The success of the podcast has seen it grow into a consultancy, Zero Ambitions Partners. The consultancy works with blue chip clients, public sector institutions, and niche-m ...
  continue reading
 
Artwork

1
EMCrit FOAM Feed

Scott D. Weingart, MD FCCM

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Help me fill in the blanks of the practice of ED Critical Care. In this podcast, we discuss all things related to the crashing, critically ill patient in the Emergency Department. Find the show notes at emcrit.org.
  continue reading
 
Artwork

1
FlightCrit Podcast

Sean Eaton, NRP, FP-C, CCP-C

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The FlightCrit Podcast. Sharing the latest education for Prehospital, Emergency, and Critical Care Trasport Professionals. We're passionate about providing the very best education for you, so please join us for the best in Clinical Practice Updates, Board Certification Exam Prep, Test Taking Tips, and much more. Have a topic you want discussed on the podcast? Let us know at www.askflightcrit.com Because What You Do Matters!
  continue reading
 
Artwork

1
Anger Management Institute

Lynette J. Hoy, NCC, LCPC, Anger Management Specialist

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Quick Tips for Managing Anger is a show about how deal with anger effectively and practically. Lynette Hoy, Marriage and Family Counselor and Anger Management Specialist, presents insights and skills for managing anger. You can learn to change unhealthy anger into a positive force which accomplishes something good for yourself and others! No more yelling, swearing, manipulating or giving the 'cold shoulder'. Transform your anger into faith, assertiveness, problem-solving, empathy and forgive ...
  continue reading
 
Artwork
 
Let's chat about modern facilities management! We'll explore trends in building systems, energy management, operations, and more. In the world of FM, there is always something new. Listen in as we explore the latest in facilities management with those who are shaping the industry.
  continue reading
 
Artwork

1
In The Coop

Poultry Industry Council

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
'In the Coop' is an educational podcast brought to you by the Poultry Industry Council. The show explores relevant and interesting topics pertaining to poultry production in Ontario. Tune in byweekly as we explore the ins and outs of the Ontario poultry with various industry experts.
  continue reading
 
Artwork
 
Hosts, Alex Finch, MD and Venk Bellamkonda, MD explore topics relevant to the practice, education or research of emergency medicine. Enjoy interviews with people on the front lines, thought leaders from around the world, and the comedy and drama of life when it intersects with emergency care. Follow us on X: @AlwaysOnEM Email: [email protected]
  continue reading
 
Artwork
 
The Thorax podcast offers the latest insights in respiratory medicine. Each episode features in-depth interviews with renowned authors and leading experts in the field, delving into the latest respiratory research and treatments. Thorax, an esteemed international journal from the BMJ Group and the British Thoracic Society (BTS), is dedicated to publishing research and reviews in respiratory medicine to improve clinical practice. Stay ahead in your field by tuning into our expert discussions ...
  continue reading
 
Artwork

1
Out of the Blue: An AJRCCM Podcast

American Thoracic Society

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Out of the Blue podcast takes you out of the pages of the American Journal of Respiratory and Critical Care Medicine and into the minds of the most brilliant researchers in the fields of respiratory, critical care, and sleep medicine.
  continue reading
 
The A+ Audio Course is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this podcast breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most—helping you understand, retain, and apply essential IT concepts, from hardware and networking to operating systems, security, troubleshooting, and professional ...
  continue reading
 
Artwork

1
Cardinal Compliance Consultants

Cardinal Compliance Consultants

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to the Cardinal Compliance Consultants podcast, your premier resource for environmental health, safety training, and industrial hygiene insights. Based in Toledo, Ohio, we're the leading consultancy firm helping businesses across the United States, Mexico, and Canada navigate the complex world of occupational and environmental regulatory compliance. Our podcast delivers in-depth discussions on Environmental Health and Safety (EHS) best practices, OSHA regulations, Industrial Hygiene ...
  continue reading
 
Artwork

1
Airway World® Podcasts

Calvin A. Brown III, MD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Airway World® Podcasts feature quarterly airway research updates and important airway topic discussions presented by Calvin Brown III, MD and guest faculty of The Difficult Airway Course™. Subscribe today to stay on the leading edge of the dynamic and critically important field of airway management. For more airway management educational resources, visit www.theairwaysite.com.
  continue reading
 
Loading …
show series
 
Episode 186 is a conversation with Brad Bonavida and James Dice from Nexus Labs, as well as Leslie Beu from Clockworks Analytics and Reed Powell from MacDonald-Miller Facility Solutions. In this episode of the Nexus Podcast, the Nexus Labs team breaks down the top stories relevant to energy managers, facility managers, IT/OT managers, and workplace…
  continue reading
 
Is there a collaboration problem in retrofit within the social housing sector? That was the premise for this conversation with Rafe Bertram, an architect and retrofit expert—appearing in a personal capacity—who was very surprised when I posed the question because he's found collaboration to be a strength in the sector, at least in London. In the en…
  continue reading
 
Dr. Mohleen Kang chats with Dr. Justin Oldham, Dr. Chad Newton and Dr. Jesse Roman about their papers, "Performance Characteristics for Physiological Measures of Progressive Pulmonary Fibrosis" and "Progress in Progressive Pulmonary Fibrosis."By American Thoracic Society
  continue reading
 
Prophylactic use of azithromycin is common in the management of COPD patients with frequent acute exacerbations. But its application is conservative due to concerns around adverse events, interactions with other drugs, and bacterial resistance. Given these concerns, it is important to identify patients who are likely to be responders or non-respond…
  continue reading
 
Episode 185 is a conversation with Brad Bonavida, Rosy Khalife, and Ainsley Muller from Nexus Labs. In this episode of the Nexus Podcast, the Nexus Labs team breaks down the top stories relevant to energy managers, facility managers, IT/OT managers, and workplace managers. Find full show notes and episode transcript on The Nexus Podcast: Episode 18…
  continue reading
 
In this episode of the Veterinary Anesthesia Nerds podcast we sit down with renowned veterinary anesthesiologist Dr. Sheilah Robertson to tackle the unique challenges of pediatric anesthesia. When dealing with tiny kittens and puppies, Dr. Robertson shares her expertise on how physiology, drug metabolism, and peri-anesthetic care differ in young pa…
  continue reading
 
Dr. Jim Gregoire, consultant nephrologist and master educator, joins the show again to talk about electrolytes this time. He breaks down practicalities in caring for patients with sodium, magnesium, and phosphorus disorders - who is at risk, what history and exam findings to look for, what testing to do and how to correct the problems. Join Alex an…
  continue reading
 
🌱 In the Coop – Sustainability in Poultry 🐔 Sustainability is more than just a buzzword—it’s shaping the way Ontario’s poultry sector grows, innovates, and connects with consumers. In this episode of In the Coop, Tom Lewis and Charlotte Wall welcome Christoph Wand to break down what sustainability really means for poultry production. From defining …
  continue reading
 
This episode is all about case study in circularity and a group of people turning waste into useful materials for the built environment. Daniel Dinizo and Charmaine Cu-Unjieng of NaturLoop are bringing a new bio-based product to market that transforms waste coconut husk into a material that's something between MDF and a particle board. For us, this…
  continue reading
 
Do your surgical patients need more than just a comforter and a heat source in recovery? Join Tabitha Kucera, RVT, KPA-CTP, VTS (Behavior) as we talk about al the ways you can create the optimal surgical recovery area for your patients. What sights, sounds, and smells should we be trying to achieve or avoid? Its all discussed today on the Veterinar…
  continue reading
 
Episode 184 is a conversation with James Dice, Rosy Khalife, and Brad Bonavida from Nexus Labs. In this episode of the Nexus Podcast, the Nexus Labs team dives into details and teasers for this years NexusCon. Find full show notes and episode transcript on The Nexus Podcast: Episode 184 webpage. Sign-up (or refer a friend!) to the Nexus Newsletter.…
  continue reading
 
Automating tasks and supporting systems remotely are part of modern IT workflows. In this episode, we begin with scripting—specifically .bat and PowerShell scripts—and explain how they’re used to automate routine tasks like file transfers, user creation, or system reboots. Then we introduce remote access tools like R D P and S S H, showing how they…
  continue reading
 
Protecting sensitive data requires not only digital safeguards but also physical and procedural awareness. This episode teaches you how to properly handle confidential information, whether it's on printed documents, storage devices, or screens. We cover methods like locked cabinets, badge-restricted rooms, and screen privacy filters to prevent unau…
  continue reading
 
Technical skills are vital, but soft skills are what turn technicians into trusted professionals. This episode focuses on communication techniques that improve user experiences and foster trust. We start with active listening—how to give users your full attention and confirm your understanding through paraphrasing and clarification. Then we cover t…
  continue reading
 
This episode explores the legal and ethical responsibilities of handling data and software in IT environments. We start with licensing—understanding the difference between OEM, volume, and subscription licenses, and how misuse can result in compliance violations. Then we discuss Digital Rights Management (DRM), which limits copying or modifying med…
  continue reading
 
Maintaining the physical environment around IT systems is just as important as managing the systems themselves. This episode begins with ventilation and cooling requirements—how airflow affects server performance, what happens when heat builds up, and how to monitor environmental thresholds. We explain how to position equipment in racks, monitor fo…
  continue reading
 
Keeping yourself and your equipment safe is foundational to effective IT work. This episode covers essential safety practices beginning with Electrostatic Discharge (E S D) prevention—why grounding matters and how to properly use wrist straps, mats, and anti-static bags. We explain how improper handling can damage sensitive components like CPUs, RA…
  continue reading
 
This episode focuses on the backup strategies and data recovery techniques that every IT professional must know. We begin with the Grandfather-Father-Son (GFS) backup rotation model, explaining how it balances data redundancy and storage space. Then we dive into the 3-2-1 rule—keeping three copies of your data, on two different media types, with on…
  continue reading
 
Change is a constant in IT, but managing that change responsibly is what keeps systems stable. This episode introduces the formal change management process, starting with the identification of proposed changes and their potential impact on systems, users, and business operations. You’ll learn about documentation requirements, stakeholder approvals,…
  continue reading
 
There’s more than one kind of documentation in I T, and this episode explains the major types that appear on the A Plus exam. We start with Acceptable Use Policies (AUPs), which define what users are permitted to do with company devices and networks. These documents are key to setting boundaries and providing grounds for enforcement. Next, we cover…
  continue reading
 
Keeping track of hardware, software, and configuration data is vital for organizations of all sizes, and this episode explores how asset and inventory management supports that effort. We begin with physical asset tracking—using labels, barcodes, and location databases to monitor laptops, desktops, and peripherals. Then we move into software invento…
  continue reading
 
This episode focuses on the importance of clear, consistent documentation in every phase of IT support. We begin by explaining ticketing systems—how they track user requests, service histories, resolutions, and follow-up actions. You’ll learn what makes a good ticket entry, including timestamps, concise descriptions, and links to previous cases. We…
  continue reading
 
The final domain in the Core 2 exam is Operational Procedures, and this episode introduces its wide-ranging content. You’ll learn what this domain includes: documentation standards, safety procedures, communication skills, licensing and privacy concerns, and basic scripting. While these topics may seem non-technical, they are just as important for …
  continue reading
 
Malware isn’t limited to desktops. In this episode, we explore the types of malicious threats that target mobile devices. We begin with adware, spyware, and malicious apps that gain access to sensitive permissions—like camera, microphone, or SMS—without the user’s knowledge. Then we explain the concept of rooting or jailbreaking, which removes manu…
  continue reading
 
Mobile devices introduce their own unique troubleshooting challenges, particularly when it comes to application behavior. In this episode, we start with app crashes—why they happen, how to review logs or force close misbehaving apps, and what steps to take before uninstalling. Then we examine connectivity issues within apps, such as those that rely…
  continue reading
 
Successfully removing malware requires following the right sequence, and this episode lays out that process according to CompTIA’s expectations. We begin with identification—recognizing that malware is present—followed by isolating the system from the network to prevent spread. Then we quarantine the malicious files using antimalware software and p…
  continue reading
 
Security issues don’t always come with flashing warnings—sometimes they hide behind subtle behavior. This episode helps you identify the symptoms that often indicate malware or unauthorized access. We begin with security alerts—both real and fake—and how to distinguish between legitimate warnings and scareware popups. Then we cover unexplained file…
  continue reading
 
When something breaks in Windows, there are several tools you can use to restore functionality, and this episode breaks them down step by step. We begin with the System File Checker (SFC), which scans and repairs corrupted or missing system files using known-good versions. Next, we explain DISM and when to use it alongside or instead of SFC to fix …
  continue reading
 
This episode covers some of the most common and dramatic symptoms you'll face when troubleshooting Windows systems. We begin with the infamous Blue Screen of Death—also known as BSOD—explaining what causes it, how to interpret error codes, and what logs or tools to use when diagnosing the issue. Then we move into boot problems, such as systems gett…
  continue reading
 
Troubleshooting software problems is a core responsibility in IT, and this episode introduces Domain 3.0 of the Core 2 exam. You’ll learn what kinds of software issues are covered, including application crashes, boot problems, security alerts, and general OS instability. We explain how this domain connects to others, such as security and user suppo…
  continue reading
 
Properly disposing of storage media is a critical part of data security, and this episode outlines the methods you need to know. We begin with data wiping—using software to overwrite existing files—and explain why a single delete or format isn’t enough. Then we move on to degaussing, which uses magnetic fields to scramble data on hard drives and ma…
  continue reading
 
Mobile and embedded devices require a tailored approach to security, and this episode explains how to apply protections without compromising usability. We begin with passcodes, biometrics, and auto-lock timers as primary defenses. Next, we explore mobile device management (MDM), including how organizations use it to enforce encryption, remotely wip…
  continue reading
 
Securing a user’s workstation is about more than antivirus—it involves a full spectrum of proactive configurations. This episode outlines best practices for maintaining a secure endpoint. We begin with patch management, including automatic updates and reboot scheduling, then move to account management, such as disabling unused accounts and enforcin…
  continue reading
 
In this episode, we cover two important mechanisms for managing user access and security: User Account Control (UAC) and Single Sign-On (SSO). We begin with UAC—how it prompts users before executing administrative tasks, how to configure its sensitivity level, and what role it plays in limiting malware execution. Understanding UAC’s purpose and beh…
  continue reading
 
Securing a system starts with built-in operating system tools, and this episode walks you through three key Windows security features. First is Windows Defender, which provides real-time protection against malware, network attacks, and unwanted software changes. We explain how to configure scanning, quarantines, and exclusion lists. Next is BitLock…
  continue reading
 
This episode explains the technical underpinnings of some of the most dangerous threats and vulnerabilities in modern systems. We start with zero-day exploits, where attackers take advantage of unknown software flaws before patches can be released. These are especially damaging because traditional defenses often can’t detect them. Next, we explore …
  continue reading
 
Not all threats are technical—some are psychological. This episode focuses on social engineering attacks, which trick users into revealing information or granting access through manipulation rather than code. We start with phishing, covering both traditional email attacks and newer variants like spear phishing and smishing. You’ll learn what signs …
  continue reading
 
Preventing malware infections involves more than just scanning files—it’s about layering multiple defenses. In this episode, we start with antivirus and antimalware software, explaining how they use signature detection, heuristic analysis, and behavioral monitoring to stop threats. We describe how these tools are managed, updated, and configured fo…
  continue reading
 
This episode dives into the various types of malicious software, or malware, that technicians must be able to recognize and address. We begin with viruses, which attach to legitimate files and require user interaction to spread, then move into worms, which self-replicate across networks and can bring down systems without any user action. We explain…
  continue reading
 
Authentication protocols ensure that users are who they say they are, and this episode covers three of the most important ones for the A Plus exam. We begin with RADIUS—Remote Authentication Dial-In User Service—and explain how it centralizes authentication for wireless and VPN access. Next, we look at TACACS Plus, a Cisco-designed protocol that se…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play