Zero Ambitions is a consultancy and weekly podcast about sustainability and the built environment. We find interesting and experienced guests who know what they're talking about, usually to discuss how we navigate the complexity of decarbonisation and sustainability in the built environment and its many related sectors. The success of the podcast has seen it grow into a consultancy, Zero Ambitions Partners. The consultancy works with blue chip clients, public sector institutions, and niche-m ...
…
continue reading
Ventilator Management Podcasts
Help me fill in the blanks of the practice of ED Critical Care. In this podcast, we discuss all things related to the crashing, critically ill patient in the Emergency Department. Find the show notes at emcrit.org.
…
continue reading
Articles from the medical literature are digested, abstracted, and discussed by our AI hosts, with topics in symptom management, diagnosis, ethics and others.
…
continue reading
The Chic Project Manager podcast is about safety and best practices in industrial ventilation, industrial dust collectors, combustible dust and occupational safety and health.
…
continue reading
Podcast by Sound Physicians
…
continue reading
Conversations with smart people exploring smart buildings technology, hosted by James Dice. www.nexuslabs.online
…
continue reading
The FlightCrit Podcast. Sharing the latest education for Prehospital, Emergency, and Critical Care Trasport Professionals. We're passionate about providing the very best education for you, so please join us for the best in Clinical Practice Updates, Board Certification Exam Prep, Test Taking Tips, and much more. Have a topic you want discussed on the podcast? Let us know at www.askflightcrit.com Because What You Do Matters!
…
continue reading
Quick Tips for Managing Anger is a show about how deal with anger effectively and practically. Lynette Hoy, Marriage and Family Counselor and Anger Management Specialist, presents insights and skills for managing anger. You can learn to change unhealthy anger into a positive force which accomplishes something good for yourself and others! No more yelling, swearing, manipulating or giving the 'cold shoulder'. Transform your anger into faith, assertiveness, problem-solving, empathy and forgive ...
…
continue reading
Let's chat about modern facilities management! We'll explore trends in building systems, energy management, operations, and more. In the world of FM, there is always something new. Listen in as we explore the latest in facilities management with those who are shaping the industry.
…
continue reading
Podcast by Veterinary Anesthesia Nerds
…
continue reading
'In the Coop' is an educational podcast brought to you by the Poultry Industry Council. The show explores relevant and interesting topics pertaining to poultry production in Ontario. Tune in byweekly as we explore the ins and outs of the Ontario poultry with various industry experts.
…
continue reading
Hosts, Alex Finch, MD and Venk Bellamkonda, MD explore topics relevant to the practice, education or research of emergency medicine. Enjoy interviews with people on the front lines, thought leaders from around the world, and the comedy and drama of life when it intersects with emergency care. Follow us on X: @AlwaysOnEM Email: [email protected]
…
continue reading
The Thorax podcast offers the latest insights in respiratory medicine. Each episode features in-depth interviews with renowned authors and leading experts in the field, delving into the latest respiratory research and treatments. Thorax, an esteemed international journal from the BMJ Group and the British Thoracic Society (BTS), is dedicated to publishing research and reviews in respiratory medicine to improve clinical practice. Stay ahead in your field by tuning into our expert discussions ...
…
continue reading
The Out of the Blue podcast takes you out of the pages of the American Journal of Respiratory and Critical Care Medicine and into the minds of the most brilliant researchers in the fields of respiratory, critical care, and sleep medicine.
…
continue reading
European Society of Intensive Medicine Talks
…
continue reading
The A+ Audio Course is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this podcast breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most—helping you understand, retain, and apply essential IT concepts, from hardware and networking to operating systems, security, troubleshooting, and professional ...
…
continue reading
Welcome to the Cardinal Compliance Consultants podcast, your premier resource for environmental health, safety training, and industrial hygiene insights. Based in Toledo, Ohio, we're the leading consultancy firm helping businesses across the United States, Mexico, and Canada navigate the complex world of occupational and environmental regulatory compliance. Our podcast delivers in-depth discussions on Environmental Health and Safety (EHS) best practices, OSHA regulations, Industrial Hygiene ...
…
continue reading
Breathe Easy Podcasts: Conversations in Pulmonary and Critical Care Medicine
…
continue reading
Airway World® Podcasts feature quarterly airway research updates and important airway topic discussions presented by Calvin Brown III, MD and guest faculty of The Difficult Airway Course™. Subscribe today to stay on the leading edge of the dynamic and critically important field of airway management. For more airway management educational resources, visit www.theairwaysite.com.
…
continue reading
Brought to you by ATS Scholar and the ATS Section on Medical Education, the Scholarly podcast features conversations on medical education, discussions with authors published in ATS Scholar, and priceless insight from some of the brightest minds in the field.
…
continue reading

1
EMCrit 1:1 Nursing 005 - Medical Cardiac Arrest
50:35
50:35
Play later
Play later
Lists
Like
Liked
50:35
…
continue reading

1
🎧 #186: What are Technology-Enabled Services and How Will They Change the Industry?
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06Episode 186 is a conversation with Brad Bonavida and James Dice from Nexus Labs, as well as Leslie Beu from Clockworks Analytics and Reed Powell from MacDonald-Miller Facility Solutions. In this episode of the Nexus Podcast, the Nexus Labs team breaks down the top stories relevant to energy managers, facility managers, IT/OT managers, and workplace…
…
continue reading

1
EMCrit 408 - Behind the Scenes of an Infuriating Medical Malpractice Trial
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55See the ECG See the Shownotes
…
continue reading

1
Temporary Transvenous Diaphragm Neurostimulation for Weaning from Mechanical Ventilation (RESCUE-3)
35:19
35:19
Play later
Play later
Lists
Like
Liked
35:19Dr. Michael Lanspa chats with Dr. Ewan Goligher about his article, "Temporary Transvenous Diaphragm Neurostimulation for Weaning from Mechanical Ventilation (RESCUE-3)."By American Thoracic Society
…
continue reading

1
Reducing the cost of retrofit through collaboration and opportunism, with Rafe Bertram
1:15:48
1:15:48
Play later
Play later
Lists
Like
Liked
1:15:48Is there a collaboration problem in retrofit within the social housing sector? That was the premise for this conversation with Rafe Bertram, an architect and retrofit expert—appearing in a personal capacity—who was very surprised when I posed the question because he's found collaboration to be a strength in the sector, at least in London. In the en…
…
continue reading

1
Performance Characteristics for Physiological Measures of Progressive Pulmonary Fibrosis and Progress in Progressive Pulmonary Fibrosis
21:24
21:24
Play later
Play later
Lists
Like
Liked
21:24Dr. Mohleen Kang chats with Dr. Justin Oldham, Dr. Chad Newton and Dr. Jesse Roman about their papers, "Performance Characteristics for Physiological Measures of Progressive Pulmonary Fibrosis" and "Progress in Progressive Pulmonary Fibrosis."By American Thoracic Society
…
continue reading

1
Smarter prescription of azithromycin using machine learning, with Prof. Wim Janssens
19:29
19:29
Play later
Play later
Lists
Like
Liked
19:29Prophylactic use of azithromycin is common in the management of COPD patients with frequent acute exacerbations. But its application is conservative due to concerns around adverse events, interactions with other drugs, and bacterial resistance. Given these concerns, it is important to identify patients who are likely to be responders or non-respond…
…
continue reading

1
🎧 #185: NexusCon Ski Package, Session Sneak Peeks, and Lightning Article Review
35:54
35:54
Play later
Play later
Lists
Like
Liked
35:54Episode 185 is a conversation with Brad Bonavida, Rosy Khalife, and Ainsley Muller from Nexus Labs. In this episode of the Nexus Podcast, the Nexus Labs team breaks down the top stories relevant to energy managers, facility managers, IT/OT managers, and workplace managers. Find full show notes and episode transcript on The Nexus Podcast: Episode 18…
…
continue reading

1
Pediatric & Neonatal Anesthesia with Dr. Sheilah Robertson BVMS, PhD, DACVAA, DECVAA, DACAW, DECAWBM (WSEL), CVA, MRCVS
51:32
51:32
Play later
Play later
Lists
Like
Liked
51:32In this episode of the Veterinary Anesthesia Nerds podcast we sit down with renowned veterinary anesthesiologist Dr. Sheilah Robertson to tackle the unique challenges of pediatric anesthesia. When dealing with tiny kittens and puppies, Dr. Robertson shares her expertise on how physiology, drug metabolism, and peri-anesthetic care differ in young pa…
…
continue reading

1
Chapter 46 - Dont be salty, be phosphorescent! - Sodium, magnesium, and phosphorus in the ED
1:20:23
1:20:23
Play later
Play later
Lists
Like
Liked
1:20:23Dr. Jim Gregoire, consultant nephrologist and master educator, joins the show again to talk about electrolytes this time. He breaks down practicalities in caring for patients with sodium, magnesium, and phosphorus disorders - who is at risk, what history and exam findings to look for, what testing to do and how to correct the problems. Join Alex an…
…
continue reading

1
Episode 28: Sustainability: More Than Just a Buzzword
23:07
23:07
Play later
Play later
Lists
Like
Liked
23:07🌱 In the Coop – Sustainability in Poultry 🐔 Sustainability is more than just a buzzword—it’s shaping the way Ontario’s poultry sector grows, innovates, and connects with consumers. In this episode of In the Coop, Tom Lewis and Charlotte Wall welcome Christoph Wand to break down what sustainability really means for poultry production. From defining …
…
continue reading

1
EMCrit 407 - Massive Hemorrhage Protocol 2.0 with Petro
56:39
56:39
Play later
Play later
Lists
Like
Liked
56:39
…
continue reading

1
A New Global Definition of Acute Respiratory Distress Syndrome
33:36
33:36
Play later
Play later
Lists
Like
Liked
33:36Dr. Michael Lanspa chats with Dr. Michael Matthay about his article, "A New Global Definition of Acute Respiratory Distress Syndrome."By American Thoracic Society
…
continue reading

1
Circularity, supply chains, and bringing a bio-based material to market, with Daniel Dinizo and Charmaine Cu-Unjieng (NaturLoop)
1:12:34
1:12:34
Play later
Play later
Lists
Like
Liked
1:12:34This episode is all about case study in circularity and a group of people turning waste into useful materials for the built environment. Daniel Dinizo and Charmaine Cu-Unjieng of NaturLoop are bringing a new bio-based product to market that transforms waste coconut husk into a material that's something between MDF and a particle board. For us, this…
…
continue reading

1
Epidemiology and Prognostic Significance of Cough in Fibrotic Interstitial Lung Disease
21:32
21:32
Play later
Play later
Lists
Like
Liked
21:32Dr. John Fleetham chats with Dr. Chris Ryerson and Dr. Yet Khor about their article, "Epidemiology and Prognostic Significance of Cough in Fibrotic Interstitial Lung Disease."By American Thoracic Society
…
continue reading

1
Surgical Recovery and Environmental Enrichment with Tabitha Kucera, RVT,KPA-CTP, VTS (Behavior)
45:00
45:00
Play later
Play later
Lists
Like
Liked
45:00Do your surgical patients need more than just a comforter and a heat source in recovery? Join Tabitha Kucera, RVT, KPA-CTP, VTS (Behavior) as we talk about al the ways you can create the optimal surgical recovery area for your patients. What sights, sounds, and smells should we be trying to achieve or avoid? Its all discussed today on the Veterinar…
…
continue reading
…
continue reading
Episode 184 is a conversation with James Dice, Rosy Khalife, and Brad Bonavida from Nexus Labs. In this episode of the Nexus Podcast, the Nexus Labs team dives into details and teasers for this years NexusCon. Find full show notes and episode transcript on The Nexus Podcast: Episode 184 webpage. Sign-up (or refer a friend!) to the Nexus Newsletter.…
…
continue reading

1
EMCrit 406 - Awake NasoTracheal Intubation (AFOI)
26:35
26:35
Play later
Play later
Lists
Like
Liked
26:35By Scott D. Weingart, MD FCCM
…
continue reading

1
Episode 138: Scripting and Remote Access — .bat, RDP, SSH, Risks
11:42
11:42
Play later
Play later
Lists
Like
Liked
11:42Automating tasks and supporting systems remotely are part of modern IT workflows. In this episode, we begin with scripting—specifically .bat and PowerShell scripts—and explain how they’re used to automate routine tasks like file transfers, user creation, or system reboots. Then we introduce remote access tools like R D P and S S H, showing how they…
…
continue reading

1
Episode 137: Handling Confidential Materials
11:10
11:10
Play later
Play later
Lists
Like
Liked
11:10Protecting sensitive data requires not only digital safeguards but also physical and procedural awareness. This episode teaches you how to properly handle confidential information, whether it's on printed documents, storage devices, or screens. We cover methods like locked cabinets, badge-restricted rooms, and screen privacy filters to prevent unau…
…
continue reading

1
Episode 136: Communication and Customer Service Skills
10:58
10:58
Play later
Play later
Lists
Like
Liked
10:58Technical skills are vital, but soft skills are what turn technicians into trusted professionals. This episode focuses on communication techniques that improve user experiences and foster trust. We start with active listening—how to give users your full attention and confirm your understanding through paraphrasing and clarification. Then we cover t…
…
continue reading

1
Episode 135: Data Privacy and Licensing — DRM, Chain of Custody
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06This episode explores the legal and ethical responsibilities of handling data and software in IT environments. We start with licensing—understanding the difference between OEM, volume, and subscription licenses, and how misuse can result in compliance violations. Then we discuss Digital Rights Management (DRM), which limits copying or modifying med…
…
continue reading

1
Episode 134: Environmental Controls — Ventilation, Disposal, MSDS
12:14
12:14
Play later
Play later
Lists
Like
Liked
12:14Maintaining the physical environment around IT systems is just as important as managing the systems themselves. This episode begins with ventilation and cooling requirements—how airflow affects server performance, what happens when heat builds up, and how to monitor environmental thresholds. We explain how to position equipment in racks, monitor fo…
…
continue reading

1
Episode 133: Safety Procedures — ESD, Handling, Fire Safety
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10Keeping yourself and your equipment safe is foundational to effective IT work. This episode covers essential safety practices beginning with Electrostatic Discharge (E S D) prevention—why grounding matters and how to properly use wrist straps, mats, and anti-static bags. We explain how improper handling can damage sensitive components like CPUs, RA…
…
continue reading

1
Episode 132: Backup and Recovery Methods — GFS, 3-2-1, Testing
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00This episode focuses on the backup strategies and data recovery techniques that every IT professional must know. We begin with the Grandfather-Father-Son (GFS) backup rotation model, explaining how it balances data redundancy and storage space. Then we dive into the 3-2-1 rule—keeping three copies of your data, on two different media types, with on…
…
continue reading
Change is a constant in IT, but managing that change responsibly is what keeps systems stable. This episode introduces the formal change management process, starting with the identification of proposed changes and their potential impact on systems, users, and business operations. You’ll learn about documentation requirements, stakeholder approvals,…
…
continue reading

1
Episode 130: IT Documentation Types — AUP, SOP, Diagrams
12:39
12:39
Play later
Play later
Lists
Like
Liked
12:39There’s more than one kind of documentation in I T, and this episode explains the major types that appear on the A Plus exam. We start with Acceptable Use Policies (AUPs), which define what users are permitted to do with company devices and networks. These documents are key to setting boundaries and providing grounds for enforcement. Next, we cover…
…
continue reading

1
Episode 129: Asset and Inventory Management
12:14
12:14
Play later
Play later
Lists
Like
Liked
12:14Keeping track of hardware, software, and configuration data is vital for organizations of all sizes, and this episode explores how asset and inventory management supports that effort. We begin with physical asset tracking—using labels, barcodes, and location databases to monitor laptops, desktops, and peripherals. Then we move into software invento…
…
continue reading

1
Episode 128: Documentation and Ticketing Systems
13:14
13:14
Play later
Play later
Lists
Like
Liked
13:14This episode focuses on the importance of clear, consistent documentation in every phase of IT support. We begin by explaining ticketing systems—how they track user requests, service histories, resolutions, and follow-up actions. You’ll learn what makes a good ticket entry, including timestamps, concise descriptions, and links to previous cases. We…
…
continue reading

1
Episode 127: Domain 4.0 Operational Procedures — Overview
13:55
13:55
Play later
Play later
Lists
Like
Liked
13:55The final domain in the Core 2 exam is Operational Procedures, and this episode introduces its wide-ranging content. You’ll learn what this domain includes: documentation standards, safety procedures, communication skills, licensing and privacy concerns, and basic scripting. While these topics may seem non-technical, they are just as important for …
…
continue reading

1
Episode 126: Mobile Malware — Rooted Devices, Data Leaks, Ads
14:05
14:05
Play later
Play later
Lists
Like
Liked
14:05Malware isn’t limited to desktops. In this episode, we explore the types of malicious threats that target mobile devices. We begin with adware, spyware, and malicious apps that gain access to sensitive permissions—like camera, microphone, or SMS—without the user’s knowledge. Then we explain the concept of rooting or jailbreaking, which removes manu…
…
continue reading

1
Episode 125: Mobile App Issues — Crashing, Connectivity, Updates
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54Mobile devices introduce their own unique troubleshooting challenges, particularly when it comes to application behavior. In this episode, we start with app crashes—why they happen, how to review logs or force close misbehaving apps, and what steps to take before uninstalling. Then we examine connectivity issues within apps, such as those that rely…
…
continue reading

1
Episode 124: Malware Removal Steps — Quarantine, Clean, Restore
12:45
12:45
Play later
Play later
Lists
Like
Liked
12:45Successfully removing malware requires following the right sequence, and this episode lays out that process according to CompTIA’s expectations. We begin with identification—recognizing that malware is present—followed by isolating the system from the network to prevent spread. Then we quarantine the malicious files using antimalware software and p…
…
continue reading

1
Episode 123: PC Security Symptoms — Alerts, File Changes, Redirection
13:56
13:56
Play later
Play later
Lists
Like
Liked
13:56Security issues don’t always come with flashing warnings—sometimes they hide behind subtle behavior. This episode helps you identify the symptoms that often indicate malware or unauthorized access. We begin with security alerts—both real and fake—and how to distinguish between legitimate warnings and scareware popups. Then we cover unexplained file…
…
continue reading

1
Episode 122: Repair Techniques — SFC, Reimage, Rollback
14:00
14:00
Play later
Play later
Lists
Like
Liked
14:00When something breaks in Windows, there are several tools you can use to restore functionality, and this episode breaks them down step by step. We begin with the System File Checker (SFC), which scans and repairs corrupted or missing system files using known-good versions. Next, we explain DISM and when to use it alongside or instead of SFC to fix …
…
continue reading

1
Episode 121: Windows Symptoms — BSOD, Boot Issues, Low Memory
13:35
13:35
Play later
Play later
Lists
Like
Liked
13:35This episode covers some of the most common and dramatic symptoms you'll face when troubleshooting Windows systems. We begin with the infamous Blue Screen of Death—also known as BSOD—explaining what causes it, how to interpret error codes, and what logs or tools to use when diagnosing the issue. Then we move into boot problems, such as systems gett…
…
continue reading

1
Episode 120: Domain 3.0 Software Troubleshooting — Overview
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48Troubleshooting software problems is a core responsibility in IT, and this episode introduces Domain 3.0 of the Core 2 exam. You’ll learn what kinds of software issues are covered, including application crashes, boot problems, security alerts, and general OS instability. We explain how this domain connects to others, such as security and user suppo…
…
continue reading

1
Episode 119: Data Disposal and Destruction Techniques
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08Properly disposing of storage media is a critical part of data security, and this episode outlines the methods you need to know. We begin with data wiping—using software to overwrite existing files—and explain why a single delete or format isn’t enough. Then we move on to degaussing, which uses magnetic fields to scramble data on hard drives and ma…
…
continue reading

1
Episode 118: Mobile and Embedded Device Security
15:11
15:11
Play later
Play later
Lists
Like
Liked
15:11Mobile and embedded devices require a tailored approach to security, and this episode explains how to apply protections without compromising usability. We begin with passcodes, biometrics, and auto-lock timers as primary defenses. Next, we explore mobile device management (MDM), including how organizations use it to enforce encryption, remotely wip…
…
continue reading

1
Episode 117: Workstation Security Best Practices
15:11
15:11
Play later
Play later
Lists
Like
Liked
15:11Securing a user’s workstation is about more than antivirus—it involves a full spectrum of proactive configurations. This episode outlines best practices for maintaining a secure endpoint. We begin with patch management, including automatic updates and reboot scheduling, then move to account management, such as disabling unused accounts and enforcin…
…
continue reading

1
Episode 116: User Account Controls and SSO
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20In this episode, we cover two important mechanisms for managing user access and security: User Account Control (UAC) and Single Sign-On (SSO). We begin with UAC—how it prompts users before executing administrative tasks, how to configure its sensitivity level, and what role it plays in limiting malware execution. Understanding UAC’s purpose and beh…
…
continue reading

1
Episode 115: OS Security Settings — Defender, BitLocker, NTFS
15:29
15:29
Play later
Play later
Lists
Like
Liked
15:29Securing a system starts with built-in operating system tools, and this episode walks you through three key Windows security features. First is Windows Defender, which provides real-time protection against malware, network attacks, and unwanted software changes. We explain how to configure scanning, quarantines, and exclusion lists. Next is BitLock…
…
continue reading

1
Episode 114: Threats and Vulnerabilities — Zero-Day, SQLi, XSS
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20This episode explains the technical underpinnings of some of the most dangerous threats and vulnerabilities in modern systems. We start with zero-day exploits, where attackers take advantage of unknown software flaws before patches can be released. These are especially damaging because traditional defenses often can’t detect them. Next, we explore …
…
continue reading

1
Episode 113: Social Engineering — Phishing, Impersonation, Tailgating
13:40
13:40
Play later
Play later
Lists
Like
Liked
13:40Not all threats are technical—some are psychological. This episode focuses on social engineering attacks, which trick users into revealing information or granting access through manipulation rather than code. We start with phishing, covering both traditional email attacks and newer variants like spear phishing and smishing. You’ll learn what signs …
…
continue reading

1
Episode 112: Detection and Prevention — Antivirus, Firewalls, Education
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01Preventing malware infections involves more than just scanning files—it’s about layering multiple defenses. In this episode, we start with antivirus and antimalware software, explaining how they use signature detection, heuristic analysis, and behavioral monitoring to stop threats. We describe how these tools are managed, updated, and configured fo…
…
continue reading

1
Episode 111: Malware Types — Virus, Worms, Keyloggers, Rootkits
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49This episode dives into the various types of malicious software, or malware, that technicians must be able to recognize and address. We begin with viruses, which attach to legitimate files and require user interaction to spread, then move into worms, which self-replicate across networks and can bring down systems without any user action. We explain…
…
continue reading

1
Episode 110. Authentication — RADIUS, TACACS+, Kerberos
12:52
12:52
Play later
Play later
Lists
Like
Liked
12:52Authentication protocols ensure that users are who they say they are, and this episode covers three of the most important ones for the A Plus exam. We begin with RADIUS—Remote Authentication Dial-In User Service—and explain how it centralizes authentication for wireless and VPN access. Next, we look at TACACS Plus, a Cisco-designed protocol that se…
…
continue reading