Inside Towers Managing Editor Jim Fryer shares the Ethernet with some of Telecom's key players in this Tower and Wireless Infrastructure News Podcast. Subscribe to the Inside Towers daily newsletter here: https://insidetowers.com/subscription/
…
continue reading
Wireless Infrastructure Podcasts
Let's Get Digital is your gateway to the innovators and ideas transforming the digital infrastructure industry. From wireless telecom to fiber networks and data centers, this podcast explores all things digital infrastructure—diving into the trends, technologies, and people shaping the future of connectivity. Hosted by Broadstaff CEO Carrie Charles, each episode features candid conversations with top industry leaders, uncovering the intersection of technology, talent, and transformation. Dis ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Welcome to NEDAS Live! Where Wireline and Wireless Meet, the podcast where we address the communications infrastructure ecosystem, brought to you by NEDAS. Since 2010, NEDAS programs bring together industry thought leaders, cutting-edge technologies and end-user solutions shaping a new communications infrastructure landscape and enabling a more connected world. Your host is Ilissa Miller, President of NEDAS.
…
continue reading
The Tech+ PrepCast is a complete audio study companion for the CompTIA Tech+ (FC0-U71) certification exam, designed to guide learners through every domain and objective. Each episode delivers clear explanations, practical examples, and exam-focused insights to help you build confidence and technical readiness. Whether you are new to IT or preparing for your first certification, this PrepCast provides structured support from start to finish.
…
continue reading
I’m Tyler, and I’ve been fascinated by radio since getting my first AM/FM radio as a kid. On Fully Modulated, I dive into the history of radio, television, wireless, exploring the stories behind the medium and taking you behind the scenes to see how it all works. From vintage broadcasts to modern digital signals, we break down the technology and uncover the forgotten moments that shaped how we communicate and entertain. Whether it’s the science of transmission or the creative chaos of produc ...
…
continue reading

1
Howard Stern’s SiriusXM Prank: How He Fooled Fans and the Media
9:37
9:37
Play later
Play later
Lists
Like
Liked
9:37Send me a text message with your thoughts, questions, or feedback Howard Stern just reminded the world why he’s still the master of media. After months off the air, Stern’s return to SiriusXM started with a prank that had Andy Cohen taking over his channel, news outlets reporting he was gone, and fans convinced it was the end. But it was all Stern’…
…
continue reading

1
Midwest Broadcasters Clinic Conference Preview
18:59
18:59
Play later
Play later
Lists
Like
Liked
18:59Send me a text message with your thoughts, questions, or feedback Tyler previews the upcoming Midwest Regional Broadcasters Clinic in Madison, Wisconsin (September 15-17, 2025), highlighting the sessions he's most excited to attend in his professional capacity. Topics Covered: Audio Processing: Finding That Elusive Signature Sound with Mike Erickso…
…
continue reading

1
HD Radio's Hidden Success Story: How America's Failed Digital Radio Revolution Actually Won
13:02
13:02
Play later
Play later
Lists
Like
Liked
13:02Send me a text message with your thoughts, questions, or feedback Got pushback on my last episode calling HD Radio a complete failure? You were right to call me out. While HD Radio's original consumer vision crashed and burned spectacularly, the technology quietly found success in ways nobody predicted. In this follow-up episode, I break down where…
…
continue reading

1
Phil Shih of Structure Research on the Trends and Forecasts Shaping Digital Infrastructure
38:27
38:27
Play later
Play later
Lists
Like
Liked
38:27In this episode, Philbert Shih, Founder and Managing Director of Structure Research, offers a deep dive into the evolving landscape of digital infrastructure through the lens of market intelligence and industry specialization. From launching his boutique firm in 2011 to supporting over $3 billion in M&A transactions, Phil shares insights into the m…
…
continue reading

1
#246 - Husch Blackwell: New Towers and Property Values
22:11
22:11
Play later
Play later
Lists
Like
Liked
22:11Residents often push back on new tower developments in their communities for various reasons – location of the tower, how it looks, health risks and lowering of property values. The last point is often the focus of much discussion and debate at municipal hearings. Is this a valid concern for residents? Rod Carter and Jake Remington, Partners in the…
…
continue reading
In this episode, KJ Burke and Qaiser Habib, head of engineering, Canada at Snowflake, discuss the challenges and strategies for unlocking the power of data within organizations. They explore the evolution of data management, the changing role of IT teams, the importance of data quality, and the shift towards unstructured data. The conversation also…
…
continue reading

1
HD Radio: Why America's $3 Billion Digital Radio Revolution Failed Completely
21:20
21:20
Play later
Play later
Lists
Like
Liked
21:20Send me a text message with your thoughts, questions, or feedback Ever wondered why HD Radio never took off despite being technically superior to regular FM? This might be the most tragic story in broadcasting history - a technology that had everything going for it but still managed to fail spectacularly. In this episode, we explore how HD Radio we…
…
continue reading

1
The Wild History of Pirate Radio: How Offshore Ships and Underground Stations Changed Music Forever
18:32
18:32
Play later
Play later
Lists
Like
Liked
18:32Send me a text message with your thoughts, questions, or feedback Ever wondered how rock and roll conquered British radio? It all started with rebellious DJs broadcasting from ships in the North Sea. In this episode, we dive into the wild world of pirate radio - from Radio Caroline's first broadcast in 1964 to the underground stations that introduc…
…
continue reading

1
Building the Internet’s Fast Lane: Ivo Ivanov on DE-CIX, Global Interconnection, and the Leap into Space”
37:17
37:17
Play later
Play later
Lists
Like
Liked
37:17In this episode, Ivo Ivanov, CEO and Chairman of DE-CIX, shares how his company is building the next generation of Internet infrastructure — from peering evolution to space-based exchanges. Ivo unpacks how DE-CIX has grown from a three-ISP project in Frankfurt into a global interconnection leader spanning over 60 markets. He breaks down the case fo…
…
continue reading

1
Is Radio’s Birthday a Lie? The Bizarre Origins of National Radio Day
24:13
24:13
Play later
Play later
Lists
Like
Liked
24:13Send me a text message with your thoughts, questions, or feedback On this bonus episode of Fully Modulated, Tyler drops the curtain on the weirdest holiday in broadcasting: National Radio Day. Why August 20th? Who actually invented radio? And what happens when the whole country suddenly remembers the tower selfie folder on their phones? Tyler digs …
…
continue reading
Send me a text message with your thoughts, questions, or feedback In this final chapter of our special series, The Story Behind EAS, Tyler Woodward explores how emergency alerting is moving beyond familiar tones and crawls into a new era of rich data and smarter delivery. From the Common Alerting Protocol to NextGen TV, the systems that warn us are…
…
continue reading

1
Episode 58: Wireless Security Settings: SSID, WPA2, and WPA3
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51This episode covers the essential security settings for configuring a small wireless network. We explain how to change the default SSID, set strong passwords, and choose between encryption standards such as WPA2 and WPA3. You will learn the differences between open, pre-shared key, and enterprise-level authentication options. We also provide real-w…
…
continue reading

1
Episode 57: Encryption Use Cases: Data at Rest vs. Data in Transit
15:29
15:29
Play later
Play later
Lists
Like
Liked
15:29This episode explains how encryption protects data in two primary states—when stored (data at rest) and when moving across networks (data in transit). We define plaintext and ciphertext, along with encryption methods for securing files, disks, mobile devices, emails, and web traffic. Understanding these concepts is vital for identifying when and ho…
…
continue reading

1
Episode 56: Password Management: Complexity, Rotation, and Managers
11:29
11:29
Play later
Play later
Lists
Like
Liked
11:29This episode examines best practices for creating and managing secure passwords. We explain why password length, complexity, and uniqueness are essential to reducing the risk of compromise. You will learn how to implement policies for password history, expiration, and avoiding reuse across different accounts. These guidelines help maintain system s…
…
continue reading

1
Episode 55: Safe Browsing: Certificates, Sites, and AI Risks
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10This episode focuses on safe browsing practices to protect user data and system integrity. We explain how to verify website security using valid certificates, recognize potentially malicious sites, and configure browser settings for safer operation. Privacy considerations include managing cookies, limiting personal information shared online, and un…
…
continue reading

1
Episode 54: Software Practices: Licensing, Sources, and Updates
13:42
13:42
Play later
Play later
Lists
Like
Liked
13:42This episode covers the best practices for managing software, from verifying licensing compliance to ensuring secure sourcing and regular updates. We explain the differences between open source, proprietary, subscription, and perpetual licenses, along with the importance of product keys and serial numbers. We also emphasize downloading software fro…
…
continue reading

1
Episode 53: Device Security: Phishing, Malware, and Hardening
12:50
12:50
Play later
Play later
Lists
Like
Liked
12:50This episode addresses key strategies for securing devices against common threats. We cover security awareness measures, such as recognizing phishing attempts, and the importance of anti-malware tools, firewalls, and regular patching. You will learn how to implement physical protections like cable and USB locks, as well as software-based safeguards…
…
continue reading

1
Episode 52: Authentication and Authorization: Models and Logging
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17This episode focuses on the processes of authentication and authorization, explaining how they verify identity and determine permissions. We outline common authentication methods, from single-factor to multifactor, and introduce models such as least privilege and role-based access control. You will also learn how proper logging supports accounting …
…
continue reading

1
Episode 51: Security Concepts: CIA, Privacy, and Frameworks
14:07
14:07
Play later
Play later
Lists
Like
Liked
14:07This episode explores the foundational concepts of information security, beginning with the CIA triad—confidentiality, integrity, and availability. We explain how each principle guides security decisions and policies, from controlling access to ensuring data accuracy and maintaining system uptime. You will also learn about privacy considerations, s…
…
continue reading
This episode introduces the Security domain, which covers essential principles, best practices, and protective technologies for safeguarding systems and information. You will learn how this domain addresses confidentiality, integrity, availability, privacy, authentication, and authorization concepts. Its coverage is broad, touching areas from devic…
…
continue reading

1
Episode 49: Backup Strategies: File, System, and Storage Locations
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29This episode covers the principles of data backup, including file-level backups, full system backups, and restore procedures. We explain different storage locations, from local media like external drives and SD cards to cloud-based storage solutions, and discuss the pros and cons of each approach. We also present examples of backup scheduling, such…
…
continue reading

1
Episode 48: Database Structures: Relational and Non-relational Explained
12:36
12:36
Play later
Play later
Lists
Like
Liked
12:36This episode compares relational and non-relational database structures, explaining when each is most effective. We define relational components such as tables, rows, columns, and keys, as well as non-relational formats like key/value and document databases. Understanding these distinctions is crucial for recognizing how data should be organized in…
…
continue reading

1
Episode 47: Databases in Action: Usage, Speed, and Structure
14:04
14:04
Play later
Play later
Lists
Like
Liked
14:04This episode focuses on the practical uses of databases, including creating, querying, and generating reports. We explain the advantages of databases over flat files, such as scalability, speed, and support for multiple concurrent users. You will also learn about data persistence, availability, and the trade-offs between cloud and local database ho…
…
continue reading

1
Episode 46: Data Value: Analytics, Reporting, and Monetization
11:18
11:18
Play later
Play later
Lists
Like
Liked
11:18This episode explains how organizations treat data as a valuable asset, exploring its role in decision-making, reporting, and revenue generation. We cover the difference between critical and non-critical data, how data is collected, and how it is correlated to identify trends and insights. You will learn how analytics and meaningful reporting influ…
…
continue reading

1
Episode 45: Data and Database Fundamentals: Domain Overview
10:56
10:56
Play later
Play later
Lists
Like
Liked
10:56This episode introduces the Data and Database Fundamentals domain, explaining how it addresses the value of data, database structures, and backup concepts. You will learn why this domain is crucial for understanding how information is stored, managed, and secured, and how it connects to other exam areas like software, networking, and security. We a…
…
continue reading

1
Episode 44: Code Organization: Pseudocode, Flowcharts, and Logic
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04This episode explains organizational techniques used in programming, including pseudocode, flowcharts, and logic structures. We describe how pseudocode provides a language-agnostic plan for development, how flowcharts visually map program flow, and how logical structures like branching and looping control execution. These tools help programmers des…
…
continue reading

1
Episode 43: Programming Concepts: Variables, Functions, and Objects
11:57
11:57
Play later
Play later
Lists
Like
Liked
11:57This episode covers the core concepts of programming, focusing on variables, functions, and objects. We explain how variables store and manipulate data, how functions encapsulate reusable logic, and how objects combine properties and methods to model real-world entities in code. Understanding these concepts is essential for interpreting how program…
…
continue reading

1
Episode 42: Data Types: Char, String, Integer, Float, Boolean
12:40
12:40
Play later
Play later
Lists
Like
Liked
12:40This episode reviews the fundamental data types used in programming, including characters, strings, integers, floating-point numbers, and Boolean values. We define each type, explain its purpose, and describe how data types influence program behavior. This understanding is critical for writing accurate code and avoiding type-related errors, which c…
…
continue reading

1
Episode 41: Programming Language Types: Interpreted, Compiled, and More
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21This episode explains the different categories of programming languages, including interpreted, compiled, scripting, markup, and query languages. We discuss how interpreted languages execute code line-by-line, compiled languages translate entire programs into machine code before execution, and how scripting and markup languages serve specific autom…
…
continue reading

1
Episode 40: Software Development Concepts: Domain Overview
13:07
13:07
Play later
Play later
Lists
Like
Liked
13:07This episode provides an overview of the Software Development Concepts domain, outlining the skills and knowledge areas it covers. You will learn about programming language categories, fundamental data types, programming concepts, and organizational techniques. The domain’s focus is on helping you understand the building blocks of software and how …
…
continue reading

1
Episode 39: AI in Tech+: Chatbots, Generative Tools, and Smart Systems
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49This episode introduces artificial intelligence concepts relevant to the Tech+ exam, including AI chatbots, assistants, and generative AI tools. We explain how AI can produce code, create content, and offer predictive suggestions, as well as its role in enhancing productivity and user interaction. Understanding these applications is important for r…
…
continue reading

1
Episode 38: Browser Configurations: Extensions, Privacy, and Sync
12:33
12:33
Play later
Play later
Lists
Like
Liked
12:33This episode focuses on configuring web browsers for security, efficiency, and personalization. We cover the use of extensions and add-ons, private browsing modes, cache management, and pop-up blocking. You will learn how to enable, disable, and remove extensions, as well as how to set default search engines and manage bookmarks for streamlined nav…
…
continue reading

1
Episode 37: Software Use Cases: Productivity, Collaboration, and Support
11:47
11:47
Play later
Play later
Lists
Like
Liked
11:47This episode reviews the main categories of software you will encounter in the exam, including productivity tools, collaboration platforms, and support utilities. We explain how word processors, spreadsheets, presentation software, and diagramming tools enable professional tasks, while collaboration tools like email clients, conferencing software, …
…
continue reading

1
Episode 36: OS Roles: Application, Task, and Device Management
11:58
11:58
Play later
Play later
Lists
Like
Liked
11:58This episode explains the primary roles of an operating system, focusing on how it manages applications, tasks, and connected devices. We detail how the OS provides an interface between hardware and software, coordinates resource allocation, and ensures processes run efficiently. You will learn how features like disk management, process scheduling,…
…
continue reading

1
Episode 35: OS Components: Filesystems, Drivers, and Interfaces
12:58
12:58
Play later
Play later
Lists
Like
Liked
12:58This episode explores the core components of an operating system, including filesystems, device drivers, and user interfaces. We explain how these components work together to manage hardware resources, provide application support, and deliver a functional user experience. Understanding filesystem features like compression, encryption, and file attr…
…
continue reading

1
Episode 34: Applications and Software: Domain Overview
12:25
12:25
Play later
Play later
Lists
Like
Liked
12:25This episode provides an overview of the Applications and Software domain, explaining how it addresses operating systems, productivity tools, browser configuration, and AI concepts. You will learn how this domain evaluates your ability to understand, configure, and manage software environments effectively. The domain’s scope includes both end-user …
…
continue reading

1
Episode 33: Wireless Capabilities: Standards, Speeds, and Interference
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48This episode covers the essential aspects of wireless networking, focusing on standards such as 802.11n, 802.11ac, and 802.11ax. We discuss the speed capabilities, frequency bands, and range considerations for each, as well as how interference and attenuation can affect performance. Knowing these factors will help you answer exam questions on wirel…
…
continue reading

1
Episode 32: Network Types and Models: LAN, WAN, Client-Server, P2P
15:37
15:37
Play later
Play later
Lists
Like
Liked
15:37This episode introduces the most common network types and architectures, including Local Area Networks, Wide Area Networks, client-server models, and peer-to-peer setups. We explain the characteristics, advantages, and limitations of each, along with their typical use cases. Understanding these distinctions will enable you to identify which configu…
…
continue reading

1
Episode 31: Network Services: Web, File Transfer, Email, and Devices
12:39
12:39
Play later
Play later
Lists
Like
Liked
12:39This episode examines the essential network services you will encounter in both the exam and real-world IT environments. We cover secure web browsing, file transfer protocols, and email services, explaining how each operates and its role in modern communication and data sharing. You will learn the distinctions between services like HTTP and HTTPS, …
…
continue reading

1
Episode 30: Networking Basics: Addressing, Ports, and Communication
12:32
12:32
Play later
Play later
Lists
Like
Liked
12:32This episode covers the fundamental concepts of network communication, including IP addressing, MAC addresses, and port numbers. We explain how these identifiers allow devices to locate and communicate with each other across networks. The discussion also includes the basics of protocols, network models, and common network services such as secure we…
…
continue reading

1
Episode 29: Internet Services: Fiber, DSL, Satellite, and Cellular
6:46
6:46
Play later
Play later
Lists
Like
Liked
6:46This episode reviews the primary types of internet services, explaining their technologies, capabilities, and limitations. We cover wired options like fiber optic and DSL, along with wireless services such as satellite and cellular. You will learn how factors like speed, latency, availability, and cost influence the choice of service, making this k…
…
continue reading

1
Episode 28: Deployment Models: On-Prem, Cloud, and Hybrid Compared
10:58
10:58
Play later
Play later
Lists
Like
Liked
10:58This episode explains the main deployment models for IT infrastructure—on-premises, cloud, and hybrid—and the scenarios in which each is most effective. We describe how on-premises models offer direct control, cloud models provide scalability and lower upfront costs, and hybrid models combine elements of both for flexibility. Understanding these di…
…
continue reading

1
Episode 27: Cloud Delivery Models: SaaS, PaaS, and IaaS
12:37
12:37
Play later
Play later
Lists
Like
Liked
12:37This episode examines the three primary cloud service models—Software as a Service, Platform as a Service, and Infrastructure as a Service—outlining their purposes, advantages, and limitations. We break down how each model delivers resources to users, from fully managed software applications to complete virtualized infrastructure. You will learn to…
…
continue reading

1
Episode 26: Virtualization and Cloud: Core Concepts and Hypervisors
13:21
13:21
Play later
Play later
Lists
Like
Liked
13:21This episode introduces virtualization and cloud computing concepts, explaining how they enable more efficient use of computing resources. We define key terms such as hypervisor, guest operating system, and virtual machine, as well as the distinctions between Type 1 and Type 2 hypervisors. You will learn how virtualization reduces hardware costs, i…
…
continue reading

1
Episode 25: Display Connectors: VGA, HDMI, DisplayPort, and USB-C
18:21
18:21
Play later
Play later
Lists
Like
Liked
18:21This episode explains the features, capabilities, and differences between common display connectors, including VGA, HDMI, DisplayPort, and USB-C. You will learn how each interface handles video, audio, resolution support, and compatibility across different devices. This understanding is essential for making informed choices in both setup and troubl…
…
continue reading

1
Episode 24: Input/Output Interfaces: USB, Thunderbolt, RF, and Bluetooth
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25This episode covers the common input/output interfaces you will encounter, including USB variants, Thunderbolt, radio frequency connections, and Bluetooth. We discuss the specifications, capabilities, and typical uses of each, helping you identify the best interface for a given device or application. Recognizing these interfaces is important for bo…
…
continue reading

1
Episode 23: Plug-and-Play vs. Driver Installs: Installation Types Explained
13:53
13:53
Play later
Play later
Lists
Like
Liked
13:53This episode explains the differences between plug-and-play installations, where the operating system automatically configures the device, and manual driver installations, which require user intervention. We review the benefits and limitations of each method, along with situations where one is preferred over the other. This knowledge is key for rec…
…
continue reading

1
Episode 22: Peripheral Devices: Common Installations and Setup Methods
15:14
15:14
Play later
Play later
Lists
Like
Liked
15:14This episode covers the installation and configuration of common peripheral devices such as printers, scanners, webcams, external drives, and display units. We explain how different installation types—such as plug-and-play versus manual driver setup—affect ease of use and compatibility. You will learn how to follow best practices for connecting, co…
…
continue reading

1
Episode 21: Local vs. Network Storage: Flash, NAS, and Cloud Options
14:57
14:57
Play later
Play later
Lists
Like
Liked
14:57This episode explains the differences between local storage options such as USB flash drives, SD cards, and internal drives, versus network-based storage solutions like NAS devices and cloud services. We review the advantages and limitations of each, including speed, capacity, accessibility, and security considerations. Understanding these differen…
…
continue reading

1
Episode 20: Storage Technologies: HDD, SSD, NVMe, and Optical Compared
16:19
16:19
Play later
Play later
Lists
Like
Liked
16:19This episode compares the major types of storage technologies you need to understand for the exam. We explain the characteristics, advantages, and disadvantages of HDDs, SSDs, NVMe drives, and optical media. You will learn how these storage options differ in speed, capacity, durability, and cost, enabling you to make informed recommendations in bot…
…
continue reading