Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Wireless Infrastructure Podcasts

show episodes
 
Inside Towers Managing Editor Jim Fryer shares the Ethernet with some of Telecom's key players in this Tower and Wireless Infrastructure News Podcast. Subscribe to the Inside Towers daily newsletter here: https://insidetowers.com/subscription/
  continue reading
 
Let's Get Digital is your gateway to the innovators and ideas transforming the digital infrastructure industry. From wireless telecom to fiber networks and data centers, this podcast explores all things digital infrastructure—diving into the trends, technologies, and people shaping the future of connectivity. Hosted by Broadstaff CEO Carrie Charles, each episode features candid conversations with top industry leaders, uncovering the intersection of technology, talent, and transformation. Dis ...
  continue reading
 
Welcome to NEDAS Live! Where Wireline and Wireless Meet, the podcast where we address the communications infrastructure ecosystem, brought to you by NEDAS. Since 2010, NEDAS programs bring together industry thought leaders, cutting-edge technologies and end-user solutions shaping a new communications infrastructure landscape and enabling a more connected world. Your host is Ilissa Miller, President of NEDAS.
  continue reading
 
The Tech+ PrepCast is a complete audio study companion for the CompTIA Tech+ (FC0-U71) certification exam, designed to guide learners through every domain and objective. Each episode delivers clear explanations, practical examples, and exam-focused insights to help you build confidence and technical readiness. Whether you are new to IT or preparing for your first certification, this PrepCast provides structured support from start to finish.
  continue reading
 
Artwork

1
Fully Modulated

Tyler Woodward

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
I’m Tyler, and I’ve been fascinated by radio since getting my first AM/FM radio as a kid. On Fully Modulated, I dive into the history of radio, television, wireless, exploring the stories behind the medium and taking you behind the scenes to see how it all works. From vintage broadcasts to modern digital signals, we break down the technology and uncover the forgotten moments that shaped how we communicate and entertain. Whether it’s the science of transmission or the creative chaos of produc ...
  continue reading
 
Loading …
show series
 
Send me a text message with your thoughts, questions, or feedback Howard Stern just reminded the world why he’s still the master of media. After months off the air, Stern’s return to SiriusXM started with a prank that had Andy Cohen taking over his channel, news outlets reporting he was gone, and fans convinced it was the end. But it was all Stern’…
  continue reading
 
Send me a text message with your thoughts, questions, or feedback Tyler previews the upcoming Midwest Regional Broadcasters Clinic in Madison, Wisconsin (September 15-17, 2025), highlighting the sessions he's most excited to attend in his professional capacity. Topics Covered: Audio Processing: Finding That Elusive Signature Sound with Mike Erickso…
  continue reading
 
Send me a text message with your thoughts, questions, or feedback Got pushback on my last episode calling HD Radio a complete failure? You were right to call me out. While HD Radio's original consumer vision crashed and burned spectacularly, the technology quietly found success in ways nobody predicted. In this follow-up episode, I break down where…
  continue reading
 
In this episode, Philbert Shih, Founder and Managing Director of Structure Research, offers a deep dive into the evolving landscape of digital infrastructure through the lens of market intelligence and industry specialization. From launching his boutique firm in 2011 to supporting over $3 billion in M&A transactions, Phil shares insights into the m…
  continue reading
 
Residents often push back on new tower developments in their communities for various reasons – location of the tower, how it looks, health risks and lowering of property values. The last point is often the focus of much discussion and debate at municipal hearings. Is this a valid concern for residents? Rod Carter and Jake Remington, Partners in the…
  continue reading
 
In this episode, KJ Burke and Qaiser Habib, head of engineering, Canada at Snowflake, discuss the challenges and strategies for unlocking the power of data within organizations. They explore the evolution of data management, the changing role of IT teams, the importance of data quality, and the shift towards unstructured data. The conversation also…
  continue reading
 
Send me a text message with your thoughts, questions, or feedback Ever wondered why HD Radio never took off despite being technically superior to regular FM? This might be the most tragic story in broadcasting history - a technology that had everything going for it but still managed to fail spectacularly. In this episode, we explore how HD Radio we…
  continue reading
 
Send me a text message with your thoughts, questions, or feedback Ever wondered how rock and roll conquered British radio? It all started with rebellious DJs broadcasting from ships in the North Sea. In this episode, we dive into the wild world of pirate radio - from Radio Caroline's first broadcast in 1964 to the underground stations that introduc…
  continue reading
 
In this episode, Ivo Ivanov, CEO and Chairman of DE-CIX, shares how his company is building the next generation of Internet infrastructure — from peering evolution to space-based exchanges. Ivo unpacks how DE-CIX has grown from a three-ISP project in Frankfurt into a global interconnection leader spanning over 60 markets. He breaks down the case fo…
  continue reading
 
Send me a text message with your thoughts, questions, or feedback On this bonus episode of Fully Modulated, Tyler drops the curtain on the weirdest holiday in broadcasting: National Radio Day. Why August 20th? Who actually invented radio? And what happens when the whole country suddenly remembers the tower selfie folder on their phones? Tyler digs …
  continue reading
 
Send me a text message with your thoughts, questions, or feedback In this final chapter of our special series, The Story Behind EAS, Tyler Woodward explores how emergency alerting is moving beyond familiar tones and crawls into a new era of rich data and smarter delivery. From the Common Alerting Protocol to NextGen TV, the systems that warn us are…
  continue reading
 
This episode covers the essential security settings for configuring a small wireless network. We explain how to change the default SSID, set strong passwords, and choose between encryption standards such as WPA2 and WPA3. You will learn the differences between open, pre-shared key, and enterprise-level authentication options. We also provide real-w…
  continue reading
 
This episode explains how encryption protects data in two primary states—when stored (data at rest) and when moving across networks (data in transit). We define plaintext and ciphertext, along with encryption methods for securing files, disks, mobile devices, emails, and web traffic. Understanding these concepts is vital for identifying when and ho…
  continue reading
 
This episode examines best practices for creating and managing secure passwords. We explain why password length, complexity, and uniqueness are essential to reducing the risk of compromise. You will learn how to implement policies for password history, expiration, and avoiding reuse across different accounts. These guidelines help maintain system s…
  continue reading
 
This episode focuses on safe browsing practices to protect user data and system integrity. We explain how to verify website security using valid certificates, recognize potentially malicious sites, and configure browser settings for safer operation. Privacy considerations include managing cookies, limiting personal information shared online, and un…
  continue reading
 
This episode covers the best practices for managing software, from verifying licensing compliance to ensuring secure sourcing and regular updates. We explain the differences between open source, proprietary, subscription, and perpetual licenses, along with the importance of product keys and serial numbers. We also emphasize downloading software fro…
  continue reading
 
This episode addresses key strategies for securing devices against common threats. We cover security awareness measures, such as recognizing phishing attempts, and the importance of anti-malware tools, firewalls, and regular patching. You will learn how to implement physical protections like cable and USB locks, as well as software-based safeguards…
  continue reading
 
This episode focuses on the processes of authentication and authorization, explaining how they verify identity and determine permissions. We outline common authentication methods, from single-factor to multifactor, and introduce models such as least privilege and role-based access control. You will also learn how proper logging supports accounting …
  continue reading
 
This episode explores the foundational concepts of information security, beginning with the CIA triad—confidentiality, integrity, and availability. We explain how each principle guides security decisions and policies, from controlling access to ensuring data accuracy and maintaining system uptime. You will also learn about privacy considerations, s…
  continue reading
 
This episode introduces the Security domain, which covers essential principles, best practices, and protective technologies for safeguarding systems and information. You will learn how this domain addresses confidentiality, integrity, availability, privacy, authentication, and authorization concepts. Its coverage is broad, touching areas from devic…
  continue reading
 
This episode covers the principles of data backup, including file-level backups, full system backups, and restore procedures. We explain different storage locations, from local media like external drives and SD cards to cloud-based storage solutions, and discuss the pros and cons of each approach. We also present examples of backup scheduling, such…
  continue reading
 
This episode compares relational and non-relational database structures, explaining when each is most effective. We define relational components such as tables, rows, columns, and keys, as well as non-relational formats like key/value and document databases. Understanding these distinctions is crucial for recognizing how data should be organized in…
  continue reading
 
This episode focuses on the practical uses of databases, including creating, querying, and generating reports. We explain the advantages of databases over flat files, such as scalability, speed, and support for multiple concurrent users. You will also learn about data persistence, availability, and the trade-offs between cloud and local database ho…
  continue reading
 
This episode explains how organizations treat data as a valuable asset, exploring its role in decision-making, reporting, and revenue generation. We cover the difference between critical and non-critical data, how data is collected, and how it is correlated to identify trends and insights. You will learn how analytics and meaningful reporting influ…
  continue reading
 
This episode introduces the Data and Database Fundamentals domain, explaining how it addresses the value of data, database structures, and backup concepts. You will learn why this domain is crucial for understanding how information is stored, managed, and secured, and how it connects to other exam areas like software, networking, and security. We a…
  continue reading
 
This episode explains organizational techniques used in programming, including pseudocode, flowcharts, and logic structures. We describe how pseudocode provides a language-agnostic plan for development, how flowcharts visually map program flow, and how logical structures like branching and looping control execution. These tools help programmers des…
  continue reading
 
This episode covers the core concepts of programming, focusing on variables, functions, and objects. We explain how variables store and manipulate data, how functions encapsulate reusable logic, and how objects combine properties and methods to model real-world entities in code. Understanding these concepts is essential for interpreting how program…
  continue reading
 
This episode reviews the fundamental data types used in programming, including characters, strings, integers, floating-point numbers, and Boolean values. We define each type, explain its purpose, and describe how data types influence program behavior. This understanding is critical for writing accurate code and avoiding type-related errors, which c…
  continue reading
 
This episode explains the different categories of programming languages, including interpreted, compiled, scripting, markup, and query languages. We discuss how interpreted languages execute code line-by-line, compiled languages translate entire programs into machine code before execution, and how scripting and markup languages serve specific autom…
  continue reading
 
This episode provides an overview of the Software Development Concepts domain, outlining the skills and knowledge areas it covers. You will learn about programming language categories, fundamental data types, programming concepts, and organizational techniques. The domain’s focus is on helping you understand the building blocks of software and how …
  continue reading
 
This episode introduces artificial intelligence concepts relevant to the Tech+ exam, including AI chatbots, assistants, and generative AI tools. We explain how AI can produce code, create content, and offer predictive suggestions, as well as its role in enhancing productivity and user interaction. Understanding these applications is important for r…
  continue reading
 
This episode focuses on configuring web browsers for security, efficiency, and personalization. We cover the use of extensions and add-ons, private browsing modes, cache management, and pop-up blocking. You will learn how to enable, disable, and remove extensions, as well as how to set default search engines and manage bookmarks for streamlined nav…
  continue reading
 
This episode reviews the main categories of software you will encounter in the exam, including productivity tools, collaboration platforms, and support utilities. We explain how word processors, spreadsheets, presentation software, and diagramming tools enable professional tasks, while collaboration tools like email clients, conferencing software, …
  continue reading
 
This episode explains the primary roles of an operating system, focusing on how it manages applications, tasks, and connected devices. We detail how the OS provides an interface between hardware and software, coordinates resource allocation, and ensures processes run efficiently. You will learn how features like disk management, process scheduling,…
  continue reading
 
This episode explores the core components of an operating system, including filesystems, device drivers, and user interfaces. We explain how these components work together to manage hardware resources, provide application support, and deliver a functional user experience. Understanding filesystem features like compression, encryption, and file attr…
  continue reading
 
This episode provides an overview of the Applications and Software domain, explaining how it addresses operating systems, productivity tools, browser configuration, and AI concepts. You will learn how this domain evaluates your ability to understand, configure, and manage software environments effectively. The domain’s scope includes both end-user …
  continue reading
 
This episode covers the essential aspects of wireless networking, focusing on standards such as 802.11n, 802.11ac, and 802.11ax. We discuss the speed capabilities, frequency bands, and range considerations for each, as well as how interference and attenuation can affect performance. Knowing these factors will help you answer exam questions on wirel…
  continue reading
 
This episode introduces the most common network types and architectures, including Local Area Networks, Wide Area Networks, client-server models, and peer-to-peer setups. We explain the characteristics, advantages, and limitations of each, along with their typical use cases. Understanding these distinctions will enable you to identify which configu…
  continue reading
 
This episode examines the essential network services you will encounter in both the exam and real-world IT environments. We cover secure web browsing, file transfer protocols, and email services, explaining how each operates and its role in modern communication and data sharing. You will learn the distinctions between services like HTTP and HTTPS, …
  continue reading
 
This episode covers the fundamental concepts of network communication, including IP addressing, MAC addresses, and port numbers. We explain how these identifiers allow devices to locate and communicate with each other across networks. The discussion also includes the basics of protocols, network models, and common network services such as secure we…
  continue reading
 
This episode reviews the primary types of internet services, explaining their technologies, capabilities, and limitations. We cover wired options like fiber optic and DSL, along with wireless services such as satellite and cellular. You will learn how factors like speed, latency, availability, and cost influence the choice of service, making this k…
  continue reading
 
This episode explains the main deployment models for IT infrastructure—on-premises, cloud, and hybrid—and the scenarios in which each is most effective. We describe how on-premises models offer direct control, cloud models provide scalability and lower upfront costs, and hybrid models combine elements of both for flexibility. Understanding these di…
  continue reading
 
This episode examines the three primary cloud service models—Software as a Service, Platform as a Service, and Infrastructure as a Service—outlining their purposes, advantages, and limitations. We break down how each model delivers resources to users, from fully managed software applications to complete virtualized infrastructure. You will learn to…
  continue reading
 
This episode introduces virtualization and cloud computing concepts, explaining how they enable more efficient use of computing resources. We define key terms such as hypervisor, guest operating system, and virtual machine, as well as the distinctions between Type 1 and Type 2 hypervisors. You will learn how virtualization reduces hardware costs, i…
  continue reading
 
This episode explains the features, capabilities, and differences between common display connectors, including VGA, HDMI, DisplayPort, and USB-C. You will learn how each interface handles video, audio, resolution support, and compatibility across different devices. This understanding is essential for making informed choices in both setup and troubl…
  continue reading
 
This episode covers the common input/output interfaces you will encounter, including USB variants, Thunderbolt, radio frequency connections, and Bluetooth. We discuss the specifications, capabilities, and typical uses of each, helping you identify the best interface for a given device or application. Recognizing these interfaces is important for bo…
  continue reading
 
This episode explains the differences between plug-and-play installations, where the operating system automatically configures the device, and manual driver installations, which require user intervention. We review the benefits and limitations of each method, along with situations where one is preferred over the other. This knowledge is key for rec…
  continue reading
 
This episode covers the installation and configuration of common peripheral devices such as printers, scanners, webcams, external drives, and display units. We explain how different installation types—such as plug-and-play versus manual driver setup—affect ease of use and compatibility. You will learn how to follow best practices for connecting, co…
  continue reading
 
This episode explains the differences between local storage options such as USB flash drives, SD cards, and internal drives, versus network-based storage solutions like NAS devices and cloud services. We review the advantages and limitations of each, including speed, capacity, accessibility, and security considerations. Understanding these differen…
  continue reading
 
This episode compares the major types of storage technologies you need to understand for the exam. We explain the characteristics, advantages, and disadvantages of HDDs, SSDs, NVMe drives, and optical media. You will learn how these storage options differ in speed, capacity, durability, and cost, enabling you to make informed recommendations in bot…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play