• 01:31

    Whatever Happened To IBM?

    in Current Events

    IBM has been the bellwether par excellence for the modern American corporation.  Under the founding Watson dynasty, which ruled the roost between 1914 and 1971, it reached the pinnacle of industrial success and then blazed a path into the emerging computer industry.  Along the way it pioneered concepts and principles that became symbols of enlightened corporate stewardship.  More recently, confronting globalization and the increased pace of technological change, it has moved away from their vision. 


    This afternoon we will examine the IBM legacy with Peter E. Greulich, a veteran IBM executive, who is the author of  A View From Beneath The Dancing Elephant.  A profile of his book can be found at:


    http://www.beneaththedancingelephant.com/a-view-from-beneath-the-dancing-elephant.html


    Mr. Greulich is president of MBI Concepts Corporation and a contributor to the financial website Seeking Alpha.


    Join us for a lively discussion of the remarkable heritage of IBM and its prospects for the future!


     


     

  • 00:41

    Do The Thoughts Of Security Breaches Keep You Up At Night?

    in Technology

     


    Just in the last year alone, the world witnessed many unprecented, security breaches.  Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot.  Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'.  No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.


    One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie.  In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.


     

  • 00:23

    Mobile Security Is A Love-Hate Relationship

    in Technology

    Caleb Barlow, dives further into the recent findings made by IBM Security --  60% of dating apps are easily hackable. Discover the "love connection" between IBM Security solutions and a more secure mobile world.  Additional perspectives provided by Diana Kelley and Michael Montecillo.  Read the full report at http://securityintelligence.com/datingapps/ 

  • 01:38

    Discover a New Way to Work at IBM InterConnect

    in Technology

    IBM is a world-class technology company, and we'll be sitting down with some of their movers and shakers at IBM InterConnect to find out how new developments and ways of thinking will affect how we work in the future.


    Join us as we talk with: 



    Saurabh Calla, IBM product developer, on how Verse will create a new way to work
    Brian Fanzo and Bryan Kramer, digital strategists, on how different generations envision the future of work
    Amber Armstrong, IBM Director of Social Business Market Evangelism, on what role social plays in business
    Alisa Maclin, IBM VP of Marketing for IBM Mobile Enterpriseon how mobile will impact new ways of working

  • 00:27
  • 00:41

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 6 Ways To Avoid Security Cameras Burnout

    in Blogs

    Another reasons why more and more consumers are buying wireless home surveillance cameras is that they could be hidden so well that no-one will know you might have them. These systems let the user to see what will go on, throughout the cameras, utilizing their laptop of smartphone screens because main monitor. Shopping around would really assist you to customize your house safety camera and system you need. With regard to high-security rooms within your establishment or office, experts recommend that use of these particular spots be tied to few individuals. security cameras bismarck nd The gadget freaks also find this revolutionary product with a FM radio equipped having a pause feature that is certainly basically employed to pause a live program for nearly approximately 15 mins.

  • 00:58

    Episode 345 Event Security

    in News

    Broadcasting live from Studio B in our home offices.


    Exciting talk radio-learning about working in the event, concert and concert security world!


    Green Mountain Event Security is our guest today.


    This episode will explore the challenges of securiing "soft targets" in today's world while offering
    customer service.
    And we will talk about growing  a diversified security firm.



    We'll look at the breaking news, upcoming events and some exciting news from Armour College!

  • 00:43

    V.O.T.M.: ISLAM IS A RELIGION OF PEACE AND SECURITY

    in Islam

    JOIN US AS A.J.A.M. EXPLAINS THAT TERRORISM IS A FARCE AND COOKED UP AGENDA BY THE ZIONIST PROPAGANDIST TO DETER PEOPLE FROM THE TRUE RELIGION. ISLAM IS A SERIOUS RELIGION WHICH BRINGS ABOUT PEACE AND SECURITY TO ALL MANKIND FROM ITS CREATOR AND LORD.

  • 00:17

    Social Security Disability Series I Section IV

    in Podcasting

    Social Security Disability Income support does not come without a price for poor and middle class people.  Anytime money is involved, this can bring out issues with haters whether individuals, corporations, or in government agencies.  How are disabled people viewed who receive SSDI?  How do SSDI receipients deal with perceptions?  Join me, ESTRA and talking about disabled experiences. 

  • 00:39

    Cyber Security in the Private Service Community

    in Business

    In this edition of DEMA Live, President and CEO of Red Five Security, Kris Coleman, will join us for a discussion regarding cyber security.  We live in a society that is more socially connected than ever via smart phones, tablets, and computers. How much risk are we putting the principals that we work for and ourselves at?  Mr. Coleman will shed light onto some of the areas of concern that his company sees on a daily basis and he will explain how to limit your exposure against cyber attacks.  Join us for this live radio show and have your cyber security questions ready for Red Five Security.

Join Host Live Chats