Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

Popular in Technology

  • 00:02

    Bloomberg's Market Minute with Polycom’s Global Director of Education

    in Technology

    In a recent interview with Bloomberg's Market Minute, Polycom’s Global Director of Education, Elaine Shuck discusses critical issues in education from k-12 and beyond. With the need to reach students anywhere, at any time and on any device, many schools are finding new ways to connect students around the world to new and old content alike.

  • 00:31

    GSMC Technology Podcast Episode 112 Byte, 3D Printer and Just Cause 4

    in Technology

    Jay talks a bit about Byte, a new App, gives some information on a new kind of 3D printer and talks about Just Cause 4
    As always, if you enjoyed the show, follow us and subscribe to the show: you can find us on iTunes or on any app that carries podcasts as well as on YouTube. Please remember to subscribe and give us a nice review. That way you’ll always be among the first to get the latest GSMC Technology Podcasts.
    We would like to thank our Sponsor: GSMC Podcast Network
    Advertise with US: http://www.gsmcpodcast.com/advertise-with-us.html
    Website: http://www.gsmcpodcast.com/technology-podcast.html
    ITunes Feed :  https://itunes.apple.com/us/podcast/gsmc-technology-podcast/id1116874311  
    GSMC YouTube Channel: https://www.youtube.com/watch?v=J8_VuIBr88g&list=PLF8Qial15ufp2_kPKnyk7xbKH_3pYJkSs"list=PLF8Qial15ufp2_kPKnyk7xbKH_3pYJkSs         
    Twitter: https://twitter.com/GSMC_Tech
    Facebook: https://www.facebook.com/GSMCTechnology/
    Disclaimer: The views expressed on the GSMC Technology Podcast are for entertainment purposes only. Reproduction, copying, or redistribution of The GSMC Technology Podcast without the express written consent of Golden State Media Concepts LLC is prohibited.

  • 01:01

    Making the open access/wholesale model work for community broadband

    in Internet

    ATTENTION: There is heavy static in show's first 3-4 minutes, but it clears up after that.
    The pride of the pack when it comes to community broadband business models is the open-access model in which the local government or public utility owns the physical network and private-sector ISPs deliver services to subscribers. It looks like a relatively easy model to pursue, and dozens of communities say this is their preferred option. In reality, making open access work is a monster challenge requiring intense, constant effort. 
    Mt. Vernon, WA has built a small cadre of ISPs for its open-access fiber network. Information Services Director Kim Kleppe details how they overcame obstacles and seized opportunities to build a successful network that is financially sustainable. Listeners will learn:
    why getting the second ISP is the hardest job in the world; how to set pricing structure tips for creating win-win situations marketing tactics that attract ISPs and subscribers how to keep everyone on the same page Kleppe and his colleagues have 12 years experience building and refining their open access model. Communities just getting their networks off the ground can really benefit from the lessons of those who've been in the trenches a while.

  • 01:01

    Scott Schober, Cyber Security Expert, Talks Voting Machines, T-Mobile Data Breac

    in Technology

    Both Segments: Scott Schober. President/CEO, Author of Hacked Again, Cybersecurity expert
    Scott N. Schober is the President and CEO of Berkeley Varitronics Systems (BVS), a forty-year-old New Jersey-based privately held company and leading provider of advanced, world-class wireless test and security solutions. Schober also invented BVS’s cell phone detection tools, used to enforce a “no cell phone policy” in prisons and secure government facilities. Scott is a highly sought-after subject expert on the topic of cybersecurity.
    https://youtu.be/K4cCiDpt8FQ
    Today's Topics Include:
    Voting machine maker claims vote machine hack-fests a 'green light' for foreign hackers https://www.theregister.co.uk/2018/08/28/voting_machine_hacking/
    Wireless Infusion Pumps Could Increase Cybersecurity Vulnerability https://healthitsecurity.com/news/wireless-infusion-pumps-could-increase-cybersecurity-vulnerability
    OTHER updates:
    The other week I had the privilege of conducting a cybercrime video interview of a Cyber Shark- Robert Herjavec.  Robert is the CEO of Herjavec Group which is a top cyber security company and ranked #1 on the Cybersecurity 500 List for 2018.    The 30 minute interview will appear exclusively on www.cybersecurityventures.com in another week or so. 

  • 00:10

    Innovation Talks: Voices of IBM Security

    in Technology

    Today, IBM made a series of announcements, including the planned acquisition of Resilient Systems, Inc., that will aim to provide organizations with a proactive, comprehensive approach to respond to cyber breaches more quickly and effectively across consulting, services and products. With Resilient Systems, a leader in incident response, IBM will be in a position to provide the industry’s first integrated end-to-end Security Operations and Response Platform offering that spans the entire life cycle of an attack, from protection and detection to response.  Hear more in this podcast from the team behind the effort.

  • 02:30

    Intel Chip Chat Live - SDN/NFV World Congress - 2018 - DAY TWO

    in Technology

    It's Chip Chat: Network Insights coming to you from Layer 123 SDN-NFV World Congress 2018. Host Allyson Klein interviews luminaries from the Network world, always keeping you up to date on the latest happenings and announcements.
     
    Intel® Chip Chat: Network Insights is a recurring podcast series that delves into the technologies, topics and issues facing the networking industry. These informal, one-on-one interviews with industry experts examine the network transformation taking place through the adoption of software defined networking and network functions virtualization across telecommunication & enterprise organizations.
     

  • Most Popular Tags in Technology

  • 00:34

    The Coolest Hacks of 2016

    in Technology

    In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading editors discuss some of the most unusual and creative ways that researchers have uncovered in 2016, and what these new vulnerabilities might mean for the coming year.

  • 00:07

    PODCAST: The Future of Data Analytics and Defense

    in Technology

    Welcome to the third episode of the Defense Data Podcast Series. Today, Gary Hix, Director of Engineering, Hitachi Vantara Federal, will provide his perspective on the future of defense data analytics, and how Hitachi Vantara Federal will continue to be on the forefront of this rapidly changing arena.

  • 01:02

    How To Go From Being The "Hunted Into The Hunter" (TM) In Today's Cyber World!!!

    in Technology

    In today’s Cyber security world, the landscape is changing on a daily basis.  It seems like that hardly you have addressed one issue, there are literally 10 more which come up right after that.  How is your staff supposed to keep up with all of this?  This is no doubt a truly difficult task, and one which can be very time consuming as well.
    What a business or a corporation really needs is a suite of tools that will let them get a much greater visibility and understanding of the threat vectors that are potentially surrounding them, and become imminent.  In others, you want your staff to be proactive and have their guards up on a 24 X 7 X 365 basis.  Obviously, no human being can do this, so the reliance upon a threat hunting service becomes very critical.
    Your team cannot wait for days or even months for your threat hunting tools to learn from the past and try to model the future Cyber threat landscape. They need to be able to do this within the same day after it has been deployed, so that they can quickly beef up your lines of defense.
    In this podcast, we have the honor of interviewing Rick Bolin, of Mantix4.  They offer a unique product/service offering which allows for your organization to be able to build your threat intelligence capabilities in 24 hours.
    Dial in and learn and learn how you go from being the “hunted into the hunter” ™!!!*
    *NOTE:  This is a trademark of Mantix4.

  • 00:16

    Episode 9 continued _Why Big Companies are Investing in Blockchain Tech

    in Technology

    Keeping the converstaion going.... I review some questions we might want to ask ourselves and others.... Why is Visa investing in Crypto... Who did IBM team up with?

  • 00:45

    Jürgen Schmidhuber: Neural Networks

    in Computers

    Jürgen Schmidhuber and Jeremy Fain discuss neural networks. 

About Technology

We love technology. Without the Internets, how could we offer 35,000 new shows a month to listen to, playback and download? Technology is so pervasive, we treat our devices like trusty companions, carrying them around with us, and going through withdrawal when they're recharging or misplaced. We discipline our children by taking away electronic privileges. We check tech blogs and forums for PC and Mac rumors. And just when we've geeked out on the latest-and-greatest gadgets, our eyes widen at the glimpse of what will quickly usurp them. Can't make it to SXSW, CTIA, CES and other trade shows? Our hosts take you there. Unsure which operating systems, software or apps are worth your time and money? Get expert advice from bestselling authors, CTOs and leading technologists on product news, e-learning, cloud computing, cameras, home entertainment, camcorders, iPhones, Androids, BlackBerrys, PlayStation, Wii, tablets, iPods and everything keeping our lives in sync.

Join Host Live Chats

From the BTR Blog

Nothing new to share

Get Social with BTR