CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
We provide email recovery, cloud backup, and data migration tools worldwide. User can also test the free demo version before purchasing the solution.
…
continue reading
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
…
continue reading
We will be doing podcasts about data storage, backup & disaster recovery, and cloud storage solutions
…
continue reading
Welcome to the eFolder Channel Chat. These short, unscripted conversations are real stories from real channel partners moderated by Ted Hulsy, VP Marketing eFolder. eFolder is a leading supplier of cloud data protection, business continuity, cloud file sync solutions, and cloud to cloud backup for MSPs, cloud service providers, system integrators, and VARs. Delivered as wholesale services to the channel, eFolder enables its partners to provide branded data protection and file sync services a ...
…
continue reading
A new beginning in IT
…
continue reading
The Sudo Show covers topics ranging from Open Source in business to deep dives into complex technoloyg. The Sudo Show is a proud member of the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
Venyu Solutions Podcast (Video)
…
continue reading
Audio versions of new articles as they’re posted on http://askleo.com
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Our Define Tomorrow podcast focuses on the latest technical insights covering the modern workspace, hybrid cloud and security.
…
continue reading
On The Workflow Show, CHESA's Jason Whetstone and Ben Kilburg offer media workflow therapy and address overarching trends and specific tech topics to help guide you through these challenging yet exciting times of unprecedented change within the realm of digital workflows. CHESA is a full-service provider of technology systems and solutions that specializes in optimizing media workflows from creation to distribution and preservation. CHESA’s expert architects design pioneering asset managemen ...
…
continue reading
Beyond Downtime: The Verito Advantage is the podcast for tax and accounting professionals who refuse to let IT issues interrupt their business. Hosted by the experts behind Verito.com, each episode explores the real risks behind "good enough" technology and how to build a firm that just works. Securely. Join us as we dive into real-world stories, compliance must-knows (like the FTC Safeguards Rule, IRS Pub 4557, WISP), and emerging tech shaping the future of financial practices. From ransomw ...
…
continue reading
Trilio Insights delves into the dynamic world of data protection and cloud-native technologies. In addition to Trilio experts, we will bring together practitioners, innovators, and visionaries to explore the evolving landscape of data protection, backup, and recovery. From unraveling the complexities of multi-cloud environments to navigating the challenges of data governance, each episode of Trilio Insights serves to share expertise and experience for Product Engineering, It Ops, Dev Ops, Ar ...
…
continue reading
IT Support Services relied by world industry leaders. Our IT support specialist and technical support engineer can deliver IT solutions to businesses. Our Products - Managed services - Backup and disaster recovery, - Cloud computing - Sofware/system selection, - IT consulting - IT security - IT support - IT upgrades and migrations - Maintenance and monitoring - Network installation and upgrades - Server and desktop virtualisation - Server and network documentation - CargoWise EDI data entry ...
…
continue reading
Blueprint Synergy Solutions proudly offers premium Managed IT Services in Denver, CO, designed to help businesses thrive in an increasingly digital world. Whether you're a small business or an enterprise-level organization, our IT solutions are built to scale with your needs while maintaining peak performance, security, and compliance. We provide 24/7 proactive monitoring, real-time threat detection, and seamless system updates to ensure your infrastructure is always secure and operational. ...
…
continue reading
Speaking in Tech: "Where Enterprise Tech meets Consumer Tech...". Speaking in Tech is hosted by Peter Smallbone, Josh Atwell and Melissa Gurney Greene. Topics include popular tech, data storage, cloud computing, networking, storage virtualization, server virtualization, backup, disaster recovery and anything else interesting in the tech world. Disclosure: Speaking in tech does not receive support directly or indirectly from vendors or guests. Vendor relationships are disclosed on the podcast.
…
continue reading
The Business of Fatherhood is hosted by author, speaker, and Dad coach Ben Killoy. A five-day-a-week daily dad podcast inspiring and helping busy dads get excited about pulling into the driveway of their home. I help dads grow through generational trauma, redefine the parameters for living, and create a lasting legacy of change. Schedule your free call > https://www.benkilloy.com/breakthecycle
…
continue reading
Tech topics, stories, and guests, for the everyday techy.
…
continue reading
…
continue reading
Welcome to Hostinghome.in We are the number one web hosting company in India. We are providing cheapest hosting services like shared hosting, VPS hosting, dedicated server, cloud hosting with GSuite. Dedicated hosting starts from only Rs 2699/- per month Providing Free Managed Support, Free Firewall Protection with Free D Dos Protection, Free Backup, Free instant WhatsApp Support, Chat Support, Email Support and Ticket Support.
…
continue reading
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
…
continue reading
This video podcast offers sample trailers of recorded presentations from recent Gartner Events. At Gartner Events, information technology experts provide raw insight, strategy, advice and research in a conference environment. Visit "gartner.com/events" to find an event that's right for you and your role. Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. We deliver the technology-related insight necessary for our clients to make the right de ...
…
continue reading
Listen with Alan Armstrong and Sam Foot as we talk about all things Microsoft Azure! We are both technical consultants working with Azure day in, day out. Alan focuses on Identity and Security automation while Sam is a .NET developer deploying PaaS and SaaS solutions on Azure. Each episode we have a topic we cover and we highlight some key news that we are interested in. No fluff, sales or products here, just two technical people having a light hearted chat.
…
continue reading
Author commentary for the Star Wars anthology book, From A Certain Point of View: The Empire Strikes Back. Listen to the contributors discuss the inspiration and creative process behind their short stories with members of the Star Wars Books editorial team! The perfect companion to your From a Certain Point of View experience. Note: Spoilers ahead! We encourage listeners to read the book before diving into this audio companion.
…
continue reading
A gumbo of insights and information about Cybersecurity and Data Protection
…
continue reading
Employing an outside company to handle all payroll-related duties is known as outsourcing payroll services in a business. The main reasons for using payroll management services are to cut costs and free up time when handling payroll-related financial operations. Employing a third party to handle payroll operations frees up a company from having to recruit and educate a sizable in-house payroll team, buy suitable payroll software, and keep up with complicated tax regulations. All business typ ...
…
continue reading

1
How to Protect Your Cloud Storage and Backups from Ransomware
5:23
5:23
Play later
Play later
Lists
Like
Liked
5:23Do you worry that ransomware might lock up more than your files? It can. I'll show you how to better protect your cloud storage and backups using tools like Macrium Reflect, OneDrive, and Dropbox. Even if malware strikes, you’ve got a way to recover.
…
continue reading
I'll help you decide if having a spare computer makes sense, what your backup options are, and how to prepare without spending more than you need to. Peace of mind might be easier than you think.
…
continue reading

1
Is It OK to Reuse Passwords on “Unimportant” Sites?
7:33
7:33
Play later
Play later
Lists
Like
Liked
7:33Reusing passwords on sites you don’t care about might feel harmless, but it still can open the door to bigger problems. I’ll look at why even “unimportant” accounts matter more than you think, the risks of cutting corners, and simple ways to stay safe.
…
continue reading
Are you tapping the power of Microsoft Graph? Richard chats with Tony Redmond about his work teaching people to leverage Microsoft Graph and all the insights it can provide about their organization. Tony views Graph as one of the key skills a sysadmin needs to manage an M365 tenant, alongside Exchange Online, SharePoint, and Teams. Throw in some En…
…
continue reading

1
Is Copyright Still an Issue If Something’s Not Available Anywhere?
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50Just because something’s old or unavailable doesn’t mean you can make copies of it. I'll explain why copyright still matters, how technology complicates things, and what you need to know before making that backup or download. It’s simpler and more important than you might think, even if you don't like the answer.…
…
continue reading

1
Social Engineering Attacks: Lessons from Mr. Robot Episode 3
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39Social engineering attacks are becoming more sophisticated, and this episode of The Backup Wrap-up explores real-world tactics through our Mr. Robot series analysis. Curtis and Prasanna examine how social engineering works, from Instagram stalking to phone compromise, and discuss actual ransomware groups like Scattered Spider who use social enginee…
…
continue reading

1
Two-Factor Might Be Hackable. USE IT ANYWAY!
5:14
5:14
Play later
Play later
Lists
Like
Liked
5:14Another scare about two-factor authentication being hackable? DO NOT let that stop you from using it.
…
continue reading
Where do you store an .exe file so it works best? I'll break down your options and show you the smart, safe ways to store and use portable programs on your PC.
…
continue reading

1
S6E19 - Microsoft updates July - new products and features released
37:55
37:55
Play later
Play later
Lists
Like
Liked
37:55This week, Alan and Sam talk about new features and services that have gone into Public Preview or General Available status in the last month. We dive into a couple of these updates that peaked our interest. Some of the Microsoft product features and update we covered: Key Microsoft Entra, Intune and Defender features and updates Lots of Azure chan…
…
continue reading

1
What’s the Difference Between Google Docs and Microsoft Office 365?
15:42
15:42
Play later
Play later
Lists
Like
Liked
15:42Choosing between Google Docs and Microsoft 365? They look similar, but there are differences in cost, features, and how they work. I’ll help you decide which fits your needs best.
…
continue reading

1
Faking Reality: How AI Images Are Being Used to Scam You
6:05
6:05
Play later
Play later
Lists
Like
Liked
6:05Scammers take advantage of AI's ability to create fake photos that look very real. From phony images of your car to completely made-up situations, it’s easier than ever to be fooled. Learn how they're made, why they’re dangerous, and what you need to do to protect yourself.
…
continue reading

1
Copilot Adoption in Financial Services with Christina Wheeler
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34What can the financial services sector teach us about adopting Copilot in our organizations? Richard chats with Christina Wheeler about her work at Microsoft, where she helps companies leverage large language model technologies. Christina discusses data security, which is crucial in the financial services industry due to its numerous regulations. T…
…
continue reading

1
Sustainability in Technology: A New Era
1:00:21
1:00:21
Play later
Play later
Lists
Like
Liked
1:00:21In this episode, host KJ Burke speaks with Frances Edmonds, head of sustainable impact at HP Canada, about the intersection of sustainability and technology. They discuss the importance of a circular economy, the role of procurement in sustainability, and the challenges organizations face in implementing sustainable practices. Frances shares insigh…
…
continue reading

1
Do I Need a New Email Address if Mine Is Involved in a Breach?
3:57
3:57
Play later
Play later
Lists
Like
Liked
3:57Was your email exposed in a data breach? Don’t rush to get a new address. I'll discuss what really matters, like strong passwords, staying alert, and simple steps to keep your account secure.
…
continue reading

1
Reconnaissance in Cyber Security: Lessons from Mr. Robot ep 1.1
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23Reconnaissance in cyber security isn't just about scanning networks; it's about understanding your entire attack surface, including the human element. In this episode, Curtis and Prasanna analyze Mr. Robot season one, episode two, (AKA ep 1.1) to explore how sophisticated threat actors conduct reconnaissance before major attacks. Learn how F Societ…
…
continue reading
Think you're too old? You're not. It's not your age; it's a plethora of other things, ranging from society's expectations to bad software design, waging war on your self-confidence. Let me show you why you’re more capable than you think.
…
continue reading

1
From ClickOps to DevOps with Steven Bucher
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35How do you get from ClickOps to DevOps? While at Build, Richard chatted with Steven Bucher about using Copilot in Azure to help build PowerShell scripts with Azure CLI to get you moving down the path of repeatable deployment. Steven talks about interacting with Copilot in Azure through the Portal, Azure CLI, and PowerShell. Using tools like GitHub …
…
continue reading
On this edition of Explain IT, we’re celebrating HPE’s ten-year anniversary, and reflecting on the standout moments from HPE Discover. We explore how HPE’s evolution, from its separation from HP Inc. to bold acquisitions and innovation milestones, is shaping the future of enterprise IT. From cloud modernisation and infrastructure disruption, to a s…
…
continue reading

1
Social Engineering Lessons from Mr. Robot Episode 1
44:15
44:15
Play later
Play later
Lists
Like
Liked
44:15Learn how social engineering attacks really work by analyzing the cybersecurity lessons from Mr. Robot's pilot episode. Curtis Preston and Prasanna Malaiyandi break down real-world social engineering tactics used by cybercriminals to manipulate victims into revealing sensitive information. This episode covers social engineering phone scams targetin…
…
continue reading
How do you bring AI agents to your organization? Richard chats with April Dunnam about her experiences with Copilot Studio, Microsoft's tool for building various agents for your organization. April discusses the multiple approaches available today for utilizing generative AI and the benefits of leveraging template-driven and low-code solutions to c…
…
continue reading

1
Insider Threat Prevention: Protecting Your Backups from Within
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05The insider threat represents one of the most dangerous and overlooked cybersecurity challenges facing organizations today. In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna explore the three distinct types of insider threats that can devastate your organization from within. From malicious employees seeking revenge to careless w…
…
continue reading

1
S6E18 - Securing Access to Your Virtual Machines with Azure Bastion
55:49
55:49
Play later
Play later
Lists
Like
Liked
55:49In this episode, we explore Azure Bastion, Microsoft’s fully managed Platform-as-a-Service (PaaS) solution designed to provide secure Remote Desktop Protocol (RDP) and Secure Shell Protocol (SSH) access to Azure virtual machines (VMs). This Q&A-style episode dives deep into how Azure Bastion strengthens cloud security by eliminating the need for pu…
…
continue reading
What's happening with Fabric in 2025? While at Build, Richard chatted with Arun Ulag about the fantastic progress Fabric has made in the past year. Arun discusses expanding the product line beyond analytics to include real-time intelligence and hosting primary data workloads. The goal is to make it incredibly easy to get your organization's "data e…
…
continue reading