show episodes
 
The New Warehouse podcast hosted by Kevin Lawton is your source for insights and ideas from the distribution, transportation and logistics industry. New episodes every Monday and Wednesday morning bring you the latest from industry experts and thought leaders.
  continue reading
 
Artwork

1
Handling Archive Materials

University of Glasgow

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The University of Glasgow Special Collections and Archive Services contains an array of Special Collections of interests to researchers, students and the general public. Here, short instructional videos introduce the Special Collections, and provide specialist instruction on how to handle different types of archive material.
  continue reading
 
Artwork
 
Ari Melber delivers the biggest political and news stories of the day, with interviews and original reporting from around the nation. An Emmy-winning journalist, attorney and former Senate staffer, Melber cuts through the spin and the noise to tell you what's really happening. Real news, every night.
  continue reading
 
Artwork

1
Red Menace

Red Menace

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Red Menace is a podcast that explains and analyzes revolutionary theory and then applies its lessons to our contemporary conditions. Hosted by Alyson Escalante and Breht O'Shea.
  continue reading
 
Artwork

1
Make More Love

Ellen Dorian

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Are you a male business leader who wants a hot and healthy marriage but feels consumed by the relentless demands of growing your company? Welcome! Make More Love is the podcast for high-performing male business leaders who want to achieve the business of their dreams—without losing the love of their life. Join host Ellen Dorian, veteran relationship expert and business coach, as she reveals practical strategies to maintain connection and intimate intensity in committed relationships. The sho ...
  continue reading
 
Introduction to principles of software engineering for mobile devices and best practices, including code reviews, source control, and unit tests. Topics include Ajax, encapsulation, event handling, HTTP, memory management, MVC, object-oriented design, and user experience. Languages include HTML5, JavaScript, Objective-C, and PHP. Projects include mobile web apps and native iOS apps. This is OpenCourseWare, licensed by David J. Malan of Harvard University under a Creative Commons Attribution- ...
  continue reading
 
Artwork
 
Mazzella Companies is a material handling company based out of Cleveland, Ohio that provides ideal lifting solutions, offering all styles of slings, overhead cranes, hoists and engineered lifting devices. We also provide training, in-field inspection and repair services that support our products. Some of the major market segments we serve are Steel, Construction, Oil & Gas, Energy, Vehicle and Durable Goods, Ship Building / Repair and Mining. We also are a manufacturer and distributor of coa ...
  continue reading
 
Artwork

1
The Marketing Nomad Show

Prithvi Madhukar / The Marketing Nomad

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Podcaster Prithvi Madhukar is the author of Zero to Four Figures & Self-Loved, a marketer, business owner, entrepreneur, podcaster, youtuber, influencer with a zest for life, and a passion to help people in the best way she knows how! The topics she covers on my podcast are usually related to personal transformation, mindset, marketing and business strategy. Follow The Marketing Nomad Show Podcast for 3 weekly episodes on personal transformation, mindset, marketing and business related topic ...
  continue reading
 
Artwork

1
FitBody Lifestyle

Jami & Greg DeBernard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to FitBody Lifestyle the podcast hosted by Jami and Greg DeBernard! Join us as we explore the multifaceted world of fitness, health, business, relationships, and the art of leading a well-rounded life. Whether you're pumping iron at the gym, grinding in your entrepreneurial endeavors, or simply striving for balance in your daily routine, you've landed in the right spot. In each episode, we'll embark on enlightening discussions, provide you with actionable tips, and share inspiring st ...
  continue reading
 
Artwork

1
The Pitch

Josh Muccio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Where startup founders raise millions and listeners can invest. Host Josh Muccio takes listeners behind closed-doors and into the room where deals are made. Part of the Vox Media Podcast Network.
  continue reading
 
Artwork

1
Make Trades Great Again

Eric Aune, Andy Mickelson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Whether you're a seasoned professional, a newcomer, or simply interested in the trades, the "Make Trades Great Again" podcast offers something for everyone. Our goal is to promote the value of skilled trades, provide essential resources, and build a strong community of passionate individuals. Industry Insights - Educational Content - Community Stories - Technology in Trades Tune in now and be part of the movement to make trades great again!
  continue reading
 
Artwork

1
Air Power Airwaves

Air Power Manufacturing Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Air waves Podcast is all about the manufacturing industry. This show is filled with helpful tips, news about new technology and stories of real experiences from the Air Power team.
  continue reading
 
Podcast Description: The Investor Relations Podcast Joshua Wilson is a registered investment banking representative and a licensed real estate broker. The content of this podcast is for informational purposes only and should not be considered legal, financial, or compliance advice. This podcast is not a substitute for professional advice. All views and opinions expressed by the host and guests are their own and do not necessarily reflect the policies or positions of any regulatory agency, or ...
  continue reading
 
If you could present yourself really well, in an authentic way which connected powerfully with your audience on stage, on Zoom, at a networking event or around the board table, you would be creating your Speak Performance. "Speaking—Or an Approximation Thereof—with Ges Ray" is an invitation to think about and experiment with your presentation skills, your Speak Performance, in a fun, challenging and occasionally bonkers way. The last thing we want when watching or listening to a presenter is ...
  continue reading
 
Artwork

1
Food Safety Matters

Food Safety Magazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Food Safety Matters is a podcast for food safety professionals hosted by the Food Safety Magazine editorial team – the leading media brand in food safety for over 20 years. Each episode will feature a conversation with a food safety professional sharing their experiences and insights into the important job of safeguarding the world’s food supply.
  continue reading
 
Artwork
 
The A+ PrepCast is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this podcast breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most—helping you understand, retain, and apply essential IT concepts, from hardware and networking to operating systems, security, troubleshooting, and professional proc ...
  continue reading
 
Selecting the Right Load Movement System defines how to determine the best way to move heavy components in industrial settings. Heavy items such as space shuttles through assembly and test, or modular structures through a factory or heat exchangers through a power plant - components that weigh tens or hundreds of tons. The podcast walks through seven key questions to narrow down the best method between cranes, conveyors, air cushion vehicles, forklifts and other industrial trucks, wheeled tr ...
  continue reading
 
A groundbreaking platform that is reshaping the narrative on construction. Our podcast is dedicated to championing best practices, offering expert analysis, conducting insightful interviews, and providing valuable product recommendations based on real-life industry experience in the Home Building and Remodeling Industries. At The Home Building and Remodeling Show, we are on a mission to drive positive change within the home building and remodeling industry, which in turn affects everyone wor ...
  continue reading
 
Logistically Speaking, we will explore the logistics supply train in the USA and beyond. We look for new technologies with examples of improving productivity, including AI, robots, etc. We will have boots-on-the-ground conversations with leaders in our industry to offer insights to overcome today's challenges.
  continue reading
 
Welcome to Place to be, THE podcast for B2B commerce. Uncover the behind the scenes of B2B commerce and B2B platforms with Marc Teulières and his guests who, each in their own way, are revolutionizing their industries! In each episode of this podcast, Marc, General Manager B2B at Mirakl, welcomes a guest who contributes in revolutionizing the digitization of the B2B industry. Through their vision and their unique journey, they will explore the multiple facets of this constantly evolving doma ...
  continue reading
 
Loading …
show series
 
Protecting sensitive data requires not only digital safeguards but also physical and procedural awareness. This episode teaches you how to properly handle confidential information, whether it's on printed documents, storage devices, or screens. We cover methods like locked cabinets, badge-restricted rooms, and screen privacy filters to prevent unau…
  continue reading
 
August 22, 2025; 6pm: The Justice Department has released transcripts and audio of an interview with Ghislaine Maxwell, the imprisoned former associate of Jeffrey Epstein. Maxwell says she never saw President Trump engage in inappropriate behavior and denies the existence of a "client list." MSNBC's Antonia Hylton reports, and is joined by renowned…
  continue reading
 
Our guest on this week's episode is Chris Steiner, senior vice president of product management at Dematic. In the past, automation was often viewed as nice to have. But in these days of customer expectations for speed and shortages of available workers, automation is now a "must have." We often think of automation just being placed into shiny new f…
  continue reading
 
August 21, 2025; 6pm: Democrats are punching back against what they call a Trump-fueled "power grab" to undermine American Democracy, as many experts warn that Trump, who has already tried to over-throw an election, is trying to game the system. Plus, MSNBC's Ari Melber reports on the Trump DOJ's deadline to start sharing the Epstein files with Con…
  continue reading
 
Ellen Dorian addresses a listener's question about whether to end a long-term relationship, offering insights on recognizing emotional attachment, repairing relationships, and considering the hidden costs of divorce. Part 1: Analyzing Emotional Disengagement - Emotional clues indicating persistent attachment to a relationship - The significance of …
  continue reading
 
Send us a text In this episode, Shawn Hektor-Lewis shares key insights on how to navigate the stage with authenticity and confidence. She highlights the common mistakes speakers make when trying too hard to stand out, and how nerves often bring out old, unhelpful habits. Shawn emphasizes the importance of expecting imperfection, being honest with y…
  continue reading
 
Kevin chats with Dan Klinger, President and Founder of UpRight Warehouse Solutions, in this special episode of The New Warehouse Podcast’s Safety Series. The conversation centers on rack safety in warehouses—one of the most critical yet often overlooked elements of warehouse operations. UpRight Warehouse Solutions is best known for its patented UpR…
  continue reading
 
August 20, 2025; 6pm: Texas Democrats are condemning what they call President Trump’s “power grab” to give Republicans more seats in Congress. Meanwhile, California Democrats are vowing to wipe out GOP gains in Texas with their own new congressional map. MSNBC’s Ari Melber reports on the growing backlash to what critics call Trump’s assault on Demo…
  continue reading
 
In this episode of The New Warehouse Podcast, Kevin chats with Bart Gadeyne, founder and CEO of Optioryx, about how his company helps warehouses digitize and optimize warehouse operations. Drawing on over a decade of experience in logistics optimization, Bart shares how Optioryx began with solving “too much air in shipments” and grew into a suite o…
  continue reading
 
August 19, 2025; 6pm: The Epstein crisis continues to engulf President Trump and his administration. MSNBC’s Ari Melber delivers a special report tracing the path of crimes, investigations, corruption, insider deals and the suspicious death of Jeffrey Epstein while in Trump administration custody. Drawing on government reports, original sources and…
  continue reading
 
Send us a text Behind every beautiful renovation reveal and perfect new build lies a reality most contractors never talk about—the cash flow nightmares, the endless punch lists, and the crushing weight of running a construction business. Chris Kirby breaks through this wall of silence in this deeply personal episode that speaks directly to the hidd…
  continue reading
 
Vic Fox is a Poultry Account Manager at Elanco. Prior to his time at Elanco, Fox worked as a Breeder Hatchery Manager, Live Production Manager, and Complex Manager, granting him a holistic view into live production, with a special focus on food safety. Vic earned his bachelor's degree in poultry science from North Carolina State University, and he …
  continue reading
 
In this episode of the Make Trades Great Again podcast, hosts Eric Aune and Andy Mickelson discuss how to expand skills as a business owner without compromising customer service. They explore the challenges of tackling new installations, the importance of learning from experience, and how to balance customer expectations with the need for personal …
  continue reading
 
August 18, 2025; 6pm: President Donald Trump met at the White House with Ukrainian President Volodymyr Zelenskyy to discuss possible paths to ending the war in Ukraine. Both leaders said the next step would be a meeting with Russian leader Vladimir Putin. Afterwards, leaders of France, the U.K., and other nations joined for a larger session, emphas…
  continue reading
 
The Supercut of the A Plus PrepCast covers every topic in the CompTIA A+ exam blueprint, offering focused audio instruction on hardware, mobile devices, networking, virtualization, and troubleshooting. Each episode is crafted for clarity and retention, making even complex topics like RAID, Wi-Fi standards, and printer diagnostics approachable and p…
  continue reading
 
The Supercut of the A Plus PrepCast covers every topic in the CompTIA A+ exam blueprint, offering focused audio instruction on hardware, mobile devices, networking, virtualization, and troubleshooting. Each episode is crafted for clarity and retention, making even complex topics like RAID, Wi-Fi standards, and printer diagnostics approachable and p…
  continue reading
 
Send us a text In this insightful and energetic episode, Shawn Hektor-Lewis discusses her evolution from street-level sales to personal growth and leadership. With humor and honesty—sarcasm meter fully engaged—she unpacks how life is all about influence, and how door-to-door sales taught her discipline, grit, and the law of averages. From embracing…
  continue reading
 
In this episode of The New Warehouse Podcast, Kevin chats with Kashif Raza, founder and CEO of 3Linx Unified Commerce. Kashif shares the company’s evolution from a basement operation to a technology-driven fulfillment network and how it now serves as a bridge between e-commerce brands and 3PL providers. Built out of frustration with slow, expensive…
  continue reading
 
Automating tasks and supporting systems remotely are part of modern IT workflows. In this episode, we begin with scripting—specifically .bat and PowerShell scripts—and explain how they’re used to automate routine tasks like file transfers, user creation, or system reboots. Then we introduce remote access tools like R D P and S S H, showing how they…
  continue reading
 
Technical skills are vital, but soft skills are what turn technicians into trusted professionals. This episode focuses on communication techniques that improve user experiences and foster trust. We start with active listening—how to give users your full attention and confirm your understanding through paraphrasing and clarification. Then we cover t…
  continue reading
 
This episode explores the legal and ethical responsibilities of handling data and software in IT environments. We start with licensing—understanding the difference between OEM, volume, and subscription licenses, and how misuse can result in compliance violations. Then we discuss Digital Rights Management (DRM), which limits copying or modifying med…
  continue reading
 
Maintaining the physical environment around IT systems is just as important as managing the systems themselves. This episode begins with ventilation and cooling requirements—how airflow affects server performance, what happens when heat builds up, and how to monitor environmental thresholds. We explain how to position equipment in racks, monitor fo…
  continue reading
 
Keeping yourself and your equipment safe is foundational to effective IT work. This episode covers essential safety practices beginning with Electrostatic Discharge (E S D) prevention—why grounding matters and how to properly use wrist straps, mats, and anti-static bags. We explain how improper handling can damage sensitive components like CPUs, RA…
  continue reading
 
This episode focuses on the backup strategies and data recovery techniques that every IT professional must know. We begin with the Grandfather-Father-Son (GFS) backup rotation model, explaining how it balances data redundancy and storage space. Then we dive into the 3-2-1 rule—keeping three copies of your data, on two different media types, with on…
  continue reading
 
Change is a constant in IT, but managing that change responsibly is what keeps systems stable. This episode introduces the formal change management process, starting with the identification of proposed changes and their potential impact on systems, users, and business operations. You’ll learn about documentation requirements, stakeholder approvals,…
  continue reading
 
There’s more than one kind of documentation in I T, and this episode explains the major types that appear on the A Plus exam. We start with Acceptable Use Policies (AUPs), which define what users are permitted to do with company devices and networks. These documents are key to setting boundaries and providing grounds for enforcement. Next, we cover…
  continue reading
 
Keeping track of hardware, software, and configuration data is vital for organizations of all sizes, and this episode explores how asset and inventory management supports that effort. We begin with physical asset tracking—using labels, barcodes, and location databases to monitor laptops, desktops, and peripherals. Then we move into software invento…
  continue reading
 
This episode focuses on the importance of clear, consistent documentation in every phase of IT support. We begin by explaining ticketing systems—how they track user requests, service histories, resolutions, and follow-up actions. You’ll learn what makes a good ticket entry, including timestamps, concise descriptions, and links to previous cases. We…
  continue reading
 
The final domain in the Core 2 exam is Operational Procedures, and this episode introduces its wide-ranging content. You’ll learn what this domain includes: documentation standards, safety procedures, communication skills, licensing and privacy concerns, and basic scripting. While these topics may seem non-technical, they are just as important for …
  continue reading
 
Malware isn’t limited to desktops. In this episode, we explore the types of malicious threats that target mobile devices. We begin with adware, spyware, and malicious apps that gain access to sensitive permissions—like camera, microphone, or SMS—without the user’s knowledge. Then we explain the concept of rooting or jailbreaking, which removes manu…
  continue reading
 
Mobile devices introduce their own unique troubleshooting challenges, particularly when it comes to application behavior. In this episode, we start with app crashes—why they happen, how to review logs or force close misbehaving apps, and what steps to take before uninstalling. Then we examine connectivity issues within apps, such as those that rely…
  continue reading
 
Successfully removing malware requires following the right sequence, and this episode lays out that process according to CompTIA’s expectations. We begin with identification—recognizing that malware is present—followed by isolating the system from the network to prevent spread. Then we quarantine the malicious files using antimalware software and p…
  continue reading
 
Security issues don’t always come with flashing warnings—sometimes they hide behind subtle behavior. This episode helps you identify the symptoms that often indicate malware or unauthorized access. We begin with security alerts—both real and fake—and how to distinguish between legitimate warnings and scareware popups. Then we cover unexplained file…
  continue reading
 
When something breaks in Windows, there are several tools you can use to restore functionality, and this episode breaks them down step by step. We begin with the System File Checker (SFC), which scans and repairs corrupted or missing system files using known-good versions. Next, we explain DISM and when to use it alongside or instead of SFC to fix …
  continue reading
 
This episode covers some of the most common and dramatic symptoms you'll face when troubleshooting Windows systems. We begin with the infamous Blue Screen of Death—also known as BSOD—explaining what causes it, how to interpret error codes, and what logs or tools to use when diagnosing the issue. Then we move into boot problems, such as systems gett…
  continue reading
 
Troubleshooting software problems is a core responsibility in IT, and this episode introduces Domain 3.0 of the Core 2 exam. You’ll learn what kinds of software issues are covered, including application crashes, boot problems, security alerts, and general OS instability. We explain how this domain connects to others, such as security and user suppo…
  continue reading
 
Properly disposing of storage media is a critical part of data security, and this episode outlines the methods you need to know. We begin with data wiping—using software to overwrite existing files—and explain why a single delete or format isn’t enough. Then we move on to degaussing, which uses magnetic fields to scramble data on hard drives and ma…
  continue reading
 
Mobile and embedded devices require a tailored approach to security, and this episode explains how to apply protections without compromising usability. We begin with passcodes, biometrics, and auto-lock timers as primary defenses. Next, we explore mobile device management (MDM), including how organizations use it to enforce encryption, remotely wip…
  continue reading
 
Securing a user’s workstation is about more than antivirus—it involves a full spectrum of proactive configurations. This episode outlines best practices for maintaining a secure endpoint. We begin with patch management, including automatic updates and reboot scheduling, then move to account management, such as disabling unused accounts and enforcin…
  continue reading
 
In this episode, we cover two important mechanisms for managing user access and security: User Account Control (UAC) and Single Sign-On (SSO). We begin with UAC—how it prompts users before executing administrative tasks, how to configure its sensitivity level, and what role it plays in limiting malware execution. Understanding UAC’s purpose and beh…
  continue reading
 
Securing a system starts with built-in operating system tools, and this episode walks you through three key Windows security features. First is Windows Defender, which provides real-time protection against malware, network attacks, and unwanted software changes. We explain how to configure scanning, quarantines, and exclusion lists. Next is BitLock…
  continue reading
 
This episode explains the technical underpinnings of some of the most dangerous threats and vulnerabilities in modern systems. We start with zero-day exploits, where attackers take advantage of unknown software flaws before patches can be released. These are especially damaging because traditional defenses often can’t detect them. Next, we explore …
  continue reading
 
Not all threats are technical—some are psychological. This episode focuses on social engineering attacks, which trick users into revealing information or granting access through manipulation rather than code. We start with phishing, covering both traditional email attacks and newer variants like spear phishing and smishing. You’ll learn what signs …
  continue reading
 
Preventing malware infections involves more than just scanning files—it’s about layering multiple defenses. In this episode, we start with antivirus and antimalware software, explaining how they use signature detection, heuristic analysis, and behavioral monitoring to stop threats. We describe how these tools are managed, updated, and configured fo…
  continue reading
 
This episode dives into the various types of malicious software, or malware, that technicians must be able to recognize and address. We begin with viruses, which attach to legitimate files and require user interaction to spread, then move into worms, which self-replicate across networks and can bring down systems without any user action. We explain…
  continue reading
 
Authentication protocols ensure that users are who they say they are, and this episode covers three of the most important ones for the A Plus exam. We begin with RADIUS—Remote Authentication Dial-In User Service—and explain how it centralizes authentication for wireless and VPN access. Next, we look at TACACS Plus, a Cisco-designed protocol that se…
  continue reading
 
Wireless security standards are a frequent source of exam questions, and this episode breaks down the differences between key protocols. We start with WPA2 and WPA3, explaining how each provides encryption and authentication for wireless traffic, and why WPA3 is considered more secure with protections like forward secrecy and better brute-force res…
  continue reading
 
This episode introduces Active Directory (AD), Microsoft’s central system for managing users, computers, and security in domain-based environments. We explain how AD organizes resources into domains, trees, and forests, and how Group Policy Objects (GPOs) are used to enforce settings across multiple systems automatically. You'll learn about domain …
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play