Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Storage Management Software Podcasts

show episodes
 
Welcome to Students of Storage — the podcast that pulls back the curtain on the self-storage industry. This isn’t your typical business banter — it’s raw, real, and packed with insights from the movers and shakers who’ve built empires behind the roll-up doors. Join us as we sit down with CEOs, owners, and top third-party operators to dive deep into the wins, losses, and lessons that come with building lasting success in storage. From solving industry puzzles to revealing the strategies that ...
  continue reading
 
Artwork
 
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
  continue reading
 
Artwork
 
Raising Tech is your guide to understanding the role technology plays in your community, where to invest to transform culture, and how to bring your team and residents along the journey. Tune in to explore the latest tech trends, dive into hot topics, and hear from industry experts, community leaders, and innovative vendors shaping the senior living tech landscape. Each episode is packed with practical insights and real-world stories to help you spark change and level up your community’s tec ...
  continue reading
 
The Project+ Audio Course is a complete audio series built around the CompTIA Project+ PK0-005 exam objectives. Each episode delivers clear explanations, practical examples, and glossary coverage to help you understand project management concepts, tools, life cycle phases, and IT governance. Produced by BareMetalCyber.com, it’s designed to guide you from orientation through exam readiness with professional, exam-focused instruction.
  continue reading
 
The Tech+ Audio Course is a complete audio study companion for the CompTIA Tech+ (FC0-U71) certification exam, designed to guide learners through every domain and objective. Each episode delivers clear explanations, practical examples, and exam-focused insights to help you build confidence and technical readiness. Whether you are new to IT or preparing for your first certification, this PrepCast provides structured support from start to finish.
  continue reading
 
Artwork

1
Living Digital

Schlumberger Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A series of podcasts on life in a digital E&P world. Hear from petrotechnical experts, geos and coders - and a few senior execs - as they transform tasks and tackle everyday challenges in upstream oil & gas. A window into hands-on collaborations that solve the big and the small issues in our industry. Brought to you by the digital and software solutions team at SLB, with a little help from our friends and partners.
  continue reading
 
Do you often wonder what’s the best way to architect, upgrade, or configure your capacity solution? The BMC Performance and Availability Business Unit is providing a series of best practices content for its BMC Capacity Optimization (BCO) and TrueSight Capacity Optimization (TSCO) solutions. Content delivered in each session gives guidance for specific areas of the solution and functionality for the releases by version. Each recording is designed to provide a solid foundation for success and ...
  continue reading
 
Artwork

1
Technology Untangled

Hewlett Packard Enterprise

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Why isn't talking tech as simple, quick, and agile as its innovations promise to be? Technology Untangled is just that - a show that deciphers tech's rapid evolutions with one simple question in mind: what's really going to shape our future (and what's going to end up in the bargain bin with the floppy disc)? Join your host Michael Bird as he untangles innovation through a series of interviews, stories, and analyses with some of the industry's brightest brains. No marketing speak, no unneces ...
  continue reading
 
"Expedient: The Podcast" is your gateway to the inner workings of technology and innovation, presented with unparalleled clarity and expertise. Each episode is an invitation to join the luminaries of Expedient along with special guests from the forefront of the tech industry. We delve into the latest advancements in cloud computing, the evolution of data centers, cybersecurity trends, and groundbreaking developments in AI and machine learning. This podcast strips away the complexity of the t ...
  continue reading
 
Artwork

1
ARC Document Solutions Dubai

ARC Document Solutions Dubai

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Digitalizing business is a new trend and following this trend ARC UAE has come up with a bunch of digital printing and scanning solutions in wide verticals. The company has made its establishment long ago and over the years, the company has created a wide clientele base across the globe serving more than thousands of customers in various parts of the world. The company holds specialization in offering digital printing and scanning solutions that include banner and poster printing, small form ...
  continue reading
 
Artwork
 
Introducing VMware Today, your go-to podcast for all things VMware. Join us as we dive deep into the dynamic world of virtualization, cloud computing, and digital transformation. Each week, we’ll bring you the latest insights, news, and expert interviews, delivering valuable knowledge and real-world experiences straight to your headphones. Whether you're an IT professional, a technology enthusiast, or simply curious about the future of computing, VMware Today is your gateway to understanding ...
  continue reading
 
Loading …
show series
 
In this critical episode of Raising Tech, host Amber Bardon is joined by two of Parasol Alliance’s finest: Sean Sheldrake and Jake Wigfield-Gorka. Together, they dive into what an MSSP (Managed Security Services Provider) is and why it really matters for senior living communities. From phishing attacks to insurance compliance, this episode sheds li…
  continue reading
 
Resident Technology Assistant Michael Lynn breaks down the pros, cons, and practical uses of today’s most popular smart home devices: Amazon Alexa and Google Nest. Whether you’re considering a smart assistant for yourself or helping a loved one get started, this episode is a clear, jargon-free guide to what each platform offers and how to decide wh…
  continue reading
 
How do you know if one of your accounts has been part of a security breach? Richard chats with Troy Hunt about HaveIBeenPwned, a free service that allows individuals to receive notifications when their accounts appear in a security breach. Troy discusses other services available alongside HaveIBeenPwned for sysadmins, including password checking, i…
  continue reading
 
Melissa Stiles, Chief Marketing Officer of Storage Asset Management (SAM), shares her journey from answering a blind ad to leading one of the largest third-party management companies in self-storage. Overseeing marketing, revenue management, business development, and communications, Melissa has helped SAM grow from 32 stores to nearly 600. In this …
  continue reading
 
You're down - is it your servers, or someone else's? While at the Kansas City Developers Conference, Richard sits down with Mandi Walls from Pager Duty about her experiences dealing with incidents involving vendor services. It might be your cloud provider, or some other SaaS element of a pipeline, or even an open-source library dependency in an imp…
  continue reading
 
Host Amber Bardon sits down with Steve Mika, the commercial lead for Data & AI at Fresche Solutions, a Microsoft-focused data and AI consulting firm. Together, they break down the current and future state of AI in senior living, focusing on realistic, strategic implementation that can drive outcomes. Steve dives deep into how senior living operator…
  continue reading
 
Send us a text Presenters: Evgeniy Kharam, Cybersecurity Architect | Evangelist | Consultant | Advisor | Podcaster | Visionary | Speaker | Nim Nadarajah, C.CISO, Cyber Security, Compliance & Transformation Expert | Executive Board Member | Keynote Speaker Julian Lee, Publisher, Community Builder, Speaker, Channel Ecosystem Developer with a focus on…
  continue reading
 
The days of the one-year SSL certificate are coming to an end - are you ready? Richard chats with Todd Gardner about the upcoming requirement from the Certification Authority Browser Forum to limit SSL certs to 200 days starting March 2026 - and they keep getting shorter until by 2029, certificates will last no longer than 47 days! If you haven't a…
  continue reading
 
How do you get your organization trained up to use AI tools? Richard talks to Stephanie Donahue about her work implementing AI tools at Avanade and with Avanade's customers. Stephanie discusses how many workers are bringing their own AI tools, such as ChatGPT, to work and the risks that represent to the organization. Having an approved set of tools…
  continue reading
 
Send us a text Speaker: Omry Farajun, President, Storage Guardian Omry and Julian delved into the significance of incident response planning in cybersecurity. Omry stressed the necessity of a structured incident response plan that includes alternative communication methods during breaches, while underscoring the importance of preparedness and colla…
  continue reading
 
Send us a text Special Guest: Kristen Costagliola, CTO, Syncro Kristen talked about the company’s initiatives to support managed service providers (MSPs), while emphasizing the importance of effective patch management for SOC 2 compliance. She highlighted the challenges posed by the increasing complexity of SaaS solutions and the necessity for MSPs…
  continue reading
 
Matt Reiners sits down with Heather Tussing, President of The Aspenwood Company, to explore how innovation, strategy, and a people-first approach are shaping the future of senior living. With over two decades of experience in the industry, Heather shares lessons learned, evolving technology trends, and how Aspenwood is thoughtfully embracing tech w…
  continue reading
 
Episode 1000! Richard Campbell invites Paul Thurrott to join him to celebrate the milestone episode and answer questions from listeners. From the creation of the podcast to the role of Windows in the modern world, the impact of ARM, Cloud, and many other technologies - all addressed in this super-sized episode. And yes, artificial intelligence is p…
  continue reading
 
In this practical and informative episode, Tech@Home technician James Peck walks listeners through everything they need to know about backing up and managing files on their smartphones and other devices. From cloud storage to flash drives, James outlines simple, user-friendly methods to keep your digital memories safe and your devices running smoot…
  continue reading
 
What are common mistakes folks are making with their Azure tenant(s)? While at the Kansas City Developers Conference, Richard chatted with Scott Sauber to run down his top ten list of issues he checks on for all his customers using Azure. From tenant ownership to naming conventions, policies, identities, and cost controls - there are a lot of thing…
  continue reading
 
As summer winds down, self-storage operators are already looking ahead to the slower season. Tune in to the Self Storage Insight Podcast with Ben Shirey and Matt Markham as they dive into why demand is still strong through late summer and early fall—especially with college move-ins—now is the time to prepare strategies that minimize the impact of t…
  continue reading
 
Send us a text Presenters: Evgeniy Kharam, Cybersecurity Architect | Evangelist | Consultant | Advisor | Podcaster | Visionary | Speaker | Nim Nadarajah, C.CISO, Cyber Security, Compliance & Transformation Expert | Executive Board Member | Keynote Speaker Julian Lee, Publisher, Community Builder, Speaker, Channel Ecosystem Developer with a focus on…
  continue reading
 
In this episode of Raising Tech, host Matt Reiners talks with the legendary Kitboga, a cybersecurity crusader and content creator known for baiting and exposing online scammers. With over 3.74 million YouTube subscribers and more than a billion views across platforms, Kitboga shares how he transforms tech knowledge into entertaining education. From…
  continue reading
 
How do you secure your organization's data to let AI technologies work safely? Richard chats with Martina Grom about her experiences helping sysadmins responsibly bring the power of Microsoft M365 Copilot into their organizations. Martina discusses setting up security and monitoring with tools like Microsoft Purview, enabling visibility into where …
  continue reading
 
This episode covers the essential security settings for configuring a small wireless network. We explain how to change the default SSID, set strong passwords, and choose between encryption standards such as WPA2 and WPA3. You will learn the differences between open, pre-shared key, and enterprise-level authentication options. We also provide real-w…
  continue reading
 
This episode explains how encryption protects data in two primary states—when stored (data at rest) and when moving across networks (data in transit). We define plaintext and ciphertext, along with encryption methods for securing files, disks, mobile devices, emails, and web traffic. Understanding these concepts is vital for identifying when and ho…
  continue reading
 
This episode examines best practices for creating and managing secure passwords. We explain why password length, complexity, and uniqueness are essential to reducing the risk of compromise. You will learn how to implement policies for password history, expiration, and avoiding reuse across different accounts. These guidelines help maintain system s…
  continue reading
 
This episode focuses on safe browsing practices to protect user data and system integrity. We explain how to verify website security using valid certificates, recognize potentially malicious sites, and configure browser settings for safer operation. Privacy considerations include managing cookies, limiting personal information shared online, and un…
  continue reading
 
This episode covers the best practices for managing software, from verifying licensing compliance to ensuring secure sourcing and regular updates. We explain the differences between open source, proprietary, subscription, and perpetual licenses, along with the importance of product keys and serial numbers. We also emphasize downloading software fro…
  continue reading
 
This episode addresses key strategies for securing devices against common threats. We cover security awareness measures, such as recognizing phishing attempts, and the importance of anti-malware tools, firewalls, and regular patching. You will learn how to implement physical protections like cable and USB locks, as well as software-based safeguards…
  continue reading
 
This episode focuses on the processes of authentication and authorization, explaining how they verify identity and determine permissions. We outline common authentication methods, from single-factor to multifactor, and introduce models such as least privilege and role-based access control. You will also learn how proper logging supports accounting …
  continue reading
 
This episode explores the foundational concepts of information security, beginning with the CIA triad—confidentiality, integrity, and availability. We explain how each principle guides security decisions and policies, from controlling access to ensuring data accuracy and maintaining system uptime. You will also learn about privacy considerations, s…
  continue reading
 
This episode introduces the Security domain, which covers essential principles, best practices, and protective technologies for safeguarding systems and information. You will learn how this domain addresses confidentiality, integrity, availability, privacy, authentication, and authorization concepts. Its coverage is broad, touching areas from devic…
  continue reading
 
This episode covers the principles of data backup, including file-level backups, full system backups, and restore procedures. We explain different storage locations, from local media like external drives and SD cards to cloud-based storage solutions, and discuss the pros and cons of each approach. We also present examples of backup scheduling, such…
  continue reading
 
This episode compares relational and non-relational database structures, explaining when each is most effective. We define relational components such as tables, rows, columns, and keys, as well as non-relational formats like key/value and document databases. Understanding these distinctions is crucial for recognizing how data should be organized in…
  continue reading
 
This episode focuses on the practical uses of databases, including creating, querying, and generating reports. We explain the advantages of databases over flat files, such as scalability, speed, and support for multiple concurrent users. You will also learn about data persistence, availability, and the trade-offs between cloud and local database ho…
  continue reading
 
This episode explains how organizations treat data as a valuable asset, exploring its role in decision-making, reporting, and revenue generation. We cover the difference between critical and non-critical data, how data is collected, and how it is correlated to identify trends and insights. You will learn how analytics and meaningful reporting influ…
  continue reading
 
This episode introduces the Data and Database Fundamentals domain, explaining how it addresses the value of data, database structures, and backup concepts. You will learn why this domain is crucial for understanding how information is stored, managed, and secured, and how it connects to other exam areas like software, networking, and security. We a…
  continue reading
 
This episode explains organizational techniques used in programming, including pseudocode, flowcharts, and logic structures. We describe how pseudocode provides a language-agnostic plan for development, how flowcharts visually map program flow, and how logical structures like branching and looping control execution. These tools help programmers des…
  continue reading
 
This episode covers the core concepts of programming, focusing on variables, functions, and objects. We explain how variables store and manipulate data, how functions encapsulate reusable logic, and how objects combine properties and methods to model real-world entities in code. Understanding these concepts is essential for interpreting how program…
  continue reading
 
This episode reviews the fundamental data types used in programming, including characters, strings, integers, floating-point numbers, and Boolean values. We define each type, explain its purpose, and describe how data types influence program behavior. This understanding is critical for writing accurate code and avoiding type-related errors, which c…
  continue reading
 
This episode explains the different categories of programming languages, including interpreted, compiled, scripting, markup, and query languages. We discuss how interpreted languages execute code line-by-line, compiled languages translate entire programs into machine code before execution, and how scripting and markup languages serve specific autom…
  continue reading
 
This episode provides an overview of the Software Development Concepts domain, outlining the skills and knowledge areas it covers. You will learn about programming language categories, fundamental data types, programming concepts, and organizational techniques. The domain’s focus is on helping you understand the building blocks of software and how …
  continue reading
 
This episode introduces artificial intelligence concepts relevant to the Tech+ exam, including AI chatbots, assistants, and generative AI tools. We explain how AI can produce code, create content, and offer predictive suggestions, as well as its role in enhancing productivity and user interaction. Understanding these applications is important for r…
  continue reading
 
This episode focuses on configuring web browsers for security, efficiency, and personalization. We cover the use of extensions and add-ons, private browsing modes, cache management, and pop-up blocking. You will learn how to enable, disable, and remove extensions, as well as how to set default search engines and manage bookmarks for streamlined nav…
  continue reading
 
This episode reviews the main categories of software you will encounter in the exam, including productivity tools, collaboration platforms, and support utilities. We explain how word processors, spreadsheets, presentation software, and diagramming tools enable professional tasks, while collaboration tools like email clients, conferencing software, …
  continue reading
 
This episode explains the primary roles of an operating system, focusing on how it manages applications, tasks, and connected devices. We detail how the OS provides an interface between hardware and software, coordinates resource allocation, and ensures processes run efficiently. You will learn how features like disk management, process scheduling,…
  continue reading
 
This episode explores the core components of an operating system, including filesystems, device drivers, and user interfaces. We explain how these components work together to manage hardware resources, provide application support, and deliver a functional user experience. Understanding filesystem features like compression, encryption, and file attr…
  continue reading
 
This episode provides an overview of the Applications and Software domain, explaining how it addresses operating systems, productivity tools, browser configuration, and AI concepts. You will learn how this domain evaluates your ability to understand, configure, and manage software environments effectively. The domain’s scope includes both end-user …
  continue reading
 
This episode covers the essential aspects of wireless networking, focusing on standards such as 802.11n, 802.11ac, and 802.11ax. We discuss the speed capabilities, frequency bands, and range considerations for each, as well as how interference and attenuation can affect performance. Knowing these factors will help you answer exam questions on wirel…
  continue reading
 
This episode introduces the most common network types and architectures, including Local Area Networks, Wide Area Networks, client-server models, and peer-to-peer setups. We explain the characteristics, advantages, and limitations of each, along with their typical use cases. Understanding these distinctions will enable you to identify which configu…
  continue reading
 
This episode examines the essential network services you will encounter in both the exam and real-world IT environments. We cover secure web browsing, file transfer protocols, and email services, explaining how each operates and its role in modern communication and data sharing. You will learn the distinctions between services like HTTP and HTTPS, …
  continue reading
 
This episode covers the fundamental concepts of network communication, including IP addressing, MAC addresses, and port numbers. We explain how these identifiers allow devices to locate and communicate with each other across networks. The discussion also includes the basics of protocols, network models, and common network services such as secure we…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play