CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Wireless Security Podcasts
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Heavy Wireless is a deep dive into Wi-Fi, IoT, wireless security, and more. Host Keith Parsons, CWNE#3, draws on his decades of experience to educate, entertain, and inspire those working in the WLAN industry. Each twice-monthly episode explores an aspect of wireless technology with guests including Wi-Fi engineers, industry experts, and vendors. Whether you're already a WLAN specialist or looking to expand your skills in this high-demand sector of IT, Heavy Wireless gives you the technical ...
…
continue reading
Custom Posts - Blip - Blip
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Email feedback and show ideas to [email protected]. Join us as we examine the next major tech cycle, uncover emerging global tech hubs, and analyze where VC investment d ...
…
continue reading
Join "The Technology Addicts" podcast by Avnet Abacus, a leading European distributor of cutting-edge tech products. Explore the exciting world of interconnect, passive, electromechanical, power supply, energy storage, wireless & sensor products and solutions with our inspiring interview guests.
…
continue reading
Embedded edge with Maurizio is a podcast show hosted by Maurizio Di Paolo Emilio, who talks to both engineers and executives in the embedded systems design and development industry to gain insights into the embedded systems, technologies and products featured in embedded.com.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Welcome to "5G6G Pulse", your ultimate source for everything related to the groundbreaking world of 5G technology. Hosted by Modi Daryani, this podcast delves into the latest advancements, trends, and innovations in 5G, exploring its transformative impact across various industries and everyday life. Each episode of "5G6G Pulse" features in-depth discussions on key topics such as the evolution of mobile networks, the integration of 5G with AI and IoT, the revolutionary potential of autonomous ...
…
continue reading
ProCurve Networking - NPI Sales Training
…
continue reading
Join us as we chat with experts from inside and outside Cisco Meraki. Hear about the latest in technology and the people and culture that drive the business. We’d love to hear your feedback—share it with us at community.meraki.com.
…
continue reading
We are excited to share our first podcast which is about our company "VMukti Solutions Pvt. Ltd". Our company is a global exporter of innovative solutions, Proven Technology, and Hybrid Solutions for Smart Cities, Healthcare, Education, Vehicle Surveillance, Warehouse surveillance, Election surveillance, Bank surveillance, Examination surveillance, and many more. Our varieties of CCTV camera includes, - WIFI camera: Which is Suitable for Indoor and Outdoor location - 4G Camera: Specially des ...
…
continue reading
Brought to you by Hughes, a leader in digital business solutions like digital signage and wireless connectivity.
…
continue reading
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
…
continue reading
This is a feed of pages for iversen1449963
…
continue reading
Techz plaza is an american company primarily shipping worldwide customer committed to delivering Innovation and convenience to its customer.
…
continue reading
We cover the latest in cybersecurity news, including what new threats are out there and what you can do to protect yourself and your clients.
…
continue reading
What’s indexing this week in crypto, blockchain, and open-source AI? Find out on The Index, where we feature exclusive conversations that go beyond code. Each week, host and entrepreneur Alex Kehaya talks with founders, developers, and investors who are shaping the future of Web3. From startup advice to breakthrough strategies, our guests share their stories and take a deep dive into the decentralized future.
…
continue reading
AI, vCons, CPaaS, CCaaS, UCaaS, Mobility, Security. Reporting on how the world communicates.
…
continue reading
Welcome to the ISU ECpE podcast, from the Iowa State University Department of Electrical and Computer Engineering (ECpE). Here in ECpE, The Future Is What We Do!
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
A podcast for security professionals, provided by the Total Security Daily Advisor.
…
continue reading
Take a narrative walk along the education IT journey of fascinating ideas, innovative approaches to trends & challenges and tangible takeaways with Greg Kovich, Global Sales Director for Education at Alcatel-Lucent Enterprise, Don Otto, Director of Network Services for Ridley School District, and their industry-leading guests.
…
continue reading
Bite-sized podcast designed for quick consumption. Each episode clocks in under 10 minutes and helps to educate listeners on gadgets, apps, games, and more. An informal and informative approach to cool tech and things we think you'd like, we highlight our favorite things to cross our path. We also like to chat about other non-tech things that we believe you'd love.
…
continue reading

1
How AI-Native Design in 6G is Redefining the Future of Radio Access Networks (RAN)?
19:15
19:15
Play later
Play later
Lists
Like
Liked
19:15S2: Episode: 7 - AI-Native 6G: The Future of Intelligent Radio Access Networks. In this episode of 5G 6G Pulse, we explore how the AI-Native design of 6G is transforming the future of Radio Access Networks (RAN) - from reactive systems to intelligent, autonomous networks. From the limitations of traditional rule-based networks to the promise of int…
…
continue reading

1
Web3 Domains | Tokenizing Digital Assets with D3’s Co-founder, Michael Ho
28:22
28:22
Play later
Play later
Lists
Like
Liked
28:22Ever wondered what happens to those domain names gathering digital dust in your GoDaddy account? In this episode of The Index, host Alex Kehaya sits down with Michael Ho, Co-founder of D3, to explore how blockchain technology is transforming the overlooked world of domain trading and ownership. The domain industry hasn’t changed much since the ’90s…
…
continue reading

1
Episode 135: Live and Let AI: Cisco Live 2025 Recap
36:25
36:25
Play later
Play later
Lists
Like
Liked
36:25Recap the highlights of Cisco Live 2025 San Diego in this episode of Meraki Unboxed. From exciting product announcements to the growing impact of AI on the Cisco portfolio, we explore how innovation and customer focus took center stage. Tune in for insights into the event’s dynamic culture, networking opportunities, and what’s next for Cisco and it…
…
continue reading
“We need to stop building and waiting for revenue to follow. That era is over.” — Michele Campriani, CRO, Optiva In this insightful episode of Technology Reseller News, Publisher Doug Green sits down with Michele Campriani, Chief Revenue Officer at Optiva, for a wide-ranging conversation recorded from a Tuscan villa—but focused squarely on the futu…
…
continue reading

1
SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln;
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44 Bluetooth Vulnerability Could Allow Eavesdropping A vulnerability i…
…
continue reading
“Internet connectivity is no longer a nice-to-have—it’s a have-to-have. Without it, your business stops.” — Jake Jacoby, TELCLOUD In the latest episode of the POTS and Shots podcast series from TELCLOUD, Technology Reseller News Publisher Doug Green is joined by Jake Jacoby of TELCLOUD and Christian Hernandez, Customer Success Manager at ATEL, for …
…
continue reading
“Synthetic voice isn’t here to replace humans—it’s here to help us talk to each other, in more languages, more clearly, and more naturally.” — Christian Stredicke, Vodia In a forward-looking episode of Technology Reseller News, Publisher Doug Green sits down with Christian Stredicke, founder of Vodia, to discuss one of the most transformational tre…
…
continue reading

1
Fixed Wireless Access Rising: CBNG Offers a Scalable Solution to America’s Fiber Shortfall, Podcast
Paul Wright “We’re covering 28 square miles with the same cost it takes to dig one mile of fiber—and we’re doing it with gigabit speeds.” — Paul Wright, Chief Revenue Officer, CBNG In a timely conversation on Technology Reseller News, Publisher Doug Green interviews Paul Wright, Chief Revenue Officer of Cambridge Broadband Networks Group (CBNG), to…
…
continue reading

1
“Voice Is the Future”: Unified Office CEO Ray Pasquale on Reinventing Voice for the AI Era, Podcast
“You can’t cut your way to growth. But you can grow revenue—with very little effort—by letting voice go to work for you.” — Ray Pasquale, CEO, Unified Office In this in-depth conversation with Doug Green, Publisher of Technology Reseller News, Unified Office CEO Ray Pasquale returns to share a powerful message: voice communications is not a relic—i…
…
continue reading
High-power DC charging generates enormous heat – and that’s putting new demands on the design of cables and plugs. This episode looks at the latest innovations in thermal management, from liquid and phase change cooling to sensor-equipped smart plugs, and explains how these technologies ensure safety, comfort and performance in ultra-fast charging …
…
continue reading

1
SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 Remote code execution in CentOS Web Panel - CVE-2025-48703 An arbitrary file upload vulnerab…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Pass…
…
continue reading

1
PP068: Common Kubernetes Risks and What to Do About Them
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access.…
…
continue reading
AI is already widely used for wireless network operations. On today’s show, we look at how AI and machine learning are also being applied to wireless design and site surveys. My guest is Jussi Kiviniemi, Founder and CEO of Hamina Wireless. We talk about how Hamina is developing and implementing AI tools to help designers... Read more »…
…
continue reading

1
AVOXI Embeds AI into Global Cloud Voice: Transforming Enterprise Contact Centers with Proactive, Personalized, and Intelligent Services, Podcast
“We don’t want to wait for customers to tell us there’s a problem—we want to fix it while they’re sleeping.” — Barbara Dondiego, CEO, AVOXI In a major step forward for global enterprise communications, AVOXI CEO Barbara Dondiego joined Doug Green of Technology Reseller News to announce the launch of three powerful AI-powered services embedded into …
…
continue reading

1
Why battery buffers are key to fast charging anywhere
5:54
5:54
Play later
Play later
Lists
Like
Liked
5:54Fast, convenient charging is essential for the future of electromobility – especially on long-distance routes. This episode explores how high-power charging stations, battery buffer systems, and advances in materials like silicon carbide are making EV charging faster, more efficient, and more accessible, even in areas with limited grid connection. …
…
continue reading
How secure is your supply chain? With the recent swathe of supply chain cyber attacks on big name brands, now more than ever it’s important to protect your supply chain. On this edition of Explain IT, we’re talking about recent breaches and how that is affecting customers. We're also delving into the question of 'who are these threat actors?', and …
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%20AtHome%20IP%20Cameras/32062 Critical Netscaler Security Update CVE-2025-5777 CVE 2025-5777 is a critical severity vu…
…
continue reading

1
SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials
5:36
5:36
Play later
Play later
Lists
Like
Liked
5:36ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults for Windows 365 Cloud PCs Microsoft announced more secure default configurations for its Windows 365 Cloud PC offerings. https…
…
continue reading

1
Future of Crypto Wireless | Solana & Helium Mobile with Frank Mong, COO of Nova Labs
37:07
37:07
Play later
Play later
Lists
Like
Liked
37:07What if you could rebuild telecom from the ground up—open, decentralized, and powered by crypto? In this episode of The Index, host Alex Kehaya chats with Frank Mong, COO of Nova Labs, the team behind Helium Mobile—the decentralized wireless network now partnering with AT&T and Telefónica. Helium started with a bold idea: replace legacy cell towers…
…
continue reading
Reliable communication between electric vehicles, charging stations and the grid is essential for intelligent energy services. This episode dives into high- and low-level protocols, backend integration, and the key international standards – from ISO 15118 to OCPP – that make modern EV infrastructure work. For more on communication architecture and …
…
continue reading

1
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, N…
…
continue reading

1
Betting Early on Zoom, Canva, and Crypto: Inside the Playbook of Visionary Solo VC Bill Tai
1:02:22
1:02:22
Play later
Play later
Lists
Like
Liked
1:02:22Legendary technologist and investor Bill Tai joins our latest episode for a wide-ranging conversation spanning decades of Silicon Valley innovation. Bill shares his remarkable journey from being employee #1 at TSMC to becoming one of the first seed investors in Zoom and Canva, and his early embrace of Bitcoin when it was priced at just 7 cents. The…
…
continue reading

1
PP067: Protecting Secrets With Vault and TruffleHog
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don’t expose your privates. John discusses work he’s done to build an automated process in his organization for dev…
…
continue reading

1
Why modern inverters are key to fast, flexible EV charging
3:23
3:23
Play later
Play later
Lists
Like
Liked
3:23Inverters are the heart of every charging system – and key to faster, smarter, and more efficient electric vehicle charging. This episode explores how innovations like silicon carbide semiconductors, solid-state transformers, and combined solar/EV inverters are streamlining system design, increasing performance, and reducing costs. For more in-dept…
…
continue reading

1
Innovation in Medical IoT – Wearable Biometrics, AI in Healthcare, and New Devices
32:05
32:05
Play later
Play later
Lists
Like
Liked
32:05Today, we’re exploring the fascinating evolution of wearable devices—how they’re transforming from fitness trackers into medical-grade monitors, and what that means for the future of healthcare. From real-time health data and AI-powered insights to groundbreaking diabetes technologies and emerging IoT health tools, we’ll uncover how innovation is r…
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Extracting Data from JPEG; Windows Recall Export; Anubis Wiper; Mitel Vuln and PoC
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider build for Windows 11, Microsoft is testing an export feature for data stored by Recall. The feature is limited to European …
…
continue reading

1
Sansay Simplifies Stir/Shaken Compliance with Express Solution, Podcast
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07“We’re here to help providers simplify, comply, and stay ahead — all in one interface.” — Schuyler Voss, Sansay Technology Reseller News publisher Doug Green sat down with Schuyler Voss and Dumitru Borsan of Sansay to discuss the rapidly approaching June 20 Stir/Shaken compliance deadline, and how Sansay’s Stir/Shaken Express is helping service pro…
…
continue reading

1
Cisco’s AI Channel Playbook: Cassie Roach on Partner Enablement and Infrastructure Innovation, Podcast
Cisco’s AI Channel Playbook: Cassie Roach on Partner Enablement and Infrastructure Innovation, Podcast, With major announcements around AI infrastructure, including AI Pods, Nexus HyperFabric, and GPU-intensive servers, Cisco is positioning itself not just as a networking leader — but as the channel’s go-to platform for AI-ready data centers “AI is…
…
continue reading
“We’re not just enabling secure outcomes — we’re simplifying how partners deliver them.” — Brian Feeney, VP of Global Partner Security Sales, Cisco At Cisco Live 2025 in San Diego, Technology Reseller News publisher Doug Green sat down with Brian Feeney, Vice President of Global Partner Security Sales at Cisco, to explore how the company is alignin…
…
continue reading
“AI isn’t just about opportunity — it’s about addressing real-world challenges. And that gives Africa an edge.” — Arthur Goldstuck, Founder, World Wide Worx At Cisco Live 2025 in San Diego, Technology Reseller News publisher Doug Green sat down with Arthur Goldstuck, the South African journalist, researcher, speaker, and founder of World Wide Worx,…
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://unit42.paloaltonetworks.com/malicious-javascript-using-jsfiretruck-as-obfuscation/ JavaScript obfuscated with JSF*CK is bei…
…
continue reading

1
SOON Stack | Build on Solana, Deploy Everywhere with CEO Joanna Zeng
28:10
28:10
Play later
Play later
Lists
Like
Liked
28:10What if you could bring Solana’s speed to every major blockchain—and onboard millions of new users with zero friction? In this new episode of The Index, host Alex Kehaya welcomes back Joanna Zeng, Co-founder & CEO of SOON, for an exciting update on how her team is breaking down the walls between blockchain ecosystems and building the infrastructure…
…
continue reading
The growing connectivity of electric vehicles and their charging infrastructure opens new opportunities – and new vulnerabilities. This episode explores the rising threat of cyber-attacks on charging stations, the need for holistic system security, and why trust in digital infrastructure is essential for the success of e-mobility. For more expert a…
…
continue reading

1
SANS Stormcast Friday, June 13th, 2025: Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln;
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot…
…
continue reading
“You don’t have to have a previous relationship with Verizon. We’re looking for new partners—especially those who’ve never sold connectivity before.” — Jen Skinner, Verizon BusinessIn a fast-changing telecom landscape, Verizon and TELCLOUD are teaming up to offer something powerful: a fresh opportunity for resellers and solution providers to break …
…
continue reading
"Customers don’t want three different dashboards — they want one pane of glass." — Adam Derkey, Product Architect, UnimaxAt Cisco Live 2025 in San Diego, Technology Reseller News publisher Doug Green sat down with Adam Derkey of Unimax to explore Sentinel, the company’s cloud-native, multi-vendor CDR (Call Detail Record) and analytics tool.Sentinel…
…
continue reading
"We're here to take the complexity out of unified communications — and turn it into simplicity." — Todd Remely, UnimaxAt Cisco Live 2025 in San Diego, Technology Reseller News publisher Doug Green caught up with Todd Remely of Unimax to explore how the company is streamlining unified communications (UC) management for enterprises and partners alike…
…
continue reading

1
SmarTrak Launches v3 Platform to Empower Cisco Sellers and Customers with Advanced AI Insights, Podcast
"We’ve built a smarter AI — not just to summarize performance, but to help you win more business." — Ted Lee, SmarTrakAt Cisco Live 2025 in San Diego, Ted Lee, founder of SmarTrak, joined Technology Reseller News publisher Doug Green to announce the launch of SmarTrak.AI v3 — a major upgrade designed to reshape how Cisco partners and end customers …
…
continue reading

1
Bridging the AI Readiness Gap: Kyndryl Urges Enterprises to Invest in People, Not Just Platforms, Podcast
"Organizations are eager to adopt AI — but 71% of leaders say their workforce isn’t ready." — Paul Savill, Global Practice Leader, Network and Edge, KyndrylAt Cisco Live 2025 in San Diego, Paul Savill, Global Practice Leader for Network and Edge at Kyndryl, joined Doug Green, Publisher of Technology Reseller News, to spotlight a critical — and ofte…
…
continue reading

1
SANS Stormcast Thursday, June 12th, 2025: Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
…
continue reading
Technology Reseller News Podcast with SmarTrak’s Ted Lee, Live from Cisco Live 2025“We truly are a revenue machine... Our partners are calling us saying, ‘I need more licenses.’” — Ted Lee, SmarTrakAs competition in the channel ecosystem intensifies, Cisco partners are under pressure to retain and grow customer relationships. In this edition of the…
…
continue reading
“The AI-powered enterprise is here—and it demands a network that can keep up.” — Aruna Ravichandran, SVP, CiscoIn a conversation recorded live at Cisco Live 2025 in San Diego, Doug Green, Publisher of Technology Reseller News, sat down with Aruna Ravichandran, Senior Vice President of Marketing for Cisco’s Enterprise Connectivity and Collaboration …
…
continue reading
"First day, worst day, every day — that’s what we’re built for." — Patrick Quirk, President & GM, OpengearAt Cisco Live 2025 in San Diego, Patrick Quirk, President and General Manager of Opengear, joined Technology Reseller News publisher Doug Green to unveil a major innovation in network resilience: Opengear’s new Foundational Support platform.Des…
…
continue reading
For electromobility to become a true mainstream solution, charging needs to be simple, accessible, and built around the user. In this episode, we explore how better apps, open roaming, Plug & Charge, and secure payment systems can remove friction – and turn EVs into the most convenient mobility option for everyone. For more insights and technologie…
…
continue reading

1
Nordic PMICs – Integrated, Flexible, and Easy-to-Use
25:21
25:21
Play later
Play later
Lists
Like
Liked
25:21Today, it is a pleasure to have a special guest, Geir Kjosavik, joining us to discuss precisely why Nordic Semiconductor, a fabless semiconductor company that has a long track record and legacy in designing ultra-low-power wireless solutions, made the move towards power management ICs, or PMICs. The increasing popularity of battery-operated devices…
…
continue reading