Podcasts about CompTIA

  • 233PODCASTS
  • 1,636EPISODES
  • 43mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Dec 31, 2025LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about CompTIA

Show all podcasts related to comptia

Latest podcast episodes about CompTIA

Technology Tap
Top 10 Hacks in 2025 Part 1

Technology Tap

Play Episode Listen Later Dec 31, 2025 26:09 Transcription Available


professorjrod@gmail.comWhat if the scariest hacks of 2025 never looked like hacks at all? We break down five real-world scenarios where attackers didn't smash locks—they used the keys we handed them. From an AI-cloned voice that sailed through a wire transfer to a building's HVAC console that quietly held elevators and doors hostage, the common thread is hard to ignore: trust. Trusted voices, trusted vendors, trusted “boring” systems, trusted sessions, and trusted APIs became the most valuable attack surface of the year.We start with a “boring” phone call that proves how caller ID and confidence can defeat policy when culture doesn't empower people to challenge authority. Then we step into the mechanical room: cloud dashboards for HVAC and badge readers, vendor-shared credentials, and thin network segmentation made physical denial of service as simple as logging in. The pivot continues somewhere few teams watch—libraries—where an unpatched management system bridged city HR, school portals, and public access with zero alarms, because nothing looked broken.Authentication takes a hit next. MFA worked, yet attackers won by stealing active LMS session tokens from a neglected component and riding valid access for weeks. No failed logins, no brute force—just continuation that our tools rarely question. Finally, we open the mobile app and watch the traffic. Clean, well-formed API calls mapped pricing rules, loyalty balances, and inventory signals at scale. Not a single malformed request, but plenty of business logic abuse that finance noticed before security did.If you care about cybersecurity, IT operations, or the CompTIA mindset, the takeaways are clear: shorten trust windows, verify context continuously, rotate and scope vendor access, segment OT from IT, treat libraries and civic tech as real attack surface, bind tokens to devices, and put rate limits and behavior analytics at the heart of your API strategy. Ready to rethink where your defenses are blind? Listen now, share with your team, and tell us which assumption you'll challenge first. And if this helped, subscribe, leave a review, and pass it on to someone who needs a wake-up call.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Technology Tap
Napster Changed Everything: How Technology Transformed Music and Tech Education

Technology Tap

Play Episode Listen Later Dec 29, 2025 24:40 Transcription Available


professorjrod@gmail.comExplore how Napster revolutionized technology education by changing the way we interact with digital files and access information. This episode delves into the transformation from physical media to digital packets, illustrating key moments that reshaped internet culture and technology. Whether you're preparing for your CompTIA exam or interested in IT skills development, understanding these technological shifts provides valuable context for tech exam prep and study group discussions. Join us as we unpack the history behind Napster and its lasting influence on technology education and digital innovation.We walk through Metallica's landmark lawsuit and the legal logic that treated visibility as control, then trace the diaspora that followed: LimeWire's messy resilience, Kazaa's global sprawl, and BitTorrent's protocol-level genius that made sharing intrinsic. Along the way, we examine what labels missed, what users learned, and why lawsuits against platforms morphed into letters to dorm rooms. Hardware and storefronts offered a ceasefire—hello iPod and ninety-nine-cent downloads—but ownership still clashed with a new habit shaped by search, speed, and scale.Streaming became the only model that matched the lesson users had already internalized: music should be searchable, immediate, and everywhere. That shift didn't stop at songs. Photos, documents, movies, and apps followed, because remote access began to feel natural. We talk candidly about artist trade-offs—reach versus leverage, algorithms versus programmers—and the way architecture keeps deciding outcomes. If you care about the history of technology, platform liability, or the future of creative work, this story connects the dots from a dorm room index to the blue play button on your phone.If this deep dive gave you a new lens on music and tech, follow the show, share it with a friend who remembers the dial-up hiss, and leave a quick review so others can find us. What part of the Napster era still echoes for you?Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Technology Tap
Inside the Cambridge Analytica Scandal: Technology Ethics and Data Privacy

Technology Tap

Play Episode Listen Later Dec 23, 2025 26:51 Transcription Available


professorjrod@gmail.comIn this episode of Technology Tap: CompTIA Study Guide, my students dive into the notorious Cambridge Analytica scandal and its profound impact on data privacy and technology ethics. Our students break down how seemingly harmless personality quizzes exploited Facebook data, creating psychological profiles that influenced elections worldwide. This discussion not only explores real-world technology applications but also enhances your understanding of data security—an essential topic for IT skills development and CompTIA exam prep. Tune in to expand your knowledge of technology education and the critical role of informed consent in today's digital landscape.We walk through the mechanics: the Open Graph loophole, the “This Is Your Digital Life” app, and the shift from demographic targeting to OCEAN-based psychographics that amplified fear, duty, or curiosity depending on your traits. The conversation connects the dots from early experiments with Ted Cruz to huge ad impression volumes tied to the 2016 cycle, explores coordination concerns with super PACs, and examines why these tactics made public debate harder and disinformation easier to spread. Along the way, our students highlight the whistleblowers who surfaced the practice and the global footprint that reached Brexit, the Caribbean, and beyond.The fallout mattered. Facebook faced FTC, SEC, and UK ICO actions; Cambridge Analytica went bankrupt; and Meta tightened API access to cut off friend data collection. We also dig into the privacy wave that followed—GDPR in Europe, CCPA in California—and what those laws do and don't fix. The core takeaway is clear: ethical data practices and transparent advertising aren't nice-to-haves; they're the guardrails for a healthy digital public square. If personal data can be turned into political power, then consent, purpose limits, and accountability must be visible and enforceable.Listen for a clear, step-by-step breakdown, plain-language answers to tough questions, and practical context you can use to evaluate political ads and platform policies. If this conversation sharpened your thinking, subscribe, share the show with a friend, and leave a review telling us how you protect your data online.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Tate Talks - The TotallyMSP Podcast
S11E6: Tate Talks - With Dan Wensley, GTIA

Tate Talks - The TotallyMSP Podcast

Play Episode Listen Later Dec 23, 2025 38:31


Tate Talks: Navigating the New Wave of Managed Services with Dan WensleyIn the final episode of 2025, Chris Tate sits down with a titan of the MSP channel, Dan Wensley, the CEO of GTIA (Global Technology Industry Association). With a career spanning nearly 30 years, Dan shares his unique perspective on the evolution of the industry—from the early days of internet adoption and value-added reselling to the birth of the modern Managed Service Provider.The conversation dives deep into the power of collaboration and community. Dan reflects on how even the fiercest competitors in the early RMM and PSA space worked together to "carry the torch" for the managed services business model. They also discuss the transition of CompTIA into GTIA, emphasizing its role as the industry's only fully agnostic, non-profit trade association dedicated to unbiased research and peer-to-peer education.As we look toward 2026, Dan warns that the pace of change—driven largely by AI and cybersecurity—is accelerating faster than anything we've seen before. His primary advice for MSPs? Don't go it alone. Stay close to your community to avoid "missing the turn," and never lose sight of the customer relationship, which remains the ultimate differentiator.Connect with Dan on LinkedIn here or check out the GTIA website here Music - https://www.purple-planet.com

Technology Tap
Netscape, Mosaic, and the Dawn of the Browser Wars – Technology Education History

Technology Tap

Play Episode Listen Later Dec 21, 2025 29:43 Transcription Available


professorjrod@gmail.comExplore the pivotal moment in technology education as we trace the origins of the internet browser from Mosaic's innovation at NCSA to Netscape Navigator's rise as the gateway to the web. This episode dives deep into internet history, highlighting the major players like Jim Clark and Marc Andreessen who shaped the early web experience. We also analyze the browser wars triggered by Microsoft's Internet Explorer, illustrating challenges in technology development and competition. Whether you're preparing for your CompTIA exam or passionate about tech exam prep, understanding this history enriches your IT skills development and offers valuable context for technology education.I walk through the tactics that made Navigator beloved—progressive rendering, rapid updates, and the birth of JavaScript—and the strategic choices that slowed it down, like the all-in-one Communicator suite. We unpack the bundling play that tilted distribution, the developer headaches of competing nonstandard features, and the DOJ antitrust case that redefined how we think about platform power. The twists don't end there: AOL buys Netscape, adoption fades, and then a bold move changes the web again—open sourcing the code to create Mozilla.From Gecko to Phoenix to Firefox, we trace how community-driven software brought speed, security, and standards back to center stage. That lineage lives in every tab you open today, from Firefox to Chrome to Safari, and in the modern idea of the browser as a platform for apps, SaaS, and daily life. Along the way, I share classroom plans, student podcast previews, and a practical way educators can keep learners engaged over winter break.If you love origin stories, tech strategy, or just remember the thrill of that big N on a beige PC, this one's for you. Listen, subscribe, and share your first browser memory with us—was it Navigator, IE, or something else? And if this journey brought back the dial-up feels, leave a review and pass it on.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Technology Tap
Incident Response and Forensics Essentials | CompTIA Security Exam Prep

Technology Tap

Play Episode Listen Later Dec 18, 2025 23:58 Transcription Available


professorjrod@gmail.comIn this episode of Technology Tap: CompTIA Study Guide, we dive deep into incident response, forensics, and monitoring essentials crucial for your tech exam prep. Learn the full incident response lifecycle—preparation, detection, analysis, containment, eradication, recovery, and lessons learned—to develop your IT skills and master concepts important for the CompTIA exam. We discuss how having a solid plan, defined roles, and effective communication helps IT teams maintain clarity when systems fail. Tune in for real-world examples showing how SOC analysts escalate brute force attacks, how teams preserve evidence for forensics, and how incident debriefs lead to stronger security measures like multi-factor authentication. This episode is an essential part of your CompTIA study guide and technology education journey.We then turn to digital forensics and make it concrete. Legal hold, due process, and chain of custody aren't buzzwords—they're the difference between actionable findings and inadmissible claims. We break down the order of volatility, memory and disk acquisition, hashing, and write blockers, plus the reporting and e‑discovery steps that transform artifacts into a defensible narrative. If you've ever wondered when to pull the plug or why RAM matters, this segment gives you the why and the how.Finally, we zoom out to monitoring and the tools that power modern security operations. From Windows logs and Syslog to IDS, IPS, NetFlow, and packet capture with Wireshark, we show how each source fits the puzzle. We unpack SIEM fundamentals—log aggregation, normalization, correlation, alert tuning—and share strategies to beat alert fatigue without missing true positives. To round it out, we offer certification guidance across A+, Network+, Security+, and Tech+, helping you choose the right path whether you're SOC-bound or supporting compliance from another business unit.Subscribe for more practical cybersecurity breakdowns, share this with a teammate who needs a stronger IR playbook, and leave a review with your biggest monitoring or forensics question—we may feature it next time.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

GREY Journal Daily News Podcast
Is the Tech Job Market Facing a Crisis?

GREY Journal Daily News Podcast

Play Episode Listen Later Dec 18, 2025 2:14


The unemployment rate for tech jobs in the United States rose to four percent in November, according to CompTIA analysis of Bureau of Labor Statistics and Lightcast data. Between October and November, the number of technology workers across industries declined by 134,000, with the tech industry itself losing more than 6,800 jobs. Tech job postings dropped by over 31,800 during the same period. Factors contributing to these trends include ongoing layoffs, reduced demand for new technology projects, and economic uncertainty. Business owners and leaders are advised to reassess talent strategies, invest in employee upskilling, and monitor labor market trends to inform workforce planning.Learn more on this news by visiting us at: https://greyjournal.net/news/ Hosted on Acast. See acast.com/privacy for more information.

Technology Tap
Help Desk Mastery: IT Support Best Practices & SOPs

Technology Tap

Play Episode Listen Later Dec 16, 2025 28:46 Transcription Available


professorjrod@gmail.comWhat if your help desk could solve recurring IT problems in minutes, not hours? In this episode, we explore the backbone of reliable IT support, focusing on clear SOPs that remove guesswork, SLAs that align technical work with business risk, and an effective ticketing flow that transforms scattered fixes into measurable outcomes. Whether you're preparing for a CompTIA exam or seeking practical IT skills development, you'll find valuable insights here. We share real-world examples—from login failures to VPN drops—that demonstrate how documentation, escalation tiers, and knowledge bases reduce time-to-resolution and prevent repeat incidents, making technology education and effective IT support attainable goals.We also get candid about the human side of support. Professionalism is not a soft skill; it is operational. We talk punctuality, clean language, and the kind of active listening that clarifies issues without talking down to users. De-escalation matters, but so do boundaries; you can stay calm without tolerating abuse. And yes, social media can cost you your job—one vague post is all it takes. These habits shape trust with customers and credibility inside the org.To round it out, we map the OS landscape you actually support: Windows, macOS, Linux, and ChromeOS on the desktop, plus iOS and Android in the field. We cover MDM realities with JAMF and Google Workspace, why file systems like NTFS and ReFS or APFS and ext4 affect security and performance, and how hardware requirements such as TPM 2.0 should drive upgrade planning. You will leave with a sharper playbook and four cert-style practice questions to test your knowledge.If you found this useful, follow the show, share it with a teammate, and leave a quick review to help others find it. Got a help desk win or a hard lesson learned? Send it our way and join the conversation.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Technology Tap
From Sputnik to Smartphones: A Journey Through Technology Education and IT Skills Development

Technology Tap

Play Episode Listen Later Dec 14, 2025 28:32 Transcription Available


professorjrod@gmail.comIn this episode of Technology Tap: CompTIA Study Guide, we explore the fascinating evolution of technology from the launch of Sputnik in 1957 to the ubiquitous smartphones of today. Discover how early innovations like ARPANET laid the groundwork for the internet, shaping the landscape of technology education and IT skills development. Whether you're part of a study group preparing for your CompTIA exam or seeking expert IT certification tips, this episode provides valuable insights into the origins of the digital world and how it influences modern tech exam prep. Join us as we connect the dots between history and today's technology challenges to help you succeed in your IT certification journey.We start with Licklider's prophetic vision and the leap from circuit switching to packet switching that made failure-tolerant networks possible. Email gives the net its first social heartbeat. TCP/IP stitches islands into one internet. Tim Berners-Lee's simple stack—HTML, HTTP, URLs—opens the door for everyone. The home dial-up era arrives, and the browser becomes the interface of daily curiosity. Mosaic and Netscape ignite innovation; Microsoft's bundling forces a reckoning; Mozilla and later Chrome reshape standards and speed for the modern era.The dot‑com bubble teaches hard lessons, but Google's PageRank reframes the problem: organize the world's information with relevance, not clutter. Broadband and Wi‑Fi make the net always on, enabling streaming, online gaming, and richer apps. Napster breaks open music, litigation clamps down, and then paid streaming wins on convenience. Social networks shift the center of gravity from pages to people; YouTube turns everyone into a publisher and archivist. E‑commerce perfects logistics, and smartphones put it all in your hand. The cloud becomes the engine behind Netflix, Uber, TikTok, and the systems that silently scale our daily tools.We confront the dark side, too: ransomware, botnets, data breaches, and insecure IoT devices that expand the attack surface. Algorithms now shape what we see and believe, while fiber backbones and 5G push speed and density to new highs. AI becomes the thinking layer of the internet, interpreting, recommending, and generating content at scale. A rising push for decentralization—blockchains, IPFS, self-sovereign identity—seeks to return control to users and reduce dependence on gatekeepers. Where does it all go from here? From ambient computing to satellite constellations and new interfaces, the net may soon fade into the background—omnipresent and invisible.If you enjoyed this deep dive, follow the show, share it with a friend who loves tech history, and leave a quick review so more curious listeners can find us. Your support helps us keep exploring the stories that built our digital world.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1202 A+ Study Group After Show - December 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Dec 11, 2025 79:23


Your questions and more!

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1202 A+ Study Group - December 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Dec 11, 2025 71:28


Are you ready to get A+ certified? Watch our free training course:In this month's CompTIA A+ Core 2 Study Group, you'll learn about: Understanding command line outputWorking with an SLAChecking a file systemTOTP implementationsAnd moreKeep the study process going! Watch additional A+ Study Group video replays on the Professor Messer website.

Technology Tap
Cloud Security Made Simple: Your CompTIA Security+ Study Guide

Technology Tap

Play Episode Listen Later Dec 11, 2025 27:03 Transcription Available


professorjrod@gmail.comIn this episode of Technology Tap: CompTIA Study Guide, we dive deep into cloud security fundamentals, perfect for those preparing for the CompTIA Security+ exam. Join our study group as we explore the shifting security landscape from locked server rooms to identity-based perimeters and data distributed across regions. This practical, Security+-ready guide connects architecture choices to real risks and concrete defenses, offering valuable IT certification tips and tech exam prep strategies. Whether you're focused on your CompTIA exam or looking to enhance your IT skills development, this episode provides essential insights to help you succeed in technology education and advance your career.We start by grounding the why: elasticity, pay-per-use costs, and resilience pushed organizations toward public, private, community, and hybrid clouds. From there, we map service models—SaaS, PaaS, IaaS, and XaaS—and the responsibilities each one assigns. You'll hear how thin clients reduce device risk, why a transit gateway can become a blast radius, and where serverless trims surface area while complicating visibility. Misunderstanding the shared responsibility model remains the leading cause of breaches, so we spell out exactly what providers secure and what you must own.Identity becomes the new perimeter, so we detail IAM guardrails: least privilege, no shared admins, MFA on every privileged account, short-lived credentials, and continuous auditing. We cover encryption in all three states with AES-256, TLS 1.3, HSMs, and customer-managed keys, then add CASB for SaaS control and SASE to bring ZTNA, FWaaS, and DLP to the edge where users actually work. Virtualization and containers deliver speed and density but expand the attack surface: VM escapes, snapshot theft, and poisoned images require hardened hypervisors, signed artifacts, private registries, secret management, and runtime policy. Hybrid and multi-cloud introduce inconsistent IAM and fragmented logging—centralized identity, unified SIEM, CSPM, and infrastructure-as-code guardrails bring discipline back.We wrap with the patterns attackers exploit—public storage exposure, stolen API keys, unencrypted backups, and supply chain compromises—and the operating principles that stop them: zero trust, verification over assumption, and automation that responds at machine speed. Stick around for four rapid Security+ practice questions to test your skills and cement the concepts.If this helped you study or sharpen your cloud strategy, follow and subscribe, share it with a teammate, and leave a quick review telling us which control you'll deploy first.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Joey Pinz Discipline Conversations
#783 ITNation Connect 2025 - MJ Shoer: GTIA, ISAO, and Real ROI for MSPs: MJ Shoer at IT Nation

Joey Pinz Discipline Conversations

Play Episode Listen Later Dec 10, 2025 31:44 Transcription Available


Send us a textRecorded live at IT Nation, MJ Shoer (Chief Community Officer, GTIA) breaks down how the newly branded Global Technology Industry Association is delivering practical wins for MSPs. We cover the GTIA ISAO (built with ConnectWise) for actionable threat intelligence, the cybersecurity Trust Mark that validates your internal controls against your chosen framework, and how GTIA's unbiased research can be co-branded for QBRs to boost credibility and close rates. MJ also unpacks workforce strategy with “NowGen”—supporting both youth and mid-career changers—plus global mentorship, learning libraries, and why ConnectWise-sponsored memberships are a fast on-ramp. We close with GTIA's growing foundation work and MJ's personal take on discipline, recovery, and building routines after injury. If you run an MSP and want immediate ROI from a trade association, this one's loaded with specifics you can apply this quarter.Top 3 highlightsClear, fast ROI: GTIA ISAO access, co-brandable research, and ConnectWise-sponsored memberships for partners.Security you can show: the GTIA Cybersecurity Trust Mark validates your practices against your chosen framework.Talent + growth: NowGen pathways, global mentorship, and a learning library spanning soft skills to leadership.  #JoeyPinz #MSPInfluencer #ForzaDash #ITNation #ITN25 #MSP #GTIA #Cybersecurity #ThreatIntelligence #CompTIA #Mentorship #QBR --- Join us for enlightening discussions that spark growth and exploration. Hosted by Joey Pinz, this Discipline Conversations Podcast offers insights and inspiration. 

Joey Pinz Discipline Conversations
#784 ITNation Connect 2025 - Carolyn April: The Power of Unbiased Research: Carolyn April on Channel Insights and GTIA's Mission

Joey Pinz Discipline Conversations

Play Episode Listen Later Dec 10, 2025 29:27


Send us a textIn this insightful conversation, Carolyn April, Senior Researcher at GTIA and longtime CompTIA veteran, shares how her journalism roots shaped her passion for unbiased channel research. From designing surveys that reveal real market truth to helping MSPs adapt to AI disruption and cybersecurity complexity, Carolyn explains how data can empower strategic decisions. She also opens up about her personal discipline through running, her journey from CompTIA to GTIA, and her belief that curiosity and credibility are the lifeblood of the tech industry. 

PARTNERNOMICS Podcast
The PARTNERNOMICS® Show - Jay McBain: Episode 68, Chief Analyst at Omdia

PARTNERNOMICS Podcast

Play Episode Listen Later Dec 10, 2025 34:10


Today, our guest on The PARTNERNOMICS® Show is Jay McBain, Chief Analyst at Omdia. Jay McBain is an accomplished speaker, author and innovator in the IT industry. Named Channel Influencer of the Year by Channel Partners Magazine, Top 40 Under Forty by the Business Review, Channel A-List by CRN, Top 8 Thought Leader by Channel Marketing Journal, Top 20 Visionary by ChannelPro, Top 25 Newsmaker by CDN Magazine, Top 50 Channel Influencer by Penton, Top 100 Most Respected Thought Leader by VSR Magazine, Global Power 150 by SMB Magazine, and Top 250 Managed Services Executives by MSPmentor. Jay is often sought out for keynotes, thought leadership and future industry guidance. He has spent his 30-year career in various executive channel sales, marketing, strategy roles within IBM, Lenovo, Autotask, ChannelEyes, Forrester, and now Canalys. Jay is the chief analyst for global channels at Canalys - the world's leading analyst firm with a distinct focus on channels, partnerships, alliances, and ecosystems. Jay has led several communities at CompTIA including Vendor Advisory Council, Managed Services Community, Advancing Women in Tech and Emerging Tech. He is also a board member of Channel Partners, Channel Vanguard Council, Ziff Davis Leadership Council, and CRN Channel Intelligence Council. As a futurist, and long standing member of the World Future Society, Jay is a recognized expert in the future of channels, alliances, partnering ecosystems and the study of emerging go-to-market models. An avid blogger, community, and social media expert, he has developed an innovative channel tech stack highlighting the importance of channel data and automation. Jay has lived in Calgary, Winnipeg, Toronto, Raleigh, Albany & Boynton Beach. He actively gives back to the community and been on the board of the United Way, National Cristina Foundation, and Junior Achievement. Key Insights: Services Now Outpace Products In Growth, Making Partner Ecosystems Essential For Scale Millennial Buyers Prefer Integrated Best Of Breed Stacks And Avoid Traditional Sales Motions Ecosystems Determine Winners, As No Company Succeeds Without Alliances, Integrations, and Services Partners Deals Are Shaped By Twenty-eight Buying Moments and An Average Of Seven Influencing Partners LAUNCH Provides Leaders A Clear System For Building Profit-Focused Partnership Programs Around These Moments A Small Percentage Of Partners Produce Most Results, So Leaders Must Recruit Broadly And Invest In Proven Performers   ********* Are you a partnering professional wanting to earn industry certifications and badges to showcase on LinkedIn? We will give you the first course and certification for FREE ($595 value)!

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1201 A+ Study Group - December 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Dec 9, 2025 75:13


Are you ready to get A+ certified? Watch our free training course:In this month's A+ Core 1 Study Group, you'll learn about: Identifying motherboard componentsTroubleshooting Internet accessConnecting 802.11 networksVideo connectionsAnd moreKeep the study process going! Watch additional A+ Study Group video replays on the Professor Messer website.

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1201 A+ Study Group After Show - December 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Dec 9, 2025 64:51


Your questions and more!

Technology Tap
Printers, Decoded: Understanding Printer Technology for IT Professionals Chapter 10

Technology Tap

Play Episode Listen Later Dec 9, 2025 32:13 Transcription Available


professorjrod@gmail.comPrinters and multifunction devices are more than just simple office tools—they're intricate systems combining optical, thermal, mechanical, and networked computing components. In this episode, we decode printer technology and its critical role in business operations, highlighting how these devices impact IT skills development and technology education. From unboxing to output, we explore the key decisions that keep your pages moving smoothly while safeguarding your data. Whether you're preparing for CompTIA exams or seeking practical IT certification tips, this episode offers valuable insights into managing printer technology within your IT infrastructure.Instructional Downloadable Resource Guidehttps://www.professorjrod.com/downloadsWe start with fit-for-purpose buying—matching speed, DPI, trays, duplexing, and duty cycle to real workloads—then move to placement and environment, where airflow, humidity, and power quality determine whether a fleet runs smoothly or jams at 4:58 p.m. Firmware strategy matters more than most shops admit: back up configs, schedule updates, and never interrupt a flash. On connectivity, we compare USB simplicity against Ethernet and Wi‑Fi flexibility, then layer in drivers and PDLs—PCL for speed, PostScript for precision, XPS for Windows pipelines—plus the color logic of CMYK. You'll hear clean exam clues for the A+ and practical tells for real-world triage, like when a single user's issue is just a preference and not a driver.Inside the box, we translate the seven-step laser process into actionable troubleshooting: charging, exposing, developing, transferring, fusing, and cleaning each leave fingerprints—smears, ghosting, or blank pages—that point straight to the failing part. We round out the print tech tour with inkjet (thermal vs piezo), thermal printers (direct vs transfer), and impact units for multipart forms. Then we head to the network, where DHCP reassignments, wrong ports, and spooler crashes derail entire floors. Print servers centralize power and risk, and mobile/cloud printing adds discovery quirks and new attack surfaces.Security is the blind spot: printers hold disks, address books, and cached jobs. We lay out the must-haves—PIN or badge release, secure erase, firmware signing, role-based access, and segmentation—so confidential pages don't land in the wrong tray and default passwords don't become open doors. We finish with ethics, because technicians handle sensitive data and trust is the real SLA. If you want sharper troubleshooting, stronger security, and higher A+ exam confidence, this one's a field guide you'll use tomorrow.Enjoyed the deep dive? Follow @ProfessorJRod, share this episode with your IT team, and leave a review so more techs can find it.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Technology Tap
Endpoint Security Threats and Defenses | Cybersecurity Fundamentals Chapter 10

Technology Tap

Play Episode Listen Later Dec 4, 2025 30:43 Transcription Available


professorjrod@gmail.comIn this episode of Technology Tap: CompTIA Study Guide, we delve into endpoint security—a crucial topic for anyone preparing for IT certification exams, especially CompTIA. Traditional firewalls no longer fully protect your network; attackers now exploit endpoints like laptops, phones, printers, and smart devices to breach security. We explore how threats bypass perimeter defenses by targeting users and devices directly, and explain essential controls such as hardening, segmentation, encryption, patching, behavior analytics, and access management. Whether you're studying for your CompTIA exam or seeking practical IT skills development, this episode offers critical insights and IT certification tips to strengthen your understanding of cybersecurity fundamentals. Tune in to enhance your tech exam prep and advance your technology education journey.We start with foundations that actually move risk: baseline configurations, aggressive patch management, and closing unnecessary ports and services. From there we layer modern defenses—EDR and XDR for continuous telemetry and automated containment, UEBA to surface the 3 a.m. login or odd data pulls, and the underrated duo of least privilege and application allow listing to deny unknown code a chance to run. You'll hear why full disk encryption is non‑negotiable and how policy, not heroics, sustains security over time.Mobile endpoints take center stage with clear tactics for safer travel and remote work: stronger screen locks and biometrics, MDM policies that enforce remote wipe and jailbreak detection, and connection hygiene that favors VPN and cellular over public Wi‑Fi. We break down evil twin traps, side loading risks, and permission sprawl, then pivot to IoT realities—default passwords, stale firmware, exposed admin panels—and how VLAN isolation and firmware schedules defang them. A real case of a chatty lobby printer becoming an attack pivot drives home the need for logging and outbound controls through SIEM.The takeaway is simple and urgent: if it connects, it can be attacked, and if it's hardened, segmented, encrypted, and monitored, it can be defended. Subscribe for more practical security deep dives, share this with a teammate who owns devices or networks, and leave a review to tell us which control you'll deploy first.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Technology Tap
A+ Fundamentals: Mobile Tech Era | CompTIA Study Guide Chapter 9

Technology Tap

Play Episode Listen Later Dec 2, 2025 30:28 Transcription Available


professorjrod@gmail.comLearn essential IT skills development for passing your CompTIA exams in mobile tech support. A detailed guide to the mobile era for tech exam prep.Phones aren't just gadgets anymore—they're identity, payments, photos, and the keys to work. We take you on a clear, practical tour of the mobile landscape that A+ technicians need to master, from touch layers and camera flex cables to SoCs, batteries, and the accessories that turn a slab of glass into a full workstation. Along the way, we connect the dots between hardware and human stakes: why a loose port mimics a dead battery, how a single certificate blocks corporate Wi‑Fi, and what swollen cells tell you about urgency and safety.We walk through laptop displays and storage—LCD vs OLED, CCFL vs LED backlights, SATA vs NVMe—and explain how soldered RAM and SSDs affect upgrade paths and purchasing advice. Then we map the wireless terrain: Wi‑Fi 5, Wi‑Fi 6, and Wi‑Fi 7 tradeoffs; Bluetooth profiles like A2DP and HID; NFC's tiny range with outsized impact; and mobile broadband with APN, hotspot, and plan pitfalls. On the software side, we compare iOS and Android security models, sandboxing, permissions, and backup strategies; we also show how iCloud, Google, and Exchange sync turn a reset from disaster into a routine fix.Security gets the spotlight: strong lock combos, malware symptoms that masquerade as battery or data issues, malicious QR codes, and why remote wipe is the right call for lost corporate devices. We share a tested troubleshooting playbook—start with simple checks like rotation lock, clean charging ports before replacing batteries, reseat camera cables before swapping modules, and confirm enterprise certs before blaming antennas. Finally, we double down on ethics and workflow: back up first, label everything, respect privacy, and return devices better than they arrived.If you care about faster fixes, safer data, and smarter mobile support, you'll find ready-to-use steps and exam-ready insights here. Subscribe, share with a friend who's studying for A+, and leave a review telling us the toughest mobile issue you want solved next.Psst! The Folium Diary has something it wants to tell you - please come a little closer...YOU can change the world - you do it every day. Let's change it for the better, together.Listen on: Apple Podcasts SpotifySupport the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1202 A+ Study Group - November 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Nov 19, 2025 73:39


Are you ready to get A+ certified? Watch our free training course:In this month's CompTIA A+ Core 2 Study Group, you'll learn about: Troubleshooting networks at the Windows command promptMonitoring storage drivesInteractive attack methodsDealing with low memory error messagesAnd moreKeep the study process going! Watch additional A+ Study Group video replays on the Professor Messer website.

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1202 A+ Study Group After Show - November 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Nov 19, 2025 57:03


Your questions and more!

Game and Compute
IT JOURNEY CompTIA A+ (Intro episode to tech series)

Game and Compute

Play Episode Listen Later Nov 19, 2025 23:33


IT JOURNEY CompTIA A+ (Intro episode to new tech series). CompTIA A+! Here we go! I'll be uploading along my journey. I won't specifically mention my schooling site. And I don't plan to mention specific identifying information. I plan to just talk about my own opinions and experiences from someone coming from the Social Sciences into Tech.Also see the later episode posted 11/18/25 to see how the second week is comparing to the very initial part of the earliest phases.

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1201 A+ Study Group - November 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Nov 17, 2025 75:56


Are you ready to get A+ certified? Watch our free training course:In this month's A+ Core 1 Study Group, you'll learn about: Understanding the ipconfig command resultsWorking with location servicesPrivate IP addressingUsing an ADFCloud computing characteristicsAnd moreKeep the study process going! Watch additional A+ Study Group video replays on the Professor Messer website.

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1201 A+ Study Group After Show - November 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Nov 17, 2025 47:59


Your questions and more!

WFH with 2 Guys
What Got You Here Won't Get You There: Rethinking Growth

WFH with 2 Guys

Play Episode Listen Later Nov 11, 2025 28:02


In this episode, Benny and Dennis sits down with Marc Wolfe to explore why doing the same old things often won't move you forward. Marc explains how easy it is to get stuck in a rut—personally or professionally—and why asking “Why am I doing it this way?” is the first step to breaking free. The conversation dives into rethinking habits, challenging assumptions, and finding the courage to pivot when what worked before just isn't enough. If you've been spinning your wheels or wondering how to reach that next level, this episode will help you reset your mindset and move with purpose.Marc A. Wolfe's curiosity was evident early on when the eager fourth grader was kicked out of his New Jersey public school — for being too helpful in explaining lessons. Though confused by their decision, Marc discovered his calling: empowering people to unlock their boundless potential.This passion lit an unexpected career fuse, beginning as a 16-year-old freelance photographer capturing Presidents, pro athletes, and celebrities. Pivoting his creative eye, Marc became a pioneering Apple computer dealer, reinforcing the magic of Macs in companies like CNBC, The Bermuda Yellow Pages, GAF, and Tiffany & Co. years before the iPod existed.But hardware was the means, not the endgame. Marc yearned to directly uplift leaders intransformational growth. So adding to his work as an innovation and strategy consultant, he also became an International Coaching Federation (ICF) certified executive coach, blending insights across healthcare, entertainment, finance, and more. Offering empathy, humor, and wisdom, Marc facilitates getting leaders unstuck at organizations such as Bridgestone, Tufts Health Plan, Ramsey Solutions, CompTIA, Synnex, Thread Bank, and Choice Hotels Owners Council.Expanding his reach, Marc contributed leadership articles to Forbes.com while also serving as an INC5000 Executive Coach. Understanding great collaborations fuse heart and mind, Marc served as a Facilitator for Marshall Goldsmith's MG100—fostering human-centered breakthroughs.With his bestselling book “Yeah, But...Cut Through the Noise to Live, Learn and Lead Better,”Marc combines a career of unexpected pivots into practical leadership perspectives. Audiences relate to this witty Jersey guy living his best life outside of Nashville, TN, with his forever bride while his two adult daughters are nearby. Marc guides his clients to action by connecting authentically and meeting people where they are at. He mixes humor, vulnerability, and wisdom distilled from unplanned detours into surprisingly impactful destinations. He always turns “Conversations into Outcomes”Connect with Marcwww.linkedin.com/in/marcwolfeOrder Marc's latest bookwww.amazon.com/stores/Marc-A.-Wolfe/author/B0DTKV1T5Q?Get a free chapter of Yeah, But and leadership resourceshttps://beacons.ai/yeah_butListen to The Yeah, But Podcast https://pod.link/1779330379Benny Carreon- Velocity Technology Group- benny@velocitytechnology.groupDennis Jackson-WorX Solution- dennisj@worxsolution.com

Confessions of a Burnt Out Marketer
Season 3 Episode #16 – From Stuck to Successful - Interview with Jay McBain – Chief Analyst for Global Channels at Canalys

Confessions of a Burnt Out Marketer

Play Episode Listen Later Nov 4, 2025 44:28


Jay McBain is the Chief Analyst for Global Channels at Canalys, recognized worldwide as a leading voice on partnerships, ecosystems, and the future of go-to-market models. With 30 years of experience at IBM, Lenovo, Autotask, ChannelEyes, and Forrester, he's been named Channel Influencer of the Year and featured on dozens of top industry lists. A futurist and community leader, Jay has served on multiple CompTIA councils and advisory boards for CRN, Channel Partners, and Ziff Davis. He's a sought-after keynote speaker and blogger whose insights shape how technology companies build and scale their partner ecosystems. Resources:  Website: https://www.jaymcbain.com/ LinkedIn: https://www.linkedin.com/company/omdia/ LinkedIn: https://www.linkedin.com/in/jaymcbain/

The Association 100 Podcast
Member Value Reimagined: Leading the IT Channel into the Future

The Association 100 Podcast

Play Episode Listen Later Oct 15, 2025 51:26


In this episode of The Association Insights Podcast, host Colleen Gallagher continues the Member Value Reimagined series with a conversation that's both timely and inspiring. Her guest, MJ Shoer, Chief Community Officer at the Global Technology Industry Association (GTIA), shares how his organization—formerly the CompTIA Community—is redefining member engagement and impact across the global IT channel.

Technology Tap
A + Fundamentals : Networking Unlocked: From LANs to Wi-Fi 7

Technology Tap

Play Episode Listen Later Oct 14, 2025 25:50 Transcription Available


professorjrod@gmail.comWhat if your “all-in-one” router is doing too much—and your Wi‑Fi “speed” isn't the real bottleneck? We pull back the rack door and trace the digital bloodstream from SOHO setups to enterprise backbones, translating jargon into choices you can actually make. Starting with LANs, WANs, WLANs, and SANs, we map how scope changes design, cost, and risk, then contrast the convenience of a home gateway with the clarity of dedicated roles—routers, switches, firewalls, and load balancers—working like a well-tuned orchestra.We get tactile with the gear: NICs and their 48‑bit MAC addresses, patch panels that keep closets sane, and switches that forward with CAM tables instead of shouting like hubs. You'll hear where managed switches earn their IP address (management only), why VLANs and QoS matter, and how Power over Ethernet (802.3af/at/bt) cuts clutter while powering VoIP phones, APs, and cameras with fewer failure points. From copper categories (Cat6/6A) and clean terminations to testers, toners, and taps, we highlight the unglamorous steps that prevent the worst outages.Then we cut the cord. We chart Wi‑Fi's arc—802.11a/b/g to n, ac, and 6/6E—clarifying bands, channels, MIMO, and OFDMA so your network stops fighting itself. We talk survey tools, interference traps, and when to steer clients to the right lanes. Fiber gets its due as the distance champion—single‑mode for long haul, multi‑mode for shorter runs—with connector gotchas that can burn hours. And because connectivity is more than Wi‑Fi, we touch Bluetooth peripherals, RFID access, NFC payments, and long‑range links that fill gaps where cables can't go.To anchor the learning, we run quick cert‑style questions—switches and MACs, routers and IPs, PoE's true advantage, and Wi‑Fi 5's 5 GHz focus—so you can test yourself in real time. Whether you're building a home lab, prepping for CompTIA, or planning an upgrade at work, you'll leave with practical mental models and checklists you can use today. If this helped you think a layer deeper, follow, share with a friend who's studying, and drop a review with your biggest networking win or question—what should we unpack next?Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

The Irish Tech News Podcast
GTIA ChannelCon EMEA 2025 insights with Dan Wensley the CEO of GTIA

The Irish Tech News Podcast

Play Episode Listen Later Oct 14, 2025 23:48


The GTIA (Global Technology Industry Association) ChannelCon EMEA 2025 is taking place at the moment in London, and to find out more about it and some of the keynote speakers I spoke to Dan Wensley the CEO of GTIA.Dan talks about his background, GTIA ChannelCon EMEA 2025, Sir Stephen Fry one of the keynote speakers, Sir Bob Geldof another of the keynote speakers, AI, cybersecurity and more.More about GTIA:The Global Technology Industry Association (GTIA) is the only vendor-neutral, non-profit membership association for solution providers/MSPs, vendors, distributors and companies working within the IT channel ecosystem. Membership offers networking, exclusive tools and resources to grow your business and strengthen the industry, and more. Formerly known as the CompTIA Community (the membership arm of CompTIA).  The association was renamed as GTIA in 2025, but that's not where our story begins. Our association has a long history of serving businesses in the IT channel and technology professionals.   

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1202 A+ Study Group - October 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Oct 9, 2025 78:42


Are you ready to get A+ certified? Watch our free training course:In this month's CompTIA A+ Core 2 Study Group, you'll learn about: Choosing the best Linux utility for troubleshootingData categories and securityWorking with macOSUsing Windows Hello on a laptopBackup and restore with a single restore setAnd moreKeep the study process going! Watch additional A+ Study Group video replays on the Professor Messer website.

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1202 A+ Study Group After Show - October 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Oct 9, 2025 51:43


Your questions and more!

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1201 A+ Study Group - October 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Oct 7, 2025 76:55


Are you ready to get A+ certified? Watch our free training course:In this month's A+ Core 1 Study Group, you'll learn about: Visually recognizing cables and interfacesUsing a loopback plugAuthentication protocols on a wireless networkA more efficient RAM upgradeOperating systems on cloud serversAnd moreKeep the study process going! Watch additional A+ Study Group video replays on the Professor Messer website.

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1201 A+ Study Group After Show - October 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Oct 7, 2025 47:25


Your questions and more!

Technology Tap
Cybersecurity Fundamentals : Enterprise Security Architecture Chapter 5

Technology Tap

Play Episode Listen Later Oct 2, 2025 23:54 Transcription Available


professorjrod@gmail.comDive deep into the essential building blocks of secure enterprise networks with Professor J. Rod in this comprehensive exploration of network architecture, security appliances, and remote access solutions.What makes a truly secure organizational network? It's more than just firewalls and fancy equipment—it's thoughtful design, strategic implementation, and layered defenses. We break down how enterprise networks function as digital blueprints, explaining everything from switching topologies to routing infrastructure in accessible terms. You'll understand why proper segmentation matters and how VLANs create logical separation between departments sharing physical resources.Security isn't about building one impenetrable wall anymore. Modern protection requires defense-in-depth with multiple control types across various network zones. We examine critical security appliances including next-generation firewalls, intrusion detection systems, web application firewalls, and load balancers—explaining not just what they do but where they belong in your architecture. You'll learn the difference between Layer 4 and Layer 7 inspection, why proper device placement matters, and how to choose between fail-open and fail-close configurations based on your organizational needs.With remote work now standard, we tackle virtual private networks and secure access solutions that keep distributed teams connected safely. From TLS tunneling to IPsec implementation, SSH management to jump servers, you'll gain practical insights into protecting your extended network perimeter. The episode concludes with CompTIA-style practice questions to test your understanding of key concepts. Whether you're studying for certification or managing enterprise infrastructure, this episode provides the knowledge foundation to build truly resilient network architectures. Subscribe for more in-depth technology explorations that bridge theory and practical application.Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Technology Tap
A+ Fundamentals Chapter 1 and 2: Becoming an IT Specialist: Troubleshooting and Hardware Essentials

Technology Tap

Play Episode Listen Later Sep 23, 2025 23:55 Transcription Available


professorjrod@gmail.comThe digital world seems like magic to many, but behind every functioning computer is a complex system of hardware components and methodical troubleshooting approaches. In this comprehensive episode, we pull back the curtain on what makes IT specialists effective problem-solvers and explore the physical heart of computing systems.We begin by examining the role of IT specialists as workplace heroes who tackle everything from simple password resets to complex network outages. Through real-world stories and practical examples, we highlight how the best tech professionals combine technical knowledge with crucial soft skills like communication and organization. You'll discover why explaining complex concepts in plain language is just as important as understanding those concepts in the first place.At the core of effective IT work lies a structured troubleshooting methodology. We break down CompTIA's six-step approach: identifying problems through careful information gathering, establishing theories of probable cause, testing those theories systematically, implementing solutions, verifying full functionality, and documenting everything for future reference. This methodology isn't just exam material—it's a framework that professionals rely on daily to solve real-world tech problems efficiently.The episode then ventures into hardware territory, exploring the motherboard as the computer's central nervous system. We discuss different form factors, installation procedures, and potential pitfalls like electrostatic discharge. Our journey continues through the evolution of connection standards—from early USB and display technologies to modern Thunderbolt and USB-C implementations—and the expansion cards that enhance computer functionality.Whether you're studying for CompTIA certification, working in IT, or simply curious about what happens when you call tech support, this episode provides valuable insights into the methodical thinking and technical knowledge that powers our digital world. We wrap up with practice questions that reinforce key concepts and prepare you for both certification exams and real-world scenarios.Subscribe to Technology Tap for our continuing series on CompTIA A+ certification topics, with our next episode diving into storage technologies from traditional hard drives to cutting-edge NVMe solutions.The Dom Sub Living BDSM and Kink PodcastCurious about Dominance & submission? Real stories, real fun, really kinky.Listen on: Apple Podcasts SpotifySupport the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1202 A+ Study Group After Show - September 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Sep 11, 2025 58:27


Your questions and more!

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1202 A+ Study Group - September 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Sep 11, 2025 69:30


Join me for CompTIA 220-1202 A+ Q&A, your questions, and more!

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1201 A+ Study Group - September 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Sep 9, 2025 74:33


Join me for CompTIA 220-1201 A+ Q&A, your questions, and more!

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1201 A+ Study Group After Show - September 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Sep 9, 2025 56:04


Your questions and more!

Business of Tech
Exploring AI's Impact on Cloud Adoption: Lessons, Risks, and Real-World Applications with Seth Robinson

Business of Tech

Play Episode Listen Later Sep 6, 2025 36:23


Seth Robinson, Vice President of Industry Research at CompTIA, joins host Dave Sobel to discuss the intersection of cloud computing and artificial intelligence (AI). They explore the notion that while there is a prevailing narrative about moving from the cloud era to the AI era, many organizations may not have fully optimized their cloud workflows. Robinson emphasizes that the end of the cloud era is not as clear-cut as it seems, as companies continue to grapple with the complexities of cloud adoption and the need for ongoing optimization.The conversation delves into the challenges organizations face in adopting new technologies, particularly AI. Robinson points out that while many companies are experimenting with AI tools, they often struggle to integrate these technologies into their workflows effectively. The discussion highlights the importance of understanding the lessons learned from cloud adoption, especially regarding cybersecurity and the need for a cohesive strategy that aligns technology evaluation with security considerations.As they transition into the AI era, Robinson warns that companies may repeat past mistakes if they do not learn from their cloud experiences. He stresses the significance of transforming workflows and employee behavior to fully leverage AI's potential. The conversation also touches on the emerging trend of outcome-based pricing models in the SaaS space, indicating a shift in how companies evaluate the value of technology investments.Robinson and Sobel conclude by discussing the complexities of measuring risk in AI implementations and the need for organizations to balance innovation with caution. They emphasize that while AI has the potential to enhance productivity, companies must navigate the challenges of scaling these technologies across their operations. The episode provides valuable insights into the current state of cloud and AI adoption, urging businesses to remain vigilant and strategic in their technology investments. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Technology Tap
The Mentor Effect

Technology Tap

Play Episode Listen Later Sep 2, 2025 16:54 Transcription Available


Send us a textWhat separates career-changing advice from everyday guidance? The difference often lies in both the wisdom itself and the intentions of those sharing it. Professor JRod takes a detour from his usual CompTIA certification topics to explore something equally valuable for tech professionals: the transformative power of mentorship and pivotal advice. Drawing from his personal experience, he shares three pieces of guidance that fundamentally changed his professional approach. First, the unexpected revelation that "IT is part of communications" highlights how technical skills must be paired with clear accountability and transparency. Second, the strategic shift from asking for time off to confidently informing employers preserves professional autonomy while maintaining respect. Third, recognizing when documentation protects your interests creates crucial professional boundaries.Beyond specific advice, Professor JRod delves into the more nuanced art of distinguishing genuine mentors from those with hidden agendas. True mentors, he explains, prioritize your growth even when delivering difficult feedback, while others merely use mentorship as a vehicle for their own advancement. This discernment becomes crucial as professionals navigate increasingly complex workplace dynamics. Perhaps most powerfully, he emphasizes the responsibility of "paying it forward" – using your experiences to help others avoid pitfalls and sleepless nights, creating a cycle of support that strengthens entire professional communities.Have you received transformative professional advice? Professor J-Rod invites listeners to share their stories at professorjrod@gmail.com, continuing the conversation about how mentorship shapes our professional journeys. Join the discussion about finding those rare individuals who truly look out for your best interests and learning to become that person for others.Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Technology Tap
Unlocking Security+ Chapter 1 Part 2: Controls and Roles

Technology Tap

Play Episode Listen Later Aug 22, 2025 26:14 Transcription Available


Send us a textDiving into the foundations of cybersecurity certification, Professor JRod delivers an insightful exploration of CompTIA Security+ Chapter 1, revealing why this certification might actually be more approachable than many believe. Unlike many entry-level IT courses, Security+ builds upon concepts from A+ and Network+, creating a natural progression for those following CompTIA's certification path. For career-changers considering jumping straight to Security+, this episode provides valuable perspective on the assumed knowledge and preparation needed.The heart of this episode focuses on security controls – the safeguards and countermeasures organizations implement to protect their information systems. Professor JRod methodically breaks down the five functional categories: preventive controls that stop incidents before they occur, detective controls that identify security breaches, corrective controls that remediate problems, deterrent controls that discourage inappropriate behavior, and compensating controls that provide alternatives when primary controls aren't feasible. He also highlights the often-overlooked sixth category: directive controls that guide and influence secure behavior through policies and procedures.Beyond technical concepts, Professor J-Rod emphasizes the organizational structures that support effective security implementation. From the strategic oversight of the CISO to the hands-on work of security engineers and analysts, each role contributes uniquely to the protection of organizational assets. Perhaps most importantly, he stresses that communication skills form the foundation of successful IT security work – a lesson learned early in his career that continues to shape his approach to teaching. The episode concludes with practical application through scenario-based questions that reinforce key concepts, preparing listeners for both certification exams and real-world security challenges.Looking to boost your cybersecurity knowledge and prepare for Security+ certification? Follow Professor J-Rod on TikTok for visual explanations of these concepts and join us next time as we continue our exploration of CompTIA Security+ with Chapter 2.Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1202 A+ Study Group - August 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Aug 6, 2025 74:01


Join me for CompTIA 220-1202 A+ Q&A, your questions, and more!

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1202 A+ Study Group After Show - August 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Aug 6, 2025 61:25


Your questions and more!

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1201 A+ Study Group - August 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Aug 5, 2025 71:38


Join me for CompTIA 220-1201 A+ Q&A, your questions, and more!

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1201 A+ Study Group After Show - August 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Aug 5, 2025 57:27


Your questions and more!

The CyberWire
UK calls out Russia's playbook.

The CyberWire

Play Episode Listen Later Jul 18, 2025 29:53


The UK sanctions Russian military intelligence officers tied to GRU cyber units. An AI-powered malware called LameHug targets Windows systems. Google files a lawsuit against the operators of the Badbox 2.0 botnet. A pair of healthcare data breaches impact over 3 million individuals. Researchers report a phishing attack that bypasses FIDO authentication by exploiting QR codes. A critical flaw in Nvidia's Container Toolkit threatens managed AI cloud services. A secure messaging app is found exposing sensitive data due to outdated configurations. Meta investors settle their $8 billion lawsuit. Our guest is Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, with a data-driven look at how AI is affecting jobs. Belgian police provide timely cyber tips, baked right in. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we have Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, discussing how AI is affecting jobs. Got cybersecurity, IT, or project management certification goals? For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K's full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify. Selected Reading Breaking: UK sanctions Russian cyber spies accused of facilitating murders (The Record) Russia Linked to New Malware Targeting Email Accounts for Espionage (Infosecurity Magazine) New “LameHug” Malware Deploys AI-Generated Commands (Infosecurity Magazine) Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet (SecurityWeek) 1.4 Million Affected by Data Breach at Virginia Radiology Practice  (SecurityWeek) Anne Arundel Dermatology Data Breach Impacts 1.9 Million People (SecurityWeek) Phishing attack abuses QR codes to bypass FIDO keys  (SC Media) Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking (SecurityWeek) New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers (Hackread) Meta investors, Zuckerberg settle $8 billion privacy lawsuit tied to Cambridge Analytica scandal (The Record) Loaf and order: Belgian police launch bread-based cybersecurity campaign (Graham Cluley) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Professor Messer's A+ Study Group
Professor Messer's CompTIA 220-1202 A+ Study Group After Show - July 2025

Professor Messer's A+ Study Group

Play Episode Listen Later Jul 10, 2025 57:24


Your questions and more!

The CyberWire
Houken blends stealth and chaos.

The CyberWire

Play Episode Listen Later Jul 2, 2025 38:51


French authorities report multiple entities targeted by access brokers. A ransomware group extorts a German hunger charity. AT&T combats SIM swapping and account takeover attacks. A Missouri physician group suffers a cyber attack. Qantas doesn't crash, but their computers do. Researchers uncover multiple critical vulnerabilities in Agorum Core Open. A student loan administrator in Virginia gets hit by the Akira ransomware group. The Feds sanction a Russian bulletproof hosting service. Johnson Controls notifies individuals of a major ransomware attack dating back to 2023. Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst shares the latest technology workforce trends. The ICEBlock app warms up to users. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, sharing the latest workforce technology trends. Will recently appeared on our CISO Perspectives podcast with host Kim Jones in the “What's the “correct” path for entering cyber?” episode. If you are not already an N2K Pro member, you can learn more about that here.  Got cybersecurity, IT, or project management certification goals? For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K's full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify. Selected Reading French cybersecurity agency confirms government affected by Ivanti hacks (The Record) Ransomware gang attacks German charity that feeds starving children (The Record) AT&T deploys new account lock feature to counter SIM swapping (CyberScoop) Cyberattack in Missouri healthcare provider Esse Health exposes data of over 263,000 patients (Beyond Machines) Australia's Qantas says 6 million customer accounts accessed in cyber hack (Reuters) Security Advisories on Agorum Core Open (usd) Virginia student loan administrator Southwood Financial hit by ransomware attack (Beyond Machines) Russian bulletproof hosting service Aeza Group sanctioned by US for ransomware work (The Record) Johnson Controls starts notifying people affected by 2023 breach (Bleeping Computers) ICEBlock, an app for anonymously reporting ICE sightings, goes viral overnight after Bondi criticism (TechCrunch) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices