POPULARITY
Categories
professorjrod@gmail.comIn this episode of Technology Tap: CompTIA Study Guide, we explore the fascinating evolution of technology from the launch of Sputnik in 1957 to the ubiquitous smartphones of today. Discover how early innovations like ARPANET laid the groundwork for the internet, shaping the landscape of technology education and IT skills development. Whether you're part of a study group preparing for your CompTIA exam or seeking expert IT certification tips, this episode provides valuable insights into the origins of the digital world and how it influences modern tech exam prep. Join us as we connect the dots between history and today's technology challenges to help you succeed in your IT certification journey.We start with Licklider's prophetic vision and the leap from circuit switching to packet switching that made failure-tolerant networks possible. Email gives the net its first social heartbeat. TCP/IP stitches islands into one internet. Tim Berners-Lee's simple stack—HTML, HTTP, URLs—opens the door for everyone. The home dial-up era arrives, and the browser becomes the interface of daily curiosity. Mosaic and Netscape ignite innovation; Microsoft's bundling forces a reckoning; Mozilla and later Chrome reshape standards and speed for the modern era.The dot‑com bubble teaches hard lessons, but Google's PageRank reframes the problem: organize the world's information with relevance, not clutter. Broadband and Wi‑Fi make the net always on, enabling streaming, online gaming, and richer apps. Napster breaks open music, litigation clamps down, and then paid streaming wins on convenience. Social networks shift the center of gravity from pages to people; YouTube turns everyone into a publisher and archivist. E‑commerce perfects logistics, and smartphones put it all in your hand. The cloud becomes the engine behind Netflix, Uber, TikTok, and the systems that silently scale our daily tools.We confront the dark side, too: ransomware, botnets, data breaches, and insecure IoT devices that expand the attack surface. Algorithms now shape what we see and believe, while fiber backbones and 5G push speed and density to new highs. AI becomes the thinking layer of the internet, interpreting, recommending, and generating content at scale. A rising push for decentralization—blockchains, IPFS, self-sovereign identity—seeks to return control to users and reduce dependence on gatekeepers. Where does it all go from here? From ambient computing to satellite constellations and new interfaces, the net may soon fade into the background—omnipresent and invisible.If you enjoyed this deep dive, follow the show, share it with a friend who loves tech history, and leave a quick review so more curious listeners can find us. Your support helps us keep exploring the stories that built our digital world.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Your questions and more!
Are you ready to get A+ certified? Watch our free training course:In this month's CompTIA A+ Core 2 Study Group, you'll learn about: Understanding command line outputWorking with an SLAChecking a file systemTOTP implementationsAnd moreKeep the study process going! Watch additional A+ Study Group video replays on the Professor Messer website.
professorjrod@gmail.comIn this episode of Technology Tap: CompTIA Study Guide, we dive deep into cloud security fundamentals, perfect for those preparing for the CompTIA Security+ exam. Join our study group as we explore the shifting security landscape from locked server rooms to identity-based perimeters and data distributed across regions. This practical, Security+-ready guide connects architecture choices to real risks and concrete defenses, offering valuable IT certification tips and tech exam prep strategies. Whether you're focused on your CompTIA exam or looking to enhance your IT skills development, this episode provides essential insights to help you succeed in technology education and advance your career.We start by grounding the why: elasticity, pay-per-use costs, and resilience pushed organizations toward public, private, community, and hybrid clouds. From there, we map service models—SaaS, PaaS, IaaS, and XaaS—and the responsibilities each one assigns. You'll hear how thin clients reduce device risk, why a transit gateway can become a blast radius, and where serverless trims surface area while complicating visibility. Misunderstanding the shared responsibility model remains the leading cause of breaches, so we spell out exactly what providers secure and what you must own.Identity becomes the new perimeter, so we detail IAM guardrails: least privilege, no shared admins, MFA on every privileged account, short-lived credentials, and continuous auditing. We cover encryption in all three states with AES-256, TLS 1.3, HSMs, and customer-managed keys, then add CASB for SaaS control and SASE to bring ZTNA, FWaaS, and DLP to the edge where users actually work. Virtualization and containers deliver speed and density but expand the attack surface: VM escapes, snapshot theft, and poisoned images require hardened hypervisors, signed artifacts, private registries, secret management, and runtime policy. Hybrid and multi-cloud introduce inconsistent IAM and fragmented logging—centralized identity, unified SIEM, CSPM, and infrastructure-as-code guardrails bring discipline back.We wrap with the patterns attackers exploit—public storage exposure, stolen API keys, unencrypted backups, and supply chain compromises—and the operating principles that stop them: zero trust, verification over assumption, and automation that responds at machine speed. Stick around for four rapid Security+ practice questions to test your skills and cement the concepts.If this helped you study or sharpen your cloud strategy, follow and subscribe, share it with a teammate, and leave a quick review telling us which control you'll deploy first.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Send us a textRecorded live at IT Nation, MJ Shoer (Chief Community Officer, GTIA) breaks down how the newly branded Global Technology Industry Association is delivering practical wins for MSPs. We cover the GTIA ISAO (built with ConnectWise) for actionable threat intelligence, the cybersecurity Trust Mark that validates your internal controls against your chosen framework, and how GTIA's unbiased research can be co-branded for QBRs to boost credibility and close rates. MJ also unpacks workforce strategy with “NowGen”—supporting both youth and mid-career changers—plus global mentorship, learning libraries, and why ConnectWise-sponsored memberships are a fast on-ramp. We close with GTIA's growing foundation work and MJ's personal take on discipline, recovery, and building routines after injury. If you run an MSP and want immediate ROI from a trade association, this one's loaded with specifics you can apply this quarter.Top 3 highlightsClear, fast ROI: GTIA ISAO access, co-brandable research, and ConnectWise-sponsored memberships for partners.Security you can show: the GTIA Cybersecurity Trust Mark validates your practices against your chosen framework.Talent + growth: NowGen pathways, global mentorship, and a learning library spanning soft skills to leadership. #JoeyPinz #MSPInfluencer #ForzaDash #ITNation #ITN25 #MSP #GTIA #Cybersecurity #ThreatIntelligence #CompTIA #Mentorship #QBR --- Join us for enlightening discussions that spark growth and exploration. Hosted by Joey Pinz, this Discipline Conversations Podcast offers insights and inspiration.
Send us a textIn this insightful conversation, Carolyn April, Senior Researcher at GTIA and longtime CompTIA veteran, shares how her journalism roots shaped her passion for unbiased channel research. From designing surveys that reveal real market truth to helping MSPs adapt to AI disruption and cybersecurity complexity, Carolyn explains how data can empower strategic decisions. She also opens up about her personal discipline through running, her journey from CompTIA to GTIA, and her belief that curiosity and credibility are the lifeblood of the tech industry.
Today, our guest on The PARTNERNOMICS® Show is Jay McBain, Chief Analyst at Omdia. Jay McBain is an accomplished speaker, author and innovator in the IT industry. Named Channel Influencer of the Year by Channel Partners Magazine, Top 40 Under Forty by the Business Review, Channel A-List by CRN, Top 8 Thought Leader by Channel Marketing Journal, Top 20 Visionary by ChannelPro, Top 25 Newsmaker by CDN Magazine, Top 50 Channel Influencer by Penton, Top 100 Most Respected Thought Leader by VSR Magazine, Global Power 150 by SMB Magazine, and Top 250 Managed Services Executives by MSPmentor. Jay is often sought out for keynotes, thought leadership and future industry guidance. He has spent his 30-year career in various executive channel sales, marketing, strategy roles within IBM, Lenovo, Autotask, ChannelEyes, Forrester, and now Canalys. Jay is the chief analyst for global channels at Canalys - the world's leading analyst firm with a distinct focus on channels, partnerships, alliances, and ecosystems. Jay has led several communities at CompTIA including Vendor Advisory Council, Managed Services Community, Advancing Women in Tech and Emerging Tech. He is also a board member of Channel Partners, Channel Vanguard Council, Ziff Davis Leadership Council, and CRN Channel Intelligence Council. As a futurist, and long standing member of the World Future Society, Jay is a recognized expert in the future of channels, alliances, partnering ecosystems and the study of emerging go-to-market models. An avid blogger, community, and social media expert, he has developed an innovative channel tech stack highlighting the importance of channel data and automation. Jay has lived in Calgary, Winnipeg, Toronto, Raleigh, Albany & Boynton Beach. He actively gives back to the community and been on the board of the United Way, National Cristina Foundation, and Junior Achievement. Key Insights: Services Now Outpace Products In Growth, Making Partner Ecosystems Essential For Scale Millennial Buyers Prefer Integrated Best Of Breed Stacks And Avoid Traditional Sales Motions Ecosystems Determine Winners, As No Company Succeeds Without Alliances, Integrations, and Services Partners Deals Are Shaped By Twenty-eight Buying Moments and An Average Of Seven Influencing Partners LAUNCH Provides Leaders A Clear System For Building Profit-Focused Partnership Programs Around These Moments A Small Percentage Of Partners Produce Most Results, So Leaders Must Recruit Broadly And Invest In Proven Performers ********* Are you a partnering professional wanting to earn industry certifications and badges to showcase on LinkedIn? We will give you the first course and certification for FREE ($595 value)!
Are you ready to get A+ certified? Watch our free training course:In this month's A+ Core 1 Study Group, you'll learn about: Identifying motherboard componentsTroubleshooting Internet accessConnecting 802.11 networksVideo connectionsAnd moreKeep the study process going! Watch additional A+ Study Group video replays on the Professor Messer website.
Your questions and more!
professorjrod@gmail.comPrinters and multifunction devices are more than just simple office tools—they're intricate systems combining optical, thermal, mechanical, and networked computing components. In this episode, we decode printer technology and its critical role in business operations, highlighting how these devices impact IT skills development and technology education. From unboxing to output, we explore the key decisions that keep your pages moving smoothly while safeguarding your data. Whether you're preparing for CompTIA exams or seeking practical IT certification tips, this episode offers valuable insights into managing printer technology within your IT infrastructure.Instructional Downloadable Resource Guidehttps://www.professorjrod.com/downloadsWe start with fit-for-purpose buying—matching speed, DPI, trays, duplexing, and duty cycle to real workloads—then move to placement and environment, where airflow, humidity, and power quality determine whether a fleet runs smoothly or jams at 4:58 p.m. Firmware strategy matters more than most shops admit: back up configs, schedule updates, and never interrupt a flash. On connectivity, we compare USB simplicity against Ethernet and Wi‑Fi flexibility, then layer in drivers and PDLs—PCL for speed, PostScript for precision, XPS for Windows pipelines—plus the color logic of CMYK. You'll hear clean exam clues for the A+ and practical tells for real-world triage, like when a single user's issue is just a preference and not a driver.Inside the box, we translate the seven-step laser process into actionable troubleshooting: charging, exposing, developing, transferring, fusing, and cleaning each leave fingerprints—smears, ghosting, or blank pages—that point straight to the failing part. We round out the print tech tour with inkjet (thermal vs piezo), thermal printers (direct vs transfer), and impact units for multipart forms. Then we head to the network, where DHCP reassignments, wrong ports, and spooler crashes derail entire floors. Print servers centralize power and risk, and mobile/cloud printing adds discovery quirks and new attack surfaces.Security is the blind spot: printers hold disks, address books, and cached jobs. We lay out the must-haves—PIN or badge release, secure erase, firmware signing, role-based access, and segmentation—so confidential pages don't land in the wrong tray and default passwords don't become open doors. We finish with ethics, because technicians handle sensitive data and trust is the real SLA. If you want sharper troubleshooting, stronger security, and higher A+ exam confidence, this one's a field guide you'll use tomorrow.Enjoyed the deep dive? Follow @ProfessorJRod, share this episode with your IT team, and leave a review so more techs can find it.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
professorjrod@gmail.comIn this episode of Technology Tap: CompTIA Study Guide, we delve into endpoint security—a crucial topic for anyone preparing for IT certification exams, especially CompTIA. Traditional firewalls no longer fully protect your network; attackers now exploit endpoints like laptops, phones, printers, and smart devices to breach security. We explore how threats bypass perimeter defenses by targeting users and devices directly, and explain essential controls such as hardening, segmentation, encryption, patching, behavior analytics, and access management. Whether you're studying for your CompTIA exam or seeking practical IT skills development, this episode offers critical insights and IT certification tips to strengthen your understanding of cybersecurity fundamentals. Tune in to enhance your tech exam prep and advance your technology education journey.We start with foundations that actually move risk: baseline configurations, aggressive patch management, and closing unnecessary ports and services. From there we layer modern defenses—EDR and XDR for continuous telemetry and automated containment, UEBA to surface the 3 a.m. login or odd data pulls, and the underrated duo of least privilege and application allow listing to deny unknown code a chance to run. You'll hear why full disk encryption is non‑negotiable and how policy, not heroics, sustains security over time.Mobile endpoints take center stage with clear tactics for safer travel and remote work: stronger screen locks and biometrics, MDM policies that enforce remote wipe and jailbreak detection, and connection hygiene that favors VPN and cellular over public Wi‑Fi. We break down evil twin traps, side loading risks, and permission sprawl, then pivot to IoT realities—default passwords, stale firmware, exposed admin panels—and how VLAN isolation and firmware schedules defang them. A real case of a chatty lobby printer becoming an attack pivot drives home the need for logging and outbound controls through SIEM.The takeaway is simple and urgent: if it connects, it can be attacked, and if it's hardened, segmented, encrypted, and monitored, it can be defended. Subscribe for more practical security deep dives, share this with a teammate who owns devices or networks, and leave a review to tell us which control you'll deploy first.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
professorjrod@gmail.comLearn essential IT skills development for passing your CompTIA exams in mobile tech support. A detailed guide to the mobile era for tech exam prep.Phones aren't just gadgets anymore—they're identity, payments, photos, and the keys to work. We take you on a clear, practical tour of the mobile landscape that A+ technicians need to master, from touch layers and camera flex cables to SoCs, batteries, and the accessories that turn a slab of glass into a full workstation. Along the way, we connect the dots between hardware and human stakes: why a loose port mimics a dead battery, how a single certificate blocks corporate Wi‑Fi, and what swollen cells tell you about urgency and safety.We walk through laptop displays and storage—LCD vs OLED, CCFL vs LED backlights, SATA vs NVMe—and explain how soldered RAM and SSDs affect upgrade paths and purchasing advice. Then we map the wireless terrain: Wi‑Fi 5, Wi‑Fi 6, and Wi‑Fi 7 tradeoffs; Bluetooth profiles like A2DP and HID; NFC's tiny range with outsized impact; and mobile broadband with APN, hotspot, and plan pitfalls. On the software side, we compare iOS and Android security models, sandboxing, permissions, and backup strategies; we also show how iCloud, Google, and Exchange sync turn a reset from disaster into a routine fix.Security gets the spotlight: strong lock combos, malware symptoms that masquerade as battery or data issues, malicious QR codes, and why remote wipe is the right call for lost corporate devices. We share a tested troubleshooting playbook—start with simple checks like rotation lock, clean charging ports before replacing batteries, reseat camera cables before swapping modules, and confirm enterprise certs before blaming antennas. Finally, we double down on ethics and workflow: back up first, label everything, respect privacy, and return devices better than they arrived.If you care about faster fixes, safer data, and smarter mobile support, you'll find ready-to-use steps and exam-ready insights here. Subscribe, share with a friend who's studying for A+, and leave a review telling us the toughest mobile issue you want solved next.Psst! The Folium Diary has something it wants to tell you - please come a little closer...YOU can change the world - you do it every day. Let's change it for the better, together.Listen on: Apple Podcasts SpotifySupport the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Are you ready to get A+ certified? Watch our free training course:In this month's CompTIA A+ Core 2 Study Group, you'll learn about: Troubleshooting networks at the Windows command promptMonitoring storage drivesInteractive attack methodsDealing with low memory error messagesAnd moreKeep the study process going! Watch additional A+ Study Group video replays on the Professor Messer website.
Your questions and more!
IT JOURNEY CompTIA A+ (Intro episode to new tech series). CompTIA A+! Here we go! I'll be uploading along my journey. I won't specifically mention my schooling site. And I don't plan to mention specific identifying information. I plan to just talk about my own opinions and experiences from someone coming from the Social Sciences into Tech.Also see the later episode posted 11/18/25 to see how the second week is comparing to the very initial part of the earliest phases.
Chris Tate welcomes MSP community pillar Richard Tubb for a candid conversation about his journey, the shocking announcement of his step-back from the industry, and the critical shifts MSPs must make to thrive in the age of AI.Richard shares his personal, life-long struggle with depression and the importance of open discussion around mental health within the male-dominated IT and MSP space.He recalls a pivotal moment speaking at a CompTIA (now GTIA) event where he openly discussed his challenges, noting a significant shift in the industry's willingness to engage with the topic since then.He highlights that the challenges faced by MSP owners are often the same, but the willingness to discuss them openly is finally improving.Richard details his evolution from working in corporate IT (Ernst & Young, NHS, GE Capital) where he learned about standardization, systems, and processes, to becoming a "one-man band" MSP.A major turning point was reading Michael E. Gerber's The E-Myth Revisited, which inspired him to build a business that didn't solely rely on him.The creation of the Tubbblog started as a way to share his MSP journey, offering "secret sauce" information which was groundbreaking at the time. After a life event (the passing of his father), he sold his MSP and focused on the blog, which grew into a media and advisory business.He also mentions his books, including The IT Business Owner's Survival Guide and his most recent, Business Networking for Geeks.Richard discusses the huge community response to his decision to step away from the active center of the MSP industry.This was not a snap decision but a pivot following life reflection, spurred partly by recognizing the immense pressure on business owners who manage teams and the acceleration of change due to AI.His decision allows him to focus on "fun stuff," advisory work with a select few, and continuing to write books. He aims to get to 20 books, like his hero, Carl Palachuk.Crucially, he has joined the board of 404 Stress Not Found, a non-profit mental health organization, to help support the community in this vital area.Richard delivers his final, strong words of advice on the future of the MSP:He stresses that the "fixing stuff" days are rapidly disappearing due to AI and self-repairing technology. The runway for MSPs who resist change has run out.The future role of the MSP will be closer to a business consultant or an advisor, focusing on connecting different systems (middleware concept) and helping clients understand how technology can help their businesses grow.This shift requires a different, more human-centric skill set: listening, taking a big picture view, and communicating clearly—skills that the most successful MSPs have been honing for years.A thought-provoking point is raised about the unsung contribution of content creators:AI models like ChatGPT absorb years of publicly available content (Richard's blogs, podcasts, books, etc.) to serve up answers without attributing the source.Richard asks, "Where is the motivation for people to continue giving their knowledge away and not being rewarded for it, if it's just the AI companies that serve it up?"Book: The E-Myth Revisited by Michael E. GerberBook: The IT Business Owner's Survival Guide by Richard TubbBook: Business Networking for Geeks by Richard TubbNon-Profit: 404 Stress Not Found (Supporting IT professionals' mental health)Richard's Blog: richardtubb.co.uk (His personal blog)Richard's Archive: tubblog.co.uk (The original Tubb Blog content archive, remaining online indefinitely)Connect with Richard on LinkedIn here Music - https://www.purple-planet.com
Are you ready to get A+ certified? Watch our free training course:In this month's A+ Core 1 Study Group, you'll learn about: Understanding the ipconfig command resultsWorking with location servicesPrivate IP addressingUsing an ADFCloud computing characteristicsAnd moreKeep the study process going! Watch additional A+ Study Group video replays on the Professor Messer website.
Your questions and more!
In this episode, Benny and Dennis sits down with Marc Wolfe to explore why doing the same old things often won't move you forward. Marc explains how easy it is to get stuck in a rut—personally or professionally—and why asking “Why am I doing it this way?” is the first step to breaking free. The conversation dives into rethinking habits, challenging assumptions, and finding the courage to pivot when what worked before just isn't enough. If you've been spinning your wheels or wondering how to reach that next level, this episode will help you reset your mindset and move with purpose.Marc A. Wolfe's curiosity was evident early on when the eager fourth grader was kicked out of his New Jersey public school — for being too helpful in explaining lessons. Though confused by their decision, Marc discovered his calling: empowering people to unlock their boundless potential.This passion lit an unexpected career fuse, beginning as a 16-year-old freelance photographer capturing Presidents, pro athletes, and celebrities. Pivoting his creative eye, Marc became a pioneering Apple computer dealer, reinforcing the magic of Macs in companies like CNBC, The Bermuda Yellow Pages, GAF, and Tiffany & Co. years before the iPod existed.But hardware was the means, not the endgame. Marc yearned to directly uplift leaders intransformational growth. So adding to his work as an innovation and strategy consultant, he also became an International Coaching Federation (ICF) certified executive coach, blending insights across healthcare, entertainment, finance, and more. Offering empathy, humor, and wisdom, Marc facilitates getting leaders unstuck at organizations such as Bridgestone, Tufts Health Plan, Ramsey Solutions, CompTIA, Synnex, Thread Bank, and Choice Hotels Owners Council.Expanding his reach, Marc contributed leadership articles to Forbes.com while also serving as an INC5000 Executive Coach. Understanding great collaborations fuse heart and mind, Marc served as a Facilitator for Marshall Goldsmith's MG100—fostering human-centered breakthroughs.With his bestselling book “Yeah, But...Cut Through the Noise to Live, Learn and Lead Better,”Marc combines a career of unexpected pivots into practical leadership perspectives. Audiences relate to this witty Jersey guy living his best life outside of Nashville, TN, with his forever bride while his two adult daughters are nearby. Marc guides his clients to action by connecting authentically and meeting people where they are at. He mixes humor, vulnerability, and wisdom distilled from unplanned detours into surprisingly impactful destinations. He always turns “Conversations into Outcomes”Connect with Marcwww.linkedin.com/in/marcwolfeOrder Marc's latest bookwww.amazon.com/stores/Marc-A.-Wolfe/author/B0DTKV1T5Q?Get a free chapter of Yeah, But and leadership resourceshttps://beacons.ai/yeah_butListen to The Yeah, But Podcast https://pod.link/1779330379Benny Carreon- Velocity Technology Group- benny@velocitytechnology.groupDennis Jackson-WorX Solution- dennisj@worxsolution.com
In this episode, Benny and Dennis sits down with Marc Wolfe to explore why doing the same old things often won't move you forward. Marc explains how easy it is to get stuck in a rut—personally or professionally—and why asking “Why am I doing it this way?” is the first step to breaking free. The conversation dives into rethinking habits, challenging assumptions, and finding the courage to pivot when what worked before just isn't enough. If you've been spinning your wheels or wondering how to reach that next level, this episode will help you reset your mindset and move with purpose.Marc A. Wolfe's curiosity was evident early on when the eager fourth grader was kicked out of his New Jersey public school — for being too helpful in explaining lessons. Though confused by their decision, Marc discovered his calling: empowering people to unlock their boundless potential.This passion lit an unexpected career fuse, beginning as a 16-year-old freelance photographer capturing Presidents, pro athletes, and celebrities. Pivoting his creative eye, Marc became a pioneering Apple computer dealer, reinforcing the magic of Macs in companies like CNBC, The Bermuda Yellow Pages, GAF, and Tiffany & Co. years before the iPod existed.But hardware was the means, not the endgame. Marc yearned to directly uplift leaders intransformational growth. So adding to his work as an innovation and strategy consultant, he also became an International Coaching Federation (ICF) certified executive coach, blending insights across healthcare, entertainment, finance, and more. Offering empathy, humor, and wisdom, Marc facilitates getting leaders unstuck at organizations such as Bridgestone, Tufts Health Plan, Ramsey Solutions, CompTIA, Synnex, Thread Bank, and Choice Hotels Owners Council.Expanding his reach, Marc contributed leadership articles to Forbes.com while also serving as an INC5000 Executive Coach. Understanding great collaborations fuse heart and mind, Marc served as a Facilitator for Marshall Goldsmith's MG100—fostering human-centered breakthroughs.With his bestselling book “Yeah, But...Cut Through the Noise to Live, Learn and Lead Better,”Marc combines a career of unexpected pivots into practical leadership perspectives. Audiences relate to this witty Jersey guy living his best life outside of Nashville, TN, with his forever bride while his two adult daughters are nearby. Marc guides his clients to action by connecting authentically and meeting people where they are at. He mixes humor, vulnerability, and wisdom distilled from unplanned detours into surprisingly impactful destinations. He always turns “Conversations into Outcomes”Connect with Marcwww.linkedin.com/in/marcwolfeOrder Marc's latest bookwww.amazon.com/stores/Marc-A.-Wolfe/author/B0DTKV1T5Q?Get a free chapter of Yeah, But and leadership resourceshttps://beacons.ai/yeah_butListen to The Yeah, But Podcast https://pod.link/1779330379Benny Carreon- Velocity Technology Group- benny@velocitytechnology.groupDennis Jackson-WorX Solution- dennisj@worxsolution.com
Jay McBain is the Chief Analyst for Global Channels at Canalys, recognized worldwide as a leading voice on partnerships, ecosystems, and the future of go-to-market models. With 30 years of experience at IBM, Lenovo, Autotask, ChannelEyes, and Forrester, he's been named Channel Influencer of the Year and featured on dozens of top industry lists. A futurist and community leader, Jay has served on multiple CompTIA councils and advisory boards for CRN, Channel Partners, and Ziff Davis. He's a sought-after keynote speaker and blogger whose insights shape how technology companies build and scale their partner ecosystems. Resources: Website: https://www.jaymcbain.com/ LinkedIn: https://www.linkedin.com/company/omdia/ LinkedIn: https://www.linkedin.com/in/jaymcbain/
In this episode of The Association Insights Podcast, host Colleen Gallagher continues the Member Value Reimagined series with a conversation that's both timely and inspiring. Her guest, MJ Shoer, Chief Community Officer at the Global Technology Industry Association (GTIA), shares how his organization—formerly the CompTIA Community—is redefining member engagement and impact across the global IT channel.
professorjrod@gmail.comWhat if your “all-in-one” router is doing too much—and your Wi‑Fi “speed” isn't the real bottleneck? We pull back the rack door and trace the digital bloodstream from SOHO setups to enterprise backbones, translating jargon into choices you can actually make. Starting with LANs, WANs, WLANs, and SANs, we map how scope changes design, cost, and risk, then contrast the convenience of a home gateway with the clarity of dedicated roles—routers, switches, firewalls, and load balancers—working like a well-tuned orchestra.We get tactile with the gear: NICs and their 48‑bit MAC addresses, patch panels that keep closets sane, and switches that forward with CAM tables instead of shouting like hubs. You'll hear where managed switches earn their IP address (management only), why VLANs and QoS matter, and how Power over Ethernet (802.3af/at/bt) cuts clutter while powering VoIP phones, APs, and cameras with fewer failure points. From copper categories (Cat6/6A) and clean terminations to testers, toners, and taps, we highlight the unglamorous steps that prevent the worst outages.Then we cut the cord. We chart Wi‑Fi's arc—802.11a/b/g to n, ac, and 6/6E—clarifying bands, channels, MIMO, and OFDMA so your network stops fighting itself. We talk survey tools, interference traps, and when to steer clients to the right lanes. Fiber gets its due as the distance champion—single‑mode for long haul, multi‑mode for shorter runs—with connector gotchas that can burn hours. And because connectivity is more than Wi‑Fi, we touch Bluetooth peripherals, RFID access, NFC payments, and long‑range links that fill gaps where cables can't go.To anchor the learning, we run quick cert‑style questions—switches and MACs, routers and IPs, PoE's true advantage, and Wi‑Fi 5's 5 GHz focus—so you can test yourself in real time. Whether you're building a home lab, prepping for CompTIA, or planning an upgrade at work, you'll leave with practical mental models and checklists you can use today. If this helped you think a layer deeper, follow, share with a friend who's studying, and drop a review with your biggest networking win or question—what should we unpack next?Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
The GTIA (Global Technology Industry Association) ChannelCon EMEA 2025 is taking place at the moment in London, and to find out more about it and some of the keynote speakers I spoke to Dan Wensley the CEO of GTIA.Dan talks about his background, GTIA ChannelCon EMEA 2025, Sir Stephen Fry one of the keynote speakers, Sir Bob Geldof another of the keynote speakers, AI, cybersecurity and more.More about GTIA:The Global Technology Industry Association (GTIA) is the only vendor-neutral, non-profit membership association for solution providers/MSPs, vendors, distributors and companies working within the IT channel ecosystem. Membership offers networking, exclusive tools and resources to grow your business and strengthen the industry, and more. Formerly known as the CompTIA Community (the membership arm of CompTIA). The association was renamed as GTIA in 2025, but that's not where our story begins. Our association has a long history of serving businesses in the IT channel and technology professionals.
Are you ready to get A+ certified? Watch our free training course:In this month's CompTIA A+ Core 2 Study Group, you'll learn about: Choosing the best Linux utility for troubleshootingData categories and securityWorking with macOSUsing Windows Hello on a laptopBackup and restore with a single restore setAnd moreKeep the study process going! Watch additional A+ Study Group video replays on the Professor Messer website.
Your questions and more!
Are you ready to get A+ certified? Watch our free training course:In this month's A+ Core 1 Study Group, you'll learn about: Visually recognizing cables and interfacesUsing a loopback plugAuthentication protocols on a wireless networkA more efficient RAM upgradeOperating systems on cloud serversAnd moreKeep the study process going! Watch additional A+ Study Group video replays on the Professor Messer website.
Your questions and more!
professorjrod@gmail.comDive deep into the essential building blocks of secure enterprise networks with Professor J. Rod in this comprehensive exploration of network architecture, security appliances, and remote access solutions.What makes a truly secure organizational network? It's more than just firewalls and fancy equipment—it's thoughtful design, strategic implementation, and layered defenses. We break down how enterprise networks function as digital blueprints, explaining everything from switching topologies to routing infrastructure in accessible terms. You'll understand why proper segmentation matters and how VLANs create logical separation between departments sharing physical resources.Security isn't about building one impenetrable wall anymore. Modern protection requires defense-in-depth with multiple control types across various network zones. We examine critical security appliances including next-generation firewalls, intrusion detection systems, web application firewalls, and load balancers—explaining not just what they do but where they belong in your architecture. You'll learn the difference between Layer 4 and Layer 7 inspection, why proper device placement matters, and how to choose between fail-open and fail-close configurations based on your organizational needs.With remote work now standard, we tackle virtual private networks and secure access solutions that keep distributed teams connected safely. From TLS tunneling to IPsec implementation, SSH management to jump servers, you'll gain practical insights into protecting your extended network perimeter. The episode concludes with CompTIA-style practice questions to test your understanding of key concepts. Whether you're studying for certification or managing enterprise infrastructure, this episode provides the knowledge foundation to build truly resilient network architectures. Subscribe for more in-depth technology explorations that bridge theory and practical application.Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
professorjrod@gmail.comThe digital world seems like magic to many, but behind every functioning computer is a complex system of hardware components and methodical troubleshooting approaches. In this comprehensive episode, we pull back the curtain on what makes IT specialists effective problem-solvers and explore the physical heart of computing systems.We begin by examining the role of IT specialists as workplace heroes who tackle everything from simple password resets to complex network outages. Through real-world stories and practical examples, we highlight how the best tech professionals combine technical knowledge with crucial soft skills like communication and organization. You'll discover why explaining complex concepts in plain language is just as important as understanding those concepts in the first place.At the core of effective IT work lies a structured troubleshooting methodology. We break down CompTIA's six-step approach: identifying problems through careful information gathering, establishing theories of probable cause, testing those theories systematically, implementing solutions, verifying full functionality, and documenting everything for future reference. This methodology isn't just exam material—it's a framework that professionals rely on daily to solve real-world tech problems efficiently.The episode then ventures into hardware territory, exploring the motherboard as the computer's central nervous system. We discuss different form factors, installation procedures, and potential pitfalls like electrostatic discharge. Our journey continues through the evolution of connection standards—from early USB and display technologies to modern Thunderbolt and USB-C implementations—and the expansion cards that enhance computer functionality.Whether you're studying for CompTIA certification, working in IT, or simply curious about what happens when you call tech support, this episode provides valuable insights into the methodical thinking and technical knowledge that powers our digital world. We wrap up with practice questions that reinforce key concepts and prepare you for both certification exams and real-world scenarios.Subscribe to Technology Tap for our continuing series on CompTIA A+ certification topics, with our next episode diving into storage technologies from traditional hard drives to cutting-edge NVMe solutions.The Dom Sub Living BDSM and Kink PodcastCurious about Dominance & submission? Real stories, real fun, really kinky.Listen on: Apple Podcasts SpotifySupport the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Join me for CompTIA 220-1202 A+ Q&A, your questions, and more!
Your questions and more!
Join me for CompTIA 220-1201 A+ Q&A, your questions, and more!
Your questions and more!
Seth Robinson, Vice President of Industry Research at CompTIA, joins host Dave Sobel to discuss the intersection of cloud computing and artificial intelligence (AI). They explore the notion that while there is a prevailing narrative about moving from the cloud era to the AI era, many organizations may not have fully optimized their cloud workflows. Robinson emphasizes that the end of the cloud era is not as clear-cut as it seems, as companies continue to grapple with the complexities of cloud adoption and the need for ongoing optimization.The conversation delves into the challenges organizations face in adopting new technologies, particularly AI. Robinson points out that while many companies are experimenting with AI tools, they often struggle to integrate these technologies into their workflows effectively. The discussion highlights the importance of understanding the lessons learned from cloud adoption, especially regarding cybersecurity and the need for a cohesive strategy that aligns technology evaluation with security considerations.As they transition into the AI era, Robinson warns that companies may repeat past mistakes if they do not learn from their cloud experiences. He stresses the significance of transforming workflows and employee behavior to fully leverage AI's potential. The conversation also touches on the emerging trend of outcome-based pricing models in the SaaS space, indicating a shift in how companies evaluate the value of technology investments.Robinson and Sobel conclude by discussing the complexities of measuring risk in AI implementations and the need for organizations to balance innovation with caution. They emphasize that while AI has the potential to enhance productivity, companies must navigate the challenges of scaling these technologies across their operations. The episode provides valuable insights into the current state of cloud and AI adoption, urging businesses to remain vigilant and strategic in their technology investments. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Send us a textWhat separates career-changing advice from everyday guidance? The difference often lies in both the wisdom itself and the intentions of those sharing it. Professor JRod takes a detour from his usual CompTIA certification topics to explore something equally valuable for tech professionals: the transformative power of mentorship and pivotal advice. Drawing from his personal experience, he shares three pieces of guidance that fundamentally changed his professional approach. First, the unexpected revelation that "IT is part of communications" highlights how technical skills must be paired with clear accountability and transparency. Second, the strategic shift from asking for time off to confidently informing employers preserves professional autonomy while maintaining respect. Third, recognizing when documentation protects your interests creates crucial professional boundaries.Beyond specific advice, Professor JRod delves into the more nuanced art of distinguishing genuine mentors from those with hidden agendas. True mentors, he explains, prioritize your growth even when delivering difficult feedback, while others merely use mentorship as a vehicle for their own advancement. This discernment becomes crucial as professionals navigate increasingly complex workplace dynamics. Perhaps most powerfully, he emphasizes the responsibility of "paying it forward" – using your experiences to help others avoid pitfalls and sleepless nights, creating a cycle of support that strengthens entire professional communities.Have you received transformative professional advice? Professor J-Rod invites listeners to share their stories at professorjrod@gmail.com, continuing the conversation about how mentorship shapes our professional journeys. Join the discussion about finding those rare individuals who truly look out for your best interests and learning to become that person for others.Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Send us a textDiving into the foundations of cybersecurity certification, Professor JRod delivers an insightful exploration of CompTIA Security+ Chapter 1, revealing why this certification might actually be more approachable than many believe. Unlike many entry-level IT courses, Security+ builds upon concepts from A+ and Network+, creating a natural progression for those following CompTIA's certification path. For career-changers considering jumping straight to Security+, this episode provides valuable perspective on the assumed knowledge and preparation needed.The heart of this episode focuses on security controls – the safeguards and countermeasures organizations implement to protect their information systems. Professor JRod methodically breaks down the five functional categories: preventive controls that stop incidents before they occur, detective controls that identify security breaches, corrective controls that remediate problems, deterrent controls that discourage inappropriate behavior, and compensating controls that provide alternatives when primary controls aren't feasible. He also highlights the often-overlooked sixth category: directive controls that guide and influence secure behavior through policies and procedures.Beyond technical concepts, Professor J-Rod emphasizes the organizational structures that support effective security implementation. From the strategic oversight of the CISO to the hands-on work of security engineers and analysts, each role contributes uniquely to the protection of organizational assets. Perhaps most importantly, he stresses that communication skills form the foundation of successful IT security work – a lesson learned early in his career that continues to shape his approach to teaching. The episode concludes with practical application through scenario-based questions that reinforce key concepts, preparing listeners for both certification exams and real-world security challenges.Looking to boost your cybersecurity knowledge and prepare for Security+ certification? Follow Professor J-Rod on TikTok for visual explanations of these concepts and join us next time as we continue our exploration of CompTIA Security+ with Chapter 2.Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Join me for CompTIA 220-1202 A+ Q&A, your questions, and more!
Your questions and more!
Join me for CompTIA 220-1201 A+ Q&A, your questions, and more!
Your questions and more!
Dan Wensley outlines GTIA's bold vision for a member-driven, globally connected IT channel “We're here to support and help the IT channel grow... and provide a level playing field community.” — Dan Wensley, GTIA In a milestone interview recorded live at the inaugural GTIA ChannelCon 2025, Dan Wensley, CEO of the Global Technology Industry Association (GTIA), joined Doug Green, Publisher of Technology Reseller News, to discuss the organization's renewed mission, global scope, and member-first model. Wensley shared that GTIA emerged from the historic CompTIA organization after the divestiture of its training and certification business. What remains is a sharpened focus on the channel—vendors, distributors, ITSPs, MSPs, and professionals—built around community, education, advocacy, and advancement. “This is a new brand, a new image, and a new vision,” said Wensley. “We're not here to sell certifications—we're here to serve the channel.” GTIA's newly structured events, like ChannelCon, offer equal opportunity to all participants regardless of company size. “This is not pay to play,” Wensley emphasized. “Every exhibitor gets the same booth, and every member pays virtually the same amount to participate.” The 2025 conference featured AI and cybersecurity content, but Wensley was deliberate in ensuring AI wasn't allowed to dominate every conversation. “Our members told us they still have businesses to run, so our programming reflects that.” GTIA's global ambition is more than just a name. With members in over 150 countries and expanding regional communities, GTIA is becoming a global hub for thought leadership, networking, and shared best practices. With events already planned for Indonesia, Australia, and a return to the UK, the association is scaling its reach alongside its renewed mission. Wensley closed with a call to action: “If you're in the IT services industry, join us. Let's grow this channel together.” To learn more or become a member, visit gtia.org.
The UK sanctions Russian military intelligence officers tied to GRU cyber units. An AI-powered malware called LameHug targets Windows systems. Google files a lawsuit against the operators of the Badbox 2.0 botnet. A pair of healthcare data breaches impact over 3 million individuals. Researchers report a phishing attack that bypasses FIDO authentication by exploiting QR codes. A critical flaw in Nvidia's Container Toolkit threatens managed AI cloud services. A secure messaging app is found exposing sensitive data due to outdated configurations. Meta investors settle their $8 billion lawsuit. Our guest is Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, with a data-driven look at how AI is affecting jobs. Belgian police provide timely cyber tips, baked right in. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we have Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, discussing how AI is affecting jobs. Got cybersecurity, IT, or project management certification goals? For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K's full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify. Selected Reading Breaking: UK sanctions Russian cyber spies accused of facilitating murders (The Record) Russia Linked to New Malware Targeting Email Accounts for Espionage (Infosecurity Magazine) New “LameHug” Malware Deploys AI-Generated Commands (Infosecurity Magazine) Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet (SecurityWeek) 1.4 Million Affected by Data Breach at Virginia Radiology Practice (SecurityWeek) Anne Arundel Dermatology Data Breach Impacts 1.9 Million People (SecurityWeek) Phishing attack abuses QR codes to bypass FIDO keys (SC Media) Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking (SecurityWeek) New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers (Hackread) Meta investors, Zuckerberg settle $8 billion privacy lawsuit tied to Cambridge Analytica scandal (The Record) Loaf and order: Belgian police launch bread-based cybersecurity campaign (Graham Cluley) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Join me for CompTIA 220-1202 A+ Q&A, your questions, and more!
Your questions and more!
Join me for CompTIA 220-1201 A+ Q&A, your questions, and more!
Your questions and more!
French authorities report multiple entities targeted by access brokers. A ransomware group extorts a German hunger charity. AT&T combats SIM swapping and account takeover attacks. A Missouri physician group suffers a cyber attack. Qantas doesn't crash, but their computers do. Researchers uncover multiple critical vulnerabilities in Agorum Core Open. A student loan administrator in Virginia gets hit by the Akira ransomware group. The Feds sanction a Russian bulletproof hosting service. Johnson Controls notifies individuals of a major ransomware attack dating back to 2023. Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst shares the latest technology workforce trends. The ICEBlock app warms up to users. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, sharing the latest workforce technology trends. Will recently appeared on our CISO Perspectives podcast with host Kim Jones in the “What's the “correct” path for entering cyber?” episode. If you are not already an N2K Pro member, you can learn more about that here. Got cybersecurity, IT, or project management certification goals? For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K's full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify. Selected Reading French cybersecurity agency confirms government affected by Ivanti hacks (The Record) Ransomware gang attacks German charity that feeds starving children (The Record) AT&T deploys new account lock feature to counter SIM swapping (CyberScoop) Cyberattack in Missouri healthcare provider Esse Health exposes data of over 263,000 patients (Beyond Machines) Australia's Qantas says 6 million customer accounts accessed in cyber hack (Reuters) Security Advisories on Agorum Core Open (usd) Virginia student loan administrator Southwood Financial hit by ransomware attack (Beyond Machines) Russian bulletproof hosting service Aeza Group sanctioned by US for ransomware work (The Record) Johnson Controls starts notifying people affected by 2023 breach (Bleeping Computers) ICEBlock, an app for anonymously reporting ICE sightings, goes viral overnight after Bondi criticism (TechCrunch) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Join me for CompTIA 220-1202 A+ Q&A, your questions, and more!
Your questions and more!