Computer networking technology
POPULARITY
Categories
Before Angry Audio, Michael “Catfish” Dosch helped redefine how audio moves through radio stations. In this episode, Catfish joins Kirk to revisit the early 2000s when he, Steve Church, and a small development team in Riga, Latvia, built the world’s first practical Audio over IP system — Livewire. From his PR&E console-design roots to creating the Telos SmartSurface and the first Livewire mixing engine, Catfish shares behind-the-scenes stories, engineering breakthroughs, and lessons that changed broadcast infrastructure forever. It’s a fascinating trip back to the dawn of AoIP — where analog met Ethernet and radio changed for good. Guest:Michael “Catfish” Dosch - Product Creator and Owner at Angry Audio Show Notes:Introduction to Livewire+ - web article & link to PDF book on LivewireInformation about Steve Church, who led the development of Livewire Audio over IP Host:Kirk Harnack, The Telos Alliance, Delta Radio, Star94.3, South Seas, & Akamai BroadcastingFollow TWiRT on Twitter and on Facebook - and see all the videos on YouTube.TWiRT is brought to you by:Broadcasters General Store, with outstanding service, saving, and support. Online at BGS.cc. Broadcast Bionics - making radio smarter with Bionic Studio, visual radio, and social media tools at Bionic.radio.Aiir, providing PlayoutONE radio automation, and other advanced solutions for audience engagement.Angry Audio and the new Rave analog audio mixing console. The new MaxxKonnect Broadcast U.192 MPX USB Soundcard - The first purpose-built broadcast-quality USB sound card with native MPX output. Subscribe to Audio:iTunesRSSStitcherTuneInSubscribe to Video:iTunesRSSYouTube
Before Angry Audio, Michael “Catfish” Dosch helped redefine how audio moves through radio stations. In this episode, Catfish joins Kirk to revisit the early 2000s when he, Steve Church, and a small development team in Riga, Latvia, built the world's first practical Audio over IP system — Livewire. From his PR&E console-design roots to creating the Telos SmartSurface and the first Livewire mixing engine, Catfish shares behind-the-scenes stories, engineering breakthroughs, and lessons that changed broadcast infrastructure forever. It's a fascinating trip back to the dawn of AoIP — where analog met Ethernet and radio changed for good.
This podcast dives into how AI is reshaping data center networking, as Juniper's Greg Bensimon discusses high-density compute, cutting-edge cooling, scalable architectures, and the battle between InfiniBand and Ethernet, along with zero-trust security and AI-driven operations.
Take a Network Break! Companies spying on…I mean, monitoring…their employees via software called WorkExaminer should be aware of a login bypass that needs to be locked down. On the news front, we opine on whether it’s worth trying to design your way around AWS outages, and speculate on the prospects of a new Ethernet switch... Read more »
Take a Network Break! Companies spying on…I mean, monitoring…their employees via software called WorkExaminer should be aware of a login bypass that needs to be locked down. On the news front, we opine on whether it’s worth trying to design your way around AWS outages, and speculate on the prospects of a new Ethernet switch... Read more »
Take a Network Break! Companies spying on…I mean, monitoring…their employees via software called WorkExaminer should be aware of a login bypass that needs to be locked down. On the news front, we opine on whether it’s worth trying to design your way around AWS outages, and speculate on the prospects of a new Ethernet switch... Read more »
A wireless-first office is a sensible goal these days when most laptops don’t have an Ethernet port and lots of devices use Wi-Fi. Wireless and network architect Phil Sosaya led the transition to wireless-first offices at sites across the globe. He details his design approach, including why he doesn’t bother with site survey software. He... Read more »
A wireless-first office is a sensible goal these days when most laptops don’t have an Ethernet port and lots of devices use Wi-Fi. Wireless and network architect Phil Sosaya led the transition to wireless-first offices at sites across the globe. He details his design approach, including why he doesn’t bother with site survey software. He... Read more »
In this episode of Cisco Champion Radio, we dive into the future of meeting room technology and the innovations reshaping hybrid collaboration. From the shift to AV over IP and the power of Cisco Vision PTZ to the AI-driven features in RoomOS 26, Cisco is redefining what's possible in modern meeting spaces. Discover how AI enhances audio and video experiences, how Control Hub provides actionable insights into device health and workspace usage, and how advancements like Power over Ethernet and auto camera modes make meetings more seamless and immersive. We'll also explore how simplifying installation, improving interoperability, and enabling smarter device discoverability are transforming large-scale meeting room deployments. Whether you're building smarter environments or optimizing hybrid work experiences, this conversation highlights the breakthroughs driving clarity, flexibility, and impact in every meeting. Resources https://www.webex.com https://www.webex.com/us/en/devices/room-devices.html Cisco guest Rich Bayes, Sr. Director of Product Management, Cisco Cisco Champion hosts Amr Nasher, Founder/CEO, Twaasol Jason Dave, Infrastructure and Security Director, AbelsonTaylor Rickey Keith, Vertical Systems Engineer, World Wide Technology Sijbren Beukenkamp, Director/Owner, 3Corners Moderator Danielle Carter, Customer Voices and Cisco Champion Program
Check out last week's video on ANET, AVGO, & Nvidia: https://youtu.be/FYBaX9tqWAAAstera Labs and its peer Credo Technology Group is pulling back substantially from recent all-time highs. We dive into the narrative about what's causing the drop—including new product announcements from competitors like Broadcom and Nvidia—and explain the more fundamental reason for the recent volatility: statistics and a hefty valuation.Astera Labs is a fabless chip designer. Its original product was the PCIe re-timer (a chip that recovers and retransmits degraded data signals in a data center) but has since expanded into fabric switches, memory controllers, and Ethernet smart cable modules.Despite incredible triple-digit year-over-year revenue increases and a flip to profitability with a massive 69% free cash flow margin in Q2 2025, the market expects growth and margins to moderate. Learn why a current 60× Price-to-Sales ratio for a hardware business is a "hefty valuation" and what this means for investors.Join us on Discord with Semiconductor Insider, sign up on our website: www.chipstockinvestor.com/membershipSupercharge your analysis with AI! Get 15% of your membership with our special link here: https://fiscal.ai/csi/Sign Up For Our Newsletter: https://mailchi.mp/b1228c12f284/sign-up-landing-page-short-formIf you found this video useful, please make sure to like and subscribe!*********************************************************Affiliate links that are sprinkled in throughout this video. If something catches your eye and you decide to buy it, we might earn a little coffee money. Thanks for helping us (Kasey) fuel our caffeine addiction!Content in this video is for general information or entertainment only and is not specific or individual investment advice. Forecasts and information presented may not develop as predicted and there is no guarantee any strategies presented will be successful. All investing involves risk, and you could lose some or all of your principal.Timestamps:[00:00] Introduction: Astera Labs Stock is Crashing[01:36] What Astera Labs Does (PCIE Re-timers & More)[03:15] Astera's Competitors: Broadcom, Nvidia, and the 'Narrative'[04:08] The Fundamental Reason for the Crash: Statistics and Volatility[04:47] A Growth and Profitability Story: Triple-Digit Revenue & Free Cash Flow[06:40] Why Growth Will Moderate in H2 2025 and 2026[07:07] The Valuation Problem: High Price-to-Sales for a Cyclical Business[08:58] Final Thoughts: Should You Panic? #asteralabs #ALABstock #dataenters #aidatacenter #semiconductors #chips #investing #stocks #finance #financeeducation #silicon #artificialintelligence #ai #financeeducation #chipstocks #finance #stocks #investing #investor #financeeducation #stockmarket #chipstockinvestor #fablesschipdesign #chipmanufacturing #semiconductorstocks Nick and Kasey own shares of Credo, Broadcom, Nvidia
Linia stoi, diody świecą na czerwono, a kierownik pyta: "Długo jeszcze?". Znasz to uczucie bezradności? W tym odcinku opowiadam o prawdziwej awarii sieci PROFINET, która zatrzymywała produkcję co godzinę. Diagnoza była szokująca: Jitter na poziomie 953%! Posłuchaj, jak błędy w projekcie i instalacji doprowadziły do tak krytycznej sytuacji i jak udało nam się przywrócić linię do życia. To historia, dzięki której zrozumiesz, dlaczego Profinet to nie jest zwykły Ethernet i jak unikać podobnych koszmarów.Potrzebujesz wiedzy, by działać samodzielnie? ➡️ Kurs Profinet - Uruchomienie i Diagnostyka: https://www.automatycznypodcast.pl/kurs-profinet/ Twoja linia już stoi i potrzebujesz wsparcia?
Foundations of Amateur Radio The other day I received an email from Frank K4FMH asking me about an idea I'd worked on some time ago, namely the notion that I might monitor solar flux at home using a software defined radio. At the time I was attempting to get some software running on my PlutoSDR and got nowhere fast. Before I continue, a PlutoSDR, or more formally an ADALM Pluto Active Learning Module by Analog Devices, is both a computer and a software defined radio receiver and transmitter in a cute little blue box. I've talked about this device before. It's an open design, which means that both the software and hardware are documented and available straight from the manufacturer. Out of the box it covers 325 MHz to 3.8 GHz. You can connect to a PlutoSDR using USB or via the network, wireless or Ethernet, though I will mention that neither of those last two is currently working for me, but more on that later. Encouraged by Frank's email, I set out to explore further and came across a 2019 European GNU Radio days workshop, which discussed some of the tools that are available for the PlutoSDR, accompanied by two PDF documents walking you through the experience. One comment around why the PlutoSDR uses networking as one of the connectivity options spoke to me. From a usability perspective, networking makes it easier to access the PlutoSDR from a virtual machine, since most of the time that already has network connectivity, whereas USB often requires drivers. As you might recall, network connectivity is one of the many things that I'm trying to achieve with a project that I'm calling Bald Yak, since by the time we're done, there's not going to be much hair left from all the Yak Shaving. The Bald Yak project aims to create a modular, bidirectional and distributed signal processing and control system that leverages GNU Radio. As a result, I set about trying to actually walk myself through those PDF tutorials .. and got stuck on the first sentence on the first page, which helpfully states: "The necessary prerequisites have been installed on the local lab machine." It went on to supply a link to a page with instructions on how to acquire those very same prerequisites. Two days later, after much trial and error, I can now report that I too have these installed and because I cannot help myself, I made it into a Docker container and published this on my VK6FLAB GitHub page. To put it mildly, there's a few moving parts and plenty of gotchas. As an aside, if you think that installing Docker is harder than installing these tools, I have some news for you .. trust me .. by a long shot .. it's not. Right now I'm working on writing the documentation that accompanies this project such that you can actually use it without needing to bang your head against the desk in frustration. Mind you, the documentation part of this is non-trivial. For reasons I don't yet understand, my Pluto does not want to talk to the network directly over either WiFi or Ethernet, and connecting over USB through a virtual machine inside a Docker container is giving me headaches, so right now I'm connected across the network to a Raspberry Pi that's physically connected to the Pluto. As a result, I can now use the tools inside my Docker container, connected to the Pluto through the Pi and if you're curious, 'iiod' is the tool to make that happen .. more documentation. At this point you might well ask, why bother? This is a fair question. Let me see if I can give you an answer that will satisfy. Monitoring solar flux typically occurs at 2.8 GHz, which is outside the range of RTL-SDR dongles which top out at about 1.7 GHz. For the PlutoSDR however, it's almost perfectly within the standard frequency range. One of the tools that is introduced by the talk is an application called 'iio-scope', which as the name suggests, is an oscilloscope for 'iio' or Industrial I/O devices, of which the PlutoSDR is one. As an aside, the accelerometer in your laptop, the battery voltage, the CPU temperatures, fans, and plenty of others, are all 'iio' devices that you can look at with various tools. So, once I've finished the tutorials, I suspect that I will understand a little better how some of the various parts of the PlutoSDR hang together, and I can set it up to monitor 2.8 GHz. Of course, that's only step one, the next step is to make a Raspberry Pi record the power levels over time, better still, record it on the PlutoSDR itself, and see if we can actually notice any change .. without requiring anything fancy like a special antenna, some massive filters, a special mount and all the other fun and games that no doubt will reveal themselves in good time. It also means that, if I got this right, I have the beginnings of the bits needed to get the PlutoSDR to talk to GNU Radio. Why? Because I can, and because Frank asked, also Yak Shaving. I'm Onno VK6FLAB
Glasfaser ist die Königsklasse der Datenübertragung und in Deutschland behandeln wir sie wie ein Luxusgut. In dieser Folge des Elektrotechnik Podcast erklärt Dir Giancarlo the Teacher, wie LWL wirklich funktionieren, warum Kupfer längst ausgedient hat und was Du als Azubi, Meister oder Techniker über Netzwerke, Totalreflexion, Dämpfung und OTDR wissen musst.Zusätzlich erfährst Du alles Wichtige über Netzwerktypen wie PAN, LAN, MAN, WAN und GAN. Von der Smartwatch über Schulnetzwerke bis hin zum globalen Backbone.Ein Muss für Prüfung, Baustelle und Hirn.
The announcement that NVIDIA's Spectrum X Ethernet is being used by Meta and Oracle has caused concern to investors regarding other networking companies. But should investors really freak out about this new competition? We break down what Spectrum X is—NVIDIA's open-standards Ethernet system that competes with companies like Arista Networks. We also differentiate it from NVIDIA's proprietary AI training technology, Quantum X InfiniBand.Discover the powerful counter-narrative: the strong partnership between Arista and Broadcom. They are working together on Ethernet-based XPU systems for hyperscalers. Broadcom has secured a massive $110 billion backlog and added new customers, including OpenAI, for these XPU-based computing racks.With the market for AI networking and inference growing into a tidal wave, we explore whether there is plenty of new business to go around for Arista and Broadcom.Join us on Discord with Semiconductor Insider, sign up on our website: www.chipstockinvestor.com/membershipSupercharge your analysis with AI! Get 15% of your membership with our special link here: https://fiscal.ai/csi/Sign Up For Our Newsletter: https://mailchi.mp/b1228c12f284/sign-up-landing-page-short-formIf you found this video useful, please make sure to like and subscribe!*********************************************************Affiliate links that are sprinkled in throughout this video. If something catches your eye and you decide to buy it, we might earn a little coffee money. Thanks for helping us (Kasey) fuel our caffeine addiction!Content in this video is for general information or entertainment only and is not specific or individual investment advice. Forecasts and information presented may not develop as predicted and there is no guarantee any strategies presented will be successful. All investing involves risk, and you could lose some or all of your principal.#Nvidia #AristaNetworks #Broadcom #NVDA #ANET #AVGO #Meta #Oracle #OpenAI #SpectrumX #InfiniBand #QuantumX #Ethernet #Networking #AIInference #XPU #Tomahawk#AINetworking #DataCenter #Hyperscaler #AINick and Kasey own shares of Nvidia, Broadcom, and Arista Networks
professorjrod@gmail.comWhat if your “all-in-one” router is doing too much—and your Wi‑Fi “speed” isn't the real bottleneck? We pull back the rack door and trace the digital bloodstream from SOHO setups to enterprise backbones, translating jargon into choices you can actually make. Starting with LANs, WANs, WLANs, and SANs, we map how scope changes design, cost, and risk, then contrast the convenience of a home gateway with the clarity of dedicated roles—routers, switches, firewalls, and load balancers—working like a well-tuned orchestra.We get tactile with the gear: NICs and their 48‑bit MAC addresses, patch panels that keep closets sane, and switches that forward with CAM tables instead of shouting like hubs. You'll hear where managed switches earn their IP address (management only), why VLANs and QoS matter, and how Power over Ethernet (802.3af/at/bt) cuts clutter while powering VoIP phones, APs, and cameras with fewer failure points. From copper categories (Cat6/6A) and clean terminations to testers, toners, and taps, we highlight the unglamorous steps that prevent the worst outages.Then we cut the cord. We chart Wi‑Fi's arc—802.11a/b/g to n, ac, and 6/6E—clarifying bands, channels, MIMO, and OFDMA so your network stops fighting itself. We talk survey tools, interference traps, and when to steer clients to the right lanes. Fiber gets its due as the distance champion—single‑mode for long haul, multi‑mode for shorter runs—with connector gotchas that can burn hours. And because connectivity is more than Wi‑Fi, we touch Bluetooth peripherals, RFID access, NFC payments, and long‑range links that fill gaps where cables can't go.To anchor the learning, we run quick cert‑style questions—switches and MACs, routers and IPs, PoE's true advantage, and Wi‑Fi 5's 5 GHz focus—so you can test yourself in real time. Whether you're building a home lab, prepping for CompTIA, or planning an upgrade at work, you'll leave with practical mental models and checklists you can use today. If this helped you think a layer deeper, follow, share with a friend who's studying, and drop a review with your biggest networking win or question—what should we unpack next?Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Summary In Episode 390 of In Touch With iOS, host Dave Ginsburg is joined by Jill McKinley, Marty Jencius, Jeff Gamet, Eric Bolden, and Ben Roethig to tackle Apple's latest updates with a mix of analysis and humor. The panel begins with VisionOS 26.1 beta 2, highlighting improved game controller responsiveness and Apple's new immersive films—from Hawaii's volcanoes to Maine's autumn colors. Marty jokes Apple just used the Photos app's magic wand to turn summer into fall, while the group teases about running out of U.S. states to film. They also discuss the quirky Hover strap accessory that “flips up like old-man sunglasses” with ad copy quoting “When a problem comes along, you must flip it.” iOS 26.1 beta 2 gets attention for bigger alarm buttons, a snooze/stop redesign, and expanded Apple Intelligence languages. On iPad, the return of Slide Over sparks relief, while microphone gain control earns praise for podcasters. Apple's Fitness app adds custom workouts, and AirPods Pro 3 receive a firmware update. Marty shares a hilarious inflight story: the new seal was so tight his ears went “poppity, poppity, poppity” during descent. The crew explores iPhone 17's USB-C capabilities—charging AirPods, external displays, Ethernet, even other iPhones. Jeff jokes about using USB-C mics for bird-watching apps, while Eric tests charging his Apple Watch directly from the iPhone. Other highlights: Amazon Prime splurges (camera arms, Stream Decks, car jumpers, and audio gear). Tag Heuer's $1,600 Connected E5 smartwatch, now iPhone-certified—“a $1,600 dongle for your wrist.” Apple's Colorado outdoor influencer event (hiking + AirPods demos). Cosmic Orange skins from Dbrand, prompting jokes about spray-tanning MacBooks or eating Cheetos near your iPhone. Liquid Glass design spreading to more Apple apps. CarPlay tensions: Rivian's refusal, Aston Martin as the lone CarPlay Ultra supporter, and frustration over automakers backtracking. Jeff warns CarPlay Ultra might never gain widespread adoption unless Apple compromises. The panel closes with laughs about hidden iPhone call history (“your spouse's attorney already knows”), cosmic orange hunting gear, and CarPlay Ultra being more elusive than a lottery win. Topics and Links In Touch With Vision Pro this week. visionOS 26.1 Beta 2 Release Notes | Apple Developer Documentation Dave's review. Apple releases new ‘Elevated' episode for Apple Vision Pro - 9to5Mac Marty found a new headset extension call the Hover headset. https://hoverheadset.com/?country=US Beta this week. iOS 26.1 Beta 2 was released this week. iOS 26.1 beta 2 now available iPadOS 26.1 beta 2 available now, here's what to expect iPadOS 26.1 Beta 2 Reintroduces Slide Over Multitasking watchOS 26.1 beta 2 rolling out now for Apple Watch users tvOS 26.1 beta 2 now available for Apple TV 4K Apple Seeds Second Betas of iOS 26.1, iPadOS 26.1, macOS Tahoe 26.1 and More Apple Seeds Second Public Betas of iOS 26.1, iPadOS 26.1 and macOS Tahoe 26.1 Everything New in iOS 26.1 Beta 2 Apple Fixes Alarms in iOS 26.1 5+ New Features Your iPhone Will Get in iOS 26.1 Apple Releases New Firmware for AirPods Pro 3, AirPods Pro 2 and AirPods 4 What can I plug into my iPhone 17 USB-C port? AirPods Pro 3 Experience on Plane - Marty
Send us a textWe explore how field innovation keeps outrunning the standards, why extended copper links beyond 100 meters are gaining momentum, and what TIA's new TSB could mean for testing, warranties, and contracts. We share practical steps for techs, PMs, and designers to push the edge without getting burned.• standards lag and field innovation tension • permanent link versus channel clarified • certification vs qualification and warranty conflict • extended-distance solutions and GameChanger disruption • TIA TR-42.7 call for interest for TSB 5073 • tester configuration for beyond-100m evaluations • documentation and manufacturer sign-off practices • PM risk, contracts, and stakeholder education • designer estimating, thermal and alien crosstalk margins • getting involved in committees and sharing empirical dataIf you're watching this show on YouTube, would you mind hitting the subscribe button and that bell button to be notified when new content is being produced? If you're listening to us on one of the audio podcast platforms, would you mind leaving us a five-star rating? While this show is free and will always remain free, if you find value in this content, would you mind clicking on that QR button right there? You can buy me a cup of coffee. You can even become a monthly contributor to this podcast. Just all and you can even buy Let's Talk Cabling t-shirts. Join the community today at LowVoltagenation.com or jump into the conversation at our Facebook group. Email Chuck at advertising at letstalkcabling.com and let's connect your brand to the right audience today. Visit GoFar on LinkedIn or click on the link in the description below. Go subscribe to Cable Installation and Maintenance Magazine right now before you forget.Support the showKnowledge is power! Make sure to stop by the webpage to buy me a cup of coffee or support the show at https://linktr.ee/letstalkcabling . Also if you would like to be a guest on the show or have a topic for discussion send me an email at chuck@letstalkcabling.com Chuck Bowser RCDD TECH#CBRCDD #RCDD
The network plays a key role in AI model and inference training. On today's Tech Bytes podcast, sponsored by Nokia, we talk about why you need a high-performance network for AI training workloads, essential technologies such as RoCE v2 and others that make Ethernet suitable for scale-out networking, the role of the Ultra Ethernet Consortium... Read more »
The network plays a key role in AI model and inference training. On today's Tech Bytes podcast, sponsored by Nokia, we talk about why you need a high-performance network for AI training workloads, essential technologies such as RoCE v2 and others that make Ethernet suitable for scale-out networking, the role of the Ultra Ethernet Consortium... Read more »
Netzwerkkameras haben ein Grundstück im Blick und melden Auffälligkeiten per App – so die Theorie. Doch hilft Videoüberwachung wirklich gegen Einbrecher? Es gibt WLAN-Kameras für drinnen oder draußen, mit oder ohne Stromanschluss und mit Cloud-Anbindung oder Speicherung auf Micro-SD-Karte, in unauffällig oder abschreckend: Das Angebot an Videoüberwachungssystemen für den Heimbedarf ist groß. Menschen wollen sich mit Kameras gegen Einbrüche schützen, doch das richtige System für den eigenen Fall zu finden, ist nicht leicht. Für Ausgabe 21/2025 haben c't-Redakteur Christof Windeck und c't-Autor Berti Kolbow-Lehradt gemeinsam mit weiteren Kolleginnen und Kollegen einen Leitfaden zum Thema zusammengetragen. Im c't uplink sprechen sie darüber, was Videoüberwachung bringen und was dabei schieflaufen kann, sie umreißen, wozu die Polizei rät und was rechtlich überhaupt erlaubt ist. Außerdem geben sie Tipps, wie man die richtige Kamera für sich findet. ► Die besprochene Artikelstrecke zum Thema Videoüberwachung gegen Einbrecher in c't 21/2025 (Paywall): https://www.heise.de/select/ct/2025/21/2515714333394918039
Send us a textWe pick up the live stream after a rough month and dive straight into the most asked questions on getting into limited energy: tools, licenses, certifications, first-day tactics, site safety, career ladders, and the real work behind the title. Along the way, we flag code changes for 2026, unravel myths about sprinklers, and share practical tips to stand out from day one.• limited energy rebrand, PBB acronym, upcoming episodes on 2026 code and extended Ethernet• what counts as low voltage across structured cabling, access control, DAS, fire alarm, fiber• PoE beyond access points, smart buildings, IoT as growth paths• licensing differences for workers vs companies, union considerations• when to buy tools, buy once buy right, what basics to expect• BICSI Tech prep, FiberU.org, test-only pitfalls, cost reality• certifications vs on-the-job learning, signaling commitment• entry roles, quality checks, documenting and communicating• daily life: early starts, PPE, lifts, crawlspaces, teamwork with other trades• career ladder from helper to PM to leadership, specialization options• construction site rules and culture, safety orientations, logistics• mistakes to avoid: not listening, rushing, poor labeling, cable protection• sprinkler pipe code reminder: nothing touches, compliance first• first-day playbook: arrive early, ask questions, write notes, quality before speedSupport the showKnowledge is power! Make sure to stop by the webpage to buy me a cup of coffee or support the show at https://linktr.ee/letstalkcabling . Also if you would like to be a guest on the show or have a topic for discussion send me an email at chuck@letstalkcabling.com Chuck Bowser RCDD TECH#CBRCDD #RCDD
On this episode of the Rewind show we go back to September 30th 2011 where we read your emails, look at a news story or two, and review an HDMI over ethernet extender.
The group discussed various aspects of the music and entertainment industry, including recent performances, technical challenges, and historical experiences working with famous musicians. They explored topics such as audio equipment, mixing techniques, and the evolution of live sound production, while sharing personal anecdotes and industry insights. The conversation concluded with discussions about upcoming events, the changing landscape of audio technology, and the logistics of large-scale music productions.Next stepsThe next steps section is empty, so there are no action items to summarize and rank.SummaryMusicians' Experiences and PerformancesThe group discussed various topics, including Wayne Sims's recent work with the Blues Roadshow, which involved eight guitar players performing simultaneously. They also talked about Barry Manilow's ongoing career at age 82 and his energetic performances. The conversation shifted to past experiences working with famous musicians, with Bruce and Wayne sharing stories about difficult encounters with drummers like Buddy Rich. The group also briefly discussed a fundraising event they had worked on together in the past.Challenges of Celebrity and MediaThe group discussed the challenges faced by celebrities, particularly child stars, and how fame can affect their demeanor and careers. They also talked about audio setup issues and technical adjustments for a live stream. The conversation briefly touched on the situation with Jimmy Kimmel and the role of politics in late-night talk shows, but Jan stopped the discussion before it could become too political. The conversation ended with a brief discussion about the shift towards streaming media and its impact on traditional broadcast ratings.Music Industry and Concert TrendsThe group discussed various topics including concert ticket prices, the changing music industry, and upcoming tours. Ken shared his experience attending Paul McCartney's concert in Las Vegas, while Curt explained his involvement in setting up equipment for The Who's tour. The conversation touched on the high costs of concert productions and the shift in the music industry from album sales to live performances for revenue. Jan mentioned a TikTok prediction of the world ending by September, which led to some lighthearted banter. Fred announced he would be away for a few weeks due to travel. The group also briefly discussed a potential concert by a band named Hotel California in Canada, which David Dansky clarified was not his band.Music Copyright and Tech UpdatesThe group discussed copyright issues, particularly regarding the Eagles' strict enforcement of their music rights, with Jan sharing a story about a company that could only use "Hotel California" in Japan due to licensing restrictions. Christopher explained the concept of fair use, noting that news outlets can use up to 7-8 seconds of music without permission, while Ken inquired about the rules for live performances. The conversation then shifted to technical matters, with Curt seeking advice about digital whiteboards for his shop, and Jan recommending Office Hours Global as a resource. The conversation ended with Christopher providing an update on the Pacific Palisades fire situation, noting that the permit process was taking longer than usual and land prices had dropped by 25-30% in the area.Cedar vs. Waves Noise ReductionThe group discussed noise reduction equipment, comparing the Waves WNS plugin to Cedar audio devices. Wayne explained that while the WNS is less expensive at $35, it doesn't work as well as the Cedar units, which are more expensive but offer better customization with 6 frequency bands. Bruce shared that a 2-channel Cedar unit cost around $4,000 several years ago, while Denis noted that a 2-channel 5045 unit currently costs $2,000. The discussion concluded with Denis sharing information about a DNS 8-channel Cedar unit priced at around $7,000 Canadian.Audio Technology Evolution and SolutionsThe group discussed the evolution of audio technology, with Bruce sharing his experience transitioning from analog to digital consoles and the challenges of managing multiple audio sources in corporate events. Wayne demonstrated a more cost-effective alternative to the Cedar audio noise suppressor unit, and the conversation touched on the practicalities of using EtherCon connectors and Ethernet cables in live sound applications. The discussion concluded with recommendations for adapter solutions to handle different cable types and connector standards in various audio systems.Digital vs Analog Mixing InsightsThe group discussed the differences between analog and digital mixers, with Wayne emphasizing the need for proactive thinking in digital mixing rather than reactive adjustments. Bruce shared his technique of using "home buttons" on digital consoles to navigate back to familiar settings, while Denis recounted a humorous story about a water incident at the Montreal Jazz Festival that highlighted the complexity of digital mixing. The conversation concluded with Bruce and Wayne exchanging stories about their experiences with digital consoles, including a water damage incident at a Phoenix event where Bruce was able to recover the setup using a saved configuration on a thumb drive.LCR Audio Mixing TechniquesThe group discussed mixing techniques for left-center-right (LCR) audio systems in theaters. Bruce inquired about optimal ways to pan vocals and instruments, leading to a discussion about placing vocals in the center and panning band members to the stereo sides. Denis explained the use of a "divergence" feature on LCR consoles to control how much of the center signal goes to the left and right channels. The conversation also covered the challenges of using center clusters, including coverage issues and the need for proper mixing techniques. Wayne Sims shared an experience using a matrixed LCR setup in a theater in Port Macquarie, which resulted in a seamless audio experience during a spoken word performance.Isolation Transformers in Audio SystemsThe group discussed the importance of isolation transformers in audio systems, particularly during the transition from analog to digital in the late 90s. Wayne Sims shared his experience with creating audio loops and the challenges of working without isolation transformers, while Bruce and Wayne Pierce highlighted the effectiveness of carrying heavy isolation transformers to ensure clean power for audio and lighting systems. Denis inquired about transformers with variable R or Q factors, which Wayne and Wayne Pierce researched, finding that these factors relate to insulation and impedance, though the exact details were unclear. The conversation concluded with a lighthearted mention of the Pink Panther movies and a brief discussion about transformer taps and their function in adjusting output voltage.Music Production and Event PlanningThe meeting participants discussed various topics, including WORLD Dream Day, upcoming events, and personal updates. Jan mentioned speaking with Sean, who expressed interest in participating in an unspecified activity and will follow up with Kurt. The group also talked about the logistics and scale of large music productions, with Joshua sharing experiences from recent concerts and events. Wayne Sims shared his thoughts on the increasing complexity and technology involved in modern live sound productions.Musicians' Tech Evolution and ChallengesJoshua shared his experience working with various bands and venues, highlighting how technology has changed the industry, making it easier for musicians to travel with minimal equipment. He discussed his recent show setup, including challenges with lighting and sound equipment, and how he managed to deliver a successful performance despite some technical issues. The conversation...
Our discussion with Jeff Carlson about his newest release, Take Control of Your Digital Storage, to discuss network-attached storage, memory cards as storage options, and the evolving challenges of digital storage. He explains practical trade-offs between direct-connect drives, NAS, and portable media, highlighting security and performance considerations. Jeff also shares his new role at CNET, where he covers mobile tech and photography, including hands-on testing of the Pixel 10 Pro XL. This edition of MacVoices is brought to you by our Patreon supporters. Get access to the MacVoices Slack and MacVoices After Dark by joining in at Patreon.com/macvoices. Show Notes: Chapters: [0:00] Introduction and NAS pros and cons[1:38] Synology experiences and setup challenges[3:46] Using SSDs with NAS and “sneaker-net” transfers[5:00] Ethernet speeds and NAS performance[6:19] Balancing direct-connect vs network-attached storage[7:59] Cost, drive types, and replacement concerns[9:12] Memory cards as storage and performance trade-offs[10:36] Risks of using SD cards for regular file work[12:52] Alternative setups with docks and card readers[14:10] Book details and Take Control Premium[15:56] Jeff's new role at CNET[18:31] Covering mobile tech and writing for CNET[19:48] Testing the Pixel 10 Pro XL camera[21:20] AI-powered zoom and photography advances[23:44] Balancing AI with traditional photo quality[25:07] On-device AI processing and security[27:01] Security always a core concern[27:25] Where to find Jeff Carlson's work Links: Take Control of Your Digital Storage Guests: Jeff Carlson is an author, photographer, and freelance writer. Among many other projects, he publishes the Smarter Image newsletter, which explores how computational photography, AI, and machine learning are fundamentally changing the art and science of photography. He's covered the personal technology field from Macs and PalmPilots to iPhones and mirrorless cameras, publishing in paper magazines, printed books, ebooks, and websites. He's also the co-host of the podcasts PhotoActive, writes for Take Control, has spoken at several conferences and events. He lives in Seattle, where, yes, it is just as gray and wet and coffee-infused as you think it is. Catch up with everything he's doing at JeffCarlson.com. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Our discussion with Jeff Carlson about his newest release, Take Control of Your Digital Storage, continues with network-attached storage, memory cards as storage options, and the evolving challenges of digital storage. He explains practical trade-offs between direct-connect drives, NAS, and portable media, highlighting security and performance considerations. Jeff also shares his new role at CNET, where he covers mobile tech and photography, including hands-on testing of the Pixel 10 Pro XL. This edition of MacVoices is brought to you by our Patreon supporters. Get access to the MacVoices Slack and MacVoices After Dark by joining in at Patreon.com/macvoices. Show Notes: Chapters: [0:00] Introduction and NAS pros and cons [1:38] Synology experiences and setup challenges [3:46] Using SSDs with NAS and “sneaker-net” transfers [5:00] Ethernet speeds and NAS performance [6:19] Balancing direct-connect vs network-attached storage [7:59] Cost, drive types, and replacement concerns [9:12] Memory cards as storage and performance trade-offs [10:36] Risks of using SD cards for regular file work [12:52] Alternative setups with docks and card readers [14:10] Book details and Take Control Premium [15:56] Jeff's new role at CNET [18:31] Covering mobile tech and writing for CNET [19:48] Testing the Pixel 10 Pro XL camera [21:20] AI-powered zoom and photography advances [23:44] Balancing AI with traditional photo quality [25:07] On-device AI processing and security [27:01] Security always a core concern [27:25] Where to find Jeff Carlson's work Links: Take Control of Your Digital Storage Guests: Jeff Carlson is an author, photographer, and freelance writer. Among many other projects, he publishes the Smarter Image newsletter, which explores how computational photography, AI, and machine learning are fundamentally changing the art and science of photography. He's covered the personal technology field from Macs and PalmPilots to iPhones and mirrorless cameras, publishing in paper magazines, printed books, ebooks, and websites. He's also the co-host of the podcasts PhotoActive, writes for Take Control, has spoken at several conferences and events. He lives in Seattle, where, yes, it is just as gray and wet and coffee-infused as you think it is. Catch up with everything he's doing at JeffCarlson.com. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Jeff Carlson takes on the latest information in the newly updated Take Control of Your Digital Storage. Topics include choosing SSD vs HDD and NVMe, when Thunderbolt 5 matters, APFS basics, and why cables and enclosures affect speed and reliability. They cover backup strategies, OWC DIY builds, iOS/iPadOS Files support for external drives, NAS pros/cons, and even using SD cards—when it's smart, and when it's not. This MacVoices is supported by OpenCase. MagSafe Perfected. Use the code “macvoices” to save 10% at TheOpenCase.com Show Notes: Chapters: [0:00] Welcome and why storage knowledge matters [1:13] New edition: Take Control of Digital Storage [2:15] When storage goes wrong: errors, space, missing files [3:25] APFS, Finder free space, and modern Mac limits [5:46] SSD vs HDD; Thunderbolt 5 reality checks [7:55] NVMe terms, enclosures, and choosing wisely [9:13] Do you actually need max speed? [10:24] Photographer's perspective on “want vs need” [12:19] Cable chaos: labeling, charging vs data rates [16:43] Backup strategy: fast vs affordable drives [19:03] DIY builds with OWC; reliability over bargain boxes [26:02] iOS/iPadOS Files: formatting and managing externals [29:53] NAS basics: use cases, speed, and security cautions [33:41] “Sneaker-net” to NAS and Ethernet options [37:32] SD cards as storage: pros, cons, and lifespan [43:21] Pricing, page count, and where to learn more Links: Take Control of Your Digital Storage Guests: Jeff Carlson is an author, photographer, and freelance writer. Among many other projects, he publishes the Smarter Image newsletter, which explores how computational photography, AI, and machine learning are fundamentally changing the art and science of photography. He's covered the personal technology field from Macs and PalmPilots to iPhones and mirrorless cameras, publishing in paper magazines, printed books, ebooks, and websites. He's also the co-host of the podcasts PhotoActive, writes for Take Control, has spoken at several conferences and events. He lives in Seattle, where, yes, it is just as gray and wet and coffee-infused as you think it is. Catch up with everything he's doing at JeffCarlson.com. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Jeff Carlson takes on the latest information in the newly updated Take Control of Your Digital Storage. Topics include choosing SSD vs HDD and NVMe, when Thunderbolt 5 matters, APFS basics, and why cables and enclosures affect speed and reliability. They cover backup strategies, OWC DIY builds, iOS/iPadOS Files support for external drives, NAS pros/cons, and even using SD cards—when it's smart, and when it's not. This MacVoices is supported by OpenCase. MagSafe Perfected. Use the code “macvoices” to save 10% at TheOpenCase.com Show Notes: Chapters: [0:00] Welcome and why storage knowledge matters [1:13] New edition: Take Control of Digital Storage [2:15] When storage goes wrong: errors, space, missing files [3:25] APFS, Finder free space, and modern Mac limits [5:46] SSD vs HDD; Thunderbolt 5 reality checks [7:55] NVMe terms, enclosures, and choosing wisely [9:13] Do you actually need max speed? [10:24] Photographer's perspective on “want vs need” [12:19] Cable chaos: labeling, charging vs data rates [16:43] Backup strategy: fast vs affordable drives [19:03] DIY builds with OWC; reliability over bargain boxes [26:02] iOS/iPadOS Files: formatting and managing externals [29:53] NAS basics: use cases, speed, and security cautions [33:41] “Sneaker-net” to NAS and Ethernet options [37:32] SD cards as storage: pros, cons, and lifespan [43:21] Pricing, page count, and where to learn more Links: Take Control of Your Digital Storage Guests: Jeff Carlson is an author, photographer, and freelance writer. Among many other projects, he publishes the Smarter Image newsletter, which explores how computational photography, AI, and machine learning are fundamentally changing the art and science of photography. He's covered the personal technology field from Macs and PalmPilots to iPhones and mirrorless cameras, publishing in paper magazines, printed books, ebooks, and websites. He's also the co-host of the podcasts PhotoActive, writes for Take Control, has spoken at several conferences and events. He lives in Seattle, where, yes, it is just as gray and wet and coffee-infused as you think it is. Catch up with everything he's doing at JeffCarlson.com. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
This week we cover the first alpha release of KDE Linux, OpenRGB's new home on Codeberg, Canonical adding CUDA to the Ubuntu repositories, and a clever Waveshare add-on that brings Ethernet and USB ports to the Raspberry Pi Zero without dongles.
Давайте разбираться, что отличает свитч от хаба, как Ethernet стал тем, каким мы его знаем сегодня, и за что мы должны быть благодарны маркетологам Kalpana. Оставайтесь на связи Кто мы такие: https://linkmeup.ru/about/ Пишите нам: info@linkmeup.ru Канал в телеграме: https://t.me/donasdoshlo. Приходите обсуждать и предлагать. Плейлист подкаста на Youtube Поддержите проект:
Ben and Jay unpack why Broadcom's “fourth customer” (~$10B) custom-ASIC win reset sentiment even after a modest beat/raise, and how that squares with hyperscalers second-sourcing away from NVIDIA in the near term. They frame the true battleground as networking—Ethernet's ubiquity vs. NVLink's tight integration—then differentiate GPUs' performance-per-watt advantages from custom ASIC cost calculus, arguing that “lumpiness” (program outcomes) is not “cyclicality” (inventory swings). They stress TAM realism: it's easy to total up CapEx, but the ROI numerator (revenue/profit) is still unknowable. Structurally, TSMC remains the default winner, with a plausible Intel Foundry financing path in the wings, while Google looks more likely to “sell capacity” for TPUs than chips. Net: GPUs keep the bulk of spend through 2030 even as select first-party silicon scales, and the market should judge claims against networking choices and workload fit—not headlines.
It has become a de facto standard in plants and machines for interconnecting systems and in fact individual devices. So, what happens when it fails? What would make it fail? In this episode of Control Intelligence, written by contributing editor Jeremy Pollard, editor in chief Mike Bacidore network-troubleshoots dos and don'ts.
rWotD Episode 3038: Nikon Coolpix P6000 Welcome to random Wiki of the Day, your journey through Wikipedia's vast and varied content, one random article at a time.The random article for Thursday, 28 August 2025, is Nikon Coolpix P6000.The Coolpix P6000 is a digital camera introduced by the Nikon Corporation in August 2008.The built-in GPS (to support geocoding photos automatically) is a first in its price-range.The Ethernet port is also an unusual feature, but the camera is configured to only allow access to Nikon's My Picturetown online photo service.The P6000 was succeeded in 2010 by the larger Coolpix P7000 which lacks GPS.This recording reflects the Wikipedia text as of 00:46 UTC on Thursday, 28 August 2025.For the full current version of the article, see Nikon Coolpix P6000 on Wikipedia.This podcast uses content from Wikipedia under the Creative Commons Attribution-ShareAlike License.Visit our archives at wikioftheday.com and subscribe to stay updated on new episodes.Follow us on Mastodon at @wikioftheday@masto.ai.Also check out Curmudgeon's Corner, a current events podcast.Until next time, I'm generative Ruth.
Send us a textBreaking beyond the conventional 100-meter cable limit isn't just possible—it's becoming essential in today's expanding network environments. This deep dive into extended distance cabling reveals how manufacturers are pushing boundaries with specialized solutions that extend connectivity to 150-200 meters without sacrificing reliability.Steve Cowles steps in for Chuck to explore the critical factors that make extended distance cabling work. From the fundamentals of heavier gauge conductors to the crucial role of DC resistance unbalance (DCRU) in maintaining Power over Ethernet performance, you'll gain practical insights into when and how to implement these non-standard yet vital solutions. The discussion highlights why proper testing methodologies matter, how termination hardware selection affects extended distance performance, and why not all network equipment responds equally well to longer cable runs.The conversation takes an exciting turn toward Single-Pair Ethernet (SPE)—a fully standardized alternative that stretches connectivity to an astonishing 1,000 meters while delivering power and 10Mbps bandwidth. Perfect for cameras, sensors, and access control systems, SPE represents the future for many specialized applications. Steve breaks down the power delivery capabilities at various distances and explains the unique testing requirements that differ significantly from traditional four-pair certification.Whether you're struggling with that one device just beyond standard reach or designing systems for sprawling industrial environments, this episode equips you with the knowledge to confidently implement extended distance solutions. Subscribe to Let's Talk Cabling for more expert insights that bridge the gap between industry standards and real-world networking challenges.Support the showKnowledge is power! Make sure to stop by the webpage to buy me a cup of coffee or support the show at https://linktr.ee/letstalkcabling . Also if you would like to be a guest on the show or have a topic for discussion send me an email at chuck@letstalkcabling.com Chuck Bowser RCDD TECH#CBRCDD #RCDD
Phil Seboa and Ed Fuentes sit down with Melvin Francis, a research-driven engineer and technical marketing leader at BE Services, for a packed conversation on the realities of real-time industrial automation, edge AI, and the technical leaps powering Industry 4.0. Melvin shares his hands-on journey from developing open-source real-time Ethernet protocols in India to driving innovation in Germany's advanced manufacturing sector.This episode covers the critical distinction between real-time performance and speed in OT environments, the impact of edge AI on traditional cloud models, and the emerging value of time-sensitive networking (TSN) for seamless integration of IT and OT data flows. Melvin offers firsthand anecdotes, technical clarity, and live walkthroughs—including a look at BE Services' AIoT edge solution—while discussing practical approaches for modernizing brownfield systems, achieving high-precision motion control, and bridging the skills gap in industrial digitalization. Perfect for engineers, automation leaders, and anyone seeking a practical perspective on the challenges and opportunities of modern industrial networks.Connect with Melvin on LinkedIn: https://www.linkedin.com/in/melvin-francis/Connect with Phil on LinkedIn:https://www.linkedin.com/in/phil-seboa/Connect with Ed on LinkedIn: https://www.linkedin.com/in/ed-fuentes-2046121a/About Industry Sage Media:Industry Sage Media is your backstage pass to industry experts and the conversations that are shaping the future of the manufacturing industry.Learn more at: http://www.industrysagemedia.com
Встречайте историю Ethernet до эры коммутаторов: как создавался стандарт, какие проблемы решали инженеры на практике, что происходило на пути от первых сетей Xerox к массовому внедрению в офисах и университетах, и почему архитектурные решения тех времён определили будущее связных технологий. Оставайтесь на связи Кто мы такие: https://linkmeup.ru/about/ Пишите нам: info@linkmeup.ru Канал в телеграме: https://t.me/donasdoshlo. Приходите обсуждать и предлагать. Плейлист подкаста на Youtube Поддержите проект:
Send us a textChuck Bowser, RCDD, shares essential knowledge for those transitioning from traditional electrical work to the specialized world of low voltage and ICT installation. His comprehensive guide covers critical resources, industry standards, and career development strategies.• FOA Reference Guides provide clear explanations with diagrams for fiber optic theory, connectors, and testing• Electricians should study NEC Articles 725, 760, 726, 770 and Chapter 8 for low voltage applications • BICSI manuals like ITSIM and TDMM offer detailed guidelines for installation techniques and design standards• Hands-on practice with termination kits and tools is essential before working in production environments• Successful transition requires shifting from code-centric thinking to standards-driven performance mindset• J-hook installation requires wide bases, under 50 cables per hook, proper spacing, and mounting to structural supports• RCDD candidates with field experience have a significant advantage when entering the design profession• New technologies like fault-managed power systems and single-pair Ethernet represent exciting opportunitiesContact me to discuss chapter 10 of the TDMM or other questions about your RCDD preparation. Join me at BICSI Beyond in Las Vegas!Support the showKnowledge is power! Make sure to stop by the webpage to buy me a cup of coffee or support the show at https://linktr.ee/letstalkcabling . Also if you would like to be a guest on the show or have a topic for discussion send me an email at chuck@letstalkcabling.com Chuck Bowser RCDD TECH#CBRCDD #RCDD
In this Telemetry News Now episode, Phil Gervasi and Justin Ryburn tackle Intel's plan to spin off its Network & Edge Group (NEX) and what it means for high‑performance Ethernet NICs, examine Cisco's new partnership with Hugging Face to scan every open‑source AI model for malware, and break down Broadcom's Jericho4 fabric router—bringing 3.2 Tb/s “hyper‑ports” to distributed AI clusters. The hosts also discuss the real‑world state of SD‑WAN adoption, Palo Alto Networks' $25 B CyberArk acquisition, Cisco's quantum‑networking research, and upcoming industry events. Plus: a personal tale of basement‑automation triumph to kick things off.
Real Life Devon Gone again, off doing what families do. Probably eating responsibly and not playing Magic with middle schoolers. We'll get a full download when he returns from the wilds of familial bonding. Steven Steven melted in Palm Springs last weekend. Like, cartoon puddle of clothes and glasses melted. It hit 112°F, and not in the fun "desert dry heat" way—it was more like a hairdryer set to regret. But he survived the heat and a surprise 65th birthday party for his mother-in-law. (Note: surprise party for a 65-year-old in 112-degree weather? Bold.) To escape the heat and socializing, Steven brought along Timeline by Michael Crichton, tore through the whole thing, and now he won't stop recommending it. According to him, it's “a pleasant, rollicking adventure of death and destruction in the Middle Ages.” Classic beach read, if your beach has trebuchets. Ben Ben relived his childhood glory this week by annihilating two 12-year-olds at Magic: The Gathering. Old deck, newer rules, zero mercy. He's still basking in the smug warmth of that victory and considering building a commemorative statue of himself out of old booster packs. In nerdier news, Ben continues to experiment with Bazzite OS, a Linux distro that somehow convinced Forza Horizon 5 to run smoothly. He also tried out Wheel World, a cell-shaded, bike-themed Zelda-like that nobody asked for, but he's glad it exists. Streaming from PC to handheld? He recommends: Install Sunshine on your PC Install Moonlight on your handheld device Plug in with Ethernet if you can Pray to the latency gods It's working so far. Maybe this is the future. Maybe this is now. Future or Now Ben brought in a fascinating bit of anti-AI-fakery this week. Researchers at Cornell have developed a way to embed invisible “codes” into light, which act as hidden watermarks in videos. Basically: lighting at press conferences, buildings, or even Zoom calls could carry encrypted signals that make it easy to verify video authenticity later. It's subtle, elegant, and extremely cyberpunk. The best part? You won't notice the difference. But your editing software will. Check it out:
Another week, another Hackaday podcast, and for this one Elliot is joined by Jenny List, fresh from the BornHack hacker camp in Denmark. There's a definite metal working flavour to this week's picks, with new and exciting CNC techniques and a selective electroplater that can transfer bitmaps to metal. But worry not, there's plenty more to tease the ear, with one of the nicest cyberdecks we've ever seen, and a bird that can store images in its song. Standout quick hacks are a synth that makes sounds from Ethernet packets, and the revelation that the original PlayStation is now old enough to need replacement motherboards. Finally we take a closer look at the huge effort that goes in to monitoring America's high voltage power infrastructure, and some concerning privacy news from the UK. Have a listen!
In this episode, Raj Singh, multi-time founder and current VP of Product at Mozilla, opens up about the moments that nearly unraveled his career. From getting called into HR over a side hustle to walking away from a startup after being unexpectedly leveled, Raj shares what it's like to navigate the highs and lows of building without losing your identity.He walks us through multiple pivots, including the time he turned down a seven-figure exit and the brutal leadership decision that nearly cost him a co-founder. Raj doesn't just talk strategy, he gets into the emotional rollercoaster of founding: the resentment, the rejections, and the real mental toll of being the one expected to have all the answers.In this conversation, you'll learn:-Why being a “do-it-all” founder doesn't scale-How to manage resentment when you get leveled-What it really takes to make hard calls when no one agrees with youThings to listen for:(00:00) Intro(01:04) Meet Raj and his startup resume(02:02) Growing up in the Bay(04:05) First hustle: installing Ethernet cards(07:54) Early failures and impostor syndrome(09:11) Picking product vs. engineering(10:06) Thanks to our sponsors, Navattic & Appcues(12:49) HR call over a side project(16:23) Fear, risk, and side hustles(24:35) Leaving a startup after a new hire(29:01) Facing public failure as CEO(30:06) Rise of IC tracks and redefining success(34:08) Hardest call of his career(44:41) Power of incentives(47:33) His video game theory of growth(52:06) The real risk: not improving(56:00) There's never a perfect timeThis episode is presented by:Navattic: Interactive Product Demo Software - https://navattic.com/value Appcues: User Engagement for SaaS - https://appcues.com/value Resources:Connect with Raj:LinkedIn: https://www.linkedin.com/in/rajansingh/Linktree: https://linktr.ee/mobilerajX: https://x.com/mobilerajMozilla: https://www.mozilla.org/en-US/Connect with Andrew:LinkedIn: https://www.linkedin.com/in/andrewcapland/ Substack: https://media.deliveringvalue.coHire Andrew as your coach: https://deliveringvalue.co/coaching
In this episode of Manufacturing Hub, we welcome back Pawel Krupa, founder of the Future Robotics YouTube channel, to dive deep into the rapidly evolving world of industrial robotics. With over a decade of hands-on experience integrating and programming systems from Fanuc, KUKA, and others, Pawel shares exclusive insights on some of the biggest changes reshaping robotics in 2025. These changes are not just cosmetic updates; they are being driven by new ISO standards and increasing cybersecurity requirements across industrial automation.We explore the hardware and software changes coming to Fanuc's R-50iA cabinet, including multiple Ethernet ports, enhanced vision systems with built-in lighting, and a groundbreaking integration of Python for native robot programming. KUKA is also undergoing a major transformation with its KC5 slim cabinet and KUKA iiQ OS, a Linux-based control system with new UI, simulation environments, and plug-and-play capabilities. These updates signify a paradigm shift where robots become not only smarter and safer, but far easier to configure, maintain, and upgrade.The conversation expands into one of the most talked-about frontiers in robotics: humanoid robots. Are they just hype or do they have a real role to play in industrial environments? We assess the business case for humanoids, especially in facilities where traditional automation has been financially unjustifiable. From handling tasks like herb sorting in food production to stepping into high-risk environments, humanoids may soon bridge the automation gap in low-throughput, labor-intensive workflows.We also explore how AI is influencing robot deployment, from edge vision systems to cycle time optimization. Pawel outlines how drag-and-drop AI-powered tools are slashing development time for vision systems from hours to minutes, while also lowering the barrier to entry for those without years of machine vision experience. Vision systems that used to require complex calibration and scripting are now being trained on real-time images or CAD models, making robotic integration faster and more accessible than ever.Finally, we close with actionable startup ideas and a bold look into the future of collaborative robots, AI, and hybrid ecosystems of humanoids and industrial arms working side-by-side. If you're in automation, manufacturing, or considering a robotics venture, this episode is packed with strategic insight, technical knowledge, and forward-thinking ideas you won't want to miss.
“AI is a distributed system — and the network is the computer,” says Ram Velaga, senior vice president of Broadcom's Core Switching Group. In this episode of Tech Disruptors, Velaga joins Bloomberg Intelligence's Kunjan Sobhani to explain how Ethernet is expanding from scale-out AI networking into the scale-up domain, challenging proprietary solutions like NVLink and Infiniband. The discussion covers Broadcom's Tomahawk 6 and Ultra product lines, its open SUE spec, and why simplicity, bandwidth and vendor neutrality may shape the next generation of AI infrastructure.
Today on Karma Stories, we're diving into the world of everyday IT chaos and triumph. From a $45 fix that involved nothing more than closing Chrome, to a boss learning the hard way why PC migrations aren't so simple, these tech tales are as frustrating as they are hilarious. We also explore the oddball logic of users who think unplugging Ethernet cables counts as cybersecurity. Whether you're a seasoned IT pro or just love seeing tech support win, this one's for you.Submit your own stories to KarmaStoriesPod@gmail.com.Karma Stories is available on all major Podcasting Platforms and on YouTube under the @KarmaStoriesPodcast handle. We cover stories from popular Reddit Subreddits like Entitled Parents, Tales From Tech Support, Pro Revenge and Malicious Compliance. You can find new uploads here every single day of the week!Rob's 3D Printing Site: https://Dangly3D.comGet your Custom Hand Turned Pen by Rob at https://CanadianRob.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/karma-stories--5098578/support.
Send us a textWe're back in the home studio after a brief hiatus to share updates and answer your burning questions about low-voltage cabling, career development, and business strategies.• Upcoming episodes include features on Polywater's cable jacket repair kit and fault managed power systems• Telecommunications Equipment Center (TEC) is the healthcare facility equivalent of an entrance facility, located in non-sterile areas• Career advancement requires treating low voltage as a career rather than just a job• Consider pursuing BICSI Installer 2, OSHA 30, network certifications, and cross-training in security or AV• The 100-meter Ethernet cable limit is due to signal attenuation, not collision concerns• Trust your gut when dealing with new clients and don't discount based on promises of future work• Build adaptability by developing a learning mindset rather than just technical skillsets• Watch at least one industry webinar monthly to maintain continuous learning habits• BICSI RCDD certification courses through providers like CET Networking can cost $900-1700 but provide valuable preparationJoin us every Wednesday at 6 PM Eastern for After Hours Live, where you can ask your favorite RCDD questions about installation, design, project management, and career paths.Support the showKnowledge is power! Make sure to stop by the webpage to buy me a cup of coffee or support the show at https://linktr.ee/letstalkcabling . Also if you would like to be a guest on the show or have a topic for discussion send me an email at chuck@letstalkcabling.com Chuck Bowser RCDD TECH#CBRCDD #RCDD
The digital geography of America is shifting, and in Wichita, Kansas, that shift just became tangible. In a groundbreaking ceremony this spring, Connected Nation and Wichita State University launched construction on the state's first carrier-neutral Internet Exchange Point (IXP), a modular facility designed to serve as the heart of regional interconnection. When completed, the site will create the lowest-latency, highest-resilience internet hub in Kansas, a future-forward interconnection point positioned to drive down costs, enhance performance, and unlock critical capabilities for cloud and AI services across the Midwest. In this episode of The Data Center Frontier Show podcast, I sat down with two of the leaders behind this transformative project: Tom Ferree, Chairman and CEO of Connected Nation (CN), and Hunter Newby, co-founder of CNIXP and a veteran pioneer of neutral interconnection infrastructure. Together, they outlined how this facility in Wichita is more than a local improvement, it's a national proof-of-concept. “This is a foundation,” Ferree said. “We are literally bringing the internet to Wichita, and that has profound implications for performance, equity, and future participation in the digital economy.” A Marriage of Mission and Know-How The Wichita IXP is being developed by Connected Nation Internet Exchange Points, LLC (CNIXP), a joint venture between the nonprofit Connected Nation and Hunter Newby's Newby Ventures. The project is supported by a $5 million state grant from Governor Laura Kelly's broadband infrastructure package, with Wichita State providing a 40-year ground lease adjacent to its Innovation Campus. For Ferree, this partnership represents a synthesis of purpose. “Connected Nation has always been about closing the digital divide in all its forms, geographic, economic, and educational,” he explained. “What Hunter brings is two decades of experience in building and owning carrier-neutral interconnection facilities, from New York to Atlanta and beyond. Together, we've formed something that's not only technically rigorous, but mission-aligned.” “This isn't just a building,” Ferree added. “It's a gateway to economic empowerment for communities that have historically been left behind.” Closing the Infrastructure Gap Newby, who's built and acquired more than two dozen interconnection facilities over the years, including 60 Hudson Street in New York and 56 Marietta Street in Atlanta, said Wichita represents a different kind of challenge: starting from scratch in a region with no existing IXP. “There are still 14 states in the U.S. without an in-state Internet exchange,” he said. “Kansas was one of them. And Wichita, despite being the state's largest city, had no neutral meetpoint. All their IP traffic was backhauled out to Kansas City, Missouri. That's an architectural flaw, and it adds cost and latency.” Newby described how his discovery process, poring over long-haul fiber maps, researching where neutral infrastructure did not exist, ultimately led him to connect with Ferree and the Connected Nation team. “What Connected Nation was missing was neutral real estate for networks to meet,” he said. “What I was looking for was a way to apply what I know to rural and underserved areas. That's how we came together.” The AI Imperative: Localizing Latency While IXPs have long played a key role in optimizing traffic exchange, their relevance has surged in the age of AI, particularly AI inference workloads, which require sub–3 millisecond round-trip delays to operate in real time. Newby illustrated this with a high-stakes use case: fraud detection at major banks using AI models running on Nvidia Blackwell chips. “These systems need to validate a transaction at the keystroke. If the latency is too high, if you're routing traffic out of state to validate it, it doesn't work. The fraud gets through. You can't protect people.” “It's not just about faster Netflix anymore,” he said. “It's about whether or not next-gen applications even function in a given place.” In this light, the IXP becomes not just a cost-saver, but an enabler, a prerequisite for AI, cloud, telehealth, autonomous systems, and countless other latency-sensitive services to operate effectively in smaller markets. From Terminology to Technology: What an IXP Is Part of Newby's mission has been helping communities, policymakers, and enterprise leaders understand what an IXP actually is. Too often, the industry's terminology, “data center,” “meet-me room,” “carrier hotel”, obscures more than it clarifies. “Outside major cities, if you say ‘carrier hotel,' people think you're in the dating business,” Newby quipped. He broke it down simply: An Internet Exchange (IX) is the Ethernet switch that allows IP networks to directly peer via VLANs. An Internet Exchange Point (IXP) is the physical, neutral facility that houses the IX switch, along with all the supporting power, fiber, and cooling infrastructure needed to enable interconnection. The Wichita facility will be modular, storm-hardened, and future-proofed. It will include a secured meet-me area for fiber patching, a UPS-backed power room, hot/cold aisle containment, and a neutral conference and staging space. And at its core will sit a DE-CIX Ethernet switch, linking Wichita into the world's largest ecosystem of neutral exchanges. “DE-CIX is the fourth partner in this,” said Newby. “Their reputation, their technical capacity, their customer base, it's what elevates this IXP from a regional build-out to a globally connected platform.” Public Dollars, Private Leverage The Wichita IXP was made possible by public investment, but Ferree is quick to note that it's the kind of public investment that unlocks private capital and ongoing economic impact. “This is the Eisenhower moment for digital infrastructure,” he said, referencing both the interstate highway system and the Rural Electrification Act. “Without government's catalytic role, these markets don't emerge. But once the neutral facility is there, it invites networks, it invites cloud, it invites jobs.” As states begin to activate federal funds from the $42.5 billion BEAD (Broadband Equity, Access, and Deployment) program, Ferree believes more will follow Kansas's lead, and they should. “This isn't just about broadband access,” he said. “It's about building a digital economy in places that would otherwise be excluded from it. And that's an existential issue for rural America.” From Wichita to the Nation Ferree closed the podcast with a forward-looking perspective: the Wichita IXP is just the beginning. “We have 125 of these locations mapped across the U.S.,” he said. “And our partnerships with land-grant universities, state governments, and private operators are key to unlocking them.” By pairing national mission with technical rigor, and public funding with local opportunity, the Wichita IXP is blazing a trail for other states and regions to follow.
BOSSes Anne Ganguzza and Tom Dheere, your "real bosses" and co-hosts, connect to dive deep into the critical world of online security and scam prevention for voiceover professionals. They unpack Tom's recent harrowing experience with an AI voice cloning scam, offering a candid look into the crucial insights needed to navigate digital threats and build a truly secure business in today's landscape. Listeners will discover the essential role of vigilance and proactive measures in protecting their assets, gain an understanding of emerging scam tactics, and appreciate the power of community in safeguarding their careers. Anne and Tom also discuss practical pathways for secure transactions and the evolving nature of digital defense. 00:01 - Anne (Host) Hey guys, it's Anne from VO BOSS here. 00:04 - Speaker 2 (Announcement) And it's George the Tech. We're excited to tell you about the VO BOSS. Vip membership, now with even more benefits. 00:10 - Anne (Host) So not only do you get access to exclusive workshops and industry insights, but with our VIP plus tech tier, you'll enjoy specialized tech support from none other than George himself. 00:22 - Speaker 2 (Announcement) You got it. I'll help you tackle all those tricky tech issues so you can focus on what you do best Voice acting. It's tech support tailored for voiceover professionals like you. 00:32 - Anne (Host) Join us guys at VO BOSS and let's make your voiceover career soar. Visit voboss.com slash VIP-membership to sign up today. 00:45 - Speaker 3 (Announcement) It's time to take your business to the next level, the boss level. These are the premier business owner strategies and successes being utilized by the industry's top talent today. Rock your business like a boss, a VO boss. Now let's welcome your host, Anne Ganguzza. Hey, hey, everyone, welcome to the VO BOSS Podcast. 01:04 - Anne (Host) I'm your host, Anne Ganguzza. Hey, hey everyone, welcome to the VO BOSS Podcast. I'm your host, Anne Ganguzza, and I'm here with my real boss, Tom Deere. I had to think about that, Tom. We've been together so long. I was like what is our subtitle here? We are real bosses. 01:20 - Tom (Host) Yeah, we're real bosses. Thanks for having me back, Anne. 01:23 - Anne (Host) How are you doing, Tom, my real boss? Co-host. 01:26 - Tom (Host) All things considered, I'm doing okay, I had a weird experience recently which it seems like a lot of voice actors are experiencing. I got an email from someone expressing interest in wanting to cast me for a voiceover project. Oh yes, I looked at it and it was this long-form project, something like 9,000 and change words. And I looked at it and I'm like and you know I was reading the ins and outs of it and I'm like, huh, like my spider sense was tingling a little bit, but I'm looking at, I'm like this one is worth replying to and getting some information about. 02:00 So there was a little bit of back and forth about it. 02:03 - Anne (Host) So you did reply, and then there was. 02:05 - Tom (Host) There was more conversation. 02:06 - Anne (Host) Yeah, there was more conversation, which is what I always do when I'm trying to find out more information about a job to make sure it's legit. 02:12 - Tom (Host) Right Now, around the same time, maybe a couple of days after that, someone posted on a Facebook group hey, I got this email. It was saying this and this Did anyone else get it? Does it seem legit? And it looked like it was the same email that I had gotten, so I was following that it turns out. 02:28 It was posted by our friend, bridget Real, who is the co-founder of VA for VO, the virtual assistant site that helps voice actors, and we talked about it a little bit and we're both like, yeah, we're going to keep digging a little bit and see what's going on. And then her business partner, lynn, also got the email and I was getting ready to accept it just to see what would happen. And that morning I got a message from her saying hey, did you accept this project? Yet I'm like no, why? And she said because both of us accepted the project. We both got cast for the same exact project. We both got the same exact script. They sent me the script. 03:00 So then I did this. I went to Gemini, google Gemini, which is my AI bot of choice, and I did the prompts. I said you are an expert at detecting scams. Please analyze this script and let me know if you think that this script could be used to harvest a voice actor's voice to clone it. A voice actor's voice to clone it. And it did its analysis and I've got like the 2.5 advanced. So it takes a little time. And it wrote back oh, yes, it does. And here are all the reasons why this, this, this, this, this, this and this. And then I sent that information to Bridget and Lynn and they're like we knew it. We knew it. So then she created a wonderful post on LinkedIn talking about it. And then I wrote a blog with all the information and, like what happened, it was the most read blog I've had in like three years or something like that. 03:52 Yeah, it was crazy. 03:53 - Anne (Host) What's so interesting is it could have been a legit job, like for payment. You would have done it, they would have paid you for it, but they would have used your voice as an AI voice. 04:05 And so therefore, legally right in the end. Right, if you found out later on they could say, oh no, no, no, we paid you. I mean, it was a job that we paid you for and there was no extenuating circumstances or contracts to be signed which, by the way, I'm going to bring up Nava and the AI writer For all your jobs. You should be attaching that AI writer so that your voice is not going to be used as an AI voice, for sure, for sure. 04:37 - Tom (Host) So, to let everybody know, the website was GigLumin G-I-G-L-U-M-I-N. And if you do a Google search of GigLumin and this is what Bridget had figured out is that the website was only a month or two old. And there's these scam websites that you can enter the URL of a website in and it can tell you how likely that's a scam. It checked every red flag, every box, every single box. 04:56 - Anne (Host) So, yes, vo people, bosses, beware, right. So beware of emails. And you know, it's funny because it's lately, just because of the whole AI thing. Anytime I get an email with a job from someone that I don't know, right, that is just out of the blue, that I didn't audition for, where they have large amounts of words, the hairs on the back of my neck kind of stand up and I immediately, immediately check into it. And I think this really warrants a discussion, bosses, because it's very timely that you want to make sure that these jobs are legitimate. So the more research you can do. And I love, Tom Dheere, how you used AI to fight AI Again. 05:37 We had our previous episode on tools that we use. I mean, we are utilizing it as a tool to help us in our day-to-day jobs, and so I think, being aware of possible scams out there, we absolutely have to be, and I'll tell you if it's somebody that I've never heard of and they don't have a signature file. I've gotten to the point where I don't even like and it's not like from a company.com. I don't even literally take it seriously anymore. I don't know about you, Tom, what do you think? 06:05 - Tom (Host) Yes, I'm equally skeptical these days but, I, really like what you said about when you receive the email, check to see if there is a signature at the Tom of it with the company logo, website and contact information. That is one of many red flags and I don't know how much you've noticed lately, Anne, but since I would say about early April, there has been an explosion of scam attempts going on in the voiceover industry. We've had the overpayment scam. That's been going on for at least 10 or 15 years. 06:37 - Anne (Host) Gosh, at least, and bosses. If you haven't heard about it, Tom, let's talk about the overpayment scam for just a minute. Yeah, yeah, Okay so what happens is it's very common. 06:45 - Tom (Host) It's very common. It's been going on for a really long time. So basically they email you and say hey, we've got a project for you, da-da-da-da-da-da. The classic one was the game show host voiceover. 06:55 - Anne (Host) It has since evolved. 06:56 - Tom (Host) And basically they say that we've booked a studio in the area nearby. We're going to get paid or pay for the studio and then send us back the difference and something like that. And it's never a gig. 07:12 - Speaker 2 (Announcement) All they're trying to do is get you to cash that check and send them money, which is fraudulent, by the way. 07:18 - Anne (Host) And, by the way, I've gotten to the point where, if I have a new client, the only way they can really pay me is electronically. 07:25 And I figure, if you don't have electronic means to pay me immediately before the job and it's even in my terms and I've done this for years, Tom, I always have payment in full prior to job start is appreciated and other options available upon request. 07:39 But if it's a new client, I'll take that out because I must have that money in my bank account before I will even consider finishing that job or sending a file. And I'll tell you what, Tom for all of my career it's worked for me Because if people are serious about hiring you, they know that you're a professional, they know that you're going to get the job done. Of course they have to put their faith in you. But in reality and I'll even say because you're a new client I require payment up front electronically. And here are the ways that you can pay me. And so I'll send them, like a QuickBooks invoice, or I'll give them a PayPal account or however that works, and I expect that money in the account and I wait for that money and I make sure that I have the money and then I'll proceed with the job. 08:21 - Tom (Host) That's a really good idea. There's nothing wrong with even asking for 50% or 25% or just some percentage of it. The fact that they're actually going to fork over money with no expectation of an overpayment or getting it back or disputing the payment or anything like that. 08:37 Once it clears, you know that they're serious. And there's a bunch of like. I use Wave apps, for example. That's a great way to do it and I'm pretty sure they can do a partial payment. Or you can just make one invoice just for the deposit and then issue another invoice for the balance If they're a legitimate client that actually has money that they're planning on paying you with, they would have no problem with paying at least a portion of it up front. 08:59 - Anne (Host) Yeah, a lot of my clients nowadays the larger clients that used to like work off of purchase orders, and then it would be like 90 days after the job has been submitted. We'd have to wait for that check, they'd have to generate the PO and everything. You'd sign contracts like vendor contracts and that sort of thing, which I've done a lot, and so if they've got a contract for you to sign, that's vendor, nda, that sort of thing, and you know the company. It's like a well-known company. They're on the web. They've been on the web for years. I mean you can pretty much trust in that where I'll do the job and then I'll get paid. If I've worked with them before, I know that's typically how larger companies work and so that's when I'll accept a check. But even now most of those companies they're going to electronic deposit, like ACH they call it. 09:42 ACH, yeah, so it's direct deposit to your bank and most of the companies I know will do that and that's a form of payment that I trust and that would be a client that I would trust. So if it's a larger company that I know they exist on the web and they talk about, well, you're going to have to do the job first and then we'll be able to pay you once the purchase order is created, blah, blah, blah, blah, and you sign these contracts. I feel fairly good about that and I don't have to think, oh, this is a scam. But whenever I get an email without an actual signature file that comes from an address that isn't companycom, right, if it's a Gmail or a Yahoo or whatever, even a Microsoft what is the free Microsoft one? 10:20 Hotmail, hotmail, yeah, even if it's Microsoftcom, I feel like there's some sort of free sort of Microsoft. You know what I mean Like email that says that I just don't trust it and I'll immediately. The first thing I'll do is look for a website and when I get to the website I'll look for a phone number and then I'll actually try to call that phone number. What are the steps that you take, Tom, to ensure that your job is legit? 10:41 - Tom (Host) Everything that you just said. I also, by the way, I do love the ACH direct deposit because there's no fee. When PayPal, there is a fee, or wire transfer. That's really nice. Here's one thing that I've been doing lately is, if I get a we'll call it a solicitation, for lack of a better term from a company saying hey, and it'll most often be we found you on Google, we found you on Voice123 or some other front-facing thing. You know what's an interesting thing to do? Go look for them on LinkedIn. 11:11 Look for them on LinkedIn. Look for the company and look for the individual and see if you have any mutual connections. I mean, it could be anybody, whether it's a voice actor or somebody in some other profession, and you can reach out on LinkedIn and say, hey, I got an email from this company and you have a connection with them on LinkedIn. What's your experience with them? And that could give you some really quick insight. Sometimes it's just like, oh, I've been working with them for years, or it's oh, they're a huge scam. I forgot to disconnect with them. Run, run, run. Or I'd sent a rando invite, or they sent a rando invite and I don't have any information for you. But it could increase your chance of vetting them a little bit better. Another thing is that I keep an eye out, for is if they ask me to send them a W-9, the more likely that they are legitimate. 12:00 Yeah, yeah, absolutely, which I find interesting because if they were a real, true scam artist, they would want that W-9, because now they would have your social security number and now they can steal your identity too. 12:11 - Anne (Host) Well, oh my gosh, Tom, and that's scary actually, but that's why you don't put your social security number. You put your EIN number, because you're a company right, and you don't have to give up your EIN number, which is, by the way, one thing. I'm glad you mentioned that like we should all be having an EIN number. I'm glad you mentioned that, like we should all be having an EIN number. 12:30 - Tom (Host) Yes, it's very, very simple to get. It takes very, very little time. So it's a very easy get. I just reminded myself and we just talked about identity theft is that I almost had my identity stolen yesterday. 12:43 - Anne (Host) Whoa, that's scary. Yes. 12:45 - Tom (Host) How do you? 12:46 - Anne (Host) know like what happened. 12:51 - Tom (Host) Okay, so it was about a little after 10 am yesterday is when things started happening, so within a few minutes of each other, I got an email from Credit Karma, norton which, because I have my Norton 360 antivirus software package, I pay a subscription through that and Experian. For those of you who don't know, there are three major credit bureaus there's Experian, there's TransUnion and there's Equifax. I have a free account with Experian and I have a free account with Credit Karma. All three of them, within a few minutes of each other, messaged me and said that there was a hard inquiry. 13:30 - Anne (Host) Yeah. 13:30 - Tom (Host) So what that means is if you are applying for a loan, a mortgage, a credit card or something like that, the company that you're applying to will do a credit check. So they will check your credit and see if you are a safe credit risk to make the loan or to get the credit card, for this was a hard inquiry. If you get enough hard inquiries on your credit, your credit will go down. 13:55 - Anne (Host) Yeah, absolutely. I know that because I'm a stickler about my credit. 13:59 - Tom (Host) Me too. My credit rating, oh my gosh. If mine isn't at least 800, something I freak out, oh my gosh. 14:04 - Anne (Host) Yeah, no, mine has to be like almost close to perfect, and when it goes down like two points, I'm like wait why? Why did that happen? Right? And it's just because you put a charge on it for a few hundred dollars, and then you pay it off next week and then everything's fine, so that's normal. 14:18 - Tom (Host) So all three of them told me at roughly the same time that there was a hard inquiry. So I clicked on all the emails and all three of them said that somebody was applying for a Discover credit card, I think in Salt Lake City, and someone was applying for a Capital One credit card in Delaware, and I was in New York City neither applying for a Discover credit card or a Capital One credit card. I certainly wasn't in Salt Lake City or Delaware at the same exact time. 14:49 - Anne (Host) You know, what's so interesting, Tom, is that, like I don't know, a few months ago I don't know if there was a discussion circulating or maybe I got an email but somebody said, and like I should have done this years ago, I mean you can freeze your account so that if you don't open up a credit card every other day which I'm certainly not right Because again, it affects my credit rating and I'm anal about that and so I'm like well, I don't need to apply for any other credit cards, so you can go and freeze that, so that you can actually reduce the risk of somebody trying to open up credit cards or identity theft. 15:19 So and it's super simple to do it, as I said, everybody should have that free account. You should log in, you should check your credit scores regularly I think they allow you once a month, I think even my credit cards. My American Express will tell me oh, your FICO score has changed, right, so they're monitoring it too, and so literally, I get lots of notifications when that rating goes up and down. But I know that I've reduced my chances of identity theft, which is a very scary thing, by freezing those accounts and it's very simple to unfreeze. So, if you know you want to apply for a credit card. You just got to go and unfreeze it for a certain amount of time so you can apply for it and then freeze it back up again. So that way it reduces the risk. 15:57 - Tom (Host) And all those emails that I got, all those notifications did give me the option to do that. I was also able to say this because it, literally, when Norton 360 popped up and it took me to their website, it literally said is this you and you can check yes or no? And I wrote no and then the whole screen turned red saying okay, we know this is a problem, we will look into it. 16:17 It did it with all those and then I called Capital One Bank. It took me a few people. It had to get escalated a couple of times to the credit card fraud department. 16:25 - Anne (Host) Well, don't you say, they give you a special number, right? 16:27 - Tom (Host) They say call this number if it's not you, or you can call this number. I just called the general number because all that was on the notification, I think, was the Capital One in Salt Lake City or something like that. So I called directly and said please state your problem. I'm like I think I'm getting my identity stolen. And then it got up there and then they manually rejected the credit card application at least for the Capital One. 16:50 And then this morning I got another Credit Karma email saying that there was a check on my Equifax report not the Experian one and I looked at the date of it. It also said yesterday. So that means Credit Karma had my back twice and Experian had my back and Norton had my back twice. Right, right, and Experian had my back and Norton had my back and everybody bosses. This is the takeaway. Creditkarmacom is free, having an account with Experian is free, it doesn't cost you a nickel. 17:18 - Anne (Host) All of them TransUnion, they're all free TransUnion, Equifax, they're all free. 17:23 Exactly and you can check your scores and, like I said, a lot of banks and a lot of credit cards are actually adding that on as like a value add kind of service, but you don't have to pay anything for it. I think there's a lot of it going on, Tom, which is kind of scary. We got to be careful about scammers, that's for sure. And anytime, even in your email, right, if you get like again, if I find something that doesn't have a signature and then they have an attachment like PayPal has been well-known scams where you get like oh, you've got a PayPal invoice, right, and you have to pay this amount and it looks legit. I mean, they've got like the PayPal logo. I've gotten quite a few of those over the last six months. 18:01 - Speaker 2 (Announcement) And. 18:01 - Anne (Host) I just ignore anything. Just remember that most financial institutions will never email you for information and they'll never text you necessarily for that information either, and you should also, Tom. We should have a big discussion on having multi-factor authentication. 18:19 - Tom (Host) Yes. 18:19 - Anne (Host) This is extremely important. 18:21 - Tom (Host) It's annoying as hell or two-factor, two-factor authentication For every account that you have, especially the financial ones, you should have two-factor authentication, which means either they send you a text message and you just click on the link and you're good to go, or it sends you an email and it'll usually give you a passcode of some sort and then you go to the website. When you're trying to log on, you enter that passcode and then it'll let you do it, and most of them are only good. Some of them are only good for 30 days. Sometimes you can check a box saying this is my private computer. It's okay for a certain amount of time, or they make you do it every single time, which isn't the worst thing in the world. Yes, it's annoying. 18:55 - Anne (Host) You know what I just thought about. It is annoying but it keeps you safe. It's funny how much like value you put in that number, that phone number, in this phone which, by the way, I just got a new phone but in this number for the two-factor authentication, right Like text me at this number. So think of the power that these phone companies have right, and that is scary. I mean it used to be a thing where I always thought like the large scale communication companies were a little bit of a monopoly, depending on the area that you're in. I mean, when I lived in the East Coast it was always Verizon right, verizon everything, verizon this, verizon that. Out here it's a couple of different companies but still, if you think about it, I mean I'm glad to have the two-factor authentication and it's super convenient on the phone. 19:39 But, it's interesting to know that you wouldn't want the hackers to get smart right and then start really infiltrating the phone, you know, and impersonating a phone number. 19:50 - Tom (Host) There's a couple of things about that is that, when it comes to authentication, when you're logging on your phone, I've got it set up where I just use my thumbprint for a lot of it. 19:59 - Anne (Host) I love that, or Face ID yeah the Face ID is a great one. 20:05 - Tom (Host) There's also a thing for a lot of the websites where I have a personal PIN that has nothing to do with the PIN or the password to access the site itself. If I am using my phone to log in somewhere, I can enter a four-digit PIN that's different from everything else, so it also increases the chance of having a secure whatever. Also, just as a rule, I don't do anything financial on my phone, with the exception of like Venmo Well, I have mobile banking If I'm like sending money if, like me, and the guys are having pizza, you know what I mean. 20:31 - Anne (Host) I have mobile banking and I do have Apple Pay. 20:35 - Tom (Host) Well, I have GPay too. 20:36 - Anne (Host) Yeah, so. 20:36 - Tom (Host) I'm a Google guy but like I will unless to my bank accounts online or Wave app or Wise or PayPal on the phone, unless I absolutely have to. 20:49 - Anne (Host) Interesting. I go to them quite a bit. Actually, you're probably fine because of all the precautions that you're taking, but I'm just a little extra neurotic about it. Oh, it's constantly got multi-factor authentication, but I get that. I totally get that. Wow, yeah, being careful, and you know what. 21:02 What's interesting is, back in the day and I'm going to date myself when I was working at the school and we had text-based email okay, and text-based email, I could have something and it was all based on like the Unix systems and so like hacking into a text-based, like I don't know how to say this, but hacking into a system like that, like a Unix system, and reading your email with text-based, you didn't always have like the conditions of people attaching things that could be viral, loading a virus on your computer. So I was always proud to say that I used text-based email and I used something called a PGP signature, which was a digital signature at the time, which meant that when I sent mail out, my PGP signature, it would actually negotiate and verify with the person that I would send it to so that it could be a verified digital signature. That indeed, yes, this mail did come from me, and I think that Norton probably has something like that now right. Is that with your email or no? 21:59 - Tom (Host) Yeah, it has all kinds of functions. 22:01 And it works on my desktop and it works on my laptop and it works on my phone. The most important function that it has is when I'm not home and I'm on my phone or my laptop or my tablet is the VPN when you can turn it on to make sure that if you're using Wi-Fi at a cafe or something like that, that it's secure, because apparently there are people who just like sitting around at a Panera or a Starbucks with their laptop and just waiting for someone to have an insecure Wi-Fi connection and they can just steal their life right there through their own laptop. 22:31 - Anne (Host) Well, it's funny how this conversation has turned into a big security conversation, starting off with scamming. Which guys you got to be aware? It's one of the reasons why, for all of my years and because of my years working in technology, I like wired connections. I mean Wi-Fi. I mean it's a wonderful technology and it's convenient as anything. However, it's not as secure as a wired connection, because a wired connection is basically, you know, your digital numbers flowing back and forth along a wire, versus all this information out in the air where, if somebody is sitting outside of my home, they can possibly hack into my wireless network and then they can run some sort of a tracer to see and to actually get my passwords, which is something that you don't really want that to happen. So you should really be cautious, guys, and I think it's always a good idea that, if you are working from home, if you have the opportunity to have a wired connection to your router, I think that that's better rather than using Wi-Fi. Number one it's more stable, right, it's faster and it's also more secure. 23:32 - Tom (Host) I agree. If you have a desktop at home and you are doing any kind of recording or you're doing basically anything, you should have an ethernet connection. That yellow wire with the big old phone jack that plugs right into the back of your computer and plugs into your Wi-Fi router. 23:47 - Anne (Host) And it sounds old school, but it's still the most secure method of data transfer. 23:51 - Tom (Host) Without question so if you are recording from home. If you're doing whatever from home, you have a desktop ethernet. If you have a laptop, I are recording from home. If you're doing whatever from home, you have a desktop Ethernet. If you have a laptop, I think the newer laptops don't even have an Ethernet connection. I have to think about my laptop and whether I even have one anymore, and here's the simple reason. 24:06 - Anne (Host) Think about it. It's a wire, guys. It's a wire. It's not like data floating around in the air which people can listen to. Somehow the frequency of the data traveling in the air right? Wi-fi works on frequencies when your data is traveling via a wire like a physical cable, unless somebody like I don't even know, unless they tap into that wire, right, somehow. 24:26 I don't know how they do that, and we're talking about your wire in your house going from your computer to your router. Right, that's as secure as it gets, right, unless somebody's coming into your house and hacking into the wire and tapping into it. 24:38 - Tom (Host) You've got some foreign embassy bugging your home. 24:41 - Anne (Host) Yeah, yeah, doing some fancy work, you're not going to have to worry about your data being transferred. So if you're working on the internet right, at least the data that's transferring from your house to your router is absolutely secure. And then it's up to your internet provider right on the router, to their routers, to make sure that things are encrypted, things are secure and for the most part I mean that's been handled right. I mean there are hackers out there that they can hack into networks. They can hack into things like that, but you want to be as safe as you possibly can, so wired is best. 25:14 - Tom (Host) Yes, it's fascinating. We talk about hard security and soft security, yes, that's hard security, that's hard security. 25:20 - Anne (Host) So, if we go back to talking about the scams that are floating around these days, one thing I wanted to mention is I think one of the best applications for groups, facebook groups and social media groups and discussion groups is for that thing, so that you and Bridget were talking to one another about this job that you both got, and then it's really wonderful that we can come together as a community and protect each other right and say, hey, look, watch out for the scam. So it is one of the best advantages, I would say, of being a part of the social media groups in that way. Otherwise, we've talked about how it's hard to sometimes they're toxic, sometimes it's really hard to be on social media. But I would say one of the best reasons to be on social media, in those groups and in those forums, would be because of the protection that you're getting of us banding together and saying, hey, watch out, this is a scam. 26:09 - Tom (Host) Absolutely, it's one of the most important things. Community is more than just about you know rah rah and whoop whoop and you know we support you and feel better if you're feeling down, but like just actual education, along with inspiration and commiseration can literally save your identity Absolutely. 26:27 - Anne (Host) Wow, what a great conversation, Tom. So bosses out there, be aware of scams. Be cautious. Research, research. Take a look at those signatures when you get emails coming in, when you get something that's asking for lots of words and a good price and it seems too good to be true, guess what it might be. So make sure that you're communicating with the community as well, checking those jobs out and attach that AI rider to every one of your jobs. Now, it's simple. It's there at NAVA and it's free. You can attach that rider to every job. If you have a new client, make sure you're very careful with the payment options. You know we spoke about that. I always make sure I get money up front, or partial money up front, first to make sure that it's a legit client. What else did I miss, Tom, in this recap? 27:14 - Tom (Host) Hardware and software VPNs. 27:16 - Anne (Host) EINs yes. 27:19 - Tom (Host) Oh yeah, VPNs, EINs, Two-factor authentication. 27:20 - Anne (Host) I love it. Yeah, Make sure you guys are implementing all of that to keep yourself safe and secure. So great topic, Tom. I like geeking out like this. 27:30 - Tom (Host) Yeah, it's fun and helpful. 27:31 - Anne (Host) Yeah, I'm going to give a great big shout out to my sponsor, IPDTL. You too can connect and network like real bosses. Find out more at IPDTL.com. Guys have an amazing week and we'll see you next week. 27:52 - Speaker 3 (Announcement) Bye. Join us next week for another edition of VO BOSS with your host, Anne Ganguzza, and take your business to the next level. Sign up for our mailing list at voboss.com and receive exclusive content, industry revolutionizing tips and strategies and new ways to rock your business like a boss. Redistribution, with permission. Coast-to-coast connectivity via IPDTL.
Take a Network Break! Our Red Alert for the week is a remote code execution vulnerability in open-source XDR platform Wazuh. In tech news, we dig into several announcements from Cisco Live US including: unified management of Meraki and Catalyst gear, new switches, an AI Assistant for the Meraki dashboard, a Deep Network Model LLM,... Read more »
Take a Network Break! Our Red Alert for the week is a remote code execution vulnerability in open-source XDR platform Wazuh. In tech news, we dig into several announcements from Cisco Live US including: unified management of Meraki and Catalyst gear, new switches, an AI Assistant for the Meraki dashboard, a Deep Network Model LLM,... Read more »
Take a Network Break! Our Red Alert for the week is a remote code execution vulnerability in open-source XDR platform Wazuh. In tech news, we dig into several announcements from Cisco Live US including: unified management of Meraki and Catalyst gear, new switches, an AI Assistant for the Meraki dashboard, a Deep Network Model LLM,... Read more »
Order my newest book Make Money Easy! https://lewishowes.com/moneyyouCheck out the full episode: greatness.lnk.to/1775"Every day I'm stressed building that business... is it gonna work? Am I gonna have payroll? I don't want that. I'm happy making less money but doing it the way I want." - Noah KaganSuccess isn't just about the money—it's about designing a life you actually want to live. Noah Kagan, founder of AppSumo, reveals the counterintuitive truth about what separates millionaires from billionaires and why the most successful entrepreneurs focus obsessively on just one thing. After studying countless business titans from the founder of Ethernet to the creator of Kinko's, Kagan discovered that billion-dollar success stories share two critical elements: unwavering focus on a single opportunity and choosing markets with endless demand and repeat customers.But here's the twist that will challenge everything you think about entrepreneurship—some of the wealthiest founders lived in constant stress for decades, questioning whether true success means sacrificing your peace of mind for profit. Kagan's journey from his anxious twenties to his calm forties offers a roadmap for ambitious professionals who want to build wealth without burning out. Learn why "boring businesses" in billion-dollar markets like lawn care and pool maintenance might be your ticket to freedom, and discover the profound definition of success that has nothing to do with your bank account balance.Sign up for the Greatness newsletter: http://www.greatness.com/newsletter