Interviews RSS Feed

Category: Online Technologies, e-Business, Cybersecurity

Anna Murray
Anna Murray joins Jim Blasingame to share her story about how an English major broke into the tech industry in the early days of the Internet, because she didn’t know she wasn’t supposed to do that.
Kristin  Zhivago
Kristin Zhivago joins Jim Blasingame to reveal that digital transformation will require you to rethink how you spend your operating budget, likely less on people and more on technology.
Kristin  Zhivago
Kristin Zhivago joins Jim Blasingame to define digital transformation as the point where all of your communications and interactions in business is digital, not counting when face-to-face is called for, and how to navigate that landscape.
Terrence DeFranco
Terrence DeFranco joins Jim Blasingame to report that some applications of Internet of Things technology operate on a different spectrum than the Wifi or mobile networks that the rest of the Internet operates on.
Terrence DeFranco
Terrence DeFranco joins Jim Blasingame to report on how his company used Internet of Things technology to help commercial property owners save money on utilities and other operational expenses.
Terrence DeFranco
Terrence DeFranco joins Jim Blasingame to discuss the impact that IOT things are having – and increasingly will have – on our daily work and lives.
Dror  Liwer
Dror Liwer joins Jim Blasingame to reveal why you may want to engage an MSP in order to have access to high-quality, up-to-date technical support in the cloud and in your office.
Dror  Liwer
Dror Liwer joins Jim Blasingame to explain what being cybersecurity ready means, and why you may want to engage a managed service provider (MSP).
Dror  Liwer
Dror Liwer joins Jim Blasingame to report on examples of how cyber criminals have assaulted organizations and extracted ransom money from them, and how to prevent this from happening to you.
Tiana Laurence
Tiana Laurence joins Jim Blasingame to reveal how a permission-based Blockchain system, like the Libra, works, plus the issues of the hacking exposure of some cryptocurrencies.

Browse by category