Interviews RSS Feed

Category: Technology, Blockchain, Cryptocurrency

Gail  Ferreira
Gail Ferreira joins Jim Blasingame to discuss the pace and intensity of the Digital Age and why that translates into the requirement of having an organizational culture that is innovative every day.
Robert Smith
Rob Smith joins Jim Blasingame to discuss the issues humans face in embracing the paradox of digital leverage: the powerful and seductive benefits and the inherent and sometimes frightening dangers.
Robert Smith
Rob Smith joins Jim Blasingame to discuss the human expectation of values that often isn’t reconciled with modern digital technology, and why an algorithm that’s indifferent to your existence might seem evil.
Robert Smith
Rob Smith joins Jim Blasingame to discuss the seductive encroachment of machine intelligence on the human experience, and associated implications.
Steven Russo
Steven Russo joins Jim Blasingame to reveal how micro-tokens work as an alternative transferring data, because it moves your data as a virtual or fake data file to prevent cyber-criminals from accessing your real data.
Steven Russo
Steven Russo joins Jim Blasingame to reveal some of the things you can do to protect your company from the cyber-criminals, including constant updates, use stronger passwords, and better data-sharing software.
Steven Russo
Steven Russo joins Jim Blasingame to reveal some of the cyber-security resources that are available for low cost or even free, plus the power of training and staying updated.
Verne Wheelwright
Verne Wheelwright joins Jim Blasingame to reveal that the explosion of the gig economy, combined with and aided by technology, is the most compelling trend to follow.
Katie Petrillo
Katie Petrillo joins Jim Blasingame to report on the global survey of how people use passwords around the world, and discuss some of the tools that are available to help you use stronger security practices.
Katie Petrillo
Katie Petrillo joins Jim Blasingame to report on the problem of having a poor password practice, why it can be professionally and personally dangerous, and how to create a strong password.

Browse by category