News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

Why Email Aliases Fail DMARC (And How to Fix Them)

An email alias is an alternative email address that redirects messages to a primary email inbox. An alias does not have its own mailbox and is simply responsible for forwarding messages to one or more designated email addresses.

Episode Cover Image
Episode Cover Image

Why Kubernetes 1.33 Is a Turning Point for MLOps – and Platform Engineering

There comes a point in every engineer's experience when a platform matures to the point of being truly ready for production use. With Kubernetes v1.33, that point has arrived for artificial intelligence (AI) and machine learning (ML) infrastructure.

Episode Cover Image
Episode Cover Image

How Platform Engineering Is Redefining DevOps In 2025

For years, DevOps has been one of the finest options when it comes to ensuring smooth collaboration between developers and operations.

Episode Cover Image
Episode Cover Image

Blending Intelligence And Imagination: How AI Is Shaping The Next Generation Of Virtual Reality

The contemporary period of digital transformation is when AI combines with VR to restructure how humans interface with digital environments.

Episode Cover Image
Episode Cover Image

Red Hat Enterprise Linux 10 Officially Released, Here’s What’s New

Red Hat announced the general availability of the Red Hat Enterprise Linux (RHEL) 10 operating system series, a major update introducing new features and enhancements.

Episode Cover Image
Episode Cover Image

OpenSnitch: The Must-Have Application Firewall For Linux

When it comes to protecting your Linux system from unwanted network connections, having a good firewall is essential. While most Linux users rely on traditional firewalls like iptables, firewalls, or ufw, these usually work at the network level and don't give detailed control over which applications can connect to the internet.

Episode Cover Image
Episode Cover Image

5 Great Linux Utilities To Monitor Your System Resources In The Terminal

Although the standard Linux utilities have served us well over the years, in some scenarios they fall shoAlthough the standard Linux utilities have served us well over the years, in some scenarios they fall short.

Episode Cover Image
Episode Cover Image

13 Common Linux Myths Debunked (With Real Facts)

Linux is a powerful, open-source (free and modifiable) operating system that runs on everything from smartphones and smart TVs to huge servers behind the internet.

Episode Cover Image
Episode Cover Image

BYOD Like It’s 2025

Fifteen years after the 'bring your own device to work' movement took off, organizations may have outdated notions about supporting employee devices.

Episode Cover Image
Episode Cover Image

What Is A Compliance Framework?

A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with established regulations, specifications or legislation.

Episode Cover Image
Episode Cover Image

AI And Compliance: What Are The Risks?

We look at the areas of risk in artificial intelligence. Potential exposures abound, and include security and privacy issues, bias, accuracy and complete fabrication of results

Episode Cover Image
Episode Cover Image

Software Engineering Certifications Rolling Out Soon

In our last episode, Trace Bannon and Dan Whitliff established the need for certifying critical system software engineers just as we certify engineers in chemical, architectural, mechanical and other safety-critical verticals.

Episode Cover Image
Episode Cover Image

BO Buyer’s Guide: Top 10 Business Intelligence Tools

It's not always easy choosing a business intelligence tool to meet the needs of the enterprise. Here are 10, however, that could make a big difference.

Episode Cover Image
Episode Cover Image

Next-Gen Enterprise Analytics With AI And Big Data

In this timely discussion of enterprise analytics, Karthikeyan Selvarajan presents a visionary critique of how artificial intelligence is transforming large-scale data ecosystems.

Episode Cover Image
Episode Cover Image

Why AI Breaks The Traditional Security Stack – And How To Fix It

AI has been deployed faster than the industry can secure it. Whether it's LLM-based assistants, GenAI-powered workflows, or agentic AI automating decisions, traditional security tooling was never designed for this.

Episode Cover Image
Episode Cover Image

What Are The Upcoming Trends In AI For 2025?

AI in 2025: Emerging Trends That Will Define the Future of Technology

Episode Cover Image
Episode Cover Image

Top 10 Generative AI Risks & Smart Ways To Protect Your Business

Know about Common AI Threats Businesses Face and How to Stay Safe

Episode Cover Image
Episode Cover Image

The Next AI Imperative – Building Systems We Can Trust

As a society, we are currently in the process of outsourcing thousands of daily tasks to artificial intelligence (AI). Some of these tasks are fairly mundane, such as asking Alexa for restaurant advice.

QR Code