A podcast brought to you by Kosciusko Connect. On Connected Conversations, we talk about technology, the internet, and how to navigate the digital world in which we live.
…
continue reading
Optical fiber is the future, enabling the high-speed broadband Internet connections everyone relies on. Christian Till, a fiber testing expert, interviews industry experts ranging from telecom operators and engineers to fiber technicians as well as telecommunications networking equipment and software services suppliers. Each episode contains powerful information to help you better understand fiber optic technology, stay on top of the latest trends, and enable you to efficiently build and mai ...
…
continue reading
The fiber optic industry plays a critical role in the modern society. Everyday around the globe fiber networks are being deployed to connect everyone and everything. Magnus Angermund, who has more than 25 years of experience from the industry, interviews profiles within and around the fiber industry about interesting subjects, such as market trends and technical trends. It will also be deep dives in areas like investments, sea cables, build out in certain countries, market drivers and much more.
…
continue reading
Network technology explained - for beginners and professionals alike.
…
continue reading
Telecom Top 5 is a weekly telecom news update for telecom professionals from ISE Magazine, delivering the most pressing recent developments in broadband, fiber optic, wireless, 5G, network engineering, BEAD, cloud and virtual networks, legislation, and much more. Tune in each week for a rapid news update that covers the week in telecommunications. Your host, Joe Gillard, is Executive Editor of ISE Magazine, a print and online publication for telecom professionals. In this podcast, Joe will c ...
…
continue reading
Let's Get Digital is your gateway to the innovators and ideas transforming the digital infrastructure industry. From wireless telecom to fiber networks and data centers, this podcast explores all things digital infrastructure—diving into the trends, technologies, and people shaping the future of connectivity. Hosted by Broadstaff CEO Carrie Charles, each episode features candid conversations with top industry leaders, uncovering the intersection of technology, talent, and transformation. Dis ...
…
continue reading
Strong opinions on Alaska politics, life and entertainment
…
continue reading
A surreal MicroFiction Podcast. "A role playing game hums within a global network of power lines, fiber optic cables and obsolete satellites. Players who gain access to this mysterious phenomenon create a projection and are guided by the Dictator to realms not yet known to the conscious mind."
…
continue reading
“OTELCO’s Evolution Digital explores the ways different industries have adapted to ensure continued success in today’s digital marketplace. Hosted by OTELCO Marketing and PR Manager Tracy Scheckel, each episode will feature a new guest from a different industry. Tracy will discuss with her guests how the digital age has changed operations in their organization, and how they see technology further shaping their industry. Education, the pulp and paper industry, advertising and broadcast media, ...
…
continue reading
Seismic Soundoff showcases conversations addressing the challenges of energy, water, and climate. Produced by the Society of Exploration Geophysicists (SEG), these episodes celebrate and inspire the geophysicists of today and tomorrow. Three new episodes monthly.
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
The podcast that provides solutions to the problems facing condominium and homeowner associations in South Florida.
…
continue reading
…
continue reading
In this podcast, networking guru Mattias Fridström, Chief Evangelist at Arelion and industry experts discuss all things Internet, networks, cloud and connectivity.
…
continue reading
Welcome to ReSETTing Tomorrow, the podcast that's your gateway to the thrilling world of STEM! Join Hugo Malan, President of Kelly Science, Engineering, Technology & Telecom, as he speaks and geeks out with leaders who are at the forefront of innovation. In each episode we unravel how these masterminds are tackling epic challenges, from pushing biotech boundaries to crafting technologies straight out of sci-fi. Hear the personal tales behind groundbreaking projects and the magic of passionat ...
…
continue reading
IT Support Services relied by world industry leaders. Our IT support specialist and technical support engineer can deliver IT solutions to businesses. Address: 3rd Flr., Centro Fortuna, 6014 A. S. Fortuna St, Mandaue City, Cebu, Philippines Phone: +(032) 265 5671
…
continue reading
Over the last 10 years, the Tym Team has designed some of the top Theaters and Smart Homes in the industry, winning multiple awards at CES in Vegas. More recently they've started providing design and consulting for home owners across the country. In this Podcast Tym co-founder Matt takes you behind the scenes.Matt aims to shares Tym's journey in the AV Industry, along the way telling you about the pitfalls and successes his team has experienced designing and traveling across the country inst ...
…
continue reading
A Monthly discussion focusing on the installation and testing of the physical layer of telecommunications infrastructure.
…
continue reading
Let's talk tools! Host Ed Scirbona, Head of Engineering at Jonard Tools, will be discussing a variety of tool topics from how new tools are developed to the difference between materials and more.
…
continue reading

1
CCT 230: Drones to Fiber Optics - Secure Network Components and CISSP (Domain 4.2)
47:14
47:14
Play later
Play later
Lists
Like
Liked
47:14Send us a text The unexpected convergence of consumer technology and warfare takes center stage as Sean Gruber explores how Chinese e-commerce giants now sell drone accessories that transform $300 toys into semi-autonomous weapons. This eye-opening discussion reveals how modern drones with AI guidance modules and fiber optic tethers mirror strategi…
…
continue reading

1
CCT 232: Managing Authentication in the Modern Enterprise (CISSP Domain 5.2)
48:09
48:09
Play later
Play later
Lists
Like
Liked
48:09Send us a text Identity management sits at the core of effective cybersecurity, yet many organizations still struggle with implementing it correctly. In this comprehensive breakdown of CISSP Domain 5.2, we dive deep into the critical components of managing identification and authentication systems that protect your most valuable assets. Starting wi…
…
continue reading

1
Two Martinis and a Microphone: Dear Senator Sullivan...How?
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38We ask Alaska's United States Senator Dan Sullivan how his proposals will benefit Alaskans.
…
continue reading

1
Hear what Arielle Roth said in her confirmation hearing, BEAD news, and more
4:29
4:29
Play later
Play later
Lists
Like
Liked
4:29Your telecom news update for the week ending 3/28/25. An overview of how Roth intends to lead the NTIA with questions over Musk, BEAD, and more. Email me at [email protected] Endeavor Business Media
…
continue reading

1
BEAD/BABA Rundown: What was in Feinman's BEAD email and more BEAD top stories
4:23
4:23
Play later
Play later
Lists
Like
Liked
4:23In addition to our regular Telecom Top 5, we are now also offering a biweekly roundup of the latest news in BEAD, adapted from our video series. In this new episode of the BEAD/BABA Rundown from ISE Magazine, Justine Murphy gives an update on Howard Evan Feinman's departure and the email he sent that was shared with the media, plus more top stories…
…
continue reading

1
CCT 231: Practice CISSP Questions - Secure Network Components and CISSP (Domain 4.2)
18:30
18:30
Play later
Play later
Lists
Like
Liked
18:30Send us a text Cybersecurity professionals, alert! A dangerous Chrome zero-day vulnerability demands your immediate attention. In this action-packed episode, Sean Gerber breaks down CVE-25-2783, a critical security threat that allows attackers to execute remote code simply by having users click malicious links. Though initially targeting Russian or…
…
continue reading

1
S3E3: Crime & Cameras: Local Law Enforcement's Take on Security Cameras
19:15
19:15
Play later
Play later
Lists
Like
Liked
19:15By Kosciusko Connect
…
continue reading

1
Episode 6: Nanocube self-assembly pathways uncovered
4:23
4:23
Play later
Play later
Lists
Like
Liked
4:23In this podcast episode, MRS Bulletin’s Sophia Chen interviews Xingchen Ye of Indiana University about his research group’s studies on the fundamental behavior of colloidal materials. Colloidal materials consist of liquids with nanoparticles suspended in them. Ye’s team is interested in how a colloidal material’s properties change as the team spati…
…
continue reading

1
Here's the action the FCC has planned in telco land, Evan Feinman has a lot to say about BEAD, plus more.
4:16
4:16
Play later
Play later
Lists
Like
Liked
4:16Your telecom news update for the week ending 3/21/25. Brendan Carr takes action, Evan Feinman speaks his mind, a stunning revenue drop in telecom equipmentand more top stories for the week. Email me at [email protected] Endeavor Business Media
…
continue reading

1
253: Sustainability, Prosperity, and Geophysics in Latin America
32:53
32:53
Play later
Play later
Lists
Like
Liked
32:53“Geophysicists have an incredible ability to see what’s below the surface – now we need to make sure the world sees what we do above it.”Sustainability isn’t just about the environment – it’s about people, the planet, and prosperity. Dr. Maria Angela Capello shares how geophysicists drive sustainability in Latin America and beyond in this episode. …
…
continue reading

1
CCT 229: Practice CISSP Questions - Secure Defaults and Domain 3 (Domain 3.1.2)
17:27
17:27
Play later
Play later
Lists
Like
Liked
17:27Send us a text Today's cybersecurity landscape demands vigilance on multiple fronts, something Sean Gerber demonstrates masterfully in this information-packed episode focused on CISSP Domain 3 security principles. The episode opens with a critical security alert regarding Cox modems—a vulnerability potentially affecting millions of American househo…
…
continue reading

1
Episode 5: Triboelectric nanogenerator powered by wind-driven leaf motion
5:59
5:59
Play later
Play later
Lists
Like
Liked
5:59In this podcast episode, MRS Bulletin’s Laura Leay interviews Fabian Meder from the Italian Institute of Technology in Genova and the Sant’Anna School of Advanced Studies in Piza, Italy about his research group’s device that makes use of wind-driven plant leaf motion to generate electricity which can power a chemical delivery system. Their triboele…
…
continue reading

1
CCT 228: Secure Defaults and Domain 3 for the CISSP Exam (Domain 3.1.2)
36:12
36:12
Play later
Play later
Lists
Like
Liked
36:12Send us a text The cybersecurity landscape is constantly evolving, with even major corporations falling victim to devastating attacks. A recent UnitedHealthcare ransomware incident cost the company $22 million, with fingers pointing at leadership for allegedly appointing an unqualified CISO. This sobering reality highlights why defense in depth str…
…
continue reading

1
Telco troubles, AT&T breaks record, Aijit Pai returns in a new role, and more stories.
3:55
3:55
Play later
Play later
Lists
Like
Liked
3:55Your telecom news update for the week ending 3/14/25. A company shuts its doors, telco stocks take a hit, and more top stories for the week. Email me at [email protected] Endeavor Business Media
…
continue reading

1
CCT 227: Navigating Domain 1: CISSP Question Thursday Deep Dive
22:42
22:42
Play later
Play later
Lists
Like
Liked
22:42Send us a text A seemingly simple company restructuring at Eaton triggered a devastating cybersecurity incident when software developer Davis Liu planted a logic bomb on their systems after learning his responsibilities would be reduced. This cautionary tale kicks off our deep dive into CISSP Domain 1 concepts, showing exactly why understanding sec…
…
continue reading

1
BEAD/BABA Rundown: Big changes coming to BEAD? Plus more top stories
3:50
3:50
Play later
Play later
Lists
Like
Liked
3:50In addition to our regular Telecom Top 5, we are now also offering a biweekly roundup of the latest news in BEAD, adapted from our video series. In this new episode of the BEAD/BABA Rundown from ISE Magazine, Justine Murphy gives an update on Howard Lutnick's BEAD overhaul, and more top stories.By Endeavor Business Media
…
continue reading

1
Nobody Home: Timber, steel and tourism. Two martinis and a recipe. Be curious. Alaska Summer Travel Showcase is coming.
31:15
31:15
Play later
Play later
Lists
Like
Liked
31:15Talk of bringing timber and steel back to the U.S. defy reality. Scott McMurren on the Alaska Travel Showcase. A book on curiosity and our own martini recipe.
…
continue reading

1
CCT Vendor 01: The Blurry Line: Where Physical Security Meets Cybersecurity - SecurePassage.com
38:02
38:02
Play later
Play later
Lists
Like
Liked
38:02Send us a text The traditional boundaries between physical and cyber security are rapidly disappearing, creating both risks and opportunities for organizations of all sizes. This eye-opening conversation with Casey Rash from Secure Passage explores the critical intersection where these two domains meet and the innovative solutions emerging to bridg…
…
continue reading

1
252: How the Ivishak Formation Could Change Carbon Sequestration
22:51
22:51
Play later
Play later
Lists
Like
Liked
22:51“Geophysics lets us predict rock properties where well data is sparse - this is crucial for understanding carbon storage potential.”What if Alaska’s North Slope holds the key to large-scale carbon storage? In this episode, Rae Jacobsen discusses his research on the Ivishak Formation, revealing how geophysics can unlock new possibilities for carbon …
…
continue reading

1
CCT 226: Data and Asset Classification for the CISSP (D2.1)
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28Send us a text The $150 million cryptocurrency heist linked to the 2022 LastPass breach serves as a powerful wake-up call for cybersecurity professionals. As Sean Gerber explains in this comprehensive breakdown of CISSP Domain 2.1, even security-focused tools can become vulnerability points when housing your most sensitive information. Dive deep in…
…
continue reading

1
Lutnick finally talks about BEAD, with big changes to come, plus the rest of the top stories
4:01
4:01
Play later
Play later
Lists
Like
Liked
4:01Your telecom news update for the week ending 3/7/25. Lutnick to overhaul BEAD, some new bills in the legislature, more Starlink news, and more. Email me at [email protected] Endeavor Business Media
…
continue reading

1
CCT 225: Practice CISSP Questions – Business Impact Analysis (D1.4)
23:12
23:12
Play later
Play later
Lists
Like
Liked
23:12Send us a text Ransomware attacks are a growing concern for both businesses and individuals, as the frequency and sophistication of these threats continue to escalate. In this episode, we take a closer look at this alarming trend and introduce six effective methods for recovering critical data that's been locked away due to ransomware encryption, s…
…
continue reading

1
251: From Noise to Knowledge – Lessons in Geophysics and Innovation w/ Joe Dellinger
31:54
31:54
Play later
Play later
Lists
Like
Liked
31:54"The difference between an ordinary geophysicist and a great one? Knowing when noise is actually signal."Joe Dellinger discusses his new book, Forensic Data Processing. In this episode, Joe shares how his career journey – from growing up surrounded by geophysics to pioneering low-frequency seismic applications – inspired him to write this book as h…
…
continue reading

1
Episode 4: Researchers pinpoint AI/ML training set to achieve accurate predictions
4:00
4:00
Play later
Play later
Lists
Like
Liked
4:00In this podcast episode, MRS Bulletin’s Sophia Chen interviews Bowen Deng, a graduate student in Gerbrand Ceder’s group at the University of California, Berkeley, about their work on increasing the accuracy of artificial intelligence/machine learning materials prediction models. The use of computer simulations to predict the interaction between ato…
…
continue reading

1
CCT 224: Business Impact Assessments (BIA) and the CISSP (D1.4)
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35Send us a text Welcome to a compelling exploration of the crucial importance of Business Impact Analysis (BIA) in ensuring cybersecurity resilience, especially for those preparing for the CISSP exam. In this episode, we dive deep into the essentials of BIA, breaking down both qualitative and quantitative impact assessments that help organizations e…
…
continue reading

1
Starlink vies for FAA deal, Nokia buys Infinera, and more top telecom stories
4:14
4:14
Play later
Play later
Lists
Like
Liked
4:14Your telecom news update for the week ending 2/28/25. Strong reaction to Starlink's push into the FAA, a sustainability survey with interesting results, and more top stories. Email me at [email protected] Endeavor Business Media
…
continue reading

1
Two Martinis and a Microphone: Where the hell is Chaz Palminteri?
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17Anxiety? Anger? Where the hell is Chaz Palminteri? A special visualization technique to help you cope during these trying times.
…
continue reading

1
CCT 223: Practice CISSP Questions - Software Development Security for CISSP (D8.2)
24:35
24:35
Play later
Play later
Lists
Like
Liked
24:35Send us a text Get ready for an eye-opening deep dive into the world of cybersecurity! This episode reveals the alarming speed at which hackers adapt and exploit vulnerabilities, with over 61% of them leveraging new exploits within 48 hours of discovery. We discuss enlightening insights from InfoSecurity Magazine and showcase the new Netflix docume…
…
continue reading

1
BEAD/BABA Rundown: What's Going on with Arielle Roth and BEAD, plus more BEAD top stories
4:12
4:12
Play later
Play later
Lists
Like
Liked
4:12In addition to our regular Telecom Top 5, we are now also offering a biweekly roundup of the latest news in BEAD, adapted from our video series. in this new episode of the BEAD/BABA Rundown from ISE Magazine. Justine Murphy gives an update on Arielle Roth's nomination to the NTIA and more.By Endeavor Business Media
…
continue reading

1
Innovation as a Service: Rethinking Digital Solutions with Yazz Krdzalic of Equus
36:31
36:31
Play later
Play later
Lists
Like
Liked
36:31In this episode of Let's Get Digital, Carrie Charles interviews Yazz Krdzalic, Vice President of Market Development at Equus Compute Solutions (ECS). Yazz shares how ECS is transforming digital infrastructure with immersion cooling systems that maximize compute power and private 5G networks enabling seamless connectivity in remote areas. He highlig…
…
continue reading

1
Knowing Without Knowing: The problematic predictability of Alaska's perpetual problems
22:56
22:56
Play later
Play later
Lists
Like
Liked
22:56Please don't tell me...layoffs, budget cuts, low oil prices, more out of state workers, gridlock on improving education and no political leadership. Same song, different verse.
…
continue reading

1
CCT 222: TP-Link Router Risks and Software Development Security for CISSP (D8.2)
41:21
41:21
Play later
Play later
Lists
Like
Liked
41:21Send us a text Unlock the secrets to fortifying your software development practices with expert insights from Shon Gerber. As we navigate the complex landscape of cybersecurity, we delve deep into the urgent risks posed by TP-Link routers, used by a staggering portion of U.S. households. Discover practical strategies for protecting your network, li…
…
continue reading

1
What we now know about Salt Typhoon and how it happened, and more top stories
4:23
4:23
Play later
Play later
Lists
Like
Liked
4:23Your telecom news update for the week ending 2/21/25. Salt Typhoon update on what exactly happened, Nvidia reports on AI in telecom, and more top stories. Email me at [email protected] Endeavor Business Media
…
continue reading

1
S3 E2: Cats and Kids, a Customer's Experience with Arlo
15:17
15:17
Play later
Play later
Lists
Like
Liked
15:17Listen to our Customer Engagement Specialist, Haley Donahue, discuss her first hand experience using Arlo security cameras. Between kids and cats, she has a lot to keep track of in her daily life, and Arlo helps her accomplish this.By Kosciusko Connect
…
continue reading

1
CCT 221: Malicious QR Codes and Advanced Digital Forensics Techniques for CISSP (D7.1)
25:48
25:48
Play later
Play later
Lists
Like
Liked
25:48Send us a text Curious about the latest tactics cybercriminals are using to exploit vulnerabilities in messaging apps? Join me, Shon Gerber, on the CISSP Cyber Training Podcast as we unravel how Russian hackers are leveraging malicious QR codes to breach platforms like Signal, Telegram, and WhatsApp. We'll dissect this alarming trend that targets h…
…
continue reading

1
250: Bridging Science and Society – The Impact of Geoscientists without Borders
27:43
27:43
Play later
Play later
Lists
Like
Liked
27:43"Humanitarian geophysics isn’t separate from the industry – it’s part of what makes our profession so valuable to the world."In this episode, Geophysical Society of Houston Honoree Craig Beasley discusses the importance of the Geoscientists without Borders (GWB) program for companies interested in aligning with the UNSDGs and achieving their CSR go…
…
continue reading

1
CCT 220: Firewall and Advanced Cybersecurity Techniques for CISSP (Domain 7.1)
42:31
42:31
Play later
Play later
Lists
Like
Liked
42:31Send us a text Uncover the secrets to mastering firewalls and advancing your cybersecurity career with insights from the CISSP Cyber Training Podcast. Ever wondered how a simple firewall can be your strongest ally against a $12 billion threat that financial firms have faced over the past two decades? Join me, Sean Gerber, as we navigate the indispe…
…
continue reading

1
Stong words between wireless and cable over spectrum, BEAD update, and more top stories
4:26
4:26
Play later
Play later
Lists
Like
Liked
4:26Your telecom news update for the week ending 2/14/24. Harsh words between lobbying groups, a BEAD update in one of the states, and more top stories. Email me at [email protected] Endeavor Business Media
…
continue reading

1
Bandwidth Builders: The People & Stories Behind the Fiber Revolution with Dan Caruso
1:30:34
1:30:34
Play later
Play later
Lists
Like
Liked
1:30:34In this episode of Let’s Get Digital with Carrie Charles, we sit down with Dan Caruso, a powerhouse in telecommunications and digital infrastructure. Known as "The Bear" for his tenacity and drive, Dan is the visionary founder and former CEO of Zayo Group, where he led the company to a $14.3 billion exit. His unmatched track record includes co-foun…
…
continue reading

1
CCT 219: Practice CISSP Questions - Mastering Vulnerability Assessments and Network Scanning for the CISSP (D6.2.1)
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12Send us a text Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of…
…
continue reading

1
249: Machine Learning Methods in Geoscience
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14“The biggest challenge for geophysicists? Learning machine learning's ‘new language’ from the world of statistics.”Machine learning is transforming geoscience, and Gerard Schuster explains how. This conversation explores key ML applications in seismic interpretation, the role of convolutional neural networks in fault detection, and why hands-on lab…
…
continue reading

1
Episode 3: Surface defects control bulk properties of lead halide perovskites
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58In this podcast episode, MRS Bulletin’s Laura Leay interviews David Cahen from the Weizmann Institute of Science, Israel, about the impact surface defects have on bulk properties, specifically in the case of lead halide perovskites. In a perspective he co-authored, Cahen connected numerous experimental data from other researchers that exposed this …
…
continue reading

1
CCT 218: Design and validate assessment, test, and audit strategies for the CISSP (Domain 6.1)
34:43
34:43
Play later
Play later
Lists
Like
Liked
34:43Send us a text Unlock the secrets to safeguarding your cloud storage from becoming a cyber attack vector in our latest episode of the CISSP Cyber Training Podcast with Shon Gerber. Discover how neglected AWS S3 buckets can pose significant threats akin to the notorious SolarWinds attack. Shon breaks down the importance of auditing and access contro…
…
continue reading

1
What will happen to BEAD under Roth, a quantum breakthrough, and more
4:34
4:34
Play later
Play later
Lists
Like
Liked
4:34Your telecom news update for the week ending 2/7/24. Roth to take over NTIA, quantum teleportation, and more top stories. Email me at [email protected] Endeavor Business Media
…
continue reading

1
From Data Centers to DeepSeek: Navigating the Future of Digital Infrastructure with Hunter Newby
55:44
55:44
Play later
Play later
Lists
Like
Liked
55:44In the premiere episode of Let’s Get Digital with Carrie Charles, we dive deep into the future of digital infrastructure with industry icon Hunter Newby of Newby Ventures. As a pioneer in carrier-neutral Meet-Me-Rooms, data centers, and network interconnection, Hunter shares his insights on the evolution of rural broadband, the BEAD funding impact,…
…
continue reading

1
CCT 217: Practice CISSP Questions - Deprovisioning and Role Definitions (D5.5.2-3)
19:10
19:10
Play later
Play later
Lists
Like
Liked
19:10Send us a text Unlock the secrets to cybersecurity success with Sean Gerber as your guide, promising not just knowledge but mastery of domain five for your CISSP exam. Will you be the one who finally understands the intricacies of identity and access management, or the latest defense tactics against the alarming rise of ransomware attacks? These ar…
…
continue reading

1
248: AI, FWI, and the Future of Subsurface Imaging
33:14
33:14
Play later
Play later
Lists
Like
Liked
33:14"Reservoir characterization has evolved beyond oil and gas. It’s now central to our clean energy future."In this episode, Andrew Geary speaks with Satinder Chopra and Heather Bedle, guest editors for December’s The Leading Edge special section on reservoir characterization. They explore how this critical topic is transforming as geophysics expands …
…
continue reading

1
North Slope Gas? Fiber Optic Cable and Data Centers
19:20
19:20
Play later
Play later
Lists
Like
Liked
19:20Amidst a sea of gas pipeline delusions, we offer something that monetizes gas and adds value to Alaska.By Andrew Halcro
…
continue reading

1
Episode 2: Compression activates optical tuning in smart window
4:47
4:47
Play later
Play later
Lists
Like
Liked
4:47In this podcast episode, MRS Bulletin’s Sophia Chen interviews Gwangmin Bae of Korea University about his work with colleagues on the design of a new smart window system that utilizes compression. Like other smart windows, this window makes use of pores within the material to adjust its transparency. However, instead of using a stretchy material th…
…
continue reading

1
CCT 216: Enhancing Board Expertise and Role-Based Access Control (Domain 5.5)
40:13
40:13
Play later
Play later
Lists
Like
Liked
40:13Send us a text Discover the game-changing strategies to strengthen your company's cybersecurity posture with our latest episode on CISSP Cybersecurity Training and Board Expertise. We reveal shocking insights: only 5% of company boards have cybersecurity expertise, a glaring gap that can jeopardize risk management and financial stability. Listen as…
…
continue reading