Interviews RSS Feed

Category: Mobile Computing & Telecommunication

Scott Aurnou
Scott Aurnou joins Jim Blasingame to reveal some of the best practices and tips you can use in order to secure your data on laptops, tablets and phones, including password length.
Scott Aurnou
Scott Aurnou joins Jim Blasingame to report on some of the ways “social engineers” have found to infiltrate your business and computers and steal your data, and how to minimize that risk.
Jeff Zbar
Jeff Zbar joins Jim Blasingame to discuss the two primary smart phone operating systems and offer suggestions about when to upgrade.
Karen Kerrigan
Karen Kerrigan joins Jim Blasingame to report on the NLRB, FCC and other agencies as they assault employment laws and turn the Internet into a government utility run by a global entity.
Arky Ciancutti
Arky Ciancutti joins Jim Blasingame to talk about the power of establishing trust guidelines for each organization.
Stijn Hendrikse
Stijn Hendrikse joins Jim Blasingame to explain how to set up your own cloud-based call center and connect all of the ways customers can try to connect to you in real time.
Stijn Hendrikse
Stijn Hendrikse joins Jim Blasingame to explain how his cloud-based call center incorporates traditional and new media contact from customers and routes them to you and your people in real time.
Scott Aurnou
Scott Aurnou joins Jim Blasingame to report on how the Patriot Act was changed and whether that will impact how the government protects us from terrorism.
Kathy Perry
Kathy Perry joins Jim Blasingame to report on Google’s plan to create algorithms that promote websites that are mobile compatible at the expense of those that aren’t.
Jeff Zbar
Jeff Zbar joins Jim Blasingame to talk about how to make sure your plans are accomplished and communications are received by business associates and customers.

Browse by category