Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/d4/b9/15/d4b915da-9be9-9328-c3ba-f80fe4577544/mza_6312212619849951327.jpg/600x600bb.jpg
Technology Tap
Juan Rodriguez
105 episodes
15 hours ago
professorjrod@gmail.com One idea rewired computing: what if one machine could convincingly pretend to be many? We start with mainframes and time sharing, then move through hypervisors, virtual machines, and the moment virtualization became the backbone of the cloud. From there, the story accelerates into public, private, hybrid, and community cloud models, and the service stack that defines modern IT—Infrastructure as a Service, Platform as a Service, and Software as a Service—so you know exa...
Show more...
Technology
Education,
Self-Improvement,
Courses
RSS
All content for Technology Tap is the property of Juan Rodriguez and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
professorjrod@gmail.com One idea rewired computing: what if one machine could convincingly pretend to be many? We start with mainframes and time sharing, then move through hypervisors, virtual machines, and the moment virtualization became the backbone of the cloud. From there, the story accelerates into public, private, hybrid, and community cloud models, and the service stack that defines modern IT—Infrastructure as a Service, Platform as a Service, and Software as a Service—so you know exa...
Show more...
Technology
Education,
Self-Improvement,
Courses
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/d4/b9/15/d4b915da-9be9-9328-c3ba-f80fe4577544/mza_6312212619849951327.jpg/600x600bb.jpg
Cybersecurity Fundamentals: Hunting Weak Spots Chapter 8
Technology Tap
25 minutes
1 month ago
Cybersecurity Fundamentals: Hunting Weak Spots Chapter 8
professorjrod@gmail.com What’s the weakest link in your world—an old router, a forgotten Windows box, or that “anyone with the link” setting you meant to change? We unpack the real vulnerabilities hiding in small businesses, nonprofits, and home networks, then share a clear playbook to find them early and fix them fast without enterprise budgets. We start with the quiet culprits: end‑of‑life operating systems, abandoned firmware, and default passwords that ship on printers, cameras, and rout...
Technology Tap
professorjrod@gmail.com One idea rewired computing: what if one machine could convincingly pretend to be many? We start with mainframes and time sharing, then move through hypervisors, virtual machines, and the moment virtualization became the backbone of the cloud. From there, the story accelerates into public, private, hybrid, and community cloud models, and the service stack that defines modern IT—Infrastructure as a Service, Platform as a Service, and Software as a Service—so you know exa...