Billions & Billions of eyeballs, six continents, 10k+ servers, and plenty of lessons learned over 2+ decades in IT
If you're looking for quick tips on optimizing tech, managing suppliers, and growing a business, 20 Minutes Max is the space for you.
Join me as I talk about things that come up during my day and share insights on taking your business to the next level. In less than 20 minutes, you'll walk away with actionable advice and strategies for success. Take advantage of this valuable resource for CEOs, CFOs, and business leader
Latest Episodes
Some Companies Save $12M a Year with Baremetal! How Much Can Yours?
Is your company overspending on Amazon Web Services (AWS)? Discover how some businesses save $12 million annually by switching to Bare Metal servers! Learn how to opti...
![](https://img.transistor.fm/qpEil_yL4_9WCnh5vutIFskpEYC4tWitCv2-4mhKFow/rs:fill:800:800:1/q:60/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNDU4/ZjM1NGM2ODRmMTFk/NzlkYjc4NzlmYTNl/OWNkOS5wbmc.webp)
Ubiquity vs. Meraki: Which Network Solution Fits Your Business?
Finding the right network solution can be a challenge. While Ubiquiti offers reliable performance at a lower cost, other brands like Ruckus, Meraki, and Aruba excel in...
![](https://img.transistor.fm/y-bCcCFbkIMbke7NM5gU558rbAM0d7gyYseQoI9goME/rs:fill:800:800:1/q:60/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZTg1/NDllMTI1ZGM1ODc5/MmMyMzE3Yjg3YjJi/ZTdkZi5wbmc.webp)
How to Find Shadow IT and Uncover Unknown Apps in Your Organization
CEOs, are you aware of the unknown apps your employees might be using? Hidden tools can pose significant risks to your business, from compliance issues to security thr...
![](https://img.transistor.fm/r4E1uzKY7TAR6PnEE1NraAO-UJAWah9oO2g7SQ2QFXk/rs:fill:800:800:1/q:60/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MjM0/ZTg0Yzc5MzIyNzUx/YmNkYjI5NDE2NjAw/NmI1Ny5wbmc.webp)
Protecting Your Business: Preventing CircleCI Cybersecurity Breaches
CircleCI, a leading continuous integration and deployment (CI/CD) platform, faced a breach detected by a vigilant customer, involving compromised tokens. This incident...
![](https://img.transistor.fm/9l5E9rTe5TrLlMVOzB2ZCYJYEomEmkszTzwyLj_IBXk/rs:fill:800:800:1/q:60/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWU3/ZDIyMjQ2MTMyODZi/NmI4MWYxYTgyNTFi/YjYyYS5wbmc.webp)
Discover Why SASE is the Ultimate Upgrade from Secure Service Edge
Explore how Secure Service Edge (SSE) and Secure Access Service Edge (SASE) revolutionize your network security! Let’s discuss the key differences and benefits, highli...
![](https://img.transistor.fm/hUeD8hRkRm8jkD_KUlG1v-3ckc3iZ1tHycN2s00iRXI/rs:fill:800:800:1/q:60/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xMzM2/YzJlNWM2ZDU0YWRi/M2Q0ZTk4YmZhNDY2/MDU4My5wbmc.webp)