RunAs Radio

Richard Campbell
undefined
21 snips
Dec 3, 2025 • 41min

The M365 Copilot Data Readiness Checklist with Nikki Chapple

In this engaging discussion, Nikki Chappell, a Microsoft MVP and compliance expert with over 30 years of IT experience, shares her insights on preparing organizations for M365 Copilot deployment. She highlights challenges like data oversharing and provides a comprehensive readiness checklist. Nikki stresses the importance of archiving old information, monitoring sensitive data, and enhancing cross-team collaboration. The conversation also tackles the necessity of an AI governance council to support safe tool adoption and emphasizes a phased approach to data security.
undefined
22 snips
Nov 26, 2025 • 37min

Christmas Gifts for SysAdmins with Joey Snow and Rick Claus

Join Joey Snow, a witty technology commentator, and Rick Claus, an IT community favorite, as they tackle the tricky task of holiday gifting for sysadmins. They share clever gadget recommendations like the USB tester for troubleshooting, the quirky Dumpster Fire pen holder for desk humor, and the nostalgic NES hard drive enclosure. Explore practical tools like the iFixit smart soldering iron and fun ideas like Effing Candles. Plus, don't miss the wireless earbuds and retro Bluetooth players perfect for any tech enthusiast!
undefined
Nov 19, 2025 • 34min

Azure SRE Agents with Deepthi Chelupati

Deepthi Chelupati, Principal Product Manager at Microsoft, dives into the world of Azure SRE Agents, discussing their potential to streamline serverless applications. She explains how these agents can monitor deployment issues, automate incident responses, and integrate with tools like GitHub and Azure DevOps. Deepthi highlights their ability to learn from past incidents, manage telemetry changes, and facilitate incident response while ensuring flexibility between automated actions and human oversight. Excitement is building around how SRE Agents can significantly enhance operational efficiency.
undefined
Nov 12, 2025 • 39min

Azure Resiliency with Chris Ayers

In this engaging discussion, Chris Ayers, a senior software engineer at Microsoft’s Azure Reliability team, dives into the complexities of Azure resiliency. He highlights the Well-Architected Framework and its role in aligning reliability with business needs. Chris outlines types of outages, the importance of availability zones, and the necessity of balancing costs with service reliability. With practical advice on monitoring, operational excellence, and data protection, he emphasizes the value of automated tools while stressing the importance of human oversight in decision-making.
undefined
30 snips
Nov 5, 2025 • 32min

Managing Updates using Autopatch with Aria Hanson

Aria Hanson, a Program Manager at Microsoft focused on cloud-based update management, dives into the future of Windows updates. She explains how Windows Autopatch consolidates updates for easier management, especially as WSUS is phased out. Aria discusses the benefits of cloud deployment, optimal patch deployment strategies, and the importance of tracking updates through Intune. With insights on handling drivers and firmware, as well as the Windows Roadmap for feature planning, she emphasizes why organizations should embrace cloud updating now.
undefined
Oct 29, 2025 • 39min

AI for DBAs with Grant Fritchey

In this enlightening discussion, Grant Fritchey, a Data platform MVP and seasoned DBA expert, shares insights on leveraging AI tools in database management. He highlights how AI can streamline tasks like query optimization and data generation while emphasizing the importance of human oversight. Grant compares various LLMs, pointing out their unique strengths and the risks of AI hallucinations. He argues that rather than replacing DBAs, AI will reshape their roles toward more strategic tasks, enhancing productivity and forecasting capabilities.
undefined
6 snips
Oct 22, 2025 • 38min

Becoming a Cybersecurity Expert with Paula Januszkiewicz

Paula Januszkiewicz, CEO of Secure/ Secure Academy, shares her journey in cybersecurity, driven by insatiable curiosity. She discusses the delicate balance between education and hands-on experience, highlighting the intense demands of incident response. Paula reveals the challenges of legacy protocols in aviation security and how AI is transforming both attack and defense strategies. With a focus on proactive measures, she illustrates the importance of building community through knowledge sharing and the evolving career paths in the cybersecurity landscape.
undefined
25 snips
Oct 15, 2025 • 54min

The End of NTLM with Steve Syfuhs

Steve Syfuhs, who leads the Windows authentication platform team at Microsoft, discusses the impending retirement of NTLM, a legacy authentication protocol. He outlines the complexities involved and explains how auditing improvements can help identify NTLM usage. Steve reveals why transitioning to Kerberos is not always straightforward and introduces Microsoft Negotiate as a valuable intermediary. He emphasizes that while retiring NTLM requires time and meticulous planning, there are steps organizations can take today to prepare for a secure future.
undefined
15 snips
Oct 8, 2025 • 31min

Managing for Failure with Amy Norris

In this engaging conversation, Amy Norris, a graphic designer turned software developer at Dimensional Innovations and volunteer with Kansas City Women in Tech, delves into fostering a culture that embraces failure. She emphasizes the importance of clear communication and detailed feedback to create a safe space for asking questions and discussing challenges. Amy also discusses the value of preparing for crises through drills and open incident channels, while encouraging constructive criticism among team members for continuous improvement.
undefined
13 snips
Oct 1, 2025 • 41min

HaveIBeenPwned with Troy Hunt

In this engaging discussion, Troy Hunt, an internet security expert and the creator of Have I Been Pwned, reveals the importance of breach awareness and password management. He explains how his service notifies users of compromised accounts, which can mitigate risks for both individuals and organizations. Troy also delves into the motivations behind data sharing from researchers and criminals, the regulatory landscape regarding breach notifications, and the challenges companies face post-breach. With insight into password security and the value of adopting password managers, this conversation is a treasure trove of information for anyone concerned about online safety.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app