Between the Bytes cover image

Between the Bytes

Latest episodes

undefined
Dec 24, 2020 • 30min

Journey to Azure for ISVs: Part 3 - What's so great about Azure?

Welcome to our third episode in the Journey to Azure for ISVs series. In this episode, we're going deep on all of the reasons why an ISV would pick Azure over some of the other cloud providers. We'll talk about specific comparison points, share some stories, and as always, nerd out about the cloud.  0:00 - 2:00: Azure's innovations and your ability to innovate 2:10 - 5:20: Considerations about data power 5:20 - 7:50: If Azure were a car, what kind would it be? 8:00 - 14:30: The path to market and the Marketplace application store 15:00 - 20:00: Cost comparison of Microsoft Azure 20:00 - 26:00: Clarification around provisioning and how using Azure actually works 26:00 - 30:00: Comprehensive Microsoft support  Power of AI/Machine Learning Case Study Link Learn more about Executech's Managed Azure Services
undefined
Dec 24, 2020 • 37min

Journey to Azure for ISVs: Part 2 - What are the key business considerations for a move to the cloud?

Welcome back to our second part in our series of Journey to Azure for Independent Software Vendors (ISVs). In this episode, we're going to talk in-depth about the business considerations for moving the cloud. What should you examine in your technical infrastructures, financial models, business vision, and beyond before moving to the cloud? 0:00 - 3:50 - Should your app move to the cloud? - Does the market demand it?  3:50 - 5:45 - Why is the SaaS model so pervasive? 5:50 - 13:00 - What is your business vision and roadmap? - Discussion on financial considerations, revenue models, planning, capital expenditures, etc.  13:00 - 16:30 - How a consultant can help with the business operation consideration of the cloud 16:30 - 27:00 - How does your application/software function? Is it old? How is its performance? Does it scale? 27:00 - 34:00 - Can you keep up with change? Can easily can you add new features and innovate today? 34:00 - 37:00 - Summary of considerations: Market demand, company vision, current infrastructure, innovation Want to learn more about the Azure cloud? Not sure if the cloud is a good move for you, or even where to get started? Already in the cloud but worried you're not getting the most of it? We're here to help! Learn more and visit us at www.executech.com/azure
undefined
Dec 24, 2020 • 22min

Journey to Azure for ISVs: Part 1 - Why the Cloud? Why now?

Introducing our series on moving to the cloud - Journey to Azure! In this series of episodes, we'll talk about all the benefits, hesitations, hows, whats, and whys of moving to the cloud for Independent Software Vendors. The first episode is an overview of the general benefits the cloud brings to ISV businesses. 0:00 - 5:00 - Host introduction, about Executech 5:00 - 8:50 - Why you WOULDN'T move to the cloud. 9:00 - 16:45 - Discussion on the major benefits of the cloud to businesses 17:00 - 18:00 - Does the cloud work if I use a SaaS model already? 18:00 - 20:00 - What is the benefit and impact to my customers and end-users if I move to the cloud? 20:00 - 21:00 - Preview of next episode Want to learn more about the Azure cloud? Not sure if the cloud is a good move for you, or even where to get started? Already in the cloud but worried you're not getting the most of it? We're here to help! Learn more and visit us at www.executech.com/azure
undefined
Dec 23, 2020 • 19min

Solar Winds Hack - Overview of what we know and how it impacts you

News of the Solar Winds hacks on government and private sector systems has been sweeping the media. In this episode of Between the Bytes, we invite special guest Chris Nokes, CTO of Executech to explain the what, who, why, and how of the attack. If you're interested in learning how to protect your organization from cyber threats, visit www.executech.com/cyber. 
undefined
Dec 23, 2020 • 9min

[Rundown] 15/15 Common Cyber Threats in 2020 and Beyond - Part 3

Our third episode covering 15 common types of cyber threats and attacks and how to prevent them. In this episode we're covering the final 5: Ransomware Cryptojacking Water Hole Attack Drive-By Attack Trojan Virus Read the full article on common cybersecurity threats here.
undefined
Dec 1, 2020 • 10min

[Rundown] 10/15 Common Cyber Threats in 2020 and Beyond - Part 2

Our second episode covering 15 common types of cyber threats and attacks and how to prevent them. In this episode we're covering the next 5: Zero-Day Exploits Cross-Site Attack SQL Injection Man in the Middle Attack Social Engineering Read the full article on common cybersecurity threats here. YouTube Video on using social engineering to gain access to an account with just a phone call.
undefined
Nov 10, 2020 • 14min

[Rundown] 5/15 Common Cyber Threats in 2020 and Beyond

Join us for a series of short-form episodes covering 15 common cyber threats. In this episode we're covering the first 5:  Malware Password Theft Traffic Interception Phishing Attacks DDoS Read the full article on common cybersecurity threats here. 
undefined
Oct 8, 2020 • 9min

[Rundown: Short Form Episode] Cybersecurity Concerns for Manufacturers (and all businesses)

We're back and we're introducing an alternative form of episodes - Rundowns. In a Rundown episode, we'll cover a popular technology topic in a short, fast, and digestible format. We'll still have longer episodes mixed in from our webinars, events, and interviews as well. In this episode of Tech Topics Rundown, we cover 5 biggest cyber threats that manufacturing companies face. But it's not just manufacturers that face these risks, all companies should pay attention to these security risks.  Learn more about Executech: https://www.executech.com/about-us/ Have a burning IT question or need help? Get in touch: https://www.executech.com/free-assessment/
undefined
Aug 25, 2020 • 13min

Technology & Networking at Home - Our Favorite Hardware for WFH

Do you need a firewall at home? How much does it cost to put Sophos on your employee's laptops? What's the best type of router for your home? In this week's episode of Between the Bytes, we'll discuss some of our favorite technology options for our home offices. As always, we'll touch on some security concerns and the steps you can take to make yourself more secure. Want to learn more about IT considerations for remote teams and working from home? Check out our webinar: https://www.executech.com/insight/webinar-it-considerations-for-your-home-office/
undefined
Aug 4, 2020 • 22min

Gone Phishing: What is Phishing and How to Protect Yourself

In our latest episode of Between the Bytes we bring a group of of Executech veterans together to discuss phishing. We cover the basics of what phishing or spear-phishing attempt is, how it's gotten worse over the years, and what you can do to protect yourself and your organization from malicious phishing attempts. To learn more about phishing scams targeted to Coronavirus worries, visit: https://www.executech.com/insight/coronavirus-phishing-scams-how-to-protect-your-information/ To request a free cybersecurity assessment or to get information on having a security consultant run a social engineering phishing test at your organization, visit: https://www.executech.com/contact-us/

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app