DiscoverNPI Tech Guys
NPI Tech Guys
Claim Ownership

NPI Tech Guys

Author: Jay Hill / Sam Bushman

Subscribed: 0Played: 0


Welcome to NPI Tech Guys, your go-to radio show for cutting-edge Managed IT Services! Are you tired of unresponsive, slow service from your current IT provider? Discover a world where network security, data protection, and expert support come together seamlessly. Stay tuned to learn how to transform your IT experience and never worry about downtime again! Call us at 866-986-NEWS and let's make IT great together!
66 Episodes
In this exciting episode, we dive into the revolutionary impact of artificial intelligence on music creation. Discover how AI is transforming the music industry, from composing underscores to generating hit songs. Later in the episode, join us for a hilarious and innovative brainstorming session as Sam unveils his quirky new idea on an Alarm clock with a surprise!
We explore the rapidly changing landscape of ad-free streaming. Once a haven from commercials, streaming services like Netflix, Disney+, and Amazon Prime Video have begun integrating ads, making it harder than ever to avoid interruptions. We'll delve into how this shift impacts viewer experience and subscription costs. Additionally, we'll discuss the explosive growth of the connected cars market, projected to soar from $63.03 billion in 2019 to $225.16 billion by 2027. Finally, we'll touch on groundbreaking advancements in touchscreen technology from Northwestern University, where engineers have developed screens that allow users to feel textures, transforming how we interact with our devices. Join us for a deep dive into these pivotal tech trends shaping our future.
In this episode, we dive into T-Mobile's recent $4.4 billion acquisition of US Cellular's wireless operations and spectrum assets, a strategic move that brings in an additional 4 million customers and strengthens T-Mobile's market position. We'll explore the details of the deal, including the new master license agreement for over 2,000 towers and the extended lease terms for around 600 existing towers. Additionally, we'll discuss the evolving role of leadership in the age of AI, featuring insights from David Streitfeld and Vinay Menon of Korn Ferry. Menon emphasizes that while AI can enhance efficiency and reduce costs, the need for strong leadership remains crucial. Join us for a comprehensive analysis of these significant developments in the tech and business world.
Apple is set to revolutionize Siri, its iconic virtual assistant, with an ambitious generative A.I. upgrade, marking the most significant restructuring the tech giant has undertaken in over a decade. This decision was spurred by Apple's top software executives, Craig Federighi and John Giannandrea, who, after experiencing the capabilities of OpenAI's ChatGPT, recognized Siri's limitations in comparison. ChatGPT's ability to handle continuous conversations and complex tasks highlighted Siri's outdated one-question-at-a-time format, which often led to misunderstandings. This realization prompted a major shift towards integrating generative A.I., positioning Apple to maintain its competitive edge in the evolving tech landscape. The upcoming developers conference on June 10 is expected to showcase an enhanced Siri that can engage in more dynamic and versatile conversations, backed by a generative A.I. system designed to be private and efficient by processing data directly on iPhones.Amidst rising competition and the potential threat of A.I. technology supplanting traditional operating systems, Apple is focusing not only on upgrading Siri but also on broader A.I. applications across its suite of products. This includes enhancing iPhone memory capabilities and possibly incorporating A.I. models from other tech giants to bolster Siri’s functionality. Apple's approach aims to keep the user experience seamless and private, avoiding the cloud-based processing costs that competitors face. However, this strategy comes with its own set of challenges, such as the risk of increased errors in smaller, device-based A.I. systems. Despite these hurdles, Apple's shift reflects a critical pivot in its long-term strategy, moving from hardware-centric innovations to sophisticated A.I. integrations, hoping to redefine user interaction with technology.
   This episode of our podcast delves into the urgent joint cybersecurity advisory issued by the FBI, alongside the U.S. Department of State and the National Security Agency, highlighting a serious threat posed by North Korean-backed hackers. Known as Kimsuky, these hackers are impersonating trusted individuals and organizations through sophisticated email spoofing to gain geopolitical insights and influence. We explore their tactics, the implications for national security, and the protective measures recommended for email users. Additionally, the episode shifts focus to personal cybersecurity with essential tips for safe online shopping, especially relevant with Mother’s Day approaching. We discuss how to avoid common scams, the safest payment methods to protect your financial information, and best practices to ensure a secure online shopping experience. This blend of national security concerns and personal cybersecurity guidance provides a comprehensive look at the current digital threat landscape and practical steps to safeguard against it.
The AI Frontier

The AI Frontier


   In this episode, we delve into Microsoft's groundbreaking move into smaller AI systems, challenging the industry's obsession with size. From the Phi-3 series to the impact on accessibility and affordability, we explore how these innovations are reshaping AI applications across industries. Additionally, we discuss the alarming FBI report on the $3.4 billion lost to scams by Americans over 60 in 2023, and how AI could combat such threats. Stay tuned for insights on top note-taking apps and a recommendation for
   Join us on [Podcast Name] as we delve into the latest developments in the electric vehicle (EV) landscape. From surprising legislative mandates to tech glitches and crash rate concerns, we've got you covered.   We discuss the push to include AM radios in cars, Apple's efforts to fix glitchy iPhone alarms, and the higher crash rates of EVs, particularly Teslas, and the factors contributing to this trend. Discover the complexities of the EV revolution and gain valuable insights for navigating its challenges. Tune in now to stay informed.
   In this episode the TWR Team delves into the serious repercussions of the February cyberattack on UnitedHealth's subsidiary, Change Healthcare. An alarming amount of personal and health data from a significant portion of Americans was compromised. UnitedHealth has disclosed paying a ransom to protect this sensitive data, although the exact amount remains undisclosed. The episode also features a discussion on "juice-jacking," a decade-old security threat involving public phone charging stations that hackers exploit to install malware or steal data. We discuss some essential tips on how to avoid malware, emphasizing the use of power outlets over USB ports, and the benefits of wireless charging and charge-only cables to ensure security while traveling.
   In this episode of the podcast, we delve into two significant topics. First, we explore how becomes an indispensable tool for on-the-road emergencies, as Sam demonstrates the swift process of sharing and editing designs through Canva's user-friendly platform. We cover the steps to grant edit access via a collaboration link, allowing anyone with the link to modify the design without needing a Canva account, particularly handy for mobile users who will need to log in. Secondly, we discuss a major development in digital policy as Cecilia Kang reports on the FCC's decision to reinstate Net Neutrality rules. The commissioners voted along party lines to treat broadband as a utility-like service, echoing regulations previously set under Obama and later dismantled under Trump. This episode provides insights into both collaborative digital tools and significant regulatory changes in telecommunications.
Echoes in the Code

Echoes in the Code


   In this podcast we explore the surprising intersections of technology and daily life. Join us as we uncover the stories behind the statistics and meet the individuals whose quiet contributions keep our digital and real-world landscapes thriving. Whether it's a deep dive into the realm of sports fans or a thrilling recount of a cybersecurity save that almost went unnoticed, this podcast connects the dots in a world wired with endless complexities.
   In this episode, we delve into Tesla's recent recall of nearly 4,000 Cybertrucks, stemming from an accelerator pedal issue where a lubricant (soap) used during assembly may cause the pedal to stick, risking entrapment above the pedal. This problem affects all Model Year 2024 Cybertrucks manufactured between November 13, 2023, and April 4, 2024, and notably, cannot be corrected with Tesla's typical over-the-air updates, requiring physical servicing instead. Alongside this, we explore the rapid advancements in AI, highlighting a new report that positions AI as surpassing human performance in most benchmarks, suggesting the need for new ways to measure AI capabilities as it continues to evolve at an astonishing pace.
  We delve into the realm of cybersecurity through the lens of penetration testing, a critical and intriguing field that addresses the security vulnerabilities of computer systems by simulating cyberattacks. Penetration testing, often referred to as "pen testing," involves skilled professionals known as penetration testers or ethical hackers, who use their expertise in hacking tools and techniques not to cause harm, but to identify and rectify security weaknesses. Companies engage these specialists to perform simulated attacks on their networks, applications, and other digital assets, enabling them to discover and mitigate potential security risks effectively. This practice not only helps in safeguarding against actual cyber threats but also significantly enhances a company's overall security posture. Additionally, the podcast will touch on the broader field of ethical hacking, which encompasses various services beyond penetration testing, such as malware analysis and risk assessment, highlighting the essential role these activities play in strengthening network security.  We also explore the significant consumer dissatisfaction surrounding Tesla's Cybertruck. Owners have reported a range of issues from basic operational failures like the vehicle not turning on or charging, to more alarming concerns about visibility problems that pose safety risks. Critics, including those found on platforms such as Jalopnik, point to rushed production and cost-cutting measures as potential causes for these defects. The complaints have been so severe that some have been removed from forums only to resurface elsewhere due to their critical nature. 
Explore the essential protections of Cyber Insurance in this episode of NPI Tech Guys / TechWatch Radio. As cyber threats like ransomware and DDoS attacks grow more sophisticated, understanding and securing the right insurance is crucial for any business. We'll discuss what cyber insurance covers, its necessity in the face of increasing digital risks, and how it should complement robust cybersecurity measures. Learn about the role of personalized coverage options and the importance of a strong cybersecurity posture in securing effective insurance. Join us as we navigate the complexities of cyber risk insurance to safeguard your business assets.
In this thrilling episode, we're venturing into the future where Earth time meets Moon time, as the White House tasks NASA with developing a unified lunar standard to streamline future celestial missions. Imagine the complexity of coordinating operations and communications between two celestial bodies without syncing clocks! Meanwhile, back on Earth, Microsoft responds to years of critique and regulatory scrutiny by separating Teams from its Office 365 suite, a move sparking debates on its impact on the tech giant's trajectory. Tune in as we explore these pivotal moments in space exploration and tech industry dynamics.
This podcast episode delves into the critical issue of cybersecurity, emphasizing that 81% of breaches last year involved weak or stolen passwords, and provides guidelines for creating strong passwords to enhance security. Additionally, the episode explores the technological advancements and setbacks of Amazon's 'Just Walk Out' checkout technology. Initially heralded as a futuristic shopping solution, Amazon is scaling back on this approach due to its high operational costs and inefficiencies, opting instead for Dash Carts and self-checkout counters in its Fresh stores, while retaining the original technology in smaller outlets.
* Google Podcasts is shutting down soon, users urged to move to YouTube Music - Sarah Perez.* I Stopped Using Passwords. It's Great—and a Total Mess.* Bitwarden’s Passkey Feature for Businesses.* Robinhood’s new credit card goes after Apple Card with ability to invest cash-back perks - TechCrunch.comEight months after acquiring credit card startup X1 for $95 million, Robinhood announced today the launch of its new Gold Card, with a list of features that could even give Apple Card users envy.Robinhood, better known for its brokerage app aimed at the everyday investor, is touting all sorts of benefits with its new card in an attempt to attract users. The card has no annual or foreign transaction fees. However, it will only be available for Robinhood Gold members, which costs $5 a month, or $50 annually. (Gold is a program that offers other benefits like 5% APY on an account’s uninvested brokerage cash.) Gold Card users can earn 3% cash back on all categories, including restaurants and groceries, and 5% cash bank when booking travel at Robinhood’s new travel portal. That cash back can be transferred to brokerage accounts, which can go toward making investments like stock purchases, the company says. The ability to invest using cash back is the big innovation that X1 developed prior to getting acquired.Another interesting feature of the Gold Card includes the ability to provide cards for family members. This is the first time that Robinhood has introduced a family-oriented financial product, Robinhood Money General Manager Deepak Rao told TechCrunch. Rao was the founder and CEO of X1 before joining Robinhood in the acquisition. Users will have the ability to add up to five family members as cardholders to their account with every cardholder receiving their own card. Additional cardholders can be any age, giving parents a way to help teens build credit and monitor spending. The ability to provide cards to family members will extend even to those visiting from other countries.“A user can provide cards to parents, children or caregivers and set the right kind of controls and protection, while also helping them build their credit,” Rao said. “They don’t have to provide any other information than their name and date of birth and Social Security number if they have one. If you’re worried about spending limits, you can put a dollar amount limit and also a child-safe mode for kids.”The Card also allows users to create and delete virtual cards for one-time purchases and will have an APR of 20.24% – 29.99%, which Robinhood said will vary with the market based on the Prime Rate.
* AT&T Says Data From 73 Million Current and Former Account Holders Leaked on Dark Web - Tom Ozimek.Data from roughly 7.6 million current account holders and 65.4 million former account holders were released on the dark web, AT&T said.AT&T said it had reset passcodes for 7.6 million current account holders affected by the leak.“We will be reaching out to individuals with compromised sensitive personal information separately and offering complimentary identity theft and credit monitoring services,” the company said in a statement.AT&T said it hasn’t found any evidence of unauthorized access to its systems that resulted in data being stolen and that it has launched a “robust” investigation into the incident with the help of outside cybersecurity experts.* 37 million T-Mobile customers were hacked | CNN Business - Jan 19, 2023.* Twitter’s Data Leak Exposes Over 5.4 Million Users.* Earlier this year, Twitter confirmed that an API vulnerability had caused a massive data leak containing non-public information for over 5.4 million Twitter users - Used with permission from Article Aggregator.Twitter denied claims that hackers had leaked the private information priorly. However, Pompompurin, the owner of the hacking forum Breached, stated they were responsible for exploiting the API bug and platforming the data after another hacker shared the vulnerability with them.The stolen data includes public information like Twitter IDs, account names, logins, locations, and verified status. In addition, private information like phone numbers and email addresses have also been exposed. Fraudulent activities such as phishing could be carried out using this information.In addition to the breach of the 5.4 million active accounts, private information for roughly 1.4 million suspended Twitter profiles were also shared using the same API bug. While the extent of the data breach is not fully known, security expert Chad Loder stated that information for "tens of millions" of Twitter users might have been collected using the same API bug.To keep yourself safe, disregard emails claiming to be from Twitter that state your account is suspended. In addition, be skeptical of emails about issues logging in or the account is about to lose its verified status. These emails are probably attempting to phish for your private information to use in fraudulent activities.** Hackers Behind the Change Healthcare Ransomware Attack Just Received a $22 Million Payment!The transaction, visible on Bitcoin's blockchain, suggests the victim of one of the worst ransomware attacks in years may have paid a very large ransom.On March 1, a Bitcoin address connected to AlphV received 350 bitcoins in a single transaction, or close to $22 million based on exchange rates at the time.
* Instagram is working on a feature that would allow you to let others put a ‘Spin’ on your Reel - Aisha Malik.* Instagram is working on a “Spins” feature for Reels, its short-form video TikTok clone, the company confirmed to TechCrunch.* Suspect Your Computer Has Been Hacked? Do These 5 Things Now!
* The Apple iPhone antitrust lawsuit from the DOJ -* The DOJ’s case against Apple adds to a growing pile of antitrust problems for Cupertino.* DOJ’s Apple antitrust case neatly aligns with EU on one key point: NFC and mobile payments.* Bitcoin hits new high!* Is A TikTok ban looking more and more like reality?
* Elon Musk: AI will run out of electricity and transformers in 2025 -* Gemini, a Merger of a Chatbot and an Assistant, Enters the Arena - Cade Metz.When will the standard digital assistant such as Seri and Alexa ETC. be replaced by the next gen chatbot?* Brave’s Leo AI assistant is now available to Android users - Aisha Malik.* Robocalls Created by AI Outlawed.The move by the agency follows a phony call last month that was made to sound like President Biden telling New Hampshire voters to stay home.