Folgen

  • Techstrong Gang - 01/8/2026
    Jan 8 2026

    Alan, Mike, Jon, Fred Wilmot and Gina Rosenthal dive into an Intel resurgence that might be underway following some announcements made this week at CES. Then the gang debates the merits of a California effort to protect privacy by reining in data brokers before discussing how continuous observability might be the key to cybersecurit

    Mehr anzeigen Weniger anzeigen
    45 Min.
  • Techstrong Gang - 01/7/2026
    Jan 7 2026

    Alan, Mike, Mitch, Jon and Teri Robinson dive into the rapid pace of robotics development that manifested itself this week at the CES conference. Then the gang takes a look at the rate of investment being made in data centers that are expected to run artificial intelligence (AI) applications before discussing the degree to which cybersecurity spending might increase in 2026.

    Mehr anzeigen Weniger anzeigen
    49 Min.
  • Techstrong Gang - 01/6/2026
    Jan 7 2026

    Alan, Mike, Mitch, Chris Blask, Kate Scarcella and Dan O'Brien, president and COO of the Futurum Group, dive into an autonomous vehicle push being made by NVIDIA and the launch of a series of AI laptops from HP, Inc. that don't require a graphic processor unit (GPU) that were all launched at the CES conference this week, Then the gang remembers former IBM CEO Lou Gerstner, who passed away over the holidays.

    Mehr anzeigen Weniger anzeigen
    42 Min.
  • Techstrong Gang - 01/5/2026
    Jan 5 2026

    Alan, Mike, Mitch, Jack Poller and Stephen Foskett, president of the Tech Field Day arm of the Futurum Group, dive into a $20 billion licensing agreement that gives NVIDIA access to an artificial intelligence (AI) accelerator developed by Groq AI before delving into why Meta is acquiring Manus to gain access to a set of general purpose AI agents.Then the gang takes a look at MongoDB Bleed, a vulnerability affecting the widely used database that has been actively exploited over the holidays.

    Mehr anzeigen Weniger anzeigen
    43 Min.
  • Techstrong Gang - 12/23/2025
    Dec 23 2025

    Alan, Mike, Mitch, Jon, Tracy Ragan, Chris Blask, JP Morgenthal, Fred Wilmot, Jack Gold and Teri Robinson wrap up 2025 by discussing how the biggest trends in IT, cybersecurity and artificial intelligence (AI) are, for better or worse, impacting not just businesses but society as a whole.

    Mehr anzeigen Weniger anzeigen
    1 Std.
  • Techstrong Gang - 12/22/2025
    Dec 22 2025

    Alan, Mike, Jack Poller and Jack Gold dive into how training will need to evolve in the age of artificial intelligence (AI) following a move by Coursera to acquire Udemy and the extension of an online learning alliance between Pearson and IBM. Then the gang takes a look at an inquiry into the impact AI is having on electric bills that has been launched by three U.S. senators before discussing whether Oracle losing funding for a data center project might be one of the first signs of the AI bubble starting to pop.

    Mehr anzeigen Weniger anzeigen
    49 Min.
  • Techstrong Gang - 12/19/2025
    Dec 19 2025

    Mike, Alan, Jon, Alastair Cooke and Gina Rosenthal dive into reports that suggest Amazon is about to make a major investment in OpenAI before trying to make sense of Microsoft's latest plans for applying artificial intelligence (AI) to application development. Then the gang delves into a report that suggests the quality of the code being generated by AI coding tools has a lot more defects than most organizations fully appreciate.

    Mehr anzeigen Weniger anzeigen
    49 Min.
  • Techstrong Gang - 12/18/2025
    Dec 18 2025

    Alan, Mike, Mitch, Jon, Teri Robinson and Futurum Group analyst David Nicholson debate the merits of a reported proposed Intel acquisition of SambaNova to gain access to artificial intelligence (AI) accelerator processors, before diving into the degree to which AI agents are actually being adopted in enterprise IT environments. Then the gang turns its attention to a cybersecurity advisory from OpenAI warning that the next generation of its AI models will likely be used by cybercriminals for nefarious purposes.

    Mehr anzeigen Weniger anzeigen
    42 Min.