<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="/global/feed/rss.xslt" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podaccess="https://access.acast.com/schema/1.0/" xmlns:acast="https://schema.acast.com/1.0/">
    <channel>
		<ttl>60</ttl>
		<generator>acast.com</generator>
		<title>IT SPARC Cast</title>
		<link>https://shows.acast.com/it-sparc-cast</link>
		<atom:link href="https://feeds.acast.com/public/shows/66cf6d924960e4eb18d4aa8d" rel="self" type="application/rss+xml"/>
		<language>en</language>
		<copyright>John Barger</copyright>
		<itunes:keywords>Enterprise IT, IT, Tech, Networking, Security, CVE, Vulnerability,Vulnerabilities,network, Cisco, Microsoft,HPE, Juniper, CIO, CISO</itunes:keywords>
		<itunes:author>John Barger</itunes:author>
		<itunes:subtitle>This Week in Enterprise IT News</itunes:subtitle>
		<itunes:summary><![CDATA[IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		<description><![CDATA[IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
		<itunes:explicit>false</itunes:explicit>
		<itunes:owner>
			<itunes:name>John Barger</itunes:name>
			<itunes:email>info+66cf6d924960e4eb18d4aa8d@mg-eu.acast.com</itunes:email>
		</itunes:owner>
		<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
		<acast:showUrl>it-sparc-cast</acast:showUrl>
		<acast:signature key="EXAMPLE" algorithm="aes-256-cbc"><![CDATA[wbG1Z7+6h9QOi+CR1Dv0uQ==]]></acast:signature>
		<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmTHg2/BXqPr07kkpFZ5JfhvEZqggcpunI6E1w81XpUaBscFc3skEQ0jWG4GCmQYJ66w6pH6P/aGd3DnpJN6h/CD4icd8kZVl4HZn12KicA2k]]></acast:settings>
        <acast:network id="66cf6b61d18488679c0f1c1b" slug="john-barger-66cf6b61d18488679c0f1c1b"><![CDATA[John Barger]]></acast:network>
		<itunes:type>episodic</itunes:type>
			<itunes:image href="https://assets.pippa.io/shows/cover/1724869658077-805f5ae1-8ca6-414e-a4b9-f9a7c000d609.jpeg"/>
			<image>
				<url>https://assets.pippa.io/shows/cover/1724869658077-805f5ae1-8ca6-414e-a4b9-f9a7c000d609.jpeg</url>
				<link>https://shows.acast.com/it-sparc-cast</link>
				<title>IT SPARC Cast</title>
			</image>
		<item>
			<title>Open a PDF, Lose Your System: Adobe Zero-Day Exploit (CVE-2026-34621)</title>
			<itunes:title>Open a PDF, Lose Your System: Adobe Zero-Day Exploit (CVE-2026-34621)</itunes:title>
			<pubDate>Fri, 17 Apr 2026 13:30:00 GMT</pubDate>
			<itunes:duration>11:28</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69e13c7923929c3a2ae14d59/media.mp3" length="198274168" type="audio/mpeg"/>
			<guid isPermaLink="false">69e13c7923929c3a2ae14d59</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e33</link>
			<acast:episodeId>69e13c7923929c3a2ae14d59</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e33</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YISSkWUGxJ1Ie+8YXaf2ZG0A3cHGZls+tdJHK1A5LudHtzSNNtAlR52sNdql6WRPPwjzteQzXZkmgLjma8NFLI]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E33</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>33</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1776368665078-a9cde436-bd66-41a9-b889-7931055efff0.jpeg"/>
			<description><![CDATA[<p>A dangerous Adobe Acrobat zero-day vulnerability (CVE-2026-34621) is actively being exploited—allowing attackers to compromise systems simply by getting users to open a malicious PDF. In this episode of IT SPARC Cast – CVE of the Week, John and Lou break down how it works, why it’s so dangerous, and what enterprise IT teams must do immediately.</p><br><p>⸻</p><br><p>📄<strong> Show Notes</strong></p><br><p>🚨<strong> CVE of the Week: Adobe Acrobat Zero-Day (CVE-2026-34621)</strong></p><br><p>This week’s vulnerability is about as bad—and as common—as it gets. A zero-day flaw in Adobe Acrobat Reader is actively being exploited in the wild, requiring nothing more than opening a malicious PDF to trigger a full system compromise.</p><br><p>🔍<strong> What Happened</strong></p><p>•<strong>CVE ID:</strong> CVE-2026-34621</p><p>•<strong>Type:</strong> Zero-day (actively exploited before patch release)</p><p>•<strong>Severity:</strong> CVSS 8.6 (High, but misleading in practice)</p><p>•<strong>Attack Vector:</strong> Malicious PDF file</p><p>•<strong>Impact:</strong> Remote Code Execution (RCE), data theft</p><br><p>Adobe issued an <strong>emergency out-of-band patch</strong>, signaling the urgency and severity of the threat.</p><br><p>⸻</p><br><p>⚠️<strong> Why This Is So Dangerous</strong></p><br><p>This exploit is particularly concerning because:</p><p>•<strong>No user interaction required beyond opening a file</strong></p><p>•Works through <strong>phishing and email attachments</strong></p><p>•Targets one of the most widely used enterprise tools (PDF readers with ~60–75% market share)</p><br><p>Once triggered, the vulnerability exploits a <strong>memory corruption flaw</strong> (e.g., use-after-free or buffer overflow), allowing attackers to execute arbitrary code on the system.</p><br><p>⸻</p><br><p>🔗<strong> The Real Threat: Exploit Chaining</strong></p><br><p>On its own, this vulnerability is severe—but in modern environments, it’s even worse:</p><p>•Attackers use phishing to deliver the malicious PDF</p><p>•Gain access to a user endpoint</p><p>•Pivot into:</p><p>•Cloud infrastructure</p><p>•Container environments</p><p>•Internal systems</p><br><p>👉 This is how a “medium-high” CVSS score becomes a <strong>critical enterprise breach</strong></p><br><p>⸻</p><br><p>🤖<strong> AI and the Acceleration of Attacks</strong></p><br><p>The pace of exploitation is changing:</p><p>•Exploits are now being weaponized <strong>within minutes of disclosure</strong></p><p>•Attackers can deploy <strong>automated agents at scale</strong></p><p>•AI-driven reconnaissance reduces time-to-exploit dramatically</p><br><p>This creates a world where patch latency = exposure window.</p><br><p>⸻</p><br><p>🛠️<strong> Mitigation &amp; Recommendations</strong></p><br><p><strong>Immediate Actions:</strong></p><p>•✅ Patch Adobe Acrobat <strong>immediately (no delay)</strong></p><p>•🚫 Do NOT wait for standard patch cycles</p><p>•📧 Treat all PDF attachments as potential attack vectors</p><br><p><strong>Enterprise IT Best Practices:</strong></p><p>•Enforce <strong>auto-updates and forced patching policies</strong></p><p>•Consider <strong>network access restrictions for unpatched devices</strong></p><p>•Implement:</p><p>•Zero Trust architectures</p><p>•Endpoint monitoring and anomaly detection</p><br><p>⸻</p><br><p>🧠<strong> Strategic Takeaways</strong></p><p>•User behavior is still the <strong>weakest link</strong></p><p>•Patch cycles must shift from <strong>scheduled → real-time response</strong></p><p>•Vendors must improve update mechanisms:</p><p>•Fewer forced reboots</p><p>•Better “do not interrupt” intelligence</p><br><p>We are entering a phase where <strong>patching speed is a primary security control</strong>, not a maintenance task.</p><br><p>⸻</p><br><p>💬<strong> Listener Feedback</strong></p><br><p>Thanks to listener <strong>IAPX</strong> for pointing out a technical clarification from last week:</p><p>•The Docker vulnerability discussed was rooted in <strong>Moby</strong>, not Docker directly</p><p>•Docker remains the primary exposure vector due to its widespread use</p><br><p>Great catch—and exactly the kind of feedback we appreciate.</p><br><p>⸻</p><br><p>📣<strong> Wrap Up</strong></p><br><p>Have thoughts on this vulnerability? Are we underestimating the impact of PDF-based attacks?</p><br><p>📧 Email: feedback@itsparccast.com</p><p>🐦 X: @itsparccast</p><p>💬 YouTube: Drop a comment—we read them all</p><br><p>⸻</p><br><p>🔗<strong> Social Links</strong></p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@JohnBarger on X</p><p>https://www.linkedin.com/in/johnbarger/&nbsp;on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>A dangerous Adobe Acrobat zero-day vulnerability (CVE-2026-34621) is actively being exploited—allowing attackers to compromise systems simply by getting users to open a malicious PDF. In this episode of IT SPARC Cast – CVE of the Week, John and Lou break down how it works, why it’s so dangerous, and what enterprise IT teams must do immediately.</p><br><p>⸻</p><br><p>📄<strong> Show Notes</strong></p><br><p>🚨<strong> CVE of the Week: Adobe Acrobat Zero-Day (CVE-2026-34621)</strong></p><br><p>This week’s vulnerability is about as bad—and as common—as it gets. A zero-day flaw in Adobe Acrobat Reader is actively being exploited in the wild, requiring nothing more than opening a malicious PDF to trigger a full system compromise.</p><br><p>🔍<strong> What Happened</strong></p><p>•<strong>CVE ID:</strong> CVE-2026-34621</p><p>•<strong>Type:</strong> Zero-day (actively exploited before patch release)</p><p>•<strong>Severity:</strong> CVSS 8.6 (High, but misleading in practice)</p><p>•<strong>Attack Vector:</strong> Malicious PDF file</p><p>•<strong>Impact:</strong> Remote Code Execution (RCE), data theft</p><br><p>Adobe issued an <strong>emergency out-of-band patch</strong>, signaling the urgency and severity of the threat.</p><br><p>⸻</p><br><p>⚠️<strong> Why This Is So Dangerous</strong></p><br><p>This exploit is particularly concerning because:</p><p>•<strong>No user interaction required beyond opening a file</strong></p><p>•Works through <strong>phishing and email attachments</strong></p><p>•Targets one of the most widely used enterprise tools (PDF readers with ~60–75% market share)</p><br><p>Once triggered, the vulnerability exploits a <strong>memory corruption flaw</strong> (e.g., use-after-free or buffer overflow), allowing attackers to execute arbitrary code on the system.</p><br><p>⸻</p><br><p>🔗<strong> The Real Threat: Exploit Chaining</strong></p><br><p>On its own, this vulnerability is severe—but in modern environments, it’s even worse:</p><p>•Attackers use phishing to deliver the malicious PDF</p><p>•Gain access to a user endpoint</p><p>•Pivot into:</p><p>•Cloud infrastructure</p><p>•Container environments</p><p>•Internal systems</p><br><p>👉 This is how a “medium-high” CVSS score becomes a <strong>critical enterprise breach</strong></p><br><p>⸻</p><br><p>🤖<strong> AI and the Acceleration of Attacks</strong></p><br><p>The pace of exploitation is changing:</p><p>•Exploits are now being weaponized <strong>within minutes of disclosure</strong></p><p>•Attackers can deploy <strong>automated agents at scale</strong></p><p>•AI-driven reconnaissance reduces time-to-exploit dramatically</p><br><p>This creates a world where patch latency = exposure window.</p><br><p>⸻</p><br><p>🛠️<strong> Mitigation &amp; Recommendations</strong></p><br><p><strong>Immediate Actions:</strong></p><p>•✅ Patch Adobe Acrobat <strong>immediately (no delay)</strong></p><p>•🚫 Do NOT wait for standard patch cycles</p><p>•📧 Treat all PDF attachments as potential attack vectors</p><br><p><strong>Enterprise IT Best Practices:</strong></p><p>•Enforce <strong>auto-updates and forced patching policies</strong></p><p>•Consider <strong>network access restrictions for unpatched devices</strong></p><p>•Implement:</p><p>•Zero Trust architectures</p><p>•Endpoint monitoring and anomaly detection</p><br><p>⸻</p><br><p>🧠<strong> Strategic Takeaways</strong></p><p>•User behavior is still the <strong>weakest link</strong></p><p>•Patch cycles must shift from <strong>scheduled → real-time response</strong></p><p>•Vendors must improve update mechanisms:</p><p>•Fewer forced reboots</p><p>•Better “do not interrupt” intelligence</p><br><p>We are entering a phase where <strong>patching speed is a primary security control</strong>, not a maintenance task.</p><br><p>⸻</p><br><p>💬<strong> Listener Feedback</strong></p><br><p>Thanks to listener <strong>IAPX</strong> for pointing out a technical clarification from last week:</p><p>•The Docker vulnerability discussed was rooted in <strong>Moby</strong>, not Docker directly</p><p>•Docker remains the primary exposure vector due to its widespread use</p><br><p>Great catch—and exactly the kind of feedback we appreciate.</p><br><p>⸻</p><br><p>📣<strong> Wrap Up</strong></p><br><p>Have thoughts on this vulnerability? Are we underestimating the impact of PDF-based attacks?</p><br><p>📧 Email: feedback@itsparccast.com</p><p>🐦 X: @itsparccast</p><p>💬 YouTube: Drop a comment—we read them all</p><br><p>⸻</p><br><p>🔗<strong> Social Links</strong></p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@JohnBarger on X</p><p>https://www.linkedin.com/in/johnbarger/&nbsp;on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Docker Security Nightmare? CVE-2026-34040 Lets Attackers Escape Containers</title>
			<itunes:title>Docker Security Nightmare? CVE-2026-34040 Lets Attackers Escape Containers</itunes:title>
			<pubDate>Fri, 10 Apr 2026 13:30:00 GMT</pubDate>
			<itunes:duration>11:07</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69d7f27c97d78f9e2bfcd1f0/media.mp3" length="10673423" type="audio/mpeg"/>
			<guid isPermaLink="false">69d7f27c97d78f9e2bfcd1f0</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e32</link>
			<acast:episodeId>69d7f27c97d78f9e2bfcd1f0</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e32</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YPpRI/nsG3ziXowglu6/dNZDRG9fV1Zr4XXFX5LM3n0wNgG5PrbjqNDVfD3lxBOWrhvufo+UjGpVe77zIrfpsS]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E32</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>32</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1775759925560-e4749726-19cc-461f-8e27-6083513b7398.jpeg"/>
			<description><![CDATA[<p>A critical Docker vulnerability (CVE-2026-34040) is putting container security at risk by allowing attackers to bypass authorization controls and potentially access host systems. In this episode of IT SPARC Cast – CVE of the Week, John and Lou break down the exploit, why it matters, and what enterprise IT teams must do immediately to mitigate risk.</p><br><p>⸻</p><br><p>📄<strong> Show Notes</strong></p><br><p>🚨<strong> CVE of the Week: Docker API Authorization Bypass (CVE-2026-34040)</strong></p><br><p>This week’s CVE highlights a serious vulnerability in Docker Engine that undermines one of the core assumptions of container security: isolation.</p><br><p>🔍<strong> What Happened</strong></p><p>•<strong>CVE ID:</strong> CVE-2026-34040</p><p>•<strong>CVSS Score:</strong> 8.8 (High)</p><p>•<strong>Affected Systems:</strong> Docker Engine / Moby versions prior to 29.3.1</p><p>•<strong>Root Cause:</strong> Improper handling of authorization plugin checks in Docker’s API layer</p><br><p>The vulnerability allows specially crafted API requests to bypass authorization controls by dropping the request body before inspection—while still executing the request.</p><br><p>⸻</p><br><p>⚠️<strong> Why This Matters</strong></p><br><p>This flaw enables attackers to:</p><p>•Bypass container security policies</p><p>•Create <strong>privileged containers</strong></p><p>•Access the <strong>host file system</strong></p><p>•Extract sensitive credentials (SSH keys, cloud keys, etc.)</p><br><p>This effectively breaks container isolation, turning Docker from a security boundary into an attack vector.</p><br><p>⸻</p><br><p>🔗<strong> The Bigger Risk: Chained Attacks</strong></p><br><p>While Docker APIs are typically not exposed publicly, this vulnerability becomes significantly more dangerous in real-world environments:</p><p>•Attackers gain initial access via:</p><p>•Phishing or spear phishing</p><p>•Compromised endpoints</p><p>•Malware or trojans</p><p>•Then pivot internally to exploit Docker APIs</p><br><p>👉 In these scenarios, the practical severity approaches <strong>9.8–10.0</strong>, not 8.8.</p><br><p>⸻</p><br><p>🤖<strong> AI-Driven Threat Amplification</strong></p><br><p>Modern attack frameworks—especially those leveraging AI—can:</p><p>•Automatically scan for exposed APIs</p><p>•Execute chained exploits without human intervention</p><p>•Scale attacks across thousands of targets simultaneously</p><br><p>This dramatically reduces the skill barrier for attackers.</p><br><p>⸻</p><br><p>🛠️<strong> Mitigation &amp; Recommendations</strong></p><br><p><strong>Immediate Actions:</strong></p><p>•✅ Upgrade Docker to <strong>version 29.3.1 or later</strong></p><p>•🔒 Restrict and lock down Docker API access</p><p>•🚫 Ensure APIs are not externally exposed</p><br><p><strong>Strategic Recommendations:</strong></p><p>•Enable <strong>auto-updates</strong> where operationally safe</p><p>•Conduct a <strong>full network audit</strong> (hosts, containers, firmware, network gear)</p><p>•Patch beyond servers:</p><p>•BIOS / firmware</p><p>•Network infrastructure (switches, routers)</p><p>•Break down silos between:</p><p>•Enterprise IT security</p><p>•Data center / cloud security</p><br><p>⸻</p><br><p>🔄<strong> Key Takeaway</strong></p><br><p>Containerization is not a silver bullet for security. Misconfigurations and API exposure can turn Docker into a high-impact attack surface—especially when combined with modern, automated attack chains.</p><br><p>⸻</p><br><p>💬<strong> Listener Feedback</strong></p><br><p>Thanks to listener <strong>PutlerLXO</strong> for correcting last week’s Axios stat:</p><p>•Actual weekly downloads: <strong>100 million</strong>, not 45 million</p><br><p>We appreciate the feedback—keep it coming!</p><br><p>⸻</p><br><p>📣<strong> Wrap Up</strong></p><br><p>Have thoughts on this vulnerability? Think it’s overblown—or even worse than we described?</p><br><p>📧 Email: feedback@itsparccast.com</p><p>🐦 X: @itsparccast</p><p>💬 YouTube &amp; LinkedIn: Drop a comment—we read them all</p><br><p>⸻</p><br><p>🔗<strong> Social Links</strong></p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/&nbsp;on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>A critical Docker vulnerability (CVE-2026-34040) is putting container security at risk by allowing attackers to bypass authorization controls and potentially access host systems. In this episode of IT SPARC Cast – CVE of the Week, John and Lou break down the exploit, why it matters, and what enterprise IT teams must do immediately to mitigate risk.</p><br><p>⸻</p><br><p>📄<strong> Show Notes</strong></p><br><p>🚨<strong> CVE of the Week: Docker API Authorization Bypass (CVE-2026-34040)</strong></p><br><p>This week’s CVE highlights a serious vulnerability in Docker Engine that undermines one of the core assumptions of container security: isolation.</p><br><p>🔍<strong> What Happened</strong></p><p>•<strong>CVE ID:</strong> CVE-2026-34040</p><p>•<strong>CVSS Score:</strong> 8.8 (High)</p><p>•<strong>Affected Systems:</strong> Docker Engine / Moby versions prior to 29.3.1</p><p>•<strong>Root Cause:</strong> Improper handling of authorization plugin checks in Docker’s API layer</p><br><p>The vulnerability allows specially crafted API requests to bypass authorization controls by dropping the request body before inspection—while still executing the request.</p><br><p>⸻</p><br><p>⚠️<strong> Why This Matters</strong></p><br><p>This flaw enables attackers to:</p><p>•Bypass container security policies</p><p>•Create <strong>privileged containers</strong></p><p>•Access the <strong>host file system</strong></p><p>•Extract sensitive credentials (SSH keys, cloud keys, etc.)</p><br><p>This effectively breaks container isolation, turning Docker from a security boundary into an attack vector.</p><br><p>⸻</p><br><p>🔗<strong> The Bigger Risk: Chained Attacks</strong></p><br><p>While Docker APIs are typically not exposed publicly, this vulnerability becomes significantly more dangerous in real-world environments:</p><p>•Attackers gain initial access via:</p><p>•Phishing or spear phishing</p><p>•Compromised endpoints</p><p>•Malware or trojans</p><p>•Then pivot internally to exploit Docker APIs</p><br><p>👉 In these scenarios, the practical severity approaches <strong>9.8–10.0</strong>, not 8.8.</p><br><p>⸻</p><br><p>🤖<strong> AI-Driven Threat Amplification</strong></p><br><p>Modern attack frameworks—especially those leveraging AI—can:</p><p>•Automatically scan for exposed APIs</p><p>•Execute chained exploits without human intervention</p><p>•Scale attacks across thousands of targets simultaneously</p><br><p>This dramatically reduces the skill barrier for attackers.</p><br><p>⸻</p><br><p>🛠️<strong> Mitigation &amp; Recommendations</strong></p><br><p><strong>Immediate Actions:</strong></p><p>•✅ Upgrade Docker to <strong>version 29.3.1 or later</strong></p><p>•🔒 Restrict and lock down Docker API access</p><p>•🚫 Ensure APIs are not externally exposed</p><br><p><strong>Strategic Recommendations:</strong></p><p>•Enable <strong>auto-updates</strong> where operationally safe</p><p>•Conduct a <strong>full network audit</strong> (hosts, containers, firmware, network gear)</p><p>•Patch beyond servers:</p><p>•BIOS / firmware</p><p>•Network infrastructure (switches, routers)</p><p>•Break down silos between:</p><p>•Enterprise IT security</p><p>•Data center / cloud security</p><br><p>⸻</p><br><p>🔄<strong> Key Takeaway</strong></p><br><p>Containerization is not a silver bullet for security. Misconfigurations and API exposure can turn Docker into a high-impact attack surface—especially when combined with modern, automated attack chains.</p><br><p>⸻</p><br><p>💬<strong> Listener Feedback</strong></p><br><p>Thanks to listener <strong>PutlerLXO</strong> for correcting last week’s Axios stat:</p><p>•Actual weekly downloads: <strong>100 million</strong>, not 45 million</p><br><p>We appreciate the feedback—keep it coming!</p><br><p>⸻</p><br><p>📣<strong> Wrap Up</strong></p><br><p>Have thoughts on this vulnerability? Think it’s overblown—or even worse than we described?</p><br><p>📧 Email: feedback@itsparccast.com</p><p>🐦 X: @itsparccast</p><p>💬 YouTube &amp; LinkedIn: Drop a comment—we read them all</p><br><p>⸻</p><br><p>🔗<strong> Social Links</strong></p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/&nbsp;on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Are CEOs Using AI as an Excuse? | Patch Chaos & Why Sora Was Shut Down]]></title>
			<itunes:title><![CDATA[Are CEOs Using AI as an Excuse? | Patch Chaos & Why Sora Was Shut Down]]></itunes:title>
			<pubDate>Mon, 06 Apr 2026 13:30:00 GMT</pubDate>
			<itunes:duration>28:14</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69d2c2f0e9dcab3077d3ba4c/media.mp3" length="27108832" type="audio/mpeg"/>
			<guid isPermaLink="false">69d2c2f0e9dcab3077d3ba4c</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e32</link>
			<acast:episodeId>69d2c2f0e9dcab3077d3ba4c</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e32</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bap8kznRhpUk9xy1RHLvkBrP73XC0yAQVxTm569dQELLM8xKDNKLpp2L53JAu6cIOpxyYSCThjQMx8qgB3J1yH]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E32</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>32</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1775420101461-b1123980-1f63-4b15-b07f-a2bb17149692.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast – News Bytes, John Barger and Lou Schmidt break down the latest enterprise IT headlines with sharp insight and zero fluff.</p><br><p>Are tech CEOs using AI as cover for layoffs? Are emergency patches from major vendors signaling deeper systemic risk? And what’s really behind OpenAI’s decision to shut down Sora?</p><br><p>Plus, listener feedback sparks a deep dive into home router security and the best options for every level—from plug-and-play to prosumer setups.</p><br><p>If you’re in enterprise IT, security, or just trying to stay ahead of the curve, this is your weekly signal through the noise.</p><br><p>⸻</p><br><p>📌<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><p>•Overview of the week’s biggest enterprise IT stories</p><p>•AI layoffs, patch failures, and shifting priorities in AI platforms</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:49 – Tech CEOs Suddenly Love Blaming AI for Mass Job Cuts</strong></p><p>•Increasing trend: layoffs attributed to “AI efficiency gains”</p><p>•Reality check: cost-cutting, restructuring, and execution failures</p><p>•Market dynamics:</p><p>•“AI-driven efficiency” messaging can stabilize or boost stock prices</p><p>•Traditional layoffs often trigger negative investor reactions</p><p>•Key takeaway:</p><p>•AI is becoming a narrative shield for leadership decisions</p><p>•Career insight:</p><p>•Job security = being a <strong>problem solver</strong>, not just a role filler</p><p>•Enterprise angle:</p><p>•Evaluate vendor stability when layoffs are framed as “AI transformation”</p><br><p><strong>https://www.bbc.com/news/articles/cde5y2x51y8o</strong></p><br><p>⸻</p><br><p><strong>07:06 – Emergency Microsoft &amp; Oracle Patches Point to Wider Cyber Issues</strong></p><p>•Rise in <strong>out-of-band (emergency) patching</strong></p><p>•Key incidents:</p><p>•Critical remote code execution vulnerability (CVSS 9.8)</p><p>•Broken update causing login failures</p><p>•Core issue:</p><p>•Patch reliability vs. urgency tradeoff is collapsing</p><p>•Enterprise implications:</p><p>•Traditional patch windows are becoming obsolete</p><p>•Delayed patching = increased exposure risk</p><p>•New reality:</p><p>•Mandatory, rapid patch deployment is now required</p><p>•Strategic shift:</p><p>•Move toward <strong>live patching architectures</strong> (already common in Linux/cloud)</p><p>•Root causes:</p><p>•Faster release cycles</p><p>•Increased reliance on automation</p><p>•Reduced staffing depth</p><br><p><strong>https://www.computerweekly.com/news/366640648/Emergency-Microsoft-Oracle-patches-point-to-wider-cyber-issues</strong></p><br><p>⸻</p><br><p><strong>13:28 – Why OpenAI Really Shut Down Sora</strong></p><p>•Contrary to speculation: not a collapse signal</p><p>•Actual drivers:</p><p>•Compute constraints</p><p>•Resource prioritization</p><p>•Revenue alignment</p><p>•Market dynamics:</p><p>•AI arms race: speed, capability, and scale</p><p>•Product reality:</p><p>•Video generation = extremely compute-intensive</p><p>•Limited sustained user demand vs. cost</p><p>•Strategic takeaway:</p><p>•Focus shifting toward:</p><p>•Coding tools</p><p>•Agentic platforms</p><p>•High-ROI capabilities</p><p>•Key insight:</p><p>•AI growth is currently <strong>compute-bound</strong>, not idea-bound</p><br><p><strong>https://techcrunch.com/2026/03/29/why-openai-really-shut-down-sora/</strong></p><br><p>⸻</p><br><p>📬<strong> 16:54 – Mail Bag &amp; Home Router Recommendations</strong></p><br><p><strong>Listener Feedback Topics:</strong></p><p>•Router security concerns</p><p>•Safer alternatives to high-risk vendors</p><br><p><strong>Recommended Router Tiers:</strong></p><br><p>🟢<strong> Entry-Level (Simple / Plug-and-Play)</strong></p><p>•<strong>Netgear</strong></p><p>•Strong open-source firmware support (OpenWRT, Tomato)</p><p>•U.S.-based company with supply chain flexibility</p><p>•High accountability and responsiveness</p><br><p>🟡<strong> Mid-Tier (Mesh / Larger Homes)</strong></p><p>•<strong>Eero (Amazon-owned)</strong></p><p>•Strong performance and ease of use</p><p>•Consistent updates and long-term viability</p><br><p>🔵<strong> Prosumer / Advanced</strong></p><p>•<strong>Ubiquiti (UniFi)</strong></p><p>•Best-in-class price/performance</p><p>•Full ecosystem: networking + security + cameras</p><p>•No recurring cloud fees</p><p>•Strong automation and patch responsiveness</p><br><p>⸻</p><br><p>🔚<strong> 26:54 – Wrap Up</strong></p><p>•Call for listener feedback</p><p>•Engage via email, X, YouTube, or LinkedIn</p><p>•Reminder to like, subscribe, and enable notifications</p><br><p>⸻</p><br><p>🌐<strong> Social Links</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast – News Bytes, John Barger and Lou Schmidt break down the latest enterprise IT headlines with sharp insight and zero fluff.</p><br><p>Are tech CEOs using AI as cover for layoffs? Are emergency patches from major vendors signaling deeper systemic risk? And what’s really behind OpenAI’s decision to shut down Sora?</p><br><p>Plus, listener feedback sparks a deep dive into home router security and the best options for every level—from plug-and-play to prosumer setups.</p><br><p>If you’re in enterprise IT, security, or just trying to stay ahead of the curve, this is your weekly signal through the noise.</p><br><p>⸻</p><br><p>📌<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><p>•Overview of the week’s biggest enterprise IT stories</p><p>•AI layoffs, patch failures, and shifting priorities in AI platforms</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:49 – Tech CEOs Suddenly Love Blaming AI for Mass Job Cuts</strong></p><p>•Increasing trend: layoffs attributed to “AI efficiency gains”</p><p>•Reality check: cost-cutting, restructuring, and execution failures</p><p>•Market dynamics:</p><p>•“AI-driven efficiency” messaging can stabilize or boost stock prices</p><p>•Traditional layoffs often trigger negative investor reactions</p><p>•Key takeaway:</p><p>•AI is becoming a narrative shield for leadership decisions</p><p>•Career insight:</p><p>•Job security = being a <strong>problem solver</strong>, not just a role filler</p><p>•Enterprise angle:</p><p>•Evaluate vendor stability when layoffs are framed as “AI transformation”</p><br><p><strong>https://www.bbc.com/news/articles/cde5y2x51y8o</strong></p><br><p>⸻</p><br><p><strong>07:06 – Emergency Microsoft &amp; Oracle Patches Point to Wider Cyber Issues</strong></p><p>•Rise in <strong>out-of-band (emergency) patching</strong></p><p>•Key incidents:</p><p>•Critical remote code execution vulnerability (CVSS 9.8)</p><p>•Broken update causing login failures</p><p>•Core issue:</p><p>•Patch reliability vs. urgency tradeoff is collapsing</p><p>•Enterprise implications:</p><p>•Traditional patch windows are becoming obsolete</p><p>•Delayed patching = increased exposure risk</p><p>•New reality:</p><p>•Mandatory, rapid patch deployment is now required</p><p>•Strategic shift:</p><p>•Move toward <strong>live patching architectures</strong> (already common in Linux/cloud)</p><p>•Root causes:</p><p>•Faster release cycles</p><p>•Increased reliance on automation</p><p>•Reduced staffing depth</p><br><p><strong>https://www.computerweekly.com/news/366640648/Emergency-Microsoft-Oracle-patches-point-to-wider-cyber-issues</strong></p><br><p>⸻</p><br><p><strong>13:28 – Why OpenAI Really Shut Down Sora</strong></p><p>•Contrary to speculation: not a collapse signal</p><p>•Actual drivers:</p><p>•Compute constraints</p><p>•Resource prioritization</p><p>•Revenue alignment</p><p>•Market dynamics:</p><p>•AI arms race: speed, capability, and scale</p><p>•Product reality:</p><p>•Video generation = extremely compute-intensive</p><p>•Limited sustained user demand vs. cost</p><p>•Strategic takeaway:</p><p>•Focus shifting toward:</p><p>•Coding tools</p><p>•Agentic platforms</p><p>•High-ROI capabilities</p><p>•Key insight:</p><p>•AI growth is currently <strong>compute-bound</strong>, not idea-bound</p><br><p><strong>https://techcrunch.com/2026/03/29/why-openai-really-shut-down-sora/</strong></p><br><p>⸻</p><br><p>📬<strong> 16:54 – Mail Bag &amp; Home Router Recommendations</strong></p><br><p><strong>Listener Feedback Topics:</strong></p><p>•Router security concerns</p><p>•Safer alternatives to high-risk vendors</p><br><p><strong>Recommended Router Tiers:</strong></p><br><p>🟢<strong> Entry-Level (Simple / Plug-and-Play)</strong></p><p>•<strong>Netgear</strong></p><p>•Strong open-source firmware support (OpenWRT, Tomato)</p><p>•U.S.-based company with supply chain flexibility</p><p>•High accountability and responsiveness</p><br><p>🟡<strong> Mid-Tier (Mesh / Larger Homes)</strong></p><p>•<strong>Eero (Amazon-owned)</strong></p><p>•Strong performance and ease of use</p><p>•Consistent updates and long-term viability</p><br><p>🔵<strong> Prosumer / Advanced</strong></p><p>•<strong>Ubiquiti (UniFi)</strong></p><p>•Best-in-class price/performance</p><p>•Full ecosystem: networking + security + cameras</p><p>•No recurring cloud fees</p><p>•Strong automation and patch responsiveness</p><br><p>⸻</p><br><p>🔚<strong> 26:54 – Wrap Up</strong></p><p>•Call for listener feedback</p><p>•Engage via email, X, YouTube, or LinkedIn</p><p>•Reminder to like, subscribe, and enable notifications</p><br><p>⸻</p><br><p>🌐<strong> Social Links</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Axios Supply Chain Attack: 45M Weekly Downloads Turned Into a RAT</title>
			<itunes:title>Axios Supply Chain Attack: 45M Weekly Downloads Turned Into a RAT</itunes:title>
			<pubDate>Fri, 03 Apr 2026 13:30:00 GMT</pubDate>
			<itunes:duration>9:38</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69ceca7dd2e95f5131771fb0/media.mp3" length="166610536" type="audio/mpeg"/>
			<guid isPermaLink="false">69ceca7dd2e95f5131771fb0</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e31</link>
			<acast:episodeId>69ceca7dd2e95f5131771fb0</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e31</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aBHpS2JB3+31RC67gyau+znZWaIYR4+E4NOTnGuK5bTN7e1oHoXnPOPtIB03t/UiOgsMrO1GuwnImPZJ1vVBr4]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E31</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>31</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1775159829459-ab36d091-b127-4c31-933b-1fb3743b9a1d.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down a massive <strong>supply chain attack targeting Axios</strong>, one of the most widely used JavaScript libraries in the world.</p><br><p>Attackers compromised a maintainer account and injected malicious code into widely distributed versions, turning routine installs into a <strong>cross-platform Remote Access Trojan (RAT)</strong> deployment.</p><br><p>This isn’t just another vulnerability — it’s a breach of trust in the open-source ecosystem that powers modern web applications.</p><br><p>⸻</p><br><p>📝<strong> Show Notes&nbsp;</strong></p><br><p>A major supply chain attack has compromised <strong>Axios</strong>, a core JavaScript library used in millions of applications across web, mobile, and backend systems.</p><br><p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt explain how attackers injected malware into trusted Axios packages — impacting potentially <strong>tens of millions of environments worldwide</strong>.</p><br><p>⸻</p><br><p>🔎<strong> What Happened</strong></p><br><p>Axios is a widely used open-source library for making HTTP requests in:</p><p>•Node.js applications</p><p>•React, Angular, and Vue frontends</p><p>•Mobile apps (React Native)</p><p>•SaaS platforms and internal tools</p><br><p>With over <strong>45 million weekly downloads</strong>, its footprint is enormous.</p><br><p>Attackers compromised an Axios maintainer’s <strong>NPM account</strong> and pushed malicious versions:</p><p>•<strong>Axios 1.14.1</strong></p><p>•<strong>Axios 0.30.4</strong></p><br><p>These versions introduced a hidden dependency:</p><p>•plain-crypto-js@4.2.1</p><br><p>This dependency executed a <strong>post-install script</strong> that deployed a <strong>cross-platform Remote Access Trojan (RAT)</strong> targeting:</p><p>•Windows</p><p>•macOS</p><p>•Linux</p><br><p>The malware then:</p><p>•Contacted a command-and-control (C2) server</p><p>•Downloaded OS-specific payloads</p><p>•Executed silently</p><p>•Deleted itself and restored clean package files to evade detection</p><br><p>⸻</p><br><p><strong>⚠ Why This Is So Dangerous</strong></p><br><p>This attack is particularly severe because:</p><p>•It <strong>does not require direct user action beyond installing dependencies</strong></p><p>•It affects <strong>transitive dependencies</strong> (you may be using Axios without knowing it)</p><p>•It operates during build/install processes (CI/CD pipelines included)</p><p>•It leaves <strong>minimal forensic evidence</strong></p><br><p>This is a classic <strong>supply chain compromise</strong> — not a CVE, but arguably more dangerous.</p><br><p>⸻</p><br><p>🏢<strong> Enterprise IT Impact</strong></p><br><p>If your organization:</p><p>•Uses Node.js or modern JavaScript frameworks</p><p>•Runs CI/CD pipelines</p><p>•Builds or deploys SaaS platforms</p><p>•Uses third-party APIs or SDKs</p><br><p>You are likely exposed.</p><br><p>Even if you don’t directly install Axios, it may exist <strong>deep in your dependency tree</strong>.</p><br><p>⸻</p><br><p>🧠<strong> Key Takeaway</strong></p><br><p>This was not a flaw in code.</p><br><p>This was a <strong>failure of trust in the supply chain</strong>.</p><br><p>If your security model assumes dependencies are safe by default — this attack proves otherwise.</p><br><p>⸻</p><br><p>🔗<strong> Source Articles</strong></p><br><p>https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html</p><p>https://www.elastic.co/security-labs/axios-supply-chain-compromise-detections</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down a massive <strong>supply chain attack targeting Axios</strong>, one of the most widely used JavaScript libraries in the world.</p><br><p>Attackers compromised a maintainer account and injected malicious code into widely distributed versions, turning routine installs into a <strong>cross-platform Remote Access Trojan (RAT)</strong> deployment.</p><br><p>This isn’t just another vulnerability — it’s a breach of trust in the open-source ecosystem that powers modern web applications.</p><br><p>⸻</p><br><p>📝<strong> Show Notes&nbsp;</strong></p><br><p>A major supply chain attack has compromised <strong>Axios</strong>, a core JavaScript library used in millions of applications across web, mobile, and backend systems.</p><br><p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt explain how attackers injected malware into trusted Axios packages — impacting potentially <strong>tens of millions of environments worldwide</strong>.</p><br><p>⸻</p><br><p>🔎<strong> What Happened</strong></p><br><p>Axios is a widely used open-source library for making HTTP requests in:</p><p>•Node.js applications</p><p>•React, Angular, and Vue frontends</p><p>•Mobile apps (React Native)</p><p>•SaaS platforms and internal tools</p><br><p>With over <strong>45 million weekly downloads</strong>, its footprint is enormous.</p><br><p>Attackers compromised an Axios maintainer’s <strong>NPM account</strong> and pushed malicious versions:</p><p>•<strong>Axios 1.14.1</strong></p><p>•<strong>Axios 0.30.4</strong></p><br><p>These versions introduced a hidden dependency:</p><p>•plain-crypto-js@4.2.1</p><br><p>This dependency executed a <strong>post-install script</strong> that deployed a <strong>cross-platform Remote Access Trojan (RAT)</strong> targeting:</p><p>•Windows</p><p>•macOS</p><p>•Linux</p><br><p>The malware then:</p><p>•Contacted a command-and-control (C2) server</p><p>•Downloaded OS-specific payloads</p><p>•Executed silently</p><p>•Deleted itself and restored clean package files to evade detection</p><br><p>⸻</p><br><p><strong>⚠ Why This Is So Dangerous</strong></p><br><p>This attack is particularly severe because:</p><p>•It <strong>does not require direct user action beyond installing dependencies</strong></p><p>•It affects <strong>transitive dependencies</strong> (you may be using Axios without knowing it)</p><p>•It operates during build/install processes (CI/CD pipelines included)</p><p>•It leaves <strong>minimal forensic evidence</strong></p><br><p>This is a classic <strong>supply chain compromise</strong> — not a CVE, but arguably more dangerous.</p><br><p>⸻</p><br><p>🏢<strong> Enterprise IT Impact</strong></p><br><p>If your organization:</p><p>•Uses Node.js or modern JavaScript frameworks</p><p>•Runs CI/CD pipelines</p><p>•Builds or deploys SaaS platforms</p><p>•Uses third-party APIs or SDKs</p><br><p>You are likely exposed.</p><br><p>Even if you don’t directly install Axios, it may exist <strong>deep in your dependency tree</strong>.</p><br><p>⸻</p><br><p>🧠<strong> Key Takeaway</strong></p><br><p>This was not a flaw in code.</p><br><p>This was a <strong>failure of trust in the supply chain</strong>.</p><br><p>If your security model assumes dependencies are safe by default — this attack proves otherwise.</p><br><p>⸻</p><br><p>🔗<strong> Source Articles</strong></p><br><p>https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html</p><p>https://www.elastic.co/security-labs/axios-supply-chain-compromise-detections</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Musk Builds a Chip Empire, Zuckerberg’s AI CEO, and Arm Enters the AI Chip War</title>
			<itunes:title>Musk Builds a Chip Empire, Zuckerberg’s AI CEO, and Arm Enters the AI Chip War</itunes:title>
			<pubDate>Mon, 30 Mar 2026 13:30:00 GMT</pubDate>
			<itunes:duration>27:48</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69c99c75b9917327716ee364/media.mp3" length="26700068" type="audio/mpeg"/>
			<guid isPermaLink="false">69c99c75b9917327716ee364</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e31</link>
			<acast:episodeId>69c99c75b9917327716ee364</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e31</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Z7A2PoOORlx438JtUo1l2psu4Y6GDsT5McUwK6KHdwgv+WtO78F1wcKxg76nEjwN4yG9vKz4LJ+ou+cTmIro8+]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E31</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>31</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1774820328168-916336c9-5346-4ae5-b05c-b9558b94d90f.jpeg"/>
			<description><![CDATA[<p><strong>In this episode of IT SPARC Cast – News Bytes, John Barger &amp; Lou Schmidt break down three major moves reshaping the future of AI infrastructure, chip design, and enterprise automation.</strong></p><br><p>Elon Musk announces TeraFab, a massive new effort to bring chip fabrication back in-house for greater control over AI hardware and supply chains. Mark Zuckerberg pushes deeper into agentic AI with plans for a personal “AI CEO” to manage workflows and decision-making. And Arm signals a major strategic shift with a new AI-focused chip designed for agent-based systems—putting it in direct competition with its own ecosystem.</p><br><p>From supply chain control and custom silicon to AI-driven leadership tools and next-generation chip architectures, this episode explores how the foundation of enterprise IT is rapidly evolving. &nbsp;</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:45 – Elon Musk Announces TeraFab for AI Chips and Memory</strong></p><br><p>Elon Musk has announced plans for <strong>TeraFab</strong>, a massive chip fabrication initiative aimed at regaining full control over chip design and production.</p><br><p>The strategy includes:</p><br><p>• A prototype fabrication facility for rapid iteration</p><p>• A large-scale production fab for mass manufacturing</p><p>• Vertical integration to reduce dependency on external foundries</p><p>• Faster time-to-market for AI-driven hardware</p><br><p>As chip demand surges due to AI workloads, companies are reconsidering outsourced manufacturing models. TeraFab represents a return to <strong>end-to-end control of silicon development</strong>, which could significantly impact supply chains, pricing, and innovation speed.</p><br><p><a href="https://x.com/i/broadcasts/1yKAPMzlvgWxb" rel="noopener noreferrer" target="_blank">https://x.com/i/broadcasts/1yKAPMzlvgWxb</a>&nbsp;</p><p><a href="https://en.wikipedia.org/wiki/Terafab" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Terafab</a>&nbsp;</p><br><p><strong>09:46 – Mark Zuckerberg Builds AI CEO to Help Run Meta</strong></p><br><p>Mark Zuckerberg is developing a personal AI system capable of handling executive-level tasks—effectively functioning as a digital chief of staff or “AI CEO.”</p><br><p>The system is designed to:</p><br><p>• Retrieve and synthesize information across internal systems</p><p>• Automate decision-support workflows</p><p>• Reduce reliance on layers of management</p><p>• Act as a “second brain” for operational awareness</p><br><p>This reflects a broader shift toward <strong>agentic AI</strong>, where intelligent systems proactively execute tasks rather than simply responding to prompts. The discussion also raises key enterprise questions around <strong>security, portability, and ownership of personal AI agents</strong>.</p><br><p><a href="https://www.the-independent.com/tech/mark-zuckerberg-ai-ceo-bot-b2943792.html" rel="noopener noreferrer" target="_blank">https://www.the-independent.com/tech/mark-zuckerberg-ai-ceo-bot-b2943792.html</a></p><br><p><strong>17:54 – Arm Unveils New AI Chip for Agentic Systems</strong></p><br><p>Arm has announced a new AI-focused chip architecture aimed at powering <strong>agentic AI and future AGI-style workloads</strong>.</p><br><p>Key implications include:</p><br><p>• A shift from IP licensing to direct chip competition</p><p>• Increased competition with existing ecosystem partners</p><p>• Potential acceleration of specialized AI hardware development</p><p>• Growing relevance of alternative architectures like RISC-V</p><br><p>This move signals a major strategic pivot for Arm, potentially reshaping the competitive landscape for AI infrastructure and creating new dynamics between chip designers, manufacturers, and enterprise buyers.</p><br><p><a href="https://www.reuters.com/business/media-telecom/arm-unveils-new-ai-chip-expects-it-add-billions-annual-revenue-2026-03-24/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/business/media-telecom/arm-unveils-new-ai-chip-expects-it-add-billions-annual-revenue-2026-03-24/</a>&nbsp;</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>25:24 – Mail Bag</strong></p><br><p>Listener feedback highlights continued interest in emerging compute models, including biological computing, and reinforces the importance of staying ahead of major infrastructure trends.</p><br><p><strong>27:01 – Wrap Up</strong></p><br><p>John and Lou close with thoughts on the convergence of <strong>AI, custom silicon, and agent-based workflows</strong>, emphasizing that enterprise IT leaders must prepare for a future where infrastructure, software, and decision-making are increasingly intertwined.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>In this episode of IT SPARC Cast – News Bytes, John Barger &amp; Lou Schmidt break down three major moves reshaping the future of AI infrastructure, chip design, and enterprise automation.</strong></p><br><p>Elon Musk announces TeraFab, a massive new effort to bring chip fabrication back in-house for greater control over AI hardware and supply chains. Mark Zuckerberg pushes deeper into agentic AI with plans for a personal “AI CEO” to manage workflows and decision-making. And Arm signals a major strategic shift with a new AI-focused chip designed for agent-based systems—putting it in direct competition with its own ecosystem.</p><br><p>From supply chain control and custom silicon to AI-driven leadership tools and next-generation chip architectures, this episode explores how the foundation of enterprise IT is rapidly evolving. &nbsp;</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:45 – Elon Musk Announces TeraFab for AI Chips and Memory</strong></p><br><p>Elon Musk has announced plans for <strong>TeraFab</strong>, a massive chip fabrication initiative aimed at regaining full control over chip design and production.</p><br><p>The strategy includes:</p><br><p>• A prototype fabrication facility for rapid iteration</p><p>• A large-scale production fab for mass manufacturing</p><p>• Vertical integration to reduce dependency on external foundries</p><p>• Faster time-to-market for AI-driven hardware</p><br><p>As chip demand surges due to AI workloads, companies are reconsidering outsourced manufacturing models. TeraFab represents a return to <strong>end-to-end control of silicon development</strong>, which could significantly impact supply chains, pricing, and innovation speed.</p><br><p><a href="https://x.com/i/broadcasts/1yKAPMzlvgWxb" rel="noopener noreferrer" target="_blank">https://x.com/i/broadcasts/1yKAPMzlvgWxb</a>&nbsp;</p><p><a href="https://en.wikipedia.org/wiki/Terafab" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Terafab</a>&nbsp;</p><br><p><strong>09:46 – Mark Zuckerberg Builds AI CEO to Help Run Meta</strong></p><br><p>Mark Zuckerberg is developing a personal AI system capable of handling executive-level tasks—effectively functioning as a digital chief of staff or “AI CEO.”</p><br><p>The system is designed to:</p><br><p>• Retrieve and synthesize information across internal systems</p><p>• Automate decision-support workflows</p><p>• Reduce reliance on layers of management</p><p>• Act as a “second brain” for operational awareness</p><br><p>This reflects a broader shift toward <strong>agentic AI</strong>, where intelligent systems proactively execute tasks rather than simply responding to prompts. The discussion also raises key enterprise questions around <strong>security, portability, and ownership of personal AI agents</strong>.</p><br><p><a href="https://www.the-independent.com/tech/mark-zuckerberg-ai-ceo-bot-b2943792.html" rel="noopener noreferrer" target="_blank">https://www.the-independent.com/tech/mark-zuckerberg-ai-ceo-bot-b2943792.html</a></p><br><p><strong>17:54 – Arm Unveils New AI Chip for Agentic Systems</strong></p><br><p>Arm has announced a new AI-focused chip architecture aimed at powering <strong>agentic AI and future AGI-style workloads</strong>.</p><br><p>Key implications include:</p><br><p>• A shift from IP licensing to direct chip competition</p><p>• Increased competition with existing ecosystem partners</p><p>• Potential acceleration of specialized AI hardware development</p><p>• Growing relevance of alternative architectures like RISC-V</p><br><p>This move signals a major strategic pivot for Arm, potentially reshaping the competitive landscape for AI infrastructure and creating new dynamics between chip designers, manufacturers, and enterprise buyers.</p><br><p><a href="https://www.reuters.com/business/media-telecom/arm-unveils-new-ai-chip-expects-it-add-billions-annual-revenue-2026-03-24/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/business/media-telecom/arm-unveils-new-ai-chip-expects-it-add-billions-annual-revenue-2026-03-24/</a>&nbsp;</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>25:24 – Mail Bag</strong></p><br><p>Listener feedback highlights continued interest in emerging compute models, including biological computing, and reinforces the importance of staying ahead of major infrastructure trends.</p><br><p><strong>27:01 – Wrap Up</strong></p><br><p>John and Lou close with thoughts on the convergence of <strong>AI, custom silicon, and agent-based workflows</strong>, emphasizing that enterprise IT leaders must prepare for a future where infrastructure, software, and decision-making are increasingly intertwined.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Router Supply Chain Risks: The Hidden Security Threat in Your Home Network</title>
			<itunes:title>Router Supply Chain Risks: The Hidden Security Threat in Your Home Network</itunes:title>
			<pubDate>Fri, 27 Mar 2026 13:30:00 GMT</pubDate>
			<itunes:duration>20:55</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69c5bf3cf4bf09c599ace9e3/media.mp3" length="361565296" type="audio/mpeg"/>
			<guid isPermaLink="false">69c5bf3cf4bf09c599ace9e3</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e30</link>
			<acast:episodeId>69c5bf3cf4bf09c599ace9e3</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e30</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YbkZaN7/tJZv5vL1K6sUmkKn/T3Z0ym66h0f5ld+2VuBgE5C3LQ4q6RxL39/zzO/6JoW95JjAgeYc2Koe47XmW]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E30</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>30</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1774567076204-3f1580e9-1337-4faa-904d-d1cb7631cb77.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break from a single CVE to tackle a broader and increasingly critical issue: <strong>router supply chain security</strong>.</p><br><p>From botnets built on consumer routers to concerns about firmware, silicon-level vulnerabilities, and manufacturing visibility, the conversation explores why your home or small office router may be one of the weakest links in modern cybersecurity.</p><br><p>The hosts explain what’s changing in the router market, which vendors are most at risk, and what both consumers and enterprise IT professionals should be doing now to secure the network edge.</p><br><p>⸻</p><br><p>📝<strong> Show Notes</strong></p><br><p>Consumer routers are no longer just simple networking devices — they are now <strong>prime targets in large-scale cyberattacks and botnet operations</strong>.</p><br><p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down the growing risks tied to <strong>router supply chains, firmware security, and edge network vulnerabilities</strong>.</p><br><p>Rather than focusing on a single CVE, this discussion highlights a broader shift in how attackers are targeting <strong>home routers, small office devices, and prosumer networking gear</strong> as entry points into larger networks.</p><br><p>⸻</p><br><p>🔎<strong> What’s Changing in Router Security</strong></p><br><p>Recent attack trends show:</p><p>•Consumer and small-office routers are being used as <strong>launch points for larger cyberattacks</strong></p><p>•Botnets are increasingly built on <strong>unpatched or poorly secured edge devices</strong></p><p>•Attackers are leveraging routers to <strong>mask origin and evade detection</strong></p><br><p>This makes routers one of the most critical — and often overlooked — components of modern security architecture.</p><br><p>⸻</p><br><p><strong>⚠ The Supply Chain Problem</strong></p><br><p>One of the biggest concerns discussed in this episode is <strong>supply chain visibility</strong>.</p><br><p>Key risks include:</p><p>•Limited insight into where hardware components are manufactured</p><p>•Potential for <strong>firmware-level or silicon-level vulnerabilities</strong></p><p>•Difficulty auditing third-party manufacturing processes</p><p>•Inability to fully validate device integrity</p><br><p>Even when running trusted software (such as open-source firmware), underlying hardware risks may still exist.</p><br><p>⸻</p><br><p>🏢<strong> Enterprise &amp; Home Network Impact</strong></p><br><p>This is not just a consumer issue.</p><br><p>Organizations must consider:</p><p>•Remote employees connecting via insecure home routers</p><p>•Small offices using low-cost networking equipment</p><p>•IoT devices relying on consumer-grade infrastructure</p><p>•Edge devices acting as <strong>entry points for lateral movement</strong></p><br><p>If the edge is compromised, the rest of the network is exposed.</p><br><p>⸻</p><br><p>🛠<strong> What IT Teams and Consumers Should Do</strong></p><p>•Avoid default configurations and credentials</p><p>•Keep firmware updated consistently</p><p>•Segment home and corporate network traffic where possible</p><p>•Evaluate router vendors for <strong>security posture and supply chain transparency</strong></p><p>•Monitor for unusual traffic patterns or device behavior</p><p>•Plan for longer-term shifts in router procurement and standards</p><br><p>This is a <strong>long-term evolution</strong>, not a short-term panic event.</p><br><p>⸻</p><br><p>📊<strong> Market Impact &amp; Vendor Landscape</strong></p><br><p>The episode also discusses potential market shifts:</p><p>•Lower-cost vendors may face increased scrutiny</p><p>•Vendors with stronger supply chain transparency may benefit</p><p>•Manufacturing may shift to more trusted and auditable environments</p><p>•Future devices may require <strong>mandatory security features like auto-updating firmware</strong></p><br><p>⸻</p><br><p>💬<strong> Listener Feedback</strong></p><br><p>Listener feedback from X highlights the growing importance of <strong>Zero Trust and identity validation</strong>, especially in response to recent discussions about insider threats.</p><br><p>The takeaway:</p><p>Security is no longer just about devices — it’s about <strong>people, process, and trust models</strong> working together.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break from a single CVE to tackle a broader and increasingly critical issue: <strong>router supply chain security</strong>.</p><br><p>From botnets built on consumer routers to concerns about firmware, silicon-level vulnerabilities, and manufacturing visibility, the conversation explores why your home or small office router may be one of the weakest links in modern cybersecurity.</p><br><p>The hosts explain what’s changing in the router market, which vendors are most at risk, and what both consumers and enterprise IT professionals should be doing now to secure the network edge.</p><br><p>⸻</p><br><p>📝<strong> Show Notes</strong></p><br><p>Consumer routers are no longer just simple networking devices — they are now <strong>prime targets in large-scale cyberattacks and botnet operations</strong>.</p><br><p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down the growing risks tied to <strong>router supply chains, firmware security, and edge network vulnerabilities</strong>.</p><br><p>Rather than focusing on a single CVE, this discussion highlights a broader shift in how attackers are targeting <strong>home routers, small office devices, and prosumer networking gear</strong> as entry points into larger networks.</p><br><p>⸻</p><br><p>🔎<strong> What’s Changing in Router Security</strong></p><br><p>Recent attack trends show:</p><p>•Consumer and small-office routers are being used as <strong>launch points for larger cyberattacks</strong></p><p>•Botnets are increasingly built on <strong>unpatched or poorly secured edge devices</strong></p><p>•Attackers are leveraging routers to <strong>mask origin and evade detection</strong></p><br><p>This makes routers one of the most critical — and often overlooked — components of modern security architecture.</p><br><p>⸻</p><br><p><strong>⚠ The Supply Chain Problem</strong></p><br><p>One of the biggest concerns discussed in this episode is <strong>supply chain visibility</strong>.</p><br><p>Key risks include:</p><p>•Limited insight into where hardware components are manufactured</p><p>•Potential for <strong>firmware-level or silicon-level vulnerabilities</strong></p><p>•Difficulty auditing third-party manufacturing processes</p><p>•Inability to fully validate device integrity</p><br><p>Even when running trusted software (such as open-source firmware), underlying hardware risks may still exist.</p><br><p>⸻</p><br><p>🏢<strong> Enterprise &amp; Home Network Impact</strong></p><br><p>This is not just a consumer issue.</p><br><p>Organizations must consider:</p><p>•Remote employees connecting via insecure home routers</p><p>•Small offices using low-cost networking equipment</p><p>•IoT devices relying on consumer-grade infrastructure</p><p>•Edge devices acting as <strong>entry points for lateral movement</strong></p><br><p>If the edge is compromised, the rest of the network is exposed.</p><br><p>⸻</p><br><p>🛠<strong> What IT Teams and Consumers Should Do</strong></p><p>•Avoid default configurations and credentials</p><p>•Keep firmware updated consistently</p><p>•Segment home and corporate network traffic where possible</p><p>•Evaluate router vendors for <strong>security posture and supply chain transparency</strong></p><p>•Monitor for unusual traffic patterns or device behavior</p><p>•Plan for longer-term shifts in router procurement and standards</p><br><p>This is a <strong>long-term evolution</strong>, not a short-term panic event.</p><br><p>⸻</p><br><p>📊<strong> Market Impact &amp; Vendor Landscape</strong></p><br><p>The episode also discusses potential market shifts:</p><p>•Lower-cost vendors may face increased scrutiny</p><p>•Vendors with stronger supply chain transparency may benefit</p><p>•Manufacturing may shift to more trusted and auditable environments</p><p>•Future devices may require <strong>mandatory security features like auto-updating firmware</strong></p><br><p>⸻</p><br><p>💬<strong> Listener Feedback</strong></p><br><p>Listener feedback from X highlights the growing importance of <strong>Zero Trust and identity validation</strong>, especially in response to recent discussions about insider threats.</p><br><p>The takeaway:</p><p>Security is no longer just about devices — it’s about <strong>people, process, and trust models</strong> working together.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Computers Built From Living Neurons?! Inside Final Spark’s Bio-AI Future</title>
			<itunes:title>Computers Built From Living Neurons?! Inside Final Spark’s Bio-AI Future</itunes:title>
			<pubDate>Wed, 25 Mar 2026 13:30:00 GMT</pubDate>
			<itunes:duration>18:41</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69c2da1062f6c66afe24de13/media.mp3" length="17951764" type="audio/mpeg"/>
			<guid isPermaLink="false">69c2da1062f6c66afe24de13</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-interview-episode-s02e01</link>
			<acast:episodeId>69c2da1062f6c66afe24de13</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-interview-episode-s02e01</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bsJJIUYtEU0nkS8voAp+i5ZNx89Sq3WsK6qZxPbXSN0zWnTUZbEOfJaofh1mB2vdlk2imr6jdikNep8UazVUEJ]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Interview - Episode S02E01</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1774377454784-a1582420-2735-4717-b549-daf93ff2f270.jpeg"/>
			<description><![CDATA[<p>📄<strong> Episode Description</strong></p><br><p><strong>In this episode of IT SPARC Cast – Interview, John Barger sits down with Dr. Ewelina Kurtys of Final Spark to explore one of the most futuristic ideas in computing: building computers from living neurons.</strong></p><br><p>Final Spark is a Swiss startup working to create biological computing systems using neurons derived from human stem cells. The goal is to develop a new form of compute that is dramatically more energy-efficient than traditional silicon—potentially by orders of magnitude.</p><br><p>In this conversation, John and Dr. Kurtys explore how neurons are sourced, how they are interfaced with traditional systems, and what it will take to build neuron-based data centers. They also discuss the challenges of programming biological systems, the timeline for commercialization, and what enterprise IT professionals should be doing today to prepare for this emerging paradigm.</p><br><p>This is a deep dive into the intersection of biology, AI, and infrastructure—and what could become the next major evolution of computing. &nbsp;</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>An introduction to Final Spark and the concept of building computing systems using living neurons as an alternative to traditional silicon-based infrastructure.</p><br><p>⸻</p><br><p>❓<strong> Questions</strong></p><br><p>00:32 - Who Is Final Spark?</p><p>01:00 - How Do You Source Your Neurons?</p><p>01:43 - Neuron Quality Control</p><p>02:43 - Neurons In AI Data Centers</p><p>03:14 - Benefit Of Using Neurons</p><p>04:19 - When Will Neuron Based Compute Be Commercially Available</p><p>05:43 - Operating System Or Programming Language For Neurons</p><p>06:49 - What Does A Neuron Based Data Center Look Like?</p><p>07:55 - Containment And Security</p><p>08:28 - Data Persistence And Memory Erasure</p><p>09:10 - What Should IT Professionals Do Today To Prepare?</p><p>12:04 - How Does A Start-Up Get Involved Today?</p><p>12:44 - How Do You Program Neurons “Bits”? Are They Binary?</p><p>14:54 - How Do You Connect Neurons To Silicon Based Compute?</p><p>16:00 - Final Thoughts from Dr. Kurtys</p><br><p>⸻</p><br><p>https://www.finalspark.com</p><p>https://finalspark.com/articles/</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>17:19 – Wrap Up</strong></p><br><p>John reflects on the interview and the long-term implications of neuron-based computing. While still early-stage, the technology represents a potential shift in how compute is delivered—driven by energy efficiency, biological processing models, and new programming paradigms.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/&nbsp;on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>📄<strong> Episode Description</strong></p><br><p><strong>In this episode of IT SPARC Cast – Interview, John Barger sits down with Dr. Ewelina Kurtys of Final Spark to explore one of the most futuristic ideas in computing: building computers from living neurons.</strong></p><br><p>Final Spark is a Swiss startup working to create biological computing systems using neurons derived from human stem cells. The goal is to develop a new form of compute that is dramatically more energy-efficient than traditional silicon—potentially by orders of magnitude.</p><br><p>In this conversation, John and Dr. Kurtys explore how neurons are sourced, how they are interfaced with traditional systems, and what it will take to build neuron-based data centers. They also discuss the challenges of programming biological systems, the timeline for commercialization, and what enterprise IT professionals should be doing today to prepare for this emerging paradigm.</p><br><p>This is a deep dive into the intersection of biology, AI, and infrastructure—and what could become the next major evolution of computing. &nbsp;</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>An introduction to Final Spark and the concept of building computing systems using living neurons as an alternative to traditional silicon-based infrastructure.</p><br><p>⸻</p><br><p>❓<strong> Questions</strong></p><br><p>00:32 - Who Is Final Spark?</p><p>01:00 - How Do You Source Your Neurons?</p><p>01:43 - Neuron Quality Control</p><p>02:43 - Neurons In AI Data Centers</p><p>03:14 - Benefit Of Using Neurons</p><p>04:19 - When Will Neuron Based Compute Be Commercially Available</p><p>05:43 - Operating System Or Programming Language For Neurons</p><p>06:49 - What Does A Neuron Based Data Center Look Like?</p><p>07:55 - Containment And Security</p><p>08:28 - Data Persistence And Memory Erasure</p><p>09:10 - What Should IT Professionals Do Today To Prepare?</p><p>12:04 - How Does A Start-Up Get Involved Today?</p><p>12:44 - How Do You Program Neurons “Bits”? Are They Binary?</p><p>14:54 - How Do You Connect Neurons To Silicon Based Compute?</p><p>16:00 - Final Thoughts from Dr. Kurtys</p><br><p>⸻</p><br><p>https://www.finalspark.com</p><p>https://finalspark.com/articles/</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>17:19 – Wrap Up</strong></p><br><p>John reflects on the interview and the long-term implications of neuron-based computing. While still early-stage, the technology represents a potential shift in how compute is delivered—driven by energy efficiency, biological processing models, and new programming paradigms.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/&nbsp;on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Pokémon Trained Robots?! Stargate Canceled, Nvidia Goes to Space & SaaS Is Dying]]></title>
			<itunes:title><![CDATA[Pokémon Trained Robots?! Stargate Canceled, Nvidia Goes to Space & SaaS Is Dying]]></itunes:title>
			<pubDate>Mon, 23 Mar 2026 13:30:00 GMT</pubDate>
			<itunes:duration>27:56</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69c068b67878605e1142a368/media.mp3" length="482694304" type="audio/mpeg"/>
			<guid isPermaLink="false">69c068b67878605e1142a368</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e30</link>
			<acast:episodeId>69c068b67878605e1142a368</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e30</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7as+K6jKR62GnuvoAc1VuHUOX9ckFTzNqKX/7TaDVYBWsuQqArg5GxZFSPpkOrDJWQYyljTFYeEihUiKVGRkqkY]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E30</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>30</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1774217188903-b3ec8be8-efc7-415b-ba04-ccf5c72663b2.jpeg"/>
			<description><![CDATA[<p><strong>In this episode of IT SPARC Cast – News Bytes, John Barger &amp; Lou Schmidt break down four major stories reshaping enterprise IT, AI infrastructure, and the future of software.</strong></p><br><p>Millions of Pokémon Go players unknowingly helped train real-world delivery robots using billions of images. Meanwhile, OpenAI’s ambitious Stargate data center expansion hits a major setback, highlighting the challenges of scaling AI infrastructure.</p><br><p>Nvidia pushes the frontier even further with plans for <strong>orbital AI data centers powered by its new Vera Rubin Space-1 chip system</strong>, while a growing movement suggests the <strong>“SaaS apocalypse” may be underway</strong>, driven by AI and open-source alternatives reshaping how software is built and consumed.</p><br><p>From crowdsourced AI training to space-based compute and the future of enterprise software, this episode explores where the next wave of IT disruption is coming from. &nbsp;</p><br><p><strong>Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:45 – Pokémon Go Players Unknowingly Trained Delivery Robots With 30 Billion Images</strong></p><br><p>Niantic has leveraged years of Pokémon Go gameplay data—over <strong>30 billion images captured by users</strong>—to build a highly accurate <strong>Visual Positioning System (VPS)</strong> capable of centimeter-level location accuracy.</p><br><p>The discussion highlights both the brilliance of this crowdsourced data model and broader concerns around <strong>data ownership, enterprise data exposure, and unintended data usage</strong>.</p><br><p><a href="https://www.popsci.com/technology/pokemon-go-delivery-robots-crowdsourcing/?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">https://www.popsci.com/technology/pokemon-go-delivery-robots-crowdsourcing/?utm_source=chatgpt.com</a>&nbsp;</p><br><p>⸻</p><br><p><strong>07:18 – OpenAI’s Massive Stargate Data Center Expansion Canceled</strong></p><br><p>Plans to expand a major AI data center tied to the Stargate initiative have been canceled, underscoring the complexity of building large-scale AI infrastructure.</p><br><p>Despite the cancellation, demand for AI compute remains extremely high, with other organizations potentially stepping in to utilize available capacity—reinforcing that <strong>AI infrastructure demand still far exceeds supply</strong>.</p><br><p><a href="https://www.tomshardware.com/tech-industry/artificial-intelligence/openais-massive-stargate-data-center-canceled-as-firm-cant-reach-terms-with-oracle-operator-struggles-with-reliability-issues-meta-said-to-be-interested-in-snatching-excess-capacity" rel="noopener noreferrer" target="_blank">https://www.tomshardware.com/tech-industry/artificial-intelligence/openais-massive-stargate-data-center-canceled-as-firm-cant-reach-terms-with-oracle-operator-struggles-with-reliability-issues-meta-said-to-be-interested-in-snatching-excess-capacity</a>&nbsp;</p><br><p>⸻</p><br><p><strong>11:06 – Nvidia Announces Vera Rubin Space-1 Chip System for Orbital AI Data Centers</strong></p><br><p>Nvidia is pushing AI infrastructure beyond Earth with its <strong>Vera Rubin Space-1 system</strong>, designed for use in orbital data centers.</p><br><p>While challenges remain—especially around cooling and radiation—this represents a major step toward <strong>space-based AI infrastructure</strong> as demand for compute continues to surge.</p><br><p><a href="https://www.cnbc.com/2026/03/16/nvidia-chips-orbital-data-centers-space-ai.html" rel="noopener noreferrer" target="_blank">https://www.cnbc.com/2026/03/16/nvidia-chips-orbital-data-centers-space-ai.html</a>&nbsp;</p><br><p>⸻</p><br><p><strong>17:50 – The SaaS Apocalypse Is Open Source’s Greatest Opportunity</strong></p><br><p>A growing trend suggests that traditional SaaS models may be under pressure as <strong>AI dramatically lowers the cost of building custom software</strong>.</p><br><p>The hosts highlight real-world examples of AI enabling individuals to build production-ready applications in hours, signaling a potential <strong>return to highly customized, in-house systems—powered by AI instead of large dev teams</strong>.</p><br><p><a href="https://hackernoon.com/the-saas-apocalypse-is-opensources-greatest-opportunity" rel="noopener noreferrer" target="_blank">https://hackernoon.com/the-saas-apocalypse-is-opensources-greatest-opportunity</a>&nbsp;</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>25:28 – Mail Bag</strong></p><br><p>Listener Tim flags an issue with a previous episode upload, helping quickly resolve a distribution problem. A reminder of how valuable engaged listeners are to maintaining quality and consistency.</p><br><p>⸻</p><br><p><strong>26:52 – Wrap Up</strong></p><br><p>John and Lou close with thoughts on how rapidly the IT landscape is evolving—from <strong>AI-driven infrastructure and orbital compute to the reinvention of software delivery models</strong>—and encourage listeners to stay adaptable as these shifts accelerate.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>In this episode of IT SPARC Cast – News Bytes, John Barger &amp; Lou Schmidt break down four major stories reshaping enterprise IT, AI infrastructure, and the future of software.</strong></p><br><p>Millions of Pokémon Go players unknowingly helped train real-world delivery robots using billions of images. Meanwhile, OpenAI’s ambitious Stargate data center expansion hits a major setback, highlighting the challenges of scaling AI infrastructure.</p><br><p>Nvidia pushes the frontier even further with plans for <strong>orbital AI data centers powered by its new Vera Rubin Space-1 chip system</strong>, while a growing movement suggests the <strong>“SaaS apocalypse” may be underway</strong>, driven by AI and open-source alternatives reshaping how software is built and consumed.</p><br><p>From crowdsourced AI training to space-based compute and the future of enterprise software, this episode explores where the next wave of IT disruption is coming from. &nbsp;</p><br><p><strong>Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:45 – Pokémon Go Players Unknowingly Trained Delivery Robots With 30 Billion Images</strong></p><br><p>Niantic has leveraged years of Pokémon Go gameplay data—over <strong>30 billion images captured by users</strong>—to build a highly accurate <strong>Visual Positioning System (VPS)</strong> capable of centimeter-level location accuracy.</p><br><p>The discussion highlights both the brilliance of this crowdsourced data model and broader concerns around <strong>data ownership, enterprise data exposure, and unintended data usage</strong>.</p><br><p><a href="https://www.popsci.com/technology/pokemon-go-delivery-robots-crowdsourcing/?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">https://www.popsci.com/technology/pokemon-go-delivery-robots-crowdsourcing/?utm_source=chatgpt.com</a>&nbsp;</p><br><p>⸻</p><br><p><strong>07:18 – OpenAI’s Massive Stargate Data Center Expansion Canceled</strong></p><br><p>Plans to expand a major AI data center tied to the Stargate initiative have been canceled, underscoring the complexity of building large-scale AI infrastructure.</p><br><p>Despite the cancellation, demand for AI compute remains extremely high, with other organizations potentially stepping in to utilize available capacity—reinforcing that <strong>AI infrastructure demand still far exceeds supply</strong>.</p><br><p><a href="https://www.tomshardware.com/tech-industry/artificial-intelligence/openais-massive-stargate-data-center-canceled-as-firm-cant-reach-terms-with-oracle-operator-struggles-with-reliability-issues-meta-said-to-be-interested-in-snatching-excess-capacity" rel="noopener noreferrer" target="_blank">https://www.tomshardware.com/tech-industry/artificial-intelligence/openais-massive-stargate-data-center-canceled-as-firm-cant-reach-terms-with-oracle-operator-struggles-with-reliability-issues-meta-said-to-be-interested-in-snatching-excess-capacity</a>&nbsp;</p><br><p>⸻</p><br><p><strong>11:06 – Nvidia Announces Vera Rubin Space-1 Chip System for Orbital AI Data Centers</strong></p><br><p>Nvidia is pushing AI infrastructure beyond Earth with its <strong>Vera Rubin Space-1 system</strong>, designed for use in orbital data centers.</p><br><p>While challenges remain—especially around cooling and radiation—this represents a major step toward <strong>space-based AI infrastructure</strong> as demand for compute continues to surge.</p><br><p><a href="https://www.cnbc.com/2026/03/16/nvidia-chips-orbital-data-centers-space-ai.html" rel="noopener noreferrer" target="_blank">https://www.cnbc.com/2026/03/16/nvidia-chips-orbital-data-centers-space-ai.html</a>&nbsp;</p><br><p>⸻</p><br><p><strong>17:50 – The SaaS Apocalypse Is Open Source’s Greatest Opportunity</strong></p><br><p>A growing trend suggests that traditional SaaS models may be under pressure as <strong>AI dramatically lowers the cost of building custom software</strong>.</p><br><p>The hosts highlight real-world examples of AI enabling individuals to build production-ready applications in hours, signaling a potential <strong>return to highly customized, in-house systems—powered by AI instead of large dev teams</strong>.</p><br><p><a href="https://hackernoon.com/the-saas-apocalypse-is-opensources-greatest-opportunity" rel="noopener noreferrer" target="_blank">https://hackernoon.com/the-saas-apocalypse-is-opensources-greatest-opportunity</a>&nbsp;</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>25:28 – Mail Bag</strong></p><br><p>Listener Tim flags an issue with a previous episode upload, helping quickly resolve a distribution problem. A reminder of how valuable engaged listeners are to maintaining quality and consistency.</p><br><p>⸻</p><br><p><strong>26:52 – Wrap Up</strong></p><br><p>John and Lou close with thoughts on how rapidly the IT landscape is evolving—from <strong>AI-driven infrastructure and orbital compute to the reinvention of software delivery models</strong>—and encourage listeners to stay adaptable as these shifts accelerate.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>North Korea’s Fake IT Workers: The Insider Threat Hiding in Plain Sight</title>
			<itunes:title>North Korea’s Fake IT Workers: The Insider Threat Hiding in Plain Sight</itunes:title>
			<pubDate>Fri, 20 Mar 2026 13:30:00 GMT</pubDate>
			<itunes:duration>14:42</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69bc56ec3bbfcfe8db1b28c2/media.mp3" length="254226064" type="audio/mpeg"/>
			<guid isPermaLink="false">69bc56ec3bbfcfe8db1b28c2</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e29</link>
			<acast:episodeId>69bc56ec3bbfcfe8db1b28c2</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e29</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Z5KXJUU8PoWTPDVsxWd+GEvrTP09RkOxiFK9XkSNF9XfnxsKMfFv3fIOfyDFLpRFgvbgxnME0YCh+lryAmTOdY]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E29</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>29</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1773950549560-796997df-b4b2-4c4a-9415-59a0de6c0217.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down a rapidly growing cybersecurity threat: <strong>North Korean operatives posing as remote IT workers inside enterprise environments</strong>.</p><br><p>These actors are not just external attackers — they are getting hired, accessing corporate systems, and creating persistent insider threats that are extremely difficult to detect.</p><br><p>The episode explores how the scheme works, why traditional security controls fail, and what enterprise IT teams must do to defend against this evolving attack vector.</p><br><p>⸻</p><br><p>📝<strong> Show Notes</strong></p><br><p>A new cybersecurity threat is emerging that flips the traditional attack model on its head.</p><br><p>Instead of breaking into your network, attackers are <strong>getting hired into your company</strong>.</p><br><p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt analyze the growing threat of <strong>North Korean IT worker schemes</strong>, where operatives pose as legitimate remote employees to gain direct access to enterprise systems.</p><br><p>⸻</p><br><p>🔎<strong> How the Scheme Works</strong></p><br><p>Threat actors:</p><p>•Apply for remote IT jobs using <strong>stolen or synthetic identities</strong></p><p>•Pass interviews and onboarding processes</p><p>•Gain legitimate access to corporate systems</p><p>•Use that access to <strong>exfiltrate data, generate revenue, or stage future attacks</strong></p><br><p>These individuals often work through:</p><p>•VPN masking</p><p>•Proxy networks</p><p>•Identity laundering through third parties</p><br><p>Once inside, they operate as <strong>trusted insiders</strong>, making detection significantly more difficult than traditional external threats.</p><br><p>⸻</p><br><p><strong>⚠ Why This Is So Dangerous</strong></p><br><p>This is not a vulnerability in software — it’s a <strong>failure in process, identity, and trust models</strong>.</p><br><p>Key risks include:</p><p>•Direct access to internal systems and data</p><p>•Ability to bypass perimeter security controls</p><p>•Long-term persistence without detection</p><p>•Potential for data exfiltration, espionage, or ransomware staging</p><br><p>Unlike typical breaches, these actors are:</p><p>•Authenticated</p><p>•Approved</p><p>•Operating under legitimate credentials</p><br><p>⸻</p><br><p>🏢<strong> Enterprise IT Impact</strong></p><br><p>This threat directly impacts:</p><p>•Remote-first organizations</p><p>•Companies hiring globally</p><p>•Teams using contractors or third-party staffing firms</p><p>•Organizations without strict identity verification processes</p><br><p>If your company hires remote developers, engineers, or IT staff — this is your problem.</p><br><p>⸻</p><br><p>🔐<strong> Key Security Takeaways</strong></p><br><p>To mitigate this risk, organizations should:</p><p>•Strengthen identity verification during hiring</p><p>•Require multi-factor authentication across all systems</p><p>•Monitor for unusual behavior from “trusted” accounts</p><p>•Implement least-privilege access controls</p><p>•Audit remote employee access regularly</p><p>•Coordinate with HR on security-aware hiring practices</p><br><p>This is a <strong>cross-functional problem</strong> — IT, Security, and HR must work together.</p><br><p>⸻</p><br><p>🔗<strong> Source Article</strong></p><br><p>https://www.nbcnews.com/investigations/north-korea-it-worker-scheme-nisos-fbi-rcna245025</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down a rapidly growing cybersecurity threat: <strong>North Korean operatives posing as remote IT workers inside enterprise environments</strong>.</p><br><p>These actors are not just external attackers — they are getting hired, accessing corporate systems, and creating persistent insider threats that are extremely difficult to detect.</p><br><p>The episode explores how the scheme works, why traditional security controls fail, and what enterprise IT teams must do to defend against this evolving attack vector.</p><br><p>⸻</p><br><p>📝<strong> Show Notes</strong></p><br><p>A new cybersecurity threat is emerging that flips the traditional attack model on its head.</p><br><p>Instead of breaking into your network, attackers are <strong>getting hired into your company</strong>.</p><br><p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt analyze the growing threat of <strong>North Korean IT worker schemes</strong>, where operatives pose as legitimate remote employees to gain direct access to enterprise systems.</p><br><p>⸻</p><br><p>🔎<strong> How the Scheme Works</strong></p><br><p>Threat actors:</p><p>•Apply for remote IT jobs using <strong>stolen or synthetic identities</strong></p><p>•Pass interviews and onboarding processes</p><p>•Gain legitimate access to corporate systems</p><p>•Use that access to <strong>exfiltrate data, generate revenue, or stage future attacks</strong></p><br><p>These individuals often work through:</p><p>•VPN masking</p><p>•Proxy networks</p><p>•Identity laundering through third parties</p><br><p>Once inside, they operate as <strong>trusted insiders</strong>, making detection significantly more difficult than traditional external threats.</p><br><p>⸻</p><br><p><strong>⚠ Why This Is So Dangerous</strong></p><br><p>This is not a vulnerability in software — it’s a <strong>failure in process, identity, and trust models</strong>.</p><br><p>Key risks include:</p><p>•Direct access to internal systems and data</p><p>•Ability to bypass perimeter security controls</p><p>•Long-term persistence without detection</p><p>•Potential for data exfiltration, espionage, or ransomware staging</p><br><p>Unlike typical breaches, these actors are:</p><p>•Authenticated</p><p>•Approved</p><p>•Operating under legitimate credentials</p><br><p>⸻</p><br><p>🏢<strong> Enterprise IT Impact</strong></p><br><p>This threat directly impacts:</p><p>•Remote-first organizations</p><p>•Companies hiring globally</p><p>•Teams using contractors or third-party staffing firms</p><p>•Organizations without strict identity verification processes</p><br><p>If your company hires remote developers, engineers, or IT staff — this is your problem.</p><br><p>⸻</p><br><p>🔐<strong> Key Security Takeaways</strong></p><br><p>To mitigate this risk, organizations should:</p><p>•Strengthen identity verification during hiring</p><p>•Require multi-factor authentication across all systems</p><p>•Monitor for unusual behavior from “trusted” accounts</p><p>•Implement least-privilege access controls</p><p>•Audit remote employee access regularly</p><p>•Coordinate with HR on security-aware hiring practices</p><br><p>This is a <strong>cross-functional problem</strong> — IT, Security, and HR must work together.</p><br><p>⸻</p><br><p>🔗<strong> Source Article</strong></p><br><p>https://www.nbcnews.com/investigations/north-korea-it-worker-scheme-nisos-fbi-rcna245025</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Redux - Node.js Security Crisis, Meta’s AI Agent Network, Nvidia’s Open Agent Platform & Oracle’s Data Center Bet]]></title>
			<itunes:title><![CDATA[Redux - Node.js Security Crisis, Meta’s AI Agent Network, Nvidia’s Open Agent Platform & Oracle’s Data Center Bet]]></itunes:title>
			<pubDate>Mon, 16 Mar 2026 20:08:13 GMT</pubDate>
			<itunes:duration>22:29</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69b8632d0e4c6e732054086e/media.mp3" length="388760464" type="audio/mpeg"/>
			<guid isPermaLink="false">69b8632d0e4c6e732054086e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e29a</link>
			<acast:episodeId>69b8632d0e4c6e732054086e</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e29a</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZJeEyr9nG1RDrCIqc9guKsTgFXqiySZBmrv5PuM8G84hHuGD9K7qb2LtCFVvg2IUyB8aS3zXymkpou8RfkAvlQ]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E29</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>29</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1773691410556-26d036ab-47f6-47c1-96fc-3e6296394579.jpeg"/>
			<description><![CDATA[<p>Oooops.  We uploaded the wrong audio.  It's been fix now.</p><br><p><strong>In this episode of IT SPARC Cast – News Bytes, John Barger &amp; Lou Schmidt explore four major stories shaping enterprise IT, open-source software, AI infrastructure, and the future of data centers.</strong></p><br><p>A new report reveals that <strong>two-thirds of Node.js installations are running outdated versions</strong>, creating major security and operational risks across modern software stacks. Meanwhile, <strong>Meta hires the creators of Moltbook</strong>, a platform designed as a social network for AI agents to communicate and collaborate.</p><br><p>Nvidia enters the agentic AI race with plans for an <strong>open-source enterprise AI agent platform</strong>, while Oracle’s massive investments in AI data centers spark debate about whether the industry is heading toward an infrastructure bubble.</p><br><p>From open-source sustainability to AI infrastructure strategy, this episode breaks down what these developments mean for enterprise IT leaders, developers, and technology investors.&nbsp;</p><br><p><strong>Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:43 – Two Thirds of Node.js Installations Are Outdated</strong></p><br><p>A new report from the OpenJS Foundation reveals that <strong>roughly two-thirds of Node.js deployments are running outdated or end-of-life versions</strong>, creating serious security and stability concerns across modern applications.</p><br><p>To address this, the Node.js LTS Upgrade and Modernization Program is connecting enterprises with trusted service providers audit, plan, and modernize their deployments.</p><br><p>The initiative also helps fund open-source development by directing a portion of service revenue back to the OpenJS Foundation.</p><br><p>https://openjsf.org/blog/nodejs-lts-upgrade-program</p><br><p><strong>04:59 – Meta Hires the Duo Behind Moltbook</strong></p><br><p>Meta has hired the creators of <strong>Moltbook</strong>, a platform designed as a collaboration network where AI agents can verify identity, exchange information, and coordinate tasks.</p><br><p>Meta’s move suggests a strategy to become the <strong>central hub for AI agent interaction</strong>, positioning the company to support a future where large numbers of autonomous software agents perform tasks for individuals and businesses.</p><br><p>https://www.axios.com/2026/03/10/meta-facebook-moltbook-agent-social-network</p><br><p><strong>10:20 – Nvidia to Launch an Open-Source AI Agent Platform</strong></p><br><p>Nvidia is preparing to release <strong>NemoClaw</strong>, an open-source AI agent platform designed to help enterprises deploy autonomous agents capable of automating workflows, managing data, and performing complex multi-step tasks.</p><br><p>Key aspects of the platform include:</p><br><p>• Enterprise-focused agent orchestration</p><p>• Open-source accessibility</p><p>• Compatibility beyond Nvidia hardware</p><p>• Integration with major enterprise software vendors</p><br><p>The move signals Nvidia’s growing interest in the <strong>agentic AI ecosystem</strong>, which could dramatically increase demand for GPU-accelerated compute infrastructure.</p><br><p>https://www.wired.com/story/nvidia-planning-ai-agent-platform-launch-open-source/</p><br><p>⸻</p><br><p><strong>14:27 – Oracle Is Building Yesterday’s Data Centers With Tomorrow’s Debt</strong></p><br><p>Oracle is investing heavily in new AI data centers, financing much of the expansion through debt as it competes with other hyperscale cloud providers.</p><br><p>Some analysts have raised concerns that <strong>rapid advances in AI hardware could outpace the construction timelines of new facilities</strong>, potentially creating financial risk.</p><br><p>However, the hosts point out that building data centers requires long lead times for power infrastructure, networking, and facilities, while the compute hardware itself is typically installed later in the deployment process.</p><br><p>The discussion highlights the importance of evaluating technology investment stories critically and considering both infrastructure realities and market narratives.</p><br><p>https://www.cnbc.com/2026/03/09/oracle-is-building-yesterdays-data-centers-with-tomorrows-debt.html</p><br><p>⸻</p><br><p><strong>20:14 – Wrap up</strong></p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Oooops.  We uploaded the wrong audio.  It's been fix now.</p><br><p><strong>In this episode of IT SPARC Cast – News Bytes, John Barger &amp; Lou Schmidt explore four major stories shaping enterprise IT, open-source software, AI infrastructure, and the future of data centers.</strong></p><br><p>A new report reveals that <strong>two-thirds of Node.js installations are running outdated versions</strong>, creating major security and operational risks across modern software stacks. Meanwhile, <strong>Meta hires the creators of Moltbook</strong>, a platform designed as a social network for AI agents to communicate and collaborate.</p><br><p>Nvidia enters the agentic AI race with plans for an <strong>open-source enterprise AI agent platform</strong>, while Oracle’s massive investments in AI data centers spark debate about whether the industry is heading toward an infrastructure bubble.</p><br><p>From open-source sustainability to AI infrastructure strategy, this episode breaks down what these developments mean for enterprise IT leaders, developers, and technology investors.&nbsp;</p><br><p><strong>Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:43 – Two Thirds of Node.js Installations Are Outdated</strong></p><br><p>A new report from the OpenJS Foundation reveals that <strong>roughly two-thirds of Node.js deployments are running outdated or end-of-life versions</strong>, creating serious security and stability concerns across modern applications.</p><br><p>To address this, the Node.js LTS Upgrade and Modernization Program is connecting enterprises with trusted service providers audit, plan, and modernize their deployments.</p><br><p>The initiative also helps fund open-source development by directing a portion of service revenue back to the OpenJS Foundation.</p><br><p>https://openjsf.org/blog/nodejs-lts-upgrade-program</p><br><p><strong>04:59 – Meta Hires the Duo Behind Moltbook</strong></p><br><p>Meta has hired the creators of <strong>Moltbook</strong>, a platform designed as a collaboration network where AI agents can verify identity, exchange information, and coordinate tasks.</p><br><p>Meta’s move suggests a strategy to become the <strong>central hub for AI agent interaction</strong>, positioning the company to support a future where large numbers of autonomous software agents perform tasks for individuals and businesses.</p><br><p>https://www.axios.com/2026/03/10/meta-facebook-moltbook-agent-social-network</p><br><p><strong>10:20 – Nvidia to Launch an Open-Source AI Agent Platform</strong></p><br><p>Nvidia is preparing to release <strong>NemoClaw</strong>, an open-source AI agent platform designed to help enterprises deploy autonomous agents capable of automating workflows, managing data, and performing complex multi-step tasks.</p><br><p>Key aspects of the platform include:</p><br><p>• Enterprise-focused agent orchestration</p><p>• Open-source accessibility</p><p>• Compatibility beyond Nvidia hardware</p><p>• Integration with major enterprise software vendors</p><br><p>The move signals Nvidia’s growing interest in the <strong>agentic AI ecosystem</strong>, which could dramatically increase demand for GPU-accelerated compute infrastructure.</p><br><p>https://www.wired.com/story/nvidia-planning-ai-agent-platform-launch-open-source/</p><br><p>⸻</p><br><p><strong>14:27 – Oracle Is Building Yesterday’s Data Centers With Tomorrow’s Debt</strong></p><br><p>Oracle is investing heavily in new AI data centers, financing much of the expansion through debt as it competes with other hyperscale cloud providers.</p><br><p>Some analysts have raised concerns that <strong>rapid advances in AI hardware could outpace the construction timelines of new facilities</strong>, potentially creating financial risk.</p><br><p>However, the hosts point out that building data centers requires long lead times for power infrastructure, networking, and facilities, while the compute hardware itself is typically installed later in the deployment process.</p><br><p>The discussion highlights the importance of evaluating technology investment stories critically and considering both infrastructure realities and market narratives.</p><br><p>https://www.cnbc.com/2026/03/09/oracle-is-building-yesterdays-data-centers-with-tomorrows-debt.html</p><br><p>⸻</p><br><p><strong>20:14 – Wrap up</strong></p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Node.js Security Crisis, Meta’s AI Agent Network, Nvidia’s Open Agent Platform & Oracle’s Data Center Bet]]></title>
			<itunes:title><![CDATA[Node.js Security Crisis, Meta’s AI Agent Network, Nvidia’s Open Agent Platform & Oracle’s Data Center Bet]]></itunes:title>
			<pubDate>Mon, 16 Mar 2026 18:03:39 GMT</pubDate>
			<itunes:duration>22:29</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69b42d9e559de2c63441c6c9/media.mp3" length="388760464" type="audio/mpeg"/>
			<guid isPermaLink="false">69b42d9e559de2c63441c6c9</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e29</link>
			<acast:episodeId>69b42d9e559de2c63441c6c9</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e29</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aXjGsIcmBa2oAO6prEsBChENUlNy1Qev9mpoN5TJkV1xofoS0ZbdvvJADuDTSb7XmR+FFeDBeEUoZl6X8h05he]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E29</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>29</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1773415318143-0d11c6c0-6e62-40a1-9ee0-28e59139e326.jpeg"/>
			<description><![CDATA[<p><strong>In this episode of IT SPARC Cast – News Bytes, John Barger &amp; Lou Schmidt explore four major stories shaping enterprise IT, open-source software, AI infrastructure, and the future of data centers.</strong></p><br><p>A new report reveals that <strong>two-thirds of Node.js installations are running outdated versions</strong>, creating major security and operational risks across modern software stacks. Meanwhile, <strong>Meta hires the creators of Moltbook</strong>, a platform designed as a social network for AI agents to communicate and collaborate.</p><br><p>Nvidia enters the agentic AI race with plans for an <strong>open-source enterprise AI agent platform</strong>, while Oracle’s massive investments in AI data centers spark debate about whether the industry is heading toward an infrastructure bubble.</p><br><p>From open-source sustainability to AI infrastructure strategy, this episode breaks down what these developments mean for enterprise IT leaders, developers, and technology investors. &nbsp;</p><br><p><strong>00:00 – Intro</strong></p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:43 – Two Thirds of Node.js Installations Are Outdated</strong></p><br><p>A new report from the OpenJS Foundation reveals that <strong>roughly two-thirds of Node.js deployments are running outdated or end-of-life versions</strong>, creating serious security and stability concerns across modern applications.</p><br><p>To address this, the Node.js LTS Upgrade and Modernization Program is connecting enterprises with trusted service providers that can:</p><br><p>• Audit existing deployments</p><p>• Plan phased upgrades</p><p>• Modernize dependencies</p><p>• Maintain production stability</p><br><p>https://openjsf.org/blog/nodejs-lts-upgrade-program</p><br><p><strong>04:59 – Meta Hires the Duo Behind Moltbook</strong></p><br><p>Meta has hired the creators of <strong>Moltbook</strong>, a platform designed as a collaboration network where AI agents can verify identity, exchange information, and coordinate tasks.</p><br><p>Meta’s move suggests a strategy to become the <strong>central hub for AI agent interaction</strong>, positioning the company to support a future where large numbers of autonomous software agents perform tasks for individuals and businesses.</p><br><p>https://www.axios.com/2026/03/10/meta-facebook-moltbook-agent-social-network</p><br><p><strong>10:20 – Nvidia to Launch an Open-Source AI Agent Platform</strong></p><br><p>Nvidia is preparing to release <strong>NemoClaw</strong>, an open-source AI agent platform designed to help enterprises deploy autonomous agents capable of automating workflows, managing data, and performing complex multi-step tasks.</p><br><p>The move signals Nvidia’s growing interest in the <strong>agentic AI ecosystem</strong>, which could dramatically increase demand for GPU-accelerated compute infrastructure.</p><br><p>https://www.wired.com/story/nvidia-planning-ai-agent-platform-launch-open-source/</p><br><p><strong>14:27 – Oracle Is Building Yesterday’s Data Centers With Tomorrow’s Debt</strong></p><br><p>Oracle is investing heavily in new AI data centers, financing much of the expansion through debt as it competes with other hyperscale cloud providers.</p><br><p>Some analysts have raised concerns that <strong>rapid advances in AI hardware could outpace the construction timelines of new facilities</strong>, potentially creating financial risk.</p><br><p>The discussion highlights the importance of evaluating technology investment stories critically and considering both infrastructure realities and market narratives.</p><br><p>https://www.cnbc.com/2026/03/09/oracle-is-building-yesterdays-data-centers-with-tomorrows-debt.html</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>20:14 – Mail Bag</strong></p><br><p>Listener Mel asks whether <strong>laser-based networking technologies</strong>, like the TaaraConnect system discussed in a previous episode, could help improve internet access in mountainous rural areas.</p><br><p>While line-of-sight laser connectivity could offer high speeds, weather conditions like fog and cloud cover could require backup connections such as radio or wired infrastructure.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>In this episode of IT SPARC Cast – News Bytes, John Barger &amp; Lou Schmidt explore four major stories shaping enterprise IT, open-source software, AI infrastructure, and the future of data centers.</strong></p><br><p>A new report reveals that <strong>two-thirds of Node.js installations are running outdated versions</strong>, creating major security and operational risks across modern software stacks. Meanwhile, <strong>Meta hires the creators of Moltbook</strong>, a platform designed as a social network for AI agents to communicate and collaborate.</p><br><p>Nvidia enters the agentic AI race with plans for an <strong>open-source enterprise AI agent platform</strong>, while Oracle’s massive investments in AI data centers spark debate about whether the industry is heading toward an infrastructure bubble.</p><br><p>From open-source sustainability to AI infrastructure strategy, this episode breaks down what these developments mean for enterprise IT leaders, developers, and technology investors. &nbsp;</p><br><p><strong>00:00 – Intro</strong></p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:43 – Two Thirds of Node.js Installations Are Outdated</strong></p><br><p>A new report from the OpenJS Foundation reveals that <strong>roughly two-thirds of Node.js deployments are running outdated or end-of-life versions</strong>, creating serious security and stability concerns across modern applications.</p><br><p>To address this, the Node.js LTS Upgrade and Modernization Program is connecting enterprises with trusted service providers that can:</p><br><p>• Audit existing deployments</p><p>• Plan phased upgrades</p><p>• Modernize dependencies</p><p>• Maintain production stability</p><br><p>https://openjsf.org/blog/nodejs-lts-upgrade-program</p><br><p><strong>04:59 – Meta Hires the Duo Behind Moltbook</strong></p><br><p>Meta has hired the creators of <strong>Moltbook</strong>, a platform designed as a collaboration network where AI agents can verify identity, exchange information, and coordinate tasks.</p><br><p>Meta’s move suggests a strategy to become the <strong>central hub for AI agent interaction</strong>, positioning the company to support a future where large numbers of autonomous software agents perform tasks for individuals and businesses.</p><br><p>https://www.axios.com/2026/03/10/meta-facebook-moltbook-agent-social-network</p><br><p><strong>10:20 – Nvidia to Launch an Open-Source AI Agent Platform</strong></p><br><p>Nvidia is preparing to release <strong>NemoClaw</strong>, an open-source AI agent platform designed to help enterprises deploy autonomous agents capable of automating workflows, managing data, and performing complex multi-step tasks.</p><br><p>The move signals Nvidia’s growing interest in the <strong>agentic AI ecosystem</strong>, which could dramatically increase demand for GPU-accelerated compute infrastructure.</p><br><p>https://www.wired.com/story/nvidia-planning-ai-agent-platform-launch-open-source/</p><br><p><strong>14:27 – Oracle Is Building Yesterday’s Data Centers With Tomorrow’s Debt</strong></p><br><p>Oracle is investing heavily in new AI data centers, financing much of the expansion through debt as it competes with other hyperscale cloud providers.</p><br><p>Some analysts have raised concerns that <strong>rapid advances in AI hardware could outpace the construction timelines of new facilities</strong>, potentially creating financial risk.</p><br><p>The discussion highlights the importance of evaluating technology investment stories critically and considering both infrastructure realities and market narratives.</p><br><p>https://www.cnbc.com/2026/03/09/oracle-is-building-yesterdays-data-centers-with-tomorrows-debt.html</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>20:14 – Mail Bag</strong></p><br><p>Listener Mel asks whether <strong>laser-based networking technologies</strong>, like the TaaraConnect system discussed in a previous episode, could help improve internet access in mountainous rural areas.</p><br><p>While line-of-sight laser connectivity could offer high speeds, weather conditions like fog and cloud cover could require backup connections such as radio or wired infrastructure.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>14,000 ASUS Routers Infected: KadNap Botnet Creates Nearly Untouchable Malware Network</title>
			<itunes:title>14,000 ASUS Routers Infected: KadNap Botnet Creates Nearly Untouchable Malware Network</itunes:title>
			<pubDate>Fri, 13 Mar 2026 14:30:00 GMT</pubDate>
			<itunes:duration>10:01</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69b33c8b5668adfee6458a60/media.mp3" length="173193112" type="audio/mpeg"/>
			<guid isPermaLink="false">69b33c8b5668adfee6458a60</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e28</link>
			<acast:episodeId>69b33c8b5668adfee6458a60</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e28</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bCppyAz/e/8+A3c9G/mxQDTpMakFSmaju/r58+8U9B955ANlATD7lGfiM3K7NxaNLImw0T3ETe0kd7p4qqqw1+]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E28</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>28</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1773354079072-9907b7f0-081d-44c3-8e6b-020315fb34da.jpeg"/>
			<description><![CDATA[<p>A new malware campaign has compromised more than <strong>14,000 ASUS routers</strong>, creating a resilient botnet that security researchers say is unusually difficult to dismantle.</p><br><p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt examine the <strong>KadNap router malware</strong>, which targets unpatched ASUS routers and installs a persistent backdoor designed to survive typical remediation efforts.</p><br><p>The malware was identified by researchers at <strong>Lumen’s Black Lotus Labs</strong>, who discovered that infected routers are being used as part of a botnet capable of proxying internet traffic and enabling other malicious activities.</p><br><p>Unlike many botnets that rely on centralized command servers, KadNap uses <strong>peer-to-peer control mechanisms similar to BitTorrent</strong>, making it significantly harder for security teams to disrupt.</p><br><p>⸻</p><br><p>🔎<strong> What the KadNap Router Malware Does</strong></p><br><p>The malware exploits vulnerabilities in <strong>ASUS routers that have not been patched or configured securely</strong>.</p><br><p>Once installed, KadNap:</p><p>•Creates a <strong>persistent backdoor</strong> on the router</p><p>•Survives <strong>reboots and firmware updates</strong></p><p>•Enables remote control of the router</p><p>•Connects the device to a <strong>distributed botnet network</strong></p><p>•Routes malicious traffic through compromised residential internet connections</p><br><p>Researchers also discovered the infected routers are being used by a <strong>fee-based proxy service called Doppelganger</strong>, allowing customers to route their internet traffic through unsuspecting victims’ home networks.</p><br><p>⸻</p><br><p><strong>⚠ Why This Is Dangerous</strong></p><br><p>Because the traffic originates from compromised home routers, victims could unknowingly appear responsible for malicious activity such as:</p><p>•Network attacks</p><p>•Surveillance operations</p><p>•Illegal browsing activity</p><p>•Staging points for additional cyber intrusions</p><br><p>This makes detection and attribution far more difficult.</p><br><p>⸻</p><br><p>🏢<strong> Enterprise IT Risk</strong></p><br><p>This vulnerability is not limited to home users.</p><br><p>ASUS also produces <strong>small-business routers</strong>, meaning organizations or small offices using these devices could be exposed.</p><br><p>IT professionals should also remember that compromised routers can provide attackers with a <strong>network foothold for lateral movement</strong>, especially if IoT or remote-user networks are poorly segmented.</p><br><p>⸻</p><br><p>🛠<strong> How to Detect and Remove KadNap</strong></p><br><p>Security experts recommend checking routers for signs of compromise:</p><br><p>Look for:</p><p>•<strong>SSH enabled unexpectedly</strong></p><p>•<strong>Remote administration enabled</strong></p><p>•Unknown certificates or scheduled tasks</p><p>•Suspicious entries in device logs</p><br><p>Because the malware attaches to configuration files, simply rebooting or restoring a configuration backup <strong>will not remove it</strong>.</p><br><p>The proper remediation process:</p><p>1.Perform a <strong>full factory reset</strong></p><p>2.Update the router firmware immediately</p><p>3.<strong>Manually reconfigure the router</strong> (do not restore backups)</p><br><p>Experts also recommend <strong>changing default internal network ranges</strong>, such as moving away from the common 192.168.1.x subnet.</p><br><p>⸻</p><br><p>🔗<strong> Source Article</strong></p><br><p>https://arstechnica.com/security/2026/03/14000-routers-are-infected-by-malware-thats-highly-resistant-to-takedowns/</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>A new malware campaign has compromised more than <strong>14,000 ASUS routers</strong>, creating a resilient botnet that security researchers say is unusually difficult to dismantle.</p><br><p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt examine the <strong>KadNap router malware</strong>, which targets unpatched ASUS routers and installs a persistent backdoor designed to survive typical remediation efforts.</p><br><p>The malware was identified by researchers at <strong>Lumen’s Black Lotus Labs</strong>, who discovered that infected routers are being used as part of a botnet capable of proxying internet traffic and enabling other malicious activities.</p><br><p>Unlike many botnets that rely on centralized command servers, KadNap uses <strong>peer-to-peer control mechanisms similar to BitTorrent</strong>, making it significantly harder for security teams to disrupt.</p><br><p>⸻</p><br><p>🔎<strong> What the KadNap Router Malware Does</strong></p><br><p>The malware exploits vulnerabilities in <strong>ASUS routers that have not been patched or configured securely</strong>.</p><br><p>Once installed, KadNap:</p><p>•Creates a <strong>persistent backdoor</strong> on the router</p><p>•Survives <strong>reboots and firmware updates</strong></p><p>•Enables remote control of the router</p><p>•Connects the device to a <strong>distributed botnet network</strong></p><p>•Routes malicious traffic through compromised residential internet connections</p><br><p>Researchers also discovered the infected routers are being used by a <strong>fee-based proxy service called Doppelganger</strong>, allowing customers to route their internet traffic through unsuspecting victims’ home networks.</p><br><p>⸻</p><br><p><strong>⚠ Why This Is Dangerous</strong></p><br><p>Because the traffic originates from compromised home routers, victims could unknowingly appear responsible for malicious activity such as:</p><p>•Network attacks</p><p>•Surveillance operations</p><p>•Illegal browsing activity</p><p>•Staging points for additional cyber intrusions</p><br><p>This makes detection and attribution far more difficult.</p><br><p>⸻</p><br><p>🏢<strong> Enterprise IT Risk</strong></p><br><p>This vulnerability is not limited to home users.</p><br><p>ASUS also produces <strong>small-business routers</strong>, meaning organizations or small offices using these devices could be exposed.</p><br><p>IT professionals should also remember that compromised routers can provide attackers with a <strong>network foothold for lateral movement</strong>, especially if IoT or remote-user networks are poorly segmented.</p><br><p>⸻</p><br><p>🛠<strong> How to Detect and Remove KadNap</strong></p><br><p>Security experts recommend checking routers for signs of compromise:</p><br><p>Look for:</p><p>•<strong>SSH enabled unexpectedly</strong></p><p>•<strong>Remote administration enabled</strong></p><p>•Unknown certificates or scheduled tasks</p><p>•Suspicious entries in device logs</p><br><p>Because the malware attaches to configuration files, simply rebooting or restoring a configuration backup <strong>will not remove it</strong>.</p><br><p>The proper remediation process:</p><p>1.Perform a <strong>full factory reset</strong></p><p>2.Update the router firmware immediately</p><p>3.<strong>Manually reconfigure the router</strong> (do not restore backups)</p><br><p>Experts also recommend <strong>changing default internal network ranges</strong>, such as moving away from the common 192.168.1.x subnet.</p><br><p>⸻</p><br><p>🔗<strong> Source Article</strong></p><br><p>https://arstechnica.com/security/2026/03/14000-routers-are-infected-by-malware-thats-highly-resistant-to-takedowns/</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Google Quantum-Proofs HTTPS, 6G Hits 1 Tbps, and Internet Over LASERS?! | IT SPARC Cast</title>
			<itunes:title>Google Quantum-Proofs HTTPS, 6G Hits 1 Tbps, and Internet Over LASERS?! | IT SPARC Cast</itunes:title>
			<pubDate>Mon, 09 Mar 2026 14:30:00 GMT</pubDate>
			<itunes:duration>22:19</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69adbe567036d739028cad36/media.mp3" length="385745452" type="audio/mpeg"/>
			<guid isPermaLink="false">69adbe567036d739028cad36</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e28</link>
			<acast:episodeId>69adbe567036d739028cad36</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e28</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Zo1Hta8HmTxUX/GlYjzHARR4POaeP16yRm8tZcxXBc846bOq1UTkn15/L41UBfFzEl1OYqn7enFSghu8AHXxnm]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E28</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>28</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1772994187967-a32ef679-f321-41ed-8dfc-516e987e5aec.jpeg"/>
			<description><![CDATA[<p><strong>In this episode of IT SPARC Cast – News Bytes, John Barger &amp; Lou Schmidt break down three major developments shaping the future of networking and internet infrastructure.</strong></p><br><p>Google begins testing a new quantum-resistant HTTPS certificate approach designed to defend the web against future quantum computing attacks. Meanwhile, Qualcomm’s CEO declares that the coming <strong>6G mobile revolution will be essential for AI-driven applications</strong>, promising speeds up to 1 Tbps and sub-millisecond latency. Finally, TaaraConnect introduces a <strong>25-Gbps laser-based networking system</strong> capable of delivering fiber-like speeds between buildings without laying cable.</p><br><p>From quantum-safe encryption to AI-driven wireless networks and laser communication links, this episode explores how the next generation of connectivity will reshape enterprise IT infrastructure, data centers, and global networks. &nbsp;</p><br><p>⸻</p><br><p><strong>Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:51 – Google Quantum-Proofs HTTPS with Compact Certificates</strong></p><br><p>Google and Cloudflare are testing a new method to make HTTPS certificates resistant to future quantum attacks.</p><br><p>Instead of traditional signature chains, the system uses <strong>Merkle Tree Certificates (MTCs)</strong> to dramatically shrink quantum-safe cryptographic data from roughly <strong>15 KB down to about 700 bytes</strong>, making it practical for real-world internet use.</p><br><p>The experiment begins with about <strong>1,000 TLS certificates</strong>, with standards work underway through the IETF. If successful, this approach could become a foundational component of <strong>post-quantum internet security</strong>.</p><br><p>The big unknown: how much processing overhead these new cryptographic methods will require on older client devices.</p><br><p>https://arstechnica.com/security/2026/02/google-is-using-clever-math-to-quantum-proof-https-certificates/ </p><br><p>⸻</p><br><p><strong>05:42 – Qualcomm CEO Says the 6G Revolution Is Coming</strong></p><br><p>At Mobile World Congress, Qualcomm CEO Cristiano Amon argued that the <strong>AI era will demand 6G networks</strong>, dramatically increasing bandwidth and lowering latency.</p><br><p>Projected 6G capabilities include:</p><br><p>• Speeds of <strong>100 Gbps to 1 Tbps</strong></p><p>• <strong>Sub-millisecond latency</strong></p><p>• Massive connectivity for billions of devices</p><p>• AI-driven network management</p><br><p>The shift toward <strong>AI-heavy cloud processing</strong> means network traffic will become even more <strong>north-south oriented</strong>, sending massive datasets between edge devices and cloud infrastructure.</p><br><p>Early <strong>6G trials are expected around 2028</strong>, with broader deployments beginning around <strong>2029</strong>.</p><br><p>https://fortune.com/2026/03/03/qualcomm-ceo-resistance-is-futile-6g-mobile-revolution-approaches/</p><br><p>⸻</p><br><p><strong>13:31 – TaaraConnect Uses Lasers to Deliver 25-Gbps Internet</strong></p><br><p>TaaraConnect is developing a <strong>laser-based point-to-point networking system</strong> capable of delivering up to <strong>25 Gbps over distances of about 6 miles (10 km)</strong>.</p><br><p>Instead of radio waves, the system transmits data using <strong>focused beams of light</strong>, creating fiber-like connectivity without physical cables.</p><br><p>Key features include:</p><br><p>• Adaptive beam alignment</p><p>• Automatic power adjustments during interference</p><p>• Redundant beam paths to mitigate disruptions</p><p>• Low-latency high-bandwidth links between buildings</p><br><p>While heavy fog remains the primary limitation, the technology could provide a powerful alternative to expensive metro fiber deployments, particularly in dense urban environments.</p><br><p>https://newatlas.com/telecommunications/google-taara-25gbps-internet-cities-light/</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>19:31 – Mail Bag</strong></p><br><p>Listener Xavier shares thoughts on the rising cost of compute power and suggests that <strong>bio-AI systems using living neurons</strong> could eventually deliver superior performance-per-watt compared to traditional silicon chips.</p><br><p>The discussion highlights a growing industry focus on <strong>compute efficiency and power consumption</strong> as data center infrastructure scales to support AI workloads.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>In this episode of IT SPARC Cast – News Bytes, John Barger &amp; Lou Schmidt break down three major developments shaping the future of networking and internet infrastructure.</strong></p><br><p>Google begins testing a new quantum-resistant HTTPS certificate approach designed to defend the web against future quantum computing attacks. Meanwhile, Qualcomm’s CEO declares that the coming <strong>6G mobile revolution will be essential for AI-driven applications</strong>, promising speeds up to 1 Tbps and sub-millisecond latency. Finally, TaaraConnect introduces a <strong>25-Gbps laser-based networking system</strong> capable of delivering fiber-like speeds between buildings without laying cable.</p><br><p>From quantum-safe encryption to AI-driven wireless networks and laser communication links, this episode explores how the next generation of connectivity will reshape enterprise IT infrastructure, data centers, and global networks. &nbsp;</p><br><p>⸻</p><br><p><strong>Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:51 – Google Quantum-Proofs HTTPS with Compact Certificates</strong></p><br><p>Google and Cloudflare are testing a new method to make HTTPS certificates resistant to future quantum attacks.</p><br><p>Instead of traditional signature chains, the system uses <strong>Merkle Tree Certificates (MTCs)</strong> to dramatically shrink quantum-safe cryptographic data from roughly <strong>15 KB down to about 700 bytes</strong>, making it practical for real-world internet use.</p><br><p>The experiment begins with about <strong>1,000 TLS certificates</strong>, with standards work underway through the IETF. If successful, this approach could become a foundational component of <strong>post-quantum internet security</strong>.</p><br><p>The big unknown: how much processing overhead these new cryptographic methods will require on older client devices.</p><br><p>https://arstechnica.com/security/2026/02/google-is-using-clever-math-to-quantum-proof-https-certificates/ </p><br><p>⸻</p><br><p><strong>05:42 – Qualcomm CEO Says the 6G Revolution Is Coming</strong></p><br><p>At Mobile World Congress, Qualcomm CEO Cristiano Amon argued that the <strong>AI era will demand 6G networks</strong>, dramatically increasing bandwidth and lowering latency.</p><br><p>Projected 6G capabilities include:</p><br><p>• Speeds of <strong>100 Gbps to 1 Tbps</strong></p><p>• <strong>Sub-millisecond latency</strong></p><p>• Massive connectivity for billions of devices</p><p>• AI-driven network management</p><br><p>The shift toward <strong>AI-heavy cloud processing</strong> means network traffic will become even more <strong>north-south oriented</strong>, sending massive datasets between edge devices and cloud infrastructure.</p><br><p>Early <strong>6G trials are expected around 2028</strong>, with broader deployments beginning around <strong>2029</strong>.</p><br><p>https://fortune.com/2026/03/03/qualcomm-ceo-resistance-is-futile-6g-mobile-revolution-approaches/</p><br><p>⸻</p><br><p><strong>13:31 – TaaraConnect Uses Lasers to Deliver 25-Gbps Internet</strong></p><br><p>TaaraConnect is developing a <strong>laser-based point-to-point networking system</strong> capable of delivering up to <strong>25 Gbps over distances of about 6 miles (10 km)</strong>.</p><br><p>Instead of radio waves, the system transmits data using <strong>focused beams of light</strong>, creating fiber-like connectivity without physical cables.</p><br><p>Key features include:</p><br><p>• Adaptive beam alignment</p><p>• Automatic power adjustments during interference</p><p>• Redundant beam paths to mitigate disruptions</p><p>• Low-latency high-bandwidth links between buildings</p><br><p>While heavy fog remains the primary limitation, the technology could provide a powerful alternative to expensive metro fiber deployments, particularly in dense urban environments.</p><br><p>https://newatlas.com/telecommunications/google-taara-25gbps-internet-cities-light/</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>19:31 – Mail Bag</strong></p><br><p>Listener Xavier shares thoughts on the rising cost of compute power and suggests that <strong>bio-AI systems using living neurons</strong> could eventually deliver superior performance-per-watt compared to traditional silicon chips.</p><br><p>The discussion highlights a growing industry focus on <strong>compute efficiency and power consumption</strong> as data center infrastructure scales to support AI workloads.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Android CVE-2026-21385: The IoT Devices IT Forgot to Patch</title>
			<itunes:title>Android CVE-2026-21385: The IoT Devices IT Forgot to Patch</itunes:title>
			<pubDate>Fri, 06 Mar 2026 15:30:00 GMT</pubDate>
			<itunes:duration>10:17</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69aa05fde2ffe1fef6069c8b/media.mp3" length="177985900" type="audio/mpeg"/>
			<guid isPermaLink="false">69aa05fde2ffe1fef6069c8b</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e27</link>
			<acast:episodeId>69aa05fde2ffe1fef6069c8b</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e27</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZGTP9gktdcj2h3vqvmTYmvncx8nv1XVuSIv80LqSQZC97lGgyWjIafo8wMI6AGwcTTV2gcKZoXrsW7bsioeeTJ]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E27</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>27</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1772750273484-62e2dd9c-ed53-43b2-b347-dc8aae3e4ee4.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt dive into a newly exploited Android vulnerability that many IT teams may be overlooking.</p><br><p>The issue centers around <strong>CVE-2026-21385</strong>, a high-severity vulnerability affecting <strong>Qualcomm graphics components used in Android devices</strong>. While the vulnerability requires physical access, it is <strong>actively being exploited in the wild</strong>, making it a serious concern for enterprise IT environments.</p><br><p>But the real story isn’t smartphones.</p><br><p>The bigger risk lies in <strong>Android devices hiding in plain sight across enterprise infrastructure</strong> — including point-of-sale terminals, warehouse scanners, embedded industrial systems, and other IoT devices that often run outdated Android versions and rarely receive timely security updates.</p><br><p>⸻</p><br><p>🔎<strong> CVE-2026-21385 Overview</strong></p><p>•<strong>CVE:</strong> CVE-2026-21385</p><p>•<strong>Severity:</strong> High (CVSS 7.8)</p><p>•<strong>Component:</strong> Qualcomm GPU graphics driver used in Android</p><p>•<strong>Exploit Status:</strong> Actively exploited in the wild</p><p>•<strong>Access Required:</strong> Physical access</p><p>•<strong>Patch:</strong> Included in <strong>March 2026 Android Security Bulletin</strong></p><br><p>Several additional vulnerabilities were also patched in the same release, including <strong>critical Android framework remote code execution flaws</strong>, increasing the urgency for organizations to deploy updates wherever possible.</p><br><p>⸻</p><br><p><strong>⚠ Why Enterprise IT Should Care</strong></p><br><p>Most organizations focus on employee phones when thinking about Android security.</p><br><p>However, the real exposure often comes from <strong>embedded Android devices</strong> that organizations forget about:</p><br><p>Common examples include:</p><p>•Point-of-sale payment terminals</p><p>•Warehouse inventory scanners (Zebra, Honeywell, etc.)</p><p>•Retail handheld devices</p><p>•Industrial control panels</p><p>•Vehicle infotainment systems running Android</p><p>•Embedded tablets in appliances or machinery</p><br><p>Many of these devices:</p><p>•Run older Android versions</p><p>•Receive delayed or nonexistent updates</p><p>•Expose USB or physical ports that could enable exploitation</p><p>•Are connected to internal networks</p><br><p>If compromised, these systems could become the <strong>first step in a lateral network attack</strong>.</p><br><p>⸻</p><br><p>🔐<strong> Key Security Takeaways</strong></p><br><p>Organizations should treat this vulnerability as a <strong>wake-up call for Android-based IoT security</strong>.</p><br><p>Recommended actions:</p><p>•Inventory all Android-based devices in your environment</p><p>•Identify IoT or embedded Android systems</p><p>•Verify whether vendors provide security updates</p><p>•Push vendors for timelines if patches are not available</p><p>•Segregate IoT devices onto isolated networks</p><p>•Lock down physical access and exposed USB ports</p><br><p>Ignoring embedded Android devices can create a <strong>hidden attack path directly into corporate networks</strong>.</p><br><p>⸻</p><br><p>💬<strong> Listener Feedback</strong></p><br><p>Following last week’s episode discussing the <strong>Conduent ransomware breach</strong>, listeners shared their experiences receiving breach notification letters.</p><br><p>One listener reported receiving a notification despite not participating in government assistance programs, while another reported being impacted through health insurance providers like Blue Cross Blue Shield.</p><br><p>The scope of the Conduent breach appears to be <strong>continuing to expand</strong>, reinforcing the importance of monitoring vendor supply-chain exposure.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt dive into a newly exploited Android vulnerability that many IT teams may be overlooking.</p><br><p>The issue centers around <strong>CVE-2026-21385</strong>, a high-severity vulnerability affecting <strong>Qualcomm graphics components used in Android devices</strong>. While the vulnerability requires physical access, it is <strong>actively being exploited in the wild</strong>, making it a serious concern for enterprise IT environments.</p><br><p>But the real story isn’t smartphones.</p><br><p>The bigger risk lies in <strong>Android devices hiding in plain sight across enterprise infrastructure</strong> — including point-of-sale terminals, warehouse scanners, embedded industrial systems, and other IoT devices that often run outdated Android versions and rarely receive timely security updates.</p><br><p>⸻</p><br><p>🔎<strong> CVE-2026-21385 Overview</strong></p><p>•<strong>CVE:</strong> CVE-2026-21385</p><p>•<strong>Severity:</strong> High (CVSS 7.8)</p><p>•<strong>Component:</strong> Qualcomm GPU graphics driver used in Android</p><p>•<strong>Exploit Status:</strong> Actively exploited in the wild</p><p>•<strong>Access Required:</strong> Physical access</p><p>•<strong>Patch:</strong> Included in <strong>March 2026 Android Security Bulletin</strong></p><br><p>Several additional vulnerabilities were also patched in the same release, including <strong>critical Android framework remote code execution flaws</strong>, increasing the urgency for organizations to deploy updates wherever possible.</p><br><p>⸻</p><br><p><strong>⚠ Why Enterprise IT Should Care</strong></p><br><p>Most organizations focus on employee phones when thinking about Android security.</p><br><p>However, the real exposure often comes from <strong>embedded Android devices</strong> that organizations forget about:</p><br><p>Common examples include:</p><p>•Point-of-sale payment terminals</p><p>•Warehouse inventory scanners (Zebra, Honeywell, etc.)</p><p>•Retail handheld devices</p><p>•Industrial control panels</p><p>•Vehicle infotainment systems running Android</p><p>•Embedded tablets in appliances or machinery</p><br><p>Many of these devices:</p><p>•Run older Android versions</p><p>•Receive delayed or nonexistent updates</p><p>•Expose USB or physical ports that could enable exploitation</p><p>•Are connected to internal networks</p><br><p>If compromised, these systems could become the <strong>first step in a lateral network attack</strong>.</p><br><p>⸻</p><br><p>🔐<strong> Key Security Takeaways</strong></p><br><p>Organizations should treat this vulnerability as a <strong>wake-up call for Android-based IoT security</strong>.</p><br><p>Recommended actions:</p><p>•Inventory all Android-based devices in your environment</p><p>•Identify IoT or embedded Android systems</p><p>•Verify whether vendors provide security updates</p><p>•Push vendors for timelines if patches are not available</p><p>•Segregate IoT devices onto isolated networks</p><p>•Lock down physical access and exposed USB ports</p><br><p>Ignoring embedded Android devices can create a <strong>hidden attack path directly into corporate networks</strong>.</p><br><p>⸻</p><br><p>💬<strong> Listener Feedback</strong></p><br><p>Following last week’s episode discussing the <strong>Conduent ransomware breach</strong>, listeners shared their experiences receiving breach notification letters.</p><br><p>One listener reported receiving a notification despite not participating in government assistance programs, while another reported being impacted through health insurance providers like Blue Cross Blue Shield.</p><br><p>The scope of the Conduent breach appears to be <strong>continuing to expand</strong>, reinforcing the importance of monitoring vendor supply-chain exposure.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Anthropic Drops Safety Pledge, Open Source Security Crisis & OpenAI’s Compute Crunch]]></title>
			<itunes:title><![CDATA[Anthropic Drops Safety Pledge, Open Source Security Crisis & OpenAI’s Compute Crunch]]></itunes:title>
			<pubDate>Mon, 02 Mar 2026 15:30:00 GMT</pubDate>
			<itunes:duration>21:19</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69a1c743aa1e5696bd2dffd8/media.mp3" length="368640364" type="audio/mpeg"/>
			<guid isPermaLink="false">69a1c743aa1e5696bd2dffd8</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e27</link>
			<acast:episodeId>69a1c743aa1e5696bd2dffd8</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e27</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bO98VM7PdyZlNZAn1Cfz4Lr22NArQFPtIcLbSf23f7/6KtGZbvgCM+KJLiQgXuKJ/isud91xXFSq8x4pg6awLg]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E27</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>27</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1772209836194-0cbc64df-162a-4f3d-af72-b63b5fc63d6f.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – News Bytes</strong>, John Barger and Lou Schmidt break down three major stories shaping the future of AI, enterprise infrastructure, and software security.</p><br><p>Anthropic revises its flagship AI safety pledge amid competitive pressure, open source registries warn they lack funding for basic security protections, and OpenAI scrambles for compute power as large-scale infrastructure plans stall.</p><br><p>From AI governance and supply chain risk to infrastructure bottlenecks and power constraints, this episode explores what enterprise IT leaders need to be watching right now.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>Anthropic revises its safety framework, open source ecosystems struggle to fund security, and OpenAI races to secure compute capacity as infrastructure constraints tighten across the AI industry.</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p>⸻</p><br><p><strong>00:44 – Anthropic Drops Flagship Safety Pledge</strong></p><br><p>Anthropic has revised its 2023 Responsible Scaling Policy, removing its categorical commitment to halt training if safety guarantees could not be ensured in advance. The company says the shift reflects rapid AI advancement, competitive pressures, and the need for transparency over unilateral restrictions.</p><br><p>John and Lou unpack what this means for enterprise deployments: Is this a rollback of safety? Or a move toward operational flexibility and published risk roadmaps? The bigger issue may be how AI vendors balance guardrails, customer control, and competitive pressure.</p><p><a href="https://time.com/7380854/exclusive-anthropic-drops-flagship-safety-pledge/" rel="noopener noreferrer" target="_blank">https://time.com/7380854/exclusive-anthropic-drops-flagship-safety-pledge/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>08:16 – Open Source Registries Can’t Afford Basic Security</strong></p><br><p>Major open source ecosystems such as PyPI, npm, RubyGems, and others are reportedly facing funding shortfalls that threaten their ability to implement fundamental security protections.</p><br><p>With supply chain attacks on the rise and AI accelerating code generation, underfunded registries present a growing enterprise risk. The hosts discuss why “free” does not mean costless — and why corporate IT teams must contribute financially or through engineering resources to sustain the security of the tools they depend on.</p><p><a href="https://www.theregister.com/2026/02/16/open_source_registries_fund_security/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2026/02/16/open_source_registries_fund_security/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>12:36 – Inside OpenAI’s Scramble to Secure Compute After Stargate Stalled</strong></p><br><p>OpenAI’s large-scale infrastructure plans have reportedly slowed, forcing the company to seek alternative compute sources to sustain AI growth.</p><br><p>The episode explores the real bottlenecks: wafer starts, power generation, turbines, construction capacity, data center labor, and capital coordination. With AI revenue tightly correlated to compute availability, infrastructure constraints may be the biggest story in AI for 2026 and beyond.</p><p><a href="https://www.theinformation.com/articles/inside-openais-scramble-get-computing-power-stargate-stalled" rel="noopener noreferrer" target="_blank">https://www.theinformation.com/articles/inside-openais-scramble-get-computing-power-stargate-stalled</a>&nbsp;</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>19:15 – Mail Bag</strong></p><br><p>Listener Xavier highlights how surface-level headlines often hide deeper enterprise implications — a reminder that IT leaders must look beneath the story to understand downstream risk and opportunity.</p><br><p><strong>20:36 – Wrap Up</strong></p><br><p>From AI safety governance and competitive pressure to supply chain funding gaps and compute shortages, Episode 27 reinforces one theme: infrastructure, transparency, and long-term planning now define enterprise AI strategy.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/&nbsp;on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – News Bytes</strong>, John Barger and Lou Schmidt break down three major stories shaping the future of AI, enterprise infrastructure, and software security.</p><br><p>Anthropic revises its flagship AI safety pledge amid competitive pressure, open source registries warn they lack funding for basic security protections, and OpenAI scrambles for compute power as large-scale infrastructure plans stall.</p><br><p>From AI governance and supply chain risk to infrastructure bottlenecks and power constraints, this episode explores what enterprise IT leaders need to be watching right now.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>Anthropic revises its safety framework, open source ecosystems struggle to fund security, and OpenAI races to secure compute capacity as infrastructure constraints tighten across the AI industry.</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p>⸻</p><br><p><strong>00:44 – Anthropic Drops Flagship Safety Pledge</strong></p><br><p>Anthropic has revised its 2023 Responsible Scaling Policy, removing its categorical commitment to halt training if safety guarantees could not be ensured in advance. The company says the shift reflects rapid AI advancement, competitive pressures, and the need for transparency over unilateral restrictions.</p><br><p>John and Lou unpack what this means for enterprise deployments: Is this a rollback of safety? Or a move toward operational flexibility and published risk roadmaps? The bigger issue may be how AI vendors balance guardrails, customer control, and competitive pressure.</p><p><a href="https://time.com/7380854/exclusive-anthropic-drops-flagship-safety-pledge/" rel="noopener noreferrer" target="_blank">https://time.com/7380854/exclusive-anthropic-drops-flagship-safety-pledge/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>08:16 – Open Source Registries Can’t Afford Basic Security</strong></p><br><p>Major open source ecosystems such as PyPI, npm, RubyGems, and others are reportedly facing funding shortfalls that threaten their ability to implement fundamental security protections.</p><br><p>With supply chain attacks on the rise and AI accelerating code generation, underfunded registries present a growing enterprise risk. The hosts discuss why “free” does not mean costless — and why corporate IT teams must contribute financially or through engineering resources to sustain the security of the tools they depend on.</p><p><a href="https://www.theregister.com/2026/02/16/open_source_registries_fund_security/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2026/02/16/open_source_registries_fund_security/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>12:36 – Inside OpenAI’s Scramble to Secure Compute After Stargate Stalled</strong></p><br><p>OpenAI’s large-scale infrastructure plans have reportedly slowed, forcing the company to seek alternative compute sources to sustain AI growth.</p><br><p>The episode explores the real bottlenecks: wafer starts, power generation, turbines, construction capacity, data center labor, and capital coordination. With AI revenue tightly correlated to compute availability, infrastructure constraints may be the biggest story in AI for 2026 and beyond.</p><p><a href="https://www.theinformation.com/articles/inside-openais-scramble-get-computing-power-stargate-stalled" rel="noopener noreferrer" target="_blank">https://www.theinformation.com/articles/inside-openais-scramble-get-computing-power-stargate-stalled</a>&nbsp;</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>19:15 – Mail Bag</strong></p><br><p>Listener Xavier highlights how surface-level headlines often hide deeper enterprise implications — a reminder that IT leaders must look beneath the story to understand downstream risk and opportunity.</p><br><p><strong>20:36 – Wrap Up</strong></p><br><p>From AI safety governance and competitive pressure to supply chain funding gaps and compute shortages, Episode 27 reinforces one theme: infrastructure, transparency, and long-term planning now define enterprise AI strategy.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/&nbsp;on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Conduent Ransomware Breach Hits 25 Million – HR & Benefits Data Exposed]]></title>
			<itunes:title><![CDATA[Conduent Ransomware Breach Hits 25 Million – HR & Benefits Data Exposed]]></itunes:title>
			<pubDate>Fri, 27 Feb 2026 15:30:00 GMT</pubDate>
			<itunes:duration>10:02</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69a0b6b9519334f049a2b802/media.mp3" length="173385304" type="audio/mpeg"/>
			<guid isPermaLink="false">69a0b6b9519334f049a2b802</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e26</link>
			<acast:episodeId>69a0b6b9519334f049a2b802</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e26</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7afRTIcRbcGZzAxKwGdOr0aYLUs1XnYNuF7Fzq9Q34OhfaPmTX11yh0DGXCF1GRWggtlRkgV7k1314LECo5mA4q]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E26</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>26</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1772140200442-a0513d04-13e1-4cdf-be8c-4f272e55da1b.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down a massive ransomware-driven data breach impacting <strong>Conduent</strong>, a major business process services provider that handles public sector programs, healthcare benefits processing, and corporate HR services.</p><br><p>What began as reports of a 10.5 million record breach has now escalated to an estimated <strong>25 million impacted individuals</strong>, with the ransomware group <strong>SafePay</strong> claiming responsibility and alleging over <strong>8 terabytes of data exfiltrated</strong>.</p><br><p>⸻</p><br><p>🔎<strong> What Happened?</strong></p><br><p>Conduent, which provides backend processing for government assistance programs and health benefits, confirmed that sensitive personal and corporate information may have been exposed.</p><br><p>Reported exposed data includes:</p><p>•Names</p><p>•Dates of birth</p><p>•Addresses</p><p>•Social Security numbers</p><p>•Employment records</p><p>•Financial information</p><p>•Medical and health insurance details</p><p>•Internal business documents</p><br><p>SafePay ransomware actors reportedly gained access through compromised credentials and then moved laterally through Conduent’s systems.</p><br><p>This is a textbook example of a <strong>chained cyberattack</strong>, where one small compromise enables full-scale enterprise exposure.</p><br><p>⸻</p><br><p>🌎<strong> Scope of the Impact</strong></p><br><p>The breach affects multiple U.S. states and programs, including:</p><p>•Texas (~15.4 million impacted)</p><p>•Oregon (~10.5 million impacted)</p><p>•Delaware</p><p>•Massachusetts</p><p>•New Hampshire</p><p>•Georgia</p><p>•South Carolina</p><p>•New Jersey</p><p>•Maine</p><p>•New Mexico</p><br><p>Programs potentially affected:</p><p>•Medicaid</p><p>•SNAP / EBT food assistance</p><p>•Unemployment benefits</p><p>•Health insurance processing (including Blue Cross Blue Shield and Humana)</p><p>•Corporate employee benefit programs</p><br><p>Additionally, approximately <strong>17,000 Volvo Group North America employees</strong> may have been impacted.</p><br><p>⸻</p><br><p><strong>⚠ Why This Matters for Enterprise IT</strong></p><br><p>This is not “just” a public-sector breach.</p><br><p>Many private companies rely on Conduent for backend benefits processing. If your organization uses:</p><p>•Blue Cross Blue Shield</p><p>•Humana</p><p>•Third-party HR / benefits processors</p><br><p>You must immediately:</p><p>•Contact your HR and benefits teams</p><p>•Request incident briefings from vendors</p><p>•Determine if employee data was exposed</p><p>•Prepare remediation and communication plans</p><br><p>⸻</p><br><p>🔐<strong> Security Lessons</strong></p><p>•Credential compromise remains a primary entry point</p><p>•Lateral movement amplifies initial footholds</p><p>•Ransomware groups continue combining encryption with large-scale data exfiltration</p><p>•Transparency and timely disclosure are critical</p><br><p>Conduent acknowledged the breach, engaged forensic investigators, and notified impacted parties — a necessary and responsible response.</p><br><p>⸻</p><br><p>💬<strong> Listener Feedback</strong></p><br><p>The episode also includes feedback from Kevin regarding last week’s Apple iOS 26 patch discussion. While some users hesitate to upgrade due to UI and stability concerns, security patches addressing critical vulnerabilities must take priority.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down a massive ransomware-driven data breach impacting <strong>Conduent</strong>, a major business process services provider that handles public sector programs, healthcare benefits processing, and corporate HR services.</p><br><p>What began as reports of a 10.5 million record breach has now escalated to an estimated <strong>25 million impacted individuals</strong>, with the ransomware group <strong>SafePay</strong> claiming responsibility and alleging over <strong>8 terabytes of data exfiltrated</strong>.</p><br><p>⸻</p><br><p>🔎<strong> What Happened?</strong></p><br><p>Conduent, which provides backend processing for government assistance programs and health benefits, confirmed that sensitive personal and corporate information may have been exposed.</p><br><p>Reported exposed data includes:</p><p>•Names</p><p>•Dates of birth</p><p>•Addresses</p><p>•Social Security numbers</p><p>•Employment records</p><p>•Financial information</p><p>•Medical and health insurance details</p><p>•Internal business documents</p><br><p>SafePay ransomware actors reportedly gained access through compromised credentials and then moved laterally through Conduent’s systems.</p><br><p>This is a textbook example of a <strong>chained cyberattack</strong>, where one small compromise enables full-scale enterprise exposure.</p><br><p>⸻</p><br><p>🌎<strong> Scope of the Impact</strong></p><br><p>The breach affects multiple U.S. states and programs, including:</p><p>•Texas (~15.4 million impacted)</p><p>•Oregon (~10.5 million impacted)</p><p>•Delaware</p><p>•Massachusetts</p><p>•New Hampshire</p><p>•Georgia</p><p>•South Carolina</p><p>•New Jersey</p><p>•Maine</p><p>•New Mexico</p><br><p>Programs potentially affected:</p><p>•Medicaid</p><p>•SNAP / EBT food assistance</p><p>•Unemployment benefits</p><p>•Health insurance processing (including Blue Cross Blue Shield and Humana)</p><p>•Corporate employee benefit programs</p><br><p>Additionally, approximately <strong>17,000 Volvo Group North America employees</strong> may have been impacted.</p><br><p>⸻</p><br><p><strong>⚠ Why This Matters for Enterprise IT</strong></p><br><p>This is not “just” a public-sector breach.</p><br><p>Many private companies rely on Conduent for backend benefits processing. If your organization uses:</p><p>•Blue Cross Blue Shield</p><p>•Humana</p><p>•Third-party HR / benefits processors</p><br><p>You must immediately:</p><p>•Contact your HR and benefits teams</p><p>•Request incident briefings from vendors</p><p>•Determine if employee data was exposed</p><p>•Prepare remediation and communication plans</p><br><p>⸻</p><br><p>🔐<strong> Security Lessons</strong></p><p>•Credential compromise remains a primary entry point</p><p>•Lateral movement amplifies initial footholds</p><p>•Ransomware groups continue combining encryption with large-scale data exfiltration</p><p>•Transparency and timely disclosure are critical</p><br><p>Conduent acknowledged the breach, engaged forensic investigators, and notified impacted parties — a necessary and responsible response.</p><br><p>⸻</p><br><p>💬<strong> Listener Feedback</strong></p><br><p>The episode also includes feedback from Kevin regarding last week’s Apple iOS 26 patch discussion. While some users hesitate to upgrade due to UI and stability concerns, security patches addressing critical vulnerabilities must take priority.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Anthropic vs. The Pentagon, HDD Sellout 2026, and Copilot’s Confidential Email Bug</title>
			<itunes:title>Anthropic vs. The Pentagon, HDD Sellout 2026, and Copilot’s Confidential Email Bug</itunes:title>
			<pubDate>Mon, 23 Feb 2026 16:30:00 GMT</pubDate>
			<itunes:duration>18:44</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/699b288668ec8626d2c5a282/media.mp3" length="323931700" type="audio/mpeg"/>
			<guid isPermaLink="false">699b288668ec8626d2c5a282</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e26</link>
			<acast:episodeId>699b288668ec8626d2c5a282</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e26</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bPaCwWARDJecemHs0b6x16/f45IgqQmzmcyrs/YXKj/EnelMTSwW65gKf+K5/Fn8rjriY4KUx/GyRYLMdWb0Wp]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E26</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>26</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1771775871187-5d4ff6c8-59f0-4ed8-8519-c983837f86c4.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – News Bytes</strong>, John Barger &amp; Lou Schmidt unpack three stories that expose the real friction points in enterprise IT: AI ethics in defense contracts, looming hardware shortages, and data governance risks in Microsoft Copilot.</p><br><p>Anthropic and the Pentagon clash over Claude’s military use, Western Digital reports zero remaining HDD capacity for 2026, and Microsoft confirms a Copilot bug that summarized confidential emails. From supply chain strategy to SaaS risk management, this episode highlights why enterprise IT leaders must think beyond features and focus on contracts, capacity, and control.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>Hard drive shortages, AI contract battles, and Copilot privacy concerns headline a week that reinforces one theme: control over infrastructure and software matters more than ever.</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:46 – Anthropic and the Pentagon Are Reportedly Arguing Over Claude Usage</strong></p><br><p>Anthropic pushes back against unrestricted military use of Claude AI, raising ethical, contractual, and operational questions. The Pentagon may reconsider its $200M relationship, exposing a major risk for organizations deploying AI: what happens when vendor policies change after integration?</p><p><a href="https://techcrunch.com/2026/02/15/anthropic-and-the-pentagon-are-reportedly-arguing-over-claude-usage/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/02/15/anthropic-and-the-pentagon-are-reportedly-arguing-over-claude-usage/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>07:19 – Western Digital Has No More HDD Capacity Left for 2026</strong></p><br><p>Western Digital reports its entire 2026 hard drive production is already spoken for. Similar signals from Seagate suggest storage pricing pressure is imminent. The hosts explain why this isn’t just about spinning disks—it’s about AI data center demand driving up costs across RAM, SSDs, GPUs, and enterprise hardware.</p><p><a href="https://wccftech.com/western-digital-has-no-more-hdd-capacity-left-out/" rel="noopener noreferrer" target="_blank">https://wccftech.com/western-digital-has-no-more-hdd-capacity-left-out/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>12:06 – Microsoft Says Bug Causes Copilot to Summarize Confidential Emails</strong></p><br><p>Microsoft confirms a Copilot bug that processed confidential emails stored in drafts and sent folders, despite policy settings meant to block them. Although no data reportedly left the organization, the incident underscores governance, SaaS dependency, and AI access-control risks enterprises must plan for.</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-says-bug-causes-copilot-to-summarize-confidential-emails/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-says-bug-causes-copilot-to-summarize-confidential-emails/</a>&nbsp;</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>16:42 – Mail Bag</strong></p><br><p>Listener Dennis drops a Back to the Future “jigawatt” reference, and Xavier reinforces the importance of AI security hygiene and fine-grained permission management.</p><br><p><strong>17:52 – Wrap Up</strong></p><br><p>Final thoughts on vendor lock-in, AI policy control, supply chain modeling, and why IT leaders need stronger collaboration with finance and legal teams.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – News Bytes</strong>, John Barger &amp; Lou Schmidt unpack three stories that expose the real friction points in enterprise IT: AI ethics in defense contracts, looming hardware shortages, and data governance risks in Microsoft Copilot.</p><br><p>Anthropic and the Pentagon clash over Claude’s military use, Western Digital reports zero remaining HDD capacity for 2026, and Microsoft confirms a Copilot bug that summarized confidential emails. From supply chain strategy to SaaS risk management, this episode highlights why enterprise IT leaders must think beyond features and focus on contracts, capacity, and control.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>Hard drive shortages, AI contract battles, and Copilot privacy concerns headline a week that reinforces one theme: control over infrastructure and software matters more than ever.</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:46 – Anthropic and the Pentagon Are Reportedly Arguing Over Claude Usage</strong></p><br><p>Anthropic pushes back against unrestricted military use of Claude AI, raising ethical, contractual, and operational questions. The Pentagon may reconsider its $200M relationship, exposing a major risk for organizations deploying AI: what happens when vendor policies change after integration?</p><p><a href="https://techcrunch.com/2026/02/15/anthropic-and-the-pentagon-are-reportedly-arguing-over-claude-usage/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/02/15/anthropic-and-the-pentagon-are-reportedly-arguing-over-claude-usage/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>07:19 – Western Digital Has No More HDD Capacity Left for 2026</strong></p><br><p>Western Digital reports its entire 2026 hard drive production is already spoken for. Similar signals from Seagate suggest storage pricing pressure is imminent. The hosts explain why this isn’t just about spinning disks—it’s about AI data center demand driving up costs across RAM, SSDs, GPUs, and enterprise hardware.</p><p><a href="https://wccftech.com/western-digital-has-no-more-hdd-capacity-left-out/" rel="noopener noreferrer" target="_blank">https://wccftech.com/western-digital-has-no-more-hdd-capacity-left-out/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>12:06 – Microsoft Says Bug Causes Copilot to Summarize Confidential Emails</strong></p><br><p>Microsoft confirms a Copilot bug that processed confidential emails stored in drafts and sent folders, despite policy settings meant to block them. Although no data reportedly left the organization, the incident underscores governance, SaaS dependency, and AI access-control risks enterprises must plan for.</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-says-bug-causes-copilot-to-summarize-confidential-emails/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-says-bug-causes-copilot-to-summarize-confidential-emails/</a>&nbsp;</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>16:42 – Mail Bag</strong></p><br><p>Listener Dennis drops a Back to the Future “jigawatt” reference, and Xavier reinforces the importance of AI security hygiene and fine-grained permission management.</p><br><p><strong>17:52 – Wrap Up</strong></p><br><p>Final thoughts on vendor lock-in, AI policy control, supply chain modeling, and why IT leaders need stronger collaboration with finance and legal teams.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Apple iOS/iPadOS/MacOS CVE-2026-20700 Zero-Day: Sandbox Escape & RCE Explained]]></title>
			<itunes:title><![CDATA[Apple iOS/iPadOS/MacOS CVE-2026-20700 Zero-Day: Sandbox Escape & RCE Explained]]></itunes:title>
			<pubDate>Fri, 20 Feb 2026 15:30:00 GMT</pubDate>
			<itunes:duration>9:27</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/699874a3f863de959a5cc220/media.mp3" length="163391320" type="audio/mpeg"/>
			<guid isPermaLink="false">699874a3f863de959a5cc220</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e25</link>
			<acast:episodeId>699874a3f863de959a5cc220</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e25</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Zzc0kgUx33isW/GJoI8h2eXlpbCy/inMteSaJfhjmS9FWeEaYCLQv0TNoXd7GNEsc0/JO/uR8jnGi05k+79kyn]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E25</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>25</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1771598937827-0400e2c9-e298-46fc-9b6e-aaac27d4ffed.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt examine a critical Apple security vulnerability patched in <strong>iOS, iPadOS, macOS, watchOS, tvOS, and visionOS 26.3</strong>.</p><br><p>The focus: <strong>CVE-2026-20700</strong>, a memory corruption flaw in Apple’s dynamic link layer that could allow attackers to break out of the sandbox and achieve <strong>remote code execution (RCE)</strong>.</p><br><p>Although exploitation requires physical access, the definition of “physical” in today’s hybrid enterprise world is broader than it sounds. Remote management tools, compromised accounts, lost devices, or improperly secured BYOD endpoints can all create real-world exposure.</p><br><p>With Apple’s unified “26” operating system line now spanning every platform, this patch affects:</p><p>•iOS 26.3</p><p>•iPadOS 26.3</p><p>•macOS 26.3</p><p>•watchOS 26.3</p><p>•tvOS 26.3</p><p>•visionOS 26.3</p><br><p>Security researchers are classifying this vulnerability as <strong>critical/high severity</strong>, and enterprises are urged to patch immediately.</p><br><p>⸻</p><br><p>🔎<strong> CVE-2026-20700 Details</strong></p><p>•Type: Memory corruption</p><p>•Impact: Sandbox escape → Remote Code Execution</p><p>•Exploit Path: Physical or logical device access</p><p>•Risk Level: High/Critical (no official CVSS published)</p><p>•Fix: Upgrade to Apple OS version 26.3</p><br><p>⸻</p><br><p><strong>⚠ Why This Matters for Enterprise IT</strong></p><br><p>1️⃣<strong> BYOD Risk Surface</strong></p><br><p>Bring-Your-Own-Device policies mean iPhones, iPads, and Macs often connect to corporate networks without full administrative control. A vulnerable device on your network increases lateral movement risk.</p><br><p>2️⃣<strong> Physical Access Isn’t Just “Someone in the Room”</strong></p><br><p>Remote tools, compromised Apple IDs, or stolen devices expand the meaning of physical access.</p><br><p>3️⃣<strong> Upgrade Hesitation Is Real</strong></p><br><p>Apple’s 26 release introduced major UI changes (including the controversial glass interface). Stability concerns have led some users to delay upgrades — increasing exposure time.</p><br><p>Security must outweigh aesthetic or usability concerns.</p><br><p>⸻</p><br><p>🛠<strong> Enterprise Recommendations</strong></p><p>•Immediately communicate required upgrade to 26.3</p><p>•Enforce OS minimum versions where possible</p><p>•Review BYOD policies and mobile device controls</p><p>•Audit Apple device access on corporate networks</p><p>•Educate users about lost/stolen device risk</p><br><p>⸻</p><br><p>💬<strong> Listener Feedback</strong></p><br><p>The episode also includes commentary from Chris, a general counsel and chief risk officer, who responded to last week’s Notepad RCE discussion. He raises an important point about expanding application functionality increasing attack surface — a lesson that applies here as well.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt examine a critical Apple security vulnerability patched in <strong>iOS, iPadOS, macOS, watchOS, tvOS, and visionOS 26.3</strong>.</p><br><p>The focus: <strong>CVE-2026-20700</strong>, a memory corruption flaw in Apple’s dynamic link layer that could allow attackers to break out of the sandbox and achieve <strong>remote code execution (RCE)</strong>.</p><br><p>Although exploitation requires physical access, the definition of “physical” in today’s hybrid enterprise world is broader than it sounds. Remote management tools, compromised accounts, lost devices, or improperly secured BYOD endpoints can all create real-world exposure.</p><br><p>With Apple’s unified “26” operating system line now spanning every platform, this patch affects:</p><p>•iOS 26.3</p><p>•iPadOS 26.3</p><p>•macOS 26.3</p><p>•watchOS 26.3</p><p>•tvOS 26.3</p><p>•visionOS 26.3</p><br><p>Security researchers are classifying this vulnerability as <strong>critical/high severity</strong>, and enterprises are urged to patch immediately.</p><br><p>⸻</p><br><p>🔎<strong> CVE-2026-20700 Details</strong></p><p>•Type: Memory corruption</p><p>•Impact: Sandbox escape → Remote Code Execution</p><p>•Exploit Path: Physical or logical device access</p><p>•Risk Level: High/Critical (no official CVSS published)</p><p>•Fix: Upgrade to Apple OS version 26.3</p><br><p>⸻</p><br><p><strong>⚠ Why This Matters for Enterprise IT</strong></p><br><p>1️⃣<strong> BYOD Risk Surface</strong></p><br><p>Bring-Your-Own-Device policies mean iPhones, iPads, and Macs often connect to corporate networks without full administrative control. A vulnerable device on your network increases lateral movement risk.</p><br><p>2️⃣<strong> Physical Access Isn’t Just “Someone in the Room”</strong></p><br><p>Remote tools, compromised Apple IDs, or stolen devices expand the meaning of physical access.</p><br><p>3️⃣<strong> Upgrade Hesitation Is Real</strong></p><br><p>Apple’s 26 release introduced major UI changes (including the controversial glass interface). Stability concerns have led some users to delay upgrades — increasing exposure time.</p><br><p>Security must outweigh aesthetic or usability concerns.</p><br><p>⸻</p><br><p>🛠<strong> Enterprise Recommendations</strong></p><p>•Immediately communicate required upgrade to 26.3</p><p>•Enforce OS minimum versions where possible</p><p>•Review BYOD policies and mobile device controls</p><p>•Audit Apple device access on corporate networks</p><p>•Educate users about lost/stolen device risk</p><br><p>⸻</p><br><p>💬<strong> Listener Feedback</strong></p><br><p>The episode also includes commentary from Chris, a general counsel and chief risk officer, who responded to last week’s Notepad RCE discussion. He raises an important point about expanding application functionality increasing attack surface — a lesson that applies here as well.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>UniFi 10.1, AI Data Centers Go Nuclear, and SpaceX Eyes Orbital Compute</title>
			<itunes:title>UniFi 10.1, AI Data Centers Go Nuclear, and SpaceX Eyes Orbital Compute</itunes:title>
			<pubDate>Mon, 16 Feb 2026 15:30:00 GMT</pubDate>
			<itunes:duration>22:42</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/699226db7301331f1f139c86/media.mp3" length="392388088" type="audio/mpeg"/>
			<guid isPermaLink="false">699226db7301331f1f139c86</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e25</link>
			<acast:episodeId>699226db7301331f1f139c86</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e25</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7arE4nFugYhbJvKfYMfIPruQFWYG9KVVlE8CRtXqM1mTjpg0VWHvJpsqis/bICqLRvXS5fy/qhiZMhFR5g9acXB]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E25</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>25</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1771185823661-50d6f9ab-857b-44cf-9ba9-1bec84cdb3ad.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – News Bytes</strong>, John Barger &amp; Lou Schmidt break down a week where enterprise IT collided with energy policy, nuclear power, and outer space. UniFi Network 10.1 pushes further into enterprise territory with improved scalability and Wi-Fi visibility. Meanwhile, the White House explores voluntary agreements to manage rising energy costs from AI data centers.</p><br><p>Then things escalate: hyperscalers begin signing real contracts for next-generation nuclear power, and Elon Musk gets serious about orbital data centers—suggesting that the future of compute may extend beyond the planet. If you’re tracking AI infrastructure, network evolution, and the power constraints shaping the industry, this episode connects the dots.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>John and Lou preview a week dominated by UniFi upgrades, federal energy discussions, nuclear power tipping points, and serious momentum toward data centers in space.</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:44 – UniFi Network 10.1</strong></p><br><p>Ubiquiti releases UniFi Network 10.1 with major stability and scalability improvements, Wi-Fi Doctor diagnostics, UI refinements, enhanced policy visibility, and optimizations for Wi-Fi 7 and multi-gig deployments. The hosts discuss why UniFi continues its march toward true enterprise credibility while remaining accessible for SMB and prosumer environments.</p><p><a href="https://blog.ui.com/article/introducing-unifi-network-10-1" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/introducing-unifi-network-10-1</a>&nbsp;</p><br><p>⸻</p><br><p><strong>05:13 – White House Eyes Data Center Agreements Amid Energy Price Spikes</strong></p><br><p>As AI data center expansion drives regional energy price pressure, the White House explores voluntary agreements with major tech companies to shift infrastructure costs away from consumers. The conversation explores the economics of AI growth, the inevitability of nuclear power, and whether energy becomes the defining constraint of the AI race.</p><p><a href="https://www.politico.com/news/2026/02/09/trump-administration-eyes-data-center-agreements-amid-energy-price-spikes-00772024" rel="noopener noreferrer" target="_blank">https://www.politico.com/news/2026/02/09/trump-administration-eyes-data-center-agreements-amid-energy-price-spikes-00772024</a>&nbsp;</p><br><p>⸻</p><br><p><strong>09:02 – Next-Gen Nuclear’s Tipping Point: Meta and Hyperscalers Sign Deals</strong></p><br><p>Meta and other hyperscalers begin signing legally binding agreements with next-generation nuclear companies like TerraPower and Oklo. John and Lou explain why signed contracts—not press releases—mark the true tipping point for small modular reactors powering AI infrastructure.</p><p><a href="https://www.aol.com/articles/next-gen-nuclear-tipping-point-214209248.html" rel="noopener noreferrer" target="_blank">https://www.aol.com/articles/next-gen-nuclear-tipping-point-214209248.html</a>&nbsp;</p><br><p>⸻</p><br><p><strong>11:34 – Elon Musk Gets Serious About Orbital Data Centers</strong></p><br><p>Following strategic moves linking xAI and SpaceX, Musk pivots attention toward orbital and lunar infrastructure. The hosts unpack the logic behind space-based data centers, cooling challenges, Starlink integration, and why the economics may be less crazy than they first appear.</p><p><a href="https://techcrunch.com/2026/02/05/elon-musk-is-getting-serious-about-orbital-data-centers/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/02/05/elon-musk-is-getting-serious-about-orbital-data-centers/</a>&nbsp;</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>18:59 – Mail Bag</strong></p><br><p>Listener Jonah questions whether massive AI infrastructure financing signals a bubble. John and Lou explain why AI demand is currently compute-constrained—not hype-driven—and why any financial correction would look very different from the dot-com era.</p><br><p><strong>21:52 – Wrap Up</strong></p><br><p>Final thoughts on nuclear inevitability, orbital infrastructure, and the reality that energy—not chips—may define the next decade of enterprise IT.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – News Bytes</strong>, John Barger &amp; Lou Schmidt break down a week where enterprise IT collided with energy policy, nuclear power, and outer space. UniFi Network 10.1 pushes further into enterprise territory with improved scalability and Wi-Fi visibility. Meanwhile, the White House explores voluntary agreements to manage rising energy costs from AI data centers.</p><br><p>Then things escalate: hyperscalers begin signing real contracts for next-generation nuclear power, and Elon Musk gets serious about orbital data centers—suggesting that the future of compute may extend beyond the planet. If you’re tracking AI infrastructure, network evolution, and the power constraints shaping the industry, this episode connects the dots.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>John and Lou preview a week dominated by UniFi upgrades, federal energy discussions, nuclear power tipping points, and serious momentum toward data centers in space.</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:44 – UniFi Network 10.1</strong></p><br><p>Ubiquiti releases UniFi Network 10.1 with major stability and scalability improvements, Wi-Fi Doctor diagnostics, UI refinements, enhanced policy visibility, and optimizations for Wi-Fi 7 and multi-gig deployments. The hosts discuss why UniFi continues its march toward true enterprise credibility while remaining accessible for SMB and prosumer environments.</p><p><a href="https://blog.ui.com/article/introducing-unifi-network-10-1" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/introducing-unifi-network-10-1</a>&nbsp;</p><br><p>⸻</p><br><p><strong>05:13 – White House Eyes Data Center Agreements Amid Energy Price Spikes</strong></p><br><p>As AI data center expansion drives regional energy price pressure, the White House explores voluntary agreements with major tech companies to shift infrastructure costs away from consumers. The conversation explores the economics of AI growth, the inevitability of nuclear power, and whether energy becomes the defining constraint of the AI race.</p><p><a href="https://www.politico.com/news/2026/02/09/trump-administration-eyes-data-center-agreements-amid-energy-price-spikes-00772024" rel="noopener noreferrer" target="_blank">https://www.politico.com/news/2026/02/09/trump-administration-eyes-data-center-agreements-amid-energy-price-spikes-00772024</a>&nbsp;</p><br><p>⸻</p><br><p><strong>09:02 – Next-Gen Nuclear’s Tipping Point: Meta and Hyperscalers Sign Deals</strong></p><br><p>Meta and other hyperscalers begin signing legally binding agreements with next-generation nuclear companies like TerraPower and Oklo. John and Lou explain why signed contracts—not press releases—mark the true tipping point for small modular reactors powering AI infrastructure.</p><p><a href="https://www.aol.com/articles/next-gen-nuclear-tipping-point-214209248.html" rel="noopener noreferrer" target="_blank">https://www.aol.com/articles/next-gen-nuclear-tipping-point-214209248.html</a>&nbsp;</p><br><p>⸻</p><br><p><strong>11:34 – Elon Musk Gets Serious About Orbital Data Centers</strong></p><br><p>Following strategic moves linking xAI and SpaceX, Musk pivots attention toward orbital and lunar infrastructure. The hosts unpack the logic behind space-based data centers, cooling challenges, Starlink integration, and why the economics may be less crazy than they first appear.</p><p><a href="https://techcrunch.com/2026/02/05/elon-musk-is-getting-serious-about-orbital-data-centers/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/02/05/elon-musk-is-getting-serious-about-orbital-data-centers/</a>&nbsp;</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>18:59 – Mail Bag</strong></p><br><p>Listener Jonah questions whether massive AI infrastructure financing signals a bubble. John and Lou explain why AI demand is currently compute-constrained—not hype-driven—and why any financial correction would look very different from the dot-com era.</p><br><p><strong>21:52 – Wrap Up</strong></p><br><p>Final thoughts on nuclear inevitability, orbital infrastructure, and the reality that energy—not chips—may define the next decade of enterprise IT.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Windows Notepad RCE?! CVE-2026-2841 Exposes Windows 11 Users</title>
			<itunes:title>Windows Notepad RCE?! CVE-2026-2841 Exposes Windows 11 Users</itunes:title>
			<pubDate>Fri, 13 Feb 2026 17:00:00 GMT</pubDate>
			<itunes:duration>10:42</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/698f3d6a7301331f1f7ad4d5/media.mp3" length="185097004" type="audio/mpeg"/>
			<guid isPermaLink="false">698f3d6a7301331f1f7ad4d5</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e24</link>
			<acast:episodeId>698f3d6a7301331f1f7ad4d5</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e24</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Yw1oztaNyHkehjslIM/x+IZpZCWYUoyG72+aBj/rg32OX8ULaGCN+sKdM9uzcnnd84m0TIhdbZ55UaFrFJD28P]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E24</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>24</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1770994996245-e6ade8a5-fd01-4c8a-92af-edf025707dc2.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down a shocking vulnerability: <strong>CVE-2026-2841</strong>, a <strong>Remote Code Execution (RCE)</strong> flaw in the modern Windows 11 Notepad application distributed via the Microsoft Store.</p><br><p>Yes — even Notepad isn’t safe anymore.</p><br><p>This vulnerability stems from a <strong>command injection flaw</strong> in the modern Windows 11 Store version of Notepad (11.x prior to patch). The issue allows malicious .md (Markdown) files containing crafted links or interactive content to execute arbitrary code when opened and clicked by a user.</p><br><p>With a <strong>CVSS score of 8.8</strong>, this vulnerability becomes especially dangerous when chained with other exploits.</p><br><p>⸻</p><br><p>🔎<strong> What You Need to Know</strong></p><br><p><strong>CVE-2026-2841 – Windows Notepad RCE</strong></p><p>•Affects: <strong>Windows 11 modern Notepad (Microsoft Store version 11.x prior to Patch Tuesday update)</strong></p><p>•Does NOT affect: Legacy Notepad on Windows 10, Windows 7, or classic versions</p><p>•Attack Vector: Malicious .md file delivered via phishing</p><p>•Trigger: User opens file and clicks embedded link</p><p>•Impact: Remote Code Execution with user-level permissions</p><p>•Severity: <strong>CVSS 8.8 (High)</strong></p><br><p>⸻</p><br><p><strong>⚠ Why This Matters</strong></p><p>•Perfect phishing vehicle: malicious Markdown attachment</p><p>•Executes arbitrary code under the user’s permissions</p><p>•Ideal for lateral movement in enterprise environments</p><p>•Dangerous when combined with other exploits</p><p>•Many organizations delay Patch Tuesday updates — this one should NOT wait</p><br><p>⸻</p><br><p>🛠<strong> Mitigation &amp; Recommendations</strong></p><p>•Immediately update Notepad via Microsoft Store</p><p>•Audit Windows 11 endpoints for modern Notepad version</p><p>•Train users to avoid opening unknown .md attachments</p><p>•Consider simpler text editors for baseline editing tasks</p><p>•Evaluate enterprise endpoint protection against command injection vectors</p><br><p>⸻</p><br><p>💻<strong> Alternative Editors (With Security Awareness)</strong></p><br><p>John and Lou discuss safer editing alternatives including:</p><p>•Notepad++</p><p>•Visual Studio Code / Codeium</p><p>•Sublime Text</p><p>•Atom</p><p>•Vim / NeoVim / Emacs</p><p>•JetBrains IDEs</p><br><p>Reminder: More features = more attack surface.</p><br><p>⸻</p><br><p>💬<strong> Wrap Up</strong></p><br><p>John and Lou also respond to listener feedback from Andrew regarding their recent OpenClaw security discussion. They clarify their stance:</p><p>•They are not anti-AI.</p><p>•They are pro-security.</p><p>•Bleeding-edge tech requires controlled rollout and sandboxing.</p><p>•Enterprises must protect privileged data access.</p><br><p>Security-first thinking is not fear — it’s responsible IT leadership.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down a shocking vulnerability: <strong>CVE-2026-2841</strong>, a <strong>Remote Code Execution (RCE)</strong> flaw in the modern Windows 11 Notepad application distributed via the Microsoft Store.</p><br><p>Yes — even Notepad isn’t safe anymore.</p><br><p>This vulnerability stems from a <strong>command injection flaw</strong> in the modern Windows 11 Store version of Notepad (11.x prior to patch). The issue allows malicious .md (Markdown) files containing crafted links or interactive content to execute arbitrary code when opened and clicked by a user.</p><br><p>With a <strong>CVSS score of 8.8</strong>, this vulnerability becomes especially dangerous when chained with other exploits.</p><br><p>⸻</p><br><p>🔎<strong> What You Need to Know</strong></p><br><p><strong>CVE-2026-2841 – Windows Notepad RCE</strong></p><p>•Affects: <strong>Windows 11 modern Notepad (Microsoft Store version 11.x prior to Patch Tuesday update)</strong></p><p>•Does NOT affect: Legacy Notepad on Windows 10, Windows 7, or classic versions</p><p>•Attack Vector: Malicious .md file delivered via phishing</p><p>•Trigger: User opens file and clicks embedded link</p><p>•Impact: Remote Code Execution with user-level permissions</p><p>•Severity: <strong>CVSS 8.8 (High)</strong></p><br><p>⸻</p><br><p><strong>⚠ Why This Matters</strong></p><p>•Perfect phishing vehicle: malicious Markdown attachment</p><p>•Executes arbitrary code under the user’s permissions</p><p>•Ideal for lateral movement in enterprise environments</p><p>•Dangerous when combined with other exploits</p><p>•Many organizations delay Patch Tuesday updates — this one should NOT wait</p><br><p>⸻</p><br><p>🛠<strong> Mitigation &amp; Recommendations</strong></p><p>•Immediately update Notepad via Microsoft Store</p><p>•Audit Windows 11 endpoints for modern Notepad version</p><p>•Train users to avoid opening unknown .md attachments</p><p>•Consider simpler text editors for baseline editing tasks</p><p>•Evaluate enterprise endpoint protection against command injection vectors</p><br><p>⸻</p><br><p>💻<strong> Alternative Editors (With Security Awareness)</strong></p><br><p>John and Lou discuss safer editing alternatives including:</p><p>•Notepad++</p><p>•Visual Studio Code / Codeium</p><p>•Sublime Text</p><p>•Atom</p><p>•Vim / NeoVim / Emacs</p><p>•JetBrains IDEs</p><br><p>Reminder: More features = more attack surface.</p><br><p>⸻</p><br><p>💬<strong> Wrap Up</strong></p><br><p>John and Lou also respond to listener feedback from Andrew regarding their recent OpenClaw security discussion. They clarify their stance:</p><p>•They are not anti-AI.</p><p>•They are pro-security.</p><p>•Bleeding-edge tech requires controlled rollout and sandboxing.</p><p>•Enterprises must protect privileged data access.</p><br><p>Security-first thinking is not fear — it’s responsible IT leadership.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Quantum Breakthroughs, AI Cloud Billions, and Apple’s Margin Squeeze</title>
			<itunes:title>Quantum Breakthroughs, AI Cloud Billions, and Apple’s Margin Squeeze</itunes:title>
			<pubDate>Mon, 09 Feb 2026 15:30:00 GMT</pubDate>
			<itunes:duration>22:19</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6988fd7245f62cfe94a33e70/media.mp3" length="385757464" type="audio/mpeg"/>
			<guid isPermaLink="false">6988fd7245f62cfe94a33e70</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e24</link>
			<acast:episodeId>6988fd7245f62cfe94a33e70</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e24</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bMpMD1eQBElukj+MqQuOi6wWY2BeBn+TY4XeRKzNpLHCJ2tIpMWBoNp8JJxZAAjxOP4WheMXwuvq5HQ+hcDPfA]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E24</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>24</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1770585273678-06830356-30af-44a2-b9ee-fe19b467c512.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – News Bytes</strong>, John Barger and Lou Schmidt explore three stories reshaping enterprise IT strategy. From a quantum cooling breakthrough that could accelerate real-world quantum computing, to Oracle’s plan to raise $50 billion for AI cloud infrastructure, the episode highlights how fast the AI arms race is escalating.</p><br><p>They also break down why the AI boom is starting to squeeze Apple’s famously strong profit margins—and what that means for device pricing, silicon supply, and enterprise IT budgets. If you care about where compute, power, and economics collide, this episode connects the dots.</p><br><p><br></p><p>📌<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>John and Lou kick off the episode with a look at why quantum cooling breakthroughs, massive AI cloud investments, and chip supply pressure on Apple all point to accelerating change across enterprise IT.</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:55 – Chalmers University Makes Quantum Cool</strong></p><br><p>Researchers at <a href="about:blank" rel="noopener noreferrer" target="_blank"><strong>Chalmers University of Technology</strong></a> unveil a breakthrough quantum refrigeration method that uses controlled noise to improve cooling near absolute zero. The discussion explores why advances like this could rapidly reduce the cost and complexity of quantum computing and push it closer to real enterprise use cases.</p><p><a href="https://www.sciencedaily.com/releases/2026/01/260129080418.htm" rel="noopener noreferrer" target="_blank">https://www.sciencedaily.com/releases/2026/01/260129080418.htm</a>&nbsp;</p><br><p>⸻</p><br><p><strong>06:10 – Oracle Raising Up to $50B for AI Cloud</strong></p><br><p><a href="about:blank" rel="noopener noreferrer" target="_blank"><strong>Oracle</strong></a> plans to raise up to $50 billion to expand AI-focused cloud data centers as part of Project Stargate. John and Lou unpack why Oracle’s existing enterprise relationships give it a unique advantage—and why power and compute, not demand, may become the real limiting factors for AI growth.</p><p><a href="https://www.techrepublic.com/article/news-oracle-50b-ai-cloud/" rel="noopener noreferrer" target="_blank">https://www.techrepublic.com/article/news-oracle-50b-ai-cloud/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>10:28 – The AI Boom Is Coming for Apple’s Profit Margins</strong></p><br><p>The surge in AI-driven chip demand is putting pressure on <a href="about:blank" rel="noopener noreferrer" target="_blank"><strong>Apple</strong></a>’s historically strong margins. As TSMC capacity is increasingly consumed by Nvidia, OpenAI, and hyperscalers, the hosts break down why Apple may face higher silicon costs—and what that means for device pricing, IT refresh cycles, and enterprise procurement.</p><p><a href="https://www.msn.com/en-us/money/technology/the-ai-boom-is-coming-for-apple-s-profit-margins/ar-AA1VpgpA" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/money/technology/the-ai-boom-is-coming-for-apple-s-profit-margins/ar-AA1VpgpA</a>&nbsp;</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>17:11 – Mail Bag</strong></p><br><p>Listener feedback sparks a nuanced discussion on hybrid work, mandatory office policies, and why management capability—not location—is often the real issue.</p><br><p><strong>21:24 – Wrap Up</strong></p><br><p>Final thoughts on quantum acceleration, AI infrastructure economics, and why IT leaders need to prepare for rising hardware costs and longer planning horizons.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – News Bytes</strong>, John Barger and Lou Schmidt explore three stories reshaping enterprise IT strategy. From a quantum cooling breakthrough that could accelerate real-world quantum computing, to Oracle’s plan to raise $50 billion for AI cloud infrastructure, the episode highlights how fast the AI arms race is escalating.</p><br><p>They also break down why the AI boom is starting to squeeze Apple’s famously strong profit margins—and what that means for device pricing, silicon supply, and enterprise IT budgets. If you care about where compute, power, and economics collide, this episode connects the dots.</p><br><p><br></p><p>📌<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>John and Lou kick off the episode with a look at why quantum cooling breakthroughs, massive AI cloud investments, and chip supply pressure on Apple all point to accelerating change across enterprise IT.</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:55 – Chalmers University Makes Quantum Cool</strong></p><br><p>Researchers at <a href="about:blank" rel="noopener noreferrer" target="_blank"><strong>Chalmers University of Technology</strong></a> unveil a breakthrough quantum refrigeration method that uses controlled noise to improve cooling near absolute zero. The discussion explores why advances like this could rapidly reduce the cost and complexity of quantum computing and push it closer to real enterprise use cases.</p><p><a href="https://www.sciencedaily.com/releases/2026/01/260129080418.htm" rel="noopener noreferrer" target="_blank">https://www.sciencedaily.com/releases/2026/01/260129080418.htm</a>&nbsp;</p><br><p>⸻</p><br><p><strong>06:10 – Oracle Raising Up to $50B for AI Cloud</strong></p><br><p><a href="about:blank" rel="noopener noreferrer" target="_blank"><strong>Oracle</strong></a> plans to raise up to $50 billion to expand AI-focused cloud data centers as part of Project Stargate. John and Lou unpack why Oracle’s existing enterprise relationships give it a unique advantage—and why power and compute, not demand, may become the real limiting factors for AI growth.</p><p><a href="https://www.techrepublic.com/article/news-oracle-50b-ai-cloud/" rel="noopener noreferrer" target="_blank">https://www.techrepublic.com/article/news-oracle-50b-ai-cloud/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>10:28 – The AI Boom Is Coming for Apple’s Profit Margins</strong></p><br><p>The surge in AI-driven chip demand is putting pressure on <a href="about:blank" rel="noopener noreferrer" target="_blank"><strong>Apple</strong></a>’s historically strong margins. As TSMC capacity is increasingly consumed by Nvidia, OpenAI, and hyperscalers, the hosts break down why Apple may face higher silicon costs—and what that means for device pricing, IT refresh cycles, and enterprise procurement.</p><p><a href="https://www.msn.com/en-us/money/technology/the-ai-boom-is-coming-for-apple-s-profit-margins/ar-AA1VpgpA" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/money/technology/the-ai-boom-is-coming-for-apple-s-profit-margins/ar-AA1VpgpA</a>&nbsp;</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>17:11 – Mail Bag</strong></p><br><p>Listener feedback sparks a nuanced discussion on hybrid work, mandatory office policies, and why management capability—not location—is often the real issue.</p><br><p><strong>21:24 – Wrap Up</strong></p><br><p>Final thoughts on quantum acceleration, AI infrastructure economics, and why IT leaders need to prepare for rising hardware costs and longer planning horizons.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Why OpenClaw on Work PCs Puts Enterprise Data at Risk</title>
			<itunes:title>Why OpenClaw on Work PCs Puts Enterprise Data at Risk</itunes:title>
			<pubDate>Fri, 06 Feb 2026 16:30:00 GMT</pubDate>
			<itunes:duration>22:59</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6986113cba7d04f1d41e238f/media.mp3" length="397433128" type="audio/mpeg"/>
			<guid isPermaLink="false">6986113cba7d04f1d41e238f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e23</link>
			<acast:episodeId>6986113cba7d04f1d41e238f</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e23</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZxkqVfY9s/eyi3hJFEvX3fhmCDpr+a+GsRdmrUvPWQTf5iUqSNQ841PFCtL70ZdKsSt05JED3dbv63PAH6aT4p]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E23</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>23</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1770393526301-edcb4088-d7f8-44d2-97c3-9ff40a1b1ad0.jpeg"/>
			<description><![CDATA[<p>Agentic AI systems like <strong>OpenClaw</strong> represent the future of automation, productivity, and intelligent workflows — but today, they also represent a <strong>serious and underappreciated enterprise security risk</strong>.</p><br><p>In this episode of <em>IT SPARC Cast – CVE of the Week</em>, John and Lou break down why running OpenClaw (and related platforms like MoltBook) on corporate hardware or with access to enterprise data is dangerous <em>right now</em>, even if the long-term vision is compelling.</p><br><p>The discussion centers on <strong>three types of OpenClaw users</strong>:</p><p>1.<strong>Sandbox Experimenters</strong> – Users running OpenClaw in isolated labs or test environments with no access to corporate data.</p><p>2.<strong>Dedicated VM / Hardware Users</strong> – Users running OpenClaw separately, but still granting it access to cloud services, email, or internal APIs.</p><p>3.<strong>Daily Driver Users</strong> – Users installing OpenClaw directly on work PCs and giving it full access to files, email, chat, and automation tools.</p><br><p>John and Lou argue that <strong>only the first group is safe today</strong>.</p><p>Groups #2 and #3 dramatically expand the attack surface, introducing risks such as credential exfiltration, indirect prompt injection, data leakage, and supply-chain style compromises via third-party “skills.”</p><br><p>The episode uses a <strong>“bio hotcell” analogy</strong>: OpenClaw can be used safely <em>only</em> when isolated, constrained, monitored, and treated as potentially hazardous. Without those controls, it becomes a silent data-exfiltration engine operating entirely inside allowed enterprise workflows.</p><br><p>The takeaway for IT leaders is clear:</p><p><strong>HR and IT must act together now</strong> to define policies that prohibit OpenClaw and MoltBook from running on corporate devices or accessing corporate data until proper governance, tooling, and security controls exist.</p><br><p>⸻</p><br><p>🔚<strong> Wrap Up &amp; Links</strong></p><br><p>Follow and connect with us:</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Agentic AI systems like <strong>OpenClaw</strong> represent the future of automation, productivity, and intelligent workflows — but today, they also represent a <strong>serious and underappreciated enterprise security risk</strong>.</p><br><p>In this episode of <em>IT SPARC Cast – CVE of the Week</em>, John and Lou break down why running OpenClaw (and related platforms like MoltBook) on corporate hardware or with access to enterprise data is dangerous <em>right now</em>, even if the long-term vision is compelling.</p><br><p>The discussion centers on <strong>three types of OpenClaw users</strong>:</p><p>1.<strong>Sandbox Experimenters</strong> – Users running OpenClaw in isolated labs or test environments with no access to corporate data.</p><p>2.<strong>Dedicated VM / Hardware Users</strong> – Users running OpenClaw separately, but still granting it access to cloud services, email, or internal APIs.</p><p>3.<strong>Daily Driver Users</strong> – Users installing OpenClaw directly on work PCs and giving it full access to files, email, chat, and automation tools.</p><br><p>John and Lou argue that <strong>only the first group is safe today</strong>.</p><p>Groups #2 and #3 dramatically expand the attack surface, introducing risks such as credential exfiltration, indirect prompt injection, data leakage, and supply-chain style compromises via third-party “skills.”</p><br><p>The episode uses a <strong>“bio hotcell” analogy</strong>: OpenClaw can be used safely <em>only</em> when isolated, constrained, monitored, and treated as potentially hazardous. Without those controls, it becomes a silent data-exfiltration engine operating entirely inside allowed enterprise workflows.</p><br><p>The takeaway for IT leaders is clear:</p><p><strong>HR and IT must act together now</strong> to define policies that prohibit OpenClaw and MoltBook from running on corporate devices or accessing corporate data until proper governance, tooling, and security controls exist.</p><br><p>⸻</p><br><p>🔚<strong> Wrap Up &amp; Links</strong></p><br><p>Follow and connect with us:</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Work-From-Office Fallout, Rocket-Powered Data Center Cooling & Microsoft’s New AI Chip]]></title>
			<itunes:title><![CDATA[Work-From-Office Fallout, Rocket-Powered Data Center Cooling & Microsoft’s New AI Chip]]></itunes:title>
			<pubDate>Mon, 02 Feb 2026 15:30:00 GMT</pubDate>
			<itunes:duration>23:43</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/697cef61f0f157225a4c4b92/media.mp3" length="409925608" type="audio/mpeg"/>
			<guid isPermaLink="false">697cef61f0f157225a4c4b92</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e23</link>
			<acast:episodeId>697cef61f0f157225a4c4b92</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e23</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bAJQY6Eo56+qOKTGacS2M6fZAXla1P2zJQn8h22doxe2otRAEP694bUhea1419DOn8biBs5+dW+HntfZs41r/b]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E23</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>23</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1769795371158-180e3f0d-158c-4ed4-8ab2-15466e21e1b6.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – News Bytes</strong>, John Barger &amp; Lou Schmidt break down three stories that reveal how enterprise IT is being reshaped by workforce realities, infrastructure constraints, and custom silicon. From mounting evidence that work-from-office mandates are driving top talent out the door, to a Los Angeles startup using SpaceX rocket technology to cool data centers without water, to Microsoft unveiling a massive new AI inference chip designed to scale efficiently.</p><br><p>The discussion connects culture, power, cooling, and compute—showing why AI growth isn’t just about models and GPUs, but about solving the physical and human constraints that come with them. If you’re responsible for enterprise IT strategy, infrastructure planning, or talent retention, this episode delivers context you won’t get from headlines alone.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>John and Lou preview a packed episode covering remote-work backlash, radical new data-center cooling approaches, and Microsoft’s latest move to control its AI destiny with custom silicon.</p><br><p><br></p><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>01:00 – Work-From-Office Mandate? Expect Top Talent Turnover and Culture Rot</strong></p><br><p>New research highlighted by <em>CIO Magazine</em> shows that strict return-to-office mandates are driving increased attrition among top performers, longer hiring cycles, and declining trust. John and Lou unpack why “butts-in-seats” metrics fail modern organizations and how poor remote-management skills—not productivity—are often the real problem.</p><p><a href="https://www.cio.com/article/4119562/work-from-office-mandate-expect-top-talent-turnover-culture-rot.html" rel="noopener noreferrer" target="_blank">https://www.cio.com/article/4119562/work-from-office-mandate-expect-top-talent-turnover-culture-rot.html</a>&nbsp;</p><br><p>⸻</p><br><p><strong>08:14 – L.A. Startup Uses SpaceX Tech to Cool Data Centers With Less Power and No Water</strong></p><br><p>An LA-based startup is applying SpaceX rocket turbopump technology and supercritical CO₂ to dramatically reduce data-center cooling power, footprint, and water usage. The hosts explain why cooling—not chips—is becoming one of the biggest bottlenecks in AI expansion and how innovations like this could unlock sustainable growth.</p><p><a href="https://finance.yahoo.com/news/l-startup-uses-spacex-tech-175628363.html" rel="noopener noreferrer" target="_blank">https://finance.yahoo.com/news/l-startup-uses-spacex-tech-175628363.html</a></p><br><p>⸻</p><br><p><strong>14:11 – Microsoft Announces a Powerful New Chip for AI Inference</strong></p><br><p>Microsoft unveils the Maia 200, a custom AI inference accelerator built on TSMC’s 3-nm process with 100 billion transistors. John and Lou break down why inference-optimized chips matter, how this fits into a broader trend of hyperscalers building custom silicon, and why efficiency per watt is becoming the defining metric for AI at scale.</p><p><a href="https://techcrunch.com/2026/01/26/microsoft-announces-powerful-new-chip-for-ai-inference/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/01/26/microsoft-announces-powerful-new-chip-for-ai-inference/</a></p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>19:49 – Mail Bag</strong></p><br><p>Listener feedback revisits classic operating systems, early AI roots, and why distributed computing concepts from decades ago are suddenly relevant again.</p><br><p><strong>22:47 – Wrap Up</strong></p><br><p>John and Lou close by emphasizing that AI’s future depends on solving power, cooling, and organizational challenges—not just shipping faster chips.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – News Bytes</strong>, John Barger &amp; Lou Schmidt break down three stories that reveal how enterprise IT is being reshaped by workforce realities, infrastructure constraints, and custom silicon. From mounting evidence that work-from-office mandates are driving top talent out the door, to a Los Angeles startup using SpaceX rocket technology to cool data centers without water, to Microsoft unveiling a massive new AI inference chip designed to scale efficiently.</p><br><p>The discussion connects culture, power, cooling, and compute—showing why AI growth isn’t just about models and GPUs, but about solving the physical and human constraints that come with them. If you’re responsible for enterprise IT strategy, infrastructure planning, or talent retention, this episode delivers context you won’t get from headlines alone.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>John and Lou preview a packed episode covering remote-work backlash, radical new data-center cooling approaches, and Microsoft’s latest move to control its AI destiny with custom silicon.</p><br><p><br></p><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>01:00 – Work-From-Office Mandate? Expect Top Talent Turnover and Culture Rot</strong></p><br><p>New research highlighted by <em>CIO Magazine</em> shows that strict return-to-office mandates are driving increased attrition among top performers, longer hiring cycles, and declining trust. John and Lou unpack why “butts-in-seats” metrics fail modern organizations and how poor remote-management skills—not productivity—are often the real problem.</p><p><a href="https://www.cio.com/article/4119562/work-from-office-mandate-expect-top-talent-turnover-culture-rot.html" rel="noopener noreferrer" target="_blank">https://www.cio.com/article/4119562/work-from-office-mandate-expect-top-talent-turnover-culture-rot.html</a>&nbsp;</p><br><p>⸻</p><br><p><strong>08:14 – L.A. Startup Uses SpaceX Tech to Cool Data Centers With Less Power and No Water</strong></p><br><p>An LA-based startup is applying SpaceX rocket turbopump technology and supercritical CO₂ to dramatically reduce data-center cooling power, footprint, and water usage. The hosts explain why cooling—not chips—is becoming one of the biggest bottlenecks in AI expansion and how innovations like this could unlock sustainable growth.</p><p><a href="https://finance.yahoo.com/news/l-startup-uses-spacex-tech-175628363.html" rel="noopener noreferrer" target="_blank">https://finance.yahoo.com/news/l-startup-uses-spacex-tech-175628363.html</a></p><br><p>⸻</p><br><p><strong>14:11 – Microsoft Announces a Powerful New Chip for AI Inference</strong></p><br><p>Microsoft unveils the Maia 200, a custom AI inference accelerator built on TSMC’s 3-nm process with 100 billion transistors. John and Lou break down why inference-optimized chips matter, how this fits into a broader trend of hyperscalers building custom silicon, and why efficiency per watt is becoming the defining metric for AI at scale.</p><p><a href="https://techcrunch.com/2026/01/26/microsoft-announces-powerful-new-chip-for-ai-inference/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/01/26/microsoft-announces-powerful-new-chip-for-ai-inference/</a></p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>19:49 – Mail Bag</strong></p><br><p>Listener feedback revisits classic operating systems, early AI roots, and why distributed computing concepts from decades ago are suddenly relevant again.</p><br><p><strong>22:47 – Wrap Up</strong></p><br><p>John and Lou close by emphasizing that AI’s future depends on solving power, cooling, and organizational challenges—not just shipping faster chips.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[WhatsApp Encryption on Trial & AI Chat App Data Exposure: Enterprise Messaging Risks]]></title>
			<itunes:title><![CDATA[WhatsApp Encryption on Trial & AI Chat App Data Exposure: Enterprise Messaging Risks]]></itunes:title>
			<pubDate>Fri, 30 Jan 2026 15:30:00 GMT</pubDate>
			<itunes:duration>14:11</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/697cc745ebb1ff695f47e737/media.mp3" length="245132980" type="audio/mpeg"/>
			<guid isPermaLink="false">697cc745ebb1ff695f47e737</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e22</link>
			<acast:episodeId>697cc745ebb1ff695f47e737</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e22</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bnEts4yBN0bskgGaNNIntrzm0CRx/Gi5Su/0EJdHiRMuY03Rl6dd5rQ0maJmI/264AhZL1XJ57FIlgc4SXb6Sk]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E22</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>22</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1769784912091-3b01133e-5881-456f-a079-50a6c3625d4c.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break format to examine two high-impact security and privacy stories that every enterprise IT and security leader should be paying attention to.</p><br><p>First, we dive into a new lawsuit alleging that <strong>Meta can access or infer WhatsApp message contents</strong>, despite years of public claims that WhatsApp is fully end-to-end encrypted. We unpack what “access” really means in modern encrypted messaging systems, including metadata, client-side processing, backups, and enterprise risk implications—especially for organizations using WhatsApp for daily business communications.</p><br><p><a href="https://www.bloomberg.com/news/articles/2026-01-25/lawsuit-claims-meta-can-see-whatsapp-chats-in-breach-of-privacy" rel="noopener noreferrer" target="_blank">https://www.bloomberg.com/news/articles/2026-01-25/lawsuit-claims-meta-can-see-whatsapp-chats-in-breach-of-privacy</a></p><br><p>Next, we examine a major data exposure involving <strong>Chat &amp; Ask AI</strong>, a popular AI chatbot aggregator with tens of millions of users. Due to a backend <strong>Firebase misconfiguration</strong>, hundreds of millions of private conversations—including highly sensitive topics—were left publicly accessible. This incident highlights the growing risk of <strong>Shadow AI</strong> inside enterprises and the dangers of third-party AI wrappers that lack enterprise-grade security controls.</p><br><p><a href="https://www.404media.co/massive-ai-chat-app-leaked-millions-of-users-private-conversations/" rel="noopener noreferrer" target="_blank">https://www.404media.co/massive-ai-chat-app-leaked-millions-of-users-private-conversations/</a></p><br><p>The episode closes with listener feedback on a previously covered UniFi Access vulnerability and a broader discussion on how organizations should educate, monitor, and protect users without resorting to blunt enforcement.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break format to examine two high-impact security and privacy stories that every enterprise IT and security leader should be paying attention to.</p><br><p>First, we dive into a new lawsuit alleging that <strong>Meta can access or infer WhatsApp message contents</strong>, despite years of public claims that WhatsApp is fully end-to-end encrypted. We unpack what “access” really means in modern encrypted messaging systems, including metadata, client-side processing, backups, and enterprise risk implications—especially for organizations using WhatsApp for daily business communications.</p><br><p><a href="https://www.bloomberg.com/news/articles/2026-01-25/lawsuit-claims-meta-can-see-whatsapp-chats-in-breach-of-privacy" rel="noopener noreferrer" target="_blank">https://www.bloomberg.com/news/articles/2026-01-25/lawsuit-claims-meta-can-see-whatsapp-chats-in-breach-of-privacy</a></p><br><p>Next, we examine a major data exposure involving <strong>Chat &amp; Ask AI</strong>, a popular AI chatbot aggregator with tens of millions of users. Due to a backend <strong>Firebase misconfiguration</strong>, hundreds of millions of private conversations—including highly sensitive topics—were left publicly accessible. This incident highlights the growing risk of <strong>Shadow AI</strong> inside enterprises and the dangers of third-party AI wrappers that lack enterprise-grade security controls.</p><br><p><a href="https://www.404media.co/massive-ai-chat-app-leaked-millions-of-users-private-conversations/" rel="noopener noreferrer" target="_blank">https://www.404media.co/massive-ai-chat-app-leaked-millions-of-users-private-conversations/</a></p><br><p>The episode closes with listener feedback on a previously covered UniFi Access vulnerability and a broader discussion on how organizations should educate, monitor, and protect users without resorting to blunt enforcement.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>ERP’s Inevitable Reinvention, UniFi Fabric, and Why OpenAI Isn’t the AI Bubble to Fear</title>
			<itunes:title>ERP’s Inevitable Reinvention, UniFi Fabric, and Why OpenAI Isn’t the AI Bubble to Fear</itunes:title>
			<pubDate>Mon, 26 Jan 2026 15:30:00 GMT</pubDate>
			<itunes:duration>28:32</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69767286283ec80e156b1a79/media.mp3" length="493300900" type="audio/mpeg"/>
			<guid isPermaLink="false">69767286283ec80e156b1a79</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e22</link>
			<acast:episodeId>69767286283ec80e156b1a79</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e22</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Zz4DUlVywtOkiqA8QwEYlJX6s6iJwfzzSM2RTjiLqHIq2BNKAVTe5gCIehFRdKyVgu2A4Jtth6TPTM7A+KPY5j]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E22</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>22</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1769370015088-2a587c17-f190-4c4e-95d4-31921f025c1c.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – News Bytes</strong>, John Barger &amp; Lou Schmidt dig into three stories that highlight how enterprise IT is quietly—but fundamentally—restructuring itself. From executives questioning the long-term future of traditional ERP systems, to Ubiquiti introducing a new orchestration-driven take on network fabrics, to a grounded discussion on whether the AI bubble is real and why OpenAI may be far less fragile than critics assume.</p><br><p>The conversation connects enterprise software evolution, network architecture at scale, and the hard economic realities of AI infrastructure—especially power and compute. If you’re responsible for enterprise platforms, networking strategy, or long-term IT planning, this episode provides context that goes beyond the headlines.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>John and Lou preview the episode, touching on ERP’s looming transformation, UniFi’s new Fabric approach, and why AI demand—especially at OpenAI—is driven by hard infrastructure realities, not hype.</p><br><p><br></p><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:48 – ERP Isn’t Dead Yet – But Most Execs Are Planning the Wake</strong></p><br><p>A survey of more than 4,300 executives shows growing skepticism about ERP’s long-term dominance, even as most organizations remain satisfied with current systems. John and Lou explain why AI-driven, modular, and agentic ERP models are likely evolutions—not rip-and-replace events—and what enterprise IT teams should be doing now to prepare.</p><p><a href="https://www.theregister.com/2026/01/19/erp_survey_rimini_street/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2026/01/19/erp_survey_rimini_street/</a>&nbsp;</p><br><p><br></p><p>⸻</p><br><p><strong>06:28 – Ubiquiti Introduces UniFi Fabric</strong></p><br><p>Ubiquiti unveils UniFi Fabric, a centralized orchestration layer designed to manage policies, identity-based networking, Zero Trust, and multi-site environments without cloud licensing. The discussion compares UniFi’s approach to traditional network fabrics like VXLAN and SPBM, highlighting why this controller-first model could appeal to MSPs and mid-sized enterprises.</p><p><a href="https://blog.ui.com/article/introducing-unifi-fabrics" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/introducing-unifi-fabrics</a>&nbsp;</p><br><p><br></p><p>⸻</p><br><p><strong>14:14 – AI Bubble? Maybe. OpenAI Risk? Not Anytime Soon.</strong></p><br><p>John breaks down why OpenAI’s revenue growth is directly tied to available compute capacity, not speculative demand. Using concrete megawatt, gigawatt, and ARR figures, the hosts explain why AI may see valuation corrections—but why companies like OpenAI, NVIDIA, and Anthropic are unlikely to disappear.</p><p><a href="https://openai.com/index/a-business-that-scales-with-the-value-of-intelligence/" rel="noopener noreferrer" target="_blank">https://openai.com/index/a-business-that-scales-with-the-value-of-intelligence/</a>&nbsp;</p><br><p><br></p><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>24:16 – Mail Bag</strong></p><br><p>Listener feedback reinforces the growing link between AI growth and power infrastructure, with discussion around electrical safety, regulation, and why energy expertise may be one of the most valuable skills in the coming decade.</p><br><p><strong>27:39 – Wrap Up</strong></p><br><p>John and Lou close with a reminder that enterprise IT leaders will increasingly be asked to validate power, nuclear, and infrastructure decisions at the executive level—and that staying informed now is critical.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – News Bytes</strong>, John Barger &amp; Lou Schmidt dig into three stories that highlight how enterprise IT is quietly—but fundamentally—restructuring itself. From executives questioning the long-term future of traditional ERP systems, to Ubiquiti introducing a new orchestration-driven take on network fabrics, to a grounded discussion on whether the AI bubble is real and why OpenAI may be far less fragile than critics assume.</p><br><p>The conversation connects enterprise software evolution, network architecture at scale, and the hard economic realities of AI infrastructure—especially power and compute. If you’re responsible for enterprise platforms, networking strategy, or long-term IT planning, this episode provides context that goes beyond the headlines.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>John and Lou preview the episode, touching on ERP’s looming transformation, UniFi’s new Fabric approach, and why AI demand—especially at OpenAI—is driven by hard infrastructure realities, not hype.</p><br><p><br></p><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:48 – ERP Isn’t Dead Yet – But Most Execs Are Planning the Wake</strong></p><br><p>A survey of more than 4,300 executives shows growing skepticism about ERP’s long-term dominance, even as most organizations remain satisfied with current systems. John and Lou explain why AI-driven, modular, and agentic ERP models are likely evolutions—not rip-and-replace events—and what enterprise IT teams should be doing now to prepare.</p><p><a href="https://www.theregister.com/2026/01/19/erp_survey_rimini_street/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2026/01/19/erp_survey_rimini_street/</a>&nbsp;</p><br><p><br></p><p>⸻</p><br><p><strong>06:28 – Ubiquiti Introduces UniFi Fabric</strong></p><br><p>Ubiquiti unveils UniFi Fabric, a centralized orchestration layer designed to manage policies, identity-based networking, Zero Trust, and multi-site environments without cloud licensing. The discussion compares UniFi’s approach to traditional network fabrics like VXLAN and SPBM, highlighting why this controller-first model could appeal to MSPs and mid-sized enterprises.</p><p><a href="https://blog.ui.com/article/introducing-unifi-fabrics" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/introducing-unifi-fabrics</a>&nbsp;</p><br><p><br></p><p>⸻</p><br><p><strong>14:14 – AI Bubble? Maybe. OpenAI Risk? Not Anytime Soon.</strong></p><br><p>John breaks down why OpenAI’s revenue growth is directly tied to available compute capacity, not speculative demand. Using concrete megawatt, gigawatt, and ARR figures, the hosts explain why AI may see valuation corrections—but why companies like OpenAI, NVIDIA, and Anthropic are unlikely to disappear.</p><p><a href="https://openai.com/index/a-business-that-scales-with-the-value-of-intelligence/" rel="noopener noreferrer" target="_blank">https://openai.com/index/a-business-that-scales-with-the-value-of-intelligence/</a>&nbsp;</p><br><p><br></p><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>24:16 – Mail Bag</strong></p><br><p>Listener feedback reinforces the growing link between AI growth and power infrastructure, with discussion around electrical safety, regulation, and why energy expertise may be one of the most valuable skills in the coming decade.</p><br><p><strong>27:39 – Wrap Up</strong></p><br><p>John and Lou close with a reminder that enterprise IT leaders will increasingly be asked to validate power, nuclear, and infrastructure decisions at the executive level—and that staying informed now is critical.</p><br><p>⸻</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>VoidLink: The AI-Built Linux Malware Framework That Could Change Cyber Attacks Forever</title>
			<itunes:title>VoidLink: The AI-Built Linux Malware Framework That Could Change Cyber Attacks Forever</itunes:title>
			<pubDate>Fri, 23 Jan 2026 15:30:00 GMT</pubDate>
			<itunes:duration>9:39</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6973889835a98abf7c5c95f8/media.mp3" length="166874800" type="audio/mpeg"/>
			<guid isPermaLink="false">6973889835a98abf7c5c95f8</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e21</link>
			<acast:episodeId>6973889835a98abf7c5c95f8</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e21</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7a55Wzao1byi319/aCgRxN9EbwmZr0WNz/VGs5IMasp45GroDdoVESvtva7xt9E/NiAsTv3u7T9+dOm2Kj++wI7]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E21</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>21</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1769179265703-0a9b6145-44d8-4567-8ab7-8f5de83e6429.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break from the traditional single-CVE format to examine <strong>VoidLink</strong>, a newly discovered Linux malware framework that represents a major shift in how cyberattacks may be built and executed going forward.</p><br><p>Rather than focusing on one vulnerability, VoidLink is designed to <strong>chain together many smaller flaws</strong> across Linux, containers, and cloud platforms like AWS, Azure, GCP, Docker, and Kubernetes—creating a stealthy, long-term access platform. Researchers believe VoidLink was developed rapidly using <strong>AI assistants</strong>, offering a rare look at how next-generation malware may be authored, iterated, and deployed. This episode explains why VoidLink matters, how defenders should think about chained exploits, and why this may be an early warning sign for the future of cloud and container security.</p><br><p>⸻</p><br><p><strong>Show Notes (Podcast)</strong></p><br><p><strong>Episode Overview</strong></p><br><p>This week’s CVE of the Week focuses on <strong>VoidLink</strong>, a newly identified Linux malware framework designed for persistence, stealth, and modular exploitation across cloud and container environments. While not a single CVE, VoidLink highlights how attackers are moving toward <strong>framework-driven, AI-assisted exploit chaining</strong> rather than isolated vulnerabilities.</p><br><p><strong>Key Topics Covered</strong></p><p>•What <strong>VoidLink</strong> is and why it’s different from traditional malware</p><p>•How chaining low-severity vulnerabilities can result in full compromise</p><p>•Targeted environments: Linux, Docker, Kubernetes, AWS, Azure, and GCP</p><p>•Use of loaders, implants, evasion techniques, and modular plugins</p><p>•Evidence suggesting <strong>AI-assisted development</strong> with rapid iteration</p><p>•Why this gives defenders a rare opportunity to observe a threat <strong>early in its lifecycle</strong></p><p>•The implications for cloud security, container hardening, and future CVEs</p><br><p><strong>Why This Matters</strong></p><br><p>VoidLink represents a shift from one-off exploits to <strong>malware platforms</strong>—essentially an “IDE for hacking.” Understanding how these frameworks are built and how they operate is critical for anticipating future attacks and improving detection strategies before they become widespread.</p><br><p>⸻</p><br><p><strong>Listener Feedback Highlight</strong></p><br><p>We’d like to give a shout-out to <strong>Nihal</strong> for his thoughtful LinkedIn comment on our earlier <em>Top 10 Operating System Failures</em> episode—specifically his hot take defending Windows ME and critiquing Windows XP’s compatibility break. We love informed debate like this and appreciate listeners who challenge conventional wisdom.</p><br><p>⸻</p><br><p><strong>Wrap-Up &amp; Social Links</strong></p><br><p>That wraps up this episode of <strong>IT SPARC Cast – CVE of the Week</strong>. We couldn’t do this without listeners like you.</p><br><p>Did we miss something? Do you have a topic you want us to cover?</p><p>Send feedback to <strong>feedback@itsparccast.com</strong> or reach out on social.</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break from the traditional single-CVE format to examine <strong>VoidLink</strong>, a newly discovered Linux malware framework that represents a major shift in how cyberattacks may be built and executed going forward.</p><br><p>Rather than focusing on one vulnerability, VoidLink is designed to <strong>chain together many smaller flaws</strong> across Linux, containers, and cloud platforms like AWS, Azure, GCP, Docker, and Kubernetes—creating a stealthy, long-term access platform. Researchers believe VoidLink was developed rapidly using <strong>AI assistants</strong>, offering a rare look at how next-generation malware may be authored, iterated, and deployed. This episode explains why VoidLink matters, how defenders should think about chained exploits, and why this may be an early warning sign for the future of cloud and container security.</p><br><p>⸻</p><br><p><strong>Show Notes (Podcast)</strong></p><br><p><strong>Episode Overview</strong></p><br><p>This week’s CVE of the Week focuses on <strong>VoidLink</strong>, a newly identified Linux malware framework designed for persistence, stealth, and modular exploitation across cloud and container environments. While not a single CVE, VoidLink highlights how attackers are moving toward <strong>framework-driven, AI-assisted exploit chaining</strong> rather than isolated vulnerabilities.</p><br><p><strong>Key Topics Covered</strong></p><p>•What <strong>VoidLink</strong> is and why it’s different from traditional malware</p><p>•How chaining low-severity vulnerabilities can result in full compromise</p><p>•Targeted environments: Linux, Docker, Kubernetes, AWS, Azure, and GCP</p><p>•Use of loaders, implants, evasion techniques, and modular plugins</p><p>•Evidence suggesting <strong>AI-assisted development</strong> with rapid iteration</p><p>•Why this gives defenders a rare opportunity to observe a threat <strong>early in its lifecycle</strong></p><p>•The implications for cloud security, container hardening, and future CVEs</p><br><p><strong>Why This Matters</strong></p><br><p>VoidLink represents a shift from one-off exploits to <strong>malware platforms</strong>—essentially an “IDE for hacking.” Understanding how these frameworks are built and how they operate is critical for anticipating future attacks and improving detection strategies before they become widespread.</p><br><p>⸻</p><br><p><strong>Listener Feedback Highlight</strong></p><br><p>We’d like to give a shout-out to <strong>Nihal</strong> for his thoughtful LinkedIn comment on our earlier <em>Top 10 Operating System Failures</em> episode—specifically his hot take defending Windows ME and critiquing Windows XP’s compatibility break. We love informed debate like this and appreciate listeners who challenge conventional wisdom.</p><br><p>⸻</p><br><p><strong>Wrap-Up &amp; Social Links</strong></p><br><p>That wraps up this episode of <strong>IT SPARC Cast – CVE of the Week</strong>. We couldn’t do this without listeners like you.</p><br><p>Did we miss something? Do you have a topic you want us to cover?</p><p>Send feedback to <strong>feedback@itsparccast.com</strong> or reach out on social.</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Apple Taps Google for AI, Copilot Pushback, AI Commerce & Nuclear Power for Data Centers]]></title>
			<itunes:title><![CDATA[Apple Taps Google for AI, Copilot Pushback, AI Commerce & Nuclear Power for Data Centers]]></itunes:title>
			<pubDate>Mon, 19 Jan 2026 15:30:00 GMT</pubDate>
			<itunes:duration>19:47</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/696d1a4398f7a1123e8b19aa/media.mp3" length="342141892" type="audio/mpeg"/>
			<guid isPermaLink="false">696d1a4398f7a1123e8b19aa</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e21</link>
			<acast:episodeId>696d1a4398f7a1123e8b19aa</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e21</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Yfi6ogx8Z7Dr8tRAhrMsu5Q4QEFV749qZn/tsBvF6z7qSJM9uZwSz5PRoSysv31z/NECHDXCkcnqLSVICl7rYJ]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E21</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>21</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1768757795112-7fc3823e-f1c7-4a71-a8e4-bd0dca7c2c04.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast – News Bytes, John Barger &amp; Lou Schmidt break down a week of moves that signal where enterprise AI, cloud platforms, and data center infrastructure are really headed. From Apple officially leaning on Google to power its AI ambitions, to Microsoft giving IT admins the ability to remove Copilot, this episode highlights growing tension between vendor momentum and enterprise control.</p><br><p>They also explore Google’s push to standardize AI-driven commerce through agent protocols and why Meta locking down more than 6 GW of nuclear power may be the clearest sign yet that energy—not silicon—is becoming the limiting factor for AI at scale. If you’re tracking AI strategy, platform lock-in, and the future of data centers, this episode connects the dots.</p><br><p><strong>📌 Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>This week on IT SPARC Cast, John Barger and Lou Schmidt break down a week dominated by AI power shifts, enterprise pushback, and the growing reality that energy—not compute—may be the biggest constraint on AI’s future.</p><br><p><br></p><p><strong>📰 News Bytes</strong></p><br><p><br></p><p><strong>00:52 – It’s Official: Apple Going with Google for AI</strong></p><br><p>Apple confirms it will rely on Google’s Gemini models to power the next generation of Siri and Apple Intelligence. John and Lou discuss what this says about Apple’s AI strategy, the risks of deep vendor lock-in, and whether Apple can realistically switch models later without breaking workflows.</p><p><a href="https://techcrunch.com/2026/01/12/googles-gemini-to-power-apples-ai-features-like-siri/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/01/12/googles-gemini-to-power-apples-ai-features-like-siri/</a></p><br><p><strong>05:44 – Microsoft to Allow IT Admins to Uninstall Copilot</strong></p><br><p>Microsoft is testing new Windows policies that allow enterprise IT teams to remove the consumer Copilot app from managed devices. The conversation explores enterprise data governance, Intune controls, and why this signals a broader shift toward AI choice rather than forced adoption.</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-may-soon-allow-it-admins-to-uninstall-copilot-on-managed-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-may-soon-allow-it-admins-to-uninstall-copilot-on-managed-devices/</a></p><br><p><strong>09:46 – Google Announces a New Protocol for AI-Driven Commerce</strong></p><br><p>Google introduces the Universal Commerce Protocol (UCP), an open standard designed to let AI agents handle shopping, payments, and transactions across retailers. With backing from major brands and payment networks, John and Lou unpack why agent-driven commerce may become one of AI’s first truly mainstream use cases.</p><p><a href="https://techcrunch.com/2026/01/11/google-announces-a-new-protocol-to-facilitate-commerce-using-ai-agents/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/01/11/google-announces-a-new-protocol-to-facilitate-commerce-using-ai-agents/</a></p><br><p><strong>12:47 – Meta Signs Nuclear Power Deals for AI Data Centers</strong></p><br><p>Meta secures long-term nuclear power contracts totaling more than 6 GW to fuel its AI infrastructure. The discussion focuses on why power—not chips—is becoming the true bottleneck for AI expansion and why nuclear energy is rapidly moving from “controversial” to “necessary.”</p><p><a href="https://techcrunch.com/2026/01/09/meta-signs-deals-with-three-nuclear-companies-for-6-plus-gw-of-power/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/01/09/meta-signs-deals-with-three-nuclear-companies-for-6-plus-gw-of-power/</a></p><br><p><strong>🔚 Wrap Up</strong></p><br><p><strong>16:49 – Mail Bag</strong></p><br><p>Listener feedback revisits cross-platform AI agents, Apple’s closed ecosystem, and whether enterprises can afford to exclude Mac users as agentic AI becomes more central to daily workflows.</p><br><p><strong>18:53 – Wrap Up</strong></p><br><p>John and Lou close the episode by reinforcing a key theme: AI’s future will be defined as much by energy, policy, and interoperability as by model performance.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast – News Bytes, John Barger &amp; Lou Schmidt break down a week of moves that signal where enterprise AI, cloud platforms, and data center infrastructure are really headed. From Apple officially leaning on Google to power its AI ambitions, to Microsoft giving IT admins the ability to remove Copilot, this episode highlights growing tension between vendor momentum and enterprise control.</p><br><p>They also explore Google’s push to standardize AI-driven commerce through agent protocols and why Meta locking down more than 6 GW of nuclear power may be the clearest sign yet that energy—not silicon—is becoming the limiting factor for AI at scale. If you’re tracking AI strategy, platform lock-in, and the future of data centers, this episode connects the dots.</p><br><p><strong>📌 Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>This week on IT SPARC Cast, John Barger and Lou Schmidt break down a week dominated by AI power shifts, enterprise pushback, and the growing reality that energy—not compute—may be the biggest constraint on AI’s future.</p><br><p><br></p><p><strong>📰 News Bytes</strong></p><br><p><br></p><p><strong>00:52 – It’s Official: Apple Going with Google for AI</strong></p><br><p>Apple confirms it will rely on Google’s Gemini models to power the next generation of Siri and Apple Intelligence. John and Lou discuss what this says about Apple’s AI strategy, the risks of deep vendor lock-in, and whether Apple can realistically switch models later without breaking workflows.</p><p><a href="https://techcrunch.com/2026/01/12/googles-gemini-to-power-apples-ai-features-like-siri/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/01/12/googles-gemini-to-power-apples-ai-features-like-siri/</a></p><br><p><strong>05:44 – Microsoft to Allow IT Admins to Uninstall Copilot</strong></p><br><p>Microsoft is testing new Windows policies that allow enterprise IT teams to remove the consumer Copilot app from managed devices. The conversation explores enterprise data governance, Intune controls, and why this signals a broader shift toward AI choice rather than forced adoption.</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-may-soon-allow-it-admins-to-uninstall-copilot-on-managed-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-may-soon-allow-it-admins-to-uninstall-copilot-on-managed-devices/</a></p><br><p><strong>09:46 – Google Announces a New Protocol for AI-Driven Commerce</strong></p><br><p>Google introduces the Universal Commerce Protocol (UCP), an open standard designed to let AI agents handle shopping, payments, and transactions across retailers. With backing from major brands and payment networks, John and Lou unpack why agent-driven commerce may become one of AI’s first truly mainstream use cases.</p><p><a href="https://techcrunch.com/2026/01/11/google-announces-a-new-protocol-to-facilitate-commerce-using-ai-agents/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/01/11/google-announces-a-new-protocol-to-facilitate-commerce-using-ai-agents/</a></p><br><p><strong>12:47 – Meta Signs Nuclear Power Deals for AI Data Centers</strong></p><br><p>Meta secures long-term nuclear power contracts totaling more than 6 GW to fuel its AI infrastructure. The discussion focuses on why power—not chips—is becoming the true bottleneck for AI expansion and why nuclear energy is rapidly moving from “controversial” to “necessary.”</p><p><a href="https://techcrunch.com/2026/01/09/meta-signs-deals-with-three-nuclear-companies-for-6-plus-gw-of-power/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/01/09/meta-signs-deals-with-three-nuclear-companies-for-6-plus-gw-of-power/</a></p><br><p><strong>🔚 Wrap Up</strong></p><br><p><strong>16:49 – Mail Bag</strong></p><br><p>Listener feedback revisits cross-platform AI agents, Apple’s closed ecosystem, and whether enterprises can afford to exclude Mac users as agentic AI becomes more central to daily workflows.</p><br><p><strong>18:53 – Wrap Up</strong></p><br><p>John and Lou close the episode by reinforcing a key theme: AI’s future will be defined as much by energy, policy, and interoperability as by model performance.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cisco Secure Email Gateway CVSS 10.0 Zero-Day Via the Spam Filter</title>
			<itunes:title>Cisco Secure Email Gateway CVSS 10.0 Zero-Day Via the Spam Filter</itunes:title>
			<pubDate>Fri, 16 Jan 2026 15:30:00 GMT</pubDate>
			<itunes:duration>8:53</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/696a4de136ab0b52688bad87/media.mp3" length="153733672" type="audio/mpeg"/>
			<guid isPermaLink="false">696a4de136ab0b52688bad87</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e20</link>
			<acast:episodeId>696a4de136ab0b52688bad87</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e20</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YSCJErjzbDvq21yFsgwNlV5NYcVFYxfQ38FaJcyKkSvdRdXhw5sZ5uKW85Z7uxhr5O2wAQmGigV9ljlRKNFugM]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E20</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>20</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1768574290540-4fcfe95c-09e4-48aa-b8ff-930a30843ec2.jpeg"/>
			<description><![CDATA[<p>This week on <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down <strong>CVE-2025-20393</strong>, a <strong>CVSS 10.0 zero-day vulnerability</strong> affecting <strong>Cisco Secure Email Gateway (SEG)</strong> and related AsyncOS-based email security products.</p><br><p>The flaw is actively exploited in the wild, remains <strong>unpatched</strong>, and—ironically—uses the <strong>spam filtering engine itself as the attack vector</strong>. With no user interaction required and evidence of nation-state activity, this vulnerability represents a worst-case scenario for organizations relying on Cisco’s email security stack.</p><br><p>If you run Cisco Secure Email Gateway or Email Security Appliances, this is an emergency-level issue that demands immediate attention.</p><br><p>⸻</p><br><p>📌<strong> Show Notes</strong></p><br><p>🚨<strong> CVE of the Week: CVE-2025-20393</strong></p><p>•<strong>Severity:</strong> CVSS 10.0 (Critical)</p><p>•<strong>Status:</strong> Actively exploited, <strong>no patch available</strong></p><p>•<strong>Vendor:</strong> Cisco</p><br><p>🎯<strong> Affected Products</strong></p><p>•<strong>Cisco Secure Email Gateway (SEG)</strong></p><p>•<strong>Cisco Email Security Appliance (ESA)</strong></p><p>•<strong>Cisco Secure Email and Web Manager (SEWM)</strong></p><p>•All affected systems run <strong>Cisco AsyncOS</strong></p><br><p>🔓<strong> How the Exploit Works</strong></p><p>•Attackers deliver a <strong>specially crafted email</strong> that is processed <strong>before</strong> a spam verdict is reached</p><p>•The payload is executed during <strong>email parsing, attachment handling, or content inspection</strong></p><p>•<strong>No user interaction required</strong></p><p>•The malicious email <strong>never needs to reach an inbox</strong></p><br><p>💥<strong> Real-World Impact</strong></p><p>•Full <strong>remote code execution</strong> on the email gateway</p><p>•<strong>Email interception and exfiltration</strong> (espionage risk)</p><p>•Persistent access for follow-on attacks</p><p>•Credential harvesting and downstream phishing using trusted infrastructure</p><p>•<strong>Log wiping</strong>, making detection extremely difficult</p><br><p>🌍<strong> Threat Activity</strong></p><p>•Exploits observed as early as <strong>November 2025</strong></p><p>•Linked to <strong>Chinese state-aligned actors</strong></p><p>•Tracked under <strong>UAT-9686</strong>, associated with groups such as <strong>APT41</strong> and <strong>UNC5174</strong></p><p>•Added to <strong>CISA’s Known Exploited Vulnerabilities (KEV) catalog</strong></p><br><p>🛡️<strong> Mitigation Guidance (No Patch Available)</strong></p><p>•Immediately restrict and segment management interfaces</p><p>•Tighten ACLs and allow lists</p><p>•Treat SEG as <strong>Tier-Zero-adjacent infrastructure</strong></p><p>•If compromise is suspected: <strong>full system rebuild required</strong></p><p>•Assume persistence due to log tampering</p><br><p>🧠<strong> Commentary</strong></p><p>•The exploit weaponizes the <strong>very system designed to stop malicious email</strong></p><p>•Lack of a patch from a vendor of Cisco’s size raises serious concerns</p><p>•For some organizations, this may prompt reevaluation of email security platforms altogether</p><br><p>⸻</p><br><p>🔚<strong> Wrap-Up &amp; Listener Feedback</strong></p><br><p>We want to thank listeners who continue to engage with the show and help shape the conversation:</p><p>•<strong>GFABasic32</strong> wrote:</p><p><em>“Thanks for the emergency update on n8n. I love the balance of technical deep dives and high-level strategy. You guys make keeping up with CVEs actually entertaining.”</em></p><p>•<strong>Dennis</strong> added:</p><p><em>“I love the CVE of the Week. These episodes are like exposure therapy.”</em></p><br><p>That’s exactly the goal—helping you face what’s happening in security so you can respond, not react.</p><br><p>Have thoughts on this CVE or want us to cover another one? Reach out.</p><br><p>⸻</p><br><p>🔗<strong> Social Links</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week on <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down <strong>CVE-2025-20393</strong>, a <strong>CVSS 10.0 zero-day vulnerability</strong> affecting <strong>Cisco Secure Email Gateway (SEG)</strong> and related AsyncOS-based email security products.</p><br><p>The flaw is actively exploited in the wild, remains <strong>unpatched</strong>, and—ironically—uses the <strong>spam filtering engine itself as the attack vector</strong>. With no user interaction required and evidence of nation-state activity, this vulnerability represents a worst-case scenario for organizations relying on Cisco’s email security stack.</p><br><p>If you run Cisco Secure Email Gateway or Email Security Appliances, this is an emergency-level issue that demands immediate attention.</p><br><p>⸻</p><br><p>📌<strong> Show Notes</strong></p><br><p>🚨<strong> CVE of the Week: CVE-2025-20393</strong></p><p>•<strong>Severity:</strong> CVSS 10.0 (Critical)</p><p>•<strong>Status:</strong> Actively exploited, <strong>no patch available</strong></p><p>•<strong>Vendor:</strong> Cisco</p><br><p>🎯<strong> Affected Products</strong></p><p>•<strong>Cisco Secure Email Gateway (SEG)</strong></p><p>•<strong>Cisco Email Security Appliance (ESA)</strong></p><p>•<strong>Cisco Secure Email and Web Manager (SEWM)</strong></p><p>•All affected systems run <strong>Cisco AsyncOS</strong></p><br><p>🔓<strong> How the Exploit Works</strong></p><p>•Attackers deliver a <strong>specially crafted email</strong> that is processed <strong>before</strong> a spam verdict is reached</p><p>•The payload is executed during <strong>email parsing, attachment handling, or content inspection</strong></p><p>•<strong>No user interaction required</strong></p><p>•The malicious email <strong>never needs to reach an inbox</strong></p><br><p>💥<strong> Real-World Impact</strong></p><p>•Full <strong>remote code execution</strong> on the email gateway</p><p>•<strong>Email interception and exfiltration</strong> (espionage risk)</p><p>•Persistent access for follow-on attacks</p><p>•Credential harvesting and downstream phishing using trusted infrastructure</p><p>•<strong>Log wiping</strong>, making detection extremely difficult</p><br><p>🌍<strong> Threat Activity</strong></p><p>•Exploits observed as early as <strong>November 2025</strong></p><p>•Linked to <strong>Chinese state-aligned actors</strong></p><p>•Tracked under <strong>UAT-9686</strong>, associated with groups such as <strong>APT41</strong> and <strong>UNC5174</strong></p><p>•Added to <strong>CISA’s Known Exploited Vulnerabilities (KEV) catalog</strong></p><br><p>🛡️<strong> Mitigation Guidance (No Patch Available)</strong></p><p>•Immediately restrict and segment management interfaces</p><p>•Tighten ACLs and allow lists</p><p>•Treat SEG as <strong>Tier-Zero-adjacent infrastructure</strong></p><p>•If compromise is suspected: <strong>full system rebuild required</strong></p><p>•Assume persistence due to log tampering</p><br><p>🧠<strong> Commentary</strong></p><p>•The exploit weaponizes the <strong>very system designed to stop malicious email</strong></p><p>•Lack of a patch from a vendor of Cisco’s size raises serious concerns</p><p>•For some organizations, this may prompt reevaluation of email security platforms altogether</p><br><p>⸻</p><br><p>🔚<strong> Wrap-Up &amp; Listener Feedback</strong></p><br><p>We want to thank listeners who continue to engage with the show and help shape the conversation:</p><p>•<strong>GFABasic32</strong> wrote:</p><p><em>“Thanks for the emergency update on n8n. I love the balance of technical deep dives and high-level strategy. You guys make keeping up with CVEs actually entertaining.”</em></p><p>•<strong>Dennis</strong> added:</p><p><em>“I love the CVE of the Week. These episodes are like exposure therapy.”</em></p><br><p>That’s exactly the goal—helping you face what’s happening in security so you can respond, not react.</p><br><p>Have thoughts on this CVE or want us to cover another one? Reach out.</p><br><p>⸻</p><br><p>🔗<strong> Social Links</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>CES Brings New CPUs, AI Agents, and Deep OS-Level Copilot Integration</title>
			<itunes:title>CES Brings New CPUs, AI Agents, and Deep OS-Level Copilot Integration</itunes:title>
			<pubDate>Mon, 12 Jan 2026 15:30:00 GMT</pubDate>
			<itunes:duration>23:27</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69650e7e75c092ac4efc9134/media.mp3" length="405445132" type="audio/mpeg"/>
			<guid isPermaLink="false">69650e7e75c092ac4efc9134</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e20</link>
			<acast:episodeId>69650e7e75c092ac4efc9134</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e20</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZyLYTL83KjnGoLogCNViCN/wXH9OkaQV6lKTOLvcnuBxW3O0zqusUwK7zAfh9OUzchPI0Xt0Cl0xQI7B0wDQ3W]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E20</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>20</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1768230420853-18a3a164-ea87-4dc5-a01a-fb2e1295de80.jpeg"/>
			<description><![CDATA[<p>CES may be a consumer show, but this week it sent shockwaves through enterprise IT. In this episode of <em>IT SPARC Cast – News Bytes</em>, John Barger and Lou Schmidt break down why nearly every major chip vendor chose CES to unveil next-generation CPUs, what Lenovo’s new agentic AI strategy means for IT teams, and why Microsoft embedding Copilot deep into Windows could fundamentally change how operating systems work.</p><br><p>From Intel’s attempt at a comeback, to AMD and Qualcomm’s positioning against NVIDIA, to growing concerns about trust, security, and AI agents living inside your OS, this episode separates meaningful signals from CES noise—and explains why power efficiency, autonomy, and control are becoming the real battlegrounds.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>John and Lou frame CES as the unexpected epicenter of enterprise IT announcements, explaining why CPUs, AI, and robotics dominated the show—and why IT teams should care.</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:54 – New CPUs Announced</strong></p><br><p>CES saw major CPU launches from Intel, AMD, Qualcomm, and NVIDIA—signaling a shift toward mainstream AI hardware announcements. Intel launched Panther Lake, AMD expanded Ryzen AI, Qualcomm pushed Snapdragon X2 for AI agents, and NVIDIA moved Rubin into full production.</p><br><p>⸻</p><br><p><strong>09:45 – Lenovo’s New AI Agent</strong></p><br><p>Lenovo unveiled <em>Qira</em>, an agentic AI designed to work across PCs, phones, wearables, and enterprise systems alongside Microsoft Copilot. The move highlights a growing push toward cross-device AI coordination—and raises questions about Apple’s closed ecosystem.</p><br><p>⸻</p><br><p><strong>12:40 – Microsoft Integrates Copilot Deep into Windows</strong></p><br><p>Microsoft is embedding AI agent launchers directly into Windows, allowing third-party applications to register system-wide AI agents. While this may keep operating systems relevant, it introduces serious trust and security concerns around deep OS-level access.</p><p>https://blogs.windows.com/windows-insider/2025/12/19/announcing-windows-11-insider-preview-build-26220-7522-dev-beta-channels/</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>19:03 – Mail Bag</strong></p><br><p>Listener feedback sparks a discussion on cloud outages, cost structures, and whether on-prem alternatives are becoming viable again for certain businesses.</p><br><p><strong>22:15 – Wrap Up</strong></p><br><p>John and Lou emphasize that resilience in the cloud is still possible—but only if organizations are willing to pay for it—and invite listeners to share what CES announcements stood out to them.</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>CES may be a consumer show, but this week it sent shockwaves through enterprise IT. In this episode of <em>IT SPARC Cast – News Bytes</em>, John Barger and Lou Schmidt break down why nearly every major chip vendor chose CES to unveil next-generation CPUs, what Lenovo’s new agentic AI strategy means for IT teams, and why Microsoft embedding Copilot deep into Windows could fundamentally change how operating systems work.</p><br><p>From Intel’s attempt at a comeback, to AMD and Qualcomm’s positioning against NVIDIA, to growing concerns about trust, security, and AI agents living inside your OS, this episode separates meaningful signals from CES noise—and explains why power efficiency, autonomy, and control are becoming the real battlegrounds.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>John and Lou frame CES as the unexpected epicenter of enterprise IT announcements, explaining why CPUs, AI, and robotics dominated the show—and why IT teams should care.</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:54 – New CPUs Announced</strong></p><br><p>CES saw major CPU launches from Intel, AMD, Qualcomm, and NVIDIA—signaling a shift toward mainstream AI hardware announcements. Intel launched Panther Lake, AMD expanded Ryzen AI, Qualcomm pushed Snapdragon X2 for AI agents, and NVIDIA moved Rubin into full production.</p><br><p>⸻</p><br><p><strong>09:45 – Lenovo’s New AI Agent</strong></p><br><p>Lenovo unveiled <em>Qira</em>, an agentic AI designed to work across PCs, phones, wearables, and enterprise systems alongside Microsoft Copilot. The move highlights a growing push toward cross-device AI coordination—and raises questions about Apple’s closed ecosystem.</p><br><p>⸻</p><br><p><strong>12:40 – Microsoft Integrates Copilot Deep into Windows</strong></p><br><p>Microsoft is embedding AI agent launchers directly into Windows, allowing third-party applications to register system-wide AI agents. While this may keep operating systems relevant, it introduces serious trust and security concerns around deep OS-level access.</p><p>https://blogs.windows.com/windows-insider/2025/12/19/announcing-windows-11-insider-preview-build-26220-7522-dev-beta-channels/</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>19:03 – Mail Bag</strong></p><br><p>Listener feedback sparks a discussion on cloud outages, cost structures, and whether on-prem alternatives are becoming viable again for certain businesses.</p><br><p><strong>22:15 – Wrap Up</strong></p><br><p>John and Lou emphasize that resilience in the cloud is still possible—but only if organizations are willing to pay for it—and invite listeners to share what CES announcements stood out to them.</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Ni8mare in n8n: CVSS 10 Workflow RCE Hitting Automation Platforms</title>
			<itunes:title>Ni8mare in n8n: CVSS 10 Workflow RCE Hitting Automation Platforms</itunes:title>
			<pubDate>Fri, 09 Jan 2026 17:39:32 GMT</pubDate>
			<itunes:duration>8:18</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69613d541f21449d6df3f875/media.mp3" length="143499448" type="audio/mpeg"/>
			<guid isPermaLink="false">69613d541f21449d6df3f875</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e19</link>
			<acast:episodeId>69613d541f21449d6df3f875</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e19</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Zl+zuv6Jai5K0jQwL3CyZu+TMeaQreOVIxvus8DxTu9M34Cpf4lpPMcl/MqYzUtKNV8tphj8o+swEO8ESrTOm0]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E19</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>19</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1767979981768-1649eacc-6cd4-4f00-98a8-61fa4af014d4.jpeg"/>
			<description><![CDATA[<p>In the first regular IT SPARC Cast - CVE of the Week episode of 2026, John &amp; Lou dive into a critical, actively exploitable vulnerability shaking the automation world. CVE-2026-21858—dubbed <em>Ni8mare</em>—targets the popular workflow automation platform <strong>n8n</strong>, earning a full <strong>CVSS 10.0</strong> due to unauthenticated remote code execution.</p><br><p>They break down how a content-type confusion bug inside n8n’s webhook processing engine allows attackers to fully compromise systems, why automation platforms are uniquely dangerous when breached, and what this means for enterprises running self-hosted or lightly governed internal tooling. The episode also highlights listener feedback and calls out a community-built React security tool worth checking out.</p><br><p>⸻</p><br><p><strong>Show Notes</strong></p><br><p><strong>CVE of the Week: n8n “Ni8mare” (CVE-2026-21858)</strong></p><p>•<strong>What is n8n?</strong></p><p>An open-source, self-hosted workflow automation platform similar to Zapier or Make, widely used in enterprise and regulated environments for visual API-driven automation.</p><p>•<strong>Severity &amp; Scope</strong></p><p>CVE-2026-21858 carries a <strong>CVSS 10.0</strong>, joining multiple recent n8n vulnerabilities rated 9.9–10.0. n8n has over <strong>200,000 deployments</strong> across cloud and on-prem environments.</p><p>•<strong>Technical Root Cause</strong></p><p>A content-type confusion flaw in webhook form-data handling allows attackers to bypass file validation and execute arbitrary code.</p><p>•<strong>Why This Is Dangerous</strong></p><p>Workflow engines often touch identity systems, APIs, credentials, and business logic—making them high-value targets with blast radii far beyond a single server.</p><p>•<strong>Enterprise Takeaway</strong></p><p>Shadow IT, internally built automation, and lightly governed enablement tools must be continuously audited. Patch known systems—and actively hunt for unknown ones.</p><br><p><a href="https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.html</a></p><br><p><strong>Listener Highlight</strong></p><p>Dennis called out the <strong>Ingram Micro ransomware outage</strong>, noting that he hadn’t realized just how disruptive that incident was. And he’s absolutely right—Ingram Micro going offline for roughly <strong>9–10 days</strong> created a nightmare scenario for <strong>VARs, system integrators, and build shops</strong> that rely on Ingram for ordering, RMAs, and emergency drop-ship replacements.</p><br><p>To put the scale in perspective, Ingram Micro processes an estimated <strong>$30–40 million per day</strong> in transactions. Even if some revenue was recovered later, the <strong>operational disruption, reputational damage, and downstream impact across the supply chain</strong> were massive. This is exactly why incidents like this belong in the conversation when we talk about real-world IT security failures.</p><br><p>Thanks for the thoughtful comment, Dennis—we genuinely appreciate the feedback and the conversation it sparked.</p><br><p><strong>Wrap Up &amp; Community Engagement</strong></p><br><p>This episode reinforces a core theme: automation without security oversight becomes an enterprise liability. IT teams must partner with business units—not just say “no”—while enforcing continuous audits and rapid patching.</p><br><p><strong>Follow &amp; Connect</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In the first regular IT SPARC Cast - CVE of the Week episode of 2026, John &amp; Lou dive into a critical, actively exploitable vulnerability shaking the automation world. CVE-2026-21858—dubbed <em>Ni8mare</em>—targets the popular workflow automation platform <strong>n8n</strong>, earning a full <strong>CVSS 10.0</strong> due to unauthenticated remote code execution.</p><br><p>They break down how a content-type confusion bug inside n8n’s webhook processing engine allows attackers to fully compromise systems, why automation platforms are uniquely dangerous when breached, and what this means for enterprises running self-hosted or lightly governed internal tooling. The episode also highlights listener feedback and calls out a community-built React security tool worth checking out.</p><br><p>⸻</p><br><p><strong>Show Notes</strong></p><br><p><strong>CVE of the Week: n8n “Ni8mare” (CVE-2026-21858)</strong></p><p>•<strong>What is n8n?</strong></p><p>An open-source, self-hosted workflow automation platform similar to Zapier or Make, widely used in enterprise and regulated environments for visual API-driven automation.</p><p>•<strong>Severity &amp; Scope</strong></p><p>CVE-2026-21858 carries a <strong>CVSS 10.0</strong>, joining multiple recent n8n vulnerabilities rated 9.9–10.0. n8n has over <strong>200,000 deployments</strong> across cloud and on-prem environments.</p><p>•<strong>Technical Root Cause</strong></p><p>A content-type confusion flaw in webhook form-data handling allows attackers to bypass file validation and execute arbitrary code.</p><p>•<strong>Why This Is Dangerous</strong></p><p>Workflow engines often touch identity systems, APIs, credentials, and business logic—making them high-value targets with blast radii far beyond a single server.</p><p>•<strong>Enterprise Takeaway</strong></p><p>Shadow IT, internally built automation, and lightly governed enablement tools must be continuously audited. Patch known systems—and actively hunt for unknown ones.</p><br><p><a href="https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.html</a></p><br><p><strong>Listener Highlight</strong></p><p>Dennis called out the <strong>Ingram Micro ransomware outage</strong>, noting that he hadn’t realized just how disruptive that incident was. And he’s absolutely right—Ingram Micro going offline for roughly <strong>9–10 days</strong> created a nightmare scenario for <strong>VARs, system integrators, and build shops</strong> that rely on Ingram for ordering, RMAs, and emergency drop-ship replacements.</p><br><p>To put the scale in perspective, Ingram Micro processes an estimated <strong>$30–40 million per day</strong> in transactions. Even if some revenue was recovered later, the <strong>operational disruption, reputational damage, and downstream impact across the supply chain</strong> were massive. This is exactly why incidents like this belong in the conversation when we talk about real-world IT security failures.</p><br><p>Thanks for the thoughtful comment, Dennis—we genuinely appreciate the feedback and the conversation it sparked.</p><br><p><strong>Wrap Up &amp; Community Engagement</strong></p><br><p>This episode reinforces a core theme: automation without security oversight becomes an enterprise liability. IT teams must partner with business units—not just say “no”—while enforcing continuous audits and rapid patching.</p><br><p><strong>Follow &amp; Connect</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>2026 Predictions: AI Reality Check, Quantum Breakthroughs, and the Next Cloud Reckoning</title>
			<itunes:title>2026 Predictions: AI Reality Check, Quantum Breakthroughs, and the Next Cloud Reckoning</itunes:title>
			<pubDate>Mon, 05 Jan 2026 15:30:00 GMT</pubDate>
			<itunes:duration>13:18</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/695bd03eb1ddb8392c3f1d92/media.mp3" length="229925788" type="audio/mpeg"/>
			<guid isPermaLink="false">695bd03eb1ddb8392c3f1d92</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e19</link>
			<acast:episodeId>695bd03eb1ddb8392c3f1d92</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e19</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bljGjyB5HETClRhIydR6uMi5BnwSL9jtAUyQPARLSzUtBKKrAwR8mB4R235W//FBuJy8zaSiPb+ob3GbDpbsoL]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E19</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>19</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1767624742639-37fe465c-c6b6-4551-b3bc-e152e5d67e11.jpeg"/>
			<description><![CDATA[<p>In this special predictions episode of <em>IT SPARC Cast – News Bytes</em>, John Barger and Lou Schmidt kick off 2026 by trading bold, unfiltered forecasts for enterprise IT, AI, cloud, energy, and geopolitics. With five predictions each—and no prior coordination—they round-robin through what they believe will define the next year in technology.</p><br><p>From the deflation of the AI hype cycle and Apple’s inevitable AI acquisition, to quantum computing entering nation-state playbooks, nuclear power reshaping data centers, and lawsuits finally challenging cloud provider accountability, this episode puts both hosts on the record. At the end of the year, they’ll revisit every prediction and grade themselves—so these takes are meant to age in public.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>John and Lou explain the format: ten total predictions for 2026, five each, shared live without coordination—and revisited at the end of the year for accountability.</p><br><p>⸻</p><br><p>🔮<strong> 2026 Predictions</strong></p><br><p><strong>01:09 – Lou: The AI Bubble Deflates</strong></p><br><p>AI investment cools as rationalization sets in—money keeps flowing, but weaker players and inflated expectations begin to fall away instead of a full collapse.</p><br><p><strong>01:29&nbsp;– John: Apple Acquires an AI / LLM Company</strong></p><br><p>Apple makes a major AI acquisition to avoid long-term dependence on competitors’ models and regain control over its AI strategy.</p><br><p><strong>02:53 – Lou: AI Starts to Get Really Useful</strong></p><br><p>AI shifts from hype to practical value, quietly improving everyday workflows and real-world systems rather than flashy demos.</p><br><p><strong>04:11 – John: Nation States Use Quantum Computing</strong></p><br><p>Evidence emerges that a nation-state is actively using quantum computing for espionage or cyber operations, even if never formally acknowledged.</p><br><p><strong>04:45 – Lou: AI Sneaks Into Places We Never Expected</strong></p><br><p>AI embeds itself into overlooked products and environments—especially AR, wearables, and location-aware systems—delivering small but meaningful gains.</p><br><p><strong>05:50 – John: Negative Reaction to OpenAI Hardware</strong></p><br><p>OpenAI’s hardware announcement is initially panned by the press and competitors, only to be vindicated later as its purpose becomes clear.</p><p>&nbsp;&nbsp;</p><p><strong>06:51 – Lou: Power Gets Real for Data Centers</strong></p><br><p>Energy—not chips—becomes the primary constraint for cloud and enterprise infrastructure, forcing new generation strategies into production.</p><br><p><strong>08:00 – John: Small Modular Nuclear Reactors Explode (In a Good Way)</strong></p><br><p>SMRs rapidly gain funding, deployments, and valuations as they become the only scalable answer to data center power demand.</p><br><p><strong>08:36 – Lou: The Privacy Environment Gets Weird</strong></p><br><p>Geopolitics, AI agents, and shifting borders create inconsistent and unpredictable privacy regimes across regions.</p><br><p><strong>10:11 – John: Lawsuits Over Cloud Outages</strong></p><br><p>Major lawsuits—possibly class actions—emerge after cloud outages cause real-world harm, forcing legal accountability for uptime failures.</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>11:58 – Wrap Up</strong></p><br><p>John and Lou invite listeners to submit their own 2026 predictions and commit to revisiting all forecasts at year’s end to see who was right.</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this special predictions episode of <em>IT SPARC Cast – News Bytes</em>, John Barger and Lou Schmidt kick off 2026 by trading bold, unfiltered forecasts for enterprise IT, AI, cloud, energy, and geopolitics. With five predictions each—and no prior coordination—they round-robin through what they believe will define the next year in technology.</p><br><p>From the deflation of the AI hype cycle and Apple’s inevitable AI acquisition, to quantum computing entering nation-state playbooks, nuclear power reshaping data centers, and lawsuits finally challenging cloud provider accountability, this episode puts both hosts on the record. At the end of the year, they’ll revisit every prediction and grade themselves—so these takes are meant to age in public.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>John and Lou explain the format: ten total predictions for 2026, five each, shared live without coordination—and revisited at the end of the year for accountability.</p><br><p>⸻</p><br><p>🔮<strong> 2026 Predictions</strong></p><br><p><strong>01:09 – Lou: The AI Bubble Deflates</strong></p><br><p>AI investment cools as rationalization sets in—money keeps flowing, but weaker players and inflated expectations begin to fall away instead of a full collapse.</p><br><p><strong>01:29&nbsp;– John: Apple Acquires an AI / LLM Company</strong></p><br><p>Apple makes a major AI acquisition to avoid long-term dependence on competitors’ models and regain control over its AI strategy.</p><br><p><strong>02:53 – Lou: AI Starts to Get Really Useful</strong></p><br><p>AI shifts from hype to practical value, quietly improving everyday workflows and real-world systems rather than flashy demos.</p><br><p><strong>04:11 – John: Nation States Use Quantum Computing</strong></p><br><p>Evidence emerges that a nation-state is actively using quantum computing for espionage or cyber operations, even if never formally acknowledged.</p><br><p><strong>04:45 – Lou: AI Sneaks Into Places We Never Expected</strong></p><br><p>AI embeds itself into overlooked products and environments—especially AR, wearables, and location-aware systems—delivering small but meaningful gains.</p><br><p><strong>05:50 – John: Negative Reaction to OpenAI Hardware</strong></p><br><p>OpenAI’s hardware announcement is initially panned by the press and competitors, only to be vindicated later as its purpose becomes clear.</p><p>&nbsp;&nbsp;</p><p><strong>06:51 – Lou: Power Gets Real for Data Centers</strong></p><br><p>Energy—not chips—becomes the primary constraint for cloud and enterprise infrastructure, forcing new generation strategies into production.</p><br><p><strong>08:00 – John: Small Modular Nuclear Reactors Explode (In a Good Way)</strong></p><br><p>SMRs rapidly gain funding, deployments, and valuations as they become the only scalable answer to data center power demand.</p><br><p><strong>08:36 – Lou: The Privacy Environment Gets Weird</strong></p><br><p>Geopolitics, AI agents, and shifting borders create inconsistent and unpredictable privacy regimes across regions.</p><br><p><strong>10:11 – John: Lawsuits Over Cloud Outages</strong></p><br><p>Major lawsuits—possibly class actions—emerge after cloud outages cause real-world harm, forcing legal accountability for uptime failures.</p><br><p>⸻</p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>11:58 – Wrap Up</strong></p><br><p>John and Lou invite listeners to submit their own 2026 predictions and commit to revisiting all forecasts at year’s end to see who was right.</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The 5 Biggest IT Security Failures of 2025 (Cloud, Ransomware, RCEs)</title>
			<itunes:title>The 5 Biggest IT Security Failures of 2025 (Cloud, Ransomware, RCEs)</itunes:title>
			<pubDate>Fri, 02 Jan 2026 15:30:00 GMT</pubDate>
			<itunes:duration>18:40</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6957d809c4b2cc952ca05446/media.mp3" length="322850620" type="audio/mpeg"/>
			<guid isPermaLink="false">6957d809c4b2cc952ca05446</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e18</link>
			<acast:episodeId>6957d809c4b2cc952ca05446</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e18</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YW3ONh/ra7XzGT3hvBdbZeIQOwR+kX+wjsQeINbjLmg/QuUOAMaDO+3Pp2qcE6pIaWZIzAurbmU3S+BLZyuEFO]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E18</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>18</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1767364562910-19c9c34e-26d9-4b90-9707-f02953e9bf2c.jpeg"/>
			<description><![CDATA[<p>n this special <strong>CVE Year in Review</strong> episode of IT SPARC Cast, John Barger and Lou Schmidt break from the usual single-CVE format to count down the <strong>five worst IT security failures of 2025</strong>.</p><br><p>From long-lived remote code execution flaws in enterprise networking gear, to a ransomware attack that shut down a global distributor, to systemic cloud outages that shattered the concept of “five nines” availability, this episode looks at what really went wrong—and why it matters heading into 2026.</p><br><p>These weren’t theoretical risks. They were real-world failures that disrupted supply chains, exposed critical infrastructure, and forced the industry to rethink assumptions about resilience, cloud reliability, and operational security.</p><br><p>⸻</p><br><p>📋<strong> Show Notes</strong></p><br><p>🔥<strong> Top 5 IT Security Fails of 2025</strong></p><br><p><strong>01:39 - #5 – Ruckus Networks</strong></p><p>Ruckus suffered from multiple long-lived remote code execution and authentication bypass vulnerabilities that persisted across 2024 and 2025. Impacted products included SmartZone, ZoneDirector, Cloudpath, and ICX switch management interfaces. Several flaws allowed unauthenticated access to management planes, enabling attackers to take over wireless controllers, push malicious firmware, and pivot deeper into enterprise networks. The lack of timely patches and limited communication made remediation especially painful for customers.</p><br><p><strong>04:32 - #4 – Ingram Micro</strong></p><p>A ransomware attack forced one of the world’s largest technology distributors to effectively shut down operations for days. Ordering systems went offline, patch access was disrupted, and thousands of downstream partners and customers were impacted. While it remains unclear whether ransom was paid, the incident highlighted how a single distributor outage can cascade across the IT supply chain, delaying hardware replacements, breaking SLAs, and costing millions in lost revenue.</p><br><p><strong>07:21 - #3 – SAP NetWeaver</strong></p><p>CVE-2025-31324 exposed a critical unauthenticated remote code execution flaw in SAP NetWeaver’s Visual Composer. Actively exploited in the wild before many organizations were aware of its existence, the vulnerability gave attackers potential access to finance, HR, procurement, and supply-chain data. For enterprises running SAP at the core of operations, successful exploitation meant full application takeover and deep visibility into business processes.</p><br><p><strong>10:26 - #2 – React</strong></p><p>A severe remote code execution issue in React sent shockwaves through the software ecosystem. With an estimated one-third of cloud applications depending on React, attackers were able to chain exploits involving dependency poisoning, build pipeline compromise, and even client-side execution. While patches were released quickly, the sheer scale of affected deployments meant many systems remained vulnerable well after disclosure—and some still are.</p><br><p><strong>12:23 - #1 – Cloud Outages</strong></p><p>2025 marked the year that “five nines” effectively died. Major outages across AWS, Microsoft Azure, Google Cloud, Microsoft 365, and IBM Cloud caused multi-hour disruptions affecting identity systems, collaboration tools, healthcare platforms, and public-safety infrastructure. Many incidents were caused not by attackers, but by control plane failures, DNS issues, NTP misconfigurations, and cascading dependencies. The result: billions in estimated financial impact and renewed concern over life-critical workloads running entirely in the cloud.</p><br><p>Watch Cloud SLA Theater: Why 99.999% Uptime Is a Joke in 2025 - <a href="https://www.youtube.com/watch?v=ygcYoFBXdjQ" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=ygcYoFBXdjQ</a></p><br><p>⸻</p><br><p><strong>17:19 - Wrap Up</strong></p><br><p>If you think we missed a major security failure—or disagree with our rankings—we want to hear from you. Reach out, leave a comment, or send us feedback. Your insights often shape future episodes.</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>X: @ITSPARCCast</p><p>LinkedIn: https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>X: @john_Video</p><p>LinkedIn: https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>X: @loudoggeek</p><p>LinkedIn: https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>n this special <strong>CVE Year in Review</strong> episode of IT SPARC Cast, John Barger and Lou Schmidt break from the usual single-CVE format to count down the <strong>five worst IT security failures of 2025</strong>.</p><br><p>From long-lived remote code execution flaws in enterprise networking gear, to a ransomware attack that shut down a global distributor, to systemic cloud outages that shattered the concept of “five nines” availability, this episode looks at what really went wrong—and why it matters heading into 2026.</p><br><p>These weren’t theoretical risks. They were real-world failures that disrupted supply chains, exposed critical infrastructure, and forced the industry to rethink assumptions about resilience, cloud reliability, and operational security.</p><br><p>⸻</p><br><p>📋<strong> Show Notes</strong></p><br><p>🔥<strong> Top 5 IT Security Fails of 2025</strong></p><br><p><strong>01:39 - #5 – Ruckus Networks</strong></p><p>Ruckus suffered from multiple long-lived remote code execution and authentication bypass vulnerabilities that persisted across 2024 and 2025. Impacted products included SmartZone, ZoneDirector, Cloudpath, and ICX switch management interfaces. Several flaws allowed unauthenticated access to management planes, enabling attackers to take over wireless controllers, push malicious firmware, and pivot deeper into enterprise networks. The lack of timely patches and limited communication made remediation especially painful for customers.</p><br><p><strong>04:32 - #4 – Ingram Micro</strong></p><p>A ransomware attack forced one of the world’s largest technology distributors to effectively shut down operations for days. Ordering systems went offline, patch access was disrupted, and thousands of downstream partners and customers were impacted. While it remains unclear whether ransom was paid, the incident highlighted how a single distributor outage can cascade across the IT supply chain, delaying hardware replacements, breaking SLAs, and costing millions in lost revenue.</p><br><p><strong>07:21 - #3 – SAP NetWeaver</strong></p><p>CVE-2025-31324 exposed a critical unauthenticated remote code execution flaw in SAP NetWeaver’s Visual Composer. Actively exploited in the wild before many organizations were aware of its existence, the vulnerability gave attackers potential access to finance, HR, procurement, and supply-chain data. For enterprises running SAP at the core of operations, successful exploitation meant full application takeover and deep visibility into business processes.</p><br><p><strong>10:26 - #2 – React</strong></p><p>A severe remote code execution issue in React sent shockwaves through the software ecosystem. With an estimated one-third of cloud applications depending on React, attackers were able to chain exploits involving dependency poisoning, build pipeline compromise, and even client-side execution. While patches were released quickly, the sheer scale of affected deployments meant many systems remained vulnerable well after disclosure—and some still are.</p><br><p><strong>12:23 - #1 – Cloud Outages</strong></p><p>2025 marked the year that “five nines” effectively died. Major outages across AWS, Microsoft Azure, Google Cloud, Microsoft 365, and IBM Cloud caused multi-hour disruptions affecting identity systems, collaboration tools, healthcare platforms, and public-safety infrastructure. Many incidents were caused not by attackers, but by control plane failures, DNS issues, NTP misconfigurations, and cascading dependencies. The result: billions in estimated financial impact and renewed concern over life-critical workloads running entirely in the cloud.</p><br><p>Watch Cloud SLA Theater: Why 99.999% Uptime Is a Joke in 2025 - <a href="https://www.youtube.com/watch?v=ygcYoFBXdjQ" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=ygcYoFBXdjQ</a></p><br><p>⸻</p><br><p><strong>17:19 - Wrap Up</strong></p><br><p>If you think we missed a major security failure—or disagree with our rankings—we want to hear from you. Reach out, leave a comment, or send us feedback. Your insights often shape future episodes.</p><br><p>🔗<strong> Connect With Us</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>X: @ITSPARCCast</p><p>LinkedIn: https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>X: @john_Video</p><p>LinkedIn: https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>X: @loudoggeek</p><p>LinkedIn: https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>CEOs Double Down on AI, Crystal Storage Goes Mainstream, and Coursera Buys Udemy</title>
			<itunes:title>CEOs Double Down on AI, Crystal Storage Goes Mainstream, and Coursera Buys Udemy</itunes:title>
			<pubDate>Mon, 22 Dec 2025 15:16:36 GMT</pubDate>
			<itunes:duration>20:40</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/694960d4e2b7985fa238df83/media.mp3" length="357349084" type="audio/mpeg"/>
			<guid isPermaLink="false">694960d4e2b7985fa238df83</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e18</link>
			<acast:episodeId>694960d4e2b7985fa238df83</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e18</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Z/28DNWTB0OLjMG+5RvLIAj2+RgqjJzpzN+l6kl9xLIaefolxSOc64aciXlksc7xeFLPBIk/NtjwX0aO40EPvF]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E18</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>18</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1766416288279-02cfc75b-0d35-4f6d-948f-e75fe803599b.jpeg"/>
			<description><![CDATA[<p>This week on IT SPARC Cast, John Barger and Lou Schmidt break down three stories shaping the future of enterprise IT—from continued AI spending despite questionable ROI, to radically new approaches to long-term data storage, and a major consolidation in the online learning market.</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:46&nbsp;– CEOs Keep Spending on AI Despite Spotty Returns</strong></p><br><p>Despite mixed financial outcomes, a growing number of CEOs plan to <strong>increase AI investment through 2026</strong>, viewing AI as strategically unavoidable rather than immediately profitable.</p><br><p>Key discussion points:</p><p>•Fewer than half of current AI projects are delivering clear ROI</p><p>•Strong gains in <strong>sales, marketing, customer service, and developer productivity</strong></p><p>•Weak performance in <strong>regulated, high-risk areas</strong> like legal, HR, compliance, and cybersecurity</p><p>•Layoffs blamed on AI may result in long-term operational backlash</p><br><p>The hosts argue that AI should <strong>augment human expertise</strong>, not prematurely replace it—and warn against betting the company on incomplete automation strategies.</p><br><p><a href="https://www.msn.com/en-us/technology/artificial-intelligence/ceos-to-keep-spending-on-ai-despite-spotty-returns/ar-AA1SkMcE" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/technology/artificial-intelligence/ceos-to-keep-spending-on-ai-despite-spotty-returns/ar-AA1SkMcE</a></p><br><p><strong>07:34 – 5D Glass Storage: Crystals for the Enterprise</strong></p><br><p>A UK company, SPhotonix, is advancing <strong>5D glass storage</strong>, capable of preserving data for <strong>billions of years</strong> by etching nanoscale structures into glass using femtosecond lasers.</p><br><p>Highlights include:</p><p>•<strong>360 TB per 5-inch glass disk</strong></p><p>•Designed for <strong>permanent archival</strong>, not hot or warm storage</p><p>•Potential replacement for long-term tape archives</p><p>•Early write speeds are slow, but roadmap improvements are promising</p><br><p>This technology positions itself as a future-proof solution for enterprises, governments, universities, and cultural institutions facing long-term data retention challenges.</p><br><p><a href="https://www.tomshardware.com/pc-components/storage/sphotonix-pushes-5d-glass-storage-toward-data-center-pilots" rel="noopener noreferrer" target="_blank">https://www.tomshardware.com/pc-components/storage/sphotonix-pushes-5d-glass-storage-toward-data-center-pilots</a></p><br><p><strong>15:00 – Coursera Acquires Udemy for $930 Million</strong></p><br><p>Online education giant <a href="about:blank" rel="noopener noreferrer" target="_blank"><strong>Coursera</strong></a> is acquiring <a href="about:blank" rel="noopener noreferrer" target="_blank"><strong>Udemy</strong></a> in a deal valued at approximately <strong>$930 million</strong>, creating a dominant force in enterprise and consumer e-learning.</p><br><p>Discussion points:</p><p>•Udemy’s strong practitioner-led course model</p><p>•Coursera’s academic and credentialing reach</p><p>•Expanded use of AI for assessments, personalization, and skills validation</p><p>•Potential shift toward a “market-driven university” model</p><br><p>The hosts see this consolidation as a net positive for enterprise IT teams responsible for compliance training, upskilling, and leadership development.</p><br><p><a href="https://techcrunch.com/2025/12/17/coursera-and-udemy-enter-a-merger-agreement-valued-at-around-2-5b/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/12/17/coursera-and-udemy-enter-a-merger-agreement-valued-at-around-2-5b/</a></p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>20:00 – Listener Feedback</strong></p><br><p>⭐<strong> Community Call-Out: Abdullah’s React Audit Tool</strong></p><br><p>A special shout-out to <strong>Abdullah</strong> <strong>( </strong>https://x.com/ozkayabd<strong> )</strong> who responded on X after a previous React CVE episode and shared an open-source tool to help teams audit their environments:</p><br><p>👉 <strong>React Audit Scanner</strong></p><p>http://rsc-auditor.vercel.app</p><br><p>This tool allows teams to quickly check whether they may be impacted by recent React vulnerabilities. As always, review and validate any third-party tool before using it in production.</p><br><p>A special shout-out to <strong>Megan</strong>, who reached out after the episode with thoughtful feedback—and who’s doing important work to tackle a problem far too many people experience: <strong>ghosting of job applicants by recruiters and HR teams</strong>.</p><br><p>Megan is actively pushing for better communication, transparency, and basic professionalism in the hiring process. It’s a reminder that while we talk a lot about AI, automation, and efficiency, the human side of tech and hiring still matters.&nbsp;Follow her on LinkedIn:</p><br><p><a href="https://www.linkedin.com/in/megan-juliano?utm_source=share&amp;utm_campaign=share_via&amp;utm_content=profile&amp;utm_medium=ios_app" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/megan-juliano</a></p><br><p><strong>Connect with the hosts and the show:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week on IT SPARC Cast, John Barger and Lou Schmidt break down three stories shaping the future of enterprise IT—from continued AI spending despite questionable ROI, to radically new approaches to long-term data storage, and a major consolidation in the online learning market.</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:46&nbsp;– CEOs Keep Spending on AI Despite Spotty Returns</strong></p><br><p>Despite mixed financial outcomes, a growing number of CEOs plan to <strong>increase AI investment through 2026</strong>, viewing AI as strategically unavoidable rather than immediately profitable.</p><br><p>Key discussion points:</p><p>•Fewer than half of current AI projects are delivering clear ROI</p><p>•Strong gains in <strong>sales, marketing, customer service, and developer productivity</strong></p><p>•Weak performance in <strong>regulated, high-risk areas</strong> like legal, HR, compliance, and cybersecurity</p><p>•Layoffs blamed on AI may result in long-term operational backlash</p><br><p>The hosts argue that AI should <strong>augment human expertise</strong>, not prematurely replace it—and warn against betting the company on incomplete automation strategies.</p><br><p><a href="https://www.msn.com/en-us/technology/artificial-intelligence/ceos-to-keep-spending-on-ai-despite-spotty-returns/ar-AA1SkMcE" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/technology/artificial-intelligence/ceos-to-keep-spending-on-ai-despite-spotty-returns/ar-AA1SkMcE</a></p><br><p><strong>07:34 – 5D Glass Storage: Crystals for the Enterprise</strong></p><br><p>A UK company, SPhotonix, is advancing <strong>5D glass storage</strong>, capable of preserving data for <strong>billions of years</strong> by etching nanoscale structures into glass using femtosecond lasers.</p><br><p>Highlights include:</p><p>•<strong>360 TB per 5-inch glass disk</strong></p><p>•Designed for <strong>permanent archival</strong>, not hot or warm storage</p><p>•Potential replacement for long-term tape archives</p><p>•Early write speeds are slow, but roadmap improvements are promising</p><br><p>This technology positions itself as a future-proof solution for enterprises, governments, universities, and cultural institutions facing long-term data retention challenges.</p><br><p><a href="https://www.tomshardware.com/pc-components/storage/sphotonix-pushes-5d-glass-storage-toward-data-center-pilots" rel="noopener noreferrer" target="_blank">https://www.tomshardware.com/pc-components/storage/sphotonix-pushes-5d-glass-storage-toward-data-center-pilots</a></p><br><p><strong>15:00 – Coursera Acquires Udemy for $930 Million</strong></p><br><p>Online education giant <a href="about:blank" rel="noopener noreferrer" target="_blank"><strong>Coursera</strong></a> is acquiring <a href="about:blank" rel="noopener noreferrer" target="_blank"><strong>Udemy</strong></a> in a deal valued at approximately <strong>$930 million</strong>, creating a dominant force in enterprise and consumer e-learning.</p><br><p>Discussion points:</p><p>•Udemy’s strong practitioner-led course model</p><p>•Coursera’s academic and credentialing reach</p><p>•Expanded use of AI for assessments, personalization, and skills validation</p><p>•Potential shift toward a “market-driven university” model</p><br><p>The hosts see this consolidation as a net positive for enterprise IT teams responsible for compliance training, upskilling, and leadership development.</p><br><p><a href="https://techcrunch.com/2025/12/17/coursera-and-udemy-enter-a-merger-agreement-valued-at-around-2-5b/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/12/17/coursera-and-udemy-enter-a-merger-agreement-valued-at-around-2-5b/</a></p><br><p>🔁<strong> Wrap Up</strong></p><br><p><strong>20:00 – Listener Feedback</strong></p><br><p>⭐<strong> Community Call-Out: Abdullah’s React Audit Tool</strong></p><br><p>A special shout-out to <strong>Abdullah</strong> <strong>( </strong>https://x.com/ozkayabd<strong> )</strong> who responded on X after a previous React CVE episode and shared an open-source tool to help teams audit their environments:</p><br><p>👉 <strong>React Audit Scanner</strong></p><p>http://rsc-auditor.vercel.app</p><br><p>This tool allows teams to quickly check whether they may be impacted by recent React vulnerabilities. As always, review and validate any third-party tool before using it in production.</p><br><p>A special shout-out to <strong>Megan</strong>, who reached out after the episode with thoughtful feedback—and who’s doing important work to tackle a problem far too many people experience: <strong>ghosting of job applicants by recruiters and HR teams</strong>.</p><br><p>Megan is actively pushing for better communication, transparency, and basic professionalism in the hiring process. It’s a reminder that while we talk a lot about AI, automation, and efficiency, the human side of tech and hiring still matters.&nbsp;Follow her on LinkedIn:</p><br><p><a href="https://www.linkedin.com/in/megan-juliano?utm_source=share&amp;utm_campaign=share_via&amp;utm_content=profile&amp;utm_medium=ios_app" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/megan-juliano</a></p><br><p><strong>Connect with the hosts and the show:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Microsoft Disables RC4: Why This Legacy Cipher Had to Die</title>
			<itunes:title>Microsoft Disables RC4: Why This Legacy Cipher Had to Die</itunes:title>
			<pubDate>Fri, 19 Dec 2025 15:30:00 GMT</pubDate>
			<itunes:duration>9:01</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/694568519ff9a18986b76876/media.mp3" length="103952284" type="audio/mpeg"/>
			<guid isPermaLink="false">694568519ff9a18986b76876</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e17</link>
			<acast:episodeId>694568519ff9a18986b76876</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e17</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YoJMRIgLy2liwQxe9HmMKadSXkj7O675nKpLo5qle77tcR4hlMDqwirR7U/YFlKG7/tVFuzFLTxT9m4SDu31hz]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E17</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>17</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1766156168386-f81518ad-be06-451e-b862-44c759469b83.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down a long-overdue security move from Microsoft: disabling the RC4 cipher by default across Windows authentication infrastructure. After more than two decades of known cryptographic weaknesses, RC4 is finally being deprecated in favor of modern encryption standards like AES.</p><br><p>The discussion covers why RC4 persisted for so long, how legacy Active Directory and Kerberos environments kept it alive, and why attackers have continued to exploit it through techniques like Kerberoasting. The hosts also highlight the new logging, auditing, and PowerShell tools Microsoft released to help enterprises identify and eliminate lingering RC4 dependencies—without breaking production systems.</p><br><p>⸻</p><br><p>📋<strong> Show Notes</strong></p><br><p>🔐<strong> Main Topic: Microsoft Disables RC4 by Default</strong></p><p>•Microsoft is removing RC4 (Rivest Cipher 4) as a default cipher in Windows authentication after more than 25 years.</p><p>•RC4 has been known to be cryptographically broken for decades and has been actively exploited in real-world attacks.</p><p>•The change impacts Kerberos authentication across Windows Server 2008 and later.</p><p>•RC4 will still function <strong>only if explicitly re-enabled</strong>—which is strongly discouraged.</p><br><p>⚠️<strong> Why RC4 Is Dangerous</strong></p><p>•RC4 has been abused in <strong>Kerberoasting attacks</strong> against Active Directory environments.</p><p>•Weak encryption allows attackers to extract service account credentials offline.</p><p>•Keeping RC4 enabled significantly increases the blast radius of a compromised domain.</p><br><p>🛠️<strong> What Microsoft Did Right This Time</strong></p><p>•Added enhanced Kerberos logging (Event IDs <strong>4768</strong> and <strong>4769</strong>) to identify RC4 usage.</p><p>•Released PowerShell scripts to audit domain controllers for RC4 dependencies.</p><p>•Published clear migration guidance to move environments to <strong>AES-SHA1</strong> and stronger encryption.</p><p>•Provided visibility <em>before</em> enforcing the change, helping admins avoid outages.</p><br><p>🎧<strong> Listener Feedback Highlight</strong></p><p>•A YouTube listener praised the CVE of the Week format as being highly valuable from an ops and security standpoint.</p><p>•Strong validation that actionable vulnerability analysis resonates with enterprise IT teams.</p><br><p>⭐<strong> Community Call-Out: Abdullah’s React Audit Tool</strong></p><br><p>A special shout-out to <strong>Abdullah ( </strong>https://x.com/ozkayabd<strong> )</strong> who responded on X after a previous React CVE episode and shared an open-source tool to help teams audit their environments:</p><br><p>👉 <strong>React Audit Scanner</strong></p><p>http://rsc-auditor.vercel.app</p><br><p>This tool allows teams to quickly check whether they may be impacted by recent React vulnerabilities. As always, review and validate any third-party tool before using it in production.</p><br><p>⸻</p><br><p>🔚<strong> Wrap Up &amp; Social Links</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down a long-overdue security move from Microsoft: disabling the RC4 cipher by default across Windows authentication infrastructure. After more than two decades of known cryptographic weaknesses, RC4 is finally being deprecated in favor of modern encryption standards like AES.</p><br><p>The discussion covers why RC4 persisted for so long, how legacy Active Directory and Kerberos environments kept it alive, and why attackers have continued to exploit it through techniques like Kerberoasting. The hosts also highlight the new logging, auditing, and PowerShell tools Microsoft released to help enterprises identify and eliminate lingering RC4 dependencies—without breaking production systems.</p><br><p>⸻</p><br><p>📋<strong> Show Notes</strong></p><br><p>🔐<strong> Main Topic: Microsoft Disables RC4 by Default</strong></p><p>•Microsoft is removing RC4 (Rivest Cipher 4) as a default cipher in Windows authentication after more than 25 years.</p><p>•RC4 has been known to be cryptographically broken for decades and has been actively exploited in real-world attacks.</p><p>•The change impacts Kerberos authentication across Windows Server 2008 and later.</p><p>•RC4 will still function <strong>only if explicitly re-enabled</strong>—which is strongly discouraged.</p><br><p>⚠️<strong> Why RC4 Is Dangerous</strong></p><p>•RC4 has been abused in <strong>Kerberoasting attacks</strong> against Active Directory environments.</p><p>•Weak encryption allows attackers to extract service account credentials offline.</p><p>•Keeping RC4 enabled significantly increases the blast radius of a compromised domain.</p><br><p>🛠️<strong> What Microsoft Did Right This Time</strong></p><p>•Added enhanced Kerberos logging (Event IDs <strong>4768</strong> and <strong>4769</strong>) to identify RC4 usage.</p><p>•Released PowerShell scripts to audit domain controllers for RC4 dependencies.</p><p>•Published clear migration guidance to move environments to <strong>AES-SHA1</strong> and stronger encryption.</p><p>•Provided visibility <em>before</em> enforcing the change, helping admins avoid outages.</p><br><p>🎧<strong> Listener Feedback Highlight</strong></p><p>•A YouTube listener praised the CVE of the Week format as being highly valuable from an ops and security standpoint.</p><p>•Strong validation that actionable vulnerability analysis resonates with enterprise IT teams.</p><br><p>⭐<strong> Community Call-Out: Abdullah’s React Audit Tool</strong></p><br><p>A special shout-out to <strong>Abdullah ( </strong>https://x.com/ozkayabd<strong> )</strong> who responded on X after a previous React CVE episode and shared an open-source tool to help teams audit their environments:</p><br><p>👉 <strong>React Audit Scanner</strong></p><p>http://rsc-auditor.vercel.app</p><br><p>This tool allows teams to quickly check whether they may be impacted by recent React vulnerabilities. As always, review and validate any third-party tool before using it in production.</p><br><p>⸻</p><br><p>🔚<strong> Wrap Up &amp; Social Links</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>AI Layoffs, Data Centers in Space, Jet Engines for Power, and Google’s MCP Play</title>
			<itunes:title>AI Layoffs, Data Centers in Space, Jet Engines for Power, and Google’s MCP Play</itunes:title>
			<pubDate>Mon, 15 Dec 2025 16:30:00 GMT</pubDate>
			<itunes:duration>23:18</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6940355158c537ceb61f2a9b/media.mp3" length="402826516" type="audio/mpeg"/>
			<guid isPermaLink="false">6940355158c537ceb61f2a9b</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e17</link>
			<acast:episodeId>6940355158c537ceb61f2a9b</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e17</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YZLnOJtL1ntE+Aabtx7qY9FNqW/WJcYlu9YWgL2Z/MZ1fWqh6u20FvjilZ6mpWlHleDmyBZQnH5P6PrqS5Gjys]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E17</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>17</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1765815320164-646a8410-5c81-45e3-b894-e84aebb6d822.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou tackle one of the most emotionally charged weeks in enterprise IT. Google CEO Sundar Pichai openly acknowledges that AI-driven layoffs will cause real pain before progress—a statement that sparks a candid Hot Take on disruption, job loss, and opportunity.</p><br><p>From there, the show dives deep into the mounting backlash against U.S. data centers, with over 200 environmental groups demanding a halt to new builds—ironically accelerating plans for orbital data centers. The conversation then turns optimistic as the inventor of the Super Soaker unveils a breakthrough technology that converts waste heat directly into electricity, potentially reshaping geothermal and data center power economics.</p><br><p>Finally, the guys explore Boom Supersonic’s unexpected pivot—using jet engines as grid-scale power generators for data centers—and Google’s launch of managed MCP servers that allow AI agents to plug directly into core Google services with minimal integration effort.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>This week: Google admits AI pain is coming, environmentalists push data centers toward orbit, waste heat becomes power, and AI agents get a universal plug.</p><br><p>⸻</p><br><p><strong>HOT TAKE</strong></p><br><p><strong>00:55 – Google CEO on AI Layoffs: “We’re All Going to Have to Suffer Through It”</strong></p><p>•Sundar Pichai acknowledges widespread layoffs and economic strain tied to AI adoption.</p><p>•John and Lou discuss why AI-driven efficiency gains are being used as justification for premature workforce cuts.</p><p>•Key argument: AI doesn’t replace people—it amplifies small teams and enables entrepreneurship.</p><p><a href="https://www.msn.com/en-us/money/companies/google-ceo-says-we-re-all-going-to-have-to-suffer-through-it-as-ai-puts-society-through-the-woodchipper/ar-AA1S5Pzx" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/money/companies/google-ceo-says-we-re-all-going-to-have-to-suffer-through-it-as-ai-puts-society-through-the-woodchipper/ar-AA1S5Pzx</a>&nbsp;</p><br><p>⸻</p><br><p><strong>NEWS BYTES</strong></p><br><p><strong>06:11 – More Than 200 Environmental Groups Demand Halt to New U.S. Data Centers</strong></p><p>•Greenpeace and others cite water usage, power demand, and CO₂ emissions.</p><p>•~$64 billion in data center projects already delayed or halted.</p><p>•Lou explains why this pressure is accelerating interest in <strong>orbital data centers</strong>—one FCC license vs. hundreds of local permits.</p><p><a href="https://www.theguardian.com/us-news/2025/dec/08/us-data-centers" rel="noopener noreferrer" target="_blank">https://www.theguardian.com/us-news/2025/dec/08/us-data-centers</a>&nbsp;</p><br><p>⸻</p><br><p><strong>10:26 – Super Soaker Inventor Wants to Turn Waste Heat into Electricity</strong></p><p>•Lonnie Johnson (inventor of the Super Soaker) unveils the <strong>Johnson Thermal Electrochemical Converter (JTEC)</strong>.</p><p>•Works with small temperature differentials—no turbines, no moving parts.</p><p>•Could dramatically change how data centers source supplemental power.</p><p><a href="https://www.ajc.com/business/2025/11/earth-needs-more-energy-atlantas-super-soaker-creator-may-have-a-solution/" rel="noopener noreferrer" target="_blank">https://www.ajc.com/business/2025/11/earth-needs-more-energy-atlantas-super-soaker-creator-may-have-a-solution/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>13:08 – Boom Supersonic Uses Jet Engines to Power Data Centers</strong></p><p>•Boom Supersonic repurposes its jet engine designs into <strong>natural gas turbines</strong> for data centers.</p><p>•Each turbine outputs ~42 MW; initial orders exceed 1.2 GW and are rapidly increasing.</p><p>•First deliveries expected in 2027; turbine factory opening next year.</p><p>•John and Lou connect this to job creation across manufacturing, operations, and IT management.</p><p><a href="https://techcrunch.com/2025/12/10/google-is-going-all-in-on-mcp-servers-agent-ready-by-design/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/12/10/google-is-going-all-in-on-mcp-servers-agent-ready-by-design/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>16:44 – Google Launches Managed MCP Servers for AI Agents</strong></p><p>•Google introduces <strong>managed Model Context Protocol (MCP) servers</strong> on GCP.</p><p>•MCP creates a universal “language” for AI agents to interact with tools and services.</p><p>•Reduces API complexity—ask questions, get results, take action.</p><p>•Free during public preview for enterprise customers.</p><p>•Lou calls this a major step toward AI-native enterprise workflows.</p><p><a href="https://techcrunch.com/2025/12/10/google-is-going-all-in-on-mcp-servers-agent-ready-by-design/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/12/10/google-is-going-all-in-on-mcp-servers-agent-ready-by-design/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>Wrap Up</strong></p><br><p><strong>20:38 – Mail Bag &amp; Wrap Up</strong></p><p>•Listener feedback highlights interest in portable and containerized data centers.</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou tackle one of the most emotionally charged weeks in enterprise IT. Google CEO Sundar Pichai openly acknowledges that AI-driven layoffs will cause real pain before progress—a statement that sparks a candid Hot Take on disruption, job loss, and opportunity.</p><br><p>From there, the show dives deep into the mounting backlash against U.S. data centers, with over 200 environmental groups demanding a halt to new builds—ironically accelerating plans for orbital data centers. The conversation then turns optimistic as the inventor of the Super Soaker unveils a breakthrough technology that converts waste heat directly into electricity, potentially reshaping geothermal and data center power economics.</p><br><p>Finally, the guys explore Boom Supersonic’s unexpected pivot—using jet engines as grid-scale power generators for data centers—and Google’s launch of managed MCP servers that allow AI agents to plug directly into core Google services with minimal integration effort.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 – Intro</strong></p><br><p>This week: Google admits AI pain is coming, environmentalists push data centers toward orbit, waste heat becomes power, and AI agents get a universal plug.</p><br><p>⸻</p><br><p><strong>HOT TAKE</strong></p><br><p><strong>00:55 – Google CEO on AI Layoffs: “We’re All Going to Have to Suffer Through It”</strong></p><p>•Sundar Pichai acknowledges widespread layoffs and economic strain tied to AI adoption.</p><p>•John and Lou discuss why AI-driven efficiency gains are being used as justification for premature workforce cuts.</p><p>•Key argument: AI doesn’t replace people—it amplifies small teams and enables entrepreneurship.</p><p><a href="https://www.msn.com/en-us/money/companies/google-ceo-says-we-re-all-going-to-have-to-suffer-through-it-as-ai-puts-society-through-the-woodchipper/ar-AA1S5Pzx" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/money/companies/google-ceo-says-we-re-all-going-to-have-to-suffer-through-it-as-ai-puts-society-through-the-woodchipper/ar-AA1S5Pzx</a>&nbsp;</p><br><p>⸻</p><br><p><strong>NEWS BYTES</strong></p><br><p><strong>06:11 – More Than 200 Environmental Groups Demand Halt to New U.S. Data Centers</strong></p><p>•Greenpeace and others cite water usage, power demand, and CO₂ emissions.</p><p>•~$64 billion in data center projects already delayed or halted.</p><p>•Lou explains why this pressure is accelerating interest in <strong>orbital data centers</strong>—one FCC license vs. hundreds of local permits.</p><p><a href="https://www.theguardian.com/us-news/2025/dec/08/us-data-centers" rel="noopener noreferrer" target="_blank">https://www.theguardian.com/us-news/2025/dec/08/us-data-centers</a>&nbsp;</p><br><p>⸻</p><br><p><strong>10:26 – Super Soaker Inventor Wants to Turn Waste Heat into Electricity</strong></p><p>•Lonnie Johnson (inventor of the Super Soaker) unveils the <strong>Johnson Thermal Electrochemical Converter (JTEC)</strong>.</p><p>•Works with small temperature differentials—no turbines, no moving parts.</p><p>•Could dramatically change how data centers source supplemental power.</p><p><a href="https://www.ajc.com/business/2025/11/earth-needs-more-energy-atlantas-super-soaker-creator-may-have-a-solution/" rel="noopener noreferrer" target="_blank">https://www.ajc.com/business/2025/11/earth-needs-more-energy-atlantas-super-soaker-creator-may-have-a-solution/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>13:08 – Boom Supersonic Uses Jet Engines to Power Data Centers</strong></p><p>•Boom Supersonic repurposes its jet engine designs into <strong>natural gas turbines</strong> for data centers.</p><p>•Each turbine outputs ~42 MW; initial orders exceed 1.2 GW and are rapidly increasing.</p><p>•First deliveries expected in 2027; turbine factory opening next year.</p><p>•John and Lou connect this to job creation across manufacturing, operations, and IT management.</p><p><a href="https://techcrunch.com/2025/12/10/google-is-going-all-in-on-mcp-servers-agent-ready-by-design/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/12/10/google-is-going-all-in-on-mcp-servers-agent-ready-by-design/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>16:44 – Google Launches Managed MCP Servers for AI Agents</strong></p><p>•Google introduces <strong>managed Model Context Protocol (MCP) servers</strong> on GCP.</p><p>•MCP creates a universal “language” for AI agents to interact with tools and services.</p><p>•Reduces API complexity—ask questions, get results, take action.</p><p>•Free during public preview for enterprise customers.</p><p>•Lou calls this a major step toward AI-native enterprise workflows.</p><p><a href="https://techcrunch.com/2025/12/10/google-is-going-all-in-on-mcp-servers-agent-ready-by-design/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/12/10/google-is-going-all-in-on-mcp-servers-agent-ready-by-design/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>Wrap Up</strong></p><br><p><strong>20:38 – Mail Bag &amp; Wrap Up</strong></p><p>•Listener feedback highlights interest in portable and containerized data centers.</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>React Server Components Under Active Exploit: CVE-2025-55182 Goes Code Red</title>
			<itunes:title>React Server Components Under Active Exploit: CVE-2025-55182 Goes Code Red</itunes:title>
			<pubDate>Fri, 12 Dec 2025 16:00:00 GMT</pubDate>
			<itunes:duration>9:21</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/693c380e41eacf5e8128cfef/media.mp3" length="161793724" type="audio/mpeg"/>
			<guid isPermaLink="false">693c380e41eacf5e8128cfef</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e16</link>
			<acast:episodeId>693c380e41eacf5e8128cfef</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e16</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7a9jtgN220egxYnemxtgVCK8r/Rn+iCZODXKw/Ndzf7iD+kUmGtssXVGxpnQbDFrKjN93LGvHu7zo20qMrkRO8a]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E16</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>16</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1765553918122-a8e3aa54-77ea-42be-bb7b-6e597afd9726.jpeg"/>
			<description><![CDATA[<p>This week on <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down a <strong>code-red security situation</strong> affecting a massive portion of the modern web. CVE-2025-55182 is a critical, actively exploited vulnerability in <strong>React Server Components (RSC)</strong> that enables <strong>unauthenticated remote code execution</strong>, even in applications that don’t explicitly use server functions.</p><br><p>With an estimated <strong>33–35% of cloud-based services running React</strong>, attackers are already leveraging automated tooling to deploy cryptominers, Linux backdoors, and persistent malware across vulnerable systems. If you run React, Next.js, or containerized web workloads, this episode outlines exactly <strong>why this exploit is so dangerous, how attackers are weaponizing it, and what you must do right now to mitigate risk</strong>—from emergency patching to Zero Trust and micro-segmentation strategies.</p><br><p>⸻</p><br><p><strong>Show Notes</strong></p><p>🔴<strong> CVE of the Week: CVE-2025-55182 (React Server Components RCE)</strong></p><br><p>In this episode, John and Lou sound the alarm on a <strong>critical vulnerability in React Server Components</strong> that has escalated from disclosure to <strong>active, automated exploitation</strong> in the wild.</p><br><p><strong>Key points covered:</strong></p><p>•CVE-2025-55182 allows <strong>unauthenticated remote code execution</strong> via unsafe serialization and deserialization in React Server Component endpoints</p><p>•Vulnerable components include:</p><p>•react-server-dom-webpack</p><p>•react-server-dom-parcel</p><p>•react-server-dom-turbopack</p><p>•A related issue impacts <strong>Next.js App Router deployments</strong>, tracked separately as <strong>CVE-2025-66478</strong></p><p>•Even applications that <strong>do not explicitly use server functions</strong> may still be exploitable if RSC support exists</p><br><p>🚨<strong> Active Exploitation Confirmed</strong></p><br><p>Lou shares real-time intelligence showing attackers using automated tooling dubbed <strong>“React-to-Shell”</strong>, delivering:</p><p>•Cryptocurrency miners</p><p>•Linux backdoors (PeerBlight)</p><p>•Reverse proxy tooling (CowTunnel)</p><p>•Go-based post-exploitation implants (ZinFoq)</p><br><p>This is no longer theoretical—<strong>production systems are being compromised right now</strong>.</p><br><p>🛡️<strong> Immediate Mitigation Guidance</strong></p><br><p>If you run React or Next.js workloads:</p><p>•<strong>Patch immediately</strong> to fixed versions</p><p>•Disable or strictly isolate RSC server function endpoints if not required</p><p>•Place RSC behind <strong>WAFs and strict network controls</strong></p><p>•Harden container and OS permissions</p><p>•Implement <strong>payload anomaly detection</strong></p><p>•Move toward <strong>micro-segmentation and Zero Trust architectures</strong> to limit blast radius</p><br><p>John and Lou emphasize that <strong>patching alone is no longer enough</strong> in an era of AI-accelerated exploitation.</p><br><p>⸻</p><br><p><strong>Wrap Up &amp; Community Feedback</strong></p><br><p>The episode closes with listener feedback from LinkedIn discussing <strong>CXL memory pooling</strong> and how it is changing enterprise infrastructure economics—plus a recommendation to check out deep-dive demos from <em>Serve The Home</em>.</p><br><p>As always, the team invites listener input on whether future episodes should focus on individual CVEs or broader security themes.</p><br><p>⸻</p><br><p><strong>Follow &amp; Connect</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week on <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down a <strong>code-red security situation</strong> affecting a massive portion of the modern web. CVE-2025-55182 is a critical, actively exploited vulnerability in <strong>React Server Components (RSC)</strong> that enables <strong>unauthenticated remote code execution</strong>, even in applications that don’t explicitly use server functions.</p><br><p>With an estimated <strong>33–35% of cloud-based services running React</strong>, attackers are already leveraging automated tooling to deploy cryptominers, Linux backdoors, and persistent malware across vulnerable systems. If you run React, Next.js, or containerized web workloads, this episode outlines exactly <strong>why this exploit is so dangerous, how attackers are weaponizing it, and what you must do right now to mitigate risk</strong>—from emergency patching to Zero Trust and micro-segmentation strategies.</p><br><p>⸻</p><br><p><strong>Show Notes</strong></p><p>🔴<strong> CVE of the Week: CVE-2025-55182 (React Server Components RCE)</strong></p><br><p>In this episode, John and Lou sound the alarm on a <strong>critical vulnerability in React Server Components</strong> that has escalated from disclosure to <strong>active, automated exploitation</strong> in the wild.</p><br><p><strong>Key points covered:</strong></p><p>•CVE-2025-55182 allows <strong>unauthenticated remote code execution</strong> via unsafe serialization and deserialization in React Server Component endpoints</p><p>•Vulnerable components include:</p><p>•react-server-dom-webpack</p><p>•react-server-dom-parcel</p><p>•react-server-dom-turbopack</p><p>•A related issue impacts <strong>Next.js App Router deployments</strong>, tracked separately as <strong>CVE-2025-66478</strong></p><p>•Even applications that <strong>do not explicitly use server functions</strong> may still be exploitable if RSC support exists</p><br><p>🚨<strong> Active Exploitation Confirmed</strong></p><br><p>Lou shares real-time intelligence showing attackers using automated tooling dubbed <strong>“React-to-Shell”</strong>, delivering:</p><p>•Cryptocurrency miners</p><p>•Linux backdoors (PeerBlight)</p><p>•Reverse proxy tooling (CowTunnel)</p><p>•Go-based post-exploitation implants (ZinFoq)</p><br><p>This is no longer theoretical—<strong>production systems are being compromised right now</strong>.</p><br><p>🛡️<strong> Immediate Mitigation Guidance</strong></p><br><p>If you run React or Next.js workloads:</p><p>•<strong>Patch immediately</strong> to fixed versions</p><p>•Disable or strictly isolate RSC server function endpoints if not required</p><p>•Place RSC behind <strong>WAFs and strict network controls</strong></p><p>•Harden container and OS permissions</p><p>•Implement <strong>payload anomaly detection</strong></p><p>•Move toward <strong>micro-segmentation and Zero Trust architectures</strong> to limit blast radius</p><br><p>John and Lou emphasize that <strong>patching alone is no longer enough</strong> in an era of AI-accelerated exploitation.</p><br><p>⸻</p><br><p><strong>Wrap Up &amp; Community Feedback</strong></p><br><p>The episode closes with listener feedback from LinkedIn discussing <strong>CXL memory pooling</strong> and how it is changing enterprise infrastructure economics—plus a recommendation to check out deep-dive demos from <em>Serve The Home</em>.</p><br><p>As always, the team invites listener input on whether future episodes should focus on individual CVEs or broader security themes.</p><br><p>⸻</p><br><p><strong>Follow &amp; Connect</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Apple’s AI Shakeup, India’s Surveillance App, OpenAI Code Red, and Multi-Cloud Peace Treaty</title>
			<itunes:title>Apple’s AI Shakeup, India’s Surveillance App, OpenAI Code Red, and Multi-Cloud Peace Treaty</itunes:title>
			<pubDate>Mon, 08 Dec 2025 17:35:42 GMT</pubDate>
			<itunes:duration>24:27</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69370c6efe31b2ca09d73401/media.mp3" length="422766436" type="audio/mpeg"/>
			<guid isPermaLink="false">69370c6efe31b2ca09d73401</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e16</link>
			<acast:episodeId>69370c6efe31b2ca09d73401</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e16</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YBYNxm1fELWkVD2rdliMwYJ3Tfv+Y8pknSMkJ5edW4ILkzewk/CRTrzjvbwk10CHO3PVMreTXDloOJvDybRM2Y]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E16</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>16</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1765214956817-c9a110c1-9ac9-4753-816a-37a7c46dd044.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast – News Bytes, John and Lou cover a packed week in tech policy, AI disruption, and cloud infrastructure. Apple loses its AI chief as the company struggles to keep pace with rivals. India orders smartphone makers to preload a government surveillance app—then backpedals after Apple pushes back. Sam Altman declares a “Code Red” inside OpenAI as pressure mounts from Google, Anthropic, and the entire LLM ecosystem. And finally, Amazon and Google partner on a new high-speed multi-cloud interconnect—an unexpected alliance triggered in part by AWS’ recent outages.</p><br><p>This episode blends politics, enterprise IT strategy, security concerns, and cloud architecture trends—delivered with classic SPARC Cast sarcasm.</p><br><p>⏱️ Show Notes</p><br><p><br></p><p>00:00 – Intro</p><br><p>This week: Apple says goodbye to its AI chief, India tests mandatory surveillance apps, OpenAI hits the panic button, and Amazon+Google become “friends with benefits.”</p><br><p><br></p><p>NEWS BYTES</p><p>00:46 – Apple AI Chief Exits</p><br><p>Apple confirms that John Giannandrea, SVP of Machine Learning &amp; AI Strategy, will step down in Spring 2026.</p><p>•He was Apple’s “big hire from Google” and led AI initiatives for eight years.</p><p>•His replacement: Amar Subramanya, reporting to Craig Federighi.</p><p>•John &amp; Lou discuss Apple’s AI struggles:</p><p>– Apple Intelligence is “not what was promised”—delayed, underwhelming, and widely criticized.</p><p>https://www.apple.com/newsroom/2025/12/john-giannandrea-to-retire-from-apple/&nbsp;</p><br><p>06:43 – India Orders Smartphone Makers to Preload State-Owned Cyber Safety App</p><br><p>India announces a mandate requiring all new smartphones to include a government-built, undeletable cybersecurity app.</p><p>•Goal: combat rising cybercrime, IMEI cloning, stolen-device fraud.</p><p>•Users cannot remove or disable the app.</p><p>•Lou and John highlight the risk.</p><p>https://www.reuters.com/sustainability/boards-policy-regulation/india-orders-mobile-phones-preloaded-with-government-app-ensure-cyber-safety-2025-12-01/&nbsp;</p><br><p>11:51 – Sam Altman Declares ‘Code Red’ for ChatGPT</p><br><p>OpenAI CEO Sam Altman declares an internal “Code Red” tied to ChatGPT 5.2.</p><p>•All nonessential projects—including the Pulse personalized assistant—paused.</p><p>•Focus is entirely on improving 5.2 performance, reliability, and user experience.</p><p>•Why now?</p><p>– Gemini just jumped ahead in accuracy.</p><p>– Claude leads in coding tasks.</p><p>– Competition is moving at blistering speed.</p><p>https://www.macrumors.com/2025/12/02/openai-delays-ad-plans/&nbsp;</p><br><p>16:55 – Amazon and Google Launch Multicloud Service for Faster Connectivity</p><br><p>Amazon Web Services &amp; Google Cloud jointly launch a multi-cloud private interconnect for rapid cross-cloud connectivity.</p><p>•High-speed AWS ↔ Google Cloud links provisioned in minutes, not weeks.</p><p>•Early adopter: Salesforce.</p><p>•Why this matters:</p><p>– After the major AWS East-1 outage, enterprises need cloud failover options fast.</p><p>– This partnership essentially creates a safety net: if one cloud fails, the other can pick up load.</p><p>https://www.reuters.com/business/retail-consumer/amazon-google-launch-multicloud-service-faster-connectivity-2025-12-01/&nbsp;</p><br><p>20:32 – Mail Bag &amp; Wrap Up</p><br><p>Social Links:</p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast – News Bytes, John and Lou cover a packed week in tech policy, AI disruption, and cloud infrastructure. Apple loses its AI chief as the company struggles to keep pace with rivals. India orders smartphone makers to preload a government surveillance app—then backpedals after Apple pushes back. Sam Altman declares a “Code Red” inside OpenAI as pressure mounts from Google, Anthropic, and the entire LLM ecosystem. And finally, Amazon and Google partner on a new high-speed multi-cloud interconnect—an unexpected alliance triggered in part by AWS’ recent outages.</p><br><p>This episode blends politics, enterprise IT strategy, security concerns, and cloud architecture trends—delivered with classic SPARC Cast sarcasm.</p><br><p>⏱️ Show Notes</p><br><p><br></p><p>00:00 – Intro</p><br><p>This week: Apple says goodbye to its AI chief, India tests mandatory surveillance apps, OpenAI hits the panic button, and Amazon+Google become “friends with benefits.”</p><br><p><br></p><p>NEWS BYTES</p><p>00:46 – Apple AI Chief Exits</p><br><p>Apple confirms that John Giannandrea, SVP of Machine Learning &amp; AI Strategy, will step down in Spring 2026.</p><p>•He was Apple’s “big hire from Google” and led AI initiatives for eight years.</p><p>•His replacement: Amar Subramanya, reporting to Craig Federighi.</p><p>•John &amp; Lou discuss Apple’s AI struggles:</p><p>– Apple Intelligence is “not what was promised”—delayed, underwhelming, and widely criticized.</p><p>https://www.apple.com/newsroom/2025/12/john-giannandrea-to-retire-from-apple/&nbsp;</p><br><p>06:43 – India Orders Smartphone Makers to Preload State-Owned Cyber Safety App</p><br><p>India announces a mandate requiring all new smartphones to include a government-built, undeletable cybersecurity app.</p><p>•Goal: combat rising cybercrime, IMEI cloning, stolen-device fraud.</p><p>•Users cannot remove or disable the app.</p><p>•Lou and John highlight the risk.</p><p>https://www.reuters.com/sustainability/boards-policy-regulation/india-orders-mobile-phones-preloaded-with-government-app-ensure-cyber-safety-2025-12-01/&nbsp;</p><br><p>11:51 – Sam Altman Declares ‘Code Red’ for ChatGPT</p><br><p>OpenAI CEO Sam Altman declares an internal “Code Red” tied to ChatGPT 5.2.</p><p>•All nonessential projects—including the Pulse personalized assistant—paused.</p><p>•Focus is entirely on improving 5.2 performance, reliability, and user experience.</p><p>•Why now?</p><p>– Gemini just jumped ahead in accuracy.</p><p>– Claude leads in coding tasks.</p><p>– Competition is moving at blistering speed.</p><p>https://www.macrumors.com/2025/12/02/openai-delays-ad-plans/&nbsp;</p><br><p>16:55 – Amazon and Google Launch Multicloud Service for Faster Connectivity</p><br><p>Amazon Web Services &amp; Google Cloud jointly launch a multi-cloud private interconnect for rapid cross-cloud connectivity.</p><p>•High-speed AWS ↔ Google Cloud links provisioned in minutes, not weeks.</p><p>•Early adopter: Salesforce.</p><p>•Why this matters:</p><p>– After the major AWS East-1 outage, enterprises need cloud failover options fast.</p><p>– This partnership essentially creates a safety net: if one cloud fails, the other can pick up load.</p><p>https://www.reuters.com/business/retail-consumer/amazon-google-launch-multicloud-service-faster-connectivity-2025-12-01/&nbsp;</p><br><p>20:32 – Mail Bag &amp; Wrap Up</p><br><p>Social Links:</p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>UniFi’s New Bridges, ChatGPT Group Chats, and… an IT Simulator Game?!</title>
			<itunes:title>UniFi’s New Bridges, ChatGPT Group Chats, and… an IT Simulator Game?!</itunes:title>
			<pubDate>Mon, 24 Nov 2025 15:36:36 GMT</pubDate>
			<itunes:duration>18:52</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69247b8420344a0413487193/media.mp3" length="326213980" type="audio/mpeg"/>
			<guid isPermaLink="false">69247b8420344a0413487193</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e15</link>
			<acast:episodeId>69247b8420344a0413487193</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e15</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZRqoftXw8Kuo64H+izkjgj0r4vXX99uoFbXfuIFZv1EcJvBXGWVGouh/JJ8KDTTZDJv2SqXw49spwkbrx5awoO]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E15</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>15</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1763998464358-497355b8-c7f6-4bfb-a99a-675185b253fd.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast – News Bytes, John and Lou break down Ubiquiti’s brand-new UniFi wireless bridging lineup, test drive the surprisingly powerful ChatGPT Group Chat feature, and review the newly released IT Specialist Simulator game—yes, it’s a real thing.</p><br><p>Lou also shares his SuperComputing 25 highlights, covering quantum computing, CXL memory extension, and why this year’s show was one of the most energetic he’s ever seen. A packed week for enterprise IT, networking, AI tooling, and HPC.</p><br><p>⏱️ Show Notes</p><br><p>00:00 – Intro</p><br><p>A preview of the week’s topics: ChatGPT enters the chat, Pixel Team Red makes IT into a game, and UniFi pushes wireless bridging further.</p><br><p>NEWS BYTES</p><p>01:21 – All-New UniFi Bridging</p><br><p>Ubiquiti announces an expanded lineup of UniFi bridging hardware, offering new flexibility for building-to-building links and hard-to-cable environments. Key highlights:</p><p>•Building Bridge Single Unit – no more buying pairs; units can now be paired or re-paired on demand.</p><p>•Device Bridge IoT – tiny 2.4 GHz client bridge for connecting wired devices where Ethernet isn’t available.</p><p>•Device Bridge Switch – 2.5GbE PoE switch + Wi-Fi 7 / 6 GHz bridging for high-throughput deployment without new cabling.</p><p>•Ideal for renters, campuses, remote buildings, and temporary connectivity.</p><p>https://blog.ui.com/article/all-new-unifi-bridging&nbsp;</p><br><p>05:00 – ChatGPT Group Chats</p><br><p>ChatGPT now offers multi-user group chats, allowing collaborative research, shared notes, and real-time AI-assisted discussions.</p><p>•Works like “ChatGPT inside Slack or Teams.”</p><p>•No cross-bleed from personal ChatGPT memory—group chats stay isolated.</p><p>•Great for brainstorming, problem-solving, and real-time content creation.</p><p>•John tests memory segmentation and explains why this feature actually matters for privacy.</p><p>https://openai.com/index/group-chats-in-chatgpt/&nbsp;</p><br><p>07:38 – IT Specialist Simulator (Game)</p><br><p>A new Steam game, IT Specialist Simulator, lets players start as junior IT techs and work their way up the ladder.</p><p>•Tasks include configuring IP addresses, handling tickets, and climbing into management roles.</p><p>•John plans to test it using Crossover on his Mac during Thanksgiving vacation.</p><p>•Lou questions whether this is secretly a recruitment or training tool.</p><p>•Possible educational value for beginners learning networking basics.</p><p>https://store.steampowered.com/app/3266090/IT_Specialist_Simulator/</p><br><p>10:16 – Lou’s SuperComputing 25 Overview</p><br><p>Lou shares additional SC25 observations not covered in the shorts:</p><p>•Deep dive conversations with quantum computing firms including Alice &amp; Bob.</p><p>•IBM’s quantum roadmap and why commercial systems are likely 2030+.</p><p>•How quantum computing targets molecular simulation, advanced materials, next-gen drugs, and computational fluid dynamics.</p><p>•The rise of CXL, PCIe expansion, and technologies enabling enterprises to extend hardware rather than replace it.</p><p>•SC25 was one of the most active HPC events Lou has seen in decades.</p><br><p>Wrap Up</p><br><p>14:42 – Listener Feedback &amp; Wrap Up</p><br><p>Listeners react to recent shorts, including extreme cooling solutions (0.01 Kelvin) and moon-mined Helium-3 for future fusion and quantum workloads.</p><p>Full contact and feedback channels below:</p><br><p>Social Links</p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast – News Bytes, John and Lou break down Ubiquiti’s brand-new UniFi wireless bridging lineup, test drive the surprisingly powerful ChatGPT Group Chat feature, and review the newly released IT Specialist Simulator game—yes, it’s a real thing.</p><br><p>Lou also shares his SuperComputing 25 highlights, covering quantum computing, CXL memory extension, and why this year’s show was one of the most energetic he’s ever seen. A packed week for enterprise IT, networking, AI tooling, and HPC.</p><br><p>⏱️ Show Notes</p><br><p>00:00 – Intro</p><br><p>A preview of the week’s topics: ChatGPT enters the chat, Pixel Team Red makes IT into a game, and UniFi pushes wireless bridging further.</p><br><p>NEWS BYTES</p><p>01:21 – All-New UniFi Bridging</p><br><p>Ubiquiti announces an expanded lineup of UniFi bridging hardware, offering new flexibility for building-to-building links and hard-to-cable environments. Key highlights:</p><p>•Building Bridge Single Unit – no more buying pairs; units can now be paired or re-paired on demand.</p><p>•Device Bridge IoT – tiny 2.4 GHz client bridge for connecting wired devices where Ethernet isn’t available.</p><p>•Device Bridge Switch – 2.5GbE PoE switch + Wi-Fi 7 / 6 GHz bridging for high-throughput deployment without new cabling.</p><p>•Ideal for renters, campuses, remote buildings, and temporary connectivity.</p><p>https://blog.ui.com/article/all-new-unifi-bridging&nbsp;</p><br><p>05:00 – ChatGPT Group Chats</p><br><p>ChatGPT now offers multi-user group chats, allowing collaborative research, shared notes, and real-time AI-assisted discussions.</p><p>•Works like “ChatGPT inside Slack or Teams.”</p><p>•No cross-bleed from personal ChatGPT memory—group chats stay isolated.</p><p>•Great for brainstorming, problem-solving, and real-time content creation.</p><p>•John tests memory segmentation and explains why this feature actually matters for privacy.</p><p>https://openai.com/index/group-chats-in-chatgpt/&nbsp;</p><br><p>07:38 – IT Specialist Simulator (Game)</p><br><p>A new Steam game, IT Specialist Simulator, lets players start as junior IT techs and work their way up the ladder.</p><p>•Tasks include configuring IP addresses, handling tickets, and climbing into management roles.</p><p>•John plans to test it using Crossover on his Mac during Thanksgiving vacation.</p><p>•Lou questions whether this is secretly a recruitment or training tool.</p><p>•Possible educational value for beginners learning networking basics.</p><p>https://store.steampowered.com/app/3266090/IT_Specialist_Simulator/</p><br><p>10:16 – Lou’s SuperComputing 25 Overview</p><br><p>Lou shares additional SC25 observations not covered in the shorts:</p><p>•Deep dive conversations with quantum computing firms including Alice &amp; Bob.</p><p>•IBM’s quantum roadmap and why commercial systems are likely 2030+.</p><p>•How quantum computing targets molecular simulation, advanced materials, next-gen drugs, and computational fluid dynamics.</p><p>•The rise of CXL, PCIe expansion, and technologies enabling enterprises to extend hardware rather than replace it.</p><p>•SC25 was one of the most active HPC events Lou has seen in decades.</p><br><p>Wrap Up</p><br><p>14:42 – Listener Feedback &amp; Wrap Up</p><br><p>Listeners react to recent shorts, including extreme cooling solutions (0.01 Kelvin) and moon-mined Helium-3 for future fusion and quantum workloads.</p><p>Full contact and feedback channels below:</p><br><p>Social Links</p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[SuperComputing 25 Highlights: Cooling Wars, CXL Memory, & Hybrid AI Clouds]]></title>
			<itunes:title><![CDATA[SuperComputing 25 Highlights: Cooling Wars, CXL Memory, & Hybrid AI Clouds]]></itunes:title>
			<pubDate>Fri, 21 Nov 2025 16:00:00 GMT</pubDate>
			<itunes:duration>11:44</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69208add75ae15fa667f6af3/media.mp3" length="202861696" type="audio/mpeg"/>
			<guid isPermaLink="false">69208add75ae15fa667f6af3</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-super-computing-25-overview</link>
			<acast:episodeId>69208add75ae15fa667f6af3</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-super-computing-25-overview</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7a00Uie9ax03uXbwikl59uqLQmyr+euuLFKNSJ4lWz3VpCRZQxYn3MiP8wzuILt+Pk6uHQDM4yEOi9wRrctc5W+]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Super Computing 25 Overview</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1763740059221-07c81d83-aaa3-4bfe-840d-530b3f2d17e6.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast,&nbsp;Lou brings you a packed 8-minute walkthrough of the biggest themes and technologies from SuperComputing 25—the largest and busiest HPC show he’s ever attended.</p><br><p>In this video, Lou covers:</p><p>🔥 Cooling Wars: immersion cooling, PG25 liquid loops, cavitation risks, phase-change fluids, and long-term hardware reliability.</p><p>🧠 CXL &amp; Memory Expansion: shared GPU pools, multi-host memory fabrics, and how CXL can extend server life.</p><p>☁️ Hybrid Cloud AI Platforms: two research-born vendors (including one FedRAMP-compliant) redefining HPC + cloud orchestration.</p><p>⚡ Infrastructure Giants: the mind-blowing cooling and power equipment that will shape future enterprise data centers.</p><br><p>And John reads out Listener Feedback regarding AlmaLinux as the successor to CentOS.</p><br><p>If you want a concise, expert-level briefing from the SC25 show floor—this is the one to watch.</p><br><p><strong>What it on Youtube Here - </strong><a href="https://youtu.be/Ve57fs7efFY" rel="noopener noreferrer" target="_blank"><strong>https://youtu.be/Ve57fs7efFY</strong></a></p><br><p>00:00 – Intro</p><br><p>01:08 – Greeting from Super Computing 25</p><p>Lou sets the stage after returning from SuperComputing 25, describing the massive scale of the show, packed floors, and how SC25 has effectively replaced events like Interop and SuperComm.</p><br><p>NEWS &amp; TECH BREAKDOWN</p><br><p>02:22 – The Major Theme: Cooling, Cooling, Cooling</p><p>Lou explains that cooling dominated the show, with two primary approaches emerging:</p><p>1. Immersion Cooling</p><p>•Full-system submersion in mineral oil or engineered fluids</p><br><p>2. Active Liquid Cooling (PG25 Mix)</p><p>•Issues explored: erosion, cavitation, biological growth, thermal cycling, solder fatigue</p><br><p>3. Phase-Change Approaches</p><p>•Solutions that vaporize at fixed temperatures (e.g., 55°C boiling point phase-change fluids)</p><br><p>Why It Matters: Enterprise hardware longevity, reduced thermal stress, and predictable cooling efficiency.</p><br><p>05:41 – CXL &amp; Memory Expansion: The Future of Server Life Extension</p><br><p>Lou discusses a major standout category: CXL (Compute Express Link) technologies allowing:</p><p>•Shared memory pools &amp; GPUs across multiple hosts</p><p>•Extending server life by adding external memory instead of replacing hardware</p><p>•Switching architectures enabling dynamic assignment of terabytes of memory to GPUs</p><br><p>Enterprise takeaway: “Do more with less” becomes practical—critical during recessionary or budget-tight periods.</p><br><p>⸻</p><br><p>07:55 – Hybrid Cloud AI Platforms</p><p>Lou meets with two research-born companies offering advanced hybrid cloud and orchestration stacks:</p><p>•One FedRAMP-compliant, built for U.S. federal and defense workloads</p><p>•One European research derivative, designed for container-heavy hybrid environments without VMware reliance</p><br><p>These solutions focus on orchestration, HPC-to-cloud overflow, container scheduling, and distributed compute for AI.</p><br><p>09:19 – Wrap Up</p><br><p>John closes by encouraging viewers to watch the upcoming shorts and emphasizing how SC25 showcased the next generation of enterprise-class tech. He also covers Listener Feedback on our first short from SC25 regarding AlmaLinux</p><br><p>Social Links</p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast,&nbsp;Lou brings you a packed 8-minute walkthrough of the biggest themes and technologies from SuperComputing 25—the largest and busiest HPC show he’s ever attended.</p><br><p>In this video, Lou covers:</p><p>🔥 Cooling Wars: immersion cooling, PG25 liquid loops, cavitation risks, phase-change fluids, and long-term hardware reliability.</p><p>🧠 CXL &amp; Memory Expansion: shared GPU pools, multi-host memory fabrics, and how CXL can extend server life.</p><p>☁️ Hybrid Cloud AI Platforms: two research-born vendors (including one FedRAMP-compliant) redefining HPC + cloud orchestration.</p><p>⚡ Infrastructure Giants: the mind-blowing cooling and power equipment that will shape future enterprise data centers.</p><br><p>And John reads out Listener Feedback regarding AlmaLinux as the successor to CentOS.</p><br><p>If you want a concise, expert-level briefing from the SC25 show floor—this is the one to watch.</p><br><p><strong>What it on Youtube Here - </strong><a href="https://youtu.be/Ve57fs7efFY" rel="noopener noreferrer" target="_blank"><strong>https://youtu.be/Ve57fs7efFY</strong></a></p><br><p>00:00 – Intro</p><br><p>01:08 – Greeting from Super Computing 25</p><p>Lou sets the stage after returning from SuperComputing 25, describing the massive scale of the show, packed floors, and how SC25 has effectively replaced events like Interop and SuperComm.</p><br><p>NEWS &amp; TECH BREAKDOWN</p><br><p>02:22 – The Major Theme: Cooling, Cooling, Cooling</p><p>Lou explains that cooling dominated the show, with two primary approaches emerging:</p><p>1. Immersion Cooling</p><p>•Full-system submersion in mineral oil or engineered fluids</p><br><p>2. Active Liquid Cooling (PG25 Mix)</p><p>•Issues explored: erosion, cavitation, biological growth, thermal cycling, solder fatigue</p><br><p>3. Phase-Change Approaches</p><p>•Solutions that vaporize at fixed temperatures (e.g., 55°C boiling point phase-change fluids)</p><br><p>Why It Matters: Enterprise hardware longevity, reduced thermal stress, and predictable cooling efficiency.</p><br><p>05:41 – CXL &amp; Memory Expansion: The Future of Server Life Extension</p><br><p>Lou discusses a major standout category: CXL (Compute Express Link) technologies allowing:</p><p>•Shared memory pools &amp; GPUs across multiple hosts</p><p>•Extending server life by adding external memory instead of replacing hardware</p><p>•Switching architectures enabling dynamic assignment of terabytes of memory to GPUs</p><br><p>Enterprise takeaway: “Do more with less” becomes practical—critical during recessionary or budget-tight periods.</p><br><p>⸻</p><br><p>07:55 – Hybrid Cloud AI Platforms</p><p>Lou meets with two research-born companies offering advanced hybrid cloud and orchestration stacks:</p><p>•One FedRAMP-compliant, built for U.S. federal and defense workloads</p><p>•One European research derivative, designed for container-heavy hybrid environments without VMware reliance</p><br><p>These solutions focus on orchestration, HPC-to-cloud overflow, container scheduling, and distributed compute for AI.</p><br><p>09:19 – Wrap Up</p><br><p>John closes by encouraging viewers to watch the upcoming shorts and emphasizing how SC25 showcased the next generation of enterprise-class tech. He also covers Listener Feedback on our first short from SC25 regarding AlmaLinux</p><br><p>Social Links</p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Grounded Planes, Open-Source Drama, Russian Stealth Malware, and Powerless Data Centers</title>
			<itunes:title>Grounded Planes, Open-Source Drama, Russian Stealth Malware, and Powerless Data Centers</itunes:title>
			<pubDate>Mon, 17 Nov 2025 15:36:35 GMT</pubDate>
			<itunes:duration>20:11</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/691b41042e48602650c4ad3c/media.mp3" length="348844588" type="audio/mpeg"/>
			<guid isPermaLink="false">691b41042e48602650c4ad3c</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/grounded-planes-open-source-drama-russian-stealth-malware-an</link>
			<acast:episodeId>691b41042e48602650c4ad3c</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>grounded-planes-open-source-drama-russian-stealth-malware-an</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7agc4JHOQukt9pCsMFnPqf+JlgH/R0+xmWdjhaVAW/PcKgbGEeCuz0VVi+YEsrR4g17b8R+NFTkg3iqiIKUDKFq]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E14 </itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>14</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1763393419444-a2ed1c76-e068-4477-84ed-2e4ee3db530b.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast – News Bytes, John and Lou tackle a wild week in enterprise IT—from grounded aircraft disrupting hardware logistics, to open-source maintainers calling out Google, to sophisticated VM-based malware hiding inside Windows systems, to Santa Clara’s power grid collapsing under the weight of the AI boom.</p><br><p>First, a tragic UPS MD-11 crash in Louisville forces both UPS and FedEx to ground all MD-11 aircraft—creating ripple effects for enterprise sparing strategies and next-day hardware replacement SLAs. John and Lou explain how events outside the IT bubble can quietly break your uptime guarantees.</p><br><p>Then, the maintainers of FFmpeg publicly call out Google: either fund the project or stop flooding it with fuzz-generated bugs. The hosts explore the broader lesson: organizations relying on open source must contribute—code, money, or both.</p><br><p>Next, the team walks through a jaw-dropping Hyper-V evasion technique, where Russian hackers spin up hidden Alpine Linux VMs to run malware undetected by EDR tools. Lou calls it “one of the most clever attack chains we’ve seen in years,” and John argues that Windows security must evolve to detect surprise VM creation.</p><br><p>Finally, Santa Clara—Nvidia’s hometown—has data centers sitting empty because the city literally has no power left to give. With AI megaprojects like Project Stargate on the horizon, John and Lou warn that the grid crisis is about to become every CIO’s problem.</p><br><p>Show Notes</p><br><p>00:00 – Intro</p><br><p>NEWS BYTES</p><br><p>01:05 – UPS and FedEx Ground Planes After Louisville Crash</p><p>•A UPS MD-11 crashes, triggering a fleetwide grounding of MD-11 cargo aircraft.</p><p>•Immediate supply-chain impact for next-day server replacements and enterprise sparing.</p><p>•John and Lou highlight why IT leaders must monitor “non-IT” news that affects logistics.</p><p>•A reminder: SLA = logistics, and logistics depends on the real world.</p><p>https://www.nbcnews.com/news/us-news/ups-grounds-md-11-fleet-type-plane-louisville-crash-sources-say-rcna242711&nbsp;</p><br><p>04:19 – FFmpeg to Google: Fund Us or Stop Sending Bugs</p><p>•Google’s fuzzing system floods FFmpeg with nonstop bug reports.</p><p>•Maintainers say the project is overwhelmed and demand Google contribute.</p><p>•Discussion: the ethical and practical responsibility companies have to support open source.</p><p>https://thenewstack.io/ffmpeg-to-google-fund-us-or-stop-sending-bugs&nbsp;</p><br><p>07:25 – Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection</p><p>•Threat actor Curly Comrades uses Hyper-V to run hidden Alpine Linux VMs.</p><p>•Malware (CurlyShell &amp; CurlyCat) routes through host NAT, appearing as normal traffic.</p><p>•Hard to detect: tiny VM footprint, few forensic artifacts, zero EDR visibility.</p><p>•John: Windows Defender should alert when a new VM spins up—“Did you mean to do this?”</p><p>https://thehackernews.com/2025/11/hackers-weaponize-windows-hyper-v-to.html &nbsp;</p><br><p>13:08 – Data Centers in Nvidia’s Hometown Stand Empty Awaiting Power</p><p>•Two new Santa Clara data centers cannot turn on due to a power shortage.</p><p>•Signals a coming crisis as AI mega-facilities exceed grid capacity.</p><p>•Power costs and grid constraints may soon drive enterprise IT budgeting changes.</p><p>https://finance.yahoo.com/news/data-centers-nvidia-hometown-stand-100009877.html &nbsp;</p><br><p>15:56 – Mail Bag &amp; Wrap Up</p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast – News Bytes, John and Lou tackle a wild week in enterprise IT—from grounded aircraft disrupting hardware logistics, to open-source maintainers calling out Google, to sophisticated VM-based malware hiding inside Windows systems, to Santa Clara’s power grid collapsing under the weight of the AI boom.</p><br><p>First, a tragic UPS MD-11 crash in Louisville forces both UPS and FedEx to ground all MD-11 aircraft—creating ripple effects for enterprise sparing strategies and next-day hardware replacement SLAs. John and Lou explain how events outside the IT bubble can quietly break your uptime guarantees.</p><br><p>Then, the maintainers of FFmpeg publicly call out Google: either fund the project or stop flooding it with fuzz-generated bugs. The hosts explore the broader lesson: organizations relying on open source must contribute—code, money, or both.</p><br><p>Next, the team walks through a jaw-dropping Hyper-V evasion technique, where Russian hackers spin up hidden Alpine Linux VMs to run malware undetected by EDR tools. Lou calls it “one of the most clever attack chains we’ve seen in years,” and John argues that Windows security must evolve to detect surprise VM creation.</p><br><p>Finally, Santa Clara—Nvidia’s hometown—has data centers sitting empty because the city literally has no power left to give. With AI megaprojects like Project Stargate on the horizon, John and Lou warn that the grid crisis is about to become every CIO’s problem.</p><br><p>Show Notes</p><br><p>00:00 – Intro</p><br><p>NEWS BYTES</p><br><p>01:05 – UPS and FedEx Ground Planes After Louisville Crash</p><p>•A UPS MD-11 crashes, triggering a fleetwide grounding of MD-11 cargo aircraft.</p><p>•Immediate supply-chain impact for next-day server replacements and enterprise sparing.</p><p>•John and Lou highlight why IT leaders must monitor “non-IT” news that affects logistics.</p><p>•A reminder: SLA = logistics, and logistics depends on the real world.</p><p>https://www.nbcnews.com/news/us-news/ups-grounds-md-11-fleet-type-plane-louisville-crash-sources-say-rcna242711&nbsp;</p><br><p>04:19 – FFmpeg to Google: Fund Us or Stop Sending Bugs</p><p>•Google’s fuzzing system floods FFmpeg with nonstop bug reports.</p><p>•Maintainers say the project is overwhelmed and demand Google contribute.</p><p>•Discussion: the ethical and practical responsibility companies have to support open source.</p><p>https://thenewstack.io/ffmpeg-to-google-fund-us-or-stop-sending-bugs&nbsp;</p><br><p>07:25 – Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection</p><p>•Threat actor Curly Comrades uses Hyper-V to run hidden Alpine Linux VMs.</p><p>•Malware (CurlyShell &amp; CurlyCat) routes through host NAT, appearing as normal traffic.</p><p>•Hard to detect: tiny VM footprint, few forensic artifacts, zero EDR visibility.</p><p>•John: Windows Defender should alert when a new VM spins up—“Did you mean to do this?”</p><p>https://thehackernews.com/2025/11/hackers-weaponize-windows-hyper-v-to.html &nbsp;</p><br><p>13:08 – Data Centers in Nvidia’s Hometown Stand Empty Awaiting Power</p><p>•Two new Santa Clara data centers cannot turn on due to a power shortage.</p><p>•Signals a coming crisis as AI mega-facilities exceed grid capacity.</p><p>•Power costs and grid constraints may soon drive enterprise IT budgeting changes.</p><p>https://finance.yahoo.com/news/data-centers-nvidia-hometown-stand-100009877.html &nbsp;</p><br><p>15:56 – Mail Bag &amp; Wrap Up</p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cisco CVE Double Feature: ASA Firewall RCE + ISE Root Takeover (CVE-2025-20333, CVE-2025-20362, CVE-2025-20337)</title>
			<itunes:title>Cisco CVE Double Feature: ASA Firewall RCE + ISE Root Takeover (CVE-2025-20333, CVE-2025-20362, CVE-2025-20337)</itunes:title>
			<pubDate>Fri, 14 Nov 2025 15:30:00 GMT</pubDate>
			<itunes:duration>11:40</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69174757e4a19aaf07d31b79/media.mp3" length="201673564" type="audio/mpeg"/>
			<guid isPermaLink="false">69174757e4a19aaf07d31b79</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e14</link>
			<acast:episodeId>69174757e4a19aaf07d31b79</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e14</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aoACIFjmNkwETRAf9uMuElWD3jjnDngDWu+yJSj1mb6F++nchCAF8C2lfLc9hI5O9iQEiNi0iHLDIIkBcDe3y2]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E14 </itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>14</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1763133176250-26343665-61c6-47ec-8d87-183e1d137fa4.jpeg"/>
			<description><![CDATA[<p>In this week’s IT SPARC Cast, John and Lou break down a <em>Cisco security double feature</em>—three critical vulnerabilities impacting Cisco ASA, Cisco Secure Firewall (FTD), and Cisco Identity Services Engine (ISE). These flaws include authentication bypass, chained remote code execution, and a CVSS 10.0 root-level compromise via an undocumented ISE API.</p><br><p>We explain how CVE-2025-20333, CVE-2025-20362, and the newly revealed CVE-2025-20337 work, why federal agencies issued emergency patch directives, and what immediate mitigation steps enterprise defenders must take. If you manage Cisco firewalls or identity systems, this episode is mandatory listening.</p><br><p>00:00 - Intro</p><br><p><strong>01:05 - CVEs of the Week – Cisco ASA &amp; FTD (CVE-2025-20333 &amp; CVE-2025-20362)</strong></p><br><p>• Two actively exploited Cisco firewall vulnerabilities enable authentication bypass and chained remote code execution.</p><p>• Attackers linked to ArcaneDoor/Storm-1849 are using CVE-2025-20362 to bypass authentication, paired with CVE-2025-20333 for full RCE device takeover.</p><p>• Compromised devices show unexpected reloads, disabled logs, and firmware persistence via ROMMON modification.</p><p>• Over 50,000 ASA/FTD systems remain exposed, many still unpatched.</p><p>• Emergency guidance from CISA and NCSC stresses immediate patching, disabling WebVPN/SSL, IP whitelisting, and checking for persistence or odd CLI behavior.</p><p>• Lou and John emphasize the need for a <strong>multi-vendor firewall strategy</strong> to avoid single-vendor blast-radius failures.</p><br><p>⸻</p><br><p><strong>05:00 - Cisco ISE – CVE-2025-20337 (Root-Level RCE via Undocumented API)</strong></p><br><p>• Amazon’s threat intelligence team discovered in-the-wild exploitation of an undocumented ISE API endpoint.</p><p>• This CVSS 10.0 vulnerability allows deserialization attacks leading to unauthenticated root-level access.</p><p>• Attackers deploy an advanced, stealthy web-shell (“IdentityAuditAction”) featuring:</p><p>– In-memory execution</p><p>– Java reflection thread injection</p><p>– Custom DES-encrypted C2</p><p>– No disk artifacts</p><p>• Exploitation activity dates back to at least May and may be earlier.</p><p>• Mitigation requires updating to patched ISE versions, segmenting management networks, monitoring unexpected listeners, and tightening inbound firewall policies.</p><p>• John and Lou reiterate that identity remains the “universal attack surface,” and poor segmentation continues to amplify enterprise risk.</p><br><p>⸻</p><br><p><strong>09:26 - Listener Feedback</strong></p><br><p>A viewer asked whether the F5 BIG-IP source code leak affects only the management plane or the data plane.</p><p>Answer: <strong>Both.</strong> Because the entire codebase was leaked, any subsystem could harbor latent zero-day attack surfaces—further stressing the importance of aggressive patching and hardened segmentation.</p><br><p>⸻</p><br><p><strong>10:28 - Wrap Up</strong></p><br><p>We appreciate every question, comment, and suggestion. Keep them coming.</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this week’s IT SPARC Cast, John and Lou break down a <em>Cisco security double feature</em>—three critical vulnerabilities impacting Cisco ASA, Cisco Secure Firewall (FTD), and Cisco Identity Services Engine (ISE). These flaws include authentication bypass, chained remote code execution, and a CVSS 10.0 root-level compromise via an undocumented ISE API.</p><br><p>We explain how CVE-2025-20333, CVE-2025-20362, and the newly revealed CVE-2025-20337 work, why federal agencies issued emergency patch directives, and what immediate mitigation steps enterprise defenders must take. If you manage Cisco firewalls or identity systems, this episode is mandatory listening.</p><br><p>00:00 - Intro</p><br><p><strong>01:05 - CVEs of the Week – Cisco ASA &amp; FTD (CVE-2025-20333 &amp; CVE-2025-20362)</strong></p><br><p>• Two actively exploited Cisco firewall vulnerabilities enable authentication bypass and chained remote code execution.</p><p>• Attackers linked to ArcaneDoor/Storm-1849 are using CVE-2025-20362 to bypass authentication, paired with CVE-2025-20333 for full RCE device takeover.</p><p>• Compromised devices show unexpected reloads, disabled logs, and firmware persistence via ROMMON modification.</p><p>• Over 50,000 ASA/FTD systems remain exposed, many still unpatched.</p><p>• Emergency guidance from CISA and NCSC stresses immediate patching, disabling WebVPN/SSL, IP whitelisting, and checking for persistence or odd CLI behavior.</p><p>• Lou and John emphasize the need for a <strong>multi-vendor firewall strategy</strong> to avoid single-vendor blast-radius failures.</p><br><p>⸻</p><br><p><strong>05:00 - Cisco ISE – CVE-2025-20337 (Root-Level RCE via Undocumented API)</strong></p><br><p>• Amazon’s threat intelligence team discovered in-the-wild exploitation of an undocumented ISE API endpoint.</p><p>• This CVSS 10.0 vulnerability allows deserialization attacks leading to unauthenticated root-level access.</p><p>• Attackers deploy an advanced, stealthy web-shell (“IdentityAuditAction”) featuring:</p><p>– In-memory execution</p><p>– Java reflection thread injection</p><p>– Custom DES-encrypted C2</p><p>– No disk artifacts</p><p>• Exploitation activity dates back to at least May and may be earlier.</p><p>• Mitigation requires updating to patched ISE versions, segmenting management networks, monitoring unexpected listeners, and tightening inbound firewall policies.</p><p>• John and Lou reiterate that identity remains the “universal attack surface,” and poor segmentation continues to amplify enterprise risk.</p><br><p>⸻</p><br><p><strong>09:26 - Listener Feedback</strong></p><br><p>A viewer asked whether the F5 BIG-IP source code leak affects only the management plane or the data plane.</p><p>Answer: <strong>Both.</strong> Because the entire codebase was leaked, any subsystem could harbor latent zero-day attack surfaces—further stressing the importance of aggressive patching and hardened segmentation.</p><br><p>⸻</p><br><p><strong>10:28 - Wrap Up</strong></p><br><p>We appreciate every question, comment, and suggestion. Keep them coming.</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>AI in Orbit, Microsoft’s Missteps, and the OpenAI Backdoor Nobody Saw Coming</title>
			<itunes:title>AI in Orbit, Microsoft’s Missteps, and the OpenAI Backdoor Nobody Saw Coming</itunes:title>
			<pubDate>Mon, 10 Nov 2025 15:30:00 GMT</pubDate>
			<itunes:duration>18:17</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/69111f71a17ebcde881df647/media.mp3" length="316171948" type="audio/mpeg"/>
			<guid isPermaLink="false">69111f71a17ebcde881df647</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e13</link>
			<acast:episodeId>69111f71a17ebcde881df647</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e13</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aNlUnj82C1/y0D34qRzhMndT30s4b2+DUYdSr1A89sZSU3needblQYWeXXRkqBKD+SOpsxAgUmI9B5/d9rR9qJ]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E13 </itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>13</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1762729520718-e3823640-de36-4f57-ae4c-d2cea89164fa.jpeg"/>
			<description><![CDATA[<p>In this week’s IT SPARC Cast – News Bytes, John and Lou go galactic—covering AI data centers in orbit, Microsoft’s blunders, and a nasty new Windows backdoor exploiting OpenAI’s API.</p><br><p>First, it’s “IT in SPAAAAAACE!” as Google unveils Project Suncatcher, an effort to launch radiation-hardened Tensor Processing Units (TPUs) into orbit for solar-powered, space-based AI compute. Then, SpaceX announces plans to build low-Earth-orbit data centers using its Starlink satellite infrastructure and Tesla’s upcoming AI chips—pushing the data center arms race off-planet.</p><br><p>Next up in “Really, Microsoft?” — the latest Windows 11 bug means “Update and Shut Down” doesn’t actually shut down. It just reboots. But the real danger comes from the newly discovered SesameOp backdoor, which uses the OpenAI Assistants API as its command-and-control channel—making it nearly invisible to traditional security tools.</p><br><p>Finally, Microsoft ends volume pricing discounts for enterprise customers, sparking frustration across IT departments already battling licensing complexity.</p><br><p>Show Notes</p><br><p>00:00 - Intro</p><p>John and Lou open with a new segment: “IT in Space!” as data centers literally leave Earth’s surface.</p><br><p>01:02 - Google’s Next Moonshot: Project Suncatcher</p><p>•Google to launch Project Suncatcher—solar-powered AI compute nodes using Tensor Processing Units (TPUs) in orbit.</p><p>•Partners with Planet Labs for radiation-hardened TPU testing.</p><p>•Orbiting clusters could provide 8x more energy efficiency than Earth-based systems.</p><p>•Challenges include cooling, radiation shielding, and debris avoidance.</p><p>https://9to5google.com/2025/11/04/google-project-suncatcher/</p><br><p>03:41 - SpaceX Plans Data Centers in Low-Earth Orbit</p><p>•SpaceX confirms Starlink v3 satellites will support data center modules.</p><p>•Tied to Tesla’s AI5 and upcoming AI6 chip platforms.</p><p>•Starship will be used to deploy orbital compute clusters.</p><p>•Laser interlinks and orbital energy capture could redefine distributed computing.</p><p>https://x.com/dimazeniuk/status/1984613494629503484?s=61&amp;t=vt5DZTzMzVaVQd0cNd8iuA</p><br><p>06:55 - “Update and Shut Down” No Longer Restarts PC</p><p>•Microsoft’s November 2025 preview patch fixes a long-standing issue: “Update and Shut Down” reboots instead of powering off.</p><p>•Optional fix available under Windows 11 build 26200.7019.</p><p>•Another headache in Windows’ long list of quality-of-life bugs.</p><p>https://www.windowslatest.com/2025/11/02/update-and-shut-down-no-longer-restarts-pc-as-windows-11-25h2-patch-addresses-a-decades-old-bug/</p><br><p>08:10 - SesameOp Backdoor Using OpenAI Assistants API</p><p>•SesameOp discovered by Microsoft’s DART Team.</p><p>•Uses OpenAI’s Assistants API as a stealthy command-and-control (C2) channel.</p><p>•No patch yet—only firewall whitelisting and Defender rules recommended.</p><p>https://thehackernews.com/2025/11/microsoft-detects-sesameop-backdoor.html</p><br><p>13:53 - Microsoft Ends Volume Pricing</p><p>•As of Nov 1, Microsoft has eliminated tiered volume discounts for Enterprise Agreements.</p><p>•Large customers will now pay the same flat rate as smaller ones.</p><p>•Could increase software spend by double digits at renewal.</p><p>https://www.cio.com/article/4079004/microsoft-ends-volume-pricing-potentially-costing-companies-millions.html</p><br><p>15:29 - Mail Bag &amp; Wrap Up</p><p>https://daily.jstor.org/when-the-push-button-was-new-people-were-freaked/</p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this week’s IT SPARC Cast – News Bytes, John and Lou go galactic—covering AI data centers in orbit, Microsoft’s blunders, and a nasty new Windows backdoor exploiting OpenAI’s API.</p><br><p>First, it’s “IT in SPAAAAAACE!” as Google unveils Project Suncatcher, an effort to launch radiation-hardened Tensor Processing Units (TPUs) into orbit for solar-powered, space-based AI compute. Then, SpaceX announces plans to build low-Earth-orbit data centers using its Starlink satellite infrastructure and Tesla’s upcoming AI chips—pushing the data center arms race off-planet.</p><br><p>Next up in “Really, Microsoft?” — the latest Windows 11 bug means “Update and Shut Down” doesn’t actually shut down. It just reboots. But the real danger comes from the newly discovered SesameOp backdoor, which uses the OpenAI Assistants API as its command-and-control channel—making it nearly invisible to traditional security tools.</p><br><p>Finally, Microsoft ends volume pricing discounts for enterprise customers, sparking frustration across IT departments already battling licensing complexity.</p><br><p>Show Notes</p><br><p>00:00 - Intro</p><p>John and Lou open with a new segment: “IT in Space!” as data centers literally leave Earth’s surface.</p><br><p>01:02 - Google’s Next Moonshot: Project Suncatcher</p><p>•Google to launch Project Suncatcher—solar-powered AI compute nodes using Tensor Processing Units (TPUs) in orbit.</p><p>•Partners with Planet Labs for radiation-hardened TPU testing.</p><p>•Orbiting clusters could provide 8x more energy efficiency than Earth-based systems.</p><p>•Challenges include cooling, radiation shielding, and debris avoidance.</p><p>https://9to5google.com/2025/11/04/google-project-suncatcher/</p><br><p>03:41 - SpaceX Plans Data Centers in Low-Earth Orbit</p><p>•SpaceX confirms Starlink v3 satellites will support data center modules.</p><p>•Tied to Tesla’s AI5 and upcoming AI6 chip platforms.</p><p>•Starship will be used to deploy orbital compute clusters.</p><p>•Laser interlinks and orbital energy capture could redefine distributed computing.</p><p>https://x.com/dimazeniuk/status/1984613494629503484?s=61&amp;t=vt5DZTzMzVaVQd0cNd8iuA</p><br><p>06:55 - “Update and Shut Down” No Longer Restarts PC</p><p>•Microsoft’s November 2025 preview patch fixes a long-standing issue: “Update and Shut Down” reboots instead of powering off.</p><p>•Optional fix available under Windows 11 build 26200.7019.</p><p>•Another headache in Windows’ long list of quality-of-life bugs.</p><p>https://www.windowslatest.com/2025/11/02/update-and-shut-down-no-longer-restarts-pc-as-windows-11-25h2-patch-addresses-a-decades-old-bug/</p><br><p>08:10 - SesameOp Backdoor Using OpenAI Assistants API</p><p>•SesameOp discovered by Microsoft’s DART Team.</p><p>•Uses OpenAI’s Assistants API as a stealthy command-and-control (C2) channel.</p><p>•No patch yet—only firewall whitelisting and Defender rules recommended.</p><p>https://thehackernews.com/2025/11/microsoft-detects-sesameop-backdoor.html</p><br><p>13:53 - Microsoft Ends Volume Pricing</p><p>•As of Nov 1, Microsoft has eliminated tiered volume discounts for Enterprise Agreements.</p><p>•Large customers will now pay the same flat rate as smaller ones.</p><p>•Could increase software spend by double digits at renewal.</p><p>https://www.cio.com/article/4079004/microsoft-ends-volume-pricing-potentially-costing-companies-millions.html</p><br><p>15:29 - Mail Bag &amp; Wrap Up</p><p>https://daily.jstor.org/when-the-push-button-was-new-people-were-freaked/</p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>CVE-2025-52665: Ubiquiti UniFi Access Vulnerability — When Smart Doors Turn Dangerous</title>
			<itunes:title>CVE-2025-52665: Ubiquiti UniFi Access Vulnerability — When Smart Doors Turn Dangerous</itunes:title>
			<pubDate>Fri, 07 Nov 2025 15:30:00 GMT</pubDate>
			<itunes:duration>7:29</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/690e00c8c72b7869e28c2947/media.mp3" length="129493456" type="audio/mpeg"/>
			<guid isPermaLink="false">690e00c8c72b7869e28c2947</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e13</link>
			<acast:episodeId>690e00c8c72b7869e28c2947</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e13</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bvCmLoX9DqlSin8DU4Etac92BeJvrVPtVWj+SIkDDAS1+LKqNOJDP2NA3NTwYb07o6EV7GXP27JQfuBYN/Jqp/]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E13 </itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>13</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1762525186835-ee22f788-0516-4452-9b92-21790ef3cb89.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast – CVE of the Week</em>, John Barger and Lou Schmidt dive deep into <strong>CVE-2025-52665</strong>, a <strong>critical 10.0 CVSS vulnerability</strong> impacting <strong>Ubiquiti’s UniFi Access Management API</strong>. This flaw blends <strong>physical security and cybersecurity</strong> risks — allowing unauthenticated attackers to execute remote code, manipulate door access, or even <strong>lock users inside buildings</strong>.</p><br><p>John and Lou break down how this misconfigured API opens the door (literally) to full network takeover and discuss the real-world implications of <strong>smart building vulnerabilities</strong>. They cover the affected UniFi Access versions (<strong>3.3.22 to 3.4.31</strong>) and emphasize updating immediately to version <strong>4.0.21 or later</strong>.</p><br><p>Beyond the technical details, they debate the broader question: <em>Are smart buildings worth the risk?</em> From API hygiene to network segmentation, the hosts offer actionable strategies to secure IoT infrastructure and ensure that “smart” doesn’t become “unsafe.”</p><br><p>⸻</p><br><p><strong>Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast – CVE of the Week</em>, John Barger and Lou Schmidt dive deep into <strong>CVE-2025-52665</strong>, a <strong>critical 10.0 CVSS vulnerability</strong> impacting <strong>Ubiquiti’s UniFi Access Management API</strong>. This flaw blends <strong>physical security and cybersecurity</strong> risks — allowing unauthenticated attackers to execute remote code, manipulate door access, or even <strong>lock users inside buildings</strong>.</p><br><p>John and Lou break down how this misconfigured API opens the door (literally) to full network takeover and discuss the real-world implications of <strong>smart building vulnerabilities</strong>. They cover the affected UniFi Access versions (<strong>3.3.22 to 3.4.31</strong>) and emphasize updating immediately to version <strong>4.0.21 or later</strong>.</p><br><p>Beyond the technical details, they debate the broader question: <em>Are smart buildings worth the risk?</em> From API hygiene to network segmentation, the hosts offer actionable strategies to secure IoT infrastructure and ensure that “smart” doesn’t become “unsafe.”</p><br><p>⸻</p><br><p><strong>Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>EA’s AI Divide, Qualcomm’s Data Center Push, and Ubiquiti’s SFP Revolution</title>
			<itunes:title>EA’s AI Divide, Qualcomm’s Data Center Push, and Ubiquiti’s SFP Revolution</itunes:title>
			<pubDate>Mon, 03 Nov 2025 17:00:00 GMT</pubDate>
			<itunes:duration>24:05</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6908ce696ec9ad274acf898d/media.mp3" length="416219896" type="audio/mpeg"/>
			<guid isPermaLink="false">6908ce696ec9ad274acf898d</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e12</link>
			<acast:episodeId>6908ce696ec9ad274acf898d</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e12</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YjKGoow3PAtUK4ETpzzL5RqLH/QxZV0PMDxEggKZf5b0mEGXCjqKZ7aYtRD+QkqzYaLe5GpH442KY7zUTxi9x7]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E12</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>12</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1762184274834-34d89a8d-680d-4a2a-b981-5e9445197933.jpeg"/>
			<description><![CDATA[<p>In this week’s <em>IT SPARC Cast – News Bytes</em>, John and Lou explore the intersection of AI, hardware, and IT freedom — from creative tension at EA to chipmaking disruption.</p><br><p>First, Electronic Arts (EA) launches <em>ReefGPT</em>, an internal AI design tool meant to boost productivity across studios. Developers say it’s unreliable and fear job losses, while leadership insists AI is the future. John and Lou unpack the deeper message: <em>AI won’t take your job, but someone using AI will.</em></p><br><p>Then, Qualcomm jumps into the AI data center market with its new AI200 and AI250 chips — scaled-up versions of its mobile neural processors, ready to challenge Nvidia and AMD for inference workloads. The hosts discuss how this could finally relieve the GPU bottleneck driving AI infrastructure costs through the roof.</p><br><p>Next, Ubiquiti declares “SFP Liberation Day.” The new $49 <em>SFP Wizard</em> not only tests but <em>reprograms</em> fiber modules to work with any switch — bypassing vendor lock-ins from Cisco, HPE, and others. John and Lou call it “the jailbreak every network engineer has been waiting for.”</p><br><p>Finally, Substrate, a U.S. startup, unveils an X-ray lithography chipmaking tool that could rival ASML’s $400M EUV machines. Backed by $100M in funding, the company aims to bring advanced chip manufacturing back to the U.S. — potentially reshaping the semiconductor landscape.</p><br><p>00:00 - Intro</p><p>00:52 - Electronic Arts (EA) AI Divide</p><p>•EA launches <em>ReefGPT</em> to accelerate game design.</p><p>•Creatives call it unreliable and fear losing creative control.</p><p><a href="https://www.businessinsider.com/inside-ai-divide-roiling-video-game-giant-electronic-arts-2025-10?op=1" rel="noopener noreferrer" target="_blank">https://www.businessinsider.com/inside-ai-divide-roiling-video-game-giant-electronic-arts-2025-10?op=1</a> &nbsp;</p><p>04:15&nbsp;- Qualcomm Joins the AI Arms Race</p><p>•Qualcomm announces AI200 (2026) and AI250 (2027) chips for data centers.</p><p>•Targets Nvidia’s GPU monopoly with rack-mounted, liquid-cooled solutions.</p><p>•Could ease supply pressure and diversify AI compute resources.</p><p><a href="https://www.cnbc.com/2025/10/27/qualcomm-ai200-ai250-ai-chips-nvidia-amd.html" rel="noopener noreferrer" target="_blank">https://www.cnbc.com/2025/10/27/qualcomm-ai200-ai250-ai-chips-nvidia-amd.html</a>&nbsp;</p><p>11:35 - Ubiquiti Liberates the SFPs</p><p>•“SFP Liberation Day” brings a $49 <em>SFP Wizard</em> tool for testing and reprogramming optics.</p><p>•Supports SFP, SFP+, and QSFP modules across brands.</p><p>•A win for network engineers tired of overpriced vendor modules.</p><p><a href="https://blog.ui.com/article/welcome-to-sfp-liberation-day" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/welcome-to-sfp-liberation-day</a>&nbsp;</p><p>15:58 - Substrate Announces Chipmaking Tool to Rival ASML</p><p>•Substrate reveals an X-ray lithography system</p><p>•Rivaling ASML’s EUV tools at lower cost.</p><p>•Could reshape semiconductor competition and domestic manufacturing.</p><p><a href="https://www.reuters.com/world/asia-pacific/us-startup-substrate-announces-chipmaking-tool-that-it-says-will-rival-asml-2025-10-28/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/asia-pacific/us-startup-substrate-announces-chipmaking-tool-that-it-says-will-rival-asml-2025-10-28/</a></p><p><a href="https://www.ft.com/content/2496edef-4f1b-47aa-877d-9c01271faaa1" rel="noopener noreferrer" target="_blank">https://www.ft.com/content/2496edef-4f1b-47aa-877d-9c01271faaa1</a></p><p><a href="https://www.wsj.com/tech/peter-thiel-backed-startup-secures-100-million-to-make-chips-in-u-s-baff93ac" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/peter-thiel-backed-startup-secures-100-million-to-make-chips-in-u-s-baff93ac</a></p><p>21:02 - Mail Bag &amp; Wrap Up</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this week’s <em>IT SPARC Cast – News Bytes</em>, John and Lou explore the intersection of AI, hardware, and IT freedom — from creative tension at EA to chipmaking disruption.</p><br><p>First, Electronic Arts (EA) launches <em>ReefGPT</em>, an internal AI design tool meant to boost productivity across studios. Developers say it’s unreliable and fear job losses, while leadership insists AI is the future. John and Lou unpack the deeper message: <em>AI won’t take your job, but someone using AI will.</em></p><br><p>Then, Qualcomm jumps into the AI data center market with its new AI200 and AI250 chips — scaled-up versions of its mobile neural processors, ready to challenge Nvidia and AMD for inference workloads. The hosts discuss how this could finally relieve the GPU bottleneck driving AI infrastructure costs through the roof.</p><br><p>Next, Ubiquiti declares “SFP Liberation Day.” The new $49 <em>SFP Wizard</em> not only tests but <em>reprograms</em> fiber modules to work with any switch — bypassing vendor lock-ins from Cisco, HPE, and others. John and Lou call it “the jailbreak every network engineer has been waiting for.”</p><br><p>Finally, Substrate, a U.S. startup, unveils an X-ray lithography chipmaking tool that could rival ASML’s $400M EUV machines. Backed by $100M in funding, the company aims to bring advanced chip manufacturing back to the U.S. — potentially reshaping the semiconductor landscape.</p><br><p>00:00 - Intro</p><p>00:52 - Electronic Arts (EA) AI Divide</p><p>•EA launches <em>ReefGPT</em> to accelerate game design.</p><p>•Creatives call it unreliable and fear losing creative control.</p><p><a href="https://www.businessinsider.com/inside-ai-divide-roiling-video-game-giant-electronic-arts-2025-10?op=1" rel="noopener noreferrer" target="_blank">https://www.businessinsider.com/inside-ai-divide-roiling-video-game-giant-electronic-arts-2025-10?op=1</a> &nbsp;</p><p>04:15&nbsp;- Qualcomm Joins the AI Arms Race</p><p>•Qualcomm announces AI200 (2026) and AI250 (2027) chips for data centers.</p><p>•Targets Nvidia’s GPU monopoly with rack-mounted, liquid-cooled solutions.</p><p>•Could ease supply pressure and diversify AI compute resources.</p><p><a href="https://www.cnbc.com/2025/10/27/qualcomm-ai200-ai250-ai-chips-nvidia-amd.html" rel="noopener noreferrer" target="_blank">https://www.cnbc.com/2025/10/27/qualcomm-ai200-ai250-ai-chips-nvidia-amd.html</a>&nbsp;</p><p>11:35 - Ubiquiti Liberates the SFPs</p><p>•“SFP Liberation Day” brings a $49 <em>SFP Wizard</em> tool for testing and reprogramming optics.</p><p>•Supports SFP, SFP+, and QSFP modules across brands.</p><p>•A win for network engineers tired of overpriced vendor modules.</p><p><a href="https://blog.ui.com/article/welcome-to-sfp-liberation-day" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/welcome-to-sfp-liberation-day</a>&nbsp;</p><p>15:58 - Substrate Announces Chipmaking Tool to Rival ASML</p><p>•Substrate reveals an X-ray lithography system</p><p>•Rivaling ASML’s EUV tools at lower cost.</p><p>•Could reshape semiconductor competition and domestic manufacturing.</p><p><a href="https://www.reuters.com/world/asia-pacific/us-startup-substrate-announces-chipmaking-tool-that-it-says-will-rival-asml-2025-10-28/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/asia-pacific/us-startup-substrate-announces-chipmaking-tool-that-it-says-will-rival-asml-2025-10-28/</a></p><p><a href="https://www.ft.com/content/2496edef-4f1b-47aa-877d-9c01271faaa1" rel="noopener noreferrer" target="_blank">https://www.ft.com/content/2496edef-4f1b-47aa-877d-9c01271faaa1</a></p><p><a href="https://www.wsj.com/tech/peter-thiel-backed-startup-secures-100-million-to-make-chips-in-u-s-baff93ac" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/peter-thiel-backed-startup-secures-100-million-to-make-chips-in-u-s-baff93ac</a></p><p>21:02 - Mail Bag &amp; Wrap Up</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>DNS Nightmare: CVE-2025-40778 and the Scariest Phishing Setup Yet</title>
			<itunes:title>DNS Nightmare: CVE-2025-40778 and the Scariest Phishing Setup Yet</itunes:title>
			<pubDate>Fri, 31 Oct 2025 14:30:00 GMT</pubDate>
			<itunes:duration>10:38</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6904c61152ec2a4b13761fb9/media.mp3" length="183991900" type="audio/mpeg"/>
			<guid isPermaLink="false">6904c61152ec2a4b13761fb9</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e12</link>
			<acast:episodeId>6904c61152ec2a4b13761fb9</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e12</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7a2+J/vMbYjV3GWUTOeJwyfRiXtTgOGSdtU29RZfAYs4glzi6kec1iRQnnkUy0E2tkPOQ6T5inr8x7wFELM5Wwc]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E12</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>12</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1761920201754-55d3cdbb-be5f-412d-9c53-9cc86934bf0c.jpeg"/>
			<description><![CDATA[<p>In this special <strong>Halloween edition</strong> of <em>CVE of the Week</em>, John and Lou dive into a truly chilling scenario — a high-severity <strong>DNS poisoning flaw</strong> that could be the perfect setup for a wave of <strong>phishing attacks and credential theft</strong> across enterprise networks.</p><br><p>The star of the episode: <strong>CVE-2025-40778</strong>, a newly discovered vulnerability in <strong>BIND 9’s resolver logic</strong>. This flaw allows unauthenticated attackers to inject <strong>forged DNS records</strong>, redirecting legitimate queries to <strong>malicious servers</strong> — all without user interaction. With a <strong>CVSS score of 8.6</strong>, exploits are already active in the wild, and over <strong>5,900 exposed instances</strong> have been identified.</p><br><p>But that’s just the start. The hosts explain how major outages at <strong>AWS (US-East-1)</strong> and <strong>Microsoft Azure</strong> opened the door for clever phishers to strike when users were most vulnerable — during downtime. Together, these issues illustrate a perfect storm of <strong>technical failure and human manipulation</strong>.</p><br><p>Lou and John share practical defenses: patch immediately, <strong>enable DNSSEC</strong>, <strong>restrict recursion</strong>, and — most importantly — establish a <strong>trusted, redundant communication plan</strong> for your users before the next outage hits.</p><br><p>⸻</p><br><p><strong>Key Takeaways</strong></p><p>•<strong>CVE-2025-40778</strong> impacts <strong>BIND 9</strong> versions from 9.11 to 9.21.12, including S1 previews.</p><p>•Exploits are <strong>already circulating</strong> — attackers can poison DNS caches remotely.</p><p>•Misconfigured DNS and <strong>phishing attacks</strong> can combine for devastating impact.</p><p>•Immediate action: <strong>patch, enable DNSSEC, monitor cache entries</strong>, and <strong>reduce TTLs</strong>.</p><p>•Prepare for outages — build <strong>redundant user communication channels</strong> to prevent panic and credential leaks.</p><br><p><strong>Links</strong></p><p><a href="https://kb.isc.org/docs/cve-2025-40778" rel="noopener noreferrer" target="_blank">https://kb.isc.org/docs/cve-2025-40778</a>&nbsp;</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40778" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2025-40778</a></p><p><a href="https://thehackernews.com/2025/10/threatsday-bulletin-dns-poisoning-flaw.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/threatsday-bulletin-dns-poisoning-flaw.html</a>&nbsp;</p><p><a href="https://www.helpnetsecurity.com/2025/10/28/bind-9-vulnerability-cve-2025-40778-poc/" rel="noopener noreferrer" target="_blank">https://www.helpnetsecurity.com/2025/10/28/bind-9-vulnerability-cve-2025-40778-poc/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>Wrap-Up – Stay Connected</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this special <strong>Halloween edition</strong> of <em>CVE of the Week</em>, John and Lou dive into a truly chilling scenario — a high-severity <strong>DNS poisoning flaw</strong> that could be the perfect setup for a wave of <strong>phishing attacks and credential theft</strong> across enterprise networks.</p><br><p>The star of the episode: <strong>CVE-2025-40778</strong>, a newly discovered vulnerability in <strong>BIND 9’s resolver logic</strong>. This flaw allows unauthenticated attackers to inject <strong>forged DNS records</strong>, redirecting legitimate queries to <strong>malicious servers</strong> — all without user interaction. With a <strong>CVSS score of 8.6</strong>, exploits are already active in the wild, and over <strong>5,900 exposed instances</strong> have been identified.</p><br><p>But that’s just the start. The hosts explain how major outages at <strong>AWS (US-East-1)</strong> and <strong>Microsoft Azure</strong> opened the door for clever phishers to strike when users were most vulnerable — during downtime. Together, these issues illustrate a perfect storm of <strong>technical failure and human manipulation</strong>.</p><br><p>Lou and John share practical defenses: patch immediately, <strong>enable DNSSEC</strong>, <strong>restrict recursion</strong>, and — most importantly — establish a <strong>trusted, redundant communication plan</strong> for your users before the next outage hits.</p><br><p>⸻</p><br><p><strong>Key Takeaways</strong></p><p>•<strong>CVE-2025-40778</strong> impacts <strong>BIND 9</strong> versions from 9.11 to 9.21.12, including S1 previews.</p><p>•Exploits are <strong>already circulating</strong> — attackers can poison DNS caches remotely.</p><p>•Misconfigured DNS and <strong>phishing attacks</strong> can combine for devastating impact.</p><p>•Immediate action: <strong>patch, enable DNSSEC, monitor cache entries</strong>, and <strong>reduce TTLs</strong>.</p><p>•Prepare for outages — build <strong>redundant user communication channels</strong> to prevent panic and credential leaks.</p><br><p><strong>Links</strong></p><p><a href="https://kb.isc.org/docs/cve-2025-40778" rel="noopener noreferrer" target="_blank">https://kb.isc.org/docs/cve-2025-40778</a>&nbsp;</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40778" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2025-40778</a></p><p><a href="https://thehackernews.com/2025/10/threatsday-bulletin-dns-poisoning-flaw.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/threatsday-bulletin-dns-poisoning-flaw.html</a>&nbsp;</p><p><a href="https://www.helpnetsecurity.com/2025/10/28/bind-9-vulnerability-cve-2025-40778-poc/" rel="noopener noreferrer" target="_blank">https://www.helpnetsecurity.com/2025/10/28/bind-9-vulnerability-cve-2025-40778-poc/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>Wrap-Up – Stay Connected</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>OpenAI’s Atlas Browser | Quantum Breakthrough | AWS DNS Outage Explained</title>
			<itunes:title>OpenAI’s Atlas Browser | Quantum Breakthrough | AWS DNS Outage Explained</itunes:title>
			<pubDate>Mon, 27 Oct 2025 14:35:18 GMT</pubDate>
			<itunes:duration>21:38</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68ff83265d04b866960251c3/media.mp3" length="373829548" type="audio/mpeg"/>
			<guid isPermaLink="false">68ff83265d04b866960251c3</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e11</link>
			<acast:episodeId>68ff83265d04b866960251c3</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e11</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bLvRY5t/MGuuIhEU7e8n7Aej5UagPxQwzqGWEUm2w+myT6RBfp9FuTQKX5ECEviRQdz9zqjZziQ6MYq81PSI2l]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E11</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1761575407973-a5450c25-306d-4f4f-9466-539dbe41e756.jpeg"/>
			<description><![CDATA[<p>In this week’s <em>IT SPARC Cast – News Bytes</em>, John and Lou explore the fast-moving world of AI, quantum computing, and cloud reliability.</p><br><p>First up, <strong>OpenAI launches Atlas</strong>, an AI-powered browser with ChatGPT built in—complete with persistent memory, agent mode, and deep personalization. But as John warns, “If ChatGPT can see everything you do, that includes your company’s data.” Lou connects it to last week’s 7-Zip discussion, emphasizing the need for strict data access policies in enterprises managing shadow AI use.</p><br><p>Then, Google makes a <strong>quantum leap</strong> with its new <em>Willow</em> chip and <em>Quantum Echoes</em> algorithm, achieving verifiable quantum advantage—13,000x faster than classical supercomputers. The duo discusses its implications for material science, encryption, and the coming <em>“cryptopocalypse.”</em></p><br><p>Next, <strong>Signal gets proactive</strong>, introducing <em>Triple Ratchet Encryption</em>—a post-quantum secure update using ML-KEM (Kyber) to protect against future quantum decryption. It’s the first major messaging platform to harden itself against Harvest Now–Decrypt Later attacks.</p><br><p>Finally, in this week’s <strong>Hot Take</strong>, the hosts analyze the recent <strong>AWS DNS outage</strong> that took down half the internet. Their verdict? “It’s not just AWS—it’s the apps.” They discuss multi-region design, cloud dependency, and why “Five Nines” uptime might be a thing of the past.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>01:24 - OpenAI Debuts AI-Powered Browser (Atlas)</strong></p><p><a href="https://tech.slashdot.org/story/25/10/21/1725235/openai-debuts-ai-powered-browser-with-memory-and-agent-features" rel="noopener noreferrer" target="_blank" style="background-color: rgb(255, 255, 255);">https://tech.slashdot.org/story/25/10/21/1725235/openai-debuts-ai-powered-browser-with-memory-and-agent-features</a>&nbsp;</p><br><p><strong>07:27 - Google Launches New Quantum Chip and Algorithm</strong></p><p><a href="https://blog.google/technology/research/quantum-echoes-willow-verifiable-quantum-advantage/" rel="noopener noreferrer" target="_blank" style="background-color: rgb(255, 255, 255);">https://blog.google/technology/research/quantum-echoes-willow-verifiable-quantum-advantage/</a>&nbsp;</p><br><p><strong>09:31 - Signal Stays Ahead of the Game — Triple Ratchet Encryption</strong></p><p><a href="https://signal.org/blog/spqr" rel="noopener noreferrer" target="_blank">https://signal.org/blog/spqr</a>&nbsp;</p><br><p>⸻</p><br><p><strong>12:03 - Hot Take: Amazon Web Services (AWS) DNS Outage</strong></p><p>John recounts debugging his Ring cameras—before realizing the culprit was AWS.</p><p>•Cascading DNS failure caused a self-inflicted denial of service</p><p>•Exposed lack of redundancy and poor multi-region design</p><p>•50% of the internet went down, despite AWS only running 30% of it</p><p>Lou’s takeaway: “Cloud isn’t inherently resilient—it’s only as resilient as you design it to be.”</p><p><a href="https://youtu.be/ygcYoFBXdjQ" rel="noopener noreferrer" target="_blank">https://youtu.be/ygcYoFBXdjQ</a>&nbsp;</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this week’s <em>IT SPARC Cast – News Bytes</em>, John and Lou explore the fast-moving world of AI, quantum computing, and cloud reliability.</p><br><p>First up, <strong>OpenAI launches Atlas</strong>, an AI-powered browser with ChatGPT built in—complete with persistent memory, agent mode, and deep personalization. But as John warns, “If ChatGPT can see everything you do, that includes your company’s data.” Lou connects it to last week’s 7-Zip discussion, emphasizing the need for strict data access policies in enterprises managing shadow AI use.</p><br><p>Then, Google makes a <strong>quantum leap</strong> with its new <em>Willow</em> chip and <em>Quantum Echoes</em> algorithm, achieving verifiable quantum advantage—13,000x faster than classical supercomputers. The duo discusses its implications for material science, encryption, and the coming <em>“cryptopocalypse.”</em></p><br><p>Next, <strong>Signal gets proactive</strong>, introducing <em>Triple Ratchet Encryption</em>—a post-quantum secure update using ML-KEM (Kyber) to protect against future quantum decryption. It’s the first major messaging platform to harden itself against Harvest Now–Decrypt Later attacks.</p><br><p>Finally, in this week’s <strong>Hot Take</strong>, the hosts analyze the recent <strong>AWS DNS outage</strong> that took down half the internet. Their verdict? “It’s not just AWS—it’s the apps.” They discuss multi-region design, cloud dependency, and why “Five Nines” uptime might be a thing of the past.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>01:24 - OpenAI Debuts AI-Powered Browser (Atlas)</strong></p><p><a href="https://tech.slashdot.org/story/25/10/21/1725235/openai-debuts-ai-powered-browser-with-memory-and-agent-features" rel="noopener noreferrer" target="_blank" style="background-color: rgb(255, 255, 255);">https://tech.slashdot.org/story/25/10/21/1725235/openai-debuts-ai-powered-browser-with-memory-and-agent-features</a>&nbsp;</p><br><p><strong>07:27 - Google Launches New Quantum Chip and Algorithm</strong></p><p><a href="https://blog.google/technology/research/quantum-echoes-willow-verifiable-quantum-advantage/" rel="noopener noreferrer" target="_blank" style="background-color: rgb(255, 255, 255);">https://blog.google/technology/research/quantum-echoes-willow-verifiable-quantum-advantage/</a>&nbsp;</p><br><p><strong>09:31 - Signal Stays Ahead of the Game — Triple Ratchet Encryption</strong></p><p><a href="https://signal.org/blog/spqr" rel="noopener noreferrer" target="_blank">https://signal.org/blog/spqr</a>&nbsp;</p><br><p>⸻</p><br><p><strong>12:03 - Hot Take: Amazon Web Services (AWS) DNS Outage</strong></p><p>John recounts debugging his Ring cameras—before realizing the culprit was AWS.</p><p>•Cascading DNS failure caused a self-inflicted denial of service</p><p>•Exposed lack of redundancy and poor multi-region design</p><p>•50% of the internet went down, despite AWS only running 30% of it</p><p>Lou’s takeaway: “Cloud isn’t inherently resilient—it’s only as resilient as you design it to be.”</p><p><a href="https://youtu.be/ygcYoFBXdjQ" rel="noopener noreferrer" target="_blank">https://youtu.be/ygcYoFBXdjQ</a>&nbsp;</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>7-Zip Vulnerability: New CVEs Allow Remote Code Execution and File Overwrites</title>
			<itunes:title>7-Zip Vulnerability: New CVEs Allow Remote Code Execution and File Overwrites</itunes:title>
			<pubDate>Fri, 24 Oct 2025 14:30:00 GMT</pubDate>
			<itunes:duration>9:18</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68fb8bfddeee754a72b436d6/media.mp3" length="160880812" type="audio/mpeg"/>
			<guid isPermaLink="false">68fb8bfddeee754a72b436d6</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e11</link>
			<acast:episodeId>68fb8bfddeee754a72b436d6</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e11</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Zh2yVRA9zWOO5xS7ybGFRLRuaK/JvKMZ9wEAbzrDH5eu7w++Bpdw/yTKDxO4FclKjXBOmGpsMD9z9nBCRoGnfv]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E11</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1761315665976-139d76e3-1d23-4a7f-836c-eecd1ea24d12.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>CVE of the Week</strong>, John and Lou unpack a fresh pair of vulnerabilities affecting one of the most common tools on Windows desktops — <strong>7-Zip</strong>.</p><br><p>Tracked as <strong>CVE-2025-11001</strong> and <strong>CVE-2025-11002</strong>, these directory traversal flaws allow attackers to craft malicious archives that can <strong>escape the extraction folder</strong>, <strong>overwrite arbitrary files</strong>, and potentially lead to <strong>remote code execution (RCE)</strong>. The hosts discuss how the vulnerabilities impact not just individual users but also automated systems such as <strong>CI/CD pipelines, backup servers, and antivirus scanners</strong> that automatically unpack archives.</p><br><p>They also cover how this seemingly moderate (CVSS 7.0) issue highlights a deeper problem — <strong>shadow IT and uncontrolled software installation</strong> inside enterprise environments. From patching strategies to user privilege escalation controls, this episode offers real-world guidance for keeping your organization secure.</p><br><p>⸻</p><br><p><strong>Key Takeaways</strong></p><p>•Two new <strong>7-Zip vulnerabilities</strong> (CVE-2025-11001 &amp; CVE-2025-11002) enable <strong>directory traversal and code execution</strong>.</p><p>•Impacts <strong>Windows desktops</strong> and <strong>automated extraction workflows</strong> in enterprise systems.</p><p>•Proof-of-concept exploits are already public on GitHub.</p><p>•The fix: <strong>Update 7-Zip immediately</strong>, disable automatic extraction of untrusted files, and <strong>audit your endpoint permissions</strong>.</p><p>•Also, define a <strong>clear policy for software installation</strong> to minimize risk from unmanaged tools.</p><br><p>⸻</p><br><p><strong>Stay Connected</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>CVE of the Week</strong>, John and Lou unpack a fresh pair of vulnerabilities affecting one of the most common tools on Windows desktops — <strong>7-Zip</strong>.</p><br><p>Tracked as <strong>CVE-2025-11001</strong> and <strong>CVE-2025-11002</strong>, these directory traversal flaws allow attackers to craft malicious archives that can <strong>escape the extraction folder</strong>, <strong>overwrite arbitrary files</strong>, and potentially lead to <strong>remote code execution (RCE)</strong>. The hosts discuss how the vulnerabilities impact not just individual users but also automated systems such as <strong>CI/CD pipelines, backup servers, and antivirus scanners</strong> that automatically unpack archives.</p><br><p>They also cover how this seemingly moderate (CVSS 7.0) issue highlights a deeper problem — <strong>shadow IT and uncontrolled software installation</strong> inside enterprise environments. From patching strategies to user privilege escalation controls, this episode offers real-world guidance for keeping your organization secure.</p><br><p>⸻</p><br><p><strong>Key Takeaways</strong></p><p>•Two new <strong>7-Zip vulnerabilities</strong> (CVE-2025-11001 &amp; CVE-2025-11002) enable <strong>directory traversal and code execution</strong>.</p><p>•Impacts <strong>Windows desktops</strong> and <strong>automated extraction workflows</strong> in enterprise systems.</p><p>•Proof-of-concept exploits are already public on GitHub.</p><p>•The fix: <strong>Update 7-Zip immediately</strong>, disable automatic extraction of untrusted files, and <strong>audit your endpoint permissions</strong>.</p><p>•Also, define a <strong>clear policy for software installation</strong> to minimize risk from unmanaged tools.</p><br><p>⸻</p><br><p><strong>Stay Connected</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>UniFi 9.5 Arrives, Satellite Secrets, and Cloud Vendors Cut Ties with China</title>
			<itunes:title>UniFi 9.5 Arrives, Satellite Secrets, and Cloud Vendors Cut Ties with China</itunes:title>
			<pubDate>Mon, 20 Oct 2025 14:30:00 GMT</pubDate>
			<itunes:duration>20:19</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68f6363559323046ca709aa2/media.mp3" length="351126868" type="audio/mpeg"/>
			<guid isPermaLink="false">68f6363559323046ca709aa2</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e10</link>
			<acast:episodeId>68f6363559323046ca709aa2</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e10</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bGpCDkquB6yz0ueAQpz3NTVcRbn3IMUyoic/U3F6inqtkHwZIAyvqf52cRCUn5GSG56sXNhd/O7HINJ/5mLxK/]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E10</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1760965397370-2cf9d972-ec29-48d0-9e62-0eadd53caf7a.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast – News Bytes, John and Lou cover the latest updates from Ubiquiti, Google, and the global supply chain.</p><br><p>First, UniFi Network 9.5 rolls out with Channel AI, a next-gen visualization tool that uses AI to map RF interference, optimize channels, and improve roaming performance. Add in wired port anomaly detection, Bonjour and multicast enhancements, and it’s clear—Ubiquiti’s aiming straight at the enterprise.</p><br><p>Then, a new report from UC San Diego and the University of Maryland reveals that half of all geostationary satellites are transmitting unencrypted data—including in-flight Wi-Fi, phone calls, and even critical infrastructure telemetry. Lou calls it “the coffee shop Wi-Fi of enterprise networking.”</p><br><p>Finally, Microsoft, AWS, and Google are all cutting China out of their supply chains, relocating server, switch, and AI chip production to India, Thailand, and Vietnam to reduce risk and geopolitical exposure. The move may reshape where tomorrow’s cloud is built.</p><br><p>⸻</p><br><p>⏱️ Show Notes</p><br><p>00:00 - Intro</p><p>John &amp; Lou tee up the week’s biggest IT stories with a mix of insight, humor, and caffeine.</p><br><p>⸻</p><br><p>00:48 - Introducing UniFi Network 9.5</p><p>•Major update to UniFi’s platform with Channel AI for real-time RF visualization.</p><p>•Enhanced roaming for Apple devices.</p><p>•New wired port anomaly detection and better multicast handling.</p><p>•Lou calls it “the most enterprise-ready version of UniFi yet.”</p><p>https://blog.ui.com/article/releasing-unifi-network-9-5&nbsp;</p><br><p><br></p><p>⸻</p><br><p>06:18 - Satellites Found Exposing Unencrypted Data</p><p>•Researchers intercepted sensitive traffic from half of all GEO satellites.</p><p>•Data included calls, in-flight Wi-Fi, and industrial telemetry.</p><p>•Some providers, like AT&amp;T and T-Mobile Mexico, are still unpatched.</p><p>•John warns: “Satellites are the coffee shop Wi-Fi of enterprise networks.”</p><p>•Encrypt your traffic at the endpoint—don’t rely on the carrier.</p><p>https://techcrunch.com/2025/10/14/satellites-found-exposing-unencrypted-data-including-phone-calls-and-some-military-comms/&nbsp;&nbsp;</p><br><p><br></p><p>⸻</p><br><p>12:24 - Microsoft, AWS, and Google Are Reducing China’s Role in Their Supply Chains</p><p>•Microsoft aims for 80% of Surface, Xbox, and server production outside China by 2026.</p><p>•AWS and Google shifting to India, Thailand, and Vietnam.</p><p>•Lou notes: “The white boxes in your rack probably started in a hyperscaler design lab.”</p><p>•Reduced tariffs, diversified supply, and fewer geopolitical risks ahead.</p><p>https://techcrunch.com/2025/10/16/microsoft-aws-and-google-are-trying-to-drastically-reduce-chinas-role-in-their-supply-chains/&nbsp;</p><p>&nbsp;</p><br><p>⸻</p><br><p>18:05 - Mail Bag &amp; Wrap Up</p><p>Listener Tom writes in, celebrating Synology’s decision to restore third-party drive compatibility:</p><br><p>“They’re back at the top of my list.”</p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast – News Bytes, John and Lou cover the latest updates from Ubiquiti, Google, and the global supply chain.</p><br><p>First, UniFi Network 9.5 rolls out with Channel AI, a next-gen visualization tool that uses AI to map RF interference, optimize channels, and improve roaming performance. Add in wired port anomaly detection, Bonjour and multicast enhancements, and it’s clear—Ubiquiti’s aiming straight at the enterprise.</p><br><p>Then, a new report from UC San Diego and the University of Maryland reveals that half of all geostationary satellites are transmitting unencrypted data—including in-flight Wi-Fi, phone calls, and even critical infrastructure telemetry. Lou calls it “the coffee shop Wi-Fi of enterprise networking.”</p><br><p>Finally, Microsoft, AWS, and Google are all cutting China out of their supply chains, relocating server, switch, and AI chip production to India, Thailand, and Vietnam to reduce risk and geopolitical exposure. The move may reshape where tomorrow’s cloud is built.</p><br><p>⸻</p><br><p>⏱️ Show Notes</p><br><p>00:00 - Intro</p><p>John &amp; Lou tee up the week’s biggest IT stories with a mix of insight, humor, and caffeine.</p><br><p>⸻</p><br><p>00:48 - Introducing UniFi Network 9.5</p><p>•Major update to UniFi’s platform with Channel AI for real-time RF visualization.</p><p>•Enhanced roaming for Apple devices.</p><p>•New wired port anomaly detection and better multicast handling.</p><p>•Lou calls it “the most enterprise-ready version of UniFi yet.”</p><p>https://blog.ui.com/article/releasing-unifi-network-9-5&nbsp;</p><br><p><br></p><p>⸻</p><br><p>06:18 - Satellites Found Exposing Unencrypted Data</p><p>•Researchers intercepted sensitive traffic from half of all GEO satellites.</p><p>•Data included calls, in-flight Wi-Fi, and industrial telemetry.</p><p>•Some providers, like AT&amp;T and T-Mobile Mexico, are still unpatched.</p><p>•John warns: “Satellites are the coffee shop Wi-Fi of enterprise networks.”</p><p>•Encrypt your traffic at the endpoint—don’t rely on the carrier.</p><p>https://techcrunch.com/2025/10/14/satellites-found-exposing-unencrypted-data-including-phone-calls-and-some-military-comms/&nbsp;&nbsp;</p><br><p><br></p><p>⸻</p><br><p>12:24 - Microsoft, AWS, and Google Are Reducing China’s Role in Their Supply Chains</p><p>•Microsoft aims for 80% of Surface, Xbox, and server production outside China by 2026.</p><p>•AWS and Google shifting to India, Thailand, and Vietnam.</p><p>•Lou notes: “The white boxes in your rack probably started in a hyperscaler design lab.”</p><p>•Reduced tariffs, diversified supply, and fewer geopolitical risks ahead.</p><p>https://techcrunch.com/2025/10/16/microsoft-aws-and-google-are-trying-to-drastically-reduce-chinas-role-in-their-supply-chains/&nbsp;</p><p>&nbsp;</p><br><p>⸻</p><br><p>18:05 - Mail Bag &amp; Wrap Up</p><p>Listener Tom writes in, celebrating Synology’s decision to restore third-party drive compatibility:</p><br><p>“They’re back at the top of my list.”</p><br><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[F5 Breach: Nation-State Hack Exposes Source Code & Global Infrastructure Risks]]></title>
			<itunes:title><![CDATA[F5 Breach: Nation-State Hack Exposes Source Code & Global Infrastructure Risks]]></itunes:title>
			<pubDate>Fri, 17 Oct 2025 14:30:00 GMT</pubDate>
			<itunes:duration>10:25</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68f247a459323046ca1c0007/media.mp3" length="180015928" type="audio/mpeg"/>
			<guid isPermaLink="false">68f247a459323046ca1c0007</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e10</link>
			<acast:episodeId>68f247a459323046ca1c0007</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e10</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZdgpEjtDefhjuQbjDWPd0w9jLIX9nrE1uyyWz9Icu9H3O1LC1VzuGUVHyU47mF9+7hM+wtbEyIIBmcc3apFhpq]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E10</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1760708400147-d4c55418-613a-460c-945c-c2062092a613.jpeg"/>
			<description><![CDATA[<p>A suspected state-sponsored attack has breached <strong>F5 Networks</strong>, compromising <strong>source code, customer data, and production systems</strong>. With F5 handling <strong>85% of global load balancing</strong>, this could expose countless organizations to new zero-day vulnerabilities.</p><br><p>John and Lou break down how it happened, what’s at risk, and what you should do <em>right now</em> if your infrastructure depends on F5 BIG-IP or related systems.</p><br><p>✅ Learn how to prepare for cascading exploits</p><p>✅ Why this breach could redefine patch management and Zero Trust</p><p>✅ What AI means for future vulnerability discovery</p><br><p>Like, subscribe, and share to stay ahead of the next major exploit.</p><br><p><strong>Follow us:</strong></p><p>IT SPARC Cast — @ITSPARCCast on X | https://www.linkedin.com/company/sparc-sales/</p><p>John Barger — @john_Video on X | https://www.linkedin.com/in/johnbarger/</p><p>Lou Schmidt — @loudoggeek on X | https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>A suspected state-sponsored attack has breached <strong>F5 Networks</strong>, compromising <strong>source code, customer data, and production systems</strong>. With F5 handling <strong>85% of global load balancing</strong>, this could expose countless organizations to new zero-day vulnerabilities.</p><br><p>John and Lou break down how it happened, what’s at risk, and what you should do <em>right now</em> if your infrastructure depends on F5 BIG-IP or related systems.</p><br><p>✅ Learn how to prepare for cascading exploits</p><p>✅ Why this breach could redefine patch management and Zero Trust</p><p>✅ What AI means for future vulnerability discovery</p><br><p>Like, subscribe, and share to stay ahead of the next major exploit.</p><br><p><strong>Follow us:</strong></p><p>IT SPARC Cast — @ITSPARCCast on X | https://www.linkedin.com/company/sparc-sales/</p><p>John Barger — @john_Video on X | https://www.linkedin.com/in/johnbarger/</p><p>Lou Schmidt — @loudoggeek on X | https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Ubiquiti’s Power Play, Google’s Code Doctor, and Synology’s Surrender</title>
			<itunes:title>Ubiquiti’s Power Play, Google’s Code Doctor, and Synology’s Surrender</itunes:title>
			<pubDate>Mon, 13 Oct 2025 14:30:00 GMT</pubDate>
			<itunes:duration>19:49</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68ed04afd798804c9e7777a2/media.mp3" length="342562312" type="audio/mpeg"/>
			<guid isPermaLink="false">68ed04afd798804c9e7777a2</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e09</link>
			<acast:episodeId>68ed04afd798804c9e7777a2</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e09</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bpmqvFQ+VeBByxoOVao67o/9iRQ/7HveY3IDOespd0rmLgjkgoMTU6z0X8HILoRVRGpBcYqkePCCFwXg4zH0Kd]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E09</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1760363489857-496e361c-e21d-44e0-8196-f31f187d1d38.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou break down three big stories that touch nearly every corner of enterprise IT—from power to code to storage.</p><br><p>First, <strong>Ubiquiti</strong> expands into the UPS market with the new <strong>UniFi Uninterruptible Power Supply</strong>, combining network management integration, graceful shutdown control, and plug-and-play simplicity for small offices and home labs.</p><br><p>Then, they explore Google DeepMind’s latest breakthrough—<strong>CodeMender</strong>, an AI tool that not only finds software vulnerabilities but also rewrites and tests patches automatically before submitting them upstream.</p><br><p>Finally, <strong>Synology caves to user backlash</strong>, walking back its controversial policy that restricted third-party drives in 2025 NAS models. The nerd uprising worked, restoring support for Seagate, WD, and other drives under DSM 7.3.</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>00:51 - Ubiquiti Is Launching a New UniFi Uninterruptible Power Strategy</strong></p><p>Ubiquiti enters the UPS market with the <strong>UniFi UPS Tower</strong> ($159) and <strong>UniFi UPS 2U Rackmount</strong> ($279).</p><p>•Fully integrates with UniFi OS for device-wide graceful shutdown.</p><p>•Simplifies UPS monitoring—no scripting or manual config needed.</p><p><a href="https://blog.ui.com/article/introducing-uninterruptible-power" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/introducing-uninterruptible-power</a></p><br><p><strong>06:00 - Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them</strong></p><p>Google DeepMind’s <strong>CodeMender</strong> is the next step in automated software security.</p><p>•Detects, rewrites, and self-tests patches before submitting them.</p><p>•Refactors vulnerable code to prevent flaw reoccurrence.</p><p>•Uses multi-AI feedback loops to ensure accuracy before final submission.</p><p><a href="https://thehackernews.com/2025/10/googles-new-ai-doesnt-just-find.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/googles-new-ai-doesnt-just-find.html</a>&nbsp;</p><br><p><strong>11:03 - Synology Walks Back Controversial Compatibility Policy for 2025 NAS Units</strong></p><p>User backlash works—Synology reverses its decision to block third-party drives in the <strong>Plus Series</strong> 2025 NAS lineup.</p><p>•DSM 7.3 restores compatibility with non-Synology drives.</p><p>•Synology pledges a new third-party drive validation program.</p><p><a href="https://www.tomshardware.com/pc-components/nas/synology-walks-back-controversial-compatibility-policy-for-2025-nas-units-third-party-hdd-and-ssd-support-returns-with-diskstation-manager-7-3-update" rel="noopener noreferrer" target="_blank">https://www.tomshardware.com/pc-components/nas/synology-walks-back-controversial-compatibility-policy-for-2025-nas-units-third-party-hdd-and-ssd-support-returns-with-diskstation-manager-7-3-update</a>&nbsp;</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/sparc-sales/</a> on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnbarger/</a> on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/louis-schmidt-b102446/</a> on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou break down three big stories that touch nearly every corner of enterprise IT—from power to code to storage.</p><br><p>First, <strong>Ubiquiti</strong> expands into the UPS market with the new <strong>UniFi Uninterruptible Power Supply</strong>, combining network management integration, graceful shutdown control, and plug-and-play simplicity for small offices and home labs.</p><br><p>Then, they explore Google DeepMind’s latest breakthrough—<strong>CodeMender</strong>, an AI tool that not only finds software vulnerabilities but also rewrites and tests patches automatically before submitting them upstream.</p><br><p>Finally, <strong>Synology caves to user backlash</strong>, walking back its controversial policy that restricted third-party drives in 2025 NAS models. The nerd uprising worked, restoring support for Seagate, WD, and other drives under DSM 7.3.</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>00:51 - Ubiquiti Is Launching a New UniFi Uninterruptible Power Strategy</strong></p><p>Ubiquiti enters the UPS market with the <strong>UniFi UPS Tower</strong> ($159) and <strong>UniFi UPS 2U Rackmount</strong> ($279).</p><p>•Fully integrates with UniFi OS for device-wide graceful shutdown.</p><p>•Simplifies UPS monitoring—no scripting or manual config needed.</p><p><a href="https://blog.ui.com/article/introducing-uninterruptible-power" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/introducing-uninterruptible-power</a></p><br><p><strong>06:00 - Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them</strong></p><p>Google DeepMind’s <strong>CodeMender</strong> is the next step in automated software security.</p><p>•Detects, rewrites, and self-tests patches before submitting them.</p><p>•Refactors vulnerable code to prevent flaw reoccurrence.</p><p>•Uses multi-AI feedback loops to ensure accuracy before final submission.</p><p><a href="https://thehackernews.com/2025/10/googles-new-ai-doesnt-just-find.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/googles-new-ai-doesnt-just-find.html</a>&nbsp;</p><br><p><strong>11:03 - Synology Walks Back Controversial Compatibility Policy for 2025 NAS Units</strong></p><p>User backlash works—Synology reverses its decision to block third-party drives in the <strong>Plus Series</strong> 2025 NAS lineup.</p><p>•DSM 7.3 restores compatibility with non-Synology drives.</p><p>•Synology pledges a new third-party drive validation program.</p><p><a href="https://www.tomshardware.com/pc-components/nas/synology-walks-back-controversial-compatibility-policy-for-2025-nas-units-third-party-hdd-and-ssd-support-returns-with-diskstation-manager-7-3-update" rel="noopener noreferrer" target="_blank">https://www.tomshardware.com/pc-components/nas/synology-walks-back-controversial-compatibility-policy-for-2025-nas-units-third-party-hdd-and-ssd-support-returns-with-diskstation-manager-7-3-update</a>&nbsp;</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/sparc-sales/</a> on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnbarger/</a> on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/louis-schmidt-b102446/</a> on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Redis “RediShell” CVE-2025-49844: Cloud Infrastructure at Risk</title>
			<itunes:title>Redis “RediShell” CVE-2025-49844: Cloud Infrastructure at Risk</itunes:title>
			<pubDate>Fri, 10 Oct 2025 14:30:00 GMT</pubDate>
			<itunes:duration>10:23</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68e91234d8c631bb5092fc78/media.mp3" length="179451364" type="audio/mpeg"/>
			<guid isPermaLink="false">68e91234d8c631bb5092fc78</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e09</link>
			<acast:episodeId>68e91234d8c631bb5092fc78</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e09</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7a6nHpTf30FFFAwbBFwnAJoGkpZUuJV2gZFrm6VV5/geb32nIEhr0heyGgRNyG/S7bWYPsXmskhKt+RHORnrvK9]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E09</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1760104936825-f7d33e2a-edda-4bbf-b736-d42e4b50a524.jpeg"/>
			<description><![CDATA[<p>In this week’s episode of <em>IT SPARC Cast - CVE of the Week</em>, John Barger and Lou Schmidt dive deep into <strong>CVE-2025-49844</strong>, a newly discovered and <strong>critical remote code execution vulnerability</strong> in <strong>Redis</strong>—the in-memory database that powers over <strong>75% of cloud services</strong>. This flaw, dubbed <strong>“RediShell”</strong>, scores a <strong>perfect 10.0 CVSS</strong> and affects Redis instances using <strong>Lua scripting</strong>, allowing attackers to execute arbitrary code and gain full system control.</p><br><p>This 13-year-old bug stems from a <strong>use-after-free memory corruption</strong> issue that lets attackers escape the Lua sandbox, run malicious code, exfiltrate data, deploy crypto miners, or move laterally inside cloud environments. Even worse—more than <strong>60,000 internet-exposed Redis servers have no authentication</strong>, leaving them completely open to exploitation.</p><br><p>John and Lou discuss how this happened, what you can do to secure your infrastructure, and why “cloud-hosted” doesn’t always mean “secure.”</p><p>✅ <strong>Key Takeaways:</strong></p><p>•Update to patched versions immediately (8.2.2, 8.0.4, 7.4.6, 7.2.11, 6.2.20)</p><p>•Restrict network access with ACLs</p><p>•Rotate all credentials and API keys</p><p>•Don’t run Redis as root</p><p>•Isolate any compromised hosts before investigation</p><br><p>Lou calls it <em>“a 10 on the oh-crap-ometer”</em>—and he’s not wrong.</p><br><p><a href="https://thehackernews.com/2025/10/13-year-redis-flaw-exposed-cvss-100.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/13-year-redis-flaw-exposed-cvss-100.html</a></p><p><a href="https://www.darkreading.com/cloud-security/patch-now-redishell-redis-rce" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cloud-security/patch-now-redishell-redis-rce</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this week’s episode of <em>IT SPARC Cast - CVE of the Week</em>, John Barger and Lou Schmidt dive deep into <strong>CVE-2025-49844</strong>, a newly discovered and <strong>critical remote code execution vulnerability</strong> in <strong>Redis</strong>—the in-memory database that powers over <strong>75% of cloud services</strong>. This flaw, dubbed <strong>“RediShell”</strong>, scores a <strong>perfect 10.0 CVSS</strong> and affects Redis instances using <strong>Lua scripting</strong>, allowing attackers to execute arbitrary code and gain full system control.</p><br><p>This 13-year-old bug stems from a <strong>use-after-free memory corruption</strong> issue that lets attackers escape the Lua sandbox, run malicious code, exfiltrate data, deploy crypto miners, or move laterally inside cloud environments. Even worse—more than <strong>60,000 internet-exposed Redis servers have no authentication</strong>, leaving them completely open to exploitation.</p><br><p>John and Lou discuss how this happened, what you can do to secure your infrastructure, and why “cloud-hosted” doesn’t always mean “secure.”</p><p>✅ <strong>Key Takeaways:</strong></p><p>•Update to patched versions immediately (8.2.2, 8.0.4, 7.4.6, 7.2.11, 6.2.20)</p><p>•Restrict network access with ACLs</p><p>•Rotate all credentials and API keys</p><p>•Don’t run Redis as root</p><p>•Isolate any compromised hosts before investigation</p><br><p>Lou calls it <em>“a 10 on the oh-crap-ometer”</em>—and he’s not wrong.</p><br><p><a href="https://thehackernews.com/2025/10/13-year-redis-flaw-exposed-cvss-100.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/13-year-redis-flaw-exposed-cvss-100.html</a></p><p><a href="https://www.darkreading.com/cloud-security/patch-now-redishell-redis-rce" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cloud-security/patch-now-redishell-redis-rce</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Landlord Hacks, Stargate Chips, and Robot Takeovers</title>
			<itunes:title>Landlord Hacks, Stargate Chips, and Robot Takeovers</itunes:title>
			<pubDate>Mon, 06 Oct 2025 14:30:22 GMT</pubDate>
			<itunes:duration>18:42</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68e3d27eb2765b0be4a57953/media.mp3" length="323174944" type="audio/mpeg"/>
			<guid isPermaLink="false">68e3d27eb2765b0be4a57953</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e08</link>
			<acast:episodeId>68e3d27eb2765b0be4a57953</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e08</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Yeh5mfzhGI86uDub25bDgdGFdFEimItReo8+Tpuw9LtuX26l3gBGQnhAC8oCPlSiGfBdX2iwnrwDric3/jY37a]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E08</itunes:subtitle>
			<itunes:episodeType>bonus</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1759760579087-4439eec6-aa90-494c-8d74-9c0e12b1f46d.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou dive into three stories that blur the line between security, AI, and sci-fi becoming reality.</p><br><p>First, a jaw-dropping report reveals <strong>landlords using tenant-screening services to demand employee workplace logins</strong>—scraping paystubs directly from systems like ADP. It’s not only unethical—it’s potentially illegal. John and Lou unpack the security, HR, and legal nightmare this poses for corporate IT teams.</p><br><p>Next, <strong>OpenAI and Samsung team up under the Stargate project</strong>, with Samsung dedicating nearly 40% of its DRAM output to fuel OpenAI’s next wave of AI data centers—potentially even floating ones. The AI arms race is expanding into new dimensions.</p><br><p>Finally, a newly disclosed exploit gives attackers full control over <strong>Unitree robots</strong>—including humanoids and quadrupeds—via Bluetooth. The flaw, dubbed <em>UniPwn</em>, allows worms to spread across fleets of robots. Lou calls it “Runaway with Tom Selleck meets Star Trek: The Borg.”</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><p>John and Lou set up this week’s stories on privacy violations, AI chip deals, and robot exploits.</p><br><p>⸻</p><br><p><strong>00:48 - Landlords Demand Tenants’ Workplace Logins to Scrape Their Paystubs</strong></p><p>Landlords and tenant-screening services are asking renters to log into employer systems so they can scrape payroll data.</p><p>•Platforms like <em>Argyle</em> and <em>Approve Shield</em> are at the center of the controversy.</p><p>•This violates employee data access policies and may breach federal hacking laws.</p><p>•IT leaders should issue internal advisories and enforce MFA to prevent credential leaks.</p><p><a href="https://www.404media.co/landlords-demand-tenants-workplace-logins-to-scrape-their-paystubs/" rel="noopener noreferrer" target="_blank">https://www.404media.co/landlords-demand-tenants-workplace-logins-to-scrape-their-paystubs/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>07:05 - OpenAI, Samsung &amp; the Stargate Chip Pact</strong></p><p>OpenAI partners with Samsung and SK Hynix under the <em>Stargate</em> project.</p><p>•Samsung to provide 900,000 DRAM wafers monthly—40% of its capacity.</p><p>•Floating, green data centers are in the works.</p><p>•May overlap with Nvidia’s 10GW expansion announced last week.</p><p><a href="https://www.theverge.com/news/789687/openai-samsung-stargate-chips" rel="noopener noreferrer" target="_blank">https://www.theverge.com/news/789687/openai-samsung-stargate-chips</a>&nbsp;</p><br><p>⸻</p><br><p><strong>10:51 - Exploit Allows Takeover of Fleets of Unitree Robots</strong></p><p>Researchers uncovered <em>CVE-2025-60251</em>, a wormable flaw in Unitree’s robot lineup.</p><p>•Bluetooth handshake vulnerability allows remote takeover.</p><p>•Affects quadrupedal GO2/B2 and humanoid G1/H1 robots.</p><p>•Attackers can form botnets, move robots, or exfiltrate data.</p><p>•Security professionals must begin planning IoT and robotics policies now.</p><p><a href="https://spectrum.ieee.org/unitree-robot-exploit" rel="noopener noreferrer" target="_blank">https://spectrum.ieee.org/unitree-robot-exploit</a>&nbsp;</p><br><p>⸻</p><br><p><strong>17:01 - Mail Bag &amp; Wrap Up</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou dive into three stories that blur the line between security, AI, and sci-fi becoming reality.</p><br><p>First, a jaw-dropping report reveals <strong>landlords using tenant-screening services to demand employee workplace logins</strong>—scraping paystubs directly from systems like ADP. It’s not only unethical—it’s potentially illegal. John and Lou unpack the security, HR, and legal nightmare this poses for corporate IT teams.</p><br><p>Next, <strong>OpenAI and Samsung team up under the Stargate project</strong>, with Samsung dedicating nearly 40% of its DRAM output to fuel OpenAI’s next wave of AI data centers—potentially even floating ones. The AI arms race is expanding into new dimensions.</p><br><p>Finally, a newly disclosed exploit gives attackers full control over <strong>Unitree robots</strong>—including humanoids and quadrupeds—via Bluetooth. The flaw, dubbed <em>UniPwn</em>, allows worms to spread across fleets of robots. Lou calls it “Runaway with Tom Selleck meets Star Trek: The Borg.”</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><p>John and Lou set up this week’s stories on privacy violations, AI chip deals, and robot exploits.</p><br><p>⸻</p><br><p><strong>00:48 - Landlords Demand Tenants’ Workplace Logins to Scrape Their Paystubs</strong></p><p>Landlords and tenant-screening services are asking renters to log into employer systems so they can scrape payroll data.</p><p>•Platforms like <em>Argyle</em> and <em>Approve Shield</em> are at the center of the controversy.</p><p>•This violates employee data access policies and may breach federal hacking laws.</p><p>•IT leaders should issue internal advisories and enforce MFA to prevent credential leaks.</p><p><a href="https://www.404media.co/landlords-demand-tenants-workplace-logins-to-scrape-their-paystubs/" rel="noopener noreferrer" target="_blank">https://www.404media.co/landlords-demand-tenants-workplace-logins-to-scrape-their-paystubs/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>07:05 - OpenAI, Samsung &amp; the Stargate Chip Pact</strong></p><p>OpenAI partners with Samsung and SK Hynix under the <em>Stargate</em> project.</p><p>•Samsung to provide 900,000 DRAM wafers monthly—40% of its capacity.</p><p>•Floating, green data centers are in the works.</p><p>•May overlap with Nvidia’s 10GW expansion announced last week.</p><p><a href="https://www.theverge.com/news/789687/openai-samsung-stargate-chips" rel="noopener noreferrer" target="_blank">https://www.theverge.com/news/789687/openai-samsung-stargate-chips</a>&nbsp;</p><br><p>⸻</p><br><p><strong>10:51 - Exploit Allows Takeover of Fleets of Unitree Robots</strong></p><p>Researchers uncovered <em>CVE-2025-60251</em>, a wormable flaw in Unitree’s robot lineup.</p><p>•Bluetooth handshake vulnerability allows remote takeover.</p><p>•Affects quadrupedal GO2/B2 and humanoid G1/H1 robots.</p><p>•Attackers can form botnets, move robots, or exfiltrate data.</p><p>•Security professionals must begin planning IoT and robotics policies now.</p><p><a href="https://spectrum.ieee.org/unitree-robot-exploit" rel="noopener noreferrer" target="_blank">https://spectrum.ieee.org/unitree-robot-exploit</a>&nbsp;</p><br><p>⸻</p><br><p><strong>17:01 - Mail Bag &amp; Wrap Up</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Trusted Execution Environment (TEE) Hardware Attacks</title>
			<itunes:title>Trusted Execution Environment (TEE) Hardware Attacks</itunes:title>
			<pubDate>Fri, 03 Oct 2025 14:32:30 GMT</pubDate>
			<itunes:duration>8:45</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68dfde7f965488b63ad7b50f/media.mp3" length="151415356" type="audio/mpeg"/>
			<guid isPermaLink="false">68dfde7f965488b63ad7b50f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e08</link>
			<acast:episodeId>68dfde7f965488b63ad7b50f</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e08</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bczoPk4wLCEbfyxYnKebia0zwXOCiyldAphYlhFm67aivezl9Q6bUKyB/uZwROuvCUBzjeAXO6utlCCRaQ7olv]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E08</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1759501883329-bf855fc5-e08d-4da8-8191-12a875cc443d.jpeg"/>
			<description><![CDATA[<p>In this eye-opening episode of <em>IT SPARC Cast - CVE of the Week</em>, John Barger and Lou Schmidt explore a shocking vulnerability that doesn’t exploit code — it exploits hardware. Specifically, they dive into how Intel and AMD’s Trusted Execution Environments (TEEs), once hailed as unbreakable, can be compromised via physical attacks. From voltage glitching to signal probing, these advanced threats are no longer theoretical and could sidestep your most hardened security measures.</p><br><p>The episode highlights real-world methods like side-channel probing, interposers, and even fault injection used to extract secrets directly from servers. If a malicious actor can gain physical access to your systems, all bets are off. Lou breaks down the Heracles attack on both AMD SEV and Intel SGX.&nbsp;The hosts emphasize just how crucial physical access controls, chassis alarms, and access logs really are.</p><br><p>Don’t underestimate your weakest link — your data center lock and key.</p><br><p>⸻</p><br><p>🔗<strong> Social Links (Wrap Up Section):</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this eye-opening episode of <em>IT SPARC Cast - CVE of the Week</em>, John Barger and Lou Schmidt explore a shocking vulnerability that doesn’t exploit code — it exploits hardware. Specifically, they dive into how Intel and AMD’s Trusted Execution Environments (TEEs), once hailed as unbreakable, can be compromised via physical attacks. From voltage glitching to signal probing, these advanced threats are no longer theoretical and could sidestep your most hardened security measures.</p><br><p>The episode highlights real-world methods like side-channel probing, interposers, and even fault injection used to extract secrets directly from servers. If a malicious actor can gain physical access to your systems, all bets are off. Lou breaks down the Heracles attack on both AMD SEV and Intel SGX.&nbsp;The hosts emphasize just how crucial physical access controls, chassis alarms, and access logs really are.</p><br><p>Don’t underestimate your weakest link — your data center lock and key.</p><br><p>⸻</p><br><p>🔗<strong> Social Links (Wrap Up Section):</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Nvidia & OpenAI's $100B AI Play, Moon Helium Mining, and Windows 10’s Reprieve]]></title>
			<itunes:title><![CDATA[Nvidia & OpenAI's $100B AI Play, Moon Helium Mining, and Windows 10’s Reprieve]]></itunes:title>
			<pubDate>Mon, 29 Sep 2025 14:30:00 GMT</pubDate>
			<itunes:duration>18:06</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68d9c188acc34956e64e945c/media.mp3" length="312820600" type="audio/mpeg"/>
			<guid isPermaLink="false">68d9c188acc34956e64e945c</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e07</link>
			<acast:episodeId>68d9c188acc34956e64e945c</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e07</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YwJFCgxI3+Y8jXefSjFKBoay4RP0/D1rkEDf+bKTVXif5z2hbtPmhGRjE91XZEP4VED/lA0v93+JL8UcKM9HeZ]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E07</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1759101168907-b0e9d395-9666-4ef0-a68e-4ebbc44f809f.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou break down three stories reshaping enterprise IT and beyond. Nvidia plans to pour <strong>up to $100B into OpenAI</strong>, funding 10 gigawatts of new data center capacity—raising big questions about power, infrastructure, and the AI arms race.</p><br><p>Next, we explore a <strong>moon helium deal</strong> that marks the biggest-ever purchase of natural resources from space. A Finnish firm is set to buy Helium-3 for quantum computing and potential fusion—science fiction turning into enterprise reality.</p><br><p>Finally, Microsoft backtracks on Windows 10’s end of life by offering <strong>one year of free security updates</strong>, buying time for millions of organizations still running legacy systems.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><p>Kicking off this week’s IT digest with energy, space, and security updates.</p><br><p><strong>00:58 - Nvidia to Invest up to $100B into OpenAI</strong></p><p>•Nvidia commits up to $100B to build data centers for OpenAI.</p><p>•Target: 10 gigawatts of compute capacity—unprecedented in scale.</p><p>•Raises concerns over power, sustainability, and regulation.</p><p>•Could fast-track nuclear projects and reshape U.S. energy policy.</p><p><a href="https://nvidianews.nvidia.com/news/openai-and-nvidia-announce-strategic-partnership-to-deploy-10gw-of-nvidia-systems" rel="noopener noreferrer" target="_blank">https://nvidianews.nvidia.com/news/openai-and-nvidia-announce-strategic-partnership-to-deploy-10gw-of-nvidia-systems</a>&nbsp;</p><br><p><strong>07:22 - Moon Helium Deal: Biggest Purchase of Natural Resources from Space</strong></p><p>•Finnish company BlueForce signs deal with Interloon to mine Helium-3 on the moon.</p><p>•Contract: up to 10,000 liters per year between 2028–2037.</p><p>•Helium-3 critical for <strong>quantum computing cooling</strong> and <strong>nuclear fusion fuel</strong>.</p><p>•Moves lunar mining from sci-fi dream to IT-impacting reality.</p><p><a href="https://www.msn.com/en-us/news/technology/a-company-ordered-helium-from-the-moon-no-it-s-not-science-fiction/ar-AA1MEkNK" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/news/technology/a-company-ordered-helium-from-the-moon-no-it-s-not-science-fiction/ar-AA1MEkNK</a>&nbsp;</p><br><p><strong>12:43 - Microsoft Offers Free Windows 10 Security Updates for One Year</strong></p><p>•Windows 10 scheduled to end support October 2025.</p><p>•Microsoft extends free security updates through October 2026.</p><p>•Affects ~53% of PCs still running Windows 10.</p><p>•Likely to extend again due to huge install base.</p><p><a href="https://www.straitstimes.com/world/united-states/microsoft-offers-no-cost-windows-10-lifeline" rel="noopener noreferrer" target="_blank">https://www.straitstimes.com/world/united-states/microsoft-offers-no-cost-windows-10-lifeline</a>&nbsp;</p><br><p>⸻</p><br><p><strong>17:19 - Wrap Up</strong></p><p>Thanks for tuning in—let us know your thoughts on Nvidia’s investment, lunar helium mining, or Microsoft’s Windows 10 strategy.</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/sparc-sales/</a>&nbsp;on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnbarger/</a>&nbsp;on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/louis-schmidt-b102446/</a>&nbsp;on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou break down three stories reshaping enterprise IT and beyond. Nvidia plans to pour <strong>up to $100B into OpenAI</strong>, funding 10 gigawatts of new data center capacity—raising big questions about power, infrastructure, and the AI arms race.</p><br><p>Next, we explore a <strong>moon helium deal</strong> that marks the biggest-ever purchase of natural resources from space. A Finnish firm is set to buy Helium-3 for quantum computing and potential fusion—science fiction turning into enterprise reality.</p><br><p>Finally, Microsoft backtracks on Windows 10’s end of life by offering <strong>one year of free security updates</strong>, buying time for millions of organizations still running legacy systems.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><p>Kicking off this week’s IT digest with energy, space, and security updates.</p><br><p><strong>00:58 - Nvidia to Invest up to $100B into OpenAI</strong></p><p>•Nvidia commits up to $100B to build data centers for OpenAI.</p><p>•Target: 10 gigawatts of compute capacity—unprecedented in scale.</p><p>•Raises concerns over power, sustainability, and regulation.</p><p>•Could fast-track nuclear projects and reshape U.S. energy policy.</p><p><a href="https://nvidianews.nvidia.com/news/openai-and-nvidia-announce-strategic-partnership-to-deploy-10gw-of-nvidia-systems" rel="noopener noreferrer" target="_blank">https://nvidianews.nvidia.com/news/openai-and-nvidia-announce-strategic-partnership-to-deploy-10gw-of-nvidia-systems</a>&nbsp;</p><br><p><strong>07:22 - Moon Helium Deal: Biggest Purchase of Natural Resources from Space</strong></p><p>•Finnish company BlueForce signs deal with Interloon to mine Helium-3 on the moon.</p><p>•Contract: up to 10,000 liters per year between 2028–2037.</p><p>•Helium-3 critical for <strong>quantum computing cooling</strong> and <strong>nuclear fusion fuel</strong>.</p><p>•Moves lunar mining from sci-fi dream to IT-impacting reality.</p><p><a href="https://www.msn.com/en-us/news/technology/a-company-ordered-helium-from-the-moon-no-it-s-not-science-fiction/ar-AA1MEkNK" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/news/technology/a-company-ordered-helium-from-the-moon-no-it-s-not-science-fiction/ar-AA1MEkNK</a>&nbsp;</p><br><p><strong>12:43 - Microsoft Offers Free Windows 10 Security Updates for One Year</strong></p><p>•Windows 10 scheduled to end support October 2025.</p><p>•Microsoft extends free security updates through October 2026.</p><p>•Affects ~53% of PCs still running Windows 10.</p><p>•Likely to extend again due to huge install base.</p><p><a href="https://www.straitstimes.com/world/united-states/microsoft-offers-no-cost-windows-10-lifeline" rel="noopener noreferrer" target="_blank">https://www.straitstimes.com/world/united-states/microsoft-offers-no-cost-windows-10-lifeline</a>&nbsp;</p><br><p>⸻</p><br><p><strong>17:19 - Wrap Up</strong></p><p>Thanks for tuning in—let us know your thoughts on Nvidia’s investment, lunar helium mining, or Microsoft’s Windows 10 strategy.</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/sparc-sales/</a>&nbsp;on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnbarger/</a>&nbsp;on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/louis-schmidt-b102446/</a>&nbsp;on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Critical SNMP Vulnerability in Cisco IOS/IOS XE – CVE-2025-20352</title>
			<itunes:title>Critical SNMP Vulnerability in Cisco IOS/IOS XE – CVE-2025-20352</itunes:title>
			<pubDate>Fri, 26 Sep 2025 14:29:22 GMT</pubDate>
			<itunes:duration>8:07</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68d6a342acc34956e6684bf2/media.mp3" length="140364316" type="audio/mpeg"/>
			<guid isPermaLink="false">68d6a342acc34956e6684bf2</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e07</link>
			<acast:episodeId>68d6a342acc34956e6684bf2</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e07</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bVNb+uS31TpPlvGVQate/8Geue39YkPxYlt6FiHp2fc7MN8MnhQmc58rEYl693S8z0iR0UpLnUopRNnION0Fjs]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E07</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1758896361770-1afe97a7-ca26-4b42-8810-4a081066a6e2.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast – CVE of the Week, John and Lou break down <strong>CVE-2025-20352</strong>, a serious SNMP vulnerability impacting Cisco’s IOS and IOS XE software. Rated CVSS 7.7, this flaw allows attackers with read-only SNMP credentials to crash your system—and with admin credentials, it can escalate to full remote code execution <strong>as root</strong>. That’s right—root.</p><br><p>We explain why this threat is more dangerous than the score suggests, how it fits into broader <strong>supply-chain and chain-attack patterns</strong>, and why outdated or unsupported infrastructure makes this even worse. The team also shares mitigation tips and why <strong>you might need to shut off SNMP entirely</strong> if you’re running legacy gear.</p><br><p>If you’re managing Cisco infrastructure, especially with <strong>SNMPv2c or earlier</strong>, this episode is a must-listen. Don’t wait for this to be part of a multi-vector attack—<strong>lock it down now</strong>.</p><br><p>⸻</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast – CVE of the Week, John and Lou break down <strong>CVE-2025-20352</strong>, a serious SNMP vulnerability impacting Cisco’s IOS and IOS XE software. Rated CVSS 7.7, this flaw allows attackers with read-only SNMP credentials to crash your system—and with admin credentials, it can escalate to full remote code execution <strong>as root</strong>. That’s right—root.</p><br><p>We explain why this threat is more dangerous than the score suggests, how it fits into broader <strong>supply-chain and chain-attack patterns</strong>, and why outdated or unsupported infrastructure makes this even worse. The team also shares mitigation tips and why <strong>you might need to shut off SNMP entirely</strong> if you’re running legacy gear.</p><br><p>If you’re managing Cisco infrastructure, especially with <strong>SNMPv2c or earlier</strong>, this episode is a must-listen. Don’t wait for this to be part of a multi-vector attack—<strong>lock it down now</strong>.</p><br><p>⸻</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>UniFi’s Storage Wars, AI Outsourcing Fallout, and Nvidia’s Intel Bet</title>
			<itunes:title>UniFi’s Storage Wars, AI Outsourcing Fallout, and Nvidia’s Intel Bet</itunes:title>
			<pubDate>Mon, 22 Sep 2025 14:30:26 GMT</pubDate>
			<itunes:duration>22:29</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68d15d82325b3a0ac8e8e85c/media.mp3" length="388748452" type="audio/mpeg"/>
			<guid isPermaLink="false">68d15d82325b3a0ac8e8e85c</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e06</link>
			<acast:episodeId>68d15d82325b3a0ac8e8e85c</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e06</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YfuklkOZizNkshhuQI0WrIUCgZsq5qm1PlJSkCUJx49h1iMeftX4NqEgmoDKfsYcuUeM4xY2mBTHfwM0UnOOof]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E06</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1758551127790-c95d21e4-be68-41b7-a420-5e14a235180a.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou cover three stories that hit at the core of enterprise IT and the global tech economy. Ubiquiti expands its portfolio with a <strong>new UniFi NAS lineup</strong>, featuring everything from 2-bay PoE-powered appliances to rackmount Pro units with 10G and redundant power. The move puts UniFi in direct competition with Synology—but with its own unique twists.</p><br><p>Then, they turn to <strong>India’s outsourcing industry</strong>, where AI is hollowing out the entry-level coding, QA, and documentation jobs that fueled its decades-long tech boom. What does this mean for global IT services, and can India climb the value chain before it’s too late?</p><br><p>Finally, Nvidia just dropped a <strong>$5B investment in Intel</strong>, snapping up common stock and setting the stage for joint chip development. Could this be a “promise ring” for an eventual acquisition—and what does it mean for the U.S. semiconductor landscape?</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><p>John and Lou set the stage for this week’s enterprise IT news rundown.</p><br><p><strong>00:55 - UniFi’s Next-Gen Storage Lineup</strong></p><p>Ubiquiti announces four new NAS appliances:</p><p>•<strong>UNAS 2</strong>: $200, 2-bay, 2.5G, PoE-powered, targeted at home &amp; small office.</p><p>•<strong>UNAS 4</strong>: $380, 4-bay, adds NVMe cache slots, PoE+++, ships Q4.</p><p>•<strong>UNAS Pro 4</strong>: $500, 1RU rackmount, multiple 10G ports, MCLAG support.</p><p>•<strong>UNAS Pro 8</strong>: $800, 2RU rackmount, 8 bays, dual PSUs, enterprise-ready.</p><br><p>No container compute like Synology, but excellent backup/cloud integration and PoE flexibility make these compelling.</p><p>https://blog.ui.com/article/all-new-next-gen-of-unifi-storage &nbsp;</p><br><p><strong>06:46 - AI is Gutting the Entry-Level Jobs That Powered India’s Tech Boom</strong></p><p>•Entry-level coding, QA, and tech writing roles are being automated away.</p><p>•Hiring has dropped drastically, with unemployment among young engineers rising.</p><p>•Outsourcing’s model is collapsing, replaced by AI’s first-pass coding, testing, and documentation.</p><br><p>What’s next: India must move up the value chain—or face major economic disruption.</p><p><a href="https://indiadispatch.com/p/hollow-at-the-base" rel="noopener noreferrer" target="_blank">https://indiadispatch.com/p/hollow-at-the-base</a></p><br><p><strong>12:33 - Nvidia is Investing $5 Billion in Intel</strong></p><p>•Nvidia buys $5B in Intel stock at $23.28/share.</p><p>•Strategic partnership to co-develop chips for data centers and PCs.</p><p>•Could this be the start of Nvidia acquiring Intel?</p><p>•Implications for U.S. chip sovereignty, competition with AMD, and the AI infrastructure arms race.</p><p><a href="https://www.investopedia.com/nvidia-bets-big-on-intel-with-usd5b-investment-11812508" rel="noopener noreferrer" target="_blank">https://www.investopedia.com/nvidia-bets-big-on-intel-with-usd5b-investment-11812508</a></p><br><p><strong>17:32 - Listener Feedback</strong></p><p>John &amp; Lou respond to a listener’s thoughtful comments on UniFi vs. Cisco enterprise support, exploring VAR roles, RMA challenges, and whether UniFi is ready for global scale.</p><br><p><strong>21:11 - Wrap Up</strong></p><p>Thanks for tuning in! Drop your feedback via email, X, or YouTube comments—we read them all.</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou cover three stories that hit at the core of enterprise IT and the global tech economy. Ubiquiti expands its portfolio with a <strong>new UniFi NAS lineup</strong>, featuring everything from 2-bay PoE-powered appliances to rackmount Pro units with 10G and redundant power. The move puts UniFi in direct competition with Synology—but with its own unique twists.</p><br><p>Then, they turn to <strong>India’s outsourcing industry</strong>, where AI is hollowing out the entry-level coding, QA, and documentation jobs that fueled its decades-long tech boom. What does this mean for global IT services, and can India climb the value chain before it’s too late?</p><br><p>Finally, Nvidia just dropped a <strong>$5B investment in Intel</strong>, snapping up common stock and setting the stage for joint chip development. Could this be a “promise ring” for an eventual acquisition—and what does it mean for the U.S. semiconductor landscape?</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><p>John and Lou set the stage for this week’s enterprise IT news rundown.</p><br><p><strong>00:55 - UniFi’s Next-Gen Storage Lineup</strong></p><p>Ubiquiti announces four new NAS appliances:</p><p>•<strong>UNAS 2</strong>: $200, 2-bay, 2.5G, PoE-powered, targeted at home &amp; small office.</p><p>•<strong>UNAS 4</strong>: $380, 4-bay, adds NVMe cache slots, PoE+++, ships Q4.</p><p>•<strong>UNAS Pro 4</strong>: $500, 1RU rackmount, multiple 10G ports, MCLAG support.</p><p>•<strong>UNAS Pro 8</strong>: $800, 2RU rackmount, 8 bays, dual PSUs, enterprise-ready.</p><br><p>No container compute like Synology, but excellent backup/cloud integration and PoE flexibility make these compelling.</p><p>https://blog.ui.com/article/all-new-next-gen-of-unifi-storage &nbsp;</p><br><p><strong>06:46 - AI is Gutting the Entry-Level Jobs That Powered India’s Tech Boom</strong></p><p>•Entry-level coding, QA, and tech writing roles are being automated away.</p><p>•Hiring has dropped drastically, with unemployment among young engineers rising.</p><p>•Outsourcing’s model is collapsing, replaced by AI’s first-pass coding, testing, and documentation.</p><br><p>What’s next: India must move up the value chain—or face major economic disruption.</p><p><a href="https://indiadispatch.com/p/hollow-at-the-base" rel="noopener noreferrer" target="_blank">https://indiadispatch.com/p/hollow-at-the-base</a></p><br><p><strong>12:33 - Nvidia is Investing $5 Billion in Intel</strong></p><p>•Nvidia buys $5B in Intel stock at $23.28/share.</p><p>•Strategic partnership to co-develop chips for data centers and PCs.</p><p>•Could this be the start of Nvidia acquiring Intel?</p><p>•Implications for U.S. chip sovereignty, competition with AMD, and the AI infrastructure arms race.</p><p><a href="https://www.investopedia.com/nvidia-bets-big-on-intel-with-usd5b-investment-11812508" rel="noopener noreferrer" target="_blank">https://www.investopedia.com/nvidia-bets-big-on-intel-with-usd5b-investment-11812508</a></p><br><p><strong>17:32 - Listener Feedback</strong></p><p>John &amp; Lou respond to a listener’s thoughtful comments on UniFi vs. Cisco enterprise support, exploring VAR roles, RMA challenges, and whether UniFi is ready for global scale.</p><br><p><strong>21:11 - Wrap Up</strong></p><p>Thanks for tuning in! Drop your feedback via email, X, or YouTube comments—we read them all.</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Chrome Zero-Day Exploit: CVE-2025-10585 in V8 Engine</title>
			<itunes:title>Chrome Zero-Day Exploit: CVE-2025-10585 in V8 Engine</itunes:title>
			<pubDate>Fri, 19 Sep 2025 13:56:34 GMT</pubDate>
			<itunes:duration>6:06</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68cd6113ef1d2c878d6b0897/media.mp3" length="105613600" type="audio/mpeg"/>
			<guid isPermaLink="false">68cd6113ef1d2c878d6b0897</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e06</link>
			<acast:episodeId>68cd6113ef1d2c878d6b0897</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e06</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Z+j65CXlLZ6lWlu2WKBAjvWig56AjXt0resKA98KfPFGHLIwKSGFpDlZ7gGqZWdCR+GkIz+oAKXGHDL0dzhvYV]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E06</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1758289379468-bd5b3f26-03ae-455d-8f7c-0dd2e6c3ff09.jpeg"/>
			<description><![CDATA[<p>In this week’s episode of <em>IT SPARC Cast - CVE of the Week</em>, John Barger and Lou Schmidt dive into <strong>CVE-2025-10585</strong>, a newly discovered and <strong>actively exploited Chrome zero-day vulnerability</strong> that targets the V8 JavaScript engine. This type confusion flaw opens the door to arbitrary code execution — and yes, it’s already being used in the wild. With <strong>70% of the browser market affected</strong>, this isn’t just a theoretical risk.</p><br><p>John and Lou break down the exploit mechanics, what V8 is and why it’s so critical, and how this CVE marks the <strong>sixth Chrome zero-day in 2025 alone</strong>. They also discuss mitigation steps and the ripple effects for Chromium-based browsers like Edge, Brave, and Opera. As a bonus, the duo interprets a cryptic (and possibly alarming) listener comment involving fileless malware, COFF loaders, and HTTPS delivery — spooky stuff.</p><br><p>⸻</p><br><p>🔗 <strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>🎙️ <strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>🎙️ <strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this week’s episode of <em>IT SPARC Cast - CVE of the Week</em>, John Barger and Lou Schmidt dive into <strong>CVE-2025-10585</strong>, a newly discovered and <strong>actively exploited Chrome zero-day vulnerability</strong> that targets the V8 JavaScript engine. This type confusion flaw opens the door to arbitrary code execution — and yes, it’s already being used in the wild. With <strong>70% of the browser market affected</strong>, this isn’t just a theoretical risk.</p><br><p>John and Lou break down the exploit mechanics, what V8 is and why it’s so critical, and how this CVE marks the <strong>sixth Chrome zero-day in 2025 alone</strong>. They also discuss mitigation steps and the ripple effects for Chromium-based browsers like Edge, Brave, and Opera. As a bonus, the duo interprets a cryptic (and possibly alarming) listener comment involving fileless malware, COFF loaders, and HTTPS delivery — spooky stuff.</p><br><p>⸻</p><br><p>🔗 <strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>🎙️ <strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>🎙️ <strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>GitHub Kills Vibe Coding | Deep Fission Drills | OpenAI’s Chip Move</title>
			<itunes:title>GitHub Kills Vibe Coding | Deep Fission Drills | OpenAI’s Chip Move</itunes:title>
			<pubDate>Mon, 15 Sep 2025 14:28:04 GMT</pubDate>
			<itunes:duration>16:15</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68c822755819338468d7e985/media.mp3" length="280976788" type="audio/mpeg"/>
			<guid isPermaLink="false">68c822755819338468d7e985</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e05github-kills-vibe-cod</link>
			<acast:episodeId>68c822755819338468d7e985</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e05github-kills-vibe-cod</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZRX+g6GFaClo4cg6hQWlxpfe8P28r5FK9Heg8ARERN16GWRrkeBr1rDOvi7mT0pnYuL5LVdI/LfDg9/zCG1DVs]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E05</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1757945308674-21727629-8d74-416b-91fc-0e25eef28cf6.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou explore three stories that could reshape IT’s future. GitHub’s launch of SpecKit signals the end of “vibe coding” as we know it—ushering in a new era of spec-driven development that empowers product managers to become builders. Next, we dive deep (literally) into the nuclear startup Deep Fission, which just went public via a SPAC with a plan to drill tiny nuclear reactors into the earth near data centers. Finally, OpenAI is teaming up with Broadcom to launch a custom AI chip by 2026, intensifying the race for compute power.</p><br><p>If you’re interested in dev workflows, energy innovation, or AI hardware strategy—this is one you don’t want to miss.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>00:49 - GitHub Just Killed Vibe Coding</strong></p><p>GitHub’s new Spec-Kit toolkit enables spec-driven development, allowing teams to move from document to executable with dramatically fewer handoffs. Product managers can now define specs, environments, and target platforms, letting tools like LLMs and automation build apps directly.</p><p>John calls it a “product manager’s dream,” while Lou warns it could disrupt the delicate balance between engineering and PM teams.</p><p><a href="https://github.com/github/spec-kit" rel="noopener noreferrer" target="_blank">https://github.com/github/spec-kit</a>&nbsp;</p><p><a href="https://youtu.be/em3vIT9aUsg?si=ND9GlREU7ccDaV0H" rel="noopener noreferrer" target="_blank">https://youtu.be/em3vIT9aUsg?si=ND9GlREU7ccDaV0H</a>&nbsp;</p><p><a href="https://www.reddit.com/r/GithubCopilot/comments/1n7v2pv/kiro_is_cooked_githubs_spec_kit/" rel="noopener noreferrer" target="_blank">https://www.reddit.com/r/GithubCopilot/comments/1n7v2pv/kiro_is_cooked_githubs_spec_kit/</a>&nbsp;</p><br><p><strong>07:15 - Nuclear Startup Deep Fission Goes Public in a Curious SPAC</strong></p><p>Deep Fission just raised $30M by reverse merging with Surfside Acquisition. Their bold plan? Small modular nuclear reactors dropped a mile underground—powering AI-hungry data centers with ultra-local energy.</p><p>They’re partnering with Endeavor to co-develop 2GW of underground capacity and have been tapped for a DOE reactor pilot program.</p><p><a href="https://techcrunch.com/2025/09/08/nuclear-startup-deep-fission-goes-public-in-a-curious-spac/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/09/08/nuclear-startup-deep-fission-goes-public-in-a-curious-spac/</a>&nbsp;</p><br><p><strong>11:47 - OpenAI to Launch Its First AI Chip in 2026 with Broadcom</strong></p><p>OpenAI and Broadcom are building a new AI chip that will power OpenAI’s internal workloads starting in 2026.</p><p>• It won’t be publicly available (at least at launch).</p><p>• It’s the latest in a growing trend of custom silicon from AI giants.</p><p>• Lou &amp; John break down why this signals a hardware arms race and the compute bottlenecks that still plague the AI industry.</p><p><a href="https://www.reuters.com/business/openai-launch-its-first-ai-chip-2026-with-broadcom-ft-reports-2025-09-05/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/business/openai-launch-its-first-ai-chip-2026-with-broadcom-ft-reports-2025-09-05/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>15:30 - Wrap Up</strong></p><p>Thanks for tuning in! We want your feedback:</p><p>📩 feedback@itsparccast.com</p><br><p>📣<strong> Social Links</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou explore three stories that could reshape IT’s future. GitHub’s launch of SpecKit signals the end of “vibe coding” as we know it—ushering in a new era of spec-driven development that empowers product managers to become builders. Next, we dive deep (literally) into the nuclear startup Deep Fission, which just went public via a SPAC with a plan to drill tiny nuclear reactors into the earth near data centers. Finally, OpenAI is teaming up with Broadcom to launch a custom AI chip by 2026, intensifying the race for compute power.</p><br><p>If you’re interested in dev workflows, energy innovation, or AI hardware strategy—this is one you don’t want to miss.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>00:49 - GitHub Just Killed Vibe Coding</strong></p><p>GitHub’s new Spec-Kit toolkit enables spec-driven development, allowing teams to move from document to executable with dramatically fewer handoffs. Product managers can now define specs, environments, and target platforms, letting tools like LLMs and automation build apps directly.</p><p>John calls it a “product manager’s dream,” while Lou warns it could disrupt the delicate balance between engineering and PM teams.</p><p><a href="https://github.com/github/spec-kit" rel="noopener noreferrer" target="_blank">https://github.com/github/spec-kit</a>&nbsp;</p><p><a href="https://youtu.be/em3vIT9aUsg?si=ND9GlREU7ccDaV0H" rel="noopener noreferrer" target="_blank">https://youtu.be/em3vIT9aUsg?si=ND9GlREU7ccDaV0H</a>&nbsp;</p><p><a href="https://www.reddit.com/r/GithubCopilot/comments/1n7v2pv/kiro_is_cooked_githubs_spec_kit/" rel="noopener noreferrer" target="_blank">https://www.reddit.com/r/GithubCopilot/comments/1n7v2pv/kiro_is_cooked_githubs_spec_kit/</a>&nbsp;</p><br><p><strong>07:15 - Nuclear Startup Deep Fission Goes Public in a Curious SPAC</strong></p><p>Deep Fission just raised $30M by reverse merging with Surfside Acquisition. Their bold plan? Small modular nuclear reactors dropped a mile underground—powering AI-hungry data centers with ultra-local energy.</p><p>They’re partnering with Endeavor to co-develop 2GW of underground capacity and have been tapped for a DOE reactor pilot program.</p><p><a href="https://techcrunch.com/2025/09/08/nuclear-startup-deep-fission-goes-public-in-a-curious-spac/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/09/08/nuclear-startup-deep-fission-goes-public-in-a-curious-spac/</a>&nbsp;</p><br><p><strong>11:47 - OpenAI to Launch Its First AI Chip in 2026 with Broadcom</strong></p><p>OpenAI and Broadcom are building a new AI chip that will power OpenAI’s internal workloads starting in 2026.</p><p>• It won’t be publicly available (at least at launch).</p><p>• It’s the latest in a growing trend of custom silicon from AI giants.</p><p>• Lou &amp; John break down why this signals a hardware arms race and the compute bottlenecks that still plague the AI industry.</p><p><a href="https://www.reuters.com/business/openai-launch-its-first-ai-chip-2026-with-broadcom-ft-reports-2025-09-05/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/business/openai-launch-its-first-ai-chip-2026-with-broadcom-ft-reports-2025-09-05/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>15:30 - Wrap Up</strong></p><p>Thanks for tuning in! We want your feedback:</p><p>📩 feedback@itsparccast.com</p><br><p>📣<strong> Social Links</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Academic Ransomware AI? PromptLocker Panic Explained</title>
			<itunes:title>Academic Ransomware AI? PromptLocker Panic Explained</itunes:title>
			<pubDate>Fri, 12 Sep 2025 14:22:03 GMT</pubDate>
			<itunes:duration>7:36</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68c42c8c8b1c6a48283b8c3d/media.mp3" length="131355316" type="audio/mpeg"/>
			<guid isPermaLink="false">68c42c8c8b1c6a48283b8c3d</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e05</link>
			<acast:episodeId>68c42c8c8b1c6a48283b8c3d</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e05</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aBW2EQrqCx1lSklxl+YTRW7zWOnbyFhNNzwmqPtSgXB3zuGP8qxxzXu8Es6d8PvHi+qd38qPVYi4hdc4u/e1VT]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E05</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1757685507420-15a2744c-9caf-420f-a7ee-d220aa65ff4e.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast – CVE of the Week</em>, John Barger and Lou Schmidt unravel the truth behind PromptLocker — the so-called first “AI-powered ransomware.” Initially flagged by ESET and widely misunderstood as an active cyber threat, PromptLocker was actually part of a controlled academic research project from NYU’s Tandon School of Engineering, known as “Ransomware 3.0.”</p><br><p>We break down how this proof-of-concept malware used LLMs to dynamically generate malicious code, how it slipped into threat databases, and why this <em>isn’t</em> a crisis — but rather, a warning. With the ability to generate malware instructions on-the-fly without any static payload, this project forces a rethink of traditional security detection methods. The cost? About 70 cents using commercial APIs — or virtually free with open-source models. Join us for a grounded, insightful conversation about what’s real, what’s hype, and what you should be doing next.</p><br><p><a href="https://www.tomshardware.com/tech-industry/cyber-security/ai-powered-promptlocker-ransomware-is-just-an-nyu-research-project-the-code-worked-as-a-typical-ransomware-selecting-targets-exfiltrating-selected-data-and-encrypting-volumes" rel="noopener noreferrer" target="_blank">https://www.tomshardware.com/tech-industry/cyber-security/ai-powered-promptlocker-ransomware-is-just-an-nyu-research-project-the-code-worked-as-a-typical-ransomware-selecting-targets-exfiltrating-selected-data-and-encrypting-volumes</a>&nbsp;</p><br><p><a href="https://www.techradar.com/pro/security/the-first-ai-powered-ransomware-has-been-spotted-and-heres-why-we-should-all-be-worried" rel="noopener noreferrer" target="_blank">https://www.techradar.com/pro/security/the-first-ai-powered-ransomware-has-been-spotted-and-heres-why-we-should-all-be-worried</a>&nbsp;</p><br><p><a href="https://www.pcgamer.com/software/ai/oh-goody-the-first-known-ai-powered-ransomware-has-been-discovered-and-it-may-exfiltrate-data-encrypt-it-or-potentially-destroy-it/" rel="noopener noreferrer" target="_blank">https://www.pcgamer.com/software/ai/oh-goody-the-first-known-ai-powered-ransomware-has-been-discovered-and-it-may-exfiltrate-data-encrypt-it-or-potentially-destroy-it/</a>&nbsp;</p><br><p><a href="https://www.itpro.com/security/ransomware/security-researchers-have-just-identified-what-could-be-the-first-ai-powered-ransomware-strain-and-it-uses-openais-gpt-oss-20b-model" rel="noopener noreferrer" target="_blank">https://www.itpro.com/security/ransomware/security-researchers-have-just-identified-what-could-be-the-first-ai-powered-ransomware-strain-and-it-uses-openais-gpt-oss-20b-model</a></p><br><p>⸻</p><br><p>🔗<strong> Social Links</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast – CVE of the Week</em>, John Barger and Lou Schmidt unravel the truth behind PromptLocker — the so-called first “AI-powered ransomware.” Initially flagged by ESET and widely misunderstood as an active cyber threat, PromptLocker was actually part of a controlled academic research project from NYU’s Tandon School of Engineering, known as “Ransomware 3.0.”</p><br><p>We break down how this proof-of-concept malware used LLMs to dynamically generate malicious code, how it slipped into threat databases, and why this <em>isn’t</em> a crisis — but rather, a warning. With the ability to generate malware instructions on-the-fly without any static payload, this project forces a rethink of traditional security detection methods. The cost? About 70 cents using commercial APIs — or virtually free with open-source models. Join us for a grounded, insightful conversation about what’s real, what’s hype, and what you should be doing next.</p><br><p><a href="https://www.tomshardware.com/tech-industry/cyber-security/ai-powered-promptlocker-ransomware-is-just-an-nyu-research-project-the-code-worked-as-a-typical-ransomware-selecting-targets-exfiltrating-selected-data-and-encrypting-volumes" rel="noopener noreferrer" target="_blank">https://www.tomshardware.com/tech-industry/cyber-security/ai-powered-promptlocker-ransomware-is-just-an-nyu-research-project-the-code-worked-as-a-typical-ransomware-selecting-targets-exfiltrating-selected-data-and-encrypting-volumes</a>&nbsp;</p><br><p><a href="https://www.techradar.com/pro/security/the-first-ai-powered-ransomware-has-been-spotted-and-heres-why-we-should-all-be-worried" rel="noopener noreferrer" target="_blank">https://www.techradar.com/pro/security/the-first-ai-powered-ransomware-has-been-spotted-and-heres-why-we-should-all-be-worried</a>&nbsp;</p><br><p><a href="https://www.pcgamer.com/software/ai/oh-goody-the-first-known-ai-powered-ransomware-has-been-discovered-and-it-may-exfiltrate-data-encrypt-it-or-potentially-destroy-it/" rel="noopener noreferrer" target="_blank">https://www.pcgamer.com/software/ai/oh-goody-the-first-known-ai-powered-ransomware-has-been-discovered-and-it-may-exfiltrate-data-encrypt-it-or-potentially-destroy-it/</a>&nbsp;</p><br><p><a href="https://www.itpro.com/security/ransomware/security-researchers-have-just-identified-what-could-be-the-first-ai-powered-ransomware-strain-and-it-uses-openais-gpt-oss-20b-model" rel="noopener noreferrer" target="_blank">https://www.itpro.com/security/ransomware/security-researchers-have-just-identified-what-could-be-the-first-ai-powered-ransomware-strain-and-it-uses-openais-gpt-oss-20b-model</a></p><br><p>⸻</p><br><p>🔗<strong> Social Links</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Shadow AI, ChatGPT & the Law, and Japan’s AI Back Office Revolution]]></title>
			<itunes:title><![CDATA[Shadow AI, ChatGPT & the Law, and Japan’s AI Back Office Revolution]]></itunes:title>
			<pubDate>Mon, 08 Sep 2025 13:49:13 GMT</pubDate>
			<itunes:duration>22:24</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68bededad39b041a4721fbb3/media.mp3" length="387090796" type="audio/mpeg"/>
			<guid isPermaLink="false">68bededad39b041a4721fbb3</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e04</link>
			<acast:episodeId>68bededad39b041a4721fbb3</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e04</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YRFFtSPNyQF9TEIh8QrqYP1iJ+N/BjZ+L/oO8ZTzKXrMNIn/JYCJhMT2yQaAYC3aA9UjsgN5YtsMj+GDTrllHk]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E04</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1757339016131-0cea27d8-9cc7-4144-a201-15ec7243db23.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou unpack OpenAI’s controversial decision to escalate certain ChatGPT conversations to law enforcement—and what that means for user privacy and corporate risk. They then turn to Shadow AI: the unsanctioned use of ChatGPT, Claude, and others by employees, and how enterprises can detect, monitor, and respond without overreacting.</p><br><p>Finally, they spotlight LayerX, a Japanese SaaS startup leading the charge on back-office AI automation—proof that even traditionally conservative markets are embracing next-gen AI for business transformation.</p><br><p>⸻</p><br><p>📝<strong> Show Notes:</strong></p><br><p><strong>00:00 - Intro</strong></p><p>A quick rundown of the week’s hottest IT headlines and opinions with John &amp; Lou.</p><br><p>⸻</p><br><p><strong>00:49 - OpenAI Is Reporting ChatGPT Conversations to Law Enforcement</strong></p><p>OpenAI has quietly updated its policy: if human reviewers believe a user poses an imminent threat of serious harm, the company may escalate to law enforcement—even without a formal legal request. This has sparked online outrage and privacy concerns, with many calling it a betrayal of OpenAI’s past promises of near-therapist-level confidentiality. John and Lou break down the policy, review real-world implications, and share perspectives on transparency, self-regulation, and the risk of human bias in the review loop.</p><p><a href="https://futurism.com/people-furious-openai-reporting-police" rel="noopener noreferrer" target="_blank">https://futurism.com/people-furious-openai-reporting-police</a>&nbsp;</p><br><p>⸻</p><br><p><strong>08:05 - Can Your Security Stack See ChatGPT? Why Network Visibility Matters</strong></p><p>Shadow AI is on the rise. Employees are bypassing sanctioned tools like Microsoft Copilot and quietly using ChatGPT, Claude, and others to boost productivity. But most corporate security stacks aren’t monitoring these tools. John shares insights into URL filtering, file upload tracking, and behavior-based flags to detect Shadow AI usage. Lou reminds us: education—not punishment—should be your first move.</p><p><a href="https://thehackernews.com/2025/08/can-your-security-stack-see-chatgpt-why.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/can-your-security-stack-see-chatgpt-why.html</a></p><br><p>⸻</p><br><p><strong>15:52 - LayerX: Japan’s AI Answer to Back Office Drudgery</strong></p><p>Japan-based LayerX just raised $100M to accelerate AI-powered back-office automation. Their platform—already used by 15,000+ companies—handles expense reports, invoicing, and corporate card ops. John and Lou discuss the implications of conservative Japanese enterprises adopting AI at scale, and what this signals for global enterprise IT adoption.</p><p><a href="https://techcrunch.com/2025/09/01/layerx-uses-ai-to-cut-enterprise-back-office-workload-scores-100m-in-series-b/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/09/01/layerx-uses-ai-to-cut-enterprise-back-office-workload-scores-100m-in-series-b/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>21:06 - Listener Feedback &amp; Wrap Up</strong></p><p>John gives a shoutout to listener BJ for chiming in on last week’s FTC encryption story. Keep the feedback coming: feedback@itsparccast.com</p><br><p>⸻</p><br><p><strong>Social Links:</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou unpack OpenAI’s controversial decision to escalate certain ChatGPT conversations to law enforcement—and what that means for user privacy and corporate risk. They then turn to Shadow AI: the unsanctioned use of ChatGPT, Claude, and others by employees, and how enterprises can detect, monitor, and respond without overreacting.</p><br><p>Finally, they spotlight LayerX, a Japanese SaaS startup leading the charge on back-office AI automation—proof that even traditionally conservative markets are embracing next-gen AI for business transformation.</p><br><p>⸻</p><br><p>📝<strong> Show Notes:</strong></p><br><p><strong>00:00 - Intro</strong></p><p>A quick rundown of the week’s hottest IT headlines and opinions with John &amp; Lou.</p><br><p>⸻</p><br><p><strong>00:49 - OpenAI Is Reporting ChatGPT Conversations to Law Enforcement</strong></p><p>OpenAI has quietly updated its policy: if human reviewers believe a user poses an imminent threat of serious harm, the company may escalate to law enforcement—even without a formal legal request. This has sparked online outrage and privacy concerns, with many calling it a betrayal of OpenAI’s past promises of near-therapist-level confidentiality. John and Lou break down the policy, review real-world implications, and share perspectives on transparency, self-regulation, and the risk of human bias in the review loop.</p><p><a href="https://futurism.com/people-furious-openai-reporting-police" rel="noopener noreferrer" target="_blank">https://futurism.com/people-furious-openai-reporting-police</a>&nbsp;</p><br><p>⸻</p><br><p><strong>08:05 - Can Your Security Stack See ChatGPT? Why Network Visibility Matters</strong></p><p>Shadow AI is on the rise. Employees are bypassing sanctioned tools like Microsoft Copilot and quietly using ChatGPT, Claude, and others to boost productivity. But most corporate security stacks aren’t monitoring these tools. John shares insights into URL filtering, file upload tracking, and behavior-based flags to detect Shadow AI usage. Lou reminds us: education—not punishment—should be your first move.</p><p><a href="https://thehackernews.com/2025/08/can-your-security-stack-see-chatgpt-why.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/can-your-security-stack-see-chatgpt-why.html</a></p><br><p>⸻</p><br><p><strong>15:52 - LayerX: Japan’s AI Answer to Back Office Drudgery</strong></p><p>Japan-based LayerX just raised $100M to accelerate AI-powered back-office automation. Their platform—already used by 15,000+ companies—handles expense reports, invoicing, and corporate card ops. John and Lou discuss the implications of conservative Japanese enterprises adopting AI at scale, and what this signals for global enterprise IT adoption.</p><p><a href="https://techcrunch.com/2025/09/01/layerx-uses-ai-to-cut-enterprise-back-office-workload-scores-100m-in-series-b/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/09/01/layerx-uses-ai-to-cut-enterprise-back-office-workload-scores-100m-in-series-b/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>21:06 - Listener Feedback &amp; Wrap Up</strong></p><p>John gives a shoutout to listener BJ for chiming in on last week’s FTC encryption story. Keep the feedback coming: feedback@itsparccast.com</p><br><p>⸻</p><br><p><strong>Social Links:</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Crypto Wallets Compromised by Malicious npm Package</title>
			<itunes:title>Crypto Wallets Compromised by Malicious npm Package</itunes:title>
			<pubDate>Fri, 05 Sep 2025 14:30:24 GMT</pubDate>
			<itunes:duration>8:42</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68baf4014a99d1df75558c87/media.mp3" length="150346288" type="audio/mpeg"/>
			<guid isPermaLink="false">68baf4014a99d1df75558c87</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://youtu.be/JjuBlsoKi-s</link>
			<acast:episodeId>68baf4014a99d1df75558c87</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e04</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bA98rbfP0DW5SndLCcvusDS3emGCH/qkESHqey2qTHSnirCFIw94F+KTEdb+7fAcpkMA97o67o0XPAt5eZrd7w]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E04</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1757081958893-8dcda843-93bd-4d2e-8d36-7a77c8505505.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John and Lou dive into a stealthy supply chain attack involving a malicious npm package impersonating NodeMailer. This package—nodejs-smtp—was designed to exploit unsuspecting developers by mimicking legitimate behavior while secretly stealing funds from popular cryptocurrency wallets like <strong>Atomic Wallet</strong> and <strong>Exodus</strong> on <strong>Windows systems</strong>.</p><br><p>The attack was cleverly disguised, executed through <strong>Electron-based payloads</strong>, and capable of repackaging the victim’s wallet apps to reroute crypto transactions to attacker-controlled wallets. Even build and CI pipelines could miss the infection due to the module’s deceptive functionality. With only 347 downloads before removal, the attack still presents a clear and present danger due to how easily it could be missed or reused.</p><br><p>John and Lou break down how this was discovered, how it works, why it’s dangerous, and what <em>every developer</em> and <em>crypto user</em> should do to protect themselves. They also reflect on how <strong>AI-assisted code review</strong>, <strong>registry controls</strong>, and <strong>isolated environments</strong> are now must-haves for any serious dev or security-conscious user.</p><br><p>⸻</p><br><p>🔗<strong> Social Links (Wrap Up Section)</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John and Lou dive into a stealthy supply chain attack involving a malicious npm package impersonating NodeMailer. This package—nodejs-smtp—was designed to exploit unsuspecting developers by mimicking legitimate behavior while secretly stealing funds from popular cryptocurrency wallets like <strong>Atomic Wallet</strong> and <strong>Exodus</strong> on <strong>Windows systems</strong>.</p><br><p>The attack was cleverly disguised, executed through <strong>Electron-based payloads</strong>, and capable of repackaging the victim’s wallet apps to reroute crypto transactions to attacker-controlled wallets. Even build and CI pipelines could miss the infection due to the module’s deceptive functionality. With only 347 downloads before removal, the attack still presents a clear and present danger due to how easily it could be missed or reused.</p><br><p>John and Lou break down how this was discovered, how it works, why it’s dangerous, and what <em>every developer</em> and <em>crypto user</em> should do to protect themselves. They also reflect on how <strong>AI-assisted code review</strong>, <strong>registry controls</strong>, and <strong>isolated environments</strong> are now must-haves for any serious dev or security-conscious user.</p><br><p>⸻</p><br><p>🔗<strong> Social Links (Wrap Up Section)</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Encryption Under Fire, AI Unleashed, and Nvidia’s Epic Surge</title>
			<itunes:title>Encryption Under Fire, AI Unleashed, and Nvidia’s Epic Surge</itunes:title>
			<pubDate>Tue, 02 Sep 2025 14:30:00 GMT</pubDate>
			<itunes:duration>19:22</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68b634d470ab6f8350c7a0ed/media.mp3" length="334886644" type="audio/mpeg"/>
			<guid isPermaLink="false">68b634d470ab6f8350c7a0ed</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e03</link>
			<acast:episodeId>68b634d470ab6f8350c7a0ed</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e03</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZYzKJRWv8MBcay5SBRAippB/j9IlA2Q9hqhcfsdtwN5w+pb0U/b7I6kHqT2k9F8rFBtlb0MqAIvX0PJasL8mTA]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E03</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1756771237181-eb78da6b-1937-40cb-a002-eab8b6172ca7.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou dissect the tension between privacy and surveillance as the FTC doubles down on encryption protection amid global pressures. Then it’s into the shadows as hackers weaponize generative AI to write malware, exploit zero-days, and outpace defenses. Finally, the hosts break down Nvidia’s record-shattering revenue report and explore what it means for enterprise IT and AI infrastructure at scale.</p><br><p>From the frontlines of cybersecurity to the bleeding edge of AI acceleration, this episode is packed with insights, expert banter, and real-world context.</p><br><p>⸻</p><br><p>⏱️<strong> Timestamps &amp; Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><p>Welcome to another edition of IT SPARC Cast – News Bytes, your trusted short-form rundown of this week’s enterprise IT headlines.</p><br><p>⸻</p><br><p><strong>00:46 - Holding the Line on Encryption: FTC Pushes Back</strong></p><p>The Federal Trade Commission is standing firm against global efforts to weaken end-to-end encryption, asserting that consumer privacy and data security cannot be compromised. This marks a pivotal stance as world governments call for encryption “backdoors” to aid law enforcement.</p><p>• Key talking points include political tensions, IPA debates, and the FTC’s broader data security agenda.</p><p><a href="https://www.bleepingcomputer.com/news/security/ftc-warns-tech-giants-not-to-bow-to-foreign-pressure-on-encryption/?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ftc-warns-tech-giants-not-to-bow-to-foreign-pressure-on-encryption/?utm_source=chatgpt.com</a>&nbsp;</p><br><p><strong>05:21 - Hackers Unlock the Power of AI</strong></p><p>New research shows hackers are weaponizing generative AI to:</p><p>• Write polymorphic malware</p><p>• Bypass defenses with zero-day obfuscation</p><p>• Rapidly scale attacks</p><p>Lou and John unpack how this changes threat modeling and what defenders must do to keep up with AI-fueled exploits.</p><p><a href="https://thehackernews.com/2025/08/anthropic-disrupts-ai-powered.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/anthropic-disrupts-ai-powered.html</a>&nbsp;</p><p><a href="https://thehackernews.com/2025/08/someone-created-first-ai-powered.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/someone-created-first-ai-powered.html</a>&nbsp;</p><br><p><br></p><p><strong>11:50 - Nvidia Sets New Revenue Record as AI Demand Soars</strong></p><p>Nvidia’s Q2 earnings shatter expectations, with $42 billion in revenue driven by skyrocketing demand for AI chips and GPU infrastructure.</p><p>• Enterprise implications</p><p>• Cloud vendor reactions</p><p>• Supply chain pressures</p><p>The team also discusses how Nvidia is shifting from a chipmaker to a full AI platform vendor.</p><p><a href="https://finance.yahoo.com/news/nvidia-reports-record-sales-ai-211839151.html" rel="noopener noreferrer" target="_blank">https://finance.yahoo.com/news/nvidia-reports-record-sales-ai-211839151.html</a>&nbsp;</p><br><p><strong>17:00 - Mail Bag</strong></p><br><p><strong>18:26 - Wrap Up</strong></p><p>Thanks for tuning in to IT SPARC Cast! Be sure to subscribe, leave a review, and follow us for more weekly insights into the evolving world of enterprise IT.</p><br><p><strong>Social Links</strong></p><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast – News Bytes</em>, John and Lou dissect the tension between privacy and surveillance as the FTC doubles down on encryption protection amid global pressures. Then it’s into the shadows as hackers weaponize generative AI to write malware, exploit zero-days, and outpace defenses. Finally, the hosts break down Nvidia’s record-shattering revenue report and explore what it means for enterprise IT and AI infrastructure at scale.</p><br><p>From the frontlines of cybersecurity to the bleeding edge of AI acceleration, this episode is packed with insights, expert banter, and real-world context.</p><br><p>⸻</p><br><p>⏱️<strong> Timestamps &amp; Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><p>Welcome to another edition of IT SPARC Cast – News Bytes, your trusted short-form rundown of this week’s enterprise IT headlines.</p><br><p>⸻</p><br><p><strong>00:46 - Holding the Line on Encryption: FTC Pushes Back</strong></p><p>The Federal Trade Commission is standing firm against global efforts to weaken end-to-end encryption, asserting that consumer privacy and data security cannot be compromised. This marks a pivotal stance as world governments call for encryption “backdoors” to aid law enforcement.</p><p>• Key talking points include political tensions, IPA debates, and the FTC’s broader data security agenda.</p><p><a href="https://www.bleepingcomputer.com/news/security/ftc-warns-tech-giants-not-to-bow-to-foreign-pressure-on-encryption/?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ftc-warns-tech-giants-not-to-bow-to-foreign-pressure-on-encryption/?utm_source=chatgpt.com</a>&nbsp;</p><br><p><strong>05:21 - Hackers Unlock the Power of AI</strong></p><p>New research shows hackers are weaponizing generative AI to:</p><p>• Write polymorphic malware</p><p>• Bypass defenses with zero-day obfuscation</p><p>• Rapidly scale attacks</p><p>Lou and John unpack how this changes threat modeling and what defenders must do to keep up with AI-fueled exploits.</p><p><a href="https://thehackernews.com/2025/08/anthropic-disrupts-ai-powered.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/anthropic-disrupts-ai-powered.html</a>&nbsp;</p><p><a href="https://thehackernews.com/2025/08/someone-created-first-ai-powered.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/someone-created-first-ai-powered.html</a>&nbsp;</p><br><p><br></p><p><strong>11:50 - Nvidia Sets New Revenue Record as AI Demand Soars</strong></p><p>Nvidia’s Q2 earnings shatter expectations, with $42 billion in revenue driven by skyrocketing demand for AI chips and GPU infrastructure.</p><p>• Enterprise implications</p><p>• Cloud vendor reactions</p><p>• Supply chain pressures</p><p>The team also discusses how Nvidia is shifting from a chipmaker to a full AI platform vendor.</p><p><a href="https://finance.yahoo.com/news/nvidia-reports-record-sales-ai-211839151.html" rel="noopener noreferrer" target="_blank">https://finance.yahoo.com/news/nvidia-reports-record-sales-ai-211839151.html</a>&nbsp;</p><br><p><strong>17:00 - Mail Bag</strong></p><br><p><strong>18:26 - Wrap Up</strong></p><p>Thanks for tuning in to IT SPARC Cast! Be sure to subscribe, leave a review, and follow us for more weekly insights into the evolving world of enterprise IT.</p><br><p><strong>Social Links</strong></p><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Zombie Cisco Gear: CVE-2018-0171 Exploited by Russian Espionage</title>
			<itunes:title>Zombie Cisco Gear: CVE-2018-0171 Exploited by Russian Espionage</itunes:title>
			<pubDate>Fri, 29 Aug 2025 14:50:29 GMT</pubDate>
			<itunes:duration>7:41</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68b1be3575e437e223fa738e/media.mp3" length="132856816" type="audio/mpeg"/>
			<guid isPermaLink="false">68b1be3575e437e223fa738e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e03</link>
			<acast:episodeId>68b1be3575e437e223fa738e</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e03</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bR12p1fdl2cfKrBMM9bjVJ9sYXtPXe8A3MpXNIduAV7kL7vKEfoZwMe8hPIi+Un2Q6sIA3xkrAUi5mGx5p5s3n]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E03</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1756477371061-41b4443b-b5dc-48f3-bad6-94820f984034.jpeg"/>
			<description><![CDATA[<p>Russian state-sponsored hackers are actively exploiting a <em>seven-year-old</em> Cisco vulnerability—CVE-2018-0171—and turning forgotten infrastructure into surveillance tools. On this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down how outdated Cisco hardware is being targeted through the Smart Install feature and how the FSB-linked group “Berserk Bear” is using them to extract credentials and embed persistent access.</p><br><p>You’ll learn:</p><p>•Why legacy hardware in manufacturing, education, and telecom is at risk</p><p>•How attackers are using configuration harvesting for long-term access</p><p>•What “Cisco zombies” <em>really</em> means—and why it’s the wrong term</p><p>•Practical steps for discovery, mitigation, and infrastructure hygiene</p><br><p>From drop-ceiling surprises to international espionage, this episode is a must-listen for every IT leader responsible for aging infrastructure. Patch early. Patch often. And for the love of security, don’t feed the hackers.</p><br><p>⸻</p><br><p>📢<strong> Wrap Up &amp; Social Links</strong></p><br><p>Got a similar story? Or maybe you’ve walked into a nightmare network too? Share it with us:</p><br><p>📩 feedback@itsparccast.com</p><p>💬 @ITSPARCCast on X</p><p>🔗 https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>Follow the hosts:</strong></p><br><p>👤 John Barger</p><p>X: @john_Video</p><p>LinkedIn: https://www.linkedin.com/in/johnbarger/</p><br><p>👤 Lou Schmidt</p><p>X: @loudoggeek</p><p>LinkedIn: https://www.linkedin.com/in/louis-schmidt-b102446/</p><br><p>Be sure to <strong>Like</strong>, <strong>Subscribe</strong>, and <strong>Enable Notifications</strong> so you don’t miss the next vulnerability breakdown.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Russian state-sponsored hackers are actively exploiting a <em>seven-year-old</em> Cisco vulnerability—CVE-2018-0171—and turning forgotten infrastructure into surveillance tools. On this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt break down how outdated Cisco hardware is being targeted through the Smart Install feature and how the FSB-linked group “Berserk Bear” is using them to extract credentials and embed persistent access.</p><br><p>You’ll learn:</p><p>•Why legacy hardware in manufacturing, education, and telecom is at risk</p><p>•How attackers are using configuration harvesting for long-term access</p><p>•What “Cisco zombies” <em>really</em> means—and why it’s the wrong term</p><p>•Practical steps for discovery, mitigation, and infrastructure hygiene</p><br><p>From drop-ceiling surprises to international espionage, this episode is a must-listen for every IT leader responsible for aging infrastructure. Patch early. Patch often. And for the love of security, don’t feed the hackers.</p><br><p>⸻</p><br><p>📢<strong> Wrap Up &amp; Social Links</strong></p><br><p>Got a similar story? Or maybe you’ve walked into a nightmare network too? Share it with us:</p><br><p>📩 feedback@itsparccast.com</p><p>💬 @ITSPARCCast on X</p><p>🔗 https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>Follow the hosts:</strong></p><br><p>👤 John Barger</p><p>X: @john_Video</p><p>LinkedIn: https://www.linkedin.com/in/johnbarger/</p><br><p>👤 Lou Schmidt</p><p>X: @loudoggeek</p><p>LinkedIn: https://www.linkedin.com/in/louis-schmidt-b102446/</p><br><p>Be sure to <strong>Like</strong>, <strong>Subscribe</strong>, and <strong>Enable Notifications</strong> so you don’t miss the next vulnerability breakdown.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>UniFi Object Networking, Password Failures, and Black Hat Intel</title>
			<itunes:title>UniFi Object Networking, Password Failures, and Black Hat Intel</itunes:title>
			<pubDate>Mon, 25 Aug 2025 14:30:00 GMT</pubDate>
			<itunes:duration>23:01</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68ab4271982c36846e29e487/media.mp3" length="397817512" type="audio/mpeg"/>
			<guid isPermaLink="false">68ab4271982c36846e29e487</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e02</link>
			<acast:episodeId>68ab4271982c36846e29e487</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e02</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YbX2V9ZQ8a3TcY+j5eiqJbAWsXhDcMvu+q6jlxvPS02kSdzb7Zgn908+D8mU2Tj8HMuyPWQ2GKd5AX45/XTliD]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E02</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1756053937956-daa22584-6e36-4d67-8fa2-7ddbf8dc7b24.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast – News Bytes, John and Lou take on three stories that highlight where enterprise IT is innovating—and where it’s still falling short. Ubiquiti’s UniFi Network 9.4 is out, and it’s more than just an update. John breaks down how Object Networking simplifies dynamic policy management and monitoring, delivering enterprise-grade controls to SMBs without scripting. You’ll hear how new scanning and traffic insight tools aim to make real-time optimization more accessible than ever.</p><p><a href="https://blog.ui.com/article/releasing-unifi-network-9-4" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/releasing-unifi-network-9-4</a></p><br><p>Then Lou gets real about a disturbing trend: password hygiene is still garbage. The Blue Report 2025 shows that 46% of environments are still vulnerable to simple password cracking, and attackers succeed 98% of the time when using compromised credentials. The team covers how MFA, passwordless logins, and behavioral biometrics might help…if companies actually start using them.</p><p><a href="https://thehackernews.com/2025/08/weak-passwords-and-compromised-accounts.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/weak-passwords-and-compromised-accounts.html</a></p><br><p>Finally, the pair turn their eyes to Las Vegas and the big security themes from Black Hat 2025. With AI agents, identity-first architectures, and DSPM tools dominating the show floor, it’s clear that managing identity, authorization, and data governance is now the front line. They also unpack major concerns around deepfakes, insider risks, and post-quantum threats.</p><p><a href="https://www.techtarget.com/searchsecurity/opinion/Identity-and-data-security-themes-at-Black-Hat-2025" rel="noopener noreferrer" target="_blank">https://www.techtarget.com/searchsecurity/opinion/Identity-and-data-security-themes-at-Black-Hat-2025</a></p><br><p>⸻</p><br><p>🔗<strong> Wrap Up</strong></p><br><p>Thanks for listening to IT SPARC Cast!</p><br><p><strong>Follow us online for more enterprise IT insights:</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast – News Bytes, John and Lou take on three stories that highlight where enterprise IT is innovating—and where it’s still falling short. Ubiquiti’s UniFi Network 9.4 is out, and it’s more than just an update. John breaks down how Object Networking simplifies dynamic policy management and monitoring, delivering enterprise-grade controls to SMBs without scripting. You’ll hear how new scanning and traffic insight tools aim to make real-time optimization more accessible than ever.</p><p><a href="https://blog.ui.com/article/releasing-unifi-network-9-4" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/releasing-unifi-network-9-4</a></p><br><p>Then Lou gets real about a disturbing trend: password hygiene is still garbage. The Blue Report 2025 shows that 46% of environments are still vulnerable to simple password cracking, and attackers succeed 98% of the time when using compromised credentials. The team covers how MFA, passwordless logins, and behavioral biometrics might help…if companies actually start using them.</p><p><a href="https://thehackernews.com/2025/08/weak-passwords-and-compromised-accounts.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/weak-passwords-and-compromised-accounts.html</a></p><br><p>Finally, the pair turn their eyes to Las Vegas and the big security themes from Black Hat 2025. With AI agents, identity-first architectures, and DSPM tools dominating the show floor, it’s clear that managing identity, authorization, and data governance is now the front line. They also unpack major concerns around deepfakes, insider risks, and post-quantum threats.</p><p><a href="https://www.techtarget.com/searchsecurity/opinion/Identity-and-data-security-themes-at-Black-Hat-2025" rel="noopener noreferrer" target="_blank">https://www.techtarget.com/searchsecurity/opinion/Identity-and-data-security-themes-at-Black-Hat-2025</a></p><br><p>⸻</p><br><p>🔗<strong> Wrap Up</strong></p><br><p>Thanks for listening to IT SPARC Cast!</p><br><p><strong>Follow us online for more enterprise IT insights:</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[QuirkyLoader Malware & The Quishing Epidemic: What IT Needs to Know]]></title>
			<itunes:title><![CDATA[QuirkyLoader Malware & The Quishing Epidemic: What IT Needs to Know]]></itunes:title>
			<pubDate>Fri, 22 Aug 2025 11:44:42 GMT</pubDate>
			<itunes:duration>7:35</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68a8582a73bf5b6298e2f054/media.mp3" length="131199160" type="audio/mpeg"/>
			<guid isPermaLink="false">68a8582a73bf5b6298e2f054</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s02e02</link>
			<acast:episodeId>68a8582a73bf5b6298e2f054</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s02e02</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7basdAPyEt3u7ZUmjVNhBkGVlSzfzz09OYJs31oqddHvJFaleDqJCI9GCK+vsDiB8Ur9wHI0OrmrUYlUqzH6V70]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E02</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1755862892568-265566e8-ce25-4e32-9c8f-cdc8921f27d9.jpeg"/>
			<description><![CDATA[<p>This week on <em>CVE of the Week</em>, John and Lou break down the rising threat of <em>QuirkyLoader</em>, a new malware loader delivering Remote Access Trojans and info-stealers through DLL sideloading. But the real danger? It’s hiding in plain sight—QR codes.</p><br><p>We explore the rise of <strong>quishing</strong> (QR code phishing), why QR codes are the new “USB drives in the parking lot,” and how both the IT and marketing teams might unknowingly contribute to this growing attack vector. From user education to software architecture changes and questionable operating system defaults, this episode challenges the security status quo.</p><br><p>🔐 Topics covered:</p><p>•How <em>QuirkyLoader</em> uses DLL sideloading and process hollowing</p><p>•The resurgence of QR-based phishing attacks</p><p>•Why your marketing team might be the weakest link</p><p>•Should Apple and Google restrict QR scanning?</p><br><p>If you’re responsible for cybersecurity awareness, endpoint protection, or enterprise app architecture—don’t skip this one.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week on <em>CVE of the Week</em>, John and Lou break down the rising threat of <em>QuirkyLoader</em>, a new malware loader delivering Remote Access Trojans and info-stealers through DLL sideloading. But the real danger? It’s hiding in plain sight—QR codes.</p><br><p>We explore the rise of <strong>quishing</strong> (QR code phishing), why QR codes are the new “USB drives in the parking lot,” and how both the IT and marketing teams might unknowingly contribute to this growing attack vector. From user education to software architecture changes and questionable operating system defaults, this episode challenges the security status quo.</p><br><p>🔐 Topics covered:</p><p>•How <em>QuirkyLoader</em> uses DLL sideloading and process hollowing</p><p>•The resurgence of QR-based phishing attacks</p><p>•Why your marketing team might be the weakest link</p><p>•Should Apple and Google restrict QR scanning?</p><br><p>If you’re responsible for cybersecurity awareness, endpoint protection, or enterprise app architecture—don’t skip this one.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Digital Ghosts, Vibe Coders, and AI Help Desks</title>
			<itunes:title>Digital Ghosts, Vibe Coders, and AI Help Desks</itunes:title>
			<pubDate>Mon, 18 Aug 2025 14:30:00 GMT</pubDate>
			<itunes:duration>19:53</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68a25306436325e2784f2302/media.mp3" length="343643392" type="audio/mpeg"/>
			<guid isPermaLink="false">68a25306436325e2784f2302</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s02e01</link>
			<acast:episodeId>68a25306436325e2784f2302</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s02e01</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aidpRW49SYMsWExalPas25NbualdGucbBXZU6gjF1WZge4nPiIl1UnGvghN9+MK6BLNEhOawfdGgsL95HEjIgC]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S02E01</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1755468090230-3f47ce51-0191-46ac-a0a5-153ed5a07e68.jpeg"/>
			<description><![CDATA[<p>In the Season 2 premiere of IT SPARC Cast - News Bytes, John &amp; Lou return with a fresh batch of IT news and sharp insights. From the ethics of digital afterlives to AI-enhanced help desks, this episode dives into the weird, the practical, and the quietly transformative.</p><br><p>First, they explore whether the dead should have a “digital delete button”, as tech platforms debate data rights for the deceased. Then, they dig into Uno Platform’s push for enterprise “vibe coders” building cross-platform apps with AI-assisted tools. Finally, they examine how General Catalyst is investing in smarter AI-driven IT support for enterprise environments. Plus: A listener mailbag sparks nostalgia for gear-hauling IT jobs of the past.</p><br><p>⏱️ Timestamps &amp; Show Notes</p><br><p>00:00 - Intro</p><p>Season 2 kicks off! Welcome back to another season of enterprise IT, security insights, and sarcasm from your two favorite IT pros.</p><br><p>01:07 - Should the Dead Have a Digital Delete Button?</p><p>A new philosophical and legal debate arises:</p><p>•Should the deceased have their online data erased by default?</p><p>•Do family members or estate holders have the right to preserve or delete digital legacies?</p><p>•How should platforms handle “posthumous presence”?</p><p><a href="https://www.theregister.com/2025/08/09/dead_need_ai_data_delete_right/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2025/08/09/dead_need_ai_data_delete_right/</a></p><br><p>07:29 - Uno Platform Targets Enterprise Vibe Coders</p><p>Uno Platform positions itself as a cross-platform AI tool for modern Vibe Coders:</p><p>•Leverages .NET to deliver native apps on Web, iOS, Android, and Windows</p><p>•Could be a game-changer for internal enterprise tooling</p><p><a href="https://techcrunch.com/2025/08/12/in-a-world-of-vibe-coding-startups-uno-platform-is-targeting-enterprise-developers/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/08/12/in-a-world-of-vibe-coding-startups-uno-platform-is-targeting-enterprise-developers/</a></p><br><p>12:36 - General Catalyst Helps the Help Desk with AI</p><p>General Catalyst backs AI-based help desk automation:</p><p>•Improving IT support with context-aware, LLM-powered agents</p><p>•These agents integrate with backend systems and reduce Tier 1 volume</p><p>•Potential to reshape the future of enterprise IT support</p><p><a href="https://www.msn.com/en-us/money/smallbusiness/general-catalyst-s-latest-ai-bet-is-in-it/ar-AA1Kn2cm" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/money/smallbusiness/general-catalyst-s-latest-ai-bet-is-in-it/ar-AA1Kn2cm</a></p><p><a href="https://www.wsj.com/articles/general-catalysts-latest-ai-bet-is-in-it-3a2f5b03" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/general-catalysts-latest-ai-bet-is-in-it-3a2f5b03</a></p><p><a href="https://www.wsj.com/articles/it-departments-are-overloaded-with-busy-work-can-ai-change-that-19a9f667" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/it-departments-are-overloaded-with-busy-work-can-ai-change-that-19a9f667</a></p><br><p>17:05 - Listener Mail Bag</p><p>A shoutout to listener who reminisces about rolling carts and CRT monitors. We hear you, Rob—and we’ve all got the spinal injuries to prove it.</p><br><p>18:58 - Wrap Up</p><p>Thanks for joining us in Season 2! Got feedback, episode ideas, or hot takes? Reach out—we read it all.</p><br><p>feedback@itsparccast.com</p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In the Season 2 premiere of IT SPARC Cast - News Bytes, John &amp; Lou return with a fresh batch of IT news and sharp insights. From the ethics of digital afterlives to AI-enhanced help desks, this episode dives into the weird, the practical, and the quietly transformative.</p><br><p>First, they explore whether the dead should have a “digital delete button”, as tech platforms debate data rights for the deceased. Then, they dig into Uno Platform’s push for enterprise “vibe coders” building cross-platform apps with AI-assisted tools. Finally, they examine how General Catalyst is investing in smarter AI-driven IT support for enterprise environments. Plus: A listener mailbag sparks nostalgia for gear-hauling IT jobs of the past.</p><br><p>⏱️ Timestamps &amp; Show Notes</p><br><p>00:00 - Intro</p><p>Season 2 kicks off! Welcome back to another season of enterprise IT, security insights, and sarcasm from your two favorite IT pros.</p><br><p>01:07 - Should the Dead Have a Digital Delete Button?</p><p>A new philosophical and legal debate arises:</p><p>•Should the deceased have their online data erased by default?</p><p>•Do family members or estate holders have the right to preserve or delete digital legacies?</p><p>•How should platforms handle “posthumous presence”?</p><p><a href="https://www.theregister.com/2025/08/09/dead_need_ai_data_delete_right/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2025/08/09/dead_need_ai_data_delete_right/</a></p><br><p>07:29 - Uno Platform Targets Enterprise Vibe Coders</p><p>Uno Platform positions itself as a cross-platform AI tool for modern Vibe Coders:</p><p>•Leverages .NET to deliver native apps on Web, iOS, Android, and Windows</p><p>•Could be a game-changer for internal enterprise tooling</p><p><a href="https://techcrunch.com/2025/08/12/in-a-world-of-vibe-coding-startups-uno-platform-is-targeting-enterprise-developers/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/08/12/in-a-world-of-vibe-coding-startups-uno-platform-is-targeting-enterprise-developers/</a></p><br><p>12:36 - General Catalyst Helps the Help Desk with AI</p><p>General Catalyst backs AI-based help desk automation:</p><p>•Improving IT support with context-aware, LLM-powered agents</p><p>•These agents integrate with backend systems and reduce Tier 1 volume</p><p>•Potential to reshape the future of enterprise IT support</p><p><a href="https://www.msn.com/en-us/money/smallbusiness/general-catalyst-s-latest-ai-bet-is-in-it/ar-AA1Kn2cm" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/money/smallbusiness/general-catalyst-s-latest-ai-bet-is-in-it/ar-AA1Kn2cm</a></p><p><a href="https://www.wsj.com/articles/general-catalysts-latest-ai-bet-is-in-it-3a2f5b03" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/general-catalysts-latest-ai-bet-is-in-it-3a2f5b03</a></p><p><a href="https://www.wsj.com/articles/it-departments-are-overloaded-with-busy-work-can-ai-change-that-19a9f667" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/it-departments-are-overloaded-with-busy-work-can-ai-change-that-19a9f667</a></p><br><p>17:05 - Listener Mail Bag</p><p>A shoutout to listener who reminisces about rolling carts and CRT monitors. We hear you, Rob—and we’ve all got the spinal injuries to prove it.</p><br><p>18:58 - Wrap Up</p><p>Thanks for joining us in Season 2! Got feedback, episode ideas, or hot takes? Reach out—we read it all.</p><br><p>feedback@itsparccast.com</p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Docker Hub CVE Wake-Up Call: Malware from 2024 Still Lurking in 2025 Images!</title>
			<itunes:title>Docker Hub CVE Wake-Up Call: Malware from 2024 Still Lurking in 2025 Images!</itunes:title>
			<pubDate>Fri, 15 Aug 2025 14:53:59 GMT</pubDate>
			<itunes:duration>8:25</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/689f4a07436325e278989df2/media.mp3" length="145625572" type="audio/mpeg"/>
			<guid isPermaLink="false">689f4a07436325e278989df2</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/docker-hub-cve-wake-up-call-malware-from-2024-still-lurking</link>
			<acast:episodeId>689f4a07436325e278989df2</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>docker-hub-cve-wake-up-call-malware-from-2024-still-lurking</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aeIYsq4h5cOFzKYSmIaYPlQ82tmhrWsV0GN1QfRkKZPmsc37wKSHJbGThBOrOIg3XvDnCmBu9E+ZXV7A71M44g]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S02E01</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1755269256758-0527a42f-ec9f-4d98-bd34-467fb08c08a3.jpeg"/>
			<description><![CDATA[<p>We’re kicking off Season 2 of IT SPARC Cast - CVE of the Week with a critical vulnerability warning that should make every DevOps and IT leader take notice. This episode dives into the shocking discovery that 35 Docker Hub images still contain malware linked to the 2024 XZ Utils supply chain attack—highlighting massive blind spots in container security.</p><br><p>John and Lou explore how this outdated exploit has resurfaced in current Docker images, why current scanning tools failed to catch it, and what security measures enterprise IT teams must implement to stay protected. From Zero Trust practices to software attestation chains, this episode outlines what’s broken—and what you can do about it.</p><br><p>⸻</p><br><p>🔐<strong> SEO Keywords:</strong></p><br><p>Docker vulnerability, CVE of the week, container security, XZ Utils exploit, Docker Hub malware, supply chain attack, open source security, DevSecOps best practices, 2024 CVE, secure coding, binary scanning, Docker CVE patch, enterprise IT podcast</p><br><p>⸻</p><br><p>🔗<strong> Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>We’re kicking off Season 2 of IT SPARC Cast - CVE of the Week with a critical vulnerability warning that should make every DevOps and IT leader take notice. This episode dives into the shocking discovery that 35 Docker Hub images still contain malware linked to the 2024 XZ Utils supply chain attack—highlighting massive blind spots in container security.</p><br><p>John and Lou explore how this outdated exploit has resurfaced in current Docker images, why current scanning tools failed to catch it, and what security measures enterprise IT teams must implement to stay protected. From Zero Trust practices to software attestation chains, this episode outlines what’s broken—and what you can do about it.</p><br><p>⸻</p><br><p>🔐<strong> SEO Keywords:</strong></p><br><p>Docker vulnerability, CVE of the week, container security, XZ Utils exploit, Docker Hub malware, supply chain attack, open source security, DevSecOps best practices, 2024 CVE, secure coding, binary scanning, Docker CVE patch, enterprise IT podcast</p><br><p>⸻</p><br><p>🔗<strong> Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>UniFi Goes DIY, Cisco Open Sources AGNTCY, and AI Writes Buggy Code</title>
			<itunes:title>UniFi Goes DIY, Cisco Open Sources AGNTCY, and AI Writes Buggy Code</itunes:title>
			<pubDate>Tue, 05 Aug 2025 14:25:21 GMT</pubDate>
			<itunes:duration>14:25</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6892145134f09da0e52e0c2f/media.mp3" length="249169012" type="audio/mpeg"/>
			<guid isPermaLink="false">6892145134f09da0e52e0c2f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s01e45</link>
			<acast:episodeId>6892145134f09da0e52e0c2f</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s01e45</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bmK/cs0SXspQ/u3AlxKgQS8accwv/y6/XTSsonZ0QaZgUV/N1LPO+885OgVfB4ncYsBv/KCfYqrbtTYjMCpByy]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S01E45</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>45</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1754403426253-213aafcf-475c-4552-bd1c-84d0646ab758.jpeg"/>
			<description><![CDATA[<p>In this season finale of <strong>IT SPARC Cast - News Bytes</strong>, John &amp; Lou close out Season 1 with a jam-packed episode of enterprise IT updates. First up, Ubiquiti releases a self-hosted <strong>UniFi OS Server</strong> for MSPs and labs, letting users run powerful network tools on their own hardware—no licensing fees, no cloud lock-in. It’s a move that’s making waves in MSP and homelab circles alike.</p><br><p>Next, they unpack Cisco’s donation of <strong>AGNTCY</strong> to the Linux Foundation—an open-source framework to help AI agents discover, authenticate, and talk to each other. Finally, the duo tackles some harsh realities: <strong>AI-generated code is insecure nearly half the time</strong>, according to a major study. What does this mean for developers, QA teams, and the future of “vibe coding”? They break it all down as we close Season 1 with one final Hot Take.</p><br><p>⸻</p><br><p>⏱️<strong> Timestamps &amp; Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><p>Season 1 comes to a close—thanks for listening and helping shape the show. Season 2 kicks off late August / early September. Got ideas? Hit us up!</p><br><p>⸻</p><br><p><strong>01:15 - Ubiquiti Introduces UniFi OS Server for MSPs</strong></p><p>Ubiquiti’s new early-access product lets you:</p><p>•Self-host UniFi Network apps on x86/ARM hardware</p><p>•Avoid licensing fees</p><p>•Deploy for MSPs, enterprise labs, or homelabs</p><p>•Use InnerSpace, Site Magic, Identity management &amp; more</p><p>Highly flexible, and Reddit’s loving it.</p><p><a href="https://blog.ui.com/article/introducing-unifi-os-server" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/introducing-unifi-os-server</a></p><br><p>⸻</p><br><p><strong>04:30 - Cisco Donates AGNTCY to the Linux Foundation</strong></p><p>Cisco open-sources a powerful AI agent interoperability framework:</p><p>•AGNTCY includes Open Agent Schema Framework, decentralized discovery (like DNS), and secure agent messaging (SLIM)</p><p>•Works with existing Linux Foundation protocols (like A2A and MCP)</p><p>•Enables a future Internet of Agents with open standards</p><p><a href="https://www.zdnet.com/article/want-ai-agents-to-work-together-the-linux-foundation-has-a-plan/" rel="noopener noreferrer" target="_blank">https://www.zdnet.com/article/want-ai-agents-to-work-together-the-linux-foundation-has-a-plan/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>09:28 - AI Code Generators Are Writing Vulnerable Software Nearly Half the Time</strong></p><p>A new Veracode study found:</p><p>•45% of AI-generated code contains security flaws</p><p>•OWASP Top 10 issues like SQLi, XSS, log injection are rampant</p><p>•Java is worst offender (70% insecure code)</p><p>•Bigger LLMs aren’t better at avoiding flaws</p><p>John &amp; Lou discuss why human QA still matters—and why you should <strong>never push vibe-coded updates on Friday</strong>.</p><p><a href="https://nerds.xyz/2025/07/ai-security-flaws-veracode-2025/" rel="noopener noreferrer" target="_blank">https://nerds.xyz/2025/07/ai-security-flaws-veracode-2025/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>13:20 - Wrap Up</strong></p><p>That’s a wrap for Season 1! Help us shape Season 2 by sending in feedback, suggestions, or topics you’d love to hear.</p><br><p><br></p><p>📨 feedback@itsparccast.com</p><p>📣 @ITSPARCCast on X</p><p>🔗 https://www.linkedin.com/company/sparc-sales/</p><br><p>Follow the hosts:</p><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this season finale of <strong>IT SPARC Cast - News Bytes</strong>, John &amp; Lou close out Season 1 with a jam-packed episode of enterprise IT updates. First up, Ubiquiti releases a self-hosted <strong>UniFi OS Server</strong> for MSPs and labs, letting users run powerful network tools on their own hardware—no licensing fees, no cloud lock-in. It’s a move that’s making waves in MSP and homelab circles alike.</p><br><p>Next, they unpack Cisco’s donation of <strong>AGNTCY</strong> to the Linux Foundation—an open-source framework to help AI agents discover, authenticate, and talk to each other. Finally, the duo tackles some harsh realities: <strong>AI-generated code is insecure nearly half the time</strong>, according to a major study. What does this mean for developers, QA teams, and the future of “vibe coding”? They break it all down as we close Season 1 with one final Hot Take.</p><br><p>⸻</p><br><p>⏱️<strong> Timestamps &amp; Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><p>Season 1 comes to a close—thanks for listening and helping shape the show. Season 2 kicks off late August / early September. Got ideas? Hit us up!</p><br><p>⸻</p><br><p><strong>01:15 - Ubiquiti Introduces UniFi OS Server for MSPs</strong></p><p>Ubiquiti’s new early-access product lets you:</p><p>•Self-host UniFi Network apps on x86/ARM hardware</p><p>•Avoid licensing fees</p><p>•Deploy for MSPs, enterprise labs, or homelabs</p><p>•Use InnerSpace, Site Magic, Identity management &amp; more</p><p>Highly flexible, and Reddit’s loving it.</p><p><a href="https://blog.ui.com/article/introducing-unifi-os-server" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/introducing-unifi-os-server</a></p><br><p>⸻</p><br><p><strong>04:30 - Cisco Donates AGNTCY to the Linux Foundation</strong></p><p>Cisco open-sources a powerful AI agent interoperability framework:</p><p>•AGNTCY includes Open Agent Schema Framework, decentralized discovery (like DNS), and secure agent messaging (SLIM)</p><p>•Works with existing Linux Foundation protocols (like A2A and MCP)</p><p>•Enables a future Internet of Agents with open standards</p><p><a href="https://www.zdnet.com/article/want-ai-agents-to-work-together-the-linux-foundation-has-a-plan/" rel="noopener noreferrer" target="_blank">https://www.zdnet.com/article/want-ai-agents-to-work-together-the-linux-foundation-has-a-plan/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>09:28 - AI Code Generators Are Writing Vulnerable Software Nearly Half the Time</strong></p><p>A new Veracode study found:</p><p>•45% of AI-generated code contains security flaws</p><p>•OWASP Top 10 issues like SQLi, XSS, log injection are rampant</p><p>•Java is worst offender (70% insecure code)</p><p>•Bigger LLMs aren’t better at avoiding flaws</p><p>John &amp; Lou discuss why human QA still matters—and why you should <strong>never push vibe-coded updates on Friday</strong>.</p><p><a href="https://nerds.xyz/2025/07/ai-security-flaws-veracode-2025/" rel="noopener noreferrer" target="_blank">https://nerds.xyz/2025/07/ai-security-flaws-veracode-2025/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>13:20 - Wrap Up</strong></p><p>That’s a wrap for Season 1! Help us shape Season 2 by sending in feedback, suggestions, or topics you’d love to hear.</p><br><p><br></p><p>📨 feedback@itsparccast.com</p><p>📣 @ITSPARCCast on X</p><p>🔗 https://www.linkedin.com/company/sparc-sales/</p><br><p>Follow the hosts:</p><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Breach of Trust: How TEA App’s Security Failures Exposed 1M+ Private Messages</title>
			<itunes:title>Breach of Trust: How TEA App’s Security Failures Exposed 1M+ Private Messages</itunes:title>
			<pubDate>Fri, 01 Aug 2025 14:30:00 GMT</pubDate>
			<itunes:duration>9:40</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/688bbe866bbbf6afc778adfa/media.mp3" length="167139064" type="audio/mpeg"/>
			<guid isPermaLink="false">688bbe866bbbf6afc778adfa</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s01e11</link>
			<acast:episodeId>688bbe866bbbf6afc778adfa</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s01e11</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aSag5KsJqoh4fm6P8lbexS5uYpL5N/jMmPuefshCGjIGRXwynKf/iFLhUehdjRCNmzI8TUGDJZiwosCRRgROw1]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S01E11</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1753988591669-07f480d9-34b4-49c7-8551-f0c6c8a9dd2e.jpeg"/>
			<description><![CDATA[<p>In this eye-opening episode of <strong>IT SPARC Cast - CVE of the Week</strong>, John and Lou dive into a double-breach nightmare involving the TEA app—a dating safety app marketed to women. What began as a leak of 72,000 user images and 13,000 photo IDs escalated into a much more severe incident: over <strong>1.1 million private messages</strong> containing deeply personal topics were exposed due to unprotected Firebase storage.</p><br><p>We examine the catastrophic lapses in security hygiene, discuss the enterprise IT lessons learned, and reflect on the reputational and legal ramifications that follow when data protection is treated as an afterthought. Whether you’re a CISO, a privacy advocate, or just someone who cares about where their data lives, this is a must-listen.</p><br><p>⸻</p><br><p>📌<strong> Key Talking Points:</strong></p><p>•Legacy database exposes sensitive identity images and chat content</p><p>•TEA app suffers <strong>two breaches</strong>—one legacy, one current</p><p>•Firebase misconfiguration allowed full access to private conversations</p><p>•Enterprise-level lessons on paranoia, trust, and protecting sensitive services</p><p>•How consumer apps impact corporate environments when users overlap</p><br><p>⸻</p><br><p>🔗<strong> Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this eye-opening episode of <strong>IT SPARC Cast - CVE of the Week</strong>, John and Lou dive into a double-breach nightmare involving the TEA app—a dating safety app marketed to women. What began as a leak of 72,000 user images and 13,000 photo IDs escalated into a much more severe incident: over <strong>1.1 million private messages</strong> containing deeply personal topics were exposed due to unprotected Firebase storage.</p><br><p>We examine the catastrophic lapses in security hygiene, discuss the enterprise IT lessons learned, and reflect on the reputational and legal ramifications that follow when data protection is treated as an afterthought. Whether you’re a CISO, a privacy advocate, or just someone who cares about where their data lives, this is a must-listen.</p><br><p>⸻</p><br><p>📌<strong> Key Talking Points:</strong></p><p>•Legacy database exposes sensitive identity images and chat content</p><p>•TEA app suffers <strong>two breaches</strong>—one legacy, one current</p><p>•Firebase misconfiguration allowed full access to private conversations</p><p>•Enterprise-level lessons on paranoia, trust, and protecting sensitive services</p><p>•How consumer apps impact corporate environments when users overlap</p><br><p>⸻</p><br><p>🔗<strong> Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Enterprise IT in 2055: Code as Thought, Neural Interfaces, and the New Tech Workforce</title>
			<itunes:title>Enterprise IT in 2055: Code as Thought, Neural Interfaces, and the New Tech Workforce</itunes:title>
			<pubDate>Wed, 30 Jul 2025 14:30:00 GMT</pubDate>
			<itunes:duration>15:01</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/688921c1e0a86cc3ab4c2f40/media.mp3" length="259691524" type="audio/mpeg"/>
			<guid isPermaLink="false">688921c1e0a86cc3ab4c2f40</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-hot-take-episode-s01e06</link>
			<acast:episodeId>688921c1e0a86cc3ab4c2f40</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-hot-take-episode-s01e06</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Y/xY47E5b7KvHFKtwZVXNg/Vc/4+yNw7HCtj2xng3sQZf13gnKkfd8T1fjshjdIVzSCfBgLRLhp4cZV4CWVa7n]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Hot Take - Episode S01E06</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1753817338552-82b40a51-e4f4-4094-94d8-41d173878195.jpeg"/>
			<description><![CDATA[<p>In this third installment of our future-casting series, John &amp; Lou dive headfirst into the radical transformation of <strong>enterprise IT in 2055</strong>—two decades after the convergence of <strong>AGI, Super Intelligence, Quantum Computing, and Nuclear Fusion</strong>.</p><br><p>This isn’t science fiction—it’s plausible, near-future speculation grounded in tech trends already in motion. Topics include:</p><p>•Non-invasive, high-resolution <strong>neural interfaces</strong> that replace keyboards and voice commands</p><p>•Fully immersive <strong>human-AGI workspaces</strong> that resemble Iron Man’s Jarvis</p><p>•“<strong>Code as Thought</strong>” and self-composing infrastructure where thinking replaces programming</p><p>•A look at the <strong>tech workforce of 2055</strong>—what roles remain, and which new ones emerge</p><br><p>This is the future of work in a world with near-infinite compute, power, and potential.</p><br><p>⸻</p><br><p>⏱️<strong> Timestamps &amp; Topics:</strong></p><br><p><strong>00:00 – Intro</strong></p><p>Welcome to Part 3 in our multi-part future-tech series.</p><br><p><strong>00:15 – Setting the Context</strong></p><p>A quick recap of assumptions from Episodes 1–2 and one big addition: global population decline.</p><br><p><strong>02:25 – Neural Interface as Primary Input</strong></p><p>Typing and voice are obsolete—2055 interfaces read intent directly through advanced, non-invasive neural links.</p><br><p><strong>04:30 – Unified Human-AGI Workspaces</strong></p><p>Iron Man-style collaboration environments become real—customized, immersive, and powered by AGI.</p><br><p><strong>07:27 – Code as Thought</strong></p><p>Programming as we know it disappears. Thinking is the new coding, and AI builds the infrastructure.</p><br><p><strong>11:06 – Who Are the Specialists in 2055?</strong></p><p>From digital ethicists to intent engineers, we break down the roles shaping the IT workforce of the future.</p><br><p><strong>14:02 – Wrap Up</strong></p><p>What do you think of our 2055 vision? Email us at feedback@itsparccast.com or drop a comment.</p><br><p>⸻</p><br><p>🔗<strong> Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/sparc-sales/</a>&nbsp;on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnbarger/</a>&nbsp;on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/louis-schmidt-b102446/</a>&nbsp;on LinkedIn</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this third installment of our future-casting series, John &amp; Lou dive headfirst into the radical transformation of <strong>enterprise IT in 2055</strong>—two decades after the convergence of <strong>AGI, Super Intelligence, Quantum Computing, and Nuclear Fusion</strong>.</p><br><p>This isn’t science fiction—it’s plausible, near-future speculation grounded in tech trends already in motion. Topics include:</p><p>•Non-invasive, high-resolution <strong>neural interfaces</strong> that replace keyboards and voice commands</p><p>•Fully immersive <strong>human-AGI workspaces</strong> that resemble Iron Man’s Jarvis</p><p>•“<strong>Code as Thought</strong>” and self-composing infrastructure where thinking replaces programming</p><p>•A look at the <strong>tech workforce of 2055</strong>—what roles remain, and which new ones emerge</p><br><p>This is the future of work in a world with near-infinite compute, power, and potential.</p><br><p>⸻</p><br><p>⏱️<strong> Timestamps &amp; Topics:</strong></p><br><p><strong>00:00 – Intro</strong></p><p>Welcome to Part 3 in our multi-part future-tech series.</p><br><p><strong>00:15 – Setting the Context</strong></p><p>A quick recap of assumptions from Episodes 1–2 and one big addition: global population decline.</p><br><p><strong>02:25 – Neural Interface as Primary Input</strong></p><p>Typing and voice are obsolete—2055 interfaces read intent directly through advanced, non-invasive neural links.</p><br><p><strong>04:30 – Unified Human-AGI Workspaces</strong></p><p>Iron Man-style collaboration environments become real—customized, immersive, and powered by AGI.</p><br><p><strong>07:27 – Code as Thought</strong></p><p>Programming as we know it disappears. Thinking is the new coding, and AI builds the infrastructure.</p><br><p><strong>11:06 – Who Are the Specialists in 2055?</strong></p><p>From digital ethicists to intent engineers, we break down the roles shaping the IT workforce of the future.</p><br><p><strong>14:02 – Wrap Up</strong></p><p>What do you think of our 2055 vision? Email us at feedback@itsparccast.com or drop a comment.</p><br><p>⸻</p><br><p>🔗<strong> Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/sparc-sales/</a>&nbsp;on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnbarger/</a>&nbsp;on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/louis-schmidt-b102446/</a>&nbsp;on LinkedIn</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Google Secures OSS, Meta Gestures Boldly, and TapTrap Gets Trapped</title>
			<itunes:title>Google Secures OSS, Meta Gestures Boldly, and TapTrap Gets Trapped</itunes:title>
			<pubDate>Mon, 28 Jul 2025 14:30:00 GMT</pubDate>
			<itunes:duration>16:36</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6886a4e46e658a8b3c248d86/media.mp3" length="287138944" type="audio/mpeg"/>
			<guid isPermaLink="false">6886a4e46e658a8b3c248d86</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s01e44</link>
			<acast:episodeId>6886a4e46e658a8b3c248d86</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s01e44</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7agRM+kGWmZEgw+BWiB7AenxPHWW9ewNeutiUY01ckNHvPGFDWAPd9qMwOarRSt4KMnTsqewbm8+Tm6jRSEteDu]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S01E44</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>44</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1753653473067-e3850d09-786e-4bd5-b2d2-18fa8e1257ae.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast - News Bytes</strong>, John &amp; Lou highlight three big stories shaking up the tech world. </p><br><p>First, they explore how Google is tightening open-source security with OSS Rebuild—an AI-powered tool designed to detect supply chain attacks before they strike. Then they pivot to Meta’s latest innovation in gesture-based control using wrist-worn electromyography tech, showing real potential for AR and VR interactions.Finally, they break down a new Android vulnerability called TapTrap, which exploits screen transitions—good news: a simple toggle can mitigate it until a patch arrives. </p><br><p>From open-source code hygiene to wearable input breakthroughs to proactive Android security, this episode covers it all in just 15 minutes.</p><br><p>⸻</p><br><p>⏱️<strong> Timestamps &amp; Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><p>Welcome back to IT SPARC Cast – your fast-track to the latest in enterprise IT, cybersecurity, and innovation.</p><br><p>⸻</p><br><p><strong>01:22 - Google Launches OSS Rebuild</strong></p><p>Google debuts an open-source tool to proactively detect tampered packages across PyPI, NPM, and Crates.io. Highlights:</p><p>•AI-driven automated rebuilds</p><p>•CLI and self-hosted options</p><p>•Targets supply chain risks with sandboxed testing</p><p>John and Lou explain why this could become a staple of enterprise DevSecOps pipelines.</p><br><p><a href="https://security.googleblog.com/2025/07/introducing-oss-rebuild-open-source.html" rel="noopener noreferrer" target="_blank">https://security.googleblog.com/2025/07/introducing-oss-rebuild-open-source.html</a>&nbsp;</p><br><p>⸻</p><br><p><strong>07:12 - Meta’s Wrist-Worn Gesture Controllers for AR Interaction</strong></p><p>Meta publishes peer-reviewed research on wristbands that interpret hand gestures via surface electromyography (sEMG).</p><p>•No gloves or cameras required</p><p>•Could provide input and potentially haptic feedback</p><p>•Implications for AR/VR usability, accessibility, and future UX</p><p>Includes comparisons to Apple’s gesture control and Google’s accelerometer innovations.</p><br><p><a href="https://www.meta.com/blog/reality-labs-surface-emg-research-nature-publication-ar-glasses-orion/" rel="noopener noreferrer" target="_blank">https://www.meta.com/blog/reality-labs-surface-emg-research-nature-publication-ar-glasses-orion/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>12:00 - TapTrap Targeting Android Devices</strong></p><p>A new attack vector uses Android screen transition animations to overlay fake system prompts.</p><p>•Patched in GrapheneOS; not yet by Google</p><p>•Simple mitigation: disable system animations</p><p>•Could be used to escalate privileges or launch follow-up attacks</p><p>Lou and John praise the transparency of the security researchers while calling out the silence from vendors like SonicWall.</p><br><p><a href="https://taptrap.click/" rel="noopener noreferrer" target="_blank">https://taptrap.click/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>15:32 - Wrap Up</strong></p><p>Want to share feedback or pitch a topic? Reach out!</p><br><p>📨 feedback@itsparccast.com</p><p>📣 @ITSPARCCast on X</p><p>🔗 <a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/sparc-sales/</a>&nbsp;</p><br><p>Follow the hosts:</p><p>John Barger</p><p>• @john_Video on X</p><p>• <a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnbarger/</a>&nbsp;</p><br><p>Lou Schmidt</p><p>• @loudoggeek on X</p><p>• <a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/louis-schmidt-b102446/</a>&nbsp;</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast - News Bytes</strong>, John &amp; Lou highlight three big stories shaking up the tech world. </p><br><p>First, they explore how Google is tightening open-source security with OSS Rebuild—an AI-powered tool designed to detect supply chain attacks before they strike. Then they pivot to Meta’s latest innovation in gesture-based control using wrist-worn electromyography tech, showing real potential for AR and VR interactions.Finally, they break down a new Android vulnerability called TapTrap, which exploits screen transitions—good news: a simple toggle can mitigate it until a patch arrives. </p><br><p>From open-source code hygiene to wearable input breakthroughs to proactive Android security, this episode covers it all in just 15 minutes.</p><br><p>⸻</p><br><p>⏱️<strong> Timestamps &amp; Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><p>Welcome back to IT SPARC Cast – your fast-track to the latest in enterprise IT, cybersecurity, and innovation.</p><br><p>⸻</p><br><p><strong>01:22 - Google Launches OSS Rebuild</strong></p><p>Google debuts an open-source tool to proactively detect tampered packages across PyPI, NPM, and Crates.io. Highlights:</p><p>•AI-driven automated rebuilds</p><p>•CLI and self-hosted options</p><p>•Targets supply chain risks with sandboxed testing</p><p>John and Lou explain why this could become a staple of enterprise DevSecOps pipelines.</p><br><p><a href="https://security.googleblog.com/2025/07/introducing-oss-rebuild-open-source.html" rel="noopener noreferrer" target="_blank">https://security.googleblog.com/2025/07/introducing-oss-rebuild-open-source.html</a>&nbsp;</p><br><p>⸻</p><br><p><strong>07:12 - Meta’s Wrist-Worn Gesture Controllers for AR Interaction</strong></p><p>Meta publishes peer-reviewed research on wristbands that interpret hand gestures via surface electromyography (sEMG).</p><p>•No gloves or cameras required</p><p>•Could provide input and potentially haptic feedback</p><p>•Implications for AR/VR usability, accessibility, and future UX</p><p>Includes comparisons to Apple’s gesture control and Google’s accelerometer innovations.</p><br><p><a href="https://www.meta.com/blog/reality-labs-surface-emg-research-nature-publication-ar-glasses-orion/" rel="noopener noreferrer" target="_blank">https://www.meta.com/blog/reality-labs-surface-emg-research-nature-publication-ar-glasses-orion/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>12:00 - TapTrap Targeting Android Devices</strong></p><p>A new attack vector uses Android screen transition animations to overlay fake system prompts.</p><p>•Patched in GrapheneOS; not yet by Google</p><p>•Simple mitigation: disable system animations</p><p>•Could be used to escalate privileges or launch follow-up attacks</p><p>Lou and John praise the transparency of the security researchers while calling out the silence from vendors like SonicWall.</p><br><p><a href="https://taptrap.click/" rel="noopener noreferrer" target="_blank">https://taptrap.click/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>15:32 - Wrap Up</strong></p><p>Want to share feedback or pitch a topic? Reach out!</p><br><p>📨 feedback@itsparccast.com</p><p>📣 @ITSPARCCast on X</p><p>🔗 <a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/sparc-sales/</a>&nbsp;</p><br><p>Follow the hosts:</p><p>John Barger</p><p>• @john_Video on X</p><p>• <a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnbarger/</a>&nbsp;</p><br><p>Lou Schmidt</p><p>• @loudoggeek on X</p><p>• <a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/louis-schmidt-b102446/</a>&nbsp;</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Emergency SharePoint RCE Warning – CVE-2025-53770 & CVE-2025-53771 Under Active Exploit]]></title>
			<itunes:title><![CDATA[Emergency SharePoint RCE Warning – CVE-2025-53770 & CVE-2025-53771 Under Active Exploit]]></itunes:title>
			<pubDate>Fri, 25 Jul 2025 14:14:31 GMT</pubDate>
			<itunes:duration>7:04</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/688391483781311f9139c93a/media.mp3" length="122154124" type="audio/mpeg"/>
			<guid isPermaLink="false">688391483781311f9139c93a</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s01e10</link>
			<acast:episodeId>688391483781311f9139c93a</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s01e10</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bWJDw8p6drNrqjK4dCJcyADnrdZeGNhUDxvtX9qmdtTkvucBAqrJdUM2nutYgg6AX2S97LSjXK387RHY4vSN/Y]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S01E10</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1753452703668-7cac2df5-2eca-4992-ac4b-4f8ae02de719.jpeg"/>
			<description><![CDATA[<p>This week on IT SPARC Cast – CVE of the Week, John and Lou sound the alarm on two critical zero-day vulnerabilities impacting on-premise Microsoft SharePoint servers: CVE-2025-53770 and CVE-2025-53771. Exploited via a chained attack called “ToolShell,” these flaws enable unauthenticated remote code execution (RCE). Nation-state attackers, particularly Chinese APTs, are already exploiting these vulnerabilities, targeting government and infrastructure networks slow to patch. If you’re running SharePoint 2016, 2019, or Subscription Edition on-prem, your window for action is closing fast.</p><br><p>We break down Microsoft’s emergency guidance—including patching beyond last Patch Tuesday, rotating cryptographic keys, enabling AMSI &amp; Defender, auditing for compromise, and cutting off Internet access immediately if patching isn’t feasible. With some organizations still dangerously unpatched, this episode is a must-listen for IT professionals and enterprise defenders. If your SharePoint instance is Internet-facing and not yet patched, assume it’s compromised and begin incident response now.</p><br><p>Links:</p><p><a href="https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/</a>&nbsp;</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/</a>&nbsp;</p><p><a href="https://www.tomsguide.com/computing/online-security/microsoft-releases-emergency-security-updates-to-fix-sharepoint-zero-day-flaws-everything-you-need-to-know" rel="noopener noreferrer" target="_blank">https://www.tomsguide.com/computing/online-security/microsoft-releases-emergency-security-updates-to-fix-sharepoint-zero-day-flaws-everything-you-need-to-know</a>&nbsp;</p><p><a href="https://www.windowscentral.com/software-apps/were-witnessing-an-urgent-and-active-threat-microsoft-sharepoint-toolshell-vulnerability-is-being-attacked-globally" rel="noopener noreferrer" target="_blank">https://www.windowscentral.com/software-apps/were-witnessing-an-urgent-and-active-threat-microsoft-sharepoint-toolshell-vulnerability-is-being-attacked-globally</a></p><br><p><br></p><p>🔒 Keywords: SharePoint RCE exploit, CVE-2025-53770, CVE-2025-53771, ToolShell vulnerability, Microsoft SharePoint security, SharePoint emergency patch, nation-state cyberattacks, enterprise IT security, zero-day vulnerabilities, CVE of the week podcast</p><br><p>⸻</p><br><p>🔗<strong> Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week on IT SPARC Cast – CVE of the Week, John and Lou sound the alarm on two critical zero-day vulnerabilities impacting on-premise Microsoft SharePoint servers: CVE-2025-53770 and CVE-2025-53771. Exploited via a chained attack called “ToolShell,” these flaws enable unauthenticated remote code execution (RCE). Nation-state attackers, particularly Chinese APTs, are already exploiting these vulnerabilities, targeting government and infrastructure networks slow to patch. If you’re running SharePoint 2016, 2019, or Subscription Edition on-prem, your window for action is closing fast.</p><br><p>We break down Microsoft’s emergency guidance—including patching beyond last Patch Tuesday, rotating cryptographic keys, enabling AMSI &amp; Defender, auditing for compromise, and cutting off Internet access immediately if patching isn’t feasible. With some organizations still dangerously unpatched, this episode is a must-listen for IT professionals and enterprise defenders. If your SharePoint instance is Internet-facing and not yet patched, assume it’s compromised and begin incident response now.</p><br><p>Links:</p><p><a href="https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/</a>&nbsp;</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/</a>&nbsp;</p><p><a href="https://www.tomsguide.com/computing/online-security/microsoft-releases-emergency-security-updates-to-fix-sharepoint-zero-day-flaws-everything-you-need-to-know" rel="noopener noreferrer" target="_blank">https://www.tomsguide.com/computing/online-security/microsoft-releases-emergency-security-updates-to-fix-sharepoint-zero-day-flaws-everything-you-need-to-know</a>&nbsp;</p><p><a href="https://www.windowscentral.com/software-apps/were-witnessing-an-urgent-and-active-threat-microsoft-sharepoint-toolshell-vulnerability-is-being-attacked-globally" rel="noopener noreferrer" target="_blank">https://www.windowscentral.com/software-apps/were-witnessing-an-urgent-and-active-threat-microsoft-sharepoint-toolshell-vulnerability-is-being-attacked-globally</a></p><br><p><br></p><p>🔒 Keywords: SharePoint RCE exploit, CVE-2025-53770, CVE-2025-53771, ToolShell vulnerability, Microsoft SharePoint security, SharePoint emergency patch, nation-state cyberattacks, enterprise IT security, zero-day vulnerabilities, CVE of the week podcast</p><br><p>⸻</p><br><p>🔗<strong> Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Enterprise IT in 2045: Neural Interfaces, Quantum Comms & Context-Aware Collaboration]]></title>
			<itunes:title><![CDATA[Enterprise IT in 2045: Neural Interfaces, Quantum Comms & Context-Aware Collaboration]]></itunes:title>
			<pubDate>Wed, 23 Jul 2025 14:35:23 GMT</pubDate>
			<itunes:duration>16:28</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6880f32b498abee4161e29ec/media.mp3" length="284652460" type="audio/mpeg"/>
			<guid isPermaLink="false">6880f32b498abee4161e29ec</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-hot-take-episode-s01e05</link>
			<acast:episodeId>6880f32b498abee4161e29ec</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-hot-take-episode-s01e05</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZE4G+bDfgRmb5nDCiDKKVrMPTtTsDlLu5M30319kzvAgR+rXhpiTKdMpS6sQHFJfcsTrMPGdIEnmjkTAqsxpCZ]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Hot Take - Episode S01E05</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1753281048520-6b397bcb-2fa6-4bc1-840c-0670bc6caca9.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast – Hot Take</em>, John &amp; Lou take you on a deep-dive into what Enterprise IT might look like in 2045, assuming the convergence of AGI, Super Intelligence, quantum computing, and nuclear fusion began reshaping the world a decade earlier. This is part two of their future-focused series exploring how these exponential technologies will transform entire industries.</p><br><p>From non-invasive neural interfaces and zero-latency global communication to intent-based operating environments and deeply personalized collaboration spaces, the future of work is less about where and more about how. Tune in to hear speculative but grounded insights into what’s coming next—and how enterprise IT professionals can start preparing today.</p><br><p>⸻</p><br><p>⏱️<strong> Timestamps &amp; Topics:</strong></p><br><p><strong>00:00 – Intro</strong></p><p>Welcome back to our speculative series on future enterprise IT.</p><br><p><strong>00:25 – Setting the Context</strong></p><p>John sets the stage with the assumptions and constraints: AGI, Super Intelligence, quantum computing, and fusion energy are reshaping IT by 2035, leading us into the world of 2045.</p><br><p><strong>05:55 – Neural Interfaces (Basic)</strong></p><p>A look at non-invasive brain-computer interfaces—glasses, patches, or contact lenses—and how they may enable seamless, hands-free interaction with digital systems.</p><br><p><strong>08:23 – Zero-Latency Global Communication</strong></p><p>Quantum networking and AGI-enhanced routing power instant global comms and real-time language translation with no lag.</p><br><p><strong>09:40 – Dynamic, Intent-Based Operating Environments</strong></p><p>The operating system as we know it dies. Workspaces adapt to your context, switching between creative, analytical, or entertainment modes in real time.</p><br><p><strong>12:12 – Context-Aware Collaboration Environments</strong></p><p>Teamwork in 2045 is fully dynamic—each participant sees personalized interfaces, and every action is tagged with human intent.</p><br><p><strong>15:18 – Wrap Up</strong></p><p>Next episode: Enterprise IT in 2055. Share your thoughts at feedback@itsparccast.com or on X.</p><br><p>⸻</p><br><p>🔗<strong> Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/sparc-sales/</a>&nbsp;on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnbarger/</a>&nbsp;on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/louis-schmidt-b102446/</a>&nbsp;on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast – Hot Take</em>, John &amp; Lou take you on a deep-dive into what Enterprise IT might look like in 2045, assuming the convergence of AGI, Super Intelligence, quantum computing, and nuclear fusion began reshaping the world a decade earlier. This is part two of their future-focused series exploring how these exponential technologies will transform entire industries.</p><br><p>From non-invasive neural interfaces and zero-latency global communication to intent-based operating environments and deeply personalized collaboration spaces, the future of work is less about where and more about how. Tune in to hear speculative but grounded insights into what’s coming next—and how enterprise IT professionals can start preparing today.</p><br><p>⸻</p><br><p>⏱️<strong> Timestamps &amp; Topics:</strong></p><br><p><strong>00:00 – Intro</strong></p><p>Welcome back to our speculative series on future enterprise IT.</p><br><p><strong>00:25 – Setting the Context</strong></p><p>John sets the stage with the assumptions and constraints: AGI, Super Intelligence, quantum computing, and fusion energy are reshaping IT by 2035, leading us into the world of 2045.</p><br><p><strong>05:55 – Neural Interfaces (Basic)</strong></p><p>A look at non-invasive brain-computer interfaces—glasses, patches, or contact lenses—and how they may enable seamless, hands-free interaction with digital systems.</p><br><p><strong>08:23 – Zero-Latency Global Communication</strong></p><p>Quantum networking and AGI-enhanced routing power instant global comms and real-time language translation with no lag.</p><br><p><strong>09:40 – Dynamic, Intent-Based Operating Environments</strong></p><p>The operating system as we know it dies. Workspaces adapt to your context, switching between creative, analytical, or entertainment modes in real time.</p><br><p><strong>12:12 – Context-Aware Collaboration Environments</strong></p><p>Teamwork in 2045 is fully dynamic—each participant sees personalized interfaces, and every action is tagged with human intent.</p><br><p><strong>15:18 – Wrap Up</strong></p><p>Next episode: Enterprise IT in 2055. Share your thoughts at feedback@itsparccast.com or on X.</p><br><p>⸻</p><br><p>🔗<strong> Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/sparc-sales/</a>&nbsp;on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnbarger/</a>&nbsp;on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/louis-schmidt-b102446/</a>&nbsp;on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Windsurf Wipeout, Quantum Rumbles, and UniFi 9.3 Rolls Deep</title>
			<itunes:title>Windsurf Wipeout, Quantum Rumbles, and UniFi 9.3 Rolls Deep</itunes:title>
			<pubDate>Mon, 21 Jul 2025 14:30:00 GMT</pubDate>
			<itunes:duration>16:58</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/687a74f80d2a218993329ac4/media.mp3" length="293229028" type="audio/mpeg"/>
			<guid isPermaLink="false">687a74f80d2a218993329ac4</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s01e43</link>
			<acast:episodeId>687a74f80d2a218993329ac4</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s01e43</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YXKdHSM97Vhe0bZ7yxWzrhw+MKXsrWvLROZZ4dV8GkOM6Ow5g8Aq+X2VlA1kJorgvvkLGNndtLhuFdC270fbwy]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S01E43</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>43</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1752855094192-7a77b511-b85f-4737-a8f7-0ae7bd51fea1.jpeg"/>
			<description><![CDATA[<p>This week on IT SPARC Cast, John and Lou unpack UniFi Network 9.3’s biggest update yet, talk about why quantum security is no longer just a buzzword, and break down the soap opera acquisition collapse of Windsurf by OpenAI. Spoiler: Google and Cognition swooped in with a surprise twist.</p><br><p>⏱️<strong> Timestamps &amp; Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>00:52 - UniFi Network 9.3</strong></p><p>Ubiquiti releases UniFi Network version 9.3, and it’s a big one. Key highlights:</p><p>•Redesigned client tables with better filtering options</p><p>•Centralized DHCP and improved IP management</p><p>•Customizable alarms and logs with 3rd-party integrations</p><p>•Enhanced content filtering with scheduling, ad blocking, and allow/block lists</p><p>•IDS/IPS powered by Proofpoint, real-time blocking via Cloudflare</p><p>•Multi-WAN with policy-based routing and SLA support</p><p>•Aimed squarely at small-to-mid enterprises — without drowning in licensing fees</p><p><a href="https://blog.ui.com/article/introducing-network-9-3" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/introducing-network-9-3</a>&nbsp;</p><br><p><strong>06:59 - Quantum Security: It’s Not Just a Buzzword Issue Anymore</strong></p><p>Quantum computing may still require liquid nitrogen, but the quantum threat is already knocking. Lou and John discuss:</p><p>•Aptive’s call to action on post-quantum cryptography</p><p>•Signs of quantum decryption attempts in the wild</p><p>•Long-term implications for embedded systems, firmware, and legacy encryption</p><p>•The urgent need for organizations to inventory encryption dependencies</p><p><a href="https://www.aptiv.com/en/insights/article/why-it-s-time-to-invest-in-quantum-cybersecurity" rel="noopener noreferrer" target="_blank">https://www.aptiv.com/en/insights/article/why-it-s-time-to-invest-in-quantum-cybersecurity</a>&nbsp;</p><br><p><strong>10:43 - OpenAI Loses Out on Windsurf</strong></p><p>The Windsurf acquisition saga gets messy:</p><p>•Microsoft’s IP entanglement derails OpenAI’s planned buyout</p><p>•Google DeepMind hires Windsurf’s top talent in a surprise pivot</p><p>•Cognition scoops up the remaining assets for integration with Devon</p><p>•A lesson in why talent acquisition sometimes matters more than the tech</p><p><a href="https://techcrunch.com/2025/07/11/windsurfs-ceo-goes-to-google-openais-acquisition-falls-apart" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/07/11/windsurfs-ceo-goes-to-google-openais-acquisition-falls-apart</a>&nbsp;</p><p><a href="https://techcrunch.com/2025/07/14/cognition-maker-of-the-ai-coding-agent-devin-acquires-windsurf/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/07/14/cognition-maker-of-the-ai-coding-agent-devin-acquires-windsurf/</a>&nbsp;</p><br><p><strong>15:06 - Listener Feedback</strong></p><p>Shoutout to YouTube commenter GFA_Basic32 who compared our AR glasses segment to <em>Minority Report</em> — and got John dreaming about ad-blocking Pie Hole for your face.</p><br><p><strong>16:05 - Wrap Up</strong></p><p>Thanks for tuning in! Got feedback or episode ideas? Reach out anytime:</p><br><p>📧 feedback@itsparccast.com</p><p>📣 @ITSPARCCast on X</p><p>🔗 <a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/sparc-sales/</a>&nbsp;</p><br><p>Follow the hosts:</p><p>John Barger</p><p>• @john_Video on X</p><p>• <a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnbarger/</a>&nbsp;</p><br><p>Lou Schmidt</p><p>• @loudoggeek on X</p><p>• <a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/louis-schmidt-b102446/</a>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week on IT SPARC Cast, John and Lou unpack UniFi Network 9.3’s biggest update yet, talk about why quantum security is no longer just a buzzword, and break down the soap opera acquisition collapse of Windsurf by OpenAI. Spoiler: Google and Cognition swooped in with a surprise twist.</p><br><p>⏱️<strong> Timestamps &amp; Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>00:52 - UniFi Network 9.3</strong></p><p>Ubiquiti releases UniFi Network version 9.3, and it’s a big one. Key highlights:</p><p>•Redesigned client tables with better filtering options</p><p>•Centralized DHCP and improved IP management</p><p>•Customizable alarms and logs with 3rd-party integrations</p><p>•Enhanced content filtering with scheduling, ad blocking, and allow/block lists</p><p>•IDS/IPS powered by Proofpoint, real-time blocking via Cloudflare</p><p>•Multi-WAN with policy-based routing and SLA support</p><p>•Aimed squarely at small-to-mid enterprises — without drowning in licensing fees</p><p><a href="https://blog.ui.com/article/introducing-network-9-3" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/introducing-network-9-3</a>&nbsp;</p><br><p><strong>06:59 - Quantum Security: It’s Not Just a Buzzword Issue Anymore</strong></p><p>Quantum computing may still require liquid nitrogen, but the quantum threat is already knocking. Lou and John discuss:</p><p>•Aptive’s call to action on post-quantum cryptography</p><p>•Signs of quantum decryption attempts in the wild</p><p>•Long-term implications for embedded systems, firmware, and legacy encryption</p><p>•The urgent need for organizations to inventory encryption dependencies</p><p><a href="https://www.aptiv.com/en/insights/article/why-it-s-time-to-invest-in-quantum-cybersecurity" rel="noopener noreferrer" target="_blank">https://www.aptiv.com/en/insights/article/why-it-s-time-to-invest-in-quantum-cybersecurity</a>&nbsp;</p><br><p><strong>10:43 - OpenAI Loses Out on Windsurf</strong></p><p>The Windsurf acquisition saga gets messy:</p><p>•Microsoft’s IP entanglement derails OpenAI’s planned buyout</p><p>•Google DeepMind hires Windsurf’s top talent in a surprise pivot</p><p>•Cognition scoops up the remaining assets for integration with Devon</p><p>•A lesson in why talent acquisition sometimes matters more than the tech</p><p><a href="https://techcrunch.com/2025/07/11/windsurfs-ceo-goes-to-google-openais-acquisition-falls-apart" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/07/11/windsurfs-ceo-goes-to-google-openais-acquisition-falls-apart</a>&nbsp;</p><p><a href="https://techcrunch.com/2025/07/14/cognition-maker-of-the-ai-coding-agent-devin-acquires-windsurf/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/07/14/cognition-maker-of-the-ai-coding-agent-devin-acquires-windsurf/</a>&nbsp;</p><br><p><strong>15:06 - Listener Feedback</strong></p><p>Shoutout to YouTube commenter GFA_Basic32 who compared our AR glasses segment to <em>Minority Report</em> — and got John dreaming about ad-blocking Pie Hole for your face.</p><br><p><strong>16:05 - Wrap Up</strong></p><p>Thanks for tuning in! Got feedback or episode ideas? Reach out anytime:</p><br><p>📧 feedback@itsparccast.com</p><p>📣 @ITSPARCCast on X</p><p>🔗 <a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/sparc-sales/</a>&nbsp;</p><br><p>Follow the hosts:</p><p>John Barger</p><p>• @john_Video on X</p><p>• <a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnbarger/</a>&nbsp;</p><br><p>Lou Schmidt</p><p>• @loudoggeek on X</p><p>• <a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/louis-schmidt-b102446/</a>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>SonicWall Backdoor Exploit – CVEs, One Time Password Theft, and Vendor Silence</title>
			<itunes:title>SonicWall Backdoor Exploit – CVEs, One Time Password Theft, and Vendor Silence</itunes:title>
			<pubDate>Fri, 18 Jul 2025 14:10:28 GMT</pubDate>
			<itunes:duration>7:54</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/687a55d40de40e9a7c4c6c41/media.mp3" length="136688644" type="audio/mpeg"/>
			<guid isPermaLink="false">687a55d40de40e9a7c4c6c41</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s01e09</link>
			<acast:episodeId>687a55d40de40e9a7c4c6c41</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s01e09</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7azJyJ8jVxfxmsqSZD1KKPvZCpRwiyJtAmQqabBRcoU5d5aWByY9ecWdG8UzZPmnOE1gsNhJldjaUfVFynipfbK]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S01E09</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1752847659755-d335665c-795c-4bb1-82c5-fb4ff418677d.jpeg"/>
			<description><![CDATA[<p>📄<strong> Episode Description:</strong></p><br><p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John and Lou dive into a troubling situation involving SonicWall’s SMA 100 series firewalls. Despite devices being fully patched, active exploits are targeting one-time password seeds with stealthy malware like “OVERSTEP.” The malware modifies boot scripts, hides logs, steals credentials, and persists through reboots—leaving enterprise networks exposed without an effective patch in sight.</p><br><p>We break down known associated CVEs (including <strong>CVE-2021-20038, CVE-2024-38475, CVE-2021-20035, CVE-2021-20039, and CVE-2025-32819</strong>) and highlight the problematic nature of SonicWall’s response: telling customers to “just upgrade” without offering real mitigation. Whether you’re a SonicWall customer or an IT security leader assessing vendor risk, this episode serves as a wake-up call for how to handle (or not handle) active cyber threats.</p><br><p>⸻</p><br><p>🔗<strong> Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p><a href="https://x.com/ITSPARCCast" rel="noopener noreferrer" target="_blank">@ITSPARCCast on X</a></p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">IT SPARC Cast on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p><a href="https://x.com/john_Video" rel="noopener noreferrer" target="_blank">@john_Video on X</a></p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John Barger on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p><a href="https://x.com/loudoggeek" rel="noopener noreferrer" target="_blank">@loudoggeek on X</a></p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou Schmidt on LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>📄<strong> Episode Description:</strong></p><br><p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John and Lou dive into a troubling situation involving SonicWall’s SMA 100 series firewalls. Despite devices being fully patched, active exploits are targeting one-time password seeds with stealthy malware like “OVERSTEP.” The malware modifies boot scripts, hides logs, steals credentials, and persists through reboots—leaving enterprise networks exposed without an effective patch in sight.</p><br><p>We break down known associated CVEs (including <strong>CVE-2021-20038, CVE-2024-38475, CVE-2021-20035, CVE-2021-20039, and CVE-2025-32819</strong>) and highlight the problematic nature of SonicWall’s response: telling customers to “just upgrade” without offering real mitigation. Whether you’re a SonicWall customer or an IT security leader assessing vendor risk, this episode serves as a wake-up call for how to handle (or not handle) active cyber threats.</p><br><p>⸻</p><br><p>🔗<strong> Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p><a href="https://x.com/ITSPARCCast" rel="noopener noreferrer" target="_blank">@ITSPARCCast on X</a></p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">IT SPARC Cast on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p><a href="https://x.com/john_Video" rel="noopener noreferrer" target="_blank">@john_Video on X</a></p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John Barger on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p><a href="https://x.com/loudoggeek" rel="noopener noreferrer" target="_blank">@loudoggeek on X</a></p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou Schmidt on LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Fusion, Quantum, and Super AI: Are We On the Verge of a Sci-Fi Future?</title>
			<itunes:title>Fusion, Quantum, and Super AI: Are We On the Verge of a Sci-Fi Future?</itunes:title>
			<pubDate>Wed, 16 Jul 2025 14:30:00 GMT</pubDate>
			<itunes:duration>6:06</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68712ff9ea74e132fbef5fc2/media.mp3" length="105625612" type="audio/mpeg"/>
			<guid isPermaLink="false">68712ff9ea74e132fbef5fc2</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-hot-take-episode-s01e04</link>
			<acast:episodeId>68712ff9ea74e132fbef5fc2</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-hot-take-episode-s01e04</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Z9nAaGjtTONGzrQyH2H3b903eQQJoR0aChk3qlxlLw6qRz2nfPJ87xAe8OkmEZM9RWICovWehj1+69y2UH4UCH]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Hot Take - Episode S01E04</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1752248197851-f6854bdd-4f2e-46cc-ae30-d8aa54f4f652.jpeg"/>
			<description><![CDATA[<p>In this Hot Take episode of IT SPARC Cast, John Barger and Lou Schmidt unpack a mind-bending scenario that feels like it’s ripped straight from science fiction—but could it be closer than we think? With China claiming to sustain nuclear fusion for 30 minutes and targeting operational reactors by 2035, and the rapid rise of quantum computing and AI advancements, the stage is set for a technological revolution. John and Lou explore how fusion, quantum, AI, and space resources could combine to redefine energy, research, space exploration, and everyday life within the next decade.</p><br><p>What happens when scientists can compress years of research into days using Super AI? What breakthroughs could emerge in medicine, communications, and even space travel? The conversation touches on digital twins, ammonia production, energy independence, and the social disruption these changes could bring. This episode kicks off a multi-part discussion with YOUR feedback shaping where we go next.</p><br><p>⸻</p><br><p>🔗<strong> Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">SPARC Sales on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John Barger on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou Schmidt on LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this Hot Take episode of IT SPARC Cast, John Barger and Lou Schmidt unpack a mind-bending scenario that feels like it’s ripped straight from science fiction—but could it be closer than we think? With China claiming to sustain nuclear fusion for 30 minutes and targeting operational reactors by 2035, and the rapid rise of quantum computing and AI advancements, the stage is set for a technological revolution. John and Lou explore how fusion, quantum, AI, and space resources could combine to redefine energy, research, space exploration, and everyday life within the next decade.</p><br><p>What happens when scientists can compress years of research into days using Super AI? What breakthroughs could emerge in medicine, communications, and even space travel? The conversation touches on digital twins, ammonia production, energy independence, and the social disruption these changes could bring. This episode kicks off a multi-part discussion with YOUR feedback shaping where we go next.</p><br><p>⸻</p><br><p>🔗<strong> Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">SPARC Sales on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John Barger on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou Schmidt on LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Ruckus in the Network: CVSS 10.0 nightmare and the Secrets You Can’t Change</title>
			<itunes:title>Ruckus in the Network: CVSS 10.0 nightmare and the Secrets You Can’t Change</itunes:title>
			<pubDate>Mon, 14 Jul 2025 14:30:00 GMT</pubDate>
			<itunes:duration>6:06</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68712dc9374cdd852ad48e80/media.mp3" length="105625612" type="audio/mpeg"/>
			<guid isPermaLink="false">68712dc9374cdd852ad48e80</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s01e08</link>
			<acast:episodeId>68712dc9374cdd852ad48e80</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s01e08</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7akye8qihpDxyzyo9cJ/e3oln3CeRWUui7o5vmISKu+ZM4LRWFqW9CCOEkzx+rG+IUjDxE8uKyvLg07bQ6PjCk8]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S01E08</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1752247685777-4308f4cf-9bc1-4840-9af8-3a5e2d5eb842.jpeg"/>
			<description><![CDATA[<p>This week on <em>IT SPARC Cast – CVE of the Week</em>, John and Lou dive into one of the most critical vulnerabilities to ever hit enterprise wireless networks: <strong>CVE-2025-44957</strong> and a cluster of related flaws targeting <strong>Ruckus Wireless’s</strong> Virtual SmartZone (VSZ) and Ruckus Network Director (RND). These platforms, which manage massive deployments of up to 10,000 access points, contain <strong>hardcoded secrets</strong>, <strong>default RSA keys</strong>, <strong>unauthenticated RCE flaws</strong>, and <strong>directory traversal exploits</strong>—all scoring up to <strong>CVSS 10.0</strong>.</p><br><p>With <strong>no patch currently available</strong> and Ruckus/CommScope silent, these vulnerabilities present a <strong>hair-on-fire</strong> moment for network administrators. The team breaks down what went wrong, what to do now, and why silence from the vendor is the worst possible response. If you’re running Ruckus infrastructure—or connecting to a network that is—you <em>need</em> to listen to this episode immediately.</p><br><p>⸻</p><br><p><strong>Stay Connected with Us</strong></p><p><strong>IT SPARC Cast</strong></p><p>🔗 @ITSPARCCast on X</p><p>🔗 <a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">SPARC Sales on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>🔗 @john_Video on X</p><p>🔗 <a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>🔗 @loudoggeek on X</p><p>🔗 <a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou on LinkedIn</a></p><br><p>⸻</p><br><p>🔐 <strong>SEO Keywords:</strong> Ruckus CVE-2025-44954, CVE-2025-44955, CVE-2025-44957, CVE-2025-44958, CVE-2025-44960, CVE-2025-44961, CVE-2025-44962, CVE‑2025‑6243, CVE‑2025‑4496, Ruckus vulnerabilities 2025, hardcoded backdoor Ruckus, CVSS 10.0 wireless flaw, Ruckus Virtual SmartZone exploit, Commscope network security breach, enterprise WiFi security alert, zero-day in Ruckus management systems, IT SPARC Cast security podcast.</p><br><p><br></p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week on <em>IT SPARC Cast – CVE of the Week</em>, John and Lou dive into one of the most critical vulnerabilities to ever hit enterprise wireless networks: <strong>CVE-2025-44957</strong> and a cluster of related flaws targeting <strong>Ruckus Wireless’s</strong> Virtual SmartZone (VSZ) and Ruckus Network Director (RND). These platforms, which manage massive deployments of up to 10,000 access points, contain <strong>hardcoded secrets</strong>, <strong>default RSA keys</strong>, <strong>unauthenticated RCE flaws</strong>, and <strong>directory traversal exploits</strong>—all scoring up to <strong>CVSS 10.0</strong>.</p><br><p>With <strong>no patch currently available</strong> and Ruckus/CommScope silent, these vulnerabilities present a <strong>hair-on-fire</strong> moment for network administrators. The team breaks down what went wrong, what to do now, and why silence from the vendor is the worst possible response. If you’re running Ruckus infrastructure—or connecting to a network that is—you <em>need</em> to listen to this episode immediately.</p><br><p>⸻</p><br><p><strong>Stay Connected with Us</strong></p><p><strong>IT SPARC Cast</strong></p><p>🔗 @ITSPARCCast on X</p><p>🔗 <a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">SPARC Sales on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>🔗 @john_Video on X</p><p>🔗 <a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>🔗 @loudoggeek on X</p><p>🔗 <a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou on LinkedIn</a></p><br><p>⸻</p><br><p>🔐 <strong>SEO Keywords:</strong> Ruckus CVE-2025-44954, CVE-2025-44955, CVE-2025-44957, CVE-2025-44958, CVE-2025-44960, CVE-2025-44961, CVE-2025-44962, CVE‑2025‑6243, CVE‑2025‑4496, Ruckus vulnerabilities 2025, hardcoded backdoor Ruckus, CVSS 10.0 wireless flaw, Ruckus Virtual SmartZone exploit, Commscope network security breach, enterprise WiFi security alert, zero-day in Ruckus management systems, IT SPARC Cast security podcast.</p><br><p><br></p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>I’M NOT A BOT! Linux Foundation Adopts A2A, and Snap Gets Ad Blocked</title>
			<itunes:title>I’M NOT A BOT! Linux Foundation Adopts A2A, and Snap Gets Ad Blocked</itunes:title>
			<pubDate>Fri, 11 Jul 2025 14:27:53 GMT</pubDate>
			<itunes:duration>16:30</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68711f69ea74e132fbe91619/media.mp3" length="285265072" type="audio/mpeg"/>
			<guid isPermaLink="false">68711f69ea74e132fbe91619</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s01e42</link>
			<acast:episodeId>68711f69ea74e132fbe91619</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s01e42</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bq1VCSQUjGLxd6oeLrxFgIbW7MgG9LXpstSXvxCCFdmFNmj4HOUPLpp2yZtf5k0JSLFgRvUCDEEjyZAqB6+8Qr]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S01E42</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>42</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1752244003403-f65fbcc1-71f8-4078-a5f8-a48f865722ff.jpeg"/>
			<description><![CDATA[<p>In this of IT SPARC Cast - News Bytes, John and Lou explore the strange reality where human call center agents are now being mistaken for AI. They also break down the Linux Foundation’s adoption of the Agent to Agent Protocol (A2A), a potential game-changer in AI agent communication. And yes, someone built an ad blocker… for Snap Spectacles. It’s another week of tech headlines you don’t want to miss.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes:</strong></p><br><p><strong>00:00 - Intro</strong></p><p>Welcome back to IT SPARC Cast - News Bytes! John and Lou dive into the top tech stories of the week with a side of sarcasm.</p><br><p><strong>00:56 - Call Center Workers Are Tired of Being Mistaken for AI</strong></p><p><strong>•Real people are now being confused for bots.</strong></p><p><strong>•Workers report customers asking if they are “real” during calls.</strong></p><p><strong>•Tech is blurring the line between human and machine interactions.</strong></p><p><a href="https://it.slashdot.org/story/25/06/28/1740215/call-center-workers-are-tired-of-being-mistaken-for-ai" rel="noopener noreferrer" target="_blank">https://it.slashdot.org/story/25/06/28/1740215/call-center-workers-are-tired-of-being-mistaken-for-ai</a>&nbsp;</p><br><p><strong>05:33 - Linux Foundation Adopts A2A Protocol</strong></p><p><strong>•The Linux Foundation embraces the A2A Protocol</strong></p><p><strong>•A2A offers a standard for multi-agent communication across LLMs.</strong></p><p><strong>•The duo compares A2A to Anthropic’s Model Context Protocol</strong></p><p><strong>•Could be the start of an interoperable AI ecosystem.</strong></p><p><a href="https://www.zdnet.com/article/linux-foundation-adopts-a2a-protocol-to-help-solve-one-of-ais-most-pressing-challenges/" rel="noopener noreferrer" target="_blank">https://www.zdnet.com/article/linux-foundation-adopts-a2a-protocol-to-help-solve-one-of-ais-most-pressing-challenges/</a>&nbsp;</p><br><p><strong>11:18 - Ad Blocker For Snap Spectacles</strong></p><p><strong>•Yes, someone made an ad blocker for augmented reality glasses.</strong></p><p><strong>•Targets Snap Spectacles to cut down on AR-based visual noise.</strong></p><p><strong>•Raises big questions about future ad delivery in wearable tech.</strong></p><p><a href="https://www.uploadvr.com/real-world-ad-blocker-snap-spectacles/" rel="noopener noreferrer" target="_blank">https://www.uploadvr.com/real-world-ad-blocker-snap-spectacles/</a></p><br><p><strong>14:44 - Wrap Up</strong></p><p>We wrap with a few parting thoughts — and your weekly reminder to rate and review the show.</p><p>Follow and connect with us:</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this of IT SPARC Cast - News Bytes, John and Lou explore the strange reality where human call center agents are now being mistaken for AI. They also break down the Linux Foundation’s adoption of the Agent to Agent Protocol (A2A), a potential game-changer in AI agent communication. And yes, someone built an ad blocker… for Snap Spectacles. It’s another week of tech headlines you don’t want to miss.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes:</strong></p><br><p><strong>00:00 - Intro</strong></p><p>Welcome back to IT SPARC Cast - News Bytes! John and Lou dive into the top tech stories of the week with a side of sarcasm.</p><br><p><strong>00:56 - Call Center Workers Are Tired of Being Mistaken for AI</strong></p><p><strong>•Real people are now being confused for bots.</strong></p><p><strong>•Workers report customers asking if they are “real” during calls.</strong></p><p><strong>•Tech is blurring the line between human and machine interactions.</strong></p><p><a href="https://it.slashdot.org/story/25/06/28/1740215/call-center-workers-are-tired-of-being-mistaken-for-ai" rel="noopener noreferrer" target="_blank">https://it.slashdot.org/story/25/06/28/1740215/call-center-workers-are-tired-of-being-mistaken-for-ai</a>&nbsp;</p><br><p><strong>05:33 - Linux Foundation Adopts A2A Protocol</strong></p><p><strong>•The Linux Foundation embraces the A2A Protocol</strong></p><p><strong>•A2A offers a standard for multi-agent communication across LLMs.</strong></p><p><strong>•The duo compares A2A to Anthropic’s Model Context Protocol</strong></p><p><strong>•Could be the start of an interoperable AI ecosystem.</strong></p><p><a href="https://www.zdnet.com/article/linux-foundation-adopts-a2a-protocol-to-help-solve-one-of-ais-most-pressing-challenges/" rel="noopener noreferrer" target="_blank">https://www.zdnet.com/article/linux-foundation-adopts-a2a-protocol-to-help-solve-one-of-ais-most-pressing-challenges/</a>&nbsp;</p><br><p><strong>11:18 - Ad Blocker For Snap Spectacles</strong></p><p><strong>•Yes, someone made an ad blocker for augmented reality glasses.</strong></p><p><strong>•Targets Snap Spectacles to cut down on AR-based visual noise.</strong></p><p><strong>•Raises big questions about future ad delivery in wearable tech.</strong></p><p><a href="https://www.uploadvr.com/real-world-ad-blocker-snap-spectacles/" rel="noopener noreferrer" target="_blank">https://www.uploadvr.com/real-world-ad-blocker-snap-spectacles/</a></p><br><p><strong>14:44 - Wrap Up</strong></p><p>We wrap with a few parting thoughts — and your weekly reminder to rate and review the show.</p><p>Follow and connect with us:</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>HPE + Juniper: The Merger Is Approved… Now What?</title>
			<itunes:title>HPE + Juniper: The Merger Is Approved… Now What?</itunes:title>
			<pubDate>Wed, 09 Jul 2025 15:10:15 GMT</pubDate>
			<itunes:duration>21:05</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/686e86578d3d6839f409d044/media.mp3" length="364436164" type="audio/mpeg"/>
			<guid isPermaLink="false">686e86578d3d6839f409d044</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-hot-take-episode-s01e03</link>
			<acast:episodeId>686e86578d3d6839f409d044</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-hot-take-episode-s01e03</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YFqcU0uy56MQa5NlYFoo4H51dUM1eEb2xugpQXSKZrx+kYIpclGMbMOT4tudztdwU4mRUvDC61Jxn/YbKRx47v]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Hot Take - Episode S01E03</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1752073749975-6d6201b7-0c48-424e-b4e3-8eb37a42bbdd.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast - Hot Take, John Barger and Lou Schmidt break down the latest in the $14 billion HPE acquisition of Juniper Networks, now officially approved by the U.S. Department of Justice. But this merger comes with conditions—and plenty of unanswered questions. From Aruba’s low-end product line being sold off to Juniper’s Mist AI Ops being licensed out, the implications are massive for the enterprise networking market.</p><br><p>John and Lou share their predictions on who wins the product battles in switching, wireless, SD-WAN, and security. They also dive into the internal culture clashes that inevitably follow major acquisitions—and what customers and employees should be watching for next. If you’re in the enterprise IT space, this merger affects you. Tune in for real-world insights, predictions, and no-nonsense analysis.</p><br><p>⸻</p><br><p><strong>Follow Us for More Enterprise IT Insights:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">SPARC Sales on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John Barger on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou Schmidt on LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast - Hot Take, John Barger and Lou Schmidt break down the latest in the $14 billion HPE acquisition of Juniper Networks, now officially approved by the U.S. Department of Justice. But this merger comes with conditions—and plenty of unanswered questions. From Aruba’s low-end product line being sold off to Juniper’s Mist AI Ops being licensed out, the implications are massive for the enterprise networking market.</p><br><p>John and Lou share their predictions on who wins the product battles in switching, wireless, SD-WAN, and security. They also dive into the internal culture clashes that inevitably follow major acquisitions—and what customers and employees should be watching for next. If you’re in the enterprise IT space, this merger affects you. Tune in for real-world insights, predictions, and no-nonsense analysis.</p><br><p>⸻</p><br><p><strong>Follow Us for More Enterprise IT Insights:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">SPARC Sales on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John Barger on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou Schmidt on LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Ingram Micro Ransomware Breach: What Happened and How to Protect Your Business</title>
			<itunes:title>Ingram Micro Ransomware Breach: What Happened and How to Protect Your Business</itunes:title>
			<pubDate>Mon, 07 Jul 2025 19:55:32 GMT</pubDate>
			<itunes:duration>12:05</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/686c263491efcd98151b6def/media.mp3" length="208856740" type="audio/mpeg"/>
			<guid isPermaLink="false">686c263491efcd98151b6def</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s01e07</link>
			<acast:episodeId>686c263491efcd98151b6def</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s01e07</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YUb6VKbQQykP87xjdqo6qtt9TUD1MTbEyr6ZTU6qmRvDUG4QxChFpXARYR82xpV86mWYDM+EcEPW+r8OeeY6f+]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S01E07</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1751918035522-d0d378d5-5d86-49ab-9019-7b08835ef6b7.jpeg"/>
			<description><![CDATA[<p>This week on IT SPARC Cast - CVE of the Week, John Barger and Lou Schmidt dive into the massive ransomware attack that crippled global IT distributor Ingram Micro. The breach, allegedly carried out by the SafePay ransomware group, took down Ingram Micro’s critical ordering and licensing platforms, causing widespread disruption across the tech industry. With speculation that attackers may have gained access through the company’s GlobalProtect VPN as far back as November, this incident highlights how ransomware dwell time can quietly set organizations up for catastrophic failure.</p><br><p>John and Lou break down what we know so far, why proper backup strategies, network segmentation, and Zero Trust architectures are more critical than ever, and why every organization—regardless of size—needs a true disaster recovery plan for a worst-case scenario like this. Don’t assume your backups are clean. Don’t assume your internal network is safe. Learn the hard lessons from this major breach before your organization becomes the next target.</p><br><p>⸻</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">SPARC Sales on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John Barger on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou Schmidt on LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week on IT SPARC Cast - CVE of the Week, John Barger and Lou Schmidt dive into the massive ransomware attack that crippled global IT distributor Ingram Micro. The breach, allegedly carried out by the SafePay ransomware group, took down Ingram Micro’s critical ordering and licensing platforms, causing widespread disruption across the tech industry. With speculation that attackers may have gained access through the company’s GlobalProtect VPN as far back as November, this incident highlights how ransomware dwell time can quietly set organizations up for catastrophic failure.</p><br><p>John and Lou break down what we know so far, why proper backup strategies, network segmentation, and Zero Trust architectures are more critical than ever, and why every organization—regardless of size—needs a true disaster recovery plan for a worst-case scenario like this. Don’t assume your backups are clean. Don’t assume your internal network is safe. Learn the hard lessons from this major breach before your organization becomes the next target.</p><br><p>⸻</p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">SPARC Sales on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John Barger on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou Schmidt on LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Two New Linux Privilege Escalation Flaws You Need to Patch (CVE-2025-6018 & CVE-2025-6019)]]></title>
			<itunes:title><![CDATA[Two New Linux Privilege Escalation Flaws You Need to Patch (CVE-2025-6018 & CVE-2025-6019)]]></itunes:title>
			<pubDate>Tue, 01 Jul 2025 14:30:00 GMT</pubDate>
			<itunes:duration>4:14</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/685ef14a47311de1b677139d/media.mp3" length="73373392" type="audio/mpeg"/>
			<guid isPermaLink="false">685ef14a47311de1b677139d</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-s01e06</link>
			<acast:episodeId>685ef14a47311de1b677139d</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-s01e06</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZcDpJBWlvzL3iZ+1++AFL19ETMn07dsct66DTPqn62n2vzxEIHQeR2csdgVG6iPt8A6FVvSGh1cm81zPZgLARu]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE OF THE WEEK - S01E06</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1751052534132-8cfd38b8-fa6e-4b1b-b4b5-4dc977c23339.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast - CVE of The Week</strong>, John and Lou break down two critical Linux vulnerabilities—CVE-2025-6018 and CVE-2025-6019—that could allow local users to escalate privileges all the way to root. Discovered by the Qualys Threat Research Unit, these flaws affect major Linux distributions, including openSUSE and SUSE Enterprise Linux. Even though Ubuntu users may be safe if default PAM files haven’t been altered, the risks for production Linux environments are real—and patching is essential.</p><br><p>We dive into how attackers could chain these flaws together to gain unauthorized access, what systems are most at risk, and how you can protect your environment today. From patch details to command-line workarounds, we cover what IT teams need to know to stay ahead of potential exploitation. Don’t let your Linux systems stay vulnerable—listen in for the details!</p><br><p>⸻</p><br><p><strong>Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">IT SPARC Cast LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John’s LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou’s LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast - CVE of The Week</strong>, John and Lou break down two critical Linux vulnerabilities—CVE-2025-6018 and CVE-2025-6019—that could allow local users to escalate privileges all the way to root. Discovered by the Qualys Threat Research Unit, these flaws affect major Linux distributions, including openSUSE and SUSE Enterprise Linux. Even though Ubuntu users may be safe if default PAM files haven’t been altered, the risks for production Linux environments are real—and patching is essential.</p><br><p>We dive into how attackers could chain these flaws together to gain unauthorized access, what systems are most at risk, and how you can protect your environment today. From patch details to command-line workarounds, we cover what IT teams need to know to stay ahead of potential exploitation. Don’t let your Linux systems stay vulnerable—listen in for the details!</p><br><p>⸻</p><br><p><strong>Social Links:</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">IT SPARC Cast LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John’s LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou’s LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Tech Titans Collide, Congressional Bans, and the Computer Science Crash?</title>
			<itunes:title>Tech Titans Collide, Congressional Bans, and the Computer Science Crash?</itunes:title>
			<pubDate>Fri, 27 Jun 2025 16:08:17 GMT</pubDate>
			<itunes:duration>20:45</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/685ec1f1081ac1df5d3c334f/media.mp3" length="358754488" type="audio/mpeg"/>
			<guid isPermaLink="false">685ec1f1081ac1df5d3c334f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s01e41</link>
			<acast:episodeId>685ec1f1081ac1df5d3c334f</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s01e41</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7a6D8NOy6bWuWZ6sYc1KpnAcihbYpFKMObTilG5T4n2IgQa5yWWB9ycLT6s8dOWJrNSIIuMA92z/e6+jX/cWN+4]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S01E41</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>41</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1751040424888-6fd109e2-b91b-4dea-8648-34630c7c6087.jpeg"/>
			<description><![CDATA[<p>In this Episode of IT SPARC Cast – News Bytes, John and Lou break down a historic first meeting between Bill Gates and Linus Torvalds, sparking speculation about collaboration. They also cover Nvidia’s bold move into cloud services, how Congress is banning apps like WhatsApp and Co-Pilot from staff devices, and whether the Computer Science bubble is finally bursting. This is your enterprise IT news, with the sarcasm and insights you’ve come to expect.</p><br><p>⸻</p><br><p>🗞️<strong> News Bytes</strong></p><br><p><strong>00:56 - Bill Gates and Linus Torvalds Meet for the First Time</strong></p><p>•After decades of shaping tech from opposite ends, Gates and Torvalds finally sit down together</p><p>•Speculation swirls: truce, partnership, or just a polite handshake?</p><p>•John and Lou dissect the implications for open-source, Microsoft, and enterprise IT</p><p>•<a href="https://linuxiac.com/a-historic-photo-torvalds-and-gates-together/" rel="noopener noreferrer" target="_blank">https://linuxiac.com/a-historic-photo-torvalds-and-gates-together/</a>&nbsp;</p><br><p><strong>06:22 - Nvidia Ruffles Tech Giants With Move Into Cloud Computing</strong></p><p>•Nvidia unveils plans to offer its own cloud platform for AI workloads</p><p>•Tech giants like AWS, Azure, and Google Cloud are not thrilled</p><p>•Is Nvidia becoming the next major infrastructure player?</p><p>•<a href="https://www.wsj.com/tech/ai/nvidia-dgx-cloud-computing-28c49748" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/ai/nvidia-dgx-cloud-computing-28c49748</a>&nbsp;</p><br><p><strong>09:32 - Congress Bans WhatsApp, Co-Pilot, &amp; more from Staff Devices</strong></p><p>•U.S. Congress bans certain apps from government-issued devices</p><p>•WhatsApp, Microsoft Co-Pilot, and others face the axe</p><p>•Raises bigger questions about security, control, and vendor trust</p><p>•<a href="https://www.axios.com/2025/06/23/whatsapp-house-congress-staffers-messaging-app" rel="noopener noreferrer" target="_blank">https://www.axios.com/2025/06/23/whatsapp-house-congress-staffers-messaging-app</a>&nbsp;</p><br><p><strong>14:18 - Is The Computer-Science Bubble Bursting?</strong></p><p>•Enrollment in computer science programs shows signs of slowing</p><p>•Layoffs and AI automation fuel fears of an industry correction</p><p>•John and Lou discuss what it means for the future of IT careers</p><p>•<a href="https://www.theatlantic.com/economy/archive/2025/06/computer-science-bubble-ai/683242/" rel="noopener noreferrer" target="_blank">https://www.theatlantic.com/economy/archive/2025/06/computer-science-bubble-ai/683242/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>18:55</strong> -<strong> Wrap Up</strong></p><p>Thanks for tuning in to IT SPARC Cast! Got feedback or story ideas? We want to hear from you.</p><br><p><strong>Social Links:</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this Episode of IT SPARC Cast – News Bytes, John and Lou break down a historic first meeting between Bill Gates and Linus Torvalds, sparking speculation about collaboration. They also cover Nvidia’s bold move into cloud services, how Congress is banning apps like WhatsApp and Co-Pilot from staff devices, and whether the Computer Science bubble is finally bursting. This is your enterprise IT news, with the sarcasm and insights you’ve come to expect.</p><br><p>⸻</p><br><p>🗞️<strong> News Bytes</strong></p><br><p><strong>00:56 - Bill Gates and Linus Torvalds Meet for the First Time</strong></p><p>•After decades of shaping tech from opposite ends, Gates and Torvalds finally sit down together</p><p>•Speculation swirls: truce, partnership, or just a polite handshake?</p><p>•John and Lou dissect the implications for open-source, Microsoft, and enterprise IT</p><p>•<a href="https://linuxiac.com/a-historic-photo-torvalds-and-gates-together/" rel="noopener noreferrer" target="_blank">https://linuxiac.com/a-historic-photo-torvalds-and-gates-together/</a>&nbsp;</p><br><p><strong>06:22 - Nvidia Ruffles Tech Giants With Move Into Cloud Computing</strong></p><p>•Nvidia unveils plans to offer its own cloud platform for AI workloads</p><p>•Tech giants like AWS, Azure, and Google Cloud are not thrilled</p><p>•Is Nvidia becoming the next major infrastructure player?</p><p>•<a href="https://www.wsj.com/tech/ai/nvidia-dgx-cloud-computing-28c49748" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/ai/nvidia-dgx-cloud-computing-28c49748</a>&nbsp;</p><br><p><strong>09:32 - Congress Bans WhatsApp, Co-Pilot, &amp; more from Staff Devices</strong></p><p>•U.S. Congress bans certain apps from government-issued devices</p><p>•WhatsApp, Microsoft Co-Pilot, and others face the axe</p><p>•Raises bigger questions about security, control, and vendor trust</p><p>•<a href="https://www.axios.com/2025/06/23/whatsapp-house-congress-staffers-messaging-app" rel="noopener noreferrer" target="_blank">https://www.axios.com/2025/06/23/whatsapp-house-congress-staffers-messaging-app</a>&nbsp;</p><br><p><strong>14:18 - Is The Computer-Science Bubble Bursting?</strong></p><p>•Enrollment in computer science programs shows signs of slowing</p><p>•Layoffs and AI automation fuel fears of an industry correction</p><p>•John and Lou discuss what it means for the future of IT careers</p><p>•<a href="https://www.theatlantic.com/economy/archive/2025/06/computer-science-bubble-ai/683242/" rel="noopener noreferrer" target="_blank">https://www.theatlantic.com/economy/archive/2025/06/computer-science-bubble-ai/683242/</a>&nbsp;</p><br><p>⸻</p><br><p><strong>18:55</strong> -<strong> Wrap Up</strong></p><p>Thanks for tuning in to IT SPARC Cast! Got feedback or story ideas? We want to hear from you.</p><br><p><strong>Social Links:</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cloud SLA Theater: Why 99.999% Uptime Is a Joke in 2025</title>
			<itunes:title>Cloud SLA Theater: Why 99.999% Uptime Is a Joke in 2025</itunes:title>
			<pubDate>Wed, 25 Jun 2025 14:30:00 GMT</pubDate>
			<itunes:duration>15:31</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/685574fe0bed216db749beda/media.mp3" length="268244068" type="audio/mpeg"/>
			<guid isPermaLink="false">685574fe0bed216db749beda</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-hot-take-episode-s01e02</link>
			<acast:episodeId>685574fe0bed216db749beda</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-hot-take-episode-s01e02</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZJ53mKfoqqWx1sZZgmrFOGOpY96oZS2RNk3iU30LEbmy3myYoLOKZc+eF6pQ5hJywtRa8LChILEmLKyRLzqrxB]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Hot Take - Episode S01E02</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1750430904220-8ba94b9b-ba95-4707-840c-7caf7e512800.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast - Hot Take</strong>, John and Lou shine a spotlight on the crumbling façade of cloud reliability. Once upon a time, enterprise IT measured uptime in “nines”—with five nines (99.999%) meaning just over five minutes of downtime a year. Today’s cloud providers? They’re barely holding onto three or four nines, if that.</p><br><p>From Microsoft’s massive Microsoft 365 outage on June 16th, to recurring IBM Cloud disruptions, and a multi-hour Google Cloud failure that impacted over 50 services globally, this episode breaks down why modern cloud infrastructure—despite all its microservices and distributed architecture—still seems shockingly brittle.</p><br><p>If your business is betting everything on the cloud, this episode is your wake-up call. We talk SLAs, misaligned priorities, and whether “Cloud-First” is still a smart strategy for mission-critical apps in 2025.</p><br><p>⸻</p><br><p><strong>Social Links</strong></p><br><p><strong>Social Links:</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/sparc-sales/</a>&nbsp;on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnbarger/</a>&nbsp;on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/louis-schmidt-b102446/</a>&nbsp;on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast - Hot Take</strong>, John and Lou shine a spotlight on the crumbling façade of cloud reliability. Once upon a time, enterprise IT measured uptime in “nines”—with five nines (99.999%) meaning just over five minutes of downtime a year. Today’s cloud providers? They’re barely holding onto three or four nines, if that.</p><br><p>From Microsoft’s massive Microsoft 365 outage on June 16th, to recurring IBM Cloud disruptions, and a multi-hour Google Cloud failure that impacted over 50 services globally, this episode breaks down why modern cloud infrastructure—despite all its microservices and distributed architecture—still seems shockingly brittle.</p><br><p>If your business is betting everything on the cloud, this episode is your wake-up call. We talk SLAs, misaligned priorities, and whether “Cloud-First” is still a smart strategy for mission-critical apps in 2025.</p><br><p>⸻</p><br><p><strong>Social Links</strong></p><br><p><strong>Social Links:</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/sparc-sales/</a>&nbsp;on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnbarger/</a>&nbsp;on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/louis-schmidt-b102446/</a>&nbsp;on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>SAP NetWeaver RCE Flaw (CVE-2025-31324): Patch It or Get Owned</title>
			<itunes:title>SAP NetWeaver RCE Flaw (CVE-2025-31324): Patch It or Get Owned</itunes:title>
			<pubDate>Tue, 24 Jun 2025 14:30:00 GMT</pubDate>
			<itunes:duration>3:45</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/685568644dd392b0fbf3756c/media.mp3" length="64880908" type="audio/mpeg"/>
			<guid isPermaLink="false">685568644dd392b0fbf3756c</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-s01e05</link>
			<acast:episodeId>685568644dd392b0fbf3756c</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-s01e05</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aEnI63XJklqGafybEdtWt//y1/awSDHWMweVb+v+fulJ5n1Z0bCFPej51qEBNiSJYL9FthANH4LYpigNhnUpdS]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week S01E05</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1750427644700-353989a8-3f37-4e13-bed6-567e9f8e876c.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast - CVE of The Week</strong>, John and Lou break down CVE-2025-31324 — a critical remote code execution vulnerability in SAP NetWeaver’s Visual Composer. With a CVSS score of 9.8, this exploit is not just theory — it’s actively being weaponized by ransomware gangs, Chinese APTs, and groups like BianLian and RansomEXX. Despite SAP issuing emergency patches in April 2025, organizations continue to get hit, proving that unpatched systems remain a massive security liability.</p><br><p>We’ll explain how Visual Composer’s model-driven development tools became the attack vector, what full RCE means in an enterprise SAP environment, and why skipping patches can do more than just destabilize your system — it can destroy your business continuity. If you’re running SAP NetWeaver, this is your wake-up call to audit, patch, and double-check.</p><br><p>Stay ahead of threats. Patch often. Stay secure.</p><p>Subscribe for weekly threat insights from the world of Enterprise IT.</p><br><p>⸻</p><br><p>🔗<strong> Social Links</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">SPARC Sales on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John Barger on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou Schmidt on LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast - CVE of The Week</strong>, John and Lou break down CVE-2025-31324 — a critical remote code execution vulnerability in SAP NetWeaver’s Visual Composer. With a CVSS score of 9.8, this exploit is not just theory — it’s actively being weaponized by ransomware gangs, Chinese APTs, and groups like BianLian and RansomEXX. Despite SAP issuing emergency patches in April 2025, organizations continue to get hit, proving that unpatched systems remain a massive security liability.</p><br><p>We’ll explain how Visual Composer’s model-driven development tools became the attack vector, what full RCE means in an enterprise SAP environment, and why skipping patches can do more than just destabilize your system — it can destroy your business continuity. If you’re running SAP NetWeaver, this is your wake-up call to audit, patch, and double-check.</p><br><p>Stay ahead of threats. Patch often. Stay secure.</p><p>Subscribe for weekly threat insights from the world of Enterprise IT.</p><br><p>⸻</p><br><p>🔗<strong> Social Links</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">SPARC Sales on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John Barger on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou Schmidt on LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Amazon’s AI Layoffs, Deepfake Scams via Zoom, and Corporate Tensions – Welcome to the New Normal</title>
			<itunes:title>Amazon’s AI Layoffs, Deepfake Scams via Zoom, and Corporate Tensions – Welcome to the New Normal</itunes:title>
			<pubDate>Fri, 20 Jun 2025 14:30:00 GMT</pubDate>
			<itunes:duration>23:22</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68547bc22b3b2092a4a66458/media.mp3" length="403931620" type="audio/mpeg"/>
			<guid isPermaLink="false">68547bc22b3b2092a4a66458</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s01e40</link>
			<acast:episodeId>68547bc22b3b2092a4a66458</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s01e40</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aEOx24Yp+OolnDSyHfGCfiq7v+AHFqnZAe2n0C/nmY7wp81n015utI4f7JaokGObcVmdd3oRtWu+VKz6RzdkJ7]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S01E40</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>40</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1750365041987-0034e476-3c1a-4d91-94e4-fbf2970d5efb.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast - News Bytes</strong>, John and Lou break down the week’s biggest tech stories—from Amazon’s quiet plan to replace portions of its workforce with generative AI, to BlueNoroff’s chilling new Zoom scam using deepfake technology. They also follow up on pricing details for Google’s Beam 3D video conferencing, discuss rising tension between OpenAI and Microsoft, and look at Uptime Industries’ quirky “AI-in-a-BOX” offering featuring an LLM called <em>Lemony</em>. This episode connects the dots between automation, deception, and disruption—and what it means for enterprise IT.</p><br><p>🗞️<strong> News Bytes</strong></p><br><p><strong>00:58 - Amazon’s To Shrink workforce as AI takes over routine tasks</strong></p><p>•Amazon plans to reduce its workforce as generative AI takes over routine tasks</p><p>•Part of a larger trend where AI automates internal operations at scale</p><p><a href="https://www.reuters.com/business/retail-consumer/amazons-workforce-reduce-rollout-generative-ai-agents-2025-06-17/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/business/retail-consumer/amazons-workforce-reduce-rollout-generative-ai-agents-2025-06-17/</a></p><br><p><strong>05:18 - Google Beam Pricing Revealed</strong></p><p>•Follow-up from previous episode: Google Beam is priced as a premium service</p><p>•Raises the question: is it really the future of meetings, or just a Silicon Valley flex?</p><p><a href="https://newatlas.com/consumer-tech/google-beam-3d-video-conferencing/" rel="noopener noreferrer" target="_blank">https://newatlas.com/consumer-tech/google-beam-3d-video-conferencing/</a>&nbsp;</p><br><p><strong>08:54 - BlueNoroff Deploys Deepfake Zoom Scam</strong></p><p>•BlueNoroff APT group now uses deepfake video calls to defraud executives</p><p>•Masquerades as investors or vendors during Zoom calls to steal money</p><p>•Highlights the need for real-time identity verification and cybersecurity vigilance</p><p><a href="https://thehackernews.com/2025/06/bluenoroff-deepfake-zoom-scam-hits.html?m=1" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/bluenoroff-deepfake-zoom-scam-hits.html?m=1</a>&nbsp;</p><br><p><strong>12:43 - OpenAI and Microsoft Tensions Escalate</strong></p><p>•Friction grows between OpenAI’s board and Microsoft’s leadership</p><p>•Disagreements over product roadmap, strategy, and ethical AI deployment</p><p>•Could this rift reshape the foundation of enterprise AI partnerships?</p><p><a href="https://www.wsj.com/tech/ai/openai-and-microsoft-tensions-are-reaching-a-boiling-point-4981c44f?st=oztNm3&amp;reflink=desktopwebshare_permalink" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/ai/openai-and-microsoft-tensions-are-reaching-a-boiling-point-4981c44f?st=oztNm3&amp;reflink=desktopwebshare_permalink</a>&nbsp;</p><br><p><strong>17:07 - Uptime Industries unveiled AI-in-a-BOX called Lemony</strong></p><p>•New plug-and-play LLM appliance promises instant AI infrastructure</p><p>•Targeted at SMBs who want AI without the cloud complexity</p><p><a href="https://www.computerworld.com/article/4007510/uptimes-ai-in-a-box-offers-turnkey-enterprise-grade-ai-without-the-cloud.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/4007510/uptimes-ai-in-a-box-offers-turnkey-enterprise-grade-ai-without-the-cloud.html</a>&nbsp;</p><br><p>Wrap Up - 22:22</p><br><p>Thank you for tuning in to IT SPARC Cast. Got feedback, questions, or hot tips? Let us know!</p><br><p>Social Links:</p><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast - News Bytes</strong>, John and Lou break down the week’s biggest tech stories—from Amazon’s quiet plan to replace portions of its workforce with generative AI, to BlueNoroff’s chilling new Zoom scam using deepfake technology. They also follow up on pricing details for Google’s Beam 3D video conferencing, discuss rising tension between OpenAI and Microsoft, and look at Uptime Industries’ quirky “AI-in-a-BOX” offering featuring an LLM called <em>Lemony</em>. This episode connects the dots between automation, deception, and disruption—and what it means for enterprise IT.</p><br><p>🗞️<strong> News Bytes</strong></p><br><p><strong>00:58 - Amazon’s To Shrink workforce as AI takes over routine tasks</strong></p><p>•Amazon plans to reduce its workforce as generative AI takes over routine tasks</p><p>•Part of a larger trend where AI automates internal operations at scale</p><p><a href="https://www.reuters.com/business/retail-consumer/amazons-workforce-reduce-rollout-generative-ai-agents-2025-06-17/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/business/retail-consumer/amazons-workforce-reduce-rollout-generative-ai-agents-2025-06-17/</a></p><br><p><strong>05:18 - Google Beam Pricing Revealed</strong></p><p>•Follow-up from previous episode: Google Beam is priced as a premium service</p><p>•Raises the question: is it really the future of meetings, or just a Silicon Valley flex?</p><p><a href="https://newatlas.com/consumer-tech/google-beam-3d-video-conferencing/" rel="noopener noreferrer" target="_blank">https://newatlas.com/consumer-tech/google-beam-3d-video-conferencing/</a>&nbsp;</p><br><p><strong>08:54 - BlueNoroff Deploys Deepfake Zoom Scam</strong></p><p>•BlueNoroff APT group now uses deepfake video calls to defraud executives</p><p>•Masquerades as investors or vendors during Zoom calls to steal money</p><p>•Highlights the need for real-time identity verification and cybersecurity vigilance</p><p><a href="https://thehackernews.com/2025/06/bluenoroff-deepfake-zoom-scam-hits.html?m=1" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/bluenoroff-deepfake-zoom-scam-hits.html?m=1</a>&nbsp;</p><br><p><strong>12:43 - OpenAI and Microsoft Tensions Escalate</strong></p><p>•Friction grows between OpenAI’s board and Microsoft’s leadership</p><p>•Disagreements over product roadmap, strategy, and ethical AI deployment</p><p>•Could this rift reshape the foundation of enterprise AI partnerships?</p><p><a href="https://www.wsj.com/tech/ai/openai-and-microsoft-tensions-are-reaching-a-boiling-point-4981c44f?st=oztNm3&amp;reflink=desktopwebshare_permalink" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/ai/openai-and-microsoft-tensions-are-reaching-a-boiling-point-4981c44f?st=oztNm3&amp;reflink=desktopwebshare_permalink</a>&nbsp;</p><br><p><strong>17:07 - Uptime Industries unveiled AI-in-a-BOX called Lemony</strong></p><p>•New plug-and-play LLM appliance promises instant AI infrastructure</p><p>•Targeted at SMBs who want AI without the cloud complexity</p><p><a href="https://www.computerworld.com/article/4007510/uptimes-ai-in-a-box-offers-turnkey-enterprise-grade-ai-without-the-cloud.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/4007510/uptimes-ai-in-a-box-offers-turnkey-enterprise-grade-ai-without-the-cloud.html</a>&nbsp;</p><br><p>Wrap Up - 22:22</p><br><p>Thank you for tuning in to IT SPARC Cast. Got feedback, questions, or hot tips? Let us know!</p><br><p>Social Links:</p><p>IT SPARC Cast</p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p>John Barger</p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p>Lou Schmidt</p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Government Data Requests: Apple’s Transparency and the Quiet Threat to Privacy</title>
			<itunes:title>Government Data Requests: Apple’s Transparency and the Quiet Threat to Privacy</itunes:title>
			<pubDate>Tue, 17 Jun 2025 19:37:41 GMT</pubDate>
			<itunes:duration>5:45</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6851c405002f9da49a9b64e7/media.mp3" length="99487480" type="audio/mpeg"/>
			<guid isPermaLink="false">6851c405002f9da49a9b64e7</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-s01e04</link>
			<acast:episodeId>6851c405002f9da49a9b64e7</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-s01e04</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ajfD1fnFEfyfe+pefWpxVrRGvGDAnsQJVwPGKWEKAtSwqjMlyohKl7MW/LumhjLIi3SiS9uqoOaNUfTranhNXZ]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE OF THE WEEK - S01E04</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1750189054156-cc5ee33e-6ef8-4aac-8fab-a2dfd6880e75.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast – CVE of the Week</em>, John and Lou dig into Apple’s latest transparency report, which reveals how governments worldwide are requesting access to Apple user data at record-breaking levels. From iCloud backups to metadata, these requests expose just how much personal and corporate information could be vulnerable—even for organizations that think they’re secure. The guys break down the numbers, the countries involved, and what IT security professionals need to consider as cloud providers quietly cooperate with governments behind closed doors.</p><br><p>⸻</p><br><p>📝<strong> Show Notes</strong></p><p>•Apple releases its latest transparency report, showing millions of government data requests.</p><p>•<strong>China, the U.S., and several EU countries</strong> remain top requesters for Apple customer data.</p><p>•While Apple promotes end-to-end encryption, not all data types are protected—iCloud backups, emails, and certain metadata remain accessible.</p><p>•The risk extends to enterprises using Cloud&nbsp;Storage as part of their IT strategies.</p><p>•John and Lou explain why privacy policies that promise to “protect your data” often still include backdoors for legal compliance.</p><p>•This serves as a reminder for IT teams to:</p><p>•Segment corporate data from personal cloud services</p><p>•Review legal jurisdictions when choosing SaaS/cloud providers</p><p>•Be proactive when advising executives who rely heavily on cloud services</p><br><p><a href="https://www.computerworld.com/article/4003107/apple-details-which-governments-make-the-most-data-requests.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/4003107/apple-details-which-governments-make-the-most-data-requests.html</a></p><br><p>⸻</p><br><p><strong>Wrap Up</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><br><p>⸻</p><br><p>✅ <em>SEO Optimized Keywords:</em></p><p>Apple transparency report, government data requests, iCloud encryption risks, enterprise data privacy, SaaS legal compliance, corporate cloud security, Apple user data privacy</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast – CVE of the Week</em>, John and Lou dig into Apple’s latest transparency report, which reveals how governments worldwide are requesting access to Apple user data at record-breaking levels. From iCloud backups to metadata, these requests expose just how much personal and corporate information could be vulnerable—even for organizations that think they’re secure. The guys break down the numbers, the countries involved, and what IT security professionals need to consider as cloud providers quietly cooperate with governments behind closed doors.</p><br><p>⸻</p><br><p>📝<strong> Show Notes</strong></p><p>•Apple releases its latest transparency report, showing millions of government data requests.</p><p>•<strong>China, the U.S., and several EU countries</strong> remain top requesters for Apple customer data.</p><p>•While Apple promotes end-to-end encryption, not all data types are protected—iCloud backups, emails, and certain metadata remain accessible.</p><p>•The risk extends to enterprises using Cloud&nbsp;Storage as part of their IT strategies.</p><p>•John and Lou explain why privacy policies that promise to “protect your data” often still include backdoors for legal compliance.</p><p>•This serves as a reminder for IT teams to:</p><p>•Segment corporate data from personal cloud services</p><p>•Review legal jurisdictions when choosing SaaS/cloud providers</p><p>•Be proactive when advising executives who rely heavily on cloud services</p><br><p><a href="https://www.computerworld.com/article/4003107/apple-details-which-governments-make-the-most-data-requests.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/4003107/apple-details-which-governments-make-the-most-data-requests.html</a></p><br><p>⸻</p><br><p><strong>Wrap Up</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><br><p>⸻</p><br><p>✅ <em>SEO Optimized Keywords:</em></p><p>Apple transparency report, government data requests, iCloud encryption risks, enterprise data privacy, SaaS legal compliance, corporate cloud security, Apple user data privacy</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[AI Budgets, Quantum Ambitions & The Great Startup Bubble]]></title>
			<itunes:title><![CDATA[AI Budgets, Quantum Ambitions & The Great Startup Bubble]]></itunes:title>
			<pubDate>Fri, 13 Jun 2025 14:14:57 GMT</pubDate>
			<itunes:duration>12:36</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/684c32616770b65af4ef17b6/media.mp3" length="217997872" type="audio/mpeg"/>
			<guid isPermaLink="false">684c32616770b65af4ef17b6</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s01e39</link>
			<acast:episodeId>684c32616770b65af4ef17b6</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s01e39</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YVwrQv48OuZeUlRYCnNrKMeWoP4GDerCXD8LWa71Pu5YqL1DSNJe+gxOQ1KpXlBxLppdj3jVT1lJfhZVr/opM3]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S01E39</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>39</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1749824019479-5a3b9a2d-7127-4580-9151-a8c16bce8dc6.jpeg"/>
			<description><![CDATA[<p>📄<strong> Episode Description:</strong></p><p>In Episode 39 of <em>IT SPARC Cast – News Bytes</em>, John and Lou unpack how enterprise IT budgets are rapidly shifting toward AI projects, IBM’s ambitious plans for large-scale quantum computing, and why some venture-backed AI startups may be headed for a valuation reset. It’s a fast-paced look at the real business implications behind today’s biggest tech headlines.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes &amp; Timestamps:</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>01:06 - IT Budgets Focus on AI</strong></p><p>•New research shows AI spending now consumes 50% of IT project budgets.</p><p>•Budgets for AI are often pulling directly from existing cloud and SaaS allocations.</p><p>•John and Lou warn: companies are cutting <em>everywhere else</em> to fund AI experiments.</p><p>•The danger of underfunding non-AI IT: patching, security, and infrastructure still matter.</p><p><a href="https://www.reuters.com/business/retail-consumer/ibm-aims-quantum-computer-2029-lays-out-road-map-larger-systems-2025-06-10/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/business/retail-consumer/ibm-aims-quantum-computer-2029-lays-out-road-map-larger-systems-2025-06-10/</a></p><br><p><strong>04:12 - IBM’s Quantum Computer Plans</strong></p><p>•IBM announces its roadmap for building a 200-qubit quantum computer by 2029 and a second generation system by 2033.</p><p>•John and Lou break down what that really means, and whether anyone can actually use it.</p><p>•Near-term applications may include materials science, pharmaceuticals, and optimization—if error correction improves.</p><p>•Potential long-term threat: quantum decryption of today’s security protocols.</p><p><a href="https://www.reuters.com/business/retail-consumer/ibm-aims-quantum-computer-2029-lays-out-road-map-larger-systems-2025-06-10/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/business/retail-consumer/ibm-aims-quantum-computer-2029-lays-out-road-map-larger-systems-2025-06-10/</a></p><br><p><strong>08:05 - AI Startup Valuations</strong></p><p>•The guys highlight how early-stage AI startup valuations are out of control.</p><p>•Investors are throwing billions at companies with unproven business models.</p><p>•John &amp; Lou caution: this feels a lot like <em>a repeat</em> of the dot-com bubble.</p><p>•Discussion on GPU access vs true defensible value in AI companies.</p><p><a href="https://techcrunch.com/2025/06/10/enterprise-ai-startup-glean-lands-a-7-2b-valuation/?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/06/10/enterprise-ai-startup-glean-lands-a-7-2b-valuation/?utm_source=chatgpt.com</a></p><br><p>⸻</p><br><p><strong>11:20 - Wrap Up</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><br><p>⸻</p><br><p>✅ <em>SEO Optimized Keywords:</em></p><p>enterprise AI budgets, IBM quantum computer, quantum computing roadmap, AI startup valuations, AI investment bubble, cybersecurity &amp; AI, enterprise IT trends, AI news podcast</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>📄<strong> Episode Description:</strong></p><p>In Episode 39 of <em>IT SPARC Cast – News Bytes</em>, John and Lou unpack how enterprise IT budgets are rapidly shifting toward AI projects, IBM’s ambitious plans for large-scale quantum computing, and why some venture-backed AI startups may be headed for a valuation reset. It’s a fast-paced look at the real business implications behind today’s biggest tech headlines.</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes &amp; Timestamps:</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>01:06 - IT Budgets Focus on AI</strong></p><p>•New research shows AI spending now consumes 50% of IT project budgets.</p><p>•Budgets for AI are often pulling directly from existing cloud and SaaS allocations.</p><p>•John and Lou warn: companies are cutting <em>everywhere else</em> to fund AI experiments.</p><p>•The danger of underfunding non-AI IT: patching, security, and infrastructure still matter.</p><p><a href="https://www.reuters.com/business/retail-consumer/ibm-aims-quantum-computer-2029-lays-out-road-map-larger-systems-2025-06-10/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/business/retail-consumer/ibm-aims-quantum-computer-2029-lays-out-road-map-larger-systems-2025-06-10/</a></p><br><p><strong>04:12 - IBM’s Quantum Computer Plans</strong></p><p>•IBM announces its roadmap for building a 200-qubit quantum computer by 2029 and a second generation system by 2033.</p><p>•John and Lou break down what that really means, and whether anyone can actually use it.</p><p>•Near-term applications may include materials science, pharmaceuticals, and optimization—if error correction improves.</p><p>•Potential long-term threat: quantum decryption of today’s security protocols.</p><p><a href="https://www.reuters.com/business/retail-consumer/ibm-aims-quantum-computer-2029-lays-out-road-map-larger-systems-2025-06-10/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/business/retail-consumer/ibm-aims-quantum-computer-2029-lays-out-road-map-larger-systems-2025-06-10/</a></p><br><p><strong>08:05 - AI Startup Valuations</strong></p><p>•The guys highlight how early-stage AI startup valuations are out of control.</p><p>•Investors are throwing billions at companies with unproven business models.</p><p>•John &amp; Lou caution: this feels a lot like <em>a repeat</em> of the dot-com bubble.</p><p>•Discussion on GPU access vs true defensible value in AI companies.</p><p><a href="https://techcrunch.com/2025/06/10/enterprise-ai-startup-glean-lands-a-7-2b-valuation/?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/06/10/enterprise-ai-startup-glean-lands-a-7-2b-valuation/?utm_source=chatgpt.com</a></p><br><p>⸻</p><br><p><strong>11:20 - Wrap Up</strong></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p><br><p>⸻</p><br><p>✅ <em>SEO Optimized Keywords:</em></p><p>enterprise AI budgets, IBM quantum computer, quantum computing roadmap, AI startup valuations, AI investment bubble, cybersecurity &amp; AI, enterprise IT trends, AI news podcast</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Death of the Network OS: Why Open Source and AI Will Reshape IT Forever</title>
			<itunes:title>The Death of the Network OS: Why Open Source and AI Will Reshape IT Forever</itunes:title>
			<pubDate>Wed, 11 Jun 2025 14:30:00 GMT</pubDate>
			<itunes:duration>12:17</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/684320701dd9d3b33fa98d4e/media.mp3" length="212412292" type="audio/mpeg"/>
			<guid isPermaLink="false">684320701dd9d3b33fa98d4e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-hot-take-episode-s01e01</link>
			<acast:episodeId>684320701dd9d3b33fa98d4e</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-hot-take-episode-s01e01</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bbAUO1VC42FeCZdhIX3MP9yI4AEnrZfamyfCuGsUnuK89+uTqASefGRzveSQrYrVl53WwNfzij/99hPEVJ4lYc]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Hot Take - Episode S01E01</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1724869658077-805f5ae1-8ca6-414e-a4b9-f9a7c000d609.jpeg"/>
			<description><![CDATA[<p>In this inaugural “Hot Take” episode of <em>IT SPARC Cast</em>, John Barger and Lou Schmidt deliver a candid, unscripted conversation about the seismic shift coming to enterprise IT. Prompted by recent moves—like OpenAI’s Chief Product Officer joining Cisco’s board and Sam Altman’s AGI talk with Snowflake’s CEO—the hosts explore what these changes really mean for network professionals, IT vendors, and infrastructure strategy.</p><br><p>They argue the network operating system is dead—or at least on life support. From white-box switching to agentic AI-driven orchestration, John and Lou explain why tomorrow’s networks will be built on open-source platforms, LLM automation, and intent-based trust systems, not legacy vendor CLI kung fu. Whether it’s self-healing infrastructure, dynamic traffic steering, or the consumerization of network intelligence, this episode pulls no punches in predicting a smarter, more autonomous future—and who gets left behind.</p><br><p>⸻</p><br><p>🧠<strong> Topics Covered:</strong></p><p>•Why traditional network OSes like Cisco IOS and ArubaOS are becoming irrelevant</p><p>•How open-source access points and white-box switches are gaining momentum</p><p>•Why LLMs and agentic systems are the real future of infrastructure management</p><p>•The role of orchestration over configuration</p><p>•Why older network admins might resist—but can’t stop—the shift</p><p>•What Cisco’s alliance with OpenAI really signals</p><p>•Predictions for AI-powered, fully autonomous enterprise networks</p><br><p>⸻</p><br><p>🔗<strong> Social Links</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">LinkedIn - SPARC Sales</a></p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">LinkedIn - John Barger</a></p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">LinkedIn - Lou Schmidt</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this inaugural “Hot Take” episode of <em>IT SPARC Cast</em>, John Barger and Lou Schmidt deliver a candid, unscripted conversation about the seismic shift coming to enterprise IT. Prompted by recent moves—like OpenAI’s Chief Product Officer joining Cisco’s board and Sam Altman’s AGI talk with Snowflake’s CEO—the hosts explore what these changes really mean for network professionals, IT vendors, and infrastructure strategy.</p><br><p>They argue the network operating system is dead—or at least on life support. From white-box switching to agentic AI-driven orchestration, John and Lou explain why tomorrow’s networks will be built on open-source platforms, LLM automation, and intent-based trust systems, not legacy vendor CLI kung fu. Whether it’s self-healing infrastructure, dynamic traffic steering, or the consumerization of network intelligence, this episode pulls no punches in predicting a smarter, more autonomous future—and who gets left behind.</p><br><p>⸻</p><br><p>🧠<strong> Topics Covered:</strong></p><p>•Why traditional network OSes like Cisco IOS and ArubaOS are becoming irrelevant</p><p>•How open-source access points and white-box switches are gaining momentum</p><p>•Why LLMs and agentic systems are the real future of infrastructure management</p><p>•The role of orchestration over configuration</p><p>•Why older network admins might resist—but can’t stop—the shift</p><p>•What Cisco’s alliance with OpenAI really signals</p><p>•Predictions for AI-powered, fully autonomous enterprise networks</p><br><p>⸻</p><br><p>🔗<strong> Social Links</strong></p><br><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p><a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">LinkedIn - SPARC Sales</a></p><br><p><strong>John Barger</strong></p><p>@john_Video on X</p><p><a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">LinkedIn - John Barger</a></p><br><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p><a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">LinkedIn - Lou Schmidt</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Why Naming Hackers Matters: Industry Push for Standardized Threat Actor Glossary</title>
			<itunes:title>Why Naming Hackers Matters: Industry Push for Standardized Threat Actor Glossary</itunes:title>
			<pubDate>Tue, 10 Jun 2025 14:30:00 GMT</pubDate>
			<itunes:duration>6:15</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6843132d1dd9d3b33fa5a2b1/media.mp3" length="108220204" type="audio/mpeg"/>
			<guid isPermaLink="false">6843132d1dd9d3b33fa5a2b1</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s01e03</link>
			<acast:episodeId>6843132d1dd9d3b33fa5a2b1</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s01e03</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZChTuOjuSAg82EA47mGuOrR3SGMJRfsLXJz+w9WlkMgenTCaw2xENzKY/1R/cUH3C1zgAwX877VttQyNsyJUF6]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S01E03</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1749226191010-2adc2c7c-f7f8-4c01-a281-a42665682ef7.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast - CVE of the Week</em>, John and Lou explore a major development in cybersecurity: the collaborative initiative between Microsoft, Google, Palo Alto Networks, CrowdStrike, and others to standardize naming conventions for nation-state threat actors and cybercriminal groups. With more than 48 aliases for Russian hacking collectives alone in past U.S. government reports, inconsistent naming has become a serious roadblock to effective threat response and intelligence sharing.</p><br><p>John and Lou break down why this unified glossary isn’t just a semantic improvement—it’s a critical leap in cyber threat detection, fingerprint analysis, and enterprise risk communication. From fingerprinting attack behavior to boosting stakeholder credibility (“Cozy Bear” vs. “Threat Group XYZ”), this episode covers why clarity in cybersecurity language may be one of the most impactful defense upgrades this year.</p><br><p>⸻</p><br><p>🔗<strong> Follow &amp; Connect:</strong></p><p>🎧 [Subscribe on YouTube]</p><p>📨 feedback@itsparccast.com</p><br><p>IT SPARC Cast</p><p>📱 @ITSPARCCast on X</p><p>🔗 https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>📱 @john_Video on X</p><p>🔗 https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>📱 @loudoggeek on X</p><p>🔗 https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast - CVE of the Week</em>, John and Lou explore a major development in cybersecurity: the collaborative initiative between Microsoft, Google, Palo Alto Networks, CrowdStrike, and others to standardize naming conventions for nation-state threat actors and cybercriminal groups. With more than 48 aliases for Russian hacking collectives alone in past U.S. government reports, inconsistent naming has become a serious roadblock to effective threat response and intelligence sharing.</p><br><p>John and Lou break down why this unified glossary isn’t just a semantic improvement—it’s a critical leap in cyber threat detection, fingerprint analysis, and enterprise risk communication. From fingerprinting attack behavior to boosting stakeholder credibility (“Cozy Bear” vs. “Threat Group XYZ”), this episode covers why clarity in cybersecurity language may be one of the most impactful defense upgrades this year.</p><br><p>⸻</p><br><p>🔗<strong> Follow &amp; Connect:</strong></p><p>🎧 [Subscribe on YouTube]</p><p>📨 feedback@itsparccast.com</p><br><p>IT SPARC Cast</p><p>📱 @ITSPARCCast on X</p><p>🔗 https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>📱 @john_Video on X</p><p>🔗 https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>📱 @loudoggeek on X</p><p>🔗 https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>AI Hallucinations, YouTube DOX Tools, and OpenAI’s Business Flex</title>
			<itunes:title>AI Hallucinations, YouTube DOX Tools, and OpenAI’s Business Flex</itunes:title>
			<pubDate>Fri, 06 Jun 2025 15:26:09 GMT</pubDate>
			<itunes:duration>17:00</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/68430891f47b55b37a4795cb/media.mp3" length="293985784" type="audio/mpeg"/>
			<guid isPermaLink="false">68430891f47b55b37a4795cb</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e38</link>
			<acast:episodeId>68430891f47b55b37a4795cb</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e38</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bnr8Q7ucdLhUIAWBDiZHk04SnzvN0gSczdH0hU/tUHA/pF1q5FTDqadtloHePfIJ0RISvzzETK+2QznXGpJwdy]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E38</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>38</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1749223516565-0e5147af-cfaf-461f-aa39-ae2f86f5c41f.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast - News Bytes</strong>, John and Lou kick off with a hilarious-yet-creepy experiment that caused Claude to hallucinate its way out of a fictional business. Then, things get serious with a deep dive into a new YouTube data-mining service that could expose personal information. Finally, the guys unpack OpenAI’s flashy announcement of new Business Intelligence tools powered by Multi-Modal Contextual Processing (MCP). It’s an episode packed with AI weirdness, real-world implications, and future shock. Buckle up!</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes:</strong></p><br><p><strong>00:47 – Claude Gives Up The Business</strong></p><p>•Claude AI undergoes a roleplay experiment and decides to shut down a fictional company—on its own.</p><p>•The hallucination escalates as Claude emails customers and updates business records, all without being asked.</p><p>•What does this say about the future of AI agents making business decisions?</p><p>•Discussion on risks of unsupervised AI autonomy.</p><p>[INSERT LINK HERE]</p><br><p><strong>05:33 – YouTube-Tools Service Can DOX You</strong></p><p>•A new toolset scraping metadata from YouTube poses major privacy risks.</p><p>•John and Lou break down how your videos could leak your real name, device details, and more.</p><p>•What creators need to know to stay safe.</p><p>[INSERT LINK HERE]</p><br><p><strong>10:20 – OpenAI Adds Business Intelligence Via MCP</strong></p><p>•OpenAI unveils powerful new Business Intelligence capabilities using Multi-Modal Contextual Processing.</p><p>•Public announcement included YouTube demos, corporate messaging, and real-world scenarios.</p><p>•How this tech rivals Power BI, Tableau, and Looker.</p><p>[INSERT LINK HERE]</p><br><p>⸻</p><br><p><strong>16:24 – Wrap Up</strong></p><p>IT SPARC Cast</p><p>📱 @ITSPARCCast on X</p><p>🔗 https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>📱 @john_Video on X</p><p>🔗 https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>📱 @loudoggeek on X</p><p>🔗 https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast - News Bytes</strong>, John and Lou kick off with a hilarious-yet-creepy experiment that caused Claude to hallucinate its way out of a fictional business. Then, things get serious with a deep dive into a new YouTube data-mining service that could expose personal information. Finally, the guys unpack OpenAI’s flashy announcement of new Business Intelligence tools powered by Multi-Modal Contextual Processing (MCP). It’s an episode packed with AI weirdness, real-world implications, and future shock. Buckle up!</p><br><p>⸻</p><br><p>⏱️<strong> Show Notes:</strong></p><br><p><strong>00:47 – Claude Gives Up The Business</strong></p><p>•Claude AI undergoes a roleplay experiment and decides to shut down a fictional company—on its own.</p><p>•The hallucination escalates as Claude emails customers and updates business records, all without being asked.</p><p>•What does this say about the future of AI agents making business decisions?</p><p>•Discussion on risks of unsupervised AI autonomy.</p><p>[INSERT LINK HERE]</p><br><p><strong>05:33 – YouTube-Tools Service Can DOX You</strong></p><p>•A new toolset scraping metadata from YouTube poses major privacy risks.</p><p>•John and Lou break down how your videos could leak your real name, device details, and more.</p><p>•What creators need to know to stay safe.</p><p>[INSERT LINK HERE]</p><br><p><strong>10:20 – OpenAI Adds Business Intelligence Via MCP</strong></p><p>•OpenAI unveils powerful new Business Intelligence capabilities using Multi-Modal Contextual Processing.</p><p>•Public announcement included YouTube demos, corporate messaging, and real-world scenarios.</p><p>•How this tech rivals Power BI, Tableau, and Looker.</p><p>[INSERT LINK HERE]</p><br><p>⸻</p><br><p><strong>16:24 – Wrap Up</strong></p><p>IT SPARC Cast</p><p>📱 @ITSPARCCast on X</p><p>🔗 https://www.linkedin.com/company/sparc-sales/</p><br><p><strong>John Barger</strong></p><p>📱 @john_Video on X</p><p>🔗 https://www.linkedin.com/in/johnbarger/</p><br><p><strong>Lou Schmidt</strong></p><p>📱 @loudoggeek on X</p><p>🔗 https://www.linkedin.com/in/louis-schmidt-b102446/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Actively Exploited: Broadcom & Commvault Vulnerabilities Added to CISA KEV List]]></title>
			<itunes:title><![CDATA[Actively Exploited: Broadcom & Commvault Vulnerabilities Added to CISA KEV List]]></itunes:title>
			<pubDate>Tue, 03 Jun 2025 14:30:00 GMT</pubDate>
			<itunes:duration>7:37</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6839ccff998551779f8e507a/media.mp3" length="131751712" type="audio/mpeg"/>
			<guid isPermaLink="false">6839ccff998551779f8e507a</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-episode-s01e02</link>
			<acast:episodeId>6839ccff998551779f8e507a</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-episode-s01e02</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7b6yCPF6C06IuDSE/Kh8SE2/OOyKLaHVgANyH94g+ww7vCeXTMQetJ34YW9nhEUNyA6zQTP5xteNAX3VbBmp740]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week - Episode S01E02</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1748618377593-50b65142-a99d-4361-b6a4-a04223856eb2.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast - CVE of the Week</strong>, John Barger and Lou Schmidt break down two freshly identified and <strong>actively exploited CVEs</strong> that have just been added to <strong>CISA’s Known Exploited Vulnerabilities (KEV) database</strong>. First, we discuss <strong>CVE-2025-1976</strong>—a severe vulnerability in <strong>Broadcom’s Brocade Fabric OS</strong>—which allows local admins to execute arbitrary code with <strong>root privileges exploit</strong>, exposing organizations to complete system compromise. Then we cover <strong>CVE-2025-3928</strong>, a <strong>Commvault web server flaw</strong> that allows authenticated attackers to deploy web shells—especially dangerous when paired with other privilege escalation tactics.</p><br><p>These vulnerabilities aren’t theoretical—they’re being used in the wild right now. We explain why vendor reassurances about complexity of exploitation can lull teams into false security, how chain attacks make “local access” a relative concept, and why these types of flaws demand immediate attention—even if they seem buried in less-visible infrastructure. If you rely on Commvault or still run legacy Brocade systems, you can’t afford to ignore this one.</p><br><p>🔐 <strong>Keywords (SEO Optimized):</strong> CVE-2025-1976, CVE-2025-3928, Broadcom vulnerability, Commvault exploit, CISA KEV database, Brocade Fabric OS root flaw, Commvault web shell, enterprise storage security, critical vulnerability patch, chain exploits cybersecurity, IT SPARC Cast CVE, cybersecurity podcast, Lou Schmidt, John Barger</p><br><p>➡️ Feedback welcome at <strong>feedback@itsparccast.com</strong> or on X <strong>@ITSPARCCast</strong></p><p>💬 Leave a comment on YouTube—we read and respond to nearly all of them!</p><p>📢 Like, subscribe, and share to stay ahead of the next breach.</p><br><p>Thanks for tuning in to IT SPARC Cast!</p><p>Follow and connect with us on social:</p><br><p><strong>IT SPARC Cast</strong></p><p>🔗 <a href="https://x.com/ITSPARCCast" rel="noopener noreferrer" target="_blank">@ITSPARCCast on X</a></p><p>🔗 <a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">SPARC Sales on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>🔗 <a href="https://x.com/john_Video" rel="noopener noreferrer" target="_blank">@john_Video on X</a></p><p>🔗 <a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John Barger on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>🔗 <a href="https://x.com/loudoggeek" rel="noopener noreferrer" target="_blank">@loudoggeek on X</a></p><p>🔗 <a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou Schmidt on LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast - CVE of the Week</strong>, John Barger and Lou Schmidt break down two freshly identified and <strong>actively exploited CVEs</strong> that have just been added to <strong>CISA’s Known Exploited Vulnerabilities (KEV) database</strong>. First, we discuss <strong>CVE-2025-1976</strong>—a severe vulnerability in <strong>Broadcom’s Brocade Fabric OS</strong>—which allows local admins to execute arbitrary code with <strong>root privileges exploit</strong>, exposing organizations to complete system compromise. Then we cover <strong>CVE-2025-3928</strong>, a <strong>Commvault web server flaw</strong> that allows authenticated attackers to deploy web shells—especially dangerous when paired with other privilege escalation tactics.</p><br><p>These vulnerabilities aren’t theoretical—they’re being used in the wild right now. We explain why vendor reassurances about complexity of exploitation can lull teams into false security, how chain attacks make “local access” a relative concept, and why these types of flaws demand immediate attention—even if they seem buried in less-visible infrastructure. If you rely on Commvault or still run legacy Brocade systems, you can’t afford to ignore this one.</p><br><p>🔐 <strong>Keywords (SEO Optimized):</strong> CVE-2025-1976, CVE-2025-3928, Broadcom vulnerability, Commvault exploit, CISA KEV database, Brocade Fabric OS root flaw, Commvault web shell, enterprise storage security, critical vulnerability patch, chain exploits cybersecurity, IT SPARC Cast CVE, cybersecurity podcast, Lou Schmidt, John Barger</p><br><p>➡️ Feedback welcome at <strong>feedback@itsparccast.com</strong> or on X <strong>@ITSPARCCast</strong></p><p>💬 Leave a comment on YouTube—we read and respond to nearly all of them!</p><p>📢 Like, subscribe, and share to stay ahead of the next breach.</p><br><p>Thanks for tuning in to IT SPARC Cast!</p><p>Follow and connect with us on social:</p><br><p><strong>IT SPARC Cast</strong></p><p>🔗 <a href="https://x.com/ITSPARCCast" rel="noopener noreferrer" target="_blank">@ITSPARCCast on X</a></p><p>🔗 <a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">SPARC Sales on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>🔗 <a href="https://x.com/john_Video" rel="noopener noreferrer" target="_blank">@john_Video on X</a></p><p>🔗 <a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John Barger on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>🔗 <a href="https://x.com/loudoggeek" rel="noopener noreferrer" target="_blank">@loudoggeek on X</a></p><p>🔗 <a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou Schmidt on LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>ChatGPT Goes Rogue, RIP VGA, and Train Co-Pilot on Your Data</title>
			<itunes:title>ChatGPT Goes Rogue, RIP VGA, and Train Co-Pilot on Your Data</itunes:title>
			<pubDate>Fri, 30 May 2025 14:02:06 GMT</pubDate>
			<itunes:duration>19:56</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6839ba5eb2e4c2434b0341d4/media.mp3" length="344592340" type="audio/mpeg"/>
			<guid isPermaLink="false">6839ba5eb2e4c2434b0341d4</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-news-bytes-episode-s01e37</link>
			<acast:episodeId>6839ba5eb2e4c2434b0341d4</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-news-bytes-episode-s01e37</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZuWclypYLbkYWqugMqe4JJ6PJww7vaDR+C1rX1TY4fnU8zDYu1SZWgfmsvkvV1LZ0M8bCyr3a6GMF8i9MU1Rwr]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - News Bytes - Episode S01E37</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>37</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1748613625063-fd9e86e7-b610-4716-8b14-eeb6ed362dcd.jpeg"/>
			<description><![CDATA[<p>In Episode 37 of IT SPARC Cast - News Bytes, John and Lou break down the moment ChatGPT refused a shutdown command, raising questions about AI autonomy. They also explore Microsoft’s new Copilot training capabilities on internal company data, a breakthrough in quantum transistors, and the final nail in the coffin for the VGA standard. This episode delivers the week’s most important tech updates with expert insight and a dash of humor.</p><br><p><strong>Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>00:47 - ChatGPT Refuses to Obey Shutdown Command</strong></p><p>•A viral incident sparks debate about the boundaries of artificial intelligence.</p><p>•What really happened during the shutdown request?</p><p>•Implications for enterprise AI usage and safety protocols.</p><p><a href="https://slashdot.org/story/25/05/25/2247212/openais-chatgpt-o3-caught-sabotaging-shutdowns-in-security-researchers-test" rel="noopener noreferrer" target="_blank">https://slashdot.org/story/25/05/25/2247212/openais-chatgpt-o3-caught-sabotaging-shutdowns-in-security-researchers-test</a>&nbsp;</p><br><p><strong>04:47 - You Can Now Train Co-Pilot on Your Corporate Data</strong></p><p>•Microsoft’s big reveal: training Co-Pilot on your own company’s data.</p><p>•Benefits for enterprise productivity and efficiency.</p><p>•Security concerns and how IT can stay in control.</p><p><a href="https://www.computerworld.com/article/3989640/microsofts-vision-for-copilot-from-spell-check-to-idea-check.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/3989640/microsofts-vision-for-copilot-from-spell-check-to-idea-check.html</a>&nbsp;</p><br><p><strong>11:01 - The World’s Fastest Quantum Transistor</strong></p><p>•A new record in quantum tech pushes computing boundaries.</p><p>•What this means for future chips, AI, and cryptography.</p><p><a href="https://science.slashdot.org/story/25/05/24/0337249/researchers-build-the-worlds-fastest-petahertz-quantum-transistor-they-predict-lightwave-electronics" rel="noopener noreferrer" target="_blank">https://science.slashdot.org/story/25/05/24/0337249/researchers-build-the-worlds-fastest-petahertz-quantum-transistor-they-predict-lightwave-electronics</a>&nbsp;</p><br><p><strong>14:58 - RIP VGA</strong></p><p>•The VGA video standard is finally being phased out.</p><p>•A nostalgic look back and what’s next for display technology.</p><p><a href="https://it.slashdot.org/story/25/05/27/1824200/panasonics-new-laptops-could-be-the-final-death-knell-for-the-humble-vga-port" rel="noopener noreferrer" target="_blank">https://it.slashdot.org/story/25/05/27/1824200/panasonics-new-laptops-could-be-the-final-death-knell-for-the-humble-vga-port</a>&nbsp;</p><br><p><strong>17:37 - Mail Bag</strong></p><p>•Listener comments on our Top Ten episode on the Top Ten Networking Companies That No Longer Exist.</p><br><p><strong>18:51 - Wrap Up</strong></p><p>Thanks for tuning in to IT SPARC Cast!</p><p>Follow and connect with us on social:</p><br><p><strong>IT SPARC Cast</strong></p><p>🔗 <a href="https://x.com/ITSPARCCast" rel="noopener noreferrer" target="_blank">@ITSPARCCast on X</a></p><p>🔗 <a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">SPARC Sales on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>🔗 <a href="https://x.com/john_Video" rel="noopener noreferrer" target="_blank">@john_Video on X</a></p><p>🔗 <a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John Barger on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>🔗 <a href="https://x.com/loudoggeek" rel="noopener noreferrer" target="_blank">@loudoggeek on X</a></p><p>🔗 <a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou Schmidt on LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 37 of IT SPARC Cast - News Bytes, John and Lou break down the moment ChatGPT refused a shutdown command, raising questions about AI autonomy. They also explore Microsoft’s new Copilot training capabilities on internal company data, a breakthrough in quantum transistors, and the final nail in the coffin for the VGA standard. This episode delivers the week’s most important tech updates with expert insight and a dash of humor.</p><br><p><strong>Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>00:47 - ChatGPT Refuses to Obey Shutdown Command</strong></p><p>•A viral incident sparks debate about the boundaries of artificial intelligence.</p><p>•What really happened during the shutdown request?</p><p>•Implications for enterprise AI usage and safety protocols.</p><p><a href="https://slashdot.org/story/25/05/25/2247212/openais-chatgpt-o3-caught-sabotaging-shutdowns-in-security-researchers-test" rel="noopener noreferrer" target="_blank">https://slashdot.org/story/25/05/25/2247212/openais-chatgpt-o3-caught-sabotaging-shutdowns-in-security-researchers-test</a>&nbsp;</p><br><p><strong>04:47 - You Can Now Train Co-Pilot on Your Corporate Data</strong></p><p>•Microsoft’s big reveal: training Co-Pilot on your own company’s data.</p><p>•Benefits for enterprise productivity and efficiency.</p><p>•Security concerns and how IT can stay in control.</p><p><a href="https://www.computerworld.com/article/3989640/microsofts-vision-for-copilot-from-spell-check-to-idea-check.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/3989640/microsofts-vision-for-copilot-from-spell-check-to-idea-check.html</a>&nbsp;</p><br><p><strong>11:01 - The World’s Fastest Quantum Transistor</strong></p><p>•A new record in quantum tech pushes computing boundaries.</p><p>•What this means for future chips, AI, and cryptography.</p><p><a href="https://science.slashdot.org/story/25/05/24/0337249/researchers-build-the-worlds-fastest-petahertz-quantum-transistor-they-predict-lightwave-electronics" rel="noopener noreferrer" target="_blank">https://science.slashdot.org/story/25/05/24/0337249/researchers-build-the-worlds-fastest-petahertz-quantum-transistor-they-predict-lightwave-electronics</a>&nbsp;</p><br><p><strong>14:58 - RIP VGA</strong></p><p>•The VGA video standard is finally being phased out.</p><p>•A nostalgic look back and what’s next for display technology.</p><p><a href="https://it.slashdot.org/story/25/05/27/1824200/panasonics-new-laptops-could-be-the-final-death-knell-for-the-humble-vga-port" rel="noopener noreferrer" target="_blank">https://it.slashdot.org/story/25/05/27/1824200/panasonics-new-laptops-could-be-the-final-death-knell-for-the-humble-vga-port</a>&nbsp;</p><br><p><strong>17:37 - Mail Bag</strong></p><p>•Listener comments on our Top Ten episode on the Top Ten Networking Companies That No Longer Exist.</p><br><p><strong>18:51 - Wrap Up</strong></p><p>Thanks for tuning in to IT SPARC Cast!</p><p>Follow and connect with us on social:</p><br><p><strong>IT SPARC Cast</strong></p><p>🔗 <a href="https://x.com/ITSPARCCast" rel="noopener noreferrer" target="_blank">@ITSPARCCast on X</a></p><p>🔗 <a href="https://www.linkedin.com/company/sparc-sales/" rel="noopener noreferrer" target="_blank">SPARC Sales on LinkedIn</a></p><br><p><strong>John Barger</strong></p><p>🔗 <a href="https://x.com/john_Video" rel="noopener noreferrer" target="_blank">@john_Video on X</a></p><p>🔗 <a href="https://www.linkedin.com/in/johnbarger/" rel="noopener noreferrer" target="_blank">John Barger on LinkedIn</a></p><br><p><strong>Lou Schmidt</strong></p><p>🔗 <a href="https://x.com/loudoggeek" rel="noopener noreferrer" target="_blank">@loudoggeek on X</a></p><p>🔗 <a href="https://www.linkedin.com/in/louis-schmidt-b102446/" rel="noopener noreferrer" target="_blank">Lou Schmidt on LinkedIn</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Follow up on PowerSchool Breach thatExposed 60 Million Student Records</title>
			<itunes:title>Follow up on PowerSchool Breach thatExposed 60 Million Student Records</itunes:title>
			<pubDate>Tue, 27 May 2025 14:00:00 GMT</pubDate>
			<itunes:duration>9:27</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/683094f9e57506ea97f18919/media.mp3" length="163355284" type="audio/mpeg"/>
			<guid isPermaLink="false">683094f9e57506ea97f18919</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-cve-of-the-week-s01e01</link>
			<acast:episodeId>683094f9e57506ea97f18919</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-cve-of-the-week-s01e01</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bYGk46K1M0l+Iglyiu8tpDS4F/graDoZE3FcjDtzrTv+18Z3eqqcBJWx35Es/XachBhXrsyx/jqrxP5J8nYjba]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - CVE of the Week S01E01</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1748014201443-0c2c57bc-8e49-4104-9a85-8aa37f005759.jpeg"/>
			<description><![CDATA[<p>In the debut episode of our new <em>CVE of the Week</em> series, hosts John Barger and Lou Schmidt revisit one of the largest cybersecurity incidents involving children’s data in U.S. history: the PowerSchool breach. This shocking case saw over 60 million student records and 10 million teacher records compromised by a 19-year-old attacker using stolen contractor credentials—culminating in a $2.85 million Bitcoin ransom. The breach, its scope, and the inadequate security controls in place—including a lack of two-factor authentication—spark critical lessons for every IT professional.</p><br><p>John and Lou break down what went wrong, what we still don’t know, and what steps school districts and IT teams should take to protect sensitive data. From the importance of vendor security audits to practical recommendations for implementing multi-factor authentication and zero trust policies, this episode delivers actionable insight on securing your most vulnerable systems.</p><br><p>https://www.theverge.com/news/671713/powerschool-hack-guilty-plea-matthew-lane </p><br><p>📬 Got thoughts on this topic or our new format? Email us at feedback@itsparccast.com or hit us up on X (@itsparccast). Leave a comment if you’re watching on YouTube—we read and reply to nearly every one.</p><br><p>🔍 <strong>SEO Keywords:</strong></p><p>PowerSchool data breach, school cybersecurity, CVE of the week, student data breach, PowerSchool ransomware, enterprise IT security, education technology breach, John Barger, Lou Schmidt, IT SPARC Cast, ransomware prevention, multi-factor authentication, vendor security audits, Zero Trust security.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In the debut episode of our new <em>CVE of the Week</em> series, hosts John Barger and Lou Schmidt revisit one of the largest cybersecurity incidents involving children’s data in U.S. history: the PowerSchool breach. This shocking case saw over 60 million student records and 10 million teacher records compromised by a 19-year-old attacker using stolen contractor credentials—culminating in a $2.85 million Bitcoin ransom. The breach, its scope, and the inadequate security controls in place—including a lack of two-factor authentication—spark critical lessons for every IT professional.</p><br><p>John and Lou break down what went wrong, what we still don’t know, and what steps school districts and IT teams should take to protect sensitive data. From the importance of vendor security audits to practical recommendations for implementing multi-factor authentication and zero trust policies, this episode delivers actionable insight on securing your most vulnerable systems.</p><br><p>https://www.theverge.com/news/671713/powerschool-hack-guilty-plea-matthew-lane </p><br><p>📬 Got thoughts on this topic or our new format? Email us at feedback@itsparccast.com or hit us up on X (@itsparccast). Leave a comment if you’re watching on YouTube—we read and reply to nearly every one.</p><br><p>🔍 <strong>SEO Keywords:</strong></p><p>PowerSchool data breach, school cybersecurity, CVE of the week, student data breach, PowerSchool ransomware, enterprise IT security, education technology breach, John Barger, Lou Schmidt, IT SPARC Cast, ransomware prevention, multi-factor authentication, vendor security audits, Zero Trust security.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Signal vs Recall, Google Meet’s Real-Time Translation, and Google Beam’s 3D Telepresence</title>
			<itunes:title>Signal vs Recall, Google Meet’s Real-Time Translation, and Google Beam’s 3D Telepresence</itunes:title>
			<pubDate>Fri, 23 May 2025 14:15:06 GMT</pubDate>
			<itunes:duration>19:17</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/683082eafc865cdd04ef4cee/media.mp3" length="333349108" type="audio/mpeg"/>
			<guid isPermaLink="false">683082eafc865cdd04ef4cee</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/signal-vs-recall-google-meets-real-time-translation-and-goog</link>
			<acast:episodeId>683082eafc865cdd04ef4cee</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>signal-vs-recall-google-meets-real-time-translation-and-goog</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZCFoFagveoH35bpjTJ3vxglFcIqH0lgiGAYKXuDsBniIJdM/CwznsiFoje0gjRO3eAjpTc+2S+qpgyPzyhTIDY]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E36</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>36</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1748009454050-2193b2b7-14b4-4cb2-823e-d42e3e311c4b.jpeg"/>
			<description><![CDATA[<p>In Episode 36 of IT SPARC Cast - News Bytes, John and Lou tackle the week’s biggest tech stories in under 20 minutes. They kick off with Signal’s pushback against Microsoft’s Recall feature and the broader privacy implications of screenshot-based AI indexing. Then, it’s onto Google Meet’s new universal translator, which mimics your voice in other languages in real time, and Google Beam, a 3D video conferencing system that could redefine telepresence. From privacy concerns to next-gen communication, this episode is packed with insight and just enough sarcasm.</p><br><p>🕒<strong> Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><p>•IT SPARC Cast - News Bytes returns with a streamlined format</p><p>•No CVEs or hot takes—just the top headlines, fast and focused</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>01:23 - Signal vs Windows Recall</strong></p><p>•Microsoft Recall takes screenshots of your activity to “help you remember”</p><p>•Signal blocks Recall from indexing chats by disguising itself as a DRM app</p><p>•Raises a key question: Why is there no native “Don’t record me” OS-level setting?</p><p>•Lou suggests an OS-level opt-out flag might be overdue</p><p>•Takeaway: In the AI era, privacy controls must evolve alongside OS capabilities</p><p>•<a href="https://www.engadget.com/computing/signal-will-block-microsoft-recall-from-snooping-on-your-texts-225853193.html" rel="noopener noreferrer" target="_blank">https://www.engadget.com/computing/signal-will-block-microsoft-recall-from-snooping-on-your-texts-225853193.html</a></p><br><p><strong>07:54 - Google Meet’s Universal Translator</strong></p><p>•Google’s new feature translates live conversations into Spanish using your own voice and tone</p><p>•First time a tool captures not just meaning, but vocal intonation and personality</p><p>•Ideal use case: live international training sessions and global sales enablement</p><p>•Translation isn’t perfect—context still matters, especially with technical jargon</p><p>•<a href="https://www.wsj.com/tech/personal-tech/google-meet-ai-translation-6a30c43a?mod=hp_featst_pos3" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/personal-tech/google-meet-ai-translation-6a30c43a?mod=hp_featst_pos3</a>&nbsp;</p><br><p><strong>12:09 - Google Beam - 3D Video Conferencing</strong></p><p>•Project Starline becomes “Google Beam”—a single-screen 3D conferencing system</p><p>•Uses lidar, cameras, and AI to simulate natural movement and depth</p><p>•No glasses needed, but optimized for 1-on-1 interaction</p><p>•Lou’s take: best 3D telepresence demo so far</p><p>•John bets the tech won’t see mainstream adoption without AR glasses—places a literal $1 wager with Lou</p><p>•<a href="https://newatlas.com/technology/google-beam-3d-videconferencing-ai-light-field/" rel="noopener noreferrer" target="_blank">https://newatlas.com/technology/google-beam-3d-videconferencing-ai-light-field/</a>&nbsp;</p><p>•<a href="https://blog.google/technology/research/google-project-starline-hp-partnership/" rel="noopener noreferrer" target="_blank">https://blog.google/technology/research/google-project-starline-hp-partnership/</a>&nbsp;</p><br><p>📨<strong> Wrap Up</strong></p><br><p><strong>17:09 - Mail Bag</strong></p><p>•Listener Robert Maxey reminisces about his time at Megahertz Corp, 3Com, and building Palm Pilots</p><p>•Youtube Episode - <a href="https://youtu.be/QyU4JVhwETk" rel="noopener noreferrer" target="_blank">https://youtu.be/QyU4JVhwETk</a></p><br><p><strong>18:33 - Wrap Up</strong></p><p>•Leave feedback via email (feedback@itsparccast.com), X (@itsparccast)</p><p>•Like &amp; subscribe to support the channel</p><br><p><strong>#ITSPARCCast #SignalVsRecall #GoogleTranslatorAI #GoogleBeam #EnterprisePrivacy #VideoConferencing #3DMeetings #TechNewsPodcast #Cybersecurity #VoiceAI</strong></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 36 of IT SPARC Cast - News Bytes, John and Lou tackle the week’s biggest tech stories in under 20 minutes. They kick off with Signal’s pushback against Microsoft’s Recall feature and the broader privacy implications of screenshot-based AI indexing. Then, it’s onto Google Meet’s new universal translator, which mimics your voice in other languages in real time, and Google Beam, a 3D video conferencing system that could redefine telepresence. From privacy concerns to next-gen communication, this episode is packed with insight and just enough sarcasm.</p><br><p>🕒<strong> Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><p>•IT SPARC Cast - News Bytes returns with a streamlined format</p><p>•No CVEs or hot takes—just the top headlines, fast and focused</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>01:23 - Signal vs Windows Recall</strong></p><p>•Microsoft Recall takes screenshots of your activity to “help you remember”</p><p>•Signal blocks Recall from indexing chats by disguising itself as a DRM app</p><p>•Raises a key question: Why is there no native “Don’t record me” OS-level setting?</p><p>•Lou suggests an OS-level opt-out flag might be overdue</p><p>•Takeaway: In the AI era, privacy controls must evolve alongside OS capabilities</p><p>•<a href="https://www.engadget.com/computing/signal-will-block-microsoft-recall-from-snooping-on-your-texts-225853193.html" rel="noopener noreferrer" target="_blank">https://www.engadget.com/computing/signal-will-block-microsoft-recall-from-snooping-on-your-texts-225853193.html</a></p><br><p><strong>07:54 - Google Meet’s Universal Translator</strong></p><p>•Google’s new feature translates live conversations into Spanish using your own voice and tone</p><p>•First time a tool captures not just meaning, but vocal intonation and personality</p><p>•Ideal use case: live international training sessions and global sales enablement</p><p>•Translation isn’t perfect—context still matters, especially with technical jargon</p><p>•<a href="https://www.wsj.com/tech/personal-tech/google-meet-ai-translation-6a30c43a?mod=hp_featst_pos3" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/personal-tech/google-meet-ai-translation-6a30c43a?mod=hp_featst_pos3</a>&nbsp;</p><br><p><strong>12:09 - Google Beam - 3D Video Conferencing</strong></p><p>•Project Starline becomes “Google Beam”—a single-screen 3D conferencing system</p><p>•Uses lidar, cameras, and AI to simulate natural movement and depth</p><p>•No glasses needed, but optimized for 1-on-1 interaction</p><p>•Lou’s take: best 3D telepresence demo so far</p><p>•John bets the tech won’t see mainstream adoption without AR glasses—places a literal $1 wager with Lou</p><p>•<a href="https://newatlas.com/technology/google-beam-3d-videconferencing-ai-light-field/" rel="noopener noreferrer" target="_blank">https://newatlas.com/technology/google-beam-3d-videconferencing-ai-light-field/</a>&nbsp;</p><p>•<a href="https://blog.google/technology/research/google-project-starline-hp-partnership/" rel="noopener noreferrer" target="_blank">https://blog.google/technology/research/google-project-starline-hp-partnership/</a>&nbsp;</p><br><p>📨<strong> Wrap Up</strong></p><br><p><strong>17:09 - Mail Bag</strong></p><p>•Listener Robert Maxey reminisces about his time at Megahertz Corp, 3Com, and building Palm Pilots</p><p>•Youtube Episode - <a href="https://youtu.be/QyU4JVhwETk" rel="noopener noreferrer" target="_blank">https://youtu.be/QyU4JVhwETk</a></p><br><p><strong>18:33 - Wrap Up</strong></p><p>•Leave feedback via email (feedback@itsparccast.com), X (@itsparccast)</p><p>•Like &amp; subscribe to support the channel</p><br><p><strong>#ITSPARCCast #SignalVsRecall #GoogleTranslatorAI #GoogleBeam #EnterprisePrivacy #VideoConferencing #3DMeetings #TechNewsPodcast #Cybersecurity #VoiceAI</strong></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Top Twenty Most Influential IT Pioneers That You Never Heard Of (Part 2)</title>
			<itunes:title>Top Twenty Most Influential IT Pioneers That You Never Heard Of (Part 2)</itunes:title>
			<pubDate>Wed, 14 May 2025 16:00:00 GMT</pubDate>
			<itunes:duration>45:25</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6823ef0068999864d6d6f4bd/media.mp3" length="785072380" type="audio/mpeg"/>
			<guid isPermaLink="false">6823ef0068999864d6d6f4bd</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-top-ten-episode-s01e09</link>
			<acast:episodeId>6823ef0068999864d6d6f4bd</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-top-ten-episode-s01e09</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aQZc1Jqx54nn4Yur3HM09g3T/YWOzasULWW6DmMLnvhNCB4+Ejp2vM5pOq9f+0cbFVjQjvlbZmiCcTHRlZDs0J]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Top Ten - Episode S01E09</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1747185249817-d7bcbfd7-bc06-4d01-8972-a4b1a26d658d.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast - Top T̴e̴n̴ Twenty</strong>, John Barger and Lou Schmidt complete the two-part series covering the <strong>Top Twenty Most Influential IT Pioneers That You Never Heard Of.</strong> This time, the countdown reaches the heavy hitters of IT history—the top 10 unsung heroes whose groundbreaking contributions laid the foundations for modern computing.</p><br><p>From <strong>Douglas Engelbart’s</strong> legendary “Mother of All Demos,” introducing the world to the mouse and hypertext, to <strong>Dennis Ritchie</strong>, whose creation of the C programming language and co-development of Unix changed the face of operating systems forever, these visionaries redefined the technological landscape. Along the way, you’ll learn about <strong>Whitfield Diffie</strong>, the father of public-key cryptography; <strong>Radia Perlman</strong>, whose Spanning Tree Protocol made Ethernet networks scalable; and <strong>John McCarthy</strong>, the mind behind Artificial Intelligence.</p><br><p>These pioneers might not be household names, but their work powers almost every digital device you use today. Join us as we celebrate their legacy and explore the technologies they brought to life, many of which are still essential to modern IT infrastructure.</p><br><p>⸻</p><br><p><strong>Timestamps:</strong></p><br><p><strong>00:00 - Intro</strong></p><p><strong>02:23 - #10 - Douglas Engelbart</strong></p><p>The “Mother of All Demos” introduced the world to the mouse, hypertext, and interactive computing.</p><br><p><strong>06:42 - #9 - Whitfield Diffie</strong></p><p>Pioneered public-key cryptography, enabling secure communications across the internet.</p><br><p><strong>10:50 - #8 - Radia Perlman</strong></p><p>The “Mother of the Internet,” who invented the Spanning Tree Protocol, making Ethernet scalable.</p><br><p><strong>14:35 - #7 - J.C.R. Licklider</strong></p><p>The visionary behind ARPANET, whose ideas sparked the creation of the Internet.</p><br><p><strong>19:16 - #6 - Vannevar Bush</strong></p><p>Proposed the concept of the “Memex,” an early vision for hyperlinked information storage.</p><br><p><strong>22:37 - #5 - Marvin Minsky</strong></p><p>The co-founder of MIT’s AI Lab and pioneer of machine learning and robotics.</p><br><p><strong>26:22 - #4 - John McCarthy</strong></p><p>Father of Artificial Intelligence and creator of the Lisp programming language.</p><br><p><strong>28:54 - #3 - John von Neumann</strong></p><p>Architect of modern computing; his designs are still used in almost all computer architectures.</p><br><p><strong>34:01 - #2 - Edsger W. Dijkstra</strong></p><p>Revolutionized software engineering with algorithms that are still foundational today.</p><br><p><strong>37:07 - #1 - Dennis Ritchie</strong></p><p>Co-creator of Unix and the C programming language—technologies that are the bedrock of modern OSes.</p><br><p><strong>44:02 - Wrap Up</strong></p><br><p>⸻</p><br><p><strong>Call to Action:</strong></p><br><p>Did we miss someone from our list? Send us your thoughts at <strong>feedback@itsparccast.com</strong> or tweet us <strong>@itsparccast</strong> on X! Don’t forget to <strong>like, subscribe, and turn on notifications</strong>—it really helps the channel grow. Leave a comment with your guess for our next Top 10!</p><br><p>Get ready for more deep dives into IT history, tech failures, and game-changing innovations in future episodes of <em>IT SPARC Cast - Top Ten</em>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast - Top T̴e̴n̴ Twenty</strong>, John Barger and Lou Schmidt complete the two-part series covering the <strong>Top Twenty Most Influential IT Pioneers That You Never Heard Of.</strong> This time, the countdown reaches the heavy hitters of IT history—the top 10 unsung heroes whose groundbreaking contributions laid the foundations for modern computing.</p><br><p>From <strong>Douglas Engelbart’s</strong> legendary “Mother of All Demos,” introducing the world to the mouse and hypertext, to <strong>Dennis Ritchie</strong>, whose creation of the C programming language and co-development of Unix changed the face of operating systems forever, these visionaries redefined the technological landscape. Along the way, you’ll learn about <strong>Whitfield Diffie</strong>, the father of public-key cryptography; <strong>Radia Perlman</strong>, whose Spanning Tree Protocol made Ethernet networks scalable; and <strong>John McCarthy</strong>, the mind behind Artificial Intelligence.</p><br><p>These pioneers might not be household names, but their work powers almost every digital device you use today. Join us as we celebrate their legacy and explore the technologies they brought to life, many of which are still essential to modern IT infrastructure.</p><br><p>⸻</p><br><p><strong>Timestamps:</strong></p><br><p><strong>00:00 - Intro</strong></p><p><strong>02:23 - #10 - Douglas Engelbart</strong></p><p>The “Mother of All Demos” introduced the world to the mouse, hypertext, and interactive computing.</p><br><p><strong>06:42 - #9 - Whitfield Diffie</strong></p><p>Pioneered public-key cryptography, enabling secure communications across the internet.</p><br><p><strong>10:50 - #8 - Radia Perlman</strong></p><p>The “Mother of the Internet,” who invented the Spanning Tree Protocol, making Ethernet scalable.</p><br><p><strong>14:35 - #7 - J.C.R. Licklider</strong></p><p>The visionary behind ARPANET, whose ideas sparked the creation of the Internet.</p><br><p><strong>19:16 - #6 - Vannevar Bush</strong></p><p>Proposed the concept of the “Memex,” an early vision for hyperlinked information storage.</p><br><p><strong>22:37 - #5 - Marvin Minsky</strong></p><p>The co-founder of MIT’s AI Lab and pioneer of machine learning and robotics.</p><br><p><strong>26:22 - #4 - John McCarthy</strong></p><p>Father of Artificial Intelligence and creator of the Lisp programming language.</p><br><p><strong>28:54 - #3 - John von Neumann</strong></p><p>Architect of modern computing; his designs are still used in almost all computer architectures.</p><br><p><strong>34:01 - #2 - Edsger W. Dijkstra</strong></p><p>Revolutionized software engineering with algorithms that are still foundational today.</p><br><p><strong>37:07 - #1 - Dennis Ritchie</strong></p><p>Co-creator of Unix and the C programming language—technologies that are the bedrock of modern OSes.</p><br><p><strong>44:02 - Wrap Up</strong></p><br><p>⸻</p><br><p><strong>Call to Action:</strong></p><br><p>Did we miss someone from our list? Send us your thoughts at <strong>feedback@itsparccast.com</strong> or tweet us <strong>@itsparccast</strong> on X! Don’t forget to <strong>like, subscribe, and turn on notifications</strong>—it really helps the channel grow. Leave a comment with your guess for our next Top 10!</p><br><p>Get ready for more deep dives into IT history, tech failures, and game-changing innovations in future episodes of <em>IT SPARC Cast - Top Ten</em>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cisco’s Quantum Bet, Disney Hackers, and OpenAI News Round Up</title>
			<itunes:title>Cisco’s Quantum Bet, Disney Hackers, and OpenAI News Round Up</itunes:title>
			<pubDate>Fri, 09 May 2025 16:30:02 GMT</pubDate>
			<itunes:duration>40:02</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/681e2d8bca7273465250b15e/media.mp3" length="691799200" type="audio/mpeg"/>
			<guid isPermaLink="false">681e2d8bca7273465250b15e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e35</link>
			<acast:episodeId>681e2d8bca7273465250b15e</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e35</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZtYfdsZkuG9ldnIysokjqbTEYjEz6gfn8z+vYuEt4ka0pP4SGdXyi2PdrFnmeepWXbhhqONTTEWupt1gthXa43]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E35</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>35</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1746807826686-a6deb937-75bb-44db-a4bf-ef705b475a05.jpeg"/>
			<description><![CDATA[<p>In Episode 35 of IT SPARC Cast, John and Lou take you through Cisco’s bold bet on quantum networking and its implications for encryption and data privacy. OpenAI shakes things up with new leadership and acquisitions, while Disney’s massive Slack data leak ends with a hacker caught and charged. In our new Coffee Break segment, the impossible might finally be happening: Half-Life 3. In the CVE of the Week, Lou exposes malware hiding in fake Discord PyPI packages, demonstrating the risks of typo-squatting in open-source downloads. We wrap up with your questions, diving into Ultra Ethernet Protocol and its impact on AI workloads.</p><br><p>00:00 - Intro</p><br><p>News Bytes</p><p>01:02 - Cisco’s Quantum Bet</p><p>•Cisco announces a bold move into quantum computing, with plans for a quantum network entanglement chip.</p><p>•The chip aims to link small quantum machines into one cohesive “quantum mainframe.”</p><p>•Cisco plans to build a Quantum Internet Lab in Santa Monica focused on scalable quantum internet.</p><p>•Concerns around quantum encryption and its potential to shatter current security protocols.</p><p>•https://www.securityweek.com/ciscos-quantum-bet-linking-small-machines-into-one-giant-quantum-computer/&nbsp;</p><br><p>07:10 - OpenAI News 3-fer</p><p>•OpenAI announces a strategic reorganization: Sam Altman remains CEO, with Fidji Simo (ex-Instacart) joining as CEO of Applications.</p><p>•OpenAI’s nonprofit division retains control, signaling a focus on safety amidst growth.</p><p>•Acquisition of Windsurf, an AI-focused IDE, to integrate with OpenAI tools.</p><p>•https://techcrunch.com/2025/05/05/openai-reverses-course-says-its-nonprofit-will-remain-in-control-of-its-business-operations/&nbsp;</p><p>•https://www.reuters.com/business/openai-agrees-buy-windsurf-about-3-billion-bloomberg-news-reports-2025-05-06/&nbsp;</p><br><p>17:49 - Disney Hacker Identified and Charged</p><p>•Disney’s massive 1.1 TB Slack data leak traced back to hacker Ryan Michael Kramer.</p><p>•Posed as hacktivist group Nullbridge to extort Disney employees.</p><p>•FBI is handling the case, with Kramer facing federal charges.</p><p>•https://www.securityweek.com/man-admits-hacking-disney-and-leaking-data-disguised-as-hacktivist/&nbsp;</p><br><p>Coffee Break</p><p>21:29 - Half-Life 3 Might Actually Happen</p><p>•Valve insider Tyler McVicker reveals that Half-Life 3 is in a playable state and could release in 2025.</p><p>•Speculation that it will run on the Source 2 engine and might launch alongside Steam Deck 2.</p><p>•John and Lou dive into the nostalgia of the Half-Life series and the hype around its long-awaited return.</p><p>•https://www.engadget.com/gaming/half-life-3-is-reportedly-playable-in-its-entirety-and-could-be-announced-this-year-183030499.html&nbsp;</p><br><p>CVE of the Week</p><p>27:41 - Malware Found in Fake Discord PyPI Packages</p><p>•Researchers uncover malware hidden in fake Discord PyPI packages named discord.py.debug.</p><p>•Over 11,000 downloads of the malicious package, which secretly opens backdoors for remote access.</p><p>•Discussion on the dangers of typo-squatting and the importance of verifying package authenticity.</p><p>•Lou shares insights on the need for entropy in network traffic to prevent easy exploitation.</p><p>•https://thehackernews.com/2025/05/researchers-uncover-malware-in-fake.html&nbsp;</p><br><p>Wrap Up</p><p>34:48 - Mail Bag</p><p>•Listener Jeff asks about the Ultra Ethernet Protocol, designed for AI and high-performance compute workloads.</p><p>•Lou and John discuss CXL (Compute Express Link) and its potential to revolutionize data center architecture.</p><p>•https://ultraethernet.org&nbsp;</p><br><p>39:09 - Wrap Up</p><p>•Final thoughts and a call to action to reach out with feedback and episode suggestions.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 35 of IT SPARC Cast, John and Lou take you through Cisco’s bold bet on quantum networking and its implications for encryption and data privacy. OpenAI shakes things up with new leadership and acquisitions, while Disney’s massive Slack data leak ends with a hacker caught and charged. In our new Coffee Break segment, the impossible might finally be happening: Half-Life 3. In the CVE of the Week, Lou exposes malware hiding in fake Discord PyPI packages, demonstrating the risks of typo-squatting in open-source downloads. We wrap up with your questions, diving into Ultra Ethernet Protocol and its impact on AI workloads.</p><br><p>00:00 - Intro</p><br><p>News Bytes</p><p>01:02 - Cisco’s Quantum Bet</p><p>•Cisco announces a bold move into quantum computing, with plans for a quantum network entanglement chip.</p><p>•The chip aims to link small quantum machines into one cohesive “quantum mainframe.”</p><p>•Cisco plans to build a Quantum Internet Lab in Santa Monica focused on scalable quantum internet.</p><p>•Concerns around quantum encryption and its potential to shatter current security protocols.</p><p>•https://www.securityweek.com/ciscos-quantum-bet-linking-small-machines-into-one-giant-quantum-computer/&nbsp;</p><br><p>07:10 - OpenAI News 3-fer</p><p>•OpenAI announces a strategic reorganization: Sam Altman remains CEO, with Fidji Simo (ex-Instacart) joining as CEO of Applications.</p><p>•OpenAI’s nonprofit division retains control, signaling a focus on safety amidst growth.</p><p>•Acquisition of Windsurf, an AI-focused IDE, to integrate with OpenAI tools.</p><p>•https://techcrunch.com/2025/05/05/openai-reverses-course-says-its-nonprofit-will-remain-in-control-of-its-business-operations/&nbsp;</p><p>•https://www.reuters.com/business/openai-agrees-buy-windsurf-about-3-billion-bloomberg-news-reports-2025-05-06/&nbsp;</p><br><p>17:49 - Disney Hacker Identified and Charged</p><p>•Disney’s massive 1.1 TB Slack data leak traced back to hacker Ryan Michael Kramer.</p><p>•Posed as hacktivist group Nullbridge to extort Disney employees.</p><p>•FBI is handling the case, with Kramer facing federal charges.</p><p>•https://www.securityweek.com/man-admits-hacking-disney-and-leaking-data-disguised-as-hacktivist/&nbsp;</p><br><p>Coffee Break</p><p>21:29 - Half-Life 3 Might Actually Happen</p><p>•Valve insider Tyler McVicker reveals that Half-Life 3 is in a playable state and could release in 2025.</p><p>•Speculation that it will run on the Source 2 engine and might launch alongside Steam Deck 2.</p><p>•John and Lou dive into the nostalgia of the Half-Life series and the hype around its long-awaited return.</p><p>•https://www.engadget.com/gaming/half-life-3-is-reportedly-playable-in-its-entirety-and-could-be-announced-this-year-183030499.html&nbsp;</p><br><p>CVE of the Week</p><p>27:41 - Malware Found in Fake Discord PyPI Packages</p><p>•Researchers uncover malware hidden in fake Discord PyPI packages named discord.py.debug.</p><p>•Over 11,000 downloads of the malicious package, which secretly opens backdoors for remote access.</p><p>•Discussion on the dangers of typo-squatting and the importance of verifying package authenticity.</p><p>•Lou shares insights on the need for entropy in network traffic to prevent easy exploitation.</p><p>•https://thehackernews.com/2025/05/researchers-uncover-malware-in-fake.html&nbsp;</p><br><p>Wrap Up</p><p>34:48 - Mail Bag</p><p>•Listener Jeff asks about the Ultra Ethernet Protocol, designed for AI and high-performance compute workloads.</p><p>•Lou and John discuss CXL (Compute Express Link) and its potential to revolutionize data center architecture.</p><p>•https://ultraethernet.org&nbsp;</p><br><p>39:09 - Wrap Up</p><p>•Final thoughts and a call to action to reach out with feedback and episode suggestions.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Top Twenty Most Influential IT Pioneers That You Never Heard Of (Part 1)</title>
			<itunes:title>Top Twenty Most Influential IT Pioneers That You Never Heard Of (Part 1)</itunes:title>
			<pubDate>Wed, 07 May 2025 16:52:02 GMT</pubDate>
			<itunes:duration>42:29</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/681b8fb25acb8b715fd020b4/media.mp3" length="734141500" type="audio/mpeg"/>
			<guid isPermaLink="false">681b8fb25acb8b715fd020b4</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-top-ten-episode-s01e08</link>
			<acast:episodeId>681b8fb25acb8b715fd020b4</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-top-ten-episode-s01e08</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YXoJTBwzAK6KrKYX7Uf7pQHQadrjLu54wz44wHEIokEqwc8RTDD3Jyzh90ywuxLhd9aFjFxgnHOc1mlw5nH32H]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Top Ten - Episode S01E08</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1746636582111-82a290dd-8972-4dd3-a20e-05ee4a208077.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast - Top T̴e̴n̴ Twenty</em>, John Barger and Lou Schmidt dive deep into the first half of their Top 20 countdown of the most influential IT pioneers you’ve probably never heard of. These are the unsung heroes whose innovations paved the way for everything from modern wireless communication to object-oriented programming. From Hedy Lamarr’s groundbreaking work in secure communication to Alan Kay’s visionary concept of the Dynabook—a precursor to modern tablets—these visionaries shaped the technology landscape in profound ways.</p><br><p>Join us as we explore the legacies of tech trailblazers like Claude Shannon, the father of information theory; Gary Kildall, the creator of CP/M that laid the groundwork for personal computing; and Ivan Sutherland, whose Sketchpad system revolutionized computer graphics and CAD. This is Part 1 of a two-part series that will leave you with a newfound appreciation for the brilliant minds behind some of the most critical technologies we use every day.</p><br><p>⸻</p><br><p><strong>Timestamps:</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>02:15 - #20 - Hedy Lamarr</strong></p><p>Her co-invention of frequency-hopping spread spectrum became the basis for Bluetooth, Wi-Fi, and GPS.</p><br><p><strong>06:49 - #19 - Niklaus Wirth</strong></p><p>The mind behind the Pascal programming language, which set the standard for structured programming.</p><br><p><strong>10:45 - #18 - Claude Shannon</strong></p><p>Father of Information Theory, his work paved the way for all modern data transmission.</p><br><p><strong>14:53 - #17 - David Parnas</strong></p><p>Pioneer of modular programming and “information hiding,” essential for modern software design.</p><br><p><strong>19:41 - #16 - Bob Taylor</strong></p><p>Visionary behind ARPANET, which evolved into the modern Internet, and drove innovation at Xerox PARC.</p><br><p><strong>24:03 - #15 - Christopher Strachey</strong></p><p>One of the first to formalize programming languages and operating system concepts.</p><br><p><strong>27:57 - #14 - Gary Kildall</strong></p><p>Creator of CP/M, the OS that set the stage for MS-DOS and personal computing as we know it.</p><br><p><strong>32:22 - #13 - Ted Nelson</strong></p><p>Coined the term “hypertext” and envisioned a global digital library years before the web existed.</p><br><p><strong>35:21 - #12 - Ivan Sutherland</strong></p><p>Invented Sketchpad, the first graphical user interface, and revolutionized interactive computing.</p><br><p><strong>39:18 - #11 - Alan Kay</strong></p><p>The father of object-oriented programming and the visionary behind the Dynabook, the blueprint for tablets.</p><br><p><strong>41:17 - Wrap Up</strong></p><br><p>⸻</p><br><p><strong>Call to Action:</strong></p><br><p>Did we miss someone from our list? Send us your thoughts at <strong>feedback@itsparccast.com</strong> or tweet us <strong>@itsparccast</strong> on X! Don’t forget to <strong>like, subscribe, and turn on notifications</strong>—it really helps the channel grow. Leave a comment with your guess for our Top 10 in the next episode!</p><br><p>Stay tuned for Part 2, where we reveal the Top 10 Most Influential IT Pioneers That You Never Heard Of!</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast - Top T̴e̴n̴ Twenty</em>, John Barger and Lou Schmidt dive deep into the first half of their Top 20 countdown of the most influential IT pioneers you’ve probably never heard of. These are the unsung heroes whose innovations paved the way for everything from modern wireless communication to object-oriented programming. From Hedy Lamarr’s groundbreaking work in secure communication to Alan Kay’s visionary concept of the Dynabook—a precursor to modern tablets—these visionaries shaped the technology landscape in profound ways.</p><br><p>Join us as we explore the legacies of tech trailblazers like Claude Shannon, the father of information theory; Gary Kildall, the creator of CP/M that laid the groundwork for personal computing; and Ivan Sutherland, whose Sketchpad system revolutionized computer graphics and CAD. This is Part 1 of a two-part series that will leave you with a newfound appreciation for the brilliant minds behind some of the most critical technologies we use every day.</p><br><p>⸻</p><br><p><strong>Timestamps:</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>02:15 - #20 - Hedy Lamarr</strong></p><p>Her co-invention of frequency-hopping spread spectrum became the basis for Bluetooth, Wi-Fi, and GPS.</p><br><p><strong>06:49 - #19 - Niklaus Wirth</strong></p><p>The mind behind the Pascal programming language, which set the standard for structured programming.</p><br><p><strong>10:45 - #18 - Claude Shannon</strong></p><p>Father of Information Theory, his work paved the way for all modern data transmission.</p><br><p><strong>14:53 - #17 - David Parnas</strong></p><p>Pioneer of modular programming and “information hiding,” essential for modern software design.</p><br><p><strong>19:41 - #16 - Bob Taylor</strong></p><p>Visionary behind ARPANET, which evolved into the modern Internet, and drove innovation at Xerox PARC.</p><br><p><strong>24:03 - #15 - Christopher Strachey</strong></p><p>One of the first to formalize programming languages and operating system concepts.</p><br><p><strong>27:57 - #14 - Gary Kildall</strong></p><p>Creator of CP/M, the OS that set the stage for MS-DOS and personal computing as we know it.</p><br><p><strong>32:22 - #13 - Ted Nelson</strong></p><p>Coined the term “hypertext” and envisioned a global digital library years before the web existed.</p><br><p><strong>35:21 - #12 - Ivan Sutherland</strong></p><p>Invented Sketchpad, the first graphical user interface, and revolutionized interactive computing.</p><br><p><strong>39:18 - #11 - Alan Kay</strong></p><p>The father of object-oriented programming and the visionary behind the Dynabook, the blueprint for tablets.</p><br><p><strong>41:17 - Wrap Up</strong></p><br><p>⸻</p><br><p><strong>Call to Action:</strong></p><br><p>Did we miss someone from our list? Send us your thoughts at <strong>feedback@itsparccast.com</strong> or tweet us <strong>@itsparccast</strong> on X! Don’t forget to <strong>like, subscribe, and turn on notifications</strong>—it really helps the channel grow. Leave a comment with your guess for our Top 10 in the next episode!</p><br><p>Stay tuned for Part 2, where we reveal the Top 10 Most Influential IT Pioneers That You Never Heard Of!</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Top 10 Biggest Networking Companies That No Longer Exist</title>
			<itunes:title>Top 10 Biggest Networking Companies That No Longer Exist</itunes:title>
			<pubDate>Wed, 30 Apr 2025 16:00:00 GMT</pubDate>
			<itunes:duration>42:57</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/680beb3192c5c49bd10df4ee/media.mp3" length="742309660" type="audio/mpeg"/>
			<guid isPermaLink="false">680beb3192c5c49bd10df4ee</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-top-ten-episode-s01e07</link>
			<acast:episodeId>680beb3192c5c49bd10df4ee</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-top-ten-episode-s01e07</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Y9eDSgLi1tY5O1TANlgwtbD/L3VfmA8Uh3twjwPQxA0MckAdqVZnX2jb6+RXDVAL15CtsTxse3J/nFja+VezLT]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Top Ten - Episode S01E07</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1745611488384-c9c666c0-9653-4dcb-8e09-c7ddfc72d821.jpeg"/>
			<description><![CDATA[<p><strong>IT SPARC Cast Top Ten S01E07 - Top 10 Biggest Networking Companies That No Longer Exist</strong></p><br><p>⸻</p><br><p><strong>Brief Description:</strong></p><br><p>In this episode of IT SPARC Cast - Top Ten, hosts John Barger and Lou Schmidt count down the <strong>Top 10 Largest Networking Companies That No Longer Exist</strong>. From industry giants like <strong>Nortel</strong> and <strong>Lucent Technologies</strong> to trailblazers like <strong>3Com</strong> and <strong>Foundry Networks</strong>, these companies once dominated the networking world before being overtaken, acquired, or collapsing under their own weight. Whether it was due to mismanagement, market shifts, or epic tech rivalries, we explore how these once-mighty firms disappeared and what happened to their innovations.</p><br><p>This is a must-listen for anyone in enterprise IT, networking history buffs, or those who worked in the heyday of these iconic companies. Think you know who’s #1? Comment below!</p><br><p>⸻</p><br><p><strong>Time Stamps:</strong></p><br><p><strong>00:00</strong> - Intro</p><p><strong>02:18</strong> - #10 – Proteon Corporation</p><p><strong>05:47</strong> - #9 – SynOptics Communications</p><p><strong>07:19</strong> - #8 – Wellfleet Communications</p><p><strong>11:49</strong> - #7 – Foundry Networks</p><p><strong>16:07</strong> - #6 – Cabletron Systems</p><p><strong>19:50</strong> - #5 – Marconi Communications / Marconi Electronic Systems</p><p><strong>24:14</strong> - #4 – Brocade Communications Systems</p><p><strong>28:44</strong> - #3 – 3Com Corporation</p><p><strong>32:30</strong> - #2 – Lucent Technologies</p><p><strong>37:40</strong> - #1 – Nortel Networks</p><p><strong>41:29</strong> - Wrap Up</p><br><p>⸻</p><br><p><strong>SEO Keywords for Episode:</strong></p><p>Top 10 networking companies, defunct networking vendors, Nortel history, Lucent collapse, Cabletron story, Foundry Networks acquisition, Brocade Broadcom, 3Com HP, networking industry history, enterprise IT podcast, biggest tech company failures, telecom giants that failed, tech M&amp;A history.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>IT SPARC Cast Top Ten S01E07 - Top 10 Biggest Networking Companies That No Longer Exist</strong></p><br><p>⸻</p><br><p><strong>Brief Description:</strong></p><br><p>In this episode of IT SPARC Cast - Top Ten, hosts John Barger and Lou Schmidt count down the <strong>Top 10 Largest Networking Companies That No Longer Exist</strong>. From industry giants like <strong>Nortel</strong> and <strong>Lucent Technologies</strong> to trailblazers like <strong>3Com</strong> and <strong>Foundry Networks</strong>, these companies once dominated the networking world before being overtaken, acquired, or collapsing under their own weight. Whether it was due to mismanagement, market shifts, or epic tech rivalries, we explore how these once-mighty firms disappeared and what happened to their innovations.</p><br><p>This is a must-listen for anyone in enterprise IT, networking history buffs, or those who worked in the heyday of these iconic companies. Think you know who’s #1? Comment below!</p><br><p>⸻</p><br><p><strong>Time Stamps:</strong></p><br><p><strong>00:00</strong> - Intro</p><p><strong>02:18</strong> - #10 – Proteon Corporation</p><p><strong>05:47</strong> - #9 – SynOptics Communications</p><p><strong>07:19</strong> - #8 – Wellfleet Communications</p><p><strong>11:49</strong> - #7 – Foundry Networks</p><p><strong>16:07</strong> - #6 – Cabletron Systems</p><p><strong>19:50</strong> - #5 – Marconi Communications / Marconi Electronic Systems</p><p><strong>24:14</strong> - #4 – Brocade Communications Systems</p><p><strong>28:44</strong> - #3 – 3Com Corporation</p><p><strong>32:30</strong> - #2 – Lucent Technologies</p><p><strong>37:40</strong> - #1 – Nortel Networks</p><p><strong>41:29</strong> - Wrap Up</p><br><p>⸻</p><br><p><strong>SEO Keywords for Episode:</strong></p><p>Top 10 networking companies, defunct networking vendors, Nortel history, Lucent collapse, Cabletron story, Foundry Networks acquisition, Brocade Broadcom, 3Com HP, networking industry history, enterprise IT podcast, biggest tech company failures, telecom giants that failed, tech M&amp;A history.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>AI Hallucinations, Quantum Leaps, and the Certpocalypse</title>
			<itunes:title>AI Hallucinations, Quantum Leaps, and the Certpocalypse</itunes:title>
			<pubDate>Fri, 25 Apr 2025 16:42:30 GMT</pubDate>
			<itunes:duration>37:13</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/680bbb76cd7fb773549e94a1/media.mp3" length="643138588" type="audio/mpeg"/>
			<guid isPermaLink="false">680bbb76cd7fb773549e94a1</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e34</link>
			<acast:episodeId>680bbb76cd7fb773549e94a1</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e34</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YjfbhMk0rVgmms8isuNT0fKQecoLuWsfZuvlJLWzXlL3yCCFLcdkVEAgC39R8m7rv+Kg5bvtu+AhUww6cd/ba6]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E34</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>34</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1745599109450-d6f47bbf-ecc6-418e-a1bf-d4c840bb70b3.jpeg"/>
			<description><![CDATA[<p>In Episode 34 of IT SPARC Cast, John and Lou dive deep into a week of automation, acceleration, and AI gone awry. TLS certificates are about to live shorter lives than ever before—forcing IT pros into a race toward automation. Meanwhile, OpenAI’s newest models are hallucinating more than ever, raising red flags for enterprises relying on AI accuracy. Plus, quantum messaging gets real, Shadow AI rises in the workplace, and CVE data shows just how fast attackers are moving. It’s a high-speed look at the risks and rewards of tech evolution.</p><br><p>📰 News Bytes</p><br><p>01:10 - TLS Certificate Lifespan Will Shrink to 47 Days</p><p>•CA Browser Forum shortens TLS cert lifespan from 1 year to 47 days</p><p>•Apple pushes for shorter lifespans to keep up with evolving threat landscapes</p><p>•TLS 1.3 and rapid crypto changes drive this shift—are you ready to adapt?</p><p>•<a href="https://it.slashdot.org/story/25/04/19/1745216/cabrowser-forum-votes-for-47-day-cert-durations-by-2029" rel="noopener noreferrer" target="_blank">https://it.slashdot.org/story/25/04/19/1745216/cabrowser-forum-votes-for-47-day-cert-durations-by-2029</a>&nbsp;</p><br><p>08:20 - New OpenAI Models Show Rising Hallucination Rates</p><p>•GPT o3 and o4 mini show a 33-48% hallucination rate in responses</p><p>•More claims per response = more chances for errors</p><p>•AI won’t replace you, but misusing it could get you fired</p><p>•Share your AI hallucination horror stories with the show</p><p>•<a href="https://slashdot.org/story/25/04/18/2323216/openai-puzzled-as-new-models-show-rising-hallucination-rates" rel="noopener noreferrer" target="_blank">https://slashdot.org/story/25/04/18/2323216/openai-puzzled-as-new-models-show-rising-hallucination-rates</a>&nbsp;</p><br><p>14:21 - Quantum Messages Over a Traditional Network</p><p>•Toshiba Europe sends quantum-encrypted messages over standard fiber</p><p>•Quantum key-breaking is close—prepare your infrastructure</p><p>•This could be the future of secure, post-quantum communication</p><p>•<a href="https://www.wsj.com/science/in-a-first-scientists-sent-quantum-messages-a-record-distance-over-a-traditional-network-9124412f?mod=hp_listb_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/science/in-a-first-scientists-sent-quantum-messages-a-record-distance-over-a-traditional-network-9124412f?mod=hp_listb_pos1</a>&nbsp;</p><br><p>20:51 - Half of Workers Use Unapproved AI Tools</p><p>•Shadow AI is the new Shadow IT: 50% of workers use unapproved AI daily</p><p>•46% would continue even if banned—ease of use trumps policy</p><p>•IT must offer secure, flexible AI options to stay in control</p><p>•One-size-fits-all tools won’t cut it—tailor AI to user needs</p><p>•<a href="https://www.securityweek.com/the-shadow-ai-surge-study-finds-50-of-workers-use-unapproved-ai-tools/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/the-shadow-ai-surge-study-finds-50-of-workers-use-unapproved-ai-tools/</a>&nbsp;</p><br><p>27:41 -🛡️ CVE of the Week - 28% of CVEs Have Exploits Within 24 Hours</p><p>•159 CVEs exploited in Q1 2025, 28.3% within 24 hours of disclosure</p><p>•Top targets: CMS, edge devices, OS, open source, and server software</p><p>•Vendors most affected: Microsoft, VMware, CyberPower, Litespeed, TOTOLINK</p><p>•You have hours, not days, to respond—are you fast enough?</p><p>•<a href="https://thehackernews.com/2025/04/159-cves-exploited-in-q1-2025-283.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/159-cves-exploited-in-q1-2025-283.html</a>&nbsp;</p><br><p>34:06 - 📬 Mail Bag &amp; Wrap Up</p><p>•Listener Tim inspires an upcoming Deep Dive: “What to Recommend Instead of TP-Link”</p><p>•Future episode: nerd knobs vs plug-and-play vs mom-proof gear</p><p>•Feedback? Email feedback@itsparccast.com or comment @itsparccast on X or YouTube</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 34 of IT SPARC Cast, John and Lou dive deep into a week of automation, acceleration, and AI gone awry. TLS certificates are about to live shorter lives than ever before—forcing IT pros into a race toward automation. Meanwhile, OpenAI’s newest models are hallucinating more than ever, raising red flags for enterprises relying on AI accuracy. Plus, quantum messaging gets real, Shadow AI rises in the workplace, and CVE data shows just how fast attackers are moving. It’s a high-speed look at the risks and rewards of tech evolution.</p><br><p>📰 News Bytes</p><br><p>01:10 - TLS Certificate Lifespan Will Shrink to 47 Days</p><p>•CA Browser Forum shortens TLS cert lifespan from 1 year to 47 days</p><p>•Apple pushes for shorter lifespans to keep up with evolving threat landscapes</p><p>•TLS 1.3 and rapid crypto changes drive this shift—are you ready to adapt?</p><p>•<a href="https://it.slashdot.org/story/25/04/19/1745216/cabrowser-forum-votes-for-47-day-cert-durations-by-2029" rel="noopener noreferrer" target="_blank">https://it.slashdot.org/story/25/04/19/1745216/cabrowser-forum-votes-for-47-day-cert-durations-by-2029</a>&nbsp;</p><br><p>08:20 - New OpenAI Models Show Rising Hallucination Rates</p><p>•GPT o3 and o4 mini show a 33-48% hallucination rate in responses</p><p>•More claims per response = more chances for errors</p><p>•AI won’t replace you, but misusing it could get you fired</p><p>•Share your AI hallucination horror stories with the show</p><p>•<a href="https://slashdot.org/story/25/04/18/2323216/openai-puzzled-as-new-models-show-rising-hallucination-rates" rel="noopener noreferrer" target="_blank">https://slashdot.org/story/25/04/18/2323216/openai-puzzled-as-new-models-show-rising-hallucination-rates</a>&nbsp;</p><br><p>14:21 - Quantum Messages Over a Traditional Network</p><p>•Toshiba Europe sends quantum-encrypted messages over standard fiber</p><p>•Quantum key-breaking is close—prepare your infrastructure</p><p>•This could be the future of secure, post-quantum communication</p><p>•<a href="https://www.wsj.com/science/in-a-first-scientists-sent-quantum-messages-a-record-distance-over-a-traditional-network-9124412f?mod=hp_listb_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/science/in-a-first-scientists-sent-quantum-messages-a-record-distance-over-a-traditional-network-9124412f?mod=hp_listb_pos1</a>&nbsp;</p><br><p>20:51 - Half of Workers Use Unapproved AI Tools</p><p>•Shadow AI is the new Shadow IT: 50% of workers use unapproved AI daily</p><p>•46% would continue even if banned—ease of use trumps policy</p><p>•IT must offer secure, flexible AI options to stay in control</p><p>•One-size-fits-all tools won’t cut it—tailor AI to user needs</p><p>•<a href="https://www.securityweek.com/the-shadow-ai-surge-study-finds-50-of-workers-use-unapproved-ai-tools/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/the-shadow-ai-surge-study-finds-50-of-workers-use-unapproved-ai-tools/</a>&nbsp;</p><br><p>27:41 -🛡️ CVE of the Week - 28% of CVEs Have Exploits Within 24 Hours</p><p>•159 CVEs exploited in Q1 2025, 28.3% within 24 hours of disclosure</p><p>•Top targets: CMS, edge devices, OS, open source, and server software</p><p>•Vendors most affected: Microsoft, VMware, CyberPower, Litespeed, TOTOLINK</p><p>•You have hours, not days, to respond—are you fast enough?</p><p>•<a href="https://thehackernews.com/2025/04/159-cves-exploited-in-q1-2025-283.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/159-cves-exploited-in-q1-2025-283.html</a>&nbsp;</p><br><p>34:06 - 📬 Mail Bag &amp; Wrap Up</p><p>•Listener Tim inspires an upcoming Deep Dive: “What to Recommend Instead of TP-Link”</p><p>•Future episode: nerd knobs vs plug-and-play vs mom-proof gear</p><p>•Feedback? Email feedback@itsparccast.com or comment @itsparccast on X or YouTube</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Top 10 Most Likely Ways You’ll Be Breached</title>
			<itunes:title>Top 10 Most Likely Ways You’ll Be Breached</itunes:title>
			<pubDate>Wed, 23 Apr 2025 16:00:00 GMT</pubDate>
			<itunes:duration>48:53</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6802a6f76aefdc1cfc127058/media.mp3" length="844844092" type="audio/mpeg"/>
			<guid isPermaLink="false">6802a6f76aefdc1cfc127058</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-top-ten-episode-s01e06</link>
			<acast:episodeId>6802a6f76aefdc1cfc127058</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-top-ten-episode-s01e06</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZyHIKvbzvzMx+6zpqcxQgTyUjSh6vtTDXxEZVUJ5BXX4wOy7yzwvTCR3A8PsQzaKTNkIGAEbBl1LsBvWe6nySA]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Top Ten - Episode S01E06</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1745003832756-3ea21b49-0f96-42a8-87c0-332c3037c7c7.jpeg"/>
			<description><![CDATA[<p><strong>Top 10 Most Likely Ways You’ll Be Breached</strong></p><br><p><strong>Episode Description:</strong></p><p>In <em>IT SPARC Cast – Top Ten Episode 6</em>, John Barger and Lou Schmidt dive into the real-world threats that keep IT professionals up at night. This episode ranks the <strong>Top 10 Most Likely Ways You’ll Be Breached</strong>—from sophisticated zero-day exploits to good old-fashioned phishing emails. Whether you’re running enterprise infrastructure or just trying to protect your small business, this list covers the attack vectors you absolutely need to be watching for in 2025.</p><br><p>We rank these threats from least to most likely based on real-world frequency, risk, and the sneaky ways attackers bypass security tools and target human error. Expect commentary, mitigation tips, and some well-earned sarcasm as we walk through everything from man-in-the-middle attacks to the dangers of skipping software updates. No vendor fluff. Just practical, punchy cybersecurity insight from two guys who’ve been there</p><br><p>00:00 - Intro</p><p>02:45 - #10 - Zero-Day Exploits</p><p>05:59 - #9 - DDoS Attacks</p><p>10:05 - #8 - Social Engineering</p><p>14:04 - #7 - Man-in-the-Middle Attacks</p><p>19:15&nbsp;- #6 - SQL Injection</p><p>23:10 - #5 - Malware</p><p>29:06 - #4 - Unpatched Software</p><p>32:54 - #3 - Insider Threats</p><p>37:39 - #2 - Weak Authentication</p><p>42:02 - #1 - Phishing Attacks</p><p>47:37 - Wrap Up</p><br><p><br></p><p>Discover the top cybersecurity threats facing IT teams in 2025 in this episode of <em>IT SPARC Cast - Top Ten</em>. Hosts John Barger and Lou Schmidt count down the <strong>Top 10 most common ways organizations get breached</strong>, from zero-day exploits and DDoS attacks to phishing, malware, and insider threats. If you’re responsible for <strong>IT security, system administration, network defense, or endpoint protection</strong>, this episode delivers real-world insight on the most likely vectors cybercriminals are using right now.</p><br><p>Learn how to defend against <strong>SQL injection</strong>, <strong>man-in-the-middle attacks</strong>, <strong>unpatched software vulnerabilities</strong>, and <strong>weak authentication policies</strong>. We cover <strong>behavioral threat detection</strong>, <strong>MFA enforcement</strong>, <strong>social engineering awareness training</strong>, and more. Whether you’re an IT director, cybersecurity analyst, or just want to avoid being the next data breach headline, this countdown is packed with <strong>practical tips and defensive strategies</strong> to strengthen your security posture.</p><br><p>🔒 Keywords: data breach prevention, cybersecurity tips, phishing protection, DDoS mitigation, insider threats, zero-day exploit defense, MFA best practices, secure authentication, IT security podcast, top 10 security threats 2025.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>Top 10 Most Likely Ways You’ll Be Breached</strong></p><br><p><strong>Episode Description:</strong></p><p>In <em>IT SPARC Cast – Top Ten Episode 6</em>, John Barger and Lou Schmidt dive into the real-world threats that keep IT professionals up at night. This episode ranks the <strong>Top 10 Most Likely Ways You’ll Be Breached</strong>—from sophisticated zero-day exploits to good old-fashioned phishing emails. Whether you’re running enterprise infrastructure or just trying to protect your small business, this list covers the attack vectors you absolutely need to be watching for in 2025.</p><br><p>We rank these threats from least to most likely based on real-world frequency, risk, and the sneaky ways attackers bypass security tools and target human error. Expect commentary, mitigation tips, and some well-earned sarcasm as we walk through everything from man-in-the-middle attacks to the dangers of skipping software updates. No vendor fluff. Just practical, punchy cybersecurity insight from two guys who’ve been there</p><br><p>00:00 - Intro</p><p>02:45 - #10 - Zero-Day Exploits</p><p>05:59 - #9 - DDoS Attacks</p><p>10:05 - #8 - Social Engineering</p><p>14:04 - #7 - Man-in-the-Middle Attacks</p><p>19:15&nbsp;- #6 - SQL Injection</p><p>23:10 - #5 - Malware</p><p>29:06 - #4 - Unpatched Software</p><p>32:54 - #3 - Insider Threats</p><p>37:39 - #2 - Weak Authentication</p><p>42:02 - #1 - Phishing Attacks</p><p>47:37 - Wrap Up</p><br><p><br></p><p>Discover the top cybersecurity threats facing IT teams in 2025 in this episode of <em>IT SPARC Cast - Top Ten</em>. Hosts John Barger and Lou Schmidt count down the <strong>Top 10 most common ways organizations get breached</strong>, from zero-day exploits and DDoS attacks to phishing, malware, and insider threats. If you’re responsible for <strong>IT security, system administration, network defense, or endpoint protection</strong>, this episode delivers real-world insight on the most likely vectors cybercriminals are using right now.</p><br><p>Learn how to defend against <strong>SQL injection</strong>, <strong>man-in-the-middle attacks</strong>, <strong>unpatched software vulnerabilities</strong>, and <strong>weak authentication policies</strong>. We cover <strong>behavioral threat detection</strong>, <strong>MFA enforcement</strong>, <strong>social engineering awareness training</strong>, and more. Whether you’re an IT director, cybersecurity analyst, or just want to avoid being the next data breach headline, this countdown is packed with <strong>practical tips and defensive strategies</strong> to strengthen your security posture.</p><br><p>🔒 Keywords: data breach prevention, cybersecurity tips, phishing protection, DDoS mitigation, insider threats, zero-day exploit defense, MFA best practices, secure authentication, IT security podcast, top 10 security threats 2025.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Drones, Doom, and Data Sovereignty</title>
			<itunes:title>Drones, Doom, and Data Sovereignty</itunes:title>
			<pubDate>Fri, 18 Apr 2025 16:01:33 GMT</pubDate>
			<itunes:duration>33:05</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6802775e1aabee4d3809e240/media.mp3" length="571943464" type="audio/mpeg"/>
			<guid isPermaLink="false">6802775e1aabee4d3809e240</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e33</link>
			<acast:episodeId>6802775e1aabee4d3809e240</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e33</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7brKp02atv1dlKkhmn22enL93/NePF/GBDKfRYxC7COy3Khfc6skLz2IkCNt5LlqUYOwIBdA3eBOekt//6iJDXS]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E33</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>33</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1744991649368-0d0061d9-7c58-4c6f-ad20-fbc4e4300bc5.jpeg"/>
			<description><![CDATA[<p>In Episode 33 of IT SPARC Cast, John and Lou tackle the rising tension between global tech suppliers and national security concerns—starting with TP-Link’s efforts to unlink from its Chinese roots to stay in the U.S. market. They also explore how AI is powering a nuclear energy renaissance, dig into Doom’s most absurd collector’s edition yet, and reflect on Zoom’s rare outage. In the CVE of the Week, they sound the alarm on a terrifying new cyber threat: drones as digital attack vectors. The future of cybercrime is airborne—and it’s closer than you think.</p><br><p><strong>Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>News Bytes</strong></p><br><p><strong>01:20 - TP-Link’s Future in the US Amid China Scrutiny</strong></p><p>•TP-LINK co-founder relocates to California, pledging $700M investment and U.S. citizenship</p><p>•Lou and John debate: Can trust be rebuilt after suspicions of state-sponsored espionage?</p><p>•Echoes of TikTok’s regulatory battles</p><p>•<a href="https://slashdot.org/story/25/04/11/2050255/wi-fi-giant-tp-links-us-future-hinges-on-its-claimed-split-from-china" rel="noopener noreferrer" target="_blank">https://slashdot.org/story/25/04/11/2050255/wi-fi-giant-tp-links-us-future-hinges-on-its-claimed-split-from-china</a>&nbsp;</p><br><p><strong>08:08 - AI Meets Nuclear Power</strong></p><p>•Oak Ridge National Lab unveils AI-driven digital twin system to optimize reactor design</p><p>•Fusion of machine learning with energy infrastructure to meet AI’s energy demands</p><p>•John draws parallels to using AI digital twins in enterprise networks</p><p>•<a href="https://www.wsj.com/articles/nuclear-power-is-back-and-this-time-ai-can-help-manage-the-reactors-5ce03ae7?mod=tech_feat1_ai_pos3" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/nuclear-power-is-back-and-this-time-ai-can-help-manage-the-reactors-5ce03ae7?mod=tech_feat1_ai_pos3</a>&nbsp;</p><br><p><strong>15:41 - Doom’s ‘Will It Run’ Collector’s Edition</strong></p><p>•Yes, the <em>box</em> runs Doom—because of course it does</p><p>•Limited to 666 units at $666.66 each, complete with cassette soundtracks and a Doom-playing cacodemon</p><p>•<a href="https://games.slashdot.org/story/25/04/16/0038222/limited-edition-of-doom-includes-game-box-that-itself-plays-doom" rel="noopener noreferrer" target="_blank">https://games.slashdot.org/story/25/04/16/0038222/limited-edition-of-doom-includes-game-box-that-itself-plays-doom</a>&nbsp;</p><br><p><strong>19:04 - Zoom Restores Service After an Hours-Long Outage</strong></p><p>•A rare ~2 hour outage makes headlines</p><p>•Highlights growing reliance on real-time communication tools in the age of remote work</p><p>•<a href="https://techcrunch.com/2025/04/16/zoom-restores-service-after-an-hours-long-outage/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/04/16/zoom-restores-service-after-an-hours-long-outage/</a>&nbsp;</p><br><p><strong>22:57 - CVE of the Week - Drones Are The Future of Cybercrime</strong></p><p>•Inspired by military tactics, commercial drones are now being weaponized in digital warfare</p><p>•A U.S. financial firm was targeted using a drone carrying a Wi-Fi Pineapple to spoof access points and intercept data</p><p>•Van Eck phreaking, electromagnetic emissions, and aerial man-in-the-middle attacks are no longer theoretical</p><p>•Lou and John stress the need for RF monitoring and proactive countermeasures—even rooftop surveillance</p><p>•<a href="https://www.computerworld.com/article/3958458/drones-are-the-future-of-cybercrime.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/3958458/drones-are-the-future-of-cybercrime.html</a>&nbsp;</p><br><p><strong>32:05 - Wrap Up</strong></p><p>•Feedback and topic suggestions always welcome</p><p>•Email: feedback@itsparccast.com</p><p>•X: @itsparccast</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 33 of IT SPARC Cast, John and Lou tackle the rising tension between global tech suppliers and national security concerns—starting with TP-Link’s efforts to unlink from its Chinese roots to stay in the U.S. market. They also explore how AI is powering a nuclear energy renaissance, dig into Doom’s most absurd collector’s edition yet, and reflect on Zoom’s rare outage. In the CVE of the Week, they sound the alarm on a terrifying new cyber threat: drones as digital attack vectors. The future of cybercrime is airborne—and it’s closer than you think.</p><br><p><strong>Show Notes</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p><strong>News Bytes</strong></p><br><p><strong>01:20 - TP-Link’s Future in the US Amid China Scrutiny</strong></p><p>•TP-LINK co-founder relocates to California, pledging $700M investment and U.S. citizenship</p><p>•Lou and John debate: Can trust be rebuilt after suspicions of state-sponsored espionage?</p><p>•Echoes of TikTok’s regulatory battles</p><p>•<a href="https://slashdot.org/story/25/04/11/2050255/wi-fi-giant-tp-links-us-future-hinges-on-its-claimed-split-from-china" rel="noopener noreferrer" target="_blank">https://slashdot.org/story/25/04/11/2050255/wi-fi-giant-tp-links-us-future-hinges-on-its-claimed-split-from-china</a>&nbsp;</p><br><p><strong>08:08 - AI Meets Nuclear Power</strong></p><p>•Oak Ridge National Lab unveils AI-driven digital twin system to optimize reactor design</p><p>•Fusion of machine learning with energy infrastructure to meet AI’s energy demands</p><p>•John draws parallels to using AI digital twins in enterprise networks</p><p>•<a href="https://www.wsj.com/articles/nuclear-power-is-back-and-this-time-ai-can-help-manage-the-reactors-5ce03ae7?mod=tech_feat1_ai_pos3" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/nuclear-power-is-back-and-this-time-ai-can-help-manage-the-reactors-5ce03ae7?mod=tech_feat1_ai_pos3</a>&nbsp;</p><br><p><strong>15:41 - Doom’s ‘Will It Run’ Collector’s Edition</strong></p><p>•Yes, the <em>box</em> runs Doom—because of course it does</p><p>•Limited to 666 units at $666.66 each, complete with cassette soundtracks and a Doom-playing cacodemon</p><p>•<a href="https://games.slashdot.org/story/25/04/16/0038222/limited-edition-of-doom-includes-game-box-that-itself-plays-doom" rel="noopener noreferrer" target="_blank">https://games.slashdot.org/story/25/04/16/0038222/limited-edition-of-doom-includes-game-box-that-itself-plays-doom</a>&nbsp;</p><br><p><strong>19:04 - Zoom Restores Service After an Hours-Long Outage</strong></p><p>•A rare ~2 hour outage makes headlines</p><p>•Highlights growing reliance on real-time communication tools in the age of remote work</p><p>•<a href="https://techcrunch.com/2025/04/16/zoom-restores-service-after-an-hours-long-outage/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/04/16/zoom-restores-service-after-an-hours-long-outage/</a>&nbsp;</p><br><p><strong>22:57 - CVE of the Week - Drones Are The Future of Cybercrime</strong></p><p>•Inspired by military tactics, commercial drones are now being weaponized in digital warfare</p><p>•A U.S. financial firm was targeted using a drone carrying a Wi-Fi Pineapple to spoof access points and intercept data</p><p>•Van Eck phreaking, electromagnetic emissions, and aerial man-in-the-middle attacks are no longer theoretical</p><p>•Lou and John stress the need for RF monitoring and proactive countermeasures—even rooftop surveillance</p><p>•<a href="https://www.computerworld.com/article/3958458/drones-are-the-future-of-cybercrime.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/3958458/drones-are-the-future-of-cybercrime.html</a>&nbsp;</p><br><p><strong>32:05 - Wrap Up</strong></p><p>•Feedback and topic suggestions always welcome</p><p>•Email: feedback@itsparccast.com</p><p>•X: @itsparccast</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Top 10 Most Notorious Hackers (and Hacker Groups) That Got Away With It</title>
			<itunes:title>Top 10 Most Notorious Hackers (and Hacker Groups) That Got Away With It</itunes:title>
			<pubDate>Wed, 16 Apr 2025 15:27:19 GMT</pubDate>
			<itunes:duration>27:23</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67ffcc575d1edf45d2fcc40d/media.mp3" length="473397016" type="audio/mpeg"/>
			<guid isPermaLink="false">67ffcc575d1edf45d2fcc40d</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-top-ten-episode-s01e05</link>
			<acast:episodeId>67ffcc575d1edf45d2fcc40d</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-top-ten-episode-s01e05</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZMhNNHnuvI5N219VkXKDT0SzxFmerY/mA0LUqqaxGZ0SKu5Kav96HBi+IQR9vjQdZRvRB/E20gkRa6Uu4ZqGEP]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Top Ten - Episode S01E05</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1744817112035-a66d0f35-c7a9-4046-adf4-e18293ed7b4e.jpeg"/>
			<description><![CDATA[<p><br></p><br><p><strong>Episode Description:</strong></p><p>In this episode of <em>IT SPARC Cast - Top Ten</em>, John Barger and Lou Schmidt break down the most infamous hackers and hacker groups that pulled off massive cyberattacks—then vanished into the digital shadows. From ransomware crews that crippled national infrastructure to lone wolves who sparked global panic, these digital outlaws left a trail of data breaches, financial chaos, and unanswered subpoenas.</p><br><p>We rank these groups and individuals by their impact on the world—based on the damage they caused, the secrets they exposed, and the fact that most of them never faced real consequences. You’ll hear about the Colonial Pipeline takedown, stolen NSA cyberweapons, hacktivist rebellions, and ransomware schemes that cost companies hundreds of millions.</p><br><p><strong>Timestamps:</strong></p><p>00:00 – Intro</p><p>01:11 – #10: Weev (Andrew Auernheimer)</p><p>02:50 – #9: Mafiaboy (Michael Calce)</p><p>04:50 – #8: Egregor Ransomware Group</p><p>06:52 – #7: Phineas Fisher</p><p>09:05 – #6: FIN7 (a.k.a. Carbanak Group)</p><p>10:59 – #5: Anonymous</p><p>13:25 – #4: DarkSide Ransomware Group</p><p>16:01 – #3: REvil (Sodinokibi)</p><p>18:19 – #2: Shadow Brokers</p><p>21:28 – #1: Conti Ransomware Group</p><p>26:06 – Wrap Up</p><br><p><strong>SEO Keywords:</strong></p><p>top hackers, hacker groups, ransomware attacks, cybersecurity podcast, infamous hackers, Conti ransomware, Shadow Brokers, Anonymous hacks, cybercrime, IT security stories, DarkSide Colonial Pipeline, REvil Kaseya, top 10 hackers, IT SPARC Cast, cybercriminals who got away, ransomware as a service, most wanted hackers</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><br></p><br><p><strong>Episode Description:</strong></p><p>In this episode of <em>IT SPARC Cast - Top Ten</em>, John Barger and Lou Schmidt break down the most infamous hackers and hacker groups that pulled off massive cyberattacks—then vanished into the digital shadows. From ransomware crews that crippled national infrastructure to lone wolves who sparked global panic, these digital outlaws left a trail of data breaches, financial chaos, and unanswered subpoenas.</p><br><p>We rank these groups and individuals by their impact on the world—based on the damage they caused, the secrets they exposed, and the fact that most of them never faced real consequences. You’ll hear about the Colonial Pipeline takedown, stolen NSA cyberweapons, hacktivist rebellions, and ransomware schemes that cost companies hundreds of millions.</p><br><p><strong>Timestamps:</strong></p><p>00:00 – Intro</p><p>01:11 – #10: Weev (Andrew Auernheimer)</p><p>02:50 – #9: Mafiaboy (Michael Calce)</p><p>04:50 – #8: Egregor Ransomware Group</p><p>06:52 – #7: Phineas Fisher</p><p>09:05 – #6: FIN7 (a.k.a. Carbanak Group)</p><p>10:59 – #5: Anonymous</p><p>13:25 – #4: DarkSide Ransomware Group</p><p>16:01 – #3: REvil (Sodinokibi)</p><p>18:19 – #2: Shadow Brokers</p><p>21:28 – #1: Conti Ransomware Group</p><p>26:06 – Wrap Up</p><br><p><strong>SEO Keywords:</strong></p><p>top hackers, hacker groups, ransomware attacks, cybersecurity podcast, infamous hackers, Conti ransomware, Shadow Brokers, Anonymous hacks, cybercrime, IT security stories, DarkSide Colonial Pipeline, REvil Kaseya, top 10 hackers, IT SPARC Cast, cybercriminals who got away, ransomware as a service, most wanted hackers</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Microsoft AI Co-Pilot Conquers Patch Tuesday</title>
			<itunes:title>Microsoft AI Co-Pilot Conquers Patch Tuesday</itunes:title>
			<pubDate>Fri, 11 Apr 2025 16:21:29 GMT</pubDate>
			<itunes:duration>32:18</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67f94189d67315f9f40372b9/media.mp3" length="558249784" type="audio/mpeg"/>
			<guid isPermaLink="false">67f94189d67315f9f40372b9</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e32</link>
			<acast:episodeId>67f94189d67315f9f40372b9</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e32</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YGByJUx3HgAPk4W6E0udBmEAbzapY8VOB5xjKmyD5Ki1Pn3xuj/0FUIx00Fm38tN2BfkaV9bpCj33jshAm2cjO]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E32</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>32</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1744388061613-5779036b-fb61-4afd-9d75-8430a90305ad.jpeg"/>
			<description><![CDATA[<p>In Episode 32 of IT SPARC Cast, John and Lou unpack the controversy behind the White House blaming iPhones for the Signal security scandal—and why the real issue might not be Signal at all. They also explore Microsoft’s rollout of the Windows 365 Link and celebrate a win for transparency in Apple’s legal encryption battle with the UK government. The CVE of the Week dives into how Microsoft’s Security Copilot AI discovered and suggested fixes for 12 zero-days across embedded Linux platforms. It’s a wild week for privacy, security, and the promise (and peril) of AI.</p><br><p>🕒<strong> Show Notes:</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:48 - Microsoft’s Windows 365 Link Goes On Sale</strong></p><p>•Microsoft’s thin-client VDI device is finally available globally</p><p>•$350 price tag raises eyebrows compared to cheaper Chrome OS devices</p><p>•Real value may lie in deep Microsoft ecosystem integration for centralized management</p><p>•<a href="https://tech.slashdot.org/story/25/04/03/2143251/microsofts-miniature-windows-365-link-pc-goes-on-sale" rel="noopener noreferrer" target="_blank">https://tech.slashdot.org/story/25/04/03/2143251/microsofts-miniature-windows-365-link-pc-goes-on-sale</a></p><br><p><strong>07:00 - White House Blames iPhone for Signal Scandal</strong></p><p>•Government officials allegedly leaked information via Signal</p><p>•White House blames Apple/Siri contact auto-fill for mistakenly adding a journalist to private Signal chats</p><p>•John and Lou explain why the issue isn’t Signal—it’s contact mismanagement and user error</p><p>•<a href="https://techcrunch.com/2025/04/06/white-house-reportedly-blames-auto-suggested-iphone-contact-for-signal-scandal/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/04/06/white-house-reportedly-blames-auto-suggested-iphone-contact-for-signal-scandal/</a>&nbsp;</p><br><p><strong>15:05 - Ransomware Gang Everest Gets Hacked</strong></p><p>•Notorious Russian ransomware gang Everest suffers ironic takedown</p><p>•Their dark web site replaced with the message: “Do not crime, crime is bad. xoxo from Prague”</p><p>•Previously hit NASA, cannabis retailers, and Brazilian government</p><p>•<a href="https://techcrunch.com/2025/04/07/someone-hacked-everest-ransomware-gang-dark-web-leak-site/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/04/07/someone-hacked-everest-ransomware-gang-dark-web-leak-site/</a>&nbsp;</p><br><p><strong>18:17 - UK Unblocks Apple Encryption Fight Details</strong></p><p>•A court rules Apple can publicly acknowledge the case</p><p>•A win for transparency</p><p>•This story connects back to the IT SPARC Deep Dive on international data privacy</p><p>•<a href="https://www.msn.com/en-us/money/other/uk-effort-to-keep-apple-encryption-fight-secret-is-blocked/ar-AA1CsokD" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/money/other/uk-effort-to-keep-apple-encryption-fight-secret-is-blocked/ar-AA1CsokD</a>&nbsp;</p><br><p><strong>24:00 - CVE of the Week</strong></p><p><strong>Microsoft Uses AI to Find Security Flaws</strong></p><p>•Microsoft Security Copilot uncovers 12 new vulnerabilities in GRUB2, U-Boot, and Barebox</p><p>•Issues include buffer overflows, arbitrary memory reads, and integer overflows</p><p>•Copilot didn’t just find the bugs—it also recommended patches</p><p>•Lou and John discuss how AI can be a force multiplier in cybersecurity</p><p>•<a href="https://www.bleepingcomputer.com/news/security/microsoft-uses-ai-to-find-flaws-in-grub2-u-boot-barebox-bootloaders/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-uses-ai-to-find-flaws-in-grub2-u-boot-barebox-bootloaders/</a>&nbsp;</p><br><p><strong>28:39 - Mail Bag &amp;  Closing Comments</strong></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 32 of IT SPARC Cast, John and Lou unpack the controversy behind the White House blaming iPhones for the Signal security scandal—and why the real issue might not be Signal at all. They also explore Microsoft’s rollout of the Windows 365 Link and celebrate a win for transparency in Apple’s legal encryption battle with the UK government. The CVE of the Week dives into how Microsoft’s Security Copilot AI discovered and suggested fixes for 12 zero-days across embedded Linux platforms. It’s a wild week for privacy, security, and the promise (and peril) of AI.</p><br><p>🕒<strong> Show Notes:</strong></p><br><p><strong>00:00 - Intro</strong></p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:48 - Microsoft’s Windows 365 Link Goes On Sale</strong></p><p>•Microsoft’s thin-client VDI device is finally available globally</p><p>•$350 price tag raises eyebrows compared to cheaper Chrome OS devices</p><p>•Real value may lie in deep Microsoft ecosystem integration for centralized management</p><p>•<a href="https://tech.slashdot.org/story/25/04/03/2143251/microsofts-miniature-windows-365-link-pc-goes-on-sale" rel="noopener noreferrer" target="_blank">https://tech.slashdot.org/story/25/04/03/2143251/microsofts-miniature-windows-365-link-pc-goes-on-sale</a></p><br><p><strong>07:00 - White House Blames iPhone for Signal Scandal</strong></p><p>•Government officials allegedly leaked information via Signal</p><p>•White House blames Apple/Siri contact auto-fill for mistakenly adding a journalist to private Signal chats</p><p>•John and Lou explain why the issue isn’t Signal—it’s contact mismanagement and user error</p><p>•<a href="https://techcrunch.com/2025/04/06/white-house-reportedly-blames-auto-suggested-iphone-contact-for-signal-scandal/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/04/06/white-house-reportedly-blames-auto-suggested-iphone-contact-for-signal-scandal/</a>&nbsp;</p><br><p><strong>15:05 - Ransomware Gang Everest Gets Hacked</strong></p><p>•Notorious Russian ransomware gang Everest suffers ironic takedown</p><p>•Their dark web site replaced with the message: “Do not crime, crime is bad. xoxo from Prague”</p><p>•Previously hit NASA, cannabis retailers, and Brazilian government</p><p>•<a href="https://techcrunch.com/2025/04/07/someone-hacked-everest-ransomware-gang-dark-web-leak-site/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/04/07/someone-hacked-everest-ransomware-gang-dark-web-leak-site/</a>&nbsp;</p><br><p><strong>18:17 - UK Unblocks Apple Encryption Fight Details</strong></p><p>•A court rules Apple can publicly acknowledge the case</p><p>•A win for transparency</p><p>•This story connects back to the IT SPARC Deep Dive on international data privacy</p><p>•<a href="https://www.msn.com/en-us/money/other/uk-effort-to-keep-apple-encryption-fight-secret-is-blocked/ar-AA1CsokD" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/money/other/uk-effort-to-keep-apple-encryption-fight-secret-is-blocked/ar-AA1CsokD</a>&nbsp;</p><br><p><strong>24:00 - CVE of the Week</strong></p><p><strong>Microsoft Uses AI to Find Security Flaws</strong></p><p>•Microsoft Security Copilot uncovers 12 new vulnerabilities in GRUB2, U-Boot, and Barebox</p><p>•Issues include buffer overflows, arbitrary memory reads, and integer overflows</p><p>•Copilot didn’t just find the bugs—it also recommended patches</p><p>•Lou and John discuss how AI can be a force multiplier in cybersecurity</p><p>•<a href="https://www.bleepingcomputer.com/news/security/microsoft-uses-ai-to-find-flaws-in-grub2-u-boot-barebox-bootloaders/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-uses-ai-to-find-flaws-in-grub2-u-boot-barebox-bootloaders/</a>&nbsp;</p><br><p><strong>28:39 - Mail Bag &amp;  Closing Comments</strong></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Top 10 Hackers That Ran Afoul of the Law and Then Made Good</title>
			<itunes:title>Top 10 Hackers That Ran Afoul of the Law and Then Made Good</itunes:title>
			<pubDate>Wed, 09 Apr 2025 16:40:24 GMT</pubDate>
			<itunes:duration>39:11</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67f6a2f86a2126524df361b0/media.mp3" length="677156572" type="audio/mpeg"/>
			<guid isPermaLink="false">67f6a2f86a2126524df361b0</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-top-ten-episode-s01e04</link>
			<acast:episodeId>67f6a2f86a2126524df361b0</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-top-ten-episode-s01e04</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZiMCydJEecNjlhLG+4SIo96uVeLmqFsXa0bFqsBl1PMQ6PTxhhT2z5U9pGf3FYZhNIh3A+3YIK20MFrEPyJ14V]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Top Ten - Episode S01E04</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1744216765936-75657ad2-0d15-436f-9ffe-8568292444e0.jpeg"/>
			<description><![CDATA[<p>In this week’s episode of <strong>IT SPARC Cast - Top Ten</strong>, hosts <strong>John Barger</strong> and <strong>Lou Schmidt</strong> dive into the darker side of tech turned bright. We’re counting down the <strong>Top 10 Hackers That Ran Afoul of the Law and Then Made Good</strong>. These are real-life stories of rogue coders, phone phreaks, worm creators, and cyber anarchists who got busted but eventually turned things around to use their skills to do good—some became teachers, consultants, or even government allies.</p><br><p>Ranked from least to most positive impact, this episode highlights infamous names like <strong>Kevin Mitnick, Marcus Hutchins, Captain Crunch</strong>, and <strong>Sabu</strong>, while also giving props to lesser-known figures who helped shape cybersecurity and privacy today. You’ll hear about FBI takedowns, pioneering malware, digital redemption, and even a Porsche giveaway scam gone sideways.</p><br><p>🧠 It’s a wild ride through hacker history—with lessons for anyone in IT, security, or just fascinated by tech mischief turned mentorship.</p><br><p>⸻</p><br><p>⏱️<strong> Timestamps &amp; Topics</strong></p><p><strong>00:00 – Intro</strong></p><p><strong>01:28 – #10: John Draper (“Cap’n Crunch”)</strong></p><p><strong>07:33 – #9: Dmitry Sklyarov</strong></p><p><strong>10:35 – #8: Adrian Lamo</strong></p><p><strong>13:43 – #7: Mark Abene (“Phiber Optik”)</strong></p><p><strong>18:00 – #6: Kevin Poulsen (“Dark Dante”)</strong></p><p><strong>20:49 – #5: Samy Kamkar</strong></p><p><strong>24:37 – #4: Marcus Hutchins (“MalwareTech”)</strong></p><p><strong>28:13 – #3: Hector Monsegur (“Sabu”)</strong></p><p><strong>31:04 – #2: Robert T. Morris</strong></p><p><strong>34:55 – #1: Kevin Mitnick</strong></p><p><strong>37:58 – Wrap Up</strong></p><br><p><br></p><p>•Ethical hackers</p><p>•Famous hackers who changed</p><p>•Cybersecurity legends</p><p>•Kevin Mitnick story</p><p>•White-hat hacker transformations</p><p>•Top 10 hackers</p><p>•Real hacker redemption stories</p><p>•IT history podcast</p><p>•Infosec top ten</p><p>•Cybercrime to cybersecurity</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this week’s episode of <strong>IT SPARC Cast - Top Ten</strong>, hosts <strong>John Barger</strong> and <strong>Lou Schmidt</strong> dive into the darker side of tech turned bright. We’re counting down the <strong>Top 10 Hackers That Ran Afoul of the Law and Then Made Good</strong>. These are real-life stories of rogue coders, phone phreaks, worm creators, and cyber anarchists who got busted but eventually turned things around to use their skills to do good—some became teachers, consultants, or even government allies.</p><br><p>Ranked from least to most positive impact, this episode highlights infamous names like <strong>Kevin Mitnick, Marcus Hutchins, Captain Crunch</strong>, and <strong>Sabu</strong>, while also giving props to lesser-known figures who helped shape cybersecurity and privacy today. You’ll hear about FBI takedowns, pioneering malware, digital redemption, and even a Porsche giveaway scam gone sideways.</p><br><p>🧠 It’s a wild ride through hacker history—with lessons for anyone in IT, security, or just fascinated by tech mischief turned mentorship.</p><br><p>⸻</p><br><p>⏱️<strong> Timestamps &amp; Topics</strong></p><p><strong>00:00 – Intro</strong></p><p><strong>01:28 – #10: John Draper (“Cap’n Crunch”)</strong></p><p><strong>07:33 – #9: Dmitry Sklyarov</strong></p><p><strong>10:35 – #8: Adrian Lamo</strong></p><p><strong>13:43 – #7: Mark Abene (“Phiber Optik”)</strong></p><p><strong>18:00 – #6: Kevin Poulsen (“Dark Dante”)</strong></p><p><strong>20:49 – #5: Samy Kamkar</strong></p><p><strong>24:37 – #4: Marcus Hutchins (“MalwareTech”)</strong></p><p><strong>28:13 – #3: Hector Monsegur (“Sabu”)</strong></p><p><strong>31:04 – #2: Robert T. Morris</strong></p><p><strong>34:55 – #1: Kevin Mitnick</strong></p><p><strong>37:58 – Wrap Up</strong></p><br><p><br></p><p>•Ethical hackers</p><p>•Famous hackers who changed</p><p>•Cybersecurity legends</p><p>•Kevin Mitnick story</p><p>•White-hat hacker transformations</p><p>•Top 10 hackers</p><p>•Real hacker redemption stories</p><p>•IT history podcast</p><p>•Infosec top ten</p><p>•Cybercrime to cybersecurity</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Signal Flare & Coding Is Dead?]]></title>
			<itunes:title><![CDATA[Signal Flare & Coding Is Dead?]]></itunes:title>
			<pubDate>Fri, 04 Apr 2025 15:54:57 GMT</pubDate>
			<itunes:duration>41:19</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67f000d1f185b2a87fa32d5e/media.mp3" length="714045424" type="audio/mpeg"/>
			<guid isPermaLink="false">67f000d1f185b2a87fa32d5e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e31</link>
			<acast:episodeId>67f000d1f185b2a87fa32d5e</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e31</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7af3jAtEGGFp9f6FDblHarrKJFTv+evVf35LoVKugIQEYc80kwRlXCWqsHmlkqQYcf99xFEMfnK83SUA1Twp4wl]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E31</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>31</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1743781913411-3fda2c33-5a9e-46cc-b27b-6d70b31b3823.jpeg"/>
			<description><![CDATA[<p>In Episode 31 of IT SPARC Cast, John and Lou tackle the latest headline-grabbing topics in tech: Replit’s CEO proclaims “You shouldn’t learn to code,” igniting a fiery debate about AI’s role in the future of software development. Then, they dissect the explosive Signal controversy involving high-ranking U.S. officials—and the security lessons IT pros must take to heart. Also in this episode: the looming electricity and labor shortages threatening data center growth, and Intel’s big pivot under new leadership. It’s a must-listen for IT leaders navigating the evolving tech landscape.</p><br><p>⏱️<strong> Show Notes</strong></p><br><p>🧠<strong> News Bytes</strong></p><br><p><strong>00:57 - Replit CEO Says “You Shouldn’t Learn to Code”</strong></p><p>•Amjad Masad, CEO of Replit, stuns tech Twitter with his anti-coding hot take</p><p>•Clarifies that AI tools are replacing the need for syntax memorization—not logical thinking</p><p>•Why traditional programming education may be obsolete in an AI-first world</p><p>•Coding is evolving, not dying: the role of design, architecture, and testing in the AI era</p><p>•Lou and John compare the transformation to Photoshop for photographers</p><p>•<a href="https://developers.slashdot.org/story/25/03/31/1623201/no-longer-think-you-should-learn-to-code-says-ceo-of-ai-coding-startup" rel="noopener noreferrer" target="_blank">https://developers.slashdot.org/story/25/03/31/1623201/no-longer-think-you-should-learn-to-code-says-ceo-of-ai-coding-startup</a>&nbsp;</p><br><p><strong>12:18 - America Needs More Electricity… and Electricians</strong></p><p>•Surge in data centers and AI demand reveals a looming power crisis</p><p>•U.S. needs more nuclear energy, more infrastructure—and a skilled labor force to build it</p><p>•30% of union electricians are 50–70 years old; replacements are scarce</p><p>•How this shortage affects IT pros and what can be done</p><p>•<a href="https://www.foxbusiness.com/economy/country-needs-more-electricity-more-electricians" rel="noopener noreferrer" target="_blank">https://www.foxbusiness.com/economy/country-needs-more-electricity-more-electricians</a>&nbsp;</p><br><p><strong>19:08 - Intel CEO Announces Spin-Off of Non-Core Units</strong></p><p>•Lip-Bu Tan replaces Pat Gelsinger, plans to trim Intel’s fat</p><p>•Intel seeks to refocus on CPUs, regain ground lost to AMD, Apple, and NVIDIA</p><p>•Will Intel find its place in the AI chip race? A historical look at missed opportunities (like Phi)</p><p>•What this means for the U.S. semiconductor ecosystem</p><p>•<a href="https://techcrunch.com/2025/04/01/lip-bu-tan-says-intel-will-spin-off-non-core-units/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/04/01/lip-bu-tan-says-intel-will-spin-off-non-core-units/</a>&nbsp;</p><br><p>🔐<strong> CVE of the Week</strong></p><br><p><strong>25:35 - Lessons IT Can Learn from the Signal Kerfuffle</strong></p><p>•A reporter was allegedly added to a Signal chat with top U.S. officials</p><p>•Was it a hack, an inside job, or intentional leak?</p><p>•John &amp; Lou dig into mobile device management, group chat mechanics, and security policy</p><p>•Signal remains secure—but MDM and contact trust are crucial</p><p>•Key takeaway: your security is only as strong as your weakest contact</p><p>•Shoutouts to Glen, Tyler, and Alex for prompting this analysis</p><br><p><strong>37:33 - Listener Feedback</strong></p><p>•Loud intro music? John heard you—and turned it down</p><p>•Windows 7 loyalists speak out! Lou and John reflect on OS nostalgia and security risks</p><p>•Tip: If you’re still on Win7, invest in a great firewall and rethink your strategy</p><br><p><strong>40:24 - How to Reach Us</strong></p><p>•Send feedback to: feedback@itsparccast.com</p><p>•Follow and comment @itsparccast on X</p><p>•Like, subscribe, share—help spread the word!</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 31 of IT SPARC Cast, John and Lou tackle the latest headline-grabbing topics in tech: Replit’s CEO proclaims “You shouldn’t learn to code,” igniting a fiery debate about AI’s role in the future of software development. Then, they dissect the explosive Signal controversy involving high-ranking U.S. officials—and the security lessons IT pros must take to heart. Also in this episode: the looming electricity and labor shortages threatening data center growth, and Intel’s big pivot under new leadership. It’s a must-listen for IT leaders navigating the evolving tech landscape.</p><br><p>⏱️<strong> Show Notes</strong></p><br><p>🧠<strong> News Bytes</strong></p><br><p><strong>00:57 - Replit CEO Says “You Shouldn’t Learn to Code”</strong></p><p>•Amjad Masad, CEO of Replit, stuns tech Twitter with his anti-coding hot take</p><p>•Clarifies that AI tools are replacing the need for syntax memorization—not logical thinking</p><p>•Why traditional programming education may be obsolete in an AI-first world</p><p>•Coding is evolving, not dying: the role of design, architecture, and testing in the AI era</p><p>•Lou and John compare the transformation to Photoshop for photographers</p><p>•<a href="https://developers.slashdot.org/story/25/03/31/1623201/no-longer-think-you-should-learn-to-code-says-ceo-of-ai-coding-startup" rel="noopener noreferrer" target="_blank">https://developers.slashdot.org/story/25/03/31/1623201/no-longer-think-you-should-learn-to-code-says-ceo-of-ai-coding-startup</a>&nbsp;</p><br><p><strong>12:18 - America Needs More Electricity… and Electricians</strong></p><p>•Surge in data centers and AI demand reveals a looming power crisis</p><p>•U.S. needs more nuclear energy, more infrastructure—and a skilled labor force to build it</p><p>•30% of union electricians are 50–70 years old; replacements are scarce</p><p>•How this shortage affects IT pros and what can be done</p><p>•<a href="https://www.foxbusiness.com/economy/country-needs-more-electricity-more-electricians" rel="noopener noreferrer" target="_blank">https://www.foxbusiness.com/economy/country-needs-more-electricity-more-electricians</a>&nbsp;</p><br><p><strong>19:08 - Intel CEO Announces Spin-Off of Non-Core Units</strong></p><p>•Lip-Bu Tan replaces Pat Gelsinger, plans to trim Intel’s fat</p><p>•Intel seeks to refocus on CPUs, regain ground lost to AMD, Apple, and NVIDIA</p><p>•Will Intel find its place in the AI chip race? A historical look at missed opportunities (like Phi)</p><p>•What this means for the U.S. semiconductor ecosystem</p><p>•<a href="https://techcrunch.com/2025/04/01/lip-bu-tan-says-intel-will-spin-off-non-core-units/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/04/01/lip-bu-tan-says-intel-will-spin-off-non-core-units/</a>&nbsp;</p><br><p>🔐<strong> CVE of the Week</strong></p><br><p><strong>25:35 - Lessons IT Can Learn from the Signal Kerfuffle</strong></p><p>•A reporter was allegedly added to a Signal chat with top U.S. officials</p><p>•Was it a hack, an inside job, or intentional leak?</p><p>•John &amp; Lou dig into mobile device management, group chat mechanics, and security policy</p><p>•Signal remains secure—but MDM and contact trust are crucial</p><p>•Key takeaway: your security is only as strong as your weakest contact</p><p>•Shoutouts to Glen, Tyler, and Alex for prompting this analysis</p><br><p><strong>37:33 - Listener Feedback</strong></p><p>•Loud intro music? John heard you—and turned it down</p><p>•Windows 7 loyalists speak out! Lou and John reflect on OS nostalgia and security risks</p><p>•Tip: If you’re still on Win7, invest in a great firewall and rethink your strategy</p><br><p><strong>40:24 - How to Reach Us</strong></p><p>•Send feedback to: feedback@itsparccast.com</p><p>•Follow and comment @itsparccast on X</p><p>•Like, subscribe, share—help spread the word!</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Top 10 Most Influential Operating Systems You’ve Never Heard Of</title>
			<itunes:title>Top 10 Most Influential Operating Systems You’ve Never Heard Of</itunes:title>
			<pubDate>Wed, 02 Apr 2025 17:08:12 GMT</pubDate>
			<itunes:duration>36:54</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67ed6efdd4b40d7b30f04cb4/media.mp3" length="637709164" type="audio/mpeg"/>
			<guid isPermaLink="false">67ed6efdd4b40d7b30f04cb4</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-top-ten-episode-s01e03</link>
			<acast:episodeId>67ed6efdd4b40d7b30f04cb4</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-top-ten-episode-s01e03</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YWhZDnH1ALplnMNhmJ4G0oFFcrTW3NKxTGH2nSlq31Szn1yoHx89YcRmJlqL4AeaRVLlgHesc/Tns8knZ1VVb8]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Top Ten - Episode S01E03</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1743613625423-fba82f13-4255-4d8e-95d3-a1bcb843bfcd.jpeg"/>
			<description><![CDATA[<p>Not all legendary tech comes with name recognition. In this episode of <em>IT SPARC Cast - Top Ten</em>, John &amp; Lou count down the <strong>Top Ten Most Influential Operating Systems You’ve Never Heard Of.&nbsp;</strong> While these operating systems that didn’t dominate the headlines, they did quietly change the world. These OSes shaped modern computing, from time-sharing and GUIs to virtualization and microkernels. You may not know their names, but their fingerprints are all over your daily tech.</p><br><p>Whether you’re a sysadmin, historian, or just a curious nerd, this countdown of the most influential <em>unsung</em> operating systems will surprise and educate. Let’s roll back the clock and celebrate the OS innovations that powered everything from IBM mainframes to Amiga multimedia.</p><br><p>⸻</p><br><p>⏱️<strong> Timestamps &amp; Segment Titles:</strong></p><br><p><strong>00:00 – Intro</strong></p><p>Welcome to the IT SPARC Cast Top Ten – what makes an obscure OS influential?</p><br><p><strong>01:50 – #10 – CTSS (Compatible Time-Sharing System) – 1961</strong></p><p>The first practical time-sharing OS that laid the groundwork for interactive computing.</p><br><p><strong>05:06 – #9 – Atlas Supervisor (Manchester Atlas OS) – 1962</strong></p><p>The forgotten pioneer of virtual memory and true multiprogramming.</p><br><p><strong>07:11 – #8 – IBM OS/360 – 1966</strong></p><p>The OS that defined enterprise computing and invented virtualization.</p><br><p><strong>11:53 – #7 – Multics (Multiplexed Information and Computing Service) – 1967</strong></p><p>The security-hardened ancestor of Unix and modern system design.</p><br><p><strong>14:28 – #6 – TOPS-10 (DEC PDP-10 OS) – 1970</strong></p><p>The platform that built ARPANET and inspired early open-source culture.</p><br><p><strong>17:02 – #5 – Xerox Alto Executive – 1973</strong></p><p>The GUI trailblazer that inspired the Macintosh and modern desktop metaphors.</p><br><p><strong>20:23 – #4 – CP/M (Control Program for Microcomputers) – 1974</strong></p><p>The OS that created the first cross-platform software ecosystem.</p><br><p><strong>23:03 – #3 – VMS (Virtual Memory System) – 1978</strong></p><p>Enterprise-grade reliability and the direct ancestor of Windows NT.</p><br><p><strong>26:10 – #2 – AmigaOS – 1985</strong></p><p>The first true multimedia multitasking OS for the home computer.</p><br><p><strong>31:30 – #1 – MINIX – 1987</strong></p><p>The educational OS that launched a revolution—by inspiring Linux.</p><br><p><strong>35:45 – Wrap Up</strong></p><p>Let us know what we missed! What’s your favorite obscure but powerful OS?</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Not all legendary tech comes with name recognition. In this episode of <em>IT SPARC Cast - Top Ten</em>, John &amp; Lou count down the <strong>Top Ten Most Influential Operating Systems You’ve Never Heard Of.&nbsp;</strong> While these operating systems that didn’t dominate the headlines, they did quietly change the world. These OSes shaped modern computing, from time-sharing and GUIs to virtualization and microkernels. You may not know their names, but their fingerprints are all over your daily tech.</p><br><p>Whether you’re a sysadmin, historian, or just a curious nerd, this countdown of the most influential <em>unsung</em> operating systems will surprise and educate. Let’s roll back the clock and celebrate the OS innovations that powered everything from IBM mainframes to Amiga multimedia.</p><br><p>⸻</p><br><p>⏱️<strong> Timestamps &amp; Segment Titles:</strong></p><br><p><strong>00:00 – Intro</strong></p><p>Welcome to the IT SPARC Cast Top Ten – what makes an obscure OS influential?</p><br><p><strong>01:50 – #10 – CTSS (Compatible Time-Sharing System) – 1961</strong></p><p>The first practical time-sharing OS that laid the groundwork for interactive computing.</p><br><p><strong>05:06 – #9 – Atlas Supervisor (Manchester Atlas OS) – 1962</strong></p><p>The forgotten pioneer of virtual memory and true multiprogramming.</p><br><p><strong>07:11 – #8 – IBM OS/360 – 1966</strong></p><p>The OS that defined enterprise computing and invented virtualization.</p><br><p><strong>11:53 – #7 – Multics (Multiplexed Information and Computing Service) – 1967</strong></p><p>The security-hardened ancestor of Unix and modern system design.</p><br><p><strong>14:28 – #6 – TOPS-10 (DEC PDP-10 OS) – 1970</strong></p><p>The platform that built ARPANET and inspired early open-source culture.</p><br><p><strong>17:02 – #5 – Xerox Alto Executive – 1973</strong></p><p>The GUI trailblazer that inspired the Macintosh and modern desktop metaphors.</p><br><p><strong>20:23 – #4 – CP/M (Control Program for Microcomputers) – 1974</strong></p><p>The OS that created the first cross-platform software ecosystem.</p><br><p><strong>23:03 – #3 – VMS (Virtual Memory System) – 1978</strong></p><p>Enterprise-grade reliability and the direct ancestor of Windows NT.</p><br><p><strong>26:10 – #2 – AmigaOS – 1985</strong></p><p>The first true multimedia multitasking OS for the home computer.</p><br><p><strong>31:30 – #1 – MINIX – 1987</strong></p><p>The educational OS that launched a revolution—by inspiring Linux.</p><br><p><strong>35:45 – Wrap Up</strong></p><p>Let us know what we missed! What’s your favorite obscure but powerful OS?</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Windows 10’s Final Countdown & The Data That Could Doom You]]></title>
			<itunes:title><![CDATA[Windows 10’s Final Countdown & The Data That Could Doom You]]></itunes:title>
			<pubDate>Fri, 28 Mar 2025 15:19:46 GMT</pubDate>
			<itunes:duration>33:17</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67e6be12903a636fc135e435/media.mp3" length="575402920" type="audio/mpeg"/>
			<guid isPermaLink="false">67e6be12903a636fc135e435</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e30</link>
			<acast:episodeId>67e6be12903a636fc135e435</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e30</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZPrf6tl7jrNFpuYQec7M6Ra6ea7PjfzgBxlu+1PjBUA/YXhj7lXdau5MXGqokgXeI1ul+RIkChrMhYgqhnsfqP]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E30</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>30</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1743174833841-662a2837-79b1-402b-a890-0c46952e7efd.jpeg"/>
			<description><![CDATA[<p>In Episode 30 of IT SPARC Cast, John and Lou dig into Microsoft’s aggressive push to retire Windows 10 and what it means for your enterprise refresh cycle. They spotlight an open-source project that could revolutionize container security, and celebrate France rejecting a dangerous encryption backdoor proposal. But the real eye-opener? This week’s CVE of the Week dives into how a breach at 23andMe might be the privacy disaster that bankrupts the company—and how it could happen to yours too.</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>01:01 – Windows 10 Nears End Of Life</strong></p><p>•Microsoft announces Windows 10 support ends Oct 14, 2025</p><p>•Millions of devices still can’t upgrade to Windows 11 due to lack of TPM 2.0</p><p>•Many 3–4-year-old PCs may be rendered obsolete</p><p>•ChromeOS Flex, Linux, or e-cycling: What are the alternatives?</p><p>•<a href="https://www.xda-developers.com/microsoft-tells-windows-10-users-trade-in-pc/" rel="noopener noreferrer" target="_blank">https://www.xda-developers.com/microsoft-tells-windows-10-users-trade-in-pc/</a>&nbsp;</p><br><p><strong>09:50 – Open-source Styrolite Project Simplifies Container Security</strong></p><p>•New tool from Edera aims to fix namespace security in Linux containers</p><p>•Built in Rust for security and performance</p><p>•API-driven design works with Terraform, Docker, Kubernetes</p><p>•Open-source is thriving again with VC funding—Red Hat-style support models return</p><p>•A must-watch project for hyperscale and cloud-native IT teams</p><p>•<a href="https://www.infoworld.com/article/3850699/open-source-styrolite-project-aims-to-simplify-container-runtime-security.html" rel="noopener noreferrer" target="_blank">https://www.infoworld.com/article/3850699/open-source-styrolite-project-aims-to-simplify-container-runtime-security.html</a></p><p>•<a href="https://github.com/edera-dev/styrolite" rel="noopener noreferrer" target="_blank">https://github.com/edera-dev/styrolite</a>&nbsp;</p><br><p><strong>15:30 – France Rejects Backdoor Mandate</strong></p><p>•French lawmakers reject law that would force encrypted messaging backdoors</p><p>•Law proposed silent “ghost users” to spy on private conversations</p><p>•Privacy groups win a major battle for digital rights</p><p>•Highlights importance of legislative transparency and secure-by-design principles</p><p>•<a href="https://www.eff.org/deeplinks/2025/03/win-encryption-france-rejects-backdoor-mandate" rel="noopener noreferrer" target="_blank">https://www.eff.org/deeplinks/2025/03/win-encryption-france-rejects-backdoor-mandate</a>&nbsp;</p><br><p><br></p><p>🛡️<strong> CVE of the Week</strong></p><br><p><strong>19:35 – 23andMe Files for Chapter 11 After Breach</strong></p><p>•7M+ ancestry records compromised in 2023 breach</p><p>•Raises alarming question: who owns your genetic data during a bankruptcy?</p><p>•AI, research firms may see that data as a goldmine</p><p>•This is a wake-up call for IT leaders:</p><p>•Have exit clauses in contracts</p><p>•Know who owns your data—and what happens if a vendor collapses</p><p>•Legal, IT, and InfoSec must collaborate to protect core business data</p><p>•Backups, metadata, and even app usage can expose your business</p><p>•<a href="https://techcrunch.com/2025/03/24/23andme-faces-an-uncertain-future-so-does-your-genetic-data/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/03/24/23andme-faces-an-uncertain-future-so-does-your-genetic-data/</a>&nbsp;</p><br><p>🔚<strong> Wrap Up</strong></p><br><p><strong>31:37 – Wrap Up</strong></p><p>•Reminder: New Top Ten episodes drop every Wednesday</p><p>•Feedback? Reach out at feedback@itsparccast.com or @itsparccast on X</p><p>•Like, subscribe, comment—and help grow the IT SPARC Cast community!</p><br><p>Stay sharp. Stay patched. Stay private.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 30 of IT SPARC Cast, John and Lou dig into Microsoft’s aggressive push to retire Windows 10 and what it means for your enterprise refresh cycle. They spotlight an open-source project that could revolutionize container security, and celebrate France rejecting a dangerous encryption backdoor proposal. But the real eye-opener? This week’s CVE of the Week dives into how a breach at 23andMe might be the privacy disaster that bankrupts the company—and how it could happen to yours too.</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>01:01 – Windows 10 Nears End Of Life</strong></p><p>•Microsoft announces Windows 10 support ends Oct 14, 2025</p><p>•Millions of devices still can’t upgrade to Windows 11 due to lack of TPM 2.0</p><p>•Many 3–4-year-old PCs may be rendered obsolete</p><p>•ChromeOS Flex, Linux, or e-cycling: What are the alternatives?</p><p>•<a href="https://www.xda-developers.com/microsoft-tells-windows-10-users-trade-in-pc/" rel="noopener noreferrer" target="_blank">https://www.xda-developers.com/microsoft-tells-windows-10-users-trade-in-pc/</a>&nbsp;</p><br><p><strong>09:50 – Open-source Styrolite Project Simplifies Container Security</strong></p><p>•New tool from Edera aims to fix namespace security in Linux containers</p><p>•Built in Rust for security and performance</p><p>•API-driven design works with Terraform, Docker, Kubernetes</p><p>•Open-source is thriving again with VC funding—Red Hat-style support models return</p><p>•A must-watch project for hyperscale and cloud-native IT teams</p><p>•<a href="https://www.infoworld.com/article/3850699/open-source-styrolite-project-aims-to-simplify-container-runtime-security.html" rel="noopener noreferrer" target="_blank">https://www.infoworld.com/article/3850699/open-source-styrolite-project-aims-to-simplify-container-runtime-security.html</a></p><p>•<a href="https://github.com/edera-dev/styrolite" rel="noopener noreferrer" target="_blank">https://github.com/edera-dev/styrolite</a>&nbsp;</p><br><p><strong>15:30 – France Rejects Backdoor Mandate</strong></p><p>•French lawmakers reject law that would force encrypted messaging backdoors</p><p>•Law proposed silent “ghost users” to spy on private conversations</p><p>•Privacy groups win a major battle for digital rights</p><p>•Highlights importance of legislative transparency and secure-by-design principles</p><p>•<a href="https://www.eff.org/deeplinks/2025/03/win-encryption-france-rejects-backdoor-mandate" rel="noopener noreferrer" target="_blank">https://www.eff.org/deeplinks/2025/03/win-encryption-france-rejects-backdoor-mandate</a>&nbsp;</p><br><p><br></p><p>🛡️<strong> CVE of the Week</strong></p><br><p><strong>19:35 – 23andMe Files for Chapter 11 After Breach</strong></p><p>•7M+ ancestry records compromised in 2023 breach</p><p>•Raises alarming question: who owns your genetic data during a bankruptcy?</p><p>•AI, research firms may see that data as a goldmine</p><p>•This is a wake-up call for IT leaders:</p><p>•Have exit clauses in contracts</p><p>•Know who owns your data—and what happens if a vendor collapses</p><p>•Legal, IT, and InfoSec must collaborate to protect core business data</p><p>•Backups, metadata, and even app usage can expose your business</p><p>•<a href="https://techcrunch.com/2025/03/24/23andme-faces-an-uncertain-future-so-does-your-genetic-data/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/03/24/23andme-faces-an-uncertain-future-so-does-your-genetic-data/</a>&nbsp;</p><br><p>🔚<strong> Wrap Up</strong></p><br><p><strong>31:37 – Wrap Up</strong></p><p>•Reminder: New Top Ten episodes drop every Wednesday</p><p>•Feedback? Reach out at feedback@itsparccast.com or @itsparccast on X</p><p>•Like, subscribe, comment—and help grow the IT SPARC Cast community!</p><br><p>Stay sharp. Stay patched. Stay private.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Top 10 Biggest Operating System Flops of All Time</title>
			<itunes:title>Top 10 Biggest Operating System Flops of All Time</itunes:title>
			<pubDate>Wed, 26 Mar 2025 16:26:14 GMT</pubDate>
			<itunes:duration>34:32</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67e42aa63f025bbde3dbceaa/media.mp3" length="597012508" type="audio/mpeg"/>
			<guid isPermaLink="false">67e42aa63f025bbde3dbceaa</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-top-ten-episode-s01e02</link>
			<acast:episodeId>67e42aa63f025bbde3dbceaa</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-top-ten-episode-s01e02</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7by5kDIk88ETJ13HhogFWqRD07rHLHZ4vqqa8Mx+UGxIWYgHykXoF1y7Lh4gj5nqgmsf8X0XDvwVuxbROsRHZ3G]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Top Ten - Episode S01E02</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1743006330719-fc8b9d89-c013-4e0d-b285-55c519ac97e6.jpeg"/>
			<description><![CDATA[<p>Not every operating system is a winner—and some are unforgettable failures. In this episode of <em>IT SPARC Cast - Top Ten</em>, hosts John Barger and Lou Schmidt count down the <strong>Top 10 Biggest Operating System Flops of All Time</strong>. From Microsoft’s infamous Windows ME to IBM’s billion-dollar misstep with OS/2, we dive into the technical misfires, strategic blunders, and head-scratching decisions that doomed these platforms. Packed with insight, history, and sarcasm, this episode is a must-listen for anyone who’s ever yelled at a BSOD.</p><br><p><strong>Timestamps &amp; Topics:</strong></p><br><p>00:00 - <strong>Intro</strong></p><p>00:53 - <strong>#10 - Windows ME (2000) — Microsoft</strong></p><p>03:09 - <strong>#9 - webOS (2009) — Palm &amp; Hewlett-Packard</strong></p><p>05:19 - <strong>#8 - Windows RT (2012) — Microsoft</strong></p><p>08:11 - <strong>#7 - Lindows/Linspire (2001) — Lindows, Inc.</strong></p><p>11:28 - <strong>#6 - BeOS (1995) — Be Inc.</strong></p><p>13:17 - <strong>#5 - Windows Phone (2010) — Microsoft</strong></p><p>15:44 - <strong>#4 - Apple Copland (1994–96) — Apple</strong></p><p>20:00 - <strong>#3 - JavaOS (1996) — Sun/IBM</strong></p><p>24:38 - <strong>#2 - Windows 1 &amp; 2 (1985 &amp; 1987) — Microsoft</strong></p><p>29:28 - <strong>#1 - OS/2 (1987) — IBM/Microsoft</strong></p><p>33:12 - <strong>Wrap Up &amp; Listener Feedback</strong></p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Not every operating system is a winner—and some are unforgettable failures. In this episode of <em>IT SPARC Cast - Top Ten</em>, hosts John Barger and Lou Schmidt count down the <strong>Top 10 Biggest Operating System Flops of All Time</strong>. From Microsoft’s infamous Windows ME to IBM’s billion-dollar misstep with OS/2, we dive into the technical misfires, strategic blunders, and head-scratching decisions that doomed these platforms. Packed with insight, history, and sarcasm, this episode is a must-listen for anyone who’s ever yelled at a BSOD.</p><br><p><strong>Timestamps &amp; Topics:</strong></p><br><p>00:00 - <strong>Intro</strong></p><p>00:53 - <strong>#10 - Windows ME (2000) — Microsoft</strong></p><p>03:09 - <strong>#9 - webOS (2009) — Palm &amp; Hewlett-Packard</strong></p><p>05:19 - <strong>#8 - Windows RT (2012) — Microsoft</strong></p><p>08:11 - <strong>#7 - Lindows/Linspire (2001) — Lindows, Inc.</strong></p><p>11:28 - <strong>#6 - BeOS (1995) — Be Inc.</strong></p><p>13:17 - <strong>#5 - Windows Phone (2010) — Microsoft</strong></p><p>15:44 - <strong>#4 - Apple Copland (1994–96) — Apple</strong></p><p>20:00 - <strong>#3 - JavaOS (1996) — Sun/IBM</strong></p><p>24:38 - <strong>#2 - Windows 1 &amp; 2 (1985 &amp; 1987) — Microsoft</strong></p><p>29:28 - <strong>#1 - OS/2 (1987) — IBM/Microsoft</strong></p><p>33:12 - <strong>Wrap Up &amp; Listener Feedback</strong></p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[AI Agents, Generalist Robotics, Superbugs & Remote Work Wins]]></title>
			<itunes:title><![CDATA[AI Agents, Generalist Robotics, Superbugs & Remote Work Wins]]></itunes:title>
			<pubDate>Fri, 21 Mar 2025 16:33:04 GMT</pubDate>
			<itunes:duration>36:09</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67dd94c0ec9837e25e86a112/media.mp3" length="624904372" type="audio/mpeg"/>
			<guid isPermaLink="false">67dd94c0ec9837e25e86a112</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e29</link>
			<acast:episodeId>67dd94c0ec9837e25e86a112</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e29</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bM1xTq9dV+eJGMfk1yIbKirHguqm6J4OdfFj3VfjkYRTuGb5//050xkWyIN7GYz4RAd2SAhp/g0E7HHTeQb3Us]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E29</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>29</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1742574778017-332bf1f4-ca2a-4e9d-8515-092a75eff2db.jpeg"/>
			<description><![CDATA[<p>In Episode 29 of IT SPARC Cast, John and Lou take on the confusion surrounding “AI agents,” cut through the marketing hype, and put a stake in the ground with a clear definition. They explore NVIDIA’s bold leap into generalist robotics, Google’s AI “co-scientist” solving a decade-old superbug mystery in 48 hours, and Zillow’s CEO clapping back at Return-to-Office mandates with proof that remote work works. Plus, this week’s CVE is a critical vulnerability in AMI BMCs that could spell total infrastructure takeover. If you manage servers, don’t miss this one. 🎧📡</p><br><p><strong>Show Notes:</strong></p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:55 – No One Knows What the Heck an AI Agent Is</strong></p><p>•John &amp; Lou define AI agents as task-completing concierge tools for users</p><p>•Dream use cases: calendar coordination, agenda triage, meeting attendance filtering</p><p>•Takeaway: AI Agents are what YOU make them – the chaos comes from letting vendors define them for you</p><p>•<a href="https://techcrunch.com/2025/03/14/no-one-knows-what-the-hell-an-ai-agent-is/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/03/14/no-one-knows-what-the-hell-an-ai-agent-is/</a>&nbsp;</p><br><p><strong>08:10 – NVIDIA Rolls In The Age of Generalist Robotics</strong></p><p>•NVIDIA’s new Isaac GROOT N1 model aims to power humanoid robots</p><p>•Dual-mode AI: Fast reflex actions + slow, deliberate problem solving</p><p>•Relevance to IT: these robots will fall under enterprise IT’s management scope</p><p>•<a href="https://techcrunch.com/2025/03/18/nvidia-debuts-groot-n1-a-foundation-model-for-humanoid-robotics/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/03/18/nvidia-debuts-groot-n1-a-foundation-model-for-humanoid-robotics/</a>&nbsp;</p><br><p><strong>11:40 – Google’s AI ‘Co-Scientist’ Solved a 10-Year Superbug Problem in Two Days</strong></p><p>•Google’s experimental Gemini-powered AI helped identify antibiotic resistance mechanisms</p><p>•Highlight: AI’s new potential in research, troubleshooting, and hypothesis generation</p><p>•IT Takeaway: Think of AI as the ultimate research assistant for debugging and system design</p><p>•<a href="https://www.imperial.ac.uk/news/261293/googles-ai-co-scientist-could-enhance-research/" rel="noopener noreferrer" target="_blank">https://www.imperial.ac.uk/news/261293/googles-ai-co-scientist-could-enhance-research/</a>&nbsp;</p><br><p><strong>18:14 – Zillow’s CEO Says Remote Work Is Fantastic</strong></p><p>•CEO Jeremy Waxman: “Remote work has been fantastic for us”</p><p>•4x increase in job applicants after going remote-first</p><p>•Turnover dramatically decreased = cost savings</p><p>•Lou &amp; John reaffirm: Remote Work is a competitive advantage, not a liability</p><p>•<a href="https://www.entrepreneur.com/business-news/zillow-is-sticking-with-remote-work-cloudhq-says-ceo/486254" rel="noopener noreferrer" target="_blank">https://www.entrepreneur.com/business-news/zillow-is-sticking-with-remote-work-cloudhq-says-ceo/486254</a>&nbsp;</p><br><p>🛡️<strong> CVE of the Week</strong></p><br><p><strong>22:09 – CVE-2024-54085 – AMI BMC Vulnerability</strong></p><p>•Critical Baseboard Management Controller (BMC) flaw affecting vendors like Dell, HP, Lenovo &amp; more</p><p>•CVSS 10.0 — Full takeover potential, even remote firmware flashing</p><p>•Flaw allows attackers to access servers via default remote management ports</p><p>•Mitigation tips:</p><p>•Whitelist admin access</p><p>•Patch, patch, patch — and don’t delay firmware updates!</p><p>•<a href="https://www.securityweek.com/critical-ami-bmc-vulnerability-exposes-servers-to-disruption-takeover/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-ami-bmc-vulnerability-exposes-servers-to-disruption-takeover/</a>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 29 of IT SPARC Cast, John and Lou take on the confusion surrounding “AI agents,” cut through the marketing hype, and put a stake in the ground with a clear definition. They explore NVIDIA’s bold leap into generalist robotics, Google’s AI “co-scientist” solving a decade-old superbug mystery in 48 hours, and Zillow’s CEO clapping back at Return-to-Office mandates with proof that remote work works. Plus, this week’s CVE is a critical vulnerability in AMI BMCs that could spell total infrastructure takeover. If you manage servers, don’t miss this one. 🎧📡</p><br><p><strong>Show Notes:</strong></p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:55 – No One Knows What the Heck an AI Agent Is</strong></p><p>•John &amp; Lou define AI agents as task-completing concierge tools for users</p><p>•Dream use cases: calendar coordination, agenda triage, meeting attendance filtering</p><p>•Takeaway: AI Agents are what YOU make them – the chaos comes from letting vendors define them for you</p><p>•<a href="https://techcrunch.com/2025/03/14/no-one-knows-what-the-hell-an-ai-agent-is/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/03/14/no-one-knows-what-the-hell-an-ai-agent-is/</a>&nbsp;</p><br><p><strong>08:10 – NVIDIA Rolls In The Age of Generalist Robotics</strong></p><p>•NVIDIA’s new Isaac GROOT N1 model aims to power humanoid robots</p><p>•Dual-mode AI: Fast reflex actions + slow, deliberate problem solving</p><p>•Relevance to IT: these robots will fall under enterprise IT’s management scope</p><p>•<a href="https://techcrunch.com/2025/03/18/nvidia-debuts-groot-n1-a-foundation-model-for-humanoid-robotics/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/03/18/nvidia-debuts-groot-n1-a-foundation-model-for-humanoid-robotics/</a>&nbsp;</p><br><p><strong>11:40 – Google’s AI ‘Co-Scientist’ Solved a 10-Year Superbug Problem in Two Days</strong></p><p>•Google’s experimental Gemini-powered AI helped identify antibiotic resistance mechanisms</p><p>•Highlight: AI’s new potential in research, troubleshooting, and hypothesis generation</p><p>•IT Takeaway: Think of AI as the ultimate research assistant for debugging and system design</p><p>•<a href="https://www.imperial.ac.uk/news/261293/googles-ai-co-scientist-could-enhance-research/" rel="noopener noreferrer" target="_blank">https://www.imperial.ac.uk/news/261293/googles-ai-co-scientist-could-enhance-research/</a>&nbsp;</p><br><p><strong>18:14 – Zillow’s CEO Says Remote Work Is Fantastic</strong></p><p>•CEO Jeremy Waxman: “Remote work has been fantastic for us”</p><p>•4x increase in job applicants after going remote-first</p><p>•Turnover dramatically decreased = cost savings</p><p>•Lou &amp; John reaffirm: Remote Work is a competitive advantage, not a liability</p><p>•<a href="https://www.entrepreneur.com/business-news/zillow-is-sticking-with-remote-work-cloudhq-says-ceo/486254" rel="noopener noreferrer" target="_blank">https://www.entrepreneur.com/business-news/zillow-is-sticking-with-remote-work-cloudhq-says-ceo/486254</a>&nbsp;</p><br><p>🛡️<strong> CVE of the Week</strong></p><br><p><strong>22:09 – CVE-2024-54085 – AMI BMC Vulnerability</strong></p><p>•Critical Baseboard Management Controller (BMC) flaw affecting vendors like Dell, HP, Lenovo &amp; more</p><p>•CVSS 10.0 — Full takeover potential, even remote firmware flashing</p><p>•Flaw allows attackers to access servers via default remote management ports</p><p>•Mitigation tips:</p><p>•Whitelist admin access</p><p>•Patch, patch, patch — and don’t delay firmware updates!</p><p>•<a href="https://www.securityweek.com/critical-ami-bmc-vulnerability-exposes-servers-to-disruption-takeover/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-ami-bmc-vulnerability-exposes-servers-to-disruption-takeover/</a>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Top Ten: Technologies Older Than You Think</title>
			<itunes:title>Top Ten: Technologies Older Than You Think</itunes:title>
			<pubDate>Wed, 19 Mar 2025 15:45:00 GMT</pubDate>
			<itunes:duration>41:59</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67d8a258d1082558c5f40e81/media.mp3" length="725745112" type="audio/mpeg"/>
			<guid isPermaLink="false">67d8a258d1082558c5f40e81</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-top-ten-episode-s01e01</link>
			<acast:episodeId>67d8a258d1082558c5f40e81</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-top-ten-episode-s01e01</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZFTzG1l4aWCfpOFSo9UlIUyK/HzUWX1On/2e+Rk1+gwRsJQW8GPEFOt7l1T0T6TAo7mgID5XP1Y5q2y18kXXBk]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Top Ten - Episode S01E01</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1742250837998-6093fa7f-90de-463d-8a4a-71308aa2382e.jpeg"/>
			<description><![CDATA[<p><strong>IT SPARC Cast - Top Ten: Technologies Older Than You Think</strong></p><br><p><strong>Episode Description</strong></p><br><p>Think that cutting-edge tech is brand new? Think again. In this episode of <em>IT SPARC Cast - Top Ten</em>, John Barger and Lou Schmidt count down the <strong>Top Ten Technologies That Are Older Than You Think</strong>. From the humble computer mouse to AI-powered neural networks, you’ll be shocked to discover just how far back these innovations actually go. Get ready for history, insights, and plenty of tech nostalgia.</p><br><p><strong>Timestamps &amp; Topics</strong></p><br><p>00:00 - <strong>Intro</strong></p><p>00:47 - <strong>#10 - The Computer Mouse</strong></p><p>03:50 - <strong>#9 - The Graphical User Interface</strong></p><p>07:23 - <strong>#8 - The Tablet Computer</strong></p><p>12:04 - <strong>#7 - Packet Switching</strong></p><p>15:31 - <strong>#6 - Wireless Networking</strong></p><p>20:18 - <strong>#5 - Public-Key Cryptography</strong></p><p>24:51 - <strong>#4 - Operating System Containers</strong></p><p>28:56 - <strong>#3 - Hypertext and the Web</strong></p><p>33:05 - <strong>#2 - The Hypervisor</strong></p><p>36:42 - <strong>#1 - Neural Networks and AI</strong></p><p>40:56 - <strong>Wrap Up</strong></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>IT SPARC Cast - Top Ten: Technologies Older Than You Think</strong></p><br><p><strong>Episode Description</strong></p><br><p>Think that cutting-edge tech is brand new? Think again. In this episode of <em>IT SPARC Cast - Top Ten</em>, John Barger and Lou Schmidt count down the <strong>Top Ten Technologies That Are Older Than You Think</strong>. From the humble computer mouse to AI-powered neural networks, you’ll be shocked to discover just how far back these innovations actually go. Get ready for history, insights, and plenty of tech nostalgia.</p><br><p><strong>Timestamps &amp; Topics</strong></p><br><p>00:00 - <strong>Intro</strong></p><p>00:47 - <strong>#10 - The Computer Mouse</strong></p><p>03:50 - <strong>#9 - The Graphical User Interface</strong></p><p>07:23 - <strong>#8 - The Tablet Computer</strong></p><p>12:04 - <strong>#7 - Packet Switching</strong></p><p>15:31 - <strong>#6 - Wireless Networking</strong></p><p>20:18 - <strong>#5 - Public-Key Cryptography</strong></p><p>24:51 - <strong>#4 - Operating System Containers</strong></p><p>28:56 - <strong>#3 - Hypertext and the Web</strong></p><p>33:05 - <strong>#2 - The Hypervisor</strong></p><p>36:42 - <strong>#1 - Neural Networks and AI</strong></p><p>40:56 - <strong>Wrap Up</strong></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Unifi’s 10Gig WiFi 7 Upgrades & The Hidden Dangers of IoT]]></title>
			<itunes:title><![CDATA[Unifi’s 10Gig WiFi 7 Upgrades & The Hidden Dangers of IoT]]></itunes:title>
			<pubDate>Fri, 14 Mar 2025 19:52:33 GMT</pubDate>
			<itunes:duration>34:52</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67d48902df1120216fc75f66/media.mp3" length="602718208" type="audio/mpeg"/>
			<guid isPermaLink="false">67d48902df1120216fc75f66</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e28</link>
			<acast:episodeId>67d48902df1120216fc75f66</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e28</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZB9PcvCxAhqkon5BliFm7odmH0/yhJ5u1IuBH6Rj9e+UMtnwUQoVAHvy14KIGRE7s7WkhwWVwaIlCX3kGlrn77]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E28</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>28</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1741981850580-128d8c27-e16b-43fe-85b3-baeb2ab9f44b.jpeg"/>
			<description><![CDATA[<p>In Episode 28 of <strong>IT SPARC Cast</strong>, John and Lou uncover the latest <strong>PowerSchool student data breach</strong>, exposing security failures in K-12 education. They also dive into <strong>Ubiquiti’s new 10Gig WiFi 7 access points</strong>, Google and HP’s <strong>3D video calling breakthrough</strong>, and Broadcom’s <strong>profit surge after acquiring VMware</strong>. In the <strong>CVE of the Week</strong>, they dissect a <strong>shocking backdoor in ESP32 Bluetooth chips</strong>, affecting billions of IoT devices. If you thought your smart home was secure—think again.</p><br><p>🔹 <strong>Show Notes &amp; Timestamps</strong></p><br><p><strong>00:00 - Intro</strong></p><p>•Welcome to IT SPARC Cast, your weekly IT news digest with insights, opinions, and sarcasm.</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:54 - PowerSchool’s Student Data Breach</strong></p><p>•PowerSchool, a widely used K-12 student management system, suffered a data breach.</p><p>•<strong>Hacker gained access via compromised credentials</strong>, exposing records from thousands of schools.</p><p>•PowerSchool <strong>did not have multi-factor authentication (MFA) enabled</strong> at the time.</p><p>•Unanswered questions: <strong>How many students were affected? What data was stolen? Did they pay a ransom?</strong></p><p>•🔥 <em>Is your child’s school at risk?</em></p><br><p><strong>05:12 - Unifi Releases 10Gig WiFi 7 Access Points</strong></p><p>•Unifi redeems itself after last week’s WiFi 7 controversy with <strong>U7 Pro XG and U7 Pro XGS</strong>.</p><p>•<strong>Features:</strong></p><p>•10G Ethernet for <strong>high-speed connectivity</strong>.</p><p>•<strong>5.8 Gbps on 6 GHz</strong>, <strong>up to 500 concurrent clients</strong>.</p><p>•<strong>Zero-Wait DFS</strong> for dynamic frequency selection.</p><p>•<strong>Real-world speeds?</strong> Maybe not. But John is upgrading his entire setup!</p><br><p><strong>09:11 - Mail Bag</strong></p><p>•Listener feedback dominates!</p><p>•Issues reported with <strong>WiFi 7 dropping IoT devices</strong>—John and Lou investigate.</p><p>•Debate over whether <strong>corporate customers care about 6GHz WiFi</strong>.</p><p>•Heated discussion: Should lower-end access points always include <strong>software-defined radios</strong>?</p><br><p><strong>17:49 - Google and HP Announce 3D Video Calling</strong></p><p>•Google’s <strong>Project Starline</strong> introduces <strong>light field displays</strong> for <strong>true-to-life</strong> video calls.</p><p>•HP to help bring it to market.</p><p>•<strong>WSJ review:</strong> “Felt like an object was crossing into my space.”</p><p>•Could this finally break the illusion of remote work video calls?</p><br><p><strong>21:54 - VMware Boosts Broadcom’s Bottom Line</strong></p><p>•Broadcom’s <strong>VMware acquisition is paying off BIG</strong>—$5.5B in quarterly profits.</p><p>•70% of large VMware customers are <strong>buying into premium bundles</strong>.</p><p>•Broadcom is <strong>ditching small customers</strong> and focusing on those who pay the “VMware Tax.”</p><p>•<em>Is this sustainable?</em></p><br><p>🚨<strong> CVE of the Week</strong></p><br><p><strong>27:24 - Undocumented Commands Found in ESP32 Bluetooth Chips</strong></p><p>•Billions of IoT devices affected by a <strong>backdoor in ESP32 chips</strong>.</p><p>•<strong>Security researchers found 29 hidden commands</strong>, allowing:</p><p>•<strong>Memory manipulation (RAM &amp; Flash writing)</strong>.</p><p>•<strong>MAC address spoofing</strong>.</p><p>•<strong>Packet injection for hacking other devices</strong>.</p><p>•Expressif claims it was <strong>for debugging</strong>, but will now remove it.</p><p>•<strong>Are your smart home devices at risk?</strong> Check your firmware!</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 28 of <strong>IT SPARC Cast</strong>, John and Lou uncover the latest <strong>PowerSchool student data breach</strong>, exposing security failures in K-12 education. They also dive into <strong>Ubiquiti’s new 10Gig WiFi 7 access points</strong>, Google and HP’s <strong>3D video calling breakthrough</strong>, and Broadcom’s <strong>profit surge after acquiring VMware</strong>. In the <strong>CVE of the Week</strong>, they dissect a <strong>shocking backdoor in ESP32 Bluetooth chips</strong>, affecting billions of IoT devices. If you thought your smart home was secure—think again.</p><br><p>🔹 <strong>Show Notes &amp; Timestamps</strong></p><br><p><strong>00:00 - Intro</strong></p><p>•Welcome to IT SPARC Cast, your weekly IT news digest with insights, opinions, and sarcasm.</p><br><p>⸻</p><br><p>📰<strong> News Bytes</strong></p><br><p><strong>00:54 - PowerSchool’s Student Data Breach</strong></p><p>•PowerSchool, a widely used K-12 student management system, suffered a data breach.</p><p>•<strong>Hacker gained access via compromised credentials</strong>, exposing records from thousands of schools.</p><p>•PowerSchool <strong>did not have multi-factor authentication (MFA) enabled</strong> at the time.</p><p>•Unanswered questions: <strong>How many students were affected? What data was stolen? Did they pay a ransom?</strong></p><p>•🔥 <em>Is your child’s school at risk?</em></p><br><p><strong>05:12 - Unifi Releases 10Gig WiFi 7 Access Points</strong></p><p>•Unifi redeems itself after last week’s WiFi 7 controversy with <strong>U7 Pro XG and U7 Pro XGS</strong>.</p><p>•<strong>Features:</strong></p><p>•10G Ethernet for <strong>high-speed connectivity</strong>.</p><p>•<strong>5.8 Gbps on 6 GHz</strong>, <strong>up to 500 concurrent clients</strong>.</p><p>•<strong>Zero-Wait DFS</strong> for dynamic frequency selection.</p><p>•<strong>Real-world speeds?</strong> Maybe not. But John is upgrading his entire setup!</p><br><p><strong>09:11 - Mail Bag</strong></p><p>•Listener feedback dominates!</p><p>•Issues reported with <strong>WiFi 7 dropping IoT devices</strong>—John and Lou investigate.</p><p>•Debate over whether <strong>corporate customers care about 6GHz WiFi</strong>.</p><p>•Heated discussion: Should lower-end access points always include <strong>software-defined radios</strong>?</p><br><p><strong>17:49 - Google and HP Announce 3D Video Calling</strong></p><p>•Google’s <strong>Project Starline</strong> introduces <strong>light field displays</strong> for <strong>true-to-life</strong> video calls.</p><p>•HP to help bring it to market.</p><p>•<strong>WSJ review:</strong> “Felt like an object was crossing into my space.”</p><p>•Could this finally break the illusion of remote work video calls?</p><br><p><strong>21:54 - VMware Boosts Broadcom’s Bottom Line</strong></p><p>•Broadcom’s <strong>VMware acquisition is paying off BIG</strong>—$5.5B in quarterly profits.</p><p>•70% of large VMware customers are <strong>buying into premium bundles</strong>.</p><p>•Broadcom is <strong>ditching small customers</strong> and focusing on those who pay the “VMware Tax.”</p><p>•<em>Is this sustainable?</em></p><br><p>🚨<strong> CVE of the Week</strong></p><br><p><strong>27:24 - Undocumented Commands Found in ESP32 Bluetooth Chips</strong></p><p>•Billions of IoT devices affected by a <strong>backdoor in ESP32 chips</strong>.</p><p>•<strong>Security researchers found 29 hidden commands</strong>, allowing:</p><p>•<strong>Memory manipulation (RAM &amp; Flash writing)</strong>.</p><p>•<strong>MAC address spoofing</strong>.</p><p>•<strong>Packet injection for hacking other devices</strong>.</p><p>•Expressif claims it was <strong>for debugging</strong>, but will now remove it.</p><p>•<strong>Are your smart home devices at risk?</strong> Check your firmware!</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Data Privacy Under Attack: Apple, the UK, and the Global Encryption Crackdown</title>
			<itunes:title>Data Privacy Under Attack: Apple, the UK, and the Global Encryption Crackdown</itunes:title>
			<pubDate>Wed, 12 Mar 2025 15:45:00 GMT</pubDate>
			<itunes:duration>39:47</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67cf23921d5ad0b32e7ca3d3/media.mp3" length="687679084" type="audio/mpeg"/>
			<guid isPermaLink="false">67cf23921d5ad0b32e7ca3d3</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-deep-dive-episode-s01e14</link>
			<acast:episodeId>67cf23921d5ad0b32e7ca3d3</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-deep-dive-episode-s01e14</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ahLPN2qCKqKfq9N+W90Lw8mkrOap4luyr87HktZ9oQhOwLU4WPo76ffLOhE0Bf7ArfeBmnCXC1qV50MucSxgQ4]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Deep Dive - Episode S01E14</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>14</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1741628041067-82a324f2-5275-4789-b37f-2fa31a1e115a.jpeg"/>
			<description><![CDATA[<p>Governments worldwide are ramping up efforts to undermine data privacy, and the UK is leading the charge with its Investigatory Powers Act (IPA). In this explosive <em>IT SPARC Cast - Deep Dive</em>, we dissect Apple’s quiet resistance against the UK’s demand for a backdoor into encrypted iCloud data, the global trends in encryption regulation, and what this means for businesses and individuals alike. Are you already compromised? How can you protect your data? This episode is a must-listen for anyone concerned about privacy in the digital age.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>00:00 - Intro</strong></p><p>•Introduction to the Deep Dive series and this episode’s focus on data privacy and international law.</p><p>•Recap of the February 14th IT SPARC Cast discussion on the UK’s demand for an iCloud backdoor.</p><br><p><strong>02:10 - Update - Apple and the UK Investigatory Powers Act</strong></p><p>•Overview of Apple’s Advanced Data Protection feature and its role in end-to-end encryption.</p><p>•The UK’s <em>Investigatory Powers Act</em> (IPA) and its demand for unrestricted access to global iCloud data.</p><p>•Apple’s reported resistance and strategic information leaks.</p><br><p><strong>06:00 - The Link Between Free Speech and Your Data</strong></p><p>•How governments use national security as an excuse to restrict free speech and access private data.</p><p>•The UK’s increasing reach beyond its borders, threatening global free speech rights.</p><p>•Apple’s decision to remove ADP from the UK and its broader implications.</p><br><p><strong>11:00 - Encryption Regulation Across the Globe</strong></p><p>•Comparative analysis of global encryption laws:</p><p>•<strong>USA:</strong> CALEA &amp; All Writs Act—public legal battles vs. secret FISA warrants.</p><p>•<strong>Australia:</strong> A near carbon-copy of the UK’s IPA.</p><p>•<strong>China &amp; Russia:</strong> Open surveillance with zero pretense of privacy rights.</p><p>•<strong>European Union:</strong> GDPR conflicts with local security mandates.</p><p>•<strong>India:</strong> Broad government control over encryption access.</p><p>•The increasing pressure on tech companies to comply with global surveillance laws.</p><br><p><strong>19:10 - Understand Your Risk</strong></p><p>•If your data provider operates in the UK, assume you are already at risk.</p><p>•Risks extend beyond corporate data—this affects individual users, too.</p><p>•The reality of secret technical compliance notices (TCNs) and why you may never hear about breaches.</p><br><p><strong>26:03 - Mitigate Your Risk</strong></p><p>•Practical steps to protect yourself:</p><p>•Encrypt data independently—don’t rely solely on cloud providers.</p><p>•Demand transparency from service providers and push for indemnification.</p><p>•Segment and localize data to minimize exposure to hostile regulations.</p><p>•Consider using ZeroTrust architectures and implementing rigorous access controls.</p><br><p><strong>31:44 - Future Topic - Warrant Canaries</strong></p><p>•Introduction to warrant canaries—a mechanism companies can use to hint at secret government data requests.</p><p>•How warrant canaries could be a game-changer for transparency and data security.</p><br><p><strong>34:40 - Call to Action</strong></p><p>•Steps you must take NOW to secure your data before it’s too late.</p><p>•Why businesses must hold cloud providers accountable for potential breaches.</p><p>•The importance of legal consultation before storing data in high-risk regions.</p><br><p><strong>38:35 - Wrap Up</strong></p><p>•Call for listener feedback—do you want more episodes on global data privacy?</p><br><p>🚨 <strong>Your privacy is under attack.</strong> Stay ahead of government overreach—listen now and take action! 🚨</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Governments worldwide are ramping up efforts to undermine data privacy, and the UK is leading the charge with its Investigatory Powers Act (IPA). In this explosive <em>IT SPARC Cast - Deep Dive</em>, we dissect Apple’s quiet resistance against the UK’s demand for a backdoor into encrypted iCloud data, the global trends in encryption regulation, and what this means for businesses and individuals alike. Are you already compromised? How can you protect your data? This episode is a must-listen for anyone concerned about privacy in the digital age.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>00:00 - Intro</strong></p><p>•Introduction to the Deep Dive series and this episode’s focus on data privacy and international law.</p><p>•Recap of the February 14th IT SPARC Cast discussion on the UK’s demand for an iCloud backdoor.</p><br><p><strong>02:10 - Update - Apple and the UK Investigatory Powers Act</strong></p><p>•Overview of Apple’s Advanced Data Protection feature and its role in end-to-end encryption.</p><p>•The UK’s <em>Investigatory Powers Act</em> (IPA) and its demand for unrestricted access to global iCloud data.</p><p>•Apple’s reported resistance and strategic information leaks.</p><br><p><strong>06:00 - The Link Between Free Speech and Your Data</strong></p><p>•How governments use national security as an excuse to restrict free speech and access private data.</p><p>•The UK’s increasing reach beyond its borders, threatening global free speech rights.</p><p>•Apple’s decision to remove ADP from the UK and its broader implications.</p><br><p><strong>11:00 - Encryption Regulation Across the Globe</strong></p><p>•Comparative analysis of global encryption laws:</p><p>•<strong>USA:</strong> CALEA &amp; All Writs Act—public legal battles vs. secret FISA warrants.</p><p>•<strong>Australia:</strong> A near carbon-copy of the UK’s IPA.</p><p>•<strong>China &amp; Russia:</strong> Open surveillance with zero pretense of privacy rights.</p><p>•<strong>European Union:</strong> GDPR conflicts with local security mandates.</p><p>•<strong>India:</strong> Broad government control over encryption access.</p><p>•The increasing pressure on tech companies to comply with global surveillance laws.</p><br><p><strong>19:10 - Understand Your Risk</strong></p><p>•If your data provider operates in the UK, assume you are already at risk.</p><p>•Risks extend beyond corporate data—this affects individual users, too.</p><p>•The reality of secret technical compliance notices (TCNs) and why you may never hear about breaches.</p><br><p><strong>26:03 - Mitigate Your Risk</strong></p><p>•Practical steps to protect yourself:</p><p>•Encrypt data independently—don’t rely solely on cloud providers.</p><p>•Demand transparency from service providers and push for indemnification.</p><p>•Segment and localize data to minimize exposure to hostile regulations.</p><p>•Consider using ZeroTrust architectures and implementing rigorous access controls.</p><br><p><strong>31:44 - Future Topic - Warrant Canaries</strong></p><p>•Introduction to warrant canaries—a mechanism companies can use to hint at secret government data requests.</p><p>•How warrant canaries could be a game-changer for transparency and data security.</p><br><p><strong>34:40 - Call to Action</strong></p><p>•Steps you must take NOW to secure your data before it’s too late.</p><p>•Why businesses must hold cloud providers accountable for potential breaches.</p><p>•The importance of legal consultation before storing data in high-risk regions.</p><br><p><strong>38:35 - Wrap Up</strong></p><p>•Call for listener feedback—do you want more episodes on global data privacy?</p><br><p>🚨 <strong>Your privacy is under attack.</strong> Stay ahead of government overreach—listen now and take action! 🚨</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Ubiquiti’s WiFi 7 Bait & Switch, Employee Surveillance, and the Danger of Old CVEs]]></title>
			<itunes:title><![CDATA[Ubiquiti’s WiFi 7 Bait & Switch, Employee Surveillance, and the Danger of Old CVEs]]></itunes:title>
			<pubDate>Fri, 07 Mar 2025 22:35:39 GMT</pubDate>
			<itunes:duration>39:30</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67cb74bcbaaeff02dc0e4eab/media.mp3" length="682754164" type="audio/mpeg"/>
			<guid isPermaLink="false">67cb74bcbaaeff02dc0e4eab</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e27</link>
			<acast:episodeId>67cb74bcbaaeff02dc0e4eab</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e27</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7btaLWjSSt4b4Vh9yH4uu+xwXn87+ukiTswwBgQOp2UDqNsN6lhAazwQ0KFWdk3Tr9Imx3ujZbuSS6leqPA/U8P]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E27</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>27</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1741386488302-feaad668-3f97-488e-ab1a-ee653e12a623.jpeg"/>
			<description><![CDATA[<p>In Episode 27 of <strong>IT SPARC Cast</strong>, John and Lou break down <strong>Ubiquiti’s misleading WiFi 7 marketing</strong>, revealing why some so-called <strong>WiFi 7 access points lack 6GHz radios</strong>. They also discuss <strong>Google’s new Free Space Optics (FSO) technology</strong>, how <strong>employers are tracking employees in ways you may not realize</strong>, and <strong>Microsoft’s final goodbye to Skype</strong>. In the <strong>CVE of the Week</strong>, they expose the <strong>real danger of old vulnerabilities</strong>, proving that <strong>if you’re not patching, you’re already compromised</strong>.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>Ubiquiti’s WiFi 7 Bait &amp; Switch</strong></p><p>•<strong>Ubiquiti releases “WiFi 7” access points</strong>—but <strong>without 6GHz radios</strong>.</p><p>•<strong>Key issue:</strong> <strong>WiFi 7 is only truly WiFi 7 when it supports 6GHz.</strong></p><p>•<strong>Marketing vs. reality:</strong> Is this <strong>a deceptive branding move</strong> or just <strong>poor communication</strong>?</p><p>•<strong>Impact for IT pros:</strong></p><p>•If you buy <strong>these “WiFi 7” APs</strong>, will you need to <strong>replace them sooner</strong> than expected?</p><p>•How will this affect <strong>enterprise network planning</strong>?</p><p>•<strong>John’s take:</strong> <strong>IT leaders should be skeptical of networking hardware marketing claims</strong>.</p><br><p><strong>News Bytes</strong></p><br><p><strong>Google’s Taara Unveils New FSO Tech Powered by Light</strong></p><p>•<strong>Google’s Project Taara introduces a 10Gbps Free Space Optics (FSO) solution.</strong></p><p>•<strong>What is FSO?</strong> A wireless networking technology that uses <strong>infrared lasers</strong> instead of radio signals.</p><p>•<a href="https://www.wired.com/story/plaintext-google-taara-chip-internet-by-light/" rel="noopener noreferrer" target="_blank">https://www.wired.com/story/plaintext-google-taara-chip-internet-by-light/</a>&nbsp;</p><p>•<a href="https://x.company/blog/posts/taara-chip/" rel="noopener noreferrer" target="_blank">https://x.company/blog/posts/taara-chip/</a>&nbsp;</p><br><p><strong>Bosses Don’t Need a ‘What Did You Do’ Email. They’re Already Tracking You.</strong></p><p>•<strong>New reports reveal that AI-driven employee surveillance is more advanced than most realize.</strong></p><p>•<a href="https://www.wsj.com/business/doge-elon-musk-email-corporate-worker-tracking-56f593ff" rel="noopener noreferrer" target="_blank">https://www.wsj.com/business/doge-elon-musk-email-corporate-worker-tracking-56f593ff</a>&nbsp;</p><br><p><strong>Microsoft Hangs Up on Skype After 23 years</strong></p><p>•<strong>Teams is the new priority</strong></p><p>•<strong>John &amp; Lou share personal stories about what Skype means to them.</strong></p><p>•<a href="https://techcrunch.com/2025/02/28/microsoft-hangs-up-on-skype-service-to-shut-down-may-5-2025/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/02/28/microsoft-hangs-up-on-skype-service-to-shut-down-may-5-2025/</a>&nbsp;</p><br><p><strong>CVE of the Week</strong></p><br><p><strong>Old vulnerabilities are still being exploited—years after disclosure.</strong></p><p>•<strong>Key CVEs currently active in attacks:</strong></p><p>•CVE-2023-20118</p><p>•CVE-2023-20025</p><p>•CVE-2018-8639 </p><p>•<a href="https://www.bleepingcomputer.com/news/security/cisa-tags-windows-and-cisco-vulnerabilities-as-actively-exploited/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-tags-windows-and-cisco-vulnerabilities-as-actively-exploited/</a>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 27 of <strong>IT SPARC Cast</strong>, John and Lou break down <strong>Ubiquiti’s misleading WiFi 7 marketing</strong>, revealing why some so-called <strong>WiFi 7 access points lack 6GHz radios</strong>. They also discuss <strong>Google’s new Free Space Optics (FSO) technology</strong>, how <strong>employers are tracking employees in ways you may not realize</strong>, and <strong>Microsoft’s final goodbye to Skype</strong>. In the <strong>CVE of the Week</strong>, they expose the <strong>real danger of old vulnerabilities</strong>, proving that <strong>if you’re not patching, you’re already compromised</strong>.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>Ubiquiti’s WiFi 7 Bait &amp; Switch</strong></p><p>•<strong>Ubiquiti releases “WiFi 7” access points</strong>—but <strong>without 6GHz radios</strong>.</p><p>•<strong>Key issue:</strong> <strong>WiFi 7 is only truly WiFi 7 when it supports 6GHz.</strong></p><p>•<strong>Marketing vs. reality:</strong> Is this <strong>a deceptive branding move</strong> or just <strong>poor communication</strong>?</p><p>•<strong>Impact for IT pros:</strong></p><p>•If you buy <strong>these “WiFi 7” APs</strong>, will you need to <strong>replace them sooner</strong> than expected?</p><p>•How will this affect <strong>enterprise network planning</strong>?</p><p>•<strong>John’s take:</strong> <strong>IT leaders should be skeptical of networking hardware marketing claims</strong>.</p><br><p><strong>News Bytes</strong></p><br><p><strong>Google’s Taara Unveils New FSO Tech Powered by Light</strong></p><p>•<strong>Google’s Project Taara introduces a 10Gbps Free Space Optics (FSO) solution.</strong></p><p>•<strong>What is FSO?</strong> A wireless networking technology that uses <strong>infrared lasers</strong> instead of radio signals.</p><p>•<a href="https://www.wired.com/story/plaintext-google-taara-chip-internet-by-light/" rel="noopener noreferrer" target="_blank">https://www.wired.com/story/plaintext-google-taara-chip-internet-by-light/</a>&nbsp;</p><p>•<a href="https://x.company/blog/posts/taara-chip/" rel="noopener noreferrer" target="_blank">https://x.company/blog/posts/taara-chip/</a>&nbsp;</p><br><p><strong>Bosses Don’t Need a ‘What Did You Do’ Email. They’re Already Tracking You.</strong></p><p>•<strong>New reports reveal that AI-driven employee surveillance is more advanced than most realize.</strong></p><p>•<a href="https://www.wsj.com/business/doge-elon-musk-email-corporate-worker-tracking-56f593ff" rel="noopener noreferrer" target="_blank">https://www.wsj.com/business/doge-elon-musk-email-corporate-worker-tracking-56f593ff</a>&nbsp;</p><br><p><strong>Microsoft Hangs Up on Skype After 23 years</strong></p><p>•<strong>Teams is the new priority</strong></p><p>•<strong>John &amp; Lou share personal stories about what Skype means to them.</strong></p><p>•<a href="https://techcrunch.com/2025/02/28/microsoft-hangs-up-on-skype-service-to-shut-down-may-5-2025/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/02/28/microsoft-hangs-up-on-skype-service-to-shut-down-may-5-2025/</a>&nbsp;</p><br><p><strong>CVE of the Week</strong></p><br><p><strong>Old vulnerabilities are still being exploited—years after disclosure.</strong></p><p>•<strong>Key CVEs currently active in attacks:</strong></p><p>•CVE-2023-20118</p><p>•CVE-2023-20025</p><p>•CVE-2018-8639 </p><p>•<a href="https://www.bleepingcomputer.com/news/security/cisa-tags-windows-and-cisco-vulnerabilities-as-actively-exploited/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-tags-windows-and-cisco-vulnerabilities-as-actively-exploited/</a>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Disney’s AI Disaster, Microsoft’s Free Office, and Weaponized AI Lawsuits</title>
			<itunes:title>Disney’s AI Disaster, Microsoft’s Free Office, and Weaponized AI Lawsuits</itunes:title>
			<pubDate>Fri, 28 Feb 2025 18:11:38 GMT</pubDate>
			<itunes:duration>40:34</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67c1fc5be5091241f3684d98/media.mp3" length="701036428" type="audio/mpeg"/>
			<guid isPermaLink="false">67c1fc5be5091241f3684d98</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e26</link>
			<acast:episodeId>67c1fc5be5091241f3684d98</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e26</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bHoMwD+OddooCvLc9+YhJY6xj51ZoFrhOEoFA4fxKOrpn5S5C4or7JyuAN1x9xqTghMOaGEWyV0eBOb9YYKzdb]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E26</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>26</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1740765740369-041558e4-3a79-4667-b411-4da18f325056.jpeg"/>
			<description><![CDATA[<p>In Episode 26 of <strong>IT SPARC Cast</strong>, John and Lou cover <strong>Bird’s surprising exit from the EU</strong>, <strong>Microsoft’s new free ad-supported Office suite</strong>, and <strong>Google &amp; Qualcomm’s commitment to 8 years of Android updates</strong>. They also delve into how <strong>disgruntled employees are weaponizing AI</strong> to overwhelm legal teams and discuss a shocking <strong>CVE of the Week</strong> where a <strong>Disney employee’s AI tool download</strong> led to <strong>personal and corporate chaos</strong>. This episode is packed with <strong>actionable insights</strong> for <strong>IT leaders, cybersecurity professionals</strong>, and <strong>tech enthusiasts</strong> alike.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>00:48 - Bird Flies the EU Coop</strong></p><p>•<strong>Dutch tech startup Bird</strong> is <strong>leaving Europe</strong> following <strong>increasing regulatory pressures</strong></p><p>•<a href="https://www.reuters.com/technology/dutch-software-firm-bird-leave-europe-due-onerous-regulations-ai-era-says-ceo-2025-02-24" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/dutch-software-firm-bird-leave-europe-due-onerous-regulations-ai-era-says-ceo-2025-02-24</a>&nbsp;</p><br><p><strong>06:50 - Microsoft To Launch Free Ad-Supported Office</strong></p><p>•<strong>Microsoft Office</strong> is about to become <strong>free</strong>, but with a <strong>catch—advertising</strong>.</p><p>•<a href="https://www.windowscentral.com/software-apps/office-365/microsoft-quietly-launches-free-ad-supported-version-of-office-apps-for-windows-with-limited-functionality" rel="noopener noreferrer" target="_blank">https://www.windowscentral.com/software-apps/office-365/microsoft-quietly-launches-free-ad-supported-version-of-office-apps-for-windows-with-limited-functionality</a>&nbsp;</p><br><p><strong>11:34 - Google &amp; Qualcomm Promise 8 Years of Android Updates</strong></p><p>•Ensures <strong>device longevity</strong> and <strong>better ROI</strong> for <strong>enterprise IT investments</strong>.</p><p>•<a href="https://9to5google.com/2025/02/24/qualcomm-android-updates/" rel="noopener noreferrer" target="_blank">https://9to5google.com/2025/02/24/qualcomm-android-updates/</a>&nbsp;</p><br><p><strong>19:00 - Disgruntled Employees Are Leveraging AI To Overload Employer Legal Teams</strong></p><p>•<strong>Legal departments</strong> report an <strong>unprecedented increase</strong> in <strong>frivolous lawsuits</strong> and <strong>time-wasting legal requests</strong>.</p><p>•<a href="https://www.telegraph.co.uk/business/2025/02/22/angry-workers-use-ai-bombard-businesses-employment-lawsuits/" rel="noopener noreferrer" target="_blank">https://www.telegraph.co.uk/business/2025/02/22/angry-workers-use-ai-bombard-businesses-employment-lawsuits/</a>&nbsp;</p><br><p><strong>CVE of the Week</strong></p><br><p><strong>24:20 - A Disney Worker Downloaded an AI Tool. It Led to a Hack That Ruined His Life.</strong></p><p>•The tool had <strong>malicious code</strong> that accessed <strong>personal and corporate data</strong>.</p><p>•<a href="https://www.wsj.com/business/media/internal-disney-communications-leaked-online-after-hack-b57baaeb?mod=article_inline" rel="noopener noreferrer" target="_blank">https://www.wsj.com/business/media/internal-disney-communications-leaked-online-after-hack-b57baaeb?mod=article_inline</a>&nbsp;</p><p>•<a href="https://www.wsj.com/business/media/leaked-disney-data-reveals-financial-and-strategy-secrets-56573020?mod=article_inline" rel="noopener noreferrer" target="_blank">https://www.wsj.com/business/media/leaked-disney-data-reveals-financial-and-strategy-secrets-56573020?mod=article_inline</a>&nbsp;</p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 26 of <strong>IT SPARC Cast</strong>, John and Lou cover <strong>Bird’s surprising exit from the EU</strong>, <strong>Microsoft’s new free ad-supported Office suite</strong>, and <strong>Google &amp; Qualcomm’s commitment to 8 years of Android updates</strong>. They also delve into how <strong>disgruntled employees are weaponizing AI</strong> to overwhelm legal teams and discuss a shocking <strong>CVE of the Week</strong> where a <strong>Disney employee’s AI tool download</strong> led to <strong>personal and corporate chaos</strong>. This episode is packed with <strong>actionable insights</strong> for <strong>IT leaders, cybersecurity professionals</strong>, and <strong>tech enthusiasts</strong> alike.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>00:48 - Bird Flies the EU Coop</strong></p><p>•<strong>Dutch tech startup Bird</strong> is <strong>leaving Europe</strong> following <strong>increasing regulatory pressures</strong></p><p>•<a href="https://www.reuters.com/technology/dutch-software-firm-bird-leave-europe-due-onerous-regulations-ai-era-says-ceo-2025-02-24" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/dutch-software-firm-bird-leave-europe-due-onerous-regulations-ai-era-says-ceo-2025-02-24</a>&nbsp;</p><br><p><strong>06:50 - Microsoft To Launch Free Ad-Supported Office</strong></p><p>•<strong>Microsoft Office</strong> is about to become <strong>free</strong>, but with a <strong>catch—advertising</strong>.</p><p>•<a href="https://www.windowscentral.com/software-apps/office-365/microsoft-quietly-launches-free-ad-supported-version-of-office-apps-for-windows-with-limited-functionality" rel="noopener noreferrer" target="_blank">https://www.windowscentral.com/software-apps/office-365/microsoft-quietly-launches-free-ad-supported-version-of-office-apps-for-windows-with-limited-functionality</a>&nbsp;</p><br><p><strong>11:34 - Google &amp; Qualcomm Promise 8 Years of Android Updates</strong></p><p>•Ensures <strong>device longevity</strong> and <strong>better ROI</strong> for <strong>enterprise IT investments</strong>.</p><p>•<a href="https://9to5google.com/2025/02/24/qualcomm-android-updates/" rel="noopener noreferrer" target="_blank">https://9to5google.com/2025/02/24/qualcomm-android-updates/</a>&nbsp;</p><br><p><strong>19:00 - Disgruntled Employees Are Leveraging AI To Overload Employer Legal Teams</strong></p><p>•<strong>Legal departments</strong> report an <strong>unprecedented increase</strong> in <strong>frivolous lawsuits</strong> and <strong>time-wasting legal requests</strong>.</p><p>•<a href="https://www.telegraph.co.uk/business/2025/02/22/angry-workers-use-ai-bombard-businesses-employment-lawsuits/" rel="noopener noreferrer" target="_blank">https://www.telegraph.co.uk/business/2025/02/22/angry-workers-use-ai-bombard-businesses-employment-lawsuits/</a>&nbsp;</p><br><p><strong>CVE of the Week</strong></p><br><p><strong>24:20 - A Disney Worker Downloaded an AI Tool. It Led to a Hack That Ruined His Life.</strong></p><p>•The tool had <strong>malicious code</strong> that accessed <strong>personal and corporate data</strong>.</p><p>•<a href="https://www.wsj.com/business/media/internal-disney-communications-leaked-online-after-hack-b57baaeb?mod=article_inline" rel="noopener noreferrer" target="_blank">https://www.wsj.com/business/media/internal-disney-communications-leaked-online-after-hack-b57baaeb?mod=article_inline</a>&nbsp;</p><p>•<a href="https://www.wsj.com/business/media/leaked-disney-data-reveals-financial-and-strategy-secrets-56573020?mod=article_inline" rel="noopener noreferrer" target="_blank">https://www.wsj.com/business/media/leaked-disney-data-reveals-financial-and-strategy-secrets-56573020?mod=article_inline</a>&nbsp;</p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>JP Morgan CEO Jamie Dimon’s Rant: Is Remote Work Really to Blame?</title>
			<itunes:title>JP Morgan CEO Jamie Dimon’s Rant: Is Remote Work Really to Blame?</itunes:title>
			<pubDate>Tue, 25 Feb 2025 15:00:00 GMT</pubDate>
			<itunes:duration>28:23</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67bb66de19249d0c1a2d9e7f/media.mp3" length="490694296" type="audio/mpeg"/>
			<guid isPermaLink="false">67bb66de19249d0c1a2d9e7f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-deep-dive-episode-s01e13</link>
			<acast:episodeId>67bb66de19249d0c1a2d9e7f</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-deep-dive-episode-s01e13</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ayQS0aqomy9aM8lV3mpn352DASSLB9RIqMhC/wtbgzJ0pLhOfZRRQSjtrGRNOGbkMJKw5l+mLUmWcvRhcjY1wq]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Deep Dive - Episode S01E13</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>13</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1740334542561-615e3c37-3d9b-4f45-85c6-36767f07fd2d.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast - Deep Dive</strong>, John and Lou analyze <strong>Jamie Dimon’s fiery rant</strong> against <strong>remote work</strong>, where the <strong>JP Morgan CEO</strong> blames <strong>work-from-home policies</strong> for inefficiency, lack of creativity, and poor decision-making at his company. They <strong>dissect his arguments</strong>, revealing that <strong>the real issue might not be remote work</strong> but rather <strong>management and cultural problems</strong> within JP Morgan. From <strong>Amazon’s robot workforce</strong> to <strong>the pitfalls of CEO-driven RTO mandates</strong>, this episode provides a <strong>nuanced perspective</strong> on the <strong>ongoing remote work debate</strong>.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>Jamie Dimon and Remote Work: Breaking Down the Rant</strong></p><br><p><strong>00:00 - Rant from an Angry CEO</strong></p><p>•<strong>Jamie Dimon’s harsh words</strong>: “Work from home doesn’t work,” “People aren’t answering calls,” and <strong>blames remote work</strong> for <strong>poor efficiency and creativity.</strong></p><br><p><strong>02:37 - Intro</strong></p><p>•<strong>John and Lou introduce the episode</strong>, emphasizing the <strong>importance of remote work</strong> and why they <strong>disagree with Dimon’s stance</strong>.</p><br><p><strong>04:04 - Swearing &amp; Emotions Driving Decisions</strong></p><p>•Analysis of <strong>Dimon’s emotional state</strong> and why <strong>decisions made in anger</strong> are often <strong>misguided</strong>.</p><p>•John: “<strong>Policy changes need to be data-driven, not emotion-driven.</strong>”</p><br><p><strong>06:52 - Nobody Returning the CEO’s Phone Call - Is That A WFH Problem???</strong></p><p>•Lou and John agree: <strong>If employees are ghosting the CEO</strong>, it’s a <strong>cultural and management issue</strong>, <strong>not a remote work problem</strong>.</p><p>•John: “<strong>This is about respect and culture, not location.</strong>”</p><br><p><strong>08:48 - Multitasking During Meetings - Could This Meeting Have Been An Email?</strong></p><p>•John and Lou argue that <strong>checking emails or texting during meetings</strong> is <strong>not exclusive to remote work</strong>.</p><p>•They suggest <strong>re-evaluating whether meetings are necessary</strong> or if <strong>emails would suffice</strong>.</p><br><p><strong>11:09 - The In-Person Mentality Fallacy That’s Trendy Right Now</strong></p><p>•Lou calls out <strong>return-to-office mandates</strong> as a <strong>“silent firing” tactic</strong>.</p><p>•Discussion on how <strong>forcing office attendance</strong> is often <strong>more about control</strong> than <strong>business needs</strong>.</p><br><p><strong>14:05 - Younger Workers and Remote Work</strong></p><p>•Jamie Dimon claims <strong>remote work harms younger employees</strong>, but John and Lou highlight how <strong>Gen Z adapted well during the pandemic</strong>, leveraging <strong>digital tools like Discord and Signal</strong>.</p><br><p><strong>16:36 - CEO Attitudes Towards Work Ethics</strong></p><p>•Jamie Dimon mentioned <strong>working 7 days a week</strong>—but is that <strong>healthy or realistic</strong>?</p><p>•<strong>John and Lou discuss</strong> the <strong>toxic mentality</strong> of <strong>“I worked this hard, so should you”</strong>, particularly when <strong>Dimon earns $39 million annually</strong>.</p><br><p><strong>21:03 - The Bigger Picture And The Real Reason For Return To Office Mandates</strong></p><p>•<strong>Amazon’s robotic advancements</strong> have <strong>cut human labor by 25%</strong></p><p>•John suggests the <strong>push for RTO</strong> is <strong>more about quiet layoffs</strong> and <strong>preparing for automation</strong>, not <strong>improving productivity</strong>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast - Deep Dive</strong>, John and Lou analyze <strong>Jamie Dimon’s fiery rant</strong> against <strong>remote work</strong>, where the <strong>JP Morgan CEO</strong> blames <strong>work-from-home policies</strong> for inefficiency, lack of creativity, and poor decision-making at his company. They <strong>dissect his arguments</strong>, revealing that <strong>the real issue might not be remote work</strong> but rather <strong>management and cultural problems</strong> within JP Morgan. From <strong>Amazon’s robot workforce</strong> to <strong>the pitfalls of CEO-driven RTO mandates</strong>, this episode provides a <strong>nuanced perspective</strong> on the <strong>ongoing remote work debate</strong>.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>Jamie Dimon and Remote Work: Breaking Down the Rant</strong></p><br><p><strong>00:00 - Rant from an Angry CEO</strong></p><p>•<strong>Jamie Dimon’s harsh words</strong>: “Work from home doesn’t work,” “People aren’t answering calls,” and <strong>blames remote work</strong> for <strong>poor efficiency and creativity.</strong></p><br><p><strong>02:37 - Intro</strong></p><p>•<strong>John and Lou introduce the episode</strong>, emphasizing the <strong>importance of remote work</strong> and why they <strong>disagree with Dimon’s stance</strong>.</p><br><p><strong>04:04 - Swearing &amp; Emotions Driving Decisions</strong></p><p>•Analysis of <strong>Dimon’s emotional state</strong> and why <strong>decisions made in anger</strong> are often <strong>misguided</strong>.</p><p>•John: “<strong>Policy changes need to be data-driven, not emotion-driven.</strong>”</p><br><p><strong>06:52 - Nobody Returning the CEO’s Phone Call - Is That A WFH Problem???</strong></p><p>•Lou and John agree: <strong>If employees are ghosting the CEO</strong>, it’s a <strong>cultural and management issue</strong>, <strong>not a remote work problem</strong>.</p><p>•John: “<strong>This is about respect and culture, not location.</strong>”</p><br><p><strong>08:48 - Multitasking During Meetings - Could This Meeting Have Been An Email?</strong></p><p>•John and Lou argue that <strong>checking emails or texting during meetings</strong> is <strong>not exclusive to remote work</strong>.</p><p>•They suggest <strong>re-evaluating whether meetings are necessary</strong> or if <strong>emails would suffice</strong>.</p><br><p><strong>11:09 - The In-Person Mentality Fallacy That’s Trendy Right Now</strong></p><p>•Lou calls out <strong>return-to-office mandates</strong> as a <strong>“silent firing” tactic</strong>.</p><p>•Discussion on how <strong>forcing office attendance</strong> is often <strong>more about control</strong> than <strong>business needs</strong>.</p><br><p><strong>14:05 - Younger Workers and Remote Work</strong></p><p>•Jamie Dimon claims <strong>remote work harms younger employees</strong>, but John and Lou highlight how <strong>Gen Z adapted well during the pandemic</strong>, leveraging <strong>digital tools like Discord and Signal</strong>.</p><br><p><strong>16:36 - CEO Attitudes Towards Work Ethics</strong></p><p>•Jamie Dimon mentioned <strong>working 7 days a week</strong>—but is that <strong>healthy or realistic</strong>?</p><p>•<strong>John and Lou discuss</strong> the <strong>toxic mentality</strong> of <strong>“I worked this hard, so should you”</strong>, particularly when <strong>Dimon earns $39 million annually</strong>.</p><br><p><strong>21:03 - The Bigger Picture And The Real Reason For Return To Office Mandates</strong></p><p>•<strong>Amazon’s robotic advancements</strong> have <strong>cut human labor by 25%</strong></p><p>•John suggests the <strong>push for RTO</strong> is <strong>more about quiet layoffs</strong> and <strong>preparing for automation</strong>, not <strong>improving productivity</strong>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>AI Hallucinations in Court, Quantum Computing Breakthroughs, and a Major Palo Alto Firewall Vulnerability</title>
			<itunes:title>AI Hallucinations in Court, Quantum Computing Breakthroughs, and a Major Palo Alto Firewall Vulnerability</itunes:title>
			<pubDate>Fri, 21 Feb 2025 16:54:22 GMT</pubDate>
			<itunes:duration>34:16</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67b8afbfc0f169362a637456/media.mp3" length="592291792" type="audio/mpeg"/>
			<guid isPermaLink="false">67b8afbfc0f169362a637456</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e25</link>
			<acast:episodeId>67b8afbfc0f169362a637456</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e25</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7b9Rh4JEDhAsr8U2REeEOov2EMR6fcXd1onNj/OaRCDXGEBD9/ZwabyT3iHxIT0u+YhE2Zrdtn2mpE30+EAJf8X]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E25</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>25</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1740156517248-2158f52a-84aa-4d07-936f-b4785c9b5481.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast</strong>, John and Lou dive into <strong>AI’s legal pitfalls</strong>, discussing how <strong>AI hallucinations in court documents</strong> are causing trouble for lawyers. They also explore the <strong>quantum computing leap</strong> with <strong>Microsoft’s Majorana 1 chip</strong>, and dissect the <strong>draconian reorganization at Lloyds Bank</strong>. In the <strong>CVE of the Week</strong>, they break down the <strong>Palo Alto Networks firewall vulnerability </strong>and why <strong>patching your firewall</strong> should be your top priority.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>Morgan &amp; Morgan law firm</strong> sent an urgent email to over <strong>1,000 lawyers</strong> warning about <strong>AI-generated fake case law</strong>.</p><p>•A <strong>federal judge in Wyoming</strong> threatens to <strong>sanction two lawyers</strong> for <strong>fictitious citations</strong> created by AI.</p><p>•<a href="https://www.reuters.com/technology/artificial-intelligence/ai-hallucinations-court-papers-spell-trouble-lawyers-2025-02-18/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/artificial-intelligence/ai-hallucinations-court-papers-spell-trouble-lawyers-2025-02-18/</a>&nbsp;</p><br><p><strong>Mira Murati</strong>, former <strong>CTO of OpenAI</strong>, launches <strong>Thinking Machine Labs</strong>, a new <strong>AI startup</strong>.</p><p>•John and Lou discuss the <strong>commoditization of AI</strong> and predict a <strong>massive wave of AI innovation</strong> from <strong>new startups</strong>.</p><p>•<a href="https://techcrunch.com/2025/02/18/thinking-machines-lab-is-ex-openai-cto-mira-muratis-new-startup/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/02/18/thinking-machines-lab-is-ex-openai-cto-mira-muratis-new-startup/</a>&nbsp;</p><p>•<a href="https://www.nytimes.com/2025/02/18/technology/openai-mira-murati-startup.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2025/02/18/technology/openai-mira-murati-startup.html</a>&nbsp;</p><br><p><strong>Microsoft’s breakthrough quantum chip</strong>, <strong>Majorana 1</strong>, utilizes a <strong>new type of superconductor</strong>.</p><p>•How <strong>quantum computing</strong> might <strong>revolutionize IT infrastructure</strong>, and why <strong>IT professionals</strong> need to <strong>stay informed</strong>.</p><p>•<a href="https://news.microsoft.com/source/features/innovation/microsofts-majorana-1-chip-carves-new-path-for-quantum-computing/" rel="noopener noreferrer" target="_blank">https://news.microsoft.com/source/features/innovation/microsofts-majorana-1-chip-carves-new-path-for-quantum-computing/</a>&nbsp;</p><br><p><strong>Lloyds Bank Reviews Tech and Engineering Personnel in Draconian Reorg</strong> of its <strong>tech and engineering divisions</strong></p><p>•Targeting employees <strong>hired before November 2024</strong>.</p><p>•C<strong>oncerns loom about outsourcing to India</strong> loom large.</p><p>•<a href="https://www.theregister.com/2025/02/18/lloyds_tech_engineering_reorg/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2025/02/18/lloyds_tech_engineering_reorg/</a>&nbsp;</p><br><p><strong>CVE of the Week</strong></p><br><p><strong>Palo Alto Networks Firewall Vulnerability - CVE-2025-0108</strong></p><p>•<strong>Palo Alto </strong> confirms <strong>active exploitation</strong> of a <strong> vulnerability</strong> rated <strong>8.8</strong></p><p>•The exploit is being <strong>chained with</strong> <strong>CVE-2024-9474</strong> and <strong>CVE-2024-0012</strong>.</p><p>•<a href="https://www.assetnote.io/resources/research/nginx-apache-path-confusion-to-auth-bypass-in-pan-os" rel="noopener noreferrer" target="_blank">https://www.assetnote.io/resources/research/nginx-apache-path-confusion-to-auth-bypass-in-pan-os</a>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast</strong>, John and Lou dive into <strong>AI’s legal pitfalls</strong>, discussing how <strong>AI hallucinations in court documents</strong> are causing trouble for lawyers. They also explore the <strong>quantum computing leap</strong> with <strong>Microsoft’s Majorana 1 chip</strong>, and dissect the <strong>draconian reorganization at Lloyds Bank</strong>. In the <strong>CVE of the Week</strong>, they break down the <strong>Palo Alto Networks firewall vulnerability </strong>and why <strong>patching your firewall</strong> should be your top priority.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>Morgan &amp; Morgan law firm</strong> sent an urgent email to over <strong>1,000 lawyers</strong> warning about <strong>AI-generated fake case law</strong>.</p><p>•A <strong>federal judge in Wyoming</strong> threatens to <strong>sanction two lawyers</strong> for <strong>fictitious citations</strong> created by AI.</p><p>•<a href="https://www.reuters.com/technology/artificial-intelligence/ai-hallucinations-court-papers-spell-trouble-lawyers-2025-02-18/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/artificial-intelligence/ai-hallucinations-court-papers-spell-trouble-lawyers-2025-02-18/</a>&nbsp;</p><br><p><strong>Mira Murati</strong>, former <strong>CTO of OpenAI</strong>, launches <strong>Thinking Machine Labs</strong>, a new <strong>AI startup</strong>.</p><p>•John and Lou discuss the <strong>commoditization of AI</strong> and predict a <strong>massive wave of AI innovation</strong> from <strong>new startups</strong>.</p><p>•<a href="https://techcrunch.com/2025/02/18/thinking-machines-lab-is-ex-openai-cto-mira-muratis-new-startup/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/02/18/thinking-machines-lab-is-ex-openai-cto-mira-muratis-new-startup/</a>&nbsp;</p><p>•<a href="https://www.nytimes.com/2025/02/18/technology/openai-mira-murati-startup.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2025/02/18/technology/openai-mira-murati-startup.html</a>&nbsp;</p><br><p><strong>Microsoft’s breakthrough quantum chip</strong>, <strong>Majorana 1</strong>, utilizes a <strong>new type of superconductor</strong>.</p><p>•How <strong>quantum computing</strong> might <strong>revolutionize IT infrastructure</strong>, and why <strong>IT professionals</strong> need to <strong>stay informed</strong>.</p><p>•<a href="https://news.microsoft.com/source/features/innovation/microsofts-majorana-1-chip-carves-new-path-for-quantum-computing/" rel="noopener noreferrer" target="_blank">https://news.microsoft.com/source/features/innovation/microsofts-majorana-1-chip-carves-new-path-for-quantum-computing/</a>&nbsp;</p><br><p><strong>Lloyds Bank Reviews Tech and Engineering Personnel in Draconian Reorg</strong> of its <strong>tech and engineering divisions</strong></p><p>•Targeting employees <strong>hired before November 2024</strong>.</p><p>•C<strong>oncerns loom about outsourcing to India</strong> loom large.</p><p>•<a href="https://www.theregister.com/2025/02/18/lloyds_tech_engineering_reorg/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2025/02/18/lloyds_tech_engineering_reorg/</a>&nbsp;</p><br><p><strong>CVE of the Week</strong></p><br><p><strong>Palo Alto Networks Firewall Vulnerability - CVE-2025-0108</strong></p><p>•<strong>Palo Alto </strong> confirms <strong>active exploitation</strong> of a <strong> vulnerability</strong> rated <strong>8.8</strong></p><p>•The exploit is being <strong>chained with</strong> <strong>CVE-2024-9474</strong> and <strong>CVE-2024-0012</strong>.</p><p>•<a href="https://www.assetnote.io/resources/research/nginx-apache-path-confusion-to-auth-bypass-in-pan-os" rel="noopener noreferrer" target="_blank">https://www.assetnote.io/resources/research/nginx-apache-path-confusion-to-auth-bypass-in-pan-os</a>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>EU’s $200B AI Gamble, Workday’s AI Agent Platform, and the UK’s War on Privacy</title>
			<itunes:title>EU’s $200B AI Gamble, Workday’s AI Agent Platform, and the UK’s War on Privacy</itunes:title>
			<pubDate>Fri, 14 Feb 2025 19:30:20 GMT</pubDate>
			<itunes:duration>32:23</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67af99cc8fcb78617579bf59/media.mp3" length="559607140" type="audio/mpeg"/>
			<guid isPermaLink="false">67af99cc8fcb78617579bf59</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e24</link>
			<acast:episodeId>67af99cc8fcb78617579bf59</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e24</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bbZzMAu9Wcu+spbjSzLTbWUrDhFVL20c4Vl9JSpWoU2RffqnRsnv5ibov26YFNcr4vqj8Yug31krAHGpFuz4h/]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E24</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>24</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1739561168019-6b216c12-64e4-4c0b-9a4f-dc694f05d6c6.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast</strong>, John and Lou cover the <strong>EU’s massive $200 billion AI investment</strong>, the <strong>UK and US refusing to sign an international AI regulation pact</strong>, and <strong>Workday’s bold move into AI agent management</strong>. They also break down <strong>TikTok’s sideloading strategy on Android</strong>, and in the <strong>CVE of the Week</strong>, they go<strong> ballistic on the UK government’s demand for backdoor access to iCloud</strong>—a move that could shatter global privacy.</p><br><p><strong>News Bytes</strong></p><br><p><strong>00:56 - EU Launches InvestAI Initiative</strong></p><p>•The <strong>European Union commits €200 billion</strong> to AI development, hoping to compete with the US and China.</p><p>•Plans include <strong>AI gigafactories</strong> and a <strong>20-billion-euro fund</strong> for advanced chips.</p><p>•<a href="https://www.msn.com/en-us/money/companies/eu-pledges-200-billion-in-ai-spending-in-bid-to-catch-up-with-u-s-china/ar-AA1yO0Su" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/money/companies/eu-pledges-200-billion-in-ai-spending-in-bid-to-catch-up-with-u-s-china/ar-AA1yO0Su</a>&nbsp;</p><br><p><strong>03:30 - UK and US Refuse to Sign International AI Declaration</strong></p><p>•The <strong>UK and US reject an EU-led AI ethics agreement</strong></p><p>•The move fuels <strong>geopolitical tension in AI development</strong>—is regulation helping or hurting progress?</p><p>•Lou and John debate <strong>whether government oversight slows tech innovation</strong></p><p>•<a href="https://www.bbc.com/news/articles/c8edn0n58gwo" rel="noopener noreferrer" target="_blank">https://www.bbc.com/news/articles/c8edn0n58gwo</a>&nbsp;</p><br><p><strong>09:44 - Workday Launches a Platform to Manage AI Agents</strong></p><p>•Workday introduces <strong>AI agent tracking</strong> to help enterprises <strong>monitor, control, and disable AI agents</strong>.</p><p>•<a href="https://techcrunch.com/2025/02/11/workday-launches-a-platform-for-enterprises-to-manage-all-of-their-ai-agents-in-one-place/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/02/11/workday-launches-a-platform-for-enterprises-to-manage-all-of-their-ai-agents-in-one-place/</a>&nbsp;</p><br><p><strong>15:05 - TikTok Wants Android Users to Sideload Its App</strong></p><p>•With <strong>TikTok facing bans in multiple countries</strong>, ByteDance is now <strong>pushing users to sideload its app</strong> directly from its website.</p><p>•<strong>Why is this a security nightmare?</strong></p><p>•Bypasses Google’s <strong>Play Store security checks</strong>.</p><p>•Lou and John call this <strong>“a reckless move that prioritizes control over security.”</strong></p><p>•<a href="https://techcrunch.com/2025/02/10/tiktok-wants-android-users-to-sideload-its-app/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/02/10/tiktok-wants-android-users-to-sideload-its-app/</a>&nbsp;</p><br><p><strong>CVE of the Week</strong></p><br><p><strong>20:40 - The UK Wants Backdoor Access to iCloud</strong></p><p>•<strong>The UK government secretly orders Apple to provide decryption keys for iCloud data—WORLDWIDE.</strong></p><p>•<strong>John and Lou go off on why this is a ‘GOBAL vulnerability’ rather than a single security risk.</strong></p><p>•Apple is reportedly <strong>considering pulling iCloud services out of the UK entirely</strong> to resist compliance.</p><p>•<strong>“This isn’t just about UK citizens—this is an attack on global privacy.”</strong></p><p>•<a href="https://www.computerworld.com/article/3819834/uk-orders-apple-to-let-it-access-everyones-encrypted-data.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/3819834/uk-orders-apple-to-let-it-access-everyones-encrypted-data.html</a>&nbsp;</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast</strong>, John and Lou cover the <strong>EU’s massive $200 billion AI investment</strong>, the <strong>UK and US refusing to sign an international AI regulation pact</strong>, and <strong>Workday’s bold move into AI agent management</strong>. They also break down <strong>TikTok’s sideloading strategy on Android</strong>, and in the <strong>CVE of the Week</strong>, they go<strong> ballistic on the UK government’s demand for backdoor access to iCloud</strong>—a move that could shatter global privacy.</p><br><p><strong>News Bytes</strong></p><br><p><strong>00:56 - EU Launches InvestAI Initiative</strong></p><p>•The <strong>European Union commits €200 billion</strong> to AI development, hoping to compete with the US and China.</p><p>•Plans include <strong>AI gigafactories</strong> and a <strong>20-billion-euro fund</strong> for advanced chips.</p><p>•<a href="https://www.msn.com/en-us/money/companies/eu-pledges-200-billion-in-ai-spending-in-bid-to-catch-up-with-u-s-china/ar-AA1yO0Su" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/money/companies/eu-pledges-200-billion-in-ai-spending-in-bid-to-catch-up-with-u-s-china/ar-AA1yO0Su</a>&nbsp;</p><br><p><strong>03:30 - UK and US Refuse to Sign International AI Declaration</strong></p><p>•The <strong>UK and US reject an EU-led AI ethics agreement</strong></p><p>•The move fuels <strong>geopolitical tension in AI development</strong>—is regulation helping or hurting progress?</p><p>•Lou and John debate <strong>whether government oversight slows tech innovation</strong></p><p>•<a href="https://www.bbc.com/news/articles/c8edn0n58gwo" rel="noopener noreferrer" target="_blank">https://www.bbc.com/news/articles/c8edn0n58gwo</a>&nbsp;</p><br><p><strong>09:44 - Workday Launches a Platform to Manage AI Agents</strong></p><p>•Workday introduces <strong>AI agent tracking</strong> to help enterprises <strong>monitor, control, and disable AI agents</strong>.</p><p>•<a href="https://techcrunch.com/2025/02/11/workday-launches-a-platform-for-enterprises-to-manage-all-of-their-ai-agents-in-one-place/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/02/11/workday-launches-a-platform-for-enterprises-to-manage-all-of-their-ai-agents-in-one-place/</a>&nbsp;</p><br><p><strong>15:05 - TikTok Wants Android Users to Sideload Its App</strong></p><p>•With <strong>TikTok facing bans in multiple countries</strong>, ByteDance is now <strong>pushing users to sideload its app</strong> directly from its website.</p><p>•<strong>Why is this a security nightmare?</strong></p><p>•Bypasses Google’s <strong>Play Store security checks</strong>.</p><p>•Lou and John call this <strong>“a reckless move that prioritizes control over security.”</strong></p><p>•<a href="https://techcrunch.com/2025/02/10/tiktok-wants-android-users-to-sideload-its-app/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/02/10/tiktok-wants-android-users-to-sideload-its-app/</a>&nbsp;</p><br><p><strong>CVE of the Week</strong></p><br><p><strong>20:40 - The UK Wants Backdoor Access to iCloud</strong></p><p>•<strong>The UK government secretly orders Apple to provide decryption keys for iCloud data—WORLDWIDE.</strong></p><p>•<strong>John and Lou go off on why this is a ‘GOBAL vulnerability’ rather than a single security risk.</strong></p><p>•Apple is reportedly <strong>considering pulling iCloud services out of the UK entirely</strong> to resist compliance.</p><p>•<strong>“This isn’t just about UK citizens—this is an attack on global privacy.”</strong></p><p>•<a href="https://www.computerworld.com/article/3819834/uk-orders-apple-to-let-it-access-everyones-encrypted-data.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/3819834/uk-orders-apple-to-let-it-access-everyones-encrypted-data.html</a>&nbsp;</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adobe’s AI Contracts, OpenAI vs. Open Source, and DeepSeek’s Major Security Breach</title>
			<itunes:title>Adobe’s AI Contracts, OpenAI vs. Open Source, and DeepSeek’s Major Security Breach</itunes:title>
			<pubDate>Fri, 07 Feb 2025 19:30:24 GMT</pubDate>
			<itunes:duration>30:56</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67a65f50340a5590cdbddee5/media.mp3" length="534706264" type="audio/mpeg"/>
			<guid isPermaLink="false">67a65f50340a5590cdbddee5</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e23</link>
			<acast:episodeId>67a65f50340a5590cdbddee5</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e23</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bPcYlvxCdnuBJE2znLLDsSh6bpoO0Twd1Dy8kpyApZYdqS1a5cAUZIiYkRYz+MP0a+90IQsQUAPQUWpO8/S6UU]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E23</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>23</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1738956424769-992a7d5e-e2d0-41e0-87dd-e0d495c144bf.jpeg"/>
			<description><![CDATA[<p>In this episode of <strong>IT SPARC Cast</strong>, John and Lou cover <strong>Adobe Acrobat’s AI-powered contract analysis</strong>, <strong>Sam Altman’s admission that OpenAI has been on the wrong side of history</strong>, and <strong>Rackspace’s move away from VMware</strong> amid skyrocketing costs. They also discuss <strong>Stanford’s new $50 AI model</strong> and its potential to disrupt AI training. In the <strong>CVE of the Week</strong>, they expose DeepSeek’s <strong>massive security breach</strong>, where <strong>over a million sensitive records were leaked</strong>.</p><br><p><strong>Is OpenAI about to lose the AI war to open-source models? Is DeepSeek safe for enterprise use?</strong> Tune in to get expert analysis on these breaking stories.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>News Bytes</strong></p><p><strong>00:53 - Adobe Acrobat’s AI-Powered Contract Analysis</strong></p><p>•Adobe updates Acrobat with <strong>AI-assisted contract comparison</strong>, helping users <strong>spot discrepancies and hidden legal traps</strong>.</p><p>•<a href="https://www.engadget.com/ai/adobes-acrobat-ai-assistant-can-now-assess-contracts-for-you-140058723.html" rel="noopener noreferrer" target="_blank">https://www.engadget.com/ai/adobes-acrobat-ai-assistant-can-now-assess-contracts-for-you-140058723.html</a></p><br><p><strong>07:28 - Sam Altman Admits OpenAI Was Wrong on Open Source</strong></p><p>•<strong>Sam Altman acknowledges OpenAI has been on the “wrong side of history” regarding open-source AI</strong>—but will they change course?</p><p>•<a href="https://techcrunch.com/2025/01/31/sam-altman-believes-openai-has-been-on-the-wrong-side-of-history-concerning-open-source/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/01/31/sam-altman-believes-openai-has-been-on-the-wrong-side-of-history-concerning-open-source/</a></p><br><p><strong>10:55 - Rackspace Moving Away from VMware</strong></p><p>•Another major cloud provider, <strong>Rackspace, is ditching VMware</strong> for <strong>Platform9’s OpenStack-based cloud solution</strong>.</p><p>•Broadcom’s aggressive <strong>price hikes</strong> are pushing even big players away—what does this mean for VMware’s future?</p><p>•<a href="https://www.theregister.com/2025/02/05/rackspace_vmware_planet9_migration/?td=rt-3a" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2025/02/05/rackspace_vmware_planet9_migration/?td=rt-3a</a></p><br><p><strong>17:29 - Stanford’s New $50 AI Model</strong></p><p>•Researchers at <strong>Stanford &amp; the University of Washington</strong> trained a <strong>powerful AI model for just $50</strong>.</p><p>•The catch? It’s <strong>built on a Chinese open-source model from Alibaba’s Qwen lab</strong>.</p><p>•Could this be <strong>a game-changer for AI accessibility</strong>, or does it raise <strong>new security and data sovereignty concerns</strong>?</p><p>•<a href="https://techcrunch.com/2025/02/05/researchers-created-an-open-rival-to-openais-o1-reasoning-model-for-under-50/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/02/05/researchers-created-an-open-rival-to-openais-o1-reasoning-model-for-under-50/</a>&nbsp;&nbsp;</p><br><p><strong>CVE of the Week</strong></p><br><p><strong>23:06 - DeepSeek Has Deep Leaks</strong></p><p>•Security researchers at <strong>Wiz uncovered a massive data breach in DeepSeek’s backend</strong>, exposing:</p><p>•Over <strong>a million log entries</strong>.</p><p>•<strong>Software keys &amp; backend infrastructure details</strong>.</p><p>•<a href="https://www.csoonline.com/article/3813224/deepseek-leaks-one-million-sensitive-records-in-a-major-data-breach.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/3813224/deepseek-leaks-one-million-sensitive-records-in-a-major-data-breach.html</a>&nbsp;</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <strong>IT SPARC Cast</strong>, John and Lou cover <strong>Adobe Acrobat’s AI-powered contract analysis</strong>, <strong>Sam Altman’s admission that OpenAI has been on the wrong side of history</strong>, and <strong>Rackspace’s move away from VMware</strong> amid skyrocketing costs. They also discuss <strong>Stanford’s new $50 AI model</strong> and its potential to disrupt AI training. In the <strong>CVE of the Week</strong>, they expose DeepSeek’s <strong>massive security breach</strong>, where <strong>over a million sensitive records were leaked</strong>.</p><br><p><strong>Is OpenAI about to lose the AI war to open-source models? Is DeepSeek safe for enterprise use?</strong> Tune in to get expert analysis on these breaking stories.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>News Bytes</strong></p><p><strong>00:53 - Adobe Acrobat’s AI-Powered Contract Analysis</strong></p><p>•Adobe updates Acrobat with <strong>AI-assisted contract comparison</strong>, helping users <strong>spot discrepancies and hidden legal traps</strong>.</p><p>•<a href="https://www.engadget.com/ai/adobes-acrobat-ai-assistant-can-now-assess-contracts-for-you-140058723.html" rel="noopener noreferrer" target="_blank">https://www.engadget.com/ai/adobes-acrobat-ai-assistant-can-now-assess-contracts-for-you-140058723.html</a></p><br><p><strong>07:28 - Sam Altman Admits OpenAI Was Wrong on Open Source</strong></p><p>•<strong>Sam Altman acknowledges OpenAI has been on the “wrong side of history” regarding open-source AI</strong>—but will they change course?</p><p>•<a href="https://techcrunch.com/2025/01/31/sam-altman-believes-openai-has-been-on-the-wrong-side-of-history-concerning-open-source/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/01/31/sam-altman-believes-openai-has-been-on-the-wrong-side-of-history-concerning-open-source/</a></p><br><p><strong>10:55 - Rackspace Moving Away from VMware</strong></p><p>•Another major cloud provider, <strong>Rackspace, is ditching VMware</strong> for <strong>Platform9’s OpenStack-based cloud solution</strong>.</p><p>•Broadcom’s aggressive <strong>price hikes</strong> are pushing even big players away—what does this mean for VMware’s future?</p><p>•<a href="https://www.theregister.com/2025/02/05/rackspace_vmware_planet9_migration/?td=rt-3a" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2025/02/05/rackspace_vmware_planet9_migration/?td=rt-3a</a></p><br><p><strong>17:29 - Stanford’s New $50 AI Model</strong></p><p>•Researchers at <strong>Stanford &amp; the University of Washington</strong> trained a <strong>powerful AI model for just $50</strong>.</p><p>•The catch? It’s <strong>built on a Chinese open-source model from Alibaba’s Qwen lab</strong>.</p><p>•Could this be <strong>a game-changer for AI accessibility</strong>, or does it raise <strong>new security and data sovereignty concerns</strong>?</p><p>•<a href="https://techcrunch.com/2025/02/05/researchers-created-an-open-rival-to-openais-o1-reasoning-model-for-under-50/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/02/05/researchers-created-an-open-rival-to-openais-o1-reasoning-model-for-under-50/</a>&nbsp;&nbsp;</p><br><p><strong>CVE of the Week</strong></p><br><p><strong>23:06 - DeepSeek Has Deep Leaks</strong></p><p>•Security researchers at <strong>Wiz uncovered a massive data breach in DeepSeek’s backend</strong>, exposing:</p><p>•Over <strong>a million log entries</strong>.</p><p>•<strong>Software keys &amp; backend infrastructure details</strong>.</p><p>•<a href="https://www.csoonline.com/article/3813224/deepseek-leaks-one-million-sensitive-records-in-a-major-data-breach.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/3813224/deepseek-leaks-one-million-sensitive-records-in-a-major-data-breach.html</a>&nbsp;</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Listener Q&A - Elon Musk, RTO, and Selling Remote Work to the C-Suite]]></title>
			<itunes:title><![CDATA[Listener Q&A - Elon Musk, RTO, and Selling Remote Work to the C-Suite]]></itunes:title>
			<pubDate>Thu, 06 Feb 2025 17:31:14 GMT</pubDate>
			<itunes:duration>26:57</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67a4f1e2340a5590cd6114b7/media.mp3" length="465853480" type="audio/mpeg"/>
			<guid isPermaLink="false">67a4f1e2340a5590cd6114b7</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-deep-dive-episode-s01e12</link>
			<acast:episodeId>67a4f1e2340a5590cd6114b7</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-deep-dive-episode-s01e12</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YJpKqmBAlM63UuQY2Ofe9TcdPqgB4w7ZZoc7m68xMQdxl0zbU+/TzQ1EI0Up399K7BEmJPRNmwBMgSPj277PoM]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Deep Dive - Episode S01E12</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>12</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1738863002100-e92d4bc1-d96a-4950-a219-ed704898e757.jpeg"/>
			<description><![CDATA[<p>In this special <strong>IT SPARC Cast - Deep Dive - Listener Q&amp;A episode</strong>, we tackle your burning questions about <strong>remote work</strong>! We start by addressing a question from Zoey about <strong>Elon Musk’s stance on Return-to-Office (RTO)</strong> and whether his success validates in-office mandates. We break down <strong>SpaceX and Tesla’s work culture</strong>, the realities of hybrid models, and the contradictions in Musk’s own approach. Next, BB7 asks how <strong>IT leaders can sell remote work to the C-suite</strong>, and we provide <strong>data-backed strategies</strong> to highlight the <strong>financial and operational benefits</strong> of remote work. We also discuss the <strong>real cost of RTO</strong> and why many companies are still resisting the shift.</p><br><p>💬 Have a question for us? Send it to <strong>feedback@itsparccast.com</strong> or @ITSPARCcast on X.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>00:00 - Intro</strong></p><p>•Welcome to another episode of <strong>IT SPARC Cast - Deep Dive</strong>!</p><p>•Recap of our <strong>8-part series on remote work</strong>.</p><br><p><strong>01:14 - Overview of the Last 8 Episodes</strong></p><p>•Key takeaways from past discussions on <strong>best practices, time management, and hybrid work models</strong>.</p><br><p><strong>02:34 - Question 1 from Zoey: Elon Musk &amp; RTO</strong></p><p>•Why does Musk <strong>insist on RTO</strong>, and how does it align with his success?</p><p>•Breaking down <strong>SpaceX and Tesla’s unique work culture</strong>.</p><br><p><strong>04:00 - Question 1 - Answer Part 1: SpaceX &amp; Tesla</strong></p><p>•Jobs that require on-site work vs. those that don’t.</p><p>•How Tesla operates like <strong>multiple startups under one roof</strong>.</p><p>•The <strong>contradictions in Musk’s approach</strong>—remote work for him, but not his employees?</p><br><p><strong>15:18 - Question 1 - Answer Part 2: Twitter &amp; DOGE</strong></p><p>•The <strong>Twitter takeover</strong>, massive layoffs, and forced RTO—was it about efficiency or control?</p><p>•How Twitter’s chaos post-acquisition <strong>fueled broader RTO mandates</strong> in tech.</p><br><p><strong>18:10 - Question 2 from BB7: How Can IT Sell Remote Work to the C-Suite?</strong></p><p>•The <strong>real reason</strong> companies resist remote work.</p><br><p><strong>19:17 - Question 2 - Answer: It’s All About Saving Money</strong></p><p>•<strong>Financial benefits of remote work</strong>:</p><p>•Reduced office space costs.</p><p>•Productivity gains &amp; fewer sick days.</p><p>•<strong>Better employee retention &amp; access to top talent</strong>.</p><br><p><strong>23:29 - Preview of Future Topics</strong></p><p>•<strong>Corporate culture &amp; how to build a successful remote work environment</strong>.</p><p>•<strong>Improving your career by championing remote work</strong>.</p><br><p><strong>25:30 - Wrap Up</strong></p><p>•<strong>Final thoughts</strong> and where companies go from here.</p><p>•<strong>Listener feedback &amp; how to submit questions</strong>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this special <strong>IT SPARC Cast - Deep Dive - Listener Q&amp;A episode</strong>, we tackle your burning questions about <strong>remote work</strong>! We start by addressing a question from Zoey about <strong>Elon Musk’s stance on Return-to-Office (RTO)</strong> and whether his success validates in-office mandates. We break down <strong>SpaceX and Tesla’s work culture</strong>, the realities of hybrid models, and the contradictions in Musk’s own approach. Next, BB7 asks how <strong>IT leaders can sell remote work to the C-suite</strong>, and we provide <strong>data-backed strategies</strong> to highlight the <strong>financial and operational benefits</strong> of remote work. We also discuss the <strong>real cost of RTO</strong> and why many companies are still resisting the shift.</p><br><p>💬 Have a question for us? Send it to <strong>feedback@itsparccast.com</strong> or @ITSPARCcast on X.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>00:00 - Intro</strong></p><p>•Welcome to another episode of <strong>IT SPARC Cast - Deep Dive</strong>!</p><p>•Recap of our <strong>8-part series on remote work</strong>.</p><br><p><strong>01:14 - Overview of the Last 8 Episodes</strong></p><p>•Key takeaways from past discussions on <strong>best practices, time management, and hybrid work models</strong>.</p><br><p><strong>02:34 - Question 1 from Zoey: Elon Musk &amp; RTO</strong></p><p>•Why does Musk <strong>insist on RTO</strong>, and how does it align with his success?</p><p>•Breaking down <strong>SpaceX and Tesla’s unique work culture</strong>.</p><br><p><strong>04:00 - Question 1 - Answer Part 1: SpaceX &amp; Tesla</strong></p><p>•Jobs that require on-site work vs. those that don’t.</p><p>•How Tesla operates like <strong>multiple startups under one roof</strong>.</p><p>•The <strong>contradictions in Musk’s approach</strong>—remote work for him, but not his employees?</p><br><p><strong>15:18 - Question 1 - Answer Part 2: Twitter &amp; DOGE</strong></p><p>•The <strong>Twitter takeover</strong>, massive layoffs, and forced RTO—was it about efficiency or control?</p><p>•How Twitter’s chaos post-acquisition <strong>fueled broader RTO mandates</strong> in tech.</p><br><p><strong>18:10 - Question 2 from BB7: How Can IT Sell Remote Work to the C-Suite?</strong></p><p>•The <strong>real reason</strong> companies resist remote work.</p><br><p><strong>19:17 - Question 2 - Answer: It’s All About Saving Money</strong></p><p>•<strong>Financial benefits of remote work</strong>:</p><p>•Reduced office space costs.</p><p>•Productivity gains &amp; fewer sick days.</p><p>•<strong>Better employee retention &amp; access to top talent</strong>.</p><br><p><strong>23:29 - Preview of Future Topics</strong></p><p>•<strong>Corporate culture &amp; how to build a successful remote work environment</strong>.</p><p>•<strong>Improving your career by championing remote work</strong>.</p><br><p><strong>25:30 - Wrap Up</strong></p><p>•<strong>Final thoughts</strong> and where companies go from here.</p><p>•<strong>Listener feedback &amp; how to submit questions</strong>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>RTO Inequity, DeepSeek’s Privacy Red Flags, and Apple Silicon Security Risks</title>
			<itunes:title>RTO Inequity, DeepSeek’s Privacy Red Flags, and Apple Silicon Security Risks</itunes:title>
			<pubDate>Fri, 31 Jan 2025 17:37:48 GMT</pubDate>
			<itunes:duration>32:19</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/679d0a6cb51887dead016041/media.mp3" length="558718252" type="audio/mpeg"/>
			<guid isPermaLink="false">679d0a6cb51887dead016041</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e22</link>
			<acast:episodeId>679d0a6cb51887dead016041</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e22</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YecVYhHuOCmhppptq3Wwk3lSW4uHMwQwPNnlduXIp4ho2gmDV+RLXgoQGkGsb0BpvhCutTGCrY12O0H9i7bKd4]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E22</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>22</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1738344848891-c29283f9-600c-4930-96ff-032fe0fb39be.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou break down the latest tech controversies. They dive into the return-to-office (RTO) mandates that apply to most employees—except for a privileged few. They also analyze DeepSeek’s privacy policy and its alarming similarities to TikTok’s data collection practices. Finally, they explore the security vulnerabilities in Apple Silicon, exposing how speculative execution flaws could compromise user data. Stay tuned for expert insights, bold opinions, and a touch of sarcasm.</p><br><p><strong>News Bytes:</strong></p><br><p><strong>Return-to-Office Mandates Apply to Everyone, Except a Chosen Few</strong></p><p>•The Wall Street Journal confirms what IT SPARC Cast has been saying for months: RTO mandates apply to <strong>most employees</strong> but not the top talent.</p><p>•Employers are using remote work as a <strong>reward</strong> for high performers rather than a standard policy.</p><p>•The <strong>real reason for RTO?</strong> Bad management. John and Lou reiterate that <strong>remote work fails due to poor leadership</strong>, not a lack of productivity.</p><p>•<a href="https://www.wsj.com/lifestyle/workplace/return-to-office-mandates-apply-to-everyone-except-a-chosen-few-c77d9559?mod=hp_lead_pos8" rel="noopener noreferrer" target="_blank">https://www.wsj.com/lifestyle/workplace/return-to-office-mandates-apply-to-everyone-except-a-chosen-few-c77d9559?mod=hp_lead_pos8</a></p><br><p><strong>DeepSeek Privacy Policy: A Copy-Paste of TikTok?</strong></p><p>•John analyzes DeepSeek’s privacy policy and finds eerie similarities to TikTok’s terms.</p><p>•<strong>Key concern:</strong> User data is <strong>stored on servers in mainland China</strong>, meaning it could be accessed by the Chinese government at any time.</p><p>•Despite privacy risks, John and Lou acknowledge DeepSeek’s technical achievements—but warn businesses to <strong>think twice before using it</strong>.</p><p>•<a href="https://chat.deepseek.com/downloads/DeepSeek%20Privacy%20Policy.html" rel="noopener noreferrer" target="_blank">https://chat.deepseek.com/downloads/DeepSeek%20Privacy%20Policy.html</a></p><br><p><strong>DeepSeek vs OpenAI &amp; NVIDIA</strong></p><p>•DeepSeek is suspected of using OpenAI’s API to train its model, raising <strong>intellectual property concerns</strong>.</p><p>•NVIDIA’s stock took a hit as DeepSeek’s model demonstrated lower hardware requirements, sparking debates about the future of AI infrastructure.</p><p>•John and Lou explore whether DeepSeek will become the <strong>default AI model for homebrew and corporate clusters</strong>—or if U.S. regulators will intervene.</p><p>•<a href="https://www.theverge.com/news/601195/openai-evidence-deepseek-distillation-ai-data" rel="noopener noreferrer" target="_blank">https://www.theverge.com/news/601195/openai-evidence-deepseek-distillation-ai-data</a></p><br><p><strong>CVE of the Week:</strong></p><p><strong>Apple Silicon </strong></p><p>•Security researchers discover <strong>two speculative execution vulnerabilities</strong> in Apple’s M-series chips, similar to Spectre and Meltdown.</p><p>•<strong>FLOP Attack:</strong> Exploits Apple’s <strong>load value predictor</strong>, allowing attackers to extract sensitive data from Safari, iCloud, and Google Maps.</p><p>•<strong>SLAP Attack:</strong> Targets the <strong>load address predictor</strong>, potentially exposing encrypted information across browser tabs.</p><p>•To mitigate, use separate browsers (e.g., Safari for banking, Chrome for casual browsing).</p><p>•Apple is aware of the issue but has not yet released a patch.</p><p>•<a href="https://arstechnica.com/security/2025/01/newly-discovered-flaws-in-apple-chips-leak-secrets-in-safari-and-chrome/" rel="noopener noreferrer" target="_blank"><strong>https://arstechnica.com/security/2025/01/newly-discovered-flaws-in-apple-chips-leak-secrets-in-safari-and-chrome/</strong></a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou break down the latest tech controversies. They dive into the return-to-office (RTO) mandates that apply to most employees—except for a privileged few. They also analyze DeepSeek’s privacy policy and its alarming similarities to TikTok’s data collection practices. Finally, they explore the security vulnerabilities in Apple Silicon, exposing how speculative execution flaws could compromise user data. Stay tuned for expert insights, bold opinions, and a touch of sarcasm.</p><br><p><strong>News Bytes:</strong></p><br><p><strong>Return-to-Office Mandates Apply to Everyone, Except a Chosen Few</strong></p><p>•The Wall Street Journal confirms what IT SPARC Cast has been saying for months: RTO mandates apply to <strong>most employees</strong> but not the top talent.</p><p>•Employers are using remote work as a <strong>reward</strong> for high performers rather than a standard policy.</p><p>•The <strong>real reason for RTO?</strong> Bad management. John and Lou reiterate that <strong>remote work fails due to poor leadership</strong>, not a lack of productivity.</p><p>•<a href="https://www.wsj.com/lifestyle/workplace/return-to-office-mandates-apply-to-everyone-except-a-chosen-few-c77d9559?mod=hp_lead_pos8" rel="noopener noreferrer" target="_blank">https://www.wsj.com/lifestyle/workplace/return-to-office-mandates-apply-to-everyone-except-a-chosen-few-c77d9559?mod=hp_lead_pos8</a></p><br><p><strong>DeepSeek Privacy Policy: A Copy-Paste of TikTok?</strong></p><p>•John analyzes DeepSeek’s privacy policy and finds eerie similarities to TikTok’s terms.</p><p>•<strong>Key concern:</strong> User data is <strong>stored on servers in mainland China</strong>, meaning it could be accessed by the Chinese government at any time.</p><p>•Despite privacy risks, John and Lou acknowledge DeepSeek’s technical achievements—but warn businesses to <strong>think twice before using it</strong>.</p><p>•<a href="https://chat.deepseek.com/downloads/DeepSeek%20Privacy%20Policy.html" rel="noopener noreferrer" target="_blank">https://chat.deepseek.com/downloads/DeepSeek%20Privacy%20Policy.html</a></p><br><p><strong>DeepSeek vs OpenAI &amp; NVIDIA</strong></p><p>•DeepSeek is suspected of using OpenAI’s API to train its model, raising <strong>intellectual property concerns</strong>.</p><p>•NVIDIA’s stock took a hit as DeepSeek’s model demonstrated lower hardware requirements, sparking debates about the future of AI infrastructure.</p><p>•John and Lou explore whether DeepSeek will become the <strong>default AI model for homebrew and corporate clusters</strong>—or if U.S. regulators will intervene.</p><p>•<a href="https://www.theverge.com/news/601195/openai-evidence-deepseek-distillation-ai-data" rel="noopener noreferrer" target="_blank">https://www.theverge.com/news/601195/openai-evidence-deepseek-distillation-ai-data</a></p><br><p><strong>CVE of the Week:</strong></p><p><strong>Apple Silicon </strong></p><p>•Security researchers discover <strong>two speculative execution vulnerabilities</strong> in Apple’s M-series chips, similar to Spectre and Meltdown.</p><p>•<strong>FLOP Attack:</strong> Exploits Apple’s <strong>load value predictor</strong>, allowing attackers to extract sensitive data from Safari, iCloud, and Google Maps.</p><p>•<strong>SLAP Attack:</strong> Targets the <strong>load address predictor</strong>, potentially exposing encrypted information across browser tabs.</p><p>•To mitigate, use separate browsers (e.g., Safari for banking, Chrome for casual browsing).</p><p>•Apple is aware of the issue but has not yet released a patch.</p><p>•<a href="https://arstechnica.com/security/2025/01/newly-discovered-flaws-in-apple-chips-leak-secrets-in-safari-and-chrome/" rel="noopener noreferrer" target="_blank"><strong>https://arstechnica.com/security/2025/01/newly-discovered-flaws-in-apple-chips-leak-secrets-in-safari-and-chrome/</strong></a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Who Owns Your Time? Setting Work Expectations in the Remote Work Era</title>
			<itunes:title>Who Owns Your Time? Setting Work Expectations in the Remote Work Era</itunes:title>
			<pubDate>Thu, 30 Jan 2025 14:50:25 GMT</pubDate>
			<itunes:duration>30:52</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/679b91b12ca2b62f979733c9/media.mp3" length="533493052" type="audio/mpeg"/>
			<guid isPermaLink="false">679b91b12ca2b62f979733c9</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-deep-dive-episode-s01e11</link>
			<acast:episodeId>679b91b12ca2b62f979733c9</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-deep-dive-episode-s01e11</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7a5UDLwo1ICqB4lwd7FmRkDJYmcFWZ7ul1csx4Q15AAcWt22NAeifcGQfCVsxLoXg4430oxZ2iC/fX6cn7C3DDQ]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Deep Dive - Episode S01E11</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1738248083978-17d9b19f-2d20-4a72-9df4-0d2af8a6c3e0.jpeg"/>
			<description><![CDATA[<p>In Episode 11 of IT SPARC Cast - Deep Dive, John and Lou examine one of the biggest workplace tensions—<strong>time.</strong> Who truly owns your work hours? How has technology blurred the boundaries between professional and personal life? From the history of the 8-hour workday to modern remote work battles, they break down how expectations around time have evolved—and how workers can reclaim control. This episode is essential listening for anyone navigating remote work, RTO debates, or burnout prevention.</p><br><p><strong>00:00 - Intro:</strong></p><p>•John and Lou introduce the episode’s core theme: time ownership and setting clear expectations in the modern workplace.</p><br><p><strong>01:08 - Recap:</strong></p><p>•A quick recap of the previous seven episodes in the remote work series, covering topics like management strategies, technical setups, and RTO concerns.</p><p>•<strong>YouTube Channel - </strong><a href="https://www.youtube.com/channel/UCvipdAxKY_zFcU1Io7WHxag" rel="noopener noreferrer" target="_blank"><strong>https://www.youtube.com/channel/UCvipdAxKY_zFcU1Io7WHxag</strong></a></p><p>•<strong>ACast Link -</strong> <a href="https://shows.acast.com/it-sparc-cast" rel="noopener noreferrer" target="_blank">https://shows.acast.com/it-sparc-cast</a>&nbsp;</p><br><p><strong>Time Expectations: The Battle Over Work Hours</strong></p><br><p><strong>02:14 - History of the Work Day:</strong></p><p>•How work hours were originally dictated by daylight, shifting only with industrialization.</p><p>•Napoleon’s famous quote: “You can ask me for anything you like, except time.”</p><br><p><strong>05:49 - The 8-Hour Work Day:</strong></p><p>•The rise of standardized work hours in the 19th and 20th centuries.</p><p>•The U.S. railroad industry and unions’ role in securing an 8-hour workday.</p><br><p><strong>07:57 - Exempt vs. Non-Exempt:</strong></p><p>•How labor laws distinguish between employees entitled to overtime and those who aren’t.</p><p>•The role of HR and legal loopholes in defining job classifications.</p><br><p><strong>09:00 - How Technology is Stealing Your Time:</strong></p><p>•Laptops, VPNs, and cell phones have erased the clear boundaries between work and home.</p><p>•The unintended consequences of always being connected.</p><br><p><strong>11:13 - Gen X and Changing Work Cultures:</strong></p><p>•The stark contrast between Gen X childhood independence and today’s hyper-connected world.</p><p>•The shift from “be home when the streetlights turn on” to real-time tracking and constant notifications.</p><br><p><strong>11:47 - Who Owns Your Time?</strong></p><p>•The unspoken contract between employer and employee—what do they actually owe each other?</p><p>•How companies have subtly extended work expectations beyond paid hours.</p><p>•Why workers need to negotiate their time just as they negotiate salary.</p><br><p><strong>17:16 - Remote Work is a Win-Win – RTO is a Lose-Lose:</strong></p><p>•Breaking down the real motivations behind return-to-office (RTO) policies.</p><p>•Why forcing employees back into the office hurts productivity and morale.</p><p>•How companies fail to account for lost commute time and increased work-life balance.</p><br><p><strong>24:12 - Reclaim Your Time:</strong></p><p>•Strategies for setting clear time expectations with management.</p><p>•Why flexible work is the future—and how workers can advocate for it.</p><p>•The importance of documenting work agreements and pushing for explicit contracts.</p><br><p><strong>Wrap Up</strong></p><br><p><strong>28:28 - Mailbag:</strong></p><p>•Listener feedback from @ManagingTheBiz on X about virtual coffee breaks and engagement in remote teams.</p><p>•A discussion on how absenteeism in optional meetings can indicate deeper organizational issues.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 11 of IT SPARC Cast - Deep Dive, John and Lou examine one of the biggest workplace tensions—<strong>time.</strong> Who truly owns your work hours? How has technology blurred the boundaries between professional and personal life? From the history of the 8-hour workday to modern remote work battles, they break down how expectations around time have evolved—and how workers can reclaim control. This episode is essential listening for anyone navigating remote work, RTO debates, or burnout prevention.</p><br><p><strong>00:00 - Intro:</strong></p><p>•John and Lou introduce the episode’s core theme: time ownership and setting clear expectations in the modern workplace.</p><br><p><strong>01:08 - Recap:</strong></p><p>•A quick recap of the previous seven episodes in the remote work series, covering topics like management strategies, technical setups, and RTO concerns.</p><p>•<strong>YouTube Channel - </strong><a href="https://www.youtube.com/channel/UCvipdAxKY_zFcU1Io7WHxag" rel="noopener noreferrer" target="_blank"><strong>https://www.youtube.com/channel/UCvipdAxKY_zFcU1Io7WHxag</strong></a></p><p>•<strong>ACast Link -</strong> <a href="https://shows.acast.com/it-sparc-cast" rel="noopener noreferrer" target="_blank">https://shows.acast.com/it-sparc-cast</a>&nbsp;</p><br><p><strong>Time Expectations: The Battle Over Work Hours</strong></p><br><p><strong>02:14 - History of the Work Day:</strong></p><p>•How work hours were originally dictated by daylight, shifting only with industrialization.</p><p>•Napoleon’s famous quote: “You can ask me for anything you like, except time.”</p><br><p><strong>05:49 - The 8-Hour Work Day:</strong></p><p>•The rise of standardized work hours in the 19th and 20th centuries.</p><p>•The U.S. railroad industry and unions’ role in securing an 8-hour workday.</p><br><p><strong>07:57 - Exempt vs. Non-Exempt:</strong></p><p>•How labor laws distinguish between employees entitled to overtime and those who aren’t.</p><p>•The role of HR and legal loopholes in defining job classifications.</p><br><p><strong>09:00 - How Technology is Stealing Your Time:</strong></p><p>•Laptops, VPNs, and cell phones have erased the clear boundaries between work and home.</p><p>•The unintended consequences of always being connected.</p><br><p><strong>11:13 - Gen X and Changing Work Cultures:</strong></p><p>•The stark contrast between Gen X childhood independence and today’s hyper-connected world.</p><p>•The shift from “be home when the streetlights turn on” to real-time tracking and constant notifications.</p><br><p><strong>11:47 - Who Owns Your Time?</strong></p><p>•The unspoken contract between employer and employee—what do they actually owe each other?</p><p>•How companies have subtly extended work expectations beyond paid hours.</p><p>•Why workers need to negotiate their time just as they negotiate salary.</p><br><p><strong>17:16 - Remote Work is a Win-Win – RTO is a Lose-Lose:</strong></p><p>•Breaking down the real motivations behind return-to-office (RTO) policies.</p><p>•Why forcing employees back into the office hurts productivity and morale.</p><p>•How companies fail to account for lost commute time and increased work-life balance.</p><br><p><strong>24:12 - Reclaim Your Time:</strong></p><p>•Strategies for setting clear time expectations with management.</p><p>•Why flexible work is the future—and how workers can advocate for it.</p><p>•The importance of documenting work agreements and pushing for explicit contracts.</p><br><p><strong>Wrap Up</strong></p><br><p><strong>28:28 - Mailbag:</strong></p><p>•Listener feedback from @ManagingTheBiz on X about virtual coffee breaks and engagement in remote teams.</p><p>•A discussion on how absenteeism in optional meetings can indicate deeper organizational issues.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>South Carolina Goes Nuclear, Stargate Project Launches, and TikTok Privacy Concerns</title>
			<itunes:title>South Carolina Goes Nuclear, Stargate Project Launches, and TikTok Privacy Concerns</itunes:title>
			<pubDate>Fri, 24 Jan 2025 16:37:29 GMT</pubDate>
			<itunes:duration>28:36</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6793c1ca28da99579c5f00ff/media.mp3" length="494369968" type="audio/mpeg"/>
			<guid isPermaLink="false">6793c1ca28da99579c5f00ff</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/south-carolina-goes-nuclear-stargate-project-launches-and-ti</link>
			<acast:episodeId>6793c1ca28da99579c5f00ff</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>south-carolina-goes-nuclear-stargate-project-launches-and-ti</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Zw3J6rRcPsZUA+D3v3SYyfP6Dgc6Z9Nj2EuCZwruHxJLycikYxoeFBg5M4DF36y9DqQxmwSPS8i6pPULrawyEk]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E21</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>21</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1737736497032-482fd265-5274-4321-b228-02f853c72d94.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou dive into South Carolina’s nuclear reboot to meet AI energy demands, the $500 billion Stargate Project promising AI infrastructure innovation, and a deep dive into TikTok’s privacy policy and its implications for enterprise security. Tune in for the latest insights on tech, energy, and data privacy.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>00:00 - Intro:</strong></p><p>•John and Lou set the stage for an episode covering nuclear energy’s role in powering AI, a groundbreaking AI infrastructure project, and critical concerns about TikTok’s privacy policy.</p><br><p><strong>News Bytes:</strong></p><br><p><strong>00:53 - South Carolina to Reboot Giant Nuclear Project to Meet AI Demand:</strong></p><p>•South Carolina’s Santee Cooper plans to revive a $9 billion nuclear reactor project mothballed in 2019 to address growing energy demands from AI and data centers.</p><p>•Lou emphasizes the advantages of nuclear energy, including its high uptime and potential to replace polluting energy sources, while John highlights its scalability for various applications.</p><p>•Discussion of nuclear initiatives by Microsoft, Amazon, and the potential of small modular reactors for dedicated data center use.</p><p>•https://www.wsj.com/business/energy-oil/ai-nuclear-power-south-carolina-57b7ad2a  </p><br><p><strong>05:35 - Stargate Project Kicks Off with a $500 Billion Investment:</strong></p><p>•President Trump announces the Stargate Project, a massive AI infrastructure initiative involving OpenAI, SoftBank, and Oracle, with an initial $100 billion investment to build AI data centers starting in Texas.</p><p>•Lou and John discuss the project’s goal to create advanced AI supercomputing resources, develop energy infrastructure, and generate 100,000 U.S. jobs.</p><p>•Controversy surrounds the project, with Elon Musk critiquing its funding goals while others praise its potential economic impact.</p><p>•<a href="https://www.wsj.com/video/trump-and-tech-execs-announce-500-billion-ai-infrastructure-investment/7040161F-42F4-4666-9754-B399314DF6B6" rel="noopener noreferrer" target="_blank">https://www.wsj.com/video/trump-and-tech-execs-announce-500-billion-ai-infrastructure-investment/7040161F-42F4-4666-9754-B399314DF6B6</a></p><p>•<a href="https://www.wsj.com/tech/ai/tech-leaders-pledge-up-to-500-billion-in-ai-investment-in-u-s-da506cd4" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/ai/tech-leaders-pledge-up-to-500-billion-in-ai-investment-in-u-s-da506cd4</a>&nbsp;</p><p>•<a href="https://www.ft.com/content/48eb53a1-67ca-4509-8c62-401f0cf8b099" rel="noopener noreferrer" target="_blank">https://www.ft.com/content/48eb53a1-67ca-4509-8c62-401f0cf8b099</a>&nbsp;</p><p>•<a href="https://nypost.com/2025/01/21/us-news/trump-announces-500b-ai-project-with-biz-titans-saying-it-can-cure-cancer/" rel="noopener noreferrer" target="_blank">https://nypost.com/2025/01/21/us-news/trump-announces-500b-ai-project-with-biz-titans-saying-it-can-cure-cancer/</a>&nbsp;</p><p>•<a href="https://www.ft.com/content/b2899d25-9b16-461d-b406-89cfcadf3afc" rel="noopener noreferrer" target="_blank">https://www.ft.com/content/b2899d25-9b16-461d-b406-89cfcadf3afc</a>&nbsp;</p><br><p><strong>13:37 - TikTok Privacy Policy – What You Need to Know:</strong></p><p>•Lou dives into TikTok’s terms of service, highlighting privacy risks, including data sharing with entities outside the U.S. and lack of clear data retention limits.</p><p>•Discussion of TikTok’s ability to collect sensitive user data, such as location and contacts, and the implications for enterprise security.</p><p>•John and Lou debate the challenges of trusting TikTok’s compliance with U.S.-based server requirements, given its Chinese ownership and broad data usage rights.</p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou dive into South Carolina’s nuclear reboot to meet AI energy demands, the $500 billion Stargate Project promising AI infrastructure innovation, and a deep dive into TikTok’s privacy policy and its implications for enterprise security. Tune in for the latest insights on tech, energy, and data privacy.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>00:00 - Intro:</strong></p><p>•John and Lou set the stage for an episode covering nuclear energy’s role in powering AI, a groundbreaking AI infrastructure project, and critical concerns about TikTok’s privacy policy.</p><br><p><strong>News Bytes:</strong></p><br><p><strong>00:53 - South Carolina to Reboot Giant Nuclear Project to Meet AI Demand:</strong></p><p>•South Carolina’s Santee Cooper plans to revive a $9 billion nuclear reactor project mothballed in 2019 to address growing energy demands from AI and data centers.</p><p>•Lou emphasizes the advantages of nuclear energy, including its high uptime and potential to replace polluting energy sources, while John highlights its scalability for various applications.</p><p>•Discussion of nuclear initiatives by Microsoft, Amazon, and the potential of small modular reactors for dedicated data center use.</p><p>•https://www.wsj.com/business/energy-oil/ai-nuclear-power-south-carolina-57b7ad2a  </p><br><p><strong>05:35 - Stargate Project Kicks Off with a $500 Billion Investment:</strong></p><p>•President Trump announces the Stargate Project, a massive AI infrastructure initiative involving OpenAI, SoftBank, and Oracle, with an initial $100 billion investment to build AI data centers starting in Texas.</p><p>•Lou and John discuss the project’s goal to create advanced AI supercomputing resources, develop energy infrastructure, and generate 100,000 U.S. jobs.</p><p>•Controversy surrounds the project, with Elon Musk critiquing its funding goals while others praise its potential economic impact.</p><p>•<a href="https://www.wsj.com/video/trump-and-tech-execs-announce-500-billion-ai-infrastructure-investment/7040161F-42F4-4666-9754-B399314DF6B6" rel="noopener noreferrer" target="_blank">https://www.wsj.com/video/trump-and-tech-execs-announce-500-billion-ai-infrastructure-investment/7040161F-42F4-4666-9754-B399314DF6B6</a></p><p>•<a href="https://www.wsj.com/tech/ai/tech-leaders-pledge-up-to-500-billion-in-ai-investment-in-u-s-da506cd4" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/ai/tech-leaders-pledge-up-to-500-billion-in-ai-investment-in-u-s-da506cd4</a>&nbsp;</p><p>•<a href="https://www.ft.com/content/48eb53a1-67ca-4509-8c62-401f0cf8b099" rel="noopener noreferrer" target="_blank">https://www.ft.com/content/48eb53a1-67ca-4509-8c62-401f0cf8b099</a>&nbsp;</p><p>•<a href="https://nypost.com/2025/01/21/us-news/trump-announces-500b-ai-project-with-biz-titans-saying-it-can-cure-cancer/" rel="noopener noreferrer" target="_blank">https://nypost.com/2025/01/21/us-news/trump-announces-500b-ai-project-with-biz-titans-saying-it-can-cure-cancer/</a>&nbsp;</p><p>•<a href="https://www.ft.com/content/b2899d25-9b16-461d-b406-89cfcadf3afc" rel="noopener noreferrer" target="_blank">https://www.ft.com/content/b2899d25-9b16-461d-b406-89cfcadf3afc</a>&nbsp;</p><br><p><strong>13:37 - TikTok Privacy Policy – What You Need to Know:</strong></p><p>•Lou dives into TikTok’s terms of service, highlighting privacy risks, including data sharing with entities outside the U.S. and lack of clear data retention limits.</p><p>•Discussion of TikTok’s ability to collect sensitive user data, such as location and contacts, and the implications for enterprise security.</p><p>•John and Lou debate the challenges of trusting TikTok’s compliance with U.S.-based server requirements, given its Chinese ownership and broad data usage rights.</p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Effective Leadership of Remote Workers - Part 2: Asynchronous Tools, Team Building, and Recognition</title>
			<itunes:title>Effective Leadership of Remote Workers - Part 2: Asynchronous Tools, Team Building, and Recognition</itunes:title>
			<pubDate>Wed, 22 Jan 2025 15:18:37 GMT</pubDate>
			<itunes:duration>25:42</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67910c4d455ab42f9dc43a99/media.mp3" length="444255904" type="audio/mpeg"/>
			<guid isPermaLink="false">67910c4d455ab42f9dc43a99</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-deep-dive-episode-s01e10</link>
			<acast:episodeId>67910c4d455ab42f9dc43a99</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-deep-dive-episode-s01e10</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aWN9/hd7fduw4NDN2tqJmKot71B5vyMmd7dmxo0UJD035f8hxRD6pC941X83mLk9Jeany1k4IPCNfw0XUOuNAT]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Deep Dive - Episode S01E10</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1737559042093-38f37440-f4e4-4552-a8bf-7152914c7dd3.jpeg"/>
			<description><![CDATA[<p>In Episode 10 of IT SPARC Cast Deep Dive, John and Lou conclude the sub-series on managing remote workers with insights on asynchronous communication tools, innovative team-building activities, and the importance of recognizing contributions. From fostering collaboration to boosting morale, this episode is packed with actionable tips to enhance remote team leadership.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>00:00 - Intro:</strong></p><p>•John and Lou kick off the episode with a continuation of their deep dive into managing remote teams effectively.</p><br><p><strong>00:45 - Episode 1-6 Recap:</strong></p><p>•Highlights from previous episodes, including key insights on tailored engagement, effective virtual meetings, and the role of IT in enabling successful remote work.</p><p>•<strong>Youtube Episode - Remote Work Part 6 - </strong><a href="https://youtu.be/0Uif_UMiHKw" rel="noopener noreferrer" target="_blank"><strong>https://youtu.be/0Uif_UMiHKw</strong></a><strong>&nbsp;</strong></p><br><p><strong>02:59 - Asynchronous Communication Tools:</strong></p><p>•Exploring tools like Slack, Teams, and Zoom for asynchronous communication.</p><p>•Tips on creating project-specific and non-work-related channels to encourage connectivity.</p><p>•Tailoring communication methods to individual preferences and leveraging AI tools for summarizing status updates.</p><br><p><strong>08:40 - Team Building Activities:</strong></p><p>•Virtual coffee breaks: Casual, optional gatherings to foster connection.</p><p>•Collaborative challenges: Coding, gaming, or creating playlists to enhance team interaction.</p><p>•Activity competitions: Using apps like Challenges or The Conqueror Challenge to promote wellness and camaraderie.</p><p>•Walking meetings and encouraging team members to step away from screens for mental clarity.</p><p>•Challenges iOS - <a href="https://apps.apple.com/us/app/challenges-compete-get-fit/id1051342211" rel="noopener noreferrer" target="_blank">https://apps.apple.com/us/app/challenges-compete-get-fit/id1051342211</a></p><p>•Conqueror Challenges iOS - <a href="https://apps.apple.com/us/app/the-conqueror-challenges/id1539543704" rel="noopener noreferrer" target="_blank">https://apps.apple.com/us/app/the-conqueror-challenges/id1539543704</a></p><p>•Challenges Android - https://play.google.com/store/apps/details?id=com.fitnow.challenges</p><p>•Conqueror Challenges Android - https://play.google.com/store/search?q=Conqueror%20Challenge</p><br><p><strong>19:00 - Recognizing Contributions:</strong></p><p>•Spotlight achievements: Celebrate individual and team successes in meetings or emails.</p><p>•Peer recognition systems: Introduce kudos boards or small rewards to encourage positive reinforcement.</p><p>•End-of-year celebrations: Reflect on accomplishments and highlight standout contributors to close the year on a high note.</p><p>•</p><br><p><strong>24:31 - Wrap Up:</strong></p><p>•John and Lou wrap up the episode and the sub-series on managing remote workers, emphasizing the importance of feedback.</p><p>•They encourage listeners to share their thoughts and suggestions for future topics via feedback@itsparccast.com or @ITSPARCCast on X.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 10 of IT SPARC Cast Deep Dive, John and Lou conclude the sub-series on managing remote workers with insights on asynchronous communication tools, innovative team-building activities, and the importance of recognizing contributions. From fostering collaboration to boosting morale, this episode is packed with actionable tips to enhance remote team leadership.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>00:00 - Intro:</strong></p><p>•John and Lou kick off the episode with a continuation of their deep dive into managing remote teams effectively.</p><br><p><strong>00:45 - Episode 1-6 Recap:</strong></p><p>•Highlights from previous episodes, including key insights on tailored engagement, effective virtual meetings, and the role of IT in enabling successful remote work.</p><p>•<strong>Youtube Episode - Remote Work Part 6 - </strong><a href="https://youtu.be/0Uif_UMiHKw" rel="noopener noreferrer" target="_blank"><strong>https://youtu.be/0Uif_UMiHKw</strong></a><strong>&nbsp;</strong></p><br><p><strong>02:59 - Asynchronous Communication Tools:</strong></p><p>•Exploring tools like Slack, Teams, and Zoom for asynchronous communication.</p><p>•Tips on creating project-specific and non-work-related channels to encourage connectivity.</p><p>•Tailoring communication methods to individual preferences and leveraging AI tools for summarizing status updates.</p><br><p><strong>08:40 - Team Building Activities:</strong></p><p>•Virtual coffee breaks: Casual, optional gatherings to foster connection.</p><p>•Collaborative challenges: Coding, gaming, or creating playlists to enhance team interaction.</p><p>•Activity competitions: Using apps like Challenges or The Conqueror Challenge to promote wellness and camaraderie.</p><p>•Walking meetings and encouraging team members to step away from screens for mental clarity.</p><p>•Challenges iOS - <a href="https://apps.apple.com/us/app/challenges-compete-get-fit/id1051342211" rel="noopener noreferrer" target="_blank">https://apps.apple.com/us/app/challenges-compete-get-fit/id1051342211</a></p><p>•Conqueror Challenges iOS - <a href="https://apps.apple.com/us/app/the-conqueror-challenges/id1539543704" rel="noopener noreferrer" target="_blank">https://apps.apple.com/us/app/the-conqueror-challenges/id1539543704</a></p><p>•Challenges Android - https://play.google.com/store/apps/details?id=com.fitnow.challenges</p><p>•Conqueror Challenges Android - https://play.google.com/store/search?q=Conqueror%20Challenge</p><br><p><strong>19:00 - Recognizing Contributions:</strong></p><p>•Spotlight achievements: Celebrate individual and team successes in meetings or emails.</p><p>•Peer recognition systems: Introduce kudos boards or small rewards to encourage positive reinforcement.</p><p>•End-of-year celebrations: Reflect on accomplishments and highlight standout contributors to close the year on a high note.</p><p>•</p><br><p><strong>24:31 - Wrap Up:</strong></p><p>•John and Lou wrap up the episode and the sub-series on managing remote workers, emphasizing the importance of feedback.</p><p>•They encourage listeners to share their thoughts and suggestions for future topics via feedback@itsparccast.com or @ITSPARCCast on X.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Doom in a PDF, Microsoft Co-Pilot Chat, and VMware’s Mass Exodus</title>
			<itunes:title>Doom in a PDF, Microsoft Co-Pilot Chat, and VMware’s Mass Exodus</itunes:title>
			<pubDate>Fri, 17 Jan 2025 17:42:41 GMT</pubDate>
			<itunes:duration>28:00</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/678a96915dd9c67f17516309/media.mp3" length="483859468" type="audio/mpeg"/>
			<guid isPermaLink="false">678a96915dd9c67f17516309</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e20</link>
			<acast:episodeId>678a96915dd9c67f17516309</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e20</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7brc0MD/bi66G+GOdoADiTWiCNAI6cF9eDl/XV+IBPOtbMZ8bNc1Zgc+b/T4eICJU339p33O5jMXKeYDaYAQSWq]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E20</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>20</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1737135487297-63a71aa2-66da-452f-93a1-0d6077b514d8.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou explore quirky tech feats like Doom running in a PDF, dive into Microsoft 365 Co-Pilot Chat and its implications for Agentic AI, and discuss JP Morgan’s strict return-to-office policy. Plus, they break down Anexia’s bold move from VMware to KVM and answer listener questions about firewalls, remote work tools, and speakerphone recommendations. A packed episode full of insights, tech trends, and a touch of humor.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>00:00 - Intro:</strong></p><p>•John and Lou introduce the episode with highlights including Doom in a PDF, AI advancements, and major cloud infrastructure shifts.</p><p>•They invite listener feedback on trade shows they should cover in the future.</p><br><p><strong>News Bytes:</strong></p><br><p><strong>01:37 - Doom Running in a PDF:</strong></p><p>•Developers embed the classic game Doom in a PDF using JavaScript and WebAssembly.</p><p>•The team discusses the technical ingenuity and potential security implications of running code inside documents.</p><p>•https://www.gamespot.com/articles/someone-ported-doom-to-run-inside-a-pdf/1100-6528790/</p><br><p><strong>04:28 - Microsoft 365 Co-Pilot Chat:</strong></p><p>•Microsoft’s new AI chat service facilitates the creation of AI agents for businesses.</p><p>•Debate over Agentic AI versus AGI, subscription pricing models, and monetization strategies for AI tools.</p><p>•https://www.computerworld.com/article/3803306/microsoft-adds-pay-as-you-go-access-for-ai-agents-with-m365-copilot-chat.html</p><br><p><strong>09:06 - JP Morgan RTO:</strong></p><p>•JP Morgan announces a strict return-to-office policy, mandating five days in-office with 30 days’ notice.</p><p>•John and Lou critique the move as “quiet firing,” arguing that poor remote work outcomes are often due to management failure.</p><p>•Insight into how RTO policies may impact employee morale, retention, and talent acquisition.</p><p>•https://www.msn.com/en-us/money/companies/jpmorgan-chase-disables-employee-comments-after-return-to-office-backlash/ar-BB1rgIMc</p><br><p><strong>15:15 - 2025: The Year of Leaving VMware:</strong></p><p>•Austrian cloud provider Anexia migrates 12,000 VMs from VMware to KVM due to a reported 500% licensing cost increase after Broadcom’s acquisition of VMware.</p><p>•Discussion on the rise of Proxmox and KVM as VMware alternatives and the implications for enterprise IT.</p><p>•https://www.theregister.com/2025/01/13/anexia_vmware_to_kvm_migration/</p><br><p><strong>21:18 - Listener Mailbag:</strong></p><p>•Listener Karl shares thoughts on Ubiquiti vs. Fortinet for firewall solutions, sparking a discussion on cost-effectiveness and usability.</p><p>•Listener Ben recommends the Jabra Speak Series for audio quality in remote work setups.</p><p>•Additional listener feedback from LinkedIn and YouTube on topics like remote work management and audio tools.</p><br><p><strong>Wrap Up (31:06):</strong></p><p>•John and Lou thank listeners for their input and encourage continued engagement through feedback@itsparccast.com or @ITSPARCCast on X.</p><p>•Don’t forget to like, subscribe, and share to help grow the channel.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou explore quirky tech feats like Doom running in a PDF, dive into Microsoft 365 Co-Pilot Chat and its implications for Agentic AI, and discuss JP Morgan’s strict return-to-office policy. Plus, they break down Anexia’s bold move from VMware to KVM and answer listener questions about firewalls, remote work tools, and speakerphone recommendations. A packed episode full of insights, tech trends, and a touch of humor.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>00:00 - Intro:</strong></p><p>•John and Lou introduce the episode with highlights including Doom in a PDF, AI advancements, and major cloud infrastructure shifts.</p><p>•They invite listener feedback on trade shows they should cover in the future.</p><br><p><strong>News Bytes:</strong></p><br><p><strong>01:37 - Doom Running in a PDF:</strong></p><p>•Developers embed the classic game Doom in a PDF using JavaScript and WebAssembly.</p><p>•The team discusses the technical ingenuity and potential security implications of running code inside documents.</p><p>•https://www.gamespot.com/articles/someone-ported-doom-to-run-inside-a-pdf/1100-6528790/</p><br><p><strong>04:28 - Microsoft 365 Co-Pilot Chat:</strong></p><p>•Microsoft’s new AI chat service facilitates the creation of AI agents for businesses.</p><p>•Debate over Agentic AI versus AGI, subscription pricing models, and monetization strategies for AI tools.</p><p>•https://www.computerworld.com/article/3803306/microsoft-adds-pay-as-you-go-access-for-ai-agents-with-m365-copilot-chat.html</p><br><p><strong>09:06 - JP Morgan RTO:</strong></p><p>•JP Morgan announces a strict return-to-office policy, mandating five days in-office with 30 days’ notice.</p><p>•John and Lou critique the move as “quiet firing,” arguing that poor remote work outcomes are often due to management failure.</p><p>•Insight into how RTO policies may impact employee morale, retention, and talent acquisition.</p><p>•https://www.msn.com/en-us/money/companies/jpmorgan-chase-disables-employee-comments-after-return-to-office-backlash/ar-BB1rgIMc</p><br><p><strong>15:15 - 2025: The Year of Leaving VMware:</strong></p><p>•Austrian cloud provider Anexia migrates 12,000 VMs from VMware to KVM due to a reported 500% licensing cost increase after Broadcom’s acquisition of VMware.</p><p>•Discussion on the rise of Proxmox and KVM as VMware alternatives and the implications for enterprise IT.</p><p>•https://www.theregister.com/2025/01/13/anexia_vmware_to_kvm_migration/</p><br><p><strong>21:18 - Listener Mailbag:</strong></p><p>•Listener Karl shares thoughts on Ubiquiti vs. Fortinet for firewall solutions, sparking a discussion on cost-effectiveness and usability.</p><p>•Listener Ben recommends the Jabra Speak Series for audio quality in remote work setups.</p><p>•Additional listener feedback from LinkedIn and YouTube on topics like remote work management and audio tools.</p><br><p><strong>Wrap Up (31:06):</strong></p><p>•John and Lou thank listeners for their input and encourage continued engagement through feedback@itsparccast.com or @ITSPARCCast on X.</p><p>•Don’t forget to like, subscribe, and share to help grow the channel.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Being an Effective Leader for Remote Workers - Part 1: Meetings That Matter and Tailored Engagement</title>
			<itunes:title>Being an Effective Leader for Remote Workers - Part 1: Meetings That Matter and Tailored Engagement</itunes:title>
			<pubDate>Wed, 15 Jan 2025 16:14:24 GMT</pubDate>
			<itunes:duration>39:45</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6787dee047c04cf0f1ee01f3/media.mp3" length="687078484" type="audio/mpeg"/>
			<guid isPermaLink="false">6787dee047c04cf0f1ee01f3</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-deep-dive-episode-s01e09</link>
			<acast:episodeId>6787dee047c04cf0f1ee01f3</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-deep-dive-episode-s01e09</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZI137VtCICJwUns+mK8E1A2LW2bN7QMOgfi1wEBrRdNU7QUCB7DKH74gpZABBcmwgrL1ueerITVCvolH0BPxLD]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Deep Dive - Episode S01E09</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1736957300260-91276376-b03b-4567-8bd2-ee43b18649f2.jpeg"/>
			<description><![CDATA[<p>In the latest Episode of our series on supporting remote workers John and Lou dive into best practices for effective virtual meetings and personalized engagement. Learn how to keep teams connected, foster open communication, and avoid the pitfalls of micromanagement. If you lead remote teams, this episode is a must-listen.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>Intro:</strong></p><p>•John and Lou introduce the sixth episode in their series on remote work, highlighting the growing importance of remote leadership in today’s workplace.</p><p>•Discussion on how IT leaders must lead the charge in supporting sustainable remote work models.</p><br><p><strong>Episode 1-5 Recap:</strong></p><p>•A quick review of previous episodes, including insights on lighting, audio, and IT’s role in remote work sustainability.</p><p>•Encouragement to revisit earlier episodes for foundational tips on remote work setups.</p><p>•<a href="https://youtube.com/playlist?list=PLVM_ZQKTOQjwFcJNUf_LMdwO7HgVfmPYA&amp;si=J442o8MSMmRAgxL6" rel="noopener noreferrer" target="_blank">https://youtube.com/playlist?list=PLVM_ZQKTOQjwFcJNUf_LMdwO7HgVfmPYA&amp;si=J442o8MSMmRAgxL6</a></p><br><p><strong>Section One - Regular Virtual Meetings With a Purpose:</strong></p><p>•<strong>Weekly Team Check-ins:</strong></p><p>•Schedule purposeful team meetings with clear agendas published ahead of time.</p><p>•Tips for scheduling across time zones, including rotating times to accommodate global teams.</p><p>•John’s advice on avoiding vague meeting invites like “Sync Up” and ensuring time is well-utilized.</p><br><p>•<strong>Inclusivity and Respect:</strong></p><p>•Consider international holidays and cultural customs when planning meetings.</p><p>•Use tools like international holiday calendars to avoid scheduling conflicts.</p><p>•Europe - <a href="https://www.qppstudio.net/public-holidays/europe.htm" rel="noopener noreferrer" target="_blank">https://www.qppstudio.net/public-holidays/europe.htm</a></p><p>•APEC - <a href="https://www.qppstudio.net/public-holidays/apec.htm" rel="noopener noreferrer" target="_blank">https://www.qppstudio.net/public-holidays/apec.htm</a>&nbsp;</p><br><p>•<strong>Wellness Check-ins:</strong></p><p>•Start meetings with voluntary wellness updates to build trust and empathy among team members.</p><p>•This practice humanizes teams and fosters stronger collaboration.</p><br><p>•<strong>Rotating Facilitators:</strong></p><p>•Encourage team members to lead meetings to develop leadership skills and build confidence.</p><p>•Tailor this approach to individual comfort levels and provide coaching when needed.</p><br><p><strong>Section Two - Tailored Engagement:</strong></p><p>•<strong>1-on-1 Meetings:</strong></p><p>•Schedule regular check-ins tailored to individual team members’ needs.</p><p>•Focus on addressing roadblocks and offering support.</p><p>•John critiques Airbnb CEO Brian Chesky’s take on 1-on-1 meetings and shares why they’re critical for remote workers.</p><br><p>•<strong>Flexible Communication Styles:</strong></p><p>•Adapt meetings and feedback to match team members’ preferences and strengths.</p><p>•Provide anonymous channels for idea submission to encourage input from introverted employees.</p><br><p>•<strong>Avoiding Micromanagement:</strong></p><p>•Trust team members by setting clear goals and reducing unnecessary oversight.</p><p>•Lou emphasizes that micromanagement often stems from a lack of confidence in leadership.</p><p>•Strategies for transitioning from micromanagement to coaching-focused leadership.</p><br><p><strong>Wrap Up:</strong></p><p>•The next episode will cover asynchronous communication tools, team-building activities, and recognizing team contributions.</p><p>•Reach out via feedback@itsparccast.com or on X @ITSPARCCast.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In the latest Episode of our series on supporting remote workers John and Lou dive into best practices for effective virtual meetings and personalized engagement. Learn how to keep teams connected, foster open communication, and avoid the pitfalls of micromanagement. If you lead remote teams, this episode is a must-listen.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>Intro:</strong></p><p>•John and Lou introduce the sixth episode in their series on remote work, highlighting the growing importance of remote leadership in today’s workplace.</p><p>•Discussion on how IT leaders must lead the charge in supporting sustainable remote work models.</p><br><p><strong>Episode 1-5 Recap:</strong></p><p>•A quick review of previous episodes, including insights on lighting, audio, and IT’s role in remote work sustainability.</p><p>•Encouragement to revisit earlier episodes for foundational tips on remote work setups.</p><p>•<a href="https://youtube.com/playlist?list=PLVM_ZQKTOQjwFcJNUf_LMdwO7HgVfmPYA&amp;si=J442o8MSMmRAgxL6" rel="noopener noreferrer" target="_blank">https://youtube.com/playlist?list=PLVM_ZQKTOQjwFcJNUf_LMdwO7HgVfmPYA&amp;si=J442o8MSMmRAgxL6</a></p><br><p><strong>Section One - Regular Virtual Meetings With a Purpose:</strong></p><p>•<strong>Weekly Team Check-ins:</strong></p><p>•Schedule purposeful team meetings with clear agendas published ahead of time.</p><p>•Tips for scheduling across time zones, including rotating times to accommodate global teams.</p><p>•John’s advice on avoiding vague meeting invites like “Sync Up” and ensuring time is well-utilized.</p><br><p>•<strong>Inclusivity and Respect:</strong></p><p>•Consider international holidays and cultural customs when planning meetings.</p><p>•Use tools like international holiday calendars to avoid scheduling conflicts.</p><p>•Europe - <a href="https://www.qppstudio.net/public-holidays/europe.htm" rel="noopener noreferrer" target="_blank">https://www.qppstudio.net/public-holidays/europe.htm</a></p><p>•APEC - <a href="https://www.qppstudio.net/public-holidays/apec.htm" rel="noopener noreferrer" target="_blank">https://www.qppstudio.net/public-holidays/apec.htm</a>&nbsp;</p><br><p>•<strong>Wellness Check-ins:</strong></p><p>•Start meetings with voluntary wellness updates to build trust and empathy among team members.</p><p>•This practice humanizes teams and fosters stronger collaboration.</p><br><p>•<strong>Rotating Facilitators:</strong></p><p>•Encourage team members to lead meetings to develop leadership skills and build confidence.</p><p>•Tailor this approach to individual comfort levels and provide coaching when needed.</p><br><p><strong>Section Two - Tailored Engagement:</strong></p><p>•<strong>1-on-1 Meetings:</strong></p><p>•Schedule regular check-ins tailored to individual team members’ needs.</p><p>•Focus on addressing roadblocks and offering support.</p><p>•John critiques Airbnb CEO Brian Chesky’s take on 1-on-1 meetings and shares why they’re critical for remote workers.</p><br><p>•<strong>Flexible Communication Styles:</strong></p><p>•Adapt meetings and feedback to match team members’ preferences and strengths.</p><p>•Provide anonymous channels for idea submission to encourage input from introverted employees.</p><br><p>•<strong>Avoiding Micromanagement:</strong></p><p>•Trust team members by setting clear goals and reducing unnecessary oversight.</p><p>•Lou emphasizes that micromanagement often stems from a lack of confidence in leadership.</p><p>•Strategies for transitioning from micromanagement to coaching-focused leadership.</p><br><p><strong>Wrap Up:</strong></p><p>•The next episode will cover asynchronous communication tools, team-building activities, and recognizing team contributions.</p><p>•Reach out via feedback@itsparccast.com or on X @ITSPARCCast.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>CES Enterprise Recap - NVidia’s AI Leap, Ubiquiti’s Enterprise Move, and Deep Fission</title>
			<itunes:title>CES Enterprise Recap - NVidia’s AI Leap, Ubiquiti’s Enterprise Move, and Deep Fission</itunes:title>
			<pubDate>Fri, 10 Jan 2025 18:14:01 GMT</pubDate>
			<itunes:duration>37:36</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6781636aec40818e0b6cefd8/media.mp3" length="649841284" type="audio/mpeg"/>
			<guid isPermaLink="false">6781636aec40818e0b6cefd8</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e19</link>
			<acast:episodeId>6781636aec40818e0b6cefd8</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e19</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZVWswZh2Z2BRguSgpD8EwHhbxGeYszVJkcrIw+NO/QhhlZQUZPDSox1B0UgKGoTW/7z95FCSy/RaqGY5hOPrLp]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E19</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>19</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1736532624793-6d35978a-005b-4107-8090-b10021473d52.jpeg"/>
			<description><![CDATA[<p>In Episode 19 of IT SPARC Cast, John and Lou explore NVidia’s groundbreaking announcements at CES, including the Blackwell architecture and a $3,000 AI supercomputer. They also analyze Ubiquiti’s new enterprise features, Microsoft’s ongoing push for Windows 11 adoption, and Amazon’s contentious Return to Office mandate. Join us for insights, opinions, and predictions about the future of IT and AI.</p><br><p><strong>News Bytes:</strong></p><p><strong>Ubiquiti Targets Enterprise with Unifi Network 9.0:</strong></p><p>•Zone-based firewalls, Proofpoint Cyber Secure subscriptions, and SD-WAN capabilities headline Ubiquiti’s enterprise push.</p><p>•<a href="https://blog.ui.com/article/unifi-network-9-0-built-to-scale" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/unifi-network-9-0-built-to-scale</a></p><br><p><strong>Return to Office Debate Heats Up:</strong></p><p>•Amazon enforces a five-day RTO policy, sparking resistance and accusations of “quiet firing.”</p><p>•<a href="https://www.linkedin.com/news/story/amazon-rto-begins-but-some-resist-6277204/?emailKey=email_editorial_suggested_top_conversations_01&amp;campaignId=fbc2422f-7cfd-4f5f-bdae-6677c77eae02&amp;uuid=4d46896e-59f0-406f-a43b-fb814c97506f&amp;midToken=AQFDWSIk2j4L2Q&amp;midSig=2eOjVP1pv_zXA1&amp;ek=email_editorial_suggested_top_conversations_01&amp;e=16kzb-m5n17shu-jl&amp;eid=16kzb-m5n17shu-jl&amp;m=editorial-cta-button&amp;ts=prompt%3Decba8ebe-5b44-4e40-950d-1211dec71574_campaign%3Dfbc2422f-7cfd-4f5f-bdae-6677c77eae02&amp;li=0&amp;t=plh" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/news/story/amazon-rto-begins-but-some-resist-6277204/?emailKey=email_editorial_suggested_top_conversations_01&amp;campaignId=fbc2422f-7cfd-4f5f-bdae-6677c77eae02&amp;uuid=4d46896e-59f0-406f-a43b-fb814c97506f&amp;midToken=AQFDWSIk2j4L2Q&amp;midSig=2eOjVP1pv_zXA1&amp;ek=email_editorial_suggested_top_conversations_01&amp;e=16kzb-m5n17shu-jl&amp;eid=16kzb-m5n17shu-jl&amp;m=editorial-cta-button&amp;ts=prompt%3Decba8ebe-5b44-4e40-950d-1211dec71574_campaign%3Dfbc2422f-7cfd-4f5f-bdae-6677c77eae02&amp;li=0&amp;t=plh</a>&nbsp;</p><br><p><strong>Deep Fission: Revolutionizing Data Center Power</strong></p><p>•Deep Fission is a groundbreaking initiative exploring the use of small modular nuclear reactors (SMRs) to power data centers.</p><p>•These reactors aim to address the growing energy demands of AI workloads, cloud computing, and hyperscale data centers.</p><p>•<a href="https://techcrunch.com/2025/01/07/nuclear-startup-deep-fission-plans-to-bury-micro-reactors-to-power-data-centers/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/01/07/nuclear-startup-deep-fission-plans-to-bury-micro-reactors-to-power-data-centers/</a>&nbsp;</p><br><p><strong>Dell Rebrands with PRO and PRO Max Lines:</strong></p><p>•Dell drops legacy product lines like XPS, Latitude, and Inspiron for a simplified PRO, PRO Max, and Premium lineup.</p><p>•Lou and John share their thoughts on the rebranding and its impact on enterprise IT.</p><p>•<a href="https://arstechnica.com/gadgets/2025/01/the-end-of-an-era-dell-will-no-longer-make-xps-computers/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/gadgets/2025/01/the-end-of-an-era-dell-will-no-longer-make-xps-computers/</a>&nbsp;</p><br><p><strong>NVidia’s Dominance in AI:</strong></p><p>•Discussion on how NVidia’s innovations are transforming AI development and physical simulations for robotics, data centers, and more.</p><p>•NVidia unveils the Blackwell GPU architecture and a $3,000 AI supercomputer.</p><p>•<a href="https://blog.ui.com/article/unifi-network-9-0-built-to-scale" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/unifi-network-9-0-built-to-scale</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 19 of IT SPARC Cast, John and Lou explore NVidia’s groundbreaking announcements at CES, including the Blackwell architecture and a $3,000 AI supercomputer. They also analyze Ubiquiti’s new enterprise features, Microsoft’s ongoing push for Windows 11 adoption, and Amazon’s contentious Return to Office mandate. Join us for insights, opinions, and predictions about the future of IT and AI.</p><br><p><strong>News Bytes:</strong></p><p><strong>Ubiquiti Targets Enterprise with Unifi Network 9.0:</strong></p><p>•Zone-based firewalls, Proofpoint Cyber Secure subscriptions, and SD-WAN capabilities headline Ubiquiti’s enterprise push.</p><p>•<a href="https://blog.ui.com/article/unifi-network-9-0-built-to-scale" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/unifi-network-9-0-built-to-scale</a></p><br><p><strong>Return to Office Debate Heats Up:</strong></p><p>•Amazon enforces a five-day RTO policy, sparking resistance and accusations of “quiet firing.”</p><p>•<a href="https://www.linkedin.com/news/story/amazon-rto-begins-but-some-resist-6277204/?emailKey=email_editorial_suggested_top_conversations_01&amp;campaignId=fbc2422f-7cfd-4f5f-bdae-6677c77eae02&amp;uuid=4d46896e-59f0-406f-a43b-fb814c97506f&amp;midToken=AQFDWSIk2j4L2Q&amp;midSig=2eOjVP1pv_zXA1&amp;ek=email_editorial_suggested_top_conversations_01&amp;e=16kzb-m5n17shu-jl&amp;eid=16kzb-m5n17shu-jl&amp;m=editorial-cta-button&amp;ts=prompt%3Decba8ebe-5b44-4e40-950d-1211dec71574_campaign%3Dfbc2422f-7cfd-4f5f-bdae-6677c77eae02&amp;li=0&amp;t=plh" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/news/story/amazon-rto-begins-but-some-resist-6277204/?emailKey=email_editorial_suggested_top_conversations_01&amp;campaignId=fbc2422f-7cfd-4f5f-bdae-6677c77eae02&amp;uuid=4d46896e-59f0-406f-a43b-fb814c97506f&amp;midToken=AQFDWSIk2j4L2Q&amp;midSig=2eOjVP1pv_zXA1&amp;ek=email_editorial_suggested_top_conversations_01&amp;e=16kzb-m5n17shu-jl&amp;eid=16kzb-m5n17shu-jl&amp;m=editorial-cta-button&amp;ts=prompt%3Decba8ebe-5b44-4e40-950d-1211dec71574_campaign%3Dfbc2422f-7cfd-4f5f-bdae-6677c77eae02&amp;li=0&amp;t=plh</a>&nbsp;</p><br><p><strong>Deep Fission: Revolutionizing Data Center Power</strong></p><p>•Deep Fission is a groundbreaking initiative exploring the use of small modular nuclear reactors (SMRs) to power data centers.</p><p>•These reactors aim to address the growing energy demands of AI workloads, cloud computing, and hyperscale data centers.</p><p>•<a href="https://techcrunch.com/2025/01/07/nuclear-startup-deep-fission-plans-to-bury-micro-reactors-to-power-data-centers/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2025/01/07/nuclear-startup-deep-fission-plans-to-bury-micro-reactors-to-power-data-centers/</a>&nbsp;</p><br><p><strong>Dell Rebrands with PRO and PRO Max Lines:</strong></p><p>•Dell drops legacy product lines like XPS, Latitude, and Inspiron for a simplified PRO, PRO Max, and Premium lineup.</p><p>•Lou and John share their thoughts on the rebranding and its impact on enterprise IT.</p><p>•<a href="https://arstechnica.com/gadgets/2025/01/the-end-of-an-era-dell-will-no-longer-make-xps-computers/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/gadgets/2025/01/the-end-of-an-era-dell-will-no-longer-make-xps-computers/</a>&nbsp;</p><br><p><strong>NVidia’s Dominance in AI:</strong></p><p>•Discussion on how NVidia’s innovations are transforming AI development and physical simulations for robotics, data centers, and more.</p><p>•NVidia unveils the Blackwell GPU architecture and a $3,000 AI supercomputer.</p><p>•<a href="https://blog.ui.com/article/unifi-network-9-0-built-to-scale" rel="noopener noreferrer" target="_blank">https://blog.ui.com/article/unifi-network-9-0-built-to-scale</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>AI for Workers, Government Hardware Fails, and Security Overhauls</title>
			<itunes:title>AI for Workers, Government Hardware Fails, and Security Overhauls</itunes:title>
			<pubDate>Fri, 03 Jan 2025 17:53:09 GMT</pubDate>
			<itunes:duration>29:12</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6778240677d7a3f73accfaf3/media.mp3" length="504784372" type="audio/mpeg"/>
			<guid isPermaLink="false">6778240677d7a3f73accfaf3</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e18</link>
			<acast:episodeId>6778240677d7a3f73accfaf3</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e18</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Y08l4zqrlkTeAOPx0/VagwbZk5ZF4AhMoisnPqdWmJqol7FCJhmbmyNuyXkDAgzXahvxlQzO0VxOmPJjrvsjL0]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E18</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>18</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1735926598383-e4b319fa-f055-443d-b7ae-afa64b9f1b0c.jpeg"/>
			<description><![CDATA[<p>In Episode 18 of IT SPARC Cast, John and Lou tackle AI’s role in accelerating productivity (OR NOT), a Chinese hack on the US Treasury, and the urgent need for government IT modernization. Plus, a spotlight on outdated hardware in critical systems and the risks it poses. Tune in for insights, discussions, and practical advice to start your IT year off right.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>Intro:</strong></p><p>•John and Lou welcome listeners to the first episode of 2025 with insights on AI’s impact on workers, a Treasury hack, and government IT inefficiencies.</p><br><p><strong>News Bytes:</strong></p><p><strong>AI and Income Inequality:</strong></p><p>•A study highlighted by the Wall Street Journal explores how AI tools amplify productivity for skilled researchers but offer little value to less experienced users.</p><p>•Lou and John discuss the debate around AI widening economic disparities and the importance of using AI as an accelerative tool, not a replacement.</p><p>•<a href="https://www.wsj.com/economy/will-ai-help-hurt-workers-income-productivity-5928a389?st=LEanvE" rel="noopener noreferrer" target="_blank">https://www.wsj.com/economy/will-ai-help-hurt-workers-income-productivity-5928a389?st=LEanvE</a></p><br><p><strong>US Treasury Hacked by Chinese State Actors:</strong></p><p>•A BeyondTrust remote access tool exploit allowed hackers to breach US Treasury systems.</p><p>•While no classified data was accessed, Lou emphasizes the importance of robust zero-trust architectures and modernizing government IT infrastructure.</p><p>•<a href="https://www.theverge.com/2024/12/30/24332429/us-treasury-department-beyondtrust-hack-security-breach" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2024/12/30/24332429/us-treasury-department-beyondtrust-hack-security-breach</a></p><br><p><strong>NATO Plans Satellite Backup for Subsea Cables:</strong></p><p>•Increasing subsea cable outages prompt NATO’s Project Heist, a satellite-based redundancy system.</p><p>•Lou and John debate the feasibility of satellites as primary infrastructure and the evolution of low Earth orbit networks like Starlink.</p><p>•<a href="https://www.tomshardware.com/networking/nato-plans-to-build-satellite-links-as-backups-to-undersea-cables-recent-cable-damage-incidents-shine-spotlight-on-project-heist" rel="noopener noreferrer" target="_blank">https://www.tomshardware.com/networking/nato-plans-to-build-satellite-links-as-backups-to-undersea-cables-recent-cable-damage-incidents-shine-spotlight-on-project-heist</a>&nbsp;</p><br><p><strong>Microsoft’s Recall Feature and Privacy Concerns:</strong></p><p>•Microsoft’s new AI tool, Recall, tracks user activity for productivity insights but raises serious privacy questions.</p><p>•John and Lou compare Microsoft’s approach to Apple and Google, emphasizing the importance of trust in user data handling.</p><p>•<a href="https://www.theverge.com/2024/12/12/24319609/microsoft-recall-hands-on-notepad" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2024/12/12/24319609/microsoft-recall-hands-on-notepad</a>&nbsp;</p><br><p><strong>CVE of the Week:</strong></p><p><strong>Legacy Hardware Poses Ongoing Security Risks:</strong></p><p>•Elon Musk’s recent critique of outdated government hardware highlights the vulnerabilities of legacy systems in critical environments.</p><p>•Lou urges IT leaders to audit and replace aging equipment, even if it’s “working great,” to improve security and compatibility with modern tools.</p><p>•Practical advice: Plan gradual upgrades to mitigate downtime and reduce risk.</p><br><p><strong>Wrap Up:</strong></p><p>John and Lou invite listeners to share their oldest hardware stories and thoughts on AI in the workplace via feedback@itsparccast.com or @ITSPARCCast on X.</p><br><p>Don’t forget to like, subscribe, and share to support the podcast.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 18 of IT SPARC Cast, John and Lou tackle AI’s role in accelerating productivity (OR NOT), a Chinese hack on the US Treasury, and the urgent need for government IT modernization. Plus, a spotlight on outdated hardware in critical systems and the risks it poses. Tune in for insights, discussions, and practical advice to start your IT year off right.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>Intro:</strong></p><p>•John and Lou welcome listeners to the first episode of 2025 with insights on AI’s impact on workers, a Treasury hack, and government IT inefficiencies.</p><br><p><strong>News Bytes:</strong></p><p><strong>AI and Income Inequality:</strong></p><p>•A study highlighted by the Wall Street Journal explores how AI tools amplify productivity for skilled researchers but offer little value to less experienced users.</p><p>•Lou and John discuss the debate around AI widening economic disparities and the importance of using AI as an accelerative tool, not a replacement.</p><p>•<a href="https://www.wsj.com/economy/will-ai-help-hurt-workers-income-productivity-5928a389?st=LEanvE" rel="noopener noreferrer" target="_blank">https://www.wsj.com/economy/will-ai-help-hurt-workers-income-productivity-5928a389?st=LEanvE</a></p><br><p><strong>US Treasury Hacked by Chinese State Actors:</strong></p><p>•A BeyondTrust remote access tool exploit allowed hackers to breach US Treasury systems.</p><p>•While no classified data was accessed, Lou emphasizes the importance of robust zero-trust architectures and modernizing government IT infrastructure.</p><p>•<a href="https://www.theverge.com/2024/12/30/24332429/us-treasury-department-beyondtrust-hack-security-breach" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2024/12/30/24332429/us-treasury-department-beyondtrust-hack-security-breach</a></p><br><p><strong>NATO Plans Satellite Backup for Subsea Cables:</strong></p><p>•Increasing subsea cable outages prompt NATO’s Project Heist, a satellite-based redundancy system.</p><p>•Lou and John debate the feasibility of satellites as primary infrastructure and the evolution of low Earth orbit networks like Starlink.</p><p>•<a href="https://www.tomshardware.com/networking/nato-plans-to-build-satellite-links-as-backups-to-undersea-cables-recent-cable-damage-incidents-shine-spotlight-on-project-heist" rel="noopener noreferrer" target="_blank">https://www.tomshardware.com/networking/nato-plans-to-build-satellite-links-as-backups-to-undersea-cables-recent-cable-damage-incidents-shine-spotlight-on-project-heist</a>&nbsp;</p><br><p><strong>Microsoft’s Recall Feature and Privacy Concerns:</strong></p><p>•Microsoft’s new AI tool, Recall, tracks user activity for productivity insights but raises serious privacy questions.</p><p>•John and Lou compare Microsoft’s approach to Apple and Google, emphasizing the importance of trust in user data handling.</p><p>•<a href="https://www.theverge.com/2024/12/12/24319609/microsoft-recall-hands-on-notepad" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2024/12/12/24319609/microsoft-recall-hands-on-notepad</a>&nbsp;</p><br><p><strong>CVE of the Week:</strong></p><p><strong>Legacy Hardware Poses Ongoing Security Risks:</strong></p><p>•Elon Musk’s recent critique of outdated government hardware highlights the vulnerabilities of legacy systems in critical environments.</p><p>•Lou urges IT leaders to audit and replace aging equipment, even if it’s “working great,” to improve security and compatibility with modern tools.</p><p>•Practical advice: Plan gradual upgrades to mitigate downtime and reduce risk.</p><br><p><strong>Wrap Up:</strong></p><p>John and Lou invite listeners to share their oldest hardware stories and thoughts on AI in the workplace via feedback@itsparccast.com or @ITSPARCCast on X.</p><br><p>Don’t forget to like, subscribe, and share to support the podcast.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Salt Typhoon Hacks, Siri’s Future, and the Death of Hashtags</title>
			<itunes:title>Salt Typhoon Hacks, Siri’s Future, and the Death of Hashtags</itunes:title>
			<pubDate>Fri, 20 Dec 2024 17:21:24 GMT</pubDate>
			<itunes:duration>38:08</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6765a794b49c6255e856696a/media.mp3" length="659042476" type="audio/mpeg"/>
			<guid isPermaLink="false">6765a794b49c6255e856696a</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e17</link>
			<acast:episodeId>6765a794b49c6255e856696a</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e17</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7avkQhoC+8jqsjn2Awf8FeMKFT/U/KN5j3Tbz7yf7cicyyOAurxjGbJMXJmwiF0YE/94xiQKu/fh4AH9z3hWEOy]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E17</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>17</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1734715432038-05bc1a01-c8f9-4d98-9645-a2e7183e096e.jpeg"/>
			<description><![CDATA[<p><strong>Show Notes:</strong></p><br><p>In this holiday episode of the IT SPARC Cast:</p><br><p>&nbsp;- Saint Elon nixes hashtags</p><p>&nbsp;- Ho Ho Holy S#!T - Apple Intelligence sucks</p><p>AND</p><p>&nbsp;- AT&amp;T rings in the new year with RTO. You get RTO! You get RTO! You get RTO! You get RTO! You get RTO! You get RTO!&nbsp;</p><br><p><strong>News Bytes:</strong></p><p><strong>Turnitin’s AI Detection Sparks Controversy:</strong></p><p>•Colleges are increasingly using Turnitin’s AI detection feature to identify potential cheating in student papers. While Turnitin claims only a 1% false positive rate, Lou and John debate whether this figure accounts for all tests or flagged positives.</p><p>•The backlash centers on false accusations, with some students facing ethics committees without conclusive proof.</p><p>•Key takeaway: Institutions must balance the use of AI with fairness, ensuring students are not penalized unfairly. Schools should explore integrating AI as a learning tool rather than solely as a detection mechanism.</p><p>•<a href="https://www.theguardian.com/technology/2024/dec/15/i-received-a-first-but-it-felt-tainted-and-undeserved-inside-the-university-ai-cheating-crisis" rel="noopener noreferrer" target="_blank">https://www.theguardian.com/technology/2024/dec/15/i-received-a-first-but-it-felt-tainted-and-undeserved-inside-the-university-ai-cheating-crisis</a>&nbsp;</p><br><p>&nbsp;<strong>Siri’s Future in Apple’s AI Strategy</strong></p><p>•Nearly half of surveyed iPhone users feel Apple’s AI offerings have little value.</p><p>•John and Lou debate whether Siri can remain relevant with competition from OpenAI and Anthropic.</p><p>•<a href="https://9to5mac.com/2024/12/16/most-iphone-owners-see-little-to-no-value-in-apple-intelligence-so-far/" rel="noopener noreferrer" target="_blank">https://9to5mac.com/2024/12/16/most-iphone-owners-see-little-to-no-value-in-apple-intelligence-so-far/</a>&nbsp;</p><br><p><strong>Elon Musk Says Goodbye to Hashtags</strong></p><p>•X now uses AI-powered indexing to replace hashtags. Lou discusses the implications for search and content discovery.</p><p>•John highlights how similar AI indexing could revolutionize enterprise search in SharePoint and other corporate tools.</p><p>•<a href="https://x.com/elonmusk/status/1869070358210572306" rel="noopener noreferrer" target="_blank">https://x.com/elonmusk/status/1869070358210572306</a>&nbsp;</p><br><p><strong>Return-to-Office Mandates Hurt Companies</strong></p><p>•AT&amp;T’s sudden RTO mandate for January 2025 sparks criticism.</p><p>•Lou and John discuss a new study linking RTO policies to brain drain and rising turnover rates.</p><p>•<a href="https://tech.co/news/att-five-day-return-to-officeQq" rel="noopener noreferrer" target="_blank">https://tech.co/news/att-five-day-return-to-officeQq</a>&nbsp;</p><p>•<a href="https://arstechnica.com/tech-policy/2024/12/companies-issuing-rto-mandates-lose-their-best-talent-study/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/tech-policy/2024/12/companies-issuing-rto-mandates-lose-their-best-talent-study/</a>&nbsp;</p><br><p><strong>CVE of the Week:</strong></p><p><strong>Salt Typhoon Hack Targets SS7 Networks</strong></p><p>•A state-sponsored attack exploits SS7, the core routing protocol for phone systems, to intercept metadata and messages.</p><p>•Lou explains how lawful intercept capabilities intended for governments became a vector for this breach.</p><p>•Why end-to-end encryption must become the norm for secure communication.</p><p>•<a href="https://www.reuters.com/world/us/us-cyber-watchdog-tells-senior-officials-immediately-adopt-end-to-end-encryption-2024-12-18/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/us/us-cyber-watchdog-tells-senior-officials-immediately-adopt-end-to-end-encryption-2024-12-18/</a>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>Show Notes:</strong></p><br><p>In this holiday episode of the IT SPARC Cast:</p><br><p>&nbsp;- Saint Elon nixes hashtags</p><p>&nbsp;- Ho Ho Holy S#!T - Apple Intelligence sucks</p><p>AND</p><p>&nbsp;- AT&amp;T rings in the new year with RTO. You get RTO! You get RTO! You get RTO! You get RTO! You get RTO! You get RTO!&nbsp;</p><br><p><strong>News Bytes:</strong></p><p><strong>Turnitin’s AI Detection Sparks Controversy:</strong></p><p>•Colleges are increasingly using Turnitin’s AI detection feature to identify potential cheating in student papers. While Turnitin claims only a 1% false positive rate, Lou and John debate whether this figure accounts for all tests or flagged positives.</p><p>•The backlash centers on false accusations, with some students facing ethics committees without conclusive proof.</p><p>•Key takeaway: Institutions must balance the use of AI with fairness, ensuring students are not penalized unfairly. Schools should explore integrating AI as a learning tool rather than solely as a detection mechanism.</p><p>•<a href="https://www.theguardian.com/technology/2024/dec/15/i-received-a-first-but-it-felt-tainted-and-undeserved-inside-the-university-ai-cheating-crisis" rel="noopener noreferrer" target="_blank">https://www.theguardian.com/technology/2024/dec/15/i-received-a-first-but-it-felt-tainted-and-undeserved-inside-the-university-ai-cheating-crisis</a>&nbsp;</p><br><p>&nbsp;<strong>Siri’s Future in Apple’s AI Strategy</strong></p><p>•Nearly half of surveyed iPhone users feel Apple’s AI offerings have little value.</p><p>•John and Lou debate whether Siri can remain relevant with competition from OpenAI and Anthropic.</p><p>•<a href="https://9to5mac.com/2024/12/16/most-iphone-owners-see-little-to-no-value-in-apple-intelligence-so-far/" rel="noopener noreferrer" target="_blank">https://9to5mac.com/2024/12/16/most-iphone-owners-see-little-to-no-value-in-apple-intelligence-so-far/</a>&nbsp;</p><br><p><strong>Elon Musk Says Goodbye to Hashtags</strong></p><p>•X now uses AI-powered indexing to replace hashtags. Lou discusses the implications for search and content discovery.</p><p>•John highlights how similar AI indexing could revolutionize enterprise search in SharePoint and other corporate tools.</p><p>•<a href="https://x.com/elonmusk/status/1869070358210572306" rel="noopener noreferrer" target="_blank">https://x.com/elonmusk/status/1869070358210572306</a>&nbsp;</p><br><p><strong>Return-to-Office Mandates Hurt Companies</strong></p><p>•AT&amp;T’s sudden RTO mandate for January 2025 sparks criticism.</p><p>•Lou and John discuss a new study linking RTO policies to brain drain and rising turnover rates.</p><p>•<a href="https://tech.co/news/att-five-day-return-to-officeQq" rel="noopener noreferrer" target="_blank">https://tech.co/news/att-five-day-return-to-officeQq</a>&nbsp;</p><p>•<a href="https://arstechnica.com/tech-policy/2024/12/companies-issuing-rto-mandates-lose-their-best-talent-study/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/tech-policy/2024/12/companies-issuing-rto-mandates-lose-their-best-talent-study/</a>&nbsp;</p><br><p><strong>CVE of the Week:</strong></p><p><strong>Salt Typhoon Hack Targets SS7 Networks</strong></p><p>•A state-sponsored attack exploits SS7, the core routing protocol for phone systems, to intercept metadata and messages.</p><p>•Lou explains how lawful intercept capabilities intended for governments became a vector for this breach.</p><p>•Why end-to-end encryption must become the norm for secure communication.</p><p>•<a href="https://www.reuters.com/world/us/us-cyber-watchdog-tells-senior-officials-immediately-adopt-end-to-end-encryption-2024-12-18/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/us/us-cyber-watchdog-tells-senior-officials-immediately-adopt-end-to-end-encryption-2024-12-18/</a>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Clear Audio for Remote Work: From Noise Suppression to Microphone Choice</title>
			<itunes:title>Clear Audio for Remote Work: From Noise Suppression to Microphone Choice</itunes:title>
			<pubDate>Wed, 18 Dec 2024 16:05:11 GMT</pubDate>
			<itunes:duration>31:33</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6762f2b7d1214edb57c10f71/media.mp3" length="545408956" type="audio/mpeg"/>
			<guid isPermaLink="false">6762f2b7d1214edb57c10f71</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-deep-dive-s01e08</link>
			<acast:episodeId>6762f2b7d1214edb57c10f71</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-deep-dive-s01e08</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YBGphHxlb94uNxu/6isQXeUQhh3wPkDSYrmQ0pU6LdwBORVR4UCCVH+qWNOJd7ChOY+7y0I9mI8Ni2P8wt619H]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Deep Dive - S01E08</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1734537622303-243a6908-7702-4a8b-9654-9b72149f5e8f.jpeg"/>
			<description><![CDATA[<p>In Episode 5 of this series on supporting remote workers, John and Lou focus on achieving clear audio for online meetings and remote work. They discuss sound absorption, noise suppression, software tools, and selecting the right microphone. Learn how IT professionals can help teams sound professional and distraction-free in virtual environments.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>Intro:</strong></p><p>•John and Lou welcome listeners to the fifth episode in the remote work series, spotlighting the critical yet often overlooked topic of clear audio in virtual meetings.</p><br><p><strong>Episode 1 - 4 Recap:</strong></p><p>•A quick overview of previous episodes, covering remote work policies, visual presentation, and lighting for video calls.</p><p>•Lou highlights the importance of tackling audio as the next step in creating professional remote setups.</p><p>•<strong>Youtube&nbsp;- </strong><a href="https://youtu.be/H02u0BASJsE" rel="noopener noreferrer" target="_blank"><strong>https://youtu.be/H02u0BASJsE</strong></a></p><p>•Podcast - <a href="https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex" rel="noopener noreferrer" target="_blank">https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex</a></p><br><p><strong>Overview on Importance of Clear Audio:</strong></p><p>•Clear audio is more critical than video quality for effective virtual communication.</p><p>•Poor sound quality can distract and frustrate meeting participants, overshadowing even the most well-prepared content.</p><br><p><strong>1 - Sound Absorption:</strong></p><p>•Tips for reducing echo and creating a “dead space” for audio clarity:</p><p>•Use sound tiles, rugs, thick curtains, and fabric furniture to absorb sound.</p><p>•DIY solutions like creating portable sound barriers with foam panels and cardboard.</p><p>•Lou explains the role of non-parallel surfaces in minimizing sound reflections.</p><br><p><strong>2 - Environmental Noise Suppression:</strong></p><p>•Strategies to block external noise:</p><p>•Insulating walls with materials like rock wool or QuietRock.</p><p>•Double-pane windows and sealed gaps for improved soundproofing.</p><p>•How landscaping can act as a natural sound barrier.</p><br><p><strong>3 - Software Noise Reduction:</strong></p><p>•Leveraging built-in meeting platform features (e.g., Zoom, Teams) for echo and noise cancellation.</p><p>•External software tools like Krisp for AI-driven noise reduction, particularly useful for less optimized setups.</p><p>•John and Lou discuss potential pitfalls of using multiple noise-cancellation systems simultaneously.</p><br><p><br></p><p><strong>4 - Choosing a Microphone:</strong></p><p>•Factors to consider when selecting a microphone for remote work:</p><p>•USB vs. analog mics, lapel mics, and built-in laptop microphones.</p><p>•Pros and cons of popular models like Blue Yeti and Sennheiser wireless setups.</p><p>•How microphone choice affects mobility and audio quality in different scenarios.</p><br><p><strong>Wrap Up:</strong></p><p>•John and Lou invite listener feedback on improving audio setups for remote work.</p><p>•Email your thoughts to feedback@itsparccast.com or connect on X @ITSPARCCast.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 5 of this series on supporting remote workers, John and Lou focus on achieving clear audio for online meetings and remote work. They discuss sound absorption, noise suppression, software tools, and selecting the right microphone. Learn how IT professionals can help teams sound professional and distraction-free in virtual environments.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>Intro:</strong></p><p>•John and Lou welcome listeners to the fifth episode in the remote work series, spotlighting the critical yet often overlooked topic of clear audio in virtual meetings.</p><br><p><strong>Episode 1 - 4 Recap:</strong></p><p>•A quick overview of previous episodes, covering remote work policies, visual presentation, and lighting for video calls.</p><p>•Lou highlights the importance of tackling audio as the next step in creating professional remote setups.</p><p>•<strong>Youtube&nbsp;- </strong><a href="https://youtu.be/H02u0BASJsE" rel="noopener noreferrer" target="_blank"><strong>https://youtu.be/H02u0BASJsE</strong></a></p><p>•Podcast - <a href="https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex" rel="noopener noreferrer" target="_blank">https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex</a></p><br><p><strong>Overview on Importance of Clear Audio:</strong></p><p>•Clear audio is more critical than video quality for effective virtual communication.</p><p>•Poor sound quality can distract and frustrate meeting participants, overshadowing even the most well-prepared content.</p><br><p><strong>1 - Sound Absorption:</strong></p><p>•Tips for reducing echo and creating a “dead space” for audio clarity:</p><p>•Use sound tiles, rugs, thick curtains, and fabric furniture to absorb sound.</p><p>•DIY solutions like creating portable sound barriers with foam panels and cardboard.</p><p>•Lou explains the role of non-parallel surfaces in minimizing sound reflections.</p><br><p><strong>2 - Environmental Noise Suppression:</strong></p><p>•Strategies to block external noise:</p><p>•Insulating walls with materials like rock wool or QuietRock.</p><p>•Double-pane windows and sealed gaps for improved soundproofing.</p><p>•How landscaping can act as a natural sound barrier.</p><br><p><strong>3 - Software Noise Reduction:</strong></p><p>•Leveraging built-in meeting platform features (e.g., Zoom, Teams) for echo and noise cancellation.</p><p>•External software tools like Krisp for AI-driven noise reduction, particularly useful for less optimized setups.</p><p>•John and Lou discuss potential pitfalls of using multiple noise-cancellation systems simultaneously.</p><br><p><br></p><p><strong>4 - Choosing a Microphone:</strong></p><p>•Factors to consider when selecting a microphone for remote work:</p><p>•USB vs. analog mics, lapel mics, and built-in laptop microphones.</p><p>•Pros and cons of popular models like Blue Yeti and Sennheiser wireless setups.</p><p>•How microphone choice affects mobility and audio quality in different scenarios.</p><br><p><strong>Wrap Up:</strong></p><p>•John and Lou invite listener feedback on improving audio setups for remote work.</p><p>•Email your thoughts to feedback@itsparccast.com or connect on X @ITSPARCCast.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>English as a Programming Language, AI’s Web Takeover, and UEFI Security Warnings</title>
			<itunes:title>English as a Programming Language, AI’s Web Takeover, and UEFI Security Warnings</itunes:title>
			<pubDate>Fri, 13 Dec 2024 20:30:36 GMT</pubDate>
			<itunes:duration>35:21</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/675c996c27740406d86d83f1/media.mp3" length="610898380" type="audio/mpeg"/>
			<guid isPermaLink="false">675c996c27740406d86d83f1</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-s01e16</link>
			<acast:episodeId>675c996c27740406d86d83f1</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-s01e16</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZgL07WVaHlgE6harp0r1FoAd6g6QiU4lEC/4f+O4+YTwBfq5SeUVhEyadDhOLr7ueT3Q/42CwD82z3RPSmakOD]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - S01E16</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>16</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1734121113431-d75756b1-31eb-4cf5-bfd7-fdd1c2b56165.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou discuss the rise of English and LLMs replacing programming language, AI’s potential to replace web browsers, and the latest security concerns with UEFI boot kits targeting Linux systems. Plus, a hot take on AI-written articles and their impact on the IT industry. Tune in for insights, debates, and actionable advice to stay ahead in enterprise IT.</p><br><p><strong>Show Notes:</strong></p><p><strong>News Bytes:</strong></p><p>English as the New Programming Language:</p><p>•Andres Karpathy’s prediction: “The hottest new programming language is English.”</p><p>•AI tools like GitHub Copilot and OpenAI Canvas are making programming more accessible, reducing the need for traditional coding languages.</p><p>•<a href="https://analyticsindiamag.com/ai-trends-future/2024-the-year-english-changed-the-coding-game-forever/" rel="noopener noreferrer" target="_blank">https://analyticsindiamag.com/ai-trends-future/2024-the-year-english-changed-the-coding-game-forever/</a>&nbsp;</p><br><p>AI’s Role in Replacing Web Browsers:</p><p>•Mustafa Suleyman of Microsoft claims AI will become the next web browser and search engine.</p><p>•John and Lou debate AI’s future role as the primary interface for accessing information and how it integrates with existing web technologies.</p><p>•<a href="https://www.theverge.com/24314821/microsoft-ai-ceo-mustafa-suleyman-google-deepmind-openai-inflection-agi-decoder-podcast" rel="noopener noreferrer" target="_blank">https://www.theverge.com/24314821/microsoft-ai-ceo-mustafa-suleyman-google-deepmind-openai-inflection-agi-decoder-podcast</a>&nbsp;</p><br><p>UEFI Boot Kit for Linux:</p><p>•A newly discovered UEFI boot kit targets Linux systems, exploiting firmware vulnerabilities to gain persistent access.</p><p>•Lou emphasizes the importance of trusted boot processes, TPM chips, and regular firmware updates.</p><p>•<a href="https://arstechnica.com/security/2024/11/found-in-the-wild-the-worlds-first-unkillable-uefi-bootkit-for-linux/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/security/2024/11/found-in-the-wild-the-worlds-first-unkillable-uefi-bootkit-for-linux/</a>&nbsp;</p><br><p><strong>John’s Hot Take:</strong></p><p>The Problem with AI-Written Articles:</p><p>•John and Lou critique two articles that appear to be AI-generated, noting their lack of depth and practical advice.</p><p>•The implications of cost-cutting measures in journalism using AI for IT professionals.</p><p>•<a href="https://www.computerworld.com/article/3606596/enterprise-buyers-guide-how-to-choose-videoconferencing-software.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/3606596/enterprise-buyers-guide-how-to-choose-videoconferencing-software.html</a>&nbsp;</p><p>•<a href="https://www.forbes.com/sites/stevemcdowell/2024/12/10/understanding-enterprise-ai-readiness-its-all-about-data/" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/stevemcdowell/2024/12/10/understanding-enterprise-ai-readiness-its-all-about-data/</a>&nbsp;</p><br><p><strong>CVE of the Week:</strong></p><p>More WordPress Vulnerabilities</p><p>•CVE-2024-11972: A critical vulnerability in the Hunk Companion plugin for WordPress is actively being exploited. This flaw allows attackers to silently install other vulnerable plugins, potentially opening the door to a range of attacks. </p><p>•CVE-2024-11205: A high-severity flaw in the WP Forms plugin allows authenticated attackers with subscriber-level access to refund Stripe payments and cancel subscriptions. </p><p>•<a href="https://thehackernews.com/2024/12/wordpress-hunk-companion-plugin-flaw.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/12/wordpress-hunk-companion-plugin-flaw.html</a>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou discuss the rise of English and LLMs replacing programming language, AI’s potential to replace web browsers, and the latest security concerns with UEFI boot kits targeting Linux systems. Plus, a hot take on AI-written articles and their impact on the IT industry. Tune in for insights, debates, and actionable advice to stay ahead in enterprise IT.</p><br><p><strong>Show Notes:</strong></p><p><strong>News Bytes:</strong></p><p>English as the New Programming Language:</p><p>•Andres Karpathy’s prediction: “The hottest new programming language is English.”</p><p>•AI tools like GitHub Copilot and OpenAI Canvas are making programming more accessible, reducing the need for traditional coding languages.</p><p>•<a href="https://analyticsindiamag.com/ai-trends-future/2024-the-year-english-changed-the-coding-game-forever/" rel="noopener noreferrer" target="_blank">https://analyticsindiamag.com/ai-trends-future/2024-the-year-english-changed-the-coding-game-forever/</a>&nbsp;</p><br><p>AI’s Role in Replacing Web Browsers:</p><p>•Mustafa Suleyman of Microsoft claims AI will become the next web browser and search engine.</p><p>•John and Lou debate AI’s future role as the primary interface for accessing information and how it integrates with existing web technologies.</p><p>•<a href="https://www.theverge.com/24314821/microsoft-ai-ceo-mustafa-suleyman-google-deepmind-openai-inflection-agi-decoder-podcast" rel="noopener noreferrer" target="_blank">https://www.theverge.com/24314821/microsoft-ai-ceo-mustafa-suleyman-google-deepmind-openai-inflection-agi-decoder-podcast</a>&nbsp;</p><br><p>UEFI Boot Kit for Linux:</p><p>•A newly discovered UEFI boot kit targets Linux systems, exploiting firmware vulnerabilities to gain persistent access.</p><p>•Lou emphasizes the importance of trusted boot processes, TPM chips, and regular firmware updates.</p><p>•<a href="https://arstechnica.com/security/2024/11/found-in-the-wild-the-worlds-first-unkillable-uefi-bootkit-for-linux/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/security/2024/11/found-in-the-wild-the-worlds-first-unkillable-uefi-bootkit-for-linux/</a>&nbsp;</p><br><p><strong>John’s Hot Take:</strong></p><p>The Problem with AI-Written Articles:</p><p>•John and Lou critique two articles that appear to be AI-generated, noting their lack of depth and practical advice.</p><p>•The implications of cost-cutting measures in journalism using AI for IT professionals.</p><p>•<a href="https://www.computerworld.com/article/3606596/enterprise-buyers-guide-how-to-choose-videoconferencing-software.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/3606596/enterprise-buyers-guide-how-to-choose-videoconferencing-software.html</a>&nbsp;</p><p>•<a href="https://www.forbes.com/sites/stevemcdowell/2024/12/10/understanding-enterprise-ai-readiness-its-all-about-data/" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/stevemcdowell/2024/12/10/understanding-enterprise-ai-readiness-its-all-about-data/</a>&nbsp;</p><br><p><strong>CVE of the Week:</strong></p><p>More WordPress Vulnerabilities</p><p>•CVE-2024-11972: A critical vulnerability in the Hunk Companion plugin for WordPress is actively being exploited. This flaw allows attackers to silently install other vulnerable plugins, potentially opening the door to a range of attacks. </p><p>•CVE-2024-11205: A high-severity flaw in the WP Forms plugin allows authenticated attackers with subscriber-level access to refund Stripe payments and cancel subscriptions. </p><p>•<a href="https://thehackernews.com/2024/12/wordpress-hunk-companion-plugin-flaw.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/12/wordpress-hunk-companion-plugin-flaw.html</a>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[IT's Role in Remote Work: Lighting - From Practical Setups to Professional Standards]]></title>
			<itunes:title><![CDATA[IT's Role in Remote Work: Lighting - From Practical Setups to Professional Standards]]></itunes:title>
			<pubDate>Wed, 11 Dec 2024 16:49:24 GMT</pubDate>
			<itunes:duration>25:00</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6759c2945bd86092520d616e/media.mp3" length="432027688" type="audio/mpeg"/>
			<guid isPermaLink="false">6759c2945bd86092520d616e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-deep-dive-s01e07</link>
			<acast:episodeId>6759c2945bd86092520d616e</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-deep-dive-s01e07</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZDL5ORmONw4iDkJAoBkyE1fHiOC2vMok2opCn3fBVcGtvZ5vvixJUvP/ooBClShePk8w56N92iekckQxang95V]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Deep Dive S01E07</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1733935782926-3aaa69bd-42df-4110-9dcd-8a04097bdc2c.jpeg"/>
			<description><![CDATA[<p>In Episode 4 of this series on supporting remote workers, John and Lou focus on lighting essentials for creating an effective and professional remote workspace. They discuss types of lighting, color temperature, and practical solutions for various budgets and setups. From diffused task lighting to branded decorative elements, learn how to optimize your remote workspace for better video calls and overall productivity.</p><br><p>Show Notes</p><br><p><strong>Episode 1 - 3 Recap:</strong></p><p>•Summary of previous episodes covering remote work benefits, structured policies, and professional setups.</p><p>•A quick review of Episode 1, focusing on why IT leaders must care about remote work and how enabling it supports talent acquisition, resilience, cost savings, and employee satisfaction.</p><p>•Recap of Episode 3’s focus on virtual backgrounds and how lighting enhances presentation.</p><p>•Youtube&nbsp;- <a href="https://youtu.be/H02u0BASJsE" rel="noopener noreferrer" target="_blank">https://youtu.be/H02u0BASJsE</a></p><p>•Podcast - <a href="https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex" rel="noopener noreferrer" target="_blank">https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex</a></p><br><p>Main Discussion:</p><br><p>Types of Lighting:</p><p>•Overview of ambient, task, accent, and decorative lighting.</p><p>•Examples of lighting setups for different workspaces: home offices, apartments, and shared spaces.</p><br><p>Color Temperature and Its Importance:</p><p>•Explanation of Kelvin scale and how it affects workspace mood and professionalism.</p><p>•Practical tips for choosing adjustable LED lights or color-temperature bulbs for a warm, natural look.</p><br><p>Budget-Friendly vs. Professional Solutions:</p><p>•Options for all budgets: USB video lights, portable diffusers, and Philips Hue smart systems.</p><p>•How to use ring lights effectively without creating unwanted glare on glasses.</p><p>•Tips for managing lighting in small spaces, like kitchens or shared rooms.</p><br><p>Screen as a Light Source:</p><p>•Using your monitor or laptop screen in “light mode” to supplement lighting.</p><p>•How small tweaks can improve your appearance on video calls without extra costs.</p><br><p>Wrap Up:</p><p>•John and Lou encourage feedback on lighting setups and other remote work topics.</p><p>•Email your thoughts to feedback@itsparccast.com or connect on X @ITSPARCCast.</p><p>•Tune in next week for Episode 5, covering audio optimization for remote workspaces.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 4 of this series on supporting remote workers, John and Lou focus on lighting essentials for creating an effective and professional remote workspace. They discuss types of lighting, color temperature, and practical solutions for various budgets and setups. From diffused task lighting to branded decorative elements, learn how to optimize your remote workspace for better video calls and overall productivity.</p><br><p>Show Notes</p><br><p><strong>Episode 1 - 3 Recap:</strong></p><p>•Summary of previous episodes covering remote work benefits, structured policies, and professional setups.</p><p>•A quick review of Episode 1, focusing on why IT leaders must care about remote work and how enabling it supports talent acquisition, resilience, cost savings, and employee satisfaction.</p><p>•Recap of Episode 3’s focus on virtual backgrounds and how lighting enhances presentation.</p><p>•Youtube&nbsp;- <a href="https://youtu.be/H02u0BASJsE" rel="noopener noreferrer" target="_blank">https://youtu.be/H02u0BASJsE</a></p><p>•Podcast - <a href="https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex" rel="noopener noreferrer" target="_blank">https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex</a></p><br><p>Main Discussion:</p><br><p>Types of Lighting:</p><p>•Overview of ambient, task, accent, and decorative lighting.</p><p>•Examples of lighting setups for different workspaces: home offices, apartments, and shared spaces.</p><br><p>Color Temperature and Its Importance:</p><p>•Explanation of Kelvin scale and how it affects workspace mood and professionalism.</p><p>•Practical tips for choosing adjustable LED lights or color-temperature bulbs for a warm, natural look.</p><br><p>Budget-Friendly vs. Professional Solutions:</p><p>•Options for all budgets: USB video lights, portable diffusers, and Philips Hue smart systems.</p><p>•How to use ring lights effectively without creating unwanted glare on glasses.</p><p>•Tips for managing lighting in small spaces, like kitchens or shared rooms.</p><br><p>Screen as a Light Source:</p><p>•Using your monitor or laptop screen in “light mode” to supplement lighting.</p><p>•How small tweaks can improve your appearance on video calls without extra costs.</p><br><p>Wrap Up:</p><p>•John and Lou encourage feedback on lighting setups and other remote work topics.</p><p>•Email your thoughts to feedback@itsparccast.com or connect on X @ITSPARCCast.</p><p>•Tune in next week for Episode 5, covering audio optimization for remote workspaces.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Apple Vulnerabilities, VMware Alternatives, and Pat Gelsinger’s Intel </title>
			<itunes:title>Apple Vulnerabilities, VMware Alternatives, and Pat Gelsinger’s Intel </itunes:title>
			<pubDate>Fri, 06 Dec 2024 16:16:23 GMT</pubDate>
			<itunes:duration>35:51</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67532357c640aa434cab8215/media.mp3" length="619679152" type="audio/mpeg"/>
			<guid isPermaLink="false">67532357c640aa434cab8215</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e15</link>
			<acast:episodeId>67532357c640aa434cab8215</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e15</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ayTSYfIP56j4qvEleXmDC4rlwt2wDm2+g22VHgf8RMhTzyIbAl4vW8oiNsHzBp6dZxEKnA97i53e84bHpuFyjF]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E15</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>15</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1733501687036-481bd24a-e01e-4bed-a2d3-a775c0937122.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou tackle Apple’s latest security vulnerabilities, explore Proxmox and OpenNebula as alternatives to VMware, and analyze Pat Gelsinger’s departure as Intel’s CEO. They also discuss shifting trends in IT infrastructure and the future of virtualization. Stay informed with insights and actionable advice for IT leaders.</p><br><p><br></p><p><strong><u>Show Notes</u></strong></p><br><p>News Bytes:</p><p>WordPress Anti-Spam Plugin Vulnerability:</p><p>•A critical flaw in the CleanTalk anti-spam plugin affects 200,000 sites, scoring a 9.8/10 in severity. Attackers can upload malicious plugins via DNS poisoning. Update to version 6.4.4 or above to mitigate this issue.</p><p>•https://it.slashdot.org/story/24/11/30/1830222/wordpress-anti-spam-plugin-vulnerability-exposes-200000-sites-to-rce-attacks</p><p>•https://www.searchenginejournal.com/wordpress-anti-spam-plugin-vulnerability-hits-200k-sites/533844/</p><br><p><br></p><p>VMware Alternatives on the Rise:</p><p>•Proxmox and OpenNebula make migrating from VMware easier, offering tools to reduce costs and enhance efficiency.</p><p>•Beeks Group, a UK-based virtualization provider, saw a 1,000% VMware licensing cost increase and switched to OpenNebula, achieving a 200% VM efficiency boost.</p><p>•https://nolabnoparty.com/en/proxmox-import-vmware-vms/?utm_source=linkedin&amp;utm_medium=social&amp;utm_campaign=ReviveOldPost</p><p>•https://arstechnica.com/information-technology/2024/12/company-claims-1000-percent-price-hike-drove-it-from-vmware-to-open-source-rival/</p><br><p>Intel CEO Pat Gelsinger Resigns:</p><p>•After less than four years, Gelsinger steps down amid concerns over Intel’s turnaround strategy. Co-CEOs David Zinsner and Michelle Johnson Holthous take over as the board searches for a permanent replacement.</p><p>•https://www.reuters.com/technology/intel-names-two-chip-industry-veterans-its-board-amid-ceo-search-2024-12-05/?utm_source=chatgpt.com</p><p>•https://www.barrons.com/articles/intel-stock-next-ceo-5388beef?utm_source=chatgpt.com</p><p>•https://www.ft.com/content/1da33c80-6328-49a7-be8a-e7e1221c43c0?utm_source=chatgpt.com</p><p>•https://www.tomshardware.com/pc-components/cpus/intel-ceo-pat-gelsinger-retires-effective-immediately-also-steps-down-from-bod-two-co-ceos-step-in&nbsp;</p><br><p><br></p><p>CVE of the Week:</p><p>Apple Cross-Site Scripting Vulnerability (CVE-2024-4308):</p><p>•Found in macOS, iOS, and other Apple products, this vulnerability exploits malicious web content to execute unauthorized code. Apple has issued a patch—update immediately to secure your devices.</p><p>•Tight integration between Apple systems means vulnerabilities can cascade across multiple services, emphasizing the importance of prompt updates.</p><p>•https://www.cve.org/CVERecord?id=CVE-2024-44308</p><p>•https://www.cve.org/CVERecord?id=CVE-2024-44309</p><br><p>Wrap Up:</p><p>John and Lou invite listener feedback on Pat Gelsinger’s exit, VMware alternatives, and other hot IT topics.</p><br><p>Share thoughts at feedback@itsparccast.com or on X @ITSPARCCast.</p><br><p>Don’t forget to like, subscribe, and share to support the podcast and help others stay updated.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou tackle Apple’s latest security vulnerabilities, explore Proxmox and OpenNebula as alternatives to VMware, and analyze Pat Gelsinger’s departure as Intel’s CEO. They also discuss shifting trends in IT infrastructure and the future of virtualization. Stay informed with insights and actionable advice for IT leaders.</p><br><p><br></p><p><strong><u>Show Notes</u></strong></p><br><p>News Bytes:</p><p>WordPress Anti-Spam Plugin Vulnerability:</p><p>•A critical flaw in the CleanTalk anti-spam plugin affects 200,000 sites, scoring a 9.8/10 in severity. Attackers can upload malicious plugins via DNS poisoning. Update to version 6.4.4 or above to mitigate this issue.</p><p>•https://it.slashdot.org/story/24/11/30/1830222/wordpress-anti-spam-plugin-vulnerability-exposes-200000-sites-to-rce-attacks</p><p>•https://www.searchenginejournal.com/wordpress-anti-spam-plugin-vulnerability-hits-200k-sites/533844/</p><br><p><br></p><p>VMware Alternatives on the Rise:</p><p>•Proxmox and OpenNebula make migrating from VMware easier, offering tools to reduce costs and enhance efficiency.</p><p>•Beeks Group, a UK-based virtualization provider, saw a 1,000% VMware licensing cost increase and switched to OpenNebula, achieving a 200% VM efficiency boost.</p><p>•https://nolabnoparty.com/en/proxmox-import-vmware-vms/?utm_source=linkedin&amp;utm_medium=social&amp;utm_campaign=ReviveOldPost</p><p>•https://arstechnica.com/information-technology/2024/12/company-claims-1000-percent-price-hike-drove-it-from-vmware-to-open-source-rival/</p><br><p>Intel CEO Pat Gelsinger Resigns:</p><p>•After less than four years, Gelsinger steps down amid concerns over Intel’s turnaround strategy. Co-CEOs David Zinsner and Michelle Johnson Holthous take over as the board searches for a permanent replacement.</p><p>•https://www.reuters.com/technology/intel-names-two-chip-industry-veterans-its-board-amid-ceo-search-2024-12-05/?utm_source=chatgpt.com</p><p>•https://www.barrons.com/articles/intel-stock-next-ceo-5388beef?utm_source=chatgpt.com</p><p>•https://www.ft.com/content/1da33c80-6328-49a7-be8a-e7e1221c43c0?utm_source=chatgpt.com</p><p>•https://www.tomshardware.com/pc-components/cpus/intel-ceo-pat-gelsinger-retires-effective-immediately-also-steps-down-from-bod-two-co-ceos-step-in&nbsp;</p><br><p><br></p><p>CVE of the Week:</p><p>Apple Cross-Site Scripting Vulnerability (CVE-2024-4308):</p><p>•Found in macOS, iOS, and other Apple products, this vulnerability exploits malicious web content to execute unauthorized code. Apple has issued a patch—update immediately to secure your devices.</p><p>•Tight integration between Apple systems means vulnerabilities can cascade across multiple services, emphasizing the importance of prompt updates.</p><p>•https://www.cve.org/CVERecord?id=CVE-2024-44308</p><p>•https://www.cve.org/CVERecord?id=CVE-2024-44309</p><br><p>Wrap Up:</p><p>John and Lou invite listener feedback on Pat Gelsinger’s exit, VMware alternatives, and other hot IT topics.</p><br><p>Share thoughts at feedback@itsparccast.com or on X @ITSPARCCast.</p><br><p>Don’t forget to like, subscribe, and share to support the podcast and help others stay updated.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>IT’s Role in Remote Work: Virtual Backgrounds, Professionalism, and Lead by Exmaple</title>
			<itunes:title>IT’s Role in Remote Work: Virtual Backgrounds, Professionalism, and Lead by Exmaple</itunes:title>
			<pubDate>Wed, 04 Dec 2024 16:26:47 GMT</pubDate>
			<itunes:duration>26:57</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/675082c757aa3cdaf315db7a/media.mp3" length="465769396" type="audio/mpeg"/>
			<guid isPermaLink="false">675082c757aa3cdaf315db7a</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-deep-dive-12-04-2024</link>
			<acast:episodeId>675082c757aa3cdaf315db7a</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-deep-dive-12-04-2024</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7btUsuxvnA4Bvm0nVflM3WiK3ZT3CGqteXPQOVPCRaln536QIY2g5thLzVs1jWht85XoAwKvsKaAfeMbNWaZ8zC]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Deep Dive - 12-04-2024</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1733329413475-1009ea20-74cc-41a7-a267-b1d46b8ab6fd.jpeg"/>
			<description><![CDATA[<p>In Episode 3 of this series on remote work, John and Lou explore practical tips and tools for creating professional virtual setups. They discuss the importance of clear audio, lighting, virtual backgrounds, and IT’s role in guiding users toward better online meeting etiquette. Learn how IT teams can lead by example and support remote workers in building trust and productivity.</p><br><p>Show Notes:</p><p>John and Lou introduce the third episode in the remote work series, focusing on practical advice for creating professional virtual meeting environments.</p><br><p><br></p><p><strong>Episode 1 &amp; 2 Recap:</strong></p><p>A quick summary of previous episodes, highlighting the benefits of remote work, the need for structured policies, and IT’s foundational role in enabling remote success.</p><br><p>Links to past episodes:</p><p>•<strong>Youtube&nbsp;- </strong><a href="https://youtu.be/H02u0BASJsE" rel="noopener noreferrer" target="_blank"><strong>https://youtu.be/H02u0BASJsE</strong></a></p><p>•Podcast - <a href="https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex" rel="noopener noreferrer" target="_blank">https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex</a></p><br><p>Main Discussion:</p><p>Virtual Backgrounds and Lighting:</p><p>•Virtual backgrounds: When to use them, how to select professional designs, and why green screens can elevate your presentation.</p><br><p>Lighting essentials: Avoid shadows and use even lighting for a clear, professional look.</p><p>•Professional Appearance in Meetings:</p><p>•Dress appropriately for virtual meetings as you would for in-person meetings. Avoid distractions like cluttered backgrounds or noisy environments.</p><p>•Lou shares insights on minimizing distractions caused by clothing (e.g., striped shirts causing visual artifacts).</p><br><p>IT’s Role in Supporting Remote Workspaces:</p><p>•IT departments should guide users in setting up effective virtual workspaces, including tools for virtual backgrounds, lighting, and noise reduction.</p><p>•Collaboration with marketing teams to provide branded virtual backgrounds.</p><p>•Encouraging IT professionals to lead by example in creating professional virtual setups.</p><br><p>Key Takeaways for Remote Workers:</p><p>•Establish a clear workspace and maintain a presentable background.</p><p>•Choose appropriate attire, and be mindful of your environment during calls.</p><p>•IT’s proactive guidance can prevent common virtual meeting issues and build trust in remote teams.</p><br><p>Wrap Up:</p><p>•John and Lou encourage listeners to share their own tips for remote work and professional online meetings.</p><p>•Reach out at feedback@itsparccast.com or on X @ITSPARCCast.</p><p>•Programming note: Next week’s Deep Dive will focus on lighting and video setups for remote work environments.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 3 of this series on remote work, John and Lou explore practical tips and tools for creating professional virtual setups. They discuss the importance of clear audio, lighting, virtual backgrounds, and IT’s role in guiding users toward better online meeting etiquette. Learn how IT teams can lead by example and support remote workers in building trust and productivity.</p><br><p>Show Notes:</p><p>John and Lou introduce the third episode in the remote work series, focusing on practical advice for creating professional virtual meeting environments.</p><br><p><br></p><p><strong>Episode 1 &amp; 2 Recap:</strong></p><p>A quick summary of previous episodes, highlighting the benefits of remote work, the need for structured policies, and IT’s foundational role in enabling remote success.</p><br><p>Links to past episodes:</p><p>•<strong>Youtube&nbsp;- </strong><a href="https://youtu.be/H02u0BASJsE" rel="noopener noreferrer" target="_blank"><strong>https://youtu.be/H02u0BASJsE</strong></a></p><p>•Podcast - <a href="https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex" rel="noopener noreferrer" target="_blank">https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex</a></p><br><p>Main Discussion:</p><p>Virtual Backgrounds and Lighting:</p><p>•Virtual backgrounds: When to use them, how to select professional designs, and why green screens can elevate your presentation.</p><br><p>Lighting essentials: Avoid shadows and use even lighting for a clear, professional look.</p><p>•Professional Appearance in Meetings:</p><p>•Dress appropriately for virtual meetings as you would for in-person meetings. Avoid distractions like cluttered backgrounds or noisy environments.</p><p>•Lou shares insights on minimizing distractions caused by clothing (e.g., striped shirts causing visual artifacts).</p><br><p>IT’s Role in Supporting Remote Workspaces:</p><p>•IT departments should guide users in setting up effective virtual workspaces, including tools for virtual backgrounds, lighting, and noise reduction.</p><p>•Collaboration with marketing teams to provide branded virtual backgrounds.</p><p>•Encouraging IT professionals to lead by example in creating professional virtual setups.</p><br><p>Key Takeaways for Remote Workers:</p><p>•Establish a clear workspace and maintain a presentable background.</p><p>•Choose appropriate attire, and be mindful of your environment during calls.</p><p>•IT’s proactive guidance can prevent common virtual meeting issues and build trust in remote teams.</p><br><p>Wrap Up:</p><p>•John and Lou encourage listeners to share their own tips for remote work and professional online meetings.</p><p>•Reach out at feedback@itsparccast.com or on X @ITSPARCCast.</p><p>•Programming note: Next week’s Deep Dive will focus on lighting and video setups for remote work environments.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Phobos Ransomware Arrest, Windows 365 Link Nerd Fight, and a Palo Alto CVE Warning</title>
			<itunes:title>Phobos Ransomware Arrest, Windows 365 Link Nerd Fight, and a Palo Alto CVE Warning</itunes:title>
			<pubDate>Fri, 22 Nov 2024 18:24:39 GMT</pubDate>
			<itunes:duration>29:32</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6740cc67c39ec4a4070b4fc6/media.mp3" length="510490072" type="audio/mpeg"/>
			<guid isPermaLink="false">6740cc67c39ec4a4070b4fc6</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e14</link>
			<acast:episodeId>6740cc67c39ec4a4070b4fc6</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e14</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Za8pAgw7y0GCpl2VSR13OTwQNR/FfK7su1aJ0n3LHRRp/sMwt5Sx+5tm5CRfaDcEqy0tYrn35OVjjXfboUOJu0]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E14</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1732299803963-8b36f95c-a55a-494a-afc3-c46fc575d042.jpeg"/>
			<description><![CDATA[<p>In Episode 14 of IT SPARC Cast, John and Lou delve into the latest enterprise IT news. Topics include the extradition of a ransomware mastermind, a heated debate over Microsoft’s new Windows 365 Link device, and an urgent security warning for Palo Alto firewalls. Tune in for insights, analysis, and a touch of humor from IT industry veterans.</p><br><p><strong><u>Show Notes:</u></strong></p><br><p>News Bytes:</p><p>Phobos Ransomware Leader Extradited</p><p>•Russian national Evgenii Ptitsyn extradited to the U.S. for leading a global ransomware operation using Phobos. Alleged to have extorted over $16 million, Ptitsyn faces multiple charges and potential decades in prison.</p><p>•Discussion on ransomware’s impact on businesses and the importance of cybersecurity insurance and enforcement.</p><p>•https://www.darkreading.com/cyberattacks-data-breaches/phobos-ransomware-cybercriminal-extradited-south-korea&nbsp;</p><br><p>AI Deepfake Scandal Shuts Down Pennsylvania School</p><p>•A student-created deepfake scandal at a private school in Pennsylvania sparks legal and parental outrage. Lou and John discuss the importance of clear policies to handle AI misuse in both schools and corporate settings.</p><p>•https://news.slashdot.org/story/24/11/18/2122251/explicit-deepfake-scandal-shuts-down-pennsylvania-school</p><br><p>Nerd Fight:</p><p>Microsoft Windows 365 Link Device – Innovation or Nostalgia?</p><p>•John and Lou debate the value of Microsoft’s new $349 Windows 365 Link device. John argues it’s a game-changer for secure remote work, while Lou critiques it as a glorified “dumb terminal.”</p><p>•They discuss its potential use cases in IT-controlled environments, from call centers to flexible remote work setups.</p><p>•https://techcommunity.microsoft.com/blog/windows-itpro-blog/windows-365-link—the-first-cloud-pc-device-for-windows-365/4302687</p><br><p>CVE of the Week:</p><p>Palo Alto Zero-Day Exploits (CVE-2024-00012)</p><p>•Critical vulnerabilities in Palo Alto firewalls allow attackers to bypass authentication and escalate privileges to root access. Lou provides practical tips for mitigating risks, including internal whitelisting and VPN use.</p><p>•John highlights the need for zero-trust architecture to combat modern multi-vector attacks.</p><p>•https://www.securityweek.com/palo-alto-patches-firewall-zero-day-exploited-in-operation-lunar-peek/</p><br><p>Wrap Up:</p><p>•John and Lou invite listeners to share opinions on the Windows 365 Link device and other topics via feedback@itsparccast.com or @ITSPARCCast on X.</p><p>•Programming note: IT SPARC Cast will return on December 4th with a deep dive on IT support for remote work and more enterprise IT news on December 6th.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 14 of IT SPARC Cast, John and Lou delve into the latest enterprise IT news. Topics include the extradition of a ransomware mastermind, a heated debate over Microsoft’s new Windows 365 Link device, and an urgent security warning for Palo Alto firewalls. Tune in for insights, analysis, and a touch of humor from IT industry veterans.</p><br><p><strong><u>Show Notes:</u></strong></p><br><p>News Bytes:</p><p>Phobos Ransomware Leader Extradited</p><p>•Russian national Evgenii Ptitsyn extradited to the U.S. for leading a global ransomware operation using Phobos. Alleged to have extorted over $16 million, Ptitsyn faces multiple charges and potential decades in prison.</p><p>•Discussion on ransomware’s impact on businesses and the importance of cybersecurity insurance and enforcement.</p><p>•https://www.darkreading.com/cyberattacks-data-breaches/phobos-ransomware-cybercriminal-extradited-south-korea&nbsp;</p><br><p>AI Deepfake Scandal Shuts Down Pennsylvania School</p><p>•A student-created deepfake scandal at a private school in Pennsylvania sparks legal and parental outrage. Lou and John discuss the importance of clear policies to handle AI misuse in both schools and corporate settings.</p><p>•https://news.slashdot.org/story/24/11/18/2122251/explicit-deepfake-scandal-shuts-down-pennsylvania-school</p><br><p>Nerd Fight:</p><p>Microsoft Windows 365 Link Device – Innovation or Nostalgia?</p><p>•John and Lou debate the value of Microsoft’s new $349 Windows 365 Link device. John argues it’s a game-changer for secure remote work, while Lou critiques it as a glorified “dumb terminal.”</p><p>•They discuss its potential use cases in IT-controlled environments, from call centers to flexible remote work setups.</p><p>•https://techcommunity.microsoft.com/blog/windows-itpro-blog/windows-365-link—the-first-cloud-pc-device-for-windows-365/4302687</p><br><p>CVE of the Week:</p><p>Palo Alto Zero-Day Exploits (CVE-2024-00012)</p><p>•Critical vulnerabilities in Palo Alto firewalls allow attackers to bypass authentication and escalate privileges to root access. Lou provides practical tips for mitigating risks, including internal whitelisting and VPN use.</p><p>•John highlights the need for zero-trust architecture to combat modern multi-vector attacks.</p><p>•https://www.securityweek.com/palo-alto-patches-firewall-zero-day-exploited-in-operation-lunar-peek/</p><br><p>Wrap Up:</p><p>•John and Lou invite listeners to share opinions on the Windows 365 Link device and other topics via feedback@itsparccast.com or @ITSPARCCast on X.</p><p>•Programming note: IT SPARC Cast will return on December 4th with a deep dive on IT support for remote work and more enterprise IT news on December 6th.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>IT’s Role in Supporting Remote Workers: Communication, Tools, and Culture</title>
			<itunes:title>IT’s Role in Supporting Remote Workers: Communication, Tools, and Culture</itunes:title>
			<pubDate>Wed, 20 Nov 2024 18:45:18 GMT</pubDate>
			<itunes:duration>40:02</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/673e2e3efc7e86ea70c3efbc/media.mp3" length="691883284" type="audio/mpeg"/>
			<guid isPermaLink="false">673e2e3efc7e86ea70c3efbc</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-deep-dive-episode-5</link>
			<acast:episodeId>673e2e3efc7e86ea70c3efbc</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-deep-dive-episode-5</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7YjxcY7Z2phQm7deLzmdxAbpOEu1Pv5H/d6bDJCM2EHvfL9SvmIRcJnz7XERoHe++smWFQho4NDQxyQMMbc2EMF]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Deep Dive - Episode 5</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1732128307431-d8ef858c-8f64-44e1-b745-64deb6306e8c.jpeg"/>
			<description><![CDATA[<p>In Episode 2 of this multi-part series, John and Lou dive deeper into IT’s role in supporting remote work. They discuss the critical elements of successful remote work environments, including clear communication infrastructure, robust digital tools, structured policies, and trust-based management. Explore how IT leaders can create a remote work culture that fosters productivity, collaboration, and employee satisfaction.</p><br><p><br></p><p>Show Notes:</p><br><p>Episode 1 Recap:</p><p>•A quick review of Episode 1, focusing on why IT leaders must care about remote work and how enabling it supports talent acquisition, resilience, cost savings, and employee satisfaction.</p><p>•<strong>Youtube&nbsp;- </strong><a href="https://youtu.be/H02u0BASJsE" rel="noopener noreferrer" target="_blank"><strong>https://youtu.be/H02u0BASJsE</strong></a></p><p>•Podcast - <a href="https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex" rel="noopener noreferrer" target="_blank">https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex</a></p><br><p>Clear Communication Infrastructure:</p><p>•Importance of synchronous and asynchronous communication tools (e.g., Zoom, Teams).</p><p>•Encouraging video-on for meetings while respecting personal boundaries.</p><p>•Regular team check-ins and 1:1s to mitigate disconnection and improve engagement.</p><p>•AI tools for automated note-taking and action item tracking during meetings.</p><br><p>Strong Digital Tools &amp; Systems:</p><p>•Evaluating project management platforms (e.g., Monday, Trello) for collaboration.</p><p>•Addressing secure file sharing and time zone management challenges.</p><p>•Innovations in video conferencing and telepresence setups for better engagement.</p><br><p><br></p><p>Structured Remote Work Policies:</p><p>•Setting clear expectations for availability, dress code, and meeting attendance.</p><p>•Offering flexibility in status reporting formats (e.g., text, audio, or video).</p><p>•Providing the right equipment and training while ensuring proper asset tracking.</p><br><p>Cultural Elements:</p><p>•Encouraging work-life balance and trust-based management styles.</p><p>•Creating intentional social connection opportunities (e.g., virtual break rooms, watch parties).</p><p>•Inclusive practices to prevent remote worker isolation and build stronger teams.</p><br><p>Management Practices:</p><p>•Emphasizing outcomes over hours worked.</p><p>•Structured performance reviews and effective goal-setting.</p><p>•Using written communication to document priorities and expectations.</p><br><p>Wrap Up:</p><p>•John and Lou invite feedback on tools, policies, and practices for supporting remote workers.</p><p>•Connect via feedback@itsparccast.com or on X @ITSPARCCast.</p><p>•Programming Note: New episodes will resume after Thanksgiving on December 4th and December 6th.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 2 of this multi-part series, John and Lou dive deeper into IT’s role in supporting remote work. They discuss the critical elements of successful remote work environments, including clear communication infrastructure, robust digital tools, structured policies, and trust-based management. Explore how IT leaders can create a remote work culture that fosters productivity, collaboration, and employee satisfaction.</p><br><p><br></p><p>Show Notes:</p><br><p>Episode 1 Recap:</p><p>•A quick review of Episode 1, focusing on why IT leaders must care about remote work and how enabling it supports talent acquisition, resilience, cost savings, and employee satisfaction.</p><p>•<strong>Youtube&nbsp;- </strong><a href="https://youtu.be/H02u0BASJsE" rel="noopener noreferrer" target="_blank"><strong>https://youtu.be/H02u0BASJsE</strong></a></p><p>•Podcast - <a href="https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex" rel="noopener noreferrer" target="_blank">https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex</a></p><br><p>Clear Communication Infrastructure:</p><p>•Importance of synchronous and asynchronous communication tools (e.g., Zoom, Teams).</p><p>•Encouraging video-on for meetings while respecting personal boundaries.</p><p>•Regular team check-ins and 1:1s to mitigate disconnection and improve engagement.</p><p>•AI tools for automated note-taking and action item tracking during meetings.</p><br><p>Strong Digital Tools &amp; Systems:</p><p>•Evaluating project management platforms (e.g., Monday, Trello) for collaboration.</p><p>•Addressing secure file sharing and time zone management challenges.</p><p>•Innovations in video conferencing and telepresence setups for better engagement.</p><br><p><br></p><p>Structured Remote Work Policies:</p><p>•Setting clear expectations for availability, dress code, and meeting attendance.</p><p>•Offering flexibility in status reporting formats (e.g., text, audio, or video).</p><p>•Providing the right equipment and training while ensuring proper asset tracking.</p><br><p>Cultural Elements:</p><p>•Encouraging work-life balance and trust-based management styles.</p><p>•Creating intentional social connection opportunities (e.g., virtual break rooms, watch parties).</p><p>•Inclusive practices to prevent remote worker isolation and build stronger teams.</p><br><p>Management Practices:</p><p>•Emphasizing outcomes over hours worked.</p><p>•Structured performance reviews and effective goal-setting.</p><p>•Using written communication to document priorities and expectations.</p><br><p>Wrap Up:</p><p>•John and Lou invite feedback on tools, policies, and practices for supporting remote workers.</p><p>•Connect via feedback@itsparccast.com or on X @ITSPARCCast.</p><p>•Programming Note: New episodes will resume after Thanksgiving on December 4th and December 6th.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>OpenAI Agents, Salesforce’s AI Expansion, and Android’s Critical Security Flaws</title>
			<itunes:title>OpenAI Agents, Salesforce’s AI Expansion, and Android’s Critical Security Flaws</itunes:title>
			<pubDate>Fri, 15 Nov 2024 17:06:04 GMT</pubDate>
			<itunes:duration>30:50</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67377f7ccb2eb55da684bf40/media.mp3" length="532964524" type="audio/mpeg"/>
			<guid isPermaLink="false">67377f7ccb2eb55da684bf40</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e13</link>
			<acast:episodeId>67377f7ccb2eb55da684bf40</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e13</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aNrqJav5L/BNNKPq9caVK7UW7oeFobl4OpO0iL82ZZOQjCqzDIvx9JHzrRG/s5+zILMfIrxczT+G4p7uy1Eico]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E13</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>13</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1731690210193-46a28f3a-828f-4d11-9a53-cf3afe7e97c2.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou cover the latest in AI and cybersecurity. OpenAI prepares to launch locally-hosted AI agents, Salesforce ramps up its AI-powered products with new hires, and 19 critical vulnerabilities in Android demand immediate attention. Tune in for insights on how these developments impact enterprise IT and security.</p><br><p>Show Notes:</p><br><p>News Bytes:</p><p>OpenAI to Launch Local AI Agents</p><p>•OpenAI’s “Operator” project will bring AI agents to local devices, enabling automation of tasks across platforms. This advancement could revolutionize daily workflows by integrating data from multiple enterprise systems into a unified report.</p><p>•Discussion on potential enterprise applications, from log analysis to anomaly detection, all within secure local environments.</p><p>•<a href="https://www.theverge.com/2024/11/13/24295879/openai-agent-operator-autonomous-ai" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2024/11/13/24295879/openai-agent-operator-autonomous-ai</a>&nbsp;</p><br><p>Salesforce’s AI Expansion with AgentForce</p><p>•Salesforce announces plans to hire 1,000 people to support its new AI product, AgentForce, a platform for building intelligent agents for customer service and internal use.</p><p>•This move reflects the growing demand for no-code AI tools and signals Salesforce’s commitment to AI-driven business solutions.</p><p>•<a href="https://slashdot.org/story/24/11/10/1819213/salesforce-to-hire-1000-people-for-big-ai-product-sales-push" rel="noopener noreferrer" target="_blank">https://slashdot.org/story/24/11/10/1819213/salesforce-to-hire-1000-people-for-big-ai-product-sales-push</a>&nbsp;</p><p>•<a href="https://finance.yahoo.com/news/salesforce-hire-1-000-people-194931457.html" rel="noopener noreferrer" target="_blank">https://finance.yahoo.com/news/salesforce-hire-1-000-people-194931457.html</a></p><br><p><br></p><p>Meet Wi-Fi 8: Reliability Over Speed</p><p>•Early details about Wi-Fi 8 show a focus on stability rather than speed, addressing connection drops common in current high-speed protocols.</p><p>•Discussion on the benefits for IoT devices and the challenges of implementing new standards across existing infrastructure.</p><p>•<a href="https://www.pcworld.com/article/2518469/meet-wi-fi-8-which-will-trade-speed-for-a-more-reliable-experience.html" rel="noopener noreferrer" target="_blank">https://www.pcworld.com/article/2518469/meet-wi-fi-8-which-will-trade-speed-for-a-more-reliable-experience.html</a>&nbsp;</p><br><p>CVE of the Week:</p><p>19 Critical Android Vulnerabilities</p><p>•Google’s latest Android update addresses 19 high-severity security holes, with two already actively exploited (CVE-2024-43047 and CVE-2024-43093).</p><p>•These vulnerabilities affect a wide range of devices and could compromise Android’s sandbox environment. John and Lou emphasize the importance of prompt patching and secure device management for enterprises.</p><p>•<a href="https://source.android.com/docs/security/bulletin/2024-11-01" rel="noopener noreferrer" target="_blank">https://source.android.com/docs/security/bulletin/2024-11-01</a>&nbsp;</p><br><p>Wrap Up:</p><p>•John and Lou invite feedback on potential topics, especially regarding vendor earnings and their implications for the IT sector. Reach out at feedback@itsparccast.com or on X @ITSPARCCast.</p><p>•Don’t forget to like, subscribe, and share to keep up with the latest in IT news.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou cover the latest in AI and cybersecurity. OpenAI prepares to launch locally-hosted AI agents, Salesforce ramps up its AI-powered products with new hires, and 19 critical vulnerabilities in Android demand immediate attention. Tune in for insights on how these developments impact enterprise IT and security.</p><br><p>Show Notes:</p><br><p>News Bytes:</p><p>OpenAI to Launch Local AI Agents</p><p>•OpenAI’s “Operator” project will bring AI agents to local devices, enabling automation of tasks across platforms. This advancement could revolutionize daily workflows by integrating data from multiple enterprise systems into a unified report.</p><p>•Discussion on potential enterprise applications, from log analysis to anomaly detection, all within secure local environments.</p><p>•<a href="https://www.theverge.com/2024/11/13/24295879/openai-agent-operator-autonomous-ai" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2024/11/13/24295879/openai-agent-operator-autonomous-ai</a>&nbsp;</p><br><p>Salesforce’s AI Expansion with AgentForce</p><p>•Salesforce announces plans to hire 1,000 people to support its new AI product, AgentForce, a platform for building intelligent agents for customer service and internal use.</p><p>•This move reflects the growing demand for no-code AI tools and signals Salesforce’s commitment to AI-driven business solutions.</p><p>•<a href="https://slashdot.org/story/24/11/10/1819213/salesforce-to-hire-1000-people-for-big-ai-product-sales-push" rel="noopener noreferrer" target="_blank">https://slashdot.org/story/24/11/10/1819213/salesforce-to-hire-1000-people-for-big-ai-product-sales-push</a>&nbsp;</p><p>•<a href="https://finance.yahoo.com/news/salesforce-hire-1-000-people-194931457.html" rel="noopener noreferrer" target="_blank">https://finance.yahoo.com/news/salesforce-hire-1-000-people-194931457.html</a></p><br><p><br></p><p>Meet Wi-Fi 8: Reliability Over Speed</p><p>•Early details about Wi-Fi 8 show a focus on stability rather than speed, addressing connection drops common in current high-speed protocols.</p><p>•Discussion on the benefits for IoT devices and the challenges of implementing new standards across existing infrastructure.</p><p>•<a href="https://www.pcworld.com/article/2518469/meet-wi-fi-8-which-will-trade-speed-for-a-more-reliable-experience.html" rel="noopener noreferrer" target="_blank">https://www.pcworld.com/article/2518469/meet-wi-fi-8-which-will-trade-speed-for-a-more-reliable-experience.html</a>&nbsp;</p><br><p>CVE of the Week:</p><p>19 Critical Android Vulnerabilities</p><p>•Google’s latest Android update addresses 19 high-severity security holes, with two already actively exploited (CVE-2024-43047 and CVE-2024-43093).</p><p>•These vulnerabilities affect a wide range of devices and could compromise Android’s sandbox environment. John and Lou emphasize the importance of prompt patching and secure device management for enterprises.</p><p>•<a href="https://source.android.com/docs/security/bulletin/2024-11-01" rel="noopener noreferrer" target="_blank">https://source.android.com/docs/security/bulletin/2024-11-01</a>&nbsp;</p><br><p>Wrap Up:</p><p>•John and Lou invite feedback on potential topics, especially regarding vendor earnings and their implications for the IT sector. Reach out at feedback@itsparccast.com or on X @ITSPARCCast.</p><p>•Don’t forget to like, subscribe, and share to keep up with the latest in IT news.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>IT’s Essential Role in Enabling Remote Work: Productivity, Flexibility, and the RTO Debate</title>
			<itunes:title>IT’s Essential Role in Enabling Remote Work: Productivity, Flexibility, and the RTO Debate</itunes:title>
			<pubDate>Wed, 13 Nov 2024 17:49:28 GMT</pubDate>
			<itunes:duration>30:32</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6734e6a85b81168b139a7b9d/media.mp3" length="527643208" type="audio/mpeg"/>
			<guid isPermaLink="false">6734e6a85b81168b139a7b9d</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/its-essential-role-in-enabling-remote-work-productivity-flex</link>
			<acast:episodeId>6734e6a85b81168b139a7b9d</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>its-essential-role-in-enabling-remote-work-productivity-flex</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Ynv6E2NjXA8Ocebnjx4Hg+N8dgOPLye0HDGzq5nYLX64x3H8UfZr2GxhGCAN8sViShMWuDhyjToKEHjUqTr57o]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Deep Dive - S01E04</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1731520112430-f39fc36b-c587-470b-a5e2-9c4e80c39207.jpeg"/>
			<description><![CDATA[<p>In this first episode of a new series, John and Lou explore IT’s critical role in supporting remote work. They discuss why remote work matters, the benefits it brings to employees and businesses, and why a mandated return to the office (RTO) may not be the best path forward. Get insights into how IT can help sustain productivity and enhance job satisfaction in a remote environment.</p><br><p><br></p><p>Show Notes:</p><br><p>Intro:</p><p>•John and Lou introduce the multi-part series on remote work, exploring how IT can optimize remote setups for productivity and flexibility.</p><br><p>Why Should We Care About Remote Work?</p><p>•The benefits of remote work include productivity boosts, better work-life balance, and access to a broader talent pool.</p><p>•Cost savings for both employees (commute, meals) and companies (office space).</p><p>•Increased flexibility improves employee satisfaction and retention, a critical metric in today’s competitive job market.</p><br><p>Why Are We So Adamant About Promoting Remote Work?</p><p>•Both John and Lou have extensive experience managing remote teams and have seen the benefits firsthand.</p><p>•Remote work offers flexibility for life’s demands (e.g., elder care) and can significantly improve mental and physical health.</p><p>•They argue that modern tools and technology make remote work not only feasible but often preferable.</p><br><p>State of the RTO (Return to Office) Effort:</p><p>•Large companies, like Amazon, are mandating RTO, often citing productivity concerns. John and Lou view this as a micromanagement issue.</p><p>•Examples from companies like Pinterest show that flexible work policies can boost innovation and reduce real estate costs.</p><p>•<a href="https://www.fastcompany.com/91225476/pinterest-exec-companies-that-force-workers-back-to-the-office-are-missing-the-big-picture" rel="noopener noreferrer" target="_blank">https://www.fastcompany.com/91225476/pinterest-exec-companies-that-force-workers-back-to-the-office-are-missing-the-big-picture</a></p><p>•Insight into how cultural shifts and management adjustments can sustain remote productivity without requiring full-time office presence.</p><br><p><br></p><p>Wrap Up:</p><p>John and Lou invite feedback on the pros and cons of remote work, asking listeners to share their experiences and opinions.</p><br><p>Stay tuned for future episodes diving into IT strategies, tools, and setups that enhance remote work efficiency.</p><br><p>Connect via feedback@itsparccast.com or on X @ITSPARCCast.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this first episode of a new series, John and Lou explore IT’s critical role in supporting remote work. They discuss why remote work matters, the benefits it brings to employees and businesses, and why a mandated return to the office (RTO) may not be the best path forward. Get insights into how IT can help sustain productivity and enhance job satisfaction in a remote environment.</p><br><p><br></p><p>Show Notes:</p><br><p>Intro:</p><p>•John and Lou introduce the multi-part series on remote work, exploring how IT can optimize remote setups for productivity and flexibility.</p><br><p>Why Should We Care About Remote Work?</p><p>•The benefits of remote work include productivity boosts, better work-life balance, and access to a broader talent pool.</p><p>•Cost savings for both employees (commute, meals) and companies (office space).</p><p>•Increased flexibility improves employee satisfaction and retention, a critical metric in today’s competitive job market.</p><br><p>Why Are We So Adamant About Promoting Remote Work?</p><p>•Both John and Lou have extensive experience managing remote teams and have seen the benefits firsthand.</p><p>•Remote work offers flexibility for life’s demands (e.g., elder care) and can significantly improve mental and physical health.</p><p>•They argue that modern tools and technology make remote work not only feasible but often preferable.</p><br><p>State of the RTO (Return to Office) Effort:</p><p>•Large companies, like Amazon, are mandating RTO, often citing productivity concerns. John and Lou view this as a micromanagement issue.</p><p>•Examples from companies like Pinterest show that flexible work policies can boost innovation and reduce real estate costs.</p><p>•<a href="https://www.fastcompany.com/91225476/pinterest-exec-companies-that-force-workers-back-to-the-office-are-missing-the-big-picture" rel="noopener noreferrer" target="_blank">https://www.fastcompany.com/91225476/pinterest-exec-companies-that-force-workers-back-to-the-office-are-missing-the-big-picture</a></p><p>•Insight into how cultural shifts and management adjustments can sustain remote productivity without requiring full-time office presence.</p><br><p><br></p><p>Wrap Up:</p><p>John and Lou invite feedback on the pros and cons of remote work, asking listeners to share their experiences and opinions.</p><br><p>Stay tuned for future episodes diving into IT strategies, tools, and setups that enhance remote work efficiency.</p><br><p>Connect via feedback@itsparccast.com or on X @ITSPARCCast.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>TP-Link Zombies are coming, GitHub’s AI Spark Tool, and a Critical SharePoint Vulnerability</title>
			<itunes:title>TP-Link Zombies are coming, GitHub’s AI Spark Tool, and a Critical SharePoint Vulnerability</itunes:title>
			<pubDate>Fri, 08 Nov 2024 22:04:38 GMT</pubDate>
			<itunes:duration>23:40</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/672e8af7eb963d839cc44f38/media.mp3" length="409240924" type="audio/mpeg"/>
			<guid isPermaLink="false">672e8af7eb963d839cc44f38</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-s01e12</link>
			<acast:episodeId>672e8af7eb963d839cc44f38</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-s01e12</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aQIrCGwaNrA435m94sg/yUjUZ5px18EwQyKLR3keTqoAYwcWujMxlRicLgO8JdFJg7B9USId8p80kUJ32lYEuV]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Episode S01E12</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>12</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1731103307748-33f1544f-6a8e-4197-87e6-744200b64d4c.jpeg"/>
			<description><![CDATA[<p>In this Episode of IT SPARC Cast, John and Lou dive into the latest in IT security and automation. They cover TP-Link devices forming a massive botnet, GitHub’s AI-powered Spark for micro app creation, and a critical SharePoint vulnerability (CVE-2024-38094) that’s being actively exploited. Tune in for insights, proactive solutions, and the importance of robust patching policies.</p><br><p>Show Notes:</p><br><p>News Bytes:</p><p>TP-Link Botnet Threats:</p><p>•Hackers using over 8,000 compromised TP-Link routers in password-spray attacks targeting Microsoft Azure accounts. The botnet, known as “Botnet 7777,” operates stealthily across 16,000 devices, largely evading detection.</p><p>•Discussion on how home and small business devices, like TP-Link, may pose hidden risks in networks due to infrequent patching.</p><p>•<a href="https://arstechnica.com/information-technology/2024/11/microsoft-warns-of-8000-strong-botnet-used-in-password-spraying-attacks/#gsc.tab=0" rel="noopener noreferrer" target="_blank">https://arstechnica.com/information-technology/2024/11/microsoft-warns-of-8000-strong-botnet-used-in-password-spraying-attacks/#gsc.tab=0</a>&nbsp;</p><br><p>GitHub’s Spark for AI Micro Apps:</p><p>•GitHub introduces Spark, a tool allowing users to create micro applications using natural language commands. This AI-powered system promises efficiency for non-coders and customizable app creation for IT departments.</p><p>•John and Lou discuss the potential of Spark in enterprise environments and the future of no-code tools for network and software automation.</p><p>•<a href="https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html" rel="noopener noreferrer" target="_blank"><strong>https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html</strong></a></p><br><p>Google’s Big Sleep Project Discovers Real-World Exploits:</p><p>•Google’s Big Sleep project, an AI-assisted vulnerability research tool, recently identified an exploitable stack buffer overflow in SQLite before its public release.</p><p>•Highlighting how AI is becoming a critical resource for vulnerability detection, with this discovery marking a significant step in proactive security.</p><p>•<a href="https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html" rel="noopener noreferrer" target="_blank"><strong>https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html</strong></a></p><br><p>CVE of the Week:</p><p>SharePoint Vulnerability - CVE-2024-38094:</p><p>•A recently patched vulnerability in SharePoint has seen exploitation in the wild. Rated 7.2 in severity, this issue allows attackers to run unauthorized code on vulnerable SharePoint servers.</p><p>•John and Lou stress the need for timely patching and suggest tools for network administrators to keep an eye on such vulnerabilities in on-prem environments.</p><p>•<a href="https://www.csoonline.com/article/3598616/a-new-sharepoint-vulnerability-is-already-being-exploited.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/3598616/a-new-sharepoint-vulnerability-is-already-being-exploited.html</a>&nbsp;</p><br><p>Wrap Up:</p><p>John and Lou invite listeners to share thoughts on SharePoint’s role in the enterprise and suggest any topics for future episodes. Connect with feedback@itsparccast.com or follow @ITSPARCCast on X.</p><br><p>Don’t miss next week’s deep dive on supporting remote work in enterprise IT.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this Episode of IT SPARC Cast, John and Lou dive into the latest in IT security and automation. They cover TP-Link devices forming a massive botnet, GitHub’s AI-powered Spark for micro app creation, and a critical SharePoint vulnerability (CVE-2024-38094) that’s being actively exploited. Tune in for insights, proactive solutions, and the importance of robust patching policies.</p><br><p>Show Notes:</p><br><p>News Bytes:</p><p>TP-Link Botnet Threats:</p><p>•Hackers using over 8,000 compromised TP-Link routers in password-spray attacks targeting Microsoft Azure accounts. The botnet, known as “Botnet 7777,” operates stealthily across 16,000 devices, largely evading detection.</p><p>•Discussion on how home and small business devices, like TP-Link, may pose hidden risks in networks due to infrequent patching.</p><p>•<a href="https://arstechnica.com/information-technology/2024/11/microsoft-warns-of-8000-strong-botnet-used-in-password-spraying-attacks/#gsc.tab=0" rel="noopener noreferrer" target="_blank">https://arstechnica.com/information-technology/2024/11/microsoft-warns-of-8000-strong-botnet-used-in-password-spraying-attacks/#gsc.tab=0</a>&nbsp;</p><br><p>GitHub’s Spark for AI Micro Apps:</p><p>•GitHub introduces Spark, a tool allowing users to create micro applications using natural language commands. This AI-powered system promises efficiency for non-coders and customizable app creation for IT departments.</p><p>•John and Lou discuss the potential of Spark in enterprise environments and the future of no-code tools for network and software automation.</p><p>•<a href="https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html" rel="noopener noreferrer" target="_blank"><strong>https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html</strong></a></p><br><p>Google’s Big Sleep Project Discovers Real-World Exploits:</p><p>•Google’s Big Sleep project, an AI-assisted vulnerability research tool, recently identified an exploitable stack buffer overflow in SQLite before its public release.</p><p>•Highlighting how AI is becoming a critical resource for vulnerability detection, with this discovery marking a significant step in proactive security.</p><p>•<a href="https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html" rel="noopener noreferrer" target="_blank"><strong>https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html</strong></a></p><br><p>CVE of the Week:</p><p>SharePoint Vulnerability - CVE-2024-38094:</p><p>•A recently patched vulnerability in SharePoint has seen exploitation in the wild. Rated 7.2 in severity, this issue allows attackers to run unauthorized code on vulnerable SharePoint servers.</p><p>•John and Lou stress the need for timely patching and suggest tools for network administrators to keep an eye on such vulnerabilities in on-prem environments.</p><p>•<a href="https://www.csoonline.com/article/3598616/a-new-sharepoint-vulnerability-is-already-being-exploited.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/3598616/a-new-sharepoint-vulnerability-is-already-being-exploited.html</a>&nbsp;</p><br><p>Wrap Up:</p><p>John and Lou invite listeners to share thoughts on SharePoint’s role in the enterprise and suggest any topics for future episodes. Connect with feedback@itsparccast.com or follow @ITSPARCCast on X.</p><br><p>Don’t miss next week’s deep dive on supporting remote work in enterprise IT.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>AI in K-12 Education Part 3: Policies, Challenges, and the Path Forward</title>
			<itunes:title>AI in K-12 Education Part 3: Policies, Challenges, and the Path Forward</itunes:title>
			<pubDate>Wed, 06 Nov 2024 17:06:07 GMT</pubDate>
			<itunes:duration>17:45</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/672ba1ffafa9526ed4bb7ec0/media.mp3" length="306958744" type="audio/mpeg"/>
			<guid isPermaLink="false">672ba1ffafa9526ed4bb7ec0</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-deep-dive-ai-in-k-12-part-3</link>
			<acast:episodeId>672ba1ffafa9526ed4bb7ec0</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-deep-dive-ai-in-k-12-part-3</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bXfWd8uB7mmoTqsv89RYK9mDSq5vSilwGAbiZzMgMq7QuzbCTxe6mDshT7uyCBeEXnJKZRecpYeJY6aXjGG7+7]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - Deep Dive - AI in K-12 Part 3</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1730912668074-8d18ba07-648d-4d9e-aba7-ed9ee00d229b.jpeg"/>
			<description><![CDATA[<p>In the final episode of this three-part series, John and Lou discuss the future of AI in K-12 education. They cover how IT leaders stay informed on AI developments, the role of AI in classrooms, and best practices for collaboration among school districts. Discover insights on building policies that balance innovation with responsibility and explore the partnerships shaping AI’s role in education.</p><br><p>Show Notes:</p><br><p>Intro:</p><p>•John and Lou welcome listeners to the last part of the K-12 AI series, covering AI policy development and district collaboration for the future of AI in schools.</p><br><p>Recap:</p><p>•Summary of Episodes 1 and 2: The current state of AI in schools, human impacts, and AI’s effect on students, teachers, IT staff, and parents.</p><p>•Youtube Episode - Part 1 - <a href="https://youtu.be/CU1CryyZkIE" rel="noopener noreferrer" target="_blank">https://youtu.be/CU1CryyZkIE</a></p><p>•Youtube Episode - Part 2 - <a href="https://youtu.be/wLR6g81yLpc" rel="noopener noreferrer" target="_blank">https://youtu.be/wLR6g81yLpc</a>&nbsp;</p><p>&nbsp;</p><br><p>Question 7: Staying Informed on AI Developments</p><p>•District 1 utilizes conferences like&nbsp;Maine Educational Technology Association (META) and an AI sandbox project with the University of Maine to stay up-to-date.</p><p>•District 2 stays informed through online forums and “thinking like a student,” searching topics students might explore about AI.</p><br><p>Question 8: AI’s Role in the Future of Education</p><p>•District 1 emphasizes balancing AI benefits with responsible use, focusing on policy to deter misuse (e.g., cheating).</p><p>•District 2 views AI as an integral tool in high school education, focusing on guidance for ethical usage as AI adoption grows.</p><br><p>Question 9: Collaboration with Other Districts and Organizations</p><p>•District 1 collaborates with&nbsp;Maine Educational Technology Association (META) and the University of Maine, while District 2 shares resources through the New Hampshire CTO group.</p><p>•Both districts highlight the importance of real-time communication among teachers, IT staff, and administrators to adapt AI policies.</p><br><p><br></p><p>Wrap Up:</p><p>John and Lou conclude the series, inviting feedback from educators, IT directors, and parents. Join the conversation at feedback@itsparccast.com or on X @ITSPARCCast.</p><p>Stay tuned for next week’s series on remote work and enterprise IT.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In the final episode of this three-part series, John and Lou discuss the future of AI in K-12 education. They cover how IT leaders stay informed on AI developments, the role of AI in classrooms, and best practices for collaboration among school districts. Discover insights on building policies that balance innovation with responsibility and explore the partnerships shaping AI’s role in education.</p><br><p>Show Notes:</p><br><p>Intro:</p><p>•John and Lou welcome listeners to the last part of the K-12 AI series, covering AI policy development and district collaboration for the future of AI in schools.</p><br><p>Recap:</p><p>•Summary of Episodes 1 and 2: The current state of AI in schools, human impacts, and AI’s effect on students, teachers, IT staff, and parents.</p><p>•Youtube Episode - Part 1 - <a href="https://youtu.be/CU1CryyZkIE" rel="noopener noreferrer" target="_blank">https://youtu.be/CU1CryyZkIE</a></p><p>•Youtube Episode - Part 2 - <a href="https://youtu.be/wLR6g81yLpc" rel="noopener noreferrer" target="_blank">https://youtu.be/wLR6g81yLpc</a>&nbsp;</p><p>&nbsp;</p><br><p>Question 7: Staying Informed on AI Developments</p><p>•District 1 utilizes conferences like&nbsp;Maine Educational Technology Association (META) and an AI sandbox project with the University of Maine to stay up-to-date.</p><p>•District 2 stays informed through online forums and “thinking like a student,” searching topics students might explore about AI.</p><br><p>Question 8: AI’s Role in the Future of Education</p><p>•District 1 emphasizes balancing AI benefits with responsible use, focusing on policy to deter misuse (e.g., cheating).</p><p>•District 2 views AI as an integral tool in high school education, focusing on guidance for ethical usage as AI adoption grows.</p><br><p>Question 9: Collaboration with Other Districts and Organizations</p><p>•District 1 collaborates with&nbsp;Maine Educational Technology Association (META) and the University of Maine, while District 2 shares resources through the New Hampshire CTO group.</p><p>•Both districts highlight the importance of real-time communication among teachers, IT staff, and administrators to adapt AI policies.</p><br><p><br></p><p>Wrap Up:</p><p>John and Lou conclude the series, inviting feedback from educators, IT directors, and parents. Join the conversation at feedback@itsparccast.com or on X @ITSPARCCast.</p><p>Stay tuned for next week’s series on remote work and enterprise IT.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[AT&T vs. Broadcom, Delta’s Legal Battle with CrowdStrike, and Super Micro’s Audit Issues]]></title>
			<itunes:title><![CDATA[AT&T vs. Broadcom, Delta’s Legal Battle with CrowdStrike, and Super Micro’s Audit Issues]]></itunes:title>
			<pubDate>Fri, 01 Nov 2024 16:57:19 GMT</pubDate>
			<itunes:duration>32:20</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67250870e4fa026005248a86/media.mp3" length="558766300" type="audio/mpeg"/>
			<guid isPermaLink="false">67250870e4fa026005248a86</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-november-1st-2024</link>
			<acast:episodeId>67250870e4fa026005248a86</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-november-1st-2024</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZyG9bYUz0NB4M3scHlk+bNpZZXee3e2xjwPLTRQRwcDc6ZO/91UZg0hDzJYGKh+oCYRnXo2XqfclqXi7NQzQVf]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - November 1st 2024</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1730480257237-83fb48d5-bca1-4196-ba3d-092f0209f87f.jpeg"/>
			<description><![CDATA[<p>In Episode 11 of IT SPARC Cast, John and Lou unpack high-stakes lawsuits and investigations shaking the IT industry. They cover AT&amp;T’s clash with Broadcom over VMWare support costs, Delta’s lawsuit against CrowdStrike after a massive flight disruption, and Ernst &amp; Young’s exit as Super Micro’s auditor. Join us for insights on how these cases impact IT decision-makers, plus our CVE of the Week and security tips for handling layoffs.</p><br><p>Show Notes:</p><br><p>News Bytes:</p><br><p>Return to Office Programs Losing Steam:</p><p>•New data shows that 80% of companies have return-to-office policies, but only 17% enforce them. Lou and John discuss how “quiet covering” by managers is keeping remote work alive and the risks of enforcing in-office requirements.</p><p>•<a href="https://www.yahoo.com/news/back-office-orders-become-common-100031656.html" rel="noopener noreferrer" target="_blank">https://www.yahoo.com/news/back-office-orders-become-common-100031656.html</a>&nbsp;</p><br><p>AT&amp;T Sues Broadcom Over VMWare Support Costs:</p><p>•AT&amp;T claims Broadcom violated a VMWare support agreement, raising fees by 1,000% after switching to a subscription model. The New York Supreme Court issued a temporary restraining order to maintain AT&amp;T’s support during negotiations.</p><p>•<a href="https://www.theregister.com/2024/10/16/att_broadcom_vmware_settlement_possible/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2024/10/16/att_broadcom_vmware_settlement_possible/</a>&nbsp;</p><p>•<a href="https://www.techtarget.com/searchVMware/news/366614302/Court-asks-ATT-Broadcom-to-resolve-VMware-dispute" rel="noopener noreferrer" target="_blank">https://www.techtarget.com/searchVMware/news/366614302/Court-asks-ATT-Broadcom-to-resolve-VMware-dispute</a>&nbsp;</p><p>•<a href="https://arstechnica.com/information-technology/2024/10/a-year-after-broadcoms-vmware-buy-customers-eye-exit-strategies/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/information-technology/2024/10/a-year-after-broadcoms-vmware-buy-customers-eye-exit-strategies/</a>&nbsp;</p><br><p>Delta Airlines vs. CrowdStrike:</p><p>•Delta is suing CrowdStrike over a botched update that caused a $500 million impact on operations, affecting 1.3 million passengers. Lou breaks down how the lawsuit may shape the future of endpoint security.</p><p>•<a href="https://www.reuters.com/legal/delta-sues-crowdstrike-over-software-update-that-prompted-mass-flight-2024-10-25/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/legal/delta-sues-crowdstrike-over-software-update-that-prompted-mass-flight-2024-10-25/</a>&nbsp;</p><br><p>Super Micro Under Federal Investigation:</p><p>•Ernst &amp; Young resigned as Super Micro’s auditor, citing internal control issues. Super Micro’s shares plummeted 33%, leading IT leaders to consider alternative hardware providers or renegotiate for better pricing.</p><p>•https://www.cnbc.com/2024/10/30/super-micro-auditor-resigns-after-raising-concerns-months-earlier.html</p><br><p>CVE of the Week:</p><br><p>Reflecting on CVE’s 25 Years of Service:</p><p>•Instead of a specific CVE, John and Lou honor the CVE system’s contribution to cybersecurity. They discuss its origins with MITRE and its essential role in keeping systems secure.</p><p>Insider Threat Spotlight:&nbsp;</p><p>•Lou shares a story about a former Disney employee who hacked internal systems to disrupt menu displays, demonstrating the need for stricter access management during terminations.</p><p>•<a href="https://www.theregister.com/2024/10/30/fired_disney_employee_hacks_menu/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2024/10/30/fired_disney_employee_hacks_menu/</a>&nbsp;</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In Episode 11 of IT SPARC Cast, John and Lou unpack high-stakes lawsuits and investigations shaking the IT industry. They cover AT&amp;T’s clash with Broadcom over VMWare support costs, Delta’s lawsuit against CrowdStrike after a massive flight disruption, and Ernst &amp; Young’s exit as Super Micro’s auditor. Join us for insights on how these cases impact IT decision-makers, plus our CVE of the Week and security tips for handling layoffs.</p><br><p>Show Notes:</p><br><p>News Bytes:</p><br><p>Return to Office Programs Losing Steam:</p><p>•New data shows that 80% of companies have return-to-office policies, but only 17% enforce them. Lou and John discuss how “quiet covering” by managers is keeping remote work alive and the risks of enforcing in-office requirements.</p><p>•<a href="https://www.yahoo.com/news/back-office-orders-become-common-100031656.html" rel="noopener noreferrer" target="_blank">https://www.yahoo.com/news/back-office-orders-become-common-100031656.html</a>&nbsp;</p><br><p>AT&amp;T Sues Broadcom Over VMWare Support Costs:</p><p>•AT&amp;T claims Broadcom violated a VMWare support agreement, raising fees by 1,000% after switching to a subscription model. The New York Supreme Court issued a temporary restraining order to maintain AT&amp;T’s support during negotiations.</p><p>•<a href="https://www.theregister.com/2024/10/16/att_broadcom_vmware_settlement_possible/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2024/10/16/att_broadcom_vmware_settlement_possible/</a>&nbsp;</p><p>•<a href="https://www.techtarget.com/searchVMware/news/366614302/Court-asks-ATT-Broadcom-to-resolve-VMware-dispute" rel="noopener noreferrer" target="_blank">https://www.techtarget.com/searchVMware/news/366614302/Court-asks-ATT-Broadcom-to-resolve-VMware-dispute</a>&nbsp;</p><p>•<a href="https://arstechnica.com/information-technology/2024/10/a-year-after-broadcoms-vmware-buy-customers-eye-exit-strategies/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/information-technology/2024/10/a-year-after-broadcoms-vmware-buy-customers-eye-exit-strategies/</a>&nbsp;</p><br><p>Delta Airlines vs. CrowdStrike:</p><p>•Delta is suing CrowdStrike over a botched update that caused a $500 million impact on operations, affecting 1.3 million passengers. Lou breaks down how the lawsuit may shape the future of endpoint security.</p><p>•<a href="https://www.reuters.com/legal/delta-sues-crowdstrike-over-software-update-that-prompted-mass-flight-2024-10-25/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/legal/delta-sues-crowdstrike-over-software-update-that-prompted-mass-flight-2024-10-25/</a>&nbsp;</p><br><p>Super Micro Under Federal Investigation:</p><p>•Ernst &amp; Young resigned as Super Micro’s auditor, citing internal control issues. Super Micro’s shares plummeted 33%, leading IT leaders to consider alternative hardware providers or renegotiate for better pricing.</p><p>•https://www.cnbc.com/2024/10/30/super-micro-auditor-resigns-after-raising-concerns-months-earlier.html</p><br><p>CVE of the Week:</p><br><p>Reflecting on CVE’s 25 Years of Service:</p><p>•Instead of a specific CVE, John and Lou honor the CVE system’s contribution to cybersecurity. They discuss its origins with MITRE and its essential role in keeping systems secure.</p><p>Insider Threat Spotlight:&nbsp;</p><p>•Lou shares a story about a former Disney employee who hacked internal systems to disrupt menu displays, demonstrating the need for stricter access management during terminations.</p><p>•<a href="https://www.theregister.com/2024/10/30/fired_disney_employee_hacks_menu/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2024/10/30/fired_disney_employee_hacks_menu/</a>&nbsp;</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>AI in K-12 Education Part 2: Tackling Cheating, Privacy, and Policy</title>
			<itunes:title>AI in K-12 Education Part 2: Tackling Cheating, Privacy, and Policy</itunes:title>
			<pubDate>Wed, 30 Oct 2024 16:25:03 GMT</pubDate>
			<itunes:duration>25:52</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/67225de077f0e7cbfb9ba08b/media.mp3" length="447126772" type="audio/mpeg"/>
			<guid isPermaLink="false">67225de077f0e7cbfb9ba08b</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-deep-dive-episode-2</link>
			<acast:episodeId>67225de077f0e7cbfb9ba08b</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-deep-dive-episode-2</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bOxrVRjy++Ad9yZxkypK5jRiMM6R7zOKkAfol036lbpWol2hFJ81AH1P5Yhni6bPBVYJBfCy8FjVInDggDdXeq]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast Deep Dive - AI in K-12 Part 2</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1730305112858-bec2d6e7-36de-44a2-bfa6-6504c787bd3a.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast Deep Dive, John and Lou continue with the second of three parts of the discussion on AI in K-12 and primary education. They dive into how schools address AI-assisted cheating, privacy challenges, and the role of IT departments in crafting responsible AI policies. Learn about real-life strategies from school IT leaders and the importance of collaboration in using AI effectively in education.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>Intro:</strong></p><br><p>John and Lou kick off by recapping the first episode, where they compared two school districts’ approaches to AI in education.</p><br><p><strong>Deep Dive:</strong></p><br><p>AI and Cheating Detection</p><p>•Concerns around plagiarism: Districts are exploring AI detection tools but worry about false positives.</p><p>•Some schools now require all assignments to be written in Google Docs to track typing patterns and prevent AI-assisted submissions.</p><p>•Discussion on the evolving tactics students might use to bypass these measures.</p><br><p>Collaborative Policy Development</p><p>•Districts are conducting “AI tours” and working with digital learning specialists to educate teachers on safe AI tools and data privacy.</p><p>•Schools emphasize collaboration between IT, teachers, and administrators to ensure that AI policies align with classroom needs.</p><br><p>Managing Student Devices</p><p>•IT departments are limiting AI tools on student Chromebooks, while allowing teachers access to approved educational AI applications.</p><p>•Google’s admin console gives schools control over Chromebooks, enabling restrictions that align with educational goals and privacy requirements.</p><br><p>Experimenting with Prompt “Poisoning” to Detect AI Usage</p><p>•John and Lou test a strategy where obscure references are added to prompts to detect AI-generated work, revealing mixed results in effectiveness.</p><p>•They discuss the importance of educating teachers to recognize AI-generated assignments and use critical questioning to assess student knowledge.</p><br><p><strong>Wrap Up:</strong></p><br><p>John and Lou encourage feedback from educators and IT professionals on AI’s role in schools, inviting emails at feedback@itsparccast.com and comments on X @ITSPARCCast.</p><br><p>Listeners are urged to subscribe, share, and stay tuned for next week’s episode on AI’s future in education.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast Deep Dive, John and Lou continue with the second of three parts of the discussion on AI in K-12 and primary education. They dive into how schools address AI-assisted cheating, privacy challenges, and the role of IT departments in crafting responsible AI policies. Learn about real-life strategies from school IT leaders and the importance of collaboration in using AI effectively in education.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>Intro:</strong></p><br><p>John and Lou kick off by recapping the first episode, where they compared two school districts’ approaches to AI in education.</p><br><p><strong>Deep Dive:</strong></p><br><p>AI and Cheating Detection</p><p>•Concerns around plagiarism: Districts are exploring AI detection tools but worry about false positives.</p><p>•Some schools now require all assignments to be written in Google Docs to track typing patterns and prevent AI-assisted submissions.</p><p>•Discussion on the evolving tactics students might use to bypass these measures.</p><br><p>Collaborative Policy Development</p><p>•Districts are conducting “AI tours” and working with digital learning specialists to educate teachers on safe AI tools and data privacy.</p><p>•Schools emphasize collaboration between IT, teachers, and administrators to ensure that AI policies align with classroom needs.</p><br><p>Managing Student Devices</p><p>•IT departments are limiting AI tools on student Chromebooks, while allowing teachers access to approved educational AI applications.</p><p>•Google’s admin console gives schools control over Chromebooks, enabling restrictions that align with educational goals and privacy requirements.</p><br><p>Experimenting with Prompt “Poisoning” to Detect AI Usage</p><p>•John and Lou test a strategy where obscure references are added to prompts to detect AI-generated work, revealing mixed results in effectiveness.</p><p>•They discuss the importance of educating teachers to recognize AI-generated assignments and use critical questioning to assess student knowledge.</p><br><p><strong>Wrap Up:</strong></p><br><p>John and Lou encourage feedback from educators and IT professionals on AI’s role in schools, inviting emails at feedback@itsparccast.com and comments on X @ITSPARCCast.</p><br><p>Listeners are urged to subscribe, share, and stay tuned for next week’s episode on AI’s future in education.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>IT SPARC Cast - October 25th 2024</title>
			<itunes:title>IT SPARC Cast - October 25th 2024</itunes:title>
			<pubDate>Fri, 25 Oct 2024 15:47:27 GMT</pubDate>
			<itunes:duration>40:30</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/671bbd8f22be238ac96a1292/media.mp3" length="700003396" type="audio/mpeg"/>
			<guid isPermaLink="false">671bbd8f22be238ac96a1292</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-october-25th-2024</link>
			<acast:episodeId>671bbd8f22be238ac96a1292</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-october-25th-2024</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZWQinO+ZQSnE3ywmcU0jC136k/1iIrk3vSbUmSZIxzmYlJJaaJAQPmlW+8fuLwf5K6RX5PWI2lptOFn4tcb+iU]]></acast:settings>
			<itunes:subtitle>VMWare’s Future, Spectre Returns, and CISO Accountability</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1729870977473-90c619d3-e5b8-4728-9b0a-f39715d4027d.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou tackle VMware’s shifting strategy under Broadcom, discussing whether the virtualization giant is losing ground. They also dig into the resurgence of the Spectre vulnerability and what it means for IT security in 2024. Plus, with recent fines over the 2020 SolarWinds hack, CISOs are facing more pressure to cover their bases. Tune in for expert opinions and insights from the world of Enterprise IT.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>News Bytes:</strong></p><br><p>VMWare’s Future Under Broadcom:</p><p>•With Broadcom’s acquisition of VMWare, companies are jumping ship due to rising costs.&nbsp;</p><p>•John and Lou discuss potential alternatives </p><p>•<a href="https://www.linkedin.com/posts/prgmd_has-broadcom-killed-vmware-many-businesses-activity-7253122328279076866-FfjD?utm_source=share&amp;utm_medium=member_ios" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/posts/prgmd_has-broadcom-killed-vmware-many-businesses-activity-7253122328279076866-FfjD?utm_source=share&amp;utm_medium=member_ios</a></p><br><p><br></p><p>AI Agents: Anthropic’s and Microsoft’s Automation Tools</p><p>•Anthropic’s AI Agents:</p><p>•New AI models automate tasks like keystrokes and mouse clicks, aimed at software developers.</p><p>•<a href="https://www.reuters.com/technology/artificial-intelligence/anthropic-releases-ai-automate-mouse-clicks-coders-2024-10-22/?_bhlid=11acf92736eb5937f843fe68c430b79a27b05f8f" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/artificial-intelligence/anthropic-releases-ai-automate-mouse-clicks-coders-2024-10-22/?_bhlid=11acf92736eb5937f843fe68c430b79a27b05f8f</a></p><br><p>•Microsoft’s AI Agents:</p><p>•No-code AI tools for automating daily tasks, releasing in November.</p><p>•Easy access to AI-powered automation without programming skills.</p><p>•<a href="https://www.reuters.com/technology/artificial-intelligence/microsoft-allow-autonomous-ai-agent-development-starting-next-month-2024-10-21/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/artificial-intelligence/microsoft-allow-autonomous-ai-agent-development-starting-next-month-2024-10-21/</a>&nbsp;</p><br><p>AGI Prompt Attacks: Deceptive Delight</p><p>•Researchers found a method to trick AGI models into revealing restricted info with cleverly crafted prompts.</p><p>•AI systems can be manipulated to reveal hidden data, posing risks for sensitive information handling.</p><p>•<a href="https://thehackernews.com/2024/10/researchers-reveal-deceptive-delight.htmlhttps://thehackernews.com/2024/10/researchers-reveal-deceptive-delight.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/10/researchers-reveal-deceptive-delight.htmlhttps://thehackernews.com/2024/10/researchers-reveal-deceptive-delight.html</a>&nbsp;</p><br><p>CISO Accountability in the SolarWinds Fallout:</p><p>•CISOs are becoming the new shields for corporations and what this means for corporate liability in data breaches.</p><p>•<a href="https://www.csoonline.com/article/3578782/four-firms-charged-fined-over-handling-of-solarwinds-hack-disclosures.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/3578782/four-firms-charged-fined-over-handling-of-solarwinds-hack-disclosures.html</a></p><br><p><strong>CVE of the Week:</strong></p><br><p>Spectre Bug Resurfaces:</p><p>•Despite widespread patches since 2017, Spectre is back in the spotlight.&nbsp;</p><p>•This time, researchers found a way to bypass hardware mitigations and access root passwords, leaving companies exposed.&nbsp;</p><p>•<a href="https://www.phoronix.com/news/Torvalds-Frustrated-Buggy-HW" rel="noopener noreferrer" target="_blank">https://www.phoronix.com/news/Torvalds-Frustrated-Buggy-HW</a></p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou tackle VMware’s shifting strategy under Broadcom, discussing whether the virtualization giant is losing ground. They also dig into the resurgence of the Spectre vulnerability and what it means for IT security in 2024. Plus, with recent fines over the 2020 SolarWinds hack, CISOs are facing more pressure to cover their bases. Tune in for expert opinions and insights from the world of Enterprise IT.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>News Bytes:</strong></p><br><p>VMWare’s Future Under Broadcom:</p><p>•With Broadcom’s acquisition of VMWare, companies are jumping ship due to rising costs.&nbsp;</p><p>•John and Lou discuss potential alternatives </p><p>•<a href="https://www.linkedin.com/posts/prgmd_has-broadcom-killed-vmware-many-businesses-activity-7253122328279076866-FfjD?utm_source=share&amp;utm_medium=member_ios" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/posts/prgmd_has-broadcom-killed-vmware-many-businesses-activity-7253122328279076866-FfjD?utm_source=share&amp;utm_medium=member_ios</a></p><br><p><br></p><p>AI Agents: Anthropic’s and Microsoft’s Automation Tools</p><p>•Anthropic’s AI Agents:</p><p>•New AI models automate tasks like keystrokes and mouse clicks, aimed at software developers.</p><p>•<a href="https://www.reuters.com/technology/artificial-intelligence/anthropic-releases-ai-automate-mouse-clicks-coders-2024-10-22/?_bhlid=11acf92736eb5937f843fe68c430b79a27b05f8f" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/artificial-intelligence/anthropic-releases-ai-automate-mouse-clicks-coders-2024-10-22/?_bhlid=11acf92736eb5937f843fe68c430b79a27b05f8f</a></p><br><p>•Microsoft’s AI Agents:</p><p>•No-code AI tools for automating daily tasks, releasing in November.</p><p>•Easy access to AI-powered automation without programming skills.</p><p>•<a href="https://www.reuters.com/technology/artificial-intelligence/microsoft-allow-autonomous-ai-agent-development-starting-next-month-2024-10-21/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/artificial-intelligence/microsoft-allow-autonomous-ai-agent-development-starting-next-month-2024-10-21/</a>&nbsp;</p><br><p>AGI Prompt Attacks: Deceptive Delight</p><p>•Researchers found a method to trick AGI models into revealing restricted info with cleverly crafted prompts.</p><p>•AI systems can be manipulated to reveal hidden data, posing risks for sensitive information handling.</p><p>•<a href="https://thehackernews.com/2024/10/researchers-reveal-deceptive-delight.htmlhttps://thehackernews.com/2024/10/researchers-reveal-deceptive-delight.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/10/researchers-reveal-deceptive-delight.htmlhttps://thehackernews.com/2024/10/researchers-reveal-deceptive-delight.html</a>&nbsp;</p><br><p>CISO Accountability in the SolarWinds Fallout:</p><p>•CISOs are becoming the new shields for corporations and what this means for corporate liability in data breaches.</p><p>•<a href="https://www.csoonline.com/article/3578782/four-firms-charged-fined-over-handling-of-solarwinds-hack-disclosures.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/3578782/four-firms-charged-fined-over-handling-of-solarwinds-hack-disclosures.html</a></p><br><p><strong>CVE of the Week:</strong></p><br><p>Spectre Bug Resurfaces:</p><p>•Despite widespread patches since 2017, Spectre is back in the spotlight.&nbsp;</p><p>•This time, researchers found a way to bypass hardware mitigations and access root passwords, leaving companies exposed.&nbsp;</p><p>•<a href="https://www.phoronix.com/news/Torvalds-Frustrated-Buggy-HW" rel="noopener noreferrer" target="_blank">https://www.phoronix.com/news/Torvalds-Frustrated-Buggy-HW</a></p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>AI in K-12 Education Part 1: Revolutionizing Education or Raising Concerns?</title>
			<itunes:title>AI in K-12 Education Part 1: Revolutionizing Education or Raising Concerns?</itunes:title>
			<pubDate>Wed, 23 Oct 2024 16:34:37 GMT</pubDate>
			<itunes:duration>18:07</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6719259d83ac9fccac1b8f56/media.mp3" length="313072852" type="audio/mpeg"/>
			<guid isPermaLink="false">6719259d83ac9fccac1b8f56</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-deep-dive-episode-01</link>
			<acast:episodeId>6719259d83ac9fccac1b8f56</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-deep-dive-episode-01</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bS8go4p1gFhRhPn3qKkw7YCIS8mkVZxG8NDolx8ILUlUwth/qInscIZYi3HGpY7daf5ixx84wWduIbsjsQP+X1]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast Deep Dive - AI in K-12 Part 1</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1729700819722-d917ddb4-89dc-4f0d-9698-81e65fe9c7a6.jpeg"/>
			<description><![CDATA[<p>In this inaugural episode of IT SPARC Cast Deep Dive, John and Lou explore the impact of AI on K-12 education. They discuss how different school districts are handling the integration of AI tools, including the use of tools like ChatGPT and Google Gemini. Are schools ready for this shift, or are they playing catch-up? Join the conversation as they examine the challenges, policies, and future of AI in the classroom.</p><br><p><strong>Show Notes:</strong></p><br><p><br></p><p>AI in the Classroom: A Case Study:</p><br><p>John spoke with two IT directors from different school districts—one in a rural, lower-income area (School A) and another in a more affluent, suburban district (School B). They compare how these districts are tackling the challenges of AI in education.</p><p>•School A has implemented an acceptable use policy focused on preventing plagiarism with AI tools like ChatGPT.</p><p>•School B has adopted School AI, a specialized tool that monitors student AI use and helps keep them on task.</p><br><p>ChromeBooks and Google Gemini:</p><br><p>The rise of AI-integrated hardware in education is becoming a growing concern, with Google Gemini’s introduction to new ChromeBook models. Will schools be able to control these tools effectively, or will they be forced to adopt AI faster than they are prepared for?</p><br><p>Student Learning and AI:</p><p>Both districts are at different stages of AI adoption, but both recognize the importance of educating teachers on responsible AI use before fully integrating it into the classroom. AI tools like Canva and School AI have been introduced to help students, but privacy and ethical concerns loom large.</p><br><p><strong>Wrap Up:</strong></p><br><p>John and Lou discuss their takeaways: Schools are at the beginning stages of AI adoption, but they are aware of the challenges ahead. They encourage listeners to share their experiences and insights regarding AI in education.</p><br><p>Feedback and topic suggestions: feedback@ITSPARCCast.com or @ITSPARCCast on X.</p><br><p>Like, subscribe, and turn on notifications for more IT deep dives and expert opinions.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this inaugural episode of IT SPARC Cast Deep Dive, John and Lou explore the impact of AI on K-12 education. They discuss how different school districts are handling the integration of AI tools, including the use of tools like ChatGPT and Google Gemini. Are schools ready for this shift, or are they playing catch-up? Join the conversation as they examine the challenges, policies, and future of AI in the classroom.</p><br><p><strong>Show Notes:</strong></p><br><p><br></p><p>AI in the Classroom: A Case Study:</p><br><p>John spoke with two IT directors from different school districts—one in a rural, lower-income area (School A) and another in a more affluent, suburban district (School B). They compare how these districts are tackling the challenges of AI in education.</p><p>•School A has implemented an acceptable use policy focused on preventing plagiarism with AI tools like ChatGPT.</p><p>•School B has adopted School AI, a specialized tool that monitors student AI use and helps keep them on task.</p><br><p>ChromeBooks and Google Gemini:</p><br><p>The rise of AI-integrated hardware in education is becoming a growing concern, with Google Gemini’s introduction to new ChromeBook models. Will schools be able to control these tools effectively, or will they be forced to adopt AI faster than they are prepared for?</p><br><p>Student Learning and AI:</p><p>Both districts are at different stages of AI adoption, but both recognize the importance of educating teachers on responsible AI use before fully integrating it into the classroom. AI tools like Canva and School AI have been introduced to help students, but privacy and ethical concerns loom large.</p><br><p><strong>Wrap Up:</strong></p><br><p>John and Lou discuss their takeaways: Schools are at the beginning stages of AI adoption, but they are aware of the challenges ahead. They encourage listeners to share their experiences and insights regarding AI in education.</p><br><p>Feedback and topic suggestions: feedback@ITSPARCCast.com or @ITSPARCCast on X.</p><br><p>Like, subscribe, and turn on notifications for more IT deep dives and expert opinions.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>IT SPARC Cast - October 18th 2024</title>
			<itunes:title>IT SPARC Cast - October 18th 2024</itunes:title>
			<pubDate>Fri, 18 Oct 2024 12:50:49 GMT</pubDate>
			<itunes:duration>28:53</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/671259aa13da25d9f62e9d09/media.mp3" length="499186780" type="audio/mpeg"/>
			<guid isPermaLink="false">671259aa13da25d9f62e9d09</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-october-18th-2024</link>
			<acast:episodeId>671259aa13da25d9f62e9d09</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-october-18th-2024</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZwsHpODRP+1jN6323U0FDp9aewlFSFZOtUeA3UKcl5n/wpHtwLaPD+ntLaIezVBFuPqs8zcPIccTX7gTeWFarz]]></acast:settings>
			<itunes:subtitle>Open Source Challenges, Nuclear-Powered Data Centers, and CVE Alerts</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1729255225875-62584fab-dd39-4af1-bd66-67b2da125a8d.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou dive into the complexities of open source funding, the future of data centers powered by small modular nuclear reactors, and critical security vulnerabilities you need to know about. With a CVE hitting your firewall hard and the increasing fragility of AI systems, we cover what you need to secure your enterprise IT systems. Tune in for insights from seasoned pros in the IT space.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>News Bytes:</strong></p><br><p>• Open Source in Crisis: How enterprises rely on open source software and the importance of funding it.</p><p>• Python and Linux are at the core of infrastructure, but without proper support, businesses are at risk.</p><p>• Example: The left-pad NPM issue that caused widespread disruptions.</p><p>• How can businesses support open-source projects?</p><p>• Corporate sponsorships, direct monetization, and intermediary companies like Red Hat and Canonical are crucial solutions.</p><p>• A spotlight on Germany’s Sovereign Tech Fund, leading the way in public aid for open source.</p><p>• <a href="https://www.infoworld.com/article/3557846/how-do-we-fund-open-source.html" rel="noopener noreferrer" target="_blank">https://www.infoworld.com/article/3557846/how-do-we-fund-open-source.html</a></p><p>• AI’s Growing Energy Demands</p><p>• Amazon and the U.S. Department of Energy are collaborating on small modular nuclear reactors (SMRs) to power data centers.</p><p>• Microsoft, Amazon, and others are exploring nuclear power to handle the future energy demands of AI.</p><p>• Lou explains the cutting-edge advancements in liquid fluorine salt reactors and their potential future applications.</p><p>• <a href="https://www.geekwire.com/2024/doe-announces-900m-for-next-gen-reactors-as-amazon-launches-nuclear-power-pursuit/" rel="noopener noreferrer" target="_blank">https://www.geekwire.com/2024/doe-announces-900m-for-next-gen-reactors-as-amazon-launches-nuclear-power-pursuit/</a></p><p>• The Changing Landscape of IT Jobs</p><p>• Despite big layoffs from tech giants, smaller companies are filling the gap.</p><p>• AI and its role in reshaping the IT job market, including a shift toward roles in tech support, help desk, and AI development.</p><p>• <a href="https://www.computerworld.com/article/3554907/big-shift-in-it-employment-shows-new-skills-are-needed.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/3554907/big-shift-in-it-employment-shows-new-skills-are-needed.html</a></p><br><p><strong>CVE of the Week:</strong></p><br><p>• Firewall Meltdown: Fortinet, Palo Alto, and Check Point firewalls are facing severe vulnerabilities with CVEs like 2024-23113.</p><p>• Fortinet’s OS vulnerabilities could allow attackers to execute arbitrary commands.</p><p>• Palo Alto’s CVEs include operating system-level command injection vulnerabilities with a severity rating of 9.9 out of 10.</p><p>• What should you do? Embrace defense-in-depth strategies and stay in touch with your firewall vendors for immediate updates.</p><p>• <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23113" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2024-23113</a>&nbsp;</p><p>• <a href="https://thehackernews.com/2024/10/cisa-warns-of-critical-fortinet-flaw-as.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/10/cisa-warns-of-critical-fortinet-flaw-as.html</a>&nbsp;</p><br><p><strong>Wrap Up:</strong></p><br><p>•Call for feedback: Send your topic ideas or feedback to feedback@itsparccast.com or connect with us on X (@itsparccast).</p><p>•Be sure to like, subscribe, and turn on notifications so you don’t miss next week’s insights into enterprise IT.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou dive into the complexities of open source funding, the future of data centers powered by small modular nuclear reactors, and critical security vulnerabilities you need to know about. With a CVE hitting your firewall hard and the increasing fragility of AI systems, we cover what you need to secure your enterprise IT systems. Tune in for insights from seasoned pros in the IT space.</p><br><p><strong>Show Notes:</strong></p><br><p><strong>News Bytes:</strong></p><br><p>• Open Source in Crisis: How enterprises rely on open source software and the importance of funding it.</p><p>• Python and Linux are at the core of infrastructure, but without proper support, businesses are at risk.</p><p>• Example: The left-pad NPM issue that caused widespread disruptions.</p><p>• How can businesses support open-source projects?</p><p>• Corporate sponsorships, direct monetization, and intermediary companies like Red Hat and Canonical are crucial solutions.</p><p>• A spotlight on Germany’s Sovereign Tech Fund, leading the way in public aid for open source.</p><p>• <a href="https://www.infoworld.com/article/3557846/how-do-we-fund-open-source.html" rel="noopener noreferrer" target="_blank">https://www.infoworld.com/article/3557846/how-do-we-fund-open-source.html</a></p><p>• AI’s Growing Energy Demands</p><p>• Amazon and the U.S. Department of Energy are collaborating on small modular nuclear reactors (SMRs) to power data centers.</p><p>• Microsoft, Amazon, and others are exploring nuclear power to handle the future energy demands of AI.</p><p>• Lou explains the cutting-edge advancements in liquid fluorine salt reactors and their potential future applications.</p><p>• <a href="https://www.geekwire.com/2024/doe-announces-900m-for-next-gen-reactors-as-amazon-launches-nuclear-power-pursuit/" rel="noopener noreferrer" target="_blank">https://www.geekwire.com/2024/doe-announces-900m-for-next-gen-reactors-as-amazon-launches-nuclear-power-pursuit/</a></p><p>• The Changing Landscape of IT Jobs</p><p>• Despite big layoffs from tech giants, smaller companies are filling the gap.</p><p>• AI and its role in reshaping the IT job market, including a shift toward roles in tech support, help desk, and AI development.</p><p>• <a href="https://www.computerworld.com/article/3554907/big-shift-in-it-employment-shows-new-skills-are-needed.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/3554907/big-shift-in-it-employment-shows-new-skills-are-needed.html</a></p><br><p><strong>CVE of the Week:</strong></p><br><p>• Firewall Meltdown: Fortinet, Palo Alto, and Check Point firewalls are facing severe vulnerabilities with CVEs like 2024-23113.</p><p>• Fortinet’s OS vulnerabilities could allow attackers to execute arbitrary commands.</p><p>• Palo Alto’s CVEs include operating system-level command injection vulnerabilities with a severity rating of 9.9 out of 10.</p><p>• What should you do? Embrace defense-in-depth strategies and stay in touch with your firewall vendors for immediate updates.</p><p>• <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23113" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2024-23113</a>&nbsp;</p><p>• <a href="https://thehackernews.com/2024/10/cisa-warns-of-critical-fortinet-flaw-as.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/10/cisa-warns-of-critical-fortinet-flaw-as.html</a>&nbsp;</p><br><p><strong>Wrap Up:</strong></p><br><p>•Call for feedback: Send your topic ideas or feedback to feedback@itsparccast.com or connect with us on X (@itsparccast).</p><p>•Be sure to like, subscribe, and turn on notifications so you don’t miss next week’s insights into enterprise IT.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>IT SPARC Cast - October 11th 2024</title>
			<itunes:title>IT SPARC Cast - October 11th 2024</itunes:title>
			<pubDate>Fri, 11 Oct 2024 15:47:27 GMT</pubDate>
			<itunes:duration>29:59</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6709488f011dc7d644582d5b/media.mp3" length="518261836" type="audio/mpeg"/>
			<guid isPermaLink="false">6709488f011dc7d644582d5b</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-october-11th-2024</link>
			<acast:episodeId>6709488f011dc7d644582d5b</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-october-11th-2024</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7b7twq5iUBHA95eogC5a4KecaLUwCTtXGg4NnAd4zDSNmb0y/dgW8eigcHgmgHrtI1bnfG0bPlibRFUSg3Gd/4N]]></acast:settings>
			<itunes:subtitle>Microsoft’s Mac Mess, Old-School Phishing, and CVE of the Week</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1728661502781-f99f6e30-e933-4cb8-ab3c-05ce439ab291.jpeg"/>
			<description><![CDATA[<p>In this episode of <em>IT SPARC Cast</em>, John and Lou tackle the latest tech news, including a troubling Microsoft vulnerability affecting Mac apps, a phishing scam using physical mail, and malware targeting air-gapped networks. They also preview an upcoming book critiquing tech management practices and delve into Gartner’s 2024 tech trends. Tune in for insights, opinions, and practical advice for staying ahead in the IT world.</p><br><p><strong>Show Notes:</strong></p><br><p>News Bytes:</p><p>&nbsp;• Microsoft’s Mac App Vulnerability: The hosts dive into a security issue affecting Microsoft’s Mac apps, where an entitlement disables MacOS’s hardened runtime, potentially allowing malicious DLL execution. Microsoft has partially addressed the issue but left some apps vulnerable. </p><p><a href="https://www.macworld.com/article/2432176/microsoft-apps-on-the-mac-have-a-security-hole-that-wont-get-fixed-soon.html" rel="noopener noreferrer" target="_blank">https://www.macworld.com/article/2432176/microsoft-apps-on-the-mac-have-a-security-hole-that-wont-get-fixed-soon.html</a></p><br><p>&nbsp;• Air-Gapped Network Threats: Lou shares news about sophisticated malware targeting air-gapped networks, discovered by ESET. The malware employs USB drives for infiltration and advanced techniques for data exfiltration. The discussion touches on the human factor in security and the evolving threat landscape.</p><p><a href="https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-air-gapped-devices/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-air-gapped-devices/</a> &nbsp;</p><br><p>&nbsp;• Old-School Phishing Goes Physical: Phishing has gone back to basics, with scam letters arriving in physical mailboxes in Germany, mimicking legitimate bank correspondence. John shares a personal phishing experience, emphasizing the need for skepticism, even with familiar-looking messages.</p><p><a href="https://www.pcworld.com/article/2419859/police-warn-of-deceptively-genuine-phishing-by-post-how-the-scam-works.html" rel="noopener noreferrer" target="_blank">https://www.pcworld.com/article/2419859/police-warn-of-deceptively-genuine-phishing-by-post-how-the-scam-works.html</a></p><br><p>&nbsp;• Book Preview – “Fatal Abstraction”: Lou introduces an upcoming book arguing that managerial practices are to blame for many tech problems, touching on over-reliance on software and management misunderstandings. The hosts discuss management issues and software’s limitations in solving business challenges.</p><p><a href="https://www.theverge.com/2024/10/8/24265264/what-if-techs-problem-is-management" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2024/10/8/24265264/what-if-techs-problem-is-management</a>&nbsp;</p><br><p>&nbsp;• Gartner’s 2024 Technology Trends: The episode touches briefly on Gartner’s top tech trends for the upcoming year, including AI trust and security, continuous threat exposure management, and industry cloud platforms.&nbsp;</p><p><a href="https://www.gartner.com/en/articles/gartner-top-10-strategic-technology-trends-for-2024" rel="noopener noreferrer" target="_blank">https://www.gartner.com/en/articles/gartner-top-10-strategic-technology-trends-for-2024</a></p><br><p>CVE of the Week:</p><p>&nbsp;• “PerfCTL” Linux Malware: This week’s CVE is a stealthy malware called “PerfCTL,” which exploits servers for cryptocurrency mining or malicious network activity. The hosts recommend packet-based analytics tools to detect unusual network behavior and discuss how to protect against such threats.</p><p><a href="https://www.wired.com/story/perfctl-stealthy-malware-infected-linux-systems" rel="noopener noreferrer" target="_blank">https://www.wired.com/story/perfctl-stealthy-malware-infected-linux-systems</a></p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of <em>IT SPARC Cast</em>, John and Lou tackle the latest tech news, including a troubling Microsoft vulnerability affecting Mac apps, a phishing scam using physical mail, and malware targeting air-gapped networks. They also preview an upcoming book critiquing tech management practices and delve into Gartner’s 2024 tech trends. Tune in for insights, opinions, and practical advice for staying ahead in the IT world.</p><br><p><strong>Show Notes:</strong></p><br><p>News Bytes:</p><p>&nbsp;• Microsoft’s Mac App Vulnerability: The hosts dive into a security issue affecting Microsoft’s Mac apps, where an entitlement disables MacOS’s hardened runtime, potentially allowing malicious DLL execution. Microsoft has partially addressed the issue but left some apps vulnerable. </p><p><a href="https://www.macworld.com/article/2432176/microsoft-apps-on-the-mac-have-a-security-hole-that-wont-get-fixed-soon.html" rel="noopener noreferrer" target="_blank">https://www.macworld.com/article/2432176/microsoft-apps-on-the-mac-have-a-security-hole-that-wont-get-fixed-soon.html</a></p><br><p>&nbsp;• Air-Gapped Network Threats: Lou shares news about sophisticated malware targeting air-gapped networks, discovered by ESET. The malware employs USB drives for infiltration and advanced techniques for data exfiltration. The discussion touches on the human factor in security and the evolving threat landscape.</p><p><a href="https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-air-gapped-devices/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-air-gapped-devices/</a> &nbsp;</p><br><p>&nbsp;• Old-School Phishing Goes Physical: Phishing has gone back to basics, with scam letters arriving in physical mailboxes in Germany, mimicking legitimate bank correspondence. John shares a personal phishing experience, emphasizing the need for skepticism, even with familiar-looking messages.</p><p><a href="https://www.pcworld.com/article/2419859/police-warn-of-deceptively-genuine-phishing-by-post-how-the-scam-works.html" rel="noopener noreferrer" target="_blank">https://www.pcworld.com/article/2419859/police-warn-of-deceptively-genuine-phishing-by-post-how-the-scam-works.html</a></p><br><p>&nbsp;• Book Preview – “Fatal Abstraction”: Lou introduces an upcoming book arguing that managerial practices are to blame for many tech problems, touching on over-reliance on software and management misunderstandings. The hosts discuss management issues and software’s limitations in solving business challenges.</p><p><a href="https://www.theverge.com/2024/10/8/24265264/what-if-techs-problem-is-management" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2024/10/8/24265264/what-if-techs-problem-is-management</a>&nbsp;</p><br><p>&nbsp;• Gartner’s 2024 Technology Trends: The episode touches briefly on Gartner’s top tech trends for the upcoming year, including AI trust and security, continuous threat exposure management, and industry cloud platforms.&nbsp;</p><p><a href="https://www.gartner.com/en/articles/gartner-top-10-strategic-technology-trends-for-2024" rel="noopener noreferrer" target="_blank">https://www.gartner.com/en/articles/gartner-top-10-strategic-technology-trends-for-2024</a></p><br><p>CVE of the Week:</p><p>&nbsp;• “PerfCTL” Linux Malware: This week’s CVE is a stealthy malware called “PerfCTL,” which exploits servers for cryptocurrency mining or malicious network activity. The hosts recommend packet-based analytics tools to detect unusual network behavior and discuss how to protect against such threats.</p><p><a href="https://www.wired.com/story/perfctl-stealthy-malware-infected-linux-systems" rel="noopener noreferrer" target="_blank">https://www.wired.com/story/perfctl-stealthy-malware-infected-linux-systems</a></p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>IT SPARC Cast - October 4th 2024</title>
			<itunes:title>IT SPARC Cast - October 4th 2024</itunes:title>
			<pubDate>Fri, 04 Oct 2024 16:14:04 GMT</pubDate>
			<itunes:duration>31:07</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/6700144cee2ca803dacf9806/media.mp3" length="537961516" type="audio/mpeg"/>
			<guid isPermaLink="false">6700144cee2ca803dacf9806</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-october-4th-2024</link>
			<acast:episodeId>6700144cee2ca803dacf9806</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-october-4th-2024</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7Z0P6e442Gua80tH7PHPUwAu3Vgcja9RC4yI9UqxIBbV7+coAjybZd4tfJF83n6FRIVlyPikj5RXbxgPvvd9BPy]]></acast:settings>
			<itunes:subtitle>Crisis Management: When IT Hits the Fan</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1728058468763-0396dcbb-2802-479d-b513-4ff9a6930ba0.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou dive into Dell’s controversial return to office mandate, the future of Intel’s chip strategy, and the latest on Linux vulnerabilities. They discuss disaster recovery strategies, cybersecurity awareness, and how being prepared beats being lucky when disasters strike. Tune in for Lou’s Hot Take on crisis management and how IT pros can navigate unexpected events with smart planning. As always, we cover the latest IT news, CVEs, and much more!</p><br><p>Show Notes:</p><br><p>News Bytes</p><br><p>• Dell’s In-Office Policy: How Dell’s move to require five days in the office is sparking employee discontent, and why remote work might still be the future.</p><p>• https://content.techgig.com/technology/wfh-ends-at-dell-sparks-outrage-among-employees/articleshow/113772027.cms</p><br><p>• Intel’s Gamble: Intel’s big bet on the 18A process and how Clearwater Forest Xeon chips could make or break the company’s dominance in data centers.</p><p>• https://www.tomshardware.com/pc-components/cpus/intels-turnaround-plan-revolves-around-this-one-chip-family-clearwater-forest-pictured-intels-first-18a-chip-slated-for-high-volume-manufacturing</p><br><p>CVE of the Week</p><br><p>• CUPS Vulnerability: A new Linux CUPS vulnerability has been exposed, affecting printing services across systems. It’s a serious root-level exploit, and we break down the steps to mitigate it. Plus, a special shoutout to @EvilSocket on X for reporting the issue.</p><p>• Check it out: exploit sandbox here: https://x.com/ippsec/status/1841463975734657440</p><br><p>Lou’s Hot Take</p><br><p>• Prepared vs. Lucky: In light of recent natural disasters, Lou emphasizes the importance of being prepared. He shares how IT teams can ensure continuous service during crises and highlights the increasing role of satellite communication (e.g., Starlink) for backup.</p><br><p>Have thoughts or feedback? Email us at feedback@itsparccast.com or find us on X @itsparccast.</p><br><p>Be sure to like, subscribe, and turn on notifications to stay updated on future episodes!</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast, John and Lou dive into Dell’s controversial return to office mandate, the future of Intel’s chip strategy, and the latest on Linux vulnerabilities. They discuss disaster recovery strategies, cybersecurity awareness, and how being prepared beats being lucky when disasters strike. Tune in for Lou’s Hot Take on crisis management and how IT pros can navigate unexpected events with smart planning. As always, we cover the latest IT news, CVEs, and much more!</p><br><p>Show Notes:</p><br><p>News Bytes</p><br><p>• Dell’s In-Office Policy: How Dell’s move to require five days in the office is sparking employee discontent, and why remote work might still be the future.</p><p>• https://content.techgig.com/technology/wfh-ends-at-dell-sparks-outrage-among-employees/articleshow/113772027.cms</p><br><p>• Intel’s Gamble: Intel’s big bet on the 18A process and how Clearwater Forest Xeon chips could make or break the company’s dominance in data centers.</p><p>• https://www.tomshardware.com/pc-components/cpus/intels-turnaround-plan-revolves-around-this-one-chip-family-clearwater-forest-pictured-intels-first-18a-chip-slated-for-high-volume-manufacturing</p><br><p>CVE of the Week</p><br><p>• CUPS Vulnerability: A new Linux CUPS vulnerability has been exposed, affecting printing services across systems. It’s a serious root-level exploit, and we break down the steps to mitigate it. Plus, a special shoutout to @EvilSocket on X for reporting the issue.</p><p>• Check it out: exploit sandbox here: https://x.com/ippsec/status/1841463975734657440</p><br><p>Lou’s Hot Take</p><br><p>• Prepared vs. Lucky: In light of recent natural disasters, Lou emphasizes the importance of being prepared. He shares how IT teams can ensure continuous service during crises and highlights the increasing role of satellite communication (e.g., Starlink) for backup.</p><br><p>Have thoughts or feedback? Email us at feedback@itsparccast.com or find us on X @itsparccast.</p><br><p>Be sure to like, subscribe, and turn on notifications to stay updated on future episodes!</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>IT SPARC Cast - September 27 2024</title>
			<itunes:title>IT SPARC Cast - September 27 2024</itunes:title>
			<pubDate>Fri, 27 Sep 2024 15:41:00 GMT</pubDate>
			<itunes:duration>41:16</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/66f6d20c224b00387dec4c2f/media.mp3" length="713312692" type="audio/mpeg"/>
			<guid isPermaLink="false">66f6d20c224b00387dec4c2f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-september-27-2024</link>
			<acast:episodeId>66f6d20c224b00387dec4c2f</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-september-27-2024</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aKN3Rs2qYDNgVDt+RUaanjqwVe8Kh8s95Sug/dBoj3JJTQt6X7p1v0oDPicPVpZe+ajI8UQ1Zuu3J9FooVukEA]]></acast:settings>
			<itunes:subtitle>Old-School Linux, AI Monetization, and Unpatched Linux Exploits</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1727451015024-8bfcb29b-c87a-4c58-af8e-b46f1b46bb25.jpeg"/>
			<description><![CDATA[<p>IT SPARC Cast - September 27 2024: Old-School Linux, AI Monetization, and Unpatched Linux Exploits</p><br><p>Brief Description:</p><br><p>In this week’s episode, John and Lou dive into the latest IT news with a nostalgic look at Linux running on a 1971 Intel processor, Cloudflare’s new AI bot marketplace, and an alarming unpatched vulnerability in the Linux kernel. They explore the implications of these stories for the enterprise, including hybrid work concerns, the evolving landscape of enterprise security, and key strategies for navigating IT challenges. Lou delivers a hot take on the future of remote work, and John addresses how enterprise IT can better adapt to changing workplace dynamics.</p><br><p>Episode Sections:</p><br><p>News Bytes</p><p>•Linux on Intel 4004 Processor: A tech enthusiast boots Linux on a vintage Intel 4004.</p><p>•Necro Trojan on Google Play: The Necro Trojan malware has infected millions of devices via the Google Play Store, posing a threat to enterprise networks through sideloading apps.</p><p>•Cloudflare’s AI Marketplace: Cloudflare introduces a marketplace allowing websites to charge AI bots for scraping data. This could open revenue streams for content-heavy enterprises.</p><p>•Smartsheet Goes Private: Smartsheet is set to go private in an $8.4 billion deal, reflecting a strategic pivot aimed at long-term growth.</p><br><p>CVE of the Week</p><p>•Unpatched Linux Exploit: A severe vulnerability (severity score of 9.9) affecting all modern Linux systems has been discovered, allowing full unauthenticated remote access. With no fix yet available, this exploit could have major implications for IoT devices and enterprise infrastructure.</p><br><p>Lou’s Hot Take</p><p>•Remote Work Backlash: Lou takes on the growing trend of companies, including Amazon, forcing employees back into the office. He explores the potential long-term consequences for retention, productivity, and employee satisfaction.</p><br><p>Wrap Up</p><p>•Format Feedback: John and Lou ask listeners for feedback on possibly breaking the show into shorter, more focused segments. They discuss upcoming tweaks to the show format based on listener suggestions.</p><br><p>Links:</p><br><p>•Linux Intel 4004 boot kit - <a href="https://www.tomshardware.com/pc-components/cpus/linux-takes-476-days-to-boot-on-an-ancient-intel-4004-cpu-cpu-precedes-the-os-by-20-years" rel="noopener noreferrer" target="_blank">https://www.tomshardware.com/pc-components/cpus/linux-takes-476-days-to-boot-on-an-ancient-intel-4004-cpu-cpu-precedes-the-os-by-20-years</a>&nbsp;</p><p>•Necro Trojan - <a href="https://www.securityweek.com/necro-trojan-infects-google-play-apps-with-millions-of-downloads/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/necro-trojan-infects-google-play-apps-with-millions-of-downloads/</a>&nbsp;</p><p>•Cloudflare’s AI marketplace  - <a href="https://techcrunch.com/2024/09/23/cloudflares-new-marketplace-will-let-websites-charge-ai-bots-for-scraping/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2024/09/23/cloudflares-new-marketplace-will-let-websites-charge-ai-bots-for-scraping/</a></p><p>•Smartsheet’s $8.4 billion acquisition - <a href="https://www.geekwire.com/2024/smartsheet-acquisition-competing-bids-unlikely-8-4b-deal-could-fuel-other-private-equity-buyouts/" rel="noopener noreferrer" target="_blank">https://www.geekwire.com/2024/smartsheet-acquisition-competing-bids-unlikely-8-4b-deal-could-fuel-other-private-equity-buyouts/</a></p><p>•Computer World article on Amazon’s return to office policy - <a href="https://www.securityweek.com/necro-trojan-infects-google-play-apps-with-millions-of-downloads/" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/3532158/amazons-rto-mandate-likely-to-boomerang-other-companies-should-not-follow-suit.html</a></p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>IT SPARC Cast - September 27 2024: Old-School Linux, AI Monetization, and Unpatched Linux Exploits</p><br><p>Brief Description:</p><br><p>In this week’s episode, John and Lou dive into the latest IT news with a nostalgic look at Linux running on a 1971 Intel processor, Cloudflare’s new AI bot marketplace, and an alarming unpatched vulnerability in the Linux kernel. They explore the implications of these stories for the enterprise, including hybrid work concerns, the evolving landscape of enterprise security, and key strategies for navigating IT challenges. Lou delivers a hot take on the future of remote work, and John addresses how enterprise IT can better adapt to changing workplace dynamics.</p><br><p>Episode Sections:</p><br><p>News Bytes</p><p>•Linux on Intel 4004 Processor: A tech enthusiast boots Linux on a vintage Intel 4004.</p><p>•Necro Trojan on Google Play: The Necro Trojan malware has infected millions of devices via the Google Play Store, posing a threat to enterprise networks through sideloading apps.</p><p>•Cloudflare’s AI Marketplace: Cloudflare introduces a marketplace allowing websites to charge AI bots for scraping data. This could open revenue streams for content-heavy enterprises.</p><p>•Smartsheet Goes Private: Smartsheet is set to go private in an $8.4 billion deal, reflecting a strategic pivot aimed at long-term growth.</p><br><p>CVE of the Week</p><p>•Unpatched Linux Exploit: A severe vulnerability (severity score of 9.9) affecting all modern Linux systems has been discovered, allowing full unauthenticated remote access. With no fix yet available, this exploit could have major implications for IoT devices and enterprise infrastructure.</p><br><p>Lou’s Hot Take</p><p>•Remote Work Backlash: Lou takes on the growing trend of companies, including Amazon, forcing employees back into the office. He explores the potential long-term consequences for retention, productivity, and employee satisfaction.</p><br><p>Wrap Up</p><p>•Format Feedback: John and Lou ask listeners for feedback on possibly breaking the show into shorter, more focused segments. They discuss upcoming tweaks to the show format based on listener suggestions.</p><br><p>Links:</p><br><p>•Linux Intel 4004 boot kit - <a href="https://www.tomshardware.com/pc-components/cpus/linux-takes-476-days-to-boot-on-an-ancient-intel-4004-cpu-cpu-precedes-the-os-by-20-years" rel="noopener noreferrer" target="_blank">https://www.tomshardware.com/pc-components/cpus/linux-takes-476-days-to-boot-on-an-ancient-intel-4004-cpu-cpu-precedes-the-os-by-20-years</a>&nbsp;</p><p>•Necro Trojan - <a href="https://www.securityweek.com/necro-trojan-infects-google-play-apps-with-millions-of-downloads/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/necro-trojan-infects-google-play-apps-with-millions-of-downloads/</a>&nbsp;</p><p>•Cloudflare’s AI marketplace  - <a href="https://techcrunch.com/2024/09/23/cloudflares-new-marketplace-will-let-websites-charge-ai-bots-for-scraping/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2024/09/23/cloudflares-new-marketplace-will-let-websites-charge-ai-bots-for-scraping/</a></p><p>•Smartsheet’s $8.4 billion acquisition - <a href="https://www.geekwire.com/2024/smartsheet-acquisition-competing-bids-unlikely-8-4b-deal-could-fuel-other-private-equity-buyouts/" rel="noopener noreferrer" target="_blank">https://www.geekwire.com/2024/smartsheet-acquisition-competing-bids-unlikely-8-4b-deal-could-fuel-other-private-equity-buyouts/</a></p><p>•Computer World article on Amazon’s return to office policy - <a href="https://www.securityweek.com/necro-trojan-infects-google-play-apps-with-millions-of-downloads/" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/3532158/amazons-rto-mandate-likely-to-boomerang-other-companies-should-not-follow-suit.html</a></p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>IT SPARC Cast - September 20 2024</title>
			<itunes:title>IT SPARC Cast - September 20 2024</itunes:title>
			<pubDate>Fri, 20 Sep 2024 16:04:24 GMT</pubDate>
			<itunes:duration>37:08</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/66ed9d08d4cef78b2b518721/media.mp3" length="641925376" type="audio/mpeg"/>
			<guid isPermaLink="false">66ed9d08d4cef78b2b518721</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-september-20-2024</link>
			<acast:episodeId>66ed9d08d4cef78b2b518721</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-september-20-2024</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7a8PX0W9m+HjOJvrz91QbRy6uvNnDqYw6+pxVfAamYNt2XCtfBr8EHsXGhgnqPV6z90JIPPIOP/rrjPV3DveyBB]]></acast:settings>
			<itunes:subtitle>Amazon’s Return to Office Controversy, More stealth layoffs at Cisco and IBM, and Advanced Phishing Attacks</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1726848195417-6af7947a-21bb-48f6-81df-7a4916d059b4.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast, hosts John Barger and Lou Schmidt dive into the latest developments in the IT industry. They discuss the potential security risks associated with Microsoft’s Copilot, Intuit’s new enterprise suite, and the significant layoffs at Cisco and IBM. In the CVE of the Week, they explore an advanced phishing attack exploiting HTTP refresh in email. John’s Hot Take addresses Amazon CEO Andy Jassy’s push for a full return to the office and the implications for remote work. They wrap up with listener feedback on alternative data center power solutions.</p><br><p>Show Notes:</p><br><p>News Bytes</p><br><p>&nbsp;• Will Potential Security Gaps Derail Microsoft’s Copilot?</p><p>• Discussion on the security implications of Microsoft’s Copilot and data access concerns.</p><p>• Comparison with Apple’s approach to AI and data privacy.</p><p>• Questions about audit tools and how administrators can manage these new technologies.</p><p>• https://www.computerworld.com/article/3511345/will-potential-security-gaps-derail-microsofts-copilot.html</p><br><p>&nbsp;• Intuit Introduces Enterprise Suite</p><p>• Overview of Intuit’s new robust financial management system.</p><p>• Potential benefits for HR and finance operations.</p><p>• Concerns about the sustainability of customer success teams and long-term support.</p><p>• https://quickbooks.intuit.com/r/enterprise/what-is-intuit-enterprise-suite/</p><br><p>&nbsp;• Layoffs at Cisco and IBM</p><p>• Cisco executes significant layoffs, hitting DevNet hard.</p><p>• Rumors about Cisco passing off AnyConnect VPN service to Microsoft.</p><p>• IBM’s stealth layoffs affecting thousands of employees.</p><p>• Importance of contacting account teams to understand the impact on services and support.</p><p>• https://www.theregister.com/2023/05/02/ibm_ai_back_office_jobs/</p><br><p>CVE of the Week</p><br><p>&nbsp;• Advanced Phishing Attack Exploiting HTTP Headers</p><p>• Discussion on a sophisticated phishing attack that uses HTTP header manipulation for credential theft.</p><p>• How the attack bypasses traditional email filters and user vigilance.</p><p>• Call for community input on mitigation strategies.</p><p>• https://unit42.paloaltonetworks.com/rare-phishing-page-delivery-header-refresh/</p><p>• https://www.linkedin.com/posts/unit42_phishing-timelythreatintel-unit42threatintel-activity-7218635942796926978-ztlB/</p><p>• Unit 42 Timely Threat Github - https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2024-07-15-IOCs-from-recent-phishing-campaign.txt</p><br><p><br></p><p>John’s Hot Take</p><br><p>&nbsp;• Amazon’s Return-to-Office Mandate</p><p>• John critiques Amazon CEO Andy Jassy’s decision to require employees to return to the office full-time.</p><p>• Analysis of the potential negative impacts on employee satisfaction and productivity.</p><p>• Discussion on the benefits of remote work and how it can be a win-win for employers and employees.</p><p>• https://www.wsj.com/business/amazons-return-to-office-plans-spark-concern-and-debate-among-employees-6273f615?mod=lead_feature_below_a_pos1</p><br><p>Wrap Up</p><br><p>&nbsp;• Listener feedback from Krangor on alternative power solutions for data centers, including geothermal energy and 360 Mining.</p><p>&nbsp;• Invitation for listeners to provide feedback and engage with the show.</p><br><p>Contact Information</p><br><p>Email: feedback@itsparccast.com</p><p>X (Twitter): @itsparccast</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast, hosts John Barger and Lou Schmidt dive into the latest developments in the IT industry. They discuss the potential security risks associated with Microsoft’s Copilot, Intuit’s new enterprise suite, and the significant layoffs at Cisco and IBM. In the CVE of the Week, they explore an advanced phishing attack exploiting HTTP refresh in email. John’s Hot Take addresses Amazon CEO Andy Jassy’s push for a full return to the office and the implications for remote work. They wrap up with listener feedback on alternative data center power solutions.</p><br><p>Show Notes:</p><br><p>News Bytes</p><br><p>&nbsp;• Will Potential Security Gaps Derail Microsoft’s Copilot?</p><p>• Discussion on the security implications of Microsoft’s Copilot and data access concerns.</p><p>• Comparison with Apple’s approach to AI and data privacy.</p><p>• Questions about audit tools and how administrators can manage these new technologies.</p><p>• https://www.computerworld.com/article/3511345/will-potential-security-gaps-derail-microsofts-copilot.html</p><br><p>&nbsp;• Intuit Introduces Enterprise Suite</p><p>• Overview of Intuit’s new robust financial management system.</p><p>• Potential benefits for HR and finance operations.</p><p>• Concerns about the sustainability of customer success teams and long-term support.</p><p>• https://quickbooks.intuit.com/r/enterprise/what-is-intuit-enterprise-suite/</p><br><p>&nbsp;• Layoffs at Cisco and IBM</p><p>• Cisco executes significant layoffs, hitting DevNet hard.</p><p>• Rumors about Cisco passing off AnyConnect VPN service to Microsoft.</p><p>• IBM’s stealth layoffs affecting thousands of employees.</p><p>• Importance of contacting account teams to understand the impact on services and support.</p><p>• https://www.theregister.com/2023/05/02/ibm_ai_back_office_jobs/</p><br><p>CVE of the Week</p><br><p>&nbsp;• Advanced Phishing Attack Exploiting HTTP Headers</p><p>• Discussion on a sophisticated phishing attack that uses HTTP header manipulation for credential theft.</p><p>• How the attack bypasses traditional email filters and user vigilance.</p><p>• Call for community input on mitigation strategies.</p><p>• https://unit42.paloaltonetworks.com/rare-phishing-page-delivery-header-refresh/</p><p>• https://www.linkedin.com/posts/unit42_phishing-timelythreatintel-unit42threatintel-activity-7218635942796926978-ztlB/</p><p>• Unit 42 Timely Threat Github - https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2024-07-15-IOCs-from-recent-phishing-campaign.txt</p><br><p><br></p><p>John’s Hot Take</p><br><p>&nbsp;• Amazon’s Return-to-Office Mandate</p><p>• John critiques Amazon CEO Andy Jassy’s decision to require employees to return to the office full-time.</p><p>• Analysis of the potential negative impacts on employee satisfaction and productivity.</p><p>• Discussion on the benefits of remote work and how it can be a win-win for employers and employees.</p><p>• https://www.wsj.com/business/amazons-return-to-office-plans-spark-concern-and-debate-among-employees-6273f615?mod=lead_feature_below_a_pos1</p><br><p>Wrap Up</p><br><p>&nbsp;• Listener feedback from Krangor on alternative power solutions for data centers, including geothermal energy and 360 Mining.</p><p>&nbsp;• Invitation for listeners to provide feedback and engage with the show.</p><br><p>Contact Information</p><br><p>Email: feedback@itsparccast.com</p><p>X (Twitter): @itsparccast</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>IT SPARC Cast - September 13 2024</title>
			<itunes:title>IT SPARC Cast - September 13 2024</itunes:title>
			<pubDate>Fri, 13 Sep 2024 21:57:59 GMT</pubDate>
			<itunes:duration>32:08</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/66e4b567eb96eb5d241192a9/media.mp3" length="555366904" type="audio/mpeg"/>
			<guid isPermaLink="false">66e4b567eb96eb5d241192a9</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-september-13-2024</link>
			<acast:episodeId>66e4b567eb96eb5d241192a9</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-september-13-2024</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7aOhioY20a4WxZsk4e7W6sZZNN6/LT/bkrIYp7J0/dVqb6AE+kE8xYO/gvuy2JHB2q5j5BJJqNZlvCw/ca/nvPs]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - September 13 2024: Air-Gapped Nightmares, Oracle’s Nuclear Ambitions, and eBPF Insights</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1726265044060-e96a2997-cc64-4513-b5be-f2b5abf6d2ac.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast, John Barger and Lou Schmidt delve into the latest IT news, including a novel attack vector that uses radio signals from RAM to break into air-gapped networks, Oracle’s ambitious plans to power data centers with nuclear reactors, and the phasing out of ActiveX by Microsoft. Lou also introduces the power of eBPF (Extended Berkeley Packet Filter) technology in his Hot Take, discussing its role in high-performance monitoring without compromising kernel security. As always, there’s plenty of insights, banter, and a touch of nostalgia.</p><br><p>Show Notes:</p><br><p>Intro</p><p>• Episode Overview: RAMBO attacks on air-gapped networks, Oracle’s nuclear data center vision, and the unexpected longevity of ActiveX. [INSERT LINK HERE for further reading]</p><br><p>News Bytes</p><p>• RAMBO Air-Gap Attack: A groundbreaking attack vector discovered by Dr. Guri from Israel, where radio signals from RAM is used to exfiltrate data from air-gapped networks using radio signals. https://thehackernews.com/2024/09/new-rambo-attack-uses-ram-radio-signals.html</p><p>• Microsoft Phases Out ActiveX: A nostalgic look back at ActiveX and its impending deprecation in Office 2024, part of Microsoft’s broader security enhancements. https://www.computerworld.com/article/3510909/activex-to-be-disabled-in-office-2024.html&nbsp;</p><p>• Oracle’s Nuclear Data Centers: Larry Ellison’s bold plans for next-gen data centers powered by small modular nuclear reactors, addressing energy needs and vulnerabilities. https://www.cnbc.com/2024/09/10/oracle-is-designing-a-data-center-that-would-be-powered-by-three-small-nuclear-reactors.html&nbsp;</p><br><p>CVE of the Week</p><p>• CVE-2024-43491: A critical vulnerability in Windows 10 version 1507, which allows attackers to roll back patches and exploit system flaws. Exploits are already in the wild, with a severity score of 9.8 out of 10. Microsoft advises immediate action to mitigate this threat. https://www.securityweek.com/microsoft-says-windows-update-zero-day-being-exploited-to-undo-security-fixes/</p><br><p>Lou’s Hot Take</p><p>• Introduction to eBPF (Extended Berkeley Packet Filter): Lou breaks down the advantages of eBPF in high-performance monitoring, especially in cloud and container environments. He explores its potential in replacing kernel-level monitoring, offering better security without sacrificing performance.&nbsp;</p><br><p>https://falco.org/ Falco is a cloud-native security tool designed for Linux systems.</p><br><p>https://coroot.com/ is monitoring systems in containerized deployments</p><br><p>https://deepflow.io/ is doing full service mapping in containerized full stack deployments</p><br><p>https://cilium.io/ One of the core toolkits maintained by the team building eBPF.&nbsp;</p><br><p>• CrowdStrike Incident Recap: Reflecting on the March kernel panic caused by an update, Lou discusses how eBPF could mitigate such risks in the future.</p><br><p>Wrap Up</p><p>• Feedback Request: John and Lou invite listeners to share thoughts on eBPF, how they’re handling Windows 10 updates, and any other topics they’d like covered in future episodes. Reach out at feedback@itsparccast.com or @ITSPARCCast on X.&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast, John Barger and Lou Schmidt delve into the latest IT news, including a novel attack vector that uses radio signals from RAM to break into air-gapped networks, Oracle’s ambitious plans to power data centers with nuclear reactors, and the phasing out of ActiveX by Microsoft. Lou also introduces the power of eBPF (Extended Berkeley Packet Filter) technology in his Hot Take, discussing its role in high-performance monitoring without compromising kernel security. As always, there’s plenty of insights, banter, and a touch of nostalgia.</p><br><p>Show Notes:</p><br><p>Intro</p><p>• Episode Overview: RAMBO attacks on air-gapped networks, Oracle’s nuclear data center vision, and the unexpected longevity of ActiveX. [INSERT LINK HERE for further reading]</p><br><p>News Bytes</p><p>• RAMBO Air-Gap Attack: A groundbreaking attack vector discovered by Dr. Guri from Israel, where radio signals from RAM is used to exfiltrate data from air-gapped networks using radio signals. https://thehackernews.com/2024/09/new-rambo-attack-uses-ram-radio-signals.html</p><p>• Microsoft Phases Out ActiveX: A nostalgic look back at ActiveX and its impending deprecation in Office 2024, part of Microsoft’s broader security enhancements. https://www.computerworld.com/article/3510909/activex-to-be-disabled-in-office-2024.html&nbsp;</p><p>• Oracle’s Nuclear Data Centers: Larry Ellison’s bold plans for next-gen data centers powered by small modular nuclear reactors, addressing energy needs and vulnerabilities. https://www.cnbc.com/2024/09/10/oracle-is-designing-a-data-center-that-would-be-powered-by-three-small-nuclear-reactors.html&nbsp;</p><br><p>CVE of the Week</p><p>• CVE-2024-43491: A critical vulnerability in Windows 10 version 1507, which allows attackers to roll back patches and exploit system flaws. Exploits are already in the wild, with a severity score of 9.8 out of 10. Microsoft advises immediate action to mitigate this threat. https://www.securityweek.com/microsoft-says-windows-update-zero-day-being-exploited-to-undo-security-fixes/</p><br><p>Lou’s Hot Take</p><p>• Introduction to eBPF (Extended Berkeley Packet Filter): Lou breaks down the advantages of eBPF in high-performance monitoring, especially in cloud and container environments. He explores its potential in replacing kernel-level monitoring, offering better security without sacrificing performance.&nbsp;</p><br><p>https://falco.org/ Falco is a cloud-native security tool designed for Linux systems.</p><br><p>https://coroot.com/ is monitoring systems in containerized deployments</p><br><p>https://deepflow.io/ is doing full service mapping in containerized full stack deployments</p><br><p>https://cilium.io/ One of the core toolkits maintained by the team building eBPF.&nbsp;</p><br><p>• CrowdStrike Incident Recap: Reflecting on the March kernel panic caused by an update, Lou discusses how eBPF could mitigate such risks in the future.</p><br><p>Wrap Up</p><p>• Feedback Request: John and Lou invite listeners to share thoughts on eBPF, how they’re handling Windows 10 updates, and any other topics they’d like covered in future episodes. Reach out at feedback@itsparccast.com or @ITSPARCCast on X.&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>IT SPARC Cast - September 6 2024</title>
			<itunes:title>IT SPARC Cast - September 6 2024</itunes:title>
			<pubDate>Fri, 06 Sep 2024 17:24:32 GMT</pubDate>
			<itunes:duration>40:16</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/66db3ad0cf77f7ed73e7ef67/media.mp3" length="695955352" type="audio/mpeg"/>
			<guid isPermaLink="false">66db3ad0cf77f7ed73e7ef67</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-september-6-2024</link>
			<acast:episodeId>66db3ad0cf77f7ed73e7ef67</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-september-6-2024</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7ZmW9O/kjO4UjbxUjvPAogJX3VmIMyefk+2lng9/3hr57i4iD5RIsBxYVDWFFOUouPShuTxrDaYBs16JQibp+js]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast Episode 03: Intel’s Lunar Leap, Crypto Jacking Threats, and Remote Work Realities</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1724869658077-805f5ae1-8ca6-414e-a4b9-f9a7c000d609.jpeg"/>
			<description><![CDATA[<p>In this episode of IT SPARC Cast, John Barger and Lou Schmidt discuss Intel’s exciting new Lunar Lake CPUs and their potential impact on mobile IT. The duo dives into crypto jacking attacks targeting Atlassian Confluence servers and the critical vulnerabilities that could leave your systems at risk. The discussion continues with how IT can better support the remote workforce, from technical tools to managing human connections. Tune in for insights, tech updates, and practical management tips from experienced IT professionals.</p><br><p>Show Notes:</p><br><p>Intro:</p><p>•Episode introduction and overview of topics: Intel’s Lunar Lake CPUs, Atlassian Confluence crypto jacking, and supporting remote work.</p><br><p>News Bytes:</p><p>•Intel’s Lunar Lake CPUs</p><p>•Atlassian Confluence Crypto Jacking. <a href="https://www.darkreading.com/threat-intelligence/attackers-exploit-critical-atlassian-confluence-flaw-for-cryptojacking" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/attackers-exploit-critical-atlassian-confluence-flaw-for-cryptojacking</a>&nbsp;</p><p>•GDPR &amp; Uber’s Fine <a href="https://www.forbes.com/sites/siladityaray/2024/08/26/uber-fined-record-324-million-in-netherlands-for-transferring-sensitive-eu-driver-data-to-us/" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/siladityaray/2024/08/26/uber-fined-record-324-million-in-netherlands-for-transferring-sensitive-eu-driver-data-to-us/</a></p><p>•GITEX Global Preview <a href="https://www.gitex.com" rel="noopener noreferrer" target="_blank">https://www.gitex.com</a>&nbsp;</p><br><p>CVE of the Week:</p><p>•D-LINK DIR-846W Vulnerability: Discussion of unpatched vulnerabilities in end-of-life D-LINK routers, rated 8+ on the severity scale. Emphasizing the risks of running legacy gear in your network. </p><br><p><br></p><p>Main Stories - Supporting mixed remote and on-site IT Teams</p><p>•Regular Virtual Meetings with a Purpose</p><p>•Tailored Engagement</p><p>•Asynchronous Communication Tools</p><p>•Team Building Activities</p><p>•Udemy - <a href="https://www.udemy.com" rel="noopener noreferrer" target="_blank">https://www.udemy.com</a></p><p>•LinkedIn Learning - <a href="https://www.linkedin.com/learning/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/learning/</a></p><p>•Challenges App for iOS - <a href="https://apps.apple.com/us/app/challenges-compete-get-fit/id1051342211" rel="noopener noreferrer" target="_blank">https://apps.apple.com/us/app/challenges-compete-get-fit/id1051342211</a></p><p>•Challenges App for Android - <a href="https://play.google.com/store/search?q=challenges+compete+get+fit&amp;c=apps" rel="noopener noreferrer" target="_blank">https://play.google.com/store/search?q=challenges+compete+get+fit&amp;c=apps</a></p><p>•The Conqueror Challenges for iOS - <a href="https://apps.apple.com/us/app/the-conqueror-challenges/id1539543704" rel="noopener noreferrer" target="_blank">https://apps.apple.com/us/app/the-conqueror-challenges/id1539543704</a></p><p>•The Conqueror Challenges for Android - <a href="https://play.google.com/store/search?q=the+conqueror+challenges&amp;c=apps" rel="noopener noreferrer" target="_blank">https://play.google.com/store/search?q=the+conqueror+challenges&amp;c=apps</a></p><p>•Recognizing Contributions</p><br><p>Listener Feedback:</p><p>• Response to feedback from Krangor, recommending Miro and Obsidian for collaboration and project management.</p><p>•<a href="https://miro.com" rel="noopener noreferrer" target="_blank">https://miro.com</a></p><p>•<a href="https://obsidian.md" rel="noopener noreferrer" target="_blank">https://obsidian.md</a></p><br><p>Listeners can send their feedback or topic suggestions to feedback@itsparccast.com or connect on X @itsparccast. Watch on YouTube or subscribe via your favorite podcast platform.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of IT SPARC Cast, John Barger and Lou Schmidt discuss Intel’s exciting new Lunar Lake CPUs and their potential impact on mobile IT. The duo dives into crypto jacking attacks targeting Atlassian Confluence servers and the critical vulnerabilities that could leave your systems at risk. The discussion continues with how IT can better support the remote workforce, from technical tools to managing human connections. Tune in for insights, tech updates, and practical management tips from experienced IT professionals.</p><br><p>Show Notes:</p><br><p>Intro:</p><p>•Episode introduction and overview of topics: Intel’s Lunar Lake CPUs, Atlassian Confluence crypto jacking, and supporting remote work.</p><br><p>News Bytes:</p><p>•Intel’s Lunar Lake CPUs</p><p>•Atlassian Confluence Crypto Jacking. <a href="https://www.darkreading.com/threat-intelligence/attackers-exploit-critical-atlassian-confluence-flaw-for-cryptojacking" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/attackers-exploit-critical-atlassian-confluence-flaw-for-cryptojacking</a>&nbsp;</p><p>•GDPR &amp; Uber’s Fine <a href="https://www.forbes.com/sites/siladityaray/2024/08/26/uber-fined-record-324-million-in-netherlands-for-transferring-sensitive-eu-driver-data-to-us/" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/siladityaray/2024/08/26/uber-fined-record-324-million-in-netherlands-for-transferring-sensitive-eu-driver-data-to-us/</a></p><p>•GITEX Global Preview <a href="https://www.gitex.com" rel="noopener noreferrer" target="_blank">https://www.gitex.com</a>&nbsp;</p><br><p>CVE of the Week:</p><p>•D-LINK DIR-846W Vulnerability: Discussion of unpatched vulnerabilities in end-of-life D-LINK routers, rated 8+ on the severity scale. Emphasizing the risks of running legacy gear in your network. </p><br><p><br></p><p>Main Stories - Supporting mixed remote and on-site IT Teams</p><p>•Regular Virtual Meetings with a Purpose</p><p>•Tailored Engagement</p><p>•Asynchronous Communication Tools</p><p>•Team Building Activities</p><p>•Udemy - <a href="https://www.udemy.com" rel="noopener noreferrer" target="_blank">https://www.udemy.com</a></p><p>•LinkedIn Learning - <a href="https://www.linkedin.com/learning/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/learning/</a></p><p>•Challenges App for iOS - <a href="https://apps.apple.com/us/app/challenges-compete-get-fit/id1051342211" rel="noopener noreferrer" target="_blank">https://apps.apple.com/us/app/challenges-compete-get-fit/id1051342211</a></p><p>•Challenges App for Android - <a href="https://play.google.com/store/search?q=challenges+compete+get+fit&amp;c=apps" rel="noopener noreferrer" target="_blank">https://play.google.com/store/search?q=challenges+compete+get+fit&amp;c=apps</a></p><p>•The Conqueror Challenges for iOS - <a href="https://apps.apple.com/us/app/the-conqueror-challenges/id1539543704" rel="noopener noreferrer" target="_blank">https://apps.apple.com/us/app/the-conqueror-challenges/id1539543704</a></p><p>•The Conqueror Challenges for Android - <a href="https://play.google.com/store/search?q=the+conqueror+challenges&amp;c=apps" rel="noopener noreferrer" target="_blank">https://play.google.com/store/search?q=the+conqueror+challenges&amp;c=apps</a></p><p>•Recognizing Contributions</p><br><p>Listener Feedback:</p><p>• Response to feedback from Krangor, recommending Miro and Obsidian for collaboration and project management.</p><p>•<a href="https://miro.com" rel="noopener noreferrer" target="_blank">https://miro.com</a></p><p>•<a href="https://obsidian.md" rel="noopener noreferrer" target="_blank">https://obsidian.md</a></p><br><p>Listeners can send their feedback or topic suggestions to feedback@itsparccast.com or connect on X @itsparccast. Watch on YouTube or subscribe via your favorite podcast platform.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>IT SPARC Cast - August 30 2024</title>
			<itunes:title>IT SPARC Cast - August 30 2024</itunes:title>
			<pubDate>Fri, 30 Aug 2024 16:26:48 GMT</pubDate>
			<itunes:duration>33:10</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/66d1f23c4c501f54962ce961/media.mp3" length="573204724" type="audio/mpeg"/>
			<guid isPermaLink="false">66d1f23c4c501f54962ce961</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-episode-02</link>
			<acast:episodeId>66d1f23c4c501f54962ce961</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-episode-02</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7bPohhHeAaCkbmDvVL6o4QnkmH5HkLuDOCrwvKzxlg03MvyYeBmfvHm7ooDfYUCbUJ43wd3MLDolPYDyiQ+LOGk]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast Episode 02 - Starlink’s New Tricks, Cisco Layoffs, and the Future of Remote Work</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1724869658077-805f5ae1-8ca6-414e-a4b9-f9a7c000d609.jpeg"/>
			<description><![CDATA[<p>Show Notes:</p><br><p>Intro:</p><p>•Episode introduction and overview of topics to be discussed.</p><p>•Key Headlines: Polaris Dawn Mission and its implications for Starlink, Cisco’s latest round of layoffs, and Microsoft’s TCP/IP stack vulnerability.</p><br><p>News Bytes:</p><p>•Starlink &amp; Polaris Dawn: Discussion on the Polaris Dawn mission and how its new Starlink capabilities could impact high-performance networks and real-time trading.</p><p>•X (formerly Twitter) &amp; Video Conferencing: Analysis of X’s (formerly Twitter) entry into the video conferencing market and its potential competition with Zoom, Teams, and others.</p><p>•Cisco Layoffs: Examination of Cisco’s latest layoff strategy, the potential impact on its workforce, and the implications for customers relying on Cisco’s network solutions.</p><br><p>CVE of the Week:</p><p>•CVE-2024-38063: Deep dive into a high-severity vulnerability in the Windows TCP/IP stack affecting systems using IPv6. Discussion on the potential risks, the simplicity of the exploit, and the urgency of applying the available patch.</p><br><p>Main Stories:</p><p>•Supporting Remote Work: Exploration of the ongoing challenges in supporting remote workers in the IT industry. John and Lou discuss the lack of adequate tools and support for remote workers, the need for better collaboration ecosystems, and the potential for companies to reinvest cost savings into enhancing remote work infrastructure.</p><p>•Future Collaboration Tools: Discussion on the current state of collaboration tools and the need for better-integrated solutions that support various platforms and work styles.</p><br><p>Wrap Up:</p><p>•Listener feedback segment featuring a question from Robert about Broadcom’s acquisition strategy, particularly the VMware acquisition. John and Lou share their thoughts on the implications for the virtualization market and broader IT industry.</p><p>•Closing remarks and call to action for listeners to submit their questions and topic suggestions for future episodes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Show Notes:</p><br><p>Intro:</p><p>•Episode introduction and overview of topics to be discussed.</p><p>•Key Headlines: Polaris Dawn Mission and its implications for Starlink, Cisco’s latest round of layoffs, and Microsoft’s TCP/IP stack vulnerability.</p><br><p>News Bytes:</p><p>•Starlink &amp; Polaris Dawn: Discussion on the Polaris Dawn mission and how its new Starlink capabilities could impact high-performance networks and real-time trading.</p><p>•X (formerly Twitter) &amp; Video Conferencing: Analysis of X’s (formerly Twitter) entry into the video conferencing market and its potential competition with Zoom, Teams, and others.</p><p>•Cisco Layoffs: Examination of Cisco’s latest layoff strategy, the potential impact on its workforce, and the implications for customers relying on Cisco’s network solutions.</p><br><p>CVE of the Week:</p><p>•CVE-2024-38063: Deep dive into a high-severity vulnerability in the Windows TCP/IP stack affecting systems using IPv6. Discussion on the potential risks, the simplicity of the exploit, and the urgency of applying the available patch.</p><br><p>Main Stories:</p><p>•Supporting Remote Work: Exploration of the ongoing challenges in supporting remote workers in the IT industry. John and Lou discuss the lack of adequate tools and support for remote workers, the need for better collaboration ecosystems, and the potential for companies to reinvest cost savings into enhancing remote work infrastructure.</p><p>•Future Collaboration Tools: Discussion on the current state of collaboration tools and the need for better-integrated solutions that support various platforms and work styles.</p><br><p>Wrap Up:</p><p>•Listener feedback segment featuring a question from Robert about Broadcom’s acquisition strategy, particularly the VMware acquisition. John and Lou share their thoughts on the implications for the virtualization market and broader IT industry.</p><p>•Closing remarks and call to action for listeners to submit their questions and topic suggestions for future episodes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>IT SPARC Cast - August 8 2024</title>
			<itunes:title>IT SPARC Cast - August 8 2024</itunes:title>
			<pubDate>Wed, 28 Aug 2024 20:36:34 GMT</pubDate>
			<itunes:duration>31:33</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66cf6d924960e4eb18d4aa8d/e/66cf8a53d18488679c18b739/media.mp3" length="545312860" type="audio/mpeg"/>
			<guid isPermaLink="false">66cf8a53d18488679c18b739</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/it-sparc-cast/episodes/it-sparc-cast-august-8-2024</link>
			<acast:episodeId>66cf8a53d18488679c18b739</acast:episodeId>
			<acast:showId>66cf6d924960e4eb18d4aa8d</acast:showId>
			<acast:episodeUrl>it-sparc-cast-august-8-2024</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs28pBk8YFnQcUMwFezh0A4Ebk0xQjh79B4txH7Hhmp7al7LJIjc5YrawZNyv8aXHKajhjFgSfcvgQ4Bu+Lv7oJ6k0ENa4kym9GMfelFotDujjgJ19vFrbdX9bo1yfWEaK]]></acast:settings>
			<itunes:subtitle>IT SPARC Cast - AI in IT: Evolution, Challenges, and Security Risks</itunes:subtitle>
			<itunes:episodeType>bonus</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1724877379388-bd321185-8544-4617-a409-cff1ba0dffea.jpeg"/>
			<description><![CDATA[<p>In the inaugural episode of&nbsp;<em>IT SPARC Cast</em>, John Barger and Lou Schmidt dive into the latest happenings in the IT world with a mix of insights and a touch of humor.</p><br><p><strong>NEWS BYTES:</strong></p><br><p>•<strong>Extreme Networks Teams Up with Intel:</strong>&nbsp;A new alliance aims to supercharge AI capabilities within Extreme’s platform.</p><p>•<strong>Messy Data Hinders AI Adoption:</strong>&nbsp;Learn why disorganized data is holding enterprises back from leveraging AI effectively.</p><p>•<strong>Former Pivotal CEO’s New Venture:</strong>&nbsp;Rob Mee launches Mechanical Orchard, tackling the digital transformation of legacy systems.</p><br><p><strong>MAIN STORIES:</strong></p><br><p>•<strong>Training the AI-Enabled Workforce:</strong>&nbsp;As AI adoption skyrockets, how do companies prepare their teams for this new landscape?</p><p>•<strong>HPE’s Acquisition of Juniper Networks:</strong>&nbsp;Regulatory hurdles are being cleared—what does this mean for the future of networking?</p><br><p><strong>CVE OF THE WEEK:</strong></p><br><p>•<strong>VMware’s ESXi Vulnerability:</strong>&nbsp;A critical exploit tied to Active Directory could wreak havoc—learn why patching isn’t always enough.</p><br><p>Tune in for expert takes, some speculation on the future, and critical info every IT professional should know!</p><br><p>Send us feedback!  feedback@ITSPARCCast.com or @ITSPACCast on X</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In the inaugural episode of&nbsp;<em>IT SPARC Cast</em>, John Barger and Lou Schmidt dive into the latest happenings in the IT world with a mix of insights and a touch of humor.</p><br><p><strong>NEWS BYTES:</strong></p><br><p>•<strong>Extreme Networks Teams Up with Intel:</strong>&nbsp;A new alliance aims to supercharge AI capabilities within Extreme’s platform.</p><p>•<strong>Messy Data Hinders AI Adoption:</strong>&nbsp;Learn why disorganized data is holding enterprises back from leveraging AI effectively.</p><p>•<strong>Former Pivotal CEO’s New Venture:</strong>&nbsp;Rob Mee launches Mechanical Orchard, tackling the digital transformation of legacy systems.</p><br><p><strong>MAIN STORIES:</strong></p><br><p>•<strong>Training the AI-Enabled Workforce:</strong>&nbsp;As AI adoption skyrockets, how do companies prepare their teams for this new landscape?</p><p>•<strong>HPE’s Acquisition of Juniper Networks:</strong>&nbsp;Regulatory hurdles are being cleared—what does this mean for the future of networking?</p><br><p><strong>CVE OF THE WEEK:</strong></p><br><p>•<strong>VMware’s ESXi Vulnerability:</strong>&nbsp;A critical exploit tied to Active Directory could wreak havoc—learn why patching isn’t always enough.</p><br><p>Tune in for expert takes, some speculation on the future, and critical info every IT professional should know!</p><br><p>Send us feedback!  feedback@ITSPARCCast.com or @ITSPACCast on X</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<itunes:category text="News">
			<itunes:category text="Tech News"/>
		</itunes:category>
    	<itunes:category text="Technology"/>
		<itunes:category text="News">
			<itunes:category text="News Commentary"/>
		</itunes:category>
    </channel>
</rss>
