Ep 68 - What's REALLY Driving Business Tech in 2025

Ep 68 - What's REALLY Driving Business Tech in 2025

Show Video

You're listening to Stimulus Tech Talk, a conversation-based podcast created by Stimulus Technologies that covers a range of topics related to business and technology. Hi, Nathan Whitaker here, CEO of Stimulus Technologies. We're here at Robin Robbins IT Sales and Marketing Boot Camp. very excited to talk to a bunch of vendors here uh that we work with and talk about what's the latest in technology, what are the latest cyber security trends, uh what's going on in our world to bring to our stimulus tech podcast. So, join me as we talk to a few of these vendors and find out what's going on in technology.

I'm here with Axiient, one of our u partners that we use quite a bit. So tell us what Axiant does and and um how uh you help solve business problems. Absolutely. And we're happy to. So Axiant is data backup and recovery options uh for servers, workstations, SAS, email, Google workspace, uh kind of a whole bunch of flexible different options for you guys to protect your customers in the event of disasters, um floods, fires, whatever it may be. We're kind of your last line of defense. Yeah.

So talk to us a little bit about uh cyber security because that's one of our concerns is like ransomware or you know different type of cyber security events. So how do you uh prevent that from affecting businesses? Yeah. Uh to not be long-winded a couple of different things that we do is uh one is our air gap technology. What that is we're essentially separating uh requests of deletion from the actual mechanics of the deletion. So when somebody gets in there, uh, be it ransomware, accidental deletion, malicious deletion, we'll be able to separate that from the actual deletion process and rehydrate that back in for you guys. So realistically with our solution, even if they delete the data, it's not gone for a certain time frame and we can go ahead and help you guys recover that. And then uh we're

also separating our backups in their own virtualizable state. So all your snapshots, everything like that is going to be held in its own spot uh where if it gets corrupted, anything else, it's not going to affect any of the other backups. So, one of the things that we've uh found over the years of being in business is uh you know, backing up lots of different devices and and you know, having like uh a backup software on each individual computer seemed somewhat honorous, but you now have a solution, the direct to cloud solution. Talk to talk to me about, you know, how Axia does direct to cloud and we can back up a lot of different types of uh equipment from laptops to workstations to servers. Totally. uh we found a lot of times an appliance-based approach like you mentioned can be a little bit more troubling and having an agent on every single device uh can be tough. So

using direct to cloud, it's going to act as um for some of those clients that we have that aren't really trusting of their uh ISP providers, things like that. Um it's going to actually really speed up that recovery time when we're doing direct to cloud with our local cache option. Um so we have a USB device something like that on site and we're also doing direct to the cloud and replicating there uh and that way we can pull information from both the cloud and our site uh and keep you guys protected.

Yeah. So we can back up all the devices on the network without even have a BDR on site. Absolutely. Uh and then finally um you know a lot of our clients are moving their data to the cloud moving it to shareepoint or storing in one drive office 365. So how does Axian help with

that? Totally. Yeah. So we have options to protect your whole 365 environment as well as your Google workspace. Uh we're going to be we're currently working developing on our teams chat function as well. So we know a lot of people are chatting in between teams and we see there's a real need for us. So uh

currently we're able to starting to back up things like threads uh in channel post stuff like that. Um but going to be covering you guys in the three times a day checking with Microsoft guaranteeing you one backup a day. Uh same thing with Google Workspace. Um, and that's going to be indefinite retention as well. So, no worries in terms of losing data.

We're going to be able to search up those files, view them, browse them, and be able to pull down anything you guys need. Cool. Yeah. Well, thank you. I We love AXI. We've been with you guys for a long time, so happy to have the partnership. Absolutely. Us, too. I appreciate it. Thanks for uh sharing a little bit about Appreciate it. Thanks. I'm here with Nerdio. They're one of our

partners. Um, can you tell us a little bit about what Nerdio does and and how you help us as MSPs solve our problems with Azure? Sure. So, that's a good question. You can think of Nerdio as essentially a management platform bolts on top and helps you manage various aspects of the Microsoft ecosystem. So, on the infrastructure side, Azure infrastructure, ABD, things like that.

And then on the uh M365 side, it allows you to manage all of your M365 stack multi-tenant, both from a single pane of glass. Yeah. So, one of the complications we have at at Stimulus is, you know, and we help our clients solve is if they have a lot of remote users that need line of business applications. So, setting up Azure virtual desktop environments allows us to, you know, let our clients work in a virtual environment wherever they're at and get access to line of business applications. But setting up Azure is very complex and uh Nerdio has been a great partner in helping us you know manage that safely and and do a lot of automations for us.

Talk talk to me a little bit about the automations and things that it helps like saving money for our clients. Yeah. So we have a lot of tools built into Nerdio that helps us autoscale. So essentially when the resources are needed we can have it pre-staged and have them available. So when everyone shows up to work at 8 am everything's set up good to go. But at the middle of the night or during holidays, people aren't going to be accessing those systems. So, we can autoscale it so it

turns it off so the meter's not running 24/7 and we can save a significant amount amount of money that way. Yeah, we found that clients save 40 to up to 80% depending on um what they're doing when clients are logging in and things like that being able to autoscale. So, absolutely it's been a you know, was we brought in a couple of clients that weren't doing it and then we implemented Nerio. I saved them a lot of money over time. So um what about security and and you know ensuring that uh the environment is set up correctly. Sure

that's a great question and so there's a lot of things that we can monitor from the security perspective within Nerdio. Um back in November we added some capabilities more on the 365 side. We can now manage secure score track that and see where the the customers are at. And then we also have a partnership with CIS. So we provide CAS hardened images

on the ABV side. Then we can also push CAS uh level one baselines for Windows 10 and Windows 11 right from the Nerdio portal. Cool. Uh anything new and upcoming on the Nerdio side that's exciting? Sure. So, you know, really the big news is we just released uh version six. It was announced at um Nerdio a couple of weeks ago. Sure. There's a lot of new features in that. We're actually

close to releasing GCC high support. Right now it's in um believe private preview, but that should be coming out relatively soon as well. Cool. Well, thank you. appreciate the time and uh the updates also. Um excited to be here with our partner uh Galactic Advisors uh with Allison, our account manager. So talk to talk to us a little bit about what Galactic does for us at Stimulus and how that helps our clients.

Absolutely. So we are a third party penetration testing, but it also we're also working into the cyber liability defense. Um really what we're able to do is we're able to protect you guys and making sure your checks and balances are good in your configurations. Obviously you're secure and you're able to go in and protect your clients using your stack. Um and then we'll come in kind of behind you and say, "Hey, yeah, everything's looking good. You're

protected." And then being able to just really reduce their liability. A lot of clients have data that they don't think or realize is sensitive. Um, and so

you're able to come in and protect that data and have it all documented that you're doing all the things so that if something does go sideways, you can go, "Oh, hold on a second. We've got it all documented. You're going to be covered whenever something happens." You know, that's an interesting thing like that you said at the very beginning is um, you know, a lot of companies are signing with IT providers, but is there anybody watching the IT provider to make sure that they're doing the right stuff? And so when that's one of the reasons why we joined Galactic is uh you know we wanted to make sure that we were doing the right things so that we're protecting our clients because we're one of the biggest targets absolutely for hackers and so having the reassurance that we're doing the right things also protects our clients. Absolutely. And I know only 2%

of MSPs are actually getting those health checks. And so that whenever you guys come to Galactic and we do your security checks and we do that on a quarterly basis. So it's not just a oneandone. We're continually going through and checking and saying, "Hey guys, just heads up. This is this maybe

need be addressed." Um it protects you and you're able to say, "I get it checked on a routine basis just like if you were go to the doctor." Yeah. Right. Yeah. And it's, you know, we we do these for our clients. we do the assessments and and try to understand what's going on in the client environment or for prospects, but I mean we're doing it they do it on us too to make sure that we're doing the right things. And so

there's, you know, just a lot of different things we have to do to ensure that um, you know, that we're protecting our clients from compliance and and cyber security and act is our partner. Now, talk to us a little bit about some of the new things you're talking about like the supply chain issues because that's another side of it for our clients to understand what's going on with their vendors. Absolutely. So, it's been kind of a thing that's been happening more and more is the vend the clients vendors are going and saying, "Hey, what are you doing to protect your data?" Um, I don't know if you saw the Starbucks story that happened a few weeks ago, maybe a couple months ago. Um, but they got breached because of a vendor security issue. And so that's one

of the things that's available to you as becoming a a client with you guys is that we're going to able to kind of go through those vendor securities and just say, "Hey, we may need to talk about this just in case because they don't may not know." So it gives you an opportunity to really have that security discussion. It's really good to have that partnership, right? It's going to keep you in a trusted advisor state, keep your clients knowing we're taken care of and if anything happens, just pick up the phone and call stimulus. We're good. Yeah. Um, but supply chain is really not the only thing is nowadays there's something called a cyber personal injury lawyer because of breaches happening. And that's where

we're really trying to help you guys as an MSP and as your clients on having that coverage and that documentation that you're doing everything because when things go sideways, I'm not really saying if anymore, when things go sideways, we want everyone to be protected. The worst thing that I could come into for any kind of a day is going, "Hey, we just got a a declination of or not a declaration, a um a letter from the lawyers." That would be an awful day for me because then it'd be ah we could have done so much more. Yeah. Right. Because that's what's happening. I mean the the attorneys are now suing everybody in the party if there's any, you know, release of information or hack or things like that. So, you know, going after the

vendors, you know, you as a a customer, me, us as an MSP, everybody involved and seeing, you know, where the chips land and where the liability is. And so, you know, we're ensuring that we're protected. We're ensuring our customers are protected and you know when when if that ever happens you know if an event ever happens we can show all the documentation that this is everything we did to protect it. I know it's you know it wasn't 100% but we can't protect 100% but this is everything we did and it keeps you out of court. So and and it ensures that the insurance companies are going to pay those claims too. Absolutely. and we've got a ton of

standards so you're able to really protect against federal recognized standards and industry NIST and FTC safeguards for CPAs. Um, all of that can be boiled down and you can start gathering that at that that attestation that they're doing the things really having the clients taking advantage of knowing that they do have a piece and security that is key whenever you're starting talk about business impact especially with these kind of risks and the data that they're going to be having. So I've known Bruce McColie for about seven years. Um, we were in a peer group together when he owned an MSB before he started Galactic Advisors, but he said on a mission to do what? We are on a mission to help and protect 1 million people. And I know you're well on your way of it. So, we're excited to

be part of that. And, you know, our goal is to protect our clients and using lactic providers will meet both of those goals. Absolutely. That is our goal. Anything we can do to help, we're always here. Great. Thanks, Alison. Appreciate

it. Absolutely. All right. And uh we're here with Ninja One talking about RMM which is you know we don't usually use that term uh with our clients but tell us a little bit about what what Ninja does and what is an RMM. Yeah. So Ninja 1 is a RMM or automated endpoint management platform. Two terms are

pretty interchangeable. RMM is remote management and monitoring. Uh so we're going to allow you to remotely manage your configuration of your devices, your security settings, your policies for uh what software is getting deployed, when it's getting deployed. Uh automated reboots, patching, uh we'll do backup. Uh your monitoring is going to be conditions like maybe you need to monitor some things in event log or you need to monitor for when software is installed or uninstalled. We're going to

do all that kind of stuff and allow you to get alerts automatically create tickets. Yeah. So, we've been in the industry, this is 30 years for us. And when stimulus started, we would have to go around and do all that stuff manually. And, you know, we didn't have

remote access to machines. We'd have to drive to our client locations, make sure there antivirus installed properly, set up software, any tickets. We'd have to be on site. And and honestly, RMM's made our life much easier because we can react quickly to problems, have things automated, and uh get that, you know, control over our all our systems and technicians, and it's what our technicians live in most of the time. So, um, one of the things that we really like Ninja one for is the AI side of it of patch management. Talk to us about that and what why patch management is so important because now we're talking a little technical here. So, but what is,

you know, what is patch management and how does uh Ninja One help us with that? So, patch management is super critical. It's the idea of doing OS updates um or thirdparty software updates. That's going to be like your Microsoft Word, maybe your antivirus, uh QuickBooks, things like that. Um and our AI patch setting or tool is basically we do an AI analysis of patches as they come out. So, we're going to look at the patch notes and then we're also going to look at reports for bugs and things like that. So, I'm sure you probably remember

print nightmare. Um, our AI analysis would have caught that. It would have seen that that was happening and it would have flagged the patch and then alerted you guys in your RMM tool and you would have just been able to go in, reject it and then any devices that already had it, you could just roll back the patch and avoid that entirely. So

the AI patching is I think probably the best use of AI that I've seen in any RMM and I come from years in an MSP before I worked for Ninja One. Yeah, we we love it. You know, that's one of the scariest things that we do is in our company is Microsoft releases a patch and what problems is this going to cause and we can roll it out to you know a select number of clients or you know they've already tested it. um so that the

patches whether it's security critical or even just random updates we can ensure that it doesn't cause outages for our clients which is super important. So well great I appreciate your time's been a great partner and we uh we look forward to continuing working with you guys. Yeah, you as well. Thanks so much. Thanks here with Scalpad, one of our longtime partners. Uh tell us a little bit about what Scalpad does and how you help MSPs with actually a lot of different things. You've grown quite a

bit over the years since we started with you. Indeed. Yeah. Well, we got our start uh with asset management as you uh know that's the product that you use, life cycle manager. Uh and we've expanded to a number of other product lines. We have u we brought on life cycle insights into the product uh suite and life cycle insights is focused more on the uh engagement with customers, the QBR, the VCIO type process. We also have

quota which is a fantastic quoting and contracts uh product. Uh we have a fantastic platform for GRC called control map. Control map is very well integrated into life cycle manager as well helping automate a lot of that heavy lifting of evidence collection and compliance checks on all your assets. Uh we've got cognition 360 which is our business intelligence tool predictive analytics for connectwise manage connectwise PSA specifically. Um and what am I missing? Uh backup radar. Backup radar is actually one of our most popular products because it helps MSPs centralize all the dashboarding, monitoring, and ticket management for various backup solutions. We support

over 300 different backup solutions that we either ingest via API or email notification to give you a centralized place to monitor all those backups. So, one of the big things that's coming up this year is the uh end of life of Windows 10. Yes. And I know that's something that we're talking to a lot of our clients about. So how do how do you help us as an MSP understand you know what uh our clients need to do to prepare for things like end of life hardware or end of life operating systems of course so in the life cycle manager platform one of the things we do is obviously look up the warranties we have what we'd like to think is one of the strongest warranty lookup uh tools in the business but uh just recently and very timely uh for this Windows 11 end of life is that we have launched a Windows 11 uh upgrade readiness report that allows you to see all the devices based on some assumptions because one of the challenges with readiness for an upgrade is the TPM uh platform and so um a lot of that information is actually not published by default in the RMM APIs. You can create reports and run scripts for it but it's not usually published on its own. But we have a list of CPU models and uh make you can make some assumptions based on RAM and storage that gives you sort of a a hit list or punch list of devices that may not be compatible and would need to be replaced. So that gives you pretty much

an interesting sales pipeline to work through to try and get all those customers ready for the next cycle. Yeah. And that's something that we use often in our TBRs that we do with our clients is discuss you know budgeting for those upcoming things that are happening rather than having to you know suddenly buy you know 50 machines. uh they can cycle that through and we use uh these these reports to help our clients understand how to budget for these upgrades and you know the life of their machines which is you know honestly really interesting information like oh we just bought that computer last year and then they realize you know I bought it seven years ago you know and uh you know and the warranty status and keeping those up on uh servers. So, it's

been a great partnership and we uh we really enjoy and I know our clients really enjoy having that understanding of what's what's going on. Yeah, people tell us regularly how much they love the asset report from life cycle manager because it's so easy to understand even for end clients to see very clearly in a you know red yellow green type of status what devices should be looked at for replacement ease of budgeting into a quarterly approach or whatever for that evergreen replacement cycle. So, it's a very nice tool for sure. Great. Well, I appreciate it. Thanks for your time and

my pleasure. We appreciate the partnership. Yeah. Thanks, Nathan. Good to meet you. Nice to meet you. Yes. And we're excited to hear talking to Huntress uh Ethan from Huntress and about uh cyber security edr all things that uh are essential to businesses. So

tell us a little bit about Huntress and what you do to protect our clients. Yeah, so we are a managed 247 uh cyber security platform. So we have our sock team in the UK, Ireland, the United States, and Australia. Follow the sun staffing model so that people aren't chugging Red Bull because people trying to stay up in the middle of the night, you know, is not going to be successful watching for threats. And we own our own EDR technology. The background of the company, we had three founders who came out of the NSA and were like very good at getting onto machines and staying there. and they were like there's a

business in protecting against us and that's the root of us of being very driven to find threat actors in environments and protecting businesses because we felt that you shouldn't security can't be just for the large enterprise like it needs to be give enterprise class security tools for everybody at a price point they can afford that's like the driving mission of what we're about. Cool. So, you know, I think you brought up an interesting point. So, a lot of companies, especially SMBs, think that uh their IT guy is handling all their cyber security, but most threats happen at 2 a.m. or they're they're in the system

for a long time and then they are on a, you know, Saturday night at, you know, 2 a.m. And so having a 24-hour security operation center sock is essential. Exactly. And because they can do things like we can remediate mean we can kill that process. We can uh you know remove malware that can solve but we can also do we call it isolation where our team if they see a threat actor land on a machine start touching it will isolate that machine contain so that the threat actor can't get there or if they think that threat actor is going sideways in the middle of the night they'll isolate entire organization and that way that business is protected until you can get clear eyes understand what's going on and now you can systematically deal with that attack. Um, and our analysts, you

know, love being able to catch those threat actors in the early stages. And it's all about that early detection you talked about. You want to be there as early as possible as the threat actors are trying to understand because something people don't always understand is a threat actor doesn't like immediately jump into an environment and ransomware it or they're trying to understand what the business is they've landed in because they are actually in a business. They're in a business of

getting data and so they want to understand what they have gotten. They're going to take some discovery. They're probably going to resell that to somebody else for the access. Hey, I got in here. So, it's a very interesting ecosystem. And and as they discover that data, they're they're putting a price tag on what it means to the business.

Exactly. You know, business that doesn't have a lot of data, they might ask for a couple thousand dollars, but somebody that has a lot of confidential data, they might ask for millions of dollars. Exactly. But and then one of the things though is that I know I was on the MSP side before I came to Huntress was that small business are like well we don't have anything of value but you there's always something of value whether that's payroll information for your own employees it's your invoices and who your customers are maybe you know you don't think of yourself as this major business but one of your businesses that are you take care of has a downstream person and so it's all about those connections that they're looking at monetizing and I think one of the biggest threat vectors right now is email and uh cloud data. Yes. So talk to us about like identity management. Yeah,

identity is definitely where the threat actors are pivoting to because we've done really good coming up with EDR, next generation antivirus, putting in, you know, firewalls that are blocking access. And so they've realized as we've moved more and more to working off of our phones that that identity is driving everything. So um largest FBI just came out with latest numbers I haven't seen this year that or came out for 2024 but last year business email compromise largest number that was out there in their data um and that's going to continue to climb and have heard you know horrendous cases where that identity becomes so critical because we do have things like single sign on that you can log in with your email address into a HR system and so if a threat that compromises you and you're the in charge of HR, now they can go over into your HR system and have access to all that data. So, identity is definitely the big thing that is out there. And yes, MFA is going to help you, you know, definitely need to have MFA on devices, but they're now coming up with ways to bypass and attack those MFA codes and grab that. So, it's

a continual patent mouse kind of game, for lack of a better description. And what we see on those uh with you know the identity attacks is often just like in computers they're in there for a long time you know they set up redirect rules. So if they're communicating with a vendor or you know let's say that accounting person you know redirecting payments things like that payments understanding how the email tones work what access they had um you know setting it up and they'll do kind of that long con for lack of a better description where they might even compromise a couple of accounts and start an email chain quote unquote legitimate email chain that they're hiding with those rules etc. to create that veneer of it all being authentic with multiple accounts. And yeah, it's crazy. And you know, we use

automated software to detect that because these rules are really complex and it's it's just hard for one IT guy or even an IT team to detect all this that's going on. You have to have these automated tools that's detecting and you have to think how one of the things I love about being at Huntress is we have dedicated threat researchers for every one of our products. And so for identity for instance, our threat researcher has started to realize that OOTH apps which are these applications you can install in a Microsoft tenant are actually being used to exfiltrate data. And so now he's

started to see this thing. We've now been able to add that into our product where we can see what we call rogue apps. And so things that person might click on install because they've been tricked in a fishing email or something like that. you know, now we're able to

detect that and say, "Hey, it looks like an end user has installed this thing that you would have taken actions to change password, put MFA back in place, etc." But those apps would have kept that persistence. Yeah, we we've actually talked about this on another podcast episode. So, what he was talking

about is, you know, sometimes you get those emails that say, "Oh, log in to download your secure email message." Exactly. And you click on that, it says, you know, connect with your Office 365 account. You click on that. It sounds great. And it looks like, you know, a

rand, you know, an email that you were expecting, but it's it's now they're getting access into your 365 environment uh through the OOTH authentication. So there's I mean hackers are very tricky and we have to stay up on it as much as possible. So we you know appreciate working with uh you know vendors like Huntress that keep us up to date. So thanks so much. It was a pleasure. Great talking to you. We're here at Robin Robbins uh IT uh sales and marketing conference and I'm actually at the Robin Robbins booth with our account manager Carrie. Uh we've been working with her

for a long time. Uh can you tell us a little bit about Robin Robbins and the whole technology marketing toolkit team or actually the marketing team now? That's a new name, right? So we've been with uh TMT for seven years. So tell us a little bit about what you do and how you how you help stimulus and all these things. Well, first of all, Robin's been in business for over 20 years, and she has successfully helped bars and MSPs, managed service providers or IT outsource companies to scale their business with sales and marketing. And we've evolved so much in regards to everything that we do. And we help our members grow and get the results that we that she says that she's going to get um by helping them with any type of process that they need. Um, and we have a great

community of peers that help walk alongside each other like Nathan. And we just do so much and it's an exciting place to be. As you can see, Willy Wonka in the chocolate factory or actually Robin Robins in the marketing factory. She loves her members. She loves her her community and she's here for results.

So, and I'm excited to be part of that team. So, thank you. So, one of the things that we use is a lot of the marketing materials and Robin Wright. So, and they're often corny. So, if you've ever got like a an aspirin letter from us, you know, with aspirin or a dollar bill attached to a letter or something like that, that's uh some of Robin's marketing genius. And yes, uh it's always very interesting. So, um you know, kind of talk to me about some of the other things that I mean that you have us do that's kind of cheesy or crazy. Cheesy or crazy. actually

everything she does is is results driven. Like I said before, um what we really focus on at TMT is helping our members and educating them on a process. And if you know Robin, everything we do is a process and we help to give you those tools to succeed. Whether it be

train, helping you to understand what an appointment setter is or the automation to help with that marketing, sales, operations, all the things to be successful and that's what we do. Now, cheesy, as you can say, we like a great we love a great theme. Yes. And and I love cheesy, honestly. you know, a lot of the fun, it's it makes it fun and interesting, and that's one of the things I like about the campaigns and and different things we do, but a lot of it serious. So, it's one of the reasons why we started this podcast. You know, uh Robin talks about building uh authority and trust. Yes. And so, wrote

the book, the CEO's uh digital survival guide. You know, one of the first speakers I ever heard at Robin Robbins was, you know, talking about writing a book. And, you know, you help members understand what it really takes to get their message out there. one of the

reasons why we have this podcast, the book, our webinar series, all these different things. Um, and we emulate a lot of what Robin does because and and the group does here because it it really works. And um the other thing that we really like is the peer peer group side of things too. So we have uh how many people are here? About 1,500 or so. There's about there's about 1,500 people here. Yeah, it's really cool to be part

of a community with uh all these other IT, you know, companies that are trying to be better, trying to implement the new things. So, it's just awesome to be part of this community and and be here with different vendors, different peers, and a great team driving it all. So, thanks Carrie for Thank you. Well, we

love we love what we do here at TMT. All of us give 200%. We really want you to be successful and we take great pride in your results. So, if you want to know more, just reach out to us and we'll be more happy to help you. Cool. Thanks, Karen. Thank you. Appreciate it. Well,

that's a wrap. We went around and talked to uh some different vendors uh some of the ones we use and uh you know talked a little bit about industry stuff which might be interesting to you especially if you are in the IT world uh there is definitely a great uh number of vendors here a lot of different products uh it's very interesting to see what trends are going on uh with uh cyber security with IT especially with AI a lot of the conference uh focused on AI we didn't really talk to any AI AI vendors here uh but a lot of the discussion was around how to use AI to improve business processes and you know what's going on in that world. So uh join us with our podcast uh stimulus tech talk as we discuss these things over the next few weeks uh what's going on with AI cyber security IT in general because we can't forget about basic IT needs. Uh so always great to be at these different conferences and learn and grow and bring it back to you, our listeners and our customers. So thanks for joining us.

2025-05-05 06:35

Show Video

Other news

Trump’s Week in the Gulf, Airbnb's App Redesign | Bloomberg Technology 2025-05-18 10:51
AI for Developers: Pair-Programming with ChatGPT to Ship Faster 2025-05-17 10:19
Browser Fingerprinting Masterclass: How It Works & How To Protect Yourself 2025-05-11 01:10