James King
๐ค SpeakerVoice Profile Active
This person's voice can be automatically recognized across podcast episodes using AI voice matching.
Appearances Over Time
Podcast Appearances
then you can control that security a little more.
We can't control security on personal devices.
We can set best practices.
We can say, hey, here's the firewall rules and stuff.
But if someone goes and takes their phone home and they want to access a non-appropriate site and then get Merrill on that and then you bring it into your environment and that is going across your network, that's a big concern.
Most schools and stuff, you know, the Wi-Fi is segregated.
It doesn't have access to other areas, especially the guest Wi-Fi.
So if you open up that their personal devices can connect to the AV system, you're putting a hole into your security.
Again, I want to echo what Steve said.
Thank you, Dan.
Thank you to the CIA listeners who are bringing these questions to Dan so that Steve and I can address them and hopefully are answering the concerns that our listeners and the CIA readers have to programming.
And Dan has always done a great job of being that conduit of bringing these questions forward so we can get them addressed.
Hopefully they're in the way everyone wants to hear them.
And, again, if you want to get a hold of me, Google me.
You'll find me.
I'm out there.
Oh, again, I love when we can connect and chat, and I'm doing well.
My thought on if a programmer should become a manager and my gut reaction is no.
And that's mainly because, you know, I've said this before.
I always say this is tech is easy.