29 episodes

3Eye Technologies and their channel partners explore everything in the world of mobile tech - topics range from product deep dives with industry experts, to leadership and business strategy discussions, to how to go to market effectively in a world that is relying more and more on mobile communication.

Beyond the Device with 3Eye Technologies 3Eye Technologies

    • Technology
    • 5.0 • 3 Ratings

3Eye Technologies and their channel partners explore everything in the world of mobile tech - topics range from product deep dives with industry experts, to leadership and business strategy discussions, to how to go to market effectively in a world that is relying more and more on mobile communication.

    Beyond the Device: Push to Talk with RAM & AINA

    Beyond the Device: Push to Talk with RAM & AINA

    Caramie Huntington (AINA) and Kyle Lonzak from RAM Mounts join Reid Estreicher on the Beyond the Device podcast to share how they have joined forces to create a best in class Push-to-Talk bundle available through 3Eye Technologies.

    AINA is compatible with all major PTT applications, enabling instant communication in and around the vehicle while providing clear and crisp audio quality, amplifying all media sounds through a Bluetooth connection. This extremely rugged and water-resistant wireless microphone stays in constant charge, provided by an in-vehicle charging cradle. Designed and manufactured in Europe, a 2-year warranty is included on the microphone when purchased alongside a charging cradle.
    Designed and manufactured in America, RAM® Mounts is trusted by the nation’s largest transportation fleets and OEM’s. RAM® offers a lifetime warranty on mounts and a 3-year warranty on electronics.

    Hosted by:
    Reid Estreicher, VP of Business Development, 3Eye Technologies
    https://www.linkedin.com/in/thereid/
    Guests:
    Caramie Huntington, Sr. Enterprise Sales Manager
    https://www.linkedin.com/in/caramie/
    Kyle Lonzak, Business Development Manager at RAM Mounts
    https://www.linkedin.com/in/kyle-m-lonzak-12364520/

    • 16 min
    Beyond The Device: Mobilizing Healthcare Workflow with Altus

    Beyond The Device: Mobilizing Healthcare Workflow with Altus

    Traveling from room to room and floor to floor in a clinical or hospital setting is already exhausting enough. But bringing a heavy and uncomfortable workstation around brings the effort to another level. So nurses want something that’s functional, mobile, and easy to use. That way, they can easily bring workstations wherever needed to improve patients outcomes. 
    Joe Hillebrand and Steven Gapski from Altus join Reid Estreicher and the Beyond the Device Podcast to discuss how Altus-Inc. healthcare workstations and carts increase mobility in clinical environments.   Altus designed carts are built for clinical environments that are ergonomically friendly, easily hold computers, keyboards, and other tools used for data recording, management, and gathering so that nurses can get the vitals of patients from their bedside or in the ER without the need to travel back to the nurse's station to manually input the information.

    • 20 min
    Beyond the Device: Push to Talk with AINA

    Beyond the Device: Push to Talk with AINA

    Caramie Huntington joins the Reid Estreicher and the Beyond the Device Podcast to discuss how AINA has evolved critical Push-to-Talk applications over multiple licensed and unlicensed bands with multiple devices that are worn on body and in-vehicle for law enforcement, first responders (fire/EMS), military, fleet and more.  

    AINA is compatible with all major PTT applications, enabling instant communication in and around the vehicle while providing clear and crisp audio quality, amplifying all media sounds through a Bluetooth connection. This extremely rugged and water-resistant wireless microphone stays in constant charge, provided by an in-vehicle charging cradle. 

    • 39 min
    Beyond the Device: RAM Mounts with Kyle Lonzak

    Beyond the Device: RAM Mounts with Kyle Lonzak

    Reid Estreicher, host of 3Eye Technologies Beyond the Device podcast and Vice President, Business Development discusses RAM Mounts for Laptops and with Kyle Lonzak, Business Development Manager at RAM Mounts.  

    In this episode of Beyond the Device, Kyle Lonzak explains the growing trend of replacing in-vehicle laptops with tablets and ruggedized keyboards for government (police, fire, military and EMS) as well as industrial fleet vehicles.  With RAM's modular design concepts, leveraging existing laptops while transitioning to tablets and other in-vehicle technology stacks becomes simpler and more cost-effective.  

    • 20 min
    Beyond The Device: Identity Security with Iuncta

    Beyond The Device: Identity Security with Iuncta

    Swale Nunez joins us on this episode of Beyond the Device  to discuss Identity Management, Web3 and your identity in the Metaverse.  

    "What we are hoping to do is give users back control over their digital identity," says Swale Nunez.  "You have commoditized my identity and profited off of my identity."

    Identity is the most valuable thing on the Internet.

    "You brought up the word that I use in a lot of the times when I speak is psychographics, right. And they track and monitor our behavioral patterns and things that we're interested in. I've heard people describe that term as a war tool. Because it's so influential and impactful in the sense that it can have a negative impact and affect massive amount of people. And that's one of the things going back to just our platform and we pride ourselves on our ethical practices. Because right now with our competitors right, and just for those who don't know, a social login is what you see whenever you're either creating an account or login into something. They give you the option to either log with Facebook or login with Google because you have existing accounts with them, right?"
    The sites you visit know that, the apps you use know that, the companies that control them know that — but do you know that?
    "In this digital world, our identities are being managed and collected by entities that aren't us. And to make matters worse, they’ve done an absolutely stellar job at profiting off it. Unfortunately, you don't have a good idea of what's being shared, right. And beyond that, this is your social network, right? There's things on there that if I'm opening a new account for my banking information, right. I don't need my bank to know that I was at this place two weeks ago or these are my friends or these are my likes, right. That's unimportant for my bank account," suggests Swale.  "But a lot of that data is being shared. And that's where the privacy concerns come into play. Because again, I shouldn't have to relinquish that information just to open an account. And I'm using bank account as an example, but any account in general. For us, we are transparent in the data that's being shared and nothing is being shared unless you approve it. Here it's the information that's being requested to create this account. Do you want to share that information? Yes I do or No I don't. Whereas in these other platforms, it's you click a button and you don't know what information is being shared, right."

    Proper identity management is integral if you want to take back control of your online identity. 
    "To just to exist in this digital climate now, it involves you having to relinquish that control, right. And that's what we're trying to counter as much as possible, right. And it's twofold, right," says Swale. "As much as we champion the user, we create a platform that is beneficial to our partners as well, right. We help accelerate that onboarding process because we simplify authentication of the user and also data capture, right. Because everybody knows in an onboarding process, the key is to make it as personalized as possible, right. Because as users, I think we are two times or twice as engaged when we realize that this presentation is catered to me specifically, right. 

    • 35 min
    Beyond The Device: Identity Management with BIO-Key

    Beyond The Device: Identity Management with BIO-Key

    Protecting the valuable data that organizations generate, gather, and store from unauthorized access is crucial. Data breaches of any magnitude can have an enormous impact on your company's bottom line and stakeholder confidence. Businesses can improve the security of their data by implementing identity management solutions.
    In a recent podcast, we interviewed biometric identification and access control experts from BIO-key. With Kimberly Biddings, BIO-key International's VP of Product, and Scott Mahnken, BIO-key International's VP of Channel Marketing, we discussed the importance of identity protection and management for businesses. Here are some crucial points.
    What Is Identity Management?
    Identity management offers a layer of security to your company by identifying, verifying, and authorizing individuals and then granting them access to your data systems. It's about making sure that only the individuals with authorization, and only at a level that allows them to execute their tasks successfully, can gain access.
    This is more crucial than ever since as enterprises shift to the cloud, they require more passwords. For instance, a new set of credentials can be needed with each new application — these open businesses up to a greater risk of unauthorized access to sensitive data.
    With BIO-key's identity management systems, users no longer have to provide their password for every program they use due to a single secure login. "The main differentiator for us is that we have identity-bound biometrics, which identifies the person. It is a biometric that's bound to your identity, stored centrally, extremely secure," says Biddings.

    The Bottomline
    Cyberattacks are a persistent and imminent danger. As a result, businesses need to implement cybersecurity safeguards to prevent unauthorized access to their systems. Using identity management solutions from BIO-key provides a necessary layer of defense to protect businesses and their people.

    • 39 min

Customer Reviews

5.0 out of 5
3 Ratings

3 Ratings

Top Podcasts In Technology

Lex Fridman
Jason Calacanis
NPR
Jack Rhysider
Ben Gilbert and David Rosenthal
Recode & The Verge