POPULARITY
Guests: Bill Roggio and David Daoud. Hezbollah leader Naim Qassem pledges loyalty to Iran, threatening asymmetric attacks on global U.S. assets if the "mothership" is struck, while organizing for Lebanese elections.15th century
Alexis Carlier, founder of Asymmetric Security, explains how assuming AGI-level intelligent labor should transform cybersecurity from reactive triage to proactive, continuous digital forensics. He breaks down today's threat landscape—from “spray and pray” cybercrime to nation-state IP theft and North Korean “remote workers.” The conversation explores Asymmetric's AI agents for deep investigations, their services-first approach to business email compromise, and how specialized digital forensics may differentially accelerate defensive AI capabilities. Use the Granola Recipe Nathan relies on to identify blind spots across conversations, AI research, and decisions: https://bit.ly/granolablindspot Sponsors: GovAI: GovAI was founded ten years ago on the belief that AI would end up transforming our world. Ten years later, the organization is at the forefront of trying to help decision-makers in government and industry navigate the transition to advanced AI. GovAI is now hiring Research Scholars (one-year positions for those transitioning into AI policy) and Research Fellows (longer-term roles for experienced researchers). Both roles offer significant freedom to pursue policy research, advise decision-makers, or launch new initiatives. Applications close 15 February 2026. Apply at: https://www.governance.ai/opportunities Blitzy: Blitzy is the autonomous code generation platform that ingests millions of lines of code to accelerate enterprise software development by up to 5x with premium, spec-driven output. Schedule a strategy session with their AI solutions consultants at https://blitzy.com Serval: Serval uses AI-powered automations to cut IT help desk tickets by more than 50%, freeing your team from repetitive tasks like password resets and onboarding. Book your free pilot and guarantee 50% help desk automation by week four at https://serval.com/cognitive Tasklet: Tasklet is an AI agent that automates your work 24/7; just describe what you want in plain English and it gets the job done. Try it for free and use code COGREV for 50% off your first month at https://tasklet.ai CHAPTERS: (00:00) About the Episode (04:20) Defining AGI and jaggedness (12:27) Modern cyber threat landscape (Part 1) (19:10) Sponsors: GovAI | Blitzy (22:17) Modern cyber threat landscape (Part 2) (29:58) AI-powered cyber defense (Part 1) (33:31) Sponsors: Serval | Tasklet (36:20) AI-powered cyber defense (Part 2) (42:20) Inside digital forensics workflows (51:52) Bootstrapping AI cyber defense (59:17) Shaping the capability frontier (01:08:44) Future of automated forensics (01:17:59) Outro PRODUCED BY: https://aipodcast.ing
Wealth preservation at the $1M to $10M level isn't about finding the next unicorn; it's about structural discipline. In this solo episode, Sam Silverman dismantles the "Portfolio Paradox", the stress of having high net worth but low liquidity, and reveals his comprehensive framework for deploying $1 million effectively.We move beyond the accumulation mindset to the architecture of allocation, breaking down the specific "jobs" every dollar must play, from providing sleep-at-night liquidity to capturing asymmetric upside.In this episode, we cover:The Portfolio Paradox: Why portfolios that look good on paper often cause massive stress due to illiquidity traps and analysis paralysis.The 5-Point Filter: The rigorous stress test every deal must pass, balancing Yield, Appreciation, Liquidity, Tax Efficiency, and Impact.The 4-Bucket Blueprint: A detailed breakdown of the target allocation: 15% Liquidity, 30% Predictable Income, 40% Long-Term Growth, and 10% Asymmetric Bets.Earning Illiquidity: Why you must "earn" the right to lock up capital in private equity by first establishing a foundation of liquid cash and income.Asymmetric Sizing: The "Zero" Rule for high-risk ventures; how to size bets so that a total loss changes nothing, but a win changes everything.Links & Resources:Newsletter: Join the Mechanics of Money weekly deep dive: https://www.mechanicsofmoney.coInvest: Invest with Silverman Capital: https://silvermancapital.coAbout the Host: Sam Silverman is the Founder of Silverman Capital, a private equity and real estate investment firm. Mechanics of Money is the audio playbook for high-net-worth individuals moving from "High Earner" to "Sophisticated Allocator."
Disruptive warfare is a new concept to counter traditional ideas of mass with technology and unconventional strategies and tactics. How does it work, and what does it mean for airpower? We get answers from Michael Stewart, former head of the Navy's disruptive capabilities office and one of the architects behind the Hellscape defense concept. And we have this week's airpower headlines. All powered by GE!
Introduction The Red Sea crisis has settled into an uncomfortable new normal. While the initial shock caused by the use of anti-ship ballistic missiles (ASBM) has faded, the strategic implications of the Houthi campaign remain dangerously under-analysed in the context of future British Naval Doctrine. For the Royal Navy, the conflict would appear to cast a shadow over amphibious operations in littoral waters, where both the Carrier Strike Group (CSG) and the Littoral Response Groups (LRGs) are expected to conduct their operations. The Houthi campaign has inadvertently provided an example of a scalable, repeatable model of sea denial that fundamentally challenges the operating and financial rationale of Western naval power projection. The Houthi Model involves the integration of sensors and shooters at the state level with the expendability and mass of non-state actor operations. This model poses a significant challenge for the Royal Navy, which relies on low-density, high-value assets. The Tyranny of the Cost-Exchange Ratio The frightening mathematics of modern air defence are grounded in the lessons learned from the Bab el-Mandeb Strait. In the first few months of the Red Sea conflict, British destroyers, notably HMS Diamond, excelled at shooting down wave after wave of hostile tracks. However, there was an unsustainable price to pay. The Houthis' Shahed-136 derivative costs approximately $20,000. The missile required to intercept it, an Aster-15 or Sea Viper, costs at least £1 million. While individual engagements can be justified by the value of a destroyed merchant vessel or a destroyer providing escort, the economics of sustained engagement are financially disastrous. This creates a magazine depth problem that the CSG must confront. A Type 45 Destroyer has 48 vertical launch (VL) silos. In a saturation attack scenario, precisely the type the Houthi Model promotes, a destroyer may expend its entire primary magazine in minutes, shooting down targets costing its adversary less than a basic rigid-hulled inflatable boat (RHIB). It should be noted that at present, the Royal Navy can not replenish a surface vessel's VL silos whilst at sea. Should the UK CSG deploy to the Indo-Pacific, it would face the People's Liberation Army Navy (PLAN). However, the Houthi Model demonstrates that the PLAN need not risk its own high-value hulls to mission-kill a Queen Elizabeth-class carrier. It only needs to provide a proxy or 'maritime militia' swarm with sufficient cheap, attritable effectors to force the CSG to exhaust its magazines. Once the escorts are out of ammunition, the carrier becomes operationally irrelevant, forced to withdraw without a single capital ship being sunk. The Littoral Response Group in Crisis: The Decommissioning Dilemma The consequences for the Littoral Response Group could be the most profound. The current construct envisions the use of Bay-class and Albion-class vessels in the littoral zone to conduct 'raids' and achieve 'strategic effects' via the force insertion of Commandos. However, the basis for such an operational construct has now fundamentally changed. In March 2025, the Ministry of Defence undertook the decommissioning of HMS Albion and Bulwark, the Royal Navy's two Albion-class landing platform docks. This was an exercise in cost-cutting that has resulted in a major capability gap. This capability gap now exists at a time when there is a considerable change in the doctrine surrounding amphibious operations. Albion-class vessels were designed to deliver amphibious landing forces at the brigade level. Their absence means that the Royal Navy has to rely on three Bay-class Landing Ship Docks, vessels that are already under considerable pressure due to crewing deficits within the Royal Fleet Auxiliary. The capability gap is significant, as there are now no Bay-class vessels available to conduct sustained operations. With the Albion-class now retired, the capability deficit is pronounced. The lightweight, a...
In this episode of Wine After Work, Bryce sits down with Adam Jackson, CEO and founder of Braintrust, the world's largest user-owned talent network and the company behind Braintrust AIR, the first end-to-end AI recruiting platform built to benefit both companies and talent. Adam shares his entrepreneurial journey—from founding telemedicine giant Doctor on Demand to building Braintrust—and unpacks how AI is fundamentally changing hiring. We dive into what Braintrust AIR actually does, why now is the moment for AI in recruiting, and how technology can finally make hiring faster, fairer, and more human. Plus, we talk misconceptions around AI, how leaders should approach change, and Adam's unexpected creative outlet: running a wine label called Asymmetric. If you're curious about the future of recruiting, talent acquisition, or how AI can work with people instead of replacing them, this episode is a must-listen. What we cover: Adam's career journey and the origin story of Braintrust The vision behind a user-owned talent network What Braintrust AIR is and how it reduces time-to-hire from months to days How AI can improve outcomes for hiring managers and job seekers Common myths about AI in recruiting (and what's actually true) How to lead through technological change Entrepreneurship, creativity, and wine
At the start of the full-scale invasion of Ukraine, Russia held clear naval superiority in the Black Sea. Over the course of the war, Ukraine has developed an asymmetric maritime strategy using unmanned surface vehicles (USVs), achieving strategic effects against a superior naval force.Ukraine has largely shifted from importing complete drone systems to assembling them domestically using foreign components, with China remaining a key supplier of many critical parts. What is more, Ukraine is now preparing to export its drones internationally.In this episode, Katsiaryna Shmatsina, Eurasia Fellow at Lawfare, sits down with Cat Buchatskiy, the Director of Analytics at the Snake Island Institute, to discuss Ukraine's maritime operations in the Black Sea, the use of drones, and the supply chains behind them. Cat leads a team of analysts producing frontline-validated research on modern warfare, defense innovation, and U.S.-Ukraine security cooperation. Read more from the Snake Island Institute on Ukraine's Black Sea's Asymmetric Blueprint and the transformation of a once-nascent drone industry into a critical pillar of national defense.To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
James St. Aubin considers risk and reward in the AI sector, arguing that winners are the ones serving the end user. He thinks that AI is “propping up the economic outlook” and warns there could be asymmetric losses as downside risk climbs. He examines a Fed at odds and what the neutral rate actually might be: “you kind of know it when you see it.”======== Schwab Network ========Empowering every investor and trader, every market day. Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/ About Schwab Network - https://schwabnetwork.com/about
RIR 128 is here! A huge thank you to every artist, label and promo company who sends me music for the shows, the NTS crew and, importantly, every one of you who checks out the shows every month. This one features from killer tracks from Marcel Dettmann, Oscar Mulero (as Dr. Smoke), Seddig, DJ Bone, Zenker Brothers, Electric Rescue and loads more. Hit the charity links if you can, too...
Podcast: Exploited: The Cyber Truth Episode: The Asymmetric Advantage: How Cybersecurity Can Outpace AdversariesPub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Exploited: The Cyber Truth, host Paul Ducklin sits down with RunSafe Founder and CEO Joseph M. Saunders to explore why the future of cyber defense depends on disrupting attacker economics rather than racing to keep up with every new threat. Joe breaks down how organizations can gain an asymmetric advantage by reducing exploitability across entire classes of vulnerabilities, especially persistent memory safety flaws that continue to expose critical systems. He shares why adding lightweight, automated protections at build time is one of the fastest ways to shift the cost curve onto attackers without forcing massive code rewrites or slowing development teams down. Together, Paul and Joe discuss: Why attackers' resource advantage requires a new defensive mindsetThe power of “patchless” protection in embedded and OT environmentsWhy memory safety flaws persist and how to neutralize them at scaleThe risks of AI-generated code and how to prevent silent vulnerabilitiesHow Secure by Design practices improve resilience for critical infrastructure If you're responsible for securing embedded systems, OT assets, or long-lived devices where patch cycles are slow and risk is high, this episode offers a new mindset that gives defenders the upper hand.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
In Episode 6 of Dialed In, Tim and Zach share what the first few weeks of Collected have really looked like—launching while Zach was in Japan, watching hundreds of people sign up, and seeing early users build full profiles and collections without prompting. They break down what's surprising them most on both sides of the market: Insiders leaning into community instantly, and dealers needing real education before changing habits built on spreadsheets, wires, and WhatsApp. The conversation goes deep on why the biggest opportunity isn't just the sale, but everything that happens before it, and how running more of that workflow through Collected creates an asymmetric advantage over time. From CRM automation that helps Dealers find money already sitting in their business, to the standards the industry is heading toward whether it wants to or not, this episode is a candid look at early traction, real frictions, and where the market goes next when buyers and sellers finally operate on the same system.
Air Date 11/21/2025 In an ethical political system, being willing to break the law in order to starve people amid a political dispute wouldn't be a source of greater leverage and power but it is in ours and the shutdown put the wildly different senses of ethics between the parties on full display. Be part of the show! Leave us a message or text at 202-999-3991, message us on Signal at the handle bestoftheleft.01, or email Jay@BestOfTheLeft.com Full Show Notes Check out our new show, SOLVED! on YouTube! BestOfTheLeft.com/Support (Members Get Bonus Shows + No Ads!) Join our Discord community! KEY POINTS KP 1: Government Shutdown or General Strike How to Fight Trumps Agenda - The Socialist Program w Brian Becker - Air Date 11-12-25 KP 2: What Its Like Suing Trump in Court Over SNAP Funding - Boom! Lawyered - Air Date 11-13-25 KP 3: The History of SNAP How Food Stamps Feed America - The Politics of New America - Air Date 11-4-25 KP 4: MAGA Republican ERUPTS Over Major SNAP Consequences As Gross Tantrum Backfires - The Damage Report - Air Date 10-31-25 KP 5: Addressing Food Insecurity With Dignity - The Giving Garden - Air Date 9-3-25 KP 6: Senator Sanders Slams The Surrender Dems - What A Day - Air Date 11-11-25 KP 7: Pope Condemns Trump Hispanics Quit GOP More Illegal Airstrikes How SNAP Boosts The Economy - The David Feldman Show - Air Date 11-10-25 (00:55:53) NOTE FROM THE EDITOR On how to preserve democracy DEEPER DIVES (01:10:38) SECTION A: SHUTDOWN 02:01:39) SECTION B: FOOD INSECURITY (03:19:42) SECTION C: GOP AWFULNESS SHOW IMAGE CREDITS Description: Composite image of the SNAP program logo (food stamps) and a symbol of a stethoscope (healthcare) in a closed cage with a GOP elephant symbol standing on top against a faded American flag background. Credit: Internal composite design. Elements from Pixabay | Pixabay license | and UDSA Produced by Jay! Tomlinson Visit us at BestOfTheLeft.com Listen Anywhere! BestOfTheLeft.com/Listen Listen Anywhere! Follow BotL: Bluesky | Mastodon | Threads | X Like at Facebook.com/BestOfTheLeft
This week, Lois Houston and Nikita Abraham are joined by Principal OCI Instructor Orlando Gentil to explore what truly keeps data safe, and what puts it at risk. They discuss the CIA triad, dive into hashing and encryption, and shed light on how cyber threats like malware, phishing, and ransomware try to sneak past defenses. Cloud Tech Jumpstart: https://mylearn.oracle.com/ou/course/cloud-tech-jumpstart/152992 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. ------------------------------------------ Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Hello and welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me is Nikita Abraham, Team Lead: Editorial Services. Nikita: Hey everyone! Last week, we discussed how you can keep your data safe with authentication and authorization. Today, we'll talk about various security risks that could threaten your systems. 00:48 Lois: And to help us understand this better, we have Orlando Gentil, Principal OCI Instructor, back with us. Orlando, welcome back! Let's start with the big picture—why is security such a crucial part of our digital world today? Orlando: Whether you are dealing with files stored on a server or data flying across the internet, one thing is always true—security matters. In today's digital world, it's critical to ensure that data stays private, accurate, and accessible only to the right people. 01:20 Nikita: And how do we keep data private, secure, and unaltered? Is there a security framework that we can use to make sense of different security practices? Orlando: The CIA triad defines three core goals of information security. CIA stands for confidentiality. It's about keeping data private. Only authorized users should be able to access sensitive information. This is where encryption plays a huge role. Integrity means ensuring that the data hasn't been altered, whether accidentally or maliciously. That's where hashing helps. You can compare a stored hash of data to a new hash to make sure nothing's changed. Availability ensures that data is accessible when it's needed. This includes protections like system redundancy, backups, and anti-DDoS mechanisms. Encryption and hashing directly support confidentiality and integrity. And they indirectly support availability by helping keep systems secure and resilient. 02:31 Lois: Let's rewind a bit. You spoke about something called hashing. What does that mean? Orlando: Hashing is a one-way transformation. You feed in data and it produces a unique fixed length string called a hash. The important part is the same input always gives the same output, but you cannot go backward and recover the original data from the hash. It's commonly used for verifying integrity. For example, to check if a file has changed or a message was altered in transit. Hashing is also used in password storage. Systems don't store actual passwords, just their hashes. When you log in, the system hashes what you type it and compare the stored hash. If they match, you're in. But your actual password was never stored or revealed. So hashing isn't about hiding data, it's about providing it hasn't changed. So, while hashing is all about protecting integrity, encryption is the tool we use to ensure confidentiality. 03:42 Nikita: Right, the C in CIA. And how does it do that? Orlando: Encryption takes readable data, also known as plaintext, and turns it into something unreadable called ciphertext using a key. To get the original data back, you need to decrypt it using the right key. This is especially useful when you are storing sensitive files or sending data across networks. If someone intercepts the data, all they will see is gibberish, unless they have the correct key to decrypt it. Unlike hashing, encryption is reversible as long as you have the right key. 04:23 Lois: And are there different types of encryption that serve different purposes? Orlando: Symmetric and asymmetric encryption. With symmetric encryption, the same key is used to both encrypt and decrypt the data. It's fast and great for securing large volumes of data, but the challenge lies in safely sharing the key. Asymmetric encryption solves that problem. It uses a pair of keys: public key that anyone can use to encrypt data, and a private key that only the recipient holds to decrypt it. This method is more secure for communications, but also slower and more resource-intensive. In practice, systems often use both asymmetric encryption to exchange a secure symmetric key and then symmetric encryption for the actual data transfer. 05:21 Nikita: Orlando, where is encryption typically used in day-to-day activities? Orlando: Data can exist in two primary states: at rest and in transit. Data at rest refers to data stored on disk, in databases, backups, or object storage. It needs protection from unauthorized access, especially if a device is stolen or compromised. This is where things like full disk encryption or encrypted storage volumes come in. Data in transit is data being sent from one place to another, like a user logging into a website or an API sending information between services. To protect it from interception, we use protocols like TLS, SSL, VPNs, and encrypted communication channels. Both forms data need encryption, but the strategies and threats can differ. 06:19 Lois: Can you do a quick comparison between hashing and encryption? Orlando: Hashing is one way. It's used to confirm that data hasn't changed. Once data is hashed, it cannot be reversed. It's perfect for use cases like password storage or checking the integrity of files. Encryption, on the other hand, it's two-way. It's designed to protect data from unauthorized access. You encrypt the data so only someone with the right key can decrypt and read it. That's what makes it ideal for keeping files, messages, or network traffic confidential. Both are essential for different reasons. Hashing for trust and encryption for privacy. 07:11 Adopting a multicloud strategy is a big step towards future-proofing your business and we're here to help you navigate this complex landscape. With our suite of courses, you'll gain insights into network connectivity, security protocols, and the considerations of working across different cloud platforms. Start your journey to multicloud today by visiting mylearn.oracle.com. 07:39 Nikita: Welcome back! When we talk about cybersecurity, we hear a lot about threats and vulnerabilities. But what do those terms really mean? Orlando: In cybersecurity, a threat is a potential danger and a vulnerability is a weakness an asset possess that a threat can exploit. When a threat and a vulnerability align, it creates a risk of harm. A threat actor then performs an exploit to leverage that vulnerability, leading to undesirable impact, such as data loss or downtime. After an impact, the focus shifts to response and recovery to mitigate damage and restore operations. 08:23 Lois: Ok, let's zero in on vulnerabilities. What counts as a vulnerability, and what categories do attackers usually target first? Orlando: Software and hardware bugs are simply unintended flaws in a system's core programming or design. Misconfigurations arise when systems aren't set up securely, leaving gaps. Weak passwords and authentication provide easy entry points for attackers. A lack of encryption means sensitive data is openly exposed. Human error involves mistakes made by people that unintentionally create security risks. Understanding these common vulnerability types is the first step in building more resilient and secure systems as they represent the critical entry points attackers leverage to compromise systems and data. By addressing these, we can significantly reduce our attack surface and enhance overall security. 09:28 Nikita: Can we get more specific here? What are the most common cybersecurity threats that go after vulnerabilities in our systems and data? Orlando: Malware is a broad category, including viruses, worms, Trojans, and spyware. Its goal is to disrupt or damage systems. Ransomware has been on the rise, targeting everything from hospitals to government agencies. It lock your files and demands a ransom, usually in cryptocurrency. Phishing relies on deception. Attackers impersonate legitimate contacts to trick users into clicking malicious links or giving up credentials. Insider threats are particularly dangerous because they come within employees, contractors, or even former staff with lingering access. Lastly, DDoS attacks aim to make online services unavailable by overwhelming them with traffic, often using a botnet—a network of compromised devices. 10:34 Lois: Orlando, can you walk us through how each of these common cybersecurity threats work? Orlando: Malware, short for malicious software, is one of the oldest and most pervasive types of threats. It comes in many forms, each with unique methods and objectives. A virus typically attaches itself to executable files and documents and spreads when those are shared or opened. Worms are even more dangerous in networked environments as they self-replicate and spread without any user action. Trojans deceive users by posing as harmless or helpful applications. Once inside, they can steal data or open backdoors for remote access. Spyware runs silently in the background, collecting sensitive information like keystrokes or login credentials. Adware might seem like just an annoyance, but it can also track your activity and compromise privacy. Finally, rootkits are among the most dangerous because they operate at a low system level, often evading detection tools and allowing attackers long-term access. In practice, malware can be a combination of these types. Attackers often bundle different techniques to maximize damage. 12:03 Nikita: And what about ransomware? Why it is such a serious threat? Orlando: Ransomware has become one of the most disruptive and costly types of cyber attacks in recent years. Its goal is simple but devastating, to encrypt your data and demand payment in exchange for access. It usually enters through phishing emails, insecure remote desktop protocol ports or known vulnerabilities. Once inside, it often spreads laterally across the network before activating, ensuring maximum impact. There are two common main forms. Crypto ransomware encrypts user files, making them inaccessible. Locker ransomware goes a step further, locking the entire system interface, preventing any use at all. Victims are then presented with a ransom note, typically requesting cryptocurrency payments in exchange for the decryption key. What makes ransomware so dangerous is not just the encryption itself, but the pressure it creates. Healthcare institutions, for instance, can't afford the downtime, making them prime targets. 13:18 Lois: Wow. Thanks, Orlando, for joining us today. Nikita: Yeah, thanks Orlando. We'll be back next week with more on how you use security models to tackle these threats head-on. And if you want to learn about the topics we covered today, go to mylearn.oracle.com and search for the Cloud Tech Jumpstart course. Until next time, this is Nikita Abraham… Lois: And Lois Houston, signing off! 13:42 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.
Send us a textIn this episode, an experienced angel investor explains how she evaluates founders, the value of firsthand problem knowledge, and why the best investments balance limited downside with exponential upside.Learn her million-dollar lesson: success comes from focusing on asymmetry, people, and time.https://familyoffices.com/
Deux fusions de trous noirs, mesurée à un mois d'intervalle fin 2024 par la collaboration LIGO-Virgo-KAGRA, permet aux chercheurs de mieux comprendre la nature et l'évolution des collisions les plus violentes de l'univers. Les données recueillies lors de ces fusions valident également avec une précision sans précédent les lois fondamentales de la physique prédites par Albert Einstein et font progresser la recherche de nouvelles particules élémentaires encore inconnues, susceptibles d'extraire de l'énergie des trous noirs. L'étude est parue dans The Astrophysical Journal Letters. Source GW241011 and GW241110: Exploring Binary Formation and Fundamental Physics with Asymmetric, High-spin Black Hole CoalescencesLVK CollaborationThe Astrophysical Journal Letters, Volume 993, Number 1 (28 october 2025)https://doi.org/10.3847/2041-8213/ae0d54 Illustration Vue d'artiste d'une fusion de trous noirs asymétriques (Carl Knox, OzGrav, Swinburne University of Technology)
Why has Bitcoin captured the attention of investors and innovators alike? Lance Roberts & Vinay Gupta break down what makes Bitcoin unique — from its blockchain backbone to its role as currency, commodity, and speculative asset. We'll explore how to think about Bitcoin in a diversified portfolio, what risks investors need to understand, and why blockchain may reshape how business is done in the future.
Why has Bitcoin captured the attention of investors and innovators alike? Lance Roberts & Vinay Gupta break down what makes Bitcoin unique — from its blockchain backbone to its role as currency, commodity, and speculative asset. We'll explore how to think about Bitcoin in a diversified portfolio, what risks investors need to understand, and why blockchain may reshape how business is done in the future.
The Investing Power Hour is live-streamed every Thursday on the Chit Chat Stocks Podcast YouTube channel at 5:00 PM EST. This week we discussed with special guest Travis Hoium:(00:00) Introduction(04:00) Tesla Earnings and EV Market Analysis(10:12) Opportunities in the EV Space: Lyft and Uber(12:45) General Motors and Rivian: Financial Insights(20:25) Hims and Hers: Disruption in Healthcare(32:08) Emerging Asymmetric Stocks: On and Crocs(34:16) Conclusion and Final Thoughts(37:16) Google's AI Dominance: Competitive Advantages and Future Outlook(47:54) Bubbles vs. Asymmetric Stocks: Understanding Investment Risks(55:45) MGM: A Case Study in Asymmetric Growth OpportunitiesAsymmetric Investing YouTube: https://www.youtube.com/@asymmetricinvestingNewsletter: https://asymmetric-investing.beehiiv.com/Autopilot: https://marketplace.joinautopilot.com/landing/3126/772780*****************************************************JOIN OUR NEWSLETTER AND CHAT COMMUNITY: https://chitchatstocks.substack.com/ *********************************************************************Chit Chat Stocks is presented by Interactive Brokers. Get professional pricing, global access, and premier technology with the best brokerage for investors today: https://www.interactivebrokers.com/ Interactive Brokers is a member of SIPC. *********************************************************************Fiscal.ai is building the future of financial data.With custom charts, AI-generated research reports, and endless analytical tools, you can get up to speed on any stock around the globe. All for a reasonable price. Use our LINK and get 15% off any premium plan: https://fiscal.ai/chitchat *********************************************************************Disclosure: Chit Chat Stocks hosts and guests are not financial advisors, and nothing they say on this show is formal advice or a recommendation.
Vic is a successful Board Advisor, AI Strategist, and Innovator whose mission in life is to help the most people possible make the most money through business, technology, and science. Website: http://aihrdojo.com/ LinkedIn: https://www.linkedin.com/in/vic-ako/ BlueSky: https://bsky.app/profile/vicako.bsky.social Newsletter: https://opportunity-report.beehiiv.com/ (Asymmetric opportunities for ambitious builders. Each week: a validated venture blueprint worth $10M+, complete with go-to-market strategy and exit path.) CallumConnects Micro-Podcast is your daily dose of wholesome leadership inspiration. Hear from many different leaders in just 5 minutes what hurdles they have faced, how they overcame them, and what their key learning is. Be inspired, subscribe, leave a comment, go and change the world!
Find me on Substack: https://bogumilbaranowski.substack.com/Ritavan is a bestselling author of "Data Impact," former CTO, and data transformation expert with a decade of operating experience across sectors including banking (Société Générale), energy trading, consulting, and real estate technology, who advocates for treating digital initiatives like value investments rather than following technology trends.EPISODE NOTES3:00 - Ritavan shares the fascinating story behind having only one name—his grandfather's generation dropped last names as part of a social reform movement to combat caste-based discrimination in India, as colonial systems had turned last names into markers of social hierarchy.7:30 - Early career journey spans math research in Paris at École Normale Supérieure, market risk at Société Générale during the 2008 financial crisis obsession, and energy trading where he cleared his trading exam within six weeks despite not knowing what a megawatt was.13:45 - The core thesis emerges: following technology trends destroys business value. Ritavan argues that constantly chasing AI, cloud, or the latest tech is like an investor jumping between market fads—you're not playing the long game or building real competitive advantage.20:30 - Revolutionary perspective on value creation paradigms throughout history: hunter-gatherers relied 40-60% on traps (automation), agriculture depended on land, industrial age on machinery and raw materials, while the digital paradigm offers zero replication costs and near-zero personalization costs.27:00 - Introduces the SLASOG framework: Save (capital preservation, avoid groupthink), Leverage (find asymmetric opportunities), Align (commander's intent), Simplify (remove clutter), Optimize (maximize returns), Compound (play the long game), Keep (retain gains).36:30 - Roger Federer insight: He won only 54% of points but 80% of games due to tennis's nonlinear scoring system—a powerful metaphor for business success requiring asymmetric opportunities, not perfection.41:00 - Teaching the first LLM-native college students: Traditional assessment is obsolete when AI can summarize and synthesize better than humans. The solution? Open-ended problems with no single answer, forcing genuine creativity and collaboration.48:30 - Napoleon's battlefield genius: treating each battle from first principles, understanding the system, finding nonlinear advantages, and pioneering "commander's intent"—ensuring even illiterate foot soldiers understood strategic goals, not just tactical orders.54:45 - The North Star metric concept: Legacy businesses obsess over EBIT (backward-looking), but digital-age companies need forward-looking metrics that quantify customer value delivery to enable rapid adaptation and compounding gains.Podcast Program – Disclosure StatementBlue Infinitas Capital, LLC is a registered investment adviser and the opinions expressed by the Firm's employees and podcast guests on this show are their own and do not reflect the opinions of Blue Infinitas Capital, LLC. All statements and opinions expressed are based upon information considered reliable although it should not be relied upon as such. Any statements or opinions are subject to change without notice.Information presented is for educational purposes only and does not intend to make an offer or solicitation for the sale or purchase of any specific securities, investments, or investment strategies. Investments involve risk and unless otherwise stated, are not guaranteed.Information expressed does not take into account your specific situation or objectives, and is not intended as recommendations appropriate for any individual. Listeners are encouraged to seek advice from a qualified tax, legal, or investment adviser to determine whether any information presented may be suitable for their specific situation. Past performance is not indicative of future performance.
Vic is a successful Board Advisor, AI Strategist, and Innovator whose mission in life is to help the most people possible make the most money through business, technology, and science. Website: http://aihrdojo.com/ LinkedIn: https://www.linkedin.com/in/vic-ako/ BlueSky: https://bsky.app/profile/vicako.bsky.social Newsletter: https://opportunity-report.beehiiv.com/ (Asymmetric opportunities for ambitious builders. Each week: a validated venture blueprint worth $10M+, complete with go-to-market strategy and exit path.) CallumConnects Micro-Podcast is your daily dose of wholesome leadership inspiration. Hear from many different leaders in just 5 minutes what hurdles they have faced, how they overcame them, and what their key learning is. Be inspired, subscribe, leave a comment, go and change the world!
Get Sam's ChatGPT Executive Coach Playbook - his exact system for everything from revenue optimization to life decisions: https://clickhubspot.com/skm Episode 757 Sam Parr ( https://x.com/theSamParr ) shares his formula for how to live a good life. — Show Notes: (0:00) Step 1: Don't Have a Best Friend (2:45) Step 2: Don't Decide (7:01) Step 3: Don't Set Goals (13:54) Step 4: Keep Pivoting (16:23) Step 5: Don't Buy the Index — Check Out Shaan's Stuff: • Shaan's weekly email - https://www.shaanpuri.com • Visit https://www.somewhere.com/mfm to hire worldwide talent like Shaan and get $500 off for being an MFM listener. Hire developers, assistants, marketing pros, sales teams and more for 80% less than US equivalents. • Mercury - Need a bank for your company? Go check out Mercury (mercury.com). Shaan uses it for all of his companies! Mercury is a financial technology company, not an FDIC-insured bank. Banking services provided by Choice Financial Group, Column, N.A., and Evolve Bank & Trust, Members FDIC — Check Out Sam's Stuff: • Hampton - https://www.joinhampton.com/ • Ideation Bootcamp - https://www.ideationbootcamp.co/ • Copy That - https://copythat.com • Hampton Wealth Survey - https://joinhampton.com/wealth • Sam's List - http://samslist.co/ My First Million is a HubSpot Original Podcast // Brought to you by HubSpot Media // Production by Arie Desormeaux // Editing by Ezra Bakker Trupiano
Vic is a successful Board Advisor, AI Strategist, and Innovator whose mission in life is to help the most people possible make the most money through business, technology, and science. Website: http://aihrdojo.com/ LinkedIn: https://www.linkedin.com/in/vic-ako/ BlueSky: https://bsky.app/profile/vicako.bsky.social Newsletter: https://opportunity-report.beehiiv.com/ (Asymmetric opportunities for ambitious builders. Each week: a validated venture blueprint worth $10M+, complete with go-to-market strategy and exit path.) CallumConnects Micro-Podcast is your daily dose of wholesome leadership inspiration. Hear from many different leaders in just 5 minutes what hurdles they have faced, how they overcame them, and what their key learning is. Be inspired, subscribe, leave a comment, go and change the world!
In this episode, Momo sits down with his friend and long-time flatmate, Sohail, a mathematician, for a relaxed conversation about RSA cryptography—how it works and why it was revolutionary. Sohail breaks down the math behind RSA with clear, accessible examples and shares bonus fun facts about mathematics, broken predictions, and the future of math in an open-source world.---Hardy writes: "The 'real' mathematics of the 'real' mathematicians, the mathematics of Fermat and Euler and Gauss and Abel and Riemann, is almost wholly 'useless'."A similar quote is attributed to Gauss, Sohail's beloved mathematician. He jokingly said "I must have committed blasphemy by attributing it to someone else." Here's the exact quote:"Mathematics is the queen of the sciences, and number theory is the queen of mathematics. She often condescends to render service to astronomy and other natural sciences, but under all circumstances she is entitled to first rank."---00:58 – Sohail's background in mathematics03:23 – Math and real-world applications08:11 – Asymmetric cryptography (like public-key cryptography) vs. symmetric cryptography (like the Caesar cipher)11:18 – Remembering Gauss and Gauss Junior15:55 – Is asymmetric cryptography mind-blowing?17:53 – Why RSA cryptography was ground-breaking21:01 – Explaining RSA through the “suitcase” analogy25:09 – The math behind RSA32:18 – What kinds of functions can be used in RSA?34:58 – Clock-like modular functions in RSA40:59 – Fermat's Little Theorem as the basis of RSA48:11 – A more complex function than Fermat's Little Theorem used in RSA50:43 – How your password reaches your bank securely using RSA59:41 – Do my function and my bank's function need to match in RSA?01:01:19 – The importance of prime numbers in cryptography01:04:06 – Accessible resources for math enthusiasts01:05:40 – Nuance: which exponentiation operations are invalid in RSA01:10:25 – Can a hacker intercept and decode an RSA-encrypted message?01:12:28 – Why the move to elliptic curves?01:14:00 – Other real-world applications of number theory01:19:03 – The future of mathematics---Fermat's little theorem explanation:https://en.wikipedia.org/wiki/Fermat's_little_theoremThe channel for explaining math concepts in simple words, 3Blue1Brown. This source doesn't explain Fermat's Little Theorem, but it is an accessible source for math enthusiasts without specialized training.https://www.youtube.com/@3blue1brownEnigma Cipher Center, the cryptography museum in Poznan, Polandhttps://csenigma.pl/en/My Nostr post about the internet and cryptography:https://primal.net/e/nevent1qqs9x3rxx3s9fhg6jwzvafgh6vvvxe658junc0vt4lphmcdl4w9ccrs9rk8dd---
Day 1,321.Today, we break down Ukraine's escalating drone war targeting Russian industry and examine how Ukrainian intelligence claims China supplied satellite imagery of US-funded factories. We also cover the latest riots in Georgia and election results in Czechia, analysing what they reveal about European political stability. Later, following a weekend of explosions across Russia and occupied Crimea, a RAND Corporation analyst joins us to assess Putin's weakening oil industry, the potential breaking point for Russia's energy sector, and how a proposed European “drone wall” could reshape the continent's defences.Contributors:Dominic Nicholls (Associate Editor of Defence). @DomNicholls on X.Francis Dearnley (Executive Editor for Audio). @FrancisDearnley on X.With thanks to RAND Analyst Michael Bohnert.CONTENT REFERENCED:‘The Battle for Odesa: Ukraine's Culture War' (Francis & Dom Video Documentary):https://www.youtube.com/watch?v=28HqbQLYGMM Europe is facing its ‘Pearl Harbor moment' (Landbergis in The Telegraph):https://www.telegraph.co.uk/world-news/2025/10/05/europe-faces-pearl-harbor-moment/ Georgia's presidential palace ‘attacked' after pro-Russia party's win (The Telegraph):https://www.telegraph.co.uk/world-news/2025/10/05/georgia-protests-presidential-palace-georgian-dream-tbilisi/ Santander hires former head of British Army (The Telegraph):https://www.telegraph.co.uk/business/2025/10/06/santander-hires-former-head-of-british-army/ BOOK NOW: 'UKRAINE: THE LATEST' LIVE, IN-PERSON:Join us for an in-person discussion and Q&A at the distinguished Honourable Artillery Company in London on 22nd October at 7pm.Our panel includes General Sir Richard Barrons, former head of UK Joint Forces Command and latterly one of the authors of Britain's Strategic Defence Review, and Orysia Lutsevych, head of the Ukraine Forum at the Chatham House think tank. Tickets are open to everybody and can be purchased at:https://www.squadup.com/events/ukraineliveThey are going fast, so don't delay!SIGN UP TO THE ‘UKRAINE: THE LATEST' WEEKLY NEWSLETTER:http://telegraph.co.uk/ukrainenewsletter Each week, Dom Nicholls and Francis Dearnley answer your questions, provide recommended reading, and give exclusive analysis and behind-the-scenes insights – plus maps of the frontlines and diagrams of weapons to complement our daily reporting. It's free for everyone, including non-subscribers.Subscribe: telegraph.co.uk/ukrainethelatestEmail: ukrainepod@telegraph.co.uk Hosted on Acast. See acast.com/privacy for more information.
In this episode of the Level Up Claims Podcast, Galen Hair hosts Keld Jensen, a global negotiation expert and author of “The Smart Negotiator.” They discuss AI's transformative role in modern deal-making, blending intuition with data, and unlocking the untapped potential in negotiations. Essential listening for anyone in business wanting to sharpen their negotiation skills and leverage AI effectively. Highlights Negotiation game analogy. Jensen's career-changing moment. AI's role in modern negotiations. AI-enhanced negotiation simulations. Asymmetric value in negotiations. Discussing the negotiation process. Negotiation strategy's importance. Caution: AI is not a shortcut. Using AI during live negotiations. Checking AI-generated information. Importance of listening in negotiations. Episode Resources Connect with Galen M. Hair https://insuranceclaimhq.com hair@hairshunnarah.com https://levelupclaim.com/
Vlad Tenev, CEO of Robinhood joins Cem Karsan at the Hood Summit in Las Vegas, for a timely conversation about the shifting edge in markets. From memories of hyperinflation in Bulgaria to unlocking tools once reserved for institutions, Vlad outlines how Robinhood is positioning retail for a different kind of market regime. Futures, short selling, 24-hour options, AI-driven trade simulation, and embedded social features aren't just upgrades - they're signals. With market structure evolving and a historic wealth transfer underway, this episode captures a platform staking its claim on the next generation of capital allocators - and the volatility they'll inherit.-----50 YEARS OF TREND FOLLOWING BOOK AND BEHIND-THE-SCENES VIDEO FOR ACCREDITED INVESTORS - CLICK HERE-----Follow Niels on Twitter, LinkedIn, YouTube or via the TTU website.IT's TRUE ? – most CIO's read 50+ books each year – get your FREE copy of the Ultimate Guide to the Best Investment Books ever written here.And you can get a free copy of my latest book “Ten Reasons to Add Trend Following to Your Portfolio” here.Learn more about the Trend Barometer here.Send your questions to info@toptradersunplugged.comAnd please share this episode with a like-minded friend and leave an honest Rating & Review on iTunes or Spotify so more people can discover the podcast.Follow Cem on Twitter.Episode TimeStamps: 01:27 - Introduction to Vlad Tenev05:11 - Big announcements from Robinhood09:15 - Tenev's favorite commodities12:13 - Lets talk about options!18:20 - How AI can benefit options trading21:56 - Short selling is coming to Robinhood25:44 - The path to making Robinhood more resilient28:02 - The great transfer of wealth31:17 - How Robinhood differentiates themselves from other platforms33:35 - Creating a broader army37:23 - What is Robinhood most excited for going forward?Copyright © 2025 – CMC AG – All Rights Reserved----PLUS: Whenever you're ready... here are 3 ways I can help you in your investment Journey:1. eBooks that cover key topics
Clair Obscur: Expedition 33 is an incredible new game by French developers Sandfall Interactive, and it is AMAZING. This is not a light lift for you TTRPG folks who may want to emulate the game at the table, but that doesn't mean there isn't a LOT for you to mine for your own games without having to try and replicate this masterpiece. Take home notes: Asymmetric design is awesome, and each character feeling like they're doing something unique and totally different is a great way to keep things interesting while finding combos and letting people have an experience that matches their preferred style of game while at the same table. Flawed characters are better than "good ones," because flaws give your characters things to challenge, overcome, or fall into to make their triumph over a struggle that much better. Slow. Drip. Knowledge to pace decision making and draw parallels or crossroads for certain characters based on information learned about the wider world or story of your campaign. This makes conflict both external and internal to the characters and resonates more than just "wow that was a tough combat!" Monoco is the best, you won't convince me otherwise. Oh and good news, the team at Sandfall has already said that Expedition 33 is only one of the many stories they want to tell within the greater concept of Clair Obscur. THAT'S EXCITING! ----more---- Join the DMs After Dark Discord channel! I made a Ko-Fi if you feel absurdly generous and want to help cover podcast hosting costs & all the upkeep. I'm still working on whether I want to offer anything special over there or just give my extreme gratitude (maybe some stickers or something in the mail) to those who donate, but no pressure whatsoever :) Where to Follow Rene Plays Games: LinkTree | BlueSky | Threads | Instagram | Facebook | DMs After Dark Rene's Games: MECH | MECH Cities 2 | One Last Quest email: RenePlaysGamesPod@gmail.com Music in the Episode (in order of appearance): Music by Tunetank from Pixabay
In this episode of Excess Returns, we sit down with Sam Ro to revisit his widely read post “10 Stock Market Truths” and explore how each principle holds up in today's market. From the long game of investing to short-term risks, valuations, AI, and earnings, Sam shares a timeless framework for navigating markets and separating noise from signal.Topics covered:• Why the long game is undefeated• Short-term volatility and how to prepare for it• The myth of average returns• Asymmetric upside in markets and stocks• AI as both opportunity and risk• Earnings as the ultimate driver of stock prices• Why valuations don't predict the next year• The role of uncertainty and hidden risks• Turnover and evolution within the stock market• Why the stock market isn't the economyTimestamps:00:00 Average returns are misleading02:00 Introducing Sam Ro02:15 Truth #1: The long game is undefeated08:40 Truth #2: You can get smoked in the short term14:20 Do markets have a government backstop?18:00 Truth #3: The myth of average returns23:00 Truth #4: Asymmetric upside28:00 AI as macro and micro driver33:00 Truth #5: Earnings drive stock prices36:30 Truth #6: Valuations won't tell you much about next year51:40 Truth #7: There will always be something to worry about55:20 Truth #8: The destabilizing risks are the ones people aren't talking about01:05:00 Truth #9: There's a lot of turnover in markets01:11:00 Truth #10: The stock market isn't the economy01:20:00 Closing thoughts
Reacting to new music from Lunatic Soul, Gazpacho, Moron Police, JackTheJoker, Asymmetric Universe, and Leprous. Host: Roie Avin Panel: Vic Giol, Daniel Levy, Kyle Fagala
Rob Biederman has sat on both sides of the table — first as co-founder and CEO of Catalant Technologies, and now as managing partner at Asymmetric Capital Partners. In this candid conversation, he explains why so much of the conventional wisdom around startups is actually counterproductive. He breaks down why design partners don't equal traction, why headcount growth is a vanity metric, and why Silicon Valley should stop romanticizing failure. He also shares how Asymmetric evaluates founders, what investors really care about, and the simple test every startup should use to prove they're solving a real problem. If you're a founder chasing milestones that look good on a pitch deck but don't move the business forward, this episode of Fund/Build/Scale is a reality check you won't hear anywhere else. RUNTIME 43:43 EPISODE BREAKDOWN (2:46) “ We have a probably a couple points of differentiation with the broader market.” (4:46) “ Our happiest spot is kind of in the two-to-six million range for our first check.” (5:39) “ We want to get to know people probably a year or two before they're going to found so we can really see what they're about and really understand.” (7:20) “ I think we'd hire most of our founders as investors at our firm, if we had the chance.” (10:11) What makes a startup relevant, credible, or just differentiated? (11:32) An easy framework for self-auditing your startup idea. (13:09) “ I think our industry kind of worships at the altar of failure a little too much.” (15:08) “ We don't actually really love backing people directly from really big companies.” (17:00) Rob explains why design partners are a distraction, not a path to real traction. (21:23) “ If you're gonna get one career, why not spend it trying to trick the world into doing something differently?” (24:17) One metric founders love that does not predict success from an investor's perspective. (25:08) Inside Asymmetric Capital Partners' four-step pitch review process. (27:27) Why the best data rooms are simple: “they have no spin.” (29:46) Rob describes how his firm's advisor partner model works. (31:49) The first step in GTM: “ get to the bottom of why your customer is buying from you.” (35:18) At the start, tell investors “everything you haven't figured out” so you can start planning. (38:17) “ If you don't tell your doctor the truth, what can they do for you?” (41:02) What he would do differently if he were launching a startup today. LINKS Rob Biederman Asymmetric Capital Partners Asymmetric FAQs Catalant Technologies Democratizing Care: Announcing our Investment in Counsel Health EvolutionIQ Raises $21M Series A To Deliver AI Based Claims Guidance Across The Industry SUBSCRIBE
Angioedema – Recognition and Management in the ED Hosts: Maria Mulligan-Buckmiller, MD Brian Gilberti, MD https://media.blubrry.com/coreem/content.blubrry.com/coreem/Angioedema.mp3 Download Leave a Comment Tags: Airway Show Notes Definition & Pathophysiology Angioedema = localized swelling of mucous membranes and subcutaneous tissues due to increased vascular permeability. Triggers increased vascular permeability → fluid shifts into tissues. Etiologies Histamine-mediated (anaphylaxis) Associated with urticaria/hives, pruritus, and redness. Triggered by allergens (foods, insect stings, medications). Rapid onset (minutes to hours). Bradykinin-mediated Hereditary angioedema (HAE): C1 esterase inhibitor deficiency (autosomal dominant). Acquired angioedema: Associated with B-cell lymphoma, autoimmune disease, MGUS. Medication-induced: Most commonly ACE inhibitors; rarely ARBs. Typically lacks urticaria and itching. Gradual onset, can last days if untreated. Idiopathic angioedema Unknown cause; diagnosis of exclusion. Clinical Presentations Swelling Asymmetric, non-pitting, usually non-painful. May involve lips, tongue, face, extremities, GI tract. Respiratory compromise Upper airway swelling → stridor, dyspnea, sensation of throat closure. Airway obstruction is the most feared complication. Abdominal manifestations
We react to new music from BEAT, Karnivool, Asymmetric Universe, BTBAM, Arjen Lucassen, and Royal Sorrow Host: Roie Avin Panel: Vic and Jeremy
Check out my newsletter at TKOPOD.com and join my new community at TKOwners.com.I sat down with Shannon Jean again and we walked through a whole new batch of insane liquidation deals you could flip for serious money. We talked about truckloads of auto parts from the Advanced Auto Parts and Pep Boys merger, flipping Costco returns like Blackstone griddles, and why now is the perfect time to buy Christmas trees for resale. Shannon also broke down strategies for flipping Lego sets, Google Glass, and even modular buildings and flooring from college auctions. We talked about how to use AI tools like ChatGPT or Manus to analyze manifests, how to talk to potential buyers before you even bid, and how these flips could turn into a full-time business. You can find Shannon on X: @ShannonJean (https://x.com/ShannonJean)And learn more at: https://shannonjean.com/If you liked this one and want more from Shannon, check out the other episodes with him here:How to Start Reselling (Even With $0 in the Bank) w/ Shannon Jean⏐ Ep. #199Start Here: How to Build a Business from Nothing with Shannon | Ep. #180This One Belief Will Kill Your Business Before It Starts with Shannon | Ep. #177Shannon returns! How to Know if You Will Win at Entrepreneurship and Love It Too? (+ a Few Biz Ideas). Part 2 of 2. Ep #064How to Start a Digital Detox Biz (+ a few other ideas) with Shannon Jean. Part 1 of 2. Ep #061Shannon returns! More high ticket flipping and deal making tips. Part 2 of 2. Ep. #041Asymmetric bets & flipping high ticket items for profit with Shannon Jean. Part 1 of 2. Ep. #038Timestamps below. Enjoy!---Watch this on YouTube instead here: tkopod.co/p-ytAsk me a question on or off the show here: http://tkopod.co/p-askLearn more about me: http://tkopod.co/p-cjkLearn about my company: http://tkopod.co/p-cofFollow me on Twitter here: http://tkopod.co/p-xFree weekly business ideas newsletter: http://tkopod.co/p-nlShare this podcast: http://tkopod.co/p-allScrape small business data: http://tkopod.co/p-os---00:00 Unlocking Wealth Through Seasonal Arbitrage02:47 The Power of Seasonal Selling06:03 Investing in High-Demand Products08:46 Maximizing Profits with Liquidation Auctions12:01 Exploring Unique Reselling Opportunities14:52 Navigating the World of Auctions18:07 Leveraging Market Trends for Profit20:55 Strategies for Successful Reselling23:49 The Future of Reselling and Investment
A preview of the podcast just posted on Substack at DAILYSTOCKPICK.SUBSTACK.COM 24 stocks that I have on my personal watch list, what the charts are saying and what price I'm looking at buying some of them. What's my top pick? What's yours? Here are the links to all the sales: SAVE ON TRENDSPIDER - GET THE ANNUAL SUBSCRIPTION TO GET MY 4 HOUR ALGORITHM
About ColeCole Wehrle is one of the most innovative minds in board game design today. Cole is a partner at Leder Games, but best-known as the creator of Root, the woodland war game that redefined asymmetric play. Cole's work reaches far beyond cute meeples and clever mechanics, with a background in history and a career in academia, Cole approaches game design as a way to explore systems of power, narrative ambiguity, and the complexity of human behavior. In this episode, Cole and I dive deep into the tension between control and chaos, discussing how historical research fuels good design, and why the best games ask players to grapple with uncomfortable truths. Whether you're designing your first prototype or searching for deeper meaning in your work, this conversation will challenge you to think differently about what games can do. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit justingarydesign.substack.com/subscribe
The weeks leading up to Pump.fun's ICO were contentious: accusations that it was extractive, debates over decentralization, and outrage over allocations. In the end, the company pulled off the third-largest ICO in crypto history, raising $600 million in 12 minutes. The day of, Solana barely flinched under the load, and onchain platforms like Hyperliquid and Raydium left CEXes looking outdated. In this episode of Unchained, Haseeb Qureshi of Dragonfly and Joe McCann of Asymmetric join Laura to break down: Whether this marks the return of ICOs The objections to the small ($10 million) airdrop to creators How Pump.fun's ambitions could reshape memecoins, and maybe Solana itself And why TikTok might not need to worry just yet Visit our website for breaking news, analysis, op-eds, articles to learn about crypto, and much more: unchainedcrypto.com Xapo Bank Ledn Haseeb Qureshi, Managing Partner of Dragonfly Joe McCann, Founder, CEO & CIO of Asymmetric Previous coverage on the ICO: Pump.fun's $1 Billion ICO Has Caused Controversy. Can It Succeed? Unchained: Pump.fun Becomes Third Largest ICO, Raises $600M in 12 Minutes PUMP Traders Make Big Options Bets on the Token Surging Past Its ICO Price Pump.fun Draws Backlash After Confirming PUMP ICO SolanaFloor's tweet on LetsBonk's stats The Block: Pump.fun makes first acquisition, purchases Solana-based copy-trading wallet tracker Kolscan Dune Analytics Twitter thread on the PUMP ICO stats Timestamps:
My guest on the show today is Jerome, Portfolio Manager at Uzo Capital. Jerome brings a unique lens to public equity investing—shaped by his experience on the equity trading floor at Merrill Lynch during the financial crisis, his global perspective, and a profitable venture in music royalties. In this episode, we dive into Jerome's barbell investment approach: pairing stable, cash-generative compounders with higher-risk, venture-style bets in the public markets. He walks us through how he identifies “asymmetric” opportunities—where the upside far outweighs the downside—particularly in companies that are either undiscovered or undergoing transformational change. Jerome also shares how his music royalty business, which generates steady, recurring cash flow, provides the emotional and financial runway to take bold swings on high-risk, high-reward ideas. He discusses how this foundation enables him to withstand volatility and dig deeper into ideas that others may overlook. We cover a lot in this conversation—from PLBY, McCoy Global, and Comstock, to his thesis around durable, capital-light growth businesses and the importance of identifying "free call options" within complex situations. Jerome also lays out a thoughtful framework for due diligence and portfolio sizing that helps manage both risk and conviction. And for full disclosure, we discussed a number of companies during today's podcast. I am not a shareholder in any of them. For more information about Uzo Capital, please visit: https://uzocapital.substack.com/ Planet MicroCap Podcast is on YouTube! All archived episodes and each new episode will be posted on the Planet MicroCap YouTube channel. I've provided the link in the description if you'd like to subscribe. You'll also get the chance to watch all our Video Interviews with management teams, educational panels from the conference, as well as expert commentary from some familiar guests on the podcast. Subscribe here: http://bit.ly/1Q5Yfym Click here to rate and review the Planet MicroCap Podcast The Planet MicroCap Podcast is brought to you by SNN Incorporated, The Official MicroCap News Source, and the Planet MicroCap Review Magazine, the leading magazine in the MicroCap market. You can Follow the Planet MicroCap Podcast on Twitter @BobbyKKraft
* A grim anniversary* Elon's brilliant troll* The big, ugly bill * Bannon tells the truth. But is still a liar* How dare they attack their attacker??* They have cards* Asymmetric and immoral * Changing minds…by human sacrifice* The blackest propaganda* The New York Times v. Palantir* And much, much more This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.wethefifth.com/subscribe
Episode 383: Rob Biederman - Managing Partner, Asymmetric Capital Partners by VentureFizz
Mayday, mayday, mayday! It's chaos! It's mayhem! It's May! Yes, another episode with your host Terri Doty is here! That means this month is coming to a close. May Media includes System of a Down, Silversun Pickups, Andor,... Read More
Steven Greer is a controversial figure within the UFO community. He has a new documentary coming out called Asymmetric Disclosure. How is it? Should we take it serious? Or is it hype? . Kristian Harloff gives his thoughts. #uap #ufo #uaps #ufos #alien #aliens #news #government VIIA: http://www.VIIAHEMP.COM Use the code DTE
Join me for an insightful episode of The Wolf Of All Streets, where I sit down with Joe McCann, founder and CEO of Asymmetric, to unpack the latest market dynamics, crypto trends, and the true potential of Bitcoin. Joe shares his expert perspective on why traditional market cycles might be outdated and reveals where he sees the crypto space headed next. Don't miss this deep dive into Bitcoin's future, meme coins, and why AI could soon redefine the blockchain world. Joe McCann: https://x.com/joemccann ►► JOIN THE FREE WOLF DEN NEWSLETTER, DELIVERED EVERY WEEKDAY!
The memecoin trade might be over. And Joe McCann says that's just the beginning. The founder of Asymmetric has been at the intersection of crypto, macro, and tech for years. He called the $BONK trade early, made moves before most saw the opportunity, and now? He's shifting his focus. Meanwhile, the crypto markets are a bloodbath, with bitcoin, ether, and solana down 10%, 41%, and 35%, respectively, year-to-date. In this episode, Joe joins Unchained to discuss: Why memecoins won't work the way they used to How institutions are approaching crypto in this cycle Why prices are down so much Why Bitcoin might be so hard to outperform Whether Solana is still the fastest horse Visit our website for breaking news, analysis, op-eds, articles to learn about crypto, and much more: unchainedcrypto.com Thank you to our sponsors! FalconX Bitwise Guest: Joe McCann, founder of Asymmetric Links Unchained: Solana Rejected Inflation Reduction—Here's Why Are Memecoins Collapsing? These 8 Charts May Be Signaling Yes Bitcoin Has Declined 20%. How Soon Could the BTC Price Revive? Timestamps: