POPULARITY
Your Nightly Prayer
The 16:9 PODCAST IS SPONSORED BY SCREENFEED – DIGITAL SIGNAGE CONTENT The health care sector has long struck me as having environments and dynamics that would benefit a lot from using digital signage technology. Accurate information is critically important, and things change quickly and often - in ways that make paper and dry erase marker board solutions seem antiquated and silly. But it is a tough sector to work in and crack - because of the layers of bureaucracy, tight regulations and the simple reality that medical facilities go up over several years, not months. People often talk about the digital signage solution sales cycle being something like 18 months on average. With healthcare, it can be double or triple that. The other challenge is that it is highly specialized and there are well-established companies referred to as patient engagement providers. So any digital signage software or solutions company thinking about going after health care business will be competing with companies that already know the industry and its technologies, like medical records, and have very established ties. LG has been active in the healthcare sector for decades, and sells specific displays and a platform used by patient engagement providers that the electronics giant has as business partners. I had a really insightful chat with Tom Mottlau, LG's director of healthcare sales. Subscribe from wherever you pick up new podcasts. TRANSCRIPT David: Tom, thank you for joining me. Can you give me a rundown of what your role is at LG? Tom Mottlau: I am the Director of Healthcare Sales for LG. I've been in this role for some time now; I joined the company in 1999 and have been selling quite a bit into the patient room for some time. David: Has most of your focus through those years all been on healthcare? Tom Mottlau: Well, actually, when I started, I was a trainer when we were going through the digital rollout when we were bringing high-definition television into living rooms. My house was actually the beta site for WXIA for a time there until we got our language codes right. But soon after, I moved over to the commercial side and healthcare, around 2001-2002. David: Oh, wow. So yeah, you've been at it a long time then. Much has changed! Tom Mottlau: Yes, sir. David: And I guess in some cases, nothing has changed. Tom Mottlau: Yep. David: Healthcare is an interesting vertical market for me because it seems so opportune, but I tend to think it's both terrifying and very grinding in that they're quite often very large institutions, sometimes government-associated or university-associated, and very few things happen quickly. Is that a fair assessment? Tom Mottlau: Absolutely. There's a lot of oversight in the patient room. It's a very litigation-rich environment, and so there's a bit of bureaucracy to cut through to make sure that you're bringing in something that's both safe for patients and protects their privacy but also performs a useful function. David: I guess the other big challenge is the build-time. You can get word of an opportunity for a medical center that's going up in a particular city, and realistically, it's probably 5-7 years out before it actually opens its doors, right? Tom Mottlau: That's true. Not only that but very often, capital projects go through a gestation period that can be a year or two from the time you actually start talking about the opportunity. David: And when it comes to patient engagement displays and related displays around the patient care areas, is that something that engineers and architects scheme in early on, or is it something that we start talking about 3-4 years into the design and build process? Tom Mottlau: Well, the part that's schemed in is often what size displays we're going to need. So, for example, if somebody is looking to deploy maybe a two-screen approach or a large-format approach, that's the type of thing that is discussed early on, but then when they come up on trying to decide between the patient engagement providers in the market, they do their full assessment at that time because things evolve and also needs change in that whole period that may take a couple of years you may go as we did from an environment that absolutely wanted no cameras to an environment that kind of wanted cameras after COVID. You know, so things change. So they're constantly having those discussions. David: Why switch to wanting cameras because of COVID? Tom Mottlau: Really, because the hospitals were locked down. You couldn't go in and see your loved one. There was a thought that if we could limit the in-person contact, maybe we could save lives, and so there was a lot of thought around using technology to overcome the challenges of contagion, and so there was even funding dedicated towards it and a number of companies focused on it David: That's interesting because I wondered whether, in the healthcare sector, business opportunities just flat dried up because the organizations were so focused on dealing with COVID or whether it actually opened up new opportunities or diverted budgets to things that maybe weren't thought about before, like video? Tom Mottlau: True, I mean, the video focus was definitely because of COVID, but then again, you had facilities where all of their outpatient procedures had dried up. So they were strained from a budget standpoint, and so they had to be very picky about where they spent their dollars. Now the equipment is in the patient room, but at the end of the day, we're still going to get the same flow of patients. People don't choose when to be sick. If it's gonna be either the same or higher because of those with COVID, so they still need to supply those rooms with displays, even though they were going through a crisis, they still had to budget and still had to go through their day-to-day buying of that product. David: Is this a specialty application and solution as opposed to something that a more generic digital signage, proAV company could offer? My gut tells me that in order to be successful, you really need to know the healthcare environment. You can't just say, we've got these screens, we've got the software, what do you need? Tom Mottlau: Yeah, that's a very good question. Everything we do on our end is driven by VOC (voice of customer). We partner with the top patient engagement providers in the country. There are a handful that are what we call tier one. We actually provide them with products that they vet out before we go into production. We go to them to ask them, what do you need? What products do you need for that patient? I mean, and that's where the patient engagement boards, the idea of patient engagement boards came from was we had to provide them a display that met, at the time, 60065 UL, which is now 62368-1, so that they can meet NFPA 99 fire code. David: I love it when you talk dirty. Tom Mottlau: Yeah, there's a lot of stuff out there that. David: What the hell is he talking about? Tom Mottlau: Yeah, I know enough to be dangerous. Basically, what it boils down to is we want to make sure that our products are vetted by a third party. UL is considered a respectable testing agency, and that's why you find most electronics are vetted by them and so they test them in the patient room. It's a high-oxygen environment with folks who are debilitated and life-sustaining equipment so the product has to be tested. We knew that we had to provide a product for our SIs that would meet those specs as well as other specs that they had like they wanted something that could be POE-powered because it takes an act of Congress to add a 110-amp outlet to a patient room. It's just a lot of bureaucracy for that. So we decided to roll out two units: one of 32, which is POE, and one that's 43. Taking all those things I just mentioned into consideration, as well as things like lighting. Folks didn't want a big night light so we had to spend a little extra attention on the ambient light sensor and that type of thing. This is our first offering. David: So for doofuses like me who don't spend a lot of time thinking about underwriter lab, certifications, and so on, just about any monitor, well, I assume any monitor that is marketed by credible companies in North America is UL-certified, but these are different grades of UL, I'm guessing? Tom Mottlau: They are. Going back in the day of CRTs, if you take it all the way back then when you put a product into a room that has a high-powered cathode ray tube and there's oxygen floating around, safety is always of concern. So, going way back, probably driven by product liability and that type of thing. We all wanted to produce a safe product, and that's why we turned to those companies. The way that works is we design a product, we throw it over to them, and they come back and say, okay, this is great, but you got to change this, and this could be anything. And then we go back and forth until we arrive at a product that's safe for that environment, with that low level of oxygen, with everything else into consideration in that room. David: Is it different when you get out into the hallways and the nursing stations and so on? Do you still need that level, like within a certain proximity of oxygen or other gases, do you need to have that? Tom Mottlau: It depends on the facility's tolerance because there is no federal law per se, and it could vary based on how they feel about it. I know that Florida tends to be very strict, but as a company, we had to find a place to draw that line, like where can we be safe and provide general products and where can we provide something that specialized? And that's usually oxygenated patient room is usually the guideline. If there's oxygen in the walls and that type of thing, that's usually the guideline and the use of a pillow speaker. Outside into the hallways, not so much, but it depends on the facility. We just lay out the facts and let them decide. We sell both. David: Is it a big additional cost to have that additional protection or whatever you want to call it, the engineering aspects? Tom Mottlau: Yes. David: So it's not like 10 percent more; it can be quite a bit more? Tom Mottlau: I'm not sure of the percentage, but there's a noticeable amount. Keep in mind it's typically not just achieving those ratings; it's some of the other design aspects that go into it. I mean, the fact that you have pillow speaker circuitry to begin with, there's a cost basis for that. There's a cost basis for maintaining an installer menu of 117+ items. There's a cost basis for maintaining a Pro:Centric webOS platform. You do tend to find it because of those things, not just any one of them, but because of all of them collectively, yeah, the cost is higher. I would also say that the warranties tend to be more encompassing. It's not like you have to drive it down to Ted's TV. Somebody comes and actually remedies on-site. So yeah, all of that carries a cost basis. That's why you're paying for that value. David: You mentioned that you sell or partner with patient engagement providers. Could you describe what those companies do and offer? Tom Mottlau: Yeah, and there's a number of them. Really, just to be objective, I'll give you some of the tier ones, the ones that have taken our product over the years and tested and provided back, and the ones that have participated in our development summit. I'll touch on that in a moment after this. So companies like Aceso, you have Uniguest who were part of TVR who offers the pCare solutions. You have Get Well, Sonify, those types of companies; they've been at this for years, and as I mentioned, we have a development summit where we, for years, have piled these guys on a plane. The CTOs went off to Korea and the way I describe it is we all come into a room, and I say, we're about to enter Festivus. We want you to tell us all the ways we've disappointed you with our platform, and we sit in that room, we get tomatoes thrown at us, and then we make changes to the platform to accommodate what they need. And then that way, they're confident that they're deploying a product that we've done all we can to improve the functionality of their patient engagement systems. After all, we're a platform provider, which is what we are. David: When you define patient engagement, what would be the technology mix that you would typically find in a modernized or newly opened patient care area? Tom Mottlau: So that would be going back years ago. I guess it started more with patient education. If Mrs. Jones is having a procedure on her kidney, they want her to be educated on what she can eat or not eat, so they found a way to bring that patient education to the patient room over the TVs. But then they also wanted to confirm she watched it, and then it went on from there. It's not only the entertainment, but it's also things that help improve workflows, maybe even the filling out of surveys and whatnot on the platform, Being able to order your culinary, just knowing who your doctor is, questions, educational videos, all of those things and then link up with EMR. David: What's that? Tom Mottlau: Electronic medical records. Over the years, healthcare has wanted to move away from paper, to put it very simply. They didn't want somebody's vitals in different aspects of their health stored on a hand-scribbled note in several different doctor's offices. So there's been an effort to create electronic medical records, and now that has kind of been something that our patient engagement providers have tied into those solutions into the group. David: So, is the hub, so to speak, the visual hub in a patient care room just a TV, or is there other display technology in there, almost like a status board that tells them who their primary provider is and all the other stuff? Tom Mottlau: So it started as the smart TV, the Pro:Centric webOS smart TV. But then, as time went on, we kept getting those requests for, say, a vertically mounted solution, where somebody can actually walk in the room, see who their doctor is, see who their nurse is, maybe the physician can come in and understand certain vitals of the patient, and so that's why we developed those patient engagement boards that separately. They started out as non-touch upon request, we went with the consensus, and the consensus was we really need controlled information. We don't want to; we've had enough issues with dry-erase boards. We want something where there's more control in entering that information, and interesting enough, we're now getting the opposite demand. We're getting demand now to incorporate touch on the future models, and that's how things start. As you know, to your point earlier, folks are initially hesitant to breach any type of rules with all the bureaucracy. Now, once they cut through all that and feel comfortable with a start, they're willing to explore more technologies within those rooms. That's why we always start out with one, and then over the years, it evolves. David: I assume that there's a bit of a battle, but it takes some work to get at least some of the medical care facilities to budget and approve these patient engagement displays or status displays just because there's an additional cost. It's different from the way they've always done things, and it involves integration with, as you said, the EMR records and all that stuff. So, is there a lot of work to talk them into it? Tom Mottlau: Well, you have to look at us like consultants, where we avoid just talking folks into things. Really, what it has to do with is going back to VOC, voice of the customer, the way we were doing this years ago or just re-upping until these boards were launched was to provide a larger format, and ESIs were dividing up the screen. That was the way we always recommended. But then, once we started getting that VOC, they were coming to us saying, well, we need to get these other displays in the room. You know, certain facilities were saying, Hey, we absolutely need this, and we were saying, well, we don't want to put something that's not rated for that room. Then we realized we had to really start developing a product that suits that app, that environment, and so our job is to make folks aware of what we have and let them decide which path they're going to take because, to be honest, there are two different ways of approaching it. You can use one screen of 75”, divide it, or have two screens like Moffitt did. Moffitt added the patient engagement boards, which is what they wanted. David: I have the benefit, at least so far, of being kind of at retirement age and spending very little time, thank God, in any kind of patient care facility. Maybe that'll change. Hopefully not. But when I have, I've still seen dry-erase marker boards at the nursing stations, in rooms, in hallways, and everywhere else. Why is it still like that? Why haven't they cut over? Is it still the prevalent way of doing things, or are you seeing quite a bit of adoption of these technologies? Tom Mottlau: Well, it is, I would say, just because we're very early in all this. That is the prevalent way, no doubt. It's really those tech-forward, future-forward facilities that are wanting to kind of go beyond that and not only that, there's a lot of facilities that want to bring all that in and, maybe just the nature of that facility is a lot more conservative, and we have to respect that. Because ultimately they're having to maintain it. We wouldn't want to give somebody something that they can't maintain or not have the budget for. I mean, at the end of the day, they're going to come back to us, and whether or not they trust us is going to be based upon whether we advise them correctly or incorrectly. If we advise them incorrectly, they're not going to trust us. They're not going to buy from us ten years from now. David: For your business partners, the companies that are developing patient engagement solutions, how difficult is it to work with their patient record systems, building ops systems, and so on to make these dynamic displays truly dynamic? Is it a big chore, or is there enough commonality that they can make that happen relatively quickly? Tom Mottlau: That's a very good question, and that's exactly why we're very careful about who's tier one and who we may advise folks to approach. Those companies I mentioned earlier are very skilled at what they do, and so they're taking our product as one piece of an entire system that involves many other components, and I have full faith in their ability to do that because we sit in on those meetings. Once a year, we hear feedback, we hear positive feedback from facilities. We see it but it really couldn't happen without those partners, I would say. We made that choice years ago to be that platform provider that supports those partners and doesn't compete with them. In hindsight, I think that was a great choice because it provides more options to the market utilizing our platform. David: Well, and being sector experts in everything that LG tries to touch would be nightmarish. If you're far better off, I suspect I will be with partners who wake up in the morning thinking about that stuff. Tom Mottlau: Yeah. I mean, we know our core competencies. We're never going to bite off more than we can chew. Now granted, we understand more and more these days, there's a lot of development supporting things like telehealth, patient engagement, EMR and whatnot. But we're also going to make sure that at the end of the day, we're tying in the right folks to provide the best solution we can to patients. David: How much discussion has to happen around network security and operating system security? I mean, if you're running these on smart TVs, they're then running web OS, which is probably to the medical facility's I.T. team or not terribly familiar to them. Tom Mottlau: Yeah, that's a very good question. Facilities, hospitals, and anything that involves network security bring them an acute case of indigestion, more so than other areas in the business world. So these folks, a lot of times, there's exhaustive paperwork whenever you have something that links up to the internet or something that's going to open up those vulnerabilities. So, Pro:Centric webOS is actually a walled garden. It is not something that is easily hacked when you have a walled garden approach and something that's controlled with a local server. That's why we took that approach. Now, we can offer them a VPN if there is something that they want to do externally, but these systems were decided upon years ago and built with security in mind because we knew we were going to deploy in very sensitive commercial environments. And so not so much a concern. You don't need to pull our TV out and link up with some foreign server as you might with a laptop that you buy that demands updates. It's not anything like that because, of course, that would open us up to vulnerability. So we don't take that approach. It's typically a local server and there is the ability to do some control of the server if you want a VPN, but other than that, there is no access. David: Do you touch on other areas of what we would know as digital signage within a medical facility? Like I'm thinking of wayfinding, directories, donor recognition, video walls, and those sorts of things. Tom Mottlau: Absolutely. I mean, we see everything. Wayfinding needs have been for years and years now, and those are only expanding. and we start to see some that require outdoor displays for wave finding. So we do have solutions for that. Beyond displays, we actually have robots now that we're testing in medical facilities and have had a couple of certifications on some of those. David: What would they do? Tom Mottlau: Well, the robots would be used primarily to deliver some type of nonsensitive product. I know there's some work down the road, or let's just say there's some demand for medication delivery. But obviously, LG's approach to any demand like that is to vet it out and make sure we're designing it properly. Then, we can make announcements later on about that type of stuff. For now, we're taking those same robots that we're currently using, say, in the hotel industry, and we're getting demand for that type of technology to be used in a medical facility. David: So surgical masks or some sort of cleaning solutions or whatever that need to be brought up to a certain area, you could send in orderly, but staffing may be tight and so you get a robot to do it. Tom Mottlau: Absolutely. And that is a very liquid situation. There's a lot of focus and a lot of development. I'm sure there'll be a lot to announce on that front, but it's all very fluid, and it's all finding its way into that environment with our company. All these future-forward needs, not only with the robots but EV chargers for the vast amount of electric vehicles, we find ourselves involved in discussions on all these fronts with our medical facilities these days. David: It's interesting. Obviously, AI is going to have a role in all kinds of aspects of medical research and diagnosis and all those super important things. But I suspect there's probably a role as well, right down at the lobby level of a hospital, where somebody comes in where English isn't their first language, and they need to find the oncology clinic or whatever, and there's no translator available. If you can use AI to guide them, that would be very helpful and powerful. Tom Mottlau: Let me write that down as a product idea. Actually, AI is something that is discussed in the company, I would say, on a weekly basis, and again, I'm sure there'll be plenty to showcase in the future. But yes, I'd say we have a good head start in that area that we're exploring different use cases in the medical environment. David: It's interesting. I write about digital signage every day and look at emerging markets, and I've been saying that healthcare seems like a greenfield opportunity for a lot of companies, but based on this conversation, I would say it is, and it isn't because if you are a more generalized digital signage software platform, yes, you could theoretically do a lot of what's required, but there's so much insight and experience and business ties that you really need to compete with these patient engagement providers, and I think it would be awfully tough for just a more generalized company to crack, wouldn't it? Tom Mottlau: I believe so. I mean, we've seen many come and go. You know, we have certain terms internally, like the medicine show, Wizard of Oz. there's a lot out there; you really just have to vet them out to see who's legit and who isn't, and I'm sure there are some perfectly legitimate companies that we haven't worked with yet, probably in areas outside of patient education we, we have these discussions every week, and it's, it can be difficult because there are companies that you might not have heard of and you're always trying to assess, how valid is this? And, yeah, that's a tough one. David: Last question. Is there a next big thing that you expect to emerge with patient engagement over the next couple of years, two-three years that you can talk about? Tom Mottlau: You hit the nail on the head, AI. But you know, keep in mind that's something in relative terms. It has been relatively just the last few years, and it has been something that's come up a lot. It seems there's a five-year span where something is a focus going way back, it was going from analog to digital. When I first came here, it was going from wood-clad CRT televisions to flat panels, and now we have OLED right in front of us. So yeah, there's, there's a lot of progression in this market. And I would say AI is one of them, and Telehealth is another; I guess we'll find out for sure which one sticks that always happens that way, but we don't ignore them. David: Yeah, certainly, I think AI is one of those foundational things. It's kind of like networking. It's going to be fundamental. It's not a passing fancy or something that'll be used for five years and then move on to something else. Tom Mottlau: Yeah, true. But then again, also, it's kind of like when everybody was talking about, okay, we're not going to pull RF cable that went on for years and years because they were all going to pull CAT5, and then next thing, you know, they're saying, well, we have to go back and add CAT5 because they got ahead of themselves, right? So I think the challenge for any company is nobody wants to develop the next Betamax. Everybody wants to develop something that's going to be longstanding and useful, and so it's incumbent upon us to vet out those different solutions and actually see real practical ways of using it in the patient room and trusting our partners and watching them grow. A lot of times, they're the test beds, and so that's the benefit of our approach. By providing that platform and supporting those partners, we get to see which tree is really going to take off. David: Betamax, you just showed your age. Tom Mottlau: Yes, sir. That made eight tracks, right? David: For the kiddies listening, that's VCRs. All right. Thanks, Tom. That was terrific. Tom Mottlau: Thank you very much, sir. David: Nice to speak with you.
This one covers a lot of ground. Avi Mor, Founder and CEO of Morlights, a design firm in Chicago, speaks his mind on interoperability, protocols, dimming, CAT5, Dali, specifications, and… elevators. Using elevators as an analogy, Avi would like to see open protocols for controlling luminaires allowing designers to replace fixtures rather than ripping out the controls system. Founding Principal, Avraham “Avi” M. Mor has been practicing lighting design for over 20 years. After graduating from the University of Kansas with a BFA in Theater Design with an emphasis in Architectural and Theatrical Lighting Design, he moved back to his hometown of Chicago to further his craft. Avi has grown his business from a small operation with only a handful of clients to a bustling firm with projects of all sizes located around the nation. Connect with Avi: https://www.facebook.com/Avmister https://www.linkedin.com/in/avrahammor/ Morlights - https://www.facebook.com/Morlights/ https://www.instagram.com/morlightsdesign/ https://www.linkedin.com/company/morlights/ https://www.youtube.com/channel/UC94SRUUcmQ0cXSvCBk7mbpA Sponsor: mwConnect www.mwconnect.us
Prepare to be enlightened and entertained as Henry Franc, a master of the cabling universe and chair of the TIA TR-42 Engineering Standards Committee, joins us for a lively exchange on the often contentious world of cable combing. Whether you're a staunch Velcro supporter or a tie wrap aficionado, Henry's anecdotes and insights promise to add spark to the old debate. From trade talk to laughter, we bridge the gap between the nitty-gritty of installations and the stories that color our industry, reminding everyone that your voice and expertise matter in shaping the connectivity landscape.Cable myths? Debunked. Best practices? Demystified. As we steer through the complexities of cable installation, we'll clear up common misconceptions that even seasoned pros might believe. Discover how attention to detail is not just about workmanship but also speaks volumes to customers who don't mind paying for top-notch reliability. You'll also get a sneak peek into the technical trenches, where we dismantle fears about Power over Ethernet and dissect real-world applications that assure the integrity of our data highways.Join us on a journey from past to present, reminiscing about the days of Cat5 and the leap to Cat6A, and how these evolutions in standards have impacted the field. Henry's stories from the trenches bring to life the need for practical standards that resonate with the hands-on experience of technicians. So, unravel the mysteries of cable management with us, and learn why sometimes, the best insights come from those who've been in the pathways, conduits, and telecom rooms themselves.Support the showKnowledge is power! Make sure to stop by the webpage to buy me a cup of coffee or support the show at https://linktr.ee/letstalkcabling . Also if you would like to be a guest on the show or have a topic for discussion send me an email at chuck@letstalkcabling.com Chuck Bowser RCDD TECH#CBRCDD #RCDD
Berkley is a treasure in a sea of shiny objects that is internet marketing and business. She is a wealth of knowledge, a lawyer, and an amazing person to boot. There are always more questions that one can imagine when it comes to runing an online business and knowing what the latest laws and jurisdictions are, world wide, because it is, after all, a worldwide web. You will not want to miss this episode if you are thinking about investing in your current business or starting one - and right now she has a sale and we have a special code just for you! Find the details below:During Berkley' Black Friday sale (11/21-11/29), you can use the code CAT5 to get an extra 5% off all legal templates in the shop!!https://www.berkleysweetapple.com/shopSupport the showUpcoming events:The 2024 Adventure Paradox Digital Course HOLIDAY PRESALEConnect with me here:www.catcaldwellmyers.com@catcaldwellmyersThe Adventure Paradox Podcast Page (Fb)
It is day 6. Days without water, and your mind begins to play tricks with you. When the aftermath is upon you, the real test begins. In the eve of the destruction most are desperate, left hungry, they will do anything to survive. Special Episode for Patrons of Professor Zero at patreon.com Imagine if you could peek your head into the events that occur during the end of the world. This is a real life end of the world experience cat 5 event. What happened and what I experienced during hurricane Maria, a category 5 (the strongest hurricane ever to hit land at 187mph. In light of the recent destructions; A glimpse into the aftermath of the apocalypse. No water, no telephone, no internet, no electricity, no gas, no ATM's no food. All that is left is fear, panic, and desperation. The best way to support this program is to come back time and again and listen to your favorite episodes.
When the aftermath is upon you, the real test begins. In the eve of the destruction most are desperate, left hungry, they will do anything to survive. It is your daughter's birthday: Real Live End of the World Category 5 Maria Special Day 5Special Episode for Patrons of Professor Zero at patreon.com Imagine if you could peek your head into the events that occur during the end of the world. This is a real life end of the world experience cat 5 event. What happened and what I experienced during hurricane Maria, a category 5 (the strongest hurricane ever to hit land at 187mph. In light of the recent destructions; A glimpse into the aftermath of the apocalypse. No water, no telephone, no internet, no electricity, no gas, no ATM's no food. All that is left is fear, panic, and desperation. Now on day 4 people begin to form gangs and raid the superstores for supplies. in between all of this my daughter has a birthday, but what can you give in the end of the world when there is nothing. My quest to find her a present as destruction surrounds.This is a sample episode of the type of bonus material you will get for becoming a valued member of this podcast. Please support this program by becoming a patron at https://www.patreon.com/professorzero?fan_landing=trueExtras include: The bizarre, the strange, the obscure. Journey with supernatural beings and extraterrestrials to other worlds. Let your imagination unfold into the truths hidden just behind the lies.- things of dreams and visions. From the North pole black hole, to the government secrets. The best way to support this program is to come back time and again and listen to your favorite episodes.
When the aftermath is upon you, the real test begins. In the eve of the destruction most are desperate, left hungry, they will do anything to survive. It is Dog Eat Dog Day : Real Live End of the World Category 5 Maria Special Day 4Special Episode for Patrons of Professor Zero at patreon.com Imagine if you could peek your head into the events that occur during the end of the world. This is a real life end of the world experience cat 5 event. What happened and what I experienced during hurricane Maria, a category 5 (the strongest hurricane ever to hit land at 187mph. A glimpse into the aftermath of the apocalypse. No water, no telephone, no internet, no electricity, no gas, no ATM's no food. All that is left is fear, panic, and desperation. Now on day 2 people take to the streets to survey the aftermath of the destruction. Caravans form in search of those that need rescue. The rations begin and the truths of survival look ahead.This is a sample episode of the type of bonus material you will get for becoming a valued member of this podcast. Please support this program by becoming a patron at https://www.patreon.com/professorzero?fan_landing=trueExtras include: The bizarre, the strange, the obscure. Journey with supernatural beings and extraterrestrials to other worlds. Let your imagination unfold into the truths hidden just behind the lies.- things of dreams and visions. From the North pole black hole, to the government secrets. The best way to support this program is to come back time and again and listen to your favorite episodes.
How to Survive the Aftermath of the Destruction: Real Live End of the World Category 5 Maria Special Day 2 and 3Special Episode for Patrons of Professor Zero at patreon.com Imagine if you could peek your head into the events that occur during the end of the world. This is a real life end of the world experience cat 5 event. What happened and what I experienced during hurricane Maria, a category 5 (the strongest hurricane ever to hit land at 187mph. A glimpse into the aftermath of the apocalypse. No water, no telephone, no internet, no electricity, no gas, no ATM's no food. All that is left is fear, panic, and desperation. Now on day 2 people take to the streets to survey the aftermath of the destruction. Caravans form in search of those that need rescue. The rations begin and the truths of survival look ahead.This is a sample episode of the type of bonus material you will get for becoming a valued member of this podcast. Please support this program by becoming a patron at https://www.patreon.com/professorzero?fan_landing=trueExtras include: The bizarre, the strange, the obscure. Journey with supernatural beings and extraterrestrials to other worlds. Let your imagination unfold into the truths hidden just behind the lies.- things of dreams and visions. From the North pole black hole, to the government secrets. The best way to support this program is to come back time and again and listen to your favorite episodes.
Special Episode for Patrons of Professor Zero at patreon.com Imagine if you could peek your head into the events that occur during the end of the world. This is a real life end of the world experience cat 5 event. What happened and what I experienced during hurricane Maria, a category 5 (the strongest hurricane ever to hit land at 187mph. A glimpse into the aftermath of the apocalypse. No water, no telephone, no internet, no electricity, no gas, no ATM's no food. All that is left is fear, panic, and desperation.This is a sample episode of the type of bonus material you will get for becoming a valued member of this podcast. Please support this program by becoming a patron at https://www.patreon.com/professorzero?fan_landing=trueExtras include: The bizarre, the strange, the obscure. Journey with supernatural beings and extraterrestrials to other worlds. Let your imagination unfold into the truths hidden just behind the lies.- things of dreams and visions. From the North pole black hole, to the government secrets. The best way to support this program is to come back time and again and listen to your favorite episodes.
Episode:Title: You Spin me Right RoundShow: ohmTown DailySeason: 2Episode: 299Date: 10/26/2023Time: 8PM ET@ohmTown There appears to be some context issues with me using "Election" and "Elections" in my description. These are not political elections, only called that because of the fact that we are "ohmTown" and I'm the "Mayor". You get to vote for your favorite articles and show segments via the links below.Current Election: https://www.ohmtown.com/elections/Past Elections: https://www.ohmtown.com/past-elections/Twitch: https://www.twitch.tv/ohmtownYoutube: https://www.youtube.com/ohmtownPodcasts: https://podcasts.apple.com/us/podcast/ohmtown/id1609446592Patreon: https://www.patreon.com/ohmTownDiscord: https://discord.gg/vgUxz3XArticles Discussed:[0:00] Introductions...Wait, they throws these in the Olympics? https://www.ohmtown.com/groups/ohmtowndaily/f/d/warmer-than-usual-summer-blamed-for-hungry-javelinas-ripping-through-golf-course/You Spin Me Right Round, Round Round Round Round. https://www.ohmtown.com/groups/ohmtowndaily/f/d/the-us-went-from-having-356-to-10000-roundabouts-in-2-decades-and-a-transportation-engineer-explains-why-theyre-so-much-better-than-traffic-lights/So what happened after DART? https://www.ohmtown.com/groups/mobble/f/d/after-dart-smashed-into-dimorphous-what-happened-to-the-larger-asteroid-didymos/Halloween Candy Prices Keep Going Up. https://www.ohmtown.com/groups/hatchideas/f/d/halloween-candy-is-getting-more-expensive-these-are-the-10-states-where-prices-have-gone-up-the-most/Fake News is Getting Expensive. https://www.ohmtown.com/groups/lawnerd/f/d/lawyer-accused-of-submitting-fake-news-article-isnt-sure-whether-judge-signed-268k-sanction-order/Declassified Spy Images Show the Roman Empire. https://www.ohmtown.com/groups/mobble/f/d/declassified-spy-images-just-upended-what-we-know-about-the-roman-empire/Graphics cards are expensive, but come on. https://www.ohmtown.com/groups/warcrafters/f/d/dell-is-selling-a-five-year-old-graphics-card-for-a-bewildering-13800-umm-any-takers-anyone-bueller/Word, you are old. https://www.ohmtown.com/groups/warcrafters/f/d/microsoft-word-hits-the-big-four-o-and-if-you-can-remember-the-first-version-youre-officially-ancient/From Zero to Cat5 in 12 Hours. https://www.ohmtown.com/groups/mobble/f/d/turbocharged-otis-caught-forecasters-and-mexico-off-guard-scientists-arent-sure-why/Cookware Shopping. https://www.ohmtown.com/groups/stockmarketeers/f/d/skip-that-4500-le-creuset-set-at-costco-and-follow-these-5-rules-for-cookware-shopping-instead/Broadcasted live on Twitch -- Watch live at https://www.twitch.tv/ohmtown
IT Desk is back for another fiscal season! Season 3 is where we made important updates, new staff, and systems! Tune into this episode where we strive for communication and we even get technical at times. No matter if you think we lose control, we are able to maintain ourselves and carry through with providing quality customer service. Hear for yourselves! Specialists guests: Curtis Cook (This Fool on Hulu, American Dad, NW Black Comedy Festival), Arlo Weierhauser (Timmy Failure, Late Show With Stephen Colbert, EPIX), Jaren George --- Support this podcast: https://anchor.fm/the-it-desk/support
Lauri-Ellen's experience in Government and Corporate PR includes serving as communications lead in more than 30 Incident/Unified Commands since her career took a turn in the direction of emergency/crisis/risk communication and management, with her appointment as a spokesperson for Super Bowl XXXIX (39) Safety and Security and lead PIO for the event. She has “stood up” or run many Joint Information Centers for hurricanes, high-profile murder trials, industrial incidents, civil unrest/riot, and a campus shooting during her 14-year tenure as the press secretary to two elected Sheriffs in Florida and a Mayor in Mississippi. She led the PIO unit and served as lead comms strategist/press secretary for the nation's 14th - largest law enforcement agency. She then served as a Community Relations Director on the Mississippi Gulf Coast and Government Relations Officer and Emergency Management in a state regulatory agency's regional offices. Today, Smith is a crisis/risk communications strategist and media trainer for C-Suite members and non-government spokespersons, as well as a designer and trainer of emergency management tabletop exercises. In her “prior PR life,” Smith spent 10 years as the PR/Marketing Director for an extensive health system, serving as their government affairs director and lobbying at the state and federal levels. She most notably advocated for healthcare portability and tort reform and co-authored a best practice for communicating adverse medical incidents.Lauri-Ellen advises clients (government, first responders, healthcare, higher education, utilities, and private corporations) on their integrated marketing/communications and public affairs programming. She most enjoys developing tactical strategies and policy development/support; analyzing/supporting PIO staff's functionality and JIC skills; training spokespersons; teaching social media best practices, and advancing common-sense social media policies. She is highly regarded as an advisor on risk/reputation management and front-line worker customer service training. Smith serves on the Board and Executive Committee of PRSA's Public Affairs andGovernment Section. She is the 2015 recipient of the Lloyd B. Dennis Distinguished Service Award in Public Affairs, PRSA's highest honor for PAO's and PIOs. She earnedher bachelor's degree from the nationally ranked PR program at the University of Florida College of Journalism and Communications.She is a 2021 graduate of FEMA's Master PIO (MPIO) program. She now joins an elite group of the nation's top emergency management crisis communicators – the first (and currently only) credentialled MPIO in her adopted state of Mississippi.Email: cat5crisiscomms@gmail.comMan of the YearWhatever happened to friendship? 49% of Americans report having three or fewer close...Listen on: Apple Podcasts Spotify
Hear Chris discuss how his winding path went from restaurants and management to Security and Innovation. Join us as Chris Moore, VP of Solutions Architecture for Thrive lays out the key problems facing customers in the midst of this massive tech talent shortage. Thrive has tons of tools, but more importantly, the talent to manage just about any customer environment while modernizing and augmenting whatever technology they might run up against. Transcript of episode can be found below. Josh Lupresto (00:01): Welcome to the podcast that is designed to fuel your success in selling technology solutions. I'm your host, Josh Lupresto, SVP of Sales Engineering, Telarus, and this is Next Level BizTech. Hi everybody, welcome back. I'm your host, Josh Lupresto, and today we are joined by a good man, Chris Moore, VP of Solution Architecture for Thrive. Chris, thanks for jumping on with me, man. Chris Moore (00:28): Josh, thanks for having me. I'm looking forward to it. Josh Lupresto (00:31): So, title today we're talking about, you know, in this managed services world, but more importantly we're laying a claim. We're saying it's really hard and it's real, the talent shortage in technology, you know, in security in cloud, all of these things, right? So, so we're gonna get to that. I'm excited to kind of hear, obviously you guys have a lot of incredible solutions around that, and we'll get into that as we go. And we're gonna try to answer this. Now, more importantly, though, I wanna hear about your background. You know, if, look, if you've had a, you've had a great linear path and you knew exactly what you wanted to be your entire life, kudos to you. But if you took some weird, windy path and you, you know, you used to train goldfish or whatever, that's okay too. So, first of all, tell me about your background, Chris, let everybody know kind of how you got here. Chris Moore (01:18): Absolutely. Thanks Josh. So, as a kid my dad brought home this lovely IBM computer, and I turned on the monitor. I was like, What the heck is this? I'm looking at, And there was a five and a quarter inch floppy sitting next to it, and I plugged it in the 28 discs or whatever it was to get it Lotus 1, 2, 3 loaded up. Then the next evolution came. I was like, Oh, we can put this modem in it and I can get Prodigy loaded up and everything's good. And then as I progressed through my childhood I didn't honestly really play that much for the computers. I got sucked into working at restaurants and washing dishes and helping the bartenders and all that good stuff. And then I realized when I went to college, I wanted to go get my restaurant resort management degree. Chris Moore (02:07): So that's what I started off down that path. And then right around that time is right when the the CD writers came out where you could burn your own music onto, yeah, CDs. And they were all running by a parallel port, and you expect hundreds and thousands of dollars on CDs that never burnt correctly, and you threw 'em out. And it was right around that point in time where I decided actually, I want to go do something with computers for a career. So I went down and saw my counselor, said, Hey, I wanna change majors. And she looked at me and she goes, Well, if you wanna be here for three more years, and I had about 18 months left, right? So she goes, If you wanna be here for three more years, then you can change majors. And I looked at her and said, Nope, I'll get my degree, and then I'll go do what I want to do. So I did, and ironically, my first job out of college was working at a national restaurant chain on their help desk. Josh Lupresto (03:05): Ah. Chris Moore (03:06): So from there, I did help desk support. I went out to restaurants, pulled CAT5 cable, redid their POS systems, and kind of terminated everything you know, at two o'clock in the morning after the restaurant had closed, and then came back in the next morning and trained the...
How to Survive the Aftermath of the Destruction: Real Live End of the World Category 5 Maria Special Day 2 and 3Special Episode for Patrons of Professor Zero at patreon.com Imagine if you could peek your head into the events that occur during the end of the world. This is a real life end of the world experience cat 5 event. What happened and what I experienced during hurricane Maria, a category 5 (the strongest hurricane ever to hit land at 187mph. A glimpse into the aftermath of the apocalypse. No water, no telephone, no internet, no electricity, no gas, no ATM's no food. All that is left is fear, panic, and desperation. Now on day 2 people take to the streets to survey the aftermath of the destruction. Caravans form in search of those that need rescue. The rations begin and the truths of survival look ahead.This is a sample episode of the type of bonus material you will get for becoming a valued member of this podcast. Please support this program by becoming a patron at https://www.patreon.com/professorzero?fan_landing=trueExtras include: The bizarre, the strange, the obscure. Journey with supernatural beings and extraterrestrials to other worlds. Let your imagination unfold into the truths hidden just behind the lies.- things of dreams and visions. From the North pole black hole, to the government secrets. The best way to support this program is to come back time and again and listen to your favorite episodes.
Here's the Supporter Q&A from September 1st, 2022. All comments and questions are fielded through the support service Q&A page. Please consider supporting this channel via monthly services, tips, or even just by using our affiliate links to purchase things you were already going to buy anyway, at no extra cost to you: https://www.retrorgb.com/support.html View this as a video: https://www.youtube.com/retrorgb Amazon Links to products I use: https://www.amazon.com/shop/retrorgb T-Shirts & Stuff: https://www.retrorgb.com/store.html TIMESTAMPS (please assume all links are affiliate links): 00:00 Welcome! 00:56 PSP-3000 Batteries? 02:51 Gcompsw alternatives? Extron Crosspoint with RCA to BNC's?: https://amzn.to/3cF2pj6 05:30 Nintendo DS wireless controller mod? Maybe Postman's upcoming solution can include that?: https://twitter.com/PostmanMods/status/1564082978082504706 06:35 Superguns safe to use with equipment? 09:27 Where to find replacement universal PSU plug addons like this: https://i.imgur.com/DjooeYC.jpg 10:29 Fixing PCE sync on JVC PVM's & BVM's 15:08 Should I keep an older TV? Yeah, probably. 19:43 Safe to power HDMI switches from components? 22:12 Updated PSU info: https://consolemods.org/wiki/Comparison_of_Power_Supplies 22:35 VGA switch for MiSTer + VGA cable: https://www.amazon.com/shop/retrorgb/list/H10S69UEYW 23:24 Can the Blue Retro GC board be installed in a Q?: https://www.retrorgb.com/gamecube-internal-blue-retro-upgrade-kit.html 24:03 Downscaling Switch to SCART on a consumer TV. Maybe try composite?: https://www.retrorgb.com/480i-downscalers-tested.html 25:53 Using a CAT5 to component matrix 29:19 PS3 HDMI vs Component / What resolution for PS3/360 / No light guns through scalers / HiDef NES question --- Support this podcast: https://anchor.fm/retrorgb/support
With inflation hovering at record-high levels (near 40-year highs), what does this mean for us financially? Terry Sacka, AAMS describes the economic storm that inflation could very well bring upon us and how to prepare yourself.I saw a wave, a dark wave, come over our nation. And it's not just the election, of course, but this program is going to be all in the name RIGGED because when I, and we formed RIGGED, it was because of the financial system, but RIGGED is now becoming common in America. And it's all RIGGED [against you].Free Silver Investment Guide: Build Wealth with Physical SilverTo Buy Gold Direct or Reach A Cornerstone Wealth Advisor:email: clientsupport@cammetals.comtelephone: (888) 747-3309Support the show
Hello everyone welcome to the show "Ethical Hacking" episode 82 today we are going to discuss about Securing network media.Network media is the cabling that makes up our network.This can be copper,fiber optic, or coaxial.And they're going to be used as a connectivity method inside of our wired networks.Now, in addition to all the cables there's other parts of the cabling plant we have to think about.All those intermediate devices like patch panels, punch-down blocks,and network jacks all make up this cabling plant that runs throughout our organization.And each part of that can be a vulnerability for us.The first vulnerability I want to discuss is EMI.This stands for electromagnetic interference.Electromagnetic interference is a disturbance that can affect electrical circuits,devices, and cables due to radiation or electromagnetic conduction that occurs.Now, EMI is something that happens normally inside our businesses and inside our homes.EMI is caused by all sorts of things, like televisions,microwaves, cordless phones, baby monitors,motors like inside your vacuum, and other devices.Anything that is really a powered device,even handheld drills can cause electromagnetic interference.Now, to minimize EMI you need to install shielding around the source, for instance,your air conditioner lets off a lot of EMI.You could put shielding around that.Or you can shield the cable itself by choosing shielded twisted-pair.Now, STP cables, or shielded twisted-pair,have foil around either each twisted-pair in the cable or around the entire bundle of twisted-pairs to prevent emanations out of the cable or interference entering into the cable.STP gives you double benefit, it keeps things out, and it keeps things in.This is good for security and helps minimize this vulnerability.Now, the next vulnerability we have is called radio frequency interference, or RFI.RFI is just another type of interference like EMI.Like EMI it's a disturbance that can affect your electrical circuits,your devices, and your cables.But instead of being caused by electrical waves it's caused by radio waves.Most often from AM and FM transmission towers or cellular phone towers.Now, cell towers and radio towers near your office can be a big source of RFI in your wireless networks.And when you have a significant amount of RFI this can cause to network connectivity problems for your wired networks, as well as disturbing your wireless networks too.Now, this is something that you're going to have to address.And a lot of it is going to be addressed by shielding the building or getting stronger devices that can overcome the radio frequency interference that's occurring.Another vulnerability we have is what's known as crosstalk.Crosstalk occurs when a signal is transmitted on one copper wire, and it creates an undesired effect on another copper wire.So, when we think about having two copper wires,like inside of a twisted-pair cable,if the shielding inside that protects those wires comes off,then we can actually have crossover from one wire to another.And that causes interference because of the data emanations and EMI.Crosstalk is essentially that,but in very close proximity.Now, this becomes very common with older cable network types, things like Cat3 networks,or even some early Cat5 networks.Most of our Cat5E and Cat6A networks aren't really subject to crosstalk nearly as much.Another place is see crosstalk happen a lot is if you have punch-down blocks,and you decide to use an older terminal,like the old 66 blocks that were used for phone lines,and tried to use that for networks.Networks should always use a 110 block,like you learned back in Network because it gives more spacing and prevents crosstalk from occurring.The next thing you want to talk about here is STP cables because STP cables are really helpful to our networks.They can prevent some of that RFI, they can prevent EMI.And they can help with crosstalk.
Sappiamo che le reti locali a 10Gbps esistono già, e la logica ci porterebbe a pensare che il prossimo passo per le connessioni ad internet sia proprio quello ma probabilmente non sarà così.
It may not be as sexy as WiFi, but when you want speed and reliability, look no further than Cat5 cable. Jason Perlow and Jason Cipriani tell you how to take advantage of this cost-effective and fast networking tech. Learn more about your ad choices. Visit megaphone.fm/adchoices
https://filsingergamesfan.libsyn.com - Filsinger Games Fan Podcast for December 4, 2020. Your #1 source for all the latest news and discussion about the different Filsinger Games properties. Legends of Wrestling, Champions of the Galaxy and more! Video version available here - https://youtu.be/YL2kew3ASO4 Champions of the Galaxy COTG Prime - Torment & Category 5 Announced Women of the Indies 2020 Lainey Luck Announced Legends of Wrestling Manny Fernandez & Hillbilly Jim Announced Plus info on the set and more teasers QUESTION OF THE SHOW: Should Filsinger Games announce the entire roster of a set when pre-orders go live? SONG OF THE SHOW: U.S. Male by Classy Freddie Blassie AROUND THE CHANNEL none MORE ON THE UNCHARTED TERRITORY PODCAST HERE - https://anchor.fm/cory-olson5 MORE ON THE KING OF PRO WRESTLING PODCAST HERE - https://kopw72.podiant.co ©2020 Saturday Morning Media
After two failed attempts, we finally have our live Youtube stream consistent thanks to Thunder K, zapping a hard wire CAT5 cable into the dungeon. This week, we talk about adventures in early voting, the mystery that is my parents' house and how their AC is set up, and celebrating our dear friend, Susie Ramone's birthday. Shelly also goes into her weekly conspiracy about a wierd spherical ball that reacts to loud music and intern Alex gets a preliminary acceptance letter at University of North Texas. I asked him is he would see UNT anytime soon. Check out our friends: The Jerry Jonestown Massacre Fort Worth Famous Funkytownpodcast feat. Zack Cast Old Guys In A Garage The Bed Files Aquaboy Podcast
1. The Silence2. Summer Night3. The Minute4. Cat5. Waking Among the Dead6. Wandering7. Behind the Cloud8. Words From My Pen9. Moment With My Enemy10. The Flood11. The Silent
Wherein we are pre-gig on a Friday, and tomorrow is Thunder Storm Asthma Day. We discuss Wogs Out Of Work (allegedly an arse-face.) Also; DI’s having a messy life/time since holidays, too many things to do, Anxious is as Anxious does. And: DI’s yogurt stain, Kemper fail blues, the difference between Cat5 and Cat6, MB thinks his cat’s going bald, have you ever rubbed a sparse animal? Plus: “The Ráv Thomas Version”, Faux F*cks, MB’s under the weather with glandular stuff & 36 November gigs (doo dah), “a thing that Matt does”, touring musos, triple glazed. www.trcduo.com www.domitaliano.com www.mattbradshaw.com email: podcast@trcduo.com FB: Two Ring Circus FB: Matt Bradshaw FB: Dom Italiano Instagram: instagram.com/trcduo Twitter: twitter.com/trcduo
Punching down and testing cat5 cables is something that a lot of people struggle with understanding so today I'm going to talk about what the various category cables are, how to decide if you need A or B configuration, and how to check your terminations with a tester when you're done.
Punching down and testing cat5 cables is something that a lot of people struggle with understanding so today I'm going to talk about what the various category cables are, how to decide if you need A or B configuration, and how to check your terminations with a tester when you're done.
Highlights From This Episode…Handle change orders by presenting the facts and explaining why there is a cost associated with the request.Create new business by introducing yourself to customers already working with someone in case they need an alternative someday.How to do a good site survey is an important part of AV sales training.Sales teams need to respect engineering teams.The information Sales gives to engineering determines the success of a project.Don’t engineer without a budget.Say Cat X or structured cabling when speaking with IT (don’t say CAT5).For AV to become truly software-defined, devices need to commission themselves. See acast.com/privacy for privacy and opt-out information.
IT Manager Podcast (DE, german) - IT-Begriffe einfach und verständlich erklärt
Hallo und herzlich willkommen liebe IT Profis, zu einer neuen Folge des IT Manager Podcasts! Mein Name ist Ingo Lücker, schön, dass Sie wieder dabei sind! Heute dreht sich alles um das Thema: „Was ist eigentlich ein PoE?“ Die Abkürzung PoE steht für Power over Ethernet (PoE) und beschreibt ein Verfahren, mit dem vor allem Netzwerkgeräte, die wenig Strom verbrauchen, wie zum Beispiel IP-Kameras, IP-Telefone, kleine Hubs und WLAN Access Points (WAP) über das Ethernet-Kabel mit Strom und Daten versorgt werden. Das hat den großen Vorteil, dass ein einziges Kabel genügt, um die Strom- und Datenübertragung zu ermöglich. Dadurch können Anschaffungs-und Betriebskosten für zusätzliche Stromversorgungskabel eingespart werden. Außerdem lassen sich Netzwerkgeräte an Orten installieren, an denen keine Stromkabel vorgesehen sind. Durch die zentrale Stromverteilung über Switches werden auch keine externe Netzadapter oder Netzteile benötigt. Ein schöner Nebeneffekt: Weniger Kabel, weniger Kabelsalat. Wie funktioniert PoE also im Detail? Damit die Endgeräte mit Strom versorgt werden können, ist eine bestehende Datenverbindung Voraussetzung. Über diese Datenverbindung stellt das Power Sourcing Equipment (PSE), eine Komponente der PoE-Architektur, fest, ob die PoE-kompatiblen Netzwerkgeräte Strom benötigen. Diese Powered Devices (PD) werden über sogenannte Endspan-Devices wie zum Beispiel Switches, oder Midspan-Devices wie zum Beispiel Hubs mit Strom versorgt. Durch die ausgefeilte Schutzfunktion des PoE-Systems wird der Strom automatisch abgeschaltet, sobald zu viel Spannung übertragen wird und die Gefahr eines Kurzschlusses droht. So werden Schäden an den anhängenden Endgeräten verhindert. Wichtig ist es hierbei, dass alle Netzwerkgeräte im Vorfeld auf Tauglichkeit für PoE untersucht werden. Beim Resistive-Power-Directory-Verfahren, prüft die Stromquelle mithilfe einer speziellen Messschaltung den Innenwiderstand des angeschlossenen Endgeräts. Ist er hochohmig, liegt also im Bereich von etwa 20 bis 26 Kiloohm und überschreitet die Kapazität einen bestimmten Wert nicht, aktiviert die Stromquelle die Energieversorgung. In einem zweiten Messschritt ermittelt die Stromquelle die Leistungsklasse des Endgeräts. PoE-Leistungsklassen: Mögliche PoE Klassen sind die Klassen 0 bis 4. Je nachdem wie viel Strom ein Netzwerkgerät benötigt, ist es einer bestimmten Klasse zugewiesen. Dadurch kann die Stromquelle die richtige Menge an Energie bereitstellen und das Netzwerkgerät entsprechend versorgen. PoE-Standards: Neben den PoE Klassen wird PoE in unterschiedliche Standards unterteilt. Jeder Standard ermöglicht unterschiedliche maximale Leistungen. Diese unterschiedlichen Standards könnt ihr in unseren ShowNotes nachlesen. Beim IEEE 802.3af-2003-Standard werden Geräte mit bis zu 15,4 W (min. 44 Volt und 350 Milliampere) auf jedem Port versorgt. Allerdings sind hier nur 12,95 Watt garantiert, da ein gewisser Anteil bei der Übertragung verloren geht. Der neuere IEEE 802.3at-2009-Standard (auch bekannt als PoE+) bietet bis zu 25,5 Watt. Der IEEE 802.3bu (PoDL) ist vor allem für einpaarige Leitungen im industriellen Umfeld wie zum Beispiel in Fahrzeugen oder Produktionsmaschinen wichtig.Hier gibt es zehn Stufen von 5 bis 50 Watt. Der IEEE 802.3bt-Standard (4PPoE oder PoE++) stellt größere Kapazitäten bis zu 55 Watt (Level 3) und 100 Watt (Level 4) für die Stromversorgung bereit. Damit kann ein ganzer Arbeitsplatz mit Rechner, Bildschirm und Telefon über ein Ethernet-Kabel versorgt werden. Ein weiterer Punkt ist der, dass man vor der Installation die zusätzliche Erwärmung des Kabels berücksichtigen muss. Denn je mehr Strom durch das LAN-Kabel fließt, umso mehr Wärme wird durch den Widerstand erzeugt. Dies beeinträchtigt jedoch die Datenübertragung. Deshalb sollte im Vorfeld geklärt werden, welcher Belastung das Kabel standhalten muss und wie die Wärme des Kabels abfließen kann. Ein vorhandenes LAN mit Power over Ethernet aufzurüsten, ist kein großes Unterfangen und in der Regel preiswerter, als eine Steckdose von einem Elektriker installieren zu lassen. Außerdem kann man durch die PoE-Technologie nicht nur von einer stärkeren Stromversorgung, sondern auch schnellerer Datenübermittlung profitieren. Beim Einsatz von PoE sollte man beachten, dass es zu einer Verlustleistung kommt. Das heißt, je länger ein Netzwerkkabel ist, desto höher ist der Verlust zwischen maximaler Leistung am Port und maximal nutzbarer Leistung. Deshalb muss beim Kauf des Kabels schon auf den Aderquerschnitt geachtet werden, der nicht über einem AWG-Wert von 24 liegen sollte (CAT5).
YouTube is a strange CV but it worked and got me my first proper job at Realm Pictures working alongside an amazing team and doing something I absolutely loved...crawling through the dirt laying CAT5 internet cable in the early hours of the morning for alien space zombies to be streamed live across the Twittersphere.
Discussing how home technology tariffs affect the industry, the big PoE fight, and how 4K is everywhere and nowhere. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Discussing how home technology tariffs affect the industry, the big PoE fight, and how 4K is everywhere and nowhere.
Discussing how home technology tariffs affect the industry, the big PoE fight, and how 4K is everywhere and nowhere.
XENTAVO founder and CEO and all-round cryptofinance expert Robert Koenig joins the Cat5 team to explain (in terms we understand) what the blockchain is, how cryptocurrency generates money, and what the financial future holds. Read the complete show notes, comment or rate this episode, view pictures and obtain links from this episode at https://category5.tv/shows/technology/episode/551/ Running time: 1 Hour 11 Minutes 12 Seconds
With all the tech gizmos and gadgets that are going to find their way under the tree this year, the Cat5 crew wants you to be ready - with batteries, and innovative ways to charge your devices. Read the complete show notes, comment or rate this episode, view pictures and obtain links from this episode at https://category5.tv/shows/technology/episode/533/ Running time: 1 Hour 6 Minutes 16 Seconds
AT028 Hurricane Harvey Update and Tips for New Adjusters We are nearly a week into the destruction caused by the CAT5 hurricane - Hurricane Harvey - that impacted residents throughout Texas this month. The catastrophe and destruction caused by the hurricane has significantly impacted millions of people, causing wind and water damage across millions of homes. On today’s episode, I’m sharing an update regarding Hurricane Harvey and the devastation it has left in its wake. I’ll share my predictions on how this storm will impact the insurance adjusting industry overall as well as tips for new adjusters working in the field. I’ll also share strategies to help you settle your first Hurricane Harvey claim, ways to stay organized and productive, and the importance of being empathetic and doing your part to help those affected by the storm - even if you haven’t been deployed yet. “Start dissecting your claims early.” - Jason Heenan In This Episode of Adjuster Talk: An update on Hurricane Harvey. How we prepared for the mega-storm. Why new adjusters should lean on their support system while in the field. The importance of conducting follow-up phone calls with the insurers. Tips for closing your first claim during Hurricane Harvey. Avoiding the “snowball effect” that often leads new adjusters to quit. Creating a checklist of what you need to do for each claim to stay productive and organized. The importance of avoiding overscheduling claims. The importance of understanding insurance policies. The impact of showing homeowners the photos you took while onsite. The importance of showing empathy to homeowners and how you can lend support even if you’re not deployed. Connect. Share. Inspire. Thanks for tuning in to the Adjuster Talk podcast with your host, Jason Heenan! If you enjoyed today’s episode, please head over to iTunes to subscribe to the show and leave an honest review. You can also connect with us on Facebook, Twitter, Instagram, and YouTube. If you’re interested in working with us, please feel free to email Jason at jheenan@royaladjustingservices.com or Mindy at mindy@royaladjustingservices.com with your resume to apply to be on our approved adjuster roster today!
On this episode of the show Stuart and Ali are joined by special guest Kevin Beimers from Italic Pig for a chat about pitching games, working on multiple projects, the current state of the mobile market, their current game Mona Lisa, and running Cat5 cabling around the outside of the 73rd floor of the Empire State Building. For more information about this episode you can visit the LGR blog at www.lapsedgamer.com where you can also find our contact details and links to additional content. The Lapsed Gamer Radio Team created this episode. Edited by Stuart Neill Original LGR themes, FX and music cues created and composed by Cevin Moore. You can stream or directly download our episodes via our Podbean homepage http://lapsedgamerradio.podbean.com If you’re enjoying our content, please subscribe to and review Lapsed Gamer Radio on iTunes. FREE GAMES: Our ongoing LGR community free game codes giveaway can be found here (enter your email or Twitter next to the game you would like): https://drive.google.com/open?id=1HTHbVerYJ2PF1gTcDMmBL24HeuIrN67896Ncn3R_1l4 We welcome any spare codes you may have and are willing to give to the LGR community. Let us know and we’ll add them to this list. “You spin me right round, baby”
Layered security refers to the practice of combining various security defenses to protect the entire system against threats. The idea is that if one layer fails, there are other functioning security components that are still in place to thwart threats. In this episode of the Inside Out Security Show, we discuss the various security layers. Human Physical Endpoint Network Application Data Cindy: Hi and welcome to another edition of The Inside Out Security Show. I’m Cindy Ng, a writer for Varonis’ Inside Out Security Blog, and as always, I’m joined by security experts, Mike Buckbee and Kilian Englert. Hi, Kilian. Kilian. Hi, Cindy. Cindy: Hey, Mike. Mike: Hey, Cindy. You call us security experts. I’m actually, where I don’t know if you can see it, “I have a fake internet job”…because I still haven’t been able to explain my job to my mom and dad. “He does something.” Human Cindy: We’ll see who’s most fake at the end, okay? So recently, Rob wrote a layered security guide and I thought it would be interesting for us to go through each of the layers and share stories that we’ve read or heard as it relates to each of the layers. The idea with layered security is that you want to make sure that you have many different layers of defense that will protect you. If there are any holes, just in case something gets in, you might have a security layer that serves as a backup that will catch it. So the first layer to start is the human layer. So that layer is all about educating people to spot scams and be cautious about the passwords that they give out, their social security numbers that they give out, their credit card information. This layer, Kilian, you talk about this a lot. I feel like, increasingly, criminals are using and exploiting services that we rely on and turning it into like an attack vector, like there is an article recently about people texting you pretending to be Google and saying, “Hey, there was this suspicious attempt to get it in.” And we talked about passwords and alternatives and using two factor and it’s kind of like, “Oh man, I have to check my text messages and make sure I’m not scammed again,” like another thing to worry about. Kilian: Oh, yeah. People, by nature, want to be trusting of other people. We kind of have been trained since day one to feel kind of bad about being suspicious … The bad guys out there know this and they exploit it. It’s so much easier to go after a person and just kind of play off of emotions because they’re far more malleable than a system, and people often are not trained or educated around security practices. And even if they are, they’re kind of trained into a certain mindset. So if they see something that looks semi-legitimate like, “Hey, a text from Google. Oh, they’re protecting me. They have my login name or my IP address or something, NIC address,” because most people are not going to investigate that closely, it’s going to look fairly legitimate like, “Oh, hey, Google’s looking out for me. This is great.” It’s very easy to, just with a little bit of a legitimacy, to get people to kind of go along with it and it’s…the con of that sort is as old as time basically and it’s only getting easier any more, too. Mike: I’ll go with something that you said Kilian, which is that it’s really about our mindset. And I think from a security practitioners’ standpoint, we’re typically very focused on exploited time and this and do this things and so we forget a lot about on the human layer which is education and like how to educate your users and to help make them part of your line of defense. I think a fun activity for that is actually to do phishing, and there is a couple of companies that do this, that do like fake phishing attacks, and then basically, so I go, “You clicked on this so we are reporting you to IT.” And it’s kind of almost like in hospitals where they like shame the doctors into making sure they wash their hands all the time. You’re kind of like trying to enforce this IT hygiene aspects on all of your users, and either hire a company or you have some free time, you can just try to phish your users individually to mess with them. Kilian: Sure. Physical Cindy: Our next layer is the physical layer , and you know, I would be like the worst security person to hire because I wanted to skip talking about this layer. There are so many layers and Mike’s like, “Why aren’t we talking about it? It’s the most important one.” And Kilian is like, “It’s often overlooked.” And I said, “It’s just the physical layer, like everybody gets that.” Tell us a little bit more about the physical layer. Kilian: I guess I’ll jump in. It is so often overlooked. We worry about firewalling the data off to protect from external attacks and stuffs that come in over the wire. But how many times in businesses do people check badges? You can walk into a corporation. If the guy sitting at the desk is distracted for a minute, and then you’re inside and nobody looks twice at you. If the doors aren’t locked in the server room, you walk in, plug in a USB device. Basically, once you have physical access to something, it’s game over. There’s no other layer of security that they probably can’t get around at that point. And we rely so much on just kind of observing people and we put a lot of faith in locks, too, like physical key locks. They’re such a terrible false layer of security. Most front door locks or bike locks or anything else are easily defeated within seconds. The physical layer is often overlooked but it’s such a false layer of security, too, that we know we have somebody watching the door. Because again, we are relying on people and people want to be trusting. Mike: What I was going to mention with respect of the physical layer was I think a lot of things are changing. So businesses are much more just personnel, lots more different, just physical branches, places, people working from all sorts of different remote situations, as well as it used to be everything was hard wired, and now, most every place has WiFi. And so you have this very different situation of like everyone in the office walking in with the WiFi radio that’s connected to the internet. But we don’t think about that. We just like, oh, we are on our cellphones, but if there’s malware on there that potentially perform an attack or some form of disruption. There are some real interesting exploit tools that basically do things like DHCP exhaustion on a network and so you have to do things like MAC filtering. I worked on a high security environment on the military. They have things like if you unplug a computer from the wall from the CAT5 and plug it back in, it won’t let it back on the network as it lost the MAC connection. You can’t just bring a laptop in and plug it into the Ethernet port in the waiting room. Things like that, like very good sensible suggestions. Cindy: I just had a paranoid thought that when I go home, I want to like install 10 locks, put on a password, and I need somehow to after-authenticate myself to get in. So in terms of a business security, like can you go overboard in terms of putting like a trillion locks on something? And then what’s kind of a good balance for an extreme paranoia or paranoid person like me? Kilian: I’ll get dogs with bees in their mouth so when they bark, they shoot bees at you. Mike: From a business standpoint, I think the biggest thing is actually more procedures, procedures around access to servers, access to changes, that kind of thing. And then from there, the procedures are implemented that helps with the recognition of what’s a threat and what isn’t. On a personal level, something that I’ve been seeing a lot more in terms of physical stuff is skimmers on ATMs. That’s probably like we were talking like a personal sort of physical attack. That’s probably the big one, that every ATM you go to, you sort of want to tap at the card holder to see if it falls off because it’s so easy to put a skimmer on. Kilian: That kind of distilled… it’s situational awareness, kind of being observant of the people and things around you, what you’re interacting with. Endpoint Cindy: Another thing we need to be alert and aware of are endpoints – protecting devices, PCs, laptops, mobile devices, from malicious softwares. People really like using endpoint protections to guard against a ransomware, and people’s found out it’s not really effective. But if it’s not ransomware, malware can really sit on your system for like six months before it’s even identified. But people also really want to protect their endpoints. What are your response and thoughts on this? Mike: I’ll go. I guess my first thought is we’re talking about layered security, and so no solution is going to be a homerun 100% of the time. And so what we are really trying to work on is percentages, reducing the surface area we can be attacked on, reducing the opportunities for an exploit. An endpoint security can certainly be part of that but it’s not a complete solution. But by limiting the types of apps that can be run, the type of traffic that can come in, it’s a way of helping to manage that risk. And that’s what we’re talking about with all layers, is how can we manage risk at all this different layers? And hopefully by doing that simultaneously at all the layers, we really improve our security much more than if we thought, “Okay, it’s just endpoint security or it’s just doing training of the users.” Kilian: The way I would think about it, too, is if you ever see the machines for like looking for gold or sifting rocks, like you have the different size of screens. Endpoint protection antivirus, I would think, is like the biggest size of screen. It’s gonna get like the bigger rocks out, so the kind of most obvious, most basic vulnerabilities. And kind of, as you go through and sift out the different pieces, that’s exactly what it is. You can just, multiple layers, sift out different things that one might not catch until you get it. And then just good patch management, too, on endpoints and servers, things like that. If you leave vulnerabilities that have been patched for 10 years on your system, that’s kind of inviting trouble in a lot of ways. But then people often overlook it. Mike: Those are the big holes in your screens as your trying to through all the data and everything is falling through these unpatched systems. Cindy: But there are a whole bunch of alerts. People get thousands of them, like daily and weekly. That’s another annoyance. You can’t actually check thousands of alerts every day. Mike: And for all this sort of systems that monitor the things, all the vendors, us included, are trying to…people talk about alert fatigue. If you get an alert every 10 minutes, like, “Oh, something’s happening, something’s happening,” like you just cease to care about. It’s not something that actually needs responded to or thought about. So there’s a lot of work with like machine learning, better filtering, and better tracking on how to handle that to reduce that amount of alert fatigue. But you’re absolutely right, Cindy. Cindy: And also make alerts that are really worth alerting on so that you’re not like, “Oh my God, my blood pressure is increasing,” and then you end up in the hospital or something. Mike: What kinds of alerts are you getting? Network Cindy: No, listen, it’s not me. I’m just hearing all these stories when I go to conferences and I go, “If I had that many alerts, I will just be like…ahhhhh! Watch out for the crazy woman.” So another layer we should talk about is network security. I’m thinking firewalls, intrusion prevention, detection system, VPNs. And I was kind of tricked to read an article that says “Utility board hears about network security.” And I was like, “Oh, they’re really serious about network security.” Like, “What about the other stuff?” So I went through and I read it. I clicked on it and I read it and they take security seriously. Like in the article, the IT director talked about network security. He made references to all those different layers that we’re talking about so far. And he made the analogy of a Swiss cheese as security and you put layers upon layers of them and said, “That even then with all the layers of cheese, a small hole, so a small hole in your security can be catastrophic.” And I thought it was just really great that they’re talking about it. And further on in that article, it mentioned that a board member requested that presentation because he had heard about a utility at a utilities conference that there was a hacking of an electrical system in Colorado. So we hear a lot about things that go wrong in companies and they’re not doing anything about it. But I really liked that they’re saying, “Hey, I’m protecting our utilities network.” And it’s a great way to get more of like security funding, too, because security systems are expensive, like whether it’s network. Even if it’s like a $200 thing, you still have to be like, why do you need this, and explain. So back to network security, the talk that they had, presentation they had, it’s a great way to just get money like, say, there is an article in Rob’s layered security guide about “ What’s the difference between a $1000 one and a $200 one?” Mike: For a firewall, you’re talking about? Cindy: For a fire…yeah. I went on a tangent. I think someone… Kilian: I mean, you brought up an interesting point. That article, I thought, was really kind of fascinating because the one thing that kind of really, if I can pick one thing a security thing that scare me on a daily basis, it’s a lot of this, like command and control type, or not command and control but the SCADA systems or the industrial control systems that run a lot of our infrastructure. And back to the unpatched systems, these things are from the whatever, ’80s, ’90s, that they said, “Oh, well, hey, we can monitor whatever, our damn controls online, stick it on a network with an IP address,” and then it controls kind of a vital piece of infrastructure, like something in the physical world that can cause a lot of damage. Or the controls at the electrical system, you can wipe out power and that will cause a lot of problems in the physical world. Network security is, again, one of the critical layers. Again, if you have to connect it to a network, at least run it through something. You still need the defense and depth across the whole board, but that’s kind of the first line of defense for a kind of network connected systems. Mike: The only other thing I was going to mention is that I think a lot of times, people think of network, especially with from a lot of employees, it’s like, “We need VPNs for very everyone. We have VPNs for everyone. We’ll be protected.” But you have to remember that also, it’s sort of like punching a hole in your firewall because VPN, it’s like making a home computer as if it was on your network, and all the ensuing issues that that can cause. Kilian: And then we can tie it right back to physical security then. On your VPN at Starbucks, you walk away for a few minutes, someone walks up, plugs something in, or you don’t lock your laptop, then the internal network’s compromised. Mike: I know for sure there has been multiple reports on people getting ransomware on their networks from, like someone at home and they get like an infection, they bring it to the IT group. Like, “Oh, Bill in IT, he’ll help me out. He’s always such a nice guy.” They bring it in. Like, “You look at this real quick? It’s real weird.” “All right, let’s plug it in the network.” And, boom, the network is now infected with ransomware. Good intentions gone awry. Application Cindy: Oh my God, I’m so scared that whenever you guys just share stories and I get like extra, extra scared. Okay, the next two on application security , that, there’s a lot to talk about in that one. I wrote a blog post about it, that our IT people won’t let me install anything on my computer. When we talk about application security, it refers to the testing and doing the work to make sure apps work as they should. But there are some drawbacks to that, which is why IT won’t let me install anything, and I have to get permission. I have to tell them why. That, I understand it’s a dangerous world out there. What are some things about application security that we need to be worried about or concerned about? Mike: Most companies, they have a mix of things. They have a mix of applications they built in-house, third party systems that they bought off-commercial, off-the-shelves of, or cut software, and then now, sort of cloud systems. We joke about cloud doesn’t exist, It’s just other people’s computers. It’s just other people…our software are running other people’s computers or software as a service type application. There’s different considerations for each of those. I think, across the board, one of the things to really think about for all of this is single sign-on, that the procedures for provisioning access to this and then removing it as people’s role change or as they come into or leave the company is incredibly important. And if it is one place where that’s most often missed, it’s in those kind of things where…I use to work at a company. I won’t say the name of it. But there phone system was separate from everything else and so that a salesperson that left, removed all their computer access, left them with their phone access, and they changed their outgoing voicemail, which for months, was just a harangue against the company, and like what blood-sucking horrible people they were and how unprofessional and incompetent. And it stayed that way for months as people called in to talk to this salesperson he was known over there. But that can happen anywhere, with timesheets software, that can happen with reporting software, the project management software. All of these things can exist somewhere on the spectrum. And without that single sign-on and really strict procedures, it’s very difficult to control. Kilian: Just kind of a little bit of side, too, as we’re developing more software and it gets more complex and we expect more out of it, that just increases the chance that there’s going to be a bug and it’s a guarantee that every piece of software you run is going to have some type of issue or bug in it. Again, especially as the citizens gets more complex and more interconnected. So it’s being cognizant of that and, again, we’ll go back to a couple of topics ago, is good patch management, making sure that the bugs are reported and then the software vendors you deal with take it seriously and patch it eventually, or soon rather than eventually. Data Cindy: And the next layer on the data layer , we talk about that a lot. I think it’s the crown jewels. We want to make sure that our health data isn’t stolen, our PCI data isn’t stolen. People are really…you hear it often in every kind of podcast or show that you hear. You kind of expect data breaches to happen. People are really hurt that that’s happening. “Oh, they’re not doing enough.” But the reality is data security is tough. What are your thoughts about this layer? Mike: We, at Varonis, we deal with structured data. Structured data, for the most part, falls under application security, so that structured data is anything that’s in the database, typically in the accesses, typically mitigated and arranged and managed through an application. I just want to make sure there isn’t direct database access somehow through the network where I exploit tools. But for the most part, that’s fairly sane. Our niche is the unstructured world which is the files and where typically, what we see is the end results of all the structured data. So the structured data is the giant Oracle database that says like, “Yes, we should actually acquire this company,” and then the unstructured is the Powerpoint that says, “We’ll do this next Monday.” And that got out, has huge implications for stock price, and Sarbanes-Oxley, and reporting, and governance, and all these things. So there’s different risks involved with those. Kilian: The thing about the unstructured data is that, there’s so much of it and it just grows so constantly. Every second of every day, at every business, somebody is putting some type of information out, sending an email, writing a document, editing a Powerpoint, any of this stuff. It’s just constant and that’s how businesses evolve and get better because they share information. They just keep producing and producing and producing it and it never seems to go anywhere. It’s like the internet never forgets. Well, your data center never forgets either. The project might be forgotten but it’s still out there somewhere, the Sharepoint site. All this team collaboration is over but it’s still up there and contains a lot of information. There’s some life cycle information on that. But things like social security numbers, those never change. There might be or there is an age on credit card information, but it’s still fairly long, several years, depending on how long it’s out there. The life cycle of this data is often overlooked and you expose yourself to a lot of risk because it ends up…again, it’s created for some legitimate reason and it’s out there for some legitimate reason, but it’s forgotten about or it’s not dealt with or disposed or even secured properly. Cindy: So to kind of wrap up, you both shared stories that I’m just like, “Oh, it’s nerve-racking,” but the overall goal is security. So we make sure we educate the people. We make sure that they don’t have access to stuff that they don’t need. We make sure they don’t get in. We make sure we protect ourselves from malware, make sure we protect our data, make sure that apps are working properly. What are some kind of wrap-up conclusions or things that I’ve missed that you want to share your thoughts on? Mike: I think we should go back to your Swiss cheese sandwich metaphor because honestly, I think it’s actually viable because the big challenge of all this is communicating this to people who are not in our business, it’s communicating it to the executives and to the users that we need to deal with. And so we say exactly that, but it’s like stacking a lot of pieces of Swiss cheese, and the more layers we have, the fewer holes there are, the less vulnerable we are. It’s a very easy to understand metaphor. Hopefully, they are lactose intolerant. But I think that is really the case. The more layers we have and the more all these things work together, the safer we are. That’s like an old powerful thing. Cindy : Kilian, do you have any last thoughts? Kilian: No, I like the metaphor. I think it’s great. I have other metaphors I use for thinking about security, but the Swiss cheese one, I think, is very visually pleasing. I guess it’s something people can recognize. Cindy: That is from the IT director in Nebraska. Like maybe he’ll listen to our podcast or join our show. Mike: I thought we decided we’re just going to start sending packets of sliced Swiss cheese to all our customers… “Stack this together until you’re secured.” Cindy: Make sure your bad guys don’t go in. Our Parting Gift Cindy: So to wrap up, our parting gift, what are some things people should check out? For me, I’m pivoting to something else. Back to our show last week, we talked about the EU’s general data protection regulation. We just published on our blog an infographic. So if you do not want to read long texts, Andy and I, we created a really informative infographic describing consumer rights, as well as obligations companies have to the consumers. So head over to our blog and check it out. Mike, do you have any parting gifts for our listeners and viewers? Mike: I was going to recommend; I was going to say I just looked at the infographics you’re talking about. It’s at blog.varonis.com, and I think it really is great. And we’re talking about educating other people, it is the perfect thing, that if you are an IT, to send to an executive or to send to some stakeholder on your company to try to get help get their minds in the right place for dealing with the new regulations. My suggestion for a parting gift was going to be a game, actually. It’s called Hack Net. It’s probably one of the few games you could get expense by your company. It looks so much like one of those, like in the movies when they’re like hacking into a system and it has everything scrolling and doing stuff. So it’s the simulation of that but it covers actual exploits, the concepts of how they are exploited, what is done. So it’s very educational but super fun to run through and has a little scenario and you actually hack into all these different systems. It’s called Hack Net. And right now, it’s $10. But I mentioned it last week, during this…summer sale, I think we’re going $5. But it’s very cool and interesting. And if you’re interested in this as a general topic, I know we have a lot of people on the IT side and not necessarily like security pentesting side, it’s a great way to really like deeply understand all those concepts. So, cool, check it out. Cindy: Cool, thanks. Kilian, do you have a parting gift? Kilian: Actually, what Mike was saying just reminded me of something. The other week, I was in Uber. I was taking a ride to the airport or train station or somewhere, and on the screen, they popped up a little thing like, “Hey, code while you go,” or something like that. And they gave you like little snippets of code and they wanted you to find the error in the code. And I thought it was a really, you know, crowdsourcing something, information, maybe for a potential job offer. But I just thought it was really interesting they were kind of doing this little application security type of initiative within the app itself like while you’re on the trip. I don’t know if the pops are for everybody but I saw it. I thought it was interesting to look at while I was on my ride. Mike: Are you saying you got a job offer from Uber? You’re leaving Varonis? You figured it out? Kilian: The next time you’ll see me with my dash cam and my car driving around. Mike: Oh, man… Cindy: Kilian might be doing both. He might be driving and working at Varonis. You never know because you know he’s fake. Thanks so much, Mike and Kilian, and all our listeners and viewers for joining us today. If you want to follow us on twitter and see what we’re doing or tell us who’s most fake on the show, you can find us @varonis, V-A-R-O-N-I-S. And if you want to subscribe to this podcast, you can go to iTunes and search for The Inside Out Security Show. There is a video version of this on Youtube that you can subscribe to on the Varonis channel. So thanks, and we’ll see you again next week. Mike: Thanks, Cindy. Kilian: Thanks, Cindy. Cindy: Thanks, Mike. Thanks, Kilian. Subscribe Now Join us Thursdays at 1:30ET for the Live show on Youtube, or use one of the links below to add us to your favorite podcasting app. iTunes Android RSS The post Layered Security – IOSS 14 appeared first on Varonis Blog.
Whether it's over HDMI, CAT5/6 or even wireless - Vanco International has a IT transmission solutions for everyone. All available at Markertek.com!
Patrick interviews several female professors about their career paths. Afterwards, Patrick, Scott, and Josh talk about new Apple products, snaggeless Cat5 cable snafus, and DarkHotel. Feedback @TalkonTechMCTC or email talkontech@gmail.com
This week Dave and Gunnar talk about: airlines meeting security researchers, Firefox meeting advertisers, FitBit meeting dogs, Roomba meeting Orwell. So I was in a local trolleybus earlier today, fiddling with the in-bus entertainment system. pic.twitter.com/qZ0d3Y6Q9r — Martijn Grooten (@martijn_grooten) May 16, 2015 Feds Say That Banned Researcher Commandeered a Plane Swedish Chamber of Commerce would appreciate you spending some time with Gripen. Meanwhile: United Will Reward People Who Flag Security Flaws—Sort Of Uber continues to be deplorable. That self-driving car partnership with CMU? More like a poaching vehicle. Robot Hall of Fame Firefox wants to optimize your ad experience: Firefox Will Soon Get Sponsored Suggested Tiles Based On Your Browsing History Screengrab Researchers want to optimize your Firefox experience: Firefox’s optional Tracking Protection reduces load time for top news sites by 44% MiBand for $15 Ingrid’s plant gadgets Planet Money on Xiaomi OpenBand open source Android app for MiBand Fitbit meets dog collar: DogTelligent Optimizing your vacuum drone experience: The Next Roomba May Recognize All Your Crap Palate cleanser: Video of cat wearing shark costume riding Roomba The Open Organization by Jim Whitehurst Watch FICO gush about how awesome OpenShift is Slack as memo-list Cutting Room Floor HT Robin Price: Learn Vim the Web 2.0 way with OpenVIM 14 of the Most Depressing Place Names in North America Don Draper reviews children’s books Mad Men in the 21st century New Seinfeld episode! Fira Code font includes programming ligatures We Give Thanks Robin Price for the VIM tip!
A review of ecommerce sales for 2011 is the topic of our interview today. We are joined by an ecommerce entrepreneur and pioneer who will share his company’s experience. He’s Chad Weinman, CEO of Cat5 Commerce, which operates 10 separate ecommerce stores — including RunningShoes.com and TacticalGear.com — from its base in Missouri. He speaks with Practical Ecommerce’s Kerry Murdock.
Host: Tim Albright AVNation Founder Guests: Sara Abrons, George Tucker, Michael Drainer, Joel Rollins, and Bill Brown. Record Date: 8/06/2012 What a great way to spend our 1st Anniversary show. We discuss the Olympics and AV, why you are still using Cat5, and the next generation of networking for live events. Leviton bought HAI; now what does [...]
Host: Tim Albright AVNation Founder Guests: Sara Abrons, George Tucker, Michael Drainer, Joel Rollins, and Bill Brown. Record Date: 8/06/2012 What a great way to spend our 1st Anniversary show. We discuss the Olympics and AV, why you are still using Cat5, and the next generation of networking for live events. Leviton bought HAI; now what does [...]
Markertek News Channel coverage of the DigiTOOLS HD over CAT5 System from Kramer at NAB 2008.