On COI #281, Kyle Anzalone and Connor Freeman cover the Democrats' lockstep anti-Russia hawkishness, the Blob's refusal to hit the brakes, and the next target: China. Connor breaks down hist latest column for the Libertarian Institute, the article discusses the Washington Blob's insistence that Moscow's repeated warnings regarding NATO's proxy war potentially turning nuclear soon are mere bluffs. This pattern of refusing to heed the Russian admonishments while sabotaging bilateral diplomacy only to increase weapons aid, intelligence sharing, and sanctions will inevitably lead to direct conflict between Washington and Moscow. Before the war began, Senators, CIA, DOD, NATO, and Biden officials could be heard salivating in public statements and in newspapers about their desire to kill Russians in a drawn out, proxy war. As this war goes on, senior American officials brag in major newspapers and outlets that their battlefield intelligence provided to Kev indeed is being used to kill Russian Generals and soldiers. There is also statements from Ukrainian officials that indicate the U.S. is preparing plans to destroy Russia's Black Sea fleet. According to recent reporting by James Carden, despite Biden's assurances of “no boots on the ground,” there may already be U.S. paramilitary forces deployed as well. Connor notes some of the parallels with recent developments and tensions between the U.S. and China particularly with respect to the Taiwan issue. Washington seems intent on crossing every last redline the Russians and the Chinese draw, imperiling us all. Odysee Rumble Donate LBRY Credits bTTEiLoteVdMbLS7YqDVSZyjEY1eMgW7CP Donate Bitcoin 36PP4kT28jjUZcL44dXDonFwrVVDHntsrk Donate Bitcoin Cash Qp6gznu4xm97cj7j9vqepqxcfuctq2exvvqu7aamz6 Patreon Subscribe Star YouTube Facebook Twitter MeWe Apple Podcast Amazon Music Google Podcasts Spotify iHeart Radio Support Our Sponsor Visit Paloma Verde and use code PEACE for 20% off our CBD
On COI #281, Kyle Anzalone and Connor Freeman cover the Democrats' lockstep anti-Russia hawkishness, the Blob's refusal to hit the brakes, and the next target: China. Connor breaks down hist latest column for the Libertarian Institute, the article discusses the Washington Blob's insistence that Moscow's repeated warnings regarding NATO's proxy war potentially turning nuclear soon are mere bluffs. This pattern of refusing to heed the Russian admonishments while sabotaging bilateral diplomacy only to increase weapons aid, intelligence sharing, and sanctions will inevitably lead to direct conflict between Washington and Moscow. Before the war began, Senators, CIA, DOD, NATO, and Biden officials could be heard salivating in public statements and in newspapers about their desire to kill Russians in a drawn out, proxy war. As this war goes on, senior American officials brag in major newspapers and outlets that their battlefield intelligence provided to Kev indeed is being used to kill Russian Generals and soldiers. There is also statements from Ukrainian officials that indicate the U.S. is preparing plans to destroy Russia's Black Sea fleet. According to recent reporting by James Carden, despite Biden's assurances of “no boots on the ground,” there may already be U.S. paramilitary forces deployed as well. Connor notes some of the parallels with recent developments and tensions between the U.S. and China particularly with respect to the Taiwan issue. Washington seems intent on crossing every last redline the Russians and the Chinese draw, imperiling us all.
On this episode, we talked about: Taking back control of my mind Guys shut down their emotions Your whole body is your mind Visualize how to do different things Learning how to meditate Breath, concentrate, meditate and breath again How to visualize success and have micro-goals Having more compassion and understanding Being compassionate to yourself and to others Having a balanced approached to life Balancing the yin and the yang Recognition of your intuition Slowing down and looking within Training the mind through training the body Having creativity and innovation Developing mental toughness in our life "When you meditate, you train your mind and part of your mind is your emotional body-mind" "I went from "Mark wants to be a navy seal to Mark is a navy seal", I went from desire to certainty" "I think you have to have the hard and the soft, the yin and the yang, and a balanced approach is the enduring approach" About Mark: Mark is a highly sought after speaker, coach, author and makes frequent media appearances to discuss Seal's way of life Mark Divine is from upstate New York with a degree in economics from Colgate University and an MBA in Finance from New York University Stern School of Business. Mark's first career was with Coopers & Lybrand (now PriceWaterhouse Coopers) as a Certified Public Accountant. Clients included luminous financial firms such as Solomon Brothers and Paine Weber. Four years after joining Coopers, Mark left behind the corporate world to pursue his vision to become an elite Navy SEAL officer. At 26 he graduated as honor-man (#1 ranked trainee) of his SEAL BUD/s class number 170. Mark served for nine years total on Active Duty and eleven as a Reserve SEAL, retiring as Commander in 2011. Mark embarked on his third career as an entrepreneur in 1996 by co-founding the successful Coronado Brewing Company (CBC) and founding the web e-commerce site www.NavySEALs.com. He later sold his interest in CBC, but continues to run NavySEALs.com as the leading website for gear and information about the SEALs. In 2006 he launched US Tactical, a government contracting business where he gained contracts with Naval Special Warfare Group ONE for training support and with the Navy Recruiting Command for a nationwide mentoring program for SEAL trainees. This latter program was credited with increasing the quality of Navy SEAL candidates and reducing the attrition rate at BUD/s by up to 5% and was the inspiration for SEALFIT. Mark was an adjunct professor of leadership at the University of San Diego, where he left a Ph.D. program due to the Iraq war Reserve call-up. In Baghdad with the SEALs again in 2004, he conducted a special study for the DOD on the role of the USMC in the Special Operations Community. Upon return home, he decided to focus fully on his business and family. Mark is an accomplished martial artist with black belts in Seido and Goju Ryu Karate, a military hand-to-hand combat certification in SCARS and senior ranking in Saito Ninjutsu. He is a teacher trained in Ashtanga Yoga, and created the innovative Unbeatable Warrior Yoga program taught to his students. After working with thousands of special ops candidates and professionals developing mental toughness, Mark self-published his first book Unbeatable Mind in 2011 and launched the at-home study program www.unbeatablemind.com. He is also the author of The Way of the SEAL published by Readers Digest and 8 Weeks to SEALFIT published by St. Martins Press. SEALFIT is uniquely effective at developing elite-level physical fitness and mental toughness. The program has helped thousands to operate at an entirely new level in their personal and professional lives and is used by military, first responders and sheepdog-like professionals of all stripes worldwide. Mark is a highly sought-after speaker for corporations where his Unbeatable Mind program is helping to forge mental toughness among business leaders. He lives in Encinitas, CA., several blocks from the SEALFIT Training Center, the 20,000 square foot facility where he enjoys training with his family and team. You can follow and support Mark at: Web: https://unbeatablemind.com/ IG: @realmarkdivine Podcast: The Mark Divine Show Let's connect over on Instagram: @Johnny.Elsasser
Today, we are running a special episode of Business Breakdowns. With geopolitics playing an increasingly important role in society again, this episode with Anduril's CEO offers an inside look at the state of the defense industry and how it is changing. If you enjoy this episode, subscribe to Business Breakdowns on your preferred podcast player, where you'll find past episodes on Block, Goldman Sachs, AutoZone and many others. Today, we are breaking down Anduril. Anduril builds high tech defense systems for the US Department of Defense and its allies. Crucially, it does so with speed that emanates from Silicon Valley. Founded in 2017 by Palmer Luckey, who previously built and sold Oculus to Facebook, Anduril has achieved the rare feat of challenging the established order in the defense industry. To break down Anduril, I'm joined by the company's CEO and co-founder, Brian Schimpf. We discuss the history of the defense industry, how Anduril's business is counter positioned against the legacy cost-plus model, and what Brian has learned about selling to the DoD. Please enjoy this breakdown of Anduril. For the full show notes, transcript, and links to mentioned content, check out the episode page here. ----- This episode is brought to you by Tegus. Tegus is the new digital hub for market intelligence. The Tegus platform empowers Investors and Corporate Development teams to invest smarter by pairing best-in-class technology with the highest quality user-generated content and data. Find out why a majority of the top firms are using Tegus on a daily basis. If you're ready to go deeper on any company and you appreciate the value of primary research, head to tegus.co/breakdowns for a free trial. ----- This episode is brought to you by Daloopa. Daloopa streamlines a major pain point for investors. By capturing all of a company's KPIs and adjusted financials into their database - Daloopa makes it easy to quickly update your models for what matters. Daloopa uses AI to find every KPI disclosed - from charts, to text, and even from footnotes of investor presentations. Daloopa updates these KPIs and data points in your existing Excel models in one click, regardless of your source or format. Test Daloopa for free at daloopa.com/Patrick. ----- Business Breakdowns is a property of Colossus, LLC. For more episodes of Business Breakdowns, visit joincolossus.com/episodes. Stay up to date on all our podcasts by signing up to Colossus Weekly, our quick dive every Sunday highlighting the top business and investing concepts from our podcasts and the best of what we read that week. Sign up here. Follow us on Twitter: @JoinColossus | @patrick_oshag | @jspujji | @zbfuss Show Notes [00:02:52] - [First question] - The history of defense technology and the technological and competitive landscape when he set out to build Anduril [00:08:22] - What the early experience was like when approaching the government and finding an early adopter [00:12:44] - Necessity being the mother of invention when it came to developing drones [00:16:37] - What it's like to develop hardware and software products at the same time [00:20:26] - How the defense business complex works economically and overview of the detailed cost plus model [00:24:44] - The state of military technology and military conflict today writ large [00:31:10] - Are we heading to a future where warfare is mostly machine against machine? [00:33:34] - Comparing the ghost drone system to predator drones [00:38:40] - Guiding principles as a firm and deciding on their product roadmap [00:43:25] - An overview of their product lineup and what they've built so far [00:48:13] - Having an open innovation policy to promote competition [00:49:37] - The nuance of politics when it comes to building and running their business [00:51:56] - Most difficult decisions he's had to make through Anduril's history [00:53:51] - How he overcame Anduril's lowest points and biggest challenges [00:58:38] - Thoughts on effectively compounding hardware innovation [01:02:23] - A moment he's most proud of and regrets most in Anduril's history [01:04:20] - Lessons learned from observing Palantir and SpaceX [01:08:37] - The kindest thing anyone has ever done for him
Angie and Tiffany sit down and briefly discuss their military experience and women in the military. They start off explaining why they joined the service, what issues they have endured because of their gender and how they have gotten shit from men AND women for just doing their job. Later in the episode, the women share their opinion on women joining special operation jobs and the impact it has on everyone. Lastly, they discuss the sad and painful reality of sexual assault in the military, how it affects both women and men and lack of accountablity causing less people to want to come forward. If you ever experienced sexual assault and need someone to talk to, call 1-800-656-4673 or the DoD Safe Helpline at 877-995-5247. If you are a Veteran or Military member and want to speak to a counselor not affiliated with the DoD, go to giveanhour.org and fill out the form to speak to a specialist.
Today, we are breaking down Anduril. Anduril builds high tech defense systems for the US Department of Defense and its allies. Crucially, it does so with speed that emanates from Silicon Valley. Founded in 2017 by Palmer Luckey, who previously built and sold Oculus to Facebook, Anduril has achieved the rare feat of challenging the established order in the defense industry. To break down Anduril, I'm joined by the company's CEO and co-founder, Brian Schimpf. We discuss the history of the defense industry, how Anduril's business is counter positioned against the legacy cost-plus model, and what Brian has learned about selling to the DoD. Please enjoy this breakdown of Anduril. For the full show notes, transcript, and links to mentioned content, check out the episode page here. ----- This episode is brought to you by Tegus. Tegus is the new digital hub for market intelligence. The Tegus platform empowers Investors and Corporate Development teams to invest smarter by pairing best-in-class technology with the highest quality user-generated content and data. Find out why a majority of the top firms are using Tegus on a daily basis. If you're ready to go deeper on any company and you appreciate the value of primary research, head to tegus.co/breakdowns for a free trial. ----- This episode is brought to you by Daloopa. Daloopa streamlines a major pain point for investors. By capturing all of a company's KPIs and adjusted financials into their database - Daloopa makes it easy to quickly update your models for what matters. Daloopa uses AI to find every KPI disclosed - from charts, to text, and even from footnotes of investor presentations. Daloopa updates these KPIs and data points in your existing Excel models in one click, regardless of your source or format. Test Daloopa for free at daloopa.com/Patrick. ----- Business Breakdowns is a property of Colossus, LLC. For more episodes of Business Breakdowns, visit joincolossus.com/episodes. Stay up to date on all our podcasts by signing up to Colossus Weekly, our quick dive every Sunday highlighting the top business and investing concepts from our podcasts and the best of what we read that week. Sign up here. Follow us on Twitter: @JoinColossus | @patrick_oshag | @jspujji | @zbfuss Show Notes [00:02:52] - [First question] - The history of defense technology and the technological and competitive landscape when he set out to build Anduril [00:08:22] - What the early experience was like when approaching the government and finding an early adopter [00:12:44] - Necessity being the mother of invention when it came to developing drones [00:16:37] - What it's like to develop hardware and software products at the same time [00:20:26] - How the defense business complex works economically and overview of the detailed cost plus model [00:24:44] - The state of military technology and military conflict today writ large [00:31:10] - Are we heading to a future where warfare is mostly machine against machine? [00:33:34] - Comparing the ghost drone system to predator drones [00:38:40] - Guiding principles as a firm and deciding on their product roadmap [00:43:25] - An overview of their product lineup and what they've built so far [00:48:13] - Having an open innovation policy to promote competition [00:49:37] - The nuance of politics when it comes to building and running their business [00:51:56] - Most difficult decisions he's had to make through Anduril's history [00:53:51] - How he overcame Anduril's lowest points and biggest challenges [00:58:38] - Thoughts on effectively compounding hardware innovation [01:02:23] - A moment he's most proud of and regrets most in Anduril's history [01:04:20] - Lessons learned from observing Palantir and SpaceX [01:08:37] - The kindest thing anyone has ever done for him
How do you identify human remains? Neil deGrasse Tyson and Chuck Nice explore DNA and the task to identify the remains of missing soldiers with biomedical scientist Tim McMahon and forensic anthropologist Franklin Damann. What is the DPAA? NOTE: StarTalk+ Patrons can watch or listen to this entire episode commercial-free here: https://startalkmedia.com/show/forensics-dna-and-identifying-missing-soldiers/Thanks to our Patrons Jon Scherer, Thibault Deckers, Jimmy Jam, Evan Cooper, Barnato, Justin Ross, James Nichols, Lori, Emilie Talles, and Roy Slettbakk for supporting us this week.Photo Credit: Doctoroftcm, CC0, via Wikimedia Commons
oday we have one informative episode! Jonathan's Birthday& reviewss for For All Mankind Season 2 World War 3, Golf +, Top Golf, Marvel's The Avengers Jay's RoadHouse Jay Almost removes Karen from a BallGame! How Hard was he for The NorthMan? Arma is coming to Console We're going Back to the Moon Gaming News! DD2 14 Gaming podcast is for mature audiences only. Any videos, music, or entertainment not originating from DD2 14 Gaming is used and covered under Section 107 of The Copyright Act of 1976, also known as 'fair use'. Opinions expressed are our own and do not represent any DoD or U.S. government entities as a whole. This podcast is for entertainment purposes only. Viewer and listener discretion is advised. You are no longer alone now, because we have you. --- Send in a voice message: https://anchor.fm/dd214gaming/message
This week Joe is joined by Army Veteran, Scott Wilder. Scott is an emergency assistance administrator with the Army Emergency Relief and shares information about the opportunities available to transitioning Soldiers through the Career Skills Program. Scott discusses his own transition after his retirement and how he uses those lessons learned to help others. The Army Emergency Relief provides grants and access to assistance for transitioning soldiers, family members, and retirees. He shares his advice for service members struggling with the transition to the civilian work force and how to connect with the available help. About Our Guest Scott Wilder joined the Army in 1989 and retired in Nov 2019. He served in the Infantry for most of his career then served as a congressional advisor for the 14th and 15th SGM of the Army ending his career as the Army Soldier for Life Program SGM. Scott has been working at AER since Jan 2020 serving as an Emergency Assistance Administrator. Join the conversation on Facebook! Check out Veteran on the Move on Facebook to connect with our guests and other listeners. A place where you can network with other like-minded veterans who are transitioning to entrepreneurship and get updates on people, programs and resources to help you in YOUR transition to entrepreneurship. About Our Sponsors Navy Federal Credit Union When you hear the name Navy Federal Credit Union, you probably think that it's just for members of the U.S. Navy. In fact, Navy Federal Credit Union serves all branches of the armed forces, Veterans, and the families of servicemembers. Navy Federal Credit Union wants to thank the men and women in the U.S. military for their important commitment to our country. For more than 85 years, Navy Federal Credit Union has made it their mission to help people in the military community and they understand their members better than anyone. This month is Military Appreciation Month so show your own support for our troops with #MissionMilitaryThanks. Learn more about how Navy Federal is celebrating the commitment that connects them to their members at navyfederal.org/celebrate. At Navy Federal, our members are the mission. Armed Forces Travel Did you know that there is a leisure travel website that was made just for you and your family members that can save you money on travel plus support your military community at the same time? American Forces Travel is committed to providing high-quality and best value travel services to patrons affiliated with the Department of Defense as a way to thank them for their service and dedication to our country. American Forces Travel is a DOD partnership with Priceline. Made exclusively for Active-Duty, Reservists, Veterans, and DoD Civilians you can save up to 50% off hotels, flights, rental cars and more. You can even find and purchase event tickets through the site. On top of that, travel company commissions go to your service branch to be reinvested into your military community. Check out AmericanForcesTravel at veteranonthemove.com/travel and see for yourself. Want to be our next guest? Send us an email at email@example.com. Did you love this episode? Leave us a 5-star rating and review! Download Joe Crane's Top 7 Paths to Freedom or get it on your mobile device. Text VETERAN to 38470. Veteran On the Move podcast has published over 430 episodes. Our listeners have the opportunity to hear in-depth interviews conducted by host Joe Crane. The podcast features people, programs, and resources to assist veterans in their transition to entrepreneurship. As a result, Veteran On the Move has over 7,000,000 verified downloads through Stitcher Radio, SoundCloud, iTunes and RSS Feed Syndication making it one of the most popular Military Entrepreneur Shows on the Internet Today.
Black operations make the world go round, and have become the subject of major movies and TV, from Jack Ryan... The post ClandesTime 229 – Black Operations and the Entertainment Liaison Offices first appeared on Spy Culture.
On this Washington Roundtable episode of the Defense & Aerospace Report Podcast, sponsored by Bell, our guests are Dov Zakheim, PhD, former DoD comptroller, now with the Center for Strategic and International Studies, Dr. Patrick Cronin of the Hudson Institute, Jim Townsend, a former deputy assistant secretary of defense for Europe and NATO who is now with the Center for a New American Security and Michael Herson of American Defense International. Topics: — Senate approves $40 billion in Ukraine aid, but dissenting GOP votes suggests contentious legislative future on spending — What primary outcomes mean for upcoming November elections that will determine control of Congress and fate of key Democratic members — Update on baby formula supplemental, gas price legislation, USICA conference and BBB — Whether a Biden administration focused on China will be able to maintain sustained attention on a prolonged Russian war on Ukraine — A view from Poland on the war and what's next — What it will take to overcome Turkey opposition to Finland and Sweden's membership in NATO — President Biden's tour of Asia as administration works to marshal allies and partners — Addressing perception the administration has eased pressure and rhetoric off China in big to keep Beijing from helping Russia — Concerns about the pro-China rhetoric from the new Philippine president, Ferdinand Marcos Jr. — Outcome of the Australian election and what a Labor victory will mean for regional security — The civil war within the US Marine Corps
Director Ryan McLean discusses his modernization strategy for the Tactical Assault Kit, a map-based software application connecting USSOCOM, other U.S. military services and allied partners. TAK is critical for effective, efficient communication in warfighting scenarios. McLean's plan could launch the product center to software factory status under the Defense Department's new software modernization strategy.
This week's episode covers a new final rule about commercial item determinations, DOD's response to Hill questions about the impact of inflation, a False Claims Act settlement and new FCA complaint, and enforcement of the Service Contract Act, and is hosted by Peter Eyre and Yuan Zhou. Crowell & Moring's "Fastest 5 Minutes" is a biweekly podcast that provides a brief summary of significant government contracts legal and regulatory developments that no government contracts lawyer or executive should be without.
Bob Stevens, AVP Public Sector at GitLab joins Tech Transforms to talk about the imperative mission of DevOps to combine efficiency, speed and security. With emphasis on empowering teams to fail fast, moving security to the left, and a deep dive into Platform 1, you won't want to miss this episode! Episode Table of Contents[00:27] DevSecOps' Speed of the Mission [09:02] The Cultural Shift That Needs to Occur to Upgrade the Speed of the Mission [19:21] The Future of DevOps Episode Links and Resources DevSecOps' Speed of the MissionCarolyn: This week Bob Stevens, Area Vice President of Public Sector at GitLab is joining me. Bob is a seasoned veteran in public sector technology with over 25 years of experience. As the AVP at GitLab, he is responsible for helping government organizations become more productive, efficient, and effective. Bob also has experience on both the industry and the government side of things. Prior to industry he served in the United States Air Force as a computer specialist at the White House Communications Agency. I am excited today to dive in and talk about the ways that we can use DevOps to modernize and secure government IT, and what the outlook for DevOps is. How are you doing, Bob? Bob: I'm doing great. The weather's getting better in DC, so it's good to see the sun from time to time versus what we've had. But yes, doing fantastic. Carolyn: Well, good to hear it. So let's just dive in. And let's walk through what DevOps is and why implementing these practices is critical to helping modernize and improve government IT? Bob: Great. So I guess DevOps is combining efficiency, speed, and security all into one. And creating software at what I like to refer to as the speed of the mission for the government. The business side is a little different. But for the government, it's all about the mission and you being able to accomplish the mission faster and stay ahead of our adversaries. In the case of DoD and on the civilian side, it's to ensure that all of the citizens that any given agency supports gets the best possible support that they can. If you look at the organizations like the Veterans Administration. You can imagine they've got a lot of applications that they've written. The Platform the Government Is Looking For to Improve the Speed of the MissionBob: To help the vets accomplish what they need to accomplish in a timely manner. So DevOps really will help them to produce the software at speed, more securely, more efficiently, and provide the most or the best service that they possibly can to all of the veterans out there, just as one example. Carolyn: So, you know Tech Transforms is vendor agnostic. And I would love for you to just take a couple of minutes and talk about how GitLab helps with that. And just what GitLab does. I've read the marketing statements and it's a little nebulous for me. I would love to have you explain what GitLab does and how it's helping agencies achieve this? Bob: I appreciate that you're letting me do this in a vendor-agnostic community. I mean, there are a lot of tools that are required to produce software. But the way that the industry or the government in particular is heading, and you can see this in some of the articles that DoD has recently released. Is they're looking for one platform that encompasses the entire software development life cycle. As you can imagine right now, I know agencies that have anywhere from 14 to 20 different tools that they're using. And the issue with that is that there's developers that like the tool that they like. So they bring their own and they develop their portion of the software. Unfortunately, when it all comes together, it doesn't always work because they've used different tools across the development organization. And so, with the use of a single platform, you can ensure that at the end, everything is going to work. The nice thing is you can continue to bring some of those other tools. Because they integrate...
The 16:9 PODCAST IS SPONSORED BY SCREENFEED – DIGITAL SIGNAGE CONTENT The cannabis retailing industry is interesting in a whole bunch of ways. It is a unique vertical market with an absolutely screaming need for digital signage and interactive technologies. While longtime recreational users may know their stuff, as US states and Canadian provinces have legalized, there's a whole bunch of new users coming in with needs that have more to do with sleep problems or arthritic joints. They walk into dispensaries and are confronted with products and options that are somewhat or entirely unfamiliar, so screens that promote and explain are very helpful and relevant. The dispensary business is also interesting because the industry has its own overcrowded ecosystem of payments and management systems that need to somehow be tied together. The largest player in cannabis digital signage is the Bowling Green, Kentucky firm Enlighten, which is in some 1,200 dispensaries in the United States, I had a fun conversation with Enlighten founder Jeremy Jacobs, who found his way into digital signage when the clean energy business he was running went south in the late 2000s recession. He pivoted into screens in businesses, and menu displays for restaurants led to an opportunity to branch into cannabis retail. He's a super-smart, interesting guy more signage people should know about. Enjoy. Subscribe to this podcast: iTunes * Google Play * RSS TRANSCRIPT Jeremy, thank you for joining me. Can you give me the rundown on what your company does? Jeremy Jacobs: Yeah, absolutely, Dave. Enlighten is the only real omni-channel company within the cannabis vertical particularly, and by omni-channel, we affect the customer journey throughout that entire customer journey. We have a product real quickly called AdSuite that targets people in a digital environment, whether it be mobile, Roku or even desktop computers based upon audience segmentation data we have, to know those are known cannabis consumers. And then we have our SmartHub product, which is an in-store product which is why we're here today, digital signage, kiosk related, and that product helps to upscale the customers that were brought in from the marketing from AdSuite. And this could be on menu boards, this can be on information displays, this can be on tablets, any number of things, right? Jeremy Jacobs: Yeah, so SmartHub is really unique. Even if you zoom out of the cannabis vertical and just look broadly at the digital signage industry, SmartHub is an extremely unique product that we created. It manages kiosks, it manages digital signage, all sorts of menus, feature boards, order queue systems, break room TVs, where the audience has shifted from a consumer to the actual employee. It uses extremely advanced logic and filtering with the point of sale data that it's consuming to make these things and even has an e-commerce component to it. So really the way to think about it is that SmartHub is an extremely robust merchandising platform that manages all of your consumer facing surfaces, whether that surface is a passive screen, an interactive screen, like a kiosk or even the webpage where someone would come to purchase and make an order on your website. And the cannabis industry is its own unique ecosystem, right? There's POS companies that only do cannabis business, and so on? Jeremy Jacobs: Yeah, I would say there's no true word than cannabis is its own individual ecosystem. So as a veteran, not been in the industry quite as long as you but since 2008, I've seen a lot of things and cannabis extremely unique. So it does have all of its own tech stack companies for the most part. There are a few companies, Microsoft Dynamics makes a sort of a POS system that's been modified for cannabis. But outside, I'll see a Square every now and then, but for the most part 99.99% of all point of sales systems at a digital signage company would integrate with are extremely cannabis specific and they all compete for what is roughly 8,500 retail clients across just short of 40 states, and so to talk about the uniqueness, even in more depth, not only are the stacks different in cannabis than they would be outside of that, but all the individual laws and rules that apply very literally from state to state. So you even have state variances. Why would so many companies decide, “I want to be in a space that's changing constantly and not all that big and in the grand scheme of what retail is”? Jeremy Jacobs: That's a great question. I think what your question was alluding to, there's the TAM, the total addressable market. You look at restaurants and there's literally hundreds of thousands of them, and I would argue there's barely as many POS companies in restaurants as there is inside of cannabis. And I think it's a couple of things. From an emotional standpoint, this is “the green rush” right? Any cannabis advocate that for the last hundred years that it's been illegal has felt violated by the error, has seensocial injustice from that. I believe there's an emotional component why a lot of these companies are there, a lot of these leaders are there. Second, there's a power vacuum that gets field when no one wants to go somewhere. So when you take a look at the cannabis industry, none of these major POS companies that we're referring to, none of them had any interest at all whatsoever in getting involved in cannabis. So the result of that is someone has to, and then the third prong, I think of this little fork here is that there is a green rush. The Anheuser Bushes of the world are about to be made of cannabis. There's very unique transactions, very unique audiences, and there's a lot of money to be made there. There's a lot of value and you can see companies that are in the space that make tech. If you look on the internet, Weed Maps is probably the largest one, listed on the NASDAQ billion plus dollar company, recently Dutchie has made some announcements for billion plus dollar companies as well. So fortunes are being made even though the total addressable market is small. Yeah, I've always thought that the cannabis dispensary business was a particularly interesting one for digital signage, because unlike most retail where you walk into an apparel retailer, you know what you're looking for, clothes, I need a shirt or whatever. It's pretty obvious. But if I walk into a cannabis dispensary, I'm pretty much lost. I don't know what I'm even looking at and all these different strains of flowers and buds and this and that. It is like Mars to me. But, and I suspect a lot of people walk in like that who maybe aren't recreational users, but want it to help them sleep or calm them down or whatever purpose they have for it? Jeremy Jacobs: Yeah, and so to drill into that observation you've made is really there's two kinds of consumers that very quickly develop in cannabis. There's the customer that you just described, which is a new customer, and there's a lot of those, because again, cannabis was technically illegal for about a hundred years. And so there's a huge amount of new customers that don't know anything, and so there's a massive educational vacuum there, and that's actually, Enlighten really started as we recognize that, and so we created an in-store digital out of home, a television network that runs ads for brands and things of that nature, endemic or non-endemic. We've got clients like Door Dash or Vans shoes or FX networks and their cannabis shows, but the content that's on that network is educationally driven specifically to satisfy that lack of education that you just talked about, and then on the other end of that spectrum, there are these clients that very much know what they want and precisely what they're looking for and those particular clients aren't looking for that same experience. They're looking for, digital menus that can be sorted based upon terpenes are based upon cannabinoid profiles so the highest THC value, they're looking for is express checkout kiosks, so they don't have to have an interaction. So uniqueness of the cannabis dispensary from a digital signage perspective is you have to create digital environments that satisfy both of those polar opposites. I gather when you were talking about omni-channel that it's really important or helpful to a company playing in this space to be able to serve multiple needs and to integrate with the other technologies that are part of the ecosystem. If you just did digital signage, it's a walled garden thing where you're going to get much better reception for many users, whereas you can provide multiple components, right? Jeremy Jacobs: Oh, absolutely. I've been in a lot of industries. The restaurant space was the first one. I was really into digital signage. Sysco Foods started slinging my digital menus for me, and like things 2009 and their 30 different offices and so I got to see a lot of things there. But in the first week in cannabis, eight years ago, the word integrate came up like 40 different times within an hour, and so I've never seen an industry that's so demanding of integrations. Like for example, you walk into a restaurant and any number of restaurants and you look over by the hostess stand and there's the DoorDash tablet, and there's a GrubHub tablet, and there's a Postmates tablet and there's all these tablets. And so the hostess is watching these orders come in and then they're putting them in their POS system. That would never fly in the cannabis industry, like it's a demanded integration by these people, and so if you're going to create an integration engine, you're going to want to make it have more points of influence than just a TV menu, you're going to need to provide that e-commerce plug and you're going to need to provide those kiosks. You're going to want to link up with their customer data for targeting those customers, on their mobile devices. You're exactly right, if you're going to be relevant in cannabis, your stack better be serious because they're trying to reduce that vendor set to if they could just one, nobody does all of it, but they want to reduce that number to the smallest possible. Is that in part, because it's a younger buyer audience who understands technology more and didn't grow up in kind of old style restaurants or whatever, where there were all these different systems? Jeremy Jacobs: Interesting thing you said there,t because it's a younger buyer, so that was very true eight years ago. But at this point, that is not the truth at this juncture. So just a few years ago, I think it was two and a half years ago, the fastest growing segment of users shifted from 20 year olds to middle-aged mothers and it was the fastest growing audience, and then over the last few years, what has really been the fastest growing audience has actually been elderly people. It seems like they're starting to come to grips with, “Hey, I have pains and aches and cannabis is actually the solution”, and so it's a big growing segment. But I think the answer to the question that you did ask is why is there this desire for a consolidation of a tech stack more than anything. Yeah, I was thinking more of the operators that tend to be younger. Maybe that's not the case? Jeremy Jacobs: Same thing at this point, it's not the case now, it's weird. So it was the case before, a hundred percent because who was willing to take that risk to get in the weed business, and so a hundred percent, but now I'm sitting in meetings with digital officers and marketing officers from Abercrombie and Apple, and they came from big organizations and so it's a very changing landscape. But at the end of the day, I think that some of them are young, so yes, to your answer, very good observation. Second is the ones that aren't young are professionals, and they're used to dealing with that. But thirdly, I think for both of them, the demand of tech stack is necessary because the regulations and the data that they have to send back to the state agencies and authorities and all of those sorts of things and the compliance they have to undergo is worse than any other industry ever. Like they're under so much scrutiny and you could lose your license at the drop of a hat, and so they want less to deal with so they can focus more on staying in business. Does that touch on your platform and what you do? Do you have to have a Nevada version of it and a Colorado version and I forget where else it's legal, California, obviously. But do you have to pass them out state by state or is it pretty uniform? Jeremy Jacobs: Great question. So the technology itself is the same across all the states. AdSuite is AdSuite and SmartHub is SmartHub, but there are definitely nuances. So let me give you a couple of interesting examples in the state of Pennsylvania, you're not allowed to put anything up on a screen from a digital signage perspective, unless absolutely it has been medically proven. And so it needs to come from a doctor or some position, a medical authority, and in Alaska, for example, they don't believe anything has ever been proven by a doctor or medical authority and so you can't put anything up that even closely resembles a recommendation. So there's two polar opposites. So from a content perspective, I gotta watch those things. From an advertising perspective. Some states, even though it's cannabis, won't let you show pictures of weed in the advertisements. Go figure that out. How do you advertise weed without showing weed? You can't show people consuming the product in a lot of states with advertisements. So there's another nuance, and then a third nuance is like in Pennsylvania, what I'm able to put on a digital menu is very specific and I cannot put any imagery into one thing, and I have to, I'm required to put certain testing results, similar to the way in the restaurant industry. Now everybody went digital whenever they were required to put the calorie count for these items, and that's when you saw this massive uprising in digital cause they got to replace all this stuff anyway, might as well go to the screen, and in Pennsylvania, I got to put things like that, testing results. What's the content that seems to be required across all the different dispensaries, kind of the money messages that need to be there, and the operators want to have up there? Jeremy Jacobs: Yeah, so from a TV menu perspective. We'll start with our that's the most largely adopted digital signage product ever and so the TV menu, what's necessary is the name of the products, the type of the product, the weight of the product, the price, the product, but really importantly, people want to know about cannabinoid profiles, is this high or low in THC? The psychoactive ingredient that gives you the feeling of a high, is it higher, lower in CBD, which is the non-psychoactive ingredient that really focuses a lot on pain, arthritis and inflammation and things of that nature, muscle pain. So consumers sort of demand that, operators want to provide that. And from an educational perspective, if you're talking about a different digital signage product and just more like digital signage, we're producing educational videos, the demand really is around education of what are these different terpenes, what are these different cannabinoids, these little things inside of the cannabis that creates different effect for each strain, like this one makes me sleepy, this one makes me energetic, this one's great for back pain, and so that's the demand from a regulatory standpoint of pretty much the only uniform thing that I can't really do is show anything that's cartoonish that might want to lure children into the store. There was a big problem with packaging for edibles for a while there, right? Jeremy Jacobs: It was, they've got sour patch kids on the box, and the first versions of edibles were very kid friendly because they took kids candies and made them, and now that's pretty much been regulated out. So the same thing, that same sort of concern with the packaging that you pointed out with edibles is also a concern in digital signage and even digital advertising. So if I'm targeting a mobile phone, even though I'm targeting a known cannabis consumer, just stay away from anything that might be alluring to children. So if I'm a customer of Enlighten, is it a SaaS platform that I am using?. Jeremy Jacobs: Yeah, so the two products are different. The SmartHub is the in-store signage, kiosk, kind of technology that manages all of that and talks to your POS system. That is definitely a SaaS product. As far as pricing models, there's been a lot of those in digital signage, our kiosk system is one price for your entire store and use as many as you want. Our signage model is the same as anyone else's, per node. SaaS model on our AdSuite product, though that is a SaaS product, if you will, it's a piece of software that gains you access to those audiences on our DOH network and in stores, as well as, digital Roku devices, mobile devices, desktop computers but that's driven just like any other digital advertising model would be external on a cost per impression basis. What's the footprint for your company at this point? Jeremy Jacobs: So we've reached a really interesting crossroads, very few companies in cannabis have ever got over that thousand mark. Right now, I would estimate we're in probably roughly 1200 dispensaries, somewhere thereabouts and then have several hundred other clients that are brands and so forth so our footprint reaches to about 1500 or so clients, big number and a TAM of 8,500, if you look at it that way. And this is an industry that like more and more states seem to be coming on stream, or at least there's a push to bring them on stream. So it's not like it's a finite market right now? Jeremy Jacobs: Yeah. So that's part of the growth. When we're assessing growth, there's a couple ways to look at it. One is how we can get more money out of the existing customers and that's to offer premium versions of our products, additional services that might be out there that we could focus on. But also there's just the overall growth of the entire market itself, and there's a couple of phases of that. The first phase is for the state to go medical. So now, they can be a client of ours. But typically, we find the greatest traction in the states once they go recreational because what happens is their revenue growth is astronomical. People don't appear to want to go to get a medical license nearly as easily as just walking in a dispensary. So whenever they go recreational, they buy a lot of other products from us and really focus on that retail environment and creating a magical experience for those recreational customers. So really there's two phases, medical, and then recreational. But right now you're looking at cannabis in almost 40 states at a medical level roughly 10 or so at a recreational level. I'm averaging there, the number changes. I haven't kept track of it in a minute, but to give you an idea of growth, there's about 10-12 to go to medical and then there's the vast majority or 80 plus percent that are not yet recreational. So a lot of growth in them. Are you up in Canada as well? Jeremy Jacobs: We are. So it's a lot of challenges working inside cannabis, anybody's ever nailed internationally. You have to have your own bank accounts, your incorporations, your teams up there. It's hard to import hardware products, and as a company, we do also provide the hardware. So that has its own challenges, but we do operate in Canada. We've got some systems in Puerto Rico, which is a US territory. Jamaica, we send some things too. We have some plans we're brewing up. Spain has a pretty good sized cannabis market and so we're looking internationally there because the challenge is the same. People don't understand cannabis, they need education. That's the same worldwide. It's been illegal globally, for a hundred years. How did you get into it? You mentioned that your first foray into digital signage was restaurants for Sysco, how did you end up in this? Jeremy Jacobs: So in 2008, I started a company called IconicTV, and it's had many offshoots with verticals. I've been one of those guys when I see a vertical, I'd make a very precise product. We helped build a C-store DOH network called C-store TV. We had a school product called, school menu guru. We had a lobby product called lobby Fox, it does visitor management and so one of those products we noticed early on was digital TV menus, and so in 2009, I formed a deal with Sysco foods and they have 30 offices across the country that would distribute my digital signage, digital TV menu products to their restaurant tours. And so I hired these vice presidents in each of those areas to partner with those offices as Sysco calls an opco, and so Sysco would have reps and my reps would go do ride alongs, and so they would ride along with these representatives and go in and meet these restaurant tours at work and stuff. One of them, the guy in Denver, Colorado, Ted Tilton's name? So Ted called me one day and this is right before cannabis goes legal in Colorado, which was the first state to legalize recreational cannabis, Washington and Colorado voted on it basically at the same time. But Colorado was the first actually who implemented, and he calls me, he says, Hey man, I got this idea and I said, what is it? He goes, these TV menus we're selling through Sysco. I said, yeah, he goes, what do you think about making some for marijuana? I said, what are you talking about? And he says I've got these buddies opening this dispensary called DANK, and it'll be the closest dispensary to Denver International airport and I got this feeling as soon as weed was legal in Colorado, a lot of people are going to be coming into DIA and this place is going to be really busy since it's the closest one, and he says, and I was like, what would be the difference? And he said, essentially we put up marijuana buds instead of chicken sandwiches. And I said, I'm in. I've been a big advocate of cannabis for a long time. At one point, I was even the executive director of Kentucky NORMAL, the division of the national organization for marijuana legalization. It's the Kentucky chapter. I've been a big advocate of it. I've been a self prescribed patient for many years. It was an interesting opportunity to take a couple of things I was very passionate about both cannabis and digital signage and went to do some real work on two things I care about. So we dove in. Has the profile of the operator changed? I remember talking to another person who's involved in this space and actually being out in Denver and he was saying that there's two types of operators. There's a business people who see this as a growth opportunity, and they've already had some experience in retail or in investing or whatever, and then there's growers and growers who are turning into retailers and he said the challenge with the growers as they're growers, they're not business people and they don't really understand retail, and I'm curious if in the early days you saw a lot of them stories of dispensaries that would start up and then drop off because they didn't really know what they were doing? Jeremy Jacobs: Yeah, and I'll take that example. Your friend gave you a pretty good insight there, but to expand on that, I don't even think it's just growers though. It's I think just very weed passionate people, like they're very passionate about it. Whether it's consuming it or making concentrates or growing it or whatever. So I would just call them plant passionate people versus business people, and it very much exists, and it doesn't today to the degree that it used to. In the beginning, someone that's a senior executive vice president of Abercrombie is not going to go start a dispensary, like during the first couple of years, we were all wondering if everybody opened these things, were all gonna go to jail. I'm sure everybody in America is going everybody in Denver is going to do it, just wait, and if all my friends at open dispensaries were sitting around, I would have conversations with the night and they're like, I'm just wondering if tonight, the DEA raids my house, and so nobody wanted to be under that scrutiny except plant passionate people. But as time got on and the federal government sorta started to take a position, even if the position was, “we don't have a position”, that's still a position, and so they're not taking an aggressive stance on it then you began to see real business people start to come into the environment and at this point, you have organizations like Cresco who just bought Columbia Care, and these operators have over a hundred stores and they're doing hundreds and hundreds of millions of dollars in retail cannabis sales. These are not the type of marijuana dispensary that I think most people have in their mind. These people have entire floors of IT teams. They have entire floors and marketing teams. They do in-depth customer insight studies, and that influences every tiny nuance of their packaging and their store layouts. These are real operations, but I can still take you to Oregon right now and walk into the shop or Nancy and Megan who are best friends and they have tie-died things up on the wall and they're very whimsical people that are just very passionate and who also have a successful sotry. Now they're not going to sell hundreds of millions of dollars to cannabis, but they're also successfully operating. Think of it like liquor, for example, Liquor Barn exists and that's a big corporation. But, in the town I live in, everybody wants to go to Chuck's Liquors when Chuck was alive, because Chuck was just the coolest guy ever. So you went to Chuck, so they both have a place. Yeah, I've certainly seen the same thing. I remember being an Amsterdam for ISE and, you'd stick your head into one of these coffee shops, and it was just a hole in the wall and weird but out by the hotel where I was staying, there was a dispensary that looked like an Apple store, like it was very slick. Jeremy Jacobs: Interesting you say that. So there's this place called Euflora and Jamie Perino was one of the owners at the time and it's at the 16th street walking district in downtown Denver. This is the big street with the old piano outside and everybody wandering around a very touristy area and so we did the first project for them that I remember getting a call from them and they're like, “Hey, we open in 11 days and we've got this crazy idea where there'll be a touchscreen kiosk and it's sitting next to a jar of marijuana, and this kiosk has all this interactive stuff on it with everything about that strain of marijuana. We needed in our stores in 11 days. Can you guys do it?” And they said, oh yeah, and our budget is X, and I just laughed, and I said X is missing a couple of zeros, especially for 11 days, what are you talking about? And they're like, can you do it or not? And I said I can, but I shouldn't but I'm going to, and so we did, because we wanted to be part of the exposing of this whole thing. And so we took it on, and so when you would first walk on your floor, you can dig up some old video files from the news channels from eight years ago, it very much looked like an Apple store cause we had Apple iPads on every table next to a jar of marijuana and you can scroll up and down and see what the euphoric effects would be and does it make you sleepy, happy, hungry, horny, what's it going to do? And, in what genetics, where did it come from? And just all this interesting stuff, and people would come into that store fascinated, and so it was very Apple-esque. How did you end up in digital signage? Cause I was looking at your bio and you've got patents in Magneto, hydrodynamics for energy exploration, drilling and everything. How did you get here? Jeremy Jacobs: What the hell happened? Early in life I realized I didn't really like formal education. So I think I'm like nine hours from a college degree, but I dropped out and became entrepreneurial. So I became an investment broker and I worked on several different fundraising deals, most of them were driven around biodiesel. That was very active at the time when I dropped out of college, nearly two thousand, biodiesel was a thing, a lot of different technologies. And very quickly I got interested in alternative energy technologies and energy efficiency technologies, and just anything that was energy related, and technology related, and so I had an operation with about 20,000 acres of natural gas wells in Eastern Kentucky that were clean natural gas wells using advanced technologies like hydraulic fracturing. I started inventing Magneto hydrodynamic technologies that's used by Chevron and Exxon and people that. It goes down in oil wells. It's used to eliminate paraffin and that technology has now been adopted by the DoD to make airlines, to make fighter jets fly farther because the fluid systems flow better and a lot of different things, and then 2008 came, so I own a quarry, that's mine and silica for Silicon to make marker processors, and I got a bunch of natural gas, wells and magnetic technologies, and 2008 comes, 2007 comes, the housing crisis collapses, everything and natural gas went from about $14 in MCF, which was a vast majority of the revenue that we were driving to like a dollar and a half in MCF, which is the unit that you produce and sell for, it stands for thousand cubic feet, and I needed $3 to make that make sense, right? And now it's at a dollar and a half. So I went from really cash flow positive to a hundred percent cash flow negative and just a matter of months. And on top of that, when you own a bunch of quarries, nobody's buying any materials, and so I look up and literally everything I'm involved in just all of a sudden is collapsing and I don't have the payroll to make payroll for this massive bunch of employees. We had several offices in different parts across the country. And surely it was excruciatingly painful fast. Everything had to close, and so here's, here's the reality. I'm at home depressed out of my mind. I've just had to lay everyone off. I've had to shut in all these gas wells. I've had to lock the gates on all these quarries and nobody wants to talk about anything, everybody's going broke and my wife comes to me and she says, you've got to do something. We have kids we have to feed, we have bills we have to pay. You cannot sit here and be depressed, and I had seen somewhere I think it was in a mall. A friend of mine had built a TV screen, turned sideways, and it had Adobe Flash player on it, and it was playing some animated motion graphics that he controlled on a desktop PC inside this big kiosk and I thought I could do something similar to that, and so I literally grabbed a 32 inch Vizio TV out of my living room. My wife goes, where are you going with my TV? I said, I'll bring it back to you. I'll see you in a week, and she goes, you are leaving with the TV for a week? I said, yeah, and you'll get a bigger one, I promise, and I grabbed the Toshiba laptop that my field hands that would go around, they had to log what parts they use and how long they were on job sites and stuff, and I grabbed one of these old stinky laptops that smells like crude oil and hung it in a friend of mine's restaurant in Clarkson, Kentucky. It was called K's cafe and it was political season, and so I'm going to tell a story about myself here, Dave, and so I go around and build these very animated PowerPoints and I'm changing the files out via LogMeIn at the time. I didn't even have any software, digital signage software. I didn't even know about the digital signage thing. And so I'm like, I gotta sell ads on this thing, so I go to this guy that's running for sheriff, and I told a little white lie. I was like, Hey man, the other guy that's running for sheriff, he's buying in on my screens. It's in the most high traffic restaurant, and apparently legally, I've got to offer you the same opportunity at the same price. He goes, why what's he paying? And I told him, he goes, I'll take it, and so then I went to the guy that I just told a white lie and said, this other guy is buying. It was, which was actually true the second time. That's how I got started, I had to feed my kids. I had a 32-inch Vizio TV and a busted up laptop and I sold some people aspiring to be politicians, some ads and some real estate agents, and it just grew from there. I look up and I'm in hundreds of restaurants and fitness centers with the DOH network and six months later, a friend of mine says, Hey, can you use one of those silly ad TVs and make a menu on it because the price of salmon keeps fluctuating so much. I got to put these mailbox letters, and so we made, which was one of the early digital menus. I think we'd both agree, 2009-2009 was not the dawning moment of digital menus. It wasn't the precipice of it. That was very early. And so we started using those and saw opportunities to replace those little black felt directories with the letters you run out of the M, and so you flip the W upside down, it's all bow legged looking, on the little felt boards. We started making digital directories integrated with Google sheets, so you could change it easily and the rest was history, man. I dove in and needless to say, the kids are fed now. The wife is happy. She got a bigger TV. I think it's 70 inch now. So everyone's cool. That's a hell of a pivot. Jeremy Jacobs: Yeah, buddy. Necessity is the mother of invention. All right. This was terrific. I really enjoyed our conversation. Jeremy Jacobs: Yeah, man. I was going to start off this morning saying longtime listener, first time caller. I've been watching your website, your blog, your podcast for as long as I can remember. So it's been an honor to finally get to be a part of it, and I really appreciate it. Thank you for taking the time with me. Jeremy Jacobs: I thank you, Dave.
Like in the game of monopoly, Defense Department money comes in many colors. Unlike the board game, each color in DoD has a specific, non-interchangeable purpose. When it comes to buying software, that presents a problem, which the Air Force is hoping to fix in next year's budget. That an more in this week's DOD reporters notebook with Federal News Network's Jared Serbu and Scott Maucione.
Syed Barizuddin, Ph.D is a researcher, an academic, and an entrepreneur with over 20 years of experience. Syed's bachelor's degree and subsequent work experience of 5 years gave him the expertise in Electronics Engineering, Power Systems, Telecommunication Engineering, and Control Systems. The Master's degree research imbedded the expertise on Nanotechnology, Chemical Engineering and Energetics. His Doctorate education and subsequent work experience of 10 years encompassed expertise in Bio-Medical Engineering, Microbiology, Optics, Diagnostic Systems and other areas of science and technology. More recently, his work experience has focused on Environmental Engineering and Green Technology projects. Also unique to Syed's experience is, how intrinsically he is aware of the academic and industrial setting and their workings. He has been on both sides and has led project teams as the Principal Investigator, as well as founded two start-up companies and was an equal partner in the third. He has worked on projects for federal agencies such as the DoD, NSF, NIH, EPA, and many multinational companies. He insists on how important and meaningful partnerships can be - be it with the industry partners or government agencies. His experiences over the years and the acquired nuances in the interactions and engagement with corporates, industry partners, and government agencies provide an advantage for his start-ups to succeed. In my current position as the Chief Executive Officer of Plasmonic Diagnostics, he is busy leading the company to commercialize a disruptive non-invasive and ultra-sensitive technology in the infectious disease space. Born in Hyderabad (central/South), India, Syed moved to the United States more than two decades ago. He has mostly resided in the midwest. His reason for not making a move from Missouri according to him are the courteous drivers and people kindly holding the doors for you to pass!
Austen and Drew talk with Matt Houston and Jeff McCoy about the early development days of software innovation across the DoD. Matt handled authorizations and policies for P1 ensuring the program's security and its authority to operate (ATO). Jeff brought over a decade worth of software development experience to P1 helping to slingshot it from its inception to a program of record. The four innovators discuss the early stages of software development and how the DevSecOps community came together by emphasizing the spirit of collaboration and sharing, and ultimately letting good ideas emanate up to the surface of a challenge.
Our hosts talk with Air Force veteran Rob Slaughter who worked in and directed the early stages of the Platform One program. He continues to support the DoD software ecosystem as a small business owner. Rob, Austen, and Drew discuss the early stages of software innovation and how it grew across the DoD from self-forming teams of passionate and skilled professionals who wanted to provide needed tools to the warfighter in an efficient and innovative way.
What do the numbers tell us about the USN's expected fleet during the rest of what we call the Terrible 20s?We are going to spend an hour digging in to that with returning guest Matthew Hipple, active duty Surface Warfare Officer & former president of the Center for International Maritime Security.As a starting point for our conversation we will reference his May 9th article over at CIMSEC, "20 Years of Naval Trends Guarantee a FY23 Shipbuilding Plan Failure.""The FY23 Shipbuilding Plan proposes a 10-year drop in fleet numbers that deviates in spirit from every shipbuilding plan since 2012. During this dangerous decade, the FY23 Shipbuilding Plan returns the fleet to a size that precipitated the period of panic that inspired Congress to enshrine the 355-ship goal into law (Figure 2). The FY23 Long Range Shipbuilding Plan will miss the defunct, minimum goal of 300 ships by another decade, and is less likely to meet the Navy's legal and operational 355-ship requirement."
Today's Sermon - Jay Goes to JESUSFEST Jonathan has Reviews for Dr Strange, For All Mankind and Tears for Fears! Call of Duty Candles Starfield Delayed Army thinks throwing money at recruits instead of developing leaders is still a better idea! DD2 14 Gaming podcast is for mature audiences only. Any videos, music, or entertainment not originating from DD2 14 Gaming is used and covered under Section 107 of The Copyright Act of 1976, also known as 'fair use'. Opinions expressed are our own and do not represent any DoD or U.S. government entities as a whole. This podcast is for entertainment purposes only. Viewer and listener discretion is advised. You are no longer alone now, because we have you. --- Send in a voice message: https://anchor.fm/dd214gaming/message
Film Florida Podcast Episode 93- Glen Roberts is the Chief of Entertainment Media for the United States Department of Defense. Glen works out of the Pentagon and his team is responsible for projecting and protecting the Department's image in the entertainment space, including films, TV shows, video games and events. He serves as the primary point of contact between the DoD and entertainment studios, production companies, guilds, industry associations, and more. Glen works with both domestic and international film commissions to facilitate all types of projects. And he's also a graduate of the University of South Florida. We talk about a typical request of his office, the challenges of incorporating real DoD elements into fictional stories, the political side of his job and more on the final episode of Season 4 of the podcast. Audio editing by Rob Hill.
Facebook Has No Idea Where Your Data Is and What They Do With It?! Facebook's about 18 years old coming on 20 Facebook has a lot of data. How much stuff have you given Facebook? Did you fall victim for that? Hey, upload your contacts. We'll find your friends. They don't know where your data is. [Following is an automated transcript] [00:00:15] This whole thing with Facebook has exploded here lately. [00:00:20] There is an article that had appeared on a line from our friends over at, I think it was, yeah. Let me see here. Yeah. Yeah. Motherboard. I was right. And motherboards reporting that Facebook doesn't know what it does with your data or. It goes, no, there's always a lot of rumors about different companies and particularly when they're big company and the news headlines are grabbing your attention and certainly Facebook can be one of those companies. [00:00:57] So where did motherboard get this opinion about Facebook? Just being completely clueless about your personal. It tamed from a leaked document. Yeah, exactly. So we find out a lot of stuff like that. I used to follow a website about companies that were going to go under and they posted internal memos. [00:01:23] It basically got sued out of existence, but there's no way that Facebook is going to be able to Sue this one out of existence because they are describing this as. Internally as a tsunami of privacy regulations all over the world. So Gores, if you're older, we used to call those tidal waves, but think of what the implication there is of a tsunami coming in and just overwhelming everything. [00:01:53] So Facebook, internally, their engineers are trying to figure out, okay. So how do we deal with. People's personal data. It's not categorized in ways that regulators want to control it. Now there's a huge problem right there. You've got third party data. You've got first party data. You've got sensitive categories, data. [00:02:16] They might know what religion you are, what your persuasions are in various different ways. There's a lot of things they might know about you. How were they all cat categorize now we've got the European union. With their general data protection regulation. The GDPR we talked about when it came into effect back in 2018, and I've helped a few companies to comply with that. [00:02:41] That's not my specialty. My specialty is the cybersecurity. But in article five this year, peon law mandates that personal data must be collected for specified explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes. So what that means is that every piece of data, like where you are using Facebook or your religious orientation, Can only be collected in use for a specific purpose and not reused for another purpose. [00:03:19] As an example here, that vice has given in past Facebook, took the phone number that users provided to protect their accounts with two factor authentication and fed it to its people, feature as well as. Advertisers. Yeah. Interesting. Hey, so Gizmodo with the help of academic researchers caught Facebook doing this, and eventually the company had to stop the practice because, and this goes back to the earlier days where Facebook would say, Hey, find out if your friends are on Facebook, upload your contacts right now. [00:03:54] And most people. What did you know back then about trying to keep your data private, to try and stop the proliferation of information about you online then nothing. I think I probably even uploaded it back then thinking it'd be nice to see if I got friends here. We can start chatting, et cetera. [00:04:12] According to legal experts that were interviewed by motherboard who wrote this article and has a copy of the internal memo this year, PN regulation specifically prohibits that kind of repurposing of your phone number of trying to put together the social graph and the leaked document shows that Facebook may not even have the ability to live. [00:04:37] How it handles user's data. Now I was on a number of radio stations this week, talking about this. And the example I gave is just look at an average business from the time it start, Facebook started how right? Wildly scraping pictures of young women off of Harvard university. Main catalog, contact page, and then asking people what do you think of this? This person, that person. And off they go, trying to rate them. Yeah. Yeah. All that matters to a woman, at least to Courtney, to mark Zuckerberg girl, all the matters about a woman is how she looks. Do I think she's pretty or not? [00:05:15] It's ridiculous. What he was doing. It just, oh, that's zackerburg who he is not a great guy anyways. So you go from stealing pictures of young ladies asking people to rate them, putting together some class information and stuff there at Harvard, and then moving on to other universities and then open it up even wider and wider. [00:05:42] And of course, that also created demand because you can't get on. If you're not at one of the universities that we have set it up for. And then you continue to grow. You're adding these universities, certainly starting to collect data and you are making more money than God. So what do you do? You don't have to worry about any efficiencies. [00:06:02] I'll tell you that. Right? One thing you don't have to do is worry about gee. We've got a lot of redundant work going on here. We've got a lot of teams working on basically the same thing. No, you've got more money than you can possibly shake a stick at. So now you go ahead and send that money to this group or that group. [00:06:24] And they put together all of the basic information, that they want. Pulling it out of this database and that database in there doing some correlation, writing some really cool CQL queries with mem credible joins and everything else. And now that becomes part of the main code for Facebook. [00:06:45] And then Facebook goes on to the next little project and they do the same thing. Then the next project, then the next project. And then someone comes along and says, Hey, we. This feature, that feature for advertisers and then in that goes, and then along comes candidate Obama. And they, one of the groups inside Facebook says, yeah here we go. [00:07:09] Here's all of the information we have about everybody and it's free. Don't worry about it. And then when Trump actually bought it and hired a company to try and process some of that information he got in trouble. No but the. The whole campaign could get access to anything they wanted to, again, because the data wasn't controlled, they had no idea who was doing what with the data. [00:07:34] And according to this internal memo, they still don't know. They don't even know if they can possibly comply with these regulations, not just in Europe, but we have regulations in pretty much all of the 50 states in the U S Canada of course, has their own Australia and New Zealand think about all the places. [00:07:57] Facebook makes a lot of. So here's a quote from that we build systems with open borders. The result of these open systems and open culture is well-described with an analogy. Imagine you hold a bottle of ink in your hand, the bottle of ink is a mixture of all kinds of user data. You pour that ink into a lake of water and K and it flows every year. [00:08:22] The document read. So how do you put that ink back in the bottle? I, in the right bottle, how do you organize it again? So that it only flows to the allowed places in the lake? They're totally right about that. Where did they collect it from? Apparently they don't even know where they got some of this information. [00:08:43] This data from reminds me of the no fly list. You don't know you're on it and you can't get yourself off of it. It's crazy. So this document that we're talking about, it was written last year by. Privacy engineers on the ad and business product team, whose mission is to make meaningful connections between people and businesses and which quote sits at the center of our monetization strategy. [00:09:06] And is the engine that powers Facebook's growth. Interesting. Interesting problems. And I see this being a problem well into the future for more and more of these companies, look at Twitter as an example that we've all heard about a lot lately. And then I've talked about as well along comes Elon Musk and he says wait a minute. [00:09:29] I can make Twitter way more profitable. We're going to get rid of however many people over a thousand, and then we are going to hire more people. We're going to start charging. We're going to be more efficient. You can bet all of these redundancies that are in Facebook are also there. And Twitter also has to comply with all of these regulations that Facebook is freaking out about it for a really a very good reason. [00:10:00] So this document is available to anybody who wants to look at it. I'm looking at it right now, talking about regulatory landscape and the fundamental problems Facebook's data lake. And this is a problem that most companies have not. As bad as Facebook does the button. Most companies you write, you grow. I have yet to walk into a business that needs help with cybersecurity and find everything in place as it should be because it grew organically. [00:10:32] Do you started out with a little consumer firewall router, wifi, and then you added to it and you put a switch here and you added another switch behind that and move things around. This is normal. This is not total incompetence on the part of the management, but my gosh, I don't know. Maybe they need an Elon Musk. [00:10:52] Just straighten them out as well. Hey, stick around. I'll be right back and sign up firstname.lastname@example.org. [00:11:02] Apparently looting is one of the benefits of being a Russian soldier. And according to the reports coming out of Ukraine, they've been doing it a lot, but there's a tech angle on here that is really turning the tables on these Russian Looters. [00:11:19] We know in wars, there are people that loot and typically the various militaries try and make sure, at least recently that looting is kept to an absolute minimum. [00:11:32] Certainly the Americans, the British, even the Nazis during world war II the the socialists they're in. Germany they tried to stop some of the looting that was going on. I think that's probably a very good thing, because what you end up with is just all of these locals that are just totally upset with you. [00:11:57] I found a great article on the guardian and there's a village. I hadn't been occupied for about a month by Russian troops and the people came back. They are just shocked to see what happened in there. Giving a few examples of different towns. They found that the alcohol was stolen and they left empty bottles behind food wrappers, cigarette butts, thrown all over the place in apartments in the home. [00:12:26] Piles of feces blocking the toilets, family photographs torn, thrown around the house. They took away all of the closes as a code from one of the people, literally everything, male and female coats, boots, shirts, jackets, even my dresses and laundry. This is really something. The Sylvia's didn't do this, but now Russia. [00:12:49] The military apparently does. So over the past couple of weeks, there have been reporting from numerous places where Russian troops had occupied Ukrainian territory and the guardian, which is this UK newspaper collected evidence to suggest looting by Russian forces was not merely a case of a few way, word soldiers, but a systematic part of Russian military behavior across multiple towns. [00:13:17] And villages. That's absolutely amazing. Another quote here, people saw the Russian soldiers loading everything onto your old trucks. Everything they could get their hands on a dozen houses on the villages. Main street had been looted as well as the shops. Other villagers reported losing washing machines, food laptops, even as sofa, air conditioner. [00:13:41] Being shipped back, just you might use ups here or they have their equivalent over there. A lady here who was the head teacher in the school, she came back in, of course, found her home looted and in the head teacher's office. She found an open pair of scissors that had been jammed into a plasma screen that was left behind because if they can't steal it, they're going to destroy it. [00:14:07] They don't wanna leave anything behind. They found the Russian to take in most of the computers, the projectors and other electronic equipment. It's incredible. So let's talk about the turnaround here. You might've heard stories about some of these bad guys that have smashed and grabbed their way into apple stores. [00:14:27] So they get into the apple store. They grab laptops on iPads, no longer iPods, because they don't make those anymore. And I phone. And they take them and they run with them. Nowadays there's not a whole lot of use for those. Now what they have been doing, some of these bad guys is they'd take some parts and use them in stolen equipment. [00:14:52] They sell them on the used market, et cetera. But when you're talking about something specific, like an iPhone that needs specific activation. Completely different problem arises for these guys because that iPhone needs to have a SIM card in order to get onto the cell network. And it also has built in serial numbers. [00:15:15] So what happens in those cases while apple goes ahead and disables them. So as soon as they connect to the internet, they didn't say they put them on wifi. They don't get a SIM card. They don't. Service from T-Mobile or Verizon or whoever it might be. So now they just connect to the wifi and it calls home. [00:15:33] Cause it's going to get updates and download stuff from the app store and they find that it's been bricked. Now you can do that with a lot of mobile device managers that are available for. All kinds of equipment nowadays, but certainly apple equipment where if a phone is lost or stolen or a laptop or other pieces of equipment, you can get on the MDM and disable it, have it remotely erase, et cetera. [00:16:00] Now, please have had some interesting problems with that. Because a bad guy might go ahead and erase a smartphone. That's in the evidence locker at the police station. So they're doing things like putting them into Faraday cages or static bags or other things to try and stop that. So I think we've established here that the higher tech equipment is pretty well protected. [00:16:25] You steal it. It's not going to do you much. Good. So one of the things the Russian stole when they were in a it's called a, I think you pronounced. Melad Mellott DePaul which is again, a Ukrainian city is they stole all of the equipment from a farm equipment dealership and shipped it to check. Now that's according to a source in a businessman in the area that CNN is reporting on. [00:16:56] So they shipped this equipment. We're talking about combine harvesters were 300 grand a piece. They shipped it 700 miles. And the thieves were ultimately unable to use the equipment because it had been locked remotely. So think about agriculture equipment that John Deere, in this case, these pieces of equipment, they, they drive themselves. [00:17:23] It's atonomous it goes up and down the field. Goes to any pattern that you want to it'll bring itself within a foot or an inch of your boundaries, of your property being very efficient the whole time, whether it's planting or harvesting, et cetera. And that's just a phenomenal thing because it saves so much time for the farmer makes it easier to do the companies like John Deere. [00:17:49] Want to sell as many pieces of this equipment as they possibly can. And farming is known to be a what not terribly profitable business. And certainly isn't like Facebook. So how can they get this expensive equipment into the hands of a lot of farmers? What they do is they use. So you can lease the equipment through leasing company or maybe directly from the manufacturer and now you're off and running. [00:18:16] But what happens if the lease isn't paid now? It's one thing. If you don't pay your lease on a $2,000 laptop, right? They're probably not going to come hunting for you, but when you're talking about a $300,000 harvester, they're more interested. So the leasing company. Has titled to the equipment and the leasing company can shut it off remotely. [00:18:41] You see where I'm going with this so that they can get their equipment in the hands of more farmers because the farmers can lease it. It costs them less. They don't have to have a big cash payment. You see how this all works. So when the Russian forces stole this equipment, that's valued, total value here is about $5 million. [00:19:02] They were able to shut it all off. And th the, obviously if you can't start the engine, because it's all shut off and it's all run by computers nowadays, and there's pros and cons to that. I think there's a lot of cons, but what are you going to do? How's that going to work for? Isn't going to work for you. [00:19:22] And they were able to track it and had GPS trackers find out exactly where it was. That's how they know it was Tara taken to Chechnya and could be controlled remotely. And in this case, how did they control it? They completely. Shut it off, even if they sell the harvesters for spare parts to learn some money, but they sure aren't gonna be able to sell them for the 300 grand that they were actually worth. [00:19:48] Hey, stick around. We'll be right back and visit me email@example.com. If you sign up there, you'll be able to get my insider show notes. And every week I have a quick. Training right there. New emails, Craig Peterson.com. [00:20:05] If you've been worried about ransomware, you are right to worry. It's up. It's costly. And we're going to talk about that right now. What are the stats? What can you do? What happens if you do get hacked? Interesting world! [00:20:20] Ransomware has been a very long running problem. I remember a client of ours, a car dealership who we had gone in. [00:20:31] We had improved all of their systems and their security, and one of them. People who was actually a senior manager, ended up downloading a piece of ransomware, one of these encrypted ones and opened it up and his machine all of a sudden, guess what it had ransomware on it. One of those big. Green's that say, pay up and send us this much Bitcoin, and here's our address. [00:21:00] All of that sort of stuff. And he called us up and said, what's going on here? What happened? First of all, don't bring your own machine into the office. Secondly, don't open up as particularly encrypted files using a password that they gave. And thirdly, we stopped it automatically. It did not spread. [00:21:20] We were able to completely restore his computer. Now let's consider here the consequences of what happened. So he obviously was scared. And within a matter of a couple of hours, we actually had him back to where he was and it didn't spread. So the consequences there, they weren't that bad. But how about if it had gotten worse? [00:21:47] How about if the ransomware. Also before it started holding his computer ransom, went out and found all of the data about their customers. What do you think an auto dealership would love to hear that all of their customer data was stolen and released all of the personal data of all of their customers? [00:22:08] Obviously not. So there's a potential cost there. And then how long do you think it would take a normal company? That thinks they have backups to get back online. All I can tell you it'll take quite a while because the biggest problem is most backups don't work. We have yet to go into a business that was actually doing backups that would work to help restore them. [00:22:35] And if you're interested, I can send you, I've got something I wrote up. Be glad to email it back to you. Obviously as usual, no charge. And you'll be able to go into that and figure out what you should do. Cause I, I break it down into the different types of backups and why you might want to use them or why you might not want to use them, but ransomware. [00:22:58] Is a kind of a pernicious nasty little thing, particularly nowadays, because it's to two factor, first is they've encrypted your data. You can't get to it. And then the second side of that is okay I can't get to my data and now they're threatening to hold my data ransom or they'll release. So they'll put it out there. [00:23:22] And of course, if you're in a regulated industry, which actually car dealers are because they deal with financial transactions, leases, loans, that sort of thing you can lose your license for your business. You can, you lose your ability to go ahead and frankly make loans and work with financial companies and financial instruments. [00:23:45] It could be a very big. So there are a lot of potential things that can happen all the way from losing your reputation as a business or an individual losing all of the money in your operating account. And again, we've got a client that we picked up afterwards. That yes, indeed. That lost all of the money in their operating account. [00:24:09] And then how do you make payroll? How do you do things? There's a new study that came out from checkpoint. Checkpoint is one of the original firewall companies and they had a look at ransomware. What are the costs of ransomware? Now bottom line, I'm looking at some stats here on a couple of different sites. [00:24:29] One is by the way, Conti, which is a big ransomware gang that also got hacked after they said we are going to attack anyone. That doesn't defend Plaid's invasion of Ukraine, and then they got hacked and their information was released, but here's ransomware statistics. This is from cloud words. First of all, the largest ransom demand is $50 million. [00:24:55] And that was in 2021 to Acer big computer company. 37% of businesses were hit by ransomware. In 2021. This is amazing. They're expecting by 2031. So in about a decade, ransomware is going to be costing about $265 billion a year. Now on average. Ransomware costs businesses. 1.8, $5 million to recover from an attack. [00:25:25] Now that's obviously not a one or two person place, but think of the car dealer again, how much money are they going to make over the year or over the life of the business? If you're a car dealer, you have a license to print money, right? You're selling car model or cars from manufacturers. And now you have the right to do that and they can remove that. [00:25:48] How many tens, hundreds of millions of dollars might that end up costing you? Yeah. Big deal. Total cost of ransomware last year, $20 billion. Now these are the interesting statistics here right now. So pay closer attention to this 32% of ransomware victims paid a ransom. So about a third Peter ransom demand. [00:26:12] Lastly. It's actually down because my recollection is it used to be about 50% would pay a ransom. Now on average that one third of victims that paid a ransom only recovered 65% of their data. Now that differs from a number I've been using from the FBI. That's a little bit older that was saying it ends it a little better than 50%, but 65% of pain victims recovered their. [00:26:41] Now isn't that absolutely amazing. Now 57% of companies were able to recover their data, using a cloud backup. Now think about the different types of backup cloud backup is something that can work pretty well if you're a home user, but how long did it take for your system to get back? Probably took weeks, right? [00:27:05] For a regular computer over a regular internet line. Now restoring from backups is going to be faster because your downlink is usually faster than your uplink. That's not true for businesses that have real internet service like ours. It's the same bandwidth up as it is down. But it can take again, days or weeks to try and recover your machine. [00:27:28] So it's very expensive. And I wish I had more time to go into this, but looking at the costs here and the fact that insurance companies are no longer paying out for a lot of these ransomware attacks, it could be credibly expensive for you incredibly. The number one business types by industry for ransomware attacks, retail. [00:27:59] That makes sense. Doesn't it. Real estate. Electrical contractors, law firms and wholesale building materials. Isn't that interesting? And that's probably because none of these people are really aware or conscious of doing what a, of keeping their data secure of having a good it team, a good it department. [00:28:24] So there's your bottom line. Those are the guys that are getting hit. The most, the numbers are increasing dramatically and your costs are not just in the money. You might pay as a ransom. And as it turns out in pretty much every case prevention. Is less expensive and much better than the cure of trying to pay ransom or trying to restore from backups. [00:28:52] Hey, you're listening to Craig Peterson. You can get my weekly show notes by just going to craig peterson.com. [00:29:00] You and I have talked about passwords before the way to generate them and how important they are. We'll go over that again a little bit in just a second, but there's a new standard out there that will eliminate the need for passwords. [00:29:16] Passwords are a necessary evil, at least they have been forever. I remember, I think the only system I've ever really used that did not require passwords was the IBM 360. [00:29:31] Yeah, 360, you punch up the cards, all of the JCL you feed the card deck in and off it goes. And does this little thing that was a different day, a different era. When I started in college in university, we. We had a remote systems, timeshare systems that we could log into. And there weren't much in the line of password requirements. [00:29:58] And, but you had a username, you had a simple password. And I remember one of our instructors, his name was Robert, Andrew Lang, and his password was always some sort of a combination of RA Lang. So it was always easy to guess what his password was. Today. It has gotten a lot worse today. We have devices with us all the time. [00:30:22] You might be wearing a smart watch. That requires a password. You course probably have a smartphone that also maybe requiring a password. Certainly after it boots nowadays they use fingerprints or facial recognition, which is handy, but it has its own drawbacks. But how about the websites? You're going to the systems you're using in you're at work and logging in. [00:30:49] They all require password. And usernames of some sort or another well, apple, Google, and Microsoft have all committed to expanding their support for a standard. That's actually been out there for a few years. It's called the Fido standard. And the idea behind this is that you don't have to have a password in order to. [00:31:15] Now that's really an interesting thing, right? Just looking at it because we're so used to have in this password only authenticate. And of course the thing to do there is to make sure you have for your password, multiple words in the password, it should really be a pass phrase. And between the words put in special characters or numbers, maybe. [00:31:41] Upper lower case a little bit. In those words, those are the best passwords, 20 characters, 30 characters long. And then if you have to have a pin, I typically use a 12 digit pin. And how do I remember all of these? Cause I use a completely different password for every website and right now, Let me pull it up. [00:32:03] I'm using one password dot coms, password manager. And my main password for that is about 25 characters long. And I have thirty one hundred and thirty five. And trees here in my password manager, 3,100, that is a whole lot of passwords, right? As well as software licenses and a few other things in there. [00:32:30] That's how we remember them is using a password manager. One password.com is my favorite. Now, obviously I don't make any money by referring you there. I really do like that. Some others that I've liked in the past include last pass, but they really meant. With some of their cybersecurity last year and I lost my faith in it. [00:32:51] So now what they're trying to do is make these websites that we go to as well as some apps to have a consistent, secure, and passwordless. And they're going to make it available to consumers across all kinds of devices and platforms. That's why you've got apple, Google, and Microsoft all committing to it. [00:33:15] And you can bet everybody else is going to follow along because there's hundreds of other companies that have decided they're going to work with the Fido Alliance and they're going to create this passwordless future. Which I like this idea. So how does this work? Basically you need to have a smartphone. [00:33:33] This is, I'm just going to go with the most standard way that this is going to work here in the future, and you can then have. Passkey, this is like a multi-factor authentication or two factor authentication. So for instance, right now, when I sign into a website online, I'm giving a username, given a password, and then it comes up and it asks me for a code. [00:33:57] So I enter in a six digit code and that code changes every 30 seconds. And again, I use my password manager from one password. In order to generate that code. So that's how I log into Microsoft site and Google sites and all kinds of sites out there. So it's a similar thing here now for the sites for my company, because we do cyber security for businesses, including regulated businesses. [00:34:24] We have biometrics tied in as. So to log into our systems, I have to have a username. I have to have a password. I then am sent to a single sign-on page where I have to have a message sent to my smart device. That then has a special app that uses biometrics either a face ID or a fingerprint to verify who I am. [00:34:49] Yeah, there's a lot there, but I have to protect my customers. Something that very few it's crazy. Actual managed security services providers do, but it's important, right? By the way, if you want my password. Special report, just go to Craig peterson.com. Sign up for my email list. I'll send that to you. [00:35:13] That's what we're sending out right now for anyone who signs up firstname.lastname@example.org. And if you'd like a copy of it in you're already on the list, just go ahead and email me. At Craig peterson.com and ask for the password special report where I go through a lot of this sort of thing. So what will happen with this is you go to a website and I might come up with a QR code. [00:35:37] So you then scan that QR code with your phone and verify it, authorize it on your phone. You might again to have it set up so that your phone requires a facial recognition or perhaps it'll require a fingerprint. And now you are. Which is very cool. They fix some security problems in Fido over the last few years, which is great over the coming year. [00:36:02] You're going to see this available on apple devices, Google Microsoft platforms, and it really is simple, stronger authentication. That's sort of Fido calls it. But it is going to make your life a lot easy, easier. It is a standard and the passwordless future makes a whole lot of sense for all of us. Now, I want to talk about another thing here that just bothered me for a long time. [00:36:30] I have a sister. Who is in the medical field and gives prescriptions, doctor thing. And I think she's not quite a doctor. I can't remember what she has. She's an LPN or something. And anyhow, so she. We'll get on a zoom call with someone and they'll go through medical history and what's happening right now and she'll make prescriptions. [00:36:57] And so I warned her about that saying, it is very bad to be using zoom because zoom is not secure. Never has been, probably never will be right. If you want secure. To go and pay for it from one of these providers like WebEx, that's what we use. We have a version of WebEx that is set up to be secure. [00:37:20] So I talked to her about that and said, Hey, listen, you can't do this. You've really got to go another way here. And so she started using one of these mental or. Medical health apps. What I want to talk about right now specifically are some checks that were just performed some audits on mental health apps. [00:37:45] That's why I messed up a second ago, but what they looked at is that things are a serious problem there. And then fact, the threat post, just calling it a. Frankly, just plain old creepy. So they've got some good intentions. They want to help with mental health. You've probably seen these or at least heard them advertise. [00:38:06] So you can get on the horn with a mental health professional, a doctor or otherwise in order to help you here with your psychological or spiritual wellness. And people are sharing their personal and sensitive data with third parties and have 32 mental health and prayer mobile apps that were investigated by the open source organization. [00:38:32] 28, 28 of the 32 were found to be inherently insecure and were given a privacy not included label, including others here. So this is a report. That was released here by the open source organization, tied into Mozilla. Those are the Firefox people. They have what they call their minimum security standards. [00:38:56] So things like requiring strong passwords, managing security, updates, and vulnerabilities, et cetera. 25 of the 32 failed to meet. Even those minimum security standards. So these apps are dealing with some of the most sensitive mental health and wellness issues people can possibly have, right? Depression, anxieties, suicidal fonts, domestic violence, eating disorders. [00:39:23] And they are being just terrible with your security Mozilla researchers spent 255 hours or about eight hours per product pairing under the hood of the security, watching the data that was going back and forth, right between all of these mental health and prayer apps. It was just crazy. So for example, eight of the apps reviewed, allowed weak passwords, that range. [00:39:52] One digit one as the password to 1, 1, 1, 1, while a mental health app called a mood fit only required one letter or digit as a password. Now that is very concerning for an app that collects mood and symptom data. So be very careful. Two of the apps better help a popular app that connects users with therapists and better stop suicide, which is a course of suicide prevention app have vague and messy, according to Mozilla privacy policies that have little or no effect on actual. [00:40:30] User data protection. So be very careful. And if you're a mental health, professional or medical professional, don't just go and use these open video calls, et cetera, et cetera, find something good. And there are some standards out there. Again. Visit me online, get my insider show notes every week. Get my little mini trends. [00:40:56] And they come up most weeks. Just go to Craig peterson.com. And I'll send you my special report on passwords and more. [00:41:06] We know the Russians have been attacking us. I've talked a lot about it on the radio station, all kinds of stations. In fact, here over the last couple of weeks, and I am doing something special, we are going through the things you can do to keep safe. [00:41:23] Last week we started doing something I promise we would continue. [00:41:27] And that is how can you protect yourself when it comes to the Russians, right? When it comes to the bad guys, because the Russians are definitely the bad guys. There's a few things you can do. And there's a few things, frankly, you shouldn't be doing. And that's exactly what we're going to talk about right now. [00:41:45] So last week he went over some steps, some things that you can look at that you should look at that are going to help protect you. And we are going to go into this a whole lot more today. And so I want you to stick around and if you miss anything, you can go online. You can go to Craig peterson.com, make sure you sign up there for my email. [00:42:08] And what I'm going to do for you is. Send you a few different documents now where we can chat back and forth about it, but I can send you this. Now I'm recording this on video as well as on audio. So you can follow along if you're watching either on YouTube or. Over on rumble and you can find it also on my website. [00:42:32] I've been trying to post it up there too, but right now let's talk about what we call passive backend protections. So you've got the front end and the front end of course, is. Stuff coming at you, maybe to the firewall I've mentioned last week about customers of mine. I was just looking at a few customers this week, just so I could have an idea of their firewalls. [00:42:59] And they were getting about 10 attacks per minute. Yeah. And these were customers who have requirements from the department of defense because they are defense sub subcontractors. So again, Potential bad guys. So I looked up their IP addresses and where the attacks were coming from. Now, remember that doesn't mean where they originated because the bad guys can hop through multiple machines and then get onto your machine. [00:43:28] What it means is that all, ultimately they ended up. Coming from one machine, right? So there's an IP address of that machine. That's attacking my clients or are attacking my machines. That just happens all the time. A lot of scans, but some definite attacks where they're trying to log in using SSH. [00:43:48] And what I found is these were coming from Slovakia, Russia, and Iran. Kind of what you were expecting, right? The Iranians, they just haven't given up yet. They keep trying to attack, particularly our military in our industry. One of the things we found out this week from, again, this was an FBI notice is that the Russians have been going after our industrial base. [00:44:15] And that includes, in fact, it's more specifically our automobile manufacturers we've already got problems, right? Try buying a new car, try buying parts. I was with my friend, just this. I helped them because he had his car right. Need to get picked up. So I took him over to pick up his car and we chatted a little bit with this small independent automotive repair shop. [00:44:40] And they were telling us that they're getting sometimes six, eight week delays on getting parts and some parts. They just can't. So they're going to everything from junkyards on out, and the worst parts are the parts, the official parts from the car manufacturers. So what's been happening is Russia apparently has been hacking into these various automobile manufacturers and automobile parts manufacturers. [00:45:10] And once they're inside, they've been putting in. A remote control button net. And those botnets now have the ability to wake up when they want them to wake up. And then once they've woken up, what do they do? Who knows? They've been busy erasing machines causing nothing, but having they've been doing all kinds of stuff in the past today, they're sitting there. [00:45:31] Which makes you think they're waiting, it's accumulate as much as you possibly can. And then once you've got it all accumulated go ahead and attack. So they could control thousands of machines, but they're not just in the U S it's automobile manufacturers in Japan. That we found out about. [00:45:50] So that's what they're doing right now. So you've got the kind of that front end and back end protections. So we're going to talk a little bit about the back end. What does that mean? When a cybersecurity guy talks about the backend and the protections. I got it up on my green right now, but here's the things you can do. [00:46:10] Okay. Remember, small businesses are just getting nailed from these guys, because again, they're fairly easy targets. One change your passwords, right? How many times do we have to say that? And yet about 70% of businesses out there are not using a good password methodology. If you want more information on passwords, two factor authentication, you name it. [00:46:37] Just email me M email@example.com. I want to get the information out now. You got to make sure that all of the passwords on your systems are encrypted are stored in some sort of a good password vault as you really should be looking at 256 bit encryption or better. I have a vendor of. That I use. So if you get my emails every week, when them, there's the little training. [00:47:06] And so I'll give you a five minute training. It's written usually it's in bullet point for, I'm just trying to help you understand things. That provider of mine has a big database and there's another provider that I use that is for. So the training guys use the database of my provider. [00:47:27] In using that database, they're storing the passwords and the training providers putting passwords in the clinics. Into the database, which is absolutely crazy. So again, if you're a business, if you're storing any sort of personal information, particularly passwords, make sure that you're using good encryption and your S what's called salting the hash, which means. [00:47:53] You're not really storing the password, just joining assaulted hash. I can send you more on this. If you are a business and you're developing software that's, this is long tail stuff here. Configure all of the security password settings so that if someone's trying to log in and is failing that, and you block it, many of us that let's say you're a small business. [00:48:15] I see this all of the time. Okay. You're not to blame. You, but you have a firewall that came from the cable company. Maybe you bought it at a big box retailer. Maybe you bought it online over at Amazon, as hurricane really great for you. Has it got settings on there that lets you say. There's 20 attempts to log in. [00:48:38] Maybe we should stop them. Now, what we do personally for our customers is typically we'll block them at somewhere around three or four failed attempts and then their passwords block. Now you can configure that sort of thing. If you're using. Email. And that's an important thing to do. Let me tell you, because we've had some huge breaches due to email, like Microsoft email and passwords and people logging in and stealing stuff. [00:49:06] It was just a total nightmare for the entire industry last year, but limit the number of login retries as well as you're in there. These excessive login attempts or whatever you want to define it as needs to lock the account. And what that means is even if they have the right password, they can't get in and you have to use an administrative password in order to get in. [00:49:31] You also want to, what's called throttle, the rate of repeated logins. Now you might've gotten caught on this, right? You went to your bank, you went to E-bay, you went to any of these places and all of a sudden. And denied you write it blocked you. That can happen when your account is on these hackers lists. [00:49:51] You remember last week we talked about password spraying while that's a very big deal and hackers are doing the sprain trick all of the time, and that is causing you to get locked out of your own account. So if you do get locked out, remember it might be because someone's trying to break. Obviously you have to enforce the policies. [00:50:16] The capture is a very good thing. Again, this is more for software developer. We always recommend that you use multifactor or two factor authentication. Okay. Do not use your SMS, your text messages for that, where they'll send you a text message to verify who you are. If you can avoid that, you're much better off. [00:50:36] Cause there's some easy ways to get around that for hackers that are determined. Okay. A multi-factor again, installed an intrusion. system. We put right at the network edge and between workstations and servers, even inside the network, we put detection systems that look for intrusion attempts and block intrusion attempts. [00:51:02] A very important use denied lists to block known attackers. We build them automatically. We use some of the higher end Cisco gates. Cisco is a big network provider. They have some of the best hardware and software out there, and you have to subscribe to a lot of people complain. I ain't going to just go buy a firewall for 200 bucks on Amazon. [00:51:24] Why would I pay that much a month just to to have a Cisco firewall? And it's like praying pain for the brand. I've got by logo chert on here. Oh, I wouldn't pay for that. No, it's because they are automatically providing block lists that are updated by the minute sometimes. And then make sure you've got an incident response plan in place. [00:51:50] What are you going to do when they come for you? What are you going to do? [00:51:55] Now we're going to talk about prevention. What can you do an order to stop some of these attacks that are coming from Russia and from other countries, it is huge. People. Believe me, this is a very big problem. And I'm here to help. [00:52:12] We've reviewed a number of things that are important when it comes to your cyber security and your protection. [00:52:20] We talked about the front end. We talked about the backend. Now we're going to talk about pure prevention and if you're watching. Online. You'll be able to see my slides as they come up, as we talk about some of this stuff and you'll find me on YouTube and you'll also find me on rumble, a fairly new platform out there platform that doesn't censor you for the things you say. [00:52:44] Okay. So here we go. First of all, enabling your active directory password protection is going to. Four's password protection all the way through your business. Now I've had some discussions with people over the months, over the years about this whole thing and what should be done, what can be done, what cannot be done. [00:53:09] Hey, it's a very big deal when it comes to password protection and actor directory, believe it or not, even though it's a Microsoft product is pretty darn good at a few things. One of them is. Controlling all the machines and the devices. One of the things we do is we use an MDM or what used to be a mobile device manager called mass 360. [00:53:34] It's available from IBM. We have a special version of that allows us as a managed security services provider to be able to control everything on people's machines. Active directory is something you should seriously consider. If you are a Mac based shop. Like I am. In fact, I'm sitting right now in front of two max that I'm using right now, you'll find that active directory is a little bit iffy. [00:54:04] Sometimes for max, there are some work around and it's gotten better mastery. 60 is absolutely the way to go, but make sure you've got really good. Passwords and the types of passwords that are most prone to sprain the attacks are the ones you should be banning specifically. Remember the website? Have I been poned? [00:54:28] Yeah. It's something that you should go to pretty frequently. And again, if you miss anything today, just email me M firstname.lastname@example.org. Believe me, I am not going to harass you at all. Okay. Now, the next thing that you should be doing is what's called red team blue team. Now the red team is a group of people, usually outside of your organization. [00:54:54] If you're a big company they're probably inside, but the red team is the team that attacks you. They're white hat hackers, who are attacking you, looking for vulnerabilities, looking for things that you should or shouldn't be doing. And then the blue team is the side that's trying to defend. So think of, like war games. [00:55:12] Remember that movie with Matthew Broderick all of those decades ago and how the, he was trying to defend that computer was trying to defend that it moved into an attack mode, right? Red team's attack, blue team is defend. So you want. To conduct simulated attacks. Now w conducting these attacks include saying, oh my let's now put in place and execute our plan here for what are we going to do once we have a. [00:55:44] And you darn well better have a breach plan in place. So that's one of the things that we help as a fractional chief information security officer for companies, right? You've got to get that in place and you have to conduct these simulated attacks and you have to do penetration testing, including password spraying attacks. [00:56:04] There's so many things you can do. The one of the things that we like to do and that you might want to do, whether you're a home user, retiree or a business is go and look online, you can just use Google. I use far more advanced tools, but you can use Google and look for your email address right there. [00:56:23] Look for the names of people inside your organization. And then say wait a minute, does that data actually need to be there? Or am I really exposing the company exposing people's information that shouldn't be out there because you remember the hackers. One of the things they do is they fish you fish as in pH. [00:56:47] So they'll send you an email that looks like. Hey let me see. I know that Mary is the CFO, and I know that Joe's going to be out of town for two weeks in The Bahamas, not a touch. So while he's got. I'm going to send an email to Mary, to get her to do something, to transfer the company's funds to me. [00:57:06] Okay. So that's what that's all about. You've got to make sure, where is our information? And if you go to my company's page, mainstream.net, you'll see on there that I don't list any of the officers or any of the people that are in the company, because that again is a security problem. [00:57:24] We're letting them know. I go to some of these sites, like professional sites lawyers, doctors, countenance, and I find right there all, are there people right there top people or sometimes all of them. And then we'll say, yeah, I went to McGill university, went to Harvard, whatever my B. It's all there. So now they've got great information to fish you, to fish that company, because all they have to do is send an email to say, Hey, you remember me? [00:57:56] We're in Harvard when this class together. And did you have as a professor to see how that works? Okay. You also want to make. That you implement, what's called a passwordless user agent, and this is just so solely effective. If they cannot get into your count, what's going to, what could possibly go wrong, but one of the ways to not allow them into the count is to use. [00:58:24] Biometrics. We use something called duo and we have that tied into the single sign-on and the duo single sign-on works great because what it does now is I put in, I go to a site, I put it into my username and. Pulls up a special splash page that is running on one of our servers. That again asks me for my duo username. [00:58:48] So I've got my username for the site then to my dual username and my duo password single sign on. And then it sends me. To an app on my smart device, a request saying, Hey, are you trying to log into Microsoft? And w whatever it might be at Microsoft, and you can say yes or no, and it uses biometric. [00:59:11] So those biometrics now are great because it says, oh, okay, I need a face ID or I need a thumb print, whatever it might be that allows a generalized, a password, less access. Okay. Password less. Meaning no pass. So those are some of the top things you can do when it comes to prevention. And if you use those, they're never going to be able to get at your data because it's something you have along with something, it works great. [00:59:45] And we like to do this. Some customers. I don't like to go through those hoops of the single sign-on and using duo and making that all work right where we're fine with it. We've got to keep ourselves, at least as secure as the DOD regulations require unlike almost anybody else in industry, I'm not going to brag about it. [01:00:09] But some of our clients don't like to meet the tightest of controls. And so sometimes they don't. I hate to say that, but they just don't and it's a fine line between. Getting your work done and being secure, but I think there's some compromises it can be readily made. We're going to talk next about saving your data from ransomware and the newest ransomware. [01:00:36] We're going to talk about the third generation. That's out there right now. Ransomware, it's getting crazy. Let me tell ya and what it's doing to us and what you can do. What is a good backup that has changed over the last 12 months? It's changed a lot. I used to preach 3, 2, 1. There's a new sheriff in town. [01:00:58] Stick around Craig peterson.com. [01:01:02] 3, 2, 1 that used to be the standard, the gold standard for backing up. It is no longer the case with now the third generation of ransomware. You should be doing something even better. And we'll talk about it now. [01:01:19] We're doing this as a simulcast here. It's on YouTube. It is also on rumble. [01:01:27] It's on my email@example.com because we're going through the things that you can do, particularly if you're a business. To stop the Russian invasion because as we've been warned again and again, the Russians are after us and our data. So if you missed part of what we're talking about today, or. [01:01:50] Last week show, make sure you send me an email. firstname.lastname@example.org. This is the information you need. If you are responsible in any way for computers, that means in your home, right? Certainly in businesses, because what I'm trying to do is help and save those small businesses that just can't afford to have full-time. [01:02:15] True cyber security personnel on site. So that's what the whole fractional chief information security officer thing is about. Because you just, you can't possibly afford it. And believe me, that guy that comes in to fix your computers is no cyber security expert. These people that are attacking our full time cybersecurity experts in the coming from every country in the world, including the coming from the us. [01:02:44] We just had more arrests last week. So let's talk about ransomware correctly. Ransomware, very big problem. Been around a long time. The first version of ransomware was software got onto your computer through some mechanism, and then you had that red screen. We've all seen that red screen and it says, Hey, pay up buddy. [01:03:07] It says here you need to send so many Bitcoin or a fraction of a Bitcoin or so many dollars worth of Bitcoin. To this Bitcoin wallet. And if you need any help, you can send email here or do a live chat. They're very sophisticated. We should talk about it some more. At some point that was one generation. [01:03:29] One generation two was not everybody was paying the ransoms. So what did they do at that point? They said let me see if they, we can ransom the data by encrypting it and having them pay us to get it back. 50% of the time issue got all your data back. Okay. Not very often. Not often enough that's for sure. [01:03:49] Or what we could do is let's steal some of their intellectual property. Let's steal some of their data, their social security number, their bank, account numbers, et cetera. They're in a, in an Excel spreadsheet on their company. And then we'll, if they don't pay that first ransom, we'll tell them if they don't pay up, we'll release their information. [01:04:10] Sometimes you'll pay that first ransom and then they will hold you ransom a second time, pretending to be a different group of cyber terrorists. Okay. Number three, round three is what we're seeing right now. And this is what's coming from Russia, nears, everything we can tell. And that is. They are erasing our machines. [01:04:31] Totally erasing them are pretty sophisticated ways of erasing it as well, so that it sinks in really, it's impossible to recover. It's sophisticated in that it, it doesn't delete some key registry entries until right at the very end and then reboots and computer. And of course, there's. Computer left to reboot, right? [01:04:55] It's lost everything off of that hard drive or SSD, whatever your boot devices. So let's talk about the best ways here to do some of this backup and saving your data from ransomware. Now you need to use offsite disconnected. Backups, no question about it. So let's talk about what's been happening. [01:05:17] Hospitals, businesses, police departments, schools, they've all been hit, right? And these ransomware attacks are usually started by a person. I'll link in an email. Now this is a poison link. Most of the time, it used to be a little bit more where it was a word document, an Excel document that had something nasty inside Microsoft, as I've said, many times has truly pulled up their socks. [01:05:45] Okay. So it doesn't happen as much as it used to. Plus with malware defender turned on in your windows operating system. You're going to be a little bit safer next step. A program tries to run. Okay. And it effectively denies access to all of that data. Because it's encrypted it. And then usually what it does so that your computer still works. [01:06:09] Is it encrypts all of you, like your word docs, your Excel docs, your databases, right? Oh, the stuff that matters. And once they've got all of that encrypted, you can't really access it. Yeah. The files there, but it looks like trash now. There's new disturbing trends. It has really developed over the last few months. [01:06:31] So in addition to encrypting your PC, it can now encrypt an entire network and all mounted drives, even drives that are marrying cloud services. Remember this, everybody, this is really a big deal because what will happen here is if you have let's say you've got an old driver G drive or some drive mounted off of your network. [01:06:57] You have access to it from your computer, right? Yeah. You click on that drive. And now you're in there and in the windows side Unix and max are a little different, but the same general idea you have access to you have right. Access to it. So what they'll do is any mounted drive, like those network drives is going to get encrypted, but the same thing is true. [01:07:20] If you are attaching a U S B drive to your company, So that USB drive, now that has your backup on it gets encrypted. So if your network is being used to back up, and if you have a thumb drive a USB drive, it's not really a thumb drive, right? There's external drive, but countered by USP hooked up. [01:07:45] And that's where your backup lives. Your. Because you have lost it. And there have been some pieces of software that have done that for awhile. Yeah. When they can encrypt your network drive, it is really going after all whole bunch of people, because everyone that's using that network drive is now effective, and it is absolutely. [01:08:10] Devastating. So the best way to do this is you. Obviously you do a bit of a local backup. We will usually put a server at the client's site that is used as a backup destiny. Okay. So that servers, the destination, all of the stuff gets backed up there. It's encrypted. It's not on the network per se. It's using a special encrypted protocol between each machine and the backup server. And then that backup servers data gets pushed off site. Some of our clients, we even go so far as to push it. To a tape drive, which is really important too, because now you have something physical that is by the way, encrypted that cannot be accessed by the attacker. [01:09:03] It's offsite. So we have our own data center. The, we run the, we manage the no one else has access to it is ours. And we push all of those backups offsite to our data center, which gives us another advantage. If a machine crashes badly, right? The hard disk fails heaven forbid they get ransomware. We've never had that happen to one of our clients. [01:09:29] Just we've had it happen prior to them becoming clients, is that we can now restore. That machine either virtually in the cloud, or we can restore it right onto a piece of hardware and have them up and running in four hours. It can really be that fast, but it's obviously more expensive than in some. [01:09:51] Are looking to pay. All right, stick around. We've got more to talk about when we come back and what are the Russians doing? How can you protect your small business? If you're a one, man, one woman operation, believe it. You've got to do this as well. Or you could lose everything. In fact, I think our small guys have even more to lose Craig peterson.com. [01:10:16] Backups are important. And we're going to talk about the different types of backups right now, what you should be doing, whether you're a one person, little business, or you are a, multi-national obviously a scale matters. [01:10:32] Protecting your data is one of the most important things you can possibly do. [01:10:36] I have clients who had their entire operating account emptied out, completely emptied. It's just amazing. I've had people pay. A lot of money to hackers to try and get data back. And I go back to this one lady over in Eastern Europe who built a company out of $45 million. By herself. And of course you probably heard about the shark tank people, right? [01:11:07] Barbara Cochran, how she almost lost $400,000 to a hacker. In fact, the money was on its way when she noticed what was going on and was able to stop it. So thank goodness she was able to stop it. But she was aware of these problems was looking for the potential and was able to catch it. How many of us are paying that much attention? [01:11:34] And now one of the things you can do that will usually kind of protect you from some of the worst outcomes. And when it comes to ransomware is to backup. And I know everybody says, yeah, I'm backing up. It's really rare. When we go in and we find a company has been backing up properly, it even happens to us sometimes. [01:11:59] We put them back up regimen in place and things seem to be going well, but then when you need the backup, oh my gosh, we just had this happen a couple of weeks ago. Actually this last week, this is what happened. We have. Something called an FMC, which is a controller from Cisco that actually controls firewalls in our customer's locations. [01:12:26] This is a big machine. It monitors stuff. It's tied into this ice server, which is. Looking for nastiness and we're bad guys trying to break in, right? It's intrusion detection and prevention and tying it into this massive network of a billion data points a day that Cisco manages. Okay. It's absolutely huge. [01:12:48] And we're running it in a virtual machine network. So we. Two big blade. Chassies full of blades and blades are each blade is a computer. So it has multiple CPU's and has a whole bunch of memory. It also has in there storage and we're using something that VMware calls visa. So it's a little virtual storage area network. [01:13:15] That's located inside this chassis and there are multiple copies of everything. So if a storage unit fails, you're still, okay. Everything stays up, it keeps running. And we have it set up so that there's redundancy on pond redundancy. One of the redundancies was to back it up to a file server that we have that's running ZFS, which is phenomenal. [01:13:40] Let me tell you, it is the best file system out there I've never ever had a problem with it. It's just crazy. I can send you more information. If you ever interested, just email email@example.com. Anytime. Be glad to send you the open source information, whatever you need. But what had happened is. [01:13:57] Somehow the boot disk of that FMC, that, that firewall controller had been corrupted. So we thought, oh, okay, no problem. Let's look at our backups. Yeah, hadn't backed up since October, 2019. Yeah, and we didn't know it had been silently failing. Obviously we're putting stuff in place to stop that from ever happening again. [01:14:27] So we are monitoring the backups, the, that network. Of desks that was making up that storage area network that had the redundancy failed because the machine itself, somehow corrupted its file system, ext four file system right then are supposed to be corruptible, but the journal was messed up and it was man, what a headache. [01:14:51] And so they thought, okay, you're going to have to re-install. And we were sitting there saying, oh, you're kidding me. Reinstalling this FMC controller means we've got to configure our clients, firewalls that are being controlled from this FMC, all of their networks, all of their devices. We had to put it out. [01:15:07] This is going to take a couple of weeks. So because I've been doing this for so long. I was able to boot up an optics desk and Mount the file system and go in manually underneath the whole FMC, this whole firewall controller and make repairs to it. Got it repaired, and then got it back online. So thank goodness for that. [01:15:33] It happens to the best of us, but I have to say I have never had a new client where they had good backups. Ever. Okay. That, and now that should tell you something. So if you are a business, a small business, whatever it might be, check your backups, double check them. Now, when we're running backups, we do a couple of things. [01:15:57] We go ahead and make sure the backup is good. So remember I mentioned that we h
On this Washington Roundtable episode of the Defense & Aerospace Report Podcast, sponsored by Bell, our guests are Dov Zakheim, PhD, former DoD comptroller, now with the Center for Strategic and International Studies, Dr. Patrick Cronin of the Hudson Institute and Dr. Kathleen McInnis, the director of the Smart Women, Smart Power Initiative at the Center for Strategic and International Studies. Topics: — Implications of one lawmakers, Sen. Rand Paul, R-Ky., blocking move by Congress to approve $40 billion in aid for Ukraine, $7 billion more than requested by President Biden — Finland's formal move to join NATO and what Helsinki brings to the alliance and how Russia will respond — Whether Sweden will follow suit and if enlargement will face opposition from Hungary and Turkey — How Ukraine war will shape the strategic concept to be adopted by NATO members at upcoming summit in Madrid — Value of UK move to strike security pacts with Finland and Sweden in advance of NATO membership announcements — Need for national leaders to make the case for continued support for Ukraine to avoid the conflict becoming “frozen,” handing Russia a victory — Grading President Biden and his team on making the same for Ukraine support — Key takeaways from extraordinary meeting of ASEAN leaders at the White House — Update on newsflow across the Pacific including North Korea's admission of covid outbreak — Britain's strategic security agreement with Japan — Deadly violence in Israel and what it means
For anyone in Washington wanting to understand something in the Defense Department budget, Todd Harrison has been a go-to analyst. Now, after seven years at the Center for Strategic and International Studies, he's leaving to join a defense company. The Federal Drive spoke with him about the move.
During the COVID pandemic, staffing the nation's healthcare facilities has been a challenge pretty much across the board. But the military's hospitals and clinics faced special circumstances. Military clinicians whose day jobs were at military treatment facilities could be pulled away for other COVID-19 missions with little or no notice. The Defense Department office of inspector general looked into this. 26 out of 30 facilities said staffing problems were their biggest challenge. Andre Brown is Program Director for Military Healthcare and Operations at the DoD IG's office. He talked about their findings with Federal News Network's Jared Serbu.
There is no other logical or scientific explanation for the DOD's insistence on the shot mandate. Constitutional expert, lawyer, author, pastor, and founder of Liberty Counsel Mat Staver discusses the important topics of the day with co-hosts and guests that impact life, liberty, and family. To stay informed and get involved - visit www.LC.org
The inspectors general for two intelligence agencies were each overpaid... by tens of thousands of dollars, between 2016 and 2020. That's according to an internal DoD memo a whistleblower supplied to Empower Oversight, an outside watchdog group. There's no clear evidence anyone intentionally did anything wrong. But there's also no evidence the money's been repaid, or that the matter's been properly investigated. Jason Foster is founder and president of Empower Oversight. He talked with Federal News Network's Jared Serbu about what we do and don't know.
Andrea Garrity joined me on the Acquisition Talk podcast to discuss how the government can build relationships with nontraditional companies. She is the Chief Growth Officer at goTenna, a company that offers mesh networking for off-grid devices and decentralized communications. Before that she was vice president at In-Q-Tel and client executive at IBM. In the episode, we discuss an article Andrea recently wrote about bringing startups and government together. She argues that the procurement maze and multi-year timelines creates a capital requirement that is difficult for companies to burden in advance of contract awards. "I think it's hard to ask these companies to take on that burden right away," Andrea says. "Startups are beholden to their board, and the board wants to see market fit and revenue. They're not willing to invest in a contract specialist or a GSA person without first seeing that fit." As a result, many startups focus on the commercial sector first before deciding whether they have the resources to start expanding into the government market. Even then, many new technologies are cross-cutting and delivered "as a service." Andrea describes the difficulty of selling a mesh networking capability to the DoD, where money and attention are inwardly focused on platform stovepipes like bombers, submarines, combat vehicles, and satellites. "How many people can I talk to? How many people can I demo for? And then. When we do those demos, we see people get excited and then they say, Hey, we've got to pull in this other group, figuring out how to engage at a level where we're able to do the demonstration once, instead of 250 times would be great. And I say that as somebody who feels like I'm a veteran at engaging with the government." There is no single "program of record" for many commercial technologies, meaning companies have to try to get a foothold anywhere they can. Selling a product "as a service" is another challenge, where pricing is based on usage rates, like cloud computing or uber rides. These pricing models are entirely different from anything government has used in the past. "The government looks at it and says, 'we cant budget for that.'" Luckily for goTenna, their mesh networking offering is based on a small hardware device and can be sold by the unit. Each unit can send short-burst data like position, text, sensor data, etc., between 8 and 15 miles -- up to 145 miles from an air asset -- and relay that information up to six devices away in a daisy-chain fashion. Yet all this capability, and much of the value, is enabled by software. Here's Andrea: "On the one hand I always say we need to talk about ourselves as a software company. On the other hand, I'm so glad that we get to price it by device because you're absolutely right, software pricing and enterprise software pricing is really challenging." This podcast was produced by Eric Lofgren. You can follow me on Twitter @AcqTalk and find more information at https://AcquisitionTalk.com.
The Platform One (P1) podcast is a place to openly discuss the challenges of performing DevSecOps in the Department of Defense. Season one describes the journey of Platform One from a grassroots startup to a formal Air Force Program. We cover our genesis story, the technical challenges, organizational theory, agile acquisition strategy, failures, and culture. The end of the season brings in a user panel for an outside perspective and we conclude with Platform One's new leadership discussing what the future holds. We hope to drive collaboration and learning across the DoD software ecosystem.
Today's episode we are going to break down Rainbow Six Patriots and why it was cancelled Xbox Live Down for 24 Hours Gotham Knight's Co-op Rocket League Voice Chat is Back Military News and more! DD2 14 Gaming podcast is for mature audiences only. Any videos, music, or entertainment not originating from DD2 14 Gaming is used and covered under Section 107 of The Copyright Act of 1976, also known as 'fair use'. Opinions expressed are our own and do not represent any DoD or U.S. government entities as a whole. This podcast is for entertainment purposes only. Viewer and listener discretion is advised. You are no longer alone now, because we have you. --- Send in a voice message: https://anchor.fm/dd214gaming/message
By the numbers alone, the Defense Innovation Unit continues to prove its value. But beyond the numbers, DIU officials say they're meeting the goals the Pentagon laid out for them back in 2016, lowering the barriers for non-traditional companies to bring their advanced technology to DoD. Mike Madsen is the deputy director of the Defense Innovation Unit. He tells Federal News Network's Jason Miller about what he considers DIU's 2021 successes and how they bring value to the warfighters.
Did you hear that Donald Trump was trying to authorize the DoD to take out the drug labs for the cartels in Mexico? We're talking bombing them, and the left, of course, on hearing this, decides he's an idiot, and they're trying to 'expose him.' The Mexican government isn't doing anything to stop the cartels, so he considered doing something. So, was it really such a bad idea? We're looking at Trump's endorsements, bubble brain Biden, Arizona parents suing their school district, and more.