POPULARITY
Subscriber-only episodeIn this lesson we are looking at how to play lead lines.....on your own! That's right, we're tackling simple positions you can use to play through chord changes to hint at a chord sequence and make your playing more melodic. Head to the Gdrive folder for this weeks tabs: https://drive.google.com/drive/folders/13zmV0E6uQ1O4nrfeiZnH3qxjh3JdpsHn?usp=drive_linkTo get your hands on THE TRIAD METHOD: https://thebluesguitarshow.com/product/the-triad-method/Become a Blues Guitar Show Member: https://www.buzzsprout.com/950998/subscribeHead over to www.thebluesguitarshow.com to subscribe to the mailing list
Subscriber-only episodeIn this lesson we explore playing a full solo highlighting the changes by playing with chord tones for 7th chords. Head to the Gdrive folder for this weeks tabs: https://drive.google.com/drive/folders/13zmV0E6uQ1O4nrfeiZnH3qxjh3JdpsHn?usp=drive_linkTo get your hands on THE TRIAD METHOD: https://thebluesguitarshow.com/product/the-triad-method/Become a Blues Guitar Show Member: https://www.buzzsprout.com/950998/subscribeHead over to www.thebluesguitarshow.com to subscribe to the mailing list
Subscriber-only episodeIn this lesson we go through a slow blues in A. Looking at rhythm, phrasing and the age old question of what to play over what. Head to the Gdrive folder for this weeks backing track: https://drive.google.com/drive/folders/13zmV0E6uQ1O4nrfeiZnH3qxjh3JdpsHn?usp=drive_link Become a plus member now: https://www.buzzsprout.com/950998/subscribeTo get your hands on THE TRIAD METHOD: https://thebluesguitarshow.com/product/the-triad-method/Become a Blues Guitar Show Member: https://www.buzzsprout.com/950998/subscribeHead over to www.thebluesguitarshow.com to subscribe to the mailing list
Subscriber-only episodeIn this lesson we are looking over playing single note basslines with syncopated notes in between to create awesome melodies. Head to the Gdrive folder for this weeks TAB: https://drive.google.com/drive/folders/13zmV0E6uQ1O4nrfeiZnH3qxjh3JdpsHn?usp=drive_linkDownload the Triad Method: https://thebluesguitarshow.com/the-triad-method/To get your hands on THE TRIAD METHOD: https://thebluesguitarshow.com/product/the-triad-method/Become a Blues Guitar Show Member: https://www.buzzsprout.com/950998/subscribeHead over to www.thebluesguitarshow.com to subscribe to the mailing list
Subscriber-only episodeIn this lesson we are looking over two key techniques for playing lead lines like Mark Knopfler - Rakeing and Sweeping. Head to the Gdrive folder for this weeks TAB: https://drive.google.com/drive/folders/13zmV0E6uQ1O4nrfeiZnH3qxjh3JdpsHn?usp=drive_linkDownload the Triad Method: https://thebluesguitarshow.com/the-triad-method/To get your hands on THE TRIAD METHOD: https://thebluesguitarshow.com/product/the-triad-method/Become a Blues Guitar Show Member: https://www.buzzsprout.com/950998/subscribeHead over to www.thebluesguitarshow.com to subscribe to the mailing list
In this episode of the ADHD Fempreneur Podcast, Kerry Fitzgibbon explores the world of digital tools and apps to streamline ADHD business operations. She shares her favorite organizational and project management apps like Google Drive and Basecamp, highlighting their benefits for the ADHD brain. Kerry also discusses the power of video marketing and recommends tools like CapCut, Lumen5, and Heygen for creating engaging videos. She delves into the realm of AI tools like ChatGPT and AIPRM, which can generate video scripts and prompts for content creation. Additionally, Kerry emphasizes the importance of follow-up and suggests tools like ManyChat and Contact Owl (Go High Level) for effective email and SMS marketing. She concludes by encouraging listeners to embrace automation with tools like Zapier. Kerry wouldn't have gotten to where she is today without incorporating these tools in the process, she knows these tools and resources can help other ADHD Fempreneurs amplify their productivity and success, so if this episode helps you, we encourage you to share it with anyone you think might find it useful as well!Ready to stop wasting time on FB Ads and leverage AI to simplify it for you? Join Kerry's FREE one day online workshop: https://totalfbsuccess.com/Follow Kerryhttps://www.instagram.com/kerry.fitzgibbon/?hl=enhttps://www.tiktok.com/@adhd.fempreneur?lang=enhttps://www.facebook.com/adhdfempreneur/https://youtube.com/@ADHDFempreneur?si=E8tSpld-ashiGua7Work with Kerry https://adhdfempreneur.com/https://socialmediaplusone.com/TimestampsTimestamps[00:00:00] Intro.[00:01:12] ADHD business tools[00:02:00] Organisation/ Project Management Apps [00:06:45] Capturing Creative Ideas [00:08:37] Video tools made easy [00:21:00] AI Tools [00:25:44] Autoresponders Tools mentioned:AIPRM: https://www.aiprm.com/ Base Camp: https://basecamp.com/Camtasia:https://www.techsmith.com/camtasia.htmlCanva: https://www.canva.com/CapCut: https://www.capcut.com/ChatGPT: https://chat.openai.com/Evernote: https://evernote.com/Fiverr: https://www.fiverr.com/Heygen: https://www.heygen.com/G-Drive: https://www.google.com.au/ Loom: https://www.loom.com/Lumen5:https://lumen5.com/Screen Flow: https://apps.apple.com/no/app/screenflow-10/id1568414480?mt=12ScribeHow: https://scribehow.com/Upwork: https://www.upwork.com/Voice RecorderZapier: https://zapier.com/Zoom: https://us02web.zoom.us/
Síguenos en: ¿Qué tal la semana? Semana esther Preparando theme bloques para OsomPress Fränk Klein: esquema para decidir dónde añadir estilos: https://wpdevelopment.courses/wp-content/uploads/2023/11/Where-to-put-styles.pdf Salir con nueva web que no se pueden actualizar algunos plugins Semana Nahuai Follow-up: 3er Aniversario OsomPress el 30 de noviembre: http://freelandev.com/podcast/89-lanzamiento-de-osompress/ Drama para restaurar una instalación de WordPress ( UpdraftPlus con alojamiento en GDrive y hosting que no permitía hacerlo desde su panel). Ojo con actualizar a The events Calendar 6.2.8. Peleando de nuevo con FD + TicketBAI + Stripe + Zapier Jugando para sacar listados de enlaces combinando render_block y WP_HTML_Tag_Processor Revisando librerías de webfonts para Genesis Simple Share, no hay ninguna actualizada que podamos usar. Contenido Nahuai 2 nuevos tutoriales en Código Genesis de los cuales destaca: Deshabilitar el lightbox en imágenes en un tema de WordPress usando el theme.json Publicado el séptimo episodio de Sustain WP en que hablamos cómo se creó el equipo de sostenibilidad de WordPress, qué hemos hecho hasta ahora y que está planeado. Novedades Meetup Terrassa el 28 de noviembre sobre WPO https://www.meetup.com/es-ES/terrassa-wordpress-meetup/events/296948756/ Se lanza PHP 8.3: https://www.php.net/releases/8.3/en.php Revisitando el botón de vista previa en el directorio de plugins de WordPress https://make.wordpress.org/meta/2023/11/22/plugin-directory-preview-button-revisited/ Tip de la semana Usar espacios de trabajo en VSC para asociar una cuenta de FTP a cada una de ellas. Menciones Mencionan el blog de Nahuai en una Meetup de Santander
Hello and welcome to The Stress Factor Drum and Bass Podcast episode 308. This show is for November 2023, and we have DJ B-12 back with a massive 60 track studio mix with a runtime of 106 minutes. This mix is a beautiful journey through a variety of styles taking you through gorgeous magical vocal and musical liquid and atmospheric tracks into chopped up amen hardcore jungle into rough and powerful neurofunk and deep rollers and dancefloor anthems. Get ready to be moved emotionally and physically. There's a bit of everything in here. We hope you enjoy! This episode contains tracks and remixes by and on these labels Ayah Marar, Genetics, Liquicity, Denham Audio, Dance Trax, DJ Marky, GEST, Shogun Audio, Soul Dimension, Influenza Media, Hugh Hardie, Soulvent Records, Evasion, Fokuz Recordings, Kumarachi, Section 63 Recordings, Makoto, Human Elements, Minos, Air.K and Cephei, Minos Remix, Technimatic, Technimatic Music, Alix Perez, GLXY, 1985 Music, Elipsa,UKF, Dunk, Nitri, Delta9 Recordings, Gravity, Nothing But, CELO, Lizplay Records, Satl, EIJER, Brandy Haze, The North Quarter, Blade (Dnb), ONE7SIX, DPR, Swankout, MINED, Sub Focus, Jonny L, EMI, Kensei, Liquid Flow, Lian Feldd, Vektral, Mia Milla, Yosh Bass, Zombie Cats, Redemptive, Dispatch Recordings, Ravegenix, Future Breakz Records, Bungle, Influence Records, Wilkinson, Kioto Bug, Sota, BMG Rights Management (UK) Limited, Unglued, Hospital Records, Virtue, Impact MC, John B, xJAK Audio, Aleyum, Istoria, Soul Deep Recordings, Keeno, Keeno Music, Mitekiss, Ruth Royall, Glitch Audio, Twisted Sounds Audio, Goldie, Diane Charlemagne, Break, London Records (Because Ltd), MKJAY, Cerys Ellen, Ekou Recordings, PLTX, United Booking Records, Bcee, SUNANDBASS Recordings, HK Sage, Beats In Mind, SiLi, Fulltek, Delta9 Recordings, Flaco, Influence Records, Coffee Shop Jungle, Coffee Shop Jams, Gravity, Totally Liquid, Jinbu, 170+ Recordings, Dreamworkers, G Drive and Jack In Box, Unknown Artist, Twintone, Bastion, Zara Kershaw, UKF, Felix Raymon, Bella Luna, Tweakz, Alibi, V Recordings, Jaydan, Smokin Riddims, Monrroe, and SOLAH. Happy Thanksgiving to our Stateside crew in a few weeks! Please Listen, Like, Share, Comment, Repost, and Subscribe wherever you get your podcasts! Tracklist 01. Ayah Marar and Genetics - Is This Love [Liquicity] 02. Denham Audio - On Site [Dance Trax] 03. DJ Marky feat. GEST - Buzzy Bunch [Shogun Audio] 04. Soul Dimension - If I Do [Influenza Media] 05. Hugh Hardie - Juicebox [Soulvent Records] 06. Evasion - Words You Said [Fokuz Recordings] 07. Kumarachi - Blinkered [Section 63 Recordings] 08. Makoto - Show Me [Human Elements] 09. Minos, Air.K and Cephei - Just Because (Minos Remix) [Fokuz Recordings] 10. Technimatic - Where It Begins [Technimatic Music] 11. Alix Perez and GLXY - Green Lane [1985 Music] 12. Elipsa - Survival [UKF] 13. Dunk and Nitri - Exit [Delta9 Recordings] 14. Gravity - Jazzy Night [Nothing But] 15. CELO - Ghost [Lizplay Records] 16. DJ Marky - Come Back [Shogun Audio] 17. Satl and EIJER feat. Brandy Haze - Call Me [The North Quarter] 18. Blade (Dnb) - Bearings [ONE7SIX] 19. DPR - Night and Day [Fokuz Recordings] 20. GLXY - New Soul [Shogun Audio] 21. Swankout - Ascend [MINED] 22. Sub Focus featuring Jonny L - Turn Up The Bass [EMI] 23. Kensei - Losing Control [Liquid Flow] 24. Lian Feldd - The Hypnotist [Fokuz Recordings] 25. Vektral - Be There (ft. Mia Milla) [Yosh Bass] 26. Soul Dimension - London Calling [Influenza Media] 27. Zombie Cats and Redemptive - Centauri [Dispatch Recordings] 28. Ravegenix - Come My Way (Extended Mix) [Future Breakz Records] 29. Bungle - Target Unknown [Influence Records] 30. Wilkinson and Kioto Bug - Never B Mine (Sota Remix) [BMG Rights Management (UK) Limited] 31. Unglued - Tilted [Hospital Records] 32. Virtue Ft. Impact MC - Finest Days (John B Remix) [xJAK Audio] 33. Aleyum - Rushing West (Istoria Remix) [Soul Deep Recordings] 34. Keeno - Lights On [Keeno Music] 35. Mitekiss and Ruth Royall - YKOM [Shogun Audio] 36. CELO - GLOW [Glitch Audio] 37. Hugh Hardie - Suede [Soulvent Records] 38. Dunk - Clover [Twisted Sounds Audio] 39. Goldie - Inner City Life (Break Remix) [London Records (Because Ltd)] 40. MKJAY Ft. Cerys Ellen - Miss You [Ekou Recordings] 41. PLTX - Try [United Booking Records] 42. Bcee - Steam Clean [SUNANDBASS Recordings] 43. HK Sage - Snow Leopard [Beats In Mind] 44. SiLi - Sherlock (Fulltek Remix) [Delta9 Recordings] 45. Flaco - Your Gift [Influence Records] 46. Coffee Shop Jungle - Lowdown (feat. Makoto) [Coffee Shop Jams] 47. Gravity - Astro [Totally Liquid] 48. Jinbu - All I Have [170 Plus Recordings] 49. Dreamworkers - Let It Go [Lizplay Records] 50. G Drive and Jack In Box - Dont Lie To Me [Future Breakz Records] 51. Gravity - Space Drifter [Totally Liquid] 52. Unknown Artist - Lithuanian Beauty [Fokuz Recordings] 53. GLXY - By Design [Shogun Audio] 54. Twintone - Even Heaven Makes Mistakes [Lizplay Records] 55. Bastion ft. Zara Kershaw - Skin [UKF] 56. Gravity - Dreamers [Totally Liquid] 57. Felix Raymon Ft. Bella Luna - So I (Tweakz Remix) [Delta9 Recordings] 58. Alibi - Greed [V Recordings] 59. Jaydan - Mainframe [Smokin Riddims] 60. Monrroe and SOLAH - Overthinking [Shogun Audio] Listen, like, follow, comment, subscribe and share!
The Lazy Girl's Guide to Podcasting: A Podcast about Podcasting and Podcasting Tips
In the latest episode, we discuss four unexpected podcast management tools that can streamline workflow. We talk about my personal use and experience with these tools, including Asana for project management, Chartable and Podkite for analytics, and the convenience of monitoring reviews from various platforms in one place.I also recommend other tools such as Google Sheets, G Drive, and Repurpose.io for planning, storage, accessibility, and automation of tasks.Highlights: Focus of the podcast on providing effective tips and strategies for podcasting Discussion of four unexpected, free podcast management tools Use of Asana as a project management tool Benefits of using Chartable and Podkite for analytics and smart link features Recording equipment:
Youtube flagged my content for PII violations, but what did I do to get put in the penalty box? CISO's plan on investing more for cybersecurity over the next few years, new research from Nuspire indicates the growing spending trend. Mitiga has found some configuration issues with Gdrive and Gsuite, what should businesses know to defend themselves? Armorblox says brand impersonation is increasing, how much of a threat is this type of attack? Gigabyte hardware and firmware has been found to be shipped with embedded back doors, uh oh. The IDSA has produced some new research on the status of iam and strategy, what can we learn from that? And G2 has unbiased reviews on security tooling and solutions, what can you learn from visiting that site. Those points and more on this episode!
If you haven't automated your content process yet, you are literally throwing your valuable time out the window. By the end of reading this, I'm going to show you exactly how to automate your content, and calculate how much time/money it really saves you Let's use this simple workflow to illustrate how this works… Step 1.) You set up a Trello or project management tool to manage all of your content between you and your team Step 2.) The automation begins. Every time you drop a new “Raw video” file into your Gdrive or Dropbox, it automatically creates a new task inside of your project management tool (Via the tool itself or using something like Zapier) Step 3.) Once the video is completed it is moved into a “Completed and Archived Content” folder in your project management tool (Simply slide the card over it's easy). Once this this happens, it triggers another automation that places that completed content into an archive folder and organizes it by topic, created date, etc. Step 4.) Now at any point in time you can go back and easily search for content you've already created (The video and the copy). Not sure what to post about or have no new content ready? No worries, easily go through your archive list and snatch something up to post! Step 5.) Imagine by doing all of this you get back an additional hour per week. That's time with family, time with your team, time doing whatever you want to do! But imagine your hourly rate is 500/hr. That's $26,000 you just got back in your year but simply working SMARTER! Step 6.) Watch/listen to the full podcast/YouTube episode where Irit Levi breaks down ALL of this and much much more! She is a WIZARD at systems, processes and automation and she delivered! Check out the show below and go connect with her on LinkedIn now! https://www.linkedin.com/in/irit-levi/ Connect with us here too! LinkedIn: https://www.linkedin.com/in/alexbsheridan Youtube: https://youtube.com/c/AlexBSheridan TikTok: https://vm.tiktok.com/ZTdHkmbFb/ Website: Impaxs.com
The "Cloud" has a bigger carbon footprint than the entire airline industry. It's also not secure. So if someone wants to mess with you, or worse, blackmail you after accessing your iCloud, GDrive, or Dropbox data? They absolutely can. Instead, we want you to go old school. So this week, Rosie explains why you want to get a nice external hard drive, encrypt a folder or the entire drive, and save your stuff there.Resources Mentioned In Today's Show-Veracrypt (Wired's article on how to use it)-Toshiba Canvio Flex External HD (Portable)-Seagate Backup Plus Hub External HD (NOT portable. This drive needs to be plugged in.)-Tresorit-ProtonDrive (comes with a ProtonMail account, which we recommended here in a previous episode.)TP Link AX3000 Router-Additional Steps on how to secure your router.Also In This Episode ...This episode also contains the last part of BJ's first book on privacy — written back in 2017 — as read by Broadway actor Roger Wayne. After this week, every remaining episode will include an interview with a privacy and security expert! Our Sponsor: DuckDuckGoAffiliate Link: 1Password.com Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal here.And before we go ...Thanks to the interview in Slate, we're overwhelmed with requests for Privacy Audits. So! We want to let you know BJ and Amanda are recording a two-hour video course that you can purchase. The course will include every step from the privacy audit and examples of how to put those steps into practice. If you'd like to know when the course is available, email BJ at BJMendelson@Duck.com with Privacy Course in the subject line.Photo Credit: Karolina Grabowska
This week, we review the season one episode "Legacies."Sarah finds her long lost Minbari caste generator in GDrive, Joe gets distracted cataloging the incredibly long list of random shit on Sinclair's desk, while Mike laments the lack of a heist scene in this episode that was all about a heist.Spoiler-free discussion: 0:00:00 - 0:52:41Spoiler Zone: 0:52:41 - 0:55:08Next Episode and other Shenanigans: 055:08Music from this episode:"Surf Punk Rock" By absentrealities is licensed under CC-BY 3.0"Please Define The Error" By Delta Centauri is licensed under CC-BY 3.0"The Haunted McMansion" By Megabit Melodies is licensed under CC-BY 3.0
Si parla della fatidica puntata 600 di EasyApple, di Cloudflare, di full immersion e di notifiche geolocalizzate, di iMessage in iOS 16, di cosa fare quando non funziona la 2FA, della migrazione da GDrive a NextCloud di Federico.
In this episode, I will walk you through how to use Google Drive to organize and run your business. While there are many awesome paid project management tools AND client management systems, Google Drive is a FREE and often underrated tool. In the episode I will share how to use G-Drive to organize client files, how to use G-docs for LIVE sharing and assignments you give clients, how to share files with team members and even how you can use G-Drive for landing pages. If you want to be a better coach and want powerful questions to add to your toolbox be sure to grab my FREE guide to 10 powerful questions every coach should know: www.amanda-walker.com/questions Episode Link: https://amanda-walker.com/episode205
Banyak banget fenomena bunuh diri yang ekmudian beritanya jadi viral di media sosial. apa sih yang bisa kita lakukan untuk mencegah kasus ini makin meningkat?
Your Crypto Is Being Tracked - Your Passwordless Future - How Safe is WhatsApp? - Business Email Compromise - Facebook Lost Your Data - Ransomware Prevention Cheaper Than Cure Cryptocurrencies were thought to be like the gold standard of being secure. Having your information stay private. Maybe if you don't want to use regular currency and transactions. But it's changed. [Following is an automated transcript] We have had such volatility over the years when it comes to what are called cryptocurrencies. [00:00:23] Now I, I get a lot of questions about cryptocurrencies. First of all, let me say, I have never owned any cryptocurrencies and I do not own any crypto, crypto, uh, assets at all. Most people look at crypto currencies and think of a couple of things. First of all, an investment. Well, an investment is something that you can use or sell, right? [00:00:46] Typically investments you don't really use. It's like a house. Is it an investment? Uh, not so much. Uh, it's more of a liability, but people look at it and say, well, listen, it went from, uh, you know, what was a 10,000. Bitcoins to buy a pizza to, it went up to $50,000 per Bitcoin. There's a pretty big jump there. [00:01:10] And yeah, it was pretty big. And of course, it's gone way down and it's gone back up and it's gone down. It's gone back up. But the idea of any kind of currency is can you do anything with the currency? You can take a dollar bill and go and try and buy a cup of coffee. Okay. A $10 bill and buy a cup of coffee, um, in most places anyways. [00:01:33] Well, that sounds like a good idea. uh, I could probably use a cup of coffee right now and get a tickle on my throat. I hate that. But if you have something like Bitcoin, where can you spend it? You might remember Elon Musk was saying, yeah, you can use Bitcoin to buy a Tesla. Also Wikipedia would accept donations. [00:01:54] Via Bitcoin, there were a number of places online that you could use. Bitcoin. In fact, there's a country right now in south central America that has Bitcoin as its currency. That's kind of cool too. When you think about it, you know, what is, so what are you gonna do? Latin American country? Uh, I'm trying to remember what it is. [00:02:16] Oh yeah. It's all Salvador. The first country in the world to adopt Bitcoin is an official legal. Now there's a number of reasons they're doing that and he can do it basically. You know, if you got a dictator, you can do almost anything you want to. So in El Salvador, they've got apps that you can use and you can go and buy a tree taco using Bitcoin using their app. [00:02:42] So there you go. If you have Bitcoin, you can go to El Salvador and you can buy all of the tacos and other basic stuff you might wanna buy. But in general, No, you, you can't just go and take any of these cryptocurrencies and use them anywhere. So what good are they as a currency? we already established that they haven't been good as an investment unless you're paying a lot of attention and you're kind of every day buying and selling based on what the movement is. [00:03:11] I know a guy that does exactly that it's, he's a day trader basically in some of these cryptocurrencies, you know, good for. But in reality, is that something that makes sense in a long term? Is that going to help him long term? I, I don't know. I, I really don't because again, there's no intrinsic value value. [00:03:33] So some of the cryptocurrencies have decided, well, let's have some sort of intrinsic value. And what they've done is they've created what are generally known as stable coins. And a stable coin is a type of cryptocurrency that behind it has the ability to be tied to something that's kind of stable. So for instance, one that really hit the news recently is a stable coin that is tied to the us dollar. [00:04:01] And yet, even though it is tied to the us dollar and the coin is a dollar and the dollar is a coin. They managed to get down into the few pennies worth of value, kinda like penny. so what good was that, you know, it has since come back up, some are tied to other types of assets. Some of them say, well, we have gold behind us. [00:04:24] Kinda like what the United States used to do back when we were on the gold standard. And we became the petrol dollar where countries were using our currency, our us dollars, no matter which country it was to buy and sell oil. Well, things have changed obviously. And, uh, we're not gonna talk about. The whole Petro dollar thing right now. [00:04:46] So forget about that. Second benefit. Third benefit is while it's crypto, which means it's encrypted, which means we're safe from anybody's spine on us, anybody stealing it. And of course that's been proven to be false too. We've seen the cryptocurrencies stolen by the billions of dollars. We've seen these cryptocurrencies lost by the billions of dollars as well. [00:05:14] That's pretty substantial. We get right down to it, lost by the billions because people had them in their crypto wallets, lost the password for the crypto wallet. And all of a sudden, now they are completely out of luck. Right. Does that make sense to you? So the basic. Idea behind currency is to make it easier to use the currency than to say, I'll trade you a chicken for five pounds of nail. [00:05:41] Does that make sense to you? So you use a currency. So you say the chicken is worth five bucks. Well, actually chicken is nowadays is about $30. If it's a LA hen and those five pounds of nails are probably worth about $30. So we just exchanged dollars back and forth. I think that makes a lot of sense. One of the things that has driven up the value of cryptocurrencies, particularly Bitcoin has been criminal marketplaces. [00:06:10] As you look at some of the stats of ransoms that are occurring, where people's computers are taken over via ransomware, and then that, uh, person then pays a ransom. And what happens when they pay that ransom while they have to go find an exchange. Pay us dollars to buy cryptocurrency Bitcoin usually. And then they have the Bitcoin and they have to transfer to another wallet, whether or not the bad guys can use the money. [00:06:42] Is a, again, a separate discussion. They, they certainly can than they do because some of these countries like Russia are going ahead and just exchanging the critical currencies for rubs, which again, kind of makes sense if you're Russia. Now we have a lot of criminals that have been using the Bitcoin for ransoms businesses. [00:07:07] Publicly traded businesses have been buying Bitcoin by the tens of millions of dollars so that they have it as an asset. In case they get ransom. Well, things have changed. There's a great article in NBC news, by Kevin Collier. And Kevin's talking about this California man who was scammed out of hundreds of thousands of dollars worth of cryptocurrency. [00:07:33] Now this was a fake scam, which is a fairly common one. It. It tends to target older people who are lonely and a romance starts online and they go ahead and, uh, talk and kind of fall in love. Right. And it turns out she or he has this really almost terminal disease. If only they had an extra, a hundred thousand dollars to pay for the surgery. [00:08:05] You, you know the story, right. So he was conned out of the. What's interesting to me is how the investigation and investigative ability has changed over the years. Uh, probably about five years ago, I sat through a briefing by the secret service and. In that briefing, they explained how they had gone and very, quite cleverly tracked the money that was being sent to and used by this dark web operator who ran a site known as a silk road. [00:08:42] And that site was selling illegal things online. Oh, and the currency that they were tracking was Bitcoin. Yes, indeed. So much for cryptocurrency being secure it, five years ago, the secret service was able to do it. The FBI was able to do it and you know, they couldn't do a whole lot about it. But part of the problem is all of your transactions are a matter of public record. [00:09:13] So if someone sends you a fraction of a Bitcoin. That is now in a ledger and that ledger now can be used because when you then spend. Fraction of a Bitcoin somewhere else, it can be tracked. Well, it is tracked is a hundred percent guaranteed to be tracked. And once it's tracked, well, government can get in. [00:09:37] Now, in this case, a deputy district attorney in Santa Clara county, California, was able to track the movement of the cryptocurrency. Yeah. So this district attorney, okay. Deputy district attorney, not the FBI, not the secret service, not the, the, uh, national security agency, a local district attorney in Santa Clara county, California, not a particularly huge county, but. [00:10:07] Uh, she was able to track it. And she said that she thinks that the scammer lives in a country where they can't easily extradite them. And so they're unlikely to be arrested at any time soon. So that includes countries like Russia that do not extradite criminals to the United States. Now getting into the details. [00:10:26] There's a great quote from her in this NBC news article, our bread and butter these days really is tracing cryptocurrency and trying to seize it and trying to get there faster than the bad guys are moving it elsewhere, where we can't. Grab it. So she said the team tracked the victim's money as it bounced from one digital wallet to another, till it ended up at a major cryptocurrency exchange where it appeared the scammer was planning to launder the money or cash out, they sent a warrant to the exchange. [00:10:58] Froze the money and she plans to return it to the victim. That is a dramatic reversal from just a few years back when cryptocurrencies were seen as a boon for criminals. Amazing. Isn't it? Well, stick around. We get a lot more to talk about here and of course, sign up online Craig peterson.com and get my free newsletter. [00:11:24] There have been a lot of efforts by many companies, Microsoft, apple, Google, to try and get rid of passwords. Well, how can you do that? What, what is a password and what are these new technologies? Apple thinks they have the answer. [00:11:41] Passwords have been kind of the bane of existence for a long while. And, and if you'd like, I have a special report on passwords, or I talk about password managers, things you can do, things you should do in order to help keep your information safe, online things like. [00:11:59] Bank accounts, et cetera. Just email me, me, Craig peterson.com and ask for the password special report and I'll get it to you. Believe me it it's self-contained it's not trying to get you to buy something. Nothing. It is entirely about passwords and what you can do again, just email me, me@craigpeterson.com and we'll get right back with you. [00:12:22] Well, you know, give us a couple of days. Passwords are a problem. And over the years, the standards for passwords have changed. I remember way back when some of the passwords might be 2, 3, 4 characters long. and back then, those were kind of hard to crack. Then Unix came along. I started using Unix and, uh, when was that? [00:12:47] Probably about 81. And as I was messing around with Unix, I. They used to had a couple of changes in how they did passwords. They added assault to it. They used basically the same cipher that the Germans used in world war II, that enigma cipher, which again was okay for the times today, we have much more powerful ciphers and the biggest concern right now, amongst real cybersecurity people. [00:13:14] Government agencies is okay. So what are we going to do when these new quantum computers come along with their artificial intelligence and other things, that's going to be a bit of a problem because quantum computers are able to problems in fractions of a second. Even that traditional computers cannot solve it. [00:13:40] It's a whole different thing. I want you to think. Something here. I, if you have a handful of spaghetti, uh, now we're talking about hard spaghetti, not cooked spaghetti and they all dried out and they are a varying links. How could you sort those into the smallest to largest, if you will, how could you find which ones were the longest, perhaps? [00:14:08] Which ones were the shortest? Well, there's kind of an analog way of doing that and there's a digital way of doing that. So the digital way for the computer would be. To measure them all and compare the measurements and then identify how long the longest one was. And then maybe you'd have to go back and try and find that. [00:14:27] So you can imagine that would take some time, the analog way of doing that. Cuz there still are analog computers out there and they do an amazing job in certain tasks, but the analog way of doing that is okay. So you take that bundle of various length spaghetti and you slam it on the table. What's gonna happen while those pieces of dried spaghetti are going to self align, right? [00:14:54] Uh, the shortest ones are going to be down at the bottom and the tallest one's gonna be sticking out from the top. So there you go. There's your tallest, your longest pieces of spaghetti, and it's done. Instantly. So that's just kind of an idea here, quantum, computing's not the same thing, but that's a comparison really of digital and analog computers, but it's the same type of thing. [00:15:17] Some of these problems that would take thousands of years for digital computer. To work out, can just take a fraction of a second. It's absolutely amazing. So when we're looking at today's algorithms, today's programs for encrypting things like military information, secret telegrams, if you will going back and forth in inside the secretary of state embassies worldwide. [00:15:43] Today they're considered to be quite secure, but with quantum computing what's gonna happen. So there are a lot of people out there right now who are working on trying to figure out how can we come up with an algorithm that works today with our digital computers and can be easily solved by quantum computer. [00:16:06] We have a pretty good idea of how quantum computers are going to work in the future, how they kind of work right now, but this really gets us to the next level, which is kind of cool. Franklin. That's a, a little bit here about cybersecurity. Well, how about you and your password? How does this all tie in? [00:16:26] Well, there are a few standards out there that people have been trying to pass is it's no longer the four character password you might remember. Oh, it needs to be eight to 10 characters, random mix of upper lowercase, special digits, character numbers. Right? You remember those? And you should change it every 30 days. [00:16:45] And those recommendations changed about three or four years ago when the national Institute of standards and technology said, Hey guys, uh, pass phrase is much better than the, what we've been doing because people are gonna remember it and it can be longer. So if you are using like, I have some pass phrases I use that are 30 characters or more. [00:17:09] And I mix up the case and I mix up mix ins on special characters and some numbers, but it's a phrase that I can remember and I have different phrases for different websites. Cause I use a password manager right now. I have about 3,100 entries in my password manager. That's a lot. And I bet you have a lot more passwords or at least a lot more websites and accounts than you realize. [00:17:40] And so that gets to be a real problem. Well, how do you make all of this work and make it easy for people? One of the ways that, uh, that. They're looking at using is something called the Fido alliances, um, technique. And the idea behind Fido is actually similar to what I do right now. Cause I use one password.com. [00:18:03] I have an app on my phone and the phone goes ahead and gives me the password. In fact, it'll. Put it in. I have plugins in my browsers. It'll put it right into the password form on the website. And then it'll ask me on my phone. Hey, is that really you? And I'll say yes, using duo and TA I'm logged in it's it's really quite cool. [00:18:28] Well, Fido is a little different than that, but kind of the same, the whole idea behind Fido is you registered a website and the website will send a request to the Fido app. That's on your phone. So now on your phone, you'll use biometrics or maybe, uh, one time pass key, you know, those six digit keys that change every 30 seconds. [00:18:54] And so now you, you, uh, on your phone, you say, yeah, yeah, yeah. That's me. That's good. That's me. Yeah. Okay. And then the app will exchange with the website using public key cryptography. A public key and it's gonna be unique public key for that website. So it'll generate a private key and a public key for that website. [00:19:17] And now TA a, the website does not have your password and cannot get your password. And anytime you log in, it's going to ask you on your smartphone. Is this. And there there's ways beyond smartphones. And if you wanna find out more about passwords, I've got, again, that free, special report, just Craig peterson.com. [00:19:42] Email me, just email me@craigpeterson.com and I'll make sure we send that off to you and explains a lot about passwords and current technology. So Fido is one way of doing this and a few different companies have gone ahead and have invested some. Into final registration, because it requires changes on the websites as well in order to. [00:20:08] With Fido. Now you might use a pin, you might use the biometrics, et cetera, but apple has decided they've come up with something even better. Now there's still a lot of questions about what apple is doing, but they are rolling it into the next release of iOS and also of Mac operating system. And you'll be able to use that to secure. [00:20:31] Log into websites. I think Apple's gonna get a lot of traction on this and I think it's gonna be better for all of us involved here. We'll see. There's still a lot of UN unanswered questions, but I'll, I'll keep you up to date on this whole password technology stick around. [00:20:51] There are ways for us to communicate nowadays easy ways, but are, are the easy ways, the best ways, kind of the question here, frankly. And part of this answer has to do with WhatsApp and we'll talk right now. [00:21:07] Many people have asked me about secure messaging. You probably know by now that sending text messages is not secure. [00:21:18] In fact, it could be illegal if you have any personal information about. Patients or maybe employees, you just can't send those over open channels. So what apple has done for instance is they've got their messaging app and if the message is green, it's just reminding you that this is a text message. Now they stuck with green because that was kind of the industry's standard. [00:21:45] Green does not mean safe in the apple world when it comes to iMessage. Blue does. So they've got end to end encryption. So if the message is blue, that means the encryptions in place from side to side, there are on the other end of the spectrum. There are apps like telegram, which are not. Particularly safe. [00:22:06] Now, telegram has pulled up it socks a little bit here, but in order to have end to end encryption and telegram, you have to manually turn it on. It is not on by default. I also personally don't trust telegram because of their background, things that they've done in the past. So, you know, avoid that. [00:22:28] WhatsApp is something I've been asked about. I had a family member of a service member who was overseas, ask if WhatsApp was safe for them to communicate on cuz they didn't want third parties picking. You know, private messages, things you say and do online with friends and family are not necessarily things there are for public consumption. [00:22:51] So the answer that I gave was, well, yeah, kind of, you might remember Facebook getting, uh, WhatsApp. They bought it and deciding they were going to make some changes to the privacy settings in. now that was really a big mistake. They said we're gonna add advertisements. Well, how are you going to effectively advertise? [00:23:15] If you don't know what we're talking about, have you noticed advertising platforms? If you look up something or someone else in your house looks up something, if your neighbors are looking up, so. They assume that you might be interested in it as well. So what do they do? They go ahead and show you ads for that brand new pair of socks that you never really cared about, but because the algorithms in the background figured, well, yeah, that's what you've been talking about. [00:23:45] Well, let's pass out your pair of socks. So if Facebook is going to. Add into WhatsApp, what's going to happen. Are they going to be monitoring what you're saying? And then sending you some of these messages, right? These ads, because of that, a lot of people started looking for a more secure. Platform and that's frankly, where Moxi Marlin spike comes in kind of a fun name, the bloom in this case, but he started a company called signal. [00:24:21] He didn't just start it. He wrote the code for it, the server code, everything. And the whole idea behind signal was to have a guaranteed safe end to end way to communicate. A a third party with a friend, a relative, et cetera. So signal is something that I've used in the past. And I used from time to time now, as well, depending on who I'm talking to. [00:24:49] And it does allow you to send messages. It does allow you to talk. You can do all kinds of stuff with it. So now, now there's an issue with signal. It's disappointing. Moxi has stepped down from running signal. There's a company behind it in January, 2022. And he said, you know, the company's begin off. They can run themselves. [00:25:12] He's still on the board of direct. And the guy who's currently the head of signal is also a very privacy kind of focused guy, which is really good too signal by the way is free. And you can get it for pretty much any platform you would care to have it for a very, very nice piece of software. I like what they've done. [00:25:34] Now the problem is that some of those people at signal have decided that they should have a way of making payments inside signal. So a few months ago, they went ahead and added into signal, a piece of software that allows you to send. Payments online. Now this is a little concerning, uh, and the let's talk about some of the reasons for the concern. [00:26:06] Basically what we're seeing is a cryptocurrency that Moxi himself helped to put in place now, you know, I guess that's good cuz he understands it. It's supposedly a cryptocurrency that is privacy. Focused. And that's a good thing. Well, what type of crypto is it? That's privacy focused. And how good is it going to be? [00:26:33] You know, those are all good questions, but here's the biggest problem. I think that comes from this. We've got our friends at Facebook, again, trying to add crypto payments to their various messenger and, and other products. We're seeing that from a lot of these communication systems, cuz they can skim a little off the top legally, right. [00:26:55] Charge you a fee and then make their money that way. But. What happens when you put it into an encrypted messaging app? Well, bottom line, a lot of bad things can happen here because now all of a sudden you come under financial regulations, right? Because you are performing a financial. Function. So now potentially here, there could be criminal misuse of the app because you could have ransomware and they say, reach us on signal. [00:27:34] Here's our signal account. And go ahead and send us crypto. it's called mobile coin by the way, this particular cryptocurrency. Uh, so now all of a sudden you are opening up the possibility of all kinds of bad things happening and your app signal, which was originally great for messaging now being used nefariously. [00:27:59] I think that's a real problem. Now, when it comes to money transfer functions with cryptocurrencies to say that they're anonymous, I think is a hundred percent a misnomer because it it's really pseudo anonymous. It's never completely anonymous. So now you've increased the legal attack surface here. So now the various regulators and countries around the world can say, Hey. [00:28:28] This is no longer just a messaging app. You are using it to send money. We wanna track all money transactions. Right. And so what does that mean? Well, that means now we need to be able to break the encryption or need to shut down your app, or you need to stop the ability to send money. So the concern right now with signal is we really could have some legal problems with signal. [00:28:56] And we could potentially cause some real life harm. On the other side of, this is what Moi Marlin spike has been really driving with signal over the years, which is we don't want anyone to be able to break into signal. So there's a particularly one Israeli based company that sells tools that you can buy that allow you to break into smartphone. [00:29:24] And they're used by everybody from criminals. You can even buy some of these things on eBay. And they're used also by law enforcement agencies. So he found that there was a bug in one of the libraries that's used by this Israeli soft. To where that causes it to crash. And so he puts some code into signal, at least he threatened to that would cause any of the scanning software that tries to break into your smartphone to fail to crash. [00:29:56] Yeah. Yeah. Kind of cool. Greg Peterson here on online, Craig peterson.com and really you are not alone. [00:30:14] I got some good news about ransomware and some bad news about B E C business email compromise. In fact, I got a call just this, uh, just this week from someone who had in fact again, had their operating account emptied. [00:30:31] Ransomware is a real problem, but it, it's interesting to watch it as it's evolved over the years. [00:30:40] We're now seeing crackdowns driving down ransomware profits. Yes, indeed. Ransomware's ROI is dropping the return on investment. And so what we're starting to see is a drive towards more. Business email compromise attack. So we'll talk about those, what those are. And I have a couple of clients now that became clients because of the business email compromises that happened to them. [00:31:15] A great article that was in this week's newsletter. You should have received it Tuesday morning from me. If you are signed up for the free newsletter. Craig peterson.com/subscribe. You'll get these usually Tuesday morning. It's my insider show notes. So you can kind of get up to speed on some of the articles I'm talking about during the week that I talk about on the radio. [00:31:43] And of course talk about here on the radio show and podcast and everything else as well. So what we're seeing here, according to dark readings, editor, Becky Bracken is some major changes, a pivot by the bad guys, because, uh, at the RSA conference, they're saying that law enforcement crackdowns try cryptocurrency regulations. [00:32:11] We've been talking about that today and ransomware as a service operator. Downs are driving the return on investment for ransomware operations across the world all the way across the globe. So what is ransomware as a service? I think that's a good place to start because that has really been an Albert Cross Albert Cross around our next for a long time. [00:32:36] The idea with ransomware is they get you to download some software, run some software that you really should not be running. That makes sense to you. So you get this software on your computer, it exfil trades files. So in other words, it takes files that you have sends them. Off to the bad guys. And then once it's done that, so it'll send like any word files, it finds Excel, other files. [00:33:06] It might find interesting, uh, once it's done that, then it goes ahead and encrypts those files. So you no longer have access to them and it doesn't just do them on your computer. If you share a drive, let's say you've got a, uh, Gdrive or something else on your computer that is being mounted from either another computer or maybe a server. [00:33:31] It will go ahead and do the same. With those files. And remember it, isn't just encrypting because if you have a good backup and by the way, most businesses that I've come into do not have a good backup, which is a real problem because their, their backups fail. They haven't run. I, I had one case where we helped the business out and it had been a year and a half since they had a successful backup and they had no. [00:34:00] They were dutifully carrying home. Uh, these USB drives every day, plug in a new one in, and the backups were not running. Absolutely amazing. So anyhow, ransomware is a service then. Well, so they they've encrypted your files. They've exfiltrated. In other words, they've taken your files and then they demand a. [00:34:24] So usually it's like this red screen that comes up and says, Hey, uh, you know, all your files are belong to us and you need to contact us. So they have, uh, people who help you buy Bitcoin or whatever they're looking for. Usually it's Bitcoin and send the Bitcoin to them. And then they'll give you, uh, what's hopefully a decryption. [00:34:50] Now what's particularly interesting about these decryption keys is they work about half of the time. So in other words, about half of the time, you'll get all your data back about half the time. You will not, it's just not good. So if you are a small operator, if you are just a small, bad guy and it's you and maybe somebody else helping you, you got your nephew there helping you out. [00:35:14] How are you going to. Help these people that you're ransoming by the cryptocurrency. How are you going to threaten them with release of their documents online? Unless you have a staff of people to really help you out here? Well, that's where ransomware's a service comes in. The whole idea behind Raz is. [00:35:38] You can just be a one man shop. And all you have to do is get someone to open this file. So you go ahead and register with the ransomware service provider and they give you the software and you embed your little key in there, so they know it's you. And then you send it off in an email. You, you might try and mess with those people to get them to do something they shouldn't do. [00:36:03] And. That's all you have to do because once somebody opens up that file that you sent them, it's in the hand of these service guys and ransomwares the service guys. So the, these ransomwares of service people will do all of the tech support. They'll help people buy the Bitcoin. They'll help them pay the ransom. [00:36:25] They'll help them recover files, you know, to a certain extent. Right. Does this make sense to you? Yeah, it's kinda crazy. Now I wanna offer you, I I've got this document about the new rules for backup and again, it's free. You can get it. No problem. Just go ahead and email me, me@craigpeterson.com m@craigpeterson.com because the backups are so important and. [00:36:52] Just like password rules have changed. The rules have changed for backups as well. So just drop me an email me@craigpeterson.com and ask for it and we'll make sure we send it off to you and is not trying to sell you more stuff. Okay. Uh, it's really is explaining the whole thing for you. I'm not holding anything back. [00:37:11] Well, these ransoms, the service operators, then get the payment from you and then pay a percentage anywhere from 80% to 50%, sometimes even lower to the person who ransom due. Isn't that just wonderful. So our law enforcement people, as well as in other countries have been going after the ransomware as a service providers, because if they can shut down. [00:37:40] These RAs guys just shutting. One of them down can shut down thousands of small ransomware people. Isn't that cool works really, really well. So they have been shut down. Many of them there's one that just popped its head back up again. After about six months, we'll see how far they get, but it is a very big. [00:38:06] Uh, blow to the whole industry, you know, ransomware really because of these O as a service operators has become a centralized business. So there's a small number of operators responsible for the majority of these thousands of hundreds of thousands of attacks. Really. It's probably worse. So couple of dis big groups are left the KTI group and lock bit, and they've got more than 50% of the share of ransomware attacks in the first half of 2022. [00:38:40] But now they're going after them. The feds. And I think that makes a whole lot of sense, right. Because who do you go for while you go for the people who are causing the most harm and that's certainly them. So I expect they'll be shut down sometimes, sometimes soon, too. So. Ransomware had its moment over the last couple of years, still a lot of ransomware out there, still a lot of problems, but now we're seeing B C business, email compromise tactics, and I did a. [00:39:14] At television appearance, where I was working with the, um, the, the newsmaker or whatever they call them, right. Talking heads on that TV show and explaining what was happening. And the most standard tactic right now is the gift card swindle. I should put together a little video on this one, but it was all, it's all about tricking employees into buying bogus gift cards. [00:39:43] So this, this good old fashioned Grif is still working. And what happened in our case is it, it was actually one of the newscasters who got an email, supposedly from someone else saying, Hey, Uh, you know, we wanna celebrate everybody. And in order to do that, I wanna give 'em all gift cards. So can you go out and buy gift cards? [00:40:10] And so we messed around with them. It was really kind of fun and said, okay, uh, you know, what denomination, how many do you think we need? Uh, who do you think we should give them to? And of course we knew what we were doing. Their English grammar was not very good. And it was really obvious that this was not. [00:40:30] The person they were pretending to be. So that happens and it happens a lot. They got into a business email account, the email account of that newscaster. So they were able to go through their email, figure out who else was in the business, who was a trusted source inside of the business. So they could pretend that, uh, that they were that newscaster and send emails to this trusted source. [00:41:01] And today these business email compromise attacks are aimed at the financial supply chain. And once these threat actors are inside, they look for opportunities to spoof vendor emails, to send payments to controlled accounts. And the worst case I know of of this is a company that sent $45 million. To a scammer. [00:41:28] And what happened here is the, this woman pretended to be the CEO who was out of the country at the time and got the CFO to wire the money to her. Uh, an interesting story. We'll have to tell it to you sometime, but it it's a real problem. And we just had another one. We've had them in school districts, look, 'em up online, do a duck dot, go search for them and you'll find them right. [00:41:56] Left and center because social engineering works. And frankly, business email compromise is a clear threat to businesses everywhere. I, I, as I mentioned, we had one listens to the show, contact us just last week. Again, $40,000 taken out of the operating account. We had another one that had a, I think it was $120,000 taken out of the operating account. [00:42:25] And another one that had about $80,000 taken out of the operating account. Make sure you're on my newsletter. even the free one. I do weekly free trainings. Craig peterson.com. Make sure you subscribe now. [00:42:43] Facebook's about 18 years old coming on 20 Facebook has a lot of data. How much stuff have you given Facebook? You know, did you fall victim for that? Hey, upload your contacts. We'll find your friends. Well, they don't know where your data is. [00:43:00] There is an article that had appeared on a line from our friends over at, I think it was, yeah. Let me see here. Yeah. Yeah. Motherboard. I was right. And motherboards reporting that Facebook doesn't know what it does with your data or. It goes now, you know, there's always a lot of rumors about different companies and particularly when they're big company and the, the news headlines are kind of grabbing your attention. [00:43:34] And certainly Facebook can be one of those companies. So where did motherboard get this opinion about Facebook? Just being completely clueless about your personal. well, it came from a leaked document. Yeah, exactly. So I, we find out a lot of stuff like that. Right. I used to follow a, a website about companies that were going to go under and they posted internal memos. [00:44:08] It basically got sued out of existence, but there's no way that Facebook is gonna be able to Sue this one out of existence because they are describing this as. Internally as a tsunami of privacy regulations all over the world. So of course, if you're older, we used to call those TIAL waves, but think of what the implication there is of a tsunami coming in and just overwhelming everything. [00:44:37] So Facebook, internally they're engineers are trying to figure out, okay, so how do we deal? People's personal data. It's not categorized in ways that regulators want to control it. Now there's a huge problem right there. You've got third party data. You've got first party data. You've got sensitive categories, data. [00:45:01] They might know what religion you are, what your persuasions are in various different ways. There's a lot of things they might know about you. How are they all CATA categorized? Now we've got the European union. With their gen general data protection regulation. The GDPR we talked about when it came into effect back in 2018, and I've helped a few companies to comply with that. [00:45:26] That's not my specialty. My specialty is the cybersecurity side. But in article five, this European law mandates that personal data must be collected for specified explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes. So what that means is that every piece of data, like where you are using Facebook or your religious orientation, Can only be collected and used for a specific purpose and not reused for another purpose. [00:46:04] So there's an example here that vice is giving in past Facebook, took the phone number that users provided to protect their accounts with two factor authentication and fed it to its people, you know, feature as well as. Advertisers. Yeah. Interesting. Eh, so Gizmoto with the help of academic researchers caught Facebook doing this, and eventually the company had to stop the practice. [00:46:31] Cuz this goes back to the earlier days where Facebook would say, Hey, find out if your friends are on Facebook, upload your contacts right now. And most people. Right. What did you know back then about trying to keep your data private, to try and stop the proliferation of information about you online and nothing. [00:46:53] Right? I think I probably even uploaded it back then thinking, well, that'd be nice to see if I got friends here. We can start chatting, et cetera. Well, according to legal experts that were interviewed by motherboard who wrote this article and has a copy of the internal me, uh, memo, this European regulation specifically prohibits that kind of repurposing of your phone number of trying to put together the social graph and the leak document shows that Facebook may not even have the ability to limit. [00:47:28] how it handles users data. Now I was on a number of radio stations this week, talking about this and the example I gave, I is just look at an average business from the time it start, you know, Facebook started how right. Well, you scrape in pictures of young women off of Harvard universities. Main catalog, right. [00:47:52] Contact page, and then asking people, well, what do you think of this rate? This person rate that person and off they go, right. Trying to rate them. Yeah, yeah, yeah. All that matters to a woman, at least according to mark Zuckerberg or all that matters about a woman is how she looks. Right. Do I think she's pretty or not ridiculous what he was doing? [00:48:13] It just, oh, that's Zuckerberg, right? That's. Who he is not a great guy anyways. So you go from stealing pictures of young ladies asking people to rate them, putting together some class information and stuff there at Harvard, and then moving on to other universities and then opening up even wider and wider. [00:48:37] And of course, that also created demand because you can't get on. If you're not at one of the universities that we have set it up for. And then you continue to grow. You're adding these universities, certain you're starting to collect data and you're making more money than God. So what do you do? Well, you don't have to worry about inefficiencies. [00:48:58] I'll tell you that. Right. One thing you don't have to do is worry about, oh, GE we've got a lot of redundant work going on here. We've got a lot of teams working on basically the same. No, you've got more money than you can possibly shake a stick at. So now you go ahead and send that, uh, money to this group or that group. [00:49:20] And they put together all of the basic information, right. That, that they want. They are. Pulling it out of this database and that database, and they're doing some correlation writing some really cool sequel queries with some incredible joins and everything else. Right. And now that becomes part of the main code for Facebook. [00:49:43] And then Facebook goes on to the next little project and they do the same thing. Then the next project, then the next project. And then someone comes along and says, uh, Hey, we. This feature, that feature for advertisers and then in that goes, and then along comes candidate Obama. And, uh, they, one of the groups inside Facebook says, yeah, yeah, yeah, here, here we go. [00:50:07] Here's all of the information we have about everybody and it's free. Don't worry about it. Right. And then when Trump actually bought it and hired a company to try and process some of that information he got in trouble. No, no, no, but, but the Obama. The whole campaign could get access to anything they wanted to, again, because the data wasn't controlled, they had no idea who was doing what with the data. [00:50:34] And according to this internal memo, they still don't know. They don't even know if they can possibly, uh, comply with these regulations, not just in Europe, but we have regulations in pretty much all of the 50 states in the us Canada of course, has their own Australia, New Zealand think about all the places Facebook makes a lot of. [00:50:59] So here's a quote from that we build systems with open borders. The result of these open systems and open culture is well described with an analogy. Imagine you hold a bottle of ink in your hand, the bottle of ink is a mixture of all kinds of user data. You pour that ink into a lake of water. Okay. And it flows every. [00:51:22] The document red. Right. So how do you put that ink back in the bottle, in the right bottle? How do you organize it again? So that it only flows to the allowed places in the lake? They're totally right about that. Where did they collect it from it? Apparently they don't even know where they got some of this information. [00:51:43] This data from kind of reminds me of the no fly list. Right. You don't know you're on it and you can't get yourself off of it. Right. It is kind of crazy. So this document that we're talking about was written last year by. Privacy engineers on the ad and business product team, whose mission is to make meaningful connections between people and businesses and which quote sits at the center of a monetization strategy monetization strategy. [00:52:10] And is the engine that powers Facebook's growth. interesting, interesting problems. And, and I see this being a problem well into the future for more and more of these companies, look at Twitter as an example that we've all heard about a lot lately. And I've talked about as well along comes Elon Musk and he says, well, wait a minute now. [00:52:32] Now I can make Twitter way more profitable. We're gonna get rid of however many people it's well over a thousand, and then we are going to hire more people. We're gonna start charging. We're gonna be more efficient. You can bet all of these redundancies that are in Facebook are also there on. and Twitter also has to comply with all of these regulations that Facebook is kind of freaking out about. [00:53:00] Well, it, for really a very good reason. So this document is available to anybody who wants to look at it. I'm looking at it right now, talking about regulatory landscape and the fundamental problems Facebook's data lake. And this is a problem that most companies have not. As bad as Facebook does, but most companies, right. [00:53:25] You grow. I, I have yet to walk into a business that needs help with cybersecurity and find everything in place as it should be, because it grew organically. Right. You, you started out with a little consumer firewall, router and wifi, and then you added to it and you put a switch here and you added another switch behind that and move things around. [00:53:48] Apparently looting is one of the benefits of being a Russian soldier. And according to the reports coming out of Ukraine, they've been doing it a lot, but there's a tech angle on here that is really turning the tables on these Russian looters. [00:54:04] Thanks for being with me today. I really appreciate it. And I'm honored, frankly, to be in front of this micro. , this is really something, you know, we, we know in wars, there are people that loot and typically the various militaries try and make sure, at least recently that that looting is kept to an absolute minimum. [00:54:27] Certainly the Americans, the British, even the Nazis during world war II, the, the, uh, the socialists they're in. Germany, uh, they, they tried to stop some of the looting that was going on. I, I think that's probably a very good thing, right. Because what you end up with is just all of these locals that are just totally upset with you. [00:54:56] I found a great article on the guardian and there's a village. Had been occupied for about a month by Russian troops and the people came back, they are just shocked to see what happened. They're giving a few examples of different towns. They found that alcohol was stolen and they left empty bottles behind food rappers, cigarette buts, thrown all over the place in apartments and homes. [00:55:25] Piles of feces blocking the toilets, family photographs torn, thrown around the house. They took away all of the clothes. This is a code from one of the people, literally everything, male and female coats, boots, shirts, jackets, even my dresses and lingerie. This is really, really something. The SIUs didn't do this, but now Russian. [00:55:49] Military apparently does. So over the past couple of weeks, there've been reporting from numerous places where Russian troops had occupied Ukrainian territory and the guardian, which is this UK newspaper collected evidences suggests looting by Russian forces was not merely a case of a few way, word soldiers, but a systematic part of Russian military behavior across multiple towns. [00:56:16] And villages. That's absolutely amazing. Another quote here, people saw the Russian soldiers loading everything onto Euro trucks, everything they could get their hands on a dozen houses on the villages. Main street had been looted as well as the shops. Other villagers reported losing washing machines, food laptops, even as sofa, air conditioners. [00:56:41] Being shipped back, just like, you know, you might use ups here, they have their equivalent over there. A lady here who was the head teacher in the school. She came back in, of course, found her home Lood and in the head teacher's office. she found an open pair of scissors that had been jammed into a plasma screen that was left behind because if they can't steal it, they're gonna destroy it. [00:57:07] They don't only leave anything behind. They found the Russians had taken most of the computers, the projectors and other electronic equipment. It, it, it's incredible. So let's talk about the turnaround here. A little. You might have heard stories about some of these bad guys that have smashed and grabbed their way into apple stores. [00:57:27] So they get into the apple store. They grab laptops on iPads, no longer iPods, cuz they don't make those anymore. And I phones. And they take them and they run with them. Well, nowadays there's not a whole lot of use for those. Now what they have been doing, some of these bad guys is, is they take some parts and use them in stolen equipment. [00:57:53] They sell them on the used market, et cetera. But when you're talking about something specific, like an iPhone that needs specific activation. Completely different problem arises for these guys because that iPhone needs to have a SIM card in order to get onto the cell network. And it also has built in serial numbers. [00:58:16] So what happens in those cases while apple goes ahead and disables them. So as soon as they connect to the internet, let's say they put 'em on wifi. They don't get a SIM card. They don't. service from T-Mobile or Verizon or whoever it might be. So now they disconnect to the wifi and it calls home, cuz it's gonna get updates. [00:58:36] So on download stuff from the app store and they find that it's been bricked. Now you can do that with a lot of mobile device managers that are available for. All kinds of equipment nowadays, but certainly apple equipment where if a phone is lost or stolen or a laptop or other pieces of equipment, you can get on the MDM and disable it, have it remotely erased, et cetera. [00:59:02] Now, police have had some interesting problems with that. Because a bad guy might go ahead and erase a smartphone. That's in the evidence locker at the police station. So they're, they're doing things like putting them into Fairday cages or static bags or other things to try and stop that. So I think we've established here that the higher tech equipment is pretty well protected. [00:59:26] You steal it. It's not gonna do you much. Good. So one of the things the Russian stole when they were in, uh, it's called, uh, I think you pronounce it. Uh, Mela me pole, uh, which is again, a Erian city is they stole all of the equipment from a farm equipment dealership and shipped it to Chenia. Now that's according to a source in, uh, a businessman in the area that CNN is reporting on. [00:59:59] So they shipped this equipment. We're talking about combines harvesters worth 300 grand a piece. They shipped it 700 miles. and the thieves were ultimately unable to use the equipment, cuz it had been locked remotely. So think about agriculture equipment that John Deere, in this case, these pieces of equipment, they, they drive themselves. [01:00:26] It's autonomous. It goes up and down the fields. Goes any pattern that you want to it'll bring itself within a foot or an inch of your boundaries, right. Of your property being very, very efficient the whole time, whether it's planting or harvesting, et cetera. And that's just a phenomenal thing because it saves so much time for the farmer makes it easier to do the companies like John Deere. [01:00:52] Want to sell as many pieces of this equipment as they possibly can. And farming is known to be a, what not terribly profitable business. It certainly isn't like Facebook. So how can they get this expensive equipment into the hands of a lot of farmers? Well, what they do is they. So you can lease the equipment through leasing company or maybe directly from the manufacturer and now you're off and running. [01:01:20] But what happens if the lease isn't paid now? It's one thing. If you don't pay your lease on a $2,000 laptop, right? They're probably not gonna come hunting for you, but when you're talking about a $300,000 harvester, they're more interested. So the leasing company. Has titled to the equipment and the leasing company can shut it off remotely. [01:01:46] Right? You see where I'm going with this so that they can get their equipment in the hands of more farmers cuz the farmers can lease it. It costs them less. They don't have to have a big cash payment. Right? You see how this all works. So when the Russian forces stole this equipment, that's valued. Total value here is about $5 million. [01:02:07] They were able to shut it all. And obviously, if you can't start the engine, because it's all shut off and it's all run by computers nowadays, and you know, there's pros and cons to that. I think there's a lot of cons, but, uh, what are you gonna do? How's that gonna work for you? Well, it. Isn't going to work for you. [01:02:28] And they were able to track it. It had GPS trackers find out exactly where it was. That's how they know it was taken to Chenia and could be controlled remotely. And in this case, how'd they control it. Well, they completely. Shut it off. Even if they sell the harvesters for spare parts, they'll learn some money, but they sure can be able to sell 'em for the 300 grand that they were actually worth. [01:02:54] Hey, stick around. We'll be right back and visit me online@craigpeterson.com. If you sign up there, you'll be able to get my insider show note. And every week I have a quick five. Training right there in your emails, Craig Peter san.com. That's S O N in case you're wondering. [01:03:20] If you've been worried about ransomware, you are right to worry. It's up. It's costly. And we're gonna talk about that right now. What are the stats? What can you do? What happens if you do get hacked? Interesting world. [01:03:36] Ransomware has been a very long running problem. I remember a client of ours, a car dealership who we had gone in. [01:03:47] We had improved all of their systems and their security and one of their. People who was actually a senior manager, ended up downloading a piece of ransomware, one of these encrypted ones and opened it up and his machine, all of a sudden TA, guess what it had ransomware on it. One of those big reds. [01:04:09] Greens that say pay up is send us this much Bitcoin. And here's our address. Right. All of that sort of stuff. And he called us up and said, what what's going on here? What happened? Well, first of all, don't bring your own machine into the office. Secondly, don't open up particularly encrypted files using the password that they gave. [01:04:32] and thirdly, we stopped it automatically. It did not spread. We were able to completely restore his computer. Now let's consider here at the consequences of what happened. So he obviously was scared. Uh, and within a matter of a couple of hours, we actually had him back to where he was and it didn't spread. [01:05:00] So the consequences there, they, they weren't that bad. But how about if it had gotten worse? How about if they ransomware. Also before it started holding his computer ransom, went out and found all of the data about their customers. Right. Would, do you think an auto dealership would love to hear that all of their customer data was stolen and released all of the personal data of all of their customers? [01:05:27] Right? Obviously not. So there's a potential cost there. And then how long do you think it would take a normal company? That thinks they have backups to get back online. Well, I can tell you it'll take quite a while because the biggest problem is most backups don't work. We have yet to go into a business that was actually doing backups that would work to help restore them. [01:05:54] And if you're interested, I can send you, I I've got something. I wrote up. Be glad to email it back to you. Uh, obviously as usual, no charge. and you'll be able to go into that and figure out what you should do. Cause I, I break it down into the different types of backups and why you might want to use them or why you might not want to use them, but ransomware. [01:06:18] Is a kind of a pernicious nasty little thing, particularly nowadays, because it's two, two factor, right. First is they've encrypted your data. You can't get to it. And then the second side of that is okay, well, I can't get to my data and now they're threatening to hold my data ransom or they'll release. So they they'll put it out there. [01:06:42] And of course, if you're in a regulated industry, which actually car dealers are because they deal with financial transactions, leases, loans, that sort of thing, uh, you can lose your license for your business. You can U lose your ability to go ahead and frankly, uh, make loans and work with financial companies and financial instruments. [01:07:06] It could be a very, very big. so there are a lot of potential things that can happen all the way from losing your reputation as a business or an individual losing all of the money in your operating account. And we, again, we've got a client that, uh, we picked up afterwards. That, uh, yes, indeed. They lost all of the money in their operating account. [01:07:31] And, uh, then how do you make payroll? How do you do things? Well, there's a new study that came out from checkpoint. Checkpoint is one of the original firewall companies and they had a look at ransomware. What are the costs of ransomware? Now bottom line, I'm looking at some stats here on a couple of different sites. [01:07:52] Uh, one is by the way, KTI, which is a big ransomware gang that also got hacked after they said we are going to attack anyone that. Uh, that doesn't defend Vlad's invasion of Ukraine, and then they got hacked and their information was released, but here's ransomware statistics. This is from cloud words. Uh, first of all, the largest ransom demand is $50 million. [01:08:20] And that was in 2021 to Acer big computer company. Uh, 37% of businesses were hit by ransomware. In 2021. This is amazing. They're they're expecting by 2031. So in about a decade, ransomware is gonna be costing about $265 billion a year. Now on average, uh, Ransomware costs businesses. 1.8, 5 million to recover from an attack. [01:08:52] Now that's obviously not a one or two person place, but think of the car dealer again, how much money are they going to make over the year or over the life of the business? Right? If you're a car dealer, you have a license to print money, right? You you're selling car model or cars from manufacturer X. And now you have the right to do that and they can remove that. [01:09:15] Right? How many tens, hundreds of millions of dollars might that end up costing you? Yeah. Big deal. Total cost of ransomware last year, 20 billion. Now these are the interesting statistics here right now. So pay closer attention to this 32% of ransomware victims paid a ransom demand. So about her third paid ransom demand. [01:09:40] Last. it's it's actually down. Cuz my recollection is it used to be about 50% would pay a ransom. Now on average that one third of victims that paid a ransom only recovered 65% of their data. Now that differs from a number I've been using from the FBI. That's a little bit older that was saying it's it's a little, little better than 50%, but 65% of paying victims recovered their data. [01:10:11] Now isn't that absolutely amazing. Now 57% of companies are able to recover the data using a cloud backup. Now think about the different types of backup cloud backup is something that can work pretty well if you're a home user, but how long did it take for your system to get backed? Probably took weeks, right? [01:10:34] For a, a regular computer over a regular internet line. Now restoring from backup's gonna be faster because your down link is usually faster than your uplink. That's not true for businesses that have real internet service, like, uh, ours. It it's the same bandwidth up as it is down. But it can take again, days or weeks to try and recover your machine. [01:10:57] So it's very, very expensive. And I wish I had more time to go into this, but looking at the costs here and the fact that insurance companies are no longer paying out for a lot of these ransomware attacks, it could be incredibly expensive for you incredibly. So here you. The number one business types by industry for ransomware tax retail. [01:11:31] That makes sense. Doesn't it. Real estate. Electrical contractors, law firms and wholesale building materials. Isn't that interesting? And that's probably because none of these people are really aware, conscious of doing what, of keeping their data secure of having a good it team, a good it department. So there's your bottom line. [01:11:58] Uh, those are the guys that are getting hit. The most, the numbers are increasing dramatically and your costs are not just in the money. You might pay as a ransom. And so, as it turns out in pretty much every case prevention. Is less expensive and much better than the cure of trying to pay ransom or trying to restore from backups. [01:12:24] Hey, you're listening to Craig Peterson. You can get my weekly show notes by just going to Craig peterson.com. And I'll also send you my special report on how to do passwords stick around will be right back. [01:12:42] You know, you and I have talked about passwords before the way to generate them and how important they are. And we we'll go over that again a little bit in just a second, but there is a new standard out there that will eliminate the need for passwords. [01:12:59] I remember, I think the only system I've ever really used that did not require passwords was the IBM 360. [01:13:09] Yeah, 360, you know, you punch up the cards, all of the JCL you feed the card deck in and off it goes. And does this little thing that was a different day, a different era. When I started in college in university, we. We had remote systems, timeshare systems that we could log into. And there weren't much in the line of password requirements in, but you had a username. [01:13:38] You had a simple password. And I remember one of our instructors, his name was Robert, Andrew Lang. And, uh, his password was always some sort of a combination of RA Lang. So it was always easy to guess what his, what his password was. Today, it has gotten a lot worse today. We have devices with us all of the time. [01:14:01] You might be wearing a smart watch. That requires a password. You of course probably have a smart phone. That's also maybe requiring a password, certainly after boots nowadays they use fingerprints or facial recognition, which is handy, but has its own drawbacks. But how about the websites? You're going to the systems you're using when you're at work and logging in, they all require passwords. [01:14:31] And usernames of some sort or another well, apple, Google, and Microsoft have all committed to expanding their support for a standard. That's actually been out there for, for a few years. It's called the Fido standard. And the idea behind this is that you don't have to have a password in order to log. Now that's really kind of an interesting thing, right? [01:14:59] Just looking at it because we're, we're so used to having this password only authentic. And of course the, the thing to do there is make sure you have for your password, multiple words in the password, it should really be a pass phrase. And between the words put in special characters or numbers, maybe mix. [01:15:21] Upper lowercase a little bit. In those words, those are the best passwords, you know, 20 characters, 30 characters long. And then if you have to have a pin, I typically use a 12 digit pin. And how do I remember all of these? Cuz I use a completely different password for every website and right now, Let me pull it up. [01:15:43] I'm using one password dot com's password manager. And my main password for that is about 25 characters long. And I have thirty one hundred and thirty five. Entries here in my password manager, 3,100. That is a whole lot of passwords, right? As well as, um, software licenses and a few other things in there. [01:16:11] That's how we remember them is using a password manager. One password.com is my favorite. Now, obviously I don't make any money by referring you there. I, I really do like that. Uh, some others that I've liked in the past include last pass, but they really messed. With some of their cybersecurity last year and I lost, lost my faith in it. [01:16:33] So now what they're trying to do is make these websites that we go to as well as some apps to have a consistent, secure, and passwordless sign in. and they're gonna make it available to consumers across all kinds of devices and platforms. That's why you've got apple, Google, and Microsoft all committing to it. [01:16:56] And you can bet everybody else is going to follow along because there's hundreds of other companies that have decided they're gonna work with the Fido Alliance and they're gonna create this passwordless future. Which I like this idea. So how does this work? Well, basically you need to have a smartphone. [01:17:16] This is, I'm just gonna go with the most standard
How Private is Crypto? What About WhatsApp and Signal? Cryptocurrencies were thought to be like the gold standard of security, of having your information stay private. Maybe you don't want to use regular currency and transactions. It's all changed. [Automated transcript follows.] [00:00:14] We have had such volatility over the years when it comes to what are called cryptocurrencies. [00:00:21] Now I get a lot of questions about cryptocurrencies. First of all, let me say, I have never owned any cryptocurrencies and I do not own any crypto assets at all. Most people look at crypto currencies and think of a couple of things. First of all, an investment. An investment is something that you can use or sell, right? [00:00:42] Typically investments you don't really use. It's like a house. Is it an investment? Not so much. It's more of a liability, but people look at it and say listen, it went from what was a 10,000. Bitcoins to buy a pizza to, it went up to $50,000 per Bitcoin. There's a pretty big jump there. [00:01:03] And yeah, it was pretty big. And of course, it's gone way down and it's gone back up and it's gone down. It's gone back up. But the idea of any kind of currency is can you do anything with the currency? You can take a dollar bill and go and try and buy a cup of coffee. Okay. A $10 bill and buy a cup of coffee in most places anyways. [00:01:26] That sounds like a good idea. I could probably use a cup of coffee right now and get a tickle on my throat. I hate that. But if you have something like Bitcoin, where can you spend it? You might remember Elon Musk was saying, yeah, you can use Bitcoin to buy a Tesla. Also Wikipedia would accept donations. [00:01:45] Via Bitcoin, there were a number of places online that you could use. Bitcoin. In fact, there's a country right now in south central America that has Bitcoin as its currency. That's cool too. When you think about it, what is, so what are you gonna do? Latin American country? I'm trying to remember what it is. [00:02:05] Oh yeah. It's all Salvador. The first country in the world to adopt Bitcoin is an official legal tender. Now there's a number of reasons they're doing that and he can do it basically. If you got a dictator, you can do almost anything you want to. So in El Salvador, they've got apps that you can use and you can go and buy a tree taco using Bitcoin using their app. [00:02:31] So there you go. If you have Bitcoin, you can go to El Salvador and you can buy all of the tacos and other basic stuff you might wanna buy. But in general, No you can't just go and take any of these cryptocurrencies and use them anywhere. So what good are they as a currency? we already established that they haven't been good as an investment unless you're paying a lot of attention and you're every day buying and selling based on what the movement is. [00:02:59] I know a guy that does exactly that it's, he's a day trader basically in some of these cryptocurrencies, good for. But in reality, is that something that makes sense in a long term? Is that going to help him long term? I don't know. I really don't because again, there's no intrinsic value. [00:03:18] So some of the cryptocurrencies have decided let's have some sort of intrinsic value. And what they've done is they've created what are generally known as stable coins. And a stable coin is a type of cryptocurrency that behind it has the ability to be tied to something that's stable. So for instance, one that really hit the news recently is a stable coin that is tied to the us dollar. [00:03:46] And yet, even though it is tied to the us dollar and the coin is a dollar and the dollar is a coin. They managed to get down into the few pennies worth of value, kinda like penny. so what good was that, it has since come back up, some are tied to other types of assets. Some of them say we have gold behind us. [00:04:09] Kinda like what the United States used to do back when we were on the gold standard. And we became the petrol dollar where countries were using our currency are us dollars, no matter which country it was to buy and sell oil. Things have changed obviously. And we're not gonna talk about. The whole Petro dollar thing right now. [00:04:30] So forget about that. Second benefit. Third benefit is while it's crypto, which means it's encrypted, which means we're safe from anybody's spine on us, anybody stealing it. And of course that's been proven to be false too. We've seen the cryptocurrencies stolen by the billions of dollars. We've seen these cryptocurrencies lost by the billions of dollars as well. [00:04:58] That's pretty substantial. We get right down to it, lost by the billions because people had them in their crypto wallets, lost the password for the crypto wallet. And all of a sudden, now they are completely out of luck. Does that make sense to you? So the basic. Idea behind currency is to make it easier to use the currency than to say, I'll trade you a chicken for five pounds of nail. [00:05:25] Does that make sense to you? So you use a currency. So you say the chicken is worth five bucks. Actually chicken is nowadays is about $30. If it's a LA hen and those five pounds of nails are probably worth about $30. So we just exchanged dollars back and forth. I think that makes a lot of sense. One of the things that has driven up the value of cryptocurrencies, particularly Bitcoin has been criminal marketplaces. [00:05:53] As you look at some of the stats of ransoms that are occurring, where people's computers are taken over via ransomware, and then that person then pays a ransom. And what happens when they pay that ransom while they have to go find an exchange. Pay us dollars to buy cryptocurrency Bitcoin usually. And then they have the Bitcoin and they have to transfer to another wallet, whether or not the bad guys can use the money. [00:06:25] Is a, again, a separate discussion. They certainly can than they do because some of these countries like Russia are going ahead and just exchanging the critical currencies for rubs, which again, makes sense if you're Russia. Now we have a lot of criminals that have been using the Bitcoin for ransoms businesses. [00:06:49] Publicly traded businesses have been buying Bitcoin by the tens of millions of dollars so that they have it as an asset. In case they get ransom. Things have changed. There's a great article in NBC news, by Kevin Collier. And Kevin's talking about this California man who was scammed out of hundreds of thousands of dollars worth of cryptocurrency. [00:07:15] Now this was a fake romance scam, which is a fairly common one. It. It tends to target older people who are lonely and a romance starts online and they go ahead and talk and kind of fall in love. And it turns out she or he has this really almost terminal disease. If only they had an extra, a hundred thousand dollars to pay for the surgery. [00:07:45] You, you know the story, so he was conned out of the money. What's interesting to me is how the investigation and investigative ability has changed over the years. Probably about five years ago, I sat through a briefing by the secret service and. In that briefing, they explained how they had gone and very, quite cleverly tracked the money that was being sent to and used by this dark web operator who ran a site known as a silk road. [00:08:22] And that site was selling illegal things online. Oh, and the currency that they were tracking was Bitcoin. Yes, indeed. So much for cryptocurrency being secure it, five years ago, the secret service was able to do it. The FBI was able to do it and they couldn't do a whole lot about it. But part of the problem is all of your transactions are a matter of public record. [00:08:52] So if someone sends you a fraction of a Bitcoin. That is now in a ledger and that ledger now can be used because when you then spend. Fraction of a Bitcoin somewhere else, it can be tracked. It is tracked is a hundred percent guaranteed to be tracked. And once it's tracked government can get in. [00:09:15] Now, in this case, a deputy district attorney in Santa Clara county, California, was able to track the movement of the cryptocurrency. Yeah. So this district attorney, okay. Deputy district attorney, not the FBI, not the secret service, not the national security agency, a local district attorney in Santa Clara county, California, not a particularly huge county, but. [00:09:44] She was able to track it. And she said that she thinks that the scammer lives in a country where they can't easily extradite them. And so they're unlikely to be arrested at any time soon. So that includes countries like Russia that do not extradite criminals to the United States. Now getting into the details. [00:10:03] There's a great quote from her in this NBC news article, our bread and butter these days really is tracing cryptocurrency and trying to seize it and trying to get there faster than the bad guys are moving it elsewhere, where we can't. Grab it. So she said the team tracked the victim's money as it bounced from one digital wallet to another, till it ended up at a major cryptocurrency exchange where it appeared the scammer was planning to launder the money or cash out, they sent a warrant to the exchange. [00:10:35] Froze the money and she plans to return it to the victim. That is a dramatic reversal from just a few years back when cryptocurrencies were seen as a boon for criminals. Amazing. Isn't it? Stick around. We get a lot more to talk about here and of course, sign up online Craig peterson.com and get my free newsletter. [00:11:01] There have been a lot of efforts by many companies, Microsoft, apple, Google, to try and get rid of passwords. How can you do that? What is a password and what are these new technologies? Apple thinks they have the answer. [00:11:17] Passwords have been the bane of existence for a long while. And if you'd like, I have a special report on passwords, where I talk about password managers, things you can do, things you should do in order to help keep your information safe, online things like. [00:11:34] Bank accounts, et cetera. Just email me, Craig peterson.com and ask for the password special report and I'll get it to you. Believe me it's self-contained it's not trying to get you to buy something. Nothing. It is entirely about passwords and what you can do again, just email me, me@craigpeterson.com and we'll get right back with you. [00:11:56] Give us a couple of days, passwords are a problem. And over the years, the standards for passwords have changed. I remember way back when some of the passwords might be 2, 3, 4 characters long. and back then, those were hard to crack. Then Unix came along. I started using Unix and when was that? [00:12:16] Probably about 81. And as I was messing around with Unix, I. They used to had a couple of changes in how they did passwords. They added assault to it. They used basically the same cipher that the Germans used in world war II, that enigma cipher, which again was okay for the times today, we have much more powerful ciphers and the biggest concern right now, amongst real cybersecurity people. [00:12:43] Government agencies is okay. So what are we going to do when these new quantum computers come along with their artificial intelligence and other things, that's going to be a bit of a problem because quantum computers are able to solve problems in fractions of a second. Even that traditional computers cannot solve it. [00:13:10] It's a whole different thing. I want you to think. Something here. I, if you have a handful of spaghetti now we're talking about hard spaghetti, not cooked spaghetti and they all dried out and they are a varying links. How could you sort those into the smallest to largest, if you will, how could you find which ones were the longest, perhaps? [00:13:37] Which ones were the shortest? There's an analog way of doing that and there's a digital way of doing that. So the digital way for the computer would be. To measure them all and compare the measurements and then identify how long the longest one was. And then maybe you'd have to go back and try and find that. [00:13:55] So you can imagine that would take some time, the analog way of doing that. Cuz there still are analog computers out there and they do an amazing job in certain tasks, but the analog way of doing that is okay. So you take that bundle of various length spaghetti and you slam it on the table. What's gonna happen while those pieces of dried spaghetti are going to self align, right? [00:14:22] The shortest ones are going to be down at the bottom and the tallest one's gonna be sticking out from the top. So there you go. There's your tallest, your longest pieces of spaghetti, and it's done. Instantly. So that's just an idea here, quantum, computing's not the same thing, but that's a comparison really of digital and analog computers, but it's the same type of thing. [00:14:45] Some of these problems that would take thousands of years for digital computer. To work out, can just take a fraction of a second. It's absolutely amazing. So when we're looking at today's algorithms, today's programs for encrypting things like military information, secret telegrams, if you will going back and forth in inside the secretary of state embasies worldwide. [00:15:10] Today they're considered to be quite secure, but with quantum computing what's gonna happen. So there are a lot of people out there right now who are working on trying to figure out how can we come up with an algorithm that works today with our digital computers and can be easily solved by quantum computer. [00:15:34] We have a pretty good idea of how quantum computers are going to work in the future, how they work right now, but this really gets us to the next level, which is cool. Franklin. That's a little bit here about cybersecurity. How about you and your password? How does this all tie in? [00:15:51] There are a few standards out there that people have been trying to pass is it's no longer the four character password you might remember. Oh, it needs to be eight to 10 characters, random mix of upper lowercase, special digits, character numbers. You remember those? And you should change it every 30 days. [00:16:09] And those recommendations changed about three or four years ago when the national Institute of standards and technology said, Hey guys pass phrase is much better than the, what we've been doing because people are gonna remember it and it can be longer. So if you are using I have some past phrases I use that are 30 characters or more. [00:16:33] And I mix up the case and I mix up mix ins on special characters and some numbers, but it's a phrase that I can remember and I have different phrases for different websites. Cause I use a password manager right now. I have about 3,100 entries in my password manager. That's a lot. And I bet you have a lot more passwords or at least a lot more websites and accounts than you realize. [00:17:03] And so that gets to be a real problem. How do you make all of this work and make it easy for people? One of the ways that that. They're looking at using is something called the Fido alliances technique. And the idea behind Fido is actually similar to what I do right now. Cause I use one password.com. [00:17:24] I have an app on my phone and the phone goes ahead and gives me the password. In fact, it'll. Put it in. I have plugins in my browsers. It'll put it right into the password form on the website. And then it'll ask me on my phone. Hey, is that really you? And I'll say yes, using duo and TA I'm logged in it's really quite cool. [00:17:48] Fido is a little different than that, but the same, the whole idea behind Fido is you registered a website and the website will send a request to the Fido app. That's on your phone. So now on your phone, you'll use biometrics or maybe one time pass key, those six digit keys that change every 30 seconds. [00:18:13] And so now you on your phone, you say yeah. That's me. That's good. That's me. Yeah. Okay. And then the app will exchange with the website using public key cryptography. A public key and it's gonna be unique public key for that website. So it'll generate a private key and a public key for that website. [00:18:35] And now TA a, the website does not have your password and cannot get your password. And anytime you log in, it's going to ask you on your smartphone. Is this. And there's ways beyond smartphones. And if you wanna find out more about passwords, I've got, again, that free, special report, just Craig peterson.com. [00:18:59] Email me, just email me@craigpeterson.com and I'll make sure we send that off to you and explains a lot about passwords and current technology. So Fido is one way of doing this and a few different companies have gone ahead and have invested some. Into final registration, because it requires changes on the websites as well in order to. [00:19:25] With Fido. Now you might use a pin, you might use the biometrics, et cetera, but apple has decided they've come up with something even better. Now there's still a lot of questions about what apple is doing, but they are rolling it into the next release of iOS and also of Mac operating system. And you'll be able to use that to secure. [00:19:48] Log into websites. I think Apple's gonna get a lot of traction on this and I think it's gonna be better for all of us involved here. We'll see. There's still a lot of UN unanswered questions, but I'll keep you up to date on this whole password technology stick around. [00:20:08] There are ways for us to communicate nowadays easy ways, but are the easy ways, the best ways, the question here, frankly. And part of this answer has to do with WhatsApp and we'll talk right now. [00:20:23] Many people have asked me about secure messaging. You probably know by now that sending text messages is not secure. [00:20:34] In fact, it could be illegal if you have any personal information about. Patients or maybe employees, you just can't send those over open channels. So what apple has done for instance is they've got their messaging app and if the message is green, it's just reminding you that this is a text message. Now they stuck with green because that was the industry's standard. [00:21:01] Green does not mean safe in the apple world when it comes to iMessage. Blue does. So they've got end to end encryption. So if the message is blue, that means the encryptions in place from side to side, there are on the other end of the spectrum. There are apps like telegram, which are not. Particularly safe. [00:21:22] Now, telegram has pulled up it socks a little bit here, but in order to have end to end encryption and telegram, you have to manually turn it on. It is not on by default. I also personally don't trust telegram because of their background, things that they've done in the past. Avoid that. [00:21:43] WhatsApp is something I've been asked about. I had a family member of a service member who was overseas, ask if WhatsApp was safe for them to communicate on cuz they didn't want third parties picking. Private messages, things you say and do online with friends and family are not necessarily things there are for public consumption. [00:22:06] So the answer that I gave was yeah, you might remember Facebook getting WhatsApp. They bought it and deciding they were going to make some changes to the privacy settings in. now that was really a big mistake. They said we're gonna add advertisements. How are you going to effectively advertise? [00:22:27] If you don't know what we're talking about, have you noticed advertising platforms? If you look up something or someone else in your house looks up something, if your neighbors are looking up, they assume that you might be interested in it as well. So what do they do? They go ahead and show you ads for that brand new pair of socks that you never really cared about, but because the algorithms in the background figured yeah, that's what you've been talking about. [00:22:55] Let's pass out your pair of socks. So if Facebook is going to. Add into WhatsApp, what's going to happen. Are they going to be monitoring what you're saying? And then sending you some of these messages, right? These ads, because of that, a lot of people started looking for a more secure. Platform and that's frankly, where Moxi Marlin spike comes in a fun name, the bloom in this case, but he started a company called signal. [00:23:30] He didn't just start it. He wrote the code for it, the server code, everything. And the whole idea behind signal was to have a guaranteed safe end to end way to communicate. A third party with a friend, a relative, et cetera. So signal is something that I've used in the past. And I used from time to time now, as well, depending on who I'm talking to. [00:23:56] And it does allow you to send messages. It does allow you to talk. You can do all kinds of stuff with it. So now there's an issue with signal. It's disappointing. Moxi has stepped down from running signal. There's a company behind it in January, 2022. And he said, the company's begin off. They can run themselves. [00:24:19] He's still on the board of direct. And the guy who's currently the head of signal is also a very privacy focused guy, which is really good too signal by the way is free. And you can get it for pretty much any platform you would care to have it for a very nice piece of software. I like what they've done. [00:24:38] Now the problem is that some of those people at signal have decided that they should have a way of making payments inside signal. So a few months ago, they went ahead and added into signal, a piece of software that allows you to send. Payments online. Now this is a little concerning and the let's talk about some of the reasons for the concern. [00:25:09] Basically what we're seeing is a cryptocurrency that Moxi himself helped to put in place now, I guess that's good cuz he understands it. It's supposedly a cryptocurrency that is privacy. Focused. And that's a good thing. What type of crypto is it? That's privacy focused. And how good is it going to be? [00:25:34] Those are all good questions, but here's the biggest problem. I think that comes from this. We've got our friends at Facebook, again, trying to add crypto payments to their various messenger and other products. We're seeing that from a lot of these communication systems, cuz they can skim a little off the top legally, charge you a fee and then make their money that way. But. What happens when you put it into an encrypted messaging app? Bottom line, a lot of bad things can happen here because now all of a sudden you come under financial regulations, right? Because you are performing a financial. Function. So now potentially here, there could be criminal misuse of the app because you could have ransomware and they say, reach us on signal. [00:26:33] Here's our signal account. And go ahead and send us crypto. it's called mobile coin by the way, this particular cryptocurrency. So now all of a sudden you are opening up the possibility of all kinds of bad things happening and your app signal, which was originally great for messaging now being used nefariously. [00:26:57] I think that's a real problem. Now, when it comes to money transfer functions with cryptocurrencies to say that they're anonymous, I think is a hundred percent a misnomer because it's really pseudo anonymous. It's never completely anonymous. So now you've increased the legal attack surface here. So now the various regulators and countries around the world can say, Hey. [00:27:26] This is no longer just a messaging app. You are using it to send money. We wanna track all money transactions. And so what does that mean? That means now we need to be able to break the encryption or need to shut down your app, or you need to stop the ability to send money. So the concern right now with signal is we really could have some legal problems with signal. [00:27:53] And we could potentially cause some real life harm. On the other side of, this is what Moi Marlin spike has been really driving with signal over the years, which is we don't want anyone to be able to break into signal. So there's a particularly one Israeli based company that sells tools that you can buy that allow you to break into smartphone. [00:28:20] And they're used by everybody from criminals. You can even buy some of these things on eBay. And they're used also by law enforcement agencies. So he found that there was a bug in one of the libraries that's used by this Israeli soft. To where that causes it to crash. And so he puts some code into signal, at least he threatened to that would cause any of the scanning software that tries to break into your smartphone to fail to crash. [00:28:53] Yeah. Yeah. Cool. Greg Peterson here, online Craig peterson.com and really you are not alone. [00:29:09] I got some good news about ransomware and some bad news about B E C business email compromise. In fact, I got a call just this just this week from someone who had in fact again, had their operating account emptied. [00:29:27] Ransomware is a real problem, but it's interesting to watch it as it's evolved over the years. [00:29:36] We're now seeing crackdowns driving down ransomware profits. Yes, indeed. Ransomware's ROI is dropping the return on investment. And so what we're starting to see is a drive towards more. Business email compromise attack. So we'll talk about those, what those are. And I have a couple of clients now that became clients because of the business email compromises that happened to them. [00:30:10] A great article that was in this week's newsletter. You should have received it Tuesday morning from me. If you are signed up for the free newsletter. Craig peterson.com/subscribe. You'll get these usually Tuesday morning. It's my insider show notes. So you can get up to speed on some of the articles I'm talking about during the week that I talk about on the radio. [00:30:38] And of course talk about here on the radio show and podcast and everything else as well. So what we're seeing here, according to dark readings, editor, Becky Bracken is some major changes, a pivot by the bad guys, because at the RSA conference, they're saying that law enforcement crackdowns try cryptocurrency regulations. [00:31:05] We've been talking about that today and ransomware as a service operator. Downs are driving the return on investment for ransomware operations across the world all the way across the globe. So what is ransomware as a service? I think that's a good place to start because that has really been an Albert Cross around our next for a long time. [00:31:30] The idea with ransomware is they get you to download some software, run some software that you really should not be running. That makes sense to you. So you get this software on your computer, it exfil trades files. So in other words, it takes files that you have sends them. Off to the bad guys. And then once it's done that, so it'll send like any word files, it finds Excel, other files. [00:32:00] It might find interesting once it's done that, then it goes ahead and encrypts those files. So you no longer have access to them and it doesn't just do them on your computer. If you share a drive, let's say you've got a Gdrive or something else on your computer that is being mounted from either another computer or maybe a server. [00:32:24] It will go ahead and do the same thing. With those files. And remember it, isn't just encrypting because if you have a good backup and by the way, most businesses that I've come into do not have a good backup, which is a real problem because their backups fail. They haven't run. I had one case where we helped the business out and it had been a year and a half since they had a successful backup and they had no. [00:32:52] They were dutifully carrying home. These USB drives every day, plug in a new one in, and the backups were not running. Absolutely amazing. So anyhow, ransomware is a service then. So they've encrypted your files. They've exfiltrated. In other words, they've taken your files and then they demand a ran. [00:33:14] So usually it's like this red screen that comes up and says, Hey all your files are belong to us and you need to contact us. So they have people who help you buy Bitcoin or whatever they're looking for. Usually it's Bitcoin and send the Bitcoin to them. And then they'll give you what's hopefully a decryption. [00:33:38] Now what's particularly interesting about these decryption keys is they work about half of the time. So in other words, about half of the time, you'll get all your data back about half the time. You will not, it's just not good. So if you are a small operator, if you are just a small, bad guy and it's you and maybe somebody else helping you, you got your nephew there helping you out. [00:34:03] How are you going to. Help these people that you're ransoming by the cryptocurrency. How are you going to threaten them with release of their documents online? Unless you have a staff of people to really help you out here? That's where ransomware's a service comes in. The whole idea behind RA is. [00:34:25] You can just be a one man shop. And all you have to do is get someone to open this file. So you go ahead and register with the ransomware service provider and they give you the software and you embed your little key in there, so they know it's you. And then you send it off in an email. You might try and mess with those people to get them to do something they shouldn't do. [00:34:49] And. That's all you have to do because once somebody opens up that file that you sent them, it's in the hand of these service guys and ransomwares the service guys. So the, these ransomwares of service people will do all of the tech support. They'll help people buy the Bitcoin. They'll help them pay the ransom. [00:35:11] They'll help them recover files, to a certain extent. Does this make sense to you? Yeah, it's kinda crazy. Now I wanna offer you, I've got this document about the new rules for backup and again, it's free. You can get it. No problem. Just go ahead and email me, me@craigpeterson.com m@craigpeterson.com because the backups are so important and. [00:35:38] Just like password rules have changed. The rules have changed for backups as well. So just drop me an email me@craigpeterson.com and ask for it and we'll make sure we send it off to you and is not trying to sell you more stuff. Okay. It's really is explaining the whole thing for you. I'm not holding anything back. [00:35:54] These ransoms, the service operators, then get the payment from you and then pay a percentage anywhere from 80% to 50%, sometimes even lower to the person who ransom due. Isn't that just wonderful. So our law enforcement people, as well as in other countries have been going after the ransomware as a service providers, because if they can shut down. [00:36:21] These RAs guys just shutting. One of them down can shut down thousands of small ransomware people. Isn't that cool works really well. So they have been shut down. Many of them there's one that just popped its head back up again. After about six months, we'll see how far they get, but it is a very big. [00:36:46] Blow to the whole industry, ransomware really because of these O as a service operators has become a centralized business. So there's a small number of operators responsible for the majority of these thousands of hundreds of thousands of attacks. Really. It's probably worse than. So couple of dis big groups are left the KTI group and lock bit, and they've got more than 50% of the share of ransomware attacks in the first half of 2022. [00:37:18] But now they're going after them. The feds. And I think that makes a whole lot of sense, because who do you go for while you go for the people who are causing the most harm and that's certainly them. So I expect they'll be shut down sometimes soon, too. Ransomware had its moment over the last couple of years, still a lot of ransomware out there, still a lot of problems, but now we're seeing B C business, email compromise tactics, and I did a. [00:37:50] At television appearance, where I was working with the the newsmaker or whatever they call them, talking heads on that TV show and explaining what was happening. And the most standard tactic right now is the gift card swindle. I should put together a little video on this one, but it was all, it's all about tricking employees into buying bogus gift cards. [00:38:18] So this good old fashioned Grif is still working. And what happened in our case is it was actually one of the newscasters who got an email, supposedly from someone else saying, Hey we wanna celebrate everybody. And in order to do that, I wanna give 'em all gift cards. So can you go out and buy gift cards? [00:38:42] And so we messed around with them. It was really fun and said, okay what denomination, how many do you think we need? Who do you think we should give them to? And of course we knew what we were doing. Their English grammar was not very good. And it was really obvious that this was not. [00:38:59] The person they were pretending to be. So that happens and it happens a lot. They got into a business email account, the email account of that newscaster. So they were able to go through their email, figure out who else was in the business, who was a trusted source inside of the business. So they could pretend that that they were that newscaster and send emails to this trusted source. [00:39:31] And today these business email compromise attacks are aimed at the financial supply chain. And once these threat actors are inside, they look for opportunities to spoof vendor emails, to send payments to controlled accounts. And the worst case I know of this is a company that sent $45 million. To a scammer. [00:39:57] And what happened here is the, this woman pretended to be the CEO who was out of the country at the time and got the CFO to wire the money to her. An interesting story. We'll have to tell it to you sometime, but it's a real problem. And we just had another one. We've had them in school districts, look, 'em up online, do a duck dot, go search for them and you'll find them right. [00:40:24] Left and center because social engineering works. And frankly, business email compromise is a clear threat to businesses everywhere. I, as I mentioned, we had one listens to the show, contact us just last week. Again, $40,000 taken out of the operating account. We had another one that had a, I think it was $120,000 taken out of the operating account. [00:40:53] And another one that had about $80,000 taken outta the operating account. Make sure you're on my newsletter. even the free one. I do weekly free trainings. Craig peterson.com. Make sure you subscribe now. [00:41:10] Facebook's about 18 years old coming on 20 Facebook has a lot of data. How much stuff have you given Facebook? Did you fall victim for that? Hey, upload your contacts. We'll find your friends. They don't know where your data is. [00:41:26] It's going to be a great time today because man. This whole thing with Facebook has exploded here lately. [00:41:35] There is an article that had appeared on a line from our friends over at, I think it was, yeah. Let me see here. Yeah. Yeah. Motherboard. I was right. And motherboards reporting that Facebook doesn't know what it does with your data or. It goes now, there's always a lot of rumors about different companies and particularly when they're big company and the news headlines are grabbing your attention. [00:42:08] And certainly Facebook can be one of those companies. So where did motherboard get this opinion about Facebook? Just being completely clueless about your personal data? It came from a leaked document. Yeah, exactly. So I, we find out a lot of stuff like that. I used to follow a website about companies that were going to go under and they posted internal memos. [00:42:38] It basically got sued out of existence, but there's no way that Facebook is gonna be able to Sue this one out of existence because they are describing this as. Internally as a tsunami of privacy regulations all over the world. So of course, if you're older, we used to call those TIAL waves, but think of what the implication there is of a tsunami coming in and just overwhelming everything. [00:43:08] So Facebook internally, they, their engineers are trying to figure out, okay, so how do we deal? People's personal data. It's not categorized in ways that regulators want to control it. Now there's a huge problem right there. You've got third party data. You've got first party data. You've got sensitive categories, data. [00:43:31] They might know what religion you are, what your persuasions are in various different ways. There's a lot of things they might know about you. How are they all CATA categorized? Now we've got the European union. With their gen general data protection regulation. The GDPR we talked about when it came into effect back in 2018, and I've helped a few companies to comply with that. [00:43:56] That's not my specialty. My specialty is the cybersecurity side. But in article five, this European law mandates that personal data must be collected for specified explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes. So what that means is that every piece of data, like where you are using Facebook or your religious orientation, Can only be collected and used for a specific purpose and not reused for another purpose. [00:44:34] So there's an example here that vice is giving in past Facebook, took the phone number that users provided to protect their accounts with two factor authentication and fed it to its people, feature as well as. Advertisers. Yeah. Interesting. Eh, so Gizmoto with the help of academic researchers caught Facebook doing this, and eventually the company had to stop the practice. [00:45:01] Cuz this goes back to the earlier days where Facebook would say, Hey, find out if your friends are on Facebook, upload your contacts right now. And most people. What did you know back then about trying to keep your data private, to try and stop the proliferation of information about you online and nothing. [00:45:21] I think I probably even uploaded it back then thinking that'd be nice to see if I got friends here. We can start chatting, et cetera. According to legal experts that were interviewed by motherboard who wrote this article and has a copy of the internal me memo, this European regulation specifically prohibits that kind of repurposing of your phone number of trying to put together the social graph and the leak document shows that Facebook may not even have the ability to limit. [00:45:53] how it handles users data. Now I was on a number of radio stations this week, talking about this and the example I gave, I is just look at an average business from the time it start, Facebook started how right. You scrape in pictures of young women off of Harvard universities. Main catalog, contact page, and then asking people what do you think of this rate? This person rate that person and off they go, trying to rate them. Yeah. All that matters to a woman, at least according to mark Zuckerberg or all that matters about a woman is how she looks. Do I think she's pretty or not ridiculous what he was doing? [00:46:35] I, it just, oh, that's Zuckerberg, right? That's. Who he is not a great guy anyways. So you go from stealing pictures of young ladies asking people to rate them, putting together some class information and stuff there at Harvard, and then moving on to other universities and then opening up even wider and wider. [00:47:00] And of course, that also created demand cuz you can't get on. If you're not at one of the universities that we have set it up for. And then you continue to grow. You're adding these universities, certain you're starting to collect data and you're making more money than God. So what do you do? You don't have to worry about inefficiencies. [00:47:20] I'll tell you that. One thing you don't have to do is worry about, oh, GE we've got a lot of redundant work going on here. We've got a lot of teams working on basically the same thing. No, you've got more money than you can possibly shake a stick at. So now you go ahead and send that money to this group or that group. [00:47:41] And they put together all of the basic information, that, that they want. They are. Pulling it out of this database and that database, and they're doing some correlation writing some really cool sequel queries with some incredible joins and everything else. And now that becomes part of the main code for Facebook. [00:48:02] And then Facebook goes on to the next little project and they do the same thing. Then the next project, then the next project. And then someone comes along and says Hey, we. This feature, that feature for advertisers and then in that goes, and then along comes candidate Obama. And they, one of the groups inside Facebook says yeah here we go. [00:48:25] Here's all of the information we have about everybody and it's free. Don't worry about it. And then when Trump actually bought it and hired a company to try and process some of that information he got in trouble. No but the Obama. The whole campaign could get access to anything they wanted to, again, because the data wasn't controlled, they had no idea who was doing what with the data. [00:48:50] And according to this internal memo, they still don't know. They don't even know if they can possibly comply with these regulations, not just in Europe, but we have regulations in pretty much all of the 50 states in the us Canada of course, has their own Australia, New Zealand think about all the places. [00:49:12] Facebook makes a lot of money. So here's a quote from that we build systems with open borders. The result of these open systems and open culture is well described with an analogy. Imagine you hold a bottle of ink in your hand, the bottle of ink is a mixture of all kinds of user data. You pour that ink into a lake of water. [00:49:34] Okay. And it flows every. The document red. So how do you put that ink back in the bottle, in the right bottle? How do you organize it again? So that it only flows to the allowed places in the lake? They're totally right about that. Where did they collect it from it? Apparently they don't even know where they got some of this information. [00:49:58] This data from reminds me of the no fly list. You don't know you're on it and you can't get yourself off of it. It is crazy. So this document that we're talking about was written last year by. Privacy engineers on the ad and business product team, whose mission is to make meaningful connections between people and businesses and which quote sits at the center of a monetization strategy. [00:50:22] And is the engine that powers Facebook's growth. Interesting problems. And I see this being a problem well into the future for more and more of these companies, look at Twitter as an example that we've all heard about a lot lately. And I've talked about as well along comes Elon Musk and he says wait a minute now. [00:50:41] Now I can make Twitter way more profitable. We're gonna get rid of however many people it's well over a thousand, and then we are going to hire more people. We're gonna start charging. We're gonna be more efficient. You can bet all of these redundancies that are in Facebook are also there on Twitter. and Twitter also has to comply with all of these regulations that Facebook is freaking out about. [00:51:09] It, for really a very good reason. So this document is available to anybody who wants to look at it. I'm looking at it right now, talking about regulatory landscape and the fundamental problems Facebook's data lake. And this is a problem that most companies have not. As bad as Facebook does, but most companies, you grow. I have yet to walk into a business that needs help with cybersecurity and find everything in place as it should be, because it grew organically. You started out with a little consumer firewall, router and wifi, and then you added to it and you put a switch here and you added another switch behind that and move things around. [00:51:54] This is normal. This is not total incompetence on the part of the management, but my gosh, I don't know. Maybe they need an Elon Musk. Just straighten them out as well. Hey, stick around. I'll be right back and sign up online@craigpeterson.com. [00:52:13] Apparently looting is one of the benefits of being a Russian soldier. And according to the reports coming out of Ukraine, they've been doing it a lot, but there's a tech angle on here that is really turning the tables on these Russian looters. [00:52:30] This is really something, we know in wars, there are people that loot and typically the various militaries try and make sure, at least recently that looting is kept to an absolute minimum. [00:52:45] Certainly the Americans, the British, even the Nazis during world war II the the socialists they're in. Germany they tried to stop some of the looting that was going on. I think that's probably a very good thing, because what you end up with is just all of these locals that are just totally upset with you. [00:53:10] I found a great article on the guardian and there's a village. Had been occupied for about a month by Russian troops and the people came back, they are just shocked to see what happened. They're giving a few examples of different towns. They found that alcohol was stolen and they left empty bottles behind food rappers, cigarette butts, thrown all over the place in apartments and homes. [00:53:39] Piles of feces blocking the toilets, family photographs torn, thrown around the house. They took away all of the clothes. This is a code from one of the people, literally everything, male and female coats, boots, shirts, jackets, even my dresses and lingerie. This is really something. It, the Soviets didn't do this, but now Russian. [00:54:02] Military apparently does. So over the past couple of weeks, there've been reporting from numerous places where Russian troops had occupied Ukrainian territory and the guardian, which is this UK newspaper collected evidences suggests looting by Russian forces was not merely a case of a few way, word soldiers, but a systematic part of Russian military behavior across multiple towns. [00:54:29] And villages. That's absolutely amazing. Another quote here, people saw the Russian soldiers loading everything onto Euro trucks, everything they could get their hands on a dozen houses on the villages. Main street had been looted as well as the shops. Other villagers reported losing washing machines, food laptops, even as sofa, air conditioners. [00:54:53] Being shipped back, just you might use ups here, they have their equivalent over there. A lady here who was the head teacher in the school. She came back in, of course, found her home Lood and in the head teacher's office. she found an open pair of scissors that had been jammed into a plasma screen that was left behind because if they can't steal it, they're gonna destroy it. [00:55:19] They don't only leave anything behind. They found the Russians had taken most of the computers, the projectors and other electronic equipment. It's incredible. So let's talk about the turnaround here. A little. You might have heard stories about some of these bad guys that have smashed and grabbed their way into apple stores. [00:55:38] So they get into the apple store. They grab laptops on iPads, no longer iPods, cuz they don't make those anymore. And I phones. And they take them and they run with them. Nowadays there's not a whole lot of use for those. Now what they have been doing, some of these bad guys is they take some parts and use them in stolen equipment. [00:56:03] They sell them on the used market, et cetera. But when you're talking about something specific, like an iPhone that needs specific activation. Completely different problem arises for these guys because that iPhone needs to have a SIM card in order to get onto the cell network. And it also has built in serial numbers. [00:56:26] So what happens in those cases while apple goes ahead and disables them. So as soon as they connect to the internet, let's say they put 'em on wifi. They don't get a SIM card. They don't. service from T-Mobile or Verizon or whoever it might be. So now they disconnect to the wifi and it calls home, cuz it's gonna get updates. [00:56:45] So on download stuff from the app store and they find that it's been bricked. Now you can do that with a lot of mobile device managers that are available for. All kinds of equipment nowadays, but certainly apple equipment where if a phone is lost or stolen or a laptop or other pieces of equipment, you can get on the MDM and disable it, have it remotely erased, et cetera. [00:57:11] Now, police have had some interesting problems with that. Because a bad guy might go ahead and erase a smartphone. That's in the evidence locker at the police station. So they're doing things like putting them into Fairday cages or static bags or other things to try and stop that. So I think we've established here that the higher tech equipment is pretty well protected. [00:57:36] You steal it. It's not gonna do you much. Good. So one of the things the Russian stole when they were in it's called I think you pronounce it. Mela me pole which is again, a Erian city is they stole all of the equipment from a farm equipment dealership and shipped it to Chenia. Now that's according to a source in a businessman in the area that CNN is reporting on. [00:58:06] So they shipped this equipment. We're talking about combines harvesters worth 300 grand a piece. They shipped it 700 miles. and the thieves were ultimately unable to use the equipment, cuz it had been locked remotely. So think about agriculture equipment that John Deere, in this case, these pieces of equipment, they, they drive themselves. [00:58:33] It's autonomous. It goes up and down the fields. Goes any pattern that you want to it'll bring itself within a foot or an inch of your boundaries, of your property being very efficient the whole time, whether it's planting or harvesting, et cetera. And that's just a phenomenal thing because it saves so much time for the farmer makes it easier to do the companies like John Deere. [00:58:58] Want to sell as many pieces of this equipment as they possibly can. And farming is known to be a, what not terribly profitable business. It certainly isn't like Facebook. So how can they get this expensive equipment into the hands of a lot of farmers? What they do is they lease it. So you can lease the equipment through leasing company or maybe directly from the manufacturer and now you're off and running. [00:59:26] But what happens if the lease isn't paid now? It's one thing. If you don't pay your lease on a $2,000 laptop, right? They're probably not gonna come hunting for you, but when you're talking about a $300,000 harvester, they're more interested. So the leasing company. Has titled to the equipment and the leasing company can shut it off remotely. [00:59:51] You see where I'm going with this so that they can get their equipment in the hands of more farmers cuz the farmers can lease it. It costs them less. They don't have to have a big cash payment. You see how this all works. So when the Russian forces stole this equipment, that's valued. Total value here is about $5 million. [01:00:11] They were able to shut it all. And obviously, if you can't start the engine, because it's all shut off and it's all run by computers nowadays, and there's pros and cons to that. I think there's a lot of cons, but what are you gonna do? How's that gonna work for you? It. Isn't going to work for you. [01:00:32] And they were able to track it. It had GPS trackers find out exactly where it was. That's how they know it was taken to Chenia and could be controlled remotely. And in this case, how'd they control it. They completely. Shut it off. Even if they sell the harvesters for spare parts, they'll learn some money, but they sure can be able to sell 'em for the 300 grand that they were actually worth. [01:00:57] Hey, stick around. We'll be right back and visit me online@craigpeterson.com. If you sign up there, you'll be able to get my insider show note. And every week I have a quick five. Training right there in your emails, Craig Peter san.com. That's S O N in case you're wondering. [01:01:22] If you've been worried about ransomware, you are right to worry. It's up. It's costly. And we're gonna talk about that right now. What are the stats? What can you do? What happens if you do get hacked? Interesting world. [01:01:38] Ransomware has been a very long running problem. I remember a client of ours, a car dealership who we had gone in. [01:01:49] We had improved all of their systems and their security and one of their. People who was actually a senior manager, ended up downloading a piece of ransomware, one of these encrypted ones and opened it up and his machine, all of a sudden TA, guess what it had ransomware on it. One of those big reds. [01:02:12] Greens that say pay up is send us this much Bitcoin. And here's our address. All of that sort of stuff. And he called us up and said, what's going on here? What happened? First of all, don't bring your own machine into the office. Secondly, don't open up particularly encrypted files using the password that they gave. [01:02:33] and thirdly, we stopped it automatically. It did not spread. We were able to completely restore his computer. Now let's consider here at the consequences of what happened. So he obviously was scared. And within a matter of a couple of hours, we actually had him back to where he was and it didn't spread. [01:02:59] So the consequences there they weren't that bad. But how about if it had gotten worse? How about if they ransomware. Also before it started holding his computer ransom, went out and found all of the data about their customers. Would, do you think an auto dealership would love to hear that all of their customer data was stolen and released all of the personal data of all of their customers? [01:03:25] Obviously not. So there's a potential cost there. And then how long do you think it would take a normal company? That thinks they have backups to get back online. I can tell you it'll take quite a while because the biggest problem is most backups don't work. We have yet to go into a business that was actually doing backups that would work to help restore them. [01:03:52] And if you're interested, I can send you, I've got something. I wrote up. Be glad to email it back to you. Obviously as usual, no charge. and you'll be able to go into that and figure out what you should do. Cause I, I break it down into the different types of backups and why you might want to use them or why you might not want to use them, but ransomware. [01:04:15] Is a kind of a pernicious nasty little thing, particularly nowadays, because it's two, two factor, first is they've encrypted your data. You can't get to it. And then the second side of that is okay I can't get to my data and now they're threatening to hold my data ransom or they'll release. So they'll put it out there. [01:04:38] And of course, if you're in a regulated industry, which actually car dealers are because they deal with financial transactions, leases, loans, that sort of thing you can lose your license for your business. You can U lose your ability to go ahead and frankly make loans and work with financial companies and financial instruments. [01:05:00] It could be a very big deal. so there are a lot of potential things that can happen all the way from losing your reputation as a business or an individual losing all of the money in your operating account. And we, again, we've got a client that we picked up afterwards. That yes, indeed. They lost all of the money in their operating account. [01:05:24] And then how do you make payroll? How do you do things? There's a new study that came out from checkpoint. Checkpoint is one of the original firewall companies and they had a look at ransomware. What are the costs of ransomware? Now bottom line, I'm looking at some stats here on a couple of different sites. [01:05:44] One is by the way, KTI, which is a big ransomware gang that also got hacked after they said we are going to attack anyone that. That doesn't defend Vlad's invasion of Ukraine, and then they got hacked and their information was released, but here's ransomware statistics. This is from cloud words. First of all, the largest ransom demand is $50 million. [01:06:11] And that was in 2021 to Acer big computer company. Now 37% of businesses were hit by ransomware. In 2021. This is amazing. They're expecting by 2031. So in about a decade, ransomware is gonna be costing about $265 billion a year. Now on average Ransomware costs businesses. 1.8, 5 million to recover from an attack. [01:06:41] Now that's obviously not a one or two person place, but think of the car dealer again, how much money are they going to make over the year or over the life of the business? If you're a car dealer, you have a to print money, right? You're selling car model or cars from manufacturer X. And now you have the right to do that and they can remove that. [01:07:03] How many tens, hundreds of millions of dollars might that end up costing you? Yeah. Big deal. Total cost of ransomware last year, 20 billion. Now these are the interesting statistics here right now. So pay closer attention to this 32% of ransomware victims paid a ransom demand. So about her third paid ransom demand. [01:07:27] Last. It's actually down. Cuz my recollection is it used to be about 50% would pay a ransom. Now on average that one third of victims that paid a ransom only recovered 65% of their data. Now that differs from a number I've been using from the FBI. That's a little bit older that was saying it's little better than 50%, but 65% of pain victims recovered their data. [01:07:55] Now isn't that absolutely amazing. Now 57% of companies are able to recover the data using a cloud backup. Now think about the different types of backup cloud backup is something that can work pretty well if you're a home user, but how long did it take for your system to get backed? Probably took weeks, right? [01:08:19] For a regular computer over a regular internet line. Now restoring from backup's gonna be faster because your down link is usually faster than your uplink. That's not true for businesses that have real internet service ours. It's the same bandwidth up as it is down. But it can take again, days or weeks to try and recover your machine. [01:08:39] So it's very expensive. And I wish I had more time to go into this, but looking at the costs here and the fact that insurance companies are no longer paying out for a lot of these ransomware attacks, it could be incredibly expensive for you incredibly. So here you. The number one business types by industry for ransomware tax retail. [01:09:13] That makes sense. Doesn't it. Real estate. Electrical contractors, law firms and wholesale building materials. Isn't that interesting? And that's probably because none of these people are really aware, conscious of doing what, of keeping their data secure of having a good it team, a good it department. So there's your bottom line. [01:09:40] Those are the guys that are getting hit. The most, the numbers are increasing dramatically and your costs are not just in the money. You might pay as a ransom. And as it turns out in pretty much every case prevention. Is less expensive and much better than the cure of trying to pay ransom or trying to restore from backups. [01:10:06] Hey, you're listening to Craig Peterson. You can get my weekly show notes by just going to Craig peterson.com. And I'll also send you my special report on how to do passwords stick around will be right back. [01:10:24] You and I have talked about passwords before the way to generate them and how important they are. And we'll go over that again a little bit in just a second, but there is a new standard out there that will eliminate the need for passwords. [01:10:40] I remember, I think the only system I've ever really used that did not require passwords was the IBM 360. [01:10:49] Yeah, 360, you punch up the cards, all of the JCL you feed the card deck in and off it goes. And does this little thing that was a different day, a different era. When I started in college in university, we. We had remote systems, timeshare systems that we could log into. And there weren't much in the line of password requirements in, but you had a username. [01:11:18] You had a simple password. And I remember one of our instructors, his name was Robert, Andrew Lang. And his password was always some sort of a combination of RA Lang. So it was always easy to guess what his password was. Today, it has gotten a lot worse today. We have devices with us all of the time. [01:11:40] You might be wearing a smart watch. That requires a password. You of course probably have a smart phone. That's also maybe requiring a password, certainly after boots nowadays they use fingerprints or facial recognition, which is handy, but has its own drawbacks. But how about the websites? You're going to the systems you're using when you're at work and logging in, they all require passwords. [01:12:10] And usernames of some sort or another well, apple, Google, and Microsoft have all committed to expanding their support for a standard. That's actually been out there for a few years. It's called the Fido standard. And the idea behind this is that you don't have to have a password in order to log. Now that's really an interesting thing, right? [01:12:37] Just looking at it because we're so used to having this password only authentic. And of course the thing to do there is make sure you have for your password, multiple words in the password, it should really be a pass phrase. And between the words put in special characters or numbers, maybe mix. [01:12:59] Upper lowercase a little bit. In those words, those are the best passwords, 20 characters, 30 characters long. And then if you have to have a pin, I typically use a 12 digit pin. And how do I remember all of these? Cuz I use a completely different password for every website and right now, Let me pull it up. [01:13:21] I'm using one password dot com's password manager. And my main password for that is about 25 characters long. And I have thirty one hundred and thirty five. Entries here in my password manager, 3,100. That is a whole lot of passwords, right? As well as software licenses and a few other things in there. [01:13:48] That's how we remember them is using a password manager. One password.com is my favorite. Now, obviously I don't make any money by referring you there. I really do like that. Some others that I've liked in the past include last pass, but they really messed. With some of their cybersecurity last year and I lost my faith in it. [01:14:08] So now what they're trying to do is make these websites that we go to as well as some apps to have a consistent, secure, and passwordless sign in. and they're gonna make it available to consumers across all kinds of devices and platforms. That's why you've got apple, Google, and Microsoft all committing to it. [01:14:32] And you can bet everybody else is going to follow along because there's hundreds of other companies that have decided they're gonna work with the Fido Alliance and they're gonna create this passwordless future. Which I like this idea. So how does this work? Basically you need to have a smartphone. [01:14:50] This is, I'm just gonna go with the most standard way that this is going to work here in the future. And you can then have a, a. Pass key. This is like a multifactor authentication or two factor authentication. So for instance, right now, when I sign into a website online, I'm giving a username, I'm giving a password and then it comes up and it asks me for a code. [01:15:14] So I enter an a six digit code and that code changes every 30 seconds. And again, I use my password manager from one password dot. In order to generate that code. So that's how I log into Microsoft sites and Google sites and all kinds of sites out there. So it's a similar thing here now for the sites for my company, because we do cyber security for businesses, including regulated businesses. [01:15:41] We have biometrics tied in as. so to log into our systems, I have to have a username. I have to have a password. I then am sent to a single sign on page where I have to have a message sent to my smart device. That then has a special app that uses biometrics either a face ID or a fingerprint to verify who I am. [01:16:06] Yeah, there's a lot there, but I have to protect my customer's data. Something that very few it's crazy. Actual managed security services providers do, but it's important, right? By the way, if you want my password. Special report, just go to Craig peterson.com. Sign up for my email list. [01:16:29] I'll send that to you. That's what we're sending out right now for anyone who signs up new@craigpeterson.com. And if you'd like a copy of it and you're already on the list, just go ahead and email me M E. At Craig peterson.com and ask for the password special report where I go through a
Welcome to the 3yr anniversary episode, we've got it all going on Stream; https://podlink.to/kr036 Kontrast Radio Spotify Playlist; https://gate.sc/?url=https%3A%2F%2Fopen.spotify.com%2Fplaylist%2F1mTvFtXb4ZdKimqFMVgPiK%3Fsi%3De93f9089513843f7&token=422b42-1-1652084817653 Tracklisting 1. David Rust & Renegade System - All You Give 2. Novakaine - Waves 3. Valentino Khan & Psycho Boys Club - Baja Blast 4. TNT - OMG 5. Darren Styles & Mark Sixma Ft. Noubya - Louder 6. Lost Identity & Maxtreme - Charlotte 7. Dropixx & Limitless - Lift Me Up 8. Stephen Game - Secrets 9. Kronos - 1991 10. Ben Nicky, Dr Phunk & Technikore - Ghost Town 11. Rivalz & No Hero - Lucky 12. Daniel Seven - On My Mind 13. Chris Henry - Magic Touch [Jakka-B Remix] 14. Joey Riot & Mike Reverie - Another Dimension 15. Shik & NTXC - Sign Of Life 16. Rob IYF & Al Storm - Tetris 17. Alaguan - Back With A Bang! 18. G-Drive & Jack in the Box - I will Stand Up 19. Evil Activities - Nobody Said It Was easy [Sefa Remix]
Sorry we are late folks but this file was so big, G-Drive kept crashing every time we tried to load it. This time you have Eddie and Chema sitting down and taking on the task of counting down their personal Top 10's of all Animated films, buckle up folks, your in for a long one!
Sorry we are late folks but this file was so big, G-Drive kept crashing every time we tried to load it. This time you have Eddie and Chema sitting down and taking on the task of counting down their personal Top 10's of all Animated films, buckle up folks, your in for a long one!
0:00 Think of your future 0:08 Intel GPU leaks 1:02 DuckDuckGo Desktop browser 1:57 Google Drive restricts sharing 2:45 Build Redux 3:18 QUICK BITS 3:23 Third AWS outage this month 3:51 Detect at-home tests 4:28 LG DualUp monitor 5:01 Honor Magic V foldable 5:20 Fractal NFT scam News Sources: https://lmg.gg/oXpLA
Radio Show [Proud Eagle] #376 (Mixed by Nelver) [Pirate Station Online] (11-08-2021) All episodes: https://fanlink.to/proudeagle Tracklist: 01. Justin Hawkes - That Look 02. Schematic - Renew 03. Umax - Magnesium 04. CamelPhat - Easier [feat. LOWES] (Sub Focus Remix) 05. M:fx & Iamdoomed - Gelato 06. Vektah - Tension 07. Droptek - Cyclic 08. Sub Focus - Deep Space (Data 3 Remix) 09. Rantik - As You Were 10. Hillsdom - Braggadocio 11. Justin Hawkes - The Underground 12. Harley D - Free 13. Namarone - Datcha 14. Mammyth - Losing Control (PLTX Remix) 15. Nelver - Imagination 16. Genic - Think 17. Artsea - Path to Never 18. Moekel - Ensemble 19. Inja - Baby Angel Face (feat. Eva Lazarus) 20. Tyrone & Jubei - Broon Sauce 21. Askel & Elere - Nothing More (feat. YENIAS) 22. Bowsar - The Rift 23. SyRan - Emissary 24. Mage - Find Me 25. OaT - 808 Bait (War Remix) 26. Bungle - Circles 27. PLTX - Can't Stay 28. Nelver - I Need You (VIP) 29. Safire & DRS - Holding On 30. S.P.Y - I've Been Missing You 31. salute - Want U There (Logistics Remix) 32. Maduk - Stay Like This 33. Etherwood - American Fruity 34. G Drive & Darwin - Give U 100 % 35. Walk:r - Setting Sun 36. Luciano (DnB) - Higher Place Weekly updated Playlist "Proud Eagle" on Spotify: https://open.spotify.com/playlist/0cBLjXvbGdiBPySrc67zcN?si=Qk4ujgzJRP2diy4BizoxqQ Follow Nelver: https://www.instagram.com/nelvermusic/ https://vk.com/nelver https://open.spotify.com/artist/3qbau1M2XoOfFPjCFMPndX?si=nTFfHxcVRi-T388pWK_ScA&dl_branch=1 https://soundcloud.com/nelver https://www.facebook.com/nelverdnb/ https://www.mixcloud.com/Nelver/ https://twitter.com/Nelvermusic
En este capitulo os cuento porque deberias tener un backup, como deberia ser vuestro backup y yendo a lo practico como podeis conseguir un sistema a prueba de bombas (literalmente) por unos pocos euros gracias a Synology.Estos son los NAS de synology que yo personalmente recomiendo en este capitulo del blog:Synology DS129J -> https://amzn.to/3ezcEmJSynology DS218Play -> https://amzn.to/3isS0WDSynology DS420+ -> https://amzn.to/3eQsv0zSynology DS920+ -> https://amzn.to/3is75HO
**FInd St0nerchef's dosage calculator HERE. To utilize, either save a shortcut to your own G-Drive or download manually** Brand new guest St0nerchef joins the podcast for the first time!!! Today the chef is here to talk about easy edible recipes, decarbing, pizza, and more! St0nerchef opens the show by talking about the decarboxylation process, and how he utilizes a sous-vide method of heating in order to both eliminate odor and preserve terpenes. This leads into a conversation about infusion- again with the chef recommending trying a sous-vide process (though many methods work). St0nerchef discusses different fat compounds, and which ones work well with cannabis in his opinion- as well as which flavors pair the best. St0nerchef wraps the show by talking about pizza, and how he uses infused olive oil to create the absolutely perfect THC loaded pizza pie! ---Proud partners of Plant Success www.plant-success.com try their new King Crab today! Highly concentrated beneficial bacteria to boost your buds! You'll love the King Crab the first time you try it, thanks Plant Success!--- ---Proud parters of Photontek- top of the line, efficient and powerful LED grow lights- use code growcast at www.photontek-lighting.com to save 5% off your high-end full spectrum grow lights! www.photontek-lighting.com code growcast--- ---Proud partners of Delta Leaf Labs affordable, fast sex testing! STOP wasting time sexing! Visit www.deltaleaflabs.com and use promo code growcast for free shipping- AND Delta Leaf is giving away 10 free tests to a code user!!!---
**FInd St0nerchef's dosage calculator HERE. To utilize, either save a shortcut to your own G-Drive or download manually** Brand new guest St0nerchef joins the podcast for the first time!!! Today the chef is here to talk about easy edible recipes, decarbing, pizza, and more! St0nerchef opens the show by talking about the decarboxylation process, and how he utilizes a sous-vide method of heating in order to both eliminate odor and preserve terpenes. This leads into a conversation about infusion- again with the chef recommending trying a sous-vide process (though many methods work). St0nerchef discusses different fat compounds, and which ones work well with cannabis in his opinion- as well as which flavors pair the best. St0nerchef wraps the show by talking about pizza, and how he uses infused olive oil to create the absolutely perfect THC loaded pizza pie! ---Proud partners of Plant Success www.plant-success.com try their new King Crab today! Highly concentrated beneficial bacteria to boost your buds! You'll love the King Crab the first time you try it, thanks Plant Success!--- ---Proud parters of Photontek- top of the line, efficient and powerful LED grow lights- use code growcast at www.photontek-lighting.com to save 5% off your high-end full spectrum grow lights! www.photontek-lighting.com code growcast--- ---Proud partners of Delta Leaf Labs affordable, fast sex testing! STOP wasting time sexing! Visit www.deltaleaflabs.com and use promo code growcast for free shipping- AND Delta Leaf is giving away 10 free tests to a code user!!!---
A convite da Prof.ª Dra. Virginia Bentes Pinto, ministramos a #podpalestra intitulada 'Política de Indexação: teoria e prática aplicadas em catálogo online', gravada no dia 06 de abril de 2021 na ocasião do encerramento da disciplina Representação Temática da Informação (Indexação), como parte do semestre letivo suplementar 2020.2 do Curso de Biblioteconomia da UFC. Acesse a nossa pasta compartilhada no GDrive => https://bit.ly/palestra-politica-indexacao-20210406
Jeremy Leveille literally pulls out a guitar on 30mpc and plays a song for his prospects. He has no idea how to play the guitar. Just listen to the show.Four Actionable Takeaways:Build a shared G Drive of screenshots and GIFs for every competitor and situationSkip the pleasantries in your emails. I know you’re on this competitor, here’s a GIF.Know what to look for before you look for it. Stack rank your triggers, then research.“Hey it’s Jeremy from LeadIQ, is it cool if I explain the reason for my call in
This video has been produced for www.gmsmagazine.com. Please help our channel by subscribing and commenting and support our Patreon Campaign if you can: https://www.patreon.com/gmsmagazine Join us in our Discord Server: https://discord.gg/fHaKNPe Robert Johnson is creating a game called Peace which you would be forgiven for thinking it’s a hippy kinda game, but it is not… in fact, it is a game full of conflict, war and a very decent amount of not-peace! Check it out! Peace Facebook Page: https://www.facebook.com/peacetherpg Peace basic edition Dropbox: https://bit.ly/3enkvCt Peace Basic Edition Gdrive: https://bit.ly/2TSqki1 Fillable character sheet here Dropbox: https://bit.ly/329e6WQ Fillable character sheet here GDrive: https://bit.ly/34RfmiU Twitter: https://twitter.com/peace_rpg YouTube: Confessions of a frustrated Games Master: https://www.youtube.com/channel/UCxud9c2tey-YlEcGkyDz5zQ Contact Robert: robertthenarraider@gmail.com Visit other #GMSMagazine productions: For our main channel: http://bit.ly/GMSmagazine For our #podcast: https://goo.gl/M54zau Follow us on #Twitter: https://goo.gl/moZgvK Our #Facebook page: https://goo.gl/YkbQIj This channel deals with peacerpg, peace, gmsmagazine, gms magazine, game publishing, book publishing, publishing business, business, hype, marketing, game on tabletop, wizards of the coast, diversity, #ttrpg, #rpg, #roleplaying, #game, #games, dungeons and dragons, #dnd, dungeons & dragons, call of Cthulhu, #CoC, vampire: The mascarade, osr, pbta, board game, lovecraft, lovecraftian, roleplaying game, role playing, game, gaming, #drivethrurpg,pulp, horror, #horror game,green ronin, #tabletop, #modiphius, #pathfinder, #paizo, Britannia Games, Chivalry and sorcery
Gdrive document for question suggestionshttps://docs.google.com/document/d/1qN_M5Ivk76bP-_ntd5afyt0I_jvhFwJn1mn1CQ_ixW4/edit?usp=sharingEmailWithoutanetpod@gmail.comWebsite Withoutanetpod.comDiscord link https://discord.gg/TbE5AjcIf you like the show, swing by our Patreon where you can find a whole host of extra content and the raw version of next week’s epsiode
I would rather get a 1-page training proposal in someone’s hands ASAP rather than take 3 hours to write one then send it via snail-mail. With tools like GDrive, you can share a simple outline which they can see rather than wait several days for the post to arrive. If you get a rough draft in someone's hands - literally the same hour or day - they can give your helpful advice and guidance on how to improve it. That’s what happened this week and I won the training contract. So what could a 1-page training proposal look like? Today, we’re going to cover this in 30 mins or less!
How good is it to have a virtual file cabinet to store all of your things? Today we look at Google Drive and how it's changed my day-day operation as a busy Dad.
Hairless in the Cloud - Microsoft 365 - Security und Collaboration
NEWS Mimikatz: https://dirkjanm.io/digging-further-into-the-primary-refresh-token/ Ignite 2020: https://www.microsoft.com/en-us/ignite Become a KQL Ninja: https://security-tzu.com/2020/08/07/become-a-kql-ninja/ Teams: https://techcommunity.microsoft.com/t5/microsoft-teams-blog/what-s-new-in-microsoft-teams-july-2020/ba-p/1551561 SCC Report: https://github.com/jangeisbauer/SCCReport Booking "14 people are currently watching this product" --> random()*12 + 3: https://twitter.com/RoninDey/status/1292002070363541505?s=20 MCAS spoofing: https://stephanwaelde.com/2020/08/04/mitigate-mcas-issue-with-user-agent-spoofing/ Überall tauchen DUOs auf: https://twitter.com/matvelloso/status/1291576776238305281?s=20 I LIKE TO MOVE IT Mover.io (2019 gekauft) "Alternativen" SharePoint Migration Tool, ShareGate, AvePoint, … Viele Anbindungen (14): S3, AZ Blob, Box, Dropbox, G Suite, Gdrive, O365, OneDrive User vs Admin Self Service Migration OneDrive 2 OneDrive DropBox 2 OneDrive OneDrive 2 DropBox Admin driven migration Immer noch die Rede von User! User Mapping = Site Mapping = Url 2 Url Permission Mapping (upn = upn) - damit auch B2B machbar? UX Anmelden an Service 1 Anmelden an Service 2 Auf jeder Seite den Ordner wählen Im Ziel auch anlegbar Tech 2 AAD Apps (alles OIDC/Oauth) Anmeldung an zwei Tenants in derselben Browser Session Mover OneDrive (user consent) Office 365 Mover (admin consent) Keine "Lizenz" Performance: Mein OneDrive 45k 106 GB = 12 stunden Use Case Blob to SharePoint über ein Schedule https://www.youtube.com/watch?v=vuo8kD5zF5I BUT YOU ARE NOT ALLOWED TO: Microsoft Endpoint Data Loss Prevention Public Preview Native built into Windows (in MDATP component and edge) Compliance.microsoft.com Sensitive Info Type: ex german passport number AND Share Condition: Is shared with somebody inside or outside my org Audit or restrict activities on windows devices Upload to cloudservices or access by unallowed browsers Copy to clipboard Copy to USB Copy to network share Access by unallowed apps Print https://techcommunity.microsoft.com/t5/microsoft-security-and/announcing-public-preview-of-microsoft-endpoint-data-loss/ba-p/1534085
· Whether you’re using it for regular back-up or need to edit 4K video in the field, learn about petite, portable and powerful SSDs from G-Technology· Speaking of computing to go, we’ll learn about the Pandora Portable Power (P3) battery bank which can do things your backup battery booster cannot· Cybersecurity has never been more important. We talk with ESET’s Tony Anscombe about protecting your data while working from home
En esta transmisión, Matuk y Pontón hablaron sobre las soluciones que existen para almacenar todo tipo de archivos en la Nube, como los servicios gratuitos o de paga de Dropbox, GDrive, eTransfer o Fromsmash. También platicaron sobre otros productos para hacer tu Nube privada o tu Nube casera como son los «discos» NAS. Para ello se unió el experto de Western Digital, Alejandro Alfaro, quien aclaró en qué casos conviene adoptar estas tecnologías.
El mundo vive una situación impensada, desde este lugar también queremos sumar nuestro aporte sugiriendo herramientas y trucos para hacer del teletrabajo una opción que no te enloquezca. Te invito a escuchar las recomendaciones, consejos y la manera de organizarte para que trabajar desde tu casa, desde el hogar no se convierta en un desastre. Espero tus comentarios y si te sirvió en algo, por favor compartilo con tus amigos para que teletrabajar sea una buena experiencia con los elementos adecuados. Llevemos tranquilidad y que esta situación nos permita dar lo mejor de nosotros en todos los sentidos. Ánimo y adelante, nunca mejor dicho: ¡ Buen código para todos ¡ Herramientas de trabajo: Siempre podemos utilizar WhatsApp pero una forma mas efectiva de hacerlo es a través de su sitio web, solo tenés que vincularlo con tu celular mediante el código QR http://web.whatsapp.com/ Si preferis algo más profesional y que te permita trabajar en equipo con soporte para archivos, etc. Podés usar Slack es una herramienta muy óptima para usar antes de Whatspp y te permite mensajería instantánea en equipos. http://www.slack.com Teams de Microsoft, es una alternativa ideal para trabajar con el equipo en entornos Windows o para aquellos que se encuentren acostumbrados a trabajar en estos entornos: https://teams.microsoft.com/downloads WorkPlace de Face para trabajo remoto, es un FB corporativo, ideal para aislar un canal y hacer solo trabajo ahi. Telegram es un whatsapp potenciado, lo podés utilizar solo para cuestiones de trabajo y mantener los temas en diferentes aplicaciones, también lo podés manejar desde la web de manera muy intuitiva, además es muy seguro y privado. http://www.telegram.org Para el tema de las videoconferencia un software muy utilizado es Zoom, es gratuita y tiene muchas opciones para utilizarla con bajo ancho de banda, podés armar tus propias salas para reuniones y streaming en vivo. https://zoom.us/ Del lado de Microsoft tenés a otra herramienta que funciona perfectamente y tiene soporte para varias plataformas, podés utilizar la versión personal o Skype for Business http://www.skype.com Google no se queda atrás y ofrece otra herramienta que funciona muy bien, disponible desde el PlayStore con la posibilidad de ser utilizado por todos los sistemas Android ya que cuentan con soporte por defecto. Llamadas, video llamadas y mensajería instantánea. https://hangouts.google.com/ Esta herramienta la acabo de ver recomendada por muchos programadores, será cuestión de probarla y ver como funciona, con ustedes : Whereby https://whereby.com/ En cuanto a las suites colaborativas, para trabajo compartido tenemos al clásico todopoderoso de Google con su omnipresente Gdrive y sus 15 Gb para uso personal https://www.google.com/intl/es_ALL/drive/ Del lado de Microsoft para comunicarse, crear y almacenar esta Office 365: https://www.office.com/ Una herramienta que creció de servir como almacenamiento a trabajo colaborativo y que es la sorpresa de estos tiempos es DropBox, tiene soporte para Windows y Linux y es muy sólida y segura: https://www.dropbox.com/es/ Y la que no me acordaba en el podcast, pero que tiene muchas funciones siguiendo los pasos de Google es Zoho, además de correo seguro te ofrece muchas otras opciones interesantes: http://www.zoho.com Para la organización de tareas, procesos, grupos http://www.trello.com https://kanboard.org/ https://taskboard.matthewross.me/ (Esta no la nombre en el podcast pero promete) #CodigoTecno #Podcast #PodcastEspañol #Desarrollo Te invito a sumate a la comunidad, dejando un comentario, un like o una sugerencia. También podés compartirlo en tus redes, con tus amigos si te parece que vale la pena. . Buscanos en : - https://www.facebook.com/codigotecno/ - https://www.instagram.com/codigotecno Y en las redes de podcast mas populares: * En Ivoox : https://bit.ly/2JoLotl * En Spotify : https://spoti.fi/31Dp4Sq * En Itunes: https://apple.co/2WNKWHV * En Youtube: https://bit.ly/2JLaKRj * A través de Player.fm: https://player.fm/series/codigotecno Espero tus comentarios para seguir creciendo. https://www.alejandrosoler.com.ar
It’s getting real out there. Scary, overwhelming, and anxiety-inducing shizznit is happening in our world. My daughter’s school is closed starting Monday, and I know many people who are dealing with that, plus figuring out how to earn a living and keep themselves and their families healthy and safe. I was Voxering with my mastermind buddy yesterday morning, and she was in tears because she felt so out of control about it all. One of the things she said was that she didn’t know if she should go back to the store to get bread - that she had only gotten snacks and coffee the night before and was unsure if going to get bread was giving in to the fear, or if only getting snacks was too frivolous. I told her to go get the bread if it made her feel better and more in control. I think so many of us feel that way about business right now. What should we say? What shouldn’t we say? Do we keep going with creating and earning a living? Do we bury our heads? I don’t think there’s a right answer - you have to do what feels right. But if you’re affected by being stuck at home, your kids being at home, worrying about sick relatives, having to figure out how you’re going to pay your bills, or any of this craziness - I want to give you some ideas. Here’s a list of things you can do if business is slow or you need to take some positive action: Go through your entire site on a mobile device (when was the last time you did that?) - check for anything that looks wonky and fix it. Update as many blogs (or whatever content you create) as you can for better SEO and updated information. Own an online store? Do some back end clean up to make sure your inventory and “back office” of your e-commerce setup is running smoothly. Brainstorm ideas for how you can take some (or all) of your business online if you’re a brick and mortar business. Talk to a handful of your ideal customers to get a better sense of what they need from you. Create a new lead magnet to build your email list. Learn something new - like any of the courses you’ve bought in the last year or two but haven’t finished yet. Do as much “back office” cleanup as possible - like organizing your G/Drive, taking inventory of the apps and tools you pay for, or checking your website for broken links. Rearrange your desk and/or office - there’s something that happens when you rearrange that lets in fresh, creative vibes. Plan out your content calendar and batch as much as you can. Review and journal about your business goals. Reach out to your biz besties to see how they’re doing and how you can help each other. I get scared and overwhelmed too - but I’ve learned to always, always look for opportunities to feel better and be inspired. Read more over on Pinterest Rockstars, our free community
Here's 10 things your business should be doing to grow through the CoronaVirus situation: 1: Communicate: Your team, your customers/clients, your network, and stay level-headed. 2: Stay Positive: Panic and Worry never helps. Whenever there is massive change there is opportunity. What can you do right now to add to your business? If you have a slow down, focus on serving the clients/customers you have right now who are still engaging. Do planning for the future. Now is the time to be planning out your new content or marketing. Turn off the negativity! 3: Know the cycles of change: There's seasonal cycles. And there's cycles that change every 7-11 years. 4: Change is here: The only constant is change. So how are you going to use this situation as a springboard for your business. Get out ahead of the change. Theory of Reflexivity. 5: Cut Back a little bit: Cash is king. Don't spend exorbitant amounts of money. Focus in on spending money where its currently working like marketing your business and selling for lead gen and closing deals. There may be time to slightly post-pone some meetings or events depending on what happens over the next 2-3 weeks. 6: Extend your credit: Get lines of credit if you need it for growth. Rates are going down because of the situation. So having access to capital and credit lines is great. 7: Cut back hours/staff changes/Remote working: Take some vacation time. Allow your employees to remote work if they can depending on your industry. See what happens in a few weeks. If people need to work more long-term remotely then maybe cut hours for a short time. 8: Plan to work from home and learn from home: Test out your working from home capability if you haven't already. Do you and your team have what they need to work remotely? Slack, Asana, Trello, Email, Gdrive, Dropbox, Zoom, Google Hangouts. 9: Marketing & Selling is still essential: Don't stop! Your competition won't stop. The companies who are successful today are the ones who used the crisis of 2007/2008 to get ahead of the competition. Now is a perfect time to plan out your sales & branding packages, your content marketing, your paid advertising. Create new offers and opportunities. For people affected by the virus create some kind of discount, etc. 10: Focus on your current and repeat business customers/clients: Make sure they are getting everything they need through this situation. Create deals for them, communicate with them, etc. What questions do you have? Is there anything I left out? How are you using this time as a springboard? Jason is the Founder of ConvergeBlog.com, CatalystGrowthGroup.com, and the Director of Content Marketing with Motava (https://motava.com/). He has worked with brands like John Maxwell Company, Ziglar Inc., Ziglar Family, Kevin Harrington from Shark Tank, The Basement Doctor, Autism Power, the BBB, and many others. He specializes in helping companies define and clarify their brand through an effective branding strategy, make more money through their sales and marketing, and better serve customers/clients through effective content marketing, messaging, and communication. We'd love to have the opportunity to work with you and your business!
baru-baru ini, ada kabar heboh tentang GDrive unlimited yang ramai-ramai ditindak tegas oleh Google alias disuspend rame-rame. Secara kita bersinggungan deket banget sama dunia cloud storage, jadi gue, Ajis (@sizxzis) dan Onya (@sonjaannsh) di episode ini kita kupas tuntas tentang Google Drive unlimited yang ramai beredar. disclaimer: podcast ini mengandung konten untuk pendengar 18 tahun ke atas. kalo belom 18 tahun, dengerinnya bareng bokap nyokap ya. Lopyu all
*Please note: this is an encore presentation of episode 29. Have a happy Thanksgiving!* This week we're talking about the Cambridge Analytica bust-up and how Facebook may have known more than they let on. We also chat about the new privacy changes Facebook is rolling out- are they in good faith? Then, Tim breaks down his 4 favorite cloud sharing apps for small businesses: Dropbox, GDrive, ShareSync, and OneDrive. Are they all the same? What should you look for when choosing a platform? He's sharing the good, the bad, and what you might not have thought about yet.
Još uvek nije dostupno, ali je najavljeno i u fazi testitranja da Outlook.com uvodi integraciju sa Gmail, Calendar i Gdrive servisima. Microsoft ovime pokazuje pravi pricnip izreke "ako ne možeš da ih pobediš, pridruži im se".
Brian Adams got into QA by way of customer service, and has developed his testing skills, user empathy, and teamwork to become a top professional. We talk about best practices for performing quality assurance, QA in an agile lifecycle, and making the most out of distributed teams. Brian is also a veteran of multiple marathons (the running kind) so we talk about his rituals and routines. The combined BA/QA role: https://www.emids.com/defining-the-baqa-role/ Microsoft OneDrive is taking over DropBox and GDrive: https://onedrive.live.com/about/en-us/ Learning from your coworkers: https://idealistcareers.org/learn-from-coworkers/ MapMyRun: https://www.mapmyrun.com/ Bowling in Tewksbury: https://wamesitlanes.com/
COINC limita el "Cheque Regalo" de Amazon a 1500 €. Os hablo de mi deseo de una cuenta GDrive ilimitada y de la app Wallabag. También de mis entrenos y lecturas.
On Thursday, JT discovers what a G-Drive is. How did Kenny injure himself on the Bunker Hill golf simulator? JT is just surprised he made it home from their Bunker Hill visit with Engineer Dale behind the wheel.
Improve your productivity in General Practice as a GP or clinical director with simple quick and actionable tips and apps to make your life easier and save you time.
This week, for episode 29, we're first talking about the Cambridge Analytica bust-up and how it has come to light that Facebook may have known more than they let on. We also chat about the new privacy changes Facebook is rolling out- are they in good faith? Then, Tim breaks down his 4 favorite cloud sharing apps for small businesses: Dropbox, GDrive, ShareSync, and OneDrive. Are they all the same? What should you look for when choosing a platform? He's sharing the good, the bad, and what you might not have thought about yet.
- Ivo Lopes dominou no Campeonato Nacional de Velocidade. - Hugo Basaúla dominou no Campeonato Nacional de SuperCross. - O European Le Mans Series foi até Barcelona e o carro #26 da G-Drive dominou a prova. - Pódio 100% italiano no Rali de Roma, a quinta prova do Campeonato da Europa de Ralis. - A W-Series está quase no fim e já se conhecem os prémios finais. - Mais uma vez o Rali de Famalicão teve uma lista de inscritos de luxo. Design: Inês Militão Genérico: David Mateus Texto: David Pacheco e Madalena Costa Contatos: tresdoisumautomobile@gmail.com
Buenas muchachada, hoy os comento mi experiencia con Rclone y gDrive.
Buenas muchachada, hoy os comento mi experiencia con Rclone y gDrive.
Plugin Sonos homebridge Conga 3090 – 299€ Gdrive ilimitado – 18€ – Ebay
TopicsOutlining Zenit’s multi-lingual strategy. How many languages and why they started in PersianWhy they don’t use agencies and decide to employ their fansHow do you manage 15 fan blogs “It is about building relationships and talking to people”“The first the multilingual was more opportunistic, now it is about strategy”Changing the story for different marketsGiving the bloggers some autonomyHow do measure the success of each blogger‘Issues’ and how to manage with themThe social media trends in different countriesThe size of his teamThe content strategy in a nutshellThe role of Zenit TVHow highlights are used “The only way to watch the Russian League abroad is google”.Exporting the Russian League is the “hottest topic” right now.The rebranding of the League last seasonTV - “It is easier to watch the Dutch League than the Russian League but we are No 6 ranked country in the world”The confidence of having a fine World CupWorking with VK/TelegramThe strength of VK - “better than Facebook and great engagement”. The weakness of VK - PiracyTelegram - the usage of it channelsUsing Foursquare/Swarm, Yandex (a competitor to Google), OK - big in the provinces and the home of the the Classico in RussiaThe tone of voice - talking to fans and clubs, like digging out Chelsea“Art v Humour”The small Russian club who have pushed their way into the national media through socialAttacking the issue of racism in Russian Football and Zenit St PetersburgThe source of new ideasThe best teams on social media in RussiaThe problems of slow internet reactionFlares for the Zenit bus for the Fenerbahce game and why it got 22m viewsOther successes - the G Drive show. A sponsored show that received excellent engagement.Taking on the Daily MailThe emphasis on branded content and how they approach it
It's the 12th installment of the Inside The Sports Car Paddock interview show and we open with our traditional segment featuring CORE autosport race engineer Jeff Braun, who details his path from karting to becoming a race engineer, then explains the chassis setup considerations for dealing with traffic during this weekend's 100-minute IMSA WeatherTech SportsCar Championship race at Long Beach, and how to tune a car to reach its performance peak at the end of a stint. Next up is Blancpain World Challenge GT America CEO Greg Gill who shares insights on sending its GT4 cars to represent the series for the first time at Long Beach, and we close with a pair of ELMS-related interviews captured by Graham Goodwin, starting with United Autosports team principal Richard Dean, and Roman Rusinov, whose G-Drive team has rebranded its ORECA chassis in honor of the Russian limousine manufacturer that supplies president Vladimir Putin. Interviews: Jeff Braun (starts at 3m51s) Greg Gill (54m09s) Richard Dean (1h10m21s) Roman Rusinov (1h15m28s) Subscribe: https://marshallpruettpodcast.com/subscribe Join our Facebook Group: https://www.facebook.com/MarshallPruettPodcast
In this episode, Leo and Erik talk about some of their favorite productivity tools and apps.
SANDRA NAGY has dedicated her career to driving innovation and building effective organizational strategy. Sandra began her career at Accenture as a Change Management consultant where she supported public and private sector clients through large-scale strategy and business transformation. Two of her years at Accenture were exclusively focused in the Government practice. Sandra spent over a decade as a senior digital strategist at Pearson Education where she led multiple teams that worked across K-20 to transform curriculum and professional development resources with the use of technology. She was a member of a global team of educational technology champions focused on collaborating to solve problems in education. She engaged with stakeholders globally and was responsible for nurturing strategic partnerships with key customers and other like-minded organizations. Prior to Pearson, Sandra worked at The Learning Partnership, a non-profit organization responsible for building stakeholder partnerships to support, promote and advance publicly funded education in Canada. She led a government and business-funded research project to look at blended, online and face-to-face, professional development for teachers in STEM courses. Sandra engaged in speaking opportunities across Canada sharing best practices in sustained, action-research driven professional development that leads to authentic community building. With over 20 years of experience, Sandra has designed, developed and delivered hundreds of learning opportunities to thousands of employees and educators. She is a firm believer in the capacity of educators to drive future-skill development, and in sustained professional development that leverages a blend of learning tools. Sandra leads the Education Practice at Future Design School building strong academic partnerships with school leaders that help to drive their strategic priorities through consulting support, professional development and efficacious curriculum resources. Sandra’s educational background includes a Master's in Education from Harvard University focused on Technology in Education. While completing this degree she worked at TechBoston, an organization infusing technology programs into inner-city Boston schools; conducted published research into distance learning at the Concord Consortium; and volunteered through the MIT Media Lab teaching robotics to home-schooled students. Sandra also holds a Bachelor of Commerce focused on Organizational Behavior and Entrepreneurship from McGill University. Sandra Nagy Show Highlights: How to rekindle the passion for educators that might have lost their way The mindset you can use to help educators reconnect with their why Developing empathy for people in your organization What tools you can provide to help people move further Learning can be uncomfortable but that’s an example of progress Embracing the “Entrepreneurial mindset.” How to effectively critique ideas How Future Design School works with school leaders and empowers teachers Building problem solvers in schools How Future Design School turned an “innovation pillar” into a reality “What problem do you want to solve?” -Sandra Nagy Sandra Nagy Resources: Great at work Click here for three awesome DESIGN THINKING posters (no email required -- just a link to my personal G-Drive
En este episodio voy a realizar una rápida introducción a la herramienta ZOHO WorkDrive, en esta ocasión el nombre transmite bastante de su función principal :-) El motivo de hacerlo ha sido para dar respuesta a un alumno de la academia que me preguntaba sobre un problema de almacenamiento en ZOHO CRM. ZOHO WorkDrive como complemento a ZOHO CRM Este episodio ha surgido gracias a la pregunta de un alumno. Este alumno tiene un problema en el que tal vez tú te sientas reflejado. El utiliza ZOHO CRM y la función de adjuntar documentos a cada registro (leads, contactos, etc.) le es muy útil, pero los ficheros que adjunta tienen bastante peso y ha consumido el que ZOHO CRM le ofrece gratuitamente y después de hacer cálculos comprar almacenamiento extra en ZOHO CRM le supone mucho gasto. Me preguntó si podía almacenar esta información en otros servicios, pero que no perdiera la comodidad que le ofrece ZOHO CRM de asociarlo al registro como decía. La respuesta es que si bien hay algunos servicios, por ejemplo es posible asociar ZOHO CRM con Google Drive, sigue teniendo el problema de que sigue consumiendo espacio en ZOHO CRM ya que lo que hacen es acceder a ese servicio (GDrive) y copiar el archivo en ZOHO CRM, por lo tanto no le valía. De hecho, hasta que apareció ZOHO WorkDrive, yo no conocía ninguno que le solventara el problema, pero esto ha cambiado con ZOHO WorkDrive pues gracias a su última actualización ahora se conecta con ZOHO CRM y puede crear asociaciones de archivos con registros de ZOHO CRM sin consumir espacio en ZOHO CRM. Además ZOHO WorkDrive te ofrece 5Tb en su versión Bussines, lo cual es francamente mucho espacio. ¿Quieres saber más sobre ZOHO WorkDrive? Pues ya sabes escucha este episodio y si tienes dudas, solo escribe un comentario. :-)
En este episodio voy a realizar una rápida introducción a la herramienta ZOHO WorkDrive, en esta ocasión el nombre transmite bastante de su función principal :-) El motivo de hacerlo ha sido para dar respuesta a un alumno de la academia que me preguntaba sobre un problema de almacenamiento en ZOHO CRM. ZOHO WorkDrive como complemento a ZOHO CRM Este episodio ha surgido gracias a la pregunta de un alumno. Este alumno tiene un problema en el que tal vez tú te sientas reflejado. El utiliza ZOHO CRM y la función de adjuntar documentos a cada registro (leads, contactos, etc.) le es muy útil, pero los ficheros que adjunta tienen bastante peso y ha consumido el que ZOHO CRM le ofrece gratuitamente y después de hacer cálculos comprar almacenamiento extra en ZOHO CRM le supone mucho gasto. Me preguntó si podía almacenar esta información en otros servicios, pero que no perdiera la comodidad que le ofrece ZOHO CRM de asociarlo al registro como decía. La respuesta es que si bien hay algunos servicios, por ejemplo es posible asociar ZOHO CRM con Google Drive, sigue teniendo el problema de que sigue consumiendo espacio en ZOHO CRM ya que lo que hacen es acceder a ese servicio (GDrive) y copiar el archivo en ZOHO CRM, por lo tanto no le valía. De hecho, hasta que apareció ZOHO WorkDrive, yo no conocía ninguno que le solventara el problema, pero esto ha cambiado con ZOHO WorkDrive pues gracias a su última actualización ahora se conecta con ZOHO CRM y puede crear asociaciones de archivos con registros de ZOHO CRM sin consumir espacio en ZOHO CRM. Además ZOHO WorkDrive te ofrece 5Tb en su versión Bussines, lo cual es francamente mucho espacio. ¿Quieres saber más sobre ZOHO WorkDrive? Pues ya sabes escucha este episodio y si tienes dudas, solo escribe un comentario. :-)
Seconde partie de notre émission consacrée aux cadeaux tech à poser au pied du sapin. #51 - eGPU Blackmagic https://amzn.to/2SzylWd Razer Core X https://amzn.to/2Pp9hiT #52 - Satechi Pro Hub USB-C avec Ethernet & 4K HDMI https://amzn.to/2QiEmu0 #53 - La Housse Be.ez édition spéciale ORLM http://www.accessandgo.fr #54 - Cachecam https://www.cachecam.fr/ #55 -X-Moove Electric Station http://www.x-moove.com/energy-station.php #56 - My Passport Wireless SSD https://amzn.to/2PpcDT1 #57 - G-DRIVE mobile Pro SSD https://amzn.to/2L1peuY #58 - G-DRIVE mobile SSD https://amzn.to/2AZlvcP #59 - LaCie SSD https://amzn.to/2QEgKPD #60 - SanDisk Extreme Disque Flash SSD https://amzn.to/2Pq63vE #61 - LaCie Rugged RAID Pro https://amzn.to/2QkpZoK #62 - LaCie 6Big Thunderbolt 3 https://amzn.to/2Ql3jF6 #63 - Netgear Pro Gaming SX-10 https://amzn.to/2UtD5yL #64 - Orbi Les routeurs pour doper la couverture et le débit de votre réseau wifi #64 - Orbi RBK 20 - Le routeur seul https://www.amazon.fr/gp/product/B07FNMFLCY/ref=as_li_qf_asin_il_tl?ie=UTF8&tag=onrefaitlem01-21&creative=6746&linkCode=as2&creativeASIN=B07FNMFLCY&linkId=ad1e52efccec6f0e4e07aa79249af208 #65 - Orbi RBK 20 + son satellite https://amzn.to/2Pos4L9 #66 - Orbi RBK 50 + son satellite 380 m2 https://amzn.to/2Qiyj8O #67 - Netgear XR 500 https://amzn.to/2L36vzo #68 - Devolo Vlan Wifi Outdoor https://amzn.to/2SzSeMS #69 - D-Link Covr https://amzn.to/2L0ZQ8F #70 - Novodio USB-C Multiport Charger https://bit.ly/2L1gqp5 #71 - Philips 65OLED803 https://amzn.to/2RMP88A #72 - Samsung QE55Q7F https://www.samsung.com/be_fr/tvs/qled-tv-q7f/QE55Q7FNALXXN/ #73 - Moniteur Philips Brillance USB-C Hub 32 pouces https://amzn.to/2RHvMl1 #74 - AOC I1601FWUX Ecran PC 220cd/m² Un second moniteur pour votre MacBook à emporter ! https://amzn.to/2QHp5SJ #25 - Luna display https://lunadisplay.com #26 - Huawei Mate 20 Pro Le fleuron des smartphone de la gamme Huawei https://amzn.to/2BWr5hZ #27 - Google Pixel 3 https://store.google.com/fr/product/pixel_3?gclid=CjwKCAiA0ajgBRA4EiwA9gFOR9beAB7tD4e-TYAF9ma_DTGMqXDoE3GFpXD2k68V8cOc6WHyKKPLpxoCf5kQAvD_BwE&gclsrc=aw.ds #28 - KEF LSX https://m.fr.kef.com/products/lsx #29 - Yamaha Musicast Vinyl 500 https://amzn.to/2QDEQKA #30 - Sonos One par Hay https://www.sonos.com/fr-fr/shop/hay-sonos-one-limited-edition.html #31 - Sonos Beam https://amzn.to/2PpS34V #32 - Bose Home Speaker 500 https://amzn.to/2Uk3KOa #33 - Ultimate Ears Boom 3 https://amzn.to/2PnNWX2 #34 - Trotinette Segway Ninebot ES20 http://fr-fr.segway.com/products/ninebot-by-segway-kickscooter-es2 #35 - Polaroid OneStep+ Appareil photo instantané connecté https://www.macway.com/fr/product/965889/polaroid-onestep-appareil-photo-instantane-connecte.html #36 - Sac à dos Be.ez Swift Backpack http://www.accessandgo.fr #37 - Oculus Go https://amzn.to/2QIM7Zm #38 - Yuval Harari - 21 leçons pour le XXIème siècle https://amzn.to/2L4Obps #39 - Amandine Cornette de Saint Cyr - Des plumes sous ma couette https://amzn.to/2zK6mft #40 - Ambre Bartok - Les Goldman h https://amzn.to/2QiE86a #41 - Le Bureau des Légendes saison 4 - https://www.mycanal.fr/series/le-bureau-des-legendes-saison-4 #42 - Hippocrate https://www.mycanal.fr/series/hippocrate #43 - Podcast Bonjour PPC https://itunes.apple.com/fr/podcast/bonjour-ppc/id1439013021?mt=2 #44 - Podcast Vlan de Gregory Pouy https://itunes.apple.com/fr/podcast/vlan/id1233992877?mt=2 #45 - Huawei P20 Pro https://amzn.to/2QIt4hS #46 - Bird https://www.bird.co/?gclid=CjwKCAiA0ajgBRA4EiwA9gFORxepBvxUBazNA3hxJKj8vOfI_KNtMA9mGJp0O5tTYtq0oQTNu6YS8hoCsU0QAvD_BwE #47 - iPhone XR https://amzn.to/2PqNdEo #48 - HUAWEI MateBook X Pro https://amzn.to/2QyMTID #49 - Amazon Echo Plus https://amzn.to/2BW0e5l #50 - Netgear Nighthawk M1 https://amzn.to/2AYJ5X6
Seconde partie de notre émission consacrée aux cadeaux tech à poser au pied du sapin. #51 - eGPU Blackmagic https://amzn.to/2SzylWd Razer Core X https://amzn.to/2Pp9hiT #52 - Satechi Pro Hub USB-C avec Ethernet & 4K HDMI https://amzn.to/2QiEmu0 #53 - La Housse Be.ez édition spéciale ORLM http://www.accessandgo.fr #54 - Cachecam https://www.cachecam.fr/ #55 -X-Moove Electric Station http://www.x-moove.com/energy-station.php #56 - My Passport Wireless SSD https://amzn.to/2PpcDT1 #57 - G-DRIVE mobile Pro SSD https://amzn.to/2L1peuY #58 - G-DRIVE mobile SSD https://amzn.to/2AZlvcP #59 - LaCie SSD https://amzn.to/2QEgKPD #60 - SanDisk Extreme Disque Flash SSD https://amzn.to/2Pq63vE #61 - LaCie Rugged RAID Pro https://amzn.to/2QkpZoK #62 - LaCie 6Big Thunderbolt 3 https://amzn.to/2Ql3jF6 #63 - Netgear Pro Gaming SX-10 https://amzn.to/2UtD5yL #64 - Orbi Les routeurs pour doper la couverture et le débit de votre réseau wifi #64 - Orbi RBK 20 - Le routeur seul https://www.amazon.fr/gp/product/B07FNMFLCY/ref=as_li_qf_asin_il_tl?ie=UTF8&tag=onrefaitlem01-21&creative=6746&linkCode=as2&creativeASIN=B07FNMFLCY&linkId=ad1e52efccec6f0e4e07aa79249af208 #65 - Orbi RBK 20 + son satellite https://amzn.to/2Pos4L9 #66 - Orbi RBK 50 + son satellite 380 m2 https://amzn.to/2Qiyj8O #67 - Netgear XR 500 https://amzn.to/2L36vzo #68 - Devolo Vlan Wifi Outdoor https://amzn.to/2SzSeMS #69 - D-Link Covr https://amzn.to/2L0ZQ8F #70 - Novodio USB-C Multiport Charger https://bit.ly/2L1gqp5 #71 - Philips 65OLED803 https://amzn.to/2RMP88A #72 - Samsung QE55Q7F https://www.samsung.com/be_fr/tvs/qled-tv-q7f/QE55Q7FNALXXN/ #73 - Moniteur Philips Brillance USB-C Hub 32 pouces https://amzn.to/2RHvMl1 #74 - AOC I1601FWUX Ecran PC 220cd/m² Un second moniteur pour votre MacBook à emporter ! https://amzn.to/2QHp5SJ #25 - Luna display https://lunadisplay.com #26 - Huawei Mate 20 Pro Le fleuron des smartphone de la gamme Huawei https://amzn.to/2BWr5hZ #27 - Google Pixel 3 https://store.google.com/fr/product/pixel_3?gclid=CjwKCAiA0ajgBRA4EiwA9gFOR9beAB7tD4e-TYAF9ma_DTGMqXDoE3GFpXD2k68V8cOc6WHyKKPLpxoCf5kQAvD_BwE&gclsrc=aw.ds #28 - KEF LSX https://m.fr.kef.com/products/lsx #29 - Yamaha Musicast Vinyl 500 https://amzn.to/2QDEQKA #30 - Sonos One par Hay https://www.sonos.com/fr-fr/shop/hay-sonos-one-limited-edition.html #31 - Sonos Beam https://amzn.to/2PpS34V #32 - Bose Home Speaker 500 https://amzn.to/2Uk3KOa #33 - Ultimate Ears Boom 3 https://amzn.to/2PnNWX2 #34 - Trotinette Segway Ninebot ES20 http://fr-fr.segway.com/products/ninebot-by-segway-kickscooter-es2 #35 - Polaroid OneStep+ Appareil photo instantané connecté https://www.macway.com/fr/product/965889/polaroid-onestep-appareil-photo-instantane-connecte.html #36 - Sac à dos Be.ez Swift Backpack http://www.accessandgo.fr #37 - Oculus Go https://amzn.to/2QIM7Zm #38 - Yuval Harari - 21 leçons pour le XXIème siècle https://amzn.to/2L4Obps #39 - Amandine Cornette de Saint Cyr - Des plumes sous ma couette https://amzn.to/2zK6mft #40 - Ambre Bartok - Les Goldman h https://amzn.to/2QiE86a #41 - Le Bureau des Légendes saison 4 - https://www.mycanal.fr/series/le-bureau-des-legendes-saison-4 #42 - Hippocrate https://www.mycanal.fr/series/hippocrate #43 - Podcast Bonjour PPC https://itunes.apple.com/fr/podcast/bonjour-ppc/id1439013021?mt=2 #44 - Podcast Vlan de Gregory Pouy https://itunes.apple.com/fr/podcast/vlan/id1233992877?mt=2 #45 - Huawei P20 Pro https://amzn.to/2QIt4hS #46 - Bird https://www.bird.co/?gclid=CjwKCAiA0ajgBRA4EiwA9gFORxepBvxUBazNA3hxJKj8vOfI_KNtMA9mGJp0O5tTYtq0oQTNu6YS8hoCsU0QAvD_BwE #47 - iPhone XR https://amzn.to/2PqNdEo #48 - HUAWEI MateBook X Pro https://amzn.to/2QyMTID #49 - Amazon Echo Plus https://amzn.to/2BW0e5l #50 - Netgear Nighthawk M1 https://amzn.to/2AYJ5X6
La collecte, l'analyse et la vente de données personnelles est le coeur du réacteur des géants de la silicon Valley. L’actualité vient nous le rappeler à l’heure où FaceBook et Google se sont encore fait pirater les données de leurs utilisateurs. Alors, peut-on croire Tim Cook lorsqu’il affirme que le respect de la vie privée est un pivot de la Liberté? Comment se protéger? Débat en compagnie de Qwant, le moteur de recherche français qui respecte votre vie privée. Les coups de coeur : Fanny : Comme Elle, entreprenez votre vie de Géraldine Le Meur https://amzn.to/2yerZnH Didier : Waze CarPlay : https://itunes.apple.com/fr/app/navigation-waze-trafic-live/id323229106?mt=8 Google Maps CarPlay : https://itunes.apple.com/fr/app/google-maps-gps-transports/id585027354?mt=8 Alex : Solid https://solid.mit.edu Stéphane : Le meilleur développeur de France https://www.meilleurdevdefrance.com Tristan : Calimoto https://calimoto.com/fr Olivier : Netgear Orbi RBR20 http://www.netgear.fr/orbi/ https://amzn.to/2OjrmDa Les disques présentés dans la question stockage : - Un disque dur mobile USB-C : G-Drive Mobile USB-C https://www.g-technology.com/fr-fr/products/portable/g-drive-mobile-usb-c#0G10264 - Un disque SSD Mobile USB-C : G-Drive Mobile SSD https://www.g-technology.com/fr-fr/products/portable/g-drive-mobile-ssd-r-series#0G06052 - Un disque SSD Mobile Thuderbold 3 : G-Drive mobile Pro SSD https://www.g-technology.com/fr-fr/products/portable/g-drive-mobile-pro-ssd#0G10310
La collecte, l'analyse et la vente de données personnelles est le coeur du réacteur des géants de la silicon Valley. L’actualité vient nous le rappeler à l’heure où FaceBook et Google se sont encore fait pirater les données de leurs utilisateurs. Alors, peut-on croire Tim Cook lorsqu’il affirme que le respect de la vie privée est un pivot de la Liberté? Comment se protéger? Débat en compagnie de Qwant, le moteur de recherche français qui respecte votre vie privée. Les coups de coeur : Fanny : Comme Elle, entreprenez votre vie de Géraldine Le Meur https://amzn.to/2yerZnH Didier : Waze CarPlay : https://itunes.apple.com/fr/app/navigation-waze-trafic-live/id323229106?mt=8 Google Maps CarPlay : https://itunes.apple.com/fr/app/google-maps-gps-transports/id585027354?mt=8 Alex : Solid https://solid.mit.edu Stéphane : Le meilleur développeur de France https://www.meilleurdevdefrance.com Tristan : Calimoto https://calimoto.com/fr Olivier : Netgear Orbi RBR20 http://www.netgear.fr/orbi/ https://amzn.to/2OjrmDa Les disques présentés dans la question stockage : - Un disque dur mobile USB-C : G-Drive Mobile USB-C https://www.g-technology.com/fr-fr/products/portable/g-drive-mobile-usb-c#0G10264 - Un disque SSD Mobile USB-C : G-Drive Mobile SSD https://www.g-technology.com/fr-fr/products/portable/g-drive-mobile-ssd-r-series#0G06052 - Un disque SSD Mobile Thuderbold 3 : G-Drive mobile Pro SSD https://www.g-technology.com/fr-fr/products/portable/g-drive-mobile-pro-ssd#0G10310
SUMMARY: News and Notes: Jared and Kari are Level 2 Google Certified Educators. Look for upcoming series with back to school countdown with Google Tools and Tips each day. Tools and Trends: Analytics and Digital Citizenship. Show Topic: Why teachers should shift their thinking from network based storage drives to the collaborative cloud based solution of the Google Drive for PLC sharing and creation. Flipgrid Feedback or tips from our listeners: https://flipgrid.com/fc470dEmail Feedback: jared@walledtech.com or kari@walledtech.com
To Start: Sorry we were tired! Main Topics: Snapchat’s big app update. Where’s it going wrong? Facebook’s tackling fake ads, but is it doing enough to tackle fake news? Google’s predicting your health with your eyes using machine learning and AI. Why hasn’t TV got better yet? iWork, G Drive, OneDrive. If you were choosing which one to use today, which would you choose? (hint: there’s a clear winner!) You Should Use This Make yourself into a meme & create 3D versions of yourself with this ridiculous app.
El Podcast de Emprende 365: Emprendimientos | Podcasting | Tecnología
Nur ya lleva más de 10 años en la comunidad online y nos cuenta cómo y porqué comenzó con sus dos socios EnvíoPack. Hoy su marca es un producto 100% tecnológico, “es como un procesador de pagos pero de correos”. Hacé clic para Tuitear: Nur Malek Pascha fundó su empresa al detectar una necesidad de los e-commerce. Escuchalo la charla desde acá: https://goo.gl/hh7dBv Lo más importante [04:12] ¿Qué tipo de negocio online tenías? Siempre estuve en el mundillo de los Startups en los últimos 10 años. Hice investigación de mercado online y por ahí en 2008 se vendió a un grupo francés que se llama Ipsos y luego tuve la oportunidad de estar involucrada en el equipo que armó Groupon acá en Argentina, y luego se extendió a otros países de la región. Luego pude estar en Avenida.com que quería imitar el modelo de Amazon.com [06:13] ¿Cómo fue el momento en que se te ocurrió esta idea? En los emprendimientos anteriores siempre estuve a cargo de la parte operativa, pero justamente en 2011 se comienza a vender productos, entonces comencé a investigar en el mundo de la logística por necesidad, y precisábamos partner para que la atención al cliente sea cada vez mejor. Ahí se armó la parte logística del negocio. Ya hace un año y medio me involucré con mis socios, Horacio y Daniel; y formamos un modelo que tiene más de 9 operadores logísticos integrados, y creemos que para el año que viene vamos a tener más de 12. [10:25] Si te encontrás con alguien en la calle que hace mucho que no ves, ¿qué le decís a las personas sobre lo que hacés en tu trabajo en 15 segundos? Le diría que tengo una empresa de tecnología que vincula las empresasa e-commerce con los operadores logísticos. [10:52] ¿Sentiste en algún momento que fracasaron? Yo veía al final del túnel una luz brillante y empecé a proyectar en grande, hasta que fuimos a Uruguay en junio para testear cómo podía ser en otro país, y habíamos calculado que para ir necesitábamos 1000 dólares y que la inversión inicial iba a ser 10 veces mayor, que para integrar los operadores logísticos asumíamos que íbamos a integrarlo en dos semanas, y cuando volvimos ya estábamos proyectando en 4 meses. Obviamente todo se empezó a dilatar. [14:50] ¿Ustedes dejaron sus trabajos anteriores o tenían ingresos de otros salarios? Lo bueno de Envío Pack es que es un modelo rentable en el principio. Nosotros pusimos una inversión propia de 100 mil dólares. Y luego subimos clientes a la plataforma. Como es un modelo de tecnología a los clientes no le cobramos por ser parte de Envío Pack, sino que cuando negociamos tarifas mayoristas a los correos, ponemos un margen en esas tarifas. La realidad es que al principio se sumaron varios clientes y nos permitió que nosotros podamos vivir de eso. Pero no tenemos un ingreso adicional. [18:51] ¿Qué es lo que te apasiona de tu negocio? Me gusta mucho la industria del E-commerce, la tecnología e internet. Yo estudié Relaciones Internacionales y terminé en el mundo online de casualidad. [23:00] ¿Cuál fue el mejor consejo de negocios que recibiste y de quién fue? Mi marido se dedica a la gastronomía, tiene una Pyme familiar y ahora tienen una estructura más grande. Pero todo lo que han hecho fue a esfuerzo de trabajo. Más allá del producto que uno vaya a comercializar, los códigos son todos. Uno se esfuerza en el día a día para llevar su negocio adelante y hay que tener ética para trabajar. [25:22] ¿Cuáles son los códigos más importantes de su empresa? La capacidad de trabajo y el gran compromiso de entrega. A veces hay que hacer un deploy [un lanzamiento de producto] hasta las 4 am y ves gente que se levanta a esa hora para ir a trabajar. Tiene capacidad de trabajar, compromiso de entrega y actitud. [28:00] ¿Qué hábitos diarios prácticas y le atribuís parte de tu éxito? Soy tenaz, tengo los objetivos claros. Cuando no sé para qué lado voy, me pierdo. Intento conectarme con el equipo, almuerzo en la oficina, estoy conectada con lo que pasa. Uno tiene que tener información, tenés que estar con el equipo. Siempre voy con un cuaderno de Cosas para Hacer. Lo que me da más fiaca hacer, lo pongo en la lista. [31:54] ¿Qué aplicaciones utilizás en tu celular o PC? Uso Gmail, GDrive, y principalmente eso. Las primeras 2 personas que compartan este episodio en cualquier red social pueden obtener un 20% de descuento en el primer año si contratan G Suite a través de éste enlace. El código de descuento te lo envío por correo una vez que se verifica lo compartido. (*Nota: Es un enlace de afiliado) [32:24] Imaginate que te despertás mañana en un mundo nuevo, idéntico a La Tierra pero no conocés a nadie, poseés toda la experiencia y conocimiento que tenés actualmente, tu alimentación y vivienda están resueltos, todo lo que tenés es una laptop, un Smartphone y 500 dólares; ¿cómo empezarías tu negocio nuevamente? Buscaría a un desarrollador para volver a replicar cualquiera de los modelos. Para cualquier emprendimiento online, tenés que tener una fuerte pata en Tecnología, hay que saber cómo se mueve esta industria que es tan dinámica. Hoy las 4 areas famosas de las qeu todo el mundo habla que son fintech, biotech, healthtech e inteligencia artificial. Seguramente incursionaría en algo de eso. [35:04] ¿Cuál es tu libro favorito? Hay un libro que me gusta mucho que es Conscious Business, de Fred Kofman, trata sobre las culturas organizacionales. Después hay uno que se llama “Mi primer Millón” que habla sobre los grandes emprendedores de la historia. Entonces te cuenta la historia de Henry Ford, del Creador de McDonalds, etc. [36:08] ¿Qué es lo que te atrapó específicamente? Que eran todos emprendedores que estaban en circunstancias muy adversas. Entonces el libro cuenta cómo cada uno de ellos fue haciendo una lectura del escenario local en industrias muy diversas. En algunos casos no comparto los casos de moral y ética, pero son como una fuente de inspiración. Luego está “El Tallador de Diamantes”, era de un empleado de una joyería de Nueva .York que se encargaba al principio se dedicaban a pulir piedras preciosas, y esa empresa empieza a crecer gracias a que uno de sus empleados empieza a hacer un viaje espiritual por La India y por Asia dando a conocer ciertos aprendizajes que le sirvieron a la empresa. Y es muy interesante porque te enseña que la ansiedad a veces te juega en contra. [38:41] ¿Cuál es la mejor forma de contactarse con vos? A través de mail: nur@enviopack.com Los que quieran escribirme, ahí estoy. Si te gustó el programa: Suscribite al Podcast en iTunes o Spotify para enterarte cuando publico nuevos episodios. Podés calificar el programa en iTunes escribiendo una breve reseña desde acá. Seguime en: Instagram Facebook Twitter Gracias por escuchar! Hasta la próxima semana! Moses Levy
Droids Canada Game of Thrones Deadpool! We are setting up our very own Deadpool for Season 7! No purchase required to play. All you need to do is play for a chance to win an epic prize! Free and an epic prize? Why not! How to play: We have Drafted 30 people that could potentially die in Season 7. Tyrion Lannister Missandei Jorah Mormont Jamie Lannister The Hound Gilly Cersei Lannister Arya Stark Grey Worm Jon Snow Varys the Mountain Daenerys Targaryen Theon Greyjoy Beric Dondarrion LittleFinger Samwell Tarly Night King Davos Seaworth Brienne Of Tarth Yara Greyjoy Melisandre Tormund Giantsbane Lyanna Mormont Ellaria Sand Bran Stark Meera Reed Sansa Stark Bronn Podrick Payne Of that 30, you need to select 10 that you expect to die by seasons end. • You receive 1 point for every correct answer for everyone who died • You receive 1 point if you can tell us which character killed them • You receive 1 point if you can properly predict which episode they died on • You will receive a x2 multiple if the actor of the character you selected in the main title credits dies. (Potential of 6 points per character) • In the case of the tie, whomever has the most correct main title credit actors selected would break the tie All forms via email, G:Drive and paper must be submitted by 1PM EST on 07/16/17 https://docs.google.com/forms/d/e/1FAIpQLSf6NQWxvMYbqfaxPytb-8kOuUnOoQ5DhZ0zvfdhQPck4Kelmw/viewform
Escaleta del programa: Que me gusta de Trello: El arrastrar de las notas, eso de coger una nota y poder cambiarla dentro de su columna o fila, o soltarla en una u otra, es muy agradable. Muy intuitivo de realizar. El poder reordenar las notas con ese simple arrastrar y soltar. La interfaz es muy gráfica, y visual, y de un simple vistazo ves si hay atasco o cuellos de botella en un determinado estado de la tramitación de tu proyectos. Ejemplo, pantallazo de la tramitación de las multas, visto en el este ciclo. La vista calendario es alucinante, por lo visual que ofrece la información. El precio de Trello Gold, es de 5 dolares, es accesible. Los usuarios ven de un simple vistazo todos los elementos de un tablero. El insertar una imagen de cabecera, permite visualizar de un simple vistazo, saber de qué trata lo que hay en esa nota. Los tableros y las cards, son url, lo que aporta muchas ventajas, para compartir, para crearte códigos QR por ejemplo y poder escanearlos con aplicaciones. Poder abrirlos desde cualquier dispositivo. Las suscripciones a las notas, o tableros, solo que te interesen o a todo. La columna, o al tablero, o tableros. Las menciones a traves de la @ a otros usuarios. El sistema de notificaciones que tiene que puedes avisar a quien quieres que reciba un aviso, aún sin tener que abrir su aplicación Poder nutrir tus columnas a través de el correo electrónico, y que lleguen los mensajes a donde tu quieras…. ordenados. Duplicar los tableros Compartir tableros. Hacerlos públicos. Alta personalización en cuanto a los fondos, las etiquetas, sus colores… Las checklist, creo que es de lo mejor. Tanto su reutilización, como su porcentaje en el grado de cumplimentación de los item del mismo. El sistema de filtrado de etiquetas esta muy bien, para cuando tus paneles están muy saturados. Permite el enlazado con documentos de las diferentes nubes, de microsoft, dropbox, y cómo no con Google, con lo que el logueo con las credenciales de tu cuenta de gmail, es más que recomendable al ya poder vincular directamente con Gdrive. Es muy minimalista, la forma de organizar la información en notas. Si quieres conocer más que hay en esa nota, la pulsas, y se abre un mundo de posibilidades, desde AÑADIR, que permite un montón de opciones de personalización, miembros, etiquetas, checklist,... hasta las ACCIONES con la nota de mover, copiar, suscribirse…. El copiado es impresionante, por que te permite arrastrar las etiquetas, los checklist, aparte de la información. Hasta aquí una veintena de ventajas, o prestaciones que a mi me resultan increíbles. Que no me gusta de Trello: Sólo versión Web, no puedes utilizar por ahora las prestaciones de nuestros dispositivos, como la grabación, el gps, la cámara de fotos. No funciona sin datos, te obliga a estar conectado. No permite etiquetar masivamente. No permite jerarquizar las etiquetas. El menú de administración de etiquetas es algo “justo”. Las búsquedas no puedes listarlas para agrupar sus contenidos, ni quedan en la versión gratis, almacenadas. Son búsquedas al vuelo, una vez la realizas, si quieres volver a hacerla, tienes que repetirla. No puedes buscar en los documentos adjuntos, tipo pdf, ni tiene funciones de ocr para estos documentos. Combinar notas a partir de una selección o consulta, para utilizar ese texto. Ejemplo de cabeceras, cuerpo y pies diferentes… No tiene un menu de exportación/importación, creo que son con extensiones como resuelve esto. No puedes pintar en imágenes, o tomar anotaciones directamente sobre ellas. Prefiero Evernote El porqué me gusta más EVERNOTE, y para qué usos lo veo mejor. Es mucho más potente para las consultas, permite unificarlas. Permite nutrir tus libretas de diferentes formas, con servicios como el correo, el webclipper, e incluso, como son ficheros xml, editandolos tu mismo, como puede ser con una hoja de cálculo, que por cierto será un próximo artículo que voy a subir, y por tanto puedes meter mucho contenido. El trabajo en equipo creo que es más potente al permitir filtrar usuarios de solo consulta, con los de edición. Puedes trabajar offline, al permitir descargar a tu dispositivo todo. También es multidispositivo. El poder grabar notas de voz. El poder georeferenciar tus fotos y subirlas así. El poder hacer una foto y que quede insertada directamente en la nota. No todo son ventajas, evernote le veo bastantes carencias, pero creo que hasta aquí, ya tienes algunos criterios para valorar.
Escaleta del programa: Que me gusta de Trello: El arrastrar de las notas, eso de coger una nota y poder cambiarla dentro de su columna o fila, o soltarla en una u otra, es muy agradable. Muy intuitivo de realizar. El poder reordenar las notas con ese simple arrastrar y soltar. La interfaz es muy gráfica, y visual, y de un simple vistazo ves si hay atasco o cuellos de botella en un determinado estado de la tramitación de tu proyectos. Ejemplo, pantallazo de la tramitación de las multas, visto en el este ciclo. La vista calendario es alucinante, por lo visual que ofrece la información. El precio de Trello Gold, es de 5 dolares, es accesible. Los usuarios ven de un simple vistazo todos los elementos de un tablero. El insertar una imagen de cabecera, permite visualizar de un simple vistazo, saber de qué trata lo que hay en esa nota. Los tableros y las cards, son url, lo que aporta muchas ventajas, para compartir, para crearte códigos QR por ejemplo y poder escanearlos con aplicaciones. Poder abrirlos desde cualquier dispositivo. Las suscripciones a las notas, o tableros, solo que te interesen o a todo. La columna, o al tablero, o tableros. Las menciones a traves de la @ a otros usuarios. El sistema de notificaciones que tiene que puedes avisar a quien quieres que reciba un aviso, aún sin tener que abrir su aplicación Poder nutrir tus columnas a través de el correo electrónico, y que lleguen los mensajes a donde tu quieras…. ordenados. Duplicar los tableros Compartir tableros. Hacerlos públicos. Alta personalización en cuanto a los fondos, las etiquetas, sus colores… Las checklist, creo que es de lo mejor. Tanto su reutilización, como su porcentaje en el grado de cumplimentación de los item del mismo. El sistema de filtrado de etiquetas esta muy bien, para cuando tus paneles están muy saturados. Permite el enlazado con documentos de las diferentes nubes, de microsoft, dropbox, y cómo no con Google, con lo que el logueo con las credenciales de tu cuenta de gmail, es más que recomendable al ya poder vincular directamente con Gdrive. Es muy minimalista, la forma de organizar la información en notas. Si quieres conocer más que hay en esa nota, la pulsas, y se abre un mundo de posibilidades, desde AÑADIR, que permite un montón de opciones de personalización, miembros, etiquetas, checklist,... hasta las ACCIONES con la nota de mover, copiar, suscribirse…. El copiado es impresionante, por que te permite arrastrar las etiquetas, los checklist, aparte de la información. Hasta aquí una veintena de ventajas, o prestaciones que a mi me resultan increíbles. Que no me gusta de Trello: Sólo versión Web, no puedes utilizar por ahora las prestaciones de nuestros dispositivos, como la grabación, el gps, la cámara de fotos. No funciona sin datos, te obliga a estar conectado. No permite etiquetar masivamente. No permite jerarquizar las etiquetas. El menú de administración de etiquetas es algo “justo”. Las búsquedas no puedes listarlas para agrupar sus contenidos, ni quedan en la versión gratis, almacenadas. Son búsquedas al vuelo, una vez la realizas, si quieres volver a hacerla, tienes que repetirla. No puedes buscar en los documentos adjuntos, tipo pdf, ni tiene funciones de ocr para estos documentos. Combinar notas a partir de una selección o consulta, para utilizar ese texto. Ejemplo de cabeceras, cuerpo y pies diferentes… No tiene un menu de exportación/importación, creo que son con extensiones como resuelve esto. No puedes pintar en imágenes, o tomar anotaciones directamente sobre ellas. Prefiero Evernote El porqué me gusta más EVERNOTE, y para qué usos lo veo mejor. Es mucho más potente para las consultas, permite unificarlas. Permite nutrir tus libretas de diferentes formas, con servicios como el correo, el webclipper, e incluso, como son ficheros xml, editandolos tu mismo, como puede ser con una hoja de cálculo, que por cierto será un próximo artículo que voy a subir, y por tanto puedes meter mucho contenido. El trabajo en equipo creo que es más potente al permitir filtrar usuarios de solo consulta, con los de edición. Puedes trabajar offline, al permitir descargar a tu dispositivo todo. También es multidispositivo. El poder grabar notas de voz. El poder georeferenciar tus fotos y subirlas así. El poder hacer una foto y que quede insertada directamente en la nota. No todo son ventajas, evernote le veo bastantes carencias, pero creo que hasta aquí, ya tienes algunos criterios para valorar.
In this episode, Mike and Mike discuss powerhouse drummer Brann Dailor of modern metal band Mastodon. The post Episode 89: Brann Dailor, Developing Finger Control, Gibraltar Stealth G-Drive pedals, and More appeared first on Modern Drummer Magazine.
On this episode of The Angry Millennial, we're doing things a bit differently with previous guest, Jeremy Cowart, coming on to talk about the topic of backing up your work. G-Technology was a great help in putting together this episode, so a very big thanks to everyone over at G-Technology who also was generous enough to give us a 500GB G-Drive ev RAW to giveaway to a lucky listener! Jeremy is a commercial portrait photographer based out of Nashville, TN. He has taken portraits of many familiar names such as Taylor Swift, Kelly Clarkson, Tim Tebow, The Kardashians, Sting, Maggie Gyllenhaal, Heidi Klum, Gwyneth Paltrow, Emma Stone, Courtney Cox, and Ryan Seacrest, just to name a few. Clients include ABC, FOX, A&E, F/X, Discovery Channel, ESPN, People, US Weekly + more. His work has been published in Rolling Stone, ESPN Magazine, People Magazine, USA Today, Fast Company, NYTimes, TIME, Nylon and more. In this episode, we start off chatting about what he's been up to since we last spoke at PhotoPlus last year with shooting, SEE University, + his latest endeavor, The Purpose Hotel, which just launched on Kickstarter yesterday and you can learn more about in the video below! We also talk about our good friend, Chase Jarvis' video about his backup workflow with G-Tech products, horrible hard-drive failures we both experienced, how he makes sure to seat-belt his G-Drive on the way home from his studio and more on this episode of The Angry Millennial. Remember to always use #theangrymillennial on social media + follow @millennialangry on Twitter to ask any questions you'd like any of the upcoming guests to answer during the show.
Cómo subir fotos desde el iPad a Google Drive.
Técnicas de comunicación y herramientas web en investigación (umh3389) Curso 2013 - 2014
Formularios para la investigación en Google Drive. Asignatura: Técnicas de comunicación y herramientas web en investigación. Máster Universitario en Investigación en Medicina Clínica. Profesora: María Asunción Martínez Mayoral. Dpto. de Estadísitica, Matemáticas e Informática. Área de Estadística e Investigación Operativa. Proyecto PLE. Universidad Miguel Hernández de Elche. Utilización de formularios en GDrive para la recopilación online de información/datos de campo a través de encuestas.
Tommy Edison unboxes a 2 TB G-Drive from G-Technology. This is a "lost episode" from the "Drunk Unboxing" series of episodes.
Google i 1999 (01:30), Gdrive denne uken ? (08:00), Adobe lanserer CS6 (13:20), Skype til Windows Phone ute (19:25), Stem frem Norske Time.is på Webby Awards (24:45), Firefox 12 ute (28:35), Windows 8 beta mer populær enn Windows 7 beta (36:00), MS vokste forrige kvartal (46:40), Guild Wars 2 beta neste helg (49:35), Intel Ivy bridge (52:45), Medvirkende: Einar Holten (@TCi82) og Jan Espen Pedersen (@Jan_Espen), Gikk direkte: 23 april 2012 kl 21:30-22:30
Box.Com CEO and Founder Aaron Levie takes us through the early days of Box.com, how he got noted investor and Dallas Maverick owner Mark Cuban to invest in his company, and why he was scared to death of Google's long-rumored GDrive.
John loves motorcycles. Some big announcement is coming on the 27th, but it's not just for iWork 10. There are no Microsoft rumor sites. Why? Will Apple introduce iSlate? iPhone OS 4? Will the iPhone have controls on the back? It'd make butt calling easier anyway. Will iWork be touch-enabled? What's the point? Doyle really appreciated the sharing options introduced in iWork 09. Metzger uses both iWork and Office for compatibility. iWork's licensing is great - the family packs are cheap. John can't use Pages - continues to use Word. Formatting problems create issues for a PR firm, so reliability is king. OpenOffice and Google Docs have their own issues. Google Docs allows uploads for any kind of file (G-Drive). MobileMe is sorely neglected - it's a crown jewel, but Apple seems to ignore it. The iSlate would be a second machine for Dave - it'd be nice to be able to use it as a second display. Doyle thinks it'll have to be more than a color Kindle. Will it be a giant iPhone without cell service? Dave finally fixed his iPhone battery issues by disabling Google Calendar syncing. If you're having problems with battery, try the same! iPhone Apps: Dave likes CardStar. It doesn't with King Soopers (a local grocery stores), but seems to work everywhere else. Doyle likes Tripit. He pays for the premium service - the service takes reservation confirmation emails and organizes your trip. It didn't work for Dave (the iPhone app never synced). Doyle's one gripe is that he doesn't need the trips once he's finished. Location based sharing requires diligence. A danger is letting people know that you're out of town. John likes the Weather app, Stocks, and uses his iPhone to read NYT, etc. The small screen isn't a problem at all for him. He's still so enamored by the fact that he can, that he does. Michael listens to books, no reading. Michael likes GroceryIQ for grocery list management. It's $.99 and lets he and his wife share the list in real-time. It groups the items in sections to make shopping easier.$.99 is always worth the risk. The gap between those willing to pay $.99 vs. free is amazing. Apple sold 99.4% of all mobile based apps last year. Doyle would be happy to pay the Denver Post for a good app to read news. We've been paying for content for hundreds of years. We're willing to pay for good content. People pay for music now without thinking about it. Doyle has no problem throwing down for a single he learns about via Shazam. Dave tried to get rid of books on cassette but the store wouldn't take them! Radio on the iPhone - streaming radio seems to be a problem for John. It's a bandwidth issue. Michael uses Pandora in the car via bluetooth. The quality will degrade based on bandwidth, but rarely drops out. Gooveshark will have an iPhone app soon. Slacker radio is another option. That's a wrap!
While the new GDrive is tempting, you really need to have your own cloud storage strategy that you control physically and administer independently.
Since the launch of Gmail and the (at the time) unheard of storage space of 2 gigabytes, a number of developers have created tools to allow users to use their Gmail accounts for file storage. Examples include the GMail Drive shell extension, an add-on for the Firefox browser - Gmail Space, and even an equivalent for Mac OS X. Each of these add-ons/applications allows users to seamlessly email files to their Gmail accounts, while appearing to the native OS as another drive. Likewise, there's been a lot of buzz about Google's launch of Google Spreadsheets , and their acquistion and integration of Upstartle and their online wordprocessor Writely. In this blogcast we discuss some of these online tools.See www.nctt.org/blog for complete show notes.