Podcasts about google chromebooks

  • 70PODCASTS
  • 93EPISODES
  • 44mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Nov 21, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about google chromebooks

Latest podcast episodes about google chromebooks

Tek Talk
Tek Talk features Stocking Stuffers Part 3 with Kim and Chris Nova from Mystic Access and Denise Russell of Speak To Me Catalog. 11/18/2024

Tek Talk

Play Episode Listen Later Nov 21, 2024 61:32


Chris and Kim will present in the first half hour from 8 to 8:30pm Eastern and Denise will present in the second half hour from 8:30 to 9pm Eastern. Mystic Access It’s the holiday season again, and we here at Mystic Access are excited to catch you up on our most recent audio offerings. For those unfamiliar with Mystic Access, we’re Chris and Kin Nova, a totally blind husband and wife duo who provide extensive, affordable, professionally-produced audio documentation on both blindness-specific and mainstream products. Some of our offerings include audio on the Amazon Echo, the Mac computer, the Google Chromebook, the Victor Reader Stream 3 (audio available at no cost), and much more. Join us for a look into these offerings and others during our Stocking Stuffers appearance. And stay tuned for an exclusive shiny gift code for Tek Talk listeners. We can’t wait to celebrate the season with you. Speak To Me Catalog Ready for some Christmas shopping? Well, don't mis this opportunity to shop from the comfort of your own home and review some of the greatest talking items in the world!!! The Speak To Me Catalog is a family owned, home base mail order business that specializes in products that talk, sing, play music, or record your own special message.   You can find a   unique practical talking item or a fun and wacky gift idea that adds that personal touch. Choose from our varieties of   talking clocks, watches, key chains, teddy bears, greeting cards, calculators, stuffed animals, kitchen aids, novelties, bibles, radios, games, toys, talking thermometers, and digital recorders.  Speak To Me has something for everyone, even those who are hard to shop for! Presenter Contact Info Mystic Access Phone: 716-543-3323 Email: info@mysticaccess.com Website: https://www.mysticaccess.com Bi-Weekly Podcast: https://www.mysticaccesspodcast.com Free Audio Downloads: https://www.mysticaccessdownloads.com Speak To Me Catalog Website: www.speaktomecatalog.com/ Email: customer.service@speaktomecatalog.com Phone: 800-248-9965

Better Learning Podcast
Lessons for New School Leaders

Better Learning Podcast

Play Episode Listen Later Oct 30, 2024 40:14


Are you a new school leader wondering how to create learning spaces that truly engage students and foster success? In the latest episode of the Better Learning Podcast, Dr. David Cupolo, principal of St. James Intermediate School, shares valuable insights on the profound impact of school design on student engagement. In his conversation with Kevin Stoller, Dr. Cupolo highlights how thoughtful learning environments can transform education and offers essential lessons for new leaders navigating this journey. Dr. Cupolo also explores how instructional leaders can drive change by focusing on both physical spaces and the school culture. He underscores the idea that a well-designed building must be paired with a culture that prioritizes student growth and active listening. When students feel heard and supported, they thrive in environments that encourage collaboration, exploration, and a genuine sense of excitement for learning. For new school leaders, this episode is filled with actionable tips, from the importance of understanding the "why" behind school design decisions to embracing flexibility in both space and teaching. Whether you're aiming to enhance student agency, foster collaborative learning, or simply reimagine your school's layout, this conversation provides the guidance you need to take the first steps.   Takeaways: Schools should be designed with the needs of students in mind. Creating engaging learning environments can reduce boredom and increase student success. Student agency is essential for effective learning. Research can guide the design and use of educational spaces. It's important to reflect on the 'why' behind educational practices. Building a positive school culture is as important as the physical space. Listening to students can provide valuable insights into their learning experiences. Homework often has minimal impact on student learning outcomes.   Dr. David Cupolo has 18 years of experience in educational leadership as a building principal, including eight years at a cutting-edge, non-traditional facility; I offer a blend of practical experience and academic insight. Recently, I earned a Ph.D., during which my dissertation research delved into how instructional leaders understand and engage with the concept of 'learning thrill,' utilizing a framework developed by esteemed educational researcher John Hattie. The results of my research have profound implications for the design and renovation of school facilities and classrooms, highlighting crucial conditions that facilitate learning. I have presented on the topic of flexible learning environments at various conferences, most notably at three Association for Learning Environment (A4LE) Conferences, including the 2024 Southeast Region Conference this past April.   Sound Bites: "You can have beautiful buildings and be an ugly culture." "Kids want to collaborate and explore." "We need to trust kids and listen to them." "Learning thrill can be developed in schools."     Follow David Cupolo on Social Media: LinkedIn: https://www.linkedin.com/in/david-cupolo-6b4a1623/   Read David's Article Designing for Learning Thrill Spaces4Learning Article: https://spaces4learning.com/Articles/2024/07/09/Designing-for-Learning-Thrill.aspx     Episode 202 of the Better Learning Podcast Kevin Stoller is the host of the Better Learning Podcast and Co-Founder of Kay-Twelve, a national leader for educational furniture. Learn more about creating better learning environments at www.Kay-Twelve.com.   For more information on our partners: Association for Learning Environments (A4LE) - https://www.a4le.org/ Education Leaders' Organization - https://www.ed-leaders.org/ Second Class Foundation - https://secondclassfoundation.org/ EDmarket - https://www.edmarket.org/ Catapult @ Penn GSE - https://catapult.gse.upenn.edu/   Want to be a Guest Speaker? Request on our website     Kevin Stoller (00:07.454) It's another episode of the Better Learning Podcast. I am excited about our guests today because we talk a lot about furniture and use and we can talk about it from like the designers and from the architects and what we do supporting education from the outside. But it's always good to get the perspective of the principals and the ones that are actually like using the spaces and hearing from the teachers and the students and being able to have that lens to it. So I'm excited to bring in Dr. David Capolo. I screwed it up, I? Did I announce it? Did I pronounce it?   David Cupolo It's Koo-pal-o! It's all good.    Kevin Stoller Yep, and he's a principal at St. James Intermediate School in Horry County in South Carolina. Just for the audience, because I'll give you a little behind the scenes, I'm horrible at pronunciation and making sure I do it. And whenever I get it stuck in my head, it's so hard to switch it.   David Cupolo It's why I don't read names at award ceremonies.   Kevin Stoller I know because I'll get it stuck and I'm afraid I'm gonna mess up and I'm not the expert of that Yeah, I'm the worst. I'm like give me a script and I'll and I'll screw it up. So yeah, but but I really wanted to talk about from your perspective of where you got to what you're talking about like the thrill and getting rid of the boredom, but I want to start really from the from the very beginning for you and I want to hear what was school like for you.   David Cupolo So I knew how to play the game. I knew how to be successful in school. And honestly, if I had a relationship and you built curiosity and made connection with me, it was an A. If you did not, I was a B for bye-bye, that type of thing. And C for see you later. It all depended. And came from a family of engineers and I chose to go into public teaching and education, which is great. But I think I was not... That curiosity and connection for me in learning was not built in the area of math. was just too much of that skill and drill. so, but I played it well, you know, went on to college in Version, New Hampshire, and then a few master's degree at NC State. And that's where I really learned how to learn.   Kevin Stoller (02:33.058) So talk about that, that learning to learn. What sparked that for you?   David Cupolo I think it was, again, professors who allowed that agency, me to have that agency and explore the interests that I had, they gave the structural framework, but you really had to go do the work yourself and, you know, find those connections and challenge you. And I think there's the principle of Goldilocks, right? You know, that Goldilocks effect. And I think that had the right enough challenge and also the right enough support, but also the right enough freedom to, you know, take my learning further. Yeah, kind of push me.   Kevin Stoller OK. All right. So you usually when I when I talk to administrators, school leaders in there, there's like the big transition moments. There's the first one be like making that decision. Hey, I want to go into education. And then that typically puts them in a classroom. And then there's that second moment where they're like, you know what? I think I want to be outside of the classroom. I can have a different impact as an administrator. What were those moments like for you?   David Cupolo Yeah, so I came into education teaching alternatively. I was not certified. I was working for a lessons called which transition program in Rhode Island and the police refer to something causing trouble. They have a different a, but these kids are just needed some more guidance, right? You know, and so I found out there was a lot of jobs teaching in North Carolina. So I moved down, taught special ed. And it was interesting, my boss at the time said, you're a middle school teacher. I won't give a recommendation for anywhere. He goes, you connect with those kids. And I did it in, you know, in that timeframe, I quickly realized I want to have a bigger impact, you know? And I realized I could, I think. The students taught me so much that I realized, wow, what they're teaching me, I need to share it and need to use to impact other kids in other classrooms. So administratively, and you always have that principle that I think says, Hey, you should go and be an administrator. And I had a couple of those who did that and lo and behold, quickly moved into assistant principal roles. And now I'm in my, going to year 19 as a...    Kevin Stoller 19 years. That's awesome. First.   David Cupolo Thank you. Thank you.   Kevin Stoller (04:54.062) I mean, we're, we're record, we're recording right now at the beginning of, of August, even though it doesn't, it won't release until later, but you're getting, you're getting ready for the next round of teacher students coming through. What's going through your mind right now?   David Cupolo So teachers come back on Thursday, you know, and again, I'm like that teacher the first night, night before the first day of school. You have those jitters, but you're excited. You know, I'm excited to see what the year can bring. At my school grades five, six. So we'll have a new group of fifth grade students coming in, you know, and get to know those students and seeing what impact we can have on them. You know, setting that foundation and framework for I go back to the student is the most important part of this building. Without them, we would not be here. You know, and this year we're kind of kicking off and be the one, be the one, you know, and how can you be the one? I entered the school year with, you know, saying, I'm going to reflect on how can I be the person I want to work with? And then this year, so now it's kind of tying it up that we're coming back. How can I be the one I want to work with and be the one for those students? So I'm kind of wrapping my head around those thoughts and gear up. Yeah. So is a pretty typical every year you're coming in with like a new theme and a new direction that you really want to build in throughout the culture? So, yeah, I think yes and no. I always try to tie in on what we've always done, you know, and we always revisit the vision. We always... revisit our beliefs, you know, and going back to this is what we believe and that is it, that we can be the one for those students and all students, when I say all, A, capital L, capital L, even the kid from that neighborhood is Ken Williams to say, you know, they deserve the best and, you know, they know that and I'm an amazing staff that go in every day and give it all for those kids. But, you know, just kind of tying it all together as we keep going along and just improving.   Kevin Stoller Right. So talk more about kind of how you got this interest and at what point did you recognize how much the learning environment was really impacting the work that you do with that idea of like school is there for the kids?   David Cupolo Yeah. So, you know, as I moved into my career, one of my dreams was I realized I wanted to open up a new school. And, you know, that'd be a cool thing to do and actually only had was in my second year in this Horry County. I'd been a principal in North Carolina and I figured, you know, it might not come along because only been at this school I was at short period. And, you know, they selected me to open up this school which is a different design model. There was only a few others in the state but it was a state of the art facility and, you know, it's net zero net positive energy in. It looks like a mall, literally glass walls on the inside, collaboration spaces. But there was no schools like it. You know, we visited some different models to see what it was like. And every time you go to school, you know, I want to talk to the kids. I can do the tour with the adults, you know, and I can see. And one student, I can remember the school said, said, so how does this work with the glass and everything? You know, I'm an ADHD adult. How does it work? And I said, they said, it's like the zoo effect. I said, what's that? They said, I see you, you see me, I'm gonna do my thing. I'm like an animal in the zoo, you're watching me and I'm in my element. I said, that is awesome. I said, okay, this will work. So, but I remember, and we entered the school, we got the keys and a Friday night teachers were coming back that Monday morning and my whole staff had never ever come together. And so we hadn't even been in the building. But I remember visiting while it was dirt. I bought a hard hat, scraped up a vest and a clipboard. And I went in like I was part of the construction crew just to see, you know, this process. And finally I figured out who I was from meetings. But, know, trying to envision what this could be for kids and what environment we could create. Because you can have beautiful buildings and be an ugly culture, right? You know, so what can we really create for kids? And every parent meeting, I would start off with schools are built for kids. You know, this is their place. This is not our place. We serve them, so it was great. And coming into the building and really trying the collaboration spaces. So our first day back with teachers, I had my people spread out in the building doing different small PD sessions to see the acoustics, to see how it worked. And with teachers, I said, you can use the collaboration spaces. I didn't say there were rules to it. But I did say is let's let kids rise to the challenge. Kevin Stoller (09:40.014) For sure. So I just want to set the stage a little bit. So that school opened about eight years ago. So 2016 definitely because so many people that are listeners of the show are involved with the design of schools. And that was definitely on the earlier side because what you're describing is pretty much the... I don't want to say the standard. Hopefully it's at least more closely aligned with that versus the traditional model that doesn't allow that flexibility and that collaboration. So you guys are going in. How involved were you in the process or was that coming from the district level? Who was really driving that vision of saying, we're going to build this new school. Have this opportunity of a lifetime. What was that like for you?   David Cupolo So I came on the back end and it was more of the, know, decision-making. And I really think that net positive really was a big key for the school board, you know, and the design and the potential. So I don't know the conversations that we had about what pedagogy, you know, what we could do with in the classroom. I did help pick out desks and make sure the sizes were right for what we needed and chairs. But as far as, you know, how do you use it? It wasn't there, you know, it really wasn't. And that was my experience. So kind of fumbled through it with our staff, but more or less talking to kids and seeing how teachers were using it and kids. And I remember, I remember the first teacher that sent kids out to work in the collaboration space. like, wow, how's it going? She goes, I don't know. go, well, let's see. And I fist bumped her, you know? And then the glass, I said, it's writable. I didn't say you had to use it. I didn't say you couldn't. Said it's writable. You know, teachers started really using it, that's the fourth, you know, the fourth teacher, second, third teacher in the room using that students love working out those problems on the glass or, you know, anchor charts on the glass. And it was just kind of working with teachers and seeing how students should respond and then conversations with students. You know, I wish I had more on the front end I could speak to. I think now I offer a whole lot more to be able to say, hey, this is this is how we evolve. Kevin Stoller (12:04.802) Well, that's why I wanted you to go through it because that's very typical in this industry, very typical in that there was a decision made at the district level or someone on the board or somebody said, hey, we're going to go this direction. But they're not always pulling in kind of the site leaders and teacher students perspective as they're doing that. Now, as an industry, we're getting better at doing that earlier on. But your experience is like very typical where you're almost like handed a building and now saying, go figure out how to use it.   David Cupolo Yeah, Friday night at 7:20. got the key. Teachers show up on Monday. Yeah, here you go. Yeah. So, so you definitely embraced it hearing like that. And you know, you had teachers that do, were there ones that that fought it or, or saying like, man, I just wish I had my old space back. You know, there were some, there was a couple. And they may have realized it wasn't necessarily their fit. But I remember one teacher who is interesting because she, this school's meant for older students and not these students. And I'm like, but look, they're doing it over there. And finally, it took a little while and she embraced it. And she actually retired, but said, thank you for giving me, my last two years was so enjoyable with my kids because of the, what we have here and what we're able to do and the way the building is being used in those spaces. So that was pretty cool. Testament for her who was, you know, it was, it was a shift. Yeah. Yeah. Which I don't blame anyone changes hard. mean, if you've been doing something for a long time, one way, and then have to shift that quickly to a different way, that that's a tough change. It really was, it really was. And, know, and I'm a, I'm a research person. I'm a research geek. I've known John had his visible learning work for years and those in education. If you don't know him, you better know him because what he writes about and the research he has people do, it's what works in schools. So that was part of that other foundation was, know, teachers necessarily don't want to know about the research right away, but kind of bringing it in and introducing them, okay, well, here's what the research says about student discussion and the impact. And here's cooperative learning. And here's how we can use the furniture and how to tweak it and better practice and tighten it up. you know, and trying to take that learning to another deeper level. Kevin Stoller (14:24.268) Do you mind talking through a little bit of Hattie's research? It is important for us to understand the research band because a lot of us who are supporting it, who may not come from education background, whether it's on the architecture side or on the industry supporting education, the more educated we could be, the better.   David Cupolo Right. And I think one of my, some of my favorite conversations are people in the industry and architecture in outfitters because of that, you know. And so his, again, that research out there shows what's effective, you know, homework has little impact on student growth and academic success. Class size. You know, we learned during COVID, might be different if you have hybrid, but you had to do some other things well for it to be impactful, right? You know, and that's the piece. have to just, you have to learn the strategies and the research behind it. But yeah, so Hay and Greg Donahue proposed a conceptual learning model, skill, thrill, which was a synthesis of that research and visible learning of what worked. And oftentimes, surface deeper transfer, right? And we're often, we know in classrooms there's surface level learning and kids aren't engaged and we sit in rows, you know, and there's that boredom piece that I found, you know, and Cornwell in 2000, it was only two years ago, the art of only two years ago and how boredom has led to what a third of high school dropouts to half, you know, that's an issue, that's a crisis, you know, and that's something we can fix and that's where design and use. Just because you put the kit desk together doesn't mean they're going to collaborate, right? You know, you got to use it effectively, but that's that research. So I want to study what learning thrill was, you know, it seemed like it just rhymed with skill and will. And, you know, it was perfect. So nobody had studied it. So I kind of talked to South Carolina structural leaders and how do you perceive and conceptualize it? Then what does it look like? What does it sound like in the classroom? Take me to those places and describe it. And they described these deep, engaging experiences for kids. They were collaborating. were experiencing almost student agency. They were driving their learning. The teachers were just fostering that real environment for those students. But again, inductive learning, project-based learning, and thinking about how we design and materials and use of materials and how. Because teachers, it's about time, right? Adam and Eve's teacher said, I don't have enough time to plan for them. It's just the way it is in education. We know that. So what can we do to help those teachers design rooms and make smoother transitions and furniture that's flexible so I can just easily maneuver it so I can do this over here. But then those learning spaces for students, what are they comfortable? Where are they more comfortable in taking their learning to a deeper level and really getting that thrill experience, you know?   Kevin Stoller Yeah. Do you mind giving some examples of like where, because the space, how much that changes, like those concrete examples, I think are the stories are always good for people to hear to be like, hey, this is a kid that maybe 10 years, you know, in your first 10 years of being a principal may have had a different experience versus now what they have in that flexible learning environment that they're in now.   David Cupolo Sure. Yeah, I remember when we all think and it was a few weeks into the school year. And this is this really hit me this this moment. So under the stairs of cement blocks in my school and this is sprinkler system. And there's a student like to work under there. But one day he's kind of just pulling on hanging on the pole. Nothing can do. What are you doing? He goes, What do mean? I said, You're pulling on the fire thing. It's sprinkler system. I go, Do you know what happens if that breaks? And he goes, No. I go, neither do I, but I have a feeling it has a lot of water, a big bill and fire trucks. I go, go to your room. He goes, do I have to? And I was like, my, I sound like a parent. I'm like, tell you what, go for 50 seconds, just come back. Please don't do that again. We good? He's good. I said, we fist bumped. But then I started like, wow, I need to pay more attention to this, you know, and those students. And soon as I tell you, this is my space that I feel more comfortable on the floor in the corner on that pillow. Or, you know, our media center is open space and there's different furniture. And, you know, you struggle with custodian on whose furniture it was. Well, they're putting their feet on it. I go, it's theirs. Like, you know, that's their space. This is where they're comfortable learning. And it was transferring. Those teachers are like, wow. And they rose to those occasions, you know. I've seen students who come to that school with behavioral records. And part of that culture is that this is your place, this is your space, and it's a safe space. And it's interesting, I was having a conversation last Friday with one of my teachers, last Thursday. She talked about the desk, how each kid doesn't own that desk. Remember how we had our desk and you had your name on it? Yeah, for sure. It's not my desk, it's our area. And I can go work with other kids in another area and students who might not sit in that row traditionally can work together with other students in that respect and that safe place and that safe space that they need. You know, and allowing them that opportunity. And I think that's the other key, you know, is that setup that we've seen from non-traditional rows to collaboration and even with the technology of sharing through Google Chromebooks and Google Docs and things of that nature. Yeah. So can you expand on that more as a principal who has gone through that process and now to a principal who may be getting ready to open a new school or a totally different space and their staff is coming back right now or they're in the process and it's going to be in the next six to 12 months? What are those lesson learns? would be that advice that you would give to them? Because they're going to have the same things. They're going to have the teachers that are going to be like, well, what do mean the student doesn't know the space? What do you mean that, you know, like I'm not upfront and, you know, and things aren't sitting in straight rows. What are those things that you would share with others? You know, I start with the why. That's when we opened the school, I got a book for the staff to go back to our why. And, you know, and we had our individual, why are you teaching? Because I knew teachers were gonna struggle. knew just because you got the keys doesn't mean it's complete, right? Let's be honest, there's still gonna be work being done. And those can interfere and things out the air conditioning, right? It's just gonna get adjusted. And those are things that matter to teachers, you know, and all the pressure on teachers now. So really looking at the why and the student and then what can you do for the student? because everybody in education to help kids to work with kids and help kids be successful. I think that's the first piece is trying to build that collective vision. I started with the collective teacher efficacy has the biggest research effect size on student achievement, 1.36. And coming together really looking at involving teachers in that process. then setting up some structures, you gotta have some structures, but don't be completely tied to them because you're going to get to know the environment and allow teachers to mess up, allow kids to mess up.   Kevin Stoller Yeah, which we all know is the best way to learn, but we struggle. want to step in. Well, that's good. mean, are there, as somebody who values research and is constantly looking at that, what research do you wish would be done at this point? What would be really helpful for you, or what are the questions that you would wanna try to answer?   David Cupolo You know, I talk to kids a lot and you know, it's one of the tough parts for researchers is doing research, talking to students, right? Because that's that big, you know, there's always those epic things in there and you know, I started with the check-in system with the company in Australia, Versha Learning. And one of the things I wanna know is what are you learning today? Ask kids, what are they learning? Yeah, you your kid at home, what'd you learn today? Nothing. Or this, well, I know what you did, you know, but what are you really learning? And I found that, you know, students couldn't really articulate. And then teachers like, well, you talked to so-and-so, of course they couldn't tell you. Well, I don't know that that was the answer, you know. So we started looking at that. And one of the things we found is students were bored, but they also weren't clear about what their learning was. But they also wanted discussion. They wanted to talk to their parents and they wanted to collaborate. You know, they were telling us what they wanted through that check-in. John Hattie actually, it's a quote that says on their site, it's the best classroom data I've ever seen. You know, and really I would love to learn more about students, what leads to thrill for them and how they experience that learning because it's not often. You know, go to watch schools when it gets out of high school practice, right? Kids are practicing skills, they're acquiring skills, they're consolidating it, they're adding, they're learning, they're dispositions, persevering, and then there's that thrill. And we see in band when they get to perform in chorus, and very rarely do we get to see in those academic classrooms, but it can't exist, and that's what I've kind of studied. But I wanna know more from students of what can we do to help you, what can the environment do to help you? What do you need more of? We kind of know some of it, like I said, from that check-in. And it was, we want to be able to have more discussion. We want to be able to ask more questions. We want to be able to explore. We want to be able to collaborate. So those things, I would love to delve more into that research and study the environment they're in.   Kevin Stoller Yeah. What does your gut tell you if you're going to have a hypothesis on that of saying, you know what I think this would work or this would be a benefit?   David Cupolo I think those flexible environments and collaborative spaces where students feel safe and they feel valued and they have agency and when you give them opportunities for curiosity and connections to each other, I think that they're gonna say, that's what I want, that's what I need. And that's the world of today, honestly. Unfortunately, as you see the research, you go through school and by the time you become a senior, you're very little engaged and it's scary. I know. And you can be like, we can all be engaged in something and it can be low level too, right? I've been engaged, but that's really tasks. I'm just completing a task. I'm not really into it, part of it's a curricular issue on the educator side. That's part of that stack curriculum. We got those tests and all of those things, and I'm not saying there's not some value there. But our learning is not going deep enough and we need to be able to transfer that learning. Kevin Stoller (26:24.782) I think you're right. I mean, my experience would be the same that if I was going to say like, maybe there's not perfect research that shows it this way, but my gut and from what I've seen from being around this enough and just knowing kids and watching it, is. Right, they do. They want the agency. They want to be able to collaborate. They want to work with their peers. They want to have meaningful projects. that, yeah, and that for me is always the hard part because I'm the one that wants to challenge the status quo and be like, well, if you know that, why don't we start doing that? Like, what's preventing us from doing that? And I get it. There are a lot of limitations of what we can do without having the data and without having, you know, like the laws and all the legal and all the things that are coming down from state level and district level. But my gut is with you on that too, is that if we actually listen to the kids, they know what they want.   David Cupolo Yeah. they do. They do. And I was glad I had a professor said study thrill, nobody studied it, because that's tough to do a dissertation when there's no prior research you know, on that one topic. But I was, I really knew I was onto something there. So, you know, developing a framework for instructional leaders and how to, how can we work with teachers to increase learning thrill, you know, that's kind of still tweaking it. Because I believe it can be done even in the status quo, but we do have to push those understandings, you know, and trust kids. Cause they don't respond right. You know, and they're to mess up. We all did. Yeah. And that's probably the best thing for him is to mess up. Right. I sat in the principal's office a couple of times in my life. It's nothing wrong with that.   Kevin Stoller (28:46.284) Yeah. Yeah. Yeah. So, so are you, so as far as like studying thrill, like, and do, so are you actively engaged in that? Like what? Cause I talk through like what your journey has been around this concept of thrill and education.   David Cupolo So right now, know, finalizing my dissertation and kind of working with, again, virtual learning. Phil Stubbs is my thought partner. Shout out to Phil. He's with Virtual Learning. He's a brilliant mind, and kind of really fine tuning a framework for instructional leaders to kind of look at those things. Inductive learning. So what does the environment look like? Teacher authority. They've got to... to clarify Ed, that they're really tweaking right now that's coming out. And it's been a great journey that'll give teachers back time and make things more clear for students, but also look at a learning progression. So it's kind of like expert to Jedi, you know? So students can see this is where I need to head with my learning. And if I want to be a thrill and I want to be a transfer, this is where it's at. But then how could... giving them the opportunity to say, is how I can show and meet success criteria. Instead of just answering questions on a test, show me how you can, this is the level, show me that you were at that level. And that was a neat piece. When kids could articulate with three points of what they were learning and where they were going, then they had 68 % more positive emotions responses, just in that one factor. So I worked with my staff on that and we found, wow, the boredom, you when you look those wordles, bored got smaller and smaller and smaller and excited and enthusiastic, you know, and anxious reduced, you know, there wasn't that cognitive overload that kids feel. So there's a lot there that we're, you know, working on writing and getting out there, trying to share that message and do some presentations and All those things.   Kevin Stoller Yeah, very cool. Yeah. Well, that people need to hear it. Yeah. People need to be able to do that. So yeah, thank you for doing that work. I want to hear it before we wrap up here. I want to hear. The eight year journey into the new facility, what, what are the things that you have changed or like if you did it over again, you wish you, it would, the building would be different or the learning environment be different for those people who are going through it right now because that's obviously one of the big benefits of of education is we're so willing to share and help people so that the next project is always better for the first for the kids and the teachers in the future.   David Cupolo So, you know, for me, it was interesting right now the struggle is furniture. So we have these, you know, funky shaped collaboration tables for kids can sit at and I've grouped teachers that would prefer those in their classroom than the desks that connect together, just basically the four desks that have cool little shapes that connect together. They want these tables. And I'm just, they say it's more functional, more space in my room to maneuver. It's still not their desk. It's our table in that mindset. That's something to look at, you know, because they really believe it's helped their classroom. And I think just kind of look into the spaces and how do you use them and what structure do you provide kids for? It's for this use, know, using it understood that it's for learning, that it's not just, you know, hanging out. And kids did a great job with that, but that's just a little suggestion, you know, keep in mind, and this is our space for this and really having to understand this is where you apply yourself. This is where, you know, your collaborative place. This is for your discussion. You know, because we didn't have that, you know, campfires was not a word when I came out, you know, we did cooperative learning structures. I think that's a great training to have Cagan cooperative learning structures because it really tightens up how to, so kids can't hide in those environments still, because that's another piece we don't want to, we don't, and I don't mean physically hide, but I do, you know, educationally hide. I was good at that. I could sit in the back right corner last seat if I could and just, you know, kind of do my thing and then do what I needed to do, get out of class. But I think, you know, my best advice, have a plan, have a vision, have a group of people, your people who you believe will be the key people to really move that transition and look at the space. And I would love to visit schools and say, hey, this is your space. This is how it worked for us. This is how it didn't. This the space that was designed in the school that we don't use that I wish was something else, right? And that's the architecture side. When I was going through my Ed specialist degree, because I didn't understand how architects design schools. So part of my internship hours were with the architecture, because I want to know why did you do that? Why did you put this there? Then, know, look, those transitions, that's going to be an issue right here. Student transitions, that's, you you need to think about that because this crossway, cross paths, that's something else I would say, and look at your schedule and look at where kids are maneuvering based on the design. We have, criss cross applesauce traffic, you know, and it can be kids and kids, you know, we don't necessarily want to apply it, but we just want, you know, get where you need to be hugging, go hug and go, hug and go, especially after COVID.   Kevin Stoller Yeah. Yep. For sure. Yep. Yeah. And whether it is that way finding or something on the floors to help guide that traffic flow. Cool. Well, thanks for doing that. Thanks for sharing that. Anything else that I should be asking you that I haven't asked you about that you think would be useful for our audience?   David Cupolo You know, I just think having educators and principals at the table, I don't know the conversation that had. It seems like it's getting better, but understanding pedagogy, understand research. I've presented in a couple of AFRL conferences and, you know, I enjoy it and was, you know, sharing the research and the pedagogy to understand this is how it's used in the classroom. This is how the teacher will use it. And this is why, and this is the research says this is effective. You know, I think that that knowledge would be beneficial. Okay. This is why we want students to discuss. This is why we want cooperative learning. This is the impact it has. You know, and one of the activities I do is I put up some of the effects, things that impact learning can be have a strong effect or very little. And it's always interesting that items that come up like homework, that very little impact, but we all hop on our kids about it. Like you got to tell them it really doesn't have impact, you know, unless it's really taking learn further, you know? The things that are like, we've heard this research for so long and we know it, but man, I can tell you from like the parent experience, our schools are not learning that they keep sending the homework home and it's still like that nightly battle of, then I'm sitting here knowing this research that the homework really doesn't matter. I live it. Yeah. Yeah. I live into my house, you know, and now we know more about digitalized content and personalized learning, which is better. I think research will help tweak that homework. In fact, says a little bit more. you know, because it's more meaningful to students if it's used the right way. They understand this is where you fill in your gap and this is how it's going to benefit you. But yeah, no, that's frustrating to know. We know the right stuff and we still struggle getting it in place. Yeah. Well, I just heard a story of Chick-fil-A how, and seems like recently they've dropped this, at least once by us, but they used to have, you knew if you went to a Chick-fil-A, And they would say, may I serve you today? And you knew that was the way. And they ask them, how long did it take to get that idea, that simple line of having everyone ask about that? my pleasure. I think it was the end of it was when they say, pleasure. Instead of saying thank you or yeah, they'll say, my pleasure. How long did it take to get everyone in the organization to do that? Guess how long they said it took them? Six years. Six years to get like everyone to just say that one my pleasure, like just to answer like, that my pleasure. And it's a reminder of like how long it takes to get even simple changes all the way through a system. And yeah, to so to do it, we may know the research, but man, it takes a little time, unfortunately, as much as we want to try to have that urgency to say like, Hey, this kid only goes through school one time. Let's try to it right for them. Kevin Stoller (38:12.632) Well, that's, know, and for me, it's gentle constant pressure because compliance, you know, I'm one of those, the status quo doesn't always work for me.   David Cupolo And, but that gentle constant pressure of what works, you know, hey, try this, try this, you know, it takes hold, but it takes time. You got to have that patience to realize, you know, and organizations go through those challenges, you know, and you kind of peak excitement and then dip down and then, all right, let's get back on track again, you know, but it does it. didn't think six years though. been my pleasure. That's a long time. Two words. right.    Kevin Stoller Perfect. For the listeners, wherever you listen, just hit subscribe. We appreciate it. We also appreciate all of the feedback and the recommendations on either guests or topics. The hub for everything is betterlearningpodcast.com and on there we'll have show notes. We'll have links to David's information and he shared with an article. We'll link to the article too that he wrote here. So if you want any more information around this topic. But David, really appreciate the time. It great speaking with you.   Kevin Stoller (39:49.336) Views and opinions expressed on the Better Learning Podcast are those of myself as an individual and my guests and do not necessarily represent the organizations that we work for, the Association for Learning Environments, K-12, Education Leaders Organization, or Second Class Foundation.

Tales From The Lane
Episode 40: The Art of the Pivot with Ayana Major Bey

Tales From The Lane

Play Episode Listen Later Oct 2, 2024 53:30


If you're curious about how the Creatives Leadership Academy can help you to design your life and career with more intentionality so that you can take things up a notch, earn more income, do the gold-standard of whatever it is you love to do, AND have time for the rest of your life, Book a call with me today so we can discuss it! ---> CHAT WITH KATE In this special episode of the Tales from The Lane podcast, I'm joined by fellow podcast, Ayana Major Bey, host of The Artist Pivot Podcast Series for a fun and heartfelt conversation about what it really looks and feels like to make a career pivot in your Creative career.  Released on both podcasts, this conversation is a two-sided interview filled with insights and stories about our own experiences with pivots.  Hear about how the pandemic forced Ayana to pivot from a full-time Actress into the multi-hyphenate Actress–voiceover artist–podcaster–mentor she is today, and how she is full of gratitude for this beautiful expansion of her talents, and you'll hear about my own (multiple!) career pivots that have gotten me to where I am today.  If you have ever thought about doing something slightly outside of your current skillset, but were too afraid to take that first step, today's episode is for you!  More about our guest:  Ayana Major Bey is a multi-hyphenated creator, which includes being an actress, voice-over artist, mentor/coach, public speaker, podcaster, former radio personality, and world traveler. She is a New Jersey native, of Guyanese Heritage, and has loved the performing arts and theater since she was a little kid. An alumnus of two great schools, Montclair State University where she got her BFA in Musical Theatre, and The Royal Conservatoire of Scotland where she got her MA in Acting. Select stage credits include: Dreamgirls, Hairspray, Sister Act, Little Shop of Horrors, Children of Eden, 1940's Radio Hour, All Shook Up, and After Midnight. Select voice over credits include: Sephora, For Hers, Babbel, Google Chromebook, Starbucks, Ally Bank, Square, Delta Dental, and Boston Museum of Science. When she is not being a multi-hyphenate creator you can catch her cooking, baking, taking care of her plants, and of course, traveling. Having visited 27 countries thus far some of her favorite places include Thailand, South Africa, Spain, and Italy. You can follow Ayana at Insta: @ayanambey, and Linkedin: https://www.linkedin.com/in/ayana-major-bey/ and New Yorkers, grab your tickets to her upcoming cabaret show at Greenroom 42 on October 20th: Tickets and Info HERE.   

Talk on Chromebook by HelenTech
2024年06月01日 - 週間 Chromebook ニュース (24020)

Talk on Chromebook by HelenTech

Play Episode Listen Later Jun 1, 2024 5:50


今回の Talk on Chromebook by HelenTech は「この1週間であったChromebookの関連ニュースをピックアップ」の2024年第20回目をお届けしていきます。 対象にしているニュースの期間は2024年5月25日から5月31日までとなっていて、今週は ChromeOS の新機能と Chromebook の新機種に関する話題です。 [今回の主なニュース] 1. ChromeOS 新機能 Google が Chromebook Plus 向け Gemini と AI を活用した新機能を発表 → https://helentech.jp/news-44528/ Google が ChromeOS 125 の新機能と変更点を公開 → https://helentech.jp/news-44700/ ChromeOS 125 がリリース。Chromebook Plus 向けの AI 新機能がいくつか導入されたので試してみた → https://helentech.jp/news-44606/ さっそく ChromeOS 125 に1回目のマイナーアップデートが展開 → https://helentech.jp/news-44823/ 2. Chromebook 新機種 Google が Acer、ASUS、HP の新しい Chromebook Plus を発表 → https://helentech.jp/news-44538/ Acer が Chromebook Plus Spin 714 と Chromebook Plus 516 GE を海外で正式発表 → https://helentech.jp/news-44542/ Acer が Chromebook Plus Enterprise 515 と Spin 514 を海外で発表 → https://helentech.jp/news-44834/ Core Ultra 5 搭載 Acer Chromebook Plus Spin 714 が米国 Best Buy に登場 → https://helentech.jp/news-44343/ ASUS が CPU アップグレード版の Chromebook Plus CX34 を海外で正式発表。13世代と14世代 → https://helentech.jp/news-44546/ Google が Chromebook の紹介ページをリニューアル。新しい動画も公開 → https://helentech.jp/news-44686/ [その他のニュース]ChromeOS 125 で Chromebook のカレンダーウィジェットに複数のカレンダーを表示させる方法 → https://helentech.jp/how-to-display-multiple-calendars-in-the-calendar-widget-in-chromeos-125/ 海外では ASUS Chromebook Plus CM34 Flip が販売終了になるかもしれません → https://helentech.jp/news-44472/ 日本でも HP Chromebook Plus x360 14b と新しい Chromebook x360 14bがリリース → https://helentech.jp/news-42526

Talk on Chromebook by HelenTech
2024年05月25日 - 週間 Chromebook ニュース (24019)

Talk on Chromebook by HelenTech

Play Episode Listen Later May 25, 2024 6:32


今回の Talk on Chromebook by HelenTech は「この1週間であったChromebook関連ニュースをピックアップ」の2024年、第19回目をお届けしていきます。 対象にしているニュースの期間は2024年05月18日から24日までとなっていて、今週は海外の新機種とChromeOSの機能に関する話題が中心となります。 今週の主なニュース 米国 Best Buy に Acer Chromebook Plus 516 GE が登場。Intel Core 5 120U 搭載 → https://helentech.jp/news-43935/ Core i5-1335U 搭載 ASUS Chromebook Plus CX34 が Best Buy に登場 → https://helentech.jp/news-43946/ ChromeOS 124 Stable に3回目のマイナーアップデートが展開 → https://helentech.jp/news-44003/ 「add to chromebook」バッジで ChromeOS に最適化されたアプリをインストールしやすくなります → https://helentech.jp/news-44024/ ChromeOS 125 Beta で「ゲーム ダッシュボード」が導入。キーやボタンマッピング、録画もできる → https://helentech.jp/news-44328/ これ以外にも細かいニュースがありますので、詳細については各記事をご覧ください。 Adobe Lightroom の AI を使った「生成削除」機能は Chromebook からでも試せます → https://helentech.jp/news-44107/ Google レンズが Chromebook のギャラリーアプリに組み込まれる可能性があります → https://helentech.jp/news-44299/ 顔のジェスチャーだけで Chromebook を操作できるようになります → https://helentech.jp/news-43887/ Google Meet に「アダプティブオーディオ」が導入。複数のノートPCをグループ化してハウリングを防ぐ機能 → https://helentech.jp/news-44177/ Google チャットのスペースにメールを送信できるようになりました。スペースのメールアドレスを作成可能に → https://helentech.jp/news-44202/

Talk on Chromebook by HelenTech
2024年04月29日 - 週間 Chromebook ニュース (24015)

Talk on Chromebook by HelenTech

Play Episode Listen Later Apr 29, 2024 6:06


今回のトークオンクロームブックは、「この1週間であったChromebook関連ニュースをピックアップ」の2024年、第15回目をお届けしていきます。 対象にしているニュースの期間は2024年4月20日から26日までとなっていて、今週は新製品発売に関する話題と ChromeOS の機能に関する話題が中心です。 [今回の記事] Intel N プロセッサ搭載 HP Chromebook 14a も日本で発売。公式ストアで64,900円から → https://helentech.jp/news-42896/ ChromeOS 123 に3回目のマイナーアップデートが展開 → https://helentech.jp/news-42818/ Chromebook と Microsoft OneDrive の統合がようやくリリース。Office ファイルが直接編集可能に → https://helentech.jp/news-42807/ Google Meet の会議(通話)をデバイス間で転送する機能が展開 → https://helentech.jp/news-42790/ [この他の関連ニュース] Google がアジア太平洋地域とラテンアメリカ向けに各メーカーの新しい Chromebook を発表 → https://helentech.jp/news-42856/ Google が Chromebook を使うことによってサステナブルな取り組みができることを説明 → https://helentech.jp/news-42730/Works with Chromebook 認定のゲーミングデバイスまとめ → https://helentech.jp/works-with-chromeook-gaming-devices/

Talk on Chromebook by HelenTech
2024年03月23日 - 週間 Chromebook ニュース (24011)

Talk on Chromebook by HelenTech

Play Episode Listen Later Mar 23, 2024 5:25


今回のトークオンクロームブックは、「この1週間であったChromebook関連のニュースをピックアップ」の2024年第11回目をお届けしていきます。 ピックアップする期間は2024年3月16日から3月22日までを対象にしています。今週は主にChromeOSと機能に関する話題が4つあります。 ChromeOS 122 の1回目のマイナーアップデートが展開→ https://helentech.jp/news-41084/ ChromeOS 122 に2回目のマイナーアップデートが展開。一部機種で遅れる→ https://helentech.jp/news-41239/ Google が教員向けに Chromebook の10個の機能を紹介 → https://helentech.jp/news-41210/ Chromebook のカレンダーウィジェットで複数のカレンダーをサポートできるよう取り組み中 → https://helentech.jp/news-41267/ Chromebook に「位置情報のプライバシー設定」が追加されます → https://helentech.jp/news-41319/ ロジクールの「Casa Pop-Up Desk」は Works with Chromebook 認定を取得→ https://helentech.jp/news-41045/

Talk on Chromebook by HelenTech
2024年02月24日 - 週間 Chromebook ニュース (24008)

Talk on Chromebook by HelenTech

Play Episode Listen Later Feb 24, 2024 5:36


今回のトークオンクロームブックは「この1週間であったChromebook関連のニュースをピックアップ」、2024年第8回目をお届けしていきます。 ピックアップするニュースの期間は2024年2月17日から2月23日までとなっていて、今週は主に海外の新製品発表と Google Workspace 周りの情報になります。 [関連記事] CTL が Intel N プロセッサ搭載の「Chromebook NL73」シリーズを海外で発表。299ドルから https://helentech.jp/news-39474/ Google が Chromebook のキーボードが小文字である理由を説明 https://helentech.jp/news-39497/ Gemini for Google Workspace がリリース。新しい Gemini Business と Enterprise プランが登場 https://helentech.jp/news-39477/

Blind Guys Chat
#90: The preferred finger

Blind Guys Chat

Play Episode Listen Later Feb 8, 2024 53:48


Hello our refreshing Braille cells, and welcome to another episode of BGC: the show everyone is talking about. Our guest host this week is Marc Wijnhoven, who lives in the Netherlands not too far from our Jan. Marc is chomping at the bit to get going and of course his favourite topic, just like Jan and Óran, is the weather. Marc has a lot of strings to his bow - he is a fluent Norwegian speaker which might be handy as he tries to decipher what Jan and Óran talk about.   Marc has recently bought a Google Chromebook and he talks us through its capabilities when connecting a Braille display. Do you have a Chromebook, or are you considering purchasing one? Let us know at blindguyschat@gmail.com. Also, Óran asks the guys if they are finding the new “split Braille” option with JAWS and Braille displays useful? Speaking of Braille, Óran has joined the Braillists Book Club and is loving it. You can find out more about the Braillists Book Club here: https://www.braillists.org/testevents/book-club-143/   In TV Corner, Jan has gossip on a new Dutch version of 'The Crown'. Will it have juicy storylines? Maybe...   Clodagh has an email praising the last episode's guest host, and another all the way from Slovakia, apparently a listener there is using the podcast to learn English! Cool! …though it may lead to an odd balance of vocabulary on weather and assistive technology, and very little else. Be warned Bruno!   So, if you are looking for a moment of pure relaxation that's as smooth as a bar of Swiss chocolate; then look no further than your favourite podcast: Blind Guys Chat. 16 out of 20 Norwegians prefer it to the Norwegian language.   Links for this podcast: Braillists Book Club: https://www.braillists.org/testevents/book-club-143/ Support Blind Guys Chat by contributing to their tip jar: https://tips.pinecast.com/jar/blind-guys-chat

Serious Privacy
A Nordic Smörgåsbord - Live from NPA23 Part II

Serious Privacy

Play Episode Listen Later Oct 12, 2023 47:25


On 26 and 27 September 2023, Paul Breitbarth of Catawiki and Dr. K Royal attended for their first live podcast recording. But of course that was not the only recording they made during the Nordic Privacy Arena 2023. During the breaks and after the conference, K and Paul also interviewed some people, and those interviews you hear today. First up is Allan Frank, IT security specialist at the Danish Data Protection Agency, who talks about the Google Chromebook investigation. Next is Nils Ingdahl, the DPO for the Church of Norway. After that, you'll hear a recorded segment from Grumpy GDPR podcast colleague Rie Walle with her review of the conference, and we wrap up with Caroline Olstedt Carlström, the Chair of the Swedish Data Protection Forum. Dataministeriet PodcastGrumpy GDPR PodcastSwedish Data Protection Forum If you have comments or questions, find us on LinkedIn, Twitter @podcastprivacy @euroPaulB @heartofprivacy and email podcast@seriousprivacy.eu. Rate and Review us! Proudly sponsored by TrustArc. Learn more about the TRUSTe Data Privacy Framework verification. upcoming webinars.#heartofprivacy #europaulb #seriousprivacy #privacy #dataprotection #cybersecuritylaw #CPO #DPO #CISO

The Core Report
#112 Unemployment Rate In The Country Drops To 1-Year Low In September

The Core Report

Play Episode Listen Later Oct 3, 2023 31:31


On today's episode, financial journalist Govindraj Ethiraj talks to Vijay Setia, former President of the All India Rice Exporters Federation and also Chairman and Managing Director of Chaman Lal Setia Exports (makers of the well known Maharani Basmati Rice brand) as well as Siraj Hussain, former Agriculture Secretary to the Government of India and frequent columnist on agricultural and food production issues. SHOW NOTES00:00 Stories Of The Day00:50 Unemployment rate in the country drops to 1-year low in September.06:38 India's Rice Export Ban draws WTO ire, Indian exports are holding out.17:05 India swings between excess and scarcity on food produce, are there lessons from the past ?26:38 Google Chromebooks to be made in India by HP nowFor more of our coverage check out thecore.inInteract with us or ask us questions on TelegramSubscribe to our NewsletterFollow us on:Twitter | Instagram | Facebook | Linkedin | Youtube

Talk on Chromebook by HelenTech
週間Chromebookニュース 第10回目 - 2022年10月15日

Talk on Chromebook by HelenTech

Play Episode Listen Later Oct 15, 2022 9:50


今週の「Chromebook関連のニュース」は、新機種やゲームに関する話題を3つお届けしています。 Googleがクラウドゲーミング向けChromebookを3機種発表。まずはASUS、Lenovo、Acerから 「ASUS Chromebook Vibe CX55 Flip (CX5501)」が国内発売。144Hz対応ゲーミングモデル GeForce NOWがChromebookでも1600pと120fpsのストリーミングに対応 「ChromeOS for Steam」が Core i3とRyzen 3のChromebookに対応

Nick's Nerd News
Episode 231: I got a mushroom over heer!

Nick's Nerd News

Play Episode Listen Later Oct 13, 2022 62:18


Well we finally got to hear Chris Pratt's Mario, and uhhh, he may be from Brooklyn? Need for Speed is making a quick comeback, Doom has been ported to yet another device. Twitchcon leaves attendees with more then swag, Google ditches Stadia for gaming chromebooks, and META shifts the quest from work to play. Meanwhile HBO Max continues its DC output, while Discovery guts WB of everything else, Netflix in an ironic twist has a Blockbuster show coming, and Andor has its best yet. Marvel Delays Blade, and everything along with it.

EdTech Situation Room by @techsavvyteach & @wfryer
EdTechSR Ep 269 iPhone14 Satellite SOS

EdTech Situation Room by @techsavvyteach & @wfryer

Play Episode Listen Later Sep 8, 2022 65:15


Welcome to episode 269 (“iPhone14 Satellite SOS”) of the EdTech Situation Room from September 7, 2022, where technology news meets educational analysis. This week Jason Neiffer (@techsavvyteach) and Wesley Fryer (@wfryer) discussed news articles focusing on the September 2022 Apple Event, Google Chromebook news, privacy / surveillance issues, VR headsets for the US Army, media literacy, and cryptography. Our show was live streamed and archived simultaneously on YouTube Live as well as our Facebook Live page via StreamYard.com, and compressed to a smaller video version (about 100MB) on AmazonS3 using Handbrake software. Please follow us on Twitter @edtechSR for updates, and join us LIVE on Wednesday nights (normally) if you can at 10 pm Eastern / 9 pm Central / 8 pm Mountain / 7 pm Pacific or 3 am UTC. All shownotes are available on http://edtechSR.com/links. Stay savvy and safe!

Yerini Alanlar
#18 - Influencerlara Bu Cezalar Neden Geliyor?

Yerini Alanlar

Play Episode Listen Later Feb 11, 2022 32:49


Wash trading nedir, legal midir? NFT ile para nasıl aklanıyor? Amerika dijital dolar çıkarıyor. Paribu blockhain oluşturuyor. Zuckerberg Avrupa Birliği'ni tehdit ediyor. Meta'nın hisseleri piyasada %26 ‘lık bir düşüş yaşadı. Meta avatarlara "sanal sınır" getirdi. Yemek Sepeti hacklendikten sonra büyük bir ceza aldı. Verilerimiz nereye gidiyor? Influencerlara rekabet kurulu ceza kesiyor. Markalar influencerların içeriklerini inceliyor mu? Google ChromeBook satışları artıyor. Twitter beğenilmeyen tweetler için bir test çıkardı. Spotify Podcast yapan kişilere 100 milyon dolar yatırım yapacak.

Craig Peterson's Tech Talk
Did Your Computer Have "Intel Inside"? It Won't For long!

Craig Peterson's Tech Talk

Play Episode Listen Later Nov 29, 2021 85:08


Did Your Computer Have "Intel Inside"? It Won't For long! We're going to talk a little bit about shopping right now. Then we'll get into our chip crunch, and why Intel is being left on the side of the computer road. [Following is an automated transcript.] [00:00:16] There's lots of fun stuff to do. And it's kind of fun getting out of the house. Isn't it getting out, going out, going around? There's a, an outlet store close by where I live and it's kind of one of these outdoor. Outlet things. And it was fun. Just walking around, enjoying the little bit of fresh air, no matter what the weather has. [00:00:40] Uh, I even enjoy going up there when there's some snow on the ground. Because again, it's a little bit of a, uh, it's, it's fun. It's a little bit of a change, which is not. Part of what I love about living in the Northeast. You really get all four seasons and they can be really, really nice. Well, black Friday of course came and went. [00:01:01] It was not a bad black Friday, but one of the questions I been asked all week long, all month long, frankly, has to do. When should I buy, what should I buy? What are the deals? And it is weird this year. Let me tell you really weird. And the reason I say that is I didn't my show prep. And I spent some hours just looking on different websites and looking at opinion pieces, looking at news sources, just trying to find, okay, what's going on? [00:01:36] What's the real word out there. Our items, as rare as everybody seems to be saying they are, or is it easy enough to find. Well, that's what we're going to talk about right now. Really. We've had a very turbulent two years for retail, every branch of retail, whatever it is, it's been been terrible. So many people have lost their businesses. [00:02:03] So many small businesses, small retail restaurants, some restaurants that I, I enjoy and just haven't been to in years, really. Completely gone, which is such a crying shame. And a lot of people have put a lot of the blame for the general retail malaise on Amazon and Walmart. Because again, you know, I had a discussion just this last weekend with. [00:02:35] Oh, friend's father. And he was saying, well, you know, I've been a biologist in pharmacology for years. And, uh, you know, th this is just as just a science. It's all science talking about the lockdown. And so I pointed out how, well, let me see, let me see. I got family from Canada. They cannot drive across the border because of the lockdown, but in, in the states, they won't let us, us, we won't let them fly. [00:03:03] But they drive in, I should say, but they will let them fly in. How does that science, right. There's coronavirus not survive at 30,000 feet. Is that what it is? You know? No, come on. People it's politics and part of the politics was. Walmart got to stay open and all of these other small businesses couldn't so what are they supposed to do? [00:03:29] How are they supposed to compete? And yet, Hey, I understand you need clothes, right? And you need food. Most Walmarts have both. You might need medicine in order to even survive. So that kind of makes sense, but why. Walmart. Why did the government choose Walmart and target are going to survive all of you, little mom and pops stores, you know, that maybe have been multi-generational where it's your parents. [00:04:00] And maybe even your grandparents that started the store, started the restaurant. And now all of a sudden there's a lockout and you cannot be over. It just, it entirely political, entirely political. And I understand the science behind all of this. I have spent a lot of time studying it and you might remember if you've listened to me even. [00:04:26] Dean or 20 years ago, I'm trying to remember when it was, I started talking with scientists about RNI, RNA interference and the coolest stuff that was happening with African violets and getting the, the purple flowers to change to white and all of the stuff they were doing. It it's exciting. It's fun. But why. [00:04:49] Did we use politics here. And so many people lost their livelihood. So many people lost their businesses. It's, it's absolutely incredible. And just pain companies basically to stay closed. Uh, doesn't make sense either. Because now you're pumping more money into the economy and that's causing inflation because there are not more products or not more vendors. [00:05:15] There's not enough competition. So the prices go up. And when there's inflation, how about people who are retired, who have saved something. And now their money is worth what the inflation rates are. Again, it's a hidden tax, but it's really hard on retirees because their money that they've saved, you know, they're getting the pitons, you put it in a savings account and you're making a fraction of 1%. [00:05:43] And yet we're seeing inflation rates on things like fuel being almost a hundred percent. Think about what it was like in 2019, what the gas prices were. It is insane. So small businesses have to be supported. They are the backbone. They are the innovators. Walmart didn't start as a big company. They started very small. [00:06:10] He innovated his claim to fame. That old Sam Walton was let's go ahead and have the best prices and anywhere. Right. And so they got the best prices by beating up their suppliers, et cetera, but it all worked. And Walmart increased, raised its it's demonstrable again through real science, but they raise the standard of living in every community. [00:06:39] They opened a store. It's absolutely funneling. But Walmart stopped innovating a long time ago. Now again, the innovations come just like they do in the tech world. Typically not from the existing companies, right. Facebook isn't innovating, they bought WhatsApp, they bought so much of the technology they're using to drive their company. [00:07:02] Oculus. You look at it, right? That's their future. According to of course, uh, you know, Mr. Mark. What did it come from? What was the cost? Right. They by their competition. So I want to encourage everybody to really try and go out of your way, try and shop at these small places. There are. And so many of these malls nowadays kind of local stores where they've got together and they're running their co-op or where someone's managing a bind product from local craftsman, really that they, everything from these women that are knitting doilies all the way on out, through very cool black iron work things, things that you can find there. [00:07:54] That maybe you can find on Amazon, maybe they come from China. Maybe they're locally sourced. Not very likely, but it's been a very, very tough, tough time here for so many of these industries. One of the things that I did talk about this week, I, one of my radio appearances is. Tik TOK live shopping. If you haven't heard of tick tock, tick tock is this short form video site. [00:08:21] And it kind of started by people saying, okay, well with this song, uh, use that song to make a funny little 32nd. And 22nd and that's what people did. And it was really quite cool to see they there's some innovative people out there. Tick talk has a lot of, I share nowadays way more popular amongst the younger people than Facebook is Facebook has kind of become something for the older people. [00:08:49] But what tech talk is now doing is providing live shop. And this is an innovation that really started in China, which of course is where tick-tock is located. But in 2020, there was a survey done that found that two thirds of Chinese consumers said that they bought products via live stream in the past year. [00:09:13] So what's live stream. I want you to think about QVC online share or a television shop. Those channels, those infomercials that come on at night, but particularly the channels that are constantly selling stuff like micro did a little bit of that at one point in time, right? His interview was, he came in and the, he, the guy who was interviewing him, held up a pen. [00:09:37] Is that okay, you sell me this pencil. And so micro went on and on for 10 minutes or more just talking about the pencil and everything related to the pencil and what a great quality was. All he course, she didn't know anything about it. Right? And that's part of what bothers me about some of these things, right? [00:09:55] These people are just making stuff up, but talk live now is allowing you to go ahead and make funny little things. Gain an audience. Maybe they're not funny. Maybe they're just informative. Have them inserted into people's streams and then sell it right there. In fact, instant purchasing of a featured product during a live stream. [00:10:22] And then obviously audience participation, they got chat functions, reaction buttons. This is what's coming our way. And so all of you, small businesses out there, I really want to encourage you pay attention to social media. This is the sort of thing that you can do. You can target your local area, which is where most small businesses operate, right? [00:10:48] It's in, in your town. It's maybe a 10, 20 mile radius, depending on what, what you're doing, what you're selling. And you can micro target nowadays. That's the joy. That's the beauty of the online world. Micro-targeting Hey, and if you're interested, let me know. We can talk a lot more about this because I have studied this for years now. [00:11:12] Hey, stick around Craig peterson.com online. [00:11:20] So while you're shopping online, what are some of the things you should do or look out for? I've got a few ideas. I'm going to tell you what I do, and it has worked wonders for me. So here we go. [00:11:35] When you're shopping online, there are some obvious tips, just run through them very, very quickly because I don't, I think you guys being the best and the brightest really know these things. [00:11:50] So just very quickly, make sure your security. Today, make sure that everything is patched up the way that it should be, that you have some really great anti-malware hopefully advanced anti-malware, but apply any updates before you start doing shopping, because this is a bad time of year to lose all of your personal information and to have your money stolen. [00:12:18] Uh, number two. If you're seeing an email or you're seeing a deal that really looks too good to be true. Take, take caution here. Right? Do you see a place? Oh, I got five brand new Sony PlayStation fives for sale. You might not want. To buy those, right? The minister, Jeff Foxworthy. Here's your sign. So be careful about that. [00:12:46] Criminals are really taking advantage of consumers who, uh, you know, life's been tough, money's been tight. You're trying to find a deal. So be careful about that. Okay. Coupons or other way, the bad guys have been trying to get consumers. To compromise their own cyber security. Okay. Uh, 12% of emails out there are considered to be spam emails. [00:13:15] I think it's more like 80% or 90%, but then I've had the same email address for 30 years. Okay. Uh, so don't click on link. Be sure you shop on the real website and apply coupons there by manually typing out the code. So for instance, if, if let's say you use duck, duck, go for your search engine, which you should be using for most cases, most searches a duck duck go says, okay, let me see where coupons here you go. [00:13:46] Here's a site that has a lot of coupons be careful about those sites, because some of them are trying to lure you in. Are the websites you're going to the real ones, the legit one. Are you clicking a link in your email in order to get to that sale site? Double check, because what they're doing is using some of these URLs that aren't. [00:14:14] Right. And we see those all of the time. They'll have a misspelling of the business name or they'll, they'll do something else. So they might have Amazon Dodd bad guys.com. Oh, okay. Amazon. Okay. Is Amazon, uh, obviously they wouldn't say bad guys, but yeah. That's kind of what they're doing. So be careful. So once you're on a website, look for that little padlock that's to the side, click on it and double. [00:14:43] To make sure that it is legit because they might have us. What's called a secure, sir. And they might have a certificate that's valid for the site that you just went to, but it's not, there's a different kit for Amazon or Walmart or target or w you know, whatever Joe's clothing.com. It might be something entirely different. [00:15:07] So be careful, okay. Is what you're looking at on the ad. Because there are a lot of fake advertisements out there that looked like they got great deals. And even though black Friday has come and gone, they're going to continue to do this through the end of the year and be on. Okay. So rather than clicking on the ad, just type in the retailer. [00:15:35] Information, because some of these ads that are showing up are in fact, almost every last one of them is coming from what's called an ad network. So that ad network is where people go and buy ads and they say, Hey, I want to retarget people that were at this site or clicked on this link, et cetera, et cetera. [00:15:54] And now. If you are a bad guy, all you have to do is sneak into one of those big ad networks. And all of a sudden your bad guy ads are showing up everywhere. So you see a great ad for a Chromebook. For instance, we've talked about those before you can just go ahead. Okay. Chromebook. No problem. Wow. Yeah. [00:16:14] Yeah. Type it in. If the ads for a Chromebook from Walmart, just type in walmart.com. Okay. Avoid clicking on ads. Isn't it terrible how bad it's gotten, man. I liked the internet better back in the 1980s and nineties. Uh, how should you pay? We're going to talk about that in a minute. Public why fi is a potential problem. [00:16:40] The bad guys will often create fake hot spots and you are now using their hot spot. Now this isn't as much of a problem as a used to be because your visits to most websites nowadays are encrypted. Do you remember that lock? I mentioned in the URL. Well, that means it is using SSL or TLS, which is a secure communications pro protocol. [00:17:07] So if you're seeing that, you know that you basically have a VPN, you don't have to buy a VPM service. You don't have to use a VPN service. You have a VPN that's being provided by the website, your. And that's really what that lock means. So the public wifi is less of an issue for the monitoring, what you're doing, although yeah, they can still do some monitoring. [00:17:33] They might play with DNS and things, but they can also scan you, which is the biggest problem from my perspective about using public wifi and never. Share your personal data. If you can avoid it, one of the things we're going to be covering in the upcoming boot camps and workshops is using fake or alternate email addresses. [00:17:57] I do it all of the time. That's why I have 3000, 3000. Yes. You heard it right different log-ins right now in use active use on. Uh, in my password manager, at least over the last decade. So I've accumulated a lot of them. So I use a different email address pretty much all of the time. And I'll, I explain how to do that in the boot camps and workshops that are coming up. [00:18:25] So keep an eye on. On my weekly emails again, Craig peterson.com/subscribe. So you can find out about them, you know, these, the free ones. I really want to give you guys all of the basics, right? So that's what I'm going to be doing anyways. How should I pay? This is maybe the even bigger side of things. It is very, very rare that I actually put my credit card number in on a website at least. [00:18:54] Real credit card number. There's a number of options that are available to you now that weren't before, even if it's not a credit card, even if it's a debit card and generically, this is known as single use credit cards. So we've got a few things. I use typically capital one's email E N O. If you have a capital one card of any sort, this is a little browser plugin that you can put on. [00:19:25] Now, the downside of this is they will by default, try and look. Every web page you visit. So from their perspective, it's worth it because now they get that data from you. However, in all modern browsers, you can restrict when it runs. But what happens is I go to a website, it wants a credit card and I can pop up that little Eno browser plugin. [00:19:53] And now. Todd, uh, I can generate a virtual credit card number that's tied in behind the scenes to my real credit card number. I can even put an expiration date on that credit card number. So it can't be used after a certain. Some of these virtual credit card options, even allow you to say, Hey, it really is only single use. [00:20:18] It can only ever be used once. And that way the bad guys can't run up your credit card. Bill Citibank, American express, JP Morgan, and the more have these types of options and basically any visa or MasterCard. Look for virtual credit cards. From your bank or whoever's providing your credit card. Hey, stick around. [00:20:42] You're listening to Craig Peterson and I'll be right back. [00:20:46] We're going to talk a little bit now, since it's getting near the end of the year, about what kind of technology do we think is going to be big next year. And I've got to mention this project. My daughter has been working on it. Finally hit the ocean. [00:21:02] My daughter has been busy. You might know she's been in the maritime industry for quite a while now. [00:21:11] And a man, she went to, she graduated 2008. I think it was this, this daughter. And you probably already know I have five daughters, right? Uh, three sons too. So it was kind of a mix, but she has been working on a ship called the Yarra Burkland it's over in Norway. And what the ship is doing here is hauling fertilizer, anything. [00:21:38] Oh, wow. Isn't that exciting? Wow. Craig, I'm so excited for you. Well, it is the world's first autonomous electric ship period. Okay, cargo ship and what it is doing ultimately, is it to eliminating the need for about 40,000 truck round trips a year. See what's happening over there in Norway is there's a factory that's right. [00:22:07] Located right next to a mine. That's making all of this fertilizer and it needs to be hauled down through some fjords. To get to the main shipping Depot where it can be loaded onto the big ocean ship. So these trucks are going up and over the mountains alongside the fjords. And this is a ship that's going to take a trip that's about seven and a half nautical mile. [00:22:34] So give or take eight miles and on the water. And now Norway is doing this in its own waterways. So there's no problem with international rules and regulations about ships here. This is just local and it loads itself. It drives itself and it unloads itself. I think that's really, really cool. And what it does is it plugs itself. [00:23:02] When it is on either port w now we've seen this with some ships, right? You might've been on some of these ferries that are electric. They work pretty well for electric ferries. Cause they're usually short haul. They connect up to shore power and they do a rapid charge and they're ready for. The next leg of their ship while they are busy taking all of their load in right. [00:23:26] Makes sense. And you might've done it, but this is, this is different. And a lot of the incidents that happen in shipping are due to human error. Think about all of the problems we've had with Navy ships, even running into things, human error, and a lot of that's due to fatigue. On the ships. I don't know if you know it. [00:23:47] I have two kids that, well, three actually that have been in the maritime industry, uh, the, the big maritime industry and they take four hour shifts. So four on four off four on four off every day. So fatigue is a very big deal for a lot of the shipping industry. And for the first few years, they're planning on having the ship be. [00:24:15] They're going to be up, of course, on the bridge monitoring everything, because you've got a problem with artificial intelligence machine learning. If a big ship is coming along and there's a kayak in the way, it's actually the kayaks job to get out of the way. But if you run over a kayaker things, aren't going to go very well for you, frankly. [00:24:37] But how does a computer recognize a kayak? Maybe Marine life or even some sort of a swell that's out there. So they think they've got most of this solved. And this is the project that my daughter's been working on for a few years here. She's a Mariner. She has her captain's license unlimited. Tonnage unlimited vessels on unlimited waterways anywhere in the world is just incredible. [00:25:06] All of the stuff she's done. So the wheelhouse could disappear all together, but they've got to make sure that everything is working pretty darn well. Okay. Uh, large vessels. Do anything about the kayak? All they can do is warn, but they definitely can't maneuver. And that's why the deep draft vessels have priority over sailboats or pretty much anything else that's out there. [00:25:32] But, and what that brings up is the fact that we don't have the regulations yet for these autonomous ship. Well, we don't have the regulations yet for the autonomous cars, right? This is normal. The technology tends to proceed the regulations, and we have regulations in place right now for autonomous vehicles in certain areas. [00:25:57] But they're nowhere near mature. It's going to take a while before everything has all frigging. And now that is leading us into our friends at Ford. Ford's done a couple of interesting announcements over the last couple of weeks. So I have to bring the. And an effort really to deal with this ongoing chip shortage. [00:26:21] Ford has made a deal with global founders. Global foundries is a chip maker and they have a non-binding agreement. Now that makes it interesting. If it's non-binding. Why even bother, but the press release says opening the door for global foundries to deliver more chips to Ford in the short term. But what's happening right now because of the chip shortages. [00:26:50] Well, companies are designing their own. Purpose built chips rather than relying on the general purpose chips made by Intel or AMD Qualcomm, Samsung and video media tech, depending on what kind of chips we're talking about. This is fascinating because it is hurting Intel. No question about it. And AMD. So what does Intel done? [00:27:15] Intel is moving its stance to being more of a contracted chip manufacturer. So you can go to Intel and say, here's my chip design. Go ahead and make that for us. And off they'll go and they will manufacture it and they probably even help you with some of the design things. Fascinating. Now, the other thing that's been happening for a while is if you look at apple, for instance, they have been using their own chips in their I phones and eye pads. [00:27:52] Now they also are using their own chips in the laptops and various desktop computers. So apple is the highest profile example I can think of offhand. That have replaced Intel's chips. That's absolutely amazing. Google has also created its own chip for the latest pixel phone. So if you buy the latest flagship pixel, which I would not do, because this is the first time they're really using their own chip, but they've got their own chip now. [00:28:28] Amazon has been deploying its own chips in its internal servers to improve performance as well as to make it better for the Alexa voice assistant. You see how long tail that's a marketing term, but really how special purpose purpose designed purpose built chips are. So it's huge. Intel's changing course. [00:28:55] They've never been a great chip designer. If he asked me and a few know my history, you know, I've been down at the chip level. I was down there for many years in the kernel of operating systems and dealing directly with all. From chips, you know, when you're thinking about drivers and the low end and the operating system, that's what I did for a lot of years. [00:29:18] So I'm, I'm glad to see this happen. It's going to be better for you because the devices can be cheaper because they don't use a general purpose chip. The chip is built and designed. For what it's being used for. So good news there for four, because Ford is going to be kind of doing the same sort of thing. [00:29:39] I bet mark my words. Okay. Well, I didn't get to the predictions for this year, but I will, when we get back this upcoming year, stick around, of course you listening to Craig, Peter Sohn, you can get all kinds of information. And in fact, if you sign up for my email list, which is not a heavy marketing. [00:30:02] Believe me, you'll get a bunch of different special reports. So ones I think are going to help you out the most. Craig peterson.com. [00:30:13] Well, we just talked about the future when it comes to chips and our computers, we're going to continue that discuss discussion right now on artificial intelligence and machine learning. What else is going to be important next? [00:30:29] So, what is the future? [00:30:31] We're getting close to, you know, the end of the year and the beginning of the year. So what am I looking forward to? Well, you just got my basic predictions about what's going to happen with chip manufacturing. These various vendors of various devices are going to continue to move away from Intel AMD, et cetera, these general purpose chips and move more to special purpose chips. [00:31:02] Now there's a number of special purpose type designs that have been out there for a very long time. For instance, a six OCB in industry. No, those I programmed some way back when. I have gotten much more complicated, but for instance, when we're putting in systems for a business, we will typically use Cisco systems that have a basics so that everything is extremely fast. [00:31:29] You don't notice any delay and yet it can do very heavy duty filtering. Packet examination, stream examination, because it's being done in hardware. That's the advantage to it. So we're going to see more and more that since Apple's already moved to their own chips, Google has already moved to their own chips, Amazon, their own chips, et cetera. [00:31:53] And there'll always be a need for general purpose chips. In fact, you can say that the apple chips for instance, are fairly. The purpose they're being used in your iOS devices, your iPhone, your iPad, but they're also being used in desktop applications. But if you look more closely at what Apple's done, it has a couple of different types. [00:32:16] Of CPU's inside the chip. So it has the high-performance CPU's that are only engaged when it needs some serious computing going on. It has the low power, lower performance CPU's that are also built into that same chip that now handle kind of background tasks, things. Dated the don't need a whole lot of CPU or don't need to be really fast. [00:32:42] And then it also has graphics processing units that will handle things like screen updates, moving stuff around on the screens. There is a lot of technology in that chip in reality, it's it would use to take three. Completely different sets of chips to do what the one apple chip can do. So it is an example of a special purpose CPU. [00:33:11] We're going to be seeing more and more of those now as a consumer, you're not really going to notice other than, wow, this thing's fast or wow. This battery lasts forever. You're going to have some great, great functionality. And I think we are seeing, because they're spinning. $2 billion a week right now in the industry, you're going to be seeing more of these fabs come online, chip fabrication plants, and they take a long time to build and put up online, but they're going to be making more specialized chips, which I really. [00:33:46] Well, there's an article that came out based on a survey from the I Tripoli. And this is called the impact of technology in 2022. And beyond of these are some global technology leaders. Of course I Tripoli was all about electrical engineering back in the day today, it's more about general technology. But here's the results. [00:34:12] What is important for next year? Now, remember, I don't give investment advice. So don't look at this as things you should be putting your money into. This is just stuff that is good to know and probably should be considered, but this is not again, investment advice. So. Technologies will be the most important in 2022. [00:34:33] While according to this kind of little, little brain trust, if you will, amongst the respondents more than one in five, say that AI and machine learning are going to be very important. What's the difference between artificial intelligence and machine learning. Uh, the lines are blurred nowadays. They used to be a lot more clear machine learning used to be the, the machine, the computer learns it. [00:35:02] Let's say it's working on a factory floor and it has to do some welding on a joint. And the, it has sensors and it learns, oh, okay. Well, this part, when it comes into me may be here, but I might be there and I might be here. So I got to kind of move around a little bit. That's basic machine. Artificial intelligence, which I think is a super set of machine learning, but other people argue the other way, but you know, they don't know what they're talking about. [00:35:30] There is artificial intelligence is where it doesn't even have to be taught how to learn. It. Just figures things out. So it's. When it's built, talk to learn where that piece that it needs to weld is likely going to be and how to find it. It just knows. Okay, well, I'm supposed to weld. So how do I do that? [00:35:56] That's much more of an artificial intelligence. So that's number one, artificial intelligence next. Cloud computing 20%. Now my opinion on cloud computing is not very high, frankly, because cloud is just the name for somebody else's computer cloud computing does not mean it's safer. It does not mean that it requires less work on your part where I think cloud computing can help a business is where. [00:36:30] Push over flow to the cloud. The many businesses that have moved technology to the cloud have moved it back now because frankly, the cloud did not provide them with what they thought they'd get, which is cheaper, better computing. And a lot of the breaches that we're getting nowadays are in the cloud. [00:36:53] People's databases being exposed, applications, being exposed. It's great for hackers because they know. Okay, well, let me see. Amazon has the majority of all cloud computing in the world, so let's just scan Amazon computers and see what we can find. Right. And they're going to find that this bank has this opener, that company has that database available, et cetera, et cetera. [00:37:17] So be careful with that, but they think cloud's number two, five G. 17% that I am very excited about it. And here's why five G is kind of a generic term for the high speed, uh, room wireless data. So think cell phone basically, but why it really matters is it's designed to handle billions of devices. So that you can have a lot of people sharing data and getting to data, sharing a network connection in a densely populated area. [00:37:58] That's where it really, really shined. And then it also has a faster data rate than the older technology. One of the things you'll find as you compare, if you really dig into the technology compare, the various cell companies is that for instance, T mobile, which is who I use has a lower frequency spectrum. [00:38:24] Lower frequencies can not carry as much data for, but what they can do, I'm really oversimplifying. But what they can do is more readily peers, glass, and brick and walls. So T-Mobile's frequencies are lower than Verizon, for instance. So Verizon can get you faster data. But can't get it into as many places and not as well as T-Mobile just really putting this quite simply. [00:38:57] And in fact, just what was it? Two weeks ago, we had a court order stopping the deployment of these higher frequency, 5g networks. Because of complaints from some people, uh, particularly in the avionics, in the airline industry where they're saying, well, they could be squashing some of our critical systems because they're using some of the old satellite frequencies for 5g up in the upper bands. [00:39:25] Anyhow, one of the things that 5g. Which has already been used for is what I was involved with. You know, I was involved with emergency medicine for a long time and I was an EMT I P D uh, back in the day. So almost a paramedic. And think about what could happen now, you're in the back of an ambulance that you could be the hands for the doctor who can be seeing the patient as you're driving down the highway, bringing that person in, because historically I remember this one woman. [00:40:01] Placenta previa and had just soaked through some towels with blood. She was in really bad shape and we were squeezing IVs to get fluid into her. It was, it was incredible. It was something else. And we brought her right in on the gurney, in emergency room and right up to the operating room and put her on the table, right from her ambulance gurney while with five G. [00:40:27] They can be doing that now, not just in an ambulance, but in, in more rural areas, doctors can be operating remotely on someone. It's very cool. This whole tele medicine, including remote surgery. It's huge. So these technology leaders agreed with me on that 24% is the number one, most benefit four or five G telemedicine. [00:40:53] Number two, remote learning and education 20%. Personal and professional day-to-day communications. Think of all of the stuff we're doing now, how much better that's going to get entertainment, sports, live streaming, manufacturing, and assembly transportation, traffic control. Now we're down to 7% and by the way, that's where the cars are talking to each other. [00:41:16] If you have five G. You don't need a mesh because you can use 5g, carbon footprint reduction in energy efficiency. That's 5% and 2% farming and agriculture. Our farming equipment is already using GPS in order to plow fields, planned fields, harvest fields. It's amazing. So there you go. Those are the top pieces of technology that are predicted to influence us next year. [00:41:46] I think it's absolutely correct. And I've got to give you a bit of good news here again. 97% of these people polled agree that their teams are working more closely than ever before. Because of these working from home workplace technologies and apps for office check-in, et cetera. Good news. All around. [00:42:11] Hey, if you want more good news. If you want to know what's happening, even some bad news, I got the right place for you to go. I have five minute little trainings in my emails every week. I have bootcamps again, all of this is the freeze stuff. You imagine what the paid stuff is like, but I want you to understand this. [00:42:32] Okay. Craig, peter.com/subscribe. Do it right now. [00:42:39] I had a good friend this week that had his life's work stolen from him. Yeah. And you know what caused it? It was his passwords. Now, you know what you're supposed to be doing? I'm going to tell you exactly what to do right now. [00:42:55] Well, let's get right down to the whole problem with passwords. [00:43:00] I'm going to tell you a little bit about my friend this week. He has been building a business for. Maybe going on 10 years now, and this business relies on advertising. Most businesses do so in some way, we need to have new customers. There's always some attrition there's customers that go away. So how do we keep them? [00:43:25] Well, we do what we can. How do we get new customers? Well, for him, it was. Advertising, primarily on Facebook. He did some Google ads as well, but Facebook is really where he was focused. So how did he do all of that? Here's the bottom line. You have to, if you are going to be advertising on Facebook, you have to have an advertising account. [00:43:51] Same thing's true with Google. And then on that account, you tie in either your bank account or your credit card. I recommend a credit card so that those transactions can be backed up. And on top of all of that now, of course you have to use a pixel. So the way the tracking works is there are pixels on websites, you know, about those already. [00:44:17] And the bottom line with the pixels. Those are also. Cookie's about the pixels are used to set a cookie so that Facebook knows what sites you've gone to. So he uses those. I use those. In fact, if you go to my website, I have a Facebook pixel, the get set. And the reason for all of that is so that we know with. [00:44:39] I'd be interested in something on the site. So I know that there's a lot of people that are interested in this page or that page. And so I could, I have not ever, but I could now do some advertising and I could send ads to you so that if you were looking at something particular, you'd see ads that were related to that, which is what I've always said. [00:45:04] Is the right way to go. If I'm looking to buy a pickup truck, I love to see ads for different pickup trucks, but if I don't want a car or truck, I don't want to see the ads. Right. It isn't like TV where it seems sometimes every other ad is about. Car or a pickup truck. It drives me kinda crazy because it's a waste of their money in advertising to me because I don't want those things. [00:45:33] And it's also not only just annoying in money wasting. There are better ways to do targeting. And that's what the whole online thing is. Anyways, I told you about that because he had set up this pixel years ago. Basically the Facebook pixel gets to know you gets to know. All of the people who like you, that might've bought from you. [00:45:58] Cause you can have that pixel track people through your site, your purchase site, they know what you purchase on the shopping cart, et cetera. And you can identify these people over on Facebooks and them ads because they abandoned the cart or whatever it is you want to do there. There's just a whole ton of stuff that you can do for these people. [00:46:19] And it's so bad. It is so valuable. It takes years to build up that account years to put that pixel in place. And our friend here, he had done exactly that. Then he found that his account had been compromised. And that is a very bad thing in this case because the bad guy used his account to place ads. Now there's really two or three problems here. [00:46:52] We'll talk about one of them is. Why was the bad guy going after him? Well, he has been running ads on Facebook for a long time. So as far as Facebook is concerned, his account is credible. All of the ads he runs don't have to be reviewed by a human being. They can, can go up almost immediate. He doesn't have to wait days for some of these things to go up. [00:47:21] So our bad guy can get an account like his, that has years worth of advertising credibility, and now start advertising things that are not correct. So there again is part of the value of having one of these older accounts for advertising. And so the bad guy did that use his credibility. And then secondly, he used 25 grand worth of my friend's money to run ads. [00:47:51] Also of course, very bad, very, very bad. So I sat down with him. In fact, it was this last week and I was out on a trip with just kind of a vacation trip. It was absolutely wonderful. You know, I, I never just do vacation. Right. It's always business plus work whenever I do anything like this, but I was on. [00:48:11] Trip last week. And so my eldest son who works closely with me, and he's also part of the FBI InfraGuard program. I had him reach out to my friend and they, he helped them out and they talked back and forth. Here's the problem that he has. And I'm trying to figure out a really good way to solve this. And I haven't figured that out yet. [00:48:35] And you know, if you guys have an idea because you are the best and brightest, you really are. Go ahead and drop me an email me@craigpeterson.com if you know, a good way around this particular problem, which is he has. This Facebook could count as well as many other accounts, including his website, hosting account, his email account, et cetera. [00:48:57] And. Uh, he has people who manage his ads for him who manages website for him, who put up some of the promotions for him, you know, the advertising and everything else. So these are third-party. This is what we generically call a supply chain, risk people who are not him have access to his stuff, his private stuff. [00:49:24] And, well, how does he do it or how did he do it? Is he went ahead and gave them. Access by giving them accounts or passwords. How well were they guarding their passwords and their accounts? So the first thing I had my friend do was go to have I been poned.com. You'll find that online at have HIV. E I been. [00:49:50] Poem dispelled PW, N E d.com. So I took him to have I been poned and I had him put in his email address, the one he uses the most and it showed up in five different. Hacks data dumps. So these are five different sites where he had used that same email address in this case. And he found out that in those five cases, the bad guy's got his passwords and personal information. [00:50:21] All bad. Right. And he went ahead and cleaned it up. So I said, well, put in the password because have I been, poned also let you check your password, just see if it has been used by someone else and then stolen. So there are billions of passwords in this database. It's incredibly. Of all of these known passwords. [00:50:44] So he put in his password and no it had not been stolen, but the problem is how about the people that were managing his ads on Facebook and managing his Facebook ad. We're the usernames, which are typically the email addresses and the passwords kept securely. That's a supply chain thing I'm talking about, and that's where I I'd love to get him. [00:51:12] But from you guys, me@craigpeterson.com. If you think you have a good answer, What we've been doing. And our advice to him was use one password. That's the only one to use. I don't trust the last pass anymore. After their last big hack where they got hacked, uh, one password, the digit one password. And go ahead. [00:51:33] And set it up. And in a business scenario, you can have multiple vaults. So have a vault. That's just for people that are dealing with your Facebook ad account, maybe have another vault for people who are posting for you on Facebook. Or better yet when it comes to Facebook, go ahead and have an intermediary that is trusted, uh, kind of like the, if this, then that, or there's a few of them out there that can see that you put the post up on the website and automatically posted on Facebook. [00:52:09] So you don't have to get. All of these people, your passwords, but again, it's up to you. You got to kind of figure out if that makes sense to you that those are the types of things that I think you can do. And that is what we do as well. Now, one of the beauties of using one password like that, where you're not sharing all of your passwords to everything you're sharing, the minimum amount of login information that you possibly can share is that if they leave your employees, All you have to do is remove their access to the appropriate vault or volts, or maybe all of your volts. [00:52:49] And this is what I've done with people that worked for me in the U S and people would work for me overseas and there have been a lot of them and it has worked quite well for me. So with one pass, We can enforce password integrity. We can make sure the passwords on stolen. One password ties automatically into have I been postponed. [00:53:12] So, you know, if a password has been exposed, if it's been stolen online, it's a great way to go. Now I've got an offer for you guys who are listening. I have a special report that I've sold before on passwords, and it goes through talks about one password. He talks about last pass, which I'm no longer really recommending, but give some comparisons and how you can use these things. [00:53:35] Make sure you go and email me right now. Me, M e@craigpetersohn.com. That's Emmy at Craig Peter Sohn, S O. Dot com and just ask me for the password special report, and I'll be glad to get that on off to you. There is a lot of good detail in there and helps you, whether you're a home user or a business. [00:54:02] So the next step in your security is multi-factor authentication. Interesting study out saying that about 75% of people say that they've used it for work or for business, but the hard numbers, I don't think the. [00:54:18] One of the things that you have to do is use good passwords. And the best way to do that is to use a password manager. [00:54:27] I was talking about a friend of mine who had been hacked this last week and his account was hacked. His Facebook ad account was hacked. We asked him if we could reach out to. BI and he said, sure. So we checked with the FBI and they're looking to turn this into a case, a real case, because they've never seen this type of thing, the hijacking of an advertising account who hijacked it. [00:54:56] And why did they hide jacket? Was this in preparation maybe for. Playing around with manipulating our next election cycle coming up. There could be a lot of things that they're planning on doing and taking over my friend's account would be a great way to have done it. So maybe they're going to do other things here. [00:55:15] And our friends at the FBI are looking into it. How now do you also keep your data safe? Uh, easily simply. Well, when we're talking about these types of accounts, the thing to look at is known as two factor authentication or multifactor authentication. You see my friend, if he had been using multi-factor authentication. [00:55:42] I would not have been vulnerable. Even if the bad guys had his username, email address and his password, they still would not be able to log in without having that little six digit code. That's the best way to do multi-factor authentication. When we're talking about this code, whether it's four or 5, 6, 8 digits long, we should not be using our cell phones to receive those. [00:56:16] At least not as text messages, those have a problem because our phone numbers can be stolen from us and they are stolen from us. So if we're a real target, in other words, they're going after you. Joe Smith and they know you have some, $2 million in your account. So they're going after you while they can, in most cases take control of your phone. [00:56:45] Now you might not know it and it doesn't have to be hacked. All they have to do is have the phone company move your phone number to a new phone. Once. So that means one of the things you need to do is contact your telephone vendor, whoever it is, who's providing new that service. That's a company like Verizon sprint T-Mobile, uh, a T and T one of those companies that are giving you cell service, you have to contact them and set up a pass. [00:57:15] So that if they have a phone call coming in and that phone call can be faked. So it looks like it's coming from your phone, even if there was a phone call coming in, whether it's coming from your phone or not, they have to get that password or pass code that you gave them. And once they have that pass code now, Right. [00:57:37] Uh, and that's great, but if you don't have that in there targeting you specifically, then you're in trouble. So for many of us really, it, it may not make a huge difference. Uh, but I would do it anyways. I have done it with every one of my cell phone carriers now. A couple of decades set up a password. So the next step is this multifactor authentication. [00:58:03] If I'm not supposed to get it via text message to my phone, how do I get it? Well, there are a couple of apps out there. There's a free one called Google authentic. And Google authenticator runs on your phone. And once it's there on your phone and you are setting it up on a website, so Facebook, for instance, your bank, most websites out there, the bigger ones, all you have to do is say, I want to set up multi-factor authentication, and then it'll ask you a case. [00:58:34] So how do you want to do it? And you can say, I want an app and they will display. A Q R code. That's one of those square codes with a bunch of little lines inside of it. You're seeing QR codes before they become very common. And you take your phone with the Google authenticator app. Take a picture. Of that little QR code on the screen, and now it will start sinking up so that every 30 seconds Google authenticator on your phone will change that number. [00:59:08] So when you need to log back into that website, it's going to ask you for the code. You just pull up Google authenticator and there's the code. So that's the free way to do it. And not necessarily the easiest way to. Again, going back to one password. I use this thing exclusively. It is phenomenal for keeping my passwords, keeping them all straight and then encrypted vault, actually in multiple encrypted vault it's so that I can share some of them. [00:59:37] Some of them are just strictly private, but it also has that same authenticator functionality built right into it. Microsoft has its own authenticator, but you can tell Microsoft that you want to use the standard authenticator. Of course, Microsoft has to do everything differently. Right. But you can tell it. [01:00:00] And I do tell it, I want to use a regular authenticator app, not Microsoft authentication. By the way. That's why I advise you to do don't use the Microsoft authenticator, just use one authenticator for all of the site, and then Microsoft will give you that same QR code. And then you can take that picture and you're off and running. [01:00:20] Next time you log in, it asks you for the code and instead of texting it to you to your phone smarter, otherwise it will not. That require you to open up your authenticator. So for me, for instance, when I'm logging into a website, it comes up and asks for the username, asked for the password. Both of those are filled out automatically by one password for me. [01:00:44] And then it asks for that code, uh, indication code and. One password automatically puts it into my pace to buffer copy paste, buffer, and I just paste it in and they they've got the code. So I don't have to remember the codes. I don't remember passwords. I don't have to remember usernames or email addresses. [01:01:05] One password remembers them all for me. Plus it'll remember notes and other things. So you can tell, I really like one password. We use it with all of our clients. That's what we have for them. And it does meet even a lot of these DOD requirement on top of. Depending again, how much security you need. We will use duo D U O and it also has this authenticator functionality and we will also use UBI keys. [01:01:37] These are those hardware key. They do oh, can provide you with hardware tokens. Those are those little tokens that can go onto your key ring. That show a changing six digit number every 30 seconds. And that's the same number that would be there in your smartphone app. Your one password or Google authenticator smartphone. [01:01:59] Hopefully, I didn't confuse you too much. I think most of the reason we're not using the security we should is because we're not sure how to, and we don't know what we're going to be. And I can see that being a big problem. So if you have questions about any of this, if you would like a copy of my password security, special report, just send an email to me. [01:02:25] M e@craigpetersohn.com. That's me M e@craigpeterson.com. That's S O n.com. I'll be glad to send it to you. Also, if you sign up for my newsletter there on my website@craigpeterson.com, you are going to get. I was hold little series of these special reports to help you out, get you going. And then every week I send out a little bit of training and all of my articles for the week. [01:02:56] It's usually six to 10 articles that I consider to be important so that, you know, what's going on in the cybersecurity world. So you can. With it for yourself, for your family, for your business. Craig peterson.com. Stick around everybody. We'll be right back again. Craig peterson.com. . [01:03:20] According to researchers. 32% of teen girls said that when they felt bad about their bodies, Instagram made them feel worse. And you know what Facebook knew and knows Instagram is toxic for teen girls. [01:03:37] There's a great article that came out in the wall street journal. [01:03:40] And I'm going to read just a little bit here from some of the quotes first. When I went on Instagram, all I saw were images of chiseled bodies, perfect. Abs and women doing 100 burpees in 10 minutes, said, Ms. Uh, now 18, who lives in Western Virginia. Amazing. Isn't it. The one that I opened now with 32% of teen girls said that when they felt bad about their bodies, Instagram, I made them feel worse. [01:04:12] So that is some studies again, that looks like, um, yeah, these were researchers inside Instagram and they said this in a March, 2020 slide presentation that was posted to Facebook's internal message board that was reviewed by the wall street journal quote comparisons on Instagram can change how young women view and describe themselves. [01:04:38] Apparently for the past three years, Facebook has been conducting studies into how Instagram is affecting its millions of young users. Now, for those of you who don't know what Instagram is, it allows these users to create little stories, to have. Pictures videos of things that they're doing, and it it's a lifestyle type thing you might've heard of course, of how this, this, uh, I don't know what it is. [01:05:09] Kidnapping murder plot. These, this young couple and the body I think was found up in Wyoming. Uh, I'm trying to remember, but, uh, of her and it's yeah, there it is. It wasn't my OMI. And I'm looking up right now, Gabby potato. That's who it is. She was what they called a micro influence. And I know a lot of people who can loom, that's what they want to be. [01:05:37] There's a, a young lady that stayed with us for a few months. She had no other place to live. And so we invited her in here and, uh, we got some interesting stories to tell about that experience. And it's, you know, a little, a little sad, but anyhow, she got back up on her feet and then she decided she was going to become an influence. [01:06:01] And what an influencer is, is someone that has a lot of followers. And of course, a lot means different numbers. You get these massive influencers that have tens of millions of people that quote, follow unquote them. And of course, just think of the Kardashians they're famous for. Being famous, nothing else. [01:06:23] Right. Uh, they have subsequently done some pretty amazing things. At least a few of them have. And we've got one of those daughters who now was the first earliest billionaire, I think it was ever youngest. So they have accomplished some amazing things after the fact, but they got started. By just becoming famous by posting on these social media sites. [01:06:48] So you get a micro influencer, like Gabby Petito, who is out there posting things and pictures. And you look at all of these pictures and, oh my gosh, they're up at this national park. Oh, isn't she so cute. Oh, look at her boyfriend. They'll look so good together. And people. Fall for that image, right? It's just like Photoshopping these pictures of models, changing them. [01:07:16] There've been some real complaints about those over the years. So Instagram sets these kids up with these pictures of people that are just totally unrealistic. One of the slides from a 2019 presentation says, quote, we make body. Excuse me. We make body image issues worse for one in three teenage girls teams, blame Instagram for increases in the rate of anxiety. [01:07:49] And depression said another slide. This reaction was unprompted and consistent across. Groups among teens is this according to the wall street journal who reported suicidal thoughts, 13% of British users, and 6% of American users trace the desire to kill themselves to Instagram. Again, according to one of these presentations, isn't this just absolutely amazing. [01:08:18] And you might've heard it discussed a little bit. I saw some articles about it, obviously in the news wall street journal had it, but this is a $100 billion company, Instagram. That's what their annual revenues. More than 40% of Instagram users are 22 years old and younger. And about 22 million teens log into Instagram in the U S each day, compared with 5 million that log into Facebook, the younger users have been declining. [01:08:57] Facebook it's getting, uh, the population there is getting older and older on Facebook. In average teens in the us spend 50% more time on Instagram than they do on Facebook. Uh, and also tick-tock, by the way I took talk has now surpassed YouTube in some of these metrics, quote, Instagram is well-positioned to resonate. [01:09:20] And when with young people said a researcher's slide posted internally. Inside Facebook and post said there is a path to growth. If Instagram can continue their trajectory. Amazing. So Facebook's public phase has really tried to downplay all of these negative effects that the Instagram app has on teens, particularly girls, and hasn't made its research public or available to academics or lawmakers who have asked for it. [01:09:54] Quote, the research that we've seen is that using social apps to connect with other people. Positive mental health benefits said mark Zuckerberg. He's the CEO of course of Facebook. Now this was 2020. In March one at a congressional hearing, he was asked about children and mental health. So you see how he really lawyered the words that they can have, can have positive mental health benefits, but Facebook's own internal research seems to show that they know it has a profound negative effect on a large percentage of their users. [01:10:36] Instagram had Adam Moseri told reporters in may of this year, that research he had seen suggest the app's effect on team's wellbeing is likely quote quite small. So what the wall street journal seems to be pointing out here is that Facebook is not giving us the truth on any of this stuff. It's really sad. [01:10:58] We've got to be careful. No, apparently Mr. Moseri also said that he's been pushing very hard for Facebook to really take their responsibilities more broadly. Uh, he says they're proud of this research. I'm just kind of summarizing this before we run out of time here, but it shows the document. Uh, internal documents on Facebook show that they are having a major impact on teen, mental health, political discourse, and even human trafficking. [01:11:36] These, this internal research offers an unparalleled picture. Uh, Courtney told the wall street journal of how Facebook is acutely aware that the products and systems central to its business success routine. Fail great article. I've got it in this week's newsletter. You can just open it up and click through on the link to the wall street journal. [01:12:01] They have a pay wall and I kind of hate to use payroll articles, but this one, this one's well worth it. And they do give you some free articles every month. So if you're not on that newsletter, you can sign up right now. Craig peterson.com. You'll get the next one. If you miss a link today, if you want some, you know, the special report on passwords, et cetera, just email me directly. [01:12:29] Give me a few days to respond. Uh, but me M e@craigpeterson.com. That's me M e@craigpeterson.com. [01:12:41] We've all worked from home from time to time. At least if we're somehow in the information it industry, I want to talk right now about why you need a personal laptop. Even if the business is providing you with a laptop. [01:12:57] Laptops are something that was designed to be personal, but many of us are using them as our main computer. [01:13:06] I know I often am using my laptop, a couple of my kids and my wife. It's really their main computer, even though they all have other computers that they could potentially be using, laptops are just handy and you have them with, you can take them with you. We've got workstation set up that are kind of. [01:13:27] Workstations, if you will, where there are three screens set up and they're all hooked up into one central screen controller that then has a USBC connection that goes right into the, your laptop. So you can be sitting there with four screens on your Mac laptop on your Mac pro if you needed four screens, it's really handy. [01:13:53] No question. Many of us have a laptop for home and a laptop for business. And many of us also look at it and say, oh wow, this is a great laptop I got from work. It's much better than my home laptop. And you start to use the business laptop for work. At home. Okay. That's what it's for. Right. But then we start to use that business laptop for personal stuff. [01:14:25] That's where the problems start. We've seen surveys out there that are shown. Then half of workers are using work issue devices for personal tasks that might be doing it at home. They might be doing it at the office. Things like personal messages, shopping, online, social media, reading the news. So the prospect of using your work laptop as your only laptop, not just for work, but also for maybe watching some movies, group chat and messaging, reading, fan fiction, paying bills, emailing to family or friend. [01:15:06] It just seems not. It's so tempting. It's just natural. I'm on it. I'm on it all day long. Why wouldn't I just use it? And this is particularly true for people who are working from home, but we have to be careful with that. It's really something that you shouldn't be doing for a couple of reasons. One that. [01:15:30] Top that's a business. Laptop is the property of the business. It's just like walking home with boxes, full of pencils and paper back in the old days, it is not yours to use for personal use. We also have to assume, assume since it is the company's laptop that hopefully it's been secure. Hopefully they haven't set up. [01:15:57] So it's going through a special VPN at the office and it's going through special filters, maybe snort filters or something else. That's doing some deeper inspection on what's coming through your laptop. Well, there are also likely on that laptop. Tools that are monitoring your device. Things like key loggers, biometric tracking, Jill location, software that tracks your web browser and social media behavior, screenshot, snapshot software, maybe even your cam. [01:16:34] Is being used to keep track of you. I know a number of the websites that I've used in the past to hire temporary workers. Those workers have to agree to have you monitor what they're doing. These hourly workers, subtle take screenshots of their screen, unbeknownst to them. Yeah. Pictures from the cameras at random intervals. [01:16:58] Again, unbeknownst to them, it'll track what they're doing. And so I can now go in and say, okay, well he billed me five hours for doing this. And I look at his screen and guess what? He wasn't doing that for all of those five hours that he just billed me. Well, the same thing could be true for your company, even if you're not paid by the hour. [01:17:23] Right now, we're looking at stats that show over half of the businesses that are providing laptops for the employees to use more than half of them are using monitoring software. And through this whole lockdown, the usage of these different types of monitoring systems has grown. Now there's some of the programs you're using. [01:17:50] You might be VPN in, you might be using slack or G suite enterprise, all good little pieces of software. They can monitor that obviously, but it goes all the way through to the business. And using your slack access as paid for, by the businesses also idiotic to do things like send messages to your buddies, set up drinks after work, complain to other people about someone else in the business, your boss, or otherwise your it, people at the business can see all of that. [01:18:31] They can see what you're doing with slack. Even if you have a separate personal account. It's still more likely that you'll end up mixing them up if you're logged into both on the same computer. So the bottom line is if you are on a work computer, whether it's a laptop or something else, you can reasonably assume that I T can see everything. [01:18:56] That's not. They own it. Okay. And they have to do some of this stuff to protect themselves. We put software on laptops for companies not to spy on employees. That's none of our business, but we put software on computers for employees. To make sure they stay safe. Think of what happens when your computer, your laptop, whatever it might be connects to the company's network. [01:19:25] Now that can be through a VPN. It can be because you take your laptop home or on the road when you're traveling and you bring it back into the office. If that computer is infected, somehow now you've brought that infection into the office. And that's how a lot of the malware works. It goes from computer to computer. [01

GeekWire
Zillow, Amazon, Facebook and the pitfalls of rampant automation

GeekWire

Play Episode Listen Later Nov 13, 2021 29:46


The downfall of Zillow's iBuying business is a reminder of the downsides of relying too much on automation and machine learning algorithms at this stage in the evolution of technology. A conversation about the pitfalls of real estate valuations leads John Cook and Todd Bishop into a larger discussion about the continued importance of human judgment and attention in the modern world. Plus, cat vs. coyote: the crazy scene on Todd's Ring camera this week.  And in our final segment, we test a new feature: Tech Crank, in which Todd and John each offer a rant about something irksome in the tech world this week. Why the iBuying algorithms failed Zillow, and what it says about the business world's love affair with AI Redfin CEO explains how its iBuyer home buying program avoided pitfalls that sunk Zillow Group NYT: Inside Amazon's Worst Human Resources Problem Bloomberg: Highly Paid Union Workers Give UPS a Surprise Win in Delivery Wars Forget porch pirates, our Ring camera captured video of a cat escaping a coyote in Seattle Amazon-backed electric vehicle maker Rivian races to huge stock market debut after IPO Microsoft serves up a Google Chromebook rival with $250 Surface Laptop SE for students Podcast produced by Curt Milton. Theme music by Daniel L.K. Caldwell See omnystudio.com/listener for privacy information.

Double Tap Canada
Episode 211: A Cool New Feature in Jaws 2022, Hands On with Apple Watch 7 and Talking Tech with Rene Ritchie

Double Tap Canada

Play Episode Listen Later Nov 12, 2021 53:17


Are you looking for a show where you can hear all about what's new in the world of tech and get plumbing advice at the same time? Good news! It's time for another episode of Double Tap Canada. After a brief detour into Steven's plunger prowess and exactly why he can't decide between Windows and Mac, we discuss a new feature in Jaws 2022 that he simply loves. The new Split Audio feature allows you to route the screen reader voice to either the left or right audio channel and have the system audio in the opposite channel. Anyone who has struggled with two sets of headphones and multiple audio interfaces knows how useful this feature could be, and it's surprisingly easy to enable. Next, it's onto the tech news, and this week we speak to Rene Ritchie to get his thoughts on the new 12th generation processor from Intel. Is it really a challenge to the AMD Ryzen or Apple's M1 CPUs? Speaking of challengers, can Microsoft's recently announced Windows Surface SE laptop make ground on the Google Chromebook when it comes to education? Finally, Steven has been trying out the Apple Watch Series 7. With it's marginally bigger screen and improved speaker, will it be staying on his wrist or be banished to the drawer of unused tech? The show wraps up with Courtney Craven from CanIPlayThat.com, who talks about some of the exciting accessibility features in the new Forza Horizon 5 game for Xbox. And we'll be answering an email from listener Rebecca regarding Windows 365 and Remote Desktop Client.

Squiz Today
Tuesday, 9 November: Selling Sydney Airport; Funding for future fuels; An Aussie win at the New York marathon; And the healthiest cheese in all the land...

Squiz Today

Play Episode Listen Later Nov 8, 2021 9:03


The Squiz is your shortcut to the news. Find out more abut the Google Chromebook here. More details and links to further reading for all of today's news can be found in The Squiz Today email. Sign up (it's free!) - www.thesquiz.com.au.Sport Today - a sports news podcast designed to keep you ahead of the gameSquiz Shortcuts - a weekly explainer on big news topicsSquiz Kids - a news podcast for curious kids. Age appropriate news without the nasties! See acast.com/privacy for privacy and opt-out information.

Geeks in Love
Psst, Pass the Popcorn: Horror Movie Roulette: Night of the Living Dead

Geeks in Love

Play Episode Listen Later Nov 5, 2021 146:13


In the 29th episode of the horror movie, roulette sees Glade switching from his Google Chromebook to his phone to be able to play the movie. Oh, and there's something about zombies and surviving the night. Will anyone make it? Is there a small town in Pennsylvania called Pennsylvania? Is this a classic? Is this a dud? Watch: *https://www.peacocktv.com/watch-online/movies/horror/night-of-the-living-dead/209ade01-9652-389a-a3e1-9c619609c782 Visit: gil.phonesites.com and https://podgo.co, and be sure to add our podcast in the “How did you hear about PODGO?” section of the application! Jim Moon at Hypnogoria does indeed has an episode about Night of the Living Dead, found here: https://hypnogoria.blogspot.com/2017/07/hypnogoria-65-knight-of-living-dead.html *I know I said Pluto TV, I've never used Peacock for the show before Oh and: WARNING: There is some minor swearing and about two scenes of nudity, but nothing sexual --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/gilpodcast/support

Squiz Today
Wednesday, 3 November - Pledging to end deforestation; An update on Cleo; Interest rates to stay low; and the fun in unpacking...

Squiz Today

Play Episode Listen Later Nov 2, 2021 9:45


The Squiz is your shortcut to the news. LINKS:Your Shortcut to...SubmarinesMelbourne Cup: A Veerry Elleegant win (and the fashions)Sponsored: Find out more about Google Chromebooks here.Other things we do:More details and links to further reading for all of today's news can be found in The Squiz Today email. Sign up (it's free!) - www.thesquiz.com.au.Sport Today - a sports news podcast designed to keep you ahead of the gameSquiz Shortcuts - a weekly explainer on big news topicsSquiz Kids - a news podcast for curious kids. Age appropriate news without the nasties! See acast.com/privacy for privacy and opt-out information.

On Strategy
Out of Google Labs, Apple and W+K comes Arts & Letters. A look inside with Andy Grayson, Head of Strategy

On Strategy

Play Episode Listen Later Oct 7, 2021 43:27


This independent shop with clients including Google (Chromebook, Assistant, Pixel, Photos, Pay, etc) ESPN, NBC and others, is a studio-style creative company that's delivering at speed, something that generally scares other agencies.

Craig Peterson's Tech Talk
Could Using the Right Multi-Factor Authentication Save You?

Craig Peterson's Tech Talk

Play Episode Listen Later Oct 3, 2021 83:13


Could Using the Right Multi-Factor Authentication Save You? I had a good friend who, this week, had his life's work stolen from him. Yeah. And you know what caused it? It was his password. Now, you know what you're supposed to be doing? I'm going to tell you exactly what to do right now. Let's get right down to the whole problem with passwords. I'm going to tell you a little bit about my friend this week. He has been building a business for. Maybe going on 10 years now, and this business relies on advertising. Most companies do so in some way; we need to have new customers. There's always some attrition. Some customers go away. So how do we keep them? We do what we can. How do we get new customers? For him, it was. Advertising, primarily on Facebook. He did some Google ads as well, but Facebook is really where he was focused. So how did he do all of that? Here's the bottom line you have to, if you are going to be advertising on Facebook, you have to have an advertising account. The same thing's true. Google. And then, on that account, you tie in either your bank account or your credit card. I recommend a credit card so that those transactions can be backed up. And on top of all of that now, of course, you have to use a pixel. So the way the tracking works is there are pixels on websites, about those already. And the bottom line with the pixels. Those are also. Cookies are about the pixels are used to set a cookie so that Facebook knows what sites you've gone to. So he uses those. I use those. In fact, if you go to my website, I have a Facebook pixel that gets set. And the reason for all of that is so that we know with. I'd be interested in something on the site. So I know that there are many people interested in this page or that page. And so I could, I have not ever, but I could now do some advertising. I could send ads to you so that if you were looking at something particular, you'd see ads related to that, which I've always said. It is the right way to go. If I'm looking to buy a pickup truck, I love to see ads for different pickup trucks, but if I don't want a car or truck, I don't want to see the ads. It isn't like TV where it sometimes seems every other ad is about. Car or a pickup truck. It drives me crazy because it's a waste of their money in advertising to me. After all, I don't want those things. And it's also not only just annoying in money-wasting. There are better ways to do targeting. And that's what the whole online thing is. Anyways, I told you about that because he had set up this pixel years ago. Basically, the Facebook pixel gets to know you. All of the people who like you that might've bought from you. Cause you can have that pixel track people through your site, your purchase site, they know what you purchase on the shopping cart, et cetera. And you can identify these people over on Facebook and their ads because they abandoned the cart or whatever it is you want to do there. So there's just a whole ton of stuff that you can do for these people. And it's so bad. It is so valuable. It takes years to build up that account. Years to put that pixel in place. And our friend here, he had done precisely that. Then he found that his account had been compromised. And that is a terrible thing in this case because the bad guy used his account to place ads. So now there are really two or three problems here. We'll talk about one of them. Why was the bad guy going after him? He has been running ads on Facebook for a long time. So as far as Facebook is concerned, his account is credible. All of the ads he runs don't have to be reviewed by a human being. They can go up almost immediately. He doesn't have to wait days for some of these things to go up. So our bad guy can get an account like his that has years' worth of advertising credibility and now start advertising things that are not correct. So there again is part of the value of having one of these older accounts for advertising. And so the bad guy did that use his credibility. And then secondly, he used 25 grand worth of my friend's money to run ads. Also, of course, very bad, very bad. So I sat down with him. In fact, it was this last week, and I was out on a trip with just a vacation trip. It was absolutely fantastic. I never just do vacation. It's always business plus work whenever I do anything like this, but I was on a trip last week. And so my eldest son who works closely with me, and he's also part of the FBI InfraGard program. So I had him reach out to my friend, and he helped them out, and they talked back and forth. So here's the problem that he has. And I'm trying to figure out a perfect way to solve this. And I haven't figured that out yet. And if you guys have an idea because you are the best and brightest, you really are. So go ahead and drop me an email at me@craigpeterson.com if a good way around this particular problem, which is he has. This Facebook could count and many other accounts, including his website, hosting account, email account, et cetera. And. He has people who manage his ads for him. Who operates his website for him, who put up some promotions, advertising, and everything else. So these are third-party. This is what we generically call a supply chain, risk people who are not him have access to his stuff, his private property. And how does he do it, or how did he do it? Is he went ahead and gave them. Access by giving them accounts or passwords. How well were they guarding their passwords and their accounts? So the first thing I had my friend do was going to haveIbeenpwned.com. I had him put in his email address, the one he uses the most, and it showed up in five different. Hacks data dumps. So these are five various sites where he had used that same email address in this case. And he found out that in those five cases, the bad guy's got his passwords and personal information. All bad. And he went ahead and cleaned it up. So I said put in the password because have I been, pwned also let you check your password, just see if it has been used by someone else and then stolen. So there are billions of passwords in this database. It's incredible of all of these known passwords. So he put in his password, and no, it had not been stolen, but the problem is how about the people that were managing his ads on Facebook and managing his Facebook ad. We're the usernames, which are typically the email addresses and the passwords kept securely. That's a supply chain thing I'm talking about, and that's where I'd love to get him. But from you guys, me@craigpeterson.com. If you think you have a good answer, What we've been doing. And our advice to him was use one password. That's the only one to use. I don't trust last pass anymore. After their last big hack where they got hacked one password, the digit one password. And go ahead. And set it up. And in a business scenario, you can have multiple vaults. So have a vault. That's just for people that are dealing with your Facebook ad account, maybe have another vault for people who are posting for you on Facebook. Or better yet when it comes to Facebook, go ahead and have an intermediary that is trusted the, if this, then that, or there's a few of them out there that can see that you put the post up on the website and automatically posted on Facebook. So you don't have to get. All of these people, your passwords, but again, it's up to you. You got to figure out if that makes sense to you that those are the types of things that I think you can do. And that is what we do as well. Now, one of the beauties of using one password like that, where you're not sharing all of your passwords to everything you're sharing, the minimum amount of login information that you possibly can share is that if they leave your employees, All you have to do is remove their access to the appropriate vault or vaults, or maybe all of your vaults. And this is what I've done with people that worked for me in the US and people would work for me overseas, and there have been a lot of them and it has worked quite well for me. So with one pass, We can enforce password integrity. We can make sure the passwords on stolen. One password ties automatically into have I been postponed. If a password has been exposed, if it's been stolen online, it's a great way to go. Now I've got an offer for you guys who are listening. I have a special report that I've sold before on passwords, and it goes through talks about one password. He talks about the last pass, which I'm no longer really recommending, but give some comparisons and how you can use these things. Make sure you go and email me right now. Me, Me@craigpeterson.com. That's ME at Craig Peterson dot com and just ask me for the password special report, and I'll be glad to get that on-off to you. There is a lot of good detail in there and helps you, whether you're a home user or a business. So the next step in your security is multi-factor authentication. Interesting study out saying that about 75% of people say that they've used it for work or for business, but the hard numbers, I don't think they agree One of the things that you have to do is use good passwords. And the best way to do that is to use a password manager. I was talking about a friend of mine who had been hacked this last week and his account was hacked. His Facebook ad account was hacked. We asked him if we could reach out to. BI and he said, sure. So we checked with the FBI and they're looking to turn this into a case, a real case, because they've never seen this type of thing, the hijacking of an advertising account who hijacked it. And why did they hide jacket? Was this in preparation maybe for. Playing around with manipulating our next election cycle coming up. There could be a lot of things that they're planning on doing and taking over my friend's account would be a great way to have done it. So maybe they're going to do other things here. And our friends at the FBI are looking into it. How now do you also keep your data safe? Easily simply. When we're talking about these types of accounts, the thing to look at is known as two factor authentication or multifactor authentication. You see my friend, if he had been using multi-factor authentication. I would not have been vulnerable. Even if the bad guys had his username, email address and his password, they still would not be able to log in without having that little six-digit code. That's the best way to do multi-factor authentication. When we're talking about this code, whether it's four or 5, 6, 8 digits long, we should not be using our cell phones to receive those. At least not as text messages, those have a problem because our phone numbers can be stolen from us and they are stolen from us. So if we're a real target, in other words, they're going after you. Joe Smith and they know you have some, $2 million in your account. So they're going after you while they can, in most cases, take control of your phone. Now you might not know it and it doesn't have to be hacked. All they have to do is have the phone company move your phone number to a new phone. Once. So that means one of the things you need to do is contact your telephone vendor, whoever it is, who's providing new that service. That's a company like Verizon sprint T-Mobile a T and Tone of those companies that are giving you cell service, you have to contact them and set up a pass. So that if they have a phone call coming in and that phone call can be faked. So it looks like it's coming from your phone, even if there was a phone call coming in, whether it's coming from your phone or not, they have to get that password or passcode that you gave them. And once they have that passcode now, and that's great, but if you don't have that in there targeting you specifically, then you're in trouble. So for many of us really it may not make a huge difference. But I would do it anyways. I have done it with every one of my cell phone carriers now. A couple of decades set up a password. So the next step is this multifactor authentication. If I'm not supposed to get it via text message to my phone, how do I get it? There are a couple of apps out there. There's a free one called Google authentic. And Google authenticator runs on your phone. And once it's there on your phone and you are setting it up on a website, so Facebook, for instance, your bank, most websites out there, the bigger ones, all you have to do is say, I want to set up multi-factor authentication, and then it'll ask you a case. So how do you want to do it? And you can say, I want an app and they will display. A Q R code. That's one of those square codes with a bunch of little lines inside of it. You're seeing QR codes before they become very common. And you take your phone with the Google authenticator app. Take a picture. Of that little QR code on the screen, and now it will start sinking up so that every 30 seconds Google authenticator on your phone will change that number. So when you need to log back into that website, it's going to ask you for the code. You just pull up Google authenticator and there's the code. So that's the freeway to do it. And not necessarily the easiest way to. Again, going back to one password. I use this thing exclusively. It is phenomenal for keeping my passwords, keeping them all straight and then encrypted vault, actually in multiple encrypted vault it's so that I can share some of them. Some of them are just strictly private, but it also has that same authenticator functionality built right into it. Microsoft has its own authenticator, but you can tell Microsoft that you want to use the standard authenticator. Of course, Microsoft has to do everything differently. But you can tell it. And I do tell it, I want to use a regular authenticator app, not Microsoft authenticator. By the way. That's why I advise you to don't use the Microsoft authenticator, just use one authenticator for all of the sites, and then Microsoft will give you that same QR code. And then you can take that picture and you're off and running. Next time you log in, it asks you for the code and instead of texting it to you to your phone smarter, otherwise it will not. That require you to open up your authenticator. So for me, for instance, when I'm logging into a website, it comes up and asks for the username, asked for the password. Both of those are filled out automatically by one password for me. And then it asks for that code identification code and. One password automatically puts it into my pace to buffer copy-paste, buffer, and I just paste it in and they've got the code. So I don't have to remember the codes. I don't remember passwords. I don't have to remember usernames or email addresses. One password remembers them all for me. Plus it'll remember notes and other things. So you can tell, I really one password. We use it with all of our clients. That's what we have for them. And it does meet even a lot of these DOD requirement on top of. Depending again, how much security you need. We will use duo D U O and it also has this authenticator functionality and we will also use UBI keys. These are those hardware key. They do oh, can provide you with hardware tokens. Those are those little tokens that can go onto your key ring. That show a changing six-digit number every 30 seconds. And that's the same number that would be there in your smartphone app. Your one password or Google authenticator smartphone. Hopefully, I didn't confuse you too much. I think most of the reason we're not using the security we should is because we're not sure how to, and we don't know what we're going to be. And I can see that being a big problem. So if you have questions about any of this, if you would like a copy of my password security, special report, just send an email to me. M e@craigpeterson.com. That's me M e@craigpeterson.com. That's S O N.com. I'll be glad to send it to you. Also, if you sign up for my newsletter there on my website@craigpeterson.com, you are going to get. I was hold little series of the special reports to help you out, get you going. And then every week I send out a little bit of training and all of my articles for the week. It's usually six to 10 articles that I consider to be important so that, what's going on in the cybersecurity world. So you can. With it for yourself, for your family, for your business. Craig peterson.com. According to researchers. 32% of teen girls said that when they felt bad about their bodies, Instagram made them feel worse. And you know what Facebook knew and knows Instagram is toxic for teen girls. There's a great article that came out in the Wall Street Journal. And I'm going to read just a little bit here from some of the quotes first. When I went on Instagram, all I saw were images of chiseled bodies, perfect. Abs and women doing 100 burpees in 10 minutes, said, Ms.  Now 18, who lives in Western Virginia. Amazing. Isn't it. The one that I opened now with 32% of teen girls said that when they felt bad about their bodies, Instagram, I made them feel worse. So that is studies again, that looks like yeah, these were researchers inside Instagram and they said this in a March, 2020 slide presentation that was posted to Facebook's internal message board that was reviewed by the wall street journal quote comparisons on Instagram can change how young women view and describe themselves. Apparently, for the past three years, Facebook has been conducting studies into how Instagram is affecting its millions of young users. Now, for those of you who don't know what Instagram is, it allows these users to create little stories, to have. Pictures videos of things that they're doing, and it's a lifestyle type thing you might've heard, of course, of how this I don't know what it is. Kidnapping murder plot. These, this young couple and the body I think was found up in Wyoming. I'm trying to remember, but of her and it's yeah, there it is. It wasn't my OMI. And I'm looking up right now, Gabby potato. That's who it is. She was what they called a micro influence. And I know a lot of people who can loom, that's what they want to be. There's a young lady that stayed with us for a few months. She had no other place to live. And so we invited her in here and we got some interesting stories to tell about that experience. And it's, a little sad, but anyhow, she got back up on her feet and then she decided she was going to become an influence. And what an influencer is someone that has a lot of followers. And of course, a lot means different numbers. You get these massive influencers that have tens of millions of people that quote, follow unquote them. And of course, just think of the Kardashians they're famous for. Being famous, nothing else. They have subsequently done some pretty amazing things. At least a few of them have. We've got one of those daughters who now was the first earliest billionaire. I think it was ever youngest. So they have accomplished some amazing things after the fact, but they got started. By just becoming famous by posting on these social media sites. So you get a micro-influencer, like Gabby Petito, who is out there posting things and pictures. And you look at all of these pictures and, oh my gosh, they're up at this national park. Oh, isn't she so cute. I'll look at her boyfriend. They'll look so good together and people. Fall for that image, right? It's just like Photoshopping these pictures of models, changing them. There've been some real complaints about those over the years. So Instagram sets these kids up with these pictures of people that are just totally unrealistic. One of the slides from a 2019 presentation says, quote, we make body. Excuse me. We make body image issues worse for one in three teenage girls teams, blame Instagram for increases in the rate of anxiety. And depression said another slide. This reaction was unprompted and consistent across. Groups among teens is this according to the wall street journal who reported suicidal thoughts, 13% of British users, and 6% of American users trace the desire to kill themselves to Instagram. Again, according to one of these presentations, isn't this just absolutely amazing. And you might've heard it discussed a little bit. I saw some articles about it, obviously in the news wall street journal had it, but this is a $100 billion company, Instagram. That's what their annual revenues. More than 40% of Instagram users are 22 years old and younger. And about 22 million teens log into Instagram in the US each day, compared with 5 million that log into Facebook, the younger users have been declining. Facebook it's getting the population there is getting older and older on Facebook. In average teens in the us spend 50% more time on Instagram than they do on Facebook. And also tick-tock, by the way I took talk has now surpassed YouTube in some of these metrics. Quote, Instagram is well-positioned to resonate and win with young people said a researcher's slide posted internally. Inside Facebook. Another post said there is a path to growth. If Instagram can continue their trajectory. Amazing. So Facebook's public phase has really tried to downplay all of these negative effects that the Instagram app has on teens, particularly girls, and hasn't made its research public or available to academics or lawmakers who have asked for it. Quote, the research that we've seen is that using social apps to connect with other people. Positive mental health benefits said Mark Zuckerberg. He's the CEO of course of Facebook. Now this was 2020. In March one at a congressional hearing, he was asked about children and mental health. So you see how he really lawyered the words that they can have positive mental health benefits, but Facebook's own internal research seems to show that they know it has a profound negative effect on a large percentage of their users. Instagram had Adam Moseri told reporters in may of this year, that research he had seen suggest the app's effect on team's wellbeing is likely quote quite small. So what the wall street journal seems to be pointing out here is that Facebook is not giving us the truth on any of this stuff. It's really sad. We've got to be careful. No, apparently Mr. Moseri also said that he's been pushing very hard for Facebook to really take their responsibilities more broadly. He says they're proud of this research. I'm just summarizing this before we run out of time here, but it shows the document. Internal documents on Facebook show that they are having a major impact on teen, mental health, political discourse, and even human trafficking. These, this internal research offers an unparalleled picture. Courtney told the wall street journal of how Facebook is acutely aware that the products and systems central to its business success routine. Fail great article. I've got it in this week's newsletter. You can just open it up and click through on the link to the wall street journal. They have a paywall and I hate to use payroll articles, but this one's well worth it. And they do give you some free articles every month. So if you're not on that newsletter, you can sign up right now. Craig peterson.com. You'll get the next one. If you miss a link today, if you want some, the special report on passwords, et cetera, just email me directly. Give me a few days to respond. But me M e@craigpeterson.com. That's me M e@craigpeterson.com. We've all worked from home from time to time. At least if we're somehow in the information it industry, I want to talk right now about why you need a personal laptop. Even if the business is providing you with a laptop. Laptops are something that was designed to be personal, but many of us are using them as our main computer. I know I often am using my laptop, a couple of my kids and my wife. It's really their main computer, even though they all have other computers that they could potentially be using, laptops are just handy and you have them with, you can take them with you. We've got workstation set up that are kind of. Workstations, if you will, where there are three screens set up and they're all hooked up into one central screen controller that then has a USBC connection that goes right into the, your laptop. So you can be sitting there with four screens on your Mac laptop on your mac pro if you need four screens, it's really handy. No question. Many of us have a laptop for home and a laptop for business. And many of us also look at it and say, oh wow, this is a great laptop I got from work. It's much better than my home laptop. And you start to use the business laptop for work. At home. Okay. That's what it's for. Right. But then we start to use that business laptop for personal stuff. That's where the problems start. We've seen surveys out there that are shown. Then half of workers are using work issue devices for personal tasks that might be doing it at home. They might be doing it at the office. Things like personal messages, shopping, online, social media, reading the news. So the prospect of using your work laptop as your only laptop, not just for work, but also for maybe watching some movies, group chat and messaging, reading, fan fiction, paying bills, emailing to family or friend. It just seems not. It's so tempting. It's just natural. I'm on it. I'm on it all day long. Why wouldn't I just use it? And this is particularly true for people who are working from home, but we have to be careful with that. It's really something that you shouldn't be doing for a couple of reasons. One that. Top that's a business. Laptop is the property of the business. It's just like walking home with boxes, full of pencils and paperback in the old days, it is not yours to use for personal use. We also have to assume, assume since it is the company's laptop that hopefully it's been secure. Hopefully they haven't set up. So it's going through a special VPN at the office and it's going through special filters, maybe snort filters or something else. That's doing some deeper inspection on what's coming through your laptop. Well, there are also likely on that laptop. Tools that are monitoring your device. Things like key loggers, biometric tracking, Jill location, software that tracks your web browser and social media behavior, screenshot, snapshot software, maybe even your cam. Is being used to keep track of you. I know a number of the websites that I've used in the past to hire temporary workers. Those workers have to agree to have you monitor what they're doing. These hourly workers, subtle take screenshots of their screen, unbeknownst to them. Pictures from the cameras at random intervals. Again, unbeknownst to them, it'll track what they're doing. And so I can now go in and say, okay, well he billed me five hours for doing this. And I look at his screen and guess what? He wasn't doing that for all of those five hours that he just billed me. Well, the same thing could be true for your company, even if you're not paid by the hour. Right now, we're looking at stats that show over half of the businesses that are providing laptops for the employees to use more than half of them are using monitoring software. And through this whole lockdown, the usage of these different types of monitoring systems has grown. Now there's some of the programs you're using. You might be VPN in, you might be using slack or G suite enterprise, all good little pieces of software. They can monitor that obviously, but it goes all the way through to the business. And using your slack access as paid for, by the businesses also idiotic to do things like send messages to your buddies, set up drinks after work, complain to other people about someone else in the business, your boss, or otherwise your it, people at the business can see all of that. They can see what you're doing with slack. Even if you have a separate personal account. It's still more likely that you'll end up mixing them up if you're logged into both on the same computer. So the bottom line is if you are on a work computer, whether it's a laptop or something else, you can reasonably assume that I T can see everything. That's not. They own it. Okay. And they have to do some of this stuff to protect themselves. We put software on laptops for companies not to spy on employees. That's none of our business, but we put software on computers for employees. To make sure they stay safe. Think of what happens when your computer, your laptop, whatever it might be, connects to the company's network. Now that can be through a VPN. It can be because you take your laptop home or on the road when you're traveling and you bring it back into the office. If that computer is infected, somehow now you've brought that infection into the office. And that's how a lot of the malware works. It goes from computer to computer. So once they get in that front door where there's through a website and email that you clicked on or in a computer that you're bringing into the office, they can start to move around. Now it's not just your activity. And this is an interesting article from the verge by Monica chin. It's not just your activity that they can see on your laptop, but in many cases, they're also able to look at anything you're downloading any of your photographs or videos that you might've sinked up from your smart. Laura loading these types of things, your text messages on your work device for safekeeping, or just because it's your primary device might seem harmless, right? Cause you're just going to remove them before you hand it in. But some companies such as Apple won't allow you to wipe your device before handing it in regardless of how personal the contents are. And that makes sense too, because many times an employee leaves. And they don't give the company all of the information that they have, that they're obliged to give back to their employer. Things that they've been working on, customer information, et cetera. So Manalive, there are plenty of other devices out there. Hopefully if you leave your company with plenty of notice, moving a bunch of things off your work device in the last few days, uh, might raise some eyebrows at the. And I'm saying hopefully, because they should notice that sort of thing, because it could be malicious activity. It could be an insider risk that maybe they're not even aware of. There's so much you could go wrong here. So bottom line don't use the work laptop for home. So what should you use? You know, my personal recommendation. Almost always is get a Mac. They are safer to use the patches that they get are usually not destructive. You know, sometimes you can install a patch for windows and now your machine just won't work anymore. Right. You've had that happen. I know every last one of us out there that are tried to install Microsoft patches for a while have had that happen to them. All of a sudden the patch has completely messed up your computer and you are so out of luck, it's ridiculous. Right? So don't, you know, hopefully don't do that, but I like the max because they are basically safer than windows. And also because the patches just work on them, apple tends to get them out in plenty of time to try and protect us the next level. If he can't afford an apple and. Apple laptops really are not expensive when you consider how long they last and the quality that components, they are not expensive at all. But if you can't afford that, the next thing I would look at is getting a Chromebook. There are a lot of companies that make Chromebooks Chrome is an operating system from Google. It's similar to Android. Google keeps the Chromebooks up-to-date. They patch them quite regularly and make sure that there aren't nastiness is going on. You just have some of the same issues and Android has patches might take a while to get to you because it has to go through the vendor that made the Chromebook. You might have a Chromebook for Sam from Samsung, for instance, it's not Google's even though it's called a Google Chromebook. Now Chromebooks rely heavily on the cloud services that Google provides, but they can also run just locally. So with a Chromebook and you can get them for as little as 150 bucks, but remember you get what you pay for. Or as much as I've seen them in the $2,000 price range with fancy GPU's, local storage and other things, but at 150 bucks, it could be well worth it for you. It lets you do the regular word processing. Just think of what you can do with Google docs, spreadsheets against Google docs, spreadsheets, all of those types of things are built into it. You can. Cruz the web, obviously using Google Chrome on your Chromebook. And send and receive email, which is what most people do. That's really kind of all, most people do at home. So consider that as well. I also like iPad. They are quite safe again, but they tend to be more expensive and they can do pretty much everything. And now with Android support built right into Google Chromebooks, you can even run Android apps. So there you go. Keep safe and be safe out there. Right. Have a hack free life. Make sure you get my newsletter. Craig peterson.com/subscribe. Craig peterson.com/subscribe. The national cyber director, Chris Inglis said that we need cyber bullets, that cyber bullets are part of the war on hacks. And it makes sense on one level. But when you get into the reality, it's a much different story..  I had an interesting email this week from a listener. Actually he sent it about two weeks ago when I finally was able to get to it this week and responded, and he was pointing out how there are some things that I talk about on the show that I put into my newsletter that are really good. And. I'm paraphrasing here but theoretical to so many people, there's some things that you can figure out pretty easily yourself. Some things you can do yourselves and other things that are just different. To do still. And a lot of that has to do with the websites you go to in order to maintain your passwords. And he was complaining specifically about bank of America and how you can, according to what he has found here in the real world, you can come up with a. Password a 20 character long password that is going to keep everything nice and safe at trend to be generated. You're using one password and great. So you set your password up in bank of America's account, and then you try and log in later, and it doesn't work because it lets you put 20 character passwords and when you're creating it, yeah. But the login screen only takes the first 16. So of course they'd home match. You see it's things like that really are pushing us back, holding us back. But I'd say pushing us back from being secure as a country, there, there just aren't enough people paying enough attention to make sure this cyber security, even the basic stuff like passwords and two factor authentication are being done properly. So one of the things I wanted to make sure you guys were aware of is I need to know when you're having these problems, because what I want to do is put together some trainings to show you exactly how to do it. Because on some websites you were saying, it's pretty hard to use one password he's paying for it, but it's kinda difficult for him. And I think in some ways, a lack of understanding. Then, it can be difficult to spend a bunch of time trying to watch some training videos for some of the software. And so I want to hear when you're having problems so I can do what I did for him this week and spend a little time, write some stuff up, and I even am reaching out to some of this website. People like bank of America who are really messing up cyber security for people who are trying to do the right thing and writing them and saying, Hey, listen, I'm part of the FBI InfraGard program. I'm a member of it. I paid a lot of attention to cybersecurity. Heck I ran the training for the FBI InfraGard program for a couple of years, and there are some real things lacking. In the login anyways, and this one particular case of the cybersecurity, but I don't know all of this stuff. I'm not using all of these things and I have a disadvantage over you guys, and that is that I've been doing this for so long. I've forgotten what it's like to not know it. Does that make sense? So if you have something that I've talked about on the show, that's appeared in my newsletter and you're having some confusion over, let me know. Just email me M e@craigpeterson.com. What he did is he just hit reply to my newsletter. And of course, that goes to me and me@gregpeterson.com and it tracks it. So I know I need to reply, so I can sit down and go through and answer people's questions. I sent out a lot of the copies of my password, special report to people you guys had requested specifically some of the. People out there had requested a little bit of help. And I had sent out an email to most of the people that I could identify as being business people. I sent out a little thing saying, Hey, listen, if you could use half-hour my help, let me know myself or my team. And then, again, you can just send me an E Craig. So I answered a lot of those questions this week. And in fact, that's how I come up with much of what I cover here on the show. You guys ask the questions and that's how I know that it's a real problem. If I understand it, that's one thing. But for the people who don't do cybersecurity as their primary job or a strategy, I get it. I can get why you guys are confused. So make sure you get my weekly newsletter. So you can find out about all of the trainings, the free stuff, the paid courses, and. It's easy. Just go to Craig peterson.com/subscribe. That's Craig Peterson, P E T E R S O N. Craig peterson.com/subscribe. And I'm more than glad. Add you to that list. And there are now thousands of people on that list to get my email pretty much every week. If you miss it one week, it's probably, cause I just got too busy, but I put out all my show notes. I put it all a little bit of training notes, all. The us government is supposedly getting ready to fire what they're calling cyber bullets in response to these significant hacking attacks. This is what they're calling a comprehensive strategy to dissuade. Adversaries. And this is all from the national cyber security director, Chris Inglis. This is from an article in American military news.com by Chris Strome. That was out this week. And of course I included that in my newsletter this week as well, coming out. Today or tomorrow, depends on how this all goes right with the weekend. I got to help a buddy out today, but president Joe Biden has been really talking about how do we use cyber weapons to retaliate. For instance, he gave a list of industries that Russia should not be. As though Putin himself is running all of these hacks or come out of Russia. Yeah, certainly there are some that are part of their military, but there many of them that are just bad guys that are trying to make some money, we should feel sorry for them. So Biden gives him this list and says, Hey, listen, if you attack any of these various industries or actually portions of our economy, We are going to retaliate. We have seen the us retaliate under President Trump and the retaliation. Of course he did all kinds of economic stuff to stop it. And much of which has been reversed by president Biden's administration, but also he attacked them directly in. Down some power systems there in the Moscow area, which I thought was really kinda cool. So kudos to President Trump for doing that and for president and Biden now to say, Hey, we are going to attack back. Of course. The biggest question is. What would we be attacking? How would we be attacking it? And for what reason, for instance, the red Chinese have gone after our office of personnel management, OPM records and got them all back in 2015. So they now know everything about everybody that had a secret security clearance or the took a paycheck from the federal government. All of those records, they would get their hands on them and get them on all of the records a lot. So Inglis was in front of the let's see here, the, yeah, he was a former director of the national security agency. He's the first to hold his Senate-confirmed position at the white house, this national cyber director position. And he says there is a sense that we can perhaps fire some cyber bullets and shoot our way out of this English set at the conference. It was hosted by the way, by the national security agency and a nonprofit group, he said that will be useful in certain circumstances. If you had a clear shot at a cyber aggressor and I can take them offline, I would advise that we do so as long as the collateral effects are acceptable. Yeah. What we have done here under president Biden administration is we have shut down some people who were operating illegally, we have shut down some cyber actors that were attacking us. So we've been doing that, but it isn't exactly. Wow. We just saw a muzzle flash over there. And so we are returning fire to the area of that muzzle flash, because as I've said many times before, we just don't know. Where in fact that bullet is coming from, it makes it a lot more difficult. English went on to say there's a larger set of initiatives that have to be undertaken. Not one of those elements is going to be sufficient to take this. Out let's see here, the us should make clear to Russia now their adversaries, what kinds of attacks would prompt a response, which is what president Biden did when he was talking with, of course, President Putin over there, red lines of both good and bad red lines are clear and crisp. Although I got to say many of our administrations have. Really done anything about it. It's the red line in the sand and Syria president Obama didn't do anything when they stepped over that red line. So yeah. And then with what we just finished doing in Afghanistan, where we drew a red line and said, we're going to protect all of you who helped us. And then we not only abandoned them, but we abandoned Americans behind there. I don't think a lot of people aren't going to believe us. So here's the last statement here. And again, this is an article in American military news from our cyber chief is the government actions. Aren't always going to be broadcast. In some cases, it's not helpful to broadcast those for all of mankind to see another one. We are doing some things behind the scenes. And I have certainly seen some of the results of those over the last few years. Stick around.  You're listening to Craig Peterson online@craigpeterson.com. You've got a smartphone and there are some new versions out, right? New hardware, new software, Android iOS. How long should you keep that device? How long can you stay safe with that older device? Apple has now done something. Different something they've never done before. One of the reasons that apple equipment tends to be safer than almost anything else out there is that they have, what's known as a closed ecosystem. There's arguments both directions here on whether that's safer or not. But the real advantage when it comes to cybersecurity is there are only. So many versions of the iPhone out there. What are we now in a couple of dozen versions of the hardware platform that makes it easier for apple to be able to support older versions of the software and multiple pieces of hardware, much easier than for, let's say Microsoft windows. It doesn't even have a single. Platform or Android, where there are hundreds of hardware platforms out there and tens of thousands of versions of the hardware, because one model phone can contain many. Changes different types of hardware to talk to the cell towers or the screen you name it. So it's very hard to keep up. Android has for quite a while now supported three versions of their operating system. Of course, we're talking about Google, but Android operating system. So they support the current release. Of Android and the Breviary release is two previous releases in fact of Android. Now that is frankly a pretty good thing to know, but there's over a billion Android devices out there that are no longer supported by security updates. We've got Android 10, nine, and eight that are fairly supported right now. We're actually up to Android 12. So here's how it works. If you've got Android version 10 out, if that's the main one, then you can continue to do. Eight and nine and get updates, security updates. But then here's the problem, everybody, those security updates are coming out of Google, but that does not mean that they are making it all the way to you. So there you go. It's one thing for Google to provide updates, but if you can't get them because your phone manufacturer is not supporting them, you've got trouble Samsung. Is probably the best company other than maybe Google and the Google Pixel phone. Samsung's the best company to go to. If you want some longer-term support. Many of these other companies just don't provide support past the current version. So keep that in mind as well. Android 12 was the 12th major version of Android announced by Google, February, 2021. And it is starting to roll out a Android. The 11th, 11 is the one that was out in February of last year. At least it was announced then. And we're, they're coming out, they're getting pushed out. So basically Google is saying the current version plus two prior versions. And that usually gives you about a four or maybe even a five year window. So if you're. An Android device from a major manufacturer, particularly Samsung on the Android side, your device is going to be good for at least four years, maybe five years now on the, and by the way, you don't necessarily have to upgrade the. You could be continuing to run an older release saw, as I mentioned earlier, if it version 11 is the current one that's out there being supported, which it is right. 12 is early still, but version 11, that means two prior versions still get security updates. You don't get featured. Dates, you don't get the new stuff, but you get security updates. So Android 11, the current one that means 10 and nine get security updates. So you don't, you're not being forced to do an upgrade. Most people don't upgrade their phones from an older major release to a newer major release. In other words, they don't try and go from Android eight to Android 11. Because in fact, most of the time, the hardware manufacturer doesn't support it. That's why there's over a billion Android devices out there right now that cannot get security updates. So have a look at your phone and your vendors. See what you're running. You probably want to do an update because most phones cannot get any support on the, in the apple side. Things are a lot different with Apple iOS, which is the operating system used on the iPhone and the I pad apple has always forced you to move to the next major version. No, they only force you to do that. If they support the hardware. And I've got to say kudos to them, they're still supporting the iPhone six S which came out quite a while. The iPhone success is something that my wife has been using and that I had as well. In fact, she got my old iPhone success, but that's a six-year-old. Phone came out in September of 2015. So it is still getting security updates, and we'll probably continue to get them. Not only is it getting security update this six-year-old iPhone success is getting the latest and our iOS operating system. It's getting iOS 15. Isn't that just amazing? Yeah, exactly. And so not just security updates, like you might get from some of the other vendors out there, Android vendors. So the apple keeps their arms around you for quite a while. Here's, what's changed now with Apple and iOS, the, for the first time ever in the iOS world, Apple is not forcing you to upgrade. So you're not being forced to upgrade to iOS 15. You can continue to run iOS 14. And that's how apples got around the security patches in the past, because what happens is you get the updates and installs them. Basically. There's no reason for you not to upgrade your phone. And so you do so apple never had to worry about releasing some of these fixes for really old versions of iOS. Although they have done that from time to time. In the Mac iOS side, Apple has done a couple of good things. The, where they always have supported basically three releases, what Google's doing with Android. So you now have a new feature. If you will, with iOS, here's a PSA for everyone. Public service announcement. You don't have to take the iOS 15 upgrade. Now I did. I put it on my iPhone and I seem to have some sort of a problem with messages where it's telling people that my phone has notifications turned off, which it does not. So I haven't figured that one out yet. I'll have to look into that a little bit more, but. This is nice because that means you're not going to have to upgrade your iPhone to iOS 15. You'll still get security updates for iOS 14, something Apple's never done before. We'll see if they continue this. We will see if they match Google going back. Three releases in Android. It just never been done before over on the iOS. So good news for them. Also course in the windows world and the Mac world, you really should upgrade the operating system as much as you can. Windows 11 though, man, windows 11. And I said this to my newsletter. I warned you guys is going to be a nightmare. For many people. You are not going to be able to do an automatic upgrade unless you have the newest of hardware, with the highest end of features, Craig peterson.com. One of the very big ransomware operations is back online. And now we have some inside information from one of the contractors working for this ransomware organization and oh yeah, there's an FBI tie, too.. This organization, ransomware gang, almost business, whatever you might want to describe them as is known as revolt. They have a few other names, but that's the really big one. And they are basically the 800 pound gorilla in the ransom. Business, you might be using cloud services right now. Maybe you use Microsoft's email service. Their Microsoft 360, I think, is what they call it now and use it for email and various other things pretty handy. It's mostly in the cloud. Computers you own or operate or have to maintain. I think that makes some sense too, but here's the bottom line it's software as a service right now, salesforce.com software as a service, Oracle has their accounting stuff. QuickBooks online, all software as a service. It isn't just those legitimate businesses that I just mentioned. That are using the cloud that are providing software as a service where you're paying monthly or however frequently. And you're getting this software as a service. That's what that means. Typically it means it's in the cloud and you don't have any real control over it. That's what this ransomware gang has been doing. This gang known as rebill. They all appear to be in. And there's some interesting stuff. That's come out. A transcript was released of an interview with one of their contractors. Now the original interview was in Russian. So I read through a translation of the Russian. I have no idea how good it is, but it is being quoted by a bank. Insider magazine that you might be familiar with bank info, security. That's one of the places that I follow. And there's a few interesting things that he talked about that I want to get into, but these are the people who have been behind things like the colonial pipeline attack and some of the other very large attacks, the way they work, their business model is. You can license their software, their ransomware software, and you go after a business or a government agency, whatever it might be, you get that ransomware software inside. And the reveal gang will take a percentage of the money that you have in rent. Now, how is that for a, an interesting business model, right? Taking something that the rest of the world has been using, and then take that model and put it into the legal side of the world. For three weeks, during this whole reveal ransomware attack, this summer turns out that the FBI secretly withheld the key that could have been used to decrypt. And computers that reveal had infected with ransomware and looks like kids up to maybe 1500 networks. Now those are networks, not just computers. That includes networks run by hospitals, schools, and businesses, including critical infrastructure businesses. The way the FBI got their hands on this decryption game. Is by penetrating reveal gangs servers. So they got into it. They were able to grab the keys and then the FBI waited before. Did anything with it. See, what they were trying to do is catch the people behind reveal. And so they didn't want to release information, get information out there to the press that might tip off those bad guys over there in Russia. And then shut down their operations. But as you might know, because I mentioned it here before the reveal gang went offline on July 13th, before the FBI could really track them down. And then the FBI didn't release the key until July 21st. And then I think it was Malwarebytes released a decryption tool. So if you had been hacked by the gang, you could. Now, remember it isn't reveal itself. That's doing most of them. Ransomware hacking if you will or a placement it's small guys. And that's why some people, including this contractor that apparently worked for the reveal gang itself says, people think that it's the Russian government, that it's Putin, that's doing this. He said, in fact, it's not it's small guys. And people like me are getting four or five hours a night. Because we're working so hard trying to make a whole of this work, come up with the new software approaches. We have to provide code tech support unquote to our affiliates, as well as tech support to the people who have had their computers and their data ransomed. So it a real interesting mix. Absolutely. Interesting mix. Now Christopher Ray here a couple of weeks ago, he's the FBI director told Congress that cool. We make these decisions as a group, not unilaterally. To the FBI and working with other government agencies, these are complex decisions designed to create maximum impact. And that takes time and going against adversaries, where we have to marshal resources, not just around the. But all over the world. So this Russian based gang first appeared in 2019, they've been around, they've been exporting large amounts of money from businesses for a very long time. One of the interest he'd things I think about all of this is that this reveal gang has their software as a service, and they provide it to quote affiliates, quote that, go ahead and then install the software, get you to install it on your computers in order to ransom you a double whammy ransom you, but there's now reports out there that there's a secret back door in the ransomwares code that allow. Rebill to go around their affiliates and steal the proceeds. How's that for hilarious, you've got a bad guy who goes in and gets the software from revolt, pays them a commission, and then reveal apparently has been jumping in on these customer support chats. In other words, you just got nailed and because you got nailed with ransomware, you have to go to. Chat room. And so you go in there and you're getting customer support on how to buy Bitcoin and how to transfer to their wallet. And apparently revival is getting right in the middle and is extorting money from these people directly instead of having the affiliates do it pretty amazing. So here's this part of this interview? It was aired on the Russian news outlet, London. And was trans translated by yeah. Flashpoint. Here are the guys that got the full transcript of the interview. He says in the normal world, I was called a contractor, doing some tasks for many ransomware collectives that journalists considered to be famous. Money is stolen or extorted with my hands, but I'm not ashamed of it. I do. And again, this goes into the thinking of many of these bad guys of Americans are all rich and they don't deserve what they have. He said, let's put it this way. This is a very time consuming job. And if you've earned enough, then you can quit the game. But chronic fatigue, burnout, deadline. All of these words from the life of ordinary office workers are also relevant for malware developers. So there you go. You should feel sorry for these malware developers who are developing software to steal millions from you and. Down our critical infrastructure. Hey, join me online. Craig peterson.com. And if you subscribe to my weekly newsletter right there on the site, I'll send you a few of my special reports. The most popular ones will come to you right there in your email box. Craig peterson.com/subscribe. We all pretty much have some form of insurance. And we're going to talk right now about the types of cyber insurance you may have. Now this might be through your homeowners policy or perhaps a rider on a business policy.  Many of our homeowners policies have started coming with cyber insurance. So we're going to talk about that. What is it? Businesses as well are also using cyber insurance and I'm sure you've heard of insurance basically called LifeLock and what that's all about. So let's kind of start. When we have a breach in a business, usually what happens is information about our customers is stolen. Look at some of the biggest breaches in history where we. Hundreds of millions of our personal records stolen Equifax breach is an example of a huge breach where we had all kinds of personal information that was stolen by the bad guys. Now, some of this information gets stale pretty quickly, but of course, other parts of it like our address, our social security number, they are probably not going to change for years. If for. No, of course our social security number will never change the social security administration. Just doesn't reissue them for very many reasons at all. And they do not reissue a social security number was stolen online because. Just about everybody's has, so what does a company like LifeLock do? They keep an eye on your credit report for you. And they're looking at what's going on new accounts that are open. They look at various other things, just related to that. And they, at that point say, wait a minute, something weird is happening. Now my credit cards, for instance, I have a credit card that if let's say I buy two of the same thing, one after the other and the, both the same price that credit card company pops a message right up on my phone saying, Hey, did you just buy two? Of these $15 things from and I can say yes or no, if I'm out on the road and I am purchasing gas, the credit card can pop up on my phone and it does and say, Hey, will you just trying to buy gas at this gas station? Because what'll happen as you use the credit card at the pump. And the pump says it was denied and then up at pops and yeah. Okay. No, that was me. And they said, okay, we'll try the transaction. Okay. And we'll approve it next time. And that's all automated. And that has nothing to do with LifeLock. LifeLock is there to more or less detect that something happened and if something happened and it was a bad guy and basically your identity was stolen. So they might be trying to buy a Ferrari in your name or maybe a 10 year old, four Ford focus, whatever it might be. And. They will help you try and clean it. That's what they do. So that's why it's cheap. And I don't know that it's terribly useful to you if you're really concerned. Go ahead and do that, but do keep an eye on your credit report. I do as well. My bank has free credit reporting for me, my credit card. Same thing. Free credit reporting that lets me know everything that's going on. So that's an easy way to tell WhatsApp. And there are different types of cyber insurance beyond this sort of thing, beyond the LifeLocks of the world. And many of us just get our cyber insurance through our homeowner's policy. It's a little rider. And businesses can buy cyber insurance as well. We have cyber insurance, that's underwritten by Lloyd's of London and we provide a $500,000 or million-dollar policy to our clients. As well, because that's what we do is cyber security, right? So the idea is if one of our clients gets hit, we have some insurance to back us up, but of course we go a lot further. It's almost like the LifeLock where if you do get hit by ransomware or something else, we will help you get back in business. We'll help restore your data. We'll help you with providing you. The information you need in order to do press releases, which agencies you need to contact, which of your customers you need to contact. And we've got scripts for all of that. So you can send it all out and just take care of it. So the idea is you don't want ransomware. So you hire us. We are extremely likely to keep ransomware out of your systems. And on top of that, if you are hit with ransomware, we restore everything. LifeLock does not do that. Obviously they all, I'll only do stuff after the fact and the cyber insurance you buy from an insurance agency is much the same, and there's a huge caveat with these policies that we're buying for our businesses and for our homes. And that is. They have a checklist at the insurance companies. Did you do this and this? And if you did, then they might payout if you did not, they may not payout. In fact, pay outs on cyber insurance policies are not known because. Bottom line. They really don't payout. Okay. I'm looking at some numbers right now and about paying ransoms and everything else. You may or may not. You got to have a look at it. Many of these policies are never paid out by the cyber insurance covers. They usually just regular insurance companies, but it's a special rider. And what they do is they say, Hey, listen, you did not follow the rules, so we're not going to payout. And there are many cases. If you go online and do a search, just use duck, go and say cyber insurance, payout. Lawsuits I'm doing that right now is. And it'll come up and show. Oh, okay. Does it cover lawsuits? Why are liability claims so costly? Yeah, exactly. A 2% payouts is talking about here. I'm invoicing, the most common cyber insurance claim denial. Yeah, it goes on and on. There are a lot is an act of war clause could nix cyber insurance payouts. That's another big one that they've tried to use. So the cyber insurance company will say, Hey, that was China attacking you. Therefore it was an act of. And you can bet if there is a big hack, they will use that. Think of what happens with the hurricanes coming onshore. How much do they push back on payouts? Especially with the real big one, it would bankrupt them. So we gotta be very careful. There are some different types of  cyber insurance. Policies do which have different types of coverages. You've got the first party lost loss, I should say. So that's you to covering you and your loss, your first-party expenses, third party liability. Each one of those has specific parameters. So sub-limit retention and others. First-party losses are usually including the loss of revenue due to business interruption. First party expenses would include all of the services and resources that you needed to use to recover from attack like forensic or system rebuilding services. These third-party liabilities. May cover expenses and legal fees related to potential damage caused by the incident to third parties like partners, customers, or employees whose sensitive information may have been compromised. So read them carefully. Be very careful. There are next-generation, cyber insurance policies are going even further and make these types of services. Prior to any incident to reduce exposures and prevent incidents in the first place. Now we don't provide insurance. We are not an insurance company, but that's basically what we're trying to do here. Not become an insurance company, but to make sure. The businesses have the right services so that the likelihood of anything happening or is extremely low. And then following up after the fact it's different obviously than insurers in and insurance, the guardians, Jessica Crispin had a great article about a couple of weeks ago that I've been hanging on. And it's talking about this tattle where that's been incorporated into the computers we're using at home. Now we're specifically talking about employers that are putting this. The software on computers, they belong to the companies. A lot of businesses are worried. If workers are at home or where we can't see them, how do we know that they're actually working, not watching Netflix or something else on. They have, of course, come up with software that can reassure your boss. It does things like take snapshots of what you're doing. Record your keystrokes grabs photos from. Picture from your camera. There's a new program called sneak, which makes your webcam take a photo of you about once a minute and makes available to the supervisor to prove you're not away from your desk. There's no warning in advance. It just takes that photograph catches your doom. Pretty much anything can be absolutely anything. Then, it's the type of thing you'd expect the national security agency to do. So there are some good reasons for this lack of trust because sometimes employees have not been doi

Friends Against Government
TLE 38 - The Dancing Afghanis

Friends Against Government

Play Episode Listen Later Aug 18, 2021 66:53


Finding themselves bereft of the really loud communist cohost who can't be bothered to connect his microphone to his Google Chromebook, the valiant podcasters Birdarchist and Carcampit steam ahead to cover the most important news. They invite on Ace_Archist, the notorious rival podcaster with good intentions, to discuss the messy pullout from Afghanistan, jab news, and the MacDaddy. Follow the Timeline Earth @TimelineEarth for memes, hijinks, and elfish breakdowns. --- Ace (@Ace_Archist) --- Car (@TLE_Car) Bird (@TLEBirdarchist) Aaron (who even knows) --- THE EARTH IS A LINE!

The Chrome Cast
Stadia on Google TV, Steam on Chromebooks, and no new Pixelbooks

The Chrome Cast

Play Episode Listen Later Jun 25, 2021 77:30


This week on The Chrome Cast, we begin by discussing all the gaming news that is swirling in the Google/Chromebook world this week. From Stadia finally launching on Chromecast with Google TV (and Android TV) to more news on 'Borealis' and Steam games coming to Chrome OS, there was a lot of great news in the gaming sphere this week. From there we move on to talking about my lost hope in seeing an updated Pixelbook anytime soon. With the two boards 'Halvor' and 'Lindar' both being outed as decidedly not Google hardware, we really don't have anywhere else to look for a new Pixelbook in the near future. That being said, there's hope on the horizon in the form of Google's custom 'Whitechapel' silicon that gives us hope that we may see another Pixelbook down the road. NOTABLE LINKS Borealis, a.k.a. Steam, will live in the Chrome OS settings menu Steam on Chrome OS is so close I can taste it Why I've lost hope for a new Pixelbook arriving anytime soon Google Stadia arrives on Google TV, expanding its reach to millions more Lenovo debuts 2 Tiger Lake Chromebooks ahead of MWC Seriously, affordable Chromebooks are getting really good [VIDEO] I canceled my Stadia Pro subscription and now I play Stadia more than ever This episode is brought to you by NordVPN. Get a VPN that takes your privacy seriously. NordVPN is our VPN of choice and will secure your browsing on your Chromebook or on any device. Use NordVPN to keep your private data to yourself whether you are at home or on the go! CLICK HERE to try it out and get a 3-year deal for $3.49/month. Join our Patreon community and get access to things like behind-the-scenes footage, early access to videos, private Discord server access, an ad-free experience on the mobile and desktop versions of the website, your name listed on all our YouTube videos, and monthly live stream Q&A. CLICK HERE to be a part of our community. --- Support this podcast: https://anchor.fm/chromeunboxed/support

Cherokee Tribune-Ledger Podcast
Library Offering Chromebooks; Reinhardt Professor Publishes Book on 19th Century Georgia; Reeves House Visual Arts Center

Cherokee Tribune-Ledger Podcast

Play Episode Listen Later May 18, 2021 8:28


Sequoyah Regional Library System users can now borrow a Google Chromebook; #Reinhardt University professor published a book on nineteenth-century #Georgia; The Reeves House Visual Arts Center in #WoodstockGA is open #CherokeeCounty #LocalNews - - - - - The Cherokee Tribune-Ledger Podcast is local news for Woodstock, Canton, and all of Cherokee County.   Cherokee Tribune-Ledger   Register Here for your essential digital news.    This podcast was produced and published for the Cherokee Tribune-Ledger and TribuneLedgerNews.com by BG Ad Group on 5-17-2021   For advertising inquiries, please email j.southerland@bgadgroup.com See omnystudio.com/listener for privacy information.

Craig Peterson's Tech Talk
Colonial Ransomware redefines our approach

Craig Peterson's Tech Talk

Play Episode Listen Later May 16, 2021 79:01


2021-05-15 Show 1113 - How the Colonial Pipeline changed Ransomware forever Craig Peterson: Hey, wherever you are, whatever you're doing right now. I know you're listening, and I appreciate you being with us. Of course, this is Craig Peterson. I've been in cybersecurity now for 30 years, and we're going to talk about what's really happening with this Colonial Pipeline ransom.  [00:00:16]This whole hack, if you will, of what's been happening with this Colonial Pipeline. Cyberattack is very upsetting to me. Let's just really briefly because I've talked about it before. Talk about what happened. What is ransomware? Ransomware is software that the bad guys get onto your computers. [00:00:40] Now it's changed over the years. When ransomware first started hitting, I think most people still have this in mind, and the software gets onto your computer. Usually, you click on something. You download a zip file, and you open it up. Maybe it's a Microsoft word document and embedded inside that document. [00:01:00] Is a piece of nastiness, and that nastiness is the ransomware. And what it'll do on your machine is it'll start looking for files that it can encrypt. And those files typically are things like your word documents, your Excel spreadsheets, all that sort of stuff. And. They would encrypt it and then pop up on your screen, a nice little red warning message that all your files have been encrypted. [00:01:31] And if you really want to get those files back, what you're going to have to do is go to this particular website, send some Bitcoin to this specific Bitcoin wallet. And then hopefully, you'll be okay. Now, back in the day, it was crossing your fingers cause you didn't know what was going to happen. [00:01:52] If I send the money while I get the decryption key, will the software work while I get all my files back. And frankly, the answer to most of those questions was no. In most cases, you would not get all your files back in this day and age. It's changed slightly, but we'll get into that and how it's changed and who has changed the ransomware. [00:02:16] Industry. I want to give you some tips on what to do and how to avoid ransomware in the first place. And there are some automated things you can do. You can do some things just as a human being that you should watch out for. And I want to also get into it, so what do you do after the fact? I got a call from a listener this week who had a real problem. [00:02:41] Actually, she sent an email to just me@craigpeterson.com, and I got her phone number called her back, and I had my lead tech and myself on the phone with her for probably about 15 minutes going through. Okay. So here's what you have to do to respond. So I think it's essential for everybody to understand this. [00:03:01] This Colonial Pipeline cyber attack was ransomware, but it wasn't like that original ransomware that I saw all those years ago where you're crossing your fingers, et cetera. It has advanced to the point where this company has now made this cyber attack business an actual commodity for lack of a better term. [00:03:25] Quite literally, it was called the DarkSide. They've been around for about a year. And apparently, the people that are involved with the DarkSide have been doing ransomware for much longer than that. But what they're doing now isn't just, Oh, take a gamble, and maybe you'll get your decryption key. [00:03:44] Maybe the decryption will work. Nowadays, they have turned it into a truly professional organization. There are tech support people that you can talk to. You can call, you can have an interactive chat with them. The ransomware is very careful to make sure that you can still use the online chat features in your windows machine or whatever they might need to communicate with you. [00:04:14] And the tech support people  [00:04:15] will  [00:04:15] Craig Peterson: say, Oh yeah, some, I'm sorry that happened to you. Let me help you fix it. What you have to do is go to this website and buy Bitcoin. First, you have to set up a wallet. All of this was just so complicated. People weren't able to figure it out. So they now, with their tech support, will help you. [00:04:34] Find a place to buy the Bitcoin help you set up a wallet, help you put your more money into that Bitcoin wallet after you bought some fractional, probably Bitcoin, because they're worth quite a bit right now. And then. They'll help you to send that money from your Bitcoin wallet to their Bitcoin wallet. [00:04:59] And then they'll help you run the software to decrypt your files. This is pretty complicated, and these guys, a DarkSide, understood that. And that's why they did all of this tech support type stuff, but they've taken it. I yet a step further, this gang-like DarkSide in there. They're not the only ones DarkSide. [00:05:23] They're just the guys that we think went ahead and hacked the colonial gas pipeline, but they've taken it to the step now where they are selling ransomware as a service. You can approach to them and pay them. And quite a while, you've been able to buy ransomware that you could use. You had to find the email addresses. [00:05:47] You had to send it out. You had to do this, but now for a down payment and a percentage of your take this gang will go ahead and do everything for you. Including sending it all out. They've really professionalized this whole Industry of crime, of ransomware crime, of course. And we've talked about this on the show before they also will go the next step and what the next step is in this day and age is. [00:06:19] When they get into your machine before they encrypt anything, they have a human being who looks at your machine. So the machine calls home. And I want to tell you how to stop them from calling home. Because that's going to stop most of the ransomware, but it calls home and says okay. I got somebody. [00:06:39] And so the bad guy now, because that connection's opened up to call home. Can now hop on to your computer, unbeknownst to you. It's not as though you're going to see the mouse moving or screens changing. It's all happening behind the scenes. And so they're on your computer. They look for files. They think might be of interest. [00:06:59] Those files get uploaded to them and they try and spread laterally. And a lateral spread means that they see, yeah, here's some machine that we have compromised. This looks interesting. What other computers on the network? Is there an active directory server, some sort of a file server network-attached, storage, other computers what's out there. [00:07:25] They will probe your network, which again, if you've got good network equipment, you're going to see that probe happening and you're gonna be able to stop it. But most people don't write. And including some of these big businesses that just aren't paying enough attention to how the bad guys operate. Now more than they knew. [00:07:45] The Colonial Pipeline huge multi-billion dollar company. Okay. You now know more than they do in what order we eight minutes into their show today. So they will look around the network, spread laterally, take control of other machines. And they try all of the known ways of getting in. And of course, if you haven't patched your machines and haven't kept them up to date lately, it seems like Microsoft is releasing patches a couple of times a week, just like the old days. [00:08:15]Microsoft fixed that problem. So you no longer had to patch once or twice a week? Yeah. How did they fix it? No, not by fixing their software. I know. No, I haven't forbid know what Microsoft fixer software. No, what they did is. They came up with this concept of patch Tuesday. So once a month, they'll just release all of the patches for all of the vulnerabilities that have been found that they know about and that they could patch readily. [00:08:44] Is that insanity or what? So on average, they were leaving. You exposed for one, let's see, half of a month would be about 15 days. So there you go. About 15 days you were completely exposed. It's this whole thing is insanity. I just, I don't know why people aren't paying attention to it. And I talked to small businesses, and basically, they have their fingers crossed, and they don't think it's going to damage the reputation, even if they do get hit. [00:09:14] But these guys are gathering all of this data from all of your machines inside your network, including your home network. Although they're not as interested in this. If it's just a little home network, other than if you are working from home. Okay. Are you silly enough to use a VPN? That's not configured right. [00:09:35] Or the wrong kind of VPN. Okay. Hey. Yeah. So what we'll do now is we will spread laterally. Over to the business computers and all of the other people working from home that are also VPN in, in, properly into the business network. So they can just spread like crazy. It's, it is absolutely amazing that we're not doing more. [00:09:58] I'm not calling for the feds to get involved with this cause they will almost certainly make everything worse. I'm just shaking my head here thinking about all of the potential problems they can't even get. This whole net neutrality thing straightened out, but DarkSide then has your files. And they do what I talked about a couple of weeks ago here in the show, they hold your files ransom by threatening to release them. [00:10:24] Look at what happened to Metro PD, the Metro police department in Washington, DC, just a couple of weeks ago. Yeah, they got into Metro PDs, computers, they spread laterally. Hey, look at what we found. They threatened to release these files. They had found of all of the confidential informants there, phone numbers, addresses names, cases that they're involved with, et cetera. [00:10:52] Yeah. Again, they're not taking it seriously. There's a lot we have to do. [00:10:58]There is a huge problem out there right now. And the problem has to do with these ransomware gangs. And there are quite a few of these gangs out there, frankly. And one of them called DarkSide has nailed the Colonial Pipeline. What happened is the ransomware got into their network. We don't know the details yet. [00:11:21] I've heard a lot of rumors. I'm not sure. And it started spreading inside the network. Again, you don't have a lot of details. I'm sure I'll find them out. And when I do, I will share them with you, but it spread. And the guys over at Colonial Pipeline said we better shut down the pipeline. Because we don't want the ransomware to cause serious problems thinking about what could happen with a pipeline, you could go overpressure, which could cause the pipeline to burst valves might not close that are supposed to be closed. [00:11:56] It's going to really affect the whole flow of everything in the pipeline. And remember too, you have one pipeline that carries multiple different fuels, so they stop it. From carrying gasoline, for instance, it switched to diesel, they switched to jet fuel. They switched to gasoline. They switched to home heating oil. [00:12:16] All of those are carried by Colonial Pipeline. I'm not sure if they're all in one pipeline, that's just send-up. Okay, we're sending gas now type thing. Or if there's actually multiple physical pipelines inside, I'm not really sure, but there is a lot that could go wrong. Either way, just based on the fact that they don't have the computers to control the vows, to control the flow, to monitor everything that needs to be monitored. [00:12:44] Monitored. So DarkSide is at the very least holding their computers hostage. We don't know at this point, if Colonial Pipeline is going to pay the ransom, we don't know if there's going to be a backend ransom. As I explained a little earlier, we're seeing now these. Bad guys. Not only saying pay us now in order to get your files back, but pay us now, or we're going to release all of your data. [00:13:16] I'm not sure Colonial Pipeline has that much data because they. Probably only have a very limited number of customers. So something might not happen there. The obvious data that they'd be concerned about is what I was contacted about just this week bank accounts, what happens if the bank accounts broken into stuff is stolen, what do you do? [00:13:40] And how do you deal with this? So these. Types of attacks are becoming much more frequent and it's very concerning to all of us. For a couple of years, I ran the FBI InfraGard webinar program and we talked a lot about. Protecting our critical infrastructure, but the critical infrastructure is more than just the electric grid or the fuel pipelines. [00:14:09] Frankly. It includes almost every business because if a business isn't critical, how could it possibly stay in business? Okay. You might argue how about the tourism industry? Is that critical? I don't know, ask the people that work in the tourism industry, if it's critical to their jobs or not. [00:14:29] We have to defend everything and ransomware attacks, according to commerce, secretary Gina Raimondo. Are what businesses have to worry about now. So it's a real problem, but they've got a Homeland security involved in investigating this. They've got, of course, the FBI involved investigating it, and they've brought in some third parties. [00:14:56] And w the one that looks to be the prime, I'm concerned about, cause this is not what they do, but they're saying it's an all hands on deck effort right now. She said we're working closely with the companies, state and local officials to make sure they get back up to normal operations as quickly as possible. [00:15:17] And there aren't disruptions in supply. We already know. There have been some disruptions. I think it was South Carolina declared a state of emergency this week. There's a more than 1800 fuel stations, gas stations that are out of fuel. Some of it is attributed to what we're now calling the toilet paper response where people are saying, Oh no, there's not gonna be any gas. [00:15:43] I better go buy gas now. And some people are bringing cans and cans to fill up as always filling up all of their vehicles. So it is a problem. Now, I'm going to talk a little bit more here about how ransomware gets in so that we can then give you some solutions. And if you have to drop out, I understand you can listen to this whole show as a podcast, just go to Craig peterson.com/podcast, and you can get all of the details there. [00:16:19] I even post. These automated transcripts, they're not like an absolute type of transcript, but it's pretty darn close. So again, Craig peterson.com/podcast, and you can listen there if you miss part of it today. Ransomware has to get onto your machine. Now there's a few ways it can get onto your machine. [00:16:42] There are a number of different types of attacks, but the biggest one that's typically used is called a Trojan attack. And a Trojan attack is kinda as the name implies. You think that it is something other than what it is, the Trojan horse. So the software that supposedly your friend sent you by email that you're downloading, it's not really good software. [00:17:08] It's really ransomware disguised as maybe a Microsoft word document macro. There's a lot of things that it could potentially be, but. That's one of the ways and the most common way gets in there are other ways as well. They can exploit vulnerabilities in software that you're running. So if you're not keeping your machines patched up to date, it could get in using either a zero day attack, which. [00:17:38] Yeah, there's nothing much you can do about those other than having a great firewall. So that's why I recommend having a real high end one, a good Cisco firewall. There are some other brands out there that are pretty darn good. And there's reasons that I like the Cisco over some of the other ones and it is what we sell, because I think it's the best out there. [00:18:00] But having a real high-end firewall can talk. Stop these zero day attacks. Zero day attack is where thethe bad guys are using a vulnerability in your computer. That is currently unpatchable. The vendor, Microsoft, whoever it might be, has not come up with a patch for yet. So the bad guys say Hey, day, let's just get into machines and then they can remote control your machines, install the malware, usually the ransomware nowadays and go off on their own. [00:18:34] That's the number one way they get in. Now, if you've been listening to this whole show so far today, that what has happened is once you have the ransomware that ransomware calls home, Now there's a number of different pieces or classifications of software that call home. One of them is ransomware. [00:18:57] So it gets on your machine. It calls the bad guys up and says, Hey, here I am. What do you want me to do? And usually the bad guys. If it looks like a decent target, hop on your machine, poke around, try and spread laterally. As I explained, in some cases, what it does is it just uses your machine, particularly if it's just a home machine and there's nothing particularly valuable on it. [00:19:20] It uses that whole machine now as part of a botnet, and it uses your machine that it's taken over to attack other machines. And unless you're paying a lot of attention, you probably don't even know that it's happened. [00:19:37]What do you do here with ransomware? He gets in, it looks like it's something that it's not most often, it's a Trojan. Sometimes what happens is the bad guys are sending it all in because of a zero-day or more than likely because you haven't applied the patches to all of the software that you need to patch. [00:20:01] So there's a few different things here, right? That, that you gotta be careful of. So do those, you hear it a million times. The next thing you can do to help prevent this from happening is to make sure your usernames, email addresses passwords are unique for every site you go to. Because some of these bad guys just go to the dark web, they can download for free your email, address your password from hundreds of websites. [00:20:35] Yeah, it's available for them. It's been stolen, and it's been released in some cases, they have to pay for it, but, overall it's well worth their money spent to find out your username and password. So if you are working from home, let's say you're a homeworker for, let's say Colonial Pipeline here, making stuff up right now, a nonexisting company, and you're at home. [00:21:01] He was supposed to be monitoring the pipeline, make sure the right valves are open when they're supposed to be open, make sure the fuel is flowing. Make sure all of the bills are getting paid invoices going out. And you're just doing it from home. And in fact, you got a nice little laptop set up in the corner of the bedroom, on a table. [00:21:20]It's, it's the life. And then. All of a sudden you're losing control. Just what I, I know of two water systems where this happened. Yeah. Yeah. All of a sudden somebody finds your username and your password online and that email address. Yeah. Yeah. [00:21:41] joe@colonialpipeline.com. Perfect. Okay. So let's look in the dark web. Oh, here's Joe's. Password that he used over on LinkedIn back when we stole all of those LinkedIn usernames and passwords and emails and everything else. So let's just try that because we see that at colonial pipeline. There's this remote desktop server. [00:22:07] And we know that. Yeah, because we scan them in. There it is today, remote desktop server, you know what they eat the named it remote desktop, RDP dot colonial pipeline.com. Of course, we're talking about a fictional company here, but it's only now God, I use their name and email address and a password that has been used by Joe on one or more other websites. [00:22:31] So what do they do? They say. I'm going to try. Let me see. Let me see. I'm going to connect right now to the Microsoft remote desktop server at colonial pipeline. And let's try and log in as joe@colonialpipeline.com and let's cut, copy and paste the email address that he was or a password he's using it. [00:22:51] LinkedIn, you know what I just noticed he uses the same. Password even a few years back over at Facebook. So let's just try it. Oh, look at that. I'm in. I'm in. So what's the next step? The next step is, of course, they start to poke around a little, can I take control of this machine? Let's download my ransomware onto the machine. [00:23:13] And of course this fictitious company known as colonial pipeline. They don't have a really great firewall that looks at it. Everything that's being put onto a machine downloaded. So it's not even going to notice that we're installing the most common form of ransomware on the internet today. So let's get that on his machine at work. [00:23:35] Okay. At Tonya's machine at work and off. Okay. We got it. We're the remote controls working. So let's just connect from the remote. Desktop server and okay, so we're in now, let's see what other machines we can find on their network and off they go, this fictional company now because Joe had a username and a password that he has used before on another website, they were able to get into our fictional company. [00:24:06]Does that make sense to you? So now they're inside, they're moving around. They're taking control. They're finding the computers that are used to control the valves, the flow of oil, or whatever's in the pipeline. This. Day and okay, so we're all set. So let's go ahead now because we've got all of their files, including all of their banking information while we were in there and  [00:24:31] we  [00:24:31] Craig Peterson: grabbed all yeah. [00:24:33] All of the account numbers, all to their customer info. So let's let it loose. And now they start encrypting all of the data. And by the time this fictional pipeline company has figured out that they're on there. Guess what? Yeah. In fact, what happened was they found out that they had been hit with ransomware because the ransom messages came. [00:25:03] So that is how it could happen. And that could happen to almost any company out there. And the reputation damage is enormous. The amount of money that is going to cost them is enormous. It's more than doubled in the last year. The cost on average now is over $1.2 million because of a breach and ransomware. [00:25:29] And so now they're in big trouble. Really big trouble. So how could you have stopped this? That's where life gets interesting. And I have done a number of webinars on that very thing we've delved into in some detail, it's been about a year and I'm thinking what I'm going to do is just put together some little courses that if you're on my email list, you'll find out about just little free things in order to help you guys understand this a little bit better. [00:26:00]So I'll make sure you're on my email list. Craig peterson.com/subscribe, and I'll explain it all. So here's what you can do. First of all, get a various smart, next generation firewall. Now, one thing about cybersecurity that you'll find is there are a lot of criminals out there. A lot of criminals and. [00:26:25] I'm not just talking about the people that put ransomware on your machine. I'm talking about the people that are telling you to buy their VPN product because it's going to make you safe, and they're lying about it. And they're really lawyering their words. So that, that perception that you have is somehow you're going to be safe. [00:26:43] I'm talking about the people that will sell you this. Anti-virus software that not only do not need but could potentially open you up to even more security problems, just like the VPNs can open you up to more security problems. It is full. Of criminals. They just haven't been convicted yet. Okay. So it, it's definitely a problem, a very major problem for so many people and you just don't know. [00:27:14]So that's why I want to make sure you guys understand why it's happening and the how it's happening to can. Then go on to the next step and what do I need to do to keep it out? So a really good next generation firewall, by my definition, means that firewall is going to examine all data coming in and going out. [00:27:40] So it's going to be able to look at anything that's encrypted at websites that are encrypted at data that's being downloaded at zip files that are being downloaded and check the payload to make sure. That it is legitimate traffic. Okay. It sounds easy, but again, there's so many criminals in the cybersecurity business. [00:28:03] You have to look very closely stick around. [00:28:06] So if the bad guys have control of a machine and they are trying to download some malware, in this case, ransomware, the firewall is going to see that and stop it right there. [00:28:20]Most firewalls, all they'll do is block certain ports, or they will stop as someone on the outside from getting. To the inside, but what about you going to a website and downloading accidentally, or maybe purposely downloading some software? That's malicious. Or what about some guy the got onto your computer via your VPN connection or your remote desktop or team viewer, et cetera. [00:28:51] And now has control of your computer. You have to watch all of the data coming in, going out, and it all needs to be checked for. Any sort of malware. So that's one of the first things we always do. Now. The next thing has to do with your computer. I'm going to focus in on windows because that's what most people have. [00:29:14] Nowadays. If you have a Mac, you're relatively safe. If you have a Google Chromebook again, You're relatively safe. Just keep them up to date. All right. But windows, windows is a whole other world and you know how much I love windows. Yeah, not right. And I worked on it way back when in the empty days. [00:29:39] Anyhow. Microsoft Windows has built into it. Now, some very good software that can help protect you. Windows defender, make sure windows defender is turned on and is up to date. If you have windows. And it's a recent version, and you need to be running a recent version of windows. Then you have access to windows defender, turn that on. [00:30:08] And windows defender again, keeps an eye out for malicious software. Oh, really? Who knows windows better than Microsoft? I would argue there are some people, but as a general rule, Microsoft understands what they're doing here. They have kept it up to date, right? They have had major security problems in the past with windows, the vendor itself, but most of those are fixed now. [00:30:33] And to me, the measure of success isn't, Hey, it's a hundred percent secure because you and I both know that's a load of cow stuff, because nothing's a hundred percent secure. And whether it's made by Microsoft or it's made by Cisco. There could potentially be problems. So Microsoft has fixed the known problems anyways, in windows defender. [00:31:00] So make sure that is turned on. That's the first free tool I wanted to mention, and it is huge. The next one is, of course, make sure you're up. Dating your machine. I don't mean just windows, make sure all of the other software in your machine is being updated. If you're using a browser like Firefox or even Google Chrome, I have issues with Google Chrome from a privacy standpoint, but at least both of those browsers and many others that are based on either one of them, the both of those browsers do. [00:31:36] Update themselves automatically. So that's like a huge win. So they'll keep themselves up to date, but most of the Adobe software won't keep itself up to date. Most other third party applications that you might've bought and installed on your computer or downloaded. They're not going to keep themselves up to date. [00:31:56] So keep on top of that. That's the second thing you can do. That's usually free. I would say usually because Microsoft does sometimes charge you for upgrades. I'm not sure they're going to do that anymore. The whole naming scheme and everything else, numbering scheme for windows indicates that maybe they've dropped that idea. [00:32:18] Yeah. But some of these other vendors might charge you for new release. So let's say Microsoft really decides I'm working on our climb down. We're not going to let this malware continue to give us a black eye. And so they changed the way parts of the operating system work. And so that software you're using for your customer management billing, whatever might be requires an upgrade, which of course that vendor's going to call a major upgrade. [00:32:45] And now you've got to do the app. Great. And you've probably got to pay them in order to get your hands on that upgrade. So that's why I said usually free, not always free. Microsoft also comes with a firewall, and I use that term very loosely because it's an old style firewall. It is just protecting data on certain parts. [00:33:10] And Microsoft does a very poor job of configuring that firewall. Basically, Microsoft doesn't want any tech support calls. So they pretty much turned on all of the features that you could possibly have. And when it comes to the firewall, they just leave them all wide open. To me, that's a huge problem. So yeah, the firewall is turned on by default on windows. [00:33:38] It is by the way off by default on your Mac. And both of those companies take much different approaches on the Mac. Nothing is enabled that doesn't, isn't explicitly turned on. So there's not a whole lot of reason for a firewall because you don't have a file server running on your machine. SMB file sharing. [00:34:00] You don't have a way a web browser running on your machine, et cetera, et cetera, all of that stuff you have to turn on manually. So on windows. I've I have a course that I haven't released yet. That talks about how to harden windows. I did my improving windows security course. I released that in April of 21 and a lot of you guys signed up for it and I've had nothing but great feedback, a few legitimate. [00:34:28] Questions people have, but great feedback over the course. So I'm going to have to do one on specifically the firewall on, on windows and maybe the windows defenders as well, but you're going to want to turn off any services you're not using. And I do describe that in the improving windows privacy and security course. [00:34:50] So if you took that. You've Oh, and you did it. You've got really your mission locked down. Noah came anyways. I'm rambling. Next up. Remember I said that the malware calls home, both ransomware malware, calling home to say, Hey, look what I found. You want to have a poke around. And another piece of nastiness called a botnet. [00:35:18] Where the button that will again, call home to the bad guys and say, here I am, let me know what you want me to do. And very frequently they'll use your computer. It might be a home computer might be a business computer. They love business computers because usually they have a better internet connection. [00:35:37] And they'll use your computer. Just send out a hundred million pieces of spam to any email address they can find. And once they've done that, of course, what's attached to that email while ransomware or other nastiness that's out there. So how do you stop them from calling home? Again, the non-paid or the paid, I should say option is a really good next generation firewall. [00:36:05] So we had a client that has an office here and an office that's out of state. And what happened was one of their of state offices had connected in via a VPN that we had warned about. And being in properly set up and configured and protected. So they came in on that VPN, the bad guys did because they had control of these out-of-state computers and they found accounting files, and they started to upload them. [00:36:38] So we had a really good next generation firewall from Cisco in place of firepower firewall. And we've got all kinds of equipment in our data center that, that controls all of that, but it saw, wait a minute. There's data being exfiltrated we're seeing in their account information potentially. So I would shut it right down. [00:37:01] So they got a few megabytes worth of data out and that's it. We shut it right down. It was all automatic. And then it informed us, Hey, look at what we just did. You might want to have a closer look, which of course we did do. So having that next generation firewall that can recognize data coming into your network and going out of your network is crucial. [00:37:27] The other thing that you can do, and you can do it for free or paid, the $50 a month charge that we have for endpoint computers. In other words for desktops is includes a paid version of this. Which is more advanced, but you can get it also for free. And it's obviously it's not as good and as many options, et cetera, et cetera, not men really for business, but checkout open DNS online. [00:37:58] You can go there right now. Just open D N s.com. Open-domain name server.com. And you can find out how to do it there, but it is as simple as setting your name servers to the addresses. You'll find right@thebottomoftheopendns.com homepage. So you'd set it to two Oh eight 67 two two two-dot two, two, two. [00:38:26] And. Let it do its thing. So what happens now, once you've set up your DNS using open DNS, and again, you can get it for free and the low end. And then at the higher end, it's called Cisco umbrella and a lot more features, but when the bad guys trying call home, they need to convert the name of their server. [00:38:48] Into an internet address and open DNS is updated quite frequently. I know the commercial versions that we have are updated instantaneously 24 seven, whenever anything is discovered. And I think the free open DNS is pretty close to that. So put that in place. Do some of these other things I've been telling you about, and you're going to be 95% ish safe. [00:39:17] That's pretty good. Isn't it for nothing plus the firewall, which can cost you some real money. Some of these real fast firewalls can cost over a hundred grand for a very large business, you can start at just a few grand anyways. [00:39:32]Colonial pipeline. Of course it hit the East coast hard. It particularly hit the Southern state, some of whom declared States of emergency because of what was happening, panic buying. I don't know if you saw the pictures of people with a gap, with a gas in. [00:39:51] Trash bags, clear trash bags, people buying every fuel can, they could fill it up with gasoline, somebody dangerous things. I remember back in the sixties, a friend of my dad's had this beautiful Corvette. I'd love to have one of those nowadays, and he needed to get some gas for the lawnmower. So we went down to buy it, and he had a gallon jug that he filled up with gasoline. [00:40:17] Oh, my gosh. And we had this glass one gallon jug in the back with me. This was the Corvette where there was that little, a two piece window in the back. And that's where I was just a little kid. What happens if you're in an accident? It just, these people who are doing this are crazy. Plus the gasoline is almost guaranteed to break down that trash bag. [00:40:43] This it's just not true. What people have been doing. No man, no wonder people have been calling it the latest toilet paper fear, right? Where everybody went out to buy toilet paper, but this is a real. Problem. We've got Saudi you do remember this Aramco. They were probably hacked by Iran about a decade ago, and we've seen hacks against all kinds of other utilities, these public service, if you will utilities that provide us with. [00:41:14] Pretty much everything that we need for our daily lives. And colonial apparently had a cyber health assessment about five years ago, give or take. Now it sounds like it was the same thing that we do for businesses, a paid one versus the free ones. And I've got. A checklist that you can use. [00:41:36]I'll send it to you. All you have to do is ask me for it. And you can use that to get an idea of what are the things you should be doing to prevent this. What are the things you can do as well? And if you listen to the first hour today, show of course, I went through some of the free things you can do as well to help prevent all of this sort of thing. [00:41:56] So they did go through a cybersecurity analysis. Apparently, they did not follow through on all of the recommendations. And as I started out this segment today, one of the things that's really probable, probably behind this is because they didn't know what they needed to do. So many of us are using people who are great people. [00:42:22] They love computers. They've been learning a lot about cybersecurity, but none of the snow, everything. And unfortunately, so many of us just don't know enough. And we're talking about over one, 1 million to 2 million open jobs in cybersecurity. So everybody's hanging up their hat. Everybody's putting out a shingle saying I'm a cybersecurity expert person. [00:42:47] I've got months, even, maybe even years worth of training. That's all well and good, but you still need to have a third party come in and look, and then you have to follow the recommendations. That's the other big problem I found is businesses just not following the recommendations. And then we get calls back in on average. [00:43:08] I think we figured it out a couple of months back. It was like eight months after we do a cyber health assessment for someone they come to us and say yeah, we got hacked. Can you fix this for us? And in some cases, we're able to close things up and help them out. Just like the phone call we had this week. [00:43:25] And they had taken some of the right steps to make sure that they shut down these hackers. But there's a lot of things I just plain didn't do. And that's a problem, right? We have government contractors that are subs, and sometimes these guys have the primary contracts, and they're out there in the front line. [00:43:48] They have potential prison terms. If data is stolen, Now this last week, this week, right this week. Okay. It's Saturday now, president Biden signed an executive order that is starting to put teeth into these laws. If you even sell something to someone that ultimately has a contract with the federal government, you've got some serious liability now. [00:44:18] If data is stolen and we could get into a lot of details because it happens all the time and people have businesses and they say I just make X product, but the only customer for product X is the government. And you just had all of the purchase orders stolen. And think about Hogan's heroes, right? [00:44:40] If you remember that show back in the sixties and early seventies and in the whole Cogans heroes, what ended up happening is they were looking at it all saying what should we do? What can we do? When we're were to get a little bit of information and they do everything they possibly could to get that information back to London. [00:45:00] And sorry about that. A little phone ringing here. So they're trying to get all that information back to London. Some of it, they got back, some of it, they didn't get back, et cetera, et cetera. But just that little bit about wait a minute, now they just bought 50 of these. Therefore we're thinking that the military. [00:45:19] Is now starting to expand and is going to be doing this or doing that in this area, that area, right? Those little bits of information are valuable, not just to someone like Iran or to Russia or to China, it's valuable to competitors. So president Biden's latest little executive order is really starting to. [00:45:44] Bite into all of these contractors that have been, as we call a pencil whipping forms. Now the SPRs forums as the type of form, they have to go online. They have to report about what their compliance is for their cybersecurity maturity. They don't know what they're doing. They don't know what they're filling out. [00:46:01]I'm thinking maybe I should go ahead and. Put one more little trick into this whole thing. And that is have a a service where we help businesses fill out their paperwork and understand it. But the reason I haven't done that is because the businesses that I know that have been lying on these forums, pencil whipping the forums, they don't really want to know. [00:46:29] Cause then they have plausible deniability. So how do we solve this problem? It really bothers me, frankly. When we come back, I'm going to talk about these five urgent actions that are happening right now, where these 65 businesses, nonprofits, and NGOs have formed this ransomware task force. [00:46:51] What this is about, what it's hopefully going to help everybody out with. But I want to really emphasize again, do you guys. Make sure you have a good cybersecurity health assessment. You have to have that. And if you get a cha cybersecurity health assessment, I'm more glad this end of the paperwork, you can do it yourself. [00:47:14] Okay. The basics and you know what else I'm going to do. I'm going to have a training on this. That's available for free. I'll put that up on my website so that you know what each one of those questions really means. It's so that you can now. Have a good look at your cybersecurity. Cause I know a lot of you guys you're retired. [00:47:34] You have some money that you're trying to protect from these bad guys. A ton of you guys are small business owners like me, right? I've owned and run small businesses for decades now. And. We just are focused on our businesses and just don't know everything we need to know. We don't even know what we don't know right. [00:47:56] About cybersecurity. So I'm going to help you with that. But when we get back, we're going to talk about these fights. If you want to reach out to me, if you want a copy of any of these cybersecurity health assessment forms. I'll send them to you. No problem. Just email me. M e@craigpeterson.com or reply to tomorrow's email. [00:48:17] If you're on my email list, I'll be glad to get that off to you. No problems, no questions asked. I'm not going to be harassing you. If you want us to do a deeper dive, where we look at your systems, we scan them all. We help you prioritize it. We put together a series of steps that you can take to make sure all of the  is done in the order that it really should be done in. [00:48:42] Yeah. Be glad to do that, to that, to pay the assessment. There are a number of companies out there that do it. There's about 1200 nationwide. So you should be able to find somebody if you don't trust me, I get it. That's fine. But get one done, get a very good one done and go deep into it. We're also hopefully going to be able to get into some of the other articles, and you'll find all of these, of course, in tomorrow's newsletter. [00:49:09] And you can get that by just going to Craig peterson.com/subscribe by Google, wants people to use two factor authentication, which I think is a great idea. So it's going to start turning it on for you guys. App tracking. Apple has just gone above and beyond yet again in helping to keep our data secure. [00:49:30] Thank goodness, not just secure, but. Private Peloton man. They're hurting again. Total mess up on their part again, cybersecurity, absolutely cybersecurity problems. [00:49:42]Now we've mentioned here in the last hour about DarkSide ransomware, and these are groups. Both bad guys that have been doing ransomware for a long time and more lately, they've gotten together and built a company and this company actually sells ransomware services. Now I don't mean that if you've been hacked to go to the DarkSide and say, Oh my gosh, we got ransomware. [00:50:10] Fix it for us. No, they are selling. Ransomware as a service and the hers there. There's a huge problem with this. It's just absolutely amazing, but there's some security researchers out there who have been trying to find out okay. Who. Is using them. So let's give you a couple of numbers here. So you have an idea of how much money DarkSide is making by selling this as a service. [00:50:40] So they, they do everything. They write the software that holds your stuff ransom. They go ahead on that software, and we'll do tech support, not just for the people that have licensed their software, but tech support for you. The poor ransom me. Okay. All of that stuff, but according to what is in, let me see ZD net. [00:51:05] They went and had some researchers check out the DarkSide, ransomware variants website, and there's some forum posts there that indicate that affiliation with DarkSiderequires 25% of the cut for ransomware payments under 500,000. And it has a sliding scale. So if you can ransom somebody. For more than 5 million, all they want is 10% of the money. [00:51:36] Can you believe this talking about a real business? It's just incredible. So they are out there and they are really rampant now. And they've been doing it since last summer, this whole double extortion tactic and something they've really fine tuned where they say pay us. And we will decrypt your data. At least we'll give you the key and help you decrypt it, or don't pay us now, but pay us later. [00:52:03] So we don't release your data. As I mentioned, that's what's happened with the Metro DC Washington DC police department that got the data out of the police department, and they're threatening to release it. If the DC police don't pay the right money to them. So these guys, these researchers and this particular cases, fire, I said, they have found five groups that are doing rants that are linked with the DarkSide, bad guys. [00:52:36] And they've got these letters, numbers. It's not real names. It's just what they've been labeled. But the, I wanted to go through here. What these. Different affiliated DarkSide, ransomware gangs are doing so there's one where there's was to start with one we'll run through all five and what their tactics are. [00:53:00] But this first one, which is identified as UNC 26, 28 has been active since February this year. Now, remember how I mentioned how they'll get into your network and then they'll start to move. Laterally within the network, they'll try and infect other machines. If they get onto your home machine, they'll go through the VPN that you're using to connect to the office. [00:53:21] And. Once they're there, they'll start spreading between office machines. And there's some thinking that has actually happened in the case of the colonial pipeline. We'll know more details. I hope fairly soon I've been watching what the FBI has been saying. They send me updates, but I haven't seen anything. [00:53:41] That's publicly shareable at this point in time. Anyways. So this lateral movement is where they're really going to kill you. And this first group tends to move quickly from the initial infection where they get the software on your machine. And they're only lurking on your network for two, two to three days before they start the encryption. [00:54:06] That's all the time it takes for them to find all of your machines. Now they use suspicious authentication attempts, brute force attacks. Spray and pray tactics, all common spray and pray means they're just looking for anybody out there. They're not going after a specific target. They'll find your home, the computer and bam they're in and they'll just take bank account information, or they might use your machine for attacking other people, including by the way, attacking governments and governments don't take well to having your computer attack them. [00:54:40] Okay. So they. Apparently, I'm just trying to summarize all of this as we're going, but they get their initial access through legitimate credentials for corporate virtual private networks. What have I been telling you for a long time? VPNs are not the panacea. Most people think they are, and they purchase it from other criminals. [00:55:02] Next group, 26, 28. Is thought to partner with other of these services besides DarkSide and includes revival and net Walker. Another one has been active since at least January, they moved from initial access to ransomware deployment at an average of 10 days. So it used to be about two weeks. And that's where I've been saying for a long time, that most of the time when you get ransomware, They'll be in your network, poking around for a couple of weeks, but it's been so profitable. [00:55:36] They may well hire more people and spread more quickly. So instead of 14 days is now down to three to 10 days. According to this report, I'm looking at right now, from what FireEye has said and fire, I do do investigations of these types of things. And in fact, they got involved in some political stuff, not too long ago as well. [00:55:57] Team viewer home. My gosh, Microsoft team viewer. It's abused to maintain the persistence in connections. That's where they can continue to be on your machine. Get on a compromised machine, and then they exfiltrate your files before they encrypt them. Next one here, dating back for a little over a year. [00:56:20] They use a phishing name. Emails to deliver this DarkSide ransomware, and they use a smoked ham net backdoor. So there go here. This group can wait on your network and lurk for months ahead of when they actually fire up their ransomware and our friends. Over at Sofo said that they've been called in to assist on five different instances of DarkSide ransomware infection. [00:56:52] So there's a lot to know there's a lot to be concerned about, but remember they get in blocking them. The way I told you in the last hour is really going to help. It's going to stop more than 95% of them, and it doesn't have to cost you a dime. Mind you, the paid versions are going to be better, but that's the way that is. [00:57:13] And we also now have these 65 businesses, which includes some nonprofits, government organizations, and formed this ransomware task force. So that's, I think good. News to all of us world economic forums involved in this as well. And they're just trying to really help. Now, what I get concerned about is the government's involvement, and it's one thing for the government to follow up after an attack. [00:57:44] Okay. And it's another thing for the government to provide general information. In fact, you can find it. The small business association has quite a bit of stuff, not as detailed. I don't think it's anywhere near as good as the free cyber health assessment forms that I can send you. But they, we do have it. [00:58:01] A lot of places have it, and it is well worth looking into. I, so yeah, here we go. Average downtime due to ransomware attacks, 21 days, get that thorough cyber health assessment done. Now whether you do it yourself, you hire somebody to come in and do it. Or we did 1100 of these last year for free for listeners and their businesses. [00:58:29] So more than glad to do it as well. Just email me@craigpeterson.com and I'll get all the info out to you. [00:58:36]Look at what's happening right now with. [00:58:38] The whole colonial pipeline thing, and I am more than glad to help you guys out. And all you have to do is just go ahead and email me M e@craigpeterson.com. All right. Getting down to it here. Two factor authentication. A lot of people have started using. Text messages as part of two factor authentication. [00:59:02] So for instance, you go to a website, you put in your username, which is usually your email address, which is a bad idea from these people that coded up this terrible software, right? You should be able to choose your own username, so you can have a different username on every website, and then you put in your password. [00:59:19] And of course you guys. Best and brightest, you are using different passwords on every website, and hopefully you're also using a password manager to keep track of it all. I were really surprised. I looked at it. I had 1200, 1200 different. Accounts on different websites. So then you probably have more than you realize, but SMS, text messages are not the best way to do two factor authentication. [00:59:53] The idea behind a secure system, just a regular login security is, do have something, along with something you have. So there's something, is your username and your password. Something you have. That's a lot different, isn't it? And having your phone with you that can receive a text message is not really going to protect you, especially if they are out to get you. [01:00:17] So if you have a fair amount of money in investments, maybe you have some Bitcoin, et cetera, many. Times now there are a lot of examples I can cite of people who have had their phone number hijacked. So the bad guys remember the, all these data, leach data breaches, these leaks, where they've got your username, they've got your password, they've got your phone number. [01:00:42] So if they really want to take over everything, all they have to do is. Grab ahold of your phone number, because most of the time, how do you recover your password on our site? Oh, I just go ahead and have it, send me a text message. What happens if instead of that text message going to you, that text message goes to a bad guy because they've taken control of your phone number. [01:01:07] It happens. It happens every day. So Google has an idea that I think is a pretty reasonable one. And Google has for a long time, had an app called Google authenticator. And I used that when it first came out, and I played around with it a little bit nowadays I've been using duo, and I've got, go do all set up so that. [01:01:27] I can put in a one-time password thing, but that changes every 30 seconds or so. And you might've used those before. Sometimes it's a token, et cetera. But what Google has done for two factor authentication is they have it set up so that when you go to login. If you have a Google program on your smartphone, it will have you open up Google, for instance, the app on your smartphone. [01:01:55] And then you confirm that yes, it is me who is logging in. It's not a bad idea. They do it a little different on Android. Google's prompt is a full screen. Popup is built into every Android device as part of Google play services. So it's really pretty easy. This is going to be, I think, a good game changer because otherwise you're in trouble. [01:02:20] I just got a call. This is just crazy. Yeah. What a week, this week from another listener, who's a church. This particular church had been basically hacked and their main email account was hacked into the bank account. It just goes on and on. And it smells like they may have access to his text messages, which are used for account. [01:02:48] Recovery. So this type of two factor authentication thing that Google is pushing out. Yeah. I think is a very good idea. They're becoming a little more proactive and it's, I think it's going to be good. Yeah. Overall we'll see how this all goes. There are some other ways to do it. I think maybe some better ways, but this is not a bad way. [01:03:14] Now speaking about privacy versus security, we've been talking so far about security. That's what two-factor authentication is all about. And if you want a little privacy, Android slash Google is not the way to go. You know that already. I say every time that you should be using duck, Go, not Google to do searches online, to find stuff well, Apple released their newest version of iOS, which is of course the operating system for the iPhone and for the eye pad. [01:03:48] And I guess the iPod, right? Like the iPod touch and stuff, but this operating system has now code in it that pops up and asks you if you want to allow an app to track your activity across other companies, apps, and websites. This I think is a very good thing. At least, that they're trying to track you, right? [01:04:13] So Facebook has been complaining about this for a long time. The experts said probably 40%, maybe 60%, let's call it. 50% of people will allow the app tracking. It turns out that 96% of users in the us have opted out of app tracking. In this latest version of iOS, which to me makes a lot of sense. In other words, only 4% of people said, yeah, you can track me. [01:04:44] What does this mean? Obviously to you as a consumer, it might be good. It actually might be bad. Again, if I want to buy an F150 pickup truck, I wanna buy an F150 pickup truck. Now, maybe you could try and talk me into buying a Dodger Chevy or something else. I get it, but I want a pickup truck. I don't care about seeing ads for women's pajamas or you name it. [01:05:16] I'm looking for a pickup truck. So I want to see ads that are aimed at me for something that I want. I you're probably the same way you remember those days on the internet, where you were constantly getting these male enhancement. Emails. And they went out to everybody because they had no idea who you were. [01:05:38] They didn't have any information about you. And when Facebook and Google and some of these others came along, all of a sudden you were getting more relevant information. By not allowing them to track you, you are going to be getting ads that maybe aren't as relevant as they used to be. Now on the other side, it's nice not having them track you because it's none of their business. [01:06:04]But it's, I think it's overall a good thing. Reminds me of Tom cruise in minority report where he's walking past those billboards, and they scan his eye. As all that's possible from that distance. And they recognize him as, what was it, Mr. Tadashi or something? Not definitely not him. And they were trying to sell him something that were tied into what Mr. [01:06:29] Tadashi had purchased before. And the machines, just the billboard just thought it was Mr. DACI not the Tom Cruise character. So this is going to change quite a few things. If you are a. Business. You're going to have a little bit of a harder time trying to track people, which also means, by the way, and not distract people, but, find people that are of interest to you. [01:06:53]I want somebody that's a white male in his mid forties who drives an F150 that is 10 years old, which means, okay, he's probably going to buy another one. You're going to have a little bit of a harder time with some of that tracking. So it's going to cost you a little bit more for some of the advertising, but I think it's also going to drive down the cost of ads on some of these platforms, because they're not going to be able to target as closely as they could be for all right. [01:07:20] really we're everywhere. All you have to do is you can find the podcast. You can go to tune-in dot com and of course you can just ask your Amazon Alexa, Alexa, play. W G a N and off she'll go, there are so many articles to talk about this week. [01:07:36] You will find all of them in my newsletter. And what I typically do in the newsletter is not only do I go through hundreds of articles and put together a collection of what I think are the most important ones, the best ones for you guys to be able to follow. But I also send you right to the person's website that put the article out. [01:08:00] So they get a little bit of credit. Maybe they get a little bit of advertising revenue, that revenue we talked about in the last segment today. But I think that's the way it only fair to everybody involved. Although obviously I'm adding a lot of my own commentary. So if you want to hear what I had to say about it, Subscribe to my podcast. [01:08:24] Just go to Craig peterson.com/podcast. You can listen to them there, or if you are a podcast listener, I'd really appreciate a comment. Hopefully I've earned five stars from you. Just go to Craig peterson.com/itunes, and we will. At that point be able to track it a little bit subscribing to the podcast really helps us. [01:08:49] And that's how some of these podcasts are measured and I'm doing this all without any commercial content. On the podcast that I do, obviously here, there's some great companies that are supporting us and trying to get this message out. And I appreciate them for advertising, but on the podcast has used subscribing that really helps Peloton. [01:09:12] You do remember Christmas, was it last year or the year before Peloton running these ads and this guy was going to buy this exercise bike from Peloton for his wife. And it seemed like a great Christmas gift for her. She seemed to be very excited about it. And then all of these snowflakes started saying, Oh, that's just terrible. [01:09:35] I like it. Was you doing saying she's fat. What's going on? Obviously she wanted one of these Peloton bikes cause they are amazing. Peloton has done just a great job in tying it into internet training, and you've got a coach, and you've got some really good hardware. The only in the form of the bike and Peloton has some other things as well. [01:09:57] So they really got nailed over that one and I think a little bit unfairly. And then we also had here within the last week, two weeks. Recall by Peloton on two treadmill models. And this was following the death of a six-year old child who was pulled under one of these treadmills is a terrible, I know I've gotten caught up in them before as well. [01:10:24] And the consumer product safety commission said that the recall decision took some intense negotiation. Because they're, Peloton, they didn't want to get nailed for something and it wasn't really their fault. But the CEO of Peloton did admit that there was a mistake here, but this is just, it's a terrible thing to think of. [01:10:48] In addition to this death, apparently Peloton received at least 72 other reports, according to ARS, Technica of adults, children, pets, and or objects getting dragged under. The tread plus treadmill 29 children suffered injuries. Second and third degree abrasions, broken bones, lacerations pretty bad all the way around, you've got moving. [01:11:13] Parts stuff can happen. I don't know. It's do we really need a label on our lawnmower telling us not to use it, to cut our hair? It's bad. It's terrible in any of these things happen. Oh my gosh. I'm not going to read the details here, but this poor little boy's three-year-old son. [01:11:32] No, I'm the parent involved. I'm sure he felt feels this terrible. So there you go. That's problem. Number one, Peloton had and within the last week obviously a major problem considering what happened, but also. Piling on to what happened at Christmas, with all of the snowflakes complaining. [01:11:54]It's now come to light the Peloton exposed sensitive user data and continued to expose it even after it knew about the leak. So it's no wonder Peloton stock price closed down 15% on Wednesday. Now I've got to add to that, that because of the lockdown, starting to go away. A lot, fewer people I think are going to be exercising indoor on their Peloton, but it's still going to happen. [01:12:23] They've got a lot of stationary bikes got a lot of treadmills, but 3 million members, according to their stockholder report and the data exposed include the user IDs, instructor, IDs, group memberships workout stats, their sex and their age, their weight. If they're in a studio or not There's apparently another piece of personal data exposed that the Peloton still hasn't secured. [01:12:50] And so ours check Nicola where this article was published, said, we're not going to tell you about it because it's still being exposed. It's pretty bad. Apparently again, this is just bad programming. It's the API APIs, these application programming interfaces that are used by programmers. [01:13:09] That are used to connect to cloud services, et cetera required no authentication before providing the information. I was reading an article this week, too. On an API might've actually been theirs, but again, no authentication says, okay, we'll lock it down. We're going to lock it down. So how do they lock it down? [01:13:30]They put a username and password on it. Okay. That sounds reasonable. But if you had a username and password, you could access. Any personal information on any API call? I didn't just restrict it to yours. Oh my gosh. Yeah. Totally barked fixed. In fact that it looks like it was Peloton who botched that fix. [01:13:53] Okay. Move onto the next one. We've got a lot of stuff here I RRS is, has been for a long time. Warning people. Hey, listen. If you have an asset. And you sell that asset. You have to pay taxes, and we've got President Biden now saying, Hey, if you invest in a company and you lose money, it's too bad, so sad. But if you make money, now you've got to pay taxes on it. [01:14:19] And they're saying the same thing about, of course, Bitcoin investments and not just Bitcoin, any cryptocurrency trades. Now they have the IRS been granted permission by federal court in the Northern District of California to issue a John DOE summons. And what they have done is they've sent us summons off to this company called cracking and cracking is a us facing arm of something called pay word ventures, according to ZD Net. [01:14:56] And what they've said is they want information on any us taxpayers who conducted at least $20,000 or the equivalent in cryptocurrency trades between 2016 and 20. 20 now they're not alleging that there's any wrongdoing. Cause we know every last person that did a cryptocurrency trade and made money on it, paid the taxes. [01:15:22] And we already know president Biden is planning on increasing those taxes to over 30% ri

Law Firm Autopilot
151: Start a New Firm (with Joe Emmerth)

Law Firm Autopilot

Play Episode Listen Later May 11, 2021 48:53


Joe Emmerth is a family law practitioner in the Chicago area who left the firm he joined out of law school to start his own firm. After 15 years of practice, he knew a lot about being a lawyer, but suddenly he had to make sure he knew enough about running his own law business.  In this episode, he explains how he planned his move, and what tools he finds most essential in his new firm. Show Notes Emmerth Divorce Law (Joe's firm website) Clio (practice management software) Gravity Legal (payment processor) Core Solutions (legal accounting software) Kofax PDF software Zoom (video conference software) Andy Stickle's YouTube channel (marketing tips) Maximum Lawyer Group Arrow Consultants YouTube Channel (North Carolina paralegal with great tips on using Microsoft 365 and other tech stuff) Microsoft Office 365 Microsoft OneDrive (online file storage) Office 365 Planner DocuSign (e-signature software) Slack (virtual business collaboration software) Dragon Naturally Speaking Dropbox (online file storage) A Second Monitor (essential for modern knowledge workers) Google Chromebook (backup computer) Remarkable tablet (paperless tool) BTW, I'd love to get your feedback or hear about your questions (which I'll answer in upcoming episodes). And when you get a chance, download my free Solo & Small Firm Lawyers’ Guide to Working Smarter (which will help you streamline, automate and outsource —so you start working less and relaxing more). Oh, and if you're interested in radical improvement for your law practice, check out my new Working Smarter course. Thanks to Our Sponsors SweetProcess is a great way to document your important workflows. Doing so will help make your practice run more smoothly, and require less involvement on your part to keep things running smoothly. The best way to understand how SweetProcess will help streamline your firm is to start using it. The company offers a 14-day free trial, but as a loyal listener of this podcast, you can try it for 28-days free of charge. And you don’t even have to enter a credit card to get started. Just navigate to SweetProcess.com/ernie to start your 28-day free trial today. And thanks to the other sponsor of this podcast… Smith.ai is an amazing virtual receptionist service that specializes in working with solo and small law firms. When you hire Smith.ai you’re actually hiring well-trained, friendly receptionists who can respond to callers in English or Spanish. If there’s one great outsourcing opportunity for your practice, this is it. Let Smith.ai have your back while you stay focused on your work, knowing that your clients and prospects are being taken care of. Plans start at $210/month for 30 calls and pricing starts at $140 for 20 chats, with overage at $7 per chat. They offer a risk-free start with a 14-day money-back guarantee on all receptionist and live chat plans including add-ons (up to $1000). And they have a special offer for podcast listeners where you can get an extra $100 discount with promo code ERNIE100. Sign up for a risk-free start with a 14-day money-back guarantee now (and learn more) at smith.ai. EPISODE CREDITS: If you like this podcast and are thinking of creating your own, consider talking to my producer, Danny Ozment. He helps thought leaders, influencers, executives, HR professionals, recruiters, lawyers, realtors, bloggers, coaches, and authors create, launch, and produce podcasts that grow their business and impact the world. Find out more at EmeraldCity Pro

Sexploitation
How Sexual Exploitation is Facilitated by Google Chromebooks, Amazon, OnlyFans, and More

Sexploitation

Play Episode Listen Later Apr 6, 2021 43:08


Did you know that mainstream companies you interact with every day may be facilitating sexual exploitation, or leaving children vulnerable to abuse or graphic content?  During this episode of the Ending Sexploitation podcast, Haley McNamara interviews Lina Nealon, Director of Corporate and Strategic Initiatives at the National Center on Sexual Exploitation.  They discuss mainstream corporations that are facilitating sexual exploitation and abuse, including problems with Google Chrombooks that leave children vulnerable during online learning, how Amazon facilitates incest-themed merchandise, how the Wish Shopping app sells exploitive merchandise and buys ads on pornography websites, the rise of the OnlyFans sexual exploitation marketplace, and more.  Take Action  Learn more and contact companies facilitating sexual exploitation at dirtydozenlist.com  You can specifically take action on Google Chromebooks here: https://endsexualexploitation.org/chromebooks  You can specifically take action on Amazon here: https://endsexualexploitation.org/amazon  You can specifically take action on Wish here: https://endsexualexploitation.org/wish  You can specifically take action on OnlyFans here: https://endsexualexploitation.org/onlyfans  The Dirty Dozen List is an annual campaign calling out twelve mainstream entities for facilitating or profiting from sexual abuse and exploitation. Since its inception in 2013, the Dirty Dozen List has galvanized thousands of individuals like YOU to call on corporations, government agencies, and organizations to change specific policies to instead promote human dignity. This campaign has yielded major victories, including significant changes at Google, Netflix, TikTok, Hilton Worldwide, Verizon, Walmart, US Department of Defense, and many more. 

SafetoNet Foundation
The Dirty Dozen with Haley McNamara, Director ICOSE

SafetoNet Foundation

Play Episode Listen Later Mar 27, 2021 41:58


In this Safeguarding Podcast with Haley McNamara Director of the International Centre on Sexual Exploitation (ICOSE) we discuss the Dirty Dozen report. Why are companies like Amazon, Twitch, Only Fans, Wish, Discord, Google Chromebooks, Verisign, Snapchat and Visa featured? We also discuss Age Verification, PornHub and the Creeper Act.

Craig Peterson's Tech Talk
AS HEARD ON WGAN - Intel's New Ads are Stupid and Misleading (Again)

Craig Peterson's Tech Talk

Play Episode Listen Later Mar 24, 2021 14:12


Craig Peterson: [00:00:00] Ooh, what a week final preparations are in place for the improving windows security course, which is starting next week. My wife has put her foot down. We're going to make it happen. Today I was on with Mr. Matt gag now, and we spent a little bit of time talking about business, email, compromise, how that is. [00:00:20]  Talked about also ransomware, and it's near tripling and just in long, Hey, I'm Mac and how Intel's newest ads are absolutely ridiculous. It's obviously Apple and Intel going at it. Intel is just mad. That's the only explanation I can come up with. So here we go with [00:00:47] Matt Gagnon: [00:00:47] Mr. Matt. It is 7:36 on the WGAN morning news. Craig Peterson, our tech guru, joins us now every week. [00:00:54] And guess what? He's here again, Craig. How are you this morning? [00:00:57] Craig Peterson: [00:00:57] Hey, good [00:00:58] Matt Gagnon: [00:00:58] morning. Pleasure having you as always, of course, you hear Craig also on the weekends at one o'clock. If you want to hear about all these topics and more in more depth and detail, listen up Saturday at one o'clock, and you'll hear Craig Peterson's voice right here once again. [00:01:10] So Craig, lots of stuff to get to here. Maybe a fun one to begin with. Apparently, Intel has hired Justin Long. And if you don't know who Justin Long is if you think back way back to the early two-thousands, he was doing these ads, the I'm a Mac actor. Remember that guy? [00:01:26]Now he's in an ad to mock Macs. Yeah. And I, I've seen this in a, I think it didn't. Was it Verizon that hired the sprint guy or sprint hire the Verizon guy? I don't remember. Many of these actors were in these iconic roles, for some of these tech companies are getting snapped up to either make fun of or argue against their old essentially. [00:01:46] It's funny to see this kind of thing [00:01:47] Craig Peterson: [00:01:47] happen. Yeah, it is that I think you're thinking of the can you hear me now? Exactly. Yeah, this is interesting. And it's showing, I think, frankly, of some concern, maybe even fright on the part of Intel, you see what's been happening over the years, not just with Apple, but with other manufacturers is Intel processors are getting dropped. [00:02:12] Out of our devices. We started seeing that with smartphones. If you have a smartphone today, it doesn't matter if it's Android or based on Apple's iOS. It does not have an Intel processor score. And we've seen more of that surface tablets without Intel. Some of them have them, some of them don't. [00:02:32] And of course, all of these Google Chromebooks at all. So don't have it. So Intel has always been struggling to be recognized, and that's why they came up with a whole Intel inside campaign. However, they have also been one of the most expensive little CPUs little processor. If you want a professional Intel processor, it can cost you as much as $8,000. [00:02:59] Just for the CPU. So Apple has decided we're getting rid of Intel entirely after Intel missed certain benchmarks for performance and battery usage and heat and everything else. And Apple started developing its own chipset here a few years ago, or the CPU is now completely moving away from Intel over the next two years. [00:03:23] And in fact, if you buy a Mac mini, I have one in front of me right now. That doesn't have an Intel CPU in there. It has the new Apple, one chip Apple is just abandoning them. So they hired Justin Long. The I'm a Mac guy to show you, Oh, this is a, an Intel. Computer. And of course, it really has nothing to do with Intel, and he touches the screen and moves this finger around, and it isn't that neat. [00:03:52] It pops up and, oh, look at this. We've got two screens on this computer, and I can touch them both. But this Mac book, I can't touch the screen and have it do anything. No, that has anything to do with him, Joe, Matt. It's crazy. [00:04:07] Matt Gagnon: [00:04:07] Indeed, while we were talking to Craig Peterson, our tech guru, who joins us on Wednesdays at this time to go over what's happening in the world of technology in a more serious perhaps story here. [00:04:16] the knowledge here that ransom payments have more than tripled is a pretty big deal. Ransomware gangs are apparently out there roaming around the internet and successfully milking. Many people out of cash, basically taking them hostage or taking their machines hostage, if you will. And then promising to give it back. [00:04:34] If only you give them cash. Talk to me a little bit about the story. [00:04:37] Craig Peterson: [00:04:37] Yeah. That's really driven up the price of Bitcoin because the ransomware gangs are demanding Bitcoin and payment. It's a little bit harder to trace, but it is still traceable depending on what it is and the FBI just yesterday. Yeah. [00:04:53] Released another warning about ransomware attacking businesses, government entities, just on and on, but it has a huge impact on anybody that gets ransomware, and a man, the tripling of rent more attacks go hand in hand with people working from home. And that's why I've got this improving windows, securities core starting next week for everybody where we're. [00:05:19] Helping you to clean it up because we're working at home. We're not as careful as we were at the office. Because of that, it now makes it even easier for them to get valuable information. So the best thing you can do is make sure your computer's patched up. Unfortunately, Windows does not. Ship a hasted care re-secured version of windows out of the box. [00:05:44] You've got to go in; you have to do a bunch of things. That's part of what we cover in our newsletters every week. And then some of these courses, but these attackers are improving their techniques. 2020 was a great year for them. They've got this whole double extortion thing now where they will get on your computer. [00:06:03] Particularly if it's a business-related computer, if you're on a VPN connection to the office, they will. Spread is not only inside your home to other computers but across the VPN to the office. And they'll start stealing your data before you even know it's happening, and they might be doing that for a week or more. [00:06:23] And then once they've got your data, They'll go ahead and encrypt your machines so you can gain access to it. And then they'll say, okay, pay up sucker. And if you don't pay up, you don't get your data. If you do pay up, there's only a 50%. Yeah. Only half the time will you get your data back, even if you pay them. [00:06:42] And by the way, their justice department says, if you pay them, you're supporting terrorism, and you might get criminal charges against you and to make matters even worse. They'll then say, Oh, okay. By the way, where we are another organization, we have your data. If you don't pay out, we will post your data online, and then you'll be in real trouble. [00:07:06] Matt Gagnon: [00:07:06] And Craig, the other thing that's worth mentioning here in terms of. Businesses and people that are experiencing some financial extortion, if you will. A business email compromise is also a huge deal. And frankly, I've gotten the emails here about that in this Berry station; make sure that your email is being protected and that you're not falling for phishing scams and all this other stuff. And a lot of email compromised does happen and apparently accounts for a lot of money. [00:07:30] Craig Peterson: [00:07:30] Yeah, it does. We're talking billions of dollars worldwide. Right now, the FBI estimates that this has cost over 16 billion. [00:07:39] We're seeing here last year in the us almost $2 billion, and there are some easy ways to deal with this. And I'd put it in my newsletter here a couple of weeks ago when you can always email. Me@craigpeterson.com. I'll send you a link to it, but Google has a free website that you can use, and it has some examples of fishing it's designed for training. [00:08:04] You can use it for yourself at home. It's wonderful. It gives you a real interactive. Pieces of email that you can see on your screen. It is not going to compromise you at all. This is all online because, with these latest business email compromise attacks, people are getting extortion. It might be tech support romance scams, which have been very big here during this lockdown because people are frankly lonely. [00:08:35] And they'll do things like being friends. People will be friends, you may be, and we'll say, Hey, listen, my aunt really needs surgery. Eventually, get around to asking you four or five grams to help with this whatever family problem is. And you're romantically involved online, maybe even had a video chat with them. [00:08:57] So you don't realize that some kid in a basement somewhere over in Eastern Europe, but man, it has gotten awful. So be careful with this BC-type attack and take a minute. You can even Google's phishing scam website, and it'll really help you out a lot. All [00:09:19]Matt Gagnon: [00:09:19] That's been Craig Peterson, our tech guru who joins us on Wednesdays at this time. [00:09:22] Thanks a lot, Craig, as always, appreciate it. And we will talk to you again, sir, next week. [00:09:27] Craig Peterson: [00:09:27] Take care. Bye-bye. You bet. No, my dad used to say you bet all the time. I haven't heard that expression in a very long time. Hey, if you are a windows user, you've got to make sure you spend a few minutes and sign up on my newsletter list, and you can get that to go into Craig peterson.com. [00:09:49] I will be doing. Windows training here. I've got a course coming up. This is a phenomenal course. I think I explained the why behind what you're doing. So you understand it, you understand the reasons. And then I get into the details of the how, so this is a course. I think everybody needs to get it. So I've got some special deals for you guys. [00:10:18] If you. Request information on the course, if you've already requested it by responding to one of my emails, my newsletters, and saying, yeah. Tell me more about improving my windows security. I'm going to be giving you guys a coupon that is going to give you two-thirds off. And those coupons are going to be good for you to share with your friends as well for two months. [00:10:47] Okay. So this is going to be a real quick launch next week. It's only going to be open. You can only buy this course. I think Monday is when we're planning on opening, and it will. And Thursday night. So you guys that asked about it beforehand, you signed up before you will get this coupon to help out your friends. [00:11:09] So when they're saying, Hey, how do I improve this window security thing? You can give them that code. And as I said, it was good for 60 days. Nobody else is going to get that code. So if you're on my regular email list, you are not going to get that code. The only people who will get it are the people who have already expressed interest by responding to one of my newsletters in advance of me starting this course on Monday or opening the cart on Monday. [00:11:41] So it's going to be a huge win for you. It's going to be $200. Off. Okay. I'm trying to make this affordable for everybody. And on top of it all, I have promised this for four months. Again, talking about Karen, putting her foot down, she said, I got to do something for all of these people have been asking for it. [00:12:02] And I haven't got it out yet. So this is going to be great. It is months in the making, and I really think you're going to enjoy it. I'm finishing, loading it all up. Bye, I'm actually reactivating all of the videos because I wouldn't say I liked the way the captioning was working. I have all of these videos captioned. [00:12:24] So if you can't, I can't hear it. Or if you want to have it running without the sound on at work or wherever it's burned right into the video. Okay. But the captioning, which is a transcription of me speaking. Okay. That captioning was getting cut off at the top. So I thought that might be distracting. [00:12:45] So I'm, re-editing all of the videos to put the captioning a little bit lower down on the screen. And the way I did it is the desktop slides. All of the examples are below the camera optioning. So the captioning is not going to block—any part of the video. So you'll be able to see the screenshots and see the slides and everything else with the full caption because I know a lot of you guys like to sit there in front of the computer and do this, and of course, you're able to do it on as many computers as you want, because you're going to have access to this program for six months. [00:13:28] And I think that's going to be an excellent thing. And it's about five-week. Program is how it's designed. And anyway, so w so if you sign up in advance, there's a little bit of a trick. You can get the coupon; you can share it with anybody good for it. Two months. Nobody else gets that. All right. [00:13:50] Everybody take care, and I'll be back on Saturday. And then Monday, expect the opening email to let you know that I'm opening the cart to improve Windows security. Of course. All right. Take care, guys.

Brave Parenting
Ep. 62: NCOSE 2021 Dirty Dozen List

Brave Parenting

Play Episode Listen Later Mar 15, 2021 30:54


In this episode we  review the 2021 "Dirty Dozen List" put out by The National Center on Sexual Exploitation. This list complies some of the largest mainstream entities contributing to sexual exploitation and abuse. We cover seven of the twelve: Amazon, Google Chromebooks, Netflix, Twitter, Reddit, Discord, and Wish. Those which we believe are most impactful for families today.

Craig Peterson's Tech Talk
Tech Talk with Craig Peterson Podcast: Google Chromebook Outsells Apple - who is the loser?, Vulnerability in Programmable Logic Controllers affecting large Infrastructure providers, Clubhouse and More

Craig Peterson's Tech Talk

Play Episode Listen Later Mar 6, 2021 80:47


Welcome!   I am sure that most of you know about the problems Texas experienced with its energy infrastructure well there is more bad news for our nations' infrastructure and that comes from a vulnerability in the programmable logic controllers that many of these large infrastructure providers use to control the flow of product. (i.e., water, electricity, natural gas, etc.). Also this week Google Chromebooks outsold Apple but that is not the whole story.  We also dug into processors and the importance of them and how it affects what you do daily. Then we discuss Clubhouse and why it may not be the best platform to get on and there is more so be sure to Listen in. For more tech tips, news, and updates, visit - CraigPeterson.com. --- Tech Articles Craig Thinks You Should Read: Embracing a Zero Trust Security Model Turns out Most Manufacturing, Water Supply, and Power Companies Use Controllers with a Security Severity Score of 10 out of 10 Chromebooks outsold Macs worldwide in 2020, cutting into Windows market share Clubhouse is the New Up-and-Comer but  Security and Privacy Lag Behind Its Explosive Growth New York sues to shut down 'fraudulent' Coinseed crypto platform Former SolarWinds CEO blames intern for 'solarwinds123' password leak WhatsApp will basically stop working if you don't accept the new privacy policy TikTok breaching users’ rights “on a massive scale”, says European Consumer Group --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Apple just got passed by Google's Chromebook. We'll tell you more about that. Clubhouse the app everybody seems to want, and it's invite-only. Sound familiar? That's happened before has got some serious privacy problems. Hi everybody. Craig Peterson here. Thanks for joining me today. There are a lot of things to talk about and I'm going to start with this article from ARS Technica, talking about programmable logic controllers. Now I can see you sitting there saying, what are you talking about, Craig? Who cares? Here's, what's going on. You heard about the solar winds hack? It's been something we've talked about pretty much every week here for the last Oh a month or so since it really happened. And we found out some more stuff about it this week, by the way, we know who the group is that actually did the hack very professional group. This means, of course, nation-state, but. They were going after different types of companies, that help the different types of companies, as well as government organizations. In other words, they were targeting MSPs managed services providers. And unfortunately, most of them failed because it's rare, very rare to find an MSP that actually takes care of security. And I'm not going to blame them. I'm not going to blame you for using one of these MSPs that got compromised. Because ultimately, security is a long tail thing. It is an industry in and of itself. It's hard to keep up. It's hard to keep moving forward. But I brought this up because I wanted to tie it into something we also talked about a bit for the last two weeks, and that is that water plant in Florida. This water plant in Florida had the amount of lye added to water, turned up 100 fold. Not 100%, a hundred times more lye in the water and somebody noticed and all well and good. Who did it? We don't really know, but here's the problem I want to talk about today. And that is the SCADAs systems, these PLCs, in other words, The computers that are controlling the valves in these various businesses and government agencies, the water plants, the electric plants, et cetera. You had valves. Those were these tubes. Remember that, and then transistors for a little while. Anyhow. This is something that's a very real problem because Rockwell automation you've heard of Rockwell before. I am sure of that because Rockwell has been a government contractor forever. They've done a whole lot of stuff in the military space and they do a ton also in the civilian space. Rockwell makes hardware that's used to control equipment in factories, a lot of equipment in a lot of factories, as well as all of these other places out there. And it is what's called generically a "programmable logic controller." They're selling them under this logix brand. You'll see them everywhere. They control everything you can think of out there. Some of them are very small. There might be a, like a toaster that you'd have on the countertop for instance, or something as big as one of those little pizza ovens you can put on the counter, but then they can be a whole lot bigger than that. But they help control equipment. And. Oh, the manufacturing and the processes on assembly lines and other manufacturing environments. You might remember what happened in Iran, where they had these PLCs, programmable logic controllers, that were part of this whole SCADAs system. It's all together. And in Iran, they were using them to control centrifuges and those centrifuges were being used to refine nuclear material eventually to make nuclear bombs. At least that's what we said. That's what the UN said, et cetera, et cetera. And then it makes sense, right? They have to refine the yellowcake. So that's what they were doing. And what did we do? Apparently, we got together with this country called Israel. It's over there in that same neck of the woods. And with them, we came up with some software to break into the computers at the Iran facility. Now, these computers were what we call air-gapped. They were not directly connected to the internet. So how did we hack it? We hacked the old-fashioned way. No, we didn't use a little honey bait. What happened with rep Swalwellout in California, who I don't understand how he's still sitting on the number one top secret committee in Congress, even though he spent years with this Chinese spy who obviously would have been feeding all of this information that he got back to China. I don't understand Nancy Pelosi. Sometimes this is just crazy. What's going on in Congress? It wasn't that? Okay. It wasn't a honey trap. It was a honey trap. I guess what they did is they developed this piece of malware, knew that they had to get it on to the machines that controlled the manufacturing process there in the plant that did the refining in order to make the nuclear bombs. How can you get it in if it's air-gapped, how can you get it in if those machines are not connected to the internet? But it doesn't matter if you break into the firewall because they're not behind the firewall. They're not on a network that is accessible from the outside. However, they were networked and they have to be networked inside the building so that you can have one computer that's monitoring the spin rates of all of these different centrifuges and just kind of keeping tabs on everything. So they went ahead and they put this little virus onto a thumb drive. And then, in fact, they made dozens of these thumb drives. They found out where the engineers who worked at the plant went for coffee, where they went for lunch and they scattered these around. And then a coffee spot at the lunch spot. And so now all of this stuff is scattered around these little thumb drives people, pick them up, Oh, a free thumb drive and they take them into the office. And this particular piece of malware was specifically crafted for this programmable logic controller. So if you plugged it into your computer as an accounting puter computer, it would say, Oh, wait a minute this is an accounting computer. I don't care. But these guys brought it back into their manufacturing facility and it did work there and it took over control of the machine that controlled all of these centrifuges. And fuges, it keeps saying fuses, centrifuges and it spun them out of control. And while it was spinning them out of control, it was showing a perfectly Greenlight status to the people who were trying to monitor it. They resist, it was a stroke of brilliant, but that is the type of system that we're concerned about. That's what we're talking about right now. These kinds of logic controllers that are used all over the place you can use them for almost anything you used on ships. They're used in government facilities. They're used everywhere. There was a vulnerability found and it was a, "I can't believe you did this" vulnerability. Now with solar winds, we found out it was a, I can't believe you did this vulnerability because apparently, solar winds had a password of solar winds one, two, three. Who wouldn't guess that perfectly good password? And man, we see these types of passwords all of the time. That's why I use a password manager. That's why you generate passwords or you come up with key phrases. Three or four words strung together with maybe a digit or something else in the middle somewhere and some upper lowercase characters. Right? That's how you generate a password. It's not supposed to be solar winds one, two, three. So that's problem. Number one, that's a big problem. This particular vulnerability has a severity score of 10 out of 10. Why? Why is this the worst level it could possibly be? Number one, it requires a very low skill level to be able to exploit it. Now that's interesting. Why is that? It turns out that these program, programmable logic controllers have a hard-coded key built into them. In other words, whoever programmed these things, and I'm looking at this list, there are a lot of them. Logix is the name of the company, the name of the product, and you'll see Logix in their names. And it is a whole bunch of compact Logix control, Logix drive, Logix a guard, Logix, guard on me. Now that wasn't supposed to provide cybersecurity support. All of those, okay. Then they have a hard-coded password. What that means is built right into the software is a back door with a password that can not be changed. Now, even if you bought one of those cheap firewalls from the big box retail store, you are going to be safer. Because at least it lets you change the password and you should be changing the password on your firewall. And in some cases, it also lets you change the username and you should change the username as well. But no. These Rockwell devices have a hard-coded password and Rockwell apparently is not going to issue a patch that directly addresses the problems that come from having a hard, coded key. So instead of that, they're saying, Oh, use these mitigation techniques. Isn't that what Iran did, isn't that? Why they had themselves? Nice little air gap network that was still breached? Oh, man. Oh, man. So it's a problem. It's a very big problem and they're just not paying much attention to it. Hey, stick around.  We're going to talk about Chromebooks versus Mac and Windows right here. It looks like the Wintel monopoly continues to die on the vine because of what Apple's been doing, what Google has been doing. In fact, Google is really stepping up their game here, getting rid of Intel. Hi everybody. Craig Peterson here. Thanks for joining me. We know that Intel's been around for a long time. You probably remember Intel used to brag about it. There were ads where Intel would kick in a couple of bucks if all they'd said was Intel inside. In fact, they are still doing it on machines. You buy a machine it'll probably have a little sticker if it has an Intel processor saying Intel inside. Intel had a problem, they made components that people didn't buy. Well, they bought them, but they bought them as part of something else. They did not buy an Intel processor for the fact it's an Intel processor. Makes sense. Some of them did. I certainly looked at them. I bought AMD and some others instead,. Some of the power PC stuff from IBM, just absolutely incredible, as well as others. I have done a whole lot over the years when it comes to processors, you've heard already I helped develop operating systems and implement them and the internet protocol. I've got a lot of experience with processors, no doubt about it. A lot of machine coding and assembly work over the years. I wrote C, which is a programming language used largely for a high-speed stuff like operating systems. I did a lot of that. I look at this processor from Intel as a massive failure. Marketing-wise. In the industry, it's been really great, but when I get into it from the prospect, or from the side of being an architect, of operating systems, and an architect of user interfaces. I cannot believe Intel. It's just been terrible. Part of the problem with the Intel processors and their instruction sets. The way they do the memory access and the way they do all of their IO to other devices has to do with their legacy code. They've tried to remain compatible with all kinds of older processors over the years. I can understand that I can see why they might want to do that. They're afraid that people might leave them. They started out as a memory company and through. I was going to say no fault of their own, but no luck of their own or anything else. I don't know. Another company came to them and said, Hey, can you make a cheap processor? Remember IBM looking for a cheap processor to put into this PC right. A personal computer that they didn't think would sell very many, certainly wouldn't be a great business thing. They went and said, okay what are the cheap processors we can get and put into here? Intel, 8080. That's what we'll do. All of a sudden is born the XT and the PC XT and the PC AT came. Some of these others over the years on the 8286 and the other chipsets. Anyhow, I'm getting awfully geeky on ya. Started really falling behind.  One of the ways they fell behind was in 64-bit design. In fact, Intel is AMD compatible. Now, if you can believe that. Talk about falling behind.  I don't think it's the engineers, there's some brilliant people there. It's entirely business decisions that drove them to the point they're at. They continued to increase the price of the processors. They were getting a little faster, but they still had the corner on the market because people bought Wintel they bought Windows. If they're going to get Windows, they're going to get Intel. Make sense. There were some others over the years that competed including AMD, which is Intel-compatible for the most part. They really managed to keep people out of the marketplace so they could jack-up the cost. The price structure, just keep jacking up, jacking up, jacking up. Many companies got fed up with it, including some companies that had the ability to do something about it. One of those companies is Apple. I mentioned in my newsletter last week, I had an article talking about how Apple is now apparently about to make 6G chips. 6G at the next generation of wireless and Apple's getting rid of Qualcomm and gonna make in themselves.  A company like Apple, when they want a million parts, they want them to arrive. They want them to be there on the day they ask for them and they want them to do what they asked for. Qualcomm has fallen down on that. They have not been able to meet Apple's demand. Intel has fallen flat on that. They have not been able to meet some of Apple's demands that have to do with the amount of energy they use the temperature they give off of course cause they want them on mobile devices. What did Apple do a decade ago? They said fine, forget about it. We're going to not use your Intel processors in our iPhone. They started using some other processors, some arm processors. Apple joined this community like an open-source manufacturing alliance that came up with a chip design that they could use as a basis.  Apple took that and ran with it. Today it has run so far with it that Apple has an amazing chip. Now you can see these amazing chips in your newest I-phones and your newest iPad. That's what they have in them these new Apple processors, but Apple also now has their new M series processors, which are effectively the same things they've been using in the iPhone, iPad, but beefed up in order to handle the load you'd expect to have on a laptop or a desktop with a Mac mini. I'm just so impressed with these. I was playing with both of those. One of our clients wanted them. We had them ordered and shipped to our place.  We put them on benches and we loaded them up and got them all running.  We played with them a little bit just to see what they were like. Very impressive machines.  They don't have Intel processors. Apple has switched processors a few times over the years, it went from the Intel or the Motorola over to the power PC then to the Intel, and now to its own chip design. It looks like completely new chipsets for the iPhone 13 hopefully, maybe the 14, hopefully, when that comes out. That'll probably be later this year. By the way, the 13 is just going to be an incremental update to the iPhone 12. They're saying is probably going to be like an iPhone 12S, really. Processors.  Apple doesn't need to pay the Intel tax on these processors out there.  I'm going to look right now, purchase price, Intel, a laptop CPU, just to get an idea.  I'm on there right now and I see coming right up, here's an Intel core i9 $400. Just for the CPU and that's from B&H photo and B&H has a lot of this sort of thing. Most of these Intel CPUs that are on laptops cost over $400. They're branded as core this, that, or the other things. The real expense of one, just start getting into the Xeons. Those Xeon processors can be just through the roof. Here's one here right now an Intel Xeon platinum, 8180 $11,000 while actually, it's 10,995. If Apple can make its own processor, do you think they can do it for less than 400 bucks? Of course, they can, and that's going to save them a lot of money in making some of these devices. We're going to get into those devices, like the laptops. What do you need in a laptop? Why would you go with Windows, maybe one of these other operating systems, including Mac iOS? We'll talk about that. That's going to lead us into the conversation about Chrome. Why is Chrome OS becoming so popular? Why has it surpassed now market share of Apple and where did that market share come from? People have been buying PCs, but what's going on? Stick around, you're listening to Craig Peterson and you can find me online. Craig peterson.com. We're talking about chips. Yeah we're getting maybe slightly technical, but chips matter nowadays in a way that they haven't before and yet they matter even less. I'm going to explain that. Hello everybody. Craig Peterson here.  I just said something that might've sounded confusing. Cause I said, CPU's matter more than ever. Yet they matter less than ever. Here's why. If you're looking at an Apple computer, you are looking at either an Intel processor, at least for the next couple of years or the Apple processor. If you're looking at a Windows machine for a little while Microsoft was really on a bit of a kick, trying to get Windows running on multiple platforms. In fact, it actually did.  There were some amazing things they were able to do, but really if you're getting Windows, you are going to be on an Intel platform. How about your phone? Do you have a clue as to what kind of processors in your phone? Now, you guys are the best and brightest. So yeah, you, you might, okay. You might know the exact model number and CPU clock rate and everything else about your phone, but the vast majority of people have no idea and you don't need to know. You don't need to know because it is now like a utility. You don't really know how that electron is delivered to your house. Where that came from? How that was produced? You just turn on that light switch and hope it works, right? Unlike when there's big wind storms and your power goes out, that's what you're hoping for. That's what's happening now, you buy a phone, you don't care if there's Intel inside. The same thing's true with tablets. You buy a tablet, if it's an Apple tablet guaranteed it doesn't have an Intel CPU. If you buy a Surface tablet, you can get them with Intel or without Intel. A lot of times you can tell just based on the price of the tablet now. As we move forward, we're starting to see more and more devices powered by arm chips and others. You see the idea behind Unix, which is this operating system that's underneath all of them. Unix lives underneath MacOS. Unix lives underneath Android. It lives underneath pretty much every cell phone and every device programmable device that exists today has Unix underlayment, which is the main operating system. It's fantastic. The whole goal behind that when it was designed by At&T was to make it so that this one operating system could run on anything and it did. Universities adopted it because it would run on anything and universities were getting equipment donated to them from everybody. That was anything, right? This mini-computer, that mainframe, all of these pieces of equipment got donated. They standardized on this Unix platform and the whole thing worked out quite well.  Linux is a type of Unix for those who are wondering.  The whole idea behind it is that the processor doesn't really matter because there's a version of Unix that will run on really pretty much any processor that's made today or has been made for the last 40, 50 years. Now, when you start getting into the useful computers that you and I use every day. What's underneath it? If you run a Mac, I don't think you really care. If you're on a Windows computer, I don't think you really care. What you care about is can I do that task at hand? Can I go ahead and open word, document editor. Even then you don't even care if it's Word for the most part. Word, you're going to get around it a little bit easier, but if you are over on a Mac, you could use pages. It doesn't have to be word and it doesn't have to be Windows and it doesn't have to have Intel inside. I am not giving stock advice, but I can tell you, I would not be out there buying Intel right about now. Hopefully, they got some other stuff going on. I know they're looking at some new chip designs that they can provide to people that make it pretty darn simple. Now there is another big player we haven't talked about yet and that is Google. Google's got Android, which is underneath again, a Unix operating system.  It has also on top of that, this big Java virtual machine, which has been the source of many headaches, a lot of chagrin here for developers. The beauty of it is again, Java was designed so that you can write your program once and run it on anything. You see where I'm going. We're getting to the point where the competition is going to be crazy. When it comes to the devices we use to get online or the devices that we are using for work, and it's going to get cheaper and cheaper.  I'm not talking about the cloud. The cloud is not cheaper. In most cases, the cloud can present all kinds of additional problems. We just got an email from a listener Danny today. In fact, he bought one of the little packages that we'd put together for the listeners. About 18 months ago of a special, it was a little Cisco firewall and Wi-Fi switch with security built into them, something you can't buy off the shelf. It had the firepower basic stuff in it. Anyhow. So Danny was asking because he uses G suite. How does he do a three, two, one backup? You can't with Google's G Suite.  With office three 65 or Microsoft three 65, in both cases, they have lost their client's data. So Danny was asking, so what do I do? How do I do a three, two, one backup, like you advise we do? Basically what we said is you've got to download all of your data from those cloud services, back them up properly at that point, and do it all in a format so it can be restored. So if it has to go back to the cloud, it can. It keeps your data safe. All of that stuff is, again, just it's everywhere. It's cheap. There are pros and cons to different ways of doing it. Dan is not there thinking I'm using G suite or I'm using Microsoft three 65. What processors behind it, right? You don't care. Google has said here's what we're going to do. We make a phone now, the Google smartphone isn't well adopted. It's more of an example of here's a way you can implement the Android operating system. It's a proof of concept for them. It's not a bad phone. They've tied in with some other carriers in order to provide cell phone service. They are coming out with a system on a chip. You used to have this big motherboard and if you go way back, I have a very big motherboard with all kinds of discrete components. Nowadays, all of that gets squeezed into one chip and Google has decided that they are going to make their own chip. They call it the white chapel. That's the name of the whole program.  It was reportedly made using Samsung's nine millimeter process technology. In other words, it's going to be fast. It's going to be power efficient, and initially, they are going to be putting it into their smartphones. That's not a bad idea. In their pixel smartphone sometime late this year. We haven't quite made it yet to Chromebooks, but I promise we'll get to that in just a couple of minutes. I wanted to make sure everybody had a decent understanding so that you can make the right decision for yourself and your business when it comes to what kind of computing to use. Stick around. So what kind of computer should you get? What's gonna work for you? Should you worry about the chip that's inside of it? What do you do? It just gets so confusing sometimes. That's what we're going to get into finally right now. Hi everybody. Craig Peterson here. Thanks for joining me today. Now, there are options when you are looking at a computer and I know some people don't even have a regular computer anymore, so let's start there. Really quickly many people are just using their iPad and that's what the goal was behind the iPad. I think that's what Steve Jobs had in mind. Apple always wanted it to be a replacement for your computer. It is not as flexible as a computer is by any stretch. Frankly, it's gotten a lot better, especially the iPad pro because of the faster CPU and it has a few more capabilities.  It's a good little unit.  That's what I use by the way is the iPad pro. If you are just going online and you're doing a little browsing, maybe editing a few documents, getting on a zoom call or a WebEx call, whatever it might be, doing all kinds of the regular stuff that iPad's going to work for you.  If you have an iPhone, you can link your iPad to the iPhone.  If someone calls you on FaceTime, you can actually answer, take the call on your iPad. If someone calls you on with a regular phone number, if someone does that anymore you can take that as well, right there on your iPad. iPads are inherently very safe. They have done a great job in trying to keep things pretty tight from the cybersecurity standpoint on the iPad. If you need to use Windows applications, then that's where the surface tablet might come in for you. I know some people who like their surface tablets and I know people who really don't like their surface tablets. Personally, I don't think I would buy one. There's not a huge win, but again, some people like them. They're more portable than some laptops. Now, you can get laptops in the Windows world that are as small and lightweight as an Apple laptop. Now, which would I get the Apple laptop versus a Windows? I would absolutely without a doubt, no question get the Apple. The main reason for that is that it's cheaper. Yes. I said it was cheaper.  It's cheaper because that Apple laptop is designed using high-quality components and is manufactured using high-quality stuff versus that PC. You might find a laptop PC laptop for maybe 350 bucks, and you look at the Apple laptops and they start at just under a thousand dollars. They're small the Apple ones and they are very functional and they will last. If you get the same component in your windows laptop, the same quality, the same speed, the same buses, IO, everything else, same display. You are going to pay more in the Windows world than you would on a Mac. If all you can afford or all you want is something inexpensive then I've got an option and it isn't Windows. Okay. Unless you have to have Windows, if there's a specific program you have to use that only runs on Windows while you're stuck aren't you. There is another option out there and it is called a Chromebook. It has been doing very well. 2020 was the first year that these Chromebooks outsold Apple Macintoshes. Now, that's a big deal because Apple's always been a kind of a minor player, seven to 10% of the marketplace. To see Chromebooks actually beat Apple is impressive. Now, part of the reason they're beating the Apple is what I just explained to you. They are inexpensive. Many kids are at home, right? They're going to school from home virtually and the schools need them to have a computer. What do they say? Get a Chromebook. Here's a $300 Chromebook. Go ahead and get this for your kid or here's $300 and or $300 Chromebook. In some cases, the school just buys it for the kid. Great for that. Now, remember it's Google, you're storing most of your documents up in Google's cloud. Depends on how you feel about Google and having Google with full access to all of your information. I have a big concern with Google having access to my kids' information, but that's a wholly different story out there. No question about that. Chrome is an operating system again, that is based on Unix. It's actually Linux, which is again, a version. It is something that you just won't see. The odds of you directly interacting with the operating system just keeps going down and down. Now, Windows, you still got a muck around sometimes you got to get into the registry editor. You got to do weird-ass stuff. With your Chromebook or with your Mac, you're not going to have to do that. It's not an antiquated design. It is a very modern design. Very easy to use. Now, I started the segment out by saying that CPUs matter more than ever, and yet they matter the least they've ever mattered. Here's why I said that the manufacturers now are able to choose the CPU they want to use. Unless, of course it's a Windows target, but for anything else for Chromebooks, they can use any CPU from any manufacturer. They might have to do some porting and do some work involved in that, but it's moderately minor. You can't say the same thing for Windows. Windows is locked into a couple of different architectures and you can bet Microsoft is pretty busy trying to make it so that it will run across even more CPU architectures.  It matters more to the manufacturers and matters more to you what CPU they're using, because it keeps costs under control. It gives you longer battery life. It lets them put a smaller battery in and still have longer battery life. Lots of good things. It doesn't matter at all anymore because you only care about the web browser. You only care about the text editor, right? What is it that you care about? It isn't, what's underneath all of this. Chromebooks, you can find for 150 bucks at a big box retail store and you get what you're paying for. That hardware is not going to be stellar that's for sure. But it's going to work and is going to do a decent job for you.  If you don't have any money, really, but you can afford to crack 150 bucks, look at a Chromebook. Chromebooks go all the way up into the $2,000 range. Those higher-end ones have more local storage. They're faster. There's a bunch of different benefits to them. Now, you've got the options. Apple is going to almost certainly stay with its own chipsets. It lets them keep control over the entire investment. Now,  you might say that's bad. I don't want to get locked into Apple. Well is not really going to matter that much, but you are going to get locked into Apple. The reason it's not such a bad deal is looking at the marketplace, Apple has a few dozen different designs. They have to maintain the operating system for all of their software, their device drivers, everything has to work across a few different, a few dozen models. Think about it. You've got how far back your iPhones', I know they still put out some patches for iPhone fives and sixes, they might have even older ones. So there you go. Then they had the larger versions of some of the iPhones and they had the ASCE versions. Look at that. Compare that to the Android space. Where you have hundreds of manufacturers using Android and building smartphones with it. Thousands of different models of phones each with their own device drivers and all kinds of little things. Some of these manufacturers will  go ahead and grab whatever's in the parts bin today and throw that in. Okay. This is true too, not just to the smartphone manufacturers, but if some of these PC manufacturers. Dell has been known to do this. Where it's okay, we're making a laptop today. Okay, we promise them this CPU, but this USB controller that we normally put in, we don't have it right now. I'm going to put this other one in there. It gets very confusing when you're trying to repair these things each one of those USB controllers has a different driver for Windows. So Apple, the part of the beauty of this is they only have to worry about the security and reliability of just a few dozen different designs versus Google having to worry about again, thousands and thousands of them. That's why also with Android you do not get the patches when they come out. If they come out, it can take an easy six months for a patch that's issued by Google to show up available for your phone. It typically takes Apple a matter of a week or so. It's just there. There's no comparison. That means your cybersecurity is going to be better when you can get patches. If you have an Android phone, that's more than two years old, forget about it. You're not going to get patches.  If you really are insistent, like some people I know in fact, Danny were just talking about it. He really likes his Android. Don't first of all, always buy the top model. It should probably be as Samsung.  It should be never any more than two years old. You got to trade it in every one to two years so that you're pretty sure you're going to be getting security updates in a timely fashion. There you go. That's the explanation of it. I love my Microsoft stuff for specific Microsoft apps. I really love my Mac for all the graphics and everything. It just works. It doesn't crash. The applications all just work. I use my iPad for some just general basic stuff, and Chromebooks are probably the way to go for most home users.  As we just talked about for schools as well. Hey, visit me online, CraigPeterson.com. You'll find all kinds of great information there. Craig peterson.com, Look for my podcasts. I guess this is a little bit of good news. If you're a home user, not a business or some other organization, like a state or County or city office, but we've got some breach numbers that have just come out for 2020. We're going to talk about right now. Hi, everybody. Thanks for joining me.  Of course, you can always go to my website. Yeah. Pick up all of the podcasts in case you missed something today or another week, you'll find them right there@craigpeterson.com. You can also sign up for my email list and we're going to be doing a couple of different things here. I think in the near future, we're going to be sending out some reports that we made as part of the security summer thing I did a couple of years ago, and each one of these reports and there's 30 something of them. Some of them are like five to seven pages long, but it's a checklist of all the security things you should be worrying about. Now, if you are a home user, you'll find a lot of these to be interesting. But if you're a business person, you work in an office, you help to run an office. You own a business. You need to make sure you get all of them. So make sure you are signed up Craig peterson.com and we'll be glad to get those out too. Plus we're also going to start something new every week. I usually have six to eight, sometimes as many as 10 articles in the week. I spend hours going through finding what I think are the most important things that interest me as well, but that I think will interest you guys. I put them in an email, it is it's not very long, but it's just a few sentences from each one of the stories and I have a link to the story as well, right there.  I'm going to start sending that out as well to everybody cause some people want my actual show notes. We're going to have the newsletter once a week. Then we're also planning on having a little video training as well. So it might just be straight, like straight audio. That's part of a video, but it'll be training on a specific security task or problem that's out there.  Then the course improving windows security. It's been taking us a long time. Blame it, mostly on me. Karen's also busy with babysitting grandkids at least a couple of days a week, and I'm trying to run a company as well. So it's, forgive us, but it is taking some time, but you're going to love this. I think it's turning out really well. I am about halfway done with the final edits. So I'm recording them. We go back and forth. They ended up recording them twice so that we get all of the points I wanted to cover into them. Karen's come up with a whole bunch of great screenshots and other pictures to go in with it so it's not one of these death by PowerPoint things. And we've got 21 different talks, if you will, on locking down windows and I go into the why's as well as the hows. I think that's really important, because if you don't understand why you're doing something. You're much less likely to do it. I picked that up from Mr. Tony Robbins, none other, the Anthony Robbins man. It's been over 20 years. Karen and I went to an event he had down in Boston and this was one of  his firewalk or events.  We actually got to walk on hot coals it was the weirdest thing ever. Karen was totally freaking out and I was just, wow, this is going to be weird, but we both did it. It was phenomenal. Cause it of gave you an idea of, even if you have this mental block that you can't do something you probably can. We actually did and nobody's feet were burned or anything. It was real coals. It was really hot. They were really red. It was really something that at the very end they had grass, a little square . Grass, maybe two, three feet by three feet and they had a hose running onto it. So you'd walk over it all. Then you'd just walk in on the grass and the idea there being if you had any hot coals stuck to your foot. You probably didn't want those just to stay on your foot. You'd probably want those, they get put out and taken off, so that's where that did. Anyhow. One of the things I learned from Tony was you need to have a strong reason why. We see this all of the time, Stephen Covey, if you read his stuff, you know it as well, you got to know why you're doing something. When it comes to computers and technology and security, you need to understand the why. Because it isn't just a rote thing. There are so many variations on what to do, but if you understand the why you're doing it, then I think it opens up a whole new world. You can explain it to your friends. You can help them understand it because finally you will understand it.  You'll be more motivated to do the things that you should be doing because you know why you're doing them, what it involves, what it's going to solve for you. This should be a really great course. And I spent some time in it going through the whys, give you some examples of problems people have had and what that solves. It's available hopefully here within a couple of weeks, man. I thought I'd be done by the end of January and here it's looking like it'll be the end of February. But be that as it may, keep your eyes out. If you've already emailed me to let me know, you're interested. That's great. I've got you on a list. I'll have to try and send out an email this week or sometime soon to let you guys know it that we've got it ready for you?  We will have it already for you, hopefully with the next couple of weeks. So that's that I'm told the different way of doing things that's me. I like explaining things I've been told I'm good at it. So let's I think a good thing too. I started out the segment by talking about this probably good news for end users. Because in 2020 breaches were down by 19% while the impact of those breaches fell by nearly two-thirds when we're measuring it by the number of people affected. Now, of course, if a company is breached and an organization is breached, it's counted as one. One person, if you will affect, obviously it can affect hundreds of thousands, millions of people, depending on what happens like a breach of Equifax. Are you counting that as one or you counting that as 300 million? Because that's how many records were stolen? I'm not sure it doesn't say it doesn't go into that much detail, but because the number of data breaches went down and the number of individuals affected by the data breach plummets. It's telling us something, then that is okay. That these hackers have moved away from collecting massive amounts of information and are targeting user credentials as a way to get into corporate networks to install ransomware. We've got even more news out this week about the solar winds hack. We talked about this before, and this is a company that makes software that's supposed to help manage networks, which means it's supposed to help make those networks safer. No, as it turns out, they weren't making it safer and it looks like maybe four years bad guys were in these networks. We're being managed by solar winds, not with software, right? It's not as though solar winds was managing the network is solar winds sold software services so that you could manage your own networks or in many of these cases, they were actually managing networks of third-party businesses. I do work as well for high valued in value individuals, people who have a high profile that needs to keep all of their data safe and they are constantly being gone after. They're trying to hack them all the time and the way they're trying to do it. And I talked about this really the first hour today is by this password stuffing thing. So they're trying to get in and they were successful and now it looks like it wasn't just Russia. Apparently, China knew about this hack potential knew about this bug and was using it. And apparently, it also was not. Just solar wind software. Now they're blaming some of this stuff on Microsoft office. If you have an office three 65 subscriptions, apparently they were using that to get in. So the bad guys are getting very selective. They want to go against companies and organizations like government agencies that have information there's really going to help them out. That is absolutely phenomenal. So these are stats from the identity theft resource center. And I was thumbing through as I was talking here. So it's saying that more than 300 million individuals were affected by data breaches in 2020, which means they must be counting the people whose. Information was stolen, not just the people that were hacked but it is a huge drop of 66% over 2019. And the number of reported data breaches dropped to about 1100, which is about. 20% less than 2019. So it's good. It's bad. I think the mass data collection thing is over with now. They're not as interested in it, but they are very interested in strategic attacks as opposed to just these blankets. Let's grab as much data as we can because they want to get it into these government networks, which now we've, we know they've gotten into. And then you've got this double extortion thing going on with the ransomware, where again, the going after businesses and people who they know can pay. So that's good news for the rest of us, right? The home users. It's not good news so much for some of my clients, that's what we take care of. That's why we get paid the big bucks. Now how that works. Downright stick around. When we get back, we're going to be talking more about the news this week in particular, of course, security, Facebook, and their Supreme court. Stick around. The United States has a Supreme court. Our States each have their own Supreme courts. In fact, there's probably Supreme courts all over the world. But did you know that Facebook now has something that people are calling a Supreme court? This is interesting. Craig Peterson here. Thanks for joining me. People have been complaining about Facebook and what they've been doing for years. One of the things people have really been complaining about lately is how Facebook has been censoring people, particularly according to them anyways, conservatives.  I've certainly seen evidence of that. No question don't get me wrong, but there's also left-wingers who are complaining about being censored. Facebook decided it needed to have its kind of its own version of the Supreme court. You see what happened? Bins are you have a post on Facebook that is questioned. And usually what has to happen is somebody reports it to Facebook as being off-color or whatever it is, the reporting it as. And if two or three people report it, then it goes to the moderators. That same thing is true for some of the artificial intelligence. Some of it's reviewed by moderators as well. Here's your problem. Particularly when it comes to conservatives because you post something conservative on Facebook. And if you are noticed by some of these liberal hacks that are watching Facebook accounts, they will gang up on you. And they use these bots to pretend that there is an incredible rage that there are hundreds of people who are very upset by what you just had on Facebook. When in reality, no, one's upset and they're just trying to shut you down. And there might only be two or three people who actually know about it, but they'll use these kinds of artificial intelligence, bots to flood Facebook with complaints. And they're doing that on Twitter. The left is doing it all over the place. So what happens next? The big challenge for Facebook is there are 2.7 billion users. Can you even wrap your head around a number like that? That is just massive. So they've got 2.7 billion users, and now, obviously, not everybody's on every day. But some percentage of them. And I've seen it's in the hundreds of millions of posts every day on Facebook and they log in and look around. Facebook only has 15,000 moderators. So for 2.7 billion people, 15,000 moderators just isn't a lot. And the other problem is that the moderators are suing Facebook. And they came up. This was about a year ago. With a $52 million settlement with moderators and the moderators are saying, Hey, first of all, we're crazy overworked. And then secondarily, we've got PTSD. Post-traumatic stress disorder. And they're saying that they have this because of the stuff that they've had to see, they alleged that reviewing violent and graphic images, sometimes stuff. My gosh, I might've gotten mentioned here on the air, but they had to view these. For Facebook. And they said, this just led us to PTSD. I can see that particularly since they have to have so many every day. So many of these different posts that they have to look at. And they are clocked and they are third-party contractors. They're just, all this stuff adds up. Doesn't it? Moderators who worked in California, Arizona, Texas, and Florida from 2015 until last year, every moderator will receive a minimum of a thousand dollars as well as additional funds if they are diagnosed with PTSD or related conditions. So they're saying there's about 11,000 moderators that were eligible for this compensation. But this is a very big deal. It's difficult. How do you deal with that? They've got now 15,000 moderators who are reviewing the posts of these 2.7 billion users. There is a little bit of an escalation procedure, although it's a very difficult and because there are so many people who are. Complaining and trying to take care of everything. It is a very tough situation, really for everybody involved. So they've decided what Facebook needs Facebook's decided this themselves is they've got to moderate themselves a little bit better, and the way they are going to do all of this moderation is they're going to have this kind of Supreme court that supervises. All of the moderation going on within Facebook. So they call him the new to an oversight board and. Obviously with just one board, without very many people on it, it is only going to be able to handle a small number of cases. So they have been paying attention to some of the cases. And they're trying to set precedents that will be followed by the moderators and millions of other cases. It's basically the same thing that the U S Supreme court does, where they review cases that come up from the federal district court. They can have cases that are coming up from individual States as well. And then they set standards and, without going into all of the detail of disputes between district courts, et cetera, we'll see what happens in Facebook, but lower courts are treating these us Supreme court. Rulings and dicta as binding precedents for everything in the future. So it's not easy to do in our courts. We're certainly not great at it. And there are a lot of complex procedures. And even if you're talking about moderation where you bring a moderator in. And there are some standards for that in disputes between businesses where you'll pull in a neutral third party. And they'll just usually split things down the middle. But those are going to be difficult for Facebook to put in how they reviewed five decisions. These are pretty substantive. Sixth case apparently became moot after the user deleted the post. We have an uprising and Miramar right now. You might've seen it on TV. If you're paying attention. I know a couple of channels have been talking about it. But this is an interesting problem because the military has overthrown the potentially properly democratically elected government. What do you do if there is massive cheating going on in the election? We faced that question here ourselves. In Miramar, they went ahead and the military took over and imprisoned the president. There was a post talking about that and talking about Muslims in France and China. Another one about Azerbaijanis. I don't know if you've seen what happened with Armenia and Azerbaijan and lots of history going back there with the Soviets and they created this whole problem because they didn't like the Armenians, but anyways, of all of these five, they disagreed with the lower moderators opinions and they overturned them. I think it's really good. I looked at these cases and I was shocked. I think they're doing the right thing here. Isn't that weird? Hey, you're listening to Craig Peterson. Visit me online Craig peterson.com. Hey, did you know, there is a war, if you will, between Facebook and Apple? It is getting nasty. What's going on over there. That's what we're going to talk about right now. Your privacy, Facebook, Apple, and Android. Craig Peterson here. Thanks for joining me. My golly. You know what I think about Facebook when it comes to privacy, right? Facebook and Google. I think Facebook is worse than Google, frankly. They just don't respect your privacy. They will go ahead and look at anything that they can get their hands on. We'll at that point, just go ahead and pull it together and sell it to anybody that's willing to pay. I am not fond of that. And I think you can probably guess why, and I doubt your fond of that at as well. You're not fond of that either. Apple did something. If that has really upset. Facebook and Zuckerberg have been making a lot of noise about this, but Apple announced plans about a week ago to finally roll out a change that they were putting into place in iOS 14, which is the operating system for the iPhones and iPads that Apple has. They had announced that they were going to add it the late last year. And there was huge pushback from Facebook and a few others as well. What's going on here? Bottom line is that Apple is trying to force. Apps to be transparent. What privacy do you have? What data are they taking? And in the case of iOS, as well as Android and windows, and Macs, there has been the ability for certain applications to be able to look at other apps that are on the device. And by doing that, it can get data from it. They can figure out who you are. They can give a unique fingerprint based on what apps you have and what versions they are. They're pretty clever about what they've been doing in order to harvest your information. Now you might have noticed if you go in. To the app store that there's been actually a big change already. This is the Apple app store. If you go in there and you pull up an app, any app, so let's pull up Facebook and then in the app store, and then you click, obviously on Facebook, you scroll down the app store page about Facebook. And partway down, it already has privacy information. You want to click on more info project early if it's Facebook because it doesn't fit on that homepage for the Facebook app. And it will tell you everything. Everything that Facebook wants access to. Now, some of it's self-reported by the app developers. Some of it is the stuff that happened. Figure it out either electronically or by getting people involved. I would like to think that when it comes to something as big as Facebook, they really are going that extra mile. And making sure that yes, indeed, this information is valid, it is what it is. They may not, and I'm not quite sure, but look at all of the stuff Facebook is gaining access to with you. So that was a bit of a hit people were pretty excited. Oh, wow. This is great. And although Google doesn't do what we're talking about here quite yet, I'm sure they will be not in the way that Apple is doing it, but because remember Google makes money off of you and your information, Facebook makes money off of you and your information. So if you want privacy, you cannot use Google products like Android or. Chrome. And if you want privacy, you can't use Facebook. So it's as simple as that. Of course, the big question, and we talked about this earlier in the show is how much privacy can you expect? How much do you want? What's legitimate, right? All of those types of questions. So what Apple's doing now is they said that in early spring of 2021, they are going to release this new version of iOS. And here's what happens. They've added something and this is according to a white paper and Q and a that Apple sent out. They added something called app tracking transparency, and this is going to require apps to get the user's permission before tracking their data across apps or websites owned by other companies. Under settings users will be able to see which apps have requested permission to track so they can make changes. As they see fit. You might have noticed that already under settings as you can look at the microphone settings, it'll tell you. Okay. Here's the apps that I have asked about the microphone and you can turn them off. Here's the apps that have asked about the camera. You can turn them off. So they're adding more functionality. They also, in the FAQ, they said that app developers will not be able to require users to allow tracking in order for those users to gain access to the full capabilities of the app. Now, you know how I've talked before extensively about how, if it's free your, the product. So what Apple is doing is they're saying, Hey guys if the user says, no, you can't try it. Track me across apps. No, you can't get it. This privacy information, which Apple's letting you do, they cannot Labatt automize. The app is what it comes right down to. So it was in September last year that they first said they were going to do that. Then they delayed the implementation of this tracking policy. So the businesses and app developers could get more time to figure this out. One of the things that I think is fascinating here is what Facebook's doing with fighting back. Oh, and by the way, Apple has not just gotten complaints from Facebook. There are other marketers and tech companies that frankly it makes Apple more vulnerable to some of these antitrust investigations that have been. Started really against some of these big tech companies. Although, I don't really expect much to happen under the current administration in Washington because frankly, big companies love big regulations. Because they can afford to comply with them, but startup little companies who are competitors of theirs cannot afford the lawyers for the paperwork and everything out. I look at the CMMC, we do a lot of work for the DOD, department of defense contractors, where we secure their networks. We secure their computers, we secure everything. We put it all together. And we also, for some of them there's guys, there's a 50, $50,000 upcharge for this. And that's because we're cheap. Believe it or not, it is a lot higher for other companies to do it, but we do all of the paperwork, putting together all of the policies, all of the procedures, what they have and. Auditing everything for them. And we're talking about a case and a half of paper thinking of the big cases of paper, right? 500 sheets and the ream and how many reams in a box? 10 20. I'm not even sure, but literally cases. And we. Printed it up, we wrote it all up, printed it all up, delivered it to a client just a few weeks ago. And it was a huge box of three-inch ring binders. It was all in and they didn't all fit in there. They're the big guys in the department of defense probably love this because they pay a million bucks to the people, the generate the paperwork for them internally. And they know the little guys can't afford to have full-time paper pushers. And so that's why, even though we're talking about months worth of work, why we charge 50 grand, which is a heck of a lot cheaper, believe it or not. And it's a huge discount for us. So I don't expect that the fed you're going to come up with a solution. That's truly going to help the little guy here, but Apple's announcement praised by privacy advocate nonprofits as well. And Facebook apparently has been buying full-page newspaper ads claiming it's going to hurt small businesses in a way it will cause it can make advertising. Just a little bit harder. And apparently, also Facebook has decided to rewrite its apps. So no longer even requests to access, cross-app access to your personal information. We're going to wrap up, talk a little bit about Comcast data cap, and some of these SolarWinds hack victims that didn't use SolarWinds, and ransomware payoffs have surged, even though the number of people affected has gone down. Make sure you get on my email list so that you get all of the important news. You're going to get some of this little training I'm doing and the courses that we've developed. The only way to do that is to go to Craig Peterson.com/subscribe. That's how you get on those lists and I'm not sitting there and pounding you or anything else, but I want to keep you informed. So there you go. We're probably going to increase our volume from one email a week to three so that we can provide you with a little bit more training. I want to keep these down to something that just takes you a few minutes to go through, but could save you millions of your business and tens of thousands, your retirement, if you are a home user. So make sure you are on that list. Craigpeterson.com/subscribe. Comcast. I know many of us have Comcast, I certainly do, is imposing data caps on many people in many parts of the country. That includes people to the South here, Massachusetts residents. What do you think they're doing down there? The state lawmakers have proposed a ban on data caps, a ban on new fees, and a ban on price increases for home internet services. The idea from their standpoint is we have a lot of people who are working at home because of a lockdown. What are they supposed to be doing? I'll take my daughter, one of my daughters, as an example, she's working at home. She used to work in a call center she'd go to every day. Now she's working at home. Are they paying a wage differential for her? Are they paying for the electric bill? They're not even paying for the phone bill or the phone. She has to provide her own phone. She takes inbound calls for a call center. Can you believe that? It's just amazing what's happened. The company is saving just a ton of money because people don't have to go into work. You can bet they're going to dispose of some of this space that they've been. What's happening here, we are using more bandwidth than we've ever used because more people are at home and it isn't all business related many are watching Netflix or you've got Netflix on in the background while you're working on stuff. It's just so common to do that. What data caps are doing is they say you can only use so much data a month. Then there's usually a penalty of some sort. In Comcast's case, they said for the first quarter of 2021, I believe is what they had come up with. We'll just warn you that you go over your data cap then they'll charge extra. I have a friend who has Comcast and he said, I think it took him like three days before he went over the data cap. That's not long.  It's because they're streaming TV. They've got kids working from home. Then you've got meetings that they're going to, that are now streaming. So I can see this, but from Comcast side, they now have to handle more data than they've ever had to handle before. Because we are using it, like for my daughter, she actually has a cell phone, but all of the calls are routed over the internet. Cause her cell phone hooks up to the wifi in the house and the calls come in and go out via that wifi.  It goes through the internet, it goes to her phone carrier's network. Then it goes to the call centers network. So there you go. What does that need? That needs to make sure there's no jitter. You don't want voice packets to be dropped because then it sounds terrible. It's very obvious when audio is dropped. I don't know if you've noticed if you're streaming something from one of these online streaming video services, but sometimes. It will hiccup a little bit, but have you noticed that with the smaller hiccups, the audio is fine and the problem is in the video. Now they do that for a couple of reasons, obviously video uses more bandwidth than audio uses, but the other reason is people tend to get more annoyed by audio fallout and audio problems. Comcast is saying, Hey guys, look at what we have to do with our networks. We have to expand them. We have to increase them. Now I've got to bring up again the Biden administration because of what they're planning on doing with this fairness doctrine on the internet. What they're planning on doing is saying, Hey, Comcast, just because this person uses five terabytes of data a month, you should not be charging them more than grandma that uses 10 gigabytes a month. Thousands of times more bandwidth requirements, you're not allowed to bill them differently. Cause a bit is a bit which is absolutely insane. I don't know how they can justify this sort of thing. So what's going to happen is you get companies like Comcast or other internet providers who are going to say. We are not going to invest any money into expanding our capacity because we can't charge for it. Doesn't that make sense to you? It makes perfect sense to me. By getting the FCC involved, it's just going to be crazy. Ajit Pi resigned when President Trump was leaving, he used to be the chairman. He actually had a head on his shoulders, but these new people President Biden put in there, it's insanity what they're trying to do with our networks. It's going to make it much worse. Comcast is putting data caps in. You hit the data cap it, they're just going to slow you way down. That happens too, with a lot of our cell phones, our cell phone carriers, if you use more data than they've allotted to you, they'll drop you back. So most people have 4g. Yeah. Okay. Your phone's 5g, but really guess what? You're not getting 5g. It's very rare unless you are on the T-Mobile slash Sprint plan. T-Mobile more specifically because nobody else has the coverage that T-Mobile has for 5g. So you're using 4g LTE, you hit your data cap. They're going to drop you back to 3g, which is really slow comparing the two together, all the three of them, frankly, but it's very slow compared to a 4g LTE. In mass, by the way, I should mention Verizon files and RCN. Do not impose the data caps. It's just our friends at Comcast that are doing that Vargas and Rogers. They let a group of 71 different Massachusetts lawmakers urged Comcast to halt the enforcement. By the way, the data cap is 1.2 terabytes per month, which is actually quite a bit of data. You'd have to spend a lot of time streaming TV. The cap does hurt low-income people is no question about it. If you are being forced to work from home because of the lockdown, the government's forcing you to work from home. They put their fingers in anything, and that just never seems to work out anyhow. We'll see what happens down in mass with Comcast and these guys.

The Be THAT Mom Movement Podcast: Protecting kids in a digital world
Episode 52: How to help you AND your kid or teen have more FOCUS!

The Be THAT Mom Movement Podcast: Protecting kids in a digital world

Play Episode Listen Later Feb 23, 2021 17:12


Focus is hard to come by with all the digital and worldly things! Check out this episode for a few tips to help you AND. your kiddo find more FOCUS! As mentioned in the episode, for MOM focus, try out https://www.mysoulcbd.com and use code BETHATMOM for a discount if you want a natural way to help you with anxiety, sleep, or chronic pain. (Always discuss any concerns with your primary care provider before trying anything new.) For more info on Shakeology to ensure you are getting in powerful nutrition each day and to complement your wellness efforts, check it out HERE and contact me for current specials when combined with a fitness/nutrition library subscription! Email me at dolly@dollydenson.com . Check it out here for info about the two newest programs: #MBF or 9 Week Control Freak.  I HIGHLY recommend both of these as a great way to start or crank up your workouts, and all options include access to the entire workout library of top notch workout programs as well as nutrition guidance and recipe library included!  . Virtual Fit Club for virtual accountability and support included FREE to all that join with a bundled pack that includes the annual virtual library and Shakeology and/or pre and post workout supplements! I always utilize these to help me with my workouts and wellness habits to be strong for myself first, and bonus bonus bonus points that with these we can model these behaviors for our kids! . Get your BARK subscription today! Use code BETHATMOM at https://www.bark.us For a FREE DIGITAL RESOURCE GUIDE download CLICK HERE or go to https://www.dollydenson.com/digitalresources Stay connected with the Be THAT Mom Movement via our channel in the Telegram app: Subscribe HERE or search for @bethatmom on the app. Get tips and tools for your own wellness using the Align Your Life Wellness channel on the Telegram app: Subscribe HERE or search for @alignyourlife on the app. You can also get more info at https:.//www.dollydenson.com For a FREE DIGITAL RESOURCE GUIDE download CLICK HERE or go to https://www.dollydenson.com/digitalresources For more info on the Tick Talk Watch: CLICK HERE. Use code BETHATMOM for $10 off!! Grab the Pinwheel phone for your kid's first phone, and avoid the addiction and battle created by giving a smartphone too soon: Click here or go to https://www.pinwheel.com/?via=dolly and use code BETHATMOMTEN for a discount!  More info on the Gabb Wireless phone: CLICK HERE or use code BETHATMOM for a discount at https://www.gabbwireless.com Add a BARK subscription to your Pinwheel phone or smart phone for added security. Use code BETHATMOM for 20% off for life! https://www.bark.us BARK HOME: CLICK here!! Covenant Eyes 30 day free trial CLICK HERE!!    FULL TRANSCRIPTION: Speaker 1 (00:00): Focus focus, focus. It is like the focus of what we need to be doing in order to be successful in all of the things in our lives. Right? Well, I think focus has gone out the window for most of us, with all the things we are dealing with right now, what we've dealt with in the past year, all the virtual learning, all the digital things, all the things, focus is what we all need, right? That's what we're going to talk about today. And I'm going to give you a few tips to help you out. Speaker 2 (00:28): Welcome to your source for tips, tools, and support to help you be that mom that is tuned in and proactive for yourself, your family, and for the wild ride of raising kids in this digital age, inspired by a mother's love with a relatable real life. Proud to be that mom flair. This is the bead that mom movement with your host, Dolly Denson, Speaker 1 (00:53): Check this out. If you were a mom that is looking to give your kiddo a phone, but you don't want to open up the world of the smartphone to them yet, check out the pinwheel phone. The pinwheel phone is the latest and greatest for dumb smartphones. It gives you absolute control over what they do and who they can contact, and we'll help them to develop healthy habits around using a phone, check out pinwheel@pennwell.com use code be that mom 10 for a discount. So focus is just one of those things that if you've listened to my podcast, or if you've researched the effects of all the digital things, being on a phone, being on a computer, always being on screens, focuses affected by those things just inherently in the nature of how those things are, but then add on the distractions of the world right now, things going on in 2020 with the pandemic things going on in 2020 with the elections in the U S if you're in the U S worldly events going on around the world related to all of the things going on, similarly in the U S there's a lot of things to be distracted with. Speaker 1 (01:59): And so I've seen in myself personally, having much more trouble focusing, I have personally have my nurse practitioner job, and then I have this side business of doing this podcast and my be that mom movement community. And I'm working on a couple of courses in different things for this. And then I have my wellness coach health coach business, where I help women to prioritize their wellness, their fitness and nutrition, and staying accountable to their goals. And I help providing help, like link them up with tools and then providing them a community to connect. So I have a lot of things going on, so I need to be focused and I've always had kind of a lot of things going on, whether it was these things or it was when the kids were younger, there's always been stuff going on. And I've never struggled with focus as much as I do right now. Speaker 1 (02:52): And I think some of it is at some level of anxiety. That's kind of always there because of everything I see happening and trying to process it all and deal with it all the extra challenges of my job and wearing a mask and all of the things I've never had so much trouble focusing. And this has been an observation that I've noticed over the last couple of months. I just feel like I'm spinning my wheels a little bit when it comes to really sitting down and getting things done. So recently my youngest came to me and said that he was having trouble focusing as well. And it was just a really difficult struggle with getting focused on school and getting focused on all of the things. Now he's attending a completely online school. He doesn't go attend school anywhere. And that has been a huge blessing. Speaker 1 (03:37): He was attending that before this pandemic stuff started. So it's been a huge blessing to have that in place. So his schooling has never been disrupted, but what has been disrupted is just having a set routine and having time to do his school where there's not always something going on right now. My husband works from home. He has his own business. He's working from home. One of my, my oldest daughter. She works from home. My next one is in college and she attends some classes in person, but also is at home a lot too. And then I personally have my nurse practitioner job where I am out of the home, but I come back home to the rest of my work. And then I have my side businesses. So everything's disrupted, like, it's just all been in disarray for the past year. You know, I'm sure you relate to this to some degree, right. Speaker 1 (04:28): Where it's just like world, as we knew it before is different. And I personally used to have a routine of things being up in the morning and I had my little quiet time, my little morning routine and my exercise and everything like that. And it was just this thing that I did. And I was, I, I like had strength in that. And then once, March and April of last year rolled around, it's just like, everything has been blown out of the water and I've never found that place of peace and focus again. So I see that in myself, self, my son expressed that he's having a similar thing. And while I don't think there's anything wrong with add meds and, you know, getting medications, if that's what you and your child's doctor or pediatrician determines is best for your situation. I wanted to find something to help out my son right now and see if we can find a way to help him focus outside of doing any medications or anything like that. Speaker 1 (05:23): And I certainly don't have a show here where I offer advice on medications or treating mint or diagnosis. So this episode, I just want to share with you some of the things I found that have been helpful for me and my family in this situation, thinking that maybe that will be helpful for you as well. If you're having trouble with this. Now, some of this may be easier to do with a younger child, but I think that it's valuable regardless of whatever age your kid it is. And I think it is a great thing to kind of set in place and get in for your kid and their daily routine before they are up and out of your nest and, you know, doing their own thing, because it's absolutely something that creates a sort of foundation and strength for you. And for them just as a way to function in life, regardless of what's going on, regardless of how old they are, or you are, it's just, you know, a great habit to put into place as a foundation for your own health and your wellbeing and your mindset and all of the things. Speaker 1 (06:24): Okay. So I want to share with you six tips that are just basic general tips you can use, you can implement for your kids. And then I want to share with you a couple of recommendations. I have specifically for you as the mom of things that have helped me. So the first thing to help with focus would be if you don't already have it to establish some sort of morning routine and just a routine in general for your kid. So that would mean a somewhat set bedtime at night, where they put their electronics up in your room or a central place in the house. They get a good night's sleep. They wake up at on a certain schedule, even though you'll probably get pushback from them. If they're not used to that sort of routine, they really do need a routine in place to help guide them. Speaker 1 (07:10): So if you have a morning routine of them getting up, you know, brushing their teeth, getting breakfast, whatever, you know, things that they do before they start school, even if they're not going outside of the home, have that morning routine in place now to help them to kind of get grounded and focused in the morning. The second thing that could be helpful is wearing regular clothes versus just staying in pajamas all day. It gives them the feeling that, you know, they're going someplace and it's not just a lazy day of laying around and doing nothing, you know, kind of wake up your body by putting on those normal clothes that they would be wearing. If they're going to a brick and mortar school, the third thing is having a schedule for the day. So if your kid isn't in a school to where they have like set times that they have to be online, then I would set up a schedule for when they do sit down and do focused work. Speaker 1 (08:01): And my son currently because of the weather conditions in Texas, where I'm at right now, doesn't have set classes for this week, but has assignments. And so I've been trying to implement, you know, get up and let's get your work done and then have free time later. So whether you have synchronous schedule or not just having a defined schedule of what's going to happen today, when lunch will be, when snacks will be, when your classes and schoolwork will be, and then that rolls right into the next tip is that having an end to the day. And that kind of means like, if they're on their computer, if they're on digital things all day long for their work is having an end to the day and an end to the digital things, a break from the digital things, a mind rest from the digital things. And then also just having unstructured time. Speaker 1 (08:48): So whether that is allowing them to play a game or whatever, you know, unstructured time where they get to choose they're doing, but also be mindful of like what I've talked about in some other episodes about having a time where their mind is not connected to something digital. And it's connected to something in the real world that doesn't offer like instant gratification of a game that they're playing, but something that they use their imagination for allowed them to get bored and get creative, you know, something that is like normal childhood play, manipulative play activity, exercise, you know, getting out and doing something where they're active and like, just try to implement that into their day. And that was actually, my next tip was non-digital time. So time where they just don't have themselves connected to a computer. And then the last thing is to discuss with them, their struggles with focus. Speaker 1 (09:40): If you do notice that they're having trouble staying on task, break things down into smaller increments of time, if that's what you need to do, discuss with them, if what their distractions are and together, try to make a plan on how to change that. I absolutely recommend getting them out of their bedroom, if it is their bedroom, where they were, you were trying to get them to do school because that's their place of rest. That's their place where their body is typically ready to wind down into sleep. So for us personally, we moved them into the kitchen or the dining area, and he sits at a table for his schoolwork. If that's too distracting, then if you have another place that's just outside of the bedroom that they can set up and do their schoolwork. I've found that that's helpful, but meeting them where they're at and figuring out together how you can tweak what you're doing, like with more breaks in between, or some type of different structure, different location in the house, those types of things, all of those things have helped us. Speaker 1 (10:37): So those are all the tips I have as far as the virtual learning and to help with focus in your kiddo. If you feel like these aren't enough for you and you need outside, help, certainly discuss with their teachers. If you need a therapist or need to talk to their doctor, those are all good things to do. So highly, highly encourage you to just have an open and honest discussion with your kid. Talk about the importance of school and also the importance of getting off of the digital things and doing something outside of that. And of course, what plays into this, that I've talked in other episodes about is just like the distractions that are inherent in the digital things like going off to you tube and doing other things other than the task that they are supposed to be doing on their computer. And that takes you down to some of the other topics I've covered about a layered approach with your electronics. Speaker 1 (11:33): If you have a Google Chromebook or just a regular computer setting up your wifi, parental controls and bark home, those types of things to where it limits certain websites at certain times, then that can kind of help guide you in that regard, keeping them on task and focused on what they're doing. This is certainly not something that is simple and easy to do. And it's kind of a new frontier for all of us. If we have not already been homeschooling or having our kids go to some type of virtual school, it has created a whole new world of things. So just recommend that you try to get into the routine, open communication, putting on regular clothes, having a set time for being off of the electronics and then just meeting them where they're at and trying to work together to find a way to be more focused and to stay on task when needed. Speaker 1 (12:24): Okay. Now the other thing that I wanted to talk about is related to you as mom and these same tips can apply to you, but I just want to reiterate that your wellness, your health is so, so very important. So a morning routine is something that's great for you. I would have a workout routine where you are exercising regularly to some degree that you are getting your body moving, pay attention to your nutrition, of course, and hydration. All of those things are very important to help you stay strong. And then in addition to that, as I've mentioned, in some of my episodes, I like to use something called my soul CBD. It is a CBD product or line that I trust and I've researched. I was very distrustful of the whole CBD industry and really kind of worried about it. And I discovered that you really have to find a company that you trust that sources from the U S that has third party testing to make sure there's no THC and just the quality of it and all of that. Speaker 1 (13:21): So I highly recommend that as a way to help you with anxiety and sleep. And then if you're someone who has chronic pain, it can help you with that as well. So I use my soul CBD, gummies, they're tincture and their capsules on a daily basis to help me with anxiety and just kind of chilling with everything that's going on. So if you're interested in checking them out, go to my soul, cbd.com and use my code, be that mom altogether for a discount. The other thing that I highly recommend for focus specifically is something called beekeepers naturals, and they have a, they call it B elixir, and it is basically something that helps it's called a nootropic. It's basically something that helps to kind of feed your brain with what your brain needs to function and to focus. So it's giving your body natural nutrition, your mind, natural nutrition, and helps you focus. Speaker 1 (14:14): So when I take my soul CBD to help me kind of relax and not be as anxious, and then I use the B licks are from beekeepers naturals. That helps me so, so much to focus. It's kind of crazy how much it helps me focus. And then the third thing is I have a super food. I call it my power up smoothie, but it's basically a smoothie that has protein has adaptogens has phytonutrients, has probiotics, prebiotics that I say protein and superfoods. So it's very high quality and potent, meaning that a lot of smoothies that are out there are like their nutrients are destroyed in the process of them being manufactured and shipped to you. They basically get to you and they're just powder and don't really have any nutritional value while there's only a handful of smoothies out there that have in them, what they say they do. Speaker 1 (15:07): So I personally drink one called Shakeology and it helps me with just giving myself nutrition that I need in order to function well. And then they also have a boost that you can add to it that is called focused energy, and it has natural caffeine in it, a naturally sourced caffeine that helps with focus as well. I will put a link to these in the show notes, if you want to check them out. And if you are interested in them, if you contact me, there are some bundled specials that I can offer you that where you can try these things at a discount while also getting access to the library of workouts that I use to make sure that I'm able to prioritize my wellness every day from home without having to pay for a gym membership without having to drive somewhere. It's something I access from home has all kinds of nutrition and fitness tools, as well as the opportunity to try to smoothie when you subscribed to that at a huge discount from buying it separately. Okay? So all of those things, I highly recommend. They are all things that I implement daily for myself to prioritize my own wellness so that I can be strong for my children, which in my opinion is like the whole point of our lives as moms is to do the best for ourselves as well as our children and everything that we can give our kids has to start with her own wellness. Okay. So I hope this was all helpful for you with focus and all of that. And I will chat with you. Speaker 2 (16:37): Thanks for tuning in being that mom isn't easy, but together we can be that mom's strong. Don't forget to leave a review, connect on social and join. Dolly's free community till next time. Hey, Speaker 1 (16:51): If you are a mom that has a lot on your plate, like I do, and you struggle with anxiety or sleep or even chronic pain issues, please check out my soul cbd.com. They are the one and only CBD source that I trust. And you can use my code, be that mom for 15% off of your purchase.

Teachers on Fire
186 - GOOGLE MEET Changes, RECLIPPED Chrome Extension, and a TABLET for CHROMEBOOKS

Teachers on Fire

Play Episode Listen Later Feb 21, 2021 28:11


Are you a Google educator? Do you learn and teach with Chromebooks or in a Google-based school? Join host Tim Cavey and John Sowash from the Chromebook Classroom for the first edition of the Chromebook Classroom update, a monthly episode that explores the latest developments in the world of Google Chromebooks, Classroom, Chrome extensions, and cloud-based apps for learning. IN THIS EPISODE 1. Google Meet is introducing the ability to add custom backgrounds. 2. Native screen and video capturing is coming to Chromebooks soon! 3. How to integrate YouTube clips with learning activities in Google Slides. 4. How to use format options in Google Slides to define the start and end points for YouTube clips. 5. How to use the ReClipped Chrome Extension to add notes and timestamps to YouTube clips that you don’t own. 6. One by Wacom is the first Chromebook-compatible drawing tablet LEARN MORE from JOHN SOWASH

Good Morning Gwinnett Podcast
32,000 New Chromebook Computers Are Coming For Gwinnett County Public Schools Students

Good Morning Gwinnett Podcast

Play Episode Listen Later Feb 16, 2021 62:12


www.GoodMorningGwinnett.com Gwinnett County Public Schools recently ordered 32,000 laptops for students, Superintendent J. Alvin Wilbanks told the county’s state legislative delegation recently in a videoconference.Wilbanks said the new Google Chromebooks should arrive sometime around next month.SOURCE: www.AJC.com

Squiz Today
Monday, 7 December - Australia's international arrivals system is tested; The Foreign Relations Bill on Parliament's agenda; The clock is ticking on Brexit countdown; and a hairy panic...

Squiz Today

Play Episode Listen Later Dec 6, 2020 9:29


The Squiz is your shortcut to the news. “Under the shade of a Coolabah tree”More details, and links to further reading for all of today's news can be found in The Squiz Today email. Sign up (it's free!) - www.thesquiz.com.au .PS. It's Day 1 of the 10 Days of Squizmas. Prizes up for grabs all week - check out your Squiz Today email. Space capsule lands near Woomerah: http://www.hayabusa2.jaxa.jp/en/topics/20201206_fireball/ Google Chromebooks (sponsored): google.com/chromebookDisclaimer: Battery life may vary based on device and upon usage and other conditions See acast.com/privacy for privacy and opt-out information.

Squiz Today
Monday, 30 November - Record temperatures over the weekend; South Australia on high Covid-19 alert; China hits the wine industry with new tariffs; and Santa's Covid-19 immunity

Squiz Today

Play Episode Listen Later Nov 29, 2020 8:14


The Squiz is your shortcut to the news. “Feel it in the air tonight”Win a Dyson appliance of your choice (to the value of $800) by sharing The Squiz Today using your unique referral link. For details, and your link, head to The Squiz Today email.More details, and links to further reading for all of today's news can be found in The Squiz Today email. Sign up (it's free!) - www.thesquiz.com.au .Google Chromebooks (sponsored): google.com/chromebookDisclaimer: Pre-download content and enable offline access for documents, presentations and emails to view offline later. See acast.com/privacy for privacy and opt-out information.

Squiz Today
Monday, 23 November - Another step towards covid-normal for Melbourne; World leaders get online for the G-20 summit; Labour shortages impacting fruit and veggie producers; And a good night at the Australian Podcast Awards

Squiz Today

Play Episode Listen Later Nov 22, 2020 8:56


The Squiz is your shortcut to the news. “You should hear how she talks about you”Tucker celebrating at the Australian Podcast Awards: www.instagram.com/thesquizMore details, and links to further reading for all of today's news can be found in The Squiz Today email. Sign up (it's free!) - www.thesquiz.com.au .Google Chromebooks (sponsored): google.com/chromebook See acast.com/privacy for privacy and opt-out information.

EdTech Situation Room by @techsavvyteach & @wfryer
EdTechSR Ep 198 - We Loved Thee, Google Expeditions

EdTech Situation Room by @techsavvyteach & @wfryer

Play Episode Listen Later Nov 20, 2020 60:12


Welcome to episode 198 ("We Loved Thee, Google Expeditions''") of the EdTech Situation Room from November 18, 2020, where technology news meets educational analysis. This week Jason Neiffer (@techsavvyteach) and Wesley Fryer (@wfryer) discussed FCC changes to United States bandwidth spectrum affecting WiFi and automotive emergency communication, faster Google Chromebook chips and Google Product Black Friday specials, and the benefits of YouTube Premium. The depressing demise of both Google Expeditions and Google Tour Creator in Summer 2021, Google Pay's impressive upgrade, GitHub's decision to support fair use, and favorable reviews of Apple's new M1 chip powered laptops which are convincing Jason to return to the Apple user fold were also highlighted. An alarming revelation about the poorly perceived reach of Facebook's economic surveillance methods was also discussed. Geeks of the Week included Wes' preview video for the December #digiURI Media Club meeting (discussing the March 2020 TED Radio Hour, "IRL Online" and the case for remote learning at home with TWO monitors. Our show was live streamed and archived simultaneously on YouTube Live as well as our Facebook Live page via StreamYard.com, and compressed to a smaller video version (about 100MB) on AmazonS3 using Handbrake software. Please follow us on Twitter @edtechSR for updates, and join us LIVE on Wednesday nights (normally) if you can at 10 pm Eastern / 9 pm Central / 8 pm Mountain / 7 pm Pacific or 3 am UTC. All shownotes are available on http://edtechSR.com/links.

Craig Peterson's Tech Talk
IT Wages are down, Big Tech and HIB Visas, Ransomware and the National Guard plus more on this Tech Talk with Craig Peterson Podcast

Craig Peterson's Tech Talk

Play Episode Listen Later Oct 31, 2020 76:30


Welcome!  Craig has an exciting podcast that covers quite a few interesting topics this week including USB safety, Properly disposing of your smartphone before getting a new one, Why the National Guard is being used to investigate Cybersecurity incidents in Louisiana, Iran, and threatening mail sent to democrat voters, Phishing is back in the news and why you must train your employees to watch for it.  Then he talks about IT Wages and problems with the H1B Visa program. For more tech tips, news, and updates, visit - CraigPeterson.com. --- How safe is your USB drive?   How to protect your privacy when selling your phone   Louisiana Calls Out National Guard to Fight Ransomware Surge   U.S. government concludes Iran was behind threatening emails sent to Democrats   How AI Will Supercharge Spear-Phishing   IT Job Wages Are No Longer 'Exceptional'   Need for 'Guardrails' in Cloud-Native Applications Intensifies   GIRDUSKY: Corporations Use The ‘STEM Shortage’ Myth To Abuse Guest Worker Programs --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] We've even seen where USB thumb drives come pre-infected with viruses and other pieces of nastiness. So, just how safe is your USB drive in this day and age of us taking them home and to work? Hi, everybody, Craig Peterson here. Welcome. We're going to be talking not only about USB drives but how to protect your privacy when you're selling your phone. Okay. We've got a national guard call out in Louisiana over the election. We've got the government concluding that Iran was behind some email sent to Democrats, and we've got artificial intelligence that's going just to supercharge spear phishing. We'll be talking about that. Defining both of what they are. IT wages are no longer considered exceptional. That's a study from Harvard business school. Guardrails in cloud native applications are needed. That's a great call. I love that. Corporations using this STEM shortage myth to abuse the H1B programs. H1B visa programs that President Trump has been trying to clamp down on. What do you call these little devices that we have these a USB drives, thumb drives? What do you call them personally? Probably about 10 years ago, I grabbed the domain. I registered thumbdrive.com and I never did anything with it. I was thinking, Oh man.  I could have a whole bunch of different thumb drives up there.  I ended up letting it go when I was really low on cash one time. I just went to it today. Thumb drive.com and it's somebody selling toshiba thumb drive type stuff.  It's still the disappointments in life that you tend to remember much more than the successes. So it's a bit of a shame. But thumb drives have become way more useful in this day and age. We're going from work to home. Our kids are taking their work for school. They've got to bring it to the teacher. Many of the times, of course now it's electronic, right? We upload it. We don't even use FTP anymore, but we upload it. We download it and we might email it. We use Box or Dropbox or Google drive in order to share files. That's really the most common way to do it nowadays. But thumb drives are still out there. They're still in wide use and I still have a supply of them and somehow they all seem to keep disappearing and that's where the problems start, really? If you own at least one thumb drive, you've transferred a file. You might've used it as a method of backing up some of your documents or your photos or other things you might like to carry your work with you. So you can dive into it at a moment's notice and you keep it in your pocket. I have one that is waterproof. It's a light fireproof, and it sitting there on my key chain. So that I have it if I ever need it in order to do something and you know what, I've used it a few times, but not so much. I've even got thumb drives in my wallet. Just really thin ones in case ever need them. I have used them from time to time. If you're like most people. You might be using thumb drives that aren't necessarily trustworthy. So let's talk about that for a minute. Students tend to use flash drives to print out study materials at  a Kinko's store, or maybe they go to a library to grab something. Maybe you are using it to move documents back and forth to your work, to your family events, soccer church or whatever it might be. Now, when we're talking about kids, they also tend to lend their classmates these drives, and they might have their notes from their class on them. They might've made their notes on a Google Chromebook, and now somebody plugged it into a windows laptop or Mac. Think about spreading diseases, right? It's the same sort of thing as they're passing them around and sharing them.  It's not just kids in school, in college. It's also friends at the office. It's friends that you have at home and you really can't be sure of these things and how protected they're going to be.  If any of those thumb drives has been infested with malware, it's really very possible that your computer, if you've used one of these infected thumb drives, that your computer is now infected as well. Some devices like your Macs, for instance, you've got a Mac laptop is immune to all windows viruses that are windows based. So it can spread them. It's like a little super spreader. So that if there is a virus for windows, that's on your Mac in a file, your Mac, will be just fine. It doesn't care. But when you now transfer it to somebody else, or you put it onto a drive you're in big trouble. here's some options that you can take. Microsoft has made a big change a couple of releases ago, major releases in the windows operating system. There used to be an auto run file that was there, on, for instance, a CD drive or a thumb drive. So when Windows opened it up and said, okay, I'm going to run this file. And that file would do something like cool, play a movie for you. Or it might run a video game or whatever it's supposed to be doing on there, but the bad guys started taking advantage of that pretty early on. They started using this crass cross-contamination route using these auto run files as a way to send all of their malware to other people. Okay, so you have to be careful. We're going to get into some solutions here in just a minute. What really do you have on your thumb drives? I want everybody to think about it for a minute. What are you using them for? How can they be misused?  What happens if they're lost? I mentioned that this week on the radio, what happens if you lose the thumb drive and it has some intellectual property on it?  has personal information on it? I know a couple of listeners who are using external drives, which are more common now than they used to be. They plug into the USB port. It's the same sort of problem. You can't put these into your pocket like you can a thumb drive, but you can certainly share them. You can move them around and they're using these USB drives now spinning media, or sometimes even SSD, they're using them to move stuff back and forth. So how do you deal with it? One of the ways is what we tend to do for our customers that need high security.  We remove the mechanisms for people to be able to use them in the first place. We'll disconnect it from the motherboard if that's possible and we'll fill the port with epoxy. So people can't just put it in there. Now most of the time, they're not being malicious. They just want to plug it in and grab this file. But there are people who are malicious who are trying to steal data. Which is why, again, in high security, We remove those USB ports. So that the thumb drives just can't be put in there. Companies like IBM have opted to completely ban removable storage devices, period. It's a real big deal. They were talking about all of this at WeLiveSecurity.com Amer Owaida is his name who was talking about some of this stuff. But when he looked around, he found that IBM was banning it, many other major companies were.  Let's start with what can be done. First of all. When we're transferring sensitive information from one place to another. So for instance, we might be tightening up security in a doctor's office or helping a doctor's office upgrade their systems, and we need to send all of their patient data. To the third party who now has this new system that they're going to be starting to use in the doctor's office and we want it to be secure. So we have a disk drive cabinet that is encrypted the whole thing is, it's just a little thing. It's not much bigger than a disc drive and it has a drive inside of it. You have to enter the key when it powers on, and then it uses that key for the encryption on the disk So even if somebody breaks into the case, it doesn't matter because the disk that's inside is encrypted using this key. So you could consider doing that. There are thumb drives that have built into them. Thumb print readers. Most of them that I've seen are pretty easily defeated, but let me tell you that's harder to do than, having to defeat one of these things than just plugging in a drive that's not encrypted okay. So step number one. You need to have, if you can use them, drives that you can trust for confidential information. That means they need to look different. They need to be different than the drives that you are using at home for your personal data, for your personal backups.  So first of all, they need to look different. So maybe just having that thumbprint reader on the drive is enough to remind you. Sensitive data should be on that drive with a thumb print reader. The next thing you probably want to do is encrypt all of the sensitive data that you want to load onto the drive. Now there's a number of ways to do it. You've got built right into windows, full disk encryption. The same thing's true for your Mac. So you could encrypt it that way. You can also use something that's free. I think it's pretty easy called PGP, which uses public keys.  You encrypt the files before you put them on the disks. I do like the hardware security solutions for the thumb drive that uses a pin code. That's probably best, as I said, I don't really trust the biometric scanners, but there are some really great articles out there about these thumb drives, and what could possibly go wrong. Now there are thumb drives that are designed to burn up your computer, literally melt it down. Don't pick them up. Oh yeah, we've used that trick against Iranians before. Our smartphones have our lives on them. There are some very quick ways to make sure all of your data on them are destroyed because we're upgrading these things left, right, and center.  It isn't just about e-waste as they call it. It's about your personal information. Let's start getting into our security here on your phones. People are getting rid of their phones at record rates. In fact, in the market for new customers, their smartphones have dropped dramatically. We've reached saturation in most markets, worldwide, where people who want a smartphone have a smart phone, people who want an iPhone or maybe an Android, heaven forbid, have got those devices and they're pretty happy with them. Now, Android is going to be cheaper initially. If you ask me, it's way cheaper in the long run to have an iPhone. What do we do with these things? We're talking about 50 million metric tons of e-waste every year and a large part of that is our smartphone devices. Most of it isn't recycled. However. Your smart phone can be. So instead of tossing it into the trash, I think you need to look at a few different options. You can recycle it. You can donate it. You can sell it. There are a number of different places that you can go in order to get rid of these things and really make back a few bucks in the long run here. Best Buy, Whole Foods, Home Depot, Lowe's, and Staples typically have free drop off spots to take dead batteries. So that's step one. If you have a removable battery. You can remove it and drop it off on one of those. You can also check out a website that's called earth nine one one, and it's simple or nine one one.com and it will tell you where you can recycle these things because they've got all kinds of nastiness in them. The button cells, the older ones had mercury. You've got lithium, you've got zinc in these things. So that's always a good place to go to start recycling them. There are also cell phones for soldiers where you can donate. That's their website, cell phones for soldiers dot com they will take your cell phones and they'll provide them to soldiers overseas. This is really cool too. Cell phones for soldiers also provide about 2,500 calling cards every week as well for the soldiers to use. Man, I'm choking up a little bit here.  In case you didn't know it, by the way, we're planning on building a 4g cell phone network on the moon and a 5g cell phone network on Mars, like real soon now with the next couple of years. So maybe you can donate them to NASA for them to take while they go up there. Now, there are a few places that you can go to. Recycle specifically, and I've used Gazelle before. Let me just check. Make sure they are online still. Yeah, there they are. Gazelle, G A Z E L L E.com. They'll let you buy refurbed pre-owned phones. You can sell them as well. They'll trade them in for cash. So let me just see, I'm poking around on their website as I'm here. I'll tell you how to clean up your phone securely here a little bit, but let's say like me, I've got an iPhone eight plus, right? That's my phone. It's probably about time to upgrade it.  I'm going to say it's factory unlocked and it's saying, I think mine's a  two 56. So I'm going to say two 56 because I want money. Does the device power on? Yes. All functional all parts work. Yes. Front and back. Free of cracks. Yes. Cosmetic looks like new, which is true. So for excellent condition worth 181 bucks, light signs of use it's worth 173, normal signs 160 bucks. Then you can send it in. I've even seen gazelle having kiosks, where you can go ahead and just put your phone in. They have cameras in them and somebody remotely will look at the phone that you just stuck into it and will give you an offer. So there's buy-back services, flip C, and all kinds of others. So before you get rid of it, make sure you have a good hard look. Declutter gadget is gone. That's a cool name, right? Oh, Apple, by the way, they've got store credits. I got $300. Last time I turned in my iPhone at the store. right now my iPhone eight is worth 170 bucks at the Apple store. So it's worth about the same as it is worth over on gazelle. Best buy lets you trade it in. Some will take them to Craigslist, Facebook marketplace, E-bay, and others. So there you go. There are some things to do with that phone. Eco ATM, by the way, that's the name of the ATM that's owned by Gazelle trade. Amazon has a trade-in store, but just look, if you do a search for gazelle, you're going to see ads for others as well. Before you do that, let's talk about your privacy here. Before you just throw it away into one of these recycled bins. So this is some suggestions from TechRepublic and I'm, of course, going to add my own little tips into this as well. Veronica Combs wrote this original article. she says that you should unpair all devices. I don't think that matters really. I don't think you have to unpair anything because of what gonna do next is sign out of all services. Now that can be important. If you have an iPhone, what all you really need to do on your iPhone is go to the settings. Once you're there in settings, you're going to go to general and then reset and then select a erase all content. Before you do that, you're going to have to turn off, Find my iPhone because if find my iPhone is turned on not only does it let you find your iPhone, if it's lost or stolen. but What find model iPhone it is Also it makes the phone, so it cannot be erased and then used by a third party. You have to be able to log into the phone using your Apple ID if it has been reset. So turn that off first. Find my iPhone. Then go to settings general, reset, erase all contents. Now it's not really erasing the content on the iPhone and also un-encrypted Android devices. What it does is it destroys the decryption key. That only takes a second or two. Once that's destroyed that phone is now completely reset. It's like a factory reset. There is nothing left on the machine. So on Android phones turn off the factory reset protection. This started a couple of releases to go with Android. You can go to settings, privacy, factory data, reset, and then choose "reset phone." Once you've done that with your phone, either one of them. You are safe to send it off to a recycler. Now, if you're like the campaign staff for Hillary Clinton or her phones themselves, they just took ball-peen hammers to them. Once the investigation had started and it was illegal to destroy evidence. So remember that, if you use a ball-peen hammer, apparently it's legal to destroy it that way. By the way, it'll make it pretty much unrecoverable if you really bash the living daylights out of How could our elections be attacked? Well, they already are according to a report right now in Louisiana.  It may not have been directed at our election infrastructure, but it sure is affecting it.  Here we go. We have some serious problems being reported down in Louisiana. According to Threat Post, the Louisiana National Guard has been called out. Now that's a very big deal. You might ask yourself, why would they call out the National Guard to battle a cyber security problem? That would be a good question, if you were to ask, so let's ask it. The answer to that would be. That the national guard, as well as our military, have been trained. Not all of them, obviously. They have teams that have been trained to do cybersecurity work, and we've done some. I've done some training on that for the FBI InfraGard program, so I have some intimate awareness of how this stuff works. Here's the bottom line, according to the article that was in Reuters. They're saying that there's evidence suggesting a sophisticated hacking group was involved. So what happened now? This is something that happens to businesses. It happens to government agencies. It happens to almost everybody out there. They were attacked. Most of the time these attacks are coming, the more successful ones, in the form of phishing and phishing campaigns.  I've got some training that if your company really wants to do some, phishing training, let me know. I have some excellent training materials and we buy licenses for these from our third party. It just isn't worth it for me to do custom training for all of my companies and we buy these things in blocks and I have extra licenses. We buy them a thousand at a time. So if you'd like to offer some security training for your employees, that's primarily focused on the whole concept of phishing and what they should be doing, what they shouldn't be doing. Social engineering even goes so far as to inbound phone calls. Let me know, just drop me a line. me@craigpeterson.com and I'll be glad to get back to you. We can make some arrangements to help you out there. Cause I know a lot of companies just don't know where to go and you can't afford these expensive training. We have some extra licenses, so we can definitely help you with some of that stuff. So just email me@craigpeterson.com. If you'd like to get a little bit of that training and I can probably do it too for home users, if you're interested, let me know. I'll see if I can't just drop you into one of these classes with one of my business clients, that, again, it's a nice little series of training. I think they do a really good job. I should be able to squeeze some people here and there. So let me know. That's how most of the time bad guys are getting into our networks. They send an email, it looks like it's legitimate. It looks like not only is it legitimate, but it's something you need to open and you need to open it right now. These guys have gotten really good at that sort of thing. Then you click on it and they have your information or they have you running a program for them. Now, many times these programs are called RATS, which is a remote access Trojan. If they can get a RAT onto your network, it's over for you if you don't know it's there. That's why we always suggest and there are a few companies that have these, I like Cisco, but there are some other good ones out there that we work with, that have the ability to detect these Trojans. They're watching them calling home. Where are they going?  A remote access Trojan on your network means they can remotely get onto your network right through your firewall. Right through it and then start doing whatever they want to on their network, anytime they want. That's part of the reason I really strongly urge everyone to use Umbrella and you can find it,  just umbrella.com. We sell the professional version of this for enterprises, but they have free versions as well. That is simple as just changing your DNS server IP addresses. They've got them right there on the homepage. Two, two Oh (860) 722-2222.  It explains it all. If you just go to umbrella.com. The idea is you use the Cisco umbrella software for your DNS server and if there is a Remote Access Trojan when it tries to call home to give the bad guys access to your network, it is foiled in its attempt. It doesn't block it per se, but it's like hopping in an UBER and saying take me to one, two, three main street, and the Uber driver says, I don't know where that is. That's kind of the equivalent here, you ain't getting to one, two, three main street if the car or the driver doesn't know where that is or how to get you there. That's what Umbrella does for you. There are free versions of it. If you're a business you should use one of the higher level ones. What we sell the enterprise version is tastic for businesses because it allows it all to be customized as well. Umbrella has family stuff too, that you can use and the family stuff is great too. You can keep the kids from stumbling on websites that they probably shouldn't be stumbling on, bottom line. This paper that was released, showed that they had done a forensic investigation.  I'm looking at this Reuters story, that goes into it and they found something called the Kim Jong rat. Which is a back door. It is a remote access Trojan and it had a source code leaked. I haven't checked lately on the dark web, but it used to be easy to buy tools like this for 20 bucks. They're not expensive. So problem number one, the bad guys got into Louisiana's government networks. Problem. Number two, they installed a remote access Trojan in the network. Very common. Usually, within a week to two weeks after that been installed, they will have examined your network and they are going to be digging in even deeper. What did they do here? Wow. They installed the Trojan. Now I've talked about this before. We've seen attacks involving EmoTet, it was found also in the networks of these government victims, according to Reuters. The EmoTet Trojan can also load other malware and it's like a worm. It propagates all by itself through the networks, onto the file servers, and onto the desktops and laptops. It also, by the way, is just as happy to spread through a VPN connection. Do you know what I think about VPNs? They have their place. I use them, but as a rule, VPN's not a good idea.  For most very small businesses, not at all. Okay. So this is a problem.  We now have the national guard in Louisiana called in according to Reuters to protect the systems, when we're in the middle of election season. Isn't that fun?  Before we get to that, I want to talk about this email. That concludes that Iran was behind sending these very threatening emails out to Democrats. How could that have happened? What should you be looking for? We got answers. There have been some emails that are very scary out there. There were supposedly from this pro-Trump group called the Proud Boys and they have a very scary message. The messages say that they are in possession of all your information. By the way, that if you really want it and you're willing to pay a few bucks on the dark web you can probably get anybody's information on almost anything, okay. But in there in possession of all your information and they've instructed voters to change their party registration and cast their ballots for Trump and I quote here from the emails, and this is an article from the Washington post. Yes. It says you will vote for Trump on election day, or we will come after you. So pretty, scary stuff. Some of these were in hotly contested swing States in the upcoming presidential election. It's going to be one heck of a season here. Let me tell you. But the U S official said privately that through the post that the operation was not terribly sophisticated and they said it was disclosed before it could have any major impact. The cybersecurity researchers that they spoke with said little about the operation.  They're thinking there wasn't a large scale deception. We'll see what happens. It was first divulged Tuesday by local law enforcement and election officials in Florida and Alaska, and people rightly reported them. For FBI reporting, it is IC three.gov online. If you get an email like this, or you get another threatening email or something that you think the FBI might. Want to know about because they do investigate these things. I am involved in a couple of their investigations, that revolve around China and Chinese espionage. Anything like this, you can report, just go to IC three.gov. I C three as in internet crime complaint center. I C three.gov. Okay.  This is a real problem. In 2016, it took months for the Obama administration to publicly point the finger at Moscow for the hacks and leaks of democratic e-mails despite the intelligence community, having determined Russian culpability early on. So there you go. The Russian story continues at the Washington Post, but this came up from disclosure by the Director of National Intelligence, the DNI, John Ratcliffe.  I like the fact that President Trump has, I'm not going to say strong-armed, but he certainly has convinced our intelligence agencies to be more open with the public. Be more open with business, this FBI InfraGard thing that I'm involved with and did a lot of training, meaning over the years for, it's been around for a very long time. Let me see. 1996 it's been around. So it's a partnership for protection. It's a nonprofit, they have a lot of volunteers like myself that are involved with it. So the cooperation between the fed and business is nothing new. 96 was a long time ago. That would have been what President Clinton, did that, but it actually started in Ohio and one of the field offices, as I recall.  President Trump here has taken this to the next level and we have had disclosures from the NSA. Remember NSA, we used to joke is true for no such agency because it was just so secretive. The NSA has even released information about vulnerabilities in our systems. So it's a huge deal. On Thursday, by the way, Iran, some in the Swiss Envoy in Tehran, and Switzerland is who handles affairs for the US there, because the U S doesn't have an embassy or anything really there in Iran. Other than probably the CIA. They were condemning the baseless accusations of meddling in the U S election.  They said Iran has no interest in interfering in the US election. It's the old habit and there's a new name for it, but the old habit of keeping information from people. You might remember in World War Two, right? If you tell a big lie often enough and you tell it with absolute rigor, people will believe you nowadays, they call it gaslighting and it's been very effective. So that's what Iran is trying to do. So be careful with those emails. So that kind of leads us into this whole thing on spear phishing. If you miss it today, I'm going to have that up on my website, along with IT job wages and pretty much everything else. I try and get it all up on Craig Peterson.com. I send out my weekly newsletter and we've also sent out some that people are really interested in. If you didn't get it this last week, you might just drop me a note. We don't automatically send it to people who sign up new. So if you are going to go to Craig peterson.com/subscribe right now, you'd only get future newsletters. You wouldn't get the past ones. This past weekend I put together a really great newsletter. And it talked about taking your computer in for repairs.  I used this fictitious character called Hunter. Who took his Mac book into a computer store to have it repaired for water damage.  I came up with all of the main things you should do step-by-step before you take a computer in for water damage.  I think if our fictitious character Hunter had done all of this, he wouldn't be in all of this big trouble with this daddy, but I can send that to you if you're interested. We talked about it a little earlier this week as well, but just email me at Craig Peterson dot com. And let me know you want the Hunter email. I'll be glad to send that to you. Also, if you sign up, I am going to be sending you some of my most popular special reports. The stuff you need to know because everybody needs to understand how to do a security reboot. I've got some very in-depth courses, but let's just start you with a simple checklist. I don't want to confuse anybody. So it's easy enough for me to just reply to you when you sign up and send you this stuff I have at this point about 60 different six zero different special reports. So when you ask a question, oftentimes I can just send you a special report on it. Oftentimes if I don't have a special report, I will write one. because if you're interested, other people are entrusted too. So make sure you sign up and you can just do that by going to Craig Peterson.com/subscribe. I'd be glad to do that for you. We also have a couple of things, that I really want to cover quickly here when it comes to the election and election technology. I think as a whole, our election is pretty safe from a technology standpoint, right? I'm not saying anything about people printing their own ballots and sending them in. About gathering ballots about bribing people to vote a certain way. That's not what I'm talking about. Obviously, all of that's easy enough to manipulate. We've seen post carriers who are dropping ballots into gullies and ditches and trash cans. That's one thing. On the other side, there's technology. I am pretty confident that in most of our States here where we are using these paper ballots and they're more like light cardboard, right? What a hundred-pound stock give or take 80-pound where we fill in that oval. Then we take it up to the machine. We put it into the machine, which reads it, optically and tallies. I'm pretty confident those machines are in good shape. One of my sons, who works with me and he's a Cisco fire jumper certified guy. He is also one of these election overseers. He had a look at machines that were shipped off from the Secretary of State's office, and even though some of the seals were broken, The seals that really counted, which are the seals over that little memory card inside that optical reader. Those seals were all intact. So that does my heart. Good. I'm also pretty confident that the people who are working the local polls and tabulating are being supervised and there tend to be Republicans and Democrats and independently minded people who are overseeing the process. So those tallied numbers that are then sent off to the Secretary of State's office, I think are likely to be correct. Then the Secretary of State's office puts them up on their website, and then the Feds are going to look at them. That's where I'm the most worried about it. Emails sent to the Feds with tallies. The feds visiting a hacked website. We just went through the major ransomware and remote access Trojan problem that they're having down in Louisiana. That is a very big problem because that could be a weak point that would be exploited by people who wanted to change our votes.  If you are involved in oversight in this stuff, make sure everything is double checked with the human. Get on the phone, call somebody, call the Secretary of State's office to verify. If you're working at a local polling place, verify that the Secretary of State's office has the right numbers.  Then make sure the right numbers are on the Secretary of State sites website. The rest of this is going to be an absolute disaster. What can I say? Craig Peterson (2): [00:38:49] You've probably heard about spear phishing. I did a little phishing myself online and looked at some of these companies, like Barracuda that is saying that they stopped spear-phishing attacks using AI. Hey, I've never been a fan of Barracuda. Now spear phishing is by definition and this is from CSO online.com,  is the act of sending an email to specific and well-researched targets while purporting it to be a trusted sender. Now you've seen phishing. If you've been on the internet for the last 10 or 20 years, you've probably seen what's called the Nigerian Prince scam. That's an idea that has really perpetrated into every bad guy's mind over the years. The idea is, Hey, if we can send an email out to people and find the gullible people, maybe we can make some money. It's fishing just like you might be out in a boat and you're casting a net to catch a certain type of fish. You hope that the gill size is right on that net and you're always catching some other things, right?  Dolphin, tuna, and some of these other things, but, you don't really care. What we're talking about here with regular phishing, which is spelled P H I S H I N G. We are talking about bad guys casting a huge net. This net is out there to try and catch anybody, anything there will go ahead and get caught in that net. So the Nigerian Prince scam is, Hey, I am a Prince in Nigeria and I need to move my family's $1 million worth of wealth and the only way I can do that and get it out of US banks is if I have a US bank account. So if I could go ahead and I'll transfer in this $10,000 that I need to move. I'll let you keep 2000. So I'm going to transfer 10,000 into your account, and then you're going to wire me $8,000 of that money and you can keep the $2,000. Now, there are many forms of this scam. The Nigerian Prince scam is one of them. Of course what's happened here is they say they wired the money in, and that money may show as pending in your account coming from an overseas account. So you look at, and you say, Oh yeah the $10,000 is there. The Nigerian Prince contacts you and says, Hey, I sent you that $10,000. I really need that 8,000 now, or I'm not going to be able to get my mother out of jail or something along those lines, kidney for my best friend on and on. People look at the account, look at that, there's that $10,000. Now they go to the bank and they wire the $8,000 to this account overseas and off goes your $8,000. When you wire that money out, it is gone. What happens is a few days later, it can take anywhere up to basically two weeks for the bank to clear the money. I know about the check 22 laws, that's all down the tubes. It's eight days to two weeks usually, especially for international transactions and they can take three weeks or longer sometimes. That transaction where he wired the money in is canceled on his side because he's got an inside thing going on with the bank. So you thought you had 10,000 that he had put into your account. You wired out 8,000. Net 2000, that's not so bad. But then a week or two, or maybe even three weeks later, your bank contacts you for insufficient funds because that $10,000 transfer that he was putting into your account, actually never finalized and never really happened. So you have now sent him $8,000 of your own money. So that was the Nigerian phishing scam. There are a lot of scams that are based on that are still out there today. One of the big ones that the FBI just a few months ago arrested a dozen or so people out in California for is a mule scam. I don't know if you saw this latest Clint Eastwood movie. I thought it was pretty good. I've liked Clint Eastwood for a very long time, but he has a movie out called The Mule, came out in 2018. This is a 90-year-old, horticulturalist and Korean war veteran that turned into a drug mule for a Mexican cartel. A very interesting movie, rather believable, a lot of movies that just totally rip apart. but I enjoyed this enough to allow it to be believable. He was hauling money for the Mexican cartel. What these people in California were doing is they were money laundering and that's typically called a mule, they're moving money around. They would get some money from somebody. It much like this scam. I was just talking about the Nigerian Prince scam. So they say, Hey, we're going to wire some money into your PayPal account, for instance, or we're going to route wired into your bank account. And then we want you to use PayPal to send us 90% of the money. In this case, these mules, we're not getting ripped off. They would actually get the $10,000 into the bank account and then they would send $9,000 via PayPal and the bad guys were happy, cause that money is laundered, it came from a more legitimate-looking source. I had some really great training that I did on this for the FBI InfraGard program with some think it was a secret service guy, and they tracked a lot of this down. There were some arrests here a couple of months back. We have to be very careful about this and how we're transferring money around and whether or not we do it for one of these people. Because we're getting tricked. What's happening is these people who are doing the spear phishing are doing research on us. We had a great example of another spear phishing thing. There was a company in the UK that was purchased by a German company. They knew all of the basics about this German company and they got a phone call one day from the CEO of the German company. The CEO told them to wire some funds to this particular bank account, and they did. It sounded like the CEO. They used some technology to impersonate, the guy's voice. They went ahead and wired the money. Then we got Barbara Cochran who is one of the sharks on Shark Tank. Her assistant went ahead and wired, I think it was like $400,000. Another assistant of hers, her executive assistant, caught it, noticed it, because she was CC'd on the response, freaked out. They managed to stop the transfer from happening. So good news on that one. These scams are out there and they're out there big time. I have another one where a lady was going online and doing research about business owners. She found a couple of business owners, actually quite a few. She wanted to narrow it down. So she researched them. She found some of these business owners had Facebook pages. She went to the Facebook pages, and while on those pages, she found those business owners that said that they were going on vacation. She followed them a little bit and found out about where they were going when they were going. Then she managed to trick the email providers. By letting them into the actual email account, which she did in this one case, she got more than $40 million out of the company. She finds out who the CFO is, and then when the owner is on an airplane or is in Bermuda, in cannot be contacted. She then sent off an email to the CFO saying, Hey, we've got this new provider, a supplier we've had for three months, and we've never paid any of their invoices. Here's the invoice on the bottom of the invoice or statement. At the bottom of the statement, it says, or to wire the money to, I need you to wire right now, or we're going to be out of business next month because we've never paid this new supplier that, and it's critical. The CFO wired the money because she had done her research, and that's what it takes. They want to send you an email that is really coded up for you. That fake email that you got represents a huge industry, and that industry is undergoing some amazing changes. They are using artificial intelligence for evil. So we're going to tell you about it right now. These types of phishing are going after a specific person. After doing a bunch of research is called spear-phishing attacks. It's not like those from the mid-nineties where you had the Nigerian Prince out there sending emails and just waiting for anybody to respond to them. These are aimed at someone individual. Here's an example that was in Dark Reading this week, where it says:  Hey, I'll see you at nine for our four-hour call. You're going to kill it today. See the dial in details for the call attached. Cheers, Al. Now, most people would not question the legitimacy of this email. It's kind of laid back. They might've done some research on Al. They might have cracked Al's machine. Somehow gotten a list of all of his contacts and sent this to everybody in his contact list that worked at the same company. This is happening all of the time, everybody. So be careful of this. So you get it. Looks legit. Everything about it smells legit. You're going to open it up because heck I'm going to kill it today in our nice little conference call, right? Yeah. That's what you're going to do. But what could well be happening here is that email attachment that they said, Hey, you need to click on this, could well have a malicious payload. So you have to be careful, and it may not have a malicious payroll payload on it. Maybe it went through the email filters looked pretty good, but maybe the website it's pointing to, or even the file on the website it's pointing to is malicious is a malicious payload. So you've got to be very careful, and you could lose your job in total embarrassment. You could really harm the company by opening this. But it's getting worse. It's going to get even worse right now. There is something called offensive artificial intelligence. This is ushering in a whole new era of phishing attacks that are going away from these more simple ones, the broad phishing attacks, even the spear-phishing attacks, where they do some research about your company.  I've picked up a few clients, unfortunately, that have had these attacks worked successfully. And then we had to put in some really great software to make it even work better for them. Artificial intelligence can go out and start looking around, can figure out what's going on. For instance, blue.ai found a cluster of pneumonia cases around a market in Wuhan, China, it flagged it and found it nine days before the World Health Organization found it.  It's now being used to look at all of this health literature from around the world about COVID 19, the Coronavirus, that we have this novel one and figure out what's going on, and it's even comparing it to DNA. AI can be absolutely wonderful. We use it for monitoring and protecting various types of networks, but inevitably AI has now opened the door for sophisticated cyber attacks. It is really crazy what's going on right now. Cause it's not just these phishing attacks, it's going to augment every type of cyber attack. It's using adaptive decision-making capabilities based on what it finds inside your network. This is scary as heck because once it gets inside your network, think of Skynet, right? That's really what it's going to ultimately be like, maybe not with Androids out there trying to shoot us but trying to steal everything we have. Our email boxes are just going to be used as a stepping stone to get into the business network. The only way to really compete with this is to fight AI with AI. That's what's happening with some bigger companies out there. I searched for my own online, and I got a little upset because I came across an article. At the top an ad for Barracuda. Now, I've known these guys for a long time. They have used open-source, freely available firewall software and other software to build their business and, good for them. There's nothing wrong with it. That's our open source software is for. But there seems to be some misrepresentation that is out there. That's where it gets scary. Right there on their website, Barracuda Sentinel gets AI-based protection from phishing and account takeover. You read down a little bit further block threats already in your email in your inbox. Stay a step ahead of attackers with AI-based threat detection. Stop wasting time managing static security rules. I agree with that one. I think the problem that we have is we're putting a lot of trust in these companies. This is Barracuda. I have had clients who've used it before, and I've had nightmares trying to fix problems with it, but that's me.  I could tell you about them if you wanted. On the other side, there are other systems, like Aruba and Cisco, which I use and sell. These are not a panacea. You have to look at all kinds of things, and you have to be tying them together. We're no longer just dealing with the perimeter. It's no longer just having a good firewall or trying to have a good email filter. Now we really are talking about this Zero Trust model because the bad guys are using AI. It is getting into our systems. We have to ensure that none of the data, what we call in the biz, east-west or west-east traffic, east-west traffic, none of that internal data, internal communications are going somewhere it shouldn't or is being misused. Spear phishing is difficult to detect. It is challenging for AI to detect it. It is much easier for a person to detect it. You need to do training on this. Have your people get some training. I think it's just that important. This whole business email compromise thing that the FBI has been talking about. That's all tied into spear phishing. So we gotta be cautious. Harvard business school has a fascinating article out right now about wages in IT, of course, information technology. We used to call it MIS management information systems, way back when. Hey,  it's bringing back memories of when I was a professor out at Pepperdine University. MIS 422? That class anyway.  Of course, Harvard has been helping people in all kinds of aspects of business, which includes things like the law, IT, and general business, as well. But they've come out with something that has really surprised many people, and it has to do with IT job wages.  I have talked about getting jobs in cybersecurity and how many open jobs there are. The biggest problem people have is getting into cybersecurity and then getting the support they need once they're in cybersecurity. Over just the last few weeks, I've had a couple of listeners who have sent me an email, and I asked a little bit about it. I pointed them in a couple of different directions and even pulled another listener into one of the conversations that have moved into IT security. Exceptional wages were the norm in computers for a very long time. You got paid good money if you were good at IT, whether in management or coding. I made good money for a lot of years as a kernel programmer. Writing the operating system itself and device drivers and implementing internet protocols and designing new protocols. I made one of the world's very first centralized security systems for computers and computer networks. Way back when. So it has been around a while, and it has paid very well. Their jobs have always been stable, the fast-rising within the organization, and made a lot of money. Back in the nineties, you had the dotcom boom. It really bothered me. All of these people started hanging up shingles, saying,  I'm an IT person.  I design websites. I do these, and they've never really had any real experience with IT. To this day, I still bemoan Microsoft products. Because it seems like it's a chimpanzee throwing darts at boards, as far as trying to make sure their systems work and inter-operate and don't even conflict with each other. It's so frustrating. Since I've been on the Unix side for so long and the mainframe side as well, the systems that work well and work consistently. It turns out things have changed a bit now when it comes to the wages paid in information technology. According to Harvard, in all but the largest cities, wage growth in IT jobs has become relatively moderate following the dotcom boom. They're saying that these wages in IT are a lot more like wage patterns that have been seen in the broader STEM space. STEM being science, technology, engineering, and mathematics. So some of those like mathematics are well known for really having terrible wages, right? You got a Ph.D. in math, and wow, you can get a $60,000 a year job. So IT has changed. IT really has leveled out. In some geographical regions where there's fierce competition for IT talent, superstar performers do not earn the same high premium they once did over average performing programmers and other IT professionals. So, in short, IT wages are still relatively high compared to most other occupations, but they have lost what Harvard says is their exceptional luster. Today's IT wage premiums have more to do with where you are working then with rewarding, specific skills that you have for the job. So keep that in mind. If you want to look it up, this paper is called the digital labor market inequality and the decline of IT exceptionalism. It was written by a Harvard business school post-doctoral researcher involved with this at the Martin Marshall professor of business administration. So there's a whole lot to chart the rise and fall of the salaries. They examined 142 of the largest urban areas in the US between 2000 and 2018, and of course, we've had crazy change over those 18 years in IT. We've seen the major rise of the internet and apps, which didn't really exist until the last 10 years, these mobile phone smartphone apps. We've also had two pretty darn big recessions over that period of time. Smaller cities and rural areas, which we're talking about here for most of my listening area, were excluded because of missing data for at least one year. They use the data from the Bureau of labor statistics. They parsed both the broad difference in wages against other lower-paying jobs, STEM professionals. Salaries they found in five places, Silicon Valley, San Francisco, Seattle. Washington DC and New York climbed as there was more competition for talent.  I will interject there that I think that places like New York City are going to see a continued Exodus of IT professionals since there are so many people working from home. That will have an absolutely major impact on all of us IT workers in the rest of the country just didn't get the same bump. Let's see. So they're saying there are two distinct and competing forces. On the one hand, the advantage of tech hubs and urban metropolises, especially the combination of dense population and vigorous innovation, increasingly leads to higher wages making some regions more attractive to skilled talent. On the other hand, this is not Ronald Reagan's, ideally economist, right? On the other hand, wage spread narrowed within advantaged areas, moving the top 10% of IT wages into convergence with other STEM occupations. So they're saying, yeah. The highest paying IT job category they examined, a research scientist, paid between 140 and 170,000 per year in the Bay area. So that's almost a minimum wage out there considering how much it costs for a house, et cetera—45% more than a typical region such as Indianapolis. In contrast, those with biochemists earn about the same wage in the Bay area as they do in Indianapolis on average. Isn't that scary? So it goes on and on. Superstars are not super paid anymore. There are major implications for organizations. If you're looking at IT wages. You need to use the same sort of reasoning you would have used for other skilled labor markets. There are HR people who are used to this. When you get into the rare parts of STEM, how rare are they really? How many openings are there? This is an interesting time, and it's changing more and more because of people working from home and the lockdowns, and you saw France just locked down. I think it was Switzerland just locked down. Belgium apparently is about to lockdown. We've even got Vermont locking down saying, don't go into these two counties in New Hampshire, which is right across the river because of higher COVID rates. Now I'm not going to get into all of it cOVID rates versus death, right? What morbidities and other things, but it's really tough.  People are moving out of the big cities, including IT professionals that are moving way out. We've had a lot of people moving into New Hampshire and other more rural areas. So I suspect IT jobs, as well as other STEM jobs, just are going to continue to go down.  We just talked about AI in the last segment and its effect. I think AI will have a huge effect, on the whole, IT industry, but it will take a few years before it really hits. We were just talking about wages. We're going to talk right now about another reason those wages have gone down, something I've seen personally that has caused harm to my business and that President Trump has been trying to crack down on.  We're going to talk about cloud-native apps too. Hi everybody. Craig Peterson here. Let's get into this guest worker program problem that we have.  It's very upsetting to me because I have lost business. I have lost contracts because of this program. What's been going on, and I took advantage of this program back in the nineties. I had a company with about 40- 50 employees. They were all IT people, and I needed somebody with a particular skillset. I needed a couple of people, and so I hired an attorney and what they did is they worked to show the federal government that we had indeed tried to get people to work for us with these skillsets, and we couldn't find anybody. We needed to bring in a foreign worker, and that was under what's called an H1B visa. We brought them into the country and gave them the jobs and the work, and off they go. Eventually, I ended up paying for the airline tickets to send them on back home because we didn't need them anymore after the whole dot com boom thing. It was a really, quite a mess back then. This whole H1B visa thing has been a real problem. We have some huge consulting companies bringing in thousands of foreign workers in the IT space, tens of thousands of them. They then bid against US American companies. Even though they're supposed to pay prevailing wages, some of these companies, with H1Bs, we're not. What we've ended up with now is a clampdown on this. We bid on, and we had proposals, where there was absolutely no way in heck that we could have matched the price of this other consulting firm using people that were paid about a fifth of what we were paying. We found this out, of course, after the fact. We'd dug into it, trying to figure out why we were the obvious choice, why didn't they use us? President Trump has realized that Americans need jobs in America, first. He has put a bit of pressure onto this whole H1B program. The Daily Caller has an article out this week called Corporations use the STEM shortage myth to abuse tech worker programs that President Trump's announcement really sent shockwaves through the whole tech sector. He suspended most of these guest worker visas through the end of the year. The big guys in tech were all condemning this. You've got Google, Amazon, Facebook, Microsoft, all individually condemn the moratorium. It affects these H1B visas that these big tech firms use to hire the foreign workers they don't really need. Tim Cook, who's the head of Apple, said he was deeply disappointed. Twitter called it short-sighted. Overall, they may reduce the cost of things produced here in the US because they work for much less money. However, The quality isn't there. When I was bringing some people into the country, I looked into their backgrounds and found these people claiming PhDs, and they have their certificates. Yet their background was basically a high school education. It was shocking to me. Shocking. I also found that some of these companies found somebody they were going to hire overseas that would work for cheap money, as I said, a fifth of what we had to pay US wages and crafted the advertisement. They crafted the language in the application to the state department, et cetera, specifically for that person. So they took the resume, and they said, we need someone with these exact qualifications three and a half years in this technology, two years in that technology, a degree in this and degree and that a five years experience in this so that they could then justify it because you post that ad somewhere and Americans are going to look at it and say, no, I don't have that exact qualification. Then they took those applications, and they got the foreign workers that got them to come into the US. They were able to pay them a fraction of what they would normally have to pay a US worker. So that's where I'm coming from. Okay. I think that's pretty obvious these companies, Google, Amazon, Facebook, Microsoft, and these big consulting companies. I mentioned earlier. I didn't give names, but you've probably heard of them. They were all actually worried about their bottom line. That's got to be the sole thing that they were worried about here. Congress created this H1B program back in 1990 to help companies recruit skilled foreign workers, where there was a shortage of qualified workers in the US. But the companies have circumvented the H1B program's safeguards. They're weak. It's crazy. They've been bringing in cheaper and less qualified foreign workers, even when there's plenty of qualified workers here now. When we've got an unemployment rate above 10 or so, it's ridiculous to be bringing these people in. We have people in the US that can take these jobs that they just don't want to pay because they want to pay foreign workers. Now, we had problems before where they were shipping jobs overseas to again unqualified companies. People in the US were forced to train their replacements overseas. You've heard these stories before. I know people that were forced to do this in the tech industry. It's all fake. That's exactly what they're saying right now. Rutgers professor Hal Salzman testified in Congress that this whole idea of science, technology, engineering, mathematics, employee mathematics, employee shortage, this desperate lack of people trained in these fields is a myth. Rutgers professor Salzman said that they graduate about twice as many STEM students as STEM jobs each year. In fact, he said in Minneapolis, Federal reserve bank president Neel Kashkari dismisses the whole concept of STEM shorter worker shortage. Noting that the skills gap is just a euphemism for, we want skills at lower wages. So if there's no shortage of graduates and Americans are willing to do the work, why are these big tech companies so obsessed with H1B visas?  It really comes down to money. Let's see. There's a lot more detail in this article. I think Harvard did a great job Harvard business school on this, but man, we've got to be hiring Americans. We've got to.  I'm great with people coming into the country. I'm an import, right? I've been here for many years. I got my US citizenship, and I think it's wonderful because we need new blood. We need talented blood. We need bright people. Bringing in these people for just cheap labor or outsourcing our jobs because it's a lot cheaper will hurt these companies in the long run. It's hurting the United States in the short run. There's no doubt about it. We are all looking at cloud apps. We probably use them every day. If you've got an iPhone or an Android phone, you're definitely using the cloud. Many businesses have looked at the cloud as a way to save money. Sometimes saving a whole lot of money. A lot of organizations have decided that the cloud is this panacea that they can use. Because of the pandemic, why not shift the worker's functions to the cloud and get rid of our local computer room, data center closet, wherever it is, you might have your file server, et cetera. We have a huge security fallout because of this sprint to set up employees' home offices because it's not just about vulnerable endpoints in-home networks anymore. We've now rushed into adopting cloud-based technologies that have not been secured. It's absolutely nuts. We've got this hybrid physical cloud-based IT infrastructure, and it is altering the landscape. Obviously, it's already altered in 2020, but in 2021 and beyond, it will be just changed forever. So how do you manage it? How do you put up guardrails? Look at what's happened with Amazon web services, their S3 data storage, and how many security breaches there have been with S3. These buckets being wide open. Salesforce, Slack Service now, and others have all had hacks.  We've got a major potential for vulnerabilities because we're tying together systems that were never even designed to be working together in the first place. Certainly weren't designed for security in the first place. So this is just a hint of things that are to come. Okay. It's very easy to mess up cloud security. Now there are several startups right now that are out there trying to address this. Jupiter One came out of stealth mode here. They had $19 million in Series A funding that tells you how much these investors are thinking they're going to make off of this. This service automatically finds and keeps updated online, physical and virtual devices and assets and organization, including cloud-native services. That doesn't seem like it's that hard to do, but man, the misconfiguration of all of the Software as a Service or Cloud Native, is common, and it's mainly due to human error. So if you are using cloud services, I really would suggest that you, if you're a business, assign someone to look into this or you look into it yourself. You're using Dropbox. You're using Microsoft O three 65. What are they doing to secure their data? A lot of these services don't even guarantee that they'll back it up and just had a huge data loss because it wasn't properly backed up, Hey, if you have any questions, just email me@craigpeterson.com. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

covid-19 united states america ceo new york director amazon california new york city donald trump google uk china ai apple social man coronavirus washington france service state americans san francisco phd chinese writing ohio washington dc seattle german russian microsoft dna iphone barack obama mars congress students harvard nasa uber fbi world war ii exodus iran mexican states alaska silicon valley republicans companies louisiana software defining android cheers washington post democrats front switzerland mac minneapolis nigeria cd cia stem federal paypal korean windows belgium indianapolis secretary smartphones cybersecurity ibm new hampshire vermont shocking ip artificial clinton cfo moscow emails hillary clinton bay corporations shark tank iranians nigerians bureau big tech salesforce world health organization salary oftentimes whole foods rats wuhan sensitive ronald reagan rat cisco home depot clint eastwood mis lowe usb reuters smaller craigslist cc nsa feds atm rutgers dropbox dolphin national guard bermuda best buy exceptional wages superstars ransomware vpn umbrella declutter tehran staples thumb tim cook ic recycle mule spear proud boys phishing trojan macs cso skynet u s tech talk kim jong ssd dns aruba pepperdine university s3 cosmetic visas soit trojans guardrails dni zero trust noting ftp barracuda national intelligence unix gazelle daily caller h 1b cloud native lousiana apple id pgp emotet salzman nigerian prince kinko john ratcliffe us american neel kashkari dark reading h1b visa google chromebooks techrepublic craig peterson jupiter one h1bs
The Anchor Down Low Podcast
The ADL: S6E3 - ADL Learns Online

The Anchor Down Low Podcast

Play Episode Listen Later Sep 15, 2020 51:47


Mr. Davidson and Mr. Bennett meet up (virutally) for an early morning Zoom to bring you the latest Anchor Down Low podcast. Highlights include: -- a special interview with new District Digital Learning Coach, Chris Godby -- an update on the Google Chromebooks and returning to IN-PERSON classes by Mr. Ackerman -- EB tries to identify plants -- Spoiler Alert: He cannot. -- a brand new question of the week and much, much more! Thanks for your continued support of the Anchor Down Low podcast - near, far, wherever you are - our heart will go on because of you.

Collaborative Tech Talk
The Orchestration Tool Every Teacher Can Appreciate with David Lopez

Collaborative Tech Talk

Play Episode Listen Later Aug 20, 2020 10:32


In a wireless world, why should classrooms be any different? Technology has made a huge impact on teaching, but it’s not been without challenges. One of the greatest challenges teachers face is being able to collaborate and orchestrate while staying mobile. ScreenBeam wireless displays make that possible, and Classroom Commander is the perfect software complement. ScreenBeam’s Senior Manager, Strategic Alliances, North America EDU, David Lopez introduces the product and how it works. “Classroom Commander is the software included with all our display devices. It allows teachers to orchestrate in one-to-one classrooms. Teachers can share their screens, view student screens, and allow students to share their own screens wirelessly,” Lopez explained. There are no cords required, which gives a teacher true mobility. “Our products are wireless first. Teachers can walk around with devices instead of being tied to their desks,” Lopez added. This mobility can enhance the collaborative aspects of the classroom well. It may even be a tool for social distancing. “Students can share things from their seats, or teachers can project something from the screen, limiting close interactions,” Lopez commented. Lopez also announced a new upgrade to the software and its compatibility with Chromebooks, which have become a critical device for school districts. Lopez noted, “Now the software works on Google Chromebooks, just as it did on Windows 10 devices. It offers the same functionality.” Beyond just screen sharing, the software offers other simple features. “The software does a few other simple but powerful things for teachers. They can lock the screens of student devices with one button. They can also send a link to all devices so that students are all viewing the same webpage. It allows teachers to spend more time on instruction rather than giving instructions,” Lopez said.

Y100 From the Show
COMPUTERS FOR CLASSROOMS

Y100 From the Show

Play Episode Listen Later Aug 17, 2020 2:06


Beth and Big Joe share how a lucky teacher can win a Google Chromebook with your nomination at Y100fm.com!

Sound Off Presented By Dailey Blend
Dailey Blend Show - Friday Top Five:: June 19, 2020

Sound Off Presented By Dailey Blend

Play Episode Listen Later Jun 19, 2020 13:03


Hello and good morning! Happy Friday everyone, thanks for tuning into the first Dailey Blend Show Friday Top Five audio edition. Each week I will feature five things I thought were interesting, notable, or culturally significant. This week we are showcasing stories on the impacts of COVID on Dropbox, Higher Education and Facebook Messenger. Discuss how Google Chromebooks might just become the holly grail of laptops, and how apps and services Noom and MyFitnessPal are edging closer to that perfect digital assistant but are missing a few key service capabilities. Before we jump into the show. I wanted to remind you that this episode along with all future episode is available on such platforms as Apple Podcast, Spotify, Stitcher Radio, Overcast, Google Podcast, and of course DaileyBlend.com. Don't forget to hit that subscribe button and have all episodes automatically downloaded to your device. Now that we have that all out of the way, let's jump into the show. These “Friday Top Five” updates are available each week on DaileyBlend.com or by Subscribing to the Dailey Blend Newsletter.  Listen and subscribe to the show on the following platforms: Apple Podcasts: https://apple.co/37LEsiZ Spotify: https://spoti.fi/2Bnhz9L Stitcher: https://bit.ly/2NeH5Ra Overcast: https://bit.ly/3ejceP5 Reed Dailey Blend on the Web: Facebook: facebook.com/ReedDailey Instagram: instagram.com/ReedDailey Twitter: twitter.com/ReedDaileyBlend Linkedin: Linkedin.com/in/ReedDailey Website: ReedDailey.com Dailey Blend on the Web: Facebook: facebook.com/DaileyBlend Instagram: instagram.com/DaileyBlend Twitter: twitter.com/DaileyBlend Website: DaileyBlend.com

GeekWeek | TechPodcast
GW361 Twitter Audio / Hey E-Mail / Facebook Wahlkampf/ Microsoft Office Chromebooks / Corona Warn App

GeekWeek | TechPodcast

Play Episode Listen Later Jun 17, 2020 56:22


Twitter bringt eine neue Voice Funktion. Sie wird es zuerst in der iOS-App geben. Allerdings nicht sofort sondern nach und nach soll sie freigeschaltet werden. https://blog.twitter.com/en_us/topics/product/2020/your-tweet-your-voice.html Hey-Email will die E-Mail revolutionieren und legt sich – marketingstechnisch natürlich ein purer Zufall – mit Apple an. https://www.theverge.com/2020/6/17/21293813/apple-app-store-policies-hey-30-percent-developers-the-trial-by-franz-kafka?scrolla=5eb6d68b7fedc32c19ef33b4 https://daringfireball.net/2020/06/hey_app_store_rejection_flimsiness Facebook startet einen Wahlkamp Center und erlaubt in den USA das Ausblenden von Wahlwerbung. Außerdem versucht das US-Justizministerium den merkwüridgen Trump-Erlass zu den sozialen Medien umzusetzen. Irgendwie. https://www.axios.com/justice-department-reveals-proposals-to-curb-platforms-protections-a1a536f9-501a-4797-9815-7383d478f798.html https://www.usatoday.com/story/opinion/2020/06/17/facebook-voter-campaign-strengthen-democracy-mark-zuckerberg-column/3191152001/?scrolla=5eb6d68b7fedc32c19ef33b4 Microsoft will seine Office Paket jetzt auf auf die Google Chromebooks bringen. Die Redmonder kennen langsam keinerlei Berührungsängste mehr. https://www.theverge.com/2020/6/16/21293180/google-chrome-os-microsoft-office-windows-desktop-apps-support-parallels Die Corona Warn App ist da. Lohnt sie sich? Ist sie zu teuer? Unsere 5 Cent.

Squiz Today
Friday, 12 June - Australian leaders urge against protests; Scott Morrison says Australia won't be coerced by China; Hosting the Fifa Women's World Cup; and the $1000 haircut...

Squiz Today

Play Episode Listen Later Jun 11, 2020 8:29


The Squiz is your shortcut to the news.“I whip my hair back and forth”More details, and links to further reading for all of today's news can be found in The Squiz Today email. Sign up (it's free!) - www.thesquiz.com.au ..Bupa (sponsored) https://www.bupa.com.au/ . Google Chromebooks (sponsored) https://www.google.com/chromebook/ .

Squiz Today
Wednesday, 10 June - The global economy shrinks; A 14 yo boy is still missing in Victoria; Reconciliation Australia removes their endorsement of Rio Tinto; and the remarkable achievements of Kathy Sullivan...

Squiz Today

Play Episode Listen Later Jun 9, 2020 8:49


The Squiz is your shortcut to the news.“Hit the road, Jack”More details, and links to further reading for all today's news can be found in The Squiz Today email sign up (it's free!) - www.thesquiz.com.au ..Bupa (sponsored): https://www.bupa.com.au/ . . Google Chromebook (sponsored): https://www.google.com/chromebook/ . *Battery life may vary based on device and upon usage and other conditions

Baywatch Berlin
Raus aus der Gefahrenzone

Baywatch Berlin

Play Episode Listen Later Mar 19, 2020 84:16


Jeder geht mit der Krise anders um: Panik- und Krisenherd Jakob Lundt steckt die Menschen in seinem Umfeld in erster Linie mit seiner Nervosität an, Schmitt geistert ziellos durch die Wohnung wie ein zurückgelassener Staubsaugerroboter mit Restakku & Klaas Heufer-Umlauf schützt sich zusätzlich noch durch eine alberne Sonnenbrille. Stichwort: Hä? Was ist ein dystopischer Nacken? Kann Klaas da mit seiner ollen Friseurschere von früher noch was retten? Stimmt es wirklich, dass unsere drei Helden zusammengerechnet 5x durch die Führerscheinprüfung gerasselt sind & wer hat nochmal warum bei Heufer-Umlaufs in den Flur gekackt (Spoiler: ein Mensch)? All das & mehr von Deutschlands bestem (3. Platz) ehemaligen Journalisten & seinen zwei Weggefährten in der neuen Folge namens “Raus aus der Gefahrenzone”! Mehr Infos zu Google Chromebooks auf google.com/chromebook Wo sind Chromebooks erhältlich? u.a. bei Amazon, MediaMarkt, Saturn, Cyberport

Craig Peterson's Tech Talk
AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Passwords, Data Collection, Big Tech and more

Craig Peterson's Tech Talk

Play Episode Listen Later Feb 25, 2020 13:13


Welcome! Good morning, everybody. I was on with Mr. Jim Polito this morning and we discussed Passwords, huge databases, data collection by Big Tech and our schools, COPPA  and Google. So, here we go with Mr. Polito. For more tech tips, news, and updates visit - CraigPeterson.com ---  Automated Machine Generated Transcript: Craig Now we've got the New Mexico Attorney General, who I'm sure will be joined by other attorneys general to file suit on this. We've got this children's online Privacy Protection Act, which has been around for quite a while that says any personal data for a child under the age of 13. If you collect that data on a child, you have to have explicit permission from the parents. Craig Good morning, everybody. Craig Peterson here. And that was me chatting with Mr. Jim Polito over in Worcester and Springfield, Mass, two biggest that's the second and third-biggest cities in Mass and we got talking about the new FBI recommendations. Also, a new lawsuit filed against Google. It is going to be the next big thing for governments going after companies like Google and other data aggregators who are collecting data on our kids through programs they sponsor in our schools. I can't believe what the schools are doing to the kids right now when it comes to their privacy. By the way, a bit of a warning. It was kind of scratchy this morning. I'm not sure what was going on. But anyhow, here we go. Jim Popular segment here on the show. It happens every Tuesday. At this time. I'm talking about our good friend and Tech Talk guru, who just happens to be from Canada, originally. Craig Peterson. Good morning, sir. Craig Good morning, Jim. Jim All right, Craig, I want to start with this. You know, we're in the political season now. You know, campaign slogans and phrases and all that but, so maybe that's this is an excellent time to change your password because the FBI is saying, Hey, get rid of that password, and come up with a pass. phrase, you know, like, make America great again, maybe not that one. It might be a little too obvious for some people, but they're saying phrases tell us about this. Craig It goes way back to the password came out oh my gosh, Dec, many, many, many decades ago. And it was a way to restrict access to a computer, and very few people were trying to break into them. Most of them didn't have a, you know, external wire. And what's an easy way to do this? Well, let's just have a password, and it was just simple, and it was enough to keep people out. And then we moved to the point where what happened is people had guys who got onto computers can steal the password files, and they had programs that would run through those password files and try and crack the passwords. You know, and that's when they came up with the idea, hey, listen, you got to have uppercase, lowercase digits, special characters, all of this other stuff. And today, it has changed the game. Today, as a result of all of these breaches is we have these large password data files. I have a copy of one of them, as well. I've been using to research these vast troves of data containing billions of actual people's passwords that they have used on a website, anything from their bank through Facebook or Google. It brings up the big problem, Jim, of using the same password on multiple sites, because what the bad guys are doing is they use that password file, passwords, billions of them, and they basically against you, or a cat online to try to break-in. So instead of trying to do something, that's computation, Generally intensive, they just say, Hey, listen, there really, there's about 10% of the people that use somewhere around the top 5% of all the passwords out there. So let's just go ahead, and we'll try those what the FBI is saying. If you use a string of words, as you had mentioned, you know, those bag of things, which by the way, as you pointed out, is a bad word because all people can use it. But if you use a string of words that are at least 15 characters long, it can take a hacker who's trying to make a brute force attack, and it can take that hacker good 100 years to break into your account. So it's simple advice. Most businesses are still aren't following it. It is something that I've been talking about for a few years now since I read some outstanding studies, not passports, I'm looking at how the hackers are working out there, and it goes back to 2015. So it's been about five years since I read some of those first ones. But the FBI his advice now, is it a longer password? Relying on simple words even and no special characters will take a crack and require more computational resources and, and therefore is much safer? Jim Wow. We're talking with Craig Peterson, our checkout guru, FBI recommending come up with a phrase. Don't use a password. A at the end of this segment will give you a little word that you can use. That word is going to be Jim, and you're going to get more information from Craig Peterson, but we'll tell you about that at the end of the segment. Okay, so I'm feeling safer. There. All right, now, here's where I'm not feeling safe. And it's for the kiddies. Okay, so Google is being sued. For misusing school kids, private data is this again, one of those cases where Google says I use this product, we have our this software for free. For free. Yeah. And then whenever it's free, you're the product, right? Craig Absolutely. It's like the free VPNs out there. You know, they're worse than not using a VPN. In this case, what we're talking about, is Google suite right here in Brockton, Mass. We've got a school tool that's using it. But Google has something called a Chromebook. We've talked about this before on the show. It is a Google Chromebook for the average user is the safest device to use out there. Okay, it is not more reliable than a MacBook but is much safer than a Windows laptop. There's a Chromebook, and the real, real exciting thing for schools is Yeah, they can be very cheap. Yeah. Right. Jim Like instead of buying an iPad for every kid in the school, which is expensive by the Chromebook, Craig 450 bucks, yeah. Cheap. They go only up to 1000 depending on what you want. But it's Google we're talking about here. So even though they are secure from a hacker getting into them standpoint, that doesn't mean that Google isn't tracking what you're doing. Enter the problem here. The cost for access to free tools, as we know, is paid for by Google having our data, right. Google's providing low and no-cost hardware and software tools to students and schools. In addition to just statistics nationwide, and now we've got the New Mexico attorney general who I'm sure will be joined by other attorneys general to file suit on this. We've got this children's online Privacy Protection Act, which has been around for quite a while that says any personal data for a child under the age of 13. If you collect that data on a child, you have to have explicit permission from the parents. It applies to websites, apps, any sort of digital platform, and they collected data from the kids. And the New Mexico Attorney General is saying, Wait a minute. Well, you are collecting the data, and it resides in your cloud. So what are you doing with this? You're violating federal law, in this case, also New Mexico law? Yep. And Sue is alleging that Google deliberately is just stealing school districts and Parents about data collection, and how much better Could it be for Google? Right? They want to ask consumers for life, and then they start with you. Jim Well, how about that commercial that was so popular and useful that aired during the Super Bowl. It was a gentleman who was a widower. He was talking to Google. He was talking about his wife, who passed away, and it showed how it would remember all these things about her and bring up memories and thoughts. And okay, yeah, what better way to start that is when you're a kid. Google knows your whole life so that when you're dying, and your life is flashing before your eyes, Google will do it for you. They'll insert a couple of advertisements probably. For Funeral Directors, they'll put in you know, an ad in for a funeral during Hey, and you're dying now. Why don't you tell you folks about our services Craig Do you want to go to such a funeral home? Google and Apple and Microsoft, etc., all want our private data. They all want to be the repository of all of this information about us over the years. You know you can pick who doesn't go to Dr. Google when they when something goes wrong, right? Or you're trying to figure out what the symptoms mean, what's going on Google does track that, by the way, Google has a flow tracker, on the number of people who are searching for symptoms. Remember now to the federal government is restricted and cannot obtain or gather specific information on illegal under federal law, right? So what is the what are they started to do? Go into these third party companies like the Googles that have the data on us, and the federal government even though they can't track it, also though they can collect it. Our private industry has no restrictions on doing that. And so the federal and state governments they're just bypassing the law and go into these data aggregators to get whatever data they want about it. Jim All right. So look, here's what you need to do you need to arm yourself and know all of these things. And the way that you do it is you get on board with Craig Peterson. Craig Peterson will provide you with this information for free, and you are not the product. He does it as a service to members and listeners of the show. So all you do is Text my name, Jim, to this number 855-385-5553 Texting Jim to 855-385-5553 standard data and text rates apply. Craig Peterson will not rip you off. And Craig, thanks so much. We'll talk to you next week. Craig All right, Jim. Bye-bye. All right. Craig 12:17 I'm sorry, that was terrible audio. I don't know I am debating whether or not I should even share that with you. I'm not sure what happened there. But, you know, say lovey like air. Anyhow, have a great day. And we'll be back tomorrow, hopefully with better audio. And then, of course, we got the show this weekend. And we're still working on our man. These tutorials are going to be amazing. By the time you finish these tutorials, you're going to be able to lock down any Windows or Mac computer yourself, and you're going to be able to lock down your small business network so that you're not going to be a victim of the bad guys. Best of all this is free. And if it was wasn't enough. You're going to know how to test everything yourself to make sure they can't get in. How was that for amazing, you guys, man. We're putting a lot of work into this, but you are going to love it. I think this is going to be the turning point in your security. Anyhow, have a great day. We'll be back tomorrow. Bye-bye Transcribed by https://otter.ai ---  More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

State of Tech Podcast
Pixelbook Go i7 4K Google Chromebook Review

State of Tech Podcast

Play Episode Listen Later Feb 7, 2020 15:41


Premium Chromebooks are making a name for themselves. The Pixelbook Go is Google's latest Chromebook and it's pretty amazing. In this episode, I talk about why I decided to buy one, how I'm using it, and what my experience has been like so far. You can also watch this episode on YouTube: https://youtu.be/assvtDgbFasPixelbook Go Base Model: https://jerad.link/pixelbookgobasePixelbook Go i7 4K Model: https://jerad.link/pixelbookgo4k☕☕ Support Jerad: https://www.buymeacoffee.com/jeradhill

L'Accélérateur - Histoires de créateurs de contenu
Convaincre des géants comme Google à annoncer sur son podcast avec Matthieu Stefani du podcast GDIY | L'Accélérateur #219

L'Accélérateur - Histoires de créateurs de contenu

Play Episode Listen Later Oct 2, 2019 62:09


Matthieu Stefani est entrepreneur, cofondateur et CEO de CosaVostra, une agence d'innovation digitale. L'est une entrevue que tu t'apprêtes à écouter a été préalablement réalisé pour le compte de mon autre podcast, L'Académie du podcast. C'est la première fois que je reprend une même entrevue sur 2 podcasts différents mais tu vas comprendre pourquoi je l'ai fait... Matthieu Stefani, animateur du podcast Génération Do It Yourself en est maintenant à plus de 100 épisodes sur son podcast. Mais là n'est pas la statistique la plus impressionnante de son parcours. Son podcast attire, mois après mois, 250000 auditeurs. C'est beaucoup de gens dans la francophonie. Ça pourrait même en faire le podcast le plus écouté dans la grande francophonie mondiale! Mais ce n'est pas tout! L'été dernier, il a réussi à avoir un annonceur de marque sur son podcast. En effet, Google, avec son Google Chromebook, a annoncé pendant plusieurs épisodes sur Génération Do It Yourself. À l'occasion de cette journée internationale du podcast, Matthieu Stefani a donc accepté gentiment de parler avec moi de toutes ses statistiques. De ses revenus. De comment il a réussi à attirer ces gros annonceurs sur son podcast et il a même partager avec nous le document dont il se sert pour leur vendre son émission. Si jamais tu n'es pas encore abonné à l'Accélérateur, tu peux le faire ici. Et pendant que tu y es, pourquoi ne pas écrire un avis ? Ça me rend service et ça rend services aux autres entrepreneurs comme toi aussi. Pour rejoindre Matthieu Stefani du podcast Génération Do it YourselfSite web de Génération Do It YourselfProfil Linkedin de Matthieu StefaniSlides pour vendre son podcast pour les podcasters Pour retrouver les liens pour me rejoindre: Pour remettre sa candidature pour le Mastermind de l'Académie du Podcast, passez par ce lien pour remplir le formulaire de mise en candidature Pour obtenir le plan que j'utilise à chaque épisode, veuillez vous rendre au lien suivant: https://academiepodcast.com/plan Vous voulez discuter podcast? Rendez-vous sur academiepodcast.com/coachingvip pour obtenir une consultation gratuite avec moi! Présentateur de l'épisode: https://marcobernard.ca/sio Mon podcast L'Académie du Podcast: http://www.academiepodcast.com Pour vous abonner à L'Accélérateur sur Itunes: http://marcobernard.ca/itunes Mon site internet: marcobernard.ca Ma page Facebook: www.facebook.com/mmarcobernard Mon profil Linkedin: https://www.linkedin.com/in/mmarcobernard/ Mon profil Instagram: www.instagram.com/mmarcobernard Mon profil Twitter: www.twitter.com/mmarcobernard L'Accélérateur en direct sur les ondes du FM1033: http://www.fm1033.Pour de l'information concernant l'utilisation de vos données personnelles - https://omnystudio.com/policies/listener/fr

Freelance to Founder
From struggling teacher to 6 figures with John Sowash

Freelance to Founder

Play Episode Listen Later Jul 25, 2019 64:04


John's story is the entrepreneur's story through and through.  A teacher for years, loving the job but struggling financially, he started to do a little consulting on the side, focusing on technology in the classroom. Until life presented him with a crossroads.  John decided to go all in - and now he’s making far more than he ever did as a teacher, but without losing touch with his former life as a teacher. Teaching is an important part of his life. He works with school districts and individual teachers on personal and professional development especially as it relates to technology, the use of Google Chromebooks in particular.  In this episode, you’re going to get to know John Sowash including:His start as an educator and how his crossroads came aboutHow and why he made the transition from teacher to “teacher of teachers”What he did to grow his business in the first 90 days Lessons he’s learned as an entrepreneur involving risk How he’s starting to digitize his business from traditional consultant to online business builderThis isn’t an episode just for teachers wanting to learn how to pivot from being a classroom instructor to being an online business builder. This is a story for any entrepreneur with a specialty and expertise, who need a real-world example of starting a business of working for themselves.  We hope you enjoy this episode of Freelance to Founder with John Sowash. If you enjoyed this episode, please leave us an honest rating on iTunes. Complete show notes for this episode can be found on Millo.co Thank you to our Sponsors for supporting this episode: Radix: In today’s digital world, your personal brand is your web address, your unique niche in the world. Get your space on the internet with a special 90% off offer on 1 & 5 year .space domains! Log on to get.space now and use coupon code “FREELANCETOFOUNDER” to redeem 90% discount on your domain! LinkedIn Jobs: Reach candidates you can't find anywhere else. Get your job in front of LinkedIn members who are active on our network, engaged in their careers, and open to new opportunities. Hurry on over toLinkedIn.com/Freelance and get $50 off your first job post. Care/of: Care/of is a subscription service that makes it easy to get vitamins, protein powders, and more, personalized just for you and delivered straight to your door. For 30% off YOUR first Care/of order, go to TakeCareOf.com and enter the promo code FREELANCE30. Subscribe for new episodes at freelancetofounder.com. This podcast is a production of Millo. Recently from the Millo Blog: 7 Best project management tools for freelancers & solopreneurs Learn more about your ad choices. Visit megaphone.fm/adchoices

Futurum Tech Podcast
Bigotry, Hate Hoaxes & Congressional Hearings

Futurum Tech Podcast

Play Episode Listen Later Apr 12, 2019 46:49


What could possibly go wrong when YouTube live-streams a congressional hearing on White Nationalism? The White Nationalists show up, resulting in a shut-down of user comments. When racism, bigotry, hatred and other unacceptable behaviors invade the social medium, the tech/social platforms have a responsibility to address the issue. But while tech often enables bad behavior, more tech may not be the whole solution. Could a better “block first ask later” policy to inappropriate online behavior be the key? Plus our Fast Five: - The FCC's $20b plan to fund rural 5G - Uber looks to get a "Lyft" from its IPO - Amazon Go Goes Green (as in greenbacks) - Google Chromebooks support native editing for Microsoft Office - Amazon pushes for higher minimum wage Our Tech Bites Winner: Amazon's "Alexa Listens then Amazon Employees Listen" revelation Our Crystal Ball: What do we expect in the Disney+ vs Netflix battle? Information: This Futurum Podcast features Daniel Newman (@danielnewmanUV), Fred McClimans (@fredmcclimans) and Olivier Blanchard (@OABlanchard). If you haven't already, please subscribe to our show on iTunes, Spotify or SoundCloud. For inquiries or more information on the show, email the team at podcast@futurumresearch.com or follow @FuturumPodcast on Twitter. To learn more about Futurum Research please visit www.futurumresearch.com. Disclosure: Futurum Research is a research and analysis provider, not an investment advisor. The Futurum Tech Podcast is a newsletter/podcast intended for entertainment and informational purposes only. Futurum Research does not provide personalized investment advice and no investment advice is offered or implied by this podcast.

Raw Popcorn
Episode 2 - Pi-Curious

Raw Popcorn

Play Episode Listen Later Feb 18, 2019 27:51


In this episode we talk about the Raspberry Pi single board computer and the Google Chromebook. --- Support this podcast: https://anchor.fm/rawpopcorn/support

The Video Insiders
DRM – Learning From the Past to Build for the Future with Christopher Levy from BuyDRM.

The Video Insiders

Play Episode Listen Later Jan 25, 2019 46:07


In this episode, we catch up with the President & CEO of the company who won the 2018 Frost & Sullivan Global Content Protection Entrepreneurial Company of the Year Award, where we talk about DRM and its ever-changing role in the video industry. Mark Donnigan: 00:00 This episode on DRM was so meaty, that we decided to jump right into a nine minute segment of Dror talking with Christopher Levy, who is President and CEO of BuyDRM, about how DRM technology fragmentation came to be, and the strategies behind DRM as a platform lock in. After this extended clip, we resumed the rest of the interview. You will definitely want to keep listening. Here's Dror and Christopher Levy. Dror Gill: 00:35 This is really an interesting trend you're talking about. On one hand, you have these silos, and the silos include the software platforms, the hardware devices, the content, and the DRM mechanism, which is made by a certain, by a specific company. Now, some of these companies have interest only in parts of this type of ecosystem. For example, Samsung have devices, they have a software platform, they don't have their own DRM, and they don't have much content of their own. So, now this collaboration with Apple is bringing more content, a lot more content, to Samsung devices, and bringing a lot more devices to Apple's content. We all know, all of you know, the rumors about Apple expanding their content service to be much wider than it is today, so it really makes sense. Dror Gill: 01:37 The topic you raise of which DRM will be used to enable this collaboration or cross-streaming of content between platform is really a very interesting issue. Another point you mentioned, which, you know, I can really resonate with, is the fact that standardization has happened across the video ecosystem in things, in components such as codex, packaging, controller mechanisms, manifests, things like that. And, DRM, although there have been attempts to standardize DRM, there has always been some internal component of that DRM that remained proprietary. That remained part of a closed, in siloed ecosystem such as PlayReady and Widevine, and this always struck me as kind of odd that everything else is standardized, and even the you know, mechanisms of exchanging keys in DRM's are defining DRM protocols. Dror Gill: 03:08 Everything is standardized but finally, the key. Those very large companies do not want to give up the key. The key is what they control, and it is the key of opening the content, but also the key to the whole ecosystem, and platform which enables their own platforms to grow. Dror Gill: 03:31 My question is, and referring to the fact that you also said that more and more layers or components of DRM are being standardized. Do you see somewhere in our near future that finally this content protection component will also be fully standardized, and in the same way that we're now having the harmonization of HLS and DASH with CMF, have harmonization of different DRM systems, and no single company would control those, this key to the industry? Christopher Levy: 04:10 You make a really good point that, you know, in essence DRM and Codec have had similar kind of evolutions over time. If you look specifically at the DRM industry, and not to make a short story long, but to kind of paint a picture of why we're at, where we're at, you've got an odd mix of singularities that it would seem would leave almost no possibility that there would be a marketplace for DRM where their companies would have to pay for it, or that companies would continue to invest in it. Christopher Levy: 04:46 I mean, if you fall way back to the beginning of the invention of DRM per se, as we know it, you fall way back to a meeting between Intertrust and Microsoft in, I think late 1999, where they agreed they were going to collaborate on some stuff. But then, at some point when Reciprocal launched, and decided that they were gonna partner close with Microsoft, Intertrust made an offer to Microsoft." Hey, give us two hundred and fifty million dollars, and license our technology," and a certain gentleman at Microsoft made the decision with his team to say, no. Only to later than lose a multi-billion dollar lawsuit to Intertrust, and Bill Gates wrote them a check that later allowed them then to go pursue every single company in the world that uses DRM. And so now, you've got Intertrust, who has a DRM, Marlin, that nobody uses in the U.S., only uses it in China, but Intertrust doesn't have a browser or an operating system. But, they own all the intellectual property around DRM, and so Apple, Microsoft, Google, Samsung, Sony, anyone in the world who touches DRM has had to take a license from Intertrust. Christopher Levy: 06:00 But, then Intertrust, wasn't able to be successful with their own DRM technology, because, as I mentioned, they're locked out when it comes to having a browser or an operating system. So, they actually have somewhat abandoned Marlin, and moved to support Google, Apple, and Microsoft's DRM's. But then, you look at them and you say, "Okay, what would drive these companies to integrate such, so they an be interoperable?" Because that's kind of what we're talking about here, is how are Samsung and Apple gonna interop, but how is that gonna help everyone? Including HEVC, and what you find out is, that you know, DRM was clearly created. When I say created, when it was commercialized by Apple, Google, and Microsoft, it was obviously done on two kinda bifurcated paths. Christopher Levy: 06:46 One, to satisfy potential looming lawsuits related to record labels, and studios, and artists, and creators, and content owners, pointing a finger at these large companies, saying your technology platforms are massive piracy platforms. Secondly, it was done as a platform play, to get you to use the platform. I mean if we look back at PlayReady. PlayReady was a technology that was completely driven to lock you in to using Windows based technologies, and Microsoft based technologies. Christopher Levy: 07:16 Now, if you pull that out, if you pull Intertrust, and Microsoft completely out of the DRM discussion, and you just look at Apple and Google, who really are driving the entire industry now. They both have been using DRM to date, and on both those paths. To satisfy the lawyers, and to satisfy the lock in, and that is just where we're at, but, now the market has gotten so saturated. Christopher Levy: 07:42 Google has not been successful selling devices. The Google Chromebook is a disaster. The Google Pixel phones are not selling as well as Google would expect they would sell, as the inventor, and owner of Android. So, now you get down to, okay, DRM previously was a legal thing, it was a lock in thing, but now, what is it? And I think what we're starting to see come to light is, that with the movement of common encryption, by you know, different various parties, the movement towards CMAF, the movement away ASCTR encryption, that was designed in PlayReady, into CBC encryption, we're really close to having a CMF, CMAF file, that using common encryption would have decryptors for Fairplay, PlayReady, and Widevine. Christopher Levy: 08:37 So, we're getting very close to that. A deal like this, that Apple and Amazon have struck. It really could be the gas to the match. I sense that there's gonna be a push through here, the technology, Apple's Fairplay has gotten a lot of deployment experience now, so there's a big community contributing back to Apple. Christopher Levy: 08:57 Apple has a very small team, if you knew the number of people working a DRM in Google and Apple, you would be shocked, and yet, they're converging. And, I think the reason they're converging, is that, you know, the consumer in the end, is dictating what they want, and consumers have made it very clear they want, you know, Samsung smart TV's. They want Apple TV's. They want Android tablets. They want Apple IPhones. Christopher Levy: 09:24 I think both of them now, are gonna take a little play out of Steve Jobs DRM playbook, and probably find a way to cross pollinate their businesses, because Apple's not in the search business, you know. They try and interact in the home marketplace, but Google already owns the home, outside of Alexa. So, it's interesting, you know, to just clearly take one stab at it. I would say that we are headed towards complete inter op ability and that has a lot of benefits. Christopher Levy: 09:57 It benefits operators, in cost reductions. It benefits consumers, in less confusion and playback stops. But mostly, it's gonna give Google a shot at, you know, exposing their offering to Apple's audience and vice versa. Announcer: 10:15 The Video Insiders is the show that makes sense of all that is happening in the world of online video as seen through the eyes of a second generation Codec nerd, and a marketing guy who knows what Iframes and macro blocks are. Here are your hosts, Mark Donnigan, and Dror Gill. Mark Donnigan: 10:36 Let's rejoin the interview with Christopher Levy from BuyDRM. Christopher Levy: 10:41 To kind of just give a quick summary, the company is one of the dark horses of the content protection, and DRM business. We have a pretty well known brand as a company. We have extended our platform out pretty widely in the business. So we have a Multi-DRM platform called KeyOS, and we have a couple of different components of it. Christopher Levy: 11:03 We have the encryption tools, we have the licensing tools, and we have the player tools, and we're integrated with about fifty different encoder server player companies in the marketplace. We service some of the major brands that you might be familiar with, like BBC iplayer BBC sounds, Sony Crackle, Showtime OTT, Blizzard, Warner Brothers, and we do a lot of work that we're not really at the liberty to discuss. Christopher Levy: 11:30 But we do a lot of pre-release work as well. So, a lot of the focus in the business is on consumer media, but we also have a pretty significant business that's, you know, pre-release. So, Digital Daily, Screeners, Academy voters. We are very active in the Academy voter space. We currently host Apple Fairplay certificates for the five largest media companies in the world today. Some of which you're familiar with, I'm sure. Christopher Levy: 11:57 To kind of fast forward, the company is privately owned. We are profitable. We own the company, myself, and the Chairman, Ron Baker, is my partner in the business, and we have different development teams based around the world. We've got our core team in Riga, Latvia. We have a team in Moscow, and a couple of people in St. Petersburg, and then we also have some people in Paris that work on our Android and IOS SDK's and our CTO is in Vancouver, and the company and myself, and the sales marketing management teams are all based in Austin, Texas, and yeah. Christopher Levy: 12:34 Just to fast forward, we, late last year, for the first time ever, in the Frost and Sullivan Global Content Protection Report. This report is, you know, it's kind of a bigger picture report. It's kind of what they call content protection includes casts and DRM, so we are listed in the report with some of the heavy weights like you know NAGRA or Detto. But we were included in that report, and we ultimately were selected as the entrepreneurial company of the year for our variety of different business models. Christopher Levy: 13:07 You know, we pride ourselves on having a very strong core DRM platform. But, we also now license our technology, so we've expanded into India, and all over Europe. We have several large major gaming companies, media companies that now run our software in their own data center, in their own cloud. So, that kind of vision shift in the company, I think is what got us over the goal line with the award. Christopher Levy: 13:30 But, we're just you know, wrapping up one of our best years ever, if not our best year ever, last year. And, we're just kind of waiting to see all the different crazy announcements that come out of CES, you mentioned our team is there on site. But, I'm closely watching the announcements that Apple made about partnering with Samsung in LG, because it creates some very interesting possible synergies that all of us can benefit from. Mark Donnigan: 13:56 Definitely. We're tracking that very closely as well. I mean, let's start there. Christopher Levy: 14:03 Well, you know, the DRM industry at large is very interesting, because it has become a bit of the political third rail of digital media, as I'm sure you all know. At this point, each DRM technology is siloed into a global technology company. So, if you start left to right based on the kind of market, you know, availability of the product, you had Microsoft with PlayReady. PlayReady runs in IE and EDGE, and on Windows natively. You've got Google with Widevine that runs in Chrome, primarily on Windows and Android, but also runs in IOS. It's the one technology that runs on all three platforms, and you've got Apple's Apple Fairplay DRM, which really only works in Safari on MacOS, and Safari on IOS, and it works for tvOS. It will also work possibly on other products, we may find out here soon. Christopher Levy: 15:11 I have to be careful what I say, but to kind of track what's going on, you know this announcement that Apple made about being able to move their business offering over to other platforms, I think, was largely driven by the tipping point of the iPhone sales over the past couple of years. It's no secret that Apple's last couple of iPhone product lines have not sold that well, so that's created kind of a tipping point in the company where now, they're trying to figure out, okay, where do we go next? And clearly Apple has a massive media empire. Christopher Levy: 15:45 They're one of the first companies to ever have a license to just about every song, and movie, and TV show that consumers in America are familiar with. And, they obviously have a globally strong brand. But, because DRM has been a political silo, today, you know, iTunes doesn't appear on Android. It doesn't appear on Tizen. It's not on Ruku. It's not on Smart TV's. But, that is going to change, and the question is, how will it change? Christopher Levy: 16:13 And to kind of give an example, if you take a look at Roku, who has gone through a similar transition where they were a streaming puck company, they were a streaming stick company. Then, Amazon entered the streaming stick company, and entered with Amazon prime, and Roku then suddenly decides, now, it's a content company. But, it also wants to get eyeballs and users onto it's platform, regardless of the direction it's going, and so Roku had to go. To support YouTube, they had to work with Google to implement Widevine DRM on the Roku platform, which previously was a PlayReady, and Verimatrix platform, natively and solely, and so that model where Roku kind of stepped over the fence and implemented Google's DRM to get YouTube is an interesting example of maybe what's going on with Samsung. We don't totally know yet. What Samsung and LG are doing, and we have our feelers out, and of course, we've talked to Apple pretty extensively about it, because we have a very close relationship with Apple as one of their frontline partners in the industry. Christopher Levy: 17:18 But, I think it plays out one of two ways, and it is somewhat DRM dependent, and Codec dependent, because of the fact that Apple is either going to allow Samsung to distribute iTunes on their platform, or really Apple is gonna distribute, I say, because it's an open app marketplace. But, Apple has a decision to make, and it's, do they deploy it using WideVine, and reformat their application platform to use Widevine DRM instead of Fairplay, or does Samsung jump the shark and implement Fairplay? Christopher Levy: 17:54 Because at the core of all these DRM's, the encryption decryption components are almost identical. At this point, all three DRM's us AES one twenty in encryption. There are some various different tweaks there, with regards to, the encryption mode CBC, verses CBR, but we're starting to see some standardization. I'm sure you're familiar with, with around formats. I personally believe it could go either way, or it could go both ways, because if Samsung were to implement Fairplay on their newer platforms, that would create a whole new synergy between Samsung and Apple that, oddly enough, hasn't been destroyed by the multi-billion dollar IP lawsuits that have gone back and forth between the two of them as vendors and competitors. Christopher Levy: 18:40 But on the other hand, I could see, you know, Apple just wanting to push it out through Widevine, because if they got iTunes to work with Widevine, and I mean iTunes video is what I'm focused on, then the majority of the relatively, recently shipped Samsung TV's, more than likely, can all support iTunes. Which would be kind of cosmic shift in these siloed offerings that all fall back to DRM. Am I right? I mean, Apple's got iTunes on Fairplay. Google's got Google Play on Widevine. So, it's an interesting thing that's gonna happen. I am very curious myself. Mark Donnigan: 19:21 It does sound like really good news ultimately. It's interesting your observation about, you know, the platform lock in. I'm thinking back to when I was active in the DECE, which became the ultraviolet, you know, which, was really revolutionary at the time. Because, you know, back then, you consume content from a particular store, if that was Vudu, for example. You were locked into Vudu, right. You know if Vudu wasn't on a particular device, then I was also locked in to the devices I could watch it on. Mark Donnigan: 20:00 So,the consumer now is going to enjoy the benefit of this truly, any content, anywhere, on any device, at any time. You know, so, that's all very good things. You know Christopher, I was reading your blog and by the way, listeners should definitely go to the blog, why don't you tell them again, I just I don't recall the actual url. Tell them the address of your blog. Christopher Levy: 20:29 Yeah, it's really simple to remember it's: thedrmblog.com. Mark Donnigan: 20:35 That's it. Thedrmblog.com that's awesome. Yeah, kinda like thevideoinsiders.com, that's right. No, Christopher, I want to get your comment on, I think it's your latest post, where you're talking about HTML5, kind of the App-less approach, and you know, I appreciated the article. Mark Donnigan: 21:01 It was presenting a little bit of the pro's and the con's of, and I think you were doing it in the context of inflight entertainment. And, I know that people, if you're running a video service, if you're Amazon, if you're Netflix, you know, even if you're Vudu, Hulu, whatever, you know, they have to maintain up, hundred, you know, multiple hundreds of different player SDK's. You know, it's incredibly complex. So, the idea that you could perhaps, just scale that way back, and perhaps just go to an HTML5 app, is interesting. So, maybe you can share with the listeners, both, your thoughts, and the pro's and the con's, and give kind of a recap of that blog post. Christopher Levy: 21:48 You bet. And, I mean clearly, that obviously, is also effected by the evolution of Codec, and HEVC and others, but there's this trend, and the in-flight entertainment space is an interesting creature. I've spent the past two years researching this space because previously BuyDRM had a bunch of clients in the space, but they were through third parties. So, you know, we had a business with Lufthansa, Technology Solutions, where they were deploying our technology in Virgin Airlines, LL Airlines, Lufthansa Airlines. Christopher Levy: 22:24 They put the technology on Greyhound buses. Post Bus, which is the largest bus company in Germany, and we also have a little bit of business with companies like Global Eagle, and some others, and we started to look at, you know what's the opportunity for us to enter the space directly. Christopher Levy: 22:41 So, we started going, attending shows, and doing research, talking to people. So, the way that in-flight entertainment systems make it on airplanes is different than you might expect. The airline industry has about four conglomerates that all, kind of, control what you call, you know, in-flight experience. Now, the in- flight experience, you know, the video piece is what we're focused on, but it includes interiors. It includes catering. It includes environment. It includes wifi. It includes being green. Entertainment's one component of it, but it's locked in with all these other kind of aspects of the business, and so therefore, it's treated in a very, what I would say, in a very institutional manner. Christopher Levy: 23:19 To date, in-flight systems have been wired, and they're in your head rest, or it's a fold up screen if you're a business, and you're first class, it extends out a little booth you're in, and you're limited to watch videos that are in a dedicated platform that's hardwired on to the plane, and that was the experience. Christopher Levy: 23:38 Then, along came satellite. Then, along came in-flight wifi. And, IFEC, you know, in-flight entertainment. The connected version with wires, suddenly pivoted to in- flight entertainment overnight. Which means wireless, and then DRM became a big topic. But, what you started to see DRM really drive, was the issue of, do airlines want to maintain premium content apps for their clients so they can watch content? Or do they just want them to open their browser, and get on the wifi network, sign in, and then have access to all the content through a browser? Christopher Levy: 24:12 There's this trend in the business where a lot of companies have gone the direction of the browser, so like, if you get on a Southwest Airlines flight, you want to watch Dish TV live, you know, the implementation is there, on the plane. There's a dish receiver on the top of the plane that's got multiple different LMB's. Each channel is switchable. They got an encoder on the plane that takes the MPEG transport stream coming down over the dish, converts it, encrypts it, shoots it out of a server, on the plane to your browser. And that's easy, and it's fun. And it works, and it's especially effective for live TV. Christopher Levy: 24:47 Stepping away from that, when you start to talk about doing things that are more efficient, and I think where consumers are headed, which is downloads, offline playback, bring your own device, the browser kind of starts to die because it doesn't work offline well. It doesn't do downloads well, because each browser has a protected limited amount of storage on the device it's running for security reasons. And browsers, the implementation, most players in them are not that efficient, and so what you find is that the browser is quicker, it's faster, it's dirtier, it's cheaper, but it opens up the door for a bunch of fails on the consumer side. Which is, decreased battery life, forced to use streaming, which uses the wifi radio which is decreased battery life, increased overhead on the aircraft. Christopher Levy: 25:43 You don't get offline playback or download, so you can't download a stream and play it in a browser effectively offline. And lastly, consumers are very comfortable with their devices. Like, if I'm given the option of watching my ten point seven iPad pro with my bose qc thirty-five-two headphones, I'm gonna pick that every time over plugging some crappy, hand wiped headphones that hardly fit, that sound terrible, into a jack that's crackling, so I can watch a screen that has a four inch thick screen protector on it. Christopher Levy: 26:20 The airline industries are trying to figure out, okay, well what do we do, because we're not OTT operators, but how do we make clients happy? And so, they're caught in a dilemma right now. Now, you know, I see it going two ways. I frankly think the live TV will continue to be in the browser. Remember, DRM adds some overhead cause you gotta decrypt the content and add some CPU overhead therefore decrease battery life. Christopher Levy: 26:44 When you move to an app, I think apps are gonna be a lot more prevalent for VOD content and shifted viewing, and TV viewing. The last thing that's going on, that the airlines don't totally understand, and I've spent a lot of time trying to educate them about, and this is kind of a tangential issue, but I'm sure you can understand, is that every single passenger that's on an airplane, more than likely, and I said within a ninety percent or higher realm of operation, especially on International and business flights, have a Netflix, Itunes ,Google Play, Hulu account. And now, with DRM they can download all the movies and TV shows they want to their device, and just go on the plane, and have every blockbuster, every TV show, every highlight, every documentary, every podcast, that they want to. Access on their own device, and use it in their own way in their own time, in their own comfort. Christopher Levy: 27:42 So, that's kind of the big divide right now, is companies are trying to figure out, well, we can save time and money on not having to build IFE apps, and just go to the browser, but we lose a bunch of things that consumers might want. There's a couple of other things which are also driving that, and those are accessibility issues which I think, will drive a lot of companies be forced to maintain apps, and those accessibility issues. Christopher Levy: 28:03 Accessibility use on devices, you know, iPhone and Android have different functions for people that have disabilities or motor challenged, and aren't, you know, able to use the device the same way they would use an IFE platform where they gotta touch the screen in front of them, you know, reach up, and et cetera, et cetera. Christopher Levy: 28:24 Secondly is multi-track audio. Thirdly, is multi-language caption support. I think those are the three issues, are more gracefully handled within applications. Christopher Levy: 28:34 Lastly, I think applications are more likely to support advanced codecs, like HEVC, sooner. Because the applications are running on devices that are being modernized, updated, purchased more widely across a wider range of markets. And so, the people that design the player SDK's and apps, and the operating systems in the devices, are much more likely to embrace newer codecs like HEVC, then browser operators are. Because browsers update at a crawl. Christopher Levy: 29:09 So, I mean, Google is the fastest browser updater in the business. But then, if you look at Safari, and IE and Edge, it's like, you know, waiting for your Grandmother to mail your birthday present. You get it like, four months later. But you're happy you got it, so I think that's the last kind of hidden thing, is that you know, within premium apps on devices, in a bring your own device model there's a greater chance that you're gonna get higher quality content sooner with DRM than you would in a set top box, or in a seat back implementation. Mark Donnigan: 29:40 Yeah this is a really important discussion, I think for any of our listeners who are planning video services, and maybe, sort of haven't been able to do that next level of research and are thinking, "hey, you know, I can just appoint HTML five, it will reduce complexity, it will get me to market faster." Those are all true, but you have to know what you're also not gonna be able to deliver to your customer. Mark Donnigan: 30:07 One of the other things, that I didn't hear you say, maybe I missed it, but I know one hundred percent, you know to be true, is that content licensing in some cases prohibits for example, HD in a browser, or certain browsers or in certain configurations. So yeah, you may be able to deliver in to that browser, but you're limited to SD, you know? 480p or maybe 720p, but not 1080p, so you're not able to deliver even the full quality. Mark Donnigan: 30:41 Now, in-flight entertainment, the bandwidths are so low that you know, I think 1080p is not very common anyway, but the point is, is that those are even things that you have to think about. Christopher Levy: 30:53 Well, a researcher David McCannon, he's pretty famous, he's a young guy over in the UK who previously, was responsible for a pretty significant kind of white hat hack that started to turn ugly. He's a pretty brilliant guy. He published some stuff on Monday of last week that indicated that he had breached Widevine's level three DRM. Which is the lowest level of DRM, mostly used in the Chrome browser, now it appears that what he breached, wasn't exactly Google's technology, but a third party[inaudible 00:31:30] technology that Google was using to wrap up their content decryption module that sits inside Chrome. Christopher Levy: 31:37 But, it's a good example of where, devices, especially Android devices, you know, they have hardware in them that allows hardware assisted key management. So, they have a hardware manage black box that sits on the device that is basically impenetrable. And so, that's another benefit of using devices. Christopher Levy: 32:02 Apple has the same thing, so Fairplay on IOS, taps into a trusted computing module that's on the chip that's in the iPhone or iPad. Same thing with Android with Google's DRM, you can get level one Widevine playback for HD, and 4K content on the device and then you can cast that out to a much bigger screen if you want over Chromecast, or over Airplay for example. So that's, that's another example where, you know, apps are much more secure than play back in the browser. Christopher Levy: 32:34 So, what has to happen now is Google's gotta go modify, and what they're in the process of, from what I understand, of updating their content decryption module for Widevine and Chrome, so that their level three use, which is what most of the operators use, is safe. Christopher Levy: 32:51 But again, they're operating on a non-native platform to them. Windows, in the most cases. Widevine also runs in Chrome on, on, on MacOS, but in those browser models, browsers are sitting on top of operating systems that the operator doesn't always own, and so that's again another benefit to using Premium apps. Mark Donnigan: 33:15 This is an awesome lead in to a discussion about AV1, and DRM support. I don't know, have you had the chance to do some research around you know DRM support for AV1? Christopher Levy: 33:30 Yeah, I mean, we've been following it pretty closely. We are really closely aligned with some companies that are working pretty seriously on it, I mean. We're very aligned with Google, and Bitmovin, and Amazon and Intel, and some of the other people that are involved in it. Christopher Levy: 33:47 But again, the big question is, at what point does AV1 start to appear in content in browsers with DRM's? And I guess, the problem that we kinda have right now, is that that hasn't really happened, and they've done some kind of stuff playing around with Firefox, to play AV1 content. But really, it's gonna be up to, again, it's gonna be up to Apple, Google, and Microsoft. Right? Because they are the ones that own the DRM, and the browser, and so again, you've got a weird. It's not a simple economy of supply and demand, it's, there's this third, you know, Robby Botter's hidden hand that's influencing who is gonna implement what. Christopher Levy: 34:43 You've got HEVC, which is widely deployed, heavily proven in the marketplace. It's gone through some royalty and licensing politics that are pretty consistent that all codecs go through. I kinda wish sometime, the encoding business had the same oligarchy god that DRM has, where Intertrust can just licensed everybody and be done with it. Christopher Levy: 35:07 But, HEVC in comparison to AV1, in HEVC there are tons of documents on you know, Apple's developer page, Google's developer portal, Microsoft's developer portal. Showing how to use their DRM with HEVC on different platforms, and there are numerous, numerous gibset manufacturers as you well know, and which we provided you a list of, that support it. And also, its supported in a lot of the browsers already, if not all of them. Christopher Levy: 35:36 AV1, on the other hand, is kind of nowhere with any of that yet, but it seems to be, you know, a little less encumbered with the intellectual property issues. But frankly, I feel like as it gets closer to being deployed, and people start to really get their hooks in to it, we're probably going to see the same thing happen to AV1 that happened to HEVC. But, I think it's gonna happen before it ever gets widely deployed, in my opinion. Dror Gill: 36:06 You think, when you say the thing that's gonna happen are you referring to patent accusations or patent infringement? Christopher Levy: 36:21 Yeah, I try not to pick a side, because you know let's face it. If you picked our entire industry, the two most researched dollar intensive things are codecs and DRM. You could build a Codec, and at the end of spending millions, throw it in the trash, because it didn't scale. You could build a DRM, and in the end, because you weren't doing a freedom to operate analysis ahead of time, find out that you built a great technology, but it's never gonna see the light of day in the market because you are infringing on someone else's IP. Christopher Levy: 36:55 I think what's going on with HEVC is kind of normal, right? Like, all these companies invested in it. And clearly, they intend to see their return on the investment, and they're looking at what happened with H- two-sixty-four, the patent pull stuff, all the, the kind of facts that we all know that there's quite a few companies in the business that aren't reporting royalties properly, and have kind of jumped the shark there. Christopher Levy: 37:20 So, I think HEVC has a better chance than AV1, if I were to weigh the two. Just because, it's, you know, all the points I've mentioned; much further widely deployed, chip support, browser support, DRM support. AV1 doesn't have any of that, and it doesn't have the encumbrances of potential legal battles, yet. But, I don't know. What do you guys think is gonna happen, when it comes time to walk the aisle with AV1? Dror Gill: 37:46 Indeed, nobody is giving you identification against any patent lawsuits for AV1. The companies involved in developing the codec itself, have signed agreements that they will not switch other, or the users of AV1, but this doesn't mean that somebody else will not claim any IP rights on algorithms used in AV1. Dror Gill: 38:18 And, on the other hand, the conclusion that we reached is that, the fact, it is well know that AV1, right now, is much more computationally complex then HEVC. Right now, it's like a hundred times more complex, and even the people involved in AV1 development have told us that in the end, when everything is optimized, it will still be five to ten time more complex than HEVC. Dror Gill: 38:49 And, we think that one of the reasons for that is all of that side stepping of patents. All of these techniques, which to be efficient in terms of bitrate consumption, as HEVC, but cannot use the same tools, and therefore I have to go in very weird ways around those protected methods in order to achieve the same result. And this is part of the problem, and why it is so computationally complex. Dror Gill: 39:26 Recently, I've come up with yet another conspiracy theory after hearing that a lot of the decisions made, somebody wrote this in a blog post. A lot of the decisions that were made during the development of AV1 were driven by the hardware companies were members of the AOM. Christopher Levy: 39:47 I was just gonna say that, Dror, is that A. There's not free lunch whether it's physics, mathematics, which is you know, part of physics in technology, in relationships, in religion, and that doesn't surprise me. Christopher Levy: 40:02 But, what I was gonna point out, was Occam's razor says, "the simplest answer is more than likely, the answer," is correct. I would say, that is what's driving it, because let's face it, I mean, there's not a person working on it that doesn't benefit from that. I'm pretty sure that Google, Amazon, Microsoft, Apple, all the other companies sell computing software, and technology and silicon, and intel, so I can't imagine why that wouldn't be the case. Christopher Levy: 40:32 But, you make a good point, that regardless of the fact that their trying to ignore the three laws of thermodynamics. I imagine they are, have a strategy for how they're going to sort that out, but the question is, will it really work? And, the only thing too, is if they don't adopt DRM into their message share pretty soon, and start showing examples of AV1 content with DRM, it's just gonna be another Ultraviolet. It's gonna be shiny. It's gonna sparkle. It's gonna have all the right looks and feels. It's got a cool logo. The stuff on the side is really cool, but will people use it, or is it just gonna be another augmented reality, virtual reality three-d, a year from now? Mark Donnigan: 41:14 You know, I sometimes find myself feeling a little agitated or sitting in a conference, and I'm listening to a panel, and I'm hearing either a panelist or even Mozilla, you know, saying, you know," it's coming, player support is coming. It's just months away. It's gonna be in the browser." And then they start, and I'm going, so, really? So, Sony pictures, and Warner Brothers is gonna allow you to play their movies inside a browser without DRM? Yeah. Let's see how that works. You know? Like? Then you've got up on the stage usually, or you hear speakers, and they're throwing off big service names, and Netflix is heavily behind AV1, so I am not naïve that Netflix is having these discussions, I'm sure. Mark Donnigan: 42:04 But the point is, that DRM is DRM. It has to be implemented. It has to, to work with the standards the content owners accept. But the fact that you don't hear DRM, it's sort of just... it's almost like, oh yeah, yeah. It's gonna be in the browser. It's gonna be supported. I'm like, that's just not how it works. It will come later. It's coming, don't worry about it.[inaudible 00:42:29] Christopher Levy: 42:28 I mean, nevermind the battle that was fought at the W3C by all the media companies just named, and a hundred more, along with Google, and Apple, and Microsoft to implement DRM in the browser, because they know that's where people want to view content on their computers, whether it be desktop or laptop. Christopher Levy: 42:46 But, they didn't do all the work, and engineering to get MSC and CDM's working to just all of the sudden, say, "see we're gonna throw it out the window because there's this new Codec in town." Mark Donnigan: 43:00 Yeah, exactly. Exactly. So, wow. Well, I'm looking at our time here. This has been an amazing discussion Christopher, and we absolutely, need to have you back because we didn't get to talk about players, and I know you guys are active, and I know also in the player development. So, I think, Dror, what do you think? I think a part two should be players. Dror Gill: 43:24 You know, Mark, Christopher did make this analogy between Codecs and DRM in one of the first episodes we told. Like the story of the Codecs, how they've been developed and DRM is also really a fascinating story, and even more because it's beyond standards that spam dozens of companies. It's really a few companies holding the power, holding the key, and that's also the DRM key. In the whole industry, and how it's gonna develop in the future I think would be really interesting to see whether we are going for true standards, finally, and a much easier life for consumers to play their content anywhere, or do we still have few years of struggling? So, really, thank you very much, Christopher. Mark Donnigan: 44:16 Christopher, your website is Buydrm.com, correct? Christopher Levy: 44:23 That's correct, and the blog is thedrmblog.com and once you guys get this podcast up and done, we'll go ahead and feature it on the blog, and I just wanted to quickly mention that in the next couple of days, we're gonna have a new blog post come out about deploying secure SDK's. And, we tackle a lot of the issues we talked about here in a generalist way. We do talk about our own SDK players, but I'll notify you when that blog is up. I think your readers will find it interesting. Christopher Levy: 44:53 We're also have an HEVC update on our blog, but after today once you post the final edited blog, then we'll go ahead and roll out our update that I provided you with regards to kinda where the market's at as well. Mark Donnigan: 45:09 Awesome. Awesome. Sounds good. Okay, well, we want to thank you again for listening to this incredibly engaging episode of the video insiders and until next time, what do we say Dror? Encode on? Is that our new..? Dror Gill: 45:29 Encode on! Encode happily! Mark Donnigan: 45:30 Encode happily, we've got to come up with something. Dror Gill: 45:32 Yeah, we need to invent something like, you can never compress too much. Mark Donnigan: 45:36 That's right, you can never compress too much, but you must preserve all the original quality. Alright, have a great day everyone. Thank you for listening. Christopher Levy: 45:45 Thank you Announcer: 45:47 Thank you for listening to the Video Insiders podcast. A production of Beamer limited. To begin using Beamer's Codecs today, go to Beamer.com/free to receive up to one hundred hours of no cost HEVC and H.264 transcoding every month.

Culture of Growth
Apple iPad Versus Google Chromebook

Culture of Growth

Play Episode Listen Later Oct 16, 2018 26:01


In this episode, Joe and is joined by Gerald Gumtang, the general manager of the local Staples store and he knows his technology.  Gerald and Joe discuss the merits to the Apple iPad and Google Chromebook and how they can impact learning in the classroom.   Thanks again for listening, please subscribe to this Podcast on iTunes, Podbean or where ever you listen to podcasts!  You can also check my Culture of Growth website (http://bit.do/cultureofgrowth), follow me on Twitter at @principaldumont, or send me an email at josephd@eics.ab.ca.  

TLDR

TLDR

Play Episode Listen Later Jul 10, 2018 2:18


TLDR, GeekWire’s daily news rundown, is sponsored by ReachNow. Featured Stories: - Microsoft unveils $399 ‘Surface Go’ with 10-inch display and USB-C port to take on lower-cost iPads and Google Chromebooks https://bit.ly/2ubfJSN - Pop star Demi Lovato to headline Amazon’s Post-Prime Day Celebration Concert in Seattle https://bit.ly/2uaKLKv - Russian cargo ship sets a new record for same-day delivery to space station https://bit.ly/2m4HlEO TLDR is GeekWire’s news rundown on tech, business, startups and other geekiness. Hosted by Starla Sampaco. We post new episodes Monday through Thursday. 

Computer Talk with TAB
Computer Talk 7/7/18 Hr 2 How to Use Windows "System File Checker"

Computer Talk with TAB

Play Episode Listen Later Jul 7, 2018 42:03


A graphic designer looks for a good anti-virus program for Macintosh computers that will not slow his system down. Also the caller discussses how blowing accumulated dust out of the computer can drastically improve performance. A listener suggests using the "compatibility mode" for the problem with Windows Microsoft Excel for Windows XP. We help a user use the "Windows Update Helper" to fix problems with Windows 10 Update not working properly. A listener gets assistance troubleshooting his wireless connection with his laptop. We help a user who is having difficulty receiving e-mail due to incorrect wireless settings to fix her "DNS" settings. A Windows 7 user attempting to update his GPS device wonders if a ".NET" software update is safe to install. We help a user change the default start-up page using the Mozilla Firefox web browser. A listener seeks alternatives to Microsoft Outlook for privacy protection against e-mail marketing purposes and asks about setting up a private file server. Finally, we help a user set up wireless printing from a Google Chromebook to a Brother printer.

Google Teacher Tribe Podcast
Dynamic Learning in the Classroom - GTT051

Google Teacher Tribe Podcast

Play Episode Listen Later Apr 16, 2018 33:58


Google News and Updates () Add a custom favicon in the new Google Sites Google Maps learns 39 new languages Making it easier to find and share GIFs with Google Chromebook tablets for versatile learning Featured Content () Examples with G Suite:  Student-Created Learning Goals with Google Keep Student-Created Vision Boards with Google Slides Using G Suite for Discussion Google Classroom Discussion Google Groups Discussion Blogger Blog with Comments Interactive Google Slide Deck Google Forms Survey Using G Suite to go BEYOND the Tools Create an eBook with Google Slides Stop Motion with Google Slides 10+ Things You Didn’t Know Google Slides Could Do Pixel art in Google Sheets Using G Suite for Student Choice Create Interactive Learning Menus with G Suite Give Students Choice in Google Classroom Assignments Build Choice into Hyperdocs Do This, Not That [infographic] Kasey’s Dynamic Learning with G Suite Presentation SUBMIT LESSONS!!! Buy the Book: Shake Up Learning Google Teacher Tribe Mailbag () Melissa Widrick recently commented on a previous episode's post: Keyboard shortcuts: Use CTRL+D in google slides to duplicate objects or word art. I love using word art over the text box, because you can adjust the size quickly, and if you use CTRL +D to copy it, you don't have to change the color and the font every time. Thank you to Monica Spillman and Laura Steinbrink for your recent Apple Podcasts Ratings and Reviews! On The Blogs () Matt - Shukes and Giff Podcast Kasey - 20 Tech Tips for Teachers [shortcode-variables slug="signature"]

RNIB Tech Talk
221: Apple education event, Facebook controversy, Google Chromebooks

RNIB Tech Talk

Play Episode Listen Later Apr 3, 2018 57:43


On this week's show Steven, Shaun and Tim are back together again discussing the week in tech news.  They discuss the recent Apple education event as well as the controversy around Facebook that is causing concern to their users.  There's also a chance to meet Sharon Lyons who produces information around how to use the computer without a keyboard using software such as Google's Chrome operating system, and there's more of your emails.

apple controversy google chromebooks apple education event google's chrome sharon lyons
Tangible Tech
Apple World Today News Update: March 26, 2018

Tangible Tech

Play Episode Listen Later Mar 26, 2018 4:09


Monday! Hopefully the day we all dread hasn't been too bad for you. We have some interesting news bits for you today: Apple is now accepting trade-ins of older Apple Watches Watch out, Apple! Google Chromebooks are already eating your lunch in the education market, and now Google and Acer have teamed up for the low-cost Acer Chromebook Tab 10 tablet. Can Apple beat it with a lower-cost iPad expected to be announced tomorrow? Use an iPad with a PC? The Microsoft Edge browser now runs on iPad, so you can send web pages from your iPad or iPhone directly to your Windows PC Apple's "original content" for streaming TV won't arrive until next March, and they're working on upbeat, optimistic content Amazon's Kindle app for iPad now supports Split View and a new continuous scrolling mode --- Support this podcast: https://anchor.fm/tangible-tech/support

Applelianos
Especial “Cables, adaptadores, cargadores inalámbricos de Apple - Originales vs compatibles “

Applelianos

Play Episode Listen Later Mar 23, 2018 184:33


Muchas preguntas, muchas dudas sobre este tema, hasta debates e nuestro grupos si recomendar cables compatibles pero baratos de amazon para nuestros dispositivos de Applem cargadoes inalámbricos ahora con la salida del nuevo iPhone X que se puede cargar de forma inductiva, si vale pena comprar tal o cual cargador compatible que no es de la propia Apple, tambien ocurre con simplees cables de carga como el Lightning, ofertas en amazon  que son dificiles de resistir, pero ¿Vale la pena comprar estos cables?. Este episodio nace a partir de un debate sobre un adaptador para un monitor externo deesde un Macbook Air, el cual un compañero recomienda uno de amazon de 9,99 euros, y yo otro mucho mas caro, luego nuestro compañero Josan, nos explico brevemente las diferencias de uno y otro el cual se publico en un One more thing. Sin entrar mas en le tema os dejare unos enlaces de los compañeros para que probeis vosotros mismo, si os merece la pena o no, un saludo Applelianos.   // Notas del Show y Enlaces //Chimon• Para el apple pencil• Lightning a USB• Cargador Inalámbrico Rápido, NANAMI 2 Bobinas Qi Wireless Quick Charger Carga Rápida 10W y Estándar 5W para iPhone X•  Belkin - Cable Duratek de Lightning a USB, 1.2 m, carga, sincronización, 2.4 A, MFi, nailon, color oro• Base de carga inalámbrica Boost Up de Belkin• Anker AK-A2021321 - Cargador de pared con entrada USB (2 x USB, 24 W, 2.4 A), para iPhone, iPad, Samsung Galaxy, Note, Nexus, HTC, blanco• USB Tipo C a Lightning Cable,Hunda 1m Cable [2 Unidades] para iPhone/iPad /iPod Conector a Apple Nuevo Macbook 2015,Nuevo Macbook pro 2016,Google Chromebook,HP Pavilion X20,Nokia N1 Tablet y más   //Relfon • Cargador Inalámbrico Rápido• Cable de carga Lightning a USB• Mini Cargador de Coche RAVPower 24W 4.8A Dual USB• AUKEY Cargador USB portátil de pared con tecnología AIPower   //Lucas • Cable Lightning, Cargador iPhone [Apple MFi Certificado]• Auriculares in-ear y Micrófono Cancelación de Ruido Auriculares con Cable de Alta Fidelidad para iPhone• JBL T110 - Auriculares intraaurales con micrófono• [Apple MFi Certificado] Cable de carga Lightning a USB• Jack a RCA Audio Cable• XLR3 Cable, UGREEN Cable XLR a XLR • Cargador iPhone Syncwire Cable Lightning - [Apple MFi Certificado]• AUKEY Cable Lightning 2m*2 [ Apple MFi Certificado ]• 1,5m cable de HDMI - Ultra HD 4k HDMI | Alta velocidad con Ethernet | • 15m Cable de red Gigabit Ethernet Lan CAT.6•iPhone X Funda, de Centopi - Resistente a arañazos - Ultra Delgada & Ligera -SIN grosor- Funda TPU cubierta de delgada capa de silicona en la parte posterior - Claro• iPhone 6 / 6s funda, ESR iPhone 6 / 6s 4.7'' TPU Funda Dura Parachoques Funda Cover Carcasa Para iPhone 6 / 6s(Pequeño Diablo)   //Mixtega  • [Belkin Cargador de carro y casa](Belkin Apple Certified Charging Kit with Lightning to USB ChargeSync Cable (2.1 Amp / 10 Watt per Port)• Belkin lighting cable](Belkin Apple Certified MIXIT Metallic Lighting to USB Cable, 4 Feet (Silver• Belkin Car Charge and Navigation Mount for iPhone SE / 5 / 5S / 5c• Plugable USB-C to DisplayPort Adapter Cable (6'/1.8m) for 2016 / 2017 MacBook Pro, MacBook Retina 2015• Hosa CSS-105 1/4 inch TRS to 1/4 inch TRS Balanced Interconnect Cable, 5 Feet, Black• Hosa STP-201 1/4 inch TRS to Dual 1/4 inch TS Insert Cable, 3.3 • nonda USB-C to USB 3.0 Mini Adapter [World’s Smallest] Aluminum Body with Indicator LED for Macbook Pro• OtterBox COMMUTER SERIES Case for iPhone 6 Plus/6s Plus (5.5" Version) - Frustration Free Packaging - GLACIER (WHITE/GUNMETAL GREY)• Rode Procaster Broadcast Dynamic Vocal Microphone• RODE PSA1 Swivel Mount Studio Microphone Boom Arm   //Carlos Castillo • Cargador• Funda• Cable   //Julio https://www.ikea.com/es/es/catalog/products/40381979/   //JaviSystem • Adaptador de corriente PISEN 1A TS-UC037 cargador USB universal. Seguro y adaptado para los standards de seguridad de la Unión Europea   //Israel • Soporte Docks de carga Airpods, Apple Watch, iPhone o iPad• Brazo universal Flexible 360 grados de rotación larga para iPad Pro 12,9¨• Cargador para Apple Watch 4400mAh Batería Externa Cargador Inalámbrico• Funda Batería iphone 7 plus (5.5 pulgadas), 10000mAh• Base de Carga USB Soporte para iPhone 7/Apple Watch• HUB USB 3.0 Mac HooToo Alimentado USB C, USB 3.1, HDMI 4K UltraHD, Lector de Tarjeta SD, 3 Puertos USB, Adaptador Multipuerto para Mac/Mac Pro/Chromeboox Pixel [Certificado MFI]• Base con 4 puertos USB 3.0 Premium y acabado en , cable blindado de 61 cm para iMac • Soporte iPad Pro• Adaptador de Mini DisplayPort a HDMI 4K de Belkin• Funda con teclado Logitech Create para iPad con portalápiz para Apple Pencil   //Adrian http://www.belkin.com/es/p/P-F8J207;jsessionid=6263C5CE5D197E00C8D6B10102B0E63E/ https://www.apple.com/es/shop/product/MNF82Z/A/adaptador-de-corriente-usb-c-de-87-w-de-apple https://www.apple.com/es/shop/product/MK0X2ZM/A/cable-de-usb-c-a-conector-lightning-1-m https://www.amazon.es/AUKEY-Cargador-Samsung-Galaxy-iPhone/dp/B01FHO97M0?tag=applesfera-21 https://www.amazon.es/gp/product/B01M1SCIOV/ref=od_aui_detailpages00?ie=UTF8&psc=1     //Dekkar StarTech.com Cable Adaptador de 1m de Monitor Mini DisplayPort 1.2 Macho a DP Macho - 4k con soporte HBR Blanco https://www.amazon.es/gp/product/B0721VNBW7/ref=oh_aui_detailpage_o09_s00?ie=UTF8&psc=1 https://www.amazon.es/gp/product/B074DV68LX/ref=od_aui_detailpages00?ie=UTF8&psc=1     // Síguenos en Twitter• Applelianos // Telegram Applelianos • Applelianos (Oficial) // Particpantes del episodio • Lucas• Chinom• Carlos Castillo• JaviSystem• Julio• Dekkar• Adrian Si queréis recibir notificación en tiempo real de nuestros directos tenéis que descargar esta app. Si has disfrutado de este episodio, no olvides darnos una reseña en iTunes

EdTech Rewind
Episode 38 - New Beginnings

EdTech Rewind

Play Episode Listen Later Dec 13, 2017 51:13


Episode 38 is live! It has taken the guys a minute to recover from the awesomeness that was GaETC and things have been crazy! In the big news, Lee has a major announcement related to some New Beginnings. Spoiler alert... Lee is taking a new job! Check out the episode for details. The guys also break down some major happenings in the EdTech-verse. We've got schools being held hostage by ransomware, breaking of Google Chromebooks, and Clint's school district going whole hog on Google by incorporating Gmail into their mix! Articles and information found at the following:Ransomware: http://www.kmvt.com/content/news/Jerome-School-District-falls-victim-to-ransomware--463510223.htmlGoogle Breakdown: https://www.edsurge.com/news/2017-12-05-here-s-what-we-know-about-the-chromebook-internet-outageAmplified IT: https://www.amplifiedit.com/

EdTech Rewind
Episode 38 - New Beginnings

EdTech Rewind

Play Episode Listen Later Dec 12, 2017 51:13


Episode 38 is live! It has taken the guys a minute to recover from the awesomeness that was GaETC and things have been crazy! In the big news, Lee has a major announcement related to some New Beginnings. Spoiler alert... Lee is taking a new job! Check out the episode for details. The guys also break down some major happenings in the EdTech-verse. We've got schools being held hostage by ransomware, breaking of Google Chromebooks, and Clint's school district going whole hog on Google by incorporating Gmail into their mix! Articles and information found at the following:Ransomware: http://www.kmvt.com/content/news/Jerome-School-District-falls-victim-to-ransomware--463510223.htmlGoogle Breakdown: https://www.edsurge.com/news/2017-12-05-here-s-what-we-know-about-the-chromebook-internet-outageAmplified IT: https://www.amplifiedit.com/

AWS re:Invent 2017
WPS207: Building On-Demand Classrooms and Labs Using Amazon WorkSpaces and Amazon AppStream 2.0

AWS re:Invent 2017

Play Episode Listen Later Nov 30, 2017 50:31


Explore how education can create equitable learning experiences in the era of bring-your-own-device and Google Chromebooks, by delivering Microsoft Windows applications to students with Amazon WorkSpaces and Amazon AppStream 2.0. We discuss how students of all ages can use design applications, business intelligence tools, technical programs, and even desktop games such as Minecraft as part of their class curriculum, and still have a unified end-user experience, regardless of the hardware they are using. We dive into the steps for setting up WorkSpaces and AppStream 2.0 within a classroom, choosing the right option for your school, connecting existing storage and identity, enabling applications for students, and managing costs.

Geek 2.0 Podcast
Episode 1: Pilot

Geek 2.0 Podcast

Play Episode Listen Later Jun 3, 2017 39:30


Show-notes: YouTube and keeping your kids safe online and dealing with advertisements. The benefits of being a cord cutter. Microsoft releases Windows 10 S, dives full board into taking a larger chunk of the education market from Google Chromebooks. HTML for Babies - http://codebabies.com/product/html-for-babies Code-a-pillar -  https://www.amazon.com/Fisher-Price-DKT39-Think-Learn-Code-a-pillar/dp/B01ASVD2L4 The Island of Dr. Brain - https://en.wikipedia.org/wiki/The_Island_of_Dr._Brain Bitsbox the monthly box for teaching your kids coding. https://bitsbox.com/ Had to add the Jurassic Park reference. Trying to find a middle ground in pushing your kids into something without forcing them and having them resent you later in life. Intro Music: Intro For A Nonexisting Video Game by Captive Portal Outro Music: Utopia (instrumental) by YACHT --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/geek20podcast/message Support this podcast: https://anchor.fm/geek20podcast/support

No Wrong Answers
The "Googlefication" Lesson

No Wrong Answers

Play Episode Listen Later May 23, 2017 37:31


This week, we can’t not talk about the crazy week that was in Washington. (Here’s a recap. Believe us: you need it.) Our teachers say they used to read the news to decompress from school. No longer. Then, we tackle President Donald Trump’s proposed federal education budget, which would completely eliminate funding for a variety of programs, from gifted and talented education to civics education. Finally, has your school gone “full Google?” Our teachers’ schools have all gone one-to-one or are in the process of going one-to-one with Google Chromebooks. Is this a good thing?

TendenciasTech
Microsoft Chromebook la competencia de Google Chromebook

TendenciasTech

Play Episode Listen Later May 2, 2017 39:50


Platicamos en este podcast de tecnología acerca de Microsoft Chromebook la competencia de Google Chromebook que se dará a conocer en el evento de la misma empresa el día 2 de Mayo a las 9:30 AM Hora Centro. La empresa de Bill Gates se esta enfocando en la rama de la educación, y gracias a esto Microsoft nos presenta su nueva Microsoft Chromebook y también su nuevo Windows 10 Cloud. El sistema operativo para esta nueva Microsoft Chromebook.https://www.tendencias.tech | TW: @tendenciastech | FB: TendenciasTech | App: TendenciasTechSupport this show http://supporter.acast.com/tendenciastech. See acast.com/privacy for privacy and opt-out information.

Bandrew Says Podcast
058: How to Increase Audience Interaction

Bandrew Says Podcast

Play Episode Listen Later Mar 6, 2017 31:07


00:00 - Intro 01:18 - Launching a YouTube Giveaway 04:23 - How to Get More Audience Interaction 06:49 - Accessing Your Information from a Locked iPhone 09:00 - YouTube TV 12:42 - Google Chromebooks 17:11 - Teddy Bears Leaked Recordings of Kids 19:34 - X-Files Episode Suggestion 22:31 - Another YubiKey 23:22 - A Faraday Bag 26:25 - The Complete X-Files 27:50 - Using an iPad as my Main Computer 30:17 - Outro On episode 58 of the BSP, I first talk about launching the 25,000 subscriber giveaway on the podcastage channel. I cover the service I'm using to run the giveaway, and what the reaction has been. Then I provide a fun way to increase audience interaction on your video/podcast. Next I share a story about accessing user information from a locked iPhone. Then I talk about YouTube TV, what is different, and why I'm not that excited about it. I also share my thoughts on Google Chromebooks, and a recent security breach regarding internet connected Teddy Bears. After the news, I share a suggestion for those who want to start watching X-files. As far as what I have been testing, I talk about another YubiKey, buying a faraday bag, a book I just purchased, and using my iPad as my main computer. The Bandrew Says Podcast is available on: ►iTunes: https://itunes.apple.com/us/podcast/bandrew-says-podcast-audio/id1046423132?mt=2 ►Google Play Music: https://play.google.com/music/m/Ieua25h7tadlb2ti4p5nclqhjuu?t=The_Bandrew_Says_Podcast_Audio_Video__Tech ►RSS Feed: http://bandrewsays.libsyn.com Follow us on: ► Facebook: http://www.facebook.com/bandrewsayspodcast ► Twitter: http://www.twitter.com/bandrewsays ► Website: http://www.geeksrising.com

BeBizzy Break Podcast
BeBizzy Break : Episode 31 - Case of the Googles

BeBizzy Break Podcast

Play Episode Listen Later Mar 1, 2017 32:42


Host : Marv Dorner, BeBizzy Consulting We're talking about Google Keep, Google Docs, and Google Chromebooks today on the BeBizzy Break. But first, we're proud to annouce the launch of our newest website, Path To Pono. Contact Sandy Thompson with questions about recruiting great employees, developing leadership in your organization, and helping your family with substance abuse. Now, on the Googles. Google has finally brought Google Keep into the GSuite environement in the web version (desktop and browser) Easily import Keep notes into Google Docs Google Keep is the notetaking app available on all devices (Android, iOS and in your browser) that takes audio, handwriting, images and itemized lists. You can also color code, and tag notes for ease in search and identification. Samsung Chromebook Pro - my next tech purchase (when it gets released) Chromebooks allow you to live in the Google environement for documents, the Chrome browser, photos and more. And now there's a reasonably priced great device called "Kevin" that even allows users to run Android apps on their Chromebook. The device is convertable to a tablet, and even has a Samsung S-Pen for taking notes and other visual needs. The Chromebook Plus is available for $449, with the Chromebook Pro being released in "Spring 2017" for around $500. Have a great week, everyone. Spring is slowly on the way! Don’t forget to send us any suggestions for apps to review or people to interview. And subscribe to the BeBizzy Break Podcast on iTunes and Stitcher Radio.  And as always, leave the technical stuff to us!

More Than Just Code podcast - iOS and Swift development, news and advice

AskMTJC opens the show discussing Amaziograph and Easel for iPad Pro. We follow up on the the cost of building apps and marketing the iPad Pro as Apple rolls out it's latest iPad Pro TV commercial. This leads to a discussion of low end computing. We discuss the churn of app development tooling and whether it has an asymptote. Aaron tells us about The Three Body problem, the Megaprocessor and a diabolical scam using iOS profiles. Picks: building games on Alexa, iPassword Subscriptions for Individuals, Apple TV Remote app, Protocols with Associated Types and Secrets of the Apple Store. Stop yelling at your iPhone! Correction: we already have associatedtype in Swift 2.2 Sponsored by: Buddy Build Episode 103 Show Notes: Introducing: Easel http://www.aviladesignco.com/ Amaziograph Wacom Cintiq http://www.it-guy.com/2015/01/episode-22-indie-development-numbers/ Apple’s record app store sales month Apple’s new iPad Pro ad Smart Keyboard for iPad Pro Logitec Create for iPad Pro Google Chromebooks NetBooks Episode 64: Ric Sarabia on Roundabout Creative Chaos The Churn Eclipse three20 Episode 242: Manton’s Out Megaprocessor The Three-Body Problem Diabolical Scam using iOS Profiles Objective C history Amazon Echo Now Lets You Investigate the Murder of Bruce Wayne’s Parents (Exclusive) Zork Rogue game Hunt the Wumpus Gwendolyn Weston: Keep Calm and Erase On RWDevCon 2016 Session 303: Introduction to Protocol-Oriented Programming - Alexis Gallagher Episode 103 Picks Announcing a New Tool for Building Interactive Adventure Games on Alexa 1Password Adds Subscription Plan for Individuals Apple TV Remote app Natasha Murashev - Practical Protocols with Associated Types in Swift SECRETS OF THE APPLE STORE, REVEALED BY EX-EMPLOYEES

IT Babble's Podcast
Episode 106 - Save Tony

IT Babble's Podcast

Play Episode Listen Later Jan 25, 2016 23:00


Today we discuss why Tony is missing, is Sesame Street on its way out and should schools even consider purchasing iPads now that Google Chromebooks make up more than 50% of devices in US schools. Check out the show notes below. What Will HBO's Sesame Street Look Like? by Jessica Pressler of Vulture a. Link: http://www.vulture.com/2016/01/what-does-hbo-mean-for-sesame-street.html b. Is this the beginning of the end? c. Thoughts? Do schools still use it much anymore? d. Reading Rainbow - https://www.readingrainbow.com/ e. Malcolm Gladwell The Tipping Point - http://gladwell.com/the-tipping-point/ Apple loses more ground to Google's Chromebook in education market a. Link: http://www.usatoday.com/story/tech/news/2016/01/11/apple-loses-more-ground-googles-chromebook-education-market/78323158/ b. iPad Mini 2 - http://www.apple.com/shop/buy-ipad/ipad-mini-2 c. If you're looking for devices do you even consider iPads anymore?

Vox Talk
Vox Talk #87 – DreamWorks’ Home, Free Online VO Resources, Google’s Chromebook, Midwest Voice Over Conference, Honey and Voice Care

Vox Talk

Play Episode Listen Later Apr 4, 2015


Stephanie’s back from NYC! Carmi talk about how Home hit it big at the box office and explores free voice-over resources online. In Tech Talk, it’s all about Google’s new, inexpensive computer, Chromebook and how cheaper tech might come with a price for voice pros. In the Vox Box, we’re talking about the upcoming Midwest […]

The Tech Night Owl LIVE — Tech Radio with a Twist!
The Tech Night Owl LIVE Dec 20, 2014

The Tech Night Owl LIVE — Tech Radio with a Twist!

Play Episode Listen Later Dec 21, 2014 159:17


On this week's all-star episode, we present commentator Kirk McElhearn, Macworld's "iTunes Guy," who will discuss Amazon's pilot program, underway in New York City, to deliver your stuff in two hours, coping with ISPs and bandwidth caps, the possibilities for Apple TV, and the recently-ended iPod antitrust trial where a jury found in Apple's favor in just three hours. You'll also hear from cutting-edge columnist Daniel Eran Dilger, of Roughly Drafted Magazine and AppleInsider, as he exposes false and misleading tech reporting, often about Apple. So in this segment, he'll explain that, no, Apple didn't exactly lose the top spot in education to the Google Chromebook. His revealing remarks will also include the iPod trial and the possibilities for the Apple Watch.

IT 公论
Episode 130: 「我们的目的是提供更少的信息。」

IT 公论

Play Episode Listen Later Dec 14, 2014 90:33


《IT 公论》会员计划推出!本期我们讨论了移动互联网时代 app 的解绑与捆绑两种趋势,web 和 native app 的区别(放心,不是关于用户体验的老调重弹),Firefox 的未来,以及李如一和《好奇心日报》合作的游戏专题。 每月三十元,支持李如一和 Rio 把《IT 公论》做成最好的科技播客。请访问 itgonglun.com/member。 如本期标题所说,在信息过载的今天,我们的目的在于提供更好,而不是更多。有听众说会员制 = 粉丝经济。但我们从未把大家视为「粉丝」。你们是朋友,是听众,我们之间的关系也并非授予和索取。《IT 公论》更像指针,它所指向的东西,有时需要付出一点努力才能得到——真正的「干货」都是如此。 一位任先生来信说,微信公众账号无法从网页链接,是因为微信团队不希望大网站轻易将其流量优势转化成公众号的关注数: 微信不鼓励「大」号的产生,所以将关注公众号的方式统一做成繁琐的刷二维码,或是搜索名字,以此将大家拉到同一起点。不过有趣的是,最近微信开放了允许第三方开发者通过 app 链到公众号的接口。 在设计上抑制大网站将流量倒入微信公众号,对于独立媒体有促进作用。腾讯对 UGC(「用户创造的内容」)的信仰体现无遗。在链接一事上对 app 和 web 区别对待,让我们想起了风险投资公司 a16z 的 Benedict Evans 最近的一篇〈App unbundling, search and discovery〉。通常我们把后 PC / 移动互联网时代视为秩序的重建。在全体网民用桌面浏览器上网的年代,任何人可以做任何事。要链接别人家的一张网页不需要对方提供什么支持,也不大会考虑「我是不是白给他带去流量了」这种事。移动互联网时代,我们转向了以 app 为核心的操作模式。对于开发者而言,限制多了,规矩多了,但用户则感到秩序随之而来,获得了精神上的安宁。 Evans 从另一个角度思考了这个变化。在前移动互联网时代,浏览器是你和互联网几乎唯一的接口。主流的浏览器品牌不过两三个,它们之间的差别只在于好用程度。移动互联网时代,成千上万个 app 都可以是你和网络的接口,而 app 之间无法方便互联,导致 Google 揭橥的以互相链接为基础的信息发现模式不再成立。发现内容的成本大大提高。在这种情况下,中美的互联网产品采用了不同的做法。简单来说,美国更倾向于解绑,中国则更倾向于捆绑。 解绑的典型例子是 Facebook。继 Facebook Messenger 成为独立的 app 以来,最近 Facebook Groups 也被分离。而 Evans 拿百度地图与微信两个例子说明了中国互联网公司的捆绑倾向。当你把订餐和买电影票一类的功能都塞入百度地图时,你似乎是在暗示用户说「我们可以回到美好的前移动互联网时代」。不用整天安装、升级软件。你只要有一个 N 合一软件(以前是浏览器,现在是微信和百度地图等疯狂整合功能和内容的 app)就够了。 中美公司在这一点上的区别,背后的因素恐怕非常复杂,但李如一认为单纯以「国人使用习惯」来解释是偷懒的做法。工具虽是应人类需求而生,但同时也会反过来影响和塑造人类——Marshall Mcluhan 几十年前就说过了这个道理。究竟「国人使用习惯」是事先就存在,只等创业者一一归纳并满足的某种属性,还是创业者对工具的设计更大地塑造了我们现在称之为「国人使用习惯」的那种东西,是值得思考的问题。 说到中美差异,美国人 Dan Grover 最近从旧金山搬到了广州,加入微信团队。经过一段时间的观察后,他在博客上写了一篇长文总结中美互联网产品在 UI 上的区别。在我们都已经习惯随时「扫一扫」的今天,可能很难想像有不少美国普通民众不知道二维码究竟该如何使用。但二维码在中国(以及部分其它亚洲国家)的风行是不是一种滥用?毕竟在公园拍摄树干上的二维码是一种无缝的用户体验,而在微信公众号发送一篇文章也要拿出手机拍一下电脑屏幕就相当分裂了。验证用户的信息应该有更好的方法。 Chromebook 笔记本在今年第三季度于美国学校的销量超过了 iPad。固然学校市场对计算设备的需求属于价格敏感型,但我们也可以说 iPad 对教育市场的想像没有能被现实证明。这里仍然可以联系到 Evans 关于解绑与捆绑的理论。前移动互联网时代是一个浏览器走天下,而 Google 在 Chromebook 干脆是把浏览器做成了一整个操作系统。看起来美国人也更喜欢大而全的「一站式解决方案」。国人与国人毕竟都是地球人,深层次的共性依然多于个性。 还记得 Firefox 吗?2004 年,那可是一款能够用让用户众筹(2004 年!)买下《纽约时报》整版广告为其助威的浏览器。但 2014 年的今天,身为半个前端开发者的 Rio 做项目时经常已经不去测试 Firefox 的显示效果了。Opera 改用 WebKit 引擎之后,Gecko 系的 Firefox 更加显出了悲怆感。最近 Mozilla 终于决定为了让 Firefox 上 iOS 而改用 WebKit(苹果不允许第三方开发者使用 WebKit 以外的引擎),或许他们终于意识到了情怀不能当饭吃。当年响应其号召筹款买广告位的那些用户,实在是因为受够了 IE。历史上单纯因为「开放」之类的口号赢得市场的产品……存在吗? 时代确实不一样了。Firefox 辉煌的日子里,连 Google 都要看重这个入口。Mozilla 的绝大部分收入常年都来自 Google 为了让自己成为 Firefox 默认的搜索引擎而支付的巨额费用。不过最近 Mozilla 宣布 Firefox 的默认搜索引擎将改为 Yahoo。我们能理解 Yahoo 为什么要这么干,但不觉得这对 Firefox 的用户会有任何好处——更不觉得它对吸引其它浏览器的用户转用 Firefox 能有什么帮助。 李如一的〈我们应该如何对待游戏,毕竟它已经成为当今世界的第一媒介〉(原题为〈阅读游戏〉)作为《好奇心日报》游戏版块的开篇词已经于上周末上线。接下来的一年里,他将以客座编辑的身份为《好奇心日报》策划和撰写一系列有关游戏的专栏与专题报道。这里有为游戏正名的意思,但更关键的是强调 inclusiveness。少用黑话,正确拼写,不追主机新闻,不写导购向的游戏评论,不回避十年前甚至更久以前的游戏,把游戏当作媒介、艺术与可阅读的文本来对待。正如我们有 Taylor Swift 也有各种地下音乐,我们有 Dota 2,也有各类独立游戏。或许未来的小朋友选择男女朋友时问的不再是「你听什么的?」,而是「你最喜欢什么游戏?」 最近我们读的一些文章 弗吉尼亚·伍尔芙看电影 如果年龄只是一种心理状态 《纽约客》对全球第一女性电竞选手 Scarlett 的特写 用户名/密码不正确 为什么做专业播客录音软件肯定亏本 Really nice demonstration of many interesting things (like a car engine or loudspaker) 相关链接 《IT 公论》会员计划 Rio 在知乎关于会员计划的答案 李如一:关于《IT 公论》会员计划的几句话 The Information Ben Evans: App unbundling, search and discovery KISS Hoarding Dan Grover 最近从旧金山搬到了广州加入微信团队 Firefox switches to Yahoo as its default search engine 旧文: Mozilla vs. H.264 part 1 旧文: Mozilla vs. H.264 part 2 App.net Diaspora Ello IT 公论 #117:要干货,读教材 《好奇心日报》:我们应该如何对待游戏,毕竟它已经成为当今世界的第一媒介 Portal Crossy Road Theresa Duncan CD-ROMs: Visionary Videogames for Girls 人物简介 李如一:字节社创始人。 Rio: Apple4us 程序员。

IT 公论
Episode 130: 「我们的目的是提供更少的信息。」

IT 公论

Play Episode Listen Later Dec 14, 2014 90:33


《IT 公论》会员计划推出!本期我们讨论了移动互联网时代 app 的解绑与捆绑两种趋势,web 和 native app 的区别(放心,不是关于用户体验的老调重弹),Firefox 的未来,以及李如一和《好奇心日报》合作的游戏专题。 每月三十元,支持李如一和 Rio 把《IT 公论》做成最好的科技播客。请访问 itgonglun.com/member。 如本期标题所说,在信息过载的今天,我们的目的在于提供更好,而不是更多。有听众说会员制 = 粉丝经济。但我们从未把大家视为「粉丝」。你们是朋友,是听众,我们之间的关系也并非授予和索取。《IT 公论》更像指针,它所指向的东西,有时需要付出一点努力才能得到——真正的「干货」都是如此。 一位任先生来信说,微信公众账号无法从网页链接,是因为微信团队不希望大网站轻易将其流量优势转化成公众号的关注数: 微信不鼓励「大」号的产生,所以将关注公众号的方式统一做成繁琐的刷二维码,或是搜索名字,以此将大家拉到同一起点。不过有趣的是,最近微信开放了允许第三方开发者通过 app 链到公众号的接口。 在设计上抑制大网站将流量倒入微信公众号,对于独立媒体有促进作用。腾讯对 UGC(「用户创造的内容」)的信仰体现无遗。在链接一事上对 app 和 web 区别对待,让我们想起了风险投资公司 a16z 的 Benedict Evans 最近的一篇〈App unbundling, search and discovery〉。通常我们把后 PC / 移动互联网时代视为秩序的重建。在全体网民用桌面浏览器上网的年代,任何人可以做任何事。要链接别人家的一张网页不需要对方提供什么支持,也不大会考虑「我是不是白给他带去流量了」这种事。移动互联网时代,我们转向了以 app 为核心的操作模式。对于开发者而言,限制多了,规矩多了,但用户则感到秩序随之而来,获得了精神上的安宁。 Evans 从另一个角度思考了这个变化。在前移动互联网时代,浏览器是你和互联网几乎唯一的接口。主流的浏览器品牌不过两三个,它们之间的差别只在于好用程度。移动互联网时代,成千上万个 app 都可以是你和网络的接口,而 app 之间无法方便互联,导致 Google 揭橥的以互相链接为基础的信息发现模式不再成立。发现内容的成本大大提高。在这种情况下,中美的互联网产品采用了不同的做法。简单来说,美国更倾向于解绑,中国则更倾向于捆绑。 解绑的典型例子是 Facebook。继 Facebook Messenger 成为独立的 app 以来,最近 Facebook Groups 也被分离。而 Evans 拿百度地图与微信两个例子说明了中国互联网公司的捆绑倾向。当你把订餐和买电影票一类的功能都塞入百度地图时,你似乎是在暗示用户说「我们可以回到美好的前移动互联网时代」。不用整天安装、升级软件。你只要有一个 N 合一软件(以前是浏览器,现在是微信和百度地图等疯狂整合功能和内容的 app)就够了。 中美公司在这一点上的区别,背后的因素恐怕非常复杂,但李如一认为单纯以「国人使用习惯」来解释是偷懒的做法。工具虽是应人类需求而生,但同时也会反过来影响和塑造人类——Marshall Mcluhan 几十年前就说过了这个道理。究竟「国人使用习惯」是事先就存在,只等创业者一一归纳并满足的某种属性,还是创业者对工具的设计更大地塑造了我们现在称之为「国人使用习惯」的那种东西,是值得思考的问题。 说到中美差异,美国人 Dan Grover 最近从旧金山搬到了广州,加入微信团队。经过一段时间的观察后,他在博客上写了一篇长文总结中美互联网产品在 UI 上的区别。在我们都已经习惯随时「扫一扫」的今天,可能很难想像有不少美国普通民众不知道二维码究竟该如何使用。但二维码在中国(以及部分其它亚洲国家)的风行是不是一种滥用?毕竟在公园拍摄树干上的二维码是一种无缝的用户体验,而在微信公众号发送一篇文章也要拿出手机拍一下电脑屏幕就相当分裂了。验证用户的信息应该有更好的方法。 Chromebook 笔记本在今年第三季度于美国学校的销量超过了 iPad。固然学校市场对计算设备的需求属于价格敏感型,但我们也可以说 iPad 对教育市场的想像没有能被现实证明。这里仍然可以联系到 Evans 关于解绑与捆绑的理论。前移动互联网时代是一个浏览器走天下,而 Google 在 Chromebook 干脆是把浏览器做成了一整个操作系统。看起来美国人也更喜欢大而全的「一站式解决方案」。国人与国人毕竟都是地球人,深层次的共性依然多于个性。 还记得 Firefox 吗?2004 年,那可是一款能够用让用户众筹(2004 年!)买下《纽约时报》整版广告为其助威的浏览器。但 2014 年的今天,身为半个前端开发者的 Rio 做项目时经常已经不去测试 Firefox 的显示效果了。Opera 改用 WebKit 引擎之后,Gecko 系的 Firefox 更加显出了悲怆感。最近 Mozilla 终于决定为了让 Firefox 上 iOS 而改用 WebKit(苹果不允许第三方开发者使用 WebKit 以外的引擎),或许他们终于意识到了情怀不能当饭吃。当年响应其号召筹款买广告位的那些用户,实在是因为受够了 IE。历史上单纯因为「开放」之类的口号赢得市场的产品……存在吗? 时代确实不一样了。Firefox 辉煌的日子里,连 Google 都要看重这个入口。Mozilla 的绝大部分收入常年都来自 Google 为了让自己成为 Firefox 默认的搜索引擎而支付的巨额费用。不过最近 Mozilla 宣布 Firefox 的默认搜索引擎将改为 Yahoo。我们能理解 Yahoo 为什么要这么干,但不觉得这对 Firefox 的用户会有任何好处——更不觉得它对吸引其它浏览器的用户转用 Firefox 能有什么帮助。 李如一的〈我们应该如何对待游戏,毕竟它已经成为当今世界的第一媒介〉(原题为〈阅读游戏〉)作为《好奇心日报》游戏版块的开篇词已经于上周末上线。接下来的一年里,他将以客座编辑的身份为《好奇心日报》策划和撰写一系列有关游戏的专栏与专题报道。这里有为游戏正名的意思,但更关键的是强调 inclusiveness。少用黑话,正确拼写,不追主机新闻,不写导购向的游戏评论,不回避十年前甚至更久以前的游戏,把游戏当作媒介、艺术与可阅读的文本来对待。正如我们有 Taylor Swift 也有各种地下音乐,我们有 Dota 2,也有各类独立游戏。或许未来的小朋友选择男女朋友时问的不再是「你听什么的?」,而是「你最喜欢什么游戏?」 最近我们读的一些文章 弗吉尼亚·伍尔芙看电影 如果年龄只是一种心理状态 《纽约客》对全球第一女性电竞选手 Scarlett 的特写 用户名/密码不正确 为什么做专业播客录音软件肯定亏本 Really nice demonstration of many interesting things (like a car engine or loudspaker) 相关链接 《IT 公论》会员计划 Rio 在知乎关于会员计划的答案 李如一:关于《IT 公论》会员计划的几句话 The Information Ben Evans: App unbundling, search and discovery KISS Hoarding Dan Grover 最近从旧金山搬到了广州加入微信团队 Firefox switches to Yahoo as its default search engine 旧文: Mozilla vs. H.264 part 1 旧文: Mozilla vs. H.264 part 2 App.net Diaspora Ello IT 公论 #117:要干货,读教材 《好奇心日报》:我们应该如何对待游戏,毕竟它已经成为当今世界的第一媒介 Portal Crossy Road Theresa Duncan CD-ROMs: Visionary Videogames for Girls 人物简介 李如一:字节社创始人。 Rio: Apple4us 程序员。

backspace.fm
#034: Apple, Google, ガジェットとニュース満載24本!

backspace.fm

Play Episode Listen Later Jul 27, 2014 79:41


このページをウェブブラウザで見る: リンク ちょっと配信が遅れ気味ですが、今回のbackspace.fm #034はニュースネタ満載の24本。定番のアップル、グーグルネタから、ガジェットまで話題満載でお送りします。今回スペシャルゲストだったEngadget Japaneaseの鷹木さんは、前半ニュースのコメントに登場してもらっていますが、ちょっと収録場所のネットワーク環境が悪くて、スペシャルトークが出来なかったので、近日中に改めてゲストで参加してもらう予定です。楽しみにしてくださっていた皆さんには申し訳ありませんが、もうしばらく楽しみにお待ちください! audio 要素はサポートされていません Download MP3 (49.2MB) 今週のニュース 速報:AppleとIBMがハード、ソフトで全面提携―エンタープライズ分野に激震 - TechCrunch アップル、新サービス iTunes Pass を国内で開始。Apple Store店舗で残高を追加するPassbookパス - Engadget Japanese Tim Cook does 80% of his work on an iPad TUAW: Apple news, reviews and how-tos since 2004 [D] MacBookPro Retina時代のディスプレイ解像度の付き合い方 速報:Google、Chromebookを国内発表。法人向けに7月から販売。東芝含む5社が提供 - Engadget Japanese Google experimenting with major redesign of Chrome OS Watch Out Chromebooks: Super Cheap Windows 8 Machines Are Coming Google Developer Relations Japan Blog: オープンソースの美しい Noto フォントファミリーに日本語、中国語、韓国語が加わりました。 Gmail APIを使って添付ファイルの画像を一覧表示する「GAKRA(画蔵)」というサービスを作りました。 - [モ]Modern Syntax Windows版「Google Chrome」にはバグがあり、消費電力が上がることが判明 Google+ が実名ポリシーを撤廃。任意のプロフィール名を選択可能に - Engadget Japanese Google の実世界陣取りゲーム Ingress、iOS版リリース。Android 版のデータ引き継ぎ可能 - Engadget Japanese 一段キーボード Minuum がAndroid Wearスマートウォッチ版を公開。テスト参加受付中 - Engadget Japanese 米国で使われつつある「クレカ情報で健康状態を予想するシステム」 : ギズモード・ジャパン 意識のON/OFFスイッチは脳のココにあった : ギズモード・ジャパン Amazon's Prepping a “Kindle Unlimited” Subscription Service For Books Breach is a completely modular, hackable and open source web browser Wii U のSuica対応は7月22日、GamePadで直接タッチ支払い。Suicaポイントも付与 - Engadget Japanese 誰でも作曲家! 自動作曲アプリ 「Band-in-a-Box 22 for Windows」発売! Digiland (デジランド) 島村楽器のデジタルガジェット情報発信サイト 今週のガジェット MacBookをクールに熱対策。薄型エアスペーサ「Kickflip」 : ギズモード・ジャパン Ritot - the first projection watch. Indiegogo Add a battery-saving, E Ink display to your phone for $79 Swich proves a wireless phone charger doesn't have to be an eyesore These high-tech headphones will livestream your next gig Parrot、ミニドローンRolling SpiderとJumping Sumoを国内向けに解説。SDKも公開 - Engadget Japanese クラウド写真サービス『Eyefiクラウド』国内で開始。容量無制限で年5000円、カード登録で90日無料 - Engadget Japanese 次週予告・告知 今週のbackspace.fmはいかがだったでしょうか? おかげさまで、iTunesのPodcast配信も好調です。 ぜひ気に入ったら購読して頂けると幸いです。 番組中に紹介したネタのリンクはURL backspace.fm から参照してください。 番組内容に関するフィードバックやリクエストなども #(ハッシュタグ)backspacefm にてお待ちしてます。 iTunesのレビューも大変参考になるので、気に入ったらレビューしていただけるとうれしいです! では、次回もお楽しみに!

BrandED - Telling Your Education Stories to the World
Telling Your School's Story Through Student Voice

BrandED - Telling Your Education Stories to the World

Play Episode Listen Later Mar 31, 2014 13:17


In this segment we focus on the powerful ways in which student voice can be used to tell your school's stories. Follow: @jasonmmarkey @Joesanfelippofc @TonySinanis @bamradionetwork Jason Markey was named principal at East Leyden High School starting in the 2012-13 school year. Jason helped lead a district initiative to move the Leyden School District to 1:1, with every student issued a Google Chromebook. Additionally, this year Jason was named as a 2014 Digital Principal of the Year by NASSP. His student, Ariana joins us.

Reflexiones de un Geek desde Bilbao
Google Chromebook vs Microsoft Scroogled

Reflexiones de un Geek desde Bilbao

Play Episode Listen Later Jan 7, 2014


Microsoft sigue con su campaña de desprestigio a Google llamada Scroogled. Ahora le toca el turno a los Chromebooks, y en el vídeo y web que tienen para ello usan bastantes argumentos tergiversados, si es que no son falsos directamente. En este episodio los analizo y de paso comento mi uso en alguno de los ... Leer más Google Chromebook vs Microsoft ScroogledEl contenido Google Chromebook vs Microsoft Scroogled se publicó primero en Elías Gómez.

Reflexiones de un Geek desde Bilbao – Elías Gómez
Google Chromebook vs Microsoft Scroogled

Reflexiones de un Geek desde Bilbao – Elías Gómez

Play Episode Listen Later Jan 7, 2014


Microsoft sigue con su campaña de desprestigio a Google llamada Scroogled. Ahora le toca el turno a los Chromebooks, y en el vídeo y web que tienen para ello usan bastantes argumentos tergiversados, si es que no son falsos directamente. En este episodio los analizo y de paso comento mi uso en alguno de los ... Leer más Google Chromebook vs Microsoft ScroogledEl contenido Google Chromebook vs Microsoft Scroogled se publicó primero en Elías Gómez.

EFTM - Tech, Cars and Lifestyle
Low-cost Mobile Drama, Apple's Big September News Plus Your Calls

EFTM - Tech, Cars and Lifestyle

Play Episode Listen Later Aug 12, 2013 43:06


#201: Is there a future for these low-cost mobile plan providers, will we all just have to pay more? I've got exclusive information about the battle between Telstra and wholesaler ispONE which shows there are problems afoot. Will Kogan and Aldi survive? Plus what does Apple have planned for September - an event? A new iPhone? I'll tell you exactly what I think is going on. Plus your calls on Mobile plans, the Google Chromebook from Samsung and PC help and advice

EFTM - Tech, Cars and Lifestyle
Low-cost Mobile Drama, Apple's Big September News Plus Your Calls

EFTM - Tech, Cars and Lifestyle

Play Episode Listen Later Aug 12, 2013 43:18


#201: Is there a future for these low-cost mobile plan providers, will we all just have to pay more? I've got exclusive information about the battle between Telstra and wholesaler ispONE which shows there are problems afoot. Will Kogan and Aldi survive? Plus what does Apple have planned for September - an event? A new iPhone? I'll tell you exactly what I think is going on. Plus your calls on Mobile plans, the Google Chromebook from Samsung and PC help and advice

EFTM - The Podcast
Low-cost Mobile Drama, Apple's Big September News Plus Your Calls

EFTM - The Podcast

Play Episode Listen Later Aug 12, 2013 43:18


#201: Is there a future for these low-cost mobile plan providers, will we all just have to pay more? I've got exclusive information about the battle between Telstra and wholesaler ispONE which shows there are problems afoot. Will Kogan and Aldi survive? Plus what does Apple have planned for September - an event? A new iPhone? I'll tell you exactly what I think is going on. Plus your calls on Mobile plans, the Google Chromebook from Samsung and PC help and advice

Tech Talk – Mr. Noobie
Tech Talk – Ultrabooks and the Google Chromebook

Tech Talk – Mr. Noobie

Play Episode Listen Later May 5, 2013 61:02


Ultra-thin laptops, or ultrabooks, offer a super lightweight laptop experience. But does that come at the sacrifice of performance or power? Listen as Mr. Noobie, owner of Noobie.com and Dana Wollman, Senior Reviews Editor for Engadget, weigh the pros and cons of ultrabooks including the increasingly popular Google Chromebook. Be sure not to miss the weekly roundup of interesting … Read more about this episode...

De Appels en Peren Show
Episode 65: 65. Waar is m’n beamer in m’n iPhone?

De Appels en Peren Show

Play Episode Listen Later Feb 13, 2013 71:22


Het is niet anders, maar we zijn er pas begin april weer. We gaan wel weer proberen om het dan elke week te organiseren. Stay tuned! Onderwerpen: De aandelen van Apple, innovatie binnen Apple, De Apple horloge, Google Chromebook, Chrome combineren met Android, De NRC Reader app, De AppleTV als gameconsole. Oftewel Apple, Apple, Apple, Google, Google, Google. En NRC. Grote dank aan de vrienden van Appels en Peren: Soundcloud voor de bandbreedte, Nozzman voor het coverartwork en Clublime voor de introjingle. Alle links uit de aflevering The Porsche 911: An ode to iteration ‘Apple maakt smart watch van gebogen glas’ Chromebook “Pixel” NRC Reader app Apple TV game controller Alle links en informatie over de podcast vind je op appelsenperenshow.nl

SONIC TALK Podcasts
SONIC TALK 293 - My Golden Spanner

SONIC TALK Podcasts

Play Episode Listen Later Nov 29, 2012 76:32


The panel assembles to discuss - that golden Moog, the Korg Polysix iOS app, Imogen Heap and her gloves, the new Google Chromebooks and Donald Fagen new release Sunken Condos.

SONIC TALK Podcasts
SONIC TALK 293 - My Golden Spanner

SONIC TALK Podcasts

Play Episode Listen Later Nov 28, 2012 76:32


The panel assembles to discuss - that golden Moog, the Korg Polysix iOS app, Imogen Heap and her gloves, the new Google Chromebooks and Donald Fagen new release Sunken Condos.

Kayol Hope Live! NetCast
Kayol Hope Live! Episode 04

Kayol Hope Live! NetCast

Play Episode Listen Later Sep 6, 2012 0:09


In this screencast we initiate a 3 Month challenge to use only a Google Chromebook to complete EVERY daily computing tasks and share each weeks progress. In week 1, just getting a Chromebook to produce our screencasts will be the first road block.

CloudFocus Weekly
#93 - Demystifying Buddies - 06/01/2012

CloudFocus Weekly

Play Episode Listen Later Jun 1, 2012 36:17


The different types of Salesforce.com portals, the new updated and cool Google Chromebooks and is Buddy Media up on the block? Our CloudFocus Weekly App Picks.

TheBIT.TV (small)
Episode 13 - Microsoft + Skype, Google Chromebook, Google Music, Android Movie Rentals, Verbs, Matchbook It, iPad + Conde Nast

TheBIT.TV (small)

Play Episode Listen Later May 15, 2011 6:22


For show notes please visit ;thebit.tv/​episode13 Be social -

Tech Talk Radio Podcast
May 14, 2011 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later May 14, 2011 59:08


Saving Word documents, Organic Light Emitting Diode Displays (will replace LCD for flat panel TV, faster, larger screens, higher dynamic range, eventually cheaper), running XP mode in Windows 7 Virtual PC (best way to run legacy programs), Profiles in IT (Hakon Wium Lie, creator of Cascading Style Sheets for browsers), US innovation ecosystem theatened (policies are driving new companies to India and China, restrictive Visa policy, high taxes), Costa Rica attracting high tech (excellent workforce development, lower taxes, good infrastructure), last typewriter factory in the world shuts down in Mumbai India, Microsoft purchases Skype (overpaid, difficult to integrate with products, based on old Kazaa peer-to-peer technology), Sony attacked by Anonymous (10 servers compromised, 77 million customer records downloaded, attacked using Amazon clould), Osama bin Landen sneakernet (couriers carried thumbdrive to CyberCafe to send and receive email), and Google Chromebook announced (available June 15, Acer and Samsung, $349 to $499 list price). This show originally aired on Saturday, May 14, 2011, at 9:00 AM EST on WFED (1500 AM).

Tech Talk Radio Podcast
May 14, 2011 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later May 14, 2011 59:08


Saving Word documents, Organic Light Emitting Diode Displays (will replace LCD for flat panel TV, faster, larger screens, higher dynamic range, eventually cheaper), running XP mode in Windows 7 Virtual PC (best way to run legacy programs), Profiles in IT (Hakon Wium Lie, creator of Cascading Style Sheets for browsers), US innovation ecosystem theatened (policies are driving new companies to India and China, restrictive Visa policy, high taxes), Costa Rica attracting high tech (excellent workforce development, lower taxes, good infrastructure), last typewriter factory in the world shuts down in Mumbai India, Microsoft purchases Skype (overpaid, difficult to integrate with products, based on old Kazaa peer-to-peer technology), Sony attacked by Anonymous (10 servers compromised, 77 million customer records downloaded, attacked using Amazon clould), Osama bin Landen sneakernet (couriers carried thumbdrive to CyberCafe to send and receive email), and Google Chromebook announced (available June 15, Acer and Samsung, $349 to $499 list price). This show originally aired on Saturday, May 14, 2011, at 9:00 AM EST on WFED (1500 AM).