Podcasts about hashing

  • 284PODCASTS
  • 743EPISODES
  • 52mAVG DURATION
  • 1WEEKLY EPISODE
  • Feb 7, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about hashing

Latest podcast episodes about hashing

The Valenti Show
Best Of The Lions On 97.1 The Ticket: Why Are We Re-Hashing 2023 NFCG? + Which Of These Players Would You Rather Have? + More!

The Valenti Show

Play Episode Listen Later Feb 7, 2026 42:53


Costa & Jansen get this week's Best Of The Lions started asking why fans are re-hashing the 2023 NFC Championship. Then, Karsch & Anderson asked if you'd rather have free agent Ravens C Tyler Linderbaum or the Raiders' DE Maxx Crosby via trade, Valenti & Rico discuss a concerning report about Kerby Joseph's injury, and more!

Jamie and Stoney
Best Of The Lions On 97.1 The Ticket: Why Are We Re-Hashing 2023 NFCG? + Which Of These Players Would You Rather Have? + More!

Jamie and Stoney

Play Episode Listen Later Feb 7, 2026 42:53


Costa & Jansen get this week's Best Of The Lions started asking why fans are re-hashing the 2023 NFC Championship. Then, Karsch & Anderson asked if you'd rather have free agent Ravens C Tyler Linderbaum or the Raiders' DE Maxx Crosby via trade, Valenti & Rico discuss a concerning report about Kerby Joseph's injury, and more!

Karsch and Anderson
Best Of The Lions On 97.1 The Ticket: Why Are We Re-Hashing 2023 NFCG? + Which Of These Players Would You Rather Have? + More!

Karsch and Anderson

Play Episode Listen Later Feb 7, 2026 42:53


Costa & Jansen get this week's Best Of The Lions started asking why fans are re-hashing the 2023 NFC Championship. Then, Karsch & Anderson asked if you'd rather have free agent Ravens C Tyler Linderbaum or the Raiders' DE Maxx Crosby via trade, Valenti & Rico discuss a concerning report about Kerby Joseph's injury, and more!

Jamie and Stoney
Are we really re-hashing the NFC title game loss in San Francisco two years ago?

Jamie and Stoney

Play Episode Listen Later Feb 6, 2026 10:47


One listener brought up Dan Campbell's shortcomings in the playoffs

David Bombal
#535: Encryption vs Hashing: What's the real difference?

David Bombal

Play Episode Listen Later Feb 2, 2026 50:42


Big thank you to DeleteMe for sponsoring this video. Use my link http://joindeleteme.com/Bombal to receive a 20% discount or use the QR Code in the video. In this interview, David Bombal sits down with Dr. Mike Pound (Computerphile) to clear up one of the biggest crypto misconceptions on the Internet: hashing is not encryption, and hash functions are not reversible. In this video you'll learn what a hash function actually does (a deterministic, fixed-length, “random-looking” summary of data) and why the whole point is that you cannot take a hash and reconstruct the original file. Dr Mike explains the key properties of secure hashing, including the avalanche effect (tiny input change, massive output change), and why older algorithms like MD5 and SHA-1 became unsafe due to collisions. We also cover what “collisions” really mean, why they must exist in theory (the pigeonhole principle) and why they can appear sooner than expected (the birthday paradox). Then we tackle the YouTube-comments classic: rainbow tables. If hashes are one-way, how do attackers “crack” passwords? The answer: they don't reverse hashes. They guess passwords, hash them forward, and match the results. Mike breaks down how rainbow tables speed this up with precomputed hashes, and why salting makes those precomputations far less effective by forcing attackers to redo work per user. Finally, we zoom out into modern cryptography: why SHA-2 is widely used today, why SHA-3 exists as a structurally different backup option, what length extension attacks are, and what quantum computing changes (and doesn't change) for hashing and encryption. We also touch on how hashes power digital signatures, file integrity checks (like verifying an ISO download), and why AES dominates symmetric encryption. // Mike's SOCIAL // X: / _mikepound // YouTube Video REFERENCE // SHA: Secure Hashing Algorithm: • SHA: Secure Hashing Algorithm - Computerphile Birthday Paradox: • Hash Collisions & The Birthday Paradox - C... The Next Big SHA? SHA3 Sponge Function Explained: • The Next Big SHA? SHA3 Sponge Function Exp... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:09 - DeleteMe sponsored segment 02:54 - Hashing is not Encryption // Encryption and Hashing explained 09:47 - Hash functions are irreversible 15:22 - How hashing works 17:23 - Why MD5 is bad 20:09 - Recommended hashing function 21:47 - Birthday paradox explained 23:39 - Rainbow table explained 29:44 - Salting explained 33:35 - Pigeon Hole principle explained 36:35 - SHA-2 is the answer 37:17 - SHA-3 vs SHA-2 40:42 - The effect of quantum computing 42:47 - Quick summary 43:52 - Sign-In with private key 45:21 - Avalanche effect explained 49:10 - Where to learn more about hash functions 50:27 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cryptography #hashing #encryption

LMFM 11-1 Podcasts
260126: Hashing it out with Katie Makk // Would you intervene on someone else's parenting ?

LMFM 11-1 Podcasts

Play Episode Listen Later Jan 26, 2026 9:47


Hosted on Acast. See acast.com/privacy for more information.

LMFM 11-1 Podcasts
260126 FULL SHOW: Hashing it our with Katie Makk // Traitors Finale Debrief // Insight Holistics presents Lá Fhéile Bríde // Language Competition

LMFM 11-1 Podcasts

Play Episode Listen Later Jan 26, 2026 52:06


Hosted on Acast. See acast.com/privacy for more information.

Chicago Dog Walk
Wednesday 1/21/2026 - What We Would Do as Billionaires & Re-Hashing WSD's Steak House Mishap (Free Swim)

Chicago Dog Walk

Play Episode Listen Later Jan 21, 2026 45:47


On today's Free Swim we are joined by the typical crew. We get into a discussion of living a simpler life out in the wild and how that simple of life would differ as the simple life lived if we were billionaires. We then get into some good On Or Off The Leash discussions, and recap White Sox Dave's wild behavior at a Steak House in Milwaukee in 2023.You can find every episode of this show on Apple Podcasts, Spotify or YouTube. Prime Members can listen ad-free on Amazon Music. For more, visit barstool.link/thedogwalk

LMFM 11-1 Podcasts
190126: Hashing it out with Katie Makk // Wolfwhistling

LMFM 11-1 Podcasts

Play Episode Listen Later Jan 19, 2026 13:17


Hosted on Acast. See acast.com/privacy for more information.

The Mo and Sally Morning Show
Hashing

The Mo and Sally Morning Show

Play Episode Listen Later Dec 2, 2025 4:15 Transcription Available


POD256 | Bitcoin Mining News & Analysis
095. Open-Source or Bust: Mujina, Miner Firmware Wars, and the Future of Trustless Hashing

POD256 | Bitcoin Mining News & Analysis

Play Episode Listen Later Nov 19, 2025 92:25 Transcription Available


In this episode, we go deep on the shifting landscape of Bitcoin mining hardware, open-source firmware, and why trustless stacks matter for miners big and small. Fresh off the local Bitcoin++ in Durham, we recap the vibe: a developer-heavy crowd, real collaboration between devs and miners, and our announcement of the Mujina developer preview—an open-source mining firmware now publicly accessible for hands-on testing. We discuss practical demo plans for the HeatPunk Summit, creative power ideas (from inverter gens to EVs like the F-150 Lightning/Cybertruck), and what it takes to stage quiet, controlled mining demos. From secure boot cat-and-mouse games to aftermarket control boards, we unpack why closed firmware is antithetical to Bitcoin's trust-minimized ethos, the history from CGMiner and GPL violations, and how LibriBoard, Hydro Pool, and Start9 packaging can radically reduce friction for at-home and pro operators. We also cover Stratum v2 progress, open-source community wins (Home Assistant integrations, config-first setups), and tangible on-ramps for developers—including free Auradine chips from 256 Foundation for reverse engineering and Bitaxe-based Mujina dev workflows. We close with a candid segment on Freedom Tech, the chilling effects of targeting software developers, and why building and supporting open-source tools is essential for a free society. Resources and links mentioned (non-sponsor): - Mujina developer preview: github.com/256foundation/mujina - 256 Foundation chips request: 256foundation.org (contact form at page bottom) - Hydra Pool (self-hosted pool software) - LibriBoard (open control board initiative) - ESP-Miner and Bitaxe (dev-friendly hardware) - Start9 Office Hours (service packaging) and Hydra Pool packaging efforts - Exergy docs and forum: support.exergyheat.com - Bitcoin++ local edition (Durham), BitDevs communities - Stratum v2 discussions and implementations - Home Assistant miner integrations, Node-RED and shell-script config approaches

Oracle University Podcast
Understanding Security Risks and Threats in the Cloud - Part 1

Oracle University Podcast

Play Episode Listen Later Nov 18, 2025 14:11


This week, Lois Houston and Nikita Abraham are joined by Principal OCI Instructor Orlando Gentil to explore what truly keeps data safe, and what puts it at risk.   They discuss the CIA triad, dive into hashing and encryption, and shed light on how cyber threats like malware, phishing, and ransomware try to sneak past defenses.   Cloud Tech Jumpstart: https://mylearn.oracle.com/ou/course/cloud-tech-jumpstart/152992 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu   Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. ------------------------------------------ Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Hello and welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me is Nikita Abraham, Team Lead: Editorial Services. Nikita: Hey everyone! Last week, we discussed how you can keep your data safe with authentication and authorization. Today, we'll talk about various security risks that could threaten your systems. 00:48 Lois: And to help us understand this better, we have Orlando Gentil, Principal OCI Instructor, back with us. Orlando, welcome back! Let's start with the big picture—why is security such a crucial part of our digital world today? Orlando: Whether you are dealing with files stored on a server or data flying across the internet, one thing is always true—security matters. In today's digital world, it's critical to ensure that data stays private, accurate, and accessible only to the right people.  01:20 Nikita: And how do we keep data private, secure, and unaltered? Is there a security framework that we can use to make sense of different security practices? Orlando: The CIA triad defines three core goals of information security.  CIA stands for confidentiality. It's about keeping data private. Only authorized users should be able to access sensitive information. This is where encryption plays a huge role. Integrity means ensuring that the data hasn't been altered, whether accidentally or maliciously. That's where hashing helps. You can compare a stored hash of data to a new hash to make sure nothing's changed. Availability ensures that data is accessible when it's needed. This includes protections like system redundancy, backups, and anti-DDoS mechanisms. Encryption and hashing directly support confidentiality and integrity. And they indirectly support availability by helping keep systems secure and resilient. 02:31 Lois: Let's rewind a bit. You spoke about something called hashing. What does that mean? Orlando: Hashing is a one-way transformation. You feed in data and it produces a unique fixed length string called a hash. The important part is the same input always gives the same output, but you cannot go backward and recover the original data from the hash. It's commonly used for verifying integrity. For example, to check if a file has changed or a message was altered in transit. Hashing is also used in password storage. Systems don't store actual passwords, just their hashes. When you log in, the system hashes what you type it and compare the stored hash. If they match, you're in. But your actual password was never stored or revealed. So hashing isn't about hiding data, it's about providing it hasn't changed. So, while hashing is all about protecting integrity, encryption is the tool we use to ensure confidentiality. 03:42 Nikita: Right, the C in CIA. And how does it do that? Orlando: Encryption takes readable data, also known as plaintext, and turns it into something unreadable called ciphertext using a key. To get the original data back, you need to decrypt it using the right key. This is especially useful when you are storing sensitive files or sending data across networks. If someone intercepts the data, all they will see is gibberish, unless they have the correct key to decrypt it. Unlike hashing, encryption is reversible as long as you have the right key. 04:23 Lois: And are there different types of encryption that serve different purposes? Orlando: Symmetric and asymmetric encryption. With symmetric encryption, the same key is used to both encrypt and decrypt the data. It's fast and great for securing large volumes of data, but the challenge lies in safely sharing the key. Asymmetric encryption solves that problem. It uses a pair of keys: public key that anyone can use to encrypt data, and a private key that only the recipient holds to decrypt it. This method is more secure for communications, but also slower and more resource-intensive. In practice, systems often use both asymmetric encryption to exchange a secure symmetric key and then symmetric encryption for the actual data transfer. 05:21 Nikita: Orlando, where is encryption typically used in day-to-day activities? Orlando: Data can exist in two primary states: at rest and in transit. Data at rest refers to data stored on disk, in databases, backups, or object storage. It needs protection from unauthorized access, especially if a device is stolen or compromised. This is where things like full disk encryption or encrypted storage volumes come in. Data in transit is data being sent from one place to another, like a user logging into a website or an API sending information between services. To protect it from interception, we use protocols like TLS, SSL, VPNs, and encrypted communication channels. Both forms data need encryption, but the strategies and threats can differ. 06:19 Lois: Can you do a quick comparison between hashing and encryption? Orlando: Hashing is one way. It's used to confirm that data hasn't changed. Once data is hashed, it cannot be reversed. It's perfect for use cases like password storage or checking the integrity of files. Encryption, on the other hand, it's two-way. It's designed to protect data from unauthorized access. You encrypt the data so only someone with the right key can decrypt and read it. That's what makes it ideal for keeping files, messages, or network traffic confidential. Both are essential for different reasons. Hashing for trust and encryption for privacy. 07:11 Adopting a multicloud strategy is a big step towards future-proofing your business and we're here to help you navigate this complex landscape. With our suite of courses, you'll gain insights into network connectivity, security protocols, and the considerations of working across different cloud platforms. Start your journey to multicloud today by visiting mylearn.oracle.com.  07:39 Nikita: Welcome back! When we talk about cybersecurity, we hear a lot about threats and vulnerabilities. But what do those terms really mean? Orlando: In cybersecurity, a threat is a potential danger and a vulnerability is a weakness an asset possess that a threat can exploit. When a threat and a vulnerability align, it creates a risk of harm. A threat actor then performs an exploit to leverage that vulnerability, leading to undesirable impact, such as data loss or downtime. After an impact, the focus shifts to response and recovery to mitigate damage and restore operations.  08:23 Lois: Ok, let's zero in on vulnerabilities. What counts as a vulnerability, and what categories do attackers usually target first?  Orlando: Software and hardware bugs are simply unintended flaws in a system's core programming or design. Misconfigurations arise when systems aren't set up securely, leaving gaps. Weak passwords and authentication provide easy entry points for attackers. A lack of encryption means sensitive data is openly exposed. Human error involves mistakes made by people that unintentionally create security risks. Understanding these common vulnerability types is the first step in building more resilient and secure systems as they represent the critical entry points attackers leverage to compromise systems and data. By addressing these, we can significantly reduce our attack surface and enhance overall security.  09:28 Nikita: Can we get more specific here? What are the most common cybersecurity threats that go after vulnerabilities in our systems and data? Orlando: Malware is a broad category, including viruses, worms, Trojans, and spyware. Its goal is to disrupt or damage systems. Ransomware has been on the rise, targeting everything from hospitals to government agencies. It lock your files and demands a ransom, usually in cryptocurrency. Phishing relies on deception. Attackers impersonate legitimate contacts to trick users into clicking malicious links or giving up credentials. Insider threats are particularly dangerous because they come within employees, contractors, or even former staff with lingering access. Lastly, DDoS attacks aim to make online services unavailable by overwhelming them with traffic, often using a botnet—a network of compromised devices. 10:34 Lois: Orlando, can you walk us through how each of these common cybersecurity threats work? Orlando: Malware, short for malicious software, is one of the oldest and most pervasive types of threats. It comes in many forms, each with unique methods and objectives. A virus typically attaches itself to executable files and documents and spreads when those are shared or opened. Worms are even more dangerous in networked environments as they self-replicate and spread without any user action. Trojans deceive users by posing as harmless or helpful applications. Once inside, they can steal data or open backdoors for remote access. Spyware runs silently in the background, collecting sensitive information like keystrokes or login credentials. Adware might seem like just an annoyance, but it can also track your activity and compromise privacy. Finally, rootkits are among the most dangerous because they operate at a low system level, often evading detection tools and allowing attackers long-term access. In practice, malware can be a combination of these types. Attackers often bundle different techniques to maximize damage.  12:03 Nikita: And what about ransomware? Why it is such a serious threat? Orlando: Ransomware has become one of the most disruptive and costly types of cyber attacks in recent years. Its goal is simple but devastating, to encrypt your data and demand payment in exchange for access. It usually enters through phishing emails, insecure remote desktop protocol ports or known vulnerabilities. Once inside, it often spreads laterally across the network before activating, ensuring maximum impact. There are two common main forms. Crypto ransomware encrypts user files, making them inaccessible. Locker ransomware goes a step further, locking the entire system interface, preventing any use at all. Victims are then presented with a ransom note, typically requesting cryptocurrency payments in exchange for the decryption key. What makes ransomware so dangerous is not just the encryption itself, but the pressure it creates. Healthcare institutions, for instance, can't afford the downtime, making them prime targets.  13:18 Lois: Wow. Thanks, Orlando, for joining us today.  Nikita: Yeah, thanks Orlando. We'll be back next week with more on how you use security models to tackle these threats head-on. And if you want to learn about the topics we covered today, go to mylearn.oracle.com and search for the Cloud Tech Jumpstart  course. Until next time, this is Nikita Abraham… Lois: And Lois Houston, signing off! 13:42 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.

The Loh Down on Science
Hashing Out Fertility

The Loh Down on Science

Play Episode Listen Later Nov 13, 2025 1:00


Is there a HIGH price on getting DOWN?

BLISTER Podcast
Hashing Things Out: Lincoln Knowles, Cody Townsend, & Jonathan Ellsworth

BLISTER Podcast

Play Episode Listen Later Oct 20, 2025 76:23


On our last two ‘Reviewing the News' episodes, Cody and Jonathan talked about Lincoln Knowles, a young climber, free soloist, and content creator who has been making waves in the climbing world. Today, Lincoln joins them to hash things out and discuss some big topics that have implications for the entire outdoor industry.Note: We Want to Hear From You!We'd love for you to share with us the stories or topics you'd like us to cover next month on Reviewing the News; ask your most pressing mountain town advice questions, or offer your hot takes for us to rate. You can email those to us here.RELATED LINKS: BLISTER+ Get Yourself CoveredGet Our 25/26 Winter Buyer's GuideDiscounted Summit Registration for BLISTER+ MembersNon-Member Registration: Blister Summit 2026Get Our Newsletter & Weekly Gear GiveawaysLincoln's YouTube: Knowles and CompanyLincoln's ‘Cody is Talking Sh*t about Me' VideoTOPICS & TIMES:New BLISTER+ Members (3:45)Lincoln in Yosemite (7:23)Talk about the Responses to Your Videos (8:14)Lincoln's Background (10:06)Climbing Culture (16:20)Do You Consider Yourself an Influencer or Athlete First? (23:20)“Climbing Harder Routes Until I Fall” (29:13)Risk (36:53)What Would a Successful Career Look Like to You? (37:27)The ‘Athlete Economy' (41:14)Initial Impressions of Yosemite? (51:45)Climbing the Nose (54:39)Sponsorships (57:38)Influence & Responsibility (1:05:37)CHECK OUT OUR OTHER PODCASTS:Blister CinematicCRAFTEDBikes & Big IdeasGEAR:30 Hosted on Acast. See acast.com/privacy for more information.

Talking Tax
Hashing Out US-World Tensions on 'Side-by-Side' Global Tax Deal

Talking Tax

Play Episode Listen Later Sep 24, 2025 13:53


About three months have passed since Treasury Secretary Scott Bessent announced that the US, along with its Group of Seven allies, agreed to work on a system that would exempt American companies from parts of the global minimum tax. In that time, the US proposed a technical solution to separate its tax system from the global minimum tax. But other countries have raised concerns about what the US position means for their own tax sovereignty and whether their companies will be left at a competitive disadvantage compared to their American counterparts. In this episode of Talking Tax, Bloomberg Tax reporters Saim Saeed and Lauren Vella hash out these countries' frustrations and discuss the feasibility of coming to an agreement on a "side-by-side" system by Dec. 31, the deadline suggested by the Trump administration. Do you have feedback on this episode of Talking Tax? Give us a call and leave a voicemail at 703-341-3690.

Dawgman Radio
DawgmanRadio: Hashing out an historic Apple Cup win

Dawgman Radio

Play Episode Listen Later Sep 21, 2025 40:01


The guys from Dawgman.com - Kim Grinolds in Pullman and Chris Fetters and Scott Eklund in Seattle - break down all the things they saw during Washington's historic 59-24 win in the Apple Cup Saturday night in Pullman. To start with, it was the hottest Apple Cup on record, with 81-degrees announced at kickoff. And the 59 points was the most Washington has ever scored in an Apple Cup, surpassing the 56 points they scored in 1991. It was also the first road win of the Jedd Fisch era on Montlake and the first road win for Washington since their 2023 win in Corvallis over Oregon State. Among the topics discussed during the 40-minute game recap: - Kim's take on the atmosphere compared to other Apple Cups at Martin Stadium, and also how beer sales impacted the crowd (if at all).- The adjustments Washington made over the course of the game to eventually push past the pesky Cougars in the fourth quarter- The offensive efficiency, starting with Demond Williams and the fact that they didn't have to punt for a second-straight game.- The defensive issues against WSU's passing game and especially the struggles that both Leroy Bryant and Deven Bryant had.- The momentum gained by the two big fourth-quarter turnovers, starting with Alex McLaughlin's pick-six and Dylan Robinson's punchout the very next play.- John Mills' monster pancake block to spring Jonah Coleman for an early touchdown.- The continued impressive performance by the offensive line, especially with how they were able to overcome and adjust to all the early games WSU's defensive line threw at them.- Final thoughts as the Huskies look ahead to hosting the No. 1 Ohio State Buckeyes. To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices

On On! Hash House Harriers Talk and History
5.16 Thunder Thighs - by Run2Eat

On On! Hash House Harriers Talk and History

Play Episode Listen Later Aug 26, 2025 37:31


Thunder Thighs started Hashing in 1978, London H3, founded Royal London Harriettes and Pink Prosecco Posse.

hashing thunder thighs
The Who Cares News podcast
Ep. 2896: Keep Hashing It Out

The Who Cares News podcast

Play Episode Listen Later Jul 2, 2025 9:55


(Airdate: 7.2.25) The jury in Diddy's federal trial has reached verdicts on four out of five counts—including the major sex trafficking charges—but they're deadlocked on the racketeering charge, and the judge says deliberations must continue.  Then we jet to Rome, where Al Pacino was spotted dining at Il Bolognese with NBC freelancer Caterina Di Terlizzi. The two shared a cheek kiss, a warm hug, and what looked like deep conversation. Pacino's in Italy filming Maserati: The Brothers. Finally, Keith Urban didn't storm off during a recent Zoom interview—his team ended the call after a touchy question about wife Nicole Kidman's steamy scenes. His rep called it a “nothingburger.”  As always—Hollywood does what Hollywood does… and we're here for it.

Cofield and Company
6/06 H2 - Hashing It Out on Air

Cofield and Company

Play Episode Listen Later Jun 7, 2025 44:45


New York Knicks to interview Dallas Mavericks' head coach, Jason Kidd for their vacant head coaching job. Dallas Wings' rookie, Paige Bueckers out for third consecutive game with a concussion. The latest report on Kevin Durant's desired trade destination during the 2025 NBA off-season. NFL quarterback, Dorian Thompson-Robinson on being part of the Philadelphia Eagles team and culture. Treasure Island race & sports book director, Chuck Esposito joins Cofield & Company to preview the betting lines for UFC 316, detail the impact the addition of Aaron Rodgers has on the Pittsburgh Steelers' 2025 win total, and review the current betting odds for the NBA Finals after the Indiana Pacers' Game 1 upset victory over the Oklahoma City Thunder.

Bitcoin Park
Free Market Mining: Hashing on ERCOT Spot Price versus Fixed PPAs

Bitcoin Park

Play Episode Listen Later May 30, 2025 30:27


KeywordsERCOT, Bitcoin mining, energy strategy, load growth, operational risk, power pricing, energy market, risk management, software solutions, energy transformationSummaryThe conversation delves into the evolving landscape of ERCOT's energy market, focusing on the impact of load growth from various sectors, including Bitcoin mining. Experts discuss energy strategies across different load zones, operational risks, and the role of software in managing these risks. The discussion also highlights the transformation of the energy market with the integration of renewable sources and the maturing of Bitcoin mining as a business, emphasizing the importance of risk management and strategic decision-making in energy consumption and pricing.TakeawaysERCOT's energy market is influenced by significant load growth.Bitcoin mining is highly sensitive to energy pricing and strategies.Different load zones require tailored energy strategies.Operational risks in Bitcoin mining can be mitigated with software solutions.The energy market is transforming with more renewable sources.Bitcoin miners can provide flexible load to the energy grid.The hash rate market is maturing, allowing for better risk management.Forward selling of power can lock in margins for miners.Risk appetite varies among miners based on their business models.Seasonality affects energy pricing and strategy decisions.Chapters00:00 Introduction to Mining and Community Engagement00:25 Energy Market Dynamics in Texas03:35 Strategies for Energy Pricing and Load Zones06:21 Operational Risks and Software Solutions09:36 The Role of Bitcoin Miners in Energy Flexibility12:28 Market Trends and Future Predictions15:36 Hedging Strategies and Risk Management18:21 Seasonality and Ancillary Services in Energy Markets21:33 Final Thoughts and Audience Engagement

Frequent Miler on the Air
Hashing out Hilton's Devaluation | Coffee Break Ep56 | 5-20-25

Frequent Miler on the Air

Play Episode Listen Later May 20, 2025 20:27


Without warning, Hilton increased its top standard room rate for many hotels, which follows a big increase in December last year. Most increased around 5K points, but some much more, especially at the high end.(00:27) - Hilton increased top standard room rate for many hotels, which follows a big increase in December last year(05:23) - A few examples for high end properties impacted(06:30) - How serious of a devaluation is this?(13:56) - Have we lost faith with Hilton?Visit https://frequentmiler.com/subscribe to get updated on in-depth points and miles content like this, and don't forget to like and follow us on social media.Music Credit – Beach Walk by Unicorn Heads

CISSP Cyber Training Podcast - CISSP Training Program
CCT 245: Practice CISSP Questions - Hashing - Ensuring Message Authenticity with the CISSP (D3.6)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later May 15, 2025 19:25 Transcription Available


Send us a textSecurity regulations are changing dramatically in response to major breaches, and the implications for cybersecurity professionals are profound. Sean Gerber kicks off this episode with a career announcement, sharing his transition to independent consulting after 13 years with his previous employer—a move that highlights the evolving opportunities in the cybersecurity field.The heart of this episode examines the recent UnitedHealthcare breach, where attackers targeted Change Healthcare, a critical system processing 15 billion healthcare transactions annually. The February ransomware attack led to a $22 million ransom payment and disrupted approximately half of all pharmacy operations across the United States. This incident serves as a perfect case study in critical infrastructure vulnerability and has triggered a significant regulatory response from the Biden administration, which is now promising "tough, mandatory cybersecurity standards" for the healthcare industry.What does this mean for security professionals? Potentially stricter oversight, increased financial penalties, and perhaps most concerning—explicit executive liability for security failures. As Sean notes, these developments create an increasingly complex landscape where CISOs must navigate not just technical challenges but also regulatory expectations that might lack technical nuance.The episode transitions into a comprehensive examination of CISSP exam questions covering Domain 3.6, focusing on message integrity, digital signatures, and cryptographic hashing functions. Through fifteen detailed questions and answers, Sean breaks down essential concepts like the difference between checksums and hashing functions, the evolution from SHA-1 to more secure algorithms, and the role of certificate authorities in public key infrastructure. These technical foundations aren't just academic—they're the building blocks of systems that, when implemented correctly, prevent exactly the kind of breach that hit UnitedHealthcare.Ready to deepen your understanding of message integrity and prepare for the CISSP exam? Visit CISSP Cyber Training for videos, transcripts, and additional practice questions to help you master these critical concepts and advance your cybersecurity career.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

SAP and Enterprise Trends Podcasts from Jon Reed (@jonerp) of diginomica.com
Hashing out the perils and potentials of customization - with Eric Kimberling

SAP and Enterprise Trends Podcasts from Jon Reed (@jonerp) of diginomica.com

Play Episode Listen Later Mar 23, 2025 69:08


Eric Kimberling wrote a must-read post on the pros and cons of customization - and the debate is joined. In this special "blogs that matter" edition, we'll drill into Eric's analysis, and then take up some critical points customers should be aware of. As always, bring your sharpest and snarkiest viewpoints, your live comments are part of this show. If you appreciate unfiltered enterprise content without any attempts at monetization that is intentionally ad free and unsponsored, please consider giving me a nice rating to help other listeners find this content. Note: here is the link to Kimberling's blog post that we discuss, with strong feedback from our live audience: https://www.thirdstage-consulting.com/the-evolution-of-custom-development-is-it-really-overrated/

Busting the omnichannel - enterprise hacks and chats
Hashing out the perils and potentials of customization - live with Eric Kimberling

Busting the omnichannel - enterprise hacks and chats

Play Episode Listen Later Mar 23, 2025 69:07


Eric Kimberling wrote a must-read post on the pros and cons of customization - and the debate is joined. In this special "blogs that matter" edition, we'll drill into Eric's analysis, and then take up some critical points customers should be aware of. As always, bring your sharpest and snarkiest viewpoints, your live comments are part of this show. If you appreciate unfiltered enterprise content without any attempts at monetization that is intentionally ad free and unsponsored, please consider giving me a nice rating to help other listeners find this content.  Note: here is the link to Kimberling's blog post that we discuss, with strong feedback from our live audience: https://www.thirdstage-consulting.com/the-evolution-of-custom-development-is-it-really-overrated/

POD256 | Bitcoin Mining News & Analysis
EP63: Solo Mining--What the Heck is Even That?

POD256 | Bitcoin Mining News & Analysis

Play Episode Listen Later Mar 13, 2025 70:03


Keywords:Bitcoin, mining, Bidax, solo mining, CK pool, open source, mining technology, efficiency, community, cryptocurrencySummaryIn this conversation, the hosts discuss the latest updates in Bitcoin mining, focusing on Bidax's recent achievements and the operational expertise required for successful mining. They delve into the differences between solo mining and pool mining, emphasizing the importance of community contributions and open-source technology in the future of Bitcoin mining. The discussion also touches on innovations in mining technology, efficiency improvements, and the potential for new players in the market. The hosts conclude with a light-hearted bet on the future of BitAx mining and the excitement surrounding the community's growth.TakeawaysBidax has solved another block, showcasing its mining capabilities.Operational expertise is crucial for maximizing profits in Bitcoin mining.Solo mining and pool mining have distinct differences that impact decentralization.The future of Bitcoin mining is tied to community contributions and open-source technology.Innovations in mining technology are leading to increased efficiency and lower costs.The potential for new players in the mining market is growing due to open-source initiatives.The hosts emphasize the importance of understanding mining dynamics for newcomers.Betting on the future of BitAx mining reflects the community's optimism.The conversation highlights the need for collaboration in the Bitcoin mining space.Chapters00:00 Bidax and Mining Technology Updates02:43 Solo Mining vs. Pool Mining Explained05:46 Understanding Bitcoin Mining Dynamics08:51 Debate on Mining Centralization11:51 Different Approaches to Solo Mining14:52 Wrap-Up and Future Prospects16:45 Upcoming Events and Community Engagement21:11 Cuddle Puddles and Personal Anecdotes24:02 Hashing and Community Contributions30:03 Chip Donations and Development Opportunities38:20 Cost Implications of New Technology42:21 Deciding What to Keep and Change44:16 Open Source and Custom Designs46:42 Control Boards and Firmware48:44 The Future of Bitcoin Mining51:55 Efficiency Improvements in Mining Technology59:58 Upcoming Events and Community Engagement01:04:17 Betting on Bitcoin Mining Outcomes

Bitcoin Park
NEMS25: How Do We Integrate a Bitcoin Miner into Everything? Ideas on the Future of Hashing.

Bitcoin Park

Play Episode Listen Later Mar 12, 2025 26:57


KeywordsBitcoin, mining, decentralization, innovation, technology, accessibility, education, future, devices, cryptocurrencySummaryThe conversation explores the evolution and future of Bitcoin mining, emphasizing the importance of decentralization, innovation, and accessibility. Panelists discuss the significance of smaller-scale mining operations, the need for education in the space, and predictions for future devices that integrate Bitcoin mining technology seamlessly into everyday appliances.TakeawaysBitcoin mining is evolving at both large and small scales.Decentralization is crucial for the security of the Bitcoin network.Smaller mining operations can significantly contribute to network security.Innovation in Bitcoin mining technology is rapid and diverse.Accessibility to mining technology is key to mass adoption.Education is essential for understanding and engaging with Bitcoin mining.The future of Bitcoin mining may involve everyday devices.People's understanding of Bitcoin needs to be simplified.The balance between innovation and decentralization is critical.Future devices may integrate Bitcoin mining in unexpected ways.Chapters00:00 The Evolution of Bitcoin Mining02:50 Decentralization and Its Importance06:06 Innovation in Bitcoin Mining Technology09:10 Accessibility and User Experience in Mining11:45 The Role of Education in Bitcoin Mining14:59 The Future of Bitcoin Mining Devices18:03 The Impact of Lottery Mining on Adoption20:44 The Next Wave of Bitcoin Mining Innovations

Consensus Unreality: Occult, UFO, Phenomena and Conspiracy strangeness
Elemental Borderlands; Simulated Apparitions; Real-izing the UFO

Consensus Unreality: Occult, UFO, Phenomena and Conspiracy strangeness

Play Episode Listen Later Feb 20, 2025 54:57


Hashing out the UFO potato a bit more on this episode: recent readings by Mark Fisher and Eric Wargo; the odd specificities of the abduction phenomenon; the tricky nature of engaging the meta-phorical/ physical flying saucer; quantum consciousness; recapping some recent ufological musings. Plus: bonus patron-exclusive chat on Marvel's use of the conspiratorial “second matrix”, odd coincidences in Twin Peaks The Return, and cold space war speculation.  Join our patreon for our full episode archive, exclusive new episodes, written content and more.. https://www.patreon.com/c/consensusunreality Merch https://consensus-unreality.printify.me/ Intro music by Treatment https://treatmentforu.bandcamp.com/album/pond-life

CQ Morning Briefing
House Republicans still hashing out a budget resolution

CQ Morning Briefing

Play Episode Listen Later Feb 10, 2025 2:18


Good morning. House Republicans could delay their budget resolution markup. DNI nominee Tulsi Gabbard is up next for a potential confirmation vote this week. And the Council on Environmental Quality's regulatory abilities are now in question. David Higgins has your CQ Morning Briefing for Monday, Feb. 10, 2025.

CQ Morning Briefing
House Republicans still hashing out a budget resolution

CQ Morning Briefing

Play Episode Listen Later Feb 10, 2025 2:18


Good morning. House Republicans could delay their budget resolution markup. DNI nominee Tulsi Gabbard is up next for a potential confirmation vote this week. And the Council on Environmental Quality's regulatory abilities are now in question. David Higgins has your CQ Morning Briefing for Monday, Feb. 10, 2025.

The Not Ready for Prime Time Podcast: The Early Years of SNL
Bill Swerski's Tournament Talk: SNL's Best Bits - Part 1

The Not Ready for Prime Time Podcast: The Early Years of SNL

Play Episode Listen Later Feb 6, 2025 67:01


Join us for an epic showdown as we celebrate SNL's upcoming 50th anniversary by taking on a herculean challenge: Hashing out Saturday Night Live's “Best Bits” of all time through a rousing and supersized 24 bracket competition.Thomas Sena steps in for an under-the-weather Bill Swerski, joining forces with an all-star panel of SNL experts featuring hosts from The Saturday Night Network, The SNL Hall of Fame, SNL Nerds, and our very own The Not Ready for Prime Time Project. Together, they dive deep into five decades of comedic brilliance, sharing personal memories and discussing the most memorable, funny, and iconic moments in the show's history.It is a debate so huge, we had to break it up.  In Part One we reveal the full bracket and battle our way through the first round.---------------------------------Subscribe today!Follow us on social media: X (Twitter): NR4PTProjectBluesky: nr4ptproject.bsky.socialInstagram: nr4ptprojectFacebook: The Not Ready for Prime Time ProjectContact Us: Website: https://www.nr4project.comEmail: nr4ptproject@gmail.com

The Data Stack Show
227: The Art & Science of Marketing Attribution: From UTMs to Machine Learning with Lew Dawson of Momentum Consulting

The Data Stack Show

Play Episode Listen Later Feb 5, 2025 62:22


Highlights from this week's conversation include:Welcome Back, Lew (0:14)Recap of Previous Discussion (1:03)Benefits of Hashing Information (2:33)  Using Hashes for Data Context (4:24)Hashing and Query Parameters (7:24)Static Values for Hashing (11:10)Identity Resolution in Data Attribution (14:36)Methodologies for User Tracking (16:37)Combining Data Sources for Attribution (21:13)Understanding Data Gaps (25:25)Defining Objectives and KPIs (27:50)Identity Resolution Challenges (28:46)User and Session Stitching (32:01)Trusting Ad Platforms (35:23)Defining Attribution (38:09)The Credit Dilemma (40:18)First Touch Attribution Explained (41:47)Linear Attribution Model (43:21)B2C and B2B Attribution Scenarios (45:22)Timeframes in Attribution (47:29)Understanding Lookback Windows (49:34)Google Analytics Changes (51:20)Attribution After Conversion (53:26)Online vs. Offline Attribution (55:49)Discipline in Tracking (58:52)Challenges in Coordination (1:00:12)QR Codes and Data Integration (1:01:55)The Data Stack Show is a weekly podcast powered by RudderStack, the CDP for developers. Each week we'll talk to data engineers, analysts, and data scientists about their experience around building and maintaining data infrastructure, delivering data and data products, and driving better outcomes across their businesses with data.RudderStack helps businesses make the most out of their customer data while ensuring data privacy and security. To learn more about RudderStack visit rudderstack.com.

MLB Pipeline
Hashing Out The Top 100

MLB Pipeline

Play Episode Listen Later Jan 28, 2025 65:34


MLB Pipeline released its preseason Top 100 Prospects list late last week, so Jim Callis, Sam Dykstra, Jonathan Mayo and Jason Ratliff dedicate the Pipeline Podcast to breaking down the rankings. They start with the guy at the very top, Dodgers right-hander Roki Sasaki, and where he fits among past No. 1 prospects and the best pitching prospects in recent memory. They also discuss the top of the list, the teams with the most Top 100 dudes, which prospects made the biggest upward moves in 2024 and who could follow them in 2025. The podcast finishes with the usual dip into the listener mailbag, this time for six Top 100-related questions. To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices

SAP and Enterprise Trends Podcasts from Jon Reed (@jonerp) of diginomica.com
Hashing out SAP in 2025 - pitfalls and opportunities with Greenbaum and Dennett

SAP and Enterprise Trends Podcasts from Jon Reed (@jonerp) of diginomica.com

Play Episode Listen Later Jan 19, 2025 58:23


I was unable to get Josh Greenbaum and Brian Dennett together for an on-the-ground podcast at ASUG Tech Connect in November, but the show provoked important talks on RISE, clean core, and why SAP projects need enterprise architects. Those topics aren't going away, so we got together virtually to make sense of what we learned - and what's next. With looming ERP deadlines on the one hand, and modernization/AI on the other, it's a crucial year for SAP. The role of the S/4HANA public cloud edition is in the middle of this also. That's plenty for this discussion, which starts out on a humorous note as the cities and shows blurred together for your host. Note: there are more podcasts from this show, including an ASUG collaboration on Enterprise Architects coming soon - and my on the ground taping with Jelena Perfiljeva of the Boring Enterprise Nerds on SAP developer issues, clean core debates and more: https://jonerp.podbean.com/e/asug-tech-connect-review-jelena-perfiljeva-of-boring-enterprise-nerds/

Busting the omnichannel - enterprise hacks and chats
Hashing out SAP in 2025 - pitfalls and opportunities with Greenbaum and Dennett

Busting the omnichannel - enterprise hacks and chats

Play Episode Listen Later Jan 19, 2025 58:22


I was unable to get Josh Greenbaum and Brian Dennett together for an on-the-ground podcast at ASUG Tech Connect in November, but the show provoked important talks on RISE, clean core, and why SAP projects need enterprise architects. Those topics aren't going away, so we got together virtually to make sense of what we learned - and what's next. With looming ERP deadlines on the one hand, and modernization/AI on the other, it's a crucial year for SAP. The role of the S/4HANA public cloud edition is in the middle of this also. That's plenty for this discussion, which starts out on a humorous note as the cities and shows blurred together for your host. Note: there are more podcasts from this show, including an ASUG collaboration on Enterprise Architects coming soon - and my on the ground taping with Jelena Perfiljeva of the Boring Enterprise Nerds on SAP developer issues, clean core debates and more: https://jonerp.podbean.com/e/asug-tech-connect-review-jelena-perfiljeva-of-boring-enterprise-nerds/

SAP and Enterprise Trends Podcasts from Jon Reed (@jonerp) of diginomica.com

CIOs are in the pressure cooker. But advice is often cookie cutter. No cookie cutters with my next guest, Tim Crawford. We'll count down top CIO mistakes and Tim's top/overlooked CIO moves for being business-relevant, AI-savvy etc. I've wanted to get Tim on the show for a while, this is going to be a dandy - bring your sharpest and snarkest questions as usual.... Note: part two of this discussion, on next-gen analyst relations, has already been released as a separate podcast on my channel.

Busting the omnichannel - enterprise hacks and chats
Hashing out CIO pitfalls - with Tim Crawford

Busting the omnichannel - enterprise hacks and chats

Play Episode Listen Later Dec 15, 2024 50:28


CIOs are in the pressure cooker. But advice is often cookie cutter. No cookie cutters with my next guest, Tim Crawford. We'll count down top CIO mistakes and Tim's top/overlooked CIO moves for being business-relevant, AI-savvy etc. I've wanted to get Tim on the show for a while, this is going to be a dandy - bring your sharpest and snarkest questions as usual.... Note: part two of this discussion, on next-gen analyst relations, has already been released as a separate podcast on my channel.

Out of Bounds with Bo Bounds
12-12-24 Steve Palazzolo: Trouble brewing in Philly? AJ Brown and Jalen Hurts are hashing it out. We get the scoop. Bo & Steve talk some fantasy football, the resurgence of the running back, and more. Tune in!

Out of Bounds with Bo Bounds

Play Episode Listen Later Dec 12, 2024 31:12


All guests join us on the Farm Bureau Insurance guest line, and we are LIVE from the BankPlus Studio! Out of Bounds is sponsored by BetterHelp. Visit BetterHelp.com/BOUNDS today to get 10% off your first month! Learn more about your ad choices. Visit megaphone.fm/adchoices

Andy Staples On3
CHAMPIONSHIP WEEK RECAP | CLEMSON WALKS IT OFF, Oregon Survives | Does SMU or Alabama get in?

Andy Staples On3

Play Episode Listen Later Dec 8, 2024 45:42


You've had Wendy's Nuggs dipped in sauce. But have you had them covered in sauce? Wendy's New Saucy Nuggs take the Crispy and Spicy Nuggs you love and turn them up to 11.Choose between flavors like Buffalo. Honey BBQ. Garlic Parm. Or, if you're a real heat seeker, try Spicy Ghost Pepper, only on Wendy's signature Spicy Nuggs. Listen here as Andy & Ari provide their instant analysis of Championship Week ahead of Selection Day(0:00-10:20) Intro, Clemson stuns SMU(10:21-22:20) Predicting CFP Rankings(22:21-26:38) Penn State's Performance vs Oregon(26:39-34:20) Hashing out the projected CFP Rankings(34:21-45:42) Final Recap, Conclusion Hosts: Andy Staples, Ari WassermanProducer: River Bailey

Two Titans And A Hunter: A Destiny 2 Podcast
Ep.306 - Explain Salting & Hashing Like I'm Five

Two Titans And A Hunter: A Destiny 2 Podcast

Play Episode Listen Later Dec 2, 2024 97:05


Join us this week as we talk all about Iron Banner, weapons we've been using and rolls of Tinasha's Mastery we're chasing. Respawn breaks down one of his latest Hunter builds, courtesy of HurriKane Project and we let Peroty explain what salting & hashing are, like we are five years old. Plus whats happening in the upcoming ritual rotations in This Week In Destiny - Episode: Revenant Act II, week 9 and a few videos for you to check out in our show notes.   00:00:00 – Opening 00:02:25 - Welcome & Tina Talk 00:11:05 - Iron Banner Things 00:18:14 - Unending Tempest 00:25:36 - Yarovit MG4 00:36:18 - Iron Lagging 00:40:07 - Prison Talk 00:44:39 - Tribute Worries 00:47:05 - Tips, Tricks, Guides & Builds 00:51:39 - Respawn's Build 01:01:11 - That Perk Weighting Issue 01:10:57 - Explain It To Me Like I Was Five 01:17:45 - This Week In Destiny: Revenant Week 9 Rotations 01:25:15 - Extra Info 01:28:20 - Other Destiny News 01:33:48 - Patreon Thanks & End of the Show 01:37:06 - End   Two Titans and a Hunter YouTube Channel Two Titans and a Hunter Twitch Two Titans and a Hunter Discord Two Titans and a Hunter - Patreon Two Titans and a Hunter Ko-Fi The100 io – GH/GD/2TAAH Group Email: twotitansandahunter@hotmail.com Two Titans and a Hunter Twitter Two Titans and a Hunter – Facebook Artwork by @Nitedemon Xbox Live: Nitedemon, Peroty, Not Arf & No1RespawnsInRL End credits theme song by Elsewhere - YouTube Channel Plus as always, thank you to Alexander at Orange Free Sounds & www.freesound.org for all the sound effects used in our podcast.  Required Stuff: Bungie - Dev Insights: Perk Weighting Article Players Vs Enemies Podcast - Episode.124 Daltnix - Insane Stasis Titan PvP Build Mr Ronit - Behemoth Titans Are Now Busted ItsDaveTV - This Titan Exotic Build Makes You Invincible Mr Armageddon - Be My Iron Daddy Mr Armageddon - Clap Them Cheeks Titan PvP Build Cheese Forever - New Sidearm Grants Devour True Vanguard - Tinasha's Mastery God Rolls Respawn/HurriKane Hunter PvP Build - DIM Link Pluderthabooty Channel Mactics Channel Engram.Blue Link

The Hashish Inn
Rick of Passion 4 Hashing (Portland, OR)

The Hashish Inn

Play Episode Listen Later Nov 30, 2024 131:44


In this episode we get to sit down with Rick of Passion 4 Hashing, based out of Portland, OR. We dive into the topic of melt and why Rick sees value in producing it in today's market, as well discussing what goes into producing high quality water hash. He tells us a bit about his time in Florida and how that eventually got him into the extraction world. We discuss the current state of the market, fresh frozen and much more!     www.thehashishinn.com Instagram: @thehashishinn  www.patreon.com/thehashishinn Presented by:  Rosin Evolution www.rosinevolution.com THI710 - SAVINGS CODE to save 5% & SUPPORT the podcast

SAP and Enterprise Trends Podcasts from Jon Reed (@jonerp) of diginomica.com
How can analyst relations serve customers better? Hashing it out with Tim Crawford

SAP and Enterprise Trends Podcasts from Jon Reed (@jonerp) of diginomica.com

Play Episode Listen Later Nov 24, 2024 36:46


In the end, shouldn't analyst relations service customers better? Shouldn't enterprise analysts advocate for customer concerns? After discussing CIO pitfalls/opportunities with Tim Crawford of AVOA, we pick up in this podcast with a spirited discussion of the future of analyst relations - with a vigorous chat of experts keeping us on track. This was not always an easy talk, getting into issues of independence and disclosure, but these are important topics in the analyst industry. Note 1: Crawford's response to this was sparked by Jon's post on next-gen analyst relations: https://diginomica.com/what-does-next-gen-analyst-relations-look-and-why-should-customers-care. Note 2: The CIO section of this conversation is not yet released as an audio podcast. You can see the entire show on video replay at https://www.youtube.com/@jonreedofdiginomica.

serve customers analysts crawford cio hashing analyst relations tim crawford avoa
Unsportsmanlike Conduct
Hashing Out Bowls W/ Connor Happer - 1

Unsportsmanlike Conduct

Play Episode Listen Later Oct 18, 2024 35:30


We do YOU a service and try to figure out where Nebraska could end up in.

SAP and Enterprise Trends Podcasts from Jon Reed (@jonerp) of diginomica.com
Workday Rising 2024 - hashing out the HCM, payroll and AI news with Pete Tiliakos

SAP and Enterprise Trends Podcasts from Jon Reed (@jonerp) of diginomica.com

Play Episode Listen Later Sep 22, 2024 48:28


In the final hours of Workday Rising 2024, Jon sat down with analyst Pete Tiliakos for an unscripted show review. Tiliakos has a focus on HCM, payroll and the future of work, so the podcast leaned towards those themes - and, of course, the unavoidable reckoning with AI-related news as well. Topics include: why payroll modernization matters, Workday's Extend strategy and whether that pattern will repeat with AI, why AI in HR is a potent issue, and what we learned on the show floor - and in conversation with Workday execs. Jon also discusses his Rising post on "should you rip out your ERP/HCM for AI."

The Bitcoin Layer
Teaching Bitcoin Part 2: Hashing & Mining

The Bitcoin Layer

Play Episode Listen Later Sep 20, 2024 70:00


In Part 2 of our "Teaching Bitcoin" series with legendary financial researcher Michael Howell, Nik delves into the intricacies of bitcoin's cryptography, mining mechanism, and decentralized network. The pair discuss the origin of a blockchain, and Michael learns about hashing algorithms for the first time. A discussion of bitcoin's supply schedule, difficulty target, and difficulty adjustment offer Michael and viewers a solid foundation of bitcoin's blockchain mechanics. The Bitcoin Layer is a bitcoin and global macroeconomic research firm. The Bitcoin Layer is proud to be sponsored by Unchained, the leader in Bitcoin financial services. Unchained empowers you to take full control of your Bitcoin with a collaborative multisig vault, where you hold two of three keys, and benefit from a Bitcoin security partner. Purchase Bitcoin directly into your cold storage vault and eliminate exchange risks with Unchained's Trading Desk. Unchained also offers the best IRA product in the industry, allowing you to easily roll over old 401(k)s or IRAs into Bitcoin while keeping control of your keys. Don't pay more taxes than you have to. Talk to us today. Visit https://thebitcoinlayer.com/unchained and use code TBL for $100 off when you create an account. Efani delivers premium mobile service with unparalleled protection against SIM swaps and privacy invasions. Use code TBL at checkout for $99 off the Efani SAFE Plan. https://www.efani.com/tbl?utm_source=substack&utm_medium=email Try Stamp Seed, a DIY kit that enables you to hammer your seed words into a durable plate of titanium using professional stamping tools. Take 15% off with code TBL. Get your Stamp Seed today! https://www.stampseed.com/shop/titanium-seed-phrase-storage-kits.html?utm_source=substack&utm_medium=email Subscribe and turn on notifications for TBL on YouTube. Subscribe to TBL's research letter: https://thebitcoinlayer.com/subscribe Follow TBL on X: https://twitter.com/TheBitcoinLayer Subscribe to The Bitcoin Layer on your favorite podcast platform. Join the official TBL channel on Telegram: https://t.me/thebitcoinlayerofficial Use code TBLYT10 for 10% off all The Bitcoin Layer Merch at http://TheBitcoinLayer.com/merch Block Height 862156 Contribute to The Bitcoin Layer via Lightning Network: thebitcoinlayer@zbd.gg Nik Bhatia's Twitter: https://twitter.com/timevalueofbtc Research Associate Joe Consorti's Twitter: https://twitter.com/JoeConsorti Creative Director Matthew Ball's Twitter: https://twitter.com/matthewrball #TheBitcoinLayer #NikBhatia #BitcoinEducation #BitcoinLearning #MichaelHowell #BitcoinProtocol #BitcoinHistory #BitcoinExplained #BitcoinAsset #BitcoinMoney #BitcoinMining #Decentralization #BitcoinEducation #Cryptography #BitcoinNetwork #BlockchainTechnology #HashingAlgorithms #BitcoinSupply #BitcoinMechanics #FinancialEducation #DigitalCurrency #BitcoinExplained #BitcoinSeries #BitcoinBasics #LearnBitcoin #BitcoinFundamentals #BitcoinBlockchain #BitcoinTechnology #BitcoinTutorial #BitcoinKnowledge #BlockchainBasics #DecentralizedFinance #BitcoinInnovation #BitcoinProtocol #BitcoinForBeginners #BitcoinMiningExplained #BitcoinDevelopment #BlockchainEducation #BitcoinSecurity #BitcoinHashing #BitcoinDifficulty #DigitalAssets #BitcoinCommunity #BitcoinInsights #BitcoinExperts #BitcoinExploration #Bloomberg #Analysis #Charts #Tradingview #InvestmentStrategy #MarketWatch #StockMarket #PassiveInvesting #IndexFunds #FinancialMarkets #MarketWatch #FreeMarket #FreeMarkets #Markets #USTreasury #TreasuryBills #BalanceSheet #FED #Debt #Inflation #Statistic #Rates #Interest #Asset #Bitcoin #Dollar #Sats #BTC #Gold #Market #Trading #Currency #Crypto #Analysis #Investment #News #Finance #Education #Blockchain #Mining #BitcoinMining #macro The Bitcoin Layer and its guests do not provide investment advice.Subscribe to The Bitcoin Layer on Soundwise

SYSTEMIZE YOUR LIFE WITH CHELSI JO
SYSTEM SHOWCASE // Hashing Out Time Blocks, Clutter, Less Overwhelm, and an Organized Business with Star Student Alyssa Alexander

SYSTEMIZE YOUR LIFE WITH CHELSI JO

Play Episode Listen Later Aug 23, 2024 38:13


Ever feel like you're drowning in chaos, both at home and in your business? You're not alone! This week, we're featuring Alyssa Alexander, who took control of her time, decluttered her home, and transformed her business into a thriving success.  Tune in to hear Alyssa's inspiring journey and learn how you can bring the same peace and productivity into your life. You won't want to miss this episode!   xoxo, Chelsi Jo . . Resources from today's episode:   Find out more about Alyssa and her piano business HERE!   Get The Complete Home Management System That Takes You From Overwhelmed To Organized In Four Weeks!    

Johnjay & Rich On Demand
Hashing it out for the first time in a WHILE

Johnjay & Rich On Demand

Play Episode Listen Later Jul 26, 2024 30:52 Transcription Available


The TryPod
256: Re-Hashing the Drama

The TryPod

Play Episode Listen Later Apr 11, 2024 65:19


We discuss the Love is Blind drama and provide something of a think piece on reality television as a whole. Plus, which celebrity couples would be fart positive? To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices

The Sip with Ryland Adams and Lizze Gordon
Hashing Out Our Biggest Fight

The Sip with Ryland Adams and Lizze Gordon

Play Episode Listen Later Jan 24, 2024 69:48


Go to http://zocdoc.com/thesip to download the Zocdoc app for free and book a top-rated doctor today! Use code SIP for $20 off your first SeatGeek order. https://seatgeek.onelink.me/RrnK/SIP Control Body Odor ANYWHERE with @lumedeodorant and get $5 off of your Starter Pack (that's over 40% off) with promo code SIP at http://LumeDeodorant.com!  On today's episode of The Sip, Ryland And Lizze are at odds after Ryland feels Lizze has abandoned him. Ryland fears the two are growing apart but the two hash it out on air. After the two move on, The Sip crew TASTE TESTS the NEW Crumbl Cinnamon Squares AND Taco Bell's exclusive Cinnamon Twist Cereal! 

Johnjay & Rich On Demand
Hashing, Stacking, Waking up in style!

Johnjay & Rich On Demand

Play Episode Listen Later Jan 2, 2024 68:52 Transcription Available


HASH IT OUT... with LOTS of feedback! Plus, who wakes up to what alarm on the show? Have you noped out of a relationships? The lines have been INSANE, DM Us your stories! @johnjayandrich