Podcasts about Internet Protocol

Communication protocol that establishes the Internet across computer network boundaries

  • 83PODCASTS
  • 96EPISODES
  • 36mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Apr 22, 2025LATEST
Internet Protocol

POPULARITY

20172018201920202021202220232024


Best podcasts about Internet Protocol

Latest podcast episodes about Internet Protocol

פופקורן - פודקאסט מאת ליאור פרנקל
הלו? זה אינטרנט? | למחוק ערך לענקיות התקשורת | להמציא בדיקה מהפכנית ל-HIV | פופקורן 391 עם אילון גנור

פופקורן - פודקאסט מאת ליאור פרנקל

Play Episode Listen Later Apr 22, 2025 84:00


איך אדם אחד יכול לשנות את דרך התקשורת של העולם? מה קורה כשכל התעשייה אומרת שהרעיון שלך לא יעבוד? איך מתמודדים עם התנגדות של ענקי התקשורת? ומיהו האיש שקודם המציא בדיקה מהפכנית ל-HIV לפני שהפך את עולם התקשורת על פיה?טלפון דרך האינטרנט? מובן מאליו, לא? אבל לפני פחות משלושה עשורים, חברות הטלפוניה העולמיות גבו מיליארדים על שיחות בינלאומיות, והטכנולוגיה שתשנה את זה לנצח הייתה עדיין בחיתוליה. שילמנו המון על טלפונים, ובטח לחו״ל. אילון גנור, רופא במקצועו, יזם ופורץ דרך טכנולוגי, היה מהראשונים שהפכו את האינטרנט לרשת טלפונית עולמית, בלי תלות בתאגידים ובמחירים המופקעים שהם גובים. הוא קידם את טכנולוגיית ה-VoIP (Voice over Internet Protocol) שמאפשרת לנו היום לשוחח חינם עם כל אדם בעולם.החזון שלו נתקל בספקות ובהתנגדות עזה. התאגידים הגדולים סירבו להאמין שאפשר להעביר קול באיכות טובה דרך האינטרנט, ועשו הכל כדי למנוע מהטכנולוגיה להתפתח. אבל גנור לא ויתר, ושנים לפני סקייפ וזום, הוא כבר הפעיל מערכת שאפשרה שיחות קוליות דרך האינטרנט.ועוד לפני כן, הוא הוביל פריצת דרך רפואית משמעותית כשהחברה הראשונה שלו פיתחה פפטיד סינתטי לבדיקת HIV – הישג מרשים שמדגיש את היכולת הייחודית שלו לשלב בין עולמות ידע שונים.אילון גנור מוציא בימים אלה ספר שמספר את הסיפור המטורף של החברה שבנה, ועל המאבק של דוד מול גוליית שהוביל למהפכה בתקשורת העולמית. בשיחה איתו, הוא משתף לא רק את ההיסטוריה המרתקת, אלא גם את דעותיו על ההווה והעתיד של הטכנולוגיה – עולם שמזמן שאלות מסובכות ואתגרים חדשים, ממש כמו אלה שהוא עצמו התמודד איתם.להאזנה באתרשיעורים קצרצרים למנהליםשיעור יצירתיות בעבודההספר הקטן למנהל.ת החדש.הלספר החדש של אילוןמנותני החסות לפרק:הלוואה מבית הפניקס

レアジョブ英会話 Daily News Article Podcast
Microsoft shutting down Skype in May

レアジョブ英会話 Daily News Article Podcast

Play Episode Listen Later Mar 29, 2025 2:33


Microsoft is closing down Skype, the video-calling service it bought for $8.5 billion in 2011, which had helped spark a transformation in how people communicate online. The tech giant said it will retire Skype in May and shift some of its services to Microsoft Teams, its flagship videoconferencing and team applications platform. Skype users will be able to use their existing accounts to log into Teams. Microsoft has for years prioritized Teams over Skype, and the decision to fold the brand reflects the tech giant's desire to streamline its main communications app as it faces a host of competitors. Founded in 2003 by a group of engineers in Tallinn, Estonia, Skype was a pioneer in making telephone calls using the internet instead of landlines. It relied on VoIP, Voice over Internet Protocol, technology that converts audio into a digital signal transmitted online. Skype added video calls after online retailer eBay bought the service in 2005. “It brought a lot of people around the world closer,” said Barbara Larson, a management professor at Northeastern University who studies the history of virtual and remote work. The ability to bypass expensive international phone calls to connect with far-flung coworkers was a boon for startups, but also people outside of the business world. As with other new platforms, scammers also made use of it. Skype was still considered high-tech in 2017 when recently inaugurated President Donald Trump's administration used it to field questions from journalists far from the White House press briefing room. It was a month later when Microsoft launched Teams, an attempt to catch up to the growing demand for workplace chatting services sparked by upstart rival Slack Technologies. Slack and Teams, along with newer video platforms such as Zoom, saw explosive growth during the COVID-19 pandemic as companies scrambled to shift to remote work, and even families and friends looked for new tools for virtual gatherings. Skype, by then, was already on the wane but had paved the way for strengthening the connections people can build remotely. This article was provided by The Associated Press.

linkmeup. Подкаст про IT и про людей

Как идея защищённой связи для военных привела к тому, что вы читаете этот текст? Давайте вместе разберёмся, как случайный успех учёных и инженеров сделал интернет частью нашей повседневной жизни — даже если изначально план был совсем другим. Сообщение IP — Internet Protocol появились сначала на linkmeup.

AWS Morning Brief
A Legend Moves On

AWS Morning Brief

Play Episode Listen Later Dec 23, 2024 7:29


AWS Morning Brief for the week of December 23, with Corey Quinn. Links:Amazon AppStream 2.0 introduces client for macOSAmazon EC2 instances support bandwidth configurations for VPC and EBSAmazon Timestream for InfluxDB now supports Internet Protocol Version 6 (IPv6) connectivityAmazon WorkSpaces Thin Client now available to purchase in IndiaAWS Backup launches support for search and item-level recoveryAWS Mainframe Modernization now supports connectivity over Internet Protocol version 6 (IPv6)AWS Marketplace now supports self-service promotional media on seller product detail pagesAWS re:Post now supports Spanish and PortugueseAWS Resource Explorer supports 59 new resource typesAWS offers a self-service feature to update business names on AWS InvoicesAnnouncing CloudFormation support for AWS Parallel Computing ServiceAnnouncing Node Health Monitoring and Auto-Repair for Amazon EKS - AWSAnd that's a wrap!Best practices for creating a VPC for Amazon RDS for Db2How the Amazon TimeHub team handled disruption in AWS DMS CDC task caused by Oracle RESETLOGS: Part 3How to detect and monitor Amazon Simple Storage Service (S3) access with AWS CloudTrail and Amazon CloudWatchEnforce resource configuration to control access to new features with AWSMaximizing your cloud journey: Engaging an AWS Solutions Architect

AWS Morning Brief
Steady Improvements

AWS Morning Brief

Play Episode Listen Later Oct 28, 2024 2:34


AWS Morning Brief for the week of October 28, with Corey Quinn. Links:Amazon Aurora launches Global Database writer endpointAmazon Connect now offers screen sharingAmazon EKS endpoints now support connectivity over Internet Protocol version 6 (IPv6)AWS IAM Identity Center simplifies calls to AWS services with single identity contextEC2 Image Builder now supports building and testing macOS imagesIntroducing an enhanced in-console editing experience for AWS Lambda

PING
The APNIC Labs Measurement System

PING

Play Episode Listen Later Sep 4, 2024 33:45


In this episode of PING, Joao Damas from APNIC Labs explores the mechanics of the Labs measurement system. Commencing over a decade ago, with an "actionscript" (better known as flash) mechanism, backed by a static ISC Bind DNS configuration cycling through a namespace, the Labs advertising measurement system now samples over 15 million end users per day, using Javascript and a hand crafted DNS system which can synthesise DNS names on-the-fly and lead users to varying underlying Internet Protocol transport choices, packet sizes, DNS and DNSSEC parameters in general, along with a range of Internet Routing related experiments. Joao explains how the system works, and the mixture of technologies used to achieve the goals. There's almost no end to the variety of Internet behaviour which the system can measure, as long as it's capable of being teased out of the user in a javascript enabled advert backed by the DNS!

PING
We don't need subnets any more

PING

Play Episode Listen Later May 29, 2024 61:36


In his regular monthly spot on PING, APNIC's Chief Scientist Geoff Huston discusses the question of subnet structure, looking into the APNIC Labs measurement data which collects around 8 million discrete IPv6 addresses per day, worldwide. Subnets are a concept which "came along for the ride" in the birth of Internet Protocol, and were baked into the address distribution model as the class-A, class-B and class-C subnet models (there are also class-D and class-E addresses we don't talk about much). The idea of a sub-net is distinct from a routing network, many pre-Internet models of networking had some kind of public-local split, but the idea of more than one level of structure in what is "local" had to emerge when more complex network designs and protocols came into being. Subnets are the idea of structure inside the addressing plan, and imply logical and often physical separation of hosts, and structural dependency on routing. There can be subnets inside subnets, its "turtles all the way down" in networks. IP had an ability out-of-the-box to permit subnets to be defined, and when we moved beyond the classful model into classless inter-domain routing or CIDR, the idea of prefix/length models of networks came to life. But IPv6 is different, and the assumption we are heading to a net-subnet-host model of networks may not be applicable in IPv6, or in the modern world of high speed complex silicon for routing and switching. Geoff discusses an approach to modelling how network assignments are being used in deployment, which was raised by Nathan Ward in a recent NZNOG meeting. Geoff has been able to look into his huge collection of IPv6 addresses and see what's really going on.

Not Reserving Judgment
Episode 29: Were unvaxxed nurses mistreated? An arbitrator says yes.

Not Reserving Judgment

Play Episode Listen Later Mar 13, 2024 38:24


On Episode 29, we tell you about a labour arbitrator decision that found a vaccine mandate that led to 10 nurses being fired from their jobs was unreasonable; we go through the Supreme Court decision that found the state needs judicial authorization to get your Internet Protocol address; and we tell you about a proposed bylaw that would ban "graphic" anti-abortion signs.Stories and cases discussed in this week's episode:City council votes to move ahead with ban on graphic protest signsR. v. BykovetsPolice need search warrant to get IP address, rules Supreme Court of Canada in 5-4 split decisionOnline sex abuse: Accused Ontario med student avoids extradition to U.S.Arbitrator rules in favour of Ont. nurses fired for refusing COVID vaccinesQuinte Health v Ontario Nurses Association, 2024 CanLII 14991 (ON LA)Not Reserving Judgment is a podcast about Canadian constitutional law hosted by Josh Dehaas, Joanna Baron, and Christine Van Geyn.The show is brought to you by the Canadian Constitution Foundation, a non-partisan legal charity dedicated to defending rights and freedoms. To support our work, visit theccf.ca/donate.

Sidebar by Courthouse News
Don't Call Me (Maybe)

Sidebar by Courthouse News

Play Episode Listen Later Aug 22, 2023 31:23


Welcome back, listeners, from what we hope was a calm, relaxing break.If it was anything like ours, just when you cozied up with a summer read, you were likely jarred back to reality by a pesky robocall asking about your auto warranty.Receiving unwanted robocalls remains a universal experience 32 years after Congress passed the Telephone Consumer Protection Act to empower Americans to fight off unwanted calls. In our ninth episode this season, we explain why the law did little to stop overseas scammers and instead created financial incentives for plaintiffs and their attorneys, ultimately leading to the Supreme Court's determination of what constituted an "autodialer."Now, an Anti-Robocall Multistate Litigation Taskforce of 49 attorneys general are taking on Avid Telecom, a Voice over Internet Protocol provider accused of sending or trying to send more than 24.5 billion calls.Will the outcome inspire Americans to start answering their phones? Press one for yes or two for no.Special guests:Noah Duguid, who sued Facebook over unwanted texts Roger Anderson, founder of the Jolly Roger Telephone CompanyEric Troutman, defense attorney and “czar” of the TCPA Chris Laccinole, a frequent TCPA litigator  Isaac Shloss, chair of the Government Affairs Committee for the Professional Associations for Customer Engagement Attorney Jay EdelsonThis episode was produced by Kirk McDaniel. Intro music by The Dead Pens. Editorial staff is Bill Dotinga, Sean Duffy and Jamie Ross.

Hemispheric Views
088: I Don't Like The Residue!

Hemispheric Views

Play Episode Listen Later Jun 29, 2023 54:13


It's a call-in show now?! Someone else fell into the trap of sending in a desk to be reviewed! More talk about Windows than you would ever imagine. Finally, a little reflection on the show and a board meeting to decide if we keep going! Podcast Shout-out! 00:00:00 Hi, Robb!

The Find Your STRONG Podcast
117 - Turning Tragedy Into Triumph with Noel Davis our 1st Ever Cover Search Winner

The Find Your STRONG Podcast

Play Episode Listen Later Jun 1, 2023 50:06


Coach Jenny is joined by STRONG Fitness Magazine's May/June cover athlete and first ever Cover Model Search winner Noel Davis, who opens up to share her story of triumph over trials and how her focus, passion and ambition pushed her to success through the toughest of times. Noel shows us that overcoming obstacles is ALWAYS possible and how her ingenuity and commitment helped her take her fitness business to the next level!  Get Your Perfect Sports 20% Discount here by using coupon code JVBSave $100 off Your MAXPRO Fitness hereApply for the STRONG Formula Certification Program WORK WITH A TEAM STRONG GIRLS COACHSTRONG Fitness Magazine Subscription Use discount code STRONGGIRL  If you enjoyed this episode, make sure and give us a five star rating  and leave us a review on iTunes, Podcast Addict, Podchaser and Castbox.  Resources:STRONG Fitness MagazineSTRONG Fitness Magazine on IGTeam Strong GirlsCoach JVB Follow Jenny on social media:InstagramFacebookYouTube 

IoT For All Podcast
What is Thread? | Google's Jonathan Hui | Internet of Things Podcast

IoT For All Podcast

Play Episode Listen Later May 2, 2023 18:15


What is Thread? Jonathan Hui, Principal Software Engineer at Google and VP of Technology at Thread Group, joins Ryan Chacon on the IoT For All Podcast to discuss the Thread network protocol. They cover how Thread works, the differences between Thread and Wi-Fi, how Thread is improving the smart home, how Thread works with Matter, when not to use Thread, and the IoT challenges that Thread is solving. Jonathan Hui is a principal software engineer at Google, where he is responsible for Thread implementation in products and is maintainer of OpenThread released by Google. Prior to Google, he was a principal engineer at Cisco, where he built some of the world's largest IPv6 mesh networks for urban-scale, enterprise, and utility applications. He delivered the world's first commercial 6LoWPAN networks at Arch Rock before its acquisition by Cisco. Jonathan has also been deeply involved in standards bodies (IETF, IEEE, Thread, and Wi-SUN) and co-authored foundational specifications related to IPv6 in low-power wireless networks. He is also a co-inventor on more than 175 USPTO issued patents. Jonathan has a BS in electrical and computer engineering from Carnegie Mellon University and an MS and a PhD in computer science from the University of California, Berkeley. Formed in 2013, the non-profit Thread Group is focused on making Thread the foundation for the Internet of Things in homes and commercial buildings. Built on open standards, Thread is a low power wireless networking protocol that enables direct, end-to-end, secure, and scalable connectivity between IoT devices, mobile devices, and the internet. Because Thread is IP-based, it seamlessly integrates with many environments, apps, devices, and clouds. The Thread Group provides a rigorous certification program to ensure device interoperability and a positive user experience. Thread is backed by industry-leading companies including Amazon, Apple, Google Nest, Lutron, Nordic Semiconductors, NXP Semiconductors, OSRAM, Qualcomm, Siemens, Silicon Labs, Samsung SmartThings, Somfy, and Yale Security.

Building Strong
Disaster Response Vehicle

Building Strong

Play Episode Listen Later Apr 18, 2023


The Los Angeles District will be well prepared for its next disaster response with the recent acquisition of one of the Corps' newest Emergency Command and Control Vehicles. The ECCV, built on an International truck chassis, is a 47-foot vehicle designed to serve as a temporary mobile command post. It provides 11 work stations that each have a computer jack, 110- and 12-volt power sockets, and a phone that has cell, Voice over Internet Protocol and satellite capabilities. There is also onboard Wi-Fi capability to provide access for additional computers, and a rear compartment that houses a conference table, video camera and large screen TV for video conferencing. Produced by Brooks O. Hubbard IV. Also available in high definition.

Market Dominance Guys
How ChatGPT Can Improve Sales Enablement

Market Dominance Guys

Play Episode Listen Later Mar 29, 2023 10:57


In this episode of the Market Dominance Guys podcast, Chris, Corey and Helen Fanucci discuss the evolution of the internet, from its early days as a way for messages to move across networks to the democratization of global information through the browser and search engines. They also explore the capabilities of ChatGPT, including its ability to generate email responses and interact with customers using personalized prompts. They highlight the potential of ChatGPT to save time and improve the quality of communication for sales professionals. Join us for this idea-filled episode, "How ChatGPT Can Improve Sales Enablement."   Four ideas on how sales professionals can benefit from using ChatGPT for follow-up: Personalized Follow-Up: ChatGPT can help sales professionals create personalized follow-up messages for each customer based on their preferences, interests, and past interactions with the sales team. ChatGPT can analyze the customer's conversation history and provide personalized responses that feel like a human wrote them. Lead Nurturing: ChatGPT can help sales professionals nurture leads by sending automated follow-up messages to potential customers at regular intervals. These messages can be customized to meet the specific needs of each customer, making it easier to keep them engaged with the sales process. Schedule Meetings: ChatGPT can help sales professionals schedule meetings with potential customers by automating the process of finding a mutually convenient time to meet. This can save the sales team a lot of time and effort by eliminating the need to go back and forth with customers trying to find a suitable time. Provide Instant Customer Support: ChatGPT can be used to provide instant customer support to customers who have questions or concerns about a product or service. Sales professionals can use ChatGPT to respond to these inquiries in real-time, providing customers with the information they need to make a purchasing decision. This can help increase customer satisfaction and improve the chances of closing a sale. The Evolution of the Internet and Digital Communications 1960s: The concept of hypertext is introduced by Ted Nelson. 1980: Tim Berners-Lee develops the idea of a "mesh" network of hyperlinked documents and begins working on the WorldWideWeb (WWW) project. 1990: The first web page is created by Tim Berners-Lee. It contains information about the WWW project and how to use a web browser. 1991: The first web browser, called WorldWideWeb, is developed by Tim Berners-Lee. It was a text-only browser and was only available on the NeXTSTEP operating system. 1993: The first graphical web browser, called Mosaic, is released by Marc Andreessen and Eric Bina. It was a huge success and helped to popularize the web. 1994: The first search engine, called WebCrawler, is launched by Brian Pinkerton. It was the first search engine to index entire web pages rather than just titles and headings. 1995: Netscape Navigator is released by Netscape Communications Corporation. It becomes the most popular web browser and sets the standard for web browsing features. 1996: The first version of Internet Explorer is released by Microsoft, marking the beginning of the "browser wars" between Microsoft and Netscape. 1998: Google is founded by Larry Page and Sergey Brin. Their search engine quickly becomes the most popular and sets a new standard for search technology. 2003: Skype is launched, becoming one of the first and most popular VoIP (Voice over Internet Protocol) services. 2004: Mozilla Firefox is released by the Mozilla Foundation as an open-source alternative to Internet Explorer. 2008: Google releases the first version of the Chrome browser, which quickly becomes popular due to its speed and simplicity. 2009: WhatsApp is launched, providing a new way for people to communicate via instant messaging and voice calls over the internet. 2010: Microsoft releases Internet Explorer 9, which is considered a major improvement over previous versions. 2013: Google's Chrome becomes the most popular web browser, surpassing Internet Explorer for the first time. 2021: The current versions of popular web browsers include Google Chrome, Mozilla Firefox, Apple Safari, Microsoft Edge, and Opera. Popular search engines include Google, Bing, Yahoo, and DuckDuckGo. VOIP services like Skype, Zoom, and Teams have become critical tools for remote communication in response to the COVID-19 pandemic. The Worldwide Web continues to evolve and expand, with new technologies and innovations being introduced regularly. 2022: ChatGPT from OpenAI.com takes the world by storm and changes how we write and communicate forever.

InfosecTrain
What is Networking and IP Address? | How Does It Work? | InfosecTrain

InfosecTrain

Play Episode Listen Later Mar 28, 2023 61:52


Networking refers to the practice of connecting devices, such as computers, printers, and servers, to a common network infrastructure in order to facilitate communication and data exchange between them. Networking can be done using different types of technologies and protocols, such as Ethernet, Wi-Fi, Bluetooth, and TCP/IP. An IP address, or Internet Protocol address, is a unique identifier assigned to every device connected to a network that uses the Internet Protocol for communication. IP addresses are used to identify devices on a network and to route data packets between them. Thank you for Listen this Audio, For more details or free demo with our expert write into us at sales@infosectrain.com ➡️ Agenda for the Webinar

Cheap Home Grow - Learn How To Grow Cannabis Indoors Podcast
Growing with my fellow growers #206: Chat Q&A: 15+ questions answered! "de-leaf debate" and more!!!

Cheap Home Grow - Learn How To Grow Cannabis Indoors Podcast

Play Episode Listen Later Mar 13, 2023 129:52


This week host @Jackgreenstalk (aka @Jack_Greenstalk on twitter/ig backup) [also available to be contact via email: JackGreenstalk47@gmail.com ] is joined by the always amazing panel with @spartangrown on instagram only or email spartangrown@gmail.com for contacting spartan outside social media, any alternate profiles on other social medias using spartan's name, and photos are not actually spartan grown be aware, Matthew Gates aka @SynchAngel on instagram and twitter and @Zenthanol on youtube who offers IPM direct chat for $1 a month on patreon.com/zenthanol , @Dr MJ Coco from cocoforcannabis.com as well as youtube where he tests and reviews grow lights and has grow tutorials and @drmjcoco on instagram and @NoahtheeGrowa on instagram and @TheAmericanOne on youtube aka @theamericanone_with_achenes on instagram who's amy aces can be found at amyaces.com, ... This week we missed @Rust.Brandon of @Bokashi Earthworks who's products can be found at bokashiearthworks.com , Kyle breeder of @pure_breeding on all social media whos seeds can be found at pbreeding.com , @ATG Acres Aaron The Grower aka @atgacres his products can be found at atgacres.com and now has product commercially available in select locations in OK, view his instagram to find out details about drops! questions answered on the show: (not quite in order) but all these and more that the panel brought up in relation to these great questions! Collective Mary Jane​@Dr MJ Coco what is a good cheap home grow water system for a dwc I want to try DWC with my new medic grow @CheapHomeGrow Question about 21 and 42 day defoliation.have done it last few grows . not sure about yield but makes trimming much easier Dr. MJ mentioned it was not a good ​@drmjcoco where do I find a good ppfd chart that's easy for a beginner to understand? MrMountainjam​what would Dr coco recommend as a high quality alternative to the diy draining saucers on his site? like some sort of drainage table or platform? Georgia Grow Guy​Has anyone noticed a difference in flower to maturity time between soil and hydro? I am finding my hydro buckets mature 10-14 days sooner. I dont know why. Thoughts apm​@CheapHomeGrow would top dressing worm castings in the last 2 weeks of flower be a bad idea? AnyThingGrows​@CheapHomeGrow is there a best time to water in relation to the light cycle? Does it vary with hand watering over automated set ups that can be programmed? AWDsti82​@CheapHomeGrown how often can you foliar feed your plants? @zenthanol is there an ipm concern with pulling leaves late in flower (week 6+) apm​@cheaphomegrow @dr mj coco when is the last day you would leaf strip? Any leafs? VP Dee_Grows_Some_BUSH​@CheapHomeGrow Thoughts on IR from Internet Protocol cameras in a dark flower tent? Okiegrower​@CheapHomeGrow could you ask dr coco if he has or could do a par test in a 4x4 or 5x5 using 4 small lights and what would be the best spacing for LoneStarLarf​Anyone know anything about DLI and terpene expression? I've heard reducing light can improve quality (not quantity) Roudy420​@CheapHomeGrow would the calcium residue from using tap water in a humidifier settle on the light dioeds? dog doctor official​@CheapHomeGrow wen do you guys stop calmag wen growing with organic pellets on the soil , i have been stopping it at about week 3 or 4 Rocinante​@zenthanol if I know a whitefly outbreak will happen in a greenhouse is there any preventative biocontrol? I currently will rely on encarsia Formosa --- Support this podcast: https://anchor.fm/cheaphomegrow/support

TEN | Tenant Experience Network
Michael Przytula | Managing Director | Intelligent & Digital Workplaces | Accenture | The people side of workplace technology

TEN | Tenant Experience Network

Play Episode Listen Later Feb 7, 2023 36:19


In this episode, host David Abrams is in conversation with Michael Przytula, Managing Director, Intelligent & Digital Workplaces at Accenture. Michael began his career journey working in the early days of enterprise email systems and Voice over Internet Protocol (or VoIP), which led him to real estate technology. Michael now leads Accenture's workplace technology practice in North America, where he spends his time focused on experience in the workplace. Like me, what truly drives Michael's work is the realization that commercial real estate is ALL ABOUT THE PEOPLE. We both want to help people do things better, faster and more easily while at work. Michael notes that the built environment has really pivoted to being about the experiences and spaces that make a workplace that people love to work in. His ultimate goal is to create a standardized, streamlined and unified experience, no matter where people work. Michael highlights the need for more collaboration between building operators and their customers to determine the right set of digital services – before construction and after. Michael and I are aligned in our thinking and views on properties using technology to enhance customer experience in the building and facilitate connections to the surrounding community. I'm looking forward to our next conversation! Subscribe to TEN so you never miss an episode of the Tenant Experience Network.

AI in Action Podcast
E394 Dev Bapat, Head of AI, ML & Data Products at Cisco

AI in Action Podcast

Play Episode Listen Later Oct 31, 2022 14:29


Today's guest is Dev Bapat, Head of AI, ML & Data Products at Cisco in New Jersey. Since 1984, Cisco engineers have been leaders in the development of Internet Protocol-based networking technologies. Today, with more than 71,000 employees worldwide, this tradition of innovation continues with industry-leading products and solutions in the company's core development areas of routing and switching, as well as in advanced technologies such as home networking, IP telephony, optical networking, security, storage area networking and wireless technology. Dev is a digital strategy and solutions leader who drives profitable growth by developing and successfully deploying digital solutions leveraging Machine Learning/optimization across the enterprise. With 20+ years of experience in healthcare, high tech and automotive industries, Dev has demonstrated success by transforming supply chain and organizations in large cap companies and management consulting by navigating organizational complexity to deliver sustained bottom line value. In the episode, David will discuss: His current role with Cisco, What attracted him to join Cisco from Johnson & Johnson, How he plans to shape the AI, ML & Data environment at Cisco, Exciting career opportunities within his team, What excites him for the future & potential challenges to overcome, and Advice to junior data scientists coming into the industry

TechStuff
The Story of Ping

TechStuff

Play Episode Listen Later Sep 21, 2022 27:57


What is the ping tool, what is it used for, and where did it come from? We learn about the man who first created ping, why it's not an acronym for anything, and why gamers care about it.See omnystudio.com/listener for privacy information.

Irish Tech News Audio Articles
Hold the Line, India Calling!

Irish Tech News Audio Articles

Play Episode Listen Later Jul 28, 2022 11:39


In recent years, there has been a proliferation of scam call centers in India. These call centers typically target westerners, often pretending to be from a legitimate company or government agency. They may try to trick people into giving them personal information or money. Scam call centers have become a major problem in India, and the government has been working to crack down on them. In 2017, the Indian authorities arrested more than 70 people in connection with a scam call center that had allegedly defrauded US citizens out of millions of dollars. If you receive a suspicious call from someone claiming to be from India, do not give them any personal information or money. Hang up immediately and report the call to the proper authorities. The Indian government has been cracking down on scams originating from call centers in the country, but the problem persists. In 2017, the Indian government received nearly 1.5 million complaints about scam phone calls, with victims losing a total of Rs 10,000 crore (roughly $1.5 billion). Most of these scams target people in the United States, Canada, and Australia. The callers typically pose as representatives of businesses or government agencies and trick victims into giving away personal information or money. While the Indian government has taken steps to crack down on these scams, they continue to occur. What Tech Do They Use? India has been known to be a major hub for scam call centers. These call centers typically use technology to impersonate representatives from well-known companies in order to defraud people out of their money. Some of the most common technologies that these call centers use include VoIP (Voice over Internet Protocol) and auto-dialers. VoIP allows scammers to make calls using the internet instead of a traditional phone line, which makes it easy to spoof the number and very difficult to trace the call back to its source. Auto-dialers are used to automatically dial large numbers of phone numbers, often using a computerized list of numbers. This makes it very easy for scammers to reach a large number of potential victims. These call centers often use very high-pressure tactics to try to get people to give them money. They may claim that you owe them money or that there is some sort of emergency and you need to send them money right away. They may also threaten to arrest you or take legal action if you do not comply with their demands. If you receive a call from a scam call center, it is important that you do not give them any personal information or send them any money. Hang up immediately and report the call to the proper authorities. You can also visit the Federal Trade Commission's website for more information on how to protect yourself from scam calls. The Indian government has recently taken steps to crack down on scam call centers that have been targeting victims in the West. These call centers typically use VoIP technology to make their calls, and they often spoof the caller ID information to make it appear as if they are calling from a legitimate organization or business. In many cases, the scammers will claim to be representatives of a government agency or a well-known company, and they will try to trick victims into giving them personal information or money. The Indian government has set up a special task force to investigate these scam call centers, and it is working with law enforcement agencies in the United States and other countries to identify and prosecute the people behind them. In the meantime, there are some things you can do to protect yourself from these scammers. If you receive a call from someone claiming to be from a government agency or a well-known company, do not give them any personal information. Hang up and call the customer service number for the organization they claim to represent. Do not call any numbers that the caller gives you, as these are likely to be fake. If you are unsure whether a call is legitimate, you can also contact ...

Neulich im Netz - Der Internet-Podcast
IPv6 - die letzte Version des Internet-Protokolls?

Neulich im Netz - Der Internet-Podcast

Play Episode Listen Later Jul 13, 2022 57:26


Vor 10 Jahren hat der IPv6-Launch-Day stattgefunden, um den Übergang in den IPv6-Produktionsbetrieb im Internet einzuläuten. Nichtsdestotrotz hat sich der Umstieg von IPv4 auf IPv6 als schwierig erwiesen und kann auch heute bei weitem noch nicht als abgeschlossen bezeichnet werden. In dieser Folge von Neulich im Netz beleuchten wir die ursprünglichen Erwartungen und die Faktoren, die zu dieser langwierigen Transitionsphase geführt haben. Wir analysieren den aktuellen Stand beim Übergang zu IPv6 in unterschiedlichen Ländern und Netzen und diskutieren die Zukunft von IPv6. Welche Lehren lassen sich aus der Entwicklung von und dem Übergang zu IPv6 ziehen? Wird es ein weiteres Internet-Protokoll nach IPv6 geben? Diese und weitere Fragen diskutieren wir in dieser Folge von Neulich im Netz. Mehr zu Neulich im Netz auf https://www.neulich-im.net/ music by scottholmesmusic.com Quellen: RFC 2460: Internet Protocol, Version 6 (IPv6) Specification, World IPv6 Launch, Akamai: 10 Years Since World IPv6 Launch, Internet Society: IPv6 Statistics, Akamai: IPv6 Adoption Visualization, Google: IPv6 Statistics, IPv6 – The History and Timeline, Computerworld: IPv6 comes to life in Japan, Pv6 Promotion Council, https://ipv6-test.com/, ARIN: Why is IPv6 Faster?, Cisco: Mobile Video Delivery with Hybrid ICN --- Send in a voice message: https://podcasters.spotify.com/pod/show/neulich-im-netz/message

Innovative Minds with Audrey Tang  唐鳳佮創新
#InnoMinds EP8 | From a "computer-hating science boy" to "the Father of the Internet": Professor Jun Murai

Innovative Minds with Audrey Tang 唐鳳佮創新

Play Episode Listen Later Jul 1, 2022 64:05


Known as the "father of the Internet in Japan," Jun Murai is a professor of computer science. Professor Murai received his doctorate from Keio University in 1987. During his research, he developed Japan's first-ever inter-university network. For Professor Murai's many contributions to the Internet Protocol, he was inducted into the 2013 Internet Hall of Fame. An optimist by nature, Professor Murai is a thoughtful academic at the top of his game. Join this episode for an innovative discussion about the future of human connectivity. 被譽為「日本網路之父」的村井純,是日本慶應義塾大學的計算機科學教授。村井教授1987年畢業於慶應義塾大學並取得博士學位。在研究期間他創辦了第一個日本學術網路,由於他對網路通訊協定的貢獻,村井入選2013 年的網際網路名人堂。村井教授是個天生樂觀主義者,也是位深思熟慮的科學家。如此殿堂級、神人級的人物,趕快加入這場關於人類未來互動的創新討論吧 --- TaiwanPlus | Bring Taiwan to the World Watch our programs now: https://www.taiwanplus.com/?c=Programs Lifestyle, culture, nature, and technology……everything about Taiwan is within your grasp. Download our App» https://tw.plus/YYaZk **Connect with TaiwanPlus | ** » Like us on Facebook: https://www.facebook.com/TaiwanPlusMedia » Tweet us on Twitter: https://twitter.com/taiwanplusnews » Follow us on Instagram: https://www.instagram.com/taiwanplus About TaiwanPlus | TaiwanPlus (Taiwan+) is an independent media organization funded by the people of Taiwan and is the nation's first English-language video news and programming platform for an international audience. #唐鳳 #AudreyTang #innovation #architect #garbage #recycle #environment #greenbuildings #carbonemission #waste #greentech

Around IT in 256 seconds
#79: QUIC: what makes HTTP/3 faster

Around IT in 256 seconds

Play Episode Listen Later Jun 30, 2022 4:04


QUIC can be thought of as the third fundamental protocol of the Internet. Next to UDP and TCP/IP. Let's talk a little bit about these two. They both build upon IP, Internet Protocol. IP supports exchanging packets of data between two machines having… IP addresses. UDP adds ports. Port is a logical concept. It's simply a number within one machine that identifies a certain process. Thanks to ports, many different processes on the same machine can exchange data. Read more: https://nurkiewicz.com/79 Get the new episode straight to your mailbox: https://nurkiewicz.com/newsletter

F* It!
156 - SOFTWARE UPDATE: Lessons in Breaking My Streak

F* It!

Play Episode Listen Later May 27, 2022 7:06


The journey in personal development is going to have failures, you're going to fail at times and you must learn to flip it and see it as quickly as possible as a learning tool in order to continue moving forward. If you enjoyed this episode, make sure and give us a five star rating  and leave us a review on iTunes, Podcast Addict, Podchaser and Castbox. Sign up for the next Follow-Through Challenge Follow me on Social Media:Amy on IGAmy on Facebook Resources:AmyLedin.comLean Bodies Consulting (LBC)LBC University 

CoinGeek Conversations
IPv6 at the BSV Global Blockchain Convention

CoinGeek Conversations

Play Episode Listen Later Apr 27, 2022 22:23


IPv6 at the BSV Global Blockchain Convention There's been much focus on the IPv6 or the Internet Protocol version 6, an upgrade on the current IPv4. Compared to the latter, IPv6 is known to increase security and privacy functionality on the internet. It's no surprise that IPv6 will be an expected buzz word in the upcoming BSV Global Blockchain Convention in Dubai. On this episode of CoinGeek Conversations, we'll hear nChain chief scientist Dr. Craig Wright discuss the combining power of blockchain technology and IPv6, as well as the founder and president of the IPv6 Forum, Latif Ladid as he explains why BSV is the only blockchain capable of handling IPv6's transactions volume. 

IGeometry
The Beauty of the Internet Protocol

IGeometry

Play Episode Listen Later Apr 24, 2022 26:50


In this episode of the backend engineering show we discuss the Internet Protocol. A beautiful, elegant protocol that made the Internet possible. We discuss why we need an IP address, how routing is done and how VPNs take advantage of the agnostic nature to encrypt traffic --- Support this podcast: https://anchor.fm/hnasr/support

Disruptors for GOOD
Providing High-Quality, Affordable Internet That Helps Move Communities Forward - Chet Kanojia // Co-founder and CEO of Starry

Disruptors for GOOD

Play Episode Listen Later Apr 13, 2022 36:39


---> Subscribe to the Causeartist Newsletter here.Check out Cool Points Club - They create scaleable climate initiatives that generate funds to help scale emerging carbon removal technologies. Their current initiatives include Cool Gram and Islands of Cool. Check them out when you get a chance. ---> Check out more Causeartist Partners here.In episode 137 of the Disruptors for GOOD podcast I speak with with Chaitanya “Chet” Kanojia, co-founder and CEO of Starry Inc, on providing high-quality, affordable internet that helps move communities forward.Chaitanya “Chet” Kanojia is co-founder and CEO of Starry Inc., a wideband hybrid fiber wireless technology company focused on building competitive, affordable, high-quality broadband across the United States.Prior to Starry, Chet was founder and CEO of Aereo, Inc., the groundbreaking online television platform that enabled consumers to record and watch live HD broadcast television on virtually any type of Internet-connected device via a cloud-based OTA antenna and DVR.Previously, Chet was the founder and CEO of Navic Networks. Like Aereo, Navic Networks addressed the challenges of today's highly fragmented media landscape. Under Chet's leadership, Navic Networks grew to be the undisputed industry leader in advanced television advertising and was acquired by Microsoft in 2008.Chet holds more than 31 patents in fields ranging from robotics to data communications systems and is an innovative leader known for pushing beyond the conventional and developing breakthrough solutions.He has been noted as part of Vanity Fair's 2013 "Next Establishment List” and named one of Inc. Magazine's 2013 “Entrepreneurs of the Year.”  Aereo's technology was also named one of TIME magazine's Top 50 Best Websites (2012) and a Top 50 Technology (2013) by MIT Technology Review.In 2019, Chet was honored with Public Knowledge's IP3 Award for Internet Protocol for his years of work developing technology in the interest of competition and consumer choice.Chet holds a master's degree in Computer Systems Engineering from Northeastern University in Boston and a bachelor's degree in Mechanical Engineering from the National Institute of Technology in Bhopal, India.About StarryStarry was recently named to the second annual TIME100 Most Influential Companies list.Starry is a next generation licensed fixed wireless technology developer and internet service provider on a mission to connect as many people as possible to affordable, high-quality home broadband. The company believes that connectivity is a social good and therefore should be both affordable and ubiquitous.Starry's goal is to provide competitive, high-quality, low-cost broadband options for residents in every community they serve. They currently serve subscribers in six major U.S. cities today - Boston, Washington, D.C., Los Angeles, New York City, Denver and Columbus, OH - and have an expansion roadmap to cover more than 40 million households nationwide.---> Check out the Causeartist Partners here.Check out Cool Points Club - They create scaleable climate initiatives that generate funds to help scale emerging carbon removal technologies. Their current initiatives include Cool Gram and Islands of Cool. Check them out when you get a chance.---> Subscribe to the Causeartist Newsletter here.Listen to more Causeartist podcast shows hereFollow Grant on Twitter and LinkedInFollow Causeartist on Twitter, LinkedIn, and Instagram

Business Standard Podcast
TMS Ep106: RBI policy rates, drone economy, markets, IPv6

Business Standard Podcast

Play Episode Listen Later Feb 11, 2022 23:34


The Reserve Bank of India (RBI) kept the key policy rates unchanged in its monetary policy review, surprising most experts who were betting on a reverse repo rate hike. Governor Shaktikanta Das said that the Monetary Policy Committee will continue its growth-supportive stance till there are signs of a durable recovery. What the central bank's status quo mean? After the RBI's status quo on key rates, let us move on to some action in the skies. A swarm of 1,000 India-made drones lit up the night sky with different formations over Vijay Chowk during the Beating Retreat ceremony last month. Just 11 days later, the government on Wednesday put a halt on the import of drones to give a fillip to India's fledgling drone industry. Will this recent move help lift the fortune of nascent drone industry? After the drones, let us see how stock markets reacted after the RBI's review meeting. The domestic equity markets soared yesterday after the RBI's bi-monthly monetary policy struck a dovish tone. The bullish sentiment lifted the Nifty50 a tad above 17,600 and the Sensex near 58,950. While the policy is set to comfort equities and bonds in the near-term, analysts say investors should remain cautious due to huge borrowing starting April 2022, rising global yields and elevated commodity prices. Uninterrupted Internet connectivity is key to trading. Just like our homes and offices, every device hooked to the Internet has its address. And similar to the postal department and courier agencies in the real world, the virtual world has Internet Protocol -- which is responsible for addressing, routing and delivering the online packets of information. But with the huge rise in the number of devices using the Internet, the current version of IP -- which is IPv 4 -- is bursting at the seams. And the world is now switching to IPv6 to accommodate billions of addresses and more. Let us know about IPv6 and more in this episode of the podcast.  Watch video

Business Standard Podcast
What is Internet Protocol version 6 (IPv6)?

Business Standard Podcast

Play Episode Listen Later Feb 11, 2022 3:43


About three decades ago, computers were limited to government institutions and universities. They were bulky and expensive. Over the years, the advancement in technology has made them small, affordable and obviously ubiquitous. They are in billions now. And their numbers are swelling as we talk. Internet Protocol, or IP in short, manages the huge traffic of information between these billions of devices. It attaches an “electronic return address” to all online requests and activity. This is called the IP address of your connection. Even the websites such as www.business-standard.com is an IP address masked behind Domain Name Service (DNS), which translates numbers into the name for internet users to navigate the web conveniently. In technical terms, Internet Protocol (IP) is the network layer communications protocol for relaying datagrams across network boundaries. Currently we are using the fourth version of Internet Protocol which is known as IPv4. Launched more than three decades ago, it has several limitations -- including its capacity to cater to billions of addresses. IPv4 is a 32 bit numeric address, written as four numbers separated by periods. Each group of numbers is called octet. It has a limit to accommodate 4.3 billion addresses. This number might look huge, but it is not. The Internet is quickly running out of addresses.  So the world is now adopting the sixth version of Internet protocol. The main difference between the IP version 4 version 6 is the length of the address. The IPv4 address is a 32-bit numeric address while IPv6 is a 128-bit hexadecimal address. Hexadecimal uses both numbers and the alphabet in the address.   IPv6 can produce 340 undecillion -- which is 340 trillion trillion trillion --addresses. So you might have guessed, it is enough for the foreseeable future. The IPv6 also addresses security shortcomings of the IPv4 by enabling end-to-end encryption. Other benefits of the new Internet Protocol include connecting with different networks simultaneously with a unique address on each network, and the ability to combine multiple enterprise networks without readdressing. India is also upgrading to Internet Protocol version 6 (IPv6). In November 2021, the Department of Telecom (DoT) released a circular revising the transition timeline, setting December 2022 as the deadline for internet service providers (ISPs) to make changes to their network as required by the latest internet protocol. The circular has set 30th June 2022 as the last date for government organisations to complete the transition to IPv6. The IPv6 clearly has many advantages over the IPv4, but upgrading to the new Internet Protocol cannot be done in a hurry simply because replacing old IPv4 equipment would be expensive and disruptive. And so, IPv4 is being slowly phased out giving way to gradual adoption of IPv6. Watch video

Melbourne AWS User Group
What's New in January 2022

Melbourne AWS User Group

Play Episode Listen Later Feb 8, 2022 66:08


In this month's episode Arjen, JM, and Guy discuss the news from January 2022. Well, everything announced after re:Invent really, but that's mostly from January. There are good announcements all over; from a new Console Home to unpronounceable instance types, but there is also some news around the podcast that's either good or bad depending on how you interpret it. Find us at melb.awsug.org.au or as @AWSMelb on Twitter. News Finally in Sydney Amazon EC2 R6i instances are now available in 8 additional regions Amazon EC2 C6i instances are now available in 10 additional regions AWS Panorama is now available in Asia Pacific (Sydney), and Asia Pacific (Singapore) AWS Resilience Hub expands to 13 additional AWS Regions AWS Direct Connect announces new location in Australia Serverless AWS Lambda now supports Internet Protocol Version 6 (IPv6) endpoints for inbound connections Amazon Virtual Private Cloud (VPC) now supports Bring Your Own IPv6 Addresses (BYOIPv6) - Old announcement mentioned in show Announcing AWS Serverless Application Model (SAM) CLI support for local testing of AWS Cloud Development Kit (CDK) AWS Lambda now supports ES Modules and Top-Level Await for Node.js 14 AWS Lambda now supports Max Batching Window for Amazon MSK, Apache Kafka, Amazon MQ for Apache Active MQ and RabbitMQ as event sources Containers Amazon EKS now supports Internet Protocol version 6 (IPv6) Amazon Elastic Kubernetes Service Adds IPv6 Networking | AWS News Blog EBS CSI driver now available in EKS add-ons in preview Amazon ECS launches new simplified console experience for creating ECS clusters and task definitions ACM Private CA Kubernetes cert-manager plugin is production ready Amazon EMR on EKS adds support for customized container images for AWS Graviton-based EC2 instances Amazon ECR adds the ability to monitor repository pull statistics Amazon ECS now supports Amazon ECS Exec and Amazon Linux 2 for on-premises container workloads EC2 & VPC Introducing Amazon EC2 Hpc6a instances New – Amazon EC2 Hpc6a Instance Optimized for High Performance Computing | AWS News Blog New – Amazon EC2 X2iezn Instances Powered by the Fastest Intel Xeon Scalable CPU for Memory-Intensive Workloads Instance Tags now available on the Amazon EC2 Instance Metadata Service Amazon EC2 On-Demand Capacity Reservations now support Cluster Placement Groups AWS Compute Optimizer makes it easier to optimize by leveraging multiple EC2 instance architectures AWS Announces New Launch Speed Optimizations for Microsoft Windows Server Instances on Amazon EC2 Amazon EC2 customers can now use ED25519 keys for authentication with EC2 Instance Connect Metrics now available for AWS PrivateLink Dev & Ops Amazon Corretto January Quarterly Updates Amazon CloudWatch Logs announces AWS Organizations support for cross account Subscriptions AWS Toolkit for JetBrains IDEs adds support for ECS-Exec for troubleshooting ECS containers AWS Systems Manager Automation now enables you to take action in third-party applications through webhooks Security AWS Secrets Manager now automatically enables SSL connections when rotating database secrets AWS announces phone number enrichments for Amazon Fraud Detector Models Announcing AWS CloudTrail Lake, a managed audit and security lake AWS Firewall Manager now supports AWS Shield Advanced automatic application layer DDoS mitigation Amazon SNS now supports Attribute-based access controls (ABAC) Amazon GuardDuty now detects EC2 instance credentials used from another AWS account Amazon GuardDuty Enhances Detection of EC2 Instance Credential Exfiltration | AWS News Blog Amazon GuardDuty now protects Amazon Elastic Kubernetes Service clusters AWS Security Hub integrates with AWS Health AWS Trusted Advisor now integrates with AWS Security Hub AWS Client VPN now supports banner text and maximum session duration Data Storage & Processing Databases AWS Migration Hub Strategy Recommendations adds support for Babelfish for Aurora PostgreSQL Now DynamoDB can return the throughput capacity consumed by PartiQL API calls to help you optimize your queries and throughput costs Amazon DocumentDB (with MongoDB compatibility) adds support for $mergeObjects and $reduce Amazon DocumentDB (with MongoDB compatibility) adds additional Geospatial query capabilities Amazon DocumentDB (with MongoDB compatibility) now offers a free trial Amazon RDS Performance Insights now supports query execution plan capture for RDS for Oracle Glue Introducing Autoscaling in AWS Glue jobs (Preview) Introducing AWS Glue Interactive Sessions and Job Notebooks (Preview) Announcing Personal Identifiable Information (PII) detection and remediation in AWS Glue (Preview) EMR Introducing real-time collaborative notebooks with EMR Studio Introducing SQL Explorer in EMR Studio Amazon EMR now supports Apache Iceberg, a highly performant, concurrent, ACID-compliant table format for data lakes Amazon EMR on EKS adds error message details in DescribeJobRun API response to simplify debugging Amazon EMR on EKS adds support for customized container images for interactive jobs run using managed endpoints Amazon EMR now supports Apache Spark SQL to insert data into and update Glue Data Catalog tables when Lake Formation integration is enabled OpenSearch Amazon OpenSearch Service (successor to Amazon Elasticsearch Service) now supports OpenSearch version 1.1 Amazon OpenSearch Service (successor to Amazon Elasticsearch Service) now supports anomaly detection for historical data Fine grained access control now supported on existing Amazon OpenSearch Service domains Redshift Announcing AWS Data Exchange for Amazon Redshift Amazon Redshift Spectrum now offers custom data validation rules Other New – Replication for Amazon Elastic File System (EFS) Amazon ElastiCache adds support for streaming and storing Redis engine logs AWS Storage Gateway management console simplifies gateway creation and management Amazon S3 File Gateway adds schedule-based network bandwidth throttling Amazon FSx for NetApp ONTAP now provides performance and capacity metrics in Amazon CloudWatch AI & ML SageMaker Amazon SageMaker Pipelines now offers native EMR integration for large scale data processing Amazon SageMaker Pipelines now supports concurrency control Amazon SageMaker JumpStart adds LightGBM and CatBoost Models for Tabular Data Amazon SageMaker Feature Store connector for Apache Spark for easy batch data ingestion Announcing SageMaker Training support for ml.g5 instances Other Amazon Kendra launches support for query language Amazon Forecast now supports AWS CloudFormation for managing dataset and dataset group resources Amazon Rekognition improves accuracy of Content Moderation for Video AWS Panorama Appliances now available for purchase on Amazon.com and Amazon Business Amazon Textract adds synchronous support for single page PDF documents and support for PDF documents containing JPEG 2000 encoded images Other Cool Stuff Now Open – AWS Asia Pacific (Jakarta) Region | AWS News Blog Announcing the new Console Home in AWS Management Console A New AWS Console Home Experience | AWS News Blog Amazon Nimble Studio launches the ability to validate launch profile configurations via the Nimble Studio console AWS Elastic Disaster Recovery now supports failback automation Amazon Interactive Video Service adds thumbnail configuration Announcing matrix routing for Amazon Location Service Amazon Location Service enables request-based pricing for all customer use cases IoT AWS IoT Device Management launches Automated Retry capability for Jobs to improve success rates of large scale deployments AWS IoT Core for LoRaWAN Launches Two New Features to Manage and Monitor Communications Between Device and Cloud AWS IoT SiteWise Edge supports new data storage and upload prioritization strategies for intermittent cloud connectivity Sponsors CMD Solutions Silver Sponsors Cevo Versent

Web3 Breakdowns
ENS: Ethereum Name Service - [Web3 Breakdowns, EP.04]

Web3 Breakdowns

Play Episode Listen Later Dec 24, 2021 71:01


This is Eric Golden, and today I'm covering Ethereum Name Service, also known as ENS. In non-technical terms, a naming service allows you to map human-readable words to computer-based numbers. Listeners are likely familiar with Domain Name Services, DNS, which translates a website name such as joincolossus.com into an Internet Protocol address. ENS is similar, but instead of mapping to an IP address, domains are mapped to Ethereum addresses. When I bought my ENS address, I assumed the use case was to rename my wallet and make it easier than memorizing a bunch of random numbers. But as you will hear on this episode, the use case goes well beyond naming a wallet.    To cover this wide-ranging topic, we called on a wide-ranging guest, Brantly Millegan, or better known as Brently.eth. We walk through the ENS backstory, why it seems to be winning over other blockchain-based naming services, and what the future may hold for ENS. There are some really interesting strategic points in this episode that listeners will appreciate. Please enjoy the conversation.  For the full show notes, transcript, and links to the best content to learn more, check out the episode page here.   -----   This episode is brought to you by Coinbase Prime. Coinbase Prime combines advanced trading, battle-tested custody, financing, and prime services in a single solution. Clients have used our comprehensive investing platform to execute some of the largest trades in the industry because we are the only publicly-traded company with experience trading and custodying crypto assets at scale. Get started with Coinbase Prime today at coinbase.com/prime.   -----   Web3 Breakdowns is a property of Colossus, LLC. For more episodes of Web3 Breakdowns, visit joincolossus.com/episodes.   Stay up to date on all our podcasts by signing up to Colossus Weekly, our quick dive every Sunday highlighting the top business and investing concepts from our podcasts and the best of what we read that week. Sign up here.   Follow us on Twitter: @Web3Breakdowns | @ericgoldenx | @patrick_oshag    Show Notes [00:02:37] - [First question] - Who he was before crypto and how he ended up there [00:04:56] - How he found his way into the ENS space  [00:05:40] - Overview of DNS and domain ownership as it exists today [00:08:48] - The Zooko triangle and how naming currently works [00:10:31] - Previous attempts at ENS and how they differ from its final form [00:14:07] - Deciding to build a system on top of the existing naming infrastructure [00:18:59] - Who has the rights under DNS to shut down domains or bad actors [00:20:59] - What you're buying when purchasing an ENS name [00:23:28] - How many years you can own your ENS name [00:24:16] - Are you renting the name or buying it [00:25:11] - Domain squatting and how they handle it today in this emergent space [00:29:21] - Why do different letters have different pricing schemes [00:30:25] - How much you can do with an ENS name [00:31:53] - Can ENS names be used as wallet addresses [00:33:18] - If he would have built it on a different blockchain if the project started today [00:35:06] - Name collisions, country domains, and working with Ethiopia  [00:40:53] - Whether or not there will be competitors in name services in the future [00:42:29] - Funding the project with grants and the capital that built ENS [00:46:47] - Forming their DAO and the responsibility of token ownership [00:48:44] - Arriving at the formula to distribute tokens to name holders [00:55:22] - Token holder influence over the project and internal voting [00:54:08] - Flipping tokens and long-term visions for the project [00:57:16] - The difference between a protocol and a product [00:58:23] - KYC, data privacy, and integrating ENS names for account logins [01:04:19] - How cautious one should be when using their name online [01:05:41] - What subdomains are and where they could take the project [01:07:36] - A future where everything on the planet is named and serialized [01:09:46] - What he's most focused on building over the next six months and next ten years

Financial Investing Radio
FIR 138: Interview - How AI Turns Your Sharing Into BUSINESS GROWTH

Financial Investing Radio

Play Episode Listen Later Dec 18, 2021 36:09


In this episode, we take a look at how AI turns your sharing into business growth. Grant Okay, welcome, everybody to another episode of ClickAI radio. So I'm very excited to have here with me today ShareThis business development leader. I think it got that right. Michael Gorman, business development leader. But before I go any further, Michael, would you introduce yourself? Michael You bet. Grant. Yeah, it's great to be here. Like you said, I oversee business development, but also product and marketing at ShareThis. I've been I've been with ShareThis for a couple of years. In that role. I have a background in data, really, data and analytics has been my passion. Also media and marketing sort of themes. I've worked for big data companies like Axiom, I've worked for an email marketing leader, digital impact, they got bought by Axiom. That's how I got there. And I've also worked for big consulting firms. And for ESPN back in the earlier days of my career. Grant Oh, wow. Could you maybe give us a play by play? I bet you could write ESPN. Interesting. Wow. Michaels It was a fun period. I was like years eight through 11 of the history of of ESPN, which, so is a fun time to be there. Grant How fun. All right. And he did some some consulting roles as well. So data and analytics, huh? Yeah. Right. All throughout all throughout the career. So what led you into this work was ShareThis what was it was the journey there? Michael Well, one thing is that, that I've worked with our CO CEO on the past, at axiom, so we knew each other, but ShareThis is a really, really special data asset. In a lot of ways, and within the world of the of the advertising that I've worked in for quite a few years. It's it was well known. So when I had an opportunity to do a little consulting for them, I jumped into it. And that led to the to the role. It's a Yeah, sure this is, you know, it's Well, shall I tell you a bit about the company? Or is that? Grant Yeah, yeah. I mean, yeah, tell me a little bit about how it got started. And its purpose and sort of the vision of it. Michael You know, well, like a lot of companies, it started with one purpose and, and things evolved a little bit over time, it, it started off in the early days of social networks, when Facebook was still a new idea and mind MySpace was, was beginning to slow down, it was with the idea of making it easy for any website to make to make it easy for their users to share content to all the social networks that they might have an interest in. And so a developer with a simple, taking, you know, taking a piece of code and pasting it on their website that they could then have sharing. We and so it was one of two or three tools that really started in those early days and became a leader in the space. We actually have a how to still maintain a trademark on that little little V on the site there. Yeah, I mean, that's what you're known for. Yeah. So it's a sign if that's there, it's a sign that sharing is you know, sharing tools are present. It's essentially the balance value for the for the publisher for the owner of the site who doesn't have to does no work to have sharing available will get some analytics as a result, sharing is valuable because it makes it attracts more people to the site new users more more content. And, and so it's it's grown up naturally. And we're, you know, so really well established. But a number of business models were tried over the years, but but about five years ago, we started focusing, moving towards being 100% about our data, is that really as a special asset, we have around 3 million publishers using us sort of our live arm 3 million now, that's been pretty stable, you know, half to three quarters and in the rest of the world, a quarter in the United States, a little biased towards English language, but we have every language in the world represented among the users on the sites. And, and so that data and and we'll talk more about this when we get into things like, you know, the the technology in the AI. Yeah, but we're really just, you know, it's like a window into what, what people are what's on people's minds? What are they looking for? What are they searching about online, and we can, you know, discern trends and also, you know, make sure that advertising is more relevant for for users. Grant So I have a question for you on that. So you've, of course, are familiar with the terminology of neuromarketing, right. And, you know, as a way of sort of tracking, how are people interacting with a site, right, and where do they go? And where do they point and click and, you know, there's organizations that look at, you know, extracting what the user is doing on the site, this feels like this starts to come into that world right that day. I mean, I don't know that it's tracking every single movement, but it's tracking, obviously, the event of I want to share something. Any thoughts on that? Michael Yeah, that's really interesting. I mean, there's a lot of different ways to make inferences about about people, we tend to focus a bit more on the on the broad, the broader picture, that the thing that's that, I mean, there's, like you say, so many choices. But the thing about online content is, it's very rich. So when a person visits a site, there's a lot of things there, there's a lot of things on the page they're looking at. And so what we've really focused on is using the page as a source of clues about what a person is interested in, we also might look at the link in and out of the page, and get a clue from, say, a search term as well, that's a that's useful, and clearly when someone shares, you know, content that's that that sort of zoned in on exactly what they care about on the page. But we've opted more for the broad picture of focusing, you know, taking all that richness and attributing some probability of interest that for you, for user to the things that are on the page. And that way we can we have just such a broad, you know, broad palette to work with. And I think also from the point of view of, of, you know, user consent and user experience, it means that what we're actually collecting is is relatively light, it's just that this user was on this page at this time. And any inference we make is not based on what he or she did, or how are their eye movement, there's no no personal collection, we just have the that event, and we get all the all the power. Grant So it's when they were there. Is it anything about how they got there? Or where are they left? Michael Yeah, exactly. We do. We do use the inbound links and outbound links when we can get them. And that sometimes, as I said, yields a search term, those can that was sort of part of the of the link the part of the information that what came with the user, you know, the referring search term or so that so there's some some useful data there as well. Grant Yeah. So so when you collect this, and then that's got to be a massive repository, I think I saw somewhere else and I'm looking at, was it three terabytes of raw data and 100 million keywords in 200 languages a day? Is that right? Michael It sounds roughly right. I haven't counted it lately. But, yeah, you're right. But But yeah, we we see about half a billion, you know, unique, what we call events, something, you know, something happened at a point in time, visits a share per day. Grant This is a grounds for, you know, a playing field for AI, right, just you have so much data. So tell me what it is you learn from it with the AI, right? What kinds of problems are you looking to solve? As you and I know, when we pursue AI, we, it would tend to be better served if we're going after a particular question or thought in mind. Now, obviously, we get surprised with AHA insights from Ai. But going intentionally after something makes a lot of sense. Can you give a scenario the kinds of things that you're looking for? Michael Well, the I would say that the theme that has worked for us so far, is to try to do is to focus on being the able to represent and reflect human interest, what are people interested in? And yeah, and so. So we, we use, and I guess where the AI comes in is that we use the latest techniques of language analysis and language modeling. So we capture all of the linguistic content on the page and then we represent it in a number of ways. What are all the prominent keywords? What are the what are the entities that are you know more that are Unusual, you know, a brand name, a celebrity name, a business name? What are the what is this page about the concept? Or what are? What are some of the concepts that accurately describe what this page is about. And then we have some standard categorization techniques are basically a taxonomy of topic interest topics that we we screen for, you know, and and it's not, it's not a yes, one of the nice things about this is it's not a, a, it's not a, it, we don't have to decide one thing, you know, we were able to say, all of the prominent keywords, and all of the interesting entities and several concepts and all the categories that this page is about. So it could be a page, it's about, you know, mountain climbing and and what shall we say? And Utah, and the, or the American West and, and road vehicles? And, you know, and beverages, you know, skiing or whatever? Right, right. Exactly. Grant Yeah, so some form of an ontology there, right, that allows you to sort of connect these together? Michael Yeah, we used a number of techniques that you said, One is, we built a custom ontology, using relative and you know, we're, we're not a huge company. So we, we try to wherever we can do something open source or free as the entry point we do that. And so we, we use some Wikipedia, it's slash DBPedia is a source for us. And, as is some Google free offerings that help us sort of the provide the raw material for building our customer ontology. We've also take great advantage of some of the latest open source language modeling tools. One is when it goes by the name of the Google released one, I forget what the what the acronym stands for, but one that's called Bert, and then more recently, one that's called Muse. Yeah, we use muse. Okay, that, that allows us to represent anything, either a word or a sentence, or the whole page as a as a set as a vector of 500 numbers. And if two pages have the same values for those 500 vectors, then they are about the same thing. Yeah, you got you have some affinity there right now, even though in practice, they might be in different languages use totally different, you know, different sets of words, but they're still about the same thing. That's, that's, that's really, for us that technology has been a real breakthrough. Because it's we've been sometimes keywords and can be very, you know, they can be false positives or No, yeah, negative. Grant I mean, there, yeah, there's nothing that governs some, you know, webpage designer to, you know, say, hey, are they using the actual right keywords? Right? Michael Yes, or even? Or even? How do you a lot of words have multiple meanings? How do you disambiguate to get the right one? Yeah. So this this, embedding technology, this Muse model helps us do that. And then Facebook is given we use a tool, they think it's called Facebook. Ai similarity search. Yeah. And both of these are open source tools, y'all you have to put in the effort and have the knowledgeable people to master their use. And that allows us because great, it's great that you've now got all these numbers you can compare, but that's a lot of numbers. That's you half a billion a day, you know, and we have we see 600 million unique pages every month. So so how do I great, I want to rank the 600 million pages to see which ones are most about skiing in Utah. Yeah, that's, you know, how do I do that quickly, and then and affordably? So fate, the Facebook tool helps us a lot with that. Grant So let me ask you a question that So so far, you've been talking about leveraging AI technologies to help you get your arms around that sheer volume of data on a daily basis and to try to extract some meaning and semantics and understanding from it. That's a good point that's on the side of ShareThis and the benefits to ShareThis. What about it from pivoted to the other side? What does it mean to it is, you know, I talk a lot with small medium organizations, how does that benefit them? What takeaways or values come over to help them through something like that? Michael Well, what the I mean, the industry that we started with, is was is advertising and programmatic online advertising as a place where we make our solution available. And so we were at this point, probably the leading source of the ability to target ads based on interest. So if if A small business were doing online display advertising and they went to Google's, if they use Google's platform or trade desk, or any of the major platforms, and they searched on, I want to find people interested in skiing in Utah, our data would be one of their choices to find that. And so it's designed to provide a broad set of individuals who in the last 30 days have shown some interest in that topic. And it could be, you know, it might be at the level of skiing, and they might, then they might, but but the nice thing about it is that we we've, I mean, it's hard, this is harder for the stats, that's what's available for the smaller business. That's, it's, it's right off the shelf, you can, you can use $1 worth or $10 worth or $100 worth if it works for you. But then on the big company side, we use some of those tools I talked about for is, well, what if, what if we don't actually have ski in Utah, we just have skiing, right? Well, we well, for an advertiser can can say, well, I need to skiing in Utah. In fact, I need to, you know, skiing in snow. But what is the alter? You know, we can create a segment using keywords and, and topics that is just about that is exactly what they need. Grant So if I were to look at maybe an advertising opportunity, leveraging, you know, this great insight that you have, does it allow me to target specific demographics, specific locations or locales? So like, you know, you're able to? Michael Absolutely, it's pretty much anything you could, I mean, because every kind of website needs sharing, we have our, our customer base, our base of publishers use our tool is pretty representative of the internet as a whole. And so if your interest is travel, we've got sites that are about, you know, traveling Las Vegas, traveling to Europe traveling to do outdoor activities, if you're interested in financial products, we can we can find things, you know, content that relates to whatever be at a mortgage or or FinTech to know. And we we represent those in about 1500 standard audiences that we distribute every day. And every day, the nice thing about our data, compared to a lot of datasets is we refresh it every day. Yeah, Michael I mean, it's every second, right? I mean, yeah, it could be, you know, people talk about real time, and we were always looking for people who've got a real time use case. But yeah, at this point, the the most frequently we refresh for a client, the customer is up by a by his hourly. Grant Oh, it's hourly, okay, that's, that's still really up to date. Yeah. I mean, if you had hourly insights on what the what's in the mind of people are the consumers that's really fresh data? Michael Yeah, yes. Yeah. Yeah, one of the areas that we that we are moving towards is trying to go beyond advertising and inform other activities like demand forecasting, you know, how much should we order for a store in a given location? Well, our data about how much interest is being shown on the products of that store, and in that store, in that area, we can sort that way, and provide that as an input. Grant That makes that makes a lot of sense. You know, there's, there's some retail organizations I've worked with with AI. And obviously, it always comes back to or not always, but most of it comes back to the supply chain, right, getting further and further left in terms of their their demand forecasting. And if they were able to understand you know, where that interest lies, it does almost gets to, oh, I know, this is a stretch in terms of language, but it's kind of a sentiment analysis, a play on that. Right. It's the ability Yeah, the ability to say I understand what the sentiment is in terms of where their interests are. And if I understood what that was, in terms of particular set of products or other things I'm offering, and I could get that further into my, into my supply chain, that would be really valuable to Yeah, Michael I mean, it's nice that you mentioned that we do we do actually score the sentiment of the content on the page. So we're sentiment is useful, either to only talk to the people who are in favor or opposed or the middle, we can we can build an audience that or provide that as a data element as well. Grant Yes. See, that's that's powerful to understand the the sentiment of the page itself, even how people are talking about it, or what they're doing, have you ever ran into the ability to use it in terms of IP tracking, right. So in other words, if there is an organization that had a certain set of IP and, and and really, yeah, they felt like oh, my IP, I've lost control my intellectual property, it's showing up in other places. Michael Oh, that's interesting. You know, I was thinking of I was thinking of the I the the IP address the Internet Protocol address. Yeah. Should have been more clear. Yeah, I'd love to answer that question. But that wasn't what you were asking. Well, yeah, answer. Oh, we'll start with intellectual property. Yeah. One sec. Regarding intellectual property? You know, we have it. Let me think about that. Let me give you the scenario. I had, one of the things I've thought about that we haven't taken on it, you know, is that is, is using using intellectual property as a data set? Yeah. If if we were to, to read to do the same kind of analysis I talked about earlier on trademarks. Yeah, it could mean be the means for discovering which, what sites were about branded products by seeing the correspondence between the trademark and the, because that's always you run into difficult How do you tell something's a brand? When is Jaguar a brand? You know? Exactly. Grant Yeah. Yeah, it's a fascinating problem. I had a company reach out to me and say, Hey, can you develop something in this area, and we did some work on that. I called it smart catch, but they were looking to protect their IP, their intellectual property, which was, we've got this corpus of information. And, and we've got others that are, you know, getting access to it and are promoting it, you know, elsewhere out into the, you know, online universe there, or metaverse. And, and I want to be able to discover, you know, when it's opportunistic, and you can use, you know, SERP and other technologies to try to find some of that stuff and do lots of scraping. But that's got its own challenges in terms of a solution. And where you've got this opportunity to listen. Right, right, to observe what people are sharing and to the to compare that against a corpus of protected material, right? Michael Kind of an intro you're giving, you're giving me a product idea. Seriously, one of the things that we've done this year, is to create what we what we call, you know, similarity scoring. So similarity, and that's gonna cause Yeah, you can literally give someone who was curious about the dispersing dispersion of intellectual property, give us a domain. Yep. And, or a, you know, the piece of content that describe their, their stuff, and we would rank our sites for which ones had it most. Right. And, you know, whatever the top 100, you know, and you know. Grant What I found interesting on that, when I built the initial piece on that was that I found that, in some of the discovery, in some cases, what I found was a foe. And in other cases, it was a friend. Exactly right. That, you know, okay, just because I found it doesn't mean it's an enemy. But, but it might be, and so you want to then notify them? Is this? Is this someone that's an ally or not? Anyway, interesting thought? Michael Because I think I think that sometimes there is a, you know, I don't know, there's a presumption that fraud detection or a bad actor detection is, is, you know, worth more, etc. But I do find that in a lot of cases, the pro cases are actually, you know, sometimes you just by suppressing something, you do more yourself more harm than good. Yeah. Yeah. Right. Right. That's another I wanted to touch on the other meaning of it. Yeah. Yeah. Now IP address. Yeah, yeah. So So an IP address is one of the four or five things that we capture for each case. And there's a lot that you can tell from an IP address, like, it can be translated into a location of origin, we approximate we resolve that to within half a mile. So that it's still relatively privacy compliant, and you know, not too revealing, but it certainly helps understand, you organize the data by where it's coming from example. And so the one use that is, has been an important one for us is business to business. So we, we have a number of the major companies that are in the business to business world license our data as one source where they're able to see people from a from an intellect Internet Protocol address that is owned by or been associated with a particular company. Oh, and then see what sites that that IP address is showing interest in? Oh, it just can be. Yeah, so it can be a signal that oh, it seems like you know, Chevron is interested in a new CRM system because they're you know, there's there's a big spike in that kind of traffic Awesome. Yeah, that's awesome. Yeah. Talk about so almost like a lead management. Yeah, solution for sure. That's, that's powerful. Yeah, to do that. that. Oh, there. Yeah. And that's yeah. And IP in general, I think the location implications are a really well, it's how I can, how we can do that demand forecasting I mentioned earlier, it's about looking at the origin of the data. Grant So some of the AI solutions that I've built take into consider location. So So in other words, okay, but in what I've been doing is more around, oh, some transaction occurred? Where was that transaction initiated? From? Oh, this, you know, here's the IP address. Okay, I know that where they are on the planet. Now, tell me what the context of what's taking place in you know, at that location? What is what's the weather like, right, what are other events that are taking place in that location? And then then use an AI to help draw inferences on, you know, to what degree are those factors affecting it? It sounds like you might be doing some similar things with that Michael I well, I think we could be a great contributor to any solution that was along those lines. I was adding that dimension of what are people looking at? What are people interacting? What topics? Are people in this location more engaged by then people in general, fascinating those comparisons? Grant Yeah, it's fascinating is okay. Very good. All right. So let me ask you on. Okay, so we've gone from the the big corpus of what you're collecting on a daily basis, or hourly, actually, hour by hour. And then we talked about the impact to, you know, maybe businesses organizations, when when is there a particular case or outcome that you feel like you could talk about some specific example where some organization used the advertising from that? What you did, and it had this sort of impact or effect on them? Do you have any sort of case study like that? Well, it's, Michael I guess that some of the ones that are coming to mind, I think, I mean, there's some of it's very straightforward. Yeah. An advertiser, like Western Union, is looking for people who want to make payments, you know, at a distance, I mean, wire wire transfers and payments, and we offer people showing interest in wire transfer, so that the simple act of being able to get your message in front of people who have recently shown interest in it is the is the, you know, it just doesn't need no explanation. We've taken that though, one of the things we did this year that I'm proud of is we were inspired by some of the events of last summer, to get more try to take a more active role and figure out what our data was good for. Beyond commercially, and, and we ended up creating a data for good part new part of our taxonomy, we call data for good. And so people interested in social justice loving people entered interested in veterans issues people wanted in. And so and those those segments, you know, have gotten are getting a growing amount of usage by advertisers who either, you know, wanting to demonstrate their commitment to the court to a cause, like, or to find or teachers or to, you know, communicate, right people who have concerns of that kind. So that's been one. Yeah. Another kind of it's, it's not in the mainstream of what we do. But we've, I think this data could be really great as a as a resource for educational institutions. So we've actually a major business school has has is testing I've taken a take taken a subsidiary six months of our data, and they're looking at using it in a project that they have to investigate unemployment. So fascinating. How could you How could you see earlier unemployment trends in a in a location or region that could help the for the process of forecasting the unemployment rate, and it sort of feed into it? Because I've, what I've, I think that lots of people govern organizations included, are somewhat frustrated by the fact that, you know, traditional means of forecasting that were invented before there were personal computers or barely work computers. Take a long time, you get to find out that 40 days after the month, what happened in the month, I love both data can be used to generate that much more quickly. Grant Yeah, Michael, that's I love how you're bringing that up. It seems like it has both the opportunities for not only the capitalistic aspects, but the altruistic aspects of this, the values and benefits that can help society and be pulled out of that. I think that's awesome. So all right. I've thrown a lot of questions at you. So let me ask you this, if you will. To direct direct my listeners to where to go to learn more, where would you send them? Michael Well, I would, I would love them to visit our site, because and in particular to, you know, to ShareThis.com, look, look at our news and our, our blogs, we we basically we publish both as you know, as a demonstration of our the value of our data. And and it's just a general service, we publish a lot of educational and informative information about trends in the economy, and, and public interest generally about how to do marketing well about trends in data. So so we we, we try to be a resource for people and I love I'd love people to visit that content, sometimes. Some of the best stuff is is not on on the nightly news. It's like putting some of it out. I could also you know, I can give you some examples. It would be fun. I go right ahead. Knowing that knowing this audience I we are getting a sense of who maybe was listening is interested in the show, I asked our team to identify some current trends. Yeah, I guess as we come to the end of 2021. Yeah. And so so we put these together. So what one is that, that, that while the world isn't, we're seeing the trend of the gradual resumption of events in person events, even though COVID continues to cycle up and down against the backdrop of COVID. So as of August, for example, 77% of advertised events were in person events, there was a period where, you know, year and a half ago, there was there, they basically no almost having anything, it was just shut down. It was virtual or nothing. That's interesting. So as we adapt, we are adapting. And so as you as you think about should I make plans for a virtual vet, should I invest in advertise? Should I invest in participating in virtual event? Yep, don't count them out. Even if you're nervous, you know, they, they're coming back steadily. Another thing, pattern we observed in finance, that again, you know, COVID is inevitably one of the backdrops to what any of us are thinking about, but people are continuing to be engaged with saving money. So, it so as you think about what, oh, you know, what is what's going on in the in the economy? As the, as virus uptake increases, as one of the things to extract is, is increased saving? And so if that's a, again, depending on your business, how that factors in if savings is your business? Yeah. When your could be good, good to you. If if, and then let's see, what's another one? Let's see. You know, we've heard a lot about supply chain issues. And you know, what, but what, if your retailer what a consumers most worried about? When and so the top concern is shortages and out of stock, and 51% a second costs, inflation and rising prices at 28%. And then staffing issues like worker shortages and strikes, 14, and last last of all shipping delays. So it's thinking about communication strategies, what's on people's minds that might make them not come to the store? That sort of thing? So I'm not surprised. Yeah, yeah. So and we're, we're putting out new new stuff of this kind every, every month in the blog. And and I firstly, look, I think we did we have Superbowl trends out, as of yesterday, I think. Grant So it's already started to build right. That's right. That's, that's amazing. So So you gather it on an hourly basis, and then you do the AI on it Michael Truthfully, truthfully, Grant, it's being gathered continuously. Okay, that's, that's what I thought, yeah, I thought we built we build it as it happens, okay. We literally, you know, record a record for each thing. That's, that's, that's filled out all the way with all the data that will that will need eventually. And then once an hour, we some or as we frequently as our we'll sum it up into a distribution and push it to someone but the most people get their get their data delivered overnight. Amazing. It's picking it up on their AWS bucket. Like Well, this is Grant Fascinating. Any final comments as we wrap up here? Michael Well, you know, I guess that I hope I've given you a sense of the I mean, AI is critical to our business. We are you know, we When we started on this track, we were about a 50 person company, we're approaching 100 person company. And so you don't have to be, you know, IBM to use AI AI to build a great business. So it's a combination of finding the right tools and a core of of talent, the right kind of talented people, and you can and and then, frankly, sustained effort over a period of years and you can build a business that is really hard to replicate, without without it, so very hard. Right. That's, that's my thought. That's, that's Grant Wonderful. Well, Michael, thank you so much for taking your time today. I appreciate you sharing your insights and guidance with us today, everyone. Thanks for joining another episode of ClickAI Radio and until next time, go get some ShareThis.com. Thank you for joining Grant on ClickAI Radio. Don't forget to subscribe and leave feedback. And remember to download your free ebook, visit ClickAIRadio.com now.  

ClickAI Radio
CAIR 57: Interview - How AI Turns Your Sharing Into BUSINESS GROWTH

ClickAI Radio

Play Episode Listen Later Dec 18, 2021 36:09


In this episode, we take a look at how AI turns your sharing into business growth. Grant Okay, welcome, everybody to another episode of ClickAI radio. So I'm very excited to have here with me today ShareThis business development leader. I think it got that right. Michael Gorman, business development leader. But before I go any further, Michael, would you introduce yourself? Michael You bet. Grant. Yeah, it's great to be here. Like you said, I oversee business development, but also product and marketing at ShareThis. I've been I've been with ShareThis for a couple of years. In that role. I have a background in data, really, data and analytics has been my passion. Also media and marketing sort of themes. I've worked for big data companies like Axiom, I've worked for an email marketing leader, digital impact, they got bought by Axiom. That's how I got there. And I've also worked for big consulting firms. And for ESPN back in the earlier days of my career. Grant Oh, wow. Could you maybe give us a play by play? I bet you could write ESPN. Interesting. Wow. Michaels It was a fun period. I was like years eight through 11 of the history of of ESPN, which, so is a fun time to be there. Grant How fun. All right. And he did some some consulting roles as well. So data and analytics, huh? Yeah. Right. All throughout all throughout the career. So what led you into this work was ShareThis what was it was the journey there? Michael Well, one thing is that, that I've worked with our CO CEO on the past, at axiom, so we knew each other, but ShareThis is a really, really special data asset. In a lot of ways, and within the world of the of the advertising that I've worked in for quite a few years. It's it was well known. So when I had an opportunity to do a little consulting for them, I jumped into it. And that led to the to the role. It's a Yeah, sure this is, you know, it's Well, shall I tell you a bit about the company? Or is that? Grant Yeah, yeah. I mean, yeah, tell me a little bit about how it got started. And its purpose and sort of the vision of it. Michael You know, well, like a lot of companies, it started with one purpose and, and things evolved a little bit over time, it, it started off in the early days of social networks, when Facebook was still a new idea and mind MySpace was, was beginning to slow down, it was with the idea of making it easy for any website to make to make it easy for their users to share content to all the social networks that they might have an interest in. And so a developer with a simple, taking, you know, taking a piece of code and pasting it on their website that they could then have sharing. We and so it was one of two or three tools that really started in those early days and became a leader in the space. We actually have a how to still maintain a trademark on that little little V on the site there. Yeah, I mean, that's what you're known for. Yeah. So it's a sign if that's there, it's a sign that sharing is you know, sharing tools are present. It's essentially the balance value for the for the publisher for the owner of the site who doesn't have to does no work to have sharing available will get some analytics as a result, sharing is valuable because it makes it attracts more people to the site new users more more content. And, and so it's it's grown up naturally. And we're, you know, so really well established. But a number of business models were tried over the years, but but about five years ago, we started focusing, moving towards being 100% about our data, is that really as a special asset, we have around 3 million publishers using us sort of our live arm 3 million now, that's been pretty stable, you know, half to three quarters and in the rest of the world, a quarter in the United States, a little biased towards English language, but we have every language in the world represented among the users on the sites. And, and so that data and and we'll talk more about this when we get into things like, you know, the the technology in the AI. Yeah, but we're really just, you know, it's like a window into what, what people are what's on people's minds? What are they looking for? What are they searching about online, and we can, you know, discern trends and also, you know, make sure that advertising is more relevant for for users. Grant So I have a question for you on that. So you've, of course, are familiar with the terminology of neuromarketing, right. And, you know, as a way of sort of tracking, how are people interacting with a site, right, and where do they go? And where do they point and click and, you know, there's organizations that look at, you know, extracting what the user is doing on the site, this feels like this starts to come into that world right that day. I mean, I don't know that it's tracking every single movement, but it's tracking, obviously, the event of I want to share something. Any thoughts on that? Michael Yeah, that's really interesting. I mean, there's a lot of different ways to make inferences about about people, we tend to focus a bit more on the on the broad, the broader picture, that the thing that's that, I mean, there's, like you say, so many choices. But the thing about online content is, it's very rich. So when a person visits a site, there's a lot of things there, there's a lot of things on the page they're looking at. And so what we've really focused on is using the page as a source of clues about what a person is interested in, we also might look at the link in and out of the page, and get a clue from, say, a search term as well, that's a that's useful, and clearly when someone shares, you know, content that's that that sort of zoned in on exactly what they care about on the page. But we've opted more for the broad picture of focusing, you know, taking all that richness and attributing some probability of interest that for you, for user to the things that are on the page. And that way we can we have just such a broad, you know, broad palette to work with. And I think also from the point of view of, of, you know, user consent and user experience, it means that what we're actually collecting is is relatively light, it's just that this user was on this page at this time. And any inference we make is not based on what he or she did, or how are their eye movement, there's no no personal collection, we just have the that event, and we get all the all the power. Grant So it's when they were there. Is it anything about how they got there? Or where are they left? Michael Yeah, exactly. We do. We do use the inbound links and outbound links when we can get them. And that sometimes, as I said, yields a search term, those can that was sort of part of the of the link the part of the information that what came with the user, you know, the referring search term or so that so there's some some useful data there as well. Grant Yeah. So so when you collect this, and then that's got to be a massive repository, I think I saw somewhere else and I'm looking at, was it three terabytes of raw data and 100 million keywords in 200 languages a day? Is that right? Michael It sounds roughly right. I haven't counted it lately. But, yeah, you're right. But But yeah, we we see about half a billion, you know, unique, what we call events, something, you know, something happened at a point in time, visits a share per day. Grant This is a grounds for, you know, a playing field for AI, right, just you have so much data. So tell me what it is you learn from it with the AI, right? What kinds of problems are you looking to solve? As you and I know, when we pursue AI, we, it would tend to be better served if we're going after a particular question or thought in mind. Now, obviously, we get surprised with AHA insights from Ai. But going intentionally after something makes a lot of sense. Can you give a scenario the kinds of things that you're looking for? Michael Well, the I would say that the theme that has worked for us so far, is to try to do is to focus on being the able to represent and reflect human interest, what are people interested in? And yeah, and so. So we, we use, and I guess where the AI comes in is that we use the latest techniques of language analysis and language modeling. So we capture all of the linguistic content on the page and then we represent it in a number of ways. What are all the prominent keywords? What are the what are the entities that are you know more that are Unusual, you know, a brand name, a celebrity name, a business name? What are the what is this page about the concept? Or what are? What are some of the concepts that accurately describe what this page is about. And then we have some standard categorization techniques are basically a taxonomy of topic interest topics that we we screen for, you know, and and it's not, it's not a yes, one of the nice things about this is it's not a, a, it's not a, it, we don't have to decide one thing, you know, we were able to say, all of the prominent keywords, and all of the interesting entities and several concepts and all the categories that this page is about. So it could be a page, it's about, you know, mountain climbing and and what shall we say? And Utah, and the, or the American West and, and road vehicles? And, you know, and beverages, you know, skiing or whatever? Right, right. Exactly. Grant Yeah, so some form of an ontology there, right, that allows you to sort of connect these together? Michael Yeah, we used a number of techniques that you said, One is, we built a custom ontology, using relative and you know, we're, we're not a huge company. So we, we try to wherever we can do something open source or free as the entry point we do that. And so we, we use some Wikipedia, it's slash DBPedia is a source for us. And, as is some Google free offerings that help us sort of the provide the raw material for building our customer ontology. We've also take great advantage of some of the latest open source language modeling tools. One is when it goes by the name of the Google released one, I forget what the what the acronym stands for, but one that's called Bert, and then more recently, one that's called Muse. Yeah, we use muse. Okay, that, that allows us to represent anything, either a word or a sentence, or the whole page as a as a set as a vector of 500 numbers. And if two pages have the same values for those 500 vectors, then they are about the same thing. Yeah, you got you have some affinity there right now, even though in practice, they might be in different languages use totally different, you know, different sets of words, but they're still about the same thing. That's, that's, that's really, for us that technology has been a real breakthrough. Because it's we've been sometimes keywords and can be very, you know, they can be false positives or No, yeah, negative. Grant I mean, there, yeah, there's nothing that governs some, you know, webpage designer to, you know, say, hey, are they using the actual right keywords? Right? Michael Yes, or even? Or even? How do you a lot of words have multiple meanings? How do you disambiguate to get the right one? Yeah. So this this, embedding technology, this Muse model helps us do that. And then Facebook is given we use a tool, they think it's called Facebook. Ai similarity search. Yeah. And both of these are open source tools, y'all you have to put in the effort and have the knowledgeable people to master their use. And that allows us because great, it's great that you've now got all these numbers you can compare, but that's a lot of numbers. That's you half a billion a day, you know, and we have we see 600 million unique pages every month. So so how do I great, I want to rank the 600 million pages to see which ones are most about skiing in Utah. Yeah, that's, you know, how do I do that quickly, and then and affordably? So fate, the Facebook tool helps us a lot with that. Grant So let me ask you a question that So so far, you've been talking about leveraging AI technologies to help you get your arms around that sheer volume of data on a daily basis and to try to extract some meaning and semantics and understanding from it. That's a good point that's on the side of ShareThis and the benefits to ShareThis. What about it from pivoted to the other side? What does it mean to it is, you know, I talk a lot with small medium organizations, how does that benefit them? What takeaways or values come over to help them through something like that? Michael Well, what the I mean, the industry that we started with, is was is advertising and programmatic online advertising as a place where we make our solution available. And so we were at this point, probably the leading source of the ability to target ads based on interest. So if if A small business were doing online display advertising and they went to Google's, if they use Google's platform or trade desk, or any of the major platforms, and they searched on, I want to find people interested in skiing in Utah, our data would be one of their choices to find that. And so it's designed to provide a broad set of individuals who in the last 30 days have shown some interest in that topic. And it could be, you know, it might be at the level of skiing, and they might, then they might, but but the nice thing about it is that we we've, I mean, it's hard, this is harder for the stats, that's what's available for the smaller business. That's, it's, it's right off the shelf, you can, you can use $1 worth or $10 worth or $100 worth if it works for you. But then on the big company side, we use some of those tools I talked about for is, well, what if, what if we don't actually have ski in Utah, we just have skiing, right? Well, we well, for an advertiser can can say, well, I need to skiing in Utah. In fact, I need to, you know, skiing in snow. But what is the alter? You know, we can create a segment using keywords and, and topics that is just about that is exactly what they need. Grant So if I were to look at maybe an advertising opportunity, leveraging, you know, this great insight that you have, does it allow me to target specific demographics, specific locations or locales? So like, you know, you're able to? Michael Absolutely, it's pretty much anything you could, I mean, because every kind of website needs sharing, we have our, our customer base, our base of publishers use our tool is pretty representative of the internet as a whole. And so if your interest is travel, we've got sites that are about, you know, traveling Las Vegas, traveling to Europe traveling to do outdoor activities, if you're interested in financial products, we can we can find things, you know, content that relates to whatever be at a mortgage or or FinTech to know. And we we represent those in about 1500 standard audiences that we distribute every day. And every day, the nice thing about our data, compared to a lot of datasets is we refresh it every day. Yeah, Michael I mean, it's every second, right? I mean, yeah, it could be, you know, people talk about real time, and we were always looking for people who've got a real time use case. But yeah, at this point, the the most frequently we refresh for a client, the customer is up by a by his hourly. Grant Oh, it's hourly, okay, that's, that's still really up to date. Yeah. I mean, if you had hourly insights on what the what's in the mind of people are the consumers that's really fresh data? Michael Yeah, yes. Yeah. Yeah, one of the areas that we that we are moving towards is trying to go beyond advertising and inform other activities like demand forecasting, you know, how much should we order for a store in a given location? Well, our data about how much interest is being shown on the products of that store, and in that store, in that area, we can sort that way, and provide that as an input. Grant That makes that makes a lot of sense. You know, there's, there's some retail organizations I've worked with with AI. And obviously, it always comes back to or not always, but most of it comes back to the supply chain, right, getting further and further left in terms of their their demand forecasting. And if they were able to understand you know, where that interest lies, it does almost gets to, oh, I know, this is a stretch in terms of language, but it's kind of a sentiment analysis, a play on that. Right. It's the ability Yeah, the ability to say I understand what the sentiment is in terms of where their interests are. And if I understood what that was, in terms of particular set of products or other things I'm offering, and I could get that further into my, into my supply chain, that would be really valuable to Yeah, Michael I mean, it's nice that you mentioned that we do we do actually score the sentiment of the content on the page. So we're sentiment is useful, either to only talk to the people who are in favor or opposed or the middle, we can we can build an audience that or provide that as a data element as well. Grant Yes. See, that's that's powerful to understand the the sentiment of the page itself, even how people are talking about it, or what they're doing, have you ever ran into the ability to use it in terms of IP tracking, right. So in other words, if there is an organization that had a certain set of IP and, and and really, yeah, they felt like oh, my IP, I've lost control my intellectual property, it's showing up in other places. Michael Oh, that's interesting. You know, I was thinking of I was thinking of the I the the IP address the Internet Protocol address. Yeah. Should have been more clear. Yeah, I'd love to answer that question. But that wasn't what you were asking. Well, yeah, answer. Oh, we'll start with intellectual property. Yeah. One sec. Regarding intellectual property? You know, we have it. Let me think about that. Let me give you the scenario. I had, one of the things I've thought about that we haven't taken on it, you know, is that is, is using using intellectual property as a data set? Yeah. If if we were to, to read to do the same kind of analysis I talked about earlier on trademarks. Yeah, it could mean be the means for discovering which, what sites were about branded products by seeing the correspondence between the trademark and the, because that's always you run into difficult How do you tell something's a brand? When is Jaguar a brand? You know? Exactly. Grant Yeah. Yeah, it's a fascinating problem. I had a company reach out to me and say, Hey, can you develop something in this area, and we did some work on that. I called it smart catch, but they were looking to protect their IP, their intellectual property, which was, we've got this corpus of information. And, and we've got others that are, you know, getting access to it and are promoting it, you know, elsewhere out into the, you know, online universe there, or metaverse. And, and I want to be able to discover, you know, when it's opportunistic, and you can use, you know, SERP and other technologies to try to find some of that stuff and do lots of scraping. But that's got its own challenges in terms of a solution. And where you've got this opportunity to listen. Right, right, to observe what people are sharing and to the to compare that against a corpus of protected material, right? Michael Kind of an intro you're giving, you're giving me a product idea. Seriously, one of the things that we've done this year, is to create what we what we call, you know, similarity scoring. So similarity, and that's gonna cause Yeah, you can literally give someone who was curious about the dispersing dispersion of intellectual property, give us a domain. Yep. And, or a, you know, the piece of content that describe their, their stuff, and we would rank our sites for which ones had it most. Right. And, you know, whatever the top 100, you know, and you know. Grant What I found interesting on that, when I built the initial piece on that was that I found that, in some of the discovery, in some cases, what I found was a foe. And in other cases, it was a friend. Exactly right. That, you know, okay, just because I found it doesn't mean it's an enemy. But, but it might be, and so you want to then notify them? Is this? Is this someone that's an ally or not? Anyway, interesting thought? Michael Because I think I think that sometimes there is a, you know, I don't know, there's a presumption that fraud detection or a bad actor detection is, is, you know, worth more, etc. But I do find that in a lot of cases, the pro cases are actually, you know, sometimes you just by suppressing something, you do more yourself more harm than good. Yeah. Yeah. Right. Right. That's another I wanted to touch on the other meaning of it. Yeah. Yeah. Now IP address. Yeah, yeah. So So an IP address is one of the four or five things that we capture for each case. And there's a lot that you can tell from an IP address, like, it can be translated into a location of origin, we approximate we resolve that to within half a mile. So that it's still relatively privacy compliant, and you know, not too revealing, but it certainly helps understand, you organize the data by where it's coming from example. And so the one use that is, has been an important one for us is business to business. So we, we have a number of the major companies that are in the business to business world license our data as one source where they're able to see people from a from an intellect Internet Protocol address that is owned by or been associated with a particular company. Oh, and then see what sites that that IP address is showing interest in? Oh, it just can be. Yeah, so it can be a signal that oh, it seems like you know, Chevron is interested in a new CRM system because they're you know, there's there's a big spike in that kind of traffic Awesome. Yeah, that's awesome. Yeah. Talk about so almost like a lead management. Yeah, solution for sure. That's, that's powerful. Yeah, to do that. that. Oh, there. Yeah. And that's yeah. And IP in general, I think the location implications are a really well, it's how I can, how we can do that demand forecasting I mentioned earlier, it's about looking at the origin of the data. Grant So some of the AI solutions that I've built take into consider location. So So in other words, okay, but in what I've been doing is more around, oh, some transaction occurred? Where was that transaction initiated? From? Oh, this, you know, here's the IP address. Okay, I know that where they are on the planet. Now, tell me what the context of what's taking place in you know, at that location? What is what's the weather like, right, what are other events that are taking place in that location? And then then use an AI to help draw inferences on, you know, to what degree are those factors affecting it? It sounds like you might be doing some similar things with that Michael I well, I think we could be a great contributor to any solution that was along those lines. I was adding that dimension of what are people looking at? What are people interacting? What topics? Are people in this location more engaged by then people in general, fascinating those comparisons? Grant Yeah, it's fascinating is okay. Very good. All right. So let me ask you on. Okay, so we've gone from the the big corpus of what you're collecting on a daily basis, or hourly, actually, hour by hour. And then we talked about the impact to, you know, maybe businesses organizations, when when is there a particular case or outcome that you feel like you could talk about some specific example where some organization used the advertising from that? What you did, and it had this sort of impact or effect on them? Do you have any sort of case study like that? Well, it's, Michael I guess that some of the ones that are coming to mind, I think, I mean, there's some of it's very straightforward. Yeah. An advertiser, like Western Union, is looking for people who want to make payments, you know, at a distance, I mean, wire wire transfers and payments, and we offer people showing interest in wire transfer, so that the simple act of being able to get your message in front of people who have recently shown interest in it is the is the, you know, it just doesn't need no explanation. We've taken that though, one of the things we did this year that I'm proud of is we were inspired by some of the events of last summer, to get more try to take a more active role and figure out what our data was good for. Beyond commercially, and, and we ended up creating a data for good part new part of our taxonomy, we call data for good. And so people interested in social justice loving people entered interested in veterans issues people wanted in. And so and those those segments, you know, have gotten are getting a growing amount of usage by advertisers who either, you know, wanting to demonstrate their commitment to the court to a cause, like, or to find or teachers or to, you know, communicate, right people who have concerns of that kind. So that's been one. Yeah. Another kind of it's, it's not in the mainstream of what we do. But we've, I think this data could be really great as a as a resource for educational institutions. So we've actually a major business school has has is testing I've taken a take taken a subsidiary six months of our data, and they're looking at using it in a project that they have to investigate unemployment. So fascinating. How could you How could you see earlier unemployment trends in a in a location or region that could help the for the process of forecasting the unemployment rate, and it sort of feed into it? Because I've, what I've, I think that lots of people govern organizations included, are somewhat frustrated by the fact that, you know, traditional means of forecasting that were invented before there were personal computers or barely work computers. Take a long time, you get to find out that 40 days after the month, what happened in the month, I love both data can be used to generate that much more quickly. Grant Yeah, Michael, that's I love how you're bringing that up. It seems like it has both the opportunities for not only the capitalistic aspects, but the altruistic aspects of this, the values and benefits that can help society and be pulled out of that. I think that's awesome. So all right. I've thrown a lot of questions at you. So let me ask you this, if you will. To direct direct my listeners to where to go to learn more, where would you send them? Michael Well, I would, I would love them to visit our site, because and in particular to, you know, to ShareThis.com, look, look at our news and our, our blogs, we we basically we publish both as you know, as a demonstration of our the value of our data. And and it's just a general service, we publish a lot of educational and informative information about trends in the economy, and, and public interest generally about how to do marketing well about trends in data. So so we we, we try to be a resource for people and I love I'd love people to visit that content, sometimes. Some of the best stuff is is not on on the nightly news. It's like putting some of it out. I could also you know, I can give you some examples. It would be fun. I go right ahead. Knowing that knowing this audience I we are getting a sense of who maybe was listening is interested in the show, I asked our team to identify some current trends. Yeah, I guess as we come to the end of 2021. Yeah. And so so we put these together. So what one is that, that, that while the world isn't, we're seeing the trend of the gradual resumption of events in person events, even though COVID continues to cycle up and down against the backdrop of COVID. So as of August, for example, 77% of advertised events were in person events, there was a period where, you know, year and a half ago, there was there, they basically no almost having anything, it was just shut down. It was virtual or nothing. That's interesting. So as we adapt, we are adapting. And so as you as you think about should I make plans for a virtual vet, should I invest in advertise? Should I invest in participating in virtual event? Yep, don't count them out. Even if you're nervous, you know, they, they're coming back steadily. Another thing, pattern we observed in finance, that again, you know, COVID is inevitably one of the backdrops to what any of us are thinking about, but people are continuing to be engaged with saving money. So, it so as you think about what, oh, you know, what is what's going on in the in the economy? As the, as virus uptake increases, as one of the things to extract is, is increased saving? And so if that's a, again, depending on your business, how that factors in if savings is your business? Yeah. When your could be good, good to you. If if, and then let's see, what's another one? Let's see. You know, we've heard a lot about supply chain issues. And you know, what, but what, if your retailer what a consumers most worried about? When and so the top concern is shortages and out of stock, and 51% a second costs, inflation and rising prices at 28%. And then staffing issues like worker shortages and strikes, 14, and last last of all shipping delays. So it's thinking about communication strategies, what's on people's minds that might make them not come to the store? That sort of thing? So I'm not surprised. Yeah, yeah. So and we're, we're putting out new new stuff of this kind every, every month in the blog. And and I firstly, look, I think we did we have Superbowl trends out, as of yesterday, I think. Grant So it's already started to build right. That's right. That's, that's amazing. So So you gather it on an hourly basis, and then you do the AI on it Michael Truthfully, truthfully, Grant, it's being gathered continuously. Okay, that's, that's what I thought, yeah, I thought we built we build it as it happens, okay. We literally, you know, record a record for each thing. That's, that's, that's filled out all the way with all the data that will that will need eventually. And then once an hour, we some or as we frequently as our we'll sum it up into a distribution and push it to someone but the most people get their get their data delivered overnight. Amazing. It's picking it up on their AWS bucket. Like Well, this is Grant Fascinating. Any final comments as we wrap up here? Michael Well, you know, I guess that I hope I've given you a sense of the I mean, AI is critical to our business. We are you know, we When we started on this track, we were about a 50 person company, we're approaching 100 person company. And so you don't have to be, you know, IBM to use AI AI to build a great business. So it's a combination of finding the right tools and a core of of talent, the right kind of talented people, and you can and and then, frankly, sustained effort over a period of years and you can build a business that is really hard to replicate, without without it, so very hard. Right. That's, that's my thought. That's, that's Grant Wonderful. Well, Michael, thank you so much for taking your time today. I appreciate you sharing your insights and guidance with us today, everyone. Thanks for joining another episode of ClickAI Radio and until next time, go get some ShareThis.com. Thank you for joining Grant on ClickAI Radio. Don't forget to subscribe and leave feedback. And remember to download your free ebook, visit ClickAIRadio.com now.  

Knowledgeable Aging Podcast
Internet Protocol Caption Telephone Service and the effects of hearing loss

Knowledgeable Aging Podcast

Play Episode Listen Later Aug 5, 2021 33:52


With more than 30 years in the audiology and hearing aid industry, Steve DeMari brings a wealth of knowledge and leadership to his position as Director of Business Development and Education. He is responsible for maintaining and growing the customer base and cultivating new relationships as well as mentoring outreach peers and account managers.Steve's passion for the industry began during his early years in Syracuse, New York, with his hard-of-hearing sister. He helped trouble shoot her hearing aids and teletypewriter, became involved with the Deaf and hard-of-hearing communities in Central New York, and volunteered with the audiology mobile unit at Rochester Hearing and Speech Center. Steve earned a master's degree in audiology from Syracuse University, then completed a clinical and research audiologist fellowship at the Department of Veterans Affairs Medical Center in Long Beach, California.Steve has served in a variety of leadership roles. Most recently, he was Vice President of Sales and Account Management and Director of Audiology for United Healthcare Hearing. Previously, he was Director of Government Services and Business Development for Phonak, Starkey, and Sivantos as well as audiologist and manager for a wide demographic of medical and private practice clinics in Los Angeles and Chicago. Under his leadership, these companies and channels enjoyed market-share rise and team growth. Steve was instrumental in launching the Universal Newborn Hearing Screening Program in Illinois.Steve is a member of the American Academy of Audiology, American Speech-Language-Hearing Association and Illinois AA. He stays highly involved in the industry through several social networks and professional blogs and continuing education within the field of Audiology.Follow Knowledgeable Aging:Facebook: https://www.facebook.com/Knowledgeable-Aging-102638398162823Twitter: https://twitter.com/KnowledgeAgingInstagram: https://www.instagram.com/knowledgeableaging/LinkedIn: https://www.linkedin.com/company/knowledgeable-aging/?viewAsMember=trueSpotify: https://open.spotify.com/show/05OHF9FkmhzCO5PDsyGfGqNewsletter: https://www.knowledgeableaging.com/newsletter/

Ethical Hacking
Routers which connect two different Internet Protocol address(I.P.)...

Ethical Hacking

Play Episode Listen Later Jun 11, 2021 8:59


hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 51 today we are discussing about Routers, now while switches operate at layer two of the OSI model by making their decisions based on MAC addresses,routers operate at layer three, making their decisions based on IP addresses.Routers are used to connect two or more network to form an internetwork. Such as when you connect your small office home office router, your internal network,out to the internet.It connects your office's network out to other office's network over the internet.Now, routers are devices that make routing decisions and they do this by using IP addresses. These layer three IP addresses are used to determine what network a particular host is on and what path the traffic should take to go across the wide area network until it reaches its destination network.Once the traffic reaches the destination network or the final router that's involved, that particular router will conduct ARP broadcast to locate the correct host on its local network and pass the traffic to it using its MAC address at the layer two which is known as that physical address.In addition to this important routing function,routers also provide us with some security functions too, access control lists or ACLs can be configured on the router's interface to control the flow of traffic into or out of a certain part of the network.ACLs are an ordered set of rules that will either permit or deny traffic based upon certain characteristics,like it's source or destination IP address,the source or destination port number associated with it and the application or service being run.Now in an effort to get past these access control lists,attackers will often conduct IP spoofing. If they can spoof the IP, they can trick the access control list to think they're on the approved list and let them in or let them out.Since routers are on the external interface for a network, they're commonly a target for attack as well. And so out of the box, routers tend to be very insecure and you need to configure them properly for security.This includes changing this like your default username and password, changing the default routing tables,and changing those default IP internal addresses.To help protect our routers and our internal networks,we use a lot of other network devices and technologies,such as firewalls, intrusion prevention systems,virtual private network connections, content filters,and access control lists.By layering all these defenses, we create a better defense in depth posture.Now, we're going to cover all of these protective devices and technologies throughout this course but for now, it's sufficient to realize that using these things helps add up our security.And that helps us to secure our routers from various attack methods.

The History of Computing
Project Xanadu

The History of Computing

Play Episode Listen Later May 13, 2021 19:00


Java, Ruby, PHP, Go. These are web applications that dynamically generate code then interpreted as a file by a web browser. That file is rarely static these days and the power of the web is that an app or browser can reach out and obtain some data, get back some xml or json or yaml, and provide an experience to a computer, mobile device, or even embedded system. The web is arguably the most powerful, transformational technology in the history of technology. But the story of the web begins in philosophies that far predate its inception. It goes back to a file, which we can think of as a document, on a computer that another computer reaches out to and interprets. A file comprised of hypertext. Ted Nelson coined the term hypertext. Plenty of others put the concepts of linking objects into the mainstream of computing. But he coined the term that he's barely connected to in the minds of many.  Why is that? Tim Berners-Lee invented the World Wide Web in 1989. Elizabeth Feinler developed a registry of names that would evolve into DNS so we could find computers online and so access those web sites without typing in impossible to remember numbers. Bob Kahn and Leonard Kleinrock were instrumental in the Internet Protocol, which allowed all those computers to be connected together, providing the schemes for those numbers. Some will know these names; most will not.  But a name that probably doesn't come up enough is Ted Nelson. His tale is one of brilliance and the early days of computing and the spread of BASIC and an urge to do more. It's a tale of the hacker ethic. And yet, it's also a tale of irreverence - to be used as a warning for those with aspirations to be remembered for something great. Or is it? Steve Jobs famously said “real artists ship.” Ted Nelson did ship. Until he didn't. Let's go all the way back to 1960, when he started Project Xanadu. Actually, let's go a little further back first.  Nelson was born to TV directory Ralph Nelson and Celeste Holm, who won an Academy Award for her role in Gentleman's Agreement in 1947 and took home another pair of nominations through her career, and for being the original Ado Annie in Oklahoma. His dad worked on The Twilight Zone - so of course he majored in philosophy at Swarthmore College and then went off to the University of Chicago and then Harvard for graduate school, taking a stab at film after he graduated. But he was meant for an industry that didn't exist yet but would some day eclipse the film industry: software.  While in school he got exposed to computers and started to think about this idea of a repository of all the world's knowledge. And it's easy to imagine a group of computing aficionados sitting in a drum circle, smoking whatever they were smoking, and having their minds blown by that very concept. And yet, it's hard to imagine anyone in that context doing much more. And yet he did. Nelson created Project Xanadu in 1960. As we'll cover, he did a lot of projects during the remainder of his career. The Journey is what is so important, even if we never get to the destination. Because sometimes we influence the people who get there. And the history of technology is as much about failed or incomplete evolutions as it is about those that become ubiquitous.  It began with a project while he was enrolled in Harvard grad school. Other word processors were at the dawn of their existence. But he began thinking through and influencing how they would handle information storage and retrieval.  Xanadu was supposed to be a computer network that connected humans to one another. It was supposed to be simple and a scheme for world-wide electronic publishing. Unlike the web, which would come nearly three decades later, it was supposed to be bilateral, with broken links self-repairing, much as nodes on the ARPAnet did. His initial proposal was a program in machine language that could store and display documents. Being before the advent of Markdown, ePub, XML, PDF, RTF, or any of the other common open formats we use today, it was rudimentary and would evolve over time. Keep in mind. It was for documents and as Nelson would say later, the web - which began as a document tool, was a fork of the project.  The term Xanadu was borrowed from Samuel Taylor Coleridge's Kubla Khan, itself written after some opium fueled dreams about a garden in Kublai Khan's Shangdu, or Xanadu.In his biography, Coleridge explained the rivers in the poem supply “a natural connection to the parts and unity to the whole” and he said a “stream, traced from its source in the hills among the yellow-red moss and conical glass-shaped tufts of bent, to the first break or fall, where its drops become audible, and it begins to form a channel.”  Connecting all the things was the goal and so Xanadu was the name. He gave a talk and presented a paper called “A File Structure for the Complex, the Changing and the Indeterminate” at the Association for Computing Machinery in 1965 that laid out his vision. This was the dawn of interactivity in computing. Digital Equipment had launched just a few years earlier and brought the PDP-8 to market that same year. The smell of change was in the air and Nelson was right there.  After that, he started to see all these developments around the world. He worked on a project at Brown University to develop a word processor with many of his ideas in it. But the output of that project, as with most word processors since - was to get things printed. He believed content was meant to be created and live its entire lifecycle in the digital form. This would provide perfect forward and reverse citations, text enrichment, and change management. And maybe if we all stand on the shoulders of giants, it would allow us the ability to avoid rewriting or paraphrasing the works of others to include them in own own writings. We could do more without that tedious regurgitation.  He furthered his counter-culture credentials by going to Woodstock in 1969. Probably not for that reason, but it happened nonetheless. And he traveled and worked with more and more people and companies, learning and engaging and enriching his ideas. And then he shared them.  Computer Lib/Dream Machines was a paperback book. Or two. It had a cover on each side. Originally published in 1974, it was one of the most important texts of the computer revolution. Steven Levy called it an epic. It's rare to find it for less than a hundred bucks on eBay at this point because of how influential it was and what an amazing snapshot in time it represents.  Xanadu was to be a hypertext publishing system in the form of Xanadocs, or files that could be linked to from other files. A Xanadoc used Xanalinks to embed content from other documents into a given document. These spans of text would become transclusions and change in the document that included the content when they changed in the live document. The iterations towards working code were slow and the years ticked by. That talk in 1965 gave way to the 1970s, then 80s. Some thought him brilliant. Others didn't know what to make of it all. But many knew of his ideas for hypertext and once known it became deterministic. Byte Magazine published many of his thoughts in 1988 called “Managing Immense Storage” and by then the personal computer revolution had come in full force. Tim Berners-Lee put the first node of the World Wide Web online the next year, using a protocol they called Hypertext Transfer Protocol, or http. Yes, the hypertext philosophy was almost a means of paying homage to the hard work and deep thinking Nelson had put in over the decades. But not everyone saw it as though Nelson had made great contributions to computing.  “The Curse of Xanadu” was an article published in Wired Magazine in 1995. In the article, the author points out the fact that the web had come along using many of the ideas Nelson and his teams had worked on over the years but actually shipped - whereas Nelson hadn't. Once shipped, the web rose in popularity becoming the ubiquitous technology it is today. The article looked at Xanadu as vaporware. But there is a deeper, much more important meaning to Xanadu in the history of computing.  Perhaps inspired by the Wired article, the group released an incomplete version of Xanadu in 1998. But by then, other formats - including PDF which was invented in 1993 and .doc for Microsoft Word, were the primary mechanisms we stored documents and first gopher and then the web were spreading to interconnect humans with content. https://www.youtube.com/watch?v=72M5kcnAL-4 The Xanadu story isn't a tragedy. Would we have had hypertext as a part of Douglas Engelbart's oNLine System without it? Would we have object-oriented programming or later the World Wide Web without it? The very word hypertext is almost an homage, even if they don't know it, to Nelson's work. And the look and feel of his work lives on in places like GitHub, whether directly influenced or not, where we can see changes in code side-by-side with actual production code, changes that are stored and perhaps rolled back forever. Larry Tessler coined the term Cut and Paste. While Nelson calls him a friend in Werner Herzog's Lo and Behold, Reveries of the Connected World, he also points out that Tessler's term is flawed. And I think this is where we as technologists have to sometimes trim down our expectations of how fast evolutions occur. We take tiny steps because as humans we can't keep pace with the rapid rate of technological change. We can look back and see a two steps forward and one step back approach since the dawn of written history. Nelson still doesn't think the metaphors that harken back to paper have any place in the online written word.  Here's another important trend in the history of computing. As we've transitioned to more and more content living online exclusively, the content has become diluted. One publisher I wrote online pieces for asked that they all be +/- 700 words and asked that paragraphs be no more than 4 sentences long (preferably 3) and the sentences should be written at about a 5th or 6th grade level. Maybe Nelson would claim that this de-evolution of writing is due to search engine optimization gamifying the entirety of human knowledge and that a tool like Xanadu would have been the fix. After all, if we could borrow the great works of others we wouldn't have to paraphrase them. But I think as with most things, it's much more nuanced than that.  Our always online, always connected brains can only accept smaller snippets. So that's what we gravitate towards. Actually, we have plenty of capacity for whatever we actually choose to immerse ourselves into. But we have more options than ever before and we of course immerse ourselves into video games or other less literary pursuits. Or are they more literary? Some generations thought books to be dangerous. As do all oppressors. So who am I to judge where people choose to acquire knowledge or what kind they indulge themselves in. Knowledge is power and I'm just happy they have it. And they have it in part because others were willing to water own the concepts to ship a product. Because the history of technology is about evolutions, not revolutions. And those often take generations. And Nelson is responsible for some of the evolutions that brought us the ht in http or html. And for that we are truly grateful! As with the great journey from Lord of the Rings, rarely is greatness found alone. The Xanadu adventuring party included Cal Daniels, Roger Gregory, Mark Miller, Stuart Greene, Dean Tribble, Ravi Pandya, became a part of Autodesk in the 80s, got rewritten in Smalltalk, was considered a rival to the web, but really is more of an evolutionary step on that journey. If anything it's a divergence then convergence to and from Vannevar Bush's Memex. So let me ask this as a parting thought? Are the places you are not willing to sacrifice any of your core designs or beliefs worth the price being paid? Are they worth someone else ending up with a place in the history books where (like with this podcast) we oversimplify complex topics to make them digestible? Sometimes it's worth it. In no way am I in a place to judge the choices of others. Only history can really do that - but when it happens it's usually an oversimplification anyways… So the building blocks of the web lie in irreverence - in hypertext. And while some grew out of irreverence and diluted their vision after an event like Woodstock, others like Nelson and his friend Douglas Englebart forged on. And their visions didn't come with commercial success. But as an integral building block to the modern connected world today they represent as great a mind as practically anyone else in computing. 

Vast Voice produced by VastSolutionsGroup.com
Tax Deductible Home Office Deductions

Vast Voice produced by VastSolutionsGroup.com

Play Episode Listen Later Mar 11, 2021 5:51


In addition to receiving a tax deduction for the portion of your home expenses that applies to your home office, these expenses for your home office are also tax deductible: 1. Phone. In order to write off your phone expenses, you'll need to separate your home line from your business line. If you're seeking a landline phone, you can score a deal for about $30 per month. However, you can also get a second line for your cell phone in order to offer you more flexibility as to when and where you take business calls. • An affordable alternative to a landline phone would be MagicJack. It costs $40 for the initial purchase of the device. And the recurring costs are $19.95 per year thereafter. MagicJack operates under VOIP (Voice over Internet Protocol); therefore you need to plug it into a computer in order to turn on the reception for your phone. • If you need more mobility, most cell phone companies allow you to add an additional line to your account for as little as $10 per month and you can share the minutes given on your primary line. 2. Internet. Whether you work strictly from home or work on your business from home during your spare time, it's highly unlikely that 100% of your internet use is strictly for work related purposes. Therefore, you won't be able to deduct your internet bill in its entirety. • Deduct your internet charges according to the percentage of its usage that is dedicated to your business use. 3. Home office furniture and equipment. You can also take deductions for your home office furniture and equipment designated for business use: • Desks, chairs, and other furniture • Filing cabinets • Computers and monitors • Laptops • Printers • Fax machines • Software you need for your business 4. Maintenance and repairs. Any maintenance and repairs strictly for your home office, such as new carpet or paint in the office space, is 100% tax deductible for your business. 5. Your child's allowance. Pay your children for keeping the home office tidy. Even a small child can dust the desk and computer! It encourages responsibility in your children and you get a tax deduction for what you pay them. • Let older children help you keep your files, papers, and receipts organized. They can even enter your daily income and expenses into your bookkeeping software. • If your child is under age 17, you can employ them without paying social security on their wages.

SecurityTrails Blog
Why Not to Set Domains to Private IPs

SecurityTrails Blog

Play Episode Listen Later Jan 21, 2021 10:01


An ounce of prevention is worth a pound of cure. **Benjamin Franklin** The concept of risk is ubiquitous across the cybersecurity landscape. In this day and age, it is difficult to envision any security-conscious organization not having alluded, hopefully more than once, to the serious consequences attached to avoiding the subject, particularly when it comes to protecting its most sensitive digital assets and personal data. These repercussions, in both monetary and non-monetary terms, can be far-reaching in the amount of damage they can cause by the resultant corporate disarray and overall loss of reputation. Thus, entire governance structures are distinctly preconditioned with the relevant identification of the digital infrastructure as well as the adequate assessment of their threat ecosystem, prior to consigning any additional items onto the risk registers. While modern businesses can't anticipate every possible threat there is, a few solutions have evolved over the years to become proficient at preventing, or altogether disallowing, the most common types of attack patterns and intrusion attempts known throughout the cyber milieu. The leading principle here is known as the information classification process, commonly assigned, in typical organizational fashion, to data owners and similar stakeholders in what is considered the initial step in the domain of business continuity planning and disaster recovery. One of these approaches entails the concept of attack surface management (ASM), an overarching methodology capable of providing real-time discovery, classification, and continuous examination of an entity's digital assets whose misconfiguration or unintended exposure may lead to a serious breach scenario. The ability of techniques such as ASM to effectively shut the door in the face of threat actors seeking to leverage even the most sophisticated attack vectors is a significant testimony to its foregoing validity and importance. This blogpost will highlight the risks associated with the use of private IP (Internet Protocol) addresses in public Domain Name System (DNS) records as they extend the possibility of a cyber attack on internal address spaces and attributed domains. It will briefly re-examine the historical prohibition set forth by RFC 1918 that sought to limit the use of these address blocks to within enterprise boundaries, as well as the unnecessary technical challenges that arise from their misuse. Let's take a look. Private IP addresses in a nutshell IP addresses long journey to present-day operations began in the 1970's when the Defense Advanced Research Projects Agency (DARPA) designed the first protocol specifications. The concept was shaped around the need to interconnect computer communication networks, called packet-switched networks, where sources and destinations were represented by hosts identified by fixed-length numerical addresses known as Internet Protocol addresses, or IPs for short. The protocol contained additional features such as the ability to fragment long datagrams to allow efficient data transmission through less capable network channels and, most importantly, an abstraction of the time-to-live (TTL) consistency mechanism to prevent data packets from circulating indefinitely. According to the standards established by the Internet Engineering Task Force (IETF), IPv4 (IP version 4) was to define a set of private address spaces (see image below) to allow an ever-depleting subset of 2 to the power of 32 possible IPs to be effectively routed as to not create ambiguity between publicly-connected enterprises. It was also IETF's decisive action that established that applications that did not require external connectivity should be confined to any one of these non-routable reserved classes without further intervention from Internet authorities. As previously mentioned, in a race to put a stopgap to the problem of IP address exhaustion, RFC 1918 became the de facto referenc...

This Week in Engineering
E-Fuels, Connected Home over Internet Protocol or CHIP, and Trends in US Manufacturing Jobs

This Week in Engineering

Play Episode Listen Later Dec 9, 2020 6:06


Learn more about the topics discussed in this video: https://new.engineering.com/story/a-call-to-action-help-specify-a-new-iot-communication-protocol (A Call to Action: Help Specify a New IoT Communication Protocol) https://new.engineering.com/story/new-report-identifies-cities-with-most-manufacturing-jobs (New Report Identifies Cities with Most Manufacturing Jobs) https://www.engineering.com/tv/thisweekinengineering (Click here to watch the latest in video.)

The BelkIoT Podcast - IoT Every
Ep #6 : Tom Raftery shares How IoT can save your Lives | Updates on Project CHIP

The BelkIoT Podcast - IoT Every "Thing" with Sai Prakash Belkeri

Play Episode Listen Later Nov 20, 2020 46:03


Tom Raftery is a Global VP for SAP, an Innovation Evangelist, Futurist, and International Keynote Speaker. On this episode, Tom shares with us his personal experiences on how IoT has made a huge difference to his Son's health. He also shares how IoT is drastically shifting the usual way of medication to a Predictive based health care system. He also shares the Key challenges and opportunities that IoT can create in the Healthcare Industry. Also, I discuss the What, Why, and When of The Project CHIP (Project Connected Home over Internet Protocol) and shared recent updates on Project CHIP. Listen Now to the Complete Episode now. ------------------------------------------------------------------------------------------ To know more Logon to our Website - https://BelkIoT.in Send us your Questions around IoT - https://BelkIoT.in/podcast Join our Community - https://BelkIoT.in/join-us Post your questions and suggestions at our Twitter - https://twitter.com/BelkIoT Instagram - https://instagram.com/belkiot Connect with Sai Prakash Belkeri LinkedIn - https://www.linkedin.com/in/belkerisaiprakash/ Twitter - https://twitter.com/belkerisai --- Send in a voice message: https://anchor.fm/belkiot/message

“That’s Myrony” (My + Irony)
Jeff Pulver is absolute proof when we take the T off Can't, we truly Can accomplish whatever we want in life!

“That’s Myrony” (My + Irony)

Play Episode Listen Later Nov 7, 2020 101:58


Jeff Pulver shares by being true to himself at the young age of 8, despite it causing great loneliness ended up being the catalyst for him to learn how to get a license with the FCC that allowed him to communicate as an amateur radio operator at age 12. The same FCC years later would issue the Pulver Order in 2004 which is the reason we all have the ability to communicate over the internet openly and freely and this is thanks to Jeff seeing the necessity from a premonition he had in a dream. Another silver lining to Jeff's early years of loneliness and his passion of amateur radio is what myronically lead him to become an Internet Pioneer in the field of Voice over Internet Protocol. The insight and wisdom Jeff shares, we felt was so important and is the reason for the length of this episode. But we truly believe once you listen you will be grateful we kept everything and be inspired to start removing the T from the can't in your lives as well. About the Guest: Jeff Pulver helped change the way the world communicates. The passing of the Pulver Order by the Federal Communications Commission (FCC) in 2004 helped set the stage for the world, where today consumers can communicate openly and freely.Jeff is an Internet Pioneer in the field of VoIP: founder of pulver.com, Co-Founder of Vonage, a number of other companies including most recently ZULAconnect. Jeff is an Entrepreneur, Investor, Oracle, Futurist, Advisor, Astrophotographer and Intuitive Healer. During 2020 Jeff has launched a number of Internet TV Talk shows including: The Conversation, The Soundtrack and Ask The Oracles. Jeff also hosts real-time passion-based networking communities known as Zula.You can also “hear” Jeff on his podcast The Almost Daily Jeff. To find out more and learn about his upcoming events visit www.pulver.comSocial Media:IG: @jeffkenipulverTwitter: @jeffpulverWikipedia: https://en.wikipedia.org/wiki/Jeff_PulverEmail: jeff.pulver@gmail.com About the Hosts:Alysha Myronuk is the creator of the fun new word of myrony (my+irony) which are the crazy coincidences that happen in life that we can't explain and is also another word for sign/synchronicity. Her life was fairly normal until she got into a car accident that triggered fibromyalgia at the age of 18 and had to deal with that very painful chronic condition along with many other life challenges including loss of both parents, marriage, divorce, suicide attempts, alcohol and prescription drug abuse and a full hysterectomy by the time she was 35. Alysha's strong spiritual connection and tenacity is what helped her through those very dark days that lead into years at times. Later she realized the reason she went through those trying times was so she could help others struggling with life's challenges and share the understanding of how to move forward.She now lives in San Jose, CA but still considers herself an East Coast girl at heart after growing up in Northern New Jersey and living in Delaware, Maryland and DC area for her entire life until she moved to California 8 years ago in 6 days which is a part of her myronic journey that helped her tap into her super power that she calls her “Spiritual Spidey Sense”. Thanks to her many careers which include hospitality & sales has allowed her to meet and work with so many different people but she is extremely excited to now be following her calling in life of sharing her concept of myrony by co-hosting “That's Myrony” Podcast (

The Private Equity Digital Transformation Show
The Thread Group – Putting Complex Tech into Everyday Devices

The Private Equity Digital Transformation Show

Play Episode Listen Later Oct 30, 2020 52:31


There are five main IoT alliances/consortiums/groups focused on the Internet of Things and I interview them all. The Internet Protocol for Smart Object (IPSO) Alliance – episode E3 has been around for a while but the Open Interconnect Consortium (OIC) – episode 9, the Thread group, the Industrial Internet Consortium (IIC) and the Allseen Alliance have sprung up recently. Depending on your focus, one or more of these organizations and are worth looking into when starting your IoT journey. In this episode of the IoT Inc Business Show, I discuss the third organization, the Thread Group, with Skip Ashton. Read the rest of the show analysis notes at: https://www.iot-inc.com/introducing-thread-group-iot-protocol-podcast/ This show is brought to you by DIGITAL OPERATING PARTNERS Related links you may find useful: Season 1: Episodes and show notes Season 1 book: IoT Inc Season 2: Episodes and show notes Season 2 book: The Private Equity Digital Operating Partner Training: Digital transformation certification

Group Practice Tech
Episode 129: [Remote Team Management] Why Internet Phone (VoIP) Is The Best Thing Ever & Why Your Practice Should Have It

Group Practice Tech

Play Episode Listen Later Oct 23, 2020 38:08


Welcome solo and group practice owners! We are Liath Dalton and Roy Huggins, your co-hosts of Person Centered Tech. In our latest episode, we’re talking about why internet phone, or VoIP (which stands for Voice over Internet Protocol), is such a useful tool to have in your toolbox. We discuss client communication between sessions, the circle of control of the practice over personal devices, keeping client data discoverable to the practice, board complaints, separating personal systems from clinical systems, preventing liability, business associate agreements, specific VoIP options that we recommend (and why!), requests for non-secure communications, why VoIP is particularly helpful for remote teams, and our upcoming CE course on working from home.  Listen here: https://personcenteredtech.com/group/podcast/ Stay tuned for future episodes! For more, visit our website. Resources:  Teletherapy From the Home or Mobile Office: HIPAA, Ethical, and Standard of Care Issues PCT CE Training (live and recorded, 1 legal-ethical CE credit hour) PCT's Group Practice HIPAA Security Programs PCT's Group Practice Teletherapy Programs  

Teorie Školy
IT: Historie výpočetní techniky a von Neumannovo schéma počítače

Teorie Školy

Play Episode Listen Later Sep 28, 2020 28:34


Historie: 1942 Konrád Zuse - počítač Zuse Z4 - zničený při náletu, 1944 Howard Aiken - Reléový počítač MARK 1 - podpora IBM, možné výpočty pro 1. atomovou bombu 1945 Pensylvánská univerzita: ENIAC (Electronic Numerical Integrator and Calculator) - 1. Elektronkový počítač 1951 - UNIVAC - 1. Sériově vyráběný počítač (nikoli však pro domácí použití) - firma Rennington, 60. - 70. Léta - sálové počítače, velké množství dat zpracováváno na zakázku, terminál: monitor + klávesnice napojeny na rozměrný počítač, herní konzole 80. Léta - osobní počítače, první mikroprocesor Intel C4004 - 1971 - první osobní počítače řady PC, 1981 IBM PC/XT 5150 , 1984 IBM PC/AT (Advanced Technology), v následujících letech rozhodující: velikost diskových kapacit, rychlost procesorů, dnes: výkon grafické karty, RAM, úložná kapacita disků, optické mechaniky - DVD, Blu-ray, nyní nahrazují cloudová úložiště, flash disky, konkurence PC: Mackintosh (Apple) POUŽITÍ POČÍTAČŮ: kancelářské aplikace, databáze, komunikace - VoIP (Voice over Internet Protocol), Grafika/ grafické systémy: GIS, CAD/CAM(Computer aided manufacturing), Řídící systémy, výzkum a vývoj, Audiovize - audiovizuální efekty, Zábava - zábavní průmysl - herní konzole, joystick, Další: tablety, smartphony JEDNOTKY 1 bit 0/1, 1 byte/bajt: 8 bitů 1kB = 1024 bytů/ bajtů, 1MB = 1024 kB, 1GB = 1024 MB, 1TB = 1024 GB, 1024 == 2^10 VON NEUMANNOVO SCHÉMA: vstupní zařízení - vstup dat, ALU (arithmetic-logic unit) - aritmeticko-logická jednotka - matematické a logické operace operační paměť - ukládání dat popř. mezivýsledků, řadič - řídí činnost všech částí počítače, vstupní zařízení - zobrazuje výstup, Dnes: ALU + Řadič = Procesor, procesor + operační paměť = CPU (Central processing unit)

Packet Pushers - Full Podcast Feed
IPv6 Buzz 060: Why the Internet Needs IPv6 – With Special Guest Vint Cerf

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Sep 18, 2020 51:17


In this week's episode Ed, Scott, Tom, and guest host Greg Ferro talk to Vint Cerf about why the Internet needs IPv6, and whether the Internet is in danger of fragmenting along political lines and the impacts of that fragmentation. Vint is Google's chief Internet evangelist and the co-creator, with Bob Khan, of the Internet Protocol.

Packet Pushers - IPv6 Buzz
IPv6 Buzz 060: Why the Internet Needs IPv6 – With Special Guest Vint Cerf

Packet Pushers - IPv6 Buzz

Play Episode Listen Later Sep 18, 2020 51:17


In this week's episode Ed, Scott, Tom, and guest host Greg Ferro talk to Vint Cerf about why the Internet needs IPv6, and whether the Internet is in danger of fragmenting along political lines and the impacts of that fragmentation. Vint is Google's chief Internet evangelist and the co-creator, with Bob Khan, of the Internet Protocol.

Packet Pushers - Full Podcast Feed
IPv6 Buzz 060: Why the Internet Needs IPv6 – With Special Guest Vint Cerf

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Sep 18, 2020 51:17


In this week's episode Ed, Scott, Tom, and guest host Greg Ferro talk to Vint Cerf about why the Internet needs IPv6, and whether the Internet is in danger of fragmenting along political lines and the impacts of that fragmentation. Vint is Google's chief Internet evangelist and the co-creator, with Bob Khan, of the Internet Protocol. The post IPv6 Buzz 060: Why the Internet Needs IPv6 – With Special Guest Vint Cerf appeared first on Packet Pushers.

Packet Pushers - IPv6 Buzz
IPv6 Buzz 060: Why the Internet Needs IPv6 – With Special Guest Vint Cerf

Packet Pushers - IPv6 Buzz

Play Episode Listen Later Sep 18, 2020 51:17


In this week's episode Ed, Scott, Tom, and guest host Greg Ferro talk to Vint Cerf about why the Internet needs IPv6, and whether the Internet is in danger of fragmenting along political lines and the impacts of that fragmentation. Vint is Google's chief Internet evangelist and the co-creator, with Bob Khan, of the Internet Protocol. The post IPv6 Buzz 060: Why the Internet Needs IPv6 – With Special Guest Vint Cerf appeared first on Packet Pushers.

Storie dal Polo Digitale
3CX, l'evoluzione del centralino telefonico

Storie dal Polo Digitale

Play Episode Listen Later Sep 11, 2020 16:14


Favorire l'innovazione e la collaborazione è l'obiettivo di tutti i progetti che intraprendiamo, per noi e per i nostri clienti. In tal senso, una risorsa utile è rappresentata da 3CX, il software telefonico di ultima generazione che consente di effettuare chiamate tramite la rete telefonica pubblica commutata o tramite i servizi di Voice over Internet Protocol.Ve ne parliamo nell'ultimo #PoloPodcast insieme a Stefano Torelli, co-founder de Il Polo Digitale, CEO di CyberLand e CTO di Seven IT.

Paul's Security Weekly TV
Ripple20: Finding Vulnerable Devices & Detecting Attacks - Jeff Costlow - BSW #184

Paul's Security Weekly TV

Play Episode Listen Later Aug 18, 2020 29:58


Jeff Costlow, Deputy CISO at ExtraHop, will discuss the challenges of detecting and patching Ripple20. Ripple 20 is a series of zero-day vulnerabilities in a widely used low-level TCP/IP software library developed by Treck, Inc. There are two primary attack vectors: Internet Protocol and Domain Name Services. Jeff will discuss ExtraHop's approach to detecting these devices and provide a quick demo of the solution.   This segment is sponsored by ExtraHop Networks. Visit https://securityweekly.com/ to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/bsw184

Business Security Weekly (Video)
Ripple20: Finding Vulnerable Devices & Detecting Attacks - Jeff Costlow - BSW #184

Business Security Weekly (Video)

Play Episode Listen Later Aug 17, 2020 29:58


Jeff Costlow, Deputy CISO at ExtraHop, will discuss the challenges of detecting and patching Ripple20. Ripple 20 is a series of zero-day vulnerabilities in a widely used low-level TCP/IP software library developed by Treck, Inc. There are two primary attack vectors: Internet Protocol and Domain Name Services. Jeff will discuss ExtraHop's approach to detecting these devices and provide a quick demo of the solution.   This segment is sponsored by ExtraHop Networks. Visit https://securityweekly.com/ to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/bsw184

a16z
What the Narrow Waist of the Internet Means for Innovation Today

a16z

Play Episode Listen Later Apr 24, 2020 40:20


Here is Ali's tweetstorm on the Narrow Waist of Blockchain Computing 

Pint Party
Pint Party 42: Just Vibin’

Pint Party

Play Episode Listen Later Mar 30, 2020 57:23


With the help of Voice over Internet Protocol, John can now finally live out his dream of recording Pint Party without the need for pants of any description. As such please bear with us as we make the adjustment from face to face to screen to screen interaction. All the extra airflow takes a little getting used to. Also suss Succulent Chinese Meal on YouTube. Talking points for this episode include:  - Contemporary Reviewing Technique - Doom Eternal - Album Recommendations - Chat Apps   Follow us! Instagram: @pint.party Twitter: @PintParty

Radio IT
NFON - La sicurezza passa anche dal centralino (meglio se virtuale)

Radio IT

Play Episode Listen Later Feb 25, 2020 4:31


NFON - La sicurezza passa anche dal centralino (meglio se virtuale) In questo podcast, realizzato in collaborazione con NFON, proviamo a capire perché un centralino telefonico virtuale conviene anche sul piano della sicurezza. Sì, ogni elemento digitale è potenzialmente un elemento che gli hacker possono sfruttare per i loro attacchi. Quindi, anche le telefonate. Quali sono gli strumenti più efficaci per proteggere il sistema VoIP (Voice over Internet Protocol) da intrusioni dannose? Scoprilo nel podcast. Buon ascolto! Altri contenuti su www.radioit.it

NFON
NFON - La sicurezza passa anche dal centralino (meglio se virtuale)

NFON

Play Episode Listen Later Feb 25, 2020 4:31


NFON - La sicurezza passa anche dal centralino (meglio se virtuale)In questo podcast, realizzato in collaborazione con NFON, proviamo a capire perché un centralino telefonico virtuale conviene anche sul piano della sicurezza. Sì, ogni elemento digitale è potenzialmente un elemento che gli hacker possono sfruttare per i loro attacchi. Quindi, anche le telefonate.Quali sono gli strumenti più efficaci per proteggere il sistema VoIP (Voice over Internet Protocol) da intrusioni dannose? Scoprilo nel podcast.Buon ascolto!Altri contenuti su www.radioit.it

La Combinaison
#14 - Fred Potter - Fondateur de Netatmo et Withings. Un grand nom des objets connectés

La Combinaison

Play Episode Listen Later Feb 23, 2020 116:23


   Dans cet épisode je reçois Fred Potter le CEO et fondateur de Netatmo, et créateur de Withings. Netatmo est un fabricant d'objets connectés (Internet of things – IOT). Fred est passionné d'informatique. Dès l'age de 13 ans, il programme. Il fait des études en micro-électronique, à Telecom ParisTech, où il passe son doctorat. 1998, c'est la déréglementation des télécoms. France Telecom n'a plus le monopole des télécoms. Très rapidement, de nombreux opérateurs se créent. Après ses études, Fred travaille chez l'un deux, dans le domaine des centraux téléphoniques. Il créé des logiciels pour la VoIP (Voice over Internet Protocol). Après 3 ans, en 1999, il décide de se lancer et crée Cirpack avec un associé : Jean-Pierre Dumolard. Très vite, il compte des clients prestigieux et importants comme Free, et tout se passe très bien, jusqu'à la bulle internet en 2000, où les clients ferment les uns derrière les autres. Cirpack est en danger. Son principal actionnaire américain décide de se retirer, et Fred et son associé lui rachètent la totalité de ses parts pour un euro. Après avoir fait le dos rond, pendant quelques mois, ils s'accrochent, et les affaires reprennent. 3 ans plus tard, ils revendent leur société à Thomson (Technicolor), pour la somme de 82 millions d'euros.  Fred travaillera quelque temps chez Thomson où il rencontre Eric Carreel, son futur associé chez Winthings. En 2008, Fred et Eric créent Withings une société spécialisée dans les objets connectés grand public. Leur premier objet sera le pèse personne connecté, puis le tensiomètre. Mais Fred ne s'entend pas avec Eric, et en 2011, quitte Withings pour lancer Netatmo. Toujours dans le domaine des objets connectés, Netatmo propose plutôt des objets utiles pour la maison, alors que Withings reste dans le domaine forme et santé. Dans l'épisode Fred Potter décrit très bien le processus de création d'un objet connecté. La recette est : 10 personnes, 2 millions d'euros d'investissement, et 2 ans de développement. Dès 2011, Fred investit 2 millions d'euros à titre personnel, puis Netatmo très prometteuse enchaine les levées de fonds : 4,5 millions en 2013, puis 30 millions en 2015. Depuis sa création, tous les objets créés par Netatmo seront primés aux CES de Las Vegas (Consumer Electronic Show). Le premier produit est la station météo. Design, facile à installer et à utiliser, Netatmo soigne tous les détails pour que l'expérience utilisateur soit unique. Fred explique, pour qu'un produit se vende bien, il faut que tous les ingrédients soient réunis : produit de qualité, design, ergonomie, facilité d'installation et d'utilisation, packaging, déballage, application… Dans la lancée, Netatmo lance des caméras de surveillance Présence et Welcome avec une révolution : la reconnaissance faciale. Comme je l'explique dans l'épisode, je suis équipé personnellement, et je reconnais que les produits Netatmo marchent très bien. 2018, Fred cède sa société au géant Legrand, qui cherche à étendre sa gamme d'objets connectés. Fred nous explique son choix : Legrand était déjà au capital de Netatmo. La collaboration se passait très bien, et Fred confirme que son choix était donc naturel. Aujourd'hui il est CTO (Chief Technical Officer) chez Legrand, mais reste aux commandes de Netatmo. La gamme s'étend avec les produits Legrand, comme un tableau électrique connecté, par exemple. Plus généralement, dans l'épisode Fred nous parle de l'objet connecté, du marché chinois, de ses concurrents, des difficultés à concevoir un objet, et de l'avenir. A titre personnel, il est investisseur dans des sociétés comme Ledger, Qonto, Numworks, et a créé un fonds d'aide aux étudiants avec sa femme Anne. Nous terminons comme à l'accoutumée par des questions personnelles, sur sa façon de travailler, son organisation dans la semaine, ses passions. Bonne écoute

The History of Computing
A Brief History Of Cisco

The History of Computing

Play Episode Listen Later Jan 30, 2020 18:19


The History Of Cisco Welcome to the History of Computing Podcast, where we explore the history of information technology. Because understanding the past prepares us to innovate (and sometimes cope with) the future! Today we're going to talk about the history of Cisco. They have defined the routing and switching world for decades. Practically since the beginning of the modern era. They've bought companies, they've grown and shrunk and grown again. And their story feels similar in many ways to the organizations that came out of the tail end of the grants tossed around by DARPA. These companies harnessed the incredibly innovative ideas and technology to found the companies who commercialized all of that amazing research and changed the world. These companies ushered in a globally connected network, almost instantaneously transmitting thoughts and hopes and dreams and failures and atrocities. They made money. Massive, massive truckloads of money. But they changed the world for the better. Hopefully in an irrevocable kind of way. The Cisco story is interesting because it symbolizes a time when we were moving from the beginnings of the Internet. Stanford had been involved in ARPAnet since the late 60s but Vint Cerf and Bob Kahn had been advancing TCP and IP in the 70s, establishing IPv4 in 1983. And inspired by ALOHAnet, Bob Metcaffe and the team at Xerox PARC had developed Ethernet in 74. And the computer science research community had embraced these, with the use of Email and time sharing spurring more and more computers to be connected to the Internet. Raw research being done out of curiosity and to make the world a better place. The number of devices connected to the growing network was increasing. And Stanford was right in the center of it. Silicon Valley founders just keep coming out of Stanford but this one, they were professors, and early on. They invented the multi-protocol router and finance the startup with their own personal credit cards. Leonard Bosack and Sandy K. Lerner are credited for starting Cisco, but the company rose out of projects to network computers on the Stanford campus. The project got started after Xerox PARC donated some Alto workstations and Ethernet boards they didn't need anymore in 1980, shortly after Metcaffe left Xerox to start 3COM. And by then Cerf was off to MCI to help spur development of the backbones faster. And NSFnet came along in 1981, bringing even more teams from universities and private companies into the fold. The Director of Computer Facilities, Ralph Gorin, needed to be able to get longer network cables to get even more devices connected. He got what would amount to a switch today. The team was informal. They used a mother board from Andy Bechtolsheim, later the founder of Sun Microsystems. They borrow boards from other people. Bosack himself, who had been an ARPAnet contributor, donated a board. And amongst the most important was the software, which William Yeager wrote, which had a little routing program that connected medical center computers to the computer science department computers and could use the Parc Universal Packet (PUP), XNS, IP and CHAOSNet.. The network linked any types of computers, from Xerox Altos to mainframes using a number of protocols, including the most important for the future, IP, or the Internet Protocol. They called it the Blue Box. And given the number of computers that were at Stanford, various departments around campus started asking for them, as did other universities. There were 5,000 computers connected at Stanford by the time they were done. Seeing a potential business here, Bosack, then running the computers for the Computer Science department, and Lerner, then the Director of Computer Facilities for the Graduate School of Business, founded Cisco Systems in 1984, short for San Francisco, and used an image of the Golden Gate Bridge a their logo. You can see the same pattern unfold all over. When people from MIT built something cool, it was all good. Until someone decided to monetize it. Same with chip makers and others. By 1985, Stanford formally started a new project to link all the computers they could on the campus. Yeager gave the source to Bosack and Kirk Lougheed so they could strip out everything but the Internet Protocol and beef that up. I guess Yeager saw routers as commercially viable and he asked the university if he could sell the Blue Box. They said no. But Bosack and Lougheed were plowing ahead, using Stanford time and resources. But Bosack and Lerner hadn't asked and they were building these routers in their home and it was basically the same thing as the Blue Box, including the software. Most of the people at Stanford thought they were crazy. They kept adding more code and logic and the devices kept getting better. By 1986, Bosack's supervisor Les Earnest caught wind and started to investigate. He went to the dean and Bosack was given an ultimatum, it was go the wacky Cisco thing or stay at Stanford. Bosack quit to try to build Cisco into a company. Lougheed ran into something similar and quit as well. Lerner had already left but Greg Satz and Richard Troiano left as well, bringing them up to 5 people. Yeager was not one of them, even though he'd worked a lot on the software, including on nights and weekends. But everyone was learning and when it was to benefit the university, it was fine. But then when things went commercial, Stanford got the lawyers involved. Yeager looked at the code and still saw some of his in there. I'm sure the Cisco team considered that technical debt. Cisco launched the Advanced Gateway Server (AGS) router in 1986, two years after the Mac was released. The software was initially written by Yeager but improved by Bosack and Lougheed, as the operating system, later called Cisco IOS. Stanford thought about filing a criminal complaint of theft but realized it would be hard to prosecute, and ugly especially given that Stanford itself is a non-profit. They had $200,000 in contracts and couldn't really be paying all this attention to lawsuits and not building the foundations of the emerging Internet. So instead they all agreed to license the software and the imprint of the physical boards being used (known as photomasks), to the fledgling Cisco Systems in 1987. This was crucial as now Cisco could go to market with products without the fear of law suits. Stanford got discounts on future products, $19,300 up front, and $150,000 in royalties. No one knew what Cisco would become so it was considered a fair settlement at the time. Yeager, being a mensch and all, split his 80% of the royalties between the team. He would go on to give us IMAP and Kermit, before moving to Sun Microsystems. Speaking of Sun, there was bad blood between Cisco and Stanford, which I always considered ironic given that a similar thing happened when Sun was founded in some part, using Stanford intellectual property and unused hardware back in 1982. I think the difference is trying to hide things and being effusive with the credit for code and inventions. But as sales increased, Lougheed continued to improve the code and the company hired Bill Graves to be CEO in 1987 who was replaced with John Mordridge in 1988. And the sales continued to skyrocket. Cisco went public in 1990 when they were valued at $224 million. Lerner was fired later that year and Bosack decided to join her. And as is so often the case after a company goes public, the founders who had a vision of monetizing great research, were no longer at the startup. Seeing a need for more switching, Cisco acquired a number of companies including Grand Junction and Crescendo Communications which formed like Voltron to become the Cisco Catalyst, arguably the most prolific switching line in computing. Seeing the success of Cisco and the needs of the market, a number of others started building routers and firewalls. The ocean was getting redder. John Mays had the idea to build a device that would be called the PIX in 1994 and Branley Coile in Athens, Georgia programmed it to become a PBX running on IP. We were running out of IP addresses because at the time, organizations used public IPs. But NAT was about to become a thing and RFC 1918 was being reviewed by the IETF. They brought in Johnson Wu and shipped a device that could run NAT that year, ushering in the era of the Local Area Network. John T. Chambers replaced Mordridge in 1995 and led Cisco as its CEO until 2015. Cisco quickly acquired the company and the Cisco PIX would become the standard firewall used in organizations looking to get their computers on the Internets. The PIX would sell and make Cisco all the monies until it was replaced by the Cisco ASA in 2008. In 1996, Cisco's revenues hit $5.4 billion, making it one of Silicon Valley's biggest success stories. By 1998 they were up to $6B. Their stock peaked in 2000. By the end of the dot-com bubble in the year 2000, Cisco had a more than $500 billion market capitalization. They were building an industry. The CCNA, or Cisco Certified Network Associate, and CCNE, Cisco Certified Network Engineer were the hottest certifications on the market. When I got mine it was much easier than it is today. The market started to fragment after that. Juniper came out strong in 1999 and led a host of competitors that landed in niche markets and expanded into core markets. But the ASA combined Cisco's IPS, VPN concentration, and NAT functionality into one simpler box that actually came with a decent GUI. The GUI seemed like sacrilege at the time. And instead of sitting on top of a network operating system, it ran on Linux. At the top end they could handle 10 million connections, important once devices established and maintained so many connections to various services. And you could bolt on antivirus and other features that were becoming increasingly necessary at various layers of connectivity at the time. They went down-market for routing devices with an acquisition of Linksys in 2003. They acquired Webex in 2007 for over $3 billion dollars and that became the standard in video conferencing until a solid competitor called Zoom emerged recently. They acquired SourceFire in 2013 for $2.7B and have taken the various services offered there to develop Cisco products, such as the anti-virus to be a client-side malware scanning tool called Cisco AMP. Juniper gave away free training unlike the Cisco training that cost thousands of dollars and Alcatel-Lucent, Linksys, Palo Alto Networks, Fortinet, SonicWall, Barracuda, CheckPoint, and rising giant Huawei led to a death by a thousand competitors and Cisco's first true layoffs by 2011. Cisco acquired OpenDNS in 2015 to establish a core part of what's now known as Cisco Umbrella. This gives organizations insight into what's happening on increasingly geographically distributed devices; especially mobile devices due to a close partnership with Apple. And they acquired Broadsoft in 2017 to get access to even more sellers and technology in the cloud communication space. Why? Because while they continue to pump out appliances for IP connectivity, they just probably can't command a higher market share due to the market dynamics. Every vendor they acquire in that space will spawn two or more new serious competitors. Reaching into other spaces provides a more diverse product portfolio and gives their sellers more SKUs in the quiver to make quotas. And pushes the world forward with newer concepts, like fog computing. Today, Cisco is still based in San Jose and makes around $50 billion a year in revenue and boasts close to 75,000 employees. A lot has happened since those early days. Cisco is one of the most innovative and operationally masterful companies on the planet. Mature companies can have the occasional bumps in the road and will go through peaks and valleys. But their revenues are a reflection of their market leadership, sitting around 50 billion dollars. Yes, most of their true innovation comes from acquisitions today. However, the insights on whom to buy and how to combine technologies, and how to get teams to work well with one another. That's a crazy level of operational efficiency. There's a chance that the Internet explosion could have happened without Cisco effectively taking the mantle in a weird kind of way from BBN for selling and supporting routing during the storm when it came. There's also a chance that without a supply chain of routing appliances to help connect the world that the whole thing might have tumbled down. So consider this: technological determinism. If it hadn't of been Cisco, would someone else have stepped up to get us to the period of the dot com bubble? Maybe. And since they made so much money off the whole thing I've heard that Cisco doesn't deserve our thanks for the part they played. But they do. Without their training and appliances and then intrusion prevention, we might not be where we are today. So thank you Cisco for teaching me everything I know about OSI models and layers and all that. And you know… helping the Internet become ubiquitous and all. And thank you, listener, for tuning in to yet another episode of the history of computing podcast. We are so very lucky to have you. Have a great day!

CRYPTO 101
Ep. 291 - Beating Big Brother and Banks with Blockchain, w/ Celsius Network CEO Alex Mashinsky

CRYPTO 101

Play Episode Listen Later Dec 16, 2019 55:52


In this episode of CRYPTO 101, brought to you by eToro, we sit down with Alex Mashinsky, CEO and founder of Celsius Network, the preeminent crypto lending and borrowing platform. Celsius Network lets you earn interest on your crypto and instantly borrow against it and never charges a fee. In this episode, we do a deep dive on the mechanics at play when interest rates are determined, how the Federal Reserve really works, his vision for the future of banks, and where he sees the industry going in the next few years. Alex invented VoIP (Voice over Internet Protocol), which is the technology underpinning applications like Zoom and Skype. He shares stories from that time of his life, and how telecoms reacted to the technology. He sees lots of parallels with the current revolution happening in the blockchain industry, coining a new term: MoIP (Money over Internet Protocol). Sponsored link: http://etoro.com/crypto101 Guest Links: https://celsius.network/ https://twitter.com/Mashinsky https://twitter.com/CelsiusNetwork Show Links: https://www.CRYPTO2020summit.com https://CRYPTO101podcast.com Patreon: www.patreon.com/user?u=8429526 Social: https://twitter.com/Crypto101Pod https://twitter.com/BrycePaul101 https://twitter.com/PizzaMind https://instagram.com/crypto_101 https://www.facebook.com/groups/101Crypto https://www.facebook.com/CRYPTO101Podcast **THIS IS NOT FINANCIAL OR LEGAL ADVICE** © Copyright 2019 Boardwalk Flock, LLC All Rights Reserved ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ Fog by DIZARO https://soundcloud.com/dizarofr Creative Commons — Attribution-NoDerivs 3.0 Unported — CC BY-ND 3.0 Free Download / Stream: http://bit.ly/Fog-DIZARO Music promoted by Audio Library https://youtu.be/lAfbjt_rmE8 ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬Advertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

CRYPTO 101: with Matthew Aaron
Ep. 291 - Beating Big Brother and Banks with Blockchain, w/ Celsius Network CEO Alex Mashinsky

CRYPTO 101: with Matthew Aaron

Play Episode Listen Later Dec 16, 2019 55:52


In this episode of CRYPTO 101, brought to you by eToro, we sit down with Alex Mashinsky, CEO and founder of Celsius Network, the preeminent crypto lending and borrowing platform. Celsius Network lets you earn interest on your crypto and instantly borrow against it and never charges a fee. In this episode, we do a deep dive on the mechanics at play when interest rates are determined, how the Federal Reserve really works, his vision for the future of banks, and where he sees the industry going in the next few years. Alex invented VoIP (Voice over Internet Protocol), which is the technology underpinning applications like Zoom and Skype. He shares stories from that time of his life, and how telecoms reacted to the technology. He sees lots of parallels with the current revolution happening in the blockchain industry, coining a new term: MoIP (Money over Internet Protocol). Sponsored link: http://etoro.com/crypto101 Guest Links: https://celsius.network/ https://twitter.com/Mashinsky https://twitter.com/CelsiusNetwork Show Links: https://www.CRYPTO2020summit.com https://CRYPTO101podcast.com Patreon: www.patreon.com/user?u=8429526 Social: https://twitter.com/Crypto101Pod https://twitter.com/BrycePaul101 https://twitter.com/PizzaMind https://instagram.com/crypto_101 https://www.facebook.com/groups/101Crypto https://www.facebook.com/CRYPTO101Podcast **THIS IS NOT FINANCIAL OR LEGAL ADVICE** © Copyright 2019 Boardwalk Flock, LLC All Rights Reserved ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ Fog by DIZARO https://soundcloud.com/dizarofr Creative Commons — Attribution-NoDerivs 3.0 Unported — CC BY-ND 3.0 Free Download / Stream: http://bit.ly/Fog-DIZARO Music promoted by Audio Library https://youtu.be/lAfbjt_rmE8 ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

Inbound Success Podcast
Ep. 119: Category Design As a Marketing Strategy Ft. John Rougeux

Inbound Success Podcast

Play Episode Listen Later Dec 2, 2019 52:22


How do you market a company that is selling something fundamentally new and different? This week on The Inbound Success Podcast, John Rougeux of Flag & Frontier talks about category design. It's not a tactic for every company, but when used strategically, category design can drive truly remarkable marketing results. John digs into who category design is right for, how long it takes, what a category design go-to-market plan looks like, and how to gain organizational support. He also shares examples of companies and marketers who've successfully created new categories. Highlights from my conversation with John include: John is an experienced category designer who has also owned and exited a business. He says that compared to traditional inbound marketing strategies, category design requires a much larger lift when it comes to educating the market. Every business has a choice to either compete in an existing market or create a new market.  If you're creating a new category, you have three choices: 1) try to fit your product within an existing category; 2) ignore category in your marketing and focus on the product's features and benefits; or 3) create a new category. John says options 1 and 2 don't work. When considering whether category design is right for you, you need to honestly evaluate your product and determine whether its simply a niche within an existing category or something that has truly never been offered before. If its the latter, then category design is really the only logical solution. Category design takes time. John says you should expect to spend six to nine months just designing the category behind the scenes, and then once you roll that out publicly, it can take another few years before it really takes hold. Category design needs to be a business initiative, not simply a marketing strategy, because it affects product roadmaps, sales and more. When executing a category design strategy, it is critical to focus marketing messaging on the problem that your audience is experiencing and the outcomes that they will experience as a result of your solution rather than how the product itself actually works. The companies that have been most successful at category design have evangelists whose job it is to go to market and talk about the problem and why there is a new solution. Its also important to build a consistent conversation around your new category. That might mean holding a big event (like HubSpot's INBOUND or Drift's HYPERGROWTH) or building a community, like Terminus's FlipMyFunnel.  If your company is venture-backed, it is also important to get your investors on board with the idea of category creation so that you have the funding to support the strategy. There are examples of category design all around us. Some of the bigger and more visible ones are minivans and music streaming services. The category wasn't created overnight, and in many cases, people don't even realize its a new category, but we see it is as fundamentally different from the status quo, and that is what successful category design looks like.  Resources from this episode: Visit the Flag & Frontier website Email John at John@FlagandFrontier.com  Visit John's personal website Purchase a copy of Play Bigger Listen to the podcast to learn more about category design, when it makes sense, and how you can use it to dramatically improve your marketing results. Transcript Kathleen Booth (Host): Welcome back to the Inbound Success Podcast. I'm your host, Kathleen Booth. And this week, my guest is John Rougeux, who is the founder at Flag & Frontier. Welcome, John. John Rougeux (Guest): Hey, Kathleen. Thanks for having me on. John and Kathleen recording this episode. Kathleen: Yeah. I'm really excited to have you here for completely selfish reasons. I am deep, deep into the weeds, trying to learn everything I can right now about category creation because it's something that I'm kind of working on for a little project at work. And I stumbled across your name. I think it was in a LinkedIn post mentioned by Sangram Vajre at Terminus, and he mentioned you as somebody who's doing a lot of work on category creation. And I immediately thought, oh, I need to have him in on the podcast. And here you are. I am so excited, so welcome. John: Thanks. Thanks. I actually want to come back to something that you said a minute ago. You mentioned this was a little project for you, so I'm going to pick your brains about why it's not a big project. Kathleen: I think I might just be downplaying it. John: Okay, all right. Kathleen: It's a huge project. John: All right. Kathleen: Yes, yes. It is a giant. In fact, it's probably bigger than I think it is. No, it's- John: Well, Sangram told me a few weeks ago. He said, "If you're not doing something that scares you a little bit, then you're not setting your sights high enough." So I think you're on the right track there. Kathleen: Yeah, no, I think my whole career has been a succession of choices that consistently terrify me. So hopefully, that means I'm on the right track to somewhere. So you have an interesting story. You started out or your career really grew in B2B tech, and you worked in some companies that were looking at category creation as a potential strategy and it seems that that wet your appetite and led you to where you are today. Can you just talk a little bit about your background and how it got you to where you are now and what you're doing now with Flag & Frontier? About John Rougeux and Flag & Frontier John: Yeah. Yeah, happy to. So the thing that I like to tell people is that I always wish that I knew about category design earlier in my marketing career. I think it would have helped me be more successful and make better choices and think through the strategy of what I was working on at the time a lot more thoroughly. So the reason I say that is in 2013, I co-founded a company called Causely. And I won't get too far down into the weeds of what Causely does and the business model, but we were basically using cause marketing as a way to incentivize people to take action. And specifically, we were looking at incentivizing referrals on social media. And at the time, I was looking at marketing through a fairly narrow lens, like a lot of people do maybe when they are kind of earlier in the middle of their marketing careers. We were looking at things like you know how do you improve the performance of an advertising campaign? How can you write a better better blog post? All of those kind of tactical things. And I didn't realize at the time that what we were doing was something categorically new. People didn't have context for what that meant, what they should compare it to, what value they should expect, what things should it replace or not replace? And so we had a reasonable trajectory. We scaled the business to a few thousand locations. It was acquired. But when looking back on it, I know that if we had had this lens of category design of how do you describe something when it's different than anything else out there, I think we could have gone even further. And so when I joined a company called Skyfii in 2018, I had started to kind of understand what that meant, so I had read Play Bigger. I read some, the works by Al Ries and Jack Trout that talk about how if you can't be first in a category, design any category you can be first in. And at Skyfii, that business, it's a publicly-traded SaaS company out of Australia and they found that they were participating in a fairly commoditized space. Or I guess to be more accurate, the perception was that they were a competitor in a fairly commoditized space. And their business had evolved past that and the product did all sorts of other things that were much bigger than the category the market thought they participated in, but they didn't really have a framework for talking about that. And so we went through a repositioning exercise where we defined a new category that better reflected what they were all about and and how people should kind of relate to that. And that was a really, I think, powerful and challenging exercise to think through.We've got something new in the market, but how do we describe that? How do we tell the right story? How do we tell the right narrative so that people know how to relate to it? Why category design is a fundamentally different approach to marketing Kathleen: This is so interesting to me. There's so much I want to unpack here. I guess, starting with something that you kind of started with, which is that there is this typical marketer's playbook, right, where people come in and they think, "Oh, we need to top, middle, and bottom of the funnel. We need to create content and attract people," this and that. And when it comes to category creation or trying to market something that is different than anything else people are used to, that playbook doesn't really work. Because as I'm quickly learning, especially looking just at the top of the funnel, traditional top of the funnel marketing, it's like well what is that problem that people are having and they start to look for a solution. And the challenge you have is that if the solution you're offering is something they've never heard of, it's such a steeper climb to try and gain their attention. It's like they don't know the right questions to ask even, if that makes sense. John: No, that's absolutely right. And I always like to mention a really thoughtful post that Mike Volpe, the founding CMO of HubSpot wrote a few years ago because it lays such a great groundwork for any discussion around category design. And the blog post simply says that look, every marketer has two choices on their strategy. They can pick an existing category and try to carve out a niche within that category. Maybe they can dominate that category. But basically, they have to pick a space and then do the best they can within that space. Or they can try to design a new category. And when you look at kind of the underlying product or business model and you really take a close examination of what it is and whether it's different or whether it's something better, you almost don't have a choice. If you're doing something that is new that people don't have a framework for, you really have three choices. So I want to pack these for you. So choice number one is you can try to shoehorn this new thing you've built into an existing category. And we'll come back to why that doesn't work in a second. Number two is you can just talk about the products, like features and benefits but not really think about a more underlying narrative for that. And then number three is you can design a new language, a new framework, which is called category design. And so here's why number one and number two don't work. So again, number one is if you try to shoehorn something new into an existing category. The reason that works against you is that people will make the wrong comparisons for what you're supposed to do, how you're supposed to be priced, how you deliver value. That just works against you. Secondly, if you just try to talk about the product itself but don't provide a larger context, you're not giving people, you're not giving them really any framework, and it makes it difficult to understand what you're all about and why they should be interested in you. I'll give you a great example. A friend of mine works at a company and I won't mention the name of the company, but they combine two different categories kind of in an existing platform. So one of these is VoIP, Voice over Internet Protocol communication software, very established, known space. The other thing they do is they have these marketing automation functions that they add to their software to at least in my view very disparate types of software, but they combine them together. And so far, they haven't really given their buyers a context, a category for what this thing means. And so they're basically letting people to their own devices to understand and come up with their own conclusions about what that is. And that just puts a lot of work on your buyers when they have to think about who they should compare you to when they need to think about what department is this even for, or what products does this replace or not replace? That's generally too much work for people when they're trying to understand something new. And like you said, Kathleen, if you're not telling them what questions they should ask, then chances are they're just going to be too confused before they'll even really be interested in having a conversation with you. Kathleen: Yeah, and there's two other aspects to what you just said that I think are really interesting, which I'm beginning to appreciate more with the work that I'm doing. One is that human nature is such that people want to slot you into something that they already understand. They don't want to have to think outside the box. So when people hear about something new, that their natural inclination is to try and categorize it in with things that they already know. And that's a hard thing to battle because you are literally battling human nature. And the second thing is if you do allow yourself to be put into a category that already exists that maybe isn't really truly what you're doing and you are actually successful in selling your product, you will wind up having a lot of problems with churn once you do sell it because people are still going to be thinking that you are like that other thing that you're not actually like. And they're going to be looking for your product or your service or whatever it is to solve for them in the same way that other thing does, when in reality your thing does not solve those problems. So it's like you're setting yourself up for a very long horizon of failures that you might not see at the outset, but it's kind of a you're failing before you've even begun. John: Yeah, that's a great point. And yeah, people do... They tend to... The world is so complicated, and there's so many things that we have to deal with and try to understand that we use this rule of thumb of categorizing things. Sometimes we do it explicitly, like smartphones are a great example of a category we all know about and buy them and we know why they're different than a mobile phone. Sometimes we just do it implicitly. We don't necessarily have the language or the terms to describe that category, but we know that we try to group likes things together because it makes it easier to understand the world. Kathleen: Yeah or we use analogies. So many times, you hear things like, "Well, that's just the Uber of," and then they list a different industry. Or, "That's the Airbnb of something else." John: Yeah, that's right. Kathleen: And so we're constantly trying to put these things into comfortable mental frameworks, which I think is fascinating. So you mentioned there were three things. The first two, I think you covered. And then the third is really designing a new category. John: The third is designing a new category. That's right. That's right. When does category design make sense? Kathleen: So how do you know... I guess the first question is how do you know when that's the path you should be taking? John: That's a great question because I've heard from some people that they have this idea that every company should try to design a category, and that's really not the case. It applies to some companies. But for many other companies, like if you're developing a CRM, a better version of a CRM, don't try to build a new category around that. So yes, so the way you would look at that is there's no formula you can put into Excel and calculate and churn all this out, but it really comes down to does the thing that you've built, does it solve a problem that has not been solved before? Or does it do so in a way that the world isn't familiar with? So is there a new business model behind that? Is there a new delivery mechanism behind that? It really comes down to those two things. And maybe if you want to look at it at a more fundamental level, you could ask yourself do the existing categories that my market is familiar with, do they accurately capture the type of thing that I'm offering? If they do, then one of the reasons you may want to choose to carve out a niche in an existing category is that people are looking for established products in established categories. People are looking for marketing automation software, they're looking for smartphones, they're looking for video communications tools like Zoom, like we're using today. And so, if you say, "Hey, we have the right tool within this category for this specific market or for this specific need," that can be very powerful. And arbitrarily forcing yourself out of that category just because you like that idea of category design is going to work against you. Now, that being said, again to kind of flip it around, if you find that the categories and the language that are used to describe existing products your market is familiar with just don't capture what you're doing or they limit it in some way, then ultimately you need to find a way to break out from that and that's what the process of category design is all about. What does it take to create a new category? Kathleen: Now, one of the things that I've come to appreciate just the more I look at this is what a big lift creating a category is. As you said in the beginning, this isn't a little project, right? I would love it if you could just talk a little bit about sort of expectation setting. If somebody is listening to this and they're thinking this really sounds like it could make sense for me, from your experience and what you've seen and you've talked to people who've been involved in category design, how long does it take before you can really expect that the market will recognize a new category? John: Yeah. It's a pretty long-time horizon. And so I mentioned Mike Volpe at the beginning of the call and I'll mention him again and Kipp Bodnar, the following CMO of HubSpot mentioned the same thing I'm about to tell you. And they told me that when they first started talking about inbound marketing, it was like standing in the middle of a town square on a soapbox just shouting into the wind with nobody paying attention. And that was the case for two to three years before that phrase really started to work its way into the lexicon of marketers. Salesforce, they pioneered, not so much CRM but cloud-based software. And even today, they still talk about other applications to cloud-based software that's 20 years later. And another example might be... So at Terminus, they talk about the account-based marketing gospel. And maybe this kind of hints to the challenge of how difficult it is to build a category. Sangram used to be there, I think he was their head of marketing if I'm not mistaken. He's definitely a co-founder, but his role is chief evangelist. And so they recognize that to really get people to be aware of and to understand and use this terminology around account-based marketing, they've had to invest very heavily in evangelizing that market or that message out in the market. Kathleen: Yeah. The other story that I've always found interesting... I followed all the ones you just mentioned really closely. And then the other one that's been fascinating to me is Drift because they came on the scene. And if they're listening, they may take issue with what I'm about to say, but look. A big piece of what their product does is live chat, website live chat, and then they have chatbots. Well, those things have been around for a while. That was not anything new, but they were really smart and they coined it as conversational marketing and they really focused more on, not so much the how and what the technology does, as what it enables the business to do, and kind of wrapped a methodology around existing technology in a way that made it feel fresh and new. And it was pretty genius. And I feel like they actually moved really quickly by comparison to a lot of the other examples I've seen. So it's interesting to me why in some cases, businesses are able to gain traction faster than others. John: Yeah. I would have to think that a lot of it has to do with the culture and how quickly or rapidly that business has gone through change in the past. And the other thing we should probably discuss is just the timeline of everything that happens before you share your new category with the world. I was talking with... There's an interview I did with, let's see, Anna and Cassidy at a company called Narrative Science. And they expected just the category design process itself to take about six to nine months. This is before they released language out publicly. And at Skyfii, that was our experience as well. And for that situation, that company, I think they were founded in 2012 or 2013. So they were five, six years into the business and there had already been a lot of discussion around the space that they started in, which was Wi-Fi marketing or Wi-Fi analytics. And so anytime that you're going into a space where the culture already kind of thinks and has a mental model for what their business is, the process of reworking all of that and getting everyone on board, especially the leadership team and perhaps even investors, getting them on board with that new message in a new way of thinking about the business, it takes time. And I would argue it should take time. Because if you rush the process and you ask your team to start using maybe even radically different language about what you do, people need time to really think through that and maybe they need to push back or challenge you a little bit or ask questions or provide suggestions. There's just this change management process you have to go through. And if you rush through that, people are not going to feel like they're a part of that process. And then ultimately, that's going to undermine your efforts in years one, two, three and further as you're asking your team to help you share that message. And at Skyfii, Skyfii is publicly traded in the Australian market and so they have investors and they have a public... They're very thoughtful about the message they put out into the market. And so they really wanted to take the time to make sure that message was right and that it made sense. And so, yeah, it took us, I don't know exactly how many months, but yeah, around six to nine months to really start that discussion and then get to a point where we were comfortable with the category name and the underlying narrative to support it. Why category design needs to be a company-wide effort Kathleen: Yeah, and I think there's... To me, one of the most important things is consistency because you kind of said if everybody is not on board and everybody isn't speaking from the same playbook, all it takes is one or two people to diverge and talk about your thing and language and terms that puts it squarely back in with all of the other things out there that... And it destroys your effort. John: Yeah. Well, and this is probably a great segue into another really important point about category design, which is that it's not a marketing project. Sometimes, it can be spearheaded by marketing, and marketing will often do a lot of the legwork, but it's not something that's relegated or exclusive to marketing. It has to be something that that CEO is involved in. It affects the company vision and is affected by the company vision. They kind of play off of each other. It affects the product roadmap. It affects what the sales team says. It affects what you might tell investors. So if your CFO is in charge of investor relations, he or she, they have to be on board and educated on the message. That's another misconception I heard a few times and it was... Personally, I thought it was a marketing initiative when I first read about it. But the more I dove deep into it and the more people I talked to, I realized it's actually a bit more of a business initiative, more so than a marketing one. Kathleen: Yeah, that's a great point. Having that buy-in top to bottom, it's really important. John: Yeah. What's been your experience at Prevailion in kind of leading your team in that discussion? Kathleen: So it was interesting because I came in really excited to make this a category design play. And shortly after I came in, we hired a head of sales, who also had some experience with category design and saw that that was a really strong play for us. He and I had both read Play Bigger, and we just kept talking about it until we basically beat the rest of our leadership team down into buying copies of the book. They've all now read it. They're all super excited about it, and it's great because it's given us a common language and framework around which to talk about what it is we're doing. So we're still really early stage, but I think we have that excitement and that buy-in in principle at least is there. And now, we're at the stage where we have to figure out our plan. What does a category design strategy look like? Kathleen: So along those lines, let's talk a little bit about somebody who's listening and they think, "Yep, this makes sense for me. Okay, I'm going to set my expectations. I understand I need to get top to bottom buy-in." What are the elements that you've seen in your experience from the companies that you've studied that have done this that contribute to successful category design efforts. In other words, what would be a part of a company's plan if they were looking to move forward with this? John: Yeah. So I'll mention two things that come to mind. So one I touched on a moment ago, but it's making sure that the CEO and the leadership team are involved and to the extent that they feel like they have a stake in the success of the project. What I mean is it's not enough for them to say, "Sure, that sounds great. Category sounds great, Mr. or Mrs. CMO. Go for it. Let me know how it turns out." That's not sufficient for getting buy-in. So getting them to be a stakeholder and have a real level of participation, that's absolutely key. And there's an interview I did with Chris Orlob of Gong.io, where we talk about that in more depth. So if you want to link to that, I'm happy to- Kathleen: Yeah, that would be great. I would love that. John: Yeah. The second thing is category design, it's all about talking about a problem that you're solving and less about the product. And so one thing I always like to say is that problem... Let's see, so your solution, your product. Solutions don't exist without problems, right? And then problems don't exist without people. And so you have to go back and understand the people that you're trying to work with and serve, and understand the problem you're trying to solve and the language they use to describe that problem, and the context for which they're trying to solve that problem or maybe they're not even aware that it is a problem or they think it's unsolvable. The point is you have to really understand the problem first and use that to lead your messaging. If your category is all around, here's why this specific product is so great and it's called this category, you're kind of missing the point. When you look at the language and the marketing that companies like Drift, for example, do, 80% of it is on the problem. Drift likes to talk about how the buying process has changed. Buyers are not interested in waiting hours or days or weeks for someone to respond to them. They want a response now. And you even see that word, "now", used.  Kathleen: Yes. That word, that one word... I went to HYPERGROWTH. I think it was not this year, but the year before. I went this year too. John: Okay. Kathleen: The year before, their whole keynote at HYPERGROWTH was all about the one word, "now." And it was so powerful, the way they distilled that down I thought, really, really simple but effective. John: Yeah, yeah. And they've written a book around conversational marketing. If you've used Drift products, you can kind of see some tie-ins but it's really about the problem that they're trying to solve. And people smarter than me have said lots of times that if you can articulate that you understand the problem better than anyone else, then people will assume you have the best solution. You don't have to work so hard to talk about every single little feature or benefit that you offer. Showing that you understand the problem creates empathy with your audience, and then again, they'll assume that you have the best solution to address that problem. Kathleen: Yeah, that's interesting that you talk about that because I think that's a really easy mistake for marketers to make, which is to say that, especially when you talk about B2B technology, it's really easy to fall into the trap of talking a lot about what the product does, how the product works. And I think many times, that's facilitated or even encouraged sometimes by the customer asking, "What does the product do? How does it work?" John: Right. Kathleen: And yet, I think the challenge as a marketer is to try to really get ahead of that and take control of the conversation and steer it towards not only the problems as you say and really deeply understanding them, but the outcomes that come from the use of the products. There's problems, and then there are what is the outcome for the user? How does it make their life better? How does it change them for the better? If you think of those as two different poles, and in the middle, lies the product and all the stuff it does, if you can keep the conversation more at the periphery on those poles, then I think you can be really successful. But that's tough. John: No, I've never heard it described that way, but that's a really clear way of describing that. And it's funny you mention that because I was having the opposite experience just this week. I was there was looking for a new email client for my computer. And that's a pretty established category. There's a million email clients. And in that context, you don't need to talk about the problem of communicating with people. Kathleen: Right. John: You know what email is. You don't need to talk about the outcome so much. There were a few features I was looking for and I was trying to find a client that had those features. And so you can talk about that a little bit more upfront when the category is established and people know what the category is, what it isn't, what it's supposed to do. But to your point, Kathleen, if that category doesn't exist and you're really trying to sell a vision around solving a problem, emphasizing what the problem is and then emphasizing the outcomes are really what's necessary to get people interested in just having a discussion around this new idea. And then from there, they're probably going to ask, "Okay, this sounds really good. Tell me about that product itself. What does it actually do?" Then you're in a perfect position to go into those details because they're ready for it. And they get the larger idea. Kathleen: Yeah, and that's where I think the traditional framework of top, middle, and bottom of the funnel comes back into the discussion, right? When you do get towards that middle to bottom of funnel stage, you can get into the weeds of how it works. And I know in our case, for example, it might not even be the same person we're having the conversation with. Our ultimate buyer isn't going to ever care so much how it works. They're going to hand that part of the decision off to somebody on their team and say, "Validate this for me." And it's almost like we've talked about it. We just need a spec sheet, but that... It's kind of like when you're going to a conference and you get the convince your boss letter, but in reverse. We're selling to the boss and the boss needs a convince their engineer letter that they can just hand to them and say, "Here, take this. It's in your language. It'll answer all your questions." Right? To me, that's the steps that we need to go through, but if we get too stuck in the weeds of convincing the engineer early, we're never going to get to convince the boss. John: Yeah, that's right. That's right. Building your category design go-to-market plan Kathleen: Yeah. Well, have you seen... So there are those foundational elements of how you talk about what it is you're doing, how you talk about the category, how you begin to gain share of mind. And then there's the actual go to market. And I've seen a lot of information written. For example, in the book, Play Bigger, which we've mentioned a few times, which is kind of like the Bible for category creation and other places. They talk about the concept of a lightning strike, which is just really a big kind of splashy go to market. It could be an event. It could be some other, something else that really makes an impression on the market and gets it talking about your thing. What have you seen or have you seen anything that has worked really well as far as like quick, well, I don't know if quick is the right word, but very high impact kind of strategies for really making an impression on the market? John: That's a great question. I'm not sure that I've seen a ton of really great examples beyond the few that we've discussed. So back to HubSpot, I don't recall a big... They have their INBOUND event, right? I don't recall that having a huge kind of blow up the world moment at the time when that conference first came out, but they've certainly been consistent and they made it a very conscious decision not to call it the HubSpot User Conference or even put the word HubSpot in there. It was about inbound, something bigger than themselves. I've seen Terminus, they have focused on this idea of a community of people who are interested in account-based marketing. Sangram told me they started with a fairly small event, relatively small event. And they've kind of built it from there. But that's more of an ongoing exercise, I guess, an ongoing process. Drift has their HYPERGROWTH conference. They came out with a book called Conversational Marketing. That's probably the biggest kind of high profile thing they did that was explicitly around that category. I think one of the things around lightning strikes is that, at least the way they're described in the book, is that they feel like they could be appropriate for a VC-backed company, or maybe a publicly traded company who's launching a new category and wants to really make that big splash and can afford to do that. I would say if you're earlier on and you don't have millions to drop on a big event or a massive campaign of another nature, it seems like other companies can can be successful with more of a process-driven approach of who are we trying to get to care about this category? What are they interested in? Where do they spend their time? And how can we just have these conversations with them on a repeatable basis? Because, like we were talking about earlier, it's not like once you name your category, the whole world suddenly cares about it and there's all these... Gartner doesn't give you a ring and say, "Hey, I guess we're going to create a Magic Quadrant because we saw your lightning strike. That's good. This is so great." Everyone who I've talked to anyway, who's done it well, has had to dedicate consistent resources over time to really get people to understand it and think about it. Kathleen: Yeah. You're talking about something that strikes very close to home for me because I've looked at those examples too and I had an opportunity... I've interviewed Kipp Bodnar. I've interviewed Nikki Nixon, who was one of the first leaders of the FlipMyFunnel community for Terminus. I interviewed Dave Gerhardt at Drift. So I've had a little bit of an inside peek into some of those companies. We didn't talk about this topic specifically, but what did strike me about all of those conversations and all of those examples is, as you say, consistency but also not just consistency, volume. There's a difference between, "Hey, we're going to consistently blog once a week, and it's going to be a great blog," and that's just an example. All of these companies not only have been super consistent, but they have turned the volume dial way up in terms of the amount of content they're creating around their category. I think every one of them has written a book actually, because Brian Halligan and Dharmesh Shah wrote the book, Inbound Marketing. You mentioned the book that Drift wrote. Sangram has written a couple of books. I don't know if that's a requirement or it's just a coincidence, but I think it certainly has helped. But it's also a reflection of that turning up the volume. We're not just going to write a bunch of blogs and use this keyword on them. We're going to write the book on our topic and really own it. And to me, there's something to that. If you're going to do a category creation play, you don't necessarily have to have the biggest budget in the world. Maybe you're not going to throw a HYPERGROWTH type conference, which is a cool conference. But you are going to need to really be prepared to just saturate the market with content, flood people with educational content around what is that problem you're solving, why it matters, why it's new, and why the new approach is better than the old one. John: Yeah. And that comes down to having patience and the right time horizon. And like you were asking about earlier, if your expectation is that category design is something maybe you can do for a few months and then you can go about business as usual, that's a wrong time horizon. And it will take months or probably years for people to really get what you do and talk about it, independent of conversations with you. And you have to have the content to support that, whether that's an event or a blog or a book or a podcast. And I think you also have to make sure that your investors understand that vision. They understand that you want to create something big, you want to create a category that you can dominate and design to your favor. And then if you do that, five to 10 years from now, you will be in a very good position. But also understanding that the first few years will have a different trajectory than someone who's just really trying to scale growth right off the bat at a very high level. Kathleen: Yeah, I feel like you just brought the conversation perfectly full circle because we started talking about how important buy-in was, top to bottom. And you can think of top to bottom as like CEO to the bottom of the organization. But honestly, if you have investors, that's really the top. Your board has to be totally bought-in because you'll get a ton of pressure. I mean we do have investors. We just got a series A round, so I'm dealing with this right now. And we're very fortunate that we have a really bought-in board, but I completely agree with you. It's also fascinating, you mentioned earlier analysts. That's another thing. If you're working with the analysts, what are the expectations you should have there? Because I recently read a quote that was like, "Gartner will never create a new market if there's only one player in it." Right? Because what's in it for them to build a Magic Quadrant for one company? They're not going to do it. So by definition, if you truly, truly are creating a new category, your thing is new and different and not like anything else and you "don't have any competition" which is like the bad words to ever say... Because even if you don't have competition, you have perceived competition. There's nothing in it for an analyst to say, "Well, this is a new category because a lot of work to produce a Magic Quadrant or a Forrester Wave." They're not going to do it for one company. So that goes back again to the conversation around time horizon. So it's such an interesting play and not for everyone certainly. You mentioned a couple of really good examples from the marketing world, Drift, HubSpot, Terminus. Can you think of any examples from outside of the marketing technology world that are really great examples of category creation? So if somebody is listening and they want to kind of look out in the wild and see who's doing this well, who would you point to? Examples of category creators John: Yeah. Yeah, that's a great point. Once you understand what category design actually means, you start to see new categories all over the place. So I'll mention two. So in high school, Kathleen, I drove a minivan. It had wood siding, I hated it, and it was just the dorkiest car you could drive. But at the time, I didn't know- Kathleen: We have to come back and have a conversation about that in a minute. John: So at the time, I didn't know that minivans were actually representative of a new category in the market. And I can't remember when they first came out. I think it was maybe the mid-80s, and I mean there were these full-size work vans, but people didn't conceive of this van that you would use to haul your family around. It was a completely new category. And it continues to be... I've come full circle. We've got a minivan today, another one. And so anyway, that's kind of a great example. You see that in automotive all the time, so hybrid cars. The Prius was a great example of designing that category. Tesla now for electric cars, SUVs as well. So that's one. And then another one is, I was actually thinking about this on the way to work this morning, the way that Apple and Spotify have really created, I guess, a new category around how music is distributed, I think, is another interesting example. And I think it's a... The reason I bring it up is category design isn't so much about a specific name or a specific taxonomy or a word that Gartner has capitalized. It more has to do with the business model and the way people look at a space. So when Apple launched iTunes, they completely changed the way music was distributed from buying a full album to buying individual songs and to needing to have the physical copy of the media to having a digital copy you could take anywhere. And now, I would argue that maybe Apple or iTunes created that category. They are the first to do that. But I would also argue that it's really Spotify, I think, if I'm not mistaken, I think their user number is larger than Apple's for Apple Music, they're the ones who have actually designed the category. They're the ones who said, "This is what streaming music looks like. This is what you're supposed to pay. This is about how many artists or songs we're supposed to have available. This is how we're going to curate music to you." And that's a completely new way of using music or listening to music. I don't know what the official name for that category is. Maybe it's just called streaming music. It's not something I'm an expert on, but that was a very long answer to your question but those I think are two that come to mind for me. Kathleen: Yeah, I think you're absolutely right. I do feel like we're surrounded by category creation. And it's happening even faster than I think it used to because of the pace of technological change. We just don't necessarily recognize it as such. But when you have that framework through which to think about it, you do start to see it everywhere and it's really interesting to watch. And I think it's kind of like the whole frog that boiled in the water analogy, which is actually a terrible analogy when you really think about what you're talking about. But the notion that- John: Who's actually tried that by the way? Do you know anyone? Kathleen: No, God, I hope not. That's like, don't they say serial killers start by torturing animals? No, no, no. Do not boil any frogs. But the whole idea being it's happening to us. We are experiencing category creation. It's just that it's happening at a pace that we don't like see it. It's not like a yesterday it didn't exist, and today it does. That by the time the category has happened and has become commonplace, it just feels like it's been there all along kind of. It's really interesting. I think there's probably a whole psychological aspect to this that hasn't even been mined in a way that it could. Kathleen's two questions Kathleen: But all right, shifting gears because I could talk about category creation forever, but we don't have forever. Inbound marketing. We talked about really what the podcast is about, and I love talking about category creation as part of it. Because when you talked about consistency and HubSpot and Drift and Terminus, really they were all phenomenal examples of companies that really did inbound marketing well. So when you think about inbound marketing as it is today, is there a particular individual or company that you really think is killing it? John: I'm going to say that it's really like a style of inbound marketing that I think is starting to get a lot of attention and it's this idea of having an evangelist be a voice for the company. And the reason I think this is so interesting is because, like our world is, there's so many messages we get from brands today, both on the consumer side and on the B2B side, that I think people have a real... They started to see that you can have a brand say anything, right? It's a construct. But when you have a person who's a real human being talking about the vision and the values and what their brand represents and how it might be able to help, to me, that's a much more authentic way and it's just very relevant in the world today because I feel like people just crave more human-to-human interaction. So a three examples of that. We've mentioned a couple already, so Sangram and Terminus does that very well. Dave Gerhardt does that. He doesn't have the title of evangelist, but he's much more of the face of the company I think even than David Cancel or others. And then, Ethan Beute at BombBomb is doing that really well. Kathleen: Yeah. John: I know you had him on a previous episode, and yeah. I know there's others out there, but those are the three that come to mind. I see their content very regularly. They all do a different job. They have their own styles. They have their own voice, but they're very authentic. And I think they're adding a lot of value for the respective companies through what they do. Kathleen: I totally agree. Those are three great examples. And picking the right person or settling on the right person to fill that role is such a critical decision for the company. It has to be somebody that truly, deeply understands, as you said, the problem that the audience is experiencing, but that also can come across as charismatically and passionately believing in that shift that needs to occur to create that new category. So it's an interesting mix of skills that you look for when you try to find your evangelist. John: Right, right. So does this mean you're going to step up and be the evangelist at Prevailion? Kathleen: I don't know. We actually... I'm really lucky. And one of the reasons I joined the company is that we have this amazing team of really smart people, who are also very invested in participating in marketing. So our CEO is unbelievable. He could sell ice to the Eskimos, not that he would. That makes him sound like he's a smarmy sales guy. He is so smart and he really has been in the market a long time and knows it, and he's also incredibly well-spoken. So while I would love to get up and talk about it, I think I'm really lucky that I have an executive team that is full of people who could probably fill that role better than I could. John: And you know what? I don't think it's entirely an either or situation. Some of those companies I've mentioned, they have someone who's maybe has the largest following or the loudest voice, but there's others on the team who can contribute to that. And I think that's what's really exciting, is it's not just one person, but you can have a whole series of people on your team evangelize for the company. And I don't know about you, there's something about when I just see the people behind a product that I'm thinking about using. I feel so much more comfortable having that conversation and and exploring what they do than I would if I was just reading pure brand messages. Kathleen: Absolutely. It all comes down to trust, right? And if you feel like you can trust that person who is the chief spokesperson, somehow or another there's a halo effect from that that shines down on the brand. And it really saturates the brand with that feeling of trustworthiness, that makes you want to buy from them. John: Yeah, that's right. Kathleen: Yeah. I love it. Well, digital marketing is changing so quickly. This topic of category creation is so fascinating because conceptually it seems like something that will stand the test of time, but then how you implement it obviously will change over time. With everything changing so quickly, how do you personally stay up to date and stay educated on all things marketing-related? John: Yeah. For me, both listening to and hosting podcasts has been a big driver of my growth. And so conversations like this one with you are really helpful because you and I could swap ideas. The episodes I've done... So I co-host a series on the B2B Growth show around category creation. I also did a series on FlipMyFunnel. That's given me the chance to talk to people who have done more category design work than I have and learn from them in the process. And for me, that's been so much more valuable than anything I could read or stumble across in a newsletter, not that those things aren't valuable. But having one-to-one access to experts, there's few things that are... I'm not sure if anything is going to beat that. Some of those conversations have led to ongoing relationships, where I've been able to ask questions and dive deeper into other topics. And so that's where I found the most valuable use of time, is just having conversations. I love to read, love to listen to podcasts, but anytime I could just talk to people and listen to them and then talk through my own ideas, man, I'd do that every day if I could. Kathleen: Amen. I just filmed a LinkedIn video about this, about how I learn. And the number one way I learn is through hosting this podcast, which when I say that to people, I know that that's not something that's going to be feasible for everyone. Let me just spin up a podcast so that I can learn. But it is the most amazing vehicle because you get to meet such incredible people like yourself, pick their brains, really get into detail that you can't get into in other ways. And it's amazing how much I take away from it. Second for me is I love to listen to Audible business books on 2X speed as I do my commute. John: What are you listening to right now? Kathleen: I am finishing Crossing the Chasm. And then before that, it was Play Bigger, From Impossible to Inevitable, and I come back. I'll listen multiple times to books because I feel like you absorb more the second time. John: Right. Kathleen: So yeah, lots of good ones. There's never too many books to read or never too few books, I should say. I always have more. John: Right, no shortage of content, yeah. How to connect with John Kathleen: Thank you. That's what I was trying to say. Well, if somebody has questions about category design and they want to reach out, learn more about what you're doing, or ask you a question, what's the best way for them to get in touch? John: Sure. So you could email me at John@FlagandFrontier.com. So that's J-O-H-N@FlagandFrontier.com. You can also just put in John.Marketing in your browser, and it'll bring up a really simple page with just my contact info. Sometimes that's easier to remember. Kathleen: So smart. That's great. I love that. John: I can't believe no one bought that domain, but it was there so why not? Kathleen: Genius. John: It's easier than spelling my last name. And then you can find me on LinkedIn as well. I won't attempt to spell my name here, but if you want to link to it in your episode- Kathleen: I'll put that in the show notes, absolutely. John: Yeah. You know what to do next... Kathleen: Great. Well, I have really enjoyed this. I've learned so much. I feel like I probably could have made this podcast three hours long, but nobody wants to listen for that long. If you're listening and you liked what you heard or you learned something new, I would really appreciate it if you would take a minute, go to Apple podcasts, and leave the podcast a five-star review. That is how other people discover us, and that is how we get in front of a bigger audience. So take a minute and do that. And if you know somebody else who's doing kick-ass inbound marketing work, tweet me at WorkMommyWork because I would love to interview them. Thank you so much, John. This has been fun. John: Yeah, my pleasure, Kathleen. And hopefully, we can have another conversation later on as you go further into your own category design process. Kathleen: Yes, about that and also about the minivan that you drove in high school. John: All right, sounds good.

Synthetic Snake Oil: Online Security Tips
DP15 First Computer Fraud Conviction: Morris Worm

Synthetic Snake Oil: Online Security Tips

Play Episode Listen Later Oct 8, 2019 2:47


The Internet began hitting it’s stride in 1983 when ARPANET (Advanced Research Projects Agency Network) adopted TCP/IP (Transmission Control Protocol and Internet Protocol) into it’s systems. At the time they called it the “network of networks” which evolved into the modern internet. But only five years later from that creation, something else was being made that sparked a chain reaction that is still relevant to this day: computer worms. In 1988, Robert Morris created a worm and released it to computer systems within MIT on November 2. The worm originally wasn’t designed to cause any damage, but rather to highlight security flaws. The worm was meant to suggest that Morris studied at MIT and also exposed some system vulnerabilities like weak passwords. Not only that, but it was intended to enter a computer once and to stay away if a computer told the worm there was already a worm in it. Unfortunately, a mistake in the programming was that Morris gave the worm a 1 in 7 odds of multiplying itself and infecting a computer regardless of the system’s response. What should have been an easily solvable program became a threat to multiple systems. As a result, the worm infected 6,000 computers to the point that the computers couldn’t function. This was a result of the worm multiplying so much in a system it slowed down the infected computer. According to the Government Accountability Office, the damages were estimated to be between $100,000 and $10 million. Despite the good intentions at first, Morris’s name has been placed on this virus which we know as the Morris worm. He was also the first person convicted under the US Computer Fraud and Abuse Act. But what’s even worse is that the Morris worm provided the framework for every other worm virus that is created today. Despite the intent for the virus to be helpful in the beginning, hackers still use this technique in various and nefarious methods. Worms have become more sophisticated with one famous example being Stuxnet. It’s a worm that evolved into a cyber weapon that we are still dealing with today. Lesser known worms have similar characters to the Morris worm: multiplying and filling up file space. Some even delete files which is a sign that your computer may be infected. It goes to show that despite people’s good intentions, it’s important for people to exercise caution. While not all of us are developing computer programs, one professional mentioned that Morris should’ve tried it on a simulator first.

Ham Radio Workbench Podcast
HRWB086-Voice over IP For Ham Radio

Ham Radio Workbench Podcast

Play Episode Listen Later Sep 24, 2019 177:52


Jeff Lehman N8ACL joins us to talk Voice over IP / Radio over IP options beyond D-Star/DMR/Yaesu System Fusion, etc.  We explore technologies like IRLP, Echolink, and AllStar.   PERMALINK - https://www.HamRadioWorkbench.com/podcast/Voice-Over-IP-for-Ham-Radio Our Website - http://www.hamradioworkbench.com/ Follow us on Twitter - https://twitter.com/hamworkbench Contact us for feedback and ideas - http://hamradioworkbench.com/contact Connect with us on Facebook - https://www.facebook.com/groups/hamradioworkbench/ BrandMeister Talkgroup 31075 - https://hose.brandmeister.network/group/31075/ Save $100 on the Digilent Analog Discovery 2 Package by using code “HamRadioWorkbench2019” in your cart prior to checkout - https://store.digilentinc.com/ham-radio-workbench-bundle/ React International Public Service through Communications - https://reactintl.org/ GMRS - https://www.fcc.gov/general-mobile-radio-service-gmrs Linux Logical Volume Manager Intro - https://opensource.com/business/16/9/linux-users-guide-lvm FLIRC Raspberry Pi 4 Case - https://flirc.tv/more/raspberry-pi-4-case USB Booting of Raspberry Pi 4 (until the bootloader supports this) - https://jamesachambers.com/raspberry-pi-4-usb-boot-config-guide-for-ssd-flash-drives/ Cactus Intertie Network - http://www.cactus-intertie.org/ Voice over Internet Protocol - https://en.wikipedia.org/wiki/Voice_over_IP Radio over Internet Protocol - https://en.wikipedia.org/wiki/Radio_over_IP Internet Radio Linking Project - http://www.irlp.net/ Echolink - http://www.echolink.org/ AllStar Link - https://web-tpa.allstarlink.org/ Asterisk IP Telephony Software - https://www.asterisk.org/ HamVOIP - https://hamvoip.org/ AllStar Universal Radio Interface - http://dmkeng.com/index.htm Turn-key node hardware - http://www.micro-node.com/ USB AllStar Interface - http://usham.net/ Examples of Network Radio Hardware - https://network-radios.com/ HamShack Hotline - https://hamshackhotline.com/

Elevator World
Ellies Awards Voting Open

Elevator World

Play Episode Listen Later Jul 17, 2019 5:34


Welcome to the Elevator World News Podcast. This week’s news podcast is sponsored by elevatorbooks.com: www.elevatorbooks.com ELLIES AWARDS VOTING OPEN Voting is open through August 31 for the second annual Ellies awards program, which recognizes excellence in the North American elevator and escalator industry. Each user (per Internet Protocol address) may vote for one company per category every 24 hr in each of the 18 categories. Winners in each of the six categories will be announced in the December issue of ELEVATOR WORLD and receive an official Ellies statuette and a custom "Winner" logo to use for print and on websites/emails. To read the full transcript of today's podcast, visit: elevatorworld.com/news Subscribe to the Podcast: iTunes│Google Play | SoundCloud│Stitcher │TuneIn

Z Iptv
What Is Internet Protocol television (IPTV)

Z Iptv

Play Episode Listen Later Dec 26, 2018 4:47


An IPTV service, Internet Protocol television typically distributed by a service provider, delivers live TV programs or on-demand video content IPTV system.

Clinic Gym Radio
Using CRM Independently from your EMR with Kelsey Bratcher

Clinic Gym Radio

Play Episode Listen Later Nov 27, 2018 65:49


Chiropractic clinics use EMR (electronic medical record) software to manage patients, billings, insurance and keeping track of costs in one tool like a centralized hub. What it doesn't do is manage the sales and marketing component of the business. Kelsey Bratcher, an automation wizard and co-founder of AutomaticPracticeProfits, tells us of alternative tools and explains in this episode how implementing a CRM (Customer Relations Management), setting up a marketing technology and configure these all up in automation can improve your business performance and attract more clients.  “Software into chiropractic industry is frustrating as you cannot put anything or out of it in an order that would make sense.” Kelsey Bratcher explains that popular EMRs are closed systems where you are unable to integrate certain tools that can significantly help you out with clinic operations, training, marketing and sales. In this interview, you'll learn: Alternative tools that a new practitioner can use to jump start his business which can also help existing clinics get more leads and maybe switch in a more cost effective way to run the marketing component of the business. The importance of automation in the marketing world in handling communication with possible leads and existing clients. Tools you can use to handle seminars and gather data of attendees and use these data for your business analytics. The benefits and disadvantages of having landing pages and click funnels, and again, alternatives to these tools and how to optimize its functions. How testimonials are a boon to any business. Crucial Takeaways: As clinic management software (EMR) are “closed” tools to managing an office, the opportunity to integrate an automation tool to enhance processes such as booking patients is out of the question. Having an independent automated system outside of an EMR significantly improve patient follow-ups, giving patient education, setting appointments, marketing and advertising seminars to name a few. Automated system programs can generate data through integrated tools regarding attendees, for instance, in seminars: number of sign-ups, attendees, people who booked an appointment and no shows. Where data gathered can be used to marketing subsequent events such as trainings, seminars and could be used to reinject no-shows into the process and so on. Clinic management systems are inadequate tools for lead generations and sales and do not have the capability to get new patients easily. There is a vast number of tools that can sell services without storing any medical information so that your Health Insurance Portability and Accountability Act (HIPAA) does not come into question CRM software like Infusionsoft, which performs automation among other things, has other more cost-effective and, technically speaking, has steep learning curve alternative, Pipedrive, that Kelsey will discuss into detail with tools that you can integrate on it as needs present. Adding testimonials through surveys to a website is extremely effective into building your business. Surveys contain personal information which you can use as testimonials and, with a CRM, can be posted on your website in an automated manner. Kelsey advices not to use a dollar store hosting like GoDaddy as you are not going to get good tools and resources to run your website. If, for other reason, you want to stay on a dollar store hosting you can switch out DNS service to optimize your website and improve performance. There are tools that you can be integrated into clinic management software alternatives like Pipedrive that can use VoIP (Voice over Internet Protocol) which are more cost-effective instead of buying a hardware service for your company's calling and SMS text

Pebkac Podcast
143 - DoIP: Drinking over Internet Protocol

Pebkac Podcast

Play Episode Listen Later Aug 9, 2018 73:20


It is PEBKAC TIME yet again! Hosts in metro MN, rural MN, and bright shiny Las Vegas chime in over the internet to dive into a little pre-DEFCON details, their thoughts on Android 9 Pie, Always-On VPNs, and a little extra madness here and there.

Paul's Security Weekly TV
Topic: IPFIX - Enterprise Security Weekly #96

Paul's Security Weekly TV

Play Episode Listen Later Jun 22, 2018 27:32


IPFIX stands for Internet Protocol Flow Information Export. It was created due to a need for common, universal standard of export for Internet Protocol flow information from routers, probes, and other devices that are used by meditation systems, accounting/billing systems, and network management systems to facilitate services such as measurement, accounting, and billing. Full Show Notes: https://wiki.securityweekly.com/ES_Episode96 Visit http://securityweekly.com/esw for all the latest episodes!

Enterprise Security Weekly (Video)
Topic: IPFIX - Enterprise Security Weekly #96

Enterprise Security Weekly (Video)

Play Episode Listen Later Jun 21, 2018 27:32


IPFIX stands for Internet Protocol Flow Information Export. It was created due to a need for common, universal standard of export for Internet Protocol flow information from routers, probes, and other devices that are used by meditation systems, accounting/billing systems, and network management systems to facilitate services such as measurement, accounting, and billing. Full Show Notes: https://wiki.securityweekly.com/ES_Episode96 Visit http://securityweekly.com/esw for all the latest episodes!

accounting john strand internet protocol techsegment bhis enterprise security weekly ipfix
早餐英语|实用英文口语
带你了解这些全球排名前十的大牌

早餐英语|实用英文口语

Play Episode Listen Later Oct 11, 2017 4:03


Most Well-Known Brands in the WorldRevenue  n.收益; 财政收入; 税收收入;Prestigious  adj.受尊敬的,有声望的; Averse  adj.反对的; 不乐意的; [植] 与茎方向相反的;What makes a brand well known? It must be a combination of consumer awareness, popularity and revenue. 10. BMW – $26.3 billionA huge and prestigious brand in the automotive industry, BMW is a car and motorcycle manufacturer based in Germany. 9. Cisco – $26.3 billionCisco Have you ever wondered how our data, voices, videos and images get transported around the Internet? Cisco Systems Inc. is the company that designs, manufactures and produces Internet Protocol-based networking devices. 8. Intel – $32. 3 billion7. General Electric – $33.7 billion6. McDonald's – $37.4 billion averseWho does not know the Big Mac? Even in beef-averse India, there are more than 250 McDonald's stores selling fast food the American way, without the beef of course. Aside from India, the company has stores in 117other countries outside the United States. 5. Google – $37.6 billionGoogle has become so popular and well-known that it has actually become a verb. 4. IBM – $48.5 billionIBM is one of the epitomes of a big company. It was founded in 1911 and has more than 430,000 people under its employ. 3. Coca Cola – $50.2 billion 2. Microsoft – $54.7 billionIts sales figure reached more than $72 billion and it has in its employ 90,000 workers.1. Apple – $87.1 billion世界上最知名的品牌是什么使一个品牌广为人知?它必须是结合消费意识,知名度和收益的综合考量。10. 宝马- 263亿美元宝马是德国汽车和摩托车制造商。9. 思科- 263亿美元你有没有想过我们的数据、声音、视频和图像是如何在互联网上传输的?思科系统公司是一家设计、制造和生产基于因特网协议的网络设备的公司。8. 英特尔-323亿美元7. 通用电气公司- 337亿美元6. 麦当劳- 374亿美元谁不知道巨无霸?即使在厌恶牛肉的印度,也有超过250家麦当劳店出售美式快餐,当然没有牛肉。除了印度,该公司在美国以外的117个国家拥有分店。5. 谷歌- 376亿美元谷歌变得如此受欢迎,众所周知,它实际上已经成为一个动词。4. IBM - 485亿美元IBM是一个大公司的缩影。它成立于1911,有超过430000名员工。3. 可口可乐- 502亿美元2.微软- 547亿美元它的销售额达到720亿美元以上,它雇用了90000名工人。1.苹果- 871亿美元更多好玩的节目公众号:卡卡课堂

早餐英语|实用英文口语
带你了解这些全球排名前十的大牌

早餐英语|实用英文口语

Play Episode Listen Later Oct 11, 2017 4:03


Most Well-Known Brands in the WorldRevenue  n.收益; 财政收入; 税收收入;Prestigious  adj.受尊敬的,有声望的; Averse  adj.反对的; 不乐意的; [植] 与茎方向相反的;What makes a brand well known? It must be a combination of consumer awareness, popularity and revenue. 10. BMW – $26.3 billionA huge and prestigious brand in the automotive industry, BMW is a car and motorcycle manufacturer based in Germany. 9. Cisco – $26.3 billionCisco Have you ever wondered how our data, voices, videos and images get transported around the Internet? Cisco Systems Inc. is the company that designs, manufactures and produces Internet Protocol-based networking devices. 8. Intel – $32. 3 billion7. General Electric – $33.7 billion6. McDonald's – $37.4 billion averseWho does not know the Big Mac? Even in beef-averse India, there are more than 250 McDonald's stores selling fast food the American way, without the beef of course. Aside from India, the company has stores in 117other countries outside the United States. 5. Google – $37.6 billionGoogle has become so popular and well-known that it has actually become a verb. 4. IBM – $48.5 billionIBM is one of the epitomes of a big company. It was founded in 1911 and has more than 430,000 people under its employ. 3. Coca Cola – $50.2 billion 2. Microsoft – $54.7 billionIts sales figure reached more than $72 billion and it has in its employ 90,000 workers.1. Apple – $87.1 billion世界上最知名的品牌是什么使一个品牌广为人知?它必须是结合消费意识,知名度和收益的综合考量。10. 宝马- 263亿美元宝马是德国汽车和摩托车制造商。9. 思科- 263亿美元你有没有想过我们的数据、声音、视频和图像是如何在互联网上传输的?思科系统公司是一家设计、制造和生产基于因特网协议的网络设备的公司。8. 英特尔-323亿美元7. 通用电气公司- 337亿美元6. 麦当劳- 374亿美元谁不知道巨无霸?即使在厌恶牛肉的印度,也有超过250家麦当劳店出售美式快餐,当然没有牛肉。除了印度,该公司在美国以外的117个国家拥有分店。5. 谷歌- 376亿美元谷歌变得如此受欢迎,众所周知,它实际上已经成为一个动词。4. IBM - 485亿美元IBM是一个大公司的缩影。它成立于1911,有超过430000名员工。3. 可口可乐- 502亿美元2.微软- 547亿美元它的销售额达到720亿美元以上,它雇用了90000名工人。1.苹果- 871亿美元更多好玩的节目公众号:卡卡课堂

China Money Podcast - Audio Episodes
Former CNNIC Chief Says China Is Pioneering New Business Models In Tech

China Money Podcast - Audio Episodes

Play Episode Listen Later Jul 6, 2017 18:19


At the World Economic Forum's Annual Meeting of the New Champions (also known as the Summer Davos) in Dalian last week, China Money Network caught up with Prof. Xiaodong Lee, former president and CEO of China Internet Network Information Center (CNNIC), to chat about the development of the Internet industry in China and the country's role in managing the world wide web. CNNIC, established in 1997, is best known for twice a year publishing the Statistical Report on Internet Development in China, chronicling the growth and major trends of the nation's Internet sector. As a unit operating under the Cyberspace Administration of China, the country's main Internet control and oversight authority, CNNIC is also responsible for the registration of Chinese domain names and Roman letter names ending with .cn. According to CNNIC's latest survey, there were 731 million netizens in China at the end of 2016, equal to the entire population of the European continent. There were 20 million registered .cn domain names, the largest pool of any country-specific domain names. China is also far, far ahead of other countries in terms of mobile Internet usage. In total, more than 697 million people currently use mobile Internet in China, of which 469 million use mobile payment apps, representing a penetration rate of 67% . That compares to a mobile payment penetration ratio of just 19% for U.S. smartphone users in 2016 and an expected penetration ratio of 33% in 2020, according to eMarketer. In addition, mobile payment in China goes beyond facilitating online transactions, and is widely used at offline venues such as restaurants, stores and transportation hubs, where users pay with their phones instead of cash or bank cards. Nearly half of Chinese mobile Internet users have utilized mobile payments while shopping at offline stores. Prof. Lee, who holds a P.h.D degree from the Chinese Academy of Sciences and teaches at some of China's top universities, also shared his views on how to better manage the Internet in the fast-growing Internet of Things (IoT) industry. He announced last week that he had resigned his post at the CNNIC, but did not reveal his next move. Read below a lightly edited Q&A transcript between Prof. Lee and China Money Network host, Nina Xiang. Subscribe to China Money Podcast for free in the iTunes store, or subscribe to China Money Network weekly newsletters. You can also subscribe to China Money Podcast's Youtube channel or Youku channel. Q: CNNIC has been conducting bi-annual surveys of China's Internet industry for the past 20 years. How has the focus of the survey changed over time? A: At the beginning, the report only covered fundamental resource statistics, such as how many domain names there were, how many Internet Protocol addresses there were, and how many servers were connected to the Internet, etc. As the Internet and particularly mobile Internet evolved, we tried to provide more detailed information covering different industries across different regions, as well as offering a lot of analysis based on the age or educational background of the users. The most obvious trend is that companies were initially focused on "copy-to-China," but more and more, there are new technologies and new business models originating from within China. That includes the sharing economy, think Mobike and bike sharing companies, and (innovative applications of) mobile payment services. It's a huge change in the past ten years, particularly in the past five years, I would say. It means that even more new business models and technologies will be applied first in China in the future. Q: The next big boom looks to be the IoT industry, which is expected to reach over eight billion connected devices globally this year. What kind of regulatory and management challenges does this create for regulators? A: I think if billions, or potentially trillions of devices are connected to the Internet,

Geointeresting
Episode 23: Vint Cerf - Innovator, risk taker, Internet pioneer

Geointeresting

Play Episode Listen Later Jul 3, 2017 17:18


Vint Cerf, one of the “fathers of the Internet” discusses his role in its creation and the impact it has had on the world. In the late 1960s Vint Cerf was part of the team that developed the Advanced Research Projects Agency Network, or ARPANet. It continued to expand due to the creation of the Transmission Control Protocol and Internet Protocol, or TCP/IP, which sets standards for how data could be transmitted between multiple networks. In 1983, ARPANET adopted TCP/IP and a network of networks was created that became the modern Internet. Cerf sat down with Geointeresting to share his experience as both a government and a tech industry employee and offer insight on why taking risks and sharing information is vital to success.

Sonabank P.O.W.E.R. Plug Podcast for Women in Business
EVB POWER Plug: Why VoIP is a Faster, Cheaper, Better Business Phone System | EVBPP010

Sonabank P.O.W.E.R. Plug Podcast for Women in Business

Play Episode Listen Later Jan 25, 2017 27:03


Ever wondered if there is a faster, cheaper, better phone system for your small business? There is! It’s called VoIP or Voice over Internet Protocol. If you’re not using VoIP chances are you’re paying too much and missing out on the incredible flexibility, features and customization that a VoIP phone system offers. Host Mary Foley talks with Dorothye Brodersen, co-owner and CFO of Infotel Systems in Richmond, VA. For over 20 years Dorothye and her husband Chuck have been providing businesses high-quality, reliable phone and data systems like the big companies but with the advantage of local, personal support. As technology has evolved, Infotel Systems has been right there to make the best options available, including the biggest shift in phone technology is decades – VoIP. Get your geek on to listen and learn: - What is VoIP phone service? - Why is VoIP better and cheaper? - How can VoIP help my business? - Why should I switch to VoIP for my business if my current phone system works just fine? - If I use VoIP can I stop carrying around and charging 2 mobile phones – one for business and one for personal? - What’s involved in switching to VoIP for my business?

AWS re:Invent 2016
NET204: NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview

AWS re:Invent 2016

Play Episode Listen Later Dec 24, 2016 19:00


Recently, AWS announced support for Internet Protocol version 6 (IPv6) for several AWS services, providing significant capabilities for applications and systems that need IPv6. This session provides an overview of IPv6 and covers key aspects of AWS support for the protocol. We discuss Amazon S3 and S3 Transfer Acceleration, Amazon CloudFront and AWS WAF, Amazon Route 53, AWS IoT, Elastic Load Balancing, and the virtual private cloud (VPC) environment of Amazon EC2. The presentation assumes solid knowledge of IPv4 and those AWS services.

Take Up Code
158: IP: Internet Protocol Addresses.

Take Up Code

Play Episode Listen Later Nov 21, 2016 9:43


Any computer or device that wants to communicate with the Internet Protocol needs an IP address to uniquely identify the device.

The Mstdfr Podcast
049: Where Is My Chicken Emoji?

The Mstdfr Podcast

Play Episode Listen Later Oct 1, 2016 63:04


This week we host Sari Sabban and we geek out on unicode and emojis, the history of smilies, Internet Protocol exhaustion, telescopes and microscopes, and a lot lot more. Very dense episode! Show Links Unicode Is Considering a Hijab Emoji What is unicode? Original Bboard Thread in which

The Mstdfr Podcast
049: Where Is My Chicken Emoji?

The Mstdfr Podcast

Play Episode Listen Later Oct 1, 2016 63:04


This week we host Sari Sabban and we geek out on unicode and emojis, the history of smilies, Internet Protocol exhaustion, telescopes and microscopes, and a lot lot more. Very dense episode! Show Links Unicode Is Considering a Hijab Emoji What is unicode? Original Bboard Thread in which was proposed The New Emojis Have a Meeting – College Humor IP Exhaustion The Voyager Golden Record The muslim cleric claiming Earth does not revolve

APN - AVAYA PODCAST NETWORK™
FCC - NewsBytes - 09/15 FCC Announces Tech Transition Event

APN - AVAYA PODCAST NETWORK™

Play Episode Listen Later Sep 15, 2016 4:12


The nation’s telephone companies in the United States are currently upgrading the technology that delivers phone service. Existing copper lines are being replaced with fiber or wireless networks that use Internet Protocol technology. These processes are called the “technology transitions” (formerly referred to as the “IP Transition”). This info session will inform consumers about how the switch from copper networks to new technologies will affect them.

FCC NewsBYTES™ with Fletch
FCC - NewsBytes - 09/15 FCC Announces Tech Transition Event

FCC NewsBYTES™ with Fletch

Play Episode Listen Later Sep 15, 2016 4:12


The nation’s telephone companies in the United States are currently upgrading the technology that delivers phone service. Existing copper lines are being replaced with fiber or wireless networks that use Internet Protocol technology. These processes are called the “technology transitions” (formerly referred to as the “IP Transition”). This info session will inform consumers about how the switch from copper networks to new technologies will affectthem.

The Movie Review Crew
04.28.2016 Ip Man

The Movie Review Crew

Play Episode Listen Later Apr 28, 2016 62:06


We break ground in this episode by reviewing our first foreign film! Contrary to popular belief, Ip Man isn't about one man's passion for Internet Protocol. It is more about a man with the most badass Kung-Fu skills in all the land! Don't take this descriptions words for it, check out our full review to break down the film! Listener beware, spoilers ahead. 

AHECTA
A Comprehensive Approach to Internet Protocol Television (2013)

AHECTA

Play Episode Listen Later Apr 7, 2016


Kuriosia
STC113 Internet Protocol over Avian Carriers

Kuriosia

Play Episode Listen Later Jan 18, 2015


BildquelleIn dieser Episode geht es um ein scherzhaftes Netzwerkprotokoll für drahtlose Punkt-zu-Punkt-Verbindungen mittels Brieftauben. Wikipedia-Artikel zur Folge: Internet Protocol over Avian Carriers

NEWSPlus Radio
【专题】慢速英语(美音版)2014-06-24

NEWSPlus Radio

Play Episode Listen Later Jul 5, 2014 25:00


完整文稿请关注周末微信或登录以下网址: http://english.cri.cn/7146/2014/06/20/2582s832626.htm This is NEWS Plus Special English. I'm Yun Feng in Beijing. Here is the news. Television and online rights for sporting events are typically sold by territory. For the World Cup, that means viewers in the United States are limited to what's available through U.S. television networks ABC, ESPN and Univision. Outside the U.S., games are available on a variety of over-the-air and cable channels, with streaming available for free or for a fee. Legal viewing is restricted to people in those countries. Services are typically able to block outsiders based on the computer's numeric Internet Protocol address. Here's a look at what viewers in some countries are getting. England - All games are available over the air for free in England because the World Cup has been designated a "crown jewel of sport", part of a regulation that prohibits certain events from being restricted to pay-tv. Italy - All 64 matches are available on Italy's Sky satellite service. State broadcaster RAI is showing 25 games, including all of Italy's matches plus other big games, on its free digital cable service. Japan - All games are available in Japan for free on national broadcaster NHK as well as other channels. Mexico - All national team games and one or two live games a day in Mexico are carried over the air by major TV services. Complete coverage of the games is carried only on the Sky satellite service. Nigeria - Selected games are available on Nigerian national broadcaster NTA and local private stations. Many viewers turn to DStv, a South African satellite TV network, for complete coverage. The DStv offices in Lagos have been staying open seven days a week as Nigerians flock to sign up. But regular electricity outages mean people will need to have private generators or battery-powered radios on standby. Russia - All games are broadcast live with Russian commentary on the main state television channel, though this means that many of the games are shown in the middle of the night Moscow time. The games are then re-broadcast during the day. South Africa - The national South African Broadcasting Corporation covers all 64 games live over three channels, meaning it's available to everyone with a 23-dollar annual TV license. Nineteen radio stations of the corporation will offer commentary covering all of South Africa's 11 official languages. Spain - Games involving the Spanish national team are free. All of the other games are available on a premium cable channel or online for 57 dollars. Thailand - In an effort to "return happiness to the people", Thailand negotiated a deal with the tournament's broadcaster, RS International Broadcasting, to allow all the games to be shown for free on an RS channel and two military-run channels. RS had planned to show just 22 of the 64 matches for free. Thailand's national team is not playing in the tournament. You're listening to NEWS Plus Special English. I'm Yun Feng in Beijing. Mention Huawei in the United States, and you're likely to get a blank look. Either that person has never heard of the Chinese phone maker, or has heard something about security concerns raised by lawmakers in Washington. However, Huawei Technologies believes it can overcome all that as it makes a bigger push in the U.S. and tries to build on its successes elsewhere. While Apple and Samsung dominate the worldwide smartphone market with a combined market share of 46 percent, Huawei has a slight lead among the rest, with about 5 percent. The Ascend Mate2 4G is a mid-range Android phone touted as an affordable alternative to such high-end phones as Apple's iPhone 5s and Samsung's Galaxy S5, both of which retail for about 650 US dollars without a contract. The Mate2 will go for 299 dollars and will be sold directly by Huawei. It will work on AT&T's and T-Mobile's networks. You won't get all the features found in the iPhone or the S5, but the Mate2 does well on the basics, based on about a week of testing. Furthermore, it works with 4G cellular networks, while many cheaper devices are compatible only with the slower 3G networks. This is NEWS Plus Special English. The European Union and South Korea have agreed to jointly develop 5G mobile technologies. 5G-technology is set to be 1,000 times faster than the 4G services currently available, and is in its early stages of development. Both the EU and South Korea are investing heavily in 5G. The EU is investing 700 million euros, or 950 million U.S. dollars, over the next seven years into its 5G program. South Korea is investing and coordinating research in its efforts through 5G-Forum and there are other major public and industry-led initiatives in China, Japan and the United States. You are listening to NEWS Plus Special English. I'm Yun Feng in Beijing. The African Union has marked the "Day of African Child" at the AU Headquarters in Addis Ababa, Ethiopia's capital. The Day of African Child falls on June 16th each year; and it presents an opportunity for all stake-holders on children's rights, including government, non-governmental and international entities, to reflect on issues affecting children. This year's theme is "a child friendly, quality, free and compulsory education for all children in Africa". It aims to ensure that all the goals have been met in accordance with the African charter on the rights and welfare of children. The AU celebrates the Day of African Child every year, in commemoration of the 1976 protests by school children in South Africa. The students protested against an education program designed to further the purposes of the apartheid regime.

CERIAS Security Seminar Podcast
David Pisano, Identity-Based Internet Protocol Network

CERIAS Security Seminar Podcast

Play Episode Listen Later Apr 24, 2013 29:21


The Identity-Based Internet Protocol (IBIP) Network project is experimenting with a new enterprise oriented network architecture using standard Internet Protocol to encode identity (ID) information into the IP packet by a new edge security device referred to as the IBIP policy enforcement point (PEP). This is a variant of a network admission control process that establishes user and host identities as well as provides optional information on host visibility, organizational affiliation, current role, and trust metric (associated with the user and host endpoints). Our motivation is to increase our security posture by leveraging identity, reducing our threat exposure, enhancing situational understanding of our environment, and simplifying network operations. In addition to authentication, we leverage strong anti-spoofing technology to improve accountability. We reduce our threat surface by "hiding" our client hosts and making all infrastructure devices inaccessible. Any attempt to access a hidden host or infrastructure device results in a policy violation attributable to the user/host that caused the violation and provides enhanced situational awareness of such activities. Our servers can also have a "permissible use" policy that ensures that the server only operates across the network per that policy. Finally, as users log in and servers are added to the network, all dynamic configurations for access control initiated by such changes are automatically carried out without manual intervention, thereby reducing potential vulnerabilities caused by human errors.11.Extracted from "Nakamoto, G.; Durst, R.; Growney, C.; Andresen, J.; Ma, J.; Trivedi, N.; Quang, R.; Pisano, D., "Identity-Based Internet Protocol Networking," MILITARY COMMUNICATIONS CONFERENCE, 2012 - MILCOM 2012 , vol., no., pp.1,6, Oct. 29 2012-Nov. 1 2012. About the speaker: David Pisano is a Senior Network Engineer at the MITRE Corporation, where he has been employed for the last two and a half years. David has devoted most of this time working on networking and networking security challenges. He has been a contributor to The Honeynet Project since 2009. Prior to joining MITRE David earned a Masters in Networking and Systems Administration at the Rochester Institute of Technology (R.I.T.) David completed his undergraduate degree in Applied Networking and Systems Administration with a minor in Criminal Justice, also at R.I.T. David is coauthor on two papers on networking and networking security published in peer-reviewed journals.

CERIAS Security Seminar Podcast
David Pisano, "Identity-Based Internet Protocol Network"

CERIAS Security Seminar Podcast

Play Episode Listen Later Apr 24, 2013


The Identity-Based Internet Protocol (IBIP) Network project is experimenting with a new enterprise oriented network architecture using standard Internet Protocol to encode identity (ID) information into the IP packet by a new edge security device referred to as the IBIP policy enforcement point (PEP). This is a variant of a network admission control process that establishes user and host identities as well as provides optional information on host visibility, organizational affiliation, current role, and trust metric (associated with the user and host endpoints). Our motivation is to increase our security posture by leveraging identity, reducing our threat exposure, enhancing situational understanding of our environment, and simplifying network operations. In addition to authentication, we leverage strong anti-spoofing technology to improve accountability. We reduce our threat surface by “hiding” our client hosts and making all infrastructure devices inaccessible. Any attempt to access a hidden host or infrastructure device results in a policy violation attributable to the user/host that caused the violation and provides enhanced situational awareness of such activities. Our servers can also have a “permissible use” policy that ensures that the server only operates across the network per that policy. Finally, as users log in and servers are added to the network, all dynamic configurations for access control initiated by such changes are automatically carried out without manual intervention, thereby reducing potential vulnerabilities caused by human errors.1 1.Extracted from “Nakamoto, G.; Durst, R.; Growney, C.; Andresen, J.; Ma, J.; Trivedi, N.; Quang, R.; Pisano, D., "Identity-Based Internet Protocol Networking," MILITARY COMMUNICATIONS CONFERENCE, 2012 - MILCOM 2012 , vol., no., pp.1,6, Oct. 29 2012-Nov. 1 2012.

Enough - The Podcast
Ep 189 - The Rhone Internet Protocol

Enough - The Podcast

Play Episode Listen Later Feb 12, 2013 77:39


This week Patrick and Myke are joined by Pat Dryburgh. They discuss some of his work online and his new Podcast, in which he's aiming to lose 100 pounds. The show finishes with a discussion about managing social identity. Show Notes: - Minimal Mac: 100,000 - patdryburgh.com - Pat Dryburgh on Twitter - Pat's Vimeo Videos - Hundred Down - What is the Paleo diet? - GORUCK Challenge - Starting Strength - The Paleo Solution - So Good Paleo - Brooks Review: Mine - The Drop (Pat's current film project) - Pat Dryburgh: Tuesday, 12pm - Merlin Mann: Cranking - PatrickRhone - Sleep Talk Recorder - Perch   Sponsors: This episode is brought to you by: Squarespace, the secret behind exceptional websites. Go to squarespace.com/70decibels to start your free trial and use the offer code '70decibels2' at checkout to get 10% off your first order.

Shelly Palmer Digital Living - Daily Video
Shelly Palmer Chats With Simon Applebaum About Cable TV Over the Internet

Shelly Palmer Digital Living - Daily Video

Play Episode Listen Later Jun 29, 2011 8:33


Shelly Palmer chats with Simon Applebaum about Comcast's closed test for transmitting cable television over Internet Protocol. For more information visit shellypalmer.com

Cisco Hands On Training Podcast
The need for QOS versus Net Neutrality

Cisco Hands On Training Podcast

Play Episode Listen Later Mar 14, 2010


In 2003, I made a VOIP call from home while downloading a large email attachment. The DSL line saturated and my audio quality became horrible while VOIP packets (and email packets) were being dropped. Doubling the bandwidth to my home would not have solved this problem. The email download would simply have been faster, but the VOIP call would still have suffered packet loss.The solution to this problem is 'quality of service' (QOS). Some applications, particularly realtime interactive applications, are sensitive to packet loss. Other applications, particularly bulk data traffic (including email, ftp, backups, software update downloads) are not time sensitive and can have their traffic delayed in favor of the realtime traffic. QOS is the network function where certain applications and traffic are prioritized over others that are deemed less urgent.The creators of the Internet Protocol version 4 understood that quality of service was a requirement. They included the 'type of service' field in the IPv4 header when it was specified in 1981. When developing IPv6, they cleaned up unnecessary header fields, but still they kept the 'class of service' field in the base IPv6 header. Every Internet Protocol packet sent on the Internet since 1983 (when IPv4 went live) included this service field in the header to enable QOS functionality.In September 2009, Julius Genachowski, chairman of the FCC commissioners, proposed two new 'network neutrality' principles. Among them was the "principle of nondiscrimination." This proposed principle states 'broadband providers cannot discriminate against particular Internet content or applications.' While there is a valid concern that ISP's may choose to impede applications or content from competitors, the current proposal as stated seems to restrict ISP's from using QOS to prioritize traffic for realtime applications, and deprioritize traffic for bulk data applications.Due to the apparent attempt to ignore a fundamental building block of the Internet, I oppose the proposed 'principle of nondiscrimination' as written. ISP's need to prioritize realtime applications, while deprioritizing non-realtime bulk-data-transfer applications. In addition, ISP's need the freedom to block applications which do not 'play nicely' in a bandwidth constrained environment. Network engineers know that sometimes particular applications need to be blocked to allow the majority of the network (and the majority of customers) to enjoy adequate performance.

Gordon And Mike's ICT Podcast
Vice over IP: Embedding Secret Messages in Online Conversations [24:05]

Gordon And Mike's ICT Podcast

Play Episode Listen Later Feb 17, 2010 24:04


In this podcast we discuss the emerging threat of steganography in voice over IP. This is really interesting - is it something that is already happening? Currently, this seems to be confined to research labs. The primary reference for this podcast is an IEEE Spectrum article by three professors - Józef Lubacz, Wojciech Mazurczyk & Krzysztof Szczypiorsk - at Warsaw University of Technology. This is part of their ongoing research, as part of the Network Security Group, to identify emerging threats and develop countermeasures. Before we delve into this new topic, lets provide the audience with a little background. First what is steganography - sounds like a dinosaur? Yeah - the Stegosaurus. I'm not sure how or if the two are related; we'll leave that one for the Paleontologists in the audience.  Steganography is something that has been around a long time - some say as far back as 440 BC. While encryption takes our message and scrambles it, so that an unintended recipient cannot read it, steganography attempts to hide or obscure that a message even exists. The researchers refer to steganography as "meta-encryption." Another useful analogy they use is to refer to the secret message and the carrier within which it is hidden. Can you give us some examples? If we start in ancient times, we can point to examples of shaving a messengers head, tattooing a message on their head, letting the hair grow back and sending them off. Other examples include using invisible ink or even writing on boiled eggs with an ink that penetrates the shell and can be read by peeling the egg. Simon Singh's "The Code Book" is a great read that details the history of encrypting and obscuring information.  What about some more modern examples? When we refer to modern steganography we are usually referring to digital steganography. Digital steganography takes advantage of digital data by (for example) hiding a message within  images, audio, or video files. In this case the image, audio or video file is the carrier. The larger the file (image, audio or video) the larger message it can carry. The researchers contend that a single 6-minute mp3 audio file, say roughly 30 megabytes in size, could be used to conceal every play written by Shakespeare.    So how does this work? Say you and I wanted to communicate using steganography. We would each download one of the hundreds of freely available stego apps. You would take a fairly innocuous image file, use the software to embed a message into that file, and send me the altered file. To anyone else, this would just look like a photo you're sharing with a friend, but because I know there's a hidden message, I open with the same stego app and read the hidden message. You could also add a password to further protect the message. So how do we stop this? This is a specialized field called "steganalysis." The simplest way to detect a hidden message is to compare the carrier file - our innocuous image - to the original. A file that is larger than the original is a red flag. This of course presupposes that you have access to the original file. In most cases, this will not be the case, so instead, we look for anomalies. Is the audio file significantly larger than a 3-minute audio file should be? We can also use spectrum analysis or look for inconsistencies in the way the data has been compressed.  How would spectrum analysis help? Some steganography techniques try to take our digital data and modify the least-siginificant bit. In our digital data the LSB often just shows up as noise and doesn't effect the image, audio, or video quality. A spectrum analyzer would help us to compare the "noise" in an unaltered sample and to try and identify anomalies.   Wow - that's scary stuff. What about Voice over IP[is this part OK]? Voice over IP or ("voype") is a transmission technology that enables us to deliver voice communications over IP networks such as the Internet. This is an alternative to using the traditional PSTN or public switched telephone network for voice communications. In VoIP, we take our analog voice signal convert it to a digital signal and "chop" it up into smaller pieces called IP packets. These packets are sent over our data network and reassembled at the destination.  To understand packet-switched networks, consider the US Postal system – our packets are analogous to postal letters or parcels, numbered, sent across a network and re-assembled at the receiving end. Packets do not follow the same path from source to destination and may even arrive out of sequence. In VoIP, it's more important that we transmit our data quickly, so we forego the numbering or sequencing.   So what about this new class of steganography? One of the disadvantages of existing techniques is the size limitation of the carriers. If someone tries to put to large a message into an audio file, it becomes easier to detect. With VoIP, our message is hidden among the packets - even bits - of voice data being transmitted. In a sense, older technologies used a digital file as the carrier, while these new, emerging techniques use the communication protocol itself as the carrier. The size of the hidden message is only limited by the length of the call. While detecting a hidden message in a physical file is not trivial, the difficulty of finding a hidden message increases an order of magnitude when there is no physical file to examine. The researchers are calling this new class of steganography - "network steganography." So how does network steganography work? The researchers have developed three methods that all manipulate the IP or Internet Protocol and take advantage of the fact that this is a connectionless and unreliable protocol. Network steganography exploits errors (data corruption and lost packets) that are inherent in the Internet Protocol. What are the three methods? The three methods or flavors of network steganography that the researchers have developed are: LACK or Lost Audio Packet Steganography HICCUPS or Hidden Communication System for Corrupted Networks, and Protocol Steganography for VoIP Briefly, LACK hides a message in packet delays, HICCUPS disguises a message as noise, and Protocol Steganography uses unused fields in the IP protocol to hide information. So let's talk a little bit more about each - first LACK. VoIP traffic is very time sensitive - if a voice packet (about 20 milliseconds of conversation) is delayed, we can continue our conversation without significantly effecting the call quality. Once the delayed packet does arrive at the receiver, it's already too late; the packet is useless and is either dropped or discarded. That's the way VoIP is designed to work. LACK intentionally delays some packets and adds the "steganograms" in these intentionally delayed packets. To an unintended recipient, these packets appear to be late and are discard, but to the party you're communicating with they are retained and decoded to extract a hidden message. LACK is a simple technique that is hard to detect. What about HICCUPS? HICCUPS works on wireless local area networks and takes advantage of corrupted packets. Normally, in a wireless network, we check for corrupted data by examining the checksum of a received packet. If the checksum doesn't match what we expect, we discard the packet. HICCUPS hides our message - the steganograms - in these seemingly "corrupted" packets. Unintended recipients will discard these packets, but our cohort knows to look for these "corrupted" packets and to retain and examine them. This method is difficult to use, because it requires a NIC card that can generate incorrect checksums. It is also difficult to detect. Okay what about Protocol Steganography? Here, we're hiding our message in the actual header fields of the IP packet. In particular, we're hiding information in unused, optional or even partial fields. To make it even harder to detect, we could use fields that frequently change. So, should we be worried? I don't think so. The majority of the steganography applications seem to be focused on altering images, which appears to be the easiest form of steganography. While the techniques these researchers have developed are technically feasible, I'm not sure that they're easily implemented. There has been lots of speculation regarding terrorist organizations using steganography to communicate however, no one has been able to document that this has actually happened. That said, I have no doubt that these groups are exploring ways to mask their communications and that the NSA has developed and uses a wide arrays of tools and countermeasures for steganography.

Philadelphia Bar Association - Law Practice Management
A beginner's guide to voice over Internet protocol at the April 17, 2008 meeting of the Technology Committee of the Law Practice Management Division.

Philadelphia Bar Association - Law Practice Management

Play Episode Listen Later Apr 16, 2008 46:12


Gordon And Mike's ICT Podcast
Internet Protocol version 6 (IPv6) Details Podcast [32:30]

Gordon And Mike's ICT Podcast

Play Episode Listen Later Apr 3, 2008 32:30


Intro: Two weeks ago we gave an overview of IPv6. This week we take a look at some of the technical details for this protocol. Mike: Gordon, a couple of weeks ago we discussed Ipv6 - can you give us a quick review - what's the difference between IPv4 and IPv6? The most obvious distinguishing feature of IPv6 is its use of much larger addresses. The size of an address in IPv6 is 128 bits, which is four times the larger than an IPv4 address. A 32-bit address space allows for 232 or 4,294,967,296 possible addresses. A 128-bit address space allows for 2 28 or 340,282,366,920,938,463,463,374,607,431,768,211,456 (or 3.4x1038) possible addresses. In the late 1970s when the IPv4 address space was designed, it was unimaginable that it could be exhausted. However, due to changes in technology and an allocation practice that did not anticipate the recent explosion of hosts on the Internet, the IPv4 address space was consumed to the point that by 1992 it was clear a replacement would be necessary. With IPv6, it is even harder to conceive that the IPv6 address space will be consumed. Mike: It's not just to have more addresses though, is it? It is important to remember that the decision to make the IPv6 address 128 bits in length was not so that every square inch of the Earth could have 4.3x1020 addresses. Rather, the relatively large size of the IPv6 address is designed to be subdivided into hierarchical routing domains that reflect the topology of the modern-day Internet. The use of 128 bits allows for multiple levels of hierarchy and flexibility in designing hierarchical addressing and routing that is currently lacking on the IPv4-based Internet. Mike: Is there a specific RFC for IPv6? The IPv6 addressing architecture is described in RFC 2373. Mike: I know there is some basic terminology associated with IPv6. Can you describe Nodes and Interfaces as they apply to IPv6? A node is any device that implements IPv6. It can be a router, which is a device that forwards packets that aren't directed specifically to it, or a host, which is a node that doesn't forward packets. An interface is the connection to a transmission medium through which IPv6 packets are sent. Mike: How about some more IPv6 terminology - can you discuss Links, Neighbors, Link MTUs, and Link Layer Addresses? A link is the medium over which IPv6 is carried. Neighbors are nodes that are connected to the same link. A link maximum transmission unit (MTU) is the maximum packet size that can be carried over a given link medium, and is expressed in octets. A Link Layer address is the "physical" address of an interface, such as media access control (MAC) addresses for Ethernet links. Mike: Can you give a brief ouline in address syntax? IPv4 addresses are represented in dotted-decimal format. This 32-bit address is divided along 8-bit boundaries. Each set of 8 bits is converted to its decimal equivalent and separated by periods. For IPv6, the 128-bit address is divided along 16-bit boundaries, and each 16-bit block is converted to a 4-digit hexadecimal number and separated by colons. The resulting representation is called colon-hexadecimal. The following is an IPv6 address in binary form: 00100001110110100000000011010011000000000000000000101111001110110000001010101010000000001111111111111110001010001001110001011010 The 128-bit address is divided along 16-bit boundaries: 0010000111011010  0000000011010011   0000000000000000   0010111100111011  0000001010101010   0000000011111111   1111111000101000  1001110001011010    Each 16-bit block is converted to hexadecimal and delimited with colons. The result is: 21DA:00D3:0000:2F3B:02AA:00FF:FE28:9C5A IPv6 representation can be further simplified by removing the leading zeros within each 16-bit block. However, each block must have at least a single digit. With leading zero suppression, the address representation becomes: 21DA:D3:0:2F3B:2AA:FF:FE28:9C5A Mike: I know there are lost of zeros in IPv6 addresses - can you discribe zero compression notation? Some types of addresses contain long sequences of zeros. To further simplify the representation of IPv6 addresses, a contiguous sequence of 16-bit blocks set to 0 in the colon hexadecimal format can be compressed to “::?, known as double-colon. For example, the link-local address of FE80:0:0:0:2AA:FF:FE9A:4CA2 can be compressed to FE80::2AA:FF:FE9A:4CA2. The multicast address FF02:0:0:0:0:0:0:2 can be compressed to FF02::2. Zero compression can only be used to compress a single contiguous series of 16-bit blocks expressed in colon hexadecimal notation. You cannot use zero compression to include part of a 16-bit block. For example, you cannot express FF02:30:0:0:0:0:0:5 as FF02:3::5. The correct representation is FF02:30::5. To determine how many 0 bits are represented by the “::?, you can count the number of blocks in the compressed address, subtract this number from 8, and then multiply the result by 16. For example, in the address FF02::2, there are two blocks (the “FF02? block and the “2? block.) The number of bits expressed by the “::? is 96 (96 = (8 – 2)(16). Zero compression can only be used once in a given address. Otherwise, you could not determine the number of 0 bits represented by each instance of “::?. Mike: IPv4 addresses use subnet masks - do IPv6 addresses? No - a subnet mask is not used for IPv6. Something called prefix length notation is supported. The prefix is the part of the address that indicates the bits that have fixed values or are the bits of the network identifier. Prefixes for IPv6 subnet identifiers, routes, and address ranges are expressed in the same way as Classless Inter-Domain Routing (CIDR) notation for IPv4. An IPv6 prefix is written in address/prefix-length notation. For example, 21DA:D3::/48 is a route prefix and 21DA:D3:0:2F3B::/64 is a subnet prefix. Mike: I know there are three basic types of IPv6 addresses - can you give a brief description of each? 1. Unicast – packet sent to a particular interface A unicast address identifies a single interface within the scope of the type of unicast address. With the appropriate unicast routing topology, packets addressed to a unicast address are delivered to a single interface. To accommodate load-balancing systems, RFC 2373 allows for multiple interfaces to use the same address as long as they appear as a single interface to the IPv6 implementation on the host. 2. Multicast - packet sent to a set of interfaces, typically encompassing multiple nodes A multicast address identifies multiple interfaces. With the appropriate multicast routing topology, packets addressed to a multicast address are delivered to all interfaces that are identified by the address. 3. Anycast – while identifying multiple interfaces (and typically multiple nodes) is sent only to the interface that is determined to be “nearest? to the sender. An anycast address identifies multiple interfaces. With the appropriate routing topology, packets addressed to an anycast address are delivered to a single interface, the nearest interface that is identified by the address. The “nearest? interface is defined as being closest in terms of routing distance. A multicast address is used for one-to-many communication, with delivery to multiple interfaces. An anycast address is used for one-to-one-of-many communication, with delivery to a single interface. In all cases, IPv6 addresses identify interfaces, not nodes. A node is identified by any unicast address assigned to one of its interfaces. Mike: What about broadcasting? RFC 2373 does not define a broadcast address. All types of IPv4 broadcast addressing are performed in IPv6 using multicast addresses. For example, the subnet and limited broadcast addresses from IPv4 are replaced with the link-local scope all-nodes multicast address of FF02::1. Mike: What about special addresses? The following are special IPv6 addresses: Unspecified Address The unspecified address (0:0:0:0:0:0:0:0 or ::) is only used to indicate the absence of an address. It is equivalent to the IPv4 unspecified address of 0.0.0.0. The unspecified address is typically used as a source address for packets attempting to verify the uniqueness of a tentative address. The unspecified address is never assigned to an interface or used as a destination address. Loopback Address The loopback address (0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface, enabling a node to send packets to itself. It is equivalent to the IPv4 loopback address of 127.0.0.1. Packets addressed to the loopback address must never be sent on a link or forwarded by an IPv6 router. Mike: How is DNS handled? Enhancements to the Domain Name System (DNS) for IPv6 are described in RFC 1886 and consist of the following new elements: Host address (AAAA) resource record IP6.ARPA domain for reverse queries Note:  According to RFC 3152, Internet Engineering Task Force (IETF) consensus has been reached that the IP6.ARPA domain be used, instead of IP6.INT as defined in RFC 1886. The IP6.ARPA domain is the domain used by IPv6 for Windows Server 2003. The Host Address (AAAA) Resource Record: A new DNS resource record type, AAAA (called “quad A?), is used for resolving a fully qualified domain name to an IPv6 address. It is comparable to the host address (A) resource record used with IPv4. The resource record type is named AAAA (Type value of 28) because 128-bit IPv6 addresses are four times as large as 32-bit IPv4 addresses. The following is an example of a AAAA resource record:         host1.microsoft.com    IN    AAAA   FEC0::2AA:FF:FE3F:2A1C A host must specify either a AAAA query or a general query for a specific host name in order to receive IPv6 address resolution data in the DNS query answer sections. The IP6.ARPA Domain The IP6.ARPA domain has been created for IPv6 reverse queries. Also called pointer queries, reverse queries determine a host name based on the IP address. To create the namespace for reverse queries, each hexadecimal digit in the fully expressed 32-digit IPv6 address becomes a separate level in inverse order in the reverse domain hierarchy. For example, the reverse lookup domain name for the address FEC0::2AA:FF:FE3F:2A1C (fully expressed as FEC0:0000:0000:0000:02AA: 00FF:FE3F:2A1C) is: C.1.A.2.F.3.E.F.F.F.0.0.A.A.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.C.E.F.IP6.ARPA. The DNS support described in RFC 1886 represents a simple way to both map host names to IPv6 addresses and provide reverse name resolution. Mike: Can you discuss transition from IPv4 to IPv6? Mechanisms for transitioning from IPv4 to IPv6 are defined in RFC 1933. The primary goal in the transition process is a successful coexistence of the two protocol versions until such time as IPv4 can be retired if, indeed, it's ever completely decommissioned. Transition plans fall into two primary categories: dual-stack implementation, and IPv6 over IPv4 tunneling. More Info Mechanisms for transitioning from IPv4 to IPv6 are defined in RFC 1933. There are two primary methods. Dual Stack Implementation The simplest method for providing IPv6 functionality allows the two IP versions to be implemented as a dual stack on each node. Nodes using the dual stack can communicate via either stack. While dual-stack nodes can use IPv6 and IPv4 addresses that are related to each other, this isn't a requirement of the implementation, so the two addresses can be totally disparate. These nodes also can perform tunneling of IPv6 over IPv4. Because each stack is fully functional, the nodes can configure their IPv6 addresses via stateless autoconfiguration or DHCP for IPv6, while configuring their IPv4 addresses via any of the current configuration methods. IPv6 Over IPv4 Tunneling The second method for implementing IPv6 in an IPv4 environment is by tunneling IPv6 packets within IPv4 packets. These nodes can map an IPv4 address into an IPv4-compatible IPv6 address, preceding the IPv4 address with a 96-bit "0:0:0:0:0:0" prefix. Routers on a network don't need to immediately be IPv6-enabled if this approach is used, but Domain Name System (DNS) servers on a mixed-version network must be capable of supporting both versions of the protocol. To help achieve this goal, a new record type, "AAAA," has been defined for IPv6 addresses. Because Windows 2000 DNS servers implement this record type as well as the IPv4 "A" record, IPv6 can be easily implemented in a Windows 2000 environment. Mike: we've only touched on some of the IPv6 details - where can people get more information? I'm hoping to run a session at our summer conference July 28 - 31 in Austin, TX - we've currently got faculty fellowships available to cover the cost of the conference. See www.nctt.org for details. References - Content for this academic podcast from Microsoft sources: All Linked Documents at Microsoft Internet Protocol Version 6 (note: excellent and free online resources): http://technet.microsoft.com/en-us/network/bb530961.aspx Understanding IPv6, Joseph Davies, Microsoft Press, 2002 ISBN: 0-7356-1245-5 Sample Chapter at: http://www.microsoft.com/mspress/books/sampchap/4883.asp#SampleChapter

Gordon And Mike's ICT Podcast
The Next-Generation Internet: IPv6 Overview [33:00]

Gordon And Mike's ICT Podcast

Play Episode Listen Later Mar 16, 2008 33:00


Intro: The world has changed significantly since the Internet was first created. IPv6 gives over 4.3x1020 unique addresses for every square inch on the planet, and is going to allow us to do things we've only dreamed of in the past. In this podcast we give an overview of IPv6. Mike: Gordon, before we get into the technology, can you give us an update on IPv6 history in the United States? Sure Mike, this comes from a 1-minute history of the Internet by Federal Computer week at FCW.COM Mike: So, the federal government has ordered its agencies to become IPv6- capable by June of 2008 and this is going to happen in June on our federal government networks - how about businesses? It's  happening with business too Mike.  Let's take Verizon as an example as quoted in a Light Reading post from last September. Verizon Business, which began its first phase of deploying IPv6 on the public IP network in 2004, will complete the North America region in 2008 and move into the Asia-Pacific and European regions from late 2008 to 2009. The company will operate both IPv6 and IPv4, in what is known as a "dual stack" arrangement, on its multi protocol label switching (MPLS) network core. The company also has deployed IPv6 throughout its network access points (peering facilities) where Internet service providers exchange traffic. Mike: So, what's the problem with IPv4? It's a combination of a lot of things - Microsoft has a nice set of resources on IPv4 and IPv6 - let's use that as a guide: The current version of IP (known as Version 4 or IPv4) has not been substantially changed since RFC 791 was published in 1981. IPv4 has proven to be robust, easily implemented and interoperable, and has stood the test of scaling an internetwork to a global utility the size of today’s Internet. This is a tribute to its initial design. However, the initial design did not anticipate the following: The recent exponential growth of the Internet and the impending exhaustion of the IPv4 address space. IPv4 addresses have become relatively scarce, forcing some organizations to use a Network Address Translator (NAT) to map multiple private addresses to a single public IP address. While NATs promote reuse of the private address space, they do not support standards-based network layer security or the correct mapping of all higher layer protocols and can create problems when connecting two organizations that use the private address space. Additionally, the rising prominence of Internet-connected devices and appliances ensures that the public IPv4 address space will eventually be depleted. The growth of the Internet and the ability of Internet backbone routers to maintain large routing tables. Because of the way that IPv4 network IDs have been and are currently allocated, there are routinely over 85,000 routes in the routing tables of Internet backbone routers. The current IPv4 Internet routing infrastructure is a combination of both flat and hierarchical routing. The need for simpler configuration. Most current IPv4 implementations must be either manually configured or use a stateful address configuration protocol such as Dynamic Host Configuration Protocol (DHCP). With more computers and devices using IP, there is a need for a simpler and more automatic configuration of addresses and other configuration settings that do not rely on the administration of a DHCP infrastructure. The requirement for security at the IP level. Private communication over a public medium like the Internet requires encryption services that protect the data being sent from being viewed or modified in transit. Although a standard now exists for providing security for IPv4 packets (known as Internet Protocol security or IPSec), this standard is optional and proprietary solutions are prevalent. The need for better support for real-time delivery of data—also called quality of service (QoS). While standards for QoS exist for IPv4, real-time traffic support relies on the IPv4 Type of Service (TOS) field and the identification of the payload, typically using a UDP or TCP port. Unfortunately, the IPv4 TOS field has limited functionality and over time there were various local interpretations. In addition, payload identification using a TCP and UDP port is not possible when the IPv4 packet payload is encrypted. To address these and other concerns, the Internet Engineering Task Force (IETF) has developed a suite of protocols and standards known as IP version 6 (IPv6). This new version, previously called IP-The Next Generation (IPng), incorporates the concepts of many proposed methods for updating the IPv4 protocol. The design of IPv6 is intentionally targeted for minimal impact on upper and lower layer protocols by avoiding the random addition of new features. Mike: OK - can you list the primary features of IPv6? What makes it different? Sure Mike - this list also comes from Microsoft's website. The following are the features of the IPv6 protocol: New header format Large address space Efficient and hierarchical addressing and routing infrastructure Stateless and stateful address configuration Built-in security Better support for QoS New protocol for neighboring node interaction Extensibility Mike: Let's go through the list with a brief summary of each. Your first item on the list was the new header format. What's different? Mike: How about number 2, large address space?Mike: Number 3 was efficient and hierarchical addressing and routing infrastructure - can you describe?Mike: How about number 4, stateless and stateful address configuration?Mike: Number 5 was built-in security.Mike: How about number 6, better support for QoS? Mike: And number 7, new protocol for neighboring node interaction? Mike: And finally, number 8,  extensibility.Mike: Are there any other things you want to add to the list?Mike: Are we ready?I always look at the end devices (even though there is so much more) and, if we just look at desktops, you have to look at Microsoft.Microsoft started with the following implementations of IPv6, all subsequent versions/products continue to support IPv6:The IPv6 protocol for the Windows Server 2003 and later families.The IPv6 protocol for Windows XP (Service Pack 1 [SP1] and later).The IPv6 protocol for Windows CE .NET version 4.1 and laterThe capture and parsing of IPv6 traffic is supported by Microsoft Network Monitor, supplied with Microsoft Server 2003 and later products. Mike: This is a good overview - next week we'll get into some details on the IPv6 protocol!

Strike Point
Search Privacy Issues in Europe

Strike Point

Play Episode Listen Later Jan 29, 2008 35:11


The European Union is looking into search privacy issues. Mikkel and Dave discuss who would be affected if Internet Protocol addresses assigned to computers should be treated as personal information

Intellectual Icebergs
Int Ice, Episode 4: IPv6 and Leadership

Intellectual Icebergs

Play Episode Listen Later Oct 19, 2005 32:33


In this episode Tiffany speaks with Robert Rapplean about IPv6, the Internet Protocol slated to replace the current standard, IPv4. In the second part, Steve Hultquist returns to talk with Tiffany about his model of leadership. At the end of this episode, Rob and Tiffany tell you how you can earn an IntIce brain, and they make some other exciting announcements about the show.

Intellectual Icebergs
Int Ice, Episode 4: IPv6 and Leadership

Intellectual Icebergs

Play Episode Listen Later Oct 19, 2005 32:33


In this episode Tiffany speaks with Robert Rapplean about IPv6, the Internet Protocol slated to replace the current standard, IPv4. In the second part, Steve Hultquist returns to talk with Tiffany about his model of leadership. At the end of this episode, Rob and Tiffany tell you how you can earn an IntIce brain, and they make some other exciting announcements about the show.