Podcasts about Mac

Share on
Share on Facebook
Share on Twitter
Share on Reddit
Copy link to clipboard
  • 9,180PODCASTS
  • 43,460EPISODES
  • 50mAVG DURATION
  • 10+DAILY NEW EPISODES
  • Oct 17, 2021LATEST

POPULARITY

20112012201320142015201620172018201920202021


Best podcasts about Mac

Show all podcasts related to mac

Latest podcast episodes about Mac

MacCast (Enhanced) - For Mac Geeks, by Mac Geeks

An enhanced podcast about all things Macintosh. For Mac geeks, by Mac geeks. Episode 803. Apple has ‘unleashed' it's next event. Mac shipments up. Apple TV+ has a piracy problem. Apple Watch Series 7 is out. HomePod gets new software lead. Follow-up. Apple TV+ product placements. Faster backups. Faster Drives.. iOS Focus mode confusion. Special thanks to our sponsor: LinkedIn Jobs Hunter Douglas Shownotes in: HTML or OPML Subscribe to the Podcast Feed or Get the MP3

Apple Bitz XL w/ Brian Tong
'M1X' MacBook Pro & AirPods 'Unleashed' Apple Event Preview (Apple Bitz XL, Ep. 190)

Apple Bitz XL w/ Brian Tong

Play Episode Listen Later Oct 17, 2021 40:23


FREE Shipping and Returns, a 90-day money-back guarantee, plus a free THIRTY DAY supply with your first purchase at SuperBeets.com/applebitz It's everything we expect to see at Apple's 'Unleashed' Event! Will the new 'M1X' MacBook Pro's live up to the hype? And will we see AirPods 3 or even something else like the Mac mini make an appearance? There is one thing I ask for...NO NOTCH on the MacBook Pro, or else I will riot. You can help support this show and my independent work at www.patreon.com/briantong THANK YOU! Call into the show by recording a Voice Memo and send to applebitzshow@gmail.com

The Tech Guy (MP3)
Leo Laporte - The Tech Guy: 1837

The Tech Guy (MP3)

Play Episode Listen Later Oct 17, 2021 145:35


Tech goes wrong with Waymo cars and Canon printers, should I use a Chromebook online? The best system for Microsoft Flight Simulator, the best way to get over the top streaming, troubleshooting Windows crashes, opening PDF files in Windows, the best app for handling finances, saving to Libre Office in macOS, conversations with Scott Wilkinson, Johnny Jet, and Dick DeBartolo, and more of your calls! Host: Leo Laporte Guests: Scott Wilkinson, Johnny Jet, and Dick DeBartolo Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit For detailed show notes, visit techguylabs.com. Sponsors: audible.com/techguy or text techguy to 500-500 userway.org/twit twit.cachefly.com

The Tech Guy (Video HI)
Leo Laporte - The Tech Guy: 1837

The Tech Guy (Video HI)

Play Episode Listen Later Oct 17, 2021 146:16


Tech goes wrong with Waymo cars and Canon printers, should I use a Chromebook online? The best system for Microsoft Flight Simulator, the best way to get over the top streaming, troubleshooting Windows crashes, opening PDF files in Windows, the best app for handling finances, saving to Libre Office in macOS, conversations with Scott Wilkinson, Johnny Jet, and Dick DeBartolo, and more of your calls! Host: Leo Laporte Guests: Scott Wilkinson, Johnny Jet, and Dick DeBartolo Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit For detailed show notes, visit techguylabs.com. Sponsors: audible.com/techguy or text techguy to 500-500 userway.org/twit twit.cachefly.com

All TWiT.tv Shows (MP3)
The Tech Guy 1837

All TWiT.tv Shows (MP3)

Play Episode Listen Later Oct 17, 2021 145:35


Tech goes wrong with Waymo cars and Canon printers, should I use a Chromebook online? The best system for Microsoft Flight Simulator, the best way to get over the top streaming, troubleshooting Windows crashes, opening PDF files in Windows, the best app for handling finances, saving to Libre Office in macOS, conversations with Scott Wilkinson, Johnny Jet, and Dick DeBartolo, and more of your calls! Host: Leo Laporte Guests: Scott Wilkinson, Johnny Jet, and Dick DeBartolo Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit For detailed show notes, visit techguylabs.com. Sponsors: audible.com/techguy or text techguy to 500-500 userway.org/twit twit.cachefly.com

Radio Leo (Audio)
The Tech Guy 1837

Radio Leo (Audio)

Play Episode Listen Later Oct 17, 2021 145:35


Tech goes wrong with Waymo cars and Canon printers, should I use a Chromebook online? The best system for Microsoft Flight Simulator, the best way to get over the top streaming, troubleshooting Windows crashes, opening PDF files in Windows, the best app for handling finances, saving to Libre Office in macOS, conversations with Scott Wilkinson, Johnny Jet, and Dick DeBartolo, and more of your calls! Host: Leo Laporte Guests: Scott Wilkinson, Johnny Jet, and Dick DeBartolo Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit For detailed show notes, visit techguylabs.com. Sponsors: audible.com/techguy or text techguy to 500-500 userway.org/twit twit.cachefly.com

Catholic in a Small Town
CST #610: Hyperbolling

Catholic in a Small Town

Play Episode Listen Later Oct 16, 2021 83:07


Katherine goes full bundt, Mac & Kat enjoy a day out at NOFO, and Forsyth Co. education grinds to a halt for a practice test. We really like No Time to Die and Katherine says Lucifer's Hammer is a stupid title for a so-so book. Also, you are going to think we're getting paid to talk about Ari's Pre-Advent planner, but we're not. We just really like it.   Movies, TV, & Podcasts: No Time to Die (In theaters)   Books:  Lucifer's Hammer by Larry Niven and Jerry Pournelle   Other great stuff we like: Ari's Pre-Advent Planner maggieshouse.org Book Nook Publishing at Amazon Catholic Journeymen Mac's Online Woodcraft Store Willitsworks.com NerdyCatholicTees.com The Products we talk about Greg and Jennifer's Podcast Mac's book! Clueless in Galilee My author page at Amazon Please support us through Patreon Find us on our website Our libsyn page where you can find all our old episodes   Theme song by Mary Bragg. Our other show: Spoiled! with Mac and Katherine

Rene Ritchie
Apple M1X MacBook Pro 'Unleashed' Event — Finally Official!

Rene Ritchie

Play Episode Listen Later Oct 16, 2021 8:01


Three's Tea Podcast
"Ladies, Are We Doing Too Much?"

Three's Tea Podcast

Play Episode Listen Later Oct 16, 2021 64:56


The ladies of Three's Tea Podcast get a little hot in episode 7. Jade (@itsjadetho on IG/Twitter), Alexandria Davis (@Withlove_a_) and Miranda Dunn (@its_RANdemonium) head straight into Culture with Jelani Day's body being found in IL river, Memphis shooting, Kash Doll is pregnant, The View Hosts are plucked from set, Companies are Desperate to fill jobs, Canva Logos beware, Apple Wallets adds COVID card soon, Chauvin appeals his conviction in the George Floyd case, Kelly Price is missing & found, Charmain from Black Inc. is pregnant again, Diddy supports Joie Chavis on birthday, Cynthia Bailey is leaving RHOA, Alexis Skky loses bf to other man, Miguel & Nzanin split, Andrea Martin passes, Nick Cannon wraps Kevin Harts plane with is face, Ashanti owns her master and will rerelease 2002 debut album, MAC cosmetic is teaming up with Whitney Houston estate, Ray J tats Brandy's name on him, Jayda Wayda gets convicted on gun possession, Rotimi welcomes new born and so much more. The ladies slide in to Lifestyle with the premiere of BMF and update you on all their recently watched movies, tv shows, books and the BOTW. The ladies get right into the juicy topic, "Ladies, Are We Doing Too Much?".   Subscribe to our podcast! 

MacVoices Video
MacVoices #21196: MacVoices Live! - 'Unleashed' Anticipation (1)

MacVoices Video

Play Episode Listen Later Oct 16, 2021 39:11


This MacVoices Live! starts with a brief follow-up on last week's Facebook discussion before diving in to anticipation over Apple's “Unleashed” event. Find out what the panel of David Ginsburg, Jim Rea, Patrice Brend'amour, Warren Sklar, Brittany Smith, and Kelly Guimont thinks about what hardware will and will not be announced, whether there is any significance to the selection of a Monday vs. Tuesday event, and what would make each panel member pull out their credit card. (Part 1) This edition of MacVoices is supported by The MacVoices Slack. Available to silver, gold, and platinum Patrons of MacVoices. Sign up at Patreon.com/macvoices. Show Notes: Guests: Patrice Brend'amour is the creator, advocate and Product Manager of a global healthcare software initiative, which is not only pushing the industry to provide user-centered solutions using the latest advances in UX and technology, but also advancing the sharing of medical information between healthcare providers across the world. He is also an avid podcaster, mainly in the technology space, as well as a maintainer and contributor to a number of open source projects. Everything he does can be linked to from The Patrice, you can follow him on Twitter, and engage with him on the podcast, Foodie Flashback. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. Kelly Guimont is a podcaster and friend of the Rebel Alliance. She hosts the Daily Observations Podcast at MacObserver.com, and appears on The Incomparable network as well as hosts I Want My M(CU) TV. You can also hear her on The Aftershow with Mike Rose, and she still has more to say which she saves for Twitter. Jim Rea has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. Follow Jim at provue.com and via @provuejim on Twitter. Warren Sklar helps host the Mac to The Future Group on Facebook, and is the co-host of In Touch With iOS with David Ginsburg. Brittany Smith is a cognitive neuroscientist who provides a variety of consulting services through her business, Devise and Conquer that includes ADD/ADHD coaching, technology coaching, productivity consulting, and more. She is a self-designated “well-rounded geek”, and holds a M.S. degree in Cognitive Neuroscience. She can be found on Twitter as @addliberator. Check out her latest project, a YouTube channel of tech tips.   Links: Meet The Press Broadcast (Full) - October 10th, 2021 Support:      Become a MacVoices Patron on Patreon     http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:     http://macvoices.com      Twitter:     http://www.twitter.com/chuckjoiner     http://www.twitter.com/macvoices      Facebook:     http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:     http://www.facebook.com/macvoices/      MacVoices Group on Facebook:     http://www.facebook.com/groups/macvoice      LinkedIn:     https://www.linkedin.com/in/chuckjoiner/      Instagram:     https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes     Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

ZeMIXX par Joachim Garraud
Zemixx 832, 909 808 303

ZeMIXX par Joachim Garraud

Play Episode Listen Later Oct 16, 2021 60:00


01. Rezone - 909 808 303 (Original Mix) 02. Chester Young - Get Down (Extended Mix) 03. Hubinek x Sperbel - Funky Pills 04. POPOF - Revival 05. Houseium - Buck Wild (Extended Mix) 06. Moreno Pezzolato - Faithless (Original Mix) 07. AYOR - Bad Girls (Extended Mix) 08. Antoine Delvig - Techno 99 (Extended) 09. Mescal Kid - Rave n Roll 10. Laurent H. Feat Size 9 - Im ready 11. The Cube Guys vs. Deniz Koyu - Amertune 12. Mac x Ward - I Go Up 13. Tensile - Dance Now 14. BlockForm - Acid Rain (Original Mix) 15. Beyond Therapy X Echofly x Angie Brown - Higher (Beyond Therapy Extended Rave Mix) 16. Keeld ft. Rhiannon Roze - Get Down 17. Blvckr - Bizznizz 18. Bouncin (Extended Mix) 19. Wearebrut - Military Game

ZeMIXX by Joachim Garraud (Intl version)
Zemixx 832, 909 808 303

ZeMIXX by Joachim Garraud (Intl version)

Play Episode Listen Later Oct 16, 2021 60:00


01. Rezone - 909 808 303 (Original Mix) 02. Chester Young - Get Down (Extended Mix) 03. Hubinek x Sperbel - Funky Pills 04. POPOF - Revival 05. Houseium - Buck Wild (Extended Mix) 06. Moreno Pezzolato - Faithless (Original Mix) 07. AYOR - Bad Girls (Extended Mix) 08. Antoine Delvig - Techno 99 (Extended) 09. Mescal Kid - Rave n Roll 10. Laurent H. Feat Size 9 - Im ready 11. The Cube Guys vs. Deniz Koyu - Amertune 12. Mac x Ward - I Go Up 13. Tensile - Dance Now 14. BlockForm - Acid Rain (Original Mix) 15. Beyond Therapy X Echofly x Angie Brown - Higher (Beyond Therapy Extended Rave Mix) 16. Keeld ft. Rhiannon Roze - Get Down 17. Blvckr - Bizznizz 18. Bouncin (Extended Mix) 19. Wearebrut - Military Game

In Touch with iOS
173 - Your iPad and a Luna Display - With Guests Patrice Brend'Amour and Jeff Gamet

In Touch with iOS

Play Episode Listen Later Oct 16, 2021 62:24


The latest In Touch With iOS with Dave and Warren are joined by Patrice Brend'amour and Jeff Gamet. Luna Display is not sherlocked anymore you can use your iPad as 2nd display on Windows. iOS 15.0.2 released must update with security fixes. Apple Watch series 7 about to be released. Who is buying one? More iOS15 tips and more.  The show notes are at InTouchwithiOS.com 
Direct Link to Audio News Apple Quietly Extends AirPods Pro Repair Program That Addresses Crackling/Static Apple to Cut iPhone Production Goals by as Many as 10 Million Units Due to Chip Shortages Google will stop trying to make its iOS apps look like Android apps Luna Display can now turn your iPad into a secondary display for Windows PCs 'The Problem with Jon Stewart' takes top spot as Apple's most viewed unscripted series How an AirTag owner used it to find their stolen vehicle Topics Apple just fixed zero-day iPhone flaw with iOS 15.0.2 — update now Beta this week. iOS 15.1 Beta 4 was released this week.  Apple Seeds Fourth Betas of iOS and iPadOS 15.1 to Developers Apple Seeds Fourth Beta of watchOS 8.1 to Developers Apple Seeds Fourth Beta of tvOS 15.1 to Developers Warren has the iPad Mini 6 and gives his review.  Apple Event October 2021 Apple Event on MacRumors Redesigned AirPods Expected to be Announced During Monday's 'Unleashed' Apple Event Apple Watch delivery Warren has one coming he wants green! We discuss if we are upgrading.  Tips More iOS 15 tips Drag Apps From Spotlight to Home Screen Save Multiple Web Images to Your Photo Album In ‌iOS 15‌, Apple gives users the ability to drag and drop images, text, files, and more across apps on ‌iPhone‌. In many apps, you can drag a single item with one finger, and while dragging, select additional items by tapping them with another finger. The selected items move together and appear stacked beneath the finger that's dragging the original item. You can then drag the items as a group and drop them into another app. Disable Badge App Notifications App badge notifications can be disabled when users are in Do Not Disturb or "Focus" mode. Go to Settings -> Focus, and choose either Do Not Disturb or any of the other Focus modes listed. Then under "Options," select ‌Home Screen‌ and turn on the switch next to Hide Notification Badges. How to Take a Screenshot of Apple CarPlay Our Host David Ginsburg is an IT professional supporting Mac, iOS and Windows users and his wealth of knowledge of iPhone, iPad, Apple Watch, and Apple TV. Visit the YouTube channel https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. About our Guests Patrice Brend'amour loves to create podcasts, automations or software. She also enjoys working with diverse sets of people, leading them to success and making a tiny difference in the world. Which she does as VP of Development at a Healthcare Software provider. She can be found at https://the-patrice.com and her podcast Foodie Flashback at https://foodieflashback.com Jeff Gamet is a podcaster, technology blogger, artist, and author. Previously, he was The Mac Observer's managing editor, and Smile's TextExpander Evangelist. You can find him on Twitter and Instagram as @jgamet and YouTube https://youtube.com/jgamet About our Co-Host Co-Host Warren Sklar @Wsklar is an IT Consultant and moderator of the Mac To The Future FaceBook Group with over 3000 members talking about all things Apple. Request to join this group to be among people who love Apple.

MacVoices Video
MacVoices #21195: MacVoices Live! - Bring Your Own Device vs. Choose Your Own Device (3)

MacVoices Video

Play Episode Listen Later Oct 16, 2021 36:01


This MacVoices Live! discussion with David Ginsburg, Jeff Gamet, Jim Rea, Guy Serle, Warren Sklar, Mark Fuccio, Patrice Brend'Amour, Jay Miller, Brittany Smith, and Kelly Guimont shifts to a hot topic in the business world: bring your own device (BYOD) vs. choose your own device (CYOD). Which is better for you? Which is better for your employer? Is your personal device at risk if you use it for work? Or would you rather select your preferred laptop or phone, and let the company foot the bill. The answers are far more complex than you might think. Watch and learn how to make an informed decision. (Part 3)   MacVoices Magazine, our free magazine on Flipboard. Updated daily with the best articles on the web to help you do more with your Apple, access MacVoices Magazine content on Flipboard, on the web, or in your favorite RSS reader. Show Notes: Links: MacJury #1111: Remembering the Impact of Steve Jobs Apple @ Work: Does ‘BYOD' make sense for remote organizations who use Apple? on 9-5 Mac Global Study: Nearly Nine in Ten Employees (89%) Would be Willing to Take a Pay Cut if Their Employer Let Them Choose Their Work Device Guests: Patrice Brend'amour is the creator, advocate and Product Manager of a global healthcare software initiative, which is not only pushing the industry to provide user-centered solutions using the latest advances in UX and technology, but also advancing the sharing of medical information between healthcare providers across the world. He is also an avid podcaster, mainly in the technology space, as well as a maintainer and contributor to a number of open source projects. Everything he does can be linked to from The Patrice, you can follow him on Twitter, and engage with him on the podcast, Foodie Flashback. Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter on LinkedIn. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, and jeffgamet on LinkedIn., and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. Kelly Guimont is a podcaster and friend of the Rebel Alliance. She hosts the Daily Observations Podcast at MacObserver.com, and appears on The Incomparable network as well as hosts I Want My M(CU) TV. You can also hear her on The Aftershow with Mike Rose, and she still has more to say which she saves for Twitter. Jay Miller is a Developer Advocate and Podcaster based in San Diego, Ca. A multipotentialite, Jay enjoys finding unique ways to merge his fascination with productivity, automation, and development to create tools and content to serve the tech community.Hear him on his podcast, Conduit and Youtube.com/kjaymiller or checkout his web site at kjaymiller.com. Jim Rea has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. Follow Jim at provue.com and via @provuejim on Twitter. Guy Serle, best known for being one of the co-hosts of the MyMac Podcast, sincerely apologizes for anything he has done or caused to have happened while in possession of dangerous podcasting equipment. He should know better but being a blonde from Florida means he's probably incapable of understanding the damage he has wrought. Guy is also the author of the novel, The Maltese Cube. You can follow his exploits on Twitter, catch him on Mac to the Future on Facebook, and find everything at VertShark.com. Warren Sklar helps host the Mac to The Future Group on Facebook, and is the co-host of In Touch With iOS with David Ginsburg. Brittany Smith is a cognitive neuroscientist who provides a variety of consulting services through her business, Devise and Conquer that includes ADD/ADHD coaching, technology coaching, productivity consulting, and more. She is a self-designated “well-rounded geek”, and holds a M.S. degree in Cognitive Neuroscience. She can be found on Twitter as @addliberator. Check out her latest project, a YouTube channel of tech tips. Support:      Become a MacVoices Patron on Patreon     http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:     http://macvoices.com      Twitter:     http://www.twitter.com/chuckjoiner     http://www.twitter.com/macvoices      Facebook:     http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:     http://www.facebook.com/macvoices/      MacVoices Group on Facebook:     http://www.facebook.com/groups/macvoice      LinkedIn:     https://www.linkedin.com/in/chuckjoiner/      Instagram:     https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes     Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

Craig Peterson's Tech Talk
How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why?

Craig Peterson's Tech Talk

Play Episode Listen Later Oct 15, 2021 84:46


How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why? We've got a new study out showing that North American organizations, businesses, and others, are being hit with an average of 497 cyber attacks per week, right here in the good old USA. [Following is an automated transcript] This is a study by checkpoint software technologies. Checkpoint, I used, oh my gosh. It would have been back in the nineties back then. They were one of the very first genuine firewall companies. And it was a system that I was putting in place for my friends over at troopers. I think it was New England telephone. It might've been Verizon by then. I can't even remember, man. [00:00:41] It's been a little while, but it was, a system we were using in front of this massive system that I designed, I made the largest internet property in the world. At that time called big yellow. It morphed into super pages. It might be familiar with. But it was me and my team that did everything. We built the data center out. [00:01:05] We wrote all of the software. Of course they provided all of the yellow pages type listing so we can put it all in. And we brought it up online and we were concerned. Well, first of all, You know, I've been doing cyber security now for over 30 years. And at this point in time, they wanted something a little more than my home grown firewall. [00:01:29] Cause I had designed and written one in order to protect this huge asset that was bringing in tens of millions of dollars a year to the phone company. So they said, Hey, listen, let's go ahead and we'll use checkpoint and get things going. We did, it was on a little, I remember it was a sun workstation. If you remember those back in the. [00:01:52] And it worked pretty well. I learned how to use it and played with it. And that was my first foray into kind of what the rest of the world had started doing, this checkpoint software, but they've continued on, they make some great firewalls and other intrusions type stuff, detection and blocking, you know, already that I am a big fan, at least on the bigger end. [00:02:17] You know, today in this day and age, I would absolutely use. The Cisco stuff and the higher end Cisco stuff that all ties together. It doesn't just have the fire power firewall, but it has everything in behind, because in this day and age, you've got to look at everything that's happening, even if you're a home user. [00:02:37] And this number really gets everybody concerned. Home users and business users is. Businesses are definitely under bigger attacks than home users are. And particularly when we're talking about businesses, particularly the bigger businesses, the ones that have a huge budget that are going to be able to go out and pay up, you know, a million, $10 million ransom. [00:03:05] Those are the ones that they're after and this analysis. Point software who does see some of those attacks coming in, showed some very disturbing changes. First of all, huge increases in the number of cyber attacks and the number of successful ransoms that have been going on. And we're going to talk a little bit later, too, about where some of those attacks are coming from, and the reason behind those attack. [00:03:36] According to them right now, the average number of weekly attacks on organizations globally. So far, this year is 40% higher than the average before March, 2020. And of course that's when the first lockdowns went into effect and people started working from home in the U S the. Increase in the number of attacks on an organizations is even higher at 53%. [00:04:07] Now you might ask yourself why, why would the U S be attacked more? I know you guys are the best and brightest, and I bet it, I don't even need to say this because you can figure this out yourself, but the us is where the money is. And so that's why they're doing it. And we had president Biden come out and say, Hey, don't attack the. [00:04:27] well, some of those sectors are under khaki for more after he said that then before, right. It's like giving a list to a bad guy. Yeah. I'm going to be gone for a month in June and yeah, there won't be anybody there. And the here's the code to my alarm. Right. You're you're just inviting disaster checkpoints. [00:04:49] Also showing that there were more. Average weekly attacks in September 21. That's this September than any time since January, 2020. In fact, they're saying 870 attacks per organization globally per week. The checkpoint counted in September was double the average in March, 2020. It's kind of funny, right? [00:05:14] It's kind of like a before COVID after COVID or before the Wu Han virus and after the Wu Han virus, however, we might want to know. So there are a lot of attacks going on. Volume is pretty high in a lot of different countries. You've heard me say before some of my clients I've seen attack multiple times a second, so let's take a second and define the attack because being scanned. [00:05:40] I kind of an attack, the looking to see, oh, where is there a device? Oh, okay. Here's a device. So there might be a home router. It might be your firewall or your router at the business. And then what it'll do is, okay, I've got an address now I know is responding, which by the way is a reason. The, we always configure these devices to not respond to these types of things. [00:06:04] And then what they'll do is they will try and identify it. So they'll try and go into the control page, which is why you should never have when. Configuration enabled on any of your routers or firewalls, because they're going to come in and identify you just on that because all of a sudden them brag about what version of the software you're running. [00:06:26] And then if it's responding to that, they will try and use a password. That is known to be the default for that device. So in a lot of these devices, the username is admin and the password is admin. So they try it and now off they go, they're running. Some of these guys will even go the next step and we'll replace the software. [00:06:52] In your router or firewall, they will replace it so that it now directs you through them, everything you are doing through them. So they can start to gather information. And that's why you want to make sure that the SSL slash TLS. That encryption is in place on the website. You're going to, so if you go to Craig peterson.com right now, my website, I'm going to go there myself. [00:07:22] So if you go to Craig peterson.com, you're going to notice that first of all, it's going to redirect you to my secure site and it doesn't really matter. You won't see it. Okay. But you are there because if he. Typically at the left side of that URL bar where it says, Craig peterson.com. You'll see, there's a little lock. [00:07:44] So if you click that lock, it says connection is secure. Now there's a lot more we could go into here. But the main idea is even if your data is being routed through China or. Both of which have happened before many tens of thousands, hundreds of thousands of time times. I'm not even sure of the number now. [00:08:06] It's huge. Even if your data is being routed through them, the odds are, they're not going to see anything. That you are doing on the Craig Peterson site. Now, of course you go into my site, you're going to be reading up on some of the cybersecurity stuff you can do. Right. The outages what's happened in the news. [00:08:27] You can do all of that sort of thing on my side, kind of, who cares, right? Um, but really what you care about is the bank, but it's the same thing with the bank. And I knew mine was going to be up there. And when everybody just check it out anyway, so. So the bad guys, then do this scan. They find a web page log in. [00:08:47] They try the default log in. If it works, the Le the least they will do is change. What are called your DNS settings. That's bad because changing your DNS settings now opens you up to another type of attack, which is they can go ahead. And when your browser says, I want to go to bank of america.com. It is in fact, going to go out to the internet, say is bank of America, the bad guys. [00:09:18] Did, and they will give you their bank of America site that looks like bank of America feels like bank of America. And all they're doing is waiting for you to type into your bank of America, username and password, and then they might redirect you to the. But at that point, they've got you. So there are some solutions to that one as well, and Firefox has some good solutions. [00:09:44] There are others out there and you had to have those that are in the works, but this is just an incredible number. So here's what I'm doing, right. I have been working for weeks on trying to figure out how can I help the most people. And obviously I needed to keep the lights on, right? I've got to pay for my food and gas and stuff, but what I'm planning on doing and what we've sketched out. [00:10:10] In fact, just this week, we got kind of our final sketch out of it is we're going to go ahead and have a success path for cyber security. All of the basic steps on that success path will be. Okay. So it will be training that is absolutely 100% free. And I'll do a deeper dive into some of these things that I'm doing that I'm doing right now here on the radio, because you can't see my desktop. [00:10:40] It's hard to do a deep dive and it's open to anybody, right? If you're a home user or if you're a business user, all of the stuff on that free. Is going to help you out dramatically. And then after that, then there'll be some paid stuff like a membership site. And then obviously done for you. If the cybersecurity stuff is just stuff that you don't want to deal with, you don't have the time to deal with. [00:11:05] You don't want to learn, because believe me, this is something that's taken me decades to learn and it's changing almost every day. So I understand if you don't want to learn it to. That is the other option. I'll give you, which is done for you, which we've been doing now for over 20, 30 years. Stick around. [00:11:25] We'll [00:11:25] So which sectors are economy are being hacked? I mentioned that in the last segment, but yeah, there are some problems and the sectors that president Biden lined out laid out are, are the ones that are under, even more attack after his message. [00:11:42] 497 cyber attacks per week. On average here in the US, that is a lot of attacks. And we started explaining what that meant so that we talked about the scan attacks that are automated and some person may get involved at some point, but the automated attacks can be pretty darn automated. Many of them are just trying to figure out who you are. [00:12:09] So, if it shows up, when they do that little scan that you're using a router that was provided by your ISP, that's a big hint that you are just a small guy of some sort, although I'm shocked at how many bigger businesses that should have their own router, a good router, right. A good Cisco router and a really good next generation firewall. [00:12:34] I'm shocked at how many don't have those things in place, but when they do this, That's the first cut. So if you're a little guy, they'll probably just try and reflash your router. In other words, reprogram it and change it so that they can start monitoring what you're doing and maybe grab some information from. [00:12:56] Pretty simple. If you are someone that looks like you're more of a target, so they connect to your router and let's say, it's a great one. Let's say it's a Cisco router firewall or Palo Alto, or one of those other big companies out there that have some really good products. Uh, at that point, they're going to look at it and say, oh, well, okay. [00:13:18] So this might be a good organization, but when they get. To it again, if when access has turned on wide area, access has turned down, that router is likely to say, this is the property of, uh, Covina hospital or whatever it might be, you know? And any access is disallowed authorized access only. Well, now they know. [00:13:42] Who it is. And it's easy enough just to do a reverse lookup on that address. Give me an address anywhere on the internet. And I can tell you pretty much where it is, whose it is and what it's being used for. So if that's what they do say they have these automated systems looking for this stuff it's found. [00:14:02] So now they'll try a few things. One of the first things they try nowadays is what's called an RDP attack. This is a remote attack. Are you using RDP to connect to your business? Right? A lot of people are, especially after the lockdown, this Microsoft. Desktop protocol has some serious bugs that have been known for years. [00:14:25] Surprisingly to me, some 60% of businesses have not applied those patches that have been available for going on two years. So what then button bad guys will do next. They say, oh, is there a remote desktop access? Cause there probably is most smaller businesses particularly use that the big businesses have a little bit more expensive, not really much more expensive, but much better stuff. [00:14:51] You know, like the Cisco AnyConnect or there's a few other good products out there. So they're going to say, oh, well, okay. Let's try and hack in again. Automate. It's automated. No one has to do anything. So it says, okay, let's see if they patch, let's try and break in a ha I can get in and I can get into this particular machine. [00:15:14] Now there's another way that they can get into their moat desktop. And this apparently has been used for some of the bigger hacks you've heard about recently. So the other way they get in is through credential stuff. What that is is Hey, uh, there are right now some 10 billion records out on the dark web of people's names, email addresses, passwords, and other information. [00:15:43] So, what they'll do is they'll say, oh, well this is Covina hospital and it looks it up backwards and it says, okay, so that's Covina hospital.org. I have no idea if there even is a Gavino hospital, by the way, and will come back and say, okay, great. So now let's look at our database of hacked accounts. Oh, okay. [00:16:04] I see this Covina hospital.org email address with a password. So at that point they just try and stuff. Can we get in using that username and password that we stole off of another website. So you see why it's so important to be using something like one password, a password generator, different passwords on every site, different usernames on every site, et cetera, et cetera. [00:16:29] Right. It gets pretty important per te darn quickly. So now that they're in, they're going to start going sideways and we call that east west in the biz. And so they're on a machine. They will see what they can find on that machine. This is where usually a person gets some. And it depends in historically it's been about six days on average that they spend looking around inside your network. [00:17:00] So they look around and they find, oh yeah, great. Here we go. Yep. Uh, we found this, we found that. Oh, and there's these file server mounts. Yeah. These SMB shares the, you know, the Y drive the G drive, whatever you might call it. So they start gaining through those and then they start looking for our other machines on the network that are compromised. [00:17:23] It gets to be really bad, very, very fast. And then they'll often leave behind some form of ransomware and also extortion, where that extort you additionally, for the threat of releasing your data. So there, there are many other ways they're not going to get into them all today, but that's what we're talking about. [00:17:43] Mirman, we're talking about the 500 cyber attacks per week against the average. North American company. So we have seen some industry sectors that are more heavily targeted than others. Education and research saw an 60% increase in attacks. So their education and I've tried to help out some of the schools, but because of the way the budgets work and the lowest bidder and everything else, they, they end up with equipment. [00:18:17] That's just totally misconfigured. It's just shocking to me. Right. They buy them from one of these big box online places. Yeah. I need a, a Cisco 10, 10. And I need some help in configuring it and all, yeah, no problems or we'll help you. And then they sell it to the school, the school installs it, and it is so misconfigured. [00:18:38] It provides zero protection, uh, almost zero, right. It provides almost no protection at all. And doesn't even use the advanced features that they paid for. Right. That's why, again, don't buy from these big box. Guys just don't do it. You need more value than they can possibly provide you with. So schools, 1500 attacks per week research companies, again, 1500 attacks per week, government and military. [00:19:10] Entities about 1100 weekly attacks. Okay. That's the next, most highest attacked. Okay. Uh, health care organizations, 752 attacks per week on average. Or in this case, it's a 55% increase from last year. So it isn't just checkpoints data that I've been quoting here. That, that gives us that picture. There are a lot of others out there IBM's has Verizon's has all of these main guys, and of course in the end, They've got these huge ransoms to deal with. [00:19:50] Hey, in New Hampshire, one of the small towns just got nailed. They had millions of dollars stolen, and that was just through an email trick that they played in. K again. I T people, um, I I've been thinking about maybe I should put together some sort of coaching for them and coaching for the cybersecurity people, even because there's so much more that you need to know, then you might know, anyways, if you're interested in any of this. [00:20:22] Visit me online. Craig peterson.com/subscribe. You will get my weekly newsletter, all of my show notes, and you'll find out about these various trainings and I keep holding. In fact, there's one in most of the newsletters. Craig peterson.com. Craig Peterson, S O n.com. Stick around. [00:20:43] We've been talking about the types of attacks that are coming against us. Most organizations here in north America are seeing 500 cyber attacks a week, some as many as 1500. Now, where are they coming from? [00:21:00] Whether they're scanning attacks, whether they're going deeper into our networks and into our systems who are the bad guys and what are they doing? Microsoft also has a report that they've been generating, looking at what they consider to be the source of the attacks. Now we know a lot of the reasons I'm going to talk about that too, but the source is an interesting way to look at. [00:21:29] Because the source can also help you understand the reason for the attacks. So according to dark reading, this is kind of an insider, a website you're welcome to go to, but it gets pretty darn deep sometimes, but they are showing this stats from Microsoft, which you can find online that in the last year rush. [00:21:53] Has been the source of 58% of the cyber cat tax. Isn't that amazing now it's not just the cyber attacks. I, I need to clarify this. It's the nation state cyber tech. So what's a nature's nation state cyber attack versus I don't know, a regular cyber attack. Well, the bottom line is a nation state cyber attack is an attack that's occurring and is actually coordinated and run by and on behalf of a nation state. [00:22:31] Uh, So Russia at 58% of all nation state attacks is followed by North Korea, 23% Iran, 11% China, 8%. Now you probably would have thought that China would be. Right up there on that list, but Russia has 50% more of the nation state cyber attacks coming from them than from China. And then after China is south Vietnam, Viet, or I should say South Korea, Vietnam, and Turkey, and they all have less than 1%. [00:23:14] Now, this is this new pool of data that Microsoft has been analyzing. And it's part of this year's Microsoft digital defense report, and they're highlighting the trends in the nation state threat cyber activity hybrid workforce security. Disinformation and your internet of things, operational technology and supply chain security. [00:23:35] In other words, the whole gambit before, before all of this, now the data is also showing that the Russian nation state attacks are increasingly effective, calming from about a 21% successful compromise rate last year to 32%. So basically 50% better this year at effectiveness there, Russians are also targeting more government agencies for intelligence gathering. [00:24:10] So that jumped from 3% of their victims last year to 53%. This. And the Russian nation state actors are primarily targeting guests who us, right? The United States, Ukraine and the United Kingdom. Now this is all according to the Microsoft data. So why has Russia been attacking us? Why is China been attacking us and why the change this. [00:24:38] Well, Russia has been attacking us primarily to rent some us it's a cash cow for them just like oil and gas. They are making crazy money. Now that president Biden has made us dependent on foreign oil supplies. It's just insanity and even dependent on. Gas coming from other places. Well guess where the number one source of gases now for Europe and oil it's Russia. [00:25:08] So we are no longer going to be selling to Europe. Russia is so they're going to be making a lot of money off of. But before then they were actually counted on ransomware to help fund the Russian federal government, as well as of course, these Russian oligarchs, these people who are incredibly rich that have a substantial influence on the government. [00:25:33] Don't if you're wondering who they might be, just think of people like, oh, I don't know. Bill gates and, uh, w who are on the, some of the other big guys, you know, Tim cook, uh, Amazon's Jeff bayzos Elon Musk, right? Those are by my definition and looking it up in the dictionary, they are all a. They get exemptions to laws. [00:25:58] They get laws passed that, protect them. In fact, most of regulations actually protect these big companies and hurt small companies. So I would call them oligarchs and that's the same sort of thing in Russia in Russia. Okay. They probably have a little bit more underhanded stuff than these guys here do, but that's what Russia has been. [00:26:21] China has been continually going after our national secrets, national defense, the largest database of DNA of Americans DNA, of course, is that unique key. If you will building block for all of us, that's what DNA is. And the largest database of all of that uniquely identifying information is in. China stole from the office of personnel management records of a federal employees, their secret clearance, all of their background check information who was spoken with, what did they have to say? [00:27:03] And on and on. So China has been interested in infiltrating our businesses that provide things to the military and the military themselves and the federal state, and even the local governments that's who they've been targeting. And that's why there's 8% number might seem small. Although, as I just mentioned this year, Russia moved, moved dramatically. [00:27:30] They used to be about 3% of their attacks or against the government agencies. And now it's 53%. So Russia. And China are going after our national secrets and they can use them in a cold war, which as I've said, I think the first shots of the third world war have been fired. And frankly, they're all cyber, it's all online and Russia. [00:27:57] Isn't the only nation state actor who's changing its approaches here as espionage is the most common goal amongst all nation state groups as of this year. Tivity of hackers reveals different motivations in Iran, which quadrupled its targeting of Israel. Surprise, surprise. Over the last year. And Iran has been launching destructive attacks, things that will destroy power, power plants, et cetera, and North Korea, which is targeting cryptocurrency companies for profit. [00:28:29] So they're stealing these various crypto coins again, funding their government. So it's, it's a problem. Absolute problem. Government sectors are some of the most targeted 48%. These NGOs non-government organizations that act kind of a quasi government functions and think tanks are 31%. Uh, and Microsoft, by the way, has been alerting customers of nation, state attack, attack attempts. [00:29:01] Guess how many this year that they had to warn about 20,500 times in the past three years. So that's a lot and Microsoft is not a company that's been out there at the front lines. It never has been it's in behind. So to have them come out and say, this is. And okay, by the way, your stolen username and password run for a buck per thousand, and it's only gonna take you hundreds of hours to get it all cleared up. [00:29:32] Isn't that nice spear fishing for a hire can cost a hundred to a thousand dollars per successful account takeover and denial of service attacks are cheap from protected sites, roughly $300. Per month. And if you want to be ransomware king, it's only going to cost you 66 bucks upfront 30% of the profit. [00:29:54] Okay. Craziness. Hey, visit me online. Sign up Craig, peter.com/subscribe. [00:30:03] I had an interesting mastermind meeting this week. There's six of us. We're all business owners and it opened my eyes pretty dramatically because one of the members got hacked, but that's not what I really want to emphasize. [00:30:20] This whole cybersecurity thing gets pretty complicated, pretty quickly. And a friend of mine who is in one of my mastermind groups had a real problem. And the here's here's what went on. We'll call him Walt for back of a letter, lack of a better name since that is his name. [00:30:40] And he doesn't mind me sharing this with you. Walt has a very small business that he and his wife run, and they have a couple of contractors that help out with some things, but his business is very reliant on advertising and primarily what he does is Facebook advertising. Now I've been talking for two years, I think in this mastermind group about cyber security and the fact that everyone needs good cyber security. [00:31:13] And he always just kind of pole hum to, uh, wow. You know, and it's just too complicated for me. I got to thinking for a, you know, a bit, really a few weeks, what does he mean to complicated? Cause there's some basic things you can do. So this week on Tuesday, I was on our mastermind groups meeting and I explained, okay, so here's what happened to Walt. [00:31:42] He had $40,000 stolen, which by the way, it's a lot of money for a teeny tiny husband wife company. And. Uh, well, here's what we did. He, we helped them. We got the FBI involved and, you know, with our direct ties, cause we work with them on certain types of cases and he got back every dime, which is just totally unheard of. [00:32:06] But um, without going into all of the details there, I spent a problem. 1520 minutes with the whole group and the mastermind explaining the basics of cyber security. And that really kind of woke me up, frankly, because of their responses. Now these are all small business owners and so they're making pretty decent money. [00:32:31] In fact, every one of them and they all have some contractors and some employees all except for Walt and his wife, they had just have contractors and. I had two completely different responses from two members of this group that no. Let me tell you this was really eye opening for me. And this is why you might've heard me in the first segment talking about this, but this is why I have really changed my view of this stuff, this cybersecurity stuff, because I explained. [00:33:08] If you're using things like Norton antivirus or McAfee, antivirus, or really any of them, even the built-in Microsoft defender this year, those standard antivirus system. I have only been able to catch about 30% of the malware out there, 30%, you know, that's like having a house and you've got a security guard posted out front. [00:33:39] He's armed, he's ready to fight. And yet all of your windows are open and all of your doors are unlocked. And all someone has to do is crawl in the side window because that guy that's posted up front, he's not going to be able to stop. So 30% effectiveness. And of course, Walt had all of the basic stuff. [00:33:59] He thought he was good enough. It's not worth spending time or money doing any of this. And of course it turned out to be well worth the time and money if he had done it. But he has a friend who has contacts and, and made things happen for him. So I guess he's kind of, kind of lucky in that regard, but I explained that and I said, do you know the, the way you. [00:34:21] To go. If you're a small business, it's about $997 a month for a small business, with a handful of employees to get the type of security you really need. There's going to catch. 90 something 98%. Maybe if, if things go well of the stuff going on, in other words, you don't just have an armed guard at the front door. [00:34:46] You've got all the windows closed and blocked and the doors closed and locked as well. So yeah, somebody can still get in, but they got to really want to get in and risk getting caught. So that's kind of the analogy that I used now. One of the members of my. Of my mastermind thought, well, okay. Cause you're just being Frank with me. [00:35:09] Right? We're all friends. She said, well, initially I thought, oh Craig, I'm going to have to have you help out with stuff here. Cause my, you know, I'm concerned about my security. I make some good money. Uh, she's the one that has employee. She has a million dollar plus a year business and she wants to keep it safe. [00:35:26] But then she. Uh, you know, but, but you know, you were talking about all of this Norton and stuff and that it doesn't work. So I, I just, I don't have any hope. And that's when the another member jumped in and this other member said, well, Uh, oh, that's not what I got at all. I got the, the normal off the shelf stuff that you buy that you're going to get from Amazon, or you're going to get from PC connection or wherever that stuff is not going to work, but there is stuff that does, but it's only professional stuff. [00:36:02] You can only get it from professionals that are trained in certified. Which is the right message. Right. That was the message I was trying to relay. Yeah. Don't try and do it yourself because you can't even get the right tools that you need. That is frankly a problem. So that really got me to think. In, in a very big way, because here are two people that have heard me talk about cybersecurity and their eyes probably glazed over, but now their eyes, I know at least one of these ladies definitely glazed over. [00:36:36] So I've come to the realization that sometimes I. A little too deep into things. And although I can explain it quite well to many people, sometimes people glaze over and I get emails from you guys saying kind of the same thing. I really appreciate it. I don't understand a lot of what you're saying, Craig, but thanks for being there. [00:36:59] Listen to you every week here on the radio. Uh, then that's good. That's reassuring, but now I've come to realize a few things. One is. The I've got to be a lot clearer in my messaging, because even when talking to my friends, it is a little bit overwhelming for them sometimes. Right. And then the next thing is everybody needs help because you're being lied to. [00:37:29] Right. How are people getting ransomware? If the stuff that they're buying work. Maybe it's just me, but I think there's a disconnect there. So a lot of you guys have gone out and you've hired people and I want to spend just a few minutes right now, going through some red flags that you need to be looking out for in vendor security assessment. [00:37:56] Now I'm putting one together. As well, right yet another one. Uh, and what I'm trying to do is help you out, right? This is not as sales tool. It is trying to help you figure out where you're at. I'm putting together a webinar that I'm going to be holding these what I'm calling bootcamps, where I go through and show you exactly how to do the basic steps that you need to do in order to be safe on. [00:38:25] Okay. If an online, all that means is your, is plugged in, right. Okay. It doesn't mean you're going out and doing a lot of stuff out there on the internet just means it's connected. So those are going to be coming out. I will send an email out as soon as all of that. Stuff's ready. Cause. Absolutely free. And these assessments, I have the basic one that you can do yourself. [00:38:47] It's a self-assessment. And then I have the more advanced ones that I do that are five grand. Okay. So you've got to be a decent sized business for this to make sense where we look for all of the security problem. On all of your computers and your networks, and then give you a list of things you need to do and how to do them. [00:39:10] Okay. So it's well worth it for them, but if you're a very small company and you're trying to do some of this yourself, I want to help you. So that's what these boot camps are going to be all over. And also what the scorecard is going to be all about. So that's coming up, but here are some good red flags and an assessment. [00:39:30] I found this again on dark reading. This is kind of an insider website for those of us in the cybersecurity business, but, um, How can you verify the information that vendors are giving you about their own cybersecurity posture? We've heard in the news and I've talked about them all year, this year, and for years past. [00:39:56] That are we're vendors can be our worst nightmare because some of these hacks come in through our vendors. So you've got yourself, a cybersecurity company. How do you know if they are really telling you the truth? And man, is that hard for you to know? Right. You're going to ask him questions and the salesmen are going to say, oh yeah, yeah, yeah. [00:40:21] That's why we don't have salesmen. Right. We have engineers. You talk to me, you might talk to my son or my daughter, people who have been doing this with me, who I have trained and helped out. So this guy who wrote the article and there's this on attributed, I don't see an attribution on here on this page. [00:40:41] I definitely want to give him, probably I heard is John Babinec wrote this thing and he is a principle threat hunters. What he calls himself over at net and rich. So he says, here's what you got to do. And if you're trying to be cost-effective, he puts it in. What I call an ed month clause. And one of these days I'll tell you that story, but he calls it a validity check question so that an honest vendor would tell you, no, they don't do X and give you a good reason why they don't like it's not cost effective. [00:41:17] It's outside of a reasonable risk model. Does that make sense to you? So when you're trying to evaluate a vendor, who's going to be doing your cyber security put in one of these validity checks put in one of these questions. It doesn't really matter to you, but it's something that would be very hard for one of these cybersecurity companies to do. [00:41:42] And maybe it doesn't fit the risk model that you have. I think it's just absolutely brilliant. Probably one of the better ways when you're trying to evaluate an MSSP as cybersecurity managed or otherwise provider stick in something like that. So you have a red flag that just stands out for you. All right. [00:42:04] Make sure you are registered online. Craig Peter sohn.com/subscribe. So you can find out about all of these trainings coming up. [00:42:17] If you've never heard of the Carrington event, I really hope, frankly, I really, really do hope we never have to live through one of these. Again, there is a warning out there right now about an internet apocalypse that could happen because of the Sun. [00:42:34] Solar storms are something that happens really kind of all of the time. The sun goes through solar cycles. About every seven years, there are longer cycles as well. You might know. I have an advanced class amateur radio license I've had for a long time, and we rely a lot when we're dealing with short wave on the solar cycle. [00:42:59] You see what happens is that the sun charges, the atmosphere. You see that if you've ever seen the Northern light, that is. Part of the Sunzi missions, hitting our magnetic field and kind of getting sucked into the core of the earth, if you will, as they get caught in that field. And the more charged the atmosphere is, the more bounce you get. [00:43:24] That's what we call it bounce. And the reason us hams have all these different frequencies to use is because of the battle. We can go different frequencies with different distances, I should say, using different frequencies. So think about it right now. You've got the earth and I want to talk from Boston to Chicago. [00:43:47] For instance, I know about how many miles it is, and I have to figure out in the ionosphere up in the higher levels of the atmosphere, what frequency. To use in order to go up into the atmosphere, bounce back, and then hit Chicago. That's the idea. It's not quite as simple or as complex in some ways, as it sounds, a lot of people just try different frequencies and a lot of hams just sit there, waiting for anybody anywhere to talk to, particularly if they are. [00:44:20] It's really quite fun. Now what we're worried about, isn't so much just the regular solar activity. We get worried when the sun spots increase. Now, the solar cycle is what has primary image. On the temperature on earth. So no matter what, you might've heard that isn't your gas, guzzling car or a diesel truck that causes the Earth's temperature to change. [00:44:49] Remember the only constant when it comes to the Earth's temperature has been changed over the millions of years. We had periods where the earth was much warmer than it is now had more common that carbon dioxide in the atmosphere than it does now had less. In fact, right now we are at one of the lowest levels of carbon dioxide in the atmosphere in earth, long, long. [00:45:15] So the sun, if you might remember, comes up in the morning, warms things up, right? And then it cools down. When the sun disappears at nighttime, it has a huge impact. It's almost exclusively the impact for our temperatures. If there's other things too, for instance, eruption can spew all to hold a lot of carbon dioxide. [00:45:40] In fact, just one, just Mount St. Helens wanted erupted, put more carbon dioxide into the atmosphere than man has throughout our entire existence. Just to give you an idea, right? So these alarms that are out there, uh, you know, come on, people. Really, and now we're seeing that in, uh, this last year we had a 30% increase in the ice cap up in the, in, up in the north, up in Northern Canada, around the polls. [00:46:12] Uh, we also had some of these glaciers growing. It was so funny. I saw an article this year, or excuse me, this week that was showing a sign that was at one of our national parks. And it said this glacier will have disappeared by 2020. Of course it hasn't disappeared. In fact, it has grown now and it's past 2020. [00:46:34] Anyhow, the sun has a huge impact on us in so many ways. And one of the ways is. Well, something called a coronal mass ejection. This is seriously charged particles. That tend to be very, very directional. So when, when it happens, when there's one of these CMS coronal, mass ejections, it's not just sending it out all the way around the sun everywhere. [00:47:02] It's really rather concentrated in one. One particular spot. Now we just missed one not too long ago. And let me see if I can find it here. Just mast, a cm E near miss. Here we go. There a solar super storm in July, 2012, and it was a very, very close shave that we had most newspapers didn't mention it, but this could have been. [00:47:33] AB absolutely incredible. We'd be picking up the pieces for the next 50 years. Yeah. Five, zero years from this one particular storm. And what happens is these, these solar flares, if you will, are very, very extreme, they CME. You're talking about x-rays extreme UV, ultraviolet radiation, reaching the earth at the speed of light ionizes, the upper layers of atmosphere. [00:48:02] When that happens, by the way, it hurts our communications, but it can also have these massive effects where it burns out saddle. And then causes radio blackouts, GPS, navigation problems. Think about what happened up in Quebec. So let me just look at this call back, uh, hit with an E and yeah, here we go. And March 13th, 1989. [00:48:33] Here we go. Here's another one. Now I remembered. And this is where Quill back got nailed. I'm looking at a picture here, which is, uh, looking at the United States and Canada from the sky and where the light is. And you can see Quebec is just completely black, but they have this massive electrical blackout and it's becomes. [00:48:57] Of this solar storm. Now they, these storms that I said are quite directional, depending on where it hits and when it hits things can get very, very bad. This particular storm back in 1989 was so strong. We got to see their Rora Borealis, the Northern lights as far south, as Florida and cue. Isn't that something, when we go back further in time to this Carrington event that I mentioned, you could see the Northern lights at the equals. [00:49:35] Absolutely amazing. Now the problem with all of this is we've never really had an internet up online. Like we have today when we had one of the storms hit. And guess what we're about to go into right now, we're going into an area or a time where the sun's going to be more active, certainly on this, this 11 year cycle and possibly another bigger cycle too, that we don't really know much about. [00:50:07] But when this hit us back in the 1850s, what we saw was a, uh, a. Telegraph system that was brought to its knees. Our telegraphs were burned out. Some of the Telegraph buildings were lit. They caught on fire because of the charges coming in, people who were working the telegraphs, who are near them at the time, got electric shocks or worse than that. [00:50:34] Okay. 1859 massive Carrington event compass needles were swinging wildly. The Aurora Borealis was visible in Columbia. It's just amazing. So that was a severe storm. A moderate severity storm was the one that hit in Quebec here, knocked out Quebec, uh, electric. Nine hour blackout on Northeast Canada. What we think would happen if we had another Carrington event, something that happened to 150 years ago is that we would lose power on a massive scale. [00:51:13] So that's one thing that would happen. And these massive transformers that would likely get burned out are only made in China and they're made on demand. Nobody has an inventory. So it would be at least six months before most of the country would get power back. Can you believe that that would be just terrible and we would also lose internet connectivity. [00:51:39] In fact, the thinking that we could lose internet connectivity with something much less than a severe storm, maybe if the Quebec power grid solar, a massive objection here. Maybe if that had happened, when. The internet was up. They might have burned out internet in the area and maybe further. So what we're worried about is if it hits us, we're going to lose power. [00:52:07] We're going to lose transformers on the transmission lines and other places we're going to lose satellites and that's going to affect our GPS communication. We're going to lose radio communication, and even the undersea cables, even though they're now no longer. Regular copper cables. It's now being carried of course, by light in pieces of glass. [00:52:32] The, those cables need to have repeaters about every 15 miles or so under underwater. So the power is provided by. Copper cables or maybe some other sort of power. So these undersea cables, they're only grounded at extensive intervals, like hundreds or thousands of kilometers apart. So there's going to be a lot of vulnerable components. [00:52:59] This is all a major problem. We don't know when the next massive. Solar storm is going to happen. These coronal mass ejections. We do know they do happen from time to time. And we do know it's the luck of the draw and we are starting to enter another solar cycle. So be prepared, everything. Of course, you're listening to Craig Peterson, cybersecurity strategist. [00:53:28] If you'd like to find out more and what you can do, just visit Craig peterson.com and subscribe to my weekly show notes. [00:53:39] Google's got a new admission and Forbes magazine has an article by Zach Dorfman about it. And he's saying you should delete Google Chrome now after Google's newest tracking admission. So here we go. [00:53:55] Google's web browser. Right? It's been the thing for people to use Google Chrome for many years, it's been the fastest. Yeah, not always people kind of leapfrog it every once in a while, but it has become quite a standard. Initially Microsoft is trying to be the standard with their terrible browser and yeah, I to Exploder, which was really, really bad and they have finally completely and totally shot it in the head. [00:54:29] Good move there on their part. In fact, they even got rid of their own browser, Microsoft edge. They shot that one in. They had to, I know I can hear you right now saying, oh, Craig, I don't know. I just use edge browser earlier today. Yeah. But guess what? It isn't edge browser. It's actually Google Chrome. The Microsoft has rebranded. [00:54:52] You see the guts to Google Chrome are available as what's called an open source project. It's called chromium. And that allows you to take it and then build whatever you want on top of. No, that's really great. And by the way, Apple's web kit, Kat is another thing that many people build browsers on top of and is part of many of these browsers we're talking about right now, the biggest problem with the Google Chrome. [00:55:22] Is they released it so they could track you, how does Google make its money? Well, it makes us money through selling advertising primarily. And how does it sell advertising if it doesn't know much or anything about you? So they came out with the Google Chrome browser is kind of a standard browser, which is a great. [00:55:43] Because Microsoft, of course, is very well known for not bothering to follow standards and say what they have is the actual standard and ignoring everybody else. Yeah. Yeah. I'm picking on Microsoft. They definitely deserve it. Well, there is what is being called here in Forbes magazine, a shocking new tracking admission from. [00:56:05] One that has not yet made headlines. And there are about what 2.6 billion users of Google's Chrome worldwide. And this is probably going to surprise you and it's frankly, Pretty nasty and it's, I think a genuine reason to stop using it. Now, as you probably know, I have stopped using Chrome almost entirely. [00:56:31] I use it when I have to train people on Chrome. I use it when I'm testing software. There's a number of times I use it, but I don't use. The reality is the Chrome is an absolute terror. When it comes to privacy and security, it has fallen way behind its rivals in doing that. If you have an iPhone or an iPad or a Mac, and you're using safari, apple has gone a long ways to help secure your. [00:57:09] Well, that's not true with Chrome. In fact, it's not protecting you from tracking and Dave up data harvesting. And what Google has done is they've said, okay, well, we're going to get these nasty third party cookies out of the whole equation. We're not going to do that anymore. And what they were planning on doing is instead of knowing everything specifically. [00:57:34] You they'd be able to put you in a bucket. So they'd say, okay, well you are a 40 year old female and you are like driving fast cars and you have some kids with a grandkid on the way, and you like dogs, not cats, right? So that's a bucket of people that may be a few hundred or maybe up to a thousand. As opposed to right now where they can tell everything about you. [00:58:04] And so they were selling that as a real advantage because they're not tracking you individually anymore. No, we're putting you in a bucket. Well, it's the same thing. Right. And in fact, it's easier for Google to put you in a bucket then to track everything about you and try and make assumptions. And it's easier for people who are trying to buy ads to place in front of you. [00:58:28] It's easier for them to not have to kind of reverse engineer all of the data the Google has gathered in instead of. To send this ad to people that are in this bucket and then that bucket. Okay. It makes sense to you, but I, as it turns out here, Google has even postponed of that. All right. They really have, they're the Google's kind of hiding. [00:58:54] It's really what's going on out there. Uh, they are trying to figure out what they should do, why they should do it, how they should do it, but it's, it's going to be a problem. This is a bad habit. The Google has to break and just like any, anybody that's been addicted to something it's going to take a long time. [00:59:16] They're going to go through some serious jitters. So Firefox is one of the alternatives and to Google Chrome. And it's actually a very good one. It is a browser that I use. I don't agree with some of the stuff that Mozilla and Firefox does, but again, right. Nobody agrees on everything. Here's a quote from them. [00:59:38] Ubiquitous surveillance harms individually. And society Chrome is the only major browser that does not offer meaningful protection against cross cross site tracking and Chrome will continue to leave users unprotected. And then it goes on here because. Uh, Google response to that. And they admit that this massive web tracking out of hand and it's resulted in, this is a quote from Google and erosion of trust, where 72% of people feel that almost all of what they do online is being. [01:00:19] By advertisers, technology firms or others, 81% say the potential risks from data collection outweigh the benefit by the way, the people are wrong. 72% that feel almost all of what they do on online is being tracked. No, no. The answer is 100% of what you do is probably being tracked in some way online. [01:00:41] Even these VPN servers and systems that say that they don't do log. Do track you take a look at proton mail just last week. Proton mail it's in Switzerland. Their servers are in Switzerland. A whole claim to fame is, Hey, it's all encrypted. We keep it safe. We don't do logging. We don't do tracking, uh, guess what they handed over the IP addresses of some of the users to a foreign government. [01:01:10] So how can you do that? If you're not logging, if you're not tracking. Yeah, right. They are. And the same thing is true for every paid VPN service I can think of. Right. So how can Google openly admit that their tracking is in place tracking everything they can, and also admit that it's undermining our privacy and. [01:01:38] Their flagship browser is totally into it. Right? Well, it's really, it's gotta be the money. And Google does not have a plan B this anonymized tracking thing that they've been talking about, you know, the buckets that I mentioned, isn't realistic, frankly. Uh, Google's privacy sandbox is supposed to Fitbit fix it. [01:02:00] I should say. The, the whole idea and the way it's being implemented and the way they've talked about it, the advertisers on happy. So Google's not happy. The users are unhappy. So there you go. That's the bottom line here from the Forbes article by Zach Dorfman, delete Google Chrome. And I said that for a long time, I do use some others. [01:02:27] I do use Firefox and I use. Which is a fast web browser, that some pretty good shape. Hey, if you sign up for my show's weekly newsletter, not only will you get all of my weekly tips that I send to the radio hosts, but you will get some of my special reports that go into detail on things like which browser you shouldn't be using. [01:02:52] Sign up right now. Craig peterson.com. [01:02:57] Many businesses have gone to the cloud, but the cloud is just another word for someone else's computer. And many of the benefits of the cloud just haven't materialized. A lot of businesses have pulled back and are building data centers again. [01:03:14] The reason I mentioned this thing about Microsoft again, and the cloud is Microsoft has a cloud offering. [01:03:23] It's called Microsoft Azure. Many people, many businesses use it. We have used it with some of our clients in the past. Now we have some special software that sits in front of it that helps to secure. And we do the same thing for Amazon web services. I think it's important to do that. And we also use IBM's cloud services, but Microsoft is been pitching for a long time. [01:03:51] Come use our cloud services and we're expecting here probably within the next month, a big announcement from Microsoft. They're planning on making it so that you can have your desktop reside in Microsoft's cloud, in the Azure cloud. And they're selling really the feature of it doesn't matter where you are. [01:04:17] You have your desktop and it doesn't matter what kind of computer you're on. As long as you can connect to your desktop, using some just reasonable software, you will be able to be just like you're in front of a computer. So if you have a Chromebook or a Mac, Or a windows or tablet, whatever, and you're at the grocery store or the coffee shop or the office, you'll be able to get it, everything, all of your programs, all your files. [01:04:47] And we, Microsoft will keep the operating system up to date for you automatically a lot of great selling points. And we're actually looking into that. Not too heavily yet. We'll give them a year before we really delve into it at all. Cause it takes them a while to get things right. And Microsoft has always been one that adds all kinds of features, but most of the time, most of them don't work and we can, we can document that pretty easily, even in things like Microsoft. [01:05:18] Well, the verge is now reporting that Microsoft has warned users of its as your cloud computing service, that their data has been exposed online for the last two years. Yeah, let me repeat that in case you missed it, you, uh, yeah. I'm I'm I might've misspoken. Right. Uh, let me see, what does it say? It says, um, users of Azure cloud competing service. [01:05:48] So that's their cloud. Microsoft's big cloud. Okay. Um, their data has been. Exposed online. Okay. So that means that people could get the data, maybe manipulate the data that sort of exposed means for the last two years. Are you kidding me? Microsoft is again, the verge. Microsoft recently revealed that an error in its Azure cosmos database product left more than 3,300 as your customers data. [01:06:24] Completely exposed. Okay guys. So this, this, this is not a big thing, right? It can't possibly be big thing because you know who uses Azure, right. Nobody uses a zer and nobody uses hosted databases. Come on, give me a break. Let me see, what else does this have to say? Oh, okay. It says that the vulnerability was reported, reportedly introduced into Microsoft systems in 2019, when the company added a data visualization feature called Jupiter notebook to cosmos DB. [01:06:59] Okay. Well, I'm actually familiar with that one and let's see what small companies let's see here. Um, some Azure cosmos DB clients include Coca Cola. Liberty mutual insurance, Exxon mobile Walgreens. Hmm. Let me see. Could any of these people like maybe, maybe Liberty mutual insurance and Walgreens, maybe they'd have information about us, right. [01:07:26] About our health and social security numbers and account numbers and credit cards. Names addresses. Right, right. That's again, why I got so upset when these places absolutely insist on taking my social security number, right? It, it, first of all, when it was put in place, the federal government guaranteed, it would never be used for anything other than social security. [01:07:53] And the law even said it could not be used for anything other than social security. And then the government started expanding it. Right. And the IRS started using it. To track all of our income and you know, that's one thing right there, the government computers, they gotta be secure. Right. All of these breaches we hear about that. [01:08:12] Can't be true. Uh, so how about when the insurance company wants your personal information? Like your social security number? What business is it of? There's really no. Why do they have to have my social security number? It's a social security number. It's not some number that's tattooed on my forehead. [01:08:36] That's being used to track me. Is it this isn't a socialist country like China is, or the Soviet union was right. It's not socially. So why are they tracking us like that? Walgreens? Why do they need some of that information? Why does the doctor that you go to that made the prescription for Walgreens? Why do they need that information? [01:09:00] And I've been all over this because they don't. Really need it. They want, it makes their life easier, but they don't really need it. However, it exposes us. Now, if you missed the email, I sent out a week ago, two weeks ago now, I guess. You missed something big because I, in my weekly newsletter went through and described exactly what you could do in order to keep your information private. [01:09:35] So in those cases where websites asking for information that they don't really need, right? You don't want to lie, but if they don't really need your real name, why you're giving them your real name? Why do you use a single email address? Why don't you have multiple addresses? Does that start make sense to you guys? [01:09:54] And now we find out that Microsoft Azure, their cloud services, where they're selling cloud services, including a database that can be used online, a big database, uh, 3,300 customers looks like some of them are actually kind of big. I don't know. ExxonMobil pretty big. Yeah. I think so. Walgreens, you think that that might be yeah, yeah, yeah, yeah. [01:10:22] Y. Why are we trusting these companies? You know it, if you have a lot of data, a lot of customers, you are going to be a major target of nation states to hack you and bat just general hackers, bad guys. But you're also, if, if you've got all this information, you've also got to have a much higher level of security than somebody that doesn't have all of that information. [01:10:52] Does that make sense too? Did I say that right? You don't need the information and, and I've got to warn anybody that's in a business, whether you're a business owner or you're an employee, do not keep more data than you need the new absolutely need to run your company. And that includes data about your customers. [01:11:16] And maybe, maybe it's even more specifically data about your customer. Because what can happen is that data can be stolen and we just found. That? Yes, indeed. It could have been, it was exposed Microsoft the same. We don't know how much it was stolen. If anything was stolen. Um, yeah, Walgreens. Hey, I wonder if anyone's going to try and get some pain pills illegally through, uh, this database hack or a vulnerability anyways. [01:11:47] All right, everyone. Stick around. We'll be back. Of course, you listening to Craig Peterson. I am a cybersecurity strategist for business, and I'm here to help you as well. You can ask any question any time, uh, consumers are the people I help the most, you know, I wish I got a dime for every time I answered a question. [01:12:09] Just email me@craigpeterson.com me@craigpeterson.com and stick around. [01:12:18] Whether or not, you agree with the lockdown orders that were put in place over this COVID pandemic that we had. Uh, there are some other parts of the world that are doing a lot more. [01:12:34] Australia has, I don't know. I think that they went over the deep end. The much, the same thing is true right next door to them. [01:12:45] And I am looking at a report of what they are doing with this new app. Uh, you might be aware that both apple and Google came out with an application programming interface. That could be used for contract tack tracking, contact tracking. There you go. Uh, it wasn't terribly successful. Some states put some things in place. [01:13:13] Of course you get countries like China. I love the idea because heaven forbid you get people getting together to talk about a Tannen square remembrance. Now you want to know who all of those people were, who were in close proximity, right? So, you know, good for China a while, as it turns out, Australia is putting something in place they have yet another COVID lockdown. [01:13:39] They have COVID quarantine orders. Now I think if you are sick, you should stay on. I've always felt that I, you know, I had 50 employees at one point and I would say, Hey, if you're sick, just stay home. Never required a doctor's note or any of that other silliness, come on. People. If someone's sick, they're sick and let them stay home. [01:14:04] You don't want to get everybody else in the office, sick and spread things around. Right. Doesn't that just kind of make sense. Well, they now in Australia, don't trust people to stay home, to get moving. Remember China, they were, they were taking welders and we're going into apartments in anybody that tested positive. [01:14:22] They were welding them into their apartment for minimum of two weeks. And so hopefully they had food in there and they had a way to get fresh water. Australia is not going quite that far, but some of the states down under. Using facial recognition and geolocation in order to enforce quarantine orders and Canada. [01:14:47] One of the things they've been doing for very long time is if you come into the country from out of the country, even if you're a Canadian citizen, you have to quarantine and they'll send people by your house or you have to pay to stay for 10 days in a quarantine hope. So you're paying the course now inflated prices for the hotel, because they're a special quarantine hotel. [01:15:14] You have to pay inflated prices to have food delivered outside your door. And that you're stuck there for the 10 days, or if you're at home though, they, you know, you're stuck there and they'll send people by to check up on you. They'll make phone calls to check up on you and. They have pretty hefty find. [01:15:36] Well, what Australia has decided to do is in Australia is Charlene's even going from one state to another state are required to prove that they're obeying a 14 day quarantine. And what they have to do is have this little app on their phone and they, the app will ping them saying, prove it. And then they have to take a photo of themselves with geo location tag on it and send it up via the app to prove their location. [01:16:15] And they have to do all of that within 15 minutes of getting the notification. Now the premier of the state of south Australia, Steven Marshall said we don't tell them how often or when on a random basis, they have to reply within 15 minutes. And if you don't then a police, officer's going to show up at the address you're supposed to be at to conduct an in-person check. [01:16:43] Very very intrusive. Okay. Here's another one. This is a, an unnamed government spokesperson who was apparently speaking with Fox news quote. The home quarantine app is for a selected cohort of returning self Australians who have applied to be part of a trial. If successful, it will help safely ease the burden of travel restrictions associated with the pandemic. [01:17:10] So there you go. People nothing to worry about. It's just a trial. Uh, it will go away. Uh, just like, uh, for instance, income tax, as soon as rule, number one is over, it will be removed and it will never be more than 3% and it will only apply to the top 1% of wage-earners. So there you go. Right. And we all know that world war one isn't over yet. [01:17:34] Right. So that's why they still have it in somehow. Yeah, some of the middle class pays the most income tax. I don't know. Interesting. Interesting. So there you go. Little news from down under, we'll see if that ends up happening up here. News from China, China has, uh, China and Russia have some interesting things going on. [01:17:55] First of all, Russia is no longer saw. Country, they kind of are. They kind of aren't, they are a lot freer in many ways than we are here in the United States. Of course, China, very heavily socialist. In fact, they're so socialists, they are communist and China. And Russia both want their kids to have a very good education in science, engineering, and mathematics. [01:18:23] Not so much on history, not so much on, on politics. Right. But definitely heavy on the, on the sciences, which I can see that makes all the sense. I think everybody should be pretty heavily on the science. Well, according to the wall street journal this week, gamers under the age of 18 will not be allowed to play online games between 8:00 PM and 9:00 PM on Friday, Saturdays and Sundays. [01:1

9to5Mac Daily
October 15, 2021 – Apple Watch Series 7 officially launches

9to5Mac Daily

Play Episode Listen Later Oct 15, 2021 7:44


Listen to a recap of the top stories of the day from 9to5Mac. 9to5Mac Daily is available on iTunes and Apple's Podcasts app, Stitcher, TuneIn, Google Play, or through our dedicated RSS feed for Overcast and other podcast players. Sponsored by Direct Mail: Create and send great looking email newsletters with Direct Mail, an easy to use email marketing app for the Mac. Get started for free and save 10% when you sign up for any pricing plan. New episodes of 9to5Mac Daily are recorded every weekday. Subscribe to our podcast in iTunes/Apple Podcast or your favorite podcast player to guarantee new episodes are delivered as soon as they're available. Stories discussed in this episode:   First Apple Watch Series 7 orders arriving to customers Apple hires new HomePod Software Lead Here's everything you need to know about Apple Watch Series 7 fast charging Enjoy the podcast?: Shop Apple at Amazon to support 9to5Mac Daily! Follow Chance: Twitter: @ChanceHMiller Listen & Subscribe: Apple Podcasts Overcast RSS Stitcher TuneIn Google Play Share your thoughts! Drop us a line at happyhour@9to5mac.com. You can also rate us in Apple Podcasts or recommend us in Overcast to help more people discover the show!

Core Intuition
Episode 484: Midnight Blue Dungarees

Core Intuition

Play Episode Listen Later Oct 15, 2021


Manton and Daniel talk about the expected MacBook Pro announcements coming on Monday, and whether they're likely to buy one if announced. Manton shares some details about the new Micro.blog Subscriptions feature he teased, and Daniel asks him to consider whether the word Subscription has unwanted connotations. Finally, they talk about Manton's switch of mobile providers and the various ways to avoid overage charges with data tethering. The post Episode 484: Midnight Blue Dungarees appeared first on Core Intuition.

KNBR Podcast
10-15 Murph & Mac's Week 6 Friday Football Forecast!

KNBR Podcast

Play Episode Listen Later Oct 15, 2021 8:27


Murph & Mac's Week 6 Friday Football Forecast! See omnystudio.com/listener for privacy information.

Murph & Mac Podcast
10-15 Murph & Mac's Week 6 Friday Football Forecast!

Murph & Mac Podcast

Play Episode Listen Later Oct 15, 2021 8:27


Murph & Mac's Week 6 Friday Football Forecast! See omnystudio.com/listener for privacy information.

Screw The Commute Podcast
504 - One of my few idols in this business: Tom interviews Mark Joyner

Screw The Commute Podcast

Play Episode Listen Later Oct 15, 2021 58:13


Mark Joyner is an author, inventor and a serial entrepreneur. He's currently serving as founder and CEO of Simpleology, a web application that helps people and teams get more done faster. He started as the first e-book publishing company, the first online ad tracking company, the second pay per click search engine and he invented the tracking pixel. And he also started a website called Start Blaze that went to number thirty six globally within six weeks of launching with zero dollar ad budgets. Screw The Commute Podcast Show Notes Episode 504 How To Automate Your Business - https://screwthecommute.com/automatefree/ Internet Marketing Training Center - https://imtcva.org/ Higher Education Webinar – https://screwthecommute.com/webinars See Tom's Stuff – https://linktr.ee/antionandassociates 04:47 Tom's introduction to Mark Joyner 06:18 Futurism is important to entrepreneurs 08:53 Self-educated and never really went to school 11:20 Astroturfing is about information control 21:24 Keeping up with the firehose of knowledge and data 35:20 The concept of Nine Great Threats 41:13 Sponsor message 43:02 Military concepts applied to marketing Entrepreneurial Resources Mentioned in This Podcast Higher Education Webinar - https://screwthecommute.com/webinars Screw The Commute - https://screwthecommute.com/ Screw The Commute Podcast App - https://screwthecommute.com/app/ College Ripoff Quiz - https://imtcva.org/quiz Know a young person for our Youth Episode Series? Send an email to Tom! - orders@antion.com Have a Roku box? Find Tom's Public Speaking Channel there! - https://channelstore.roku.com/details/267358/the-public-speaking-channel How To Automate Your Business - https://screwthecommute.com/automatefree/ Internet Marketing Retreat and Joint Venture Program - https://greatinternetmarketingtraining.com/ Disabilities Page - https://imtcva.org/disabilities/ Your Roadmap To Money - http://yourroadmaptomoney.com Email Tom: Tom@ScrewTheCommute.com Internet Marketing Training Center - https://imtcva.org/ Related Episodes Dan Janal - https://screwthecommute.com/503/ More Entrepreneurial Resources for Home Based Business, Lifestyle Business, Passive Income, Professional Speaking and Online Business I discovered a great new headline / subject line / subheading generator that will actually analyze which headlines and subject lines are best for your market. I negotiated a deal with the developer of this revolutionary and inexpensive software. Oh, and it's good on Mac and PC. Go here: http://jvz1.com/c/41743/183906 The Wordpress Ecourse. Learn how to Make World Class Websites for $20 or less. https://screwthecommute.com/wordpressecourse/ Join our Private Facebook Group! One week trial for only a buck and then $37 a month, or save a ton with one payment of $297 for a year. Click the image to see all the details and sign up or go to https://www.greatinternetmarketing.com/screwthecommute/ After you sign up, check your email for instructions on getting in the group.

9to5Mac Happy Hour
New MacBook Pro expectations unleashed, Apple Watch Series 7 reviews

9to5Mac Happy Hour

Play Episode Listen Later Oct 15, 2021 80:34


Benjamin and Zac discuss the initial reaction to the Apple Watch Series 7, HomeKit announcements, some TV+ news, and — most importantly — get hyped for the new MacBook Pros coming at the ‘Unleashed' Apple event next week. Sponsored by Totallee: Get 20% off totallee iPhone 13 cases and more with code SLEEK at totalleecase.com or (SLEEK20DEAL on Amazon). Sponsored by TextExpander: Visit textexpander.com/podcast and select 9to5Mac Happy Hour to save 20% off your first year! Sponsored by ExpressVPN: Take back your Internet privacy today and get 3 months free with a 1-year package at ExpressVPN.com/HappyHour. Sponsored by BetterHelp: As a listener, you'll get 10% off your first month by visiting our sponsor at BetterHelp.com/MacHappyHour. Follow Zac Hall @apollozac Benjamin Mayo @bzamayo Read More Here's how the new green Apple Watch Series 7 color looks in the real world Almost a third of MacBook owners will upgrade to 2021 MacBook Pro, says analyst First Apple Watch Series 7 orders arriving to customers around the world Everything to expect from Apple's October event: M1X MacBook Pro, AirPods 3, and more Universal Control now labeled as ‘beta' ahead of macOS Monterey official release Apple moves Safari favorites bar back where it's supposed to be in Monterey beta 10 Apple orders comedy series ‘Shrinking', hailing from Ted Lasso writers Bill Lawrence and Brett Goldstein Comment: Don't expect the new M1X MacBook Pro to replace M1 models New MacBook Pro rumored to feature 1080p webcam, 16 GB RAM as standard Upcoming M1X MacBook Pros rumored to feature 120Hz displays with mini-LED Apple announces ‘Unleashed' special event for October 18, M1X MacBook Pros expected Comment: Here's why the Apple Watch Series 7 is still a notable upgrade for many users Listen to more Happy Hour Episodes Subscribe Apple Podcasts Overcast Spotify Listen to more 9to5 Podcasts Stacktrace Apple @ Work Alphabet Scoop Electrek The Buzz Podcast Space Explored Rapid Unscheduled Discussions Enjoy the podcast? Shop Apple at Amazon to support 9to5Mac Happy Hour!

EasyApple
#531: Il kit completo del vero uomo (ma non super ricco)

EasyApple

Play Episode Listen Later Oct 15, 2021 53:57


Si parla della bbbbbruttezza delle tab di Safari 15, dei nuovi Mac, della porta del vero uomo e di quanto sia terribile fare un reso ad Apple.

The Mac Attack Podcast
Mac Attack Hour 4: Chris Marler, How the Panthers Win and The Wrap Up

The Mac Attack Podcast

Play Episode Listen Later Oct 15, 2021 39:17


Mac and Bone close out a Panther Friday by talking some SEC football with Chris Marler, formulating how the Panthers could pull out a win on Sunday and wrapping up the show with listener messages. See omnystudio.com/listener for privacy information.

PATRIOTAS
245 - Com emoção, vitória é vitória!

PATRIOTAS

Play Episode Listen Later Oct 15, 2021 32:14


Aos trancos e barrancos, com emoção e virada no final, vencemos os Texans mas não convencemos! Ouça o nosso papo sobre a vitória na semana 5 da NFL e o que esperar de Cowboys em casa.

The Mac Attack Podcast
Mac Attack Hour 3: Jones Angell, Official Predictions for Panthers-Vikings and CMC Panic

The Mac Attack Podcast

Play Episode Listen Later Oct 15, 2021 39:09


Mac and Bone hand out their official predictions for the Panthers meeting with the Vikings, Jones Angell hops on to talk about the issues with Tar Heel football and talk about whether or not there should be some legitimate long term concerns with CMC. See omnystudio.com/listener for privacy information.

The Mac Attack Podcast
Mac Attack Hour 2: Eugene Robinson, Panther Nation Confidence Level Dropping and College Football Confidence

The Mac Attack Podcast

Play Episode Listen Later Oct 15, 2021 38:19


Mac and Bone talk about the confidence level that the dipping for Panthers fans and how they gain it back, discuss how confident local CFB fans should be heading into the weekend and Eugene Robinson stops by to look ahead to the meeting with the Vikings, See omnystudio.com/listener for privacy information.

The Mac Attack Podcast
Mac Attack Hour 1: CMC Likely Out Again, CFB Couch Potato Guide and Coach Speak

The Mac Attack Podcast

Play Episode Listen Later Oct 15, 2021 40:20


Mac and Bone open the show by discussing the fact that CMC will likely be out once again on Sunday, giving you their guide to this weekend of college football and listen and react to some audio from yesterday's meeting with the Panthers coordinators. See omnystudio.com/listener for privacy information.

All You Need To Know
Press Breaker Podcast #15: Top 10 Centers

All You Need To Know

Play Episode Listen Later Oct 15, 2021 40:31


Today, Mac and Garrett use their last week of preseason to rank the top 10 centers in the present day NBA. This week brought us crazy takes and a lot of differences in opinions.

Hill-Man Morning Show Audio
GHS- NE Patriots Devin McCourty joins the show to discuss the Pats - Cowboys game

Hill-Man Morning Show Audio

Play Episode Listen Later Oct 15, 2021 15:34


NE Patriots Devin McCourty joins the show to discuss the Pats - Cowboys game (10-15-21) McCourty - Says you hate to see stuff like the Jon Gruden e-mails, Dak Prescott is having a great year, not surprised Dak was ready to play after his injury, Pats offense played great last week down 4 guys on the O-Line, Mac Jones has exceeded all expectations we don't have any doubts Mac can score points See omnystudio.com/listener for privacy information.

Hill-Man Morning Show Audio
GHS- NE Patriots Devin McCourty joins the show to discuss the Pats - Cowboys game, Sox-Astros Game 1 ALCS, Pats-Cowboys, The Lead

Hill-Man Morning Show Audio

Play Episode Listen Later Oct 15, 2021 51:45


Hour 1 - NE Patriots Devin McCourty joins the show to discuss the Pats - Cowboys game, Sox-Astros Game 1 ALCS, Pats-Cowboys, The Lead (10-15-21)   McCourty - Says you hate to see stuff like the Jon Gruden e-mails, Dak Prescott is having a great year, not surprised Dak was ready to play after his injury, Pats offense played great last week down 4 guys on the O-Line, Mac Jones has exceeded all expectations we don't have any doubts Mac can score points See omnystudio.com/listener for privacy information.

Vinyl & Vision
V&V Episode 054 Mac Blackout & Brian Eno's Another Green World

Vinyl & Vision

Play Episode Listen Later Oct 15, 2021 118:08


As an inexperienced songwriter I've been told once, instrumentals can be boring. But that certainly doesn't apply to the artistry of what these next two subjects are. Mac Blackout is, in my humble opinion, a master visual and sonic artist. His latest album, Love Profess, is the basis of my statement. It's a completely instrumental emotional rollercoaster, filled with positivity and good will while created in a time of psychic turmoil. It was a pleasure to have this opportunity to break into the mind of a truly great artist about just one small slice of inspirational fodder, Brian Eno's ambient transformation, Another Green World. We go deep into Mac's history, making of his latest record, where Another Green World sits in the making of Love Profess and what's to come next, including LOCUST! Listen and find out. Please support Mac by visiting his website http://www.macblackout.com/ order Love Profess and all other Mac Blackout releases here: https://macblackout.bandcamp.com/ Mac's new collaboration with Landon Caldwell: https://landoncaldwellmacblackout.bandcamp.com/album/linear-revolution Buy Mac's art here: https://galeriefchicago.com/collections/mac-blackout Find out more about us and how to support the show here: www.psychicstatic.net

Gramlich and Mac Lain
Episode 109 - Weekend Preview: Clemson/Cuse + Can Pitt & NCST Win on the Road?

Gramlich and Mac Lain

Play Episode Listen Later Oct 15, 2021 38:17


Kelly & Mac preview the upcoming weekend of ACC football & give their picks! Sponsored by: Seaside Grown. Use code ACC15 for 15% off at seasidegrown.com Produced by Richmond Weaver

How To Code Well
10 Git branching good practice tips

How To Code Well

Play Episode Listen Later Oct 15, 2021 49:09


Let's talk about 10 good practice tips when using Git. Podcast Notes: PHP News: Swoole is a PHP extension that has been forked due to on going security concerns. The current version of Swoole downloads a compressed file from the business Swoole site which is NOT GOOD! This file is a gzip file which is downloaded to your application. Apparently many attempts were made to raise this concern with the current maintainer of Swoole but nothing happened. After these concerns were un-heard the PHP community decided to fork Swoole and remove the ability to run remote code from the Swoole business site. The forked alternative is called Open Swoole. Read more about it here: https://news-web.php.net/php.pecl.dev/17446 Theres a new Apple event on the 18th of October. M1X Mac book pro. 14 + 16 inch Mac mini AirPods Will the Mac Book Pro have 64 GB of ram, will I buy a new Mac? 10 Git Branch good practices Run code audits before merging into a work flow branch to prevent pipeline blockages Put config into a separate branch to the feature Use a GUI to inspect right, left, middle merges Communicate and talk through conflicts with other developers Don't squash commits. History is good Regularly merge the main branch into the feature branch Always get a team mate to review your code. Even if its the smallest code change Keep to a good branch naming convention Separate code maintenance, features and fixes into their own branches - Be aware of what other features use your code Use messaging platforms like Slack or Discord to inform your team that something has been merged. Also use this to tell your team if the code audits have failed Fix any failed code audits before doing anything else. Kick start your tech career with Amarachi Amaechi's new book Getting Started in Tech: A guide to building a tech career My web development courses ➡️ Learn How to build a JavaScript Tip Calculator ➡️ Learn JavaScript arrays ➡️ Learn PHP arrays ➡️ Learn Python ✉️ Get my weekly newsletter ⏰ My current live coding schedule (Times are BST) Thursdays 20:00 = Live Podcast YouTube Sundays 14:30 - Live coding on Twitch

The CultCast
Apple Unleashed Event — here come the M1X Macs! (CultCast #514)

The CultCast

Play Episode Listen Later Oct 15, 2021 83:12


This week: Finally! Here come the M1X Macs! We talk our predictions for Monday's Apple “Unleashed” event! Plus: a rumor says Apple is prepping a Nintendo Switch-like gaming console, and we reveal our favorite new shows on an all-new What We're Into! Get 2 episodes of CultCast Off Topic each and every week for just $6! Off Topic is a new weekly variety show hosted by Erfon Elijah and friends, dedicated to tech, gaming, culture, and more. Join Cult Support, good friend! This episode supported by Easily create a beautiful website all by yourself, at Squarespace.com/cultcast. Use offer code CultCast at checkout to get 10% off your first purchase of a website or domain. Cult of Mac's watch store is full of beautiful straps that cost way less than Apple's. See the full curated collection at Store.Cultofmac.com CultCloth will keep your iPhone 12, Apple Watch, iPad, glasses and lenses sparkling clean, and for a limited time use code CULTCAST at checkout to score a free CarryCloth with any order at CultCloth.co. Join us in the CultClub! discord.gg/BrKdnSK On the show this week @erfon / @lkahney / @lewiswallace New MacBook Pros Likely to Launch at Apple Event This Month, Says Gurman In his latest newsletter, Gurman says Apple y is poised to announce the M1X powered MacBook Pros within the next month, noting that "Apple typically does its major new Mac introductions in October. So stay tuned." Apple invites the world to Oct. 18 ‘Unleashed' event; new M1X Macs expected Apple sent out invites Tuesday to its much-anticipated October product launch event. The tagline is “Unleashed,” and the streaming event almost certainly will bring the debut of redesigned MacBooks and perhaps an iMac running an updated Apple processor. M1X MacBook Pros might start at 16GB RAM, 512GB storage, 120Hz screen A tipster who goes by Dylandkt reported Tuesday via Twitter that the base models for both sizes of the 2021 MacBook Pro will have 16GB of RAM and 512GB of storage. Those are double the amounts in the 13-inch M1 MacBook released in 2020. But they are the same as the current base model 16-inch MacBook Pro, which uses an Intel processor. Win an iPhone 13 case bundle from Smartish [Cult of Mac giveaway] If you just got an iPhone 13, this week's giveaway is for you. Popular case-maker Smartish is giving one lucky winner a bundle that will keep their new iPhone protected, organized and charged. Laughable report claims Apple will take on Nintendo Switch with powerful hybrid console Apple is developing its own “Nintendo Switch style gaming console” with a hybrid design that “will outperform anything that Microsoft or Sony offers in 2021,” according to one very sketchy report citing unnamed sources. Apple Arcade goes big with NBA 2K22 and Transformers: Tactical Arena Apple's gaming service will soon launch a pair of big-name titles. Basketball season starts soon, and that means it's time for NBA 2K22 Arcade Edition. Meanwhile, Transformers: Tactical Arena will let players choose their favorite characters and battle it out in PvP action. Apple signals entertainment ambitions with major Los Angeles expansion With plans underway to build two adjoining facilities on the border of Los Angeles and Culver City, Apple has signaled it means business in the entertainment industry. The new development will serve as its regional headquarters, the Cupertino tech giant said. Classic iPhone Game 'Tiny Wings' Launches on Apple Arcade This Friday Over a decade after being released on the App Store, the classic hit iPhone game Tiny Wings is coming to Apple Arcade this Friday. What We're Into! The Boys (Amazon Prime) Loki (Disney +) ROBIN Test Footage Scene Foundation (Apple TV+)

La Manzana Mordida
Cómo mejorar Apple TV+

La Manzana Mordida

Play Episode Listen Later Oct 15, 2021 24:16


Debate especial con un suscriptor VIP de La Manzana Mordida acerca de cómo podría mejorarse Apple TV+, precedido de un resumen de estrenos de la semana en la plataforma.- Hazte suscriptor VIP de La Manzana Mordida en https://bit.ly/lmmpremium - Visita nuestra web de noticias en lamanzanamordida.net- Suscríbete a nuestro canal de YouTube en https://bit.ly/YTLMM

AppleInsider Podcast
'M1X' MacBook Pro Event Preview, Apple Watch Series 7 Reviews, and iPhone 13 Pro Cases

AppleInsider Podcast

Play Episode Listen Later Oct 15, 2021 62:05


New high-end MacBook Pro models and AirPods are expected at the Oct. 18 “Unleashed” Apple event, initial reviews of Apple Watch Series 7 are out, iPhone 13 Pro case options, and more. Follow Our Hosts @stephenrobles on Twitter @WGallagher on Twitter Sponsored by: SuperBeets: Join over 1 million customers, get FREE shipping, and right now get a free THIRTY DAY supply with your first purchase at: superbeets.com/appleinsider Masterclass: Get 15% off an annual membership to Masterclass when you visit: masterclass.com/appleinsider ExpressVPN: AppleInsider listeners can get three extra months when you sign up for a year of service! Get the most secure and fastest VPN service today by visiting: expressvpn.com/appleinsider Support the show Support the show on Patreon or Apple Podcasts to get ad-free episodes every week, access to our private Discord channel, and early release of the show! We would also appreciate a 5-star rating and review in Apple Podcasts Links from the show Apple Silicon MacBook Pro and AirPods event is on October 18 Mini LED in new MacBook Pro is '100% confirmed,' claims analyst New 'M1X' MacBook Pros to feature 1080p cameras, similar pricing, leaker claims Apple Watch Series 7 review roundup: the best, but not a compelling upgrade AppleCare+ Express Replacement now available in the Apple Support app iPhone 13 Pro Leather Case with MagSafe - Golden Brown iPhone 13 Pro Max Silicone Case with MagSafe - Marigold Thin V3 Case - Sky Blue - iPhone 13 Pro Apple working with Florida to bring state digital ID support to Wallet mophie - powerstation XXL - Portable Charger More AppleInsider podcasts Subscribe and listen to our AppleInsider Daily podcast for the latest Apple news Monday through Friday. You can find it on Apple Podcasts, Overcast, or anywhere you listen to podcasts. Tune in to our HomeKit Insider podcast covering the latest news, products, apps and everything HomeKit related. Subscribe in Apple Podcasts, Overcast, or just search for HomeKit Insider wherever you get your podcasts. Podcast artwork from Basic Apple Guy. Download the free wallpaper pack here. Those interested in sponsoring the show can reach out to us at: steve@appleinsider.com

MacVoices Video
MacVoices #21194: MacVoices Live! More on Facebook Use, and Remembering Steve Jobs 10 Years Later (2)

MacVoices Video

Play Episode Listen Later Oct 14, 2021 34:04


Our MacVoices Live! panel of David Ginsburg, Jeff Gamet, Jim Rea, Guy Serle, Warren Sklar, Mark Fuccio, Patrice Brend'Amour, Jay Miller, Brittany Smith, and Kelly Guimont conclude the discussion of Facebook's most recent Congressional appearance and their tactics, then turn to the anniversary of Steve Job's passing. You might be surprised at some of the observations of  their thoughts and impressions. Find out which panel member scolded Steve, and why. (Part 2)   MacVoices Magazine, our free magazine on Flipboard. Updated daily with the best articles on the web to help you do more with your Apple, access MacVoices Magazine content on Flipboard, on the web, or in your favorite RSS reader. Show Notes: Guests: Patrice Brend'amour is the creator, advocate and Product Manager of a global healthcare software initiative, which is not only pushing the industry to provide user-centered solutions using the latest advances in UX and technology, but also advancing the sharing of medical information between healthcare providers across the world. He is also an avid podcaster, mainly in the technology space, as well as a maintainer and contributor to a number of open source projects. Everything he does can be linked to from The Patrice, you can follow him on Twitter, and engage with him on the podcast, Foodie Flashback. Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter on LinkedIn. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, and jeffgamet on LinkedIn., and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. Kelly Guimont is a podcaster and friend of the Rebel Alliance. She hosts the Daily Observations Podcast at MacObserver.com, and appears on The Incomparable network as well as hosts I Want My M(CU) TV. You can also hear her on The Aftershow with Mike Rose, and she still has more to say which she saves for Twitter. Jay Miller is a Developer Advocate and Podcaster based in San Diego, Ca. A multipotentialite, Jay enjoys finding unique ways to merge his fascination with productivity, automation, and development to create tools and content to serve the tech community.Hear him on his podcast, Conduit and Youtube.com/kjaymiller or checkout his web site at kjaymiller.com. Jim Rea has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. Follow Jim at provue.com and via @provuejim on Twitter. Guy Serle, best known for being one of the co-hosts of the MyMac Podcast, sincerely apologizes for anything he has done or caused to have happened while in possession of dangerous podcasting equipment. He should know better but being a blonde from Florida means he's probably incapable of understanding the damage he has wrought. Guy is also the author of the novel, The Maltese Cube. You can follow his exploits on Twitter, catch him on Mac to the Future on Facebook, and find everything at VertShark.com. Warren Sklar helps host the Mac to The Future Group on Facebook, and is the co-host of In Touch With iOS with David Ginsburg. Brittany Smith is a cognitive neuroscientist who provides a variety of consulting services through her business, Devise and Conquer that includes ADD/ADHD coaching, technology coaching, productivity consulting, and more. She is a self-designated “well-rounded geek”, and holds a M.S. degree in Cognitive Neuroscience. She can be found on Twitter as @addliberator. Check out her latest project, a YouTube channel of tech tips. Support: Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect: Web:      http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices Facebook:      http://www.facebook.com/chuck.joiner MacVoices Page on Facebook:      http://www.facebook.com/macvoices/ MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice LinkedIn:      https://www.linkedin.com/in/chuckjoiner/ Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

Seraphiend
Make Up Artist Extraordinaire Pt. 2 | Seraphiend Podcast Season 2

Seraphiend

Play Episode Listen Later Oct 14, 2021 26:10


Stacy Vizcarra has been a professional makeup artist for the past 18 years in San Diego, CA. Starting her career with MAC and staying with them for 10 years developing her amazingly-unique talents and precise skills. She also worked for Chanel and Tom Ford Beauty. She has worked for some of the top names in fashion and media including: Sony, Mercedes Benz- LA Fashion Week and Beyoncé, Missy Elliot & Alicia Keys First Ladies First Tour. Her specialty is bringing out every woman's natural beauty & contour while emphasizing highlights and flawless skin. Her love for all things style and beauty continues to grow and develop with the ever-changing climate of fashion. She has a true passion for her craft. Keep up with Stacy: http://www.stacyvmakeupartist.com/  https://www.instagram.com/stacyvmua/  To keep up with Seraphine, follow her at: Website: https://seraphiend.com/   Instagram: https://www.instagram.com/seraphiend_podcast/    Instagram (Personal): https://www.instagram.com/therealseraphine/    Facebook: https://www.facebook.com/seraphiendpodcast   

Relay FM Master Feed
Upgrade 376: The 2021 October Event Draft

Relay FM Master Feed

Play Episode Listen Later Oct 14, 2021 65:26


Surprise! Jason and Myke predict what will happen at next week's Apple media event. What ports will be on the much-rumored MacBook Pro? Will it appear in familiar colors, or will Apple branch out and offer something new? Will we see updates to the Mac mini, new AirPods, or--dare we dream--an affordable external display? It's all to play for.

Upgrade
376: The 2021 October Event Draft

Upgrade

Play Episode Listen Later Oct 14, 2021 65:26


Surprise! Jason and Myke predict what will happen at next week's Apple media event. What ports will be on the much-rumored MacBook Pro? Will it appear in familiar colors, or will Apple branch out and offer something new? Will we see updates to the Mac mini, new AirPods, or--dare we dream--an affordable external display? It's all to play for.

The Mac Observer's Daily Observations
Thursdays with Bob: Pro Max Love

The Mac Observer's Daily Observations

Play Episode Listen Later Oct 14, 2021 18:41


Dr Mac has his iPhone 13 Pro Max in hand, and joins Kelly to talk about his new love including some specific changes he particularly likes.

How Girls Talk
Big Ole Bruiser

How Girls Talk

Play Episode Listen Later Oct 14, 2021 43:02


McKaila is back and had a weekend for the record books and why Amy was on TV with a black eye. Plus, the way you sleep with your partner and what it says about your relationship, a look back to the first time Mac and Amy met in 'Grab Bag.' Oh, and our weekly recommendations :)

MacMost - Mac, iPhone and iPad How-To Videos
Search Sites Directly With Safari Quick Website Search (MacMost #2549)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Oct 14, 2021


View in HD at . Learn how to use Quick Website Search on your Mac, iPhone and iPad to skip search engines and get results directly from your favorite websites. This saves time and increases privacy.

Intego Mac Podcast
Episode 209: What the heck is Apple doing??

Intego Mac Podcast

Play Episode Listen Later Oct 14, 2021 30:18


Apple has released a security update for an actively exploited vulnerability, but only for iOS 15, not iOS 14? What are they doing? We also discuss how Apple sometimes offers security updates for older versions of macOS, but not always. Show Notes: How to Use Focus to Limit Notifications in iOS 15 and macOS Monterey iOS 15.0.2 fixes new “actively exploited” vulnerability Tweet by Denis Tokarev Researcher discloses several zero-day iOS, iPadOS vulnerabilities NSO Pegasus spyware can no longer target UK phone numbers Josh's Objective by the Sea talk: n-1 and n-2: Should we really trust in you? An examination of macOS security updates Intego Mac Premium Bundle X9 is the ultimate protection and utility suite for your Mac. Download a free trial now at intego.com, and use this link for a special discount when you're ready to buy.

Las Charlas de Applesfera
Una keynote a la velocidad de la luz

Las Charlas de Applesfera

Play Episode Listen Later Oct 14, 2021 63:07


Casi por sorpresa, Apple convoca a la prensa a un nuevo evento donde el principal protagonista parece ser la "potencia". Con la manzanita de Apple entrando en el hiperespacio, todas las apuestas apuntan a nuevos Mac y sobre todo, a nuevos procesadores Apple Silicon: la llegada de los M1X - y quizás de unos posibles M2, parece inminente. Pedro Aznar (@pedroaznar) y Eduardo Archanco (@eaala) comentan, además de la próxima keynote, la opinión de Apple sobre el "sideloading" de apps fuera de la App Store y por supuesto analizan todos los detalles del nuevo Apple Watch Series 7, cuya review ya hemos publicado en Applesfera. *** ¡Ahora podéis acompañarnos durante la grabación!Cada martes, a las 19:00 en ElStream, el canal de Twitch de Webedia, estaremos en directo. ¡Os esperamos! https://twitch.tv/elstream Las Charlas de Applesfera es el podcast del equipo de Applesfera, donde se trata el gran tema de la semana y su contexto - contado por los expertos que te acompañan en el mundo Apple desde 2006. Contacta con el director en (pedroaznar@applesfera.com) o con el equipo en (editores@applesfera.com). Twitter: https://twitter.com/applesfera Instagram: https://instagram.com/applesfera Twitch: https://twitch.com/elstream (cada martes, 19:00 hora española peninsular) ¡Gracias por escuchar este podcast!

La Manzana Mordida
iOS 15.0.2: muy bien y muy mal

La Manzana Mordida

Play Episode Listen Later Oct 14, 2021 5:36


Tras el anuncio del evento de Apple, seguimos conociendo indicios acerca de qué productos presentará y además abrimos un debate acerca de algunos problemas de software que siguen presentes en iOS 15.0.2.- Hazte suscriptor VIP de La Manzana Mordida en https://bit.ly/lmmpremium - Visita nuestra web de noticias en lamanzanamordida.net- Suscríbete a nuestro canal de YouTube en https://bit.ly/YTLMM

Mac on sports podcast
Lamar is insane, Freddie Freeman stud, Georgia vs Kentucky

Mac on sports podcast

Play Episode Listen Later Oct 14, 2021 41:19


- Monday Night Football classic - Lamar looked to be playing on rookie mode  - Freddie with a bomb to advance the Braves  - Red Sox advance with a walk off  - UGA vs UK biggest game all year  - NFL breakdown of the week and more  socials: Mac_on_sports - Instagram, Tiktok  Mac on sports - YouTube 

Seven Rounds in Heaven
Pitts and Toney rep Gator Nation, Rousseau stars in primetime, and Peter Werner is a DUDE

Seven Rounds in Heaven

Play Episode Listen Later Oct 14, 2021 73:08


It was crazy Week 5 in the NFL and Rob Paul and AJ Marchese have you covered on which rookies looked the best and worst. They start with the QBs where TLaw and Fields showed positive signs while Zach Wilson and Trey Lance struggled and Mills and Mac went toe-to-toe in an elite battle. Then they talk Kyle Pitts breakout game, Kadarius Toney being ultra-dynamic, Greg Rousseau and Odafe Oweh thriving under the lights, and much more!See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

MacVoices Video
MacVoices #21193: MacVoices Live! - Facebook On The Congressional Hot Seat, Whistleblowing (1)

MacVoices Video

Play Episode Listen Later Oct 14, 2021 34:57


The MacVoices Live! super-panel of David Ginsburg, Jeff Gamet, Jim Rea, Guy Serle, Warren Sklar, Mark Fuccio, Patrice Brend'Amour, Jay Miller, Brittany Smith, and Kelly Guimont got a little hot under the collar discussing the effects of the Facebook whistleblower's congressional testimony, and why this might be different than past investigations into the social network's behavior. Can a whistleblower with documentation affect change where others have failed? (Part 1)  This edition of MacVoices is supported by MacVoices After Dark, our newest benefit for all Patreon supporters. Uncensored, off-topic, and always off the wall. Show Notes: Guests: Patrice Brend'amour is the creator, advocate and Product Manager of a global healthcare software initiative, which is not only pushing the industry to provide user-centered solutions using the latest advances in UX and technology, but also advancing the sharing of medical information between healthcare providers across the world. He is also an avid podcaster, mainly in the technology space, as well as a maintainer and contributor to a number of open source projects. Everything he does can be linked to from The Patrice, you can follow him on Twitter, and engage with him on the podcast, Foodie Flashback. Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter on LinkedIn. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, and jeffgamet on LinkedIn., and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. Kelly Guimont is a podcaster and friend of the Rebel Alliance. She hosts the Daily Observations Podcast at MacObserver.com, and appears on The Incomparable network as well as hosts I Want My M(CU) TV. You can also hear her on The Aftershow with Mike Rose, and she still has more to say which she saves for Twitter. Jay Miller is a Developer Advocate and Podcaster based in San Diego, Ca. A multipotentialite, Jay enjoys finding unique ways to merge his fascination with productivity, automation, and development to create tools and content to serve the tech community.Hear him on his podcast, Conduit and Youtube.com/kjaymiller or checkout his web site at kjaymiller.com. Jim Rea has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. Follow Jim at provue.com and via @provuejim on Twitter. Guy Serle, best known for being one of the co-hosts of the MyMac Podcast, sincerely apologizes for anything he has done or caused to have happened while in possession of dangerous podcasting equipment. He should know better but being a blonde from Florida means he's probably incapable of understanding the damage he has wrought. Guy is also the author of the novel, The Maltese Cube. You can follow his exploits on Twitter, catch him on Mac to the Future on Facebook, and find everything at VertShark.com. Warren Sklar helps host the Mac to The Future Group on Facebook, and is the co-host of In Touch With iOS with David Ginsburg. Brittany Smith is a cognitive neuroscientist who provides a variety of consulting services through her business, Devise and Conquer that includes ADD/ADHD coaching, technology coaching, productivity consulting, and more. She is a self-designated “well-rounded geek”, and holds a M.S. degree in Cognitive Neuroscience. She can be found on Twitter as @addliberator. Check out her latest project, a YouTube channel of tech tips. Support:      Become a MacVoices Patron on Patreon     http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:     http://macvoices.com      Twitter:     http://www.twitter.com/chuckjoiner     http://www.twitter.com/macvoices      Facebook:     http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:     http://www.facebook.com/macvoices/      MacVoices Group on Facebook:     http://www.facebook.com/groups/macvoice      LinkedIn:     https://www.linkedin.com/in/chuckjoiner/      Instagram:     https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes     Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss