Podcasts about Microsystems

  • 58PODCASTS
  • 74EPISODES
  • 27mAVG DURATION
  • ?INFREQUENT EPISODES
  • Apr 23, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Microsystems

Latest podcast episodes about Microsystems

LOVING LIFE AT HOME - Christian Marriage, Faith-Based Parenting, Biblical Homemaking, Purposeful Living

Sometimes life's responsibilities seem so overwhelming and inescapable that you feel like you're barely treading water. How do you cope when the going gets tough, and your energy's already depleted? Here are seven strategies that have kept me afloat during the busiest, most exhausting seasons of mothering 12 children and managing a increasingly busy household. Show Notes VERSES CITED: - “These things I have spoken unto you, that in Me you may have peace....” - John 16:33  - “Consider it all joy, my brethren, when you encounter various trials....” - James 1:2-4 - "...God causes all things to work together for good to those who love God...."- Romans 8:28 - "If anybody lacks wisdom, let him ask of God who gives to all freely..." - James 1:5 - “When [people] measure themselves by themselves... they are not wise.” - 2 Corinthians 10:12 - “Whether, then, you eat or drink or whatever you do, do all to the glory of God.” - 1 Corinthians 10:31 - "Be strong and courageous... He will never leave you nor forsake you.” - Deuteronomy 31:6 - “I can do all things through Christ who strengthens me!” - Philippians 4:13 - “Yet those who wait upon the LORD shall renew their strength....They shall walk and not faint.” - Isaiah 40:31 - “Call upon Me in the day of trouble: I will deliver thee, and thou shalt glorify me.” - Psalm 50:15 - "I am the vine; you are the branches. If you remain in me and I in you, you will bear much fruit...." - John 15:5 - “A little sleep, a little slumber, a little folding of the hands to rest...." - Proverbs 6:10 (see also Prov 24:33-34) - “Unless the LORD builds the house, they labor in vain who build it...” - Psalm 127:1-2 - “He will feed His flock like a shepherd... and gently lead those who are with young.” - Isaiah 40:11 - “Come to Me, all you who are weary and are heavy laden, and I will give you rest....” - Matthew 11:28-30 - “So teach us to number our days, that we may present to You a heart of wisdom.” - Psalm 90:12 - “Love you neighbor as you love yourself” - Mark 12:30 - "From everyone to whom much has been given will much be required...” - Luke 12:48 - "So then, each of us will give an account of ourselves to God." - Romans 14:12 - "Love the LORD your God with all your heart, soul, mind, and strength...." - Mark 12:30 - “Better a dry crust with peace and quiet than a house full of feasting, with strife.” - Proverbs 17:1 - “Better is a portion of vegetables where there is love, than a fattened ox served with hatred.” - Proverbs 15:17  - “Let us not grow weary in doing good, for in due season we shall reap if we don't lose heart.” - Galatians 6:9  - "Do not despise these small beginnings, for the LORD rejoices to see the work begin..." - Zechariah 4:10   RELATED LINKS:  - Flanders Family Freebies - use ths link to subscribe to my weekly newsletter - Episode 53: Microsystems for Home Management - Man's Search for Meaning by Viktor Frankl   STAY CONNECTED: - Subscribe: Flanders Family Freebies - (weekly themed link lists of free resources) - Instagram: follow @flanders_family for more great content - Shop my books: Flanders Family Store - Family Blog: Flanders Family Home Life (parenting tips, homeschool help, free printables)  - Marriage Blog: Loving Life at Home  (encouragement in your roles as wife, mother, believer)    

Gude, Mittelhessen!
Leica Microsystems in Wetzlar beendet mobiles Arbeiten

Gude, Mittelhessen!

Play Episode Listen Later Jan 15, 2025 7:12


Unternehmen beendet mobiles Arbeiten, Marburg von Fernverkehrsanbindungen abgekoppelt und Supermärkte und Discounter liefern sich Preiskampf. Das und mehr heute im Podcast. Alle Infos und Hintergründe zu den Themen gibt es hier: https://www.mittelhessen.de/lokales/lahn-dill-kreis/wetzlar/leica-microsystems-ruft-belegschaft-zurueck-ins-buero-4236427 https://www.mittelhessen.de/lokales/kreis-marburg-biedenkopf/marburg/bahn-fernverkehr-laesst-marburg-bis-februar-links-liegen-4289600 https://www.mittelhessen.de/lokales/lahn-dill-kreis/bischoffen/zugefrorener-aartalsee-betreten-der-eisflaeche-verboten-4291098 https://www.mittelhessen.de/lokales/kreis-marburg-biedenkopf/biedenkopf/finanzamt-in-biedenkopf-gehoert-zu-den-schnellsten-in-hessen-4288358 https://www.mittelhessen.de/lokales/lahn-dill-kreis/dillenburg/parfuemerie-seibel-schliesst-filiale-in-dillenburg-4282732 https://www.mittelhessen.de/wirtschaft/wirtschaft-deutschland/bonus-schlacht-lidl-und-aldi-kontern-mit-rabatt-aktionen-4290248 Ein Angebot der VRM. .

Swisspreneur Show
EP #463 - Frédéric Loizeau: How Photonic Integrated Circuits Will Supercharge AI

Swisspreneur Show

Play Episode Listen Later Dec 22, 2024 34:31


Timestamps: 4:35 - Similarities between entrepreneurship and academia 9:02 - What are photonic integrated circuits? 16:07 - Approaching customers from different industries 17:09 - Why Lightium is still in beta stage 18:51 - What business model do they plan on adopting? This episode was produced in collaboration with startup days, taking place next year on May 14th 2025. Click ⁠here⁠ to purchase your ticket. About Frédéric Loizeau: Frédéric Loizeau is the co-founder and CRO of Lightium, a Swiss startup enabling the next generation of photonic integrated circuits. He holds a PhD in Microsystems from EPFL and worked as a researcher at Stanford and as a key account manager at Sensirion and Business & Technology Development Manager at CSEM before starting Lightium in 2023. Lightium provides production-grade TFLN PIC foundry services to customers in the datacom, telecom, AI, Quantum, and aerospace industries. What does this mean? It means they manufacture photonic integrated circuits, which are essential to making the transfer of information faster. This is relevant for fiber optic internet, in the telecom industry, but also quite relevant for space satellites. Lastly, it's crucial for AI: the recent developments in this field have increased our need not only for computing power (which NVIDIA solved by providing their GPUs to data centers), but also for greater bandwidth — that's where Lightium's tech comes in. They frame their technology as a service, through which people from different industries can design their own photonic integrated circuits that will then be manufactured by the Lightium team. Lightium has had great success since the very beginning: when they were still working on their idea at the CSEM research center and tentatively reaching out to customers asking for letters of recommendation, they got cheques instead. Nowadays their success continues: they recently raised a CHF 7M seed round. The cover portrait was edited by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠www.smartportrait.io⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.‍ Don't forget to give us a follow on⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Twitter⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠,⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Instagram⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠,⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Facebook⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Linkedin⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, so you can always stay up to date with our latest initiatives. That way, there's no excuse for missing out on live shows, weekly giveaways or founders' dinners.

Lance Roberts' Real Investment Hour
12-12-24 CPI Gives The Fed A Green Light For Rate Cut

Lance Roberts' Real Investment Hour

Play Episode Listen Later Dec 12, 2024 46:23


Lance reviews a recent report about generational wealth transfers, and notes that his kids get NOTHING. Wednesday's CPI report was seemingly the last hurdle for the Fed to cut interest rates. With the CPI index matching Wall Street forecasts, the Fed Funds futures market now implies a 97% chance the Fed will cut rates next Wednesday. The data was OK but elicits fears that the downward price progress has stalled. Lance & Michael discuss the precarious premise behind Microsystem's Bitcoin strategy, what makes for value, and what happens when there's no more buyers. How did the Hunt Brothers' silver gambit differ from Microsystems Bitcoin bid? CPI Recap: Inflation is sticky at current levels because that's where the growth is. Plowing through the final, lame duck weeks of the Biden presidency; there are still some Federal Covid Stimulus funds to be distributed to states, keeping inflation fires stoked. What's happening with Canada and the rest of the world? Economic growth attracts capital; next year may hold surprises for the bullish crowd. Bitcoin is the epitome of The Greater Fool Theory. SEG-1: Generational Wealth Transfers, CPI , PPI, & Santa Claus Rally SEG-2: Microsystems, Bitcoin, & Convertible Debt SEG-3: What If We Don't Meet 2025 Expectations? SEG-4: Tax Loss Harvesting & RMD's - Do It Now Hosted by RIA Advisors Chief Investment Strategist Lance Roberts, CIO, w Portfolio Manager Michael Lebowitz, CFA Produced by Brent Clanton, Executive Producer ------- Watch today's show video here: https://www.youtube.com/watch?v=vPkzTXYsmk0&list=PLVT8LcWPeAugpcGzM8hHyEP11lE87RYPe&index=1&t=2331s ------- Articles mentioned in this report: "CPI Was On The Screws: The Fed Has The Green Light" https://realinvestmentadvice.com/resources/blog/cpi-was-on-the-screws-the-fed-has-the-green-light/ "Portfolio Rebalancing And Valuations. Two Risks We Are Watching." https://realinvestmentadvice.com/resources/blog/portfolio-rebalancing-and-valuations-two-risks-we-are-watching/ "2025 – Do Economic Indicators Support Bullish Outlooks?" https://realinvestmentadvice.com/resources/blog/2025-do-economic-indicators-support-bullish-outlooks/ ------- The latest installment of our new feature, Before the Bell, "The Pressure is On the Markets," is here: https://www.youtube.com/watch?v=Yxcoj_-jaAY&list=PLwNgo56zE4RAbkqxgdj-8GOvjZTp9_Zlz&index=1 ------- Our previous show is here: "Portfolio Re-balancing & High Valuation Risks" https://www.youtube.com/watch?v=nASrF7t64kY&list=PLVT8LcWPeAugpcGzM8hHyEP11lE87RYPe&index=1&t=3s ------- Get more info & commentary: https://realinvestmentadvice.com/newsletter/ -------- SUBSCRIBE to The Real Investment Show here: http://www.youtube.com/c/TheRealInvestmentShow -------- Visit our Site: https://www.realinvestmentadvice.com Contact Us: 1-855-RIA-PLAN -------- Subscribe to SimpleVisor: https://www.simplevisor.com/register-new -------- Connect with us on social: https://twitter.com/RealInvAdvice https://twitter.com/LanceRoberts https://www.facebook.com/RealInvestmentAdvice/ https://www.linkedin.com/in/realinvestmentadvice/ #FederalReserve #RateCut #CPI #Inflation #EconomicPolicy #InterestRates #PortfolioRebalancing #MarketValuations #RiskManagement #InvestmentTrends #StockMarket2024 #MarketRally #MarketCorrection #MarketExpectations #MarketVolatility #VolatilityIndex #WindowDressing #MarketTrend #PortfolioCleanUp #MarketExuberance #OverBoughtMarket #SP500 #MarketPullBack #MarketConsolidation #MutualFundDistributions #EarningsVsEconomy #MarketInsights #EconomicGrowth #CorporateProfits #InvestingWisely #MarketExpectations #PortfolioRealityCheck #InvestmentStrategy #FinancialPlanning #MarketTrends2024 #WealthManagement #MarketLeverage #SpeculationRisks #InvestmentTrends #FinancialWarnings #StockVolatility #StockMarketSpeculation #MarketVolatility #HighRiskInvesting #SpeculativeTrading #FinancialTrends2025 #TrumpAdministration #RegulatoryChanges #InvestingAdvice #Money #InvestingAdvice #Money #Investing

The Real Investment Show Podcast
12-12-24 CPI Gives the Fed a Green Light for Rate Cut

The Real Investment Show Podcast

Play Episode Listen Later Dec 12, 2024 46:24


Lance reviews a recent report about generational wealth transfers, and notes that his kids get NOTHING. Wednesday's CPI report was seemingly the last hurdle for the Fed to cut interest rates. With the CPI index matching Wall Street forecasts, the Fed Funds futures market now implies a 97% chance the Fed will cut rates next Wednesday. The data was OK but elicits fears that the downward price progress has stalled. Lance & Michael discuss the precarious premise behind Microsystem's Bitcoin strategy, what makes for value, and what happens when there's no more buyers. How did the Hunt Brothers' silver gambit differ from Microsystems Bitcoin bid? CPI Recap: Inflation is sticky at current levels because that's where the growth is. Plowing through the final, lame duck weeks of the Biden presidency; there are still some Federal Covid Stimulus funds to be distributed to states, keeping inflation fires stoked. What's happening with Canada and the rest of the world? Economic growth attracts capital; next year may hold surprises for the bullish crowd. Bitcoin is the epitome of The Greater Fool Theory. SEG-1: Generational Wealth Transfers, CPI , PPI, & Santa Claus Rally SEG-2: Microsystems, Bitcoin, & Convertible Debt SEG-3: What If We Don't Meet 2025 Expectations? SEG-4: Tax Loss Harvesting & RMD's - Do It Now Hosted by RIA Advisors Chief Investment Strategist Lance Roberts, CIO, w Portfolio Manager Michael Lebowitz, CFA Produced by Brent Clanton, Executive Producer ------- Watch today's show video here: https://www.youtube.com/watch?v=vPkzTXYsmk0&list=PLVT8LcWPeAugpcGzM8hHyEP11lE87RYPe&index=1&t=2331s ------- Articles mentioned in this report: "CPI Was On The Screws: The Fed Has The Green Light" https://realinvestmentadvice.com/resources/blog/cpi-was-on-the-screws-the-fed-has-the-green-light/ "Portfolio Rebalancing And Valuations. Two Risks We Are Watching." https://realinvestmentadvice.com/resources/blog/portfolio-rebalancing-and-valuations-two-risks-we-are-watching/ "2025 – Do Economic Indicators Support Bullish Outlooks?" https://realinvestmentadvice.com/resources/blog/2025-do-economic-indicators-support-bullish-outlooks/ ------- The latest installment of our new feature, Before the Bell, "The Pressure is On the Markets," is here:  https://www.youtube.com/watch?v=Yxcoj_-jaAY&list=PLwNgo56zE4RAbkqxgdj-8GOvjZTp9_Zlz&index=1 ------- Our previous show is here: "Portfolio Re-balancing & High Valuation Risks" https://www.youtube.com/watch?v=nASrF7t64kY&list=PLVT8LcWPeAugpcGzM8hHyEP11lE87RYPe&index=1&t=3s ------- Get more info & commentary:  https://realinvestmentadvice.com/newsletter/ -------- SUBSCRIBE to The Real Investment Show here: http://www.youtube.com/c/TheRealInvestmentShow -------- Visit our Site: https://www.realinvestmentadvice.com Contact Us: 1-855-RIA-PLAN -------- Subscribe to SimpleVisor: https://www.simplevisor.com/register-new -------- Connect with us on social: https://twitter.com/RealInvAdvice https://twitter.com/LanceRoberts https://www.facebook.com/RealInvestmentAdvice/ https://www.linkedin.com/in/realinvestmentadvice/ #FederalReserve #RateCut #CPI #Inflation #EconomicPolicy #InterestRates #PortfolioRebalancing #MarketValuations #RiskManagement #InvestmentTrends #StockMarket2024 #MarketRally #MarketCorrection #MarketExpectations #MarketVolatility #VolatilityIndex #WindowDressing #MarketTrend #PortfolioCleanUp #MarketExuberance #OverBoughtMarket #SP500 #MarketPullBack #MarketConsolidation #MutualFundDistributions #EarningsVsEconomy #MarketInsights #EconomicGrowth #CorporateProfits #InvestingWisely #MarketExpectations #PortfolioRealityCheck #InvestmentStrategy #FinancialPlanning #MarketTrends2024 #WealthManagement #MarketLeverage #SpeculationRisks #InvestmentTrends #FinancialWarnings #StockVolatility #StockMarketSpeculation #MarketVolatility #HighRiskInvesting #SpeculativeTrading #FinancialTrends2025 #TrumpAdministration #RegulatoryChanges #InvestingAdvice #Money #InvestingAdvice #Money #Investing

LOVING LIFE AT HOME - Christian Marriage, Faith-Based Parenting, Biblical Homemaking, Purposeful Living

This week on the Loving Life at Home Podcast, we're talking all about children's chores. I've been fielding a lot of questions on this topic lately, and I realize I haven't shared much about how we handle chores at our house, so today is the day! I hope you'll listen in. Show Notes VERSES CITED: - Proverbs 14:4 - "Where there are no oxen, the manger is clean, but abundant crops come by the strength of the ox." - Galatians 6:9 – “Let us not become weary in doing good, for at the proper time we will reap a harvest if we do not give up.” - Philippians 2:14 - "Do everything without complaining or arguing..." RELATED LINKS: - Episode 53 (Microsystems for Organizing Your Home) - Bedroom Inspection Checklist (let kids know what you mean when you say "clean your room") - Age Appropriate Chores for Children (free printable list available in multiple languages) - Teaching Kids to Do Chores Cheerfully (several ideas that have helped our kids over the years) - Why the Controversy over Children's Chores? (readers weigh in on both sides of the debate) - Should We Pay our Kids for Doing Chores (and if so, how much?) - Super Easy Peanut Butter Cookies (only 3 ingredients--4 if you add chocolate chips) STAY CONNECTED: - Subscribe: Flanders Family Freebies -(weekly themed link lists of free resources) - Instagram: follow @flanders_family for more great content - Family Blog: Flanders Family Home Life (parenting tips, homeschool help, lots of free printables!)  - Marriage Blog: Loving Life at Home  (encouragement in your roles as wife, mother, believer)    

Addict II Athlete's podcast
Listening to the Body's Signals

Addict II Athlete's podcast

Play Episode Listen Later Aug 12, 2024 51:06


In this episode of the Attitude Athlete Podcast, Coach Blu interviews Dr. Tom Ingegno, an expert in acupuncture and Chinese medicine. They discuss alternative approaches to healing and the benefits of practices like cupping and acupuncture. Dr. Ingegno explains the history and effectiveness of cupping therapy, which dates back thousands of years and has been used to treat musculoskeletal pain and promote relaxation. They also explore the connection between physical and emotional health and how acupuncture can help regulate the autonomic nervous system. The conversation highlights the importance of listening to the body's signals and addressing discomfort before it becomes a more serious issue. In this conversation, Coach Blu and Dr. Tom Ingegno discuss the importance of emotional well-being and the role of acupuncture in promoting healing. They explore the concept of microsystems and how different parts of the body, such as the feet and ears, can be used to access and treat various health issues. Dr. Ingegno also shares insights from his book, 'The Cupping Book,' which provides practical tips and techniques for using cupping therapy. The conversation emphasizes the importance of holistic approaches to health and empowering individuals to take control of their well-being.

Stock Day Media
Charlotte's Web Holdings, Inc. | Spectra 7 Microsystems Inc.

Stock Day Media

Play Episode Listen Later May 13, 2024 0:58


Charlotte's Web Holdings, Inc., the market leader in hemp-derived CBD wellness products, is pleased to announce the appointment of Matthew E. McCarthy to its Board of Directors. Mr. McCarthy is the former CEO of Ben & Jerry's Homemade, bringing a unique blend of commercial acumen and deep commitment to social impact within the consumer-packaged goods and natural products industries. Spectra7 Microsystems Inc., a leading provider of high-performance analog semiconductor products for broadband connectivity markets, and ACES Electronics Co., Ltd, a leading Taiwan-based connector and cable supplier, announced that they successfully demonstrated best-in-class performance of 800G Active Copper Cables at this year's annual DesignCon Conference Exhibition. For more information, please visit StockDayMedia.com

Techmeme Ride Home
(Portfolio Profile) AdHawk Microsystems

Techmeme Ride Home

Play Episode Listen Later Dec 16, 2023 41:58


You can learn more about AdHawk Microsystems.But especially learn more about the MindLink Air.And the link to the YouTube version of this interview is here if you want to watch the demo.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Asset Champion Podcast | Physical Asset Performance, Criticality, Reliability and Uptime
Ep. 120: “It's About Asking Questions” – Asset Management Insights from Autodesk University with Matt Davoren of CADD Microsystems, Inc.

Asset Champion Podcast | Physical Asset Performance, Criticality, Reliability and Uptime

Play Episode Listen Later Dec 15, 2023 21:12


Matt Davoren is President & C.O.O. at CADD Microsystems, Inc. where he is focused on using technology to better our lives - one solution at a time. Recorded live in Las Vegas during Autodesk University 2023, Mike Petrusky asks Matt about his experiences, views on technology, and his believe in the importance of continuous learning in the asset and facility management industry. They discuss the trends revealed during this amazing event and Matt shares his views around the transformation of disconnected information islands into connected data as we continue to digitize the built environment. A.I. has the potential to help manage and manipulate information, making it a less manual process and more valuable to building owners and operators. So, Mike and Matt explore the strategies and tools available to better transfer data during the commissioning and handover process, including BIM and digital twins. It is an exciting time for facility management professionals and Matt will inspire you to be an Asset Champion in your organization! Connect with Matt on LinkedIn: https://www.linkedin.com/in/mattdavoren/ Learn more about CADD Microsystems, Inc.: https://www.caddmicrosystems.com/ Discover more about Autodesk University: https://www.autodesk.com/autodesk-university/ Learn more about Eptura™: https://eptura.com/ Discover free resources and explore past interviews at: https://assetchampion.iofficecorp.com/ Connect with Mike on LinkedIn: https://www.linkedin.com/in/mikepetrusky/  

The Drill Down
Ep. 222: Controversial Allegro Microsystems CEO Vineet Nargolwala, EOG Resources, Advanced Microdevices and Gitlab

The Drill Down

Play Episode Listen Later Sep 7, 2023 43:10


Our big interview with that target of short sellers Allegro Microsystems CEO Vineet Nargolwala (ALGM). Also EOG Resources' (EOG) surprising clean energy plans, Advanced Microdevices (AMD) gives a rare real-time business update and Gitlab (GTLB) enters the artificial intelligence arms race, targeting software developers. The Drill Down with Cory Johnson and Shivaune Field offers a weekly look at the business stories behind stocks on the move. Learn more about your ad choices. Visit megaphone.fm/adchoices

Stock Market Today With IBD
Stocks Show Resilience; Arista Networks, Allegro MicroSystems, Oracle In Focus

Stock Market Today With IBD

Play Episode Listen Later Aug 1, 2023 16:29


The major indexes were mixed Tuesday amid a flurry of earnings. Despite Treasury yields and the dollar running up again, the Nasdaq's losses were modest. Arista Networks was a big earnings winner while EV-exposed chipmaker Allegro MicroSystems sold off. Oracle is trading tightly, near an early entry.

Oral Arguments for the Court of Appeals for the Federal Circuit
Leica Microsystems, Inc. v. Regents of the University of Michigan

Oral Arguments for the Court of Appeals for the Federal Circuit

Play Episode Listen Later Apr 7, 2023 24:59


Leica Microsystems, Inc. v. Regents of the University of Michigan

Scale Your Sales Podcast
#168: Helen Fanucci - Empowering Sales Team For Revenue Success

Scale Your Sales Podcast

Play Episode Listen Later Dec 19, 2022 29:20


In this week's episode of the Scale Your Sales Podcast, my guest, Helen Fanucci is an MIT-trained engineer. Helen Fanucci developed the love of your team management system over her 25-year career on the front line at top tech companies including Apple, Sun, Microsystems, IBM, and currently Microsoft.   Helen Fanucci currently serves as a transformational sales leader at Microsoft leading a team of cloud Solutions Architects and customer success managers. Helen Fanucci is the author of the best-selling love your team, a survival guide for sales managers in a hybrid world, and hosts a love your team podcast that focuses on retaining top talent and building high-performing teams.   Welcome to Scale Your Sales Podcast, Helen Fanucci.   Timestamps:   00:00 - Transformational leadership   02:50 - Assisting your customers in getting more value   11:10 - Survivor's guide for managers    13:50 -  Data Signals   19:35 - Executive and Customer Locations   21:35 - Move the needle beyond where we are now in Sales   25:05 - University Recruiting   https://www.linkedin.com/in/helenfanucci/   Janice B Gordon is the award-winning Customer Growth Expert and founder of Scale Your Sales Framework. She is by LinkedIn Sales 15 Innovating Sales Influencers to Follow 2021, the Top 50 Global Thought Leaders and Influencers on Customer Experience Nov 2020 and 150 Women B2B Thought Leaders You Should Follow in 2021. Janice helps companies worldwide to reimagine revenue growth through customer experience and sales.   Book Janice to speak virtually at your next event https://janicebgordon.com     LinkedIn: https://www.linkedin.com/in/janice-b-gordon    Twitter: https://twitter.com/JaniceBGordon    Scale Your Sales Podcast: https://scaleyoursales.co.uk/podcast    More on the blog https://scaleyoursales.co.uk/blog    Instagram: https://www.instagram.com/janicebgordon    Facebook: https://www.facebook.com/ScaleYourSalesJBG 

The Wall Street Resource
Spectra7 Microsystems Inc. (SPVNF, SEV.V) Update Raouf Halim, CEO

The Wall Street Resource

Play Episode Listen Later Dec 19, 2022 20:46


Spectra7 Microsystems Inc. is a high-performance analog semiconductorcompany delivering unprecedented bandwidth, speed and resolution to enabledisruptive industrial design for leading electronics manufacturers in data centers, 5Ginfrastructure, virtual and augmented reality, and other connectivitymarkets.

TD Ameritrade Network
Allegro Microsystems (ALGM) Soars Post Earnings

TD Ameritrade Network

Play Episode Listen Later Oct 28, 2022 4:40


Allegro MicroSystems (ALGM) stock price today was up over 6% after their earnings report was released. Allegro MicroSystems creates and markets sensor integrated circuits or ICS for the automotive and industrial markets. Sensor ICS provide solutions for motion control and energy-efficient systems. George Tsilis weighs in on how ALGM compares to SLAB, POWI, and OLED.

The Original Guide To Men's Health
Episode 56: Biotechnology 3- How Medical Devices Interface and Integrate with our Body Systems. The development of biomaterials and micro devices.

The Original Guide To Men's Health

Play Episode Listen Later Oct 5, 2022 23:58


This episode reviews the progress in developing biomaterials that allow for external and internal non - invasive interfaces with our various organs. A leading researcher reviews the requirements for such materials and shares some recent device developments. Guest: Dr Chris J Bettinger, PhD: "Christopher Bettinger is a Professor at Carnegie Mellon University in the Departments of Materials Science and Engineering and Biomedical Engineering. He directs the laboratory for Biomaterials-based Microsystems and Electronics at CMU, which designs materials and interfaces that integrate medical devices with the human body. Dr. Bettinger has published over 90 articles and has been issued over 10 patents. He has received numerous honors including the MIT Tech Review TR35 Top Young Innovator under 35, and the DARPA Young Investigator Award." During This Episode We Discuss:   The challenges of interfacing device technology to humans. Think of fitting a device to curved tissue, that's flexible, miniature and allows for continuous monitoring.   Materials Science: Bio Inspired Materials   Embedded Electronics   Noninvasive monitoring of the human Gastrointestinal trac   Recommended Resources:   Carnegie Mellon University, Faculty, Dr Chrisopher J Bettinger.    Socials Visit our website for all the podcasts, additional resources and social media links Website: theoriginalguidetomenshealth.org Facebook: https://www.facebook.com/theoriginalguidetomenshealth/ Twitter: https://twitter.com/guide2menshlth Linkedin: https://www.linkedin.com/company/the-original-guide-to-mens-health/  

AR Show with Jason McDowall
Neil Sarkar (AdHawk Microsystems) on Tracking the Eyes Without Cameras and Creating a Fitness Tracker for the Brain

AR Show with Jason McDowall

Play Episode Listen Later Jul 19, 2022 58:25


Neil Sarkar is the CEO and co-founder of AdHawk Microsystems, a company creating the first camera-free eye tracking solution that offers unprecedented speed, data quality and power efficiency.Prior to AdHawk, Neil was a co-founder at ICSPI, which develops scanning probe instruments on a CMOS-MEMS technology platform. They are commercializing the world's first Single-Chip Atomic Force Microscope.Previously Neil attended the University of Waterloo, where he earned a Bachelors, Masters, and Doctorate in Electrical and Computer Engineering.In this conversation, we discuss Micro Electrical Mechanical (or MEMs) technology and its applications. Neil shares his path to founding AdHawk and his experience bringing AdHawk's innovations to market. We go on to discuss how AdHawk is trying to positively impact people's lives, what's special about their approach, and how you can get your hands on their tech in the near future.You can find all of the show notes at thearshow.com.

Loose Bruce Kerr's Parody/Original Song Podcast
"FRIENDS WILL BE THERE FOR YOU" - Audio MP3

Loose Bruce Kerr's Parody/Original Song Podcast

Play Episode Listen Later Mar 24, 2022 2:20


"FRIENDS WILL BE THERE FOR YOU" - Audio MP3 is Loose Bruce Kerr's latest original song, orchestrated and sung by Bruce, one track at a time (thank you, Les Paul, also of Waukesha, WI).

Craig Peterson's Tech Talk
What Can Be done About Russia? What Can You Do?

Craig Peterson's Tech Talk

Play Episode Listen Later Mar 12, 2022 82:06


What Can Be done About Russia?What Can You Do? There is a whole bunch going on when it comes to Russia, of course, the invasion of Ukraine. Why are people calling to have dot RU deleted? This is really a big deal. And if you're watching from home, I'm going to go full screen on this article. [Automated transcript follows.] [00:00:23] This is an article from ARS Technica, and I've been talking about it all week, which is that I can won't revoke Russian in Jeanette domains, says the effect. Devastating. This is frankly pretty darn fascinating to me because I can, as this international organization, it was put together in order to help make the internet international. [00:00:49] And I'm not talking about the data international, but control of it. A lot of countries work. Because of course the internet was created in nodded states. It was created by us tax payers, money for the DOD. And it was designed to be very resilient, in fact, so resilient that there could be a nuclear blast and that nuclear blast and. [00:01:13] Causing problems, but yeah. Yeah, the internet is still going to work. And the whole idea behind it was you could have multiple routers. They're all talking to each other nowadays. They're talking BGP four and they can say, how can I get from here? To there. And so the idea behind BGP is they all share this information once the least cost way. [00:01:36] What's the easiest way to post way. If you will, for me to get from point a to point B and it changes all the time. So you might be on a phone conversation. You might be listening to me right now, online streaming or watching the video you might be doing, who knows what out there with digital communications. [00:01:57] But the communications channel that you think you're using, where the data is going from, let's say my microphone, ultimately to your device, your ears, that data path, once it becomes dated. Can be changing multiple times a second. Now it actually changes quite a bit. Initially as these internet backbone routers, send the least cost, routing information back and forth to, and fro a very good thing, frankly, because it helps to speed everything up. [00:02:28] And there's other tricks that we're using you. Might've seen. For instance, Akamai and some of the URLs before have sites that you've gone to, and that's called a content delivery network and that helps get the content to be closer to you. So if you're on a website in California and you're in New Hampshire, that website video, that website graphic, et cetera, is going to be coming from a server local to me here in New Hampshire. [00:02:59] All right. That's how that all is supposed to work. So we have names you guys know about that internet, domain names and those domain names. You already know those are turned into internet addresses, and those addresses are then used by the routers to figure out where to go, how to get the data. The problem that we're having right now, of course, is Russia seems to be substantially abusing the intranet Putin, put a kill switch on to the Russian internet sometime ago. [00:03:31] And the idea behind the skills, which was, Hey, listen, if we don't want the world to be talking to us, we'll just cut it. Now he's tested it a couple of times, but what he has not done is shut it down and he hasn't shut it down. As part of this Ukraine, more, what they did is they passed laws saying, Hey, if you publish something that disagrees with what we're saying, you get 15 years. [00:03:59] And even these people who've been protesting on the streets, they're getting a bound 60 days, 30 to 60 days in jail, just for protesting what's going on. So a lot of people have been saying why don't we just, we turn off the Russian internet now we're not going to use Putin's kill switch in order to shut it all off. [00:04:19] We're not going to do a well, a few things. She decided not to do, denial of service attacks, et cetera. Although there are hackers doing that and we are going to talk about that today, but they're saying what? Let's just go ahead and let's kill their dot R E. The country domain. And I can, the guy who heads it up said, Hey, listen our mission is just to make sure that the internet works. [00:04:46] So shutting off the dot R U domain so that no one can go ahead and. We send right. A request out to the domain name servers and get a resolution to an IP address. So if you try and go to Kremlin dot REU or something, you will get blocked and you will get blocked. Not blocked. No, I like the great firewall of China or of Russia. [00:05:10] Now they've got one going pretty good. Yeah. Thank you. You ain't using us technology. It's crazy. What we've got. But what it does is it says, oh, I hide dot, are you, I don't know. What are you talking about? So there have been a lot of people who have been pushing for it. And you'll see on my screen here that you cranes requested to cut Russia off from some of these core parts of the internet. [00:05:35] And I can, which is the internet corporation for assigned names and numbers. I couldn't remember what that was earlier said that I can must remain neutral and their mission they say is not to take punitive actions. It's to make sure the internet works. So are they really taking punitive actions of the cat Russia off? [00:05:56] It's really interesting to me because look at what has been going on. You've got companies like Facebook as the great example who has gone ahead and just shut off people. They didn't like what they were saying. My goodness. At one point of you said you should wear a mask during this pandemic. [00:06:15] You would be cut off from Facebook. And then of course, if you said, no, you don't, you shouldn't don't need you, you shouldn't wear a mask that at that point you would be cut off, because science right. Sciences, we know exactly what we're doing now. It goes on and on. If you said that it came from a lab in China, you would have your account suspended. [00:06:35] Now of course their whole tune has changed and yeah probably came from a lab in China. It's crazy what these people have been doing. So we have arbiters of truth, who are some contractors sitting in their home or wherever it is the contractors for Facebook that are going through posts that people are flagging as Incorrect as fake news. [00:07:02] So what happens is people say fake news and then that goes off to their team that then looks at it and says okay. Yeah, fake news because we disagree with it. It just blows my mind. We have to have free and fair and open discussions. Don't we. You have that line at Facebook and Google does some of the same. [00:07:22] A lot of these sites do a lot of the same. You get our major media outlets that are all deciding what they want to report on and what they want to label as fake and fake news. I'm just shaking my head because it's hard. It's hard to believe. What about. Russia is putting out fake news, as I've said many times before the E the first casualty in war, this isn't my quote. The first casualty in war is what, it's the truth. So if truth is the first casualty, then that means we've got a lot of propaganda going on. We had propaganda coming out of Ukraine. We've caught some of those, like the, what was it? The. Chat goes, fighter, pilot, whatever it was who had killed, what was it? [00:08:12] Five Soviet or Russian jets, Soviet era using silver deer, techno era technology on the part of the Ukrainians turns out well. Okay, that, that was false news. That was fake news. The whole thing about snake island, where you had that Russian military. I know what it was a frigging but anyways boat sitting there saying we are a Russia. [00:08:33] Warship, you will surrender or, whatever. Do you remember that snake on just the small place, 13 guys and supposedly they shelled it and they killed all 13 turns out that was probably fake news as well. So that's from the Ukrainian side and on the Russian side they hardly reported I as to how many. [00:08:57] The we're in fact, initially for quite a while, they were saying there are no desks. Then at the same time, the Ukrainians are saying they're 2,500 Russians dead. And that number keeps going up, who knows what it is today. It gets really crazy in the time of war. So if Facebook is going to stop someone from saying don't wear masks or do wear masks, depending on what day of the week it is basically right. [00:09:20] Wednesday. It's okay to say that Thursday is not okay to say that we're back. No it's not. Or then why can't that type of censorship? Move on to the next. I that's a big question I have now. Should we be shutting it off? I'll pull this back up on the screen again. And it, this article from ARS, Technica is saying that experts have warned, whoever they are that shutting down the dot R U domain. [00:09:53] Is going to cause just incredible problems for Russians, which man would it ever talking about a major blow to the economy. And it would also cause problems for people who are trying to find out more truth about. Russia cause you couldn't get to their site. Now we've seen some amazing things in Russia. [00:10:15] We had the Russian, one of the Russian news agencies are T which is broadcasting and here in the U S that their entire staff just walked out saying, forget about it. We're not going to promote this fake news, but this is a little to do trip question me personally. I don't think anybody should be censoring any. [00:10:38] For almost anything. Yo, there are some limits, but they're pretty extreme in my book. I'd rather know someone is an idiot because they're allowed to say stupid things, and counter, counter it, counter their arguments. You've got to have discussions  [00:10:54] Microsoft. Yeah, they've been around a long time. They've been helping us. They've had lots of cybersecurity problems. People use Microsoft software on their desktop. Some people use it for servers, which is crazy, but listen to what they're doing now. [00:11:10] This is a little concerning. I'm going to pull this article up on the screen. [00:11:15] For those of you who are watching a long, either on rumble or YouTube ARS, Technica article, they have some really great articles. This particular one is about our friends at Microsoft. This is cool. Microsoft announced today? This was like a week or so ago that Microsoft would be suspending all new sales of Microsoft products and services in Russia. [00:11:45] Following the countries, unjustified, unprovoked, and unlawful invasion of. Now Microsoft didn't give any specifics about the products, but it really is likely to be a blanket ban of all of the Microsoft products. This is very cool because Microsoft has taken an approach I've never seen them do before, which is okay. [00:12:10] When. Gets hacked. You get our friends at apple, putting together patches and getting them out. They get them up pretty quick. Microsoft had been doing much the same. The problem was some months there were patches every day that you had to apply. That's how bad this software is. And they decided that man, let's be like politicians here. [00:12:34] Let's release some very damning news Friday. At about 4:30 PM before a long weekend. So no one will notice. Yeah. Y'all are friends of politicians do that all the time. What Microsoft decided they do is, Hey, wait a minute. We're going to have patches. It's not going to slow down. And because our code is terrible. [00:12:56] So what we're going to do, let me see here. How about we just release all of them at once and we'll just call it patch Tuesday, right? Because people were complaining about how much work it was, how much effort was effort. It was to try. They hate them. These machines apply these patches every day. Huge problem for everybody from home users to big companies out there. [00:13:21] So Microsoft has said, okay let's do that. Let's burry it. So nobody will notice okay that's what Microsoft does. And now we've gotten used to that. Now we have. We remember two guys, right? Bill gates followed by Steve Ballmer. Steve Ballmer was a nut job. Bill gates was a bad man. [00:13:40] I think he's just been trying extra hard to compensate for all of the evil he did over the years. But what we're looking at now is new management and that he's been in there now for a few years, doing a great job, cleaning up Microsoft, making it a very competitive company. He has done some amazing things. [00:14:02] One of the things that he has decided to do, that's been very effective is how about this? How about we go ahead. And we work with various governments to help stop these Russian hackers. And I mentioned this a couple of weeks ago, what was happening and the Microsoft had reached out to the white house and said, Hey, listen. [00:14:27] What we have been looking at the hacks that have been coming from the Russian hackers, and we've been preparing fixes for some of those hacks. How about we work directly with some of these other countries? This reminds me a whole lot of the lend lease program in world war two. You might remember this thing, but the us of course, initially was not involved in the war and they decided, okay we've got to help the United Kingdom. [00:15:00] How are we going to help them? The UK doesn't have the money to buy ships, to have us make weapons, bullets know. What they did is they had people donate the rifles, the guns, AML from home. Plus they made them the government, instead of selling them to the UK, they lent them to the UK because the UK could not afford everything that it needed in order to fight a war against the national socialist in Germany. [00:15:28] So what did they do? We just shipped the stuff over there and called it a lend slash lease. I think that's a great idea. And what Microsoft is doing is also great idea. They have been decoding, reverse compiling, if you will, and interpreting the code, looking at what some of the ransomware and other malicious code the Russia has been using against Ukraine, and they have been providing. [00:15:57] All kinds of insight information to these other countries. Now, this is a great idea for a few reasons, one of the reasons, and I think maybe the biggest reason is that the ransomware, the viruses, all of this malware that they're producing is. Not particularly discriminating. Do you guys remember maybe I dunno, what was it? [00:16:22] Six months ago, I taught, told you how to avoid getting most of this Russian ransomware. And it was as easy as just installing. Yeah, installing a keyboard on your computer windows or Mac, windows. Those are the machines are always getting attacked quite successfully most of the time, but the windows keyboard. [00:16:49] Russian language. Now you didn't even have to use it. You don't have to have a keyboard, right? This isn't a Russian keyboard that I'm holding up here on camera. This is just a regular us keyboard. You can just install a virtual, Russian keyboard. And once that keyboard was installed, you're pretty safe. [00:17:06] Why? Because Vladimir poop. Dictator for life of Russia decided he would just go ahead and stop anybody that was trying to hack Russian. Companies businesses, government agencies and what's the best way for the hackers to do that. Cause they didn't want to end up in Siberia for the rest of their lives because of a hack. [00:17:29] Now they went ahead and said, okay if there's a Russian Cyrillic keyboard on the machine, we're not going to activate. So if the software, the malware on your computer, all you need to do is have a Russian keyboard. Yeah, that's it pretty simple. I told you that months ago, now what we're seeing is these indiscriminant types of software that are being used in Ukraine. [00:17:57] Why doesn't the keyboard trick work while some of Ukrainians peak Russian, we could go in. To the background on that of the massacre, the starvation purposeful starvation of Ukrainians by the Soviet union over many years ago. And how they then gave their property, their homes to Russians to move into in order to occupy Ukraine. [00:18:23] So there's people in Ukraine who are Russian speaking of course. Now we're talking two or three generations, four, maybe down the road from when the Soviet union killed all of those millions of people. But there are some fights that to say, there's Russians, Russian speaking people there. Let me put it that way. [00:18:41] Perfect. In Southeastern Ukraine anyways I'm going on and on I, this is not an education on war or history. This we're talking about cyber security. So the, they have, they been, Microsoft found many cases of Russians putting destructive. And disruptive or even more than that data wiping malware onto computers, it spreads indiscriminately. [00:19:13] So Microsoft looking at what's happening, you crane, trying to get patches together for all of us, letting other countries know about what's going on is going to be. Amazing because this malware, which is wiping computers, primarily, it's not really just straight up ransomware give us money and we'll give you your data back. [00:19:35] This is just showing your data, that malware is going to leak outside of Ukraine. Yeah. Cause us all kinds of book tension, probably. When we get back, I want to talk about this here. This is our friend Ilan Musk, and we've been following along with some of the stuff been going on with his new satellite system in Ukraine. [00:19:58] The whole concept of these satellites and circling the earth, providing us with internet, just regular guides. It's going to be in our smartphones is changing everything. We're going to talk about Elon Musk and what's happened over in Ukraine. [00:20:15] Our friend Elon Musk has done a lot of things over the years. He has really helped us for frankly, the Tesla and what's been happening there. [00:20:26] Space sex, his main concern being let's get. Off of a single planet on to multiple planets, right? The movement to Mars, NASA's working on a serious moon base. I reminded him of space 1999. You guys remember that show, but yeah, we're going to have a moon base by then and it makes a lot of sense. So who's going to go to these well, there's some interesting lotteries people have to apply and everything else, but he's done so much, right? [00:21:00] He's got the boring company you'd already know about Tesla and boring company in case you didn't know makes underground tunnels. He has also. A few other things has got a huge battery manufacturing facility. They're working on new battery technologies to make all of our lives a little bit better, particularly if we have an electric house or electric car, because this is what good is it to have electricity that you can't use. [00:21:25] And that's really what they're trying to do is make it so that electricity is available 24 7 for you. And. Those space X, which is what I mentioned as well as what we're going to talk about right now. I'm going to pull this up on my screen. For those of you who are watching over on rumble, or of course, YouTube, this is fascinating. [00:21:49] He said there's a high probability of Russian attacks on Starlink in Ukraine. Now that is fascinating because what he's done is he has sent over truckloads. I'm showing a picture of a truck. In fact, with these Starling terminals in it, that's from ARS Technica. Just double-checking it here, but this is very cool. [00:22:12] This is posted by the vice prime minister over there in Ukraine. And they are talking about these terminals. Now a terminal in this case is something that allows your devices to talk to the Starlink satellites, or there's going to be a huge constellation. They've got 2000 satellites up and they're putting another 12,000. [00:22:38] These types of satellites are much different than what we've been used to over the years. We typically we've had these massive things sitting up in space. I worked with RCA Astro space many years ago and I saw. They're testing facilities, which are just incredible. They had this huge vacuum chamber that they brought me in to see as we were working on space shuttle software. [00:23:05] Yeah. I wrote software that they used to put the space shuttle together yeah. Way back in the day. So that was a pretty proud moment. Anyways. It's we're not talking about these huge satellites, like they used to launch, we're talking about very small cell. And they're not just sitting way, way up there. [00:23:26] These are in basically in low orbit around the earth and they're geostationary. In other words, they stay in one spot. I believe this is the way they've got these things set up. So these satellites then allow because they're so close to the earth, allow them to use less power. And also the other advantage to that is. [00:23:49] The delay, right? The delay between having to send it all the way up and back down, because electricity takes time, right? Yeah. Travels at the speed of light. But nowadays you might've noticed it can take your quarter second, half a second. When you're talking to someone, when I'm on the radio with some of these radio stations or the delay can be absolutely incredible. [00:24:11] Like I half second to a second sometimes. And that's just because they're being cheap. This type of technology where you have these constellations and it isn't just Elon Musk. It isn't just Starling, but constellations with will ultimately we'll have tens of thousands of satellites up there. Not, there's all kinds of other potential problems not getting into that right now. [00:24:34] But what it does mean is. Can communicate and we've never had this sort of thing before we had the us military, the Navy in fact, put together a communication system that lives on top of the internet and called nowadays. Generically the dark web. And it was set up to allow our military, our state department to be able to communicate with people in countries that are back in the day under Soviet control, all kinds of potential problems. [00:25:10] So whenever those problems existed, they just went ahead and used this onion network, which is a part of the dark web, et cetera, et cetera. So let's say we had before. Now what happens if you're a country like Ukraine, where 100% of your internet comes from Russia, Russia obviously can sit there and listen in. [00:25:32] Hopefully your encryptions. Good. A lot of Russians have been using telegram and already get real news about what's happening in their country and other places. And Della Graham is not that secure, frankly. WhatsApp pretty secure signal is the one you want to pay close. Attention to signal is considered to be the most secure of all of these secure communications apps. [00:25:57] But there's a level above all of that, because if they can tell that you're communicating, even that is enough to give them some information. So they might not know what was in that transmission, but if the transmission is all of a sudden, a tons of activity coming over, lots of data, lots of messages going back and forth, they can say maybe there's something about to happen. [00:26:21] That came out. You might remember the old orange book for security way back in the eighties, I think is when it came out. But part of what you had to do was cover up your. Actual real communication. So it's one thing to have the communications encrypted, but you wanted to always have about the same amount of communications going back and forth. [00:26:42] So people couldn't figure out what you're doing now with these types of devices. That kind of problem still exists. And this is part of what Elon Musk is warning about here. Pull it up on my screen again, for those people who are watching Elon Musk is urging users of his satellite system to put their Starlink antennas as far as. [00:27:08] From people as possible. Now, why would he be doing that? Because frankly, that terminal is transmitting to the satellite as well as receiving from the satellite. And it is entirely possible that there could be some evil software that is listening in for the satellite transmissions and sends a little missile your way. [00:27:36] Also, of course the Russians have satellites in space that can look down on the ground. Now it's something as small as a terminal four Starlink, little hard to see, but Elon Musk is saying, Hey, listen guys, go ahead and camouflage it. You might want to spray paint. It just don't use metallic paint so that they can't see it and place it as far away from where people are as post. [00:27:59] So you can still use it and only use it when you need to use it. Don't keep it up and running all the time. But this is the start of something great. Something where you can't easily block people's communication. So Russia has tried to do. And they have been jamming the Starlink satellites. So what did must do? [00:28:23] He delivered all of his engineers to working on how can we get around the Russian Jack? And according to Elon Musk, they have gotten around it and they now have their satellite systems completely jammed free from the Russians. I think that's fascinating. They're probably using some good spread spectrum technology that was actually known about it and world war II. [00:28:47] And then we can talk about that for a long time. Heady, you might remember her anyways, skip that for now. Stick her out. We got more when we. A whole bunch of pandemonium out there because of what Russia's been doing in Ukraine and how it's flowing over to us as well. Hey, this is not great news. [00:29:15] Pandemonium is the name of the game over there in Russia. And they are being very successful. We're going to talk about what happened in Bella ruse. We'll talk a little bit about what happened in Ukraine with cybersecurity and what's happening right here right now. [00:29:36] Complete ARS Technica today. They've got some great articles this week, looking into the Russians. What are they doing? What kind of problems is that causing us? But we are seeing some interesting attacks back on. And back in very big way. Russia has been going after you crane in the cyberspace for a long time, we spoke a few years ago about what Russia had been doing with the tax software for Ukraine. [00:30:12] We don't do this in the U.S. Or in Canada, but my number of European countries do you, where you have to have. The old official tax preparation software put together by the government for your business or for your person, depending on the country you're living in France is a great example of this. And Ukraine is another one. [00:30:36] So Ukraine says, Hey guys, you got to go ahead and use our software. That means every business in Ukraine is using their software. To manage their tax payments and their accounts, frankly. And that wonderful little piece of software was hijacked by our friends in Russia. So they grabbed a hold of it. They in. [00:31:02] Did some code into it that added rent somewhere to the software. So now all of the businesses in Ukraine are pretty much guaranteed to be using this hacked software. We have a client who has offices over in France, and we found a really interesting problem with them because. The French software that was being used for taxes for French businesses had an extra little problem. [00:31:33] And that extra problem was, it was insecure as can be whoever wrote this, must've taken a Microsoft programming course and had no idea DIA about the consequences of what they were. So it was very insecure. The, it was using a version of SSL, which is an encryption that's based on another type of increase. [00:31:57] I don't want to get too wonky here, but that was just one of its many problems and bad keys, et cetera, et cetera. And keys by the way, was using keys that have been revoked, which you should never do. Bottom line. Oh my gosh. Hey, if you want more information on this, just drop me a note. [00:32:16] me@craigpetersohndotcomandyoucanalsogetmynewsletterwithallkindsofgreatlittletipsmeatcraigpeterson.com. Just let me know. So in this case, we had to help that company in France. Ignore the security restrictions that were on their systems so they could use the French tax system. So anyways, I told you that, so I could tell you that the same thing happened to Ukraine. [00:32:45] In a different way, their software was pre infected. So when they downloaded it, ta-da. They got that piece of ransomware that virus had spread. It was just a nightmare. And of course it robbed. If you will, Ukraine, government of funds, that would have been. So we had now a bit of a shift. I'm going to pull this up on the screen again, this article, because what this shift has shown is that the hackers are now operating on the side of you. [00:33:21] Crazy. Which is just fascinating. So the group called anonymous, you might be familiar with them. Of course, they've been doing a lot of hacking for a lot of years, releasing private information, government and information, all that sort of stuff. And they have a mast what they're calling a volunteer. [00:33:44] It. And this it army has been going and doing what well hacking Russian sites apparently. So this article is just absolutely fascinating and they pulled some of from wired as well, but the Russian space research Institute, their website was hacked, leaked files that were stolen from the Russian space agency, made it all the way on to the. [00:34:13] The space agency was hacked in their website said, leave Ukraine alone, Alto anonymous. Will you up even more? They also did. What's called a D O S. Which is a distributed denial of service attack. Those can be very difficult to protect against unless you're set up in advance to help protect yourself. [00:34:39] And that pretty much destroyed Russia's dot are you top level domain? So we've talked about how domain services work, right? So Doug are, you is like.com except dot R U is for running. And so the domain name servers that handled our, you were knocked off the air because no one could really get to them. [00:35:02] They used amplifying attacks and stuff without getting into all of the details. So basically they were trying to cut off access and they did for a lot of people to any. That ended in, are you? It's great. These are just some of the latest in this surge of hacktivism. That's been going on one of the ones I mentioned a couple of weeks ago with the Belarusians deciding they were going to hack the Belarus railroad, which was being used. [00:35:31] To bring Russian troops, supplies, tanks, et cetera, all on rail, right on down right to the border of Ukraine. So that was hacked so that they couldn't use it in order to go after. Of course Russia was able to get to Ukraine, but there's also been protests around the world. 48 Russian cities raise millions of dollars through cryptocurrency donations. [00:36:01] Now, I'm not a big cryptocurrency guy and I'm not a big crypto currency guy because while. Cryptocurrency is likely to be outlawed by most, if not all governments. And they certainly could shut it down and it is not anonymous. All right. So using cryptocurrency does not mean it does not equate to completely anonymous. [00:36:28] They have done a lot of donations. They're big companies including, we just talked earlier about Microsoft, but also apple shell, BP, a McDonald's Starbucks. And these hacktivists have really joined in. And w we talked about a couple of other things, so this is messy. Because even more than in peace time, these active combat that are really hacking happening right now, rendering, hacktivism, any effectual and largely just distracting because we are now in a hot war right now. [00:37:10] Maybe we don't have our. Eric planes bombing Russian movements or other things, but there is a kinetic war going on over there. There are bullets, et cetera, mean exchanged. So the hacktivist efforts have been, visible. There's no question about that. But what have they done? See, that's an advantage to being a country like Russia, or like the Ukraine, or excuse me, Ukraine, because both of those countries there, their industrial base, the military industrial base is not heavily automated unlike ours. [00:37:50] What could you do? What can you shut down? So what you shut down the Russian space agency's website, how far did you get into it? Probably not very far. We also have a couple of groups and we talked about these guys many times the Conti group, which has been. [00:38:07] Terrible and hurting us businesses, individuals, government agencies, and stuff, the Cuming project, both of them have declared their allegiance to Russia. You might remember a few weeks ago, we talked here about how we have had some researchers track down most of these Russian hacker groups and their money. [00:38:30] And they all ended up in one building in Moscow. No, that should tell you something, right? In fact, the most expensive real estate right there in downtown Los gal, the tallest building, et cetera. So these groups getting together in order to protect the father land there in Russia. Ah interesting problem. [00:38:52] How much of this is really controlled by the Kremlin? It's a very good question. Context. Was dismantling its infrastructure. It, some of their top people were arrested by Putins military. Not military, but police state over there. And that was interesting too. That was again before the invasion, but why would Putin be shutting them down at all? [00:39:20] Apparently they said some things. That they shouldn't have said. So now they've come out and have decided they're going to support Russia in its entirety. Now we mentioned Microsoft and how Microsoft has decided they are going to protect other countries. As well as you crane, at least as far as the Russian malware goes, and they've been very active in that. [00:39:46] And there are a number of cybersecurity companies and other organizations that have released free versions of some of their software, these digital defense tools. Free offerings. Our big cranes defend the networks. Google says it's human rights focus de dos protection service project shield is now in use by more than 150 Ukrainian websites. [00:40:12] So it's very good. Bottom line propped up by the way, published this massive trove of personal data. Allegedly identifying 120,000 Russian soldiers deploy. In Ukraine that was Ukrainian prov, not the old good old Russian Sophia Pramata man. I remember I bought one of those on new standing Canada once. [00:40:36] And I had a friend who was from Yugoslavia and he said, oh, can I show that to my wife? He showed it to his wife. She tore it up. I said, I want my Pravda, Craig Peterson dot com. [00:40:47] The tech world is all a buzz with this log for J or log for shell. However you want to call it because we are looking at what is probably the biggest security vulnerability the internet has had in a long time. I don't know how to express it anymore, but there are multiple problems here. And even the patch that was released to fix this problem was broken as being exploited in the last 24 hours. There've been no less than 30 different new. Variations of the exploit. So what is going on? There is a computer language that's used by many programmers, particularly in larger businesses called Java. [00:41:37] You might remember this, I've been following it and using it now, since it first came out very long time ago from sun Microsystems. Java is a language that's designed to have kind of an intimate. CPU processor. So think about it. If you have an Intel chip that is an x86 type chip, what can you use instead of that Intel chip to run that code? [00:42:03] There are some compatible chips made mainly by AMD advanced micro devices, but you're really rather limited. You have problems. Power. Guess what you're stuck. You're stuck in that architecture. And then on the other end of the spectrum, you have some of these devices that are designed by companies like apple, Google has their own. [00:42:24] Now that our CPU's their graphics processing units as well. And they completely replaced the Intel architecture. But the Intel code, the programs that are written for the Intel architecture that are compiled for Intel are not going to work on the apple chips and vice versa. So what did apple do? Apple, for instance, just moved from Intel over to. [00:42:51] Own chipsets and these chips don't run Intel code. So how can you run your old apple apps? Apple has a little translator. They call Rosetta. It sits in the middle and it pretends it's an Intel processor. This really rather simple. And they've done an amazing job on this. And w Rosetta is actually a third party company and they helped apple as well with the transition from the IBM power series chips to the Intel chips. [00:43:23] So how do you move the code around while you either have. Recompile it, you may have to redesign it, rearchitect it for the new type of processor and the new types of computers that are supported by that processor. Or you may do what Apple's done here a couple of times now, and that is having an interpreter in the middle that pretends it's something else pretends as an Intel chip. [00:43:49] And then you can still run your in. Code because it knows, okay. It was designed originally for this apple Intel architecture. So I know how to make all of this work Java steps in and says why are you doing all of that? That's crazy. Isn't it moving all of your code around all of the time. So Java's original claim to fame was what will make life easy for? [00:44:14] What you do is you write your code. Using Java in Java is very similar to C plus in some of these other languages that are out there. And that language, when you're writing your source code will be compiled into an intermediate. Code. So what happened is sun Microsystems designed this virtual machine? [00:44:36] Now don't think of it like a normal VM, but we're talking about a CPU architecture and CPU instructions. And so what it did for those CPU instructions. Which is really quite clever, as I said we'll come up with what we think are the most useful. And it's a Cisco architecture for those of you who are ultra geeks like myself. [00:44:59] And we will go ahead and implement that. And so the compiler spits out code for this CPU that doesn't actually exist anywhere in the known universe. And then what happened is sun went out and said, okay we'll make an interpreter for. Artificial CPU that'll run on Intel chips and we'll make another one that runs on these chips, that chips and the other chips, beautiful concept, because basically you could write your code once debug it and run it off. [00:45:32] Anything that was one of the original claims to fame for Unix, not so the run at anywhere part of it, but the part that says it doesn't take much work to move your code to different machine, and we're not going to get into Unix and its root I've been around the whole time. It's crazy. [00:45:51] I just finished reading a book and saying, I remember that. And they were going through all of the history of everything I was in the middle of that. I did that. That was the first one to do this. It was fun. Anyhow, what Java has done now is it's really solidified itself in the larger enterprises. [00:46:11] So basically any software that you might be using, like our website that is particularly with a larger business. Is going to be using Java and that Java language is using libraries. So in programmers, instead of doing what I used to do way back when which is write in assembly code, or even in COBOL, and basically you had to write everything, every part of every program, anything you wanted to have done, you had to write, or maybe you borrowed somebody else's code and you embedded it in. [00:46:45] And mind you, we only had 32 kilobytes of memory in the mainframe back then the 360 30, for those of you who remember those things, but here is where things really changed. You now had the ability to take that code that you wrote and put it on a smart. You could take that exact same code, no recompiling or anything, and take that code and run it on a mainframe on our super computer in a car. [00:47:15] So Java became very popular for that. Very reason in these libraries that Java provided, made it even quicker to program and easier to program. Now there's some problems with languages. Java, which are these object oriented languages where you can, for instance, say one plus one equals two. That will make sense. [00:47:38] But what does it mean when you use a plus sign? When you're talking about words? So you say apple plus oranges, what's that going to eat? That's called overloading an operator, and this is not a course on programming languages, but what happens is a person can write the library and says, oh if the programmer says a non-Apple plus an orange or string plus a string, what I want you to do is concatenate the strings. [00:48:06] Now that programmer who wrote that has to figure out a couple of things, make some assumptions. Oh I should I put a space between apple and. Or not. And what do they really mean? Okay. So this is how I'm going to interpret it. So that, it's a very simple example. But the concept is that now with these overloaded opera operations and these libraries that can go deep deep, you now have the additional problem of people designing and writing the libraries, making assumptions about what the programmer wants and what the programmer needs. [00:48:43] Enter the problem with the log for J vulnerability. This is a very big deal because we're talking about a library function that is being used in Java by programmers. Now, you know that I have been warning everybody. Android for years, the biggest problem with Android isn't its user interface. It isn't that it's made by somebody else. [00:49:10] The biggest problem. And of course, this is my opinion is that Android software is provided by Google and. It is given basically to any manufacturer that wants to license it. And then that manufacturer can't just take Google and run it. Have you ever tried to install windows or Linux or free BSD? [00:49:36] It's mainly a windows problem, frankly, but you go on ahead and install that. And what do you need in windows? You're going to need driver. Oh wait a minute. This laptop is three years old. So how can I find them? And then you go around and you work on it and takes you a day and you finally find everything you need. [00:49:53] And you've got all of the drivers and now it works. But Microsoft provided you with the base operating system. Why do you need drivers? You know the answer to that and it's because every piece of equipment out there is different. Think about this in the smartphone market. Think about it in the more general. [00:50:10] Android market. There are thousands of these devices that are out there and those different devices are using different hardware, which require different drivers. So when Google comes up with a software patch, how well we just fix the log for J issue that patch. Has to be given to the devices manufacturer who then has to talk to the manufacturers of the various components and make sure that the device drivers that they're using by the manufacturer are actually compatible. [00:50:50] They're going to. Got the upgrades, wire it all together, and then test it on all of the different phones that they have and cars because the cars are running it. Now you see how complicated this get. And most Android devices will never. Get another update. They will never get a security patch versus apple. [00:51:14] Right now. They're still supporting the apple six S that came out in 2015. If I remember right, it's five or six years old. Now you don't find that in the Android space. You're lucky if you get two years worth of support, we're going to continue this. But this is this is really important. I'm going to talk more about the actual problem. [00:51:36] What is being done about it? What you can do about it as an individual, a home user, and as a business, in fact, keep an eye on your mailboxes. Cause I've got some more links to some sites about what you can do and how to do it and how to test for it. [00:51:53] We're talking about what is likely to be the biggest set of hacks in internet history right now. It's absolutely incredible what's going on. So we're going to talk about what it means to you and what's really going on. This whole problem is probably bigger than anybody really realizes because Java, as I explained is a very common computer programming language. [00:52:23] And it has a lot of features that bigger businesses love. They love the ability to have multiple programmers working on something at the same time. They love the inheritance and multiple inheritance and all of these wonderful features of Java. One of the really cool features is that you can, while your program is running, have the program change. [00:52:48] It's. That's effectively what it's doing. It's pulling in libraries and functions in real time. And that's where this particular problem comes in. This has been a nightmare for Java forever. It's one of the reasons I have never migrated to Java for any of the projects that I have. Don, it just gets to be a nightmare. [00:53:12] It reminds me of Adobe flash. It was the biggest security problem that has ever been. And the number two Java and Java is running in the Android operating system. It is the core of the operating system. All of the programs are almost certainly written into. And now we're seeing Java up in the, not just entertainment systems in our cars, but in the actual computers that are driving the cars, running the cars. [00:53:45] And I get very concerned about this. We had two major outages just this week before this log for J thing came about over at Amazon. And those two Amazon outages knocked thousands of businesses. Off the air out of business. You couldn't get to them. You remember the big problem with Facebook that we talked about a little while back and in both cases, it looks like they were using some automatic distribution of software sent out the wrong stuff. [00:54:15] And now you are effected. What happens? What happens with the cars? If they push out a bad patch, how are we going to know. What's that going to mean? And if your car has Java in it, are you going to be vulnerable to this? You wouldn't be vulnerable to log for J if your computer wasn't hooked up to anything, but nowadays the cars are hooked up to the net. [00:54:39] We've had a couple of car dealers for our clients. Who've had the Mercedes we've had Acura Honda and others over the years. And it's interesting going in there now and working with them because they are doing massive downloads of firmware whenever a car comes in. So that car, if they don't have the right kind of networks, that car can take hours to do. [00:55:07] Dates. And I got to tell you, man, I'm just shocked by so many businesses, not willing to spend the money that it really takes. So the poor technician is sitting there waiting for it to happen. We could make it happen in 15 minutes, but they're stuck there waiting for three or four hours sometimes for some of these downloads, no it's called cash them locally. [00:55:26] These cars, some of them need new and different firmware. Some of them use the same and have. A reliable, fast internet connection. And we've done that for many companies. Anyways, I'm going off on a bit of a tangent here. So forget that let's get back into this with Java. You can have a routine. [00:55:48] Call another routine that was not even necessarily thought of by the programmer. Now, can you imagine that? So you're programming and you're not considering adding something that's going to send email out and yet you could have a log in. That's part of the DNS and it gets logged that actually causes an email to be sent or causes anything else to happen. [00:56:17] That the exact problem we're seeing right now, it's absolutely crazy patterns in text fields, things like you can put a user desk agent. Which is normal for nature. UDP connection. You say, this is usually a guy who using Chrome version bar or Firefox or safari, but you put the user agent field. [00:56:40] And then after that, you've put in some, a little bit of code that tells Java, Hey, what I want you to do is this. This is a problem because we're finding now that I'm, again, I said the last 24 hours, 30 different exploits over a million companies have been attacked on this. And we're talking about 10. [00:57:05] Companies, absolutely hacked every minute right now. Can you think of, let's just think about that. And we're in the middle of what, right? The big holiday season, we've had some holidays, there's people online, shopping there's businesses that are trying to buy stuff, business stuff, almost every one of those sites is likely to be compromised. [00:57:31] It's that bad. It's absolutely nuts. What's happening here. This is a huge flaw. And by the way, it is flaw. Number this you ready for? This 44,228. In the year 2021. So the written 44,000 flaws that have been discovered and reported, this is the CVE system for those of you who are interested, but this really is a worst case scenario. [00:58:02] Because this log for J library is being pulled in to so many pieces of software out there on so many different platforms. The paths to to exploit this vulnerability are almost unlimited. And because there's so many dependencies on this particular log for J library, it's going to make it very difficult to patch without breaking other things. [00:58:32] And the fact the exploit itself fits in. Tweet come injected almost anywhere. So it's going to be a very long weekend for a lot of people, but let me tell you this. It is not going to be solved in a few days, a week, a month. We're going to be seen this. Years, because you have to be the person that wrote the program that has the source code to link in the new libraries, distributed out to your customers. [00:59:03] Do you see what a nightmare? This is now? Some people are saying let's blame this on open source. This is an open source product. Yeah, it is an open source project and it turns out that even though anyone can grab this, these, this library routine or any of these pieces of code, anybody can grab it. [00:59:21] Anybody can look at it. It turns out it's one guy. Who actually maintained this, who has a budget of $2,000 a year to maintain it. Nobody else pitched in. And all of these big companies are all out there grabbing this code that this guy has been working on and not paying much attention to it. Not donating to the project. [00:59:46] Which is saving them millions of dollars, not that one project, but all of these projects collectively in the open source community, it's it is more far reaching than this stretch vulnerability. You might remember this drug vulnerability that's was, that was the root cause of the massive breach at Equifax that Explo exposed all of our personal information. [01:00:14] To the dark web. That's how bad this is. Oh my gosh. So Hey, if you want information, I've got a links, a bunch of links set up here on what to do while you're waiting for the log for J updates from your vendors, how you can find on your servers. If they have the log for J vulnerability, I've got a bunch of information that I've stored up on that. [01:00:41] And some others just email me. M e@craigpeterson.com asked for the list of the log for Jay's stuff or the Java's stuff. I'll figure it out. Be glad to send it to anyone that's interested. And if you need to scan to find out yourself and your business, let me know to me@craigpeterson.com. [01:01:03] Wow. I was just going through a list published by Seesaw, this federal government agency that tracks some of these types of vulnerabilities. And wow, this list is daunting of all of these pieces of software that are vulnerable to this huge hack. [01:01:19] This is now a problem for each and every one of us. [01:01:23] I think I've established the man. This is nasty. So what do you do? First of all, I sent out. Email a list of things have in fact, a few different lists of things that you can do. So I had one for consumers, one for businesses and a general thing as well. And then a bunch of references. [01:01:47] Of course there's even more references and more great information now because I got that email. Pretty early. So I hope hopefully you had a chance to really look through that, but here let's just talk a little bit about this, what to do thing you already know because you guys really are the best and brightest that you need to be careful when you're on. [01:02:11] You cannot be online, Willy nilly, clicking on things. And that includes emails and links. And this time of year in fact, all year long, we're looking for. Wow, let's see. Is there a great bonus here? Look at they're having a sale, a discount. Oh no. I've only got three hours to respond or the deal's going to go away. [01:02:33] I've usually been of the sort that I just am, not that influenced by some of these deals, but. I do sometimes want to find out what it is. So I find myself this week clicking through on. I'm on a lot of marketing lists because I like to follow what different marketers are doing, that's technology. [01:02:55] And it's something I want to keep you guys informed about. And I found myself just crazy amount of double checking to make sure the link was valid. Now I'm sure you guys have, if you're on my email list, you might notice that the from address is not the me at Craig Peterson. Calm email address. You can always send email to me@craigpeterson.com and it ends up in my email box. [01:03:21] And it might take me a few days, or even as much as a week or two to get back to you. If it's something there's an emergency, you really need to fill out the form on my website, but I will get back with you. But the problem that some people have noticed lately is. It doesn't say return address or sent from me@craigpeterson.com. [01:03:45] It's got this rather long convoluted convoluted URL that has nothing to do with Craig peterson.com, sows a number of people question it, it is a tracking. When can the idea is if I am going to be able to get back to people and if Karen is going to be able to nudge. I have to have these things tracked. [01:04:09] So the email from address, when you hit reply, it is going to go to the, again, my email list server guys, and it is going to get tracked so I know. Okay. Okay. So now I've got a few minutes or an hour. Let's sit down and go through a lot of these emails so I can get back to people. That's a problem for many people, that's even more of a problem today than it ever has been in the past. [01:04:38] Now there's been a few sites that have done something about tracking because many people don't like to be tracked. My self included, although, as I've always explained on the show, it's a double-edged sword because I would rather see commercials or ads for a Ford F-150 pickup truck. When I'm looking to buy. [01:05:00] Car or certainly a truck. I don't want to see ads for things I don't care about. And you probably don't either. So the tracking, I don't think is a huge deal. The statistics that have come out from apple recently are very interesting because what apple ended up doing is they put some new technology and to stop tracking. [01:05:25] And to stop you from being tracked. And basically what they're doing is a couple of things. One, they've got this new feature where they will download images and emails from their website, so that it's not they're not being able to localize where you are and then they're also doing something where you. [01:05:49] Are you are, you can't be tracked like you used to be able to be tracked. Let me just put it simply like that applications now have to have that little label warning label in the app store to let you know what they might be tracking, et cetera. So they've been accepting anti tracking behavior that came from our friends from. [01:06:13] Apple now Google, Facebook and others have been very upset about this thinking that they were going to lose a lot of business here in the advertising side, because you wouldn't be able to track them. So if you've got an apple iOS device, you probably noticed, it says, allow app to track your activity across other companies. [01:06:36] And websites, your data will be used to measure advertising efficiency. I don't know that's such a bad thing. And looking at the stats right now, I'm looking at Google's income. And a lot of that comes from YouTube after. Apple launched its new privacy initiative and it looks like Google really wasn't hit very badly. [01:07:00] What Facebook was worried about that they would just be losing all kinds of revenue. Also didn't turn out to be true. So it's an interesting thing to see and I've got to really compliment apple again. At this time on trying to keep our information private, I read a really great book this, so this is how the world ends talking about the whole cyber race and where things are likely going. [01:07:30] And it's frankly impressive. To see what Google has done to try and keep out our government from their networks, as well as foreign government and the whole thing with the Chinese hackers we've talked about before, where I've found them. Active inside our customer's network before. And this is where we get called in because there's a problem. [01:07:57] We look around, we find indications of compromise. We find the Chinese inside. Okay. So it isn't something that we were protecting them, the Chinese got in, but we come in after the fact and have to clean up the mess. But what we have really seen happen here is the largest transfer in. Of wealth, I should say, in history, the largest transfer of wealth in history to. [01:08:25] From us and from other countries, but primarily from us because of what they've stolen. And so Google really has fought hard against it. The Chinese have been in their systems have stolen a lot of stuff. Apple has fire fought hard against it, but we know about the apple stuff. Google's seems to be a little quieter about some of it. [01:08:45] So they may be selling our information to advertisers, but there certainly are trying to keep nation states out. I'm really wondering too, what is Google doing? Moving that artificial intelligence lab to China. It just it's insane. We know we, if we're going to get out of this financial position, we're in as a country, we need to have an amazing new technology. [01:09:09] So people are coming to the United States and we're certainly not seeing that. At least not yet. It's all been stolen. So what to do, man. I started talking about that and we got a little sidetracked. So I will talk about that a little bit more here coming right up and what to do if you're a consumer, if you're a business person. [01:09:32] And of course, as I mentioned earlier, I have. Quite a list. I'm more than glad to send you. If you go ahead and just email me, M e@craigpeterson.com. I'll keep you up to date, let you know what's happening and give you those links that you can follow to find out exactly what is happening and what you can do. [01:09:53] Including some tools. There are some tools out there to check to see if that vulnerability exists inside your networks or systems MI. Ed Craig peterson.com. And I'll be glad to reach out, reach back to you.  [01:10:09] I'm gonna tell you what to do as a consumer because of this massive internet hack that is underway. It is huge. Also going to talk a little bit about apple and what they're doing with their tracker detect app on Android devices. [01:10:24] This will be going on for months and probably years in some cases, because there are many systems that will never. [01:10:35] Patched for this vulnerability. So from now on, you need to be doubly cautious about almost everything, the big targets for this. Then people who tend to be the most valuable. Big businesses. And I can send you a list of devices that are known to be either immune to this they've been fixed or patched and devices that are known to have this problem. [01:11:03] You send me an email. Excuse me. If you have any questions about it. So it's me M e@craigpeterson.com. I'd be glad to send you that list. Seesaw has it online. You can certainly search for it yourself. If you're interested in. So for you as an individual, it's just extra caution, use these one time, use credit card numbers. [01:11:31] I have talked about this before. And that is, I use fake identities as much as I possibly can online. And I'm not trying to defraud anyone. Of course, that would be legal. What I'm trying to do is not make myself as easy at target. As is frankly pretty much anybody who uses a computer out there, because if you're always using your, in the same name and email address and having forbid password, then you are a bigger target than you have to be. [01:12:07] And I have a whole index file. I have a spreadsheet that I put together with 5,000 different identities, different names, of course, different sexes, races, origin stories, everything. And the whole idea behind that is why does some company that's providing me with some little website thing, need my real info. [01:12:31] They don't obviously you give you real info to the banks or. Counts, but you don't need to give it to anybody else. And that's what I do. That's my goal. So if you can do that, do that. Apple also has a way for you to use random. Email address a suit can set up a different email address for every website you visit. [01:12:57] There are a few services out there that can do it. If you're interested, drop me an email. me@craigpeterson.com. I'll send you a list of some of them. I think they're all paid except for the app. But you have to have an apple account in order to use it. One of the things that businesses really need to do is do a scan. [01:13:19] Again, I can send you a list of scanners so that you can look at your network, see if there's any. Obvious that might have huge implications for your business. Again, me@craigpeterson.com, one of the things apple has come up with that I really have turned out to and I think I mentioned them before on the air, but it's these news. [01:13:41] Trackers that apple has, that you can put on things. And we spoke a little bit last week about the problem with these trackers being put on to high-end cars, and then being used to track the car. Now apple got around that problem a while ago, by letting you know, Hey, there is a tracker following you isn't that handy. [01:14:04] Wait a minute, somebody dropped one of these little tags into my purse. Coat my car or whatever it might be. And so now you can have a look and see where is this thing that's following me and get rid of it. Of course, in order to know that there's one of these apple tags tracking, you've needed to have an apple phone. [01:14:26] Because it'll warn you. Apple now has something called tracker detect. If you are using an Android phone, I would highly advise you to get this app tracker detect app on Android. And it's designed to help you Android users from being tracked by apple airtight. 'cause if you don't know you're being tracked right, then you can't know if you're being tracked. [01:14:55] If you don't have an iPhone, unless you get this app so good for them, apple has it up now on the Google play store. That's just in the last week or so, and it lets you locate nearby air tags. So let's I think a very good thing kind of wonder if apple isn't using the Androids also for part of the. [01:15:16] Crowdsourcing for the air tags, but that's a different conversation. Great article in vice this week by Aaron Gordon, about how car companies want you to keep paying. Features you already have, and they specifically made a call out about a car manufacturer. Toyota. Who's now charging $80 a year for people who bought their car years ago, six years ago, $80 a year. [01:15:51] If you want to keep using the remote start function on your key. Yeah, so you paid for it and life was good. You went a few years, really nice on a cold winter day or a hot summer day, warm up the car or cool it down all automatically. But now Toyota is charging. $80 a year. So people are saying why I bought it? [01:16:16] Why would I pay for that? Apple's now claiming that the several first years were merely a free trial period, but this isn't even the big play for these car companies, this $80 a year for marginal features like remote start instead. Is probably going to happen. And I agree with this author as well is we're going to see a, an approach that Elon Musk has used with his Teslas. [01:16:47] They're going to charge extra for performance, for range, for safety upgrades, for electric vehicles that actually make the car better car, a better car. So upgrades used to be difficult or impossible with gas cars. A lot of these are trivial for the electric cars, with the dashboards that have games that you can play while you are charging. [01:17:13] Some of them were complaining about it being for when they're on the road. Of course that's going to happen because frankly, when, once we get a full autonomous car, what are outs are you going to do? I should also mention this isn't really a, but Mercedes-Benz has been awarded the very first license for the manufacturer sale and distribution of a fully autonomous vehicle. [01:17:39]

Craig Peterson's Tech Talk
The Worst Internet Vulnerability Ever? And It Isn't Going Away Soon. What's Log4J?

Craig Peterson's Tech Talk

Play Episode Listen Later Dec 18, 2021 85:05


2021-12-18 1144 [00:00:00] Well, the tech world is all a buzz with this log for J or log for shell. However you want to call it because we are looking at what is probably the biggest security vulnerability the internet has had in a long time. [00:00:16] This is huge, huge, huge to chew. [00:00:19] I don't know how to express it anymore, but there are multiple problems here. And even the patch that was released to fix this problem was broken as being exploited in the last 24 hours. There've been no less than 30 different new. Variations of the exploit. So what is going on? There is a computer language that's used by many programmers, particularly in larger businesses called Java. [00:00:52] You might remember this, I've been following it and using it now, since it first came out very long time ago from sun Microsystems. Java is a language that's designed to have kind of an intimate. CPU processor. So think about it. If you have an Intel chip that is an x86 type chip, what can you use instead of that Intel chip to run that code? [00:01:19] Well, there are some compatible chips made mainly by AMD advanced micro devices, but you're really rather limited. You have problems. Power. Well, you know, guess what you're stuck. You're stuck in that architecture. And then on the other end of the spectrum, you have some of these devices that are designed by companies like apple, Google has their own. [00:01:41] Now that our CPU's their graphics processing units as well. And they completely replaced the Intel architecture. But the Intel code, the programs that are written for the Intel architecture that are compiled for Intel are not going to work on the apple chips and vice versa. So what did apple do? Well, apple, for instance, just moved from Intel over to. [00:02:08] Own chipsets and these chips don't run Intel code. So how can you run your old apple apps? Well, apple has a little translator. They call Rosetta. It sits in the middle and it pretends it's an Intel processor. This really rather simple. And they've done an amazing job on this. And w Rosetta is actually a third party company and they helped apple as well with the transition from the IBM power series chips to the Intel chips. [00:02:41] So how do you move the code around while you either have. Recompile it, you may have to redesign it, rearchitect it for the new type of processor and the new types of computers that are supported by that processor. Or you may do what Apple's done here a couple of times now, and that is having an interpreter in the middle that pretends it's something else pretends as an Intel chip. [00:03:07] And then you can still run your in. Code because it knows, okay. It was designed originally for this apple Intel architecture. So I know how to make all of this work Java steps in and says, well, why are you doing all of that? That's kind of crazy. Isn't it moving all of your code around all of the time. So Java's original claim to fame was what will, will make life easy for? [00:03:33] What you do is you write your code. Using Java in Java is very similar to C plus plus in some of these other languages that are out there. And that language, when you're writing your source code will be compiled into an intermediate. Code. So what happened is sun Microsystems designed this virtual machine? [00:03:56] Now don't think of it like a normal VM, but we're talking about a CPU architecture and CPU instructions. And so what it did for those CPU instructions. Which is really quite clever, as I said, well, we'll come up with what we think are the most useful. And it's a Cisco architecture for those of you who are ultra geeks like myself. [00:04:19] And we will go ahead and implement that. And so the compiler spits out code for this CPU that doesn't actually exist anywhere in the known universe. And then what happened is sun went out and said, okay, well, we'll make an interpreter for. Artificial CPU that'll run on Intel chips and we'll make another one that runs on these chips, that chips and the other chips, beautiful concept, because basically you could write your code once debug it and run it off. [00:04:53] Anything that was kind of one of the original claims to fame for Unix, not so the run at anywhere part of it, but the part that says, well, it doesn't take much work to move your code to different machine, and we're not going to get into Unix and its root I've been around the whole time. It's kind of crazy. [00:05:13] I just finished reading a book and saying, I remember that I remember that. And they were going through all of the history of everything I was in the middle of that. I did that. That was the first one to do this. It was kind of fun. Anyhow, what Java has done now is it's really solidified itself in the larger enterprises. [00:05:34] So basically any software that you might be using, like our website that is particularly with a larger business. Is going to be using Java and that Java language is using libraries. So in programmers, instead of doing what I used to do way back when which is right in assembly code, or even in COBOL, and basically you had to write everything, every part of every program, anything you wanted to have done, you had to write, or maybe you borrowed somebody else's code and you embedded it in. [00:06:08] And mind you, we only had 32 kilobytes of memory in the mainframe back then the 360 30, for those of you who remember those things, but here is where things really changed. You now had the ability to take that code that you wrote and put it on a smart. You could take that exact same code, no recompiling or anything, and take that code and run it on a mainframe on our super computer in a car. [00:06:38] So Java became very popular for that. Very reason in these libraries that Java provided, made it even quicker to program and easier to program. Now there's some problems with languages. Java, which are these object oriented languages where you can, for instance, say one plus one equals two. Right. That will make sense. [00:07:02] But what does it mean when you use a plus sign? When you're talking about words? So you say apple plus oranges, what's that going to eat? Well, that's called overloading an operator, and this is not a course on programming languages, but what happens is a person can write the library and says, oh, well, if the programmer says a non-Apple plus an orange or string plus a string, what I want you to do is concatenate the strings. [00:07:31] Now that programmer who wrote that has to kind of figure out a couple of things, make some assumptions. Oh, well, I should I put a space between apple and. Or not. And what do they really mean? Okay. So this is how I'm going to interpret it. So that, it's a very, very simple example. But the concept is that now with these overloaded opera operations and these libraries that can go deep, deep, deep, you now have the additional problem of people designing and writing the libraries, making assumptions about what the programmer wants and what the programmer needs. [00:08:09] Enter the problem with the log for J vulnerability. This is a very big, big deal because we're talking about a library function that is being used in Java by programmers. Now, you know that I have been warning everybody. Android for years, the biggest problem with Android isn't its user interface. It isn't that it's made by somebody else. [00:08:37] Right? The biggest problem. And of course, this is my opinion is that Android software is provided by Google and. It is given basically to any manufacturer that wants to license it. And then that manufacturer can't just take Google and run it. Right. Have you ever tried to install windows or Linux or free BSD? [00:09:04] It's mainly a windows problem, frankly, but you go on ahead and install that in. What do you need in windows while you get to need driver? Oh, well, wait a minute. This laptop is three years old. So how, how can I find them? And then you go around and you work on it and takes you a day and you finally find everything you need. [00:09:22] And you've got all of the drivers and now it works. But Microsoft provided you with the base operating system. Why do you need drivers? Well, you know the answer to that and it's because every piece of equipment out there is different. Think about this in the smartphone market. Think about it in the more general. [00:09:39] Android market. There are thousands of these devices that are out there and those different devices are using different hardware, which require different drivers. So when Google comes up with a software patch, how well we just fix the log for J issue that patch. Has to be given to the devices manufacturer who then has to talk to the manufacturers of the various components and make sure that the device drivers that they're using by the manufacturer are actually compatible. [00:10:20] They're going to. Got the upgrades, wire it all together, and then test it on all of the different phones that they have and cars because cars are running it. Now you see how complicated this get. And most Android devices will net. Get another update. They will never get a security patch versus apple. [00:10:43] Right now. They're still supporting the apple six S that came out in 2015. If I remember right, it's five or six years old. Now you don't find that in the Android space. You're lucky if you get two years worth of support, we're going to continue this. But this is, uh, this is really, really important. I'm going to talk more about the actual problem. [00:11:06] What is being done about it? What you can do about it as an individual, a home user, and as a business, in fact, keep an eye on your mailboxes. Cause I've got some more links to some sites about what you can do and how to do it and how to test for it. Anyways, stick around. You're listening to Craig Peterson. [00:11:29] We're talking about what is likely to be the biggest set of hacks in internet history right now. It's absolutely incredible what's going on. So we're going to talk about what it means to you and what's really going on. [00:11:45] This whole problem is probably bigger than anybody really realizes because Java, as I explained is a very common computer programming language. [00:12:00] And it has a lot of features that bigger businesses love. They love the ability to have multiple programmers working on something at the same time. They love the inheritance and multiple inheritance and all of these wonderful features of Java. Well, one of the really cool features is that you can, while your program is running, have the program change. [00:12:25] It's. That's effectively what it's doing. It's pulling in libraries and functions in real time. And that's where this particular problem comes in. This has been a nightmare for Java forever. It's one of the reasons I have never migrated to Java for any of the projects that I have. Don, it just gets to be a nightmare. [00:12:49] It kind of reminds me of Adobe flash. It was the biggest security problem that has ever been. And the number two Java and Java is running in the Android operating system. It is the core of the operating system. All of the programs are almost certainly written into. And now we're seeing Java turnip in the, not just entertainment systems in our cars, but in the actual computers that are driving the cars, running the cars. [00:13:22] And I get very concerned about this. We had two major outages just this week before this log for J thing came about over at Amazon. And those two Amazon outages knocked thousands of businesses. Off the air out of business. You couldn't get to them. You remember the big problem with Facebook that we talked about a little while back and in both cases, it looks like they were using some automatic distribution of software sent out the wrong stuff. [00:13:52] Right? And now you are effected. Well, what happens? What happens with the cars? If they push out a bad patch, how are we going to know. Hmm, what's that going to mean? And if your car has Java in it, are you going to be vulnerable to this? Well, you, you wouldn't be vulnerable to log for J if your computer wasn't hooked up to anything, but nowadays the cars are hooked up to the net. [00:14:20] We've had a couple of car dealers for our clients. Who've had the Mercedes we've had Acura Honda and others over the years. And it's interesting going in there now and working with them because they are doing massive downloads of firmware whenever a car comes in. So that car, if they don't have the right kind of networks, that car can take hours to do. [00:14:49] Dates. And I got to tell you, man, I I'm just shocked by so many businesses, not willing to spend the money that it really takes. So the poor technician is sitting there waiting for it to happen. You know, we could make it happen in 15 minutes, but they're stuck there waiting for three or four hours sometimes for some of these downloads, no it's called cash them locally. [00:15:09] Right? These cars, some of them need new and different firmware. Some of them use the same and have. A reliable, fast internet connection. And we've done that for many companies. Anyways, I'm kind of going off on a bit of a tangent here. So forget that let's get back into this with Java. You can have a routine. [00:15:32] Call another routine that was not even necessarily thought of by the programmer. Now, can you imagine that? So you're, you're programming and you're, you're not considering adding something that's going to send email out and yet you could have a log in. That's part of the DNS, uh, and it gets logged that actually causes an email to be sent or causes anything else to happen. [00:16:02] That the exact problem we're seeing right now, it's absolutely crazy patterns in text fields, things like you can put a user desk agent. Right, which is normal for nature. GTP connection. You say, this is, this is usually a guy who was using Chrome version bar or Firefox or safari, but you put the user agent field. [00:16:26] And then after that, you've put in some, a little bit of code that tells Java, Hey, what I want you to do is this. This is a problem because we're finding now that I'm, again, I said the last 24 hours, 30 different exploits over a million companies have been attacked on this. And we're talking about 10. [00:16:51] Companies, absolutely hacked every minute right now. Can you think, let's just think about that. And we're in the middle of what? Right? The big holiday season, we've had some holidays, there's people online, shopping there's businesses that are trying to buy stuff, business stuff, almost every one of those sites is likely to be compromised. [00:17:17] It's that bad. It's absolutely nuts. What's happening here. This is a huge flaw, huge flaw. And by the way, it is flaw. Number this you ready for? This 44,228. In the year 2021. So the written 44,000 flaws that have been discovered and reported, this is the CVE system for those of you who are interested, but this really is a worst case scenario. [00:17:50] Because this log for J library is being pulled in to so many pieces of software out there on so many different platforms. The paths to, uh, to exploit this vulnerability are almost unlimited. And because there's so many dependencies on this particular log for J library, it's going to make it very difficult to patch without breaking other things. [00:18:21] And the fact the exploit itself fits in. Tweet can be injected almost anywhere. So it's going to be a very long weekend for a lot of people, but let me tell you this, it is not going to be solved in a few days, a week a month. We're going to be seen this. Years, because you have to be the person that wrote the program that has the source code to link in the new libraries, distributed out to your customers. [00:18:52] Do you see what a nightmare? This is now? Some people are saying, well, you know, let's blame this on open source. This, this is an open source product. Well, yeah, it is an open source project and it turns out that even though anyone can grab this, these, this library routine or any of these pieces of code, anybody can grab it. [00:19:13] Anybody can look at it. It turns out it's one guy. Who actually maintained this, who has a budget of $2,000 a year to maintain it. Nobody else pitched in. And all of these big companies are all out there grabbing this code that this guy has been working on and not paying much attention to it. Not donating to the product. [00:19:37] Which is saving them millions of dollars, not that one project, but all of these projects collectively in the open source community, it's it is more far reaching than this stretch vulnerability. You might remember this drug vulnerability that's was, that was the root cause of the massive breach at Equifax that Explo exposed all of our personal information. [00:20:05] To the dark web. That's how bad this is. Oh my gosh. So Hey, if you want information, I've got a links, a bunch of links set up here on what to do while you're waiting for the log for J updates from your vendors, how you can find on your servers. If they have the log for J vulnerability, I've got a bunch of information that I've stored up on that. [00:20:32] And some others just email me, just email me. M e@craigpeterson.com asked for the list of the log for Jay's stuff or the Java's stuff. I'll figure it out. Be glad to send it to anyone that's interested. And if you need to scan to find out yourself and your business, let me know to me@craigpeterson.com. [00:20:55] Wow. I was just going through a list published by Seesaw, this federal government agency that tracks some of these types of vulnerabilities. And wow, this list is daunting of all of these pieces of software that are vulnerable to this huge hack. [00:21:12] this is now a problem for each and every one of us. [00:21:16] I think I've established the man. This is nasty, nasty, nasty, nasty. So what do you do? First of all, I sent out. Email a list of things have in fact, a few different lists of things that you can do. So I had one for consumers, one for businesses and kind of a general thing as well. And then a bunch of references. [00:21:43] Of course there's even more references and more great information now because I got that email. Pretty early. So I hope hopefully you had a chance to really look through that, but here let's just talk a little bit about this, what to do thing you already know because you guys really are the best and brightest that you need to be careful when you're on. [00:22:07] You cannot be online, Willy nilly, clicking on things. And that includes emails and links. And this time a year, in fact, all year long, we're looking for. Wow, let's see. Is there a great bonus here? Look at they're having a sale, a discount. Oh no. I've only got three hours to respond or the deal's going to go away. [00:22:28] I've usually been of the sort that I just am, not that influenced by some of these deals, but. I do sometimes want to find out what it is. So I find myself this week clicking through on. I'm on a lot of marketing lists because I like to follow what different marketers are doing, right. That's technology. [00:22:51] And it's something I want to keep you guys informed about. And I found myself just crazy amount of double checking to make sure the link was valid. Now I'm sure you guys have, if you're on my email list, you might notice that the from address is not the me at Craig Peterson. Calm email address. You can always send email to me@craigpeterson.com and it ends up in my email box. [00:23:17] And it might take me a few days, or even as much as a week or two to get back to you. If it's something there's an emergency, you really need to fill out the form on my website, but I will get back with you. But the problem that some people have noticed lately is. It doesn't say return address or sent from me@craigpeterson.com. [00:23:41] It's got this rather long convoluted, uh, convoluted, uh, URL that has nothing to do with Craig peterson.com, sows a number of people question it, it is a tracking email. When can the idea is if I am going to be able to get back to people and if Karen is going to be able to nudge. I have to have these things tracked. [00:24:06] So the email from address, when you hit reply, it is going to go to the, again, my email list server guys, and it is going to get tracked so I know. Okay. Okay. So now I've got a few minutes or an hour. Let's sit down and go through a lot of these emails so I can get back to people. That's a problem for many people, that's even more of a problem today than it ever has been in the past. [00:24:35] Now there's been a few sites that have done something about tracking because many people don't like to be tracked. Right. My self included, although, as I've always explained on the show, it's kind of a double-edged sword because I would rather see commercials or ads for a Ford F-150 pickup truck. When I'm looking to buy. [00:24:58] Uh, car or certainly a truck. I don't want to see ads for things I don't care about. Right. And you probably don't either. So the tracking, I don't think is a huge deal. The statistics that have come out from apple recently are very interesting because what apple ended up doing is they put some new technology and to stop tracking. [00:25:24] And to stop you from being tracked. And basically what they're doing is a couple of things. One, they've got this new feature where they will download images and emails from their website, so that it's not a, you know, they're, they're not being able to localize where you are and then they're also doing something where you. [00:25:50] Are you, you are, you can't be tracked like you used to be able to be tracked. Let me just put it simply like that applications now have to have that little label warning label in the app store to let you know what they might be tracking, et cetera. So they've been accepting anti tracking behavior that came from our friends from. [00:26:13] Apple now Google, Facebook and others have been very upset about this thinking that they were going to lose a lot of business here in the advertising side, because you wouldn't be able to track them. So if you've got an apple iOS device, you probably noticed, it says, allow app to track your activity across other companies. [00:26:37] And websites, your data will be used to measure advertising efficiency. I don't know that that's such a bad thing. And looking at the stats right now, I'm looking at Google's income. And a lot of that comes from YouTube after. Apple launched its new privacy initiative and it looks like Google really wasn't hit very badly. [00:27:01] What Facebook was worried about that they would just be losing all kinds of revenue. Also didn't turn out to be true. So it's an interesting thing to see and I've got to really compliment apple again. At this time on trying to keep our information private, I read a really great book, uh, this, so this is how the world ends talking about the whole cyber race and where things are likely going. [00:27:32] And it it's frankly impressive. To see what Google has done to try and keep out our government from their networks, as well as foreign government and the whole thing with the Chinese hackers we've talked about before, where I've found them. Active inside our customer's network before. And this is where we get called in because there's a problem. [00:28:00] We look around, we find indications of compromise. We find the Chinese inside. Okay. So it isn't something that we were protecting them, the Chinese got in, but we come in after the fact and have to clean up the mess. But what we have really seen happen here is the largest transfer in. Of wealth, I should say, in history, the largest transfer of wealth in history to. [00:28:27] From us and from other countries, but primarily from us because of what they've stolen. And so Google really has fought hard against it. The Chinese have been in their systems have stolen a lot of stuff. Apple has fire fought hard against it, but we know about the apple stuff. Google's seems to be a little quieter about some of it. [00:28:47] So they may be selling our information to advertisers, but there certainly are trying to keep nation states out. I'm really wondering too, what is Google doing? Moving that artificial intelligence lab to China. It just it's insane. We know we, if we're going to get out of this financial position, we're in as a country, we need to have an amazing new technology. [00:29:11] So people are coming to the United States and we're certainly not seeing that. At least not yet. It's all been stolen. So what to do, man. I started talking about that and we got a little sidetracked. So I will talk about that a little bit more here coming right up and what to do if you're a consumer, if you're a business person. [00:29:35] And of course, as I mentioned earlier, I have. Quite a list. I'm more than glad to send you. If you go ahead and just email me, M e@craigpeterson.com. I'll keep you up to date, let you know what's happening and give you those links that you can follow to find out exactly what is happening and what you can do, including some tools. There are some tools out there to check to see if that vulnerability exists inside your networks or systems me@ Craig peterson.com. And I'll be glad to reach out, reach back to you. Stick around. [00:30:12] I'm gonna tell you what to do as a consumer because of this massive internet hack that is underway. It is huge, huge, huge. Also going to talk a little bit about apple and what they're doing with their tracker detect app on Android devices. [00:30:29] This will be going on for months and probably years in some cases, because there are many systems that will never. [00:30:40] Patched for this vulnerability. So from now on, you need to be doubly cautious about almost everything, the big targets for this. Then people who tend to be the most valuable. Big businesses. And I can send you a list of devices that are known to be either, uh, immune to this they've been fixed or patched and devices that are known to have this problem. [00:31:08] So. You send me an email. Excuse me. If you have any questions about it. So it's me M e@craigpeterson.com. I'd be glad to send you that list. Seesaw has it online. You can certainly search for it yourself. If you're interested in. So for you as an individual, it's just extra caution, you know, use these one time, use credit card numbers. [00:31:39] I have talked about this before. And that is, I use fake identities as much as I possibly can online. And I'm not trying to defraud anyone. Of course, that would be legal. What I'm trying to do is not make myself as easy at target. As is frankly, uh, pretty much anybody who uses a computer out there, because if you're always using your, in the same name and email address and having forbid password, then you are a bigger target than you have to be. [00:32:15] And so. I have a whole, uh, index file. I have a spreadsheet that I put together with 5,000 different identities, different names, of course, different sexes, races, origin stories, everything. And the whole idea behind that is why does some company that's providing me with some little website thing, need my real info. [00:32:41] They don't, obviously you give you real info to the banks or. Counts, but you don't need to give it to anybody else. And that's what I do. That's kind of my goal. So if you can do that, do do that. Apple also has a way for you to use random. Email address a suit can set up a different email address for every website you visit. [00:33:07] There are a few services out there that can do it. If you're interested, drop me an email. me@craigpeterson.com. I'll send you a list of some of them. Uh, I think they're, they're all paid except for the app. But you have to have an apple account in order to use it. One of the things that businesses really need to do is do a scan. [00:33:30] Again, I can send you a list of scanners so that you can look at your network, see if there's any. Obvious that might have huge implications for your business. Uh, again, me@craigpeterson.com, one of the things apple has come up with that I, I really have turned out to like, and I think I mentioned them before on the air, but it's these news. [00:33:55] Trackers that apple has, that you can put on things. And we spoke a little bit last week about the problem with these trackers being put on to high-end cars, and then being used to track the car. Now apple got around that problem a while ago, by letting you know, Hey, there is a tracker following you isn't that handy. [00:34:17] So, you know, wait a minute, somebody dropped one of these little tags into my purse. Coat my car or whatever it might be. And so now you can have a look and see where is this thing that's following me and get rid of it. Well, of course, in order to know that there's one of these apple tags tracking, you you've needed to have an apple phone. [00:34:43] Because it'll warn you. Apple now has something called tracker detect. If you are using an Android phone, I would highly advise you to get this app tracker detect app on Android. And it's designed to help you Android users from being tracked by apple airtight. 'cause if, if you don't know you're being tracked right, then you can't know if you're being tracked. [00:35:12] If you don't have an iPhone, unless you get this app so good for them, apple has it up now on the Google play store. That's just in the last week or so, and it lets you locate nearby air tags. So let's, uh, I think a very good thing kind of wonder if apple isn't using the Androids also for part of the. [00:35:33] Crowdsourcing for the air tags, but, uh, that's a different conversation. Great article in vice this week by Aaron Gordon, about how car companies want you to keep paying. Features you already have, and they specifically made a call out about a car manufacturer. Toyota. Who's now charging $80 a year for people who bought their car years ago, six years ago, $80 a year. [00:36:09] If you want to keep using the remote start function on your key. Yeah, so you paid for it and life was good. You went a few years, really nice on a cold winter day or a hot summer day, warm up the car or cool it down all automatically. But now Toyota is charging. $80 a year. So people are saying, well, why I bought it? [00:36:34] Why, why would I pay for that? Apple's now claiming that the several first years were merely a free trial period, but this isn't even the big play for these car companies, this $80 a year for marginal features like remote start instead. Is probably going to happen. And I agree with this author as well is we're going to see a, an approach that Elon Musk has used with his Teslas. [00:37:06] They're going to charge extra for performance, for range, for safety upgrades, for electric vehicles that actually make the car better car, a better car. Right? So upgrades used to be difficult or impossible with gas cars. A lot of these are trivial for the electric cars, with the dashboards that have games that you can play while you are charging. [00:37:32] Some of them were complaining about it being for when they're on the road. Of course that's going to happen because frankly, when, once we get a full autonomous car, what are outs are you going to do? Uh, I should also mention this isn't really a, but Mercedes-Benz has been awarded the very first license for the manufacturer sale and distribution of a fully autonomous vehicle. [00:38:00] The very first they are licensed for up to, I think it was 37 miles per hour. On their car and anything beyond that, you still have to retain control, but that's an amazing thing. And it only works on roads that are mapped. And what Mercedes is doing is they have these super high definition maps. So the car knows exactly where it is. [00:38:29] If you are a Tesla owner, you know that a few years ago, Paid, I think it was $2,000 for your Tesla to be able to drive itself. And of course they, they haven't been able to drive themselves. You know, they, yeah, there's been features here and there, but how are you getting those features? How will you going to get that self-driving mode? [00:38:52] We'll test those, calling them over the air upgrades. And they're also saying. Th this is part of the Tesla ownership experience to quote their website. All right. So they've had all kinds of over the air upgrade. They've had some free software. They've had paid ones, Tesla charges, thousands of dollars for its autopilot. [00:39:16] Now a lot of money, I think it was five grand. And now they've got this beta driver assist system as well, and they also have. To others. You might remember the ludicrous speed. Um, long range model three would dual motors is capable of accelerating from zero to 60 in 3.9 seconds. But when you buy the car, the zero to 60 time is a half a second longer. [00:39:48] So pay an extra $2,000 and you get that extra half second and accelerate. Yeah, there's nothing different. They don't even have to change. Really changed the software. There's no hardware differences. It's just, you pay them two grand and they, your cars catheter to the internet and they just unlock a key is not something. [00:40:11] Now, there are some people that hack the way around that paywall, but then Tesla blocked it and reversed the hack as well. A Tesla has sold their cars now for years with the same 75 kilowatt hour battery. But software locked them to 60 and 70 kilowatt hours might remember. We talked about this with a hurricane that came ashore down in Texas, where Tesla, anyone in that area provided them with an automatic upgrade for extra batteries. [00:40:43] So they could go further in order to get out of the zone of their herd. Before them in software lock-in and a 60 and 70 kilowatt hours, unless you paid an additional $3,000 for that extra 30 or 40 miles of range. Isn't that something. Yeah. So Tesla has temporarily unlocked them, but this is where we're going. [00:41:06] You're going to be going into the car dealership while in Tesla's case. It's on the, on the internet, which I think is better. Frankly, dealerships are handy in order to get a repair, but. You can get a repair at some of these little specialty shops it's often better and certainly cheaper than what the dealership sells, but you're not only going to be haggling over the price of the vehicle and delivery times. [00:41:32] You're going to be haggling over all of these different features. And it's never going to end because they're going to keep having software upgrades that you're going to have to pay for. Uh, Pollstar this is an electric vehicle company spun off from Volvo new. Remember Volvo is now Chinese company. Yeah. [00:41:51] Chinese. Yeah. So much for safety, right? Uh, they're going to charge an extra thousand dollars for a slight increase in horsepower and torque, just like Tesla does. So this is the future. Of car companies. Hey, I want to remind everyone, if you go to my website, Craig peterson.com. Right now you can sign up for my weekly newsletter. [00:42:15] It is packed full of great information for you. Every week. We've got some free boot camps coming up after the first of the year, and you need to be on my email list to find out about it. Craig Peter sohn.com/subscribe. [00:42:32] And following my newsletter, you probably saw what I had in the signature line the last few weeks, how to make a fake identity. Well, we're going to take it a little bit differently today and talk about how to stop spam with a fake email. [00:42:49] I think I've told you before I had email way back in the early eighties, late seventies, actually. So, yeah, it's been a while and I get tens of thousands of email every day, uh, sent to my domain, you know, mainstream.net. That's my company. I've had that same domain name for 30 years and, and it just kinda got out of control. [00:43:16] And so we have. Big Cisco server, that exclusively filters email for us and our clients. And so it cuts down the tens of thousands to a very manageable couple of hundred a day. If you think that's manageable and gets sort of almost all of the fishing and a lot of the spam and other things that are coming. [00:43:39] But, you know, there's an easier way to do this. Maybe not quite as effective, but allowing you to track this whole email problem and the spam, I'm going over this in some detail in. Coming bootcamp. So make sure we keep an eye on your emails. So you know about this thing again, it's free, right? I do a lot of the stuff just to help you guys understand it. [00:44:04] I'm not trying to, you know, just be June to submission to buy something. This is a boot camp. My workshops, my boot camps, my emails, they are all about informing you. I try to make them the most valuable piece of email. During the week. So we're going to go into this in some detail in this upcoming bootcamp. [00:44:25] But what we're looking at now is a number of different vendors that have gotten together in order to help prevent some of the spam that you might've been in. Uh, I think that's a very cool idea to have these, these sometimes temporary, sometimes fake email addresses that you can use. There's a company out there called fast to mail. [00:44:50] You might want to check them out. There's another company called apple. And you might might want to check them out. I'll be talking about their solution here as well. But the idea is why not just have one email address? And if you're an apple user, even if you don't have the hardware, you can sign up for an apple account. [00:45:12] And then once you have that account, you can use a new feature. I saw. Oh, in, in fact, in Firefox, if you use Firefox at all, when there's a form and it asks for an email address, Firefox volunteers to help you make a fake ish email address. Now I say fake ish, because it's a real email address that forwards to your normal regular. [00:45:40] Email address. And as part of the bootcamp, I'm also going to be explaining the eight email addresses, minimum eight, that you have to have what they are, how to get them, how to use them. But for now you can just go online to Google and this will get you started and do a search for Apple's new hide. My email feature. [00:46:00] This lets you create random email addresses and those email addresses. And up in your regular, uh, icloud.com or me.com, whatever you might have for your email address, address that apple has set up for you. Isn't that cool. And you can do that by going into your iCloud settings. And it's part of their service that are offering for this iCloud plus thing. [00:46:27] And they've got three different fi privacy focused services, right? So in order to get this from apple, so you can create these unlimited number of rather random looking emails, for instance, a blue one to six underscore cat I cloud.com that doesn't tell anybody. Who you are, and you can put a label in there. [00:46:51] What's the name of the website that, that, or the, the, a URL of the website, the two created this email for, and then a note so that you can look at it later on to try new member and that way. Site that you just created it for in this case, this is an article from CNET. They had an account@jamwirebeats.com. [00:47:15] This is a weekly music magazine subscription that they had. And apple generated this fake email address, blue one to 600 score Canada, cobb.com. Now I can hear you right now. Why would you bother doing that? It sounds like a lot of work. Well, first of all, it's not a whole lot of work, but the main reason to do that, If you get an email address to blue cat, one, two6@icloud.com and it's supposedly from bank of America, you instantly know that is spam. [00:47:53] That is a phishing email because it's not using the email address you gave to TD bank. No it's using the email address that it was created for one website jam wire beats.com. This is an important feature. And that's what I've been doing for decades. Email allows you to have a plus sign. In the email address and Microsoft even supports it. [00:48:23] Now you have to turn it on. So I will use, for instance, Craig, plus a Libsyn as an example@craigpeterson.com and now emails that Libson wants to send me. I'll go to Craig. Libsyn@craigpeterson.com. Right? So the, the trick here is now if I get an email from someone other than libs, and I know, wait a minute, this isn't Libsyn, and that now flags, it has a phishing attack, right. [00:48:58] Or at the very least as some form of spam. So you've got to keep an eye out for that. So you got to have my called plus, and if. Pay for the premium upgrade, which ranges from a dollar to $10. Uh, you you've got it. Okay. If you already have an iCloud account, your account automatically gets upgraded to iCloud plus as part of iOS 15, that just came out. [00:49:25] All right. So that's one way you can do it. If you're not an apple fan. I already mentioned that Firefox, which is a browser has a similar feature. Uh, Firefox has just been crazy about trying to protect your privacy. Good for them, frankly. Right? So they've been doing a whole lot of stuff to protect your privacy. [00:49:47] However, there you are. They have a couple of features that get around some of the corporate security and good corporate security people have those features block because it makes it impossible for them to monitor bad guys that might hack your account. So that's another thing you can look at as Firefox. [00:50:06] Have a look@fastmail.com. And as I said, we're going to go into this in some detail in the bootcamp, but fast mail lets you have these multiple email accounts. No, they restricted. It's not like apple where it's an infinite number, but depending on how much you pay fast mail is going to help you out there. [00:50:26] And then if you're interested, by the way, just send an email to me, me. Craig peterson.com. Please use that email address emmy@craigpeterson.com because that one is the one that's monitored most closely. And just ask for my report on email and I've got a bunch of them, uh, that I'll be glad to send you the gets into some detail here, but proton mail. [00:50:52] Is a mail service that's located in Switzerland? No, I know of in fact, a couple of a high ranking military people. I mean really high ranking military people that are supposedly using proton mail. I have a proton mail account. I don't use it that much because I have so much else going on, but the advantage. [00:51:14] Proton mail is it is in Switzerland. And as a general rule, they do not let people know what your identity is. So it's kind of untraceable. Hence these people high up in the department of defense, right. That are using proton mail. However, it is not completely untraceable. There is a court case that a proton man. [00:51:41] I don't know if you'd say they lost, but proton mail was ordered about a month ago to start logging access and provide it for certain accounts so they can do it. They are doing it. They don't use it in most cases, but proton mail is quite good. They have a little free level. Paid levels. And you can do all kinds of cool stuff with proton mail. [00:52:05] And many of you guys have already switched, uh, particularly people who asked for my special report on email, because I go into some reasons why you want to use different things. Now there's one more I want to bring up. And that is Tempa mail it's temp-mail.org. Don't send anything. That is confidential on this. [00:52:27] Don't include any credit card numbers, nothing. Okay. But temp-mail.org will generate a temporary email address. Part of the problem with this, these temporary email address. Is, they are blocked at some sites that really, really, really want to know what your really mail address is. Okay. But it's quite cool. [00:52:51] It's quite simple. So I'm right there right now. temp-mail.org. And I said, okay, give me email address. So gave me one. five04@datacop.com. Is this temporary email, so you can copy that address. Then you can come back into again, temp-mail.org and read your email for a certain period of time. So it is free. [00:53:18] It's disposable email. It's not particularly private. They have some other things, but I wouldn't use them because I don't know them for some of these other features and services. Stop pesky email stop. Some of these successful phishing attempt by having a unique, not just password, but a unique email for all those accounts. [00:53:42] And as I mentioned, upcoming bootcamp, and I'll announce it in my weekly email, we're going to cover this in some detail. Craig peterson.com. Make sure you subscribe to my newsletter. Stick around. [00:53:57] Well, you've all heard ransomware's up. So what does that mean? Well, okay. It's up 33% since the last two years, really. But what does that amount to, we're going to talk about that. And what do you do after you've been ransomed? [00:54:14] Ransomware is terrible. It's crazy. Much of it comes in via email. [00:54:21] These malicious emails, they are up 600% due to COVID-19. 37% of organizations were affected by ransomware attacks in the last year. That's according to Sofos. 37% more than the third. Isn't that something in 2021, the largest ransomware payout, according to business insider was made by an insurance company at $40 million setting a world record. [00:54:53] The average ransom fee requested increased from 5,020 18 to around 200,000 in 2020. Isn't that something. So in the course of three years, it went from $5,000 to 200,000. That's according to the national security Institute, experts estimate that a ransomware attack will occur every 11 seconds for the rest of the year. [00:55:22] Uh, it's just crazy. Absolutely. Crazy all of these steps. So what does it mean? Or, you know, okay. It's up this much is up that much. Okay. Businesses are paying millions of dollars to get their data back. How about you as an individual? Well, as an individual right now, the average ransom is $11,605. So are you willing to pay more than $11,000 to get your pictures back off of your home computer in order to get your. [00:55:58] Work documents or whatever you have on your home computer. Hopefully you don't have any work information on your home computer over $11,000. Now, by the way, most of the time, these ransoms are actually unaffiliate affair. In other words, there is a company. That is doing the ransom work and they are pain and affiliate who are the, the affiliate in this case. [00:56:27] So the people who infected you and the affiliates are making up to 80% from all of these rents. Payments. It ju it's crazy. Right? So you can see why it's up. You can just go ahead and try and fool somebody into clicking on a link. Maybe it's a friend of yours. You don't predict particularly like some friend, right. [00:56:49] And you can go ahead and send them an email with a link in it. And they click the link and installs ransomware, and you get 80% of them. Well, it is happening. It's happening a lot. So what do you do? This is a great little article over on dark reading and you'll see it on the website. The Craig peterson.com. [00:57:14] But this article goes through. What are some of the steps it's by Daniel Clayton? It's actually quite a good little article. He's the VP of global security services and support over at bit defender bit defender is. Great, uh, software that you've got versions of it for the Mac. You've got versions four of it for window. [00:57:37] You might want to check it out, but he's got a nice little list here of things that you want to do. So number one, Don't panic, right? Scott Adams don't panic. So we're worried because we think we're going to lose our job June. Do you know what? By the way is in the top drawer of the majority of chief information, security officers, two things. [00:58:03] Uh, w one is their resignation letter and the second one is their resume because if they are attacked and it's very common and if they get in trouble, they are leaving. And that's pretty common too. Although I have heard of some companies that understand, Hey, listen, you can't be 100% effective. You got to prioritize your money and play. [00:58:31] It really is kind of like going to Vegas and betting on red or black, right? 50, 50 chance. Now, if you're a higher level organization, like our customers that have to meet these highest compliance standards, these federal government regulations and some of the European regulations, even state regulations, well, then we've got to keep you better than 99% safe and knock on wood over the course of 30 years. [00:58:59] That's a long I've been doing. 30 years. We have never had a single customer get a S uh, a. Type of malware, whether it is ransomware or anything else, including one custom company, that's a multinational. We were taking care of one of their divisions and the whole company got infected with ransomware. They had to shut down globally for. [00:59:25] Two weeks while they tried to recover everything, our little corner of the woods, the offices that we were protecting for that division, however, didn't get hit at all. So it is possible, right? I don't want you guys to think, man. There was nothing I can do. So I'm not going to do anything. One of the ladies in one of my mastermind groups basically said that, right? [00:59:49] Cause I was explaining another member of my mastermind group. Got. And I got hit for, I think it turned out to be $35,000 and, you know, that's a bad thing. Plus you feel just so exposed. I've been robbed before, uh, and it's just a terrible, terrible feeling. So he was just kind of freaking out for good. But I explained, okay, so here's what you do. [01:00:15] And she walked away from it thinking, well, there's nothing I can do. Well, there are things you can do. It is not terribly difficult. And listening here, getting my newsletter, going to my bootcamps and the workshops, which are more involved, you can do it. Okay. It can be done. So I don't want. Panic. I don't want you to think that there's zero. [01:00:41] You can do so that's number one. If you do get ransomware, number two, you got to figure out where did this come from? What happened? I would change this order. So I would say don't panic. And then number two is turn off the system that got rants. Turn it off one or more systems. I might've gotten ransomware. [01:01:04] And remember that the ransomware notification does not come up right. When it starts encrypting your data. It doesn't come up once they've stolen your data. It comes up after they have spread through your organization. So smart money would say shut off every computer, every. Not just pull the plug. I w I'm talking about the ethernet cable, right? [01:01:32] Don't just disconnect from wifi. Turn it off. Immediately. Shut it off. Pull the plug. It might be okay. In some cases, the next thing that has to happen is each one of those machines needs to have its disc drive probably removed and examined to see if it has. Any of that ransomware on it. And if it does have the ransomware, it needs to get cleaned up or replaced. [01:01:57] And in most cases we recommend, Hey, good time. Replace all the machines, upgrade everything. Okay. So that's the bottom line. So that's my mind. Number two. Okay. Um, he has isolated and save, which makes sense. You're trying to minimize the blast radius. So he wants you to isolate him. I want you to turn them off because you do not want. [01:02:22] Any ransomware that's on a machine in the process of encrypting your files. You don't want it to keep continuing to encrypting. Okay. So hopefully you've done the right thing. You are following my 3, 2, 1 backup schedule that I taught last year, too, for free. For anybody that attended, hopefully you've already figured out if you're going to pay. [01:02:43] Pay. I got to say some big companies have driven up the price of Bitcoin because they've been buying it as kind of a hedge against getting ransomware so they can just pay it right away. But you got to figure that out. There's no one size fits all for all of this. And at over $11,000 for an individual. [01:03:06] Ransom, uh, this requires some preparation and some thought stick around, got a lot more coming up. Visit me online, Craig Peterson.com and get my newsletter along with all of the free trainings. [01:03:23] Well, the bad guys have done it again. There is yet another way that they are sneaking in some of this ransomware and it has to do with Q R codes. This is actually kind of cool. [01:03:39] By now you must have seen if not used QR codes. [01:03:44] These are these codes that they're generally in a square and the shape of a square and inside there's these various lines and in a QR code, you can encode almost anything. Usually what it is, is a URL. So it's just like typing in a web address into your phone, into your web browser, whatever you might be using. [01:04:07] And they have been very, very handy. I've used them. I've noticed them even showing up now on television ad down in the corner, you can just scan the QR code in order to apply right away to get your gin Sioux knives. Actually, I haven't seen it on that commercial, but, uh, it's a different one. And we talked last week about some of these stores that are putting QR codes in their windows. [01:04:34] So people who are walking by, we even when the store is closed, can order stuff, can get stuff. It's really rather cool. Very nice technology. Uh, so. There is a new technique to get past the email filters. You know, I provide email filters, these big boxes, I mean, huge machines running Cisco software that are tied into, uh, literally billion end points, plus monitoring tens of hundreds of millions of emails a day. [01:05:11] It's just huge. I don't even. I can ha can't get my head around some of those numbers, but it's looking at all those emails. It is cleaning them up. It's looking at every URL that's embedded in an email says, well, is this a bad guy? It'll even go out and check the URL. It will look at the domain. Say how long has this domain been registered? [01:05:34] What is the spam score overall on the domain? As well as the email, it just does a whole lot of stuff. Well, how can it get around a really great tight filter like that? That's a very good question. How can you and the bottom line answer is, uh, how about, uh, using the QR code? So that's what bad guys are doing right now. [01:05:58] They are using a QR code in side email. Yeah. So the emails that have been caught so far by a company called abnormal security have been saying that, uh, you have a missed voicemail, and if you want to pick it up, then scan this QR. It looks pretty legitimate, obviously designed to bypass enterprise, email gateway scans that are really set up to detect malicious links and attachments. [01:06:33] Right? So all of these QR codes that abnormal detected were created the same day they were sent. So it's unlikely that the QR codes, even that they'd been detected would have been previously. Poured it included in any security blacklist. One of the good things for these bad guys about the QR codes is they can easily change the look of the QR code. [01:06:59] So even if the mail gateway software is scanning for pictures and looking for a specific QR codes, basically, they're still getting them. So the good news is the use of the QR codes in these types of phishing emails is still quite rare. We're not seeing a lot of them yet. We are just starting to see them, uh, hyperlinks to phishing sites, a really common with some of these QR codes. [01:07:30] But this is the first time we've seen an actor embed, a functional QR code into an email is not. Now the better business bureau warned of a recent uptick, ticking complaints from consumers about scams involving QR codes, not just an email here, but because these codes can't really be read by the human eye at all. [01:07:53] The attackers are using them to disguise malicious links so that you know, that vendor that I talked about, that retail establishment that's using the QR codes and hoping people walking by will scan it in order to get some of that information. Well, People are going to be more and more wary of scanning QR codes, right? [01:08:15] Isn't that just make a lot of sense, which is why, again, one of the items in our protection stack that we use filters URLs. Now you can get a free. The filter and I cover this in my workshop, how to do it, but if you go to open DNS, check them out, open DNS, they have a free version. If you're a business, they want you to pay, but we have some business related ones to let you have your own site to. [01:08:47] Based on categories and all that sort of stuff, but the free stuff is pretty generalized. They usually have two types, one for family, which blocks the stuff you might think would be blocked. Uh, and other so that if you scan one of these QR codes and you are using open DNS umbrella, one of these others, you're going to be much, much. [01:09:11] Because it will, most of the time be blocked because again, the umbrella is more up-to-date than open DNS is, but they are constantly monitoring these sites and blocking them as they need to a mobile iron, another security company. I conducted a survey of more than 4,400 people last year. And they found that 84% have used a QR code. [01:09:37] So that's a little better than I thought it was. Twenty-five percent of them said that they had run into situations where a QR code did something they did not expect including taking them to a malicious website. And I don't know, are they like scanning QR codes in the, in the men's room or something in this doll? [01:09:56] I don't know. I've never come across a QR code. That was a malicious that I tried to scan, but maybe I'm a little more cautious. 37% were. Saying that they could spot a malicious QR code. Yeah. Yeah. They can read these things while 70% said they'd be able to spot a URL to a phishing or other malicious website that I can believe. [01:10:23] But part of the problem is when you scan a QR code, it usually comes up and it says, Hey, do you want to open this? And most of that link has invisible is, is not visible because it is on your smartphone and it's not a very big screen. So we'll just show you the very first part of it. And the first part of it, it's going to look pretty darn legit. [01:10:46] So again, that's why you need to make sure you're using open DNS or umbrella. Ideally, you've got it installed right at your edge at your router at whoever's handling DHCP for your organization. Uh, in the phishing campaign at normal had detected with using this QR code, uh, code they're saying the attackers had previously compromised, some outlook, email accounts, belonging to some legitimate organizations. [01:11:15] To send the emails with malicious QR codes. And we've talked about that before they use password stuffing, et cetera. And we're covering all of this stuff in the bootcamp and also, well, some of it in the bootcamp and all of this really in the workshops that are coming up. So keep an eye out for that stuff. [01:11:36] Okay. Soup to nuts here. Uh, it's a, uh, it's a real. Every week, I send out an email and I have been including my show notes in those emails, but I found that most people don't do anything with the show notes. So I'm changing, I'm changing things this week. How some of you have gotten the show notes, some of you haven't gotten the show notes, but what I'm going to be doing is I've got my show notes on my website@craigpeterson.com. [01:12:07] So you'll find them right. And you can get the links for everything I talk about right here on this. I also now have training in every one of my weekly emails. It's usually a little list that we started calling listicles and it is training on things you can do. It is. And anybody can do this is not high level stuff for people that are in the cybersecurity business, right. [01:12:39] Home users, small businesses, but you got to get the email first, Craig peterson.com and sign. [01:12:46] California is really in trouble with these new environmental laws. And yet, somehow they found a major exception. They're letting the mine lithium in the great salt and sea out in California. We'll tell you why. [01:13:03] There's an Article in the New York times. And this is fantastic. It's just a incredible it talking about the lithium gold rush. [01:13:14] You already know, I'm sure that China has been playing games with some of these minerals. Some of the ones that we really, really need exotic minerals that are used to make. Batteries that are used to power our cars. And now California is banning all small gasoline engine sales. So the, what is it? 55,000 companies out in California that do lawn maintenance are going down. [01:13:45] To drive those big lawnmowers around running on batteries. They're estimating it'll take 30 packs battery packs a day. Now, remember California is one of these places that is having rolling blackouts because they don't have. Power, right. It's not just China. It's not just Europe where they are literally freezing people. [01:14:09] They did it last winter. They expect to do it more. This winter, since we stopped shipping natural gas and oil, they're freezing people middle of winter, turning off electronics. California, at least they're not too likely to freeze unless they're up in the mountains in California. So they don't have enough power to begin with. [01:14:28] And what are they doing there? They're making it mandatory. I think it was by 2035 that every car sold has to be electric. And now they have just gotten rid of all of the small gasoline engines they've already got. Rolling blackouts, come on. People smarten up. So they said, okay, well here's what we're going to do. [01:14:52] We need lithium in order to make these batteries. Right. You've heard of lithium-ion batteries. They're in everything. Now, have you noticed with lithium batteries, you're supposed to take them to a recycling center and I'm sure all of you do. When your battery's dead in your phone, you take it to a recycling center. [01:15:11] Or if you have a battery that you've been using in your Energizer bunny, and it's a lithium battery, of course you take it to the appropriate authorities to be properly disposed of because it's toxic people. It is toxic. So we have to be careful with this. Well, now we're trying to produce lithium in the United States. [01:15:38] There are different projects in different parts of the country, all the way from Maine through of course, California, in order to try and pull the lithium out of the ground and all. Let me tell you, this is not very green at all. So novel. Peppa Northern Nevada. They've started here blasting and digging out a giant pit in this dormant volcano. [01:16:09] That's going to serve as the first large scale, lithium mine in the United States and more than a decade. Well, that's good. Cause we need it. And do you know about the supply chain problems? Right. You've probably heard about that sort of thing, but that's good. This mine is on least federal lands. What does that mean? [01:16:31] Well, that means if Bernie Sanders becomes president with the flick of a pen, just like Joe Biden did on his first day, he could close those leads to federal lands. Yeah. And, uh, we're back in trouble again, because we have a heavy reliance on foreign sources of lithium, right. So this project's known as lithium Americas. [01:16:56] There are some native American tribes, first nation as they're called in Canada. Uh, ranchers environmental groups that are really worried, because guess what? In order to mine, the lithium, and to do the basic processing onsite that needs to be done, they will be using. Billions of gallons of groundwater. [01:17:20] Now think of Nevada. Think of California. Uh, you don't normally think of massive lakes of fresh water to. No. Uh, how about those people that are opposed to fracking? Most of them are opposed to fracking because we're pumping the water and something, various chemicals into the ground in order to crack the rock, to get the gas out. [01:17:43] Right. That's what we're doing. They don't like that. But yet, somehow. Contaminating the water for 300 years and leaving behind a giant mound of waste. Isn't a problem for these so-called Greenies. Yeah. A blowing up visit quote here from max Wilbert. This is a guy who has been living in a tent on this proposed mine site. [01:18:10] He's got a. Lawsuits that are going, trying to block the project. He says blowing up a mountain. Isn't green, no matter how much marketing spend people put on it, what have I been saying forever? We're crazy. We are insane. I love electric cars. If they are coolest. Heck I would drive one. If I had one, no problem. [01:18:29] I'm not going to bother to go out and buy one, but, uh, yeah, it's very cool, but it is anything but green. Electric cars and renewable energy are not green, renewable energy. The solar and the wind do not stop the need for nuclear plants or oil or gas burners, or cold burners, et cetera. Because when the sun isn't shining, we still need electricity. [01:19:01] Where are we getting to get it? When the wind isn't blowing or when the windmills are broken, which happens

The Wall Street Resource
Spectra7 Microsystems Inc. (SPVNF, SEV.V) Raouf Halim, CEO

The Wall Street Resource

Play Episode Listen Later Dec 6, 2021 20:44


Spectra7 Microsystems Inc. is a high-performance analog semiconductorcompany delivering unprecedented bandwidth, speed and resolution to enabledisruptive industrial design for leading electronics manufacturers in virtualreality, augmented reality, mixed reality, data centers and other connectivitymarkets.

Proactive - Interviews for investors
Spectra7 Microsystems sees a 400% increase in 3Q topline growth year-over-year

Proactive - Interviews for investors

Play Episode Listen Later Oct 6, 2021 8:02


Spectra7 Microsystems CEO Raouf Halim joined Proactive New York to discuss the provider of analog semiconductor products' third quarter financial results. Halim says the San Jose, California-based group expects to report revenue of $1.5 million, compared to $0.3 million in the third quarter of 2020, representing an increase of more than 400% year-over-year. He adds its backlog has reached 'record highs' of $7.2M and the group is expecting to double revenue for the next quarters.

Connecting the Dots
Dr. Marjorie Godfrey speaks about Microsystems in Health Care

Connecting the Dots

Play Episode Listen Later Sep 23, 2021 31:55


Margie is Research Professor in the Department of Nursing and Executive Director and Founder of the Institute for Excellence in Health and Social Systems (IEHSS), in the College of Health and Human Services at the University of New Hampshire. She is a national and international leader of designing and implementing improvement strategies targeting the place where patients, families and care teams meet-the clinical microsystem. Dr. Godfrey began her work in clinical microsystems over 25 years ago and, in 2009, founded The Dartmouth Institute Microsystem Academy (TDIMA) at The Dartmouth Institute for Health Policy and Clinical Practice, Geisel School of Medicine with Dartmouth colleagues, to develop new knowledge and disseminate findings. She was Co-Director of TDIMA with Dr. Tina Foster for 11 years and a Lecturer for nearly 20 years at The Dartmouth Institute for Health Policy and Clinical Practice.   Margie's primary interest is engaging inter-professional health care professionals in learning about and improving local health care delivery systems with a focus on patients, professionals, processes and outcomes. Margie is co-author of the best selling textbooks, Quality by Design (2007), Quality by Design, 2nd Edition (in press) and Value By Design (2011), and the lead author and architect of the "Clinical Microsystems: A Path to Healthcare Excellence" series. Link to claim CME credit: https://www.surveymonkey.com/r/3DXCFW3 (https://www.surveymonkey.com/r/3DXCFW3) CME credit is available for up to 3 years after the stated release date Contact CEOD@bmhcc.org if you have any questions about claiming credit.

Mobile Presence
AdHawk Microsystems Readies To Revolutionize AR/VR With New Eye-Tracking Innovation

Mobile Presence

Play Episode Listen Later Apr 7, 2021 20:55


From healthcare and research to AR and web accessibility, eye-tracking is a powerful component that, until now, has been prohibitively expensive and energy inefficient. The future demands better solutions, and one company has stepped up to the challenge with prototype glasses that unlock the connection between the eyes, the brain, and the world around us. In episode #430, our host Peggy Anne Salz catches up with Neil Sarkar, CEO of AdHawk Microsystems and inventor of Mindlink, the world’s first cameraless eye-tracking system. Will the be a FitBit for our brain? Listen as Neil details the R&D behind this groundbreaking invention and discusses the possibilities for sports, gaming, and a new kind of experience marketing.

Agoracom Small Cap CEO Interviews
David Luxton, Kwesst Microsystems (TSX-V:KWE)

Agoracom Small Cap CEO Interviews

Play Episode Listen Later Mar 17, 2021 22:56


Agoracom interviews CEOs of small cap companies. In this episode of the Small Cap CEO Interviews podcast, AGORACOM speaks with Kwesst Microsystems (TSX-V:KWE) Executive Chairman, David Luxton. If you haven’t heard of KWESST Micro Systems (KWE:TSXV) you’re not alone because the Company just listed for trading a couple of months ago – and it is […]

ceos tsx v luxton microsystems agoracom small cap ceo interviews
Stock Day Media
Pressure BioSciences Discusses Partnerships with Leica Microsystems (Cancer Diagnostics) and Ohio State University (Food Industry Consortium) with The Stock Day Podcast

Stock Day Media

Play Episode Listen Later Mar 15, 2021 17:27


The Stock Day Podcast welcomed back Pressure BioSciences, Inc. (OTCQB: PBIO) (“the Company”), a leader in the development and sale of innovative, broadly enabling, pressure-based instruments, consumables, and specialty testing services for the worldwide life sciences and other industries. President and CEO of the Company, Richard T. Schumacher, joined Stock Day host Everett Jolly, and offered a detailed update of measurable progress the Company has recently made in multiple key areas. 

The Pet Healer
Microsystems - Episode 27

The Pet Healer

Play Episode Listen Later Mar 3, 2021 25:02


On today's episode, we discuss microsystems and how they affect our pets. Hope you enjoy it!

Tech Podcasts Network Show Coverage
The applications of Chirp Microsystems’ ultrasonic range finder @ CES 2021

Tech Podcasts Network Show Coverage

Play Episode Listen Later Feb 26, 2021 11:32


If you are in the hardware design, robotics, automation, or home security industry, you are probably familiar with ultrasonic range finders. These are sensors that can offer a lot to a user. The best part is that many industries can make use of this technology. Chirp Microsystems is right now the only manufacturer of ultrasonic … Continue reading The applications of Chirp Microsystems’ ultrasonic range finder @ CES 2021 → The post The applications of Chirp Microsystems’ ultrasonic range finder @ CES 2021 appeared first on Tech Podcast Network.

The Brand Called You
Dr. Jaijit Bhattacharya, Founder and CEO of Zerone Microsystems Pvt. Ltd

The Brand Called You

Play Episode Listen Later Feb 23, 2021 25:22


Follow us on Facebook - http://facebook.com/followtbcy/ Twitter - http://twitter.com/followtbcy/ Instagram - http://instagram.com/followtbcy/ YouTube - http://youtube.com/followtbcy --- Support this podcast: https://anchor.fm/tbcy/support

LeanDiscovery Applied
Sitting with the C-Suite: Alma Asay, Litera Microsystems

LeanDiscovery Applied

Play Episode Listen Later Feb 3, 2021 52:05


This week, we're joined by Alma Asay, an Evangelist at Litera Microsystems. Alma offers her advice for legal technology entrepreneurs, discusses the future of legal technology, and suggests key questions to ask law firms about technology. Alma  began her career as an associate with Gibson, Dunn & Crutcher, LLP in the litigation department.  She founded Allegory, a cloud-based litigation management platform, in 2012, serving as the CEO from its inception until 2017, when Allegory was acquired by Integreon.  She is now an Evangelist for Litera, having joined the company in 2020.  Litera recently acquired Allegory from Integreon, and has rebranded the platform as Litera Litigate.Alma describes Litera Microsystems is an “enormous legal technology company” that uses its “significant presence in the legal community” to “create products that help attorneys focus on what matters,” including improving workflows and workspaces.If you have any questions, please feel free to email me at leandiscovery@bakerdonelson.com. I would love to hear from you.LeanDiscovery: Sitting with the C-Suite is a series of interviews designed to provide in-house legal counsel with a birds-eye view of the eDiscovery marketplace, particularly its various technology and service providers. A key component of great eDiscovery management and execution is having a great supply chain. Sitting with the C-Suite is a forum to hear directly from the C-Suite of various eDiscovery providers about the marketplace history, current and future service offerings, and expectations of things to come. This is not an advertisement or endorsement of any of the speakers, or the companies, services and technology that they represent, by either the interviewer or Baker Donelson. The views expressed are those of the speaker. Baker Donelson’s eDiscovery team seeks to provide the best client value throughout the eDiscovery life cycle. If you have any companies or speakers that you would like to see featured, please feel free to reach out to us at LeanDiscovery@bakerdonelson.com.

Idea Machines
In the Realm of the Barely Feasible with Arati Prabhakar [Idea Machines #37]

Idea Machines

Play Episode Listen Later Jan 25, 2021 53:36


In this conversation I talk to the Amazing Arati Prabhakar about using Solutions R&D to tackle big societal problems, gaps in the innovation ecosystem, DARPA, and more. Arati’s career has covered almost every corner of the innovation ecosystem - she’s done basically every role at - DARPA she was a program manager, started their Microelectronics Technology Office, and several years later returned to server as its Director. She was also the director of the National Institute of Standards and Technology and was a venture capitalist at US venture partners. Now she’s launching Actuate - a non-profit leveraging the ARPA model to go after some of the biggest problems in American society. Links Actuate Website In the Realm of the Barely Feasible - Arati's Article about Actuate and Solutions R&D Arati on Wikipedia  Transcript [00:00:00] welcome to idea machines. I'm your host and Reinhart. And this podcast is a deep dive into the systems and people that bring innovations from glimmers in someone's eye, all the way to tools, processes, and ideas that can shift paradigms. We see these systems outputs everywhere, but what's inside the black boxes with guests. I dig below the surface into crucial, but often unspoken questions. To explore themes of how we enable innovations today and how we could do it better tomorrow. In this conversation, I talked to the amazing RFE provoca about using solutions R and D tackle, big societal problems, gaps in the innovation ecosystem, DARPA and more. Are these career has covered almost every corner of the innovation ecosystem. She's done almost every job at DARPA where she was a program manager, started their micro electronics technology office. And several years later returned serve as their [00:01:00] director. She was also the director at the national Institute of standards and technology and a venture capitalist at us venture partners. Now she's launching actuate a nonprofit leveraging the ARPA model to go after some of the biggest problems in American society. Hope you enjoy my conversation with Arthur. Provoca.  I'd love to start off and sort of frame this for everybody is with a quote from your article, which, which everybody should read and which I will link to in the show notes. You say yet, we lack a systemic understanding of how to nurture the sort of rich ecosystem we need to confront the societal changes facing us. Now over 75 years, the federal government has dramatically increased supportive research and universities and national labs have built layers of incentives and deep culture for the research role. Companies have honed their ability to develop products in markets, shifting away from doing their own fundamental research in established industries, American venture capital and entrepreneurship have supercharged the startup pathway for commercialization in some [00:02:00] sectors, but we haven't yet put enough energy into understanding the bigger space where policy finance and the market meet to scale component ideas into the kind of deep and wide innovations that can solve big previously intractable problems in society. These sorts of problems, aren't aligned to tangible market opportunities or to the missions of established government R and D organizations today, the philanthropic sector can play a pivotal role by taking the early risk of trying new methods for R and D and developing initial examples that governments and markets can adopt and ramp up the hypothesis behind actuate is that solutions R and D can be a starting place for catalyzing the necessary change in the nation's innovation ecosystem. And so with that, with those, I think I want to test it in a nutshell exactly like that. So can we start with how do you see solutions R and D as being different from other R D and, and sort of coupled with that? How is actuate different from other non-profits. Yeah, I think [00:03:00] that's, that's one of the important threads in this tapestry that we want to develop. So solutions R and D let's see. I think those of us who live in the world of R and D and innovation are very familiar with basic research. That that is about new knowledge, new exploration, but it's designed all the incentives, all the funding and the structures are designed to have that end with publishing papers. And then on the other hand, there's. But the whole machinery that turns an advance into, you know, takes a technological advance or a research advance and turns it into the changes that we want in society that could be new products and services. It could be new policies, it could be new practices and that implementation machinery. The market companies, policymaking, what individuals choose to do pilot practices. I think we understand that. And there are places where the, you know, things just move from basic research over into actual [00:04:00] implementation. But in fact, there are, there are a lot of places where that doesn't happen, seamlessly and solutions, R and D is this weird thing in the middle. That builds on top of a rich foundation of basic research. It has it, its objective is to demonstrate and to prove out completely radically better ways. To solve problems or to pursue different opportunities so that they can be implemented at scale. And so it has this hybrid character that it is at the one on one hand, it's very directed to specific goals. And in that sense, it looks more like. Product development and marching forward and, you know, boom, boom, boom, make things happen, execute drive to drive, drive to an integrated goal. And on the other hand it requires a lot of creativity, experimentation risk-taking. And so it has some of those elements from the research side. So it's this middle [00:05:00] kingdom that I. Love because it has, I think it just has enormous leverage. And I, you know, I, I think a couple of points, number one, it's it requires to do it well, requires its own. Types of expertise and practices and culture that are different from either the research or implementation. And secondly, I would say that it, I think it's overall in the U S in the current us innovation system. I think it's something of a gap. There, there, there, there, there are many, many areas where we're not doing it as well as we need to. And then for some of the new problems, which I hope we'll talk about as well. I think it's actually a very interesting lever to boot the whole system up that we're going to need going forward. Yeah. And so actually just piggybacking right off of that, you've outlined three major sort of problems that you're tackling initially. Climate change sort of health, like general American [00:06:00] health and data privacy. I'm actually really interested in, like, what was the process of deciding, like, these are the things that we're going to work on. Yeah, but this whole actuate emerged from a thought process from a lot of. Bebe's rattling around in the box car in my head in the period as I was wrapping up at DARPA in 2016, at the end of 2016 and going into 2017 when I left and what I was thinking about was how phenomenally good our innovation machinery is. For the problems that we set out to tackle at the end of the second world war, that agenda was national security technology for economic growth. A lot of that was information technology. We set out to tackle health. Instead we did biomedicine. We went long on biomedicine, didn't break their left, left a lot of our serious health problems sitting on the shelf and a big agenda was funding, basic research and, and we've executed on that agenda. That's what we are [00:07:00] very, very, very good at what I couldn't stop thinking about. As I was wrapping up at DARPA is the problems that I think will, you know, many of us feel will determine whether we succeed or fail as a society going forward. So it's not that these challenges, you know, national security or how it's not that those problems have gone away and we should stop. It's just that we have some things that will break us at our. Yeah, arguably, they are in the process of breaking us. If we don't deal with them right now, one is access to opportunity for every person in our society. A second is population health at a cost that doesn't break the economy. Another is being able to trust data and information and the information age in which we now live. And the forest obviously is mitigating climate change. And if you think about it, these, these were not, but these weren't the top of mind issues at the end of the second world war, right? I mean, we had other problems. We didn't really know what to do about. So some of these are all problems that we didn't really know what to do about. Some of these are new problems. And, [00:08:00] and so, you know, now here we are in 2021, if you say what's what really matters those were the four areas that we identified that. Are critical to the success of our society. Number one, number two, we aren't succeeding. And that means we need innovation of all different types. And number three, we, we don't, we're not innovating, you know, we're either innovating at the zero billion dollars a year level, or we are spending money on R and D, but it's not yet turning the tide of the problem and, and that, so that's how we ended up focusing on those areas. Got it. And what could you actually, like, I, I love digging into sort of the nitty gritties of like, what was the process of designing these, these programs? Right. So just to sort of scope this a little bit, these broad areas that I'm talking about, I think of as. But the major societal challenges that we face today, actuate, which is a tiny early stage seed stage [00:09:00] nonprofit organization. Our our aspiration is over time to build portfolios of solutions, R and D programs. In each of these areas. And so very, you know, you, you, you made reference to a couple of the specific programs. One is about being able to access many more data sets to mine, their insights by cross-linking across while rigorously preserving privacy. That's some of the whole set that's one very specific program, but, but think of that as just one program and what will eventually be a much broader portfolio in this area of trusting data and information. So part of what we've been doing as we started actuate in late 2019 was big thinking about our strategy, about the four broad societal challenges that we wanted to work in. And then we've also been doing a lot of work on we've defined a couple of specific programs, but perhaps more importantly for scaling the organization, we've been working through our [00:10:00] art. Our mess, our process and methodology to take, you know, the core idea here of course is our, our founding team has a lot of different experiences, but we met at DARPA and what we our inspiration is really to take what we know from that particular model for solutions R and D. And. Mine, the critical, the essential insights and translate them to these very different societal challenges, not national security, but the ones that actuate is gonna focus on. And, and that, so we've, we've been formulating the four areas, but also thinking through, so how do you get from the question of changing population health outcomes to what are the programs that could be high leverage opportunities to do solutions R and D for that objective? Yeah. And so, so there's, there's sort of like two steps. There's one is like going from like the broad area to a specific program. And then there's another, which is sort of designing the [00:11:00] program itself. And I'm interested in what, what w what do you actually do to design the program? Like what, what is, what does that look like? Yeah. Go ahead. The first two programs that we have built out and defined were developed, were invented and designed by my co-founder Wade Shen he was a DARPA program manager for about five years. That's where we met his areas artificial intelligence and data science. And if you work in that area, you can work on any of the world's problems. And he, he worked on an amazing array of different problem areas as well as. Programs that at darker that drove the AI and data science technology itself forward. So you know, DARPA is a building full at any moment in time full of it. It's got a hundred amazing program managers in it. Wade was one of the really exceptional one people even in that very elite crowd. And so you know, Wade can And this is how he [00:12:00] thinks about the world. As you know, we came together because we share these concerns about these major societal challenges and a passion for bringing this kind of solutions R and D to these problems. And then Wade is the kind of guy who can invent these programs, you know, like he can just go do it. He knows how to think about it. He knows how to go do the research and talk to people and line up a program that could really be very impactful. So we, we weighed spelt these two programs, partly because we wanted to understand what that looked like in these areas. And but you know, that's the, as we go forward, we're going to need a process that engages a community of different people. Because over time, we're going to want to build our cadre of program leaders who will define, and then execute the solutions R and D program. And by definition, they can't all be, you know, they all, they can't all be weighed, right. We need to be able to draw from the talents and insights and the passions. With of people who have all kinds of backgrounds technology backgrounds, deep research backgrounds lived experiences [00:13:00] on these problems. People who have, who really, you know, deeply understand how the systems work that create opportunity or population health or, or take away from those objectives. And so a lot of what we've been doing is figuring out. So that's the question I was, if you want to change the future of health in the U S so that instead of spending twice as much as other developed nations per capita on healthcare, and yet having dozens of other countries that have longer lifespans and lower infant mortality rates, which is just criminal for the world's richest economy, if we want a future where that is radically different, where we don't have a hundred million people who either have diabetes or at risk of diabetes, where we don't have. Can, you know, we don't have a public health system. That's thoroughly incapable of containing and disease. Like COVID-19 unlike many other countries around the world. If we want a different future than you know, That's the landscape. And how do you get from that broad set of what we want to, [00:14:00] what do you do about it? And I think what that process looks like, so it has a top-down part and then a bottoms-up part. So the top-down part is understanding that landscape it's, it's the kind of, you know, it's understanding what, how big the problem is. What is the nature of the problem what's who's doing what I mean, these are big complex systems, right? There are many, many, many different kinds of actors. Actors practices, culture that you have to understand. You have to have some notion of how all of those complex systems components are operating and interacting. And then you can start thinking about where there are gaps or opportunities, but still at a very strategic, broad level. And that's about it for top-down because then of course, the model emulating a lot of the power we found in the way DARPA works is then to flip it, to bottoms up. And so then we go find people who are experts. In some aspect of this, again, they might have deep research expertise, deep knowledge of the specific problems or the way the system works. What you want is people who either [00:15:00] know or are willing to go learn enough about what the boxes, and then be willing to live outside of it and figure out how to recast it in a different way. And And, and then, you know, similar to DARPA, there's a process of nurturing and coaching, but allowing these smart individuals to bubble and brew program concepts from, you know, like a couple of bullets on a chart eventually to a full executable program, you know, a process that I think even for someone who's super good at this take six months or a year. So that's what we're just starting to embark on. Got it. And so that's sort of the beginning of of programs. I'm also interested in sort of like, What you hope to happen at the end of them? Sort of you're, you're in a slightly different position that DARPA, which sort of has a, hopefully a way being customer in the DOD. That's one of the funniest ideas on the planet. I just love it when people say, Oh, [00:16:00] well, It's easy because DARPA has DOD waiting for it. All right, please. Yeah. Let's, let's talk about how, yeah, I, okay. So yeah, let's, let's talk about that. And, and yes. And then what do we do? Right. So at DARPA, I first of all, think about six decades of history at DARPA in. Two halves for across generations of that agency. About half of what it has done is prototype military systems, things that were just crazy, that the services would never have tried by themselves, but were very directed at a specific military platform or capability. The other half has been. Sparking core enabling technologies. And that was out of a recognition that if you build your new military capabilities out of just the same old ingredients, you're only going to get so far and you need some very disruptive core technologies. So what came out of military systems? Iconically, of course, it's stealth aircraft. There's a much, much, much longer list, but that's the [00:17:00] easy one that everyone knows. A lot of people know that story in the national security world. Of course, what came out of core, enabling technologies. Well, arguably the entire field of advanced material science, but also ARPANET and the internet the seeds of artificial intelligence, advanced microelectronics, Microsystems, huge numbers of technological revolutions. So if that's what's going on at DARPA the first thing to point out is that half of it and some of the most transformative. Core technology, things that have come out of DARPA did not transition to the world because DOD went and bought a bunch of it. Right. And so and, and so the transition for most of the core enabling technologies is out to industry to turn into products and services. And, you know, we've seen. We've seen many, many stories and how that works often, what it looks like is a project that darkened funds at a university and or company. And then those individuals beyond DARPA funding go forward, identify markets, raise capital, build businesses, [00:18:00] build product lines, build industries, changed the world. Right? So we, that that's that that's not trivial. In itself. And then, but I think I just want to also be clear that even for the half of DARPA, that's been about building prototype military systems by and large DOD is not excited about someone they'd start. I'll tell you just, just one story. When I came to DARPA, we had just started just before I arrived, we had started a program. A great partner manager had been a Navy officer. I was serving at DARPA and he said, you know, wouldn't it be great if the Navy had an autonomous vessel, a ship that could leave the pier and navigate across open oceans for months at a time without a single sailor onboard, not a remote control vehicle, but one that just had sparse supervisory control, radically different tools for the Navy, if something like that existed. And maybe we can actually do that. And the Navy got when the DARPA was. Trying to do this and the Navy thought, but I observed this. And what they thought was that is a [00:19:00] really bad idea. And they tried to shut it down there. Important element of DARPA is the Navy doesn't actually get to tell their people what to do. And my predecessor appropriately said, I don't know if she said, thank you. But she definitely said, we're just doing this. By the time I got to DARPA, the Navy had gone from outright hostile to merely deeply skeptical, which is pretty important because that's the stage. It was. People will tell you what, you know, all the reasons that they don't believe it. And they say, well, how is it going to meet call rags, which are the rules of the road for navigating, you know, in dense areas. And how's it gonna last that long at sea in that harsh Marine environment, they had the entire long, difficult list of challenges. So then we knew then, you know what you gotta do, right. So fast forward before I left DARPA I got to Christen the first ever self-driving ship. See Hunter that we put in the water. And at that christening ceremony, by that time, we were paired up with the Navy and the Navy was a partner with us for awhile. And I think now is taking the effort [00:20:00] forward. And you know, now we have a working prototype. Now the Navy can say, Oh, let me figure out. Do I want to use it to hunt sea mines? Is it a cheaper, safer way to trail quiet diesel submarines? You know, there's a lot more that has to happen to really figure out how you take this and move it forward. So that's a success story, but I think that stealth is another great example. These things were not only not embraced or asked for, or, or. Welcomed when they weren't delivered from DARPA, they were, you know, they were spat upon often. But it doesn't matter because if it's radically better enough and, and the stars align and you get like, I mean, a lot of things she can't control, but that is how big changes happen. And you have to be able to do those things, even when there isn't a customer standing there waiting for it. I appreciate that. And so, yeah. Do so, so like then let's how does that then translate for you guys for actually, yeah, so I think the way to think [00:21:00] about it for any, any, so look, I mean, anytime you're setting out to make. To spark a radical transformation. You, it's not going to happen unless you really think about the entire system of what it's going to take to, to create the change that you want to see in the world. And so let me just take one really specific example. One of our programs, Dave safes at actuate. But one of these is one of Wade's programs that he's built. The objective there is to use privacy technologies that are emerging, that are currently being used ad hoc to build a new architecture and infrastructure that would allow for multiple data sets to be provided on an encrypted basis. And then what would allow researchers or policymakers, anyone who wants to analyze the data and cross-link among those data sets for the insights that they hold would allow them to do that entire process while rigorously preserving privacy. And that includes. The CR the linking, the cleaning and the [00:22:00] linking, you know, all the sort of, or ugly data science stuff that has to happen before you can actually start seeing the insights. So it's a soup to nuts full system. That's the ambition of that program is to demonstrate something that's that's that's. Robust enough and flexible enough to handle many different kinds of data and data problems. So the future that we want to see is that instead of today, where research is, you know, you ended up doing research or policy in halafu, it's sort of a lamppost problem, right? You do a lot of interesting research with the data you happen to be able to get a hold of, or that you happen to have permission to link to other data, but all the really interesting problems what, what. Happens in K through 12, but that leads to different kinds of life outcomes. How has that to other environmental factors in a kid's neighborhood or the way that, that education and that child is going to end up interacting with the criminal justice system? How, how do all of those things tie to the progress of the [00:23:00] economy and jobs and the things that lift people up and allow them to pursue opportunity? That's you know, to answer those kinds of questions, you need 53 different agencies at state local and federal levels, and you need private company data. And you know, like it's all just it's it exists, but that doesn't mean you actually can get at it and start using it. So we want to see a future where you could answer those kinds of questions. Well, so what's it going to take the piece that the program will do when we're able to get it going is to demonstrate a prototype system that allows for radically different kinds of data owners to put their data together, you know, run some real examples and. And do applications show that are demonstrations of what this new data capability would look like, but that's probably not going to be enough. Right. And so the other things that need to happen you know, my dream is there's a future where there's NIST or other standard for the kinds of. [00:24:00] Procedures and processes that would allow the legal counsel of the firm or the organization that owns the data to say, okay, if we comply with this regulation, if we meet this certification, I can now sign off and know that I'm protecting the data properly, but I can, I can make that decision tomorrow, not in six months or a year, like it usually takes today. And, and, and then over time with, you know, with a lot of different players and. An infrastructure for regulation and certification, you can start to see how you could, you could have the kind of rich data future that, you know, w we all talk about these days, but actually isn't quite happening yet. So, so I think that, I don't know if that's a useful, for example, but what the pic, the general picture is. Think about all the entities, all the actors that are going to have to. To do something to change their minds, take an action. And you may not be, I mean, we're not going to go fund all of that. We're going to fund a piece that would allow them to change their minds. And that's really, our [00:25:00] objective is a prototype and demonstrations that cause them to say, okay, we can, we can now do something in a different way. Do you see encouraging them to change their minds as part of the program in that there's sort of like a very there's there's a spectrum of from just like demonstrating the prototype and then washing your hands of it too. Like. Push like knocking on their doors for years. And I assume it's somewhere in the middle. Yeah. There's a lot of leading horses to water recognizing that you can't make them drink. What I, what I think is really clear for many, many years of experience at DARPA and other places is that if you're not deliberate and thoughtful about. Who those players are, what would cause them to change their minds and then doing the active work to engage them all along the process. For sure. If you don't do those things, the chances are pretty, pretty slim. If you do them, you might have a shot. Right. And [00:26:00] and so I think we're as we're designing programs that actually we're being. Very explicit about that engagement process, which starts by you have a lot of conversations with people who are like, most often, they're like, yeah, sure. You're in fantasy land. If that stuff existed, it'd be awesome. I'm like, that's not the reality. And let me tell you what I really need. So that's at the beginning. And then as a program starts, you know, during the execution of a program, that's really when it starts going from. Just, you know, something that the program leader believes in to something that now is starting to be palpably real potentially. Right. And so you want to bring those. Decision makers whose minds need to be changed, but at least could be investors. They could be entrepreneurs. They could be policymakers. I mean, a whole different sets of who those, those, those adopters need to be the ones that are going to take it to scale. But the places where we can bring them to the table are you know, you continue to call them up and tell them what's going on. But. But you [00:27:00] create demonstrations and updates where you bring them to the technology or you bring the technology to them and you say, look, did you, did, you know, this was possible. Look what we can now do. And, you know, ideally they get dazzled and then they say, Oh yeah, but they hear the next three things. That would be a problem. And that tells you what you need for the next phase. So that's what, that's a parallel track to the three to five years of technical work that's going on in the program. That makes a lot of sense. And in terms of the technical work, do you plan on having it be mostly externalized to the organization? The same way that DARPA does. I would say w there there's a very important piece of intellectual work and management and leadership that happens with the program leader and that individuals tiny little team within actuate, very much like at DARPA. But you know, the vast majority, the overwhelming amount of the funding goes out to the, the companies, the [00:28:00] universities, the nonprofits who are doing the different components of R and D and. Testing and demonstrations and all the people who are doing all of that work. And that's for a couple of reasons. Number one you know, these are three to five year projects programs, and we w w what we want to do is we don't want to hire them all and put them under our roof for that period of time just as a practical matter. But the other really important thing is when the program is over. What you want is, you know, a successful program and w a program starts with a program leader who has this vision. Yeah, they are, they are, you know, they're calling people to try to do this really difficult, new thing, and. At the end of a program, what you want is that entire community that you've been funding and working with that, they get the vision. Not only that they built, they delivered it, right? Like they've actually built this thing and they become the most important [00:29:00] vectors for moving it out into the world and getting it. Actually implemented. So the world starts changing. And so for both of those reasons up front and at the back end I think that's, I think that's one of the powers of the DARPA model is, is tapping these amazing talents wherever they are. Yeah. So something that I've actually wondered about with the DARPA model, that I've never been able to find any good information on is what do you do when you run into a situation where You need, like there there's multiple groups that have been working on different pieces and there's like, is there ever contention over, who's going to take it forward or like, like, how do you, how do you sort of coordinate it so that the outcome is the best for the world where like, which might involve like like squashing someone's ego or something like that. I was like, shocked. I'm shocked. So are you thinking I would say they're somewhat different answers if those junctures happen [00:30:00] during a program versus after a program. So, you know, let's say you have a program that that had different university groups working on dunno some advanced chip for doing machine learning or whatever. And, and, and it, I mean, this just happened. I think that there were multiple very good research results, but then were commercialized in different ways by the performers. So at that point, you know, it's like, great. Let them drive it out. Hopefully they, they. But they may compete with each other. They might go after different market segments, but there, there are multiple shots on goal to commercialize something coming out of a program. And I would characterize that as something that DARPA would not particularly, I certainly wouldn't control, probably doesn't even have much influence. Conversely, if you're in a program at the early stages of a program, a lot of the that's a lot of what the core management Work is for the program manager at DARPA or the program leader as we're calling them at actuate [00:31:00] is, you know, so let's back up. Number one, you're trying to do something that achieves huge impact sad, but true that involves taking risks because all the low-risk things have already been done. And so the, the whole art of this. Business is how do you intelligently take and then manage and drive down and eliminate risks. And one of the, one of the really effective tools in the toolkit for managing risk is a to S to S to plant a number of different seeds. And to deliberately have competitive efforts that might, you know one of our programs at actuate, for example is built on the idea that we have all kinds of research that could be better at real-time incentives to help people make better. To develop healthier habits. So, you know, it, when we get that program going, we're going to deliberately have multiple teams who are working on different kinds of incentives, themes, and then a core [00:32:00] management challenge in a program like that is going to be, you know, you, you may choose to start four, but you, you know, at some point you're, you're going to want to down select and go to two. And what is the right point? When is it. Point where you want to say, you know, I'm going to put more of my eggs in these baskets. And so I think that that's integral to the design and then the, the day to day or week to week management of the program. And I imagine that there might be one more situation where at the look you're actually sort of building a system and you have different groups working on different pieces of like different components in the system. And so. What, what, how do you, how do you manage that at the end? Where it's like, okay, like at the end of the day we, we want the system. Yeah. That's exactly right. Yeah. And I, I let's say maybe just one small point at DARPA. DARPA's running 250 or 300 programs at any moment in time. Right? So full-blown huge agency [00:33:00] relative to the scale that we're starting at zero right now at actuary, but in the DARPA portfolio, you will find programs. You know, the self-driving ship program was a systems development program, Gantt charts, milestones, boom, boom, boom. Right on the very other end of the spectrum might be a very much more research oriented program. That's highly exploratory. There's a new physical phenomenon that looks like it could be interesting down the road, but right now you just want to have vibrant research and people pursuing the question in lots of different ways. So there, there are many, many models. Yeah. Somewhat in the middle is probably where is, is what I would characterize where actuate will start and what we're finding in the kinds of programs that we're exploring is over and over again. Here's the pattern there. Number one, there's a, there's a problem for which we think there's a radically better solution. That's possible. The reason we think it's possible is because not because of one new research result, but because there are a handful of different research areas that are advancing in interesting ways. But they [00:34:00] haven't yet those advances have not yet really been applied to the right problem or critically to your point, integrated together into a system that can actually follow the problem. They're just like threads or hopes. Right? Yeah. And so that becomes, I think this is a classic template. For solutions R and D program at DARPA or an actuate. So a great way to manage those kinds of programs is, should think in terms of different tracks of effort. And the first track is to advance the research itself. So it's applied research where you're, you're building on these, these threads and nuggets, which you're really aiming at the specific new capability that your, that the programs. The program's goal is to demonstrate that, right? So track one is applied research. The second track is building prototypes and that's often that's a different kind of performer. It's someone who can integrate the different pieces and you can, you know, you can imagine a process where every seat. Three or six months, there's a drop from applied research into building prototypes. Right. And so, [00:35:00] especially for software tools, this is like the classic way you would do it. So every three to six months to see what's coming out of applied research, that's baked enough to put it into the prototype. And so that that's. That's becomes a very good way to flow things. That's tracks one and two track three is now you got to figure out if this stuff is doing anything. So then it's, it's testing, evaluation and working, you know, trying to show that it works for the application or applications that you're going after. And while there are different tracks, they interact, right? Because as you're learning what works and as you take the integrated prototype, so an integrated prototype for. But tool to help individuals choose healthier habits throughout their days and their weeks. So it's going to integrate a whole host of these different advances that are coming from different areas of a lie, including incentives, as I mentioned before, but, you know, ideally every six months or so as the prototype strop to testing, you start getting real feedback about this, this combination of. [00:36:00] Sensing and coaching and personalized incentive. Is it working or is it not working? Right. And then, then you go through these iteration loops. So I think that's So, yeah, I mean, I think what, what, so what the program looks like when it's underway is you'll see some researchers, universities, or companies you'll see prototype developers, typically more companies there you'll see people who do the tests or the demonstrations. It could be a clinical trial. If it's health-related it could be, I mean, it could be whatever, whatever the form of the prototype or the application is. And then throughout the whole thing, and the management challenge is. You know, you have a plan and then reality is going to happen. It's going to be something different. So how do you keep that whole engine moving forward? That is, that is an amazing description. I really appreciate you going into those details. Cause I think that that's something that. People don't think about it enough is, is sort of like how, how to manage those tracks. I want to actually go back to something that you said earlier, which is that the people that you want sort of as [00:37:00] performers in the program are the people who can see where the boxes and then, and think about, think outside of it. And do you have any, any strategies for finding those people and, and sort of teasing that out of them? Yeah, I, I think I said it more in the context of program leaders. And then, and, you know, by the way, at DARPA, one of the best ways to go find great new program managers or potentially great new program managers. Cause you don't really know until you give them a shot. Is to find, go through the performer base. Right? And there, there, there at DARPA I found there were always, there were always performers who were very, very good at their piece of it and they loved their piece of it. And you have to have those people, but then once in a while, you'd see a performer who started seeing the whole picture and they could help the, you know, they would start being creative about like, we could go here. And when you start seeing that, those are the, those are the signs. So I have a set of. Criteria that I thought about in terms of [00:38:00] DARPA program managers. And it's very similar for Dar for, for actually future program leaders. Number one, it's people who are driven to make a change in the world which like, I mean, this is where I live and breathe, but it. Over time. It has finally dawned on me that not everyone gets out of bed in the morning to make the future a better place. All right. Like that's just like what the culture and the whole point of the exercises. They have to find people who are driven to do that. I'm always looking for domain expertise because you need to be deeply rooted and deeply smart about something that's relevant to the problem it's going to work on almost by definition. You won't be a domain expert on everything that it takes, because these are big systems complex. Thanks. So the next thing I'm always looking for is the ability to understand the whole, the big picture of the system, and then to navigate seamlessly, you know, from, from forest to trees, to bark, to cells, right. And then back up and you have to be able to do that whole thing. And that means you may know a little, a lot [00:39:00] about how you know how some aspect of behavioral science works in a very specific context, but you also, I'm also looking for people who can then extrapolate up to how might that and other advances to be harnessed, to, to move the world forward. Right. And that that's that's I would tell you that's one of the harvest characteristics to find, cause of course. W w you know, there are lots of people who have domain expertise, but that ability to navigate from systems to details is, is actually a very precious commodity that I always love when I find I'm looking for people who, the overall thing I'm looking for is people who have, you know, head in the clouds feet on the ground, because you need to be able to dream, but you actually have to be able to go execute. And in this case, execute by managing other people on projects. Yeah. You know, it's not an individual contributor role. And then the final thing that matters deeply is an ethical core, just because you know, that that's important for how you treat people on [00:40:00] a day-to-day basis. But it's also important because we're talking about really powerful technologies and someone who we need people who are willing to be explicit and thoughtful about the ethical considerations that they'll be weighing in. Yeah. That that's great. I want to change gears just a little bit and sort of talk and talk about money for a little bit. So, so, so you spent many years in venture capital, and so I assume you, you know, the, the, sort of both the upsides and the downsides of, of startups and for capital organizations and you decided to, to start as a nonprofit. And so, so I'd love to sort of understand the thought process behind that because I definitely, I, there, there's sort of a line of thinking that. You know, it's like, if it, like, if it can be done, it should be done as a company, as a, like a startup. And so I'm interested in why you, so I would say that [00:41:00] simple minded and, and to the extent you think that's, if that's your worldview, I would say the things I think need to be done, that I can make a contribution to cannot aren't companies. They're not there. There's not a visible market. And so it's not, it's not a company today. Some of the things we want to work on will part of getting them out to the world will involve markets and therefore companies, including startups, but you know, coming back to these major societal challenges that we have none of them are simply going to be solved. By companies, building new products, services, and profits. And I do think that some of the solutions will ultimately will include companies having really interesting new market opportunities. But it, you know, this is the stuff that the market doesn't do and, and. But, you know, th the, so if you think about us, R and D we spend about half a trillion dollars a year in the U S economy on research and development. [00:42:00] The majority of that of course, is companies doing product development and but about a hundred, I think it's about 140 billion a year that's that's federally funded, R and D and and, and the, the. But areas in which actually is focusing are places where they are not market driven opportunities and, and they are not, I think they are not yet the places where we have the federal R and D machinery and yeah. But so those things need to happen for our ultimate dreams to come true. Right. Is to make the difference that we want more. And, and ideally it seems like you, you'd almost sort of like pull both of those both of those leavers, like towards a certain direction, right? Like that's, that seems like a, a place that you could sit getting opportunities for them. Right. I think that's the biggest pull as you show them something that, that changes their minds. Yeah. And are you funding the organization as like actually as an organization, as a whole? Or are you funding [00:43:00] each sort of program? Like, are you funding it as a program by program basis? We're still at a seed stage just to be really clear, but we spent a lot of time on this strategic question about whether first of all, let's be really clear that what we're trying, we think philanthropy has an important role to play because of the fact that market and government are not. For various reasons, stepping up to the plate on these topics that said that what we're trying to do in the social sector is there isn't a template for it. It's not what philanthropy has, has done at least in the last, you know, Six or eight decades. Very interesting stories about Rockefeller foundation and the green revolution and how they, how they funded the research. But, you know, if you go back and read how they thought about it in the methodologies that they developed, it looks a lot like solutions, R and D and then those. Actually those human beings, those exact people went into whenever bushes organizations on during the second war. And, and [00:44:00] I mean, that's the template for solutions R and D is right. We have an existential crisis and we have things we can do about it. And it's all hands on deck and integrating everything. And. Building radar on the bomb. Right? So, so anyway, so, but it's been decades since part of philanthropy, I would say, was really seriously focused on this kind of solutions, R and D. So with that, that is the significant caveat. So everything we're doing is going to be a big experiment in the social sector question you're to get now to get to your question. That we spend a lot of time thinking about whether we should try to build a program, build a program, go raise money for it. Or if we should try to do something that's even harder, which is to raise a fund, to do multiple programs and build a portfolio we've settled on the ladder. And the reason for that is simply that, first of all, I think, you know, sometimes doing an impossible thing. It's better to do the more impossible thing that actually. Can make an impact. I think this comes back to risk management and we talked about risk management within [00:45:00] a program, but a lot of, you know, how to start have one or two things, every single decade that literally is changing the world. Well, it certainly isn't because all the programs succeed, it is because you have a portfolio. And because it's a very deliberately managed diversified portfolio, it's diverse in. Aspects of national security it's that it's targeting, it's diverse in the technological levers that it's pursuing, it's diverse and timeframes to impact. And so at the end of the day, we concluded that for actually to make a dent on any of these met massive societal challenges that we needed to be able to build portfolio. Yeah, no, that makes a lot of sense. And so teaching to do tracks again and just talk to you a little bit about, about the Pat, like your, your, your, your career, which has included some like amazing things. Like when, when you became the DARPA director, like how, [00:46:00] how did. You know what to do? Like did they, I'm sorry, this is a silly question, but as you say, it seems like such a big role. Yeah. I've been super lucky in the things that I got to do. But I th the luckiest day, I would say in my professional life was the day that Dick Reynolds, who ran the defense sciences office at DARPA in the 1980s. He said to me at a workshop of there that I happened to be attending. He asked if I wanted to come to Darko as a program manager, and I was 27. I had been out of graduate school for. A year. Oh, maybe I was 26 at the time. Anyway, I had only been out of graduate school for about a year. And I was in Washington on a congressional fellowship at that time because I had decided I wanted to do something other than research on the academic track, but I didn't know what that was. It's like on a [00:47:00] Lark, I went to Washington for a year, which was critical because even when you leave the trot, you know, th the, the path you are supposed to be on, that's when you don't know what's going to happen. But one of the things that can happen as amazing new possibilities occur. And that's what happened when Dick asked if I wanted to come to DARPA. So at a very early stage of my career, I landed at DARPA and it was the first place I had ever been. I mean, I had worked. Two summers at bell labs who put me through graduate school. I'd worked at Lawrence Livermore one summer as a summer student. I'd worked at Texas tech and the laser lab as an undergraduate. I'd done this graduate work at Caltech and then I'd been on at the office of technology assessment. And the honest congressional fellowship I got to DARPA and all of a sudden, it just made sense to me, right? Like everything that I thought and believed in the way I was culturally oriented, which was you go find really hard problems. And then the contribution we get to make as technologists is we get to come up with a better way to solve a really hard problem. And we get to [00:48:00] blow open these doors to new opportunities. I just, it just resonated so deeply. So I spent seven years at DARPA the last couple of years, which we're starting with micro at that time, it was the micro electronics technology office, which we spun out of the rail defense sciences office at that time. And I, I, you know, I loved it. It was, it was a crazy ride. Right. I got to do all kinds of things that were very, very meaningful then. And that, you know, for the 30 years, since then, it's been just. Such a delight to see so many things, but have come into the world that trace back to some of the early investments that we got to make. And I would tell you that while I loved it, everything else I got to do after DARPA and I treasure it and I needed those experiences, I never really got over being at DARPA. It was just like, it was my home. It was my place. It was what made sense to me. And So when I got the call in 2012 to go back and lead it I, you know, it was just a dream come true. And [00:49:00] when I got there, it was, you know, being a program manager and then being an office director at DARPA, which I had done in the eighties and nineties, and then going back as director, those are three very different jobs, but so there was a huge amount of learning and growth in every stage. But they are all. Lined up to this mission and vision of an organization. That's just like, I'm wired the way that DARPA is wired. So, so I, I have to say it's, it was the most satisfying job that I've had so far, I'm trying to make actually even more. It was very hard. It was very meaningful, but I have to tell you, it just felt natural. It felt instinctive and natural in a way that none of my other jobs really did. I have to say, I mean, you know, And they were all. Okay. And I think there are other jobs. I think I was good at their other jobs. I was horrible at that matter, but DARPA was the place where it just sort of, it just felt natural to me. Yeah. And, and so sort of to provide on that and, and in closing do you [00:50:00] think that there are any ways to improve on the DARPA model that you're trying to implement going forward? So we talk about this all the time. I mean, I think for small, if the work that we're starting an actuator can have anything like the kind of impact that DARPA has had in, and, and, you know, any subset of its programs Then I can die happy, right? Like if we can really make a contribution to these big societal problems, that's, that's, that's going to make, that's just going to be deeply meaningful to me. We've talked about some of the things that I think are difficult in the DARPA model. One of them is about the more radical the innovation and advanced the harder typically is to get anyone to. Change the way that they work in order to adopt it and get the benefits of it. So I think being we're, we're trying to be even more deliberate about how would you get decision makers to change their minds and implement in the design of our programs have actually, I mean, I think DARPA does that, but that's something we're trying to put [00:51:00] special focus on. I think DARPA's done a huge amount of work to make it easier to, they have legislative authorities and good practices about being able to hire people who. Many of them normally wouldn't consider public service for many reasons, but especially of course, low compensation levels. And while dark was not fully market competitive, we w we were able to move very quickly and had a little bit of a salary cap relief. So, you know, the nonprofit sector is not going to be the place that you make your billions obviously. But I think being outside of government has that advantage and something that we'll, we'll definitely take advantage of. And they're, you know, they're things that are simply not appropriate for the government in a market economy. To do. And so there, there are things that you can do for national security, but that, that unless we have a radical change in our thoughts about industrial policy, which by the way might be happening, I can't quite tell, but there are ways in which government has not [00:52:00] chosen in the past to work with industry or with finance that I think are less, you know, those are not as significant on a limitation for the work we're doing in the social sector. Nice. Excellent. Well, I want to be really respectful of your time. How can, how can people find out more about what you're doing? And like if they, if they think this is interesting, like what, what should they do to, to help out. Well, thanks so much for talking about this. I love the fact that you, that you care about these issues and you've done more than anyone I've seen from outside DARPA to really understand the agency. So that it's been so much fun talking with you, Ben, about that. I think you're going to provide the link to the issues in science and technology. And our website courses, if it's all brand new. So take a look and you know, we're so early right now, but I'm, I'm always looking for people who have a deep passion for these societal challenges who see new opportunities to do things that are radically better way. [00:53:00] And please reach out to us from our website. If you, if, if it resonates, we'd love to hear from you. Thanks for listening. We're always looking to improve. So we'd love feedback and suggestions. You can get in touch on Twitter at Ben underscore Reinhardt. If you found this podcast intriguing, don't forget to share and discuss it with your friends. Thank you.

The Innovation Community Podcast
TIC Podcast #96 Anthony Garetto - Senior Director of Digital Transformation at Leica Microsystems

The Innovation Community Podcast

Play Episode Listen Later Dec 11, 2020 30:40


Anthony Garetto is the Senior Director Digital Transformation at Leica Microsystems. A digital leader by trade, Anthony drives the overall business transformation effort for Leica Microsystems.

MercuryNOW
Changing the RF and Spectrum Processing Industry

MercuryNOW

Play Episode Listen Later Sep 22, 2020 11:29 Transcription Available


Almost one year after Mercury’s strategic investment in custom microelectronics capabilities, the first in a family of trusted, secure system-in-package products has been announced. The RFS1080 RF SiP brings onshore, trusted 2.5D capabilities to the A&D industry, greatly impacting the speed and success of radar and electronic warfare (EW) processing. Listen as Tom Smelker, VP and general manager, Microsystems, discusses Mercury’s collaboration with semiconductor partners to bring the latest leading-edge silicon to the defense community, customizable for specific applications.

Radio Cade
The Video Revolution

Radio Cade

Play Episode Listen Later Jul 29, 2020


In 1999, Chris Malachowsky was on the team at NVIDIA that invented the Graphics Processing Unit, an invention that transformed the consumer electronics industry. The GPU is now used by video games and virtually all social media platforms. The son of a doctor, Chris started out as pre-med but switched to engineering and got hired by Hewlett Packard. “I never felt we were at risk,” Chris says of his early start-up days. But he cautions early entrepreneurs, “don’t do it for the money or the glory. It’s too hard.” (Mild profanity) *This episode was originally released on November 20, 2019.* TRANSCRIPT: Intro (00:01): Inventors and their inventions, welcome to Radio Cade the podcast from the Cade Museum for Creativity and Invention in Gainesville, Florida. The museum is named after James Robert Cade, who invented Gatorade in 1965. My name is Richard Miles. We’ll introduce you to inventors and the things that motivate them, we’ll learn about their personal stories, how their inventions work and how their ideas get from the laboratory to the marketplace. James Di Virgilio (00:39): For Radio Cade, I’m James Di Virgilio. Our guest today is a 2019 Florida Inventors Hall of Fame, inductee, University of Florida alumnus, and co founder of NVIDIA. His name is Chris Malachowsky. Chris went on to found a fortune 1000 company that invented the Graphics Processing Unit, which for me was a large part of my life and had a big introduction to video games. But that unit did much larger things than that. It’s now used by Facebook, Twitter, Google, super computers, a whole host of other things. And in fact, Chris and his cofounders transformed the visual computing industry by creating a consumer oriented 3D graphics market. Chris, thank you so much for joining us today. I’m looking forward to hearing about your story. As we spoke off air, your story is like so many other inventors and entrepreneurs stories and that it does not move in a straight predictable line. Tell us how your story began. Chris Malachowsky (01:34): Well, I was a kid about to get in trouble in New Jersey and, uh, wanted to graduate early, before I succumb to the wildly ways with my friends and knew I wanted to get out of New Jersey. It was middle of winter it’s slushy, it’s cold, it’s dreary. And my father was a physician. My parents and their friends all assumed I was to be a doctor. I like carpentry and cabinet making and, and thought that was the path I wanted, but didn’t really think I needed to make up my mind. So what I did decide was warm and green was the criteria for school. If they had a medical school and a building construction school, I could decide later, let me just get on with my life, get out of New Jersey. And so I applied to Tulane, they had a really pretty lawn and sunny scene on the cover of their catalog thought that was attractive. They had a medical school on a building construction school done, I flied, and got in. My parents were a little gas that I wasn’t giving myself more options and that maybe I should at least see the school. So my older brother was given my parents’ car and him and I drove off to Tulane. And after being there for a couple of days, I really didn’t think that was going to work out for me. I was going to get myself in some serious trouble in the French Quarter. So on the way home I was dismayed because I did not give myself any options. I stopped, to see a cousin who was going to University of Florida. I spent a couple of days there and really did like it. And it also had the same characteristics of building construction school and a medical school. And I decided this is cool. So I picked up an application and on the way, driving home to New Jersey, I filled it out, mailed it in, got in. And I guess the rest is history that brought me to that Florida. James Di Virgilio (03:07): Now tell me about your experience in college and then how your life became what it became, because I’m going to love, I know before I even hear what you’re going to say, how life is so much more unplanned than we ever think. And I’m looking forward to hearing how those dots connect. Chris Malachowsky (03:22): Yeah. So at Florida, you didn’t really have to declare a major. So I started off doing all the normal general ed stuff with an idea that I was premed. And I remember going to see the premed advisor who was very clear. And I went with one of my roommates. This is maybe as a sophomore and the guy looks me square in the eye and says, so who have you helped lately? I said excuse me, it’s just, you want to be a doctor? I mean, come on, everybody wants to be a doctor, a lawyer what’s this about? He says, don’t even tell me your father was a doctor or a lawyer. And the other kid’s father was a lawyer. My father was a doctor. He says, you know, what discipline are you going to choose? And I said, well, I was thinking of engineering. And my roommate said, you’re not gonna make that. I mean, you just might as well go home. We walked out of that advisor’s office and I’m like crying. My roommate’s like he’s talking about me. And it turned out, it was really just a challenge. And fast forward, three years later, whatever I’m graduating, I’m getting ready to graduate. I’m going to take the medical school entrance exam, which was in like May and graduations like June or maybe was April, May something along those lines. And you’re supposed to study very hard and be very rested because after the morning sessions, that all day thing after the morning session, your grade is supposed to drop considerably in the second half. You’re exhausted. You’re tired. So I remember going to the Shands teaching hospital in Gainesville and I take the first part of the test and I’d stayed over one of the quarter breaks to study. And I had a lot to remember, cause I had electrical engineering as the way I was getting into a medical school. You had to pick something. And I got an A in that section of physics, it sounded like, why not? Didn’t really have any love for it, but apparently I was good at it. So I’m laying on the picnic table in the Florida sun, trying to relax between the morning session and the afternoon session. And I started thinking of my father the obstetrician who would work for five days straight, come home for an hour. Somebody would go into labor, he’d leave. And I’m thinking, is that really what I want for my, I never even thought about it. It was, doctor was just a thing you hero is like, if I finished this test, I actually might have to be one. And I was thinking, no, I think I’d rather figure out what all the engineering stuff was about. I’ve been introduced to computers and electronics, and I only took introduction to cause everything else was chemistries and things aimed at biology and stuff for the medical school. So I thought, no, I actually want to learn more about that. So I changed my mind, took the rest of the test. I thought it was easy. There was no pressure. It didn’t matter anymore. It didn’t count. I remember buying a six pack and driving home to the house we were living in and I called my parents and I said, mom, dad, I got good news and bad news. Well, what’s the good news son. Well, I thought the test was actually really easy. It was made out to be much harder than I actually experienced. That’s what I think I probably did pretty well. Well, what’s the news. Well, I don’t want to be a doctor anymore. And my mother without hesitation about half a second. Good. You never read directions anyway. We thought you were doing it just for your father. I said, well, okay then. So I ended up abandoning my medical school hopes or plans got a job with Hewlett Packard in a manufacturing role. Actually, I don’t even remember the role yet, but I went off to California to Hewlett Packard. I’d been transferred twice. What I ended up in was a manufacturing role. I don’t even remember what it was I accepted. And it turned out for a kid that had only introduction to, as a background. It gave me a chance to sort of figure out what engineering was about and to learn why things work and how you make more than one of something, which turns out to be a very valuable thing for an engineer, not just make the one offs, but build a product that could be produced reliably and tested and repaired and to solve somebody’s problem. So that manufacturing background, I excelled at it and did well and got invited to join the R&D lab at Hewlett Packard and worked on microprocessor design. And I leveraged that into well, as that was coming into a close talking about serendipity. In the meantime I had married my wife who was from Gainesville and we were living in California. We didn’t have any kids yet. While I was at Hewlett Packard, I got my masters at a local college there and we thought, well, maybe it’s time to move before we have kids and get settled down. I went and interviewed at HP labs in Bristol England and was thinking about moving there. And I didn’t want to be paid as a British citizen. I wanted to be paid as an American abroad. The only one at that lab being paid like that was the division manager. So they weren’t really interested in, in my negotiating a better package. And so then we thought, well, maybe we’ll move to North Carolina. My wife was from Florida, North Florida. I was from central Jersey, coastal New Jersey and Raleigh and North Carolina tech belt. There was halfway between maybe that’s what we should do. And looking at doing that. I practiced interviewing at a local company, which turned out to be sun Microsystems and they had an interest in building some computer graphics. And I realized one being in North Carolina, wasn’t going to help me. It was still a six hour drive to New Jersey or six hour drive to Florida. And it was a six hour flight from California. So in six hours I was going to get home, whichever home we wanted to go to. So I ended up joining sun to work on computer graphics with a gentleman Curtis Curtis. And I did that for six and a half years. We ended up building a graphics accelerator at graphics chips that accelerated the graphics of the sun workstation, which was aimed at professional users and people in the industry happened to be the first windowing system and windows three, one came out from Microsoft and created a consumer window in the system. So I was getting some experience with that. So at sun we learned, I learned the trade of computer graphics. Curtis was the graphics architect. I was the principle chip designer and we made use of a local firm in California that did our CIF manufacturing. And I met the third founder of NVIDIA. So Curtis and I, and this gentleman from a company called LSI logic, decided that we could take what we knew about this professional workstation and apply it to the consumer space because three D graphics was such a compelling medium for telling stories, for communicating, obviously for games, but there really wasn’t much gaming at the time, the Wolfenstein and the like were early games, but they didn’t make use of any acceleration. They just used the programers skill to get the most out of just a generic PC. We came in with a product aim to provide a level of acceleration that will allow the game writer to target something much more powerful. And we brought this workstation technology and style of acceleration to the consumer PC. And it was a great idea. Problem was that we didn’t sell to the game writers. We had to sell to Dell. We had to sell to micron and gateway and, and these other PC manufacturers. So why we created some really great technology. It was a really pretty shitty product and it didn’t help our customer win in their business. And before we ran out of money, we made that recognition and decided, what are we in business for it to succeed or to create cool technology? And we decided, no, we actually wanted to create something. So we went back modified what we did to be in line with how a Dell or micron would win. They had to win PC magazine editor’s choice award. And that means you had to be the facet. You had to be the best at whatever PC mag measured. We could do 3D graphics, but we couldn’t do it at the expense of what they measured, which was 2D graphics. So we ended up building world’s fastest, 2D graphics with 3D and that launched us out of the doldrums and started our ascension to a real company. And these days I know I’m proud to say, I think we’re one of the most important technology companies in the world we’re powering devices from your cell phone and laptops to the world’s fastest, super computers. And we’re at the heart of AI and autonomous vehicles. And it’s been quite a ride. James Di Virgilio (10:39): That’s an amazing thing. I think what’s really unique about your story is it sounds like if I would have asked your 21 year old self, would you see yourself as an entrepreneur or an inventor or even the word creative, maybe those were three things that you probably would not have applied to yourself. Chris Malachowsky (10:55): No, and it’s, it’s kind of funny off the three founders of NVIDIA. Two of them had an aspiration to start something. I actually didn’t. But when the opportunity came, I felt like I had nothing to lose. Yeah. We went without salaries for, you know, six months. But, uh, it was a well paid well-respected engineer. And if it didn’t work out, I’d go get another job. We were in an environment where experienced talented engineers or were hireable. I never felt we were real risk. So for me it was like, well, why not? I should want this. Let me give it a try. And it ended up working out quite well. I’m glad I took the leap. James Di Virgilio (11:25): Yeah. And it’s great to hear you also echo something that I’ve heard countless other entrepreneurs say, which is, you’ll almost never hear someone say that risk was too great. I was worried or I was afraid. It’s something along the lines of what you just mentioned. I looked at the opportunity and I thought, well, whatever happens, this will work out. I’ll find a way to make something of it. Chris Malachowsky (11:41): I wasn’t worried my family wasn’t going to eat or the kids weren’t going to get shoes next week. But it seemed like something worth trying. I would say this to somebody contemplating, don’t do it for the money. Don’t do it for the glory. Don’t do it for the headlines. The press do it because it’s a passion because it’s too hard. It’s too consuming. It’s too all encompassing to make it work. You can imagine the way you said you’ll be tested. The ways you’ll be pulled and yanked. And the likelihood is it doesn’t work out. I mean, you just got to acknowledge that upfront and not be disappointed, but not let that deter you. If it’s something that’s important to you. And if it’s something that accomplishing will be satisfying in whatever way, then I think it’s worth doing and you’ve got to go into it. Head on. James Di Virgilio (12:20): Yeah. I think that’s really solid. And you echo another common theme. That’s there is. If you really believe in what you’re doing, if you’re creating something, if you’re crafting something, the failures are learning points and opportunities versus crushing blows. If success is your goal, failure then becomes this measuring stick. That you’re further from it. When you’re building something, it’s just, okay, now we know that’s not great. And in your story, you actually have that exactly moment. Chris Malachowsky (12:44): I can tell you every major juncture of improvement, profitability, stock, price, market share all was on the heels of some disastrous failure, easy to hang your head in shame and walk away from. And I’m proud of the folks that we have at NVIDIA. I mean, adversity brings out the best of people. If they’re the right people and you just say, Hey, what can we learn from here? How can we be better? How can we make this? Never reflect us again, and each one of them has been a big learning curve. And a matter of fact, when we introduced our first product, the one I described as good technology, but a shitty product. There were something like 35 companies competing with us because we would sell to a board manufacturer and they came and told us they selected us over 35 others. We ended up doing a corporate partnership, but it probably costs us $15 million to develop that first product. And it went into a non-market and if everybody else did this, there was a half a billion dollars being spent to keep us from succeeding in a non-market. And the reality is if we hadn’t failed because we were the first ones out the gate, we hadn’t failed. We had the advantage of being brought into and saying, we can’t buy your product because it doesn’t help us win. You can’t buy your product because it’s not the best at this. We had the wherewithal to say, Oh, well, we built the wrong product. We were full of ourselves looking to their customer that doesn’t help them. And so almost going out of business and internalizing the lessons, made us a better company. And each one of the junctures along our path to here 25 years later is based on some failure that the right people with the right mindset found a way to leverage into strength. James Di Virgilio (14:12): And when the idea is bigger than our pride than our current knowledge, so that you can make those pivots that you have done. And that’s such an essential, obviously I can tell a piece, not only in your professional life, but I can tell in your personal life that that’s something that you hang your hat on. And I think that’s a truism for not only the most successful creators and innovators, but also people to recognize that, Hey, I don’t know everything. And when something hits the wall here, I can adjust and learn and change, or I can just keep pushing ignorantly into something that’s not going to. Chris Malachowsky (14:40): It’s also, there’s another lesson here. Surround yourself with the smartest people, be the dumbest one in the room. That’ll help you. They may not be this comfortable because your ego isn’t being stroked and not everybody’s looking to you for every answer, but that makes you more adept and more nimble. And when the pieces fall to the right collection of people, we’ll find a way to reassemble them into something better. You’re not a lone wolf. Cog in the wheel, you got to build the right wheel. James Di Virgilio (15:04): He is Chris Malachowsky co founder of NVIDIA and a 2019 inductee into the Florida inventors hall of fame. Chris, thank you so much for joining us today. I certainly hope this is part one of a part, two series of conversations between you and I for Radio Cade. I’m, James Di Virgilio. Outro (15:22): Radio Cade would like to thank the following people for their help and support Liz Gist of the Cade Museum for coordinating inventor interviews. Bob McPeak of Heartwood Soundstage in downtown Gainesville, Florida for recording, editing and production of the podcast and music theme. Tracy Collins for the composition and performance of the Radio Cade theme song, featuring violinist Jacob Lawson and special thanks to the Cade Museum for Creativity and Invention located in Gainesville, Florida.

Legal Tech StartUp Focus Podcast
Ep 012. Interview with Tunji Williams, Director of Strategy for Transaction Management at Litera Microsystems

Legal Tech StartUp Focus Podcast

Play Episode Listen Later Mar 30, 2020 34:22


Episode 12 of the Legal Tech StartUp Focus Podcast - An Interview with Tunji Williams, Director of Strategy for Transaction Management at Litera Microsystems In this episode of the Legal Tech StartUp Focus Podcast, Charlie Uniman, your podcast host (www.legaltechstartupfocus.com/podcast), talks with Tunji Williams of Litera Microsystems (www.litera.com). Charlie and Tunji kick off the podcast by talking about how Tunji moved from corporate practice at a large law firm to founding dealWIP, a legal tech startup that aimed at becoming a "deal workflow information platform." While at dealWIP, Tunji and his co-founders participated in two prominent legal tech accelerator programs, one managed by LexisNexis and the other managed by the UK law firm, Mishcon de Reya. Charlie and Tunji dive into what accelerator programs can offer legal tech startups (discussing, in particular, what Tunji learned from his participation) and how important it is for a startup to evaluate such programs from a timing standpoint (what is the right time for a startup to join an accelerator?) and from the standpoint of matching an accelerator's features with a particular startup's needs. Tunji next discusses just how much progress legal tech startups have made over the last five years in marketing and selling to the "right" stakeholder decision-makers at law firms and legal department customers. This discussion leads Tunji to describe his current role at Litera, which involves assisting customers in deriving value from Litera's deal management apps so as to encourage better customer engagement with those apps. Tunji goes on to describe the commercial and educational significance of bringing Litera's suite of tools to law schools and law students. Charlie and Tunji conclude by covering (i) what Tunji learned from the demise of dealWIP, (ii) his transition from his founder's role at dealWIP to his role as a member of Litera's team, (iii) how he, along with with others at Litera, devotes time to sketching out what deal management tech will look like decades from now and how doing so informs his day-to-day work and (iv) the importance for Tunji of being dedicated to (and, dare it be said, even in love with) his company's mission and the benefits that executing that mission can bring to Litera's customers.  

LawNext
Episode 68: Litera CEO Avaneesh Marwaha on Growth During A Crisis

LawNext

Play Episode Listen Later Mar 30, 2020 42:05


Even as the COVID-19 pandemic scrambled any sense of business as usual last week, the document-automation company Litera seemed to stay a step ahead, becoming one of the first major legal technology companies to take steps to continue operations, quickly pivoting to develop a lite version of its deal-management platform to offer for free, and completing the notable acquisition of Best Authority.  Litera has been a company on the move since 2016, when a $100 million investment from K1 Investment Management led to the combination of four document-technology companies – Litera, Microsystems, XRef and The Sackett Group – into a single business. After K1 sold the company to Hg Capital Trust last year, two more major acquisitions followed, of U.K. company Workshare in July 2019 and deal-management platform Doxly in August 2019.  Leading the company through these changes since 2016 has been CEO Avaneesh Marwaha, a former intellectual property lawyer who transitioned his career into a series of business-executive roles, including as chief operating officer of Keno Kozie Associates, a major provider of outsourced IT for global law firms.  In this episode of LawNext, Marwaha joins host Bob Ambrogi to discuss the recent news involving his company, how his company is continuing to serve customers in the face of the COVID-19 pandemic, the development of Litera into the company it is today, and the company’s future plans.  NEW: Comment on this show: Record a voice comment on your mobile phone and send it to info@lawnext.com. We are now on Patreon! Subscribe to our page to be able to access show transcripts, or to submit a question for our guests. Thank you to our sponsor, MyCase, and to John E. Grant and Agile Professionals LLC for being a lead Patreon supporter of our show.

Loose Bruce Kerr's Parody/Original Song Podcast
"Y2K" Parody VIDEO by Loose Bruce Kerr & his fellow Sun Microsystems employees (1999)

Loose Bruce Kerr's Parody/Original Song Podcast

Play Episode Listen Later Sep 1, 2019 4:06


As the 20th Anniversary of “Y2K” (the “Millennium Bug”) approaches on December 31, here’s a short music parody VIDEO (set to the music of “YMCA” by the Village People, a hit song from 1978) produced in 1999 by a Silicon Valley tech giant at the time, Sun Microsystems. It was one way the company used to break the ice at Y2K planning meetings in the 6 months leading up to the event.   The tongue-in-cheek parody music video was recorded by song parodist, Loose Bruce Kerr, together with a production staff of his fellow employees at Sun   Two years prior, Sun Microsystems hired attorney Bruce Kerr. Most were not aware he was the same as “Loose Bruce Kerr,” a nationally-known song parodist who’d opened for “Weird Al” Yankovic back during Bruce’s previous twenty year performing career, before then returning to law. Early in 1999, Bruce performed for a Sun legal conference his latest parody at that time, “Y2K” (“The Western World collapsing/My car insurance lapsing”).   Over 6 months in early 1999, Bruce and a team of his fellow Sun employees were charged by their employer with producing a music video (MTV was popular at the time) to Bruce’s soundtrack and a script he quickly put together. Sun senior executives were used as extras, including cameos by Sun’s CEO, Scott McNealy and COO, Ed Zander.   Here, then, is the story of the Y2K threat as seen through the lens of a computer company dealing lightheartedly with that threat in the months leading up to 01/01/00, with the assistance of song parodist Loose Bruce Kerr.   As it turned out, only minor disruptions occurred after millions were spent by banks and other companies trying to avert disaster. With dates in many computer systems at the time represented by only two digits (e.g., 00) instead of four (e.g., 2000 or 1900), the worry was “00” would be seen by the systems as 1900, not the year 2000, and worldwide systems might shut down big time, disrupting everything from bank, commerce, and health systems to even including images of “airplanes falling from the sky.”   Later, Kerr became Assistant General Counsel at Sun and is currently an attorney working at Oracle, which acquired Sun in 2010.   CREDITS: Producer: Anna Weldon; Executive Producers: John Croll, Tony Hampell, & Jan Testarmata; Associate Producer: Jenny Quang; Director: Mark Weldon; the band consisted of Bruce’s fellow legal reps: Bass: Stephen Clayton; keyboard: Darryl Payton; percussion: Anne Tirsell; drums: Bill Lard.   (earbuds encouraged)   Also available on youtube.com   email: BKerrLaw@aol.com   Enjoy!

Engineering Tomorrow
Designing the State of the Art: Johns Hopkins Applied Physics Laboratory

Engineering Tomorrow

Play Episode Listen Later Aug 20, 2019 51:27


Episode Description:Johns Hopkins Applied Physics Laboratory new building 201 will host cutting edge research paving the way to new technologies. CannonDesign solved complex engineering and architectural building design challenges to deliver this state of the art research facility. Tune in and see how these two organizations collaborated for a truly stunning and technologically advanced building critical to providing solutions to our nation’s most challenging research, engineering, and analytical problems. Building Description:260,000 gsf interdisciplinary research facility that will provide the Research and Exploratory Development Department (REDD) with flexible open laboratories, and core laboratories in a highly collaborative open workplace environment. REDD’s interdisciplinary programs include Multifunctional Materials and Nanostructures, Experimental and Computational Physics, Microelectronics and Microsystems, and Mechanical and Electrical Engineering. Core Labs include THZ and Quantum Mechanics Optics Labs, MBE and MTS Labs, a Dry Lab, an Imaging Suite, NMR’s, and a Metal Shop. Also included are Open Labs for Biological and Health Sciences programs with flanking support labs for Microbiology, Molecular Biology, Biochemistry, Analytical Instrumentation, and Sequencing Labs, as well as Virology, Tissue Culture, Environmental Chambers, Mass Specs, and Radioisotopes. The building has additional amenities including a large auditorium capable of hosting town hall type meetings and delivering presentations. The building is expected to be occupied early 2020. Project Highlights: 260,000 gross square feet IECC 2015, LEED Silver (Pending) -167,000 CFM total 100% OA lab supply; lab AHU’s have fan arrays for partial redundancy -200,000 CFM total building supply air; every AHU with energy recovery -180,000 CFM total (150,000 CFM + 30,000 CFM) N+1 high plume laboratory exhaust fan array - 225,000 CFM engineered smoke control system for the atrium. - 18,000 MBH high efficiency condensing HHW plant with N+1 boiler not included in total - 1,280 ton CHW plant with N+1 chiller not included in total - Laboratory equipment process cooling system.

Researchat.fm
19. Neuron Musk

Researchat.fm

Play Episode Listen Later Jul 25, 2019 159:05


Elon MuskがオーナーをつとめるNeuralinkがbioRxivに発表した論文と発表イベントの内容、Brain Machine Interfaceを含む脳情報関連技術の動向について話しました。Shownotes Neuralinkまとめ (Researchat’s Blog) … 今回の情報をブログにまとめました。こちらをご覧ください。 An integrated brain-machine interface platform with thousands of channels (BioRxiv) … Musk and Neuralink, bioRxiv 2019 今回のNeuralinkの発表とともに公開。メイン論文。科学研究論文というよりは企業が公開するホワイトペーパーという形態である。 The “sewing machine” for minimally invasive neural recording … Hanson et al. bioRxiv 2019 2019年の3月にUCSFから発表されていた論文。ラストオーサーのPhilip Sabesは現在NeuralinkのSenior Scientist。今回の発表の根幹を担う技術についてかなり詳しく述べられている。発表時にNeuralinkとの関係は示されていない。 Neuralink Launch Event … Neuralinkの発表。Elon Mask-> Max Hodak-> Matt Mcdougall -> Vanessa Tolosa-> DJ Seo -> Philip Sabes -> 質疑応答 (発表内での順番) Neuralink Elon Musk … シリアルアントレプレナー BMI (Brain Machine Interface:ブレイン・マシン・インタフェース)…他にもBrain Computer Interface(BCI)、Direct Neural Interface、Mind Machine Interface(MMI)などとも呼ばれるケースもある。 情報通信海外技術動向(NICT)…国立研究開発法人情報通信開発機構(NICT)がまとめている各種報告書。 米国における脳情報関連技術に関する研究開発動向…米国におけるBMI関連技術の報告書。国家の取り組みとベンチャー企業Neuralink,FaceBook,Kernelについてまとめられている。 脳関連情報技術の研究開発動向最終報告書…今回は取り上げなかったが、欧州における脳関連技術についてまとめられている。 BMIの市場(Grand View Research) BMIの市場(Allied Market Research) State-of-the-art MEMS and microsystem tools for brain research…Microsystems & Nanoengineering誌のレビュー論文。 BrainGate System (Youtube video) LUKE Arm (Youtube video) Editorial notes 我々は近い将来、脳に刺さったデバイスを通じて意識よりも高速にコミュニケーションする未来が見えた(soh) 欧州の動向についても触れておくべきでした。shownoteにリンク(NITC)を貼っておきました。(coela) Neuron Muskのファンボーイとして頑張っていきます。(tadasu)

Loose Bruce Kerr's Parody/Original Song Podcast
"Y2K" AUDIO - Loose Bruce Kerr YMCA/Village People parody

Loose Bruce Kerr's Parody/Original Song Podcast

Play Episode Listen Later Jul 20, 2019 2:04


"Y2K" (AUDIO 1999), song parody to the tune of "YMCA" by the Village People. A song which Loose Bruce Kerr's employer, Sun Microsystems, turned into a parody music video (re-releasing in September, 2019!). This tune made the Dr. Demento "Funny 5" in 1999. Earbuds encouraged. Enjoy! Loose Bruce Kerr is a nationally-known song parodist & songwriter (Dr. Demento Show; Jim Bohannon Show). Back in the day, Bruce opened for "Weird Al" Yankovic. Bruce records his songs in his garage live, adding background vocals & instruments he plays. In 1999 when he did "Y2K," Bruce was recording on a TEAC 4 track cassette deck, overdubbing till he got all the instruments & vocals added to the mix. He is currently an attorney working at Oracle in northern California. email: BKerrLaw@aol.com free mp3 and mp4 downloads of audio & video at loosebrucekerr.com

Accessible South Africa Travel Podcast
17 - Tech Savvy Travel with Edit Microsystems

Accessible South Africa Travel Podcast

Play Episode Listen Later Jul 16, 2019 48:22


In this episode Lois chats to the team from Edit Microsystems, a Cape Town based company providing assistive devices for people with disabilities The conversation provides valuable information about the role assistive technology plays in travel as well as the business case for making accessible travel a part of the hospitality industry We also introduce the partnership between Accessible South Africa and Edit Microsystems, with the new Tech Talk segment which will be featured every second episode. These episodes will introduce a new device that will be implemented on trial in a tourism establishment where we welcome travellers to go and test the device and provide feedback. Tune in to the next episode for exciting news on the first device being introduced into the tourism sector and where it will be implemented! Our spotlight section features an event - the upcoming Outeniqua Wheelchair Challenge taking place in George on 14 September 2019 at 13h30. This episode was edited by Craig Strachan using the HIndenburg software. Credits read by Andre du Toit, The Big Positive Guy.

Accessible South Africa Travel Podcast
17 - Tech Savvy Travel with Edit Microsystems

Accessible South Africa Travel Podcast

Play Episode Listen Later Jul 16, 2019 48:22


Accessible South Africa — In this episode Lois chats to the team from Edit Microsystems, a Cape Town based company providing assistive devices for people with disabilities The conversation provides valuable information about the role assistive technology plays in travel as well as the business case for making accessible travel a part of the hospitality industry We also introduce the partnership between Accessible South Africa and Edit Microsystems, with the new Tech Talk segment which will be featured every second episode. These episodes will introduce a new device that will be implemented on trial in a tourism establishment where we welcome travellers to go and test the device and provide feedback. Tune in to the next episode for exciting news on the first device being introduced into the tourism sector and where it will be implemented! Our spotlight section features an event - the upcoming Outeniqua Wheelchair Challenge taking place in George on 14 September 2019 at 13h30. This episode was edited by Craig Strachan using the HIndenburg software. Credits read by Andre du Toit, The Big Positive Guy.

Barcelona Software Crafters 2018
Reactive microsystems - Ignasi Marimon

Barcelona Software Crafters 2018

Play Episode Listen Later Nov 12, 2018 49:52


Si quieres ver el vídeo con slides: https://youtu.be/TqWz1MUAV3U A lot has been said about splitting the monolith. This talk focuses on what alternatives we have when refactorring each of the splits we take away from the monolith (and how we can use them in the monolith itself). MICROSERVICES is hype, there's a world between mono and micro.

Embedded Insiders
Five Minutes with…Jothy Rosenberg, CEO, Dover Microsystems

Embedded Insiders

Play Episode Listen Later Jun 5, 2018 7:56


According to Jothy Rosenberg, the Founder and CEO of Dover Microsystems, processor technology is not keeping pace with the security that needs to be implemented, particularly in the case of cyber security. The key to fixing that problem is to address security at the “root level.” In this week’s Five Minutes with…discussion, Jothy explains what that means, why it is the case today, and what needs to happen to remedy the situation. https://dovermicrosystems.com/

Lightbend
What's New For Reactive Microsystems In Lagom 1.4

Lightbend

Play Episode Listen Later Jan 25, 2018 26:50


In this Lightbend podcast, we sit down with Renato Calvalcanti, Senior Engineer on the Lagom team and founder of the Belgium Scala User Group, who tells us about the latest release of Lagom 1.4, some history of Lagom since the 1.0 launch, as well as some ideas the team is working on for future releases.

Reinventing Professionals
Writing an Integration Success Story in an Era of Consolidation

Reinventing Professionals

Play Episode Listen Later Jan 3, 2018 11:01


I spoke with Avaneesh Marwaha, the CEO of Litera Microsystems, the company that represents the consolidation of Litera, The Sackett Group, and Microsystems, which produces software to assist lawyers with drafting documents. We discussed the newly consolidated organization, the inspiration for the merger of Litera, The Sackett Group and Microsystems, how that integration differentiates the organization in the market, the client response, and how the combination of the three companies into a single entity reflects the changing nature of legal technology.

Reinventing Professionals
Writing an Integration Success Story in an Era of Consolidation

Reinventing Professionals

Play Episode Listen Later Jan 3, 2018 11:01


I spoke with Avaneesh Marwaha, the CEO of Litera Microsystems, the company that represents the consolidation of Litera, The Sackett Group, and Microsystems, which produces software to assist lawyers with drafting documents. We discussed the newly consolidated organization, the inspiration for the merger of Litera, The Sackett Group and Microsystems, how that integration differentiates the organization in the market, the client response, and how the combination of the three companies into a single entity reflects the changing nature of legal technology.

Reinventing Professionals
Writing an Integration Success Story in an Era of Consolidation

Reinventing Professionals

Play Episode Listen Later Jan 3, 2018 11:01


I spoke with Avaneesh Marwaha, the CEO of Litera Microsystems, the company that represents the consolidation of Litera, The Sackett Group, and Microsystems, which produces software to assist lawyers with drafting documents. We discussed the newly consolidated organization, the inspiration for the merger of Litera, The Sackett Group and Microsystems, how that integration differentiates the organization in the market, the client response, and how the combination of the three companies into a single entity reflects the changing nature of legal technology.

Reinventing Professionals
Writing an Integration Success Story in an Era of Consolidation

Reinventing Professionals

Play Episode Listen Later Jan 3, 2018 11:01


I spoke with Avaneesh Marwaha, the CEO of Litera Microsystems, the company that represents the consolidation of Litera, The Sackett Group, and Microsystems, which produces software to assist lawyers with drafting documents. We discussed the newly consolidated organization, the inspiration for the merger of Litera, The Sackett Group and Microsystems, how that integration differentiates the organization in the market, the client response, and how the combination of the three companies into a single entity reflects the changing nature of legal technology.

Mapping The Journey
Episode3: Interview with James Gosling, Father of JAVA

Mapping The Journey

Play Episode Listen Later Jun 29, 2017 28:27


Episode 3: Todays Guest is James Gosling. He is one of the best computer engineers on the planet, a famous developer, and a world-class innovator. He is the Father of Java. He spent many years as a CTO, VP & Fellow at Sun Microsystems. He has built satellite data acquisition systems, a multiprocessor version of Unix, several compilers, mail systems and window managers. He developed the text editor Emacs for Unix. He did the original design of the Java programming language and implemented its original compiler and virtual machine. He briefly worked for Oracle after the acquisition of Sun. After a year off, he spent some time at Google. He then spent over 5 years hacking the control software of autonomous ocean-going robots at Liquid Robotics. Currently, he is working at Amazon Web Service.  

ANTIC The Atari 8-bit Podcast
ANTIC Interview 280 - David and Betsy Ahl, Creative Computing Magazine

ANTIC The Atari 8-bit Podcast

Play Episode Listen Later May 24, 2017 214:12


David Ahl and Betsy Ahl, Creative Computing Magazine   Dave Ahl was the founder and editor-in-chief of Creating Computing Magazine, which was the first personal computer magazine.  Four editors served in the first six years: Dave Ahl, Steve Gray, John Craig, and Ted Nelson. Betsy Staples (now Betsy Ahl) then took over for the rest of its run. Creative Computing was published starting in November 1974, was acquired by Ziff Davis in 1983, and ceased publication in December 1985.    In addition to Creative Computing, Dave and Betsy published a variety of other magazines including Sync (dedicated to the Timex Sinclair computers), Microsystems, Small Business Computers, and Creative Computing Video & Arcade Games Magazine. They also released a record album -- First Philadelphia Computer Music Festival (1979), a board game called Computer Rage, and software for a variety of platforms under the Creative Computing Software label. Dave was author of BASIC Computer Games, the first million-selling computer book; plus its sequel, more BASIC Computer Games, and many other early computer books.   After Creative Computing, Dave was publisher and Betsy was editor of Atari Explorer magazine for five years and he started Atarian magazine in 1989. Later, he published Military Vehicles magazine.    This interview took place on April 3 and 4, 2013, when I was doing research for a book about the first personal computer magazines. Although I've decided not to write the book, I am publishing the interviews that I did for them. The other major interview was with Wayne Green: there's a link to that interview in the show notes.    The first part of the interview took place in the bar at the Heathman Hotel in Portland, Oregon. (There's some ambient background noise and music — remember, this recording was meant to be my notes for a book, so a little background noise wasn't an issue.) The second part of the interview was recorded in my dining room, a much quieter atmosphere.   The day before this was recorded, Dave and Betsy attended a grand opening get-together of tech luminaries at the Living Computer Museum in Seattle, Washington. This event is mentioned several times during the interview.    A full transcript of this interview is available at ComputingPioneers.com. Also, there are many links to related articles, interviews, and magazine scans in the show notes at AtariPodcast.com.   Teaser quote: "When I started Creative Computing, I mean there weren't even personal computers at that point. I was convinced, I guess, that they would come about. I had no idea that it would be three months later that the Altair came about."   Outro music: Scott Joplin's Maple Leaf Rag, played on an RCA COSMAC by Joe Welsbecker on the First Philadelphia Computer Music Festival record (1979.)   Transcript of this interview   Scans of Creative Computing at Internet Archive   Full text of 35 issues of Creative Computing at AtariMagazines.com   Best of Creative Computing volume 1, 2, 3   Creative Computing Magazine pages per issue   Scans of Atari Explorer at AtariMania   First Philadelphia Computer Music Festival record   Computer Rage board game   Dave Ahl: Blunders in Personal Computing, talk at VCF East 6.0   My Arthur Leyenberger interview   My Arlan Levitan Interview   My Wayne Green interview   My 2003 written interview with Dave   Dave Tells Ahl: The History of Creative Computing" by John Anderson

JSA Podcasts
Bay Microsystems CEO on New NFL Tech

JSA Podcasts

Play Episode Listen Later Aug 29, 2016 4:23


JSA Radio Host Jaymie Scotto Cutaia sits down with Harry Carr, CEO of Bay Microsystems, at ITW 2016 to discuss the company's breakaway technology which allows big data to be anywhere around the globe, any time. A case study example, Harry shares how Bay's workflow acceleration solution significantly improved NFL programming, so all the content was available in real time and with disaster recovery and backup enhancements.This show is brought to you by Talk 4 Radio (http://www.talk4radio.com/) on the Talk 4 Media Network (http://www.talk4media.com/).

Startup Grind
How to Succeed Personally & For Society with Vinod Khosla

Startup Grind

Play Episode Listen Later Jun 13, 2016 33:55


Today we have a great conversation with Silicon Valley Legend Vinod Khosla, co-founder of sun Microsystems and subsequently Khosla Ventures.    Vinod has run Khosla ventures since 2004, prior to that Vinod spent time at the VC firm Kleiner Perkins. Vinod studied engineering in India and at age 20 failed to start a soy milk company. After receiving degrees from in Electrical Engineering from IIT New Delhi, Biomedical engineering from Carnegie Mellon, and an MBA from the Stanford Graduate School of Business Vinod started Sun Microsystems in 1982 which eventually sold to Oracle for over $7 Billion.    Lets listen into Vinod Khosla interviewed in Silicon Valley by Startup Grind’s founder Derek Andersen. 

Transistor Podcast
#1 Den usannsynlige historien om Brukbar og Falanx Microsystems

Transistor Podcast

Play Episode Listen Later Jun 28, 2015 33:41


I første episode forteller vi historien om et tilfeldig vennskap som endte med å bli en global teknologisuksess og Trondheims største utelivsbrand. I dag – over et tiår senere har de funnet sammen igjen for å se om den lille tidslommen – de få årene der alt klikket – kan gjenskapes, skaleres, og deles med andre. (foto: Wil Lee Wright) Velkommen til Transistor!

Mechanical Engineering
Laboratory for Energy and Microsystems Engineering

Mechanical Engineering

Play Episode Listen Later May 28, 2014 5:27


Healthcare Professional Education & Outreach
Continuous Improvement Through Clinical Microsystems

Healthcare Professional Education & Outreach

Play Episode Listen Later Apr 12, 2011 18:11


Clinical microsystems are the front-line units that provide most health care to most people. The quality of care can be no better than the quality produced by the small systems that come together to provide care. This segment gives a quick introduction to the knowledge, tools and processes utilized to provide exceptional care AND continuously improve your care delivery system.

Ctrl+ Alt+ Del-
Ctrl+ Alt+ Del- 29 de enero 2011

Ctrl+ Alt+ Del-

Play Episode Listen Later Feb 1, 2011 43:23


En este programa: LibreOffice lanza su primera versión estable, OpenOffice hace lo propio y también lanza su versión 3.3, Firefox 4 llega a la Beta 10, Debian 6.0 será lanzado a inicios de febrero, Egipto bloquea el acceso a Internet, Google "bloquea" a la piratería, Facebook mejora protección para ingresar a sus cuentas, además del comentario de @UbuntuDF y más.

Loose Bruce Kerr's Parody/Original Song Podcast
"SUN MICRO" MP3 parody of "Kokomo" by Beach Boys-Tribute to Sun Microsystems

Loose Bruce Kerr's Parody/Original Song Podcast

Play Episode Listen Later Jan 29, 2010 1:47


"SUN MICRO" mp3 parody of "Kokomo" by the Beach Boys. A tribute song by Sun's Assistant General Counsel, "Loose Bruce" Kerr. Recorded in 2003 as Sun refocused to get back on top. Never fully recovered from the dotcom days of my first employment there. Loved every minute. Best IT industry professionals in the world. Like the "Tucker" auto & Jeff Bridges movie, best product, ahead of its time, not quite a market match, unfortunately. But we kicked butt & had fun.

Chemistry (audio)
Biological Microsystems (Audio)

Chemistry (audio)

Play Episode Listen Later Aug 3, 2009 6:37


If you experience any technical difficulties with this video or would like to make an accessibility-related request, please send a message to digicomm@uchicago.edu. Milan Mrksich, professor of chemistry at the University of Chicago, discusses his research on integrating living cells with non-living engineered microsystems to create hybrid devices. (c) 2006 The University of Chicago

Computer Science (audio)
Biological Microsystems

Computer Science (audio)

Play Episode Listen Later Aug 3, 2009 6:37


Milan Mrksich, professor of chemistry at the University of Chicago, discusses his research on integrating living cells with non-living engineered microsystems to create hybrid devices. (c) 2006 The University of Chicago

Computer Science (video)
Biological Microsystems

Computer Science (video)

Play Episode Listen Later Jul 1, 2009 6:37


If you experience any technical difficulties with this video or would like to make an accessibility-related request, please send a message to digicomm@uchicago.edu. Milan Mrksich, professor of chemistry at the University of Chicago, discusses his research on integrating living cells with non-living engineered microsystems to create hybrid devices. (c) 2006 The University of Chicago

JavaOne
Paul Perrone of Perrone Robotics

JavaOne

Play Episode Listen Later Jun 3, 2009 10:21


Paul Perrone of Perrone Robotics talks about his infamous car at the Neil Young Ranch.

JavaOne
Tony Baker from Intel

JavaOne

Play Episode Listen Later Jun 3, 2009 9:59


Tony Baker from Intel talks mobile devices.

JavaOne
Paul Perrone of Perrone Robotics

JavaOne

Play Episode Listen Later Jun 3, 2009 10:21


Paul Perrone of Perrone Robotics talks about his infamous car at the Neil Young Ranch.

JavaOne
Tony Baker from Intel

JavaOne

Play Episode Listen Later Jun 3, 2009 9:59


Tony Baker from Intel talks mobile devices.

Ceres Sustainability Podcast
Pumping Political Iron: Consumer Companies Flex Their Climate Change Muscle

Ceres Sustainability Podcast

Play Episode Listen Later Apr 14, 2009 8:32


As Congress gears up to debate some of the furthest reaching environmental legislation it’s faced since the creation of the Clean Air Act and the Endangered Species Act, proponents and opponents are lining up to make their case for why we should or shouldn’t aggressively address climate change. And support for strong action on climate is coming from unlikely places like the boardrooms of major U.S. consumer companies that are part of BICEP, a business coalition advocating for strong climate and energy policy. The Ceres podcast caught up with representatives of the BICEP coalition at an event in Washington DC. Listen to the interview with David Douglas, Senior Vice President of Cloud Computing and Chief Sustainability Officer, Sun Microsystems.[Music: Rattatat, "Wildcat" from Classics (XI Recordings, 2006) and Bonobo, "Transmission 94" from Days to Come (Ninja Tune, 2006)]

Loose Bruce Kerr's Parody/Original Song Podcast
"IT'S CLOUD COMPUTING"-parody by "Loose Bruce" Kerr re Joni Mitchell's "Both Sides Now"

Loose Bruce Kerr's Parody/Original Song Podcast

Play Episode Listen Later Apr 4, 2009 2:18


"IT'S CLOUD COMPUTING" is the latest parody by "Loose Bruce" Kerr re Joni Mitchell's "Both Sides Now" and speaks of the next wave of computing: remotely accessing resources, applications, and your data storage via the intertubes, I mean, Internet (the "cloud")...instead of owning and using everything locally. Loose Bruce Kerr performs irregularly on the Dr. Demento & Jim Bohannon nationally syndicated radio shows. During Kerr's earlier career as a musical performer and comedian, he opened for "Weird Al" Yankovic. He is now Assistant General Counsel for Sun Microsystems in Northern California's Silicon Valley, after a 20 year career break to write and perform music and comedy. email Bruce at: BKerrLaw@aol.com

Chemistry (video)
Biological Microsystems

Chemistry (video)

Play Episode Listen Later Jan 7, 2009 6:37


If you experience any technical difficulties with this video or would like to make an accessibility-related request, please send a message to digicomm@uchicago.edu. Milan Mrksich, professor of chemistry at the University of Chicago, discusses his research on integrating living cells with non-living engineered microsystems to create hybrid devices. (c) 2006 The University of Chicago

Loose Bruce Kerr's Parody/Original Song Podcast
"JAVA," The VIDEO -by "Loose Bruce" Kerr -the Story of Sun vs. Microsoft (1997)

Loose Bruce Kerr's Parody/Original Song Podcast

Play Episode Listen Later Jan 1, 2009 2:06


"JAVA" the VIDEO by "Loose Bruce" Kerr. This parody of "Ja-Da," a World War I era song Bruce sang at summer camp growing up in Wisconsin regards the Sun Microsystems v. Microsoft lawsuit on Java technology from 1997, as told by Sun's own Assistant General Counsel, "Loose Bruce" Kerr. Kerr had just joined Sun's legal department when the lawsuit was filed. Kerr recorded this in his Silicon Valley garage 6 months into his new job, one vocal and instrument at a time on a 4 track cassette deck. Yes, those are non-heavy metal ukeleles on this recording. Now with background tracks digitally remastered and stereo-ized, here is the video Bruce has been putting off making since 1997. Bruce performs live over his old background tracks in this video. Loose Bruce Kerr performs irregularly on the Dr. Demento & Jim Bohannon nationally syndicated radio shows. During Kerr's earlier career as a musical performer and comedian, he opened for "Weird Al" Yankovic.The stereo mp3 file is also available for free download on this same site   Also, the mono (down the list a ways...)email Bruce at: BKerrLaw@aol.com

Loose Bruce Kerr's Parody/Original Song Podcast
"JAVA" -STEREO AUDIO by "Loose Bruce" Kerr -the Story of Sun vs. Microsoft (1997)

Loose Bruce Kerr's Parody/Original Song Podcast

Play Episode Listen Later Dec 9, 2008 1:47


"JAVA" the STEREO AUDIO by "Loose Bruce" Kerr as featured on the Dr. Demento & Jim Bohannon syndicated radio shows.  This parody of "Ja-Da," a World War I era song Bruce sang at summer camp growing up in Wisconsin regards the Sun Microsystems v. Microsoft lawsuit on Java technology from 1997, as told by Sun's own Assistant General Counsel, "Loose Bruce" Kerr. Kerr had just joined Sun's legal department when the lawsuit was filed. Kerr recorded this in his Silicon Valley garage 6 months into his new job, one vocal and instrument at a time on a 4 track cassette deck. Yes, those are non-heavy metal ukeleles on this recording. Now digitally remastered and stereo-ized here. And watch for the upcoming video here also during December 2008.email Bruce at: BKerrLaw@aol.com