POPULARITY
In this episode, Gaurav continues his deep dive into the Alfred app for Mac, focusing on the Features pane within the settings. He provides a detailed walkthrough on customizing Alfred to boost productivity and usability, with special attention to voiceover users.Gaurav explores various powerful features of Alfred, including Universal Actions, hotkey configuration, web search customization, and clipboard history management. Through practical demonstrations, he shows how to create shortened URLs, compress files, and streamline workflows—all without leaving Alfred.Highlights include:Features Pane Overview: Customize default search results, specify file and folder searches, and set fallbacks for unmatched queries.Universal Actions: Learn how to configure hotkeys and perform contextual actions on selected text, URLs, and files, like searching, snippet saving, dictionary lookups, and QR code generation.Web Search Shortcuts: Set personalized shortcuts for quick access to Google Images, Amazon, YouTube, and more.Clipboard History: Enable and manage clipboard content for easy retrieval and searching.Additional Tools: Brief introductions to snippets, calculator, dictionary, contacts viewer, music mini player, and OnePassword integration.System Commands: Assign commands for system tasks such as restart, shutdown, and emptying trash.Step-by-step Universal Actions setup:Open Alfred's Features tab and set a hotkey for Universal Actions (e.g., Option + Command + A).Select text, URLs, or files and activate the hotkey.Choose from available actions like search, snippet creation, or file compression.Through these tips and demonstrations, Gaurav aims to help listeners harness Alfred's full potential, making Mac navigation smoother and more accessible—especially for voiceover users.TranscriptDisclaimer: This transcript was generated by AI Note Taker – VoicePen, an AI-powered transcription app. It is not edited or formatted, and it may not accurately capture the speakers' names, voices, or content.Gaurav: Hello everyone. So today we shall continue our series on the Alfred 5 application for the Mac. And today we are going to dive into the Alfred settings once again and doing an even deeper dive on an aspect of the settings pane called the features pane. So if you might remember in one of my previous episodes, I had done a general walkthrough of the Alfred settings. And today we're going to get a deeper dive under the hood of Alfred and really see how to make this app really useful for us via the features tab. So I'm going to invoke Alfred now by pressing my Alfred keyboard shortcut, which is command plus space. application Alfred system dialog and I'm going to go into settings command comma finder mac alfred preferences alfred preferences search I'm going to go to the left most part of the screen with vo fn left arrow search preferences blank search I'm going to vo right arrow alfred sidebar I'm going to sidebar and I'm going to use the up and down arrows once I'm in the alfred sidebar to navigate features…
The latest In Touch With iOS with Dave he is joined by guests Holden Depardo, Chuck Joiner, Marty Jencius, Jeff Gamet. The panel discusses Apple's latest updates, starting with Marty's excitement over his new Mac Studio and MacBook Air. They dive into Vision Pro's 2.3.2 update, upcoming features, and immersive concerts from Metallica and U2. Security updates in iOS 18.3.2 and macOS Sequoia 15.3.2 take center stage, along with challenges in Apple account management. The episode wraps up with a debate on John Gruber's criticism of Apple's delayed AI advancements. .The show notes are at InTouchwithiOS.com Direct Link to Audio Links to our Show Give us a review on Apple Podcasts! CLICK HERE we would really appreciate it! Click this link Buy me a Coffee to support the show we would really appreciate it. intouchwithios.com/coffee Another way to support the show is to become a Patreon member patreon.com/intouchwithios Website: In Touch With iOS YouTube Channel In Touch with iOS Magazine on Flipboard Facebook Page BlueSky Mastodon X Instagram Threads Spoutible Summary Topics and Links The episode kicks off with a casual conversation where host Dave expresses gratitude to his guests, sparking a light-hearted exchange about the recent increase in Apple hardware ownership among the panelists. Marty shares his excitement about getting a new Mac Studio and MacBook Air, revealing the nuances of their colors and their overall design impressions. The camaraderie in the discussion highlights not only the latest tech but also the personal experiences associated with it. As the panel transitions into the core of the episode, they cover significant updates regarding the Vision Pro. Dave announces the release of a minor update (version 2.3.2) aimed at improving streaming playback and fixing other bugs. The panel discusses the implications of upcoming updates, including the much-anticipated features and bug fixes expected in the betas. Interesting insights about the guest user mode provide a glimpse into the user experience with the Vision Pro headsets, leading to engaging anecdotes from each host. The conversation then shifts towards an exciting announcement about Metallica's immersive concert experience coming to the Vision Pro, sparking enthusiasm across the panel. Chuck shares his thoughts on the song choices while the group debates the appeal of immersive concerts and how advances in technology are transforming experiences for music fans. There's lively banter as they express their excitement about both Metallica and U2's upcoming immersive projects, highlighting the importance of such experiences for Apple's Vision ecosystem. Next up, the group discusses critical updates across Apple's operating systems, including significant security fixes released in iOS 18.3.2 and macOS Sequoia 15.3.2. The urgency for users to update is emphasized, particularly in light of detected vulnerabilities. Chuck and Holden reflect on their experiences with the iPhone 16e, describing its practicality and discussing its unique features, including battery life and the new C1 modem. Furthermore, the podcast navigates the complexities surrounding Apple account management, with the panel reflecting on the challenges Apple users face regarding account merging, particularly due to restrictions and convoluted processes. There's a collective sense of frustration, humor, and camaraderie as they recount their attempts to navigate Apple's ecosystem, showcasing the everyday challenges faced by loyal Apple users. As the panel transitions into discussing One Password's new features, there's a consensus on the importance of security while using password management tools. The practical implications of location-based password retrieval are also analyzed, with Holden expressing how it can streamline his workflow, particularly in a dual-PC environment. The episode also touches on the broader topics of privacy concerns within the app ecosystem, focusing on location tracking and how companies are handling consumer data. The discussion reveals a deeper understanding of user privacy and the scrutiny tech companies are under. Finally, the episode takes a significant turn as John Gruber's critical comments regarding Apple's delayed Siri features are brought into the mix. The panelists delve into Gruber's observations about Apple's credibility, echoing concerns that their ambitious promises have not materialized on time. With a spirited debate, they reflect on Apple's past successes and current challenges in AI integration, summarizing the emerging sentiment that accountability and transparency are vital for regaining trust with consumers. Marty shows his new MBA Sky Blue In Touch With Vision Pro this week. Apple Releases visionOS 2.3.2 With Streaming Playback Fix - MacRumors Apple Seeds Third Betas of visionOS 2.4, tvOS 18.4, and watchOS 11.4 visionOS 2.4 Beta 3 Release Notes Metallica Immersive Concert Experience Coming to Apple Vision Pro Apple unveils immersive concert experience with Metallica for Apple Vision Pro Beta this week. Make Sure to Update: iOS 18.3.2 and macOS Sequoia 15.3.2 Include Important Security Fixes Apple Releases iOS 18.3.2 With Bug Fixes Apple Releases tvOS 18.3.1 for Third-Generation Apple TV 4K Apple Seeds Third Public Betas of iOS 18.4, iPadOS 18.4, and macOS Sequoia 15.4 iOS 18.4 Adds a Highly-Requested Setting to iPhones — But Not in U.S Apple Upgrades CarPlay in Two Ways iPhone 16e Has a Bluetooth Audio Problem In Touch With Mac this week Mac Studio Still Lacks 'High Power Mode' Offered on Some MacBook Pro and Mac Mini Models Apple Releases macOS Sequoia 15.3.2 The 10 Best Hidden AirTags Feature LifehackerYou Need Update Firefox Before Friday8 hours ago Dave has the iPhone 16e his review. iPhone 16e review: All the bells, none of the whistles on this battery-heavy device Follow up I'm not convinced this Apple Account tool actually does anything New 1Password Feature Can Display Codes and Logins Based on User's Location How to Identify iPhone Apps That May Contain Location-Tracking Ads News Pocket Casts on the web: now open to everyone New T-Mobile price increase: Here's who's affected John Gruber Says 'Something is Rotten' at Apple Announcements Macstock 9 is here for 3 Days on July 11, 12, and 13th, 2025. Super Early bird tickets here save $100. Register | Macstock Conference & Expo Book your room with a Macstock discount here. Location | Macstock Conference & Expo Our Host Dave Ginsburg is an IT professional supporting Mac, iOS and Windows users and shares his wealth of knowledge of iPhone, iPad, Apple Watch, Apple TV and related technologies. Visit the YouTube channel https://youtube.com/intouchwithios follow him on Mastadon @daveg65, and the show @intouchwithios Our Regular Contributors Jeff Gamet is a podcaster, technology blogger, artist, and author. Previously, he was The Mac Observer's managing editor, and Smile's TextExpander Evangelist. You can find him on Mastadon @jgamet as well as Twitter and Instagram as @jgamet His YouTube channel https://youtube.com/jgamet Marty Jencius, Ph.D., is a professor of counselor education at Kent State University, where he researches, writes, and trains about using technology in teaching and mental health practice. His podcasts include Vision Pro Files, The Tech Savvy Professor and Circular Firing Squad Podcast. Find him at jencius@mastodon.social https://thepodtalk.net About our Guest Holden DePardo Chuck Joiner is the host of MacVoices and hosts video podcasts with influential members of the Apple community. Make sure to visit macvoices.com and subscribe to his podcast. You can follow him on Twitter @chuckjoiner and join his MacVoices Facebook group.
Intel has made significant strides in the tech industry by launching its next-generation AI chips, the Core Ultra Series 2 processors, designed specifically for commercial artificial intelligence applications. Built on the Arrow Lake architecture, these processors promise a 30% reduction in power usage compared to their predecessors, catering to the growing demand for efficiency in AI workloads. Additionally, a federal judge dismissed a shareholder lawsuit against Intel, which had accused the company of misleading investors about its foundry business. This legal victory alleviates some immediate uncertainties for Intel, although the company still faces ongoing challenges in a competitive market dominated by TSMC and Samsung.Apple is currently embroiled in a legal battle with the UK government over an order that demands access to encrypted iCloud files. The company has appealed to the Investigatory Powers Tribunal, which may hear the case soon. In response to the order, Apple has paused its Advanced Data Protection Service in the UK, raising concerns about user privacy and security. Meanwhile, the Trump administration is planning to revamp a $42.5 billion internet program aimed at connecting rural Americans to high-speed internet, potentially favoring satellite companies like Starlink over traditional fiber-optic networks.In the realm of managed service providers (MSPs) and small to mid-sized businesses (SMBs), several tech upgrades have been announced. GoTo has introduced AI-powered security and translation features for its LogMeIn rescue platform, enhancing customer support capabilities. Adigy has launched Adigy Assist, a tool designed to streamline Mac deployments, while One Password has improved password accessibility based on user location. Additionally, a new Swedish startup, Big Audience Machine, is set to launch an AI-driven content marketing platform tailored for smaller enterprises, allowing them to compete more effectively in the digital landscape.The podcast also discusses a shift in the use of artificial intelligence, with companies increasingly opting for multiple AI models rather than relying on a single solution. This trend reflects a growing understanding of the diverse capabilities required for various tasks. Notably, McDonald's is upgrading its restaurants with AI technology to improve order accuracy and customer experience, while the Xbox Kinect continues to find innovative applications beyond gaming, demonstrating the lasting impact of technology in creative fields. As the market evolves, businesses must adapt to these changes and explore new opportunities for growth and efficiency. Four things to know today 00:00 Intel Scores Legal Win, Launches Next-Gen AI Chips: Is the Tech Giant Finally Getting Back on Track?03:34 Apple vs. the UK, Satellite Broadband Heats Up, and Tariffs Stick Around—Tech Drama You Didn't Know You Needed07:00 From GoTo's Real-Time Translation and Security Enhancements to Reddit's Community Tools—How MSPs and SMBs Can Leverage These New Tech Upgrades10:04 Companies No Longer Trusting ‘One AI to Rule Them All'—Here's Why Shortwave, McDonald's, and Xbox Kinect Matter Supported by: https://syncromsp.com/ Event: : https://www.nerdiocon.com/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
In this edition of the AppleVis Extra, David Nason speaks to Saqib Shaikh, a key member of the team behind Microsoft's Seeing AI, winner of Best App in the 2024 AppleVis Golden Apple awards.TranscriptDisclaimer: This transcript was generated by Aiko, an AI-powered transcription app. It is not edited or formatted, and it may not accurately capture the speakers' names, voices, or content.Hello there, and welcome to another episode of the AppleVis Extra Podcast.My name is David Nason and I am delighted to be joining you again to talk about the 2024 Golden Apple Awards.Today's focus is the best app category.We had 10 brilliant nominees in this category and they were One Password, Anytime Podcast Player, Drafts, Mona from Astadon, OKO, Cross Street and Maps, PixieBot, Seeing AI, Tapit Pro Audio Recorder, Todoist, To Do List and Calendar, and Voice Vista.So a great list of nominees there, very strong.Our runners up getting special mention are PixieBot and Voice Vista.So again, huge well done to them for being runners up.Our winner and a very familiar winner, I think it's their fourth Golden Apple, which is amazing, is Microsoft's Seeing AI.So huge well done to them.It's an app that's been around a long time and is still available in the App Store.If you search for Seeing AI from Microsoft.So yes, huge well done to Seeing AI for winning the best app, Golden Apple 2024.And to chat about it, I am delighted to be joined from the Microsoft Seeing AI team by Saqib Shaikh.Hello Saqib, thank you so much for joining me on the podcast today.Hi, thank you so much for having me.It's a pleasure to be here.And you're here because Seeing AI, I don't think for the first time won a Golden Apple Award for 2024 in the best app category, which is fantastic.So congratulations on that, first of all.Thank you.A great honor and actually a surprise.And it means so much because it's from the community.You know, there are so many awards from either the government or industry, but I think the ones from the community just mean that much more.Absolutely.You know, to be voted by the people who are using apps and there's, you know, a great range of apps nominated this year.So to top the pole is absolutely brilliant.And actually, before we jump into too much detail, maybe for the uninitiated, if there are any in our community, can you give us a quick rundown of what Seeing AI is?Good point.Seeing AI, we talked about it as a talking camera app or a visual assistant.It's a mobile app where you open it up and it uses the camera to tell you what it can see.And it has different modes for different tasks in your daily life from reading things to you, whether that's immediately or more slightly with formatting through to describing photos that you take or from your camera roll or from other apps, all the way through to very task-specific channels, as we call them, like finding something or exploring the world around you or knowing if the lights are on.Amazing.What do you do yourself on the team out of interest and are you there long?Have you been there, you know, part of Seeing AI from the start or can you…
In this episode of Command Control Power, Joe dives into various tech frustrations, starting with longstanding complaints about Siri's inefficiencies that even die-hard Apple fans acknowledge. The discussion pivots to the troubles faced after switching from a MacBook Air to a MacBook Pro, including stability issues and slower wake times. Joe shares a recent ordeal with a client's Bluehost account where an email disruption led to a series of frustrating support calls, tying up days of his time. Technical missteps and inefficient customer service compounded the problem, leading to an exasperating experience. The conversation also touches on alternative tech like the Meshtastic & LoRa system for peer-to-peer text communications during grid-down scenarios. The episode wraps up with reflections on the toll such tech issues take on professionals and a call for listener experiences with better hosting solutions and emerging tech. 00:00 Introduction and Siri Complaints 00:33 Switching to MacBook Pro: Initial Impressions 01:01 Technical Issues with MacBook Pro 01:55 USB-C Cable Troubleshooting 03:21 Monitor and Display Problems 07:25 Apple's Expensive Solutions 08:57 One Password and Captcha Issues 11:16 Bluehost Email Troubles 25:02 A Series of Missteps 25:41 Holding It Together 26:12 The Restore Process 26:41 Client Frustrations 27:22 Website and Email Issues 30:13 Bluehost's Role 35:53 Support Challenges 44:56 Exploring Mesh Networks 52:48 Concluding Thoughts
We're thrilled to have Frank Duff on to discuss threat-informed defense. As one of the MITRE folks that helped create MITRE ATT&CK and ATT&CK evaluations, Frank has been working on how best to define and communicate attack language for many years now. The company he founded, Tidal Cyber is in a unique position to both leverage what MITRE has built with ATT&CK and help enterprises operationalize it. Segment Resources: Tidal Cyber website Tidal Cyber Community Edition We're a fan of hacker lore and history here at Security Weekly. In fact, Paul's Security Weekly has interviewed some of the most notable (and notorious) personalities from both the business side of the industry and the hacker community. We're very excited to share this new effort to document hacker history through in-person interviews. The series is called "Where Warlocks Stay Up Late", and is the creation of Nathan Sportsman and other folks at Praetorian. The timing is crucial, as a lot of the original hackers and tech innovators are getting older, and we've already lost a few. References: Check out the Where the Warlocks Stay Up Late website and subscribe to get notified of each episode as it is released Check out the anthropological hacker map and relive your misspent youth! In this latest Enterprise Security Weekly episode, we explored some significant cybersecurity developments, starting with Veracode's acquisition of Phylum, a company specializing in detecting malicious code in open-source libraries. The acquisition sparked speculation that it might be more about Veracode staying relevant in a rapidly evolving market rather than a strategic growth move, especially given the rising influence of AI-driven code analysis tools. We also covered One Password's acquisition of a UK-based shadow IT detection firm, raising interesting questions about their expansion into access management. Notably, the deal involved celebrity investors like Matthew McConaughey and Ashton Kutcher, suggesting a trend where Hollywood influence intersects with cybersecurity branding. A major highlight was the Cyber Haven breach, where a compromised Chrome extension update led to stolen credentials. The attack was executed through a phishing campaign disguised as a Google policy violation warning. To their credit, Cyber Haven responded swiftly, pulling the extension within two hours and maintaining transparency throughout. This incident underscored broader concerns around the poor security of browser extensions, an issue that continues to be exploited due to lax marketplace oversight. We also reflected on Corey Doctorow's concept of "Enshittification," critiquing platforms that prioritize profit and engagement metrics over genuine user experiences. His decision to disable vanity metrics resonated, especially considering how often engagement numbers are inflated in corporate settings. The episode wrapped with a thoughtful discussion on how CISOs can say "no" more effectively, emphasizing "yes, but" strategies and the importance of consistency. We also debated the usability frustrations of "magic links" for authentication, arguing that simpler alternatives like passkeys or multi-factor codes could offer a better balance between security and convenience. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-389
We're thrilled to have Frank Duff on to discuss threat-informed defense. As one of the MITRE folks that helped create MITRE ATT&CK and ATT&CK evaluations, Frank has been working on how best to define and communicate attack language for many years now. The company he founded, Tidal Cyber is in a unique position to both leverage what MITRE has built with ATT&CK and help enterprises operationalize it. Segment Resources: Tidal Cyber website Tidal Cyber Community Edition We're a fan of hacker lore and history here at Security Weekly. In fact, Paul's Security Weekly has interviewed some of the most notable (and notorious) personalities from both the business side of the industry and the hacker community. We're very excited to share this new effort to document hacker history through in-person interviews. The series is called "Where Warlocks Stay Up Late", and is the creation of Nathan Sportsman and other folks at Praetorian. The timing is crucial, as a lot of the original hackers and tech innovators are getting older, and we've already lost a few. References: Check out the Where the Warlocks Stay Up Late website and subscribe to get notified of each episode as it is released Check out the anthropological hacker map and relive your misspent youth! In this latest Enterprise Security Weekly episode, we explored some significant cybersecurity developments, starting with Veracode's acquisition of Phylum, a company specializing in detecting malicious code in open-source libraries. The acquisition sparked speculation that it might be more about Veracode staying relevant in a rapidly evolving market rather than a strategic growth move, especially given the rising influence of AI-driven code analysis tools. We also covered One Password's acquisition of a UK-based shadow IT detection firm, raising interesting questions about their expansion into access management. Notably, the deal involved celebrity investors like Matthew McConaughey and Ashton Kutcher, suggesting a trend where Hollywood influence intersects with cybersecurity branding. A major highlight was the Cyber Haven breach, where a compromised Chrome extension update led to stolen credentials. The attack was executed through a phishing campaign disguised as a Google policy violation warning. To their credit, Cyber Haven responded swiftly, pulling the extension within two hours and maintaining transparency throughout. This incident underscored broader concerns around the poor security of browser extensions, an issue that continues to be exploited due to lax marketplace oversight. We also reflected on Corey Doctorow's concept of "Enshittification," critiquing platforms that prioritize profit and engagement metrics over genuine user experiences. His decision to disable vanity metrics resonated, especially considering how often engagement numbers are inflated in corporate settings. The episode wrapped with a thoughtful discussion on how CISOs can say "no" more effectively, emphasizing "yes, but" strategies and the importance of consistency. We also debated the usability frustrations of "magic links" for authentication, arguing that simpler alternatives like passkeys or multi-factor codes could offer a better balance between security and convenience. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-389
In this latest Enterprise Security Weekly episode, we explored some significant cybersecurity developments, starting with Veracode's acquisition of Phylum, a company specializing in detecting malicious code in open-source libraries. The acquisition sparked speculation that it might be more about Veracode staying relevant in a rapidly evolving market rather than a strategic growth move, especially given the rising influence of AI-driven code analysis tools. We also covered One Password's acquisition of a UK-based shadow IT detection firm, raising interesting questions about their expansion into access management. Notably, the deal involved celebrity investors like Matthew McConaughey and Ashton Kutcher, suggesting a trend where Hollywood influence intersects with cybersecurity branding. A major highlight was the Cyber Haven breach, where a compromised Chrome extension update led to stolen credentials. The attack was executed through a phishing campaign disguised as a Google policy violation warning. To their credit, Cyber Haven responded swiftly, pulling the extension within two hours and maintaining transparency throughout. This incident underscored broader concerns around the poor security of browser extensions, an issue that continues to be exploited due to lax marketplace oversight. We also reflected on Corey Doctorow's concept of "Enshittification," critiquing platforms that prioritize profit and engagement metrics over genuine user experiences. His decision to disable vanity metrics resonated, especially considering how often engagement numbers are inflated in corporate settings. The episode wrapped with a thoughtful discussion on how CISOs can say "no" more effectively, emphasizing "yes, but" strategies and the importance of consistency. We also debated the usability frustrations of "magic links" for authentication, arguing that simpler alternatives like passkeys or multi-factor codes could offer a better balance between security and convenience. Show Notes: https://securityweekly.com/esw-389
In this latest Enterprise Security Weekly episode, we explored some significant cybersecurity developments, starting with Veracode's acquisition of Phylum, a company specializing in detecting malicious code in open-source libraries. The acquisition sparked speculation that it might be more about Veracode staying relevant in a rapidly evolving market rather than a strategic growth move, especially given the rising influence of AI-driven code analysis tools. We also covered One Password's acquisition of a UK-based shadow IT detection firm, raising interesting questions about their expansion into access management. Notably, the deal involved celebrity investors like Matthew McConaughey and Ashton Kutcher, suggesting a trend where Hollywood influence intersects with cybersecurity branding. A major highlight was the Cyber Haven breach, where a compromised Chrome extension update led to stolen credentials. The attack was executed through a phishing campaign disguised as a Google policy violation warning. To their credit, Cyber Haven responded swiftly, pulling the extension within two hours and maintaining transparency throughout. This incident underscored broader concerns around the poor security of browser extensions, an issue that continues to be exploited due to lax marketplace oversight. We also reflected on Corey Doctorow's concept of "Enshittification," critiquing platforms that prioritize profit and engagement metrics over genuine user experiences. His decision to disable vanity metrics resonated, especially considering how often engagement numbers are inflated in corporate settings. The episode wrapped with a thoughtful discussion on how CISOs can say "no" more effectively, emphasizing "yes, but" strategies and the importance of consistency. We also debated the usability frustrations of "magic links" for authentication, arguing that simpler alternatives like passkeys or multi-factor codes could offer a better balance between security and convenience. Show Notes: https://securityweekly.com/esw-389
In this episode, Neil and Sam dive into five essential tools you need to streamline your law firm's operations and boost efficiency. Tools like Loom, Slack, Google Docs, and OnePassword can transform communication, task management, and security, helping you optimize workflows and protect sensitive information.They share actionable insights to help you delegate tasks effectively, secure your digital assets, and free yourself from the inefficiencies of email.Key Takeaways from Neil and Sam:1. Loom: Best Video Communication and Training ToolLoom revolutionizes law firm training by enabling quick video recordings for onboarding, eliminating the need for in-person meetings. This essential tool allows lawyers to create easily followed SOPs, saving time and enhancing client communication through personalized updates—all for just $8 a month.2. Slack: The Central Hub for Team CommunicationSlack organizes communication into channels for teams and cases, effectively reducing email clutter. Its integration with tools like Google Drive and CRMs streamlines operations. Additionally, two-factor authentication ensures the secure management of sensitive legal information.3. Google Sheets: The Ultimate Tool for Data ManagementGoogle Sheets is vital for tracking client data and case progress, offering quick analysis through features like pivot tables. Its integration with Zapier and Google Apps Script enables automation, while dashboards support financial tracking and task management to keep teams aligned.4. Todoist and Google Calendar: Mastering Task and Time ManagementTodoist helps manage daily tasks, while Google Calendar facilitates scheduling, ensuring tasks are linked to specific time slots. Their integration minimizes missed deadlines and simplifies delegation, enhancing overall team efficiency.5. 1Password: Securing Sensitive Information1Password provides secure password storage and sharing without revealing information to staff. With two-factor authentication for added protection, it's essential for managing sensitive data. Additionally, it plays a crucial role in succession planning, ensuring that important information remains accessible during emergencies. "Once you start using it, find out everything that tool can do. Don't be satisfied with using it for 10 percent of what it's capable of doing." — Neil Tyra"Every tool is worth it if you use it. If you don't use it, it's not worth it." — Sam Mollaei
Send us a Text Message.Dave Lewis, the global advisory CISO at OnePassword, shares his fascinating journey from the music industry to a thriving career in cybersecurity. With a background in music and a natural curiosity for computers, Dave's unconventional path highlights the diverse entry points into the cybersecurity field. His extensive experience, spanning various industries and roles, offers valuable insights into the evolving landscape of cybersecurity and its critical importance in our everyday lives. Dave's engaging narrative style, combined with his technical expertise, makes his journey an inspiring example for individuals considering a career change to cybersecurity, providing a unique perspective and practical insights into this dynamic field.We have to be okay with failure as long as we're learning from it. If somebody says their failure is not an option, they're not learning. - Dave LewisConnect with Dave Lewisemail: gattaca@1password.comWebsite: https://www.liquidmatrix.orgTwitter / X: https://x.com/gattacaLiquidMatrix: (Apple): https://podcasts.apple.com/ca/podcast/liquidmatrix-security-digest-podcast/id533166516Connect with usWebsite: securitymasterminds.buzzsprout.comKnowBe4 Resources:KnowBe4 Blog: https://blog.knowbe4.comJames McQuiggan - https://www.linkedin.com/in/jmcquigganErich Kron: https://www.linkedin.com/in/erichkron/Music Composed by: Brian Sanyshyn - https://www.briansanyshynmusic.comAnnouncer: Sarah McQuiggan - https://www.sarahmcquiggan.comShow Notes created with Capsho - www.capsho.comSound Engineering - Matthew Bliss, MB Podcasts.If you'd like to ask Matt what he can do for your podcast, visit https://www.mbpod.com and schedule a consultation today!
Unlocking IT Excellence: Insights from Joseph Apps, CEO of JoeApp's Technology SupportJoin us as we dive into the dynamic world of IT hiring with Joseph Apps, a seasoned technology expert and the forward-thinking CEO of JoeApp's Technology Support. In this episode, Joseph shares invaluable insights on the evolving landscape of IT recruitment, emphasizing the critical skills in demand, such as Google and Microsoft management, cloud infrastructure, and AI readiness.Key Takeaways:Stay Ahead of Trends: Discover why staying updated with industry trends and continuous learning are crucial for IT professionals.Essential Skills: Learn about the significance of customer service skills, practical experience, and certifications in securing top IT positions.Cybersecurity Focus: Joseph highlights the importance of robust cybersecurity practices and recommends using password management apps like OnePassword for enhanced security.Managing Multi-Generational Teams: Gain insights into the challenges and strategies of managing a diverse workforce, including establishing credibility and creating a culture of accountability.Employee Retention Strategies: Explore JoeApp's successful retention strategies, including regular one-on-one meetings, quarterly reviews, and aligning employees with the company's vision and core values.Joseph's expertise and practical advice are a must-listen for IT professionals and business leaders looking to navigate the complexities of the tech industry. Tune in to discover how to build a resilient and future-ready IT team.Keywords: IT hiring, technology support, Joseph Apps, JoeApp's, IT industry trends, customer service skills, cybersecurity, password management, OnePassword, multi-generational workforce, employee retention, IT recruitment, cloud infrastructure, AI readiness, Google management, Microsoft management.
Are you equipped to make fast, effective decisions and protect your business from internet crime?We just wrapped up a thought-provoking conversation with Dylan Evans on the latest episode of Schmidt List, where we tackled the intricacies of decision-making in business and the ever-evolving challenges of cybersecurity.In this episode:Amazon's strategy of minimal coordination
Discover expert strategies for managing multiple Amazon Seller Central accounts with ease in this insightful video. Join us as we delve into the importance of One Time Password (OTP) systems, best practices for account security using tools like One Password, and effective methods for handling client turnover. Whether you're a boutique agency or looking to scale beyond 40 accounts, get actionable advice to streamline your Amazon account management process and ensure seamless operations. Perfect for Amazon sellers, agencies, and anyone interested in optimizing their Amazon business operations.#AmazonSeller, #AccountManagement, #SellerCentralTips, #EcommerceStrategy, #AmazonAgencyGet a free professional video where we analyze your ASIN:https://myamazonguy.com/asin-review/Timestamps:00:00 - Introduction and Greetings00:11 - Managing Multiple Amazon Accounts: Question00:33 - Importance of OTP Systems for Amazon Sellers01:35 - Strategy for Managing Multiple Client Accounts02:47 - Using One Password for Account Security03:59 - Benefits of One Password for Agencies04:10 - Follow-Up on Password Management and Virtual Desktops05:32 - Advice for Scaling Beyond 40 Accounts→ Save 20% on your first 6 months of Helium 10!↳ Use code STEVENPOPE6M20 at https://bit.ly/3RTm5id→ Already have Helium 10?↳ Exclusive MAG discount for upgrading existing accounts at https://myamazonguy.com/h10upgrade-----------------------------------------------------------------------------------------Join My Amazon Guy on LinkedIn: hhttps://www.linkedin.com/company/28605816/Follow us:Twitter: https://twitter.com/myamazonguyInstagram: https://www.instagram.com/stevenpopemag/Pinterest: https://www.pinterest.com/myamazonguys/Please subscribe to the podcast at: https://podcast.myamazonguy.comApple Podcast: https://podcasts.apple.com/us/podcast/my-amazon-guy/id1501974229Spotify: https://open.spotify.com/show/4A5ASHGGfr6s4wWNQIqyVwSupport the show
Joel Chinsky's journey in the world of technology began in the late 80s when his father worked for a company that allowed him to work from home, making them one of the few families to own a home computer at the time. Joel fell in love with technology, spending hours playing games and learning basic programming. This early exposure ignited his passion for technology and set him on a path of exploration and discovery.Joel's curiosity and determination led him to build his first home computer, a project that took him six days to complete. This experience of problem-solving and overcoming challenges laid the foundation for his future career in technology.After working for various large companies, Joel realized that he wanted to do more for businesses and himself. He observed a lack of progress and a short-sighted approach to technology in many organizations. This realization prompted him to start JDC Tek in 2007, with a vision to provide high-quality solutions and elevate the standards in the industry.In the rapidly evolving world of technology, education is crucial. Joel understands the importance of staying up-to-date with the latest advancements and sharing that knowledge with his clients. Through continuous learning and participation in security and IT peer groups, Joel and his team stay informed about industry trends and best practices.By focusing on the needs of his clients and providing them with valuable information through newsletters, social media posts, and direct emails, Joel ensures that they are well-informed and equipped to make the best decisions for their businesses. His approach is rooted in transparency and a genuine desire to help his clients succeed.Artificial Intelligence (AI) is a topic that has garnered significant attention in recent years. While its potential is vast, there are also concerns about its impact. Joel acknowledges that AI will undoubtedly have an impact on various industries, but the extent of that impact is still uncertain.Joel believes that AI can be a powerful tool when used ethically and responsibly. It can automate processes, improve efficiency, and enhance user experiences. However, it is essential to remain vigilant and address the potential risks associated with AI, such as data privacy and security concerns.In today's digital landscape, cybersecurity is a critical concern for businesses of all sizes. Unfortunately, many companies ignore security concerns until they are forced to deal with them. Joel emphasizes the need for organizations to take cybersecurity seriously and comply with regulations such as HIPAA and PCI.Joel highlights the importance of implementing best practices, such as using unique passwords for each site and service, and utilizing password managers to enhance security. He also mentions the FTC safeguard rule, which applies to a wide range of businesses and requires compliance to protect sensitive data.Beyond his passion for technology, Joel also values the joys of life outside the digital realm. He and his family love road trips and exploring the beauty of Michigan in all seasons. Joel's love for planning and discovering new places allows him to create memorable experiences for his family.Links:BitWarden app Joel mentioned: https://bitwarden.com/JDC Tek Website: https://jdctek.com/Phone: 248-494-7253Email: Joel@jdctek.com Connect with our hosts:Trish Carruth from The Personal Jeweler - https://www.thepersonaljeweler.com/Jon Gay from JAG in Detroit Podcasts - http://www.jagindetroit.com/Lisa Bibbee from Keller Williams - http://soldbylisab.com/ Learn more about the Royal Oak Chamber of Commerce: https://www.royaloakchamber.com/Connect with our hosts:Jon Gay from JAG in Detroit Podcasts - http://www.jagindetroit.com/Lisa Bibbee from Keller Williams - http://soldbylisab.com/
Are you an entrepreneur concerned with the dilemma of sharing passwords without compromising your security or opening yourself up to hackers? In this episode of Build Your Tribe, Chalene Johnson addresses the concerns most have about sharing passwords and sensitive information in the business realm. Drawing from her personal experience of a significant hack in 2015, Chalene stresses the paramount importance of safeguarding your digital assets from potential cyber threats and hackers to ensure all of your accounts remain safe and secure. Are you an entrepreneur grappling with the best way to delegate digital access without compromising on security? Chalene's top solution is the innovative use of password managers, with a spotlight on "One Password." Discover how you can strategically create separate "vaults" for different staff members whether they are virtual or not and ensure they only see what they need to, balancing trust and security. Watch this episode on YouTube!! Links from today's Episode: Top Password Managers 1Password LastPass Keeper NordPass Dashlane Top VPNs NordVPN Surfshark ExpressVPN IPVanish Past Episodes Everyone Is Getting Hacked | Here's How to Avoid And Prevent It Download and Save So You Don't Get Hacked Part 1: Passwords Won't Protect You | How to NOT be Hacked Part 2: What You're Doing to Invite Hackers & What to Fix First Check out Steve Dotto of Dotto Tech Check out InstaClubHub!! For Just $7!! The ONLY All-In-One Instagram Resource Community Designed To...Grow Your Following and Reach More Customers on Instagram™(All in Just Five Minutes a Day!) Go to InstaClubHub.com/Trial To get the exclusive offer for my listeners go to magbreakthrough.com/BYT and enter code BYT to get 10% off any order We would love to hear from you! Leave your questions or messages for Chalene and Brock RIGHT HERE Join me on Patreon 7 Days for FREE!! THE ULTIMATE show for Lifers who want insider-girlfriend-relatable content. In other words, lots more tea! Go to http://chalene.com/more Sign Up For MY WEEKLY NEWSLETTER Subscribe to The Chalene Show!! Links you may want to check out: Check out Bret's ALL NEW Course Money Matters 101 at Chalene.com/moneymatters Check out MarketingImpactAcademy.com Join our awesome PodSquad on Facebook here! Be sure to check out the Push Journals and Notebooks!! Go to PushJournal.com Leave Chalene or Brock a question or message RIGHT HERE Connect with us on your fav social platform: Chalene: Instagram: www.Instagram.com/ChaleneJohnson Facebook: www.Facebook.com/Chalene TikTok: @chaleneOfficial Twitter: www.Twitter.com/ChaleneJohnson Brock: Instagram: @Brock11Johnson TikTock: @brock11johnnson Be sure to follow Brock on his travel adventures @tayandbrock Be sure you are subscribed to this podcast to automatically receive your episodes!!! Get episode show notes here: www.chalenejohnson.com/podcast Hey! Send me a DM & tell me what you think about the show! (Use the Hashtag) #BuildYourTribe so I know you're a homie! XOXO Chalene
- Analysis and insights: 'Rick and Morty' season.- Fitness-centric TV shows: 'Fast and Furious', 'Superman', 'Rick and Morty'.- Movie discussion: 'The Covenant', 'The Morning Show' Season 3, 'Foundation' series, 'Five Nights at Freddy's' movie trailer.- Video Game ecosystem: Player switch rationale within 'Finals', 'Apex', 'Fortnite', 'Call of Duty', 'Contra Strike'.- Discord join invitation for listeners.- Literary sessions: Isaac Asimov's book review and relation to Loki TV series.- Game launches: 'Alan Wake 2', alternatives like 'RoboCop: Rogue City', first impressions of 'Spider-Man 2' for PlayStation, PlayStation 5 Slim Edition.- Professional gaming culture update - gaming trends and streaming updates.- Electric Vehicle News - 'Cruise', 'Waymo', Ford F-150, Tesla Model 3.- Tech Talk - User experience of 'One Password', 'Bitwarden', 'FastMail'.- Personal Segment: Hiking trip experience in Boulder, Colorado.
Main Topics:Google Meet using Chrome on MacOS and facing Mac screen sharing issues.Transition from Zoho to FastMail, focusing on privacy and benefits.FastMail's pseudo email features and its cooperation with One Password.Differences and similarities between FastMail and Google Workspace.Deep analysis of Tesla's self-driving technology and neural network models.Evaluation of Tesla's autonomous driving performance.Technological understanding behind self-driving cars, discussing self-parking, sensors, cameras, and radar.Relationship of radar, LiDAR, and Microsoft Kinect in autonomous cars.Discussion on crash rates of autonomous cars vs human-driven cars.Comparing Waymo, Cruise, and Chevy Bolt EV costs and experiences.Introduction of Waymo's partnership with a Chinese manufacturer for a purpose-built car.Speculating the future of self-driving cars.Electric vehicle industry: challenges, GM's Ultium platform benefits, and cost savings.Review and analysis of films including Barbie, No Hard Feelings, Palm Springs, Deadpool, The Proposal, Zoolander, and Naked Gun.References:Google MeetChrome (macOS)ZohoFastMailiCloud+One PasswordGoogle WorkspaceTeslaROS (Robot Operating System)Microsoft KinectWaymoCruiseChevy Bolt EVGM's Ultium platformVarious films: Barbie, No Hard Feelings, Palm Springs, Deadpool, The Proposal, Zoolander, Naked Gun, Hotshot, Lethal Weapon, American Pie, Free guy.Reach Out: Engage with us and the community on our Discord Channel.
Imagine you're a small business or household that just lost everything in a fire, and your phones, ipads, and laptops went up in flames too. Where do you start? You've got a cloud-based password manager (e.g. Dashlane, OnePassword, KeyPass) and MFA system (e.g. Google Authenticator, Authy). How do you authenticate yourself with these systems if you have all new hardware? That's what we're talking about in this episode. We reference this great previous episode about being prepared for disasters:https://www.backupcentral.com/how-to-prepare-for-an-emergency-at-home-and-work/
Your iPhone, iPad, and Mac now have a built-in password feature, complete with two-factor authentication. Read the article here.
Hello & welcome back!I'm really excited to kick off 2023 with today's guests – who are experts at making life admin tasks run smoothly.Authors of the book Life Admin Hacks, Mia Northrop & Dinah Rowe-Roberts have marshalled their professional expertise in innovation, finance, design thinking and operations to research best practices, trial the tech and craft the most efficient processes to optimise their own life admin.If you have no idea what's for dinner tonight. You need a gift for that party next week. You still haven't consolidated your super. You're out of contract on your phone and paying who knows what. Those cupboards won't declutter themselves. The kids need a plan for the next school holidays. Etc etc …then these ladies are the life admin guides you've been waiting for.I'm so excited that they'll be our Super Star speakers in January for the participants of my Platinum Coaching Program – and very excited to share some of their wisdom with you in this episode.In today's podcast episode you'll learn:How life admin can't be eliminated, but can be minimised, automated and better shared within families.How a considered approach can reduce overwhelm, give you way more spare time and save you thousands of dollars.The 5 foundations of life admin … and how knowing them is the best place to start…Why having a good ‘Reason Why' is essential if you want to get your life admin under controlHow important it is to have a shared family calendarHow liberating it is when you get on top of simple things – like managing your passwords…‘List hygiene' …and the 3 types of lists you need to treat differently.Practical and easy approaches to Meal Planning & Shopping list…and so much more. I would LOVE to hear what you take from this podcast – so please share and let's keep the conversation going in the Dream Life Podcast Facebook group here. And please share this episode with anyone who you feel may benefit from it. Let's inspire many more millions around the world.Have a wonderful week!Love,Dream Life Founder SHOW NOTES:The book: Life Admin Hacks, by Mia Northrop & Dinah Rowe-Roberts Checkout my Dream Life Platinum Coaching Program here… where Dinah and Mia are our January ‘Super Star Speakers'.Password manager apps recommended were Keeper, Last Pass (family subscription recommended) or One Password.Find beautiful and practical Meal Planner Notepads here…Find gorgeous paper Shopping List Notepads here…Listen to my podcast episode with Gretchen Rubin, author of New York Times bestseller The Happiness Project here..Think Again, by Adam Grant – book recommended by DinahBuy your Plan Your Year Journal here……and if you can't wait for a physical journal, you can buy the downloadable version here so you can get started with planning immediately.Learn about my 12-Month Coaching Program & Online Course here… where we'll be focussing deeper in January on Planning for a brilliant 2023. RESOURCES:Learn how to transform your life with a Gratitude Journal here…Take your first step to getting clarity on what you want from life with this free bonus dreaming exercise here 101 Dreams Audio Guide Learn more about my Habit Club here...Buy my book Your Dream Life Starts Here.Learn more about my Personal Growth / Book Club - GROW here…Join our Dream Life Podcast Facebook Group here - and jump into discussions & learning with like-minded people. Help up spread this inspiring message to even more people by sharing our podcast on social media with the hashtag #101milliondreamers Download a review of My Top 10 Favourite Books of all timeShop inspiring & meaningful products at The Dream Life Store here.Follow Kristina on Instagram Follow Kristina on Facebook
Facilitators: Maria and Sandhya Topics: apps for reading image-based PDF's; turning off voice control; trouble making calls with Siri; turning off speech versus turning off VoiceOver; cross-platform password manager - One Password and One Password; blocking junk calls; iBUG Bytes - turning off read receipts in messages app; setting up reminders on a new iPhone; can you share sound on Zoom on iPhone? no; iToys segment - Apple Watch Ultra - Tamer; focus mode not turning off; using Air Pods Pro Max to listen to Bard books.
Do you know if you've been pwned? If you don't even know what that means, don't worry, you're not alone. The world of internet security can be a scary place, and it's not always easy to know where to start with protecting ourselves online. But as freelancers, it's a subject we can't afford to just ignore and hope it won't affect us.In this episode, Ross Wintle, a software developer and former freelancer, shares his tips to keep our online assets safe and sound. Listen in to hear:The four critical services we should make sure we are protectingWhy a password manager is an essential investment for your businessHow to check if you have been "pwned" (and what it means!)Some easy steps you can take to keep your information – and business – secure.Resources:Article by Ross on cybersecurity: https://rosswintle.uk/2020/01/stepping-up-the-security-ladder/Have I Been Pwned: https://haveibeenpwned.com/LastPass: https://lastpass.com/One Password: https://1password.com/ Say hi to Ross:Website: https://rosswintle.uk/Twitter: @magicroundaboutSay hi to Louise:Louise Shanahan is a freelance health and medical copywriter and a big fan of finding your freelance niche. She's on a mission to help others build a freelance business that feels easy and works for them – in weekly snack-sized bites.LinkedIn: Louise ShanahanTwitter: @LouiseShanahan_Website: thecopyprescription.comIf you find this episode helpful and you'd like to show your appreciation, consider leaving a tip over at ko-fi.com/15minutefreelancer. All donations help cover the cost of running the podcast and are very much appreciated!
Your Insiders are Laurie / Oushinery / outshinery.com Jonathan / Bottlebooks / bottlebooks.me Seb / Troly / troly.io The insiders dive into the technology they use to make their own companies run better. Some of the technology we talk about: Text expander https://textexpander.com/ Drift https://www.drift.com/ Clickup https://clickup.com/ Asana https://app.asana.com/ Slack https://slack.com/ One Password https://1password.com/ Google Docs https://www.google.com/docs/about/ Intercom https://www.intercom.com/ HubSpot https://www.hubspot.com/ Active campaign https://www.activecampaign.com/
It's hard to keep up with best practices for technology and the latest apps, so in this episode we chat to expert Lynette Coulston to get her tips on essential digital life admin tools. About Lynette Coulston Lynette Coulston had a 30+ year career in software development and IT but in 2012 she left that all behind to create iTandCoffee, a business focussed on offering technology support and education to residents of her local area, through relaxed, social gatherings and individualised support - where technology topics could be discussed and explained in a friendly, understanding environment, over a cuppa! Over the years this has extended to include support and training for those in small business, for parents struggling to manage the family's technology, for those returning to the workforce or study, and for those who just want to better understand how their technology can help them manage their day-to-day life. This episode is full of practical tips and recommendations including: the importance of having a digital filing system and understanding where your files are saved - this is important to teach kids too! using inbuilt functionality on your computer (eg Time Machine for a Mac) to make sure you backup your files using apps like Reminders to remind you of important life admin tasks making the most of Voice Assistants to add reminders on the go (Siri or Google Assistant) selecting a calendar app that works best for you - Lynette uses Fantastical and WeekCal when you are helping others with their technology ask them to read to you what they see on the screen or use the share screen feature in programs like Zoom setting up parental controls like Screen Time before you give children a device setting up a home router that can restrict internet access for each device to supplement parental controls making sure you have good scanning apps on your phone to scan straighten, crop, clarify documents - Lynette recommends Scannable, Office Lens, Adobe Fill & Sign and Photomyne making sure you have strong and different passwords to reduce the risk of phishing, Lynette recommends using a password manager (Last Pass, One Password, Dashlane) or a secure note. We also discuss the curve of forgetting and how people can become easily frustrated when trying to use technology, particularly when they compare themselves to others. Lynette discusses the curve of forgetting and that it will be difficult to retain how to use technology unless you use it on a regular basis. RESOURCES IT and Coffee - Lynette's support and training business Time Machine - for backing up Apple computers Siri Voice Assistant Reminders App Fantastical Calendar App WeekCal - iPhone App Setting up screentime on an iPad/iPhone Parental control routers Scanning Apps - Scannable by Evernote, Office lens, Photomyne photo scanning app, Adobe - Fill and sign Have I been pwned? - check you credentials for data breaches Password Managers - Last Pass, One Password, Dashlane The curve of forgetting - how information is lost over time when there is no attempt to retain it. Episode 2 Going paperless - cloud storage Episode 4 - Mastering To Do Lists Episode 3 Managing passwords and form filling data SHARE Please head to the Life Admin Life Hacks Facebook, Insta or Linked In pages to connect with listeners and share your thoughts, questions or suggestions.
Shannon Huffman Polson is an Author, Leadership Speaker, and U.S. Army Veteran. She is the founder of The Grit Institute, where she focuses on leadership and grit based on her years of service and her time in the corporate world. Shannon studied English Literature and Art History at Duke University. At her graduation, she was commissioned as a 2LT in Army Aviation and became one of the first women to fly the Apache helicopter in the U.S. Army, where she has led two flight platoons and line units on three continents. She later earned her MBA in Business Administration from the Tuck School of Business at Dartmouth College.Her love for leadership has led her to combine her passion and firsthand experience along with her study of leadership and grit to deliver world-class training to companies and organizations. She energizes her audience across the country and around the world to overcome resistance, connect to their core purpose and commit to courageous ownership under the most challenging conditions. Currently, she is an American writer and leadership development consultant. Listen in as they discuss:Grit and its definition.How Shannon uses grit to survive in corporate culture.The importance of staying focus to achieve your goals.How Shannon helps others to cultivate grit in their children and their organization.What is grounded optimism?Ways to build your grit.The worst advice Shannon has seen or heard given in her area of expertise of grit and resilience and grounded optimism in order to be better every day.What kind of mindset you will need to develop to build resilience and grit.And, more!TIP OF THE WEEKMark: My tip of the week is go to shannonpolson.com and get the Grit Factor book. Check out Shannon's articles, essays and she has an institute: The Little Book of Grit, The Road Ahead, The Way the Wild Gets Inside and there's a ton.Scott: Check out bobbyapp.co, it keeps track of all of those subscriptions that you've signed up for: Netflix, One Password, whatever it is you add it to here. That way you'll never forget your subscriptions.Shannon: I have two tips! The first is, keeping track of what's going on every day in a journal that you write in is really helpful, and keeping track of finances (quick shout out to Taylor Money, which is my husband's tech company) is an outstanding way to look at your finances every single day, and to be able to know what's your status is every single day. You have complete control.The second thing is a book by Brian Doyle called One Long River of Song, I'm recommending it because the most important thing that you do, and the most important key to your success is people, and it always has to do with people. Brain Doyle will connect you to the most human part of yourself in a way that will literally bring tears to your eyes. If you're not taking time to connect to that human part of yourselves and others, success is a hard thing to find.WANT TO LISTEN MORE?Did you like this episode? If so, tune into another one of our exciting episodes with special guest Noah St. John as we discuss AFFORMATION and how it will help you to reach your goals.Isn't it time to create passive income so you can work where you want, when you want and with whomever you want?
This course is full of extremely useful and well-researched lessons with tons of time management strategies that will help you maximize the results you get every day in your business or personal life. Whether you're an employee, entrepreneur or a successful business owner, this course has everything you need to get more done in less time.
The Colonial Pipeline has was pulled off from one breached password. This episode talks about what happened and the steps that could have been in place to prevent this. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/SecurityInFive Binary Blogger Website Security In Five Website Security In Five Podcast Page - Podcast RSS Twitter @securityinfive iTunes, YouTube, TuneIn, iHeartRadio,
Moving photos off of old computers. Troubleshooting a printer after a firmware update, what happened with the Last Past free tier, good laptop choices, issues with a caller's M1, proper ways to backup your computer, bonding two ISP's for rollover, talking with Sam Abuelsamid, Chris Marquardt, Rod Pyle, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: Uber.com/TECHGUY Babbel.com code TECHGUY conga.com/twit
Moving photos off of old computers. Troubleshooting a printer after a firmware update, what happened with the Last Past free tier, good laptop choices, issues with a caller's M1, proper ways to backup your computer, bonding two ISP's for rollover, talking with Sam Abuelsamid, Chris Marquardt, Rod Pyle, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: Uber.com/TECHGUY Babbel.com code TECHGUY conga.com/twit
Moving photos off of old computers. Troubleshooting a printer after a firmware update, what happened with the Last Past free tier, good laptop choices, issues with a caller's M1, proper ways to backup your computer, bonding two ISP's for rollover, talking with Sam Abuelsamid, Chris Marquardt, Rod Pyle, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: Uber.com/TECHGUY Babbel.com code TECHGUY conga.com/twit
Moving photos off of old computers. Troubleshooting a printer after a firmware update, what happened with the Last Past free tier, good laptop choices, issues with a caller's M1, proper ways to backup your computer, bonding two ISP's for rollover, talking with Sam Abuelsamid, Chris Marquardt, Rod Pyle, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: Uber.com/TECHGUY Babbel.com code TECHGUY conga.com/twit
Moving photos off of old computers. Troubleshooting a printer after a firmware update, what happened with the Last Past free tier, good laptop choices, issues with a caller's M1, proper ways to backup your computer, bonding two ISP's for rollover, talking with Sam Abuelsamid, Chris Marquardt, Rod Pyle, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: Uber.com/TECHGUY Babbel.com code TECHGUY conga.com/twit
Moving photos off of old computers. Troubleshooting a printer after a firmware update, what happened with the Last Past free tier, good laptop choices, issues with a caller's M1, proper ways to backup your computer, bonding two ISP's for rollover, talking with Sam Abuelsamid, Chris Marquardt, Rod Pyle, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: Uber.com/TECHGUY Babbel.com code TECHGUY conga.com/twit
Moving photos off of old computers. Troubleshooting a printer after a firmware update, what happened with the Last Past free tier, good laptop choices, issues with a caller's M1, proper ways to backup your computer, bonding two ISP's for rollover, talking with Sam Abuelsamid, Chris Marquardt, Rod Pyle, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: Uber.com/TECHGUY Babbel.com code TECHGUY conga.com/twit
Moving photos off of old computers. Troubleshooting a printer after a firmware update, what happened with the Last Past free tier, good laptop choices, issues with a caller's M1, proper ways to backup your computer, bonding two ISP's for rollover, talking with Sam Abuelsamid, Chris Marquardt, Rod Pyle, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: Uber.com/TECHGUY Babbel.com code TECHGUY conga.com/twit
Moving photos off of old computers. Troubleshooting a printer after a firmware update, what happened with the Last Past free tier, good laptop choices, issues with a caller's M1, proper ways to backup your computer, bonding two ISP's for rollover, talking with Sam Abuelsamid, Chris Marquardt, Rod Pyle, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: Uber.com/TECHGUY Babbel.com code TECHGUY conga.com/twit
Moving photos off of old computers. Troubleshooting a printer after a firmware update, what happened with the Last Past free tier, good laptop choices, issues with a caller's M1, proper ways to backup your computer, bonding two ISP's for rollover, talking with Sam Abuelsamid, Chris Marquardt, Rod Pyle, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: Uber.com/TECHGUY Babbel.com code TECHGUY conga.com/twit
Moving photos off of old computers. Troubleshooting a printer after a firmware update, what happened with the Last Past free tier, good laptop choices, issues with a caller's M1, proper ways to backup your computer, bonding two ISP's for rollover, talking with Sam Abuelsamid, Chris Marquardt, Rod Pyle, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: Uber.com/TECHGUY Babbel.com code TECHGUY conga.com/twit
Moving photos off of old computers. Troubleshooting a printer after a firmware update, what happened with the Last Past free tier, good laptop choices, issues with a caller's M1, proper ways to backup your computer, bonding two ISP's for rollover, talking with Sam Abuelsamid, Chris Marquardt, Rod Pyle, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: Uber.com/TECHGUY Babbel.com code TECHGUY conga.com/twit
Hablamos sobre la seguridad en los Mac: Pedro Aznar (@pedroaznar), Eduardo Archanco (@eaala) y Julio César Muñoz (@jcfmunoz) hablan del M1 "swapping", donde Julio nos detalla en qué consiste y cuales han sido las pruebas y conclusiones que hemos publicado en su artículo de Applesfera. También retomamos la conversación de la semana pasada repasando aplicaciones para Mac recomendadas en una primera instalación y últimos descubrimientos, así como varios consejos importantes a los que no solemos hacer caso: desde los backups con Time Machine, hasta el retorno de One Password como gran gestor de contraseñas. *** Las Charlas de Applesfera es el podcast del equipo de Applesfera, donde se trata el gran tema de la semana y su contexto - contado por los expertos que te acompañan en el mundo Apple desde 2006. Contacta con el director en (pedroaznar@applesfera.com) o con el equipo en (editores@applesfera.com). Gracias por escuchar este podcast.
Carrie & Tommy Catchup - Hit Network - Carrie Bickmore and Tommy Little
Evie Stefan Thomas Bitcoin guy from America Adults who Ice … latte Chris Golf Average Mean or Median The Paper Quiz See omnystudio.com/listener for privacy information.
Today’s episode is all about cybersecurity and protecting your information. Juanita McDowell joins Monica today to share her great and easy-to-implement tips to keep your data safe. They talk about what cybersecurity is, what we really need to protect, and best practices for several different platforms agents use in their business on a regular basis. Some agents will collect the same information as an online lender, with full disclosure to their client, so there is someone else they trust with this information. By law, personal information has to be protected. When it comes to sensitive information, the “biggies” are social security numbers and date of birth — especially birth year. As an agent, if you feel like you need to collect this information, it is your responsibility to destroy it when it’s no longer needed (shred) and protect it upfront (encrypt before making any digital copies). There are certain things you should never put online if you can avoid it; if a hacker or bot gets your information for one site, it is likely they can apply that information to other sites that may be more sensitive. When it comes to passwords, it’s no longer just a strong password — 2-step verification is key! When creating your password, incorporate lowercase, uppercase, symbols, and numbers. Once you have a strong password, a 2-step verification is an extra layer of security when you sign in from an IP address it doesn’t recognize. If passwords are a challenge for you, use a password locker like LastPass or One Password. You can also create a “master” password and add a memory jogger that is unique to each site you use your password for. We store so much information on our computers and phones, it’s important to safeguard those devices with passwords as well. Make sure those types of devices are virus protected as well. Juanita shares some best practices for using Dropbox, including what you should not post to Dropbox, features within Dropbox that you can use, and doing health checkups to see what all is accessing your DB account. With all the different systems we engage with every day, it’s incredibly important to know what they do and what’s the best use for them. Spend some time and take inventory of what applications and systems you are using, and do some security check-ups to make sure your apps are up-to-date. With subscription-based platforms, the user is the one that needs to tighten them up and make sure they are secure. If you use Google, Juanita’s homework assignment is to go to myaccounts.google.com and do a security checkup of your account. Although it’s convenient, it’s not the best idea to store passwords in your browser. A password locker would be better. All of your devices need a backup system! You need to make sure that your files are being backed up to a reputable cloud, and you want to double-check the security settings. Be very careful about what sensitive information you store in your CRMs. Do your due diligence in picking a CRM provider. The number one thing when it comes to email is to SLOW DOWN. Don’t open attachments or click on links from people you don’t know, and take a second look from people you do know. You can hover over a link or an email address to make sure it looks legitimate. The other thing about email is to make sure you are checking and responding on a secure network. A VPN is a virtual private network, and it creates a secure tunnel for any of your computer traffic when you’re in a public setting. Anything that is posted on social media could be read by anyone or everyone. Even if you delete a post, someone could have already saved or shared this with someone else. There are privacy settings on many social media platforms that can help you recover your data if it’s compromised. You should also set up 2-step verification for your social media accounts. If you have an account you aren’t using anymore, just take it down. One of the best tips for working with virtual assistants is to create a separate login and password just for them, so they have access to the systems but not your password. Once they are done, change the password so there is no longer access tied to it. It is also important to ensure they have a secure network and their own computer. When it comes to home security, make sure you change the default password for your router. Trust your gut when it comes to home security and investigate when things seem off. Juanita’s best practices: stay off free wifi networks unless you have a VPN, create strong passwords, make sure you backup your data. Keep your apps up to date, and know where all of your data is. For agents, put together a data security policy so you know exactly what to do if you are hacked. Tweetables: “First of all I would challenge people, don’t get it if you don’t need it.” — Monica “One of the problems that we have is that we’re thinking of the hackers as an individual. Today, our hackers are no longer individuals. They have the sophisticated software that can run bots all over the place.” — Juanita “I always tell my agents anything you type on your computer and you send out into the world, you need to know that it could be read by anybody and everybody in the world.” — Monica Guest Links: Juanitamcdowell.com Youtube.com/channel/UCWp3Yrya05q7xbhD8wVccFw Last Pass 1Password Avira Malwarebytes Avast Boxcryptor Carbonite iDrive Private Internet Access VPN Additional Links: Crdpodcast.com Online learning.REALTOR for NAR Online Education Training4RE.com — List of Classroom Courses from NAR and its affiliates CRD@REALTORS.org Host Information: Monica Neubauer Speaker/Podcaster/REALTOR® Monica@MonicaNeubauer.com FuntentionalLiving.com FranklinTNBlog.com Monica’s Facebook Page Facebook.com/FranklinMonica Additional Bio: Juanita McDowell Juanita is an international speaker and educator. Every year, her training firm delivers over 200 seminars to entrepreneurs, corporate employees, and associations across the globe. A former Engineer and Global Sales Executive, she speaks on topics such as Technology, Sales, and Marketing. Businesses and associations that have hired Juanita include AT&T, LG, the CDC, and the U.S. Chamber of Commerce. Her expertise has been published in Fast Company magazine and the Investor’s Business Daily. Juanita is a YouTube Partner with over 2.5 million views on her videos. She’s also a member of the National Speakers Association and she volunteers as a Technology Partner for Habitat for Humanity.
Today, I'm joined by Katelyn Bowden to talk about image-based abuse for our children. Image-based abuse is anything from sextortion, leaked nudes, revenge porn, faked nudes, deepfakes, and more. We have to talk about online safety and relationship abuse for teens as well. A lot of kids don't realize that the metadata of photos can exist longer than the "24-hour" window. There are so many ways to disable the screenshot notification and save images on Snapchat. It's one of the most unsecure ways of sharing nudes. We talk about ways to protect yourself and your children. For more info on your personal identification information, listen to our episode with my friend Jason Faulhefer. We dig into a good response if someone were trying to sextort you. Most of the time they don't actually have any information, nor is it very marketable. Use a password manager like OnePassword or LastPass. We also dive into agency and education around consent. Katelyn is the CEO and founder of the BADASS army- a nonprofit organization dedicated to fighting NCP and other forms of image-based abuse. Learn more about Katelyn at badassarmy.org
In this episode, Kris and Erik will be discussing an academic misconduct case where students used Discord to share information, how and why to create a course trailer and the benefits of using password managers and two-factor authentication to stay secure online..NEWS:. Calgary Herald: "Honest mistake"https://calgaryherald.com/news/local-news/honest-mistake-u-of-c-student-denies-cheating-as-14-accused-of-sharing-answers-online.CBC: "14 University of Calgary students accused of academic misconduct"https://www.cbc.ca/news/canada/calgary/university-calgary-student-misconduct-open-book-exam-course-calgary-1.5619737.#EdTechOfficeHours.Creating a course trailer.University of Calgary: http://connections.ucalgaryblogs.ca/2016/12/22/creating-a-course-trailer/https://spark.adobe.com/page/CNDWLnyovgpmO/https://taloncloud.ca/Course-Trailer-TI.BMC 171 course trailer: https://www.youtube.com/watch?v=fMKu9pIElAc&feature=youtu.be.Kris Hans' YouTube channel with more trailers: https://www.youtube.com/user/krishans .TECH TIPS: .Privacy tools IO: https://www.privacytools.io/.Password managersLast Pass (free proprietary): https://www.lastpass.com/ Bit Warden (free open source): https://bitwarden.com/ One Password (paid): https://1password.com/ .Two-factor authentication apps.Authy: https://authy.com/ Google Authenticator: https://www.google.com/landing/2step/ Microsoft Authenticator: https://www.microsoft.com/en-us/account/authenticator . CONTACT: Website: edtechexamined.comEmail: hey@edtechexamined.comTwitter: @EdTechExamined.HOST INFORMATION
We are using personal devices for work (and working from home) more than we ever have before. These are both big risk factors as cybersecurity threats have soared during the pandemic. So, how do we make security sustainable and not live life at the hackers' mercy? ALPS Risk Manager Mark Bassingthwaighte sits down with Sherri Davidoff, CEO and Founder of LMG Security and the latest addition to the ALPS Board of Directors, to give you some practical advice in guarding your data like the gold it is. TRANSCRIPT: Mark: Let's rock and roll. Hello. Welcome to ALPS in Brief, the podcast that comes to you from the historic Florence building in beautiful downtown Missoula, Montana. I am really excited about our guest today. I have heard her speak and have read a book about her. And let me just share, our guest is Sherri Davidoff, the CEO of LMG Security. And I believe, Sherri, that is short for Lake Missoula Group. Is it not? Sherri Davidoff: It's true. We're named after the lake that we're sitting at the bottom of. Mark: For those of you, it's worth looking up in Wikipedia or Google or something to get a little bit of history of Lake Missoula. That's a whole nother story. But Sherri is a noted speaker, trainer, white hack, excuse me, white hacker, and author of the recently released book, Data Breaches, Crisis and Opportunity. As a recognized expert in cybersecurity and data breach response, Sherri has been called, and I love this, a security badass by the New York Times. I just think that's fantastic. Mark: She has conducted cybersecurity training for many distinguished organizations, including the Department of Defense, the ABA, the FFIEC, the FDIC, and many more. She's also a faculty member at the Pacific Coast Banking School and an instructor for Black Hat, where she teaches her data breaches course. She is also the co-author of Network Forensics: Tracking Hackers Through Cyberspace. It's a Prentice Hall publication, out in 2012. And this is a noted security text in the private sector and a college textbook for many cybersecurity courses. Mark: Sherri is also a GIAC certified forensic examiner, a penetration tester, and holds her degree in computer science and electrical engineering from MIT. She has also been featured as the protagonist in the book Breaking and Entering: The Extraordinary Story of a Hacker Called Alien. And so welcome, Sherri. And I can say I love the book. Sherri Davidoff: Thank you so much, Mark. It's a pleasure to be here with you. Mark: It was a lot of fun. It was a good read. Sherri Davidoff: Good. Mark: What you and I had been visiting about in terms of just having a conversation today, obviously in light of all that has happened in recent months with COVID-19, global pandemic, and this fallout of a very rapid move into working from home did not overlook lawyers. Many, many had to immediately jump and try to figure out how to make this work. And it seems some were pretty successful at that. Others, there were a few struggles, but they got there. But what I really want to focus on is the security side, the security piece of this. Mark: I think remote security is exposing not only lawyers, I think businesses of all shapes and sizes, to unexpected or perhaps a broadened way, broadened their risk, their exposure just because we have at times home systems. And I guess initially, would you agree, is the remote work setting a concern for you? Sherri Davidoff: Well, absolutely. There's an expanded attack surface now that so many people are working remotely. And I'd say that's for two reasons. Number one, because many people have moved to the cloud, or have started logging into work remotely, and therefore poked holes in their firewalls and things like that in order to facilitate it. And everybody did what we needed to do keep going and to keep business up and running. And that's fine. I'm here to tell everybody it's all fine. Sherri Davidoff: Our goal is progress and not perfection. But now's the time to step back and think, "What do we do?" And start cleaning things up, start thinking about, "How do we sustain this potentially long-term?" Because I think remote work has been here for a while and has definitely ramped up, and is here to stay. And the other reason why the attack surface has expanded is because a lot of people are using personal devices for work more than we ever have before. Sherri Davidoff: And so all of a sudden, you have sometimes very sensitive data on your personal device that you also share with your kids, or your friends, and you play games and this and that. And there's a different risk level that we have in our personal lives versus what's appropriate when we're handing this very sensitive information, so we have to balance those issues. Mark: Yeah. I like sort of two comments here, briefly. Initially, I like that you're saying lawyers haven't done anything wrong, in other words, by transitioning. It's so tempting to try to scare the bejeezus out of everybody and say, "You're not doing anything," but they did what they needed to do. And now is the time because I think you're absolutely right, this work from home evolution in terms of the rapid rise of it, is here to stay in a lot of ways. And so now it's time to say not, you've done anything wrong, or you're bad, but let's try to fix it. Sherri Davidoff: How do we make it sustainable and not get hacked all the time? Mark: Yeah, yeah, yeah. And I want to come back to here a little bit down the road, but I do really appreciate the comment of personal devices. And I think that's worth exploring a little bit. Where I'd like to start, if we may, and I don't know if you agree or disagree with this, but even again today, I have come across additional articles talking about an exposure that is I think for so many, flying under the radar. And that is simply the wireless access points, the routers and whatnot that all of us typically have in our homes. And do you feel, is that an overblown risk? Would you have any thoughts about some basic things that staff and lawyers should be thinking about? Sherri Davidoff: Well, it depends where you are. I used to live in the middle of Boston, and there were a zillion people around my house all the time. Now I live in the middle of Montana, and wireless security is always important, but less of a concern. So first of all, consider physically where you are and who might have physical access to that wireless network. And absolutely, your network is only as secure as the devices that are on it. And we've seen time and time again that if a computer gets infected, it will try to infect all the devices around it. So if you have a neighbor that starts using your wireless network, and they happen to have a computer that's been infected, that could absolutely cause risk for systems on your network as well. Mark: Very good. And thoughts about, are there any just practical steps you think folks might be able to take to minimize that likelihood? Sherri Davidoff: Sure. Well, as we were talking about ahead of time, there have been a number of vulnerabilities in common routers and wireless access points. So step number one, make sure that your software is up to date, your firmware is up to date on those devices. And you can do that either, sometimes they have an app that's paired with your smartphone, so you can update it that way. Or you can go into the device itself in the administrative interface and do updates. So every now and then, sit down, have a glass of wine, whatever, update your router. It's fun. It's easy. And change that password. Make sure that the password is not a default, that it's secure, it's not your phone number or your address, because guess what, people know that. Sherri Davidoff: And also that the name of your wireless network is something that does not draw attention to you, that it's a little bit under the radar, boring. Make your network look boring. Mark: I like that. I like that. Sherri Davidoff: Really slow wireless, that's what you should call it. Nobody will want this. Mark: I think your idea of maybe having a glass of wine to do this isn't a bad one because there have been times where I've been trying to do some things in terms of ... I take security very, very seriously because I've been telecommuting, and boy, there are times when certain things aren't as easy as they should be. And just instead of throwing the computer, you could have a little sip of, just relax. Sherri Davidoff: Yeah. Well, risk is your job at ALPS, so I could imagine it's something you take seriously. Mark: That's right. That's right. For a moment, let's just say that I am a lawyer. I'm the owner of a small firm, couple of staff. And we have made this transition out, and everybody's at home for the time being. May or may not be coming back. We'll just see how this all evolves. But as the owner of this small business, what kinds of things really should be on my radar that may not be? What should I think about? Sherri Davidoff: Yeah. The number one thing to think about right now is two-factor authentication. And I know that's a big word. I cannot even tell you how important that is because we're living in a world today where all of your passwords have been stolen, just assume that, because if you get a virus on your computer, it's going to steal all your passwords first thing before you even know it. And you're not fooling anybody by keeping it in a Word document with a totally different name. I know that it's there and so do the criminals, and they're just going to grab it. Sherri Davidoff: The other thing is if you reuse passwords on different websites, and one of those websites gets hacked, criminals have automated tools that will try your password in a zillion other websites. It's called credential stuffing attacks. And Akamai, which is a big tech company, reported that there were 61 billion credential stuffing attacks just in the past 18 months. So assume somebody's going to steal your password. You're not going to know about it because that company may not even know they have a data breach. Or if they know, maybe they'll report it to you six months to three years later. Sherri Davidoff: And in the meantime, you need to protect your accounts. The FBI recently reported that the number of business email compromised cases is going up because of coronavirus. Scammers are using tactics to try to trick people out of their money, so they're breaking into email accounts. They're finding examples of invoices, or payments, or things like that. And they're saying, "Oh, due to coronavirus, that bank account is being audited, and I really need these funds. Please send it to this other place." Sherri Davidoff: So you should guard your email account like it is gold because it is. You have valuable information in it. And remember with lawyers, information is your business. Right? If it's valuable to you, or if it's valuable to your client, it is valuable to a criminal. They can leverage it somehow. So protect that email account like it is gold. And your email account can also be used to reset your password on anything else, and the criminals know that, so they're after your email. Mark: That's a great point, that really is. Can you take just a moment or two and explain just a bit more about what you mean by two-factor authentication? I'm not sure that everybody in our audience, I think a lot do, but I know that there are more than a few that really don't understand. And I assume we talk about this, you're really saying we want to use this if we can in any and every setting, so email account, bank account. Sherri Davidoff: Yes. Cloud, you name it. Mark: Cloud, right, right. But can you just share just a little bit more to make sure everybody's with us? Sherri Davidoff: Absolutely. This is my favorite question, Mark. Thank you so much. So two-factor authentication is what you need to know. Authentication means how we verify someone's identity. So online you might have your identity verified with a password. Passwords are dead to me now. In the real world, you might verify your identity with your driver's license. Right? Two-factor authentication is when you use more than one method of verifying someone's identity together. And it makes it a lot less likely that your account will be broken into. And you might not know it, but we use two-factor authentication all the time. I don't know if you can think of a place where you use two different methods of verifying yourself. Mark: Well, the one that comes immediately to mind to me is just a debit card at the ATM machine. Sherri Davidoff: Yes. I'm giving you a prize. I have to rummage through my swag and drop it off at your office. Absolutely, yes. You're the only person I have ever worked with who's gotten it right off the bat. But yes, your debit card. And when ATMs first came out in the '60s, they did not all have a pin number associated with them. You were in England, you'd get your punch card. And if you lost that punch card, some criminal could pick it up and get your money. And it actually took over a decade before all the ATMs in the world had pins. But now, if you had a choice, if your bank said, "Oh, you don't need a pin on that ATM card," how would you feel about it? Mark: I would have a problem with that. Sherri Davidoff: You'd have a problem with it. And it's going to be that way on the internet pretty soon. People will be like, "Really? You don't have two-factor authentication? That's so dangerous. I can't believe it." Mark: Yeah. Sherri Davidoff: I can give you some examples of what you can use for two FA if you want. Mark: Sure. Sherri Davidoff: Okay. So when you're logging into your email for example, some of you are probably familiar with the case where you get a pin on your phone. Right? You log in, it sends a pin to your phone. That's better than nothing, but it's not the best because those are not encrypted. I don't know if you've heard of simjacking attacks, where attackers can take over your phone, or they can get your phone number sent somewhere else, so those are not the best. Sherri Davidoff: What's better than that is an app on your phone, like Google Authenticator, which is free, or Microsoft's Authenticator. And it'll show you a code that you type in. Or even better, it'll just pop up a message that says, "Do you want to authenticate, yes or no? Is this acceptable?" And so you type in your password and then you hit yes, or you type in your code, and then you get in. And so the criminal actually needs your phone and your password in order to get in, and that is so much safer than just a password. Mark: And I want to follow up. You had talked as we started this discussion a little bit about they're into your email and they're capturing your passwords. One of the things I want to underscore for our listeners is that you don't know they're in your system monitoring and capturing all this stuff. I still run into a lot of people that say, "Well, I've never been hacked because the computer still works." Nobody's going to send you a thank you card for doing something silly and saying, "We've been in. And thank you, we got all this." Mark: But you made the comment about passwords. And one of the things that I hear from time to time as I talk about password policies, long passwords, passphrases, complex passwords, those kinds of things, and the pushback you always get. How in the world do I remember all this? And your comment of a Word document is absolutely not the way to do this. But I have talked about password saves. And one of the questions that comes up from time to time is, well, here I am putting all this information into a file. And sometimes these safes, I have one, Iron Key, that's a jump drive. But they're also cloud-based. And what are your thoughts about the security of that? Because I had a lot of pushback of people saying, "How in the world can that be safe if they're hacking in?" Mark: I certainly have my thoughts about it. But I'd love to hear from your ... I mean, you do the pen testing. How reliable are these password safes in terms of helping us try to be as secure as we can? Sherri Davidoff: Yeah. So you're probably thinking, "Well, why would I want to put all my eggs in one basket?" And then hackers know they're going to attack that basket. Right? Mark: Exactly. Sherri Davidoff: The reality is that it's more complex than that because first of all, that basket LastPass, Dashly, OnePassword, you name it, they are especially designed to be hardened against attacks. For example, they're resistant to the common attacks. They're constantly researching it. And if they autofill a form for you, they're using different hooks in the operating system that make it harder for the attacker to grab that compared with a regular web browser, for example, so that's the first thing. Sherri Davidoff: The second thing is I use password managers not just for their ability to store passwords, but for their ability to generate passwords. And that's perhaps even more important. You need a unique password for every single website, maybe not the really junky ones that you don't have anything important in them. But most people underestimate the importance of an individual account. Ideally, you want a totally different login for each website because you never know which website's going to get hacked. Right? Sherri Davidoff: And the human brain is not designed to remember 20 billion passwords. I mean, it's probably all we can do to remember three passwords. And so then you get people picking the password fluffy1984, like their dog and their kid's birthday, which people can totally guess, or spring2018bicycles, and then that changes to summer2018 when you have to change it. The hackers are onto you. They have automated tools that will automatically try different variants on your favorite password that they have already captured. They'll put an exclamation point at the end. They'll put a one, and then a two, and then a three, and then a nine and a 10. Sherri Davidoff: And they'll change spring to summer and 2018 to 2019. So those ways that people modify their passwords are not very secure. So use your password manager. Use two-factor authentication on it if it's in the cloud. And if you hear, LastPass, for example, was actually hacked several years ago. And what happens in that case is you want to change at least your master password if [inaudible 00:21:58] passwords. Sherri Davidoff: But it is so much better than keeping your passwords in a file on your computer because people get their computers infected so frequently. And that's the first thing that goes out the door. The criminals are automatically stealing your files, and then you won't even know you've been hacked until your money's been missing, or a spam email goes out to all your clients. Mark: So what I'm hearing then as the owner, I need to be really concerned about authentication and protecting passwords, strong passwords. Are there other concerns that come to mind as the owner? Sherri Davidoff: Ransomware. A lot of attorneys are hit with ransomware. Ransomwares steal your information often before they hold you for ransom. And that's the thing that a lot of attorneys don't think about because I've seen many law firms even put up out of office messages that say, "Hey, we have ransomware. We'll get back to you tomorrow." That's not cool for your clients. Mark: No. Sherri Davidoff: That means chances are their data was stolen too. And the trend that we are seeing in 2020 is that criminals have started to realize that people have better and better backups. And if you don't pay them the ransom to get your data back, they will threaten to publish it. And in that case, you've got two options. You can either say, "Okay, we'll pay the ransom," in which case, they could come back to you in six months and say, "Pay us again or we'll release it again." You can't trust them. Sherri Davidoff: Or you don't pay the ransom, and all your data's published. And what does that mean for your clients and your relationships and your status as an attorney? So you really need to protect yourself with ransomware. And you do that with two-factor authentication, super important. Mark: Yes, right. Sherri Davidoff: And making sure you have a secure method to connect to your data. So for a lot of people who have just poked holes in their network and they're going through RDP, remote desktop protocol, that's not a secure way to do it. There's other better ways to do it, like using a VPN. Or you can, if you choose to store your data in the cloud, there are some benefits to that, especially if you use two-factor authentication. Mark: Let's talk a little bit about this. And for those of you listening, if you're not completely sure, VPN stands for virtual private network. And we're really talking about disguising our location at times, in terms of what servers, when I use my VPN for instance, I am picking servers in Canada and other parts of the United States. I can go all over the world if I wanted to. So you're hiding your location a little bit, but it's also encrypting the data stream, so that's what we're talking about in terms of any remote connection. And I think it's particularly important in the wifi space. Mark: But there are a lot of free VPNs available and a lot of other just tiered pricing of all kinds of things. Do you have any thoughts about is it unwise to use the free VPNs as opposed to spending a little bit of money? I hear at times the VPNs that are free, they may be monitoring and monetizing the information they're learning about what you're doing. But I truly don't know. Do you have any thoughts on that? Sherri Davidoff: In general, there's no such thing as a free lunch in our society. Right? If you're not paying for a product, you are the product, so they say. So I would be careful about that. In general, I would get an experienced IT person's advice when you're setting up your VPN. I wouldn't do it on your own because if you make a little mistake, again, it's all your data on the line. There's some pretty serious consequences. Also, consider if you really need a VPN. Are you just trying to get into one computer? And if so, is it just a certain type of data that you need? Sherri Davidoff: Personally, I am a proponent, I've become a proponent of using the cloud. And I was a slow adopter. Being a security professional, I was fairly conservative about it. But you have some really strong options like Microsoft Office 365 is a great option for attorneys. There's a lot of compliance. There's a lot of regulations that they adhere to, and you can get them to sign off on that. There's other providers as well that are very good. And again, if you're using that two-factor authentication, they have some very advanced security features built in. They are maintaining that software, so I think it takes a lot of the pressure off of small and solo practitioners to just use the cloud. And then you don't have to worry about somebody remoting into your whole computer. Mark: One question that comes up every once in a while from lawyers as they start to think through some of the things we're talking about, but in the context of ransomware the cloud, they're learning. And I think for the most part they have as a profession, have a pretty good understanding what ransomware does at a basic level. And it can infect the network and this kind of thing. But I think some believe one of two things, but first, the cloud one is if I put things in the cloud, I'm safe there because there's this break. Would you put that to rest? Sherri Davidoff: Yeah. I mean, if you can access it, so can criminals. Right? Mark: Oh, yeah. Sherri Davidoff: Especially because often we see people click on links in phishing emails. Their computers get infected. And the criminals will even install ransomware in your cloud drives, like One Drive. If you can get to it and a criminal has access to your account, then the criminal has access to it. And there are times, in fact, I have a little video example that we took in our laboratory, where criminals will deliberately remote into your computer and use your computer to break into your bank accounts or your email accounts because you have your password saved there. And you don't have ... You've clicked trust this computer, so it's way easier for them than trying to break in from Thailand, or Russia, or wherever they happen to be. Mark: And I want to respect your time here, Sherri. The stuff you're sharing is just awesome, awesome stuff. I want to just take a few moments and shift a little bit now. So we've talked about some really good security things that lawyers, business owners, firm leaders need to be thinking about. And of course, all of this needs to apply to everybody. But let's talk about the home place. So what do I need to think about in terms of making sure my employees do, or understand? Do you have concerns about what the individual is actually doing in their own home? Sherri Davidoff: Yes, of course. A big issue that comes up is sharing of computers, so you need to have a clear policy as to whether it's okay to share computers. Is it okay to have certain types of documents on their personal computers? Remember that personal computers are much higher risk. You are likely to get a virus on a personal computer, especially if multiple people are sharing that. So whenever possible, keep work documents on work systems, or systems that are just used for work. And again, the cloud can help you with that. Sherri Davidoff: For example, you can allow people to access documents in the cloud and prevent them from downloading those documents. And it's all well and good to tell people that. But ideally, you want to actually implement that control and prevent them from a technical measure. We also see people emailing documents to their personal emails, and now it's totally out of your control. It's up in Google somewhere else. You may have violated some policies, especially if you deal with health information. You might've violated some regulations just by putting it up in Google, or violated your client's privacy. So mainlining control of your data, especially during these times, is absolutely critical. Sherri Davidoff: I think I would be remiss if I didn't mention mobile device management software, so if you have people using personal devices, you can deploy what we call an MDM. It's a piece of software that allows you to have some level of control over that personal device. So if that employee leaves, or if the device is stolen, it'll wipe your data from it. It can require that there's a pin or a passcode set on that device, even though you don't own that device. It can require antivirus software, and that's another one. If you do nothing else, require antivirus software. And you can buy it for employees to use on their home computers if they're using those for work. Mark: Yeah. The takeaway for me, and there are a lot here, and we can talk about this for hours. Maybe I could. Sherri Davidoff: I've been talking about it for 20 years. Mark: But I do like, when I think about our confidentiality rules in law, I do think saying we really ... You can't use a home computer for work that the teenage kids have access to in the evening, and the gaming. That's just victim here on the forehead if you ask me. So it underscores the value of saying, "If you have the financial wherewithal, let's supply our employees and staff and associates, whoever may be involved here, with company-owned equipment," because we can enforce the rules. We have control over that. I really like that. I but I also think that there's value in having some policies and then thinking through some of the issues that you just identified. And let's have written policies that staff are well aware of, so that if they are constantly breaking the rules, which is so easy to do because we trust our personal devices. Do we not? Mark: We seem to trust our personal devices a little bit more than work devices, whether it's because we know we're not being watched, if you will, in terms of just when you're on corporate device, they have the ability to monitor what's happening to the device, that kind of thing. I don't know what it is. But I think having a policy allows you to, well, not monitor, but hold people accountable. Sherri Davidoff: Absolutely. Mark: And say, "Look, if you're not doing something." Sherri Davidoff: Yeah. A policy's a great first step. And remember, progress not perfection. I do recognize, especially right now, a lot of people just don't have any other option besides using personal devices. And if you do that, again, that next step is to create a separate account at least. So you're not sharing the same account as your kids or as the other people you're working with. And if you can, having a separate device for work is definitely the way to go if you are able to do that. Mark: Well, Sherri, it's been a pleasure. I want to share with our listeners that Sherri has made available some remote work cybersecurity checklists for employees and managers. And this isn't live yet, but when it will be, you can click right there and have access to these. They're excellent tools. And Sherri, thank you very much for making that available to our audience. For those of you listening today, I hope you have found something of value. And if you have an idea of a topic that you feel strongly about that you think others would enjoy hearing, or you have a speaker that you'd be interested in seeing if we can have join the podcast, please don't hesitate to reach out to me. My email address is mbass, M-B-A-S-S, @alpsinsurance.com. Mark: And before I close, for those listening to the mileage score, you have to go back to earlier podcasts. I'm up to 700 even as of today, so I'm getting there. That's it. Thank you all. Thanks for listening. Bye-bye.
Get Together with Technology (GTT) Sponsored by the Canadian Council of the Blind (CCB) Show Notes: GTT Vancouver June 6, 2020 Theme: Passwords, Security and iOS Ethernet Connection Presenter: Monty Lilburn monty@bc.cx This was the final meeting for the Winter/Spring session with the GTT Vancouver group taking the months of July and August off. Next meeting will be in September, and because the first Saturday in September will be on the Labour Day long weekend the meeting will be bumped to the second Saturday, September 12, 2020. In this episode Monty talks about passwords, authentication and everything that goes along with it. Six topics were outlined and discussed: 1; Origin of passwords, Monty started with a brief history of password usage, as well as the use of “shibboleths” to identify those who belong, or don't belong to a group, community, culture or class of people. These have often been used in wartime. 2; Identification and authentication, is when someone shows their user name to identify themselves and a means of proving they are who they said they are. 3; Multi factor authentication, for which there are 3 types, A) the knowledge factor, something you know like a PIN, a secret handshake or a password. Monty went into detail on password strength, which relates to length, complexity and unpredictability, and that humans aren't good at randomness and tend to use repetitiveness, predictable patterns and dates. For example, the most often used password is 1 through 6 which is used 23,000,000 times in a British Cyber Security study. Other popular ones were 1 through 9, the letters Qwerty, the word password and the number 1 7 times. B) Something you have, or possessions, like a key to a lock, a smart phone or a token generator that generates a random number. C) is something you are, like a fingerprint, retina scan or a body image, relating to biometrics. Two additional factors have since been introduced, location and time. Banks will track time and location if a transaction happens in Vancouver at 10AM, and again in Frankfort Germany 5 minutes later on the same account. 4; Two-step verification, which introduces security questions or something you have like a cell phone. Sym jacking/porting are security risks that make this less foolproof. 5; Password managers, are databases that store passwords, credit card numbers, PIN's and other items that secure your information and that need only one password in order to get in. Pros are that you only have one password to remember, they can generate strong random passwords and can store other related info. Cons, not all browsers support their use, all your eggs are in one basket and if you forget that one password you've lost all your accounts. One other Con is that it gives thieves one location to target. Monty then discussed the Apple Keychain as a password manager, as well as others like One Password, Last Pass. and Password Safe. The latter one is free, open-source and has been around a long time so has a good proven track record. Android smart devices don't have a Keychain like Apple does, however do use a similar system called Google Smart Lock. Monty then worked through the prediction that passwords will be dead in 50 years or so, and that they are inherently crackable given enough time and powerful enough computers. Biometrics are a longer lasting way of authenticating users. Monty took several questions on the material presented so far. 6; Password viability, which relates simply to biometrics, length, strength and randomness. Bonus Information: In the next section Monty outlined how he managed to connect his iPhone to a network cable in order to avoid the flakiness of Wi-Fi for conference calls like the Zoom call being recorded today. He was connected to a Qwerty keyboard, Blue Yeti microphone and an Ethernet cable through a Lightening to USB Camera adaptor. The $49 adaptor has a Lightening port and a USB 3 port to which Monty connected a 4-port USB hub that allowed him to connect all the above devices to his iPhone. The hub is powered as the iPhone hasn't the ability to power that many devices. For more information, please contact your GTT Coordinators: Albert Ruel or Kim Kilpatrick 1-877-304-0968,550 1-877-304-0968,513 albert.GTT@CCBNational.net GTTProgram@Gmail.com CCB Backgrounder: The CCB was founded in 1944 by a coalition of blind war veterans, schools of the blind and local chapters to create a national self-governing organization. The CCB was incorporated by Letters Patent on May 10, 1950 and is a registered charity under the provisions of the Income Tax Act (Canada). The purpose of the CCB is to give people with vision loss a distinctive and unique perspective before governments. CCB deals with the ongoing effects of vision loss by encouraging active living and rehabilitation through peer support and social and recreational activities. CCB promotes measures to conserve sight, create a close relationship with the sighted community and provide employment opportunities. The CCB recognizes that vision loss has no boundaries with respect to gender, income, ethnicity, culture, other disabilities or age. The CCB understands in many instances vision loss is preventable and sometimes is symptomatic of other health issues. For the 21st century, the CCB is committed to an integrated proactive health approach for early detection to improve the quality of life for all Canadians. As the largest membership organization of the blind and partially sighted in Canada the CCB is the "Voice of the Blind™". GTT is an exciting initiative of the Canadian Council of the Blind, founded in Ottawa in 2011 by Kim Kilpatrick and Ellen Goodman. GTT aims to help people who are blind or have low vision in their exploration of low vision and blindness related access technology. Through involvement with GTT participants can learn from and discuss assistive technology with others walking the same path of discovery. GTT is made up of blindness related assistive technology users, and those who have an interest in using assistive technology designed to help blind and vision impaired people level the playing field. GTT groups interact through social media, and periodically meet in-person or by teleconference to share their passions for assistive technology and to learn what others can offer from their individual perspectives. CCB National Office 100-20 James Street Ottawa ON K2P 0T6 Toll Free: 1-877-304-0968 Email: info@ccbnational.net URL: www.ccbnational.net
Série sobre Cultura Empresarial:https://www.youtube.com/playlist?list=PLjNVnyTymXyTb4oVO6Eb4NnOXT_3jmf_t Estamos há mais de duas semana trabalhando remoto. Há algumas semanas o mundo tem vivido um momento de medo e insegurança, o coronavírus têm nos obrigado a se adaptar diante de tantas mudanças. Hoje tenho uma equipe de mais de 10 pessoas trabalhando de casa. Uma empresa funcionando inteiramente de forma remota. O trabalho remoto sempre foi uma possibilidade para nossa equipe, mas acredito que o momento tem se tornado muito propício para falarmos sobre isso. Talvez você ainda não consiga ver como essa possa ser uma possibilidade para a sua equipe hoje, ou até vê mas não sabe como executar. Nesse episódio do podcast ME vamos falar sobre o poder do trabalho remoto, como fazer para aproveitar todas as possibilidades que ele nos dá e como fugir das armadilhas. Esse episódio está dividido em 4 pontos principais do trabalho Remoto: 1 Equipe - As pessoas com quem você trabalha 2 Cultura - tenha valores do que você está construindo de maneira clara.3 Processo - Como chegar ao objetivo estando sozinho ou com a sua equipe4 Ferramentas - As ferramentas que usamos para facilitar o nosso trabalho. E principalmente vamos dividir com você coisas que temos feito para fazer com que todos os nossos projetos continuem andando mesmo em meio a essa crise. Como você pode cuidar da sua empresa remoto. Você estando aqui ou lá o mundo continua andando e precisamos nos adaptar ao que está acontecendo. ------------------ Segue abaixo os links das ferramentas que te falei no Podcast para que você possa acessar e conhecer Video conferencia e reuniões com clientes e internas Zoom.us https://zoom.us/ Comunicação do Time Slack https://slack.com/ Basecamp https://basecamp.com/ Organizar as Tarefas do time Trello https://trello.com/ Armazenamento de arquivos de uso diário e divisão de pastas compartilhada por projetos Google Gsuite Apps https://mentalidadeempreendedora.com.br/r/google-gsuite/ Backup e compartilhamento de arquivos pesados Dropbox https://www.dropbox.com/ Organização da agenda do time e da minha Google Calendar https://calendar.google.com/ Planejamento de modo geral Mindmeister https://mentalidadeempreendedora.com.br/r/mindmeister/ Vamos começar a usar Notion https://www.notion.so/ One Password https://1password.com/ Mural https://mural.co/ Cuckoo https://cuckoo.team/ _______________________________________________________________Para continuar nos acompanhando e ficar por dentro de tudo o que acontece na Mentalidade Empreendedora, siga os passos abaixo: - Acompanhe nossos canais através de https://linktr.ee/pedroquintanilha _______________________________________________________________Sobre o Mentalidade Empreendedora: Transformamos seu conhecimento, influência e paixão em receita recorrente. Ajudamos nossos clientes a conquistarem mais lucros e menos stress em seus negócios digitais crescendo exponencialmente interna e externamente. Estamos iniciando uma revolução, um novo tempo, onde produtos e serviços estão envolvidos na vida dos clientes de forma tão natural, que o modelo dos negócios de assinatura faz parte de suas rotinas. Eu acredito que existe uma recorrência para chamar de sua, e tenho inserido este modelo nos negócios dos meus clientes que descobriram como aumentar todos os seus resultados mês a mês, reduzindo drasticamente o stress do crescimento. O que é a Mentalidade Empreendedora? Uma escola, onde seus alunos nunca param de se desenvolver, onde seus alunos formam uma grande comunidade, uma tribo única onde novas habilidades adquiridas são as habilidades fundamentais para atingir a alta performance em um ambiente pós-digital cada dia mais competitivo. Uma escola que ajuda de forma consultiva, você e o seu projeto, a alcançar mais impacto, influência e até crescimento exponencial com táticas avançadas de marketing e vendas online, alinhadas com o seu crescimento interno. Já impactamos mais de 100 mil pessoas com nossos cursos e treinamentos. Pessoas que através das suas mensagens já impactaram milhões de outras pessoas ao redor do Brasil e do mundo. Se você é um inconformado com o sistema atual, quer desenvolver sua visão de negócios, ter coragem para romper com o status quo e adquirir competência para fazer acontecer, vem com a gente. Vamos juntos nesta jornada infinita._______________________________________________________________#MentalidadeEmpreendedora #PedroQuintanilha #Recorrência #RevoluçãodaRecorrência #MarketingDigital #Empreendedorismo
Indico fortemente que você use Gerenciadores de Senha. Muda sua vida. Você nunca mais vai ter que decorar senhas trocentos serviços. Faz assim: testa essas três a seguir e escolhe: 1) OnePassword, LastPass e LockWise. Você vai me agradecer. ;) --- Send in a voice message: https://anchor.fm/danielluzz/message
Canopy Growth is the most valuable cannabis company, but the price of cannabis it sold last quarter dropped by 27% because Canada’s got an oversupply problem. Daimler and Ford just announced big investments in electric cars, while Tesla’s won awards. And our “Maybe-Unicorn of the Day” 1Password knows you don’t want to remember 243 usernames and passwords — it’s service makes you remember just 1.
https://www.lastpass.comhttps://1password.comhttps://keepass.infoYourSecure.Life/1YourSecure.Life/guide
We all know that passwords are an important cornerstone to our privacy and security. It is important for us to make strong passwords that protect access to the sites that we use regularly as well our devices. That being said, password breaches are dime a dozen and sometimes we need to do more than make strong passwords. Sometimes we need to do some best practices to ensure our passwords are more solid. Below are simple but effective suggestions for best practices. The first is if you have the option to use two-factor authentication, take advantage of it. This is a highly effective safety precaution that shuts out hackers completely. Two-factor authentication basically means that before you can log in, you’ll be given a pin that’s sent to your email address, or smartphone. This method is also used in the event you forget your password.A second best practice is to put your password to the test. There are plenty of password testing tools available. One to consider for PC users is Microsoft’s Safety & Security Center which is free to download. Also if you use any password storer like LastPass or OnePassword, they’ll generate strong passwords for you and you can input your own passwords to determine their strength too.Third best practice is to avoid using dictionary words and making passwords too long. Always stick with a random assortment of letters and numbers that mean something to you. They can be abbreviations or initials of peoples names and more.The final best practice is to ensure you’re using different passwords for different accounts. It can be tempting to use the same password for multiple sites but using the same password constantly makes it easy for hackers to break into several accounts at once over a span of sites. Make sure your passwords are different for each account and each site you use.
EPISODE 30- YoUr pAssWOrd Is REaLLy rEaLLy bAD! Disclaimer: This episode is a lot longer than our usual ones but it has some really great tips and content that we felt needed to stay in it but just a heads up that we dont usually go this long This week the dads return from a longer than anticipated holiday break to jump right into our multi-episode look at online security! Kicking things off we discuss one of the most critical and often times misunderstood aspects of keeping you and your families information safe: Passwords! Whether you want to explore setting up a password manager such as LastPass or OnePassword, look at getting a hardware 2 factor authentication device like the YubiKey or just use built in options available from IOS and Google Chrome, everyone should be doing SOMETHING extra when it comes to creating and managing strong passwords. Lastly, Andrew tells a story about giving out his home address to a shady online website in exchange for .50c screw driver that will almost certainly give him an asbestos rash and then makes the greater mistake of challenging Ryan to see how much personal information he can uncover about him using only his address... GAME ON! We will see what all Ryan can uncover and have Andrew verify all the juicy details on next weeks show! If you want to do your own research into what all corners of the internet your information may be hiding, here are some good places to start: https://haveibeenpwned.com/ Put in your email address here and you will be able to see if it appears in the lists of known leaked email addresses tied to major data breaches. https://namechk.com/ Use this site to search for usernames you frequently use to get a better idea of what all websites you may still have open accounts with. Finally, here is an excellent article from PC Magazine about closing some widely used accounts: https://www.pcmag.com/article2/0,2817,2386458,00.asp Check out our website Dadiopodcast.com to stay up to date with our latest shows, news and more!Like our page on Facebook and join in conversations about our latest episodes, articles and more! Twitter is where you can share your #dadmoments with us to read on our show and interact with us!CALL THE DAD PHONE! Leave us a message and we will answer your questions on an upcoming episode! +16148877562HELP SUPPORT OUR SHOW! Please leave a comment and review to let others know you enjoy our show! Your support means SO much to us!Dad-I/O Podcast is a proud member of the Gonna Geek Podcast Network! Check out their website for more amazing and geeky shows like ours!
Recorded Oct 17, 2017Rob's iPhone doesn't "Just Work". Ian doesn't like peeing in the ocean. And neither of them liked dances in High SchoolTasting Notes:IntroRob's Phone Broke- Rob Got an iPhone?What Are You Wearing- Ian's Shitty ShoesWedding TalkHalal Trucks- Popeyes- Ian Hikes TammanyRob Hits the Dance Floor- High School DancesIan Saw Modest Mouse- Setlist SpoilersPeein at the Beach"Bad Optics"BoJack HorsemanRealD 3DPlaying Video Games Wrong- Rob's Proudest Video Game AchievementsKey Reinstallation Attacks (KRACK)Links[Mount Tammany](https://www.njhiking.com/mt-tammany/)[Modest Mouse Setlist](https://www.setlist.fm/setlist/modest-mouse/2017/starland-ballroom-sayreville-nj-43e3eb2b.html)[Alvayys at Union Transfer](https://www.youtube.com/watch?v=kG4T9CJA8hI)[Waboba](https://www.waboba.com/)Take My Wife ([Show](https://www.amazon.com/Take-My-Wife-Season-1/dp/B01IU9MRM6)) ([Tweet](https://twitter.com/cameronesposito/status/895397595517829120/photo/1))[MBMBaM](https://vrv.co/series/GRMGZ124R/My-Brother-My-Brother-and-Me)[James Cameron Submarine](https://news.nationalgeographic.com/news/2012/03/120325-james-cameron-mariana-trench-challenger-deepest-returns-science-sub/)[Beowulf Spear Scene](https://www.youtube.com/watch?v=-A9rFt7ITy4)[The Hobbit 60FPS](https://www.theverge.com/2014/12/19/7422633/hfr-might-work-even-though-it-looks-really-awful)The Polygon Show Episode 14 ([Episode Link](https://www.polygon.com/2017/9/8/16276048/the-polygon-show-episode-14-nugs-from-the-deep)) ([Direct Link to 41:05](https://overcast.fm/+JR0jNkw-0/41:05))[KRACK](https://www.krackattacks.com)[One Time Pads](https://en.wikipedia.org/wiki/One-time_pad), [Soviet Re-Use of One Time Pads](https://en.wikipedia.org/wiki/Venona_project#Breakthrough)[HTTPS Everywhere](https://www.eff.org/https-everywhere)[List of Default Router Passwords](http://www.routerpasswords.com/)[LastPass](https://www.lastpass.com/)[OnePassword](https://1password.com/)[5000 Most Popular SSIDs](https://gist.github.com/jgamblin/da795e571fb5f91f9e86a27f2c2f626f)10 Million Most Popular Passwords [Raw](https://raw.githubusercontent.com/danielmiessler/SecLists/master/Passwords/Common-Credentials/10-million-password-list-top-1000000.txt), [GitHub](https://github.com/danielmiessler/SecLists/blob/master/Passwords/Common-Credentials/10-million-password-list-top-1000000.txt)Playlist:[You Make My Dreams by Hall & Oates](https://www.youtube.com/watch?v=kY27wmTZwyg)[Blank #8 / Precipice by TWIABP](https://www.youtube.com/watch?v=cr6r18xetXk)[Party Rock Anthem by LMFAO](https://www.youtube.com/watch?v=KQ6zr6kCPj8)[I Get By by Honest Bob and the Factory-to-Dealer Incentives](https://www.youtube.com/watch?v=Tqkk4FVVH5o)[Soy Bomb by Honest Bob and the Factory-to-Dealer Incentives](https://www.youtube.com/watch?v=S3zQfyFQ4_Q)[See Ya Sucker by Modern Baseball](https://www.youtube.com/watch?v=_jXsQnCQvkM)[Missed the Boat by Modest Mouse](https://www.youtube.com/watch?v=YSfTdzoO4ic)[Make Everybody Happy/Mechanical Birds by Modest Mouse](https://www.youtube.com/watch?v=WZT10-S_KtU)[I Think I Love You by Waxahachee](https://www.youtube.com/watch?v=rpIDsvmPp0k)[Sports Live by Modern Baseball](https://www.youtube.com/watch?v=4ilWZ-Dx7Zk&list=PLIuaF_Xws7ipsgxa7tDuXtMhf8BchTVRf)[Adult Diversion by Alvvays](https://www.youtube.com/watch?v=rZHPCcFmEjc)[Limelight by Rush](https://www.youtube.com/watch?v=ZiRuj2_czzw)[The Skin of My Yellow Country Teeth by Clap Your Hands Say Yeah](https://www.youtube.com/watch?v=mrK0YEk6o4o)[Under Pressure](https://www.youtube.com/watch?v=a01QQZyl-_I)Alternate Titles:Three Doorknobs EditionDoesn't Just Work EditionMy Glutens and Me EditionWaboba Fett EditionDavid Lynch's "Garfield 3" Edition
Episode 22 Summary Welcome back to another episode of That Blind Tech Show (TBTS). Allison Brian and Jeff swap talk about the latest and greatest news in the accessible device world and even more! We dip our toes into the Selfie world of the sighted and rest assured we be smarter than that. Well, most of us. Facebook opens it’s doors and the guest leave with 50 million names and contact info possibly but don’t worry, be happy, no one knows nothing. Hmm. Amazon will begin to ship everything but the kitchen sink but give them a week or two and I am sure they will have one by then. Alexa, drain sink. Alexa, fill my cup to the rim. Hey, why not a toilet seat as well? Below is a list of the topics we cover plus there is so much more. Jeff demos the Hearing feature with the Air Pods that amps up the sound like having hearing aids I imagine. Just put it in the Control Center. IOS 12, Watch OS 5, Mojave and the Watch and iPhone reviews by the TBTS Team. No, we don’t actually have Jerseys or a club house but just close your eyes and, oh wait, just imagine we do and we have T-Shirts and Hats for sale and a Facebook TBTS group and…. Ok, wake up. Yea right. Check out the emails we have received and Emily, You Rock! No, I did not call you a rock but You Rock. We hope you enjoy and thanks for listening. Here are some topics and links from the show, our show, this episode, yea. Scientists in India are calling for no Selfie Zones to protect against Selfie related deaths! Facebook 50 million accounts hacked https://mashable.com/article/facebook-50-million-accounts-hacked/#gBRsZMNiBuqk Amazon taking on Sonos? Or the entire World? Amazon has announced a staggering number of new Echo devices — here's everything you can pre-order right now https://www.businessinsider.com/pre-order-new-amazon-echo-devices-dot-microwave-plug-alexa-2018-9 Lazarillo Major Update Now with Step by Step directions Amazon taking on Sonos? Or the entire World? Amazon has announced a staggering number of new Echo devices — here's everything you can pre-order right now https://www.businessinsider.com/pre-order-new-amazon-echo-devices-dot-microwave-plug-alexa-2018-9 https://gizmodo.com/google-is-bringing-a-bunch-of-changes-to-search-1829277809 Did you just drop $1400 on a new iPhone and get one charge out of it? https://9to5mac.com/2018/09/29/iphone-xs-automatic-power-charge-issue/ Is your Belken charging dock no longer compatible with your iPhone? https://9to5mac.com/2018/09/29/belkin-valet-powerhouse-iphone-xs/ Password auto fill and Apple create issue and Air Drop Password and One Password. https://9to5mac.com/2018/09/17/1password-password-autofill-ios-12/ Apple Watch: Series 4 and Watch OS 5https://appleinsider.com/articles/18/09/23/psa-apple-watch-series-4s-fall-detection-is-off-by-default-for-most-people How to wipe your products before exchanging or throwing awayhttps://lifehacker.com/how-to-wipe-your-smart-gadgets-before-you-get-rid-of-th-1829140525 Email Apple Bias Much Doing a disservice to the blindness community Emmi from Finland Email You make me laugh rolling on the floor a lot and remind me that I am not the only blind person in the world Denise emailed in Anyone using the Microsoft Surface Go and Full Windows Mode New! That Blind Tech Show Feed: Https://www.ThatBlindTechShow.Libsyn.com/RSS Contact Thank you for listening. Send us Feedback via email Follow us on Twitter @BlindTechShow That Blind Tech Show is produced in part with Blind Abilities Network You can follow us on Twitter @BlindAbilities On the web at www.BlindAbilities.com Send us an email Get the Free Blind Abilities App on the App Store. Get the Free blind Abilities App on the Google Play Store
Episode 22 Summary Welcome back to another episode of That Blind Tech Show (TBTS). Allison Brian and Jeff swap talk about the latest and greatest news in the accessible device world and even more! We dip our toes into the Selfie world of the sighted and rest assured we be smarter than that. Well, most of us. Facebook opens it’s doors and the guest leave with 50 million names and contact info possibly but don’t worry, be happy, no one knows nothing. Hmm. Amazon will begin to ship everything but the kitchen sink but give them a week or two and I am sure they will have one by then. Alexa, drain sink. Alexa, fill my cup to the rim. Hey, why not a toilet seat as well? Below is a list of the topics we cover plus there is so much more. Jeff demos the Hearing feature with the Air Pods that amps up the sound like having hearing aids I imagine. Just put it in the Control Center. IOS 12, Watch OS 5, Mojave and the Watch and iPhone reviews by the TBTS Team. No, we don’t actually have Jerseys or a club house but just close your eyes and, oh wait, just imagine we do and we have T-Shirts and Hats for sale and a Facebook TBTS group and…. Ok, wake up. Yea right. Check out the emails we have received and Emily, You Rock! No, I did not call you a rock but You Rock. We hope you enjoy and thanks for listening. Here are some topics and links from the show, our show, this episode, yea. Scientists in India are calling for no Selfie Zones to protect against Selfie related deaths! Facebook 50 million accounts hacked https://mashable.com/article/facebook-50-million-accounts-hacked/#gBRsZMNiBuqk Amazon taking on Sonos? Or the entire World? Amazon has announced a staggering number of new Echo devices — here's everything you can pre-order right now https://www.businessinsider.com/pre-order-new-amazon-echo-devices-dot-microwave-plug-alexa-2018-9 Lazarillo Major Update Now with Step by Step directions Amazon taking on Sonos? Or the entire World? Amazon has announced a staggering number of new Echo devices — here's everything you can pre-order right now https://www.businessinsider.com/pre-order-new-amazon-echo-devices-dot-microwave-plug-alexa-2018-9 https://gizmodo.com/google-is-bringing-a-bunch-of-changes-to-search-1829277809 Did you just drop $1400 on a new iPhone and get one charge out of it? https://9to5mac.com/2018/09/29/iphone-xs-automatic-power-charge-issue/ Is your Belken charging dock no longer compatible with your iPhone? https://9to5mac.com/2018/09/29/belkin-valet-powerhouse-iphone-xs/ Password auto fill and Apple create issue and Air Drop Password and One Password. https://9to5mac.com/2018/09/17/1password-password-autofill-ios-12/ Apple Watch: Series 4 and Watch OS 5 https://appleinsider.com/articles/18/09/23/psa-apple-watch-series-4s-fall-detection-is-off-by-default-for-most-people How to wipe your products before exchanging or throwing awayhttps://lifehacker.com/how-to-wipe-your-smart-gadgets-before-you-get-rid-of-th-1829140525 Email Apple Bias Much Doing a disservice to the blindness community Emmi from Finland Email You make me laugh rolling on the floor a lot and remind me that I am not the only blind person in the world Denise emailed in Anyone using the Microsoft Surface Go and Full Windows Mode New! That Blind Tech Show Feed: Https://www.ThatBlindTechShow.Libsyn.com/RSS Contact Thank you for listening. Send us Feedback via email Follow us on Twitter @BlindTechShow That Blind Tech Show is produced in part with Blind Abilities Network You can follow us on Twitter @BlindAbilities On the web at www.BlindAbilities.com Send us an email Get the Free Blind Abilities App on the App Store. Get the Free blind Abilities App on the Google Play Store
Get Connected: June 2nd, 2018
Apple is still very secretive, but we now know that the next iPhone is called D22 and can only be used by people with Ferraris. I still think it's a distraction from the real phone everyone is waiting for, the iPhone SE 2. Unread got sold again, and we finally remembered the name of a favorite app that is no more. Some popular apps like Ulysses and One Password are changing business models, and we couldn't resist talking about software monetization one more time. Technically Diogo could resist, but sometimes friendship comes with a price. We also talk about surf and boulder, but it didn't make it to the final version of the episode. It's a shame I know, but it's a technology podcast. Music: The Wonder by Dave Deeper Photo: Michal Jarmoluk
My guest today is Jeff Richardson who is a treasured friend, and litigation partner at Adams and Reese LLP based in New Orleans. Jeff is also the author of the iPhone J.D. blog which the ABA Journal recently moved to their Blawg 100 Hall of Fame which recognizes outstanding legal blogs. I’ve presented with Jeff several times and always enjoy his energy and knowledge bank of all things iOS related. Apps mentioned in this podcast: 1Password Links: 1Password website (AgileBits) 1Password pricing 1Password for Families 1Password for Teams (great for law firms) Links above may be affiliate links to the iTunes App Store or Amazon.com.
In this episode, Shanta and Rashanii discuss Chris Brown, Soulja Boy and Karrueche Tran, Rashanii's One Password and his book of jokes, a man who pissed on a cop and lived, Kim Burrell, video games and more. Enjoy. Call the hotline at 916-572-9016 Leave an email at SingleSimulcast@gmail.com Twitter: @ ShantaFabulous, @SingleSimulcast, @Rashanii Websites: www.burymeinredlipstick.com; […] The post Episode 228: One Password appeared first on Single Simulcast.
Episodio 54 del Podcast de Hablando de Manzanas. Hablamos de los últimos productos que Apple ha sacado al mercado como el Macbook Pro y reflexionamos si realmente este año comprar lo último es realmente lo mejor. Contenido del episodio: - Teclados de iOS - Extensiones para iOS - Ger compra un MacBook Pro de la generación anterior - Touch Bar o pantalla táctil - Lanzamiento Airpods la próxima semana - Auriculares Beats Powerbeats Wireless 3 - Retraso en el dron Gopro Karma - Black Friday 25-11 (tenéis algún producto avistado?) - Aplicaciones recomendadas: > One note (multiplataforma), aplicación de Microsoft de notas para el Apple Watch > Evernote (multiplataforma), notas en todos lados > Pocket (iOS), noticias > One Password (multiplataforma), contraseñas y seguridad > Prices Drop Monitor (Mac), para los productos de Amazon Encontraréis este podcast disponible en iTunes en la sección de Podcasts y en nuestro canal de youtube: http://youtube.com/user/hablandodemanzanas Podcast en iTunes: https://itunes.apple.com/es/podcast/podcast-hablando-manzanas/id990588968?mt=2 Podéis seguirnos en: Twitter: http://twitter.com/hdmanzanas Facebook: http://facebook.com/hablandodemanzanas Google+: http://plus.google.com/+Hablandodemanzanas
Joining me this week form Agile Bits, the makers of the excellent 1Passworks is Chris De Jabet (Day-zhah-bay), Communicator in Brief). Especially good timing for this show what with the huge leak from Yahoo. We cover using 1Password, find out more about the team behind the app and pick up some hints and tips along the way. You can follow us on: EssentialApple.com / Twitter / Facebook / Google Plus / Slack chat – ask us for an invite any way you can get hold of us Fancy Helping Out The show? Our Amazon Affiliate Link means we get a very small amount of commission from whatever you purchase. If you really like the show that much and would like to make a regular donation then please consider joining our Patreon And a HUGE thank you to the patrons who already do. This podcast is powered by Pinecast.
The Law School Toolbox Podcast: Tools for Law Students from 1L to the Bar Exam, and Beyond
We will be honest with you, disasters in law school are inevitable. It's not a question of "if" disasters will happen, but "when." That's why it's crucial to be as prepared as possible to avoid total chaos when bad things happen. Law school is stressful enough without suffering through a total academic or life meltdown! Alison and Lee share some of their own personal disasters in law school and other situations that you may encounter. In this episode you will learn: What is the #1 problem that affects law school students? How and why to backup your computer files (seriously, just do it!) Ways to prevent and handle exam disasters How to prepare for the inevitable life meltdowns How to prepare your computer for exams How to overcome test anxiety How to rebound from a law school disaster Why it's important to build community Resources: Dropbox - (http://dropbox.com/) One Password - (https://agilebits.com/onepassword) Last Pass - (https://lastpass.com/) Mind Over Bar - (http://mindoverbar.com/) Build a Survival Kit (Red Cross) - (http://www.redcross.org/prepare/location/home-family/get-kit) Why You Need Renters Insurance (https://www.balancepro.net/education/publications/rentersinsurance.html) Why You Should Backup Your Files (https://www.backblaze.com/data-backup/backup-your-computer.html) If you enjoyed this episode, please let us know! We'd love a nice review and/or rating on iTunes. And feel free to reach out to us directly. You can always reach us via the contact form on the Law School Toolbox website (http://lawschooltoolbox.com/contact). Thanks for listening! Alison & Lee
In this episode, the knights offer up some picks of great software for OS X and iOS. Darcy’s picks - Zombies, Run!, PlugBug, and OnePassword. M.J.’s picks - iBoostUp, Jango Radio, and Lock Screen. Holly’s picks - BlindSide, Frotz, and VoiceBook VO. Eric’s picks - Voice Assistant, W&Y Pages, and Where’s My Rubber Ducky? Cara’s pick - The Night Sky Josh’s picks - TextExpander, GoodReads, and Ita, Lists You Like Also, if you’ve seen our white mice, do let us know!
SecuraBit Episode 72: Take risks, get owned! Recorded on December 29, 2010 Hosts: Anthony Gartner – @anthonygartner http://anthonygartner.com Chris Gerling – @chrisgerling Christopher Mills – @thechrisam Jason Mueller – @securabit_jay Andrew Borel – @andrew_secbit Guests: Jack Jones discusses Risk Assessment and the FAIR method http://riskmanagementinsight.com/ General topics: Risk Management, Small biz vs Enterprise Monte Carlo? How to Measure Anything: Finding the Value of Intangibles in Business by Douglas W. Hubbard http://www.amazon.com/How-Measure-Anything-Intangibles-Business/dp/0470539399/ref=tmm_hrd_title_0 OnePassword - http://agilewebsolutions.com/onepassword KeePass - http://keepass.info/ LastPass - http://lastpass.com/ Use our discount code "Connect_SecuraBit10" to get 10% off of ANY training course. The discount code is good for all SANS courses in all formats. Upcoming events #BSidesMSP (7 Jan 2011) ShmooCon (28-31 Jan 2011) RSA Conference 2011 (14 -18 Feb 2011) #BSidesSanFrancisco (14-15 Feb 2011) #BSidesAustin (11-12 March 2011) http://www.keepsecurityweird.org/ Links: http://securabit.com Chat with us on IRC at irc.freenode.net #securabit iTunes Podcast - http://itunes.apple.com/us/podcast/securabit/id280048405 iPhone App Now Available - http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8
SecuraBit Episode 71: Managing our Careers with Lee KushnerDecember 15, 2010Hosts:Anthony Gartner – @anthonygartner http://anthonygartner.comChris Gerling – @chrisgerlingChristopher Mills – @thechrisamAndrew Borel – @andrew_secbitGuests:Lee Kushner - @LJKush - http://www.ljkushner.com/ - http://www.infosecleaders.com/General topics:Discussion on Career ManagementThe importance of having a career plan.It’s a very crowded market in information security, and it’s getting more so every day.www.infosecleaders.com/2010-compensation-survey/FAQ: Compromised Commenting Accounts on Gawker Media http://lifehacker.com/5712785/OnePassword - http://agilewebsolutions.com/onepasswordKeePass - http://keepass.info/LastPass - http://lastpass.com/Use our discount code "Connect_SecuraBit10" to get 10% off of ANY training course. The discount code is good for all SANS courses in all formats.Upcoming events#BSidesBerlin (28-30 Dec 2010)#BSidesMSP (7 Jan 2011)ShmooCon (28-31 Jan 2011)RSA Conference 2011 (14 -18 Feb 2011)#BSidesSanFrancisco (14-15 Feb 2011)#BSidesAustin (March 2011)Links:http://securabit.comChat with us on IRC at irc.freenode.net #securabitiTunes Podcast - http://itunes.apple.com/us/podcast/securabit/id280048405iPhone App Now Available - http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8
Discuss this episode in the Muse community Follow @MuseAppHQ on Twitter Show notes 00:00:00 - Speaker 1: So I do think it’s a really tough sell for classic native apps into the enterprise. Now there is another market which you might call independent creative professionals, and these buyers value different things and say what they want is powerful tools that are shaped to their needs and workflow that they can deploy on their platform of choice, and that give them a lot of abilities and that are kind of unique to them as a creator. 00:00:26 - Speaker 2: Hello and welcome to Meta Muse. Muse is a tool for thought on iPad and Mac, but this podcast isn’t about Muse the product, it’s about Muse the company and the small team behind it. I’m here today with my colleagues Mark McGranaghan. Hey Adam, and Leonard S Saberski. Hello. And I don’t know if you fellows noticed, but we changed the intro a little bit. I did. So this is a bit more aspirational than actual, but exciting news, Muse 2 is coming early next year, that will be in early 2022. I’ll link to our roadmap memo talking about that, and one of the top features there is a MacA. 00:01:07 - Speaker 1: Very exciting, the pieces are coming together. 00:01:09 - Speaker 2: Yeah, and certainly this has been part of our vision from the beginning, tying together all the devices where creative people do work. Clearly, the iPad, while we think it was sort of like an underserved device and has a lot of potential for creative uses, particularly this thinking work that Muse is all about, but having, I think, pretty well explored that, we also need to fill in these other pieces of the puzzle. And so, desktop is obviously the next step there. And of course, one answer on desktop is you make a web app, either something runs in a browser or something that runs in a, what’s called an electron app, which is basically just kind of a wrapper for a browser or a web technology app. But we’re opting to do something that is what I would call a native app, and I thought that would be a great opportunity to explore the topic of native apps generally and what those even are and and what they mean for users of the software. So maybe we can talk a bit about the technical side of that because it is fundamentally a technical thing, but then the design user experience, you know, what does it mean to design a native app and what’s the benefit to users or how should things look or feel different for them. And I’d also like to speak a little to the business side at the end because we’ve seen a big growth in a lot of interesting productivity tools, both kind of business team, enterprisey stuff, but also personal tools and see how the native app question fits in there. So Mark, you’re the most technical of this group, I think by a fair shot. So maybe you could briefly define for us what is a native app or what’s even the alternative to that and how do they differ. 00:02:48 - Speaker 1: Well, there are a lot of different axes here, but let me give you the classic native app and then the contrast with say the web app. So classically, a native app is something that you download as a binary artifact like a DMG versus a web app where you would go to a URL. It’s implemented in the native language and stack of the platform. So for an Apple products that would be Objective C or Swift. And it integrates closely with the platform features and libraries for things like UI systems access, input and output, and so forth. Contrast with web, it’s going to be implemented in the language of the web, you know, HTML and you might have more or less access to the underlying platform features you might not be able to read it and write the disk, for example. And then I think importantly, traditionally native apps store things locally. On the local disk and web app store things in the cloud. Now, as we’re going to discuss, I’m sure you can mix and match different axis here, but that’s the classic native app as I see it. 00:03:45 - Speaker 2: Right, so I think of the classic native productivity tools would be something like the Microsoft Office Suite. So if you were on a Windows computer in the 90s or early 2000s and you would download or even install it from a CD probably, so you’ve got the, as you said, the binary program, you copy that software onto your computer, you run it there, and then when you want to save something, a XLS. or a doc that goes onto your hard drive somewhere and you can transmit that to someone else, you can email it, put it on a floppy disk or a thumb drive, but everything is very on the local device and the software is there and downloaded and runs right there on your computer. And nowadays, both with things like Google Docs, actually, I think Microsoft has even transitioned to cloud kind of web apps with their stuff as well. That’s something where you’re really connecting to someone else’s computer or cluster of computers, AKA the cloud through your web browser and everything stored. Basically, most of the sort of software itself is run on their computer and sort of the results just transmitted to you and the data itself is also stored there. 00:04:52 - Speaker 1: Yeah, and just to give an example of mixing and matching these different aspects, you have electron apps which are distributed as binaries like DMGs on Mac, but under the hood they wrap what is basically a web browser, so you have a web implementation and then the resulting feel and storage characteristics is often in between that of a native app and web app. It feels kind of webby, but also kind of native, depends on the individual developer, but that’s an example of how you can mix and match some of these axes. 00:05:22 - Speaker 2: Electron has become incredibly pervasive. Slack’s desktop app is Electron, so it’s the Spotify app, so there’s the Notion app, so there’s the FIMA app, so this sort of, yeah, wraps up, would otherwise be a web app. Another piece on the technical side, I think is it’s not just this kind of web and cloud versus local program and local storage duality, but it’s also how you implement that interface. So there’s typically APIs that are customed to a platform, so Windows. has a set of APIs, Mac has a set of APIs, iOS has a set of APIs, there’s often widget toolkits that go with that, you know, on Linux, you have something like GTK, often there are different widget toolkits, and so the degree to which you use or don’t use those can make it feel native. Now, Leonard, maybe you can give us the user experience or the design side. What does native mean kind of within your discipline? 00:06:18 - Speaker 3: Yeah, I think there are a few different ways of looking at it. So one is to just take the technical definition and look at, OK, we have a native app. What does that mean for the design of the interface? And we have a non-native app, what does that mean for the design? And there are sort of implications on both sides that can make the user experience better or worse. But what I actually find more interesting is thinking about what makes an app feel native and look native, even completely separate from the technical implementation of it. So I think there are a lot of different factors to untangle that just from the user experience, make an app feel native. 00:06:55 - Speaker 1: Yeah, and we can enumerate a few aspects of this. So one that you’ve mentioned already is the look and feel based on the UI toolkit and how the controls look. Another, I think is how the app interacts with the underlying platform. So for example, different platforms expect applications to write user data in different locations on the disk, you know, like Unix has like the slash user or whatever, and Mac has the till the application support or whatever it is on Mac, right? And sometimes you get these apps that are multi-platform, they start writing data in really random places and it confuses you. And maybe a third example, the most subtle would be the mental models and metaphors that an application uses. So on Mac kind of uniquely there’s this idea of app that’s separate from Windows, like physical instantiations of the app, and so you can have an app open with no Windows. Or you can have an app open with multiple windows, and that’s quite different from how it works on Windows, where if you click the X, like the application exits, because the window is the app and vice versa. 00:07:50 - Speaker 2: Linux window managers typically work the same ways, and also that you can run the program twice, right? So that was something I has a Linux on the desktop user for many, many years, and I actually really liked that if I ran my Text editor, for example, a second time with my command pallet or from the command line or just by clicking the icon, I would get a second window, a second instance of that, and with Mac, when you click on it in the dock or you all tab to it, it brings whatever was already there to the front. So basically whether the program is running or not gives you different behavior when you go to launch it. 00:08:24 - Speaker 1: And maybe one more thing we could throw in there in terms of platform access is just the power of the features that you have access to. So a lot of audio and video things, for example, are hard to get at if you’re not a more native app on the iPad, for example, you can only get 120 hertz if you can’t do that as a web app and so forth. 00:08:40 - Speaker 3: And I think a lot of that is not just because you don’t have technical access to those features, but even just because these apps are designed for so many different platforms and so many different devices that basically every feature that isn’t available on all of these platforms just isn’t that important and isn’t that easy to build. 00:09:00 - Speaker 1: Yes, and this brings us to what you might call the implied aspects or dimensions of native versus non-native apps. So you mentioned one which is if you’re building a non-native app, it’s often because you’re building for multiple platforms and then you tend to get this least common denominator effect where you only use the features that are available on all platforms. Another one that we found is quite important is performance, where sometimes but not always, if you implement the app in a way that’s less native, you can suffer worse performance or perhaps have a lower performance ceiling. 00:09:30 - Speaker 2: One thing we learned working with web technologies and styluses was, for example, that the data you could get from the APIs was just less. Yes, you can get input, maybe you can even tell it’s a stylus, but you couldn’t get, for example, the asimuth of the pencil. And maybe that doesn’t matter for your particular application, but for example, for Muse where we wanted to do weird stuff with you hold the stylus in a different grip, and then you get a different tool, and we thought this would be a cool and interesting and powerful way to take advantage of that unique form factor, but it just wasn’t on the web at the time. And I think the web tends to catch up eventually, but that stuff always comes first to the native platform APIs. 00:10:08 - Speaker 1: Yeah, it’s a good point that there’s a time dimension here where, as you said, often web or multi-platform umbrellas will catch up over time, but you’re less able to change as the underlying platform makes changes, you need to basically wait for the change to propagate up through the various abstraction layers that you’re using, whereas if you’re native, as soon as the underlying API changes, you can adopt it. 00:10:32 - Speaker 2: Now another slice maybe of the kind of native versus not, again on the technical side here is the web I think of as being the sort of universal runtime that won the wars of the early 2000s, so for those graybeards like me who are around to experience that. Java and the JBM was a very big push in the industry to create this concept of right once run anywhere, that you have different computing platforms or different kinds of computers, different operating systems, different manufacturers, but in a way they were kind of especially pre-mobile, they were basically all pretty similar in terms of they have screens and keyboards and some kind of pointing device and seems silly that you have to rewrite your app to run it in. Different places and the JVM had this concept that it could make this universal run time, make it run anywhere and Flash had a version of that as well, but they both were basically pretty terrible experiences for anyone that ever remembered running Java Servlet applications or Flash had its uses, but in the end also it felt like this this very confined box that was just constrained. From interacting with your computer in all these useful ways, and I think the web eventually won that war where essentially everyone now has a web runtime environment. It’s called the browser. It’s become extremely powerful. It often can tap a lot of the operating system APIs for hard audio and video access and things like that. And of course we do love the web for a lot of reasons and that has unlocked a lot of things, but in the end it is this essentially kind of translation layer. Another type of translation layer that isn’t requiring the user to install a runtime, that is a browser or a JVM is something like React Native, or something like Cordova. It’s the right ones run anywhere concept, but rather than trying to give that sort of general bundle to someone on Windows and someone on Mac downloads the same program, the Java jar or the web HTML plus related assets bundle. Instead, you actually compile it, trans. You might even say to each of these platforms. So React Native, for example, is a mobile application platform. You write your app for a phone, but then it can compile to iOS and it can compile to Android, and these are true native apps in the sense that then you compile them and build them with the normal iOS and Android tool chain, they become a binary artifact that is probably hard to tell from casual inspection. That it wasn’t built kind of directly using Xcode or the Android equivalent workspace. And yet of course it has the downside that now as you said, lowest common denominator there is this translation layer, but it just kind of happens at a different time. It happens on sort of the developer’s computer when they do the build and through this toolchain rather than the end user’s computer. And so that probably gives you some performance benefits, but there is this thing where you’re kind of homogenizing between the platforms. 00:13:36 - Speaker 1: Yeah, and with React Native in particular, you seem to get the now you have N +1 problems issue, which we have to some extent with browsers, sort of famously web developers deal with browser quirks and every browser is a little bit different, although that seems to be less of an issue these days with auto updating browser. But with React Native, it seems to be a huge deal. Probably because of the surface area and complexity and dynamism of the underlying APIs, just trying to write something that compiles reasonably and runs reasonably on these two platforms which are very different and have very particular APIs just has proven to be quite hard, but we can talk more about how that’s played out. 00:14:07 - Speaker 2: But where I thought the technical side interleaves pretty well with the designer user experience side is I feel like this. I don’t know if it’s a siren song, or at least it is an appealing idea to developers and to certainly to businesses that don’t want to have to maintain code bases and multiple platforms that you write kind of one single code base and then you can deliver it to different platforms through some kind of minor effort, minor translation layer. And I feel like it’s so compelling to the creators of the software, but then as a user of the software, then there’s this thing where, yeah, it just seems like it’s never as good. It’s gone through this translation layer, it’s lowest common denominator, either it feels like the other platform. So, one example there might be something like, I sometimes use the Audacity audio editor, which I originally used on Linux back when I was in that world, it’s built using the GTK toolkit, so it was native to that environment. And they build what you would call native versions for Windows and Mac, but it looks like Linux, because it uses the GTK toolkit, it does not integrate at all well, and that matters a lot for audio stuff, so it’s a good example there with Audacity, it’s hard to switch between your audio sources, it basically gets really confused, it just doesn’t use the Mac audio APIs very well, so it ends up feeling very, very clunky and feeling like it’s been transplanted from this other place, even though it’s been compiled in this way. 00:15:34 - Speaker 1: Yeah, and this is an engineering problem. You’re not fated one way or another to have either a great uniform app or a terrible app that looks bad on all the different platforms. Another example would be Flutter. Flutter. Yeah, so they did the same thing. It’s right once run anywhere for I think primarily targeting mobile platforms, but they did the thing where they reimplemented all the iOS controls, Pixel for Pixel, and it basically looks pretty good, even though you’re not using the AS controls at all, so it can be done, just big engineering problem. 00:16:01 - Speaker 2: So Leonard, what for you is some examples of great native apps that showcase, it’s not necessarily about the technology, but it’s about being designed specifically for a particular form factor, or a particular platform. 00:16:14 - Speaker 3: Yeah, I think the most obvious example to look at is just the Apple apps, you know, that’s the sort of gold standard, of course, in terms of native apps that are adapted to each platform. There has been, at least in recent times, like some exceptions to that, where they are also trying to bring the iPhone or the iPad app to the Mac. And that can result in something similar to just bringing a web app to the Mac, where it’s not really optimized for the platform and it doesn’t quite feel right. But yeah, there are some great examples and I think especially for the pro apps, you know, Final Cut or something. This is a very native app that feels great in its design exactly for the platform. I think there are still a few third party apps that do a great job, like Things app. Which is a task manager. 00:17:01 - Speaker 2: Things was gonna come to mind for me, yeah. 00:17:03 - Speaker 3: Yeah, and things are surprisingly, I don’t think they actually use that many completely native UI elements like a lot of the UI is sort of custom, but all of it feels very native and it is still a native app and they just customize elements to sort of bring in their own brand and do things a little bit differently to fit their needs. 00:17:25 - Speaker 2: Yeah, for me, the feeling native thing is not about using system controls. I think it’s good when kind of principle at least surprise or you’re familiar with these controls, and so therefore, you know, if your share sheet just uses that standard share action icon and you tap on it and you get a pop up, whereas I think it’s quite common. I know a couple of apps do this quite annoyingly where you tap that share icon and you get something that is not the iOS default share thing, maybe Twitter does that. 00:17:55 - Speaker 3: Yeah, I think YouTube does that and basically all the Google apps, like they first show a share sheet that highlights all the different Google ways to share and then like at the very bottom of the very right corner, you have to scroll to there’s like a tiny more button and then you get the actual share sheet. 00:18:09 - Speaker 2: Yeah, exactly, there’s some more thing and that takes you to the system one. For me, it’s not necessarily about using the system widgets everywhere, it is about performance, it is about using the form factor to its best extent, and I think things is an example I like because they have apps for Mac, for iPad, for the phone, and they’re all very similar visually and they have a lot of the same controls, but they use the different screen size. And they use the different options that are available in each place. So, for example, they’ve got great keyboard shortcuts, which you can use on the iPad and you can use on the Mac, they’re not relevant on the phone for obvious reasons, and so, making use of what exists in each place, even if it’s just different screen sizes and orientations, is part of what it’s about, that it’s been thought about, how do we make this work well on this. Device and I think that’s where often either the translation layers or back to some of our very first episodes of the podcast, Mark and I spoke quite a bit about what he usually calls the transliteration of apps, rather you take a desktop app and you try to bring it to the iPad, or you bring an iPhone app and you bring it to the iPad, and either way, if you haven’t really thought about iPad’s unique capabilities, unique form factor, it just feels like a port, like a weird port. And sometimes I’ve even seen versions of these where people take iPhone apps and make it available on iPad, but it doesn’t even work in landscape mode. It’s got this weird letterboxing. I almost think, why does this even exist? It is so out of place on this platform that you might as well just not even have it. 00:19:50 - Speaker 3: Yeah, I think there’s another reason here why many larger companies prefer a non-native design for the apps. And I think often it basically comes down to their brand identity and they don’t want to give up their brand for feeling native. So in the end, it becomes a decision between being native to the system and native to the brand that you’ve established and the sort of visual system around that. And so for example, apps like Spotify, they basically look the same on every platform, on every device and they also behave and feel similar, right? And I think for them, that’s a very conscious decision not only because they don’t want to develop a native app for every single platform, but also because their brand is so important to them. And I think that’s especially true for industries like music streaming or even like car sharing food ordering where it’s very commoditized and you basically have to rely on your brand for people to use your service. And so if they all switch to like a generally more bland, less branded native experience where they can’t control every single aspect of the app, I think that’s just not worth it to them. 00:20:59 - Speaker 2: I think you also see the war between the tech giant empires play out there a little bit, right? Google wants to bring their material design stuff. It’s actually an interesting thing recently where maybe it’s the Google Maps team or one of the teams that takes some of the Google products and brings them to iOS, and they retired a bunch of their custom widgets, some really interesting Twitter thread there. I’ll see if I can find and link it, but They do have a kind of consistent, I mean, material design is great and it’s consistent across these different platforms they’re on, it’s tied to their brand, but there is also this element of Google and Apple are kind of warring empires in a way, and you probably get a similar thing with Microsoft as well. And so it’s weird to say that you know Microsoft Office doesn’t feel that native on Mac because they want to like. Use their unique brand identity when Microsoft’s office is pretty bland and vanilla, but there is this element of it’s their, they’re trying to bring some of their empire into this other company’s empire, and so sometimes you see these wars play out, maybe like the YouTube share sheet is an example of that. What you’re seeing is not kind of user-centric design, what you’re seeing is the warring tech giants trying to encroach on each other’s territory. 00:22:12 - Speaker 3: Yeah, and I think if you take it to the extreme, there can be cases where basically a third party creates a platform on top of your system that’s just completely takes over the design. Like a lot of people just spend a ton of time on Facebook and use Facebook apps and Facebook services and everything that’s created there will just look like Facebook and not support anything system related. And I think there’s a similar thing in many countries where you know in China you have WeChat and that is like the platform that everything runs on and it doesn’t matter at all if it’s running on an iPhone or an Android. It just becomes the system essentially. 00:22:47 - Speaker 2: Yeah, that’s a good example, and I’ll tell you another good example, almost the most impressive one of all time, which was in the 1990s, Microsoft had an absolute lock on the desktop operating system. To the point that they were, you know, being hauled in front of federal courts for essentially having a monopoly, and the thing that eventually broke that was not legal action, I don’t think, but was the web and the appearance of the web browser was essentially this insertion of a whole other platform, or other almost operating system. That you could run inside this existing platform, and I think ultimately the web was what broke the Microsoft monoculture and Microsoft computing monopoly a little bit. And so rightly so, I think companies are afraid of that. Apple probably works hard to defend against that, for example, not allowing other browser engines on iOS or letting you do anything that runs code or anything that looks vaguely platform like and for good or for ill, but you can see why from a business perspective and defending your empire perspective, that’s a wise decision. So Leonard, you’ve been spending a lot of time on the design of Muse for Mac recently, and without giving too much away there, I’d be curious to know how you went into approaching that or if you have this idea in your mind that it’s good to design something to feel native, it’s less about the technology and more about how it feels and what the end user experiences, what principles did you bring to bear, or how are you approaching the design of use for Mac with that in mind? 00:24:23 - Speaker 3: Yeah, it’s interesting because Muse is basically a native app both on the iPad and on the Mac, but it does still feel like a bit of a foreign entity when you use it since we are not using that many system components by default and we are doing things a lot differently than many other iOS apps. 00:24:42 - Speaker 2: One of the things I found really interesting reading some of your just internal memos as you were gearing up for this project was pointing out that basically Muse for Mac will use a lot more system widgets and a lot more common conventions around things like menus and shortcuts and Right, click context menus and things, and that’s basically because Mac is the world’s best, it’s just my personal opinion, but I think a lot of people share it, it is the world’s best platform for creativity and productivity. So on iPad, we came into it saying we think this device has huge potential for creative tools, but that potential is not being exercised, and that’s lack of the right kind of software and it’s also lack of the right kind of support from the operating system or the right kind of widgets or the right kind of system APIs. And so we kind of invented a lot of our own, and we started with a literal blank canvas and brought in a lot of our own controls and interactions and so on, taking advantage of a lot of the things that make iOS very powerful, including the high performance and the programming frameworks and so on, but really the system level widgets were of less use to us. But it seems like on Mac, that will be less the case because in fact there is a multi-decade history. In fact, I would argue that Mac traces its lineage back to Xerox PARC when Steve Jobs went in there and saw the future of computers in the form of the Alto and brought that to Lisa and then the original Macintosh. And so it’s steadily accumulating all our best practices about how to be productive on computers in that time. 00:26:19 - Speaker 3: Yeah, I think iOS and iPads have something very special and unique there where every app really feels like its own world and it sort of lives on its own. And I think as a result of that, we have seen many native IOS apps looking very different from each other. And that’s not really as much the case on the Mac. Like the native apps on the Mac all look quite similar and feel quite similar. Like there are some that, you know, maybe trying things differently and either succeeding or failing, but in the end, like they are all trying to follow the same visual language. And that’s not really the case on iOS and I think that provides an interesting opportunity at least for designers to try new things. And I think you have to be a bit more careful with that on the Mac since yeah, there’s such a long tradition on the Mac and be right next to all kinds of other apps and people kind of have a different expectation of how an app fits into the system. And so I think a general rule for us, even though it doesn’t seem like it at first, is actually we deviate from sort of the native default design for a future, then like that has to be a very deliberate decision and like we have to have a reason for it. We have to understand why the system component or the system design pattern works differently and then we can sort of do our own thing with it. And I think that’s even more true on the Mac and there will also be less reasons basically to do our own thing. 00:27:41 - Speaker 2: Yeah, to name one example that comes to mind as a pretty core design idea from Muse dating back to our research prototype days is that you should never have to wait for anything, no controls, no gestures, have some kind of built. In delay. So the standard drag and drop on iOS, and that includes iPad OS, is that you hold your finger down for some period of time. It’s usually about half a second and then the item kind of lifts up and then you can carry it someplace else. And the problem with that is if you want to move a bunch of items quickly while you’re constantly waiting. And we wanted to make something where you could not only never have to wait, but in fact, with the larger screen of the iPad, there’s this really neat effect where you can start moving your hand in the direction of where you want to move the card, bring the finger down and sort of catch it just like it’s an index card sliding across your desk, move it to where it’s gonna go and let go. So there’s no delay there, but that, you know, is our own custom gesture system because that’s quite an unusual way to do things as far as I know. I don’t know that I’ve seen any other app on iOS do that, whereas on Mac, yeah, guess what, when you click on an item and start dragging it, it goes right away. That’s, that’s how it works. That’s how basically all programs work. And so, great, so there we just do the standard thing that everyone else does. 00:29:03 - Speaker 3: Yeah, I think you can really achieve a lot if you try to play to each system’s strength and not just, you know, try to adapt one element and like make it work. But really think about the different kinds of inputs and systems surrounding your app. Like at the very basic level on the iPad, of course, we have touch input and, you know, that feels great. You have like a very direct way to manipulate things, can your gestures and we use that a lot from use on the iPad. But then on the Mac, like if we just take all of that stuff and let you do the same stuff with the mouse, yeah, theoretically that would work, but it’s just not going to feel great. And so instead, the mouse has its own benefits, right? Like it’s much more precise. It can be used in tandem with the keyboard that’s also always there. And so I think there will be a lot of opportunities like that where if we really think about what the strength of each platform is, then we can do something that web apps which have to serve the lowest common denominator, can’t even do at all. 00:30:01 - Speaker 2: And I think it’s not just the capabilities of the platform, but the use cases you are going to use them for and even how you were sitting. So Mark, I think this was part of your kind of original vision for the multi-device use experience. I’ll see if I can paraphrase here, which is, you know, when you’re at the computer, you’re in this focus posture, you’re probably sitting upright, you’ve got the bigger screen, you’ve got the keyboard and mouse. You’re probably doing something like deep research on the web or maybe production work, like writing a long paper or designing an interface or something, whereas the tablet, maybe you’re sitting in a reading chair, you’re at a cafe, maybe you’re outside somewhere. You’re in this much more relaxed, or you have a lot more variety of positions you can have flat on the desk, sitting in your lap, that sort of thing. You might be holding it in different angles and you’re using it more for this thinking, arranging, pondering, you’re scratching your chin and sipping your coffee and maybe getting up and pacing around the room. You know, that’s more of the setting that you’re in. And so, of course, you have different capabilities on each device, but in many cases you actually have different uses, and so we should be as much as we can designing for those uses, I think, without also being too restrictive about we obviously don’t want to stop you from doing any one particular thing in any one particular environment, but knowing roughly what sort of environment and what sort of use you’re having seems like a thing to take into account with the design work. 00:31:24 - Speaker 1: Yeah, exactly, and then by the way, the phone is going to be, you’re on the go, you have one hand and a few taps, and that’s it to either save something or look something up quickly. 00:31:32 - Speaker 2: Yeah, a good example on the phone is I think it’s considered best practice, and I think I probably agree with this to try to make everything doable essentially with one finger, basically one thumb, and also a thumb that you can reach, you know, maybe in the bottom half of the screen. So most of what you want to do when you’re hailing a ride. You’re messaging with a friend, you’re quickly looking something up on the map. You got to imagine that you’re juggling the phone in one hand, maybe you got a coffee or a baby or a dog’s leash or a bag in the other hand, it’s a noisy environment, maybe you’re outside. And so what the design should prepare for is I’m at my office, it’s quiet. I’m looking at a big screen, I’ve got my hands on a full-sized keyboard, and I can take my time and I have much more precision, and I want more control and power, but it’s also OK if the essentially things are a lot fussier. There’s more on screen at the time, and if I click on the wrong place, it’s OK, I’ll undo that sort of thing. 00:32:29 - Speaker 1: OK, so we’ve been talking a little bit abstractly here about use cases and postures and number of hands available and so forth. Leonard, to kind of bring it back to the concrete visuals, how do you see that being different across these different platforms and native versus non-native? 00:32:43 - Speaker 3: Yeah, I feel like there’s always a very interesting conflict between native and non-native apps where native apps always seem like sort of the dull ones and the ones that aren’t going to be visually unique or interesting. Like we talked about this earlier with the brand design and presumably if you do a native app, you know, your brand is not really going to shine through. And so I think the instinct is very often to just not follow the native design so that you can sort of do something unique and do something interesting and then your app will actually stand out from the crowd. 00:33:14 - Speaker 1: This is like moral hazard, visual designer edition. It reminds me in the world of engineering where sometimes companies make it a requirement to get promoted, they do something complicated, and then so engineers introduce a whole bunch of unnecessary complicated stuff into production because they want to get promoted. As a similar vibe to me. 00:33:30 - Speaker 3: Yeah, I think there’s actually a management part to that where as a designer, if you, if you strictly try to follow the system components, like those are basically constraints, and if someone tells you and says, you know, we want to do a specific thing this way, then you might have to say that’s not compatible with the system way of doing it and we can’t do that since we are following the system guidelines. And so it’s very appealing in that way to just do your own thing and then you can always say, OK, yeah, let’s do what we want basically. I do think we kind of have a bit of a lost art idea of being able to get the most out of the native components and being able to bring your own design language into them. Like if you look a few decades back to something like Windows 95. Like there when you download like a media player from the internet, you would actually have skins that you can also download and then the app just looks completely different and completely wacky and basically by now modern interface standards usable, but it introduced a ton of personalization and sort of uniqueness to the whole platform, right? And I think it’s somewhat making a comeback that like some apps have options for themes or skins you can click through and those can still be native apps and they just sort of transform how things look a bit and introduce some personalization to it. 00:34:46 - Speaker 2: One interesting point there, I think we talked about with Weiweiu in our episode about expressive tools is there’s the designer or the company getting to express their unique brand, like you mentioned Spotify, and then there’s the individual getting to customize so that they can express their unique personality through their computing environment. So I think the Winna skins were great. Yeah, a lot of them were maybe not super usable, but maybe for a media player, that’s pretty simple anyways, it’s just like play pause, volume, jump track, you as a user are choosing, I want this wacky, brightly colored one, because I like what that expresses about myself and brings some customization to my computing environment. Which something about that feels more wholesome or maybe just comes back to this user-centric thing again compared to my company has a prerogative to use our brand styling system everywhere possible in order to maximize shareholder value or a designer wants to get promoted because they did something cool and unique that stood out to their team or to their boss. I don’t want to be too negative on that. I think there are a lot of good places for bringing unique style and character to an application that reflects your team or your product, but I think those are two really different categories. 00:36:05 - Speaker 3: Yeah, I guess what I would like to see more is just people trying to merge the two and trying to use native components and still infuse them with their own brand. Like one great example of that is a Wikipedia reading app called V for Wikipedia. And that basically uses like 90% system components, but if you just look at it, like it still exudes sort of its own style just by type of. colors, iconography, animations, good image views, and that sort of requires, I think, a pretty high craftsmanship to be able to really merge the two and you have to really know what each component is doing and what you’re trying to do with it. But yeah, I think if we could see more of that, that would elevate native apps to a level where non-native apps don’t have as much as an advantage at these foreign brands anymore. 00:36:56 - Speaker 2: Another example that comes to mind for me on that when you’re talking about typography is Twitter. I think they do pretty well with something that to me feels like a pretty fundamental app on the iPhone, browsing social media sort of like, for better or for worse, what our pocket communicators have largely become for. They have a new typeface that I think they had custom designed, but for the most part, they really give over the space to user content. You have avatars, you have the handles, you have the tweet. And you have, you know, an image or video, and you can scroll through that in a feed, and it mostly feels pretty kind of integrated to the operating system, and I think it works pretty well with the share actions and things like that, although they may have their own share button problems. But in general, it feels like there’s a Twitter brand, but it also doesn’t feel too overbearing or feeling like they’re forcing it on you, or either that that’s taking away from sort of the personal brands, you could say a person communicates through their Twitter bio or whatever, or that it feels out of place on the iPhone. I think it feels very good and natural on the phone. Multimemedia kind of audio and video stuff. There’s also another interesting one coming back to the WA thing, and you also mentioned Final Cut, uh, program I use, which is maybe in between those two is called Screen Flow, which is a really nice kind of classic screen recording software for Mac and been using it for many years, and it’s sort of not nearly as complex or sophisticated asinal Cut. But it does allow you to do quite a lot that’s very specific to screen recordings related to use and other software that I work with, and it feels very native, it’s certainly fast, it uses system widgets and that sort of thing, but it also does bring some of its own style to how the timeline is shown, how you interact with, you kind of slice and slice the video clips, and what happens, you know, they do a little icon of a rabbit when you are doing a sped up clip and a little icon of a turtle and it’s slowed down. So I think that’s kind of a nice example from an indie shop. 00:38:57 - Speaker 3: Yeah, I think that’s a good way to do it in general, to sort of infuse the uniqueness and branding into the components that make your app special anyway, like yeah, for a video editor, that’s like the timeline and specific settings for it, but then try to use system components whenever you have more standard options. 00:39:15 - Speaker 2: So two interesting apps I’d love to reflect on here are Sketch and Nova. So both of them have essentially worked native in the concept of being a native app into their marketing, which is unusual because I think that’s typically seen as more of a technology term or a kind of an insider jargon. That sketch, for example, has this beautiful article titled Part of Your World, Why We’re proud to have Built a truly native Mac app, and then Nova right on their homepage, they talk about a native Mac code editor and why that’s better, and basically all of their value proposition is around why being native is a better experience for the end user. I think your users of both of those pieces of software, Leonard, I’d be curious your take on those specifically and sort of presenting it as a user benefit in their marketing. 00:40:06 - Speaker 3: Yeah, I feel like for sketch, it’s certainly a unique selling point, especially since they are an app for designers, and I think a lot of designers still do care about that craftsmanship that is in the native app and like prefer using native apps. And so I feel like they specifically sort of have to lean on that. But then on the other end you have FIMA, which is not native and it’s still doing great, right? Like it’s a very fast app. The first time I heard of it was because Sketch was actually really slow and like crashing a lot with large files while on Figma, the same sort of designed files were just completely smooth. So they still managed to, in terms of performance be similar. In terms of the design of the interface, they are very similar to sketch, like you don’t have to adapt too much. And at least over the last few years, it feels like Figma just has gotten a lot better than Sketch at developing new features and basically making a better app faster than Sketch can make an app that supports collaboration and the web, basically. 00:41:08 - Speaker 2: Yeah, I think that brings us nicely into the business side of this, which is kind of the last piece I wanted to talk about which. Maybe the sketch figma thing is something we’re seeing play out throughout the industry, which is FIA can start with something that is maybe worse in some perspectives because it’s not native, but they’re able to reach a wider audience, they’re able to offer these sharing and collaboration features that in turn, and those things are both valuable enough, they can essentially earn more money or attract more investment dollars. They can use that to hire an unbelievably good engineering team that have done. Just really remarkable things with using the web platform through web assembly and other quite impressive tricks, and therefore more or less keep up with and maybe even in some cases beat sketch on some elements like performance, obviously things like integration the system APIs will just never be possible. But maybe those aren’t quite valuable enough to users, at least not in comparison to being available on every platform by default and the kind of sharing and collaboration features and so then that naturally creates a flywheel where they can earn more, they can get more investment and then they can make the product that much better. So to me, it comes to a tough question for us, the software makers and all software creators have to consider the same thing, which is we can sit here and say we love the crafts personship and the design work and the performance of native applications, but then if we look at the industry, I wonder, is that kind of a bad bet? Are we sort of picking the losing side? 00:42:38 - Speaker 1: OK, a few thoughts here. I do think that the center of gravity of how software is implemented in terms of the language, the platform, the deployment is going to be determined by the economics and right now the best economics in the industry are an enterprise software. There’s also a consumer software which we can talk about, but let. Focus on enterprise. One of the things that enterprise buyers care about, it’s uniformity and ease of distribution, control, security, ability to facilitate collaboration, which is almost a definition of an enterprise, right? And these are things that the web really excels at. So to my mind, Sigma was better than Sketch for enterprises because the things that enterprises value were just more aligned with how the web works, you know, that Sketch might have had better native API integration. It’s almost like not even wrong. It’s just not what the enterprises, I think we’re looking at when they were looking to buy software to support collaborative design, right? So I do think it’s a really tough sell for classic native apps into the enterprise. Now there is another market which you might call independent creative professionals, and these buyers value different things. They don’t necessarily care about uniformity of distribution and control by someone else in anti-fe and say what they want is. Powerful tools that are shaped to their needs and workflow that they can deploy on their platform of choice, and that give them a lot of abilities and that are kind of unique to them as a creator. And so I do think you see these tools succeed with this platform choice with things like sublime text or even something like Final Cut Pro. But there’s this asterisk of success is different because the market is much smaller. That’s just the way the market is right now. The ability to price these things is significantly lower than enterprise software, so that is what it is. So I think it’s not so much that one is better than the other is that they’re aligned with different markets and the markets are of different size, and I mentioned consumer briefly. Now consumer, I would actually say is better for natives, in particular, it’s better for iOS, which is the main platform in terms of money. And their consumers actually really value performance and integration with their phone with things like contacts and so forth, and so there you do see native apps winning. One other thing that I’ll say here is I do think that sounds maybe a little bit bleak for native apps. There is the consumer positive and of course there’s this independent creative professional positive that we’re targeting with Muse. I do think that there are a lot of sensibilities from native apps that you can pull into apps that are distributed over the web, because I mentioned that these axes are somewhat independent. So one of my favorite examples and sorry notion, I’m gonna pick on you again, we do it because we love you. Notion search is really slow. You type a sync, which is something that we’re working on now, and it takes like 5 seconds to show you a result. And that’s not because of native versus web, like whether it’s written in JavaScript or objective C. It’s slow because it’s going to a remote server and like scanning notions entire database for stuff. My sync, where if instead it worked like a local app where just loaded all the data in memory and scanned everything I’ve ever written, they could do that in 10 milliseconds, right? That’s an example where you could have something distributed over the web with something like an electron app, but they had more of this native slash local first sensibility and gave you some of those benefits. So it’s not all bleak. 00:45:38 - Speaker 2: Yeah, well, as you said, that comes back to the data question and so it’s less about, you could have a native app that was mostly doing things through APIs to cloud backend, and yeah, every time you need to do a quick search, it has to go, you know, round trip to the cloud. But you would also have a web technologies app that has much more local stuff. I think it was something like Kevin Lynasiner is one good example where he wrote the thing in Rust. He had the goal of 60 frames per second. It’s a nice blog post about that, I’ll link, and it’s really all about looking stuff up on your local system, and he used web technologies because that’s what he’s good at using, and you can make them fast if you want to, but it really is about the data locality more than how the software is built, let’s say. I think another important question on the business side is the platform creator and what their incentives are. So, we’ve definitely seen this and talked about it a little bit with being a prosumer iPad app, means that you’ve got the App Store with the heavy-handed review. And the pretty limited things that you can do inside the application, and a lot of things you inherit from App Store economics, which are really all about consumer, but makes it harder to do a subscription prosumer piece of software, for example, and probably Apple’s incentives are such that that’s not super likely to change because the iPhone is their big product and the App Store is made to serve that, basically. And then similarly, you might have something like Google, which has platforms like Android or Chrome OS, but you know, when you look at their business empire, those are not primarily moneymakers for them, they’re primarily channels to get you into the places they actually make money, which is, for example, having you do searches and serving you ads. And even Microsoft famously in many ways the most successful platform maker of all time, as we talked about that 90s computing platform Monopoly, they, as of a few years back, basically deemphasized Windows that when Satya came on as CEO, basically said, look, Windows is Microsoft’s past, it’s still a piece of our business, we need to create it and make it good, but it’s not their big focus and it’s not their big moneymaker. So then the Individual platforms in terms of what they want to incentivize with developers, in terms of how they, how you distribute apps, how they allow or enable you to make money or not make money through the apps. Certainly things like app stores, what APIs are provided, all of that plays into dynamics about what kind of software can get created, and it really does feel to me like the web. Ends up being the best, not just for enterprise for the reasons you said, Mark, but even this more prosumer world of things, you know, I think we see this kind of tools for thought, space, you know, that includes the notions and figmas of the world, but also something like Rome or obsidian, for example. Yeah, it’s just the web is I don’t know, superhuman or linear. These apps by being on the web, they get maximum control, they get ease of distribution, and they get to charge money without an intermediary, and that’s just a very powerful thing for business. 00:48:46 - Speaker 1: Yeah, yet another important idea in this political economy of software that we’ve been talking about a few times on this podcast. I think that’s an important like. 00:48:55 - Speaker 3: And I think even if we assume naively that the goal of every company is just to create the best app possible, even then native apps become less and less a good choice, the more devices you want to support. And so as Mark said, enterprise companies just need to support many devices. And so if you try to do native apps for all of these, like that’s not gonna be possible. You won’t be able to really create a good experience across like 10 different platforms and device factors, right? And so I think that’s why we often see native apps more with smaller companies that may be focused on, yeah, either a single user environment where you don’t need to support many different platforms and ideally even an environment like Apple’s platforms where you have the Mac, the iPad, and the iPhone, or even the Apple Watch, all kinds. sharing some APIs and the code base and some design language so that a few people can reasonably keep it all in the head and sort of design and build a good product for all of these platforms, and that sort of approach doesn’t really work anymore for larger enterprise companies where you need to have apps on many different devices. 00:50:04 - Speaker 1: And now that we’re talking about this, I got another riff, so we talked about how perhaps enterprises tend to choose web because there’s all this collaboration amongst the members of the enterprise, which in fact is almost the definition of an enterprise, but increasingly you could say we’re all part of the enterprise of like the software community, and this is a little bit of a joke, but here’s what I mean. It used to be that you would like go to the software store and you would buy a box with Excel and you would install it and you would try to learn it yourself, and that was kind of that. But now we’re in a much more networked community. So for example, If you are doing design, you might want access to a plug-in that was authored by someone else on the internet and to be able to install it. Well, by the way, it’s a lot easier if you’re using FIMA, or it just might be that you want to look at a YouTube tutorial of how to do something. I said several times in this podcast that YouTube is very important, and if your product is available on essentially all devices, there’s more likely to be good YouTube content, so there’s this big positive externality that feeds back in. So this is kind of me partially trying to understand why it is that what Adam just said was true about the web also seems appealing for what looked like in one sense to be individuals, but even there there’s an element of community and participation. 00:51:10 - Speaker 2: One item might be remiss to leave out in the business discussion was there was a bit of a kerfuffle, I might say in the iOS slash Apple developer community when OnePassword, which is one of the more successful password managers, announced that they were switching from their native built password manager on the Mac to one built on what’s basically web technologies, it’s like Rust and Electron, I think. 00:51:34 - Speaker 1: I was going to give them as an example of a good native app earlier. 00:51:37 - Speaker 2: Exactly, so the Twitter discussions that followed were essentially, OK, you got this shining example of an indie software company that has created a lovingly crafted and well designed native app for many years, you know, there’s many password managers, but one password is successful largely on the strength of the look and feel and performance that feels very native and feels very integrated, particularly with Apple stuff. And then they essentially raised a big round of venture capital and immediately thereafter switched their previously native app to these web technologies and people felt betrayed, or that it was some kind of a harbinger for the future of native apps generally and maybe Mac specifically. And they ended up doing a follow-up blog post that I’ll link in the show notes that was interesting about essentially the engineering management and business decisions they made that led up to that, and some of them are just some specific things related to exactly where the platform APIs are in the moment. But maybe it does come back to that question of when you’re trying to serve the widest possible audience, and you’ve got an engineering team and it’s just a good business decision, even when you’ve got a pretty big engineering team, you think, can’t you afford folks to build native apps on all these platforms and actually just makes more sense to have this unified code base and less to support. So we’ve talked about the technology side and the cost of building the apps, we’ve talked about the design and user experience, we talked about the business. Are there any other aspects of native versus non-native that are notable to touch on here? 00:53:06 - Speaker 3: Yeah, I feel like one of overlooked aspect is accessibility. That’s kind of a big victim of non-native apps where accessibility really depends on system features, right? Like you wanna be able to set in the system settings what you need and rely on these features that providers like Apple built across the system and not, you can’t fine tune these settings for every single app and you can’t. Rely on every single developer building like a complete suite of accessibility features. That’s just not going to happen. And so for that system to work, you kind of need native apps that can support these native APIs and build with accessibility in mind and non-native apps just can’t really do that. And there isn’t usually time to build custom implementations for non-native apps for accessibility. 00:53:55 - Speaker 1: That is an interesting one. I’ve been thinking about this in the back of my mind because the type of non-native technology that I’m most excited about is the setup where you have a high performance language that you compile down to a very narrow runtime, like the rust slashwam style, for example, where you write the app in a high performance language, it compiles down to what is basically like a web native binary, and then you can run that wherever you want. But there’s only a very thin API between what becomes the application and the platform, in contrast to the usual thing where there’s like a whole windowing system and tool kit and widgets and everything that the platform provides. And yeah, in that world in particular, you implement your very high performance text editor, but then what people can’t, you know, highlight the text so they can’t have it spoken to them or whatever. It’s tough. One thing I wonder though is, can you separate a little bit the platform hooks for accessibility from the implementation. So to take the example of text size, one way to do that is there is a platform standard text implementation, which I’m sure there is on Mac and iOS, and if you use that, it automatically scales the text up and down according to whatever. The user has set in the universal text size settings, but it could also be that there’s a thing you can call which is like get current text size, and then in your own implementation of text you could scale the text accordingly and yes, it’s gonna be harder and less likely people do it, but it’s still potentially possible, especially if there are various other libraries and other library options for UI widgeting. So yeah, it’s tough. One other question I have is what do games do because games are typically implemented in this way where you have basically the game takes over the whole screen and does whatever it wants, including different ways of rendering texts and so forth. So I kind of wonder what they do. It’s probably a lot of just don’t support accessibility, but maybe there’s a fire right there. 00:55:40 - Speaker 2: Yeah, I think it just ends up being a custom implementation per game, so whether it’s color blind mode, or changing the text size or different kind of input controls, there’s a good game maker’s tool kit video, I’ll link to that. But yeah, essentially it’s all up to the developer, which often means that smaller indie games just can’t or don’t have the resources to support that, but of course the AAA games have these massive budgets and massive teams, is both possible and really in their business interests, because once you’re going to a wide enough audience, then even a small percentage of people that have a particular type of color blindness to pick one example of an accessibility area, that actually represents a pretty good number of customers for you. Well, maybe as a closing point, we’ve talked all about the pros and cons. I think it sounds like we come down personally pretty strongly in favor of native, but we also see where business wise that might be a more questionable thing as the world evolves. So I’d love to hear from each of you and maybe I have my own answer. Why are we making news for Mac and why not use for the web? 00:56:48 - Speaker 1: Yeah, well, I actually don’t have a very dogmatic answer to that. It’s that we had a few key desiderata for the Muse, let’s call it desktop app, you know, the thing that you’re going to run on your Mac, and the two main options for implementing that would be a maybe the three options would be a classic native app, an electron app, and a web app. And there’s things like performance, but a huge thing for us was access to the file system to be able to do a local first work, which basically eliminates the web option, really you’re left with electron and classic native and I do think the performance is quite a bit better for a classic native, and also we have this potential to share a lot of code between the iOS app and the desktop app, so there was a clear path to implementing it. So that’s why I would have thought about it. 00:57:31 - Speaker 2: Yeah, for me, the answer is also all about performance and that also connects to the local first or local data storage. Again, you can do that with electronic web technologies, but I feel like it’s more of a reach. The electron app that uses local storage. It’