POPULARITY
Personal Devices wissen bereits alles über ihre Nutzer. Wären dann nicht auch KI-Modelle, die direkt auf dem Gerät arbeiten und die dort vorhandenen Daten lokal, ohne vorherigen Upload, benutzen können, total praktisch?fullmoon ist eine experimentelle iOS-App, die es ermöglicht, lokal mit Llama zu chatten. Aktuell ist die App bei TestFlight erhältlich und bietet die Installation der Llama-Modelle 3.2 1B und 3B an.// fullmoon by Mainframe• https://blog.mainfra.me/p/making-llama-more-accessible// Produziert von THINK REACTOR Media• Host: Roland Becker• Tech: Julian Keller, Max Reitstetter, Franziska Ahorn// THINK REACTOR• Website: https://thinkreactor.com• LinkedIn: https://www.linkedin.com/company/think-reactor• Instagram: https://thinkreactor.com/instagram• Twitter: https://thinkreactor.com/twitter Hosted on Acast. See acast.com/privacy for more information.
Want to get started with HighLevel? Sign up for an exclusive 30-day FREE trial here
“If this tech keeps developing as fast as it does right now, will I ever be able to catch up?” is a question on my mind and the minds of many founders I've been talking to recently.So, what about AI should we focus on? Where will this tech slow down, where will it speed up even more, and what should we focus on for our businesses?This episode is sponsored by Acquire.comThe blog post: https://thebootstrappedfounder.com/ai-hype-the-straight-line-bias-and-the-fear-of-not-keeping-up/The podcast episode: https://tbf.fm/episodes/305-ai-hype-the-straight-line-bias-and-the-fear-of-not-keeping-upCheck out Podscan to get alerts when you're mentioned on podcasts: https://podscan.fmSend me a voicemail on Podline: https://podline.fm/arvidYou'll find my weekly article on my blog: https://thebootstrappedfounder.comPodcast: https://thebootstrappedfounder.com/podcastNewsletter: https://thebootstrappedfounder.com/newsletterMy book Zero to Sold: https://zerotosold.com/My book The Embedded Entrepreneur: https://embeddedentrepreneur.com/My course Find Your Following: https://findyourfollowing.comHere are a few tools I use. Using my affiliate links will support my work at no additional cost to you.- Notion (which I use to organize, write, coordinate, and archive my podcast + newsletter): https://affiliate.notion.so/465mv1536drx- Riverside.fm (that's what I recorded this episode with): https://riverside.fm/?via=arvid- TweetHunter (for speedy scheduling and writing Tweets): http://tweethunter.io/?via=arvid- HypeFury (for massive Twitter analytics and scheduling): https://hypefury.com/?via=arvid60- AudioPen (for taking voice notes and getting amazing summaries): https://audiopen.ai/?aff=PXErZ- Descript (for word-based video editing, subtitles, and clips): https://www.descript.com/?lmref=3cf39Q- ConvertKit (for email lists, newsletters, even finding sponsors): https://convertkit.com?lmref=bN9CZw
As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won't cut it. How can employees and organisations mitigate the cyber-risks associated with employee-owned devices and help avoid jeopardising corporate data and the data of their customers? While there is no 'one size fits all' solution, a few measures will go a long way to shielding companies from harm. Reduce the corporate attack surface Employee use of devices outside of the purview of IT is, particularly if left unchecked, become a major threat to corporate data. In an era where bad actors constantly look for chinks in companies' armors, limiting the number of such potential entry points is a no-brainer. Importantly, then, organisations need to take inventory of every device accessing their networks, as well as set security standards and configurations that employee devices must meet to ensure a baseline level of protection. Update software and operating systems The importance of installing security updates to patch known vulnerabilities in a timely fashion cannot be overstated, as hardly a day goes by without news of discoveries of new vulnerabilities in widely used software. Ensuring that employees work on updated devices is certainly easier when they use company-issued laptops and smartphones and can rely on support from the IT department that stays on top of and installs software updates on their machines soon after they are released. If the task of keeping software on their devices up-to-date does fall to the employees themselves, organisations can, at the very least, be diligent when it comes to reminding their employees that patches are available, providing them with how-to guides for applying the updates, and monitoring progress. Establish a secure connection If a remote employee needs to access the organisation's network, the organisation needs to be aware of this. Remote workers may use not just their home Wi-Fi networks, but also public Wi-Fi networks. In either scenario, a properly configured virtual private network (VPN) that lets remote workers access corporate resources as if they were sitting in the office is an easy way of reducing the organisation's exposure to weaknesses that could otherwise be exploited by cybercriminals. Protect crown jewels Storing confidential corporate data on a personal device clearly poses a risk especially if the device is lost or stolen and isn't password-protected and its hard drive isn't encrypted. Much the same goes for letting someone else use the device. Even if it's "just" a family member, this practice can still lead to the compromise of the company's crown jewels, regardless of whether the data is stored locally or, as is common in the work-from-anywhere era, in the cloud. A few simple measures - such as making strong password protection and auto-locking a requirement and teaching employees about the need to prevent anyone else from using the device - will go a long way towards shielding the company's data from harm. Secure videoconferencing Videoconferencing services experienced a boom thanks to the pandemic as all meetings that were originally in-person moved to the virtual world. Organisations should create guidelines for using videoconferencing services, such as which software to use and how to secure the connection. More specifically, it is advisable to use software that comes complete with robust security features, including end-to-end encryption and password protection for calls, that will shield confidential data from prying eyes. Software and people Forgoing reputable multilayered security software on devices that have access to corporate systems is a recipe for disaster. Such software - especially if managed by the company's security or IT team - can save everybody many headaches and, ultimately, time and money. Among other things, this can provide safeguards against the most recent malware threats, secure corporate data even if the devi...
HOLOCENE Magazine + StoreCW&T IGRob Auchincloss IGSHOW NOTESsee more Hosted on Acast. See acast.com/privacy for more information.
How to find Teresa: * https://www.facebook.com/teresabarnesrn* https://www.instagram.com/teresabarnesrn/?hl=en* https://www.linkedin.com/in/hearteresabarnesrn/* https://www.youtube.com/c/TeresaBarnes* https://barnescommunicationsolutions.com/* https://barnescommunicationsolutions.podia.com/* 760.717.8190 or tjb@barnescommunicationsolutions.comADA and ADA Amended ACT for Communication Disabilities: Addressing hearing disabilities and how businesses can become ADA compliant. "You don't know what you don't know that 1 in 5 have hearing disability that affects businesses of 15 or more." Title Ihttps://www.ada.gov/effective-comm.htm1. https://totalfood.com/groundbreaking-lawsuit-against-nike-prompts-employers-to-consider-transparent-face-masks-as-an-ada-accommodation-during-the-pandemic/2. https://www.eeoc.gov/laws/guidance/deafness-and-hearing-impairments-workplace-and-americans-disabilities-act
With methods of professional communication constantly evolving, the U.S. Department of Justice (DOJ) recently revised its Evaluation of Corporate Compliance Programs to address how prosecutors should evaluate the ways that companies are accounting for these developing risks. Corporate policies and procedures must keep pace with these changes as professional communication shifts to personal devices and messaging platforms.White Collar + Government Investigations Partners Abbey Hazlett and Megan Rahman, eMerge Managing Partner Alison Grounds, and eMerge Managing Director of Technology Chris Haley discuss the realities of conducting business in 2023. They will look at how regulators respond to the increased use of alternative means of communicating in the business context and some of the key considerations for companies subject to their scrutiny. Their discussion includes an overview of the DOJ's updated guidance and current regulatory landscape, perspectives on the compliance risks associated with electronic communication, bring-your-own-device (BYOD) policies, records retention, preservation and collection, and best practices for training and compliance programs.
A Reuters poll reveals that two-thirds of Americans are concerned about the negative effects of artificial intelligence. One of our tech experts is back to break down the complex implications of AI. Plus, how to spring-clean your personal devices.
Montana became the first U.S. state on Friday to pass legislation banning TikTok on all personal devices. Should Governor Gianforte sign the bill—which would take effect in January—prohibiting TikTok from operating within state lines and barring app stores from offering TikTok for downloads? Earl Foote, CEO of Nexus IT, shares his thoughts on this legislation and explains how it could work.See omnystudio.com/listener for privacy information.
Ruth Buchanan, employment eartner in Ashurst's London office is joined by James Comber, a contentious regulatory partner in Hong Kong, Dr Andreas Mauroschat, partner and head of employment, IT, data protection and compliance practice in the Frankfurt office, Rhiannon Webster, head of Ashursts data protection practice in London and Karen Mitra, who leads the Asian employment practice out of the Singapore office. This episode takes a deep dive into the employment, privacy and financial regulation issues which employers should consider when they want to know how to access employees' personal devices, for example, to access data from WhatsApp or similar messaging services. Key takeaways include employers incorporating a clause into employment contracts, explaining that the organisation may undertake personal phone monitoring as a deterrent or to ensure that it can comply with regulatory obligations regarding record keeping. Considering whether in-house resources can undertake checks of personal devices and how that would align with legitimate concerns from employees regarding the issue of holding their sensitive data. And finally to ensure a line in the sand is drawn in relation to the use of personal devices for work-related activities. This is not intended to be a comprehensive review of all developments in the law and practice, or to cover all aspects of those referred to. Listeners should take legal advice before applying it to specific issues or transactions.See omnystudio.com/listener for privacy information.
Good morning from the Marc Cox Morning Show! Today Marc is out celebrating the holidays still and Ryan Wrecker is in to discuss how the winter storm has been effecting St. Louis and the horrible weather up in Buffalo, New York. TikTok has been banned from Government devices and for good reason! Joe Rogan was joined by Harvard Professor Siddarth Kara to discuss the horrible working conditions in the cobalt mines he visited - the same material that is in every piece of machinery and batteries in the United States that Biden wants to continue to embrace rather than focusing on energy independence. Later, Ryan asks producer Ashlyn about an urban legend that stems from a hotel in Missouri.
Introducing personal devices is a hefty consideration in parenting these days. It's easy to get your kid that phone they've been asking for on their birthday - but are you prepared? In this episode we talk recommendations for safely and responsibly introducing personal devices like phones, tablets, and gaming systems! To learn more about the Pinwheel Phone (#af), click here: https://www.pinwheel.com/?via=kate We are so glad you're here! At Be a Problem Solver Services, our goal is to help parents raise decent humans in a digital world. Need more help addressing social media use, teenage transitions, or essential workplace skills with your child? Check out our online services here: www.beaproblemsolverservices.com Be a Problem Solver Services are Kate (M.Ed., CCC-SLP) and Cory (Ph.D., LCMHC, NCC) - a wife speech pathologist and husband mental mental health counselor who focus on bringing you information about social skill development and character building. We both practice independently, and then come together to collaborate on important social skills issues that we hear from our clients over and over again!
In this episode of The DIVI Crypto Podcast, we are talking with Al Morris of Koii Network. Koii Nodes are written 100% in JavaScript and can use any existing NPM modules. Many blockchain nodes only serve a single network, requiring custom hardware. Koii, however, is lightweight enough to run on personal devices like phones and tablets, and the first network to achieve scalable generalized consensus. Koii's Layer-N network achieves this with no need for its own blockchain— it uses all of them. Each Koii node runs ‘Tasks,' having their own rewards and penalties for misbehavior. These Tasks run asynchronously and can include writing to one or many blockchains. Koii nodes are cross-chain compatible by design. Ethereum and Arweave are live. Avalanche, Polygon, Solana, and Filecoin are in progress, with more on the way. Koii stands for Knowledgeable, Open, and Infinite Internet, and is a protocol focused on bringing real decentralization to all dApps in the Web3 space. All requests to the network are written in JavaScript, allowing for any app to easily become a dApp. Koii easily integrates with Arweave and IPFS for fully decentralized storage as well. Finnie is Koii's browser extension wallet. Features include: Drag & Drop NFT creation Share NFTs to earn attention rewards 1-click cross-chain bridging Decentralized ID (DID) to link cross-chain keys together DID profile that includes personalized links to user pages NFT gallery: users see all their NFTs, from multiple chains and keys, in one place Easy NFT collections It takes less than a minute to create an NFT and costs as little as one cent, uploading images to videos to PDF files. All things are stored on-chain and have ownership and state properties. These can be used to make a range of products, like Koii DIDs. The network distributes KOII tokens to all the content that received attention within the previous 24 hours. The amount of tokens a wallet receives depends on the proportion of attention its content receives compared to all of the attention in the network. In the start, there will be 10 billion KOII tokens. Afterwards, an additional 1 million KOII will be minted per day and distributed across the KOII network. The Koii-X Templates have been designed to support a number of wallets out of the box: - Finie Wallet: ECDSA, RSA ~ Ethereum, Arweave - Meta Mask: Ethereum and Polygon - ArConnect: Arweave Payment networks currently include Bitcoin, Ethereum, and Arweave, with more being worked on. Site: https://koii.network/ Twitter: https://twitter.com/KoiiNetwork Discord: https://discord.gg/koii Telegram: https://t.me/koiinetwork Github: https://github.com/koii-network/ LinkedIn: https://www.linkedin.com/company/open-koi/ -- DIVI is creating the world's first closed-loop, vertically-integrated cryptocurrency ecosystem. Much like Apple's ecosystem is anchored by iCloud, the DIVI Project blockchain serves as the core of the DIVI network of technologies. Thanks to a keen understanding of the divide that separates the mainstream from the crypto world, the DIVI team is able to create solutions to the industry's biggest problem: adoption by non-technical users. DIVI's user-friendly, one-click solutions aim to bring blockchain-based payments into modernity with great UX. In this podcast, we will cover all aspects of cryptocurrency, hot topics, and technology as worldwide adoption grows.
We've all heard about “cyberattacks” – it seems there is a new article or clickbait headline about them every day. But what can we do to stop them? Better yet – can we predict them before they even happen? David Monnier of Team Cymru is here this week on IT Visionaries to talk about cybersecurity, the importance of a “no-touch audit”, and how – when it comes to global cybersecurity – the best offense is always an active defense. Tunes in to learn: Why you should care about global cybersecurity (5:43)How perspective can change the way we approach cyberattacks (8:22)How reconnaissance can turn the tables (12:20)Why a “no-touch audit” can be essential (22:50)What the next phase of cybersecurity will look like, according to experts (34:33)Top Data Security Trends for 2022: ReportIT Visionaries is powered by Salesforce Platform. If this episode makes you want to go deeper into the data security world, check out Salesforce.com/datasecurity and download the IT Guide to Data Security and Governance to learn how to protect your customer data with Salesforce Security Portfolio.Mission.org is a media studio producing content for world-class clients. Learn more at mission.org
The MacVoices Live! panel of Jeff Gamet, Kelly Guimont, Jim Rea, Dave Ginsburg, Jay Miller, Brittany Smith, and Frank Petrie address a report that Apple is “requiring” employees to use personal devices for company business. The panel evaluates the truth of the report (which, at recording time, was coming from only one source), why it doesn't make sense given Apple's privacy positions, and why is just a bad idea for anyone working for any company, Apple or not. Then, we start a discussion our obsession with Tim Cook's replacement, whoever that is. The inevitable discussion of Tim vs. Steve Jobs as CEO rears its ugly head, along with a discussion of how the role of CEO has been redefined by Apple. (Part 1) Today's MacVoices is sponsored by Upstart. Fair and fast personal loans. Go to upstart.com/macvoices and find out how Upstart can lower your monthly payments. Show Notes: Guests: Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, and jeffgamet on LinkedIn., and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. He is also President of the Suburban Chicago Apple Users Group. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. Kelly Guimont is a podcaster and friend of the Rebel Alliance. She hosts the Daily Observations Podcast at MacObserver.com, and appears on The Incomparable network as well as hosts I Want My M(CU) TV. You can also hear her on The Aftershow with Mike Rose, and she still has more to say which she saves for Twitter. Jay Miller is a Developer Advocate and Podcaster based in San Diego, Ca. A multipotentialite, Jay enjoys finding unique ways to merge his fascination with productivity, automation, and development to create tools and content to serve the tech community.Hear him on his podcast, Conduit and Youtube.com/kjaymiller or checkout his web site at kjaymiller.com. Frank Petrie is an author and contributor to ScreenCastsOnline Magazine. Follow him on Twitter and check out his web site, ympnow.com. Jim Rea has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. Follow Jim at provue.com and via @provuejim on Twitter. Brittany Smith is a cognitive neuroscientist who provides a variety of consulting services through her business, Devise and Conquer that includes ADD/ADHD coaching, technology coaching, productivity consulting, and more. She is a self-designated “well-rounded geek”, and holds a M.S. degree in Cognitive Neuroscience. She can be found on Twitter as @addliberator. Check out her latest project, a YouTube channel of tech tips. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
The MacVoices Live! panel of Jeff Gamet, Kelly Guimont, Jim Rea, Dave Ginsburg, Jay Miller, Brittany Smith, and Frank Petrie address a report that Apple is “requiring” employees to use personal devices for company business. The panel evaluates the truth of the report (which, at recording time, was coming from only one source), why it doesn't make sense given Apple's privacy positions, and why is just a bad idea for anyone working for any company, Apple or not. Then, we start a discussion our obsession with Tim Cook's replacement, whoever that is. The inevitable discussion of Tim vs. Steve Jobs as CEO rears its ugly head, along with a discussion of how the role of CEO has been redefined by Apple. (Part 1) Today's MacVoices is sponsored by Upstart. Fair and fast personal loans. Go to upstart.com/macvoices and find out how Upstart can lower your monthly payments. Show Notes: Guests: Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, and jeffgamet on LinkedIn., and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. He is also President of the Suburban Chicago Apple Users Group. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. Kelly Guimont is a podcaster and friend of the Rebel Alliance. She hosts the Daily Observations Podcast at MacObserver.com, and appears on The Incomparable network as well as hosts I Want My M(CU) TV. You can also hear her on The Aftershow with Mike Rose, and she still has more to say which she saves for Twitter. Jay Miller is a Developer Advocate and Podcaster based in San Diego, Ca. A multipotentialite, Jay enjoys finding unique ways to merge his fascination with productivity, automation, and development to create tools and content to serve the tech community.Hear him on his podcast, Conduit and Youtube.com/kjaymiller or checkout his web site at kjaymiller.com. Frank Petrie is an author and contributor to ScreenCastsOnline Magazine. Follow him on Twitter and check out his web site, ympnow.com. Jim Rea has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. Follow Jim at provue.com and via @provuejim on Twitter. Brittany Smith is a cognitive neuroscientist who provides a variety of consulting services through her business, Devise and Conquer that includes ADD/ADHD coaching, technology coaching, productivity consulting, and more. She is a self-designated “well-rounded geek”, and holds a M.S. degree in Cognitive Neuroscience. She can be found on Twitter as @addliberator. Check out her latest project, a YouTube channel of tech tips. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
The MacVoices Live! panel of Jeff Gamet, Kelly Guimont, Jim Rea, Dave Ginsburg, Jay Miller, Brittany Smith, and Frank Petrie address a report that Apple is “requiring” employees to use personal devices for company business. The panel evaluates the truth of the report (which, at recording time, was coming from only one source), why it doesn't make sense given Apple's privacy positions, and why is just a bad idea for anyone working for any company, Apple or not. Then, we start a discussion our obsession with Tim Cook's replacement, whoever that is. The inevitable discussion of Tim vs. Steve Jobs as CEO rears its ugly head, along with a discussion of how the role of CEO has been redefined by Apple. (Part 1) Today's MacVoices is sponsored by Upstart. Fair and fast personal loans. Go to upstart.com/macvoices and find out how Upstart can lower your monthly payments. Show Notes: Guests: Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, and jeffgamet on LinkedIn., and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. He is also President of the Suburban Chicago Apple Users Group. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. Kelly Guimont is a podcaster and friend of the Rebel Alliance. She hosts the Daily Observations Podcast at MacObserver.com, and appears on The Incomparable network as well as hosts I Want My M(CU) TV. You can also hear her on The Aftershow with Mike Rose, and she still has more to say which she saves for Twitter. Jay Miller is a Developer Advocate and Podcaster based in San Diego, Ca. A multipotentialite, Jay enjoys finding unique ways to merge his fascination with productivity, automation, and development to create tools and content to serve the tech community.Hear him on his podcast, Conduit and Youtube.com/kjaymiller or checkout his web site at kjaymiller.com. Frank Petrie is an author and contributor to ScreenCastsOnline Magazine. Follow him on Twitter and check out his web site, ympnow.com. Jim Rea has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. Follow Jim at provue.com and via @provuejim on Twitter. Brittany Smith is a cognitive neuroscientist who provides a variety of consulting services through her business, Devise and Conquer that includes ADD/ADHD coaching, technology coaching, productivity consulting, and more. She is a self-designated “well-rounded geek”, and holds a M.S. degree in Cognitive Neuroscience. She can be found on Twitter as @addliberator. Check out her latest project, a YouTube channel of tech tips. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Join Lloyd Burrell of ElectricSense.com with Cathy Cook to discuss why you should ground personal devices on this episode of Safely Connected: EMFs, 5G, and Your Health. This episode takes a look at: Measuring dirty electricity on grounded wires in homes Benefits of earthing and harmonizing with nature How to reduce exposure from WiFi To hear more about Cathy's struggle with tinnitus, 5G implementation concerns, and how to reduce exposure with personal appliances, click here. Cathy Cooke is a board-certified holistic nutritionist and uses a functional medicine approach to help people identify imbalances in the body. She also assesses buildings for anything that may be causing health problems, including indoor air quality, mold, chemical off-gassing, ventilation, and of course, EMF exposure. Safely Connected: EMFs, 5G, and Your Health is a podcast hosted by Lloyd Burrell of ElectricSense.com. He has become a powerful leader where our hyperconnected world of mobile phones, WiFi, 5G, smart appliances (and even the wiring in your walls) can pose a health risk. Tune in to learn, from Lloyd and the world's leading experts, how you can be SAFELY connected, thrive, and even remediate the effects of EMFs on your health. With this podcast, you can live a naturally healthy life in an electromagnetic world.
Hello Readers, I hope you’re well. Welcome to Episode 22 of the UCStatus Podcast. This episode features me (@randychapman) & Shawn Harry (@shawnharry) are joined by very special guests Ilya Bukshteyn (@ilyabu) and Sandhya Rao (@sandhyarrao) from Microsoft. In this episode we chat with the people responsible for personal devices for Microsoft Teams. It seems […]
FIND US NOW ON AMAZON MUSIC! https://music.amazon.com/podcasts/51b7da82-c223-4de4-8fc1-d1c3dd61984a/Brakeing-Down-Security-Podcast Shout to the organizers of Bsides Edmonton, Alberta, Canada for a great conference! Amanda’s social media take over this week Bryan's plumbing story (A tale of 3 toilets) https://www.infosecurity-magazine.com/news/corporate-data-on-personal-devices/ https://www.infosecurity-magazine.com/news/fatality-after-hospital-hacked/ https://fortune.com/2020/09/18/ransomware-police-investigating-hospital-cyber-attack-death/ Zerologon - https://nakedsecurity.sophos.com/2020/09/17/zerologon-hacking-windows-servers-with-a-bunch-of-zeros/ US govt orders federal agencies to patch dangerous Zerologon bug by Monday, 21 September 11:59 EDT) https://www.zdnet.com/article/us-govt-orders-federal-agencies-to-patch-dangerous-zerologon-bug-by-monday/ Tweet mentioning not needing to reset passwords for access:https://twitter.com/_dirkjan/status/1307662409436475392 https://twitter.com/MsftSecIntel/status/1308941504707063808?s=20 Linux malware (drovorub) https://www.tripwire.com/state-of-security/featured/drovorub-malware/ https://www.zdnet.com/article/this-surprise-linux-malware-warning-shows-that-hackers-are-changing-their-targets/ Rampant Kitten‘s arsenal includes Android malware that bypasses 2FA https://exploit.kitploit.com/2020/09/tp-link-cloud-cameras-ncxxx-bonjour.html https://www.infosecurity-magazine.com/news/former-pm-passport-phone-hacker/ https://threatpost.com/bluetooth-spoofing-bug-iot-devices/159291/ Good stuff: https://compass-security.com/fileadmin/Datein/Research/White_Papers/lateral_movement_detection_basic_gpo_settings_v1.0.pdf Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #Pandora: https://pandora.app.link/p9AvwdTpT3 #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel: http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site: https://brakesec.com/bdswebsite #iHeartRadio App: https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec
A survey done by TrendMicro shows how employees are using personal devices to access business apps and data. This episode goes through the results and talks about how this new threat needs to be handled by security teams. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/SecurityInFive Binary Blogger Website Security In Five Website Security In Five Podcast Page - Podcast RSS Twitter @securityinfive iTunes, YouTube, TuneIn, iHeartRadio,
Join us for a live recording of the latest episode of Ancel Glink's Quorum Forum podcast at 12:00 p.m. on Thursday, September 3, 2020. Julie Tappendorf will join us to review a recent Illinois appellate court decision finding communications pertaining to public business in public officials’ personal text messages and e-mail accounts are public records subject to FOIA. Then, Kathy Kunkle explains what qualified immunity means for local governments in the ongoing national conversation about claims against police. Just visit www.youtube.com/ancelglink on Thursday at noon to listen and share your questions with us! --- Resources --- What the Quorum Forum 43 Livestream at [youtube.com/ancelglink](www.youtube.com/ancelglink) Municipal Minute, [1st District Issues Opinion On FOIA and Emails/Texts on Personal Devices](http://municipalminute.ancelglink.com/2020/08/1st-district-issues-opinion-on-foia-and.html) Municipal Minute, [Case Addresses Employee Termination and Political Affiliation](http://municipalminute.ancelglink.com/2020/08/case-addresses-employee-termination-and.html) Illinois Municipal League, [Qualified Immunity](https://www.iml.org/file.cfm?key=19367) --- Credits Producer: Matthew T. DiCianni Assistant Producers: Daniel J. Bolin Executive Producers: Julie Tappendorf, Keri-Lyn Krafthefer Chair: Daniel J. Bolin Engineers: Ricardo Perez, Matt Smith This podcast is provided as a service to our public and private sector clients and friends. It is intended to provide timely general information of interest, but should not be considered a substitute for legal advice. Read our full disclaimer: ancelglink.com/disclaimers
In the first episode of a series on the ethics of working from home, Getting Ethics to Work's host and resident ethicist Andy Cullison and producer Kate Berry discuss a listener question about whether it's okay for employers to require employees to use personal devices to conduct business. The post Ethics of Working from Home: Personal Devices appeared first on Prindle Institute.
Special Guest: Kyle Rankin.
In this episode Peter is back! We talk about how, in order to successfully deploy an employee app you must plan for, execute, and govern a truly mobile-first strategy. We also review customer stories and where we see the industry headed. Enjoy!
Welcome to Episode 6. Asmodeus gets a little... too close for comfort... Twitter: @TBCSPodcast Facebook: @thebloodcrowstories Instagram: @thebloodcrowstories Website: http://www.thebloodcrowstories.com/ Our theme song is provided by FIRES, check them out at firesnashville.bandcamp.com This episode features the song "Chum the Waters" by Caustic, featuring Ned Kirby of Stromkern. Find more at caustic.bandcamp.com. If you like what we do, and want to support us, consider donating to our Patreon. Your support keeps the show going. www.patreon.com/thebloodcrowstories
Citizen Comment on Non-Agenda Items: Speaker 6 - "Window of the Soul", Personal Devices & Eye Breaks
The chips are down, as tech companies struggle to protect against the Meltdown and Spectre flaws. The White House is getting tough on leakers by banning personal devices from the West Wing. And someone has been embedding a Bitcoin wallet into their hand... All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by technology journalist and broadcaster David McClelland. Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes. Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening! Warning: This podcast may contain nuts, adult themes, and rude language. Special Guest: David McClelland.
Amazon and Google personal devices are definitely spying on us!
Guest Dave Farquhar, Technical Account Manager with Qualys, talks about information security on our computers and devices. How can I know how secure my home computer is? How easily can someone hack my home computer and steal personal information? What can I do to improve the security of my digital information? Learn these answers and more. Looking for additional information? Find more ways to keep your home computer and personal devices on the following links: dfarq.homeip.net/how-can-i-know-how-secure-my-home-computer-is dfarq.homeip.net/what-can-i-do-to-improve-the-security-of-my-digital-information dfarq.homeip.net/how-easily-can-someone-hack-my-home-computer-and-steal-personal-information Today’s program is a rebroadcast from March 13, 2017.
Last week, the Hamilton airport CEO resigned. How goes the hunt for a replacement? Guest: Ron Foxcroft, Canadian businessman, Founder & CEO of Fox 40 International. Yesterday, the Vital Signs report for 2017 was released, revealing insights into where change needs to happen in the community. What did the report reveal? Guest: Colleen Mulholland, President & CEO, Burlington Foundation. A trustee within the Hamilton Wentworth District School Board has spoken up in regards to how and when it lets students use iPads and personal mobile devices at school. This comes among criticism that they're being used as toys instead of educational purposes, as well as for viewing inappropriate content. Guest: Dawn Danko, Ward 7 Trustee, Hamilton Wentworth District School Board.
The crew for this week's episode: Captain Jeff, Captain Nick, and First Officer Dana Wings Over Pittsburgh [18:57] Aviodrome Museum Meet-Up in the Netherlands [23:25] APG Coffee Fund [34:46] NEWS F-15s scramble to intercept unresponsive aircraft over restricted airspace over West Palm Beach [39:27] Aircraft accident Boeing 727-2J0 (F) Adv. HK-4544 Puerto Carreño-Germán Olano Airport (PCR) [43:00] Flybe DH8D at Amsterdam on Feb 23rd 2017, right main gear collapse on landing [50:33] Emirates Takes Heed from EK521 Tragedy: Tweaks Safety Video in Attempt to Change Passenger Behaviour [53:41] FEEDBACK Jordan - Taxi Way Question [1:02:21] Nev - Autoland and Personal Devices [1:11:54] George - PEDs again [1:17:30] Eoin - Booze on board Answer!! [1:30:59] Bill - Hi from Left Coast, Great Video to Share [1:34:47] Jim - Ohio Citation 525 Crash {1:40:25] Plane Tails - The Stringbags [1:52:14] How I Got Here (HIGH) 6 - Zack [2:11:35] Sean - Why does my BA flight smell funny? [2:24:39] Devin - This Makes Deer Look Like a Walk in the Park [2:27:44] Sean - More beer on a plane... [2:29:33] Niki - S Turns [2:32:20] VIDEO Audible.com Trial Membership Offer - Get your free audio book today! Give me your review in iTunes! I'm "airlinepilotguy" on Facebook, and "airlinepilotguy" on Twitter. feedback@airlinepilotguy.com airlinepilotguy.com ATC audio from http://LiveATC.net Intro/Outro music by Tim Brown, BrownHouseMedia, iStockphoto.com Copyright © AirlinePilotGuy 2017, All Rights Reserved
In this episode hosts Casey Ellis and Patrick Vollmer are joined by musician Russ Levitt. Part one has the guys discussing a life in which every few years you have to re-apply with the government to continue to exist. Things get personal in part two when the discussion switches to a future where every device from your phone to your toilet has A.I. and its own personality. If you cannot see the audio controls, your browser does not support the audio element
TechLaw10 hosts Jonathan Armstrong and Eric Sinrod discuss legal issues related to information technology. In this episode, Jonathan and Eric discuss the legal and data security implications of when employees do work on their personal devices outside of the office.
Power Systems Design, Information to Power Your Designs
Power Systems Design, Information to Power Your Designs
Katarzyna Radecka, Ph.D. and Zeljko Zilic, Ph.D., McGill University, Montreal, Canada
We have a big lineup for the show and we begin our podcast with a few items and brief discussion related to Apple's Campus 2 future, Microsoft's Windows 8.1 release, and Apple announcements speculations. For the main topic of the show, we find that most employees really want to use their personal devices at work. So, we throw some ideas around as to some of the consequences and positives associated with that venture.
Nora on Indochino customized suits Cathi on the Oyster Ring and personalized RFID-enabled tech
Ewan and Ben visited the IT security show 'INFOSEC' to investigate the state of mobile security. We interviewed representatives from several exhibitors and discuss the challenges for mobile operators, businesses and consumers around mobile security, noting how immature the market still is.