POPULARITY
In this episode of Web3 Innovators Perspectives, dive into the intricate world of blockchain with our exploration of "The Blockchain Multiverse: The Future of Public and Private Networks." Uncover the evolving landscape of permissioned and permissionless networks, the significance of private networks in regulated industries, and the exciting prospects of the multi-chain future.Key Highlights:Migration Dynamics: Delve into the ongoing migration to Layer 2 and Appchains and understand the implications for the future of blockchain networks.Network Diversity: Explore the role of private networks, especially in heavily regulated sectors, and gain insights into the nuanced needs of network participants.Consolidation and Growth: Learn about the consolidation of base layer networks and the emerging landscape of layer 2 networks, with a focus on the growing momentum in this dynamic sector.As we witness the convergence of innovation and infrastructure in the blockchain space, this episode sheds light on the trends shaping the industry. From the nuanced role of private networks to the consolidation of base layers, join us in unraveling the layers of "The Blockchain Multiverse" and stay tuned for the dynamic developments ahead.Connect with Us Join the Web3 Innovators community and engage with like-minded individuals passionate about the potential of blockchain technology.Contact Web3 Labs:Twitter | LinkedIn | Instagram | Facebook | Discord | Tiktok • Explore Web3 Labs: Web3 Labs specialise in web3 solutions for enterprise. • Email Web3 Labs • Get Conor's latest thoughts on Web3 and where we're headed.
Ragini Das is a renowned Indian entrepreneur, celebrated for founding leap.club, a platform dedicated solely to women. This network aims to bolster and empower women to step forward and lead. Driven by her fervent mission to uplift women globally, Ragini has successfully established a platform that encourages women to thrive in all facets of their lives. LinkedIn Profile of Jivraj - https://www.linkedin.com/in/jivrajsin... Instagram Page- https://www.instagram.com/isv_podcast/
An explanation and hypotheticals of how the Private Listing Network (PLN) can serve as a solution to many home sellers and home buyers... especially those that are looking to sell their home AND purchase a home. No public market time, status changes, nor price history on the PLN avoids all negative stigmas and allows sellers and buyers more variables in buying/selling their RE. Contact me for help buying, selling, investing, and/or renting in IL. Joe Gattone Compass www.joegattone.com https://linktr.ee/gattonerealestate --- Support this podcast: https://podcasters.spotify.com/pod/show/brokerapproved/support
In Time for Learning sucht dein Host Nawid Company das Gespräch mit anderen Branchenexperten. Hier erfährst du, wie es im Affiliate Bereich wirklich läuft und was die neusten Trends sind. Machst du also bereits Affiliate Marketing und arbeitest in dem Bereich, bist Merchant und betreibst deinen eigenen Online-Shop oder möchtest dich einfach weiterbilden, dann bist du hier genau richtig. Im zweiten Teil der heutigen Folge Time for Learning sprechen Nawid Company und sein Experten-Gast Dr. Tim Seewoester, CMO / Geschäftsführer, asgoodasnew, über seine Erfahrungen und Werdegang im Affiliate Marketing. Heute geht es um folgende Themen: - ADCELL, AWIN, TradeUp - Amazon, Otto, Zalando - Cashback, Content Commerce, Loyalty - Inkrementalitätsbeweise - Kooperationsmanagement - Länderspezifische Herausforderungen - Private Network - Skillset, Mindset, Toolset - White Label
To commemorate International Women's Day this year, we are thrilled to introduce a special series featuring some of the inspiring female founders in GGV's portfolio. Kicking off the series is Carolyn Childers, co-founder and CEO of Chief, a network designed exclusively for high-achieving women in leadership positions. Chief membership provides a private networking platform to connect and support women executives from all industries. Currently, Chief has over 20,000 paid members across 12,000 organizations, including Apple, Google, Amazon, Disney, IBM, Nike, Goldman Sachs, Netflix, Pfizer, Walmart, HBO, Lyft, and New York Times. That's a long and distinguished list. Chief is a GGV portfolio company. Prior to founding Chief, Carolyn was the SVP Senior Vice President of Operations at Handy, a home services marketplace. Previously, Childers led the launch of Soap.com, where she was the general manager through its acquisition by Amazon. She has also held strategy and business development roles at Victoria's Secret and Avon Products. Carolyn began her career in finance, working in investment banking at Deutsche Bank.
Trading Nut | Trader Interviews - Forex, Futures, Stocks (Robots & More)
James' Links: https://tradingnut.com/james-elite-traders/?r=pod Manage Up to $2M with 90% Profit Split at Fidelcrest https://tradingnut.com/Fidelcrest/ - Use 10% Discount Coupon: TRADINGNUT
In this episode, Jon will explain what a DPN is, and talk about some of their strengths and usage examples. To watch this episode, click here: https://youtu.be/zXbfGDjcqGk To learn more about Deeper Connect, click here: https://www.deeper.network/
Designed from the endpoint eSIM to the app, security is their priority allowing you to know, what the device is, who it is registered to, and should it have ZERO trust access to the application. Warren Michael Small Warren Michael Small, Vice President Strategic Growth and Incubation at NTT Ltd. Speaks with Don Witt of The Channel Daily News, a TR publication about NTT's providing Las Vegs their 5G Private Network. The solution will not only provide data connectivity, but it will also accomplish this while making access affordable, in part, as a result of the solution being integrated into the city's infrastructure. NTT is also working with other cities around the world to digitize city operations, improve speed, reduce cost, and provide data feedback that enables better management of city resources, assets, and personnel. Listen in as Warren details some of the key points and risks involved with the City of Las Vegas and NTT 5G implementation. As part of NTT DATA, a USD 30 billion IT services provider, NTT Ltd. is a leading IT infrastructure and services company. Through technology and innovation, they deliver a secure and connected future that empowers their people, clients, and communities. To help organizations deliver on their business priorities, they're by their side, transforming their businesses and technology at the pace they aspire to, driving the outcomes they want with the services they need. As an industry leader in networks, data centers, cloud, security, and managed services, as well as an innovator in Private 5G, they serve 65% of the Fortune Global 500 and more than 75% of the Fortune Global 100. They also work closely with leading sports organizations, including UEFA, INDYCAR and the Tour de France. They enable a connected future. For more information, go to: https://services.global.ntt
If your sales funnel is full, but your deployments are taking months to accomplish, the technology being used does not fit the solution properly. Colin Constable and Kevin Nickels, the two engineering Co-Founders of the Atsign company provide an overview of the technology with details about the elimination of VPN and Firewalls to Don Witt of The Channel Daily News, a TR publication. Kevin Nickels Colin Constable The distributed non-blockchain solution helps carriers and enterprise reduce their environmental footprint while reducing the administration nightmare associated with small or large IoT and micro-network deployments. Listen in to hear about an easily implemented solution that will lock down your network tightly, improve performance and reduce cost. About: They are a team of Internet optimists committed to making the Internet a more human place, where privacy is a fundamental right, and everyone owns their data. In a world where even things are generating large amounts of data, they created the free, open-source atPlatform allowing developers to easily create privacy-first apps that protect people, and their things, on the Internet. Welcome to their atWorld! And thanks for helping them #FliptheInternet For more information, go to: https://atsign.com/.
A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link: Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.
Private wireless networks based on 4.9G/LTE or 5G are gaining increasing traction in asset-intensive industries. Nokia is currently providing private wireless solutions to more than 450 customers. However, Wi-Fi has a role within Industry 4.0, even as digital transformation advances on a broad front. Most of those customers are enterprises with brownfield campuses, which means they have legacy wireless connectivity in place, such as Wi-Fi, that cannot simply be switched off. They may also be using Open RAN, and balancing licensed and unlicensed spectrum. Clients using Wi-Fi technology may decide to add industrial 4.9G/LTE and 5G devices for specific use cases – often in contexts where Wi-Fi has limitations with regard to mobility, coverage, and interference management. In circumstances where industrial locations use a mix of connectivity technologies, the enterprises concerned need a solution that will enable them both to extract the maximum value from the different systems deployed and to mitigate the resulting complexity. How does MX Boost work to reduce technological complexity? Nokia MX Boost is a new innovation, a Nokia Bell Labs patented technology that makes it easy to combine private wireless connectivity with Wi-Fi. It delivers an aggregated multi-path connectivity that supports OT use cases. Industries and enterprises benefit from: An optimized throughput in difficult radio conditions. Improved data processing in highly critical applications. MX Boost is an IP-based solution, which means it is extremely simple to implement and has a minimal impact on the network solutions it uses. It is deployed as a bonding and routing application on Nokia's MX Industrial Edge, and on its multi-modem industrial devices. It works without any changes on wireless access points, making it completely agnostic when it comes to radio technology, spectrum and vendor. Enterprises can run MX Boost in one of two modes to meet the needs of different applications: Aggregation mode: This boosts data rates in difficult radio conditions by splitting and recombining traffic for multiple channels. It includes performance probes on both links to measure in real time the quality of the channels to optimize reliability. Replication mode: This duplicates the data and puts the same packets on all radio links, then automatically selects the best one. The aim is to boost reliability, latency and mobility. What is a typical implementation of MX Boost? The most typical usage of MX Boost is to aggregate Wi-Fi 6 and 4.9G/LTE for business-critical OT applications that require high data rates, capacity and quality in specific hotspots. For example, it takes up to 10 cameras to enable remote control of a port train. A combination of Wi-Fi and 4.9G/LTE bandwidth allows for the exclusive use of 4K cameras. If there is a degradation of the quality of the Wi-Fi connectivity, MX Boost automatically switches back to 4.9G/LTE and to HD cameras. There are many other data-hungry applications, such as high-quality sensor-based applications for multi-metal impurity detection, and augmented reality maintenance applications. In some countries, industries have access to multiple spectrum bands. So MX Boost can be used to combine various radio technology types like 4G and 5G, and multiple spectrum bands such as centimeter wave, millimeter wave, or disparate 4G bands. Enterprises can use MX Boost to replicate data connectivity on two 4.9G/LTE bands to improve reliability, which is interesting in areas with challenging radio conditions such as ports, metal factories, and mines. What benefits does being vendor agnostic bring? This is a significant benefit in an age when many enterprise environments are multi-vendor. MX Boost is based on the IP layer, which delivers huge flexibility for the integration of existing connectivity technologies – including in multi-vendor environments, which is important in the context of supporting legacy Wi-Fi. In the past, it has been said that Wi-Fi is suitable only for IT applications because of its inherent limitations in coverage, mobility, latency, and reliability. However, with MX Boost, it is possible to use Wi-Fi for non-critical OT applications. By using MX Boost in replication, it is possible to get the best performance and reliability from several Wi-Fi bands at the same time – such as Wi-Fi 6 and Wi-Fi 6E – and to support applications such as operation management tools, storage systems, and worker information systems. How is Nokia strengthening its Wi-Fi portfolio? There is little doubt that 4.9G/LTE and 5G private wireless networks will become the predominant connectivity choice for manufacturers and other asset-intensive industries looking to reap the benefits of digitalization and Industry 4.0. However, a recent ABI survey showed that many enterprises still see Wi-Fi – and especially Wi-Fi 6 and 6E – as a viable connectivity option for some non-critical operations. Nokia is integrating Wi-Fi as part of its Nokia Digital Automation Cloud. By deploying Nokia DAC Wi-fi, enterprises can make a seamless transition to private wireless as their needs evolve. For other enterprises that have deployed the Nokia industrial-grade private wireless solution, Nokia DAC Wi-Fi can be ideal in providing a complementary capacity layer at specific locations for non-critical applications. To learn more, please go to Nokia's private wireless podcast page.
Pratt & Whitney, an aerospace company that is part of the multinational defence conglomerate Raytheon Technologies, announced the establishment of a state-of-the-art India Engineering Center (IEC) in Bengaluru, which is planned to open in January 2023. Bharti Airtel tested a private 5G network at German automotive company Bosch's centre in Bengaluru. And the RBI wants cryptos banned, Finance Minister Nirmala Sitharaman reiterated in parliament yesterday. Notes: Reserve Bank of India, the country's central bank, is of the view that cryptocurrencies should be banned, Finance Minister Nirmala Sitharaman told parliament yesterday in a statement, in reply to a question on virtual currencies. Given the concerns expressed by RBI on the destabilising effect of cryptocurrencies on the monetary and fiscal stability of a country, RBI has recommended framing legislation on this sector. The central bank is of the view that cryptocurrencies should be prohibited, the minister said. Cryptos are, by definition, borderless and require international collaboration to prevent regulatory arbitrage. Therefore, any legislation for regulation or banning can be effective only after significant international collaboration on evaluation of the risks and benefits and evolution of common taxonomy and standards, Sitharaman added. Tata Consultancy Services is in the process of establishing eight large new offices – including some in non-metro cities -- each having the capacity to house more than 10,000 employees, Economic Times reports, citing CFO Samir Seksaria. As part of the strategy, these new offices will be designed to facilitate easy collaboration, Seksaria told ET. Pratt & Whitney, an aerospace company that is part of the multinational defence conglomerate Raytheon Technologies, yesterday, announced the establishment of a state-of-the-art India Engineering Center (IEC) in Bengaluru, which is planned to open in January 2023. Pratt & Whitney's aircraft engines are widely used in civilian and military aircraft. The company's new India centre will focus on providing contract engineering services and is expected to employ 500 engineers and professionals when fully staffed, according to a press release. The centre is “a first-of-its-kind investment for our company in India,” Geoff Hunt, senior VP of engineering, said in the press release. America's National Highway Traffic Safety Administration is opening one more special investigation into a Tesla vehicle crash, according to documents viewed by TechCrunch. This time it involves the crash of a 2021 Tesla Model Y that killed a motorcyclist in California earlier this month, TechCrunch reports. Bharti Airtel, last week, announced the successful trial of India's first 5G Private Network at Bosch Automotive Electronics India's facility in Bengaluru. Airtel's on-premises 5G Captive Private Network was built over the trial 5G spectrum allocated by India's Department of Telecom, the wireless services provider said in a press release. Theme music courtesy Free Music & Sounds: https://soundcloud.com/freemusicandsounds
A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link. Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.
Ryan and TJ open up the podcast by introducing what TJ is working on with Samsung and the basics of a private network and its benefits. They then move into a discussion about CBRS, the importance of 5G networks for the Fourth Industrial Revolution, and considerations companies need to examine when deciding on going with a private or public network. The podcast wraps up with TJ talking about what we can expect from 5G in the near future as it relates to IoT.Samsung Networks' TJ Maan is responsible for the overall go-to-market and solution strategy for Enterprise Private LTE and 5G solutions. With more than 20 years of experience in the wireless networking industry, TJ has previously held leadership roles in Product Management, Technical Marketing, and Channels within companies that include Zebra Technologies, Motorola, and Extreme Networks.Samsung Networks has pioneered the successful delivery of 4G and 5G end-to-end network solutions including chipsets, radios, and core. Through ongoing research and development, Samsung drives the industry to advance 5G networks with its market-leading product portfolio from fully virtualized RAN and Core to private network solutions and AI-powered automation tools. The company is currently providing network solutions to mobile operators that deliver connectivity to hundreds of millions of users around the world.Samsung offers a full portfolio of private 5G solutions that enable enterprises to simplify deployment and operation of their own networks. The portfolio includes a range of 5G solutions—including RAN, Core, transport and management system—to meet the specific needs of enterprises. The solutions come in three configurations for various enterprises: a compact one-box solution, a standard mid-sized solution and a premium solution for large-scale businesses.
Pace of private wireless network adoption is set to accelerate dramatically Now that the concept of private wireless networks has been accepted, Nokia is seeing enormous acceleration in its deployment. The company has delivered enough networks to be confident that the economics for an enterprise are excellent compared to Wi-Fi. The ability to address use cases that used to be out of range commercially is increasing. Nokia's outstanding expertise in this field ensures that a wider range of enterprises, from complex environments to small retail units, can enjoy the benefits of private wireless. Private wireless remains, however, in its early stages, and Nokia is expecting a dramatic acceleration in its deployment. The company has been even more successful than it expected in making the technology easy to use and deploy in a way that suits a wide range of use cases. How Nokia works to ensure smoother private wireless adoption Private wireless is a compelling solution for industries because, as enterprises seek to extract more data from their machines, control them wirelessly, or operate a wider range of business processes, this is possible only with the assistance of highly reliable technologies. Cellular advances such as LTE and 5G are ideal for difficult environments. In the case of ports and factories, for instance, these are large areas with a great deal of metal on site, yet the enterprise concerned requires the accurate collection of uplink data. Nokia is working to make deployment of private wireless networks easier. The company comes to this new landscape with immense experience in telecommunications, but has evolved to be able to delivery technology platforms in two ways: Plug-and-play: This is a Private Wireless as a Service (PWaaS) model that creates the entire environment, effectively a digital automation service. Bespoke: Enterprises that wish to compile their own solution can do so in a way that combines a radio package with other multiple products to ensure it suits their requirements. The ecosystem is critical to successful implementation The enterprise environment is incredibly diverse and complex, with many different segments and specializations. Each use case requires a high level of expert knowledge. In response, Nokia has created several segments internally to cover areas including energy and industry. Its teams work to establish a depth of industry knowledge that informs, and enables the delivery of, the requirements of enterprises within each particular sector. This is crucial to the process of integrating the right solutions. Its innovation has been assisted by the creation of partnerships with the companies that manufacture the machines at the heart of each network. As a result, the enterprise in question can take delivery of a network that works immediately to a super-reliable standard to the commercial benefit of the client in question. Pre-integration in this way ensures the creation of a joint road map. An end user – a factory, port, mine, or other complex environment – may have multiple suppliers. But thanks to this greater degree of technological alignment at an earlier stage in the process, that end user does not need to worry about performance, reliability and interoperability. As a result, Nokia has added a high level of enterprise connectivity to its existing pre-eminence in telecommunications and associated technology – while remaining open-minded to the need to adapt to future requirements. Indeed, it is essential to accept that 5G represents a learning curve for all parties. Ultimately, enterprises want to invest in technologies that are future-proof and 5G – and 5G SA in particular – are particularly strong in that respect. If a business begins today on this journey with LTE, it can deploy systems that will be reusable and expandable with 5G in perpetuity. The other key factor with regard to 5G SA is that it is making a significant difference with regard to affordability. The differentiators in Nokia's private wireless offering There are three key elements that underpin the delivery of Nokia's 5G capability: Radio: The company's heritage in this field is extremely strong. It has a macro stack with all the features and capabilities required, that can be scaled down for use in a private network, however challenging the conditions are. Industrial connectors: As well as delivering mission-critical connectivity, it is also important to bring in other elements. Nokia has developed a set of industrial connectors, building blocks that can be operated as software applications on the edge cloud. This means that effectively there is an application platform to assist with a seamless, scalable response to use cases. Spectrum: The appetite for spectrum is insatiable, and Nokia works with traditional mobile network operators and other partners to ensure the delivery of bespoke infrastructures. Ultimately, Nokia is convinced that the application of private wireless across industries and sectors is proving even more valuable to enterprise than even the most optimistic predictions. The pace of acceptance, adoption and deployment is set to increase in the months and years ahead. To learn more, please go to Nokia's private wireless podcast page.
Virtual private network providers are in the soup as the Indian government's security agency issuing a notification to store user log details for five years and share when demanded. Host Dia Rekhi in conversation with Salman Waris, partner head of TMT (telecom, media and technology) and IP practice at TechLegis and ET's Priyanka Sangani decode the tussle and its consequences on users' data and privacy.
How mining demonstrates the positive impact of private wireless Few industries showcase the benefits of a private wireless network more vividly than mining. This is a sector in which driverless 300-tonne trucks with wheels two meters wide can be operated from a control center hundreds of kilometers away. Health and safety is a critical concern in an environment that features monster vehicles and giant machines – and frequent blasts inside a pit. Underground, the challenges are even more significant. There are thick rock walls, narrow corridors and a constantly changing route. It is simply not feasible to cover a whole site with a single antenna. The importance of digital transformation in mining There are four interconnected KPIs for any mining operator: Safety Sustainability Productivity Efficiency The drive to meet these KPIs underpins most of the transformation projects in the mining industry. If there is a safety incident within a mine, production is halted. Stopping for just a few hours can mean the loss of hundreds of thousands of tonnes, which impacts on both productivity and the bottom line. An illustration of the impact of private wireless on a mining operation Let's look at the effect of the deployment of a private LTE-powered autonomous haulage system in an Australian mine. Its operator has more than 50 connected trucks working on collecting the ore that has been excavated. Merely by installing the private LTE, the mine saved more than €10million through reducing the number of Wi-Fi points required. It also saw a productivity increase of about 75 hours per year per truck – which translated into 1.5 million tonnes more excavated each year. That in turn meant a top-line growth of €50million just from the improved connectivity. The operator reported a 90 per cent drop in the number of unplanned stops. Because communication with each truck was improved, the amount of fuel consumed dropped too. There was a saving of up to 80,000 liters of diesel per truck per year. As well as a huge cost benefit in an era of rising energy prices, this also had a big impact on the sustainability of the operation, to the tune of a carbon reduction of 236 tonnes. How Nokia has pioneered private wireless in mining Mining was one of the first verticals where Nokia demonstrated the viability of private wireless networks, more than ten years ago. Nokia's first project was rolled out in the Pilbara region of Australia, a major mining area. Nokia now has more than 35 mining customers, including four out of the five biggest multi-national operators. Customers appreciate the benefits in terms of high bandwidth, low frequency, built-in security, quality of service and, most important of all, ultra-reliability. Business continuity is crucial to mining, so a reliable network, combined with edge computing capabilities, is a winning mix. The installation of a single private wireless network can bring benefits in terms of mission-critical data applications, remotely operated machines, CCTV, video streaming, communications and a range of Internet of Things applications. Having one single network infrastructure, which uses private wireless 4.9G or 5G technology, and that works both above the surface and underground, brings significant advantages. Underground is more challenging – radio planning and an appreciation of the tunnel structure are crucial – but ultimately the same network can be used. Five tips for mining companies considering a digital transformation 1/ Start by consulting your operations teams. It is essential that your private wireless network solution helps to meet those key KPIs of safety, productivity and efficiency. Private wireless should not be technology for the sake of technology. 2/ Think end-to-end when you start deploying private wireless. You need to work with your whole ecosystem, not just the shovels, diggers and autonomous trucks. 3/ When you are looking at use cases, start with the low-hanging fruit. Do not try to boil the ocean from day one. There may be IoT data collection for analytics purposes, for instance, that can quickly demonstrate the value of private wireless solutions. 4/ It is essential to validate these solutions end-to-end. Make sure that the interoperability and the reliability of the entire process has been thoroughly tested before any solution is deployed in an actual mine. 5/ Look beyond the pit for digitalization opportunities. Private wireless networks bring benefits in many more verticals than just mining. Nokia also works in transportation, railways, roads, sports, shipyards and more. If you look across the whole value chain, it covers stockpiles, processing factories and transportation by rail and sea. Include all these different use cases in your business plan and you will see that private wireless makes more sense than ever. Mining is a highly specialized industry with specific needs and challenges. However, it is also an essential activity for the world's economy and the transition to new forms of energy with the help of metals and minerals like copper and lithium. This is one reason why mining is now at the cutting edge of industrial transformation. To learn more, please go to Nokia's private wireless podcast page.
Yegor Sak is the Founder of Windscribe, which is a privacy company that offers VPN service for everyone. Yegor was born in Belarus but is currently based in Canada. As he was growing up, Yegor developed a passion for programming and creating websites. As a teenager, he did several projects that earned him some money through online ads. These side projects continued until he decided to start a software development firm, which eventually led to Windscribe. Today, they have almost 40 million account users. This Episode is Sponsored By: Zipfox.com makes it easy for US businesses to partner with factories in Mexico. You can find everything there – clothes, packaging, beauty products, building supplies, and a lot more, with new products being added every single day. All of the factories in Zipfox are verified with no shady middlemen that you can find on other manufacturer websites. If you want to ditch the trade war tariffs, pay 75% lower cost, and get your deliveries in 5 to 10 days, not weeks, try Zipfox.com. To learn more, just visit: millionaire-interviews.com/zipfox What if you could test out your product ideas with target consumers whenever you want before you put all the time and money into development? That's what startups and fortune 500 companies do with Feedback Loop. Get quality feedback from their target customers early and often. Feedback Loop is the test before you invent a product research platform. If you go to: millionaire-interviews.com/feedbackloop you'll get 3 full tests for FREE. With one delicious scoop of Athletic Greens you're absorbing 75 high quality vitamins, minerals, whole foods or superfoods, probiotics, and adaptogens to help you start your day right. This special blend of ingredients supports your gut health, nervous system, immune system, your energy, recovery, focus, and aging. Right now, it's time to reclaim your health and arm your immune system with convenient daily nutrition, especially heading into the flu and cold season. To make it easy, Athletic Greens is going to give you a FREE 1-year supply of immune-supporting vitamin D and 5 free travel packs with your first purchase, all you have to do is visit: millionaire-interviews.com/athleticgreens Express VPN is an app that reroutes your internet connection through their secure servers so your ISP can't see the sites you visit. Express VPN also keeps all your information secure by encrypting 100% your data with the most powerful encryption available. Protect your online activity today with the VPN rated no. 1 by Business Insider. Visit: millionaire-interviews.com/expressvpn and get an extra 3 months FREE on a 1-year package. Emily in Texas listened to the Group Call with Megan Bennett and she was extremely impressed about how Austin handled the interview. If you want to listen and be a part of our next Group Call, become a Patreon member today by visiting: millionaire-interviews.com/patreon Anthony in Ireland became a Patreon member not only to get access to more Patreon content but also to pay it forward and help the Podcast grow. Become a Patreon member now and gain access to more informative business content, sign up today at: millionaire-interviews.com/patreon Want to Support the Show? Well we'd love for you to join our Patreon Group! What's in it for you? Well you'll instantly get a scheduled call from Austin, where he'll help you with your current or future business... Sign-Up Now at millionaire-interviews.com/patreon.
March 16 topic is rational white-collar small business owners can use to price their products and services to generate the desired profit. --- Send in a voice message: https://anchor.fm/321takecontrol/message Support this podcast: https://anchor.fm/321takecontrol/support
The discussion about 5G Private Networks often revolves around Ultra-Reliable Low Latency Communication (URLLC) and how such networks are a perfect match. In this episode, I chat with Dr. Mehmet Yavuz, CTO, and co-founder of Celona, a leading Private Network solution provider, to answer the question, "Wait for URLLC or deploy them today?" Additionally, address the perennial question, "What does a Private cellular Network do that Wi-Fi can't."
In a short span of five years, private 4G and 5G networks have stirred much excitement. But do the outcomes justify the hype? Enterprises wrestle with choices between Do-It-Yourself, managed services, and public operator network slices. How do neutral hosts and system integrators help? What are the most viable technologies for private wireless? Private network deployments are generally customized for the client, and it is hard to compare the costs and benefits. So do CIOs know how to evaluate their choices, and do they have the real-world data to compare? Are there pitfalls in implementation that they should consider while planning private network deployment? Let's find out.Our guest for today is Michael Zeto, Chief Commercial Officer at Boingo Wireless. Michael is a wireless industry veteran. Before Boingo, he worked at AT&T as Vice President for Internet of Things solutions and Founder & General Manager for AT&T's Smart Cities solutions. He co-founded and served as CEO of Proximus Mobility. He also serves on the Board of Directors of the Metro Atlanta Chamber and Technology Association of Georgia.In short, he has extensive experience in the wireless industry and brings unique perspectives to new technology adoptions. In our discussion today, we will uncover a few things, such as: - Specific examples of innovation leveraging private networks?- Quantitative benefits of private networks?- Adoption hurdles that still exist today, and - How can enterprises navigate through the maze of choices? So, let us welcome Michael Zeto.
What trends will shape the future of the private wireless 4G/LTE and 5G market in 2022? The Covid-19 pandemic has had a significant impact on the enterprise world. Not least because it has acted as a wake-up call regarding the importance of accelerating digital transformation. Everyone in the enterprise market, from vendors to the enterprises themselves, now understands that such a transformation is increasingly the result of a combination of innovative technologies. These include IoT, edge, 5G, AI and ML. In this pandemic-affected world, enterprises accept they must use any technology as part of a strategy to deliver a clear business outcome. They also need to be flexible in their processes and adapt to rapid change. What does this mean for the future of private networks and digital enterprises in 2022? Should we expect momentum in the private 4G/LTE and 5G networks market? This market continues to grow significantly. According to a study by Omdia, in 2021 network roll-outs represented 20 per cent of all announcements. Growth is no longer restricted to first movers such as the USA. We are now seeing deployments in an increasing number of new countries such as Denmark and Poland. Deployments are becoming larger and more complex as private networks deliver the right RoI to enterprises. Will the appetite of enterprises for larger and more complex private wireless deployments increase? When private 4G/LTE and 5G networks were a novelty, organizations would start with a POC or trial. They might deploy in a single site or test a few use cases. Now, with private networks delivering the desired results, verticals such as mining and ports have deployed private 4G/LTE and 5G networks across multiple sites and countries. There is similar momentum across all verticals, including manufacturing. Omdia's survey of 451 enterprises found that by 2023, 34 per cent will have deployed a solution in more than five sites – significantly higher than the current figure of five per cent. Should we expect to see private wireless networks leveraging developments in edge computing, cloud computing and cloud environment? This is one of the most exciting trends set to mature in 2022, which is shown in several examples: Cloud-based network monitoring platforms are becoming ever more relevant and popular Edge and cloud players are showing increasing interest; 50 per cent of enterprises will need cloud computing and storage as part of any private 4G/LTE and 5G network deal In this fragmented environment, edge computing as a distributed computing model to analyse data closer to its source brings latency and cost benefits OT applications will need different requirements in latency, workload, ML/AI support, data security and confidentiality – a combination of edge and cloud is the only way to support them fully What challenges can we expect in the private wireless market? Some are specific to this market: The ongoing struggle to educate enterprises on the benefits of cellular The challenge of integrating private 4G/LTE and 5G networks with existing IT systems and connectivity solutions Others derive from macro trends: Private 4G/LTE and 5G networks have been hit by chip shortages because of geo-political issues, the pandemic, and businesses double-purchasing to head off uncertainty This leaves vendors in an expanding market facing growing uncertainty over chipset availability Will 2022 be the year when 5G truly arrives? Although 5G has been a hot topic for a while, it is still moving slowly into this market. Release 16 in 2020 officially heralded the new era of private 5G, but this is yet to fully materialize. The expansion of 5G in supporting industrial specific features and requirements will remain gradual. Barriers to adoption include the lack of a wide system of 5G devices, especially in the industrial environment. Until chipset vendors fully commit roadmaps and in-depth resources to accelerate this ecosystem, the pace of adoption will remain sedate. Will enterprises be able to find the private wireless experience and expertise they need? Providers that have been active in recent years are now skilled in the design, deployment, management, and other facts of making private 4G/LTE and 5G networks a successful solution. Enterprises can now tap into that expertise. As more countries unlock spectrum, the potential market is increasing – Brazil and South Korea are recent examples. Other countries that have already begun this process are continuing to expand, including the USA. MulteFire has also rekindled its push to use unlicensed spectrum to use unlicensed spectrum to support the expansion of private network. Ultimately, private 4G/LTE and 5G networks are delivering results – and it is time to understand how to use this solution to your advantage. For more information visit: nokia.com/networks/private-wireless
In unserer heutigen Podcast Folge dreht sich alles um das Thema Private Networks. Tobias Rast behandelt dabei gemeinsam mit Anja Heinicke (Artefact) den gesamten Prozess: Über die Entscheidung, das Setup bis hin zum Livegang. Messbare Erfolge, das war Anjas Grund, nach dem Studiums den Weg ins Online Marketing zu wählen. Heute ist sie Senior Specialist Affiliate bei Artefact und betreut dort verschiedene Kunden auf deren Weg zum und im Private Network.
I'm not sure people realize how it's set up or that it's even an option. So here's the explanation. --- Support this podcast: https://anchor.fm/brokerapproved/support
“What changes over the years is your vision...” Thousands of people have been inspired by Ali Brown, Founder of The Trust private network and Host of Glambition Radio! And I am thrilled to have her join me for this episode of #TheKaraGoldinShow! How do you get unstuck? How do you find your purpose? When do you need a coach? Ali is a total girl boss! She’s built businesses and has been there. Don’t miss this episode! Show notes at https://karagoldin.com/podcast/ali-brown Connect with Kara: Facebook: https://www.facebook.com/karagoldin/ Twitter: https://twitter.com/karagoldin Instagram: https://instagram.com/karagoldin LinkedIn: https://www.linkedin.com/in/karagoldin/ Connect with Ali: https://www.instagram.com/alibrownofficial/
How does one of Europe's leading shopping and comparison platforms deal with #partnermarketing? Andrea Springer-Ferazin, Teamlead Affiliate and Cooperation at idealo internet GmbH, and Dr. Siamak Haschemi, CEO at Ingenious Technologies, give us a look behind the scenes of idealo's Private Affiliate Network.
Today I will discuss: 1. What are the risks against the networks? 2. What is the Cisco Stealth? 3. How can it provide protection against different cyber-attacks? Watch
Why is CBRS going to be so important to property owners in the future. How can a private network benefit owners and what can you do with it?
A look into the future of Private Networks and how Google is helping to create the new world order using CBRS
Es heißt “Partnermarketing” - bitte vergesst den Begriff “Affiliate Marketing!” Dennis Petersen, (ehemals) Partnerize redet als (Ex) Konkurrent mit Tobias Rast von Ingenious Technologies. Gemeinsam plädieren sie für “Partnermarketing.” Außerdem geht es um ihre gemeinsame Parade-Disziplin Private Network Technologien, den manchmal unerträglichen Effizienzdruck einiger Shops für CPO-Kooperationen, Internationalität und die Partnermarketingbranche ohne (und doch mit) Events zu Corona-Zeiten.
As ExteNet Systems’ VP of Inside Plant, Jeff Robator oversees the lit network including DWDM, Lit Wave, Ethernet, Private Network, Cloud and IP connectivity with both metro and national lit and metro enterprise dark fiber service solutions available. In this episode, Jeff shares his thoughts on industry trends and changes, and how the COVID-19 pandemic is altering the way that his organization does business. Discover the network challenges and opportunities that commercial real estate owners are facing.
We’ve all heard the saying, “it’s lonely at the top.” For many female C-suite executives, rising Vice Presidents, and entrepreneurs this isolation is compounded because these positions are traditionally held by men. Women working in these positions find themselves mentoring and serving others but they do not have a place where they can receive that same support. We had the honor of sitting down with Lindsay Kaplan Co-founder of Chief, a New York-based private women’s network that provides a place for C-suite executives to connect, network, and grow. In this episode, we discuss what a Chief woman/person looks like. We talk about the need and benefits of having mentoring available to women and what that kind of support looks like at Chief. Join us as we learn more about Chief and the services they offer. We hope you enjoy this episode, we are thrilled to learn more about Chief and are excited to see them grow. Episode Breakdown: 5:09 Introductions, Chief the beginning. The need for a place for women climbing the ladder to find support. 5:27 Lack of women in leadership. 5:46 Chief exists to provide a service to women, not ask for service from them. 6:03 What is YPO? 7:18 Building something inspired by this idea for the woman sitting at the boardroom table. 8:20 Founding members, this is a place for you. 10:04 The waitlist and plans for expansion internationally. 11:09 Criteria. Who makes up the women of Chief? 13:10 Finding powerful women/people who want to learn, meet, and support others. 13:27 Bringing cognitive diversity to the table. 14:03 White feminism, diversity, and goals. 14:20 Bringing in underrepresented women. 17:08 Hard balance, naysayers, and accountability. 18:20 What are core groups and do the topics covered have a spin towards women? 1910 Facilitators are trained to guide groups, groups are not member lead. 20:45 The exercise-driven approach and key events members attend. 21:30 Members attend meetings in person. 21:44 Topics do not have a bend towards women but are designed with women in mind first. 22:49 Is self-care for women only? 25:06 Keeping women in power is harder than getting them there. 25:14 Expectations on working women. 25:33 Mindfulness is an important part of being a leader. 27:03 Optionality and variety within what Chief has to offer. 27:29 The Clubhouse design, inspired by greenrooms. 31:09 The Clubhouse is not meant to be a coworking space. 32:10 Plan of growth. 34:18 Speakers at Chief events. 35:58 Member run conversations and Q&A. 36:17 Off the record, private organization with no social media. 38:10 Confidentiality is something that is important to members and speakers. 39:12 Funding, investors, and the journey of finding funding. 42:09 Investors that know branding, membership, and diversity. 43:32 Who are you selling to, who is your competitor, what is your product? 46:33 Farewells. Getting women to a place of power and keeping them there.
Tools to manage your tools: This week on Track Changes Paul and Rich discuss the best way to keep track of company communications and tools. Our verdict, an Intranet. We lay out what an Intranet actually is, what it should and could look like and why it’s so important in an age of using too many apps at once. We also make a pact to build a functional intranet in the next six months. Wish us luck! Trello Basecamp Github TriNet Pingboard Slack Abacus Airtable Dropbox Paper Whimsical Jira Pipedrive Greenhouse Dash for Slack Google Drive Zapier Chartbeat Adobe After Effects Sketch Apple Numbers
Everything is moving to the cloud, which makes it increasingly important to secure your cloud infrastructure and minimize the threat of potential attackers. With a virtual private cloud (VPC)—your own private network in the cloud that you can launch your own instances into—this can be done with VPC Peering, connecting VPCs together to create a path between them to keep your data safe and accessible to you alone. Although typically performed in a single cloud provider, it is possible to do in more than one—think of it as your cloud routerDaniel LaMotte (Site Reliability Engineer, Confluent) walks through the details of cloud networking and VPC peering: what it is, what it does, and how to launch a VPC in the cloud, plus the difference between AWS PrivateLink and AWS Transit Gateway, CIDR, and its accessibility across cloud providers. EPISODE LINKSVPC Peering in Confluent CloudJoin the Confluent Community SlackFully managed Apache Kafka as a service! Try free.
More than 500 police departments across the USA have partnered with Ring Doorbell (an Amazon Company) to create a new kind of widespread surveillance system. What you need to know, and what to do about it.
Cédric
Cédric
CISO/Security Vendor Relationship Podcast and series is available at CISOSeries.com. We're giving away private networks to everybody. Even if you think you don't need one, you want one. It's all on this week's episode of CISO/Security Vendor Relationship Podcast. This show, like all the previous ones is hosted by me, David Spark (@dspark), founder of Spark Media Solutions and Mike Johnson. Our sponsored guest this week is Francis Dinha, CEO of OpenVPN. Thanks to this week's sponsor, OpenVPN Create an economical and secure private network for your company with OpenVPN. Used by Fortune 500 companies and IT, Access Server keeps your internal data safe with end-to-end encryption, secure remote access, and extension for your centralized unified threat management. Go to openvpn.net/ciso-series to test drive Access Server for free. On this episode What's a CISO to do? A few years back I interviewed Francis Dinha about hiring talent. Dinha had the fortune to be able to mine his own community of people of open source volunteers. It's become a great resource for hiring talent. Finding those passionate communities are key for finding talent. We discuss other possible resources and why it's critical or maybe not critical to hire people who've contributed to the open source community. Why is everybody talking about this now? Given the number of default passwords being used and connected devices with little to no security, does achieving "zero trust" have to be the InfoSec equivalent of climbing Mt. Everest? We discuss simplifying security architecture so achieving "zero trust" isn't a badge of honor but rather something everybody can easily do. "What's Worse?!" Another round where we debate an open source conundrum. Please, enough. No, more. What have we heard enough with VPNs and what would we like to hear a lot more? Let's dig a little deeper John Prokap, CISO of HarperCollins, said on our live NYC recording, "If you patch your systems, you will have less threats that will hurt you." I posted John's basic security advice as a meme, and it got a flurry of response. My favorite came from Greg Van Der Gaast of CMCG who said, "The fact that this is quote/post-worthy in 2019 boggles my mind." The issue of "why aren't you doing this" came up and people discussed integration issues, hard to keep up, and the fact that patches can often break applications. Is this a cycle that's impossible to break?
Assembly language on OpenBSD, using bhyve for FreeBSD development, FreeBSD Gaming, FreeBSD for Thanksgiving, no space left on Dragonfly’s hammer2, and more. ##Headlines Assembly language on OpenBSD amd64+arm64 This is a short introduction to assembly language programming on OpenBSD/amd64+arm64. Because of security features in the kernel, I have had to rethink a series of tutorials covering Aarch64 assembly language on OpenBSD, and therefore this will serve as a placeholder-cum-reminder. OpenBSD, like many UNIX and unix-like operating systems, now uses the Executable and Linkable Format (ELF) for its binary libraries and executables. Although the structure of this format is beyond the scope of this short introduction, it is necessary for me to explain part of one of the headers. Within the program header there are sections known as PT_NOTE that OpenBSD and other systems use to distinguish their ELF executables - OpenBSD looks for this section to check if it should attempt to execute the program or not. Our first program: in C! It’s often a good idea to prototype your assembly programs in a high level language such as C - it can then double up as both a set of notes and a working program that you can debug and compile into assembly language to compare with your own asm code. See the article for the rest on: Our first program: in x86-64 Asm (AT&T/GAS syntax) Our first program: in inline x86-64 assembly Our first program: in x86-64 asm (NASM syntax) Our first program: in ARMv8 AArch64 assembly ###Using bhyve for FreeBSD Development The Hypervisor The bhyve hypervisor requires a 64-bit x86 processor with hardware support for virtualization. This requirement allows for a simple, clean hypervisor implementation, but it does require a fairly recent processor. The current hypervisor requires an Intel processor, but there is an active development branch with support for AMD processors. The hypervisor itself contains both user and kernel components. The kernel driver is contained in the vmm.ko module and can be loaded either at boot from the boot loader or at runtime. It must be loaded before any guests can be created. When a guest is created, the kernel driver creates a device file in /dev/vmm which is used by the user programs to interact with the guest. The primary user component is the bhyve(8) program. It constructs the emulated device tree in the guest and provides the implementation for most of the emulated devices. It also calls the kernel driver to execute the guest. Note that the guest always executes inside the driver itself, so guest execution time in the host is counted as system time in the bhyve process. Currently, bhyve does not provide a system firmware interface to the guest (neither BIOS nor UEFI). Instead, a user program running on the host is used to perform boot time operations including loading the guest operating system kernel into the guest’s memory and setting the initial guest state so that the guest begins execution at the kernel’s entry point. For FreeBSD guests, the bhyveload(8) program can be used to load the kernel and prepare the guest for execution. Support for some other operating systems is available via the grub2-bhyve program which is available via the sysutils/grub2-bhyve port or as a prebuilt package. The bhyveload(8) program in FreeBSD 10.0 only supports 64-bit guests. Support for 32-bit guests will be included in FreeBSD 10.1. See the article for the very technical breakdown of the following: Network Setup Bridged Configuration Private Network with NAT Using dnsmasq with a Private Network Running Guests via vmrun.sh Configuring Guests Using a bhyve Guest as a Target Conclusion The bhyve hypervisor is a nice addition to a FreeBSD developer’s toolbox. Guests can be used both to develop new features and to test merges to stable branches. The hypervisor has a wide variety of uses beyond developing FreeBSD as well. ##News Roundup Games on FreeBSD What do all programmers like to do after work? Ok, what do most programers like to do after work? The answer is simple: play a good game! Recently at the Polish BSD User Group meetup mulander was telling us how you can play games on OpenBSD. Today let’s discuss how this looks in the FreeBSD world using the “server only” operating system. XNA based games One of the ways of playing natively is to play indie games which use XNA. XNA is a framework from Microsoft which uses .NET, for creating games. Fortunately, in the BSD world we have Mono, an open source implementation of Microsoft’s .NET Framework which you can use to run games. There is also FNA framework which is a reimplementation of XNA which allows you to run the games under Linux. Thomas Frohwein, from OpenBSD, prepared a script, fnaify. Fnaify translate all dependencies used by an FNA game to OpenBSD dependencies. I decided to port the script to FreeBSD. The script is using /bin/sh which in the case of OpenBSD is a Korn Shell. I didn’t test it with many games, but I don’t see any reason why it shouldn’t work with all the games tested by the OpenBSD guys. For example, with: Cryptark Rouge Legacy Apotheon Escape Goat Bastion CrossCode Atom Zombie Smasher Open-Source games In FreeBSD and OpenBSD we also will find popular games which were open sourced. For example, I spend a lot of time playing in Quake 3 Arena on my FreeBSD machine. You can very simply install it using pkg: # pkg install ioquake3 Then move the files for the skins and maps to the .ioquake3 directory from your copy of Quake. In the past I also played UrbanTerror which is a fully open source shooter based on the Quake 3 Arena engine. It’s is also very easy to install it from ports: # pkg install iourbanterror In the ports tree in the games directory you can find over 1000 directories, many of them with fully implemented games. I didn’t test many games in this category, but you can find some interesting titles like: openxcom (Open-source re-implementation of the original X-Com) openjazz (Free re-implementation of the Jazz Jackrabbit™ game engine) corsixth (Open source re-implementation of Theme Hospital) quake2 openra (Red Alert) openrct2 (Open source re-implementation of RollerCoaster Tycoon 2) openmw (Open source engine reimplementation of the game Morrowind) All those titles are simply installed through the packages. In that case I don’t think FreeBSD has any difference from OpenBSD. Wine One of the big advantages of FreeBSD over OpenBSD is that FreeBSD supports wine. Wine allows you to run Windows applications under other operating systems (including mac). If you are a FreeBSD 11 user, you can simply fetch wine from packages: # pkg install i386-wine To run Windows games, you need to have a 32-bit wine because most of the games on Windows are built on 32-bits (maybe this has changed – I don’t play so much these days). In my case, because I run FreeBSD-CURRENT I needed to build wine from ports. It wasn’t nice, but it also wasn’t unpleasant. The whole step-by-step building process of a wine from ports can be found here. Summary As you can see there are many titles available for *BSDs. Thanks to the FNA and fnaify, OpenBSD and FreeBSD can work with indie games which use the XNA framework. There are many interesting games implemented using this framework. Open source is not only for big server machines, and there are many re-implementations of popular games like Theme Hospital or RollerCoaster Tycoon 2. The biggest market is still enabled through wine, although its creates a lot of problems to run the games. Also, if you are an OpenBSD user only this option is not available for you. Please also note that we didn’t discuss any other emulators besides wine. In OpenBSD and FreeBSD there are many of them for GameBoy, SNES, NeoGeo and other games consoles. ###FreeBSD For Thanksgiving I’ve been working on FreeBSD for Intel for almost 6 months now. In the world of programmers, I am considered an old dog, and these 6 months have been all about learning new tricks. Luckily, I’ve found myself in a remarkably inclusive and receptive community whose patience seems plentiful. As I get ready to take some time off for the holidays, and move into that retrospective time of year, I thought I’d beat the rush a bit and update on the progress Earlier this year, I decided to move from architect of the Linux graphics driver into a more nebulous role of FreeBSD enabling. I was excited, but also uncertain if I was making the right decision. Earlier this half, I decided some general work in power management was highly important and began working there. I attended BSDCam (handsome guy on the right), and led a session on Power Management. I was honored to be able to lead this kind of effort. Earlier this quarter, I put the first round of my patches up for review, implementing suspend-to-idle. I have some rougher patches to handle s0ix support when suspending-to-idle. I gave a talk MeetBSD about our team’s work. Earlier this month, I noticed that FreeBSD doesn’t have an implementation for Intel Speed Shift (HWPstates), and I started working on that. Earlier this week, I was promoted from a lowly mentee committer to a full src committer. Earlier today, I decided to relegate my Linux laptop to the role of my backup machine, and I am writing this from my Dell XPS13 running FreeBSD vandamme 13.0-CURRENT FreeBSD 13.0-CURRENT #45 881fee072ff(hwp)-dirty: Mon Nov 19 16:19:32 PST 2018 bwidawsk@vandamme:/usr/home/bwidawsk/usr/obj/usr/home/bwidawsk/usr/src/amd64.amd64/sys/DEVMACHINE amd64 6 months later, I feel a lot less uncertain about making the right decision. In fact, I think both opportunities would be great, and I’m thankful this Thanksgiving that this is my life and career. I have more plans and things I want to get done. I’m looking forward to being thankful again next year. ###hammer2: no space left on device on Dragonfly BSD The Issue hammer2 does not actually delete a file when you rm or unlink it. Since recovery of the file is possible (this is the design of hammer2), there will still be an entry taking up data. It’s similar to how git works. Even with 75% usage listed here, the filesystem could still have filled up. If you are using it as your root filesystem, then attempts to clean up data may fail. If the kernel panics over this, you will see something like this. The Fix If you have a recent enough version of the rescue ramdisk installed, on bootup you can press ‘r’ and access the rescue ramdisk. Your provider will have to offer some sort of remote interface for interacting with the operating system before it boots, like VNC or IPMI. You can then mount your filesystem using: [root@ ~]# mkdir /tmp/fs [root@ ~]# mount_hammer2 -o local /dev/vbd0s1a /tmp/fs If you receive an error that /sbin/hammer2 is not found, then your rescue ramdisk is not up to date enough. In that scenario, download the latest 5.2 iso from dragonflybsd.org and boot from the cd-rom on your virtual machine or physical device. Just login as root instead of installer. If the mount does succeed, then all you have to do is run the following twice: [root@ ~]# /sbin/hammer2 bulkfree /tmp/fs If you do not have enough memory on your machine, you may need to mount swap. Add your swap partition to the /etc/fstab and then do: [root@ ~]# swapon -a Once you have ran the bulkfree command twice, the usage reported by df -h will be correct. However, there is a chance on reboot that a core dump will be placed in /var/crash/ so be prepared to have plenty of space free in case that happens. You should also delete any files you can and run the bulkfree operation twice afterwards to clear up additional space. ##Beastie Bits BSD Pizza Night - Portland bsd@35c3: …the place for you…*NIX! Project Trident PreRelease Image now available Play Stardew Valley on OpenBSD GUI Wrapper for OpenBSD mixerctl qtv - QuickTextViewer ##Feedback/Questions Ron - Ideas for feedback section Paulo - SDIO Firmware Dan - Some fun ZFS questions about labels Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
Does your music get bodies movin’, and the party started? If not, don’t worry, you just need to add some bounce. So in this video, you’ll learn a super easy yet super effective hack to bring da bounce to your music. But first… tea! Hello revolutionaries, I’m Kate Harmony, this is Ray Harmony, and welcome to Hack Music Theory. This channel helps you make great music that stands out, so you can get discovered! If that sounds useful to you, then subscribe and hit that bell to get notified every Saturday, when we publish our new video. Alright, it’s time to open your DAW to hack music theory. THEORYIn their new single “wonderful life” (from upcoming album "Amo") that just dropped this week, Bring Me The Horizon deliver a masterclass in how to make your music (and therefore your audience) bounce! They even manage to get “bounce” in their lyrics, with the line: “everybody knows I got bounce”. But first... what is “bounce”, and how’s it gonna get the party started? Quite simply, when a song has bounce, it makes you wanna bounce. In other words, it makes you wanna jump up and down. How? Well, there are numerous ways, but in this song, Bring Me The Horizon lock in their riff and kick drum, which both play dotted 1/8 notes that bounce over the 1/4 note pulse. Step 1 - Bounce NotesSet up four bars of 4/4, with your grid set to 1/16 notes, and your tempo set to 86.5 BPM. The main riff in “wonderful life” is based around a low F and the F an octave higher, so we’ll do something kinda similar. Start by playing three dotted 1/8 notes on that low F. A dotted 1/8 note is equal to three 1/16 notes. Also, if you want, you can extend that last note by a 1/16 (like it is in the original). Right, now these three notes are your bounce notes, so copy and paste them into the other bars, so every bar bounces! Next, it’s time to bring in some higher notes to add depth to your riff, so add a few 1/16 notes at the end of each bar. We chose the ♭2, 7, 4, and ♭5 as the basis for ours. And if you want, you can add a little variation to these high notes in your third bar, and maybe even extend that 1/16 note run over the bar line and into your fourth bar, like we did. Lastly, if you’re playing this on a real guitar, throw in a little bend on the bounce notes. And by the way, if you need help with the basics - like scales, chords, and spelling (which is when you use numbers for notes, like we just did) - then download our free book below. Step 2 - Surprise PartyThis step is so cool! Let me explain. Bring Me The Horizon know that this bounce will get boring if they keep repeating it, so they throw in one totally unexpected bounce, which is like a surprise party! So, in your second bar, move all (or some, we like did) of those higher notes to the left, by one 1/16 note. Then, extend the first note in your third bar to the left, by one 1/16 note. This creates the most exhilarating surprise bounce on beat 4a, which nobody will be expecting, so it keeps your party super fresh! NEXTRight, now that you’ve got one section down, how do you write a new section for it, and then, how do you transition between those two sections? Great questions, and if this is something you need help with, then check out our cutting-edge online apprenticeship course, where you’ll literally learn every step of the music making process, and most importantly, you’ll learn how to finish your songs! You’ll also gain access to our Private Network, which is a safe social media platform exclusively for our apprentices (and we already have over 400 apprentices, from over 40 countries). Our Network is a super supportive place for you to ask theory questions, share your music, get feedback, meet like-minded music makers, collaborate, and more! So if all that sounds useful to you, then head on over to our Online Apprenticeship page now. Kate & Ray Harmony (AKA Revolution Harmony)Music Teachers & Producers in Vancouver BC, Canada LEARNLevel 1: Read our free book (below) & watch our YouTube videosLevel 2: Read our "Part 1" book & "Songwriting & Producing" PDFLevel 3: Learn our secret art of songwhispering & finish your music! ABOUTHack Music Theory is the pioneering notation-free method for making great music that stands out, so you can get discovered! Taught by award-winning music lecturer Ray Harmony, and his protégé (and wife) Kate Harmony, from their studio in Vancouver BC, Canada. Ray is the author of critically-acclaimed book series "Hack Music Theory", and has made music with Serj Tankian (System of a Down), Tom Morello (Rage Against the Machine), Steven Wilson (Porcupine Tree), Devin Townsend (Strapping Young Lad), Ihsahn (Emperor), Kool Keith (Ultramagnetic MCs), Madchild (Swollen Members), and many more! Kate has the highest grade distinction in Popular Music Theory from the London College of Music, and is the only person on the planet who's been trained by Ray to teach his method. On that note, the "Hack Music Theory" YouTube channel teaches relevant and instantly-usable music theory for producers, DAW users, and all other music makers (songwriters, singers, guitarists, bassists, drummers, etc.) in all genres, from EDM to R&B, pop to hip-hop, reggae to rock, electronic to metal (and yes, we djefinitely djent!).(c) 2018 Revolution HarmonyAll words and music in video by Revolution HarmonyRevolution Harmony is Ray Harmony & Kate Harmony Photo of Oli Sykes (Bring Me The Horizon) courtesy of Emma Viola Lilja Wooohooo!!! You’re a mere 30 minutes away from being even smarter than you already are. Just head on over to your inbox now for your free download. There was an error submitting your subscription. Please try again. “The most brilliant, fast, easy & fun music theory book I’ve ever seen!” DEREK SIVERS, CD Baby founder We use this field to detect spam bots. If you fill this in, you will be marked as a spammer. DOWNLOAD FREE BOOK /* Layout */ .ck_form { /* divider image */ background: #EAE9EA url(data:image/gif;base64,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) repeat-y center top; font-family: 'Montserrat'; line-height: 1.5em; overflow: hidden; color: #000000; font-size: 16px; border-top: none; border-top-color: #666666; border-bottom: none; border-bottom-color: #3d3d3d; -webkit-box-shadow: none; -moz-box-shadow: none; box-shadow: none; clear: both; margin: 0px 0px; } .ck_form, .ck_form * { -webkit-box-sizing: border-box; -moz-box-sizing: border-box; box-sizing: border-box; } #ck_subscribe_form { clear: both; } /* Element Queries — uses JS */ .ck_form_content, .ck_form_fields { width: 50%; float: left; padding: 5%; } .ck_form.ck_horizontal { } .ck_form_content { border-bottom: none; } .ck_form.ck_vertical { background: #fff; } .ck_vertical .ck_form_content, .ck_vertical .ck_form_fields { padding: 10%; width: 100%; float: none; } .ck_vertical .ck_form_content { border-bottom: 1px dotted #aaa; overflow: hidden; } /* Trigger the vertical layout with media queries as well */ @media all and (max-width: 499px) { .ck_form { background: #fff; } .ck_form_content, .ck_form_fields { padding: 10%; width: 100%; float: none; } .ck_form_content { border-bottom: 1px dotted #aaa; } } /* Content */ .ck_form_content h3 { margin: 0px 0px 0px; font-size: 0px; padding: 0px; } .ck_form_content p { font-size: 14px; } .ck_image { float: left; margin-right: 5px; } /* Form fields */ .ck_errorArea { display: none; } #ck_success_msg { padding: 10px 10px 0px; border: solid 1px #ddd; background: #eee; } .ck_label { font-size: 14px; font-weight: bold; } .ck_form input[type="text"] { font-size: 16px; text-align: center; margin-top: 20px; margin-bottom: 0px; padding: 8px 8px; width: 100%; border: 1px solid #d6d6d6; /* stroke */ -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ background-color: #fff; /* layer fill content */ height: auto; } .ck_form input[type="email"] { font-size: 16px; text-align: center; margin-top: 0px; margin-bottom: 15px; padding: 8px 8px; width: 100%; border: 1px solid #d6d6d6; /* stroke */ -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ background-color: #fff; /* layer fill content */ height: auto; } .ck_form input[type="text"]:focus, .ck_form input[type="email"]:focus { outline: none; border-color: #aaa; } .ck_checkbox { padding: 10px 0px 10px 20px; display: block; clear: both; } .ck_checkbox input.optIn { margin-left: -20px; margin-top: 0; } .ck_form .ck_opt_in_prompt { margin-left: 4px; } .ck_form .ck_opt_in_prompt p { display: inline; } .ck_form .ck_subscribe_button { width: 100%; color: #fff; margin: 0px 0px 0px; padding: 8px 8px; font-size: 18px; background: #d74128; -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ cursor: pointer; border: none; text-shadow: none; } .ck_form .ck_guarantee { color: #626262; font-size: 12px; text-align: center; padding: 5px 0px; display: block; } .ck_form .ck_powered_by { display: block; color: #aaa; } .ck_form .ck_powered_by:hover { display: block; color: #444; } .ck_converted_content { display: none; padding: 5%; background: #fff; } /* v6 */ .ck_form_v6 #ck_success_msg { padding: 0px 10px; } @media all and (max-width: 403px) { .ck_form_v6.ck_modal .ck_close_link { top: 30px; } } @media all and (min-width: 404px) and (max-width: 499px) { .ck_form_v6.ck_modal .ck_close_link { top: 57px; } }
Does your music get bodies movin’, and the party started? If not, don’t worry, you just need to add some bounce. So in this video, you’ll learn a super easy yet super effective hack to bring da bounce to your music. But first… tea! Hello revolutionaries, I’m Kate Harmony, this is Ray Harmony, and welcome to Hack Music Theory. This channel helps you make great music that stands out, so you can get discovered! If that sounds useful to you, then subscribe and hit that bell to get notified every Saturday, when we publish our new video. Alright, it’s time to open your DAW to hack music theory. THEORYIn their new single “wonderful life” (from upcoming album "Amo") that just dropped this week, Bring Me The Horizon deliver a masterclass in how to make your music (and therefore your audience) bounce! They even manage to get “bounce” in their lyrics, with the line: “everybody knows I got bounce”. But first... what is “bounce”, and how’s it gonna get the party started? Quite simply, when a song has bounce, it makes you wanna bounce. In other words, it makes you wanna jump up and down. How? Well, there are numerous ways, but in this song, Bring Me The Horizon lock in their riff and kick drum, which both play dotted 1/8 notes that bounce over the 1/4 note pulse. Step 1 - Bounce NotesSet up four bars of 4/4, with your grid set to 1/16 notes, and your tempo set to 86.5 BPM. The main riff in “wonderful life” is based around a low F and the F an octave higher, so we’ll do something kinda similar. Start by playing three dotted 1/8 notes on that low F. A dotted 1/8 note is equal to three 1/16 notes. Also, if you want, you can extend that last note by a 1/16 (like it is in the original). Right, now these three notes are your bounce notes, so copy and paste them into the other bars, so every bar bounces! Next, it’s time to bring in some higher notes to add depth to your riff, so add a few 1/16 notes at the end of each bar. We chose the ♭2, 7, 4, and ♭5 as the basis for ours. And if you want, you can add a little variation to these high notes in your third bar, and maybe even extend that 1/16 note run over the bar line and into your fourth bar, like we did. Lastly, if you’re playing this on a real guitar, throw in a little bend on the bounce notes. And by the way, if you need help with the basics - like scales, chords, and spelling (which is when you use numbers for notes, like we just did) - then download our free book below. Step 2 - Surprise PartyThis step is so cool! Let me explain. Bring Me The Horizon know that this bounce will get boring if they keep repeating it, so they throw in one totally unexpected bounce, which is like a surprise party! So, in your second bar, move all (or some, we like did) of those higher notes to the left, by one 1/16 note. Then, extend the first note in your third bar to the left, by one 1/16 note. This creates the most exhilarating surprise bounce on beat 4a, which nobody will be expecting, so it keeps your party super fresh! NEXTRight, now that you’ve got one section down, how do you write a new section for it, and then, how do you transition between those two sections? Great questions, and if this is something you need help with, then check out our cutting-edge online apprenticeship course, where you’ll literally learn every step of the music making process, and most importantly, you’ll learn how to finish your songs! You’ll also gain access to our Private Network, which is a safe social media platform exclusively for our apprentices (and we already have over 400 apprentices, from over 40 countries). Our Network is a super supportive place for you to ask theory questions, share your music, get feedback, meet like-minded music makers, collaborate, and more! So if all that sounds useful to you, then head on over to our Online Apprenticeship page now. Kate & Ray Harmony (AKA Revolution Harmony)Music Teachers & Producers in Vancouver BC, Canada LEARNLevel 1: Read our free book (below) & watch our YouTube videosLevel 2: Read our "Part 1" book & "Songwriting & Producing" PDFLevel 3: Learn our secret art of songwhispering & finish your music! ABOUTHack Music Theory is the pioneering notation-free method for making great music that stands out, so you can get discovered! Taught by award-winning music lecturer Ray Harmony, and his protégé (and wife) Kate Harmony, from their studio in Vancouver BC, Canada. Ray is the author of critically-acclaimed book series "Hack Music Theory", and has made music with Serj Tankian (System of a Down), Tom Morello (Rage Against the Machine), Steven Wilson (Porcupine Tree), Devin Townsend (Strapping Young Lad), Ihsahn (Emperor), Kool Keith (Ultramagnetic MCs), Madchild (Swollen Members), and many more! Kate has the highest grade distinction in Popular Music Theory from the London College of Music, and is the only person on the planet who's been trained by Ray to teach his method. On that note, the "Hack Music Theory" YouTube channel teaches relevant and instantly-usable music theory for producers, DAW users, and all other music makers (songwriters, singers, guitarists, bassists, drummers, etc.) in all genres, from EDM to R&B, pop to hip-hop, reggae to rock, electronic to metal (and yes, we djefinitely djent!).(c) 2018 Revolution HarmonyAll words and music in video by Revolution HarmonyRevolution Harmony is Ray Harmony & Kate Harmony Photo of Oli Sykes (Bring Me The Horizon) courtesy of Emma Viola Lilja Wooohooo!!! You’re a mere 30 minutes away from being even smarter than you already are. Just head on over to your inbox now for your free download. There was an error submitting your subscription. Please try again. “The most brilliant, fast, easy & fun music theory book I’ve ever seen!” DEREK SIVERS, CD Baby founder We use this field to detect spam bots. If you fill this in, you will be marked as a spammer. DOWNLOAD FREE BOOK /* Layout */ .ck_form { /* divider image */ background: #EAE9EA url(data:image/gif;base64,R0lGODlhAQADAIABAMzMzP///yH/C1hNUCBEYXRhWE1QPD94cGFja2V0IGJlZ2luPSLvu78iIGlkPSJXNU0wTXBDZWhpSHpyZVN6TlRjemtjOWQiPz4gPHg6eG1wbWV0YSB4bWxuczp4PSJhZG9iZTpuczptZXRhLyIgeDp4bXB0az0iQWRvYmUgWE1QIENvcmUgNS41LWMwMTQgNzkuMTUxNDgxLCAyMDEzLzAzLzEzLTEyOjA5OjE1ICAgICAgICAiPiA8cmRmOlJERiB4bWxuczpyZGY9Imh0dHA6Ly93d3cudzMub3JnLzE5OTkvMDIvMjItcmRmLXN5bnRheC1ucyMiPiA8cmRmOkRlc2NyaXB0aW9uIHJkZjphYm91dD0iIiB4bWxuczp4bXA9Imh0dHA6Ly9ucy5hZG9iZS5jb20veGFwLzEuMC8iIHhtbG5zOnhtcE1NPSJodHRwOi8vbnMuYWRvYmUuY29tL3hhcC8xLjAvbW0vIiB4bWxuczpzdFJlZj0iaHR0cDovL25zLmFkb2JlLmNvbS94YXAvMS4wL3NUeXBlL1Jlc291cmNlUmVmIyIgeG1wOkNyZWF0b3JUb29sPSJBZG9iZSBQaG90b3Nob3AgQ0MgKE1hY2ludG9zaCkiIHhtcE1NOkluc3RhbmNlSUQ9InhtcC5paWQ6MUQ5NjM5RjgxQUVEMTFFNEJBQTdGNTQwMjc5MTZDOTciIHhtcE1NOkRvY3VtZW50SUQ9InhtcC5kaWQ6MUQ5NjM5RjkxQUVEMTFFNEJBQTdGNTQwMjc5MTZDOTciPiA8eG1wTU06RGVyaXZlZEZyb20gc3RSZWY6aW5zdGFuY2VJRD0ieG1wLmlpZDoxRDk2MzlGNjFBRUQxMUU0QkFBN0Y1NDAyNzkxNkM5NyIgc3RSZWY6ZG9jdW1lbnRJRD0ieG1wLmRpZDoxRDk2MzlGNzFBRUQxMUU0QkFBN0Y1NDAyNzkxNkM5NyIvPiA8L3JkZjpEZXNjcmlwdGlvbj4gPC9yZGY6UkRGPiA8L3g6eG1wbWV0YT4gPD94cGFja2V0IGVuZD0iciI/PgH//v38+/r5+Pf29fTz8vHw7+7t7Ovq6ejn5uXk4+Lh4N/e3dzb2tnY19bV1NPS0dDPzs3My8rJyMfGxcTDwsHAv769vLu6ubi3trW0s7KxsK+urayrqqmop6alpKOioaCfnp2cm5qZmJeWlZSTkpGQj46NjIuKiYiHhoWEg4KBgH9+fXx7enl4d3Z1dHNycXBvbm1sa2ppaGdmZWRjYmFgX15dXFtaWVhXVlVUU1JRUE9OTUxLSklIR0ZFRENCQUA/Pj08Ozo5ODc2NTQzMjEwLy4tLCsqKSgnJiUkIyIhIB8eHRwbGhkYFxYVFBMSERAPDg0MCwoJCAcGBQQDAgEAACH5BAEAAAEALAAAAAABAAMAAAICRFIAOw==) repeat-y center top; font-family: 'Montserrat'; line-height: 1.5em; overflow: hidden; color: #000000; font-size: 16px; border-top: none; border-top-color: #666666; border-bottom: none; border-bottom-color: #3d3d3d; -webkit-box-shadow: none; -moz-box-shadow: none; box-shadow: none; clear: both; margin: 0px 0px; } .ck_form, .ck_form * { -webkit-box-sizing: border-box; -moz-box-sizing: border-box; box-sizing: border-box; } #ck_subscribe_form { clear: both; } /* Element Queries — uses JS */ .ck_form_content, .ck_form_fields { width: 50%; float: left; padding: 5%; } .ck_form.ck_horizontal { } .ck_form_content { border-bottom: none; } .ck_form.ck_vertical { background: #fff; } .ck_vertical .ck_form_content, .ck_vertical .ck_form_fields { padding: 10%; width: 100%; float: none; } .ck_vertical .ck_form_content { border-bottom: 1px dotted #aaa; overflow: hidden; } /* Trigger the vertical layout with media queries as well */ @media all and (max-width: 499px) { .ck_form { background: #fff; } .ck_form_content, .ck_form_fields { padding: 10%; width: 100%; float: none; } .ck_form_content { border-bottom: 1px dotted #aaa; } } /* Content */ .ck_form_content h3 { margin: 0px 0px 0px; font-size: 0px; padding: 0px; } .ck_form_content p { font-size: 14px; } .ck_image { float: left; margin-right: 5px; } /* Form fields */ .ck_errorArea { display: none; } #ck_success_msg { padding: 10px 10px 0px; border: solid 1px #ddd; background: #eee; } .ck_label { font-size: 14px; font-weight: bold; } .ck_form input[type="text"] { font-size: 16px; text-align: center; margin-top: 20px; margin-bottom: 0px; padding: 8px 8px; width: 100%; border: 1px solid #d6d6d6; /* stroke */ -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ background-color: #fff; /* layer fill content */ height: auto; } .ck_form input[type="email"] { font-size: 16px; text-align: center; margin-top: 0px; margin-bottom: 15px; padding: 8px 8px; width: 100%; border: 1px solid #d6d6d6; /* stroke */ -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ background-color: #fff; /* layer fill content */ height: auto; } .ck_form input[type="text"]:focus, .ck_form input[type="email"]:focus { outline: none; border-color: #aaa; } .ck_checkbox { padding: 10px 0px 10px 20px; display: block; clear: both; } .ck_checkbox input.optIn { margin-left: -20px; margin-top: 0; } .ck_form .ck_opt_in_prompt { margin-left: 4px; } .ck_form .ck_opt_in_prompt p { display: inline; } .ck_form .ck_subscribe_button { width: 100%; color: #fff; margin: 0px 0px 0px; padding: 8px 8px; font-size: 18px; background: #d74128; -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ cursor: pointer; border: none; text-shadow: none; } .ck_form .ck_guarantee { color: #626262; font-size: 12px; text-align: center; padding: 5px 0px; display: block; } .ck_form .ck_powered_by { display: block; color: #aaa; } .ck_form .ck_powered_by:hover { display: block; color: #444; } .ck_converted_content { display: none; padding: 5%; background: #fff; } /* v6 */ .ck_form_v6 #ck_success_msg { padding: 0px 10px; } @media all and (max-width: 403px) { .ck_form_v6.ck_modal .ck_close_link { top: 30px; } } @media all and (min-width: 404px) and (max-width: 499px) { .ck_form_v6.ck_modal .ck_close_link { top: 57px; } }
Does your music get bodies movin', and the party started? If not, don't worry, you just need to add some bounce. So in this video, you'll learn a super easy yet super effective hack to bring da bounce to your music. But first… tea! Hello revolutionaries, I'm Kate Harmony, this is Ray Harmony, and welcome to Hack Music Theory. This channel helps you make great music that stands out, so you can get discovered! If that sounds useful to you, then subscribe and hit that bell to get notified every Saturday, when we publish our new video. Alright, it's time to open your DAW to hack music theory. THEORYIn their new single “wonderful life” (from upcoming album "Amo") that just dropped this week, Bring Me The Horizon deliver a masterclass in how to make your music (and therefore your audience) bounce! They even manage to get “bounce” in their lyrics, with the line: “everybody knows I got bounce”. But first... what is “bounce”, and how's it gonna get the party started? Quite simply, when a song has bounce, it makes you wanna bounce. In other words, it makes you wanna jump up and down. How? Well, there are numerous ways, but in this song, Bring Me The Horizon lock in their riff and kick drum, which both play dotted 1/8 notes that bounce over the 1/4 note pulse. Step 1 - Bounce NotesSet up four bars of 4/4, with your grid set to 1/16 notes, and your tempo set to 86.5 BPM. The main riff in “wonderful life” is based around a low F and the F an octave higher, so we'll do something kinda similar. Start by playing three dotted 1/8 notes on that low F. A dotted 1/8 note is equal to three 1/16 notes. Also, if you want, you can extend that last note by a 1/16 (like it is in the original). Right, now these three notes are your bounce notes, so copy and paste them into the other bars, so every bar bounces! Next, it's time to bring in some higher notes to add depth to your riff, so add a few 1/16 notes at the end of each bar. We chose the ♭2, 7, 4, and ♭5 as the basis for ours. And if you want, you can add a little variation to these high notes in your third bar, and maybe even extend that 1/16 note run over the bar line and into your fourth bar, like we did. Lastly, if you're playing this on a real guitar, throw in a little bend on the bounce notes. And by the way, if you need help with the basics - like scales, chords, and spelling (which is when you use numbers for notes, like we just did) - then download our free book below. Step 2 - Surprise PartyThis step is so cool! Let me explain. Bring Me The Horizon know that this bounce will get boring if they keep repeating it, so they throw in one totally unexpected bounce, which is like a surprise party! So, in your second bar, move all (or some, we like did) of those higher notes to the left, by one 1/16 note. Then, extend the first note in your third bar to the left, by one 1/16 note. This creates the most exhilarating surprise bounce on beat 4a, which nobody will be expecting, so it keeps your party super fresh! NEXTRight, now that you've got one section down, how do you write a new section for it, and then, how do you transition between those two sections? Great questions, and if this is something you need help with, then check out our cutting-edge online apprenticeship course, where you'll literally learn every step of the music making process, and most importantly, you'll learn how to finish your songs! You'll also gain access to our Private Network, which is a safe social media platform exclusively for our apprentices (and we already have over 400 apprentices, from over 40 countries). Our Network is a super supportive place for you to ask theory questions, share your music, get feedback, meet like-minded music makers, collaborate, and more! So if all that sounds useful to you, then head on over to our Online Apprenticeship page now. Kate & Ray Harmony (AKA Revolution Harmony)Music Teachers & Producers in Vancouver BC, Canada LEARNLevel 1: Read our free book (below) & watch our YouTube videosLevel 2: Read our "Part 1" book & "Songwriting & Producing" PDFLevel 3: Learn our secret art of songwhispering & finish your music! ABOUTHack Music Theory is the pioneering notation-free method for making great music that stands out, so you can get discovered! Taught by award-winning music lecturer Ray Harmony, and his protégé (and wife) Kate Harmony, from their studio in Vancouver BC, Canada. Ray is the author of critically-acclaimed book series "Hack Music Theory", and has made music with Serj Tankian (System of a Down), Tom Morello (Rage Against the Machine), Steven Wilson (Porcupine Tree), Devin Townsend (Strapping Young Lad), Ihsahn (Emperor), Kool Keith (Ultramagnetic MCs), Madchild (Swollen Members), and many more! Kate has the highest grade distinction in Popular Music Theory from the London College of Music, and is the only person on the planet who's been trained by Ray to teach his method. On that note, the "Hack Music Theory" YouTube channel teaches relevant and instantly-usable music theory for producers, DAW users, and all other music makers (songwriters, singers, guitarists, bassists, drummers, etc.) in all genres, from EDM to R&B, pop to hip-hop, reggae to rock, electronic to metal (and yes, we djefinitely djent!).(c) 2018 Revolution HarmonyAll words and music in video by Revolution HarmonyRevolution Harmony is Ray Harmony & Kate Harmony Photo of Oli Sykes (Bring Me The Horizon) courtesy of Emma Viola Lilja Wooohooo!!! You're a mere 30 minutes away from being even smarter than you already are. Just head on over to your inbox now for your free download. There was an error submitting your subscription. Please try again. “The most brilliant, fast, easy & fun music theory book I've ever seen!” DEREK SIVERS, CD Baby founder We use this field to detect spam bots. If you fill this in, you will be marked as a spammer. DOWNLOAD FREE BOOK /* Layout */ .ck_form { /* divider image */ background: #EAE9EA url(data:image/gif;base64,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) repeat-y center top; font-family: 'Montserrat'; line-height: 1.5em; overflow: hidden; color: #000000; font-size: 16px; border-top: none; border-top-color: #666666; border-bottom: none; border-bottom-color: #3d3d3d; -webkit-box-shadow: none; -moz-box-shadow: none; box-shadow: none; clear: both; margin: 0px 0px; } .ck_form, .ck_form * { -webkit-box-sizing: border-box; -moz-box-sizing: border-box; box-sizing: border-box; } #ck_subscribe_form { clear: both; } /* Element Queries — uses JS */ .ck_form_content, .ck_form_fields { width: 50%; float: left; padding: 5%; } .ck_form.ck_horizontal { } .ck_form_content { border-bottom: none; } .ck_form.ck_vertical { background: #fff; } .ck_vertical .ck_form_content, .ck_vertical .ck_form_fields { padding: 10%; width: 100%; float: none; } .ck_vertical .ck_form_content { border-bottom: 1px dotted #aaa; overflow: hidden; } /* Trigger the vertical layout with media queries as well */ @media all and (max-width: 499px) { .ck_form { background: #fff; } .ck_form_content, .ck_form_fields { padding: 10%; width: 100%; float: none; } .ck_form_content { border-bottom: 1px dotted #aaa; } } /* Content */ .ck_form_content h3 { margin: 0px 0px 0px; font-size: 0px; padding: 0px; } .ck_form_content p { font-size: 14px; } .ck_image { float: left; margin-right: 5px; } /* Form fields */ .ck_errorArea { display: none; } #ck_success_msg { padding: 10px 10px 0px; border: solid 1px #ddd; background: #eee; } .ck_label { font-size: 14px; font-weight: bold; } .ck_form input[type="text"] { font-size: 16px; text-align: center; margin-top: 20px; margin-bottom: 0px; padding: 8px 8px; width: 100%; border: 1px solid #d6d6d6; /* stroke */ -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ background-color: #fff; /* layer fill content */ height: auto; } .ck_form input[type="email"] { font-size: 16px; text-align: center; margin-top: 0px; margin-bottom: 15px; padding: 8px 8px; width: 100%; border: 1px solid #d6d6d6; /* stroke */ -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ background-color: #fff; /* layer fill content */ height: auto; } .ck_form input[type="text"]:focus, .ck_form input[type="email"]:focus { outline: none; border-color: #aaa; } .ck_checkbox { padding: 10px 0px 10px 20px; display: block; clear: both; } .ck_checkbox input.optIn { margin-left: -20px; margin-top: 0; } .ck_form .ck_opt_in_prompt { margin-left: 4px; } .ck_form .ck_opt_in_prompt p { display: inline; } .ck_form .ck_subscribe_button { width: 100%; color: #fff; margin: 0px 0px 0px; padding: 8px 8px; font-size: 18px; background: #d74128; -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ cursor: pointer; border: none; text-shadow: none; } .ck_form .ck_guarantee { color: #626262; font-size: 12px; text-align: center; padding: 5px 0px; display: block; } .ck_form .ck_powered_by { display: block; color: #aaa; } .ck_form .ck_powered_by:hover { display: block; color: #444; } .ck_converted_content { display: none; padding: 5%; background: #fff; } /* v6 */ .ck_form_v6 #ck_success_msg { padding: 0px 10px; } @media all and (max-width: 403px) { .ck_form_v6.ck_modal .ck_close_link { top: 30px; } } @media all and (min-width: 404px) and (max-width: 499px) { .ck_form_v6.ck_modal .ck_close_link { top: 57px; } }
Bass lines need to be low, cos that’s the whole point of them, but this restriction can very easily result in boring bass lines. So how can you break out of that limiting range, while still keeping your bass low? The answer comin’ up. But first… tea! Hello music makers, we are Kate and Ray Harmony, and welcome to Hack Music Theory. This channel helps you make great music that stands out, so you can get discovered! The music theory hack in today’s video is from the new single “One By One”, by the artist, Rationale. Quick but crazy story for you: When we were swiping through the New Music Friday playlist on Spotify this morning, to decide what song to hack for this video, we swiped and the Rationale single came on, and I was like “Wait! What the…?!”, that’s my old student from London haha, so I’m totally buzzing right now! #ProudTeacher. And you won’t believe it, but the exact same thing happened last week with another one of Ray’s former students. They all seem to keep turning up on the New Music Friday playlist, how amazing is that?! Anyway, it’s time to open your DAW to hack music theory. THEORYA bass line is the foundation upon which all other melodies and chords are built. Therefore, a bass line has the dual purpose of functioning as your song’s musical ground, as well as its lowest melody. However, so many bass lines these days only fulfill the former purpose, resulting in a solid foundation, but with no melodic interest. To achieve both of these roles simultaneously, use the theory hack from “One By One”, where Rationale grounds his bass line into the root note of each chord, before launching it into the melodic air for a few high notes. This creates an awesome 2-in-1 bass line that carries out both its foundation and melodic duties. And please note, for the sake of this lesson, our example is very similar to the original song. Instead of copying the song though, have fun exploring how you can use this theory hack creatively with your own musical personality, so it sounds like you! Step 1 - GroundSet up two bars of 4/4, with your grid set to 1/16 notes, and your tempo set to 94 BPM. Next, you need to choose four chords from a minor key. The original song is in E minor, so we’ll stick with that. The chords we chose are: Em, Gmaj, Dmaj, Am. Now, each chord is played over two 1/4 note beats. The first beat will be used to ground into the root note, and the second beat will be used to fly away, but more on that in Step 2. Next, delete the second 1/4 note beat of each chord. Then, over that first 1/4 note beat of each chord, play the root note a couple times, with a rest in between. And be sure to play one root note of each chord on an off-beat 1/16 note, which is called syncopation, and that adds groove! Step 2 - AirRight, now that you’ve grounded your bass line, it’s time to launch it into the melodic air. So, over the second 1/4 note beat of each chord, you’re gonna allow your bass line to break free of its low-notes-only restriction, and elevate its range and melodic interest with some high notes. So, choose three ascending/descending notes from your scale, and play them in a higher octave over your first chord. Then do something similar over your third chord. And these are all 1/16 notes. Also, be sure to start on the off-beat, for even more syncopation. Then over your second chord, you’re actually not gonna go higher,cos that’ll be too much of a good thing. So, just add in a couple low notes there. And then finally, over your last chord, use the same three notes that you used over your third chord, but reverse their order. NEXTRight, now that you’ve got one section down, how do you write a new section for it, and then, how do you transition between those two sections? Great questions, and if this is something you need help with, then check out our cutting-edge online apprenticeship course, where you’ll literally learn every step of the music making process, and most importantly, you’ll learn how to finish your songs! You’ll also gain access to our Private Network, which is a safe social media platform exclusively for our apprentices (and we already have over 400 apprentices, from over 40 countries). Our Network is a super supportive place for you to ask theory questions, share your music, get feedback, meet like-minded music makers, and more! So if all that sounds useful to you, then head on over to our Apprenticeship page now. Kate & Ray Harmony (AKA Revolution Harmony)Music Teachers & Producers in Vancouver BC, Canada LEARN1: Read our free book (below) & watch our YouTube videos2: Read our "Part 1" book & "Songwriting & Producing" PDF3: Learn our Secret Art of Song-Whispering & finish your music! ABOUTLearn how to make great music that stands out, so you can get discovered! Taught by award-winning music lecturer Ray Harmony, and his protégé (and wife) Kate Harmony. Ray is the author of critically-acclaimed book series "Hack Music Theory" and has been teaching music theory for 24 years, and along the way he's made music with Serj Tankian (System Of A Down), Tom Morello (Rage Against The Machine), Steven Wilson (Porcupine Tree), Devin Townsend (Strapping Young Lad), Ihsahn (Emperor), Kool Keith (Ultramagnetic MCs), Madchild (Swollen Members) and many more! Kate has the highest grade distinction in Popular Music Theory from the London College of Music, and is the only person on the planet who's been trained by Ray to teach his Hack Music Theory method! While our YouTube lessons teach music theory for producers and DAW users, they are designed to accommodate all music makers (songwriters, guitarists, etc.) and all genres, from Electronic Music to R&B, Pop to Hip-Hop, Reggae to Rock, EDM/Dance to Metal (and yes, we djefinitely Djent!). Photo of Rationale from the cover of "One by One"Courtesy of Best Laid Plans Records Wooohooo!!! You’re a mere 30 minutes away from being even smarter than you already are. Just head on over to your inbox now for your free download. There was an error submitting your subscription. Please try again. “The most brilliant, fast, easy & fun music theory book I’ve ever seen!” DEREK SIVERS, CD Baby founder We use this field to detect spam bots. If you fill this in, you will be marked as a spammer. DOWNLOAD FREE BOOK /* Layout */ .ck_form { /* divider image */ background: #EAE9EA url(data:image/gif;base64,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) repeat-y center top; font-family: 'Montserrat'; line-height: 1.5em; overflow: hidden; color: #000000; font-size: 16px; border-top: none; border-top-color: #666666; border-bottom: none; border-bottom-color: #3d3d3d; -webkit-box-shadow: none; -moz-box-shadow: none; box-shadow: none; clear: both; margin: 0px 0px; } .ck_form, .ck_form * { -webkit-box-sizing: border-box; -moz-box-sizing: border-box; box-sizing: border-box; } #ck_subscribe_form { clear: both; } /* Element Queries — uses JS */ .ck_form_content, .ck_form_fields { width: 50%; float: left; padding: 5%; } .ck_form.ck_horizontal { } .ck_form_content { border-bottom: none; } .ck_form.ck_vertical { background: #fff; } .ck_vertical .ck_form_content, .ck_vertical .ck_form_fields { padding: 10%; width: 100%; float: none; } .ck_vertical .ck_form_content { border-bottom: 1px dotted #aaa; overflow: hidden; } /* Trigger the vertical layout with media queries as well */ @media all and (max-width: 499px) { .ck_form { background: #fff; } .ck_form_content, .ck_form_fields { padding: 10%; width: 100%; float: none; } .ck_form_content { border-bottom: 1px dotted #aaa; } } /* Content */ .ck_form_content h3 { margin: 0px 0px 0px; font-size: 0px; padding: 0px; } .ck_form_content p { font-size: 14px; } .ck_image { float: left; margin-right: 5px; } /* Form fields */ .ck_errorArea { display: none; } #ck_success_msg { padding: 10px 10px 0px; border: solid 1px #ddd; background: #eee; } .ck_label { font-size: 14px; font-weight: bold; } .ck_form input[type="text"] { font-size: 16px; text-align: center; margin-top: 20px; margin-bottom: 0px; padding: 8px 8px; width: 100%; border: 1px solid #d6d6d6; /* stroke */ -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ background-color: #fff; /* layer fill content */ height: auto; } .ck_form input[type="email"] { font-size: 16px; text-align: center; margin-top: 0px; margin-bottom: 15px; padding: 8px 8px; width: 100%; border: 1px solid #d6d6d6; /* stroke */ -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ background-color: #fff; /* layer fill content */ height: auto; } .ck_form input[type="text"]:focus, .ck_form input[type="email"]:focus { outline: none; border-color: #aaa; } .ck_checkbox { padding: 10px 0px 10px 20px; display: block; clear: both; } .ck_checkbox input.optIn { margin-left: -20px; margin-top: 0; } .ck_form .ck_opt_in_prompt { margin-left: 4px; } .ck_form .ck_opt_in_prompt p { display: inline; } .ck_form .ck_subscribe_button { width: 100%; color: #fff; margin: 0px 0px 0px; padding: 8px 8px; font-size: 18px; background: #d74128; -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ cursor: pointer; border: none; text-shadow: none; } .ck_form .ck_guarantee { color: #626262; font-size: 12px; text-align: center; padding: 5px 0px; display: block; } .ck_form .ck_powered_by { display: block; color: #aaa; } .ck_form .ck_powered_by:hover { display: block; color: #444; } .ck_converted_content { display: none; padding: 5%; background: #fff; } /* v6 */ .ck_form_v6 #ck_success_msg { padding: 0px 10px; } @media all and (max-width: 403px) { .ck_form_v6.ck_modal .ck_close_link { top: 30px; } } @media all and (min-width: 404px) and (max-width: 499px) { .ck_form_v6.ck_modal .ck_close_link { top: 57px; } }
Bass lines need to be low, cos that’s the whole point of them, but this restriction can very easily result in boring bass lines. So how can you break out of that limiting range, while still keeping your bass low? The answer comin’ up. But first… tea! Hello music makers, we are Kate and Ray Harmony, and welcome to Hack Music Theory. This channel helps you make great music that stands out, so you can get discovered! The music theory hack in today’s video is from the new single “One By One”, by the artist, Rationale. Quick but crazy story for you: When we were swiping through the New Music Friday playlist on Spotify this morning, to decide what song to hack for this video, we swiped and the Rationale single came on, and I was like “Wait! What the…?!”, that’s my old student from London haha, so I’m totally buzzing right now! #ProudTeacher. And you won’t believe it, but the exact same thing happened last week with another one of Ray’s former students. They all seem to keep turning up on the New Music Friday playlist, how amazing is that?! Anyway, it’s time to open your DAW to hack music theory. THEORYA bass line is the foundation upon which all other melodies and chords are built. Therefore, a bass line has the dual purpose of functioning as your song’s musical ground, as well as its lowest melody. However, so many bass lines these days only fulfill the former purpose, resulting in a solid foundation, but with no melodic interest. To achieve both of these roles simultaneously, use the theory hack from “One By One”, where Rationale grounds his bass line into the root note of each chord, before launching it into the melodic air for a few high notes. This creates an awesome 2-in-1 bass line that carries out both its foundation and melodic duties. And please note, for the sake of this lesson, our example is very similar to the original song. Instead of copying the song though, have fun exploring how you can use this theory hack creatively with your own musical personality, so it sounds like you! Step 1 - GroundSet up two bars of 4/4, with your grid set to 1/16 notes, and your tempo set to 94 BPM. Next, you need to choose four chords from a minor key. The original song is in E minor, so we’ll stick with that. The chords we chose are: Em, Gmaj, Dmaj, Am. Now, each chord is played over two 1/4 note beats. The first beat will be used to ground into the root note, and the second beat will be used to fly away, but more on that in Step 2. Next, delete the second 1/4 note beat of each chord. Then, over that first 1/4 note beat of each chord, play the root note a couple times, with a rest in between. And be sure to play one root note of each chord on an off-beat 1/16 note, which is called syncopation, and that adds groove! Step 2 - AirRight, now that you’ve grounded your bass line, it’s time to launch it into the melodic air. So, over the second 1/4 note beat of each chord, you’re gonna allow your bass line to break free of its low-notes-only restriction, and elevate its range and melodic interest with some high notes. So, choose three ascending/descending notes from your scale, and play them in a higher octave over your first chord. Then do something similar over your third chord. And these are all 1/16 notes. Also, be sure to start on the off-beat, for even more syncopation. Then over your second chord, you’re actually not gonna go higher,cos that’ll be too much of a good thing. So, just add in a couple low notes there. And then finally, over your last chord, use the same three notes that you used over your third chord, but reverse their order. NEXTRight, now that you’ve got one section down, how do you write a new section for it, and then, how do you transition between those two sections? Great questions, and if this is something you need help with, then check out our cutting-edge online apprenticeship course, where you’ll literally learn every step of the music making process, and most importantly, you’ll learn how to finish your songs! You’ll also gain access to our Private Network, which is a safe social media platform exclusively for our apprentices (and we already have over 400 apprentices, from over 40 countries). Our Network is a super supportive place for you to ask theory questions, share your music, get feedback, meet like-minded music makers, and more! So if all that sounds useful to you, then head on over to our Apprenticeship page now. Kate & Ray Harmony (AKA Revolution Harmony)Music Teachers & Producers in Vancouver BC, Canada LEARN1: Read our free book (below) & watch our YouTube videos2: Read our "Part 1" book & "Songwriting & Producing" PDF3: Learn our Secret Art of Song-Whispering & finish your music! ABOUTLearn how to make great music that stands out, so you can get discovered! Taught by award-winning music lecturer Ray Harmony, and his protégé (and wife) Kate Harmony. Ray is the author of critically-acclaimed book series "Hack Music Theory" and has been teaching music theory for 24 years, and along the way he's made music with Serj Tankian (System Of A Down), Tom Morello (Rage Against The Machine), Steven Wilson (Porcupine Tree), Devin Townsend (Strapping Young Lad), Ihsahn (Emperor), Kool Keith (Ultramagnetic MCs), Madchild (Swollen Members) and many more! Kate has the highest grade distinction in Popular Music Theory from the London College of Music, and is the only person on the planet who's been trained by Ray to teach his Hack Music Theory method! While our YouTube lessons teach music theory for producers and DAW users, they are designed to accommodate all music makers (songwriters, guitarists, etc.) and all genres, from Electronic Music to R&B, Pop to Hip-Hop, Reggae to Rock, EDM/Dance to Metal (and yes, we djefinitely Djent!). Photo of Rationale from the cover of "One by One"Courtesy of Best Laid Plans Records Wooohooo!!! You’re a mere 30 minutes away from being even smarter than you already are. Just head on over to your inbox now for your free download. There was an error submitting your subscription. Please try again. “The most brilliant, fast, easy & fun music theory book I’ve ever seen!” DEREK SIVERS, CD Baby founder We use this field to detect spam bots. If you fill this in, you will be marked as a spammer. DOWNLOAD FREE BOOK /* Layout */ .ck_form { /* divider image */ background: #EAE9EA url(data:image/gif;base64,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) repeat-y center top; font-family: 'Montserrat'; line-height: 1.5em; overflow: hidden; color: #000000; font-size: 16px; border-top: none; border-top-color: #666666; border-bottom: none; border-bottom-color: #3d3d3d; -webkit-box-shadow: none; -moz-box-shadow: none; box-shadow: none; clear: both; margin: 0px 0px; } .ck_form, .ck_form * { -webkit-box-sizing: border-box; -moz-box-sizing: border-box; box-sizing: border-box; } #ck_subscribe_form { clear: both; } /* Element Queries — uses JS */ .ck_form_content, .ck_form_fields { width: 50%; float: left; padding: 5%; } .ck_form.ck_horizontal { } .ck_form_content { border-bottom: none; } .ck_form.ck_vertical { background: #fff; } .ck_vertical .ck_form_content, .ck_vertical .ck_form_fields { padding: 10%; width: 100%; float: none; } .ck_vertical .ck_form_content { border-bottom: 1px dotted #aaa; overflow: hidden; } /* Trigger the vertical layout with media queries as well */ @media all and (max-width: 499px) { .ck_form { background: #fff; } .ck_form_content, .ck_form_fields { padding: 10%; width: 100%; float: none; } .ck_form_content { border-bottom: 1px dotted #aaa; } } /* Content */ .ck_form_content h3 { margin: 0px 0px 0px; font-size: 0px; padding: 0px; } .ck_form_content p { font-size: 14px; } .ck_image { float: left; margin-right: 5px; } /* Form fields */ .ck_errorArea { display: none; } #ck_success_msg { padding: 10px 10px 0px; border: solid 1px #ddd; background: #eee; } .ck_label { font-size: 14px; font-weight: bold; } .ck_form input[type="text"] { font-size: 16px; text-align: center; margin-top: 20px; margin-bottom: 0px; padding: 8px 8px; width: 100%; border: 1px solid #d6d6d6; /* stroke */ -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ background-color: #fff; /* layer fill content */ height: auto; } .ck_form input[type="email"] { font-size: 16px; text-align: center; margin-top: 0px; margin-bottom: 15px; padding: 8px 8px; width: 100%; border: 1px solid #d6d6d6; /* stroke */ -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ background-color: #fff; /* layer fill content */ height: auto; } .ck_form input[type="text"]:focus, .ck_form input[type="email"]:focus { outline: none; border-color: #aaa; } .ck_checkbox { padding: 10px 0px 10px 20px; display: block; clear: both; } .ck_checkbox input.optIn { margin-left: -20px; margin-top: 0; } .ck_form .ck_opt_in_prompt { margin-left: 4px; } .ck_form .ck_opt_in_prompt p { display: inline; } .ck_form .ck_subscribe_button { width: 100%; color: #fff; margin: 0px 0px 0px; padding: 8px 8px; font-size: 18px; background: #d74128; -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ cursor: pointer; border: none; text-shadow: none; } .ck_form .ck_guarantee { color: #626262; font-size: 12px; text-align: center; padding: 5px 0px; display: block; } .ck_form .ck_powered_by { display: block; color: #aaa; } .ck_form .ck_powered_by:hover { display: block; color: #444; } .ck_converted_content { display: none; padding: 5%; background: #fff; } /* v6 */ .ck_form_v6 #ck_success_msg { padding: 0px 10px; } @media all and (max-width: 403px) { .ck_form_v6.ck_modal .ck_close_link { top: 30px; } } @media all and (min-width: 404px) and (max-width: 499px) { .ck_form_v6.ck_modal .ck_close_link { top: 57px; } }
Bass lines need to be low, cos that's the whole point of them, but this restriction can very easily result in boring bass lines. So how can you break out of that limiting range, while still keeping your bass low? The answer comin' up. But first… tea! Hello music makers, we are Kate and Ray Harmony, and welcome to Hack Music Theory. This channel helps you make great music that stands out, so you can get discovered! The music theory hack in today's video is from the new single “One By One”, by the artist, Rationale. Quick but crazy story for you: When we were swiping through the New Music Friday playlist on Spotify this morning, to decide what song to hack for this video, we swiped and the Rationale single came on, and I was like “Wait! What the…?!”, that's my old student from London haha, so I'm totally buzzing right now! #ProudTeacher. And you won't believe it, but the exact same thing happened last week with another one of Ray's former students. They all seem to keep turning up on the New Music Friday playlist, how amazing is that?! Anyway, it's time to open your DAW to hack music theory. THEORYA bass line is the foundation upon which all other melodies and chords are built. Therefore, a bass line has the dual purpose of functioning as your song's musical ground, as well as its lowest melody. However, so many bass lines these days only fulfill the former purpose, resulting in a solid foundation, but with no melodic interest. To achieve both of these roles simultaneously, use the theory hack from “One By One”, where Rationale grounds his bass line into the root note of each chord, before launching it into the melodic air for a few high notes. This creates an awesome 2-in-1 bass line that carries out both its foundation and melodic duties. And please note, for the sake of this lesson, our example is very similar to the original song. Instead of copying the song though, have fun exploring how you can use this theory hack creatively with your own musical personality, so it sounds like you! Step 1 - GroundSet up two bars of 4/4, with your grid set to 1/16 notes, and your tempo set to 94 BPM. Next, you need to choose four chords from a minor key. The original song is in E minor, so we'll stick with that. The chords we chose are: Em, Gmaj, Dmaj, Am. Now, each chord is played over two 1/4 note beats. The first beat will be used to ground into the root note, and the second beat will be used to fly away, but more on that in Step 2. Next, delete the second 1/4 note beat of each chord. Then, over that first 1/4 note beat of each chord, play the root note a couple times, with a rest in between. And be sure to play one root note of each chord on an off-beat 1/16 note, which is called syncopation, and that adds groove! Step 2 - AirRight, now that you've grounded your bass line, it's time to launch it into the melodic air. So, over the second 1/4 note beat of each chord, you're gonna allow your bass line to break free of its low-notes-only restriction, and elevate its range and melodic interest with some high notes. So, choose three ascending/descending notes from your scale, and play them in a higher octave over your first chord. Then do something similar over your third chord. And these are all 1/16 notes. Also, be sure to start on the off-beat, for even more syncopation. Then over your second chord, you're actually not gonna go higher,cos that'll be too much of a good thing. So, just add in a couple low notes there. And then finally, over your last chord, use the same three notes that you used over your third chord, but reverse their order. NEXTRight, now that you've got one section down, how do you write a new section for it, and then, how do you transition between those two sections? Great questions, and if this is something you need help with, then check out our cutting-edge online apprenticeship course, where you'll literally learn every step of the music making process, and most importantly, you'll learn how to finish your songs! You'll also gain access to our Private Network, which is a safe social media platform exclusively for our apprentices (and we already have over 400 apprentices, from over 40 countries). Our Network is a super supportive place for you to ask theory questions, share your music, get feedback, meet like-minded music makers, and more! So if all that sounds useful to you, then head on over to our Apprenticeship page now. Kate & Ray Harmony (AKA Revolution Harmony)Music Teachers & Producers in Vancouver BC, Canada LEARN1: Read our free book (below) & watch our YouTube videos2: Read our "Part 1" book & "Songwriting & Producing" PDF3: Learn our Secret Art of Song-Whispering & finish your music! ABOUTLearn how to make great music that stands out, so you can get discovered! Taught by award-winning music lecturer Ray Harmony, and his protégé (and wife) Kate Harmony. Ray is the author of critically-acclaimed book series "Hack Music Theory" and has been teaching music theory for 24 years, and along the way he's made music with Serj Tankian (System Of A Down), Tom Morello (Rage Against The Machine), Steven Wilson (Porcupine Tree), Devin Townsend (Strapping Young Lad), Ihsahn (Emperor), Kool Keith (Ultramagnetic MCs), Madchild (Swollen Members) and many more! Kate has the highest grade distinction in Popular Music Theory from the London College of Music, and is the only person on the planet who's been trained by Ray to teach his Hack Music Theory method! While our YouTube lessons teach music theory for producers and DAW users, they are designed to accommodate all music makers (songwriters, guitarists, etc.) and all genres, from Electronic Music to R&B, Pop to Hip-Hop, Reggae to Rock, EDM/Dance to Metal (and yes, we djefinitely Djent!). Photo of Rationale from the cover of "One by One"Courtesy of Best Laid Plans Records Wooohooo!!! You're a mere 30 minutes away from being even smarter than you already are. Just head on over to your inbox now for your free download. There was an error submitting your subscription. Please try again. “The most brilliant, fast, easy & fun music theory book I've ever seen!” DEREK SIVERS, CD Baby founder We use this field to detect spam bots. If you fill this in, you will be marked as a spammer. DOWNLOAD FREE BOOK /* Layout */ .ck_form { /* divider image */ background: #EAE9EA url(data:image/gif;base64,R0lGODlhAQADAIABAMzMzP///yH/C1hNUCBEYXRhWE1QPD94cGFja2V0IGJlZ2luPSLvu78iIGlkPSJXNU0wTXBDZWhpSHpyZVN6TlRjemtjOWQiPz4gPHg6eG1wbWV0YSB4bWxuczp4PSJhZG9iZTpuczptZXRhLyIgeDp4bXB0az0iQWRvYmUgWE1QIENvcmUgNS41LWMwMTQgNzkuMTUxNDgxLCAyMDEzLzAzLzEzLTEyOjA5OjE1ICAgICAgICAiPiA8cmRmOlJERiB4bWxuczpyZGY9Imh0dHA6Ly93d3cudzMub3JnLzE5OTkvMDIvMjItcmRmLXN5bnRheC1ucyMiPiA8cmRmOkRlc2NyaXB0aW9uIHJkZjphYm91dD0iIiB4bWxuczp4bXA9Imh0dHA6Ly9ucy5hZG9iZS5jb20veGFwLzEuMC8iIHhtbG5zOnhtcE1NPSJodHRwOi8vbnMuYWRvYmUuY29tL3hhcC8xLjAvbW0vIiB4bWxuczpzdFJlZj0iaHR0cDovL25zLmFkb2JlLmNvbS94YXAvMS4wL3NUeXBlL1Jlc291cmNlUmVmIyIgeG1wOkNyZWF0b3JUb29sPSJBZG9iZSBQaG90b3Nob3AgQ0MgKE1hY2ludG9zaCkiIHhtcE1NOkluc3RhbmNlSUQ9InhtcC5paWQ6MUQ5NjM5RjgxQUVEMTFFNEJBQTdGNTQwMjc5MTZDOTciIHhtcE1NOkRvY3VtZW50SUQ9InhtcC5kaWQ6MUQ5NjM5RjkxQUVEMTFFNEJBQTdGNTQwMjc5MTZDOTciPiA8eG1wTU06RGVyaXZlZEZyb20gc3RSZWY6aW5zdGFuY2VJRD0ieG1wLmlpZDoxRDk2MzlGNjFBRUQxMUU0QkFBN0Y1NDAyNzkxNkM5NyIgc3RSZWY6ZG9jdW1lbnRJRD0ieG1wLmRpZDoxRDk2MzlGNzFBRUQxMUU0QkFBN0Y1NDAyNzkxNkM5NyIvPiA8L3JkZjpEZXNjcmlwdGlvbj4gPC9yZGY6UkRGPiA8L3g6eG1wbWV0YT4gPD94cGFja2V0IGVuZD0iciI/PgH//v38+/r5+Pf29fTz8vHw7+7t7Ovq6ejn5uXk4+Lh4N/e3dzb2tnY19bV1NPS0dDPzs3My8rJyMfGxcTDwsHAv769vLu6ubi3trW0s7KxsK+urayrqqmop6alpKOioaCfnp2cm5qZmJeWlZSTkpGQj46NjIuKiYiHhoWEg4KBgH9+fXx7enl4d3Z1dHNycXBvbm1sa2ppaGdmZWRjYmFgX15dXFtaWVhXVlVUU1JRUE9OTUxLSklIR0ZFRENCQUA/Pj08Ozo5ODc2NTQzMjEwLy4tLCsqKSgnJiUkIyIhIB8eHRwbGhkYFxYVFBMSERAPDg0MCwoJCAcGBQQDAgEAACH5BAEAAAEALAAAAAABAAMAAAICRFIAOw==) repeat-y center top; font-family: 'Montserrat'; line-height: 1.5em; overflow: hidden; color: #000000; font-size: 16px; border-top: none; border-top-color: #666666; border-bottom: none; border-bottom-color: #3d3d3d; -webkit-box-shadow: none; -moz-box-shadow: none; box-shadow: none; clear: both; margin: 0px 0px; } .ck_form, .ck_form * { -webkit-box-sizing: border-box; -moz-box-sizing: border-box; box-sizing: border-box; } #ck_subscribe_form { clear: both; } /* Element Queries — uses JS */ .ck_form_content, .ck_form_fields { width: 50%; float: left; padding: 5%; } .ck_form.ck_horizontal { } .ck_form_content { border-bottom: none; } .ck_form.ck_vertical { background: #fff; } .ck_vertical .ck_form_content, .ck_vertical .ck_form_fields { padding: 10%; width: 100%; float: none; } .ck_vertical .ck_form_content { border-bottom: 1px dotted #aaa; overflow: hidden; } /* Trigger the vertical layout with media queries as well */ @media all and (max-width: 499px) { .ck_form { background: #fff; } .ck_form_content, .ck_form_fields { padding: 10%; width: 100%; float: none; } .ck_form_content { border-bottom: 1px dotted #aaa; } } /* Content */ .ck_form_content h3 { margin: 0px 0px 0px; font-size: 0px; padding: 0px; } .ck_form_content p { font-size: 14px; } .ck_image { float: left; margin-right: 5px; } /* Form fields */ .ck_errorArea { display: none; } #ck_success_msg { padding: 10px 10px 0px; border: solid 1px #ddd; background: #eee; } .ck_label { font-size: 14px; font-weight: bold; } .ck_form input[type="text"] { font-size: 16px; text-align: center; margin-top: 20px; margin-bottom: 0px; padding: 8px 8px; width: 100%; border: 1px solid #d6d6d6; /* stroke */ -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ background-color: #fff; /* layer fill content */ height: auto; } .ck_form input[type="email"] { font-size: 16px; text-align: center; margin-top: 0px; margin-bottom: 15px; padding: 8px 8px; width: 100%; border: 1px solid #d6d6d6; /* stroke */ -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ background-color: #fff; /* layer fill content */ height: auto; } .ck_form input[type="text"]:focus, .ck_form input[type="email"]:focus { outline: none; border-color: #aaa; } .ck_checkbox { padding: 10px 0px 10px 20px; display: block; clear: both; } .ck_checkbox input.optIn { margin-left: -20px; margin-top: 0; } .ck_form .ck_opt_in_prompt { margin-left: 4px; } .ck_form .ck_opt_in_prompt p { display: inline; } .ck_form .ck_subscribe_button { width: 100%; color: #fff; margin: 0px 0px 0px; padding: 8px 8px; font-size: 18px; background: #d74128; -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 30px; /* border radius */ cursor: pointer; border: none; text-shadow: none; } .ck_form .ck_guarantee { color: #626262; font-size: 12px; text-align: center; padding: 5px 0px; display: block; } .ck_form .ck_powered_by { display: block; color: #aaa; } .ck_form .ck_powered_by:hover { display: block; color: #444; } .ck_converted_content { display: none; padding: 5%; background: #fff; } /* v6 */ .ck_form_v6 #ck_success_msg { padding: 0px 10px; } @media all and (max-width: 403px) { .ck_form_v6.ck_modal .ck_close_link { top: 30px; } } @media all and (min-width: 404px) and (max-width: 499px) { .ck_form_v6.ck_modal .ck_close_link { top: 57px; } }
Mode briefed Ethan Banks about their cloud private network. Whoa! Thought Mode was an SD-WAN company? Not quite. Mode partners with several SD-WAN platforms so that it's easy to stand up a tunnel from your SD-WAN forwarders to Mode's private network. That makes Mode a network alternative to private MPLS that integrates with your SD-WAN fabric. The post BiB 053: Mode.net’s Cloud Private Network For Your SD-WAN appeared first on Packet Pushers.
Mode briefed Ethan Banks about their cloud private network. Whoa! Thought Mode was an SD-WAN company? Not quite. Mode partners with several SD-WAN platforms so that it's easy to stand up a tunnel from your SD-WAN forwarders to Mode's private network. That makes Mode a network alternative to private MPLS that integrates with your SD-WAN fabric. The post BiB 053: Mode.net’s Cloud Private Network For Your SD-WAN appeared first on Packet Pushers.
Mode briefed Ethan Banks about their cloud private network. Whoa! Thought Mode was an SD-WAN company? Not quite. Mode partners with several SD-WAN platforms so that it's easy to stand up a tunnel from your SD-WAN forwarders to Mode's private network. That makes Mode a network alternative to private MPLS that integrates with your SD-WAN fabric. The post BiB 053: Mode.net’s Cloud Private Network For Your SD-WAN appeared first on Packet Pushers.
Azure ExpressRoute is a service that enables you to create private connections between Azure datacenters and infrastructure that’s on your premises or in a colocation environment. ExpressRoute connections don't go over the public Internet, and they offer more reliability, faster speeds, and lower latencies than typical Internet connections.Join Lex Thomas and Ryan Berry as they give us an in-depth overview of ExpressRoute and learn how it can benefit your day-to-day operations.[02:34] What are some different ways you can connect into Azure?[09:25] What are some of the speeds that are available with ExpressRoute?[11:45] What are some of the different ways you can connect using ExpressRoute?[14:26] How can customers take advantage of peering within Azure ExpressRoute?[19:31] Can VPN connections and ExpressRoute coexist?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual NetworkYour Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure
Azure ExpressRoute is a service that enables you to create private connections between Azure datacenters and infrastructure that’s on your premises or in a colocation environment. ExpressRoute connections don't go over the public Internet, and they offer more reliability, faster speeds, and lower latencies than typical Internet connections.Join Lex Thomas and Ryan Berry as they give us an in-depth overview of ExpressRoute and learn how it can benefit your day-to-day operations.[02:34] What are some different ways you can connect into Azure?[09:25] What are some of the speeds that are available with ExpressRoute?[11:45] What are some of the different ways you can connect using ExpressRoute?[14:26] How can customers take advantage of peering within Azure ExpressRoute?[19:31] Can VPN connections and ExpressRoute coexist?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual NetworkYour Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure
Azure ExpressRoute is a service that enables you to create private connections between Azure datacenters and infrastructure that’s on your premises or in a colocation environment. ExpressRoute connections don't go over the public Internet, and they offer more reliability, faster speeds, and lower latencies than typical Internet connections.Join Lex Thomas and Ryan Berry as they give us an in-depth overview of ExpressRoute and learn how it can benefit your day-to-day operations.[02:34] What are some different ways you can connect into Azure?[09:25] What are some of the speeds that are available with ExpressRoute?[11:45] What are some of the different ways you can connect using ExpressRoute?[14:26] How can customers take advantage of peering within Azure ExpressRoute?[19:31] Can VPN connections and ExpressRoute coexist?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual NetworkYour Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure
With support for Linux, Windows Server, SQL Server, Oracle, IBM, and SAP, Azure Virtual Machines gives you the flexibility of virtualization for a wide range of computing solutions — development and testing, running applications, and extending your datacenter.Join Lex Thomas and Ryan Berry as they give us an in-depth session filled with demos and how-to tips and tricks on how to create and manage your Azure Virtual Machines.[00:30] Can you give us a quick overview of Virtual Machine Services within Azure?[04:10] What are some of the different ways you can deploy Azure Virtual Machines?[11:25] What are the different ways to create an Azure Virtual Machine?[16:29] What are Managed Disks and how do they relate to Azure Virtual Machines?[17:02] DEMO: Creating a new Azure Virtual Machine[37:52] How do you back up your newly created Virtual Machines?[43:25] DEMO: Back up and Site Recovery in Azure[1:00:25] Most importantly, can I use my Zune to manage my Azure subscription?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network
With support for Linux, Windows Server, SQL Server, Oracle, IBM, and SAP, Azure Virtual Machines gives you the flexibility of virtualization for a wide range of computing solutions — development and testing, running applications, and extending your datacenter.Join Lex Thomas and Ryan Berry as they give us an in-depth session filled with demos and how-to tips and tricks on how to create and manage your Azure Virtual Machines.[00:30] Can you give us a quick overview of Virtual Machine Services within Azure?[04:10] What are some of the different ways you can deploy Azure Virtual Machines?[11:25] What are the different ways to create an Azure Virtual Machine?[16:29] What are Managed Disks and how do they relate to Azure Virtual Machines?[17:02] DEMO: Creating a new Azure Virtual Machine[37:52] How do you back up your newly created Virtual Machines?[43:25] DEMO: Back up and Site Recovery in Azure[1:00:25] Most importantly, can I use my Zune to manage my Azure subscription?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network
With support for Linux, Windows Server, SQL Server, Oracle, IBM, and SAP, Azure Virtual Machines gives you the flexibility of virtualization for a wide range of computing solutions — development and testing, running applications, and extending your datacenter.Join Lex Thomas and Ryan Berry as they give us an in-depth session filled with demos and how-to tips and tricks on how to create and manage your Azure Virtual Machines.[00:30] Can you give us a quick overview of Virtual Machine Services within Azure?[04:10] What are some of the different ways you can deploy Azure Virtual Machines?[11:25] What are the different ways to create an Azure Virtual Machine?[16:29] What are Managed Disks and how do they relate to Azure Virtual Machines?[17:02] DEMO: Creating a new Azure Virtual Machine[37:52] How do you back up your newly created Virtual Machines?[43:25] DEMO: Back up and Site Recovery in Azure[1:00:25] Most importantly, can I use my Zune to manage my Azure subscription?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network
The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas and Ryan Berry for this all demo session as they walk us through the steps in setting up a VNet in Azure, how to initiate a network trace as well as manage multiple VMs within Azure.[00:30] DEMO: Setting up a VNet in Azure through a VPN Gateway[11:57] What happens if I have two networks in Azure? How does peering work?[18:48] How does network connectivity work exactly?[22:13] DEMO: Setting up Virtual Machines in your VNet in Azure[27:14] How does network watcher work within Azure?[36:12] How do you manage multiple VMs that you want to route traffic to?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas and Ryan Berry for this all demo session as they walk us through the steps in setting up a VNet in Azure, how to initiate a network trace as well as manage multiple VMs within Azure.[00:30] DEMO: Setting up a VNet in Azure through a VPN Gateway[11:57] What happens if I have two networks in Azure? How does peering work?[18:48] How does network connectivity work exactly?[22:13] DEMO: Setting up Virtual Machines in your VNet in Azure[27:14] How does network watcher work within Azure?[36:12] How do you manage multiple VMs that you want to route traffic to?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas and Ryan Berry for this all demo session as they walk us through the steps in setting up a VNet in Azure, how to initiate a network trace as well as manage multiple VMs within Azure.[00:30] DEMO: Setting up a VNet in Azure through a VPN Gateway[11:57] What happens if I have two networks in Azure? How does peering work?[18:48] How does network connectivity work exactly?[22:13] DEMO: Setting up Virtual Machines in your VNet in Azure[27:14] How does network watcher work within Azure?[36:12] How do you manage multiple VMs that you want to route traffic to?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas as he welcomes back Ryan Berry to the show as they discuss new features and updates for Azure Virtual Network in part one of this two part series.[04:43] What is Azure Resource Manager and how does it affect setting up an Azure Virtual Machine?[11:28] How does Azure's Hybrid Cloud possibilities impact organizations and their willingness to adopt cloud computing?[14:40] How can organizations connect to Azure? What options are available?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas as he welcomes back Ryan Berry to the show as they discuss new features and updates for Azure Virtual Network in part one of this two part series.[04:43] What is Azure Resource Manager and how does it affect setting up an Azure Virtual Machine?[11:28] How does Azure's Hybrid Cloud possibilities impact organizations and their willingness to adopt cloud computing?[14:40] How can organizations connect to Azure? What options are available?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas as he welcomes back Ryan Berry to the show as they discuss new features and updates for Azure Virtual Network in part one of this two part series.[04:43] What is Azure Resource Manager and how does it affect setting up an Azure Virtual Machine?[11:28] How does Azure's Hybrid Cloud possibilities impact organizations and their willingness to adopt cloud computing?[14:40] How can organizations connect to Azure? What options are available?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Join the Dynamic Duo- Kisha and Anpu for a session of Free Readings. You may visit both Kisha and Anpu at http://www.myastrologycoach.com/astro-tarot-network/ where they have a Private Network where you will enjoy Monthly Conference calls, Full Moon Empowerments Calls, Personal Reports, Discounts on Trips and Online Presentations and much more.
Join the Dynamic Duo- Kisha and Anpu for a session of Free Readings. You may visit both Kisha and Anpu at http://www.myastrologycoach.com/astro-tarot-network/ where they have a Private Network where you will enjoy Monthly Conference calls, Full Moon Empowerments Calls, Personal Reports, Discounts on Trips and Online Presentations and much more.
Join the Dynamic Duo- Kisha and Anpu for a session of Free Readings. You may visit both Kisha and Anpu at http://www.myastrologycoach.com/astro-tarot-network/ where they have a Private Network where you will enjoy Monthly Conference calls, Full Moon Empowerments Calls, Personal Reports, Discounts on Trips and Online Presentations and much more.
Join the Dynamic Duo- Kisha and Anpu for a session of Free Readings. You may visit both Kisha and Anpu at http://www.myastrologycoach.com/astro-tarot-network/ where they have a Private Network where you will enjoy Monthly Conference calls, Full Moon Empowerments Calls, Personal Reports, Discounts on Trips and Online Presentations and much more.
Join the Dynamic Duo- Kisha and Anpu for a session of Free Readings. You may visit both Kisha and Anpu at http://www.myastrologycoach.com/astro-tarot-network/ where they have a Private Network where you will enjoy Monthly Conference calls, Full Moon Empowerments Calls, Personal Reports, Discounts on Trips and Online Presentations and much more.
Join the Dynamic Duo- Kisha and Anpu for a session of Free Readings. You may visit both Kisha and Anpu at http://www.myastrologycoach.com/astro-tarot-network/ where they have a Private Network where you will enjoy Monthly Conference calls, Full Moon Empowerments Calls, Personal Reports, Discounts on Trips and Online Presentations and much more.
Join the Dynamic Duo- Kisha and Anpu for a session of Free Readings. You may visit both Kisha and Anpu at http://www.myastrologycoach.com/astro-tarot-network/ where they have a Private Network where you will enjoy Monthly Conference calls, Full Moon Empowerments Calls, Personal Reports, Discounts on Trips and Online Presentations and much more.
Join the Dynamic Duo- Kisha and Anpu for a session of Free Readings. You may visit both Kisha and Anpu at http://www.myastrologycoach.com/astro-tarot-network/ where they have a Private Network where you will enjoy Monthly Conference calls, Full Moon Empowerments Calls, Personal Reports, Discounts on Trips and Online Presentations and much more.
Jon Skinner is the Founder and CEO of Music Gateway, a platform connecting musicians and industry professionals, where you as an artist can pitch for opportunities and get paid gigs (or find the right person for your project). "Imagine a dating site but matching music industry roles and services," as they describe it themselves. In this We Spin Recipes interview, Jon – who's been in the music industry for over 20 years – talks on what makes Music Gateway different from competitors, shares tips on succeeding on the platform, and reveals some of the brand new features like the bespoke Private Network solution. Go to http://wespin.co/wsr18 for the show notes and musicgrowthtalks.com to subscribe to the podcast. NOTE: This podcast was renamed from WeSpin Recipes to Music Growth Talks after episode #85.