Podcasts about rje

  • 24PODCASTS
  • 32EPISODES
  • 46mAVG DURATION
  • ?INFREQUENT EPISODES
  • Apr 29, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about rje

Latest podcast episodes about rje

The Z3 Podcast
Teaching Without a Script: Where is Israel Education Headed? - Z3 Podcast Season 2, Episode 1

The Z3 Podcast

Play Episode Listen Later Apr 29, 2025 69:22


Welcome to Season 2, Episode 1 of the Z3 Podcast! In this conversation, Z3 Founding Director Amitai Fraiman speaks with Rabbi Dr. Laura Novak-Winer and Robbie Gringras about the evolving landscape of Israel education, particularly in the wake of the events of October 7, 2023. Each of them discusses the goals of Israel education, emphasizing the importance of knowing Israel in a nuanced way rather than simply fostering love for the country. Their conversation delves into the historical context of Israel education, the challenges faced by American Jews in connecting with Israel, and the need for a deeper understanding of values and relationships within the Jewish community. In the latter half of the podcast, the speakers reflect on their personal theological journeys and the implications for future education. Together, they explore the complexities of Jewish identity, the impact of recent events on perceptions of Israel, and the role of education versus advocacy in shaping these discussions. Ultimately, they call on the importance of community and nuanced, continuing conversations as our communities continue to educate and define what it means to be Jewish in relation to Israel. About our Guests: Robbie Gringras was born and bred in the Jewish community of Britain, but has been living and creating in Israel since 1996, primarily with Jewish Americans. As such his work – educational and theatrical – bridges the Israel-Diaspora connection with empathy and insight. He lives in the secular world, while his knowledge base and research specialties – especially after his many years studying in Jerusalem – are deeply religious. While Creative Director of Makom, the Israel Education Lab of the Jewish Agency, he coined the phrase: “Hugging and Wrestling with Israel”, drove the 4HQ System of Israel Education, and wrote for and ran the Makom website.As a world-renowned solo theatre performer, he is also an inspirational speaker, and a charismatic teacher. As a prolific playwright, he is also a challenging and original educator. As an experienced and committed Jewish Zionist educator, his theater creations are educational treasure chests.Rabbi Dr. Laura Novak Winer, RJE, is the Director of the Master of Educational Leadership program at the HUC-JIR Rhea Hirsch School of Education in Los Angeles, CA. Laura teaches courses on pedagogy, classroom and organizational culture and leading change. She is a Senior Fellow at the Jack, Joseph and Morton Mandel Center for Studies in Jewish Education and Brandeis University. She was previously Director of Clinical Education at the HUC-JIR Rhea Hirsch School where she mentored students, coordinated fieldwork internships and taught graduate level courses in pedagogy and organizational change to students studying to become Jewish educational leaders and rabbis. Laura has worked in and with a variety of afternoon school settings and her current research focus is Israel education, particularly within the context of the supplementary school.Laura has been published in a variety of academic and online journals, is a regular contributor to Moment Magazine's “Ask the Rabbis” column, and was the editor of several curricula, including Sacred Choices: Adolescent Relationships and Sexual Ethics (2005 and 2007).Chapters00:00 Introduction to Israel Education01:56 The Goals of Israel Education12:55 Evolution of Israel Education24:13 Values and Relationships in Israel Education30:38 Theological Perspectives on Israel Education34:41 The Importance of Community in Jewish Identity41:19 Navigating the Impact of October 7th50:23 The Role of Education vs. Advocacy01:00:02 Defining Jewish Identity and Zionism

Ongeplande Avonturen
S3A5 - Gedragen door het Witte Licht

Ongeplande Avonturen

Play Episode Listen Later Dec 31, 2024 46:35


Na vele perikelen is het eindelijk zo ver: onze avonturiers staan oog in oog met het kwaad dat ze moeten bestrijden! Deze keer is het niet alleen de stinkende Tim Lompers, maar ook een ongelofelijk sterke licht magiërJe luistert naar het nieuwe seizoen van Ongeplande Avonturen! Ongeplande Avonturen is een Nederlandse, verhalende improvisatiepodcast, gebaseerd op Dungeons & Dragons (DnD).In deze podcast kruipen we in de huid van verschillende karakters en moeten wij ons zonder script door een verhaal bewegen. Eigenlijk een soort rollenspel dus.De volgende aflevering verschijnt over twee weken!Volg ons op Instagram op @ongeplandeavonturen

Glasom mladih - Radio Slobodna Evropa / Radio Liberty
'Prava priča': Mladi o radu na rječniku romskog jezika u BiH

Glasom mladih - Radio Slobodna Evropa / Radio Liberty

Play Episode Listen Later Sep 14, 2024 30:00


Koliko se identitet jednog naroda čuva njegovanjem jezika? Zašto su mali koraci bitni u tom procesu? Dvije djevojke i dva mladića napravili su mini rječnik romskog jezika, "Romani Lil". Rječnik je mali doprinos očuvanju romskog jezika, čija je budućnost i opstanak neizvjestan i ugrožen.

New Books Network
Rory Lindsay, "Saving the Dead: Tibetan Funerary Rituals in the Tradition of the Sarvardurgatipariśodhana Tantra" (WSTB, 2024)

New Books Network

Play Episode Listen Later Jul 11, 2024 43:04


Saving the Dead: Tibetan Funerary Rituals in the Tradition of the Sarvardurgatipariśodhana Tantra (WSTB, 2024) explores Tibetan funerary manuals based on the Sarvadurgatipariśodhana Tantra (SDP), focusing on the writings of the Sa skya author Rje btsun Grags pa rgyal mtshan (1147–1216) and the diverse forms of agency—human, nonhuman, and material—articulated in his texts. It also examines the polemical responses evoked by Grags pa rgyal mtshan's manuals from Bo dong Paṇ chen Phyogs las rnam gyal (1375/6–1451) and Go rams pa Bsod nams seng ge (1429–89), elucidating key points of contention including methodologies for site preparation in funeral rites, visualization practices involving objects representing the deceased, and the relationship between tantric narrative and ritual enactment. Finally, the study analyzes A mes zhabs Ngag dbang kun dga' bsod nams's (1597–1659) attempt to integrate advanced bardo practices characteristic of highest yogatantra into the yogatantric rites delineated in the SDP, underscoring divergent assumptions about postmortem agency reflected in works classified as yogatantra and highest yogatantra. This book is available open access here.  Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/new-books-network

New Books in Buddhist Studies
Rory Lindsay, "Saving the Dead: Tibetan Funerary Rituals in the Tradition of the Sarvardurgatipariśodhana Tantra" (WSTB, 2024)

New Books in Buddhist Studies

Play Episode Listen Later Jul 11, 2024 43:04


Saving the Dead: Tibetan Funerary Rituals in the Tradition of the Sarvardurgatipariśodhana Tantra (WSTB, 2024) explores Tibetan funerary manuals based on the Sarvadurgatipariśodhana Tantra (SDP), focusing on the writings of the Sa skya author Rje btsun Grags pa rgyal mtshan (1147–1216) and the diverse forms of agency—human, nonhuman, and material—articulated in his texts. It also examines the polemical responses evoked by Grags pa rgyal mtshan's manuals from Bo dong Paṇ chen Phyogs las rnam gyal (1375/6–1451) and Go rams pa Bsod nams seng ge (1429–89), elucidating key points of contention including methodologies for site preparation in funeral rites, visualization practices involving objects representing the deceased, and the relationship between tantric narrative and ritual enactment. Finally, the study analyzes A mes zhabs Ngag dbang kun dga' bsod nams's (1597–1659) attempt to integrate advanced bardo practices characteristic of highest yogatantra into the yogatantric rites delineated in the SDP, underscoring divergent assumptions about postmortem agency reflected in works classified as yogatantra and highest yogatantra. This book is available open access here.  Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/buddhist-studies

New Books in South Asian Studies
Rory Lindsay, "Saving the Dead: Tibetan Funerary Rituals in the Tradition of the Sarvardurgatipariśodhana Tantra" (WSTB, 2024)

New Books in South Asian Studies

Play Episode Listen Later Jul 11, 2024 43:04


Saving the Dead: Tibetan Funerary Rituals in the Tradition of the Sarvardurgatipariśodhana Tantra (WSTB, 2024) explores Tibetan funerary manuals based on the Sarvadurgatipariśodhana Tantra (SDP), focusing on the writings of the Sa skya author Rje btsun Grags pa rgyal mtshan (1147–1216) and the diverse forms of agency—human, nonhuman, and material—articulated in his texts. It also examines the polemical responses evoked by Grags pa rgyal mtshan's manuals from Bo dong Paṇ chen Phyogs las rnam gyal (1375/6–1451) and Go rams pa Bsod nams seng ge (1429–89), elucidating key points of contention including methodologies for site preparation in funeral rites, visualization practices involving objects representing the deceased, and the relationship between tantric narrative and ritual enactment. Finally, the study analyzes A mes zhabs Ngag dbang kun dga' bsod nams's (1597–1659) attempt to integrate advanced bardo practices characteristic of highest yogatantra into the yogatantric rites delineated in the SDP, underscoring divergent assumptions about postmortem agency reflected in works classified as yogatantra and highest yogatantra. This book is available open access here.  Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/south-asian-studies

New Books in Hindu Studies
Rory Lindsay, "Saving the Dead: Tibetan Funerary Rituals in the Tradition of the Sarvardurgatipariśodhana Tantra" (WSTB, 2024)

New Books in Hindu Studies

Play Episode Listen Later Jul 11, 2024 43:04


Saving the Dead: Tibetan Funerary Rituals in the Tradition of the Sarvardurgatipariśodhana Tantra (WSTB, 2024) explores Tibetan funerary manuals based on the Sarvadurgatipariśodhana Tantra (SDP), focusing on the writings of the Sa skya author Rje btsun Grags pa rgyal mtshan (1147–1216) and the diverse forms of agency—human, nonhuman, and material—articulated in his texts. It also examines the polemical responses evoked by Grags pa rgyal mtshan's manuals from Bo dong Paṇ chen Phyogs las rnam gyal (1375/6–1451) and Go rams pa Bsod nams seng ge (1429–89), elucidating key points of contention including methodologies for site preparation in funeral rites, visualization practices involving objects representing the deceased, and the relationship between tantric narrative and ritual enactment. Finally, the study analyzes A mes zhabs Ngag dbang kun dga' bsod nams's (1597–1659) attempt to integrate advanced bardo practices characteristic of highest yogatantra into the yogatantric rites delineated in the SDP, underscoring divergent assumptions about postmortem agency reflected in works classified as yogatantra and highest yogatantra. This book is available open access here.  Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/indian-religions

New Books in Religion
Rory Lindsay, "Saving the Dead: Tibetan Funerary Rituals in the Tradition of the Sarvardurgatipariśodhana Tantra" (WSTB, 2024)

New Books in Religion

Play Episode Listen Later Jul 11, 2024 43:04


Saving the Dead: Tibetan Funerary Rituals in the Tradition of the Sarvardurgatipariśodhana Tantra (WSTB, 2024) explores Tibetan funerary manuals based on the Sarvadurgatipariśodhana Tantra (SDP), focusing on the writings of the Sa skya author Rje btsun Grags pa rgyal mtshan (1147–1216) and the diverse forms of agency—human, nonhuman, and material—articulated in his texts. It also examines the polemical responses evoked by Grags pa rgyal mtshan's manuals from Bo dong Paṇ chen Phyogs las rnam gyal (1375/6–1451) and Go rams pa Bsod nams seng ge (1429–89), elucidating key points of contention including methodologies for site preparation in funeral rites, visualization practices involving objects representing the deceased, and the relationship between tantric narrative and ritual enactment. Finally, the study analyzes A mes zhabs Ngag dbang kun dga' bsod nams's (1597–1659) attempt to integrate advanced bardo practices characteristic of highest yogatantra into the yogatantric rites delineated in the SDP, underscoring divergent assumptions about postmortem agency reflected in works classified as yogatantra and highest yogatantra. This book is available open access here.  Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/religion

Reiki Dojo - Uspjeh se uči
Kako ste spavali?

Reiki Dojo - Uspjeh se uči

Play Episode Listen Later May 18, 2024 33:57


Nedostatak sna može izazvati umor, loše raspoloženje, smanjenu produktivnost i ozbiljne zdravstvene probleme. Kronični umor dovodi do fizičkih bolova i mentalne iscrpljenosti. Rješavanjem ovog problema znači da ćete direktno utjecati na vrijeme koje uzima trećinu vašeg života, na način da to vrijeme i procesi u pozadini koji se dešavaju, rade za vas. Ovaj put na pozitivan način. https://reiki-dojo.net/spavate-li-za-zdravlje-i-snagu/

Uspjeh se uči sa Danijel Salijevićem

Nedostatak sna može izazvati umor, loše raspoloženje, smanjenu produktivnost i ozbiljne zdravstvene probleme. Kronični umor dovodi do fizičkih bolova i mentalne iscrpljenosti. Rješavanjem ovog problema znači da ćete direktno utjecati na vrijeme koje uzima trećinu vašeg života, na način da to vrijeme i procesi u pozadini koji se dešavaju, rade za vas. Ovaj put na pozitivan način. https://reiki-dojo.net/spavate-li-za-zdravlje-i-snagu/

Bliski susreti jezične vrste
Ep. #224 – Korisni mrežni jezični izvori i alati

Bliski susreti jezične vrste

Play Episode Listen Later Jan 15, 2024 38:38


Guglanjem riječi ili izraza vjerojatno ćete doći do Hrvatskog jezičnog portala i Haschecka, no mnogi se drugi izvori i alati kriju u jezičnom ‘undergroundu'. Redom kojim se navode u epki: Hrvatski jezični portal - https://hjp.znanje.hr/ Baza frazema hrvatskog jezika - http://frazemi.ihjj.hr/ Kolokacijska baza hrvatskog jezika - http://ihjj.hr/kolokacije Baza metafora - https://metanet.hr/ Matura - http://matura.ihjj.hr/ Struna - http://struna.ihjj.hr/ Terminološki portal: www.nazivlje.hr www.enciklopedija.hr Proleksis enciklopedija - https://proleksis.lzmk.hr/ Hašek - https://ispravi.me/ Grammarly.com Languagetool.org Duden - https://mentor.duden.de/ Rječnik školske knjige - https://rjecnik.hr/ Rječnik kajkavskog književnog jezika: www.kajkavski.hr, Kajkaviana: https://www.kajkavskirjecnik.com/ Čakavski rječnik - http://os-turnic-ri.skole.hr/cakavski-rjecnik?kat=5297&dict_letter=ALL Rječnik neologizama - http://rjecnik.neologizam.ffzg.unizg.hr/ Žargonaut - https://www.zargonaut.com/ Google Translate (kamera!) Englesko-njemački rječnik – https://dict.leo.org Glosbe.com Ozdic.com Glagoljica - https://ikzstudentskiprojekti.ffzg.unizg.hr/Glagoljica/index.html i https://www.ffos.unios.hr/projekti/glagopedija/index/prevoditelj i dr. -- Podržite naš rad (već od 2€): www.buymeacoffee.com/bsjv Predložite gosta, teme i dajte svoj osvrt: forms.gle/nZ6tJTKuQysct3jQ7 Sve o podcastu (platforme, mediji, kontakt obrazac): www.linktr.ee/bliskisusreti (CC) 2024 Bliski susreti jezične vrste

Talking with Jawu
Episode 10: 2023, mon année ?

Talking with Jawu

Play Episode Listen Later Dec 31, 2023 26:54


Helloooooow !!!Cette année a été d'une certaine façon spéciale pour moi dans certains aspects de ma vie, donc voici un petit épisode qui me sert de récapitulatif.Références musicalesMon roi - YoussouphaI can't breathe - H.E.RJe te souhaite une bonne écoute et j'espère que tu apprécieras cet épisode. Si oui, n'hésite pas à le noter sur Apple Podcasts ou Spotify et à me laisser un commentaire. Si tu as envie de me parler, me faire des suggestions ou me poser des questions, tu peux me retrouver sur Instagram à @talkingwithjawu_podcast ou @christiejawu.Bisous.Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.

Podcasts – Jewish Sacred Aging
ENCORE BROADCAST, Seekers of Meaning 12/01/2023: Fighting Antisemitism with Educational Resources

Podcasts – Jewish Sacred Aging

Play Episode Listen Later Dec 22, 2023 44:08


On this week's episode of the Seekers of Meaning TV Show and Podcast, an encore broadcast of a panel of guests discussing the recent rise in antisemitism in the US following the October 7 Hamas-led mass murder of civilians in Israel. The guests are Andrew Goretzky, regional director of the Anti-Defamation League in Philadelphia; Randi Boyette, associate regional director for education, ADL; and Rabbi Stacy Rigler, RJE, executive director of the Association of Reform Jewish Educators. [Read more...] The post ENCORE BROADCAST, Seekers of Meaning 12/01/2023: Fighting Antisemitism with Educational Resources appeared first on Jewish Sacred Aging.

Podcasts – Jewish Sacred Aging
Seekers of Meaning 12/01/2023: Fighting Antisemitism with Educational Resources

Podcasts – Jewish Sacred Aging

Play Episode Listen Later Dec 1, 2023 44:08


On this week's episode of the Seekers of Meaning TV Show and Podcast, a panel of guests discuss the recent rise in antisemitism in the US following the October 7 Hamas-led mass murder of civilians in Israel. The guests are Andrew Goretzky, regional director of the Anti-Defamation League in Philadelphia; Randi Boyette, associate regional director for education, ADL; and Rabbi Stacy Rigler, RJE, executive director of the Association of Reform Jewish Educators. [Read more...] The post Seekers of Meaning 12/01/2023: Fighting Antisemitism with Educational Resources appeared first on Jewish Sacred Aging.

Apex Benefits | Podcasts
The Point Podcast | EP 82 | Success and Generosity With Denny Sponsel

Apex Benefits | Podcasts

Play Episode Listen Later Nov 10, 2022 20:52


In this episode of the newly re-launched "The Point", Apex Benefits' VP of Sales, Steve Winbun, sits down with RJE Business Interiors CEO Denny Sponsel to discuss some of the "secret" keys to maintaining a successful business.  About our guest: Denny Sponsel, or the “Big Kahuna' as he is more commonly known to RJE employees, is the fearless leader of RJE Business Interiors. While he may have spent the last 40 years improving workplace design, his true passion lies in providing RJE's clients with the best possible customer experience. A hugger at his core, Denny extends his favorite mantra — Do What We Say We Will Do — to all of his philanthropic efforts as well. As a board member for several charitable organizations, Denny is committed to giving the underprivileged youths in Indianapolis a better chance to succeed.

Women Rabbis Talk
Episode 3.4: Getting Educated About Rabbi Educators with Rabbi Stacy Rigler

Women Rabbis Talk

Play Episode Listen Later Oct 30, 2022 67:48


Click here to read the complete transcribed episode Rabbi Stacy Rigler, RJE, the awesome Executive Director of ARJE (The Association of Reform Jewish Educators) takes us to the next level as she beautifully explains everything we could ever want to know about Rabbi-Educators and why they are so valuable in our Jewish education spaces! We also have a timely chat about the impact of anti-semitism on Jewish education and introduce some lesser-known women on whose shoulders we stand, Rabbi Regina Jonas and Ray Frank. To support ARJE: Support ARJE | Association of Reform Jewish Educators (ARJE) (reformeducators.org) To Read Rabbi Emma Gottlieb's sermon on Rabbi Regina Jonas, check out: https://www.facebook.com/rabbiemma.gottlieb/posts/pfbid0jdzdFGim67ckKfGgye4Ksd6FinHDmEkj1F13uJpggiF5Av7cW2Vnvbk9qwXaogzhl For more information on Ray Frank, the "Girl Rabbi of the West", check out: https://www.jewishvirtuallibrary.org/ray-frank Find all of our episodes (some of which are now transcribed) at: https://wordpress.com/view/womenrabbistalk.wordpress.com and wherever you download your favorite podcasts. Support us by clicking here Find our awesome swag and merch HERE --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/womenrabbispodcast/message Support this podcast: https://anchor.fm/womenrabbispodcast/support

Bliski susreti jezične vrste
Ep. #168 – Južnoslavenski jezici i čitanje kao javnozdravstveni problem. Gošća Anita Peti-Stantić.

Bliski susreti jezične vrste

Play Episode Listen Later Sep 19, 2022 84:40


Anita Peti-Stantić odrasla je s ocem lingvistom pa je tako već i prije osnovne škole razglabala o imenskom predikatu. S 5 godina pohađala je tečajeve stranog jezika i tvrdi da tek kad učiš strane bolje upoznaješ svoj, materinji. Godinama kasnije, nakon studija jugoslavistike, magisterija na Yaleu i doktorata u Beču, danas je predstojnica Katedre za slovenski jezik i književnost na Filozofskom fakultetu u Zagrebu. Osim lingvističkih projekata, Anita posvećuje puno vremena raspravi o čitanju. Njezina najzapaženija knjiga 'Čitanjem do (spo)razumijevanja' pokušava doskočiti problemu da nakon savladavanja čitanja više nikad ne radimo na razumijevanju i produbljivanju vokabulara. Rješenje je u raznim vrstama tekstova, vježbama, ali i novom modelu lektire. -- Pretplatite se i saznajte više o podcastu: www.linktr.ee/bliskisusreti Pratite nas: www.facebook.com/bliskisusreti www.instagram.com/bliskisusreti_podcast www.twitter.com/bliskisusreti Sviđa Vam se što naš rad? Podržite nas kavicom za 2€: www.buymeacoffee.com/bsjv (CC) 2022 Bliski susreti jezične vrste

Craig Peterson's Tech Talk
Considering a change in employment? Apple/China/Green Army/Bitcoin seizure and Cybersecurity Jobs!

Craig Peterson's Tech Talk

Play Episode Listen Later Feb 26, 2022 82:38


Considering a change in employment? Apple/China/Green Army/Bitcoin seizure and Cybersecurity Jobs! Apple has upended a lot of industries over the years, and it is about to upend yet another one. Square is a company that has been making a lot of money and its run by same guy that ran Twitter. You know that Rasputen-looking guy? What's Apple doing to the finance industry? [Following is an automated transcript] This is a real big deal. Apple has been for a long time upending industries. [00:00:23] You might remember, of course, the music player. In fact, I still have an old MP3 player. You can't really see it very well from this angle, but it was right over there. And then. And it was a five gigabyte player. Just amazing thing was huge. It was actually designed by digital equipment corporation, licensed by this other manufacturer, put them together. [00:00:44] Great audio quality. They had these little costs, headphones that came along. I loved the thing. Absolutely loved it. And apple came along, they weren't the first and they introduced their own MP3 player. That was called an iPod. And it did very well. It just slaughtered everybody else. You might remember the Microsoft came out with their zoon and many others came out with their own little MP3 players. [00:01:12] No, nobody could touch our friends over at apple with their iPod. And then what happened? Around 2010, think for a minute. What new product did apple introduce around 2010? Of course it was this right. It was the I phone now the iPhone cut dramatically into Apple's market and for a good reason. It was a phone. [00:01:38] It was a smart phone. It could play all of your music. I still have and still use 120 gigabyte. I iPod. At the kind of the classic I think is what they had called it. And 120, it was just amazing. Just that much music. Of course, me, I have a lot of lectures, a lot of audio books and other things I listened to on that, on those iPods and what happened. [00:02:05] Of course. Now you can get these I-phones with a terabyte of memory in them, just incredible amount of space. And that's a pretty good thing, frankly, because you can store everything. But at the same time, our networks are getting faster. Aren't they? So our networks, like what we have for our cellular phones and stuff are faster than they have ever been. [00:02:29] So you don't really need as much storage do you, as you used to have. On your phone or your iPod or your MP3 player. So it's an interesting game. How much space do you need? And I'm asked that all of the time and the newest iPhone is coming out, have a lot more memory. I think they have eight gigabytes of Ram in them. [00:02:48] And as I said, a terabyte of storage. But what apple was doing is saying, Hey, we own this iPod market, the MP3 player market. And of course it's more than just MP3s, lot of other formats out there for the music or audio books, but they owned it. But they knew that if they were going to survive in the industry, they had to do something else. [00:03:13] Came out with a product that competed with their award winning and just top of the line product, the iPhone and your iPhone works every bit as well as an iPod ever did. And of course ever so much better because now you don't have to download the music on your iPhone to listen to it, to you. You can stream it over the internet, over wifi, right over the cellular data connection, those things we've gotten fast. [00:03:38] Two great option for. What Apple's doing now is saying we need to append another market. Have you ever had, again, like you, you got your phone, right? And let's say you're a small merchant, maybe your coffee shop, or maybe you're even smaller. Maybe you're just out at a flea market selling stuff that you might want to peddle. [00:03:59] You have to get an, a credit card. Don't you. And back in the day that credit card reader would plug right into the headphone Jack and with a headphone Jack, you'd be able to go online. No problem. Life is good. And once you're online, then you can take the credit. Now you didn't just have to go online with your iPhone, but you had to be able to go on line with your phone and the reader, because when they got rid of that wonderful little headphone port, you now had to use Bluetooth, didn't you and you still. [00:04:37] So you get that reader from square or that reader from PayPal or somewhere else it's acting as your merchant account. And that reader then uses Bluetooth to talk to the phone and then it can read the credit card or the chip. And of course, with the chip it's by directional, it has to get the information to, and from that trip, And then you've got the credit card that you can process all well, and good. [00:05:04] We're all happy about that, but here's your next problem? Bluetooth. Isn't always working. That reader has to be charged. Did you charge it before you brought it before you started using it? So apple said wait a minute. In our I-phones we have built in a few different things. Do you ever used apple pay? [00:05:25] It's probably the safest way to pay online bar? None. It doesn't actually give the merchant the credit card. And it gives them a code that they can read Dean in order to go ahead and get the money from the transaction so that transaction can then be redeemed by the merchant. And that's all stuff handled by your merchant account. [00:05:48] You don't have to worry about it makes life. However now what they've done is they've said let's reverse this. You can use your iPhone with apple pay in order to pay for things. And it has, what's called near field technology in it that allows it to act like those tap and go credit cards I've ever used. [00:06:08] One of those where you can just tap it and it makes the transaction happen. Pretty simple. So it has that in there, but it also has the ability. To read those tap and go transactions. So it's going to be interesting to see exactly what happens here. This is a very big industry. There is a whole lot of money in it, and there's an article this week from our friends over in ink magazine. [00:06:36] I got up on my screen for those who are watching a video here on rumble or YouTube. And it's talking about this feature that they introduced quite quietly. Because this new capability is going to change things. Now you are still going to have your merchant account. So you still might have to have a Stripe or a PayPal or direct merchant account with your bank. [00:07:02] But this is allowing contactless credit and debit cards and other digital wallets to be able to be read from any one's iPhone, which is really quite. Now there's things like Venmo and others out there that people use. My kids use a lot more than I do, but they use it to send money back and forth to each other. [00:07:23] It's a pretty good little thing that they've got going, but with something like this, you wouldn't even need to use a Venmo. So those are the guys that are going to get really nailed by it. And Stripe really is phenomenal. It's so easy to use and I use it as well. I use. For my courses. If you sign up, for course, to almost always going through Stripe, I know there's some other alternatives out there right now that are a little more friendly to the non-mainstream, but I haven't been able to integrate those yet in Vermont payment processors, but there's still going to need it. [00:08:01] You can use cash app, Venmo. It's not going to stop you from doing any of that, but it does stop you from having to have another. Piece of equipment with you, which is just something else to go bad, or dig to have, get dirty to, to not be able to work for you. So we'll see what happens. This is cutting out. [00:08:22] These companies like square. They'll no longer be able to. Have from the front to the back, they'll still have the back, frankly, but they'd be able to accept payments from pretty much anything that's contactless, which is I think a very good deal. We'll see what happens. But again, this is not apple going after Apple's existing customer base, like it did with the I Paul. [00:08:50] Transition to the I phone. This is apple going after another piece of the retail space. And remember what I said earlier, it's not even just that app. Has the ability to enter market, but we've seen time and again, where apple enters a market that's already established. It's not quite mature, right? You haven't had all of those acquisitions going where the companies are buying each other up, but it is going to make a huge difference because again, apple up. [00:09:23] And apple has ties in to a couple of banks that they use for processing their apple cards. Think it's Goldman Sachs, and they could potentially provide you with the merchant account stuff on the backend. So I think that's pretty cool. And it's going to allow us all to have a cashless. The yeah, if this was a political show, that's probably what we'd be talking about. [00:09:50] Wouldn't it? Because there's certain problems with doing that as well. Hey, I want to invite everybody to take a few minutes right now. I am making some changes. I've been working on some of these for weeks, but I've got a lot of clients. I've got two. Take care of first, right? I've been doing a lot of CSO work, CIS, so chief information security officer, just on a fractional or part-time basis as a contractor for a few different companies to try and keep them up-to-date with all of the latest in technology. [00:10:22] So it's been really fun, but I haven't been able to do everything I want to do yet on the radio show. So my wife and I are reaching into our pockets and we're going to be hopefully pulling out somebody to help us with some of this, because what I want to do is send. My show notes to you guys every week. [00:10:41] So you can see what I'm talking about. You have the direct links, as well as my newsletter, and I want to start doing my Wednesday wisdoms trainings more regularly. It's really hit or miss. So trying to do all of that, and I'd really appreciate it. If you would go right now to Craig peterson.com and make sure you sign up right there for my email list, Craig peterson.com. [00:11:07] Get it. All right. [00:11:10] We've been very worried about China for quite a few years, for more than one reason. But one of the biggest is they have dominated some of the most critical markets in the world, including some of these mineral resources that we need. [00:11:27] China has been a big worry for many countries around the world. [00:11:32] For a long time, I met with the ambassador from a couple of these African countries and had a great little chat about what was going on there. They wanted to become this one country in particular, the data processing center. For Africa and Africa, of course, very big country or continent, I should say with a lot of countries and a lot of financial transactions. [00:12:01] And they figured what we need is a good data center. We need data lines coming in. And so they got some of those data lines and they got the data center. The data center provided by our friends in China. And so this data center was being used for a few different things, but it sure was not being used for these financial transactions. [00:12:27] So they wanted it to be used for because China. Provided the equipment. And we know from a lot of articles, a lot of research and from the federal government, the China has been spying on us. And I have seen it personally with some of these DOD sub subcontractors. In other words, it's not necessarily directly contracting with the department of defense, but providing parts and things via subcontractor relationships. [00:12:59] And China is a problem. So what do they do? How is this small African countries supposed to become the data processing country for all of Africa, with Chinese equipment? How could they possibly do it without Chinese equipment? And that's what the ambassador was telling. We need this equipment this is it. [00:13:19] They had Chinese routers, switches processors. They had racks of equipment set up in virtual environments and they were all set to go. China's been doing similar things in other parts of the world where they come in, they might build a port for instance, which has happened many times, one in Indonesia, particularly I'm thinking of, and they financed the port. [00:13:45] If you don't make the payment on that data center or the payment on the port or the payment on the railroad system, et cetera, that China has installed in your country, guess what's in that contract, you forfeit them. So the data center now becomes absolutely. China's not just a lean on it, not just a lease from China. [00:14:11] It is China's data center. That port is China's port. In fact, they own the largest port. Now I think in all of Indonesia, maybe the whole Pacific rim over there, I'm not sure, but that's what they've been doing. Same thing with railroads, et cetera, et cetera. So China really has a lot of companies and countries over the. [00:14:35] That's something we didn't want to have happen here in president Trump, you might remember was very adamant about it. He did a whole lot of work to make sure that none of the Chinese interests would really be able to take over and control our us interest. It makes sense to me. So what has China been doing to us? [00:14:58] We know about the steel and remember China was dumping cheap steel into the us and world markets that hurts us. We have a need to make things here. If we ever haven't forbid got into a war. And we needed ships or boats or planes, or we needed armaments of some sort or another. We need to be able to make them in the United States or in an allied country. [00:15:29] You remember how many problems that Britain had during the war? Trying to ship stuff over. I have two kids that were merchant Mariners and the U S merchant Marine academy is the only. Of the military academies, that flies battle standards because they lost cadets who were there at the school during warfare. [00:15:53] Okay. It's a bad thing. We don't want that to happen. So not having to rely on other countries actually ends up being a bit of a positive thing, depending on what it is. China's sent us things like dog food, that's contaminated, baby food contaminated. Even those, green recyclable bags, people take to the grocery store. [00:16:16] Yeah, contaminated with lead. It goes on and on. They also had control of 99% of certain precious metals that are needed for some of our key manufacturing here in the U S so we put tariffs on China for steel. We did the same thing in 2021. In fact, they put a tariff of 23% in 2021 to protect the steel manufacturers here in the U S. [00:16:45] From these cheap Chinese imports, not just cheap, but low quality steel Weiwei, you know about them. They owned the smartphone business in many parts of the world. In fact, here in the United States, you could get cheap Walway phones. Now, Weiwei of course, if much about Canadian history, know about Northern telecomm, who did a little. [00:17:10] Pioneering in the whole phone business for many decades and the allegations. And there's some proof that I've seen that leads me to believe that these allegations are correct. Are that while always stolen? Northern telecoms designs, its plans, et cetera, and put all of that together to make Walway. [00:17:32] So they steal the plans, they steal the engineering, they steal the research and development, the intellectual property. They then start making it, of course, without having to worry about the investments into R and D and developing products. Now they just stole them and then they flood the markets worldwide with. [00:17:52] Equipment paid and manufactured in some cases by slave labor in almost every case by substantially low wages and. They then control of the market. So we said no way to Walway and that was something president Trump started. It's actually a really good thing. And Google apps are now no longer allowed on Huawei phones. [00:18:19] So China used to have a 99%, almost total monopoly on rare earth metals. I'm going to bring this article up on the screen from our friends over at American. But now they have fallen to less than 60% monopoly. So they've been trying to stop shipments of rare earth metals to countries all over the world to drive up the prices. [00:18:45] They did the same thing here to Japan because of the contesting in the south China sea of some of these islands of some of these mineral rights. But since then in the last decade, rare earth metal. Are being mined. In other parts of the world, we talked here about what California is doing. California is now going to be mining lithium and some of these other rare earth metals that we need to make batteries. [00:19:15] We need to make processes. We need to make cars. We need to make light bulbs right on. And. They used to have a near monopoly on foreign off shore investment because companies were going to China like crazy, because the cheap wages over there, 1.4 billion consumers has been leading companies that make movies like Disney to go over to China. [00:19:39] But things have really stopped in some of these growth areas for China. And in fact, have reversed in a very big way. They're clamped down on business, censoring of wealthy capitalists food, shortages, growth, centralized government corruption. Gross, excuse me, corruption, mismanagement, stagflation, plunging birth rate, all resulted in investments and opportunities. [00:20:04] Fleeing China. Great article in American thinker. Keep an eye out for it in the newsletter this week and stick around. But first check out Craig peterson.com. Make sure you're on my email list. And if you like watching video, Hey, I'd like to invite you to watch me and follow me on YouTube and rumble. [00:20:27] This is straight out of the, what were you thinking department? In fact, what are you thinking? Yeah, the us army is planning on going green. Yeah. They want electric vehicles in war. [00:20:44] This is a plan that you just are going to have to shake your head at a, again, it's a little bit of idiocy, but before we talk specifically about the plan, I want to talk about something related. [00:20:59] Now, remember this plan is from the U S army and they want some goals read Sean on climate change and electric vehicles here over the next 20, 30 years. So let's look at the science behind what they're talking about, and I'm going to show you the actual statement that came out from the military. And one of president Biden's appointees is just nuts, absolutely nuts, but I'm going to back up a little. [00:21:34] For those of you who are watching along at home. Let me pull this up for you. This is from slash. And it's quoting a report over on the wall street journal and pulling some stuff together. But what they're doing in this particular article is talking about how our friends who have come up with these super computer designed. [00:22:02] To model our weather have been be fuddled they've reworked 1.2 million lines of computer code in order to compensate for something that I don't know about you, but if I was writing the code, I probably would have compensated for it in the first place cloud. Clouds. Yeah. Yeah. It turns out this is just to me, absolutely boggling the mind, that great glowing orb that appears in the sky. [00:22:35] From time to time. Yeah. I'll give or take half of the day. That thing called the sun apparently has something to do with the earth warming up. And do you know what else does, the clouds that are up in the sky? Those clouds can reflect the sun's heat and they can also hold heat in on the ground side, who would have thought. [00:23:01] So all of these models that they've been using, cause remember by now, as of more than a decade ago, New York Manhattan is underwater. Remember? Yeah. Al gore with his scientific moon movie at this science. Is just cited. It's proven and Florida by now was underwater. And so as Manhattan, and of course neither is true because they had no idea what they were talking about. [00:23:27] This article in the wall street journal, Totally baffles me. And I'm just showing you the excerpt from slash.here on the screen because the wall street journal was paid. And I don't want to have to push you guys to paid stuff if I can avoid it. But they thought it was really strange cause they updated the simulation in 2018 and in 2018 it turned out that the earth was. [00:23:55] Way more sensitive to greenhouse gases than they thought. And, oh man, they had to think about that because, in Boulder, the national center for atmospheric research they said if that number was correct, that would be really bad news. Yeah. And at least 20 older climate models disagreed with the new one, but they were simpler and this new one is an open source model. [00:24:20] So anybody can look at the code and kind of figure it out. So I, then what ended up happening is. More than a dozen other models were released and it turns out wait a minute, now they're agreeing with us. Do you remember that spaghetti code that predicted the COVID 19 was going to kill? [00:24:40] It was a two and a half million people in the United States. Of course didn't get anywhere near. Close to that, because the way we kept the stats, right? W co dine with COVID versus because of COVID right. Remember that whole controversy. It turns out that the scientists concluded that their new calculations have been thrown off kilter by the physics of clouds in a warming world, which may amplify or. [00:25:08] Climate change. Isn't that what I had just said, that Kyle taken, they can block the sun and they can also keep heat in. A night with lots of moisture in the air, whether it's humidity or cloud is going to stay warmer than a night where there's no clouds. These are experts. So the fact that they left out clouds and the effect they might have, I must make a whole lot of sense, because this is a science and the science has settled. [00:25:34] Yeah. So Andrew Gettleman now physicist there in Boulder said that the old way is just wrong. We know that I think our higher sensitivity is wrong to it. It's probably a consequence of other things we did by making clouds better and more realistic to solve one problem and create another I, again, I got to point out science, mind. [00:25:59] Science is not settled on pretty much anything and it never has been. And until we are all knowing, it never will be. So keep that in mind and quit having your heads just be so inflated that you think that you're absolutely right, because I'm not absolutely right. They're not absolutely right. No, one's absolutely right. [00:26:23] So let's get into the army here. This is just so exciting. Cause Christine wor Muth is the secretary of the army now, and the army is going to lead by example. And we put this up on the screen. I just realized that I'll have this up on the screen for you guys. We will use our buying power to drive change in the industry and leverage best practices from. [00:26:47] Sources. There's another great quote here from the secretary of defense. W we face all kinds of threats in our line of work yet. Yeah. Secretary of defense army. Yeah. Okay. But a few of the threats truly deserve to be called existential. The climate crisis does climate change is making the world more unsafe and we need to act right. [00:27:14] That's what she's saying, that this thing goes on for pages, what the goals are. So I decided, okay, Craig, let's have a look at this. I'm going to do a search in this PDF for the word risk. What are the risks? If we're going to be messing with the military, with the electric vehicles, because in the middle of a war zone, it's great. [00:27:33] You just, you stop, you plug your electric vehicle and let it charge for half an hour. And then you're off and running. And particularly where tanks are right. Where we're trying to protect our personnel. Maybe have an offensive. They'll wait while we charge our tanks, right? Oh and a little tiny solar cell, or we cover it with solar cells. [00:27:51] That's going to be enough to charge it if we leave it sitting there for a week. So we're okay. So what are the risks associated with us being idiots and moving towards an electric army? Okay, so risks here. Okay. So this is a risk to the climate. This is climate risks. Oh, this is red mitigating climate risks, assertion of climate change risks impacting the army at all levels from how and where our units operate and train to how to service as a whole. [00:28:21] Okay. So that's risks of when the climate changes, as we know it will, because those guys wrote 1.2 million new lines of code. Okay. So we know it's going to change. Okay. So let me see risks, climate change, imposes, climate threats, and risks. Address the risks associated with these. Let's see here. [00:28:43] What else do we got? Climate change risks. Climate change risks. Oh, they're going to install micro grids on every installation. Okay. Climate change risks. This is nuts. And the New York post has a great article on this insanity. Oh my gosh. What are we going to do with these. Yeah, our military, we're going to stop and charge our vehicles. [00:29:10] Yeah. All right, everybody stick around and visit online. Craig Peter sohn.com. I'll keep you up to date. [00:29:24] We're going to talk about this Bitcoin laundering case that really turned the internet upside down. Cryptocurrencies, Bitcoin, how safe is it? How secure is it really? And what happened here? Because this Bonnie and Clyde failed. [00:29:41] This is an article from the New York times. [00:29:44] Now I know I don't like to, you guys know this show you stuff that you have to pay to go to a paid site and particularly something like the New York times. It's amazing to me how they have some really great journalists that do a good job on some of these stories. And then they just totally go political on so many of the other stories, and I'm not talking about the editorial page, knock yourself out. [00:30:11] But anyways, this is a fascinating story to me because so many of us think that using Bitcoin is going to be safe after. Cryptocurrency. And crypto means cryptography and cryptography means we're keeping ourselves safer. Isn't it? Isn't that? How that's all supposed to work kind of the bottom line while in reality, it doesn't always work out that way. [00:30:40] And when it comes to cryptocurrency, it definitely does. And I want to explain a little bit about cryptocurrency for people, if you don't understand it very well, just putting the very, very, basically the way it works is there are ledgers, just like the old ledgers you used to see at the banks or businesses, those big. [00:31:02] And they'd maybe do double entry ledgers, or maybe some other types. Nowadays. Of course, all of this stuff has done on computers, but the idea is you walk into your bank and you say, I want a hundred dollars from my account. So the bank opens up its ledgers and sees, okay. Your account has X dollars in it. [00:31:23] They give you a hundred dollars in that ledger. Now they marked down that your account now is a hundred dollars less because you just would do a hundred bucks. That's the simple way it works with the bank. It's actually very similar with the script old currencies, but what happens in cryptocurrencies is you're not dealing with one institution. [00:31:46] So it isn't just your retirement plan that fidelity friends. With it, when it comes to cryptocurrencies, these ledgers are maintained by hundreds of different businesses and people around the world. Thousands depends on the cryptocurrency itself. And the idea is when you go and you want to take your a hundred dollars for instance, from the bank, they look it up in their one ledger in that ledger is assumed to be correct. [00:32:15] But when it comes to cryptocurrencies, there have to be the majority of ledgers that agree about how much money. And those ledgers are all public ledgers. So it's like having a Swiss bank account in that your account is represented by a number that's actually where the cryptography comes in and the keys, public keys and everything else. [00:32:40] But your account is essentially represented by a number. So if you want to pay the a hundred dollars to. In cryptocurrency. So it's probably some fraction of some cryptocurrency what's going to happen is you are going to have half of the ledgers for that particular cryptocurrency agree that you're transferring a hundred dollars. [00:33:07] From account number 1, 2, 3, 4 to someone else's account, which is 5, 6, 7, 8, just as an example. Very simplified example. So now what happens is the people who are running the ledger that you're using the main ledger, check the other ledgers and push your transaction onto the ledgers. That's why it takes a while for cryptocurrency transactions to occur. [00:33:32] Because it has to push out to these ledgers. Half of them have to agree in order for it to be a reasonable and accepted transactions. That make sense. Good. So what we have here now because of public ledgers is public information. The amount of money you have in that number to count can be seen by anyone who cares to look. [00:34:00] It's really that simple. Anybody can see it. So why are people thinking that it's crypto it's safe? It can't be taken by the government or bad guys, et cetera. Those concepts are all insane. The. Sort of privacy or security you have is related to the ledger. So the security is half of the ledgers have to agree. [00:34:23] So someone hacks one ledger, that's not enough to get control of all of your cryptocurrency or whatever it might. If someone hacks your wallet, that's a different story entirely. Okay. But that's not what we're talking about right now, but everybody can see that you have a hundred dollars in account. [00:34:43] Number 1, 2, 3, 4, the pro the trick is, and the problem for law enforcement, they don't necessarily know who owns account 1, 2, 3. So what law enforcement does in order to get money back or to arrest people is they watch these accounts. So in this particular case, there's Bonnie and Clyde, if you will hack a cryptocurrency exchange. [00:35:09] So this is again, one of these ledgers sites and they'll often exchange us dollars for various cryptocurrencies. Back in 2016, Bitfinex was the name of it. And they store $71 million in Bitcoin from effectively wallets are there on that site. But because these trades are publicly. People on the internet knew that it happened. [00:35:39] In fact, people on the internet were watching that wallet waiting for money to move. And this couple that's alleged to have stolen it's Iliya Lichtenstein and Heather Morgan, that account could, they could see that $71 million was in it. But over time, six years later, the value of Bitcoin had gone up substantially. [00:36:06] And today is worth about $4 billion. Isn't that just amazing and a lot of money. So they moved it to another account and that's when the got in trouble. So if you have a Swiss bank account, 1, 2, 3, 4, and you transfer money to someone else that I know, I now can trace that account. I say, oh, I know who has that. [00:36:35] Yeah, that's 71 million worth of Bitcoin. Back in the day, that's now worth 4 billion was in this account and they just bought themselves a new Porsche cayenne at this dealership. And all law enforcement has to do is knock at the dealership, say who was it? And now they know who the people are, but in this particular case, The bad guys had left that money in that Bitcoin account, but that money did get transferred, but guess what? [00:37:05] It wasn't them, people on the internet were thinking that the hackers had emerged that they were transferring the money to other Bitcoin accounts, which you see fairly frequently for these illegal transactions, but it wasn't the hackers who move that stolen. Bitcoin. This is again from the New York times, it was the government which had seized it as part of investigation into two New York city entrepreneurs, one with a little known Russian emigre and techie investor who had just named the other, his wife, an American businesswoman, and would be social media influencer with an alter ego. [00:37:44] Is this a terrible rapper named razzle con. Yeah, amazing. You can't make this stuff up. Can you, so they're charged with conspiracy to launder billions of dollars in Bitcoin. Ilya is 34 and Heather's 31 accused of siphoned off chunks of the currency, trying to hide it in this complex network of digital wallets and personas. [00:38:07] And if they're convicted of it and a second. Spare seat count that has been put against them. They could be facing up to 25 years in prison. So as is always the case, oh, you asked the neighbor, he was a good boy. He was a very good boy. I love that. How we are, but he's that little bit all over the. [00:38:26] But the couple's neighbors said they're goofy, normal types of people never expected that. But these are part of a real change that we've been seeing over the last few years into investigations in the cryptocurrency field. Now, remember crypto isn't necessarily the best thing. [00:38:44] Own any, never have owned any. I played around with some mining stuff at one point, just on my regular computer to see what it was all about, but it is not anything that's worth anything to anyone. Frankly, what I did now, a lot of people have been buying it. Of course, part of the problem with it is in order for it to be truly useful, you have to convert it back into something like a us dollar or maybe some other type of currency. [00:39:11] And that's often when people get caught and nowadays on the tax forms, it even asked you about any sort of crypto holdings that you might have. So remember all of that. They don't know, by the way, this is again from the article, the New York times, if they were directly involved in this breach all those years ago, but this is really crypto culture and it really is the fringe. [00:39:40] And they went crazy online and started looking at the digital trail. Her videos suddenly shared widely. Yeah. They've become infamous, is the right way to put all of that. Hey, if you like the show, I would really encourage you to follow me. You can follow, listen to my podcast on tune in on any of the major, in fact stream. [00:40:09] Platforms out there SoundCloud you'll find me on apple, et cetera. And I just started videotaping the shows last week. And this week I've done little things before, but now I'm trying to do the whole. So you can watch me on the show as I'm recording it live and see a little bit behind the scenes, which I've always liked. [00:40:35] I've been watching how we Carr and grace Curley do their show. And I thought, it's well worth it this week. I did a little bit of editing on. Cut out some of the in between, cause I had some longer coffee and fit and had to stretch my legs a couple of times, but you get to see the whole thing behind the scenes. [00:40:54] And if you sign up for my newsletter, you're going to get my weekly trainings. You're going to find out about boot camps I'm doing and other things, but you have to. Go to Craig Peter sawn.com. You'll see a right there on any page, frankly, to scroll down a little bit. It'll pop up right at the top of the page. [00:41:14] Put in your name and email address, and I'm going to send you a few special reports, including my report on passwords. Craig peterson.com. [00:41:25] You obviously know about the great resignation. It has been a big problem for a lot of companies out there. Great. For job seekers. Great for you. If you're trying to maybe get a raise, et cetera, especially if you're in the tech industry. [00:41:42] This great resignation thing, man. Has it hit companies? And one of the biggest problems companies are having is with tech workers. [00:41:55] You might remember back in the day, we had a big shortage of some of the cybersecurity people, right? Where we couldn't find them. There were numbers saying that there's like a million and a half or more open jobs for cybersecurity people. Now I did a little investigation into that number because it sounded high to me. [00:42:18] Cause I, I was coding it. It was a number that came from some pretty reasonable sources. But I think this is one of those things where you had one news source stating it and then all of a sudden other people started quoting it. I don't think it was really a million and a half. And what I found was that the people that had put that number together were looking at it and saying, if you have a business. [00:42:46] Who you should, you have working for you when it comes to cybersecurity? So there's like the CSO, the chief information security officer, which is something I do on a fractional basis for businesses all of the time, helping them to up their security. So you had to have a CSO, you needed to have a team. [00:43:06] Looking at the logs that was paying attention to the networks. If something happened, they would know when they did investigate and maybe they would do patching close bugs. Which is a different person. One is the network operation center people. And if you're going to have a 24 7 network operation center, that means you need at least four people probably. [00:43:30] And so the added all of this stuff up right there, the desktop people that are making sure the end points are protected and kept up to date and upgraded. That's how they came up with that, one and a half, 2 million open jobs in the us for technology. The reality was different obviously. [00:43:50] And now with the great resignation where all of these people are. Out of the jobs. And part of the problem was already the beginning of the lockdowns. They had people suspended. They laid them off or they said, okay maybe we'll have you back. It's only two weeks to flatten the curve. [00:44:11] So yeah, take a couple of weeks off. And so that gave people the opportunity over that. Period, which actually was two years, right? A minute. Maybe it's just my imagination. I'm not sure. But did that whole flatten the curve period that lasted for two years, people said I don't like this job because Frank. [00:44:32] There is very few jobs. There are very few jobs that are as stressful as the cyber security jobs, because you're dealing all of the time with the senior executives saying I'm not going to double log in. I'm not going to carry a token around with me. I'm not going to have my screen time out after. [00:44:55] Dean minutes or five minutes? No, it has to be half an hour and I just can't get my work done otherwise. So you're fighting with senior management who approved the budget in the first place, to at least do the minimal stuff. You're fighting with senior management to. The budget you need in order to keep the company safe. [00:45:15] Because nowadays, if you're not keeping a company safe, you can go out of business like that, lose your reputation, lose your intellectual property. I've seen it before with companies, small companies, bigger companies. You've got to make sure all of your backups are in place there. You're using. 3, 2, 1 strategy nowadays, it's more of a 4, 3, 2, 2 1, 1 zeros hero strategy. [00:45:40] I'll have to do a webinar on that one or a little meeting. We'll get together and talk about it. But again, if you're interested in that you gotta go to my website and stamped for the email list. Craig peterson.com. Just trying to figure it all out is difficult. And then you get all of these false alerts from software and you got to figure out, was this a legitimate alert or was this a false alert? [00:46:04] What should I do about this? Or should I do about that? Who's really trying to break in. Why are they trying to break in? All of that sort of stuff gets to be difficult. So it's a stressful job. So a lot of people that were in cyber security at the beginning of the lockdown, I said I got to find something better. [00:46:21] I know a couple of listeners who decided at the age of 55 to 60 in both cases that they would go change their careers had enough of what they were doing and we're going to go and do cybersecurity, took some of these classes, got the basics together and found jobs. In cybersecurity now they're not going to be experts, but they certainly knew more than the other people at the business, including the I T directors. [00:46:53] And I say that with air quotes. So they both changed jobs during the. Now that's an interesting thing to me because I, and I'm not pointing my finger at either one of these guys, but the number one thing you have, if you are in cybersecurity, if you are a CSO is the top drawer of your desk. [00:47:14] Assuming you have a desk, there's two things. One is your resume. And the other is your resignation letter because. Ultimately any business can be hacked. Now, I don't want people to say I'm throwing my hands up because it doesn't matter. Any business can be hacked. I'm not going to deal with this, right? [00:47:31] Why would I spend any money on it all because you can control. Likely you are to be hacked and you can get like a 98 to a hundred percent effectiveness depending on how you measure things. And if something does happen, what matters is, how can you recover? So if you look at things like the sniffs to cybersecurity framework, you'll see, there's all kinds of provisions in there to make sure the business survives a hack. [00:48:01] Okay. Stuff you needed to do stuff you need to be concerned about. But the whole cyber security side of the business is. Still in high demand because businesses more and more are realizing they can't just get by with running antivirus software anymore. You can't just say, oh I've got wonderful. [00:48:24] A windows defender on my PC and that's working great. I don't need anything else. Now you have to have a much more advanced system. There's no two ways about it. So what we're finding is people in the it business right now can find a job if they were. Great article here. Let me show you a little bit. [00:48:45] If you're watching, you'll see this on the screen. Two articles this week that I thought were really great, and I want to run through a little bit, but one is from. Wired magazine. That's a magazine I've subscribed to for a long time. They got some crazy ideas, but they got some good stuff, dude. And it's talking about the shortage of qualified workers and the competition. [00:49:11] It's fascinating. And then another one here, I'll show you from the New York times magazine. And it's talking about the recruiters who are trying to recruit in the tech space. Now, in both of these cases, what we're talking about are job vacancies that are open in a minimum, hundreds of thousands in the U S right. [00:49:36] Yeah, it's hard to tell, but what you can tell and what we are seeing is that these are recruiters who used to be stocked quite literally, sometimes by people looking for a job are now lucky. If they get a return, email, or phone, That's how bad it's gotten for them. And the story goes through this one recruiters kind of background saying, yeah I had this one person who's looking for a job and they stalked me, found my picture on LinkedIn and then stood outside the building, waiting for me to come out and then basically shoved the resume in my face and talked me up. [00:50:21] Another one saying I had mentioned on the phone that I really liked tophi what shows up the next morning, this beautiful handmade toffee perfectly wrapped. So it has gone in just a few years from that where people will do anything in order to try and get a hold of the hiring manager, to where it is today, where people are just saying. [00:50:44] Forget about it, it just isn't worth my time. The other thing that the recruiters are fine. Is that people when, if they do get ahold of them are saying basically, Hey, I'm just burned out. No, I don't think I have the energy anymore to do this, which is an interesting response. People because of the lock down have just had their. [00:51:10] Their excitement, squashed, and ability to look forward to what my career is going to be if you're younger and if you're older, like I am, you're looking at it saying I've still got a lot of good years left and I'd love to do this and have my my wisdom, if you will, from all of these decades in the it world and in cybersecurity put to good use, which is why I said I'm doing the fractional. [00:51:36] Chief information security officer for businesses. But what we are finding is. People can get the jobs, even people who are already retired to semi retired. I read another article this week that I thought was rather interesting. And we'll talk about that a bit when we get back, because it's going to take a few, but. [00:51:59] The resume side of things. No, we heard the T of course the tophi trick the standing outside and stocking them tricky, et cetera. So what is happening right now? When you want a job, then maybe you've been in the market before for a lot of years and you're competing against the kids that are out there. [00:52:21] Things have changed stick around and visit me online. Craig Peterson dot. [00:52:28] We're going to finish up our discussion about jobs and open it, positions it in general. And also going to talk about some of the tips for older employees on the resume. I had a bit of a shocker this week.. [00:52:44] This article, and I'm going to pull up on my screen for those who are watching online is I think fascinating. [00:52:51] This is from the New York times, and it's talking about recruiters and it's from a recruiter's perspective, Frank. And it's saying here, this is by the way, the one that had that story about the lady that used to be just hunted down all of the time, but the same recruiters are in such a demand that they too are scarce, which means their fees have never been here. [00:53:17] In house tech recruiter, salaries are up about 30% organizations looking for help in cloud and cybersecurity positions have increased fees. They're offering two recruiting services to as high as 45% of the first year salary. Isn't that something that's a Robert half. I should have them on the show. They have been on a few times in the past, this particular lady who left her job, where she was always being courted and started freelance recruiting before the lockdown back in 2018. [00:53:55] But there are big challenges are frankly going beyond finding just regular humans. The New York times says is that people are talking to potential hires. The recruiters have a big picture view of just how quickly the market is moving. And they've got to course take that and translate it into something that hiring managers would understand. [00:54:17] And that's a fine line. Between, Hey, I'm trying to help you out here. You really should pay attention. And this is a hard sell right solely. It's a really interesting line. And we're also finding that of course of the candidates themselves are getting a lot of money. Salaries are way. Pop and for a good reason, people are in demand, especially if you have the skills. [00:54:44] And so many people just don't want to work anymore. I have a couple of ways. I've looked at this over the years. I have what I call the McDonald's test. I don't think I've been to McDonald's in more than a year and I was on a road trip at the time, but it's how good is the service at McDonald's? [00:55:02] Because if typically the service at whatever retail store you go to is pretty good. It usually means, wow. People are looking for jobs and it's hard to find a job. So you've got basically overqualified people working there on the other end. People who are working in the customer service retail space, which unfortunately, that's your face? That's your company. The people that answer the phone or the talk to your customers, those are the people who are out front. So in dealing with those people, w are they the best or the worst? If there are a lot of open positions while typically, and I hate to say this, but typically they're not your best employees. [00:55:49] So that's kinda my McDonald's test. Did I get great service at McDonald's or Wendy's or burger king or at the mall? Or did I not get great service? And right now, We're not getting great service, any of those sorts of places. It's actually been more than a little frustrating. And sometimes even at the local coffee shop, it's been a little frustrating. [00:56:10] The other thing, this is surprised me. Th this was this week right now. I've never been a. Another words, just in other words I, it doesn't matter to me if someone's younger or older certainly you can get to a age where there's senility. The other obvious problems with mental function look at president Biden, frankly, and some of the issues he has at least from time to time. [00:56:38] But other than that, I'd never have. So I was really surprised when I was reading an article that. And it was talking about your resume if you want to get hired. And I'm going to run through some tips here because I spent some time doing some more research on this. You guys know, I'm not a spring chicken. [00:56:58] I'm not an old man. The brain's obviously functioning just fine. And that's a good thing. Probably will be well into my eighties. Hopefully nineties that's been the history in my family. I at you're 60 years old, even 70 years old, you still got a lot of good years left in you. So when I'm looking at this and saying, okay, I, what I do is what's called a fractional Cecil, fractional chief information security officer for businesses. [00:57:28] So what I do is I go into a business part time because I limit myself to somewhere between three and four. Customers at a time. And I have a team behind me that helps with all of the paperwork, the documentation, for all the compliance and everything else. It's out there. And as I'm doing all of this stuff for the company I'm bringing them in compliance with the cybersecurity regulations and in a lot of industries, if you're not in compliant, you're in big trouble. [00:58:00] Okay. Then that makes sense. I think to most people. So I was thinking, okay, how can I promote my fractured? Chief information, security officer stuff. I tied it up a little bit of my LinkedIn page. I really got to get some stuff together on my Craig Peterson page and mainstream page as well, which is my company. [00:58:21] But I am, I've done what I've done. So I started doing a little research saying what sort of stuff should I have out there on LinkedIn or other places? And this is where I really got surprised. And this is where the aid just stuff comes. And that is. Everybody. And I did a whole bunch more research on this and everybody says if your older do not even put dates on the resume of when you did things, don't put anything on the resume. [00:58:51] That's more than 10 or 15 years old. And if you've got experience from back then, like I do, I could go in and be a cobalt programmer today. I did a lot of COBOL goading back in the seventies. IBM assembler. I did a lot of that. I even did 65 0 2 assembler for those that might remember that chip. [00:59:10] And I've done a lot of kernel work over the years. See is my language of choice and was for years as I maintained and developed code for the Unix kernels. So all of that. Out the window. And what you do is you put it under additional experience. And even if you're saying, Hey, listen I've been doing this. [00:59:30] Like I've mentioned to you guys before that I have what, over 35 years of cybersecurity experience and it's legit, right? You guys know I've been helping to develop the internet since the early 1980s, like 81 is when I got going a little bit in 83 is when I was into it pretty much full time. But apparently that's unknown nowadays. [00:59:55] So instead of saying, Hey, listen, I've got 40 years of actually I've got closer to 45. I started in 75. I think it was in networking. IBM, networking, the old RJE and stuff. That's a no. I should say 10 plus years of computer network experience, because apparently what's been happening is these machine learning tools that hiring managers are using our age just now businesses are using them because of this problem we just talked about here from the New York times, recruiters are even getting hard to find. [01:00:37] And employees are some in some towns, some cities wages are up 10% in the it area, just in general, let alone cyber secure. So you've got to go through automated systems now, as opposed to a person that's always been tough dealing with HR because HR, they, they don't know the business. They certainly don't know the jobs. [01:01:02] They just got some bullet points, outlines that they're working with. So w we'll talk about this more. When we get back, I'm going to go through some points here, Korn ferry, and others have a lot of good points. And as I said, we should probably try and get Robert half on at some point they're local here. [01:01:19] So anyways, visit me online, sign up right now, Craig Peter sohn.com and stick around. Cause we've got a lot more to go. [01:01:28] We talked a little bit about the jobs, what it looks like out there, what recruiters are doing. I'm going to review here now the resumes, really? What should you have on them? Particularly if you're a little. Older like me.  [01:01:44] New York times. Great article about this. And I am also going to show you this other little article from wired here. We're going to go full screen for those of you watching here online, but the tech companies are really getting desperate. This is a chief economist over Dorsha. Published in a report saying the people are resigning at the highest rates since 2009. [01:02:14] Huge numbers are leaving the labor market entirely and more than 80% do not want a job. The highest on record since 1993. That's absolutely amazing looking at these numbers. So this whole great resignation as it's called has really widened the gap. Let me make these, this text a little bigger for you guys. [01:02:39] And there have been some huge gaping holes. In the workforce out there. S I T in general is really looking for people big time, cybersecurity, also looking for people. And I'm in the process right now of hiring a couple more. And let me tell you, it's more difficult than it's ever been before. In it alone. [01:03:05] This, again, this is according to wired. 31% of workers actively sought out a new job between July and September last year. That's the highest amongst all industries, according to Gartner guys that make all this, these studies that they sell to businesses, data from global. Knowledge found 76% of global. [01:03:27] It decision-makers are dealing with critical skills gaps on their teams, multiply the problem across other tech roles. And it's clear that there's a massive skills shortage and it's just amazing. They have. Sign on bonuses on top of sign-on bonuses, they're trying to move. Hey, we've got better snacks. [01:03:49] And Facebook does out there in the bay area of California. They're having people working from home now. It's Hey, if you want to work from home, you can. Most people are w one of my sons just got a job. He. Performing kind of a CSO function. Like I do. He's worked with me for more than 10 years and that he is just working from home. [01:04:14] He's never actually stepped foot in the office and he has been doing everything virtual, including the whole interview in process. Absolutely amazing. So they're calling this stuff a golden. Hello. In the business already saying, Hey, I didn't get one of those. Yeah. Cause you've been working there for five years, but everyone internally recognizes it's an unusual situation. [01:04:40] And for us to continue to grow, we need to be. Competitive there's sign-on bonuses and they found those have not been effective in the it world because candidates are looking to maximize the opportunity to get much higher salaries elsewhere. Now, I did a proposal. I'm working with a company right now, and I did a proposal for them to provide some of these fractional chief information security officers. [01:05:08] Function. I'm helping to define where they need to go, how they need to get there. I'm doing all the documentation on everything I'm working on, the HR policies everything, including securing the networks, helping them get the hardware, running it, renting them stuff right off the bat so that they can secure themselves very quickly. [01:05:27] Whole bunch of stuff that I'm doing for. And it, frankly, I think it makes a lot of sense, but how could they possibly hire somebody like me? How could they hire someone like my son? So I went online to glass door. You might know about that website, glassdoor.com. It lets you check out businesses. What jobs might they have open and look at reviews from an employee's standpoint of. [01:05:57] Glassdoor is pretty good for that. And I looked at salaries right now. Somebody like me, that is a CSO makes between 250 and $900,000 a year, depending on the size of the county. Now that's real money. Last time I checked, even with the inflation that we're looking at right now, I don't know. Maybe I won't keep up with it. [01:06:23] I saw some inflation numbers. Of course, they move these out of the consumer price index because it would make it look bad. But some of these inflation numbers are over 20%. It's just not. So thank a salary, 250,000 to just shy of $900,000 a year. Salary. Plus load, which you have to add normally what about 30%? [01:06:48] And then plus all of the equipment, plus the CSO needs a team, everything else. This is a huge problem. And they need to be hiring people to fill those jobs they use. These are just amazing. Permanent remote positions in the us doubled from 9%, 18% during the last quarter of 2021 doubled in the last quarter of last year ladders. [01:07:18] And. All on jobs. This is according to the ladders. Okay. And it could increase to 25% by 2020 since making the transition to remote. First, we have been able to broaden our hiring options globally and not be restricted to a talent pool in one area. Now that's an interesting thing too, and that presents some interesting problems. [01:07:42] It's one thing to manage people who are out of the. Upbringing as you are that have the same standards that you are and hiring somebody from somewhere else in the world, they're going to have different expectations. And boy, have I found that by hiring teams in India, Russia, and the Philippines, as well as the us. [01:08:08] Big differences. So you gotta be, you gotta be careful with all that. Okay. So I promised I would get here into resumes for people like us, right? This is not what they say. And this is particularly interesting to me because again, I'm still working and I do it on a contract basis, obviously. I provide these services. [01:08:29] This is something I think that applies to me too. So I'm pulling up a page. You can see on the screen, this is from the muse.com and it's called smart moves, age proof resumes for older workers. Okay. And they have four of them set up and they've got a nice picture of a lady. Looks like she's working from home with age, comes, wisdom and experience. [01:08:51] That's why I was shocked. When I saw what was going hot and right. Where they were going ahead and saying, don't put anything on your resume. That makes it look like you're older. Okay. The quote here is age-ism is an unfortunate and very real part of the job search for older workers. And for some, it can start to creep into their experience as early as their forties. [01:09:17] Isn't that incredible? Absolutely incredible. It's, I kinda dealt with this way back when, in the eighties, because I was younger then obviously than I am now. And there's this impression, at least there was, and it seems just still be around. But somehow if you're working with newer technologies, you need young people to do. [01:09:40] That is not true. As I've said a million times, there's only a few ways that you can code something. So if you're a programmer and you want to solve a problem, there's really only a few ways to do it. In fact, there's books published with algorithms. That's the. Programmed stuff, right? The core of the programming that show you how to do things. [01:10:04] So w we'll be back in just a minute, take a minute. Visit me online. Craig peterson.com. I love to see you there. And when we get back, we're going to finish this discussion, but it's an important one for employers as well as employees here, because I think many businesses are making a huge mistake. Craig peterson.com. [01:10:32] We just talked some more about hiring. Age-ism the problems that come with that for both the employer and the employee. And we're going to get now more into this from the muse. We're going to talk about the four things you should be doing with your resume. [01:10:48] There's there's a lot to be said for having experience. I mentioned about how businesses who are hiring programmers should really rethink the idea of hiring the young guy that knows the latest programming languages. [01:11:07] Because again, There are so many things that you need to know besides how do you code this line? It's what Google did for many years. It probably still does. They don't want you to necessarily write a program in go, which is Google's latest, cool language, but they want you to solve a problem. They want to see your problem solving skills. [01:11:32] How are you going to do it? Nobody has more skills than someone that's been doing that for decades. Again, there's only so many ways to program something. I don't care what language you're using. We used to have a saying, you can write COBOL in any language, but it's true. That's all we used to say. [01:11:53] So when it comes to it in general, the older the person is the more experience they have in the field. The better off they're going to be with your company. Because again, there's only so many ways to break into a computer. Yeah. There's the latest, greatest virus out there, but managing people, managing expectations, working with senior staff, doing presentations for investors. [01:12:23] That's the sort of thing that takes experience. How do you get that experience? There's only one way and that's to get the experience. It takes time learning a new programming language for a programmer, not a big deal at all. Again, there's only so many ways to do something and a programmer like me. [01:12:41] That's done a lot written hundreds of thousands of lines of code, and at least a dozen computer languages. Pick it up. A new language is easy. I picked up Python and was able to be programming in it. Using API APIs online, all of the newest ways of programming and interfacing with other backend systems. [01:13:03] I was able to write something that was putting together a whole bunch of cybersecurity stuff from scratch in the matter of a couple of hours on a language I'd never used before. Okay. How do you deal with that? It's the question of the hour, right? So let's have a look at this article here from the muse. [01:13:24] They've got some suggestions for us. No. If you've been in the work case for workplace, excuse me, for decades, you've got a lot of experience, but putting it all down can be a real liability. I remember I used to have a a dossier. I had a resume, which was like a one pager. Then I had a dossier. The one on for 30 plus pages of all the things I had done. [01:13:51] I wrote some of the very first I designed and implemented and used for a customer, some of the very first firewalls ever made routers, load sharing. But do I want to put that all on the resume? Probably not, but I understand that technology extremely well. So the resumes don't have to be a single page, but it's saying, remember it doesn't have to be a memoir. [01:14:19] It doesn't have to be like my dossier going through everything to prove your worth. And what they're saying here specifically. This is a Gary Sussman. It's just a marketing tool whose sole purpose is to land you an interview. It doesn't have to be exhaustive and comprehensive just has to show that you can solve the problem. [01:14:40] The hiring manager is hiring someone to solve and the beauty right now, again, if you're in the it, if you're in cybersecurity is they need. People. So it's going to be easier to get through. And if you are an older person who has learned a bit about cyber security, maybe taken an online course or two, that you have a much better job or a chance of getting hired for job than you probably have ever had. [01:15:06] Okay. It goes on and on employers are most interested in how your recent work ties back to the job that you're applying for rather than your experience 15 years ago. Okay. That makes sense. So dedicate more resume space to detailing the positions you've held over the past to 10 to 15 years that are related to the job. [01:15:30] Number two, do not date yourself. No. I mentioned earlier in the show that most businesses now are using some form of machine learning call it artificial intelligence, whatever you might want to call it, but they are doing the initial cuts. So they're looking for buzzwords that's for sure. Okay. And. [01:15:53] What they're also looking for

This Restorative Justice Life
59. Retethering and Reflecting in Restorative Justice w/ Kathy Evans

This Restorative Justice Life

Play Episode Listen Later Nov 4, 2021 90:03 Transcription Available


Katherine Evans has been a professor in teacher education at Eastern Mennonite University since 2011. She teaches courses in educational psychology, special education, and restorative justice in education (RJE). You will meet Kathy (1:30), hear about how she got started in this work in schools (12:48), and learn the importance of retethering to your soul (30:05). Kathy explains the need to redefine grading (36:00) and making need for silence (39:10). She shouts out some good books about restorative justice (44:31) and talks about decentering whiteness (53:35). Finally, she answers the closing questions (1:00:10).Make sure to subscribe, rate, review, and share!Contact, Learn More, Support Kathy Evans:Website: http://www.emu.edu/maed/restorative-justice/ Get your copy of “The Little Book of Restorative Justice in Education” with Kathy Evans and Dr. Dorothy VaanderingWatch clips of the podcast: http://youtube.com/c/amplifyrj See all our workshops and courses at http://amplifyrj.com/learn Future Ancestor Collective (Community Gatherings): http://tiny.cc/ARJcommunity Rep Amplify RJ Gear at http://amplifyrj.threadless.com You can connect with Amplify RJ:Email list: http://tiny.cc/ARJemail Instagram: http://instagram.com/amplify.rjLinkedIn: http://linkedin.com/in/restorative-justice Facebook: http://facebook.com/amplifyrjTwitter: http://twitter.com/amplifyrjWebsite: http://amplifyrj.comReading list: http://amplifyrj.com/reading-list

Dnevna Doza Motivacije
ŠTO NAPRAVITI KADA POSTIGNEŠ CILJ?

Dnevna Doza Motivacije

Play Episode Listen Later Aug 12, 2021 7:06


Ljudi me često pitaju: „Smiljane, što napraviti kada postigneš cilj?“ Rješenje je jednostavno. Morate zavoljeti proces. I zašto je tako bitno zavoljeti taj proces, taj put do ostvarenja cilja? Mogu vam garantirati, kada ostvarite svoj cilj, suočavat ćete se sa novim izazovima. Ovaj vam podcast objašnjava kako to izbjeći kad se sljedeći put snađete u sličnoj situaciji. Želite li raditi sa mnom? Uz moju pomoć i mentorstvo možete postići sve poslovne i financijske ciljeve. Izgradite karijeru u poslu u kojem ćete biti vlastiti šef, uz fleksibilno radno vrijeme i priliku za izuzetno visoke prihode. Posjetite najposao.com i ispunite anketu. Radujem se našoj suradnji!

Craig Peterson's Tech Talk
Are You Getting Dragged Into Dealing With Cybersecurity?

Craig Peterson's Tech Talk

Play Episode Listen Later Aug 5, 2021 10:06


Are You Getting Dragged Into Dealing With Cybersecurity? Craig Peterson: You probably know I've been doing cybersecurity now for 30 years in the online world. Yeah, that long. I'm afraid I have some confessions to make about our relationships here, cybersecurity people, and employees. I got pulled into this whole business of cybersecurity quite literally, kicking and screaming. I had already been involved in the development of the internet and internet protocols for a decade before. In fact, one of the contracts that I had was with a major manufacturer of computer systems. [00:00:39]What I did there was design for Unix systems a way to check for malware and manage them remotely. Yes, indeed, I made one of the first RMM systems, as we call them nowadays. We also tied that RMM system, of course, into Windows and a few other operating systems. Unix was where I was working at the time. [00:01:05] I am what they called an OG in the industry. My gosh, my first job with computer networks was back in 75. Believe it or not, a long time ago. Back then, of course, it was mainframe to mainframe basically and some of the basic protocols, the RJE, and stuff. I know I've got many older people who are listening saying, yeah, I remember that. It brings back memories. [00:01:32] In fact, I got a note just this week from a listener who was saying his first computer was a Sinclair. Do you remember those things? Oh my gosh. It brought back so many memories for us older guys. But it was just such a great little device with the keys and much different than I'd ever seen before. The XZ81. I just looked it up online so I can remember what the model number was. Timex made that. Suppose you can believe that too. It's just. Wow. It had a Z 80 CPU, which of course, was like an 8080, which was Intel's big chip at the time, running at 3.25 megahertz. Yes, indeed. Very cool. I love that computer anyways. I digress. [00:02:22]The whole industry at the time was non-existent, yeah. You had antivirus software. We started seeing that in the eighties. We had some terrible operating systems that many people were running like Windows, just absolutely horrific. [00:02:40] Remember windows three-point 11 and XP and millennial edition just some of the most terrible software ever. That's what happens when you have interns? A lot of the code came out in one of the lawsuits for one of these versions of Windows. [00:02:55]It was a different world, and I had to figure out what was going on because I had some servers that were Unix servers. This was the early nineties, and I hosted email for companies and websites and filtered things with some precursor to SpamAssassin. It was really something. I had some DECservers, Digital Equipment Corporation. Remember those guys, and suddenly, customers started calling me because the email wasn't working. It turned out it was working, but it was extremely slow, and I had to figure out why. [00:03:37]I telneted to my server. I got on, started poking around the servers. [00:03:43] I had a computer room and the first floor of the building I owned, and I was on the second floor. So off we go looking around, trying to figure out what is going on. It was me, actually. I said we, but it was really me. Cause I knew the most about this stuff. [00:03:59] These processes just continued to fork, and I was trying to figure out why it is creating all these new processes. What's going on? What has happened here? Back then, The internet was a much different place. We trusted everybody. We had fun online. We would spam people who broke our almost unwritten internet rules about being kind to other people. What spam was, where the whole term comes from is you would send the script from Monty Python spam and eggs, spam and ham spam, spam, spam routine. [00:04:37]You send it to somebody that was breaking these unwritten rules, like trying to sell something on the internet. Absolutely verboten. What a change to today. [00:04:48]I saw some of this stuff going on. I was trying to figure out what it was, but we trusted everybody. So my mail server, which was Sendmail, at the time. We still maintain some instances of Sendmail for customers that need that. [00:05:04] Nowadays. It's usually more something like postfix in the backend. You might have Zimbra or something out front, but postfix in the backend. We allowed anybody on the internet to get on to our mail server and fix some configuration problems. They didn't have full access to everything. Firewalls weren't, then, what they are today. [00:05:29] In fact, one of our engineers just had to run out to a client who did something we told them not to do. They were using the SonicWall firewall on their network, as well as they had our stuff. So we had an excellent Cisco firepower firewall sitting there. So then they have this SonicWall so that they're people, remotely could connect to the SonicWall firewall because it's good enough. SonicWall says it's compliant. So the SonicWall firewall was being used to scan the network and load stuff. Does that sound familiar? Much to our chagrin. [00:06:08] So he had to run out and take care of that today. It sounds like we might have to do a rip and replace over there restore from backups. You have no idea what these bad guys might've done. We've seen Chinese into these networks before, Chinese malware. It's not been very good. [00:06:23]Boy, am I wandering all over the place? [00:06:24]Back to this, we would allow people to get onto our network to fix things. If something was wrong, if we were misconfigured, they could help us and get on and do it because the Sendmail configuration was not for the faint-hearted. [00:06:42]In the days before Google, right? Eventually, we had Archie and Veronica, and Jughead. They did basic searches across FTP servers. That's my kicking and screaming story. [00:06:56]I was trying to run a business where we hosted email for companies, which we still do to this day, and where we had some, back then we didn't have websites. The web didn't come in into play until a couple of years later, but we did host FTP sites for businesses so that they could share files back and forth. [00:07:22]That's what I wanted to do. That was my business. [00:07:26] Later on, I ended up helping 80% of my clients find the other web hosts after these $8 Gator hosting things. We just got a call on that this week. Somebody who'd been a client of ours 20 years ago went with a guy that charges $5 a month for web hosting. They have personally identifiable information on that site if you can believe it. He was complaining because it wasn't working. He was getting a C-panel error anytime he went to the site. We said, Hey, listen, this problem is the guy that you're hosting from. We did a little research, and we checked the IP address and how many sites we're at that IP address. This guy that was charging them $5 a month had 150 different websites at that one IP address. Now that's not bad. He hosted all of these 150 at a site that charges the eight to $10 a month for Webhosting.   [00:08:29] He had all of these sites on top of a server that already split up hundreds of ways. It's just amazing what people do. [00:08:38]Man alive.  We got rid of 80% of those customers, the ones that wanted cheap, that's fine, get greedy, and see what happens to you. But, some of them still maintain a good relationship with us, so we help them out from time to time, right? [00:08:52] What am I going to do? So somebody calls me, I gotta help them. That's precisely what we do now with this malware problem. [00:09:01] What's going on here? We talked already about the Great Suspender and how Google has said, Hey, this now has malware in it, so we're removing it from your web browsers. That, to me, makes a ton of sense. Why not do that? [00:09:18]This is another example of what happened with SolarWinds. This is an example of a supply chain infection. What happened with that? Somebody bought Great Suspender from the developer and then added this basic malware to the Great Suspender. Just it's a terrible thing. Very surprising, but one of the most significant exploits used by the bad guys right now is the security team's poor relationship with other employees within the organization. [00:09:56]What's going on, and it goes back to this customer that we just had to run out to. [00:10:01] Why did they do what we told them not to do?

Human LAB Podcast
Awaken Mind, Adaptogene Gljive, Lion’s Mane, Cordyceps, Reishi, Biohakiranje:MARGARITA ŠIKIĆ | Human LAB Podcast #26

Human LAB Podcast

Play Episode Listen Later May 30, 2021 127:07


"Ti ne moraš imati novac da bi bio zdrav"-Margarita Šikić Razgovor možete pronaći na youtube kanalu, Spotify-u, te svim ostalim platformama za pružanje audio reprodukcije podcasta. Margarita Šikić Margarita je pionir u Hrvatskoj kada je riječ o adaptogenima. Prije svega mlada poduzetnica sa velikim interesom u poboljšanju vlastitog zdravlja i funkcioniranja u svakodnevnom životu. Osnivač je brenda Awaken Mind. Rješenja inspirirana inteligencijom prirode. I to u svakom pogledu. Margarita nam na ova područja donosi priču o adaptogenima. -adaptogen povećava otpornost organizma na širok spektar „neprijateljskih“ stanja organizma, u što spadaju fizički, kemijski ili biološki faktor-adaptogen ima ulogu normalizacije organizma, odnosno ispravljanja poremećaja uzrokovanih stresnim stanjima i agensima-adaptogen mora imati neštetno djelovanje na organizam (ako se uzima u propisanom obliku i propisanim dozama), bez obzira na to što djeluje na širok spektar poremećaja. Neki od najpoznatijih adaptogena su: Lion's Mane, Reishi, Cordyceps, Ashwaganda i mnogi drugi.. Lion's ManeJedna od najljepših gljiva čiji izgled podsjeća na maleni snježni vodopad, na hrvatskom jeziku naziva se Resasti igličar ili Lavlja griva (Lion´s Mane).Ovu medicinsku gljivu nazivaju prirodnom hranom za neurone, zbog njene sposobnosti da obnavlja živčani sustav.Američki i kineski stručnjaci uspjeli su iz lavlje gljive izdvojiti dva aktivna sastojka – hericenon i erinacin - koji potiču proizvodnju faktora neuronskog rasta (NGF).Najvažniji sastojci lavlje gljive* derivati cyathana (diterpenoidi)* beta-D-glukan* ergosterol (provitamin D2)* erinacini Q i R* ksilan* glikoksilan* mano glikoksilan* galaktoksilo glukan* hetero beta glukan ReishiReishi gljiva, poznata i pod imenom Ganoderma lucidum potječe iz toplih i vlažnih predjela Azije, a godinama je upravo ona bila najvažnija biljka istočnjačke medicine, posebno u Kini i Japanu.U reishiju nalazimo nekoliko molekula, koje uključuju triterpenoide, polisaharide i peptidoglikane koje se smatra zaslužnima za zdravstvene benefite ove biljke.Kako stoji u studiji koju je proveo Lin, jedno od najvažnijih djelovanja Reishi gljive je njezin utjecaj na imunitet. Iako nije potpuno jasan način djelovanja, čini se da reishi utječe na bijela krvna zrnca, koja su ključan dio imuniteta. Također, potvrđeno je i da reishi smanjuje upalne procese unutar bijelih krvnih zrnaca što također doprinosi jačanju imuniteta.Mnogi se odlučuju za uzimanje reishija zbog njegovog potencijalnog antikancerogenog djelovanja. Studija koju su proveli Bao i sur. nad preko 4000 osoba koje su preživjele karcinom dojke pokazala je da ih je oko 60% tijekom liječenja uzimalo reishi gljivu. CordycepsPrvi put je zabilježena u Tibetu, pod nazivom yartsa gunbu, u 15. stoljeću.Glavni razlozi za njezinu primjenu leže u želji za povećanjem otpornosti organizma, poboljšanjem libida te postizanjem veće radne učinkovitosti i boljih sportskih rezultata.Njegova primjena se preporučuje i kod pada vitalnosti organizma, a osobito kod karcinoma, impotencije te bubrežnih bolesti.Cordyceps štiti bubrege od oštećenja te liječi upale, loše funkcioniranje i zatajenje rada bubrega.Cordyceps ima antiupalna svojstva -  dokazana je njegova učinkovitost kod reumatoidnog artritisa.Štiti od kardiovaskularnih bolesti - regulira rad srca, poboljšava protok krvi, snižava visoki krvni tlak, smanjuje razinu kolesterola i triglicerida, sprečava stvaranje krvnih ugrušaka.Cordyceps je efikasan i protiv infekcija jer djeluje na viruse, bakterije, gljivice i parazite. Sa Margaritom smo proli brojne teme, kako one aktualne o trenutnom stanju, načinima kako prevenirati brojne posljedice i o raznim načinima kako unarijediti svoje tjelesne ali i mentalne funkcije.Sve smo to stavili pod jedan naziv a to je Biohakiranje. Definitivno mogu reći da je ona jedna od pravih biohakreica. Svoj život pokušava što je više moguće podrediti zdravlju i kvaliteti življenja.

Craig Peterson's Tech Talk
Tech Talk with Craig Peterson Podcast: What really happened in TX, New MAC malware, Apples Electric Vehicles and More

Craig Peterson's Tech Talk

Play Episode Listen Later Apr 3, 2021 79:15


Welcome!  We have had a very busy week this week so this is a reply of the show aired the end of February.  I'll be back next week. It was also another busy week on the technology front and we are going to delve into what actually caused the energy problems in Texas.  There is a new type of malware that is affecting Macs and it is has a different MO.  Then we are going to discuss Apple and their ventures into automated electric cars and what we can expect. Why are states having issues making appointments for vaccines? In a word, it is bureaucratic incompetence. Then we have a new type of hack out there.  It is called Buy-to-Infect and there is more so be sure to Listen in. For more tech tips, news, and updates, visit - CraigPeterson.com. --- Tech Articles Craig Thinks You Should Read: This Basic Math Shows How Wind Energy Failures Contributed To Texas’s Deadly Power Loss An Insider Explains Why Texans Lost Their Power New malware found on 30,000 Macs has security pros stumped Report: Nissan shot down Apple deal to avoid becoming Foxconn of cars N.Y.’s Vaccine Websites Weren’t Working Apple is already working on developing 6G wireless technology Owner of an app that hijacked millions of devices with one update exposes the buy-to-infect scam Mount Sinai study finds Apple Watch can predict COVID-19 diagnosis up to a week before testing Malware Exploits Security Teams' Greatest Weakness: Poor Relationships With Employees --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] You probably know I've been doing cybersecurity now for 30 years in the online world. Yeah, that long. I'm afraid I have some confessions to make about our relationships here, cybersecurity people, and employees. Hi everybody. Craig Peterson here. I'm so glad to be here. I'm happy you're here as well. There are so many ways to listen. I got pulled into this whole business of cybersecurity quite literally, kicking and screaming. I had been already involved in the development of the internet and internet protocols for a decade before. In fact, one of the contracts that I had was with a major manufacturer of computer systems. What I did there was design for Unix systems a way to check for malware, a way to manage them remotely. Yes indeed, I made one of the first RMM systems, as we call them nowadays. We also tied that RMM system, of course, into Windows and a few other operating systems. Unix was where I was working at the time.  I am what they called an OG in the industry. My gosh, my first job with computer networks was back in 75. Believe it or not a long time ago. Back then, of course, it was mainframe to mainframe basically and some of the basic protocols, the RJE, and stuff. I know I've got a lot of older people who are listening who are saying, yeah, I remember that. It brings back memories.  In fact, I got a note just this week from a listener who was saying his first computer was a Sinclair. Do you remember those things? Oh my gosh. It brought back so many memories for us older guys. But it was just such a cool little device with the keys and much different than I'd ever seen before. The XZ81. I just looked it up online so I can remember what the model number was. That was made by Timex. If you can believe that too. It's just. Wow. It had a Z 80 CPU, which of course was like an 8080, which was Intel's, big chip at the time, running at 3.25 megahertz. Yes, indeed. Very cool. I love that computer anyways. I digress.  The whole industry at the time was non-existent, yeah. You had antivirus software. We started seeing that in the eighties and we had some terrible operating systems that many people were running like Windows, just absolutely horrific. Remember windows three-point 11 and XP and the millennial edition just some of the most terrible software ever. That's what happens when you have interns? A lot of the code, it came out in one of the lawsuits, for one of these versions of Windows.  It was a different world and I had to figure out what was going on because I had some servers that were Unix servers. This was the early nineties and I was hosting email for companies and websites and doing some filtering and things with some kind of precursor to SpamAssassin. It was really something. I had some DECservers, Digital Equipment Corporation. Remember those guys and all of a sudden customers started calling me because the email wasn't working.  It turned out it was working, but it was extremely slow and I had to figure out why.  I telneted to my server. I got on, started poking around the servers.  I had a computer room and the first floor of the building that I owned and I was up on the second floor. Off we go looking around trying to figure out what is going on. It was me actually. I said us, but it was really me. Cause I knew the most about this stuff.  There were these processes that just continued to fork and I was trying to figure out why is it creating all these new processes. What's going on? What has happened here? Back then, The internet was a much different place. We trusted everybody. We had fun online. We would spam people who broke our almost unwritten rules of the internet about being kind to other people. What spam was, where the whole term comes from is you would send the script from Monty Python spam and eggs, spam and ham spam, spam, spam routine. You just send it to somebody that was breaking these unwritten rules, like trying to sell something on the internet. Absolutely verboten. What a change to today.  I saw some of this stuff going on. I was trying to figure out what it was, but, we trusted everybody. So my mail server was Sendmail, at the time. We still maintain some instances of Sendmail for customers that need that.  Nowadays. It's usually more something like postfix in the backend. You might have Zimbra or something out front, but postfix in the backend. We allowed anybody on the internet to get on to our mail server and fix some configuration problems. They didn't have full access to everything. Firewalls weren't then what they are today. In fact, one of our engineers just had to run out to a client who did something we told them not to do.  They were using the Sonic wall firewall on their network as well as they had our stuff. So we had a really good Cisco firepower firewall sitting there, and then they have this SonicWall so that they're people, remotely could connect to the Sonic wall firewall, because it's good enough. SonicWall says it's compliant. The SonicWall firewall was being used to scan the network and load stuff. Does that sound familiar? Much to our chagrin.  So he had to run out and take care of that today. It sounds like we might have to do a rip and replace over there restore from backups. You have no idea what these bad guys might've done. We've seen Chinese into these networks before, Chinese malware. It's been really bad.  Boy, am I wandering all over the place?  Back to this, we would allow people to get onto our network to fix things.  If something was wrong, if we were misconfigured, they could help us and they could get on and do it because Sendmail configuration was not for the faint-hearted. In the days before Google, right? Eventually, we had Archie and Veronica, and Jughead. They did basic searches across FTP servers. That's my kicking and screaming story. I was trying to run a business where we hosted email for businesses, which we still do to this day, and where we had some, back then we didn't have websites. The web didn't come in into play until a couple of years later, but we did host FTP sites for businesses so that they could share files back and forth.  That's what I wanted to do. That was my business.  Later on, I ended up helping 80% of my clients find the other web hosts after, these $8 Gator hosting things. We just got a call on that this week. Somebody who'd been a client of ours 20 years ago, went with a guy that charges $5 a month for web hosting. They have personally identifiable information on that site if you can believe it. He was complaining because it wasn't working he was getting a C-panel error anytime he went to the site. We said, Hey, listen, this problem is the guy that you're hosting from. We did a little research and we checked the IP address and how many sites we're at that IP address. This guy that was charging them $5 a month had 150 different websites at that one IP address. Now that's not bad. He was hosting all of these 150 at a site, the charges, the eight to $10 a month for web hosting.  He had all of these sites on top of a machine that was already split up hundreds of ways. It's just amazing what people do.  Man alive.  We got rid of 80% of those customers, the ones that wanted cheap, that's fine, get cheap, and see what happens to you. Some of them, we still maintain a good relationship with and so we help them out from time to time, right?  What am I going to do? So somebody calls me, I gotta help them. That's precisely what we do now with this malware problem.  What's going on here? We talked already about the Great Suspender and how Google has said, Hey, this now has malware in it, so we're removing it from your web browsers. That to me makes a ton of sense. Why not do that?  This is another example of what happened with SolarWinds. This is an example of a supply chain infection. What happened with that? Somebody bought Great Suspender from the developer and then added in this basically malware to the Great Suspender. Just it's a terrible thing. Very surprising, but one of the biggest exploits that are being used by the bad guys right now is the security team's poor relationship with other employees within the organization.  I promise we'll get to this a little bit more and explain the bottom line here. What's going on and it goes back to this customer that we just had to run out to.  Why did they do what we told them not to do?  Stick around. We're getting into the battle between cybersecurity senior officers in companies, owners, business owners, and the, even the employees. There has been such a battle going on.  I saw two examples this week. Hi, everybody, it's a difficult world out there, but I find some comfort in listening to, of course, news radio. It keeps me up to date on what's going on. It helps me to really understand the world a lot better.  I mentioned that one of my guys just had to run out to a client who did something we absolutely told them not to do. They had been using this company that was a break-fix shop, I guess is the way you would put it. They had a business that would respond to problems and they charge by the hour. I think right now their hourly rate is like 160 bucks or something. It is not cheap, but anyhow, That they would sell people equipment and then move on, right? Your problems aren't my problems. Just leave me alone, go away.  It's a beautiful model because their employees at this break-fix shop don't have to understand much. They just have to know more than you do as a customer.  There's one level of understanding that you have, and for someone to appear to be an expert, all they have to do is have slightly more understanding.  That has bothered me so many times listened to the radio and they talk about somebody that's just this great expert, in reality, of course, they are not. But you don't know. That person talking about the expert doesn't know either because they just don't have enough knowledge. Of course, the person that's labeled the expert isn't going to say anything about it.  They were doing what most companies do, which is okay. We know we need a firewall, so let's get a firewall. They went out and they talked to this company and they did their Google research because of course, Dr. Google is an expert on everything.  Even with those differing opinions, you're going to go with the opinion that you like the best.  That's what they did.  They bought a Sonic wall firewall from this vendor, which was a break-fix shop. Now that's all well, and good. The sonic wall is not terrible stuff. They've got some amazing stuff as well. The problem is this device has been out of support for more than two years now. Even though they're not as advanced as some of the systems we can install, not that we always use the most advanced systems. It's not a bad, a little thing for a small business. We warned them that because they were using an out-of-date firewall that they could not get fixes for known vulnerabilities. Now that's a big deal too. Most people are not aware of the vulnerabilities that are on their machines. Do you go out every month and check the firmware versions on your firewall? You should be, even if you're a home user. Are you checking to make sure the firewall that the cable company provided you with is up to date, configured correctly? You've changed the password and the admin username, right? No?  Most people haven't. He hadn't, right. He didn't know. We told them we did a little research and said here's your problem.  That's part of his cyber health assessment. We told them what kind of firewall do you have? What's the version of software on it and we do that. We have a bunch of people that have asked for cyber health assessments. We've got them on a list because we're busy. So we have to schedule these and make them happen.  So we said, do not plug that machine in. Of course, what do they do? They plugged it back in again. So now all of a sudden this morning, we get a wake-up call from our monitors that are running they're on their  Cisco firepower firewall, where we have their extensive suite of additional software. This isn't just an off-shelf, Cisco firewall.  It's telling us that the SonicWall or something through our, via the SonicWall. Is going through all this customer's network. It's actually attacking the Cisco firewall from inside the network. Absolutely amazing. Why does that happen? In this case, the business owner, and it is a  very small business. It has about 5 million in revenue per year, I would guess.  It's a small business by every stretch. The owner just doesn't want to spend the money he doesn't absolutely have to spend. He's not looking at this saying I could lose all my intellectual property. I could get sued by these people. I could lose my clients who find out that their data was released. Their orders were released. Everything was stolen.  He looks at it and says, Oh wow. It's 200 bucks a month. Wait a minute guy, you have how many employees? You're worried about 200 bucks a month. I personally, I don't understand that. Why would you do that?  Now, you're in a poor country. Okay. I get it right. That's a lot of money to spend, but not here in the United States. Doesn't make sense.  A lot of this is really the reason I brought it up. It's showing how there is a disconnect between business owners, C-level people, and cybersecurity people. Basically, if you have less than 200 employees, you cannot afford to have your own cybersecurity team. It's impossible. It's way too expensive.  Then the numbers start to change outsourced cybersecurity, which is what we do.  We do this for this customer and. The in-house cybersecurity people, but we all have the same basic problem. The owner has a problem too, right? He has to weigh the costs of cybersecurity against the risks involved, which is what Equifax did.  What so many of these big companies do, right? There's this, the norm Equifax said it's going to be way cheaper to just pay out $10 million in fines. When we get fined by the federal government for losing everyone in the country's personal financial information then it is to do this or we're not going to bother.  Man, I'd love to see the smoking gun email on that, where they made that final decision, probably doesn't exist. They're smart enough to know that they would get sued and they have been sued because of this.  We've got another problem right now because of people working from home. I mentioned, in fact, this week, you should have gotten an email from me on Thursday. That was a little audio thing that I put together. We call these things, audiograms, and it's a kind of a video that'll play.  This particular one is about part of this problem. We've talked extensively about that water plant in Florida, that was hacked for lack of a better term. It might've been an insider thing. It might've been someone external, et cetera, et cetera. The reason it happened is that business, the water plant for a town of 15,000 people, which would be in a normal world, a small business. That small government operation was all of a sudden faced with lockdowns. What do we do? They didn't have a plan. They didn't have a business continuity plan, which is so important. I talked about it extensively last week as well. They had no way to manage this. So what did they do? They went out and bought team viewer licenses for everybody in the business. That put, well not the business, in this case, the agency, that put the agency at risk. That is putting our businesses at risk too, in such a big way. That's what the audiogram I emailed out on Thursday explaining this a bit.  So stick around. We're going to continue this conversation.   Of course,  you're listening to Craig Peterson online@craigpeterson.com. We have people working from home. We didn't really plan for this. We're doing it because of the lockdown. Maybe, you found that it's actually better for your business, from whatever angle. What are the risks here of people taking computers home? Hello. Everybody Craig, Peterson here. So glad to be with you today. Glad you're taking a few minutes out of your day as well to listen in.  Now I am very concerned about people using computers that they're taking home. I want to make a definition. Maybe there's a better way of saying this, computers that are used at home, home computers should never be used for work.  I'm going to explain why. Computers that are at work probably should not be taken home. We saw the example of this, just this last couple of weeks.  I was talking about this wonderful plugin that I've been using and recommending people use here for a very long time, called the Great Suspender. We've talked at length really about what happened there with the company being bought and then becoming evil, right? Just buying their way into 2 million people's computers.  Sometimes these Chrome extensions that are installed on personal computers get automatically installed and synchronized to your work devices. In fact, that's the default. If you log into Chrome and you're using Google Chrome as your browser and you log into it on your home computer, and when you log into your same account over on your business computer. All of a sudden, now it's syncing. It's syncing things like passwords, which you should not be having Google store for you. You should definitely be using a good password manager and there are a few out there.  If you're not familiar with them or don't know which one to use or how to use them. I have a great little special report on passwords and using password managers. I'd be glad to send it to you. Just email me@craigpeterson.com and I'll send that on-off, right? I'm not making a dime off of that. I want to make you safer.  I don't want to have happened to you what's happened to millions of Americans, including my best buddy who had his information stolen. I've been after him to use password managers. He never did it. I don't know why. Until his paycheck got stolen. Then he came over and I explained it and set it up with them and really helped him out. Maybe we should do a whole webinar showing you how to use these password managers, how to get them set up because it is a little bit tricky. It's certainly different than you're used to. Many people are using their browser Chrome in this example, to save passwords. When you go to a website, you'll automatically have the password there. Maybe you've got it set up so that it'll automatically log you in with all kinds of cool stuff. But there is a very big problem and that is that there is a huge risk with running these extensions, like the Great Suspender. The Great Suspender was approved by Google. It was in the Google store. You could download it from their app store. Absolutely free.   In January of this year in 2021, we had someone out on Twitter, tweet that there was a problem with the security on the Great Suspender. It had been changed. It was being used now to send ads out and other things. That's pretty, pretty bad. The extension wasn't banned until about a month later and you as an end-user had no official notification that this extension was potentially malicious.  Apparently, they could, with this malicious software they embedded, not just show you ad, not just insert their own ads to generate revenue onto the webpage as you were visiting, they could also grab files from your machine. That's a very bad thing.  Now, presumably, if you're at work, you have a team that's helping you outright.  The IT security team, there may be different teams and maybe the same person who also is the office manager, who knows. It does vary. Businesses cannot know what you're doing when you're starting to install those extensions and they are pushing their way onto your office computer because you're using the same Google account in both places. Now, despite the risks, of course, I installed this Great Suspender used it for years and I was pretty happy using it. I know many other people who were in the same boat. Security teams have some great tools. I mentioned my son who's one of our team members got called out to a client. During the break, I was just chatting with him briefly. What had happened is they plugged in this firewall we told them not to plugin. It was apparently hacked from the outside. It had known security vulnerabilities. He had not, this small business owner had not yet paid for maintenance on his little firewall, so he was not getting security updates. In fact, my team member looked at this and found that it had been three years since the firmware on his firewall had been updated. The bad guys got into his network through this secondary firewall, which we told them not to have not to plugin. Our firewall only noticed it because this malware started scanning everything on the network. Of course, it scanned two of our machines, one being the firewall.  Remember this isn't a regular firewall that we put in there. This is a firepower firewall with a whole bunch of extra software on top of it.  In our data center, we have some huge machines that are sitting there watching what's going on remotely. On our client's networks via that firepower firewall.  We started getting all these notices as to what was going on, but this is a great example. We're not updating some of that software. He had a security team and he ignored the security team. We were the security team. We're outsourced cybersecurity that's what we do, but that happens many times.  Many business owners and others look at the cybersecurity situation as having many different shades of gray. What should you do? What shouldn't you do? The teams that are working in these businesses, including us. We have to tell them, Hey, don't use that firewall. Do not plug it in. You don't need it. If you plug it in, it's going to make it way easier for some of your people to work from home.  This is not set up correctly and you're going to have problems. That's a difficult conversation to have with a business owner. We had it and he ignored it much to his peril. In this case, this one is hard to tell how much data was stolen from his business. The impact from this could last for months, and there could be investigations who knows what's going to end up happening here. That business owner and I, because I spoke to him as well about this whole situation before this particular event happened just about two weeks ago. In fact, that was a reminder cause they had plugged it in again. Six months before that we had told the business owner, you can't plug this thing in, you cannot be using it.  How do you do that? How do you let an impacted employee, somebody who's working from home, maybe using their own computer to do work for the business? How can you approach them and tell them, Hey, you cannot use Google Chrome?  You cannot save your passwords on your browser. You cannot install extensions. Even if you had a list of extensions today that were bad, that list is going to be out of date tomorrow, which is going to be a very big problem. Individual users do not have the ability to check this. Frankly, most businesses don't either. Again, that's why a business under 200 employees cannot afford to do this yourself. You just can't. This is a specialty.  We were talking yesterday with a prospect who had been brought to us by a break-fix shop and trying to get this concept through. We're going to talk a little bit more about that. What should you be doing? How can you pay attention? How can you even be safe in this day and age?  Hi everybody. Craig Peterson here. We've been talking about supply chain problems. That's a technical term for it, but the software that we rely on becoming evil, and what can we really do about it? Hello, everybody. You're listening to Craig Peterson.  How do you talk to a business owner and help them understand? That's a problem. Isn't it? Look at what happened a few years back with TJX stores. Them as maybe TJ max, that's one of their stores. They have a number of others. Their cybersecurity guys did something I have seen done before. That is, they went to the management of this massive public company and said, Hey, TJX, we need to get this hardware. We need to get this staffing. The hardware course pretty expensive and it sits there and it does much the same stuff. Even back then. Nowhere as good as today. It's exponential, as to how much better it gets every year, but it was good hardware.  It really could have stopped the hack that happened and it did.  Here's what it did. It noticed the hack was going on. The problem was they were able to say yes to the hardware, the senior management said yes. They got the hardware, but senior management would not get the security technicians that were needed to monitor and run that hardware. They were short-staffed.  That's another problem we're seeing. That's why the companies you're dealing with, whether it's Equifax, with who you do not have a direct business relationship with, and yet have all this information about you and sell that. Or maybe it's just some other website. That's why they lose your data. It's a real bad idea. The bad guys are just waiting out there just siphon all of your data. In many cases, when you're talking about a business and a business website, or even your home computer, they're looking to redirect you to malicious websites. What they'll do is for instance, again, the Great Suspenders' an example, that they claim it's been fixed now. With something like an extension or a plugin that you put in your browser, they could rather easily code it up so that you are going to a website that's malicious. It could look like Bank of America's website and you go there and you enter in your information. You put in your username, you put in your password, it asks you a security question. Maybe maybe not, but your username and password. Then it says incorrect. Then your screen refreshes while your screen just refreshed because you were not at the Bank of America, originally. You were at a malicious website and you entered in your username and password. Now the bad guys have your username and password to your banking system, to your login, to your bank accounts. They got that. That's all they needed. They didn't want you to know that this was going on so they just went ahead and redirected you over to the real bank website. Hence, the supposed reload.  It's a very big weakness here in how IT and security teams operate because too few security teams really can relate with the CEO and vice versa.  I've seen that all of the time with people working for me in cybersecurity, you've got a really good idea of what needs to be done, how it needs to be done when it needs to be done. To you, it's the most important thing in the world, right? You don't want the business to go under, you're going to lose your job, maybe your pension retirement plan is tied to that business. You don't want it to happen, but have you got the trust built up with the senior management?  Then how about the other side of this relationship? How about if you're a cybersecurity person? Even if, again, you're not a professional, you're just the person tasked with it in the office or you're the person tasked with it at home. How do you go to the other employees and tell them you can't use your Google Chrome account here in the office? How are you going to enforce it? How are you going to tell your husband or wife, Hey, that's dangerous? I don't want you installing any of these extensions on your computer. One of the really bad things that people do with their browsers is they put on these real fancy little extensions that give all kinds of extra wonderful information. It ends up as a toolbar and it lets you do searches on this site or that site. Maybe it keeps you up to date on the stocks that you have in your portfolio. You're telling hackers what stocks you own, really? It might be legitimate, right. But who knows? That's the problem. Something like that can really mess you up and send you to malicious sites. You know that your spouse is using that or your kids are using that. How do you talk to them? How do you solve those problems? It's a real problem.  There are some interesting tools that you can use, as professionals. There's a Slack channel I can send you to, if you're interested, actually, it'll be in the newsletter that comes out on Sunday. At least it should be under one of those articles. It is a problem.  Netflix, by the way, is really trying to help you out too. Not only did the Netflix security team provide some feedback for what's called the honest security guide, but it's also made some of its user tools, the tools that you might use at your home to find a movie, et cetera, it might help really to secure you.  Git Hub has this. It is called, this is a Netflix skunkworks, the stethoscope app. It's a desktop application created by Netflix that checks security-related settings and makes recommendations for improving the configuration of your computer. It doesn't require central device management or reporting. You can have a look at that. If you are interested, let me know. I can probably point you in the right direction to the stethoscope app. That's what we want to see in this honest security guide. You'll find it online. At honest security is a guide to your devices, security, which in the biz we call endpoint security and it is cool. You can run through all of this list is a big checklist and talking about why honest, and they're saying dishonesty stops you from doing the right thing.  That's why in my courses, I spend a lot of time, more time in fact, on the why than the how.  I want you to understand honestly, why you should or should not do something. There are so many people who are out there yelling and screaming, jumping up and down. Particularly your antivirus companies. You fake VPN companies who are trying to get you to buy their products that not only do not need in most cases but will actually make your computer less secure.  So we have to be careful about all of this stuff. We have to make sure we are talking. We've got to have a trust relationship set up with the owners of our business. Cause you guys, some of you, I know own businesses, some of you work for a business. We've got people listening to this all over the world and every continent I've even seen a listener down in Antarctica.  I really can say every continent. It's important that we know how to work with our fellow employees, with our management, with our family members, to help them to know what they need to do.  There is no time to wait. We have never seen as many attacks as we're seeing now. We've never seen the government using its resources to attack us more than we have now. We've never seen more billions of dollars stolen per year by the bad guys. There are some basic tenants that you can follow that will make you way more secure. And that's why you're listening. That's why I go through some of these things to help everybody understand.  That's also why I go ahead and make sure that I answer your emails. If you have a question, make sure you go ahead and ask. You can just email me at me@craigpeterson.com. If it's something urgent, I have a form on the bottom of my homepage  @craigpeterson.com. You can give me a little bit more information. I tend to keep an eye on that a little bit better than my general email, although I do use some amazing email software that helps me to keep track of the real email and get rid of the spam and put things in boxes and stuff  craigpeterson.com. It's that simple email me me@craigpeterson.com. If you have questions.  I hope that Google is going to continue to improve itself. I love the fact that they found out that this one extension was malicious. For those of you who might've just tuned in, we're talking about something called the Great Suspender something I've used for years, it became malicious, but they need to do more.  As people who are concerned about security, we just can't wait for the next incident. Just again, this client of mine, who we've been warning about this for months, he's stopped doing what we told him to do, and then decided well it's just too difficult. That's something we hear a lot from businesses. Oh, it just hampers the work. It hampers it because now we have to get permission from it in order to mount this particular drive or gain access to those files or materials. Yes you do, because we have to stop the internal spread of all of this malware and all of these hackers.  It is absolutely worth it.  All right, everybody. Thanks again for joining me today. I really hope you've been enjoying this. I have years' worth of podcasts out there and you'll find all of those at craigpeterson.com/podcast or on your favorite podcast platform.  If you subscribed under iTunes, you might've noticed, ah, yeah, I just released a whole batch there too. I expressed concerns about owning an Apple watch. I held off for a long time. I want to talk about these devices now, the security concerns, but also the amazing health tools that are built right in. Hey, welcome back. This Apple watch is really fascinating. It has been around now for six generations. There are a number of other watches that have had, or tried, I should say, to compete with Apple. They haven't been very successful. You might've noticed that. I have a friend that bought some watches for his family and to him that monitor all of the basic vitals and record them and send them up to his phone. It's a 20-ish dollar watch. He got it from South Korea probably are parts made in China, but it is an inexpensive watch and it does some of the basics at the other end of the scale. Let's have a look right now. I'm going to go to apple.com online, and we're going to click on watch. Here we go, Oh, my they've got special watches so you can buy their watches. It looks like the new one, the Apple watch series six for starting at 400 bucks or they have two different sizes. . They have a more basic watch called the Apple Watch SE that starts at about $300. You can still get the Apple watch series three. Now, these all can monitor high and low heart rates. They can give you irregular heart rhythm notification, but it's only a-fib atrial fibrillation, I think is the only one they can monitor, but all three of those can monitor that. As I said, my buddy's watches, he got for his family at 20 bucks apiece are able to do most of that as well.  These are water-resistant to 50 meters, which is really cool. The series six also has an ECG app. That is very cool. You open the app, you put your finger on the crown of the watch and it gives you an EKG right there on the watch and it feeds it to your phone. On your phone, you can turn it into a PDF. You can share it with your doctor on and on. It's just amazing. It's a three-lead type, I was in emergency medicine, right? A med-tech EMT, EMT-PD can't remember. I had a whole bunch of different certifications back in the day. But it's fantastic for that. It also has a blood oxygen app that monitors your blood oxygen levels. It ties all of this into their new exercise app, which is amazing. That ties into your phone or your iPad.  I will go down in the basement onto the treadmill and I'll select your treadmill workout.  It has dozens of them. Have you seen this really fancy treadmill? A couple of years ago they got in all kinds of trouble because they advertised it around Christmas time and apparently this woman really wanted a treadmill and she got one and she was all excited. All of these people jumped out of the woodwork. All your you're saying she's fat, et cetera. No, she wanted a treadmill. These are amazing treadmills because they have built into them. These streams and you can join classes, et cetera. With the Apple Watch, my iPad, and a subscription to this iHealth app, which you can get as part of this Apple plus thing you can buy for 30 bucks for the whole family, 30 bucks a month.  I don't know how many I have seen probably a hundred different workouts on there.  It has different workouts, different types of weightlifting, running, jogging, treadmills, elliptical machines, everything.  You can pick your pace. You can pick your instructor, you can pick everything. Then your Apple watch is monitoring your body. As you're working out. So it's telling you how many calories you've burned. What's your heart rate is to help keep your heart rate in the best range for you, depending on what kind of a workout you're doing. It also lets you compete against other people. Does this sound like an ad for the Apple watch?  You can compete with other people your age doing the same workout and see where you're at. I was really surprised because typically I am at the front of the pack when it comes to my treadmill workouts. That's really cool as well. Those are some of the basics. There are other things too, that Apple is doing. We've found, right now, that Mount Sinai just came out with an announcement and they said that the Apple watch can predict COVID 19 diagnosis up to a week before testing can detect it. Yes. Isn't that something? Not only can the Apple watch help with certain heart arrhythmias, but it can predict that you have COVID-19 too a week before testing normal testing. Those swabs can find it out.  This is from the journal of medical internet research, which is a peered review journal. And they found that wearable hardware and specifically the Apple watch can effectively predict a positive COVID-19 diagnosis up to a week before the current PCR-based nasal swab tests. They called this the warrior watch study. They had a dedicated Apple watch and the iPhone app, and they had some participants from the Mount Sinai staff and it required, of course, these staff members to use the app to turn on the health and data monitoring and collection, and also asked them to fill out a survey every day to provide some feedback about their potential COVID-19 symptoms. As well as other things like stress can obviously make your heart rate, go up your blood pressure, go up, et cetera. Oh. By the way, Apple, supposedly the rumors are, we'll have a BP sensor in the Apple seven that'll be out later this year, most likely.  So they had several hundred healthcare workers and the primary biometric signal. I know that the studies authors were watching was heart rate variability. This is fascinating to me because it's something that I learned about fairly recently. Then when I got my Apple watch, I read up more about this, but basically, heart rate variability is what it sounds like. It's your heart rate. Let's say your heart is beating at 60 beats per minute. It is not beating once every 10 seconds.  It is not beating once a second. Your heart rate will vary over the course of that minute. If you're healthy.  Obviously, a beat every 10 seconds isn't 60 a minute. Let's use that as an example. Somebody who's almost dead and has six beats per minute. The first heartbeat might be at 10 seconds. The second heartbeat might be at 22 seconds because your heart is supposed to vary its rate of contractions based on immediate feedback. It's not just that you're going out in your running and now you've driven up your heart rate and you're doing your cardio and it or you just walked up a flight of stairs or you stood up, which is another test, by the way, what we're talking about here. You might just be sitting there, but your cells have a different need for oxygen or for the blood. The heart slows down slightly or speeds up slightly.  This heart rate variability is something built into the Apple watch and into the iPhone app that you attach to the Apple watch. Isn't that useful without an iPhone, frankly? Then you can look at your heart rate variability right there.  They said, combining that with the symptoms that people reported, these Mount Sinai staff, that the symptoms that they reported that were associated with COVID-19 including fever, aches, dry cough, gastrointestinal issues, loss of taste and smell corresponded with changes in the heart rate variability. I thought that was just absolutely phenomenal because heart rate variability is considered to be a key indicator of strain on your nervous system. COVID-19 obviously is going to put a strain on the nervous system. Just very neat.  It says here that the study was not only able to predict infections up to a week before tests provided confirmed diagnosis but also revealed that participants' heart rate variability patterns normalized fairly quickly after their diagnosis or turning to normal run about one to two weeks following their positive tests. That's from a TechCrunch, that particular quote.   I am very excited about this, but I am also on the concerned side. I'm concerned because they are collecting vital data from us. All of the major companies, Google and Microsoft and Apple want to be the company that holds all of your personal medical records. We're going to get back to that when we come back here. What is happening? How is your doctor managing your medical records? I was really shocked to find out how that industry is working.  Of course, you're listening to Craig Peterson. Check it out online. Craig peterson.com. Welcome back. What are you doing? Are you asking your doctor how they are handling your medical records? Because I think you probably should based on what I learned just this week. Hi everybody. Craig Peterson here. Thanks for joining me.  We were just talking about health. We're talking about the Apple watch and the fact that there's a lot of competitors out there, some of them, a fraction of the cost. If you buy the Apple watch on terms, you're going to pay less in one month's payment on terms to Apple than you would for some of these other watches out there, but Apple watches do have more features.  Mine even has a built-in cellular modem. Even if I don't have my phone with me, phone calls come through to my watch and text messages, and I can respond and answer. It's really nice. Medically I am very impressed. It has been good at motivating me to do some exercise, to get up, and about just to do a bunch of things I had never, ever done before. Consider that.  It is collecting our data. Apple now has potential access to all of my cardiac data. They've got EKGs that I have run on my watch. They know about my heart rate. They know how often I exercise, and how hard I exercise when I exercise. They know all of this stuff about me. I had a conversation with someone just saying why does that matter? Maybe it's Apple, maybe it's somebody else. Why does it matter?  It does matter. Think about an evil genius, right? The thing about somebody that might want to target Americans and might want medical information about Americans. They can gather it in a number of different ways. We're going to talk about medical records here in a little bit. One of the things they could certainly do is grab all of our watch data. Some of these watches, including my Apple watch, have GPS built into them. When you're out running or jogging, you know where you went, you can plan your route and it'll remind you, Hey, turn here, turn there. That's one of the things I love about the Apple Watch when I'm using it with Apple maps out driving, it taps me on the wrist and reminds me, Hey, in 500 feet, you got to turn.  If I look at the watch, it'll even show me the turn I need to make coming up in 500 feet. It's really amazing. All of this information is being compiled and hopefully, it's being compiled by a company that we can trust. At this point, we can probably trust Apple. Hopefully, they're not going to be broken into. Now, their margins or profit is high enough that they certainly can afford a security team, one capable of defending them and defending our data. I hope they are. I suspect that they are for the most part. How about some of these others? We know Google, for instance, is in the business of collecting and selling our information, is having all of our medical information. Not just the stuff from our watches, but the stuff from our doctors. Are they to be trusted with that kind of information? Going back to that bad guy, that mad scientist we can, and probably do engineer viruses that are targeted at specific things. In fact, the Russians have been doing it. The Soviets' started it, they came up with a phage. That can attack certain viruses and it acts like a virus it gets in and does this little thing. We've got right now, these COVID-19 vaccines and they act like a virus they're messing with, well effectively, the DNA. In fact, it's the RNA, but it's pretending, Hey, I got a message from the DNA, here it is.  What if a bad guy knew that are a certain population in a certain area, and that area was right by this important military base or whatever they came up with something that would target them and they'd have all of the data to do it now. That's obviously an extreme example. A more common example would be that your medical data is there. It's being sold to advertisers and you're going to end up with something.  For instance, there's a company, very big company out there and they sell baby products. What they did was they tracked and they bought this information, but they tracked women who were purchasing certain things. Now, they weren't purchasing things that were directly related to having a baby, right? They weren't purchasing diapers or little jumpsuits or whatever it is. They were purchasing things that were not directly related maybe people wouldn't even think they were typically related to having a baby. Yet they were able to figure this out. They got that good with the data.  So they thought, Oh, okay let's get wise here. Let's send out a postcard, congratulating them on their pregnancy and offering them a discount on something. Yeah. Not a bad idea, frankly.  However, in this case, some of these moms I hadn't told anybody that they were pregnant yet and didn't want to tell anybody that they were pregnant yet. It fell on its face. Didn't it?  How about these ambulance-chasing lawyers that are out there? Are they going to want to gain access to this, to your medical records?  How about your employer? Your employer wants to know I'm going to train this person. Hopefully, they'll stick with us for a while, but is he going to be a burden on our medical plan? Keyman insurance, health insurance, life insurance. Have access to everything about you. That's what really concerns me about these, all of these devices.  Right now, pretty confident that I can give Apple this information and they will keep it pretty safe. But, I said the same thing about the Great Suspender, right? I don't know about the future.  Then I found something out this week that was in my mind extremely disturbing. We have a new clinic that we've picked up as a client. They needed to have security. They had a couple of little security issues. They were worried. They knew they were not HIPAA compliant. They approached us because they know that's what we do is cybersecurity and audits and remediation. Fixing the problems. We pick them up. They're a client. We're in there. They had told us in advance that all of their medical record systems were on-line. It was on the web. All they needed was a web browser to run their business. Okay. That could be a problem. It might be okay. The medical records manufacturer might have good security on all of the records. So we may be safe, although in HIPAA unless you have a business process agreement in place with that vendor if that data is lost, it falls back on the doctor's shoulders. Anyhow, what I found out was, first of all, it wasn't completely web-based, which just shocked me. I'm not talking about they have to scan records or they got the x-ray machine or whatever. It really wasn't web-based and secondarily the company they were using for the medical records was a free service.  The doctor, that clinic, was not paying for their medical records management software.  The way it works is this medical records management company when the doctor prescribes something when the doctor performs a procedure and bills and insurance company, it's all done through this one company and that company takes a chunk of their money. In some cases we found seems to have been inflating the bills that went off to the insurance companies and that, as it turns out is a common practice in the industry. According to the doctors at this clinic, I was shocked, amazed.  Something you might want to look at. Ask your doctors where are your records kept and are they secure? Now we had HIPAA. We thought that would secure it, but it doesn't.  Stick around. Hey, we got a name now for what happened to the Great Suspender and QR code scanner apps over on the Google stores. One at Google Play, the other one over on the Google Chrome store. It's become that popular. Hey, everybody, I wanted to mention this whole new category of malware really, and they're calling it, right now, Buy to infect. What happens is a bad guy, a malware guy buys a legitimate app and then starts infecting it.  We know, obviously, about the one that I've been talking about a lot the Google extension that I used to use all of the time, the Great Suspender. I mentioned this one a few weeks ago, it's called QR code scanner. It's been on the Google play store for a long time, had more than 10 million installs and then all of a sudden it became malicious.  This is a little bit of a different angle on it because, with the Great Suspender, the ownership of that software actually transferred to somebody. With QR code scanner, they were working on a deal with a company and this company wanted to verify the Google play account for QR code scanner. This is all according to the owner, the original owner of QR code scanner.  They said that what had happened is part of this purchase deal. I let them have a look and gain access to the software's key and password prior to purchase so they could confirm the purchase, which doesn't sound too bad. Apparently, as soon as they got a hold of the software's key and password, forget about the purchase, we're going to start infecting it right away.  It ended up getting that app, the QR code scanner app, pulled right from the Google play score store. Of course, now you don't need that quite as much because most of the phone apps when you go to take a picture, the camera apps have built into them, a QR code scanner.  I thought that was fascinating what they did. They totally cheated the company. They didn't even bother buying it. So a little word for the wise out there.  Got another Apple story cause this is showing how the computer industry is really shifting. We've talked about some of the shortages of chips and the shortages of computer chips are so bad that General Motors has had to shut down two-thirds of its manufacturing lines in at least one plant.  Every major automobile manufacturer is having problems making cars because they can't get the chips.  Remember nowadays, a car, a truck is essentially just a computer on wheels. Not really actually computer on wheels. It's really dozens of computers all linked together with a network on wheels.  Apple has been worried about that, right? Supply chain. That's one of the things you're supposed to worry about as a public company. What are the risks going forward including to my supply chain? Obviously your supply chain matters. You gotta be able to make something you need parts, right?  Apple has been upset with Intel for a while. You might remember Apple. When it first came out, was using a Motorola chipset, which was exceptional much better than the Intel chipsets.  Of course, that's my opinion, a lot of people agree with me. You had the 68000, 68010, and 20, et cetera. Very good chips.  When Apple started getting into the laptop business, that's when the problems started to happen.  These Motorola chips gave off a lot of heat and used up a lot of electricity.  At the time Apple looked around and said our only real alternative right now is Intel. Intel has a whole line of chips, different speeds, and they have mobile chips.  Those mobile chips use much less power than the Motorola chips for the main CPU.  They also use less battery. Those two go hand in hand and generate less heat. That's it all goes hand in hand. So they said, we'll start working with Intel. They did. Intel really disappointed them more than once, which is a shame. They disappointed them with the 64-bit migration. AMD, advanced micro devices, beat Intel to the punch. Shockingly Intel started making AMD compatible CPUs right. The 64-bit extensions to the CPU were AMD extensions. They had problems with some of their other chips as well. Mobile chips getting the power usage under control, the heat dissipation problems under control, and they never really lived up to what Apple was hoping for. What everybody in the industry was hoping for. In many ways, Intel has been a huge disappointment, which is really a shame.  We'll look at what they did to the industry, with these predictive instructions, the hyper-threading, and stuff. Where bad guys were able to bring a computer to its knees.  What does Intel say? Here's a firmware patch you can apply to our CPU, those little CPUs you pay upwards of $2,000 for a piece for one chip.  Those CPU's and by the way, it's going to, cut its performance by a minimum of 20%, maybe 50%, that's okay. What are you kidding me?  A lot of people were upset with Intel and Apple and Microsoft and everybody released patches that use the new Intel microcode. You might've noticed when this happened a couple of years ago that your computer slowed down. I certainly noticed, actually, it was little more than a year, anyway, I noticed it because I own a data center. That has a lot of Intel chips in it where we're running mostly Unixes, Linux, and BSD, but we're also running Windows. So the only way to work around this bug was to apply the patch and slow everything way, way down.  Imagine how Apple and Google felt with their huge data centers. IBM too. IBM has Intel-based data centers, as well as its own chips, and boy talking about phenomenal chips, as far as processing power goes, IBM, man, they are still the leader with the power chips and their Z series. That just wow. Mind-blowing.  Most of us are stuck in the Intel world. Apple said we can no longer trust Intel. So what are we going to do? Apple said we've been developing this chip for a long time. Apple took the chip design, they licensed it from this open sourcee type of company that has a number of members. They took this arm architecture and were able to improve it, and keep adding to it, et cetera.  They're still part of this Alliance. They started using these in their iPhones. The iPhones have been using these chips the whole time and they started improving them after they released the first iPhones.  Intel didn't really get them upset until a little later on, too. They came up with newer ones, faster ones, better ones, right to all of these A10 their bionic chips. They've got AI chips, machine learning chips, all Apple designed. Chips, of course, manufactured by third parties, but that's what Apple is using.  Apple has now said we expect all of their Macintosh computers to be based on Apple's CPU within the next two years.  There's already some really good ones out there right now that people like a lot. We've been using them with some of our clients that use Apple. Not everybody has had great luck with them, but Apple is not only ditching Intel, that's not the big story here. Apple's got some job listings out there looking to hire engineers.  So when we get back, we'll tell you more about what Apple is doing and what frankly, I think the rest of the industry should look at. Guess what? They are. It's been Intel versus the rest of the world. They've been winning for years in many categories, but now they're starting to lose, as major manufacturers are starting to leave Intel behind. But there's more to the story still. Hi, everybody.. Craig Peterson here. Thanks for tuning in. We're glad you're here.  In the last segment of the day, I want to point everybody to the website, of course. You can get my newsletter. It comes out every Sunday morning and it highlights one of the articles of the week. It gives you a pointer to my podcast. So you can listen right there. There's just a lot of great information. Plus I'm also doing little training. I'm sending out, hopefully, next week, two little training sessions for everybody to help you understand security a little better, and this applies to business. However, it's not. Strictly business, much of what I talk about is also for home users. So if you want to go along for the ride, come along, we'd be glad to have you. There's a lot to understand and to know that you won't get from anywhere else. It's just amazing. Many other of these radio shows where they are just nothing but fluff and commercials and paid promotions. I'm just shocked at it. It goes against my grain when that sort of thing happens. Absolutely.  We were just talking about Apple and how Apple got upset with Intel, but they're not the only ones upset. We also now have seen a lot of manufacturers who have started producing Chromebooks and surface tablets that are based on chip sets other than Intel's. This is going to be a real problem for Intel. Intel has almost always relied, certainly in the later years has relied on Microsoft and people bought Intel because they wanted Windows. That's the way that goes. It's just like in the early days, people bought an Apple too, because they wanted a great little VisiCalc, the spreadsheet program.  Now, what we're seeing are operating systems that do not require a single line of Microsoft software. Google Chrome is a great example of it. Linux is another great example and people are loving their Google Chrome laptops, and you can buy these laptops for as little as 200 bucks. Now you get what you pay for and all the way up to a couple of grand and they don't have a line single line of Microsoft code. Yet you can still edit Word documents and Excel documents, et cetera. They do not contain any Intel hardware. What was called, well, they might have a chip here or there, but not the main CPU. What used to be called the Wintel monopoly. In other words, Windows-Intel monopoly is dying. It's dying very quickly.  Apple is not helping now. Apple, they've had somewhere between seven and 10% market share in the computer business for quite a while. Personally, I far prefer Apple Macintoshes over anything else out there by far.  I use them every day. So that's me.  I don't know about you. There's a little bit of a learning curve. Although people who aren't that computer literate find it easier to learn how to use a Mac than to learn how to use Windows, which makes sense.  Apple has really done a great job. A bang-up job. With these new chips, it's getting even faster. We are now finding out from a report from Bloomberg who first started these, that Apple has been posting job listings, looking for engineers to work on 6G technology. 6G, right now we're rolling out 5g, which hasn't been a huge win because of the fact that if you want really fast 5g, like the type Verizon provides, you have to have a lot of micro-cell sites everywhere. They have to be absolutely everywhere.  Of course, it's just not financially reasonable to put them up in smaller communities. If the Biden administration continues the way they're going with the FCC and the open internet type thing of a-bits-a-bit, then there will be no incentive for any of these carriers to expand their networks because they can't charge more for better service. If you can imagine that. Ajit Pai fought against that for many years, Trump's appointee as chairman to the FCC, but things are changing. The wind has changed down in Washington, so we'll lose some of those jobs and we're not going to get all of the benefits of 5g. If he keeps us up. 6G is coming.   What that means is Qualcomm, who is the manufacturer of record for most of the modems that are in our cell phones. Qualcomm has also missed some deadlines. Apple is tired of dependencies on third parties because Qualcomm might have somebody else that buys way more chips. It might be able to sell the same chip to the military of whatever country for a much, much higher price. They can sell it to consumers. Maybe they just change the label on it and call it a mill spec, and often goes right, who knows? What they're doing out there, but Apple doesn't want to do that anymore. They are looking for engineers to define and perform the research for the next generation standards of wireless communications, such as 6G The ads say you will research and design next-generation 6G wireless communication systems for radio access networks with emphasis on the physical Mac L two and L three layers. Fascinating, eh? What do you think?  I think a huge deal as Apple continues to ditch, many of its vendors that have not been living up to the standards Apple has set.  Apple has moved some of the manufacturing back to the United States. More of the assembly has been moved here. The manufacturing, it's starting to come back again. We'll see the Trump administration really wanted it here.  We need it here, not just for jobs, we needed it here for our security. We've talked about that before, too, right? I want to also point out speaking of Apple and manufacturing, China, of course, does most of it for Apple and Foxconn is the company in China that makes almost all of this stuff for Apple. It's huge. Foxconn owns cities. Huge cities. They have high rises where people basically don't see the light of day, these high rise factories. You live there, you eat there, you shop there, you work there.  Like the old company store who is it, Tennessee Ernie, right? Owe my soul to the company store. That's what's happening over there. And Foxconn has kept its costs low by bringing people in from the fields, if you will, out there being farmers and paying them extremely low wages. On top of all of that, in some cases they're using slave labor. I found this article very interesting, from Ars Technica's, Timothy B. Lee. He's talking about a potential partnership between Apple and Nissan. Let me remember. I mentioned Apple talking with Kia and Kia is denying it. The financial times reported on Sunday that this potential deal between Apple and Nissan fell apart because Apple wanted Nissan to build Apple cars, they would have the Apple logo on them. They all be branded Apple. It wouldn't say Nissan unless you took something seriously apart you might find it inside.  Nissan wanted to keep the Nissan brand on its own vehicles. Bloomberg reported last week that the negotiations with Kia and of course its parent companies Huyndaiin South Korea had ended without a deal. The Financial Times said that Apple has also sounded out BMW as a potential partner because Apple doesn't make cars. So how are they going to do this? Apparently the talks faltered with Apple and Nissan because Nissan had a fear and apparently this is true of Kia too, of becoming quote the Foxconn of the auto industry, unquote, which is a reference to this Chinese well it's Taiwanese technically, but a group that manufacturers are while actually assembles the iPhones. Fascinating. Isn't it fascinating.  When you start to dig into this self-driving technology and the numbers behind it, that's where you wonder, why is Apple even trying at this point, Apple's test vehicles only traveled 18,000 miles on California roads. Between 2019 and 2020, or over the course of about a year, late in both years. 18,000 miles in a year.

Craig Peterson's Tech Talk
Tech Talk with Craig Peterson Podcast: What really happened in TX, New MAC malware, Apples Electric Vehicles and More

Craig Peterson's Tech Talk

Play Episode Listen Later Feb 27, 2021 79:15


Welcome!   It was also another busy week on the technology front and we are going to delve into what actually caused the energy problems in Texas.  There is a new type of malware that is affecting Macs and it is has a different MO.  Then we are going to discuss Apple and their ventures into automated electric cars and what we can expect. Why are states having issues making appointments for vaccines? In a word, it is bureaucratic incompetence. Then we have a new type of hack out there.  It is called Buy-to-Infect and there is more so be sure to Listen in. For more tech tips, news, and updates, visit - CraigPeterson.com. --- Tech Articles Craig Thinks You Should Read: This Basic Math Shows How Wind Energy Failures Contributed To Texas’s Deadly Power Loss An Insider Explains Why Texans Lost Their Power New malware found on 30,000 Macs has security pros stumped Report: Nissan shot down Apple deal to avoid becoming Foxconn of cars N.Y.’s Vaccine Websites Weren’t Working Apple is already working on developing 6G wireless technology Owner of an app that hijacked millions of devices with one update exposes the buy-to-infect scam Mount Sinai study finds Apple Watch can predict COVID-19 diagnosis up to a week before testing Malware Exploits Security Teams' Greatest Weakness: Poor Relationships With Employees --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] You probably know I've been doing cybersecurity now for 30 years in the online world. Yeah, that long. I'm afraid I have some confessions to make about our relationships here, cybersecurity people, and employees. Hi everybody. Craig Peterson here. I'm so glad to be here. I'm happy your here as well. There are so many ways to listen. I got pulled into this whole business of cybersecurity quite literally, kicking and screaming. I had been already involved in the development of the internet and internet protocols for a decade before. In fact, one of the contracts that I had was with a major manufacturer of computer systems. What I did there was design for Unix systems a way to check for malware, a way to manage them remotely. Yes indeed, I made one of the first RMM systems, as we call them nowadays. We also tied that RMM system, of course, into Windows and a few other operating systems. Unix was where I was working at the time.  I am what they called an OG in the industry. My gosh, my first job with computer networks was back in 75. Believe it or not a long time ago. Back then, of course, it was mainframe to mainframe basically and some of the basic protocols, the RJE, and stuff. I know I've got a lot of older people who are listening who are saying, yeah, I remember that. It brings back memories.  In fact, I got a note just this week from a listener who was saying his first computer was a Sinclair. Do you remember those things? Oh my gosh. It brought back so many memories for us older guys. But it was just such a cool little device with the keys and much different than I'd ever seen before. The XZ81. I just looked it up online so I can remember what the model number was. That was made by Timex. If you can believe that too. It's just. Wow. It had a Z 80 CPU, which of course was like an 8080, which was Intel's, big chip at the time, running at 3.25 megahertz. Yes, indeed. Very cool. I love that computer anyways. I digress.  The whole industry at the time was non-existent, yeah. You had antivirus software. We started seeing that in the eighties and we had some terrible operating systems that many people were running like Windows, just absolutely horrific. Remember windows three-point 11 and XP and the millennial edition just some of the most terrible software ever. That's what happens when you have interns? A lot of the code, it came out in one of the lawsuits, for one of these versions of Windows.  It was a different world and I had to figure out what was going on because I had some servers that were Unix servers. This was the early nineties and I was hosting email for companies and websites and doing some filtering and things with some kind of precursor to SpamAssassin. It was really something. I had some DECservers, Digital Equipment Corporation. Remember those guys and all of a sudden customers started calling me because the email wasn't working.  It turned out it was working, but it was extremely slow and I had to figure out why.  I telneted to my server. I got on, started poking around the servers.  I had a computer room and the first floor of the building that I owned and I was up on the second floor. Off we go looking around trying to figure out what is going on. It was me actually. I said us, but it was really me. Cause I knew the most about this stuff.  There were these processes that just continued to fork and I was trying to figure out why is it creating all these new processes. What's going on? What has happened here? Back then, The internet was a much different place. We trusted everybody. We had fun online. We would spam people who broke our almost unwritten rules of the internet about being kind to other people. What spam was, where the whole term comes from is you would send the script from Monty Python spam and eggs, spam and ham spam, spam, spam routine. You just send it to somebody that was breaking these unwritten rules, like trying to sell something on the internet. Absolutely verboten. What a change to today.  I saw some of this stuff going on. I was trying to figure out what it was, but, we trusted everybody. So my mail server was Sendmail, at the time. We still maintain some instances of Sendmail for customers that need that.  Nowadays. It's usually more something like postfix in the backend. You might have Zimbra or something out front, but postfix in the backend. We allowed anybody on the internet to get on to our mail server and fix some configuration problems. They didn't have full access to everything. Firewalls weren't then what they are today. In fact, one of our engineers just had to run out to a client who did something we told them not to do.  They were using the Sonic wall firewall on their network as well as they had our stuff. So we had a really good Cisco firepower firewall sitting there, and then they have this SonicWall so that they're people, remotely could connect to the Sonic wall firewall, because it's good enough. SonicWall says it's compliant. The SonicWall firewall was being used to scan the network and load stuff. Does that sound familiar? Much to our chagrin.  So he had to run out and take care of that today. It sounds like we might have to do a rip and replace over there restore from backups. You have no idea what these bad guys might've done. We've seen Chinese into these networks before, Chinese malware. It's been really bad.  Boy, am I wandering all over the place?  Back to this, we would allow people to get onto our network to fix things.  If something was wrong, if we were misconfigured, they could help us and they could get on and do it because Sendmail configuration was not for the faint-hearted. In the days before Google, right? Eventually, we had Archie and Veronica, and Jughead. They did basic searches across FTP servers. That's my kicking and screaming story. I was trying to run a business where we hosted email for businesses, which we still do to this day, and where we had some, back then we didn't have websites. The web didn't come in into play until a couple of years later, but we did host FTP sites for businesses so that they could share files back and forth.  That's what I wanted to do. That was my business.  Later on, I ended up helping 80% of my clients find the other web hosts after, these $8 Gator hosting things. We just got a call on that this week. Somebody who'd been a client of ours 20 years ago, went with a guy that charges $5 a month for web hosting. They have personally identifiable information on that site if you can believe it. He was complaining because it wasn't working he was getting a C-panel error anytime he went to the site. We said, Hey, listen, this problem is the guy that you're hosting from. We did a little research and we checked the IP address and how many sites we're at that IP address. This guy that was charging them $5 a month had 150 different websites at that one IP address. Now that's not bad. He was hosting all of these 150 at a site, the charges, the eight to $10 a month for web hosting.  He had all of these sites on top of a machine that was already split up hundreds of ways. It's just amazing what people do.  Man alive.  We got rid of 80% of those customers, the ones that wanted cheap, that's fine, get cheap, and see what happens to you. Some of them, we still maintain a good relationship with and so we help them out from time to time, right?  What am I going to do? So somebody calls me, I gotta help them. That's precisely what we do now with this malware problem.  What's going on here? We talked already about the Great Suspender and how Google has said, Hey, this now has malware in it, so we're removing it from your web browsers. That to me makes a ton of sense. Why not do that?  This is another example of what happened with SolarWinds. This is an example of a supply chain infection. What happened with that? Somebody bought Great Suspender from the developer and then added in this basically malware to the Great Suspender. Just it's a terrible thing. Very surprising, but one of the biggest exploits that are being used by the bad guys right now is the security team's poor relationship with other employees within the organization.  I promise we'll get to this a little bit more and explain the bottom line here. What's going on and it goes back to this customer that we just had to run out to.  Why did they do what we told them not to do?  Stick around. We're getting into the battle between cybersecurity senior officers in companies, owners, business owners, and the, even the employees. There has been such a battle going on.  I saw two examples this week. Hi, everybody, it's a difficult world out there, but I find some comfort in listening to, of course, news radio. It keeps me up to date on what's going on. It helps me to really understand the world a lot better.  I mentioned that one of my guys just had to run out to a client who did something we absolutely told them not to do. They had been using this company that was a break-fix shop, I guess is the way you would put it. They had a business that would respond to problems and they charge by the hour. I think right now their hourly rate is like 160 bucks or something. It is not cheap, but anyhow, That they would sell people equipment and then move on, right? Your problems aren't my problems. Just leave me alone, go away.  It's a beautiful model because their employees at this break-fix shop don't have to understand much. They just have to know more than you do as a customer.  There's one level of understanding that you have, and for someone to appear to be an expert, all they have to do is have slightly more understanding.  That has bothered me so many times listened to the radio and they talk about somebody that's just this great expert, in reality, of course, they are not. But you don't know. That person talking about the expert doesn't know either because they just don't have enough knowledge. Of course, the person that's labeled the expert isn't going to say anything about it.  They were doing what most companies do, which is okay. We know we need a firewall, so let's get a firewall. They went out and they talked to this company and they did their Google research because of course, Dr. Google is an expert on everything.  Even with those differing opinions, you're going to go with the opinion that you like the best.  That's what they did.  They bought a Sonic wall firewall from this vendor, which was a break-fix shop. Now that's all well, and good. The sonic wall is not terrible stuff. They've got some amazing stuff as well. The problem is this device has been out of support for more than two years now. Even though they're not as advanced as some of the systems we can install, not that we always use the most advanced systems. It's not a bad, a little thing for a small business. We warned them that because they were using an out-of-date firewall that they could not get fixes for known vulnerabilities. Now that's a big deal too. Most people are not aware of the vulnerabilities that are on their machines. Do you go out every month and check the firmware versions on your firewall? You should be, even if you're a home user. Are you checking to make sure the firewall that the cable company provided you with is up to date, configured correctly? You've changed the password and the admin username, right? No?  Most people haven't. He hadn't, right. He didn't know. We told them we did a little research and said here's your problem.  That's part of his cyber health assessment. We told them what kind of firewall do you have? What's the version of software on it and we do that. We have a bunch of people that have asked for cyber health assessments. We've got them on a list because we're busy. So we have to schedule these and make them happen.  So we said, do not plug that machine in. Of course, what do they do? They plugged it back in again. So now all of a sudden this morning, we get a wake-up call from our monitors that are running they're on their  Cisco firepower firewall, where we have their extensive suite of additional software. This isn't just an off-shelf, Cisco firewall.  It's telling us that the SonicWall or something through our, via the SonicWall. Is going through all this customer's network. It's actually attacking the Cisco firewall from inside the network. Absolutely amazing. Why does that happen? In this case, the business owner, and it is a  very small business. It has about 5 million in revenue per year, I would guess.  It's a small business by every stretch. The owner just doesn't want to spend the money he doesn't absolutely have to spend. He's not looking at this saying I could lose all my intellectual property. I could get sued by these people. I could lose my clients who find out that their data was released. Their orders were released. Everything was stolen.  He looks at it and says, Oh wow. It's 200 bucks a month. Wait a minute guy, you have how many employees? You're worried about 200 bucks a month. I personally, I don't understand that. Why would you do that?  Now, you're in a poor country. Okay. I get it right. That's a lot of money to spend, but not here in the United States. Doesn't make sense.  A lot of this is really the reason I brought it up. It's showing how there is a disconnect between business owners, C-level people, and cybersecurity people. Basically, if you have less than 200 employees, you cannot afford to have your own cybersecurity team. It's impossible. It's way too expensive.  Then the numbers start to change outsourced cybersecurity, which is what we do.  We do this for this customer and. The in-house cybersecurity people, but we all have the same basic problem. The owner has a problem too, right? He has to weigh the costs of cybersecurity against the risks involved, which is what Equifax did.  What so many of these big companies do, right? There's this, the norm Equifax said it's going to be way cheaper to just pay out $10 million in fines. When we get fined by the federal government for losing everyone in the country's personal financial information then it is to do this or we're not going to bother.  Man, I'd love to see the smoking gun email on that, where they made that final decision, probably doesn't exist. They're smart enough to know that they would get sued and they have been sued because of this.  We've got another problem right now because of people working from home. I mentioned, in fact, this week, you should have gotten an email from me on Thursday. That was a little audio thing that I put together. We call these things, audiograms, and it's a kind of a video that'll play.  This particular one is about part of this problem. We've talked extensively about that water plant in Florida, that was hacked for lack of a better term. It might've been an insider thing. It might've been someone external, et cetera, et cetera. The reason it happened is that business, the water plant for a town of 15,000 people, which would be in a normal world, a small business. That small government operation was all of a sudden faced with lockdowns. What do we do? They didn't have a plan. They didn't have a business continuity plan, which is so important. I talked about it extensively last week as well. They had no way to manage this. So what did they do? They went out and bought team viewer licenses for everybody in the business. That put, well not the business, in this case, the agency, that put the agency at risk. That is putting our businesses at risk too, in such a big way. That's what the audiogram I emailed out on Thursday explaining this a bit.  So stick around. We're going to continue this conversation.   Of course,  you're listening to Craig Peterson online@craigpeterson.com. We have people working from home. We didn't really plan for this. We're doing it because of the lockdown. Maybe, you found that it's actually better for your business, from whatever angle. What are the risks here of people taking computers home? Hello. Everybody Craig, Peterson here. So glad to be with you today. Glad you're taking a few minutes out of your day as well to listen in.  Now I am very concerned about people using computers that they're taking home. I want to make a definition. Maybe there's a better way of saying this, computers that are used at home, home computers should never be used for work.  I'm going to explain why. Computers that are at work probably should not be taken home. We saw the example of this, just this last couple of weeks.  I was talking about this wonderful plugin that I've been using and recommending people use here for a very long time, called the Great Suspender. We've talked at length really about what happened there with the company being bought and then becoming evil, right? Just buying their way into 2 million people's computers.  Sometimes these Chrome extensions that are installed on personal computers get automatically installed and synchronized to your work devices. In fact, that's the default. If you log into Chrome and you're using Google Chrome as your browser and you log into it on your home computer, and when you log into your same account over on your business computer. All of a sudden, now it's syncing. It's syncing things like passwords, which you should not be having Google store for you. You should definitely be using a good password manager and there are a few out there.  If you're not familiar with them or don't know which one to use or how to use them. I have a great little special report on passwords and using password managers. I'd be glad to send it to you. Just email me@craigpeterson.com and I'll send that on-off, right? I'm not making a dime off of that. I want to make you safer.  I don't want to have happened to you what's happened to millions of Americans, including my best buddy who had his information stolen. I've been after him to use password managers. He never did it. I don't know why. Until his paycheck got stolen. Then he came over and I explained it and set it up with them and really helped him out. Maybe we should do a whole webinar showing you how to use these password managers, how to get them set up because it is a little bit tricky. It's certainly different than you're used to. Many people are using their browser Chrome in this example, to save passwords. When you go to a website, you'll automatically have the password there. Maybe you've got it set up so that it'll automatically log you in with all kinds of cool stuff. But there is a very big problem and that is that there is a huge risk with running these extensions, like the Great Suspender. The Great Suspender was approved by Google. It was in the Google store. You could download it from their app store. Absolutely free.   In January of this year in 2021, we had someone out on Twitter, tweet that there was a problem with the security on the Great Suspender. It had been changed. It was being used now to send ads out and other things. That's pretty, pretty bad. The extension wasn't banned until about a month later and you as an end-user had no official notification that this extension was potentially malicious.  Apparently, they could, with this malicious software they embedded, not just show you ad, not just insert their own ads to generate revenue onto the webpage as you were visiting, they could also grab files from your machine. That's a very bad thing.  Now, presumably, if you're at work, you have a team that's helping you outright.  The IT security team, there may be different teams and maybe the same person who also is the office manager, who knows. It does vary. Businesses cannot know what you're doing when you're starting to install those extensions and they are pushing their way onto your office computer because you're using the same Google account in both places. Now, despite the risks, of course, I installed this Great Suspender used it for years and I was pretty happy using it. I know many other people who were in the same boat. Security teams have some great tools. I mentioned my son who's one of our team members got called out to a client. During the break, I was just chatting with him briefly. What had happened is they plugged in this firewall we told them not to plugin. It was apparently hacked from the outside. It had known security vulnerabilities. He had not, this small business owner had not yet paid for maintenance on his little firewall, so he was not getting security updates. In fact, my team member looked at this and found that it had been three years since the firmware on his firewall had been updated. The bad guys got into his network through this secondary firewall, which we told them not to have not to plugin. Our firewall only noticed it because this malware started scanning everything on the network. Of course, it scanned two of our machines, one being the firewall.  Remember this isn't a regular firewall that we put in there. This is a firepower firewall with a whole bunch of extra software on top of it.  In our data center, we have some huge machines that are sitting there watching what's going on remotely. On our client's networks via that firepower firewall.  We started getting all these notices as to what was going on, but this is a great example. We're not updating some of that software. He had a security team and he ignored the security team. We were the security team. We're outsourced cybersecurity that's what we do, but that happens many times.  Many business owners and others look at the cybersecurity situation as having many different shades of gray. What should you do? What shouldn't you do? The teams that are working in these businesses, including us. We have to tell them, Hey, don't use that firewall. Do not plug it in. You don't need it. If you plug it in, it's going to make it way easier for some of your people to work from home.  This is not set up correctly and you're going to have problems. That's a difficult conversation to have with a business owner. We had it and he ignored it much to his peril. In this case, this one is hard to tell how much data was stolen from his business. The impact from this could last for months, and there could be investigations who knows what's going to end up happening here. That business owner and I, because I spoke to him as well about this whole situation before this particular event happened just about two weeks ago. In fact, that was a reminder cause they had plugged it in again. Six months before that we had told the business owner, you can't plug this thing in, you cannot be using it.  How do you do that? How do you let an impacted employee, somebody who's working from home, maybe using their own computer to do work for the business? How can you approach them and tell them, Hey, you cannot use Google Chrome?  You cannot save your passwords on your browser. You cannot install extensions. Even if you had a list of extensions today that were bad, that list is going to be out of date tomorrow, which is going to be a very big problem. Individual users do not have the ability to check this. Frankly, most businesses don't either. Again, that's why a business under 200 employees cannot afford to do this yourself. You just can't. This is a specialty.  We were talking yesterday with a prospect who had been brought to us by a break-fix shop and trying to get this concept through. We're going to talk a little bit more about that. What should you be doing? How can you pay attention? How can you even be safe in this day and age?  Hi everybody. Craig Peterson here. We've been talking about supply chain problems. That's a technical term for it, but the software that we rely on becoming evil, and what can we really do about it? Hello, everybody. You're listening to Craig Peterson.  How do you talk to a business owner and help them understand? That's a problem. Isn't it? Look at what happened a few years back with TJX stores. Them as maybe TJ max, that's one of their stores. They have a number of others. Their cybersecurity guys did something I have seen done before. That is, they went to the management of this massive public company and said, Hey, TJX, we need to get this hardware. We need to get this staffing. The hardware course pretty expensive and it sits there and it does much the same stuff. Even back then. Nowhere as good as today. It's exponential, as to how much better it gets every year, but it was good hardware.  It really could have stopped the hack that happened and it did.  Here's what it did. It noticed the hack was going on. The problem was they were able to say yes to the hardware, the senior management said yes. They got the hardware, but senior management would not get the security technicians that were needed to monitor and run that hardware. They were short-staffed.  That's another problem we're seeing. That's why the companies you're dealing with, whether it's Equifax, with who you do not have a direct business relationship with, and yet have all this information about you and sell that. Or maybe it's just some other website. That's why they lose your data. It's a real bad idea. The bad guys are just waiting out there just siphon all of your data. In many cases, when you're talking about a business and a business website, or even your home computer, they're looking to redirect you to malicious websites. What they'll do is for instance, again, the Great Suspenders' an example, that they claim it's been fixed now. With something like an extension or a plugin that you put in your browser, they could rather easily code it up so that you are going to a website that's malicious. It could look like Bank of America's website and you go there and you enter in your information. You put in your username, you put in your password, it asks you a security question. Maybe maybe not, but your username and password. Then it says incorrect. Then your screen refreshes while your screen just refreshed because you were not at the Bank of America, originally. You were at a malicious website and you entered in your username and password. Now the bad guys have your username and password to your banking system, to your login, to your bank accounts. They got that. That's all they needed. They didn't want you to know that this was going on so they just went ahead and redirected you over to the real bank website. Hence, the supposed reload.  It's a very big weakness here in how IT and security teams operate because too few security teams really can relate with the CEO and vice versa.  I've seen that all of the time with people working for me in cybersecurity, you've got a really good idea of what needs to be done, how it needs to be done when it needs to be done. To you, it's the most important thing in the world, right? You don't want the business to go under, you're going to lose your job, maybe your pension retirement plan is tied to that business. You don't want it to happen, but have you got the trust built up with the senior management?  Then how about the other side of this relationship? How about if you're a cybersecurity person? Even if, again, you're not a professional, you're just the person tasked with it in the office or you're the person tasked with it at home. How do you go to the other employees and tell them you can't use your Google Chrome account here in the office? How are you going to enforce it? How are you going to tell your husband or wife, Hey, that's dangerous? I don't want you installing any of these extensions on your computer. One of the really bad things that people do with their browsers is they put on these real fancy little extensions that give all kinds of extra wonderful information. It ends up as a toolbar and it lets you do searches on this site or that site. Maybe it keeps you up to date on the stocks that you have in your portfolio. You're telling hackers what stocks you own, really? It might be legitimate, right. But who knows? That's the problem. Something like that can really mess you up and send you to malicious sites. You know that your spouse is using that or your kids are using that. How do you talk to them? How do you solve those problems? It's a real problem.  There are some interesting tools that you can use, as professionals. There's a Slack channel I can send you to, if you're interested, actually, it'll be in the newsletter that comes out on Sunday. At least it should be under one of those articles. It is a problem.  Netflix, by the way, is really trying to help you out too. Not only did the Netflix security team provide some feedback for what's called the honest security guide, but it's also made some of its user tools, the tools that you might use at your home to find a movie, et cetera, it might help really to secure you.  Git Hub has this. It is called, this is a Netflix skunkworks, the stethoscope app. It's a desktop application created by Netflix that checks security-related settings and makes recommendations for improving the configuration of your computer. It doesn't require central device management or reporting. You can have a look at that. If you are interested, let me know. I can probably point you in the right direction to the stethoscope app. That's what we want to see in this honest security guide. You'll find it online. At honest security is a guide to your devices, security, which in the biz we call endpoint security and it is cool. You can run through all of this list is a big checklist and talking about why honest, and they're saying dishonesty stops you from doing the right thing.  That's why in my courses, I spend a lot of time, more time in fact, on the why than the how.  I want you to understand honestly, why you should or should not do something. There are so many people who are out there yelling and screaming, jumping up and down. Particularly your antivirus companies. You fake VPN companies who are trying to get you to buy their products that not only do not need in most cases but will actually make your computer less secure.  So we have to be careful about all of this stuff. We have to make sure we are talking. We've got to have a trust relationship set up with the owners of our business. Cause you guys, some of you, I know own businesses, some of you work for a business. We've got people listening to this all over the world and every continent I've even seen a listener down in Antarctica.  I really can say every continent. It's important that we know how to work with our fellow employees, with our management, with our family members, to help them to know what they need to do.  There is no time to wait. We have never seen as many attacks as we're seeing now. We've never seen the government using its resources to attack us more than we have now. We've never seen more billions of dollars stolen per year by the bad guys. There are some basic tenants that you can follow that will make you way more secure. And that's why you're listening. That's why I go through some of these things to help everybody understand.  That's also why I go ahead and make sure that I answer your emails. If you have a question, make sure you go ahead and ask. You can just email me at me@craigpeterson.com. If it's something urgent, I have a form on the bottom of my homepage  @craigpeterson.com. You can give me a little bit more information. I tend to keep an eye on that a little bit better than my general email, although I do use some amazing email software that helps me to keep track of the real email and get rid of the spam and put things in boxes and stuff  craigpeterson.com. It's that simple email me me@craigpeterson.com. If you have questions.  I hope that Google is going to continue to improve itself. I love the fact that they found out that this one extension was malicious. For those of you who might've just tuned in, we're talking about something called the Great Suspender something I've used for years, it became malicious, but they need to do more.  As people who are concerned about security, we just can't wait for the next incident. Just again, this client of mine, who we've been warning about this for months, he's stopped doing what we told him to do, and then decided well it's just too difficult. That's something we hear a lot from businesses. Oh, it just hampers the work. It hampers it because now we have to get permission from it in order to mount this particular drive or gain access to those files or materials. Yes you do, because we have to stop the internal spread of all of this malware and all of these hackers.  It is absolutely worth it.  All right, everybody. Thanks again for joining me today. I really hope you've been enjoying this. I have years' worth of podcasts out there and you'll find all of those at craigpeterson.com/podcast or on your favorite podcast platform.  If you subscribed under iTunes, you might've noticed, ah, yeah, I just released a whole batch there too. I expressed concerns about owning an Apple watch. I held off for a long time. I want to talk about these devices now, the security concerns, but also the amazing health tools that are built right in. Hey, welcome back. This Apple watch is really fascinating. It has been around now for six generations. There are a number of other watches that have had, or tried, I should say, to compete with Apple. They haven't been very successful. You might've noticed that. I have a friend that bought some watches for his family and to him that monitor all of the basic vitals and record them and send them up to his phone. It's a 20-ish dollar watch. He got it from South Korea probably are parts made in China, but it is an inexpensive watch and it does some of the basics at the other end of the scale. Let's have a look right now. I'm going to go to apple.com online, and we're going to click on watch. Here we go, Oh, my they've got special watches so you can buy their watches. It looks like the new one, the Apple watch series six for starting at 400 bucks or they have two different sizes. . They have a more basic watch called the Apple Watch SE that starts at about $300. You can still get the Apple watch series three. Now, these all can monitor high and low heart rates. They can give you irregular heart rhythm notification, but it's only a-fib atrial fibrillation, I think is the only one they can monitor, but all three of those can monitor that. As I said, my buddy's watches, he got for his family at 20 bucks apiece are able to do most of that as well.  These are water-resistant to 50 meters, which is really cool. The series six also has an ECG app. That is very cool. You open the app, you put your finger on the crown of the watch and it gives you an EKG right there on the watch and it feeds it to your phone. On your phone, you can turn it into a PDF. You can share it with your doctor on and on. It's just amazing. It's a three-lead type, I was in emergency medicine, right? A med-tech EMT, EMT-PD can't remember. I had a whole bunch of different certifications back in the day. But it's fantastic for that. It also has a blood oxygen app that monitors your blood oxygen levels. It ties all of this into their new exercise app, which is amazing. That ties into your phone or your iPad.  I will go down in the basement onto the treadmill and I'll select your treadmill workout.  It has dozens of them. Have you seen this really fancy treadmill? A couple of years ago they got in all kinds of trouble because they advertised it around Christmas time and apparently this woman really wanted a treadmill and she got one and she was all excited. All of these people jumped out of the woodwork. All your you're saying she's fat, et cetera. No, she wanted a treadmill. These are amazing treadmills because they have built into them. These streams and you can join classes, et cetera. With the Apple Watch, my iPad, and a subscription to this iHealth app, which you can get as part of this Apple plus thing you can buy for 30 bucks for the whole family, 30 bucks a month.  I don't know how many I have seen probably a hundred different workouts on there.  It has different workouts, different types of weightlifting, running, jogging, treadmills, elliptical machines, everything.  You can pick your pace. You can pick your instructor, you can pick everything. Then your Apple watch is monitoring your body. As you're working out. So it's telling you how many calories you've burned. What's your heart rate is to help keep your heart rate in the best range for you, depending on what kind of a workout you're doing. It also lets you compete against other people. Does this sound like an ad for the Apple watch?  You can compete with other people your age doing the same workout and see where you're at. I was really surprised because typically I am at the front of the pack when it comes to my treadmill workouts. That's really cool as well. Those are some of the basics. There are other things too, that Apple is doing. We've found, right now, that Mount Sinai just came out with an announcement and they said that the Apple watch can predict COVID 19 diagnosis up to a week before testing can detect it. Yes. Isn't that something? Not only can the Apple watch help with certain heart arrhythmias, but it can predict that you have COVID-19 too a week before testing normal testing. Those swabs can find it out.  This is from the journal of medical internet research, which is a peered review journal. And they found that wearable hardware and specifically the Apple watch can effectively predict a positive COVID-19 diagnosis up to a week before the current PCR-based nasal swab tests. They called this the warrior watch study. They had a dedicated Apple watch and the iPhone app, and they had some participants from the Mount Sinai staff and it required, of course, these staff members to use the app to turn on the health and data monitoring and collection, and also asked them to fill out a survey every day to provide some feedback about their potential COVID-19 symptoms. As well as other things like stress can obviously make your heart rate, go up your blood pressure, go up, et cetera. Oh. By the way, Apple, supposedly the rumors are, we'll have a BP sensor in the Apple seven that'll be out later this year, most likely.  So they had several hundred healthcare workers and the primary biometric signal. I know that the studies authors were watching was heart rate variability. This is fascinating to me because it's something that I learned about fairly recently. Then when I got my Apple watch, I read up more about this, but basically, heart rate variability is what it sounds like. It's your heart rate. Let's say your heart is beating at 60 beats per minute. It is not beating once every 10 seconds.  It is not beating once a second. Your heart rate will vary over the course of that minute. If you're healthy.  Obviously, a beat every 10 seconds isn't 60 a minute. Let's use that as an example. Somebody who's almost dead and has six beats per minute. The first heartbeat might be at 10 seconds. The second heartbeat might be at 22 seconds because your heart is supposed to vary its rate of contractions based on immediate feedback. It's not just that you're going out in your running and now you've driven up your heart rate and you're doing your cardio and it or you just walked up a flight of stairs or you stood up, which is another test, by the way, what we're talking about here. You might just be sitting there, but your cells have a different need for oxygen or for the blood. The heart slows down slightly or speeds up slightly.  This heart rate variability is something built into the Apple watch and into the iPhone app that you attach to the Apple watch. Isn't that useful without an iPhone, frankly? Then you can look at your heart rate variability right there.  They said, combining that with the symptoms that people reported, these Mount Sinai staff, that the symptoms that they reported that were associated with COVID-19 including fever, aches, dry cough, gastrointestinal issues, loss of taste and smell corresponded with changes in the heart rate variability. I thought that was just absolutely phenomenal because heart rate variability is considered to be a key indicator of strain on your nervous system. COVID-19 obviously is going to put a strain on the nervous system. Just very neat.  It says here that the study was not only able to predict infections up to a week before tests provided confirmed diagnosis but also revealed that participants' heart rate variability patterns normalized fairly quickly after their diagnosis or turning to normal run about one to two weeks following their positive tests. That's from a TechCrunch, that particular quote.   I am very excited about this, but I am also on the concerned side. I'm concerned because they are collecting vital data from us. All of the major companies, Google and Microsoft and Apple want to be the company that holds all of your personal medical records. We're going to get back to that when we come back here. What is happening? How is your doctor managing your medical records? I was really shocked to find out how that industry is working.  Of course, you're listening to Craig Peterson. Check it out online. Craig peterson.com. Welcome back. What are you doing? Are you asking your doctor how they are handling your medical records? Because I think you probably should based on what I learned just this week. Hi everybody. Craig Peterson here. Thanks for joining me.  We were just talking about health. We're talking about the Apple watch and the fact that there's a lot of competitors out there, some of them, a fraction of the cost. If you buy the Apple watch on terms, you're going to pay less in one month's payment on terms to Apple than you would for some of these other watches out there, but Apple watches do have more features.  Mine even has a built-in cellular modem. Even if I don't have my phone with me, phone calls come through to my watch and text messages, and I can respond and answer. It's really nice. Medically I am very impressed. It has been good at motivating me to do some exercise, to get up, and about just to do a bunch of things I had never, ever done before. Consider that.  It is collecting our data. Apple now has potential access to all of my cardiac data. They've got EKGs that I have run on my watch. They know about my heart rate. They know how often I exercise, and how hard I exercise when I exercise. They know all of this stuff about me. I had a conversation with someone just saying why does that matter? Maybe it's Apple, maybe it's somebody else. Why does it matter?  It does matter. Think about an evil genius, right? The thing about somebody that might want to target Americans and might want medical information about Americans. They can gather it in a number of different ways. We're going to talk about medical records here in a little bit. One of the things they could certainly do is grab all of our watch data. Some of these watches, including my Apple watch, have GPS built into them. When you're out running or jogging, you know where you went, you can plan your route and it'll remind you, Hey, turn here, turn there. That's one of the things I love about the Apple Watch when I'm using it with Apple maps out driving, it taps me on the wrist and reminds me, Hey, in 500 feet, you got to turn.  If I look at the watch, it'll even show me the turn I need to make coming up in 500 feet. It's really amazing. All of this information is being compiled and hopefully, it's being compiled by a company that we can trust. At this point, we can probably trust Apple. Hopefully, they're not going to be broken into. Now, their margins or profit is high enough that they certainly can afford a security team, one capable of defending them and defending our data. I hope they are. I suspect that they are for the most part. How about some of these others? We know Google, for instance, is in the business of collecting and selling our information, is having all of our medical information. Not just the stuff from our watches, but the stuff from our doctors. Are they to be trusted with that kind of information? Going back to that bad guy, that mad scientist we can, and probably do engineer viruses that are targeted at specific things. In fact, the Russians have been doing it. The Soviets' started it, they came up with a phage. That can attack certain viruses and it acts like a virus it gets in and does this little thing. We've got right now, these COVID-19 vaccines and they act like a virus they're messing with, well effectively, the DNA. In fact, it's the RNA, but it's pretending, Hey, I got a message from the DNA, here it is.  What if a bad guy knew that are a certain population in a certain area, and that area was right by this important military base or whatever they came up with something that would target them and they'd have all of the data to do it now. That's obviously an extreme example. A more common example would be that your medical data is there. It's being sold to advertisers and you're going to end up with something.  For instance, there's a company, very big company out there and they sell baby products. What they did was they tracked and they bought this information, but they tracked women who were purchasing certain things. Now, they weren't purchasing things that were directly related to having a baby, right? They weren't purchasing diapers or little jumpsuits or whatever it is. They were purchasing things that were not directly related maybe people wouldn't even think they were typically related to having a baby. Yet they were able to figure this out. They got that good with the data.  So they thought, Oh, okay let's get wise here. Let's send out a postcard, congratulating them on their pregnancy and offering them a discount on something. Yeah. Not a bad idea, frankly.  However, in this case, some of these moms I hadn't told anybody that they were pregnant yet and didn't want to tell anybody that they were pregnant yet. It fell on its face. Didn't it?  How about these ambulance-chasing lawyers that are out there? Are they going to want to gain access to this, to your medical records?  How about your employer? Your employer wants to know I'm going to train this person. Hopefully, they'll stick with us for a while, but is he going to be a burden on our medical plan? Keyman insurance, health insurance, life insurance. Have access to everything about you. That's what really concerns me about these, all of these devices.  Right now, pretty confident that I can give Apple this information and they will keep it pretty safe. But, I said the same thing about the Great Suspender, right? I don't know about the future.  Then I found something out this week that was in my mind extremely disturbing. We have a new clinic that we've picked up as a client. They needed to have security. They had a couple of little security issues. They were worried. They knew they were not HIPAA compliant. They approached us because they know that's what we do is cybersecurity and audits and remediation. Fixing the problems. We pick them up. They're a client. We're in there. They had told us in advance that all of their medical record systems were on-line. It was on the web. All they needed was a web browser to run their business. Okay. That could be a problem. It might be okay. The medical records manufacturer might have good security on all of the records. So we may be safe, although in HIPAA unless you have a business process agreement in place with that vendor if that data is lost, it falls back on the doctor's shoulders. Anyhow, what I found out was, first of all, it wasn't completely web-based, which just shocked me. I'm not talking about they have to scan records or they got the x-ray machine or whatever. It really wasn't web-based and secondarily the company they were using for the medical records was a free service.  The doctor, that clinic, was not paying for their medical records management software.  The way it works is this medical records management company when the doctor prescribes something when the doctor performs a procedure and bills and insurance company, it's all done through this one company and that company takes a chunk of their money. In some cases we found seems to have been inflating the bills that went off to the insurance companies and that, as it turns out is a common practice in the industry. According to the doctors at this clinic, I was shocked, amazed.  Something you might want to look at. Ask your doctors where are your records kept and are they secure? Now we had HIPAA. We thought that would secure it, but it doesn't.  Stick around. Hey, we got a name now for what happened to the Great Suspender and QR code scanner apps over on the Google stores. One at Google Play, the other one over on the Google Chrome store. It's become that popular. Hey, everybody, I wanted to mention this whole new category of malware really, and they're calling it, right now, Buy to infect. What happens is a bad guy, a malware guy buys a legitimate app and then starts infecting it.  We know, obviously, about the one that I've been talking about a lot the Google extension that I used to use all of the time, the Great Suspender. I mentioned this one a few weeks ago, it's called QR code scanner. It's been on the Google play store for a long time, had more than 10 million installs and then all of a sudden it became malicious.  This is a little bit of a different angle on it because, with the Great Suspender, the ownership of that software actually transferred to somebody. With QR code scanner, they were working on a deal with a company and this company wanted to verify the Google play account for QR code scanner. This is all according to the owner, the original owner of QR code scanner.  They said that what had happened is part of this purchase deal. I let them have a look and gain access to the software's key and password prior to purchase so they could confirm the purchase, which doesn't sound too bad. Apparently, as soon as they got a hold of the software's key and password, forget about the purchase, we're going to start infecting it right away.  It ended up getting that app, the QR code scanner app, pulled right from the Google play score store. Of course, now you don't need that quite as much because most of the phone apps when you go to take a picture, the camera apps have built into them, a QR code scanner.  I thought that was fascinating what they did. They totally cheated the company. They didn't even bother buying it. So a little word for the wise out there.  Got another Apple story cause this is showing how the computer industry is really shifting. We've talked about some of the shortages of chips and the shortages of computer chips are so bad that General Motors has had to shut down two-thirds of its manufacturing lines in at least one plant.  Every major automobile manufacturer is having problems making cars because they can't get the chips.  Remember nowadays, a car, a truck is essentially just a computer on wheels. Not really actually computer on wheels. It's really dozens of computers all linked together with a network on wheels.  Apple has been worried about that, right? Supply chain. That's one of the things you're supposed to worry about as a public company. What are the risks going forward including to my supply chain? Obviously your supply chain matters. You gotta be able to make something you need parts, right?  Apple has been upset with Intel for a while. You might remember Apple. When it first came out, was using a Motorola chipset, which was exceptional much better than the Intel chipsets.  Of course, that's my opinion, a lot of people agree with me. You had the 68000, 68010, and 20, et cetera. Very good chips.  When Apple started getting into the laptop business, that's when the problems started to happen.  These Motorola chips gave off a lot of heat and used up a lot of electricity.  At the time Apple looked around and said our only real alternative right now is Intel. Intel has a whole line of chips, different speeds, and they have mobile chips.  Those mobile chips use much less power than the Motorola chips for the main CPU.  They also use less battery. Those two go hand in hand and generate less heat. That's it all goes hand in hand. So they said, we'll start working with Intel. They did. Intel really disappointed them more than once, which is a shame. They disappointed them with the 64-bit migration. AMD, advanced micro devices, beat Intel to the punch. Shockingly Intel started making AMD compatible CPUs right. The 64-bit extensions to the CPU were AMD extensions. They had problems with some of their other chips as well. Mobile chips getting the power usage under control, the heat dissipation problems under control, and they never really lived up to what Apple was hoping for. What everybody in the industry was hoping for. In many ways, Intel has been a huge disappointment, which is really a shame.  We'll look at what they did to the industry, with these predictive instructions, the hyper-threading, and stuff. Where bad guys were able to bring a computer to its knees.  What does Intel say? Here's a firmware patch you can apply to our CPU, those little CPUs you pay upwards of $2,000 for a piece for one chip.  Those CPU's and by the way, it's going to, cut its performance by a minimum of 20%, maybe 50%, that's okay. What are you kidding me?  A lot of people were upset with Intel and Apple and Microsoft and everybody released patches that use the new Intel microcode. You might've noticed when this happened a couple of years ago that your computer slowed down. I certainly noticed, actually, it was little more than a year, anyway, I noticed it because I own a data center. That has a lot of Intel chips in it where we're running mostly Unixes, Linux, and BSD, but we're also running Windows. So the only way to work around this bug was to apply the patch and slow everything way, way down.  Imagine how Apple and Google felt with their huge data centers. IBM too. IBM has Intel-based data centers, as well as its own chips, and boy talking about phenomenal chips, as far as processing power goes, IBM, man, they are still the leader with the power chips and their Z series. That just wow. Mind-blowing.  Most of us are stuck in the Intel world. Apple said we can no longer trust Intel. So what are we going to do? Apple said we've been developing this chip for a long time. Apple took the chip design, they licensed it from this open sourcee type of company that has a number of members. They took this arm architecture and were able to improve it, and keep adding to it, et cetera.  They're still part of this Alliance. They started using these in their iPhones. The iPhones have been using these chips the whole time and they started improving them after they released the first iPhones.  Intel didn't really get them upset until a little later on, too. They came up with newer ones, faster ones, better ones, right to all of these A10 their bionic chips. They've got AI chips, machine learning chips, all Apple designed. Chips, of course, manufactured by third parties, but that's what Apple is using.  Apple has now said we expect all of their Macintosh computers to be based on Apple's CPU within the next two years.  There's already some really good ones out there right now that people like a lot. We've been using them with some of our clients that use Apple. Not everybody has had great luck with them, but Apple is not only ditching Intel, that's not the big story here. Apple's got some job listings out there looking to hire engineers.  So when we get back, we'll tell you more about what Apple is doing and what frankly, I think the rest of the industry should look at. Guess what? They are. It's been Intel versus the rest of the world. They've been winning for years in many categories, but now they're starting to lose, as major manufacturers are starting to leave Intel behind. But there's more to the story still. Hi, everybody.. Craig Peterson here. Thanks for tuning in. We're glad you're here.  In the last segment of the day, I want to point everybody to the website, of course. You can get my newsletter. It comes out every Sunday morning and it highlights one of the articles of the week. It gives you a pointer to my podcast. So you can listen right there. There's just a lot of great information. Plus I'm also doing little training. I'm sending out, hopefully, next week, two little training sessions for everybody to help you understand security a little better, and this applies to business. However, it's not. Strictly business, much of what I talk about is also for home users. So if you want to go along for the ride, come along, we'd be glad to have you. There's a lot to understand and to know that you won't get from anywhere else. It's just amazing. Many other of these radio shows where they are just nothing but fluff and commercials and paid promotions. I'm just shocked at it. It goes against my grain when that sort of thing happens. Absolutely.  We were just talking about Apple and how Apple got upset with Intel, but they're not the only ones upset. We also now have seen a lot of manufacturers who have started producing Chromebooks and surface tablets that are based on chip sets other than Intel's. This is going to be a real problem for Intel. Intel has almost always relied, certainly in the later years has relied on Microsoft and people bought Intel because they wanted Windows. That's the way that goes. It's just like in the early days, people bought an Apple too, because they wanted a great little VisiCalc, the spreadsheet program.  Now, what we're seeing are operating systems that do not require a single line of Microsoft software. Google Chrome is a great example of it. Linux is another great example and people are loving their Google Chrome laptops, and you can buy these laptops for as little as 200 bucks. Now you get what you pay for and all the way up to a couple of grand and they don't have a line single line of Microsoft code. Yet you can still edit Word documents and Excel documents, et cetera. They do not contain any Intel hardware. What was called, well, they might have a chip here or there, but not the main CPU. What used to be called the Wintel monopoly. In other words, Windows-Intel monopoly is dying. It's dying very quickly.  Apple is not helping now. Apple, they've had somewhere between seven and 10% market share in the computer business for quite a while. Personally, I far prefer Apple Macintoshes over anything else out there by far.  I use them every day. So that's me.  I don't know about you. There's a little bit of a learning curve. Although people who aren't that computer literate find it easier to learn how to use a Mac than to learn how to use Windows, which makes sense.  Apple has really done a great job. A bang-up job. With these new chips, it's getting even faster. We are now finding out from a report from Bloomberg who first started these, that Apple has been posting job listings, looking for engineers to work on 6G technology. 6G, right now we're rolling out 5g, which hasn't been a huge win because of the fact that if you want really fast 5g, like the type Verizon provides, you have to have a lot of micro-cell sites everywhere. They have to be absolutely everywhere.  Of course, it's just not financially reasonable to put them up in smaller communities. If the Biden administration continues the way they're going with the FCC and the open internet type thing of a-bits-a-bit, then there will be no incentive for any of these carriers to expand their networks because they can't charge more for better service. If you can imagine that. Ajit Pai fought against that for many years, Trump's appointee as chairman to the FCC, but things are changing. The wind has changed down in Washington, so we'll lose some of those jobs and we're not going to get all of the benefits of 5g. If he keeps us up. 6G is coming.   What that means is Qualcomm, who is the manufacturer of record for most of the modems that are in our cell phones. Qualcomm has also missed some deadlines. Apple is tired of dependencies on third parties because Qualcomm might have somebody else that buys way more chips. It might be able to sell the same chip to the military of whatever country for a much, much higher price. They can sell it to consumers. Maybe they just change the label on it and call it a mill spec, and often goes right, who knows? What they're doing out there, but Apple doesn't want to do that anymore. They are looking for engineers to define and perform the research for the next generation standards of wireless communications, such as 6G The ads say you will research and design next-generation 6G wireless communication systems for radio access networks with emphasis on the physical Mac L two and L three layers. Fascinating, eh? What do you think?  I think a huge deal as Apple continues to ditch, many of its vendors that have not been living up to the standards Apple has set.  Apple has moved some of the manufacturing back to the United States. More of the assembly has been moved here. The manufacturing, it's starting to come back again. We'll see the Trump administration really wanted it here.  We need it here, not just for jobs, we needed it here for our security. We've talked about that before, too, right? I want to also point out speaking of Apple and manufacturing, China, of course, does most of it for Apple and Foxconn is the company in China that makes almost all of this stuff for Apple. It's huge. Foxconn owns cities. Huge cities. They have high rises where people basically don't see the light of day, these high rise factories. You live there, you eat there, you shop there, you work there.  Like the old company store who is it, Tennessee Ernie, right? Owe my soul to the company store. That's what's happening over there. And Foxconn has kept its costs low by bringing people in from the fields, if you will, out there being farmers and paying them extremely low wages. On top of all of that, in some cases they're using slave labor. I found this article very interesting, from Ars Technica's, Timothy B. Lee. He's talking about a potential partnership between Apple and Nissan. Let me remember. I mentioned Apple talking with Kia and Kia is denying it. The financial times reported on Sunday that this potential deal between Apple and Nissan fell apart because Apple wanted Nissan to build Apple cars, they would have the Apple logo on them. They all be branded Apple. It wouldn't say Nissan unless you took something seriously apart you might find it inside.  Nissan wanted to keep the Nissan brand on its own vehicles. Bloomberg reported last week that the negotiations with Kia and of course its parent companies Huyndaiin South Korea had ended without a deal. The Financial Times said that Apple has also sounded out BMW as a potential partner because Apple doesn't make cars. So how are they going to do this? Apparently the talks faltered with Apple and Nissan because Nissan had a fear and apparently this is true of Kia too, of becoming quote the Foxconn of the auto industry, unquote, which is a reference to this Chinese well it's Taiwanese technically, but a group that manufacturers are while actually assembles the iPhones. Fascinating. Isn't it fascinating.  When you start to dig into this self-driving technology and the numbers behind it, that's where you wonder, why is Apple even trying at this point, Apple's test vehicles only traveled 18,000 miles on California roads. Between 2019 and 2020, or over the course of about a year, late in both years. 18,000 miles in a year. Heck, I've done that before with my own car.  Waymo, which is Google's self-driving project put on more than well, about 6

Human LAB Podcast
Apsurd zatvaranja teretana, tehnike disanja i zdravlje nacije: IGOR BLAŽINČIĆ | Human LAB Podcast #21

Human LAB Podcast

Play Episode Listen Later Feb 12, 2021 120:32


U turbulentnih 2h razgovora prošli smo mnoge teme. Veliki dio vremena odvojili smo na trenutnu situaciju lockdowna. Mjerama zatvaranja teretana, i osiromašivanja naroda. Apsurdima stožera s kojima se ne slaže. Ne zaboravi se pretplatiti i posjetiti na društvenim mrežama.! Druga tema koja je bila dosta diskutirana bilo je disanje. Kako pravilno disati i šzo sve čini nepravilno disanje. Dotaknuli smo se i Wim Hof metode, Pranayame, Buteyko hladnih kupki. - NIKSEN Hrana za tijelo, um i dugovječnost ( https://niksennutrio.com) TIME STAMPS 00:00 - Intro 03:00 - Zatvaranje teretana koliko apsurdna odluka stožera 16:30 - Posljedice lockdowna 20:10 - Traume i psihički poremećaji 23:40 - Zdravstveni sustav ima problem u korjenu 26:30 - Rješavanje zdravlja i odnosa prema zdravlju, uklanja puno drugih problema u državi 36:00 - Tko je Igor Blažinčić, od malena lud za košarkom, školu nisam volio a na sjeveru maksimira sam ostavio svoju mladost 41:30 - Rutine koje me grade kao pojedinca ali i kao člana zajednice 46:40 - Disanje, preko 90% ljudi na planeti krivo diše, 3 kriva načina disanja 56:30 - Wim Hof disanje, Pranayama, alkemijski aspekti, Buteyko 01:04:40 - Prehrana, sokoterapija, intermittent fasting, što više dišem to manje hrane konzumiram 01:16:25 - Voda je previše zagađena, voda nosi svoju informaciju 01:20:00 - Uzemljenje, Grounding, Hodanje bos 01:22:05 - Oporavak od fizičkih aktivnosti putem prehrane, spavanja, meditacije i tehnikama disanja 01:27:40 - Tko su bili moji mentori, tko je ostvario najveći utjecaja na mene 01:32:45 - Obitelj, patrijarhalni stereotipovi i istinske vrijednosti 01:37:00 - Body & Mind centar, spoj nespojivog, Pilates i kondicijska priprema, Elite Power Flow 01:49:30 - Masti nam ne trebaju u tolikoj mjeri 01:51:10 - U životu apsolutno ništa nije sigurno, okrenuti se prema sebi to je ono što me 2020. naučila.

The Podcast from The Temple
Episode 33: Everyone is Welcome

The Podcast from The Temple

Play Episode Listen Later Feb 9, 2021 26:46


This week we talk with our colleague Rabbi Steven Rau, RJE, The Temple's Director of Lifelong Learning and co-author of Everyone is Welcome: Creating a Culture of Inclusion in Congregational Schools. In honor of Jewish Disability Awareness Month, we discuss how The Temple has made our education programs inclusive of all learners. And, since Rabbis Berg and Rau were rabbinical school classmates, you can imagine what else might make it into the conversation, too!

BabyRoompodcast
EP 15 BabyRoom - Monkey Mind vs Mindfulness - Multitasking ili život u trenutku

BabyRoompodcast

Play Episode Listen Later Jun 23, 2020 26:59


Ubrzani način života, multitasking i monkey mind jedna je strana življenja, za koju možemo reći da je u današnje vrijeme neizbježna, ali postoji nešto što našem mozgu daje malo odmora, smiruje i pokazuje kako se nositi sa strahovima, a to je Mindfulness. O toj smo temi u ovoj emisiji popričale s dvije gošće: Vesnom Laković iz Novog Sada mindfulnesscorner.com i Josipom Mihić sa zagrebačkom adresom iz MiniMindfulnessa. Duboko udahnite i usredotočite svoju svijest na ovu emisiju sljedećih 27 minuta. 2:00 Mindfulness, usredotočena svjesnost, svjesna pažnja… što je to točno i kako do toga doći, zna Vesna Laković iz Novog Sada 4:00 Djeca su po prirodi mindfulness, ali to se s vremenom izgubi 5:28 Ne prosuđivati što nam se događa je također vještina koja se uči 7:17 Vježbom do Mindfulnessa 9:35 Na ovaj način je moguće smiriti aktivnost amigdale i postati organiziraniji, smireniji i manje u strahu 10:50 Rješenje za tantrume?! 14:00 Josipa o pokretanju MiniMindfulnessa 15:40 Monkey Mind, nedostatak pozornosti, svi imamo isti problem 16:00 Kako u svakodnevnom ubrzanom životu kontrolirati multitasking?! 20:40 Pretočili vježbice za djecu i roditelje na Facebook stranicu MiniMindfulness 21:40 Grupirali su vježbice u pet skupina - disanje, fokus&pažnja, osvješćivanje tjelesnih senzacija, razumijevanje uma te vježbe suosjećanja i zahvalnosti 23:30 Osobna vremenska prognoza je dobar primjer za izvući informacije iz djeteta kako se trenutno osjeća 24:14 Tutorial vježbe zmaja - odlična za djecu predškolske i školske dobi

Microleadership - micro conversations, extraordinary ideas, incredible impact
Episode 5: Building your employee experience around your customer experience with Richard Elsey

Microleadership - micro conversations, extraordinary ideas, incredible impact

Play Episode Listen Later Apr 27, 2020 25:39


In this conversation I talk to Richard Elsey about the importance of the employee experience. Richard is passionate about service and the importance of really getting to know your customer. This passion then runs through his approach to leadership. In this micro conversation Richard shares why this matters and what difference it makes to the success of your organisation. He also shares some simple and yet practical tips that can really make a difference. Richard is Director or RJE associates, a boutique training and learning consultancy based in London (www.rjeassociates.com). His business is awakening and inspiring the learning mindset. After a highly successful career in high end service environments Richard brings this passion for excellence to the work he now does supporting luxury brands.

Principal Center Radio Podcast – The Principal Center
Anne Gregory and Katherine R. Evans—The Starts and Stumbles of Restorative Justice in Education: Where Do We Go from Here?

Principal Center Radio Podcast – The Principal Center

Play Episode Listen Later Apr 20, 2020 24:25


Read The Starts and Stumbles of Restorative Justice in Education: Where Do We Go from Here?Learn more about the Restorative Justice in Education course at Eastern Mennonite UniversityAbout the AuthorsAnne Gregory is a professor at Rutgers University. Since she joined the faculty, she has been dedicated to making advances in her areas of research on school discipline. Dr. Gregory has been part of the Research-to-Practice Collaborative on Discipline Disparities, comprised of a national panel of researchers, educators, and policy analysts advocating for change in the gender and race disparities in discipline.Katherine Evans has been a professor in teacher education at Eastern Mennonite University since 2011. She teaches courses in educational psychology, special education, and restorative justice in education (RJE). She holds a Ph.D. in Educational Psychology and Research from The University of Tennessee in Knoxville where her dissertation research employed phenomenological interviews with middle school students about their experiences with in-school suspension.

Dnevna Doza Motivacije
Dnevna Doza Motivacije - Kako otključati svoj potencijal i uspjeti

Dnevna Doza Motivacije

Play Episode Listen Later Jul 29, 2018 16:30


Osoba u prosjeku koristi 15% svog potencijala. Koja je vizija vašeg života za 5 do 10 godina? Koje ciljeve želite postići? U ovoj epizodi Dnevne Doze Motivacije Smiljan će vas inspirirati da donesete odluku da danas krenete koristiti svoj potencijal. Rješavanjem izazova svaki dan vi ispunjavate svoj potencijal. Jeste li spremni na to?

Mission Europe – Mission Berlin | Učite njemački | Deutsche Welle

Prilikom ručka Ana Paulu izgovori tajanstvenu poruku: "Rješenje je u podjeli, slijedi muziku!" Paul joj daje muzičku kutiju i kaže joj da ide kod pastora Markusa Kavaliera. Da li je to pravi trag? Paul je popravio muzičku kutiju, ali ona ne svira melodiju do kraja. Nedostaje jedna strofa. Ana mu ispriča za tajanstvenu poruku: "Rješenje je u podjeli, slijedi muziku!" Paul potom daje Ani muzičku kutiju i kaže joj da ide kod pastora Markusa Kavaliera, u crkvu Gethsemane. Od igrača Ana saznaje da je crkva bila sastajalište protivnika režima nekadašnjeg DDR-a.

Mission Europe – Mission Berlin | Učite njemački | Deutsche Welle

Ana ima zadatak da spasi Njemačku od velike nesreće. Ona mora da riješi jednu zagonetku i da se čuva nepoznatih muškaraca koji voze motore. Za sve to ima rok od 130 minuta. Ali, odakle da počne? Ana je odsjela u sobi broj 14 u jednom hotelu u Njemačkoj. Dolazi komesar Ogur koji joj se predstavi i objasni joj da je u sobi 40 ubijen jedan gost. Na ogledalu u kupaonici pronašao je tajanstvenu poruku: "Rješenje je u podjeli, slijedi muziku." Ana odlazi s komesarom na ispitivanje koje se provodi u ulaznoj sali hotela. Šta li znači tajanstvena poruka i pokvarena muzička kutija u njenoj sobi?