POPULARITY
Mark “Murch” Erhardt and Mike Schmidt are joined by Jonas Nick, Jameson Lopp, Steven Roose, Gregory Sanders, and Salvatore Ingala to discuss Newsletter #348.News● Educational and experimental-based secp256k1 implementation (1:09) Changing consensus● Should vulnerable bitcoins be destroyed? (9:17) ● Securely proving UTXO ownership by revealing a SHA256 preimage (34:52) ● Draft BIP for destroying quantum-insecure bitcoins (44:01) ● Criticism of CTV motivation (51:16) ● CTV+CSFS benefits (1:06:02) ● Benefit of CTV to Ark users (1:24:37) ● OP_CHECKCONTRACTVERIFY semantics (1:31:49) ● Draft BIP published for consensus cleanup (1:58:29) Releases and release candidates● BDK wallet 1.2.0 (2:06:03) ● LDK v0.1.2 (2:06:48) ● Bitcoin Core 29.0rc3 (2:07:13) ● LND 0.19.0-beta.rc1 (2:08:36) Notable code and documentation changes● Bitcoin Core #31363 (2:09:03) ● Bitcoin Core #31278 (2:09:44) ● Eclair #3050 (2:12:41) ● Eclair #2963 (2:13:54) ● Eclair #3045 (2:14:44) ● LDK #3670 (2:15:47) ● LND #9620 (2:16:24)
How can businesses securely and privately use AI tools? And, what are the top cyber risks of AI, anyway? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. Want to quickly come up to speed with the NIST AI Risk Management Framework? Listen to these two episodes: Part 1 -- https://cr-map.com/podcast/153 Part 2 -- https://cr-map.com/podcast/154
Join George Haas as he explores the intersection of attachment theory and meditation, and the path to live a more meaningful life. If you're interested in meditation-based attachment repair for long-term healing, this is for you.Like this? Grab our free video resource called
At Enterprise Connect 2025, Sam Etler of Numeracle joined Doug Green, publisher of Technology Reseller News, to discuss how enterprises can protect their brand identity and restore trust in voice communications through secure branded calling. Solving the Growing Threat of Spoofed Calls Branded calling has become a critical tool for enterprises looking to authenticate their phone calls. However, traditional branding solutions have been vulnerable to spoofing, where scammers mimic legitimate businesses, damaging reputations and causing financial losses. “This is a way of securely adding your logo, a reason for calling, and your name to a call in a way that cannot be spoofed,” said Etler. “Unlike legacy branded calling solutions, our cryptographic signatures ensure calls are verified by the mobile provider.” What Makes Secure Branded Calling Different? Protects against spoofing: Traditional branding can be manipulated by fraudsters who hijack a business's caller ID, but Numeracle's solution prevents unauthorized branding. Enhances customer trust: Securely verifies the caller's identity before the call reaches the recipient. No third-party apps required: Works natively on iOS and Android without additional software. Live Demos at Enterprise Connect Numeracle is demonstrating this secure branded calling solution live at Booth #1000 at Enterprise Connect, showcasing real-time call authentication. “You'll see our logo appear on devices with no prior setup, proving that the branding is delivered over the network securely,” said Etler. Why Should Enterprises Pay Attention? With brand reputation at risk, large enterprises need to act now to prevent call spoofing and ensure their customers trust incoming calls. For those not attending Enterprise Connect, more information can be found at numeracle.com, where enterprises can also learn about call reputation management solutions to combat spam labeling issues.
In this episode of Control Intelligence, written by contributing editor Jeremy Pollard, editor in chief Mike Bacidore discusses remote monitoring and diagnostics, and how they require security.
Your Nightly Prayer
Alexandre Isaac, founder of The Repair Academy and Seensys, discusses how his companies are transforming the way businesses repair and recycle IT equipment while promoting sustainability and technical expertise. The Repair Academy is a training school designed to equip anyone with the skills to repair phones, tablets, and computers. From battery replacements to advanced chip repairs, the academy helps individuals and businesses extend the life of their electronics, reducing e-waste while building valuable technical skills. Seensys: Sustainable IT Asset Disposal (ITAD) Synsys specializes in eco-friendly IT asset disposal (ITAD), helping businesses responsibly manage end-of-life computers, mobile devices, and tablets. Their process includes: Collecting used IT equipment directly from companies Securely erasing all data before resale Repairing and refurbishing devices to give them a second life Reselling them to promote circular economy practices For businesses looking to upgrade their tech while minimizing environmental impact, Seensys offers a seamless and responsible solution. Get in Touch To learn more about device repair training or sustainable IT disposal, visit http://seensys.com/ and https://therepairacademy.com/ #DeviceRepair #ITAD #Sustainability #RefurbishedTech #TelecomReseller
RJJ Software's Software Development Service This episode of The Modern .NET Show is supported, in part, by RJJ Software's Podcasting Services, whether your company is looking to elevate its UK operations or reshape its US strategy, we can provide tailored solutions that exceed expectations. Show Notes "From the very first lesson of "Hello, World" they teach us to make insecure code. So the first thing with "Hello, World" is how to output to the screen. That is fine. But the second part of "Hello, World" is: you ask them their name, you take their name. you don't validate it, and then you say "Hello," and you reflect their name back onto the screen with no output encoding. And then you just made cross-site scripting. And right from the very first lesson, we teach everyone wrong in pretty much every language, and so as a result we end up with a lot of people doing code the wrong way. Like, universities are still teaching lots of things wrong. And so I'm hoping that this book will help."— Tanya Janca Welcome friends to The Modern .NET Show; the premier .NET podcast, focusing entirely on the knowledge, tools, and frameworks that all .NET developers should have in their toolbox. We are the go-to podcast for .NET developers worldwide, and I am not your host: Jamie. I'm Delilah and I will be recording the intro for this episode because Jamie's throat infection returned, making it tough for him to record this intro. In this episode, we welcomed Tanya Janca back to the show. This conversation marks her third appearance on the show, and a slight change in focus to Secure Coding. We talk about how developers are taught to write insecure code from day one (or "Hello, World!"), about how her new book "Alice and Bob Learn Secure Coding" could help with that, the many hours of free education and learning that Tanya has created alongside the book, and how both data scientists and academics approach software development differently to some of us developers. "There are so many amazing security features in .NET. There's so many. Like, because I... I wrote about eight different frameworks and .NET by far had the absolute most different security features. And part of it, some of them are from Windows. Some of them are from C... because I wrote about C# and .NET. And to be quite honest, audience, I mixed them up quite a bit because, "what is specifically C#, and what is specifically .NET," got a bit confused in my brain. But I'm like, all of it's good. Do all of it"— Tanya Janca Anyway, without further ado, let's sit back, open up a terminal, type in `dotnet new podcast` and we'll dive into the core of Modern .NET. My voice was created using Generative AI. Supporting the Show If you find this episode useful in any way, please consider supporting the show by either leaving a review (check our review page for ways to do that), sharing the episode with a friend or colleague, buying the host a coffee, or considering becoming a Patron of the show. Full Show Notes The full show notes, including links to some of the things we discussed and a full transcription of this episode, can be found at: https://dotnetcore.show/season-7/the-security-expert-speaks-tanya-janca-on-learning-to-code-securely/ Tanya's Previous Appearances: Episode 77 - Application Security with Tanya Janca Episode 105 - More Application Securuty with Tanya Janca Useful Links Tanya's books Tanya's newsletter Hello, World Don't Accept The Defaults Semgrep Okta Pushing Left, Like a Boss: Part 1 Owasp DAST (Dynamic Application Security Testing) SAST (Static Application Security Testing) Semgrep Academy (previously known as WeHackPurple Academy) Application Security Foundations Level 1 Owasp Juice Shop OwaspHeaders.Core Owasp Top Ten Content-Security-Policy Trusted Types Jason Haddix Retrieval-Augmented Generation (aka RAG) Posting Malicious Code as an Answer Supporting the show: Leave a rating or review Buy the show a coffee Become a patron Getting in Touch: Via the contact page Joining the Discord Remember to rate and review the show on Apple Podcasts, Podchaser, or wherever you find your podcasts, this will help the show's audience grow. Or you can just share the show with a friend. And don't forget to reach out via our Contact page. We're very interested in your opinion of the show, so please get in touch. You can support the show by making a monthly donation on the show's Patreon page at: https://www.patreon.com/TheDotNetCorePodcast.
פרק מספר 488 של רברס עם פלטפורמה, שהוקלט ב-7 בינואר 2025 - פרק ראשון לשנת 2025, בתקווה שתיהיה שנת בשוורת טובות. אורי ורן מארחים באולפן בכרכור את גיא גרינאפל מחברת Pillar Security כדי לדבר על LLM ו-Security.
Connecticut residents can now choose to automatically block online tracking. East Hampton will consider granting $4 million for affordable housing projects. Connecticut and New York receive A grades for gun safety. Plus, a new effort to help local farmers with mental health challenges.
On today's LawNext: we hand over the podcast to NotebookLM to discuss the state of law practice management technology. If you haven't heard of NotebookLM, it is a generative AI tool from Google that turns your documents into engaging audio discussions. Its output sounds a whole lot like, well, a podcast, with two hosts chatting it up about your documents. To quote Google's own description, “With one click, two AI hosts start up a lively “deep dive” discussion based on your sources. They summarize your material, make connections between topics, and banter back and forth.” So we decided to give it a try. Back in September, LawNext host Bob Ambrogi wrote a four-part series on his LawSites blog called, “The Shrinking Ownership of Law Practice Management Technology.” It was a deep dive into how ownership of law practice management software for solo and small law firms has been consolidated under just six major ownership groups. We loaded the four parts of that series into NotebookLM and asked it to generate its audio overview. What you'll hear today is the discussion it generated, followed by Bob's thoughts on what it produced. The NotebookLM audio is about 15 minutes long, and Bob's comments will come after that plays. It is important to keep in mind that the audio generated by NotebookLM is not simply a summary. The two speakers do summarize key points from Bob's articles, but they also add interpretations and perspectives that are nowhere to be found in the original source material. Here are the articles on which the audio is based: The shrinking ownership of law practice management technology (Part 1 of 4): A Market Dominated by Just Six Ownership Groups. The shrinking ownership of law practice management technology (Part 2 of 4): A Scorecard of Who Owns What. The shrinking ownership of law practice management technology (Part 3 of 4): Future Development and Market Opportunities. The shrinking ownership of law practice management technology (Part 4 of 4): Wrapping It All Up. Thank You To Our Sponsors This episode of LawNext is generously made possible by our sponsors. We appreciate their support and hope you will check them out. Paradigm, home to the practice management platforms PracticePanther, Bill4Time, MerusCase and LollyLaw; the e-payments platform Headnote; and the legal accounting software TrustBooks. Littler, local everywhere. Steno, reliable court reporting with a revolutionary approach ShareFile, Securely send, store, and share files – plus discover document workflows designed to improve your client experience. If you enjoy listening to LawNext, please leave us a review wherever you listen to podcasts.
You cannot have innovation without adoption. That was a theme I heard repeatedly when I attended the Knowledge Management & Innovation for Legal conference in New York City in October. Our guest today, Paul Henry, would take that a step further and say you do not really have adoption without engagement. Henry is the founder and CEO of NGAGE Intelligence, a platform that provides law firms with highly granular and comprehensive behavioral analytics to help them understand whether, how and by whom their communication, collaboration and AI tools are being used. NGAGE was founded on the notion of employee engagement and how analytics can be used to measure and improve it. At the conference, LawNext host Bob Ambrogi sat down with Henry to learn more about Ngage and how the analytics it provides can drive adoption, engagement and governance. A note that this was recorded live at the conference, as the morning keynote speech was being piped throughout the conference area, so I apologize for the background noise. Thank You To Our Sponsors This episode of LawNext is generously made possible by our sponsors. We appreciate their support and hope you will check them out. Paradigm, home to the practice management platforms PracticePanther, Bill4Time, MerusCase and LollyLaw; the e-payments platform Headnote; and the legal accounting software TrustBooks. Littler, local everywhere. Steno, reliable court reporting with a revolutionary approach Sharefile, Securely send, store, and share files – plus discover document workflows designed to improve your client experience. If you enjoy listening to LawNext, please leave us a review wherever you listen to podcasts.
Everlaw for Good is a program run by the e-discovery company Everlaw, through which it makes its software available at no cost to legal aid organizations, nonprofit organizations, and investigative journalists. One beneficiary of that program is the Center for Justice and Accountability, a human rights nonprofit that works to seek justice on behalf of victims of atrocity crimes, including torture, genocide, and war crimes. At the recent Everlaw Summit, the CJA's work using the Everlaw platform was honored with the Everlaw for Good award. LawNext host Bob Ambrogi was at the summit, which was held in San Francisco in October, and he had the opportunity to sit down to record this conversation with two of the CJA's lawyers, along with the director of the Everlaw for Good program. Today's guests are: Claret Vargas, senior staff attorney at CJA. Daniel McLaughlin, senior staff attorney at CJA. Joanne Sprague, director of Everlaw for Good. They discuss the Everlaw for Good program and the specific impact it has had on CJA's work. Thank You To Our Sponsors This episode of LawNext is generously made possible by our sponsors. We appreciate their support and hope you will check them out. Paradigm, home to the practice management platforms PracticePanther, Bill4Time, MerusCase and LollyLaw; the e-payments platform Headnote; and the legal accounting software TrustBooks. Littler, local everywhere. Steno, reliable court reporting with a revolutionary approach Sharefile, Securely send, store, and share files – plus discover document workflows designed to improve your client experience. If you enjoy listening to LawNext, please leave us a review wherever you listen to podcasts.
PREVIEW: PIGEONS: In "Ten Birds That Changed the World," author Stephen Moss describes the crucial role of homing pigeons in carrying messages securely during World War I and the Normandy invasion. More later on the magic of birds. 1939-1945 Winkie and the rescued
In this episode, Nik sits down with Unchained co-founders Dhruv Bansal and Joe Kelly to unpack why Bitcoin security demands a unique approach—far different from traditional financial services. They discuss why bitcoin's structure requires holders to prioritize collaborative custody over standard methods. Dhruv and Joe also provide technical insights behind multi-signature (multi-sig) security, key management, and inheritance planning. The logistical background behind managing your bitcoin illustrates how this asset is reshaping our understanding of security and protection in the world of personal finance. The Bitcoin Layer is a bitcoin and global macroeconomic research firm. The Bitcoin Layer is proud to be sponsored by Unchained, the leader in Bitcoin financial services. Unchained empowers you to take full control of your Bitcoin with a collaborative multisig vault, where you hold two of three keys, and benefit from a Bitcoin security partner. Purchase Bitcoin directly into your cold storage vault and eliminate exchange risks with Unchained's Trading Desk. Unchained also offers the best IRA product in the industry, allowing you to easily roll over old 401(k)s or IRAs into Bitcoin while keeping control of your keys. Don't pay more taxes than you have to. Talk to us today. Visit https://thebitcoinlayer.com/unchained and use code TBL for $100 off when you create an account. Try Stamp Seed, a DIY kit that enables you to hammer your seed words into a durable plate of titanium using professional stamping tools. Take 15% off with code TBL. Get your Stamp Seed today! https://www.stampseed.com/shop/titanium-seed-phrase-storage-kits.html?utm_source=substack&utm_medium=email Subscribe and turn on notifications for TBL on YouTube. Subscribe to TBL's research letter: https://thebitcoinlayer.com/subscribe Follow TBL on X: https://twitter.com/TheBitcoinLayer Subscribe to The Bitcoin Layer on your favorite podcast platform. Join the official TBL channel on Telegram: https://t.me/thebitcoinlayerofficial Use code TBLYT10 for 10% off all The Bitcoin Layer Merch at http://TheBitcoinLayer.com/merch Block Height 869215 Contribute to The Bitcoin Layer via Lightning Network: thebitcoinlayer@zbd.gg Nik Bhatia's Twitter: https://twitter.com/timevalueofbtc Creative Director Matthew Ball's Twitter: https://twitter.com/matthewrball #TheBitcoinLayer #NikBhatia #BitcoinSecurity #UnchainedCapital #CollaborativeCustody #DhruvBansal #JoeKelly #MultiSig #KeyManagement #BitcoinCustody #FinancialSecurity #BitcoinOwnership #SelfCustody #InheritancePlanning #BitcoinProtection #PersonalFinance #DigitalAssets #BitcoinEducation #BitcoinPodcast #KeyProtection #BitcoinStorage #BitcoinCommunity #AssetSecurity #FinancialIndependence #BitcoinPlanning #FutureOfFinance #DigitalWealth #BitcoinMindset #SecureYourBitcoin #FinancialInnovation #LongTermSecurity #BitcoinResponsibility #BitcoinManagement #WealthProtection #BitcoinSafety #BitcoinResilience #Bloomberg #Analysis #Charts #Tradingview #InvestmentStrategy #MarketWatch #StockMarket #PassiveInvesting #IndexFunds #FinancialMarkets #MarketWatch #FreeMarket #FreeMarkets #Markets #USTreasury #TreasuryBills #BalanceSheet #FED #Debt #Inflation #Statistic #Rates #Interest #Asset #Bitcoin #Dollar #Sats #BTC #Gold #Market #Trading #Currency #Crypto #Analysis #Investment #News #Finance #Education #Blockchain #Mining #BitcoinMining #macro The Bitcoin Layer and its guests do not provide investment advice.Subscribe to The Bitcoin Layer on Soundwise
Get personalized courses, live webinars & Q&As, and more for free for 7 days! https://attachment.personaldevelopmentschool.com/dream-life?utm_source=podcast&utm_campaign=7-day-trial&utm_medium=organic&utm_content=mg-11-04-24&el=podcast Become a certified relationship coach to secure your financial future with our IAT™ Program. https://attachment.personaldevelopmentschool.com/iat?utm_source=podcast&utm_campaign=iat-live&utm_medium=organic&utm_content=mg-11-04-24&el=podcast Feeling thrown off balance when your ex moves on? Securely attached individuals may feel nostalgic, but they process breakups without lingering pain or self-doubt. In this episode, we dive into how secure attachment styles handle seeing an ex move on by meeting their own needs, avoiding core wound projections, and gaining healthy closure. Ready to understand your own attachment style and discover how to make breakups easier on your heart? Tune in for insights on emotional resilience, plus actionable tips to foster secure attachment behaviors in yourself! Let's connect! https://www.youtube.com/@ThePersonalDevelopmentSchool https://www.tiktok.com/@thaisgibson https://www.instagram.com/thepersonaldevelopmentschool/ https://www.facebook.com/ThePersonalDevelopmentSchool/ Learn more about your ad choices. Visit megaphone.fm/adchoices
Today, Joyan sits with Bev to explore the complexities of attachment styles and their impact on our romantic relationships. Bev shares insights into the four main attachment styles: secure, anxious-preoccupied, dismissive-avoidant, and fearful-avoidant. Each style stems from early experiences and shapes how we emotionally bond with others in adulthood. Bev emphasizes the significance of self-awareness in understanding one's own attachment style and the behaviors associated with it. By identifying these patterns, you can work toward healthier, more fulfilling relationships. You are encouraged to reflect on your attachment styles and consider how they influence your relationships, empowering you to make positive changes for a more connected and loving relationship. Tune in now! What we talked about: What is the attachment theory How did we develop these patterns Breakdown of the 4 attachment styles The approach to becoming securely attached Episode Resources: Bev Website Bev Instagram Take your quiz here Birthday Special! Take 10% off this month when you join our 30-day Podcast Launch Bootcamp! Use promo code [OCTOBER10] on the checkout page here! To learn more, visit masterclass.joyanchan.co/bootcamp ABOUT: Joyan Chan is an award-winning coach, international speaker, and podcaster. The core of her work centers on helping leaders and entrepreneurs develop unshakable confidence to build a Rockstar personal brand, gain worldwide exposure, and earn recognition for their expertise through podcasting. Joyan's years of experience as a young lecturer, team leader, and business owner have given her a keen sense of what it takes to become a confident, visible, and impactful leader in today's world. Her personal journey, which involved transforming depression into empowerment and building her brand from the ground up in just two years, inspired her to create a proven roadmap called "Rookie to Rockstar." It's the same roadmap she has followed and now uses to guide her clients to launch, market and monetize their podcasts, positioning them as industry ICONs. Joyan has been featured in numerous magazines, publications, shows and has spoken at many industry events. In March 2022, Joyan was awarded Outstanding Leadership Award on stage in Dubai, UAE. In the same year, she was also named a successful person by Britishpedia. Meet me at joyanchan.com
Join Gartner experts Chris Mixter and Richard Addiscott in this episode of CISO Edge to debunk the myths around why employees behave nonsecurely, why most tactics and executive communications around employee behavior don't work, and to explore ways to rapidly increase the value delivered by your secure behavior and culture program (SBCP).What if I told you that “lack of cyberawareness” isn't the reason people behave nonsecurely? (03:50)Where do your employee-related security incidents come from? (09:56)How can we move from compliance-centric to behavior-centric cybersecurity? (13:48)Help executives understand what is a defensible level of performance around human risk exposure. (26:15)Richard Addiscott is a Vice President Analyst in Gartner's global security and risk management practice, helping CISOs and senior cybersecurity executives deliver highly effective information security programs and build high performing cybersecurity teams. With more than 20 years of experience in industry, Richard has held enterprise information security and IT leadership, information security consulting and advisory, IT governance, and business development roles across the public, private, and not-for-profit sectors.
Send us a textWhat if your organization's security posture could withstand any cyber threat? This episode of the CISSP Cyber Training Podcast promises to equip you with actionable insights from CISSP Domain 3, emphasizing the critical principle of failing securely. We tackle the intricacies of separation of duties, zero trust, and the benefits of maintaining simplicity in your systems. Plus, I share my firsthand experience with virtual CISO roles, providing a roadmap for hiring a security professional, from conducting gap assessments to understanding risk profiles and developing robust mitigation strategies.Next, we dive deep into data security and management essentials. Discover why data classification and separation of duties are paramount in preventing fraud and protecting sensitive information. We'll cover the importance of data loss prevention measures, network segmentation, and change management to safeguard your systems from unauthorized modifications. Learn the significance of monitoring, logging, and process isolation techniques like virtualization and sandboxing to detect anomalies and limit the damage from breaches. And don't miss our discussion on capability-based security, application whitelisting, and the strategic application of these controls based on thorough gap assessments.Lastly, we explore the facets of system resilience and security measures that ensure reliability. Understand the concept of graceful degradation and the pivotal role of error handling and logging in troubleshooting. We highlight the importance of redundancy, fault tolerance techniques, and the principle of security by design. Proper testing and auditing are emphasized to ensure systems fail securely, and we provide strategies for addressing both soft and hard failures. Additionally, the roles of job rotation, dual control, and mandatory vacations in error detection and risk management are examined, along with a comparison of on-premise versus cloud networks to help you maintain critical servers and applications. This episode is a treasure trove of practical knowledge to elevate your cybersecurity readiness.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
Send us a textC4 Leaders – the ONLY nonprofit to utilize the pizza making process to create space for our companions to be seen, heard, and loved. We also write children's books, host this podcast, and use the most amazing handmade, hand-tossed, sourdough pizza to bring out the best in each other. Please check out PIZZADAYS.ORG to support our important work. Season 4 Episode #13 Bev Mitelman (inform, inspire, & transform)You can find Bev via her website securelyloved.comAbout our guest: Bev is a Certified Attachment Practitioner and Founder of Securely Loved. Securely Loved is a company comprised of Relationship and Attachment Trauma Practitioners who work internationally to guide their clients through life's odyssey. As a child, Bev lived in a very unpredictable and chaotic environment where she never knew if she could rely on her parents to meet her emotional needs. This led her to absorb unhealthy relationship ideas based on what she was witnessing: she believed relationships were supposed to be unbalanced, uncertain, and overall chaotic. Prior to her current work, Bev was an Executive Leader, University Lecturer and published author. She has dedicated her entire career (25+ years) working with adults in the realm of personal growth and professional development.Bev, thanks for sharing your many gifts with the world and for being our guest on Life's Essential Ingredients, Welcome to the show!TOTD – “Change is the end result of all true learning.” Leo BuscagliaBuild a habit - to create intention - to live your purpose! In this episode:What was life like growing up?What are your life's essential ingredients?To generalize… what do you think are the top 5 essential ingredients of life? What are we all searching for?...Emotions we experience and how we develop and understand them as we grow up and then the effect on our lives as we move thru our odyssey…Emotional Attunement and actions parents can take to help their child understand and experience emotional regulation…. PERMISSION TO FEEL… Skill that is learnedValidation of being seen, heard, and loved… and what happens when that doesn't happen…Confidence and Self-Worth…Jane Goodall…TRUST that was role modeled by her mother….What is attachment?Attachment TheoryAttachment Trauma?Attachment Styles: Secure, Anxious Preoccupied, Dismissive Avoidant, Fearful Avoidant – offers free quiz…Codependency….Behaviors, Coping Strategy?Fight or Flight mode and living in that space… self-awarenessOnline Courses, Workshops, Free eBook, FREE ConsultHow would a listener know they need the services you offer…where should they start…The importance of self-awareness and self-love…Communicating our needs….Finding fulfillment in life? How do you define fulfillment?Great coaches and mentors…Last book or books you recommend?Legacy
In this episode, we explore how to be genuinely happy while single, embracing this time as an opportunity for self-discovery, growth, and independence. We'll share powerful insights on building a life you love without waiting for a partner, finding joy in your company, and using this period to pursue your passions and goals unapologetically. We'll In this episode, I'll explore how to be genuinely happy while single, embracing this time as an opportunity for self-discovery. I share my 3 step method to align your mindset and actions during this period of your life for maximum growth and peace. I then take on audience questions regarding intellectual stimulation, someone's fiance missing her birthday, and my thoughts on eating ass. It is time you embrace the singlehood and create a life for yourself that is 100% unapologetically you. Chapters 1:01 How to be Happy While Single 43:46 Audience Questions Apply to Work with Me: https://confidencechris.com/coachingapplication Take my Free Dating Personality Quiz: https://confidencechris.com/quiz/ Sign up for my free weekly coaching newsletter: https://confidencechris.com/ --- Support this podcast: https://podcasters.spotify.com/pod/show/confidence-chris/support
What do you do when you feel stressed, anxious, and overwhelmed? Where do you go for your security? Join us this Sunday as we learn what the Bible has to say about living securely when life gets rocky.
HP released the findings of a global survey highlighting the growing concern over nation-state threat actors targeting physical supply chains and tampering with device hardware and firmware integrity. The study of 800 IT and security decision-makers (ITSDMs) responsible for device security highlights the need for businesses to focus on device hardware and firmware integrity, with attacks on hardware supply chains and device tampering expected to increase. Key findings from the HP Wolf Security Study include: Almost one in five (19%) organisations surveyed say they have been impacted by nation-state threat actors targeting physical PC, laptop or printer supply chains. In the US, this figure rises to 29%. Over a third (35%) of organisations surveyed believe that they or others they know have already been impacted by nation-state threat actors targeting supply chains to try and insert malicious hardware or firmware into devices. Overall, 91% believe nation-state threat actors will target physical PC, laptop or printer supply chains to insert malware or malicious components into hardware and/or firmware. Almost two-thirds (63%) believe the next major nation-state attack will involve poisoning hardware supply chains to sneak in malware. "System security relies on strong supply chain security, starting with the assurance that devices are built with the intended components and haven't been tampered with during transit. If an attacker compromises a device at the firmware or hardware layer, they'll gain unparalleled visibility and control over everything that happens on that machine. Just imagine what that could look like if it happens to the CEO's laptop," comments Alex Holland, Principal Threat Researcher in the HP Security Lab. Holland continues, "Such attacks are incredibly hard to detect, as most security tools sit within the operating system. Moreover, attacks that successfully establish a foothold below the OS are very difficult to remove and remediate, adding to the challenge for IT security teams." Considering the scale of the challenge, it's unsurprising that 78% of ITSDMs say their attention to software and hardware supply chain security will grow as attackers try to infect devices during transit. Organisations are concerned that they are blind and unequipped to mitigate device supply chain threats like tampering. Over half (51%) of ITSDMs are concerned that they cannot verify if PC, laptop or printer hardware and firmware have been tampered with during transit. A further 77% say they need a way to verify hardware integrity to mitigate the risk of device tampering. "In today's threat landscape, managing security across a distributed hybrid workplace environment must start with the assurance that devices haven't been tampered with at the lower level. This is why HP is focused on delivering PCs and printers with industry-leading hardware and firmware security foundations designed for resilience, to allow organisations to manage, monitor and remediate device hardware and firmware security throughout the lifetime of devices, across the fleet," comments Boris Balacheff, Chief Technologist for Security Research and Innovation, HP Inc. Security Lab. In recognition of these risks, HP Wolf Security is advising customers to take the following steps to help proactively manage device hardware and firmware security right from the factory: Adopt Platform Certificate technology, designed to enable verification of hardware and firmware integrity upon device delivery. Securely manage firmware configuration of your devices, using technology like HP Sure Admin (for PCs) or HP Security Manager (Support). These enable administrators to manage firmware remotely using public-key cryptography, eliminating the use of less secure password-based methods. Take advantage of vendor factory services to enable hardware and firmware security configurations right from the factory, such as HP Tamper Lock, Sure Admin, or Sure Recover technologies. Monitor o...
Use AI to Speed up Your Work Flow Ethically and Securely. There are lots of courses on AI out there, but this one is specific only to medical writing and editing. Access the AIMWE course waitlist. https://www.learnamastyle.com/waitlist/ Leqselvi for Alopecia Areata: The FDA has approved deuruxolitinib (Leqselvi) as a first-line treatment for adults with moderate to severe alopecia areata (AA). Developed by Sun Pharma, this oral selective inhibitor of Janus kinases JAK1 and JAK2 is typically dosed at 8 mg twice daily. The approval, based on the THRIVE-AA1 and THRIVE-AA2 trials, marks an important addition to limited treatment options for AA, which has significant psychological impacts. Femlyv Dissolvable Birth Control: The FDA has approved norethindrone acetate and ethinyl estradiol (Femlyv) as an oral dissolvable birth control pill, expanding access for those who have difficulty swallowing. This form of hormonal birth control, in use since 1968 as a swallowable tablet, also helps manage conditions like endometriosis and PMDD. The approval, based on a study of 743 women, offers a new option with common side effects like headache and nausea. Brineura for Batten Disease: The FDA has expanded the indication for cerliponase alfa (Brineura) to treat neuronal ceroid lipofuscinosis type 2 (CLN2 disease) in children under 3 years of age. Developed by BioMarin Pharmaceutical, this enzyme replacement therapy, initially approved in 2017, is administered by infusion into the brain. The expanded approval was based on a phase 2 trial showing reduced motor function decline and delayed disease onset. Erzofri for Schizophrenia: The FDA has approved paliperidone palmitate (Erzofri) extended-release injectable suspension for treating schizophrenia and schizoaffective disorder in adults. This long-acting injectable (LAI) antipsychotic, administered once a month, improves patient adherence by reducing dosing frequency. Developed by Luye Pharma Group, it was granted a U.S. patent in 2023 and approved under the 505(b)(2) pathway. Eque-cel for MS: The FDA has approved the IND application for equecabtagene autoleucel (Eque-cel) for treating multiple sclerosis (MS). Developed by IASO Biotechnology, this chimeric antigen receptor autologous T cell injection showed promising efficacy in six autoimmune diseases in a Chinese trial. MS, affecting 3.07 million people worldwide, is characterized by CNS demyelination and neuronal injury, with Eque-cel offering a new treatment option. Spravato for TRD: Johnson & Johnson has submitted an sNDA for esketamine (Spravato) as a monotherapy for adults with treatment-resistant depression (TRD). Already approved in combination with an oral antidepressant, esketamine is an NMDA receptor antagonist that rapidly alleviates depressive symptoms. The submission is based on Phase 4 TRD4005 study results, showing rapid improvement in depression scores with a consistent safety profile. ZW191 Anti-Tumor Agent: The FDA has cleared the IND application for ZW191, a novel antibody-drug conjugate (ADC) targeting folate receptor alpha (FR⍺) in cancers like gynecologic and NSCLC. Developed by Zymeworks, this TOPO1i ADC uses a novel payload, ZD06519, showing robust antitumor activity and a tolerable safety profile in preclinical models. Clinical development of ZW191 is planned to begin in the second half of 2024.
Thank you to Momento for supporting this episode. Momento's real-time data platform empowers developers to build innovative products faster and more reliably than ever before. Visit gomomento.co/theburningmonk for more information.David Behroozi, a 15-year Amazon veteran, tells us the inception story of Amazon Cognito and the cheat code for succeeding at AWS.He also gave us a demo of Speedrun, his latest project since leaving Amazon. It turns your GitHub markdown into executable blocks of code that remember your context (e.g. AWS account and region) so your runbook can be executed right from the markdown.I recommend watching the episode on YouTube so you can see the full demo: https://youtu.be/nhWYlzb8mSALinks from the episode:David's LinkedIn profileDavid's Twitter profileLearn more about SpeedrunDavid's blogHow to Securely let Frontend Apps to Directly Access AWS servicesOpening theme song:Cheery Monday by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3495-cheery-mondayLicense: http://creativecommons.org/licenses/by/4.0
The benefits of attachment parenting cannot be overstated. Securely attached kids are more confident, connected and more prepared to enter the world. They also tend to experience fewer health problems. But why? Here to share more about the science behind attachment parenting and how we can raise confident connected children is Eli Harwood. Eli is a licensed therapist who lives in Colorado with her husband and three children. She's an expert on attachment theory and the author of Raising Securely Attached Kids, which will be available September 2024. She also loves playing dress up with her kids, obsessing about sourdough starter. And reminiscing about that one time, she won a set of globes as a Price Is Right contestant. The good news is that even if you haven't been parenting in a way that promotes attachment up to now, this process is flexible and ever changing. The best time to start is right now. Listen in to hear all of Eli's tips and tricks no matter the age of your children. In this episode, we discuss: What securely attached parenting is. How it benefits children throughout their lives. How you can cultivate it in your own home. We touch on highly sensitive children, how you can connect with them and help them to feel more seen and secure. Resources: Raising Securely Attached Kids: Using Connection-Focused Parenting to Create Confidence, Empathy, and Resilience By Eli Harwood https://www.amazon.com/Raising-Securely-Attached-Kids-Connection-Focused/dp/B0CPDP7DT5 Connect with Eli: Attachment Nerd -https://attachmentnerd.com/about Instagram -https://www.instagram.com/attachmentnerd/ YouTube -https://www.youtube.com/channel/UCWUY-2dpPEbeetSUhT2q-7Q LinkedIn -https://www.linkedin.com/in/eli-harwood-b3b9495/ Questions: What is securely attached parenting? How is secure attachment parenting different from William Sears' attachment parenting? What are common life events that test the bond between kids and parents, and how can they be overcome? How can you restore the bond with your kid if it has been broken? Is it ever too late to switch to a secure attachment parenting style? Disclaimer: This podcast does not provide medical advice. The information on this podcast is for informational purposes only. No material on this site is intended to be a substitute for professional medical advice, diagnosis or treatment. Learn more about your ad choices. Visit megaphone.fm/adchoices
Microsoft is phasing out Android use for employees in China. Mastodon patches a security flaw exposing private posts. OpenAI kept a previous breach close to the vest. Nearly 10 billion passwords are leaked online. A Republican senator presses CISA for more information about a January hack. A breach of the Egyptian Health Department impacts 122,000 individuals. South Africa's National Health Laboratory Service (NHLS) suffers a ransomware attack. Eldorado is a new ransomware-as-a-service offering. CISA adds a Cisco command injection vulnerability to its Known Exploited Vulnerabilities catalog. N2K's CSO Rick Howard catches up with AWS' Vice President of Global Services Security Hart Rossman to discuss extending your security around genAI. Ransomware scrambles your peace of mind. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Recently N2K's CSO Rick Howard caught up with AWS' Vice President of Global Services Security Hart Rossman at the AWS re:Inforce event. They discussed extending your security around genAI. Watch Hart's presentation from AWS re:Inforce 2024 - Securely accelerating generative AI innovation. Selected Reading Microsoft Orders China Staff to Switch From Android Phones to iPhones for Work (Bloomberg) Mastodon: Security flaw allows unauthorized access to posts (Stack Diary) A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too (The New York Times) “A treasure trove for adversaries”: 10 billion stolen passwords have been shared online in the biggest data leak of all time (ITPro) Senate leader demands answers from CISA on Ivanti-enabled hack of sensitive systems (The Record) Egyptian Health Department Data Breach: 120,000 Users' Data Exposed (GB Hackers) South African pathology labs down after ransomware attack (The Cape Independent) New Eldorado ransomware targets Windows, VMware ESXi VMs (Bleeping Computer) CISA adds Cisco NX-OS Command Injection bug to its Known Exploited Vulnerabilities catalog (Security Affairs) New RUSI Report Exposes Psychological Toll of Ransomware, Urges Action (Infosecurity Magazine) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
An efficient resupply system can improve the patient experience, support outstanding relationships with patients and referral sources, and provide additional revenue for home medical equipment (HME) suppliers. But finding the optimal resupply partner — one with an efficient resupply model that's also secure — can be challenging. Mike Lorenz of Brightree discusses how a successful resupply system can elevate an HME business, and the importance of simultaneously emphasizing security.
Mandiant Consultants Trisha Alexander, Muhammed Muneer, and Pat McCoy join host Luke McNamara to discuss Mandiant's recently launched services for securing AI. They discuss how organizations can proactively approach securing the implementation of AI workloads, red-team and test these security controls protecting generative AI models in production, and then also employ AI within the security organization itself. For more, please see: https://cloud.google.com/security/solutions/mandiant-ai-consulting
In this episode with Tony Yazbeck of The Bitcoin Way, we discuss: Tony's heartbreaking origin story of financial loss and crisis in Lebanon Building The Bitcoin Way: the ultimate 1-on-1 support for getting set up on Bitcoin The importance of peer-to-peer technology Setting up nodes, cold storage/self-custody wallets, multisig and more Why the system is broken beyond repair and we all need Bitcoin Sign up at: https://www.thebitcoinway.com/partners/natalie-brunell ---- Bio: Tony Yazbeck is the co-founder of The Bitcoin Way and a seasoned cybersecurity expert deeply committed to promoting Bitcoin self-custody. Follow Tony on X at https://x.com/v4btc ---- Coin Stories is powered by Bitdeer Technologies Group (NASDAQ: BTDR), a publicly-traded leader in Bitcoin mining that stands alone as the only vertically-integrated, technology-focused Bitcoin mining company. Learn more at www.bitdeer.com. ---- Natalie's Promotional Links: Bitcoin Nashville is July 25-27th! Join me for my 3rd Annual Women of Bitcoin Brunch! Get 10% off your conference passes using the code HODL: https://b.tc/conference. Buy Bitcoin, secure it through multisig collaborative custody, start a Bitcoin IRA or take out a Bitcoin loan with UNCHAINED: https://shorturl.at/jmW29 promo code Natalie Never wait or pay high fees for making Bitcoin payments. Use Speed Lightning Wallet to instantly send and receive Bitcoin: https://speedbtcwallet.onelink.me/cGph/coinstories Safely self-custody your Bitcoin with Coinkite and the ColdCard Wallet. Get 5% off: https://shorturl.at/apsLU Master your Bitcoin self-custody with 1-on-1 help and gain peace of mind with the help of The Bitcoin Way: https://www.thebitcoinway.com/partners/natalie-brunell Protect yourself from SIM Swaps that can hack your accounts and steal your Bitcoin. Join America's most secure mobile service, trusted by CEOs, VIPs and top corporations: https://www.efani.com/natalie Don't waste hundreds of dollars per month on fiat health insurance. Join me at CrowdHealth, a large community of Bitcoiners passionate about health who crowdfund each other's care: www.crowdhealth.com/natalie Connect with Bitcoiners and Bitcoin merchants wherever you live and travel on the Orange Pill App: https://shorturl.at/gvxS3 ---- This podcast is for educational purposes and should not be construed as official investment advice. ---- VALUE FOR VALUE — SUPPORT NATALIE'S SHOWS Strike ID https://strike.me/coinstoriesnat/ Cash App $CoinStories #money #Bitcoin #investing
Today I've got something really special for you. I recently had an incredible live Instagram session with the amazing Thais Gibson, a true expert on relationships and attachment styles. I'm so excited to share this conversation with you because we dive deep into understanding these vital aspects of how we connect and communicate in our relationships. Thais breaks down the four major attachment styles—securely attached, anxious/preoccupied, dismissive/avoidant, and fearful avoidant—and how each of these shapes our subconscious beliefs about love. We chat about how our childhood experiences mold these styles and the profound impact this has on our adult relationships. I also get a bit personal in this episode, opening up about my own journey and struggles with health and hormones, as well as my path from being dismissive avoidant to becoming securely attached. Thais shares practical strategies for identifying and transforming our attachment patterns, which I found incredibly empowering. And guess what? We even touch on the exciting idea of a dating app based on attachment styles! Plus, we delve into the crucial topics of self-validation and emotional regulation. If you're looking to understand your own attachment style better or hoping to improve your relationships, this episode is jam-packed with actionable insights. SHOW NOTES: 00:00 Exciting guest, curiosity for growth, and health journey. 03:09 Attachment styles impact relationships; understanding leads growth. 09:22 Securely attached parents facilitate secure relationships. 12:46 Adults seek consistency, love due to childhood lack. 15:12 Anxious attachment style can hinder self-care. 19:51 Conscious mind reprograms subconscious for emotional growth. 21:00 Learning to rely on internal cues, distractions. 24:28 Childhood emotional neglect can lead to shame. 28:23 Greek upbringing stifled emotional expression, causing avoidance. 30:17 Childhood observation shaped emotional strength and suppression. 36:23 Trust is built on being seen, known. 37:13 Considerate communication and trust build stronger relationships. 40:56 Girl, you were fire! Keep up the work. 43:46 Prioritize what matters; podcast release soon. Learn more about your ad choices. Visit megaphone.fm/adchoices
This episode is sponsored by Better Help. Eli Harwood we can't quite quit you just yet, but we feel very secure about it. The ever-quotable and mega-helpful licensed therapist, author, and educator is back again for another episode, and breaking down what attachment patterns can mean for cult survivors and seekers, parents and children, lovers and fighters, Mars and Venus. By our calculations that means EVERYBODY should listen to this. But dear hearts, kindly back up if you haven't listened to Part 1 yet! She's the bee's knees, and part 1 dropped last week. Also two-parters work best when you listen in order, but you do you. No judgies. Show Notes: Eli Harwood is a licensed therapist and educator with more than two decades of experience helping people process relational traumas and develop secure attachment relationships in an accessible way. She wrote the guidebook Securely Attached: Transform Your Attachment Patterns Into Loving, Lasting Romantic Relationships to help folks cultivate lasting, loving relationships. Her latest title, Raising Securely Attached Kids: Using Connection-Focused Parenting To Create Confidence, Empathy, And Resilience is available for pre-order now. Eli has three children, one husband, one cat, and an extraordinary number of plants. Under the social media moniker of Attachment Nerd, and with hundreds of thousands of followers, Eli shares her light-hearted, sensible insights on the intersections of attachment style, relationship, parenting, and more. Check out @attachmentnerd on Instagram, Facebook, Tiktok, Threads, and YouTube. Become a member of the Nerd Herd Check out her online courses, upcoming books, and in person workshops at www.attachmentnerd.com Also…let it be known that: The views and opinions expressed on A Little Bit Culty do not necessarily reflect the official policy or position of the podcast. Any content provided by our guests, bloggers, sponsors or authors are of their opinion and are not intended to malign any religion, group, club, organization, business individual, anyone or anything. Nobody's mad at you, just don't be a culty fuckwad. Check out our lovely sponsors Join ‘A Little Bit Culty' on Patreon Get poppin' fresh ALBC Swag Support the pod and smash this link Cult awareness and recovery resources Watch Sarah's TEDTalk CREDITS: Executive Producers: Sarah Edmondson & Anthony Ames Production Partner: Citizens of Sound Producer: Will Retherford Writer & Co-Creator: Jess Tardy Theme Song: “Cultivated” by Jon Bryant co-written with Nygel Asselin
Hey everybody - Travis here - today I am excited to dive into a foundational concept in psychology that's pivotal for personal growth and relationships - Attachment Theory! While we don't have a guest on today's episode, I will guide you through this enriching topic.In this episode, we're going to explore some fundamental areas:1. **Origins and Founders of Attachment Theory**: We delve into the mid-20th century work of British psychologist John Bowlby, often regarded as the father of attachment theory. Bowlby focused on the bond between the child and caregiver and how these early relationships impact emotional and psychological development throughout one's life. Plus, we'll discuss how Mary Ainsworth expanded on Bowlby's work with her famous Strange Situation experiment, which classified different attachment styles.2. **Types of Attachment Styles**: Understanding the four primary attachment styles - Secure, Anxious-Preoccupied, Dismissive-Avoidant, and Fearful-Avoidant (Disorganized) - and how each style manifests in relationships and personal behavior. We'll also touch on how these styles influence conflict resolution and mental well-being.3. **Impact on Relationships and Mental Health**: How your attachment style affects your interactions, conflict management, and overall mental health. Securely attached individuals tend to have better stress management and healthier conflict resolution, while those with insecure attachment styles may struggle more in relationships and mental health scenarios.Challenge Question: Reflecting on your personal relationships, can you identify any patterns that point to a specific attachment style you may have? How do these patterns influence your interactions and conflict resolutions with loved ones?So grab a notebook, because you're going to want to take notes as we navigate this complex yet crucial aspect of personal development. And remember, understanding your attachment style can be the first step towards healing, growth, and more fulfilling relationships.SUPPORT THE SHOW:CLICK HERE!JOIN THE MAILING LIST & GET INVOLVED!CLICK HERE: MAILING LISTWATCH ON YOUTUBE:WATCH HEREConnect and Support Travis:YouTube: Travis GoodmanInstagram: @integratedmanprojectCheck out the Website: TBD
This episode is sponsored by BetterHelp. Are cult leaders born or made? Did we get sucked into NXIVM because of our attachment styles? Was Vanguard always just wookin' pa nub in all the wrong places? In this episode of A Little Bit Culty, licensed therapist and social media sweetheart Eli Harwood joins us for a chat about the way that attachment patterns impact our vulnerability to culty situations and vice-versa. It can be a real intricate venn diagram, ya know? (Or maybe it's a line graph, or a Gantt chart. We don't know. We're not chart people.) But however you map it, this stuff is always way better when you navigate it with a pro. The brilliant Ms. Harwood explains the brainy stuff of attachment theory along with D-I-Y tricks for better relationships, and helps us process our stuff in a way that made us laugh, cry, and also cry-laugh. We loved it so much, we rolled it right into a two-part episode. Here's part one, ALBC listeners! Show Notes: Eli Harwood is a licensed therapist and educator with more than two decades of experience helping people process relational traumas and develop secure attachment relationships in an accessible way. She wrote the guidebook Securely Attached: Transform Your Attachment Patterns Into Loving, Lasting Romantic Relationships to help folks cultivate lasting, loving relationships. Her latest title, Raising Securely Attached Kids: Using Connection-Focused Parenting To Create Confidence, Empathy, And Resilience is available for pre-order now. Eli has three children, one husband, one cat, and an extraordinary number of plants. Under the social media moniker of Attachment Nerd, and with hundreds of thousands of followers, Eli shares her light-hearted, sensible insights on the intersections of attachment style, relationship, parenting, and more. Check out @attachmentnerd on Instagram, Facebook, Tiktok, Threads, and YouTube. Become a member of the Nerd Herd Check out her online courses, upcoming books, and in person workshops at www.attachmentnerd.com Also…let it be known that: The views and opinions expressed on A Little Bit Culty do not necessarily reflect the official policy or position of the podcast. Any content provided by our guests, bloggers, sponsors or authors are of their opinion and are not intended to malign any religion, group, club, organization, business individual, anyone or anything. Nobody's mad at you, just don't be a culty fuckwad. Check out our lovely sponsors Join ‘A Little Bit Culty' on Patreon Get poppin' fresh ALBC Swag Support the pod and smash this link Cult awareness and recovery resources Watch Sarah's TEDTalk CREDITS: Executive Producers: Sarah Edmondson & Anthony Ames Production Partner: Citizens of Sound Producer: Will Retherford Writer & Co-Creator: Jess Tardy Theme Song: “Cultivated” by Jon Bryant co-written with Nygel Asselin
By now, we have seen demonstrations of Artificial Intelligence summarizing content and even producing images. These are all great YouTube videos for a rainy Saturday afternoon, but what about the work of the government? With AI, one must begin with the data. When it comes to explaining how to leverage the petabytes of information, Karen Hall has a memorable quote. “Generative AI can unlock the knowledge trapped in data.” Her four guidelines for releasing this information are · Make sure the data is authoritative · Enable connectivity to other systems · Be aware of data standards · Use AI in a responsible manner. AI requires mountains of data to see patterns and help humans make conclusions. Government agencies may have sensitive information in their data stores, making it difficult to assemble meaningful data stores. Dr. Travis Hall from NTIA suggests that you can use AI to protect personal information. AI can be used as a privacy enhancing technology by being able to obfuscate data so trends can be seen to save money and speed up operations. Our expert from California, Hong Sae, provides many ways AI can assist government functions. He lists predicting traffic patterns, locating potholes, voice analytics customer service, gunshot detection, and predicting crime patterns. It is the early days of applying AI in a fast and secure manner. This discussion gives listeners the basic building blocks for success,
Securely attached people have 10 universal habits. Once I figured this out, I wrote them down to carry with me at all times. Because it helps me figure out exactly what to do when I feel hurt, annoyed, or at odds with someone I care about.It took me 15 years of trial and error to compile this list. I hope to save you that time. Don't forget to subscribe!-----------------------------------------------------------------------------------------------------------P.S: If you are are struggling with repetitive arguments, disconnection and/or resentments in your relationships,And all the information out there - the Gottman books, I-statements etc.- feel like band-aids at best until the next argument happens,
You may not see through the fog of feelings but remember – God is always there. -------- Thank you for listening! Your support of Joni and Friends helps make this show possible. Joni and Friends envisions a world where every person with a disability finds hope, dignity, and their place in the body of Christ. Become part of the global movement today at www.joniandfriends.org Find more encouragement on Instagram, TikTok, Facebook, and YouTube.
Ken Williams, National Senior Manager of Partner Solutions at T-Mobile for Business, joins Ron Westfall and Krista Macomber to discuss the rapidly evolving threat landscape and steps decision makers can take to protect their organizations. They delve into why 5G connected laptops are integral to meeting mounting cybersecurity threats, particularly as remote work is increasing, and how they can empower organization to connect securely from anywhere, especially through the backing of a nationwide 5G standalone network. Their discussion covers: The increase in cybersecurity threats and the potential risks, impacts, and costs they can incur for businesses. How the increase in remote work is expanding the traditional attack surface including more risks posed by public Wi-Fi An explanation of what connected laptops are and the opportunity they represent in the market. How connected laptops empower organizations to connect securely from anywhere, limiting their reliance on risky unknown Wi-Fi networks and eliminating the risks they pose. The strategic value of a nationwide 5G standalone network in attaining optimized 5G connected laptop outcomes. For more information, download our report, 5G Connected Devices: The Enduring Advantages of Superior Security, and the infographic on our website.
With retirement in the near future, have I accumulated enough to call it quits in a secure fashion? Have a money question? Email us here Subscribe to Jill on Money LIVE YouTube: @jillonmoney Instagram: @jillonmoney Twitter: @jillonmoney "Jill on Money" theme music is by Joel Goodman, www.joelgoodman.com. To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
Welcome to the captivating narrative of Jorge Myszne, an entrepreneur whose journey traverses continents, technological frontiers, and entrepreneurial landscapes. Buckle up as we embark on an exhilarating ride through the highs, lows, and pivotal moments that shaped his entrepreneurial voyage. Jorge's latest venture, Kameleon, attracted funding from top-tier investor, Xilinx.
In the realm of startups, few narratives are as compelling and instructive as Kris Bliesner's journey. With a career from early-stage ventures to navigating hypergrowth and transition periods, Kris offers a wealth of insights into the dynamics of building and scaling businesses.
G examines the Philadelphia Flyers as they approach Friday's NHL Trade Deadline and a push for the playoffs (2:13). Phillies Spring Training outlook and the new hot dog promotion (17:42). Why AJ Brown really called into WIP (23:36). The PGA Tour and professional golf is down bad (30:51). Be heard on the next episode of TFTS - leave a voicemail: 215-385-5164 FOLLOW TFTS @TFTSpod: https://instagram.com/tftspod https://twitter.com/tftspod https://linktr.ee/thoughtsfromtheshade Sponsored by Menard Premium Detailing: The #1 auto detail service in Bucks County, PA. www.menardpremiumdetailing.com && Sharpz App: A free and transparent sports betting community - Securely link your sportsbooks & share your verified bets and stats with the world. Download the app and sign up using referral code TFTS977 https://sharpz.app.link/NF53UtLueGb
Bryce Ferguson & Jack Kearney are the Co-Founders of Turnkey (https://www.turnkey.com). Backed by Sequoia, Variant, Coinbase, & Exponent, Turnkey enables developers to spin-up thousands of wallets and sign millions of transactions, all without compromising on security. In this episode we discuss the preceding steps to launching Turnkey (and how they reached conviction on the opportunity), earliest challenges and surprises (and how their team navigated both), how crypto's changed in the intervening years since their entrance to the space, & much more.Recorded Friday February 16, 2024.
The guys respond to your calls on the Super Bowl, Tony Romo, and react to the Chiefs victory over the 49ers (1:39). Chip Kelly takes a step down the coaching ladder to become Ohio State's offensive coordinator (31:05). The debauchery of the Waste Management Phoenix Open might be a microcosm of the PGA Tour (34:52). Haason Reddick's future with the Philadelphia Eagles has come into question (42:49). The show closes with a bone to pick with humanity and reacting to constructive criticism (52:13). Be heard on the next episode of TFTS - leave a voicemail: 215-385-5164 FOLLOW TFTS @TFTSpod: https://instagram.com/tftspod https://twitter.com/tftspod https://linktr.ee/thoughtsfromtheshade Sponsored by Menard Premium Detailing: The #1 auto detail service in Bucks County, PA. www.menardpremiumdetailing.com && Sharpz App: A free and transparent sports betting community - Securely link your sportsbooks & share your verified bets and stats with the world. Download the app and sign up using referral code TFTS977 https://sharpz.app.link/NF53UtLueGb
This week, Erin and Sara sit down with psychotherapist Jessica Baum, the founder of Be Self-full, and the author of "Anxiously Attached: Becoming More Secure in Life and Love." They discuss the different insecure attachment styles and how we develop them, why it's important to have compassion for yourself, how to begin to heal, and more.Executive Producers: Erin Foster, Sara Foster, and Allison BresnickAssociate Producer: Montana McBirneyAudio Engineer: Josh WindischThis episode is sponsored by: Open (withopen.com/FOSTER)Jenni Kayne (Jennikayne.com PROMO CODE: FOSTER15)Exponent Beauty (exponentbeauty.com PROMO CODE: FOSTERS20)Vegamour (vegamour.com/foster PROMO CODE: foster)Boll & Branch (bollandbranch.com PROMO CODE: FOSTER15)BetterHelp (betterhelp.com/foster)
MERRY CHRISTMAS!!! My gift to you is everything you need to know so that you can have healthy relationships. Get ready for…Understand & Apply Attachment Theory for Healthy Love: Part Two Inside this episode: My rant about what I hate seeing on social media The exact blueprint of what needs to change in order to welcome in secure attachment Emotional regulation and why it matters for healthy relationshipsAaaaand so much more! If you know you need to become securely attached in 2024, now is the time. Give yourself the only gift that truly matters: HEALING Apply to the E.S.L. Relationship Program today to start your journey to Secure Attachment & Healthy Relationships. The time is now, beautiful. Don't wait. Click Here to Apply to the E.S.L. Program
On this weeks episode of Do the Work podcast, Sabrina is joined by Eli Vazquez to chat about how Eli went from a F-boy to securely attached, debunking myths like 'if he wanted to he would', when to sleep together with someone, fear of commitment, breakups not being personal and SO much more!! Follow Eli on TIK TOK or work with him HERE! Want to work with Sabrina? HERE! Dont forget to follow Sabrina and Do the Work on instagram and Sabrina on Tik tok! Please support our sponsors! Want to shop Softwear? Get 20% off your first order with code- DOTHEWORK Get Up to 50% OFF @honeylove HERE! Get your first Apostrophe visit for $5 HERE! CODE- DOTHEWORK Receive your first month of Henry Meds for $50 HERE! CODE- DOTHEWORK
On this weeks episode of Do the Work, Sabrina is joined by Dr Stan Tatkin of the Pact Institute to go over how each attachment style shows up in dating and how to navigate early dating securely! Get Dr Stans book HERE! La Event 11/9 tickets HERE! Want to work with Sabrina? Click HERE Dont forget to follow Sabrina and Do the Work on instagram and Sabrina on Tik tok! Please support our sponsors! Want to shop Softwear? Get 20% off your first order with code- DOTHEWORK Join me on Open for 30 days free, head to withopen.com/DOTHEWORK