POPULARITY
Categories
CONSIGUE AQUÍ TU GUÍA "EMPIEZA AQUÍ" PARA APRENDER CÓMO CONVERTIRTE EN ILUSTRAPRO ➡️ https://ilustrandodudas.activehosted.com/f/36 Drawfolio, nuestro sponsor, la mejor plataforma para crear tu primer portfolio web de ilustración sin dolores de cabeza, esponsoriza este programa. Entra en www.drawfolio.com y usa este código de 20% de descuento SSLDUDAS para el primer año de tu suscripción anual, incluido el extra de seguridad SSL. TODOS NUESTROS RECURSOS Y NOVEDADES en www.linktr.ee/iobru Apúntate a nuestra newsletter para estar al tanto de todo en https://bit.ly/3a8SSKu Y a nuestro canal de Telegram en https://t.me/ilustrandodudasnews Más información sobre la profesión de la ilustración y sobre el podcast, aliados, colaboradores, recursos y herramientas en www.ilustrandodudas.com/ En el programa de hoy nos planteamos lo siguiente:¿Sientes que trabajas sin parar pero no avanzas en tu carrera de ilustración?Muy probablemente no estás bloqueado, sino atrapado en un ciclo de clientes mediocres que frenan tu crecimiento. En este episodio hablamos del estancamiento silencioso que muchos ilustradores viven cuando empiezan a tener encargos… a costa de su salud, su voz artística y su autoestima. Te cuento el caso real de un alumno, analizamos los miedos y creencias que te impiden soltar lo que ya no te sirve, y comparto las claves para tomar decisiones difíciles con estrategia y conciencia. Porque llega un punto en el que para subir de nivel, hay que atreverse a decir que no.¡Espero que disfrutes mucho del programa!Y recuerda, si te ha servido, has aprendido y te has reído, danos amorcico escribiéndonos en los comentarios, compartiendo tus reflexiones y siguiéndonos en todas las redes y plataformas del mundo mundial.CRÉDITOSEntradilla: Joan Llorcawww.instagram.com/artnegreCanciones de fondo: BendsoundCanción final: Paz Salem - Assirbey
CONSIGUE AQUÍ TU GUÍA "EMPIEZA AQUÍ" PARA APRENDER CÓMO CONVERTIRTE EN ILUSTRAPRO ➡️ https://ilustrandodudas.activehosted.com/f/36 Drawfolio, nuestro sponsor, la mejor plataforma para crear tu primer portfolio web de ilustración sin dolores de cabeza, esponsoriza este programa. Entra en www.drawfolio.com y usa este código de 20% de descuento SSLDUDAS para el primer año de tu suscripción anual, incluido el extra de seguridad SSL. TODOS NUESTROS RECURSOS Y NOVEDADES en www.linktr.ee/iobru Apúntate a nuestra newsletter para estar al tanto de todo en https://bit.ly/3a8SSKu Y a nuestro canal de Telegram en https://t.me/ilustrandodudasnews Más información sobre la profesión de la ilustración y sobre el podcast, aliados, colaboradores, recursos y herramientas en www.ilustrandodudas.com/ Hoy en el programa, nos planteamos lo siguiente:¿Tiene sentido seguir creando cuando el mundo se tambalea? ¿Cuando hay apagones, guerras, crisis financieras, incertidumbre, miedo…?Hablamos de algo que muchos ilustraPros estáis sintiendo últimamente: El miedo a que tu trabajo no tenga sentido en un mundo lleno de crisis.¿Cómo cuidar de ti y de tu vocación sin sentirte culpable por dedicarte a algo que no “salva vidas”?Te comparto una reflexión profunda y tranquilizadora sobre el rol del arte en tiempos difíciles, para que reconectes con tu propósito, entiendas tus dudas y sepas en qué enfocarte para seguir adelante, incluso cuando todo tiembla.¡Espero que disfrutes mucho del programa!Y recuerda, si te ha servido, has aprendido y te has reído, danos amorcico escribiéndonos en los comentarios, compartiendo tus reflexiones y siguiéndonos en todas las redes y plataformas del mundo mundial.CRÉDITOSEntradilla: Joan Llorcawww.instagram.com/artnegreCanciones de fondo: BendsoundCanción final: Paz Salem - Assirbey
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known issue where the attacker re-uses a prior DKIM signature. This will work as long as the headers signed by the signature are unchanged. Recently, this attack has been successful against Google. https://easydmarc.com/blog/google-spoofed-via-dkim-replay-attack-a-technical-breakdown/ SSL.com E-Mail Validation Bug SSL.com did not properly verify which domain a particular email address is authorized to receive certificates for. This could have been exploited against webmail providers. https://bugzilla.mozilla.org/show_bug.cgi?id=1961406
Microsoft Recall on Copilot+ PC: testing the security and privacy implications Russian organizations targeted by backdoor masquerading as secure networking software updates SSL.com Scrambles to Patch Certificate Issuance Vulnerability Huge thanks to our sponsor, Dropzone AI Is your security team spending too much time chasing alerts instead of stopping threats? Dropzone AI modernizes your security operations by handling the routine investigations that consume your team's day. Our AI SOC Analyst works with your existing security tools, learns your environment, and delivers clear, actionable reports within minutes. Your human analysts can finally focus on the most critical threats. Organizations using our AI SOC Analyst handle significantly more alerts without growing their team. See how at RSA at booth ESE-60.
SOUNDBROKER PRESENTS: Thinking Out Loud w/Friends ZoomCast # 255 AN OPEN CONVERSATION WITH FRIENDS THAT LOVE THE WORLD OF CONCERT AND SPECIAL EVENT PRODUCTIONSJoin our current events support zoomcast show hosted by Jan Landy and his knowledgeable affable panel of friends and colleagues for an entertaining robust discussion offering opinions on anything related to a working professional life in general.Our ZoomCast isn't just a fountain of knowledge; it's also a opportunity to laugh. Think of it as therapy, but with more jokes and fewer couches. Join us and share your thoughts. Stay updated on life and world events, and enjoy multiple good chuckles along the way.
CONSIGUE AQUÍ TU GUÍA "EMPIEZA AQUÍ" PARA APRENDER CÓMO CONVERTIRTE EN ILUSTRAPRO ➡️ https://ilustrandodudas.activehosted.com/f/36 Vente al Taller Online OTRA VUELTA DE TUERCA de Noemí Villamuza los días 24, 25 y 26 de Abril y 29, 30 y 31 de Mayo >>> https://drive.google.com/file/d/1RBKzir7QWagAWTHTp8uOzRirPnRV45uy/view?usp=sharingDrawfolio, nuestro sponsor, la mejor plataforma para crear tu primer portfolio web de ilustración sin dolores de cabeza, esponsoriza este programa. Entra en www.drawfolio.com y usa este código de 20% de descuento SSLDUDAS para el primer año de tu suscripción anual, incluido el extra de seguridad SSL. TODOS NUESTROS RECURSOS Y NOVEDADES en www.linktr.ee/iobru Apúntate a nuestra newsletter para estar al tanto de todo en https://bit.ly/3a8SSKu Y a nuestro canal de Telegram en https://t.me/ilustrandodudasnews Más información sobre la profesión de la ilustración y sobre el podcast, aliados, colaboradores, recursos y herramientas en www.ilustrandodudas.com/ En el programa de hoy te explico las tres grandes cosas que puedes hacer para que tu trabajo emocione y enamore. Porque ese es el lugar al que todos queremos llegar con lo que hacemos. Todos deseamos conectar y remover a la persona que consume nuestro trabajo. Queremos impactar y llegarles de una forma única, porque sabemos también que eso es lo que quiere quien nos va a contratar, y por tanto lo que nos permitirá vivir de la ilustración.Así que te explico qué significa realmente que tu trabajo de ilustración enamore, qué sientes cuando aún no estás en ese punto y qué puedes hacer para dar ese salto cuántico. ¡Espero que disfrutes mucho del programa!Y recuerda, si te ha servido, has aprendido y te has reído, danos amorcico escribiéndonos en los comentarios, compartiendo tus reflexiones y siguiéndonos en todas las redes y plataformas del mundo mundial.CRÉDITOSEntradilla: Joan Llorcawww.instagram.com/artnegreCanciones de fondo: BendsoundCanción final: Paz Salem - Assirbey
CONSIGUE AQUÍ TU GUÍA "EMPIEZA AQUÍ" PARA APRENDER CÓMO CONVERTIRTE EN ILUSTRAPRO ➡️ https://ilustrandodudas.activehosted.com/f/36 Vente al Taller Online OTRA VUELTA DE TUERCA de Noemí Villamuza los días 24, 25 y 26 de Abril y 29, 30 y 31 de Mayo (12 horas de taller online) >>> https://sowl.co/p/bbhgGGDrawfolio, nuestro sponsor, la mejor plataforma para crear tu primer portfolio web de ilustración sin dolores de cabeza, esponsoriza este programa. Entra en www.drawfolio.com y usa este código de 20% de descuento SSLDUDAS para el primer año de tu suscripción anual, incluido el extra de seguridad SSL. TODOS NUESTROS RECURSOS Y NOVEDADES en www.linktr.ee/iobru Apúntate a nuestra newsletter para estar al tanto de todo en https://bit.ly/3a8SSKu Y a nuestro canal de Telegram en https://t.me/ilustrandodudasnews Más información sobre la profesión de la ilustración y sobre el podcast, aliados, colaboradores, recursos y herramientas en www.ilustrandodudas.com/ En este episodio exprés te cuento la historia de cómo conseguí firmar un contrato con mi editorial favorita, Gustavo Gili, para publicar un libro guía que te lleva paso a paso por todo el proceso de transformación creativa y profesional necesario para poder convertir tu pasión creartística en tu profesión. ¡Espero que disfrutes mucho del programa! Y recuerda, si te ha servido, has aprendido y te has reído, danos amorcico escribiéndonos en los comentarios, compartiendo tus reflexiones y siguiéndonos en todas las redes y plataformas del mundo mundial.CRÉDITOSEntradilla: Joan Llorcawww.instagram.com/artnegreCanciones de fondo: BendsoundCanción final: Paz Salem - Assirbey
This week, Hertz lost your driver's license, birthday, and maybe your Social Security number—but don't worry, it was their vendor's fault.Boarding passes and check-ins are going extinct, and your face is the new passport—because what could possibly go wrong with global biometric surveillance?The EU is now handing out burner phones for U.S. trips, because apparently D.C. is the new Beijing when it comes to digital paranoia.North Korea's job recruiters are on LinkedIn now—offering dream gigs and delivering malware instead of paychecks.Certbot now supports six-day certs because nothing says ‘secure' like constantly renewing your identity before your SSL gets a chance to age.The China-Based Smishing Triad has moved from fake shipping notices to bank fraud—because stealing your toll bill just wasn't profitable enough.China basically winked at the U.S. and said “yeah, that was us” after hacking critical infrastructure.Google wants your Android to restart itself after three days of neglect—finally, a reward for ignoring your phone.Come on! Let's go get changed!Find the full transcript to this podcast here.
AI-powered code generation tools are raising significant security concerns within the software supply chain. Recent research indicates that a notable percentage of package suggestions from both commercial and open-source models are non-existent, a phenomenon referred to as "hallucination." This issue allows malicious actors to exploit these fictitious package names by uploading harmful software to package registries, a tactic known as slop-squatting. Experts emphasize the importance of manual verification and the use of dependency scanners to mitigate these risks, highlighting that developers must rigorously test AI-generated code in isolated environments before deployment.In the tech industry, Intel has made headlines by selling a 51% stake in its programmable chip business, Altera, to private equity firm Silverlake for $4.46 billion. This decision comes after Intel's acquisition of Altera for $16.7 billion in 2015, reflecting a significant drop in valuation. The move is part of a broader strategy to sharpen focus and strengthen the company's balance sheet amid ongoing challenges in the semiconductor market. Despite retaining a minority stake in Altera, Intel's actions raise questions about its ability to compete effectively in critical areas like AI-optimized silicon.Another pressing issue is the impending reduction of the maximum lifespan for SSL and TLS certificates, which will be cut to just 47 days by 2029. This change, supported by major tech companies, aims to enhance digital security by minimizing risks associated with compromised certificates. The transition will require automated and integrated certificate management solutions to keep pace with the new renewal cycles, emphasizing the need for proactive risk management in the evolving threat landscape.Lastly, the reinstatement of tariffs on electronics, including smartphones and laptops, is set to impact the tech industry significantly. The U.S. government aims to encourage domestic manufacturing, but the unpredictability of trade policies complicates planning for businesses. As companies navigate these challenges, they must adopt flexible strategies that account for ongoing volatility in the supply chain and procurement processes, ensuring they remain responsive to changing market conditions. Four things to know today 00:00 Copy, Paste, Compromise? Why AI Code Suggestions Could Lead to Big Security Problems04:45 Altera Is Out, $8.75B Is In—But Intel's Chip Future Is Still in Question06:46 Got 47 Days? Why Your SSL Certificates Just Got a Whole Lot Needier08:14 One More Time with Feeling: Tech Tariffs Are Back, and the Forecast Is Still Chaos Supported by: https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship https://getflexpoint.com/msp-radio/ Join Dave April 22nd to learn about Marketing in the AI Era. Signup here: https://hubs.la/Q03dwWqg0 All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Join hosts Daniel Garcia and Eric Peterson as they dive into the latest news and updates in the BoxLang and CFML world. Don't miss out on insights, discussions, and what's coming next for modern software development!
Apple's ballot to step the maximum term for public SSL certificates down to 47 days has passed in the CA/Browser Forum. We explain.
This week the crew talks Squash, Fenty Beauty's launch in Ja, Masicka mixing and mingling, Spice rap diss song, and the announcement of a SSL compensation fund.
För de flesta slutar det bara vid en dröm, men 29-årige Omar Aldeeb har upplevt mycket av det bästa som man kan göra som innebandyspelare på elitnivå. Fyra SM-guld med IBF Falun och ett VM-guld med svenska landslaget. Nu är forwarden aktuell med att precis ha spelat upp hemmaklubben Strängnäs IBK i SSL, efter att bland annat ha vunnit poängligan i allsvenskan med 54 poäng (30+24). I poddavsnittet berättar han om hur karriären startade, om saknaden av sin pappa som gick bort för några år sedan kort efter att säsongen hade avbrutits på grund av pandemin, tiden i Falun och förstås den magiska resan med Strängnäs den här säsongen. Hosted on Acast. See acast.com/privacy for more information.
CONSIGUE AQUÍ TU GUÍA "EMPIEZA AQUÍ" PARA APRENDER CÓMO CONVERTIRTE EN ILUSTRAPRO ➡️ https://ilustrandodudas.activehosted.com/f/36 Vente al Taller Presencial OTRA VUELTA DE TUERCA de Noemí Villamuza en Barcelona, los días 25 y 26 de Abril >>> https://docs.google.com/forms/d/e/1FAIpQLScgYNMh3h_173d_mTaJrvhUtJPbzA3ne556sSb_NVdnetqLuw/viewform Drawfolio, nuestro sponsor, la mejor plataforma para crear tu primer portfolio web de ilustración sin dolores de cabeza, esponsoriza este programa. Entra en www.drawfolio.com y usa este código de 20% de descuento SSLDUDAS para el primer año de tu suscripción anual, incluido el extra de seguridad SSL. TODOS NUESTROS RECURSOS Y NOVEDADES en www.linktr.ee/iobru Apúntate a nuestra newsletter para estar al tanto de todo en https://bit.ly/3a8SSKu Y a nuestro canal de Telegram en https://t.me/ilustrandodudasnews Más información sobre la profesión de la ilustración y sobre el podcast, aliados, colaboradores, recursos y herramientas en www.ilustrandodudas.com/ En este episodio entrevisto a la maravillosa ilustradora Noemí Villamuza, Premio Nacional de Ilustración, y responsable de haber publicado más de 50 libros ilustrados. Con ella hablamos de la importancia de conectarte con la poesía visual y la ilustración conceptual, que es magia pura. Porque este tipo de ilustración es capaz de representar gráficamente cosas que son importantes y abstractas, que no existen en nuestro mundo físico, pero que son extremadamente poderosas. Esa es la fuerza de la ilustración simbólica y conceptual, de la poesía visual: Traducir lo intangible en imágenes que nos impactan, nos hacen reflexionar y nos conectan con ideas que, de otro modo, serían difíciles de visualizar. Y este súper poder, esta potencia que nos da la ilustración conceptual, es la que queremos que incluyas en tu trabajo para poder llevarlo a otro nivel y que se vuelva súper especial. Porque da igual que hagas ilustración infantil, adulta, de prensa, narrativa, publicitaria o comercial, si insuflas de poesía tu ilustración, le estarás dando alma. Así que si quieres aprender a llenar de magia a tu trabajo para que conecte y comunique a un nuevo nivel, esta es tu oportunidad. ¡Espero que disfrutes mucho del programa! Y recuerda, si te ha servido, has aprendido y te has reído, danos amorcico escribiéndonos en los comentarios, compartiendo tus reflexiones y siguiéndonos en todas las redes y plataformas del mundo mundial.CRÉDITOSEntradilla: Joan Llorcawww.instagram.com/artnegreColaboradores: Noemí Villamuza https://artnoemivillamuza.com/ https://www.instagram.com/noemi_villamuza/Manuel Molvar - Turras Ilustradashttps://manuelmolvar.myportfolio.com/https://www.instagram.com/manuelmolvar/?hl=es Canciones de fondo: BendsoundCanción final: Paz Salem - Assirbey
WWW Wundersame Website Welt. Entspannt durch's World Wide Web.
Du hast eine Website – aber sie performt nicht so, wie du willst? Dann könnte einer dieser 10 häufigen Fehler schuld sein! In dieser Episode spreche ich Klartext: verständlich, praxisnah und mit vielen Tipps, die du sofort umsetzen kannst. Darüber sprechen wir in dieser Folge: • Warum langsame Ladezeiten echte Besucher*innen-Killer sind • Wieso mobile Optimierung kein „Nice-to-have“ mehr ist • Wie du mit einer aufgeräumten Startseite Vertrauen aufbaust • Was eine gute Navigation mit Kundenführung zu tun hat • Warum Call-to-Actions keine nervige Werbung, sondern echte Wegweiser sind • Welche Designfehler deine Texte unlesbar machen • Wieso Pop-ups oft mehr schaden als nützen • Wie du SEO wirklich clever und einfach umsetzt • Was es mit SSL, Datenschutz & Co. wirklich auf sich hat • Und: Warum deine Website regelmäßige Pflege verdient Plus: Konkrete Tools, Tipps und Vergleiche – alles direkt aus der Praxis!
Drawfolio, la mejor plataforma para crear tu primer portfolio web de ilustración sin dolores de cabeza, esponsoriza este programa. Entra en www.drawfolio.com y usa este código de 20% de descuento SSLDUDAS para el primer año de tu suscripción anual, incluido el extra de seguridad SSL.Nuestra guía EMPIEZA AQUÍ PARA CONVERTIRTE EN ILUSTRAPRO en www.linktr.ee/iobruApúntate a nuestra newsletter para estar al tanto de todo en https://bit.ly/3a8SSKuY a nuestro canal de Telegram en https://t.me/ilustrandodudasnewsMás información sobre la profesión de la ilustración y sobre el podcast, aliados, colaboradores, recursos y herramientas en www.ilustrandodudas.com/¡Estamos de vuelta! Y con un temón que nos afecta a todos. Porque tú sabes perfectamente cuál es esa tarea u objetivo que estás evitando hacer a toda costa, y también sabes que eso es lo que más te va a hacer avanzar en tu proceso de profesionalización en la ilustración. Así que si quieres vivir de la ilustración cuanto antes, solo te puedo decir esto: Conviértete en un máster de afrontar eso que tiendes a evitar, y ya verás cómo te vas pasando las pantallas de este proceso para convertirte en ilustraPro, a toda velocidad. ¿A qué esperas? Ya no hay excusa ;)¡Espero que disfrutes mucho del programa!Y recuerda, si te ha servido, has aprendido y te has reído, danos amorcico escribiéndonos en los comentarios, compartiendo tus reflexiones y siguiéndonos en todas las redes y plataformas del mundo mundial.CRÉDITOSEntradilla: Joan Llorcawww.instagram.com/artnegreColaboradores: Manuel Molvar - Turras Ilustradashttps://manuelmolvar.myportfolio.com/https://www.instagram.com/manuelmolvar/?hl=es Canciones de fondo: BendsoundCanción final: Paz Salem - Assirbey
Äntligen måndag igen, veckans bästa dag! Nytt avsnitt och ny gäst i studion, vi har med oss den oerhört karismatiskt reslige,med ett fast handslag, innebandymålvakten Oskar-Viking Tjärnlund. Herr Tjärnlund som just nu är högaktuell då hans Strängnäs IBK är mitt uppe i kvalet till SSL. Det blir 70 minuter kalaspodd utlovas. I studion: J Kindmark Johan Englund Oskar-Viking Tjärnlund Tack för att ni lyssnar på oss.
Vi pratar om vikten av att sortera målvaktsaktioner i kategorier, kollisioner med målvakter, och Isas utmattningstårar efter IBK Dalens säkrade SSL-kontrakt.Hoppas ni gillar avsnittet! Tack för allt stöd!Support the show
Web and Mobile App Development (Language Agnostic, and Based on Real-life experience!)
In this conversation, Krish Palaniappan discusses a critical issue encountered with an API on AWS Marketplace, where they were notified of a lack of usage requests due to an expired SSL certificate. He walks through the steps taken to identify the problem, including checking logs and understanding SSL certificate management. The conversation highlights the importance of proper certificate handling, the challenges faced during the resolution process, and the lessons learned from the experience. Snowpal Products Backends as Services on AWS Marketplace Mobile Apps on App Store and Play Store Web App Education Platform for Learners and Course Creators
Web and Mobile App Development (Language Agnostic, and Based on Real-life experience!)
In this conversation, Krish Palaniappan discusses the intricacies of deploying an API gateway on AWS, focusing on the management of API usage, reporting, and the challenges faced with certificate management. He elaborates on the deployment strategies across different environments, the debugging process for certificate issues, and the importance of understanding endpoint types and SSL certificates. The conversation also highlights the resolution of certificate chain issues and the necessary code adjustments to ensure smooth operation. In this conversation, Krish Palaniappan discusses the intricacies of optimizing AWS Lambda layers, the transition from AWS SDK version 2 to version 3, and the importance of efficient deployment strategies. He emphasizes the need for local development and testing using Express to enhance productivity and streamline the onboarding process for customers, including API key management and usage plans. Snowpal Products Backends as Services on AWS Marketplace Mobile Apps on App Store and Play Store Web App Education Platform for Learners and Course Creators
Many organizations hesitate to implement SSL decryption due to concerns over complexity, privacy, and performance. However, the reality is that failing to decrypt means failing to see threats.In this Deep Dive, host Lieuwe Jan Koning and Rob Maas (Field CTO at ON2IT) explore why decrypting SSL traffic is critical for cybersecurity. Why is SSL decryption necessary, and what are the risks of ignoring encrypted traffic?How do modern malware and attacks leverage encryption to bypass traditional security measures?What are the top three things organizations must do to implement SSL decryption effectively?Why do only 3.5% of organizations have an active SSL decryption policy, and how can this change?Rob Maas explains how decrypting SSL traffic allows security teams to detect and stop threats at an early stage, preventing malware downloads, phishing attempts, and web-based attacks before they reach endpoints.
In this episode, host Alex Quin is joined by Kevin Pimentel and Michelle Chia, both experienced digital marketers, to break down the importance of local SEO and business listings. They discuss the differences between website SEO and local listing SEO, the key factors that influence Google Business and Apple Maps rankings, and how businesses can optimize their listings to attract more customers. The trio also covers strategies for getting more customer reviews, leveraging Google's Q&A feature, and why Apple Maps is often overlooked but still crucial for visibility. Whether you're running a restaurant, gym, bar, club, or any local business, this episode provides practical insights to help you rank higher and drive more foot traffic.Episode Outline[00:00] Introduction: Understanding Local SEO vs. Website SEO[03:45] The Role of Google Business & Apple Maps in Local Listings[07:20] Key Factors That Affect Local SEO Rankings[12:10] Treating Your Business Listings Like Social Media[18:30] How Reviews Impact Rankings & Business Credibility[23:15] Optimizing Listings: What Businesses Need to Know[30:40] The Role of Domain Authority & Backlinks in SEO[35:55] How Physical Location Impacts Rankings & Workarounds[42:00] Google My Business Optimization Best Practices[48:25] Apple Maps: Why It Matters & How to Optimize[54:10] Automating Listings with Tools Like Yext[58:30] Strategies for Getting More Positive Reviews[01:05:20] The Impact of Website Speed & Structure on SEO[01:12:40] The Importance of Answering Q&A on Google Business[01:18:00] Final Thoughts & How to Connect with the GuestsWisdom NuggetsLocal SEO vs. Website SEO: Traditional SEO helps websites rank, while local SEO focuses on getting businesses listed in map packs like Google & Apple Maps.Consistency is Key: Keeping business information updated across multiple platforms like Google Business, Yelp, TripAdvisor, and OpenTable is crucial for rankings.Treat Listings Like Social Media: Regular updates, posts, and interactions on business listings help improve visibility and credibility.Customer Reviews Matter: A strong review strategy can influence rankings and boost trust—responding to both good and bad reviews is essential.Apple Maps Shouldn't Be Ignored: Many businesses fail to claim their Apple Maps listing, losing out on customers who rely on iPhones.Your Website Impacts Local SEO: Website speed, mobile-friendliness, and SSL security all affect how high a business ranks in local searches.Power Quotes:"Treat your Google Business profile like your Instagram—keep it fresh, updated, and engaging." – Michelle Chia"A single negative review can cost you business—how you handle it can turn it into an opportunity." – Alex Quin"Apple Maps is often overlooked, but it's a goldmine for local businesses." – Kevin PimentelMeet the Guests: Michelle Chia & Keven PimentelInstagram: [https://www.instagram.com/michellechia]Instagram: [https://www.instagram.com/instakeven]Connect With the Podcast Host Alex Quin:Instagram: (https://www.instagram.com/alexquin)Twitter: (https://twitter.com/mralexquin)LinkedIn: (https://www.linkedin.com/in/mralexquin)Website: (https://alexquin.com)TikTok: (https://www.tiktok.com/@mralexquin)Our CommunityInstagram:(https://www.instagram.com/hustleinspireshustle)Twitter: (https://twitter.com/HustleInspires)LinkedIn: (https://www.linkedin.com/company/hustle-inspires-hustle)Website: (https://hustleinspireshustle.com)*This page may contain affiliate links or sponsored content. When you click on these links or engage with the sponsored content and make a purchase or take some other action, we may receive a commission or compensation at no additional cost to you. We only promote products or services that we genuinely believe will add value to our readers & listeners.*See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
En este episodio de Emprendedores de Éxito, hablamos con Xavi de Don Dominio sobre aspectos técnicos fundamentales para cualquier emprendedor digital.
In this episode of Working Class Audio, Matt welcomes Legendary rock mix engineer Mike Fraser to discuss his 40+ year career crafting iconic records for Aerosmith, AC/DC, and more. In This Episode, We Discuss: Mixing approach – Keeping it minimalist & focusing on the song Time management & career longevity in the music business Building trust with high-profile artists in the studio Gear & workflow preferences – Why he sticks to SSL consoles & NS-10s Adapting to the industry's shift to digital & remote work Navigating band dynamics & working with creative personalities Dropping Out of School Starting as a Janitor Links and Show Notes: Mike's Website Matt's Rant: Reignite the Spark! Credits: Guest: Mike Fraser Host/Engineer/Editor/Producer: Matt Boudreau WCA Theme Music: Cliff Truesdell The Voice: Chuck Smith
Send us a textIn this episode of the Faders Up Podcast season 6 kicks off with a discussion about hardware companies who make plugins and if its the new trend in pro audio. Oshay shows a trick with Machine, Czar recaps his trip to Anaheim, and everyone discusses their favorite saturation plugins. There is now a mailing list. We will be using this mailing list to share updates, giveaways, product discounts and more. You can sign up for the mailing list at http://eepurl.com/hzwW4fAs usual this episode will be posted in theFacebook Group for discussion, Faders Up Podcast.Follow the hosts, guest, and podcast on Instagram- FadersUpPodcast- AudioCzar901- ItspronouncedOshayGuest- Michael Gates
Upset over illicit sports streaming websites, Canal+ petitioned a French court to order Google, Cloudflare, Quad9 and Vercara to no longer resolve queries to domains like antenasports.ru. We discuss whether the court's decision to side with Canal+ amounts to "internet censorship" and whether it will have any effect. Check out our accompanying article at royalpalacemedia.comA few precisions/corrections:- Canal+ Groupe has been recently restructured such what we said about Vavendi is not longer up-to-date (the firm remains nonetheless under the control of the Bolloré family).- The acronym for the Inter-planetary File System is "IPFS" but Patrick mistakenly says IFS because interplanetary is arguably one word.- Our website does not have a certificate issued by Cloudflare, but rather Google Trust Services which is one of the five certificate authorities Cloudflare uses to issues SSL certs.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SSL 2.0 Turns 30 This Sunday SSL was created in February 1995. However, back in 2005, only a year later, SSL 3.0 was released, and as of 2011, SSL 2.0 was deprecated, and support was removed from many crypto libraries. However, over 400k hosts are still exposed via SSL 2.0. https://isc.sans.edu/diary/SSL%202.0%20turns%2030%20this%20Sunday...%20Perhaps%20the%20time%20has%20come%20to%20let%20it%20die%3F/31664 Deepseek News Many articles cover various security shortcomings in the Chinese Deepseek AI model. Remember that some of these issues are not unique to Deepseek. https://www.upguard.com/blog/deepseek-adoption https://www.reversinglabs.com/blog/rl-identifies-malware-ml-model-hosted-on-hugging-face https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak https://www.nowsecure.com/blog/2025/02/06/nowsecure-uncovers-multiple-security-and-privacy-flaws-in-deepseek-ios-mobile-app/ Crypto Wallet Scam Not For Free Didier looked closer at the recent dual signature crypto scams. These wallets are not free; attackers must spend money to set them up. https://isc.sans.edu/diary/Crypto+Wallet+Scam+Not+For+Free/31666
Apple is proceeding with a ballot that eventually will shorten SSL certificate maximum term to 47 days. Accompanying the ballot, Apple released a statement explaining its intent with the ballot. In this episode we unpack its statements.
Si eres un usuario de Let's Encrypt ya sabrás que dejarán de enviar los correos que te notifican cuando un certificado SSL va a expirar. Pero puedes seguir recibiendo estas notificaciones con Red Sift. https://app.redsift.cloud/sift/ Por cierto, en este episodio menciono brevemente a Apple Invites. Te invito a debatir sobre este tema en el Foro de Como Pienso Digo https://foro.comopiensodigo.com Y otras formas de contacto las encuentran en: https://ernestoacosta.me/contacto.html Todos los medios donde publico contenido los encuentras en: https://ernestoacosta.me/ Si quieres comprar productos de RØDE, este es mi link de afiliados: https://brandstore.rode.com/?sca_ref=5066237.YwvTR4eCu1
Security takes center stage in this episode as Lois Houston and Nikita Abraham are joined by MySQL Solution Engineer Ravish Patel. Together, they explore MySQL's security features, addressing key topics like regulatory compliance. Ravish also shares insights on protecting data through encryption, activity monitoring, and access control to guard against threats like SQL injection and malware. MySQL 8.4 Essentials: https://mylearn.oracle.com/ou/course/mysql-84-essentials/141332/226362 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. --------------------------------------------------------- Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me today is Nikita Abraham, Team Lead of Editorial Services. Nikita: Hey everyone! In our last episode, we took a look at MySQL database design. Today is the first of a two-part episode on MySQL security. Lois: In Part 1, we'll discuss how MySQL supports regulatory compliance and how to spot and handle common security risks. 00:55 Nikita: Joining us today is Ravish Patel, a MySQL Solution Engineer at Oracle. Hi Ravish! Let's start by talking about how MySQL supports regulatory compliance. 01:06 Ravish: Some of the most important international regulations that we have surrounding data and organizations include the GDPR, HIPAA, Sarbanes-Oxley, the UK Data Protection Act, and the NIS2. Although each regulatory framework differs in the details, in general, you must be able to comply with certain key requirements and all of which are enabled by MySQL. First, you must be able to monitor user activity on the system, which includes keeping track of when new users are created, when the schema changes, and when backups are taken and used. You must protect data, for example, by ensuring that databases that are stored on disk are encrypted at REST and ensuring that only authorized users have privileges to access and modify the data. You must have the appropriate retention policies in place for your data, ensuring that backups are held securely and used only for the purpose intended. You must be able to audit access to the data so that you can trace which users gained access to records or when they were modified. All of these facilities are available in MySQL, either as part of the core community edition features or made available through enterprise features. 02:21 Lois: What kind of risks might we encounter, Ravish, and how can we address them? Ravish: As your system grows in complexity, you're likely going to have more risks associated with it. Some of those risks are associated with the human factors that come with any computer system. These might be errors that are introduced when people perform work on the system, either administrative work on the environment or database or work that developers and testers perform when working on a changing system. You might even have malicious users trying to exploit the system or good faith users or support staff who make changes without proper consideration or protection from knock-on effects. At the foundation are the necessary components of the system, each of which might be vulnerable to human error or malicious actors. Every piece of the system exposes possible risks, whether that's the application presented to users, the underlying database, the operating system or network that it works on, or processes such as backups that place copies of your data in other locations. More complex environments add more risks. High availability architectures multiply the number of active systems. Consolidating multiple application databases on a single server exposes every database to multiple vectors for bugs and human error. Older, less well supported applications might give more challenges for maintenance. Engaging external contractors might reduce your control over authorized users. And working in the cloud can increase your network footprint and your reliance on external vendors. 03:53 Nikita: What are risks that specifically impact the database? Ravish: The database server configuration might not be optimal. And this can be changed by users with proper access. To mitigate this risk, you might enable version control of the configuration files and ensure that only certain users are authorized. Application and administrator accounts might have more data privileges than required, which adds risk of human error or malicious behavior. To mitigate this, you should ensure that users are only granted necessary permissions. In particular, structural modifications and administrative tasks might be more widely accessible than desired. Not every developer needs full administrative rights on a database. And certainly, an application should not have such privileges. You should limit administrative privileges only to those users who need that authorization. 04:45 Nikita: Okay, quick question, Ravish. How do authentication and password security fit into this picture? Ravish: Authentication is often a weak point. And password security is one of the most common issues in large applications. Ensure that you have strong password policies in place. And consider using authentication mechanisms that don't solely rely on passwords, such as pass-through authentication or multifactor authentication. 05:11 Lois: So, it sounds like auditing operations are a critical part of this process, right? Ravish: When something bad happens, you can only repair it or learn from it if you know exactly what has happened and how. You should ensure that you audit key operations so you can recover from error or malicious actions. If a developer laptop is lost or stolen or someone gains access to an underlying operating system, then your data might become vulnerable. You can mitigate this by encrypting your data in place. This also applies to backups and, where possible, securing the connection between your application and the database to encrypt data in flight. 05:54 Did you know that Oracle University offers free courses on Oracle Cloud Infrastructure? You'll find training on everything from multicloud, database, networking, and security to artificial intelligence and machine learning, all free for our subscribers. So, what are you waiting for? Pick a topic, head over to mylearn.oracle.com and get started. 06:18 Nikita: Welcome back! Before the break, we touched on the importance of auditing. Now, Ravish, what role does encryption play in securing these operations? Ravish: Encryption is only useful if the keys are secure. Make sure to keep your encryption assets secure, perhaps by using a key vault. Every backup that you take contains a copy of your data. If these backups are not kept securely, then you are at risk, just as if your database wasn't secure. So keep your backups encrypted. 06:47 Lois: From what we've covered so far, it's clear that monitoring is essential for database security. Is that right? Ravish: Without monitoring, you can't track what happens on an ongoing basis. For example, you will not be aware of a denial-of-service attack until the application slows down or becomes unavailable. If you implement monitoring, you can identify a compromised user account or unusual query traffic as it happens. A poorly coded application might enable queries that do more than they should. A database firewall can be configured to permit only queries that conform to a specific pattern. 07:24 Nikita: There are so many potential types of attacks out there, right? Could you tell us about some specific ones, like SQL injection and buffer overflow attacks? Ravish: A SQL injection attack is a particular form of attack that modifies a SQL command to inject a different command to the one that was intended by the developer. You can configure an allow list in a database firewall to block such queries and perform a comprehensive input validation inside the application so that such queries cannot be inserted. A buffer overflow attack attempts to input more data than can fit in the appropriate memory location. These are usually possible when there is an unpatched bug in the application or even in the database or operating system software. Validation and the database firewall can catch this sort of attack before it even hits the database. And frequent patching of the platforms can mitigate risks that come from unpatched bugs. Malicious acts from inside the organization might also be possible. So good access control and authorization can prevent this. And monitoring and auditing can detect it if it occurs. 08:33 Lois: What about brute force attacks? How do they work? Ravish: A brute force attack is when someone tries passwords repeatedly until they find the correct one. MySQL can lock out an account if there have been too many incorrect attempts. Someone who has access to the physical network on which the application and database communicate can monitor or eavesdrop that network. However, if you encrypt the communications in flight, perhaps by using TLS or SSL connections, then that communication cannot be monitored. 09:04 Nikita: How do the more common threats like malware, Trojan horses, and ransomware impact database security? Ravish: Malware, ransomware, and Trojan horses can be a problem if they get to the server platforms or if client systems are compromised and have too much permissions. If the account that is compromised has only limited access and if the database is encrypted in place, then you can minimize the risks associated even if such an event occurs. There are also several risks directly associated with people who want to do the harm. So it's vital to protect personal information from any kind of disclosure, particularly sensitive information, such as credit card numbers. Encryption and access control can protect against this. 09:49 Lois: And then there are denial-of-service and spoofing attacks as well, right? How can we prevent those? Ravish: A denial-of-service attack prevents users from accessing the system. You can prevent any single user from performing too many queries by setting resource users limits. And you can limit the total number of connections as well. Sometimes, a user might gain access to a privileged level that is not appropriate. Password protection, multifactor authentication, and proper access control will protect against this. And auditing will help you discover if it has occurred. A spoofing attack is when an attacker intercepts and uses information to authenticate a user. This can be mitigated with strong access control and password policies. An attacker might attempt to modify or delete data or even auditing information. Again, this can be mitigated with tighter access controls and caught with monitoring and auditing. If the attack is successful, you can recover from it easily if you have a strong backup strategy in place. 10:50 Nikita: Ravish, are there any overarching best practices for keeping a database secure? Ravish: The MySQL installation itself should be kept up-to-date. This is the easiest if you install from a package manager on Windows or Linux. Your authentication systems should be kept strong with password policies or additional authentication systems that supplement or replace passwords entirely. Authorization should be kept tightly controlled by minimizing the number of active accounts and ensuring that those accounts have only the minimal privileges. You should control and monitor changes on the system. You can limit such changes with the database firewall and with tight access controls and observe changes with monitoring, auditing, and logging. Data encryption is also necessary to protect data from disclosure. MySQL supports encryption in place with Transparent Data Encryption, also known as TDE, and a variety of encryption functions and features. And you can encrypt data in flight with SSL or TLS. And of course, it's not just about the database itself but how it's used in the wider enterprise. You should ensure that replicas are secure and that your disaster recovery procedures do not open up to additional risks. And keep your backups encrypted. 12:06 Lois: Is there anything else we should keep in mind as part of these best practices? Ravish: The database environment is also worth paying attention to. The operating system and network should be as secure as you can keep them. You should keep your platform software patched so that you are protected from known exploits caused by bugs. If your operating system has hardening guidelines, you should always follow those. And the Center of Internet Security maintains a set of benchmarks with configuration recommendations for many products designed to protect against threats. 12:38 Nikita: And that's a wrap on Part 1! Thank you, Ravish, for guiding us through MySQL's role in ensuring compliance and telling us about the various types of attacks. If you want to dive deeper into these topics, head over to mylearn.oracle.com to explore the MySQL 8.4 Essentials course. Lois: In our next episode, we'll continue to explore how user authentication works in MySQL and look at a few interesting MySQL Enterprise security tools that are available. Until then, this is Lois Houston… Nikita: And Nikita Abraham, signing off! 13:12 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.
What if the way you secure your company is all wrong? Taher Elgamal, the ‘Father of SSL,' reveals why passwords are failing us, what smarter security looks like, and how businesses can thrive with it. Taher: www.linkedin.com/in/taherelgamal Evolution Equity: evolutionequity.com Jon: www.linkedin.com/in/jon-mclachlan Sasha: www.linkedin.com/in/aliaksandr-sinkevich YSecurity: www.ysecurity.io
Fredrik talks to Jon Sterling about user interfaces old and new. Jon has created Aquaui - a Mac user interface library which is a small love letter to the Aqua user interface style for Mac OS X. Based on that, we discuss understandable and consistent user interfaces, how there seems to be little evolution and improvement, wish for brave new ideas, and a lot more. Oh, and we also discuss living with old technology, like a seventh-generation Ipod. Plus liability laundering and the problems of building the whole house of out fire alarms. Thank you Cloudnet for sponsoring our VPS! Comments, questions or tips? We a re @kodsnack, @tobiashieta, @oferlundand @bjoreman on Twitter, have a page on Facebook and can be emailed at info@kodsnack.se if you want to write longer. We read everything we receive. If you enjoy Kodsnack we would love a review in iTunes! You can also support the podcast by buying us a coffee (or two!) through Ko-fi. Links Jon Cambridge Clare college Aquaui - Jon's library Aqua - the user interface design language Steve Jobs introducing Aqua The dock Windows XP Windows 98 Iphone 4 IOS 6 IOS 7 - the great flattening of everything Apple's old human interface guidelines Accidental tech podcast The purple button for single-window mode in the Mac OS X beta - scroll down or search for “purple” Stage manager Lion Infinite Mac - the website where you can run old Mac operating systems The spatial Finder - and why the modern Finder isn't Support Kodsnack on Ko-fi Elementary OS - and their interface design guide GTK A post about the original dock Discussion about Mica - Apple internal design tool Core animation Webkit Blink WKWebview Appkit NSScrollview NSScroller 12-inch Powerbook Seventh-generation Ipod Itunes Intel Imac Tiger Tenfourfox- browser for old versions of Mac OS X Charles proxy jonmstirling.com Jon on Mastodon Titles A love letter A very different era Beautiful blue liquid The great flattening of everything Unbelievable user interface regression I feel powerless today when I'm using my computer They did mess up the photo app Like a pill A long-lasting Ibuprofen That upper-right corner Bigger than my wingspan Beautiful, unsullied whitespace During the decline of Mac OS Time to be a bit bold A passable gradient Start from a point of inspiration Too much for the old hardware The Aqua fire alarm SSL fire alarms
In this 2024 lookback episode, we give an overview of the firestorm of Bugzilla incidents that we refer to as the Bugzilla Bloodbath. The Bugzilla Bloodbath affected actions around the Entrust distrust, delayed revocation reform, 47-day SSL certificate maximum term, linting, and more.
"Listen to what the session musicians say during lunch!" Joe talked about how to be a great studio assistant, orchestral sessions, choosing the perfect vocal mic and DAW, Harrison Mixbus 32, the SSL UF8 and UC-1, and being a servant to the song! Get access to FREE mixing mini-course: https://MixMasterBundle.com My guest today is Joe Carrell, a Nashville-based producer, mixer, and recording engineer. Over his 20+ year career, Joe has mixed and recorded 12 Grammy-nominated albums, worked on Dove Award-winning songs, and contributed to over 38 charting number-one hits, with Billboard top tens in multiple categories, all the while producing pop artists and mixing everything from rock, country, jazz, gospel, bluegrass, etc. He currently works from the historic Treasure Isle Recorders in Nashville TN. Joe Carrell began his journey in the professional music world as an assistant engineer for a member of Nashville's legendary Bradley family. With a strong background as a musician and a deep love for recording, Joe quickly became a sought-after expert in the industry. Today, he shares his passion and expertise on his YouTube channel, In The Mix with Joe Carrell, and in collaboration with platforms like Produce Like A Pro, Warm Audio, and SSL. Joe produces hands-on tutorials for both beginners and seasoned engineers, covering essential mixing and production techniques such as vocal mixing, managing multiple vocal tracks, adding depth to mixes, and insights into his hybrid workflow. He also offers tips on using EQ, stereo widening, automation, subgroups, balancing low-end frequencies, mixing orchestral elements, and crafting commercial-ready tracks across a variety of genres. THANKS TO OUR SPONSORS! http://UltimateMixingMasterclass.com https://www.adam-audio.com https://www.native-instruments.com Use code ROCK10 to get 10% off! https://www.izotope.com Use code ROCK10 to get 10% off! https://roswellproaudio.com/ https://www.makebelievestudio.com/mbsi Get your MBSI plugin here! https://RecordingStudioRockstars.com/Academy https://www.thetoyboxstudio.com/ Listen to this guest's discography on Spotify: https://open.spotify.com/playlist/0eq797VHiwEZkHpkPT2my7?si=70f85ca0cc324b3b If you love the podcast, then please leave a review: https://RSRockstars.com/Review CLICK HERE FOR COMPLETE SHOW NOTES AT: https://RSRockstars.com/488
Have you ever felt lost when managing your website's domain? You're not alone. Some tech professionals keep these concepts vague to maintain control over their clients. Let's break down what you need to know and document to stay in control of your digital property. Remember, your domain for your company is YOURS. Do not let an outside contractor register a domain for you, even if they are trying to save time, money, etc. You need to create this login and invite them in to manage it. You never want to lose control of your domains. This short episode gives you an initial action list to take inventory of what you have, who has access, and when your domains renew. The next episode in this series will be about moving domains, testing your domains and SSL certificates. This is tied to a course series Susan has available with free real estate broker focused tips emailed q-r.to/sfsreo8, and a paid workshop group. q-r.to/sf8weeks
Apple has published an updated draft to its proposal for shortening the lifespan of SSL certificates, including a final maximum term of 47 rather than 45 days. We explain.
Research divisions within music companies often operate to advance the products & services they offer. In the case of Deezer's most recent research on identifying & tagging songs, it may improve the ways our business fights against bad actors. This month, we talked to Deezer's Head of Research Romain Hennequin about his team's origins, its most recent paper which delves into how self-supervised learning (SSL) may help accurately identify AI-generated tracks uploaded to streaming services, and much more!
From Nextcloud Breakup to Blissful Reunion: Chris's journey back to a smarter setup. Plus, Jellyfin's game-changing features and a beloved self-hosted app get the upgrade we've all been waiting for.
What does it take to go from leading Kafka development at Confluent to becoming a key figure in the PostgreSQL world? Join us as we talk with Gwen Shapira, co-founder and chief product officer at Nile, about her transition from cloud-native technologies to the vibrant PostgreSQL community. Gwen shares her journey, including the shift from conferences like O'Reilly Strata to PostgresConf and JavaScript events, and how the Postgres community is evolving with tools like Discord that keep it both grounded and dynamic.We dive into the latest developments in PostgreSQL, like hypothetical indexes that enable performance tuning without affecting live environments, and the growing importance of SSL for secure database connections in cloud settings. Plus, we explore the potential of integrating PostgreSQL with Apache Arrow and Parquet, signaling new possibilities for data processing and storage.At the intersection of AI and PostgreSQL, we examine how companies are using vector embeddings in Postgres to meet modern AI demands, balancing specialized vector stores with integrated solutions. Gwen also shares insights from her work at Nile, highlighting how PostgreSQL's flexibility supports SaaS applications across diverse customer needs, making it a top choice for enterprises of all sizes.Follow Gwen on:Nile BlogX (Twitter)LinkedInNile DiscordWhat's New In Data is a data thought leadership series hosted by John Kutay who leads data and products at Striim. What's New In Data hosts industry practitioners to discuss latest trends, common patterns for real world data patterns, and analytics success stories.
SSL certificates are likely going to last less time, the latest Windows 11 update leaves a huge chunk of data behind and doesn't play nicely with some SSDs, picking a modern dhcp server on a homebrew router, and storing encrypted backups on a friend's NAS with ZFS. Plugs Support us on patreon and get […]
SSL certificates are likely going to last less time, the latest Windows 11 update leaves a huge chunk of data behind and doesn't play nicely with some SSDs, picking a modern dhcp server on a homebrew router, and storing encrypted backups on a friend's NAS with ZFS. Plugs Support us on patreon and get... Read More
This was an interview that was done late in 2021 by Bud Alheim. It would change how I would record audiobooks. The reason is that he was using a very good mic with a pre-amp. His end of the interview was so much clearer audio that for the next few months I researched recording equipment and then settled on a Lewitt 440 Pure Mic, made in Austria, and an SSL 2 pre-amp to get the audio that is being recorded for these present narrations. There is a lot of indebtedness that we both have for John Owen that is discussed in the podcast. Bud introduced me to the Sermon, The Goodness and Severity of God in Judging Sinful Churches and Nations.
Apple recently floated a draft CABF ballot for commentary that steps down maximum term for SSL certificates starting next year and eventually landing at 45 days in 2027. We share the details.
In this episode, Michelle discusses the importance of website security, privacy, and user experience. She emphasizes the need for a secure and private website to protect against hackers and data breaches. Michelle also highlights the significance of providing a good user experience to keep visitors engaged and encourage conversions. She introduces Porkbun, a domain registrar that offers essential tools like whois privacy and SSL certificates for free. Michelle explains how Porkbun is committed to providing a simple and user-friendly experience for managing websites. She also mentions the special offer of dot bio domains for less than $2 for the first year. Use my link https://porkbun.com/SMDecoded24 to get a .bio domain for less than $2 now at Porkbun! Takeaways Website security is essential to protect against hackers, malware, and data breaches. Respecting user privacy and protecting their data is crucial for building trust and credibility. A good user experience keeps visitors engaged and encourages conversions. Porkbun offers essential tools like whois privacy and SSL certificates for free with every domain purchase. Porkbun provides a simple and user-friendly platform for managing websites. Dot bio domains are ideal for creating personalized link in bio pages and establishing online brands.
In this conversation, Simon Elisha interviews Colm MacCárthaigh, Vice President and Distinguished Engineer at AWS, about his background in technology and his work at Amazon. They discuss topics such as Colm's first computer, his role in building the European sovereign cloud, and his involvement in the creation of the S2N open-source library for TLS and SSL protocols. They also explore the importance of writing code and staying relevant in the industry, as well as the operational metrics meetings at AWS. They also talk about the role of call leaders in handling large operational events and the importance of staying calm and focused in stressful situations. Colm shares his experience with patents and his preference for the Vim editor. They also touch on the Nitro Enclave technology and Colm's passion for music.
Scott and Wes serve up an episode on reverse proxy servers. They discuss popular options like CF Tunnels, Caddy, Nginx, Apache, and more, explaining why you might need one for load balancing, SSL certificates, security, and managing multiple servers. Show Notes 00:00 Welcome to Syntax! 01:30 Brought to you by Sentry.io. 02:25 What is reverse proxy? 03:16 Some examples of reverse proxies. 05:04 Why do you need a reverse proxy? 05:09 Combining multiple servers. 06:51 Load balancing. 07:23 SSL certificates. 10:30 Security. 10:37 Conceal your true IP. 11:24 Access management. 12:31 Routing static assets. 13:31 CDN / local. 15:55 Caddy × websocket support. Hit us up on Socials! Syntax: X Instagram Tiktok LinkedIn Threads Wes: X Instagram Tiktok LinkedIn Threads Scott: X Instagram Tiktok LinkedIn Threads Randy: X Instagram YouTube Threads