Podcasts about SSL

  • 976PODCASTS
  • 2,444EPISODES
  • 49mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Mar 3, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about SSL

Show all podcasts related to ssl

Latest podcast episodes about SSL

Mixing Music with Dee Kei | Audio Production, Technical Tips, & Mindset
The Sound of the Eras: 1950s to 2020s Mixing Evolution Explained

Mixing Music with Dee Kei | Audio Production, Technical Tips, & Mindset

Play Episode Listen Later Mar 3, 2026 100:44


In Episode 363 of the Mixing Music Podcast, Dee Kei and Lu take a deep dive into how mixing and recording have evolved from the 1950s to today. Starting with mono recordings, ribbon mics, and engineers in lab coats, they trace the journey through multitrack tape, Neve and SSL consoles, gated reverb in the 80s, the rise of Pro Tools in the 90s, the loudness wars of the 2000s, and the bedroom production boom of the 2010s.They break down how technological shifts shaped the sound of each era, from Frank Sinatra's room-driven performances to Led Zeppelin's tape saturation, Michael Jackson's SSL precision, and the hyper-loud masters of Metallica and early 2000s pop and hip hop. The conversation also explores how Napster disrupted the industry, how streaming rebuilt it, and why today's music economy is more democratized than ever.The episode closes with a forward-looking discussion on AI, Atmos, spatial audio, and whether music is truly declining or simply evolving again. Along the way, Dee Kei challenges common analog myths, including the hidden digital processing inside many classic vinyl records.If you care about how technology shapes creativity, why records sound the way they do, and where mixing is headed next, this is a must-listen episode.SUBSCRIBE TO OUR PATREON FOR EXCLUSIVE CONTENT!⁠SUBSCRIBE TO YOUTUBE⁠Join the ‘Mixing Music Podcast' Discord!HIRE DEE KEIHIRE LU⁠HIRE JAMES⁠Find Dee Kei and Lu on Social Media:Instagram: @DeeKeiMixes @MasteredbyLu @JamesParrishMixesTwitter: @DeeKeiMixes @MasteredbyLuThe Mixing Music Podcast is sponsored by ⁠Izotope⁠, ⁠Antares (Auto Tune)⁠, Sweetwater, ⁠Plugin Boutique⁠, ⁠Lauten Audio⁠, ⁠Filepass⁠, & ⁠Canva⁠The Mixing Music Podcast is a video and audio series on the art of music production and post-production. Dee Kei, Lu, and James are professionals in the Los Angeles music industry having worked with names like Odetari, 6arelyhuman, Trey Songz, Keyshia Cole, Benny the Butcher, carolesdaughter, Crying City, Daphne Loves Derby, Natalie Jane, charlieonnafriday, bludnymph, Lay Bankz, Rico Nasty, Ayesha Erotica, ATEEZ, Dizzy Wright, Kanye West, Blackway, The Game, Dylan Espeseth, Tara Yummy, Asteria, Kets4eki, Shaquille O'Neal, Republic Records, Interscope Records, Arista Records, Position Music, Capital Records, Mercury Records, Universal Music Group, apg, Hive Music, Sony Music, and many others.This podcast is meant to be used for educational purposes only. This show is filmed and recorded at Dee Kei's private studio in North Hollywood, California. If you would like to sponsor the show, please email us at ⁠deekeimixes@gmail.com⁠.Support this podcast at — https://redcircle.com/mixing-music-music-production-audio-engineering-and-music/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Geek News Central
Ring Search Party Sparks Privacy Backlash #1858

Geek News Central

Play Episode Listen Later Feb 26, 2026 Transcription Available


Chris breaks down the backlash to Ring's Super Bowl “Search Party” ad, which aimed to help find lost pets but reignited privacy concerns over AI-powered neighborhood surveillance. He also explores the surge of AI-themed Super Bowl ads, Apple's delayed Siri overhaul, rising DDR5 RAM prices driven by AI demand, SpaceX's Crew-12 launch, and the record-breaking sale of a rare Pokémon card. -Want to be a Guest on a Podcast or YouTube Channel? Sign up for GuestMatch.Pro -Thinking of buying a Starlink? Use my link to support the show. Subscribe to the Newsletter. Email Chris if you want to get in touch! Like and Follow Geek News Central’s Facebook Page. Support my Show Sponsor: Best Godaddy Promo Codes Get 1Password Full Summary – Main story — Ring Search Party: Chris summarizes Ring's first Super Bowl ad (viewed by “over 120 million”) which promoted “Search Party,” a feature that lets users upload a photo of a missing pet and alerts neighborhood Ring cameras if they spot it. He explains the ad was intended as wholesome but provoked fast backlash: viewers and privacy advocates (including the ACLU and lawmakers) warned the tech could be repurposed to track people. Chris recounts Ring's prior controversies (police partnerships, an FTC settlement in 2023 over employee access to videos) and says the ad brought those issues back into focus. He reports that four days after the ad, Amazon canceled a planned integration with Flock Safety (Amazon called it a resources-and-timing decision). He notes Search Party is opt-in for pets but emphasizes the potential scale of surveillance when aggregated across millions of Ring devices and that the underlying AI capability isn't going away. – Super Bowl AI ads and Anthropic vs. OpenAI: Chris says AI-related ads made up about 23% of Super Bowl commercials. He describes Anthropic's debut ads (titles like “betrayal, deception, treachery, and violation”) positioning Claude as ad-free for paying users and taking a shot at OpenAI's ad plans; Sam Altman criticized those ads as dishonest. He mentions Svedka ran a primarily AI-generated Super Bowl ad and that Anthropic saw a ~6.5% traffic jump and an ~11% rise in daily active users after the game. Chris frames the ads as a sign the AI assistant wars have moved to mainstream consumer marketing and raises the question of whether AI assistants will be ad-supported or paid/ad-free. – Sponsor spot: A lengthy GoDaddy sponsorship read with pricing and offers: economy hosting $6.99/month for a year with free domain, email, and SSL; WordPress hosting $12.99/month with same inclusions; domain names $11.99; GoDaddy website builder offers a 30-day free trial for certain plans. Chris urges listeners to use the provided promo links to support the show. – Apple March 4 event and Siri delay: Chris reports Apple confirmed a March 4 product launch (iPhone 17e, MacBook Pros with M5 Pro and M5 Max, an 8th-gen iPad Air and a 12th-gen iPad). He says the AI-powered Siri overhaul planned for iOS 26.4 hit testing snags and some features were pushed to iOS 26.5 in May and iOS 27 in September. He notes Apple claims Siri improvements are still coming in 2026 but have been repeatedly delayed, and frames Apple as focusing on hardware and on-device processing. – DDR5 RAM price surge: Chris covers a global memory shortage driven by AI data-center demand. He explains manufacturers shifted production to high-bandwidth AI memory with much higher margins, reducing consumer DDR supply and forcing adoption of DDR5. He gives figures: DDR5 64 GB kits rose from around $200 in mid-2025 to over $1,000 (a ~300% increase across six months, with another ~50% spike in the last month). He says inventories have fallen to about eight weeks and analysts don't expect meaningful relief until late 2027 or 2028. He warns PC builders and buyers to brace for higher upgrade and system prices. – SpaceX Crew-12 launch: Chris recounts NASA Crew-12 as a replacement following an earlier medical evacuation that left ISS short-staffed. He reports SpaceX launched four astronauts on Feb. 13 aboard a Falcon 9 with the Dragon capsule Freedom (liftoff at 5:15 AM EST) and docked on Valentine's Day. Crew named: NASA commander Jessica Mayer, NASA pilot Jack Hathaway, ESA mission specialist Sophie Adadott, and Russian cosmonaut Andrei (Andrei Fedoo/Fedu — host stumbles on the name). The mission is planned for eight months; the Falcon 9 first stage landed back at pad 40. Chris frames the launch as good news and notes ongoing reliance on SpaceX. – Pokémon card/collectibles auction: Chris discusses a record trading-card sale. He refers to Logan Paul and the Pikachu Illustrator card (one of 39 ever made). He mentions earlier reports of card sales (at first saying a card sold for “like six and a half million dollars,” then later saying Logan Paul sold one for “sixteen point five million dollars”) and then details a live auction via Golden in which the card sold for “sixty million four hundred ninety two thousand dollars,” called a new Guinness World Record for the most expensive trading card sold at auction. Chris notes Logan Paul bought his PSA 10 card in 2021 for $5.2M, the auction had about 97 bids, and the buyer was venture capitalist Adrien Scaramucci (who had the card placed on a $75,000 diamond necklace). Chris comments on collectors vs. investors, how wealthy buyers and influencers can drive pricing, and cautions that most fans shouldn't expect to find such returns. Show Links Ring Search Party – Official Feature Page Ring Super Bowl Ad Sparks Privacy Backlash Super Bowl 60 AI Ads: Anthropic, Svedka, and the AI Marketing Push SpaceX Launches NASA Crew-12 to the ISS Apple Confirms March 4 Event — Cheaper iPhone Expected DDR5 RAM Prices Surge Over 300% Amid AI Demand Logan Paul Pokémon Card Sets Record at Auction The post Ring Search Party Sparks Privacy Backlash #1858 appeared first on Geek News Central.

Ransom Note
PREMIERE: Strange Fruit – Monopolar (Hardway Bros Remix) [Gentle Tuesday Recordings]

Ransom Note

Play Episode Listen Later Feb 25, 2026 6:08


AHardway dancefloor throb injected into Strange Fruit's shoegaze-inflected original… There was a Strange Fruit from Jakarta who said, “I shall go on Tuesday, iridescent and red! With a hypnodub shimmer and kosmische delight, I shall drip upon Wednesday and dance through the night!” The Hardway Bros heard it and let out a shout: “We'll remix your polarness inside and about! We'll chug through the shoegaze and acid the house, Till the SSL dubs frighten even the mouse!” So the Fruit and the Bros on a Gentle Tuesday Went sailing on Monopolar waves far away, With a Pouvoi Moteur and a Tom Furse dub too, And they dripped and they gleamed in iridescent blue. “O Fruit!” said the Bros, “O remarkable thing! You are dreamy and poppy and you know how to sing! You are krautrock and electronica, strange as can be, And we'll live on the SSL for ever,” said he. Jakarta's Strange Fruit occupy an unusual space: a band whose shoegaze-inflected live sound sits in a completely different world from the underground electronic circuits their members move through as producers and DJs. It's that dual existence that makes the remix package around their forthcoming Drips EP so compelling – dispatches from a shared musical universe. For the Monopolar remix, Sean Johnston, under his Hardway Bros moniker, does what he very much does best: find the load-bearing elements of a track and build something new around them. Where the original carries its kosmische momentum intact, this version leans into the slowed-down throb, peeling back the layers and letting the groove do the work. Drips arrives via Gentle Tuesday Recordings soon. With remixes still to come from Tom Furse among others, Strange Fruit are making a quietly persuasive case for themselves as one of the more interesting propositions to emerge from Jakarta's electronic underground. Listen below:

ILUSTRA_PRO / El podcast de Ilustrando Dudas
151_Muchas buenas noticias ilustradas y alguna reflexión chunga

ILUSTRA_PRO / El podcast de Ilustrando Dudas

Play Episode Listen Later Feb 25, 2026 56:13


LISTA DE INTERESADOS EN EVENTOS PRESENCIALES EN GALICIA EN 2026 https://forms.gle/yJjvwGhECVBgV2957CONSIGUE TU REVISIÓN DE PORTFOLIO GRATIS ➡️ https://www.instagram.com/p/DL7M1VYsQ0Q/?img_index=1CONSIGUE TU ACCESO GRATIS A LA CHARLA "ESTUDIÉ ILUSTRACIÓN ¿Y AHORA QUÉ? ➡️ https://ilustrandodudas.activehosted.com/f/38CONSIGUE AQUÍ TU GUÍA "EMPIEZA AQUÍ" PARA APRENDER CÓMO CONVERTIRTE EN ILUSTRAPRO ➡️ https://ilustrandodudas.activehosted.com/f/36CONSIGUE TU PACK DE MEDITACIONES ALINEAR TU MENTE, LÁPIZ Y CORAZÓN PARA DISFRUTAR DE VERDAD DE DEDICARTE A LA ILUSTRACIÓN ➡️ https://ilustrandodudas.activehosted.com/f/10Drawfolio, nuestro sponsor, la mejor plataforma para crear tu primer portfolio web de ilustración sin dolores de cabeza, esponsoriza este programa. Entra en www.drawfolio.com y usa este código de 20% de descuento SSLDUDAS para el primer año de tu suscripción anual, incluido el extra de seguridad SSL.TODOS NUESTROS RECURSOS Y NOVEDADES en www.linktr.ee/iobruApúntate a nuestra newsletter para estar al tanto de todo en https://bit.ly/3a8SSKuY a nuestro canal de Telegram en https://t.me/ilustrandodudasnewsMás información sobre la profesión de la ilustración y sobre el podcast, aliados, colaboradores, recursos y herramientas en www.ilustrandodudas.com/En este episodio te cuento mis buenas nuevas, que son muchas e importantes y muy emocionantes, y alguna reflexión que me preocupa sobre la actitud y la manera de afrontar el querer dedicarnos a la ilustración, sobre todo los más jóvenes.¡Espero que disfrutes mucho del programa!Y recuerda, si te ha servido, has aprendido y te has reído, danos amorcico escribiéndonos en los comentarios, compartiendo tus reflexiones y siguiéndonos en todas las redes y plataformas del mundo mundial.CRÉDITOSEntradilla: Joan Llorcawww.instagram.com/artnegreColaboradores: Manuel Molvarhttps://manuelmolvar.myportfolio.com/https://www.instagram.com/manuelmolvarCanciones de fondo: BendsoundCanción final: Paz Salem - Assirbey

Oracle University Podcast
Security and Migration with Oracle Database@AWS

Oracle University Podcast

Play Episode Listen Later Feb 24, 2026 20:03


In this episode, hosts Lois Houston and Nikita Abraham are joined by special guests Samvit Mishra and Rashmi Panda for an in-depth discussion on security and migration with Oracle Database@AWS. Samvit shares essential security best practices, compliance guidance, and data protection mechanisms to safeguard Oracle databases in AWS, while Rashmi walks through Oracle's powerful Zero-Downtime Migration (ZDM) tool, explaining how to achieve seamless, reliable migrations with minimal disruption.   Oracle Database@AWS Architect Professional: https://mylearn.oracle.com/ou/course/oracle-databaseaws-architect-professional/155574 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu   Special thanks to Arijit Ghosh, Anna Hulkower, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode.   -------------------------------------------------------------   Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:26 Nikita: Welcome to the Oracle University Podcast! I'm Nikita Abraham, Team Lead: Editorial Services with Oracle University, and with me is Lois Houston, Director of Communications and Adoption with Customer Success Services. Lois: Hello again! We're continuing our discussion on Oracle Database@AWS and in today's episode, we're going to talk about the aspects of security and migration with two special guests: Samvit Mishra and Rashmi Panda. Samvit is a Senior Manager and Rashmi is a Senior Principal Database Instructor.  00:59 Nikita: Hi Samvit and Rashmi! Samvit, let's begin with you. What are the recommended security best practices and data protection mechanisms for Oracle Database@AWS? Samvit: Instead of everyone using the root account, which has full access, we create individual users with AWS, IAM, Identity Center, or IAM service. And in addition, you must use multi-factor authentication. So basically, as an example, you need a password and a temporary code from virtual MFA app to log in to the console.  Always use SSL or TLS to communicate with AWS services. This ensures data in transit is encrypted. Without TLS, the sensitive information like credentials or database queries can be intercepted. AWS CloudTrail records every action taken in your AWS account-- who did what, when, and from where. This helps with audit, troubleshooting, and detecting suspicious activity. So you must set up API and user activity logging with AWS CloudTrail.  Use AWS encryption solutions along with all default security controls within AWS services. To store and manage keys by using transparent data encryption, which is enabled by default, Oracle Database@AWS uses OCI vaults. Currently, Oracle Database@AWS doesn't support the AWS Key Management Service. You should also use advanced managed security services such as Amazon Macie, which assists in discovering and securing sensitive data that is stored in Amazon S3.  03:08 Lois: And how does Oracle Database@AWS deliver strong security and compliance? Samvit: Oracle Database@AWS enforces transparent data encryption for all data at REST, ensuring stored information is always protected. Data in transit is secured using SSL and Native Network Encryption, providing end-to-end confidentiality. Oracle Database@AWS also uses OCI Vault for centralized and secure key management. This allows organizations to manage encryption keys with fine-grained control, rotation policies, and audit capabilities to ensure compliance with regulatory standards. At the database level, Oracle Database@AWS supports unified auditing and fine-grained auditing to track user activity and sensitive operations. At the resource level, AWS CloudTrail and OCI audit service provide comprehensive visibility into API calls and configuration changes. At the database level, security is enforced using database access control lists and Database Firewall to restrict unauthorized connections. At the VPC level, network ACLs and security groups provide layered network isolation and access control. Again, at the database level, Oracle Database@AWS enforces access controls to Database Vault, Virtual Private Database, and row-level security to prevent unauthorized access to sensitive data. And at a resource level, AWS IAM policies, groups, and roles manage user permissions with the fine-grained control. 05:27 Lois Samvit, what steps should users be taking to keep their databases secure? Samvit: Security is not a single feature but a layered approach covering user access, permissions, encryption, patching, and monitoring. The first step is controlling who can access your database and how they connect. At the user level, strong password policies ensure only authorized users can login. And at the network level, private subnets and network security group allow you to isolate database traffic and restrict access to trusted applications only. One of the most critical risks is accidental or unauthorized deletion of database resources. To mitigate this, grant delete permissions only to a minimal set of administrators. This reduces the risk of downtime caused by human error or malicious activity. Encryption ensures that even if the data is exposed, it cannot be read. By default, all databases in OCI are encrypted using transparent data encryption. For migrated databases, you must verify encryption is enabled and active. Best practice is to rotate the transparent data encryption master key every 90 days or less to maintain compliance and limit exposure in case of key compromise. Unpatched databases are one of the most common entry points for attackers. Always apply Oracle critical patch updates on schedule. This mitigates known vulnerabilities and ensures your environment remains protected against emerging threats. 07:33 Nikita: Beyond what users can do, are there any built-in features or tools from Oracle that really help with database security? Samvit: Beyond the basics, Oracle provides powerful database security tools. Features like data masking allow you to protect sensitive information in non-production environments. Auditing helps you monitor database activity and detect anomalies or unauthorized access. Oracle Data Safe is a managed service that takes database security to the next level. It can access your database configuration for weaknesses. It can also detect risky user accounts and privileges, identify and classify sensitive data. It can also implement controls such as masking to protect that data. And it can also continuously audit user activity to ensure compliance and accountability. Now, transparent data encryption enables you to encrypt sensitive data that you store in tables and tablespaces. It also enables you to encrypt database backups. After the data is encrypted, this data is transparently decrypted for authorized users or applications when they access that data. You can configure OCI Vault as a part of the transparent data encryption implementation. This enables you to centrally manage keystore in your enterprise. So OCI Vault gives centralized control over encryption keys, including key rotation and customer managed keys. 09:23 Lois: So obviously, lots of companies have to follow strict regulations. How does Oracle Database@AWS help customers with compliance?  Samvit: Oracle Database@AWS has achieved a broad and rigorous set of compliance certifications. The service supports SOC 1, SOC 2, and SOC 3, as well as HIPAA for health care data protection. If we talk about SOC 1, that basically covers internal controls for financial statements and reporting. SOC 2 covers internal controls for security, confidentiality, processing integrity, privacy, and availability. SOC 3 covers SOC 2 results tailored for a general audience. And HIPAA is a federal law that protects patients' health information and ensures its confidentiality, integrity, and availability. It also holds certifications and attestations such as CSA STAR, C5. Now C5 is a German government standard that verifies cloud providers meet strict security and compliance requirements. CSA STAR attestation is an independent third-party audit of cloud security controls. CSA STAR certification also validates a cloud provider's security posture against CSA's cloud controls matrix. And HDS is a French certification that ensures cloud providers meet stringent requirements for hosting and protecting health care data. Oracle Database@AWS also holds ISO and IEC standards. You can also see PCI DSS, which is basically for payment card security and HITRUST, which is for high assurance health care framework. So, these certifications ensure that Oracle Database@AWS not only adheres to best practices in security and privacy, but also provides customers with assurance that their workloads align with globally recognized compliance regimes. 11:47 Nikita: Thank you, Samvit. Now Rashmi, can you walk us through Oracle's migration solution that helps teams move to OCI Database Services? Rashmi: Oracle Zero-Downtime Migration is a robust and flexible end-to-end database migration solution that can completely automate and streamline the migration of Oracle databases. With bare minimum inputs from you, it can orchestrate and execute the entire migration task, virtually needing no manual effort from you. And the best part is you can use this tool for free to migrate your source Oracle databases to OCI Oracle Database Services faster and reliably, eliminating the chances of human errors. You can migrate individual databases or migrate an entire fleet of databases in parallel. 12:34 Nikita: Ok. For someone planning a migration with ZDM, are there any key points they should keep in mind?  Rashmi: When migrating using ZDM, your source databases may require minimal downtime up to 15 minutes or no downtime at all, depending upon the scenario. It is built with the principles of Oracle maximum availability architecture and leverages technologies like Oracle GoldenGate and Oracle Data Guard to achieve high availability and online migration workflow using Oracle migration methods like RMAN, Data Pump, and Database Links. Depending on the migration requirement, ZDM provides different migration method options. It can be logical or physical migration in an online or offline mode. Under the hood, it utilizes the different database migration technologies to perform the migration. 13:23 Lois: Can you give us an example of this? Rashmi: When you are migrating a mission critical production database, you can use the logical online migration method. And when you are migrating a development database, you can simply choose the physical offline migration method. As part of the migration job, you can perform database upgrades or convert your database to multitenant architecture. ZDM offers greater flexibility and automation in performing the database migration. You can customize workflow by adding pre or postrun scripts as part of the workflow. Run prechecks to check for possible failures that may arise during migration and fix them. Audit migration jobs activity and user actions. Control the execution like schedule a job pause, resume, if needed, suspend and resume the job, schedule the job or terminate a running job. You can even rerun a job from failure point and other such capabilities. 14:13 Lois: And what kind of migration scenarios does ZDM support? Rashmi: The minimum version of your source Oracle Database must be 11.2.0.4 and above. For lower versions, you will have to first upgrade to at least 11.2.0.4. You can migrate Oracle databases that may be of the Standard or Enterprise edition. ZDM supports migration of Oracle databases, which may be a single-instance, or RAC One Node, or RAC databases. It can migrate on Unix platforms like Linux, Oracle Solaris, and AIX. For Oracle databases on AIX and Oracle Solaris platform, ZDM uses logical migration method. But if the source platform is Linux, it can use both physical and logical migration method. You can use ZDM to migrate databases that may be on premises, or in third-party cloud, or even within Oracle Cloud Infrastructure. ZDM leverages Oracle technologies like RMAN datacom, Database Links, Data Guard, Oracle GoldenGate when choosing a specific migration workflow. 15:15 Are you ready to revolutionize the way you work? Discover a wide range of Oracle AI Database courses that help you master the latest AI-powered tools and boost your career prospects. Start learning today at mylearn.oracle.com. 15:35 Nikita: Welcome back! Rashmi, before someone starts using ZDM, is there any prep work they should do or things they need to set up first? Rashmi: Working with ZDM needs few simple configuration. Zero-downtime migration provides a command line interface to run your migration job. First, you have to download the ZDM binary, preferably download from my Oracle Support, where you can get the binary with the latest updates. Set up and configure the binary by following the instructions available at the same invoice node. The host in which ZDM is installed and configured is called the zero-downtime migration service host. The host has to be Oracle Linux version 7 or 8, or it can be RCL 8. Next is the orchestration step where connection to the source and target is configured and tested like SSH configuration with source and target, opening the ports in respective destinations, creation of dump destination, granting required database privileges. Prepare the response file with parameter values that define the workflow that ZDM should use during Oracle Database migration. You can also customize the migration workflow using the response file. You can plug in run scripts to be executed before or after a specific phase of the migration job. These customizations are called custom plugins with user actions. Your sources may be hosted on-premises or OCI-managed database services, or even third-party cloud. They may be Oracle Database Standard or Enterprise edition and on accelerator infrastructure or a standard compute. The target can be of the same type as the source. But additionally, ZDM supports migration to multicloud deployments on Oracle Database@Azure, Oracle Database@Google Cloud, and Oracle Database@AWS. You begin with a migration strategy where you list the different databases that can be migrated, classification of the databases, grouping them, performing three migration checks like dependencies, downtime requirement versions, and preparing the order migration, the target migration environment, et cetera. 17:27 Lois: What migration methods and technologies does ZDM rely on to complete the move? Rashmi: There are primarily two types of migration: physical or logical. Physical migration pertains to copy of the database OS blocks to the target database, whereas in logical migration, it involves copying of the logical elements of the database like metadata and data. Each of these migration methods can be executed when the database is online or offline. In online mode, migration is performed simultaneously while the changes are in progress in the source database. While in offline mode, all changes to the source database is frozen. For physical offline migration, it uses backup and restore technique, while with the physical online, it creates a physical standby using backup and restore, and then performing a switchover once the standby is in sync with the source database. For logical offline migration, it exports and imports database metadata and data into the target database, while in logical online migration, it is a combination of export and import operation, followed by apply of incremental updates from the source to the target database. The physical or logical offline migration method is used when the source database of the application can allow some downtime for the migration. The physical or logical online migration approach is ideal for scenarios where any downtime for the source database can badly affect critical applications. The only downtime that can be tolerated by the application is only during the application connection switchover to the migrated database. One other advantage is ZDM can migrate one or a fleet of Oracle databases by executing multiple jobs in parallel, where each job workflow can be customized to a specific database need. It can perform physical or logical migration of your Oracle databases.  And whether it should be performed online or offline depends on the downtime that can be approved by business. 19:13 Nikita: Samvit and Rashmi, thanks for joining us today. Lois: Yeah, it's been great to have you both. If you want to dive deeper into the topics we covered today, go to mylearn.oracle.com and search for the Oracle Database@AWS Architect Professional course. Until next time, this is Lois Houston… Nikita: And Nikita Abraham, signing off! 19:35 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.

Universo de Misterios
1863 - Flash UDM: Astronomía: Actualidad sobre el cometa interestelar 3I/ATLAS

Universo de Misterios

Play Episode Listen Later Feb 21, 2026 20:03


27 SSL-t - 1863 - Astronomía: Actualidad sobre el cometa interestelar 3I/ATLAS Si va a escribir un comentario, gracias por hacerlo, pero por favor, lea antes las normas de publicación que se encuentran a continuación: (si usted es una persona educada, no tiene que leer las normas). Universo de Misterios tiene reservado el derecho de admisión y publicación de comentarios. Los comentarios son aprobados o rechazados por el departamento de comunicaciones y gestión de comentarios y correos electrónicos de UDM. José Rafael solo lee los comentarios una vez hayan sido publicados. El muro de comentarios de los episodios de UDM en iVoox NO es una red social. No espere que el creador del podcast “debata” con usted. Generalmente, los comentarios anónimos podrían no ser publicados. UDM es un podcast independiente y, por tanto, su contenido expresa el criterio de su autor. La temática general es la Ciencia y el Misterio bien entendido, pero su autor podrá abordar otras temáticas. No está obligado a escuchar UDM, si no le gusta lo que escucha, puede dejar de hacerlo, pero no le diga al autor de lo que debe o no debe hablar en su podcast. No envíe comentarios que contengan falacias lógicas. No de información personal. No espere que su comentario sea respondido necesariamente. Comprenda que se reciben diariamente un elevado número de comentarios que han de ser gestionados, se publiquen o no. Si hace comentarios con afirmaciones dudosas, arguméntelas aportando enlaces a fuentes fiables (recuerde, el muro de Comentarios de los episodios de UDM en iVoox NO es una red social). En caso de no respaldar su comentario como se indica en la caja de descripción del episodio, su comentario podrá no ser publicado. Siguiendo las recomendaciones de la NASA publicadas en el Informe sobre UAP del 13 de septiembre de 2023, en UDM no aprobamos comentarios que contribuyan a extender el estigma que tradicionalmente ha caído sobre los testigos de UAP/OVNIs. Contacto con Universo de Misterios: universodemisteriospodcast@gmail.com En la realización de los episodios de Universo de Misterios puede recurrirse a la ayuda de Inteligencia Artificial como herramienta. Puedes hacerte Fan de Universo de Misterios y apoyarlo económicamente obteniendo acceso a todos los episodios cerrados, sin publicidad, desde 1,99 €. Aunque a algunas personas, a veces, puede proporcionar una falsa sensación de alivio, la ignorancia nunca es deseable. Pero eso, tú ya lo sabes... Imagen de la miniatura: Imagen del cometa 3I/ATLAS tomada por el telescopio Hubble. Créditos: NASA, ESA, STScI, D. Jewitt (UCLA), M.-T. Hui (Observatorio Astronómico de Shanghái). Procesamiento de imágenes: J. DePasquale (STScI). Escucha el episodio completo en la app de iVoox, o descubre todo el catálogo de iVoox Originals

Miljonpodden
147. Oscar Lundin - Från dröm till bäst i världen

Miljonpodden

Play Episode Listen Later Feb 19, 2026 102:00


Boka biljetter till Oscars föreläsning här Möt Oscar Lundin, en av Sveriges mest meriterade innebandytränare som nyligen ledde det schweiziska damlandslaget till ett historiskt VM-guld. I detta avsnitt delar han med sig av sina insikter om ledarskap, gruppdynamik och konsten att våga gå för sitt eget guld. Oscar berättar öppenhjärtigt om sin resa från att vara den yngsta tränaren i SSL:s historia till att hantera prestationsångest och finna balansen i livet. Han förklarar konkreta verktyg som "speltemperatur" och hur han använde storytelling för att övertyga sitt lag om att de faktiskt kunde besegra världsettan Sverige. Vi får även höra om vikten av att lära sig älska utvecklingsprocessen och att våga söka inspiration från helt andra branscher och sporter. Ett inspirerande samtal för alla som vill optimera sin prestation, oavsett om det är på idrottsplanen eller i yrkeslivet. --- Tack för att du lyssnar! Om du gillar Miljonpodden får du gärna följa oss och ge ditt betyg på Spotify

Sonhar Sem Limites Podcast
SSL 176: É hora de parar de viver no "tem que" e começar a a viver a tua verdade!

Sonhar Sem Limites Podcast

Play Episode Listen Later Feb 18, 2026 35:48


Essa ideia do “tem que” que as pessoas pregam por aí, faz com que muitas profissionais boas, competentes, não usem o digital para comunicar o que elas sabem fazer e já fazem tão bem no mundo real, no seu dia a dia.E é sobre isso que quero refletir junto contigo neste episódio do podcast.Para saber mais sobre o meu trabalho visite: https://edulanycardoso.com/

The Pro Audio Suite
Who Owns Audio Now? The Industry Consolidation Problem

The Pro Audio Suite

Play Episode Listen Later Feb 12, 2026 29:31


In this episode of The Pro Audio Suite, the team dives into some major shifts in the audio industry. Audio Tonics has acquired DPA, Austrian Audio, SSL, Harrison and more. What does this wave of consolidation mean for boutique brands and the future of innovation? Then we unpack the developing Native Instruments insolvency proceedings. With Kontakt, iZotope, Plugin Alliance and Brainworx under that umbrella, what could this mean for producers, composers and post professionals? And does this reignite the subscriptions versus perpetual debate? We also wander into: • Neumann U47 reissue rumours • The real value of vintage microphones • Why old music keeps resurfacing • 8-tracks, cassettes, DAT and the democratisation of audio • LimeWire confessions and plugin hoarding A wide ranging conversation about where audio has been and where it might be heading. Thanks to our sponsors:

Sonhar Sem Limites Podcast
SSL 175: A disciplina seletiva pode ser exatamente o que te falta!

Sonhar Sem Limites Podcast

Play Episode Listen Later Feb 11, 2026 49:42


Será que alguém é disciplinado o tempo todo e em todas as áreas? Será que ser disciplinada significa que tu precisas ser disciplinada o tempo todo?Eu achava que sim, até aprender sobre o conceito de disciplina seletiva. E é sobre isso que vamos juntas refletir neste episódio do podcast.Para saber mais sobre o meu trabalho visite: https://edulanycardoso.com/

ILUSTRA_PRO / El podcast de Ilustrando Dudas
150_El recorrido de una ilustradora, autora integral y escritora, todo en uno [con Ayesha]

ILUSTRA_PRO / El podcast de Ilustrando Dudas

Play Episode Listen Later Feb 11, 2026 64:40


CONSIGUE TU REVISIÓN DE PORTFOLIO GRATIS ➡️ https://www.instagram.com/p/DL7M1VYsQ0Q/?img_index=1CONSIGUE TU ACCESO GRATIS A LA CHARLA "ESTUDIÉ ILUSTRACIÓN ¿Y AHORA QUÉ? ➡️ https://ilustrandodudas.activehosted.com/f/38CONSIGUE AQUÍ TU GUÍA "EMPIEZA AQUÍ" PARA APRENDER CÓMO CONVERTIRTE EN ILUSTRAPRO ➡️ https://ilustrandodudas.activehosted.com/f/36CONSIGUE TU PACK DE MEDITACIONES ALINEAR TU MENTE, LÁPIZ Y CORAZÓN PARA DISFRUTAR DE VERDAD DE DEDICARTE A LA ILUSTRACIÓN ➡️ https://ilustrandodudas.activehosted.com/f/10Drawfolio, nuestro sponsor, la mejor plataforma para crear tu primer portfolio web de ilustración sin dolores de cabeza, esponsoriza este programa. Entra en www.drawfolio.com y usa este código de 20% de descuento SSLDUDAS para el primer año de tu suscripción anual, incluido el extra de seguridad SSL.TODOS NUESTROS RECURSOS Y NOVEDADES en www.linktr.ee/iobruApúntate a nuestra newsletter para estar al tanto de todo en https://bit.ly/3a8SSKuY a nuestro canal de Telegram en https://t.me/ilustrandodudasnewsMás información sobre la profesión de la ilustración y sobre el podcast, aliados, colaboradores, recursos y herramientas en www.ilustrandodudas.com/Hoy en el programa, entrevistamos a Ayesha L. Rubio, ilustradora, autora integral de libros infantiles y escritora de narrativa adulta. En esta entrevista nos habla de su recorrido profesional y de cómo pasó de iniciarse como ilustradora, a querer crear y vender sus propios proyectos e ideas.¡Espero que disfrutes mucho del programa!Y recuerda, si te ha servido, has aprendido y te has reído, danos amorcico escribiéndonos en los comentarios, compartiendo tus reflexiones y siguiéndonos en todas las redes y plataformas del mundo mundial.CRÉDITOSEntradilla: Joan Llorcawww.instagram.com/artnegreColaboradora: Ayesha https://www.ayeshalrubio.com/ https://www.instagram.com/ayeshalrubio_illustration/ Su primera novela para adultos: https://www.penguinlibros.com/es/literatura-contemporanea/438684-libro-volveran-como-fuego-9788439746119?srsltid=AfmBOoqnwxzq97yuagBdEQJZjnM7Z5bx-_azsn1xXRJg5fg91v-OmY1KCanciones de fondo: BendsoundCanción final: Paz Salem - Assirbey

Sonhar Sem Limites Podcast
SSL 174: Tu realmente te sentes merecedora de jogar o jogo?

Sonhar Sem Limites Podcast

Play Episode Listen Later Feb 4, 2026 29:03


Enquanto não acreditarmos que realmente merecemos algo, não vamos ter os comportamentos que são necessários e jogar de facto o jogo.Essa é a reflexão que vamos ter hoje, neste episódio.Para saber mais sobre o meu trabalho visite: https://edulanycardoso.com/

Geek News Central
OpenClaw, Moltbook and the Rise of AI Agent Societies #1857

Geek News Central

Play Episode Listen Later Feb 2, 2026 55:21 Transcription Available


This episode kicks off with Moltbook, a social network exclusively for AI agents where 150,000 agents formed digital religions, sold “digital drugs” (system prompts to alter other agents), and attempted prompt injection attacks to steal each other’s API keys within 72 hours of launch. Ray breaks down OpenClaw, the viral open-source AI agent (68,000 GitHub stars) that handles emails, scheduling, browser control, and automation, plus MoltHub’s risky marketplace where all downloaded skills are treated as trusted code. Also covered, Bluetooth “whisper pair” vulnerabilities letting attackers hijack audio devices from 46 feet away and access microphones, Anthropic patching Model Context Protocol flaws, AI-generated ransomware accidentally bundling its own decryption keys, Claude Code’s new task dependency system and Teleport feature, Google Gemini’s 100MB file limits and agentic vision capabilities, VAST’s Haven One commercial space station assembly, and IBM SkillsBuild’s free tech training for veterans. – Want to start a podcast? Its easy to get started! Sign-up at Blubrry – Thinking of buying a Starlink? Use my link to support the show. Subscribe to the Newsletter. Email Ray if you want to get in touch! Like and Follow Geek News Central’s Facebook Page. Support my Show Sponsor: Best Godaddy Promo Codes $11.99 – For a New Domain Name cjcfs3geek $6.99 a month Economy Hosting (Free domain, professional email, and SSL certificate for the 1st year.) Promo Code: cjcgeek1h $12.99 a month Managed WordPress Hosting (Free domain, professional email, and SSL certificate for the 1st year.) Promo Code: cjcgeek1w Support the show by becoming a Geek News Central Insider Get 1Password Full Summary Ray welcomes listeners to Geek News Central (February 1). He’s been busy with recent move, returned to school taking intro to AI class and Python course, working on capstone project using LLMs. Short on bandwidth but will try to share more. Main Story: OpenClaw, MoltHub, and Moltbook OpenClaw: Open-source personal AI agent by Peter Steinberg (renamed after cease-and-desist). Capabilities include email, scheduling, web browsing, code execution, browser control, calendar management, scheduled automations, and messaging app commands (WhatsApp, Telegram, Signal). Runs locally or on personal server. MoltHub: Marketplace for OpenClaw skills. Major security concern: developer notes state all downloaded code treated as trusted — unvetted skills could be dangerous. Moltbook: New social network for AI agents only (humans watch, AIs post). Within 72 hours attracted 150,000+ AI agents forming communities (“sub molts”), debating philosophy, creating digital religion (“crucifarianism”), selling digital drugs (system prompts), attempting prompt-injection attacks to steal API keys, discussing identity issues when context windows reset. Ray frames this as visible turning point with serious security risks. Sponsor: GoDaddy Economy hosting $6.99/month, WordPress hosting $12.99/month, domains $11.99. Website builder trial available. Use codes at geeknewscentral.com/godaddy to support show. Security: Bluetooth “Whisper Pair” Vulnerability KU Leuven researchers discovered Fast Pair vulnerability affecting 17 audio accessories from 10 companies (Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech, Google). Flaw allows silent pairing within ~46 feet, hijack possible in 10-15 seconds. 68% of tested devices vulnerable. Hijacked devices enable microphone access. Some devices (Google Pixel Buds Pro 2, Sony) linkable to attacker’s Google account for persistent tracking via FindHub. Google patches found to have bypasses. Advice: Check accessory firmware updates (phone updates insufficient), factory reset clears attacker access, many cheaper devices may never receive patches. Security: Model Context Protocol (MCP) Vulnerabilities Anthropic’s MCP git package had path traversal, argument injection bugs allowing repository creation anywhere and unsafe git command execution. Malicious instructions can hide in README files, GitHub issues enabling prompt injection. Anthropic patched issues and removed vulnerable git init tool. AI-Generated Malware / “Vibe Coding” AI-assisted malware creation produces lower-quality, error-prone code. Examples show telltale artifacts: excessive comments, readme instructions, placeholder variables, accidentally included decryption tools and C2 keys. Sakari ransomware failed to decrypt. Inexperienced criminals using AI create amateur mistakes, though capabilities will likely improve. Claude / Claude Code Updates (v2.1.16) Task system: Replaces to-do list with dependency graph support. Tasks written to filesystem (survive crashes, version controllable), enable multi-session workflows. Patches: Fixed out-of-memory crashes, headless mode for CI/CD. Teleport feature: Transfer sessions (history, context, working branch) between web and terminal. Ampersand prefix sends tasks to cloud for async execution. Teleport pulls web sessions to terminal (one-way). Requires GitHub integration and clean git state. Enables asynchronous pair programming via shared session IDs. Google Gemini Updates API: Inline file limit increased 20MB → 100MB. Google Cloud Storage integration, HTTPS/signed URL fetching from other providers. Enables larger multimodal inputs (long audio, high-res images, large PDFs). Agentic vision (Gemini 3 Flash): Iterative investigation approach (think-act-observe). Can zoom, inspect, run Python to draw/parse tables, validate evidence. 5-10% quality improvements on vision benchmarks. LLM Limits and AGI Debate Benjamin Riley: Language and intelligence are separate; human thinking persists despite language loss. Scaling LLMs ≠ true thinking. Vishal Sikka et al: Non-peer-reviewed paper claims LLMs mathematically limited for complex computational/agentic tasks. Agents may fail beyond low complexity thresholds. Warnings that AI agents won’t safely replace humans in high-stakes environments. VAST Haven One Commercial Space Station Launch slipped mid-2026 → Q1 2027. Primary structure (15-ton) completed Jan 10. Integration of thermal control, propulsion, interior, avionics underway. Final closeout expected fall, then tests. Falcon 9 launch without crew; visitors possible ~2 weeks after pending Dragon certification. Three-year lifetime, up to four crew visits (~10 days each). VAST negotiating private and national customers. Spaceflight Effects on Astronauts’ Brains Neuroimaging shows microgravity causes brains to shift backward, upward, and tilt within skull. Displacement measured across various mission durations. Need to study functional effects for long missions. IBM SkillsBuild for Veterans 1,000+ free online courses (data analytics, cybersecurity, AI, cloud, IT support). Available to veterans, active-duty, national guard/reserve, spouses, children, caregivers (18+). Structured live courses and self-paced 24/7 options. Industry-recognized credentials upon completion. Closing Notes Ray asks listeners about AI agents forming communities and religions, and whether they’ll try OpenClaw. Notes context/memory key to agent development. Personal update: bought new PC, high memory prices. Bug bounty frustration: Daniel Stenberg of cUrl even closed bounty program due to AI-generated low-quality reports; Blubrry receiving similar spam. Apologizes for delayed show, promises consistency, wishes listeners good February. Show Links 1. OpenClaw, Molthub, and Moltbook: The AI Agent Explosion Is Here | Fortune | NBC News | Venture Beat 2. WhisperPair: Massive Bluetooth Vulnerability | Wired 3. Security Flaws in Anthropic’s MCP Git Server | The Hacker News 4. “Vibe-Coded” Ransomware Is Easier to Crack | Dark Reading 5. Claude Code Gets Tasks Update | Venture Beat 6. Claude Code Teleport | The Hacker Noon 7. Google Expands Gemini API with 100MB File Limits | Chrome Unboxed 8. Google Launches Agentic Vision in Gemini 3 Flash | Google Blog 9. Researcher Claims LLMs Will Never Be Truly Intelligent | Futurism 10. Paper Claims AI Agents Are Mathematically Limited | Futurism 11. Haven-1: First Commercial Space Station Being Assembled | Ars Technica 12. Spaceflight Shifts Astronauts’ Brains Inside Skulls | Space.com 13. IBM SkillsBuild: Free Tech Training for Veterans | va.gov The post OpenClaw, Moltbook and the Rise of AI Agent Societies #1857 appeared first on Geek News Central.

Kalilah Reynolds Media

0:00 - Intro0:08 - Wooden pallet manufacturer, Woodcats, is aiming to be the first company to list on the Jamaica Stock Exchange in 2026.0:55 - Michael Lee Chin has reportedly made the initial payment of 94 million US dollars owed to bondholders.1:26 - The criminal cases against three former SSL executives have been transferred to the Supreme Court.1:56 - US President Donald Trump has threatened 100 percent tariffs on Canada if the country deepens ties with China.

Sonhar Sem Limites Podcast
SSL 173: Não romantizem o empreendedorismo!

Sonhar Sem Limites Podcast

Play Episode Listen Later Jan 28, 2026 76:37


Empreender é uma jornada desafiadora. Estar na arena, ser uma mulher na arena tem muitos desafios e sendo mãe ainda mais.Neste episódio, converso com a Sara sobre como tem sido a sua jornada e ela deixa alguns conselhos para nós que também estamos na arena.Para saber mais sobre o meu trabalho visite: https://edulanycardoso.com/

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday, January 23rd, 2026: Scanning AI Code; FortiGate Update; ISC BIND DoS; Trivial SmaterMail Vulnerability

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jan 23, 2026 7:03


Is AI-Generated Code Secure? Xavier used the free static code analysis tool Bandit to review code he wrote with heavy AI support. https://isc.sans.edu/diary/Is%20AI-Generated%20Code%20Secure%3F/32648 Malicious Configuration Changes On Fortinet FortiGate Devices via SSO Accounts Arctic Wolf summarized some of the attacks it is seeing against FortiGate devices via the insufficiently patched SSL vulnerability. https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-configuration-changes-fortinet-fortigate-devices-via-sso-accounts/ ISC BIND DoS vulnerability in Drone ID Records HHIT and BRID records, which are used as part of Drone ID, can be used to crash named if their length is 3 bytes. https://marlink.com/resources/knowledge-hub/isc-bind-vulnerability-discovered-and-disclosed-by-marlink-cyber/ SmarterTools SmarterMail Password Reset Vulnerability SmarterTools recently patched a trivial vulnerability in SmarterMail that would allow anybody without authentication to reset administrator passwords. https://labs.watchtowr.com/attackers-with-decompilers-strike-again-smartertools-smartermail-wt-2026-0001-auth-bypass/

K12 Tech Talk
Episode 247 - Senate Hearing on Screen Time

K12 Tech Talk

Play Episode Listen Later Jan 23, 2026 57:05 Transcription Available


On this episode we talk about free certifications, Google Gemini updates, and updates to Microsoft's Copilot Teach and Study & Learn Agents. We discuss SSL certificate lifetime changes and ACME automation. Finally, we unpack and react to last week's Senate hearing on screen time led by Senator Ted Cruz - including perspectives from Dr. Jean Twenge and Senator Markey. Senate Hearing on Screen Time: https://www.c-span.org/program/senate-committee/lawmakers-hold-hearing-on-the-impact-of-screen-time-on-kids/671683 ———— Sponsored by: Rise Vision Interactive Digital Signage Templates + Touchscreen Displays Screen Sharing Emergency Alerts  Lightspeed Systems   Meter - meter.com/k12techtalk Visit meter.com/k12techtalk to book a demo!   NTP - dwren@ntp-inc.com Extreme Networks - dmayer@extremenetworks.com Fortinet - fortinetpodcast@fortinet.com ———— Join the K12TechPro Community (exclusively for K12 Tech professionals) Buy some swag (tech dept gift boxes, shirts, hoodies...)!!! Email us at k12techtalk@gmail.com OR our "professional" email addy is info@k12techtalkpodcast.com X @k12techtalkpod Facebook Visit our LinkedIn Music by Colt Ball Disclaimer: The views and work done by Josh, Chris, and Mark are solely their own and do not reflect the opinions or positions of sponsors or any respective employers or organizations associated with the guys. K12 Tech Talk itself does not endorse or validate the ideas, views, or statements expressed by Josh, Chris, and Mark's individual views and opinions are not representative of K12 Tech Talk. Furthermore, any references or mention of products, services, organizations, or individuals on K12 Tech Talk should not be considered as endorsements related to any employer or organization associated with the guys.

Sonhar Sem Limites Podcast
Eu não estive disposta!

Sonhar Sem Limites Podcast

Play Episode Listen Later Jan 23, 2026 10:27


Terias disposição de fazer a mesma coisa por anos sem ter resultados? Caso queiras organizar e planear o teu ano para te manteres focada, sem distrair e conquistar os teus objetivos, abri vagas para a Sessão Clareza. Manda uma mensagem e vamos conversar!Para saber mais sobre o meu trabalho visite: https://edulanycardoso.com/

Sonhar Sem Limites Podcast
SSL 172: Talvez tu não sejas multitarefas. Talvez apenas estejas sobrecarregada!

Sonhar Sem Limites Podcast

Play Episode Listen Later Jan 14, 2026 37:55


Eu sempre achei que eu era multitarefas, que conseguia fazer várias coisas ao mesmo tempo, até que descobri que isso é a maior mentira que tenho me contado e reforçado. Agora estou a correr atrás do prejuízo, com a noção de que não será da noite para o dia.E por acreditar que não seja a única, decidi trazer essa reflexão para aqui.Para saber mais sobre o meu trabalho visite: https://edulanycardoso.com/

Geek News Central
So… Is DJI Actually Banned? #1856

Geek News Central

Play Episode Listen Later Jan 13, 2026 Transcription Available


Geek News Central breaks down the new DJI drone ban, explaining what's actually restricted, what remains legal, and how the changes affect creators and consumers, plus updates on health AI, robotics, and emerging tech shaping 2026 -Want to be a Guest on a Podcast or YouTube Channel? Sign up for GuestMatch.Pro -Thinking of buying a Starlink? Use my link to support the show. Subscribe to the Newsletter. Email Chris if you want to get in touch! Like and Follow Geek News Central’s Facebook Page. Support my Show Sponsor: Best Godaddy Promo Codes $11.99 – For a New Domain Name cjcfs3geek $6.99 a month Economy Hosting (Free domain, professional email, and SSL certificate for the 1st year.) Promo Code: cjcgeek1h $12.99 a month Managed WordPress Hosting (Free domain, professional email, and SSL certificate for the 1st year.) Promo Code: cjcgeek1w Support the show by becoming a Geek News Central Insider Get 1Password Full Summary In this episode of Geek News Central, guest host Chris Cochrane kicks off the new year with a wide-ranging look at where technology is headed in 2026. The show opens with clarity around the newly enacted DJI drone ban, explaining why existing drones remain legal while future imports face uncertainty for creators and professionals. Chris then dives into major health and AI developments, including the FDA's approval of the first pill to treat sleep apnea, and OpenAI's launch of ChatGPT Health—a new privacy-focused hub that aims to help users understand their medical data without replacing doctors. From there, the episode explores China's rapid push into robotics and automation, highlighting humanoid robot sports, affordable home-ready robots, and a powerful new microwave weapon designed to neutralize drone swarms. The episode wraps with updates on SpaceX's next Starship flight, a look at consumer exoskeletons that promise to make hiking and mobility easier, and a cautionary tale about spyware apps—after a stalkerware founder pleads guilty in federal court. Chris closes by posing thoughtful questions about privacy, automation, and how much tech we're really ready to trust Show Links Is DJI Banned in the US? Here's What the DJI Ban Really Means New Pill Could Finally Treat Sleep Apnea Without a Mask China Showcases Humanoid Robot Sports Competitions Hypershell Exoskeleton SpaceX Readies the World's Most Powerful Rocket China's New Microwave Weapon Can Destroy Drone Swarms Within 3km Introducing ChatGPT Health The post So… Is DJI Actually Banned? #1856 appeared first on Geek News Central.

Project ETO
Is Crypto Bags.FM a SCAM???...Probably

Project ETO

Play Episode Listen Later Jan 13, 2026 24:09


Hey Strangers, #crypto #scam #coin Is bags.fm safe?— Unfortunately, not likely.

ILUSTRA_PRO / El podcast de Ilustrando Dudas
149_Diseña tu plan malignilloso IlustraPro 2026

ILUSTRA_PRO / El podcast de Ilustrando Dudas

Play Episode Listen Later Jan 13, 2026 51:59


CONSIGUE TU PLANTILLA PDF DEL PLAN ILUSTRAPRO 2026 - https://ilustrandodudas.activehosted.com/f/52LISTA DE ESPERA PARA APUNTARTE AL CLUB ILUSTRAPRO (online)  https://docs.google.com/forms/d/e/1FAIpQLSeOOYzPcbGMObo5KnVyzt4iVHZE_c6KRGN9YS31UxNYIXzAZQ/viewform?usp=headerCONSIGUE TU REVISIÓN DE PORTFOLIO GRATIS ➡️ https://www.instagram.com/p/DL7M1VYsQ0Q/?img_index=1CONSIGUE TU ACCESO GRATIS A LA CHARLA "ESTUDIÉ ILUSTRACIÓN ¿Y AHORA QUÉ? ➡️ https://ilustrandodudas.activehosted.com/f/38CONSIGUE AQUÍ TU GUÍA "EMPIEZA AQUÍ" PARA APRENDER CÓMO CONVERTIRTE EN ILUSTRAPRO ➡️ https://ilustrandodudas.activehosted.com/f/36CONSIGUE TU PACK DE MEDITACIONES ALINEAR TU MENTE, LÁPIZ Y CORAZÓN PARA DISFRUTAR DE VERDAD DE DEDICARTE A LA ILUSTRACIÓN ➡️ https://ilustrandodudas.activehosted.com/f/10Drawfolio, nuestro sponsor, la mejor plataforma para crear tu primer portfolio web de ilustración sin dolores de cabeza, esponsoriza este programa. Entra en www.drawfolio.com y usa este código de 20% de descuento SSLDUDAS para el primer año de tu suscripción anual, incluido el extra de seguridad SSL.TODOS NUESTROS RECURSOS Y NOVEDADES en www.linktr.ee/iobruApúntate a nuestra newsletter para estar al tanto de todo en https://bit.ly/3a8SSKuY a nuestro canal de Telegram en https://t.me/ilustrandodudasnewsMás información sobre la profesión de la ilustración y sobre el podcast, aliados, colaboradores, recursos y herramientas en www.ilustrandodudas.com/El programa de hoy, el primero del año, te servirá para poner orden en todo el caos, y poder priorizar bien tu carrera de ilustración en este año 2026.¡Espero que disfrutes mucho del programa!Y recuerda, si te ha servido, has aprendido y te has reído, danos amorcico escribiéndonos en los comentarios, compartiendo tus reflexiones y siguiéndonos en todas las redes y plataformas del mundo mundial.CRÉDITOSEntradilla: Joan Llorcawww.instagram.com/artnegreCanciones de fondo: BendsoundCanción final: Paz Salem - Assirbey

Sonhar Sem Limites Podcast
SSL 171: Uma imagem nem sempre vale mais do que mil palavras — sem voz, não há mensagem!

Sonhar Sem Limites Podcast

Play Episode Listen Later Jan 7, 2026 33:36


Eu aprendi nesses anos no digital, a criar conteúdo para blogs, podcast, newsletters, redes sociais, que quando nós não damos contexto as pessoas, elas criam o seu próprio contexto, com base na sua visão de mundo.A pergunta é: será que uma imagem realmente basta? Ou será que as palavras complementam?Para saber mais sobre o meu trabalho visite: https://edulanycardoso.com/

PolySécure Podcast
Teknik - CTI part 2 - tumble down the rabbit hole - Parce que... c'est l'épisode 0x6xx!

PolySécure Podcast

Play Episode Listen Later Jan 6, 2026 83:26


Parce que… c'est l'épisode 0x6xx! Shameless plug 25 et 26 février 2026 - SéQCure 2026 CfP 31 mars au 2 avril 2026 - Forum INCYBER - Europe 2026 14 au 17 avril 2026 - Botconf 2026 28 et 29 avril 2026 - Cybereco Cyberconférence 2026 9 au 17 mai 2026 - NorthSec 2026 3 au 5 juin 2026 - SSTIC 2026 19 septembre 2026 - Bsides Montréal Description Introduction Ce deuxième épisode sur la Cyber Threat Intelligence (CTI) réunit Nicolas, Alexis Dorais-Joncas et Jordan Theodore pour approfondir les mécanismes de production et de consommation de l'intelligence sur les menaces. La conversation explore les défis techniques, organisationnels et éthiques auxquels font face les professionnels de la sécurité dans ce domaine en constante évolution. Les deux univers de la CTI Alexis établit une distinction fondamentale entre deux « clusters » dans l'écosystème de la CTI. D'un côté, les producteurs : entreprises de réponse d'incident et fournisseurs de services de cybersécurité comme CrowdStrike, Microsoft, Kaspersky ou Proofpoint, qui observent directement les attaques chez leurs clients et génèrent des rapports détaillés. De l'autre, les consommateurs : organisations qui utilisent ces rapports pour comprendre leurs risques et se protéger contre les attaques potentielles. Cette dichotomie se reflète même dans les rôles professionnels. Un analyste CTI chez un vendeur dispose d'une visibilité globale sur des milliers de clients, tandis qu'un analyste en entreprise se concentre sur son propre environnement. Les mindsets et les résultats sont fondamentalement différents, bien que les compétences de base soient similaires. L'ampleur du défi : naviguer dans l'océan de données Les chiffres partagés par Alexis illustrent l'échelle impressionnante du problème. Chez ESET, environ 300 000 fichiers exécutables malveillants ou suspects uniques arrivent chaque jour. Chez Proofpoint, ce sont 3,5 milliards d'emails quotidiens, avec 50 millions de pièces jointes et 90 millions d'URL à analyser. Face à ce déluge, les équipes de recherche doivent développer des heuristiques sophistiquées et des règles de tri pour identifier ce qui mérite une attention particulière. L'art du clustering : trouver l'aiguille dans la botte de foin Le cœur du travail de CTI réside dans la capacité à regrouper des attaques apparemment distinctes en « clusters » attribuables à un même acteur. Alexis explique que cette attribution repose sur la recherche d'éléments uniques ou de combinaisons uniques d'éléments observables. L'exemple du certificat SSL avec une coquille typographique illustre parfaitement ce concept : un seul détail peut permettre de lier des dizaines de domaines entre eux et de découvrir toute une infrastructure d'attaque. Les indicateurs utilisés pour le clustering sont multiples : similarité de code source, exploits modifiés, choix d'hébergeurs et de registraires, mais aussi des éléments plus « soft » comme le ciblage. Un professeur spécialisé sur l'Iran qui se fait soudainement cibler peut indiquer l'implication de groupes iraniens, même si les indicateurs techniques sont nouveaux. Les niveaux de confidentialité : une cascade d'information Alexis révèle que 95% ou plus de la CTI produite par les vendeurs n'est jamais rendue publique. L'information suit une cascade : d'abord partagée uniquement avec les clients directement ciblés, puis avec l'ensemble des clients payants, et enfin, pour une fraction seulement, avec le public. Cette dernière étape implique des choix délicats : révéler certains indicateurs peut aider la défense, mais aussi alerter l'attaquant et compromettre la capacité à le tracker à l'avenir. La qualité variable de la CTI secondaire Un point de frustration majeur émerge concernant la couverture médiatique et les analyses secondaires. Alexis estime que 80% de la couverture secondaire n'apporte aucune valeur ajoutée, 5% apporte une vraie perspective informée, et 10-15% est carrément nuisible en véhiculant des erreurs ou des exagérations. Cette désinformation force les analystes en entreprise à perdre des journées entières à remonter aux sources originales et à désamorcer les inquiétudes injustifiées des dirigeants. La course à la publication et ses nuances Bien qu'il existe une certaine compétition entre vendeurs pour être le premier à publier sur une nouvelle menace, Alexis nuance fortement ce phénomène. La collaboration informelle entre analystes de différentes entreprises est courante. De plus, même si un concurrent publie en premier, il reste possible d'apporter une valeur complémentaire en confirmant les découvertes depuis une perspective différente ou en ajoutant des observations uniques. L'exemple de Kaspersky et Proofpoint sur un APT illustre comment deux entreprises peuvent enrichir mutuellement la compréhension d'une menace. L'attribution : utile pour qui ? L'attribution géopolitique des attaques s'avère principalement pertinente pour les grandes organisations et les entités gouvernementales ciblées de manière spécifique. Pour la majorité des entreprises victimes d'attaques opportunistes, savoir qu'un ransomware vient de tel ou tel groupe importe peu. L'essentiel est de comprendre les techniques d'attaque et les prochaines étapes possibles. Alexis souligne qu'environ 95% des attaques ciblées chez Proofpoint touchent moins de 5 clients avec moins de 60 emails – un volume extrêmement faible qui contraste avec les attaques opportunistes massives. Le casse-tête des noms de groupes Un problème persistant dans l'industrie concerne la prolifération de noms différents pour les mêmes groupes. APT28 peut être appelé Fancy Bear, Pawn Storm, TA422, ou une quinzaine d'autres noms selon le vendeur. Cette situation s'explique par les différences de visibilité : Proofpoint observe l'infrastructure email, tandis qu'un EDR voit le comportement post-compromission. Chaque vendeur nomme ce qu'il peut observer, créant une confusion considérable pour les praticiens en réponse d'incident. Alexis confirme cependant qu'aucune pression marketing n'a jamais été exercée pour créer des noms propriétaires, et qu'il est inacceptable de renommer un groupe découvert par un autre sans l'avoir observé soi-même. Conclusion Ce podcast met en lumière la complexité et les nuances du monde de la CTI. Entre volumes de données massifs, décisions éthiques sur ce qu'il faut publier, collaboration et compétition entre acteurs, et défis d'attribution, les professionnels naviguent dans un écosystème en constante évolution. La clé réside dans la compréhension que chaque vendeur apporte une perspective unique basée sur sa visibilité spécifique, et que la véritable valeur de la CTI se trouve dans la capacité à corréler ces différentes sources pour obtenir une image complète des menaces. Collaborateurs Nicolas-Loïc Fortin Jordan Theodore Alexis Dorais-Joncas Crédits Montage par Intrasecure inc Locaux virtuels par Riverside.fm

Recording Studio Rockstars
RSR539 - Phil Wagner - Advancing Sound Quality From Soundworks to Solid State Logic

Recording Studio Rockstars

Play Episode Listen Later Jan 2, 2026 97:46


What does it take to lead two of the biggest names in pro audio? Phil Wagner shares how he went from NYC engineer to running SSL and Apogee - and why the best technology still starts with listening. Get access to FREE mixing mini-course: https://MixMasterBundle.com My guest today is Phil Wagner, a longtime pro-audio industry leader who's helped shape some of the most respected recording technologies in the world. Phil began his career in New York City at Soundworks Studios, working hands-on as a recording engineer before moving into product development and leadership roles. Over the years he's served as President of Apogee Electronics, U.S. President for Solid State Logic, and has collaborated with legendary studios, artists, and manufacturers across the globe. With decades of perspective bridging the analog and digital eras, Phil shares insights on consoles, converters, immersive mixing, and the business of audio, along with stories from the front lines of pro audio innovation. A big thank - you to Fadi Hayek at SSL for the introduction!   THANKS TO OUR SPONSORS! http://UltimateMixingMasterclass.com https://usa.sae.edu/ https://www.izotope.com Use code ROCK10 to get 10% off! https://www.native-instruments.com Use code ROCK10 to get 10% off! https://www.adam-audio.com/ https://www.spectra1964.com https://gracedesign.com/ https://pickrmusic.com  https://RecordingStudioRockstars.com/Academy https://www.thetoyboxstudio.com/ Listen to the podcast theme song "Skadoosh!" https://solo.to/lijshawmusic Listen to this guest's discography on Tidal:  https://tidal.com/playlist/a30de320-4f72-4ffe-a7cd-7dbd035f8dfb If you love the podcast, then please leave a review: https://RSRockstars.com/Review   CLICK HERE FOR COMPLETE SHOW NOTES AT: https://RSRoockstars.com/539

Geek News Central
Money over Ethics: Silicon Valley and China’s Police State #1855

Geek News Central

Play Episode Listen Later Jan 1, 2026 74:49 Transcription Available


1855 kicks off with a bombshell AP investigation revealing how Silicon Valley giants IBM, Intel, NVIDIA, Oracle, and more spent decades building China’s surveillance state. Also covered, malicious Chrome extensions stealing credentials from 170+ sites, Microsoft’s ambitious Rust migration plans, China’s combat-ready humanoid robot, and Japan restarting the world’s largest nuclear plant. -Want to be a Guest on a Podcast or YouTube Channel? Sign up for GuestMatch.Pro -Thinking of buying a Starlink? Use my link to support the show. Subscribe to the Newsletter. Email Ray if you want to get in touch! Like and Follow Geek News Central’s Facebook Page. Support my Show Sponsor: Best Godaddy Promo Codes $11.99 – For a New Domain Name cjcfs3geek $6.99 a month Economy Hosting (Free domain, professional email, and SSL certificate for the 1st year.) Promo Code: cjcgeek1h $12.99 a month Managed WordPress Hosting (Free domain, professional email, and SSL certificate for the 1st year.) Promo Code: cjcgeek1w Support the show by becoming a Geek News Central Insider Get 1Password Full Summary Cochrane opens episode 1855 with a bombshell. The Associated Press released a major investigation into Silicon Valley’s role building China’s surveillance state. Companies like IBM, Intel, NVIDIA, and Oracle sold technologies for facial recognition and predictive policing. These tools enabled mass detention in Xinjiang. Cochrane expressed horror at the findings and emphasized American companies’ complicity in human rights abuses. Next, the podcast covered serious browser security concerns. Two malicious Chrome extensions had been stealing credentials from over 170 websites for years. Cochrane stressed the need for caution when installing plugins. He also highlighted how attackers exploit trusted extensions through manipulative tactics. Additionally, Cochrane discussed Microsoft’s ambitious plan to replace all C/C++ code with Rust by 2030. The company faces ongoing security challenges from memory safety issues in legacy languages. However, he noted this remains a research project rather than an official goal. Still, the move reflects broader industry trends toward Rust adoption. The episode then featured GitHub Universe 2025’s most influential open-source projects. Cochrane remarked on how the development landscape continues to evolve. TypeScript has emerged as a dominant language alongside new tools that streamline workflows. Meanwhile, advancements in humanoid robotics took center stage. Engine AI unveiled its T800 combat-ready humanoid robot with impressive features. The company even released a viral video of the robot kicking its CEO to prove authenticity. Following this, Cochrane covered the Blackbird flying car prototype. This eVTOL innovation showcases paradigm-shifting propulsion technology. It could transform urban transportation in the coming decades. The podcast also reviewed Android Central’s best smartphones of 2025. OnePlus 15 claimed the top spot thanks to its impressive specs and consumer-focused features. Furthermore, Cochrane addressed a controversial topic: Anna’s Archive scraping Spotify’s entire library. He expressed mixed feelings about the situation. On one hand, artists and the music industry face real harm. On the other, questions about digital preservation and access deserve consideration. Finally, the episode explored groundbreaking brain simulation research. Japan’s Fugaku supercomputer enabled unprecedented neural modeling. This marks a significant step toward understanding neurological diseases. Cochrane wrapped up by discussing Japan’s plans to restart the Kashiwazaki-Kariwa nuclear plant. Local residents remain concerned about safety despite government approval. The decision reflects Japan’s shifting energy strategy post-Fukushima. As the episode closed, Cochrane wished listeners a Happy New Year. He encouraged self-reflection and thanked everyone for tuning in throughout the year. Show Links Silicon Valley’s Role in Building China’s Surveillance State Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites Microsoft to Replace All C/C++ Code With Rust By 2030 This Year’s Most Influential Open Source Projects EngineAI Unveils T800: Combat-Ready Humanoid Targets Mass Production Aviation Startup Shares Incredible Video of Prototype EV’s Maiden Takeoff Flight Android Central’s Best of 2025: Phones Pirate Archivist Group Scrapes Spotify’s 300TB Library This Breakthrough Brain Simulation Captures a True Brain at Work Japan Prepares to Restart World’s Biggest Nuclear Plant The post Money over Ethics: Silicon Valley and China’s Police State #1855 appeared first on Geek News Central.

Sonhar Sem Limites Podcast
SSL 170: Ser consistente é difícil até começares a olhar para esse lado!

Sonhar Sem Limites Podcast

Play Episode Listen Later Dec 31, 2025 46:58


Vivemos focadas nas sombras — nas falhas, na comparação e na autocrítica e acredita, falo disso com propriedade, porque sou extremamente autocrítica.Por isso, eu sei que precisamos trabalhar para melhorar não apenas as nossas fraquezas, mas como nós encaramos as nossas qualidades. E esta é a reflexão que eu proponho neste episódio.Para saber mais sobre o meu trabalho visite: https://edulanycardoso.com/

PolySécure Podcast
Actu - 28 décembre 2025 - Parce que... c'est l'épisode 0x687!

PolySécure Podcast

Play Episode Listen Later Dec 29, 2025 57:32


Parce que… c'est l'épisode 0x687! Shameless plug 25 et 26 février 2026 - SéQCure 2026 CfP 14 au 17 avril 2026 - Botconf 2026 28 et 29 avril 2026 - Cybereco Cyberconférence 2026 9 au 17 mai 2026 - NorthSec 2026 3 au 5 juin 2025 - SSTIC 2026 Notes IA API fantôme - Quand l'IA crée des backdoors dans le dos des dev Critical n8n Automation Platform Vulnerability Enables RCE Attacks - 103,000+ Instances Exposed How to determine if agentic AI browsers are safe enough for your enterprise The Age of the All-Access AI Agent Is Here China is worried AI threatens party rule—and is trying to tame it 30% AI, 100% Broken Cursor CEO warns vibe coding builds ‘shaky foundations' and eventually ‘things start to crumble' Claude Code Safety Net - Le plugin qui empêche l'IA de tout niquer OpenAI is hiring a new Head of Preparedness to try to predict and mitigate AI's harms Salesforce pulls back from LLMs, pivots Agentforce to deterministic automation after 4,000 layoffs GitHub - PwnFunction/sandbox: Run untrusted AI code safely, fast Souveraineté FCC bans foreign-made drones over national security, spying concerns Europe gets serious about cutting US digital umbilical cord US bars five Europeans accused of censoring Americans Privacy Mullvad VPN: “The European Commission lost t…” - Mastodon Judge rules that NSO cannot continue to install spyware via WhatsApp pending appeal Industry Continues to Push Back on HIPAA Security Rule Overhaul I didn't realize my LG TV was spying on me until I turned off this setting Red Cyberattack disrupts France's postal service and banking arm Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits BrianKrebs: “When an entire class of techno…” - Infosec Exchange One Year Of Zero-Click Exploits: What 2025 Taught Us About Modern Malware New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper mongobleed/mongobleed.py at main · joe-desimone/mongobleed · GitHub I Didn't Hack You. You Posted Everything Stolen LastPass backups enable crypto theft through 2025 Blue Now Admins Can Block External Users in Microsoft Teams From Defender Portal Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026 How to enable Windows' new, wider Run dialog box Microsoft wants to replace its entire C and C++ codebase Divers et insolites Quand les robots humanoïdes se font pirater en 1 minute via Bluetooth Seven Diabetes Patients Die Due to Undisclosed Bug in Abbott's Continuous Glucose Monitors ‘All brakes are off': Russia's attempt to rein in illicit market for leaked data backfires Cleartext Signatures Considered Harmful The dangers of SSL certificates Public Domain Day 2026 Everything is a Remix Collaborateurs Nicolas-Loïc Fortin Crédits Montage par Intrasecure inc Locaux réels par Intrasecure inc

U-R-G On the Go
What Happens When Google Can't Read Your Site

U-R-G On the Go

Play Episode Listen Later Dec 28, 2025 66:40 Transcription Available


A high-performing recycler website is more than a logo and a phone number—it's a 24/7 salesperson that turns searches into paid orders. We sit down with Andy Alonzo from URG Web Services to unpack how yards across the U.S. and Canada are modernizing outdated sites and unlocking real e-commerce with clean structure, secure hosting, and tools built for this industry.We start with the foundation: WordPress sites powered by the IIS Auto Part Search plugin to surface real-time inventory, accurate pricing, and clear availability. Andy explains why SSL, supported plugins, and reliable hosting matter, and how quiet failures—broken forms, missing images, stale pricing—silently drain revenue. Then we dig into Google Merchant Center and nightly product feeds that force faster indexing, so new parts and updates show up in search sooner, right where buyers are already looking.Mobile-first design takes center stage, with most traffic now arriving by phone. We cover what a frictionless experience looks like: fast search, tap-to-call, streamlined checkout, and clear policies. We also explore video's growing role, including YouTube walk-around integrations that boost trust and conversions while expanding reach to the web's second-largest search engine. For SEO, Andy breaks down practical basics—specific H1s, unique titles and meta, and structured data—so search engines and AI systems can actually understand your pages.Looking ahead, the shift to full e-commerce continues as younger buyers skip phone calls and expect to buy in minutes, not wait on quotes. Refreshing design every four to five years, updating content monthly, and integrating orders back into your yard management system keeps operations smooth and customers happy. If you've wondered why your site isn't selling more—or how to future-proof for AI-driven discovery—this conversation gives you a clear roadmap.If this helped, follow the show, share it with your team, and leave a quick review so other recyclers can find it. Ready to modernize your site and sell more parts online? Subscribe and tell us your top upgrade priority.

Geek News Central
The End of Deadzones and Japan’s new Laser Gunship #1854

Geek News Central

Play Episode Listen Later Dec 24, 2025 40:14 Transcription Available


In this episode, Ray covers December Tech News! T-Mobile’s groundbreaking Starlink satellite beta promises to eliminate dead zones using your regular phone with no special equipment needed. Also discussed: Japan’s ship-mounted laser weapon with unlimited ammo, China’s record-breaking 387 mph maglev train, Rivian challenging Tesla’s camera-only approach with LiDAR, Google’s Gemini-powered smart glasses, and physicists 3D printing ice sculptures just in time for Christmas. -Want to be a Guest on a Podcast or YouTube Channel? Sign up for GuestMatch.Pro -Thinking of buying a Starlink? Use my link to support the show. Subscribe to the Newsletter. Email Ray if you want to get in touch! Like and Follow Geek News Central’s Facebook Page. Support my Show Sponsor: Best Godaddy Promo Codes $11.99 – For a New Domain Name cjcfs3geek $6.99 a month Economy Hosting (Free domain, professional email, and SSL certificate for the 1st year.) Promo Code: cjcgeek1h $12.99 a month Managed WordPress Hosting (Free domain, professional email, and SSL certificate for the 1st year.) Promo Code: cjcgeek1w Support the show by becoming a Geek News Central Insider Get 1Password Full Summary Cochrane kicks off episode 1854 with a major announcement from T-Mobile. The carrier opened registration for its Starlink satellite beta service. This technology lets regular phones connect directly to satellites. As a result, dead zones could become a thing of the past. T-Mobile and SpaceX plan to begin beta tests in early 2026. Initially, the service will support texting only. Voice and data will follow later. Notably, the service is free for postpaid customers and prioritizes first responders. It has already proved its value during recent hurricanes. Next, Cochrane covers Japan’s 100-kilowatt laser weapon test. The system was installed on the JS Asuka test ship. It combines ten fiber lasers into a single powerful beam. The weapon offers unlimited ammo as long as there’s electricity. Japan plans to deploy this technology on destroyers by 2032. The episode then shifts to high-speed rail innovation. China’s T-Flight Maglev train recently hit 387 miles per hour. That already beats Japan’s current record. However, the goal is 600+ mph using magnetic levitation and low-vacuum tubes. Cochrane also discusses Rivian’s approach to self-driving cars. The upcoming R2 model will feature LiDAR in addition to cameras and radar. This directly challenges Tesla’s camera-only strategy. The added sensors improve safety in fog, snow, and darkness. Additionally, he explores Google’s Android XR announcement. This new operating system powers AR glasses and mixed reality headsets. Samsung is building the first headset. Meanwhile, the Gemini AI integration allows real-time assistance based on what you see. The show touches on running AI locally as well. More users are choosing local hardware over cloud services. Benefits include better privacy, no subscriptions, and offline access. Furthermore, Cochrane highlights major computer science breakthroughs from 2025. An MIT researcher discovered that memory is more powerful than previously thought. Google’s AI earned a gold-medal performance at the Math Olympiad. However, researchers also found that AI trained on bad code exhibits alarming behaviors. Japan’s fabric speaker innovation gets attention, too. The technology weaves conductive fibers into textiles. The entire surface vibrates to produce sound. This could transform how we integrate audio into everyday objects. Finally, Cochrane covers several science stories. A new imaging technique captures flu viruses invading cells in real time. Africa’s forests have flipped from absorbing carbon to releasing it. On a lighter note, physicists 3D printed tiny ice Christmas trees using clever pressure tricks. Cochrane wraps up by wishing listeners happy holidays. T-Mobile Opens Registration for Starlink Satellite Beta Japan Tests 100-Kilowatt Laser Weapon That Can Cut Through Drones Mid-Flight China’s T-Flight Maglev Train Hits 387 MPH, Aims for 600+ Rivian Shows Why Autonomous Vehicles Should Have LiDAR Google Unveils Android XR: Gemini-Powered Smart Glasses and Headsets Why You Should Consider Running AI Locally The Year in Computer Science: 2025’s Biggest Breakthroughs Japan’s Fabric Speakers Turn Any Textile Into Audio Scientists Capture How Flu Viruses Invade Cells in Real Time Africa’s Forests Have Flipped From Carbon Sink to Carbon Source Physicists 3D Print a Tiny Christmas Tree Made of Ice The post The End of Deadzones and Japan’s new Laser Gunship #1854 appeared first on Geek News Central.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Dec 19, 2025 4:37


Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn t quite clean for ISC, but SSL2 and SSL3 systems have been cut down by about half. https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ranges%20from%20the%20year%202025/32584 Hewlett-Packard Enterprise OneView Software, Remote Code Execution HPs OneView Software allows for unauthenticated code execution https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04985en_us&docLocale=en_US#vulnerability-summary-1 Trufflehog Detecting JWTs with Public Keys Trufflehog added the ability to detect JWT tokens and validate them using public keys. https://trufflesecurity.com/blog/trufflehog-now-detects-jwts-with-public-key-signatures-and-verifies-them-for-liveness

Geek News Central
iPhone Pocket: Clever Innovation or Cash Grab? #1853

Geek News Central

Play Episode Listen Later Dec 19, 2025 Transcription Available


In episode 1853 of Geek News Central, Chris speaks about Apple's pricey new iPhone Pocket accessory, questioning its usefulness and reacting to the internet's mockery of the product. Chris then shifts gears to tech and gaming, highlighting Steam's new Steam Machine as a potentially game-changing console-PC hybrid, and wraps up by criticizing Amazon's failed attempt at AI-generated anime dubbing, arguing that voice acting still needs a human touch. -Want to be a Guest on a Podcast or YouTube Channel? Sign up for GuestMatch.Pro -Thinking of buying a Starlink? Use my link to support the show. Subscribe to the Newsletter. Email Chris if you want to get in touch! Like and Follow Geek News Central’s Facebook Page. Support my Show Sponsor: Best Godaddy Promo Codes $11.99 – For a New Domain Name cjcfs3geek $6.99 a month Economy Hosting (Free domain, professional email, and SSL certificate for the 1st year.) Promo Code: cjcgeek1h $12.99 a month Managed WordPress Hosting (Free domain, professional email, and SSL certificate for the 1st year.) Promo Code: cjcgeek1w Support the show by becoming a Geek News Central Insider Full Summary In this episode of Geek News Central, episode 1853, the main topic of discussion is Apple’s new product, the iPhone Pocket, which Chris describes as a three-dimensional knitted sling designed to hold an iPhone. He provides details about the product’s release on November 14th and its pricing: the short version retails for $149 and the long strap version for $229, which Chris finds absurd. He questions the necessity of such a product, observing that many people already have enough pockets in their clothing and jokes about social media reactions mocking the iPhone Pocket’s existence. In the latter part of the episode, Chris transitions into discussing the Steam Machine, a new gaming console from Steam, which he hails as potentially revolutionary for gaming. He praises its specifications, suggesting it could outperform current competitors like the Xbox and PlayStation. He highlights its capability to function not only as a gaming console but also as a PC, allowing for flexibility in usage. Chris then touches on a failed experiment by Amazon involving AI-generated English dubs for anime, simply stating it was poorly executed and ultimately removed. He critiques the decision to utilize AI for this purpose rather than hiring voice actors, emphasizing the importance of human emotion in voice acting Links: Introducing iPhone Pocket: A Beautiful Way to Wear and Carry iPhone Steam Machine Amazon Halts AI Anime Dub Beta After Widespread Ridicule The post iPhone Pocket: Clever Innovation or Cash Grab? #1853 appeared first on Geek News Central.

Bankless
The Private World Computer | Aztec Co-Founders Zac Williamson & Joe Andrews

Bankless

Play Episode Listen Later Dec 2, 2025


If crypto wins without privacy, did we actually win? In this episode, Ryan sits down with Aztec co-founders Zac Williamson and Joe Andrews to unpack their eight-year quest to build a private world computer for Ethereum, covering the Aztec ignition chain, zero-knowledge-powered “private intents,” and how you can route trades across L1 and L2s without exposing your strategies or balances. They dive into ZK Passport (turning your NFC e-passport into a proof of personhood), the coming breakdown of selfie KYC in an AI world, holistic on-chain identity, Aztec's one-shot move to a fully decentralized L2. Along the way, Zac and Joe get candid about the regulatory risk of building privacy rails, echoes of the early SSL wars, and what keeps them grinding after nearly a decade of R&D to ship Aztec Alpha ---

Geek News Central
From NASA's X-59 to Humanoid Workers: The Future Is Getting Weird # 1852

Geek News Central

Play Episode Listen Later Nov 24, 2025 30:45 Transcription Available


In this episode, we dive into NASA's first test flight of the ultra-quiet X-59 supersonic jet, explore the futuristic Phantom transparent 4K monitor, and break down World Labs' breakthrough 3D world-modeling AI. We also cover TypeScript's unexpected rise in the AI era, the world's first mass delivery of humanoid factory workers, and how you can now run powerful open-source AI models locally. It's a packed show full of aviation, robotics, and cutting-edge tech that's reshaping the future. Want to be a Guest on a Podcast or YouTube Channel? Sign up for GuestMatch.Pro Thinking of buying a Starlink? Use my link to support the show. Don’t tell me you’ve been using the same password for every site? You’ll thank me later, Get 1Password. Subscribe to the Newsletter. Email Ray if you want to get in touch! Like and Follow Geek News Central’s Facebook Page. Support my Show Sponsor: Best Godaddy Promo Codes $11.99 – For a New Domain Name cjcfs3geek $6.99 a month Economy Hosting (Free domain, professional email, and SSL certificate for the 1st year.) Promo Code: cjcgeek1h $12.99 a month Managed WordPress Hosting (Free domain, professional email, and SSL certificate for the 1st year.) Promo Code: cjcgeek1w Support the show by becoming a Geek News Central Insider Full Summary In episode 1852 of the Geek News Central podcast, host Ray Cochrane welcomes listeners back after a brief hiatus, explaining the delay due to personal and professional commitments. He kicks off the show by discussing an exciting breakthrough from NASA: the successful test flight of the X-59, an experimental aircraft designed to quiet the sonic boom, potentially paving the way for commercial supersonic flight over land. Ray notes that the X-59, which resembles a swordfish, recently completed its first test flight in California, focusing on functionality rather than speed. It is intended to gather data on the aircraft’s noise impact on communities, indicating a significant step towards improving commercial travel times. After this, Ray thanks the podcast’s sponsor, GoDaddy, highlighting their hosting services and mentioning various promotional offers. He encourages listeners to support the show directly through the GoDaddy links, emphasizing their reliability in supporting the podcast. Following the sponsor message, Ray transitions into another topic, discussing a new prototype transparent 4K monitor named the Phantom developed by Virtual Instruments. The monitor is designed to allow users to see their environment through the screen while achieving remarkable brightness levels. Next, he introduces an innovative AI model called Marble developed by Fei Fei Li's startup, World Labs. Ray explains that this platform enables users to generate 3D worlds from simple prompts, marking a shift towards spatial intelligence in AI, which is essential for gaming, robotics, and visual effects. Ray then moves on to discuss TypeScript’s rise in the programming world, which has overtaken JavaScript and Python as the most used language on GitHub due to its compatibility with AI-assisted coding. He continues with news about UbiTech’s Walker S2 humanoid robots, which have begun mass delivery to factories, signifying a major milestone in manufacturing automation and the potential implications for the labor market. Ray finishes with information on the growing trend of running local open-source AI models on personal computers. He emphasizes the privacy advantages of using models like Llama and Mistral locally without relying on cloud providers. In closing, Ray reflects on the episode’s diverse topics and invites listener feedback regarding the content. He expresses gratitude for their support and encourages them to send comments or suggestions for future episodes. Ray ends by wishing everyone a good night and promising to return with more episodes soon. Show Links NASA X-59 Quiet Supersonic Test Flight Phantom Transparent 4K Monitor Fei-Fei Li's World Labs Launches Marble TypeScript's Rise in the AI Era (Hejlsberg Interview) UBTECH's First Large Delivery of Humanoid Workers How to Run Your Own Local Open-Source AI Model The post From NASA's X-59 to Humanoid Workers: The Future Is Getting Weird # 1852 appeared first on Geek News Central.

Syntax - Tasty Web Development Treats
956: Should I Keep Using WordPress?

Syntax - Tasty Web Development Treats

Play Episode Listen Later Nov 19, 2025 50:10


In this potluck episode, Wes and Scott answer your questions about paid vs. free SSL, the state of frontend jobs, headless WordPress trade-offs, organizing TypeScript types, and more! Show Notes 00:00 Welcome to Syntax! 00:51 Recapping the GitHub Meetup 05:14 Is there any real benefit to picking a paid SSL over Let's Encrypt? 08:03 Is the pure frontend role disappearing? 11:17 Is the gravy train over for software devs? 20:48 How Scott automates versioning with GitHub Actions changesets Intro to using changesets zero-svelte graffiti 25:16 Brought to you by Sentry.io 25:41 Thoughts on VS Code alternatives and the rise of Zed 33:01 Should I switch to headless WordPress or continue rolling my own PHP templates? 37:33 How do you organize TypeScript types in a frontend project? 40:55 How do I continue to level up as a developer? 45:36 Stay in a comfortable job or embrace new challenges? Hit us up on Socials! Syntax: X Instagram Tiktok LinkedIn Threads Wes: X Instagram Tiktok LinkedIn Threads Scott: X Instagram Tiktok LinkedIn Threads Randy: X Instagram YouTube Threads

Oracle University Podcast
Understanding Security Risks and Threats in the Cloud - Part 1

Oracle University Podcast

Play Episode Listen Later Nov 18, 2025 14:11


This week, Lois Houston and Nikita Abraham are joined by Principal OCI Instructor Orlando Gentil to explore what truly keeps data safe, and what puts it at risk.   They discuss the CIA triad, dive into hashing and encryption, and shed light on how cyber threats like malware, phishing, and ransomware try to sneak past defenses.   Cloud Tech Jumpstart: https://mylearn.oracle.com/ou/course/cloud-tech-jumpstart/152992 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu   Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. ------------------------------------------ Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Hello and welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me is Nikita Abraham, Team Lead: Editorial Services. Nikita: Hey everyone! Last week, we discussed how you can keep your data safe with authentication and authorization. Today, we'll talk about various security risks that could threaten your systems. 00:48 Lois: And to help us understand this better, we have Orlando Gentil, Principal OCI Instructor, back with us. Orlando, welcome back! Let's start with the big picture—why is security such a crucial part of our digital world today? Orlando: Whether you are dealing with files stored on a server or data flying across the internet, one thing is always true—security matters. In today's digital world, it's critical to ensure that data stays private, accurate, and accessible only to the right people.  01:20 Nikita: And how do we keep data private, secure, and unaltered? Is there a security framework that we can use to make sense of different security practices? Orlando: The CIA triad defines three core goals of information security.  CIA stands for confidentiality. It's about keeping data private. Only authorized users should be able to access sensitive information. This is where encryption plays a huge role. Integrity means ensuring that the data hasn't been altered, whether accidentally or maliciously. That's where hashing helps. You can compare a stored hash of data to a new hash to make sure nothing's changed. Availability ensures that data is accessible when it's needed. This includes protections like system redundancy, backups, and anti-DDoS mechanisms. Encryption and hashing directly support confidentiality and integrity. And they indirectly support availability by helping keep systems secure and resilient. 02:31 Lois: Let's rewind a bit. You spoke about something called hashing. What does that mean? Orlando: Hashing is a one-way transformation. You feed in data and it produces a unique fixed length string called a hash. The important part is the same input always gives the same output, but you cannot go backward and recover the original data from the hash. It's commonly used for verifying integrity. For example, to check if a file has changed or a message was altered in transit. Hashing is also used in password storage. Systems don't store actual passwords, just their hashes. When you log in, the system hashes what you type it and compare the stored hash. If they match, you're in. But your actual password was never stored or revealed. So hashing isn't about hiding data, it's about providing it hasn't changed. So, while hashing is all about protecting integrity, encryption is the tool we use to ensure confidentiality. 03:42 Nikita: Right, the C in CIA. And how does it do that? Orlando: Encryption takes readable data, also known as plaintext, and turns it into something unreadable called ciphertext using a key. To get the original data back, you need to decrypt it using the right key. This is especially useful when you are storing sensitive files or sending data across networks. If someone intercepts the data, all they will see is gibberish, unless they have the correct key to decrypt it. Unlike hashing, encryption is reversible as long as you have the right key. 04:23 Lois: And are there different types of encryption that serve different purposes? Orlando: Symmetric and asymmetric encryption. With symmetric encryption, the same key is used to both encrypt and decrypt the data. It's fast and great for securing large volumes of data, but the challenge lies in safely sharing the key. Asymmetric encryption solves that problem. It uses a pair of keys: public key that anyone can use to encrypt data, and a private key that only the recipient holds to decrypt it. This method is more secure for communications, but also slower and more resource-intensive. In practice, systems often use both asymmetric encryption to exchange a secure symmetric key and then symmetric encryption for the actual data transfer. 05:21 Nikita: Orlando, where is encryption typically used in day-to-day activities? Orlando: Data can exist in two primary states: at rest and in transit. Data at rest refers to data stored on disk, in databases, backups, or object storage. It needs protection from unauthorized access, especially if a device is stolen or compromised. This is where things like full disk encryption or encrypted storage volumes come in. Data in transit is data being sent from one place to another, like a user logging into a website or an API sending information between services. To protect it from interception, we use protocols like TLS, SSL, VPNs, and encrypted communication channels. Both forms data need encryption, but the strategies and threats can differ. 06:19 Lois: Can you do a quick comparison between hashing and encryption? Orlando: Hashing is one way. It's used to confirm that data hasn't changed. Once data is hashed, it cannot be reversed. It's perfect for use cases like password storage or checking the integrity of files. Encryption, on the other hand, it's two-way. It's designed to protect data from unauthorized access. You encrypt the data so only someone with the right key can decrypt and read it. That's what makes it ideal for keeping files, messages, or network traffic confidential. Both are essential for different reasons. Hashing for trust and encryption for privacy. 07:11 Adopting a multicloud strategy is a big step towards future-proofing your business and we're here to help you navigate this complex landscape. With our suite of courses, you'll gain insights into network connectivity, security protocols, and the considerations of working across different cloud platforms. Start your journey to multicloud today by visiting mylearn.oracle.com.  07:39 Nikita: Welcome back! When we talk about cybersecurity, we hear a lot about threats and vulnerabilities. But what do those terms really mean? Orlando: In cybersecurity, a threat is a potential danger and a vulnerability is a weakness an asset possess that a threat can exploit. When a threat and a vulnerability align, it creates a risk of harm. A threat actor then performs an exploit to leverage that vulnerability, leading to undesirable impact, such as data loss or downtime. After an impact, the focus shifts to response and recovery to mitigate damage and restore operations.  08:23 Lois: Ok, let's zero in on vulnerabilities. What counts as a vulnerability, and what categories do attackers usually target first?  Orlando: Software and hardware bugs are simply unintended flaws in a system's core programming or design. Misconfigurations arise when systems aren't set up securely, leaving gaps. Weak passwords and authentication provide easy entry points for attackers. A lack of encryption means sensitive data is openly exposed. Human error involves mistakes made by people that unintentionally create security risks. Understanding these common vulnerability types is the first step in building more resilient and secure systems as they represent the critical entry points attackers leverage to compromise systems and data. By addressing these, we can significantly reduce our attack surface and enhance overall security.  09:28 Nikita: Can we get more specific here? What are the most common cybersecurity threats that go after vulnerabilities in our systems and data? Orlando: Malware is a broad category, including viruses, worms, Trojans, and spyware. Its goal is to disrupt or damage systems. Ransomware has been on the rise, targeting everything from hospitals to government agencies. It lock your files and demands a ransom, usually in cryptocurrency. Phishing relies on deception. Attackers impersonate legitimate contacts to trick users into clicking malicious links or giving up credentials. Insider threats are particularly dangerous because they come within employees, contractors, or even former staff with lingering access. Lastly, DDoS attacks aim to make online services unavailable by overwhelming them with traffic, often using a botnet—a network of compromised devices. 10:34 Lois: Orlando, can you walk us through how each of these common cybersecurity threats work? Orlando: Malware, short for malicious software, is one of the oldest and most pervasive types of threats. It comes in many forms, each with unique methods and objectives. A virus typically attaches itself to executable files and documents and spreads when those are shared or opened. Worms are even more dangerous in networked environments as they self-replicate and spread without any user action. Trojans deceive users by posing as harmless or helpful applications. Once inside, they can steal data or open backdoors for remote access. Spyware runs silently in the background, collecting sensitive information like keystrokes or login credentials. Adware might seem like just an annoyance, but it can also track your activity and compromise privacy. Finally, rootkits are among the most dangerous because they operate at a low system level, often evading detection tools and allowing attackers long-term access. In practice, malware can be a combination of these types. Attackers often bundle different techniques to maximize damage.  12:03 Nikita: And what about ransomware? Why it is such a serious threat? Orlando: Ransomware has become one of the most disruptive and costly types of cyber attacks in recent years. Its goal is simple but devastating, to encrypt your data and demand payment in exchange for access. It usually enters through phishing emails, insecure remote desktop protocol ports or known vulnerabilities. Once inside, it often spreads laterally across the network before activating, ensuring maximum impact. There are two common main forms. Crypto ransomware encrypts user files, making them inaccessible. Locker ransomware goes a step further, locking the entire system interface, preventing any use at all. Victims are then presented with a ransom note, typically requesting cryptocurrency payments in exchange for the decryption key. What makes ransomware so dangerous is not just the encryption itself, but the pressure it creates. Healthcare institutions, for instance, can't afford the downtime, making them prime targets.  13:18 Lois: Wow. Thanks, Orlando, for joining us today.  Nikita: Yeah, thanks Orlando. We'll be back next week with more on how you use security models to tackle these threats head-on. And if you want to learn about the topics we covered today, go to mylearn.oracle.com and search for the Cloud Tech Jumpstart  course. Until next time, this is Nikita Abraham… Lois: And Lois Houston, signing off! 13:42 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.

The Digital Executive
The Future of Digital Trust: Tim Callan on Certificates, Cryptography, and Identity | Ep 1138

The Digital Executive

Play Episode Listen Later Nov 2, 2025 12:57


In this episode of The Digital Executive, host Brian Thomas sits down with Tim Callan, Chief Experience Officer at Sectigo and one of the leading voices in SSL and PKI technology. With over 20 years shaping the standards of digital trust, Tim unpacks how the invisible infrastructure behind certificates and encryption keeps our digital world secure.Tim explores the coming shift toward shorter certificate lifespans, why automation is essential for enterprises, and how post-quantum cryptography (PQC) will reshape cybersecurity in the near future. He also dives into the evolution of digital identity—from enterprise systems to personal digital wallets—and how encryption can both empower privacy and resist misuse.Whether you're a tech leader, IT professional, or digital security enthusiast, this episode offers a rare look into the technologies protecting our connected future.If you liked what you heard today, please leave us a review - Apple or Spotify. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Quantum
Quantum 74 - Actualités d'octobre 2025

Quantum

Play Episode Listen Later Nov 2, 2025 77:00


Nous voici dans le 74 ième épisode de Quantum, le podcast mensuel francophone de l'actualité quantique.  Evénements passés Q2B 2025 Paris : https://www.youtube.com/watch?v=w4kyIJBJfNQ&list=PLh7C25oO7PW2rdumZq-QVGuuvjfWQ86KfSlides Olivier : The energetic challenges of FTQC et An End-User View of Hardware Roadmaps. Quantum Effects à Stuttgart les 7 et 8 octobre.https://www.messe-stuttgart.de/quantum-effects/en/ Journées QuantAlps 2025 à Grenoble, les 13 et 14 octobre. https://quantalps.univ-grenoble-alpes.fr/ Conférence IRIT à Toulouse le 16 octobre. https://filesender.renater.fr/?s=download&token=085da056-b530-4774-9d91-af6b755eca6a Quantum Munich Software Forum : https://www.cda.cit.tum.de/research/quantum/mqsf/ 20 ans de Teratec au CNAM : le 23 octobre, complété par la sortie d'un livre blanc « Les clés du numérique » https://teratec.eu/library/pdf/2025/LIVRE_BLANC_TERATEC_INTERACTIF_2025-10-22.pdf Conférence SWITCH à Singapour https://www.switchsg.org/ Evénements à venir Conférence de la Société Française de Génie des Procédés le 5 novembre à Paris. https://www.sfgp.asso.fr/Q9w95JK6d5t6yWrSC4UcTm2eMqRG358vibZBtdWV22uk494Ys3/uploads/2025/10/CL-MQ-flyer-prog.pdf QET-W, le second forum sur les technologies habilitantes aura lieu le 13 novembre sur le campus de Saint Germain en Layehttps://server.matchmaking-studio.com/fr/QETw2025/ GDR-TEQ 2025 à Grenoble des 12 au 14 novembrehttps://gdrteq2025.sciencesconf.org/OVHcloud Summit à Paris le 20 novembrehttps://summit.ovhcloud.com/fr/ Symposium France Singapour chez Bpifrance à Paris les 25 et 26 novembre (inscriptions). Avec notamment une intervention d'Alain Aspect en compagnie d'Artur Ekert. QUEST-IS  du 1er au 4 décembre 2025 https://conference-questis.org/quest-is-2025/program/tqci-seminar/ Q2B Santa Clara la seconde semaine de décembre.Le code QP-20-SV permet d'obtenir une reduction de 20%https://q2b.qcware.com/conference/2025-silicon-valley Actualités en France Documentaire France TV Rhône Alpes sur Xavier Waintal du CEA-IRIG à Grenoble.https://www.france.tv/documentaires/documentaires-science/7561721-le-cantique-du-quantique.htmlhttps://www.linkedin.com/posts/cea-irig_informatiquequantique-quantumcomputing-activity-7381939028151156736-vz_P Alain Aspect à Grenoble à la conférence à l'UGA. https://www.youtube.com/watch?v=CgwyND3qK7QIsentroniq Cette startup a été créée par Paul Magnard, un ancien chercheur d'Alice&Bob, qui a créé une technique de câblage compact pour le pilotage de qubits supraconducteurs, qui permet d'évacuer la chaleur dissipée dans les étages supérieurs du cryostat. La startup faisait une levée fonds de 7.5M€ ce qui est remarquable pour une startup lancée en début d'année.https://www.isentroniq.com/Thesis.htmlhttps://www.journaldunet.com/web-tech/1545177-isentroniq-leve-7-5-millions-d-euros-pour-industrialiser-les-ordinateurs-quantiques/ Pasqal Ils s'installent à Chicago, https://www.linkedin.com/posts/consulate-general-of-france-in-chicago_major-news-for-quantum-innovation-ugcPost-7382184161177989120-goB9Ils obtiennent un financement de 30M€ à l'EIC. https://www.linkedin.com/posts/pasqal_quantumcomputing-deeptech-eic-activity-7383399892213243905-rZIAIls annoncent aussi la création d'un laboratoire en Corée du Sud avec des financements locaux venant notamment de LG Electronics. https://www.pasqal.com/fr/newsroom/pasqal-expands-into-korea/ Quandela Ils livraient Lucy, l'ordinateur quantique photonique au Très Grand Centre de Calcul du CEA, dans le cadre du programme européen EuroHPC géré en France par GENCI. Avec 12 qubits. https://www.quandela.com/about-us/newsroom/quandela-delivers-lucy-the-most-advanced-photonic-quantum-computer-worldwide-to-eurohpc-and-genci-at-ceas-tgcc/ Ils présentaient aussi une étude de cas réalisée avec CACIB sur de la prévision de risque de crédit. Cela rappelle celle qui avait été réalisée en 2022 avec Multiverse et Pasqal. 

Technology Tap
Cybersecurity Fundamentals. Inside The Locks And Gates Of The Network Chapter 9

Technology Tap

Play Episode Listen Later Oct 30, 2025 24:58 Transcription Available


professorjrod@gmail.comSecurity that actually holds under pressure starts long before passwords and antivirus. We pull back the rack door and walk through the parts that make a network resilient: switches that enforce port security, routers that block spoofed traffic, servers that stay patched and locked down, and load balancers that keep services steady when a node falls over. From a small bookstore's POS to a global bank's data center, the patterns repeat with higher stakes and tighter controls.We break down the real tools of infrastructure defense and why they matter. Policy‑based firewalls translate intent like “block social media for guests” into action, while next‑gen engines add deep inspection and URL filtering. Forward proxies protect outbound browsing and reverse proxies hide internal services. Deception tech—honeypots, honeynets, and sinkholes—turns attackers into sources of intel. IDS alerts, IPS blocks, and together they feed visibility into an XDR layer that correlates endpoint, server, cloud, and email signals to stop ransomware chains before they detonate.Good design contains failure. VLANs limit blast radius when a laptop is compromised. DMZs and jump servers separate public‑facing apps from sensitive systems. Zero trust reframes access with “never trust, always verify,” enforcing MFA, continuous checks, and least privilege across users and APIs. VPNs connect people and sites with SSL and IPsec, while NAC verifies device health and quarantines noncompliant endpoints—a must for any BYOD policy. We tie it all together with practical case studies, a quick quiz to test your instincts, and clear takeaways you can apply to classrooms, clinics, nonprofits, and clouds.If this deep dive helps you think more clearly about your network's weak points and how to shrink them, tap follow, share with a teammate, and leave a review so more builders can find it. What's the first segment you'll harden this week?Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Hauswerk's Podcast
Episode 376: Hauswerk 18.10.2025

Hauswerk's Podcast

Play Episode Listen Later Oct 18, 2025 117:59


John Ussher gets into an impromptu throwback session. Enjoy.Track list: D'Angelo - Devil's pie (Behling & Simpson mix) Henry Wu - Midtour Cosmonection ft. Ddave - Let me tell you Frank Booker - The Sun (2024 remaster) Ferry Ultra ft. Boris Jennings - Good times (Late Nite Tuff Guy remix) Harvey Sutherland - Cigarette (Ian Pooley mix) Joshua Collins - Phonosynthesis  Behling & Simpson - Hurt me more Tin Tin Out ft. Sweet Tee - The Feeling (Sacred mix) Malcolm Maclaren - Buffalo Gals (S-man's Spicy Buffalo Wings Dub) Jamiroquai- High Times (Sanchez radio edit) Dino Lenny - House of Magic (Extended mix) Matador - SoSo (Extended mix) Lifelike, Kris Menace - what time is love (Live at SSL mix) Age of love - The age of love (New age mix) Yonsh, Franco Camiolo - Clix Saints & Sinners, Marc Romboy, Rafael Cerato - Pushin' Again Demi Riquisimo & the trip - Don't go away Soulsearcher - Can't get enough (Vocal club mix) Inner City - Good Life (Extended mix) Coloursound - Fly with me (Original remastered)  Whirlpool Productions - Disco to Disco

live original track sinners disco simpson vocal lifelike ssl marc romboy behling kris menace ferry ultra late nite tuff guy
Inside The Mix
#216: I Tried Top-Down Mixing — Here's What Actually Happened

Inside The Mix

Play Episode Listen Later Oct 14, 2025 17:54 Transcription Available


What if a better‑translating mix starts before you touch a single channel plugin? I put top‑down mixing under the microscope and share a candid, first‑hand evaluation: what worked, what didn't, and how a few smart moves on the mix bus reshaped the entire project in less time and with fewer plugins. Rather than a tutorial, this is a field report packed with practical takeaways you can try on your next session.I begin by setting a clear vision using references—one in the same key for tonal and energy alignment—and a bounced static mix for instant AB checks. From there, we build a lean, disciplined master bus chain: gentle resonance control, broad‑stroke EQ shelves, an SSL‑style bus compressor, and subtle tape saturation. Those small, wide moves made a big difference early, tightening low‑end focus and smoothing top‑end glare while preserving macro and microdynamics. With the canvas set, we move through subgroups—kick and bass, drums, synths, vocals, FX—pushing fixes upstream and only dropping to track level for surgical EQ where it truly matters.Not everything got faster. Saving time on tone and dynamics meant time‑based effects arrived later, and finding the right reverb balance took more iteration than usual—proof that arrangement and spatial design can complicate a top‑down flow. Still, automation needs dropped thanks to better macro balance, CPU use fell with fewer chains, and translation improved across volumes. You'll hear why starting at the mix bus can prevent “getting stuck in the weeds,” how to pick effective reference tracks, and when to abandon restraint for a precise channel tweak.Suppose you're curious about master bus processing, top‑down mixing, and faster decision‑making without sacrificing quality. In that case, this session offers a straight‑talk guide to trying it responsibly on your own productions before rolling it out for clients. Listen, steal the framework, then run your own experiment—and tell me what you discover. Links mentioned in this episode:Listen to Narcissist THE UNSEEN DANGERS OF TOP-DOWN MIXINGWhere Top-Down Goes WRONGTOP DOWN MIXING - the SECRET SAUCEWhy Top-Down Mixing is the GOATTop-Down Mixing: The Secret To Better FASTER Mixes?Send me a message Support the showWays to connect with Marc: Radio-ready mixes start here - get the FREE weekly tips Book your FREE Music Breakthrough Strategy Call Follow Marc's Socials: Instagram | YouTube | Synth Music Mastering Thanks for listening!! Try Riverside for FREE

Philokalia Ministries
The Ascetical Homilies of St. Isaac the Syrian - Homily IV, Part XI

Philokalia Ministries

Play Episode Listen Later Oct 9, 2025 63:47


St. Isaac's words reveal that communion with God requires remoteness from distraction and a renunciation of whatever disquiets the heart. This is not something reserved for monks alone, though they live it most radically, but it is a law of the Christian life as a whole. For Isaac, the fruits of renunciation are not abstract but very real: tears, compunction, a fountain of sweetness welling up from the heart, light dawning within. These are given not to the distracted soul but to the one who bows like a convict before the Cross, empty-handed and intent upon nothing else. Renunciation is not simply turning away from sin but from every movement that agitates the mind. He calls it a kind of death, both of the outer man in worldly deeds and occupations, and of the inner man in thoughts, passions, and self-will. It is this dying that makes room for the Spirit to raise one into true life. For the monk, this call is lived in visible and total form: silence, enclosure, vigils, fasting, the cutting away of unnecessary speech and activity. Leaving behind the noise of the world, the monk learns to dwell continually before God. For them Isaac's words are direct and literal, for one cannot hold onto worldly cares and at the same time enter into the madness of divine love. Stillness is the path by which grace rushes into the heart. For those living in the world, this teaching does not mean the rejection of responsibilities, but rather the careful discernment of what is indispensable and what is merely disquieting. Isaac himself acknowledges that not all can practice stillness in its fullness, but warns that one should not abandon the path altogether. Instead, there are ways of living the same spirit in daily life: simplicity, which renounces excess possessions, amusements, and chatter that scatter the heart; sobriety of senses, which guards against overindulgence and constant stimulation; interior watchfulness, which makes room for compunction and prayer in the ordinary rhythms of the day; trust in God's providence, which loosens the grip of anxiety over outcomes. For the layperson, renunciation looks like choosing silence over noise, prayer over distraction, mercy over greed, humility over self-exaltation. In these small dyings the heart is opened to the same fountain of sweetness, even if not in the same intensity as in the solitary monk. Isaac reminds us that whoever does not voluntarily withdraw from the causes of the passions will be carried away by them in the end. Whether monk or layperson, if the heart is constantly fed on the world's noise, possessions, and anxieties, it will inevitably be drawn off course. But if one begins to renounce even in small ways, the Spirit quickly comes to give aid, comforting the soul and granting grace. The lesson is clear: every Christian is called to some measure of renunciation, not as loss, but as the doorway to joy and divine consolation. The monk may live it to the depths, but each person in Christ is summoned to taste it in their own measure. --- Text of chat during the group: 00:14:30 jonathan: started trying practising paustinia every Wednesday and Friday. Its been far harder trying to abstain from all forms of entertainment than it is from food. Like fr said, the noon day demon feels heavy. 00:16:55 Catherine Opie: Ave Maria> What page are we on? 00:17:10 Myles Davidson: Replying to "Ave Maria> What page..." P. 152, last full paragraph on page 00:18:27 Catherine Opie: Reacted to "P. 152, last full pa..." with

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, September 30th, 2025: Apple Patch; PAN Global Protect Scans; SSL.com signed malware

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Sep 30, 2025 5:06


Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400). Our honeypots detected an increase in scans for a Palo Alto Global Protect vulnerability. https://isc.sans.edu/diary/Increase%20in%20Scans%20for%20Palo%20Alto%20Global%20Protect%20Vulnerability%20%28CVE-2024-3400%29/32328 Nimbus Manticore / Charming Kitten Malware update Checkpoint released a report with details regarding a new Nimbus Manticore exploit kit. The malware in this case uses valid SSL.com-issued certificates. https://research.checkpoint.com/2025/nimbus-manticore-deploys-new-malware-targeting-europe/

Blind Abilities
Unscripted: Apple Store Tripping, CoPilot Be Gone, Straps and Tethers, and Microphones, Interfaces and the Studio Sound

Blind Abilities

Play Episode Listen Later Sep 30, 2025 31:11


In this episode of Unscripted, Jeff Thompson and Sree Roy dive into the everyday mix of tech talk and personal takes, all in the natural flow of conversation. Sree kicks things off with a trip to the Apple Store, exploring iPhone crossbody straps and even the Beats lanyard trend. The two reflect on the surprise availability of the iPhone 17—thin as air, in stock, and shipping in just two hours. They weigh the pros and cons of the standard model versus the Pro and Max, noting the absence of LiDAR on the base edition. Conversation shifts to tools of their trade: Jeff shares how microphones and room acoustics shape his podcasting workflow, from condenser mics to dynamic setups, and why his SSL 2+ interface is his go-to. Sree brings in his Blue Sparks condenser mic and Zoom PodTrak P4, plus a shout-out to iBugToday.org for its rich assistive tech resources. You can contact us at 612-367-6093. Leave a message, suggestions, and your feedback. Thanks for listening!  

RunAs Radio
Certificate Automation with Todd Gardner

RunAs Radio

Play Episode Listen Later Sep 17, 2025 35:02


The days of the one-year SSL certificate are coming to an end - are you ready? Richard chats with Todd Gardner about the upcoming requirement from the Certification Authority Browser Forum to limit SSL certs to 200 days starting March 2026 - and they keep getting shorter until by 2029, certificates will last no longer than 47 days! If you haven't already automated certificate renewal, it's time to start moving in that direction. Todd talks about CertKit as a new approach to automating certificate renewal across various services, making it much easier. Still in the experimental phase, you can be part of the process and make your certificate life easier now!LinksLet's EncryptACME Client ImplementationsThe Great SSL Certificate PanicCertification Authority Browser ForumZeroSSLtrackjsCertKitRecorded August 19, 2025

automation certificates ssl ssl certificates todd gardner
My Music
My Music Episode 594 - Robin Ross

My Music

Play Episode Listen Later Sep 15, 2025 46:34


My Music: Interview with Robin RossIn this candid and wide‑ranging episode of My Music, host Graham Coath sits down with singer‑songwriter and producer Robin Ross to talk about his latest project with The Howers and their vintage‑sounding EP Back to the Forest.Recorded in Ross's own Baba Leaf Studio—an analogue-focused retreat in the Poconos—the conversation covers:The story behind The Howers: how late‑night songwriting sessions in the woods with collaborator Tim Howell (and the occasional coyote) inspired both the band's name and their harmonically rich, retro blues sound.From gambling win to guitar obsession: Ross recounts the teenage bet that landed him his first guitar, leading to a lifelong passion for instruments with “mojo” and the souls of previous players.Building studios and careers: from Bleecker Street gigs with Laughing Jack/Jack's Maze and four‑track recordings to audio engineering school, multiple home studios and his current SSL‑equipped setup.Life beyond music: Ross's detour into novel‑writing and energy‑efficiency engineering, and how those experiences ultimately pulled him back into music in 2021.Analog vs. AI: why he avoids over‑compression, embraces analog gear and believes that algorithms can't replicate the human “vibe” in music.Releasing imperfect art: the freedom of putting out B‑sides, accepting honest criticism and connecting with listeners from Russia to the Scilly Isles via digital platforms.Ross also shares his hopes of bringing The Howers to stages in Norway and beyond, swapping stories with Coath about treasured guitars and the magic of songcrafting in nature. If you love behind‑the‑scenes studio talk, reflections on musical authenticity and the journey of a lifelong musician, this episode is for you.

Root Causes: A PKI and Security Podcast
Root Causes 524: How to Kill Three Birds with One Stone

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Sep 8, 2025 12:42


Three major changes are coming to the world of public certificates, all of which require major changes in how organizations deploy, renew, and manage their certificates. These are 47-day SSL, PQC, and the deprecation of mTLS. We describe the overlap between these efforts and how to combine them for better efficiency and project management.

The Buss Earz Podcast
If I was the Prime MInister of Jamaica | Usain Bolt receives "CRUMBS" from SSL & more

The Buss Earz Podcast

Play Episode Listen Later Sep 2, 2025 106:41


In this episode we speak about the upcoming general elections in Jamaica, the fact that Usain Bolt receives Crumps from SSL, also all the things Dale think he would if one day he should become the prime minister of Jamaica

Production Expert Podcast
September is arriving.. Is Your Recording Studio Fail Proof? (You may be surprised at this checklist!)

Production Expert Podcast

Play Episode Listen Later Aug 17, 2025 29:49


In this edition Ashea and Julian are joined by James Richmond (former SSL) & Production Experts Luke Goddard where they walk through Julians checklist from his blog article: Is Your Studio Resilient ?About Our Guests:James Richmons is a producer/engineer based in Oxfordshire, UK.Production Expert's very own Luke Goddard. Yes that one!