Podcasts about sys

  • 127PODCASTS
  • 406EPISODES
  • 46mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Apr 9, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about sys

Latest podcast episodes about sys

Dev Game Club
DGC Ep 425: Fez (part one)

Dev Game Club

Play Episode Listen Later Apr 9, 2025 74:26


Welcome to Dev Game Club, where this week we begin a new series of series on the independent games of the last couple of decades, starting with 2012's Fez. We set the game in its time, talk a bit about its precedents and the landscape of independent games in the middle of that console generation. Dev Game Club looks at classic video games and plays through them over several episodes, providing commentary. Sections played: Single-digit cubes Issues covered: our real plan or lack thereof, early games, the indie revolution, the influences back and forth, the pressure of the space we're in, a highly visible indie, games from that year, sequels vs the different stuff in the indies, democratization of the market, the console cycle, always online fiasco, getting on the Steam store, opening console store fronts to independents, limitations, the broadband market and bandwidth costs, the publicity on the store, low cost of goods, continuing power of retail, a two dimensional puzzle game in a three dimensional world, charm, great music and MIDI with an unsettling feel, rotating the world, rebooting the game, achieving the effect without perspective, the Trixel engine, having a hard time getting it, trusting the game, having a new lens on a game, taking the time to infuse the whole experience, team sizes, telling a different story with an existing language, having fewer people to get on board, independent publishers and producers, influences, glitch aesthetics, map language, climbing on the sides of things, stopping time while the world rotates, how the editor might work, games from the past, CONFIG.SYS (dang it, could not remember), skipping over generations. Games, people, and influences mentioned or discussed: Will Wright, Indie Game: The Movie, Polytron, Phil Fish, Dishonored, Halo 4, AW American Nightmare, X-COM, Firaxis, Mass Effect 3, Forza Horizon, Far Cry (series), Counterstrike: Go, Assassin's Creed 3, Borderlands 2, Diablo III, Dragon's Dogma, Journey, The Walking Dead, Telltale Games, FTL, Spelunky, Papo y Yo, Bastion, Super Hexagon, Terry Cavanaugh, Supergiant, Hades, Transistor, UFO 50, Derek Yu, That Game Company, Sky, Sony, PlayStation, Microsoft, Steam, XBLA, Braid, Super Meat Boy, Nintendo, Castlevania: Symphony of the Night, Zelda (series), Super Mario (series), Metroid (series), Outer Wilds, The Sixth Sense (obliquely), Renaud Bedard, Trapdoor, Penny Arcade, blitworks, Tetris, Axiom Verge, Tron, Out of this World, Captain Toad: Treasure Tracker, Super Mario 3D Land, Minecraft, Sam, Interstate '76, Kirk Hamilton, Aaron Evers, Mark Garcia. Next time: More Fez! Twitch: timlongojr Discord DevGameClub@gmail.com

Auf ein Glas…
Algarve Gourmet/MDS: Sardinen und ein Glas Wein

Auf ein Glas…

Play Episode Listen Later Apr 3, 2025 45:20


Wäre da beim ausgeschilderten Küstenwanderweg zwischen Ferragudo und der Praia Marinha nicht dieser eine Punkt Nummer 5 so auffällig weit weg von der Küste gewesen, wären wir ja nie da gewesen. Was mag da sein? Ah: ein Weingut! Gut. Wir also hin zur Quinta Monte de Salicos, wo wir Paulo Ferreira und Gorete Matias trafen. Sie sind keine Winzer, sondern Foodies und setzen auf dem Weingut mit ihrer Firma Algarve-Gourmet die Idee vom passenden Essen zum Wein um. Unser ungeplantes Kommen an einem Samstag mit Smalltalk und einem Glas Wein endete mit der Zusage, am nächsten Tag noch einmal zu kommen – dann aber zum vollen Programm: mit vier Weinen, passenden Tapas, reichlich Informationen und zwischendurch Live-Musik – denn während Gorete in der kleinen Küche die einzelnen Gänge zubereitet, moderiert Paulo nicht nur die Weine, sondern holt auch seine Gitarre hervor und singt.Die Aufnahmen entstanden unter widrigen Umständen: es regnete nicht, es schüttete. Hin und wieder ist das Prasseln des Regens mindestens so laut wie die Stimme des nicht leisen Paulo. Und das (teilweise) Filtern des regens hat halt der Stimme geschadet – aber wir haben ja technische Mängel bei den Aufnahmen noch nie gescheut, so lange die Inhalte stimmen! Paulo spricht englisch (danke dafür, die anderen Gäste hätten gerne auch mit portugiesisch vorlieb genommen!) – die Notizen weiter unten helfen aber bei Sprachschwierigkeiten, da mitzuhalten. Und zwischendurch unterhalten Sylke (so viel Wein & fein muss auch an der Algarve sein!) und ich uns über die Weine und das Essen.Mehr (auch Essensfotos!) bei den STIPvisiten[00:00 Zu Gast im Weingut Monte dos Salicos bei Algarve Gourmet mit Paulo und Gorete[01:11] Einführung draußen[09:16] Einführung drinnen[10:37] die Geschichte des Weins in der Algarve reicht zurück bis zu den Phöniziern[14:27] wir folgen heute der mediterranen Diät[15:26] trockener Rosé, aus zwei Traubensorten gekeltert[17:00] Brot mit Knoblauch und Olivenöl - ein Gericht aus den Bergen[18:37] Der Weißwein[20:03] nun ein Lied: Das Schaffner-Lied[25:55] UVS&SYS zum Weißwein mit Bruschetta[26:18] Rotwein Cuvée[28:26] Zweiter Song[31:41] UVS/SYS zu Cräcker mit Käse[33:30] Reserva-Rotwein[35:14] zum Wein ein Bauernbrot mit Chorizo aus dem Monchique Gebrige[36:09] der letzte Gang: eine süße Salami. Mit Karob[37:12] noch ein Lied![41:36] UVS/SYS zum portugiesischen Kalten Hund

Thinking Into Health
Wenn unser System Krankheiten verstärkt

Thinking Into Health

Play Episode Listen Later Mar 12, 2025 25:59


In dieser Folge teilt Verena mehrere Beispiele aus der Praxis mit dir, wo unser Sys-tem Menschen kränker macht als gesünder.

Oracle University Podcast
Monitoring MySQL and HeatWave

Oracle University Podcast

Play Episode Listen Later Feb 25, 2025 21:02


In this episode, Lois Houston and Nikita Abraham chat with MySQL expert Perside Foster on the importance of keeping MySQL performing at its best. They discuss the essential tools for monitoring MySQL, tackling slow queries, and boosting overall performance.   They also explore HeatWave, the powerful real-time analytics engine that brings machine learning and cross-cloud flexibility into MySQL.   MySQL 8.4 Essentials: https://mylearn.oracle.com/ou/course/mysql-84-essentials/141332/226362 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu   Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode.   ----------------------------------------------------------   Episode Transcript:   00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me today is Nikita Abraham, Team Lead: Editorial Services. Nikita: Hey everyone! In our last two episodes, we spoke about MySQL backups, exploring their critical role in data recovery, error correction, data migration, and more. Lois: Today, we're switching gears to talk about monitoring MySQL instances. We'll also explore the features and benefits of HeatWave with Perside Foster, a MySQL Principal Solution Engineer at Oracle. 01:02 Nikita: Hi, Perside! We're thrilled to have you here for one last time this season. So, let's start by discussing the importance of monitoring systems in general, especially when it comes to MySQL. Perside: Database administrators face a lot of challenges, and these sometimes appear in the form of questions that a DBA must answer. One of the most basic question is, why is the database slow? To address this, the next step is to determine which queries are taking the longest. Queries that take a long time might be because they are not correctly indexed. Then we get to some environmental queries or questions. How can we find out if our replicas are out of date? If lag is too much of a problem? Can I restore my last backup? Is the database storage likely to fill up any time soon? Can and should we consider adding more servers and scaling out the system? And when it comes to users and making sure they're behaving correctly, has the database structure changed? And if so, who did it and what did they do? And more generally, what security issues have arisen? How can I see what has happened and how can I fix it? Performance is always at the top of the list of things a DBA worries about. The underlying hardware will always be a factor but is one of the things a DBA has the least flexibility with changing over the short time. The database structure, choice of data types and the overall size of retained data in the active data set can be a problem. 03:01 Nikita: What are some common performance issues that database administrators encounter? Perside: The sort of SQL queries that the application runs can be an issue. 90% of performance problems come from the SQL index and schema group.  03:18 Lois: Perside, can you give us a checklist of the things we should monitor? Perside: Make sure your system is working. Monitor performance continually. Make sure replication is working. Check your backup. Keep an eye on disk space and how it grows over time. Check when long running queries block your application and identify those queries. Protect your database structure from unauthorized changes. Make sure the operating system itself is working fine and check that nothing unusual happened at that level. Keep aware of security vulnerabilities in your software and operating system and ensure that they are kept updated. Verify that your database memory usage is under control. 04:14 Lois: That's a great list, Perside. Thanks for that. Now, what tools can we use to effectively monitor MySQL?     Perside: The slow query log is a simple way to monitor long running queries. Two variables control the log queries. Long_query_time. If a query takes longer than this many seconds, it gets logged. And then there's min_exam_row_limit. If a query looks at more than this many rows, it gets logged. The slow query log doesn't ordinarily record administrative statements or queries that don't use indexes. Two variables control this, log_slow_admin_statements and log_queries_not_using_indexes. Once you have found a query that takes a long time to run, you can focus on optimizing the application, either by limiting this type of query or by optimizing it in some way. 05:23 Nikita: Perside, what tools can help us optimize slow queries and manage data more efficiently? Perside: To help you with processing the slow query log file, you can use the MySQL dump slow command to summarize slow queries. Another important monitoring feature of MySQL is the performance schema. It's a system database that provides statistics of how MySQL executes at a low level. Unlike user databases, performance schema does not persist data to disk. It uses its own storage engine that is flushed every time we start MySQL. And it has almost no interaction with the storage media, making it very fast. This performance information belongs only to the specific instance, so it's not replicated to other systems. Also, performance schema does not grow infinitely large. Instead, each row is recorded in a fixed size ring buffer. This means that when it's full, it starts again at the beginning. The SYS schema is another system database that's strongly related to performance schema. 06:49 Nikita: And how can the SYS schema enhance our monitoring efforts in MySQL? Perside: It contains helper objects like views and stored procedures. They help simplify common monitoring tasks and can help monitor server health and diagnose performance issues. Some of the views provide insights into I/O hotspots, blocking and locking issues, statements that use a lot of resources in various statistics on your busiest tables and indexes. 07:26 Lois: Ok… can you tell us about some of the features within the broader Oracle ecosystem that enhance our ability to monitor MySQL? Perside: As an Oracle customer, you also have access to Oracle Enterprise Manager. This tool supports a huge range of Oracle products. And for MySQL, it's used to monitor performance, system availability, your replication topology, InnoDB performance characteristics and locking, bad queries caught by the MySQL Enterprise firewall, and events that are raised by the MySQL Enterprise audit. 08:08 Nikita: What would you say are some of the standout features of Oracle Enterprise Manager? Perside: When you use MySQL in OCI, you have access to some really powerful features. HeatWave MySQL enables continuous monitoring of query statistics and performance. The health monitor is part of the MySQL server and gathers raw data about the performance of queries. You can see summaries of this information in the Performance Hub in the OCI Console. For example, you can see average statement latency or top 100 statements executed. MySQL metrics lets you drill in with your own custom monitoring queries. This works well with existing OCI features that you might already know. The observability and management framework lets you filter by resource type and across several dimensions. And you can configure OCI alarms to be notified when some condition is reached. 09:20 Lois: Perside, could you tell us more about MySQL metrics? Perside: MySQL metrics uses the raw performance data gathered by the health monitor to measure the important characteristic of your servers. This includes CPU and storage usage and information relevant to your database connection and queries executed. With MySQL metrics, you can create your own custom monitoring queries that you can use to feed graphics. This gives you an up to the minute representation of all the performance characteristics that you're interested in. You can also create alarms that trigger on some performance condition. And you can be notified through the OCI alarms framework so that you can be aware instantly when you need to deal with some issue.  10:22 Are you keen to stay ahead in today's fast-paced world? We've got your back! Each quarter, Oracle rolls out game-changing updates to its Fusion Cloud Applications. And to make sure you're always in the know, we offer New Features courses that give you an insider's look at all of the latest advancements. Don't miss out! Head over to mylearn.oracle.com to get started. 10:47 Nikita: Welcome back! Now, let's dive into the key features of HeatWave, the cloud service that integrates with MySQL. Can you tell us what HeatWave is all about? Perside: HeatWave is the cloud service for MySQL. MySQL is the world's leading database for web applications. And with HeatWave, you can run your online transaction processing or OLTP apps in the cloud. This gives you all the benefits of cloud deployments while keeping your MySQL-based web application running just like they would on your own premises. As well as OLTP applications, you need to run reports with Business Intelligence and Analytics Dashboards or Online Analytical Processing, or OLAP reports. The HeatWave cluster provides accelerated analytics queries without requiring extraction or transformation to a separate reporting system. This is achieved with an in-memory analytics accelerator, which is part of the HeatWave service. In addition, HeatWave enables you to create Machine Learning models to embed artificial intelligence right there in the database. The ML accelerator performs classification, regression, time-series forecasting, anomaly detection, and other functions provided by the various models that you can embed in your architecture. HeatWave can also work directly with storage outside the database. With HeatWave Lakehouse, you can run queries directly on data stored in object storage in a variety of formats without needing to import that data into your MySQL database. 12:50 Lois: With all of these exciting features in HeatWave, Perside, what core MySQL benefits can users continue to enjoy? Perside: The reason why you chose MySQL in the first place, it's still a relational database and with full transactional support, low latency, and high throughput for your online transaction processing app. It has encryption, compression, and high availability clustering. It also has the same large database support with up to 256 terabytes support. It has advanced security features, including authentication, data masking, and database firewall. But because it's part of the cloud service, it comes with automated patching, upgrades, and backup. And it is fully supported by the MySQL team. 13:50 Nikita: Ok… let's get back to what the HeatWave service entails. Perside: The HeatWave service is a fully managed MySQL. Through the web-based console, you can deploy your instances and manage backups, enable high availability, resize your instances, create read replicas, and perform many common administration tasks without writing a single line of SQL. It brings with it the power of OCI and MySQL Enterprise Edition. As a managed service, many routine DBA tests are automated. This includes keeping the instances up to date with the latest version and patches. You can run analytics queries right there in the database without needing to extract and transform your databases, or load them in another dedicated analytics system. 14:52 Nikita: Can you share some common use cases for HeatWave? Perside: You have your typical OLTP workloads, just like you'd run on prem, but with the benefit of being managed in the cloud. Analytic queries are accelerated by HeatWave. So your reporting applications and dashboards are way faster. You can run both OLTP and analytics workloads from the same database, keeping your reports up to date without needing a separate reporting infrastructure. 15:25 Lois: I've heard a lot about HeatWave AutoML. Can you explain what that is? Perside: HeatWave AutoML enables in-database artificial intelligence and Machine Learning. Externally sourced data stores, such as sensor data exported to CSV, can be read directly from object store. And HeatWave generative AI enables chatbots and LLM content creation. 15:57 Lois: Perside, tell us about some of the key features and benefits of HeatWave. Perside: Autopilot is a suite of AI-powered tools to improve the performance and applicability of your HeatWave queries. Autopilot includes two features that help cut costs when you provision your service. There's auto provisioning and auto shape prediction. They analyze your existing use case and tell you exactly which shape you must provision for your nodes and how many nodes you need. Auto parallel loading is used when you import data into HeatWave. It splits the import automatically into an optimum number of parallel streams to speed up your import. And then there's auto data placement. It distributes your data across the HeatWave cluster node to improve your query retrieval performance. Auto encoding chooses the correct data storage type for your string data, cutting down storage and retrieval time. Auto error recovery automatically recovers a fail node and reloads data if that node becomes unresponsive. Auto scheduling prioritizes incoming queries intelligently. An auto change propagation brings data optimally from your DB system to the acceleration cluster. And then there's auto query time estimation and auto query plan improvement. They learn from your workload. They use those statistics to perform on node adaptive optimization. This optimization allows each query portion to be executed on every local node based on that node's actual data distribution at runtime. Finally, there's auto thread pooling. It adjusts the enterprise thread pool configuration to maximize concurrent throughput. It is workload-aware, and minimizes resource contention, which can be caused by too many waiting transactions. 18:24 Lois: How does HeatWave simplify analytics within MySQL and with external data sources? Perside: HeatWave in Oracle Cloud Infrastructure provides all the features you need for analytics, all in one system. Your classic OLTP application run on the MySQL database that you know and love, provision in a DB system. On-line analytical processing is done right there in the database without needing to extract and load it to another analytic system. With HeatWave Lakehouse, you can even run your analytics queries against external data stores without loading them to your DB system. And you can run your machine learning models and LLMs in the same HeatWave service using HeatWave AutoML and generative AI. HeatWave is not just available in Oracle Cloud Infrastructure. If you're tied to another cloud vendor, such as AWS or Azure, you can use HeatWave from your applications in those cloud too, and at a great price. 19:43 Nikita: That's awesome! Thank you, Perside, for joining us throughout this season on MySQL. These conversations have been so insightful. If you're interested in learning more about the topics we discussed today, head over to mylearn.oracle.com and search for the MySQL 8.4: Essentials course.  Lois: This wraps up our season on the essentials of MySQL. But before we go, we just want to remind you to write to us if you have any feedback, questions, or ideas for future episodes. Drop us an email at ou-podcast_ww@oracle.com. That's ou-podcast_ww@oracle.com. Nikita: Until next time, this is Nikita Abraham… Lois: And Lois Houston, signing off! 20:33 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.

YES, BRAND with Hersh Rephun
Trish Tonaj on Creativity, Mentorship, and Thriving as an Entrepreneur

YES, BRAND with Hersh Rephun

Play Episode Listen Later Nov 27, 2024 26:10


Trish Tonaj is an author, artist, and the Founder/Host of shareyourstories.online. A passion project built on a platform of mentorship and breaking barriers to success, SYS features global entrepreneurs and enterprise leaders sharing their best ideas. In 2024, the SYS Community introduced Marketing Grants “Funding for Entrepreneurs by Entrepreneurs.” Trish is the author of two books, "Breaking Barriers: 10 Entrepreneurial Women Share Their Stories" and "A Diary of Change: 12 Personal Tools." She is now trading pen for paintbrush, creating original works of art and adding a splash of colour wherever possible. As a podcast host, Trish introduces the person behind the logo on Business Mentorship: Keepin' It Real, which recently crossed the 200-episode mark. In 2024, Trish was named “Leader of the Year” by Women Changing the World in the Americas."

From the Studio
From the Studio: Spokane Youth Symphony

From the Studio

Play Episode Listen Later Nov 15, 2024 23:48


A talk with SYS conductor, Roberta Botelli

Computer Talk with TAB
Computer Talk 8-31-24 HR 2

Computer Talk with TAB

Play Episode Listen Later Aug 31, 2024 50:16


Erik's outlook issue continues,   Looking at using Proton Mail, Router issues need an option, What cell phone should I consider, Sys-admin Ransoms his own company, My Samsung will not boot, My Printer will not print,

Oracle University Podcast
Database Security: Part 2

Oracle University Podcast

Play Episode Listen Later Aug 13, 2024 20:23


In this episode, hosts Lois Houston and Nikita Abraham continue their exploration of Oracle Database 23ai's database security capabilities. They are joined once again by Ron Soltani, a Senior Principal Database & Security Instructor, who delves into the intricacies of the new hybrid read-only mode for pluggable databases, the flexibility of read-only users and sessions, and the newly introduced developer role. They also discuss simplified schema-level privileges and the integration of Azure Active Directory with Oracle Database.   Oracle MyLearn: https://mylearn.oracle.com/ou/course/oracle-database-23ai-new-features-for-administrators/137192/207062   Oracle University Learning Community: https://education.oracle.com/ou-community   LinkedIn: https://www.linkedin.com/showcase/oracle-university/   X: https://twitter.com/Oracle_Edu   Special thanks to Arijit Ghosh, David Wright, and the OU Studio Team for helping us create this episode.   ---------------------------------------------------------   Episode Transcript:   00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative  podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:26 Lois: Hello and welcome to the Oracle University Podcast. I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me today is Nikita Abraham, Principal Technical Editor. Nikita: Hi everyone! In our last episode, we discussed database security, why it is so important, and all its different components. Today, we're going to be continuing that conversation by looking at all the new features related to database security that have been released in Oracle Database 23ai, previously known as 23c.  00:59 Lois: And we're so happy to have Ron Soltani back as our guide. Ron is a Senior Principal Database & Security Instructor with Oracle University. Hi Ron! Thanks for joining us again! We have a list of the new features related to database security and we'd like to ask you about them one by one, starting with the new mode for pluggable databases. What's that about?  01:21 Ron: With the hybrid read-only mode for pluggable database, the database could be in the read/write mode or read-only mode, depending on the user that is actually connected. So one of the things we have to realize is the regular read-only mode has one major issue. The major issue is everything, including data dictionary, including SysAux and all of the other elements are also locked up read-only.  So we cannot do any database maintenance. We cannot collect statistics to monitor anything. So you pretty much have to hard tune everything for the load you want and maintain everything. And this happens in many warehouse environments, in environments where the data itself is generally loaded. And then just heavily read. So it requires to be in a read-only mode to protect it.  So with a hybrid read-only mode, if you are a local user in the PDB, even a PDB administrator-- so I can create a local user in the PDB as a PDB administrator. And grant that PDB administrator even sysdba privilege. But once the PDB is open hybrid read-only mode, even for that user, the PDB is read-only. However, if a common user connect, who is, as you know, is a CDB user. Generally, CDB-level privileges granted and considered CDB administrators.  If they connect to the PDB, then the PDB is actually in read/write mode. So now, they can take snapshots. They can use all of the database tools to monitor how things are going. They can perform maintenance. So this allows us to be able to perform patching, maintenance, and other database-related operation. 03:17 Nikita: So you don't have to flip back and forth between read-only, read/write, read-only, read/write…  Ron: Because you know if we have database read/write to go to read-only, generally, we would have to shut down the database, then go to read-only. Then from read-only, we can go to read/write. But then going back to read-only, we have to shut down again.  Lois: Which was the issue with the normal read-only on the pluggable database, right? I'm glad that's been made easier. Ok… Moving on to the next new feature, which is read-only users and sessions. What can you tell us about this one, Ron? 03:51 Ron: As we previously discussed, you can put the PDB in the hybrid read-only mode. But then now the PDB is read-only for all local application users. However, let's say we have an environment where you have multiple application users.  One needs to be able to perform maintenance and perform updates where other sessions who are just reading the data to protect against all security element, and then better performance and operation management. We are going to set up read-only.  So setting up read-only at the pluggable database, that can be very high level depending on the application need. So with the read-only users and session, this will give you capability of setting read-only either for a particular user.  So when the user connects, all the user can do is read-only process. We do a lot of testing, for example. And we have users that may have read/write privilege in the test environment, then we want to go ahead and perform other operation.  So we would have to take privileges away, set the read-only, then go back and change again to read/write. So performing all of those different type of tests and even with the development has always been an issue.  So having granular capability of managing at a user or a session level can give us a major benefit of better granularly managing all application needs without sacrificing either security or having extra components that would have to be done by administrators.  05:33 Nikita: Yeah, this gives you a lot of flexibility and you don't have to keep temporarily changing privileges or configuring specific types of sessions. It's also an easy way to control user behavior, right? Ron: An application, as we said, have the schema owner that today we want to have a schema-only user for the schema owner. That is usually nobody connect us.  But then we have multiple schema users that one may be used for performing updates, one is used for administration, and one can be used for read-only. So this can give me a mechanism to manage that, or if a particular operation needs to run and for security purposes, that particular session needs to be set to read-only. So that gives us major control over it.  And in the cloud environment, this can be a very, very good component for better managing all of the security levels, where you can enable very fine-grained control while supporting all functionality of the application.  06:39 Lois: Ok. So, can you tell us about this new developer role in the database?  Ron: If we think about application administration, usually we create a schema owner. And we start by giving that the schema owner privileges-- grant them a resource role. By having resource role, they can create simple objects. But when you design an application, you need to implement it, test that, and then deploy it.  Today, there are many, many complex objects that can be used at the application level to manage the application. So today, we grant the resource role to the schema owner. Then we wait until they complain. They don't have privilege for certain object they want to create. Then we're going to have to grant them privileges as needed, and that used to be the way the security had worked.  But today since we have a schema only account where we can only enable the account when we want to do any type of schema work, and then it's locked up so the schema is protected, giving the schema owner the application role, the DB application role, now that has all the privileges in it, should not cause any security issue when managed properly, and will provide them with all of the privileges that they need to perform their work, including there are many complex schema structure like analytical views, hierarchies, dimensions, data-specific types that you can create.  And many of these type of privileges are not just assigned through a regular privilege assignment. Some of them are assigned through procedures.  08:21 Lois: And could you give us some examples of how this feature could be used? Ron: So there are many different ways of granting all of these granule privileges. So at the time that we go ahead and perform development of the schema and all of that depending on what's available, we don't know really what privileges do we need.  And as we said, there are many packages that we may be able to use to create complex objects that then gradually have to go ahead and get privileges on executing those packages and to be able to use them. And as we said at the time we actually performed the application, many of these objects, we may not even know we're going to use them until later on becomes evident or it may be a better structure to represent what we want.  So having to add and continuously deal with these type of changes can become extremely kind of cumbersome and tedious. It also delays all of the operations, especially now that the application schema owner can be secured. So we can grant this developer role to the schema owner, give the schema owner all privileges that is needed very quickly that they can now manage their schemas and manage all complex objects for that schema operation.  So the role is called db developer role. And just like any other role, you would connect as an administrator, grant db developer role to the schema owner. Now, we don't need to grant the resource role and all other things, because everything here is included in the db developer role.  10:01 The Oracle University Learning Community is an excellent place to collaborate and learn with Oracle experts and fellow learners. Grow your skills, inspire innovation, and celebrate your  successes. All your activities, from liking a post to answering questions and sharing with others, will help you earn a valuable reputation, badges, and ranks to be recognized in the community. Visit www.mylearn.oracle.com to get started. 10:28 Nikita: Welcome back! Ron, how have schema-level privileges been simplified in 23ai?  Ron: To be able to understand this, first we can review the privilege assignment in Oracle Database. First, you can be granted a privilege at an object level, so you can perform certain work on a particular object.  However, let's say I have a user account that I'm going to use an app user who's going to have to read from multiple objects within a particular schema. Now this granting at the object level is too low because I have to go at each object and assign the privileges needed on that particular object to the user.  Or we had our system privilege, for example, grant create any table to a user. The problem with that is now you can create any table within the schema that I want you to work with. But that privilege goes across all the schemas in the database, of course, not the database schemas itself-- those are protected, but across all user schemas.  11:34 Lois: Right. So, you're getting that privilege on other schemas that you may not really need that privilege for... Ron: So now the gap is kind of met with creating a schema-level privilege that allows you to grant the same any privilege but on all objects of a particular schema and not granted across all the schemas.  So this now allows us to much better be able to manage schemas, have schema user accounts with different level privileges on all the objects that they need to perform the type of work that they need to, without having to granularly assign each one of those privileges as we used to create many different roles with different privileges needed, then try to control the users by granting them those roles. Here, these are much better simplified by going through the schema-level privilege.  12:34 Nikita: Ron, I want to ask you about the new feature on creating audit policies at the column level. Ron: So if you remember, in the past, we talked about we can create audit policies with the old system where you would identify what to audit. But then you had to manage a whole bunch of parameters and security. And protecting audit even from the administrator were major issues.  In 12, Oracle identified or added the unified audit, which gives you protection on the audit schema. Even administrators cannot access it. You manage it through privileges that are assigned specifically to users who are going to manage the audit.  And it also allow you to audit Oracle operations, tools like Data Pump, like RMAN. So you can create a really secure audit environment monitoring everything in the database using unified audit and then maintain and manage those audits.  One of the important aspect of auditing is generating the minimal amount of audits. So this way, audits can be reviewed because if you generate too much audit, it is very hard to automate either using an automated system to review the audits or having users to review those audits.  Furthermore, if we wanted to then audit specific columns and different operation like SELECT, DML, we would have had to use the row-level security and build additional policies to be able to then individually monitor those columns, which not very simple to use and manage. And then the audits are put in different tables. Having to maintain all of those, relate them has always caused major issue overall.  So the benefit of having now this column-level audit added to the normal unified audit policies is that you can go ahead and build now your audits instead of at the table level, only for a particular column. This is going to reduce the false positive results that are generated because if I'm going to put update on a table, not updating any column can generate an audit.  But if I put update on the column salary, then only if the salary is updated, the audit is generated. So that can give me just the audits that are needed without the additional false positive audits that are generally generated.  15:08 Lois: Ron, can you talk to us about the management of authorization for Unified Audit administration, especially when using Database Vault? Ron: So first as we know for the Unified Audit, you have audit admin privilege and audit viewer privilege.  If you want to be able to create and administer and manage all of the audit information, including the audit purging and time periods and all of that, you have to have audit admin privilege. If you want to be able to read and generate the reports or things like that from the audits that have been created, you have to have audit viewer privilege.  Now we also have Oracle Database Vault. Database Vault kind of uses a row level security, but not on the end user data. It applies this row level security and administration on Oracle data dictionary. And allows you to control when particular object can be used, at what level can they be used?  And give you complete control over how the actual database and the objects are used and become available to other users in the database, including other administrators, even schema owners. So when the Database Vault is then applied and enabled, in the past, we could have managed the Unified Audit, which was kind of very funky to put one of the major security functions outside the main security Administration utility of the database.  So now, the Unified Audit has been incorporated into the Database Vault. So you can now use Database Vault to go ahead and set up the privileges and configuration for the authorizations required for managing Unified Audit. This also controls all the high-level users, including SYS, SYSTEM, and anyone who may have DBA roles or other high-level privileges.  So this allows us to now enable the Database Vault, and then manage the authorizations for the Unified Audit through Database Vault. Therefore, all authorization administration is unified under the same security tool, which is Database Vault.  17:28 Nikita: The final new feature to discuss is the integration of Microsoft Azure Active Directory with the Oracle database environment. What can you tell us about it, Ron? Ron: This has been requested by many of the clients who use other platforms and active directories and then need to access either the Oracle OCI, Oracle Cloud where the databases are running or having Oracle databases even in a local environment.  So wanted to be able to now allow this to happen. So if you remember, originally we had capability of mapping users from the database into Oracle Active Directory. So this way the user's role privileges can be centrally managed and the user does not inherit any privileges in the database. So if the user directly connect to database, has no privileges. Connect properly through Active Directory, everything enabled.  Then in Database 18, they created the commonly managed users, the CMUs. Where we could now map a third party Active Directory and then be able to use that into connecting to Oracle database for authentication and user administration. However, many of our clients use Microsoft Azure Active Directory. And they wanted to be able to integrate that particular Active Directory into Oracle environment, especially in the Oracle OCI Database as a service environment.  So to be able to do that, Oracle has multiple components that they have built to allow this to be able to now be configured and used. So the client can use these Active Directory for their user administration centrally.  19:20 Lois: With that, I think we've covered all the new features related to database security in 23ai. Thanks so much for taking us through all of them and giving us some context. Nikita: Yeah, it's really been so helpful. To learn more about these new features and watch some demonstrations on them, visit mylearn.oracle.com and search for the Oracle Database 23ai New Features for Administrators course. Join us next week for a discussion on some more Oracle Database 23ai new features. Until then, this is Nikita Abraham… Lois: And Lois Houston signing off! 19:54 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.

Oracle University Podcast
Database Security: Part 1

Oracle University Podcast

Play Episode Listen Later Aug 6, 2024 21:00


Join hosts Lois Houston and Nikita Abraham, along with Senior Principal Database & Security Instructor Ron Soltani, as they dive into the critical topic of database security. In the first of a two-part series on database security in Oracle Database 23ai, they discuss the importance of protecting data against external and internal threats, common security risks like phishing and SQL injection, and the principle of least privilege.   Oracle MyLearn: https://mylearn.oracle.com/ou/course/oracle-database-23ai-new-features-for-administrators/137192/207062   Oracle University Learning Community: https://education.oracle.com/ou-community   LinkedIn: https://www.linkedin.com/showcase/oracle-university/   X: https://twitter.com/Oracle_Edu   Special thanks to Arijit Ghosh, David Wright, and the OU Studio Team for helping us create this episode.   --------------------------------------------------------   Episode Transcript:   00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative  podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:26 Nikita: Hello and welcome to the Oracle University Podcast. I'm Nikita Abraham, Principal Technical Editor with Oracle University, and joining me is Lois Houston, Director of Innovation Programs. Lois: Hi there! In case you missed last week's episode, we've begun a new season of the podcast, talking about all the new features in Oracle Database 23ai. We covered blockchain tables and new features, and today's episode is going to be one of two that will be dedicated to database security. Nikita: Right, Lois. So, in Part 1, we want to set the scene, so to speak, by looking at an overview of database security so that when we discuss some of the new features, we'll know exactly where they actually fit into the process. Joining us for these two episodes is Ron Soltani. Ron is a Senior Principal Database & Security Instructor with Oracle University.  01:16 Lois: Hi Ron! Thanks for being with us today. To start off, let's discuss the importance of database security. Why is database security so critical today? Ron: Security requirements, describes the need for keeping things private and make sure that we protect against threat, against data destruction. We also have, today, data that is global. Therefore, there is consolidation of the data. There is globalization.  There is data sourcing, locational, where the data is actually located, rules opposed by different governments, and guidelines that enforce a certain type of security administration on the data. And finally, there are many different companies or organizations that actually come up with either guidelines or rules that must be followed for security aspect that we must set up and build compliance.  02:24 Nikita: Ron, what are some of the common security risks that databases face?  Ron: Security risk can include external threats that could be unauthorized users trying to use phishing, get privileged user information, and get in as a privileged user to do whatever damage they want. Denial-of-service attack, one of the most common attacks out there where the attackers just create or attack the components, like a listener, for example, in a database, and cause a situation where the listener can no longer establish connection to the database. So now no client can connect to the database to get data, which is that denial-of-service attacks.  Having unauthorized access to the data-- so again, this is generally done through phishing or sometimes even SQL injection. SQL injection also allows you to insert SQL statement in the application where it's not expected, where it can then convert into an executable in the database and then have unwanted data returned for the user.  03:42 Nikita: Sorry, can you explain that? Ron: For example, when you go to Google, you want to run a search. They expect you to say, meaning of a particular word.  Now, what if I knew the structure of the data organization in Google? And instead of just putting in meaning of whatever word, I actually plug in a SQL statement that then passed along to the Google system to be executed. And then that SQL, if the components and everything exist and within the privileges of what is being executed, could expose some information to me. So that's the idea with being able to perform that type of operation.  04:24 Lois: Ok. So, those are external threats. But, could you also have internal threats? Ron: Internal threat could be abused by someone who is privileged, could be sabotage of the system and the data. It could be data complexity that creates an environment where data is not properly being secured and even accidental damage. It's a security issue.  And then finally, if there is a damage, we do need to be able to perform recovery. So we create backups and data access in those. Therefore, those recovery information must be properly secured. And finally, the omission, being able to block access or cause issues with the data. Then having external threats coming in through the internal abuse, so internal abuse could actually open door to allow external threats to get in.  Now, the final type of security risk could be coming in from partners who have privilege to be able to load or access and get data. For example, I may sell a particular product. But the product description is actually coming from the product distributor.  05:47 Nikita: Yeah, so they have access to push that product information into your system. So, what are the typical points of attack for a database? I'm familiar with phishing. Ron: People send you emails or do something to be able to get information from the pieces and things that come back. For example, this is one of the reason for many operation. We would return false error messages. Like in Oracle database, if you don't have privilege on the table and you try to select it, we tell you a table or a view does not exist. So this way, you don't know if it's a table, you don't know if it's a view. And as far as you know, it doesn't exist. So the name you have does not correspond to any particular data.  06:32 Nikita: That's clever! Ron: If we would tell you don't have privilege, now you know the name of this table exists. So now I just got to find a way of hacking the table. So this is basically phishing means, extracting different pieces of information through different channels, being able to put them together.  Then in database, we have some privilege known accounts that if not protected can be a vulnerable access. The back doors into the database. For example, somebody being able to get to the operating system DBA group, and then connect to the database without user ID and password.  That's why we have to protect every layer. Any debug codes that may be available that could reference how the operation of the system is actually going. Creating cross-scripting between the different data and then operations that goes on. And as we talked about, SQL injection.  07:28 Lois: Can you dive a little deeper into SQL injection, Ron? Ron: With SQL injection, you kind of have to understand that, in general, SQL injection means somebody, like we said, knows the structure of something, knows the structure of the way the application is operating, and then be able to inject a SQL statement where they would generally put a condition or pass some parameters or some information to the application.  So, then that SQL statement becomes part of that statement and submitted to the database. Now, we need to understand SQL injection is not about the person, is not about generally your overall configuration of the database.  The most important aspect of SQL injection is about the session that is actually doing the work. For example, if I am a DBA and I am going to collect statistics for a table. If I connect a SYS DBA to collect that statistics and somebody hacks into my session and inject a SQL drop database. Database gone, because the session has SYS DBA privilege.  But if I have a user that only has create session privilege and execute a script. And in this script, I write the statement to collect statistics and I give that script only the privilege to collect stats. So now I can connect as that user with that minimal privilege, just execute the script.  So now anyone inject any SQL into the session, that will never be executed because the session has no privilege. So this is the important of SQL injection for us to understand that the importance is what happens at the session level.  And many of the security element we will see, like read-only session, hybrid read-only PDB and things like that are related into this type of SQL injection or abuse.  09:30 Lois: Yeah, we are looking forward to talking through those new features in the next episode. Ron: So the common vulnerabilities can be exploited, and also any of the users that are part of the operations that can be set up into the string and supplied into middle of statements and things like that.  09:56 Did you know that Oracle University offers free courses on Oracle Cloud Infrastructure? You'll find training on everything from cloud computing, database, and security, artificial intelligence and machine learning, all free to subscribers. So, what are you waiting for? Pick a topic, leverage the Oracle University Learning Community to ask questions, and then sit for your certification. Visit www.mylearn.oracle.com to get started. 10:25 Nikita: Welcome back! One of the concepts I wanted to ask you about, Ron, is the principle of least privilege. Can you explain what it really means? Ron: Principles of least privilege, again, means the work that needs to be done has to have minimal privilege.  10:40 Nikita: But, we've always thought about that, right? Giving a user minimal privileges… Ron: Well, back in the old days, we used to execute everything as a schema owner.  Therefore, we had privilege on all the data. Then we said, OK, let's create schema users and only give them like a read privilege or this privilege. So they can only do the type of work they need to do, which is fine.  But at the same time, that can be very complex. Now I need a lot of different users and whatnot. So when it comes to principles of least privilege, this is generally about only installing whatever software that is required. Only enable or turn on whatever machines and segments that is going to be used.  Have proper operating system level users and privileges configured for all of the software that is installed at the operating system level. Have proper administrator account that are properly maintained. Set up privilege user account for each operation.  So when we do maintenance and database administration, we are not creating very high-level privileged session. That's why some of the differences privileges was created in database 12 and up, like Sys backup, Sys DG, Sys RAC. So you don't inherit the privilege as Sys DBA to actually do the work. You only have privileges for what you need.  And, of course, limit the user's access to particular object and things that they need to do. However, as I mentioned, this is not just about the user level. This is also about the session level. If I'm going to do maintenance and I'm connecting as a schema owner, somebody inject a SQL drop table, table gone. So that's why it is very important for us to be able to have control over how sessions can also operate within the database.  12:34 Lois: Right, so, what about the strategy of defense in depth? Ron: Defense in depth. That means we have to strengthen and apply security at every level, whether it being at the securities applied at the operating system in the database, in the application, in the network.  So we have to have policies defining all the different security levels. Most important, train users. So no mistakable damages. Harden every component, including the operating system. Set up proper firewalls.  Set up proper network security, like use of the Oracle firewall that protects against unwanted SQL statements. We can compare SQL statement to a whitelist of acceptable statements. And then other database security features like VPD, the auditing as we will talk about, and other components to give you an overall very secure environment.  13:35 Nikita: Ron, what are the fundamental aspects of managing security only within the database… not including the operating system or the application?  Ron: So first, we have to have confidentiality. Confidentiality means that we need to make sure that all of the data is properly secured at a data level, whether it be both at the storage level, in the database for data usage, and we have many different ways of doing confidentiality management.  Number one, properly creating users, maintaining users with the proper password through proper authentication. And then setting up authorization that privileges may not be enough because if I give you select privilege, you can see every column, every row.  So I may need row level security, data redaction, data masking for duplication, and other mechanism to help us manage even subset of data for that particular security.  14:35 Lois: Ok… so that's confidentiality. What's next? Ron: Data integrity means that we need to make sure that data is not destroyed, whether it being addressed in the database, in memory, in data file, in backup, in exports, or during transmission in the network.  So we usually apply encryption and check-summing not only to protect the data, but also to validate, make sure it's not corrupted.  Next data availability, which means today, especially, we are 24/7 operation. And remember we talked about denial of service attack on a database. That usually attacks on the listener, because if the listener is crashed, nobody can connect.  We have to then utilize available tools and components like RAC to have multiple instances in case a particular host crashes. And I lose a particular instance. Data Guard in case my storage and a whole database crashes. The PDB and real-time PDB management with duplication, having a PDB standbys that are maintained and managed behind the scene. Using PDB snapshots, which are point in time. Preserve data that I can use it for restoring data at those particular point in time.  Backup recovery through RMAN or other backup recovery processes. So in case data is damaged, I can restore it and recover it. And finally, auditing. Auditing historically was always known as after effect.  16:09 Nikita: That's what I was wondering… You only see what's going on after something happens, right?  Ron: It also can be a deterrent when people know they are being audited, they're more careful, don't make mistakes. Try not to, of course, do anything you get caught. And today, this auditing can also be set up in a way that it cannot only catch what is going on. It can actually help us better secure data and have much better responses.  Now the problem with auditing has always been the overhead. That's why the unified audits that provides us with much less overhead for management can give us an extreme detailed audits. And then the new features allows us to even more reduce the amount of audits that are generated by only auditing at the column level and better protection for those audits.  By the way, in the older days, most auditing was done at the app, because we never knew who the end user the app is. But today with being able to have Active Directory mapped into the database and information passed between the two, all audits can actually come back centrally to the database.  17:21 Lois: So, to wrap up today's conversation, Ron, can you just summarize database security for us? All the things we need to think about. Ron: So database security starts with making sure, number one, our network is secure and we are accessing the data through a very secure connection coming in from the user.  If required to be, could have a three-tier environment where the clients go through a first external firewall to get to the middle tier. Then from the middle tier go through internal firewall to get to the database, or if this is like a direct access and things like that, setting up secure network coming in through that like for administration, remote administrations, and operations.  Then, setting up proper authentication and authentication management, configuring detail, access control and setting up multiple level of security for data accesses, not just at the table level, even at the row and column level.  And building a complete data confidentiality by not only adding in storage encryption and all of the management of the data, even on components sitting outside the database, of course, we have Oracle components that can manage some of those for you, like sample backups, RMAN, and things like that.  And to get this complete data confidentiality, you also add in, as we said, an efficient auditing that can then describe any issues, tell us where the problem is, how it happened. And if we set up an audit system that is very focused, then we can even tie it up to triggers, to notifications.  So they're very quickly responded to, because the problem with audits has always been there is just way too much of them, therefore nobody ever reviews them to see exactly what has happened. So many vulnerabilities may go on detected until a major damage happens.  And that's how you can know that this is common out there in a lot of businesses when you hear in the news. And so and so company was broken in and so much data was stolen. Well, if proper security were set up and the network is being hacked in and proper alert system and automated system were configured to be able to catch these in a proper auditing real-time, then maybe corrective action could have stopped a lot of those damages.  20:04 Nikita: Thanks for that wonderful overview, Ron. In our next episode, we're going to go through each of the new security features and try to understand how Oracle is tightening the screws around security. Lois: And if you want to learn more about what we discussed today, visit mylearn.oracle.com and search for the Oracle Database 23ai New Features for Administrators course. Until next week, this is Lois Houston… Nikita: And Nikita Abraham signing off! 20:31 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.

Pyöreä pöytä
Lenin ja Stalin toisivat turisteja? Oikeusvaltio riippuu poliittisista suhdanteista? Miksi media toistellut "tarkkailuluokkaa"?

Pyöreä pöytä

Play Episode Listen Later Apr 24, 2024 30:00


Suoraa puhetta johtaa tällä kertaa Ruben Stiller. Keskustelijoina ovat Kaarina Hazard, Anu Koivunen ja Maija VIlkkumaa. Ruben kysyy aluksi: Minkä yhteiskunnallisen keskustelun toivoisitte presidentti Alexander Stubbin aloittavan? Kaarina Hazard haluaa kysyä yhteisestä muistamisesta. Sysäys tähän on uutinen Tampereen Lenin-museon lopettamisesta. Pitääkö ikävät vaiheet kumittaa pois? Vai kertoa koko maailmalle? Anu Koivunen puhuu oikeusvaltiosta ja oikeusministeri Leena Merestä. Häntä kiinnostaa, onko kyse oikeusvaltion rapauttamisesta vai enemmistöparlamentarismista. Maija Vilkkumaa pohtii tarkkailuluokkaa eli EU:n alijäämämenettelyä. Miksi media on toistellut "tarkkailuluokkaa" ? Miksi suomalaiset haluavat olla malliopppilaita?

Share Your Screen
The Disastrous Demise of Kylie Cosmetics

Share Your Screen

Play Episode Listen Later Apr 1, 2024 44:47


Hii! WELCOME BACK! We apologize for our ~short hiatus~. We had a video file COMPLETELY corrupt and destroy an entire video :( This week on SYS we are diving into the Rise & Demise of Kylie Cosmetics, and the entirety of the Kardashian/Jenner brand. 5 years ago, the name "Kylie Jenner" was synonymous with internet fame. Every product she used, song she listened to, or food she ate instantly turned to gold. Yet in 2024, every single business she has is struggling. In fact, Kylie Costmetics has seen a decrease in revenue every year for the past 7 years... When did the "magic" of Kylie die? Was it replaced by someone else? Is there any way to get it back? We answer all of these questions and more in this episode of Share Your Screen. Infamous Podcast on Kylie Jenner w/ Forbes Reporter: https://open.spotify.com/episode/1bO9...

Share Your Screen
Dune 2 EXPLAINED (Book vs Movie)

Share Your Screen

Play Episode Listen Later Mar 4, 2024 43:02


**THIS EPISODE IS 95% SPOILER FREE** (minor details discussed but no major plot lines revealed) Welcome back to the SYS podcast! This week we are diving into the world of Dune 2, and why we believe it to be one of the greatest sci-fi stories ever told. Great story telling always boils down to one thing. "How are you able to connect with an audience?" The magic of Dune is exactly that. It is a story filled with symbolism and metaphor to mirror our modern age. Dune is filled with political conflict, battles over commerce and resources, impacts of religion & technology, and so much more. The movies are an absolute masterpiece. However, the world is so expansive and deep that they left a LOT of information out from the books. The purpose of this video is to fill that gap and give a better understanding of the dune world to have a greater appreciation for the film FOLLOW US ON YOUTUBE: https://www.youtube.com/watch?v=yiMEWagQVMw #Dune2 #dunemovie #timotheechalamet #zendaya

Behind The Headlines
How Are Riverhead Developers Influencing Code Changes?

Behind The Headlines

Play Episode Listen Later Feb 3, 2024 53:30


This week on Behind the Headlines, the panel discusses reforms to the state IDA law; Riverhead developers influencing code changes; a Hampton Bays school financial literacy program; a possible strike at Peconic Bay Medical Center; and suspension of pickleball play at SYS.Joseph P. Shaw, Executive Editor, The Express News GroupBill Sutton, Managing Editor, The Express News GroupDenise Civiletti, Editor/Publisher, Riverhead LocalBeth Young, Editor/Publisher at East End BeaconGianna Volpe, Host of Heart of the East End, WLIW-FM

Battle4Freedom
Battle4Freedom - 20231206 - Sys. Theology - Church Part 7 - Worship in Spirit and Truth

Battle4Freedom

Play Episode Listen Later Dec 6, 2023 56:01


Sys. Theology - Church Part 7 - Worship in Spirit and TruthWebsite: http://www.battle4freedom.comNetwork: https://www.mojo50.comStreaming: https://www.rumble.com/Battle4FreedomSystematic Theology: An Introduction to Biblical Doctrinehttps://a.co/d/8qwRimrChapter 51: Baptism

Adafruit Industries
EYE on NPI - ADI/Maxim's MAX77789 Standalone 3.15A Charger

Adafruit Industries

Play Episode Listen Later Sep 28, 2023 12:32


This week's EYE ON NPI stands alone as a fantastic new solution for high power charging of large battery packs and also power boosting from battery to system: it's ADI/Maxim's MAX77789 Standalone 3.15A Charger (https://www.digikey.com/en/product-highlight/a/analog-devices/max77789-standalone-3-15a-charger), an all-in-one power management IC that lets you ditch DC power plugs and simplifies your BOM, at an excellent price. We'll also be covering the MAX77787 (https://www.digikey.com/short/wzv7095b) which is the fraternal-twin-sister product: using I2C instead of resistor settings for configuration. We've been covering USB Type C PD sinks and supplies for about a year here on EYE ON NPI & The Great Search, they're an excellent way to ditch those DC barrel jack power supplies (https://learn.adafruit.com/usb-pd-hacks/) and allow folks to use a single connector and standard power supply (https://www.youtube.com/watch?v=C90UnNAlCFQ) for various voltages, from 5V-20V at up to 5A. There's plenty of chips that will connect to a PD source and negotiate that voltage for you (https://www.youtube.com/watch?v=yQea9IEmf28) but now we can start to take advantage of USB PD for battery charging as well! This week's dynamic duo does pretty much everything for battery management. As devices get more complex, and battery cost goes down, the packs included in products are getting bigger. If you're trying to charge a 5Ah battery at standard 5V/1A rates, it will take at least 5-8 hours to do so, when folks really want 1-2 hour charge rates. The MAX77789 and MAX77787 have a buck converter that will deliver up to 3A to the battery for 3x faster charging. But, if you try to draw 3A from a USB 5V power cable, that built-in resistance will cause a voltage droop - remember we need at least 4.5V to have the headroom for charging up to 4.2V or 4.35V Lithium batteries. Thus, these chips use USB PD (https://learn.adafruit.com/understanding-usb-type-c-cable-types-pitfalls-and-more) to request higher voltages when available: 9V or 12V means that we can draw less current to get the same amount of power, which means less resistance loss over the cabling. For pre-C chargers, such as Samsung or Apple or Quick Charge (https://learn.adafruit.com/understanding-usb-type-c-cable-types-pitfalls-and-more) the USB D+/D- pins are used. In such cases where you want to have the data pins available for USB data/sync, you'll need something like the MAX20334 (https://www.digikey.com/short/p8b23vf3) data line switch to flip the pins back to your MCU. The MAX77789 uses resistors on the IFAST, ISET and INLIM lines to set the charge rate, timeout, and pack float voltage, the MAX77787 uses I2C. Both have a couple configuration pins, and LEDs for status monitoring. Both have the ability to also be turned into a boost converter - you can't use both charging and boosting at the same time, but since you can use the SYS voltage when connected to USB, you'll have at least 5V either way. The booster is fixed to 5.1V output. On the '89 the boost is enabled by GPIO, the '87 enables it over I2C. Both chips are available in 0.4mm pitch BGA - which means pad-in-via and multi-layer boards in order to pass the inner configuration traces out. Many of the traces are tripled-or-quadrupled to provide the current carrying capability of 3A charge and 6A peak discharge. An eval board is also available (https://www.digikey.com/short/4dc80hwz) which makes quick verification easy. For the I2C configuration version there's also desktop software to try out various settings - the standalone version has jumpers so you can attach any resistor value. Both the ADI/Maxim MAX77789 (https://www.digikey.com/short/j7zhtj4h) and MAX77787 (https://www.digikey.com/short/wzv7095b) Standalone/I2C 3.15A Chargers are in stock right now at DigiKey for immediate shipment. It's great to see forward momentum in chip design releases now that the shortages have abated: only a year ago we were scrambling for diodes and op-amps and now we have a wealth of great new products to choose from! Order one of these powerful Lithium battery management chips today and you'll have it shipped immediately so that you can start integrating it into your new design by tomorrow afternoon.

Colored Commentary
A Black Man Befriending the KKK and Converting Them! (w/ Daryl Davis)

Colored Commentary

Play Episode Listen Later Jul 25, 2023 72:08


Daryl Davis is a world-renowned musician and well-known for befriending several Ku Klux Klan members. Listen to his powerful story about how God is using him.  _____________________________Podcast Subscription LinksApple Podcast: coloredcommentary.com/appleSpotify: coloredcommentary.com/spotifyGoogle Podcasts: coloredcommentary.com/googleStitcher: coloredcommentary.com/stitcherIHeart Radio: coloredcommentary.com/iheartradio

Summon Your Superhuman Podcast
57. Feeling overwhelmed? Why & what can you do about it? #Realtalk with Ria Mestiza

Summon Your Superhuman Podcast

Play Episode Listen Later Jul 22, 2023 19:39


It's been a crazy month, have you felt the shifts and energetic changes in your body? Sometimes we can ignore these feelings in our bodies, but something feels different this time. Lets talk about what's been going on this last month and what you could also be potentially experiencing. As much as these "live chats" are out of my comfort zone, they feel necessary. If you're enjoying them and have a topic or question in mind for a future episode, please feel free to comment and make a suggestion via any of the SYS social channels.I'll get better at being more succinct in time just chatting away by myself, I'm quite comfortable chatting to guests, but solo chats are a different ballgame I'm still getting used to. Thank you for your patience and support as always.Hope you find this helpful. Til nextime superhuman!Much love, Ria MestizaPS- You might also find amethyst stone crystals helpful to hold or keep on you when you're feeling overwhelmed, anxious or nervous. I've been wearing a crystal bracelet with some other stones on it also all month :) 

Battle4Freedom
Battle4Freedom - 20230628 - Sys. Theology Chapters 9&10 - The Existence & Knowability of God

Battle4Freedom

Play Episode Listen Later Jun 28, 2023 56:01


Battle4Freedom (2023) Sys. Theology Chapters 9&10 - The Existence & Knowability of GodWebsite: http://www.battle4freedom.comNetwork: https://www.mojo50.comStreaming: https://www.rumble.com/c/Battle4FreedomStreaming LIVE on RUMBLE @ https://rumble.com/v2wsvgt-battle4freedom-2023-sys.-theology-chapters-9-and-10-the-existence-and-knowa.htmlBattle4Freedom (2023) Systematic Theology: An Introduction to Biblical Doctrinehttps://a.co/d/8qwRimrChapters 9-10Chapter 09: The Existence of GodA. Humanity's Inner Sense of GodB. Believing the Evidence in Scripture and NatureC. Traditional "Proofs" for the Existence of God 1. Cosmological argument 2. Teleological argument 3. Ontological Argument 4. Moral ArgumentD. Only God Can Overcome our sin and Enable us to be persuaded of His ExistenceChapter 10: The Knowability of GodA. The Necessity for God to Reveal Himself to usB. We Can Never Fully Understand GodC. Yet we can know God trulyAOG: Dr. Jason Lilse, Biblical Science Institute, God and sciencehttps://www.dailymail.co.uk/sciencetech/article-12238265/Humans-DID-live-dinosaurs-scientists-say.htmlHumans DID live with dinosaurs: New analysis of the fossil record suggests our ancestors briefly coexisted with the prehistoric giants

ChainLeak
Layer 2 Scalability: Rollux

ChainLeak

Play Episode Play 30 sec Highlight Listen Later Jun 28, 2023 40:20


In this episode, we discus Layer 2 Scalability: Rollux.With special guests Jag & Alex from the Syscoin team.We had a great conversation about the evolution of Rollux. The different advantages and disadvantages of legacy layer 2 protocols and how Rollux will improve the industry standard when it comes to a layer two solution. We discuss why Rollux is rooted in Bitcoin's PoW for unparalleled stability, scalability, and affordability, and how it brings Ethereum-compatible smart contract scaling to Bitcoin​​.Follow @RolluxL2 on Twitter!Disclosure: This episode is Presented by Rollux.disclosure.chainleak.comConnect with ChainLeak below!Twitter: https://Twitter.com/ChainLeakTelegram: https://T.me/ChainLeakWebsite: https://ChainLeak.comConnect with Joshuwa below!Twitter: https://Twitter.com/JoshRoomsburgTelegram: https://T.me/JoshRoomsburgTikTok: https://TikTok.com/@JoshRoomsburg

Truth Talks with Tara
How to Get A Book Published with Tara's Publisher and Editor

Truth Talks with Tara

Play Episode Listen Later Jun 6, 2023 39:00


Daniel, Tara's editor of Surrender Your Story, also associate publisher for Nelson Books, is on the podcast today! You're not going to want to miss this conversation - all about how Daniel discovered Tara, what it was like editing SYS, what he wished more people knew about this industry, and so much more. -- Have you gotten your copy of Tara's new book, "Surrender Your Story" yet? Click here to grab your copy: https://www.amazon.com/Surrender-Your-Story-Discover-Trusting/dp/1400239206/ref=sr_1_1?crid=5SKZQQA1TN4P&keywords=surrender+your+story&qid=1682355364&sprefix=surrender+your+sto%2Caps%2C189&sr=8-1 This episode is sponsored by/brought to you by Faithful Counseling. Give online therapy a try at faithfulcounseling.com/TRUTHTALKS and get on your way to being your best self. Subscribe to Tara's YouTube channel for video podcasts: https://www.youtube.com/c/TaraSun Connect with Tara on: Instagram: www.instagram.com/misstarasun Her website: www.tarasunministries.com Her Bible resource page: www.tarasunministries.com/recommended YouTube: www.youtube.com/c/TaraSun The free, email family: www.view.flodesk.com/pages/5f5293472c60490027bc8d16 Shop Tara's stickers: www.the-tara-sun-shop.myshopify.com/ Sponsor a child through Compassion: www.compassion.com/tarasun Learn more about your ad choices. Visit megaphone.fm/adchoices

10,000 Depositions Later Podcast
Episode 119 -Lessons from the Front Lines: The (Very) Fine Line Between Reserving the Right to Read – And Waiving It

10,000 Depositions Later Podcast

Play Episode Listen Later Apr 30, 2023 13:53


In this episode, Jim Garrity discusses a brand new court ruling where a judge held that requests to review a transcript before it's finalized must be made before the deposition is completed, failing which the request is untimely, even if made immediately after the deposition concludes. The order says defense counsel claimed to make the "read request" after the reporter announced "We're off the record" but while the reporter and all counsel were still logged in on a Zoom link. Even so, the court said, that's too late. Garrity talks about the significance of the ruling, and offers practice tips in the event you inadvertently miss your chance to make a timely request for review.SHOW NOTESCypress Property and Casualty Insurance Company v. Jallad & R Investments, LLC, 2023 WL 3021075, No. 3:21-cv-1478-L (N. D. Tex. Apr. 20, 2023) (request for review copy of transcript before finalization untimely where not made before deposition concluded, even if made immediately afterwards)EBC, Inc. v. Clark Bldg. Sys., Inc., 618 F.3d 253, 266 (3d Cir. 2010) (In a case involving a different Fed. R. Civ. P. 30(e)(1) errata sheet-related deadline, court suggested judge has some discretion in forgiving the missed deadline, saying, “Note, however, the phrasing of the rule—it provides that a party or deponent “must be allowed 30 days” to submit errata (the rule formerly stated that the party or deponent “shall have 30 days”). Fed.R.Civ.P. 30(e)(1). The natural language of the rule, then, does not preclude courts from allowing more time upon a prior request or forgiving minor untimeliness after the fact. Instead, the rule grants courts discretion to do so under appropriate circumstances. While courts retain the authority to enforce the amendment window strictly, we leave the matter to their sound discretion to determine if and when extension of the time limit is appropriate.”)Fed. R. Civ. P. 30(e)(1) (requiring request for review copy to be made before deposition concludes)

Finding Certainty
How to Create a Seven+ Figure Online Business, with Sys Savanh

Finding Certainty

Play Episode Listen Later Mar 17, 2023 60:00


Welcome to this week's episode of Finding Certainty, with your host, Patrick Laing as he interview's today's special guest, Sys Savanh, an entrepreneur, speaker, and business coach who has helped thousands of people achieve financial freedom and success. Sys is the owner and founder of Seven Figures Expert Academy, a premier coaching program that teaches entrepreneurs how to build and scale their businesses to seven figures and beyond. Patrick and Sys discuss the frameworks he uses to run a business generating over seven figures from anywhere in the world, frameworks that anyone can leverage. Sys has helped many turn their passion and expertise from an idea to launch and profit. If you've always wanted to launch your online course, event, program, or service but got stuck not knowing where to start, what to do, or how to do it, then this episode is for you. Sys knows exactly how you feel because he's been there too and he shares his 7-Step Launch to Sell System that has allowed him to launch multiple businesses in a matter of days, rather than months or years, and make money online immediately. He also invites listeners to attend his next two-hour online Business Success Intensive, where he'll share both what to do and what not to do, based on several years of extraordinary success. Sys has invested a great deal of time and money (over 7 years and $750,000) into learning and perfecting these frameworks, and he shares them with attendees during his courses, many times at zero cost to his clients. By the end of his one-hour online Business Success Accelerator, you'll know exactly what to do to build, launch, and sell your courses, events, programs, or services online, even if you've never sold online before. Don't miss this opportunity to learn from one of the sharpest minds in this space. To learn more about Sys and his Seven Figure Expert Academy, go to https://www.expertmadesimple.com/joinintensive. To learn more about Finding Certainty, Certainty Management, or Patrick Laing go to https://www.certaintyteam.com or text the word Certainty to 26786.

Portland Roots Media
#419: Tess Knows How to Deal

Portland Roots Media

Play Episode Listen Later Jan 25, 2023 7:51


Life with Tess can be pretty darn challenging sometimes. When things go south, there's one method we have that always makes everything better. It requires no equipment, it travels with us wherever we go, and it costs zero dollars.Hayden Faith is Tess's Schaaf-Yang Syndrome sister. They even share a birthday! Hayden's folks Matt and Courtney Blickley have started a nonprofit to fund SYS research. Check out Faith for Hayden here: https://faithforhayden.org/

Filled Up Cup
Ep .46 Scott Simon

Filled Up Cup

Play Episode Play 30 sec Highlight Listen Later Jan 4, 2023 51:13 Transcription Available


On this episode I am joined by Scott Simon. Scott is a happiness entrepreneur, SYS founder, and author of Scare Your Soul: 7 Powerful Principles for Harnessing Fear and Living Your Most Courageous Life which was released in December, 2022.Scott is a sought-after speaker, meditation leader, and high-performance life coach, focusing primarily on creating flourishing lives after major changes such as divorce. Scott earned his BA from Skidmore College, an MA from Case Western Reserve University, and Certificates in Positive Psychology and Coaching from The Wholebeing Institute.  On this episode we discuss how Scott was a very shy and bullied child who really internalized his pain which led to in his youth trying to live an invisible life. He was stepping out of his comfort zone, after college going to teach English to Holocaust survivors, when he had a panic attack on the plane. To calm himself, he took out a spiral notebook and wrote a challenge to himself to do one thing a day that scared him. He acted on that challenge and a year later headed back to the United States a changed person. That year of daily challenges was something he aimed to continue to do and he did starting with publicly singing in front of a popular brunch spot. That challenge led to a viral moment on Facebook.We talk about how his daily challenges started inspiring others and became the Scare Your Soul movement. His movement is about inspiring others to take the small steps towards facing their fears and creating a community of others who support each other along the way.His book Scare Your Soul: 7 Powerful Principles for Harnessing Fear and Living Your Most Courageous Life has the tips to start your own journey, as well as a workbook to help you really implement these principles as well as stories from other people who have implemented these challenges into their own lives. Challenges + Courses - Scare Your SoulThe Book - Scare Your SoulScare Your Soul (@scareyoursoul) • Instagram photos and videosScare Your Soul | FacebookAshley (@filledupcup_) • Instagram photos and videosFilled Up Cup - Unconventional Self Care for Modern WomenSOLD On The DreamWhat's a life selling real estate really like? This humorous guide tells it, as it is!Listen on: Apple Podcasts Spotify

Say You Swear
Truth For Today With Nick Atkins

Say You Swear

Play Episode Listen Later Dec 17, 2022 96:32


For EPISODE 32, I sat down with artist and supremely talented designer Nick Atkins.Creating under the pseudonym label of ELECTROMAGNETIC STUDIOS, Nick's works take the form of anything from painting and sculpture to garment design and jewelry. Nick expressed the level of importance in separating the physical-being and the art itself. That his goal is not to be the center of focus, rather the creations themselves, and let them do the talking.While I was walking home and reflecting on the interview, I realized that this was my favorite interview I had recorded to date. Sure we discuss specific works and some of the usual parts that come with an SYS interview. However, this episode delves deep into the trials and tribulations of Nick as a person in hopes of offering potential insight that could be illuminating for another. 

Run it Red with Ben Sims
Ben Sims 'Run It Red' 095

Run it Red with Ben Sims

Play Episode Listen Later Dec 15, 2022 120:01


December's Run it Red, the last of 2022, is here! Full tracklist below -  support the labels and artists where you can and thank you to everyone who tunes in, sends music or shares the links - it's all massively appreciated! Also, if you're enjoying the show, and have the means, drop a donation to some worthy charities in the link below. Stay Safe, Sims x Donate to Good Causes Check the Run it Red Archive Listen to the Spotify Playlist   BEN SIMS pres RUN IT RED 95. Dec 2022 1. Shinedoe - Floor Action. Music That Moves      2. Åre:gone - Listen To Me. ANOAH      3. Hurdslenk - Sands. Out of Place  4. French Loops - Locked Groove 02. French Loops        5. The Hayden Andre Project - Tribal Life (Mark Broom Edit) 6. Kuba Sojka - Main Value. Boomstraat 1818       7. Tafkamp - Bad Dream Tuesday. Rotterdam Electronix      8. French Loops - Locked Groove 05. French Loops  9. Marcel Dettmann - X12. Dekmantel        10. Shinedoe - So It Is.  Music That Moves  11. Mark Broom - Nothing To Do. Hardgroove         12. Altinbas x Cirkle - Time In Motion. SK_Eleven        13. Confidential Recipe - Right Now. Rekids      14. Heiko Laux - Ut15+02/Matter Anthem (Truncate Remix). Kanzleramt 15. VRIL - Moon Tax. fabric 16. Altinbas x Cirkle - Enlightenment. SK_Eleven  17. NON - Synthrom (A.Morgan Remix). Sys.Ex 18. Stefan Vicent - Tyrant. Boomstraat 1818      19. Ma Haiping - Planet Regis III (Elyas Remix). Seclusion 20. Obstructor - Playing The Game. AKRONYM 21. Heiko Laux - Procrastinator 90'd. Kanzleramt 22. A. Mochi - Scissors (DJ Shufflemaster Remix). Tiger Scott      23. Ben Sims - Wipe Out. Illegal Alien        24. PRSPCTV aka Xentrix - Soul Speech (J.Blofeld Remix). Arkham Audio 25. UVB - The Path Of Vengeance. MORD      26. PRSPCTV aka Xentrix - Straight To The Point. Arkham Audio 27. Josh Wink - Caterwaul . Drumcode 28. Taupe - Flood. Boomstraat 1818  29. Truncate - Structure.  Illegal Alien        30. Ben Sims - Snapshot '99 (Dub). Hardgroove          31. Damon Wild - Rotary (Mark Broom Mix). Unreleased       32. Ben Sims - Unity. Hardgroove       33. D-Leria - Alba. Semantica 34. Volster - Exposition C. Secession 35. Altinbas x Cirkle - Bold. SK_Eleven        36. Stanislav Lavsky - Max. Float       37. Åre:gone - Above Us. ANOAH       38. Marcel Dettmann - Renewal Theory. Dekmantel 39. Mark Broom - W.W.W.W.W.W.W.Work. Hardgroove        40. Ben Sims - Snapshot 99. Hardgroove          41. Hurdslenk - Ekent. Out of Place    42. French Loops - Locked Groove 03. French Loops 43. MSDMNR - Panic 2.  Illegal Alien        44. Deano - Dead End. KHIDI     45. Kaiser - Esco. MORD 46. Kr!z - Atlantis (Oscar Mulero's Deconstruction). Token   47. Decoder - Amrit. Inguma  48. Dolby D & Sheef Lentzki - Insidious 9 (Fixeer Remix). Dolma 49. MSDMNR - Panic 1.  Illegal Alien    50. Oliver Rosemann - Cold Forest (Jonas Kopp Remix). (R)3volution 51. Lewis Fautzi - Murder The Limits. MORD 52. Jeroen Search - Backchannel. Eternal Friction 53. Ma Haiping - The Invincible. Seclusion       54. Binny - Realtime (Oliver Rosemann Remix). Mindcut    55. Rebecca Delle Piane - Rise. Symbolism         56. Fhase 87 - Illusion. Architecte        57. Audio Units - Quantum Dot. Dynamic Reflection 58. Nørbak & Temudo - Cloud Seeding. Hayes       59. Rebecca Delle Piane - Tool 3. Symbolism        60. Arnaud Le Texier - Assign. Soma 61. Alexander Johansson & Mattias Fridell - LTOTY. Lomsk 62. Casual Treatment - Cold Hearted. (R)3volution 63. Oscar Mulero - Noches de Menta.  Pole Group 64. Oliver Rosemann - Point And Shoot (Michele Mausi Remix).  (R)3volution 65. Marcel Dettmann - Tone. Dekmantel        66. Inigo Kennedy - Elysian Splinters I. Asymmetric 67. Hooverian Blur - Panic. Sneaker Social Club  68. Slam aka Autonomous - Into The Light. Avoidant 69. DJ 3000 - Waiting In the Dark (Aux 88 Remix). Motech

SYS Presents: Adventures in Online Education
S03 EP16 - "How to college" with Peter Drake

SYS Presents: Adventures in Online Education

Play Episode Listen Later Dec 9, 2022 39:27


Show Notes Peter Drake is Associate Professor of Computer Science at Lewis & Clark College in Portland, Oregon. He teaches a variety of courses including Software Development and AI & Machine Learning. His research has involved building artificially intelligent programs to play the classical Asian game of Go, using deep neural networks to analyze photographs of clouds, and creating video games to teach people about earthquake preparedness.   In today's episode. Peter talks about learning management systems, knowing your purpose as a student, and helping high schoolers learn the basics of how to college.   Timestamps 2:22 What makes a good LMS, and how can a teacher harness those tools to effectively engage with their students? 4:33 An on-demand source of administrative information 7:41 Connecting the LMS with other technologies students are using 8:34 Don't use more technology than is necessary  12:53 How can online high schools prepare students for college? 14:43 In some ways, college is just the next 4 grades…. 15:20 Don't be afraid to ask questions! 18:22 If you've been using a system for years, you may think it's obvious, but not to a new user 18:32 Students are not alone!  19:14 Using your time wisely 20:40 Check your email at least once a day 23:27 The Plan, Change, Evaluate cycle 26:09 What holds students back when they're entering college? 26:51 Making mistakes is how you learn 31:47 If there was one thing Peter could give to every teacher in the U.S., what would it be and why? Episode Resources: Peter Drake's short essay on How To College Small Teaching and Small Teaching Online - Books by Flower Darby and James M. Lang Geeky Pedagogy - Book by Jessamyn Neuhaus Ungrading - Book edited by Susan Blum You can email me at drake@lclark.edu. For social media, I'm on Mastodon at https://qoto.org/@peterdrake.  https://github.com/PeterDrake/drakepedia/blob/master/administrivia/how_to_college.md

SYS Presents: Adventures in Online Education
S03 EP15 - Greatest Hits: AP with Maddy Dahl

SYS Presents: Adventures in Online Education

Play Episode Listen Later Dec 2, 2022 31:13


Guest Bio Maddy Dahl has been teaching online for 8 years. During her tenure, she has taught a wide range of classes from basic high school writing and grammar to AP English courses. When she isn't teaching, you can usually find her playing board games or exploring Oregon.    Episode Summary Maddy teaches us about how to create an online AP course for students, how to help students earn college credits while in high school, and provides invaluable advice to teachers just getting started on their AP journey.    Timestamps Maddy's exciting news! [2:13] How do you create high school AP courses online? [3:50] How the FCM works in an online AP class [6:40] A focus on collaboration asynchronously and synchronously [8:53] Supporting students' organization, practice, and executive functioning [9:30] All about formative assessments [11:50] Collaborate and listen [13:21] Partnering with community colleges [16:56] AP and college credit courses are rigorous but different [20:25] Maddy's advice for creating your own online AP course [22:00] Maddy's favorite teacher when she was in high school [26:29]   Resources Find Maddy Dahl at mdahl@syseducation.org How-To AP Guide FREEBIE College Credit Now (Oregon) Frontier Charter Academy College Board AP Central FCM Episode (S2 EP16)

SYS Presents: Adventures in Online Education
S03 EP14 - Finding your Hammer with Matt Miller

SYS Presents: Adventures in Online Education

Play Episode Listen Later Nov 25, 2022 25:59


Show Notes Matt Miller is the author of five books, including Ditch That Textbook. His Ditch That Textbook blog reaches thousands of educators in more than 100 countries with inspiration and practical teaching ideas. He's a keynote speaker, podcast host, and the creator of the Ditch That Textbook Digital Summit.   In today's episode, we talk about not just ditching textbooks, but finding your educational hammer.   Timestamps 2:02 The mission behind the work 3:23 Saving teachers time and helping equip them to level up their teaching 4:32 A lot of edtech principles are based on good, solid teaching 6:14 Does ditching the textbook mean textbooks are evil? 7:15 It can't get much worse 8:09 Sometimes you get great ideas just by looking at what others are doing 11:52 How to answer “How does this fit?” 12:04 EdTech tools are marketed to us 12:56 The carpenter analogy 13:56 Amass lots of tools that you can use at your disposal 14:56 Sometimes you need to go back to the tried and true, versatile tool 15:03 When you introduce new tools, students have to learn how to use them 17:27 What would Matt give to every teacher in the U.S., and why?   Resources ditchthattextbook.com/101 Twitter @jmattmiller

Dirty Glove Bastard: Off The Porch
Mojo DGB Off The Porch Interview

Dirty Glove Bastard: Off The Porch

Play Episode Listen Later Nov 19, 2022 16:40


Interview by Haze of DGB https://www.instagram.com/mike_tall Recently we sat down with Atlanta rapper Mojo for an exclusive “Off The Porch” interview to clear the air about allegations that Gucci Mane made about him. During our conversation he talked about how the east side of Atlanta has changed over the years, jumping off the porch, opening up his own studio, shares his thoughts one rappers not being truthful about their past, then goes on a lengthy rant about Gucci Mane, denies being at the park last week when Gucci allegedly ran him off, denies calling the police on Gucci back in 2014, claims Gucci had to get a pass from 21 Savage & Young Nudy to come to Bouldercrest last week, his label SYS, upcoming music & so much more!

SYS Presents: Adventures in Online Education
S3 EP13 - From Old to New: Changes in Instructional Practices

SYS Presents: Adventures in Online Education

Play Episode Listen Later Nov 18, 2022 30:31


Nate is a tech-loving history teacher from Indianapolis, Indiana and author of two books on teaching. Don't Ditch That Tech: Differentiation in a Digital World, and Breaking the Blockbuster Model: Using Edtech and Accessibility to “See What's Next” in Classrooms. He was the Indiana Connected Educator of the Year in 2020 and his work has been featured in such publications as the New York Times and Washington Post. He also holds a Master's Degree in History from the University of Indianapolis.   In today's episode, Nate talks about old pedagogical models and new ones, and he explains how his new book helps educators to navigate through it all. We'll learn what the blockbuster model is and how we can learn from the streaming model to make online learning awesome.  Timestamps 2:53 Which instructional practices have stood the test of time, and what should we leave in the history books? 3:50 Two really disruptive things in the education world 5:14 Things to look at with direct instruction 6:28 Comparing collaborative learning with direct instruction 9:50 How student's perception of learning affects their learning 14:03 The need to improve digital equity 14:46 Continuing the good things we do as educators 15:48 The three metaphors of Nate's book 16:56 What is cloning? 19:46 Meeting students where they are and where they want to be 24:25 A blend of the theoretical and practical 25:13 What would Nate give to every teacher in the U.S. and why? Resources Nate's twitter - @TeachfromRidge Nate's blog - breakingblockbuster.com Breaking the Blockbuster Model 

SYS Presents: Adventures in Online Education
S03 EP12 - Greatest Hits with Chris Voelker

SYS Presents: Adventures in Online Education

Play Episode Listen Later Nov 11, 2022 33:07


Guest Bio -  Christine Voelker is the K-12 Program Director for Quality Matters, a global non-profit dedicated to quality assurance in online and innovative digital teaching and learning environments.  QM provides a scalable quality assurance system for online and blended learning used within and across organizations grounded in research and driven by best practices.     Summary -  Today Chris is going to teach us about what QM does and how their work supports the national standards for quality online education.  Timestamps -  Career transitions over the years and seeking greater impact [2:44] What are the National Standards for Quality Online Learning? [6:55] What do the standards for teaching cover? [10:56] What do the program standards cover? [11:15] What do the course standards cover? [11:53] Similarities with the Danielson Framework [12:39] What is the Learning Portal? [13:40] QM's mission statement [16:46] Three-pronged approach to quality assurance [16:57] What's the course review process? [18:46] What is Rigorous Professional Development? [19:39] Quality Matters reviews are for you to see [21:23] How does the work of QM complement the work of the Standards? [23:32] What's “QM Lite”? [24:50] Becoming certified! [25:34] Who was Chris' favorite teacher as a kid? [27:28]   Resources -  National Standards for Quality Online Learning Quality Matters Bridge to Quality Course Design Guide Digital Learning Collab Virtual Learning Alliance Twitter: @nsqol; @k12qm; @qmprogram; @vllaonline; @theDLCedu; @voelkerc

SYS Presents: Adventures in Online Education
S03 EP11 - The Power of Collaboration

SYS Presents: Adventures in Online Education

Play Episode Listen Later Nov 4, 2022 29:25


Edi Cox serves as the Director for Low Country Virtual, an online school in South Carolina.  She began her career as a high school teacher who was recognized for her innovative work.  In her most recent role she served as the Executive Director of Online Learning and Instructional Technology in one of the largest school districts in South Carolina. She is credited with launching one of the first district-led virtual programs in the Palmetto State.  In 2013 Ms. Cox was instrumental in the writing and submission of a Gates Foundation Grant designed to help a district launch personalized learning efforts with a rollout of 1:1 devices to more than 43,000 students.  She holds multiple degrees and has completed additional graduate-level coursework through Western Governors' University, where I recently attended as well! Edi continues to stay current in the field by serving in a variety of roles with national organizations such as the Digital Learning Collaborative, Virtual Learning Leadership Alliance (VLLA) and Quality Matters. She provided guidance in the revisions to the National Standards for Quality (NSQ).    Today, Edi tells us about the power of collaboration among districts, and how important it is for us all to learn from our collective mistakes and wins.  Timestamps 2:53 What Edi's educational journey has looked like 4:46 Edi was an instructional designer before instructional designers were a thing!  5:45 Edi's work with the Low Country Educational Consortium 7:06 Taking advantage of the forced online learning from the pandemic 11:52 We know that the majority of students are well-served by the traditional brick and mortar classroom 13:06 Supporting the students who are not served well by the traditional model 17:45 Why is it important for Low Country Virtual to partner with organizations like Digital Learning Collaborative and Quality Matters? 20:33 Quality Matters 24:14 What would Edi give to every teacher in the U.S., and why? 

SYS Presents: Adventures in Online Education
S03 EP10 - Online Learning with Allison Powell

SYS Presents: Adventures in Online Education

Play Episode Listen Later Oct 28, 2022 34:55


Dr. Allison Powell is the former Vice President for State and District Services/New Learning Models of the International Association for K-12 Online Learning (iNACOL), which provides expertise and leadership in K-12 Blended, Online, and Competency-based Learning. Working at iNACOL, Allison helped write the National Standards for Quality and several other reports to expand and improve the field of K-12 online, blended and competency-based learning.   Allison taught in both face-to-face and online K-8 environments. She has been working in the field of online learning for over 15 years, starting as a K-8 blended teacher for Odyssey Charter Schools in Las Vegas, NV. After teaching in a blended environment, the Clark County School District asked her to help start the Virtual High School in the fifth largest school district in the country. In her role as an administrator for the program, she helped with training teachers, building courses, overseeing technology and educating leaders on the benefits of online learning.   Allison was charged with starting an online professional development program for the school district to allow all administrators, teachers, and district staff to meet their training needs in a more flexible environment.   Allison regularly shares her expertise in K-12 online education by speaking at various education and policy meetings and events around the world. She has served on several boards for various schools and organizations. Allison completed her doctorate in educational technology from Pepperdine University.   In today's episode, Allison talks about the importance of groups such as the Digital Learning Collaborative, Quality Matters and the Evergreen group. She reminds us that online instruction works best when everyone has equitable access, and relationships are strong. Timestamps 3:34 Allison's roles in the Digital Learning Collaborative, DLAC, and the Evergreen group 5:35 How does the DLC do their research?  8:10 What is DLAC like? 11:00 Allison's time with iNACOL and how she got involved with online learning 13:27 The process of creating an online high school program 15:50 Stories from the early days 19:21 What have been some of the most positive changes in the world of virtual education over the past 15 years? 21:21 It's common to form stronger relationships online than in brick and mortar schools 23:39 Some of the new things coming to online learning 29:19 What would Allison give to every teacher in the U.S.?    Resources Allison's twitter allison@evergreenedgroup.com Allison's LinkedIn

The David Alliance
Goals Suck... Systems Better

The David Alliance

Play Episode Listen Later Oct 25, 2022 8:11


Wake the Faith up Slayer… This is Garth Heckman with the David Alliance and you can reach me at TDAgiantslayer@gmail.com    Brought to you by wellbuiltbody.com Gym Apparel for men and women that rocks and shocks and ain't for everybody - but just might be for you. wellbuiltbody.com   My highest downloaded podcast this year was on systems… so I thought I would hit that topic again.  Where am I going today with it? Well, Some call it the technique of systemization. Systemization is the skill of developing a process around a set of common tasks or goals.  Goals are great, but they are limited in how much you can improve them… however systems are the key.  Goals have a tendency to have a start and immediately an end… and the middle is messy and very little attention is given to it. But that middle part is the system… its the guts, it what's cuts through the ifs and or butts… its a must.  This was more or less popularized by Dr. Edward W. dimming after WW2 in Japan. You can study much of it by looking into him and the concept Constant and never ending improvement Or Kaizen. But for the sake of argument it rebuilt Japan into a business juggernaut.    How much can you improve a system to achieve your goals. Lets say you have a goal to read more… that is not enough. Even if you say, lets read 10 pages a day… still not a system. You say, ok, lets read 5 pages in the morning and 5 in the evening. Still not a system.  You must understand it is extremely important to build the system with the right framework because once you do it - it will function correctly 99% of the time.  And again, goals for the sake of goals lead to haphazard random results.  You say ok Garth what is the system for reading 10 pages a day (or to do anything for that matter) First you need a why for what you are trying to do? Why you ask do you need a why? Because the why is the source of power behind the system you are creating. Look- to just read 10 pages in order to say at parties I read about 10 pages a day… is pointless. You might as well just say I pick my nose 10 times a day. But the power is in the WHY I read.  So lets say your why is so that you can do better in business.  Ok, now what is the system.  Now that we have the why we can start with the What?What should you read, are there particular books, magazines, in your field of business? I would bet yes.  Next is How should you read? Read alone, with a pad of paper to take notes, read in good lighting. Where? Maybe in your office, coffee shop, in your car during coffee breaks and lunch. Who… who should you be reading. Are there authors that are more valuable to read than others.  Now here is where the mindset of systems comes into place… you can now improve all of these by doing more homework. Ask other people in your field, what and who they read. look at your calendar and see if you can find a few more minutes to read a few more pages. Figure out a better way to take notes on what you read… is there an app that allows you to capture your notes or html text? (BTW try camscanner its my favorite for this) Can you listen to books on tape, are there youtube pages covering in depth what you are reading…  Now is the system done? Not even close. Remember systems are built on never ending improvement.  so keep pushing forward… Who can you discuss with regarding the books and articles you read. Can you teach it to someone in order to even better understand it? Could you write a book? Can you meet any of the authors or at least reach out to them on social media. Is there a conference with any of the authors or topics you are studying up on?  Always focus on the system. You can add just one little extra detail every few days and it will pay off big time.  Remember your why? it was so that you could do better in business.  If you started a goal 6 months ago… with no system… where would you be. But if you started a system for a WHY… where would you be?  The amazing thing about having a system mindset is that you begin to practice it in every area of your life.  So again your why was “so that I can do better in business”. What is your guess as to how much farther you would be in 6 months working a system rather than just working a goal?  This is the difference between people who achieve more in life… its not just prayer, and fasting and reading your bible more and hoping God gives you favor or you earn his blessing- its knowing how to build a system around these things.  James 2:17So too, faith by itself, if it does not result in action, is dead. 18But someone will say, “You have faith and I have deeds.” Show me your faith without deeds, and I will show you my faith by my deeds.… That word deed in the greek ‘er-gon has a strong meaning of work with intention… again always intending to improve my work… a system if you will.  And you could easily insert the word goal with the word faith for even greater clarity. How does it sound? Lets read it again…  So too Goals by itself if it does not result in action is dead. But I will show you my life goals with a system/action.  Paul is throwing down with a put up or shut up.. he is calling them out. Show me your goals, i will show you my action my system. So get your SYS-tem together, get it going and make life happen! 

SYS Presents: Adventures in Online Education
S03 EP09 - Autism in the Classroom with Pete Wharmby

SYS Presents: Adventures in Online Education

Play Episode Listen Later Oct 21, 2022 28:26


Pete Wharmby is an autistic speaker, writer, tutor and parent, who is working to improve autism acceptance in society by sharing insights and experiences of autism to the widest possible audience. He has spoken at many conferences and events, often as the keynote speaker, on topics such as autism in education, the experience of autistic students and teachers, the importance of monotropism and special interests and much more.   In today's episode, Pete talks about valuing our autistic student's strengths, like hyperfocus and clear communication. He tells us to encourage student interests and strengths in the online classroom, and reminds us that not every sound practice will benefit autistic students.    Timestamps 2:56 What Pete loves about being autistic 3:34 Hyperfocus 5:36 Be flexible! Allow students to stay in the “flow state” 7:30 Interleaving is a good idea, but won't work for a lot of autistic students 8:31 The clarity of autistic communication 11:45 Taking criticism from students publicly 12:24 Making expectations exact instead of vague 16:59 How Pete's special interests have shaped his life, and how it can teach you more about autism 21:02 Pete's advice to teachers: take it as a sign of trust if an autistic student shares their special interest with you 21:32 Just listen!  23:11 What would Pete give to every teacher in the U.S. or U.K., and why? Resources Pete's Website Pete's Blog Pete's YouTube Channel What is Neurodiversity - Harvard University

SYS Presents: Adventures in Online Education
S03 EP08 - Supporting Students with Autism

SYS Presents: Adventures in Online Education

Play Episode Listen Later Oct 14, 2022 24:28


Traci has worked in special education for over 20 years.  She has been a Teacher, Autism Specialist and currently works as a Student Services Professional Development Coordinator.  Her professional work includes working with students from age 3-21, their families and their teachers.  You can reach her at traci.sevick@gmail.com.   In today's episode, Traci talks about supporting students with autism, in the online classroom and the brick and mortar setting. She also discusses the societal view of autism, and centering autistic voices in discussions. Timestamps 2:41 What kind of students tend to be successful in online classroom environments? 6:04 What about online school for students on the spectrum? 9:48 Who should parents go to if they need help figuring out in-person activities for their autistic child? 10:39 Developmental Disability Services 13:21 Light it up Blue and #RedInstead 14:32 A societal shift in perspective about autism 15:00 What does Traci wish teachers and admin knew about the needs of autistic students? 19:30 If there was one thing Traci could give to every teacher in the U.S., what would it be? Resources https://autismsociety.org/ https://www.learnfromautistics.com/light-it-up-red-for-world-autism-awareness-acceptance-day/ https://factoregon.org/ https://www.autismspeaks.org/teachers-and-administrators https://www.nea.org/resource-library/teaching-students-autism-guide-educators https://www.spectrumlife.org/tigard/therapy-and-interventions/apricot-clinic

SYS Presents: Adventures in Online Education
S03 EP07 - Greatest Hits with Dr. Katie Novak

SYS Presents: Adventures in Online Education

Play Episode Listen Later Oct 7, 2022 34:20


Dr. Novak is an internationally renowned education consultant, an author, adjunct professor at UPenn, and a former Assistant Superintendent of Schools in Massachusetts. Dr. Novak has more than 19 years of experience in teaching and administration, a doctorate in curriculum and teaching, and is the author of 8 published books, including the best-selling education books, UDL Now!, Equity By Design, and UDL and Blended Learning.    Episode Summary In this greatest hits episode, we wind back to season two, where Katie Novak and I talk about intrapersonal variability and facing the skill-breakdown that often comes with starting on your UDL journey. She helps us understand the connection between UDL and equity and also how to ditch labels and focus on students as individuals.    Timestamps Where does Katie's UDL passion stem from? [2:51] Facing skill-breakdown in the face of inclusion [4:01] Effects of allowing students to make decision for themselves [5:07] What is UDL?  [7:46] Roots in architecture [8:23] Embrace intrapersonal variability [10:16] Firm goals, period. [10:50] Can learners really self-differentiate? [11:01] Your most beneficial source of growth [12:39] Firm goals, flexible means [13:00] A career commitment [13:30] The connection between UDL and equity [17:23] The general education classroom as the least restrictive environment [18:15] Labels don't have meaning? [19:41] Katie's universally designed breakfast [20:32] A child should be able to consent to their care [22:14] Get to know Katie's favorite teacher, Mrs. Krause [25:09]   Resources: Novak Education What is UDL? Infographic 30 Universally Designed Lesson Plans for Online Teachers The Science Behind UDL

SYS Presents: Adventures in Online Education
S03 EP06 - Next Practices in Educational Technology

SYS Presents: Adventures in Online Education

Play Episode Listen Later Sep 30, 2022 42:45


Jonathan brands himself as an Educational Technology Specialist. He is not working toward “best practices,” but rather “next practices.” He believes that innovation and creativity is where we are supposed to live as educators and that the phrase that will kill a career is, “but I have always done it this way.”   In today's episode, Jonathan talks to us about Project Based Learning. He examines the generational differences in technology that kids are dealing with today, talks about how we can work with students to understand their motivations, and how to use tech in the classroom effectively.  Timestamps 2:35 Who is iGen? And what do we do to adapt online education to their educational needs? 3:52 The good things about Millennials - and the consequences  5:16 Different generational attitudes about technology 8:47 Education about digital privacy 9:40 How Computer Science aligns with privacy, morals, and ethics 10:19 Technology laws are often archaic 11:59 Talking to kids about privacy 13:41 How socialization has changed with social media 18:06 Online learning has been a major pivot for a lot of people, and we've learned a lot about it in the past few years 19:02 Elementary teachers do PBL so well!  21:45 Problem based learning 24:27 How are we connecting with students? 25:13 What do students care about? 28:28 Laying out expectations 28:44 How do you do this with tech? 29:49 Bringing in experts 31:52 One of the great powers of online education 32:36 Why does this matter (to me)? 38:00 If Jonathan could give one thing to every teacher in the U.S., what would it be?   Resources Twitter @jonredeker Gmail jredeker@gmail.com Website sites.google.com/view/jonathanredeker

SYS Presents: Adventures in Online Education
S03 EP05 - Tangible Equity in the Online Classroom with Colin Seale

SYS Presents: Adventures in Online Education

Play Episode Listen Later Sep 23, 2022 44:23


Colin Seale was born and raised in Brooklyn, NY, where struggles in his upbringing gave birth to his passion for educational equity. Tracked early into gifted and talented programs, Colin was afforded opportunities his neighborhood peers were not. Using lessons from his experience as a math teacher, later as an attorney, and now as a keynote speaker, contributor to Forbes, The 74, Edutopia and Education Post and author of Thinking Like a Lawyer: A Framework for Teaching Critical Thinking to All Students (Prufrock Press, 2020) and Tangible Equity: A Guide for Leveraging Student Identity, Culture, and Power to Unlock Excellence In and Beyond the Classroom (Routledge, 2022), Colin founded thinkLaw (www.thinklaw.us), a multi-award-winning organization to help educators leverage inquiry-based instructional strategies to close the critical thinking gap and ensure they teach and reach all students, regardless of race, zip code or what side of the poverty line they are born into. When he's not serving as the world's most fervent critical thinking advocate or tweeting from @ColinESeale, Colin proudly serves as the world's greatest entertainer to his two young children.   In today's episode, Colin teaches us to unlock brilliance in our students and move beyond compliance to build psychological safety in our online classes and engage all students with critical thinking. Timestamps 2:27 What's the unique draw to Tangible Equity?  6:38 Asking, ‘What is the significance?' 7:52 Bringing kid's backgrounds into their learning 10:11 Kids need to be not just problem solvers, but problem finders 12:40 Is the “Why” different for different students? 14:20 Unpacking the hidden curriculum 16:47 How you as a teacher can make a tangible difference 18:41 Our kids need direct engagement with each other to learn how to be better 23:02 How did Think Law come to be? 24:42 What Think Law does right now 29:03 Learning how to learn 32:50 Do our kids have the psychological safety to be brilliant? 36:26 The importance of teacher confidence 38:26 What would Colin give to every teacher in the U.S.? Resources @ThinklawUS  @ColinESeale

The Selling Your Screenplay Podcast
SYS 449 – Writing A Lifetime Movie With Richard Pierce

The Selling Your Screenplay Podcast

Play Episode Listen Later Sep 18, 2022 44:25


This week Ashley Scott Meyers talks with writer Richard Pierce. This is a returning guest, SYS 378 was his prior interview. He talks about the art of writing and pitching a made for TV Movie for networks like Lifetime. Richard Pierce talks about the writing and development process for Do You Trust Your Boyfriend (AKA […]

SYS Presents: Adventures in Online Education
S03 EP04 - Instructional Design with Dr. Luke Hobson

SYS Presents: Adventures in Online Education

Play Episode Listen Later Sep 16, 2022 43:28


Show Notes Dr. Luke Hobson is the Senior Instructional Designer and Program Manager at MIT, the author of the book What I Wish I Knew Before Becoming an Instructional Designer, the founder of Instructional Design Institute, and the host of the Dr. Luke Hobson Podcast and YouTube Channel.   In today's episode, Luke tells us all about instructional design, and how you can get started in your classroom.  Timestamps 2:46 What does an instructional designer do? 3:42 How did Dr. Luke get involved in instructional design? 6:52 Luke did NOT love school as a kid!  8:48 The importance of getting to know your students 11:19 Telling younger students about instructional design 13:15 EVERYONE needs an instructional designer!  16:41 How does a teacher start the process of improving their instructional design? 18:03 Incorporating student voice 19:02 Beta testing your courses before they go live 22:27 Course mapping using your data 27:52 Using qualitative AND quantitative data 31:48 So many more people know what instructional design is now!  34:19 Trying to avoid using jargon 35:14 Actually, maybe jargon can be inclusive SOMETIMES 37:10 What would Luke give to every teacher in the U.S.? Resources https://drlukehobson.com/

SYS Presents: Adventures in Online Education
S03 EP03 - Understanding by Design with Jay McTighe

SYS Presents: Adventures in Online Education

Play Episode Listen Later Sep 9, 2022 41:05


Show Notes Jay McTighe has a wealth of experience and knowledge developed during a rich and varied career in education. He is an accomplished author having co-authored 17 books, including the award-winning and best-selling Understanding by Design series with the late Grant Wiggins. His books have been translated into 12 languages. Jay has also written more than 50 articles and book chapters and been published in leading journals, including educational leadership and Education Week. He has an extensive background and professional development, and is a regular speaker at national, state and district conferences and workshops. He has conducted workshops in 47 states within the US and seven Canadian provinces, and internationally to educators in 35 countries on six continents.   In today's episode, Jay explains Understanding by Design, and how you can implement it in your classroom. He tells us how UbD can lead to deeper understanding and learning and talks about assessment in the UbD framework.  Timestamps 3:58 What is Understanding by Design? 4:53 A modern education should do more than equip students to repeat back information they've learned 5:32 Teaching does not ensure learning 6:22 The three stages of backward design 7:17 Stage one: Identifying transfer goals 8:06 Stage two: What would students need to be able to transfer? 8:25 Stage three: Identifying the more specific and discrete knowledge and skill objectives 8:55 Understanding by Design in a nutshell 10:07 Teachers can answer Ryan Bowens' question 11:40 Some areas of curriculum are naturally taught with UbD 12:04 What do those areas have in common?  12:48 UbD is also common with extracurricular activities 12:59 What makes learning meaningful 13:25 An athletics analogy 14:28 Teaching isn't just about marching through grade level standards 17:25 Is there still wiggle room in the day to day operations of our classes? 17:55 Essential Questions 18:48 Some examples of essential questions 19:48 Assessments we use should be directly linked to the goals we've identified in stage one 20:35 There may not be much differentiation with WHAT we want students to know, but there can be in HOW they demonstrate their understanding 20:54 An example about declarative knowledge 23:37 The bookends of goals and success criteria 24:37 An example about with the goal of argumentation 28:19 Where to start with backward design? 31: 55 Some advice for teachers new to UbD 35:14 Find a partner or a team to plan with!  36:42 What would Jay give to every teacher in the U.S. and why? Resources Jaymctighe.com Twitter - @jaymctighe Understanding by Design by Ryan S. Bowen Grant Wiggins' YouTube Video UbD White Paper from ASCD Tomlinson, C., & McTighe, J. (2006). Integrating differentiated instruction and Understanding by Design: Connecting content and kids. Alexandria, VA: ASCD.

SYS Presents: Adventures in Online Education
S03 EP02 - Greatest Hits with Cassie Pierce

SYS Presents: Adventures in Online Education

Play Episode Listen Later Sep 2, 2022 35:31


Guest Bio -  My guest today is Cassie Pierce. This is her eighth year teaching. She has experience teaching both upper and lower elementary in very different school settings (private, public, charter etc.) with an equal amount of time both in-person and online. She went back to school to become a teacher while working full time at a not-for-profit hospice where she worked for six years. Cassie volunteered after work for a children's bereavement support group and this experience coupled with her time in classrooms, inspired her to pursue an education degree. Cassie is also an instructional coach for online teachers.    Summary -  In our Greatest Hits episode, Cassie and Natalie talk about all things class culture and relationship building. You're going to feel like you've just received a big hug by the end of this one!   Timestamps -  We are a team! [2:48] How the doctor's office is like school [5:20] The words we use make a difference [7:17] Defining and building a positive class culture [10:20] Offering multiple supply options [16:05] Building culturally responsive curriculum [19:57] Growth and process over product and answers [24:34] Cassie's favorite teacher [28:40]   Resources -  Class Jobs Freebie! Disability Visibility by Alice Wong

SYS Presents: Adventures in Online Education
S3 EP01 Building SEL Skills Through Code

SYS Presents: Adventures in Online Education

Play Episode Listen Later Aug 26, 2022 28:44


Valerie Sousa is a Kindergarten Teacher from Western Massachusetts. She has been teaching for 12 years and loves to incorporate new and innovative ideas into her classroom. She is the author of the book “Coding to Kindness” through EduMatch Publishing. This book was inspired by her students and her journey as she began coding in the classroom.   In today's episode, Valerie teaches us that teaching students to code young can also help them build community and SEL skills. She shows us how to start kids off with the “building blocks” of coding, and explains how teaching the logic of coding early can help with foundational skills.    Time Stamps 1:59 How Valerie's coding and kinder journey began 4:35 Basic building blocks for coding 6:57 Coding is a collaborative task!  8:50 Benefits of learning to code young 10:01 The SEL side of coding 10:28 What makes a community?  13:44 How do SEL and coding come together in the classroom?  14:30 What inspired Valerie to write Coding for Kindness 14:50 Teaching kids to be part of a community 16:13 Women in STEM!  17:37 An interactive book 20:46 Guided questions and background history!  22:07 What thing would Valerie give to every teacher in the U.S.? 23:22 Remembering the things that you've done over the year    Resources Valerie's Website Brian Aspinall Robot mouse activity set Botley the coding robot

In Off The Bench
Jerome Carvin “Push Your Heart Across The Line”

In Off The Bench

Play Episode Listen Later Aug 9, 2022 100:41


We are joined by Jerome Carvin, an absolute stud veteran offensive lineman for the University of Tennessee Volunteers. We get the backstory on Jerome and find out he was a kid on the move at a young age and also one of the youngest members of a large family. We talk playing SYS football in Memphis and then dive into the high school football scene including Cordova. We find out who was recruiting Jerome and what his top choices were and why he ultimately chose Tennessee. We jump into all things Vol Football as he is a veteran who has seen it all. We discuss the upcoming season and what to expect, followed by a game of this or that. The crew then breaks down headlines in MLB and NFL.

Say You Swear
Endurance Training With Ryan Lay

Say You Swear

Play Episode Listen Later Jul 8, 2022 57:32


Ryan is a professional skateboarder currently riding for Sci-Fi Fantasy. We speak about his time at Enjoi, years at Welcome, and making the decision to make the move to Sci-Fi. His level of honesty on how volatile the skate industry can be was both refreshing and eye opening. In addition to his skate career, Ryan helped found the organization Skate After School and is an ambassador for the SkatePal organization. Having gone back to college to pursue a degree in Public Administration, Ryan preached always having a personal desire to do more than just skate. We also talk a bunch about his new passion of endurance running. Going on 800 mile hikes, overnight runs, ultra marathons, helping pace runners on 250 mile runs: respect Ryan!Ryan is also a co-host with SYS alumni Ted Barrow on the lovely podcast Vent City!!Thanks for tuning in

Python Bytes
#290 Sentient AI? If so, then what?

Python Bytes

Play Episode Listen Later Jun 28, 2022 49:34


Watch the live stream: Watch on YouTube About the show Sponsored by us! Support our work through: Our courses at Talk Python Training Test & Code Podcast Patreon Supporters Special guest: Nick Muoh Brian #1: picologging From a tweet by Anthony Shaw From README.md “early-alpha” stage project with some incomplete features. (cool to be so up front about that) “Picologging is a high-performance logging library for Python. picologging is 4-10x faster than the logging module in the standard library.” “Picologging is designed to be used as a drop-in replacement for applications which already use logging, and supports the same API as the logging module.” Now you've definitely got my attention. For many common use cases, it's just way faster. Sounds great, why not use it? A few limitations listed: process and thread name not captured. Some logging globals not observed: logging.logThreads, logging.logMultiprocessing, logging.logProcesses Logger will always default to the Sys.stderr and not observe (emittedNoHandlerWarning). Michael #2: CheekyKeys via Prayson Daniel What if you could silently talk to your computer? CheekyKeys uses OpenCV and MediaPipe's Face Mesh to perform real-time detection of facial landmarks from video input. The primary input is to "type" letters, digits, and symbols via Morse code by opening and closing your mouth quickly for . and slightly longer for -. Most of the rest of the keyboard and other helpful actions are included as modifier gestures, such as: shift: close right eye command: close left eye arrow up/down: raise left/right eyebrow … Watch the video where he does a coding interview for a big tech company using no keyboard. Nick #3: Is Google's LaMDA Model Sentient? authored by Richard Luscombe (The Guardian) The Google engineer who thinks the company's AI has come to life Transcript of conversation Brian #4: richbench Also from Anthony “A little Python benchmarking tool.” Give it a list of (first_func, second_func, “label”), and it times them and prints out a comparison. Simple and awesome. def sort_seven(): """Sort a list of seven items""" for _ in range(10_000): sorted([3,2,4,5,1,5,3]) def sort_three(): """Sort a list of three items""" for _ in range(10_000): sorted([3,2,4]) __benchmarks__ = [ (sort_seven, sort_three, "Sorting 3 items instead of 7") ] Michael #5: typeguard A run-time type checker for Python Three principal ways to do type checking are provided, each with its pros and cons: Manually with function calls @typechecked decorator import hook (typeguard.importhook.install_import_hook()) Example: @typechecked def some_function(a: int, b: float, c: str, *args: str) -> bool: ... return retval Nick #6: CustomTkinter A modern and customizable python UI-library based on Tkinter. Extras Michael: OpenSSF Funds Python and Eclipse Foundations - OpenSSF's Alpha-Omega Project has committed $400K to the Python Software Foundation (PSF), in order to create a new role which will provide security expertise for Python, the Python Package Index (PyPI), and the rest of the Python ecosystem, as well as funding a security audit. (via Python Weekly) Nick: Terms of Service Didn't Read - Terms of Service; Didn't Read” (short: ToS;DR) is a young project started in June 2012 to help fix the “biggest lie on the web”: almost no one really reads the terms of service we agree to all the time. Joke: Serverless A DevOps approach to COVID-19

Show Your Scars
Professional Dancer Tash Marconi - Overcoming a Traumatic Injury

Show Your Scars

Play Episode Listen Later Jun 16, 2022 62:17


Tash Marconi is no stranger to SYS podcast. She was a guest on here years ago when she went through her first ACL injury. Unfortunately, almost 2 years ago, Tash experienced a traumatic horse riding injury that required multiple surgeries including ACL reconstruction. She speaks to me today about what happened, how she has allowed herself to heal, and how she still aspires for big things on the dance floor. I can't wait to meet her on tour one day and hug her in person. Listen to Tash's last episode here: https://soundcloud.com/showyourscars/056-natasha-marconi-professional-dancer?utm_source=clipboard&utm_medium=text&utm_campaign=social_sharing THE ACL CLUB has teamed up with CURE Hydration to get you hydrated better than any other sports drink on the market. Try it out with a 20% discount using ACLCLUB20 at checkout @ curehydration.com

Paul's Security Weekly
SWN #202 - Microsoft, VMWare, Burnout, Android, HIMEM.SYS, Parrot, & Rants - Wrap Up

Paul's Security Weekly

Play Episode Listen Later Apr 8, 2022 28:35


This week in the Security Weekly News, Dr. Doug talks: Rants, Burnout, VMWARE, Microsoft, Android, HIMEM.SYS, Parrot, all this and show Wrap Ups from this week! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn202