POPULARITY
In this episode Gary Mansfield speaks to Tim Fowler (@timjfowler) Tim Fowlers semi abstracted paintings, informed by the migratory plants that accompanied his own DNA, from west Africa, via the Caribbean to the UK, fill his often oversized canvases, overwhelming the viewer with striking compositions, executed in Tim's signature palette. Tim's main concern within his work is exploring the colour field. Although vivid Tim's works are invariably balanced, using a signature colour palette of extremely bright and intense hues makes his work distinctly recognisable.He uses a variety of medium within his work combining oil, acrylic, spray, enamel and graffiti inks. Tim subverts traditional and contemporary methods of applying these mediums using brushes, different aperture caps and marker paint mops to orchestrate purposeful marks, strokes, drips, scrapes and smears across the canvas whilst constructing his exciting and dynamic artworks.Using found and made images as a starting point. Tim builds layers of pigment, adding abstract fragments as well as bold marks, broken lines and liberal strokes to create contours and features, be they of botanicals, building facades, silver screen legends or intimate family scenes. Doing this captures something more interesting than literal representation. This visceral connection to colour is palpably intuitive to Tim, using it as an expression of internal contemplations. Over the many years of Tim's career this organic relationship with paint and colour has developed and shines through, as he experiments with opacity, texture combinations, finishes and light. The deconstruction of his subject is rebuilt in a cacophony of colour turning recognisable features into their base elements to highlight unseen splendour. For more information on the work of Tim Fowler go to https://www.timjfowler.co.uk To Support this podcast from as little as £3 per month: www.patreon/ministryofarts For full line up of confirmed artists go to https://www.ministryofarts.co.ukEmail: ministryofartsorg@gmail.comSocial Media: @ministryofartsorg Hosted on Acast. See acast.com/privacy for more information.
The art world is changing fast, and in this solo Q&A episode of Art and Cocktails, Kat shares how artists can adapt and thrive in today's landscape. Topics include: Navigating Economic Challenges: Practical advice for growing your art career in a tough financial climate. The AI Era: How to stay motivated and double down on your humanity in a world of automation. Rethinking Gallery Representation: When galleries make sense, how to approach them, and alternatives for self-representation. Curating Your Own Shows: Steps for creating independent exhibitions and showcasing your art on your own terms. Connecting with Collectors: Finding your ideal audience, even in uncertain times. This episode is packed with honest insights and actionable strategies for artists ready to take control of their careers and create opportunities despite challenges. Perfect for creatives navigating a rapidly evolving industry. Shop my favorites: https://www.amazon.com/shop/katerinaspopova Resources Mentioned Books & Articles: The Complete Smartist Guide – Comprehensive tips for pricing and marketing your art. https://www.amazon.com/shop/katerinaspopova UBS Art Market Report – Insights into global art market trends. https://theartmarket.artbasel.com Art Newspaper, Financial Times, New York Times Art Sections – Stay updated on art pricing and trends. Websites & Platforms: NYFA (New York Foundation for the Arts) – Open calls, residencies, and portfolio reviews. YourOwnArtShow.com – Step-by-step program for curating your own exhibitions. Artsy.net – Pricing insights and gallery connections. Tools & Technology: Cameras: Sony ZV-1 (linked in Amazon favorites). https://www.amazon.com/shop/katerinaspopova Website Builders: Squarespace for creating a professional portfolio and shop. Email Marketing: Flowdesk and MailChimp for building and engaging your audience. Previous Podcast Episodes: Interview with Stephanie Sachs on finding collectors and marketing strategies. Sonia Burrell on art collecting and gallery relationships. Tim Fowler on scaling to larger canvases. Special Mentions: Gita Joshi – Collaborative programs and insightful episodes on the podcast. https://www.thecuratorssalon.com Create Magazine – Juried opportunities and connecting with curators. www.createmagazine.co
In this episode of Art & Cocktails, we dive into an inspiring conversation with Tim Fowler, a full-time artist based in Leicester, UK. Known for his bold, semi-abstract paintings bursting with vivid pinks, teals, and blues, Tim opens up about his creative journey, from experimenting with portraits and cityscapes to finding his voice in botanical themes inspired by his Caribbean heritage. We discuss how a serendipitous encounter with banana plants in his studio led him to explore the intersections of art, history, and cultural identity. Tim shares invaluable insights on developing creative confidence, the power of taking risks, and his philosophy of painting for the gallery you want, not the one you have. He talks candidly about balancing commercial success with personal exploration, staying prolific, and pushing through self-doubt. If you're an artist looking to break free from creative blocks, embrace new challenges, or scale up your work, this episode is a must-listen. Key Takeaways: How Tim discovered his passion for large-scale botanical paintings The importance of self-belief and making your own opportunities in the art world Practical tips on staying motivated, navigating setbacks, and maintaining creative authenticity https://www.timjfowler.co.uk Sponsored by: Create! Magazine: Your source for contemporary art and opportunities for artists. Visit www.createmagazine.com to explore open calls and get published.
See omnystudio.com/listener for privacy information.
The national polytech Te Pukenga has been ordered to hire consultants to take charge of cutting costs at its polytechnics .In June, the Tertiary Education Commission chief executive Tim Fowler gave written notice requiring Te Pukenga to obtain specialist help. The Commission says the institute doesn't have what it takes to make the changes it needs. Te Pukenga chief executive Gus Gilmore spoke to Ingrid Hipkiss.
Guests: ✨ Tim Fowler, Offensive Security Analyst, Black Hills Information Security [@BHinfoSecurity]On LinkedIn | https://www.linkedin.com/in/roobixx/On Twitter | https://twitter.com/roobixxSean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martin____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak
Join us for a deep dive into the cutting-edge discussions on satellite security from HackspaceCon at Kennedy Space Center. Discover the unique challenges and cybersecurity implications as they explore the impact of technological constraints on satellite functionality and the emerging realm of space cybersecurity. Engage with the complex balance between cost, security, and functionality in the satellite industry—an ever-evolving battlefield in the skies above. 00:00 Introduction to the Episode: Insights from HackspaceCon 00:50 Key Takeaways from the Conference 02:03 Deep Dive into Satellite Security Challenges 14:40 The Potential and Perils of Satellite Ransomware 16:24 Exploring Cybersecurity in Space Technology 23:52 The Deterrents Against Satellite Hacking 28:10 Closing Thoughts and Conference Acknowledgments Hack a Virtualized Satellite: https://byos.ethoslabs.space/ Cybersecurity for Space, an awesome overview of the space written for cyber professionals with no prior space experience: https://a.co/d/fc5ZKiC Talks and Speakers are outlined here: https://www.hackspacecon.com/speakers24 Specific Speakers referenced in this episode: Tim Fowler Celi Johnson & Erin York Jacob Oakley Kaitlyn Handelman Tags: satellite security, cybersecurity, space technology, HackspaceCon, Kennedy Space Center, IoT in space, cyber attacks, satellite design, space junk, space rideshares, tech conference Search Phrases: Insights on satellite cybersecurity from HackspaceCon Discussion on space technology and security at Kennedy Space Center Challenges in satellite security and functionality IoT and cybersecurity implications in space technology Space junk and its impact on satellite operations What is space rideshare and its costs Satellite design constraints and cybersecurity risks Technological advancements in satellite operations Latest discussions from HackspaceCon on space cybersecurity How cyber attacks affect satellites and space operations Transcript: Space Con offsetkeyz: Welcome back to the Daily Decrypt. Last weekend, the two hosts of this podcast got to spend some time at HackspaceCon at Kennedy Space Center in Florida, and in this episode, we're just going to be discussing some of the takeaways we got during this conference. Dogespan and I recorded this from the kitchen of our Airbnb on the beach in Florida. And I mention that just so you're warned that the audio might not be the same as it is when we record in the studio. Sometimes the mic is a little too far from my mouth, sometimes it's too close to my mouth, and sometimes you'll hear the echo off the tile walls in the kitchen. And before we get in, I just wanted to read through the notes that I took for this episode with my key takeaways in a very cohesive way so that you can at least get that before we start rambling about it all. So just a high level. Satellites are just IOT in space. Just computers floating around in space that are really hard to talk to. Satellites operate in only a couple different elevations, like low earth orbit. And space junk is a real thing, so if a satellite gets damaged, space junk can damage other satellites. Space junk is also a huge deterrent for cyber attack and physical attack because countries don't want blowing up satellites to destroy their own satellites. Another point is that the supply chain for satellites is very small. There's only a few companies that make the components that go into satellites. Thus creating a pretty narrow attack vector. Satellites are built to accomplish their mission and contain no additional resources. if a satellite is compromised by an attacker, which you'll find out is pretty easy to do, attackers can make that satellite's failure look like anything from radiation to a bit flip to collision to a failure, they can make it look like anything they want. And finally, one of the biggest problems is there's no current incentive for reporting cyber incidents on satellites because there's nothing really that can be done about them. And they'll eventually de orbit. All right, let's get into the episode. dogespan: Satellites are computersin space. Never thought about it that way, to be completely honest. there's definitely more complication to hacking a satellite than hacking a TV, but It is, it's an IoT device. because of the limitations of space, they are stripping everything down on that operating system. And especially nowadays, and this was another thing that I didn't know, but there were specific operating systems that were essentially designed for satellites and space and all of the things that go into it. But now, with modern advancements in technology, these Satellites are able to run just little microcontrollers like your little hobby raspberry pi and arduino boards And you can put a regular operating system on there, but they're completely stripped down for Whatever purpose that they need so everything that would be secure just by default on A linux operating system is usually stripped out Power and weight, those are really like, offsetkeyz: Mm. dogespan: main things that they were driving in constantly throughout every talk was how power and weight is going to be affected by implementing a satellite. Everything has a purpose, so what are you gonna sacrifice? Are offsetkeyz: Mm-Hmm. dogespan: gonna sacrifice satellite antenna functionality offsetkeyz: Mm-Hmm. for dogespan: security? No, you're gonna sacrifice the security so that your satellite offsetkeyz: it needs to do, and weight is a big thing because it has to get out into space. And one of the other perspectives we just heard for the first time was space rideshares. That term is a legit term. Ridesharing to space, where companies need to put satellites into space, thus they contract out to SpaceX. And SpaceX has a little menu page with prices per kilogram, I might be misquoting, but just to give the listeners A relative gist of what they're costing. It's 300, 000 per kilogram. And so if your computer weighs one extra kilogram, because it has to carry up some hardening features for the operating system or to prevent intercepting of whatever, that's going to cost an extra 300K. dogespan: need to get a satellite up for communication for GPS or anything else and offsetkeyz: you dogespan: going to cost you more money to send something up that's a little bit more secure. Which I guess is the inherent theme on cyber security in general is that security does come with a cost. offsetkeyz: Mhm what dogespan: And luckily we're getting to a better place in business operations where We're understanding what that cost is and more willing to pay it, but when it comes to space, that's still, it's not a priority yet. offsetkeyz: And all the points that we heard during this conference make sense, right? Satellites, by quote, law, have to de orbit within a certain amount of time, because otherwise they turn into space junk, they get outdated, they create a whole bunch of other risks, so I believe any law abiding country keeps their satellites to under 10 years life cycle, so between 5 and 10 years seems to be the average life cycle of a satellite, so You're spending millions to put a satellite into orbit for about five years, if you're lucky. so why would you spend an extra million to secure this thing that could potentially just burn up? dogespan: I think it boils down to the use case and capabilities of the satellite. Like they all are sent up with a purpose. But as you know, with, as just any tech enthusiast, you typically look at a device that is a computer and you always think about what else it can do. So from an attacker's perspective, you may get access to a satellite that. Is, only supposed to take pictures of a certain area or something, but maybe there's other functionality that you can take advantage of to use for whatever you want. offsetkeyz: there was a quote that I really liked and I don't specifically remember who said it but I believe it was in a talk called Dude, I Broke the Satellite by Suely Johnson and Aaron York, where they said, effective software gets the job done. Secure software only gets the job done. It doesn't do any other functionality than what is needed. for the job. So if you think about effective software, it's going to get that thing done. It's going to take the pictures from the space of whatever it's supposed to take pictures of really, really well. But what else can it do? What else can that satellite out there do that is shooting XM radio to you while you cruise through the countrysides? Maybe it can intercept communications over China or Russia. Like maybe it can do a whole bunch of other stuff that would be very beneficial for an adversary. And also communicate XM so that's where one of the attack vectors is that is pretty prevalent on the surface of the planet as well but very prevalent up there dogespan: So one of the interesting points that was brought up in Extraterrestrial Security by, uh, Jacob Oakley how attackers can use the satellites as a relay. That I found really, really interesting, where an attacker would go and take control of, the satellite controller on the ground, so they don't even have to go up to space, build any sort of radio communications to get out of Earth. They go and attack that user, and then from there they're able to redirect communications up to the satellite, and then bounce to another satellite. And if that satellite that they bounce to is controlled somewhere else, well now they're able to Relay that back to the ground, to a new, a whole new destination So that brings up another point that I found pretty interesting, which is that yes, these satellites move in what's called constellations. There's a bunch of them. They're all owned by the same company and they communicate back and forth to each other to help maybe increase their processing power or accomplish their mission more effectively. dogespan: but satellites offsetkeyz: Cost a lot of money to get up there. And in order to recoup that money, they have to use every single minute of their time in space, because as I mentioned earlier, it is limited to make money. first of all, they don't have the resources on board to accommodate security, but they also don't have the time to push a patch because when a satellite is in a position to receive and send communications, That's only maximum 40 to 50 percent of the time it's in space. The owners of that satellite want to maximize the amount of bang they get for their buck. Right? So cybersecurity me comes in and says, Hey, we need to push a patch. A new vulnerability was, has been exploited amongst satellites similar to yours, and we need to push a patch. And it's going to take down your mission capabilities for three orbits. And they say, no, they just, they won't do it because then you're taking away from the mission. No, dogespan: it may take a while to get that patch up there, and I don't remember the exact figure, but I wanna say they were talking about somewhere around the range of like 30 . Kilobytes per second offsetkeyz: Sounds right to me. dogespan: Yeah. It was somewhere between 30 and 50, like we're talking old school, dial up speed, and you think about what a patch would be to a microcontroller. It's still gonna be small. But the amount of data that we work with on a regular basis is just so much larger, and these microcontrollers can still support a lot, like, you can have an entire terabyte in the size of a tiny microchip. And, yeah, what if this patch was a couple hundred megabytes and your satellite's only in view to receive communication for a short period of time? So, yeah. It is gonna be priority of the mission over patch. offsetkeyz: When a satellite fails, a company has gone and spent a lot of money on the satellite and everyone from the stakeholders of the satellite mission to NASA scientists want to know what happened, what caused that satellite to fail so that they can improve future satellites, right? And reduce failures in the future. So when a satellite fails, they bring in the company. Top professionals, top physicists, professors at Harvard professor to MIT, NASA scientists who work on Apollo 14, uh, whoever to tear apart the data that they got the last transmissions and figure out why it failed and figure out how to prevent it in the future. Right. But one of the points that was made is that they never bring in a cybersecurity professional, because what's interesting about how satellites operate is if you, if you get root on a satellite, if you get full permissions over satellite, you can control. Everything from the log outputs to the movements of the satellite to everything. So an attacker can make that failure look like it was caused by radiation or caused by a component failure or whatever they choose. And so honestly, having a cybersecurity professional checking the transmission logs leading up to it, maybe the month before or something like that could help identify an attack and could help. Yeah, dogespan: future satellite missions. Yeah, the, um Aerospace engineers, the geniuses that they are, they know and understand the way that these things are supposed to operate. All of the physics and everything that goes with, orbits and gravity, like all of that stuff. A crazy amount of stuff that they have to know and understand. And they're able to get to the root cause of this, but they are not trained to look at it forensically. They are not inherently going to think. of the possibility of an attack. And that's where I think it wouldn't be beneficial to have the cyber security professional, because they are, they're going to look at some of the things that aren't typical. And that is one of the things that was brought up, is that engineers across the board, and I'm even calling out cyber security engineers, but software developers, aerospace engineers, like we are all inherently lazy, and if we see that something works, we will continue to follow that trend. And Utilize things. offsetkeyz: if dogespan: previously, we'll keep going down that hole. But it always helps to have looking in and things. offsetkeyz: helps to have outsiders looking in and inspecting things. dogespan: Attackers, pen testers, blue teamers. Um, offsetkeyz: that this is an untapped field and moved into it. So one of the last talks we went to today dogespan: T, cybersecurity by Jacob Oakley. offsetkeyz: is a dogespan: T, offsetkeyz: cybersecurity, teaches at Embry Riddle University and was a former pen tester, was a former red teamer who got into space and he was telling us about how his first briefing with the engineers and the software engineers who were working on these satellites, dogespan: satellites, offsetkeyz: mentioned what happens if there's an attack and they, this was in 2019, 2020, very recently, they, with full confidence. Mentioned that, Hey, it doesn't matter. They have backups. It doesn't matter. They have scripts that run to reboot. The machine and, start the mission over. They have all of these things, all of these fail safes. So it doesn't matter if they get attacked, they have these fail safes. he might not have had the greatest retort in his first little briefing, but those are all absolutely destroyable by an attacker. If someone has root, they can make that script. Do something very malicious on a recurring basis, they can erase the backups, and these engineers had thought about the possibility of attack and place these measures to help recover from that attack. It's not a forethought. It's a, it's just, they weren't thinking with a cybersecurity mindset. dogespan: What would ransomware look like on a satellite nowadays? do we just wipe it? offsetkeyz: Dude. I mean, I had never thought about ransomware on a satellite, dogespan: but oh man, I hope no ransomware people listen to this cause it's such an easy target for ransomware. offsetkeyz: Um, now that I'm thinking about it. dogespan: touch an easy target for offsetkeyz: was James that is probably one And dogespan: It's not like one of these other satellites that we're talking about that You know only have a three to five year lifespan and that's kind of hoping for the best like James Webb I think is something that they're they're hoping to get a lot of use out of and locking that down like how do you recover from it and Yeah, what do you do? I know one of the things that was mentioned, I forget if it was like on a positive note or something, but it, you know, shooting down satellites. Mm hmm. Well, offsetkeyz: Oh, before we get into shooting down satellites, that's a whole another topic, I just am so stuck on how perfect of a target satellites are for ransomware. It's just hitting me now. I'm so sad that I didn't have a chance to talk to people about it because These companies, first of all, spend. Millions of dollars to get this thing to space. They only have a limited amount of time to use it. They care a lot about it and they have a lot of money to make sure it continues to work they don't secure it. So it's very easy to hijack and the people who own it have a lot of money. That's like just like the two components of ransomware success. And now I'm scared so we can move on now. dogespan: on now. Oh, I this is all kind of centered around the satellites and objects that are offsetkeyz: orbiting dogespan: Earth, but we are doing a lot more advanced stuff with space technology, you know, We've had satellites that kind of deployed to asteroids to collect samples. I think one of the other tests that we've had was a shooting of rocket at an asteroid to see if it could be redirected. So, What does the cyber security look like on something like that? Because it does, just requires long range communication. So you have two points of vulnerability, or two vectors of attack. You can either go directly towards the satellite, or rocket, or whatever it is, or you can go at the ground station and take control of it there. So, we have ransomware, but also, what if something is providing an important Service. And it's hijacked in transit and redirected somewhere else. You know, we have, we have the ISS up there and we're shooting rockets into space. offsetkeyz: ISS up there dogespan: Sorry, if I'm going down a doomsday offsetkeyz: space. Sorry if you see the rabbit hole there? dogespan: cyber offsetkeyz: is kind of doomsday y, and it's a ticking time bomb from what we gathered. It's an unexplored cybersecurity vector. Which makes it fun for cybersecurity professionals. If you think about 20 to 30 years ago, what cybersecurity looked like, it was pretty much what we have in the sky at this moment, we have Linux boxes, we have all these unpatched vulnerabilities and it's great to pen test them and it's great to defend them because you get a lot of easy wins. So in that realm, it's great for us, but technology on earth has far surpassed the technology in the sky. And all satellites are, as we mentioned at the beginning, is IOT in the sky. So dogespan had mentioned at the beginning that there's a little bit more to it than that, pretty much as far as I'm concerned, a little bit more to it than that is the fact that you can only communicate with them on a very low bandwidth. And. On a inconsistent, well, I guess it is a pretty consistent schedule, but not all the time. if these satellites were sitting in your living room, you would be in, you would have root in dogespan: a offsetkeyz: a minute, two minutes for most of them, dogespan: And so, offsetkeyz: right? whoever can solve the problem of communicating with them better, wins all the satellites. dogespan: with communication communication and then also the resource constraints I think can help but it is an interesting area of cyber security, and I think it's going to open up a lot of opportunities, especially with more private companies getting involved in it. We have a number of companies that are, well, like we mentioned, this Rideshare, but they're also putting their own service, their satellites and things into space, so. That's going to help, I think, ultimately, instead of it just being only the government that's getting involved in space. More people getting out there is, it's going to open the door for more opportunity for cyber security professionals to pivot, and more people just being aware of how it operates and how it works. offsetkeyz: And just like anything in tech, the more you do something, the lower it starts to cost, the more success you have, you're driving that cost down. And if you can drive that cost down, maybe you can get the bottom line to include some budget for cybersecurity, but it's sort of a teeter tottering effect because the more satellites we put into space, the more junk there is, the more vulnerabilities there are. But at the same time, the more we do, the more successes we have, the more likely it is, it's going to become a blooming field of cybersecurity. offsetkeyz: So we're coming up on the end of our time here, but just wanted to quickly touch on why does it matter if satellites are hacked? And that is something that is only recently being discussed. At least leaning towards defend them. Like it's probably been discussed amongst engineers and software developers who work on satellites, but they came up with, it doesn't matter. So why does it matter? I dogespan: one of the things that was mentioned, I wish I could quote the talk there's probably Jacob Oakley if I'm being honest, is that some of these satellites can be controlled by multiple ground stations. So if you were to control of a satellite and relay to another one, you you could have access to a whole nother ground control system. Um, and That might be another nation state or another company or something, and now you kind of have a foothold in their environment. offsetkeyz: You dogespan: have to be really, really careful because you only have offsetkeyz: have dogespan: short periods of time to deliver these payloads and balance communication, and you have to stay rather stealthy, but offsetkeyz: it's dogespan: it's kind of a big thing because, yeah, you can create this backdoor into a completely different environment that you, that CISA may be secured rather well and you could cause a lot more harm. offsetkeyz: can cause a lot more harm. dogespan: can see a lot offsetkeyz: satellites can see a lot of the planet. And I mean, they can see all of it at the end of their orbit, but dogespan: is offsetkeyz: This is why you bring a friend to a cybersecurity conference, because I completely missed that. And I'm sure there's things that Doge completely missed as well. dogespan: Oh yeah. offsetkeyz: But yeah, they work so hard to secure the ground stations that communicate with the satellites and work zero hard to secure the satellites. And it's two way communication. So, compromise a satellite, compromise the ground station. dogespan: Yeah, you can easily offsetkeyz: transmit a The dogespan: you can weaponize images, you can There are lots the opportunities are there. offsetkeyz: to hack satellites. Before I say anything else, don't do it. There's a lot of eyes watching those who hack satellites because it is a critical infrastructure. it was beat into us. Don't denial of service a satellite. You'll go to jail, like literally go to jail. They fun revelation. You can listen to anything That was a fun revelation. You can, you can listen to anything coming down from a satellite. dogespan: Don't send it back. offsetkeyz: Don't send stuff back. Don't try to send commands. There are some pretty cool labs that you can do if you want to mess with satellites using virtualization, which we all love. So we'll shout out Tim Fowler for those. He gave two talks, one on Friday, one on Saturday, about building a CubeSat lab. And if you would like to mess around with a virtualized satellite, you can go to byos. ethoslabs. dogespan: bring your space offsetkeyz: and BYOS stands for bring your own satellite. dogespan: around offsetkeyz: for that great talk. And I'm excited to go play around with it in my own home lab. But if you have that itch to DDoS a fricking satellite, do it in your home lab, don't do it in real life, you will go to jail, straight to jail. to jail. So we've covered the opportunities that there are to hack satellites. And there are plenty more that we haven't discussed. Satellites are extremely hackable and barely secured. What's keeping people from hacking these satellites? dogespan: Our entire knowledge base is based off of Five to six hours worth of lectures at this point. offsetkeyz: From what I gathered, there are no real deterrents other than hypothetical legal actions. For hacking a satellite. Nation states don't care about the United States regulations. So why aren't they hacking satellites left and right? Well, First of all, everyone relies on the infrastructure that satellites provide. GPS, time, Maps, weather, all of these things are relied upon. across the world. So that's, that's step one. Step two is, if someone starts doing it to us, we're gonna start doing it to them. dogespan: to offsetkeyz: which is what keeps us out of nuclear war, so why not keep us out of space cyber war? And if we started shooting satellites down, Which is a real thing and has happened and, uh, is bad because all satellites operate in one of three orbits, like low earth orbit, high earth orbit, deep space orbit, but they're all pretty much in the same place because that's how orbit works. You have to kind of stay the same elevation to use the earth's gravitational pull to whiplash you around. And if you blow up one, all it takes is a particle of sand to damage a satellite. And. If you blow up a satellite, I believe one of the case studies from India was like 68, 000 pieces of shrapnel traveling at 22, 000 miles per hour in the orbital field of all other satellites, including the satellites of the company that blew up the one satellite. So if Russia started going crazy and blowing up United States satellites, it would, the shrapnel from those satellites would likely take out Russia's satellites. So it's not a perfect system, but it is a pretty good deterrent. There's currently no solution, or at least viable solution for space junk, which is a technical term, but as soon as anyone figures it out, they win space they can start blowing up satellites and collecting the space junk and own, they own space, right? So Currently, the lack of ability to clean up space junk is what's keeping people from blowing up satellites. it's like a mutual respect everybody's kind of in agreement that dogespan: that we rely on the technology that's up there we understand the reprocussions of destroying. The rest of them, so it is, Yeah, if we can figure out how to clean it up, then I think you're right. It wouldn't really prevent much besides some of that critical infrastructure, but there's always ways around that. offsetkeyz: If we can own space, we can drop a billion dollars into creating our own critical infrastructure and rule the world. We can destroy the current one that's up there. If, if it meant owning space, I don't think there would be an expense spared. What's interesting is all the solutions that I can come up with, which are not many, involve earth's atmosphere. And we, we think of things like air and gravity and all these things as constants that don't exist out in space. Space. Like what, why don't we have weaponized satellites that just kind of push satellites out of orbit towards earth that burn up? There's no space junk from satellites that burn up in the atmosphere. Why don't we do that? Because there's no way to send like a pulse. There's no way to send a burst of air to push this satellite. It's very hard to even propel yourself through space because the most common ways of propulsion include oxygen, fans, combustion. dogespan: There's offsetkeyz: lot of things that stand in the way that I don't understand. Right. dogespan: pushed by some form of propulsion for redirecting all of the satellite debris into orbit. Much like the snow gets redirected to the end of your driveway and then you're stuck with a giant pile at the end of your driveway that you can't get out. offsetkeyz: We are stuck with a pile, and we can't get out, but we have no plow. but we Huge shoutout to the coordinators of HackspaceCon and dogespan: Everybody that came out, all the supporters, attendees the brave souls that got up in front and talked about what they know offsetkeyz: out the industry. Especially dogespan: it helps out the industry. Especially with space, they had mentioned that Hackspace happened last year and there was one or two talks. offsetkeyz: What? It dogespan: It was a very small number. offsetkeyz: number. dogespan: And this year it was all day long. . And so that's, that means that there's more people involved with it or heading that direction and willing to learn more about it. And I'm going to be honest, I'm one of those. I'm. Was very interested to learn more about what can be done and what opportunities are there. So really huge shoutout to everybody involved with the conference this weekend. offsetkeyz: thanks sharing your knowledge thanks for pivoting over to this field And trying to keep our critical infrastructure at least a little bit safe. If you did happen to pick up one of the stickers that I littered the conference with, thank you for picking that up and we'd love to hear from you. Reach out. We'd love to have you on the podcast. Y'all are very smart and any words you'd be willing to share with us would be greatly appreciated. you're if you're just a cybersecurity professional out there with no knowledge of space or the attack vectors that are involved in hacking satellites, highly encourage you to check out next year's conference. It's going to be good Check out our other episodes: https://thedailydecrypt.com/podcast/
“It's only going to get worse if we don't pump the brakes and go, nope, we need to make sure we're doing this the right way.”In this episode, Tim Fowler, an accomplished offensive security analyst and penetration tester from Black Hills Information Security, joins the podcast to discuss the intersection of cybersecurity and space systems. Tim sheds light on:The unique challenges posed by the space environment,How the design of space systems differs from terrestrial systems The importance of threat modeling in shaping cybersecurity protocols for space systems. The biggest threats to cybersecurity in space both now and in the future. Drawing from real-world examples like the ViaSat hack, Tim underscores the need for proactive cybersecurity measures, especially in the face of evolving threats and the increasing democratization of space technology.The conversation also touches upon international collaboration and regulatory efforts in space cybersecurity, with Tim mentioning standards set by bodies like the Consultative Committee for Space Data Systems (CCSDS). However, challenges persist, including the cultural shift required to prioritize cybersecurity early in the space system lifecycle and address emerging threats effectively.For details on Tim's Introduction to Cybersecurity and Space Systems class go to: https://www.antisyphontraining.com/Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
Guest: Tim Fowler, Offensive Security Analyst, Black Hills Information Security [@BHinfoSecurity]On LinkedIn | https://www.linkedin.com/in/roobixx/On Twitter | https://twitter.com/roobixxAt HackSpaceCon | https://www.hackspacecon.com/speakers24#tim-fowler____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this thought-provoking episode of On Location with Sean and Marco, we soar into the fascinating world of space cybersecurity with our esteemed guest, Tim Fowler. As a penetration tester at Black Hills Information Security, specializing in offensive security, Tim shares his intriguing transition from focusing on terrestrial cybersecurity challenges to those within the space domain.With the space industry rapidly democratizing, he highlights the urgency for better securing our assets in space, drawing a compelling parallel with the historical oversight in the industrial control systems (ICS) sector. The conversation explores the unique challenges and opportunities space cybersecurity presents, including the emerging need for governance, risk, and compliance (GRC) frameworks tailored for space. Tim's insights shed light on the importance of secure software development and contingency planning in this critical yet exhilarating field.Additionally, Tim enthuses about his upcoming workshop at HackSpaceCon, 'Bring Your Own Satellite' (BYOS), aimed at demystifying space cybersecurity through hands-on experience with virtual satellites. The episode also humorously touches upon the concept of 'Deorbit plans' and the fanciful notion of hacking the 'Death Star,' blending deep technical discussion with engaging speculative thought.This episode is a must-listen for anyone curious about the nexus of cybersecurity and space exploration, offering a unique perspective on a domain that is becoming increasingly integral to our daily lives and future aspirations.Key Questions AddressedHow can cybersecurity principles be applied to the space domain?What challenges does the democratization of space present to cybersecurity?How does one begin building a virtual satellite lab?____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage____________________________ResourcesHackSpaceCon: https://www.hackspacecon.com/About Tim's "Bring Your Own Satellite" Workshop: https://www.linkedin.com/posts/roobixx_satellitecommunication-virtuallab-spacetech-activity-7168236170760404992-uY1_/____________________________To see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring our event coverage with an ad placement in the podcast?Learn More
Guest: Tim Fowler, Offensive Security Analyst, Black Hills Information Security [@BHinfoSecurity]On LinkedIn | https://www.linkedin.com/in/roobixx/On Twitter | https://twitter.com/roobixxAt HackSpaceCon | https://www.hackspacecon.com/speakers24#tim-fowler____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this thought-provoking episode of On Location with Sean and Marco, we soar into the fascinating world of space cybersecurity with our esteemed guest, Tim Fowler. As a penetration tester at Black Hills Information Security, specializing in offensive security, Tim shares his intriguing transition from focusing on terrestrial cybersecurity challenges to those within the space domain.With the space industry rapidly democratizing, he highlights the urgency for better securing our assets in space, drawing a compelling parallel with the historical oversight in the industrial control systems (ICS) sector. The conversation explores the unique challenges and opportunities space cybersecurity presents, including the emerging need for governance, risk, and compliance (GRC) frameworks tailored for space. Tim's insights shed light on the importance of secure software development and contingency planning in this critical yet exhilarating field.Additionally, Tim enthuses about his upcoming workshop at HackSpaceCon, 'Bring Your Own Satellite' (BYOS), aimed at demystifying space cybersecurity through hands-on experience with virtual satellites. The episode also humorously touches upon the concept of 'Deorbit plans' and the fanciful notion of hacking the 'Death Star,' blending deep technical discussion with engaging speculative thought.This episode is a must-listen for anyone curious about the nexus of cybersecurity and space exploration, offering a unique perspective on a domain that is becoming increasingly integral to our daily lives and future aspirations.Key Questions AddressedHow can cybersecurity principles be applied to the space domain?What challenges does the democratization of space present to cybersecurity?How does one begin building a virtual satellite lab?____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage____________________________ResourcesHackSpaceCon: https://www.hackspacecon.com/About Tim's "Bring Your Own Satellite" Workshop: https://www.linkedin.com/posts/roobixx_satellitecommunication-virtuallab-spacetech-activity-7168236170760404992-uY1_/____________________________To see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring our event coverage with an ad placement in the podcast?Learn More
In this episode of The Cybersecurity Defenders Podcast, we talk about cybersecurity issues as they relate to the space industry with Tim Fowler, Offensive Security Analyst at Black Hills Information Security.Tim's unique blend of curiosity, determination, and passion for problem-solving make him stand out in the cybersecurity world. As a frequent speaker on topics ranging from Information Security to Open Source software, Tim's mission is clear: to empower others to take control of their journey and make a positive impact in the world of cybersecurity. Currently Tim is working as an offensive security analyst for Black Hills Information Security - and he is here today to talk to use about the research he has been doing around cybersecurity in space…. and yes, it is as awesome as it sounds.Tim's upcoming training: Introduction to Cybersecurity in Space SystemsResources mentioned in the show:TREKS Cybersecurity FrameworkSpace Attack Research & Tactic Analysis (SPARTA)SPACE-SHIELDOpenSatKitNASA Core Flight SystemTiny GSOpenC3NASA Operational Simulator for Small Satellites
See omnystudio.com/listener for privacy information.
This time, we take you to Long Beach for Knott's Scary Farm's presence at Midsummer Scream (MSS), 2023. After an absence, the Granddaddy of Halloween events returns to MSS on the floor and in the panel room! Joining us, to discuss Knott's Scary Farm's weekend, are Parks and Cons Crew Members (Patreon supporters) Tim Fowler, Larissa Perez, and Jamie Weisgerber. Listen in and enjoy! The YouTube Live of the Knott's Panel may be found at https://www.youtube.com/live/IaYAq8yE_cI?feature=share. Please, consider joining The Parks and Cons Crew, https://www.patreon.com/ParksAndCons!
This time, we have the next installment in our very special podcast series that celebrates the Granddaddy of Halloween, Knott's Scary Farm! This is episode two of the series kick-off that features a panel of guests to discuss this fog-filled event that means so much to so many. Joining us, this time, is Ted Dougherty, Tim Fowler, and Jamie Weisgerber. Listen in and enjoy! Please, consider joining The Parks and Cons Crew, https://www.patreon.com/ParksAndCons!
Welcome to the Creepcast Podcast hosted by Rickcreeper11 . The Creepcast is sponsored by vampfangs.com Episode 29 With Tim Fowler, Haunt builder from the Farm Haunt and Bones Gulch haunt. We discuss Tim's experiences building and designing home haunts and his childhood memories of Halloween. Tim fowler can be found: https://www.instagram.com/the_farm_haunt/ https://www.instagram.com/bonesgulch/ Rickcreeper11 can be found: https://www.instagram.com/rickcreeper11/ https://www.instagram.com/darkalleyproductions/ Podcast Sponsorship: vampfangs.com Production and Voice talent: linktr.ee/Animenji --- Send in a voice message: https://anchor.fm/rickcreeper11/message
This past December, Midsummer Scream presented a new event – Season's Screamings - complete with a Hall of Yuletide Spirits. Like the Hall of Shadows at their signature event, this was a dark showfloor with holiday-themed haunts and displays. Today we'll speak with creators from 5 of those displays. Midsummer Scream is next weekend and everyone we speak to in this episode will be involved, making this the perfect preview. This episode features Tim Fowler of CalHaunts, Rix Fowler of Fear Farm, Cameron McGuinness of Insane Haunt Productions, Joshua Roa St. Pierre of Reichland Asylum, and the Dreich Society. Season's Screamings returns to Pasadena on December 2-4, 2022. Midsummer Scream ( https://midsummerscream.org/ ) is happening July 29-31 at the Long Beach Convention Center. Apply for our Hauntathon before July 29th ( http://hauntathon.info/ ) and Subscribe to all our offerings: https://linktr.ee/hauntedattractionnetwork
Southside Dre is in studio with motivational speaker Tim Fowler to discuss the different dynamics of relationships and marriage.
A couple of months ago, I was invited by wild food writer, Tim Fowler to come on his podcast and talk about my journey into real foods / wild foods and some of the differences between the German and North American Hunting cultures. I had a great time chatting with Tim and figured you would get value from our conversation, so here it is!Overview:How I became obsessed with real food / wild foodsGerman vs. Nort American Hunting CultureCooking wild gameMy advice for you to accelerate at hunting, fishing, and foragingSupport the podcast on Patreon:https://www.patreon.com/poldiwielandDo you follow the podcast on social media yet?IG: https://www.instagram.com/poldiwieland/Twitter: https://twitter.com/theyearofplentyFacebook: https://www.facebook.com/theyearofplenty/Sign up for the newsletter:www.theyearofplenty.comOr subscribe directly using your podcast app. The show is available on Apple Podcasts, Spotify, Google Podcasts and many other platforms!Please rate and review the show in the Apple Podcast app. This always helps the show get ranked so that more curious foodies can explore real food and drink with us.I want to hear from you! Take the LISTENER SURVEY: https://www.surveymonkey.com/r/KZW53RT
What is like travelling to exhibit your work internationally? How do you get funding from the Arts Council? What is it like painting a portrait live in front of a TV crew? What is the best way to manage large-scale commissions for corporate clients? I hopped on the train to Leicester and enjoyed a wonderful afternoon chatting to Tim Fowler and visiting the studios of his fellow artists.Whether he is sketching portraits, firing paint at canvases with a fire extinguisher or creating an NFT portrait of Van Gogh, Tim's bold style is immediately recognisable - expressive paint strokes, a joyfully colourful palette - and of course, a great use of the colour pink!Tim is inspiring in his energetic approach to creating his own opportunities. On this episode, he spoke about overcoming his nerves to take on dauntingly large commissions, painting a portrait live in front of television crews and taking his work to Brooklyn and LA.He is passionate about building a vibrant network of artists in his Leicester studio complex and has impressively secured Arts Council funding to showcase artwork in the gallery space in the building.Follow Tim @timjfowler__________Hosted and produced by Sophie Loxton Lucas, The Visible Artist podcast features individual artists and their paths to success within the creative world. Alongside conversations with an array of practicing artists, Sophie chats to key art world protagonists about their experiences of working with artists. The Visible Artist podcast is a must-listen for any artists looking to make their mark in today's art world. Follow the show @thevisibleartistpodcastFollow Sophie @sophieloxtonlucaswww.thevisibleartistpodcast.comPodcast cover by AmyIsla Mccombie Hosted on Acast. See acast.com/privacy for more information.
Broadcast on June 3, 2021 Hosted by Chris Garlock and Ed Smith This week's show: MD Dems and labor leaders are denouncing Governor Hogan's efforts to end supplemental unemployment insurance payments; we hear from UNITE HERE 25 Executive Secretary-Treasurer John Boardman…Then we get a report from Will Attig, Executive Director of the Union Veterans Council on how veterans joined the picket line at the Mineworker's Warrior Met strike last week. And we discuss class, country music and social change with Tim Fowler, who teaches a class on how these all connect. Produced by Chris Garlock; engineered by Mike Nasella & Kahlia. @wpfwdc @aflcio #1u #unions #laborradiopod @WillAttig @unionveterans @DCHotelworkers
Hi folks and welcome to Elevate Your Game, a podcast where we take a deep dive into how to successfully bag game for the table and make it delicious. We will explore hunting techniques, tools, and equipment to increase your field success and the utensils and culinary techniques that make wild protein delectable. My name is Tim Fowler and I am a Canadian journalist-chef, hunter, fisherman, and wild game cook. We'll talk with relevant experts, review gear that will help you achieve your goals, and provide game preparation details that will deliver memorable meals. DM me your questions on Instagram at timothydfowler and while you're at it give me a follow. Or email your culinary questions to tim@birchcanoe.ca and we'll get to those on the podcast. Whatever your favourite wild protein, together we will Elevate Your Game.
Episode 20 features GB Agegrouper Tim FowlerTim was brought up in a family with a love of horses, growing up and into adulthood Tim rode raced and trained horses. After many years of amateur racing and several injuries along the way Tim describes getting a proper job and became a prison officer. Tims lifestyle completely changed from always outdoors to always being indoors and as the time went by he became less active and started gaining weight. Tim was given the the kickstart he needed after a couple of younger work colleagues challenged Tim to take part in the Oxford half marathon, he trained solidly and to their astonishment beat them all in the race.With his new found fitness Tim didn't want to waste it so he kicked on with more running races, but after watching the Blenheim triathlon on TV Tim bought a bike trained over the winter and started his venture into multisport.After racing at a Agegroup qualifier Tim did some research into what it involved and decided to try and qualify he did his research, raced and qualified for his first race in 2015. Since then he hasn't looked back and has qualified every year since then.Like many of us, Tim sees multisport as a lifestyle.He has been the Chairman of the Prison Officers Triathlon Club for the past three years and his long term goal is to keep going.I hope you enjoy this chat as much as we did and that Tims story inspires you. You can listen to this AMP episode and all the others on most podcast platforms and now we a have our own YouTube channel : AMP GBFind us Instagram amp_1967Twitter agegroupmultisportpodcastFacebook AMPGBYouTube GBWebsite is : agegroupmultisportpodcast.buzzsprout.comemail: agegroupmultisportpodcast@gmail.com
On this episode we sit down with Tim Fowler of The Farm Haunt and CalHaunts! We talk about home haunting in the time of Covid and other fun Halloween things! Enjoy!! --- Support this podcast: https://anchor.fm/tales-from-the-fog/support
In this episode Chuck bring back Tim Fowler for updates on his adventures in Northern Idaho. Don't forget to SUBSCRIBE to our YouTube Channel, to keep up to date on all the latest. BELIEVE If you wish to be a guest on the show, or to discuss collaborative efforts, or events. Please visit us at https://www.sasquatchsyndicate.com or email us at contact@sasquatchsyndicate.com. © 2022 Sasquatch Syndicate Inc. All Rights Reserved. #sasquatch #bigfoot #sasquatchsyndicate #sasquatchsyn
Mother's Day 1982, high school students David Cole and Timothy Fowler die in a fiery blaze at the Cole home in Deerfield Michigan. This episode features an interview with the sister of Tim Fowler. https://www.facebook.com/timfowlerdavidcole/ If you have information on this unsolved case, please contact the Lenawee County Sheriff's Department at 517-266-6161 or, submit an anonymous tip via CrimeStoppers, Online at: www.tipsubmit.com or via text 274637 Start Tip "LENAWEE" Visit our sponsor! Green Chef - For $50 off your first box of Green Chef visit Greenchef.US/alreadygone Additional Music provided by RFM: https://youtu.be/dPEoasBHNiA Support the show.
This week I read two chapters. The first, On Mars, the Management Meets You, deals with a conversation between Makia, Rachel, and Tim Fowler wherein he informs them that the Long Plan has been joined. In the second, Transfer, Makia reports back to Nick Gaeta about that meeting and receives her orders from the Censorship.
This episode I read two chapters from my book. In the first, Nick Gaeta talks to Tim about his reassignment to the Mars Censorship and what changes he would like to make there. In the second, James Hall once again checks in with his old mentor, Tim Fowler. Things do not go quite as he thought they wouldl
On our agenda: Part two of our UK meta discussion with Tim Fowler and Dave Hoyland! - Location unknown, the Big Bad Wolf was last seen colluding with a coven of witches in New Orleans. Inspired, Jesse, Hollis, Dave and Tim are back to discuss everyones favourite form of collusion and hot-button topic, intentional draws! Also, Dave did very well at UK nationals! Join us next week for Episode 98 where we might talk about Blood Money. There's really no way of knowing! Like what we're doing? You can help support us on Patreon; http://www.patreon.com/thewinningagenda
On our agenda: UK meta discussion with Tim Fowler and Dave Hoyland! (Unfortunately, further discussion of Blood Money has been delayed) - His beast-blood still not sated by American flesh, the Big Bad Wolf is still absent! This week Jesse has called in a pair of powerful commonwealth allies, Tim Fowler and Dave Hoyland, to discuss recent events in the UK. Also, Hollis! Join us next week for Episode 97 where Dave discusses his UK nationals experience and we talk in-depth about Intentional Draws (oh my!) Like what we're doing? You can help support us on Patreon; http://www.patreon.com/thewinningagenda
Episode 120: The Art Of The Con Game Length: 34:01 Show Links: RSS | iTunes | Stitcher | Download Episode Welcome back to Vox Republica, the Cardboard Republic Podcast! We post new episodes every other Thursday, with each episode being about 45 minutes long. Vox Republica is proudly supported by our Patreon. Consider contributing today! DESCRIPTION: It seems that summer convention season has begun, which is always a chaotic and exciting time. Of the many things you can do to prepare for that experience, one of them is deciding which games get thrown into your bag. This week, Ryan and Erin go over their (albeit paltry) short list of games they've been playing and then dive into some of their particular favorites to bring on the road. We also share what some of our remaining 2016 con schedule looks like. GUEST: None RECENTLY PLAYED GAMES - (01:19): Rise to Power by APE Games Imhotep by KOSMOS QUICK TOPICS - (8:12): Ryan briefly talks about our latest Kickstarter preview for Tim Fowler's newest game, Fugitive. We briefly go over which conventions the CR will guaranteed to be making an appearance at in the latter half of the year. FEATURED TOPIC - (16:51): Most of the time game conventions are associated with bringing new games home with you. Ask most regular con goers, however, and you'll quickly find that most have a shortlist of games that are often squirreled away that they bring to them, whether it's because of their portability, accessibility, or something else entirely. We share some of our particular favorites, including interesting tidbits such as: What our most common travel games are Why we usually have at least one two-player game Why we often don't bring social bluffing games like Werewolf or Coup The common traits of a good travel game How often we actually pull these games out to use on any given trip PLUGS - (33:14): Did we mention the site's new Instagram already? Pretty sure we haven't. As always, Cardboard Republic YouTube videos and the BGG Guild are still ongoing. Subscribe to either - or both if you really love us. You do really love us, right? We’d love to hear from you! You can send questions or feedback via email at podcast@cardboardrepublic.com. You can also reach us social media, including Twitter, Facebook, and BoardGameGeek. Audio Credits: Intro music track is "Swing!" by Bargo!, used under Creative Commons license.
Chp 33 - About Chaos's Followers - Giving a little history on the rise of the United Terran Government, this chapter also focuses on Chaos's civilian followers and how they rose to power in the government. Chp 34 - Death of an Order - The final battle of the War of Insurrection, this chapter describes the last fight between Chaos's forces and those of the TDF at the Acropolis. Chp 35 - Reporting Back 2 - Beginning in Tim Fowler's office, this chapter has James quickly realizing that the Department of Censorship has found out about his interviews with Eric and have become intensely interested in him.
In the second part of this interview/podcast series, HIT Consultant speaks with Tim Fowler, Commercial Director, Wireless Division of Cambridge Consultants to learn more about: - Key challenges of Bluetooth Low Energy - Regulatory/Technical requirements regarding Bluetooth Low Energy - Fowler's thoughts on future growth of mobile health and connected health
During this year's Mobile World Congress in Barcelona, Cambridge Consultants, a leading technology product design and development firm demonstrated their new Bluetooth low energy (BLE) Blood Pressure Profile iPhone app. Cambridge Consultants recently worked with CSR on tools and example device software that assists developers wishing to create applications for Apple’s latest iPhone and Mac products, specifically the growing mobile health (mHealth) market. The BLE iPhone app demonstrates the transfer of blood pressure readings using the BLE Blood Pressure Profile, while running on an example single-mode BLE device that could readily be incorporated into a blood pressure monitor. Faced with several challenges relating to power consumption, data transfer requirement and constraints of the smartphone. Cambridge Consultants is able to leverage its technical and medical regulatory expertise to optimize usability for both the device and the smartphone to meet the needs of the mHealth space. For mHealth, both local and wide-area communications are required and with most mobile phone operating systems providing native Bluetooth stacks, BLE is an ideal technology for integration. BLE technology is designed for low peak current consumption, permitting operation via standard coin-cell batteries and battery life of up to one year. In the first part of this interview/podcast series, HIT Consultant speaks with Tim Fowler, Commercial Director, Wireless Division of Cambridge Consultants to learn more about: Cambridge Consultants & Tim Fowler background/overview Deep dive into Bluetooth low energy technology BLE Blood Pressure Profile iPhone app