Podcasts about typically

Share on
Share on Facebook
Share on Twitter
Share on Reddit
Copy link to clipboard
  • 3,370PODCASTS
  • 5,170EPISODES
  • 35mAVG DURATION
  • 2DAILY NEW EPISODES
  • Oct 19, 2021LATEST

POPULARITY

20112012201320142015201620172018201920202021


Best podcasts about typically

Show all podcasts related to typically

Latest podcast episodes about typically

Real Relationship Talk
For Richer For Poorer (Marriage Vows Series)

Real Relationship Talk

Play Episode Listen Later Oct 19, 2021 35:27


For Richer For Poorer (Marriage Vows Series)   As we continue our marriage vows series, it's time we talk about money in marriage. Specifically, how we can create a financial plan that will increase communication and decrease conflict. Today, my friend, Dr. Michelle Lappin, a certified wealth coach with Dave Ramsey, is our guest on the podcast. She gives very practical advice on how to have conversations about money, how to start saving, and when you should invest in more riskier avenues like the stock market.   Did you know that financial problems account for an overwhelming majority of divorces? The need for honest and open communication about money is urgent. Michelle's goal is to help people to create a healthier mindset when it comes to finances. My goal is to help couples build healthier relationships. Together, we are going to help you overcome your money challenges. Typically, couples repeat whatever patterns they observed in their families of origin. This can lead to major problems in their marriages if both spouses aren't on the same page. Join the conversation and take away some practical tips that will help you to overcome financial challenges and truly create wealth in your marriage.   Links Mentioned in this Episode Learn More About Dr. Michelle Lappin's Financial & Wealth Programs   Join the Real Relationship Talk / Christian Marriages & Relationships Facebook Community!       SUBSCRIBE | SHARE | RATE | COMMENT To ensure you never miss an episode, be sure to subscribe on Apple Podcasts, Google Play, Spotify, Stitcher, iHeart Radio, or wherever you listen to podcasts. Remember, sharing is caring! So, share these episodes with your friends and family via email or social media.    

Don't Stop Us Now! Podcast
Lena Andersson - Not a Quitter

Don't Stop Us Now! Podcast

Play Episode Listen Later Oct 19, 2021 33:28


It doesn't take much imagination to work out how many challenges tourism businesses have been facing during the pandemic. Typically, those who've been challenged the most can offer us the most interesting and helpful stories and advice. So our latest episode features the first of several amazing female travel entrepreneurs we'll be featuring in the coming weeks. Lena Andersson is the Founder and CEO of ‘Go Running Tours', a global platform where you can book guided sightseeing runs in more than 70 cities and towns around the world. Pre Covid last February, Lena's business was really hitting its strides (excuse the pun!) and receiving record bookings. . . and then Covid happened. Prior to founding her global running tours business, Lena had a successful career in marketing for large corporates in the UK and Denmark. She was traveling more than 200 days a year and that's when she came upon the idea that literally inspired her to quit the very next day. A friend in a foreign city took her for a run that combined running with sightseeing and Lena thought how amazing it would be if she could do this in every destination she travelled to. Little could Lena have imagined 8 plus years ago that she'd have to deal with all the trials and tribulations a global pandemic would bring. We think you'll be blown away by Lena's resilience and positivity and you'll also hear: How Lena decided her next steps when the world shut down last yearHow she's got through the devastating impact COVID has had on her businessLena's career advice if you're an introvert; andWhy she's optimistic about the future for her business despite everything she's been through.Enjoy this episode with the positive and purposeful Lena Andersson. Useful LinksGo Running Tours WebsiteLena on LinkedInGoRunningTours on InstaGoRunningTours on FacebookGoRunning Tours on Strava See acast.com/privacy for privacy and opt-out information.

Making Sense
Safest Bank Balance Sheets in Three Generations [Ep. 129, Eurodollar University]

Making Sense

Play Episode Listen Later Oct 18, 2021 63:43


Dear Ladies and Gentlemen,Typically the show notes are loaded with information about the show, reference material and acknowledgement of the people that helped make the show.  Unfortunately Episode 129 was damned by the Universe and came to us straight from Hades, Ring Four, Pit 03 (on the left).  Thankfully all the content is there.  But everything else, everything else that it takes to make the show was cursed by Podcast Deus.  Everything went wrong, not just for me but for everyone involved with the show.  Therefore I am having none of it with this show--it has bad juju.  I cast it back into Mount Doom where it can join the ring.Sincerely,Emil 

OVERFLOW with Kimberly Snider
Investing in Your Leadership with Brianne Ligori and Belinda Clemmensen

OVERFLOW with Kimberly Snider

Play Episode Listen Later Oct 18, 2021 40:54


Recreate leadership. Challenge your assumptions. Here is a new model: it's called "Side-by-Side."“Coaching” is about asking questions, being curious. Let's talk about creating a “Coach culture” at work and how it helps shift from “tell” and giving all the answers to a culture where leaders and individuals walk, work and creatively solve problems side-by-side. Witness the impact during meetings (making them more effective) and notice innovation, engagement and retention.What is leadership? And how can I be successful? It's not complicated, but equally, it doesn't seem simple. That's why Leader Coach Intensive is here! To train leaders to coach so they can better engage and empower their teams. Typically, business invests in skill training, are you ready to invest in your leadership. Newsflash – the impact of your leadership skills directly drives business success.What is your powerful question? (Hint: it's a question, not advice.)How will leading side-by-side (rather than having all the answers and traditional hierarchical leadership) shift your view of leadership, human connection and the modern workforce?Connect with Brianne and Belinda today:Connect with Brianne and Belinda today:Instagram: https://www.instagram.com/leadercoachintensive/Linkedin: https://www.linkedin.com/company/leader-coach-intensive/Website: https://leadercoachintensive.com/TIP: Launching “Become a Certified Coach” Coaching program October 2021!BIG NEWS: LCI Coach Certification training course starts October 27th Let's connect!Facebook: https://www.facebook.com/groups/PeopleBrain.OVERflow/Website: https://peoplebrain.ca/Instagram: https://www.instagram.com/overflow_podcast/LinkedIn: https://www.linkedin.com/in/kimberly-j-snider/ See acast.com/privacy for privacy and opt-out information.

Drummer's Resource
635 – Motivation and Self-Doubt with Daniel Glass

Drummer's Resource

Play Episode Listen Later Oct 18, 2021 53:51


Over the past few weeks I've felt frustrated, unmotivated and unfocused in the practice room. Typically, I call one of my drumming buddies and talk through it and come out ... more The post 635 – Motivation and Self-Doubt with Daniel Glass appeared first on Drummer's Resource: Conversations with the world's greatest drummers and music industry pros..

Better Man The Podcast
Men in the 20s | Featuring Clint Bruce

Better Man The Podcast

Play Episode Listen Later Oct 18, 2021 39:07


The 20s are not a throwaway decade for a man. Typically, during this decade, he will make some of the most important decisions of his life. This decade is not a dress rehearsal; it counts. On this episode, former NFL Linebacker & Navy Seal Clint Bruce gives men in their 20s a unique way to think about this critical decade. Learn more about Clint: https://www.clintbruce.com/ Learn more about BetterMan: https://betterman.com/

Fibromyalgia Real Solutions With Amanda Love
Episode 89 - Derek Nielsen - Physical Therapy a Different Way

Fibromyalgia Real Solutions With Amanda Love

Play Episode Listen Later Oct 17, 2021 31:53


Have you done Physical Therapy but it hasn't worked? Maybe you need hand's on before doing that. In this episode :How long do you work with people?Hand's on TherapyDoesn't start with movement if it is painfulPain Solution before getting into movementWe need to mix up the activities we do! Most people with fibromyalgia can PALM the floor!Pain is not simplicity Go to someone who looks at the whole body Derek Nielsen bio- I am a physical therapist located in Durham, North Carolina, and the owner of Kaizen Physical Therapy. I specialize in focusing on treating movement dysfunctions over symptoms. I believe this is the reason why my patients get such superior results when others can't help them. Specifically, pain typically can be boiled down to one of two movement dysfunctions: 1. Tight joints or muscles 2. Weak joints or muscles. I have found through continuous testing that the area which is in pain is often NOT the area where the root cause of the pain exists. This is especially true if there was not a traumatic injury. In other words, if the pain came on gradually over time and there is no known exact incident one can attribute to when the pain began — this person is likely dealing with pain that is attributable to compensation. The area in pain is hurting because it's compensating for another area that is stiff/tight, or weak. My treatment approach involves diagnosing the entire body for stiffness and weakness (i.e. movement dysfunctions) — not symptoms. By correcting these dysfunctions, pain begins to improve. Typically, this is true regardless of arthritis, degenerative disc disease, herniated discs, etc...His website: https://www.kaizenpt.com/Amanda Elise LoveHave a conversation with me about your 2021 health goals -http://bit.ly/2ko8lSpInstagram - https://bit.ly/3fhjmfJFacebook personal page- https://bit.ly/2Wlwc4aFacebook business page- https://www.facebook.com/amandaeliseloveWebsite - http://www.amandaeliselove.comThe best gift for the 2nd anniversary is you can write a 5-star review as positive reviews really help the podcast!  You can also consider following! If you are on Instagram you can take a screenshot and be sure to tag me so I know you are tunning in!  Link to leave a review - https://apple.co/2TgYURyGot a question? Or maybe a guest suggestion? Email me at amandaeliselove@gmail.com

Craig Peterson's Tech Talk
How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why?

Craig Peterson's Tech Talk

Play Episode Listen Later Oct 15, 2021 84:46


How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why? We've got a new study out showing that North American organizations, businesses, and others, are being hit with an average of 497 cyber attacks per week, right here in the good old USA. [Following is an automated transcript] This is a study by checkpoint software technologies. Checkpoint, I used, oh my gosh. It would have been back in the nineties back then. They were one of the very first genuine firewall companies. And it was a system that I was putting in place for my friends over at troopers. I think it was New England telephone. It might've been Verizon by then. I can't even remember, man. [00:00:41] It's been a little while, but it was, a system we were using in front of this massive system that I designed, I made the largest internet property in the world. At that time called big yellow. It morphed into super pages. It might be familiar with. But it was me and my team that did everything. We built the data center out. [00:01:05] We wrote all of the software. Of course they provided all of the yellow pages type listing so we can put it all in. And we brought it up online and we were concerned. Well, first of all, You know, I've been doing cyber security now for over 30 years. And at this point in time, they wanted something a little more than my home grown firewall. [00:01:29] Cause I had designed and written one in order to protect this huge asset that was bringing in tens of millions of dollars a year to the phone company. So they said, Hey, listen, let's go ahead and we'll use checkpoint and get things going. We did, it was on a little, I remember it was a sun workstation. If you remember those back in the. [00:01:52] And it worked pretty well. I learned how to use it and played with it. And that was my first foray into kind of what the rest of the world had started doing, this checkpoint software, but they've continued on, they make some great firewalls and other intrusions type stuff, detection and blocking, you know, already that I am a big fan, at least on the bigger end. [00:02:17] You know, today in this day and age, I would absolutely use. The Cisco stuff and the higher end Cisco stuff that all ties together. It doesn't just have the fire power firewall, but it has everything in behind, because in this day and age, you've got to look at everything that's happening, even if you're a home user. [00:02:37] And this number really gets everybody concerned. Home users and business users is. Businesses are definitely under bigger attacks than home users are. And particularly when we're talking about businesses, particularly the bigger businesses, the ones that have a huge budget that are going to be able to go out and pay up, you know, a million, $10 million ransom. [00:03:05] Those are the ones that they're after and this analysis. Point software who does see some of those attacks coming in, showed some very disturbing changes. First of all, huge increases in the number of cyber attacks and the number of successful ransoms that have been going on. And we're going to talk a little bit later, too, about where some of those attacks are coming from, and the reason behind those attack. [00:03:36] According to them right now, the average number of weekly attacks on organizations globally. So far, this year is 40% higher than the average before March, 2020. And of course that's when the first lockdowns went into effect and people started working from home in the U S the. Increase in the number of attacks on an organizations is even higher at 53%. [00:04:07] Now you might ask yourself why, why would the U S be attacked more? I know you guys are the best and brightest, and I bet it, I don't even need to say this because you can figure this out yourself, but the us is where the money is. And so that's why they're doing it. And we had president Biden come out and say, Hey, don't attack the. [00:04:27] well, some of those sectors are under khaki for more after he said that then before, right. It's like giving a list to a bad guy. Yeah. I'm going to be gone for a month in June and yeah, there won't be anybody there. And the here's the code to my alarm. Right. You're you're just inviting disaster checkpoints. [00:04:49] Also showing that there were more. Average weekly attacks in September 21. That's this September than any time since January, 2020. In fact, they're saying 870 attacks per organization globally per week. The checkpoint counted in September was double the average in March, 2020. It's kind of funny, right? [00:05:14] It's kind of like a before COVID after COVID or before the Wu Han virus and after the Wu Han virus, however, we might want to know. So there are a lot of attacks going on. Volume is pretty high in a lot of different countries. You've heard me say before some of my clients I've seen attack multiple times a second, so let's take a second and define the attack because being scanned. [00:05:40] I kind of an attack, the looking to see, oh, where is there a device? Oh, okay. Here's a device. So there might be a home router. It might be your firewall or your router at the business. And then what it'll do is, okay, I've got an address now I know is responding, which by the way is a reason. The, we always configure these devices to not respond to these types of things. [00:06:04] And then what they'll do is they will try and identify it. So they'll try and go into the control page, which is why you should never have when. Configuration enabled on any of your routers or firewalls, because they're going to come in and identify you just on that because all of a sudden them brag about what version of the software you're running. [00:06:26] And then if it's responding to that, they will try and use a password. That is known to be the default for that device. So in a lot of these devices, the username is admin and the password is admin. So they try it and now off they go, they're running. Some of these guys will even go the next step and we'll replace the software. [00:06:52] In your router or firewall, they will replace it so that it now directs you through them, everything you are doing through them. So they can start to gather information. And that's why you want to make sure that the SSL slash TLS. That encryption is in place on the website. You're going to, so if you go to Craig peterson.com right now, my website, I'm going to go there myself. [00:07:22] So if you go to Craig peterson.com, you're going to notice that first of all, it's going to redirect you to my secure site and it doesn't really matter. You won't see it. Okay. But you are there because if he. Typically at the left side of that URL bar where it says, Craig peterson.com. You'll see, there's a little lock. [00:07:44] So if you click that lock, it says connection is secure. Now there's a lot more we could go into here. But the main idea is even if your data is being routed through China or. Both of which have happened before many tens of thousands, hundreds of thousands of time times. I'm not even sure of the number now. [00:08:06] It's huge. Even if your data is being routed through them, the odds are, they're not going to see anything. That you are doing on the Craig Peterson site. Now, of course you go into my site, you're going to be reading up on some of the cybersecurity stuff you can do. Right. The outages what's happened in the news. [00:08:27] You can do all of that sort of thing on my side, kind of, who cares, right? Um, but really what you care about is the bank, but it's the same thing with the bank. And I knew mine was going to be up there. And when everybody just check it out anyway, so. So the bad guys, then do this scan. They find a web page log in. [00:08:47] They try the default log in. If it works, the Le the least they will do is change. What are called your DNS settings. That's bad because changing your DNS settings now opens you up to another type of attack, which is they can go ahead. And when your browser says, I want to go to bank of america.com. It is in fact, going to go out to the internet, say is bank of America, the bad guys. [00:09:18] Did, and they will give you their bank of America site that looks like bank of America feels like bank of America. And all they're doing is waiting for you to type into your bank of America, username and password, and then they might redirect you to the. But at that point, they've got you. So there are some solutions to that one as well, and Firefox has some good solutions. [00:09:44] There are others out there and you had to have those that are in the works, but this is just an incredible number. So here's what I'm doing, right. I have been working for weeks on trying to figure out how can I help the most people. And obviously I needed to keep the lights on, right? I've got to pay for my food and gas and stuff, but what I'm planning on doing and what we've sketched out. [00:10:10] In fact, just this week, we got kind of our final sketch out of it is we're going to go ahead and have a success path for cyber security. All of the basic steps on that success path will be. Okay. So it will be training that is absolutely 100% free. And I'll do a deeper dive into some of these things that I'm doing that I'm doing right now here on the radio, because you can't see my desktop. [00:10:40] It's hard to do a deep dive and it's open to anybody, right? If you're a home user or if you're a business user, all of the stuff on that free. Is going to help you out dramatically. And then after that, then there'll be some paid stuff like a membership site. And then obviously done for you. If the cybersecurity stuff is just stuff that you don't want to deal with, you don't have the time to deal with. [00:11:05] You don't want to learn, because believe me, this is something that's taken me decades to learn and it's changing almost every day. So I understand if you don't want to learn it to. That is the other option. I'll give you, which is done for you, which we've been doing now for over 20, 30 years. Stick around. [00:11:25] We'll [00:11:25] So which sectors are economy are being hacked? I mentioned that in the last segment, but yeah, there are some problems and the sectors that president Biden lined out laid out are, are the ones that are under, even more attack after his message. [00:11:42] 497 cyber attacks per week. On average here in the US, that is a lot of attacks. And we started explaining what that meant so that we talked about the scan attacks that are automated and some person may get involved at some point, but the automated attacks can be pretty darn automated. Many of them are just trying to figure out who you are. [00:12:09] So, if it shows up, when they do that little scan that you're using a router that was provided by your ISP, that's a big hint that you are just a small guy of some sort, although I'm shocked at how many bigger businesses that should have their own router, a good router, right. A good Cisco router and a really good next generation firewall. [00:12:34] I'm shocked at how many don't have those things in place, but when they do this, That's the first cut. So if you're a little guy, they'll probably just try and reflash your router. In other words, reprogram it and change it so that they can start monitoring what you're doing and maybe grab some information from. [00:12:56] Pretty simple. If you are someone that looks like you're more of a target, so they connect to your router and let's say, it's a great one. Let's say it's a Cisco router firewall or Palo Alto, or one of those other big companies out there that have some really good products. Uh, at that point, they're going to look at it and say, oh, well, okay. [00:13:18] So this might be a good organization, but when they get. To it again, if when access has turned on wide area, access has turned down, that router is likely to say, this is the property of, uh, Covina hospital or whatever it might be, you know? And any access is disallowed authorized access only. Well, now they know. [00:13:42] Who it is. And it's easy enough just to do a reverse lookup on that address. Give me an address anywhere on the internet. And I can tell you pretty much where it is, whose it is and what it's being used for. So if that's what they do say they have these automated systems looking for this stuff it's found. [00:14:02] So now they'll try a few things. One of the first things they try nowadays is what's called an RDP attack. This is a remote attack. Are you using RDP to connect to your business? Right? A lot of people are, especially after the lockdown, this Microsoft. Desktop protocol has some serious bugs that have been known for years. [00:14:25] Surprisingly to me, some 60% of businesses have not applied those patches that have been available for going on two years. So what then button bad guys will do next. They say, oh, is there a remote desktop access? Cause there probably is most smaller businesses particularly use that the big businesses have a little bit more expensive, not really much more expensive, but much better stuff. [00:14:51] You know, like the Cisco AnyConnect or there's a few other good products out there. So they're going to say, oh, well, okay. Let's try and hack in again. Automate. It's automated. No one has to do anything. So it says, okay, let's see if they patch, let's try and break in a ha I can get in and I can get into this particular machine. [00:15:14] Now there's another way that they can get into their moat desktop. And this apparently has been used for some of the bigger hacks you've heard about recently. So the other way they get in is through credential stuff. What that is is Hey, uh, there are right now some 10 billion records out on the dark web of people's names, email addresses, passwords, and other information. [00:15:43] So, what they'll do is they'll say, oh, well this is Covina hospital and it looks it up backwards and it says, okay, so that's Covina hospital.org. I have no idea if there even is a Gavino hospital, by the way, and will come back and say, okay, great. So now let's look at our database of hacked accounts. Oh, okay. [00:16:04] I see this Covina hospital.org email address with a password. So at that point they just try and stuff. Can we get in using that username and password that we stole off of another website. So you see why it's so important to be using something like one password, a password generator, different passwords on every site, different usernames on every site, et cetera, et cetera. [00:16:29] Right. It gets pretty important per te darn quickly. So now that they're in, they're going to start going sideways and we call that east west in the biz. And so they're on a machine. They will see what they can find on that machine. This is where usually a person gets some. And it depends in historically it's been about six days on average that they spend looking around inside your network. [00:17:00] So they look around and they find, oh yeah, great. Here we go. Yep. Uh, we found this, we found that. Oh, and there's these file server mounts. Yeah. These SMB shares the, you know, the Y drive the G drive, whatever you might call it. So they start gaining through those and then they start looking for our other machines on the network that are compromised. [00:17:23] It gets to be really bad, very, very fast. And then they'll often leave behind some form of ransomware and also extortion, where that extort you additionally, for the threat of releasing your data. So there, there are many other ways they're not going to get into them all today, but that's what we're talking about. [00:17:43] Mirman, we're talking about the 500 cyber attacks per week against the average. North American company. So we have seen some industry sectors that are more heavily targeted than others. Education and research saw an 60% increase in attacks. So their education and I've tried to help out some of the schools, but because of the way the budgets work and the lowest bidder and everything else, they, they end up with equipment. [00:18:17] That's just totally misconfigured. It's just shocking to me. Right. They buy them from one of these big box online places. Yeah. I need a, a Cisco 10, 10. And I need some help in configuring it and all, yeah, no problems or we'll help you. And then they sell it to the school, the school installs it, and it is so misconfigured. [00:18:38] It provides zero protection, uh, almost zero, right. It provides almost no protection at all. And doesn't even use the advanced features that they paid for. Right. That's why, again, don't buy from these big box. Guys just don't do it. You need more value than they can possibly provide you with. So schools, 1500 attacks per week research companies, again, 1500 attacks per week, government and military. [00:19:10] Entities about 1100 weekly attacks. Okay. That's the next, most highest attacked. Okay. Uh, health care organizations, 752 attacks per week on average. Or in this case, it's a 55% increase from last year. So it isn't just checkpoints data that I've been quoting here. That, that gives us that picture. There are a lot of others out there IBM's has Verizon's has all of these main guys, and of course in the end, They've got these huge ransoms to deal with. [00:19:50] Hey, in New Hampshire, one of the small towns just got nailed. They had millions of dollars stolen, and that was just through an email trick that they played in. K again. I T people, um, I I've been thinking about maybe I should put together some sort of coaching for them and coaching for the cybersecurity people, even because there's so much more that you need to know, then you might know, anyways, if you're interested in any of this. [00:20:22] Visit me online. Craig peterson.com/subscribe. You will get my weekly newsletter, all of my show notes, and you'll find out about these various trainings and I keep holding. In fact, there's one in most of the newsletters. Craig peterson.com. Craig Peterson, S O n.com. Stick around. [00:20:43] We've been talking about the types of attacks that are coming against us. Most organizations here in north America are seeing 500 cyber attacks a week, some as many as 1500. Now, where are they coming from? [00:21:00] Whether they're scanning attacks, whether they're going deeper into our networks and into our systems who are the bad guys and what are they doing? Microsoft also has a report that they've been generating, looking at what they consider to be the source of the attacks. Now we know a lot of the reasons I'm going to talk about that too, but the source is an interesting way to look at. [00:21:29] Because the source can also help you understand the reason for the attacks. So according to dark reading, this is kind of an insider, a website you're welcome to go to, but it gets pretty darn deep sometimes, but they are showing this stats from Microsoft, which you can find online that in the last year rush. [00:21:53] Has been the source of 58% of the cyber cat tax. Isn't that amazing now it's not just the cyber attacks. I, I need to clarify this. It's the nation state cyber tech. So what's a nature's nation state cyber attack versus I don't know, a regular cyber attack. Well, the bottom line is a nation state cyber attack is an attack that's occurring and is actually coordinated and run by and on behalf of a nation state. [00:22:31] Uh, So Russia at 58% of all nation state attacks is followed by North Korea, 23% Iran, 11% China, 8%. Now you probably would have thought that China would be. Right up there on that list, but Russia has 50% more of the nation state cyber attacks coming from them than from China. And then after China is south Vietnam, Viet, or I should say South Korea, Vietnam, and Turkey, and they all have less than 1%. [00:23:14] Now, this is this new pool of data that Microsoft has been analyzing. And it's part of this year's Microsoft digital defense report, and they're highlighting the trends in the nation state threat cyber activity hybrid workforce security. Disinformation and your internet of things, operational technology and supply chain security. [00:23:35] In other words, the whole gambit before, before all of this, now the data is also showing that the Russian nation state attacks are increasingly effective, calming from about a 21% successful compromise rate last year to 32%. So basically 50% better this year at effectiveness there, Russians are also targeting more government agencies for intelligence gathering. [00:24:10] So that jumped from 3% of their victims last year to 53%. This. And the Russian nation state actors are primarily targeting guests who us, right? The United States, Ukraine and the United Kingdom. Now this is all according to the Microsoft data. So why has Russia been attacking us? Why is China been attacking us and why the change this. [00:24:38] Well, Russia has been attacking us primarily to rent some us it's a cash cow for them just like oil and gas. They are making crazy money. Now that president Biden has made us dependent on foreign oil supplies. It's just insanity and even dependent on. Gas coming from other places. Well guess where the number one source of gases now for Europe and oil it's Russia. [00:25:08] So we are no longer going to be selling to Europe. Russia is so they're going to be making a lot of money off of. But before then they were actually counted on ransomware to help fund the Russian federal government, as well as of course, these Russian oligarchs, these people who are incredibly rich that have a substantial influence on the government. [00:25:33] Don't if you're wondering who they might be, just think of people like, oh, I don't know. Bill gates and, uh, w who are on the, some of the other big guys, you know, Tim cook, uh, Amazon's Jeff bayzos Elon Musk, right? Those are by my definition and looking it up in the dictionary, they are all a. They get exemptions to laws. [00:25:58] They get laws passed that, protect them. In fact, most of regulations actually protect these big companies and hurt small companies. So I would call them oligarchs and that's the same sort of thing in Russia in Russia. Okay. They probably have a little bit more underhanded stuff than these guys here do, but that's what Russia has been. [00:26:21] China has been continually going after our national secrets, national defense, the largest database of DNA of Americans DNA, of course, is that unique key. If you will building block for all of us, that's what DNA is. And the largest database of all of that uniquely identifying information is in. China stole from the office of personnel management records of a federal employees, their secret clearance, all of their background check information who was spoken with, what did they have to say? [00:27:03] And on and on. So China has been interested in infiltrating our businesses that provide things to the military and the military themselves and the federal state, and even the local governments that's who they've been targeting. And that's why there's 8% number might seem small. Although, as I just mentioned this year, Russia moved, moved dramatically. [00:27:30] They used to be about 3% of their attacks or against the government agencies. And now it's 53%. So Russia. And China are going after our national secrets and they can use them in a cold war, which as I've said, I think the first shots of the third world war have been fired. And frankly, they're all cyber, it's all online and Russia. [00:27:57] Isn't the only nation state actor who's changing its approaches here as espionage is the most common goal amongst all nation state groups as of this year. Tivity of hackers reveals different motivations in Iran, which quadrupled its targeting of Israel. Surprise, surprise. Over the last year. And Iran has been launching destructive attacks, things that will destroy power, power plants, et cetera, and North Korea, which is targeting cryptocurrency companies for profit. [00:28:29] So they're stealing these various crypto coins again, funding their government. So it's, it's a problem. Absolute problem. Government sectors are some of the most targeted 48%. These NGOs non-government organizations that act kind of a quasi government functions and think tanks are 31%. Uh, and Microsoft, by the way, has been alerting customers of nation, state attack, attack attempts. [00:29:01] Guess how many this year that they had to warn about 20,500 times in the past three years. So that's a lot and Microsoft is not a company that's been out there at the front lines. It never has been it's in behind. So to have them come out and say, this is. And okay, by the way, your stolen username and password run for a buck per thousand, and it's only gonna take you hundreds of hours to get it all cleared up. [00:29:32] Isn't that nice spear fishing for a hire can cost a hundred to a thousand dollars per successful account takeover and denial of service attacks are cheap from protected sites, roughly $300. Per month. And if you want to be ransomware king, it's only going to cost you 66 bucks upfront 30% of the profit. [00:29:54] Okay. Craziness. Hey, visit me online. Sign up Craig, peter.com/subscribe. [00:30:03] I had an interesting mastermind meeting this week. There's six of us. We're all business owners and it opened my eyes pretty dramatically because one of the members got hacked, but that's not what I really want to emphasize. [00:30:20] This whole cybersecurity thing gets pretty complicated, pretty quickly. And a friend of mine who is in one of my mastermind groups had a real problem. And the here's here's what went on. We'll call him Walt for back of a letter, lack of a better name since that is his name. [00:30:40] And he doesn't mind me sharing this with you. Walt has a very small business that he and his wife run, and they have a couple of contractors that help out with some things, but his business is very reliant on advertising and primarily what he does is Facebook advertising. Now I've been talking for two years, I think in this mastermind group about cyber security and the fact that everyone needs good cyber security. [00:31:13] And he always just kind of pole hum to, uh, wow. You know, and it's just too complicated for me. I got to thinking for a, you know, a bit, really a few weeks, what does he mean to complicated? Cause there's some basic things you can do. So this week on Tuesday, I was on our mastermind groups meeting and I explained, okay, so here's what happened to Walt. [00:31:42] He had $40,000 stolen, which by the way, it's a lot of money for a teeny tiny husband wife company. And. Uh, well, here's what we did. He, we helped them. We got the FBI involved and, you know, with our direct ties, cause we work with them on certain types of cases and he got back every dime, which is just totally unheard of. [00:32:06] But um, without going into all of the details there, I spent a problem. 1520 minutes with the whole group and the mastermind explaining the basics of cyber security. And that really kind of woke me up, frankly, because of their responses. Now these are all small business owners and so they're making pretty decent money. [00:32:31] In fact, every one of them and they all have some contractors and some employees all except for Walt and his wife, they had just have contractors and. I had two completely different responses from two members of this group that no. Let me tell you this was really eye opening for me. And this is why you might've heard me in the first segment talking about this, but this is why I have really changed my view of this stuff, this cybersecurity stuff, because I explained. [00:33:08] If you're using things like Norton antivirus or McAfee, antivirus, or really any of them, even the built-in Microsoft defender this year, those standard antivirus system. I have only been able to catch about 30% of the malware out there, 30%, you know, that's like having a house and you've got a security guard posted out front. [00:33:39] He's armed, he's ready to fight. And yet all of your windows are open and all of your doors are unlocked. And all someone has to do is crawl in the side window because that guy that's posted up front, he's not going to be able to stop. So 30% effectiveness. And of course, Walt had all of the basic stuff. [00:33:59] He thought he was good enough. It's not worth spending time or money doing any of this. And of course it turned out to be well worth the time and money if he had done it. But he has a friend who has contacts and, and made things happen for him. So I guess he's kind of, kind of lucky in that regard, but I explained that and I said, do you know the, the way you. [00:34:21] To go. If you're a small business, it's about $997 a month for a small business, with a handful of employees to get the type of security you really need. There's going to catch. 90 something 98%. Maybe if, if things go well of the stuff going on, in other words, you don't just have an armed guard at the front door. [00:34:46] You've got all the windows closed and blocked and the doors closed and locked as well. So yeah, somebody can still get in, but they got to really want to get in and risk getting caught. So that's kind of the analogy that I used now. One of the members of my. Of my mastermind thought, well, okay. Cause you're just being Frank with me. [00:35:09] Right? We're all friends. She said, well, initially I thought, oh Craig, I'm going to have to have you help out with stuff here. Cause my, you know, I'm concerned about my security. I make some good money. Uh, she's the one that has employee. She has a million dollar plus a year business and she wants to keep it safe. [00:35:26] But then she. Uh, you know, but, but you know, you were talking about all of this Norton and stuff and that it doesn't work. So I, I just, I don't have any hope. And that's when the another member jumped in and this other member said, well, Uh, oh, that's not what I got at all. I got the, the normal off the shelf stuff that you buy that you're going to get from Amazon, or you're going to get from PC connection or wherever that stuff is not going to work, but there is stuff that does, but it's only professional stuff. [00:36:02] You can only get it from professionals that are trained in certified. Which is the right message. Right. That was the message I was trying to relay. Yeah. Don't try and do it yourself because you can't even get the right tools that you need. That is frankly a problem. So that really got me to think. In, in a very big way, because here are two people that have heard me talk about cybersecurity and their eyes probably glazed over, but now their eyes, I know at least one of these ladies definitely glazed over. [00:36:36] So I've come to the realization that sometimes I. A little too deep into things. And although I can explain it quite well to many people, sometimes people glaze over and I get emails from you guys saying kind of the same thing. I really appreciate it. I don't understand a lot of what you're saying, Craig, but thanks for being there. [00:36:59] Listen to you every week here on the radio. Uh, then that's good. That's reassuring, but now I've come to realize a few things. One is. The I've got to be a lot clearer in my messaging, because even when talking to my friends, it is a little bit overwhelming for them sometimes. Right. And then the next thing is everybody needs help because you're being lied to. [00:37:29] Right. How are people getting ransomware? If the stuff that they're buying work. Maybe it's just me, but I think there's a disconnect there. So a lot of you guys have gone out and you've hired people and I want to spend just a few minutes right now, going through some red flags that you need to be looking out for in vendor security assessment. [00:37:56] Now I'm putting one together. As well, right yet another one. Uh, and what I'm trying to do is help you out, right? This is not as sales tool. It is trying to help you figure out where you're at. I'm putting together a webinar that I'm going to be holding these what I'm calling bootcamps, where I go through and show you exactly how to do the basic steps that you need to do in order to be safe on. [00:38:25] Okay. If an online, all that means is your, is plugged in, right. Okay. It doesn't mean you're going out and doing a lot of stuff out there on the internet just means it's connected. So those are going to be coming out. I will send an email out as soon as all of that. Stuff's ready. Cause. Absolutely free. And these assessments, I have the basic one that you can do yourself. [00:38:47] It's a self-assessment. And then I have the more advanced ones that I do that are five grand. Okay. So you've got to be a decent sized business for this to make sense where we look for all of the security problem. On all of your computers and your networks, and then give you a list of things you need to do and how to do them. [00:39:10] Okay. So it's well worth it for them, but if you're a very small company and you're trying to do some of this yourself, I want to help you. So that's what these boot camps are going to be all over. And also what the scorecard is going to be all about. So that's coming up, but here are some good red flags and an assessment. [00:39:30] I found this again on dark reading. This is kind of an insider website for those of us in the cybersecurity business, but, um, How can you verify the information that vendors are giving you about their own cybersecurity posture? We've heard in the news and I've talked about them all year, this year, and for years past. [00:39:56] That are we're vendors can be our worst nightmare because some of these hacks come in through our vendors. So you've got yourself, a cybersecurity company. How do you know if they are really telling you the truth? And man, is that hard for you to know? Right. You're going to ask him questions and the salesmen are going to say, oh yeah, yeah, yeah. [00:40:21] That's why we don't have salesmen. Right. We have engineers. You talk to me, you might talk to my son or my daughter, people who have been doing this with me, who I have trained and helped out. So this guy who wrote the article and there's this on attributed, I don't see an attribution on here on this page. [00:40:41] I definitely want to give him, probably I heard is John Babinec wrote this thing and he is a principle threat hunters. What he calls himself over at net and rich. So he says, here's what you got to do. And if you're trying to be cost-effective, he puts it in. What I call an ed month clause. And one of these days I'll tell you that story, but he calls it a validity check question so that an honest vendor would tell you, no, they don't do X and give you a good reason why they don't like it's not cost effective. [00:41:17] It's outside of a reasonable risk model. Does that make sense to you? So when you're trying to evaluate a vendor, who's going to be doing your cyber security put in one of these validity checks put in one of these questions. It doesn't really matter to you, but it's something that would be very hard for one of these cybersecurity companies to do. [00:41:42] And maybe it doesn't fit the risk model that you have. I think it's just absolutely brilliant. Probably one of the better ways when you're trying to evaluate an MSSP as cybersecurity managed or otherwise provider stick in something like that. So you have a red flag that just stands out for you. All right. [00:42:04] Make sure you are registered online. Craig Peter sohn.com/subscribe. So you can find out about all of these trainings coming up. [00:42:17] If you've never heard of the Carrington event, I really hope, frankly, I really, really do hope we never have to live through one of these. Again, there is a warning out there right now about an internet apocalypse that could happen because of the Sun. [00:42:34] Solar storms are something that happens really kind of all of the time. The sun goes through solar cycles. About every seven years, there are longer cycles as well. You might know. I have an advanced class amateur radio license I've had for a long time, and we rely a lot when we're dealing with short wave on the solar cycle. [00:42:59] You see what happens is that the sun charges, the atmosphere. You see that if you've ever seen the Northern light, that is. Part of the Sunzi missions, hitting our magnetic field and kind of getting sucked into the core of the earth, if you will, as they get caught in that field. And the more charged the atmosphere is, the more bounce you get. [00:43:24] That's what we call it bounce. And the reason us hams have all these different frequencies to use is because of the battle. We can go different frequencies with different distances, I should say, using different frequencies. So think about it right now. You've got the earth and I want to talk from Boston to Chicago. [00:43:47] For instance, I know about how many miles it is, and I have to figure out in the ionosphere up in the higher levels of the atmosphere, what frequency. To use in order to go up into the atmosphere, bounce back, and then hit Chicago. That's the idea. It's not quite as simple or as complex in some ways, as it sounds, a lot of people just try different frequencies and a lot of hams just sit there, waiting for anybody anywhere to talk to, particularly if they are. [00:44:20] It's really quite fun. Now what we're worried about, isn't so much just the regular solar activity. We get worried when the sun spots increase. Now, the solar cycle is what has primary image. On the temperature on earth. So no matter what, you might've heard that isn't your gas, guzzling car or a diesel truck that causes the Earth's temperature to change. [00:44:49] Remember the only constant when it comes to the Earth's temperature has been changed over the millions of years. We had periods where the earth was much warmer than it is now had more common that carbon dioxide in the atmosphere than it does now had less. In fact, right now we are at one of the lowest levels of carbon dioxide in the atmosphere in earth, long, long. [00:45:15] So the sun, if you might remember, comes up in the morning, warms things up, right? And then it cools down. When the sun disappears at nighttime, it has a huge impact. It's almost exclusively the impact for our temperatures. If there's other things too, for instance, eruption can spew all to hold a lot of carbon dioxide. [00:45:40] In fact, just one, just Mount St. Helens wanted erupted, put more carbon dioxide into the atmosphere than man has throughout our entire existence. Just to give you an idea, right? So these alarms that are out there, uh, you know, come on, people. Really, and now we're seeing that in, uh, this last year we had a 30% increase in the ice cap up in the, in, up in the north, up in Northern Canada, around the polls. [00:46:12] Uh, we also had some of these glaciers growing. It was so funny. I saw an article this year, or excuse me, this week that was showing a sign that was at one of our national parks. And it said this glacier will have disappeared by 2020. Of course it hasn't disappeared. In fact, it has grown now and it's past 2020. [00:46:34] Anyhow, the sun has a huge impact on us in so many ways. And one of the ways is. Well, something called a coronal mass ejection. This is seriously charged particles. That tend to be very, very directional. So when, when it happens, when there's one of these CMS coronal, mass ejections, it's not just sending it out all the way around the sun everywhere. [00:47:02] It's really rather concentrated in one. One particular spot. Now we just missed one not too long ago. And let me see if I can find it here. Just mast, a cm E near miss. Here we go. There a solar super storm in July, 2012, and it was a very, very close shave that we had most newspapers didn't mention it, but this could have been. [00:47:33] AB absolutely incredible. We'd be picking up the pieces for the next 50 years. Yeah. Five, zero years from this one particular storm. And what happens is these, these solar flares, if you will, are very, very extreme, they CME. You're talking about x-rays extreme UV, ultraviolet radiation, reaching the earth at the speed of light ionizes, the upper layers of atmosphere. [00:48:02] When that happens, by the way, it hurts our communications, but it can also have these massive effects where it burns out saddle. And then causes radio blackouts, GPS, navigation problems. Think about what happened up in Quebec. So let me just look at this call back, uh, hit with an E and yeah, here we go. And March 13th, 1989. [00:48:33] Here we go. Here's another one. Now I remembered. And this is where Quill back got nailed. I'm looking at a picture here, which is, uh, looking at the United States and Canada from the sky and where the light is. And you can see Quebec is just completely black, but they have this massive electrical blackout and it's becomes. [00:48:57] Of this solar storm. Now they, these storms that I said are quite directional, depending on where it hits and when it hits things can get very, very bad. This particular storm back in 1989 was so strong. We got to see their Rora Borealis, the Northern lights as far south, as Florida and cue. Isn't that something, when we go back further in time to this Carrington event that I mentioned, you could see the Northern lights at the equals. [00:49:35] Absolutely amazing. Now the problem with all of this is we've never really had an internet up online. Like we have today when we had one of the storms hit. And guess what we're about to go into right now, we're going into an area or a time where the sun's going to be more active, certainly on this, this 11 year cycle and possibly another bigger cycle too, that we don't really know much about. [00:50:07] But when this hit us back in the 1850s, what we saw was a, uh, a. Telegraph system that was brought to its knees. Our telegraphs were burned out. Some of the Telegraph buildings were lit. They caught on fire because of the charges coming in, people who were working the telegraphs, who are near them at the time, got electric shocks or worse than that. [00:50:34] Okay. 1859 massive Carrington event compass needles were swinging wildly. The Aurora Borealis was visible in Columbia. It's just amazing. So that was a severe storm. A moderate severity storm was the one that hit in Quebec here, knocked out Quebec, uh, electric. Nine hour blackout on Northeast Canada. What we think would happen if we had another Carrington event, something that happened to 150 years ago is that we would lose power on a massive scale. [00:51:13] So that's one thing that would happen. And these massive transformers that would likely get burned out are only made in China and they're made on demand. Nobody has an inventory. So it would be at least six months before most of the country would get power back. Can you believe that that would be just terrible and we would also lose internet connectivity. [00:51:39] In fact, the thinking that we could lose internet connectivity with something much less than a severe storm, maybe if the Quebec power grid solar, a massive objection here. Maybe if that had happened, when. The internet was up. They might have burned out internet in the area and maybe further. So what we're worried about is if it hits us, we're going to lose power. [00:52:07] We're going to lose transformers on the transmission lines and other places we're going to lose satellites and that's going to affect our GPS communication. We're going to lose radio communication, and even the undersea cables, even though they're now no longer. Regular copper cables. It's now being carried of course, by light in pieces of glass. [00:52:32] The, those cables need to have repeaters about every 15 miles or so under underwater. So the power is provided by. Copper cables or maybe some other sort of power. So these undersea cables, they're only grounded at extensive intervals, like hundreds or thousands of kilometers apart. So there's going to be a lot of vulnerable components. [00:52:59] This is all a major problem. We don't know when the next massive. Solar storm is going to happen. These coronal mass ejections. We do know they do happen from time to time. And we do know it's the luck of the draw and we are starting to enter another solar cycle. So be prepared, everything. Of course, you're listening to Craig Peterson, cybersecurity strategist. [00:53:28] If you'd like to find out more and what you can do, just visit Craig peterson.com and subscribe to my weekly show notes. [00:53:39] Google's got a new admission and Forbes magazine has an article by Zach Dorfman about it. And he's saying you should delete Google Chrome now after Google's newest tracking admission. So here we go. [00:53:55] Google's web browser. Right? It's been the thing for people to use Google Chrome for many years, it's been the fastest. Yeah, not always people kind of leapfrog it every once in a while, but it has become quite a standard. Initially Microsoft is trying to be the standard with their terrible browser and yeah, I to Exploder, which was really, really bad and they have finally completely and totally shot it in the head. [00:54:29] Good move there on their part. In fact, they even got rid of their own browser, Microsoft edge. They shot that one in. They had to, I know I can hear you right now saying, oh, Craig, I don't know. I just use edge browser earlier today. Yeah. But guess what? It isn't edge browser. It's actually Google Chrome. The Microsoft has rebranded. [00:54:52] You see the guts to Google Chrome are available as what's called an open source project. It's called chromium. And that allows you to take it and then build whatever you want on top of. No, that's really great. And by the way, Apple's web kit, Kat is another thing that many people build browsers on top of and is part of many of these browsers we're talking about right now, the biggest problem with the Google Chrome. [00:55:22] Is they released it so they could track you, how does Google make its money? Well, it makes us money through selling advertising primarily. And how does it sell advertising if it doesn't know much or anything about you? So they came out with the Google Chrome browser is kind of a standard browser, which is a great. [00:55:43] Because Microsoft, of course, is very well known for not bothering to follow standards and say what they have is the actual standard and ignoring everybody else. Yeah. Yeah. I'm picking on Microsoft. They definitely deserve it. Well, there is what is being called here in Forbes magazine, a shocking new tracking admission from. [00:56:05] One that has not yet made headlines. And there are about what 2.6 billion users of Google's Chrome worldwide. And this is probably going to surprise you and it's frankly, Pretty nasty and it's, I think a genuine reason to stop using it. Now, as you probably know, I have stopped using Chrome almost entirely. [00:56:31] I use it when I have to train people on Chrome. I use it when I'm testing software. There's a number of times I use it, but I don't use. The reality is the Chrome is an absolute terror. When it comes to privacy and security, it has fallen way behind its rivals in doing that. If you have an iPhone or an iPad or a Mac, and you're using safari, apple has gone a long ways to help secure your. [00:57:09] Well, that's not true with Chrome. In fact, it's not protecting you from tracking and Dave up data harvesting. And what Google has done is they've said, okay, well, we're going to get these nasty third party cookies out of the whole equation. We're not going to do that anymore. And what they were planning on doing is instead of knowing everything specifically. [00:57:34] You they'd be able to put you in a bucket. So they'd say, okay, well you are a 40 year old female and you are like driving fast cars and you have some kids with a grandkid on the way, and you like dogs, not cats, right? So that's a bucket of people that may be a few hundred or maybe up to a thousand. As opposed to right now where they can tell everything about you. [00:58:04] And so they were selling that as a real advantage because they're not tracking you individually anymore. No, we're putting you in a bucket. Well, it's the same thing. Right. And in fact, it's easier for Google to put you in a bucket then to track everything about you and try and make assumptions. And it's easier for people who are trying to buy ads to place in front of you. [00:58:28] It's easier for them to not have to kind of reverse engineer all of the data the Google has gathered in instead of. To send this ad to people that are in this bucket and then that bucket. Okay. It makes sense to you, but I, as it turns out here, Google has even postponed of that. All right. They really have, they're the Google's kind of hiding. [00:58:54] It's really what's going on out there. Uh, they are trying to figure out what they should do, why they should do it, how they should do it, but it's, it's going to be a problem. This is a bad habit. The Google has to break and just like any, anybody that's been addicted to something it's going to take a long time. [00:59:16] They're going to go through some serious jitters. So Firefox is one of the alternatives and to Google Chrome. And it's actually a very good one. It is a browser that I use. I don't agree with some of the stuff that Mozilla and Firefox does, but again, right. Nobody agrees on everything. Here's a quote from them. [00:59:38] Ubiquitous surveillance harms individually. And society Chrome is the only major browser that does not offer meaningful protection against cross cross site tracking and Chrome will continue to leave users unprotected. And then it goes on here because. Uh, Google response to that. And they admit that this massive web tracking out of hand and it's resulted in, this is a quote from Google and erosion of trust, where 72% of people feel that almost all of what they do online is being. [01:00:19] By advertisers, technology firms or others, 81% say the potential risks from data collection outweigh the benefit by the way, the people are wrong. 72% that feel almost all of what they do on online is being tracked. No, no. The answer is 100% of what you do is probably being tracked in some way online. [01:00:41] Even these VPN servers and systems that say that they don't do log. Do track you take a look at proton mail just last week. Proton mail it's in Switzerland. Their servers are in Switzerland. A whole claim to fame is, Hey, it's all encrypted. We keep it safe. We don't do logging. We don't do tracking, uh, guess what they handed over the IP addresses of some of the users to a foreign government. [01:01:10] So how can you do that? If you're not logging, if you're not tracking. Yeah, right. They are. And the same thing is true for every paid VPN service I can think of. Right. So how can Google openly admit that their tracking is in place tracking everything they can, and also admit that it's undermining our privacy and. [01:01:38] Their flagship browser is totally into it. Right? Well, it's really, it's gotta be the money. And Google does not have a plan B this anonymized tracking thing that they've been talking about, you know, the buckets that I mentioned, isn't realistic, frankly. Uh, Google's privacy sandbox is supposed to Fitbit fix it. [01:02:00] I should say. The, the whole idea and the way it's being implemented and the way they've talked about it, the advertisers on happy. So Google's not happy. The users are unhappy. So there you go. That's the bottom line here from the Forbes article by Zach Dorfman, delete Google Chrome. And I said that for a long time, I do use some others. [01:02:27] I do use Firefox and I use. Which is a fast web browser, that some pretty good shape. Hey, if you sign up for my show's weekly newsletter, not only will you get all of my weekly tips that I send to the radio hosts, but you will get some of my special reports that go into detail on things like which browser you shouldn't be using. [01:02:52] Sign up right now. Craig peterson.com. [01:02:57] Many businesses have gone to the cloud, but the cloud is just another word for someone else's computer. And many of the benefits of the cloud just haven't materialized. A lot of businesses have pulled back and are building data centers again. [01:03:14] The reason I mentioned this thing about Microsoft again, and the cloud is Microsoft has a cloud offering. [01:03:23] It's called Microsoft Azure. Many people, many businesses use it. We have used it with some of our clients in the past. Now we have some special software that sits in front of it that helps to secure. And we do the same thing for Amazon web services. I think it's important to do that. And we also use IBM's cloud services, but Microsoft is been pitching for a long time. [01:03:51] Come use our cloud services and we're expecting here probably within the next month, a big announcement from Microsoft. They're planning on making it so that you can have your desktop reside in Microsoft's cloud, in the Azure cloud. And they're selling really the feature of it doesn't matter where you are. [01:04:17] You have your desktop and it doesn't matter what kind of computer you're on. As long as you can connect to your desktop, using some just reasonable software, you will be able to be just like you're in front of a computer. So if you have a Chromebook or a Mac, Or a windows or tablet, whatever, and you're at the grocery store or the coffee shop or the office, you'll be able to get it, everything, all of your programs, all your files. [01:04:47] And we, Microsoft will keep the operating system up to date for you automatically a lot of great selling points. And we're actually looking into that. Not too heavily yet. We'll give them a year before we really delve into it at all. Cause it takes them a while to get things right. And Microsoft has always been one that adds all kinds of features, but most of the time, most of them don't work and we can, we can document that pretty easily, even in things like Microsoft. [01:05:18] Well, the verge is now reporting that Microsoft has warned users of its as your cloud computing service, that their data has been exposed online for the last two years. Yeah, let me repeat that in case you missed it, you, uh, yeah. I'm I'm I might've misspoken. Right. Uh, let me see, what does it say? It says, um, users of Azure cloud competing service. [01:05:48] So that's their cloud. Microsoft's big cloud. Okay. Um, their data has been. Exposed online. Okay. So that means that people could get the data, maybe manipulate the data that sort of exposed means for the last two years. Are you kidding me? Microsoft is again, the verge. Microsoft recently revealed that an error in its Azure cosmos database product left more than 3,300 as your customers data. [01:06:24] Completely exposed. Okay guys. So this, this, this is not a big thing, right? It can't possibly be big thing because you know who uses Azure, right. Nobody uses a zer and nobody uses hosted databases. Come on, give me a break. Let me see, what else does this have to say? Oh, okay. It says that the vulnerability was reported, reportedly introduced into Microsoft systems in 2019, when the company added a data visualization feature called Jupiter notebook to cosmos DB. [01:06:59] Okay. Well, I'm actually familiar with that one and let's see what small companies let's see here. Um, some Azure cosmos DB clients include Coca Cola. Liberty mutual insurance, Exxon mobile Walgreens. Hmm. Let me see. Could any of these people like maybe, maybe Liberty mutual insurance and Walgreens, maybe they'd have information about us, right. [01:07:26] About our health and social security numbers and account numbers and credit cards. Names addresses. Right, right. That's again, why I got so upset when these places absolutely insist on taking my social security number, right? It, it, first of all, when it was put in place, the federal government guaranteed, it would never be used for anything other than social security. [01:07:53] And the law even said it could not be used for anything other than social security. And then the government started expanding it. Right. And the IRS started using it. To track all of our income and you know, that's one thing right there, the government computers, they gotta be secure. Right. All of these breaches we hear about that. [01:08:12] Can't be true. Uh, so how about when the insurance company wants your personal information? Like your social security number? What business is it of? There's really no. Why do they have to have my social security number? It's a social security number. It's not some number that's tattooed on my forehead. [01:08:36] That's being used to track me. Is it this isn't a socialist country like China is, or the Soviet union was right. It's not socially. So why are they tracking us like that? Walgreens? Why do they need some of that information? Why does the doctor that you go to that made the prescription for Walgreens? Why do they need that information? [01:09:00] And I've been all over this because they don't. Really need it. They want, it makes their life easier, but they don't really need it. However, it exposes us. Now, if you missed the email, I sent out a week ago, two weeks ago now, I guess. You missed something big because I, in my weekly newsletter went through and described exactly what you could do in order to keep your information private. [01:09:35] So in those cases where websites asking for information that they don't really need, right? You don't want to lie, but if they don't really need your real name, why you're giving them your real name? Why do you use a single email address? Why don't you have multiple addresses? Does that start make sense to you guys? [01:09:54] And now we find out that Microsoft Azure, their cloud services, where they're selling cloud services, including a database that can be used online, a big database, uh, 3,300 customers looks like some of them are actually kind of big. I don't know. ExxonMobil pretty big. Yeah. I think so. Walgreens, you think that that might be yeah, yeah, yeah, yeah. [01:10:22] Y. Why are we trusting these companies? You know it, if you have a lot of data, a lot of customers, you are going to be a major target of nation states to hack you and bat just general hackers, bad guys. But you're also, if, if you've got all this information, you've also got to have a much higher level of security than somebody that doesn't have all of that information. [01:10:52] Does that make sense too? Did I say that right? You don't need the information and, and I've got to warn anybody that's in a business, whether you're a business owner or you're an employee, do not keep more data than you need the new absolutely need to run your company. And that includes data about your customers. [01:11:16] And maybe, maybe it's even more specifically data about your customer. Because what can happen is that data can be stolen and we just found. That? Yes, indeed. It could have been, it was exposed Microsoft the same. We don't know how much it was stolen. If anything was stolen. Um, yeah, Walgreens. Hey, I wonder if anyone's going to try and get some pain pills illegally through, uh, this database hack or a vulnerability anyways. [01:11:47] All right, everyone. Stick around. We'll be back. Of course, you listening to Craig Peterson. I am a cybersecurity strategist for business, and I'm here to help you as well. You can ask any question any time, uh, consumers are the people I help the most, you know, I wish I got a dime for every time I answered a question. [01:12:09] Just email me@craigpeterson.com me@craigpeterson.com and stick around. [01:12:18] Whether or not, you agree with the lockdown orders that were put in place over this COVID pandemic that we had. Uh, there are some other parts of the world that are doing a lot more. [01:12:34] Australia has, I don't know. I think that they went over the deep end. The much, the same thing is true right next door to them. [01:12:45] And I am looking at a report of what they are doing with this new app. Uh, you might be aware that both apple and Google came out with an application programming interface. That could be used for contract tack tracking, contact tracking. There you go. Uh, it wasn't terribly successful. Some states put some things in place. [01:13:13] Of course you get countries like China. I love the idea because heaven forbid you get people getting together to talk about a Tannen square remembrance. Now you want to know who all of those people were, who were in close proximity, right? So, you know, good for China a while, as it turns out, Australia is putting something in place they have yet another COVID lockdown. [01:13:39] They have COVID quarantine orders. Now I think if you are sick, you should stay on. I've always felt that I, you know, I had 50 employees at one point and I would say, Hey, if you're sick, just stay home. Never required a doctor's note or any of that other silliness, come on. People. If someone's sick, they're sick and let them stay home. [01:14:04] You don't want to get everybody else in the office, sick and spread things around. Right. Doesn't that just kind of make sense. Well, they now in Australia, don't trust people to stay home, to get moving. Remember China, they were, they were taking welders and we're going into apartments in anybody that tested positive. [01:14:22] They were welding them into their apartment for minimum of two weeks. And so hopefully they had food in there and they had a way to get fresh water. Australia is not going quite that far, but some of the states down under. Using facial recognition and geolocation in order to enforce quarantine orders and Canada. [01:14:47] One of the things they've been doing for very long time is if you come into the country from out of the country, even if you're a Canadian citizen, you have to quarantine and they'll send people by your house or you have to pay to stay for 10 days in a quarantine hope. So you're paying the course now inflated prices for the hotel, because they're a special quarantine hotel. [01:15:14] You have to pay inflated prices to have food delivered outside your door. And that you're stuck there for the 10 days, or if you're at home though, they, you know, you're stuck there and they'll send people by to check up on you. They'll make phone calls to check up on you and. They have pretty hefty find. [01:15:36] Well, what Australia has decided to do is in Australia is Charlene's even going from one state to another state are required to prove that they're obeying a 14 day quarantine. And what they have to do is have this little app on their phone and they, the app will ping them saying, prove it. And then they have to take a photo of themselves with geo location tag on it and send it up via the app to prove their location. [01:16:15] And they have to do all of that within 15 minutes of getting the notification. Now the premier of the state of south Australia, Steven Marshall said we don't tell them how often or when on a random basis, they have to reply within 15 minutes. And if you don't then a police, officer's going to show up at the address you're supposed to be at to conduct an in-person check. [01:16:43] Very very intrusive. Okay. Here's another one. This is a, an unnamed government spokesperson who was apparently speaking with Fox news quote. The home quarantine app is for a selected cohort of returning self Australians who have applied to be part of a trial. If successful, it will help safely ease the burden of travel restrictions associated with the pandemic. [01:17:10] So there you go. People nothing to worry about. It's just a trial. Uh, it will go away. Uh, just like, uh, for instance, income tax, as soon as rule, number one is over, it will be removed and it will never be more than 3% and it will only apply to the top 1% of wage-earners. So there you go. Right. And we all know that world war one isn't over yet. [01:17:34] Right. So that's why they still have it in somehow. Yeah, some of the middle class pays the most income tax. I don't know. Interesting. Interesting. So there you go. Little news from down under, we'll see if that ends up happening up here. News from China, China has, uh, China and Russia have some interesting things going on. [01:17:55] First of all, Russia is no longer saw. Country, they kind of are. They kind of aren't, they are a lot freer in many ways than we are here in the United States. Of course, China, very heavily socialist. In fact, they're so socialists, they are communist and China. And Russia both want their kids to have a very good education in science, engineering, and mathematics. [01:18:23] Not so much on history, not so much on, on politics. Right. But definitely heavy on the, on the sciences, which I can see that makes all the sense. I think everybody should be pretty heavily on the science. Well, according to the wall street journal this week, gamers under the age of 18 will not be allowed to play online games between 8:00 PM and 9:00 PM on Friday, Saturdays and Sundays. [01:1

Restless The Podcast

Portrait of GodThis is Steve and welcome back to another segment of Press On. This called Portrait Take a look at some of pictures hanging on the walls of your house...why are they there, what to they communicate to you or who do they represent?When my wife and I go to colonial Williamsburg the historical actors will sometimes say “would you like to have a quick portrait done with me”? Its their way of saying want to get a picture with me? What are pictures or portraits really…Hear the words of the writer of Colossians 1 (Paul)Colossians 1:15-19He is the image of the invisible God, the firstborn of all creation: for by Him all things were created, both in the heavens and on earth, visible and invisible, whether thrones, or dominions, or rulers, or authorities—all things have been created through Him and for Him.The Greek word eikon (image) meaning perfect-representation, the very substance or essential embodiment of something or someone.The same word is used in Greek to describe a portrait or more familiar to us, the word “photograph.”Typically they are representations of a moment in time...nothing else. They are two dimensional only and do not capture the whole context of meaning and it importance to you.That's not what Paul is talking about... we see that in verse 19 “For God was pleased to have all his fullness dwell in him,”You see Jesus was not merely a “sketch of God or a lifeless portrait He is the full revelation of God...nothing was left out. Theres much more to the story but for today think about this:In the gospel Matthew 6 tells us that if we seek him we will find Him. When you do so God it's like adding a brush stroke to a cosmic portrait...in time the face of Jesus emerges.This is Steve, be of good courage and Press ON See acast.com/privacy for privacy and opt-out information.

Brutal Iron Gym
1111 - Nutrition - How to Stop Eating Poorly When Stressed

Brutal Iron Gym

Play Episode Listen Later Oct 15, 2021 13:46


Typically when we feel like crap we eat like crap, and then, we feel like crap haha.  How can we stop this cycle?  How can we continue to eat well even when we feel overwhelmed?  In today's podcast we provide the answer!!!  Listen in to find out!!!

Mr. Worldwide and His Bride: Living Your Best Life
139 - Cancer and FEAR - False Evidence Appearing Real

Mr. Worldwide and His Bride: Living Your Best Life

Play Episode Listen Later Oct 15, 2021 27:00


In this episode we are diving into overcoming fear when it comes to a diagnosis of cancer.  Those nagging thoughts that come up in our heads… Typically in the middle of the night.   1. To access my document on some of the changes Ive made you can get it here -> https://mailchi.mp/b609cecd4c0f/cancer 2. Here's the podcast I referenced: https://podcasts.apple.com/us/podcast/the-model-health-show/id640246578?i=1000538405577 3. To join my cancer group for women: https://www.facebook.com/groups/womeninpink Connect with me on Instagram: https://www.instagram.com/jendelvaux/ If you need help starting your health/fitness journey reach out!  You can email me at coachjennyd@gmail.com The Journal I use-> https://pushjournal.com/?rfsn=4086660.6edc3&utm_source=refersion&utm_medium=affiliate&utm_campaign=4086660.6edc3 HEALTH FAVORITES: 1. Organifi - www.organifishop.com -> Use JEND at check out to save 15% off. 2. Shakeology (My favorite flavor is Plant based Chocolate) - https://www.teambeachbody.com/shop/b/shakeology?referringRepID=756017 3. My favorite bar out there! MidDay squares

Stock Market Options Trading
SPX 0DTE Options Trading For The Rest Of Us

Stock Market Options Trading

Play Episode Listen Later Oct 15, 2021 26:02


In this episode, I'm sharing my exact SPX 0DTE Put Credit Spread strategy for Mondays. SPX 0DTE is the act of trading options the day they expire. Typically, to take advantage of selling premium on the last of expiration. The goal of this episode is to give you a full strategy to walk away with but also an invite to join us for more options trading research. The SPX 0DTE strategy in this episode is from a module out of the SPX 0DTE Masterclass and Community hosted on the website at https://www.stockmarketoptionstrading.net/all-courses . Its combination of a complete course and live chat room for students to share trades each week. The course is complete with videos, spreadsheets with dozens of variations, and includes lifetime access and updates. There is a one time cost for the course and chat room. There is no subscription. If you are interested in probabilities, expectancy, and statistics, consider joining us as we crunch all the numbers for you. Thanks for listening.

Adafruit Industries
Deep Dive w/Scott: CircuitPython on a Raspberry Pi

Adafruit Industries

Play Episode Listen Later Oct 15, 2021 142:21


Join Scott as he works on bringing CircuitPython to the Raspberry Pi. Work on USB has stalled so he's taking a break by working on getting CircuitPython working over UART. Chat with Scott and lot of others on the Adafruit Discord at https://adafru.it/discord. Deep Dive happens every week. Normally Fridays at 2pm Pacific but occasionally shifted to Thursday at 2pm. Typically goes for two hours or more. Questions are welcome. Next week is on Friday. 0:00 Getting started 0:03:25 Hello everyone / Housekeeping 0:05:51 Today - working on Arm Cortex A as bare metal micro (raspberry pi 4) 0:06:37 last week: interrupts / tiny usb 0:07:29 Exception Levels. EL3, EL2 (hypervisor), EL1 (OS), EL0 (applications) 0:09:13 Last week - EL2 hypervisor bits needed to be set 0:10:47 Looked into ARM architecture reference manual HCR_EL2 (64 bit register) 0:12:39 TGE bit Trap General Exception 0:16:19 D1.13 asynchronous exception type, routing, masking and priorities 0:18:09 Non-secure mode, SCR, TDE “C - interrupt remains pending” TGE bit set to 1 0:19:44 the magic bit that needed to be set in broadcom peripherals repo 0:21:00 NVM3722 ARM and AUX_IRQhandler 0:23:25 Pointer boxing ( using ‘extra' bits in 64 bit pointer ) 0:24:10 Open OCD, Gdb, and uart screens 0:25:06 CP repl on Rasbperry Pi 0:25:33 print(“hello world”) hangs / next week HDMI output, but first fix this bug 0:28:21 ARM exception decoding using cortex-a.py arm8a-exception 0:29:40 pointer greater than 32 bits - probably a problem 0:30:30 Memory mapping ( only the first ‘gig' of memory mapped ) 0:37:19 question: can a zero 1.3 use with any lcd??? 0:40:55 aapcs arm call stack research / Procedure call standard for the Arm Architecture 0:43:51 decode failing - irq_entry and irq_exit call stack creation 0:45:20 Frame pointer 0:50:58 ARM ABI 0:53:40 Microsoft arm arch 64 ABI documentation - very similar 0:54:54 experiment with h=”hello world” 0:55:58 gdb) info frame 1:02:25 typical C function call 1:05:28 exceptions should save the ‘callers' state 1:06:13 ‘101' review of memory ( heap and stack ) 1:25:00 disassemble mp_obj_print_helper to look at use of frame pointer 1:28:00 back to github libunwind 1:34:35 Unwinding frames in python 1:35:10 CP uses PIO for neopixels on RP2040 1:37:52 aarch64-unwind.h 1:41:10 does it come down to the exception entry code needing to update frame pointer (x29) to be stored on the stack to a GDB "correct" value, rather than storing the previous frame pointer value when exception occurs? 1:51:20 Digikey has a small number of the LED glasses and nRF driver boards available 1:54:00 stack-unwind-samples 1:56:10 greyed out command completion from fish shell 1:59:08 code is compiled for 64 bit ARM 2:00:43 oh, my fish extension - otherwise it's pretty standard .fishrc (omf and bobthefish) 2:02:44 looking at github rsta2/circle for examples 2:03:51 exception stub 2:04:32 edc/bass to use bash utilities in fish shell 2:05:12 circle irq handler - might like what we want “exceptionstub64.S” 2:16:23 trying out the experiment - it's worse :-( 2:18:55 wrap up - shop at adafruit.com or digikey.com if not in stock 2:20:47 wake the cat - and catch the links at github tannewt rpi branch 2:21:55 bye spook Visit the Adafruit shop online - http://www.adafruit.com ----------------------------------------- LIVE CHAT IS HERE! http://adafru.it/discord Adafruit on Instagram: https://www.instagram.com/adafruit Subscribe to Adafruit on YouTube: http://adafru.it/subscribe New tutorials on the Adafruit Learning System: http://learn.adafruit.com/ -----------------------------------------

This Week in Machine Learning & Artificial Intelligence (AI) Podcast
Advancing Deep Reinforcement Learning with NetHack, w/ Tim Rocktäschel - #527

This Week in Machine Learning & Artificial Intelligence (AI) Podcast

Play Episode Listen Later Oct 14, 2021 42:57


Take our survey at twimlai.com/survey21! Today we're joined by Tim Rocktäschel, a research scientist at Facebook AI Research and an associate professor at University College London (UCL).  Tim's work focuses on training RL agents in simulated environments, with the goal of these agents being able to generalize to novel situations. Typically, this is done in environments like OpenAI Gym, MuJuCo, or even using Atari games, but these all come with constraints. In Tim's approach, he utilizes a game called NetHack, which is much more rich and complex than the aforementioned environments.   In our conversation with Tim, we explore the ins and outs of using NetHack as a training environment, including how much control a user has when generating each individual game and the challenges he's faced when deploying the agents. We also discuss his work on MiniHack, an environment creation framework and suite of tasks that are based on NetHack, and future directions for this research. The complete show notes for this episode can be found at twimlai.com/go/527.

Charlottesville Community Engagement
October 14, 2021: Boyles resigns as Charlottesville City Manager; Friendship Court agreement reauthorized by EDA

Charlottesville Community Engagement

Play Episode Listen Later Oct 14, 2021 18:27


Today’s Patreon-fueled shout-out is for the Plant Northern Piedmont Natives Campaign, an initiative that wants you to grow native plants in yards, farms, public spaces and gardens in the northern Piedmont. The leaves have started to fall as autumn set in, and as they do, this is a good time to begin planning for the spring. Native plants provide habitat, food sources for wildlife, ecosystem resiliency in the face of climate change, and clean water.  Start at the Plant Northern Piedmont Natives Facebook page and tell them Lonnie Murray sent you!On today’s show:Charlottesville City Manager resigns, citing personal and professional attacks from Nikuyah WalkerThe Charlottesville Economic Development Authority reauthorizes a performance agreement with the Piedmont Housing Alliance for the redevelopment of Friendship CourtCharlottesville moving forward with planning for climate adaptation The Charlottesville Economic Development Authority has reauthorized a performance agreement with the Piedmont Housing Alliance for a loan for the redevelopment of Friendship Court. Piedmont Housing Alliance would pay the money back through the incremental tax revenue the city would get from a more intense residential development. Here’s Economic Development Director Chris Engel. (staff report)“Typically, our performance agreements are done to encourage business development, job creation, capital investment that creates office space or an industrial building,” Engel said. “In this case, the public good if you will is the rehabilitation and addition of not public housing, but affordable housing that would be owned and managed on a long term basis by the Piedmont Housing Alliance.” The city is currently considering using this tool to finance improvements to Stribling Avenue. This is also the same mechanism that was proposed by the owner of the skeleton Landmark hotel. In this case, the 11.75 acre property is assessed at $8.185 million this year, which yields $77,714 in property taxes for the city. When the first phase of redevelopment is completed, the value is projected to be over $20 million, which Engel said would bring in an additional $190,000. Piedmont Housing Alliance would get that increase through a transfer from the Economic Development authority. “This is a very complicated, complex deal to get this to all come together,” Engel said.This is separate from the nearly $16 million in capital funds city taxpayers will contribute to all four phases of redevelopment. Under this agreement, Piedmont Housing Alliance would collect the funding up to $6 million.“There’s not a profit making opportunity here for anybody but it’s an opportunity to see additional affordable housing added to the city again and an old site that needs rehabilitation,” Engel said. The EDA approved the reauthorization with little debate. The original agreement was written up by former city attorney John Blair before he became the acting city manager after former city manager Tarron Richardson resigned. Engel said the Piedmont Housing Alliance is ready to begin construction. Their website has not been updated with information about redevelopment since last October when a December start-date for construction was expected. More information as it comes in. Charlottesville’s efforts to create a Climate Adaptation Plan move forward this month with a community forum to get input on potential threats from more extreme weather patterns. The October 25 event will be the first steps for the city to complete a Climate Vulnerability Assessment. “As part of the city’s climate action effort, it has committed to developing a plan to reduce greenhouse gas emissions and to prepare and respond to our changing climate,” said Susan Elliott, the city’s climate protection program manager..Participants are being asked to review a webinar recorded on October 7 where representatives from ICLEI described Charlottesville’s projected climate hazards and gave an overview of the process. Another pre-forum webinar will be held on October 15. (register) The Community Forum on October 25 will begin at 5:30 p.m. (register)Charlottesville City Council will have to appoint someone to serve as City Manager as of Monday, November 1. The five-member elected body held an emergency closed session Tuesday afternoon to discuss “Urgent Personnel Matters.” “I move that we accept the resignation of Chip Boyles, effective October 29, 2021 per the letter that he has sent to Council,” said City Councilor Heather Hill as she read a motion coming back from closed session. Council voted 5-0 to accept the resignation, but there was no sense of who would take over as city manager. There are two deputy city managers who were hired by Boyles, both of whom have a collective tenure of seven months. Ashley Marshall has been Deputy City Manager for Racial Equity, Diversity, and Inclusion since May and Sam Sanders has been Deputy City Manager for Operations since August. Before we get back to Boyles, there was also news of another person leaving city government. In an earlier motion, Hill disclosed the departure of the city’s Information Technology department, Sunny Hwang. He’s served in that position since September 2018 according to his LinkedIn profile, which has not yet been updated. There are also vacancies at the tops of the parks department and the public works department. Back to Boyles. Boyles was hired in January to replace John Blair, who served as interim city manager after Dr. Tarron Richardson resigned in September. In his resignation letter, Boyles said he had been hired to help the organization get back on its feet after a “time of turbulence and organizational instability.” “This success was disrupted with my decision to to change the leadership of the City Police Department,” Boyles wrote. “I continue to support my decision taken on this matter, but the vitriol associated with this decision of a few vocal community members and the broken relationship with Mayor Walker have severely limited my ability to be productive towards the goals of City Council.”Boyles said personal and professional attacks from Walker and others were beginning to hurt his mental health. He resigned to protect himself and his family. To recap, Boyles terminated the contract of Chief RaShall Brackney on September 1, 2021, triggering a ferocious outcry from Walker. She spent much of the September 7 meeting using her privileges as Mayor to force a conversation about the topic. For context, go back and listen to the September 8 edition of this newsletter. The soundbites for the read of the newsletter today come from the October 4, 2021 meeting of Council, and the last hour or so of the meeting. The agenda listed a formal discussion of the matter at the conclusion of other business. Boyles defended his decision, which was his alone to make under the city’s charter. Boyles’ explanationBoyles said Brackney had moved the department toward being a more just and fair system, but said surveys conducted by the Police Benevolent Association indicated low morale.“It became to me evident that some type of change needed to be made that while we had been making strides in one area, the implementation into the department itself was in jeopardy,” Boyles said. That soundbite comes from about an 11 minute explanation that Boyles gave. For some more background, I refer you to the August 20 “response from the city” to those PBA surveys. The statement also describes the resignations of two members of the SWAT team and the termination of a third. (read the statement)What followed were questions from the rest of the Council. Councilor Michael Payne said he was concerned about the timing of the incident.“It has to be stated that, one, the PBA is an organization that is one that is not friendly to reform,” Payne said. “Those organizations across the country are not friendly to officers being disciplined and held accountable for mistreatment.” Vice Mayor Sena Magill said she wanted Boyles to write down his vision for the city.“I have seen the team that you are building in City Hall and I believe that you are focused on a team that wants to bring Charlottesville into 21st century practices on a lot of things including a teamwork environment,” Magill said.Councilor Heather Hill.“We’re not condoning any of the behaviors that were rightfully dealt with in the police department and that we are committed to a very way of policing in the city of Charlottesville,” Hill said. In his comments on October 4, Councilor Lloyd Snook referred to a closed session from mid August after the disciplinary actions described in the statement were made. “When Chief Brackney explained to use in closed session on August 16 I believe it was what the evidence was of the SWAT team officers conduct, showed us a few snippets of video,” Snook said. “Every Councilor in the room, every senior management person in the room was satisfied with the chief’s decision.”Snook said the City Manager has the right and power to fire the police chief.“The only issue for us quite frankly is whether we fire the city manager for firing the police chief,” Snook said. On October 4, Snook said the answer was no.But for Mayor Nikuyah Walker, the answer was not no. Walker’s cross-examinationWalker used her time to ask Boyles a series of pointed questions, including this one about internal surveys. “How did you arrive from looking at the survey that the Chief was the issue based on those surveys,” Walker asked.“Most of the survey was built around the command staff and answers were regarding the individual command staff but it was just an overall leadership from both the questions that were included in the survey and then the chance for the officers to comment,” Boyles said. Let’s skip ahead a little to another section.“So these issues arose and you didn’t afford her a conversation to talk with her about the issues that you had come to learn and create a plan with her to rectify those issues,” Walker said.“I did,” Boyles said. “And one of our meetings after a lot of this started becoming evident, I asked her about preparing a plan to try to address some of these items. The response was that a plan wasn’t needed and what did I have in mind to put into a plan.”Boyles said that was not his area of expertise. Let’s skip ahead. Walker quoted from the September 17 op-ed Boyles wrote for the Daily Progress.“So, in the immediacy of the decision in the op-ed piece that you wrote that the CPD was ‘gripped in chaos’,” Walker said.“Yes, it was my understanding that some of the leadership positions were not going to be staying if Chief Brackney were staying,” Boyles said. This line of questioning continued. Walker said her information said only two of six members of the command staff were set to leave. “So, you consider two of six people to be chaos?” Walker said. “No, I think it extends beyond,” Boyles said. “It’s the statements from the survey of people looking for other jobs, wanting to be out of the police department. There is no smoking gun in this.”Walker went through many of the comments and read through them out loud. She also wanted to pin down Boyles on what conversations he had with regional leaders about policing issues. Boyles said those were conversations were private and in confidence.“Okay, Chip, so since all of these people are secretive and you think that’s okay, because what you want us to do on whether or not you want to stay here or not based on some random conversations we had without talking to you about?” Walker asked.”That’s a decision you all will make,” Boyles said. “As I stated earlier, I’m here to fulfil the direction of Council. I took this job knowing. I think I’ve even stated for me there’s a job evaluation every other meeting. I accept that.”The questioning continued. At one point, there was to have been a press conference after the release of the August 20 statement.“And then, Chief Brackney arrived at a meeting, right, Chip? And you had changed course by that time that there’s no longer going to be a press conference,” Walker said.“Yes,” Boyles responded. “We had a disagreement over wanting to show the videos that you all saw in your closed session.” A little later on in the cross-examination, Councilor Hill brought a specific incident related to how former Police Chief Brackney responded to feedback. Go back to the tape to learn more about that but Walker asked Hill to read the email in question. “Okay, do you want to pull that email up?” Walker asked“I’m happy to find it, but I don’t think it’s necessary right now,” Hill said. “I’m just saying you are trying to pick specific examples. I don’t want to go down this path with you.”“I’m not,” Walker said, her voice rising. “I was open to whatever you all presented. I asked and allowed you all you to talk first because I’m just trying…”“We were trying to be respectful,” Hill said. “Excuse me?” Walker asked.“We were trying to be respectful of the process,” Hill said. “This is not the appropriate forum to get into all of this.”“You were not trying to be respectful of any process,” Walker said. “I have been on this Council and I know how you operate.”“I’d like for us to move on,” Hlll said. The conversation went back to that meeting after the August 20 press release. Boyles explained the dynamic that was leading him to make a decision. “That meeting was a good indication similar to what Councilor Hill was just talking about when we began to disagree over the videos and other issues, Chief Brackney just left the meeting which again gave me concern of being able to work with that type of interaction, with that type of relationship,” Boyles said. Boyles acknowledged that Brackney had told him that she had felt targeted by members of the community as well as internally. “My knowledge of that comes from what she’s told me and I certainly believe it to be true,” Boyles said. Walker was clear she was not going to let Boyles forget his decision to terminate Brackney. “I can go on about every city manager that has been here, and you are never going to, I told you this, Chip,” Walker said. “You’re never going to live past this decision.”Soon after, Walker quoted from the book White Rage to make part of her point and chastised her fellow Councilors for trying to control her.“Have I made 100 percent of the right decisions?” Walker asked. “No. Have you all made 100 percent of the right decisions? No. You haven’t. But again, your white gaze gets to determine who wins in a situation like this.”Earlier this year, Walker wrestled with whether to seek a second term before announcing in May she would be a candidate. She withdrew from the race on September 8, citing the racism of her fellow Councilors. Walker raised no campaign funds this year. The conversation on October 4 continued, and the rest of the discussion is available to watch.  Now it’s perhaps a better use of our time to think ahead to Council’s next meeting on October 18, as well as the four regular meetings of the year. Two new Councilors will join in January when Walker and Hill’s terms are up. Who will be the city manager? Who will be mayor? Who will be running the city This is a public episode. Get access to private episodes at communityengagement.substack.com/subscribe

Just Admit It!
Semester 3: Episode 7: How should medical school applicants prepare for interviews?

Just Admit It!

Play Episode Listen Later Oct 14, 2021 41:28


Thinking about going to medical school? Typically, applicants will be invited to interviews any time between early fall and winter. Interviews can take place at any time once a secondary application is submitted, but most universities will wait until the fall semester begins so that applicants have the chance to interact with current med school students. In this episode, IvyWise Medical School Admissions Expert Juhn (Former MD Admissions Officer at Stanford University School of Medicine and Pre-Medical/Pre-Health Advisor at UC Berkeley) and IvyWise College Admissions Counselor Christine (Former Assistant Director of Admissions at Yale and Georgetown) share advice on how med school applicants can prepare for their interviews.

Nerd Noise Radio
“Noise from the Heart of Nerds: C1E59 - “The Falcom Episode” (featuring Hugues)

Nerd Noise Radio

Play Episode Listen Later Oct 14, 2021 103:28


Today's broadcast is C1E59, for Theme Thursday, Oct 14th, 2021. Today's Theme is a focus on music from games by Falcom, on a program we're simply calling “The Falcom Episode”.    SPECIAL UP-FRONT NOTE 1: This episode is EXTRA SPECIAL for three reasons: 1) it is curated and hosted (and produced) by Hugues Johnson of Nerd Noise Radio Channel 2, and Retro Game Club, 2) it is the first episode in the ENTIRE HISTORY of Nerd Noise Radio that was not at least partially produced by St. John (St. John DID handle these show notes, though*), and 3) it is our half of a special collaboration with Trey Johnson of W.A.R.T. Radio and Nintendomain, who are also releasing a Falcom-themed episode today. Although, “synchronization” is probably a much better word here than “collaboration”. We didn't listen to each other's episodes ahead of time, nor did we share and compare track lists. We simply decided to coordinate the simulcast of our Falcom episodes once we discovered the other was also making one, and decided to each treat them as halves of an informal two-parter. So, we look forward to joining you, the listener, in discovering together just how much or little overlap there is between them.   *= Tracklist and timestamp info originally provided by Hugues, but reformatted for the notes by St. John into our standard “track number, track name, game name, system(s), composer, timestamp format.   SPECIAL UP-FRONT NOTE 2: Typically, the composer credits on Falcom games simply say “Falcom Sound Team JDK, as opposed to listing specific composers, leaving the composer shrouded in mystery, and devoid of the credit they deserve. But thanks to the wondrous, arduous work done by The Falcom Composer Breakdown Project (link can be found below the tracklist), we now have a much better idea of just who was behind each track. Presumed Composers, as found on The Falcom Composer Breakdown Project will be provided for each track in the tracklist, as well as in the episode outro.   Track# - Track - Game - System - Presumed Composer - Timestamp   01) Intro - 00:00:00 02) Genesis Beyond the Beginning - Ys Origin - PC / PS4 / Switch - Ryo Takeshita - 00:01:59 03) The Legend of Xanadu - Xanadu - PC Engine (CD) - Yoshiya Takahashi - 00:04:15 04) Daybreak - Faxanadu - NES - Jun Chikuma - 00:06:52 05) Snowbound Sacred Mountain - Nayatu no Kiseki - PSP - Saki Momiyama - 00:07:49 06) Defend and Escape - Ys VI - PC / PSP / PS2 - Maiko Hattori - 00:10:09 07) Guruguru Majin De Pon - Gurumin - PC / PSP / 3DS - Takahide Murayama - 00:14:28 08) Jungle - Popful Mail - PC Engine (CD) - c: Atsushi Shirakawa / a: Hirofumi Matsuoka - 00:18:17 09) A Heretic Researcher - Trails of Cold Steel III - PC / PS4 / Switch - Hayato Sonoda - 00:19:31 10) Cave - Brandish - PC Engine (CD) - Atsushi Shirakawa - 00:22:22 11) Fantasy Pastel Normal - Lord Monarch - PC - Atsushi Shirakawa - 00:24:38 12) Town - Legend of Heroes 1 - Sega Saturn - Mieko Ishikawa - 00:26:29 13) Survey Legwork - Tokyo Xanadu - PC / Vita / PS4 - Hayato Sonoda - 00:28:09 14) Tripolka Lake - Zwei - PC / PSP / PS2 - Maiko Hattori - 00:30:43 15) Origins of the Earth - Trails in the Sky the 3rd - PC / PSP - Takahiro Unisuga - 00:34:34 16) La Noche Triste - Asteka II - PC88 - Takahito Abe - 00:37:44 17) Feel at Home - Trails of Cold Steel IV - PC / PS4 / Switch - Hayato Sonoda - 00:39:54 18) Division - Brandish VT - PC - Naoki Kaneda - 00:41:50 19) Ryo Ni Kaero - Trails of Cold Steel - PC / Vita  PS3 / PS4 - Tomokatsu Hagiuda - 00:43:54 20) Afternoon in Crossbell - Zero no Kiseki - PC / PSP - Takahiro Unisuga - 00:47:14 21) Illusion - Ys IV - PC Engine (CD) - Atsushi Shirakawa - 00:49:37 22) Oldium Shrine - Zwei II - PC - Ryo Takeshita - 00:51:42 23) Enforcers - Trails in the Sky SC - PC / PSP - Takehide Murayama - 00:54:07 24) Delusion of a Thousand Years - Ao No Kiseki - PC / PSP - Saki Momiyama - 00:55:55 25) Marionette, Marionette - Ys IX - PS4 - Mitsuo Singa - 00:58:07 26) Chester's Theme - Oath in Felghana - PC / PSP - c: Masaaki Kawai a: Yukihiro Jindo - 01:00:25 27) Turning Death Spiral - Ys V - Super Famicom - Satoshi Arai - 01:03:22 28) Ruins of Moondoria - Ys II Chronicles - PC / PSP - Hideya Nagata - 01:06:01 29) Road to Solitary Death - Ys Seven - PC / PSP - Saki Momiyama - 01:08:44 30) Silver Will - Trails in the Sky FC - PC / PSP - Wataru Ishibashi - 01:10:56 31) Sunshine Coastline - Ys VIII - PC / Vita / PS4 / Switch - Takahiro Unisuga - 01:13:19 32) Field - Legend of Heroes II - PC Engine (CD) - Mieko Ishikawa - 01:16:31 33) See You Again - Ys - PC88 - Yuzo Koshiro - 01:19:27 34) Irreplaceable You - Trails of Cold Steel 2 - PC / Vita / PS3  PS4 - Takahiro Unisuga - 01:23:45 35) Invitation for the New World - Xanadu II - PC Engine (CD) - Atsushi Shirakawa - 01:23:45 36) A Tear of Vermilion: Memoria - The Legend of Heroes IV - PC / PSP - Masaru Nakajima - 01:25:03 37) Ending 1 - Sorcerian - PC88 - Yuzu Koshiro - 01:26:46 38) Outro: 01:30:54   Music Block Runtime: 01:28:58 Total Episode Runtime: 01:43:29   Our Standard Intro and Outro Music (which you get to hear for about five seconds)  is Funky Radio - Jet Grind Radio - Dreamcast - BB Rights   Our Special Intro and Outro Music is Beep Magazine - Falcom Mega Mix - unknown composer (so, Falcom Sound Team JDK)   You can find the Falcom Composer Breakdown Project here:    https://docs.google.com/spreadsheets/d/1zE387MG1GcGzPsvj7XjwP4Jcg9lz0Bz15yrYtGHpc1I/edit#gid=1173887864    Hugues' website can be found at https://HuguesJohnson.com/   You can subscribe to the Retro Game Club podcast here:    https://retrogameclub.net/rss https://podcasts.apple.com/us/podcast/retro-game-club/id1453018680    Or connect with  them on social media at:   Twitter: @rgcpodcast Facebook: @retrogameclubpodcast   Nintendomain Podcast (as opposed to “Nintendo Domain”, to answer that question)  can be found at:   https://nintendomain.libsyn.com/ https://podcasts.apple.com/us/podcast/nintendomain/id1055861408   Or on social media at:   Twitter: @Ninten_Domain Facebook (page): https://www.facebook.com/nintendomainpodcast Facebook (group): https://www.facebook.com/groups/290368051669515   And you can find the W.A.R.T. Falcom episode, which is the parallel to our episode here:   [GO BACK AND EDIT IN LINK FROM TREY HERE!]   NOTICE: The "Nerd Noise Radio - RERUNS!" feed will be going away after December of 2021, and consolidating its output with the main feed. However, in the meanwhile, it will remain active with rerun content, and can be found here:     https://www.buzzsprout.com/77944/    or here    https://itunes.apple.com/us/podcast/nerd-noise-radios-podcast/id1191400767    You can also find all of our audio episodes on Archive.org as well as the occasional additional release only available there, such as remixes of previous releases and other content.    Our YouTube Channel, for the time being is in dormancy, but will be returning with content, hopefully, in 2022. Meanwhile, all the old stuff is still there, and can be found here:     https://www.youtube.com/user/NerdNoiseRadio    Our episodes (and occasionally, other content, including expanded show notes) can be found on our blog here:    nerdnoiseradio.blogspot.com.    Nerd Noise Radio is also available on The Retro Junkies Network at www.theretrojunkies.com, and is a member of the VGM Podcast Fans community at     https://www.facebook.com/groups/VGMPodcastFans/    Or, if you wish to connect with us directly, we have two groups of our own:     Nerd Noise Radio - Easy Mode: https://www.facebook.com/groups/276843385859797/ for sharing tracks, video game news, or just general videogame fandom.   Nerd Noise Radio - Expert Mode: https://www.facebook.com/groups/381475162016534/ for going deep into video game sound hardware, composer info, and/or music theory.    You can also follow us on Twitter at @NerdNoiseRadio. And we are also now on Spotify, TuneIn, Pandora, iHeartRadio, Stitcher, and Vurbl.    Thanks for listening! Join us again in December on Channel 1 for a special team up between St. John, Trey Johnson of Nintendomain and W.A.R.T. Radio, and a bunch of listeners. Also join us in December on Channel 2 for our first ever “Best of” episode - “Best of Season 1”, featuring St. John and Hugues. And lastly, join us in December on the dedicated Rerun feed as a going away celebration - an all-new episode that will be a timed exclusive for the listeners over there....and wherever you are....Fly the N!!!    Cheers!

Simple Money Wins
E235 3 Reasons Probate Court Takes So Long

Simple Money Wins

Play Episode Listen Later Oct 14, 2021 9:13


Clients often call asking us why their probate case is taking so long. Probate usually takes a while, but lately, it has become an even longer process. We will discuss three current, real-world situations to help you understand what your case might be taking longer than you thought. Is there a backlog for probate? As is the case for any bureaucracy (especially government), due to COVID/lockdowns, the courts have had limited staff and operations for over a year. This means the courts (which are generally not lightning fast anyway) are now playing one year's worth of catch up. Probate court piles have been stacking up; it's not as if people stopped dying. On top of the daunting backlog, the courts are understaffed. Additionally, new clerks are hired who are not very experienced. Also keep in mind that many offices are working on a staggered in-person schedule. This leads to more delays and mistakes because there may not be enough experienced workers to provide solid training. The new clerks may have to wait much longer to get a simple answer from a supervisor who is working remotely. Meanwhile, the piles of files are stacking higher. Can probate court change its mind? Imagine the court (clerk, staff member, etc.) reviews your file, and requires a laundry list of changes from you. This is normal and happens often. But many changes are very time consuming, such as getting papers signed, translated, ordered from other courts, etc. Even if we think the changes are unnecessary, usually it's just better to grin and bear and do as court instructs. Arguing about the changes won't make it go faster, so you comply. Now imagine by the time we file the requested changes the court clerks have cycled out or changed. Now we have a new clerk who says, “who told you to do it that way? I need you to do these other five things.” This often happens with bigger corporations where you usually do not deal with the same person twice. Typically, you get to know the court clerks over the years. But lately, the turnover has been unusually high for whatever reason. Do courts make mistakes? Yes, the court personnel are human and make mistakes, too. For example, probate court have SLOWLY adopted e-file system. Does e-file work smoothly? Not yet. We can file some things, but not everything. We had a client who called us for a case status. He got really frustrated and called the court directly after we told him we are waiting on the court.  He called to ask court status of case; court replied that nothing had ever filed. However, we were literally looking at the computer screen showing the date that the case was e-filed and accepted. The poor client didn't know what was going on: was his lawyer or the court lying to him? Thankfully, we put out the fire since we had receipts to prove the e-file. These are some reasons we're seeing as to why probate is taking much longer than usual. Hang in there; it's a waiting game. And we're waiting along with you Request your free consultation  

Locked On Bucs – Daily Podcast On The Tampa Bay Buccaneers Fans
Buccaneers at Eagles Thursday Night Football Preview | Leonard Fournette and Quez Watkins Players to Watch | Injury Updates

Locked On Bucs – Daily Podcast On The Tampa Bay Buccaneers Fans

Play Episode Listen Later Oct 14, 2021 44:00


With Thursday Night Football kicking off the NFL Week 6 festivities with the Tampa Bay Buccaneers and Philadelphia Eagles squaring off in Philly, David Harrison of Locked On Bucs and Gino Cammilleri of Locked On Eagles joined forces to preview the primetime matchup! Final injury reports are in hand, and all that's left is to get the game started. For Tampa Bay, they'll be without star players like linebacker Lavonte David, tight end Rob Gronkowski, and safety, Antoine Winfield Jr. Tom Brady was on the injury report all week, but was listed as a full participant and is good to go for Week 6. As are wide receiver Antonio Brown and cornerback Jamel Dean, among others. For the Eagles, an up and down start to the year has seen big days from both the offense and defense, and slow days for each as well. Typically, they come in different weeks with each unit alternating which one shows up, and which one needs picking up. Last week in a win over the Carolina Panthers, it was the defense, and not quarterback Jalen Hurts' offense, which led them to victory over Tampa Bay's NFC South rival. While Bucs fans are certainly thankful for their contributions in Week 5, the aim is to leave Week 6 with another victory, the team's fifth of the season. Doing so would not only add another notch in the win column, it would also grow the confidence of a team that is currently one of the more injury bitten at this point in the season. A key player who could help the Buccaneers to this week's victory is running back Leonard Fournette. Fournette dominated the Miami Dolphins defense this past Sunday, and while Bucs fans have been celebrating his emergence as the top running back on the team, the national audience has yet to catch up to this excitement. A big game on Thursday night from Fournette could change all that. For the Eagles, they'll be looking to fast-rising wide receiver Quez Watkins as they enter the contest relatively healthy, only missing offensive tackle Lane Johnson due to a personal matter. Although, they could be without tight end Dallas Goedert, who still has a slight chance of playing at the time of this report. For Tampa Bay fans expecting an easy win, they may find themselves shocked at what the Eagles have to offer. But as long as the Bucs come out on top, they'll get another week to celebrate their team being one of the best in the NFL. Not something many are used to, yet. Tom Brady and Jalen Hurts bring the Tampa Bay Buccaneers and Philadelphia Eagles to the field on Thursday night, to get the NFL's Week 6, underway. Follow & Subscribe to the Locked On Bucs Podcast on these platforms… Apple: https://apple.co/3iOePFk Spotify: https://spoti.fi/3BwlScY Audacy: https://bit.ly/3FAcIhV Google: https://bit.ly/2X0IEdS Megaphone: https://bit.ly/3uZOcSo Follow Locked On Podcast Network on Twitter: https://twitter.com/LockedOnNetwork Check out all of our NFL Coverage: linktr.ee/lockedonnfl Follow James on Twitter: https://twitter.com/JYarcho_BUCS Follow David on Twitter: https://twitter.com/DHarrison82 Support Us By Supporting Our Sponsors! Built Bar Built Bar is a protein bar that tastes like a candy bar. Go to builtbar.com and use promo code “LOCKED15,” and you'll get 15% off your next order. BetOnline AG There is only 1 place that has you covered and 1 place we trust. Betonline.ag! Sign up today for a free account at betonline.ag and use that promocode: LOCKEDON for your 50% welcome bonus. Rock Auto Amazing selection. Reliably low prices. All the parts your car will ever need. Visit RockAuto.com and tell them Locked On sent you. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Good Company in the Car
What is it with Florida and sadistic murderers? Oba Chandler.

Good Company in the Car

Play Episode Listen Later Oct 12, 2021 38:25


Typically the name Chandler brings to mind that loveable character from Friends, but in Tampa it's synonymous with pure evil.

We Make Books Podcast
Episode 71 - Villains vs. Antagonists

We Make Books Podcast

Play Episode Listen Later Oct 12, 2021 36:45


We Make Books is a podcast for writers and publishers, by writers and publishers and we want to hear from our listeners! Hit us up on our social media, linked below, and send us your questions, comments, and concerns for us to address in future episodes. We hope you enjoy We Make Books! Twitter: @WMBCast  |  @KindofKaelyn  |  @BittyBittyZap Instagram: @WMBCast  Patreon.com/WMBCast Episode Transcript (by TK @_torkz) [Upbeat Ukulele Intro Music] Rekka: This is We Make Books, a podcast about writing publishing and everything in between. Rekka is a published Science Fiction and Fantasy author, and Kaelyn is a professional genre fiction editor. Together, they'll tackle the things you never knew you never knew about getting a book from concept to finished product, with explanations, examples, and a lot of laughter. Get your moleskin notebook ready. It's time for We Make Books. We Make Books Ep. 71 Transcription Kaelyn: Today we're talking about villains and antagonists, and why they're not actually the same thing, except in the cases that they are. Rekka: Yes, exactly. K [overlapping]: [laughing] R: Perfect. I think that nails it. Sometimes they're not the same thing, sometimes they are. K: Yeah, and we'll kinda get to this but, most villains are antagonists - most, not all. Not all antagonists are villains. And in fact you will likely, in any given story, have multiple antagonists, not all of whom are the villain. I went through and really dug up all of this stuff; shockingly, the word ‘hero' is the one with the most definitions attached to it, and most different con - R: We're not talking about heroes today! We're not! K [overlapping]: Well we - but we have to, because we don't get villains without heroes, and we don't get antagonists without protagonists. Both villains and antagonists are defined and really only exist so that they can oppose or create conflict for the hero or protagonist. It kinda makes you wonder, if left to their own devices, maybe they're just a mad scientist in a lab somewhere. R: Maybe they're the hero of their own story. K: Yeah, and then suddenly someone shows up to fight them and now they're the bad guy. [laughing] R: “I was perfectly lawful and good until you showed up!” K: Exactly, yes. The basic difference between a villain and an antagonist is that an antagonist is somebody who is there to contend or oppose the main character, typically the protagonist of the story. They're there to create opposition. A villain is doing that, but they're evil. R: [laughs] K [laughing]: What they're doing is, the opposition that they're creating is either causing harm, causing suffering, will destroy the human race. It could be something more on a micro scale, where they've kidnapped the daughter of the main character; maybe they're trying to get their lemonade stand shut down so that they can sell lemonade that's gonna turn people into lizard people. An antagonist at the surface is just somebody who's doing things that's causing problems for the protagonist. They don't necessarily have to be evil. R: They could just be a rival. K: Yeah. Or any number of other things we're gonna get to here, but. And in fact as I mentioned, as you're reading a book, you're frequently gonna come across antagonists that are not actually evil. There's gonna be an antagonist who's the villain who may be evil at some point, not always, but there will be people that are antagonists. I will use an example that we love to use: Gideon the Ninth. Harrow definitely serves as an antagonist to Gideon through the book. But Harrow is not evil. R: Right. K: That's a great example of a villain operating without the audience knowing that the protagonist is coming into direct conflict with them because, we don't really find out who the villain of the story is until the very very end of it. Then we can look back and go like ‘Ah yes I see all of these things now.' The villain in the story, and spoilers if you haven't read Gideon the Ninth, but also if you listen to this podcast and you still haven't read it - R: You obviously are never going to read it at this point. K [laughing]: Yeah. The villain turns out to be Dulcinia, who is impersonating another character - and I stayed away, when writing notes for this and getting into the philosophical of what is evil and what is not - for these purposes we're gonna call her motives evil, in that she is trying to hunt down and destroy a lot of different people for her own reasons. The conflict that we come into there actually causes the antagonist and the protagonist in this, Gideon and Harrow, to sort of team up to oppose the actual villain, which by the way is a very common writing trope. Antagonists are a necessary component to any story even if they are not the source of central conflict. R: Yeah, because - and I know you're gonna lean into this example - but in Harry Potter, Draco Malfoy feels like he is central to everything in Harry's life, even though most of the time he just shows up to spew some awful thing he's overheard his parents say and then go away again. K: Draco is a good example of an antagonist who goes through a lot of different forms. Draco in the first few books of the series, he kinda shows up to make some comments and then leaves. He's not really doing much. Even in the second book when he's talking about the Chamber of Secrets and the heir of Slytherin and he actually is sitting around going ‘God I wish there was a way for me to help him' - well, okay, that's what minions do. Small antagonists. R: Most of the time everything that Draco Malfoy does or says is just to reinforce the fact that he's a jerk. K: Yeah, Draco just sorta pops up to remind all of us that there's Voldemort out there and his followers are terrible, because we don't see or interact directly with Voldemort for a lot of these books, so Draco's there to kind of remind us that he's out there. But then we finally get to book six, when Draco is given a very specific task to do: kill Dumbledore. And those listening at home, ‘okay well doesn't that make him a villain?' Well - does it? Because first of all he doesn't really actually wanna do this, but he has to. Second, he doesn't do it. At the end, he's not the one who carries this out. So again, everything's relative here. Because to Harry, he is just this thing that Harry feels he needs to track down and find out what's happening. You could go so far as to argue that Harry is creating his own conflict here, because if he just left Draco alone and went about his life trying to find these Horcruxes, things would've gone a lot smoother. R: [laughs] K: Dumbledore keeps telling Harry, ‘Hey. I got the Draco situation under control, don't worry about it.' Not in so many words and maybe if he had, again, things would've gone differently - R: You know what, communicating clearly is the antagonist of a plot. K: Okay. So that's interesting that you say that, because antagonists are not always people. R: Mhm. K: Antagonists can be certain external factors that the protagonist has to contend with. A good example of this is nature, in something like the movie Castaway. It's not evil - R [overlapping]: Okay. I was gonna say Deep Impact, like the meteor is not a villain, the meteor is an antagonist. K: Yeah. Exactly. It's not evil. The meteor or nature or something is not saying like, ‘Yes, I will destroy the world, and then also Tom Hanks.' [chuckles] R: If it can twirl its mustache, it might be a villain. K: It's just there, and it's something that the characters have to contend with. It can also be something supernatural; the thing I thought of off the top of my head was The Nothing in NeverEnding Story. It's operating unconsciously, if you will, in the sense that it doesn't seem to have nefarious purposes. It's just existing, and it's just growing. The characters are opposing it, they're trying to find a way to stop it, but it's not evil in and of itself. R: A hero trying to stop global warming is not fighting a villain. Unless - K: Ah, there's some villains in there. R: Yeah never mind, I take all that back. K: An antagonist can also be something like a society or an unjust system that the hero has to live and function in. The example that came to mind was Les Miserables. The main character, Jean Valjean, is sent to prison for stealing a loaf of bread because his sister and her children were starving. And we as the audience are meant to understand here that, while Javert - I believe is the name of the officer - is doing his duty by arresting him because he did commit theft, we understand that it is the dire circumstances of his society and his country that caused him to do this. His whole struggle and story is not only trying to lift himself up and overcome this system, but trying to one, make good on people he had hurt and things he had done in the process of this, but two, help other people that are also stuck in this system by hopefully coming up with a way to better it in the long run. I won't say overthrow it because he actively avoids that whole - R [overlapping]: Right. K: - part of the process in this story, but he is in his own way trying to get things to a better place. R: Yeah. K: I went through and just like, some ideas of antagonists who are not necessarily villains. We talked about Draco Malfoy - I will go to my grave saying that Draco is not a villain, he is first convenient exposition, and then an antagonist and an unwilling one at that. One of the ones I also thought of was Catra, from - R: Ah! K: - the first half of She-Ra, she kind of serves as sort of like a minion antagonist. R: Uh-huh. K: Her character evolves, and we'll talk about that as we continue to go through this. But she's an excellent example of just an antagonist. R: And again kind of like that rival thing - K: Yes. R: - like in anime or certain role playing video games, you always have the rival show up, and then by the end you are working with them to fight the actual villain. K: Another category is the conflict creators: people who are not evil, they don't have nefarious plots, but they're making the life of the main character unbearable. Mr. Darcy - R [overlapping]: [giggling] K: - from Pride and Prejudice is an excellent example of this. I threw the Lannisters on the list, and I'm sticking with the books - R: Right. K [laughing]: Not the TV show. R: So in this version, the Lannisters haven't managed to accomplish much yet. K: Yeah, exactly. Because, really, what are they doing? Are their motives evil? No, their motives are promoting and securing the prosperity and wellbeing of their family as much as possible. Now, they're doing things that again, evil being relative, we might look at this and go ‘oh they're evil.' I will choose the beheading of Ned Stark as a good example there. That's only evil to us because we like Ned Stark. R: Right. K: Because we look at him and see a good, just man who is being undone by his own kindness and mercy. The Lannisters look at him and go, ‘this guy's an idiot, and not only that he's a threat.' R: Mhm. K: ‘If we send him to the wall do you think his family is gonna go, ‘ah ok no problem, no harm no foul.'' Yeah, Joffrey's an impulsive little shit, who should not have done that and obviously messed up the plans of a lot of different third parties there, but from the perspective of the Lannisters he's right. R: Mhm. K: There was no reason to spare Ned Stark's life. R: It does start with the two incestuous Lannisters pushing a child out of a window though, so. K: Yes, and we can - that's a whole other episode about - R [overlapping]: [laughing] K: Well, trust me, I could do a whole episode about the evolution in literature, writing, and various media of using sexually-based components of character's personalities to demonstrate that they're evil. R: Mhm. K: But yes, this isn't to say that Jamie and Cersei themselves aren't evil, but the Lannisters as a whole are conflict creators. R: Okay. K: And within there they're all opposing each other in certain ways, but they're all kind of presenting a united front. R: The Lannister corporate machine. K: Yeah exactly. Casterly Rock incorporated. They're all presenting a united front in the promotion and wellbeing of their own family. There's obviously a lot of stuff going on there that we the audience know about, but pretend you're an outside observer in Westeros. Apart from some slight patricide - R: [laughs] K: - but that's okay, because that was the member of the family who we just barely put up with and obviously there was something wrong with him and we probably should've thrown him down a well a long time ago. R: Are you talking about Tyrion or are you talking about Tywin - K: Both, but from the perspective of the Lannisters, Tyrion. [laughing] R [overlapping]: [laughing] K: You can recover from that one, because of course there was something off about him, look at him. Never mind that he's the smartest and, actually, most caring member of their family, but y'know. That's not important, apparently. I made up an antagonist category that I'm calling “general pains in the ass.”  R: [laughing] K: [laughs] Where they are not necessarily doing anything, but their existence is just infuriating to the point that it's creating conflict for the protagonist. The one that I always love to point to is Gary from Pokémon. R: Mm. K: Who's just Ash's rival but it's a very hilariously one-sided rivalry.  R: Right, right. K: [laughs] The other one that I think is very good is actually: Sailor Moon, Tuxedo Mask in the anime. Because he is also trying to get the rainbow crystals.  R: Right. K: In a pain-in-the-ass antagonist - I would throw Rei in there. R: [laughs] Yeah, there you go. K: Again, the anime - the manga did not go into this, but they're constantly fighting over who's gonna be the better this-or-that, and who's doing the better job, and again, it creates conflict for Usagi because Rei is hyper-confident and very good at this, and Usagi is not, at all.  R: Right. It has more to do with Rei just constantly criticizing her and making her progression slower than anything else.  K: Yeah, you'll notice there's a lot of overlap here because apart from being a general pain in the ass in that scenario, Rei is also a conflict creator.  R: Yeah. K: The last one that gets a little philosophical is the protagonist themselves. Holden Caulfield is of course the standout example here, but I would take anybody that can't get out of their own way and put them on this list. One of the thoughts I came up with was Anakin Skywalker.  R: Okay. K: More with the Clone Wars TV show as a better example of that, but you certainly see it through the prequels as well. Has a set of morals and code that he lives by that is in direct conflict with what the Jedi are teaching him and telling him to do. R: Mhm. K: And that's an excellent case study into a descent into villany by having a singular goal and taking more and more extreme measures to meet it. R: Like Draco, there's somebody that is coaching him and trying to lead him in a direction that he wouldn't have chosen on his own almost at any point.  K: I'm not sure I agree with that, because what we see Anakin do over and over again, his singular motivation-- and this is, by the way, his antagonistic component-- is “protect my friends and loved ones.” R: Mhm. K: And so he's willing to take more and more extreme measures that in some cases are going to get him in trouble, he's going to have to go in front of the Jedi Council and go ‘I'm really sorry I did that, but I did save Obi-Wan, so I think it all works out in the end.' And you've got Yoda silently screaming in his head, going ‘This is not what Jedi are supposed to do, this is dangerous.' R: Yeah. K: But then also, it gets him to a point where his moral code is coming into conflict with what is important to him. So, yes I killed a bunch of people on a spaceship, but I saved all of the Senators and the Jedi on it. Well, now I've killed a bunch of children because I thought it was going to save my pregnant wife.  R: Mhm. K: And we're getting to a point where he can't differentiate those two things from one another because in the end you're still saving something or someone important.  R: Right. But I still think that - K [overlapping]: Oh, yes, having Palpatine - R [overlapping]: that progression -  K: - breathing in his ear for the whole time was not helping. [laughing] R: Yeah, that was an outside influence that encouraged that progression. K: Absolutely, yeah. So, that's another antagonistic force - that is an external factor, people attempting to influence the protagonist.  R: Mhm. K: So, we talked a lot about antagonists, and as we said, most villains - not all - most villains are antagonists but not all antagonists are villains. In order to be a villain, you gotta be evil. You have to be a quote-unquote “bad guy.” And you've gotta be doing something that is bad, something that's hurting either a people, or an entity, maybe nature, or a planet itself. Typically, you've got selfish motivations here. R: Mhm. K: Sometimes you have no motivations, and we'll get into that, because the pure evil villains are one of my favorite villains. But, villains are working to destroy a heroic purpose or protagonist. They may not know that that's what they're doing, but they're doing it. Some villains go their whole story without realizing that there's somebody working their way up to opposing them, because their protagonist is such a little miniscule blip on the scale of this evil plan here that they didn't even know someone was opposing them. Villains, they have to be bad. They don't exist in a vacuum. Y'know, we used the idea of the mad scientist who doesn't know he's the bad guy -  R: Mhm. K: - until someone shows up to fight him. If that guy's just left in his lab making some little itty bitty Frankenstein monsters to run around and help him with his experiments and things, then he never leaves and nothing bad ever happens, and the new Frankenstein monsters are happy with their existence, he's not a villain! [laughs] However, if he's oppressing those little Frankenstein monster guys, or maybe they're escaping out into the world and doing bad things to people that they encounter, that then starts to move him into the realm of villain.  R: Now, what if he's in his lab and his experiments are destroying the planet outside the lab, but he never leaves and he never realizes, and the Frankenstein [ed.: monster]s are happy?  K: Yeah, so this is where it gets weird, because what he's doing is evil but he's not doing it on purpose.  R: Mm. K: I'm trying to think what the classification for that would be. An unwilling villain, essentially. Maybe more of an antagonist at that point. I'm trying to come up with an example of something where somebody shows up and informs a scientist or creator doing something that what they're doing is having a negative impact on the world around it and they had no idea.  R: There is an episode of Star Trek: The Next Generation where they go to a planet where the people on the planet basically take some of the children off the Enterprise because they can't have children themselves, and the crew is able to convince them that it's their very powerful computer system that's causing radiation that's preventing them from being healthy, and that it would happen to the kids too if they stayed, and so on and so forth.  K: Yeah, I'm trying to - like, this one isn't necessarily as good an example, but in Ender's Game, at the very end we find out that the conflict, this whole giant conflict, kind of began almost on a misunderstanding that the human population encountered alien life in the form of bugs that were a hivemind.  R: Mhm. K: And the bugs killed all of the humans they encountered not understanding that there was a life form out there that wasn't a hivemind. Because from their perspective, it didn't matter if a few soldiers got killed, they were just essentially vessels for the larger collective consciousness. They didn't understand the - R [overlapping]: Right. Individuality. K: Yeah. So, that started them as an antagonist, but then this war escalates and escalates and, that one I don't know if we can come up with “villain” and whether sides are evil, at that point, but. With villains, they might not even need to know that they're directly opposing the main character. The biggest difference between the villain and the antagonist is that sometimes, but not always, the antagonist forms more of a plot role. It's somebody to be there to create conflict, to move the story along, or to motivate the protagonist. It's somebody who may provide opportunities for growth for the protagonist as well, again through opposition. K: Everything is opposition and conflict for antagonists. Antagonists, they can be friends or friendly rivals of the protagonist, but they are a plot role, they are helping to develop and move the character and the stories along. A villain is a character type. This is a potentially necessary component of the story, depending on the type of story that you're telling, and they have a role to serve within that. They have to be the central point of conflict for evil reasons, to give the character something moral and good and just to fight for and overcome. If this sounds contrived, or this sounds pedantic, I don't know what to tell you because this is literature. [laughs] R: [laughing] Yeah. K: This is - you will find this across all of human history in literature, the conflict between good and evil. That is the central focus of it. And listen, what we consider good and what we consider evil varies from culture to culture, time to time. Heroes don't fit a certain set of criteria across all cultures. If you go back and read any Greek myth, and what they consider to be heroes, most of these guys were assholes. Like, really bad people. But they did heroic things, and they lived in ways that were acceptable to the ancient Greeks.  R: Mhm. K: So therefore they were heroes. The Greeks are really interesting in that they did not write what was idealized, but what was true. So even though we know that the way they conducted their society, the way they lived and acted, is abhorrent to us, at the time it was acceptable. Not only acceptable, but encouraged.  R: Right. Perhaps even seen as heroic behavior.  K [overlapping]: To that end—yeah. To that end, evil is the same way.  R: Mhm. K: I'm gonna throw one last monkey wrench [laughs] into this - the villain, as we kept saying, most villains but not all are antagonists, because sometimes the villain's the protagonist. The villain is only the antagonist when they're not the main character of the story, when they're just serving as the sense of conflict. But sometimes in stories, the villain, who is evil and is doing evil things, is the protagonist, is the main character that we're following. Two of my favorite examples of this are Light from Death Note and Dexter from Dexter. Light is a teenager with a god complex who I wouldn't even say “starts off trying to do right in the world,” because if you watch the series really he's just experimenting using bad people until he gets the plan figured out. But, for those who are unfamiliar, Death Note is an outstanding anime that I highly recommend about a teenager who comes across a notebook that is stolen from a Japanese death god and learns that the names he writes in the notebook will die. And he gets more and more specific about specifying “will die at this time,” “will die in this way,” et cetera. And enters into this whole cat-and-mouse psychological thriller thing with himself and the police that are trying to stop this serial killer that they don't understand.  R: Right. K: The whole thing turns into this god complex of him establishing rules of what he thinks are right and wrong and threatening the entire world with what would basically be instantaneous death at his whim if they don't adhere to it. So let's be clear, Light is evil. He is killing people because they're not acting the way he wants them to. But he is the main character and the protagonist of the story, and if you watch it you find yourself cheering for him outwitting the police, outwitting this detective. One of the detectives, by the way, is his father. And you're still goin,g “Come on, Light, you can get yourself out of this one!” Dexter Morgan from Dexter is another good example. Dexter is a serial killer. Dexter has kill rooms where he duct tapes people to tables, ritualistically stabs them, chops the bodies up, and drops them in the water off the coast of Miami.  R: Mhm. K: Dexter also has a complex set of morality that he adheres to, and Dexter is a little bit different because he doesn't want to do these things, he wishes he wasn't like this, but he knows that he is and there's nothing he can do about it. The books are a little stranger about this than the TV show. So he's channeling his awfulness into only killing murderers.  R: Right, and the rules of morality that he follows are not actually his morals.  K: Yeah. R: They were given to him. K: Yes. As a way to hopefully help maintain and control him. But he's still killing people. And he's still operating outside the justice system. He's very careful about gathering all the evidence and knowing “yes, this person's definitely a murderer,” but he's still serving as judge, jury, and executioner without giving anyone the benefit of due process. In his mind it doesn't matter why you killed somebody. You killed somebody. And it's coming less from a place of morality than an opportunity to be an outlet for his own base urges. Villains can be protagonists. Just because somebody is the main character of the story doesn't necessarily mean that they're good.  R: In fact, I feel a little bit better about some books thinking about it that way. [laughs] K: Yeah, absolutely. And, look, there's a whole thing you can get into with the hero vs. the antihero, and what is considered heroic and what is considered acceptable; god, I think there's been entire books written about this, with Superman as a core component there. It is very nuanced to kind of sort these things out of where the line is between hero and villain, and even more so where the line is between antagonist and villain. At what point do you stop being just an inconvenience or a pain in the butt that someone's gotta deal with and become somebody who is an active threat to not just the protagonist but potentially those around them as well? R: I know a book can have antagonists and villains, we've established several that do. Can you have a book with more than one villain?  K: Absolutely!  R: How do they not just sort of shrink down to become antagonists, then, if there's more than one? Or is it just because of their behavior being evil? K: Let's go back to another favorite of ours, Avatar: the Last Airbender. I would make the argument that both Azula and Ozai are villains. I think there are definitely people who would take Azula and put her more in the antagonist category; I disagree, she's evil, she has evil motivations. She also wants to conquer and subjugate the entire world and is willing to burn it down to do it. Hers and her father's ideologies and motives line up pretty closely. The difference is that Ozai sits in this palace and we don't see him for most of the series, and Azula's out there running amuck. R: So one can be a subordinate of the other, and they can both still be villains. K: Absolutely, yeah. And villains can work together, we got the superhero team ups on villains all the time. Dunno if you ever watched Venture Bros. - R: Yeah. K: - but the Guild of Calamitous Intent is one of my favorites, not that they're all teaming up against the same protagonist there. But yeah you absolutely can have multiple villains; one who is working under or for the other. You could have minions that are villains, as long as their intentions are evil. To that end with Avatar I would say Ty Lee and Mai are antagonists, not villains. Because they're minions who are kinda just there to do what Azula says but like, they don't necessarily want to burn down and subjugate the rest of the world, they're just sort of along for the ride. I think with multiple villains, a lot of times when you see that you're kind of dealing with an ensemble cast, and everyone's gonna sort of have a little area they have to go break off into. But not always, look at Star Wars. Yeah, Darth Vader was redeemed at the end, but you had two evil villains one right after the other, and again we're kinda seeing the same power dynamic as Azula and Ozai. K: To kind of round all of this out, villains are evil. And they usually have to have some sort of evil motivation or plan or action to match this. They might be so evil that they aren't even aware that everyone knows they're evil and is trying to stop them. Villains do not necessarily have to come in immediate direct conflict with protagonists in order to be villains. They can just be out there doing their little villain evil plan thing and not even know that someone's coming to fight them to the death until that person shows up to do so. They don't have to be directly opposed to the protagonist. In some cases, they can be the protagonist. But they've gotta have bad intentions. R: For the thrill of having bad intentions. K: Some of it can be for the thrill. The pure villains, those are my favorite ones, the ones that we never quite find out why they're doing what they're doing, they're just doing it. I use the example of Maleficent, from the original Sleeping Beauty movie, not the Angelina Jolie with lots of backstory and sympathetic character origins. Maleficent shows up, she's mad that she didn't get invited to the party but we kind of all get the impression that there's a reason she wasn't, but nobody quite knows what it is or what's going on here. R: Because we knew she would make a scene! K [laughing]: I think it's because she showed up and cursed the princess. R: So they saw that coming, you're saying. K: Yeah maybe. R: Even though the exact way to prevent that, according to Maleficent, would've been to invite her. K: The logic gets a little circular there, to be sure. [laughs] But yeah so, the villain is a character type, it's not a plot role. The villain is not always necessarily there to advance the protagonist or the plot. They certainly can, but they're not doing it directly all the time. R: Mhm. K: This is, villains are one of those sometimes-but-not-always-except-for-this-and-then-that-happens kind of situation. Antagonists on the other hand, they're not necessarily evil, they can be actually just regular cool decent normal people who happen to have a conflicting agenda with the protagonist. They just want different things. Last week we did MacGuffins. The antagonist may just be running around after their own MacGuffin, and for some reason that's causing problems for the protagonist. Maybe they also want that MacGuffin for a completely different reason, one that is mutually exclusive of what the antagonist wants; they can't team up there. Or maybe they just also wanna have the top spot at the dojo, and so they're gonna be in conflict with the protagonist there. The thing that makes the antagonist an antagonist is that they are opposed to the protagonist, and they will cause conflicts with the story's main character. It's a plot role, and it doesn't necessarily speak to the character's personality or motivations. They are there to create and cause conflict for the main character to either resolve, oppose, or fall to. R: So when I proposed this topic to you, I kind of thought of antagonists as mini-bosses and the villain as the big boss, thinking of video games and the way that's usually structured. So, this is unexpected. K [laughing]: Listen, an antagonist can be a mini-boss. It's all about motivations. R: But they can also just be that person living their life that has always bugged you because they microwaved fish in the lunchroom that one time. K: That person might be a villain. R: [laughs] Just wanna contradict me at every turn. K: I dunno, somebody who microwaves fish, that seems like evil intentions to me. [laughing] R: Look, they live with the consequences of that decision for the rest of their life. K: That's very very true. Anyway, so, Rekka any - R: Can an antagonist be the protagonist? K: No, those are mutually exclusive yeah. There's somebody who is not evil and they're the main character of the story, they're the protagonist. R: So they don't have a goatee or a mustache to twirl, and they're the main character, then they're the protagonist every time. K: Yes. The primary component for being the protagonist is that the story is about you, you're the principal character. If you are serving in an antagonistic role as the protagonist, you're still the protagonist, you're just a jerk. R: So when I get up and look in the mirror in the morning and I say, “Hey, butthead,” I'm still the protagonist of my life. K: You are both the protagonist and antagonist of your own life, yes. R: That feels accurate. K: [laughing] I think most of us are. R: Yeah. K: Well we said, a good example of an antagonist is the character themselves. R: Yep. Alright, I think I get it. K: We can always come back and talk more about it, because this one was fun to do some research on and get some thoughts together. R: So you would say that a book or a story plot requires an antagonist but doesn't necessarily require a villain. K: Yes, definitely. R: And the protagonist is completely optional. K: Yes, we're just gonna have a bunch of antagonists running around causing conflict for each other. Well, I think that's pretty much every murder mystery, so. R: So if it's a third person omniscient, and there is no main POV, we can have a book with no protagonist. Got it. K: I feel like you're trying to trick me into something but I don't know what. [laughing] R: I'm antagonizing you, I'm sorry. K: It's an important thing to do. R: As an editor you need to have your feathers ruffled every now and then. K: It creates conflict, and conflict creates growth. R: And plot. K: And plot. [laughing] But yeah thank you so much for listening everyone as always, hopefully this was helpful information, I know this was a lot of mincing of minute details, but - R: Yeah I mean maybe this was the episode you never knew you never wanted but - K [overlapping]: [laughs] R: - if there is an episode topic that you do know you want, you can find us on Twitter and Instagram @WMBcast, and you can also find us at patreon.com/WMBcast. And we'd love to hear your suggestions for topics or questions. If we have confused you in any way, then you can blame Kaelyn, and also let us know and we'll try to fix that. Thanks everyone! K: Thank you so much.

Fck This Place: The Jobs Podcast
Fck This Place #108 - Cheers for Hurt People w/ Britt Birrer

Fck This Place: The Jobs Podcast

Play Episode Listen Later Oct 12, 2021 94:56


Comedian Britt Birrer loves wrestling, laughing, and good health insurance (when she can get it). Typically, it's hard to get all three at the same time, so she does her best at work helping people who have pains in their butt or who have twins with the same name or who can't stop listening to true crime or...you get the point: she's a survivor. Britt's been piecing her life together for so long she eventually decided to take care of herself first, and (surprise!) that worked out even better. Nick and Chase found a wondrously condescending craigslist post, someone who needs a last minute DJ, and a new emoji.   We don't need anything fancy, just the basics...it's the Fuck This Place podcast! _________________________________________________________________________________________   Britt's Instagram: https://www.instagram.com/britt_beer/   Britt's Tiktok:https://www.tiktok.com/@bridgesbooth _________________________________________________________________________________________   Our Instagram: https://www.instagram.com/fuckthisplacepod/ Our Tik Tok: https://www.tiktok.com/@fckthisplacepod Our Youtube-https://www.youtube.com/channel/UCNGWlaHVqQO9-q37UpPdh8A _________________________________________________________________________________________   Question about your job? Wanna yell at us? Text us at: 470-BAD-JOBS // 470-223-5627 Share the pod: https://linktr.ee/FckThisPlace About Fck This Place: The Jobs Podcast Nightmare Bosses! Creepy Craigslists! Ungodly Hours! Nick Aragon and Chase McNeill bring you the best of the worst jobs every Tuesday.  

Legal Nurse Podcast
466 Preeclampsia – High Risk Clinical and Legal Complication- Kimmara Jackson

Legal Nurse Podcast

Play Episode Listen Later Oct 11, 2021 33:44


In the area of high-risk pregnancies, preeclampsia poses special challenges. Kimmara Jackson, a highly experienced OB nurse and legal nurse consultant, provides a detailed analysis of how this condition is treated. Pregnant women with preeclampsia have the risk of high blood pressure, decreased kidney function, and seizures. Typically, they are confined to their hospital beds and monitored very closely for a range of symptoms, including decreased urine output, lethargy, and reflex function. One of the challenges with such patients is that they may become increasingly restless and may get out of bed. Some check themselves out of the hospital because they find confinement unbearable. Others may have other children at home who are receiving inadequate care. Preeclampsia also challenges new nursing graduates. They lack the experience to recognize symptoms of lethargy, and they may do inadequate reflex testing. Their feelings of being overwhelmed are deepened by the effect that the Covid epidemic has had in shrinking the resources of all medical personnel. https://youtu.be/dfteTBh2mWo Join me in this episode of Legal Nurse Podcast to learn about Preeclampsia - High Risk Clinical and Legal Complication What are some of the challenges of treating a woman with preeclampsia? How does preeclampsia affect kidney function? What symptoms of distress are difficult for new nurses to discern? How has the Covid epidemic made learning on the job particularly difficult for new nurses? How can experienced nurses communicate standards of care to newer ones? Related Product 3 Keys to LNC Success: How to Build Your Business without Missteps Even if You Never Had any Business Training - a Free Masterclass In this free masterclass, you'll gain concrete tips on how to leverage your limited time and get the big picture on how to leverage your knowledge as an LNC. Here's just a sample of what we'll cover in this incredible training: Here's just a sample of what we'll cover in this incredible training:A better way to market your legal nurse consulting businessHow to use efficient tactics to build your LNC businessThe one mistake you must never make when taking on a case ... and much, MUCH More! Your Presenter I have been a nurse for 20 years and highly experienced in High Risk pregnancy and teaching new nurses on the hospital floor. I run a nurse career coaching firm and blog called the Pandemic Nurse. I am also the founder and owner of KP Jackson Consulting, a legal nurse consulting firm. Connect with Kimmara www.Kpjacksonconsulting.com

TRUTH2U Radio
The Text Of The Moses Scroll – Episode #11 – Ross K Nichols

TRUTH2U Radio

Play Episode Listen Later Oct 11, 2021


In this episode of their current series discussing the Ten Words according to The Moses Scroll, Ross and Jono discuss the command regarding “parents.” Typically translated as honor/honour, the Hebrew word actually means “give weight.” Does this “command” contain a promise of reward? What was the original reading?

Coronavirus 4 1 1  podcast
Coronavirus, COVID-19, coronavirus variants, and vaccine updates for 10-11-2021

Coronavirus 4 1 1 podcast

Play Episode Listen Later Oct 11, 2021 5:18


This is Coronavirus 411, the latest COVID-19 info and new hotspots for October 11th, 2021. You might want to send Italy a congratulations. That country announced it's reached its goal of 80% of the population over 12 being fully vaccinated. That amounts to 43 million people out of 60 million. However, a lot of people hit the streets not to celebrate, but to protest vaccine passports. Many of these gatherings turned into violent riots. A comprehensive CBS News poll shows that most Americans are still worried about the pandemic with winter on the way, and a bit pessimistic in saying things are going to get worse in the coming months, not better. As for parents of young children, it's split down the middle in terms of will they get their children vaccinated. Masking for kids in school does seem to have majority support. About half feel the information they hear from America's health leaders has been confusing. The deadline is right around the corner and at the moment, hundreds of thousands of U.S. service members are still unvaccinated. Most of those deadlines are in November and December. Different branches are delivering different levels of compliance. For instance 90% of the active-duty Navy is fully immunized while only 72% of active-duty Marines are. The news is usually bad enough without getting it completely wrong. The New York Times issued a correction after their health and science reporter said 900,000 children have been hospitalized in the US with Covid-19. Not even a little bit close. The actual figure is a 63,000. The piece also got actions taken by regulators in Sweden and Denmark wrong. Wait, we're not done. She also got the timing of an FDA meeting on authorizing the Pfizer vaccine for kids wrong. Typically cautious and often a full-on buzzkill about holidays, Dr. Anthony Fauci says don't worry about trick or treating outdoors this Halloween. While he says we shouldn't declare premature victory and he still wants more people vaccinated who are eligible, Fauci did note that cases are dropping. Right now, there are about 95,000 new cases a day. Fauci said when it drops to less than 10,000 a day, we can start dropping restrictions like masking indoors...which will make it much easier to bob for apples. In the United States cases were down 20%, deaths are down 14%, and hospitalizations are down 21% over 14 days. The 7-day average of new cases has been trending down since September 13. There are 9,820,727 active cases in the United States. With not all states reporting daily numbers, the five states with the greatest increase in hospitalizations per capita: Michigan 20%, North Dakota 18%, Pennsylvania 15%. Minnesota 13%. And Montana 8%. The top 10 counties with the highest number of recent cases per capita according to The New York Times: Bethel Census Area, AK. Stark, ND. Lewis, KY. Kodiak Island Borough, AK. Whitley, KY. Knox, IN. Clay, TX. Custer, MT. McCreary, MT. And Big Horn, WY. There have been at least 712,993 deaths in the U.S. recorded as Covid-related. The top 3 vaccinating states by percentage of population that's been fully vaccinated: Vermont unchanged at 69.8%, Connecticut unchanged at 69.2%, and Rhode Island unchanged at 69%. The bottom 3 vaccinating states are West Virginia unchanged at 40.6%, and Wyoming and Idaho at 42.2%. The percentage of the U.S. that's been fully vaccinated is 56.2%. The five countries with biggest 24-hour increases in the number of fully vaccinated people: St. Lucia and Kosovo up 2%. And Australia, Sri Lanka, and Finland 1%. Globally, cases were down 14% and deaths were down 16% over 14 days, with the 7-day average trending up since October 5. The number of active cases around the world has now dropped below 18 million, at 17,987,905. The five countries with the... See acast.com/privacy for privacy and opt-out information.

Are You Menstrual?
Estrogen Waves & The Ups and Downs of Healing

Are You Menstrual?

Play Episode Listen Later Oct 11, 2021 48:54


Are You Menstrual? –In this episode, we cover a topic we get endless questions and DM's about--the ups and downs of the healing journey and specifically what causes this--shifts in estrogen or what we like to call estrogen waves. Healing isn't linear, but man, sometimes it is rough. We've been there. You see some improvements, then your next cycle hits you like a bag of bricks, you're breaking out, and your clothes are getting tighter. When starting our healing journey, we often have a picture in our minds of what this will look like. Typically we are thinking of feeling better after a few weeks or a couple of months, and while this is the case for some people, sometimes it takes longer, and most women feel a little worse before they feel better. This is all a result of your body adjusting to its environment and rebalancing hormones and minerals. ~Links & Resources:Free Training: Optimizing Hormone Health with Mineral Balance: https://bit.ly/3iwRDMkMineral Imbalance Quiz: https://bit.ly/3ycEn4hCastor Oil Pack Blog: https://www.hormonehealingrd.com/blog/castor-oilMitolife Dairy Absorb: https://bit.ly/36k4Hy2Estrogen Detox Blog: https://www.hormonehealingrd.com/blog/estrogen-detoxSlowing Down To Speed Up Blog: https://www.hormonehealingrd.com/blog/slowing-down-to-speed-up

Therapy For Your Money
Episode 45: Adding Benefits To Your Group Practice

Therapy For Your Money

Play Episode Listen Later Oct 8, 2021 22:44


It's that time of year again! We are receiving a TON of questions about adding benefits to your group practice for your team members, and there are several factors that play in to adding benefits in successfully. Julie's talking through the 5 most common benefits added to group practices and which benefits could be a great fit for your business!*Disclaimer: We always recommend consulting with an employment attorney to make sure you are meeting all requirements of your state before implementing benefits for your employees.Episode Highlights:Continuing EducationThis is usually the first added benefit for many group practices.There are typically not a lot of restrictions for implementing.Continuing Education doesn't have to be expensive and can be capped at whatever amount you are comfortable with!Paid Time OffIt's easier to combine vacation and sick time into one category, but you can differentiate between the hours if you would like.Some states do require you to offer a certain amount of leave time based on an employee's status.Typically, you will see a set number of hours per year for each employee, or there can be an accrual based on the number of hours the employee has worked.RetirementThe cost to the employer is at a minimum the cost of managing the plan.There is usually an employer match, that isn't required, but is definitely a nice benefit for your team.Offering retirement benefits is a great recruiting tool and retention bonus.Health/Dental/Vision InsuranceThis can be an expensive benefit to add so a lot of times, smaller group practices don't tend to offer this up front.In most cases, you are not required to offer insurance to your part-time employees, but we still recommend consulting with any employment attorney.Short-Term/Long-Term Disability InsuranceThis is the least common benefit that we see in group practices. It still adds great value to your practice, but it is more common to see PTO or medical insurance.There are some states that still require employers to offer short and long term disability options to this employees so always consult with your attorney.Short term usually covers your employee for about 3-6 months, with a typical waiting period of about 14 days (all plans can vary). Long term usually can cover your employee from 2 years to a lifetime, with a waiting period of usually 3-6 months (again, plans can vary).Links & Resources:GreenOak AccountingTherapy For Your Money Podcast

The Gun Room
The Gun Room: Episode 29

The Gun Room

Play Episode Listen Later Oct 8, 2021 12:28


 Barrel Proofing Dad and I were browsing the used gun rack at a big box store on a trip through Pennsylvania a few years back when we happened upon a double gun that caught our eye. The gun was a 12ga with light color walnut stock and forend. On closer inspection, we saw a moderate amount of hand-cut engraving, as well as hand-cut checkering on the buttery walnut stock. An older gun made in Europe, the tag read ‘BLNE', as it is sometimes referred to in gun parlance or a boxlock non-ejector. We speculated on the country of origins and details of the gun's specifications until we could get the attention of one of the clerks to ask if it was OK to take the barrels off the action and check the proof marks. Spend any amount of time in a gun shop that deals with guns from Europe and you will inevitably hear someone say “check the proof marks”. This statement broadly suggests checking the markings on the barrel flats and action watertable(on a shotgun). These are the two areas that gunmakers typically apply stampings pertaining to original specifications of the gun like chamber length or choke. It is also the area where proof houses apply proof marks on a gun.  Proofing is a type of (potentially) destructive testing whereby a firearm is discharged with appropriate dimension ammunition that has been overloaded with powder on purpose. Shooting a round overcharged with powder produces higher than normal pressure inside the barrels and action when the gun is fired. If the gun can withstand the increased pressure produced by an ‘overloaded' round, it will withstand the significantly lower pressure of standard factory ammunition. Guns are measured before and after testing and fired remotely while being held in fixtures inside secured rooms for safety reasons. Proofing is a pass or fail test, there is no middle ground. Guns that fail may experience a bulged or split barrel, or in extreme situations, action failure can result in shattered parts. Proofing firearms began hundreds of years ago in Europe(1637 in the UK) and continues to be conducted as described above. 14 countries in Europe have adopted standards laid out by CIP (think international proofing organization) which now dictate the pressures various firearms need to withstand to make proof. Each proof house in Europe developed its own proof marks. These marks changed over the years and can help date a gun or determine a gun proofed with black powder or modern smokeless powder. Most European guns were proofed in the country in which they were made, or at least the country where they were assembled to the point that they could be shot. As a result, the proof establishes the maker's country, and in cases where countries had more than one proof house, will determine which proof house the gun was tested in. For example, 6 different German proof houses are Ulm, Hannover, Kiel, Munich, Cologne, and Berlin each of which has a different proof mark. Jumping back across the pond, the obvious question becomes, “Where are the proof marks on Granddad's old Ithaca Flues?(insert any american gun name here)” Despite the fact that Europe developed a comprehensive proof testing standard, the United States has left that responsibility on the shoulders of the manufacturers, who for the most part, have held up their end of the deal. American shotguns and rifles are tested, though the extent of testing is left up to discretion. This is not to imply that American made guns are unsafe, but rather the imputis of burden is on the makers themselves to ensure the end safety of the user. Makers could test every gun, or simply choose random samples to test. And, in todays complex and advanced manufacturing facilities, there are a myriad of other tests that can be done to ensure the quality, durability, and safety of a firearm. Back in the gun store in Pennsylvania Dad and I took a look at the markings on the double gun that caught our eye. Typically on the flat sections of the action and barrel you will find several different marks. The serial number, if the gun has one, will be located here. Usually it is stamped on both action and barrels of a shotgun, and can also be stamped into the forend iron as well as the forend and stock wood(though always hidden where you have to remove them to see the numbers). On fine guns, many parts are also stamped with the serial number or at a minimum the last three digits of the serial number. On guns where hand fitting is required, not all parts can be transferred between guns; this helps in the factory to ensure the correct internal parts stay with the action in which they fit. The importance here is taking note if these numbers are matching throughout the gun. Mismatched numbers indicates that the gun has been composed of parts that were not originally manufactured together, which in turn can affect the value of the gun. After the serial number, we typically look for the proof house mark that indicates where the gun was proofed, and its country of origin. The gun in question possessed a LEG proof mark referring to the Liege Proof House in Belgium. Since there was no makers name on the gun, we were left to assume it was a ‘guild gun'. That is to say that it was a gun made by a variety of outworkers- the stock may have been made by one individual, checkered by another. The metal work done by yet another craftsman, and then the parts assembled. Guilds were frequently found in Belgium and Germany, though the idea of outworkers performing various tasks and sending parts back to the primary maker is commonplace in the gun trade. The next significant mark found was a lion over a “PV” indicating a nitro proof. This is where the proof house markings come in- this nitro proof gives us a good reason to believe the gun will be safe to shoot with smokeless powder. It is not uncommon to see multiple proof house marks, and this is where a knowledge (or good book) can help. Marks changed over time, and occasionally you will see a gun that was originally proofed for black powder, that carries a second set of marks indicating that it was re-proofed for nitro powder.  It is a requirement that guns be reproffed in Europe depending on what work is done to them. If a gun was orignally a 2.5” chamber, which is lengthened to 2 ¾”, the gun must be reproofed. The same goes for if a gun is sleeved- new barrels put on an old action. Flats on guns like this can seem a jumble of marks but they all tell part of the guns story. Our gun was also marked with a 12 and a 70 in a circle indicating its 12ga, 2 ¾” chambers. Thinking in metric terms, 65 or 65mm would indicate 2 ½” chambers, with 70 or 70mm being the elongated 2 ¾”. Though those may be what some consider the important marks, there can be many more marks in these areas worth checking out. On the barrel, you will often find the choke designations - this gun had them as numbers- 18.3 and 18.4- metric bore measurements. There are other marks like a star over a U, a script 3, double stamped numbers and more- these can be preliminary proof marks, final proof marks, controller marks, personal makers marks, or the individual at the proof house that tested the gun. There can also be a number in Kg or kilograms that indicates the weight of the barrels at the time of proofing.   Proof marks can be our best link to a guns history, much like a passport that helps reveal a bit about the gun and its past. They can tell where the gun came from, where it travelled in its lifetime, and so much more. They are certainly one of my favorite aspects of old shotguns and rifles. All in all the Belgian guild gun was well worth the $ paid and it is now living happily amongst the other guns on my rest farm for old shotguns. The lesson: a base knowledge of proof marks is a handy thing when assessing used guns and certainly helped solidify my decision to buy, rather than pass, this particular double.

Authority Factor
Prove Your Framework First!

Authority Factor

Play Episode Listen Later Oct 8, 2021 8:35


This short show could be a little painful for some of you. If you truly want to help people in a coaching business then go prove your framework first. It is pretty normal for coaches to start teaching something that they have fixed in their own lives. Typically, they fix a major challenge first. For the coach, there was a lot of trial and error along the way. Then looking back, they are able to see that, if they avoided a couple things, they would have got there faster. Well that new route they see in the mirror is called the Framework, and most coaches go on to turn that into products and services, however, they don't bother to prove the framework first. Big mistake! If you want to actually watch how all this fits together then join me on this live workshop and I will pay it out for you: https://www.authorityfactor.info Get More Involved: Leave a 5 Star Review 7 Subscribe On iTunes: https://podcasts.apple.com/us/podcast/authority-factor/id1516170809 Free Roadmap To Building A 7-Figure Coaching Business: https://www.AuthorityFactor.info Access All My Stuff: https://www.KenDunn.com Book Me To Speak: https://www.KenDunn.com Subscribe on YouTube: https://www.youtube.com/c/kendunnauthorityfactor  

Born Or Made
Habit Lab | Bless You, Change Me

Born Or Made

Play Episode Listen Later Oct 8, 2021 2:15


Have you ever been in a relationship with someone and wanted to CHANGE something about the other person? Typically, it doesn't work out well. While you can't usually change other people, you can change yourself. Today's mini-episode will dive into what exactly I mean. Follow Born or Made on Apple Podcasts: Click Here: Born or Made Tap the “+” in the top right corner Tap “Follow” Follow me on Instagram: @michaelchernow Follow Born or Made on Instagram: @bornormade Follow Kreatures of Habit on Instagram: @kreaturesofhabit Check out my new brand KreaturesofHabit.com

Adafruit Industries
Deep Dive w/Scott: SVD and Interrupts

Adafruit Industries

Play Episode Listen Later Oct 8, 2021 121:19


Scott covers progress on the Cortex A work for Raspberry Pi. He's been working on expanding the system view description (SVD) files and learning all about the Generic Interrupt Controller (GIC400 / GICv2). He'll also answer any questions folks have. Visit the Adafruit shop online - http://www.adafruit.com Chat with me and lot of others on the Adafruit Discord at https://adafru.it/discord. Deep Dive happens every week. Normally Fridays at 2pm Pacific but occasionally shifted to Thursday at 2pm. Typically goes for two hours or more. Questions are welcome. 0:00 Getting started 0:02:00 Hello and Housekeeping 0:04:42 Unexpected Makers Feather S2 - https://unexpectedmaker.com/ 0:05:30 Today's topic deep dive Raspberry Pi 0:06:30 Educational/Work Background summary 0:10:20 Getting started in Board Design - KiCad, Oshpark - https://www.kicad.org/ 0:12:00 Working on google maps, reasons for leaving 0:13:35 What was the most important thing learned at Google? 0:14:45 Getting started with surface mount 0:16:15 Flux and soldering, Pin Headers - https://www.adafruit.com/product/2830 0:20:30 Adafruit Collin's Lab soldering videos - https://www.youtube.com/playlist?list=PLjF7R1fz_OOXyxiYQWEX4OZga9c7jrw5q 0:21:05 Hand soldering, vs. SMD for dotstars 0:22:17 Looking at the ‘new' Pi Development board 40-Pin / external JTAG / SWD adapter - https://oshpark.com/shared_projects/fBq76nP9 0:24:22 Raspberry Pi CM4 0:25:37 USB to UART external board 0:26:45 External connector and chickadee logo ( on oshpark ) 0:29:35 Oshpark, PCB shopper (dot com) 0:31:00 Chickadee.tech web page and After Dark theme 0:32:12 Two weeks of progress on RPi 0:32:32 Troubleshooting 4 layer boards 0:33:25 adafruit/samd-peripherals github page - SAMD21 / SAMD51 0:33:52 adafruit / Broadcom peripherals page - https://github.com/adafruit/broadcom-peripherals 0:35:55 Recap system on chips ( SAM D21 block diagram ) 0:38:00 .SVD ( arm ) vs flash.xml ? 0:38:46 Memory Mapped I/O and Product (memory) Mapping 0:40:40 SVD file used for debugging and generate C code 0:42:00 RPi Desktop/workspace setup explained 0:44:00 Debug output and open OCD 0:44:35 Gdbstub PyCortexMDebug - https://github.com/bnahill/PyCortexMDebug 0:46:30 “svd” commands 0:50:24 Using KDE console terminal for tiling “management” 0:51:00 IRQ's and interrupts 0:53:24 Need USB Interrupts to get TinyUSB to work 0:54:00 PPI vs SPI 0:57:28 Would interrupts drive support to multicore 0:58:55 Do we need delays to support interrupts? (no) 1:00:50 Can you have delays in an interrupt? ( don't want to ) 1:02:10 SVDcon (sp) converted table 1:02:39 Python generated jinja macros (svd tool) 1:07:50 GPIO alternate functions - moving to get interrupts working 1:08:40 USB initialization need to be powered on ( see vcmailbox ? ) 1:09:40 How does the interrupt handler work - assembly code 1:10:10 saving and restoring state in interrupts (macro) 1:11:30 handling invalid interrupt entries 1:12:25 CPU exception top level code 1:13:14 handle IRQ 1:14:15 svd USB_OTG_GLOBAL / examine the registers 1:17:02 next thing down the line, the interrupt controller 1:20:30 Lady Ada on the screen! 1:32:23 - after some good advice, goodbye 1:35:20 ARM provided svd conv (sp) 1:38:52 GIC 400 1:40:53 the GIC 400 overview diagram 1:43:20 Interrupt “1023” magic number - in a spurious interrupt 1:46:42 Interrupt handling state machine diagram Figure 3-1 1:47:55 Distributor register descriptions - GICD_ITARGETS 1:49:00 Old show notes - https://github.com/adafruit/deep-dive-notes/ 1:51:16 Reviewing interrupt priority fields 1:54:20 interrupts are all zero 1:55:00 Try setting priority to one, as an experiment 1:57:00 restart with new code - gdb says in fifo-read 1:58:34 Wrap-up 1:59:25 Next week next Friday 2:00:09 cat-cam ----------------------------------------- LIVE CHAT IS HERE! http://adafru.it/discord Adafruit on Instagram: https://www.instagram.com/adafruit Subscribe to Adafruit on YouTube: http://adafru.it/subscribe New tutorials on the Adafruit Learning System: http://learn.adafruit.com/ -----------------------------------------

Crimes & Cocktails
Single Shot #15 The Zodiac Kill is Who Now?

Crimes & Cocktails

Play Episode Listen Later Oct 7, 2021 32:18


Hey CC friends! We decided for the month of October we will make all our episodes public. Typically these single shots are for our patrons, but here is another casual taste for you. So sit back and lets discuss this week's true crime news with a beer, THE ZODIAC KILLER'S IDENTITY. For more minisodes like this one, be sure to check out our patreon. Patreon.com/crimesandcocktails --- Support this podcast: https://anchor.fm/crimes-and-cocktails6/support

Dreams ARE Real
Ep 159: (Behind the Mic) Why New Entrepreneurs Fail (and What To Do About It)

Dreams ARE Real

Play Episode Listen Later Oct 7, 2021 56:00


Why do so many new entrepreneurs fail? Typically 1 of 4 common issues: They don't treat their venture as a business including a strategic approach and plan for profit; they're so captivated by a vision of the future that they're unaware of the next steps needed in the present; they're distracted by limitless shiny things around them and struggle for consistency, or they face people and leadership issues. What do these challenges look like and what steps should you take to move around or past them? Listen close.   About the Host: Dan McPherson, International Speaker, Business and Personal Development Coach, and CEO of Leaders Must Lead, is on a mission to help Creatives and Entrepreneurs create and grow profit and understand that Dreams ARE Real. With more than 25 years' experience in corporate roles leading teams of up to 2000 and responsible for more than $150M in revenue, Dan is a recognized expert in leadership, sales, and business strategy. Through his Leaders Must Learn Mastermind, Dreams ARE Real Podcast, Foundations of Success Training, and powerful 1-1 coaching, Dan helps hundreds of entrepreneurs around the world from musicians and artists to chiropractors, coaches, retailers, and beyond experience success and accomplish their goals.   To learn more about Dan or to follow him on Social Media, you can find him on: Website: www.leadersmustlead.com Leaders Must Lead Facebook: https://www.facebook.com/leadersmustlead Free Coaching Assessment: https://leadersmustlead.com/free-coaching-assessment Dreams are Real Facebook: https://www.facebook.com/groups/365493184118010/ Instagram: https://www.instagram.com/leadersmustlead/ Twitter: https://twitter.com/leadersmustlead YouTube: https://www.youtube.com/channel/UCZXypDeFKyZnpeQXcX-AsBQ   Thanks for listening! Thanks so much for listening to my podcast! If you enjoyed this episode and think that others could benefit from listening, please share it using the social media buttons on this page. Do you have some feedback or questions about this episode? Leave a note in the comment section below! Subscribe to the podcast If you would like to get automatic updates of new podcast episodes, you can subscribe to the podcast on Apple Podcasts or Stitcher. You can also subscribe in your favorite podcast app. Leave us an Apple Podcasts review Ratings and reviews from our listeners are extremely valuable to me and greatly appreciated. They help my podcast rank higher on Apple Podcasts, which exposes the show to more awesome listeners like you. If you have a minute, please leave an honest review on Apple Podcasts.

The My Little Eater Podcast
#80: How to serve pumpkin for babies

The My Little Eater Podcast

Play Episode Listen Later Oct 7, 2021 12:27


On this episode of the My Little Eater Podcast, we're covering how to serve pumpkin to your baby, including the health benefits of pumpkin for your baby. There's no better time than now to jump into this topic, given that fall and thanksgiving are here! Typically though, most of us prefer to decorate with it, instead of including it in our meal plans - but I'm here to change that!  Pumpkin is such a versatile food, making it super easy to incorporate in a variety of dishes, adding a unique and rich flavour. It's easy to pair with sweet and savoury flavours, making the possibilities endless! There are also tons of health benefits of pumpkin for babies, including a TON of Vitamin A, fiber, iron and B vitamins, just to name a few! Luckily, pumpkin can be served safely to babies early on, and can easily be one of your baby's first foods when they start solids So, how do you serve pumpkin to your baby (or toddler)? Depending on their age you can offer it pureed, roasted as a side dish, make it into pasta sauce, baked goods and more! I'll  go through it all in this episode and I think you'll love it! If you find these episodes help answer your questions, and tackle all baby or toddler feeding questions, please leave a rating and review at Apple Podcasts! If you try pumpkin with your baby over the holidays, I'd love to see the cuteness! Share a pic of your baby trying it out and tag me, @mylittleeater, on Instagram!  Additional Resources: Starting solids with your baby? If you're unsure where to start, start with my Baby Led Feeding Online Course! This course will provide you with everything you need to know about feeding your 6-12 month old, from the right feeding gear, to what foods to serve and how to serve them, helping you build healthy eating habits early! The course teaches you how to confidently move through each phase of feeding (from puree to finger foods), preventing picky eating habits from the start. BABY LED FEEDING ONLINE COURSE: https://mylittleeater.com/baby-led-feeding/ If you're past the baby stage, and are now dealing with picky tendencies quickly arising, my Feeding Toddler Online Course can help teach you techniques to stop these tendencies before they become a bigger problem. These tried and tested solutions will ultimately eliminate mealtime battles and bring back happy mealtimes for your entire family.  FEEDING TODDLERS ONLINE COURSE: https://mylittleeater.com/feeding-toddlers/ Skip To… When you can introduce pumpkin (1:30) Health benefits of pumpkin (2:00) What type of pumpkin should you buy? (2:55) How to serve pumpkin to your baby and toddler (4:45) Recipes to include pumpkin in (10:09)   

Zero to a Million
Building Content And Community To Scale Your eCommerce Brand

Zero to a Million

Play Episode Listen Later Oct 6, 2021 30:25


HIGHLIGHTS 00:40 Founding HabitAware as a personal need living with Trichotillomania04:45 Growing up unaware of Trichotillomania and learning to heal08:16 HabitAware product development and meeting technical co-founders13:28 Marketing HabitAware without outing people to their condition16:08 Scaling: Education, word of mouth, outreach, and 3rd party consultants22:13 Converting peer coaching to an online course and testing 25:59 Updates to iOS have made tracking numbers difficult 27:50 HabitAware's growth is aimed at supporting the communityQUOTES03:48 "That's one of my triggers, just sitting and doing nothing. And that boredom, and I was pulling. And he just gently grabbed my hand and that was the aha moment of oh, if I just had something that notified me, could it help me?"06:27 "I was so focused on hiding it and concealing, on making sure no one found out that it didn't ever really even occur to me could I switch and try to focus on healing."12:31 "Typically when you say preorder campaign, you think of Indiegogo or Kickstarter, because there was so much shame and there still is so much shame about these conditions, we actually did the preorder campaign on our own website. We just didn't want to out people."16:41 "They would share it with their psychologist and we started doing outreach to psychologists. So then it was sort of a two-way street of either a patient was telling their psychologist or psychologist was telling their patient. So that word of mouth is really strong for us." 20:31 "Really, email has been our number one method, I think, in terms of that we've been focusing on in terms of nurturing people through, nurturing that relationship. And then Google Ads as well, search ads."You can connect with Aneela in the links below:Website - https://habitaware.com/Instagram - https://www.instagram.com/habitaware/YouTube - https://www.youtube.com/channel/UC-03SZ_g7VWlyXhp-qzJosw

Orange County Housing Market News
Orange County Housing Market Update - October

Orange County Housing Market News

Play Episode Listen Later Oct 6, 2021 16:55


Inventory and demand are both on their way down as expected for this time of year. Over the next 4-6 weeks expect this hot seller's market to look almost the same as it does today. Right now active inventory for all of Orange County is under 2,200 homes, a record low for this time of year. Typically during the beginning of October we see about 6,400 homes, that is a 194% difference. Are you a first time home buyer and don't know where to start your home buying journey? Check out my free e-book on how to budget for your first home at: http://www.buyersguidetobudgeting.com Josh Alexander THE brokeredge JoshAlexanderRealEstate@gmail.com 714.366.2186 DRE#:01974435 Follow me on all the socials: https://linktr.ee/joshtherealestatedad

Beyond Bariatric Surgery: Everything You Need to Move On
#68 5 Surprising Foods That Contain Powerful Prebiotics

Beyond Bariatric Surgery: Everything You Need to Move On

Play Episode Listen Later Oct 6, 2021 8:42


Procarenow.com for free samples. Use Code: Susan10 to save 10% When I say the word probiotics, what's the first food that comes to your mind? Yogurt maybe? But what about the word prebiotics? How are they different from probiotics? After all, they're spelled almost the same. Stick around and let's talk about five surprising foods that contain powerful prebiotics and the benefits to your body.Hi, I'm registered dietitian nutritionist Dr. Susan Mitchell. You're listening to the Bariatric Surgery Success podcast episode number 68. Most of my career I've worked in some type of media, particularly radio where I did morning drive nutrition spots for over 18 years. That's what lead me to start podcasting and ultimately to you. I created Bariatric Surgery Success to provide you with life-changing information based on science along with simple strategies and tools to help you be successful in your transformation and your entire journey. So happy you've connected with me. You're in the right place and I'm glad you're listening.I want to give a shout out to Ann who posted in the FB group: "I love having this facebook group and the podcast for support." Hey Ann, thanks for taking time to tell me. My go is for the Facebook group and podcast to work together so you listen to new information and have a place to talk about it. So glad you've joined in.Remember, if you want to join us in the facebook group, please do. You can find answers and support day-to-day or just vent if you need to. On facebook, search groups for bariatric surgery success with dietitian dr susan mitchell and ask to join. The link: https://www.facebook.com/groups/bariatricsurgerysuccesswithdrsusanmitchellBack to probiotics and prebiotics. You hear these words commonly tossed about in the supplement and food world but what do they mean anyway? Probiotics are bacteria that offer a health benefit to the body. This is a case where the word ‘bacteria' is a good thing as probiotics may help prevent or treat certain illnesses. Its no wonder probiotics are often nicknamed “the good bacteria”. In your body, it's a balancing act between good and bad bacteria. Think of it this way. Medications, diseases, even some environmental issues can alter this balance which is where probiotics may be helpful. Probiotics are live bacteria that occur naturally in foods such as yogurt, sauerkraut, sourdough bread, and other fermented foods.But what about prebiotics? Prebiotics are a type of fiber. Think of them as fiber that acts kind of like fertilizer for the good bacteria in your body. Probiotic bacteria feed on prebiotics. Prebiotics may also support your immune system, increase how much calcium your body absorbs, reduce symptoms of irritable bowel syndrome or IBS and decrease your cholesterol level. Plus, you can't forget the one thing that TV ads have been heavily promoting which ishelp with the ‘go' or a way to help prevent constipation.Prebiotics or prebiotic fiber is found naturally in quite a few foods which may surprise you. We'll talk about these in just a minute. They're also added to food products like cereals, breakfast bars, and breads in a form called inulin that you'll likely see on the ingredient list. You can also find prebiotic fiber such as inulin in pill or powdered supplements. Sometimes, prebiotics are combined with probiotics to create what I call a tag-team approach or symbiotic relationship. Remember, prebiotic fibers help enhance the work of probiotic bacteria.You might have heard that prebiotic fiber can cause gas and bloating. It can. This can happen from prebiotic food sources and especially prebiotic supplements if you take a large dose. Typically a large prebiotic supplement dose is about 15 grams but a much lesser amount could cause issues if you've been dealing with any gas and bloating following surgery. It's a good time to run this by your bariatric dietitian or health care provider before you add any prebiotics in supplement form. If you ever take a prebiotic supplement it's better to start with a small dose of 2-5 grams and assess your tolerance before adding more. Because prebiotics are classified as fiber, they count toward the daily fiber recommendations of 25-30 grams. Here's the nice surprise I mentioned. You've probably been consuming prebiotic fiber every day and didn't know it. I love this about eating real food. Prebiotic fiber occurs naturally in many foods that you probably eat now if you're six months to a year down the track from surgery. These 5 food sources may surprise you: apples, bananas, onions, garlic, and asparagus. You probably never associated them with prebiotics. Remember we said that the prebiotic fiber in these foods acts kind of like fertilizer for the good bacteria or probiotics in the digestive tract. So every time you add onions or garlic to a dish, you're adding a source of prebiotics. Asparagus is a low carb vegetable that also brings prebiotics to the table. Apples and bananas, so common right, but oh so good for you. The good news about eating these whole food sources like onions, garlic, asparagus, bananas and apples for the prebiotic fiber is that these foods also contain beneficial vitamins and minerals. It's a win-win all the way around. And typically less of a bloating and gas issue too…can't forget that, right? The next time you slice an apple, think of all the healthy goodness it's bringing to your body.Other foods that contain prebiotic fiber include artichokes, barley, berries, flaxseed, leeks, legumes, and oats. These will be beneficial to your body as well as you add back foods into your daily diet. Take care of yourself and be good to you…you're worth it.

Correct Opinions with Trey Kennedy
Jake talks about getting a procedure typically done as a newborn and Trey loves the colorful haired Ashevillans

Correct Opinions with Trey Kennedy

Play Episode Listen Later Oct 6, 2021 59:30


Snip snip and a person named Sunset - Asheville, you wild. tryfirstleaf.com/trey 6 bottles of wine for only $29.95 and free shipping! www.betterhelp.com/correct 10% off your first month! buyraycon.com/trey SAVE 15% WITH PROMO CODE TREY15 TODAY - ACT NOW chime.com/trey Banking that has your back Subscribe to the channel: https://www.youtube.com/channel/UCL3ESPT9yf1T8x6L0P4d39w?sub_confirmation=1 Become a Do Less Guest: https://treykennedy.com/patreon/ Love the opinions, but hate the ads? Subscribe to the ad-free version of Correct Opinions here!: https://correctopinions.supercast.tech/ Subscribe to Correct Opinions on Apple: http://bit.ly/COPodcast Buy my merch: https://fanjoy.co/collections/trey-kennedy Learn more about your ad choices. Visit megaphone.fm/adchoices

Law School
United States contract law (Part 2 of 2)

Law School

Play Episode Listen Later Oct 6, 2021 9:16


Formality. Ordinarily, contracts do not have to be in writing to be enforceable. However, certain types of contracts do have to be reduced to writing to be enforceable, to prevent frauds and perjuries, hence the name statute of frauds, which also makes it not a misnomer (fraud need not be present to implicate the statute of frauds). Typically, the following types of contracts implicate the statute of frauds: Land, including leases over a year and easements. Suretyships (promises to answer for the debts, defaults, or miscarriages of another). Consideration of marriage (not to actually get married but to give a dowry, for example). Goods over a certain amount of money (usually $500, as in the UCC). Contracts that cannot be performed within one year. For example, a two-year employment contract naturally cannot be performed within one year. In many states' lifetime contracts are not considered to fall within the Statute of Frauds reasoning that life can end at any time, certainly within one year from the time of execution. In other states, notably Illinois, contracts requiring performance for a lifetime are covered by the Statute. The statute of frauds requires the signature of the party against whom enforcement is sought (the party to be sued for failure to perform). For example, Bob contracts with the Smith Company for two years of employment. The employer would need to sign the writing. Moreover, the writing for purposes of satisfying the statute of frauds does not need to be the actual contract. It might be a letter, memorializing and formalizing an oral arrangement already made over the phone. Therefore, the signed writing does not need to contain all of the terms that the parties agreed to. At common law, only the essential terms were required in the signed writing. Under the UCC, the only term that must be present in the writing is the quantity. The writing also does not need to be one document, but if there are multiple documents, they must all obviously refer to the same transaction, and they all must be signed. The signature itself does not need to be a full name. Any mark made with the intent to authenticate the writing is satisfactory, such as initials or even such as an X by an illiterate party. A contract that may otherwise be unenforceable under the statute of frauds may become enforceable under the doctrine of part performance. If the party seeking enforcement of the contract has partially or fulfilled its duties under the contract without objection from the other party, the performing party may be able to use its performance to hold the other party to the terms of the contract. No writing is required when: Goods have been received and accepted. Payment has been made and accepted. Goods are specially manufactured (there is no market for them); or, under the UCC, the party against whom enforcement is being sought admits a certain quantity of goods. The last exception applies up to the quantity admitted, which may include the entire contract. This reversed the rule at common law that permitted a defendant to testify that he indeed contracted with the plaintiff but refuses to perform because it is not in writing. --- Send in a voice message: https://anchor.fm/law-school/message Support this podcast: https://anchor.fm/law-school/support

Wednesdays with Watson
Trauma, Loss & The Enneagram: Becky Wade, Type 1-Navigating The Inner Critic

Wednesdays with Watson

Play Episode Listen Later Oct 6, 2021 38:22


Contact AmyContact Becky Wade: Welcome to season 3 of the Wednesdays With Watson podcast! We  are spending the first half of this season, studying how God made us and then using that information to help us process and understand trauma. Were you always who you are or did your trauma make you who you are?First up, and representing the enneagram 1's out there is Christy Award Winning Author, Becky Wade. Becky is kind, authentic, delightful, and helps us understand the inner critic of the enneagram one. She articulately explains how she has been able to leverage the inner critic for good and what she does when the inner critic begins its indictment--especially during times of loss, and uncertainty.Over View Of Enneagram 1:Core Fear:  Being wrong, bad, immoral or corrupt.Core Longing: To Hear (and believe) "yo are good".While the enneagram is JUST a tool, it can be effective when coupled with the gospel. Typically, this enneagram type will often cave to the indictment of their strong, and often loud inner critic. These types need to know that they are good, that they could never work or perform themselves into a good standing with God because that happened with the completed work of Jesus. So. We can honesty say to all enneagram 1's--You are GOOD, because He made you that way, though a hefty price was paid.But what does this have to do when trauma anyway? If we can understand why we behave the way we do (often running from our core fears) then we can begin to live in the tension that is healing--temporarily horrible, but eternally worth it. When this type experiences trauma and loss, they are likely blaming themselves and finding a way to make it right. This is exhausting and unfruitful. Wade beautifully describes recent opportunities to lean into the pain of loss, and also leaning on her community to help her quiet that inner critic that served to only destroy all that is right and good.Wade agrees that our identity is in Christ, and also believes that 1 Peter 2:9 is a precious promise. When asked when she was the most content:"When I remember that I am fully approved, fully forgiven, fully accepted and fully loved. God supplies identity that maters."This is a message for all of us, but especially for enneagram 1 types as you learn to successfully navigate the inner critic in you. Learn to leverage it as you continue your quest from healing and living the life that you should not be able to live.Wade's overall message to you: You are not alone. She asks others to give enneagram type ones a safe place to be wrong, yet forgiven. She encourages us to help the the enneagram 1 know that while they may be often right, they aren't always right. :) Wade highlights the importance of that message coming from a gentle and kind voice.So, what is the superpower of the type 1 anyway?  It is,I believe, your desire to be right and a good upstanding citizen. But, I also think your superpower is flipping the switch and seeing the "rightness" is dropping things that don't belong to you like guilt and shame.Type 1's I hope today is the day you stop listening to the lies and remember that no matter what, you stand righteous before an almighty God, once you have surrendered to Him.  Your trauma or loss was not your fault, you will continue to blame yourself, and when you do, come back here--we will remind you how much you matter!Scripture References:Rev 21:5Genesis 1:25-26Psalm 139 I Peter 2:9Podcast Host; Amy Watson & Crissy LoughridgeGuest: Becky WadeProducer: Amy Highland

The Just Baseball Show
77 | Game 162, Yankees vs. Red Sox, Dodgers vs. Cardinals, 5 Takeaways from the Season

The Just Baseball Show

Play Episode Listen Later Oct 5, 2021 81:49


*Different schedule this week! Typically, you see a combination of Peter, Jack, and Aram on Monday, Tuesday, and Friday. This week, it'll be Tuesday, Thursday, Friday to accommodate the MLB Playoff Schedule. They got you covered for every single playoff game. Peter, Jack, and Aram give you a full recap of the last day of the MLB regular season, wishing farewell to the Blue Jays and Mariners. The guys dive into the matchup and give you their predictions for the AL and NL Wild Card Games. They end the show with five takeaways from watching all 162 games from 2021. Watch full episodes on Youtube (Like + Subscribe): https://www.youtube.com/channel/UCFqpzwtbGykGiJw2WGhQTxw Check out our website: https://www.justbaseball.com/ Follow Just Baseball on TikTok and Instagram: @justbaseballfans Personal Twitters: @aramleighton8, @peterappel23, @jack_mcmullen11 Check out the Just Baseball Collection of T-Shirts on BreakingT: https://breakingt.com/collections/just-baseball Please leave a five-star review and a written note if you enjoy the Just Baseball Show on Apple Podcasts!

Energy Week
Episode 173 - Cali to close nuclear plant | U.K. Power Grid Fossil Fuel-Free by 2035 | Mark Rossano

Energy Week

Play Episode Listen Later Oct 4, 2021 55:13


Why California is shutting down its last nuclear planthttps://www.cnbc.com/2021/10/02/why-is-california-closing-diablo-canyon-nuclear-plant.html- why, if California is trying to increase clean energy while in a power crunch?- safety concerns, but the nuclear chief says that there are no safety concerns and Diablo Canyon could safely operate for 40 years?- consumers won't buy the nuclear powerChina's Government Secures Fuel Supplies for Winter as the Country Battles a Power Crisis Threathttps://www.natureworldnews.com/articles/47690/20211003/china-fuel-supplies-power-crisis-threat.htmChina Relaxes Coal Mine Safety Efforts on Electricity Crisishttps://finance.yahoo.com/news/china-relaxes-coal-mine-safety-004516612.htmlBoris Johnson Plans Fossil Fuel-Free U.K. Power Grid by 2035https://www.bloomberg.com/news/articles/2021-10-04/u-k-s-johnson-plans-fossil-fuel-free-power-grid-by-2035- will Britain's power grid even have power unless a lot of nuclear power plants in the next years- The U.K. will reserve a key role for nuclear power in the nation's electricity system as a backup for renewables in a plan to phase out natural gas by 2035.- Fossil fuels will no longer be used to generate power by the middle of the next decade as the U.K. tackles the double threat of climate change and an energy supply crunch that has sent prices spiraling to record highs. The government says the plan is “a landmark move to end Britain's dependency on volatile fossil fuels.”- But renewables are also quite volatileClimate change could cost the U.S. up to 10.5 percent of its GDP by 2100, study findshttps://www.washingtonpost.com/weather/2019/08/19/climate-change-could-cost-us-up-percent-its-gdp-by-study-finds/- weather disasters may be more intense, but over time more wealth is accumulated so obviously the cost of the damage will be more. Especially, wealth is concentrated in areas more prone to weather damage, like on the beach, near fault lines, areas where wildfires happen & the beach in Florida.Interview with Mark Rossano on China:- check out Mark's YouTube channel (PrimaryVisionNetwork), FracSpreadCount and Private Equity Fund- Is China really going to secure energy at all costs? Who/when said this? Said in front of shuttered coal mine (because it was unsafe). Unsafe mines were cleaned up at the beginning of the year.- Costs? political, human, price? weighted towards political and human. Need to expedite bringing mines back. Also, context of fight with Australia - if China goes out to Australia they can resolve issue and bring in their coal. - Will China choose power to residential areas or maintain factory output? China is actually allowing price fluctuation. But have also vowed that there won't be cuts to residential power. - Slashed steel production, which really cuts down on power usage.- Timing also an issue. In September China tries to run ahead of "Golden Week" - getting products ready and shipped by holiday season. But now they are on the other side of that. Typically in Oct/Nov drop in industrial throughput.- could see more "Malaysian crude" coming into China (Actually Iranian crude)- big buildup of crude sitting offshore in China, meanwhile teapots are cutting runs. 68% utilization rate (2018 levels now).- State refiners have cut runs 7%. Fuel oil is at a 6 year high and only time have had more fuel oil in storage was in 2014. Trying to preserve incase need to burn fuel oil in power plants.- China's perspective on OPEC meeting - more concerned about price than volume. Volume is there, the type of crude that Asia wants to buy has plenty. What are they waiting for? Pulling more from Iraq.- Does China need to see a $1 cut in OSPs to really make a difference and would this seem like a slap in the face to the White House if Aramco raises OSPs to the US?

People Behind the Science Podcast - Stories from Scientists about Science, Life, Research, and Science Careers
625: An Organic Chemist Leading the Charge Studying Antiaromatic Ions - Dr. Nancy Mills

People Behind the Science Podcast - Stories from Scientists about Science, Life, Research, and Science Careers

Play Episode Listen Later Oct 4, 2021 37:22


Dr. Nancy Mills was a Murchison Professor (2011-2014) at Trinity University. She works at a primarily undergraduate institution as an organic chemist. Typically organic chemists make things like drugs or polymers. When trying to make things, they really focus on making stable compounds. Nancy has actually created a rare unstable (anti-aromatic) compound that does not turn into a stable one. In addition to her love of science, Nancy enjoys reading mystery books, cooking, and ultralight backpacking. She received her PhD in Chemistry from the University of Arizona and she spent a few years teaching at Carleton College in Minnesota before joining the faculty at Trinity. Nancy has received many awards and honors during her career, including selection as a Council on Undergraduate Research Fellow, the Distinguished Achievement Award in Scholarship from Trinity University, the American Chemical Society Award for Research at an Undergraduate Institution, and the Piper Professor state-wide teaching award. She has also been elected as a Fellow of the American Chemical Society, a Fellow of the American Association for the Advancement of Science, and a Z. T. Scott Faculty Fellow at Trinity in recognition of outstanding teaching. Nancy joined us for an interview to tell us all about her journey through life and science.

Mindful BS
Mindful B.S.- Our Kind of People

Mindful BS

Play Episode Listen Later Oct 4, 2021 56:55


This week the ladies are switching it up! Typically they do show reviews during their mid week episodes, but they wanted to give you guys an opportunity to catch up! They're diving into the first episodes ( no spoilers) and giving their first take reviews of the show. But you know they always have to give it their own twist. While breaking down the episodes the ladies also discuss themes and talking points that were presented in the show and also share their own personal experience with some of the themes presented. Tune in and get into this great new show. When have the ladies ever let you down with a good recommendation? As always the DMs are always open! Feel free to let them know what you thought about the show and also be on the look out for weekly mid-week episodes on this show!

The Defiant Business Podcast
E 201: Maximizing Your Creativity in Business

The Defiant Business Podcast

Play Episode Listen Later Oct 4, 2021 19:59


On today's Marketing Monday, we're going to take a look at how you can maximize your creativity in business. When it seems like there are no answers to your problems, or that everyone has done all of your ideas, you're likely not embracing your creative thinking process. The best ideas don't tend to come from cognitive thought processing alone. Typically, your creative process includes a discontinuous “jump” so when someone asks you how you came up with that, you say “It just came to me!” Let's explore how we can optimize this for you in your business. So if you're a coach, consultant, or service-based business owner who wants to know how to maximize your creativity in business, then this episode is for you. Follow along on Instagram at @defythestatusquobiz To connect with other Defiant Businesses, join the Facebook Group

Craig Peterson's Tech Talk
Could Using the Right Multi-Factor Authentication Save You?

Craig Peterson's Tech Talk

Play Episode Listen Later Oct 3, 2021 83:13


Could Using the Right Multi-Factor Authentication Save You? I had a good friend who, this week, had his life's work stolen from him. Yeah. And you know what caused it? It was his password. Now, you know what you're supposed to be doing? I'm going to tell you exactly what to do right now. Let's get right down to the whole problem with passwords. I'm going to tell you a little bit about my friend this week. He has been building a business for. Maybe going on 10 years now, and this business relies on advertising. Most companies do so in some way; we need to have new customers. There's always some attrition. Some customers go away. So how do we keep them? We do what we can. How do we get new customers? For him, it was. Advertising, primarily on Facebook. He did some Google ads as well, but Facebook is really where he was focused. So how did he do all of that? Here's the bottom line you have to, if you are going to be advertising on Facebook, you have to have an advertising account. The same thing's true. Google. And then, on that account, you tie in either your bank account or your credit card. I recommend a credit card so that those transactions can be backed up. And on top of all of that now, of course, you have to use a pixel. So the way the tracking works is there are pixels on websites, about those already. And the bottom line with the pixels. Those are also. Cookies are about the pixels are used to set a cookie so that Facebook knows what sites you've gone to. So he uses those. I use those. In fact, if you go to my website, I have a Facebook pixel that gets set. And the reason for all of that is so that we know with. I'd be interested in something on the site. So I know that there are many people interested in this page or that page. And so I could, I have not ever, but I could now do some advertising. I could send ads to you so that if you were looking at something particular, you'd see ads related to that, which I've always said. It is the right way to go. If I'm looking to buy a pickup truck, I love to see ads for different pickup trucks, but if I don't want a car or truck, I don't want to see the ads. It isn't like TV where it sometimes seems every other ad is about. Car or a pickup truck. It drives me crazy because it's a waste of their money in advertising to me. After all, I don't want those things. And it's also not only just annoying in money-wasting. There are better ways to do targeting. And that's what the whole online thing is. Anyways, I told you about that because he had set up this pixel years ago. Basically, the Facebook pixel gets to know you. All of the people who like you that might've bought from you. Cause you can have that pixel track people through your site, your purchase site, they know what you purchase on the shopping cart, et cetera. And you can identify these people over on Facebook and their ads because they abandoned the cart or whatever it is you want to do there. So there's just a whole ton of stuff that you can do for these people. And it's so bad. It is so valuable. It takes years to build up that account. Years to put that pixel in place. And our friend here, he had done precisely that. Then he found that his account had been compromised. And that is a terrible thing in this case because the bad guy used his account to place ads. So now there are really two or three problems here. We'll talk about one of them. Why was the bad guy going after him? He has been running ads on Facebook for a long time. So as far as Facebook is concerned, his account is credible. All of the ads he runs don't have to be reviewed by a human being. They can go up almost immediately. He doesn't have to wait days for some of these things to go up. So our bad guy can get an account like his that has years' worth of advertising credibility and now start advertising things that are not correct. So there again is part of the value of having one of these older accounts for advertising. And so the bad guy did that use his credibility. And then secondly, he used 25 grand worth of my friend's money to run ads. Also, of course, very bad, very bad. So I sat down with him. In fact, it was this last week, and I was out on a trip with just a vacation trip. It was absolutely fantastic. I never just do vacation. It's always business plus work whenever I do anything like this, but I was on a trip last week. And so my eldest son who works closely with me, and he's also part of the FBI InfraGard program. So I had him reach out to my friend, and he helped them out, and they talked back and forth. So here's the problem that he has. And I'm trying to figure out a perfect way to solve this. And I haven't figured that out yet. And if you guys have an idea because you are the best and brightest, you really are. So go ahead and drop me an email at me@craigpeterson.com if a good way around this particular problem, which is he has. This Facebook could count and many other accounts, including his website, hosting account, email account, et cetera. And. He has people who manage his ads for him. Who operates his website for him, who put up some promotions, advertising, and everything else. So these are third-party. This is what we generically call a supply chain, risk people who are not him have access to his stuff, his private property. And how does he do it, or how did he do it? Is he went ahead and gave them. Access by giving them accounts or passwords. How well were they guarding their passwords and their accounts? So the first thing I had my friend do was going to haveIbeenpwned.com. I had him put in his email address, the one he uses the most, and it showed up in five different. Hacks data dumps. So these are five various sites where he had used that same email address in this case. And he found out that in those five cases, the bad guy's got his passwords and personal information. All bad. And he went ahead and cleaned it up. So I said put in the password because have I been, pwned also let you check your password, just see if it has been used by someone else and then stolen. So there are billions of passwords in this database. It's incredible of all of these known passwords. So he put in his password, and no, it had not been stolen, but the problem is how about the people that were managing his ads on Facebook and managing his Facebook ad. We're the usernames, which are typically the email addresses and the passwords kept securely. That's a supply chain thing I'm talking about, and that's where I'd love to get him. But from you guys, me@craigpeterson.com. If you think you have a good answer, What we've been doing. And our advice to him was use one password. That's the only one to use. I don't trust last pass anymore. After their last big hack where they got hacked one password, the digit one password. And go ahead. And set it up. And in a business scenario, you can have multiple vaults. So have a vault. That's just for people that are dealing with your Facebook ad account, maybe have another vault for people who are posting for you on Facebook. Or better yet when it comes to Facebook, go ahead and have an intermediary that is trusted the, if this, then that, or there's a few of them out there that can see that you put the post up on the website and automatically posted on Facebook. So you don't have to get. All of these people, your passwords, but again, it's up to you. You got to figure out if that makes sense to you that those are the types of things that I think you can do. And that is what we do as well. Now, one of the beauties of using one password like that, where you're not sharing all of your passwords to everything you're sharing, the minimum amount of login information that you possibly can share is that if they leave your employees, All you have to do is remove their access to the appropriate vault or vaults, or maybe all of your vaults. And this is what I've done with people that worked for me in the US and people would work for me overseas, and there have been a lot of them and it has worked quite well for me. So with one pass, We can enforce password integrity. We can make sure the passwords on stolen. One password ties automatically into have I been postponed. If a password has been exposed, if it's been stolen online, it's a great way to go. Now I've got an offer for you guys who are listening. I have a special report that I've sold before on passwords, and it goes through talks about one password. He talks about the last pass, which I'm no longer really recommending, but give some comparisons and how you can use these things. Make sure you go and email me right now. Me, Me@craigpeterson.com. That's ME at Craig Peterson dot com and just ask me for the password special report, and I'll be glad to get that on-off to you. There is a lot of good detail in there and helps you, whether you're a home user or a business. So the next step in your security is multi-factor authentication. Interesting study out saying that about 75% of people say that they've used it for work or for business, but the hard numbers, I don't think they agree One of the things that you have to do is use good passwords. And the best way to do that is to use a password manager. I was talking about a friend of mine who had been hacked this last week and his account was hacked. His Facebook ad account was hacked. We asked him if we could reach out to. BI and he said, sure. So we checked with the FBI and they're looking to turn this into a case, a real case, because they've never seen this type of thing, the hijacking of an advertising account who hijacked it. And why did they hide jacket? Was this in preparation maybe for. Playing around with manipulating our next election cycle coming up. There could be a lot of things that they're planning on doing and taking over my friend's account would be a great way to have done it. So maybe they're going to do other things here. And our friends at the FBI are looking into it. How now do you also keep your data safe? Easily simply. When we're talking about these types of accounts, the thing to look at is known as two factor authentication or multifactor authentication. You see my friend, if he had been using multi-factor authentication. I would not have been vulnerable. Even if the bad guys had his username, email address and his password, they still would not be able to log in without having that little six-digit code. That's the best way to do multi-factor authentication. When we're talking about this code, whether it's four or 5, 6, 8 digits long, we should not be using our cell phones to receive those. At least not as text messages, those have a problem because our phone numbers can be stolen from us and they are stolen from us. So if we're a real target, in other words, they're going after you. Joe Smith and they know you have some, $2 million in your account. So they're going after you while they can, in most cases, take control of your phone. Now you might not know it and it doesn't have to be hacked. All they have to do is have the phone company move your phone number to a new phone. Once. So that means one of the things you need to do is contact your telephone vendor, whoever it is, who's providing new that service. That's a company like Verizon sprint T-Mobile a T and Tone of those companies that are giving you cell service, you have to contact them and set up a pass. So that if they have a phone call coming in and that phone call can be faked. So it looks like it's coming from your phone, even if there was a phone call coming in, whether it's coming from your phone or not, they have to get that password or passcode that you gave them. And once they have that passcode now, and that's great, but if you don't have that in there targeting you specifically, then you're in trouble. So for many of us really it may not make a huge difference. But I would do it anyways. I have done it with every one of my cell phone carriers now. A couple of decades set up a password. So the next step is this multifactor authentication. If I'm not supposed to get it via text message to my phone, how do I get it? There are a couple of apps out there. There's a free one called Google authentic. And Google authenticator runs on your phone. And once it's there on your phone and you are setting it up on a website, so Facebook, for instance, your bank, most websites out there, the bigger ones, all you have to do is say, I want to set up multi-factor authentication, and then it'll ask you a case. So how do you want to do it? And you can say, I want an app and they will display. A Q R code. That's one of those square codes with a bunch of little lines inside of it. You're seeing QR codes before they become very common. And you take your phone with the Google authenticator app. Take a picture. Of that little QR code on the screen, and now it will start sinking up so that every 30 seconds Google authenticator on your phone will change that number. So when you need to log back into that website, it's going to ask you for the code. You just pull up Google authenticator and there's the code. So that's the freeway to do it. And not necessarily the easiest way to. Again, going back to one password. I use this thing exclusively. It is phenomenal for keeping my passwords, keeping them all straight and then encrypted vault, actually in multiple encrypted vault it's so that I can share some of them. Some of them are just strictly private, but it also has that same authenticator functionality built right into it. Microsoft has its own authenticator, but you can tell Microsoft that you want to use the standard authenticator. Of course, Microsoft has to do everything differently. But you can tell it. And I do tell it, I want to use a regular authenticator app, not Microsoft authenticator. By the way. That's why I advise you to don't use the Microsoft authenticator, just use one authenticator for all of the sites, and then Microsoft will give you that same QR code. And then you can take that picture and you're off and running. Next time you log in, it asks you for the code and instead of texting it to you to your phone smarter, otherwise it will not. That require you to open up your authenticator. So for me, for instance, when I'm logging into a website, it comes up and asks for the username, asked for the password. Both of those are filled out automatically by one password for me. And then it asks for that code identification code and. One password automatically puts it into my pace to buffer copy-paste, buffer, and I just paste it in and they've got the code. So I don't have to remember the codes. I don't remember passwords. I don't have to remember usernames or email addresses. One password remembers them all for me. Plus it'll remember notes and other things. So you can tell, I really one password. We use it with all of our clients. That's what we have for them. And it does meet even a lot of these DOD requirement on top of. Depending again, how much security you need. We will use duo D U O and it also has this authenticator functionality and we will also use UBI keys. These are those hardware key. They do oh, can provide you with hardware tokens. Those are those little tokens that can go onto your key ring. That show a changing six-digit number every 30 seconds. And that's the same number that would be there in your smartphone app. Your one password or Google authenticator smartphone. Hopefully, I didn't confuse you too much. I think most of the reason we're not using the security we should is because we're not sure how to, and we don't know what we're going to be. And I can see that being a big problem. So if you have questions about any of this, if you would like a copy of my password security, special report, just send an email to me. M e@craigpeterson.com. That's me M e@craigpeterson.com. That's S O N.com. I'll be glad to send it to you. Also, if you sign up for my newsletter there on my website@craigpeterson.com, you are going to get. I was hold little series of the special reports to help you out, get you going. And then every week I send out a little bit of training and all of my articles for the week. It's usually six to 10 articles that I consider to be important so that, what's going on in the cybersecurity world. So you can. With it for yourself, for your family, for your business. Craig peterson.com. According to researchers. 32% of teen girls said that when they felt bad about their bodies, Instagram made them feel worse. And you know what Facebook knew and knows Instagram is toxic for teen girls. There's a great article that came out in the Wall Street Journal. And I'm going to read just a little bit here from some of the quotes first. When I went on Instagram, all I saw were images of chiseled bodies, perfect. Abs and women doing 100 burpees in 10 minutes, said, Ms.  Now 18, who lives in Western Virginia. Amazing. Isn't it. The one that I opened now with 32% of teen girls said that when they felt bad about their bodies, Instagram, I made them feel worse. So that is studies again, that looks like yeah, these were researchers inside Instagram and they said this in a March, 2020 slide presentation that was posted to Facebook's internal message board that was reviewed by the wall street journal quote comparisons on Instagram can change how young women view and describe themselves. Apparently, for the past three years, Facebook has been conducting studies into how Instagram is affecting its millions of young users. Now, for those of you who don't know what Instagram is, it allows these users to create little stories, to have. Pictures videos of things that they're doing, and it's a lifestyle type thing you might've heard, of course, of how this I don't know what it is. Kidnapping murder plot. These, this young couple and the body I think was found up in Wyoming. I'm trying to remember, but of her and it's yeah, there it is. It wasn't my OMI. And I'm looking up right now, Gabby potato. That's who it is. She was what they called a micro influence. And I know a lot of people who can loom, that's what they want to be. There's a young lady that stayed with us for a few months. She had no other place to live. And so we invited her in here and we got some interesting stories to tell about that experience. And it's, a little sad, but anyhow, she got back up on her feet and then she decided she was going to become an influence. And what an influencer is someone that has a lot of followers. And of course, a lot means different numbers. You get these massive influencers that have tens of millions of people that quote, follow unquote them. And of course, just think of the Kardashians they're famous for. Being famous, nothing else. They have subsequently done some pretty amazing things. At least a few of them have. We've got one of those daughters who now was the first earliest billionaire. I think it was ever youngest. So they have accomplished some amazing things after the fact, but they got started. By just becoming famous by posting on these social media sites. So you get a micro-influencer, like Gabby Petito, who is out there posting things and pictures. And you look at all of these pictures and, oh my gosh, they're up at this national park. Oh, isn't she so cute. I'll look at her boyfriend. They'll look so good together and people. Fall for that image, right? It's just like Photoshopping these pictures of models, changing them. There've been some real complaints about those over the years. So Instagram sets these kids up with these pictures of people that are just totally unrealistic. One of the slides from a 2019 presentation says, quote, we make body. Excuse me. We make body image issues worse for one in three teenage girls teams, blame Instagram for increases in the rate of anxiety. And depression said another slide. This reaction was unprompted and consistent across. Groups among teens is this according to the wall street journal who reported suicidal thoughts, 13% of British users, and 6% of American users trace the desire to kill themselves to Instagram. Again, according to one of these presentations, isn't this just absolutely amazing. And you might've heard it discussed a little bit. I saw some articles about it, obviously in the news wall street journal had it, but this is a $100 billion company, Instagram. That's what their annual revenues. More than 40% of Instagram users are 22 years old and younger. And about 22 million teens log into Instagram in the US each day, compared with 5 million that log into Facebook, the younger users have been declining. Facebook it's getting the population there is getting older and older on Facebook. In average teens in the us spend 50% more time on Instagram than they do on Facebook. And also tick-tock, by the way I took talk has now surpassed YouTube in some of these metrics. Quote, Instagram is well-positioned to resonate and win with young people said a researcher's slide posted internally. Inside Facebook. Another post said there is a path to growth. If Instagram can continue their trajectory. Amazing. So Facebook's public phase has really tried to downplay all of these negative effects that the Instagram app has on teens, particularly girls, and hasn't made its research public or available to academics or lawmakers who have asked for it. Quote, the research that we've seen is that using social apps to connect with other people. Positive mental health benefits said Mark Zuckerberg. He's the CEO of course of Facebook. Now this was 2020. In March one at a congressional hearing, he was asked about children and mental health. So you see how he really lawyered the words that they can have positive mental health benefits, but Facebook's own internal research seems to show that they know it has a profound negative effect on a large percentage of their users. Instagram had Adam Moseri told reporters in may of this year, that research he had seen suggest the app's effect on team's wellbeing is likely quote quite small. So what the wall street journal seems to be pointing out here is that Facebook is not giving us the truth on any of this stuff. It's really sad. We've got to be careful. No, apparently Mr. Moseri also said that he's been pushing very hard for Facebook to really take their responsibilities more broadly. He says they're proud of this research. I'm just summarizing this before we run out of time here, but it shows the document. Internal documents on Facebook show that they are having a major impact on teen, mental health, political discourse, and even human trafficking. These, this internal research offers an unparalleled picture. Courtney told the wall street journal of how Facebook is acutely aware that the products and systems central to its business success routine. Fail great article. I've got it in this week's newsletter. You can just open it up and click through on the link to the wall street journal. They have a paywall and I hate to use payroll articles, but this one's well worth it. And they do give you some free articles every month. So if you're not on that newsletter, you can sign up right now. Craig peterson.com. You'll get the next one. If you miss a link today, if you want some, the special report on passwords, et cetera, just email me directly. Give me a few days to respond. But me M e@craigpeterson.com. That's me M e@craigpeterson.com. We've all worked from home from time to time. At least if we're somehow in the information it industry, I want to talk right now about why you need a personal laptop. Even if the business is providing you with a laptop. Laptops are something that was designed to be personal, but many of us are using them as our main computer. I know I often am using my laptop, a couple of my kids and my wife. It's really their main computer, even though they all have other computers that they could potentially be using, laptops are just handy and you have them with, you can take them with you. We've got workstation set up that are kind of. Workstations, if you will, where there are three screens set up and they're all hooked up into one central screen controller that then has a USBC connection that goes right into the, your laptop. So you can be sitting there with four screens on your Mac laptop on your mac pro if you need four screens, it's really handy. No question. Many of us have a laptop for home and a laptop for business. And many of us also look at it and say, oh wow, this is a great laptop I got from work. It's much better than my home laptop. And you start to use the business laptop for work. At home. Okay. That's what it's for. Right. But then we start to use that business laptop for personal stuff. That's where the problems start. We've seen surveys out there that are shown. Then half of workers are using work issue devices for personal tasks that might be doing it at home. They might be doing it at the office. Things like personal messages, shopping, online, social media, reading the news. So the prospect of using your work laptop as your only laptop, not just for work, but also for maybe watching some movies, group chat and messaging, reading, fan fiction, paying bills, emailing to family or friend. It just seems not. It's so tempting. It's just natural. I'm on it. I'm on it all day long. Why wouldn't I just use it? And this is particularly true for people who are working from home, but we have to be careful with that. It's really something that you shouldn't be doing for a couple of reasons. One that. Top that's a business. Laptop is the property of the business. It's just like walking home with boxes, full of pencils and paperback in the old days, it is not yours to use for personal use. We also have to assume, assume since it is the company's laptop that hopefully it's been secure. Hopefully they haven't set up. So it's going through a special VPN at the office and it's going through special filters, maybe snort filters or something else. That's doing some deeper inspection on what's coming through your laptop. Well, there are also likely on that laptop. Tools that are monitoring your device. Things like key loggers, biometric tracking, Jill location, software that tracks your web browser and social media behavior, screenshot, snapshot software, maybe even your cam. Is being used to keep track of you. I know a number of the websites that I've used in the past to hire temporary workers. Those workers have to agree to have you monitor what they're doing. These hourly workers, subtle take screenshots of their screen, unbeknownst to them. Pictures from the cameras at random intervals. Again, unbeknownst to them, it'll track what they're doing. And so I can now go in and say, okay, well he billed me five hours for doing this. And I look at his screen and guess what? He wasn't doing that for all of those five hours that he just billed me. Well, the same thing could be true for your company, even if you're not paid by the hour. Right now, we're looking at stats that show over half of the businesses that are providing laptops for the employees to use more than half of them are using monitoring software. And through this whole lockdown, the usage of these different types of monitoring systems has grown. Now there's some of the programs you're using. You might be VPN in, you might be using slack or G suite enterprise, all good little pieces of software. They can monitor that obviously, but it goes all the way through to the business. And using your slack access as paid for, by the businesses also idiotic to do things like send messages to your buddies, set up drinks after work, complain to other people about someone else in the business, your boss, or otherwise your it, people at the business can see all of that. They can see what you're doing with slack. Even if you have a separate personal account. It's still more likely that you'll end up mixing them up if you're logged into both on the same computer. So the bottom line is if you are on a work computer, whether it's a laptop or something else, you can reasonably assume that I T can see everything. That's not. They own it. Okay. And they have to do some of this stuff to protect themselves. We put software on laptops for companies not to spy on employees. That's none of our business, but we put software on computers for employees. To make sure they stay safe. Think of what happens when your computer, your laptop, whatever it might be, connects to the company's network. Now that can be through a VPN. It can be because you take your laptop home or on the road when you're traveling and you bring it back into the office. If that computer is infected, somehow now you've brought that infection into the office. And that's how a lot of the malware works. It goes from computer to computer. So once they get in that front door where there's through a website and email that you clicked on or in a computer that you're bringing into the office, they can start to move around. Now it's not just your activity. And this is an interesting article from the verge by Monica chin. It's not just your activity that they can see on your laptop, but in many cases, they're also able to look at anything you're downloading any of your photographs or videos that you might've sinked up from your smart. Laura loading these types of things, your text messages on your work device for safekeeping, or just because it's your primary device might seem harmless, right? Cause you're just going to remove them before you hand it in. But some companies such as Apple won't allow you to wipe your device before handing it in regardless of how personal the contents are. And that makes sense too, because many times an employee leaves. And they don't give the company all of the information that they have, that they're obliged to give back to their employer. Things that they've been working on, customer information, et cetera. So Manalive, there are plenty of other devices out there. Hopefully if you leave your company with plenty of notice, moving a bunch of things off your work device in the last few days, uh, might raise some eyebrows at the. And I'm saying hopefully, because they should notice that sort of thing, because it could be malicious activity. It could be an insider risk that maybe they're not even aware of. There's so much you could go wrong here. So bottom line don't use the work laptop for home. So what should you use? You know, my personal recommendation. Almost always is get a Mac. They are safer to use the patches that they get are usually not destructive. You know, sometimes you can install a patch for windows and now your machine just won't work anymore. Right. You've had that happen. I know every last one of us out there that are tried to install Microsoft patches for a while have had that happen to them. All of a sudden the patch has completely messed up your computer and you are so out of luck, it's ridiculous. Right? So don't, you know, hopefully don't do that, but I like the max because they are basically safer than windows. And also because the patches just work on them, apple tends to get them out in plenty of time to try and protect us the next level. If he can't afford an apple and. Apple laptops really are not expensive when you consider how long they last and the quality that components, they are not expensive at all. But if you can't afford that, the next thing I would look at is getting a Chromebook. There are a lot of companies that make Chromebooks Chrome is an operating system from Google. It's similar to Android. Google keeps the Chromebooks up-to-date. They patch them quite regularly and make sure that there aren't nastiness is going on. You just have some of the same issues and Android has patches might take a while to get to you because it has to go through the vendor that made the Chromebook. You might have a Chromebook for Sam from Samsung, for instance, it's not Google's even though it's called a Google Chromebook. Now Chromebooks rely heavily on the cloud services that Google provides, but they can also run just locally. So with a Chromebook and you can get them for as little as 150 bucks, but remember you get what you pay for. Or as much as I've seen them in the $2,000 price range with fancy GPU's, local storage and other things, but at 150 bucks, it could be well worth it for you. It lets you do the regular word processing. Just think of what you can do with Google docs, spreadsheets against Google docs, spreadsheets, all of those types of things are built into it. You can. Cruz the web, obviously using Google Chrome on your Chromebook. And send and receive email, which is what most people do. That's really kind of all, most people do at home. So consider that as well. I also like iPad. They are quite safe again, but they tend to be more expensive and they can do pretty much everything. And now with Android support built right into Google Chromebooks, you can even run Android apps. So there you go. Keep safe and be safe out there. Right. Have a hack free life. Make sure you get my newsletter. Craig peterson.com/subscribe. Craig peterson.com/subscribe. The national cyber director, Chris Inglis said that we need cyber bullets, that cyber bullets are part of the war on hacks. And it makes sense on one level. But when you get into the reality, it's a much different story..  I had an interesting email this week from a listener. Actually he sent it about two weeks ago when I finally was able to get to it this week and responded, and he was pointing out how there are some things that I talk about on the show that I put into my newsletter that are really good. And. I'm paraphrasing here but theoretical to so many people, there's some things that you can figure out pretty easily yourself. Some things you can do yourselves and other things that are just different. To do still. And a lot of that has to do with the websites you go to in order to maintain your passwords. And he was complaining specifically about bank of America and how you can, according to what he has found here in the real world, you can come up with a. Password a 20 character long password that is going to keep everything nice and safe at trend to be generated. You're using one password and great. So you set your password up in bank of America's account, and then you try and log in later, and it doesn't work because it lets you put 20 character passwords and when you're creating it, yeah. But the login screen only takes the first 16. So of course they'd home match. You see it's things like that really are pushing us back, holding us back. But I'd say pushing us back from being secure as a country, there, there just aren't enough people paying enough attention to make sure this cyber security, even the basic stuff like passwords and two factor authentication are being done properly. So one of the things I wanted to make sure you guys were aware of is I need to know when you're having these problems, because what I want to do is put together some trainings to show you exactly how to do it. Because on some websites you were saying, it's pretty hard to use one password he's paying for it, but it's kinda difficult for him. And I think in some ways, a lack of understanding. Then, it can be difficult to spend a bunch of time trying to watch some training videos for some of the software. And so I want to hear when you're having problems so I can do what I did for him this week and spend a little time, write some stuff up, and I even am reaching out to some of this website. People like bank of America who are really messing up cyber security for people who are trying to do the right thing and writing them and saying, Hey, listen, I'm part of the FBI InfraGard program. I'm a member of it. I paid a lot of attention to cybersecurity. Heck I ran the training for the FBI InfraGard program for a couple of years, and there are some real things lacking. In the login anyways, and this one particular case of the cybersecurity, but I don't know all of this stuff. I'm not using all of these things and I have a disadvantage over you guys, and that is that I've been doing this for so long. I've forgotten what it's like to not know it. Does that make sense? So if you have something that I've talked about on the show, that's appeared in my newsletter and you're having some confusion over, let me know. Just email me M e@craigpeterson.com. What he did is he just hit reply to my newsletter. And of course, that goes to me and me@gregpeterson.com and it tracks it. So I know I need to reply, so I can sit down and go through and answer people's questions. I sent out a lot of the copies of my password, special report to people you guys had requested specifically some of the. People out there had requested a little bit of help. And I had sent out an email to most of the people that I could identify as being business people. I sent out a little thing saying, Hey, listen, if you could use half-hour my help, let me know myself or my team. And then, again, you can just send me an E Craig. So I answered a lot of those questions this week. And in fact, that's how I come up with much of what I cover here on the show. You guys ask the questions and that's how I know that it's a real problem. If I understand it, that's one thing. But for the people who don't do cybersecurity as their primary job or a strategy, I get it. I can get why you guys are confused. So make sure you get my weekly newsletter. So you can find out about all of the trainings, the free stuff, the paid courses, and. It's easy. Just go to Craig peterson.com/subscribe. That's Craig Peterson, P E T E R S O N. Craig peterson.com/subscribe. And I'm more than glad. Add you to that list. And there are now thousands of people on that list to get my email pretty much every week. If you miss it one week, it's probably, cause I just got too busy, but I put out all my show notes. I put it all a little bit of training notes, all. The us government is supposedly getting ready to fire what they're calling cyber bullets in response to these significant hacking attacks. This is what they're calling a comprehensive strategy to dissuade. Adversaries. And this is all from the national cyber security director, Chris Inglis. This is from an article in American military news.com by Chris Strome. That was out this week. And of course I included that in my newsletter this week as well, coming out. Today or tomorrow, depends on how this all goes right with the weekend. I got to help a buddy out today, but president Joe Biden has been really talking about how do we use cyber weapons to retaliate. For instance, he gave a list of industries that Russia should not be. As though Putin himself is running all of these hacks or come out of Russia. Yeah, certainly there are some that are part of their military, but there many of them that are just bad guys that are trying to make some money, we should feel sorry for them. So Biden gives him this list and says, Hey, listen, if you attack any of these various industries or actually portions of our economy, We are going to retaliate. We have seen the us retaliate under President Trump and the retaliation. Of course he did all kinds of economic stuff to stop it. And much of which has been reversed by president Biden's administration, but also he attacked them directly in. Down some power systems there in the Moscow area, which I thought was really kinda cool. So kudos to President Trump for doing that and for president and Biden now to say, Hey, we are going to attack back. Of course. The biggest question is. What would we be attacking? How would we be attacking it? And for what reason, for instance, the red Chinese have gone after our office of personnel management, OPM records and got them all back in 2015. So they now know everything about everybody that had a secret security clearance or the took a paycheck from the federal government. All of those records, they would get their hands on them and get them on all of the records a lot. So Inglis was in front of the let's see here, the, yeah, he was a former director of the national security agency. He's the first to hold his Senate-confirmed position at the white house, this national cyber director position. And he says there is a sense that we can perhaps fire some cyber bullets and shoot our way out of this English set at the conference. It was hosted by the way, by the national security agency and a nonprofit group, he said that will be useful in certain circumstances. If you had a clear shot at a cyber aggressor and I can take them offline, I would advise that we do so as long as the collateral effects are acceptable. Yeah. What we have done here under president Biden administration is we have shut down some people who were operating illegally, we have shut down some cyber actors that were attacking us. So we've been doing that, but it isn't exactly. Wow. We just saw a muzzle flash over there. And so we are returning fire to the area of that muzzle flash, because as I've said many times before, we just don't know. Where in fact that bullet is coming from, it makes it a lot more difficult. English went on to say there's a larger set of initiatives that have to be undertaken. Not one of those elements is going to be sufficient to take this. Out let's see here, the us should make clear to Russia now their adversaries, what kinds of attacks would prompt a response, which is what president Biden did when he was talking with, of course, President Putin over there, red lines of both good and bad red lines are clear and crisp. Although I got to say many of our administrations have. Really done anything about it. It's the red line in the sand and Syria president Obama didn't do anything when they stepped over that red line. So yeah. And then with what we just finished doing in Afghanistan, where we drew a red line and said, we're going to protect all of you who helped us. And then we not only abandoned them, but we abandoned Americans behind there. I don't think a lot of people aren't going to believe us. So here's the last statement here. And again, this is an article in American military news from our cyber chief is the government actions. Aren't always going to be broadcast. In some cases, it's not helpful to broadcast those for all of mankind to see another one. We are doing some things behind the scenes. And I have certainly seen some of the results of those over the last few years. Stick around.  You're listening to Craig Peterson online@craigpeterson.com. You've got a smartphone and there are some new versions out, right? New hardware, new software, Android iOS. How long should you keep that device? How long can you stay safe with that older device? Apple has now done something. Different something they've never done before. One of the reasons that apple equipment tends to be safer than almost anything else out there is that they have, what's known as a closed ecosystem. There's arguments both directions here on whether that's safer or not. But the real advantage when it comes to cybersecurity is there are only. So many versions of the iPhone out there. What are we now in a couple of dozen versions of the hardware platform that makes it easier for apple to be able to support older versions of the software and multiple pieces of hardware, much easier than for, let's say Microsoft windows. It doesn't even have a single. Platform or Android, where there are hundreds of hardware platforms out there and tens of thousands of versions of the hardware, because one model phone can contain many. Changes different types of hardware to talk to the cell towers or the screen you name it. So it's very hard to keep up. Android has for quite a while now supported three versions of their operating system. Of course, we're talking about Google, but Android operating system. So they support the current release. Of Android and the Breviary release is two previous releases in fact of Android. Now that is frankly a pretty good thing to know, but there's over a billion Android devices out there that are no longer supported by security updates. We've got Android 10, nine, and eight that are fairly supported right now. We're actually up to Android 12. So here's how it works. If you've got Android version 10 out, if that's the main one, then you can continue to do. Eight and nine and get updates, security updates. But then here's the problem, everybody, those security updates are coming out of Google, but that does not mean that they are making it all the way to you. So there you go. It's one thing for Google to provide updates, but if you can't get them because your phone manufacturer is not supporting them, you've got trouble Samsung. Is probably the best company other than maybe Google and the Google Pixel phone. Samsung's the best company to go to. If you want some longer-term support. Many of these other companies just don't provide support past the current version. So keep that in mind as well. Android 12 was the 12th major version of Android announced by Google, February, 2021. And it is starting to roll out a Android. The 11th, 11 is the one that was out in February of last year. At least it was announced then. And we're, they're coming out, they're getting pushed out. So basically Google is saying the current version plus two prior versions. And that usually gives you about a four or maybe even a five year window. So if you're. An Android device from a major manufacturer, particularly Samsung on the Android side, your device is going to be good for at least four years, maybe five years now on the, and by the way, you don't necessarily have to upgrade the. You could be continuing to run an older release saw, as I mentioned earlier, if it version 11 is the current one that's out there being supported, which it is right. 12 is early still, but version 11, that means two prior versions still get security updates. You don't get featured. Dates, you don't get the new stuff, but you get security updates. So Android 11, the current one that means 10 and nine get security updates. So you don't, you're not being forced to do an upgrade. Most people don't upgrade their phones from an older major release to a newer major release. In other words, they don't try and go from Android eight to Android 11. Because in fact, most of the time, the hardware manufacturer doesn't support it. That's why there's over a billion Android devices out there right now that cannot get security updates. So have a look at your phone and your vendors. See what you're running. You probably want to do an update because most phones cannot get any support on the, in the apple side. Things are a lot different with Apple iOS, which is the operating system used on the iPhone and the I pad apple has always forced you to move to the next major version. No, they only force you to do that. If they support the hardware. And I've got to say kudos to them, they're still supporting the iPhone six S which came out quite a while. The iPhone success is something that my wife has been using and that I had as well. In fact, she got my old iPhone success, but that's a six-year-old. Phone came out in September of 2015. So it is still getting security updates, and we'll probably continue to get them. Not only is it getting security update this six-year-old iPhone success is getting the latest and our iOS operating system. It's getting iOS 15. Isn't that just amazing? Yeah, exactly. And so not just security updates, like you might get from some of the other vendors out there, Android vendors. So the apple keeps their arms around you for quite a while. Here's, what's changed now with Apple and iOS, the, for the first time ever in the iOS world, Apple is not forcing you to upgrade. So you're not being forced to upgrade to iOS 15. You can continue to run iOS 14. And that's how apples got around the security patches in the past, because what happens is you get the updates and installs them. Basically. There's no reason for you not to upgrade your phone. And so you do so apple never had to worry about releasing some of these fixes for really old versions of iOS. Although they have done that from time to time. In the Mac iOS side, Apple has done a couple of good things. The, where they always have supported basically three releases, what Google's doing with Android. So you now have a new feature. If you will, with iOS, here's a PSA for everyone. Public service announcement. You don't have to take the iOS 15 upgrade. Now I did. I put it on my iPhone and I seem to have some sort of a problem with messages where it's telling people that my phone has notifications turned off, which it does not. So I haven't figured that one out yet. I'll have to look into that a little bit more, but. This is nice because that means you're not going to have to upgrade your iPhone to iOS 15. You'll still get security updates for iOS 14, something Apple's never done before. We'll see if they continue this. We will see if they match Google going back. Three releases in Android. It just never been done before over on the iOS. So good news for them. Also course in the windows world and the Mac world, you really should upgrade the operating system as much as you can. Windows 11 though, man, windows 11. And I said this to my newsletter. I warned you guys is going to be a nightmare. For many people. You are not going to be able to do an automatic upgrade unless you have the newest of hardware, with the highest end of features, Craig peterson.com. One of the very big ransomware operations is back online. And now we have some inside information from one of the contractors working for this ransomware organization and oh yeah, there's an FBI tie, too.. This organization, ransomware gang, almost business, whatever you might want to describe them as is known as revolt. They have a few other names, but that's the really big one. And they are basically the 800 pound gorilla in the ransom. Business, you might be using cloud services right now. Maybe you use Microsoft's email service. Their Microsoft 360, I think, is what they call it now and use it for email and various other things pretty handy. It's mostly in the cloud. Computers you own or operate or have to maintain. I think that makes some sense too, but here's the bottom line it's software as a service right now, salesforce.com software as a service, Oracle has their accounting stuff. QuickBooks online, all software as a service. It isn't just those legitimate businesses that I just mentioned. That are using the cloud that are providing software as a service where you're paying monthly or however frequently. And you're getting this software as a service. That's what that means. Typically it means it's in the cloud and you don't have any real control over it. That's what this ransomware gang has been doing. This gang known as rebill. They all appear to be in. And there's some interesting stuff. That's come out. A transcript was released of an interview with one of their contractors. Now the original interview was in Russian. So I read through a translation of the Russian. I have no idea how good it is, but it is being quoted by a bank. Insider magazine that you might be familiar with bank info, security. That's one of the places that I follow. And there's a few interesting things that he talked about that I want to get into, but these are the people who have been behind things like the colonial pipeline attack and some of the other very large attacks, the way they work, their business model is. You can license their software, their ransomware software, and you go after a business or a government agency, whatever it might be, you get that ransomware software inside. And the reveal gang will take a percentage of the money that you have in rent. Now, how is that for a, an interesting business model, right? Taking something that the rest of the world has been using, and then take that model and put it into the legal side of the world. For three weeks, during this whole reveal ransomware attack, this summer turns out that the FBI secretly withheld the key that could have been used to decrypt. And computers that reveal had infected with ransomware and looks like kids up to maybe 1500 networks. Now those are networks, not just computers. That includes networks run by hospitals, schools, and businesses, including critical infrastructure businesses. The way the FBI got their hands on this decryption game. Is by penetrating reveal gangs servers. So they got into it. They were able to grab the keys and then the FBI waited before. Did anything with it. See, what they were trying to do is catch the people behind reveal. And so they didn't want to release information, get information out there to the press that might tip off those bad guys over there in Russia. And then shut down their operations. But as you might know, because I mentioned it here before the reveal gang went offline on July 13th, before the FBI could really track them down. And then the FBI didn't release the key until July 21st. And then I think it was Malwarebytes released a decryption tool. So if you had been hacked by the gang, you could. Now, remember it isn't reveal itself. That's doing most of them. Ransomware hacking if you will or a placement it's small guys. And that's why some people, including this contractor that apparently worked for the reveal gang itself says, people think that it's the Russian government, that it's Putin, that's doing this. He said, in fact, it's not it's small guys. And people like me are getting four or five hours a night. Because we're working so hard trying to make a whole of this work, come up with the new software approaches. We have to provide code tech support unquote to our affiliates, as well as tech support to the people who have had their computers and their data ransomed. So it a real interesting mix. Absolutely. Interesting mix. Now Christopher Ray here a couple of weeks ago, he's the FBI director told Congress that cool. We make these decisions as a group, not unilaterally. To the FBI and working with other government agencies, these are complex decisions designed to create maximum impact. And that takes time and going against adversaries, where we have to marshal resources, not just around the. But all over the world. So this Russian based gang first appeared in 2019, they've been around, they've been exporting large amounts of money from businesses for a very long time. One of the interest he'd things I think about all of this is that this reveal gang has their software as a service, and they provide it to quote affiliates, quote that, go ahead and then install the software, get you to install it on your computers in order to ransom you a double whammy ransom you, but there's now reports out there that there's a secret back door in the ransomwares code that allow. Rebill to go around their affiliates and steal the proceeds. How's that for hilarious, you've got a bad guy who goes in and gets the software from revolt, pays them a commission, and then reveal apparently has been jumping in on these customer support chats. In other words, you just got nailed and because you got nailed with ransomware, you have to go to. Chat room. And so you go in there and you're getting customer support on how to buy Bitcoin and how to transfer to their wallet. And apparently revival is getting right in the middle and is extorting money from these people directly instead of having the affiliates do it pretty amazing. So here's this part of this interview? It was aired on the Russian news outlet, London. And was trans translated by yeah. Flashpoint. Here are the guys that got the full transcript of the interview. He says in the normal world, I was called a contractor, doing some tasks for many ransomware collectives that journalists considered to be famous. Money is stolen or extorted with my hands, but I'm not ashamed of it. I do. And again, this goes into the thinking of many of these bad guys of Americans are all rich and they don't deserve what they have. He said, let's put it this way. This is a very time consuming job. And if you've earned enough, then you can quit the game. But chronic fatigue, burnout, deadline. All of these words from the life of ordinary office workers are also relevant for malware developers. So there you go. You should feel sorry for these malware developers who are developing software to steal millions from you and. Down our critical infrastructure. Hey, join me online. Craig peterson.com. And if you subscribe to my weekly newsletter right there on the site, I'll send you a few of my special reports. The most popular ones will come to you right there in your email box. Craig peterson.com/subscribe. We all pretty much have some form of insurance. And we're going to talk right now about the types of cyber insurance you may have. Now this might be through your homeowners policy or perhaps a rider on a business policy.  Many of our homeowners policies have started coming with cyber insurance. So we're going to talk about that. What is it? Businesses as well are also using cyber insurance and I'm sure you've heard of insurance basically called LifeLock and what that's all about. So let's kind of start. When we have a breach in a business, usually what happens is information about our customers is stolen. Look at some of the biggest breaches in history where we. Hundreds of millions of our personal records stolen Equifax breach is an example of a huge breach where we had all kinds of personal information that was stolen by the bad guys. Now, some of this information gets stale pretty quickly, but of course, other parts of it like our address, our social security number, they are probably not going to change for years. If for. No, of course our social security number will never change the social security administration. Just doesn't reissue them for very many reasons at all. And they do not reissue a social security number was stolen online because. Just about everybody's has, so what does a company like LifeLock do? They keep an eye on your credit report for you. And they're looking at what's going on new accounts that are open. They look at various other things, just related to that. And they, at that point say, wait a minute, something weird is happening. Now my credit cards, for instance, I have a credit card that if let's say I buy two of the same thing, one after the other and the, both the same price that credit card company pops a message right up on my phone saying, Hey, did you just buy two? Of these $15 things from and I can say yes or no, if I'm out on the road and I am purchasing gas, the credit card can pop up on my phone and it does and say, Hey, will you just trying to buy gas at this gas station? Because what'll happen as you use the credit card at the pump. And the pump says it was denied and then up at pops and yeah. Okay. No, that was me. And they said, okay, we'll try the transaction. Okay. And we'll approve it next time. And that's all automated. And that has nothing to do with LifeLock. LifeLock is there to more or less detect that something happened and if something happened and it was a bad guy and basically your identity was stolen. So they might be trying to buy a Ferrari in your name or maybe a 10 year old, four Ford focus, whatever it might be. And. They will help you try and clean it. That's what they do. So that's why it's cheap. And I don't know that it's terribly useful to you if you're really concerned. Go ahead and do that, but do keep an eye on your credit report. I do as well. My bank has free credit reporting for me, my credit card. Same thing. Free credit reporting that lets me know everything that's going on. So that's an easy way to tell WhatsApp. And there are different types of cyber insurance beyond this sort of thing, beyond the LifeLocks of the world. And many of us just get our cyber insurance through our homeowner's policy. It's a little rider. And businesses can buy cyber insurance as well. We have cyber insurance, that's underwritten by Lloyd's of London and we provide a $500,000 or million-dollar policy to our clients. As well, because that's what we do is cyber security, right? So the idea is if one of our clients gets hit, we have some insurance to back us up, but of course we go a lot further. It's almost like the LifeLock where if you do get hit by ransomware or something else, we will help you get back in business. We'll help restore your data. We'll help you with providing you. The information you need in order to do press releases, which agencies you need to contact, which of your customers you need to contact. And we've got scripts for all of that. So you can send it all out and just take care of it. So the idea is you don't want ransomware. So you hire us. We are extremely likely to keep ransomware out of your systems. And on top of that, if you are hit with ransomware, we restore everything. LifeLock does not do that. Obviously they all, I'll only do stuff after the fact and the cyber insurance you buy from an insurance agency is much the same, and there's a huge caveat with these policies that we're buying for our businesses and for our homes. And that is. They have a checklist at the insurance companies. Did you do this and this? And if you did, then they might payout if you did not, they may not payout. In fact, pay outs on cyber insurance policies are not known because. Bottom line. They really don't payout. Okay. I'm looking at some numbers right now and about paying ransoms and everything else. You may or may not. You got to have a look at it. Many of these policies are never paid out by the cyber insurance covers. They usually just regular insurance companies, but it's a special rider. And what they do is they say, Hey, listen, you did not follow the rules, so we're not going to payout. And there are many cases. If you go online and do a search, just use duck, go and say cyber insurance, payout. Lawsuits I'm doing that right now is. And it'll come up and show. Oh, okay. Does it cover lawsuits? Why are liability claims so costly? Yeah, exactly. A 2% payouts is talking about here. I'm invoicing, the most common cyber insurance claim denial. Yeah, it goes on and on. There are a lot is an act of war clause could nix cyber insurance payouts. That's another big one that they've tried to use. So the cyber insurance company will say, Hey, that was China attacking you. Therefore it was an act of. And you can bet if there is a big hack, they will use that. Think of what happens with the hurricanes coming onshore. How much do they push back on payouts? Especially with the real big one, it would bankrupt them. So we gotta be very careful. There are some different types of  cyber insurance. Policies do which have different types of coverages. You've got the first party lost loss, I should say. So that's you to covering you and your loss, your first-party expenses, third party liability. Each one of those has specific parameters. So sub-limit retention and others. First-party losses are usually including the loss of revenue due to business interruption. First party expenses would include all of the services and resources that you needed to use to recover from attack like forensic or system rebuilding services. These third-party liabilities. May cover expenses and legal fees related to potential damage caused by the incident to third parties like partners, customers, or employees whose sensitive information may have been compromised. So read them carefully. Be very careful. There are next-generation, cyber insurance policies are going even further and make these types of services. Prior to any incident to reduce exposures and prevent incidents in the first place. Now we don't provide insurance. We are not an insurance company, but that's basically what we're trying to do here. Not become an insurance company, but to make sure. The businesses have the right services so that the likelihood of anything happening or is extremely low. And then following up after the fact it's different obviously than insurers in and insurance, the guardians, Jessica Crispin had a great article about a couple of weeks ago that I've been hanging on. And it's talking about this tattle where that's been incorporated into the computers we're using at home. Now we're specifically talking about employers that are putting this. The software on computers, they belong to the companies. A lot of businesses are worried. If workers are at home or where we can't see them, how do we know that they're actually working, not watching Netflix or something else on. They have, of course, come up with software that can reassure your boss. It does things like take snapshots of what you're doing. Record your keystrokes grabs photos from. Picture from your camera. There's a new program called sneak, which makes your webcam take a photo of you about once a minute and makes available to the supervisor to prove you're not away from your desk. There's no warning in advance. It just takes that photograph catches your doom. Pretty much anything can be absolutely anything. Then, it's the type of thing you'd expect the national security agency to do. So there are some good reasons for this lack of trust because sometimes employees have not been doi

The Gun Room
The Gun Room: Episode 28

The Gun Room

Play Episode Listen Later Oct 1, 2021 10:52


One of the most common things folks do when inspecting a potential shotgun purchase is shoulder the gun. It seems an interesting thing that ‘gun mount' is such a crucial part of the gun purchase, but so many folks simply shoulder a gun and assign a non-quantitative value to it: “oh this shoulders nice” or “feels right”. So many of those folks realize that a gun must ‘fit' but very few actually know or understand their own dimensions and how they translate to a gunstock. The same holds true for backyard clays shooting when you try a new-to-you shotgun that seems to break everything you point it at. In those situations gun fit and by association stock dimensions are the heart of the matter. Im Joel Penkala and this is 10 Minutes on Gun Fit. The most basic of gunstock dimensions and one that is actually addressed by some gun companies is the Length of Pull or LOP(as it appears on many online gun listings). The length of pull is the distance from the center of the trigger, rearward to the center of the butt plate or pad. This is also expounded upon at times with three different LOP measures: LOP to the heel, center, and toe. The comb is the top of the stock, where your cheek rests which terminates at the heel, while the toe is the bottom portion of the end of the stock. It is typically tapered and comes to a point. LOP to the center determines the primary contact between shooter and buttstock, but the heel and toe measures give an idea of the stock's pitch.  Pitch is the angle between a line defined by the rib (and/or comb) and the line defined by the butt(given that the butt is not curved). If you imagine laying the long leg of a square on the rib, the 90-degree angle defined by the square would be pitch. This angle can obviously be greater or less than 90 depending on the shooter's preference or the gun's intended use. Typically pitch is adjusted for guns that will shoot driven birds; all overhead shooting where the gun is pointed primarily up, vs rough shooting where shots are out in front of the shooter. Pitch can also be adjusted so that the toe of the shotgun does not dig into a shooter's chest. Shooters with fuller chest dimensions will oft times complain about this digging of the toe.   LOP is important because it determines the geometry of the shooter's arms. A short LOP will ‘chicken-wing' your arms; the angle at your elbows being very acute. A long LOP will open up the angle of your arms and in extreme cases even straighten out the arms. The goal here is to adjust the LOP to create a proper geometry between the shooter and the shotgun or rifle in question. There is of course a sweet spot where the shooter's arms are comfortable and provide the most stable and controlled connection between the gun and body. LOP is addressed by companies like Rizzini and others who typically include a basic thin wooden or black butt plate with their guns. The idea behind this is that they leave as much stock wood as possible by only adding a thin pad. Then the shooter can add a 1” or larger recoil pad to increase LOP or cut the stock down and add a pad to decrease LOP. Other instances like youth guns for example typically have shorter LOP to fit youth shooters. Two other primary stock dimensions are drop and cast. Drop addresses the relation of the comb to the rib up and down, where cast determines the relation of the comb and rib left to right. Drop on a stock comes in two (sometimes three) measures, and they are usually listed in order from the nose or most forward part of the comb to the heel. The measurement is actually the distance from the line defined by the rib (and parallel to the bores), to the spot on the comb being measured. One can get rough dimensions of drop by placing a shotgun upside down on its barrels(and thus the rib) and taking the measure from the comb to the tabletop. These measures are complicated by Monte Carlo stocks with elevated cheek pieces, which sometimes have drop measures for each end of the raised cheek or Monte Carlo piece, as this is where the shooter's cheek contacts the stock and in effect is the important factor in drop. Proper drop will position the shooter's eye in line with the rib. Too much drop and your eye will be below the barrels and when your face is properly against the stock, you will be looking at the breech of the gun. Too little drop and you will be looking down at the rib, seeing the entire length of it while shooting.  Too much drop requires the shooter to lift their cheek off the stock to appropriately sight down the rib. Though this can be done, it is no longer in vogue. The old style of head-held high shooting has gone by the wayside as folks have moved into more modern styles dictated by sporting clays and other shotgun sports, though this old shooting is immortalized by our favorite shooting artists in many of their classic pieces. Too little drop is very hard to adjust for because you can't ever get your eye properly in line with the rib, so the gun will always shoot high.  Cast in a stock is dictated by the shooter's dominant hand/shooting side, and by their physical appearance. Guns can be cast on or cast off. I always remember it (I am a right-handed shooter) that when I mount a gun, a stock with cast ON will be ‘on me' or closer to me. A gun with cast off will be ‘off me' or away from me. When one sights down the rib of a gun from the muzzle (a double-checked unloaded and safe gun) standard stocks will generally be neutral cast; the comb aligns with the rib. Guns that have cast will either have the comb of the stock to the left or right. This is in effect a slight bend in the stock that generally happens in the wrist. This bend could be just that, an actual bend where the stock was steamed and put into a fixture to impart the bend, or shaped into place when the stock was made by a stockmaker. This cast is typically given as a single measure taken from the comb, but again there can be measures for the cast at the heel and toe. A cast difference between heel and toe can dictate a twist in the stock. Again, for fuller figured folks, a gun with the toe cast further off than the heel will help eliminate uncomfortable toe digging into the chest. Typically a gun with cast off would allow better alignment with the right/dominant eye and the rib. When you lay your cheek on the comb, your eye typically is offset to the line of the comb. For a right-handed shooter the eye typically lands a bit to the left of the comb, and a bend ‘off' or away will allow the eye to come back to the center of the rib. This bend keeps the shooter from having to roll their head over the stock to get proper eye alignment. Cast on is generally the proper dimension for a lefty. Though all of these are generally speaking. Righty shooters with fuller faces need more cast and those that are skinnier, need less and so on.  There are additional dimensions and features of gunstocks if one wants to dive into the minutia of detail. For most though, an understanding of these basics should help the next time you are considering a gun purchase. And of course, like patterning your shotgun, the effectiveness of shooting skeet chokes, or the cadre of other things I harp on, nothing can replace a gun fit done by a professional. Even if you don't plan on having a stock made for you or having one bent to your specification, simply knowing your dimensions may help tip the scales the next time you are faced with the age-old question of whether to buy or not to buy that old shotgun.

Strategy Simplified
S5E5: Mock Case Interview: Unstructured Case

Strategy Simplified

Play Episode Listen Later Oct 1, 2021 48:46


Last week, we gave an overview of unstructured case interviews. Typically seen in a final round and given by a Principal or Partner, these interviews are often an unexpected curveball for candidates. Make sure you're prepared for these types of interviews by listening to this live demonstration of an unstructured case. In real-time, you'll see how one is run and gain valuable insights for your preparation.  Additional LinksBlack Belt, advanced case prep program - only a few spots left in Oct. cohort: JOIN NOWWork with an MBB coach to simulate an unstructured case interview: CLICK HERE500+ case studies to practice with: GET THE CASE LIBRARYSponsor an episode or advertise: Management Consulted Media Kit

The Solarpreneur
How to Sell With Women Without Driving Them Nuts

The Solarpreneur

Play Episode Listen Later Sep 28, 2021 21:02


Tune in now and don't forget to sign up for www.solciety.co!Speaker 1 (00:03):Welcome to the Solarpreneur podcast, where we teach you to take your solar business to the next level. My name is Taylor Armstrong and I went from $50 in my bank account and struggling for groceries to closing 150 deals in a year and cracking the code on why sales reps fail. I teach you to avoid the mistakes I made and bringing the top solar dogs, the industry to let you in on the secrets of generating more leads, falling up like a pro and closing more deals. What is a Solarpreneur you might ask a Solarpreneur is a new breed of solar pro that is willing to do whatever it takes to achieve mastery and you are about to become one.Speaker 2 (00:42):What's going on Solarpreneurs Taylor Armstrong back with another week, another episode, and I hope you are crushing the fall. We are getting into the fall weather, perfect time to knock. And I just got back from an event myself. Um, it was called driven. So I will preface this episode. We got back at, uh, 4:00 AM last night. Um, it was up in LA the event and I'm down in San Diego. So I'm recording this because I'm not gonna miss out on some fire content that we need to drop this week, but I am a little out of it. So if things don't make sense, they, I apologize in advance, but we're going to have a great episode. So let's get right into it. My name's Taylor Armstrong, and I'm here to help you take your solar sales game to another level, by closing more deals, journey, more referrals, and hopefully having a much better time in the solar industry.Speaker 2 (01:39):Hope you're doing well this week, I wanted to do something a little bit different, and that is we're going to focus on our friends, our dear friends, the ladies in the solar industry. I've never done this before. And the reason I'm kind of calling this, the women focus week is because we have, um, one of my friends Suli Zinc she's coming on the next episode, we had an awesome interview with her. She had some just, I thought amazing advice on how to basically better treat women in the solar industry, how to make them feel more included in, you know, in your sales teams, in your organizations, and then just how to help them really, um, sell to their potential. And I mean, it complied to guys too. So if you're a guy listening to this, don't miss out on these episodes because don't get me wrong slowly.Speaker 2 (02:35):She's one of the top sellers in the solar industry. So she knows her stuff, but they're the reason I think this applies a lot to, you know, the guys in the industry is because let's be honest, it is a male dominated industry we're working in, but almost every sales team they're going to have probably a few ladies on the team do. So how can you get them to maximize their potential? And how can you make them feel included in the team? How can you treat them with, um, you know, respect and make sure they're getting their needs taken care of? Because as a guy, I didn't know, I didn't really know how to do this. I'm still trying to figure out how to do this case. We get girls on the team. And I think at times me leading our teams out here in San Diego, I don't think I've done a good enough job at helping the ladies, you know, feel more included in maximize their potential.Speaker 2 (03:30):So I'm going to talk about a few of my mistakes on this episode, and then I'm going to give just a little preview of, um, you know, what I've learned from mistakes I've made and then things coming up on the next episode, because I think next episode with soil, you're going to hear just a, you know, the raw stuff, the things that are helping her and things that she's, uh, has seen that haven't gone the best on teams. She's been a part of. So with that being said, let's jump into it. Um, my really first experience selling with ladies in this industry, I guess a couple of stories to start all this off is I started out on pest control. As many have heard on the podcast. This was back in 20. Uh, what was it? 2012. Yeah, summer of 2012, Dallas, Texas. And I remember starting out in the summer, um, one girl that started out with me.Speaker 2 (04:21):She was also a rookie sales rep. Her name was Alyssa and me and her, me and Alyssa. We started out about the same, but I remember after a month her sales just started exploding. She was getting like four or five deals in a day, which pest control. That's pretty decent day. I was lucky to get one or two. Right. And again, I wasn't that good at pest control, but I'm like, what is this girl doing? And then I remember I started to kind of like envy her. I'm like girls have it so much easier. I mean, she's, good-looking people are listening to her, she's flirting with the guys on the doors. Like how can I compete with that? So it became kind of a limiting belief in my head. I'm like, I'm never going to catch up to this girl in girls. I think having an advantage that way.Speaker 2 (05:07):So if you're a lady list in the podcast, I mean, you want to maximize the advantage. Not that you need to be all flirty and whatnot on the doors or in your sales, but the advantage they have is people open up more generally, I would say to the ladies on the doors, right? Because they come across less intimidating. They come across, um, you know, especially if you're a guy answering the door, then you're probably going to be nicer to that lady on the other side of the door, you're probably going to hear her out a little bit more. That's the unique advantage. I think they have. That was my first experience selling with a girl. And she crushed me and sells as a lot of girls. You know, there's a lot of superstar girls sown out there today, but then what happened, I started to have, I would say kind of a negative, um, per special in that that's where I've gone a little bit wrong.Speaker 2 (06:00):That's where I've, um, not been as good of a leader, especially with women as I think I could have been had, I did a two-year mission as many. You probably also know I went to Columbia, south America. And in my mission, we were, um, they assigned district leaders, which I was a district leader. That's basically imagined like a manager for a year, a little, uh, branch of missionaries or a little like group of missionaries. Typically you're in charge of, I don't know, maybe six other missionaries. So a few times in my mission, I had to, um, I had to, you know, basically help out these sister missionaries. They were, that's why they call them, call them brother, sister in the church. Um, but I had helped these two ladies out that were in our little group or organization there in Colombia. And I just remember it was good working with them, but I also got kind of like a negative thing in my head working with them.Speaker 2 (07:01):Um, I had to deal with problems. We would meet with the leaders in the church. And unfortunately, um, one of these sister missionaries, she was causing some problems. If any of you have been to like the Latin American culture, you know that they love it when you eat their food, if you don't eat their food that they give you, it's almost like a slap in the face. So we had one sister missionary that did not want to eat peoples figured she would reject it all the time. And boy, these people in the church there, um, they were super mad about it. So I went to church every Sunday and people in the church would come up and Hey, this girl, she didn't eat our, uh, Juni, our chicken and rice, or we seen Spanish I'm in Colombia. So I would deal with that. And I'm like, oh my gosh, why can't these girls just, you know, do what they're supposed to do.Speaker 2 (07:53):So I tried to help them out. And, but I think I could've done a lot better at the time. That's where the first sort of negative started is. I don't know. I just, like, I just thought, oh man, I'm better. I'm better off just like working with guys. I don't want to do what the drama, I don't want to, um, you know, deal with that. And I'm not saying all girls are like that. Okay. But I didn't know how to really help this sister missionary out. I think I could've done a lot better. Maybe understanding her point of view, seeing where she's coming from, but I pretty much just like, man, you need to knock this off at the time. And then my second negative experience, that's the last one I promise. And then we'll get into some points when I'm talking about this is I had my sister-in-law.Speaker 2 (08:41):She came out and sold for the summer. This was back in 2017. When I was first getting into solar, I had my sister-in-law come out and it was just a terrible experience the whole summer for she was living with us in our apartment, which was fine, but I don't think she had one deal closed the entire summer. So this is where I kind of just like had even more of a negative I'm like, all right, I don't want to like deal with these girls. These girls sales are ups anymore. They're just, yeah, they're just too hard. I just kind of made up this story in my head that girls were going to be too hard. I was just better off dealing with guys. And I talk about this a little bit in the episode with SWE, but you know, basically my sister-in-law, she would, uh, not really meant for sells, so maybe she should have, you know, figured that out sooner than later, but she would just, you know, go on the curving cry and it just wasn't, it wasn't a good experience for, so that's the stories I told myself.Speaker 2 (09:47):So why am I saying all these things? Just because I, now I know that after seeing all these girls crush it in the industry, now I know the reasons you should have girls on your team. If you can help them really channel their potential and become successful. The girls I've been seen, uh, you know, have success since a few of these more negative experiences have been some of the best sells or ups I've seen. I've had a couple of my team. They've been superstars. Obviously we have people like Suli. Um, another one is solar Lily in the industry and they're just dominating if they can figure out how to channel this potential and push past the rejection. Cause really, I think that's the biggest thing that probably the ladies need to overcome. And slowly talks about this too. You'll hear more about it. If you can help them get over the, like the mental part of it, then girls just naturally I think, you know, the girls have like the talking part of it, the selling probably you down a lot more naturally than most guys in my opinion.Speaker 2 (10:59):So that's why now more than ever, if you can find these girls, if you can help them channel their potential, they're going to be number one, super loyal. Cause that's what the ladies in this industry do. They are super loyal. If you can treat them right and help them discover their potential, and then they're going to be superstars. If you can help them get past that mental peace and help them feel inclusive. Okay. So that's why you really need to learn to manage the girls on your team and make them feel good. And I've been, um, putting off, having a girl on the podcast for a while now. Um, that's why I'm so excited that we finally got solely on the show. Um, but the first sort of negative review I had on the show was this was about a year ago. She said, um, lots of good info, but I love for the hosts and guests to try to be more inclusive with their wording regarding sells reps.Speaker 2 (11:59):I am a woman sales are up. So when you discuss girlfriend or wife at home or the guys or the boys that doesn't apply to us, it makes us feel out of place in excluded. We are here and we are kicking butts, selling soil as well. Pre please recognize this. So green gorgeously, I apologize publicly on the podcast for not making you feel more inclusive. That's my bad. And that's one of my goals in the podcast is to try to help the ladies in this industry feel more inclusive. So hopefully I've done a better job at that. This was a year ago. And when I saw that, I'm like, man, I'm totally doing that. I'm just talking about the boys. I'm talking about the guys. I think I was kind of probably just dwell. I'm more on the negative that I don't want to like, you know, have girls on my team and I really want to help him anymore.Speaker 2 (12:48):So I apologize for that green gorgeously, whoever you are. And I hope you're still in the solar industry. I hope, hope you're doing well. Maybe that was silly. I don't think it was, but maybe that's silly. That wrote that was a four-star review. So thanks for not making it worse than that, but that's my first tip for you guys or whoever you are leading a team, even if you're just a rep on a sales team or if you're whatever independent, you're your own dealer, whatever girls you deal with, try to make them feel inclusive. If you're running meetings, if you are running incentives. So what can you do? How can you make these people feel more inclusive? Maybe that's if you're in a meeting, you're not saying, all right, boys, let's go let's you want to get them fired up. But think about the language you're using in my case right now, we only have, yeah, we, um, currently we actually don't even have any girls on the team.Speaker 2 (13:46):We had a few, they balanced. So that's one of the challenges we're trained to face right now is how can you get girls on the team? If you have, you know, 25, 30 guys, how can you get girls in their film comfortable? And like they're part of the team, if they're the only ones selling with you. So I think it starts with that. Try to figure out a way for them to feel included. What are you doing in your own Santos? What are you doing in your team activities? Do you think girls would feel included in that? So think about that. As you're trying to recruit girls on the team, as you're running these sales, meetings, whatever you're doing, how can you make them feel more included game that goes, you know, think about every person on your team. Obviously this can apply to guys too.Speaker 2 (14:30):Okay. So that's step number one. And then I've got two more tips. And then after that, we're going to leave it to Suli on the next episode, sorry. I know I've been a rambling about a few stories there, but the two other tips that was the first one to help them be included. And then number two, help just the girls feel part of a community, I guess, kind of dealing with being included too. So in our case, if you don't have many girls on the team, then make sure they're listening to like Soulis podcasts. There's a couple of good Facebook groups. There's some good Instagram pages. And I know my friends, solar, Lily, if you don't follow her, she's doing a like, um, I think it's on clubhouse where she has girls go on and just talk about kind of their challenges in the industry.Speaker 2 (15:18):Things like that. I think she invites guys too, but people like that, they're doing great things. So go follow solar, Lily, go follow, um, solely they have two pages on Instagram. I think they might be on Facebook too. And guys, um, I know guys can follow these pages too, so go follow them. Cause I'm actually learning more about how to, um, you know, manage the females too, by being part of these groups. So the first one is called woman United and solar solar. Really. She runs that page and she also has, I think, a clubhouse where they go and talk about it. Maybe a Facebook group too. She just got done with an event that she put on two and the other one is female knockers United, or maybe it's female knockers unite and that Soulis page. And she has great content on there. See, she features different, um, uh, lady like doorknockers from different industries.Speaker 2 (16:16):Do you? I know she has people in alarms pest control and they'll go on there. They'll show her share tips and um, just what's working for them. So whether you are a girl or a guy, I highly recommend you go follow these pages and it's going to help you become a better sales rep. And then also learn to just, you know, help. Like I said, help the girl help the girls on your team, unlock their potential. Okay. And then the last tip I have before we wrap it up here and this really deals with, you know, guys and girls, anyone really in sales or in the solar industry is just figure out your motivation. Hey, I was listening to a Ted talk, just kind of preparing for the podcast before, um, a lady that runs like a sales organization for women. And this was her big thing.Speaker 2 (17:08):Is girls more than anything that females they're not usually motivated by money. Okay. And I think this goes for both guys and girls, but she was saying, especially girls. So ladies, I guess you can tell me if that's true, but this is what the Ted talk lady said. It's usually not money that the ladies are motivated by. Even though, even if they say I want to make money a lot of times that's not it. So what is it, why do you want to make the money? And I've talked about this in previous episodes. Um, I think one of them is if you go back and listen to how to develop extreme confidence or to develop confidence in sales, I think it was probably like six months back. But I talk about this going seven layers, deep on your why. So, especially with your ladies, figure out why they want to make the money, why they want to do what they say their goal is.Speaker 2 (18:06):And then the lady in this Ted talk, I really, I thought it was cool. What she did a girl on her team. Um, once she told her she wanted to make the money, she kind of took her through this exercise though. Why do you want to make the money? And she figured out she wanted to take her kids to Disneyland. So what she had her do, she had her kids write her a note saying, mom, I know it's a tough day today. But remember we want to go to Disneyland. And her kids wrote her this note and then put on a picture. She put this on her desk. In this case, it was a like a phone sales job, but she put this on her desk. And then any time she didn't want to like make another call or she wanted to take a break, whatever.Speaker 2 (18:45):She looked at this note from her kids and her card, she was like, ah, all right, I want to take my kids to Disneyland. So for you that are knocking doors that are trying to get more appointments, consider that figuring out your why, make sure you have your motivation written out and for anyone leading a team or managing, make sure you help the ladies and anyone on your team do this. So hope that helped guys let me know what you think. And if you are working with a lot of women on your team, hit me up, let me know what's working for you. And let me know. Um, yeah, what you thought. So send this to anyone that's working with the women on the team and that I can't wait to see you on the next episode where we're going to get the one and only Suli and she's going to be dropping some fire.Speaker 2 (19:34):So we'll see you on the next one and go crush it this week. Hey, Solarpreneurs quick question. What if you could surround yourself with the industry's top performing sales pros, marketers, and CEOs, and learn from their experience and wisdom in less than 20 minutes a day. For the last three years, I've been placed in the fortunate position to interview dozens of elite level solar professionals and learn exactly what they do behind closed doors to build their solar careers to an all-star level. That's why I want to make a truly special announcement about the new learning community, exclusively for solar professionals to learn, compete, and win with top performers in the industry. And it's called the Solciety, this learning community with designed from the ground up to level the playing field to give solar pros access to proven members who want to give back to this community and help you or your team to be held accountable by the industry. Brightest minds four, are you ready for it? Less than $3 and 45 cents a day currently Solciety is open, launched, and ready to be enrolled. So go to Solciety.co To learn more and join the learning experience. Now this is exclusively for Solarpreneur listeners. So be sure to go to solciety.co And join. We'll see you on the inside.