Podcasts about ubiquitous

Share on
Share on Facebook
Share on Twitter
Share on Reddit
Copy link to clipboard

Property of being present everywhere

  • 274PODCASTS
  • 481EPISODES
  • 33mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Dec 30, 2021LATEST
ubiquitous

POPULARITY

20122013201420152016201720182019202020212022


Best podcasts about ubiquitous

Latest podcast episodes about ubiquitous

IT Visionaries
Saving Humanity from Passwords with Mickey Boodaei, the CEO of Transmit Security

IT Visionaries

Play Episode Listen Later Dec 30, 2021 43:16


Passwords are the worst things ever. Okay, maybe that's a bit hyperbolic, but they are pretty annoying. Here are the top hits of their most obnoxious qualities: One, they cause friction to get things done. Two, who can remember all their passwords? Three, it's easy for bad actors to steal them. Four, practically everything requires a password now, so there are just too many. Mickey Boodaei, the CEO of Transmit Security, also agrees that passwords are terrible, but he has a solution to get rid of them.Main TakeawaysThe Problems With Passwords: Passwords have become ubiquitous. Despite the good intention behind them to foster security, they remain cumbersome and ineffective. The layers added to passwords to make them more secure are insufficient. Two-factor authentication remains vulnerable to bad actors. Though biometric authentication is a helpful technology, many apps that attempt to harness it still have a password underneath the biometrics.Getting Rid of Passwords: Biometric data held on secure devices is part of the solution to move people beyond passwords. The data on a private device is very secure overall. Furthermore, it is possible to create trust between devices to provide access to applications, etc.Cryptographic Keys: Biometric data on a secure device can then be used for authentication through the creation of parallel cryptographic keys — a private key that stays with the device and a corresponding public key connected to an application. Using this technology, the private key always remains secure on the individual device. This makes it very difficult for bad actors to access any data of import.   IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform 

Ubiquitous Growth
Ubiquitous Growth 133 "Ticking"

Ubiquitous Growth

Play Episode Listen Later Dec 17, 2021 9:34


One hundred and thirty third Episode released on 12/17/2021. Happy Friday UG Fam! Hope everyone is having a good December and enjoying the holidays season. I myself am not focused on any of that. I have a lot of massive change coming and things I've been trying to get in order to make it all happen. I've hit that wall of anxiety and procrastination with a lot of it, but I am figuring out how to sort through it all in my head. On this episode I touch on that, but also on just exercising demons that I have once again trying to get back into the flow so I can make everything happen that I have planned. Special thanks to those who helped me in that process and been positive regardless if every activity was healthy or not. I definitely am learning to seek more balance in my life as I've been on the extreme ends and seen what that does. Actually, being a part of NFT communities has taught me this even more, to honor balance. I also noticed that due to me announcing massive change in my life that others around me who may have different circumstances start to question themselves. This was evident and I picked up on it a lot. It gave me good perspective and made me realize that I really am deciding to make change at a time when I truly have nothing to lose. I actually in a greater position than most and it made me be more grateful to see and know that. Last, I hit on how experiencing toxicity may end up changing on how you want to act in the world, but deep down it doesn't really change who you are. The mission and vision is still the same, but I am deciding to move differently and take on more risk in my life. I truly think it's what I need and while it may hurt those around me. They don't see the vision or know the pain that I carry. It's really about to be a thrilling time as I set out on my next endeavors. I haven't fully decided on how much energy I will have left to put into the pod, but I will probably be off and on it just as I always have. Time is ticking. Thank y'all for the continued support. Still thrilled to be bringing you more content and I appreciate any and all feedback. Continuing to use my voice to spread growth to the world in my own way. Today's episode touches on the following topics: 1. The climb back isn't always a smooth process 2. When planning massive change, understand that almost nothing is going to go according to plan 3. While toxic things may change how you want to act, fundamentally you are still the same #BlackLivesMatter #StopAsianHate --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/michael-manns/support

Chit Chat Across the Pond Lite
CCATP #709 – Adam Engst on the Manifesto for Ubiquitous Linking

Chit Chat Across the Pond Lite

Play Episode Listen Later Dec 15, 2021 61:41


Adam Engst, publisher of the long-running Internet-based email newsletter, TidBITS joins us on Chit Chat Across the Pond to talk about an article he wrote for TidBITS about the Manifesto for Ubiquitous Linking. Adam starts our conversation by taking us into the WABAC machine to learn about Project Xanadu which was the vision of Ted Nelson to link all information bidirectionally. Working off that foundational vision he explains that a group of developers and tech visionaries have created the Manifesto for Ubiquitous Linking as a way to encourage the concept of linking as much information as we can within and between apps and operating systems. At the link to the Manifesto, you can learn more about the originators, the vision, and the technical requirements for making this work. Adam even gives us a call to action at the end if we'd like to see this future realized. I told Adam at the end of the conversation that I knew it was a great talk because my cheeks hurt from smiling talking to him.

Chit Chat Across the Pond
CCATP #709 – Adam Engst on the Manifesto for Ubiquitous Linking

Chit Chat Across the Pond

Play Episode Listen Later Dec 15, 2021 61:41


Adam Engst, publisher of the long-running Internet-based email newsletter, TidBITS joins us on Chit Chat Across the Pond to talk about an article he wrote for TidBITS about the Manifesto for Ubiquitous Linking. Adam starts our conversation by taking us into the WABAC machine to learn about Project Xanadu which was the vision of Ted Nelson to link all information bidirectionally. Working off that foundational vision he explains that a group of developers and tech visionaries have created the Manifesto for Ubiquitous Linking as a way to encourage the concept of linking as much information as we can within and between apps and operating systems. At the link to the Manifesto, you can learn more about the originators, the vision, and the technical requirements for making this work. Adam even gives us a call to action at the end if we'd like to see this future realized. I told Adam at the end of the conversation that I knew it was a great talk because my cheeks hurt from smiling talking to him.

ISACA Podcast
Information Security Programs Need to be Ubiquitous, Proactive, and Vigilant

ISACA Podcast

Play Episode Listen Later Dec 7, 2021 26:33


This ISACA TV interview is a discussing about information security concerns (and challenges), evolution, and the future. Topics covered include mobile computing devices, the Internet of Things (IoT), artificial intelligence (AI), cyber threat intelligence (CTI), software tools, and malware. Threats, risk, safeguards, and countermeasures will be reviewed along with some new ideas and approaches. Tune in as ISACA's Information Security Professional Practices Lead, Jon Brandt chat with Larry Wlosinski, Senior Consultant at Coalfire Federal about his recently release article, Cyberthreat intelligence as a Proactive Extension to Incident Response.

Energy Cast
129 | See-through Solar | Ubiquitous Energy

Energy Cast

Play Episode Listen Later Dec 6, 2021 31:40


We discuss how Ubiquitous Energy balances the need for efficiency and a solar-powered window technology with VP-Strategy Veeral Hardev. For pictures and more info, visit http://www.energy-cast.com/129-ubiquitous.html

Ubiquitous Growth
Ubiquitous Growth 132 "Mental Health"

Ubiquitous Growth

Play Episode Listen Later Dec 4, 2021 23:04


One hundred and thirty second Episode released on 12/04/2021. Happy Saturday UG Fam! I'm back. Again. This time my absence was literally out of my control. I was silenced due to things that I touch on in the episode. This past month-month and a half was the darkest time period and most stressed out I've been in my adult life. The storms have finally started to clear and my path is looking clear ahead of me. I see where I must go and I've already set things in motion which you guys will be able to see over the course of the next month or so. It's time to become what I ought to be. Get my soul in alignment. Massive change is coming for my life and this episode discusses what triggered the expedited change. It's a long episode and goes over the mental health issues I had. I literally felt like I went crazy and was dangerous out there. I barely slept. I lost 15 pounds in a month. I was miserable. It's good to be back. It's also good to have calculated risks up my sleeve and see things are falling into place. I HAD TO GO THROUGH ALL THIS SHIT TO MAKE IT TO THIS POINT. Thank you to all those I leaned on during this time frame, those who listened, those who put up with my shit. I appreciate every last one of you. I also apologize to the ones I drug into all of this whether intentionally or inadvertently. All the women who I pulled in due to the confusion or whatever with Butterfly. On the career note, I will say, the people who tested me, tested the wrong man. On the personal note, I will also say, the person who hurt me the most was the person I had the most love for so be careful out there. Your biggest fear shouldn't be losing someone, it should be losing yourself. Everything will be in the book I am writing in way more detail someday. There's a whole lot more to my story. I'm using that pain to become the greatest. I want to reiterate I was cleared of any and all allegations of misconduct against me and a decline letter from the district attorney should arrive next week. Thank y'all for the continued support. Still thrilled to be bringing you more content and I appreciate any and all feedback. Continuing to use my voice to spread growth to the world in my own way. Today's episode touches on the following topics: 1. Going through things and absolutely losing your mind 2. Career and personal disclosures 3. Using that pain to become the greatest #BlackLivesMatter #StopAsianHate --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/michael-manns/support

The Jake Feinberg Show
The Eric Krasno Interview Set II

The Jake Feinberg Show

Play Episode Listen Later Dec 1, 2021 82:06


Ubiquitous singer/songwriter talks about his new album, how to disseminate to the masses and his upcoming 2022 tour with Son Little.

Google Cloud Reader
Trust Google Cloud more with ubiquitous data encryption

Google Cloud Reader

Play Episode Listen Later Nov 30, 2021 5:29


Original blog postMore episodes at feeds.transistor.fm/google-cloud-readerPlease see our documentation for more information and reach out via this form to get started or with comments or questionsMore articles at cloud.google.com/blog

The Gary Null Show
The Gary Null Show - 11.19.21

The Gary Null Show

Play Episode Listen Later Nov 19, 2021 56:12


Study: Sustainable eating is cheaper and healthier Oxford University, November 11, 2021 Oxford University research has today revealed that, in countries such as the US, the UK, Australia and across Western Europe, adopting a vegan, vegetarian, or flexitarian diet could slash your food bill by up to one-third. The study, which compared the cost of seven sustainable diets to the current typical diet in 150 countries, using food prices from the World Bank's International Comparison Program, was published in The Lancet Planetary Health. (next) Meta-analysis concludes resveratrol beneficially modulates glycemic control in diabetics Zagazig University and Suez Canal University (Egypt), October 29 2021.  Findings from a meta-analysis of clinical trials published in Medicina Clinica (Barcelona) revealed an association between supplementing with resveratrol and improvements in glycemic control. “This systematic review and meta-analysis is the first to consider resveratrol's efficacy on glycemic and cardiometabolic parameters in patients with Type 2 diabetes mellitus (T2DM).” (next) Exercise linked to better mental health Kaiser Permanente Research, November 11, 2021 Kaiser Permanente research published in Preventive Medicine showed people who exercised more during the initial lockdown period of the COVID-19 pandemic experienced less anxiety and depression than those who didn't exercise. It also showed that people who spent more time outdoors typically experienced lower levels of anxiety and depression than those who stayed inside. (next) Bedtime linked with heart health University of Exeter (UK), November 9, 2021 Going to sleep between 10:00 and 11:00 pm is associated with a lower risk of developing heart disease compared to earlier or later bedtimes, according to a study published today in European Heart Journal—Digital Health, a journal of the European Society of Cardiology (ESC). "While we cannot conclude causation from our study, the results suggest that early or late bedtimes may be more likely to disrupt the body clock, with adverse consequences for cardiovascular health." (NEXT) Garlic compounds may boost cardio health indirectly via gut microbiota National Taiwan University, November 6 2021 Allicin from garlic may prevent the metabolism of unabsorbed L-carnitine or choline into TMAO, a compound linked to an increased risk of cardiovascular diseases, says a new study. TMAO – or trimethylamine N-oxide – has been known to be generated from dietary carnitine through metabolism of gut microbiota, and was recently reported to be an “important gut microbiota-dependent metabolite to cause cardiovascular diseases.”  New data indicated that carnitine-fed lab mice showed a “remarkable increase in plasma TMAO levels”, compared with lab mice fed a control (no carnitine). However, when allicin supplements were provided with the carnitine diet, TMAO levels were significantly reduced.   (NEXT) Drug used to prevent miscarriage increases risk of cancer in offspring University of Texas Health Science Center, November 9, 2021 Exposure in utero to a drug used to prevent miscarriage can lead to an increased risk of developing cancer, according to researchers at The University of Texas Health Science Center at Houston  The drug, 17α-hydroxyprogesterone caproate (17-OHPC), is a synthetic progestogen that was frequently used by women in the 1950s and 1960s, and is still prescribed to women today to help prevent preterm birth.  (OTHER NEWS NEXT) 2,433 Dead Babies in VAERS as Another Study Shows mRNA Shots Not Safe for Pregnant Women by Brian Shilhavy Editor, Health Impact News, November 7, 2021 There have now been 2,433 fetal deaths recorded in VAERS (Vaccine Adverse Event Reporting System) from pregnant women who have been injected with one of the COVID-19 shots. The vast majority of these have been from the Pfizer shot (1,862 deaths) and the Moderna shot (656 deaths.) There have been more fetal deaths in the past 11 months following COVID-19 shots than there have been for the past 30+ years following ALL vaccines (2,198 – Source.) Last month (October, 2021) the New England Journal of Medicine admitted that the original study used to justify the CDC and the FDA in recommending the shots to pregnant women was flawed. (Source.) Since then, researchers in New Zealand have conducted a new study on the original data, and concluded: A re-analysis of these figures indicates a cumulative incidence of spontaneous abortion ranging from 82% (104/127) to 91% (104/114), 7–8 times higher than the original authors' results. (Source.) And yet, the CDC and FDA still continue to recommend the shots for pregnant women, even though a correct analysis on the original data shows that 82% to 91% of pregnant women will suffer miscarriages if their unborn child is less than 20 weeks old. (Source.) VAERS is a passive system that is severely under reported. The CDC and FDA have never conducted a study to determine what this under-reported factor is, but independent scientists have, and we have previously published the analysis conducted by Dr. Jessica Rose, who has determined that a conservative under-reported factor would be X41. See: STUDY: Government's Own Data Reveals that at Least 150,000 Probably DEAD in U.S. Following COVID-19 Vaccines This means that there have probably been at least 99,753 fetal deaths following COVID-19 injections so far. Here is a video report we made on this last month with some very unfortunate gruesome examples of what these shots are doing to unborn babies. 1,969 Fetal Deaths Recorded Following COVID-19 Shots but Criminal CDC Recommends Pregnant Women Get the Shot UPDATE – November 7, 2021 PM A couple of hours after publishing this article, a video that has been circulating on the Internet of an interview with a Funeral Director in the UK became known to me. He has been in practice for over 3 years and is identified as “Wesley,” and was interviewed by a group called “Resistance GB.” He claims that last fall was one the slowest periods of seeing deaths for all funeral directors, but when the COVID-19 shots were introduced, deaths started dramatically increasing. It started with the elderly, but then by April they were seeing large numbers of people in their 30s and 40s. Many of them were dying of myocarditis. Now, they are seeing unprecedented numbers of newborn babies, and they are piling up in hospital refrigerators. Some are full term, some are pre-term, he claims. The UK originally recommended that pregnant women and nursing mothers should NOT get the experimental COVID shots, but like the CDC in the U.S., they eventually changed their recommendation to encourage pregnant women to get the shots. (NEXT) An ethical analysis of vaccinating children against COVID-19: benefits, risks, and issues of global health equity Johns Hopkins University, Oxford-Johns Hopkins Global Infectious Disease Ethics Collaborative, Wageningen University - The Netherlands, University of Oxford, Abstract We argue that it is currently unclear whether routine COVID-19 vaccination of healthy children is ethically justified in most contexts, given the minimal direct benefit that COVID-19 vaccination provides to children, the potential for rare risks to outweigh these benefits and undermine vaccine confidence, and substantial evidence that COVID-19 vaccination confers adequate protection to risk groups, such as older adults, without the need to vaccinate children. We conclude that child COVID-19 vaccination in wealthy communities before adults in poor communities worldwide is ethically unacceptable and consider how policy deliberations might evolve in light of future developments. (NEXT) What's Driving Global Deforestation? Organized Crime, Beef, Soy, Palm Oil and Wood Products Jennifer Devine,  Counterpunch, November 17, 2021 Every year the world loses an estimated 25 million acres (10 million hectares) of forest, an area larger than the state of Indiana. Nearly all of it is in the tropics. From my research on social and environmental issues in Latin America, I know that four consumer goods are responsible for the majority of global deforestation: beef, soy, palm oil, and wood pulp and paper products. Together these commodities are responsible for the loss of nearly 12 million acres (5 million hectares) annually. There's also a fifth, less publicized key driver: organized crime, including illegal drug trafficking. The dominant role of beef Among major products that promote deforestation, beef is in a class by itself. Beef production is now estimated to be the biggest driver of deforestation worldwide, accounting for 41% of global forest losses. In the Amazon alone, cattle ranching accounts for 80% of deforestation. From 2000 to 2011, beef production emitted nearly 200 times more greenhouse gases than soy, and 60 times more than oil palm in tropical countries with high deforestation rates. Soy and palm oil: Ubiquitous ingredients Together, soy and palm oil drive nearly 10% of deforestation annually – almost 2.5 million acres (1 million hectares). Clearing land for palm oil plantations fuels large-scale rainforest destruction in Indonesia and Malaysia, where most of the world's palm oil is produced. Palm oil is the most commonly produced, consumed and traded vegetable oil. Some 60% of the 66 million tons produced globally every year is used to produce energy in the form of biofuel, power and heat. About 40% is used for food, animal feed and chemical products. Palm oil is an ingredient in half of all products found at the supermarket, including margarine, shampoos, frozen pizza and detergents. Soy production has doubled globally in the past 20 years. Nearly 80% of global soy is fed to cows, chickens, pigs and farmed fish. This demand reflects the tripling of global meat production over the past 50 years. Wood products Wood products are responsible for about 5% of annual global deforestation, or about 1.2 million acres (500,000 hectares) yearly. Wood is widely used for home construction and furniture, and also as a pulp source for paper and fabric. And in low-income nations and rural areas, it's an important fuel source for heating and cooking. The three largest paper-producing countries are the U.S., Canada and China. Illegal deforestation and organized crime Another industry plays an important role, especially in tropical forests: organized crime. Large, lucrative industries offer opportunities to move and launder money; as a result, in many parts of the world, deforestation is driven by the drug trade. In South America and Central America, drug trafficking organizations are the vanguard of deforestation. Drug traffickers are illegally logging forests in the Amazon and hiding cocaine in timber shipments to Europe. In my research, I have analyzed how traffickers illegally log and raise cattle in protected areas in Central America to launder money and claim drug smuggling territory. Other scholars estimate that 30% to 60% of deforestation in the region is “narco-deforestation.” Forest Trends analysis, exports tied to illegal deforestation are worth US$61 billion annually and are responsible for 25% of total global tropical deforestation. (NEXT) ‘This Must Not Happen': If Unhalted, Permian Basin Fracking Will Unleash 40 Billion Tons of CO2 by 2050 As activists at the COP26 summit continue to denounce the “massive” gap between wealthy governments' lofty rhetoric and their woefully inadequate plans for addressing the climate emergency, a new analysis of projected extraction in the Permian Basin in the U.S. Southwest exposes the extent to which oil and gas executives' refusal to keep fossil fuels in the ground puts humanity's future in jeopardy. “While climate science tells us that we must consume 40% less oil in 2030, Permian producers plan to grow production more than 50%.” Released Tuesday by Oil Change International, Earthworks, and the Center for International Environmental Law, the second chapter of The Permian Basin Climate Bomb warns that if the drilling and fracking boom that has turned the Permian Basin into “the world's single most prolific oil and gas field” over the past decade is allowed to persist unabated for the next three decades, it will generate nearly 40 billion tons of carbon dioxide by mid-century. “With global markets flush with Permian oil and gas, it can only be harder to steer the world's economy toward clean energy.” “While climate science tells us that we must consume 40% less oil in 2030, Permian producers plan to grow production more than 50%” from 2021 to 2030, said Stockman. “This must not happen.” “If left unchecked,” the report notes, “the Permian could continue to produce huge amounts of oil, gas, and gas liquids for decades to come. With global markets flush with Permian oil and gas, it can only be harder to steer the world's economy toward clean energy.” (NEXT) Wall Street's Takeover of Nature Advances with Launch of New Asset Class By Whitney Webb A project of the multilateral development banking system, the Rockefeller Foundation and the New York Stock Exchange recently created a new asset class that will put, not just the natural world, but the processes underpinning all life, up for sale under the guise of promoting “sustainability.” Last month, the New York Stock Exchange (NYSE) announced it had developed a new asset class and accompanying listing vehicle meant “to preserve and restore the natural assets that ultimately underpin the ability for there to be life on Earth.” Called a natural asset company, or NAC, the vehicle will allow for the formation of specialized corporations “that hold the rights to the ecosystem services produced on a given chunk of land, services like carbon sequestration or clean water.” These NACs will then maintain, manage and grow the natural assets they commodify, with the end of goal of maximizing the aspects of that natural asset that are deemed by the company to be profitable. Though described as acting like “any other entity” on the NYSE, it is alleged that NACs “will use the funds to help preserve a rain forest or undertake other conservation efforts, like changing a farm's conventional agricultural production practices.” Yet, as explained towards the end of this article, even the creators of NACs admit that the ultimate goal is to extract near-infinite profits from the natural processes they seek to quantify and then monetize. NYSE COO Michael Blaugrund alluded to this when he said the following regarding the launch of NACs: “Our hope is that owning a natural asset company is going to be a way that an increasingly broad range of investors have the ability to invest in something that's intrinsically valuable, but, up to this point, was really excluded from the financial markets.” Framed with the lofty talk of “sustainability” and “conservation”, media reports on the move in outlets like Fortune couldn't avoid noting that NACs open the doors to “a new form of sustainable investment” which “has enthralled the likes of BlackRock CEO Larry Fink over the past several years even though there remain big, unanswered questions about it.” Fink, one of the world's most powerful financial oligarchs, is and has long been a corporate raider, not an environmentalist, and his excitement about NACs should give even its most enthusiastic proponents pause if this endeavor was really about advancing conservation, as is being claimed. How to Create a NAC The creation and launch of NACs has been two years in the making and saw the NYSE team up with the Intrinsic Exchange Group (IEG), in which the NYSE itself holds a minority stake. IEG's three investors are the Inter-American Development Bank, the Latin America-focused branch of the multilateral development banking system that imposes neoliberal and neo-colonalist agendas through debt entrapment; the Rockefeller Foundation, the foundation of the American oligarch dynasty whose activities have long been tightly enmeshed with Wall Street; and Aberdare Ventures, a venture capital firm chiefly focused on the digital healthcare space. Notably, the IADB and the Rockefeller Foundation are closely tied to the related pushes for Central Bank Digital Currencies (CBDCs) and biometric Digital IDs. The IEG's mission focuses on “pioneering a new asset class based on natural assets and the mechanism to convert them to financial capital.” “These assets,” IEG states, make “life on Earth possible and enjoyable…They include biological systems that provide clean air, water, foods, medicines, a stable climate, human health and societal potential.” Put differently, NACs will not only allow ecosystems to become financial assets, but the rights to “ecosystem services”, or the benefits people receive from nature as well. These include food production, tourism, clean water, biodiversity, pollination, carbon sequestration and much more. IEG is currently partnering with Costa Rica's government to pilot its NAC efforts within that country. Costa Rica's Minister of Environment and Energy, Andrea Meza Murillo, has claimed that the pilot project with IEG “will deepen the economic analysis of giving nature its economic value, as well as to continue mobilizing financial flows to conservation.” With NACs, the NYSE and IEG are now putting the totality of nature up for sale. While they assert that doing so will “transform our economy to one that is more equitable, resilient and sustainable”, it's clear that the coming “owners” of nature and natural processes will be the only real beneficiaries. Per the IEG, NACs first begin with the identification of a natural asset, such as a forest or lake, which is then quantified using specific protocols. Such protocols have already been developed by related groups like the Capitals Coalition, which is partnered with several of IEG's partners as well as the World Economic Forum and various coalitions of multinational corporations. Then, a NAC is created and the structure of the company decides who has the rights to that natural asset's productivity as well as the rights to decide how that natural asset is managed and governed. Lastly, a NAC is “converted” into financial capital by launching an initial public offering on a stock exchange, like the NYSE. This last stage “generates capital to manage the natural asset” and the fluctuation of its price on the stock exchange “signals the value of its natural capital.” However, the NAC and its employees, directors and owners are not necessarily the owners of the natural asset itself following this final step. Instead, as IEG notes, the NAC is merely the issuer while the potential buyers of the natural asset the NAC represents can include: institutional investors, private investors, individuals and institutions, corporations, sovereign wealth funds and multilateral development banks. Thus, asset management firms that essentially already own much of the world, like Blackrock, could thus become owners of soon-to-be monetized natural processes, natural resources and the very foundations of natural life itself. Both the NYSE and IEG have marketed this new investment vehicle as being aimed at generating funds that will go back to conservation or sustainability efforts. However, on the IEG's website, it notes that the goal is really endless profit from natural processes and ecosystems that were previously deemed to be part of “the commons”, i.e. the cultural and natural resources accessible to all members of a society, including natural materials such as air, water, and a habitable earth. Per the IEG, “as the natural asset prospers, providing a steady or increasing flow of ecosystem services, the company's equity should appreciate accordingly providing investment returns. Shareholders and investors in the company through secondary offers, can take profit by selling shares. These sales can be gauged to reflect the increase in capital value of the stock, roughly in-line with its profitability, creating cashflow based on the health of the company and its assets.” Researcher and journalist Cory Morningstar has strongly disagreed with the approach being taken by NYSE/IEG and views NACs as a system that will only exacerbate the corporate predation of nature, despite claims to the contrary. Morningstar has described NACs as “Rockefeller et al. letting the markets dictate what in nature has value – and what does not. Yet, it's not for capitalist institutions and global finance to decide what life has value. Ecosystems are not ‘assets.' Biological communities exist for their own purposes, not ours.” A New Way to Loot The ultimate goal of NACs is not sustainability or conservation – it is the financialization of nature, i.e. turning nature into a commodity that can be used to keep the current, corrupt Wall Street economy booming under the guise of protecting the environment and preventing its further degradation. Indeed, IEG makes this clear when they note that “the opportunity” of NACs lies not in their potential to improve environmental well-being or sustainability, but in the size of this new asset class, which they term “Nature's Economy.” Indeed, while the asset classes of the current economy are value at approximately $512 trillion, the asset classes unlocked by NACs are significantly larger at $4,000 trillion (i.e. $4 quadrillion). Thus, NACs open up a new feeding ground for predatory Wall Street banks and financial institutions that will allow them to not just dominate the human economy, but the entire natural world. In the world currently being constructed by these and related entities, where even freedom is being re-framed not as a right but “a service,” the natural processes on which life depends are similarly being re-framed as assets, which will have owners. Those “owners” will ultimately have the right, in this system, to dictate who gets access to clean water, to clean air, to nature itself and at what cost. According to Cory Morningstar, one of the other aims of creating “Nature's Economy” and neatly packaging it for Wall Street via NACs is to drastically advance massive land grab efforts made by Wall Street and the oligarch class in recent years. This includes the recent land grabs made by Wall Street firms as well as billionaire “philanthropists” like Bill Gates during the COVID crisis. However, the land grabs facilitated through the development of NACs will largely target indigenous communities in the developing world. As Morningstar notes: “The public launch of NACs strategically preceded the fifteenth meeting of the Conference of the Parties to the Convention on Biological Diversity, the biggest biodiversity conference in a decade. Under the pretext of turning 30% of the globe into “protected areas”, the largest global land grab in history is underway. Built on a foundation of white supremacy, this proposal will displace hundreds of millions, furthering the ongoing genocide of Indigenous peoples. The tragic irony is this: while Indigenous peoples represent less than 5% of the global population, they support approximately 80% of all biodiversity.“ IEG, in discussing NACs, tellingly notes that proceeds from a NAC's IPO can be used for the acquisition of more land by its controlling entities or used to boost the budgets or funds of those who receive the capital from the IPO. This is a far cry from the NYSE/IEG sales pitch that NACs are “different” because their IPOs will be used to “preserve and protect” natural areas. The climate change panic that is now rising to the take the place of COVID-19 panic will surely be used to savvily market NACs and similar tactics as necessary to save the planet, but – rest assured – NACs are not a move to save the planet, but a move to enable the same interests responsible for the current environmental crises to usher in a new era where their predatory exploitation reaches new heights that were previously unimaginable.

REDDERS Sports Podcast
Proudo & Redders NDCA Podcast 181121

REDDERS Sports Podcast

Play Episode Listen Later Nov 18, 2021 26:28


Ubiquitous man about town Dan Proudman and resident gibberer David Redden talk all things NDCA Grade Cricket in this week's Podcast.

Tech Times
Episode 38: Crypto - When will it become ubiquitous?

Tech Times

Play Episode Listen Later Nov 10, 2021 6:09


We regularly spend digital currency now, in the form of electronic cash transactions, but crypto…that's a bit different. When will spending that be as commonplace?

Healthy Mind Fit Body
157 – Pandemic of centralized control and coercion, vaccination aspiration issue, decentralized nutritional health

Healthy Mind Fit Body

Play Episode Listen Later Nov 3, 2021 72:15


The pandemic restrictions continue to stress people around the globe. Ubiquitous, cheap testing for individuals is still not being offered, though some rapid-antigen tests have become available (at higher prices). Speculations about SARS2 originating from the Wuhan bat coronavirus lab gain more evidence. The mainstream perspective on covid-19 vaccine safety has continued to neglect those …

Ubiquitous Growth
Ubiquitous Growth 131 "In Tune"

Ubiquitous Growth

Play Episode Listen Later Oct 22, 2021 14:21


One hundred and thirty first Episode released on 10/22/2021. Happy Friday UG Fam! Been a little bit, but I was traveling and wanted to enjoy that time with my friends. I went to Boise, Idaho to see my brother from another mother Roscoe! He graduated from BSU so I went out there to see him and celebrate that since I couldn't attend the actual graduation ceremony later this year. The trip was fun and I touch on it some in this episode. I also talk about the season change which I've noticed immensely since I've returned to Oregon. It's like I'm seeing things in slow motion and staring at a magnificent piece of art as I see the leaves change to the plethora of burnt colors. It's allowed me to do great reflection and feel really in tune with the change going on around me. I talk about how when you're this in tune, it usually means big change is coming in your life because you're noticing the change around you more. Second, I chose to drive to Boise instead of fly and I talk about this being a hack for more solid reflection time and deep work if you want it to be. I've done this a few times on certain trips and gotten a lot out of it. Can be something you try if you are seeking more growth. The book I'm listening to (not reading) talks about going into isolation to really tap into that deep work that will put you in a state of flow. Last, I received a random phone call from a lady named Judy whom I told a story about on this pod a couple years ago. Unfortunately, I could tell the pain in her voice from the jump. Judy's husband's health is failing and failing quickly. This is a terrible situation that I think we all fear. Growing old with a person you love and watching them fade quicker than you. Please keep Judy in your thoughts and prayers. While this was hard to hear from Judy in such a negative light. I don't think for one second there isn't further meaning behind why I'm getting this phone call at this particular time in my own life. I'm pulling more from it because it correlates to the vision I have running in my head. So some out of the blue things, really aren't out of the blue. They are reminders. Keep pushing. Thank y'all for the continued support. Still thrilled to be bringing you more content and I appreciate any and all feedback. Continuing to use my voice to spread growth to the world in my own way. Today's episode touches on the following topics: 1. When you feel more in tune and in touch with your surroundings it's probably a sign that big change is coming 2. Don't always fly when traveling if it's a close enough trip 3. Some out of the blue things are not out of the blue, they are reminders Audio Book: Deep Work by Cal Newport on Audible #BlackLivesMatter #StopAsianHate --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/michael-manns/support

Bigger Than Us
#170 Veeral Hardev, VP of Strategy at Ubiquitous Energy

Bigger Than Us

Play Episode Listen Later Oct 19, 2021 49:39


Veeral Hardev is VP of Strategy at Ubiquitous Energy. Hardev has over a decade of experience commercializing novel nano-materials products for the electronics industry. This includes his time at Nanosys, Inc. where he led materials and business development, and product management. Hardev holds an MBA from the Berkeley Haas School of Business, and a bachelor's degree in Materials Science and Economics from UCLA. https://ubiquitous.energy/ https://nexuspmg.com/

Axelbank Reports History and Today
#62: Joshua Scacco - "The Ubiquitous Presidency"

Axelbank Reports History and Today

Play Episode Listen Later Oct 19, 2021 50:57


Hardly a day goes by when the President of the United States isn't a topic of conversation. From TV and Twitter to baseball games and surprise breakfast stops, the person sitting in the nation's highest office has the power to get attention almost no matter what they're doing. And increasingly so, they have made an effort to use their platform to drive politics, policy and power in the United States. In their book, "The Ubiquitous Presidency: Presidential Communication and Digital Democracy in Tumultuous Times," Drs. Joshua Scacco and Kevin Coe trace the history of the presidential platform, and how presidents came to realize they weren't just in the news, that it was to their advantage to BE the news. They describe how Bill Clinton's saxophone, Barack Obama's test drive with Jerry Seinfeld and Donald Trump's rallies formed a new force in American politics, that of the president who is everywhere.Joshua Scacco is on Twitter at twitter.com/joshscaccoKevine Coe is on Twitter at twitter.com/profkevincoeTheir book is published by Oxford University Press: https://global.oup.com/academic/product/the-ubiquitous-presidency-9780197520642?cc=ca&lang=en&#.YBBJWjERYhM.twitterSupport our show at patreon.com/axelbankhistory**A portion of every contribution is given to a charity for children's literacy**"Axelbank Reports History and Today" can be found on social media at twitter.com/axelbankhistoryinstagram.com/axelbankhistoryfacebook.com/axelbankhistory

Craig Peterson's Tech Talk
How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why?

Craig Peterson's Tech Talk

Play Episode Listen Later Oct 15, 2021 84:46


How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why? We've got a new study out showing that North American organizations, businesses, and others, are being hit with an average of 497 cyber attacks per week, right here in the good old USA. [Following is an automated transcript] This is a study by checkpoint software technologies. Checkpoint, I used, oh my gosh. It would have been back in the nineties back then. They were one of the very first genuine firewall companies. And it was a system that I was putting in place for my friends over at troopers. I think it was New England telephone. It might've been Verizon by then. I can't even remember, man. [00:00:41] It's been a little while, but it was, a system we were using in front of this massive system that I designed, I made the largest internet property in the world. At that time called big yellow. It morphed into super pages. It might be familiar with. But it was me and my team that did everything. We built the data center out. [00:01:05] We wrote all of the software. Of course they provided all of the yellow pages type listing so we can put it all in. And we brought it up online and we were concerned. Well, first of all, You know, I've been doing cyber security now for over 30 years. And at this point in time, they wanted something a little more than my home grown firewall. [00:01:29] Cause I had designed and written one in order to protect this huge asset that was bringing in tens of millions of dollars a year to the phone company. So they said, Hey, listen, let's go ahead and we'll use checkpoint and get things going. We did, it was on a little, I remember it was a sun workstation. If you remember those back in the. [00:01:52] And it worked pretty well. I learned how to use it and played with it. And that was my first foray into kind of what the rest of the world had started doing, this checkpoint software, but they've continued on, they make some great firewalls and other intrusions type stuff, detection and blocking, you know, already that I am a big fan, at least on the bigger end. [00:02:17] You know, today in this day and age, I would absolutely use. The Cisco stuff and the higher end Cisco stuff that all ties together. It doesn't just have the fire power firewall, but it has everything in behind, because in this day and age, you've got to look at everything that's happening, even if you're a home user. [00:02:37] And this number really gets everybody concerned. Home users and business users is. Businesses are definitely under bigger attacks than home users are. And particularly when we're talking about businesses, particularly the bigger businesses, the ones that have a huge budget that are going to be able to go out and pay up, you know, a million, $10 million ransom. [00:03:05] Those are the ones that they're after and this analysis. Point software who does see some of those attacks coming in, showed some very disturbing changes. First of all, huge increases in the number of cyber attacks and the number of successful ransoms that have been going on. And we're going to talk a little bit later, too, about where some of those attacks are coming from, and the reason behind those attack. [00:03:36] According to them right now, the average number of weekly attacks on organizations globally. So far, this year is 40% higher than the average before March, 2020. And of course that's when the first lockdowns went into effect and people started working from home in the U S the. Increase in the number of attacks on an organizations is even higher at 53%. [00:04:07] Now you might ask yourself why, why would the U S be attacked more? I know you guys are the best and brightest, and I bet it, I don't even need to say this because you can figure this out yourself, but the us is where the money is. And so that's why they're doing it. And we had president Biden come out and say, Hey, don't attack the. [00:04:27] well, some of those sectors are under khaki for more after he said that then before, right. It's like giving a list to a bad guy. Yeah. I'm going to be gone for a month in June and yeah, there won't be anybody there. And the here's the code to my alarm. Right. You're you're just inviting disaster checkpoints. [00:04:49] Also showing that there were more. Average weekly attacks in September 21. That's this September than any time since January, 2020. In fact, they're saying 870 attacks per organization globally per week. The checkpoint counted in September was double the average in March, 2020. It's kind of funny, right? [00:05:14] It's kind of like a before COVID after COVID or before the Wu Han virus and after the Wu Han virus, however, we might want to know. So there are a lot of attacks going on. Volume is pretty high in a lot of different countries. You've heard me say before some of my clients I've seen attack multiple times a second, so let's take a second and define the attack because being scanned. [00:05:40] I kind of an attack, the looking to see, oh, where is there a device? Oh, okay. Here's a device. So there might be a home router. It might be your firewall or your router at the business. And then what it'll do is, okay, I've got an address now I know is responding, which by the way is a reason. The, we always configure these devices to not respond to these types of things. [00:06:04] And then what they'll do is they will try and identify it. So they'll try and go into the control page, which is why you should never have when. Configuration enabled on any of your routers or firewalls, because they're going to come in and identify you just on that because all of a sudden them brag about what version of the software you're running. [00:06:26] And then if it's responding to that, they will try and use a password. That is known to be the default for that device. So in a lot of these devices, the username is admin and the password is admin. So they try it and now off they go, they're running. Some of these guys will even go the next step and we'll replace the software. [00:06:52] In your router or firewall, they will replace it so that it now directs you through them, everything you are doing through them. So they can start to gather information. And that's why you want to make sure that the SSL slash TLS. That encryption is in place on the website. You're going to, so if you go to Craig peterson.com right now, my website, I'm going to go there myself. [00:07:22] So if you go to Craig peterson.com, you're going to notice that first of all, it's going to redirect you to my secure site and it doesn't really matter. You won't see it. Okay. But you are there because if he. Typically at the left side of that URL bar where it says, Craig peterson.com. You'll see, there's a little lock. [00:07:44] So if you click that lock, it says connection is secure. Now there's a lot more we could go into here. But the main idea is even if your data is being routed through China or. Both of which have happened before many tens of thousands, hundreds of thousands of time times. I'm not even sure of the number now. [00:08:06] It's huge. Even if your data is being routed through them, the odds are, they're not going to see anything. That you are doing on the Craig Peterson site. Now, of course you go into my site, you're going to be reading up on some of the cybersecurity stuff you can do. Right. The outages what's happened in the news. [00:08:27] You can do all of that sort of thing on my side, kind of, who cares, right? Um, but really what you care about is the bank, but it's the same thing with the bank. And I knew mine was going to be up there. And when everybody just check it out anyway, so. So the bad guys, then do this scan. They find a web page log in. [00:08:47] They try the default log in. If it works, the Le the least they will do is change. What are called your DNS settings. That's bad because changing your DNS settings now opens you up to another type of attack, which is they can go ahead. And when your browser says, I want to go to bank of america.com. It is in fact, going to go out to the internet, say is bank of America, the bad guys. [00:09:18] Did, and they will give you their bank of America site that looks like bank of America feels like bank of America. And all they're doing is waiting for you to type into your bank of America, username and password, and then they might redirect you to the. But at that point, they've got you. So there are some solutions to that one as well, and Firefox has some good solutions. [00:09:44] There are others out there and you had to have those that are in the works, but this is just an incredible number. So here's what I'm doing, right. I have been working for weeks on trying to figure out how can I help the most people. And obviously I needed to keep the lights on, right? I've got to pay for my food and gas and stuff, but what I'm planning on doing and what we've sketched out. [00:10:10] In fact, just this week, we got kind of our final sketch out of it is we're going to go ahead and have a success path for cyber security. All of the basic steps on that success path will be. Okay. So it will be training that is absolutely 100% free. And I'll do a deeper dive into some of these things that I'm doing that I'm doing right now here on the radio, because you can't see my desktop. [00:10:40] It's hard to do a deep dive and it's open to anybody, right? If you're a home user or if you're a business user, all of the stuff on that free. Is going to help you out dramatically. And then after that, then there'll be some paid stuff like a membership site. And then obviously done for you. If the cybersecurity stuff is just stuff that you don't want to deal with, you don't have the time to deal with. [00:11:05] You don't want to learn, because believe me, this is something that's taken me decades to learn and it's changing almost every day. So I understand if you don't want to learn it to. That is the other option. I'll give you, which is done for you, which we've been doing now for over 20, 30 years. Stick around. [00:11:25] We'll [00:11:25] So which sectors are economy are being hacked? I mentioned that in the last segment, but yeah, there are some problems and the sectors that president Biden lined out laid out are, are the ones that are under, even more attack after his message. [00:11:42] 497 cyber attacks per week. On average here in the US, that is a lot of attacks. And we started explaining what that meant so that we talked about the scan attacks that are automated and some person may get involved at some point, but the automated attacks can be pretty darn automated. Many of them are just trying to figure out who you are. [00:12:09] So, if it shows up, when they do that little scan that you're using a router that was provided by your ISP, that's a big hint that you are just a small guy of some sort, although I'm shocked at how many bigger businesses that should have their own router, a good router, right. A good Cisco router and a really good next generation firewall. [00:12:34] I'm shocked at how many don't have those things in place, but when they do this, That's the first cut. So if you're a little guy, they'll probably just try and reflash your router. In other words, reprogram it and change it so that they can start monitoring what you're doing and maybe grab some information from. [00:12:56] Pretty simple. If you are someone that looks like you're more of a target, so they connect to your router and let's say, it's a great one. Let's say it's a Cisco router firewall or Palo Alto, or one of those other big companies out there that have some really good products. Uh, at that point, they're going to look at it and say, oh, well, okay. [00:13:18] So this might be a good organization, but when they get. To it again, if when access has turned on wide area, access has turned down, that router is likely to say, this is the property of, uh, Covina hospital or whatever it might be, you know? And any access is disallowed authorized access only. Well, now they know. [00:13:42] Who it is. And it's easy enough just to do a reverse lookup on that address. Give me an address anywhere on the internet. And I can tell you pretty much where it is, whose it is and what it's being used for. So if that's what they do say they have these automated systems looking for this stuff it's found. [00:14:02] So now they'll try a few things. One of the first things they try nowadays is what's called an RDP attack. This is a remote attack. Are you using RDP to connect to your business? Right? A lot of people are, especially after the lockdown, this Microsoft. Desktop protocol has some serious bugs that have been known for years. [00:14:25] Surprisingly to me, some 60% of businesses have not applied those patches that have been available for going on two years. So what then button bad guys will do next. They say, oh, is there a remote desktop access? Cause there probably is most smaller businesses particularly use that the big businesses have a little bit more expensive, not really much more expensive, but much better stuff. [00:14:51] You know, like the Cisco AnyConnect or there's a few other good products out there. So they're going to say, oh, well, okay. Let's try and hack in again. Automate. It's automated. No one has to do anything. So it says, okay, let's see if they patch, let's try and break in a ha I can get in and I can get into this particular machine. [00:15:14] Now there's another way that they can get into their moat desktop. And this apparently has been used for some of the bigger hacks you've heard about recently. So the other way they get in is through credential stuff. What that is is Hey, uh, there are right now some 10 billion records out on the dark web of people's names, email addresses, passwords, and other information. [00:15:43] So, what they'll do is they'll say, oh, well this is Covina hospital and it looks it up backwards and it says, okay, so that's Covina hospital.org. I have no idea if there even is a Gavino hospital, by the way, and will come back and say, okay, great. So now let's look at our database of hacked accounts. Oh, okay. [00:16:04] I see this Covina hospital.org email address with a password. So at that point they just try and stuff. Can we get in using that username and password that we stole off of another website. So you see why it's so important to be using something like one password, a password generator, different passwords on every site, different usernames on every site, et cetera, et cetera. [00:16:29] Right. It gets pretty important per te darn quickly. So now that they're in, they're going to start going sideways and we call that east west in the biz. And so they're on a machine. They will see what they can find on that machine. This is where usually a person gets some. And it depends in historically it's been about six days on average that they spend looking around inside your network. [00:17:00] So they look around and they find, oh yeah, great. Here we go. Yep. Uh, we found this, we found that. Oh, and there's these file server mounts. Yeah. These SMB shares the, you know, the Y drive the G drive, whatever you might call it. So they start gaining through those and then they start looking for our other machines on the network that are compromised. [00:17:23] It gets to be really bad, very, very fast. And then they'll often leave behind some form of ransomware and also extortion, where that extort you additionally, for the threat of releasing your data. So there, there are many other ways they're not going to get into them all today, but that's what we're talking about. [00:17:43] Mirman, we're talking about the 500 cyber attacks per week against the average. North American company. So we have seen some industry sectors that are more heavily targeted than others. Education and research saw an 60% increase in attacks. So their education and I've tried to help out some of the schools, but because of the way the budgets work and the lowest bidder and everything else, they, they end up with equipment. [00:18:17] That's just totally misconfigured. It's just shocking to me. Right. They buy them from one of these big box online places. Yeah. I need a, a Cisco 10, 10. And I need some help in configuring it and all, yeah, no problems or we'll help you. And then they sell it to the school, the school installs it, and it is so misconfigured. [00:18:38] It provides zero protection, uh, almost zero, right. It provides almost no protection at all. And doesn't even use the advanced features that they paid for. Right. That's why, again, don't buy from these big box. Guys just don't do it. You need more value than they can possibly provide you with. So schools, 1500 attacks per week research companies, again, 1500 attacks per week, government and military. [00:19:10] Entities about 1100 weekly attacks. Okay. That's the next, most highest attacked. Okay. Uh, health care organizations, 752 attacks per week on average. Or in this case, it's a 55% increase from last year. So it isn't just checkpoints data that I've been quoting here. That, that gives us that picture. There are a lot of others out there IBM's has Verizon's has all of these main guys, and of course in the end, They've got these huge ransoms to deal with. [00:19:50] Hey, in New Hampshire, one of the small towns just got nailed. They had millions of dollars stolen, and that was just through an email trick that they played in. K again. I T people, um, I I've been thinking about maybe I should put together some sort of coaching for them and coaching for the cybersecurity people, even because there's so much more that you need to know, then you might know, anyways, if you're interested in any of this. [00:20:22] Visit me online. Craig peterson.com/subscribe. You will get my weekly newsletter, all of my show notes, and you'll find out about these various trainings and I keep holding. In fact, there's one in most of the newsletters. Craig peterson.com. Craig Peterson, S O n.com. Stick around. [00:20:43] We've been talking about the types of attacks that are coming against us. Most organizations here in north America are seeing 500 cyber attacks a week, some as many as 1500. Now, where are they coming from? [00:21:00] Whether they're scanning attacks, whether they're going deeper into our networks and into our systems who are the bad guys and what are they doing? Microsoft also has a report that they've been generating, looking at what they consider to be the source of the attacks. Now we know a lot of the reasons I'm going to talk about that too, but the source is an interesting way to look at. [00:21:29] Because the source can also help you understand the reason for the attacks. So according to dark reading, this is kind of an insider, a website you're welcome to go to, but it gets pretty darn deep sometimes, but they are showing this stats from Microsoft, which you can find online that in the last year rush. [00:21:53] Has been the source of 58% of the cyber cat tax. Isn't that amazing now it's not just the cyber attacks. I, I need to clarify this. It's the nation state cyber tech. So what's a nature's nation state cyber attack versus I don't know, a regular cyber attack. Well, the bottom line is a nation state cyber attack is an attack that's occurring and is actually coordinated and run by and on behalf of a nation state. [00:22:31] Uh, So Russia at 58% of all nation state attacks is followed by North Korea, 23% Iran, 11% China, 8%. Now you probably would have thought that China would be. Right up there on that list, but Russia has 50% more of the nation state cyber attacks coming from them than from China. And then after China is south Vietnam, Viet, or I should say South Korea, Vietnam, and Turkey, and they all have less than 1%. [00:23:14] Now, this is this new pool of data that Microsoft has been analyzing. And it's part of this year's Microsoft digital defense report, and they're highlighting the trends in the nation state threat cyber activity hybrid workforce security. Disinformation and your internet of things, operational technology and supply chain security. [00:23:35] In other words, the whole gambit before, before all of this, now the data is also showing that the Russian nation state attacks are increasingly effective, calming from about a 21% successful compromise rate last year to 32%. So basically 50% better this year at effectiveness there, Russians are also targeting more government agencies for intelligence gathering. [00:24:10] So that jumped from 3% of their victims last year to 53%. This. And the Russian nation state actors are primarily targeting guests who us, right? The United States, Ukraine and the United Kingdom. Now this is all according to the Microsoft data. So why has Russia been attacking us? Why is China been attacking us and why the change this. [00:24:38] Well, Russia has been attacking us primarily to rent some us it's a cash cow for them just like oil and gas. They are making crazy money. Now that president Biden has made us dependent on foreign oil supplies. It's just insanity and even dependent on. Gas coming from other places. Well guess where the number one source of gases now for Europe and oil it's Russia. [00:25:08] So we are no longer going to be selling to Europe. Russia is so they're going to be making a lot of money off of. But before then they were actually counted on ransomware to help fund the Russian federal government, as well as of course, these Russian oligarchs, these people who are incredibly rich that have a substantial influence on the government. [00:25:33] Don't if you're wondering who they might be, just think of people like, oh, I don't know. Bill gates and, uh, w who are on the, some of the other big guys, you know, Tim cook, uh, Amazon's Jeff bayzos Elon Musk, right? Those are by my definition and looking it up in the dictionary, they are all a. They get exemptions to laws. [00:25:58] They get laws passed that, protect them. In fact, most of regulations actually protect these big companies and hurt small companies. So I would call them oligarchs and that's the same sort of thing in Russia in Russia. Okay. They probably have a little bit more underhanded stuff than these guys here do, but that's what Russia has been. [00:26:21] China has been continually going after our national secrets, national defense, the largest database of DNA of Americans DNA, of course, is that unique key. If you will building block for all of us, that's what DNA is. And the largest database of all of that uniquely identifying information is in. China stole from the office of personnel management records of a federal employees, their secret clearance, all of their background check information who was spoken with, what did they have to say? [00:27:03] And on and on. So China has been interested in infiltrating our businesses that provide things to the military and the military themselves and the federal state, and even the local governments that's who they've been targeting. And that's why there's 8% number might seem small. Although, as I just mentioned this year, Russia moved, moved dramatically. [00:27:30] They used to be about 3% of their attacks or against the government agencies. And now it's 53%. So Russia. And China are going after our national secrets and they can use them in a cold war, which as I've said, I think the first shots of the third world war have been fired. And frankly, they're all cyber, it's all online and Russia. [00:27:57] Isn't the only nation state actor who's changing its approaches here as espionage is the most common goal amongst all nation state groups as of this year. Tivity of hackers reveals different motivations in Iran, which quadrupled its targeting of Israel. Surprise, surprise. Over the last year. And Iran has been launching destructive attacks, things that will destroy power, power plants, et cetera, and North Korea, which is targeting cryptocurrency companies for profit. [00:28:29] So they're stealing these various crypto coins again, funding their government. So it's, it's a problem. Absolute problem. Government sectors are some of the most targeted 48%. These NGOs non-government organizations that act kind of a quasi government functions and think tanks are 31%. Uh, and Microsoft, by the way, has been alerting customers of nation, state attack, attack attempts. [00:29:01] Guess how many this year that they had to warn about 20,500 times in the past three years. So that's a lot and Microsoft is not a company that's been out there at the front lines. It never has been it's in behind. So to have them come out and say, this is. And okay, by the way, your stolen username and password run for a buck per thousand, and it's only gonna take you hundreds of hours to get it all cleared up. [00:29:32] Isn't that nice spear fishing for a hire can cost a hundred to a thousand dollars per successful account takeover and denial of service attacks are cheap from protected sites, roughly $300. Per month. And if you want to be ransomware king, it's only going to cost you 66 bucks upfront 30% of the profit. [00:29:54] Okay. Craziness. Hey, visit me online. Sign up Craig, peter.com/subscribe. [00:30:03] I had an interesting mastermind meeting this week. There's six of us. We're all business owners and it opened my eyes pretty dramatically because one of the members got hacked, but that's not what I really want to emphasize. [00:30:20] This whole cybersecurity thing gets pretty complicated, pretty quickly. And a friend of mine who is in one of my mastermind groups had a real problem. And the here's here's what went on. We'll call him Walt for back of a letter, lack of a better name since that is his name. [00:30:40] And he doesn't mind me sharing this with you. Walt has a very small business that he and his wife run, and they have a couple of contractors that help out with some things, but his business is very reliant on advertising and primarily what he does is Facebook advertising. Now I've been talking for two years, I think in this mastermind group about cyber security and the fact that everyone needs good cyber security. [00:31:13] And he always just kind of pole hum to, uh, wow. You know, and it's just too complicated for me. I got to thinking for a, you know, a bit, really a few weeks, what does he mean to complicated? Cause there's some basic things you can do. So this week on Tuesday, I was on our mastermind groups meeting and I explained, okay, so here's what happened to Walt. [00:31:42] He had $40,000 stolen, which by the way, it's a lot of money for a teeny tiny husband wife company. And. Uh, well, here's what we did. He, we helped them. We got the FBI involved and, you know, with our direct ties, cause we work with them on certain types of cases and he got back every dime, which is just totally unheard of. [00:32:06] But um, without going into all of the details there, I spent a problem. 1520 minutes with the whole group and the mastermind explaining the basics of cyber security. And that really kind of woke me up, frankly, because of their responses. Now these are all small business owners and so they're making pretty decent money. [00:32:31] In fact, every one of them and they all have some contractors and some employees all except for Walt and his wife, they had just have contractors and. I had two completely different responses from two members of this group that no. Let me tell you this was really eye opening for me. And this is why you might've heard me in the first segment talking about this, but this is why I have really changed my view of this stuff, this cybersecurity stuff, because I explained. [00:33:08] If you're using things like Norton antivirus or McAfee, antivirus, or really any of them, even the built-in Microsoft defender this year, those standard antivirus system. I have only been able to catch about 30% of the malware out there, 30%, you know, that's like having a house and you've got a security guard posted out front. [00:33:39] He's armed, he's ready to fight. And yet all of your windows are open and all of your doors are unlocked. And all someone has to do is crawl in the side window because that guy that's posted up front, he's not going to be able to stop. So 30% effectiveness. And of course, Walt had all of the basic stuff. [00:33:59] He thought he was good enough. It's not worth spending time or money doing any of this. And of course it turned out to be well worth the time and money if he had done it. But he has a friend who has contacts and, and made things happen for him. So I guess he's kind of, kind of lucky in that regard, but I explained that and I said, do you know the, the way you. [00:34:21] To go. If you're a small business, it's about $997 a month for a small business, with a handful of employees to get the type of security you really need. There's going to catch. 90 something 98%. Maybe if, if things go well of the stuff going on, in other words, you don't just have an armed guard at the front door. [00:34:46] You've got all the windows closed and blocked and the doors closed and locked as well. So yeah, somebody can still get in, but they got to really want to get in and risk getting caught. So that's kind of the analogy that I used now. One of the members of my. Of my mastermind thought, well, okay. Cause you're just being Frank with me. [00:35:09] Right? We're all friends. She said, well, initially I thought, oh Craig, I'm going to have to have you help out with stuff here. Cause my, you know, I'm concerned about my security. I make some good money. Uh, she's the one that has employee. She has a million dollar plus a year business and she wants to keep it safe. [00:35:26] But then she. Uh, you know, but, but you know, you were talking about all of this Norton and stuff and that it doesn't work. So I, I just, I don't have any hope. And that's when the another member jumped in and this other member said, well, Uh, oh, that's not what I got at all. I got the, the normal off the shelf stuff that you buy that you're going to get from Amazon, or you're going to get from PC connection or wherever that stuff is not going to work, but there is stuff that does, but it's only professional stuff. [00:36:02] You can only get it from professionals that are trained in certified. Which is the right message. Right. That was the message I was trying to relay. Yeah. Don't try and do it yourself because you can't even get the right tools that you need. That is frankly a problem. So that really got me to think. In, in a very big way, because here are two people that have heard me talk about cybersecurity and their eyes probably glazed over, but now their eyes, I know at least one of these ladies definitely glazed over. [00:36:36] So I've come to the realization that sometimes I. A little too deep into things. And although I can explain it quite well to many people, sometimes people glaze over and I get emails from you guys saying kind of the same thing. I really appreciate it. I don't understand a lot of what you're saying, Craig, but thanks for being there. [00:36:59] Listen to you every week here on the radio. Uh, then that's good. That's reassuring, but now I've come to realize a few things. One is. The I've got to be a lot clearer in my messaging, because even when talking to my friends, it is a little bit overwhelming for them sometimes. Right. And then the next thing is everybody needs help because you're being lied to. [00:37:29] Right. How are people getting ransomware? If the stuff that they're buying work. Maybe it's just me, but I think there's a disconnect there. So a lot of you guys have gone out and you've hired people and I want to spend just a few minutes right now, going through some red flags that you need to be looking out for in vendor security assessment. [00:37:56] Now I'm putting one together. As well, right yet another one. Uh, and what I'm trying to do is help you out, right? This is not as sales tool. It is trying to help you figure out where you're at. I'm putting together a webinar that I'm going to be holding these what I'm calling bootcamps, where I go through and show you exactly how to do the basic steps that you need to do in order to be safe on. [00:38:25] Okay. If an online, all that means is your, is plugged in, right. Okay. It doesn't mean you're going out and doing a lot of stuff out there on the internet just means it's connected. So those are going to be coming out. I will send an email out as soon as all of that. Stuff's ready. Cause. Absolutely free. And these assessments, I have the basic one that you can do yourself. [00:38:47] It's a self-assessment. And then I have the more advanced ones that I do that are five grand. Okay. So you've got to be a decent sized business for this to make sense where we look for all of the security problem. On all of your computers and your networks, and then give you a list of things you need to do and how to do them. [00:39:10] Okay. So it's well worth it for them, but if you're a very small company and you're trying to do some of this yourself, I want to help you. So that's what these boot camps are going to be all over. And also what the scorecard is going to be all about. So that's coming up, but here are some good red flags and an assessment. [00:39:30] I found this again on dark reading. This is kind of an insider website for those of us in the cybersecurity business, but, um, How can you verify the information that vendors are giving you about their own cybersecurity posture? We've heard in the news and I've talked about them all year, this year, and for years past. [00:39:56] That are we're vendors can be our worst nightmare because some of these hacks come in through our vendors. So you've got yourself, a cybersecurity company. How do you know if they are really telling you the truth? And man, is that hard for you to know? Right. You're going to ask him questions and the salesmen are going to say, oh yeah, yeah, yeah. [00:40:21] That's why we don't have salesmen. Right. We have engineers. You talk to me, you might talk to my son or my daughter, people who have been doing this with me, who I have trained and helped out. So this guy who wrote the article and there's this on attributed, I don't see an attribution on here on this page. [00:40:41] I definitely want to give him, probably I heard is John Babinec wrote this thing and he is a principle threat hunters. What he calls himself over at net and rich. So he says, here's what you got to do. And if you're trying to be cost-effective, he puts it in. What I call an ed month clause. And one of these days I'll tell you that story, but he calls it a validity check question so that an honest vendor would tell you, no, they don't do X and give you a good reason why they don't like it's not cost effective. [00:41:17] It's outside of a reasonable risk model. Does that make sense to you? So when you're trying to evaluate a vendor, who's going to be doing your cyber security put in one of these validity checks put in one of these questions. It doesn't really matter to you, but it's something that would be very hard for one of these cybersecurity companies to do. [00:41:42] And maybe it doesn't fit the risk model that you have. I think it's just absolutely brilliant. Probably one of the better ways when you're trying to evaluate an MSSP as cybersecurity managed or otherwise provider stick in something like that. So you have a red flag that just stands out for you. All right. [00:42:04] Make sure you are registered online. Craig Peter sohn.com/subscribe. So you can find out about all of these trainings coming up. [00:42:17] If you've never heard of the Carrington event, I really hope, frankly, I really, really do hope we never have to live through one of these. Again, there is a warning out there right now about an internet apocalypse that could happen because of the Sun. [00:42:34] Solar storms are something that happens really kind of all of the time. The sun goes through solar cycles. About every seven years, there are longer cycles as well. You might know. I have an advanced class amateur radio license I've had for a long time, and we rely a lot when we're dealing with short wave on the solar cycle. [00:42:59] You see what happens is that the sun charges, the atmosphere. You see that if you've ever seen the Northern light, that is. Part of the Sunzi missions, hitting our magnetic field and kind of getting sucked into the core of the earth, if you will, as they get caught in that field. And the more charged the atmosphere is, the more bounce you get. [00:43:24] That's what we call it bounce. And the reason us hams have all these different frequencies to use is because of the battle. We can go different frequencies with different distances, I should say, using different frequencies. So think about it right now. You've got the earth and I want to talk from Boston to Chicago. [00:43:47] For instance, I know about how many miles it is, and I have to figure out in the ionosphere up in the higher levels of the atmosphere, what frequency. To use in order to go up into the atmosphere, bounce back, and then hit Chicago. That's the idea. It's not quite as simple or as complex in some ways, as it sounds, a lot of people just try different frequencies and a lot of hams just sit there, waiting for anybody anywhere to talk to, particularly if they are. [00:44:20] It's really quite fun. Now what we're worried about, isn't so much just the regular solar activity. We get worried when the sun spots increase. Now, the solar cycle is what has primary image. On the temperature on earth. So no matter what, you might've heard that isn't your gas, guzzling car or a diesel truck that causes the Earth's temperature to change. [00:44:49] Remember the only constant when it comes to the Earth's temperature has been changed over the millions of years. We had periods where the earth was much warmer than it is now had more common that carbon dioxide in the atmosphere than it does now had less. In fact, right now we are at one of the lowest levels of carbon dioxide in the atmosphere in earth, long, long. [00:45:15] So the sun, if you might remember, comes up in the morning, warms things up, right? And then it cools down. When the sun disappears at nighttime, it has a huge impact. It's almost exclusively the impact for our temperatures. If there's other things too, for instance, eruption can spew all to hold a lot of carbon dioxide. [00:45:40] In fact, just one, just Mount St. Helens wanted erupted, put more carbon dioxide into the atmosphere than man has throughout our entire existence. Just to give you an idea, right? So these alarms that are out there, uh, you know, come on, people. Really, and now we're seeing that in, uh, this last year we had a 30% increase in the ice cap up in the, in, up in the north, up in Northern Canada, around the polls. [00:46:12] Uh, we also had some of these glaciers growing. It was so funny. I saw an article this year, or excuse me, this week that was showing a sign that was at one of our national parks. And it said this glacier will have disappeared by 2020. Of course it hasn't disappeared. In fact, it has grown now and it's past 2020. [00:46:34] Anyhow, the sun has a huge impact on us in so many ways. And one of the ways is. Well, something called a coronal mass ejection. This is seriously charged particles. That tend to be very, very directional. So when, when it happens, when there's one of these CMS coronal, mass ejections, it's not just sending it out all the way around the sun everywhere. [00:47:02] It's really rather concentrated in one. One particular spot. Now we just missed one not too long ago. And let me see if I can find it here. Just mast, a cm E near miss. Here we go. There a solar super storm in July, 2012, and it was a very, very close shave that we had most newspapers didn't mention it, but this could have been. [00:47:33] AB absolutely incredible. We'd be picking up the pieces for the next 50 years. Yeah. Five, zero years from this one particular storm. And what happens is these, these solar flares, if you will, are very, very extreme, they CME. You're talking about x-rays extreme UV, ultraviolet radiation, reaching the earth at the speed of light ionizes, the upper layers of atmosphere. [00:48:02] When that happens, by the way, it hurts our communications, but it can also have these massive effects where it burns out saddle. And then causes radio blackouts, GPS, navigation problems. Think about what happened up in Quebec. So let me just look at this call back, uh, hit with an E and yeah, here we go. And March 13th, 1989. [00:48:33] Here we go. Here's another one. Now I remembered. And this is where Quill back got nailed. I'm looking at a picture here, which is, uh, looking at the United States and Canada from the sky and where the light is. And you can see Quebec is just completely black, but they have this massive electrical blackout and it's becomes. [00:48:57] Of this solar storm. Now they, these storms that I said are quite directional, depending on where it hits and when it hits things can get very, very bad. This particular storm back in 1989 was so strong. We got to see their Rora Borealis, the Northern lights as far south, as Florida and cue. Isn't that something, when we go back further in time to this Carrington event that I mentioned, you could see the Northern lights at the equals. [00:49:35] Absolutely amazing. Now the problem with all of this is we've never really had an internet up online. Like we have today when we had one of the storms hit. And guess what we're about to go into right now, we're going into an area or a time where the sun's going to be more active, certainly on this, this 11 year cycle and possibly another bigger cycle too, that we don't really know much about. [00:50:07] But when this hit us back in the 1850s, what we saw was a, uh, a. Telegraph system that was brought to its knees. Our telegraphs were burned out. Some of the Telegraph buildings were lit. They caught on fire because of the charges coming in, people who were working the telegraphs, who are near them at the time, got electric shocks or worse than that. [00:50:34] Okay. 1859 massive Carrington event compass needles were swinging wildly. The Aurora Borealis was visible in Columbia. It's just amazing. So that was a severe storm. A moderate severity storm was the one that hit in Quebec here, knocked out Quebec, uh, electric. Nine hour blackout on Northeast Canada. What we think would happen if we had another Carrington event, something that happened to 150 years ago is that we would lose power on a massive scale. [00:51:13] So that's one thing that would happen. And these massive transformers that would likely get burned out are only made in China and they're made on demand. Nobody has an inventory. So it would be at least six months before most of the country would get power back. Can you believe that that would be just terrible and we would also lose internet connectivity. [00:51:39] In fact, the thinking that we could lose internet connectivity with something much less than a severe storm, maybe if the Quebec power grid solar, a massive objection here. Maybe if that had happened, when. The internet was up. They might have burned out internet in the area and maybe further. So what we're worried about is if it hits us, we're going to lose power. [00:52:07] We're going to lose transformers on the transmission lines and other places we're going to lose satellites and that's going to affect our GPS communication. We're going to lose radio communication, and even the undersea cables, even though they're now no longer. Regular copper cables. It's now being carried of course, by light in pieces of glass. [00:52:32] The, those cables need to have repeaters about every 15 miles or so under underwater. So the power is provided by. Copper cables or maybe some other sort of power. So these undersea cables, they're only grounded at extensive intervals, like hundreds or thousands of kilometers apart. So there's going to be a lot of vulnerable components. [00:52:59] This is all a major problem. We don't know when the next massive. Solar storm is going to happen. These coronal mass ejections. We do know they do happen from time to time. And we do know it's the luck of the draw and we are starting to enter another solar cycle. So be prepared, everything. Of course, you're listening to Craig Peterson, cybersecurity strategist. [00:53:28] If you'd like to find out more and what you can do, just visit Craig peterson.com and subscribe to my weekly show notes. [00:53:39] Google's got a new admission and Forbes magazine has an article by Zach Dorfman about it. And he's saying you should delete Google Chrome now after Google's newest tracking admission. So here we go. [00:53:55] Google's web browser. Right? It's been the thing for people to use Google Chrome for many years, it's been the fastest. Yeah, not always people kind of leapfrog it every once in a while, but it has become quite a standard. Initially Microsoft is trying to be the standard with their terrible browser and yeah, I to Exploder, which was really, really bad and they have finally completely and totally shot it in the head. [00:54:29] Good move there on their part. In fact, they even got rid of their own browser, Microsoft edge. They shot that one in. They had to, I know I can hear you right now saying, oh, Craig, I don't know. I just use edge browser earlier today. Yeah. But guess what? It isn't edge browser. It's actually Google Chrome. The Microsoft has rebranded. [00:54:52] You see the guts to Google Chrome are available as what's called an open source project. It's called chromium. And that allows you to take it and then build whatever you want on top of. No, that's really great. And by the way, Apple's web kit, Kat is another thing that many people build browsers on top of and is part of many of these browsers we're talking about right now, the biggest problem with the Google Chrome. [00:55:22] Is they released it so they could track you, how does Google make its money? Well, it makes us money through selling advertising primarily. And how does it sell advertising if it doesn't know much or anything about you? So they came out with the Google Chrome browser is kind of a standard browser, which is a great. [00:55:43] Because Microsoft, of course, is very well known for not bothering to follow standards and say what they have is the actual standard and ignoring everybody else. Yeah. Yeah. I'm picking on Microsoft. They definitely deserve it. Well, there is what is being called here in Forbes magazine, a shocking new tracking admission from. [00:56:05] One that has not yet made headlines. And there are about what 2.6 billion users of Google's Chrome worldwide. And this is probably going to surprise you and it's frankly, Pretty nasty and it's, I think a genuine reason to stop using it. Now, as you probably know, I have stopped using Chrome almost entirely. [00:56:31] I use it when I have to train people on Chrome. I use it when I'm testing software. There's a number of times I use it, but I don't use. The reality is the Chrome is an absolute terror. When it comes to privacy and security, it has fallen way behind its rivals in doing that. If you have an iPhone or an iPad or a Mac, and you're using safari, apple has gone a long ways to help secure your. [00:57:09] Well, that's not true with Chrome. In fact, it's not protecting you from tracking and Dave up data harvesting. And what Google has done is they've said, okay, well, we're going to get these nasty third party cookies out of the whole equation. We're not going to do that anymore. And what they were planning on doing is instead of knowing everything specifically. [00:57:34] You they'd be able to put you in a bucket. So they'd say, okay, well you are a 40 year old female and you are like driving fast cars and you have some kids with a grandkid on the way, and you like dogs, not cats, right? So that's a bucket of people that may be a few hundred or maybe up to a thousand. As opposed to right now where they can tell everything about you. [00:58:04] And so they were selling that as a real advantage because they're not tracking you individually anymore. No, we're putting you in a bucket. Well, it's the same thing. Right. And in fact, it's easier for Google to put you in a bucket then to track everything about you and try and make assumptions. And it's easier for people who are trying to buy ads to place in front of you. [00:58:28] It's easier for them to not have to kind of reverse engineer all of the data the Google has gathered in instead of. To send this ad to people that are in this bucket and then that bucket. Okay. It makes sense to you, but I, as it turns out here, Google has even postponed of that. All right. They really have, they're the Google's kind of hiding. [00:58:54] It's really what's going on out there. Uh, they are trying to figure out what they should do, why they should do it, how they should do it, but it's, it's going to be a problem. This is a bad habit. The Google has to break and just like any, anybody that's been addicted to something it's going to take a long time. [00:59:16] They're going to go through some serious jitters. So Firefox is one of the alternatives and to Google Chrome. And it's actually a very good one. It is a browser that I use. I don't agree with some of the stuff that Mozilla and Firefox does, but again, right. Nobody agrees on everything. Here's a quote from them. [00:59:38] Ubiquitous surveillance harms individually. And society Chrome is the only major browser that does not offer meaningful protection against cross cross site tracking and Chrome will continue to leave users unprotected. And then it goes on here because. Uh, Google response to that. And they admit that this massive web tracking out of hand and it's resulted in, this is a quote from Google and erosion of trust, where 72% of people feel that almost all of what they do online is being. [01:00:19] By advertisers, technology firms or others, 81% say the potential risks from data collection outweigh the benefit by the way, the people are wrong. 72% that feel almost all of what they do on online is being tracked. No, no. The answer is 100% of what you do is probably being tracked in some way online. [01:00:41] Even these VPN servers and systems that say that they don't do log. Do track you take a look at proton mail just last week. Proton mail it's in Switzerland. Their servers are in Switzerland. A whole claim to fame is, Hey, it's all encrypted. We keep it safe. We don't do logging. We don't do tracking, uh, guess what they handed over the IP addresses of some of the users to a foreign government. [01:01:10] So how can you do that? If you're not logging, if you're not tracking. Yeah, right. They are. And the same thing is true for every paid VPN service I can think of. Right. So how can Google openly admit that their tracking is in place tracking everything they can, and also admit that it's undermining our privacy and. [01:01:38] Their flagship browser is totally into it. Right? Well, it's really, it's gotta be the money. And Google does not have a plan B this anonymized tracking thing that they've been talking about, you know, the buckets that I mentioned, isn't realistic, frankly. Uh, Google's privacy sandbox is supposed to Fitbit fix it. [01:02:00] I should say. The, the whole idea and the way it's being implemented and the way they've talked about it, the advertisers on happy. So Google's not happy. The users are unhappy. So there you go. That's the bottom line here from the Forbes article by Zach Dorfman, delete Google Chrome. And I said that for a long time, I do use some others. [01:02:27] I do use Firefox and I use. Which is a fast web browser, that some pretty good shape. Hey, if you sign up for my show's weekly newsletter, not only will you get all of my weekly tips that I send to the radio hosts, but you will get some of my special reports that go into detail on things like which browser you shouldn't be using. [01:02:52] Sign up right now. Craig peterson.com. [01:02:57] Many businesses have gone to the cloud, but the cloud is just another word for someone else's computer. And many of the benefits of the cloud just haven't materialized. A lot of businesses have pulled back and are building data centers again. [01:03:14] The reason I mentioned this thing about Microsoft again, and the cloud is Microsoft has a cloud offering. [01:03:23] It's called Microsoft Azure. Many people, many businesses use it. We have used it with some of our clients in the past. Now we have some special software that sits in front of it that helps to secure. And we do the same thing for Amazon web services. I think it's important to do that. And we also use IBM's cloud services, but Microsoft is been pitching for a long time. [01:03:51] Come use our cloud services and we're expecting here probably within the next month, a big announcement from Microsoft. They're planning on making it so that you can have your desktop reside in Microsoft's cloud, in the Azure cloud. And they're selling really the feature of it doesn't matter where you are. [01:04:17] You have your desktop and it doesn't matter what kind of computer you're on. As long as you can connect to your desktop, using some just reasonable software, you will be able to be just like you're in front of a computer. So if you have a Chromebook or a Mac, Or a windows or tablet, whatever, and you're at the grocery store or the coffee shop or the office, you'll be able to get it, everything, all of your programs, all your files. [01:04:47] And we, Microsoft will keep the operating system up to date for you automatically a lot of great selling points. And we're actually looking into that. Not too heavily yet. We'll give them a year before we really delve into it at all. Cause it takes them a while to get things right. And Microsoft has always been one that adds all kinds of features, but most of the time, most of them don't work and we can, we can document that pretty easily, even in things like Microsoft. [01:05:18] Well, the verge is now reporting that Microsoft has warned users of its as your cloud computing service, that their data has been exposed online for the last two years. Yeah, let me repeat that in case you missed it, you, uh, yeah. I'm I'm I might've misspoken. Right. Uh, let me see, what does it say? It says, um, users of Azure cloud competing service. [01:05:48] So that's their cloud. Microsoft's big cloud. Okay. Um, their data has been. Exposed online. Okay. So that means that people could get the data, maybe manipulate the data that sort of exposed means for the last two years. Are you kidding me? Microsoft is again, the verge. Microsoft recently revealed that an error in its Azure cosmos database product left more than 3,300 as your customers data. [01:06:24] Completely exposed. Okay guys. So this, this, this is not a big thing, right? It can't possibly be big thing because you know who uses Azure, right. Nobody uses a zer and nobody uses hosted databases. Come on, give me a break. Let me see, what else does this have to say? Oh, okay. It says that the vulnerability was reported, reportedly introduced into Microsoft systems in 2019, when the company added a data visualization feature called Jupiter notebook to cosmos DB. [01:06:59] Okay. Well, I'm actually familiar with that one and let's see what small companies let's see here. Um, some Azure cosmos DB clients include Coca Cola. Liberty mutual insurance, Exxon mobile Walgreens. Hmm. Let me see. Could any of these people like maybe, maybe Liberty mutual insurance and Walgreens, maybe they'd have information about us, right. [01:07:26] About our health and social security numbers and account numbers and credit cards. Names addresses. Right, right. That's again, why I got so upset when these places absolutely insist on taking my social security number, right? It, it, first of all, when it was put in place, the federal government guaranteed, it would never be used for anything other than social security. [01:07:53] And the law even said it could not be used for anything other than social security. And then the government started expanding it. Right. And the IRS started using it. To track all of our income and you know, that's one thing right there, the government computers, they gotta be secure. Right. All of these breaches we hear about that. [01:08:12] Can't be true. Uh, so how about when the insurance company wants your personal information? Like your social security number? What business is it of? There's really no. Why do they have to have my social security number? It's a social security number. It's not some number that's tattooed on my forehead. [01:08:36] That's being used to track me. Is it this isn't a socialist country like China is, or the Soviet union was right. It's not socially. So why are they tracking us like that? Walgreens? Why do they need some of that information? Why does the doctor that you go to that made the prescription for Walgreens? Why do they need that information? [01:09:00] And I've been all over this because they don't. Really need it. They want, it makes their life easier, but they don't really need it. However, it exposes us. Now, if you missed the email, I sent out a week ago, two weeks ago now, I guess. You missed something big because I, in my weekly newsletter went through and described exactly what you could do in order to keep your information private. [01:09:35] So in those cases where websites asking for information that they don't really need, right? You don't want to lie, but if they don't really need your real name, why you're giving them your real name? Why do you use a single email address? Why don't you have multiple addresses? Does that start make sense to you guys? [01:09:54] And now we find out that Microsoft Azure, their cloud services, where they're selling cloud services, including a database that can be used online, a big database, uh, 3,300 customers looks like some of them are actually kind of big. I don't know. ExxonMobil pretty big. Yeah. I think so. Walgreens, you think that that might be yeah, yeah, yeah, yeah. [01:10:22] Y. Why are we trusting these companies? You know it, if you have a lot of data, a lot of customers, you are going to be a major target of nation states to hack you and bat just general hackers, bad guys. But you're also, if, if you've got all this information, you've also got to have a much higher level of security than somebody that doesn't have all of that information. [01:10:52] Does that make sense too? Did I say that right? You don't need the information and, and I've got to warn anybody that's in a business, whether you're a business owner or you're an employee, do not keep more data than you need the new absolutely need to run your company. And that includes data about your customers. [01:11:16] And maybe, maybe it's even more specifically data about your customer. Because what can happen is that data can be stolen and we just found. That? Yes, indeed. It could have been, it was exposed Microsoft the same. We don't know how much it was stolen. If anything was stolen. Um, yeah, Walgreens. Hey, I wonder if anyone's going to try and get some pain pills illegally through, uh, this database hack or a vulnerability anyways. [01:11:47] All right, everyone. Stick around. We'll be back. Of course, you listening to Craig Peterson. I am a cybersecurity strategist for business, and I'm here to help you as well. You can ask any question any time, uh, consumers are the people I help the most, you know, I wish I got a dime for every time I answered a question. [01:12:09] Just email me@craigpeterson.com me@craigpeterson.com and stick around. [01:12:18] Whether or not, you agree with the lockdown orders that were put in place over this COVID pandemic that we had. Uh, there are some other parts of the world that are doing a lot more. [01:12:34] Australia has, I don't know. I think that they went over the deep end. The much, the same thing is true right next door to them. [01:12:45] And I am looking at a report of what they are doing with this new app. Uh, you might be aware that both apple and Google came out with an application programming interface. That could be used for contract tack tracking, contact tracking. There you go. Uh, it wasn't terribly successful. Some states put some things in place. [01:13:13] Of course you get countries like China. I love the idea because heaven forbid you get people getting together to talk about a Tannen square remembrance. Now you want to know who all of those people were, who were in close proximity, right? So, you know, good for China a while, as it turns out, Australia is putting something in place they have yet another COVID lockdown. [01:13:39] They have COVID quarantine orders. Now I think if you are sick, you should stay on. I've always felt that I, you know, I had 50 employees at one point and I would say, Hey, if you're sick, just stay home. Never required a doctor's note or any of that other silliness, come on. People. If someone's sick, they're sick and let them stay home. [01:14:04] You don't want to get everybody else in the office, sick and spread things around. Right. Doesn't that just kind of make sense. Well, they now in Australia, don't trust people to stay home, to get moving. Remember China, they were, they were taking welders and we're going into apartments in anybody that tested positive. [01:14:22] They were welding them into their apartment for minimum of two weeks. And so hopefully they had food in there and they had a way to get fresh water. Australia is not going quite that far, but some of the states down under. Using facial recognition and geolocation in order to enforce quarantine orders and Canada. [01:14:47] One of the things they've been doing for very long time is if you come into the country from out of the country, even if you're a Canadian citizen, you have to quarantine and they'll send people by your house or you have to pay to stay for 10 days in a quarantine hope. So you're paying the course now inflated prices for the hotel, because they're a special quarantine hotel. [01:15:14] You have to pay inflated prices to have food delivered outside your door. And that you're stuck there for the 10 days, or if you're at home though, they, you know, you're stuck there and they'll send people by to check up on you. They'll make phone calls to check up on you and. They have pretty hefty find. [01:15:36] Well, what Australia has decided to do is in Australia is Charlene's even going from one state to another state are required to prove that they're obeying a 14 day quarantine. And what they have to do is have this little app on their phone and they, the app will ping them saying, prove it. And then they have to take a photo of themselves with geo location tag on it and send it up via the app to prove their location. [01:16:15] And they have to do all of that within 15 minutes of getting the notification. Now the premier of the state of south Australia, Steven Marshall said we don't tell them how often or when on a random basis, they have to reply within 15 minutes. And if you don't then a police, officer's going to show up at the address you're supposed to be at to conduct an in-person check. [01:16:43] Very very intrusive. Okay. Here's another one. This is a, an unnamed government spokesperson who was apparently speaking with Fox news quote. The home quarantine app is for a selected cohort of returning self Australians who have applied to be part of a trial. If successful, it will help safely ease the burden of travel restrictions associated with the pandemic. [01:17:10] So there you go. People nothing to worry about. It's just a trial. Uh, it will go away. Uh, just like, uh, for instance, income tax, as soon as rule, number one is over, it will be removed and it will never be more than 3% and it will only apply to the top 1% of wage-earners. So there you go. Right. And we all know that world war one isn't over yet. [01:17:34] Right. So that's why they still have it in somehow. Yeah, some of the middle class pays the most income tax. I don't know. Interesting. Interesting. So there you go. Little news from down under, we'll see if that ends up happening up here. News from China, China has, uh, China and Russia have some interesting things going on. [01:17:55] First of all, Russia is no longer saw. Country, they kind of are. They kind of aren't, they are a lot freer in many ways than we are here in the United States. Of course, China, very heavily socialist. In fact, they're so socialists, they are communist and China. And Russia both want their kids to have a very good education in science, engineering, and mathematics. [01:18:23] Not so much on history, not so much on, on politics. Right. But definitely heavy on the, on the sciences, which I can see that makes all the sense. I think everybody should be pretty heavily on the science. Well, according to the wall street journal this week, gamers under the age of 18 will not be allowed to play online games between 8:00 PM and 9:00 PM on Friday, Saturdays and Sundays. [01:1

Cloud Security Podcast by Google
NEXT Special - 6 Cloud Security PMs (and a Developer Advocate!) Walk into a Studio

Cloud Security Podcast by Google

Play Episode Listen Later Oct 14, 2021 31:23


Guests: Stephanie Wong Vicente Diaz, Jerome McFarland Scott Ellis Patrick Faucher Il-Sung Lee, Anoosh Saboori Topics: What is your session about? Why would audience care? What is special about your security technology? Resources: Google Cloud Next 2021 SEC212 6 layers of GCP data center security SEC101 Ransomware and cyber resilience SEC204 Take charge  of your sensitive data SEC207 Securing the software supply chain SEC300 Trust the cloud more by trusting it less: Ubiquitous data encryption

Liberty Diner Dish | A Queer As Folk Podcast
3×08 The Ubiquitous Justin Taylor

Liberty Diner Dish | A Queer As Folk Podcast

Play Episode Listen Later Oct 11, 2021 115:54


3×08 is here!!! This episode sets so many things in motion!  Lindsay is starting her new job at an art gallery and she calls on Emmett for a last minute assist.  Melanie and Ted each try on supporting roles, but only one of them is comfortable with the fit.  Ben and Michael's neighborhood gets some new additions and there's one in particular that Ben can't shake.  Justin gets an internship at Brian's agency and THINGS HAPPEN PEOPLE!!!!!!  So many things that we couldn’t even fit them all here.  Blame it on our happy tears and our inner twelve year olds.  

Ubiquitous Growth
Ubiquitous Growth 130 "Lookout"

Ubiquitous Growth

Play Episode Listen Later Oct 9, 2021 11:51


One hundred and thirtieth Episode released on 10/09/2021. Happy Saturday UG Fam! Hopefully y'all are enjoying the last of this nice weather before we roll deeper into fall. I definitely am starting to feel that cool crisp air roll in more especially at night out here in the Portland Metro area. Tonight, I'm excited to watch some heavyweights slam it out in the ring (Fury vs. Wilder). This fight was supposed to take place on my bday in NYC this year on my birthday, but well as you'll see later in this episode, sometimes you are wrong and the universe bends things. Also after I recorded this I received a phone call from my homies who are visiting LA right now having a good time. That's why I titled this episode this because I had to give them some friendly reminders to stay safe out there. Okay, so first I talk about how sometimes you are going to keep receiving signs from the universe and at times you are going to deny them. It's usually because you aren't properly aligned and you have this thing hovering over you called laziness. Just slow down, remember to keep your hand on the steering wheel and head in the right direction. Life is life, it's going to take time. I say this a lot, but you can't be on all the time. Sometimes you need to BS yourself, because no one is perfect. Second, I talk about when you finish learning something you don't really learn it until you apply the information with intention. I had to go through this after a long journey of studying something in particular. I wanted the reward yet I hadn't even implemented what I'd been learning. While, I'm playing it safe and waiting for the right entry point, I'm also going over this course a second time in order to pay attention to the details and really make sure I know what the f*** I'm doing moving forward. This can be super difficult though, because people don't like learning something twice, although, those who really want it, will do it. And will likely be more successful in their overall journey. Last, I talk about when you are wrong, you are wrong. I picked this up from Ray Dalio's book Principles which I started reading. I talk about how things swing in life quickly. Even when you don't think they will. You need to analyze why you are wrong. I've had so many things swing that didn't seem possible but you just have to understand you can't bend the universe to your will every time or to that preconceived way you think things will play out. It just doesn't work like that unfortunately. Continue to learn from them losses. I still am and I'm still taking my time with it. Stumbling and sometimes doing dumb things along the way, but it's okay keep pushing. Thank y'all for the continued support. Still thrilled to be bringing you more content and I appreciate any and all feedback. Continuing to use my voice to spread growth to the world in my own way. Today's episode touches on the following topics: 1. Denying some signals 2. Apply learned knowledge with intention 3. When you are wrong, you are wrong Ray Dalio's book: https://www.amazon.com/Principles-Life-Work-Ray-Dalio/dp/1501124021 #BlackLivesMatter #StopAsianHate Thank you and I'll catch you later. [Intro/Outro music credit: Instrumental produced by Hastro Beats] Follow me on Instagram @mannsmm to chat about life/growing --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/michael-manns/support

Ubiquitous Growth
Ubiquitous Growth 129 "Other"

Ubiquitous Growth

Play Episode Listen Later Oct 1, 2021 11:08


One hundred and twenty-ninth Episode released on 10/01/2021. Happy Friday UG Fam! Welcome to October. For me this is going to be a very tough month I can already feel it. Although, I do have a lot of events to look forward to. I think it will balance out decently. Lately, I've been in a different mind frame. So much so, that once again, I put the pod to the side like I always do. I was asked to be a guest on a new pod by some friends, their show is called Big Duck Energy (please check it out if you are an Oregon football or College football fan). So put time and energy into that guest episode and didn't feel like hopping back on here. Then, a friend of mine sent me clips of my pod encouraging me to keep at it. The voice in my head told me, you know you can't stop forever ya know, people are counting on you. In this episode I talk about having weighted reasons to continue at whatever it is that you are at. When it's tough, bad, ugly, whatever. If you have solid weighted reasons then stop with the excuses and move. Second, I talked to y'all about getting off the tracks in the last episode. Well now I really feel as though I'm not off, I'm just on a completely new set of tracks. I feel like I have something to prove and I'm going to do it. I talk about how going through the tough times ALONE is sometimes truly needed. You have to go through shit alone and lean into it. Being a lone wolf is lethal. When you come out the other side of that I'm telling you, your gonna be able to out compete a majority of other people. And don't stop because you stop pleasing others in your life. It's not about them. It's about you and where you are trying to go to another level. Last, I talk about deep work, being focused, not distracted, not being content, having grander visions than most, doing calculations, in order to get to those higher levels. Don't forget many people wake up and just think about the day ahead of them. If you have a real vision that stretches out, I guarantee you are further ahead than most people. As we roll into October, keep pushing y'all. Thank y'all for the continued support. Still thrilled to be bringing you more content and I appreciate any and all feedback. Continuing to use my voice to spread growth to the world in my own way. Today's episode touches on the following topics: 1. Find weighted reasons to keep going 2. Not off the tracks, just on a completely other set 3. You have to get into deep work #BlackLivesMatter #StopAsianHate Thank you and I'll catch you later. [Intro/Outro music credit: Instrumental produced by Hastro Beats] Follow me on Instagram @mannsmm to chat about life/growing --- Support this podcast: https://anchor.fm/michael-manns/support

New Books in South Asian Studies
John Nemec, "The Ubiquitous Siva: Somananda's Sivadrsti and His Philosophical Interlocutors" (Oxford UP, 2021)

New Books in South Asian Studies

Play Episode Listen Later Oct 1, 2021 41:18


The Ubiquitous Siva: Somananda's Sivadrsti and His Philosophical Interlocutors (Oxford UP, 2021) is a sequel to a volume published in 2011 by OUP under the title The Ubiquitous Siva: Somananda's Sivadrsti and his Tantric Interlocutors. The first volume offered an introduction, critical edition, and annotated translation of the first three chapters of the Sivadrsti of Somananda, along with its principal commentary, the Sivadrstivrtti, written by Utpaladeva. It dealt primarily with Saiva theology and the religious views of competing esoteric traditions. The present volume presents the fourth chapter of the Sivadrsti and Sivadrstivrtti and addresses a fresh set of issues that engage a distinct family of opposing schools and authors of mainstream Indian philosophical traditions. In this fourth and final chapter, Somananda and Utpaladeva engage logical and philosophical works that exerted tremendous influence in the Indian subcontinent in its premodernity. Throughout this chapter, Somananda endeavors to explain his brand of Saivism philosophically. Somananda challenges his philosophical interlocutors with a single over-arching argument: he suggests that their views cannot cohere--they cannot be explained logically--unless their authors accept the Saiva non-duality for which he advocates. The argument he offers, despite its historical influence, remains virtually unstudied. The Ubiquitous Siva Volume II offers the first English translation of Chapter Four of the Sivadrsti and Sivadrstivrtti along with an introduction and critical edition. Raj Balkaran is a scholar, educator, consultant, and life coach. For information see rajbalkaran.com. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/south-asian-studies

New Books in Hindu Studies
John Nemec, "The Ubiquitous Siva: Somananda's Sivadrsti and His Philosophical Interlocutors" (Oxford UP, 2021)

New Books in Hindu Studies

Play Episode Listen Later Oct 1, 2021 41:18


The Ubiquitous Siva: Somananda's Sivadrsti and His Philosophical Interlocutors (Oxford UP, 2021) is a sequel to a volume published in 2011 by OUP under the title The Ubiquitous Siva: Somananda's Sivadrsti and his Tantric Interlocutors. The first volume offered an introduction, critical edition, and annotated translation of the first three chapters of the Sivadrsti of Somananda, along with its principal commentary, the Sivadrstivrtti, written by Utpaladeva. It dealt primarily with Saiva theology and the religious views of competing esoteric traditions. The present volume presents the fourth chapter of the Sivadrsti and Sivadrstivrtti and addresses a fresh set of issues that engage a distinct family of opposing schools and authors of mainstream Indian philosophical traditions. In this fourth and final chapter, Somananda and Utpaladeva engage logical and philosophical works that exerted tremendous influence in the Indian subcontinent in its premodernity. Throughout this chapter, Somananda endeavors to explain his brand of Saivism philosophically. Somananda challenges his philosophical interlocutors with a single over-arching argument: he suggests that their views cannot cohere--they cannot be explained logically--unless their authors accept the Saiva non-duality for which he advocates. The argument he offers, despite its historical influence, remains virtually unstudied. The Ubiquitous Siva Volume II offers the first English translation of Chapter Four of the Sivadrsti and Sivadrstivrtti along with an introduction and critical edition. Raj Balkaran is a scholar, educator, consultant, and life coach. For information see rajbalkaran.com. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/indian-religions

New Books in Intellectual History
John Nemec, "The Ubiquitous Siva: Somananda's Sivadrsti and His Philosophical Interlocutors" (Oxford UP, 2021)

New Books in Intellectual History

Play Episode Listen Later Oct 1, 2021 41:18


The Ubiquitous Siva: Somananda's Sivadrsti and His Philosophical Interlocutors (Oxford UP, 2021) is a sequel to a volume published in 2011 by OUP under the title The Ubiquitous Siva: Somananda's Sivadrsti and his Tantric Interlocutors. The first volume offered an introduction, critical edition, and annotated translation of the first three chapters of the Sivadrsti of Somananda, along with its principal commentary, the Sivadrstivrtti, written by Utpaladeva. It dealt primarily with Saiva theology and the religious views of competing esoteric traditions. The present volume presents the fourth chapter of the Sivadrsti and Sivadrstivrtti and addresses a fresh set of issues that engage a distinct family of opposing schools and authors of mainstream Indian philosophical traditions. In this fourth and final chapter, Somananda and Utpaladeva engage logical and philosophical works that exerted tremendous influence in the Indian subcontinent in its premodernity. Throughout this chapter, Somananda endeavors to explain his brand of Saivism philosophically. Somananda challenges his philosophical interlocutors with a single over-arching argument: he suggests that their views cannot cohere--they cannot be explained logically--unless their authors accept the Saiva non-duality for which he advocates. The argument he offers, despite its historical influence, remains virtually unstudied. The Ubiquitous Siva Volume II offers the first English translation of Chapter Four of the Sivadrsti and Sivadrstivrtti along with an introduction and critical edition. Raj Balkaran is a scholar, educator, consultant, and life coach. For information see rajbalkaran.com. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/intellectual-history

New Books Network
John Nemec, "The Ubiquitous Siva: Somananda's Sivadrsti and His Philosophical Interlocutors" (Oxford UP, 2021)

New Books Network

Play Episode Listen Later Oct 1, 2021 41:18


The Ubiquitous Siva: Somananda's Sivadrsti and His Philosophical Interlocutors (Oxford UP, 2021) is a sequel to a volume published in 2011 by OUP under the title The Ubiquitous Siva: Somananda's Sivadrsti and his Tantric Interlocutors. The first volume offered an introduction, critical edition, and annotated translation of the first three chapters of the Sivadrsti of Somananda, along with its principal commentary, the Sivadrstivrtti, written by Utpaladeva. It dealt primarily with Saiva theology and the religious views of competing esoteric traditions. The present volume presents the fourth chapter of the Sivadrsti and Sivadrstivrtti and addresses a fresh set of issues that engage a distinct family of opposing schools and authors of mainstream Indian philosophical traditions. In this fourth and final chapter, Somananda and Utpaladeva engage logical and philosophical works that exerted tremendous influence in the Indian subcontinent in its premodernity. Throughout this chapter, Somananda endeavors to explain his brand of Saivism philosophically. Somananda challenges his philosophical interlocutors with a single over-arching argument: he suggests that their views cannot cohere--they cannot be explained logically--unless their authors accept the Saiva non-duality for which he advocates. The argument he offers, despite its historical influence, remains virtually unstudied. The Ubiquitous Siva Volume II offers the first English translation of Chapter Four of the Sivadrsti and Sivadrstivrtti along with an introduction and critical edition. Raj Balkaran is a scholar, educator, consultant, and life coach. For information see rajbalkaran.com. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/new-books-network

PRay TeLL, Dr. Hash
1026 Ubiquitous Propaganda

PRay TeLL, Dr. Hash

Play Episode Listen Later Sep 25, 2021 2:30


politics & humor

Craig Peterson's Tech Talk
Do You Know How to Identify a Fake Web Page? - Whole Show

Craig Peterson's Tech Talk

Play Episode Listen Later Sep 10, 2021 81:44


Do You Know How to Identify a Fake Web Page? The FBI's reporting that more than 70% of all business hacks are because of our employees. They're clicking on emails, they're going to websites, what can we do? How do we know if a website is legitimate or not? [Automated transcript] [00:00:19] There's a great little article that McAfee published now, McAfee is a company that's been in the cybersecurity business for quite a while. [00:00:28] I do not use their products. I use some competing products. I have not been impressed with their products. [00:00:35] Let me tell you this particular web post that they put up is fantastic and you'll see it in my newsletter this week. Make sure you get that. [00:00:45] Have you ever come across a website that didn't look quite right if you haven't, you haven't been on the internet very much because whether you're an individual at home or you are in a business environment, we are likely going to end up on websites that are not legitimate. Sometimes we'll see these things, that company logo might be wrong. There's not enough information on the page. You've been there before and this looks down page. The odds are that you were on a hack site, a site that's trying to get you to do something most of the time when you end up on these sites, they're trying to get you to put in your username and password. [00:01:31] Already that the bad guys have stolen your username and password from so many websites out there. So why would they try and do it this way? It's because if they're pretending to be your bank and you try and log in, They know this as your bank account, and many times they immediately try and get into your bank account or your phone account, whatever it might be. [00:01:56] This is a very long-standing tactic that's relied on by hackers everywhere. Usually it's a knockoff of a real page. They'll take it and they will recreate it. Then it's easy to do if you're in a web browser right now, when you go to your bank's website. You can just go to file, save as, and go ahead and save the entire webpage and you'll get everything. [00:02:23] You'll get all of the links that are on there. All of the graphics that are there, it'll pull it in for you all automatically. And that's all they do. That's what they use. Just a copy. How do they get in front of you in the first place? Typically the hackers will go ahead and send a phishing email. [00:02:43] They'll make the email sound legitimate. They'll make it look legitimate. They'll often even use a URL that looks a lot like it. B the real banks email. I've seen it before where the URL is bank of america.safe site.com. That sort of a thing. I'm not blaming safe site. They could be a great company. [00:03:04] I don't know. I just made it up as we're going, but that type of a URL where it's not really bank of america.com or it's a misspelling of bank of America, that's the sort of thing that gets to be pretty darn common and. Clicking on that link and then submitting your information. It hasn't been leading to credit card fraud, data extraction, wire transfers, identity theft, and a whole lot more. [00:03:34] Now with the COVID relief, that's been out there. All of these things from filing for unemployment claims through filing for PPP protection as a business, the whole. Industry has changed. I'm talking about the hacker industry here, because there are so many people who are falling for these scams and ransomware as well has gone up over 300%. [00:04:08] It's just absolutely amazing. Now, if you go online and you duck, duck, go. Fake login pages. And for those of you who don't know what I mean by that duck go is the search engine I've been recommending lately. It is a search engine that doesn't take politics into play like Google does. And it also does not track you. [00:04:31] And what you're looking at it is ad based. It gets its revenue from advertisement, but it's not selling your information just on the basic search. That you're doing. I think it's a very good alternative, but if you go ahead and your search for fake login pages, you're going to find thousands of guides on how to create websites. [00:04:53] And these bad guys can create these websites in absolutely no time at all. It just a minute or two in order to make one of them. Now it can be difficult nowadays to figure out if it's a fake site, because the, again, the hackers are constantly updating their techniques to be more sophisticated. So it's made it more difficult for consumers to really recognize when something's fraudulent. [00:05:22] Now I want to get it into a psychological term. In attentional, blindness. You've probably heard of this. I remember this from, I think it was college days for me, so a very long time ago, but there's a study that was done on inattentional blindness called the invisible gorilla test. If you go right now online and just search for invisible gorilla test, you'll see a bunch of these coming. [00:05:52] No, there's even a book called that the invisible gorilla test that came out about 11 years ago, 12 years ago, I think. But here's the bottom line on this? They tell you to do something in this study. What they did here is there's a video. People there's six people, three of them are dressed with white shirts and three of them have black shirts and they're passing basketballs back and forth. [00:06:20] The white shirts are only passing to the white shirts and the black shirts under the black shirts. And what they ask you to do is count the number of times the team in white past. Now, you're sitting there watching, knowing they're going to try and fool you, you're paying a whole lot of attention to it. [00:06:40] And then at the end, they ask you a question that may be not expecting the video. I just watched on this, that was called the monkey business. Illusion is the name of this. I counted and I counted carefully and I came up with 16 passes. So the monkey business, illusion, 16 times the people in the white shirts passed the basketball back and forth. [00:07:06] So I got that. But then they said did you notice the person in the gorilla costs? Who walked through the game. He didn't just walk through the game, walked in, beat on this chest and then walked out of the game. If you didn't know about this and okay. In chorus, all honesty, I always try and put everything upfront here. [00:07:29] I knew about it beforehand. I remember from college days. But eight, most people actually about 50% of people who did not know, there is a gorilla in the middle of this. Would not have noticed the gorilla walking through the game, but this monkey business illusion video, there's something else too. [00:07:52] And I've got to admit, I did not notice that. And that is the curtain color change. From red to gold, this curtain that was in the background of all of these players. And I didn't notice one other thing. I'm not going to tell you what that is. You'll have to watch the video of yourself too, to figure that out again, just go online and search for the monkey business illusion. [00:08:19] And I think you'll find it. So the reason I brought this up is because if you come across a well forged login page and you're not actively looking for signs of fraud, you're fairly likely to miss a cybercriminals gorilla. You're likely to miss that the logo's not quite right, or the placement isn't the same as I'm used to. [00:08:45] Because you're focused in, on doing what you're supposed to be doing. It's the whole concept as well of have tunnel vision. And I'm sure you're aware of that. We've all had that before, where we're really focused on this one little thing and we don't notice everything else going on. It particularly happens in high stress times. [00:09:08] So how do you steer clear of the fake login pages? We're going to talk about that when we get. But it's absolutely crucial for everyone, even if you've had phishing training and you are trying to be cautious, you could fall for this invisible gorilla and enter in your personal details, not something that you really want. [00:09:36] Hopefully you guys got my newsletter last weekend. I got a lot of comments on it. People are saving. In fact, that's the first thing I said in this email last week is don't lose this because it went through point by point on about 10 different things that you should be doing too. Yourself and your business safe during the holidays. [00:10:03] Now, of course we had labor day coming up. We're going to have more holidays, right? There's always more holidays in the future and less it's after the first of the year, then you got to wait a long time. Make sure you get it, make sure you dig it out. If he didn't notice it just search for me@craigpeterson.com. [00:10:23] That's where the email comes from and have a look at that. I have links on how to do all of those things. It's very important. FBI warning out just last week. [00:10:33] I just told you about one of the biggest problems we are facing right now, when it comes to hackers and then has to do with fishing and going to fake login pages. Now I'm going to tell you exactly what to do. [00:10:47] How do you steer clear of these fake log-in pages and how do you protect yourself in case you accidentally do provide the bad guys with the information that you shouldn't have? [00:11:01] If they've got your email address or your login name and they have your password, it's pretty easy for them to log in. In most cases right into your bank account. So first of all, don't fall for phishing, but as we just described because of this whole inattentional blindness that we have, it's easy enough to fall, pray for this. [00:11:28] Beat yourself up too bad if you followed, if you fell for some of that stuff, but there is a great little website the Google has that you might want to check out. And that website gives you a real quick quiz, is the best way to. And it shows you some emails and you get to determine whether or not you think it's fishing and then it tells you what the reality of it is. [00:11:59] So go to fishing quiz. Dot with google.com. If you miss that, you can always email me M e@craigpeterson.com and I'll send it off to, but phishing quiz dot with google.com. And of course, phishing is spelled P H I S H I N G fishing. Dot with google.com. So you can go there and right there on the screen, it says, take the quiz. [00:12:30] You can hit it and make up a name and an email address. So it doesn't have to be your real name or your real email address. Okay. It's not going to send you anything. It's not going to sign you up for stuff. It just wants to use it in. Phishing email examples. That's going to give you, so I put in a fake name and a fake email address and it is showing me an email. [00:13:00] So to me, from a Luke, John. And it says Luke Johnson shared a link to the following document, Tony 21 budget department dot doc. So if I click on that, I have now told them, Hey, I'm open to all that sort of stuff. It's so anyways, it's got the link and it's got the opening docs and you now up above say, is this phishing or is it. [00:13:27] Legitimate. Okay. So if we say fishing that says, correct, this is a phishing email. You might have spotted the look alike, you are out. And that is indeed exactly what it is cause it it wasn't legitimate. And remember when you mouse over a link, you can see down at the bottom. The URL that is going to open up for you. [00:13:51] So you can just go through this at your own speed at your own pace and figure it out again. If you didn't get that, you can always email me M E ed Craig peterson.com. And I'll be glad to get back to you. So that's a good way to learn about fishing. I want to con really warn, I should say businesses. If you are sending out phishing emails to your employees to see if they are opening fake phishing emails or not. [00:14:23] That's an okay. Practice. The problems really come in with the companies that are sending out phishing emails and are then following up in such a way that employee is punished in some places they are being punished by if you've opened three fake emails over the last year or whatever it might be. [00:14:47] But over the last year, you're. It's that bad. So we have to be careful. You're not going to increase the confidence of your employees by doing that. And what's, you're actually going to end up doing is slowing down the productivity of your employees. Because now they're going to be really worried about opening, any emails that look like they might be legitimate. [00:15:14] And so your business is going to slow right down. So having some more training about it. Okay. I can see that everyone makes mistakes and we've got to remember that as well, but watch free, man. But we really are trying to get you to move quickly, act fast, or I need this answer right away. Or one of the big ones is we've got this vendor and in fact, I'll, let me give you a real world example. [00:15:41] It's a manufacturing company and of course they. To buy product from vendors, as supplier. And then they use that product or whether it's copper or whatever it might be now to put it all together to make their products. And this one person, this one, hacker a lady again in Eastern Europe, she went and found out about this company. [00:16:08] Okay, great. Found on their website, who the CEO was, who the CFO was. Okay, great. And was able to find the CEO online on Facebook and on his Facebook account, he said, yeah, we're going to The Bahamas. Rear-ending a sailboat. We're going to be out there, the whole family for two weeks. This is going to be fantastic disconnected. [00:16:37] So she found all of that. Now what she had to do was she found out who it was. The CEO, what school he went to. So first she had to get around the restrictions. Cause he had said, don't share my posts with anyone other than friend. So she sent him a message because she found his LinkedIn profile. You see how easy this is to do. [00:16:59] She found his LinkedIn profile and that he went to Harvard and got his MBA. So she sent him. A little note saying, Hey, remember me Janie from X, Y, Z class at Harvard, and want to be friends catch up a little bit. And then he doesn't remember who she is, but the picture looks cute enough. I might as well say yes. [00:17:21] And now she had his contact information over on LinkedIn, send him a friend request over on Facebook as well. That's how she found out he was going to be gone for two weeks. And so now she knows when he's gone. And where he's going to be completely out of touch. So once he's gone about two or three days later, she sent an email off to the CFO inside the company and said, Hey. [00:17:49] We've got this new vendor they've been providing us with product for the last three months. We haven't paid them at all yet. I need you to wire. It was a little more than $40 million because she'd done her homework. She knew how much money the company made, what their expenses probably were. I need you to wire $40 million to this account, or they're going to stop. [00:18:17] All shipments to us. And instead of the CFO doing a little bit more homework into it and digging in and finding out because talking to the people in receiving that we've never received anything from that company. I don't know what you're talking about. And then talking with the guy on the manufacturing floor, the CFO didn't do any of that, just okay. This looks legit. And by the way, it is so easy for these hackers to also gain access to personal email accounts. And we're not going to spend time going into that right now. So he wired. Yes indeed. So there's an example of falling for fishing. A little bit of follow up on the part of the CFO would have shown him that this was not legitimate. [00:19:07] Even over on Shark Tank. Barbara Cochran. She fell prey to this, actually it was her assistant and who wired some $400,000 to a vendor that wasn't real. Now the good news is the assistant copied Barbara who saw the email right away and said, whoa, wait a minute. They called the bank and they put a stop on it.. [00:19:34] Doing a little training here on how to spot fake log-in pages. We just covered fishing and some real world examples of it, of some free quiz stuff that you can use to help with it. And now we're moving on to the next step. [00:19:50] The next thing to look for when it comes to the emails and these fake login pages is a spelling mistake or grammatical errors. [00:20:02] Most of the time, these emails that we get that are faking emails are, have really poor grammar in them. Many times, of course the commas are in the wrong place, et cetera, et cetera. But most of us weren't English majors. So we're not going to pick that up myself included. That's why I use Grammarly. [00:20:21] If you have to ever write anything or which includes anything from an email or a document you probably want to get Grammarly. There's a few out there, but that's the one I liked the best for making sure my grammar. So a tip, to the hackers out there, but the hackers will often use a URL that is very close to it. [00:20:45] Where are you want to go? So they might put a zero in place of an O in the domain, or they might make up some other domain. So it might be amazon-aws.com or a TD bank-account.com. Something like that. Sometimes the registrars they'll catch that sort of thing and kill it. Sometimes the business that they are trying to fake will catch it and let them know as well. [00:21:19] There's companies out there that watch for that sort of thing. But many times it takes a while and it's only fixed once enough people have reported it. So look at the URL. Make sure it's legitimate. I always advise that instead of clicking on the link in the email, try and go directly to the website. [00:21:41] It's like the old days you got a phone call and somebody saying, yo, I'm from the bank and I need your name and social security numbers. So I can validate the someone broke into your account. No, they don't. They don't just call you up like that nowadays. They'll send you a message in their app. [00:21:56] That's on your smart. But they're not going to call you. And the advice I've always given is look up their phone. And by the way, do it in the phone book, they remember those and then call them back. That's the safest way to do that sort of thing. And that's true for emails as well. If it's supposedly your bank and it's reporting something like someone has broken into your account, which is a pretty common technique for these fissures, these hackers that are out there, just type in the bank URL as it not what's in the email. [00:22:33] There will be a message there for you if it's legitimate, always. Okay. So before you click on any website, Email links, just try and go directly to the website. Now, if it's one of these deep links where it's taking new Jew, something specific within the site, the next trick you can play is to just mouse over the link. [00:22:58] So bring your mouse down to where the link is. And typically what'll happen is at the bottom left. Your screen or of the window. It'll give you the actual link. Now, if you look at some of them, for instance, the emails that I send out, I don't like to bother people. So if you have an open one of my emails in a while, I'll just automatically say, Hey, I have opened them in awhile, and then I will drop you off the list. [00:23:28] Plus if you hit reply to one of my newsletters, my show notes, newsletters. That's just fine, but it's not going to go to me@craigpeterson.com and some people you listeners being the best and brightest have noticed that what happens is it comes up and it's some really weird URL that's so I can track. [00:23:51] Who responded to me. And that way I can just sit down and say, okay, now let me go through who has responded? And I've got a, kind of a customer relationship management system that lets me keep track of all of that stuff so that I know that you responded. I know you're interacting, so I know I'm not bothering you. [00:24:11] And I know I need to respond. Much the same thing is true with some of these links. When I have a link in my newsletter and I say, Hey, I'm linking to MIT's article. It is not going to be an MIT. Because again, I want to know what are you guys interested in? So anytime you click on a link, I'll know, and I need to know that, so I know why, Hey, wait a minute. [00:24:36] Now, 50% of all of the people that opened the emails are interested in identifying fake login pages. So what do I do? I do something like I'm doing right now. I go into depth on fake logs. Pages. I wouldn't have known that if I wasn't able to track it. So just because the link doesn't absolutely look legit doesn't mean it isn't legit, but then again, if it's a bank of it involves financial transactions or some of these other things be more cautious. [00:25:11] So double check for misspellings or grammatical errors. Next thing to do is to check the certificate, the security certificate on the site. You're on this gets a little bit confusing. If you go to a website, you might notice up in the URL bar, the bar that has the universal resource locator, that's part of the internet. [00:25:38] You might've noticed a. And people might've told you do check for the lock. That lock does not mean that you are safe. All it means is there is a secure VPN from your computer to the computer on the other side. So if it's a hacker on the other side, you're sending your data securely to the hacker, right? [00:26:05] That's not really going to do you a whole lot of good. This is probably one of the least understood things in the whole computer security side, that connect. May be secure, but is this really who you think it is? So what you need to do is click on their certificate and the certificate will tell you more detail. [00:26:29] So double check their certificate and make sure it is for the site. You really. To go to, so when it's a bank site, it's going to say, the bank is going to have the bank information on it. That makes sense. But if you go for instance on now, I'm going to throw a monkey wrench into this whole thing. [00:26:48] If you go to Craig peterson.com, for instance, it's going to. Connection is secure. The certificate is valid, but if you look at their certificate and the trust in the details, it's going to be issued by some company, but it's going to just say Craig peterson.com. It's not going to give a business name like it would probably do for a bank. [00:27:14] So you know, a little bit of a twist to it, but that's an important thing. Don't just count on the lock, make sure that the certificate is for the place you want to contact. Last, but not least is multi-factor authentication. I can't say this enough. If the bad guys have your username or email address and your password for a site, if you're using multifactor authentication, they cannot get in. [00:27:53] So it's going to prevent credential stuffing tactics, or they'll use your email and password combinations that have already been stolen for mothers sites to try and hack in to your online profile. So very important to set up and I advise against using two factor authentication with your, just a cell phone, as in a text message SMS, it is not secure and it's being hacked all of the time. [00:28:23] Get an authorization. Like one password, for instance, and you shouldn't be using one password anyways, for all of your passwords. And then Google has a free one called Google authenticator. Use those instead of your phone number for authentication. [00:28:40] You're listening to Craig Peterson, cybersecurity strategist, and online@craigpeterson.com. [00:28:48] I've been warning about biometric databases. And I sat down with a friend of mine who is an attorney, and he's using this clear thing at the airport. I don't know if you've seen it, but it's a biometric database. What are the real world risks? [00:29:04] This clear company uses biometrics. [00:29:08] It's using your eye. Brent, if you will, it's using your Iris. Every one of us has a pretty darn unique Iris, and they're counting on that and they're using it to let you through TSA very quickly. And this attorney, friend of mine thinks it's the best thing since sliced bread, because he can just. On through, but the problem here is that we're talking about biometrics. [00:29:34] If your password gets stolen, you can change it. If your email account gets hacked, I have another friend who his account got hacked. You can get a new email account. If your Iris scan that's in this biometric database gets stolen. You cannot replace your eyes unless of course you're Tom cruise and you remember that movie, and it's impossible to replace your fingerprints. It's possible to replace your face print. I guess you could, to a degree or another, some fat injections or other things. Could be done to change your face sprint, but these Iris scans fingerprints and facial images are something I try not to provide any. [00:30:29] Apple has done a very good job with the security of their face print, as well as their fingerprint, because they do not send any of that information out directly to themselves or to any database at all. Period. They are stored only on the device itself. And they're in this wonderful little piece of electronics that can not be physically compromised. [00:30:59] And to date has not been electronically compromised either. They've done a very good job. Other vendors on other operating systems like Android, again, not so much, but there are also databases that are being kept out there by the federal government. I mentioned this clear database, which isn't the federal government, it's a private company, but the federal government obviously has its fingers into that thing. [00:31:29] The office of personnel. For the federal government, they had their entire database, at least pretty much the entire database. I think it was 50 million people stolen by the red, Chinese about six years ago. So the communists. Copies of all of the information that the officer personnel management had about people, including background checks and things. [00:31:55] You've probably heard me talk about that before. So having that information in a database is dangerous because it attracts the hackers. It attracts the cybercriminals. They want to get their hands on it. They'll do all kinds of things to try and get their hands. We now have completely quit Afghanistan. [00:32:20] We left in a hurry. We did some incredibly stupid things. I just, I can't believe our president of the United States would do what was done here. And now it's been coming out that president and Biden completely ignored. The advice that he was getting from various military intelligence and other agencies out there and just said, no, we're going to be out of there. [00:32:46] You have to limit your troops to this. And that's what causes them to close the air base battleground that we had for so many years. Apparently the Chinese are talking about taking it over now. Yeah. Isn't that nice. And whereas this wasn't an eternal war, right? We hadn't had anybody die in a year and a half. [00:33:05] It's crazy. We have troops in south Vietnam. We have troops in Germany. We have troops in countries all over the world, Japan, you name it so that we have a local forest that can keep things calm. And we were keeping things calm. It's just mind blowing. But anyhow, politics aside, we left behind a massive database of biometric database. [00:33:38] Of Afghanis that had been helping us over in Afghanistan, as well as a database that was built using us contractors of everyone in the Afghan military and the basically third genealogy. Who their parents were the grandparents blood type weight, height. I'm looking at it right now. All of the records in here, the sex ID nationality. [00:34:11] Date of exploration, hair color, favorite fruit, favorite vegetables, place of birth, uncle's name marker signature approval. Signature date, place of birth. Date of birth address, permanent address national ID number place of ISS. Date of ISS native language salary data salary, group of salary, police of salary education, father's name, graduation, date, weapon and service now. [00:34:41] These were all in place in Afghanistan. We put them in place because we were worried about ghost soldiers. A gold soldier was someone who we were paying the salary of taxpayers of the United States were paying the salaries of the Afghan military for quite some time. And we were thinking that about half of the. [00:35:06] Payroll checks. We were funding. We're actually not going to people who were in the military, but we're going to people who were high up within the Afghan government and military. So we put this in place to get rid of the ghost soldiers. Everybody had to have all of this stuff. In the database, 36 pieces of information, just for police recruitment. [00:35:39] Now this information we left behind and apparently this database is completely in the hand of the Taliban. Absolutely. So we were talking about Americans who helped construct Afghanistan and the military and the telephone. The looking for the networks of their Ponant supporters. This is just absolutely amazing. [00:36:07] So all of the data doesn't have clear use, like who cares about the favorite fruit or vegetable, but the rest of it does the genealogy. Does they now know who was in the police department, who was in the military, who their family is, what their permanent address is. Okay. You see the problem here and the biometrics as well in the biometrics are part of this us system that we were using called hide H I D E. [00:36:41] And this whole hide thing was a biometric reader. The military could keep with them. There were tens of thousands of these things out in the field. And when they had an encounter with someone, they would look up their biometrics, see if they were already in the database and in the database, it would say, yeah, they're friendly, they're an informant. [00:37:03] Or we found them in this area or w we're watching them. We have concern about them, et cetera, et cetera. All of their actions were in. Turns out that this database, which covered about 80% of all Afghans and these devices are now in the hands of the Taliban. Now, the good news with this is that a lot of this information cannot be easily extracted. [00:37:32] So you're not going to get some regular run of the mill Taliban guy to pick one of these up and start using. But the what's happening here is that we can really predict that one of these surrounding companies like Pakistan that has been very cooperative with the Taliban. In fact, they gave refuge to Saddam, not Saddam Hussein, but to a bin Ladin and also Iran and China and Russia. [00:38:04] Any of those countries should be able to get into that database. Okay. So I think that's really important to remember now, a defense department spokesperson quote here, Eric Fay on says the U S has taken prudent actions to ensure that sensitive data does not fall into the Tolo bonds. And this data is not at risk of misuse. [00:38:29] Misuse that's unfortunately about all I can say, but Thomas Johnson, a research professor at the Naval postgraduate school in Monterey, California says not so fast, the taller Bon may have used biometric information in the Coon dues. So instead of taking the data straight from the high devices, he told MIT technology review that it is possible that Tolo bond sympathizers in Kabul, provided them with databases of military personnel, against which they could verify prints. [00:39:07] In other words, even back in 2016, it may have been the databases rather than these high devices themselves pose the greatest risk. This is very concerning big article here in MIT technology review. I'm quoting from it a little bit here, but there are a number of databases. They are biometric. Many of these, they have geological information. [00:39:35] They have information that can be used to round up and track down. Now, I'm not going to mention world war two, and I'm not going to mention what happened with the government too, before Hitler took over, because to do that means you lose that government had registered firearms, that government had registered the civilians and the people and Afghanistan. [00:40:04] The government was also as part of our identification papers, registering your religion. If you're Christian, they're hunting you down. If you were working for the military, they're hunting you down. And this is scary. That's part of the reason I do not want biometric information and databases to be kept here in the U S Hey, make sure you get my show notes every week on time, along with free training, I try to help you guys out. [00:40:41] If you've never heard of the Carrington event, I really hope, frankly, I really do hope we never have to live through one of these. Again, there is a warning out there right now about an internet apocalypse that could happen because of the sun. [00:40:58] Solar storms are something that happens really all of the time. The sun goes through solar cycles. About every seven years, there are longer cycles as well. You might know. I have an advanced class amateur radio license I've had for a long time, and we rely a lot when we're dealing with short wave on the solar cycle. [00:41:22] You see what happens is that the sun charges, the atmosphere. That if you've ever seen the Northern light, that is. Part of the Sunzi missions, hitting our magnetic field and getting sucked into the core of the earth, if you will, as they get caught in that field. And the more charged the atmosphere is, the more bounce you get. [00:41:46] That's what we call it bounce. And the reason us hams have all these different frequencies to use is because of the bow. We can go different frequencies with different distances, I should say, using different frequencies. So think about it right now. You've got the earth and I want to talk from Boston to Chicago. [00:42:08] For instance, I know about how many miles it is, and I have to figure out in the ionosphere up in the higher levels of the atmosphere, what frequency. To use in order to go up into the atmosphere, bounce back, and then hit Chicago. That's the idea. It's not quite as simple or as complex in some ways, as it sounds, a lot of people just try different frequencies and a lot of hams just sit there, waiting for anybody anywhere to talk to, particularly if they are. [00:42:41] It's really quite fun. Now what we're worried about, isn't so much just the regular solar activity. We get worried when the sun spots increase. Now, the solar cycle is what has primary image. On the temperature on earth. So no matter what, you might've heard that isn't your gas, guzzling car or a diesel truck that causes the Earth's temperature to change. [00:43:10] Remember the only constant when it comes to the Earth's temperature has been changed over the millions of years. We had periods where the earth was much warmer than it is now had more common that carbon dioxide in the atmosphere than it does now had less. In fact, right now we are at one of the lowest levels of carbon dioxide in the atmosphere in earth long. [00:43:36] So the sun, if you might remember, comes up in the morning, warms things up, right? And then it cools down. When the sun disappears at nighttime, it has a huge impact. It's almost exclusively the impact for our temperatures. There's other things too, for instance. eruption can spew all to hold a lot of carbon dioxide. [00:44:01] In fact, just one, just Mount St. Helens wanted erupted, put more carbon dioxide into the atmosphere than man has throughout our entire existence. Just to give you an idea, right? So these alarms that are out there, come on, people. Really, and now we're seeing that in this last year, we had a 30% increase in the ice cap up in the, in, up in the north, up in Northern Canada, around the polls. [00:44:32] We also had some of these glaciers growing. It was so funny. I saw an article this year, or excuse me, this week that was showing a sign that was at one of our national parks. And it said this glacier will have disappeared by 2020. Of course it hasn't disappeared. In fact, it has grown now and it's past 2020. [00:44:54] Anyhow, the sun has a huge impact on us in so many ways. And one of the ways is. Something called a coronal mass ejection. This is seriously charged particles. That tend to be very directional. So when it happens, when there's one of these CMS coronal, mass ejections, it's not just sending it out all the way around the sun everywhere. [00:45:21] It's really rather concentrated in one. One particular spot. Now we just missed one not too long ago. And let me see if I can find it here. Just mast, a cm E near miss. Here we go. There a solar super storm in July, 2012, and it was a very close shave that we had most newspapers didn't mention it, but this could have been. [00:45:51] AB absolutely incredible. We'd be picking up the pieces for the next 50 years. Yeah. Five, zero years from this one particular storm. And what happens is these solar flares, if you will, are very extreme, the CME. You're talking about x-rays extreme UV, ultraviolet radiation, reaching the earth at the speed of light ionizes, the upper layers of atmosphere. [00:46:19] When that happens, by the way, it hurts our communications, but it can also have these massive effects where it burns out saddle. And then causes radio blackouts, GPS, navigation problems. Think about what happened up in Quebec. So let me just look at this back hit with an E and yeah, here we go. And March 13th, 1989. [00:46:50] Here we go. Here's another one. Now I remembered. And this is where Quill back got nailed. I'm looking at a picture here, which is looking at the United States and Canada from the sky and where the light is. And you can see Quebec is just completely black, but they have this massive electrical blackout and it's becomes. [00:47:13] Of this solar storm. Now they, these storms that I said are quite directional depending on where it hits and when it hits things can get very bad. This particular storm back in 1989 was so strong. We got to see their Rora Borealis, the Northern lights as far south, as Florida and cute. Isn't that something, when we go back further in time to this Carrington event that I mentioned, you could see the Northern lights at the eclipse. [00:47:50] Absolutely amazing. Now the problem with all of this is we've never really had an internet up online. Like we have today when we had one of the storms hit. And guess what we're about to go into right now, we're going into an area or a time where the sun's going to be more active, certainly on this 11 year cycle and possibly another bigger cycle too, that we don't really know much about. [00:48:22] But when this hit us back in the 1850s, what we saw was a a. Telegraph system that was brought to its knees. Our telegraphs were burned out. Some of the Telegraph buildings were lit. They caught on fire because of the charges coming in, people who were working the telegraphs, who are near them at the time, got electric shocks or worse than that. [00:48:48] Okay. 1859 massive Carrington event compass needles were swinging wildly. The Aurora Borealis was visible in Columbia. It's just amazing. So that was a severe storm. A moderate severity storm was the one that hit in Quebec here knocked out Quebec electric. Nine hour blackout of Northeast Canada. What we think would happen if we had another Carrington event, something that happened to 150 years ago is that we would lose power on a massive scale. [00:49:27] So that's one thing that would happen. And these massive transformers that would likely get burned out are only made in China and they're made on demand. Nobody has an inventory. So it would be at least six months before most of the country would get power back. Can you believe that would be just terrible and we would also lose internet connectivity. [00:49:52] In fact, the thinking that we could lose internet connectivity with something much less than a severe storm, maybe if the Quebec power grid solar, a massive objection here. Maybe if that had happened, when. The internet was up. They might have burned out internet in the area and maybe further. So what we're worried about is if it hits us, we're going to lose power. [00:50:20] We're going to lose transformers on the transmission lines and other places we're going to lose satellites and that's going to affect our GPS communication. We're going to lose radio communication, and even the undersea cables, even though they're now no longer. Regular copper cables. It's now being carried of course, by light in pieces of glass. [00:50:45] The, those cables need to have repeaters about every 15 miles or so under underwater. So the power is provided by. Copper cables or maybe some other sort of power. So these undersea cables, they're only grounded at extensive intervals, like hundreds or thousands of kilometers apart. So there's going to be a lot of vulnerable components. [00:51:12] This is all a major problem. We don't know when the next massive. Solar storm is going to happen. These coronal mass ejections. We do know they do happen from time to time. And we do know it's the luck of the draw and we are starting to enter another solar cycle. So be prepared. Of course, you're listening to Craig Peterson, cybersecurity strategist. [00:51:42] If you'd like to find out more and what you can do, just visit Craig peterson.com and subscribe to my weekly show notes. [00:51:52] Google's got a new admission and Forbes magazine has an article by Zach Dorfman about it. And he's saying you should delete Google Chrome now after Google's newest tracking admission. So here we go. [00:52:09] Google's web browser. It's been the thing for people to use Google Chrome for many years, it's been the fastest. Yeah, not always people leapfrog it every once in a while, but it has become quite a standard. Initially Microsoft is trying to be the standard with their terrible browser and yeah, I to Exploder, which was really bad and they have finally completely and totally shot it in the head. [00:52:42] Good move there on their part. In fact, they even got rid of their own browser, Microsoft edge. They shot that one in. They had to, I know I can hear you right now saying, oh, Craig, I don't know. I just use edge browser earlier today. Yeah. But guess what? It isn't edge browser. It's actually Google Chrome. The Microsoft has rebranded. [00:53:04] You see the guts to Google Chrome are available as what's called an open source project. It's called chromium. And that allows you to take it and then build whatever you want on top of. No, that's really great. And by the way, Apple's web kit, Kat is another thing that many people build browsers on top of and is part of many of these browsers we're talking about right now, the biggest problem with the Google Chrome. [00:53:35] Is they released it so they could track you, how does Google make its money? It makes us money through selling advertising primarily. And how does it sell advertising if it doesn't know much or anything about you? So they came out with the Google Chrome browser is a standard browser, which is a great. [00:53:55] Because Microsoft, of course, is very well known for not bothering to follow standards and say what they have is the actual standard and ignoring everybody else. Yeah. Yeah. I'm picking on Microsoft. They definitely deserve it. There is what is being called here in Forbes magazine, a shocking new tracking admission from. [00:54:17] One that has not yet made headlines. And there are about what 2.6 billion users of Google's Chrome worldwide. And this is probably going to surprise you and it's frankly, Pretty nasty and it's, I think a genuine reason to stop using it. Now, as you probably know, I have stopped using Chrome almost entirely. [00:54:42] I use it when I have to train people on Chrome. I use it when I'm testing software. There's a number of times I use it, but I don't use it. The reality is that Chrome is an absolute terror. When it comes to privacy and security, it has fallen way behind its rivals in doing that. If you have an iPhone or an iPad or a Mac, and you're using safari, apple has gone a long ways to help secure your data. [00:55:19] That's not true with Chrome. In fact, it's not protecting you from tracking and Dave data harvesting. And what Google has done is they've said, okay we're going to get these nasty third party cookies out of the whole equation. We're not going to do that anymore. And what they were planning on doing is instead of knowing everything specifically. [00:55:43] You they'd be able to put you in a bucket. So they'd say, okay, you are a 40 year old female and you are like driving fast cars and you have some kids with a grandkid on the way, and you liked dogs, not cats, right? So that's a bucket of people that may be a few hundred or maybe up to a thousand. As opposed to right now where they can tell everything about you. [00:56:12] And so they were selling that as a real advantage because they're not tracking you individually anymore. No, we're putting you in a bucket. It's the same thing. And in fact, it's easier for Google to put you in a bucket than to track everything about you and try and make assumptions. And it's easier for people who are trying to buy ads to place in front of you. [00:56:34] It's easier for them to not have to reverse engineer all of the data the Google has gathered in instead. To send this ad to people that are in this bucket and then that bucket. Okay. It makes sense to you, but I, as it turns out here, Google has even postponed of that. All right. They really have, they're the Google's kind of hiding. [00:56:59] It's really what's going on out there. They are trying to figure out what they should do, why they should do it, how they should do it, but it's going to be a problem. This is a bad habit. The Google has to break and just like any, anybody that's been addicted to something it's going to take a long time. [00:57:19] They're going to go through some serious jitters. So Firefox is one of the alternatives and to Google Chrome. And it's actually a very good one. It is a browser that I use. I don't agree with some of the stuff that Mozilla and Firefox does, but again, nobody agrees on everything. Here's a quote from them. [00:57:41] Ubiquitous surveillance harms individually. And society Chrome is the only major browser that does not offer meaningful protection against cross site tracking and Chrome will continue to leave users unprotected. And then it goes on here because. Google response to that. And they admit that this massive web tracking out of hand and it's resulted in, this is a quote from Google and erosion of trust, where 72% of people feel that almost all of what they do online is being. [00:58:19] By advertisers, technology firms or others, 81% say the potential risks from data collection outweigh the benefit by the way, the people are wrong. 72% that feel almost all of what they do on online is being tracked. No. The answer is 100% of what you do is probably being tracked in some way online. [00:58:41] Even these VPN servers and systems that say that they don't do logs. Do track you take a look at proton mail just last week. Proton mail it's in Switzerland. Their servers are in Switzerland. A whole claim to fame is, Hey, it's all encrypted. We keep it safe. We don't do logging. We don't do tracking guess what they handed over the IP addresses of some of the users to a foreign government. [00:59:09] So how can you do that? If you're not logging, if you're not tracking. Yeah, they are. And the same thing is true for every paid VPN service I can think of. So how can Google openly admit that their tracking is in place tracking everything they can, and also admit that it's undermining our privacy. [00:59:36] Their flagship browser is totally into it. It's really, it's gotta be the money. And Google does not have a plan B this anonymized tracking thing that they've been talking about, the buckets that I mentioned, isn't realistic, frankly. Google's privacy sandbox is supposed to Fitbit fix it. [00:59:56] I should say. The whole idea and the way it's being implemented and the way they've talked about it, the advertisers on happy. So Google is not happy. The users are unhappy. So there you go. That's the bottom line here from the Forbes article by Zach Dorfman, delete Google Chrome. And I said that for a long time, I do use some others. [01:00:20] I do use Firefox and I use. Which is a fast web browser. That's pretty good shape. Hey, if you sign up for my shows weekly newsletter, not only will you get all of my weekly tips that I send to the radio hosts, but you will get some of my special reports that go into detail on things like which browser you shouldn't be using. [01:00:46] Sign up right now. Craig peterson.com. [01:00:50] Many businesses have gone to the cloud, but the cloud is just another word for someone else's computer. And many of the benefits of the cloud just haven't materialized. A lot of businesses have pulled back and are building data centers. [01:01:07] Now, the reason I mentioned this thing about Microsoft again, and the cloud is Microsoft has a cloud offering. [01:01:17] It's called Microsoft Azure. Many people, many businesses use it. We have used it with some of our clients in the past. Now we have some special software that sits in front of it that helps to secure. And we do the same thing for Amazon web services. I think it's important to do that. And we also use IBM's cloud services, but Microsoft is been pitching for a long time. [01:01:45] Come use our cloud services and we're expecting here probably within the next month, a big announcement from Microsoft. They're planning on making it so that you can have your desktop reside in Microsoft's cloud, in the Azure cloud. And they're selling really the feature of it doesn't matter where you are. [01:02:11] You have your desktop and it doesn't matter what kind of computer you're on. As long as you can connect to your desktop, using some just reasonable software, you will be able to be just like you're in front of a computer. So if you have a Chromebook or a Mac, Or windows or tablet, whatever. And you're at the grocery store or the coffee shop or the office, you'll be able to get it, everything, all of your programs, all your files. [01:02:41] And we, Microsoft will keep the operating system up to date for you automatically a lot of great selling points. And we're actually looking into that, not too heavily yet. We'll give them a year before we really delve into it at all. Cause it takes them a while to get things right. And Microsoft has always been one that adds all kinds of features, but most of the time, most of them don't work and we can document that pretty easily, even in things like Microsoft. [01:03:11] The verge is now reporting that Microsoft has warned users of its as your cloud computing service, that their data has been exposed online for the last two years. Yeah, let me repeat that in case you missed it, you yeah. I'm I might've misspoken. Let me see, what does it say? It says users of Azure cloud competing service. [01:03:36] So that's their cloud. Microsoft's big cloud. Okay. Their data has been. Exposed online. Okay. So that means that people could get the data, maybe manipulate the data that's exposed means for the last two years. Are you kidding me? Microsoft is again, the verge. Microsoft recently revealed that an error in its Azure cosmos database product left more than 3,300 as your customer's data. [01:04:12] Completely exposed. Okay guys. So this is not a big thing, right? It can't possibly be big thing because you know who uses Azure, nobody uses a zer and nobody uses hosted databases. Come on, give me a break. Let me see, what else does this have to say? Oh, okay. It says that the vulnerability was reported, reportedly introduced into Microsoft systems in 2019, when the company added a data visualization feature called Jupiter notebook to cosmos DB. [01:04:46] Okay. I'm actually familiar with that one and let's see what small companies let's see here. Some Azure cosmos DB clients include Coca Cola. Liberty mutual insurance, Exxon mobile Walgreens. Let me see. Could any of these people like maybe Liberty mutual insurance and Walgreens, maybe they'd have information about us, about our health and social security numbers and account numbers and credit cards. Names addresses. That's again, why I used to get so upset when these places absolutely insist on taking my social security number, right? It, first of all, when it was put in place, the federal government guaranteed, it would never be used for anything other than social security. [01:05:34] And the law even said it could not be used for anything other than social security. And then the government started expanding it. And the IRS started using it. To track all of our income and that's one thing right there, the government computers, they gotta be secure. All of these breaches we hear about that. [01:05:52] Can't be true. So how about when the insurance company wants your personal information? Like your social security number? What business is it of? There's really no. Why do they have to have my social security number? It's a social security number. It's not some number that's tattooed on my forehead. That's being used to track me. [01:06:18] Is it this isn't a socialist country like China is, or the Soviet union was right. It's not social. So why are they tracking us like that? Walgreens? Why do they need some of that information? Why does the doctor that you go to that made the prescription for Walgreens? Why do they need that information? [01:06:40] And I've been all over this because they don't. Really need it. They want, it makes their life easier, but they don't really need it. However, it exposes us. Now, if you missed the email, I sent out a week ago, two weeks ago now, you missed something big because I, in my weekly newsletter went through and described exactly what you could do in order to keep your information private. [01:07:13] So in those cases where websites asking for information that they don't really need, right? You don't want to lie, but if they don't really need your real name, why you're giving them your real name? Why do you use a single email address? Why don't you have multiple addresses? Does that start make sense to you guys? [01:07:33] And now we find out that Microsoft Azure, their cloud services, where they're selling cloud services, including a database that can be used online, a big database 3,300 customers looks like some of them are actually big. I don't know. ExxonMobil pretty big. Yeah. I think so. Walgreens, you think that might be yeah. [01:07:57] Why. Why are we trusting these companies? If you have a lot of data, a lot of customers, you are going to be a major target of nation states to hack you and bat just general hackers, bad guys. But you're also if you've got all this information, you've also got to have a much higher level of security than somebody that doesn't have all of that information. [01:08:24] Does that make sense to you? Did I say that right? You don't need the information and I've got to warn anybody that's in a business, whether you're a business owner or you're an employee, do not keep more data than you need the new absolutely need to run your company. And that includes data about your customers. [01:08:48] And maybe it's even more specifically data about your customer. Because what can happen is that data can be stolen and we just found it. That? Yes, indeed. It could have been, it was exposed Microsoft the same. We don't know how much it was stolen. If anything was stolen. Yeah, Walgreens. Hey, I wonder if anyone's going to try and get some pain pills illegally through a, this database hack or a vulnerability anyways. [01:09:17] All right, everyone. Stick around. We'll be back. Of course, you listening to Craig Peterson. I am a cybersecurity strategist for business, and I'm here to help you as well. You can ask any question any time consumers are the people I help the most, I wish I got a dime for every time I answered a question. [01:09:38] Just email me@craigpeterson.com and stick around. [01:09:44] Whether or not, you agree with the lockdown orders that were put in place over this COVID pandemic that we had. There are some other parts of the world that are doing a lot more. [01:10:00] Australia has. I don't know. I think that they went over the deep end that much, the same thing is true right next door to them. [01:10:11] And I am looking at a report of what they are doing with this new app. You might be aware that both apple and Google came out with an application programming interface. That could be used for contract tack tracking, contact tracking. There you go. It wasn't terribly successful. Some states put some things in place. [01:10:38] Of course you get countries like China. I love the idea because heaven forbid you get people getting together to talk about a Tannen square remembrance. Now you want to know who all of those people were, who were in close proximity, right? Good for China a while, as it turns out, Australia is putting something in place they have yet another COVID lockdown. [01:11:03] They have COVID quarantine orders. Now I think if you are sick, you should stay here. I've always felt that I, I had 50 employees at one point and I would say, Hey, if you're sick, just stay home. Never required a doctor's note or any of that other silliness, come on. People. If someone's sick, they're sick and let them stay home. [01:11:26] You don't want to get everybody else in the office, sick and spread things around. Doesn't that just make sense. They now in Australia, don't trust people to stay home, to get moving. Remember China, they were taking welders and we're going into apartments in anybody that tested positive. [01:11:42] They were welding them into their apartment for minimum of two weeks. And so hopefully they had food in there and they had a way to get fresh water. Australia is not going quite that far, but some of the states down under. Using facial recognition and geolocation in order to enforce quarantine orders and Canada. [01:12:07] One of the things they've been doing for very long time is if you come into the country from out of the country, even if you're a Canadian citizen, you have to quarantine and they'll send people by your house or you have to pay to stay for 10 days in a quarantine hope. So you're paying the, of course now inflated prices for the hotel, because they're a special quarantine hotel. [01:12:34] You have to pay inflated prices to have food delivered outside your door. And that you're stuck there for the 10 days, or if you're at home though, they, you're stuck there and they'll send people by to check up on you. They'll make phone calls to check up on you. They have pretty hefty fines. [01:12:54] What Australia has decided to do is in Australia is Charlene's even going from one state to another state are required to prove that they're obeying a 14 day quarantine. And what they have to do is have this little app on their phone and they, the app will ping them saying, prove it. And then they have to take a photo of themselves with geo location tag on it and send it up via the app to prove their location. [01:13:32] And they have to do all of that within 15 minutes of getting the notification. Now the premier of the state of south Australia, Steven Marshall said, we don't tell them how often or when on a random basis, they have to reply within 15 minutes. And if you don't then a police, officer's going to show up at the address you're supposed to be at to conduct an in-person check. [01:13:59] Very intrusive. Okay. Here's another one. This is an unnamed government spokesperson who was apparently speaking with Fox news quote. The home quarantine app is for a selected cohort of returning self Australians who have applied to be part of a trial. If successful, it will help safely ease the burden of travel restrictions associated with the pandemic. [01:14:27] So there you go. People nothing to worry about. It's just a trial. It will go away. Just for instance, income tax, as soon as rule, number one is over, it will be removed and it will never be more than 3% and it will only apply to the top 1% of wage-earners. So there you go. And we all know that world war one isn't over yet. [01:14:47] So that's why they still have it in somehow. Yeah, some of the middle class pays the most income tax. I don't know. Interesting. Interesting. So there you go. Little news from down under, we'll see if that ends up happening up here. News from China, China has China and Russia have some interesting things going on. [01:15:08] First of all, Russia is no longer. Country, they are. They aren't, they are a lot freer in many ways than we are here in the United States. Of course, China, very heavily socialist. In fact, they're so socialists, they are communist and China. And Russia both want their kids to have a very good education in science, engineering, and mathematics. [01:15:35] Not so much on history, not so much on, on politics. But definitely heavy on the sciences, which I can see that makes all the sense. I think everybody should be pretty heavily on the science. According to the wall street journal this week, gamers under the age of 18 will not be allowed to play online games between 8:00 PM and 9:00 PM on Friday, Saturdays and Sundays. [01:16:02] Okay. So basically what they're doing, I reverse that what they're doing is they're only allowing the kids three hours of gaming per week. In other words, they can play between eight and 9:00 PM, Friday, Saturday, and Sundays. I think that might overload some gaming servers. Cov gaming addiction has affected studies and normal lives. [01:16:23] And many parents have become miserable. That's China's press and public administration. Sedna state. Okay. There's going to be some relief during the school holidays. Children will be allowed 60 minutes per day for gaming hard to say how China plans didn't force it, but they have their ways, identity cards. By the way required for playing online. They've got a facial recognition system introduced in July by 10 cent. Remember all of the uproar around 10 cent and their apps and president Trump trying to get them blocked here in the U S yeah, there you go. Facial recognition bill right into the app, and it's proven effective at catching children pretending to be adults in order to get around government gaming curves. [01:17:12] So this goes on and on and Korea as well, South Korea has had some very big problems. You might remember it was headlines just a few years ago of some of these south Korean kids dying because they were playing video games four days straight with no sleep, no real food. Just taking all of these energy. [01:17:37] And we'll literally gaming themselves to death. So South Korea passed a law that prevented young people from playing online video games late at night. So that was introduced back in 2011 and it's targeted at players 16 or up. And south Korean miners were prevented from playing online PC games between midnight and six, 8:00 AM. [01:18:03] Now South Korea has scrapped that law. Interesting. So they're saying it's out of respect for younger citizens, right? They're going to abolish this law, replace it by. Permit system that allows players to request a permit per game and play during self-assigned hours that their parents will sign off on. [01:18:27] This is in an article from GameSpot, by the way, a gamespot.com. You might remember them too, the whole Robin hood scandal. But I think it's an interesting question. When my kids were young lo those many years ago I got this box that the, you took the TV wire, you ran it into the box and you could program. [01:18:51] So that each kid had their own code and you could specify how much time the kid could watch TV or how much time or when they could watch TV and how much time cumulative the kids could have. And it actually worked pretty well. And the kids certainly complained a lot about it. And a couple of them tried to work the way around it hard to when the plug is inside the box. [01:19:17] Yeah, ingenuity as they are. They were able to do that. They cut the wire off and put another power connector on the end of the TV wire. Anyhow Microsoft, we've been talking about them a lot. This show. I do not like Microsoft, that already the windows 11 is coming out and we talked about. [01:19:38] Before, because windows 11 is plying. Microsoft is planning on requiring you to have a very modern computer. You need to have a TPM in it, which is this special security module. You need to have a certain speed, et cetera, but the TPM is a big thing. That's going to make it. So most of your computers won't work. [01:20:04] Tons of pushback on that. I can see what Microsoft is trying to do it. They really would love to have a clean operating system that really wasn't getting hacked all the time. And this will help it won't solve their problem, but it will help. So that they're going to be doing now is they're going to over

Ubiquitous Growth
Ubiquitous Growth 128 "Tracks"

Ubiquitous Growth

Play Episode Listen Later Sep 6, 2021 9:18


One hundred and twenty-eighth Episode released on 09/06/2021. Happy Monday UG Fam! It's been a crazy holiday weekend for me. I hope you guys enjoyed it as well. I've been going through a lot mentally over the past few months. I've lost a lot of people I love. Having Drake drop CLB and Kayne drop Donda had me in my feelings over everything. I've been off the tracks for awhile now, and it's been a constant back and forth battle. At times, I want to throw in the towel but I realize that ain't me and never will be. I ended up going down to Oregon's first football game vs Fresno State. It's always a good thing going back to the place that molded me into who I am. It was a last minute thing but I felt the urge to go. Something in me told me to go down and I'm glad that I did because I was paying attention to the people I met and the things I saw. On this episode, the first thing I talk about is that getting off the tracks is going to happen. It's on us on how far off you go and how long. Secondly, I talk about paying attention to messages you are delivered while you are off the tracks. At a gas station, there was a rock next to the card reader that read "love yourself". I ended up asking the young employee who put it there and he told me "I did, I've been struggling with who I am and want people to have a reminder to really love themselves". I received the message, I didn't think it was random, I believe it was there for me. I also met a good soul who I ended up having a deep conversation with about what I'd been going through. Later in the night, she randomly pulled out a bouncy ball and started bouncing it around. On Friday morning, I had tweeted "You know how I bounce". I didn't take this as a coincidence. Once again, I received the message. It's up to you if you receive these messages as a "blessing". Last I talk about how no matter how long you're off the tracks, you can find your way back. I truly feel as though these things occurred in order for me to get back on my tracks and go further in life. We learn from our failures, we just have to keep failing, keep learning, and keep pushing. If you get off the tracks, get back on and GO FURTHER this time before getting off again. Thank y'all for the continued support. Still thrilled to be bringing you more content and I appreciate any and all feedback. Continuing to use my voice to spread growth to the world in my own way. Today's episode touches on the following topics: 1. Getting off the tracks is going to happen 2. When you're off the tracks, pay attention to what messages appear 3. No matter how long you're off the tracks, you can find your way back #BlackLivesMatter #StopAsianHate Thank you and I'll catch you later. [Intro/Outro music credit: Instrumental produced by Hastro Beats] Follow me on Instagram @mannsmm to chat about life/growing --- Support this podcast: https://anchor.fm/michael-manns/support

Ubiquitous Growth
Ubiquitous Growth 127 "Grit"

Ubiquitous Growth

Play Episode Listen Later Aug 20, 2021 11:44


One hundred and twenty-seventh Episode released on 08/20/2021. Happy Friday UG Fam! Man if you missed the episode last week, there was a lot of emotion in that one as my emotions were super heightened during that time frame, probably a good one to go back and check out. Today, I was a bit more laxed, even on the energy, but I still think I went over some good topics for you guys. First, I talk about just getting an objective opinion about whatever it is you are going through. Sometimes, it's just time to finally admit you need an outside resource to get through some things. That is okay, you shouldn't feel like it's not. An alternative could be to use your writing to get out feelings as well. This has always worked very well for me as I believe it's very therapeutic but that could just be my personality. Everyone is different. Second, I talk about revenge, which I totally think is okay to feel and go through as long as you keep control of it. It's a natural thing for us humans to feel. It's a tool to prevent others from taking advantage of us. It can also be very pleasing for the person experiencing that revenge. You've heard the saying sweet revenge. But don't let it become an addiction. Yes, you can let it fuel you, but keep it under wraps and have an awareness to it. Personally, I'm in that place right now, but I know it, and I also know where I'm going and I also know it's more about myself than it is about anyone else. I know my finish line in the revenge plot. Third, I talk about being able to accomplish feats while being broken, and that can be physically, emotionally, or mentally. The ability to do so, is called GRIT. This is a word I've talked about before as one of my life's greatest mentors taught me it. Please take time to learn it and develop it in your daily life. If you can take your mind to another place when the going gets tough. You can alter your results however you want. Thank y'all for the continued support. Still thrilled to be bringing you more content and I appreciate any and all feedback. Continuing to use my voice to spread growth to the world in my own way. Today's episode touches on the following topics: 1. Sometimes you need to talk or share to people outside your circle 2. Revenge has upsides when under control 3. Being broken and still pushing through is GRIT #BlackLivesMatter #StopAsianHate Thank you and I'll catch you later. [Intro/Outro music credit: Instrumental produced by Hastro Beats] Follow me on Instagram @mannsmm to chat about life/growing --- Support this podcast: https://anchor.fm/michael-manns/support

The Bridge: w/ Jared Michaels & Chris Searles
Daniel Lavelle on Indigenous Peoples' Rights

The Bridge: w/ Jared Michaels & Chris Searles

Play Episode Listen Later Aug 17, 2021 66:04


“These are insights i will think about and integrate over time.” (—Jared) In this masterclass of an interview with Daniel Lavelle, U.S. Director for Survival International, Daniel explains his organization's courageous work and why indigenous sovereignty and human rights are priority one for the global environmental solution. It's an eye-opening session we recommend to every listener. Be sure to check out Daniel's organization as well. About DanielDaniel earned his PhD in Philosophy and Environmental Science, Policy and Management from UC Berkeley. He's been US Director of Survival International since 2018. Audio CaveatWe apologize for some of the audio quality. Yes, it gets a bit noisy at times, but Daniel was so “on” we didn't want to stop. Please bear with the pops and purrs, it's more than worth it. Also, special bonus: Daniel's dog joins us at a few key moments! Questions Asked Tell us why Indigenous Peoples are so important to the global environmental solution?  What woke you up to Indigenous rights as a focal issue for human advancement? What have you learned from Indigenous Peoples after working with them in the field?  Is “indigenous wisdom” (stewardship of the earth) a real thing? What are the best ways to help indigenous people now?  What does the future look like if and after we achieve the Indigenous Peoples' Solution? (Ubiquitous empowerment of land occupation rights, self-determination, basic safety and human rights, and respect for all traditional peoples.  Noted SurvivalInternational.org Stephen Corry's blog series exploring the worldview behind today's conservation Survival International's page about Uncontacted Tribes Survival International's petitions page 80% of Earth's biodiversity lives on Indigenous lands today (IUCN) Indigenous peoples are putting their lives on the line (Mongabay, NYTimes) Indigenous Peoples are also under threat from some of the solutions proposed by the global north (Mongabay, Survival International) Daniel's Bridge solution"The optimal future would be a world based on justice."Select quotes"Indigenous peoples are on the frontlines of resistance to destructive forces, putting their lives on the line; it's very dangerous doing environmental work.""80% of the biodiversity we still have left on the planet is in Indigenous territories, even though Indigenous peoples control maybe 20% of the globe. Within that territory you have this amazing repository of extremely important biodiversity.""Indigenous Peoples are also under threat from some of the solutions proposed by institutions and governments in the global north to address the environmental crisis."MusicThanks so much to Alice Spencer for her song, "I Wanna Be a Buddhist," our theme. Enjoy Alice's full performance of the song here. 

Source & Co.
Kelli Lemon - The Ubiquitous (Episode 63)

Source & Co.

Play Episode Listen Later Aug 16, 2021 61:18


When one thinks of the 804, there are a few names that come to mind. But there is one name, regardless of topic, that can be brought up in almost any 804 conversation. Wanna find something to do in the city? ✔️ Looking for those weekend lottery numbers? ✔️ Need a spot to chill downtown? ✔️ Trying to figure out who that woman is hyping up the Art of Noise crowd? ✔️ Heard of the Jackson Ward Collective? ✔️ Waiting for the next Richmond Black Restaurant Experience event? ✔️ And the list goes on and on. We talked about: -how she made her way from the 757 to the 804 -her connection to UVA and VCU -being a social entrepreneur -her top 5 musical artists -…and much more. Welcome to the stage, today's company… Ms. Dope and Different herself, Kelli Lemon @likethefruit -Source

Ubiquitous Growth
Ubiquitous Growth 126 "Unpack"

Ubiquitous Growth

Play Episode Listen Later Aug 13, 2021 14:24


One hundred and twenty-sixth Episode released on 08/13/2021. Happy Friday UG Fam! Where do I even begin? First off, thank you if you are still here. I can't even count anymore the number of times I have dropped off on this podcast. I know I have a gift for this and I know that the creative in me wants this to work, but the consistency that I preach isn't there. This might end up being the longest episode description just due to the time gap but also everything that has transpired in my life. I think when I left y'all the last time I had just gotten back from a trip to Montana that was amazing. I brought in a ton of perspective from that trip and dropped it on here, so if you haven't listened to that episode go back and do that. Speaking of trips, thats where I've been, but a lot happened prior and after, obviously I wasn't gone for an entire month. Prior to this huge summer trip, I had pre-planned it out with one of my closest and realest friends since the start of the year. We created an itinerary for 3 cities, 2 on the east coast and 1 in the south. During the course of this past year, I had developed an unimaginable romance with a particular person. I can't even begin to explain the type of love that ran its course. It was unlike anything I'd ever experienced in my life. The start of the summer was filled with memories and build up with this particular love interest. So of course this itinerary was created around this person. I had pulled out all the stops, after all this was going to be my second chance to obtain this individual. We had already went through a split earlier in the year, after which I turned into a f****** beast. I had changed my entire life and was seeing the greatest output and energy I'd ever seen after the first split. So going into all this I was coming hard. Probably too hard, too much pressure. I'm a Leo after all. I won't get into all the details, but what I presumed to be a pivotal type of trip in my life definitely lived up to that. Just not in the way in which I thought. Instead, I was once again left heartbroken. 808's and heartbreak was the first album I played hopping in the whip. I turned to alcohol, one of my most troublesome vices to numb the pain. This was the very vice I had gained control over earlier in the year to turn into that beast I referenced. I let people down close in my life by not setting a good example and for that it weighed on my conscience. I know everyone makes their own decisions, but god damn Mike, you are supposed to be the one leading by example. I led poorly and I went to a dark place. The trip however, did turn out pivotal, just in a completely different way than I ever imagined. I still met a ton of amazing people, saw amazing talented creatives do their thing, ate amazing bomb food, had plenty of ab hurting laughs, and made a plethora of irreplaceable memories. Overall, I was placed in very uncomfortable situations and grew a ton. Coming back though, I had to unpack everything that had transpired. I had to dive deep into why things had transpired and that led me down a path I never wanted to go down. But one I had to take in order to really understand where I need to go from here on out. It's time, it really is. Thank y'all for the continued support. Still thrilled to be bringing you more content and I appreciate any and all feedback. Continuing to use my voice to spread growth to the world in my own way. Today's episode touches on the following topics: 1. Heartbreak happens 2. Unpacking the contents to your life is difficult 3. In order to grow, you have to get uncomfortable #BlackLivesMatter #StopAsianHate Thank you and I'll catch you later. [Intro/Outro music credit: Instrumental produced by Hastro Beats] Follow me on Instagram @mannsmm to chat about life/growing --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/michael-manns/support

The Gray Area
Ubiquitous Conversations with Tony Casillas

The Gray Area

Play Episode Listen Later Jul 21, 2021 81:05


Chad and Cheatham hang out with comedian Tony Casillas! This episode is all over the place so buckle up, get your popcorn, and enjoy the ride. The guys talk about Tony Casillas opening for Ron White, Joe Rogan, and Tony Hinchcliffe, what Cheatham would do for a nightcap with Madonna and Britney Spears, and Chad's obsession with a specific part of the human anatomy. There's a lot going on! Please like, share, and subscribe!   Everyone has a story, and none are the same. Comedian Aaron Cheatham looks to share perspectives that may be overlooked, through thoughtful and fun conversations.    Stand-Up Comedian by night, Podcast host by day, Aaron Cheatham will challenge your perspective. He will push you to be thoughtful while moonlighting as a personal trainer specifically targeting proper core control as his improv comedy leads to uncontrollable laughter. Broaden your mind, change your perspective and engage your big belly laugh box, your core. Stand-up comedian Cheatham will have you delightfully inspired as he interviews people from all walks of life while they share their story, Perspective and have some serious improv comedy intertwined.    The Gray Area lives and thrives in the unknown. Join Stand-up Comedian Aaron Cheatham on his genuinely improvised comedic journey through the stories that make his guests unique. Laugh with us as we step into the deeply comedic perspective shifting Gray.     Instagram - https://www.instagram.com/podcastthegrayarea Twitter - https://twitter.com/podcastgrayarea Facebook - https://www.facebook.com/thegrayareapodcast   Hot Pie Media is an on-demand digital audio/video entertainment network with interests primarily in the creation of original, relevant, and entertaining podcasts.    https://hotpiemedia.com See omnystudio.com/listener for privacy information.

The Dental Hacks Podcast
Very Dental Shorts: Ubiquitous Capture

The Dental Hacks Podcast

Play Episode Listen Later Jul 19, 2021 24:34


Have you ever heard of "Getting Things Done?" It was a book/system to help people be more productive. Al was affected by this back in the blogging days (the late oughts) and found an interesting practitioner by the name of Merlin Mann. Merlin's blog "43 Folders" was on my reading list for years between 2008-2012 or so. He's an interesting thinker and he coined a phrase that stuck with me. That phrase was "ubiquitous capture." Today's episode is about how I've tried to incorporate the concept into dentistry.  Do me a favor...invite a friend or colleague to become a listener to the Very Dental podcast. Better yet, show them how to download a podcast on their phone! Also, go join the Very Dental Facebook group using password: Timmerman! Would you like to support the podcast? Then you should take a look at our sponsors! The Very Dental podcast is brought to you by the Wonderist agency. The best marketing agency to build your website, logo, SEO, design, Google Ads, social media and on. And on. Marketing your dental office...the Wonderist Agency can help! Find out more at wonderistagency.com! Very Dental is also brought to you by our friends at Microcopy Dental. Single patient use carbide burs, diamond burs, polishers and a variety of single use products that make your office more efficient, make your infection control simpler and your dentistry better! Find more information at microcopydental.com/verydental! The Very Dental Podcast network is supported by Crazy Dental! Go check out some of the best selection of dental supplies powered by an amazing website! If Crazy Dental doesn't have it, you probably don't need it! Plus, you can use the coupon code "VDP10" to get another 10% off their already amazing prices and it helps support the podcast! Go check them out at www.crazydentalprices.com! Very Dental is also supported by Enova Illumination! Enova makes custom made loupes and the very best headlamps in all of dentistry. They also sell the amazing Zumax line of dental microscopes (I've got one in my office...it's amazing!) Go take advantage of the discount that they offer Very Dental people at https://bit.ly/3cSvfta. 

Ubiquitous Growth
Ubiquitous Growth 125 "Big Sky"

Ubiquitous Growth

Play Episode Listen Later Jul 2, 2021 11:31


One hundred and twenty-fifth Episode released on 07/02/2021. Happy Friday UG Fam! Man was I glad to get out of the blistering Portland heat last weekend. Who would of thought helping move my friends would save me from a heat wave. Hope you guys managed to stay cool and hope y'all are about to have a safe Fourth of July Weekend. This episode stems from my trip to Missoula, Montana to help my friends move into their new home. I was able to take some things away, some things have been shared on the pod before but were worth sharing again. First, I tell you guys to always help your friends move which I have already said before. Not only will you be able to rely on them when it comes your time. I also believe you will get good karma coming back your way. Second, I talk about appreciating when friends show you pockets of heaven on earth. Especially when you know they put time and effort into giving you an experience. You should honestly be sincerely grateful and show that to them. Last, I talk about no matter the environment you can adapt and be productive and continue to do the things that you care for. You should find a way and this honestly tells a lot about who you are and the person you've become. If it matters, you will be doing it no matter where in the world you are. This trip was an amazing experience for me. I got to see more perspective and was honestly blown away. I loved it so much I definitely want to go back and show others as well. The Big Sky was no lie and it's someone you have to see with you own eyes for sure. Thank y'all for the continued support. Still thrilled to be bringing you more content and I appreciate any and all feedback. Continuing to use my voice to spread growth to the world in my own way. Today's episode touches on the following topics: 1. Help your friends move, good karma kickback 2. Be sincerely grateful for experiences given to you by friends 3. Adapt to the environment to fit your needs when traveling #BlackLivesMatter #StopAsianHate Thank you and I'll catch you later. [Intro/Outro music credit: Instrumental produced by Hastro Beats] Follow me on Instagram @mannsmm to chat about life/growing --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/michael-manns/support

Brian J. Pombo Live
Ubiquitous Content Strategy

Brian J. Pombo Live

Play Episode Listen Later Jun 30, 2021 8:23


Brian talks about the impact Fred Seibert had on him, in-terms of content marketing, when Fred was running Frederator Studios back in 2007. Podcast interview with Fred – https://podcast.venturevoice.com/episodes/vv-show-43-fred-seibert-of-frederator-studios-and-next-new-networks-CLYs4bV1 Checkout Fred’s new venture FredFilms – https://www.fredfilms.com/ Transcription Ubiquitous content strategy. Hi I’m Brian Pombo, welcome back to Brian J. Pombo Live. We’re gonna be talking […] The post Ubiquitous Content Strategy

Ubiquitous Growth
Ubiquitous Growth 124 "Unfocused"

Ubiquitous Growth

Play Episode Listen Later Jun 25, 2021 13:47


One hundred and twenty-fourth Episode released on 06/25/2021. Happy Friday UG Fam! I feel like a broken record at times, because throughout the life of this pod, I've had periods of times where I struggle to maintain its consistency. Life happens and I got a lot of things pulling me in many different ways. I know at my core I'm meant to do this though. I always find my way back. It's been almost a month and while my focus has laid in other areas, I know I need to put some more focus here as it's part of my journey. I hope y'all stay cool this weekend out here in Portland. 100+ degrees! I'm heading to Missoula, Montana and will be driving while this drops to go help my friends move into their new home and visit. Thankfully it will be upper 80's there, so I'm grateful the weather worked out for me. On this episode I talk about leading people to the lake, but understanding you can't force them to drink. It's not your responsibility and only they can do it for themselves. Help lead, but don't push. Move on to those that do want to drink and you'll find those will be the people you associate with more. Second, I talk about losing focus as this was clearly evident for me over the past month and I had to take inventory of this. You know, the first part of this year reminds me a lot of a stock's chart. Breaking to the upside and going on a run, only to break off and fall down for a bit. I think it's important that you start to understand your slipping and you have honest conversations with yourself. I also think once you start communicating with those close to you about it, that's a good clue you're telling yourself to get back in rhythm so go do it. Last, I talk about how there are going to be bad things that people do to you in life. Don't let hate consume your heart. Let it go, take the high road, and let God, the universe, your higher power or whatever you believe in to handle those things. You don't want negative thoughts in your mind, you don't want to receive them. Scratch them out. It's also not on you to fix things. Also, just because you perceive it as "bad" doesn't necessarily make it bad. The bad things may have been validated by the other being. You don't walk in someone else's shoes. Let things go and focus on pleasantness within yourself and around you. You really can't do that with hate in your heart. ALRIGHT TIME TO GO PACK LOL. Thank y'all for the continued support. Still thrilled to be bringing you more content and I appreciate any and all feedback. Continuing to use my voice to spread growth to the world in my own way. Today's episode touches on the following topics: 1. You can lead people to the lake, but you can't make them drink 2. Losing focus 3. There are going to be bad things people do to you, don't let hate consume your heart #BlackLivesMatter #StopAsianHate Thank you and I'll catch you later. [Intro/Outro music credit: Instrumental produced by Hastro Beats] Follow me on Instagram @mannsmm to chat about life/growing --- Support this podcast: https://anchor.fm/michael-manns/support

Creating Structure
Creating Structure Podcast #19, Miles Barr and David Maikowski, Ubiquitous Energy, "Truly Transparent Solar"

Creating Structure

Play Episode Listen Later Jun 19, 2021 56:10


"Truly transparent solar"I repeat"Truly Transparent Solar"Welcome to this discussion around innovation, proof of concept, formation, process, technology, advancement and growth with Miles Barr and David Maikowski of Ubiquitous Energy. Ubiquitous means "everywhere" and this solar technology could literally be "everywhere" glass surfaces reside. Ubiquitous Energy is a truly transparent BIPV technology like  a "Low-E" glass coating, yet creates energy from the sun. Miles Barr is a founder, inventor, former CEO and now CTO of Ubiquitous Energy. David Maikowski is the Director of Channel Development.Listen to this discussion about the potential "game-changer" technology, applications, and markets, innovation and more. I'll let the interview speak for itself. Leave a comment, share, and spread the word. Listen and enjoy!Guests:Miles Barr, CTO, FounderLinkedIn: https://www.linkedin.com/in/miles-barr-10401765/David Maikowski, Director of Channel DevelopmentLinkedIn:https://www.linkedin.com/in/dmaikowski/Ubiquitous EnergyWebsite: https://ubiquitous.energy/LinkedIn:https://www.linkedin.com/company/ubiquitous-energy-inc-/Twitter: https://twitter.com/ubiquitousenrgy?lang=enFacebook:https://www.facebook.com/UbiquitousEnrgy/Host:John L Wheaton, PE, CEO, Wheaton SpragueBlog: https://johnlwheaton.com/LinkedIn: https://www.linkedin.com/in/john-wheaton-pe-leed-ap-0694886Twitter: https://twitter.com/JohnLWheaton1Instagram: https://www.instagram.com/johnlwheaton1/Wheaton SpragueCompany: https://www.wheatonsprague.comTwitter: https://twitter.com/wheatonsprague Instagram:https://www.instagram.com/wheatonsprague/Facebook: https://www.facebook.com/wheatonsprague/    Audio, Engineering, Jinglehttps://www.instagram.com/rustbeltmoneyprod/

Footy Prime The Podcast
Euro 2020 takes Centre Stage, UEFA on the hot seat, WCQ with Canada qualifying, Craig's worst goal ever

Footy Prime The Podcast

Play Episode Listen Later Jun 17, 2021 48:43


Portugal, France, England, Italy playing well, Turkey underachieving, Denmark pressured by UEFA?  Worst goal ever and the best athlete of all time, a Pekinese! B's wife returns.  And bring Superstars back!  The fellas are Ubiquitous!

Sheppard Mullin's Nota Bene
The New Global Business of Cyber Attack, from Ransomware to a Now-Ubiquitous State of Breach with Kari Rollins [Replay] [NB 130]

Sheppard Mullin's Nota Bene

Play Episode Listen Later Jun 16, 2021 50:34


This episode is a replay of Episode 114 which originally aired on February 23, 2021.  Cyber attacks have become big business, from the standpoint of both the attackers, and attorneys pursuing liability compensation from corporate attack victims.  Threat actors range well beyond hacker cults of old, now including sophisticated state actors, large businesses organized for the very purpose of cyber breach and theft, and complex threat networks that aggregate information formerly treated as innocuous.  Ransomware is changing the state of cyber insurance, and both National and State regulations across the globe are entering the field to govern the conduct of business victims in this climate, both in terms of ransom payments themselves, and subsequent obligations to persons whose information goes out the pipes.  Breaches, in short, are now a ubiquitous part of the multinational business landscape, and failing to test system vulnerability can present existential risk to any global business organization.    We're joined by attorney and cybersecurity expert Kari Rollins to discuss what companies can, and in some cases must, do to prepare for a potential cyber attack. Kari M. Rollins is a partner in the Intellectual Property Practice Group and an Office Managing Partner of the Sheppard Mullin New York office. Kari focuses on data privacy and data security, and complex commercial litigation matters. She has successfully represented clients in the financial services, audit and accounting, retail and fashion, food services, hospitality, manufacturing, and technology industries before state and federal courts, as well as in front of state attorneys general, federal regulators, and U.S. and international commercial arbitration forums. What We Discussed in This Episode: What are 5 truisms companies should understand when evaluating cybersecurity or data breach risks? Are there certain types of businesses that are at greater risk for attacks? How can you best understand and abide by your security and privacy obligations as a business? Regardless of the systems in place, how can companies account for human error? Why training, auditing, and compliance with cybersecurity standards should be part of any incident response plan? What are some of industry-specific audit and compliance obligations? How can you prepare your “cybersecurity story”? Can there be more than one threat actor involved in an attack? What are several preparedness steps to avoid modern developments in ransomware? For companies that are attacked, how can they make proper payment in order while avoiding further attacks? Contact Information: Kari's Sheppard Mullin attorney profile https://www.sheppardmullin.com/krollins  Thank you for listening! Don't forget to FOLLOW and/or SUBSCRIBE to the show to receive every new episode delivered straight to your podcast player every week. If you enjoyed this episode, please help us get the word out about this podcast. Rate and Review this show in Apple Podcasts, Amazon Music, Stitcher Radio, Google Podcasts, or Spotify.  It helps other listeners find this show. Be sure to connect with us and reach out with any questions/concerns: LinkedIn Facebook Twitter  Sheppard Mullin website This podcast is for informational and educational purposes only. It is not to be construed as legal advice specific to your circumstances. If you need help with any legal matter, be sure to consult with an attorney regarding your specific needs.

INpowered Mind-INpowered Health - the keys to heart aligned living, with host Jayne Marquis
Dr Karl Moore PhD - "Natures Twist", Homeopathy, and In Search of the True Reality of Life.

INpowered Mind-INpowered Health - the keys to heart aligned living, with host Jayne Marquis

Play Episode Listen Later Jun 1, 2021 68:47


In this episode, Jayne talks to Dr. Karl Moore Ph.D. Karl is a Physicist, Homeopath, and Author of "Natures Twist". Natures Twist is an exploration of the world based on spin and in particular the vortex. It is a little-known fact that everything spins from the Quantum States to Galaxies. And that spirals are Ubiquitous (everywhere)...our heart pumps blood out in a spiral motion, and through our arteries. Our DNA is spiral. Spirals are found everywhere in nature, from shells, fiddleheads, flowers, to tornadoes, which leads to a discussion on how the nature of this is within us and could be what explains our connection to consciousness, the Universe, and beyond. Karl also goes into a deep discussion into the explanation of homeopathy, the memory of water, and the nature of reality itself. Prepare to spiral up! #jaynemarquis #spiral #homeopathy #naturestwist #karlmoore #NaturesTwist #empwerment For more INpowering episodes - https://linktr.ee/INpoweredhealth https://www.amazon.ca/Natures-Twist-Water-Spirals-Life/dp/191607569X This podcast is for information purposes only and represents the views and opinions of the speakers. The information presented is not meant to diagnose, treat, cure, or prevent disease. We recommend you seek the advice of a licensed healthcare practitioner before beginning any natural, complimentary, or conventional treatment.

DIY Recording Guys
70: Back to Basics: Plugins!

DIY Recording Guys

Play Episode Listen Later May 31, 2021 39:32


Ah plugins. Ubiquitous in he advertising feeds of all DIY music producers. These little bits of software seem to do magical things to audio and there's so many of them! What are they? How do you use them? Got any sweet tips? You know we do!On this episode, you will learn: A bit about the history of plugins About different plugin formats Plugin versions vs. standalone versions of software How emulations of classic hardware were developed and why plugins have gotten SO MUCH better of the last couple of years When to use (and when to avoid) presets About some cool free plugins that Vadim uses Why always trying to push plugins hard can lead you to develop your unique sound When to buy plugins and, more importantly, when to avoid buying plugins And more! Where to Find the GuysFree DIY Recording eBook: https://www.howtorecordyourband.comVadim's Studio Site - Get your FREE test mix today! - https://www.calmfrogrecording.comBenjamin's Studio Site - https://www.dreamloudstudio.comLeave a rating. Be a friend - http://www.getpodcast.reviews/id/1494761702

Practise Makes Practice
Episode 10 - Ubiquitous Languages - With Andrew Herzog

Practise Makes Practice

Play Episode Listen Later May 28, 2021 97:24


In episode 10, we catch up with multidisciplinary conceptual artist and designer, Andrew Herzog. We discuss Andrew's approach to making work that utilizes the ubiquitous language(s) for the potential of mass accessibility to his body of work. Andrew has made artworks that have occupied museums, galleries, and city streets. He was previously a co-founder and partner at HAWRAF - a design and technology studio, and is an alum of Google's Creative Lab. We hope you enjoy! --- Support this podcast: https://anchor.fm/practise-makes-practice/support

Upaya Zen Center's Dharma Podcast
Matthew Kozan Palevsky: Shantideva Ch 5: Guarding the Mind from its Most Subtle and Ubiquitous Thief

Upaya Zen Center's Dharma Podcast

Play Episode Listen Later Apr 19, 2021 44:20


In this Dharma talk, Hoshi Matthew Kozan Palevsky looks at Chapter 5 of the Bodhicaryavatara through a contemporary problematic. Shantideva warns and implore’s us to maintain the mind’s awareness for it is the basis of all other vows and practices. Not doing so leads us to the realm of the “Avicii Hell.” In a contemporary […]

The Hartmann Report
CAN THERE BE HOPE AMIDST UBIQUITOUS GUN VIOLENCE?

The Hartmann Report

Play Episode Listen Later Apr 18, 2021 57:32


Thom shares the reasons that he holds to hope despite what seems to be a never ending deluge of gun violence and police brutality. Callers become emotional over their sense of helplessness, however a Swedish listener rings in with a gleam of positivity.

The Dave Ross Commentary
The ubiquitous yellow bottles

The Dave Ross Commentary

Play Episode Listen Later Apr 5, 2021 2:02


See omnystudio.com/listener for privacy information.

The Daily
Bonus: The N-Word is Both Unspeakable and Ubiquitous. 'Still Processing' is Back, and They're Confronting it.

The Daily

Play Episode Listen Later Mar 20, 2021 3:42


Introducing the new season of “Still Processing.” The first episode is the one that the co-hosts Jenna Wortham and Wesley Morris have been wanting to make for years. They’re talking about the N-word. It’s both unspeakable and ubiquitous. A weapon of hate and a badge of belonging. After centuries of evolution, it’s everywhere — art, politics, everyday banter — and it can’t be ignored. So they’re grappling with their complicated feelings about this word. Find more episodes of “Still Processing” here: nytimes.com/stillprocessing

The Rich Roll Podcast
Laird Hamilton Sees Life As Art

The Rich Roll Podcast

Play Episode Listen Later Dec 7, 2020 133:06


Legendary master of the big wave. Waterman god and sun-kissed global icon. Today one of the world’s greatest living athletes drops a master class on the value of pursuing adventure and embracing life as a work of art.Meet Laird Hamilton.Most are well-versed in the lore of today’s guest as perhaps the world’s greatest big wave surfer. Under-appreciated is his impact and legacy as a pioneer of crossover board sports that include tow-in surfing, stand-up paddle boarding and the more recent hydrofoil boarding explosion — passions that have earned Laird the title as surfing’s biggest innovator.An icon of fitness, longevity and well-being who has transcended the sport that made him famous, Laird and his wife Gabby Reece are the founders of Extreme Performance Training (XPT) — a unique fitness training and lifestyle program that includes dynamic water workouts, performance breathing, high-intensity and endurance training and more. He is also the founder of Laird Superfood, a purveyor of high-quality functional blends, proteins, coffee beans, snacks and more. Ubiquitous on grocery store shelves across the country, the company recently enjoyed a successful public offering.Profiled in every major media outlet across the globe, Laird has been featured in several films, including Riding Giants, an exquisite exploration of the history and art of big wave surfing. Finally, he is the author two books: Force of Nature, and his more recent New York Times bestseller, Liferider — both inspiring reads for anyone looking to elevate themselves beyond the ordinary to do extraordinary things.This is a conversation is about the internal Laird. What propels the relentless pursuit of adventure. His relationship with nature’s most intimidating elements. And how his fulfillment derives not from external validation but rather from competition with self — and accomplishing what even he questions possible.We explore his unique and always evolving training methods. His entrepreneurial journey. Marriage. Parenting girls. And turmeric.But the heart of this exchange is a deconstruction of fear. The wisdom gleaned from gliding on the edge of disaster. And why it is crucial to always seek out that which scares you most.Ask Laird and he’ll be quick to caution that we’re over-insulated from nature’s majesty. In turn, our intuitions have been muted. So, more than anything, this is a call to reconnect with that which makes us innately human — to constantly push beyond our limits, seek out fear, and ultimately, embrace our lives as an evolving and precious work of art.Not surprisingly, I found Laird to be both humble and wise — a function of hyper-connectedness to both self and the outdoors. But I was also delighted to discover a human with an endearing and beautiful child-like wonder — a trait we could all benefit from cultivating more.The visually inclined can watch our exchange on YouTube. And as always, the podcast streams wild and free on Apple Podcasts and Spotify.I loved this experience. May it leave you seeking to more courageously explore yourself and the world that surrounds you.Peace + Plants,Listen, Watch & SubscribeApple Podcasts | YouTube | Spotify | Stitcher | Google PodcastsThanks to this week’s sponsorsDaily Harvest: Daily Harvest makes it easy to eat more fruits and vegetables with thoughtfully sourced, chef-crafted foods that are ready in five minutes or less. Go to dailyharvest.com and enter promo code richroll to get $25 off your first box.Native: Safe, effective protection against odor & wetness. For both men & women, Native is deodorant that isn’t a chemistry experiment–no aluminum, parabens, phthalates or talc. Visit nativedeo.com/roll or use promo code roll at checkout, and get 20% off your first order.Outerknown: Founded by pro-surfer Kelly Slater, Outerknown creates high quality, sustainably produced, and great looking men’s and women’s clothes, ethically manufactured in the world’s cleanest solar-powered factory. When you’re ready to amp up your wardrobe with awesome sustainable duds, go to outerknown.com and enter my code ROLL at checkout to get 25% off your full-price order.Theragun: With an OLED screen, personalized Theragun app, and the quiet and power you need, there is no substitute for the Theragun Gen 4, starting at only $199. Experience the percussive therapy device that’s unlike anything you’ve ever felt at Theragun.com/RICHROLLFor a complete list of all RRP sponsors, vanity URLs & discount codes, visit Our Sponsors.SHOW NOTES:Connect with Laird: Website | Instagram | Twitter | FacebookBook: Liferider: Heart, Body, Soul, and Life Beyond the OceanBook: Force of Nature: Mind, Body, Soul, And, of Course, SurfingLaird Superfood: AboutXPT Life: Extreme Performance TrainingIMBD: Riding GiantsSports Illustrated: Laird Hamilton: Surfing’s Wild Man of a Certain AgeThe Guardian: Laird Hamilton’s age-busting 10-point plan to supercharge your bodyDMARGE: Big Wave Surfing Legend Laird Hamilton’s ‘Interminable’ WorkoutStab Magazine: What (Laird Hamilton) Thinks About Big Wave SurfingThe Inertia: Watch Laird Hamilton and Crew Foil Surfing at Giant NazaréSurfer Today: Laird Hamilton went foil surfing at NazaréTech Crunch: Everybody is racing to an IPO — even Laird Hamilton’s young ‘superfood’ companyThe Beet: Laird Hamilton’s Superfood Creamers Will Help You Focus BetterI'm proud to announce my new book 'Voicing Change'. To learn more & pre-order now, visit, richroll.com/vcHOW CAN I SUPPORT THE PODCAST? Tell Your Friends & Share Online!Subscribe & Review: Please make sure to review, share comments and subscribe to the show on the various platforms (Apple Podcasts, YouTube & Spotify). This helps tremendously!Patronize Our Sponsors: Supporting the companies that support the show! For a complete list of all RRP sponsors and their respective vanity URLs and discount codes, click the 'Sponsors' tab in the 'Shop' menu.Spread The Word: Help grow our reach by sharing your enthusiasm for the podcast and/or your favorite episodes by posting about it on social media.Thank The Team: I do not do this alone. Send your love to Jason Camiolo for production, audio engineering and show notes; Margo Lubin and Blake Curtis for video, editing and graphics; portraits by Ali Rogers; and theme music by Tyler Piatt. Trapper Piatt & Hari Mathis.Amazon Disclosure: Books and products denoted with an asterisk are hyperlinked to the Amazon affiliate program. We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites. See acast.com/privacy for privacy and opt-out information.