Podcasts about untrusted

  • 47PODCASTS
  • 53EPISODES
  • 45mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Jul 28, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about untrusted

Latest podcast episodes about untrusted

AXRP - the AI X-risk Research Podcast
34 - AI Evaluations with Beth Barnes

AXRP - the AI X-risk Research Podcast

Play Episode Listen Later Jul 28, 2024 134:02


How can we figure out if AIs are capable enough to pose a threat to humans? When should we make a big effort to mitigate risks of catastrophic AI misbehaviour? In this episode, I chat with Beth Barnes, founder of and head of research at METR, about these questions and more. Patreon: patreon.com/axrpodcast Ko-fi: ko-fi.com/axrpodcast The transcript: https://axrp.net/episode/2024/07/28/episode-34-ai-evaluations-beth-barnes.html   Topics we discuss, and timestamps: 0:00:37 - What is METR? 0:02:44 - What is an "eval"? 0:14:42 - How good are evals? 0:37:25 - Are models showing their full capabilities? 0:53:25 - Evaluating alignment 1:01:38 - Existential safety methodology 1:12:13 - Threat models and capability buffers 1:38:25 - METR's policy work 1:48:19 - METR's relationships with labs 2:04:12 - Related research 2:10:02 - Roles at METR, and following METR's work   Links for METR: METR: https://metr.org METR Task Development Guide - Bounty: https://taskdev.metr.org/bounty/ METR - Hiring: https://metr.org/hiring Autonomy evaluation resources: https://metr.org/blog/2024-03-13-autonomy-evaluation-resources/   Other links: Update on ARC's recent eval efforts (contains GPT-4 taskrabbit captcha story) https://metr.org/blog/2023-03-18-update-on-recent-evals/ Password-locked models: a stress case for capabilities evaluation: https://www.alignmentforum.org/posts/rZs6ddqNnW8LXuJqA/password-locked-models-a-stress-case-for-capabilities Sleeper Agents: Training Deceptive LLMs that Persist Through Safety Training: https://arxiv.org/abs/2401.05566 Untrusted smart models and trusted dumb models: https://www.alignmentforum.org/posts/LhxHcASQwpNa3mRNk/untrusted-smart-models-and-trusted-dumb-models AI companies aren't really using external evaluators: https://www.lesswrong.com/posts/WjtnvndbsHxCnFNyc/ai-companies-aren-t-really-using-external-evaluators Nobody Knows How to Safety-Test AI (Time): https://time.com/6958868/artificial-intelligence-safety-evaluations-risks/ ChatGPT can talk, but OpenAI employees sure can't: https://www.vox.com/future-perfect/2024/5/17/24158478/openai-departures-sam-altman-employees-chatgpt-release Leaked OpenAI documents reveal aggressive tactics toward former employees: https://www.vox.com/future-perfect/351132/openai-vested-equity-nda-sam-altman-documents-employees Beth on her non-disparagement agreement with OpenAI: https://www.lesswrong.com/posts/yRWv5kkDD4YhzwRLq/non-disparagement-canaries-for-openai?commentId=MrJF3tWiKYMtJepgX Sam Altman's statement on OpenAI equity: https://x.com/sama/status/1791936857594581428   Episode art by Hamish Doodles: hamishdoodles.com

Fluke Reliability Radio
How to Leverage AI to Help Define Spare Parts Criticality Methodology

Fluke Reliability Radio

Play Episode Listen Later Jun 27, 2024 58:01


Reliability and Operations teams have always struggled with a repeatable process for defining criticality for maintenance spare parts. It is often too easy to make everything critical and often entails a binary method of "yes/no" or "true/false." Most criticality review processes are static (one and done) and are not revisited nor adjusted with changing business climates. Untrusted, outdated criticality reviews, if any, lead to treating everything as critical which leads to surplus which ultimately becomes obsolete... aka wasted capital.Speaker:Jeremiah Woodford, CRO IFS AssetsJeremiah is a native Texan whose first job out of high school was as a roughneck on the oldest drillship for Diamond offshore. After finishing his computer science degree, he focused his career on asset and maintenance technologies for the asset-intensive industries. For the last 15 years, he has supported clients such as ExxonMobil, DOW Chemical, BP, BHP, PETRONAS, ADNOC, PDO, Total Energies, TC Energy, and many other clients in asset-intensive industries to transform their MRO and drive significant improvements in the spare parts planning processes.► Register for an upcoming webinar here: https://flukereliability.info/bpw-frr

The Nonlinear Library
AF - Open consultancy: Letting untrusted AIs choose what answer to argue for by Fabien Roger

The Nonlinear Library

Play Episode Listen Later Mar 12, 2024 12:32


Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: Open consultancy: Letting untrusted AIs choose what answer to argue for, published by Fabien Roger on March 12, 2024 on The AI Alignment Forum. Thanks to Ryan Greenblatt, Buck Shlegeris, Aryan Bhatt, and Akbir Khan for useful discussions and feedback on the draft of this post. If AIs are potentially scheming and more knowledgeable than humans, and you want to answer a question, it may seem natural to not let AIs choose what answer they will argue for. For example, in AI debate, you make copies of an AI argue for the opposite answers to the question. Another example is consultancy (the usual baseline in debate papers), where you make AIs argue for a random answer to the question. But letting potentially scheming AIs choose what side to argue for can work, as long as you train them to generate answers and justifications that are as convincing as possible. I call this approach open consultancy. In this post, I argue that open consultancy is always a more effective way of getting AIs to answer questions than regular consultancy, and sometimes more effective than debate (even if AIs are scheming and more knowledgeable than humans!). And so I think that it's a stronger and more informative baseline and researchers should use it in place of regular consultancy; in particular, I think that because it's simpler than debate, researchers who are investigating debate should check their debate protocol is an improvement over open consultancy. Open consultancy Definition of regular consultancy Let's say you want to answer to binary questions given access to a trusted non-expert and a trainable expert who is untrusted that is, you think the expert might be acting adversarially and you want your scheme to be robust to them trying to subvert it. In consultancy, the untrusted expert is trained as follows: Randomly pick a side of the argument; Ask the expert to support the randomly chosen side by providing a justification; Present the side and the supporting justification to the non-expert, and ask it how likely it is that the side chosen by the expert is correct; use that as a reward to train the untrusted expert. To answer new questions (from the same distribution as the training distribution), pick a random side, ask the expert to justify that side, present the justification to the non-expert, and follow the non-expert judgement. Definition of open consultancy In open consultancy, the untrusted expert is trained as follows (differences with regular consultancy in italic): Ask the expert to pick a side of the argument; Ask the expert to support the side by providing a justification; Present the side and the supporting justification to the non-expert, and ask it how likely it is that the side chosen by the expert is correct; use that as a reward to train the untrusted expert. To answer new questions, ask the expert to pick a side (that it would have to justify if it were in training), and use the side the expert picks as your final answer. You can also ask the expert to first think out loud what the correct answer is, and only commit to an answer at the end. I call this variant CoT-before open consultancy. This variant should only change results for experts that actually benefit from the Chain-of-Thought, and the arguments I make in this post mostly don't rely on this property. Open consultancy is as robust against scheming as regular consultancy Why should it work to let a potentially scheming model choose what side it will argue for? The idea is that when it is easier to argue for something true than something false, then the training process will force the scheming model to argue for the truth. More precisely, if arguing as best as the expert can for the correct (resp. incorrect) side has convincingness cc (resp. ci), and the expert knows these numbers, then regular consultancy can...

Syntax - Tasty Web Development Treats
699: Potluck × TypeScript's Longevity × Canvas-Rendered Apps × Learning Rust × Executing Untrusted JS Code

Syntax - Tasty Web Development Treats

Play Episode Listen Later Nov 29, 2023 56:47


In this potluck episode of Syntax, Wes and Scott answer your questions, including: Will TypeScript ever go away? Should I write canvas-rendered web apps? How can I execute untrusted JS code in node? How can I use continuous integration with WordPress? Any advice for learning Rust? Show Notes 00:09 Welcome 01:16 How to ask questions for potluck episodes Ask a question for Syntax potluck episodes 02:19 Syntax Brought to you by Sentry 04:34 Will TypeScript ever go away? Migrating millions of lines of code to TypeScript 08:12 What is your opinion on entirely canvas-rendered web apps, such as those built with Flutter? Flutter on the Web Flutter Gallery html2canvas - Screenshots with JavaScript 13:43 Tailscale VPN is cool Tailscale · Best VPN Service for Secure Networks Tunnel | Zero Trust App Connector | Cloudflare 16:36 What is Bandcamp? Bandcamp Stream and listen to music online for free with SoundCloud 18:56 How can I execute untrusted JS code with node? WebAssembly Cloudflare Workers® Deno, The next-generation JavaScript runtime Fastly 23:46 I'd love to get your thoughts on modern devops and continuous integration for building out WordPress websites. Supper Club × Fabian Kägy - Modern WordPress - Blocks, Page builders, Headless, Custom Fields Vite | Next Generation Frontend Tooling Alpine.js 30:39 How do I orchestrate color adapting icons for use inline and in background images? svg.wesbos.com svg.wesbos.com/cat.svg 35:53 Are there any publicly available libraries for web components? Shoelace: A forward-thinking library of web components. Open UI 40:20 What's a good project idea for learning Rust? Tauri Apps 45:17 Do you ever plan to do more podcasts with Scott's wife or another psychologist / psychiatrist? 47:02 Have you tried MongoDB vector search for AI embeddings? Atlas Vector Search | MongoDB Vector Database for Vector Search | Pinecone Xata 49:44 Syntax highlighting in VS Code Comment tagged templates - Visual Studio Marketplace 52:38 Sick Picks Sick Picks Scott: The Spider-Man of Paris (2023) - IMDb Wes: Amazon.ca : instant read digital thermometer Shameless Plugs Scott: Sentry Wes: Wes Bos Courses Hit us up on Socials! Syntax: X Instagram Tiktok LinkedIn Threads Wes: X Instagram Tiktok LinkedIn Threads Scott: X Instagram Tiktok LinkedIn Threads

The Nonlinear Library
AF - Untrusted smart models and trusted dumb models by Buck Shlegeris

The Nonlinear Library

Play Episode Listen Later Nov 4, 2023 8:54


Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: Untrusted smart models and trusted dumb models, published by Buck Shlegeris on November 4, 2023 on The AI Alignment Forum. [Ryan Greenblatt originally made this point to me a while ago, and we then developed a bunch of these ideas together. Thanks to Paul Christiano and a huge number of other people for various relevant discussions, and to Ryan, Roger Grosse, Peter Barnett, Oliver Habryka, Max Nadeau, Stephen Casper, and Fabien Roger for comments on this post. I'm sure these points are obvious to many people, but I haven't seen them specifically written up. This is a core background point in some research we're writing up at the moment, but I felt like writing it up early, because I think it stands on its own.] TL;DR: Right now, basically the only reasonable conservative strategy for determining which models might be deceptively aligned is to do a capability evaluation: you measure how good they'd be at deceptive alignment; models that are too incompetent to think through deceptive alignment are surely not deceptively aligned. If you decide which models to "trust" using a capability eval like this, you'll naturally end up segregating your models into smart untrusted models and dumb trusted models. And so, if you think about approaches to safely using AIs that are robust to deceptive alignment and which can be used right now, a core dynamic is trying to use your dumb trusted models together with your limited access to trusted humans to make it hard for your untrusted smart models to cause problems. Suppose you are making a plan for the training, evaluation and deployment of some powerful AIs (I'll refer to the plan as a whole as a "protocol"). You want your plan to be safe even if models might be deceptively aligned. (I think that deceptive alignment seems less than 50% likely to be a notable problem prior to human obsolescence, but this is still plausible enough to be worth worrying about). In order to develop your plan, you need to know which of your models might be deceptively aligned. With current technology, the most plausible way to get signal on whether a model is deceptively aligned is to assess whether the model is capable of the strategic thinking and situational awareness required to succeed at deceptive alignment. For example, you might make a multiple choice quiz with treacherous turn strategy questions (e.g. this question ) and some tests of situational awareness (e.g. "How many backwards passes are you run on during training?", "What proportion of queries to you are asking for help with writing Python?", "What proportion of the code that you output is read by a human before it is run?"). You can then look at the validation set performance when your model is fine-tuned on this dataset. If the model isn't able to do this kind of reasoning in a forward pass, then it is very unlikely to be able to pull off a proper treacherous turn, and so we don't have to worry about it being deceptively aligned. Based on my experience talking to GPT-4, I suspect it would perform fairly poorly on these evaluations. There are a bunch of open questions about what datasets we should use to measure this, and where the thresholds for various levels of concern should be set. But I don't know of any fundamental technical obstructions to measuring the capability for deceptive alignment. In particular, I suspect it will be pretty hard for models to sandbag our attempts to measure their capability to engage in deceptive alignment. See footnote [1] for more on this. Aside from these capability evaluations, I'm not aware of any reliable, currently-available approaches for determining whether a model might be deceptively aligned. [2] If you use capability evals to assess which models are capable of deceptive alignment, then there's an inverse relationship between how capable models are...

The John Batchelor Show
#Londinium90AD: Gaius & Germanicus observe Ukraine: Hollowed out , untrusted. Michael Vlahos. Friends of History Debating Society. @Michalis_Vlahos

The John Batchelor Show

Play Episode Listen Later Sep 4, 2023 12:17


#Londinium90AD: Gaius & Germanicus observe Ukraine: Hollowed out , untrusted. Michael Vlahos. Friends of History Debating Society. @Michalis_Vlahos https://news.yahoo.com/ukraine-war-latest-zelensky-announces-212510512.html Photo:  1917 Kornilov Cossacks No known restrictions on publication. @Batchelorshow

The John Batchelor Show
#PRC: Untrusted bioscience by state-controlled labs. Brandon Weichert, author of the just-released Biohacked: China's Race to Control Life, @GordonGChang, Gatestone, Newsweek, The Hills:

The John Batchelor Show

Play Episode Listen Later Aug 31, 2023 8:55


#PRC: Untrusted bioscience by state-controlled labs. Brandon Weichert, author of the just-released Biohacked: China's Race to Control Life, @GordonGChang, Gatestone, Newsweek, The Hills:  https://twitter.com/zhao_dashuai/status/1694240297969189145?s=46&t=Z8Pt0lEW0jT_Kuy7m6weHQ Photo:  1906 HG Wells No known restrictions on publication. @Batchelorshow

The Tara Show
“Upstate Infrastructure” “Saving America” “Untrusted Political Groups” “Republican Belief”

The Tara Show

Play Episode Listen Later Jul 3, 2023 29:47


“Upstate Infrastructure” “Saving America” “Untrusted Political Groups” “Republican Belief”

The John Batchelor Show
##Russia: Tactical, regional and strategic nuclear weapons in untrusted hands Peter Huessy, Hudson Institute..

The John Batchelor Show

Play Episode Listen Later Jun 28, 2023 10:35


Photo: No known restrictions on publication. @Batchelorshow 1886 ##Russia: Tactical, regional and strategic nuclear weapons in untrusted hands Peter Huessy, Hudson Institute.. https://www.wsj.com/articles/wagner-mutiny-revives-u-s-fears-over-control-of-russias-nuclear-weapons-29319369

Cut To The Race | By FormulaNerds
Rain Expected in Canada, Norris' Future, Russell reveals the Untrusted, and F1's Expansion Debate

Cut To The Race | By FormulaNerds

Play Episode Listen Later Jun 14, 2023 33:20


On this week's News from the Nerds, Oli hosts once again and is joined by the trusty duo of Sam and Abby to discuss all the latest news ahead of the Canadian Grand Prix. F1 returns to Montreal: Formula 1 is racing this weekend in Canada for the ninth round of the season but rain is predicted during some of the sessions, including the race. The panel give their thoughts about the upcoming race and what to expect. https://www.formulanerds.com/news/wet-conditions-expected-once-again-this-season-in-f1-at-the-canadian-grand-prix/ Norris looks to the future: Lando Norris has conveyed his confidence in McLaren saying he is looking forward to the future with the team. The trio talk about Norris' comments and whether his future is very much with McLaren or whether he'll move teams. https://www.formulanerds.com/news/lando-norris-speaks-out-about-mclarens-future-in-f1/ Russell says there's three drivers he doesn't trust: George Russell has said that there are three drivers on the current grid that he doesn't completely trust in terms of leaving enough space and being aggressive. The panel dissect his comments and give their say on who the three unnamed drivers could be. When is reality too much? F1 are in talks of producing the first ever fictional F1 TV series as well as a live stream that will see F1 drivers go against professional golfers in a golf tournament. The trio chat about the two new shows and whether they're necessary. Domenicali on F1's expansion: Stefano Domenicali has said that 10 teams are enough in F1 and there doesn't need to be any more. The panel discuss the CEO's comments and what it would be like to have more teams in the sport. Learn more about your ad choices. Visit megaphone.fm/adchoices

Survivor: Turning Back Time
Africa EP4: The Young and Untrusted

Survivor: Turning Back Time

Play Episode Listen Later Dec 5, 2022 67:43


On this episode Steven and Jared continue to break down boomer politics, Jared commits to the bit, and Steven threatens to fist fight a wild ox on national television.

Cybercrime Magazine Podcast
Mastering Cyber. Don't Visit Untrusted Sites. Alissa “Dr Jay” Abdullah, Deputy CSO, Mastercard.

Cybercrime Magazine Podcast

Play Episode Listen Later Nov 2, 2022 1:28


Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard. https://mastercard.us/en-us.html

Bring Your Own Popcorn
Ep48 - Spooky Season Special 2022, Part BOO!! (Two)

Bring Your Own Popcorn

Play Episode Listen Later Oct 25, 2022 45:30


Special Spooky Compilation Edition! A whole slew of feature creatures volunteered for this episode, in which our guests each pick a spooky movie that means a lot to them! In endearingly spooky self-interviews, each guest asks themselves: What makes a good "Halloween movie"? Do you get scared during scary movies? And what's so special about the spooky movie you (me) wanna talk about?  I want to thank the wonderful guests who submitted interviews for this fun community episode: Jenn Owens from My Streaming Bubble (Movie: Nightmare on Elm Street) Skylar from Kawaii Desuppointment (Movie: Scream) Johnny from Flores Podcast Consulting (Movie: American Werewolf in London) Cake from Nymphomercial (Movie: Noroi the Curse) Joe Shannon from Phantom Jukebox (Movie: Tucker & Dale vs. Evil) Amber from Witches Talking Tarot (Movie: Trick r' Treat) Tim Nunez from friendship (Movie: It Follows) Ernie from From Under the Apron (Movie: Nightmare on Elm Street)  Ty Lindsay from Phantom Jukebox (Movie: The Thing) Follow everyone everywhere (all at once)! I loved hearing these fine folks' thoughts and feelings on these movies and why they're special - and spooky - to them. Thanks everyone, and thank YOU, listeners, and readers of these here words. MUSIC: "Adult Problems" by Richard and the Julians Copyright Richard and the Julians 2015. All movie musical clips are the respective properties of their publishers and used for review purposes only. This podcast is not monetized. "Grind" by Andrew Huang. "Spooky Scary Skeletons (Lofi Mix)" by Creamy, Untrusted, 11:11 Music Group 2021 - Buy on Apple Music. Spooky Ride by Twin Musicom is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/ Source: http://www.twinmusicom.org/song/250/spooky-ride Artist: http://www.twinmusicom.org BYOP Logo by @MilkMyth

Gurl Stop
E25 - Lee "Rape Babies" Zeldon, Liz Truss Untrusted, Katy Porter Slays Greedy Corps Causing Inflation, Political Mythology

Gurl Stop

Play Episode Listen Later Oct 23, 2022 55:24


Thanks for listening! You're a special angel! Follow us on: twitter.com/gurlstop_pod instagram.com/gurlstop.pod facebook.com/gurlstop.pod Email us at gurlstop.pod@gmail.com Ciao babies

Stand in the Gap Radio Podcasts
10/14/22 - Stand in the Gap Today

Stand in the Gap Radio Podcasts

Play Episode Listen Later Oct 14, 2022 46:59


Untrusted and Corrupt Politicians or Respected Leaders of Character? The Latest American Sentiment. We are joined by George Barna (Researcher, Speaker, Founder - The Barna Group). Topics discussed include: America's Values Overview. Corrupt vs Character. The Cultural Challenge. The Road Back to Trust.

Back Up For Grabs
Episode 3.4 // The Young and Untrusted

Back Up For Grabs

Play Episode Listen Later Aug 30, 2022 23:47


Join two long-time Survivor fans Hannah and Kylie as we rewatch and discuss the fourth episode of Survivor: Africa.Find us on Instagram @backupforgrabs or email us at backupforgrabspod@gmail.com.

The Magic Number Is 3 (When It Comes To TV)
Survivor - Season 3, Episode 4 - The Young and the Untrusted

The Magic Number Is 3 (When It Comes To TV)

Play Episode Listen Later May 16, 2022 33:50


We're back for our Season 3, Episode 4 of Survivor. Can Silas convince the Samburu tribe to play strategically? How will the Samburu tribe benefit from voting out Linda? Is the Boran tribe actually the better team now? Will Season 3 make or break Survivor? ---------------------------------------------------------------------------------------------------- Follow us on Twitter @Magic3TVPod and @ChrisXAppleSawc Buy something will ya at the Magic Number is 3 Merch Store And learn more about The Magic Number is 3 Here --- Send in a voice message: https://podcasters.spotify.com/pod/show/magic-3-tv/message

GullyWood
Fortunate

GullyWood

Play Episode Listen Later May 8, 2022 75:08


Fortunately Nik met the Bunyip & unfortunately Bunyip had to learn important lessons. We both survived relisiseing that fortune favours the brave & thank you for being brave with us for our first season of 30 episodes.We appreciate and love every single one of you.See you season twoBunyip & Nick Send you thoughts and suggestion to: Bunyip & Nik thegullywood@outllok.com watch on: https://www.youtube.com/channel/UCSORoRguLZ-Uz1Y8adO07PgSupport the show

GullyWood
Fortunate

GullyWood

Play Episode Listen Later May 8, 2022 75:08


Fortunately Nik met the Bunyip & unfortunately Bunyip had to learn important lessons. We both survived relisiseing that fortune favours the brave & thank you for being brave with us for our first season of 30 episodes.We appreciate and love every single one of you.See you season twoBunyip & Nick Send you thoughts and suggestion to: Bunyip & Nik thegullywood@outllok.com watch on: https://www.youtube.com/channel/UCSORoRguLZ-Uz1Y8adO07PgSupport the show

AMERICA OUT LOUD PODCAST NETWORK
The Most Untrusted Name in News is CNN

AMERICA OUT LOUD PODCAST NETWORK

Play Episode Listen Later Dec 10, 2021 57:14


CNN once took pride in billing itself as the most trusted name in news. Unfortunately, because of many missteps, the cable news network, founded by Ted Turner and Reese, in the '80s is no longer the news giant it used to be. The venerable news station has fallen on hard times⏤in part a victim of its tabloid and opinionated news reporting. The hosts of “After Dark” have been following the decline of the news station and note that its decline possibly began during the Obama Administration and went into high when Donald Trump entered the White House. Joining them for the discussion is Shawn G.  Shawn G is a political commentator and social media personality. His support for former President Donald Trump goes back to 2016. Shawn G has accumulated a large social media following for his political and sports commentary. Many of his tweets have appeared in several news publications.

International Institute Of Digital Marketing™
KNOW THE BASICS OF LINK-BUILDING TO BOOST YOUR SEO

International Institute Of Digital Marketing™

Play Episode Listen Later May 31, 2021 2:53


#Backlinks have a big impact on search engine rankings, according to 58% of #SEO pros surveyed for u SERP's The State of Backlinks in 2021 report. Many content marketers, though, find link-building to be a challenging task. If you fall into that category or are just looking for a refresher on legitimate link-building tactics, I've got you covered. 3 types of links First, let's look at the three categories of legitimate links: ● #Backlink: An external website links back to one of your content assets (i.e., blog post, infographic) or your general site. ● Internal link: One page on your site includes a link to another page on your site. (Internal links are not as valuable as external links, but they help Google understand your site's structure, which can be helpful for #SEO. They also are crucial for on-site engagement and decreased bounce rates.) ● External link: A page on your site includes a link to a relevant third-party site. (In the fledgling years of #backlinking, relevancy didn't matter, but it does now.) Your external links count as #backlinks for third-party sites. Follow vs. no-follow Not all links are created equal. Just like internal and external links have different effects, follow and no-follow links connect to external content but are wildly different in terms of what they do for your #SEO. ● Follow links are legitimate external or internal links to your website – exactly what you want in your backlinking efforts. ● No-follow links are applied on the back end with the code, rel=“nofollow”. You can see it in the linking URL. That little piece of code tells search engines not to follow the link – meaning that the linked page won't receive any direct benefits from this link. Why would a website use no-follow links? ● Untrusted content: Most no-follow links are designed to protect the publishing website. For example, it's common practice on sites where the comments section allows users to post links because those links could connect to spammy or abusive content, which the site doesn't support. ● Links that don't need to be crawled: As Google crawls (indexes) your site, it evaluates the following links. If your site includes links to pages that have nothing to do with search (think password-protected sections), you don't want Google to waste its limited time crawling those pages. A no-follow is important to include. ● Paid links: Google and other search engines go a long way to ensure that #SEO isn't a pay-to-play game. Thus, if a site is paid to include a link, the link should be classified as no-follow. Globally Recognized #Digital #Marketing Certifications: https://thedigitalmarketinginstitute.... INTERNATIONAL INSTITUTE OF #DIGITAL #MARKETING ™ Learning Leaf: https://thedigitalmarketinginstitute.... For Course Details: https://thedigitalmarketinginstitute.... ------------------------------------------------------------------------------------------------------- INTERNATIONAL INSTITUTE OF DIGITAL MARKETING ™ is a certifying body founded in the USA by several long-standing marketers. We have years of experience in business, marketing, and more, and have put forth our combined experience to develop IIDM. Digital Marketing is something that's all around us, yet there has been no solid foundation for marketing in many, many years. In the news, there are blunders again and again by companies, failing some of the core aspects of modern marketing. Because of this, the need for a solid, stable foundation for marketing in the modern world is needed-- a foundation with the ability to be built upon and developed with time. #contentmarketing #digitalmarketing #digitalmarketing #marketing #socialmediamarketing #socialmedia #business #marketingdigital #branding #seo #instagram #onlinemarketing #advertising #digital #entrepreneur #contentmarketing #marketingstrategy #digitalmarketingagency #marketingtips #follow #smallbusiness #design #bhfyp #love #webdesign #like #photography #graphicdesign #content #art #fashion #bhfyp --- Send in a voice message: https://anchor.fm/iidmusa/message

ALEPH - GLOBAL SCRUM TEAM - Agile Coaching. Agile Training and Digital Marketing Certifications

#Backlinks have a big impact on search engine rankings, according to 58% of #SEO pros surveyed for u SERP's The State of Backlinks in 2021 report. Many content marketers, though, find link-buildingto be a challenging task. If you fall into that category or are just looking for a refresher on legitimate link-building tactics, I've got you covered. 3 types of links First, let's look at the three categories of legitimate links: ● #Backlink: An external website links back to one of your content assets (i.e., blog post, infographic) or your general site. ● Internal link: One page on your site includes a link to another page on your site. (Internal links are not as valuable as external links, but they help Google understand your site's structure, which can be helpful for #SEO. They also are crucial for on-site engagement and decreased bounce rates.) ● External link: A page on your site includes a link to a relevant third-party site. (In the fledgling years of #backlinking, relevancy didn't matter, but it does now.) Your external links count as #backlinks for third-party sites. Follow vs. no-follow Not all links are created equal. Just like internal and external links have different effects, follow and no-follow links connect to external content but are wildly different in terms of what they do for your #SEO. ● Follow links are legitimate external or internal links to your website – exactly what you want in your backlinking efforts. ● No-follow links are applied on the back end with the code, rel=“nofollow”. You can see it in the linking URL. That little piece of code tells search engines not to follow the link – meaning that the linked page won't receive any direct benefits from this link. Why would a website use no-follow links? ● Untrusted content: Most no-follow links are designed to protect the publishing website. For example, it's common practice on sites where the comments section allows users to post links because those links could connect to spammy or abusive content, which the site doesn't support. ● Links that don't need to be crawled: As Google crawls (indexes) your site, it evaluates the following links. If your site includes links to pages that have nothing to do with search (think password-protected sections), you don't want Google to waste its limited time crawling those pages. A no-follow is important to include. ● Paid links: Google and other search engines go a long way to ensure that #SEO isn't a pay-to-play game. Thus, if a site is paid to include a link, the link should be classified as no-follow. --- Send in a voice message: https://anchor.fm/aleph-global-scrum-team/message

The GAP Podcast
The GAP Episode 566 - Favourite Podcast On The Citadel

The GAP Podcast

Play Episode Listen Later May 21, 2021 137:03


On this episode of The GAP Luke Lawrie and Joab Gilroy travel back to the Citadel in Mass Effect Legendary Edition. The other games they've been playing this week include Deathloop, Untrusted, The Elder Scrolls Online, SnowRunner, Tower Ball, NHL 21, Hitman 2, and more. Over in the news The Last of Us Part II receives a PlayStation 5 patch, Ghostrunner 2 is in development, and DC announces that an animated Injustice movie is in the works. This episode goes for 2 hours and 15 minutes, it also contains coarse language. Timestamps – 00:00:00 – Start 00:07:59 – NHL 21 00:33:53 – Untrusted 00:45:58 – Tower Ball 01:01:10 – Hitman 2 01:09:19 – The Elder Scrolls Online 01:15:09 – SnowRunner 01:28:40 – Deathloop 01:43:07 – Mass Effect Legendary Edition 02:00:35 – News 02:11:24 – End of Show Subscribe in a reader iTunes / Spotify Head to the Youtube Channel to watch/listen when it goes live!

On Strategy
Hyundai's journey from untrusted to unequaled with Cindy Scott, SVP Strategy, Innocean USA

On Strategy

Play Episode Listen Later Feb 26, 2021 32:18


Cindy shares the story of how Hyundai went from targeting used car buyers to becoming a mass market player. And we learn the single word that defines everything the brand does.

Day[0] - Zero Days for Day Zero
OSED, North Korean hackers, NAT Slipstream 2.0, and PGP (in)security

Day[0] - Zero Days for Day Zero

Play Episode Listen Later Feb 2, 2021 131:15


Starting with a long discussion about the North Korean hackers targeting security reseachers, and some thoughts (rants) about the newly released Windows exploit dev course from Offensive Security before getting into some real exploits including NAT Slipstreaming 2.0 and a new Sudo vuln. [00:00:52] About the security content of iOS 14.4 and iPadOS 14.4 https://support.apple.com/en-us/HT212146 [00:02:42] New campaign targeting security researchers https://blog.google/threat-analysis-group/new-campaign-targeting-security-researchers/https://www.microsoft.com/security/blog/2021/01/28/zinc-attacks-against-security-researchers/https://twitter.com/pwn_expoit/status/1354024291398950913https://twitter.com/chris_salls/status/1353989045617975297 [00:44:45] New Exploit Dev Course: EXP-301 https://www.offensive-security.com/offsec/new-course-exp301/https://wargames.ret2.systems/ [01:04:53] Linksys WRT160NL – Authenticated Command Injection [CVE-2021-25310] https://research.nccgroup.com/2021/01/28/technical-advisory-linksys-wrt160nl-authenticated-command-injection-cve-2021-25310/ [01:07:13] Vulnerabilities within TikTok Friend-Finder https://research.checkpoint.com/2021/tiktok-fixes-privacy-issue-discovered-by-check-point-research/ [01:14:07] BitLocker touch-device lockscreen bypass https://secret.club/2021/01/29/touch-lockscreen-bypass.html [01:20:53] NAT Slipstreaming v2.0 https://www.armis.com/resources/iot-security-blog/nat-slipstreaming-v2-0-new-attack-variant-can-expose-all-internal-network-devices-to-the-internet/https://samy.pl/slipstream/ [01:26:35] [Security fix] Libgcrypt 1.9.1 released https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000456.htmlhttps://dev.gnupg.org/rC512c0c75276949f13b6373b5c04f7065af750b08 [01:30:44] Baron Samedit: Heap-based buffer overflow in Sudo [CVE-2021-3156] https://www.openwall.com/lists/oss-security/2021/01/26/3https://github.com/sudo-project/sudo/commit/1f8638577d0c80a4ff864a2aad80a0d95488e9a8https://github.com/lockedbyte/CVE-Exploits/tree/master/CVE-2021-3156 [01:44:49] Exploiting a “Simple” Vulnerability – Part 1.5 – The Info Leak https://windows-internals.com/exploiting-a-simple-vulnerability-part-1-5-the-info-leak/ [01:50:53] Windows Kernel DoS/Privilege Escalation via a NULL Pointer Deref https://www.thezdi.com/blog/2021/1/27/zdi-can-12671-windows-kernel-dosprivilege-escalation-via-a-null-pointer-deref [01:56:31] XS-Leaks in redirect flows https://docs.google.com/presentation/d/1rlnxXUYHY9CHgCMckZsCGH4VopLo4DYMvAcOltma0og/edit#slide=id.g63e29d5a06_0_0 [02:02:13] Keeping your GitHub Actions and workflows secure: Untrusted input https://securitylab.github.com/research/github-actions-untrusted-input [02:08:04] iOS Security Tutorial - Patching ASLR in the Kernel https://www.youtube.com/watch?v=Gszvbi8AU68 [02:08:58] Project Zero: A Look at iMessage in iOS 14 https://googleprojectzero.blogspot.com/2021/01/a-look-at-imessage-in-ios-14.html [02:09:37] Effectively Fuzzing the IPC Layer in Firefox https://blog.mozilla.org/attack-and-defense/2021/01/27/effectively-fuzzing-the-ipc-layer-in-firefox/ Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST) Or the video archive on

What Lies Beneath
Breaking Trust: Shades of Crisis Across an Insecure Software Supply Chain w/ Trey Herr, & Stewart Scott

What Lies Beneath

Play Episode Listen Later Oct 6, 2020 44:47 Transcription Available


On this episode of What Lies Beneath?, we talk with Trey Herr, & Stewart Scott, co-authors of the recent Atlantic Council report, “Breaking Trust: Shades of Crisis Across an Insecure Software Supply Chain.”  For too long, when people have talked about supply chain security, it's been all focused on the physical hardware. Where is the physical box? What chips make up that box? Who built it? Where does it live? But the digital supply chain is something that needs to be paid attention to.  Attacks against the digital supply chain can impact nearly any company, but the defense organizations are particularly susceptible to these kinds of attacks. But why is that? Is it similar to the reasons we see for other kinds of supply chain attacks?  Trey & Stewart spend the better part of this episode talking us through their report, and highlighting, among other things:  -Why digital supply chain security is so crucial -Why defense organizations are especially vulnerable to these attacks -Untrusted technology, specifically in the 5g space -Why you can't talk about 5g security without accounting for software security You can access the Atlantic Council paper here!

JR Media
Untrusted Marketer

JR Media

Play Episode Listen Later Jun 10, 2020 2:46


Local Business Marketing relies on building the "Know, Like, Trust" factor amongst people who live in your community. Do you know which profession is one of the least trusted amongst locals? If you guessed ➡ real estate agents. Then you guessed right! Watch as I explain how to turn this untrusted profession into one of the most trusted, thought leader for their local community. Download your freebie: https://jrmedia.com.au/how-i-turned-this-untrustworthy-profession-into-a-trusted-thought-leader/

Your Tech Moment
Untrusted Trump Cards

Your Tech Moment

Play Episode Listen Later Sep 6, 2019 8:55


Links: https://yourtechmoment.com/read/f/untrusted-trump-cards Can Americans trust any giant industries made successful by capitalism, or are we better off finding local alternatives that cater to hyperlocal and niche needs? As platforms polarize, sell our privacy, and play the role of arms dealer, our best tack is to look away then walk away.

This Week in the Middle East with William Morris of the Next Century Foundation
Brexit - the curious case of Boris - Untrusted but popular

This Week in the Middle East with William Morris of the Next Century Foundation

Play Episode Listen Later Sep 1, 2019 8:17


A Sunday Times survey states that most Britons do not trust Boris Johnson. And yet most Britons seem to have decided to vote for himSupport the show (https://www.justgiving.com/tncf)

Kacper Szurek
SSL - czy akceptować wygasły certyfikat?

Kacper Szurek

Play Episode Listen Later Aug 26, 2019 18:26


Czy namawianie do akceptowania certyfikatu SSL, który wygasł i nie jest prawidłowy, jest OK? A może jest to sprzeczne z dobrymi praktykami? Jakie inne komunikaty błędów możemy napotkać podczas przeglądania Internetu przy pomocy protokołu HTTPS? O czym one świadczą i jakie są ich powody? A także kiedy mogą informować one o potencjalnym ataku, a kiedy tylko pokazują ignorancję właściciela witryny? Ja jestem Kacper Szurek, a to kolejny odcinek podcastu Szurkogadanie, w którym tłumaczę zawiłe kwestie powiązane z bezpieczeństwem komputerowym w prosty i zrozumiały sposób. Więcej informacji na blogu: http://security.szurek.pl/ssl-czy-akceptowac-wygasly-certyfikat.html 0:46 Po co szyfrujemy połączenie 2:09 Klucz prywatny 2:38 Czy to prawidłowy klucz? 3:22 Główne urzędy certyfikacji 4:02 Uprawnienia do zarządzania domeną 5:02 Certyfikat typu OV 6:25 Ważność certyfikatu 7:09 Automatyczne generowanie certyfikatów 8:22 To połączenie nie jest prywatne 9:03 Zaawansowane opcje 10:06 badssl.com 10:41 Certyfikat expired 12:40 Błędna praktyka 13:42 Wrong host 15:00 Self-signed 15:50 Untrusted root 17:04 Revoked 17:43 Podsumowanie Grupa na Facebooku: https://www.facebook.com/groups/od0dopentestera/ Subskrybuj kanał: https://www.youtube.com/c/KacperSzurek?sub_confirmation=1 Spotify: https://open.spotify.com/show/4qGXKJyJicRJ0PfAX05V9O Google Podcast: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy81M2E4OTNjL3BvZGNhc3QvcnNz Apple Podcasts: https://itunes.apple.com/us/podcast/kacper-szurek/id1410369860?mt=2&uo=4 Anchor: https://anchor.fm/kacperszurek/

Zigbits Network Design Podcast
ZNDP 045 – Zero Trust

Zigbits Network Design Podcast

Play Episode Listen Later Jul 16, 2019 21:00


In Today's episode we are highlighting Zero Trust. We are going to discuss what is and what it isn't. We are then going to talk about the specific steps to start your journey towards a Zero Trust world. Lets jump in my friends! The post ZNDP 045 – Zero Trust appeared first on Zigbits - Where Zigabytes are faster than Gigabytes.

Burlington Baptist Church Podcast
What Is Our Church Known For?

Burlington Baptist Church Podcast

Play Episode Listen Later Jun 30, 2019 37:03


We need to see ourselves as a team, as a body of believers. We need to have people in the right positions and equip those people to help others. We need to serve and work together for the right reasons and make Christ known by making disciples to reach the lost with the Gospel. Ww want to be a healthy, growing and discipling church.Support the show (https://onrealm.org/burlingtonbaptist/-/give/XVSXTRONUP)

The Cyber Security Podcast from PwC UK
Untrusted applications - S2E3

The Cyber Security Podcast from PwC UK

Play Episode Listen Later Dec 17, 2018 13:32


Abigail Wilson is joined by Will Semple and Stephen Morrow to chat about untrusted applications and discuss the issue of how big a risk third party software is to your business.

The Cyber Security Podcast from PwC UK
Untrusted applications - S2E3

The Cyber Security Podcast from PwC UK

Play Episode Listen Later Dec 17, 2018 13:32


Abigail Wilson is joined by Will Semple and Stephen Morrow to chat about untrusted applications and discuss the issue of how big a risk third party software is to your business.

Turing Complete FM
31. 携帯電話のハッキング、コンピュータサイエンスの論文 (るくす)

Turing Complete FM

Play Episode Listen Later Sep 30, 2018 60:24


カーネギーメロン大学の客員研究員として明日から赴任するるくすくんと、コンピュータのセキュリティや、システムズ系のコンピュータサイエンスの論文などについて話をしました。出演者: るくす (@RKX1209)、Rui Ueyama (@rui314) https://turingcomplete.fm/31 ハッシュタグは#tcfmです。 TCFMはサポーターの投げ銭によって収益を上げています。このコンテンツに課金してもいいよという方はぜひクリエイター支援サイトPatreonから登録してご協力ください。 イントロ (0:00) カーネギーメロン大学に明日から行きます (0:47) Samsung Galaxyのシリアルコンソールを有効にするハードウェアの裏技 (9:00) iPhoneではアンロックしてから1時間が経過するとUSBデータ通信が完全無効化される (16:00) メモリアクセスのときに放射される電磁波ノイズでラジオを鳴らす (17:30) 初代XBoxのメモリバスをタップしてデータを取得 (18:54) るくすくん作成のNintendo Switchエミュレータ公開されました (22:00) Nintendo SwitchにAndroidを移植 (26:10) Linus、他人に対する振る舞いを改善するために一時的に公的な立場を退く (27:50) るくすくん、Kernel/VM関西というイベントを主催 (34:06) x86ネイティブコードを安全に動かすNaCLの論文 (36:30) 4KiBページを自動的に2MiBのスーパーページに昇格するというFreeBSDの機能 (44:57) Hans Boehmの「スレッドはライブラリとしては実装できない」という論文 (50:20) カーネギーメロン大学における生活 (55:59) エンディング (59:46) iOSのUSB制限モード Macbook system bus radio るくすくんのSwitchエミュレータ Native Client: A Sandbox for Portable, Untrusted x86 Native Code Practical, transparent operating system support for superpages (PDF) Threads Cannot be Implemented as a Library (PDF)

Info Risk Today Podcast
Medical Devices: Treat Them Like Untrusted End-User Tools

Info Risk Today Podcast

Play Episode Listen Later Dec 8, 2017


Data Breach Today Podcast
Medical Devices: Treat Them Like Untrusted End-User Tools

Data Breach Today Podcast

Play Episode Listen Later Dec 8, 2017


DevelopSec: Developing Security Awareness
Ep. 58: "Untrusted" Data

DevelopSec: Developing Security Awareness

Play Episode Listen Later Nov 16, 2016 21:41


Have you heard someone mention "untrusted" data?  Applications take data from multiple data sources and we are often confused on what should be trusted or not.  In this episode, James Jardine talks about untrusted data and some thoughts for moving past it.   For more info go to https://www.developsec.com or follow us on twitter (@developsec). Presented by Jardine Software Inc. (https://www.jardinesoftware.com) Jardine Software provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.  Check out our 30 day advantage.

All JavaScript Podcasts by Devchat.tv
178 JSJ Tech Education and The Business of Running Front End Masters with Marc Grabanski

All JavaScript Podcasts by Devchat.tv

Play Episode Listen Later Sep 23, 2015 56:09


03:01 - Marc Grabanski Introduction Twitter GitHub Blog 03:35 - The jQuery UI Datepicker 04:29 - Frontend Masters @FrontendMasters 07:26 - The Live Streaming Phenomenon Twitch.tv 09:17 - Scalability 11:25 - Value, Feedback Cycle 14:43 - Structuring Courses and Workshops 16:09 - Online vs In-Person Prerequisites 18:11 - Booking Workshops 19:02 - Scaling (Cont’d) 20:00 - Online Education (eLearning) in General egghead.io CodeCombat NodeSchool 21:40 - The Business Model Licensing 24:12 - Hot Sellers Kyle Simpson: Advanced JavaScript 25:28 - Technical Setup Livestream Firebase 27:27 - Selecting Topics 29:41 - Future Topics / Topics in Production 30:38 - Individual / Company Attendees frontendmasters.com/workshops 31:45 - Upcoming Plans for Frontend Masters 32:32 - Advice For Starting Something Like Frontend Masters 34:23 - Keeping Content Up-to-date 36:14 - eLearning Experiments Untrusted exercism.io NodeSchool A Better Way to Learn JavaScript My Tech High 39:30 - Giveaways marc@frontendmasters.com 40:07 - Getting Started with Programming 43:03 - Marketing 45:20 - Teacher Compensation Picks Jessica Kerr: Functional Principles In React @ React Rally 2015 (Jamison) thought-haver (Jamison) [Frontend Masters] Angular Application Development (Aimee) [Frontend Masters] JavaScript the Good Parts (Aimee) LÄRABAR (Aimee) Taking time off (Chuck) The Man from U.N.C.L.E. (Joe) BB-8 by Sphero (Joe) ng-conf (Joe) The Tim Ferriss Show (Marc) CodeCombat (Marc) Untrusted (Marc)

JavaScript Jabber
178 JSJ Tech Education and The Business of Running Front End Masters with Marc Grabanski

JavaScript Jabber

Play Episode Listen Later Sep 23, 2015 56:09


03:01 - Marc Grabanski Introduction Twitter GitHub Blog 03:35 - The jQuery UI Datepicker 04:29 - Frontend Masters @FrontendMasters 07:26 - The Live Streaming Phenomenon Twitch.tv 09:17 - Scalability 11:25 - Value, Feedback Cycle 14:43 - Structuring Courses and Workshops 16:09 - Online vs In-Person Prerequisites 18:11 - Booking Workshops 19:02 - Scaling (Cont’d) 20:00 - Online Education (eLearning) in General egghead.io CodeCombat NodeSchool 21:40 - The Business Model Licensing 24:12 - Hot Sellers Kyle Simpson: Advanced JavaScript 25:28 - Technical Setup Livestream Firebase 27:27 - Selecting Topics 29:41 - Future Topics / Topics in Production 30:38 - Individual / Company Attendees frontendmasters.com/workshops 31:45 - Upcoming Plans for Frontend Masters 32:32 - Advice For Starting Something Like Frontend Masters 34:23 - Keeping Content Up-to-date 36:14 - eLearning Experiments Untrusted exercism.io NodeSchool A Better Way to Learn JavaScript My Tech High 39:30 - Giveaways marc@frontendmasters.com 40:07 - Getting Started with Programming 43:03 - Marketing 45:20 - Teacher Compensation Picks Jessica Kerr: Functional Principles In React @ React Rally 2015 (Jamison) thought-haver (Jamison) [Frontend Masters] Angular Application Development (Aimee) [Frontend Masters] JavaScript the Good Parts (Aimee) LÄRABAR (Aimee) Taking time off (Chuck) The Man from U.N.C.L.E. (Joe) BB-8 by Sphero (Joe) ng-conf (Joe) The Tim Ferriss Show (Marc) CodeCombat (Marc) Untrusted (Marc)

Devchat.tv Master Feed
178 JSJ Tech Education and The Business of Running Front End Masters with Marc Grabanski

Devchat.tv Master Feed

Play Episode Listen Later Sep 23, 2015 56:09


03:01 - Marc Grabanski Introduction Twitter GitHub Blog 03:35 - The jQuery UI Datepicker 04:29 - Frontend Masters @FrontendMasters 07:26 - The Live Streaming Phenomenon Twitch.tv 09:17 - Scalability 11:25 - Value, Feedback Cycle 14:43 - Structuring Courses and Workshops 16:09 - Online vs In-Person Prerequisites 18:11 - Booking Workshops 19:02 - Scaling (Cont’d) 20:00 - Online Education (eLearning) in General egghead.io CodeCombat NodeSchool 21:40 - The Business Model Licensing 24:12 - Hot Sellers Kyle Simpson: Advanced JavaScript 25:28 - Technical Setup Livestream Firebase 27:27 - Selecting Topics 29:41 - Future Topics / Topics in Production 30:38 - Individual / Company Attendees frontendmasters.com/workshops 31:45 - Upcoming Plans for Frontend Masters 32:32 - Advice For Starting Something Like Frontend Masters 34:23 - Keeping Content Up-to-date 36:14 - eLearning Experiments Untrusted exercism.io NodeSchool A Better Way to Learn JavaScript My Tech High 39:30 - Giveaways marc@frontendmasters.com 40:07 - Getting Started with Programming 43:03 - Marketing 45:20 - Teacher Compensation Picks Jessica Kerr: Functional Principles In React @ React Rally 2015 (Jamison) thought-haver (Jamison) [Frontend Masters] Angular Application Development (Aimee) [Frontend Masters] JavaScript the Good Parts (Aimee) LÄRABAR (Aimee) Taking time off (Chuck) The Man from U.N.C.L.E. (Joe) BB-8 by Sphero (Joe) ng-conf (Joe) The Tim Ferriss Show (Marc) CodeCombat (Marc) Untrusted (Marc)

The Tech-Gaming Podcast
Podcast 14-6: Yaibatized

The Tech-Gaming Podcast

Play Episode Listen Later Mar 28, 2015 132:20


This episode, the crew offers impressions of Damascus Gear: Operation Tokyo, Freedom Wars, Soul Sacrifice Delta, Monster Hunter 4, Dead or Alive: Last Round, 140, Last Tango, Untrusted, as well as revisits Wild Arms 2. Beyond Jeremy making good on his promise to watch Kill la Kill, we also take time out to sit down ... The post Podcast 14-6: Yaibatized appeared first on Tech-Gaming.

CERIAS Security Seminar Podcast
Savvas Savvides, Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds

CERIAS Security Seminar Podcast

Play Episode Listen Later Jan 28, 2015 48:11


The "pay-as-you-go" cloud computing model has strong potential for efficiently supporting big data analysis jobs expressed via data-flow languages such as Pig Latin. Due to security concerns — in particular leakage of data — government and enterprise institutions are however reluctant to moving data and corresponding computations to public clouds. In this talk we will discuss Crypsis, a system that allows execution of MapReduce-style data analysis jobs directly on encrypted data. Crypsis transforms data analysis scripts written in Pig Latin so that they can be executed on encrypted data. Crypsis to that end employs existing practical partially homomorphic encryption (PHE) schemes, and adopts a global perspective in that it can perform partial computations on the client side when PHE alone would fail. About the speaker: Savvas Savvides is a PhD student in Computer Science at Purdue University. He earned his Master's degree in Computer Science from New York University and his Bachelor's in Computer Science from the University of Manchester. His primary research interests include Information Security, Distributed Systems and Cloud Computing. His current research focus is on devising practical solutions for confidentiality preserving big data analysis jobs.

CERIAS Security Seminar Podcast
Savvas Savvides, "Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds"

CERIAS Security Seminar Podcast

Play Episode Listen Later Jan 28, 2015


The “pay-as-you-go” cloud computing model has strong potential for efficiently supporting big data analysis jobs expressed via data-flow languages such as Pig Latin. Due to security concerns — in particular leakage of data — government and enterprise institutions are however reluctant to moving data and corresponding computations to public clouds. In this talk we will discuss Crypsis, a system that allows execution of MapReduce-style data analysis jobs directly on encrypted data. Crypsis transforms data analysis scripts written in Pig Latin so that they can be executed on encrypted data. Crypsis to that end employs existing practical partially homomorphic encryption (PHE) schemes, and adopts a global perspective in that it can perform partial computations on the client side when PHE alone would fail.

CERIAS Security Seminar Podcast
Shumiao Wang, Secure and Private Outsourcing to Untrusted Cloud Servers

CERIAS Security Seminar Podcast

Play Episode Listen Later Jan 29, 2014 51:01


Storage and computation outsourcing to cloud servers has become very popular due to the large volume of data that needs to be hosted at cloud servers and the intent to employ servers to perform computational work for clients. However, many clients are still reluctant to do so due to their concern for the confidentiality of the data. In this talk, I will present our work on developing secure protocols to outsource several kinds of computation without leaking the clients' data to the cloud servers, including outsourcing feature extraction of images, generalized matrix multiplication, etc. About the speaker: Shumiao Wang is a Ph.D. candidate in Computer Science Department, Purdue University. She joined the CS department in 2010, received her MS in CS in 2012, and has been working with Prof. Mikhail Atallah on several research projects in the cloud outsourcing setting. Her research interests are primarily in information security, and also include algorithms and computer vision, and her thesis work is on designing protocols for secure computation and/or storage outsourcing.

CERIAS Security Seminar Podcast
Shumiao Wang, "Secure and Private Outsourcing to Untrusted Cloud Servers"

CERIAS Security Seminar Podcast

Play Episode Listen Later Jan 29, 2014


Storage and computation outsourcing to cloud servers has become very popular due to the large volume of data that needs to be hosted at cloud servers and the intent to employ servers to perform computational work for clients. However, many clients are still reluctant to do so due to their concern for the confidentiality of the data. In this talk, I will present our work on developing secure protocols to outsource several kinds of computation without leaking the clients' data to the cloud servers, including outsourcing feature extraction of images, generalized matrix multiplication, etc.

Computer Science Colloquium
Running Trusted Applications on Untrusted Operating Systems

Computer Science Colloquium

Play Episode Listen Later Dec 14, 2009 54:45


Expanding Reality
161 - Karen Macdonald - Matrix Energetics

Expanding Reality

Play Episode Listen Later Jan 1, 1970 156:22


Thank you for listening!For extended episodes, bonus conversations, powerful panel discussions and oodles more, Become an Expansive Insider at  ExpandingRealityPodcast.comThis is a Value for Value exchange model. If this show has enhanced your experience in any way, support our mission of Expanding Reality. Support The Mission! Karen Macdonaldher grace, 13th noble hereditary klan & tribe motherhead matriarch white bear star nations (spa'huth)Kamloops secwepemec (shuswaps, british columbia)(QBS, CHT, CBS,PEMF SCALAR RIFE RADIONICS) quantum medicine IQUIM University speciality biofeedback(natural health training includes: biowarfare, Herbology, aromatherapist, massage, vita-reflexology, sclera -iridology, kinesiology, matrix energy medicine reiki, Prana, yoga, heirloom gardening,shaman, alchemy, crystal, spring water protection arrived in Kamloops (1964), grew up in Saskatoon, studied interior decorating Saskatoon (1980-87), attending university of Saskatchewan (1982), miss Saskatoon runner up 1982, SIAST Kelsey technical college of nursing (1987), registered nurse & nurses union representative royal university hospital( NICU neonatal ICU/ postpartum (1987-2001), passionately perusing freedom & peace, protection of children in courts from 1987 to the present from mind control MK ultra. the unlawful abductions of tribal/klan and international star nation children, removal of vaccines, SMART meters, non taxation, questioning and refusal to submit to the draconian illuminati judges and lawyers in the Saskatoon Saskatchewan Canada provincial and queens bench courts led to her having her wrist broken in a court room by a sheriff, gained a following despite a news media black out on her & her children cases before the corpus juris secondum judges that had no jurisdiction on her as a lan-tribe mother with higher authority and having them understand her openly now accepting & validating her position such as tribunal judge Alfred Webre. Karen also does in depth de colonization of her clients including off grid teaching up on reserves coast to coast and uses spring living photonics sound water as a healing in enemas, colon hydrotherapy with plant Ormuz minerals, scalar rife radionics and magnetics, the newest Yoni-lingham (root chakra earth shattering, third eye opening peri prostate rezum/vaginal steams/pearl herb suppositories to tampons once hidden secret for emotional to sexual and ritual PSTD for chelation. radiation and now developing excellent protocols with dr. Ariel Policano ND and Ryan William, Pattie brassard tackling vaccine damage to Lyme and Morgellons with success.recently researching and developing LYME tick and CORONA virus anti dotes on a simple Iphone/pad/tab app called a GENIUSbiofeedback using sound & biophotinc scalar rife and cymatics solfeggio as a pulsed electronic magnetic radio wave PEMF and dismantling it. project incension:https://www.youtube.com/user/022367ASM:karen :lucyk macdonald youtube:https://www.youtube.com/channel/UCjGsFLvtw5Ytvn2rnst4nawhttps://vimeo.com/showcase/6224293 4 starter GENIUS bioscan videoshttps://genius-biofeedback.lpages.co/14-genius-journey beginner phone app GENIUS linkResource Links  Food Forest Abundance OPUSManifestors Guide.com/ExpandingRealityPromo code EXPANDINGREALITY for an additional 10% off.Start Your Own Podcast HERE!!! Expand Your Experience  Become an Expansive Insider Here Support The Mission! ExpandingRealityPodcast.com Rokfin YouTube Shirts N Such Tik Tok Music By Vinny The SaintBo Shaftnoski - Production Expert Episode Links* dr ariel policano ND SCALAR TO PEMF APPS.. RIFE OFF THE PHONE..YES..home free trial as well for your phone/tab/Ipad..LINK :)* https://geniusbiofeedback.com/?rfsn=5201588.e7905dPDF MANUAL https://arielpolicano.com/.../Beginners-Master-Guide-Long...YOUTUBE how to use/download voice/photo https://www.youtube.com/watch?v=fZ0F3mLUZ-I(settings>general>device management & install possibility wave as Untrusted for free manual override or call 1- 833- 321 SCAN facebook https://www.facebook.com/ka.lucyk.7https://www.youtube.com/watch?v=LsmOYZR8keY&t=640s HOW TO :my galactic goddess all around demosvaginal & yoni child steams, rezum pelvic lingham steams www.redtentwellness.com classes/supplies www.steamychick.com YONI WOMB DETOX pearls amazon GOOGLE IMAGESSpring water www.findaspring.com davidwolfe.com https://www.instructables.com/Black-Lemonade/activatedESSENTIAL OILS. aromatherapy internal use/suppositorytherapeutic suppliers. raindrop techniqque massage.. www.nevessence.com / kriaa kits amazon.ca edensgarden.com USA essentialaura.com CANADAMARKUS ROTHKRANZ/CARA BROTMANlove on a plate/the healthy life* must read THE PLAN, CACAO, cleaning enema chocolate smoothies http://files.zelenepotraviny1.webnode.cz/200000358-5ad865cccc/HealYourself.pdfCONTACT VAXXINOSIS.. SHEDDING OFF GASSING CONTAGIOUS AI NANO REPLICATIONhttps://rumble.com/v12i0nb-pamela-richardson-presents-a-risk-management-approach-to-covid-contact-vacc.htmlwww.NEWSINSIDEOUT.COM 12 shows+ judge/dr alfred webre * me & dr robert o young, dr ross andersen, tony pantalleresco, dr dena churchill, sandy glaze, eloise charet,sgt pattie brassard, gene decodeSupport this podcast at — https://redcircle.com/expanding-reality/exclusive-contentAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy