industry standard for computer connectors
Cheryl B. Engelhardt is a composer and songwriter whose new age, ambient music has been featured in films, ads, tv shows, and on meditation apps like Insight Timer. Cheryl began music lessons as a toddler; since then, her career has taken her all over the world but it's always been unique places and experiences that inspire her most creative work – experiences like a nine-day, cross country train trip from New York to Los Angeles and back, during which she composed and recorded her new album, The Passenger. With nothing but a laptop and a USB keyboard, Cheryl created twelve tracks while passing incredible views and roving wildlife. In this episode, Cheryl shares the highs and lows of that journey, which served as a creative experiment and an opportunity to process grief following the recent loss of a dear friend. Plus, Esme and Cheryl discuss the magic of train travel, how being physically in motion gives us the momentum to get emotionally and creatively unstuck, and the importance of relinquishing control in travel and in life. To learn more about Cheryl and listen to her music, visit her website www.cbemusic.com and her Instagram @cbemusic. You can purchase The Passenger on Amazon at www.cbemusic.co/amazon. Learn more about Full-Time Travel by visiting fulltimetravel.co and follow us on Instagram @full_time_travel. Be sure to rate, review, and follow so that you don't miss out on travel tips, inspiration, and your potential next adventure!
On this episode of MICRO BREAK RAW (5-18-22), I test out the Podbean Live App and run a short live stream! Follow the Host Linktree - https://linktr.ee/MICRO_BREAK Website - https://www.podpage.com/micro-break/ Twitter - https://twitter.com/Micro_Break Disclaimer MICRO BREAK RAW episodes are unedited and recorded by alternative means that may include portable phones, USB mics, or inferior equipment. The audio quality and content are not a true representation of the overall MICRO BREAK experience. All MICRO BREAK RAW episodes are unscheduled and typically uploaded just hours after they are recorded.
You want to hear about grain? Check? Yeast? Sure, you got it. Sweet mash vs. Sour Mash? Done. Kiln dried staves vs. air dried staves? Look no further! Listen in as Joshua and Jason have an in depth and geeky conversation around Woodinville Whisky Company with founders Orlin Sorenson & Brett Carlile. ...as usual, have a seat, have a pour, and listen in. Unless you're driving. If you're driving, be smart and stay sober but be sure to listen into the conversation! Special thanks to: - Weigh Down for allowing us to use their song "Wooden Monsters" as our theme song - Moana McAuliffe for designing our Podcast Logo - RØDE for making *really* great microphones - Focusrite for making awesome USB receivers - Olympus and Tascam for making fine mobile recording devices - Joshua Hatton for producing and editing
Stai ascoltando un estratto gratuito di Ninja PRO, la selezione quotidiana di notizie per i professionisti del digital business. Con Ninja PRO puoi avere ogni giorno marketing insight, social media update, tech news, business events e una selezione di articoli di approfondimento dagli esperti della Redazione Ninja. Vai su www.ninja.it/ninjapro per abbonarti al servizio.Spotify apre agli NFT: al via i primi test. La piattaforma di streaming ha confermato l'avvio della fase beta del progetto che permetterà agli artisti di mostrare i loro token non fungibili in accompagnamento a brani e album. I primi ad essere coinvolti sono Steve Aoki e The Wombats, produttore e dj il primo, gruppo musicale indie rock di Liverpool il secondo. Il test è disponibile per alcuni utenti su Android negli Stati Uniti e attualmente include collezionabili da acquistare con un rimando al negozio digitale di OpenSea. Facebook Pay diventa Meta Pay. L'azienda ha deciso di rinominare anche la sua piattaforma di pagamenti in ottica di metaverso. Ad annunciarlo è stato Stephane Kasriel, a capo della divisione Commerce & Financial Technologies del gigante americano, citando future integrazioni con la blockchain e le opere d'arte in Nft. "Immaginate un mondo in cui intrattenitori e atleti possano vendere Nft ai fan, da mostrare nelle loro case virtuali su Horizon" si legge in un suo blog post. Apple verso lo standard di ricarica Ue. Cupertino potrebbe cambiare la porta di ricarica sugli iPhone 15, in arrivo nel 2023. La mossa porterebbe al passaggio dall'odierno Lightning allo standard Usb-C, in risposta alle continue pressioni dell'Unione Europea sull'adozione di uno standard di alimentazione unico per i dispositivi tecnologic. Secondo Bloomberg il colosso americano starebbe lavorando su accessori, inclusi AirPods e periferiche quali mouse e tastiere, che si ricaricano tramite Usb-c.
Der Starinvestor dient vielen Anlegern als Inspiration. Am Montag hat er sein Portfolio veröffentlicht. Buffetts Strategie zu imitieren kann jedoch schief gehen. Vier Mal im Jahr veröffentlicht der Starinvestor Warren Buffett sein Portfolio und dient damit vielen Anlegerinnen und Anlegern weltweit als Inspiration für den nächsten Aktienkauf. Die Kaufentscheidungen des „Orakels von Omaha“ gelten als Gütesiegel für ein Unternehmen. Aus der letzten Pflichtmeldung an die US-Börsenaufsicht SEC am Montag geht hervor, dass der Starinvestor das 390 Milliarden Dollar schwere Portfolio seiner Investmentholding Berkshire Hathaway umgebaut hat und nun einen neuen Fokus im Energiesektor legt. Buffett legt Wert auf einen langen Anlagehorizont und investiert ausschließlich in Unternehmen, denen er ein nachhaltiges Gewinnwachstum zutraut. So setzt er seit Jahren beispielsweise auf den Getränkehersteller Coca-Cola. Sein Ruf eilt der Investorenlegende voraus: Was Buffett anfasst, wird sprichwörtlich zu Gold, heißt es. Doch lohnt es sich wirklich seine Aktienkäufe zu imitieren? Handelsblatt-Finanzredakteur Andreas Neuhaus mahnt jedenfalls zur Vorsicht. Für das Handelsblatt analysierten er und Finanzredakteur Jürgen Röder 37 seit 2016 getätigte Neu-Investitionen Buffetts – mit überraschenden Erkenntnissen. Im Podcast Handelsblatt Today erklärt er: „Nachahmer Buffetts sorgen in nahezu allen Fällen für einen Kurssprung am Folgetag.“ Beobachten lässt sich das am Dienstag am Beispiel der Citigroup. Gestern erst wurde bekannt, dass Buffett Anteile der Bank eingekauft hat, die zum Ende des Quartals rund drei Milliarden Dollar wert waren. Der Aktienkurs stieg daraufhin am Folgetag um rund sechs Prozent. Wer also versucht, die Käufe von Warren Buffett für sein eigenes Depot nachzubilden, sollte laut der Handelsblatt-Experten niemals am ersten möglichen Handelstag zum Start eine Order ohne Limit aufgeben. Außerdem rät Neuhaus: „Wer dem Orakel nacheifern möchte, sollte beispielsweise nicht allein darauf schauen, welche Aktien er kauft, sondern wie groß dessen Engagement beim Kauf ist.“ Die wenigsten Anleger könnten in dem Umfang investieren wie Buffett. Umso wichtiger sei es, einen günstigen Einstiegspunkt zu finden und die Verteilung im Berkshire Hathaway-Portfolio zu beachten. In vielen Einzelfällen liege die von Buffett gekaufte Aktie einen Monat nach Bekanntgabe der Käufe deutlich im Minus. Außerdem: Schweden und Finnland wollen der Nato beitreten - dafür sprach sich am Sonntag die finnische Regierung aus und am Montag das schwedische Parlament. Beide Länder erfüllen die Beitrittskriterien. Doch einem Beitritt müssen zunächst noch alle 30 Nato-Mitglieder zustimmen. Ihr Veto einlegen könnte beispielsweise die Türkei. Präsident Erdogan hat bereits bekundet, dass er den Beitritt "nicht positiv" sieht. Politikredakteurin Teresa Stiens ordnet die Chancen und Risiken einer Nato-Erweiterung ein. *** Exklusives Angebot für Handelsblatt Today-Hörer: Testen Sie Handelsblatt Premium 4 Wochen für 1 € und bleiben Sie immer informiert, was die Finanzmärkte bewegt. Mehr Informationen: www.handelsblatt.com/mehrfinanzen
Vor dem Wochenende präsentierten sich die US-Börsen fester. Der Dow Jones ging mit einem Plus von 1,5 Prozent aus dem Handel. Die Tech-Aktien präsentierten sich noch stärker, der Nasdaq legte um 3,7 Prozent zu.
Dr. Drew and psychologist Dr. David Swanson discuss the tragic death of Taylor Hawkins (drummer for the rock band Foo Fighters), his struggles with substance abuse, and the devastating effects of addiction on musicians. [This podcast was originally broadcast on April 11, 2022. Watch at DrDrew.com] Dr. David Swanson formed The Rock Collective to build a mutually supportive community amongst rock bands and rock fans. They hold monthly events at the Hard Rock Cafe in Hollywood, where they feature live music from emerging rock bands in LA. The mission of the collective is to help up-and-coming artists break through to the next level. Learn more at https://rockcollective.net Ask Dr. Drew is produced by Kaleb Nation ( https://kalebnation.com) and Susan Pinsky (https://twitter.com/FirstLadyOfLove). SPONSORS • BLUE MICS – After more than 30 years in broadcasting, Dr. Drew's iconic voice has reached pristine clarity through Blue Microphones. But you don't need a fancy studio to sound great with Blue's lineup: ranging from high-quality USB mics like the Yeti, to studio-grade XLR mics like Dr. Drew's Blueberry. Find your best sound at https://drdrew.com/blue • ELGATO – Every week, Dr. Drew broadcasts live shows from his home studio under soft, clean lighting from Elgato's Key Lights. From the control room, the producers manage Dr. Drew's streams with a Stream Deck XL, and ingest HD video with a Camlink 4K. Add a professional touch to your streams or Zoom calls with Elgato. See how Elgato's lights transformed Dr. Drew's set: https://drdrew.com/sponsors/elgato/ THE SHOW: For over 30 years, Dr. Drew Pinsky has taken calls from all corners of the globe, answering thousands of questions from teens and young adults. To millions, he is a beacon of truth, integrity, fairness, and common sense. Now, after decades of hosting Loveline and multiple hit TV shows – including Celebrity Rehab, Teen Mom OG, Lifechangers, and more – Dr. Drew is opening his phone lines to the world by streaming LIVE from his home studio in California. On Ask Dr. Drew, no question is too extreme or embarrassing because the Dr. has heard it all. Don't hold in your deepest, darkest questions any longer. Ask Dr. Drew and get real answers today. This show is not a substitute for medical advice, diagnosis, or treatment. All information exchanged during participation in this program, including interactions with DrDrew.com and any affiliated websites, are intended for educational and/or entertainment purposes only.
Support Topic Lords on Patreon and get episodes a week early! (https://www.patreon.com/topiclords) Lords: * Maxx * firstname.lastname@example.org * Michael * https://www.instagram.com/softseabunny/ * https://email@example.com Topics: * "World's greatest author Chuck Tingle" * Way of making moving easier, collective tips? * https://overmental.com/content/the-beautiful-zelda-artwork-of-katsuya-terada-7898 * https://en.wikipedia.org/wiki/DataHand * Melatonin parenting decisions * http://false-panels.com/fjf/ Microtopics: * Rabbit nose speeds. * A stranger from Australia handing you a twenty dollar bill. * Lining a trench coat with Steam keys. * How to make Elden Ring feel like a video game rather than a slog. * An incredible variety of fantastical biomes filled with body horror monstrosities that are inexplicably bad at killing you. * Playing Elden Ring with passive enemies * Big columns with massively muscular horsemen. * Sheep curling up into a wheel and rolling away. * Fostering a different sense of what accomplishment means. * Ramps interweaving the stairway. * Going into a spooky house and the house is like "why would you come in here? Can't you see I'm haunted" * Going into a spooky house in hopes of seeing bespoke content. * An author of real books that people think are memes. * A tornado that has a butthole because it must've picked it up with all the other debris. * Lesbian candy corn. * High-functioning chocoholics. * Having sex with the State of California and reading the list of things that the State of California has found to cause cancer. * Making a career out of exploring the weird connections in your own mind. * Writing to Chuck Tingle to ask for more details about the 747's genitalia. * Moving house and then moving house again immediately, to save yourself a packing/unpacking cycle. * Having many shamefully confusing objects and making the movers wear blindfolds. * Making your friends wear blindfolds and rely on LIDAR when they come into your house. * Putting all your vacation souvenirs in storage and going to your storage unit when you want to remember your vacation. * Three drawers of cables organized into power cables, USB cables and audio cables, all neatly constrained with velcro. * Giving your rabbit decoy cables to chew on so that the important cables remain safe. * Throwing away 70% of your stuff. * Whether it's a lie if you have books on your shelf that you haven't read yet. * Apocryphal John Waters quotes. * Having an outfit for hacktivism. * Mounting the spines of books you've read above your hearth. * Data Hands. * A keyboard that doesn't work in direct sunlight. * Foot Mouse and the Data Hands. * Staring into the abyss, wiggling your fingers. * Underwear computing. * Late-onset melatonin generation. * How to deal when everybody in the family gets sick at once. * An island made of bureaucracy. * The fax machine in your underwear computer. * How to pronounce "James" according to Jim's facebook profile. * Armchairing a request for poetry in the rudest way possible. * Streets that duel like coarse teeth. * The matted thing that leaves its woman without the duck. * Hooking your poetry generator up to a receipt printer so people can print a new poem on demand. * Writing a poem and finding out what you meant later. * Soup repair. * A man who is nice on British TV but angry on American TV. * Old Enough! * An extremely relatable two year old. * Being tasked with juicing some oranges and spending the next hour chasing the dog.
You can build a laser harp using time of flight distance sensors. The CircuitPython code converts the distance data to MIDI messages that can be sent out over UART or USB. Check out the Learn Guide for all of the files and build instructions: https://learn.adafruit.com/midi-laser-harp-time-of-flight-sensors Visit the Adafruit shop online - http://www.adafruit.com ----------------------------------------- LIVE CHAT IS HERE! http://adafru.it/discord Adafruit on Instagram: https://www.instagram.com/adafruit Subscribe to Adafruit on YouTube: http://adafru.it/subscribe New tutorials on the Adafruit Learning System: http://learn.adafruit.com/ -----------------------------------------
Elon Musk floats the idea of suspending orders on certain Teslas while the wait list is so long. Plus: Elon's thoughts on launching the Cybertruck after its EV pickup truck rivals, highlights and analysis from Tesla's 2021 Impact Report, and more! If you enjoy the podcast and would like to support my efforts, please check out my Patreon at https://www.patreon.com/teslapodcast and consider a pledge. I'd be grateful. Every little bit helps and there are bonuses in it for you at each pledge level! And don't forget to leave a message on the Ride the Lightning hotline anytime with a question, comment, or discussion topic for next week's show! The toll-free number to call or Skype is 1-888-989-8752. P.S. Get 15% off your first order of awesome aftermarket Tesla accessories at AbstractOcean.com by using the code RTLpodcast at checkout. And if you're ordering a Jeda Wireless Charging Pad or USB hub for Model 3/Y (coupon code RTL), please use my referral link: https://getjeda.com/ref/8/ Grab the SnapPlate for any of the four Teslas at https://everyamp.com/RTL/. Finally, pick up a 128gb or 256gb Sentry Mode/Dashcam kit at http://www.puretesla.com/rtl
Joey tests a new Facebook Live Feature for the show! Office 2010/2013 works! Chromebook how do I know if an App is legit? Wifi not working after Fiber install, HP Elitebook can I charge it from USB?, How do take the Hum out of my tape/Mp3 conversion? Should I give TruBill my bank account info? Is a recovery the same a s backup?
Facebook Has No Idea Where Your Data Is and What They Do With It?! Facebook's about 18 years old coming on 20 Facebook has a lot of data. How much stuff have you given Facebook? Did you fall victim for that? Hey, upload your contacts. We'll find your friends. They don't know where your data is. [Following is an automated transcript] [00:00:15] This whole thing with Facebook has exploded here lately. [00:00:20] There is an article that had appeared on a line from our friends over at, I think it was, yeah. Let me see here. Yeah. Yeah. Motherboard. I was right. And motherboards reporting that Facebook doesn't know what it does with your data or. It goes, no, there's always a lot of rumors about different companies and particularly when they're big company and the news headlines are grabbing your attention and certainly Facebook can be one of those companies. [00:00:57] So where did motherboard get this opinion about Facebook? Just being completely clueless about your personal. It tamed from a leaked document. Yeah, exactly. So we find out a lot of stuff like that. I used to follow a website about companies that were going to go under and they posted internal memos. [00:01:23] It basically got sued out of existence, but there's no way that Facebook is going to be able to Sue this one out of existence because they are describing this as. Internally as a tsunami of privacy regulations all over the world. So Gores, if you're older, we used to call those tidal waves, but think of what the implication there is of a tsunami coming in and just overwhelming everything. [00:01:53] So Facebook, internally, their engineers are trying to figure out, okay. So how do we deal with. People's personal data. It's not categorized in ways that regulators want to control it. Now there's a huge problem right there. You've got third party data. You've got first party data. You've got sensitive categories, data. [00:02:16] They might know what religion you are, what your persuasions are in various different ways. There's a lot of things they might know about you. How were they all cat categorize now we've got the European union. With their general data protection regulation. The GDPR we talked about when it came into effect back in 2018, and I've helped a few companies to comply with that. [00:02:41] That's not my specialty. My specialty is the cybersecurity. But in article five this year, peon law mandates that personal data must be collected for specified explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes. So what that means is that every piece of data, like where you are using Facebook or your religious orientation, Can only be collected in use for a specific purpose and not reused for another purpose. [00:03:19] As an example here, that vice has given in past Facebook, took the phone number that users provided to protect their accounts with two factor authentication and fed it to its people, feature as well as. Advertisers. Yeah. Interesting. Hey, so Gizmodo with the help of academic researchers caught Facebook doing this, and eventually the company had to stop the practice because, and this goes back to the earlier days where Facebook would say, Hey, find out if your friends are on Facebook, upload your contacts right now. [00:03:54] And most people. What did you know back then about trying to keep your data private, to try and stop the proliferation of information about you online then nothing. I think I probably even uploaded it back then thinking it'd be nice to see if I got friends here. We can start chatting, et cetera. [00:04:12] According to legal experts that were interviewed by motherboard who wrote this article and has a copy of the internal memo this year, PN regulation specifically prohibits that kind of repurposing of your phone number of trying to put together the social graph and the leaked document shows that Facebook may not even have the ability to live. [00:04:37] How it handles user's data. Now I was on a number of radio stations this week, talking about this. And the example I gave is just look at an average business from the time it start, Facebook started how right? Wildly scraping pictures of young women off of Harvard university. Main catalog, contact page, and then asking people what do you think of this? This person, that person. And off they go, trying to rate them. Yeah. Yeah. All that matters to a woman, at least to Courtney, to mark Zuckerberg girl, all the matters about a woman is how she looks. Do I think she's pretty or not? [00:05:15] It's ridiculous. What he was doing. It just, oh, that's zackerburg who he is not a great guy anyways. So you go from stealing pictures of young ladies asking people to rate them, putting together some class information and stuff there at Harvard, and then moving on to other universities and then open it up even wider and wider. [00:05:42] And of course, that also created demand because you can't get on. If you're not at one of the universities that we have set it up for. And then you continue to grow. You're adding these universities, certainly starting to collect data and you are making more money than God. So what do you do? You don't have to worry about any efficiencies. [00:06:02] I'll tell you that. Right? One thing you don't have to do is worry about gee. We've got a lot of redundant work going on here. We've got a lot of teams working on basically the same thing. No, you've got more money than you can possibly shake a stick at. So now you go ahead and send that money to this group or that group. [00:06:24] And they put together all of the basic information, that they want. Pulling it out of this database and that database in there doing some correlation, writing some really cool CQL queries with mem credible joins and everything else. And now that becomes part of the main code for Facebook. [00:06:45] And then Facebook goes on to the next little project and they do the same thing. Then the next project, then the next project. And then someone comes along and says, Hey, we. This feature, that feature for advertisers and then in that goes, and then along comes candidate Obama. And they, one of the groups inside Facebook says, yeah here we go. [00:07:09] Here's all of the information we have about everybody and it's free. Don't worry about it. And then when Trump actually bought it and hired a company to try and process some of that information he got in trouble. No but the. The whole campaign could get access to anything they wanted to, again, because the data wasn't controlled, they had no idea who was doing what with the data. [00:07:34] And according to this internal memo, they still don't know. They don't even know if they can possibly comply with these regulations, not just in Europe, but we have regulations in pretty much all of the 50 states in the U S Canada of course, has their own Australia and New Zealand think about all the places. [00:07:57] Facebook makes a lot of. So here's a quote from that we build systems with open borders. The result of these open systems and open culture is well-described with an analogy. Imagine you hold a bottle of ink in your hand, the bottle of ink is a mixture of all kinds of user data. You pour that ink into a lake of water and K and it flows every year. [00:08:22] The document read. So how do you put that ink back in the bottle? I, in the right bottle, how do you organize it again? So that it only flows to the allowed places in the lake? They're totally right about that. Where did they collect it from? Apparently they don't even know where they got some of this information. [00:08:43] This data from reminds me of the no fly list. You don't know you're on it and you can't get yourself off of it. It's crazy. So this document that we're talking about, it was written last year by. Privacy engineers on the ad and business product team, whose mission is to make meaningful connections between people and businesses and which quote sits at the center of our monetization strategy. [00:09:06] And is the engine that powers Facebook's growth. Interesting. Interesting problems. And I see this being a problem well into the future for more and more of these companies, look at Twitter as an example that we've all heard about a lot lately. And then I've talked about as well along comes Elon Musk and he says wait a minute. [00:09:29] I can make Twitter way more profitable. We're going to get rid of however many people over a thousand, and then we are going to hire more people. We're going to start charging. We're going to be more efficient. You can bet all of these redundancies that are in Facebook are also there. And Twitter also has to comply with all of these regulations that Facebook is freaking out about it for a really a very good reason. [00:10:00] So this document is available to anybody who wants to look at it. I'm looking at it right now, talking about regulatory landscape and the fundamental problems Facebook's data lake. And this is a problem that most companies have not. As bad as Facebook does the button. Most companies you write, you grow. I have yet to walk into a business that needs help with cybersecurity and find everything in place as it should be because it grew organically. [00:10:32] Do you started out with a little consumer firewall router, wifi, and then you added to it and you put a switch here and you added another switch behind that and move things around. This is normal. This is not total incompetence on the part of the management, but my gosh, I don't know. Maybe they need an Elon Musk. [00:10:52] Just straighten them out as well. Hey, stick around. I'll be right back and sign up firstname.lastname@example.org. [00:11:02] Apparently looting is one of the benefits of being a Russian soldier. And according to the reports coming out of Ukraine, they've been doing it a lot, but there's a tech angle on here that is really turning the tables on these Russian Looters. [00:11:19] We know in wars, there are people that loot and typically the various militaries try and make sure, at least recently that looting is kept to an absolute minimum. [00:11:32] Certainly the Americans, the British, even the Nazis during world war II the the socialists they're in. Germany they tried to stop some of the looting that was going on. I think that's probably a very good thing, because what you end up with is just all of these locals that are just totally upset with you. [00:11:57] I found a great article on the guardian and there's a village. I hadn't been occupied for about a month by Russian troops and the people came back. They are just shocked to see what happened in there. Giving a few examples of different towns. They found that the alcohol was stolen and they left empty bottles behind food wrappers, cigarette butts, thrown all over the place in apartments in the home. [00:12:26] Piles of feces blocking the toilets, family photographs torn, thrown around the house. They took away all of the closes as a code from one of the people, literally everything, male and female coats, boots, shirts, jackets, even my dresses and laundry. This is really something. The Sylvia's didn't do this, but now Russia. [00:12:49] The military apparently does. So over the past couple of weeks, there have been reporting from numerous places where Russian troops had occupied Ukrainian territory and the guardian, which is this UK newspaper collected evidence to suggest looting by Russian forces was not merely a case of a few way, word soldiers, but a systematic part of Russian military behavior across multiple towns. [00:13:17] And villages. That's absolutely amazing. Another quote here, people saw the Russian soldiers loading everything onto your old trucks. Everything they could get their hands on a dozen houses on the villages. Main street had been looted as well as the shops. Other villagers reported losing washing machines, food laptops, even as sofa, air conditioner. [00:13:41] Being shipped back, just you might use ups here or they have their equivalent over there. A lady here who was the head teacher in the school, she came back in, of course, found her home looted and in the head teacher's office. She found an open pair of scissors that had been jammed into a plasma screen that was left behind because if they can't steal it, they're going to destroy it. [00:14:07] They don't wanna leave anything behind. They found the Russian to take in most of the computers, the projectors and other electronic equipment. It's incredible. So let's talk about the turnaround here. You might've heard stories about some of these bad guys that have smashed and grabbed their way into apple stores. [00:14:27] So they get into the apple store. They grab laptops on iPads, no longer iPods, because they don't make those anymore. And I phone. And they take them and they run with them. Nowadays there's not a whole lot of use for those. Now what they have been doing, some of these bad guys is they'd take some parts and use them in stolen equipment. [00:14:52] They sell them on the used market, et cetera. But when you're talking about something specific, like an iPhone that needs specific activation. Completely different problem arises for these guys because that iPhone needs to have a SIM card in order to get onto the cell network. And it also has built in serial numbers. [00:15:15] So what happens in those cases while apple goes ahead and disables them. So as soon as they connect to the internet, they didn't say they put them on wifi. They don't get a SIM card. They don't. Service from T-Mobile or Verizon or whoever it might be. So now they just connect to the wifi and it calls home. [00:15:33] Cause it's going to get updates and download stuff from the app store and they find that it's been bricked. Now you can do that with a lot of mobile device managers that are available for. All kinds of equipment nowadays, but certainly apple equipment where if a phone is lost or stolen or a laptop or other pieces of equipment, you can get on the MDM and disable it, have it remotely erase, et cetera. [00:16:00] Now, please have had some interesting problems with that. Because a bad guy might go ahead and erase a smartphone. That's in the evidence locker at the police station. So they're doing things like putting them into Faraday cages or static bags or other things to try and stop that. So I think we've established here that the higher tech equipment is pretty well protected. [00:16:25] You steal it. It's not going to do you much. Good. So one of the things the Russian stole when they were in a it's called a, I think you pronounced. Melad Mellott DePaul which is again, a Ukrainian city is they stole all of the equipment from a farm equipment dealership and shipped it to check. Now that's according to a source in a businessman in the area that CNN is reporting on. [00:16:56] So they shipped this equipment. We're talking about combine harvesters were 300 grand a piece. They shipped it 700 miles. And the thieves were ultimately unable to use the equipment because it had been locked remotely. So think about agriculture equipment that John Deere, in this case, these pieces of equipment, they, they drive themselves. [00:17:23] It's atonomous it goes up and down the field. Goes to any pattern that you want to it'll bring itself within a foot or an inch of your boundaries, of your property being very efficient the whole time, whether it's planting or harvesting, et cetera. And that's just a phenomenal thing because it saves so much time for the farmer makes it easier to do the companies like John Deere. [00:17:49] Want to sell as many pieces of this equipment as they possibly can. And farming is known to be a what not terribly profitable business. And certainly isn't like Facebook. So how can they get this expensive equipment into the hands of a lot of farmers? What they do is they use. So you can lease the equipment through leasing company or maybe directly from the manufacturer and now you're off and running. [00:18:16] But what happens if the lease isn't paid now? It's one thing. If you don't pay your lease on a $2,000 laptop, right? They're probably not going to come hunting for you, but when you're talking about a $300,000 harvester, they're more interested. So the leasing company. Has titled to the equipment and the leasing company can shut it off remotely. [00:18:41] You see where I'm going with this so that they can get their equipment in the hands of more farmers because the farmers can lease it. It costs them less. They don't have to have a big cash payment. You see how this all works. So when the Russian forces stole this equipment, that's valued, total value here is about $5 million. [00:19:02] They were able to shut it all off. And th the, obviously if you can't start the engine, because it's all shut off and it's all run by computers nowadays, and there's pros and cons to that. I think there's a lot of cons, but what are you going to do? How's that going to work for? Isn't going to work for you. [00:19:22] And they were able to track it and had GPS trackers find out exactly where it was. That's how they know it was Tara taken to Chechnya and could be controlled remotely. And in this case, how did they control it? They completely. Shut it off, even if they sell the harvesters for spare parts to learn some money, but they sure aren't gonna be able to sell them for the 300 grand that they were actually worth. [00:19:48] Hey, stick around. We'll be right back and visit me email@example.com. If you sign up there, you'll be able to get my insider show notes. And every week I have a quick. Training right there. New emails, Craig Peterson.com. [00:20:05] If you've been worried about ransomware, you are right to worry. It's up. It's costly. And we're going to talk about that right now. What are the stats? What can you do? What happens if you do get hacked? Interesting world! [00:20:20] Ransomware has been a very long running problem. I remember a client of ours, a car dealership who we had gone in. [00:20:31] We had improved all of their systems and their security, and one of them. People who was actually a senior manager, ended up downloading a piece of ransomware, one of these encrypted ones and opened it up and his machine all of a sudden, guess what it had ransomware on it. One of those big. Green's that say, pay up and send us this much Bitcoin, and here's our address. [00:21:00] All of that sort of stuff. And he called us up and said, what's going on here? What happened? First of all, don't bring your own machine into the office. Secondly, don't open up as particularly encrypted files using a password that they gave. And thirdly, we stopped it automatically. It did not spread. [00:21:20] We were able to completely restore his computer. Now let's consider here the consequences of what happened. So he obviously was scared. And within a matter of a couple of hours, we actually had him back to where he was and it didn't spread. So the consequences there, they weren't that bad. But how about if it had gotten worse? [00:21:47] How about if the ransomware. Also before it started holding his computer ransom, went out and found all of the data about their customers. What do you think an auto dealership would love to hear that all of their customer data was stolen and released all of the personal data of all of their customers? [00:22:08] Obviously not. So there's a potential cost there. And then how long do you think it would take a normal company? That thinks they have backups to get back online. All I can tell you it'll take quite a while because the biggest problem is most backups don't work. We have yet to go into a business that was actually doing backups that would work to help restore them. [00:22:35] And if you're interested, I can send you, I've got something I wrote up. Be glad to email it back to you. Obviously as usual, no charge. And you'll be able to go into that and figure out what you should do. Cause I, I break it down into the different types of backups and why you might want to use them or why you might not want to use them, but ransomware. [00:22:58] Is a kind of a pernicious nasty little thing, particularly nowadays, because it's to two factor, first is they've encrypted your data. You can't get to it. And then the second side of that is okay I can't get to my data and now they're threatening to hold my data ransom or they'll release. So they'll put it out there. [00:23:22] And of course, if you're in a regulated industry, which actually car dealers are because they deal with financial transactions, leases, loans, that sort of thing you can lose your license for your business. You can, you lose your ability to go ahead and frankly make loans and work with financial companies and financial instruments. [00:23:45] It could be a very big. So there are a lot of potential things that can happen all the way from losing your reputation as a business or an individual losing all of the money in your operating account. And again, we've got a client that we picked up afterwards. That yes, indeed. That lost all of the money in their operating account. [00:24:09] And then how do you make payroll? How do you do things? There's a new study that came out from checkpoint. Checkpoint is one of the original firewall companies and they had a look at ransomware. What are the costs of ransomware? Now bottom line, I'm looking at some stats here on a couple of different sites. [00:24:29] One is by the way, Conti, which is a big ransomware gang that also got hacked after they said we are going to attack anyone. That doesn't defend Plaid's invasion of Ukraine, and then they got hacked and their information was released, but here's ransomware statistics. This is from cloud words. First of all, the largest ransom demand is $50 million. [00:24:55] And that was in 2021 to Acer big computer company. 37% of businesses were hit by ransomware. In 2021. This is amazing. They're expecting by 2031. So in about a decade, ransomware is going to be costing about $265 billion a year. Now on average. Ransomware costs businesses. 1.8, $5 million to recover from an attack. [00:25:25] Now that's obviously not a one or two person place, but think of the car dealer again, how much money are they going to make over the year or over the life of the business? If you're a car dealer, you have a license to print money, right? You're selling car model or cars from manufacturers. And now you have the right to do that and they can remove that. [00:25:48] How many tens, hundreds of millions of dollars might that end up costing you? Yeah. Big deal. Total cost of ransomware last year, $20 billion. Now these are the interesting statistics here right now. So pay closer attention to this 32% of ransomware victims paid a ransom. So about a third Peter ransom demand. [00:26:12] Lastly. It's actually down because my recollection is it used to be about 50% would pay a ransom. Now on average that one third of victims that paid a ransom only recovered 65% of their data. Now that differs from a number I've been using from the FBI. That's a little bit older that was saying it ends it a little better than 50%, but 65% of pain victims recovered their. [00:26:41] Now isn't that absolutely amazing. Now 57% of companies were able to recover their data, using a cloud backup. Now think about the different types of backup cloud backup is something that can work pretty well if you're a home user, but how long did it take for your system to get back? Probably took weeks, right? [00:27:05] For a regular computer over a regular internet line. Now restoring from backups is going to be faster because your downlink is usually faster than your uplink. That's not true for businesses that have real internet service like ours. It's the same bandwidth up as it is down. But it can take again, days or weeks to try and recover your machine. [00:27:28] So it's very expensive. And I wish I had more time to go into this, but looking at the costs here and the fact that insurance companies are no longer paying out for a lot of these ransomware attacks, it could be credibly expensive for you incredibly. The number one business types by industry for ransomware attacks, retail. [00:27:59] That makes sense. Doesn't it. Real estate. Electrical contractors, law firms and wholesale building materials. Isn't that interesting? And that's probably because none of these people are really aware or conscious of doing what a, of keeping their data secure of having a good it team, a good it department. [00:28:24] So there's your bottom line. Those are the guys that are getting hit. The most, the numbers are increasing dramatically and your costs are not just in the money. You might pay as a ransom. And as it turns out in pretty much every case prevention. Is less expensive and much better than the cure of trying to pay ransom or trying to restore from backups. [00:28:52] Hey, you're listening to Craig Peterson. You can get my weekly show notes by just going to craig peterson.com. [00:29:00] You and I have talked about passwords before the way to generate them and how important they are. We'll go over that again a little bit in just a second, but there's a new standard out there that will eliminate the need for passwords. [00:29:16] Passwords are a necessary evil, at least they have been forever. I remember, I think the only system I've ever really used that did not require passwords was the IBM 360. [00:29:31] Yeah, 360, you punch up the cards, all of the JCL you feed the card deck in and off it goes. And does this little thing that was a different day, a different era. When I started in college in university, we. We had a remote systems, timeshare systems that we could log into. And there weren't much in the line of password requirements. [00:29:58] And, but you had a username, you had a simple password. And I remember one of our instructors, his name was Robert, Andrew Lang, and his password was always some sort of a combination of RA Lang. So it was always easy to guess what his password was. Today. It has gotten a lot worse today. We have devices with us all the time. [00:30:22] You might be wearing a smart watch. That requires a password. You course probably have a smartphone that also maybe requiring a password. Certainly after it boots nowadays they use fingerprints or facial recognition, which is handy, but it has its own drawbacks. But how about the websites? You're going to the systems you're using in you're at work and logging in. [00:30:49] They all require password. And usernames of some sort or another well, apple, Google, and Microsoft have all committed to expanding their support for a standard. That's actually been out there for a few years. It's called the Fido standard. And the idea behind this is that you don't have to have a password in order to. [00:31:15] Now that's really an interesting thing, right? Just looking at it because we're so used to have in this password only authenticate. And of course the thing to do there is to make sure you have for your password, multiple words in the password, it should really be a pass phrase. And between the words put in special characters or numbers, maybe. [00:31:41] Upper lower case a little bit. In those words, those are the best passwords, 20 characters, 30 characters long. And then if you have to have a pin, I typically use a 12 digit pin. And how do I remember all of these? Cause I use a completely different password for every website and right now, Let me pull it up. [00:32:03] I'm using one password dot coms, password manager. And my main password for that is about 25 characters long. And I have thirty one hundred and thirty five. And trees here in my password manager, 3,100, that is a whole lot of passwords, right? As well as software licenses and a few other things in there. [00:32:30] That's how we remember them is using a password manager. One password.com is my favorite. Now, obviously I don't make any money by referring you there. I really do like that. Some others that I've liked in the past include last pass, but they really meant. With some of their cybersecurity last year and I lost my faith in it. [00:32:51] So now what they're trying to do is make these websites that we go to as well as some apps to have a consistent, secure, and passwordless. And they're going to make it available to consumers across all kinds of devices and platforms. That's why you've got apple, Google, and Microsoft all committing to it. [00:33:15] And you can bet everybody else is going to follow along because there's hundreds of other companies that have decided they're going to work with the Fido Alliance and they're going to create this passwordless future. Which I like this idea. So how does this work? Basically you need to have a smartphone. [00:33:33] This is, I'm just going to go with the most standard way that this is going to work here in the future, and you can then have. Passkey, this is like a multi-factor authentication or two factor authentication. So for instance, right now, when I sign into a website online, I'm giving a username, given a password, and then it comes up and it asks me for a code. [00:33:57] So I enter in a six digit code and that code changes every 30 seconds. And again, I use my password manager from one password. In order to generate that code. So that's how I log into Microsoft site and Google sites and all kinds of sites out there. So it's a similar thing here now for the sites for my company, because we do cyber security for businesses, including regulated businesses. [00:34:24] We have biometrics tied in as. So to log into our systems, I have to have a username. I have to have a password. I then am sent to a single sign-on page where I have to have a message sent to my smart device. That then has a special app that uses biometrics either a face ID or a fingerprint to verify who I am. [00:34:49] Yeah, there's a lot there, but I have to protect my customers. Something that very few it's crazy. Actual managed security services providers do, but it's important, right? By the way, if you want my password. Special report, just go to Craig peterson.com. Sign up for my email list. I'll send that to you. [00:35:13] That's what we're sending out right now for anyone who signs up firstname.lastname@example.org. And if you'd like a copy of it in you're already on the list, just go ahead and email me. At Craig peterson.com and ask for the password special report where I go through a lot of this sort of thing. So what will happen with this is you go to a website and I might come up with a QR code. [00:35:37] So you then scan that QR code with your phone and verify it, authorize it on your phone. You might again to have it set up so that your phone requires a facial recognition or perhaps it'll require a fingerprint. And now you are. Which is very cool. They fix some security problems in Fido over the last few years, which is great over the coming year. [00:36:02] You're going to see this available on apple devices, Google Microsoft platforms, and it really is simple, stronger authentication. That's sort of Fido calls it. But it is going to make your life a lot easy, easier. It is a standard and the passwordless future makes a whole lot of sense for all of us. Now, I want to talk about another thing here that just bothered me for a long time. [00:36:30] I have a sister. Who is in the medical field and gives prescriptions, doctor thing. And I think she's not quite a doctor. I can't remember what she has. She's an LPN or something. And anyhow, so she. We'll get on a zoom call with someone and they'll go through medical history and what's happening right now and she'll make prescriptions. [00:36:57] And so I warned her about that saying, it is very bad to be using zoom because zoom is not secure. Never has been, probably never will be right. If you want secure. To go and pay for it from one of these providers like WebEx, that's what we use. We have a version of WebEx that is set up to be secure. [00:37:20] So I talked to her about that and said, Hey, listen, you can't do this. You've really got to go another way here. And so she started using one of these mental or. Medical health apps. What I want to talk about right now specifically are some checks that were just performed some audits on mental health apps. [00:37:45] That's why I messed up a second ago, but what they looked at is that things are a serious problem there. And then fact, the threat post, just calling it a. Frankly, just plain old creepy. So they've got some good intentions. They want to help with mental health. You've probably seen these or at least heard them advertise. [00:38:06] So you can get on the horn with a mental health professional, a doctor or otherwise in order to help you here with your psychological or spiritual wellness. And people are sharing their personal and sensitive data with third parties and have 32 mental health and prayer mobile apps that were investigated by the open source organization. [00:38:32] 28, 28 of the 32 were found to be inherently insecure and were given a privacy not included label, including others here. So this is a report. That was released here by the open source organization, tied into Mozilla. Those are the Firefox people. They have what they call their minimum security standards. [00:38:56] So things like requiring strong passwords, managing security, updates, and vulnerabilities, et cetera. 25 of the 32 failed to meet. Even those minimum security standards. So these apps are dealing with some of the most sensitive mental health and wellness issues people can possibly have, right? Depression, anxieties, suicidal fonts, domestic violence, eating disorders. [00:39:23] And they are being just terrible with your security Mozilla researchers spent 255 hours or about eight hours per product pairing under the hood of the security, watching the data that was going back and forth, right between all of these mental health and prayer apps. It was just crazy. So for example, eight of the apps reviewed, allowed weak passwords, that range. [00:39:52] One digit one as the password to 1, 1, 1, 1, while a mental health app called a mood fit only required one letter or digit as a password. Now that is very concerning for an app that collects mood and symptom data. So be very careful. Two of the apps better help a popular app that connects users with therapists and better stop suicide, which is a course of suicide prevention app have vague and messy, according to Mozilla privacy policies that have little or no effect on actual. [00:40:30] User data protection. So be very careful. And if you're a mental health, professional or medical professional, don't just go and use these open video calls, et cetera, et cetera, find something good. And there are some standards out there. Again. Visit me online, get my insider show notes every week. Get my little mini trends. [00:40:56] And they come up most weeks. Just go to Craig peterson.com. And I'll send you my special report on passwords and more. [00:41:06] We know the Russians have been attacking us. I've talked a lot about it on the radio station, all kinds of stations. In fact, here over the last couple of weeks, and I am doing something special, we are going through the things you can do to keep safe. [00:41:23] Last week we started doing something I promise we would continue. [00:41:27] And that is how can you protect yourself when it comes to the Russians, right? When it comes to the bad guys, because the Russians are definitely the bad guys. There's a few things you can do. And there's a few things, frankly, you shouldn't be doing. And that's exactly what we're going to talk about right now. [00:41:45] So last week he went over some steps, some things that you can look at that you should look at that are going to help protect you. And we are going to go into this a whole lot more today. And so I want you to stick around and if you miss anything, you can go online. You can go to Craig peterson.com, make sure you sign up there for my email. [00:42:08] And what I'm going to do for you is. Send you a few different documents now where we can chat back and forth about it, but I can send you this. Now I'm recording this on video as well as on audio. So you can follow along if you're watching either on YouTube or. Over on rumble and you can find it also on my website. [00:42:32] I've been trying to post it up there too, but right now let's talk about what we call passive backend protections. So you've got the front end and the front end of course, is. Stuff coming at you, maybe to the firewall I've mentioned last week about customers of mine. I was just looking at a few customers this week, just so I could have an idea of their firewalls. [00:42:59] And they were getting about 10 attacks per minute. Yeah. And these were customers who have requirements from the department of defense because they are defense sub subcontractors. So again, Potential bad guys. So I looked up their IP addresses and where the attacks were coming from. Now, remember that doesn't mean where they originated because the bad guys can hop through multiple machines and then get onto your machine. [00:43:28] What it means is that all, ultimately they ended up. Coming from one machine, right? So there's an IP address of that machine. That's attacking my clients or are attacking my machines. That just happens all the time. A lot of scans, but some definite attacks where they're trying to log in using SSH. [00:43:48] And what I found is these were coming from Slovakia, Russia, and Iran. Kind of what you were expecting, right? The Iranians, they just haven't given up yet. They keep trying to attack, particularly our military in our industry. One of the things we found out this week from, again, this was an FBI notice is that the Russians have been going after our industrial base. [00:44:15] And that includes, in fact, it's more specifically our automobile manufacturers we've already got problems, right? Try buying a new car, try buying parts. I was with my friend, just this. I helped them because he had his car right. Need to get picked up. So I took him over to pick up his car and we chatted a little bit with this small independent automotive repair shop. [00:44:40] And they were telling us that they're getting sometimes six, eight week delays on getting parts and some parts. They just can't. So they're going to everything from junkyards on out, and the worst parts are the parts, the official parts from the car manufacturers. So what's been happening is Russia apparently has been hacking into these various automobile manufacturers and automobile parts manufacturers. [00:45:10] And once they're inside, they've been putting in. A remote control button net. And those botnets now have the ability to wake up when they want them to wake up. And then once they've woken up, what do they do? Who knows? They've been busy erasing machines causing nothing, but having they've been doing all kinds of stuff in the past today, they're sitting there. [00:45:31] Which makes you think they're waiting, it's accumulate as much as you possibly can. And then once you've got it all accumulated go ahead and attack. So they could control thousands of machines, but they're not just in the U S it's automobile manufacturers in Japan. That we found out about. [00:45:50] So that's what they're doing right now. So you've got the kind of that front end and back end protections. So we're going to talk a little bit about the back end. What does that mean? When a cybersecurity guy talks about the backend and the protections. I got it up on my green right now, but here's the things you can do. [00:46:10] Okay. Remember, small businesses are just getting nailed from these guys, because again, they're fairly easy targets. One change your passwords, right? How many times do we have to say that? And yet about 70% of businesses out there are not using a good password methodology. If you want more information on passwords, two factor authentication, you name it. [00:46:37] Just email me M email@example.com. I want to get the information out now. You got to make sure that all of the passwords on your systems are encrypted are stored in some sort of a good password vault as you really should be looking at 256 bit encryption or better. I have a vendor of. That I use. So if you get my emails every week, when them, there's the little training. [00:47:06] And so I'll give you a five minute training. It's written usually it's in bullet point for, I'm just trying to help you understand things. That provider of mine has a big database and there's another provider that I use that is for. So the training guys use the database of my provider. [00:47:27] In using that database, they're storing the passwords and the training providers putting passwords in the clinics. Into the database, which is absolutely crazy. So again, if you're a business, if you're storing any sort of personal information, particularly passwords, make sure that you're using good encryption and your S what's called salting the hash, which means. [00:47:53] You're not really storing the password, just joining assaulted hash. I can send you more on this. If you are a business and you're developing software that's, this is long tail stuff here. Configure all of the security password settings so that if someone's trying to log in and is failing that, and you block it, many of us that let's say you're a small business. [00:48:15] I see this all of the time. Okay. You're not to blame. You, but you have a firewall that came from the cable company. Maybe you bought it at a big box retailer. Maybe you bought it online over at Amazon, as hurricane really great for you. Has it got settings on there that lets you say. There's 20 attempts to log in. [00:48:38] Maybe we should stop them. Now, what we do personally for our customers is typically we'll block them at somewhere around three or four failed attempts and then their passwords block. Now you can configure that sort of thing. If you're using. Email. And that's an important thing to do. Let me tell you, because we've had some huge breaches due to email, like Microsoft email and passwords and people logging in and stealing stuff. [00:49:06] It was just a total nightmare for the entire industry last year, but limit the number of login retries as well as you're in there. These excessive login attempts or whatever you want to define it as needs to lock the account. And what that means is even if they have the right password, they can't get in and you have to use an administrative password in order to get in. [00:49:31] You also want to, what's called throttle, the rate of repeated logins. Now you might've gotten caught on this, right? You went to your bank, you went to E-bay, you went to any of these places and all of a sudden. And denied you write it blocked you. That can happen when your account is on these hackers lists. [00:49:51] You remember last week we talked about password spraying while that's a very big deal and hackers are doing the sprain trick all of the time, and that is causing you to get locked out of your own account. So if you do get locked out, remember it might be because someone's trying to break. Obviously you have to enforce the policies. [00:50:16] The capture is a very good thing. Again, this is more for software developer. We always recommend that you use multifactor or two factor authentication. Okay. Do not use your SMS, your text messages for that, where they'll send you a text message to verify who you are. If you can avoid that, you're much better off. [00:50:36] Cause there's some easy ways to get around that for hackers that are determined. Okay. A multi-factor again, installed an intrusion. system. We put right at the network edge and between workstations and servers, even inside the network, we put detection systems that look for intrusion attempts and block intrusion attempts. [00:51:02] A very important use denied lists to block known attackers. We build them automatically. We use some of the higher end Cisco gates. Cisco is a big network provider. They have some of the best hardware and software out there, and you have to subscribe to a lot of people complain. I ain't going to just go buy a firewall for 200 bucks on Amazon. [00:51:24] Why would I pay that much a month just to to have a Cisco firewall? And it's like praying pain for the brand. I've got by logo chert on here. Oh, I wouldn't pay for that. No, it's because they are automatically providing block lists that are updated by the minute sometimes. And then make sure you've got an incident response plan in place. [00:51:50] What are you going to do when they come for you? What are you going to do? [00:51:55] Now we're going to talk about prevention. What can you do an order to stop some of these attacks that are coming from Russia and from other countries, it is huge. People. Believe me, this is a very big problem. And I'm here to help. [00:52:12] We've reviewed a number of things that are important when it comes to your cyber security and your protection. [00:52:20] We talked about the front end. We talked about the backend. Now we're going to talk about pure prevention and if you're watching. Online. You'll be able to see my slides as they come up, as we talk about some of this stuff and you'll find me on YouTube and you'll also find me on rumble, a fairly new platform out there platform that doesn't censor you for the things you say. [00:52:44] Okay. So here we go. First of all, enabling your active directory password protection is going to. Four's password protection all the way through your business. Now I've had some discussions with people over the months, over the years about this whole thing and what should be done, what can be done, what cannot be done. [00:53:09] Hey, it's a very big deal when it comes to password protection and actor directory, believe it or not, even though it's a Microsoft product is pretty darn good at a few things. One of them is. Controlling all the machines and the devices. One of the things we do is we use an MDM or what used to be a mobile device manager called mass 360. [00:53:34] It's available from IBM. We have a special version of that allows us as a managed security services provider to be able to control everything on people's machines. Active directory is something you should seriously consider. If you are a Mac based shop. Like I am. In fact, I'm sitting right now in front of two max that I'm using right now, you'll find that active directory is a little bit iffy. [00:54:04] Sometimes for max, there are some work around and it's gotten better mastery. 60 is absolutely the way to go, but make sure you've got really good. Passwords and the types of passwords that are most prone to sprain the attacks are the ones you should be banning specifically. Remember the website? Have I been poned? [00:54:28] Yeah. It's something that you should go to pretty frequently. And again, if you miss anything today, just email me M firstname.lastname@example.org. Believe me, I am not going to harass you at all. Okay. Now, the next thing that you should be doing is what's called red team blue team. Now the red team is a group of people, usually outside of your organization. [00:54:54] If you're a big company they're probably inside, but the red team is the team that attacks you. They're white hat hackers, who are attacking you, looking for vulnerabilities, looking for things that you should or shouldn't be doing. And then the blue team is the side that's trying to defend. So think of, like war games. [00:55:12] Remember that movie with Matthew Broderick all of those decades ago and how the, he was trying to defend that computer was trying to defend that it moved into an attack mode, right? Red team's attack, blue team is defend. So you want. To conduct simulated attacks. Now w conducting these attacks include saying, oh my let's now put in place and execute our plan here for what are we going to do once we have a. [00:55:44] And you darn well better have a breach plan in place. So that's one of the things that we help as a fractional chief information security officer for companies, right? You've got to get that in place and you have to conduct these simulated attacks and you have to do penetration testing, including password spraying attacks. [00:56:04] There's so many things you can do. The one of the things that we like to do and that you might want to do, whether you're a home user, retiree or a business is go and look online, you can just use Google. I use far more advanced tools, but you can use Google and look for your email address right there. [00:56:23] Look for the names of people inside your organization. And then say wait a minute, does that data actually need to be there? Or am I really exposing the company exposing people's information that shouldn't be out there because you remember the hackers. One of the things they do is they fish you fish as in pH. [00:56:47] So they'll send you an email that looks like. Hey let me see. I know that Mary is the CFO, and I know that Joe's going to be out of town for two weeks in The Bahamas, not a touch. So while he's got. I'm going to send an email to Mary, to get her to do something, to transfer the company's funds to me. [00:57:06] Okay. So that's what that's all about. You've got to make sure, where is our information? And if you go to my company's page, mainstream.net, you'll see on there that I don't list any of the officers or any of the people that are in the company, because that again is a security problem. [00:57:24] We're letting them know. I go to some of these sites, like professional sites lawyers, doctors, countenance, and I find right there all, are there people right there top people or sometimes all of them. And then we'll say, yeah, I went to McGill university, went to Harvard, whatever my B. It's all there. So now they've got great information to fish you, to fish that company, because all they have to do is send an email to say, Hey, you remember me? [00:57:56] We're in Harvard when this class together. And did you have as a professor to see how that works? Okay. You also want to make. That you implement, what's called a passwordless user agent, and this is just so solely effective. If they cannot get into your count, what's going to, what could possibly go wrong, but one of the ways to not allow them into the count is to use. [00:58:24] Biometrics. We use something called duo and we have that tied into the single sign-on and the duo single sign-on works great because what it does now is I put in, I go to a site, I put it into my username and. Pulls up a special splash page that is running on one of our servers. That again asks me for my duo username. [00:58:48] So I've got my username for the site then to my dual username and my duo password single sign on. And then it sends me. To an app on my smart device, a request saying, Hey, are you trying to log into Microsoft? And w whatever it might be at Microsoft, and you can say yes or no, and it uses biometric. [00:59:11] So those biometrics now are great because it says, oh, okay, I need a face ID or I need a thumb print, whatever it might be that allows a generalized, a password, less access. Okay. Password less. Meaning no pass. So those are some of the top things you can do when it comes to prevention. And if you use those, they're never going to be able to get at your data because it's something you have along with something, it works great. [00:59:45] And we like to do this. Some customers. I don't like to go through those hoops of the single sign-on and using duo and making that all work right where we're fine with it. We've got to keep ourselves, at least as secure as the DOD regulations require unlike almost anybody else in industry, I'm not going to brag about it. [01:00:09] But some of our clients don't like to meet the tightest of controls. And so sometimes they don't. I hate to say that, but they just don't and it's a fine line between. Getting your work done and being secure, but I think there's some compromises it can be readily made. We're going to talk next about saving your data from ransomware and the newest ransomware. [01:00:36] We're going to talk about the third generation. That's out there right now. Ransomware, it's getting crazy. Let me tell ya and what it's doing to us and what you can do. What is a good backup that has changed over the last 12 months? It's changed a lot. I used to preach 3, 2, 1. There's a new sheriff in town. [01:00:58] Stick around Craig peterson.com. [01:01:02] 3, 2, 1 that used to be the standard, the gold standard for backing up. It is no longer the case with now the third generation of ransomware. You should be doing something even better. And we'll talk about it now. [01:01:19] We're doing this as a simulcast here. It's on YouTube. It is also on rumble. [01:01:27] It's on my email@example.com because we're going through the things that you can do, particularly if you're a business. To stop the Russian invasion because as we've been warned again and again, the Russians are after us and our data. So if you missed part of what we're talking about today, or. [01:01:50] Last week show, make sure you send me an email. firstname.lastname@example.org. This is the information you need. If you are responsible in any way for computers, that means in your home, right? Certainly in businesses, because what I'm trying to do is help and save those small businesses that just can't afford to have full-time. [01:02:15] True cyber security personnel on site. So that's what the whole fractional chief information security officer thing is about. Because you just, you can't possibly afford it. And believe me, that guy that comes in to fix your computers is no cyber security expert. These people that are attacking our full time cybersecurity experts in the coming from every country in the world, including the coming from the us. [01:02:44] We just had more arrests last week. So let's talk about ransomware correctly. Ransomware, very big problem. Been around a long time. The first version of ransomware was software got onto your computer through some mechanism, and then you had that red screen. We've all seen that red screen and it says, Hey, pay up buddy. [01:03:07] It says here you need to send so many Bitcoin or a fraction of a Bitcoin or so many dollars worth of Bitcoin. To this Bitcoin wallet. And if you need any help, you can send email here or do a live chat. They're very sophisticated. We should talk about it some more. At some point that was one generation. [01:03:29] One generation two was not everybody was paying the ransoms. So what did they do at that point? They said let me see if they, we can ransom the data by encrypting it and having them pay us to get it back. 50% of the time issue got all your data back. Okay. Not very often. Not often enough that's for sure. [01:03:49] Or what we could do is let's steal some of their intellectual property. Let's steal some of their data, their social security number, their bank, account numbers, et cetera. They're in a, in an Excel spreadsheet on their company. And then we'll, if they don't pay that first ransom, we'll tell them if they don't pay up, we'll release their information. [01:04:10] Sometimes you'll pay that first ransom and then they will hold you ransom a second time, pretending to be a different group of cyber terrorists. Okay. Number three, round three is what we're seeing right now. And this is what's coming from Russia, nears, everything we can tell. And that is. They are erasing our machines. [01:04:31] Totally erasing them are pretty sophisticated ways of erasing it as well, so that it sinks in really, it's impossible to recover. It's sophisticated in that it, it doesn't delete some key registry entries until right at the very end and then reboots and computer. And of course, there's. Computer left to reboot, right? [01:04:55] It's lost everything off of that hard drive or SSD, whatever your boot devices. So let's talk about the best ways here to do some of this backup and saving your data from ransomware. Now you need to use offsite disconnected. Backups, no question about it. So let's talk about what's been happening. [01:05:17] Hospitals, businesses, police departments, schools, they've all been hit, right? And these ransomware attacks are usually started by a person. I'll link in an email. Now this is a poison link. Most of the time, it used to be a little bit more where it was a word document, an Excel document that had something nasty inside Microsoft, as I've said, many times has truly pulled up their socks. [01:05:45] Okay. So it doesn't happen as much as it used to. Plus with malware defender turned on in your windows operating system. You're going to be a little bit safer next step. A program tries to run. Okay. And it effectively denies access to all of that data. Because it's encrypted it. And then usually what it does so that your computer still works. [01:06:09] Is it encrypts all of you, like your word docs, your Excel docs, your databases, right? Oh, the stuff that matters. And once they've got all of that encrypted, you can't really access it. Yeah. The files there, but it looks like trash now. There's new disturbing trends. It has really developed over the last few months. [01:06:31] So in addition to encrypting your PC, it can now encrypt an entire network and all mounted drives, even drives that are marrying cloud services. Remember this, everybody, this is really a big deal because what will happen here is if you have let's say you've got an old driver G drive or some drive mounted off of your network. [01:06:57] You have access to it from your computer, right? Yeah. You click on that drive. And now you're in there and in the windows side Unix and max are a little different, but the same general idea you have access to you have right. Access to it. So what they'll do is any mounted drive, like those network drives is going to get encrypted, but the same thing is true. [01:07:20] If you are attaching a U S B drive to your company, So that USB drive, now that has your backup on it gets encrypted. So if your network is being used to back up, and if you have a thumb drive a USB drive, it's not really a thumb drive, right? There's external drive, but countered by USP hooked up. [01:07:45] And that's where your backup lives. Your. Because you have lost it. And there have been some pieces of software that have done that for awhile. Yeah. When they can encrypt your network drive, it is really going after all whole bunch of people, because everyone that's using that network drive is now effective, and it is absolutely. [01:08:10] Devastating. So the best way to do this is you. Obviously you do a bit of a local backup. We will usually put a server at the client's site that is used as a backup destiny. Okay. So that servers, the destination, all of the stuff gets backed up there. It's encrypted. It's not on the network per se. It's using a special encrypted protocol between each machine and the backup server. And then that backup servers data gets pushed off site. Some of our clients, we even go so far as to push it. To a tape drive, which is really important too, because now you have something physical that is by the way, encrypted that cannot be accessed by the attacker. [01:09:03] It's offsite. So we have our own data center. The, we run the, we manage the no one else has access to it is ours. And we push all of those backups offsite to our data center, which gives us another advantage. If a machine crashes badly, right? The hard disk fails heaven forbid they get ransomware. We've never had that happen to one of our clients. [01:09:29] Just we've had it happen prior to them becoming clients, is that we can now restore. That machine either virtually in the cloud, or we can restore it right onto a piece of hardware and have them up and running in four hours. It can really be that fast, but it's obviously more expensive than in some. [01:09:51] Are looking to pay. All right, stick around. We've got more to talk about when we come back and what are the Russians doing? How can you protect your small business? If you're a one, man, one woman operation, believe it. You've got to do this as well. Or you could lose everything. In fact, I think our small guys have even more to lose Craig peterson.com. [01:10:16] Backups are important. And we're going to talk about the different types of backups right now, what you should be doing, whether you're a one person, little business, or you are a, multi-national obviously a scale matters. [01:10:32] Protecting your data is one of the most important things you can possibly do. [01:10:36] I have clients who had their entire operating account emptied out, completely emptied. It's just amazing. I've had people pay. A lot of money to hackers to try and get data back. And I go back to this one lady over in Eastern Europe who built a company out of $45 million. By herself. And of course you probably heard about the shark tank people, right? [01:11:07] Barbara Cochran, how she almost lost $400,000 to a hacker. In fact, the money was on its way when she noticed what was going on and was able to stop it. So thank goodness she was able to stop it. But she was aware of these problems was looking for the potential and was able to catch it. How many of us are paying that much attention? [01:11:34] And now one of the things you can do that will usually kind of protect you from some of the worst outcomes. And when it comes to ransomware is to backup. And I know everybody says, yeah, I'm backing up. It's really rare. When we go in and we find a company has been backing up properly, it even happens to us sometimes. [01:11:59] We put them back up regimen in place and things seem to be going well, but then when you need the backup, oh my gosh, we just had this happen a couple of weeks ago. Actually this last week, this is what happened. We have. Something called an FMC, which is a controller from Cisco that actually controls firewalls in our customer's locations. [01:12:26] This is a big machine. It monitors stuff. It's tied into this ice server, which is. Looking for nastiness and we're bad guys trying to break in, right? It's intrusion detection and prevention and tying it into this massive network of a billion data points a day that Cisco manages. Okay. It's absolutely huge. [01:12:48] And we're running it in a virtual machine network. So we. Two big blade. Chassies full of blades and blades are each blade is a computer. So it has multiple CPU's and has a whole bunch of memory. It also has in there storage and we're using something that VMware calls visa. So it's a little virtual storage area network. [01:13:15] That's located inside this chassis and there are multiple copies of everything. So if a storage unit fails, you're still, okay. Everything stays up, it keeps running. And we have it set up so that there's redundancy on pond redundancy. One of the redundancies was to back it up to a file server that we have that's running ZFS, which is phenomenal. [01:13:40] Let me tell you, it is the best file system out there I've never ever had a problem with it. It's just crazy. I can send you more information. If you ever interested, just email email@example.com. Anytime. Be glad to send you the open source information, whatever you need. But what had happened is. [01:13:57] Somehow the boot disk of that FMC, that, that firewall controller had been corrupted. So we thought, oh, okay, no problem. Let's look at our backups. Yeah, hadn't backed up since October, 2019. Yeah, and we didn't know it had been silently failing. Obviously we're putting stuff in place to stop that from ever happening again. [01:14:27] So we are monitoring the backups, the, that network. Of desks that was making up that storage area network that had the redundancy failed because the machine itself, somehow corrupted its file system, ext four file system right then are supposed to be corruptible, but the journal was messed up and it was man, what a headache. [01:14:51] And so they thought, okay, you're going to have to re-install. And we were sitting there saying, oh, you're kidding me. Reinstalling this FMC controller means we've got to configure our clients, firewalls that are being controlled from this FMC, all of their networks, all of their devices. We had to put it out. [01:15:07] This is going to take a couple of weeks. So because I've been doing this for so long. I was able to boot up an optics desk and Mount the file system and go in manually underneath the whole FMC, this whole firewall controller and make repairs to it. Got it repaired, and then got it back online. So thank goodness for that. [01:15:33] It happens to the best of us, but I have to say I have never had a new client where they had good backups. Ever. Okay. That, and now that should tell you something. So if you are a business, a small business, whatever it might be, check your backups, double check them. Now, when we're running backups, we do a couple of things. [01:15:57] We go ahead and make sure the backup is good. So remember I mentioned that we h
Mike "Supe" Granda of The Ozark Mountain Daredevils joins Tom in Nashville for a conversation about his long career with the legendary American band, working with Glyn Johns on their biggest hits and how he remains inspired by the music of The Beatles. This episode is brought to you by Lumie, the original inventors of wake-up lights, whose Bodyclock Luxe 750DAB wake-up light mimics a natural sunrise and sunset. Shown to improve quality of sleep and to boost productivity in clinical trials, this remarkable device also features high quality audio with DAB+ radio, Bluetooth speakers, USB port and a selection of over 20 sleep/wake sounds. The Lumie Bodyclock Luxe 750DAB can transform the way you start and end your day, especially if you struggle to wake up in the morning and/or get to sleep at night. Go to lumie.com to find out more.
Dr. Ashley Tapscott is an established expert in the field of sexual dysfunction. She is a board-certified urologist and fellowship-trained in male and female sexual dysfunction. Along with her work in general urology, Dr. Tapscott's subspecialty interests have been nationally recognized at many urologic and sexual medicine society meetings. She frequently hosts patient education seminars and lectures to urologists and primary care physicians concerning the treatment of erectile dysfunction, Peyronie's disease, and other sexual and urologic conditions. [This podcast was originally broadcast on April 7, 2022] Ask Dr. Drew is produced by Kaleb Nation ( https://kalebnation.com) and Susan Pinsky (https://twitter.com/FirstLadyOfLove). GEAR PROVIDED BY • BLUE MICS – After more than 30 years in broadcasting, Dr. Drew's iconic voice has reached pristine clarity through Blue Microphones. But you don't need a fancy studio to sound great with Blue's lineup: ranging from high-quality USB mics like the Yeti, to studio-grade XLR mics like Dr. Drew's Blueberry. Find your best sound at https://drdrew.com/blue • ELGATO – Every week, Dr. Drew broadcasts live shows from his home studio under soft, clean lighting from Elgato's Key Lights. From the control room, the producers manage Dr. Drew's streams with a Stream Deck XL, and ingest HD video with a Camlink 4K. Add a professional touch to your streams or Zoom calls with Elgato. See how Elgato's lights transformed Dr. Drew's set: https://drdrew.com/sponsors/elgato/ THE SHOW: For over 30 years, Dr. Drew Pinsky has taken calls from all corners of the globe, answering thousands of questions from teens and young adults. To millions, he is a beacon of truth, integrity, fairness, and common sense. Now, after decades of hosting Loveline and multiple hit TV shows – including Celebrity Rehab, Teen Mom OG, Lifechangers, and more – Dr. Drew is opening his phone lines to the world by streaming LIVE from his home studio in California. On Ask Dr. Drew, no question is too extreme or embarrassing because the Dr. has heard it all. Don't hold in your deepest, darkest questions any longer. Ask Dr. Drew and get real answers today. This show is not a substitute for medical advice, diagnosis, or treatment. All information exchanged during participation in this program, including interactions with DrDrew.com and any affiliated websites, are intended for educational and/or entertainment purposes only.
全国秋粮收购结束 收购总量同比增加500亿斤 国家粮食和物资储备局昨天(12日)发布，目前，主产区累计收购2021—2022年度秋粮3705亿斤，同比增加500亿斤，全国秋粮收购顺利结束。从秋粮收购总量看，处于近年来较高水平，增幅16%；从品种看，中晚稻1326亿斤，玉米2331亿斤，同比增加391亿斤，是收购量最高、增幅最大的品种；大豆48亿斤，与上年基本持平。安徽、江西、河南、湖北、湖南、黑龙江6省按程序先后启动了中晚稻最低收购价执行预案，充分发挥了政策托底作用，市场运行总体平稳。今年各地各部门在抓好疫情防控的同时，继续抓实抓细粮食生产，进一步加大高标准农田建设等农业基础设施项目投入，增强农业抗灾水平、提高粮食综合生产能力。目前，夏粮生产形势好于预期，各级粮食和物资储备部门及粮食企业也提早做好了夏粮收购准备。 欧盟将采取措施帮助乌克兰恢复粮食出口 当地时间12日，欧盟委员会负责交通事务的委员瓦莉安（Adina Valean）表示，欧盟将与乌克兰周边国家合作，帮助乌克兰在未来三个月内出口2000万吨粮食。欧盟将协调通过铁路、公路和内河航运将乌克兰粮食运出。欧盟官员承认，这项工作难度很大，乌克兰及周边邻国的物流、仓储和通关设施都将面临巨大压力和挑战。尤其是乌克兰的铁路轨距和欧盟国家的标准不一致，货物运到乌克兰边境后还需要更换轮轨或者重新装卸。乌克兰是世界第四大粮食出口国，去年粮食出口总量达到了4470万吨。 不写完不许走！这家专治拖延症的写作咖啡馆火了 最近，日本东京一家“写作咖啡馆”火了。这家咖啡馆只允许有迫在眉睫写作任务的文字工作者进入。而且，一旦到店，不完成任务的话，工作人员是不会放你走的。店主川井拓也在推特上写道：“写作咖啡馆只允许面临写作截稿日期压力的顾客进入，目的是营造店内专注和紧张的氛围。感谢您的理解。”这家咖啡馆最近才开业，按使用时间收费，每30分钟150日元（约合人民币7.86元），并配有USB端口、电脑支架和免费无线网络。苦苦挣扎的写作者们也可以自带食物和饮料，或者外送到咖啡馆，因为店里仅供应咖啡和水。但在写作方面，这家咖啡馆的要求是非常严格的。顾客进入咖啡馆时，必须在前台写下他们计划写多少字，以及预计在什么时候完成。每小时都会有一名工作人员来检查进度，并施加预先定好的压力，帮助顾客推进工作。
"Ich bin wütend, aber entschlossen. Ich habe eine Welt erlebt, in der Schwangerschaftsabbrüche illegal sind." Die Stimme der demokratischen Senatorin Elizabeth Warren überschlägt sich fast, als sie mit einer Gruppe von Protestierenden vor dem Supreme Court in Washington, D. C., steht und ihre kämpferische Rede hält. Seit ein Dokument des obersten Gerichtshofs der USA über das Magazin "Politico" an die Öffentlichkeit gelangt ist, herrscht Aufregung in den Vereinigten Staaten. "Von Anfang an ungeheuerlich falsch" sei das Urteil des obersten Gerichtshofs 1973 im Fall Roe v. Wade gewesen, schreibt der konservative Richter Samuel Alito in einem Entwurf der Mehrheitsmeinung, die im Juni Realität werden könnte. Roe v. Wade ist das Grundsatzurteil von 1973, das Frauen im Land das Recht auf einen Schwangerschaftsabbruch bis zur zwölften Woche uneingeschränkt und bis zur 24. Woche mit Einschränkungen einräumt. Laut dem Dokument würden die neun Richterinnen und Richter dieses Urteil kippen und damit die gesellschaftlichen Fundamente der USA nachhaltig verändern. Viele Bundesstaaten haben schon Gesetzentwürfe für extrem restriktive Gesetze beschlossen, die in Kraft treten würden, sobald das Urteil des Supreme Court fällt. In Texas gilt mit dem sogenannten Herzschlaggesetz schon seit dem vergangenen Jahr ein Gesetz, das Frauen einen Abbruch nach der sechsten Schwangerschaftswoche verbietet – und auch keine Ausnahmen bei Fällen von Vergewaltigung zulässt. Es geht zentral um die Frage, ob das Gericht eine Entscheidung trifft, die eine Mehrheit der US-Bürgerinnen und -Bürger ablehnt. Aber es geht auch um den Supreme Court an sich, um das geleakte Dokument, das die Integrität des obersten Gerichtshofs angreift und in den 232 Jahren seiner Existenz beispiellos ist. Warum Frauenrechte in die Fünfzigerjahre zurückgeworfen werden könnten, warum das auch Implikationen für andere gesellschaftliche Gruppen hat und was das für Demokraten und Republikaner vor den Kongresswahlen im November bedeutet, diskutieren wir im US-Podcast. Und im "Get-out": Margaret Atwoods "The Handmaid's Tale" in der von Schauspielerin Claire Danes gelesenen Audioversion, ein Interview mit der Feministin Gloria Steinem bei NPR und John Olivers Monolog zum Thema Roe v. Wade in der aktuellen Folge von "Last Week Tonight with John Oliver". Der Podcast erscheint alle zwei Wochen donnerstags. Wer diesen und viele andere Podcasts live erleben will, kann sich hier (https://www.zeit.de/podcastfestival) für den Livestream des großen ZEIT ONLINE Podcast-Festivals am 11. Juni in Berlin anmelden. Unter allen Anmeldungen werden auch noch Tickets für die ausverkaufte Veranstaltung verlost. Sie erreichen uns per Mail an firstname.lastname@example.org.
Allison Tully, Co-Founder of Peak Performance Equipment and the InfinitiLoop explains the beginning of the product It was the summer of 2018. My running buddies and I yawned as we strapped on our daily o'dark:30 run when one of our friends threw her tangled reflective gear to the ground, shouting, "FORGET IT! I'll run without anything!" We stood staring at the $150 worth of equipment, one piece held together by duct tape, another tied with twisty ties to keep it snug (yet it still flew all over the place), when I thought, "There has to be a better way." After having colleagues, friends, friends of friends, and so along try out the belt and provide feedback of all sorts, Allison and her husband came out with the final version of the InfinitiLoop,w which I wear on my early morning and evening runs myself!Instead of looking like a Christmas Tree with all of the heavy gear and lights while you're out on your run, you can pick up the Peak Performance InfinitiLoop instead! The Loop illuminates the path ahead of you, making you visible to cars and other pedestrians around you, keeping you safe and away from the bad guys, and fits super lightly on your hips. It's super cute! Some key attributes of the belt are below:Consolidation of Headlamp and LED illumination, all on one belt, no fussBright 300 Lumen max output, dual-setting 360° wrap-around LED bandLight 3.8oz; you'll barely know it's thereRechargeable Powered with integrated 1500 mAh Li-ion battery with micro-USB charge portAll-Weather Built to withstand whatever Mother Nature throws at youSee & Be Seen Illuminate the path ahead, eliminating visual glare and neck strain, and alerting you to objects in your way, making sure you're seen from all directionsIf you enjoyed this episode and want to hear more about mindset and mental toughness for runners, please share your thoughts in the comments under the show notes. You can also email me at email@example.com with your ideas! I love hearing from you. Don't forget to head to Apple Podcasts here to support the show and tap on the "+Follow" button! Your support allows me to understand better what you enjoy and dislike and find the time and resources needed to push every new episode LIVE!Thank you for listening to this week's episode! Please enjoy your unique discount code. You will receive 20% off the InfinitiLoop using code: 'RunWithAlli20' today!Allison Tully's & Peak Performance Equipment Contact Infow: www.peakperformanceequipment.comIG: @peakperformancespFB: facebook.com/PeakperformanceSP Support the show
It's about 2pm on a crisp Wednesday afternoon in August 2011, and 18-year-old Madeleine Pulver is in her family's three-story waterfront mansion in the glitzy Sydney suburb of Mosman. She's studying for her HSC trials, the practice run before the final exams for Year 12s in the state of NSW. The house is quiet today. Her two younger brothers are at school and her older brother is away. Her dad Bill, head of a multi-million-dollar global software company, is in his city office and her mum Belinda is out consulting with her landscape gardening company. Madeleine's home alone. Suddenly, the silence is broken by a man wearing a rainbow ski mask carrying a baseball bat, who bursts into the room. “Sit down and no one needs to get hurt,” he tells her. The masked man pulls out a black box that's being held up by what looks like a bike chain, which he fastens around her throat. After locking it, he places a lanyard holding a USB stick and two pages of demands around her neck. Then he walks away. But not before he tells a terrified Madeleine to count to 200. “I'll be back…” he warns. “If you move…. I can see you…. I'll be right here.” THE END BITS Subscribe to Mamamia CREDITS Guests: Gil Taylor &Mark Morri Host: Gemma Bath Executive Producer: Gia Moylan Audio Producers: Rhiannon Mooney GET IN TOUCH: Feedback? We're listening! Call the pod phone on 02 8999 9386 or email us at firstname.lastname@example.org Join our closed Facebook community to discuss this episode. Just search True Crime Conversations on Facebook or follow this link https://bit.ly/tcc-group If any of the contents in this episode have caused distress, know that there is help available via Lifeline on 13 11 14 or Beyond Blue on 1300 22 4636 Mamamia acknowledges the Traditional Owners of the Land we have recorded this podcast on, the Gadigal people of the Eora Nation. We pay our respects to their Elders past and present and extend that respect to all Aboriginal and Torres Strait Islander cultures. Just by reading or listening to our content, you're helping to fund girls in schools in some of the most disadvantaged countries in the world - through our partnership with Room to Read. We're currently funding 300 girls in school every day and our aim is to get to 1,000. Find out more about Mamamia at mamamia.com.au Support the show: https://www.mamamia.com.au/mplus/ See omnystudio.com/listener for privacy information.
Do you have a voice you think would do well in Voice Over? Have you ever had an interest in Voice Acting? Do you feel like the barriers to entry are too high? Do you have no idea where to start?Meet Melanie Scroggins, a work from home Voice Actor who has been teaching others how to break into the industry and navigate their VO journey using the template that has worked for her. I have wanted to have Melanie on the show for a little while now because I know a few listeners have wanted to hear from voice professionals and she does an amazing job of explaining where to start in this industry.We reference episode 44 a few times, incase you are needing some context when we talk about podcasting.Follow Melanie using the links belowInstagram: @melaniescrogginsvoLinkedin: https://www.linkedin.com/in/melaniescrogginsPodcast: Work From Home Voice Actorhttps://www.melaniescroggins.com/about/Business RPG is a business podcast for nerds who are determined to turn their passion into a profession. Follow me on Instagram @BuisnessRPG. Connect with me on Linkedin here. Email me email@example.comLearn how to become a Podcast Producer from my teachers at Podcast Production School use my affiliate link hereFind me on Patreon https://www.patreon.com/join/Business_RPG?Follow my store hereMusic: NEW HORIZONS by Lesion X | https://soundcloud.com/lesionxbeatsMusic promoted by https://www.free-stock-music.comCreative Commons Attribution 3.0 Unported Licensehttps://creativecommons.org/licenses/by/3.0/deed.en_USb
France's Pernod Ricard plans to expand both Aberlour & Miltonduff distilleries in Scotland while Heaven Hill plans to build an entirely new distillery in Bardstown Kentucky. Joshua and Jason discuss. As usual, have a seat, have a pour, and listen in. Unless you're driving. If you're driving, be smart and stay sober but be sure to listen into the conversation! Special thanks to: - Weigh Down for allowing us to use their song "Where the Lifeless Go" as our theme song - Moana McAuliffe for designing our Podcast Logo - RØDE for making *really* great microphones - Focusrite for making awesome USB receivers - Olympus and Tascam for making fine mobile recording devices - Joshua Hatton for producing and editing
Alison Thorsteinsen has a conversation with Tom about the writing, recording and production of her new album, The Outside. She also talks about being featured on Elton John's radio show out of the blue and why she admires Kanye West's music and videos. This episode is brought to you by Lumie, the original inventors of wake-up lights, whose Bodyclock Luxe 750DAB wake-up light mimics a natural sunrise and sunset. Shown to improve quality of sleep and to boost productivity in clinical trials, this remarkable device also features high quality audio with DAB+ radio, Bluetooth speakers, USB port and a selection of over 20 sleep/wake sounds. The Lumie Bodyclock Luxe 750DAB can transform the way you start and end your day, especially if you struggle to wake up in the morning and/or get to sleep at night. Go to lumie.com to find out more.
Theophile Bruguier was a fur trader who moved south out of Monreal after a stint as an attorney in Quebec before his fiancé died. He became friends with Chief War Eagle of the Yankton Sioux. We call him Chief, but he left the Santee rather than have a bloody fight over who would be the next chief. The Santee were being pushed down from the Great Lakes area of Minnesota and Wisconsin by the growing Ojibwe and were pushing further and further south. There are two main divisions of the Sioux people: the Dakota and the Lakota. There are two main ethnic groups of the Dakota, the Eastern, sometimes called the Santee and the Western, or the Yankton. After the issues with the his native Santee, he was welcomed by the Yankton, where he had two wives and seven children. Chief War Eagle then spent time with the white people moving into the area in greater and greater numbers. They even went to war and he acted as a messenger for them in the War of 1812 and then became a messenger for the American Fur Company and a guide along the Missouri. After the war, he was elected a chief and helped negotiate peace treaties. He married two of his daughters off to Theophile Bruguier, who he sailed the Missouri with on trips between St Louis and Fort Pierre in the Dakota territory. The place where Theophile settled was where the Big Sioux and Missouri rivers meet. Two water ways for trade made his cabin a perfect place to trade, and the chief died a couple of years later and was buried in what we now call War Eagle Park, a beautiful hike above Sioux City. His city. Around the same time, the Sioux throughout the Minnesota River were moved to South Dakota to live on reservations, having lost their lands and war broke out in the 1860s. Back at the Bruguier land, more French moved into the area after Bruguier opened a trading post and was one of the 17 white people that voted in the first Woodbury County election, once Wahkaw County was changed to Woodbury to honor Levi Woodbury, a former Supreme Court Justice. Bruguier sold some of his land to Joseph Leonais in 1852. He sold it to a land surveyor, Dr. John Cook, who founded Sioux City in 1854. By 1860, with the westward expansion of the US, the population had already risen to 400. Steamboats, railroads, livestock yards, and by 1880 they were over 7,000 souls, growing to 6 times that by the time Bruguier died in 1896. Seemingly more comfortable with those of the First Nations, his body is interred with Chief War Eagle and his first two wives on the bluffs overlooking Sioux City, totally unrecognizable by then. The goods this new industry brought had to cross the rivers. Before there were bridges to cross the sometimes angry rivers, ranchers had to ferry cattle across. Sometimes cattle fell off the barges and once they were moving, they couldn't stop for a single head of cattle. Ted Waitt's ancestors rescued cattle and sold them, eventually homesteading their own ranch. And that ranch is where Ted started Gateway Computers in 1985 with his friend Mike Hammond. Michael Dell started Dell computers in 1984 and grew the company on the backs of a strong mail order business. He went from selling repair services and upgrades to selling full systems. He wasn't the only one to build a company based on a mail and phone order business model in the 1980s and 1990s. Before the internet that was the most modern way to transact business. Ted Waitt went to the University of Iowa in Iowa City a couple of years before Michael Dell went to the University of Texas. He started out in marketing and then spent a couple of years working for a reseller and repair store in Des Moines before he decided to start his own company. Gateway began life in 1985 as the Texas Instruments PC Network, or TIPC Network for short. They sold stuff for Texas Instruments computers like modems, printers, and other peripherals. The TI-99/4A had been released in 1979 and was discontinued a year before. It was a niche hobbyist market even by then, but the Texas Instruments Personal Computer had shipped in 1983 and came with an 8088 CPU. It was similar to an IBM PC and came with a DOS. But Texas Instruments wasn't a clone maker and the machines weren't fully Personal Computer compatible. Instead, there were differences. They found some success and made more than $100,000 in just a few months, so brought in Tedd's brother Norm. Compaq, Dell, and a bunch of other companies were springing up to build computers. Anyone who had sold parts for an 8088 and used DOS on it knew how to build a computer. And after a few years of supplying parts, they had a good idea how to find inexpensive components to build their own computers. They could rescue parts and sell them to meatpacking plants as full-blown computers. They just needed some Intel chips, some boards, which were pretty common by then, some RAM, which was dirt cheap due to a number of foreign companies dumping RAM into the US market. They built some computers and got up to $1 million in revenue in 1986. Then they became an IBM-compatible personal computer when they found the right mix of parts. It was close to what Texas Instruments sold, but came with a color monitor and two floppy disk drives, which were important in that era before all the computers came with spinning hard drives. Their first computer sold for just under $2,000, which made it half what a Texas Instruments computer cost. They found the same thing that Dell had found: the R&D and marketing overhead at big companies meant they could be more cost-competitive. They couldn't call the computers a TIPC Network though. Sioux City, Iowa became the Gateway to the Dakotas, and beyond, so they changed their name to Gateway 2000. Gateway 2000 then released an 80286, which we lovingly called the 286, in 1988 and finally left the ranch to move into the city. They also put Waitt's marketing classes to use and slapped a photo of the cows from the ranch in a magazine that said “Computers from Iowa?” and one of the better tactics for long-term loyalty, they gave cash bonuses to employees based on their profits. Within a year, they jumped to $12 million in sales. Then $70 million in 1989, and moved to South Dakota in 1990 to avoid paying state income tax. The cow turned out to be popular, so they kept Holstein cows in their ads and even added them to the box. Everyone knew what those Gateway boxes looked like. Like Dell, they hired great tech support who seemed to love their jobs at Gateway and would help with any problems people found. They brought in the adults in 1990. Executives from big firms. They had been the first to Mae color monitors standard and now, with the release of Windows they became the first big computer seller to standardize on the platform. They released a notebook computer in 1992. The HandBook was their first computer that didn't do well. It could have been the timing, but in the midst of a recession in a time when most households were getting computers, a low cost computer sold well and sales hit $1 billion. Yet they had trouble scaling to their ship hundreds of computers a day. They opened an office in Ireland and ramped up sales overseas. Then they went public in 1993, raising $150 million. The Wiatt's hung on to 85% of the company and used the capital raised in the IPO to branch into other areas to complete the Gateway offering: modems, networking equipment, printers, and more support representatives. Sales in 1994 hit $2.7 billion a year. They added another support center a few hours down the Missouri River in Kansas City. They opened showrooms. They added a manufacturing plant in Malaysia. They bought Osborne Computer. They opened showrooms and by 1996 Gateway spent tens of millions a year in advertising. The ads worked and they became a household name. They became a top ten company in computing with $5 billion in sales. Dell was the only direct personal computer supplier who was bigger. They opened a new sales channel: the World Wide Web. Many still called after they looked up prices at first but by 1997 they did hundreds of millions in sales on the web. By then, Ethernet had become the standard network protocol so they introduced the E-Series, which came with networks. They bought Advanced Logic Research to expand into servers. They launched a dialup provider called gateway.net. By the late 1990s, the ocean of companies who sold personal computers was red. Anyone could head down to the local shop, buy some parts, and build their own personal computer. Dell, HP, Compaq, and others dropped their prices and Gateway was left needing a new approach. Three years before Apple opened their first store, Gateway launched Gateway Country, retail stores that sold the computer, the dialup service, and they went big fast, launching 58 stores in 26 states in a short period of time. With 2000 right around the corner, they also changed their name to Gateway, Inc. Price pressure continued to hammer away at them and they couldn't find talent so they moved to San Diego. 1999 proved a pivotal year for many in technology. The run-up to the dot com bubble meant new web properties popped up constantly. AOL had more capital than they could spend and invested heavily into Gateway to take over the ISP business, which had grown to over half a million subscribers. They threw in free Internet access with the computers, opened more channels into different sectors, and expanded the retail stores to over 200. Some thought Waitt needed to let go and let someone with more executive experience come in. So long-time AT&T exec Jeff Weitzen, who had joined the company in 1998 took over as CEO. By then Waitt was worth billions and it made sense that maybe he could go run a cattle ranch. By then his former partner Mike Hammond had a little business fixing up cars so why not explore something new. Waitt stayed on as chairman as Weitzen reorganized the company. But the prices of computers continued to fall. To keep up, Gateway released the Astro computer in 2000. This was an affordable, small desktop that had a built-in monitor, CPU, and speakers. It ran a 400 MHz Intel Celeron, had a CD-ROM, and a 4.3 GB hard drive, with 64 Megabytes of memory, a floppy, a modem, Windows 98 Second Edition, Norton Anti-Virus, USB ports, and the Microsoft Works Suite. All this came in at $799. Gateway had led the market with Windows and other firsts they jumped on board with. They had been aggressive. The first iMac had been released in 1998 and this seemed like they were following that with a cheaper computer. Gateway Country stores grew over 400+ stores. But the margins had gotten razor thin. That meant profits were down. Waitt came back to run the company, the US Securities and Exchange Commission filed charges for fraud against Weitzen, the former controller, and the former CFO, and that raged on for years. In that time, Gateway got into TVs, cameras, MP3 players, and in 2004 acquired eMachines, a rapidly growing economy PC manufacturer. Their CEO, Wayne Inouye then came in to run Gateway. He had been an executive at The Good Guys! and Best Buy before taking the helm of eMachines in 2001, helping them open sales channels in retail stores. But Gateway didn't get as much a foothold in retail. That laptop failure from the 1980s stuck with Gateway. They never managed to ship a game-changing laptop. Then the market started to shift to laptops. Other companies left on that market but Gateway never seemed able to ship the right device. They instead branched into consumer electronics. The dot com bubble burst and they never recovered. The financial woes with the SEC hurt trust in the brand. The outsourcing hurt the trust in the brand. The acquisition of a budget manufacturer hurt the brand. Apple managed to open retail stores to great success, while preserving relationships with big box retailers. But Gateway lost that route to market when they opened their own stores. Then Acer acquired Gateway in 2007. They can now be found at Walmart, having been relaunched as a budget brand of Acer, a company who the big American firms once outsourced to, but who now stands on their own two feed as a maker of personal computers.
Kirill Korotaev is the CEO and founder of Purple Gaze which is an AI Platform for collecting data from the brain using eye movements. ***This podcast is sponsored by Iris Biomedical, check out their Neurotech Startup Services here*** Top 3 Takeaways: "There wasn't any significant innovation in the eye tracking technology for the last 15 years. And we thought that if we use modern computer vision and image processing techniques, we could make it much more accessible and easy to use, which in turn would open up new applications and create whole new industries." "We've just launched in the United States. The Communication Disorders Lab at the New Mexico State University has recently acquired two of our FOXIE systems to conduct research on eye movements during speech and speech comprehension. So you should expect first preprints featuring our system in about half a year." FOXIE is a portable screen-based Eye Tracking system with a sampling rate of 600Hz that connects to any modern computer via USB 0:45 "Do you want to introduce yourself a little bit and your company?" 2:00 "How did you get into eye tracking?" 5:30 How have things improved since you started out in this? 9:30 Iris Biomedical ad sponsorship 10:15 "What's the company doing right now? And what are you planning on doing next?" 12:30 "What is the footprint of your device?" 13:30 Have you worked with Iris Biomedical before? 14:45 Do you want to talk about how the invasion of Ukraine has affected you as a Russian? 15:45 "If you had unlimited funding, what would you go after?" 16:30 "Is there anything that we didn't talk about that you wanted to mention?"
Dr. Drew answers caller questions about studies into the connections between autism spectrum disorder and transgender identity, if the "Law Of Attraction" has scientific basis, the effects of childhood trauma on adults, renewed interest in narcissism, and more in this special AMA episode. [This podcast was originally broadcast on April 8, 2022] Ask Dr. Drew is produced by Kaleb Nation ( https://kalebnation.com) and Susan Pinsky (https://twitter.com/FirstLadyOfLove). SPONSORS • BLUE MICS – After more than 30 years in broadcasting, Dr. Drew's iconic voice has reached pristine clarity through Blue Microphones. But you don't need a fancy studio to sound great with Blue's lineup: ranging from high-quality USB mics like the Yeti, to studio-grade XLR mics like Dr. Drew's Blueberry. Find your best sound at https://drdrew.com/blue • ELGATO – Every week, Dr. Drew broadcasts live shows from his home studio under soft, clean lighting from Elgato's Key Lights. From the control room, the producers manage Dr. Drew's streams with a Stream Deck XL, and ingest HD video with a Camlink 4K. Add a professional touch to your streams or Zoom calls with Elgato. See how Elgato's lights transformed Dr. Drew's set: https://drdrew.com/sponsors/elgato/ THE SHOW: For over 30 years, Dr. Drew Pinsky has taken calls from all corners of the globe, answering thousands of questions from teens and young adults. To millions, he is a beacon of truth, integrity, fairness, and common sense. Now, after decades of hosting Loveline and multiple hit TV shows – including Celebrity Rehab, Teen Mom OG, Lifechangers, and more – Dr. Drew is opening his phone lines to the world by streaming LIVE from his home studio in California. On Ask Dr. Drew, no question is too extreme or embarrassing because the Dr. has heard it all. Don't hold in your deepest, darkest questions any longer. Ask Dr. Drew and get real answers today. This show is not a substitute for medical advice, diagnosis, or treatment. All information exchanged during participation in this program, including interactions with DrDrew.com and any affiliated websites, are intended for educational and/or entertainment purposes only.
The Model 3 achieves a significant sales milestone in Europe, the Model S Plaid wins a notable race in America, Tesla gives us a date for its upcoming annual shareholders meeting, and more! If you enjoy the podcast and would like to support my efforts, please check out my Patreon at https://www.patreon.com/teslapodcast and consider a pledge. I'd be grateful. Every little bit helps and there are bonuses in it for you at each pledge level! And don't forget to leave a message on the Ride the Lightning hotline anytime with a question, comment, or discussion topic for next week's show! The toll-free number to call or Skype is 1-888-989-8752. P.S. Get 15% off your first order of awesome aftermarket Tesla accessories at AbstractOcean.com by using the code RTLpodcast at checkout. And if you're ordering a Jeda Wireless Charging Pad or USB hub for Model 3/Y (coupon code RTL), please use my referral link: https://getjeda.com/ref/8/ Grab the SnapPlate for any of the four Teslas at https://everyamp.com/RTL/. Finally, pick up a 128gb or 256gb Sentry Mode/Dashcam kit at http://www.puretesla.com/rtl
A common refrain in the investment world is, diversify your portfolio. But many real estate investors have a massive majority of their net worth in property. In this episode, Michael shares his thoughts on portfolio diversification and why he is so heavily focused on rental property. --- Transcript Before we jump into the episode, here's a quick disclaimer about our content. The Remote Real Estate Investor podcast is for informational purposes only, and is not intended as investment advice. The views, opinions and strategies of both the hosts and the guests are their own and should not be considered as guidance from Roofstock. Make sure to always run your own numbers, make your own independent decisions and seek investment advice from licensed professionals. Pierre: Hey everyone, welcome to the Remote Real Estate Investor. My name is Pierre Carrillo and today I am joined by… Michael: Michael Albaum Pierre: and today we are going to talk about portfolio diversification, so let's just jump right in. Hey, Michael. Michael: How's it going Pierre? Pierre: So Michael, one of the basic pieces of investment advice that I hear everywhere is diversification, diversification, diversify, don't be too consolidated. Because if any one piece of the market goes down, you're going to be left exposed somewhere. I remember you saying in a previous episode, that you're about 80-85% in real estate, and that made me think, wow, that's heavily consolidated. How do you find, how do you find comfort in being so consolidated in one asset class? Michael: Yeah, it's a really good question, Pierre and I think, for me, my strategy has changed over the 10 plus years that I've been investing and so for me, I was very focused on single family when I first got started and I think a lot of people do kind of find their niche inside of single family investing and it's funny because there's this, there's kind of two camps. There's one that says, diversify, diversify, diversify and then another one says, get rich in your niche and niche down and pick one thing to do and do it really well and if you can do it really well, you don't really need diversification. Diversification is for people that maybe aren't able to niche down or pick one thing or particular that they're passionate about, or really good at. So for me, I was always thinking about single families. I wanted to purchase a bunch of them, I wanted to own a bunch and I thought that was great and at the end of the day, and we've talked about it on prior episodes, the like I think what people are always scared about is their value decreasing, given some event or over time and that's when people talk about, like the S&P 500 index funds, you have a bunch of different companies. And so if one goes out of business, you're not only holding that stock and so that is usually because the value can evaporate and unless the stock is paying some kind of dividend, or it's paying some kind of yeah, I guess that's what stocks dividends, the value of the stock is really in the value and hopefully it goes up over time. With rental real estate, we've got kind of a two headed play here. One is like a yield play a cashflow play, that pays us every single month and every single year and then the other is the appreciation, which is congruent, or synonymous with the stock value going up over time and so again, I'm really less concerned with the value of the property over time, because given a long enough time horizon, I'm comfortable, that thing is going up into the right. But even in the event of a downturn where the value is decreased, I've got yearlong leases and so the rent that I'm going to be collecting is likely going to be unaffected and unchanged. So for that reason, I was really comfortable getting very involved in the single family asset class. The other thing to think about is, I think real estate is this big, all-encompassing umbrella, if you will, it catches a lot of things, and a lot of different events like sub asset classes, for those you watching. I'm doing air quotes, so there's single family investing, there's multifamily investing, there's triple net lease investing, there's industrial, there's flipping, there's all these other things that you can be doing under the real estate umbrella, that I would argue are diversifying you within the asset class itself and so if you'll say, well, people talked a lot about during when COVID first hit, oh, apartments are doomed. Everyone's moving to single family, they want more space. Well, a lot of people thought a lot of things about during COVID when the pandemic first hit, and I don't think that was necessarily true. It was maybe in a little bit of San Francisco and New York and some of these major, major, major metros, but most of our listeners and most of our beginning investors aren't investing in those cities to begin with and so A) I don't think we saw that happen B) we definitely didn't see values fall through the floor, they kind of went the other way. But you can be diversified within the asset class. So if you own multifamily, you own single family, maybe you did see some folks leave your multifamily but maybe you saw your single family values increase. So I think that there's a lot of different ways to play this and then last but not least, I would say if you're in the short term space, you've been killing it for last two years and so again, that's a kind of third way to diversify with in the real estate asset class itself. Pierre: So with for people just starting out and if they're just you know, you save up a big chunk of money and you because there's a high barrier to entry to get into real estate. How should like is does that diversification just happen over time or is there some sort of comfort you can find in that initial first down payment that you're putting up? It's like, chopping an arm off just to get started? Michael: Yeah, well, I think for those people who are just getting started, one of the reasons that they may have been attracted initially into real estate is because it is diverse and different from the other things that they're doing. It's not the stock market, it's not a it's not an investor, a retirement portfolio, which is often invest in the stock market. It's not in bonds, so it is different and without getting into like the correlation of the real estate market versus the stock market and talking about, I think it's beta, or maybe it's alpha talking about the differences in the correlations, it's different than what they're currently doing and I think that in and of itself means that you are diversifying and if that's a part of your investment thesis, that diversification is important, this can be a great place to come do that. So I think with regard to your question about saving so much for the down payment, or kind of chopping off an arm and putting a big chunk of your potential overall net worth into that first property, I think people need to think long and hard about that, I think they need to understand what the risks are, what the benefits are and if those are both tolerable, I think the conclusion that I came to and that a lot of other people have come to for themselves is that real estate's a fairly safe place to park money, because of what I mentioned earlier, if it's rented and the value goes down, it doesn't really affect us and it's an unrealized gain or loss, just like in the stock market and so you'll say, oh, I made a bunch of money, the stock market today, well, not unless you bought or sold. So unless you're actually doing a transaction, the value is kind of meaningless. It's always fun to talk about at parties or get together with your friends. Oh, that's probably my net worth whatever like, but doesn't mean anything. It's not tangible and realized until you do something with it and so if you are planning on doing this for the long term, and for the long haul, parking money in real estate, for my experience has been a really great thing for me over time. Pierre: Okay, so I know you're not, we're not giving investment advice at all here. But from the tone of it, real estate is a safe place to park your money that implies to me that you are like, you're not super worried about a major market correction affecting your values or affecting rent prices to the point where it brings you into the red. You are you feeling good moving forward into the next year? Michael: Yeah, I'm feeling really good and here's why. Like, I was just listening to a book, an audio book, as part of the Roofstock Academy, we do a book club, and this quarter, we're reading first 2 million by Dan sheets, and he's gonna be joining us for a Q&A session with all of our members who read the book. And so I'm reading this book, and he's talking about the 4% rule and for anyone that might not be familiar, the 4% rule basically says, once you've hit a $1 amount inside of an investment portfolio, and a stock portfolio, you can very safely and confidently withdraw 4% of the value every year, because the hope is that you're essentially living off the interest, you're essentially living off the gains that that portfolio is throwing off, and the principle is not going to be reduced. Well, that's all fine well and good when the markets going up. But when the market goes down, and you're continuing to draw on this account, you could see that dwindle very quickly, and possibly to a point that's unrecoverable and so that again, is the value of the stock is going up or the stocks are going up in value, the portfolio is going up, you're drawing down a certain percentage. For real estate oftentimes, we're not relying on the principal value of the property to do this stuff with, right we can, there are tons of people that I know that only live off the cash flow that the real estate portfolios are generating, they don't care what the value is, it can go up, it can go down, it can go sideways, it doesn't matter because the cash flow the property generates is independent of the value. Your tenants aren't saying, oh, well, the property is valued at x. So I'm only going to pay you why and rent doesn't work like that, which is the nice thing and so I'm much more comfortable and confident in the historic performance, the really strong historic performance of real estate, again, for the rental market, independent of what values are doing and so if I'm someone that's planning to live off my cash flow, I get a great deal of my living income from cash flow. I'm not worried about the principal balance versus in the stock market. When it goes up. It's great when it goes down. I mean, that can that can take a long time to recover from. So yeah, I'm very comfortable going into this the upcoming year 2022 and beyond. That's like a Buzz Lightyear saying to infinity and beyond. Pierre: That's good to hear, that makes a lot of sense. I guess there's other ways you can find that diversification beyond just between single family and multifamily or even commercial. I know you're investing in vacation rentals outside of the country. I mean, you're completely separate from the US economy. So and then we've spoken on the podcast before with Peter Badger doing the investing in agricultural land and, and internationally as well. So yeah, I guess there's a lot of different ways that you can achieve that diversity with or diversification within your portfolio just using real estate. Are there ways that someone might be exposing themselves to learn how to say this, but like being under diversified in real estate? What are some things that people need to look out for? Michael: I mean, I guess in theory, you could be if you were invested in New Orleans, when Katrina hit and didn't have really great insurance policies, that's probably an area where you could easily be overexposed. It's a really good question and one that I haven't really thought about because I come from the insurance world and so I'm make darn sure that I'm, I'm not taking on too much because aggregate exposure in the insurance world, an insurance company will look at all of the insurance that they have in a particular area and say, okay, well, if an earthquake happens, we're going to have claims on all of these buildings, that's going to be a ton to pay out. So that's how they're evaluating the risk. I do something similar, and say, okay, well, if something really bad happens, I've got the insurance. But how long? Is it going to take these properties to get rebuilt? And what does that look like going forward? So I think you absolutely could, but I think it's, it's going to be a factor related to other things, not purely the fact that you are investing in own properties all in the same geographic location, are all inside the same asset class and as we talked about regularly on the podcast, real estate is so hyperlocal and so someone could argue, oh, you've got 10 homes in Louisiana, and 10 homes in North Carolina and 10 homes in California and so you're all in single families you ever exposed? Well, I would argue that that might not be the case, I don't think we can look at that. That surface level data point and say, yes, someone's overexposed, I would say, let's look and understand, okay, what kind of natural catastrophes are in an area? Are they all on the same street? Do they have good insurance policies? What does that look like? What does their occupancy look like? So it's tough to say, without doing a little bit of a deeper dive, that just because someone owns X amount of properties, that represents Y percentage of their net worth, they are over or underexposed and it also comes down to risk tolerance, you can have two people that own very similar portfolios. One is can't sleep at night, because they're worried about a hailstorm taking out all the roofs, the other could not think twice about it, because they got good insurance, or whatever the case is for that person. So it becomes very personal and that's why one of the reasons I love real estate is because there's no right or wrong, there's only right or wrong for you as an individual. Pierre: Yeah nd some other thing is it's working out in the past, it's just making sure you have multiple strategies available for you with every property that you have. So if you're buying a short term rental, you know, see if it's going to work, maybe you won't make as much money. But could it work as a long term rental? That's another way just to kind of build diversity within your single property. Michael: Totally And you're seeing a lot of people do that. Now as they're pivoting. They're realizing, hey, my single family has long term makes way more sense as a short term rental, awesome, don't have to do a whole lot to the property to pivot that way. Pierre: So that that'll make sense And thanks for all of that. Speaking about the other remainder of your portfolio, how do you assess where you're going to put your money outside of real estate? Michael. That's a good question; That's going into index funds. Just diversification, I have to think about it, I have to worry about it. I just set it and forget it type of thing. We just had a guest on the podcast couple weeks ago, he was talking about picking stocks, and how index fund investing is kind of silly, but go pick stocks and win big. I've done okay, that in the past, but I think it's for me, it's more of a gamble and I real estate for me, because I did a lot of value add investing was definitely a little bit of a gamble. And so I'm very happy now I was in growth mode for a lot of years and now I'm very happy with just a kind of modest return from the stock market and so if it does, great, awesome, if it doesn't, that's okay, too. I'm in it for the long haul and to use that up into the right analogy again, I know given the time horizon that I'm anticipating for holding the stocks and adding to the portfolio. It's going to be going up into the right… Pierre: Have you messed it all with crypto yet? Michael: Yeah, it's funny. My wife and I have been playing around with crypto for the last couple years and she works in the tech space as well do in for an education company and we were she came home and he like Michael I did an interview with someone and we're talking about this thing called the theory I'm like we should check it out. So we did some research and ended up buying some a couple years ago and we put it on a I forgot to call like a cold a cold wallet like a USB thumb drive. Well I called wallet yeah and then like stuck it in the bank safe deposit box and never thought twice about it and then like last May everyone was talking about crypto and so I just looked at the values and I was like, Holy crap. I think we've made a lot of fun ready and so we did some more research and played on some of their Kryptos. But it's all like Vegas casino money, to be honest, it's not. It's not something that I understand first and foremost and that's what a lot of financial experts will tell you is don't invest in anything you don't understand unless you're prepared to lose it all and so that's totally where we're at. Like, it's rolling the dice if it does great, awesome. If not, well, you know, it was it was exciting while we were in it. Pierre: Oh, well, that's all good to hear, man and I think that answers my question about diversification. So I think that's all I have. Michael: Awesome. Well, great questions Pierre. Thanks a lot, man. Appreciate you having me on. Pierre: Me having you on. Alright, alright. Let's get out of here. Alright, everyone that is our episode for today. Thanks so much for joining us. Remember to subscribe to our podcast that helps us bring you more content like this every day and we hope to catch you on the very next one. Happy investing. Michael: Happy investing.