POPULARITY
We wanted to do an episode on SD-WAN, but realized we needed to set the stage for how wide-area networking developed. That’s why today’s episode is a history lesson of the Wide Area Network (WAN). We talk about how WANs emerged, public and private WANs, how WANs connect to LANs and data centers, the care... Read more »
We wanted to do an episode on SD-WAN, but realized we needed to set the stage for how wide-area networking developed. That’s why today’s episode is a history lesson of the Wide Area Network (WAN). We talk about how WANs emerged, public and private WANs, how WANs connect to LANs and data centers, the care... Read more »
Join us as we recap the two big trades in the NBA involving Luka Doncic, Anthony Davis and De'Aaron Fox and give our Super Bowl 59 predictions.
We recorded this episode at Starbird Sound with Simon Kerr (solo artist and lead of the Wans) and Mike Fahey (producer and engineer) as we discussed Simon's new songs and Mike's studio.https://www.instagram.com/simonkerr615/?hl=enhttps://www.facebook.com/simonpatrickkerr/https://www.thewansmusic.com/https://www.instagram.com/starbirdsound/Mike@starbirdsound.comHost - Trey MitchellIG - treymitchellphotography IG - feeding_the_senses_unsensoredFB - facebook.com/profile.php?id=100074368084848Threads - www.threads.net/@treymitchellphotographySponsorship Information - ftsunashville@gmail.com
Prestige-ish Media Only Murders In The Building Season 4 Episode 9 - INSTANT REACTION - Escape from Planet Klongo - OMITB. Listen in as Craig Lake, Jessica Z and Dan McNair give their opinions on the Hulu / Disney + show. In this episode we celebrate Jessica Z and discuss bachelor parties, Ron Howard, Project Ronkonkoma, emergency contacts, WANS, and more.Please also join us for our coverage of The Lord of the Rings: The Rings of Power Season 2 and The Penguin. X @prestige_ish Instagram @prestigeishmedia X/Instagram @realrealbatman @joblessdogmom @danmcnair1017 http://prestigeish.com
What a pleasure, what lark! Talking to Barbara Scully about becoming more ourselves, knowing the privilege of ageing, cultivating a habit of gratitude, and making decisions on our own attitude... uáu! I loved our conversation, a chara! Barbara is an accomplished writer, columnist, and broadcaster, comedian, and BANLAOCH (female warrior). She is frequently published in the national press and magazines. Her first book, ‘Wise Up, Power, Wisdom and the Older Woman' was published in summer 2022 and has been widely well-received. Marian Keyes described it as “a warm, accessible, personal account of what it is to be a woman - and the unexpected courage and freedom we get as we age”. Barbara is a familiar voice on radio and TV, contributing to talk shows on both local and national radio (including RTE Radio One) and she is one half of the very popular So You Think You're An Adult slot every week on the Moncrieff Show on Newstalk with Declan Buckley. She is an experienced MC and public speaker and her popular talk, entitled “What If The Best Is Yet To Come” has been delivered to both corporate and public audiences. In 2023 Barbara inadvertently dipped her toes into stand-up comedy. It went better than she expected and so she did it again at the Funny Women show in Whelans in May 2024. As a result she is now working on her own one woman show which she hopes to perform later this year. Follow Barbara on Instagram @barbarascully111 and on X @barbarascully. Wise Up is available from www.barbarascully.com and also on Amazon.
In today's episode, we explore recent major cybersecurity upgrades aimed at safeguarding the American healthcare system, including a new initiative by Microsoft to provide critical cybersecurity resources to rural hospitals. Additionally, we delve into the Ticketmaster-Snowflake data breach perpetrated by ShinyHunters, targeting 560 million users and exposing key vulnerabilities in cloud environments. Lastly, we cover AWS's new and improved security features announced at the re:Inforce conference, which include added multi-factor authentication options, expanded malware protection for Amazon S3, and updated AI apps governance. Read more at: https://www.helpnetsecurity.com/2024/06/12/american-healthcare-cybersecurity/ https://thehackernews.com/2024/06/lessons-from-ticketmaster-snowflake.html https://www.helpnetsecurity.com/2024/06/12/aws-security-features/ Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags Microsoft, Cyberattacks, Healthcare systems, Rural hospitals, ShinyHunters, Breach, Data, Cybersecurity, AWS, FIDO2 passkeys, Malware protection, Cloud environment Search Phrases How Microsoft is protecting rural hospitals from cyberattacks Cybersecurity initiatives for rural healthcare by Microsoft ShinyHunters data breach impact on cloud security Essential measures to prevent cyberattacks in cloud environments Latest AWS security features from re:Inforce conference How FIDO2 passkeys enhance cloud environment security Updated malware protection for AWS S3 buckets Microsoft and Biden-Harris Administration cybersecurity efforts Impact of ShinyHunters breach on data security practices Advanced multi-factor authentication in AWS cloud environments Major cybersecurity upgrades announced to safeguard American healthcare https://www.helpnetsecurity.com/2024/06/12/american-healthcare-cybersecurity/ Rising Threats: Cyberattacks on American healthcare systems soared 128% from 2022 to 2023, leading to significant disruptions in hospital operations and payment systems. Actionable Insight: Healthcare professionals should stay vigilant and ensure their organizations have updated cybersecurity measures to mitigate risks. Impact of Recent Attacks: In early 2024, a major cyberattack affected one-third of healthcare claims in the U.S., delaying payments and services. Critical Implication: Entry to mid-level cybersecurity professionals should focus on protecting payment systems and ensuring quick recovery plans are in place. Government Initiatives: The Biden-Harris Administration launched several initiatives to bolster healthcare cybersecurity, including a new gateway website and voluntary performance goals. Actionable Insight: Healthcare institutions should leverage these resources to enhance their cybersecurity posture. Collaboration for Solutions: In May 2024, the White House gathered industry leaders to discuss cybersecurity challenges and promote secure-by-design solutions. Engagement Suggestion: Ask listeners how their organizations collaborate with other entities to share threat intelligence and improve security. ARPA-H UPGRADE Program: The Advanced Research Projects Agency for Health introduced the UPGRADE program, investing over $50 million in tools to defend hospital IT environments. Actionable Insight: IT teams should explore participation in this program to access cutting-edge cybersecurity tools and support. Rural Hospital Support: Cyber disruptions severely impact rural hospitals. Leading tech companies, including Microsoft and Google, committed to providing free or discounted cybersecurity resources to these institutions. Critical Implication: Rural hospital IT staff should take advantage of these offers to strengthen their defenses against cyberattacks. Microsoft's Cybersecurity Program: Microsoft announced a program offering up to 75% discounts on security products, free cybersecurity assessments, and training for rural hospitals. Actionable Insight: Rural healthcare providers should engage with Microsoft's program to improve their cybersecurity measures and resilience. Google's Contributions: Google will offer endpoint security advice and discounted communication tools to rural hospitals, along with a pilot program to tailor security solutions to their needs. Engagement Suggestion: Prompt listeners to consider what specific cybersecurity challenges their rural hospitals face and how these new initiatives could assist them. Continued Efforts: The White House and industry leaders emphasize the importance of private-public partnerships to ensure the security and functionality of healthcare systems nationwide. Efficiency Tip: Cybersecurity professionals should stay informed about these partnerships and actively participate to benefit from shared knowledge and resources. Lessons from the Ticketmaster-Snowflake Breach https://thehackernews.com/2024/06/lessons-from-ticketmaster-snowflake.html ShinyHunters Breach: Last week, hacker group ShinyHunters allegedly stole 1.3 terabytes of data from 560 million Ticketmaster users. The breach could expose massive amounts of personal data and has sparked significant concern. Listener Question: How can we ensure our data is safe with such large-scale breaches happening? Actionable Insight: Regularly update passwords and enable multi-factor authentication (MFA) on all accounts. Live Nation Confirms Breach: Live Nation confirmed the breach in an SEC filing, stating unauthorized activity occurred in a third-party cloud database. An investigation is ongoing, and law enforcement is involved. Listener Question: What steps should companies take immediately after discovering a breach? Actionable Insight: Initiate a comprehensive investigation, notify affected parties, and work with law enforcement. Santander Also Affected: ShinyHunters claim to have data from Santander, affecting millions of customers and employees in Chile, Spain, and Uruguay. The breach involved a third-party provider. Listener Question: Should we be worried about third-party services? Actionable Insight: Ensure third-party services adhere to stringent security protocols and regularly review their security measures. Snowflake Connection: Both Ticketmaster and Santander used Snowflake for their cloud databases. Snowflake warned of increased cyber threats targeting customer accounts, urging users to review logs for unusual activity. Listener Question: What can companies do to safeguard their cloud data? Actionable Insight: Enforce MFA, set network policies to limit access, and regularly rotate credentials. Snowflake's Response: Snowflake's CISO clarified their system wasn't breached; single-factor authentication vulnerabilities were exploited. They recommend MFA and network policy rules for enhanced security. Mitiga's Research: Mitiga found the attacks exploited environments without two-factor authentication, primarily using commercial VPN IPs to execute attacks. Listener Question: How can we protect against these types of attacks? Actionable Insight: Implement and enforce MFA, utilize corporate SSO, and regularly monitor for unusual login activity. Cloud Security Challenges: Modern cloud environments limit some security controls. Ensure platforms offer APIs for privileged identity management and integrate with corporate security. Listener Question: What should we look for in a cloud service provider? Actionable Insight: Choose providers that support MFA, SSO, password rotation, and centralized logging. Non-Human Identities: Protecting non-human identities like service accounts is challenging but necessary. Snowflake provides guidance on securing these accounts. Listener Question: How do we secure non-human identities? Actionable Insight: Use strong, unique passwords and rotate credentials frequently for service accounts. Cost of Cyber Attacks: Cybercriminals aim to maximize profit through mass, automated attacks like credential stuffing. Simple security measures can make these attacks less feasible. Listener Question: What simple measures can we take to protect against cyber attacks? Actionable Insight: Implement SSO, MFA, and regular password rotation to increase the cost and complexity for attackers. Remember, these insights are not just theoretical—they can help you strengthen your organization's security posture today!` AWS unveils new and improved security features https://www.helpnetsecurity.com/2024/06/12/aws-security-features/ Key Information and Actionable Insights Multi-Factor Authentication (MFA) Upgrades: New Option: AWS introduces support for FIDO2 passkeys as an additional MFA method. Security Assurance: FIDO2 security keys offer the highest level of security, ideal for environments with stringent regulatory requirements (FIPS-certified devices). Considerations: Evaluate passkey providers' security models, especially for access and recovery. Enhanced Access Management: IAM Access Analyzer Update: Now assists in identifying and removing unused roles, access keys, and passwords. Permissions Management: Helps set, verify, and refine unused permissions to maintain a streamlined and secure access environment. Malware Protection for Amazon S3: GuardDuty Expansion: Now detects malicious file uploads in S3 buckets. Configuration Options: Teams can set up post-scan actions like object tagging or use Amazon EventBridge to manage malware isolation processes. AI Apps Governance: Audit Manager Update: New AI best practice framework simplifies evidence collection and ongoing compliance audits. Standard Controls: Includes 110 pre-configured controls organized under domains such as accuracy, fairness, privacy, resilience, responsibility, safety, security, and sustainability. Additional Improvements: Log Analysis: Simplified through natural language queries that produce SQL queries (currently in preview). Network Services Integration: Streamlined process for incorporating firewalls, IDS/IPS, and other network services into customers' WANs.
In this episode, Tom Maasland, a Partner in MinterEllisonRuddWatts' Technology team, and Rosie Park, a Senior Solicitor from the same team, discuss and demystify the world of networking services by explaining some frequently used technical terms and concepts used in contracts for these services.[01:12] Tom begins the episode noting that he and Rosie will examine network services contracts through the lens of a lawyer who has no prior background in tech contracts; what technical terms and acronyms should they look out for in a network services contract, and what do they mean? [01:24] Rosie and Tom discuss Local Area Networks (LAN), their functions and common technologies like Ethernet and Wi-Fi and how they connect to the internet. Rosie explains what an IP address is and the role of Internet Service Providers (ISP). They also discuss various wireless access services including Wi-Fi, Bluetooth, and cellular data networks. [04:38] They then consider Wide Area Networks (WAN); what are they and how do they differ from LANs? Rosie explains what a managed WAN service would entail and how a Storage Area Network (SAN) can offer a business data storage. [06:57] Tom and Rosie consider Virtual Private Networks (VPN) and examine how they provide greater security when using public networks. [08:18] Rosie then outlines some additional measures that a business might use to secure its network connections, including protecting key devices like routers, switches and servers and maintaining both LAN and WAN firewalls.Information in this episode is accurate as at the date of recording, 6 May 2024.Please contact Tom Maasland or our Technology team if you need legal advice and guidance on any of the topics discussed in the episode.Please get in touch to receive an episode transcript. Please don't forget to rate, review or follow MinterEllisonRuddWatts wherever you get your podcasts. You can also sign up to receive technology updates via your inbox here.For show notes and additional resources visit minterellison.co.nz/podcasts
Catch up on all the headlines in Utah Jazz, NBA, College Basketball, NFL, College Football, MLB and Golf news with "What is Trending" for March 28, 2024.
We join AWS Principal Networking Specialist and author James Devine to talk about building Wide Area Networks In the Cloud. We begin by covering the basics of WANs. We then talk about MPLS, VPNs and SD-WAN. We also cover AWS services for building WANs such as CloudWAN, Transit Gateway, SiteLink and more. AWS Hosts: Nolan Chen & Malini ChatterjeeEmail Your Feedback: rethinkpodcast@amazon.comLinks for the show:https://aws.amazon.com/blogs/networking-and-content-delivery/build-global-sd-wans-with-aws-cloud-wan-tunnel-less-connect/https://aws.amazon.com/cloud-wan/https://aws.amazon.com/vpn/https://aws.amazon.com/directconnect/https://aws.amazon.com/blogs/networking-and-content-delivery/introducing-aws-direct-connect-sitelink/https://www.youtube.com/watch?v=flBieylTwvI#awsrethink
Ghetto-panelen ger oss allt om ortens smygbögar på rapp-stjärnan Ant Wans Globen-gig. Är mjukglass-butiker i Sthlm pengatvätt eller varför går dom runt när dom bara har öppet tre månader per år?Plommon har sett en djupt obehaglig instaliv där svenska gangsters viftar med AK47:or av guld och äter jordgubbar. Är polacker dom som beter sig värst på all inclusive och måste tomte-emojin få vara vit?Support this show http://supporter.acast.com/gott-snack-med-fredrik-soderholm. Hosted on Acast. See acast.com/privacy for more information.
"Some folks thought The Wans were dead in the water. I like to think we were in hibernation,” says lead singer Simon Kerr of the Nashville based rock band, The Wans. Described as sounding “like The Stooges having a baby with Stone Temple Pilots” by Classic Rock Magazine, the group are welcoming their highly-anticipated fourth LP Magical Touch, which includes 11 songs that showcase a refreshing new approach that is sure to perk up your ears. Magical Touch will be released on July 26, 2023, which is exactly 11 years to the date of their first release.The Wans' new eleven-song LP, Magical Touch, was co-produced, recorded and mixed by Michael Fahey at Starbird Sound in Nashville using vintage recording equipment and recorded live with minimal overdubs. With two new additions to the band, Akshay Narang and Noah Denney, it was sure to add to the expansion of the sonic qualities. Noah Denney, formerly of Tyler Bryant and The Shakedown and who originally played bass in The Wans, now sits behind the drums. “The new sound is so exciting for me. We've known Akshay for over a decade and bonded over everything from Nine Inch Nails to Depeche Mode so it was only natural to ask him to play some synth and guitar with the band.”, says Kerr.The hard-touring Wans have been on the rise for a while now, playing major festivals like Austin City Limits, Voodoo Fest, Forecastle and Hangout Fest, and sharing bills with Pearl Jam, Beck, and Queens of the Stone Age. They recorded their 2014 album He Said She Said, with Grammy-winning producer Dave Cobb (Jason Isbell, Chris Stapleton, Rival Sons), the acclaimed record landed them press at USA Today, NME, Consequence of Sound, The AV Club, and more. Not only that, the band's music has been featured everywhere from major motion picture Point Break and TV shows like Nashville, Longmire, and Necessary Roughness to a powerhouse commercial for BMW'S 4 Series Gran Coupe, which was soundtracked by the band's muscular riff rocker "Black Pony."“This record feels like my novella, a journey similar to Steinbecks ‘East of Eden'. It took 4 years to write and a week to record.” says Kerr. There's no doubt that The Wans wore their influences proudly on their sleeves, like Queens of the Stone Age and Nirvana, but this record feels more precise and like nothing we've heard before from the band. There are certainly hints of 80's and 90's Brit-Pop influences, but the songwriting has become more focused and that's not an overthought.” Kerr continues, “My dad, Tony Kerr, has been my main songwriting partner since I was 16. Some Father-Son's bond over fishing, but we bond over writing songs. It's become effortless when we write together.”Bassist Thomas Bragg states, “Simon and I have been so excited with what's going on in the Irish/British music scene in the last few years. Bands like Idles and Fontaines D.C have made some of the best records of the last decade and I think that definitely had an effect on our music and this record.”The Wans' have always shared a brotherhood and love for making rock n' roll, which is much needed in today's overall climate and music scene. Lyrically, this record purposefully radiates self-awareness, love, and togetherness. “The Wans' are everything to me. When it comes to the song's they're all we have.” says Kerr. The great Joe Strummer once said, “People have got to stop pretending they're not in the world. It's time to take that humanity back into the center of the ring and follow that for a time. Think on that. Without people you're nothing.”Host - Trey MitchellIG - treymitchellphotography IG - feeding_the_senses_unsensoredFB - facebook.com/profile.php?id=100074368084848
Dayna Martin is an advocate, speaker, educator, and author of three books about parenting and homeschooling. Dayna been featured on The Dr. Phil Show, CNN, Nightline, The Jeff Probst Show, ABC's hit show, Wife Swap, Fox News, 60 Minutes and the Bethenny Show.She was used as an informational resource for Homeschooling stories on the Discovery Channel, The Today Show and Our America on the OWN Network and the Oprah Winfrey Show. She travels the world helping families change their lives by changing their parenting paradigm to bring more peace and connection to their lives with their children. Dayna and is a featured speaker at the major parenting and education conferences worldwide. Dayna has been inspiring parents for almost two decades by sharing her experience through natural birth, attachment parenting and Unschooling. She loves travelling world over helping families change their lives by changing their parenting paradigm and bringing more peace and connection to their lives with their children. In this thought-provoking episode, Dayna Martin shares her journey of advocating for unschooling. She highlights the importance of listening to her children over societal norms. Through exploring the unschooling philosophy, she distinguishes between authoritarian parenting, which models power rules, and partnership parenting, where everyone's needs matter. Dayna believes that partnership parenting is the model for a peaceful world. She also sheds light on how traditional schooling was created and how parents were forced at gunpoint to attend compulsory education in America. This leads to an insightful discussion on what an unschooling day looks like and the role of technology in unschooling. Dayna makes a compelling argument that controlling technology is what causes negative behavior, not the technology itself and why we need to connect with our children through their interests without control or limits? Finally, we learn about the conditioning – learning to trust children and to start trusting yourself again. Dayna's son became a blacksmith because he was allowed to play with fire, highlighting the power of unschooling in allowing children to follow their passions and discover their own path in life. We explore questions such as whether we have given up our right to spend time with our children due to the public school system, and why you're considered a radical and rebel for trusting your kids. Through discussing the pandemic's impact on unschooled children and the benefits of deschooling, we discover how unschooling is not just an educational approach but a way of life that facilitates a child-led learning experience. Other topics tackled in this episode include obstacles parents face when leaning into unschooling, the unhealthy relationships created by the current schooling system, and whether working mothers can create a safe space for unschooling. Ultimately, we are left with the question of whether we are raising our children to be who they truly are or who we want them to be. Show notes 4.40 – Why do we listen to society instead of our own children? 6:20 – How advocating for unschooling lead to a shift from ridicule to acceptance, and what can we learn from Dayna's experience? 9.07 – The impact of introducing unschooling on a mainstream TV show like ‘Dr Phil and 'Wife Swap' 14:11 – The underlying philosophy of unschooling and how it differs from traditional schooling 15:10 – Is authoritarian parenting a lazy form of parenting? How can partnership parenting be a model for world peace? 17:20 – What does unschooling actually entail, and how does it differ from un-educating or forced learning? 19:33 – Why were schools created in the first place, and what do critics of unschooling often overlook? 20:00 – How have parents historically resisted compulsory education, and why were they sometimes forced to attend at gunpoint?" 21:35 – A glimpse into a typical day of unschooling 26:30 – The role technology plays in unschooling, and how can we connect with our children through their interests without control or limits? 30:40 – Learning to trust our children and ourselves when it comes to unschooling, and how can we overcome conditioning that tells us otherwise. 34:00 – What can we learn from Dayna's son, who became a blacksmith simply because he was allowed to play with fire and follow his passion 35:50 – Public school permissions: Have we given up our right to spend time with our children? 37:45 - Parents who homeschool their kids in China are deemed criminals 39:15 – Why you're considered a radical and rebel for trusting your kids? 40:00 - When the pandemic hit, unschooled kids were seemingly invincible. Why? 48:00 - Are you stuck on seeing things only through a "schooly" lens? 48:40 - Who benefits the most from deschooling? The children or the parents? 49:20 - How long it takes to decondition a child after being in school: one month for every year in school. 51:11 - Unschooling isn't just how you educate your child; it's a way of life. Parents facilitate, but the child leads the way. 52:00 - Some of the biggest obstacles parents face when leaning into unschooling 54:45 - Is our current schooling system creating unhealthy relationships within our children? 58:00 - Did you know that many unschoolers go on to attend major colleges by choice and self-motivation? 1:02:40 - Can working mothers create a safe space for unschooling? 1:10:40 - Are you raising your child to be who they truly are, or who you want them to be? Snippets of this interview: Partnership Parenting Origin of Compulsory Schooling Navigating Yes and No with Your Child To follow and find out more about www.daynamartin.com Instagram @officaldaynamartin The We Know Show Affiliate Offers Orgone Effects Australia For the last 15 years, founder of We Are Not SAM and The We Know Show host, Rinat Strahlhofer has been using Orgone Effects Australia https://orgoneffectsaustralia.com.au/?ref=WANS and has experienced and seen incredible results. She recommends and trusts these products implicitly. For those in America go to https://orgoneeffects.com/?ref=WANS10US “The most efficient way to neutralize the harmful effects of EMS (Electromagnetic Stress) in the human meridian system is to employ EMF Harmonizing solutions” – Gerard Bini (Founder of Orgone Effects) How do the products work? Orgone Effects EMF Harmonizing Solutions help to produce a negative charge resonance, this helps to balance your frequency so that it is as close to nature as possible. Having the correct negative charge frequencies is vitally important in balancing out the positive charge resonance from any surrounding electromagnetic fields in order to neutralise any harmful electromagnetic stress on the human body and the meridian system. You can learn more about their products and purchase here. We're very happy to be able to provide a special discount for our WANS audience. Get 10% off the entire Orgone Effects Australia range using discount code WANS 10 (AUS) and WANS10US (US). By using our links you'll be supporting our show, continuing to spread the Safe Technology message. And there's no extra cost to you. For more info on how to stay safe and human in a technology-obsessed world, check out We Are Not SAM and join up to the mailing list for special offers. Join the conversation @wearenotsam on Instagram & Telegram. Thank you for tuning in. To help spread this content, please rate, subscribe and share!
My guest this episode is Simon Kerr of The Wans. We start the show discussing Guinness, Irish coffee and mead. Makes sense…Simon was born in Ireland and I'm mostly Irish. But he grew up in Northern Ireland whereas I did not. His parents were both very musical and imparted that on Simon. It took such deep root in him that his dad is actually his writing partner to this day! That started when Simon was sixteen. But before that he was reluctantly taking classical guitar lessons, learning a solid foundation whether he wanted it or not. During that time, his dad formed a very close connection to John Prine that was truly life changing for Simon. Simon reveals what The Wans means and why he chose that name. We take a few detours in this conversation, almost like there weren't microphones in front of us. We talk a little bit about cars and Simon's solo album Doldrums. The Wans are releasing their latest album this summer and Simon talks about why they record albums so quickly and the connection between the first Wans release and the upcoming one. Follow The Wans @thewans on Instagram. Go to Bandcamp and preorder their upcoming album, Magical Touch and buy their other albums. Follow us @PerformanceAnx on Twitter & Instagram. You can support us by buying a cup of coffee at ko-fi.com/performanceanxiety or merch with our logo at performanceanx.threadless.com. Now get ready to eavesdrop on my conversation with Simon Kerr of The Wans on Performance Anxiety on the Pantheon Podcast Network. Learn more about your ad choices. Visit megaphone.fm/adchoices
Preview indie music by Horizon Theory, CloZure, Juliana MacDowell, Rebecca Lappa, Last Breed, vaghy, Brooke Sause, The Wans, The Nocturnal Affair and Popes Of Chillitown. soundkharma #indiemusic #music #podcast WEBSITE: https://soundkharma.com/ SUBMIT A TRACK: https://soundkharma.com/submit/ PODCAST ARCHIVES: https://soundkharma.com/podcast-archives/ TRACK LIST: https://www.youtube.com/watch?v=yTQjltJdtRg https://www.youtube.com/watch?v=M6w5s7IdDxM https://www.youtube.com/watch?v=ZP82CwuT9OM https://www.youtube.com/watch?v=6C3LD4ZJiQg https://www.youtube.com/watch?v=ZfQpbtCVtJ8 https://www.youtube.com/watch?v=xDhfmzL5Kbc https://www.youtube.com/watch?v=S8Qe6WYQFw8 https://www.youtube.com/watch?v=B_i9TdvTsLA https://www.youtube.com/watch?v=l6HgQi7tM2U https://www.youtube.com/watch?v=VtqbLVPAUX4
"Gå inte på en pingpongshow". Detta efter att Christopher Garplind kollat på otroligt sjuka underhållningsformer under hans tidiga år. Hanna Hellquist sammanfattar sin ADHD-utredning. P3 Nyheters Matilda Rånge ger oss ett måssvep. Techreporter Effie Karabuda förklarar varför Sveriges Radio lämnar Twitter och vår hiphopexpert Petter Hallén snackar om hiphopens betydelse på livescenen. Programledare: Christopher Garplind och Hanna Hellquist.
You can only unplug from the matrix if you know you're in it. Join us as we speak to David Icke as he reveals the nature of the reality that we have been taught to believe is truth, through a lifetime of deep programming. For the past 30 years, he has been compiling information across a vast range of subjects and connecting them in ways that offers us a clearer picture of our reality. By connecting the dots between major world events, he provides us with a context to better understand the simulated reality that we have been living in. Learn how we have been led to believe in this illusion, and the ways we can shift our perceptions to finally be free from this control. Expanding on decades of resilience, David keeps it real saying two things help him to avoid bowing to authority: having infinite awareness and being a stubborn bastard. David asks hard-hitting questions like whether you are free or living within the parameters of what you think is acceptable to other people? David boldly takes us on a journey to remind us to interact with the world on our terms not the terms of the matrix simulation and why the only way to override the programming is to become conscious beyond the limits of the simulation thus influencing the program. David doesn't hold back when speaking about the WOKE agenda and how this is controlling perception via political correctness. What's more is David's predictions over the coming years, including Silicon Valley connecting the human brain to AI, the preview of Hunger Games 15 min cities, reincarnation and more. We also celebrate alternative media and the rise of individual sovereignty. Take a deep breathe, hold on to your seat and enjoy the ride with David Icke. Show notes 2:20 – David's attitude that won't bow to authority? Having an infinite state of awareness and being a stubborn bastard 3:00 – Fear of public speaking stems from a fear of what other people think 5:00 – Are you free or living within the parameters of what you think is acceptable to other people? 6:30 – George Orwell's Newspeak: How WOKE agenda is controlling perception via political correctness 12:30 – The next few years: an attempt to crush those that are waking up by those that are fast asleep 14:30 – The risks of identifying the “I” with the body 17:00 – Ridiculed on the streets to now being asked to comment on what's going on 18:30 – Living here is a simulation created to keep you with your headset on, awakening is taking the headset off and recognising what the headset is not telling you? 20:40 – How to override the programming and become conscious beyond the limits of the simulation 21:25 – No-one is “awake”, we are simply awakening to more consciousness and insight 24:00 – The real reason Silicon Valley is connecting the human brain to AI 26:00 – Are our perceptions being controlled by a mass race of computer beings via jabs connected to 5G towers and the AI cloud? 28:50 – 15 min cities and electric cars to protect the planet, pa-lease! 36:00 – David's thoughts on Elon Musk and Twitter 39:00 – Reincarnation: a road to enlightenment or enslavement? 42:30 – The more you self-identify with the 5 senses rather than consciousness, the stronger your attachment to the matrix 46:20 – Celebrating alternative media: it has been responsible for an enormous amount of lives saved Snippets of this interview: WOKE agenda is attempting to control perception You can only unplug from the matrix if you know you're in it Elon Musk and Twitter To follow and find out more about David Icke's work, please visit: https://davidicke.com https://www.ickonic.com The We Know Show Affiliate Offers Orgone Effects Australia For the last 15 years, founder of We Are Not SAM and The We Know Show host, Rinat Strahlhofer has been using Orgone Effects Australia https://orgoneffectsaustralia.com.au/?ref=WANS and has experienced and seen incredible results. She recommends and trusts these products implicitly. “The most efficient way to neutralize the harmful effects of EMS (Electromagnetic Stress) in the human meridian system is to employ EMF Harmonizing solutions” – Gerard Bini (Founder of Orgone Effects) How do the products work? Orgone Effects EMF Harmonizing Solutions help to produce a negative charge resonance, this helps to balance your frequency so that it is as close to nature as possible. Having the correct negative charge frequencies is vitally important in balancing out the positive charge resonance from any surrounding electromagnetic fields in order to neutralise any harmful electromagnetic stress on the human body and the meridian system. You can learn more about their products and purchase here. We're very happy to be able to provide a special discount for our WANS audience. Get 10% off the entire Orgone Effects Australia range using discount code WANS10. By using our links you'll be supporting our show, continuing to spread the Safe Technology message. And there's no extra cost to you. For more info on how to stay safe and human in a technology-obsessed world, check out We Are Not SAM and join up to the mailing list for special offers. Join the conversation @wearenotsam on Instagram & Telegram. Thank you for tuning in. To help spread this content, please rate, subscribe and share!
Charles Eisenstein is an American author and public speaker who examines the unspoken narratives that direct our society and our lives. His work covers a wide range of topics, including the history of human civilisation, economics, spirituality, and the ecology movement. Key themes explored include anti-consumerism, interdependence, and how myth and narrative influence culture. Eisenstein graduated from Yale University with a degree in Mathematics and Philosophy. He lived in Taiwan for nine years, where he became fluent in Mandarin Chinese and worked as a translator. He married there, had children, and later returned to the United States. The Ascent of Humanity, which was published in 2007, became his first commercially successful book, launching his writing career. Eisenstein has since written many books including The More Beautiful World our Hearts Know is Possible and Sacred Economics. His newest book, The Coronation, was released in the summer of 2022. Get ready for a philosophical and enlightening conversation that will leave you in deep contemplation, reverence, awe and wonder. Charles unpacks why you cannot fundamentally change one thing, without changing everything else. We explore the power of human imagination. AI may simplify a lot of what we already know but it can never create from a place of consciousness, emotion or soul. We explore ‘interbeing' and why this underpins all his writings, the contrasts between the systems of sovereignty and authority, our willingness to participate in change, the feeling of readiness that is growing in each of us and how we offer it trust, parallel societies currently in motion, the biggest gifts over the last few years, the out-dated paradigm of rewards and punishments. Charles addresses what technology substitutes in our lives, the limitations and purposes of AI and why we know a world of beauty is within our reach. There are just some things that technology can never replace and my goodness does Charles paint that picture well, you don't want to miss this! Show notes 3:40 – Being in the world through the lens of inter-being – the more we expand our relationships, the more whole we feel Interbeing: transitioning from competitive and controlling separateness to a relationship with self, each other and the world. To know what is happening in the world is happening to us 12:00 – Relaxing the part of you that want to know “how” to do life 13:00 – Authoritarianism: Rewards and Punishments – why this system of control is on its way out 25:00 –The AI promise: virtual reality will become superior to regular reality because it's programmable…but we're bumping up against the limitations of that. 26:00 –Addiction to the artificial: the object of addiction e.g social media does not meet the need that drives the addiction such as love, physical connection, or intimacy. 32:00 – The limitations of A.I and the biases built into them, just like Wikipedia today 38:00 – Rather than looking at Technology as good or evil, the question is what is for, what does it serve? Imagine technology being used to make the government transparent to the people? 41:00 – Why you cannot fundamentally change one thing, without changing everything else. Are you “ready” to participate in change? 54:00 – How do we educate our kids into a society that doesn't exist yet? 59:40 – The greatest act of service is to uplift this world. How do we know that something more beautiful than what exists is possible? 1:02:0- – Children are the vehicle of life to continue and they keep us honest and brave 1:03:00 – Why nobody is buying the story and promise of a Techno Utopia Snippets of this interview: AI will never create from a place of consciousness, emotion or soul Can artificial intelligence replace human intelligence? Our consciousness cannot be digitised, the new world is coming. To follow and find out more about Charles Eisenstein's work, please visit: https://charleseisenstein.org/ https://charleseisenstein.substack.com/ For the last 15 years, founder of We Are Not SAM and The We Know Show host, Rinat Strahlhofer has been using Orgone Effects Australia as well as family and friends and have experienced incredible results. She recommends and trusts these products implicitly. “The most efficient way to neutralize the harmful effects of EMS (Electromagnetic Stress) in the human meridian system is to employ EMF Harmonizing solutions”- Gerard Bini (Founder of Orgone Effects) How do the products work? Orgone Effects EMF Harmonizing Solutions help to produce a negative charge resonance, this helps to balance your frequency so that it is as close to nature as possible. Having the correct negative charge frequencies is vitally important in balancing out the positive charge resonance from any surrounding electromagnetic fields in order to neutralise any harmful electromagnetic stress on the human body and the meridian system. You can learn more about their products and purchase here. https://orgoneffectsaustralia.com.au/?ref=WANS We're very happy to be able to provide a special discount for our WANS audience. Get 10% off the entire Orgone Effects Australia range using discount code WANS10. We invite you to use our link https://www.luminousrevolution.com/wans.html to watch 18 incredible classes by world renowned guest speaker Luminous Education video series! The small kick back from purchasing will go towards supporting the We Are Not SAM campaign, continuing to spread the Safe Technology message. And there's no extra cost to you. Luminous Education Revolution is a video series program, where Dr. Edith is joined by world-class speakers including Charles Eisenstein, Mas Sajady, Matías De Stefano, Penny Kelly, Dr. Barre Paul Lando, Gabriel Miguel, Dr. Peter Gray, Dayna Martin, and more, to bring profound depth and wisdom in a format that goes far beyond homeschooling, or unschooling. This program allows us to let go of the archaic paradigm and discover our natural intelligence and brilliance, exploring the deeper essence of who we are as human beings. It encourages a more natural, joyful and fulfilling way to nurture your kids AND yourself. The best of holistic education, homeschooling, unschooling, self-directed learning, awakened parenthood, plus ancient memories, future vision, and holistic family life. By using our link above you'll be supporting our show, continuing to spread the Safe Technology message. And there's no extra cost to you. For more info on how to stay human in a technology obsessed world, check out We Are Not SAM https://wearenotsam.com/ and join up to the mailing list for special offers. Join the conversation @wearenotsam on Instagram https://www.instagram.com/wearenotsam/ & Telegram https://t.me/wearenotsam Thank you for tuning in. To help spread this content, please rate, subscribe, donate and share!
First podcast of the year! And only a month and a half in. Nashville-based outfit The Wans are back in full force after an unofficial hiatus, reinforcing their crunchy alt licks with their latest single, “Magical Touch”. Cut from the band's forthcoming record of the same name, it is also accompanied by Fear and Loathing-inspired narratives that remind us to take care and enjoy the ride. Magical Touch is out July 26 a la self-release. --- Send in a voice message: https://anchor.fm/sketchedsounds/message Support this podcast: https://anchor.fm/sketchedsounds/support
Helden und Visionäre – Dein Weg zur sinnvollen Arbeit und Social Entrepreneurship
Dieses Gespräch mit Timo Wans von MYZELIUM hat es in sich. Knapp 120 Minuten voller Podcast-Content. Wenn dich die Länge jetzt erschrecken sollte, keine Sorge: Springe einfach auf das Ende der Episode, lies dir alternativ diesen Text durch, und nimm so die Kernelemente mit. Mit Sicherheit wird dich die Zusammenfassung aber auch neugierig machen. Große Episode = Große Themen Diese XXL-Episode hat mindestens eine Sache mit einem wissenschaftlichen Paper gemeinsam: Man kommt langsam zum Punkt, zum Kernelement. Das ist aber in diesem Fall gar nicht schlimm, denn das Ergebnis ist eine interessante Folge voller Insights. Ein kleiner Vorgeschmack auf die Themen, die angesprochen werden: Wie kann Gemeinschaft und Wirtschaft verbunden werden? Welche konkreten Beispiele gibt es von wirtschaftlich agierenden Unternehmen? Was ist die Verbindung zwischen Vertrauen, Verantwortung, Handeln und wirtschaftlichem Erfolg? Kannst du auch mit deinem Unternehmen wirtschaftlich erfolgreich sein, ohne Marktmechanismen wie Angebot und Nachfrage? Positive Veränderungen herbeiführen Wir brauchen mehr konkrete Handlungsschritte, bei denen Vertrauen und Verantwortung mit eingebracht werden und dann zu spürbaren positiven Veränderungen führen. Wir würden damit neue, im Rahmen von Wirtschafts-, Gesellschafts- und Kultur-Systeme komplett neue Denkmodelle schaffen. Wirtschaft ohne Markt – geht das? Timo hat gezeigt, wie der Switch von einem Denkmodell (solidarischer Landwirtschaft) zu anderen Denkmodellen und Unternehmensformen gekommen ist. Sein Schlüssel dabei war, ihr ahnt es schon, das Probieren und Machen. Dadurch sind neue Dinge entstanden – im Fall von Timo: Wirtschaft ohne den Markt, also ohne die Mechanismen von Angebot und Nachfrage. Er hat diese verändert. In diesem Kontext benötigt man neue Bilder für die “Share-Holder”. Klassisch wird zwischen Kunden, Mitarbeiter, Investoren und Unternehmer unterschieden. Das Bild, das Timo von einem Unternehmer zeichnete, hat Georg angesprochen und somit auch zu diesem intensiven Gespräch geführt. Die Grundlage genau dieses Bildes ist im Kern, zu wissen, was man wirklich will und dieses in Form einer Vision kommunizierbar macht. Ohne jedoch die Offenheit für die eigene Situation und den Handlungsspielraum aufzugeben und auch diesen zu kommunizieren. Dabei wächst und entwickelt man sich persönlich weiter. Man handelt und tut etwas, getreu dem Motto dieses Podcast: “Mach was, beweg was!”. Weg mit den Silos Beim gemeinschaftlichen Wirtschaften funktioniert dieses Bild sehr gut. Aber auch in unserer “normalen” Gesellschaft und Wirtschaft ist es nötig, dieses Bild zu stärken. Dort kommen wir aber nicht hin, wenn wir immer das Schubladendenken der “Share-Holder” bedienen. Wir müssen außerhalb der Silos denken. Die Schwelle zwischen diesen einzelnen Holder ist Vertrauen. Sowohl im eigenen Sinne (sich selbst vertrauen), Verantwortung übernehmen und etwas zutrauen. Das ermöglicht uns dann, außerhalb dieser Silos zu denken. Nur wer Verantwortung übernimmt, kann Änderung herbeiführen Klar ist, wenn wir nicht Verantwortung übernehmen, dann wird das von uns selbst geschaffene System uns immer mehr einengen. Wir können nicht allein die Welt verändern, wir können aber Verantwortung übernehmen und Teil der Veränderung werden. Bist du bereit dafür? Dann mach was, beweg was! Über MYZELIUM Das MYZELIUM ist das Ökosystem für gemeinschaftsbasierte Unternehmer*innen. MYZELIUM ermöglicht es Unternehmer*innen, solidarisch-gemeinschaftsbasiertes Wirtschaften groß zu denken. Das gelingt durch Gründungsbegleitung und unterschiedliche Workshops. Zudem bringen MYZELIUM solidarisch-gemeinschaftsbasiertes Wirtschaften in die Wissenschaft und stößt internationale Forschungsprojekte an. Mit den gewonnenen Erkenntnissen aus Forschung und Praxis unterstützen die Initiatoren Politik, Verwaltung, Stiftungen und Verbände beim notwendigen Perspektivwechsel für die Welt von morgen.
Configuration Examples with KevTechify for the Cisco Certified Network Associate (CCNA)
In this episode we are going to look at WAN Concepts.We will be investigating various types of WANs by exploring a topology that uses diverse connectivity technologies.Thank you so much for listening to this episode of my series on Enterprise Networking, Security, and Automation for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Configuration Examples for Enterprise Networking, Security, and Automation v3 (ENSA)WAN ConceptsLab 7.6.1 - WAN ConceptsPodcast Number: 80Season: 1-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
The Dow finished down more than 400 points, with the S&P hitting a fresh closing low for 2022, and Jim Cramer is helping investors navigate the market as it falls deeper into bear territory. First, with the Fed driving the action in stocks, Cramer's sharing what the Fed is looking for in the fight against inflation and how the market might react if the Fed isn't seeing it. Then, in a two-part interview, Morgan Stanley CEO James Gorman sits down with Cramer to talk about the Fed and rate hikes, building wealth, crypto, Morgan Stanley's acquisitions and more. Plus, Carmax plummeted 25% off disappointing earnings - Cramer's looking closer at the used car space to see if the cooling market could be good news on the inflation front.
WANS NASA James Webb Space Telescope Latest Images BLOW OUR MINDS AGAIN!!!!! by We Are Not Scientists
check out: convocourses.com : the cybersecurity jobs: resume marketing book is coming soon! Hey guys, this is Bruce and welcome to another podcast of pot of convo courses, where I'm gonna be talking to you. How to get in cyber security and how to market yourself. If you're interested in getting into a career field, that's gonna grow in the next five years, probably double to what it is right now, where you have job security and I've, I've never had to worry about whether or not I'm gonna get a job. If you are wanting more job security, then this is a great feel to get in. And you're talking to somebody who who's been doing this for 20 years, I'm speaking to you from inside the industry. All right. So if you have any questions on Facebook, on YouTube, on TikTok live on podcast, then this is a great question. The time to ask any of your questions regarding it and cyber security. So let's keep it to that. I'm not interested in anything having to do. Anything except cyber security. So let's just keep it to cyber security questions. All right. That being said, let's get into this. If you didn't know, I am the owner and proprietor of combo courses.com. It's a site where it teaches you how to do site, get into cybersecurity. And specifically my sub, where I'm the subject matter expert is something called security compliance, security compliance has to do with if you've ever gone to a bank, if you've ever used a retail, if you ever used a point of sale device, if you ever gotten a, a card from the DMV, like all of those things require something called. security compliance that that's the rules and the regulations that go into an organization, cyber security. So not necessarily implementation of the cyber security, like firewalls or IPSS IDSS and all that kind of stuff. Not the technical implementation, but more like, how does this organization, whether it be a bank or your hospital, or your, or target or Walmart or whoever, how do they comply and keep security on their systems? That's what I do. And that's what I teach people how to do. I've been doing this for a very long time, specifically for the government, the federal government, but I've also done it in the private sector and I've done it in for states. I've done it for a little bit for other countries when it pertained to the us. So let's get into this. So we've got combo courses. I also wanted to tell you that I'm doing real steady podcasts on pod beam. If you're, if you wanna get some information on that just go to pod beam dot combo courses, dot pod beam.com. Enjoy me there. I'm doing lives every week. I'm putting out more content. If, if if you prefer to listen to this, or if you're at your job and you wanna listen and learn and stuff, this is a great opportunity for you to do that. And I'm open to any kind of questions you have specifically to this to this genre, to this area of my area of expertise. And a lot of, one of the good things about this community is that if I don't know something, somebody in this community, isn't a subject matter expert on that thing. And that's one of the things that I personally love about this community that we've been building. So let's get into this. I also wanna let you guys know, I have a book I'm gonna be breaking down and giving you a lot of the stuff that's in this book. Okay. So if you actually stay tuned for this, I'm gonna actually break down exactly how to mark yourself, how to get in this career path and how to level up if you happen to be an it person. If you happen to be a, a cable jockey, a person who's laying cable for people doing internet stuff. If you happen to be in areas like healthcare, if you happen to be in stuff like banking, this is a really good opportunity for you to transition into a career field that pays better. That has more security and has a lot of opportunities for the next 20, 30 years to come because cyber security is not going anywhere. Okay. And it's not all super technical. That's another MIS misconception about cyber security that I, that I like to dispel that myth. All right. So let's get into this. Let me show you guys what I've got going on. I've I'm writing a book right now that breaks down one of my main questions. So one of the main questions people ask me on TikTok on Facebook, on YouTube. Everywhere is Bruce. How do I get into this career field? Like I've been trying for years, maybe I'm in it. Maybe I'm in the hospital. Maybe I'm I'm in healthcare, I'm in this other industry and I'm trying to get into break into cyber security. I'm trying to break into it. So what I'm doing, if I could actually switch this thing over, let me see. So what I'm doing is a book where I'm gonna tell you how to get cyber security in it. This works also for any other career field as well, how to get into it. and how to market yourself in, in this field. This is something that I've been using for years. This is not something that this is not theory for me. This is something I actually do in practice all the time. So it's gonna be a series where I'm gonna add lots and lots of value to you over the years as I released these books. But let me just get right into this. Okay. So here's the sections of the book. What I'm telling you is first of all, the expectations, what I've been able to do successfully, and then I break down all of the steps you're gonna take to actually put this stuff on your resume, particularly if you are in it, if you're in it, the good news is you can very quickly ramp up to cyber security by putting certain things in your resume. So one of the things I talk about. How to do an ATS style, resume ATS style resume means applic application tracking software. This is what most employers are using these days. If you happen to be putting your resume out there and you're not getting any traction, then it might be because the resume style that you have is not correct. And sometimes when you put your resume out there it's, if you make it harder on the employer to actually take your, the data in from your resume, you know, it's, they might look, look you over and look for somebody else. So I'm teaching you how to use in in fact, I'm just giving you a template. If you go to convo courses.com and look for my course, it actually has a free template you can download right now that has the template that I use. That's been successful over over the years. But so that's what I do. I tell you, look, here are the tools that you need to set up for this. Here's the places we're gonna be posting this, this your resume. And one of the main key features that I. aside from the format and telling you how to do all that stuff is I actually show you how to do the keyword research. How do you find what career path to do, cuz that's a really important thing. You need to know what path you're doing because here's the thing you can see. There's misspellings in this book. This is a first, this is a rough draft. Okay. what I do is I bang out the, I just write it as fast as I can. I take all the knowledge and I dump it into this book and then I go through it like two or three times and edit it myself. Then I get it, give it to an editor. So that's why you're, you might see some misspellings. There's some errors in here. Just ignore that stuff. That's gonna be cleaned up. As I release this, it's gonna be released on Amazon, on my, on my personal site on, and then I I'm gonna advertise it everywhere. Anyway. what I'm gonna show you, how to do is how to find a specific category of cyber security. Cuz this is one thing that some of the gurus out there and some of the subject matter experts and some of the pen testers and stuff, they don't talk about this. And one that's that this is a huge career field cyber security's huge. So you don't have just pen tester. You would think that cybersecurity is just a bunch of people in a closet hacking stuff. And that is not a, could not be further from the truth. This is actually a huge career field and it's getting deeper and deeper. And just to give you an example, like in my book here, I'm, I'm breaking down some of the categories that's coming from the government, the government broke down this what they did was they had this initiative where they broke down all of the main career paths of cybersecurity. It's called the national initiative. For cyber security, careers and studies. I know that's, that's a mouthful, but this is what they called it. Take that up, that issue up with the government of why they name stuff like this, but also known as nice, nice cyber cyber workforce. If you, if you Google that, you'll find this what I'm talking about right here. So what I'm breaking doing is breaking this down in a practical way that you can use this. So it breaks down things like securely and provision. So what does that mean? That's like people who architect and design. Secure systems. And then you got overseeing govern. That's kind of what I do. That's making sure that the, the system is secure, making sure that we manage the security and manage the the risk associated with that system. And it also goes into legal advice and then program management and all that kind of stuff. So as you, you could probably tell that that's not super technical or in the weeds or hands on type stuff. That's more like organizing, make sure the organization itself as a whole is doing what they're supposed to do. So cyber security is a huge field. Another area that we talk about is the, the hacking and the defense and actual people who are on the system you know, on the actual firewall, doing the configuration, putting the rules in those guys do exist. You know, I'm not saying sitting here saying that they're irrelevant or they don't exist. I'm saying this field is so huge that you've got people who are way in the weeds all the way down the mathematics. Right. Cause you've got people who do CR cyber they, they do cyber crime investigations, forensics. You also have people who are doing crypto cryptography. So that is also considered a part of cyber security by the way. And this thing that breaks down all those different areas that you would find these different these different categories. And then it breaks it down even further into specializations. So what my book is doing is gonna do and what I'm gonna show you how to do like a practical way to do this for yourself right now is what they do is they break it all the way down to work roles. And then once you figure out what work roles, the first thing you gotta do is figure out what part of cyber security you want go in. Cause it's not enough to say I want to go into cybersecurity. You gotta be like, I wanna go, I wanna be a pen tester. I wanna be, I wanna go into cryptography. I wanna go into forensics. I want to go in. I wanna do what Bruce does. I wanna do information system, security officer work. I wanna do compliance. You gotta be down to that granularity. And the only way for you to get there is for you to do some study on your keyword. Right? So that's one of the things I break down in this book. Now what I'm gonna do right now is show you exactly how I do this. So what I'm gonna do, like live right here right now. Let me just switch my screen here on TikTok. So what I'm gonna do right now is show you what I do. Okay. So there's three main sites in the us, okay. Three main sites. And, and this, this is different by the way, this is different for each country. If you wanna work in another country, you have to find a whole nother set of a whole nother set of sites to go through in the us. There's a top 10 group of sites that work the best. And just off the top three is gonna be LinkedIn dice and monster. So those three sites are the best sites that you can go through, go to, but there's like 10 or 20 others that you should definitely apply to. If you're trying to get a cyber security job, if you're trying to get really any job, cuz those are the top sites. Now, if you're in the nursing, if you are doing something completely different, like sanitation engineer, if you're doing something completely different, like civil engineering, there might be other sites and for your industry that are better for you, but you gotta do that research. I'm talking about cyber security. I'm trying to get you prepped to get into this field in cyber security, by knowing not only the key words, but also the top sites. Now the top sites for that we're talking about is monster LinkedIn and dice. And you can actually, and indeed is another really good one, but these are the sites I'm gonna show you real quick. So once you do your resume all, so once you, first of all, the first thing you need to do is figure out what keyword. Right. So let's say you did your research and you know, I want Bruce, I wanna go into forensics forensics. I'm gonna show you real quick, how you can find keywords for forensics. If you didn't, if you didn't know a lot about it, if you hadn't done research, if you're just starting out, you just go to the search engine and type in forensics. Now this is a very broad field. Like forensics itself is super broad. If you ever watch that show CSI, I don't really talk about computers much. They talk about dead bodies and, and extracting the maggots from the bodies and stuff like that. I mean, that's kind of a crude thing, but that's exactly what the talk dog entomology and all that kind of stuff. We're talking about computer science. So let's type in slip forensics computers. Now I happen to know that they call it digital forensics, but let's say you didn't know that. So you, I just typed in forensics and. See why? And it automatically came up with some keywords. This is how you do it. Now this works. If you're doing, if you're doing this with cyber security analyst, if you're doing information security, officer information, system, security, period cloud security, anything you, any kind of subject matter, you wanna do this also works for any other field. You wanna be in you just type in a little bit. And it starts to come up with some of the key words. So let's type, let's look at this one right here, computer forensics analysis. This is leading us down a rabbit hole of all the security keywords that we need for this particular career path. Now I'm gonna go ahead. I'm on monster.com, by the way. And now I'm searching for this career, but now where do we get the keyword? Once these jobs come up, I'll show you. So, another thing to note is the salaries. Now, if you didn't know, this salary is for information security analyst and they don't always sell the name. You notice the names, none of these are saying forensics. That's because that's, that's how this works. Like if you go into whether you're doing cryptography, whether you're doing whatever, it doesn't always have the exact name of the title of the role, the work role that you want. And that's why it's very important for you to do the research on your own to figure out what is in this career path. Okay. What are the key words? You can see a pattern already, information security analyst, information, security analysts cyber intrusion, detection, analysts. These are all analysts, right? Let's look at this one. Cyber forensics analysts. So all of these jobs have analysts work in them. Okay. That's why it's all, these are coming up. The key words are gonna be in the responsibilities, the requirements and the skills, and sometimes they'll have, okay. Yeah. Desired certifications. Just off of this right here. We can get the DNA. that's associated with this particular job role this work role, right? Just off of this one thing right here, we can, we can pull a lot of different gold out of this right here. Now let me, let me just show you what I'm talking about in the responsibilities. What you wanna do you wanna read like four or five of these to get an idea of what this job is all about? First of all, cuz you might not even want to do it, right. You might have watched a CSI one too many times and you're like, oh, I wanna be a hacker. I wanna be, I wanna do forensic, like. It's the job is rarely what you think it is. You know what I mean? So you, you definitely wanna do your research and if you can talk to some, somebody like myself, who's been in this field for a while and ask their, ask them, like, how do you like it? You've been doing this for 20 years. How do you like doing this job? Is this something that you think I should do? What are the pros and cons? Those are the kind of questions you really want to ask. Let's get back into keywords. So if we're looking at keywords here, I'm seeing a couple off the top of my dome right here. If you see words like this, that you don't know what the hell it is, PCAP, that's a key right there. If you see there's a couple key tasks in here, stakeholders. There's a couple of key in here already, but you wanna read through responsibilities cuz you might, you might not even wanna do this job collects network, device, integrity, data and analyze signs of tampering and compromise. Okay. So signs of tampering and compromise is one of the things you do as a. As a forensics guy. Now let's look at, let's get a little deeper into this desired skills. Look at this. Now this is a gold mine of all kinds of keyword. See all this stuff right there. These right here are tools. It says you need to be experienced and proficient with the following tools in case FTK sift. These are all tools of the trade for a forensics guy. Very important. Like just like a plumber. Like if you are a plumber, there's certain tools that you need to know. Right? There's certain things that, that you basic things in that field that you need to know. If you don't know 'em you gotta get to know 'em right. Especially if you're brand new at this, you gotta get to know what those things are. Now I'm talking to people who might have a little bit of it experience or something like that. For forensics, you, you probably have to know, at least the basics. In it very, very important. So now let's get back into this. Let's get back into finding out key keyword here. So these are all key words right here. And now what you wanna do is take these. You got two things you can do from here. You could take this and put 'em into a copy of paste it into a, a blank text file. You can do that. Another thing you can do is put it into something called word art and word art. What it'll do word word art does is it makes a visual representation of what of what you found. So let me just show you what that, what I'm talking about, that word, art.com and it's, it's just a tool to kind of help you to, to visualize what's going on. So here's word. All right here, you can create your own. And it, it comes up with this site here and what you'll do is you'll input the words. You'll copy them and then import them in. So let's, let me just show you what I'm talking about. So we're gonna go to, I'm gonna go back here and I'm gonna copy and you wanna do this on two or three different jobs. I'm gonna copy this and we're gonna import what we just copied into word art. We're gonna import it now. They, they take it right here. So I just copied it. Boom. I, I put it in here and I'm gonna import these words and now what it is, parsed out every word that's in the text that I just downloaded. So what I do, let me backtrack a little bit. So what I did was, what I'm doing is I'm going through two or three of these different websites, two or three of these different jobs, and I'm gonna copy and paste those into a one file. One word document. Then I'm gonna take those and I'll put 'em into word art. And then we're gonna do get a visualization of what this looks like to see. What, what areas are the most important that we need to focus on tools. Look at this for so forensics, we can see that tools is mentioned a whole bunch of times out of this. Now this is kind of a light list. Like it's only mentioned twice, but you wanna get like four or five different ones and dump 'em in there, but you kind of see the idea of what is happening here. And then the tools that are mentioned the most is in case now, in case it is a forensics tool, that's very expensive. You might be able to get a free a free version of it, trial version to, to mess around with it. But this is not, this is not a cheap, this is one of the most expensive tools out there for forensics. So in case I'm very familiar with I'm familiar with that. It's used quite a bit in the government to. What they'll do is if, if somebody's done a crime on a computer, I could tell you some crazy stuff for forensics that's happened is it's pretty dark. I mean, the stuff that they're, if you have a forensics guy in there, then whatever the hell's on my computer is pretty, it's pretty bad. Right? It's not something I could talk about without getting flagged by every, you can kind of come up with an idea of what it is, it's murder and it's, it's like stuff like that, right. Or worse or worse, think of something worse than that. So, anyway, so that's, what's on people's computers. It's just bad, man. Anyway, so in case what it'll do, one of the things it does is it'll take a hard drive that people, somebody has tried to clean, that they try to delete stuff and in case can see all the stuff they. The stuff's still on the computer after you delete it, by the way, even if you put it in the trash and then emptied the trash, it's still on the computer. And in case looks at the ones and zeros that were originally written on the disc, lifts those up, and then it can reconstruct those into files. Like if they had a image or a video or whatever, it can reconstruct those and give that to whoever's doing the investigation that they'll use for a court case or whatever. FTC, I believe does the same thing. It's like an open source ver version of in case if I'm not mistaken. And then there's some other tools here, but yeah, this just gives you an idea of how you can pinpoint different keywords that are in any kind of genre and any kind of anything that you're trying to do. So now that we know how to do keywords, the next thing we wanna do is put that in our resume. Now you don't wanna just put this in any resume. You wanna put it in a, at ATS style resume. Let me show you what I mean by that. So I have an example of that. In my book here. And I'm just gonna show you that real quick. And if you want an example of this, there's a couple things you can do. You can go and Google how to find a ATS style, resume those exact words. Or you can go to my site combo courses.com and look for a cyber security marketing course. And that has a free downloadable of what I'm about to show you. And it has the actual format that you can download it and use it for your own resume. ATS style resumes are so important because what the, and see I'm using word are here. I'm telling you how to do this. I'm walking you through it in this book. That's all the stuff that's gonna be in this book. That's coming here real soon. So I'm looking for the actual resumes. It's I got a lot of stuff in here. It's breaking down everything, every aspect of what I'm telling you right now, but in greater detail I'm I skipped over a whole bunch of stuff that you should, that you should know. . So I'm trying to find my ATS style resume in here. Man, where is it? Okay. ATS. It should be here. Okay. ATS style, resume all the sections. I'll give you an example of what that looks like. And then we go to there, here, here it is right here. All right. So here is example of a ATS style. Is this it? No, that's not it. Sorry about that. Yeah, this is it. This is it. See how simple this is. This is an ATS style resume. It's very, very simple. It's it's not got a lot of stuff in it, so it'll have the person's name. It doesn't have any kind that's and fancy. It's nothing fancy going on with this. Now you can make a fancy ATS style resume, you know, and I'm, I'm not wasting my time with that for this. I'm just telling you exactly how to do this. So you'll start off with the, the, a breakdown of what's going on a person, and then you'll put the your contact information and you'll put A breakdown of who you are. Another thing that I do in the summary by the way is I'll put, I'll put Hey, I wanna RO work remotely, cuz that's an opportunity for you to say that another thing you can do is say, Hey, I have a security clearance. Like you wanna put the security clearance right up top, if you can. So you can put that in the summary. So you right here, you just put summary, this is ATS style resume. This is it right here. You put the name, you put the contact information. You put a summary, you put education up top, you know, in this style right here. See how this is. And the reason why the format of this matters is because when your resume is when your resume is uploaded onto these sites, when if you put it on, indeed, that's another thing you need to do. You need to put it on. Indeed. You need to put it on monster dice. LinkedIn, you need to put it on as many sites. If you don't have a job, your job should be to put this on as many resume as sites as possible. That's what you should be doing. Okay. Another thing I show you how to do is how to protect yourself because another one thing that's happening right now, lately is these freaking scammers are scamming people to get their social security number so they can do identity theft and all that kind of stuff. So I've never felt fallen prey to that because the way that I do my resume, I don't put my real name. This is crazy. This is CRA I don't see anybody doing what I'm saying. I do not put my real name on the sites. Not I don't do that until I'm like on a screen, I'm talking to a screener, like maybe the second interview. Then they know my real name. They do not know my real name till I'm on the second interview a lot of times. Right? Cause I'm screening them as they're screening me. Like I'm screening the organization. As I do not put my real phone number. I do not put my real, I might even put a different email address, like a fake throwaway email. Like you can even do that. But I put a different name, an alias. I put an alias, something similar to my name, but it's not my actual name. I do not put my real phone number. I'll put like a, I'll use a Google voice. I tell you how to do all of this in this book. All right. All this is coming. Soon as I finish this, I've gotta do the first draft of this book. You can see all kind of misspellings and stuff in here. I'll write the book really fast and then I'll go through it and then edit and stuff like that. So I just wanted to tell you guys, like, I just wanna inform you, this is how I do it. And it's been working for me. I've not been without a job. I mean, we've, you know, we've had several different collapses in the economy where we have recessions. We've had like, that stuff does not affect me and I'm not trying. I mean, it affects me in like, okay, if I'm going to Walmart and the prices are higher or the gas is hot, jacked up or something. Yeah. That, that affects me obviously. But I'm talking about with a job. I'm good. Like I'm always employed. And the reason why is because I'm in cyber security, I'm one of the I'm in one of the fastest growing industries in the world. And not only that, I stay ahead of the game by marketing myself. So I'm people are constantly contacting me about jobs and I'm not sent telling you this to two, my own horn. I'm telling you, you can do this two. You can do all the stuff I'm doing, too. Everything I just told you is what I do. Everything I just told you is what I do. And that's how I'm able to stay ahead of the game. I put, I, I have a dope resume with all the keywords for the industry I'm searching for. It's all over my it's all over my resume. It's in the, it's in the it's in the, the summary it's in the, it's in the, the actions that I've done for an organization and my work experience. It's in my skills. It's all throughout my resume. And then I put that out there. And here's another thing. If you are in it, If you are on a help desk, if you are laying cable for people, if you are in the hospital, if you are wherever you happen to be, if you've touched a computer before, okay, you have to put all the security stuff that you've done for that industry, you have to put all the stuff you've done, cuz that's really important. A lot of times what people will do, whether what they won't do is they won't put the cybersecurity actions that they have taken and, and that's a, that's really bad. So that's another huge thing that you have to do. Okay. So let me keep going here. I'm gonna answer a few questions. I'm not gonna stay on here too long, but if you have any questions, feel free. If you happen to be watching me feel free to ask me any questions that you have about getting in this industry about cybersecurity, about risk management framework, about security compliance, anything at all. I've been in this career field for a long time. I'm gonna tell you from the perspective of somebody who's been doing this for some time real world Examples, real world practical things that you can use to, to upload, to upgrade yourself. All right. I'm answering some questions on YouTube as I do once a week. And if you didn't know, I'm all on TikTok, I'm, I'm answering questions there. Very one-on-one type questions. I'm answering questions on my email. I'm doing work for people like helping people with their resumes. I do all that kind of stuff. If you're interested in that kind of thing, where I'm going way deeper and doing like a one on one, like just me and you corresponding, not like this kind of stuff you can text me at, you can email me at combo courses@contactcombocourses.com. Or you can go to con courses.com and find my contact information there. I'm out there. Let me answer a couple of these questions. Somebody said, watch one of my videos and said, this is a gold mine. Wow. I appreciate that. Great compliment. This is when I was doing a video about help desk to cyber security and trying to helping people, helping people with that. Somebody said, how can I purchase this book? Some old book that I wrote? If you didn't know, I've got some books out there on audio, on audible. So if you're interested in getting into, if you like, like listening to books, I listen to books quite a bit. And I just wanna tell you guys, I have a book out there. If you go to audible.com, if you happen to have it, if you don't have audible, actually you're in luck because they'll give you this. They'll give you like a free trial. But you can go just type in R MF. ISSO. And these are two of the books that I have right now over over four hours worth of content to listen to, if you're interested in this. This will also help you with cap a little. If you happen to be doing a certification in cap, it'll help you a little bit in security plus, but it's like a small portion of security plus. So it's not gonna help you that much, but cap, this helps you probably, this is 60% or more of the stuff that's on the test. It's not cater to you taking the test, but it will help you to understand like the practical implementation of risk management framework. So there's that if you're interested in listening to this, it's on audible, I'm also on Amazon, just type in, you can just type in Bruce Brown or you can type in NIST 800 control family. My book is out there as well. And then you can also order it directly from me on combo courses.com. This is the site right here, tons of free stuff here, by the way. I, people are really upset about selling products and things, but a lot of the stuff that I have on here is actually free. And if you go to YouTube, if you follow me on YouTube, it's just so much free stuff on there. Like a lot of the stuff I say on here, or that's on my website or that's in my books, it's there. You just gotta dig for it. You know, if you want a little bit deeper dive, then that's when you going to get the book or get the course itself. That's, you know, when you're serious about this, that's when you wanna start getting the book and, and getting in deeper in this and asking direct questions. Okay. Somebody ask me if you want to be an ISSO, what certification do you need? That is a great question. Let me break this down to you. So if so, work is normally for the federal government and let me just put you on some game right here. So if so, work. The federal government goes by something called 81 40. So 81 40 D O D 81 40 is a breakdown of what every contractor and government employee should have as far as certifications in order to get in this field faster. So what I'm doing right now is I'm actually showing you what 81 40 looks like, see this, what I'm like. And for those of you who are listening to me, I'll explain what you're seeing, what I'm, what we're seeing. So this is 81 40 and essentially it's approved baseline of certifications. It changes from time to time lately, every about six months that've been updating this. So there's a couple things here that I'm, that I'm not seeing. That's been either removed or added. In fact, let me see if I can go to the newer version of this. If you go to, oh, what is it? Dissa dot mill. Yeah. And you might see me. Okay, DISA dot mill. I think it is DISA dot mill, 81 40. They have the, one of the most up to date versions of this thing. I'm trying to look for 80. They used to call it eighty five seventy and it's a, it's all the approved certifications. So if you go by this list right here that we're looking at, this is a list of approved baseline certifications. Let me explain what this what's going on with this thing. If you can see this, if you can, let me make it a little bit bigger here, but I'll also explain it. So they have, they have this broken up by technical and management architects, analysts, and auditors. Okay. Those are the main categories. And let me just explain each one. So the the I a T means information assurance technical that just that's basic technical troubleshooting. It might be designing or configuring systems. These certifications are needed. If you're a level one, a level one is basically like a help desk person. This is a person who has a, basically a one on one relationship to one customer at a time. They, somebody calls in and says, Hey, I have a trouble ticket. That means like something broken and they're, they're not connected to the internet. And they happen to be on the fourth floor. And then you, or you call 'em on online. Maybe they're, you know, you're a remote worker or whatever, but this is a first line of defense for people fixing computers, help desk customer service, field technician, one, that kind of thing. They will. They're expecting you to have an, a plus certification as listed here, a CCNA security, which is, that's a very hard security. That's a very hard certifi. I don't know why they put this here. I didn't make this. So keep that in mind. network plus C and D, which I don't even know what that is. S S C P one of those things. That's I a T level one. That's. And remember I a T level one is a help desk person. Now, if you happen to be upper level, like let's say, not only do you do help desk stuff, but you also do some networking stuff like you might have, you might be responsible for fixing the network on a whole floor. This is like network engineers. This is like this is like people fixing a whole land, a local area network people who's responsible for a local area, a virtual local area network. So they're, they're kind of having to look at server issues as well as switching and networking problems locally, as well as like one on one customer support. So what certifications does an I a T level two and information assurance, technical level two need so that's a CCNA security plus CSA plus a CI. So all of these things security plus is a big one. These, these are the ones that they're looking for. Okay. When we're gonna get to the information system security officer in a second here, I'm just building up here so you can kind of understand what's going on now. I a T level three. So this is an enclave. Normally these guys are not only doing like one on they're kind of beyond the one on one type type of thing. Cuz their skill sets are so versatile that they're needed to do bigger things they're needed to do more like working with the architecture team, working directly with servers they're they're handling stuff. That's like. Local area network to local area network. So these guys have professional level search. They're very, very in the weeds, but also high enough level to where they have to know, see the bigger picture of what's going on with the network. They're doing enclave to enclave. That's like one lo local area network to another local area network and possibly WANs, which is a wide area network. And that's way more complex. So this is CCN P security. That's a very difficult certification, a professional level cer Cisco certification, a CSP, which is also a professional level cert that's no joke, a C S S P high level cyber security certification. And then some others G C I H, which is incident handling. And I, they just added this one CCS P, which is, I think, a cloud, a cloud certification from ISE two squared. I think, I believe that's what it is. Okay. Now let's get into I ISO and the ISO, if you didn't know, is a information system security. So that is kind of what I do. And I can kind of give you in an, in a nutshell, like what an ISO, an information security person does. So this job is typically your day looks like this. You're doing a lot of meetings. That's what your day looks like. It's a lot of meetings because you're, you're talking to other people within your organization, stakeholders, you're, you don't have to be a, a subject matter expert in say, firewalls, you don't have to be a subject matter expert in say networking or routers and stuff, but you do have to know enough to be dangerous. Like you do have to know enough to communicate what is happening with the organization. Your responsibility, as an information system, security officer is to manage the risk is to help the organization to manage the risks of the organization so they can maintain their security posture. Now you might be like, Bruce, what the hell are you? Are you talking about what are you? Let me spit it in layman's terms. That means. The, the organization has a certain level of security and they need to maintain that. And what does that mean? Like, think about it. Windows is constantly changing. It's constantly having upgrade to patches. There's constantly vulnerabilities coming out. There's constantly new education that needs to happen with the users. There's all these new threats that are happening from day to day. Everything's constantly changing in it. Well, that's where an information system security officer comes in because our job is to make sure that no matter what changes happen, the organization stays compliant and stays secure at a certain level. It's very challenging, especially if the organization has a lot of different technologies or also very large or organization with lots of stuff going on. So let's get back into what actual certifications does this information system security officer need. And I'm gonna show you here right now. So let's go back to the 81 40, so 81 40 up here is an is. So is considered a, a manager type role. Okay. It's a manager type role because you're dealing with, you're not just doing in the weed stuff, fixing computers. You're not just working with firewall. They might have you do some stuff like that. But your time is mostly spent coordinating with the organization to make sure that the organization is doing what they're supposed to do. I said organization. So you're, you're talking to C level execs. You're talking to upper level managers. You're talking to the, to the system, administrators, you're talking to users, you're talking to user reps. You might even be talking to the customer. So it's a lot of meeting. So if it's a manager type role, you gotta be able to communicate effectively. So a cap, a cap is a, a certified authorization professional. So what they do is exactly what I'm talking about. They make sure that the organization can maintain a certain level of authorization so that the, so that all of their documentation is good, so that all the security compliance security controls on their system is good. And let me break this down to you. So cap is a good one. Another one is CI while I'm topping here. Another one is a CI S S P CI SS P is a good one. Security plus is also a good one. Those three, I say, well, the top certifications that ISSO is typically typically has. Now this might evolve cap cap. I notice comes up a lot. CS a comes up from time to time. But look at these, what I'm, what I just did was I logged into ISE two squared.org, and I'm showing you the different certifications now cap. This is the certified authorization certification. So security assessment and authorization certification. So that's what it is. Certified authorization professional. That's what it's called. So this is one of the top. This specifically focuses on N 800. So N 800 is what the federal government and states and some other organization contracting organizations will use to ensure that you know what you're doing when you're talking about security. For an organization. So these, let me just read a couple more here, a, a couple other ones that an ISSO is considered they're good for an ISSO is let me just name a few that I've seen in the industry, a cap, a cap, a C SM, a C S S P a G S GS, C L L C. And a recent add-on. These two right here is C, C I S O and a H C I S P P, which is normally for hospitals. This is like HIPAA compliance and stuff that one's getting gaining ground right there. And this is listed on the dissa site. So this is that's a dot mill site. So that's, that's a big deal right there. So those are the main ones. I hope that answers your question. Let me keep going down questions. If you guys have any questions whatsoever, feel free to ask me, like, I've been doing this so long. Just off the top of my head. I, I know this stuff. I've just been doing it so long. You know, I don't know if that's necessarily a good thing, cuz it's pretty much. All I know , you know what I mean? So let me see let me answer a couple questions here. Somebody said how do you get, how do you get this? I'm looking for? Okay. What, what are you talking about here? A hundred. Oh, okay. I posted a job a job, a remote job where you're making a hundred K. And somebody says, how do you get this? I'm looking for this right now. I took a cyber security course, and now I'm studying for the interview questions. I would like to know how you do this boss. Okay. So I do this, like in the beginning of this, of this session, I, I talked about it and I can just give you a brief rundown. The first thing I do is I make sure all the keywords are on my resume. So every, every category of cyber security. Has a different set of keywords. For example, for example, at one time I was proficient at like two or three different parts of cyber security. I was, I was proficient. I'd done it before I'd had certifications, everything. Right. And those two were one, I was a seam engineer. That's a security information event manager, engineer. I could build them from scratch, set 'em up, create content for it. And it could monitor all your logs. You know, I did that for like three years straight, so I just, I just knew it. And then another thing was, I was an information. I still am information system security officer. I know that means I like, I know how to allow an organization to be compliant with certain security standards. And then another thing I was good at was cyber security analyst work. So those three things, those are three separate resumes. Okay. They have three separate keyword sets of keyword. . So what I did was I made a resume for each one of those. Each one has different certifications that are more relevant. I'd put those on top. Each one has different. Some of 'em really require a security clearance. Like if so, and a cyber security analyst usually requires a security clearance, cuz you're working in like a, a, so a security operation center, which is, has classified information and blah, blah, blah. But the, the scene really didn't need a security clearance. So I could even leave that off. And that was still good. My point is every single time you, whatever career path you're going in, it has this different set of, of keywords. And so what I do to make myself more marketable for this is I get keywords for each one of those work roles. Whatever it is. And to do that, you can, you can actually research it and figure it out. Right? And I'm not telling you to lie on your resume. I don't recommend that a lot of people like lie on your resume. Why aren't you, why aren't you lying on your resume? Me personally, I say don't no, do not lie on your resume. Do not put your picture on your resume. Like put your picture on your, not resume, but, but unless you're on in, I guess EU does that, but put your picture on your profile. Some people are like, nah, because I'm black. I don't want people to see that I can't get jobs. Nah. Why would you wanna work at an organization who doesn't want you? You need to put your picture there and if they don't wanna work with you, you shouldn't wanna work with them. That's how I feel about it. I don't wanna work somewhere. They don't want me. So I put my black face on my profile. Go look at it. It's up there right now. So that's number one, like put your don't lie on your resume. The reason why I don't lie on my resume is because I don't want to get in there. And then they, I, they think I'm some, I'm freaking gonna walk on water and I don't not for that particular technology. Not only that, but in the res in the actual interview, they will ask you these questions and then they will verify what you sold them. They will call your employer and ask, Hey, did Bruce do this X, Y, and Z. They'll do that. Especially as you go higher up in the echelons right now, if you wanna fudge some numbers of how long you work the place, and you know that it's not that big of a deal, but do not put certifications. You don't have do not. Don't lie about your degree. They're gonna check that stuff, right? Don't like, this is some obvious things you shouldn't, you shouldn't lie about on your resume, cuz they will ask you I'm going through an interview process right now. You better believe they're investigating me. They're looking at it. Every part of my life I'm having to put in there. Right? Because it, you can't, you can't just lie on your resume. So I don't recommend lying on your resume, put the real deal on your resume. But not only that put the key words for what you're doing on your resume. So that. when so that way, when you put the, when you upload this into LinkedIn into dice, into monster, and you need to put it on like 20 or 30 different job aggregators, okay. You need to put on 20 or 30 different ones. And that's why I say you shouldn't use your real phone number or your real, you should use an alias because you're gonna get so many calls from all kinds of people and you don't wanna get scammed anyway. So that's what you do. That's what I do. And that's how I've been able to get all these offers for remote 100 K type jobs or more. And, and that's how you do it. And I'm writing a book right now. If you're interested in this, if you're super deep into this, if you're very serious about this, I'm writing a book right now, it's gonna be out soon. And if you, if you, if you're interested in this, the very beginning of this podcast, I broke down exactly how, what I'm telling you. I broke down. I showed you my like, how, how I picked these key out, how I find them. All that kind of stuff. If you're interested in this, a book is coming, that's gonna break all this down in great detail about how to get into cybersecurity in particular, but you can use these techniques for basically any, any job where you have to apply for a resume. Any job you need a resume that you could use it for that. So let me see, I got a couple other questions that says on TikTok it says I just got a free ISO two course. And let me see. Cert is free when I'm done. Have you heard of this course? Yes, this is, this is great. Like thank you so much for asking that question. So I've been, I've been telling everybody about this new certification that's coming out, like what's happening right now. If you guys didn't know, is that the government's hurting for cyber security positions, there's something. 700,000 careers that are empty slots. Like we in desperate need of, of people to get in here. So what's happened is there's been this huge push from nonprofit organizations, corporations, and government entities to actually get people into this field as entry level. And so ISD two squared has this new certification. That's an entry level cybersecurity certification. And right now it's free. It will not be free forever because is ISD two squared. I don't know if you knew this, but they don't, they don't mess. They don't mess around. They do not. These guys have the top cyber security certification in the world, arguably in the world's called C I S S P. I have this certification, this certification changed my life. It's a high level cyber security certification that talks about nothing and everything. But it is so good at marketing me. Like, all I gotta do is put that on my resume. I could probably just have a blank page with just C I S S P on there, and I'd probably get hired. That's how powerful this resume. And it's the reason why this certification's so powerful is because they've done a great job of marketing it. That being said, I'm saying this to tell you that they're now given this damn thing, this right here for free, this is an entry level for you to get into cyber security. This right, this right here, I'm showing you it's called certified in cyber security CC. Now, from here, you can build into other sec into other this is an entry level, but you can take this and build up to a higher level certification. That's why this is so powerful. And these guys, this is not some fly by night, organiz. This is one of the top, if not the top and best cyber security certification organizations in the world on planet earth currently right now. So this is a great path. If you are actually looking into this, this is a great path for you to do, do this, doing it for free. They're giving it away for free. This will not be free for long. I guarantee you because they're trying to compete directly with comp Tia security plus, that's what they're trying to do. And eventually this right here, this certification, I mark my words. This certification right here, this certified in cyber security will be on this sheet right here. This is 81 40. This is 81 40. Also known as 85, 70 approved baseline for certifications. They will have CC on this. I bet you it'll be like right here. They'll put it right here alongside a plus certification, alongside C and D and all these other ones. And once this goes on here, It'll be way more marketable than it is right now. Right now it's a free certifi it's it's brand new people don't really know about it. People are kind of figuring it out. Like they're kind trying to compete with this and the Google support it and the security plus, and those kind of certifications that are entry level because the government is making this huge push to get more and more people in this field. This is a really, really exciting time to get into cyber security. This is, this is a rare opportunity where they're trying to open the doors, but you, this is not a field where you can just come in off the street and know nothing. You have to do some work. Like even if you come in and know nothing, you have to do work to understand the basics of information technology. Right. That's all. I'm, that's what I'm saying. So this is a great opportunity. Let me see, I got a couple other questions that says, how does a civilian get a security clearance? Okay. So there's a couple ways. Just, just so you know, I've been doing this for some time and I've had security, all kinds of security clearances from public trust, all the way up to top secret type certification security clearances. Another one misconception that you, that I wanna dispel is that you don't need a security clearance to get into cyber security. They're two separate things. Okay. A security clearance is just verifying that you are, are who you say you are. They're VE they're doing a, a, anywhere from a basic security background check to make sure you're not that you are trustworthy to work in their organization with secret information. They're making sure you're not linked to any kind of terrorist organization or insurgents or militia organizations. You'd be surprised. You'd be surprised how many people are associated with it. because every time they ask me, I'm like, ha ha. That's ridiculous. I'm not, but no, there's really a lot of people who are associated with these organizations that wanna take down the government that don't feel like they have some kind of issues with the United States government, or they're tied to another government. They actually happen to be working for another government. And they're trying to get in and infiltrate. You'd be surprised how many people this, this applies to anyway. So background check is just trying to see if you are who you say you are. If you don't have, make sure you don't have any crazy credit issues, that's gonna affect you to work on their job, making sure you're not like a, your a super predators killing people or something like that. Yeah, they're trying to just do that. That's separate from cyber security. Okay. Cyber, a lot of cyber security jobs need a security background check. Because the nature of the information that you're gonna be having access to, and they wanna make sure that they can trust you to protect their systems, but they not, every, not every job requires a security background check. Okay. Cyber security is their separate things. You can be a janitor and need a security clearance. Okay. So the question was, how does a civilian get a security clearance? There's a couple ways. Number one, work for an organization who will get you a security clearance. If you happen to work in the DMV area that's DC, Virginia, Maryland area. There's so many jobs, not just cyber security you might have be a groundskeeper and mowing grass and have to have a clearance, some dead serious. You might be painting the inside walls of a, a skiff that need you need a clear. You might, there's all kind of clerical jobs secretarial jobs name something, janitors anything like can get you. So you would, one way that you could get in is if you had a job, if you got a job at a place that required a clearance, a lot of times they will pay for you to get a clearance. They will pay for you to get the clearance because it costs money to get a clearance. Another thing is you can there's sites. Somebody contacted me the other day. They were trying to get me a clearance. Like they didn't, they didn't know. I guess they would contact me and saying, Hey, we can get you a clearance and stuff. So there's, there's private organizations that can get you a clearance, but you're gonna have to pay for it. It's not cheap. Just to give you an example, from what I heard a security, a secret background check is like $5,000. And then a Ts is like $10,000. That's what an organization has to pay to get you a clearance. And then a public trust. I don't know, public trust is like here. Secret clearance is here and then above that is top secret and all other white house, all this other stuff. So, yeah, so you can, you can get into a position, a job that requires it and then they'll let the organization pay for it. That's probably the best way. The other way is to get it privately and pay for it yourself. That's another way. But then it has to remain active. I don't know how all that stuff works, but so those are the two ways that I personally know about how to do it. So, and I could be wrong. Anybody else you guys know of another way to do it, please chime in and, and, and inform me what's going on. Let me see here. Somebody ask hope that ask your, answer your question, by the way. Somebody ask so I just signed up and I have to take an exam. Yes. So, so I believe that that, that I C two squared, they have a, they have a course. All right. And I believe the course is free. If it's still free, they have a course that you can take that breaks down. What's gonna be on the test. And then you, you, you go to that course, you study for it. If it's still free, hopefully still free it. They were saying it was a value of one ninety nine, a hundred ninety $9. But even if it costs $199, it's worth you investing in yourself. It's, it's, it's worth the risk. It's worth the risk. Anyway, if it's still free, cuz just last week, it was free. You take the, you go through the course that I believe is on course. Sarah it's either on course, Sarah or it's on their website. Okay. Sign up for their website. They'll give you a breakdown of everything you need to do. And then from there you will take the test. Like once you study for it, you take the test. Somebody. no they're paying for it once you finish the course. There you go. Okay. Thank you for that. ODI says no, they're gonna pay for it once you take the course and there's only 1 million openings. Okay. There you go. Okay. I stand corrected. So let me, let me correct myself. So what he's saying is once you, it was free for a while. It was, it has actually free like a, like a week ago or something I'm telling you. So now you're gonna have to take the, the, the course, and then once you take the course, I think was 1 99, then you you'll take the test, pass it, get your certification. So let me see. You have to take a test. Yes. It's this is, yeah. There's there's hurdles. You have to take the test to get the certification, but it's worth your inve. If you are serious about this, it's worth your time. Okay. Let me see. I got a couple other questions. Somebody said I barely see a hundred percent remote opportunities. Most people keep wanting people to be on site. That's true. And bro branding, I, I would add to that and say a lot of the security clearance, a lot of the cyber security jobs that require security clearances do require you to be on site at least like a hybrid on site. But I would say that there's a lot more remote jobs opportunities than than there were before. COVID cuz it was, it used to be really hard to find them. Now they're everywhere and I could show you how to find them real quick. I'll show you let see if I could show you on LinkedIn, if you guys didn't know, I have a LinkedIn page you can search me out on Bruce Brown for the win. Let me show you on. If you guys happen to be on LinkedIn here, here I am right here. If you type in Bruce, go to LinkedIn and type in Bruce. CIS S P RMF or something like that. You'll find me there. It is right there. There I am right there. And so join me. I'll definitely add you. I've got a, a lot of people wanting to add and I'm, I'm always open to, to add people or you can talk to me online, all that kind of stuff, but okay. Let me show you how to find remote jobs. Okay. Let me see. Let's let's say you were looking for a cyber security analyst job, right? Cyber I'm just, just randomly pick one off out the air. So now check this out. First. You'll go jobs. And the reason why you wanna check pick jobs is because there it's gonna show you everything. It's gonna show you companies, posts, schools, groups, people, all that you want jobs. Okay. So search jobs, then post a date. You don't want any time, cuz this goes back like a year or something. You want something within the, at least the last month. all right, so let's look for last month and then this one's up to you, they got internships, entry level, associate senior manager, whatever. Right? You ch choose that. But if you don't really care, leave that blank and then remote, let's go to remote job. So here it is right here. You're gonna onsite versus remote. So you've got hybrid, you got remote and you got onsite. You just click on site. Now you notice it went from 17 K jobs down to three K jobs. I'm on LinkedIn, by the way. So I just went to jobs stuff in the past month. And then I went to remote on site. This is a new feature, by the way, they didn't have, it needs to have all of this stuff. And now they have it on dice. They have it on monster. They have it on almost every site because remote jobs are so prevalent now after COVID. So here you go. Here are some remote jobs for cyber security analysts, which I just typed in. And that's how you find remote jobs right there in five minutes. I just showed you how to do it. and you can do this with every site, with monster, with LinkedIn, with with da, with, with dice, all of these show you how to do remote jobs. And if you go to dice, let me see if this one's ready. So here's, here's my profile on dice.com. I'm about to turn this thing off, man. I'm getting so many contacts with these guys, so there's a way to search for remote jobs. Let me just show you here. Let me I'll do the same thing. Cyber security. I'll just type in cyber security. I didn't put a location in I'll hit search and check this out. It comes out with this page right here, taking a little bit of time and then look right at the top. Remote only if I hit remote only you notice it went down from 4,800 jobs to 600 jobs. So, yeah, there are less Brandon to, I, I could piggyback on what you're saying. There are quite a bit less, but there are jobs there. I mean, look at this there's 600 jobs here. I mean, granted, I didn't search for, I said any dates, so that's, that's probably, what's adding to that. Let's do the last seven days. It's gonna be quite a few less. Oh, still 126 jobs. Look at that. These are all remote jobs. And all I did was type in cybersecurity, look, 100% remote cyber security analyst, all of these are a hundred percent remote. Now you gotta double check. Cuz one of the things I noticed about these jobs is sometimes they'll say they're a hundred percent remote, but then when you do a, an interview with 'em, they're like, well, well it's a hundred percent, but we want you to come into the, I was like, Is this a hundred percent or not? yeah. You gotta do an interview with 'em to make sure and ask them, is this a hundred percent remote? You know what I mean? Like you usually straighten that out with the, with the actual screener, once you, once you talk to them, ask them, and then sometimes it's, it is remote, but it's like 50% travel or something. Like there's always some kind of catch sometimes with the judge. You just gotta make sure you, you weed out those gotchas with the remote jobs. I just went through this. That's why I know a lot about it. You know, , I've been, do working remotely for the past seven years now. Like I've been working remotely for a long time. Crazy. It's crazy to me. Like I've been working. Yes. Seth's been seven years. I started in 2014 working remotely and I've been working remotely ever since. And I will never go back. I will never go back. all right. And that being said, if you guys are interested, I have a course on how to work remotely. It's on combo courses. Go check it out on combo courses dot com, just work, find the remote jobs course. And then I have it out there and I I'm, I might even write a book about that one and break it down. So it's like a 20, $20 book or something like that. I might, I might do that cuz I I've gotten pretty good at getting remote jobs and winning those remote job positions. Okay. Let me see link to the course. I'm assuming you're talking about the C the CC let me see if you're interested in this. We were just talking about this, this course right here, which is an entry level ISC two squared course, which they're given. I believe you have to pay for their training and then thinks 200 bucks for the training. Now it was free like last week, unfortunately, no longer free. And then after. That you take the, the test and I think they give you the test for free. If I'm not mistaken, correct me if I'm wrong, TikTok somebody on TikTok, correct me on that one. I appreciate that. But yeah, here's the link right here. It's ISC two dot org slash configuration certifications and four slash CC. Or you can go to Google and just type in ISE two square ISE, two space CC, and you'll find it. Let me see if I can give you the link in the chat. I, I don't have access to the chat right now. Yeah, and I always walk me through all this other stuff I gotta do to get link access to that. All right, guys, that's it for this one. Thank you for watching. I really appreciate all the questions. Thanks a lot for, for all your kind words and stuff and all the donations. Appreciate that. Thank you so much. I've got a couple other questions on, on TikTok. Let me see if I can answer those real quick. Yes, it's still a self-paced exam. Okay. We're still talking about the I C two CC. So I can get an entry level job with a CI
So there's a lot of talk about the Artemis Project at the moment, you know, NASA sending man back to the moon. Exciting stuff! But tell us Commander LP, what IS Artemis, and what's the grand plan?
Commander LP and Simon the apprentice discuss their amazing experience at this year's Bluedot Festival. Plus, the return of the Queen of WANS!
WANS: Stars, Nasa Webb Telescope latest and a look forward to Bluedot Festival by We Are Not Scientists
In today's episode Mission Control is about to burst as Commander LP hits peak excitement mode as the first images from the James Webb Telescope are released by NASA. To see the images visit https://www.nasa.gov/webbfirstimages
“It's time to cut out the cancer!” What happens when one of the most active horror directors working today pays homage to campy slasher films? Your get James Wans MALIGNANT! One of the most uniquely campy films of recent memory the fellas highlight the accomplishments of the film while also taking a close look why Malignant has polarized many audiences. They also discuss Wans filmography, his inspirations behind the movie, and what exactly they love (and don't love) about the flick. Thank you for checking back in, and enjoy your stay at The Grand Cinema Hotel! --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app
Howdy Folks! Welcome to the latest episode of The Pubcast. The group get together to chat about a plethora of topics. Stuff like Obi Wan, Strange new Worlds, Stranger Things and Neil Gaiman's Sandman. Thanks for checking us out and we hope you enjoy listening along.
Join us on Zoom next Saturday for a LIVE recording of THE WONDER! The link is https://us02web.zoom.us/j/85648189246?pwd=a21Wb1RmMXJ3VVFFWG5mZit5cHhLZz09 Remember, we welcome comments, questions and suggested topics at thewonderpodcastQs@gmail.com S3E17 TRANSCRIPT: ----more---- Yucca: Welcome back to the Wonder: Science-Based Paganism. I'm one of your hosts, Yucca. Mark: And I'm the other one. Yucca: And today we're talking do it yourself, ritual tools. So we've got a pretty big list of fun kinds of things that you can be doing. But before we do that, we actually want to get into the why maybe, why would you want to be making these tools yourself rather than just buying the really gorgeous one that you see? Don Amazon or wherever it is. Mark: Right. The the, the first reason is obviously expense. You know, there are some very beautiful, a cult ritual tools that are made out there and they they cost. If you have that money, then it's fine to spend on those. But beyond that, there's the environmental concern about the. Putting one more thing. That's eventually gonna find its way into a landfill into the, the material stream and all of the associated packaging and shipping and all of those kinds of things. So those are, those are things to be cognizant of, but also there is that when you make something for yourself, you feel more deeply connected to. When we talk about sentimental value, that's what we mean. We mean that something has a personal meaning to us. That's associated with the story, you know, the story of how you made it or where the materials came from or what was happening at that time in your life. All of those kinds of stories that sort of cling to the object and help you to to have a deeper emotional relationship. All of which is. rich material for doing rituals. Yucca: Right. Yeah. And they, and these are things that can. They can build on each other. Right? So you have the ritual in which you're making the tool and then the first ritual that you use it in. And then the next one, then the next one, and it starts to have this, this long relationship that you have with it that you have that association every time you pick that up, that, Ooh, it brings you back to those right. Mark: Right. Yeah. So. I'm a big believer in this. And maybe some of that is because many times in my life I've been really broke. But. It's also, I mean, I've, I've said this quote before, but it really stuck with me, which is probably why I've said it a bunch a morning. Lori Zell once said to me, you know, if you can't do it with a stick, you picked up on the way to the circle. You can't do it at all. And that may be a little broad, but I do think that rituals that are effective are a function of skills. Just tools, you know, the arrangement of a bunch of physical objects doesn't make for any emotionally powerful ritual. And so the tools that we make, if they're meaningful to us, they can be more impactful and can help us to enact a more, a more compelling, powerful ritual. Yucca: Right. And we should note, you said skills, right? And skills are things that we build through practice. You don't start skilled at anything. Right. Humans start with a few instincts, you know, we can cry and we curl when we fall and we know to, to nurse and, blink, if something's coming our way, that's about it though. Mark: Yeah. Yucca: The everything else, walking, talking, all, everything. Those are all skills and ritual is skill too. Mark: Yes. Yucca: And, and building your tools, creating, crafting those that's a skill as well. And you don't have to be some incredible artist or craftsman for that for you to still be able to build that relationship into your, your items that you're using. Mark: Right. Right. And so. We've talked about the various kind of core ritual skills in podcasts before skills like drumming And movement and public speaking and singing those kinds of things that can be powerful. Movers of emotion in a ritual. Right. That's not really what the focus of this episode is. This is more about, you know, what about the material stuff that you use when you, when you lay out a focus or alter in order to do a particular ritual? Well, what's there and. What does it say to you to see those items there? And one of the things that can help those items to speak more loudly is for them to have a real association with you. So making it yourself can be a really cool thing to do. And in some cases, making it yourself can be as little as peeling the bark off a stick, you know, That's it. That's all that there is, you've got a stick and you like the shape of the stick and you, peel the bark off it and now you've got a want, it doesn't have to be, you don't have to put silver inlay in it. It's, it's just a stick. You like. Yucca: And you, and it can be something that everything is meaningful to you to write in, because if you buy that beautiful silver inlaid one, maybe it has some particular symbols on it, or it's got some runes or something in it that. It doesn't mean anything to you or it does. And it means something very different to you than it meant to the person who made it. And that doesn't quite have the right association, but that stick could be just the right curve for you. it could be the right species, or it just, just felt good in the moment. Right. Or you're designing when you're laying that out. Maybe you've got your cloth in and you can put it the way that is meaningful to you. And it's going to be completely. To someone else, but it gives you that, that freedom that you wouldn't necessarily have, if it wasn't you crafting and creating it yourself. Mark: Right. Right. And I do want to put in a shout out for artists. Yucca: Absolutely. Mark: You know, it, it, if you want to contract with somebody that, you know, has a lave and turns beautiful WANs and have them do a bespoke wand, that's Exactly. you know, the way that you want it to be out of the materials that you want it to be, you know, more power to you. We, we need to support our local artists. I'm I'm all in favor. But you don't have to have a sort of professionally crafted wand in order to have a wand that will feel good And work in the context of your ritual practice. Yucca: And you don't really need a wand either. Right. But if you do want one then awesome. Right. So, so don't think that anything we're saying here says you have to do this. You don't have to have a wand. You don't have to have, you don't have to anything. Yeah. Mark: That's that's really kind of core to what our whole practice is about this. It's not science-based paganism is not authoritarian. You know, we, we think of religions very often in that context because the big mainstream religions are authoritarian, but that's not our orientation to things. Our, our spirituality is creative and expressive and so. You know, doing something creative or contracting for something creative that expresses something that you feel that's all to the good now. If you want something that feels good in the hand and you can kind of point, you know, directing energy, it feels like or, you know, March around in a circle, cutting A line between what's inside the circle and what's outside the circle to define a safe space. Then something like a wand can be a really nice thing to do. I have several of them that I use for different purposes. I have one that is just a stick from red, from a Redwood, and it's a very nice stick. I've had it for a long time. And there it is. It's a stick. I have one that is a piece of dried kelp from the. And I mean, you can still kind of sea salt crystals on it and stuff. You know, when I'm, when I'm wanting to invoke that sort of primal power, like the ocean has that, you know, the, just the sheer force and, and power and history and life bringing capability and all those things that we associate with the ocean and with water, then that's generally what I use it for. I have one that's a human feet. That I, that I've used as a wand in in Hallows circles ceremonies. And I have another, that is an Oak branch that has a little silver dragon kind of twisted on to it that I, I put onto it. But it's a very special Oak branch to me because. It was part of a larger piece that I found in a state park and I took it off of that piece and I've seen the rest of it on hikes many times. So it feels like it's connected to the land here. And so you. see me telling these stories about these, these items. You can make items that have stories like that too. So, Something to consider. Yucca: Right. And just with wherever you are. So ones, aren't something that I do a lot, but I do have one that's actually made from a choice skeleton. So in the Southwest there's, we've got lots of different kinds of cactuses. And one is this one that they often grow these straight long stocks. And then when they die, it leaves behind this hollow wooden tube with holes in them. And they're just, they're just. Beautiful. And we've done all kinds of things with them. One of my favorite things is actually to fill them with a sewage and give it to the birds. So they have a fun time with that. But one of these ones I took and it was a walk that I had done. Well with my, one of the first walks that my daughter was able to do, and she was big enough to do one of those and we brought it back and we boiled it. And when you oil it up, it just becomes just so beautiful. And there are a couple of little spines left to take the mow those off. And so now that has that all of that association of the. The walk and the land and the birds, and then the oil, which was the tallow from one of our cows. And like, that whole thing there. So it's just, it's nice to hear you talk about, redwoods and things that, your experience with that, because we're doing the same thing in very different places. Mark: Right, right. Yeah. That's a wonderful story. And, and that's a great example of, you know, Part of what we always talk about here is paying attention and getting better connected with what's happening in nature. What are the, what are the, the natural artifacts that are sort of characteristic of where you live? You know, what are the trees? What are the. The plants you know, if you're in a coastal area, are there seashells that are particularly characteristic? I have an abalone shell that I've used for many years for offerings, pouring libations, burning, incense, all those kinds of things. And that brings me to the next kind of thing you can make, which is a concavity that will hold a liquid. Yucca: So a cup or a vessel Mark: A cup or a vessel of some kind. whether it's a dish or a chalice. Generally speaking, it's, it's very common for people to put something liquid on there. Ritual focus. I mean, it might be a glass of wine. It might be a bowl of water. It might be a it might be a potion that you make, right. That you stir up with herbs and essential oils and, you know, whatever, whatever else needs to go in there in order to. Put all the associations together, you can do that. In, you can do that in a large sense with a cauldron which is another thing that many of us want to have it, unless you're a really good black Smith. I recommend purchasing Yucca: That particular one. Mark: that, that particular thing rather than making it, but you can also do it in a bowl or in a chalice one freaking. Activity in many pagan rituals is a period of eating and drinking usually after the main working. And it's kind of a, it happens during the time of gratitude when you're, you're enjoying the fruits of the ritual and of being alive. You're sharing, breaking bread with the other people that you're working with, if you are. So there's a very community oriented feeling to that. So having some sort of cup or chalice or wine glass or whatever it is is another thing to have as a ritual tool. I have a chalice from a local Potter that I've used for many years. It has a motif of grape leaves on it for the, Yucca: What's your region is. Mark: Yes, very famous for so, but you can make your own you know, you can, you can mold it And fire it, or you can Yucca: And if you can dig the clay up too, if you happen to be somewhere. Yeah. We have several bowls that we've made from the clay that we dug up and then fired it. So we pit fired it on our own land as well. Mark: very nice. Yucca: Yeah. And so that, but you can also make things now, this won't work for holding liquid, that you can still make clay. You can still dig up clay and just not fire it and use that maybe for, and we should talk about this one as well, for things to hold your fire or your incense or your candles or things like that. Mark: Right, right. And that is another thing that. very frequently goes on a ritual. Altar is some, some form of fire. There's something about adding fire to a ritual alter or focus. Kind of says this is alive. Now it has, it has this active dynamic chemical process happening. It's not just a static arrangement of objects. It's something that is dynamic And alive. Yucca: And what it does with the light, it just makes it look like it's all it's dancing and, and it can, it has that ability to just pull you back. At least to me, it feels like this pull back through time of the thousands and thousands of generations before us of just of us being. Gazing into fires, looking at fires, being around buyers, cooking, it's just, you know, back inside the caves and there's this really powerful, just instantly can transform the feeling. Mark: For sure. Yeah. I, I, I feel the same way. I mean, we've domesticated fire ever since homo erectus, which was well before modern humans and there's just, there's something very. And very we have we have a symbiotic relationship with fire in the same way that we have one with dogs in, in many ways. We would not be where we are now, if it wasn't for our domestication of fire. So bringing that into the ritual space becomes very powerful. And especially if you're doing your ritual after dark, which which I tend to do for personal rituals and Not so much for seasonal observations. I like to do those during the daytime more except for Hallows. And you'll the rest of them. I like to be during the day. Yucca: Yeah. You know, I share that and I wonder if it's like this for you for me the night, field's a little bit more intimate. Mark: Hm. Yucca: a little bit more, I feel a little bit more vulnerable, a little bit more open. And so when I'm doing any personal work the night, just, I just feel more. Present with it. Then during the day, there's so much happening there. So, you know, I'm still able to create the separate space in this, away from it to do a ritual, but there's just something about it at night or at the transitions to the Dawn. And dusk are also time to Mark: right. Yucca: I'll do a lot, depending on what the ritual is. Mark: Of course. Yeah. I think that's very well said. I, I feel the same way. There's something about, you know, standing naked in front of my altar with the candles burning and no other light in the room and it's just flickering and there's this sort of other worldly liminal space that gets created Bringing us reeling us back in from that long tangent. That means you need to have a candle. Right. You need to have something. And that can be as simple as a flat stone that you melt wax onto so that then you can stick the candle down onto it, or it can be as elaborate as a candelabra or something like that. But you can make it. It's entirely possible to make your own in, in a bunch of different ways, sometimes people will use like a shot glass and Mount that onto some sort of a base to use as a candle holder. You just have to be careful that you don't let the candle burn down too far, because if it's not Pyrex glass, then, then the glass can break and that's no good. Yucca: Yeah, which is something that going back to the fire, just as a note if you are having some sort of fire, like a fire circle, something to be aware of is to be careful about putting rocks into your fire or next to the fire. Mark: Oh, yes. Yucca: if there's moisture in them, depending on the type of rock they can actually burst and you don't want to get hit by that. So just as like a quick little aside there, that reminds me of it. Mark: That's a really good point. And my, my experience with doing fire circle festivals has been that yes, you have rocks in the fire, but you let them burn for 24 hours before you have people gather around them. Right? So that if any of that exploding that was going to happen has already happened and you definitely don't want to be pulling. Boulders out of a stream or from a, from a stream bank that's Yucca: Yeah, right. Cause it could seem like I see it being like a beautiful thing of putting the rock in and then you come and get it the next day. And it's more whatever, but like with all of these things, especially when fire is involved, whether it's on your, your altar inside your bedroom or whether it's out around a circle, you just, just to be. Have that part of your brain still on, that's thinking about, Hey, you know, what's, how is this all connected? Mark: well, and you can help your, you can help yourself to feel less anxious and focused on that danger question by having the proper equipment to put a fire out. Immediately to hand. So, you know, if, if there's a fire extinguisher in your house, bring it into your room. If that's where your, your altar is and that's where you're going to do your work. Just sit it against a wall somewhere. It doesn't have to do anything. Yucca: And you can get those little mini fire extinguishers. We actually have one in each room. I'm gonna, you all are listening, but I'm going to hold it up and show mark right here. That was right within here. Mark: There it is Yucca: is a little one and they have little not very expensive. I think this was like a $15 thing that, you know, you can hang them in your rooms and they're there. They last for a long time. A lot of these you can get refilled. And if they are starting to go down, then you can save and you can look up some safe things that you can do with them in terms of making dry ice and things like that, which could be very fun for a ritual to have your dry ice to work with. Mark: Yeah, I've used dry ice in rituals before. It's really fun because you, because I mean, you, you put it in sort of a a deep vessel Yucca: And Mark: and the fog just. Billows. up. Yucca: And the way it moves across the floor. Yeah. Mark: so cool. Yucca: So you could do some wonderful things with that. Going back to the candles though. Another thing that we've done now, this might not be the, a seasonally appropriate time, but we've done ice candle holders, so you can make ice. And what we've done before is we've taken the. Like the muffin liners that are the silicone ones so that you can get it off really easily. So you fill those with water, you put it on a little trace, that'll then fit in your freezer and then take the, the silver line liners that come around tea candles and put something in them and weight them down so that it is in your. Muffin liner that you filled with water, and then you put that in the freezer Mark: An ice freezes around. Yucca: freezes around it. Yeah. And then you bring that out, take the little silver liner out and you put the actual candle in there and then it it's beautiful. The way that the light dances in the ice. And you would, if you're using it on an altar, you're going to want to have a little plate underneath it because it does melt eventually. But if you're having it like in an outdoor they could see people using this for like solstice or for February holiday. Right. And just out with the snow or the cold. And you've got the little tiny light in that vast darkness. And that's a really fun one too. If you've got kiddos and you can freeze things into the ice as well. Mark: Ooh. Yucca: So that's a good one to do. Mark: nice. I like that idea a lot. That reminds me of another thing that you can do With candles, which doesn't require a candle holder. It just requires a paper bag, which is to make luminaria which can be really kind of dramatic looking. If you make a bunch of them like to line a passageway or a path up to a place where you're doing a ritual you know, you, you put the little team. In the bottom of the paper bag. Wait Yucca: SIM with sand at the bottom or dirt. Mark: Yes. Some sand or dirt to weight it down so that you know, a wind doesn't blow it over and then light the bag on fire, all those kinds of things. Yucca: And those are also known as farolitos. So you might've heard them called either way. Mark: ah, little lighthouses. Yucca: Yeah. The Illuminati say like, at least here that's like a Southern term and then in the north we call them Mark: Ah, Yucca: so Mark: I like little lighthouses. That's great. But I lead. Yucca: yeah. They're the little ones. They're beautiful. So. That's something that might for Christmas Eve, my city does, it's an old tradition and of course it's got all the, like the Christian associations of leading Marianne and all of that, but it's still, it's still really very magical to be in the cold dark. And hopefully that'll start back up over the next few years. It was kind of, it wasn't much of it the last few years. Mark: Well, I hope so. Yucca: Yeah. Mark: So you've got your fire container. Got your liquid container. You've got your pointer slash cutter. And we should talk a little bit about knives because a knife is something that is very commonly used in rituals. Almost always used symbolic. Just as sort of symbolically cutting the connections between two things or between a person and something in their life or something like that. But sometimes you also use the knife to inscribe a symbol in the wax of a candle, for example, or a. Maybe to do a craft project in ritual space where you're carving a piece of wood in the shape of something particularly meaningful. So having a ritual knife is a good thing. I actually have two of them, one of which is my sort of utilitarian knife that I think. Cut things with, and the other of which is a, an obsidian knife with an old candle that I made. And the, the point is sharp, but the edges are not. So it's definitely just a, just a symbolic knife. Yucca: I've seen someone I know had a, I think it was actually like a little letter Oprah. But it was a fancy, it was like an Excalibur, like repaid, but it's beautiful, you know, it's this little and it's not very sharp. So you could have, your knife could be an actual sharp knife, or it could be something that's just shaped like a knife or a sword or something just kind of in that, that vein, just depending on what your comfort level is with it and your purpose. Right. So I would imagine the two knives that you described, you'd use those in very different circumstances, right? Whether you choose the obsidian versus your, your utilitarian one, Mark: Right, right. Yeah. The utilitarian one doesn't even live on my focus. It it lives down with the supplies, cause it's just this sort of crappy old life that I use for this stuff. But the but the, the obsidian knife is on my focus and has been for 25 years or something. I don't, I don't remember when I made it. Maybe it's a little bit less than that. Yucca: Now this isn't in the realm of making, but I could see someone having like a real nice Leatherman on their focus. Right. I can see that as being a real, having a real strong association for them, especially if they were using it for its intended purposes. And then you're also using it like, oh, this is the thing that I used to cut this, or to get it into this can or whatever it is. And when, oh, and the car broke down, I had it. And here it is now I'm bringing all of that with me, into my ritual for this thing that I'm fixing in my life or I'm working on. Mark: Yes. And it, it means I have all the tools available to do what I need to do. Right. Yucca: Right. And I've invested in. And I've invested in the really good ones, right? Yeah. Mark: Yes. My Leatherman tool is a miniature one. It's about four inches long made by Winchester. Actually, it's the only thing I've ever owned made by Winchester, but it's very well machined as you would expect from a firearms maker. And it's, but it's identical to a Leatherman tool. It has the pliers and all that kind of. Yucca: Right. Yeah. And just, we are, we have no brand affiliations. We're all sponsored none of that stuff. Mark: no, Yucca: So that would be a strange twist. Mark: that would be a really strange twist. Yeah. Yucca: some other things kind of classics is a broom. Mark: Yeah. Yucca: Okay. Mark: I make a. Every summer solstice. I make a sunroom. I go out and I find a place where there's some tall, wild ride rowing and that that can get like five feet high, four, four feet, five feet high. And so I cut it off at the bottom. And then I use, and I, I unwrapped the cord from the existing sunroom and I have a handle that is this kind of natural piece of Oak that I found. And then I use the new. The new rye and bind it with the cord, same cord again, and tie it off. And it makes this broom. I do this on the, on the summer solstice and then it sits out in the sun all day on the longest day. And the rest of the year, it lives in my house. And you know, along about January when it feels like there's never going to be sun again, I can pick it up and wave it around. And. Symbolically bring the feeling of some sunshine into my house. Yucca: Nice. You have another kind of similar thing. Don't you have a. That you make an burn at you make one time of the year and you Mark: Yeah. Yeah. I use corn shucks to make a little doll. That's called the rain baby and that the rain baby is born. At river rain, which is the February holiday it's like in bulk or Bridget. But where I live, it's the time when it's raining cats and dogs and will be for a month, or at least when we're not having a drought, it will. And so I make this little figure out of corn shucks, and it sits on the focus for all of the Sabbath. Going forward until we get to Hallows and then it burns in the fire and dies. And then it's time for another one when we come back around to February. So, and people make little corn dough, little dolls or puppets for any of a variety of different kinds of reasons. Some people make them to represent their family, you know, because. Feel really connected to their family and want their family members with them when they do rituals others do them to represent people they don't like, so they can do mean things to them. Just all depends on what you're trying to get done. Yucca: Yeah, so those are things right. And also going back to the. You know, the broom can be used for sweeping things away in ritual, right. For cleaning up or for breaking the ritual. Let's say you did like opening up the, the circle. Let's say you, you literally put something down like salt or a colored sand or something like that, where you drew in the dirt where you're standing, then you can take the broom and sweep that away. Mark: Sweep it away. Exactly what works really well for that. If you don't have sand, I mean, sand works really well and it's obviously completely benign, so that's a really good choice. But baking soda is it's very, it's it's, it's cheap. It's brilliantly white and it's harmless it. Won't. Yucca: well, and in this case, if you're working inside and you're on a carpet, then you can vacuum that up. Isn't that supposed to be good for cleaning your carpet? Mark: it's supposed to be good for the smell for any smells that have soaked into your carpet. It's supposed to be good. yeah. Yucca: So if that happens to be the time that the landlord who should not be coming into your house without asking, but if that, if they are, and they find you sprinkling something on their carpet, you're you're cleaning, right? Yeah. Well, what about other things that you can mark with? Because that's something that you're often going to want to do, right? You're going to be wanting to mark the ground or Mark A. Good candle, or maybe even your skin. Mark: a sigil. Any of those kinds of things. I do have a old fashioned Squibb type pen, you know, with the Stephen. You know, the, that you dip in an inkwell and, and run and rub with. And, and the shaft of it is a bone. I bought it at a Renaissance festival a long, long time ago. And it's really cool. So that's what I use when I'm doing like ritual inscriptions on parchment and stuff like that. I find that just having really. Quality materials makes a difference when I'm doing rituals. So I wouldn't use, you know, a legal pad. Instead I would get some good quality paper from like an art store to do that kind of work. And there's something that's just wonderful about, you know, dipping the pen into the ink and, you know, That's scratching sound on the paper and, yeah, it's great. Yucca: Yeah. Mark: But besides that, like, if you wanted to write something on yourself, for example, first of all, make sure you've got washable Sharpies that you're using. Yucca: Or Mada. Niemi not a Sharpie. I mean, what's your skin, but think about, you might want to use something like face paint or henna or something like Mark: Sure Yucca: Right. Because remember. Mark: the head is going to stain though. Yucca: Yeah, that that would be purposeful, right? If you were doing something like a sigil. But yeah, don't, I wouldn't suggest writing you. Your inner most vulnerable thoughts on your arm and then go into work the next day with everybody reading that. But if you could, if you can put that into a single form or put it into, you know, something like that, but face paint is a great option or for a less toxic option, like the children's markers, there's still not Mark: That's that's what I mean. That's what I mean, the washable. ones. Yucca: Okay. My Mark: not a regular Yucca: like a Sharpie, like a permanent marker, cause that Mark: no, no, no. That's, that's a really bad idea. Yucca: yeah. Mark: I'm glad you clarified that. Thank you. Yucca: Yeah. but, but some of them, so yeah, your, your kids markers, or you can actually get face paint markers still, they're probably not fantastic to be putting on your skin. Mark: Probably Yucca: But then you could also, you might not be able to write very well with these, but if you're thinking about trying to be connecting with your land where you live or the park near you, there's all kinds of plants and things that you can use to make little dyes with. Mark: Yeah. They'd make pigments for sure. Yucca: And that can be just a fun rabbit hole to go down. Right. It's find out, you know, what are the Mark: just be sure you got the right? plants. Yucca: right? Yeah. Well, it's better if you're, you know, you want to be careful when you're, if you're consuming any, any of those, but if it's just, if you're going to be staining paper or cloth, that's another one we should mention, right? The fabrics. Mark: Yeah. Lengths of fabric that you can use to establish the surface for your alter or focus. And those can be a various different kinds of patterns and colors depending on the season or the purpose of the ritual. I have some that are, you know, sort of spiderweb pattern and black others that are, you know, red and colorful and more springy in summary. It just, it depends on what you're working to do, but having those different lengths of fabric is a good thing to sort of stock up on. Yucca: Yeah. And you can use them in, in so many different ways. You're seeing putting it on the altar, but you could use it in dance or as a symbolic curtain that you're pulling back, or, I mean, all kinds of things. Mark: Right. Right. And they don't have to be super expensive. There are remnants at fabric stores for one thing. And also even. Sarongs for example, can be really affordable cotton sarongs and they have beautiful patterns on them. So that's another direction to look. If you have an international store somewhere near around you, Yucca: Yeah. Mark: Another thing that I have that I really like using is a seashell, an abalone shell because we have abalone that are native to the coastline near here where I live. But also because abalone. Widely treated throughout the Americas. It was very prized by indigenous votes for use in various kinds of decorations. And it's been, you know, Pacific abalone. I'm pretty sure was found in the dig at Cahokia in the St. Louis area, you know, Southern Illinois So obviously it was really prized and really valued. Otherwise why would you transport it over all that distance and, you know, Yucca: Yeah, you have to carry that, that somebody walked it there. Mark: That's right. That's that's exactly right. So, I, I really enjoy having one of those shells. I can use it to burn herbs in or to burn incense. Abalone actually have little perforations in them, so it's not very good for holding a liquid. There. are little key hole things. In the surface. But other than that, they, because of that opalescent surface that reflects green and blue and all those wonderful colors. They're So pretty. They, they really make a nice thing to have on an altar, but there are lots of different kinds of shells that would also make, you know, really be a nice thing for an altar. Yucca: Yeah. Mark: And I find that they are. Symbol of nature. Generally just have the beauty that nature can produce. Yucca: Yeah. So, are there any other kind of big categories because it's gonna often depend on what kinds of rituals and the purpose and your specific, you know, individual tastes, but are there other big categories that people would be likely to, to want a tool in, Mark: Well, another thing that we talked about that isn't really so much a ritual tool as it is kind of a seasonal marking that we talked about before we started recording is a reef. Yucca: right. Mark: People often make Reeves on a seasonal basis, maybe for the five stations of the wheel of the year. What I find to be a useful approach to that is to go to an art supply store or a craft store, but not hobby lobby some somewhere Yucca: We don't go to hobby Mark: We don't go to hobby Yucca: We don't go to hobby Mark: Yeah. Yucca: We have a Michaels, but. Is there a little bit better, but they're not, Mark: they're not, they're not Yucca: they're not actively homophobic. They might actually be, but they're not actively Mark: They're not pouring money Yucca: people over. Mark: into hurting LGBT people. So, but back to the Yucca: Yes. Mark: you can you can buy a Wicker ring. It's a woven ring of Wicker that is serves as the base for a reef. And then you can decorate that wreath with seasonal flowers and with ribbons and with all various kinds of nice things that remind you of the season. And then you can hang it on your door on your front door, or you can hang it up in your room or in. Living room in a prominent place, whatever, whatever seems appropriate to you. But what's nice about that is that it gives you a project to do every season and and it's sort of a declaration in a way, you know, okay. Spring is here, Yucca: Yeah, but the new one Mark: where I'm putting the new one up It's no longer late spring. It is now summer. So. Yucca: and you can having that, that pre-made ring is really nice, but you can also. Make your own initial ring, right? So take your, the different trees that are meaningful to you and take some branches and, you know, do whatever that particular tree is going to need to, to treat it and then wrap that with wire and then you just swap out each season, you swap out what you have on it. So you could, you could start with the, with that initial pre-made piece, or you can make it depending on what you were. Finances. And what materials you have, Mark: right. Yucca: It might make more sense just to buy it than to buy the wire that you would then need and the Clippers that you would then need and all of that. So, yeah. Mark: And we, we almost forgot the most important thing. Something to sit on. Yucca: Right. If you're going to be there for awhile, you might want your nice your cushion or your, what was the one who was the name of the. Mark: Oh, the, the. Buddhist meditation cushions are called zafu, Yucca: Yes Mark: for sitting Zaza in. Right. And they are very comfortable to sit on there. They're densely packed layers of cotton. As I get older, I find that sitting like cross-legged on the floor is increasingly painful. So I have generally gone to a chair at this point. But it, it is nice if you're, if you're laying something out on the floor, it's nice to be down on that level and with all the stuff that's around you. So, you know, There are so many different ways to do rituals and so many different purposes for rituals that it's hard to generalize about what kinds of tools you might be likely to need. But these are tools. The ones that we've been describing are the kinds of tools that you might come back to again and again, they're, they're they're multipurpose and they, they serve, they serve good uses in a lot of different kinds of rituals. Yucca: It's like building a kitchen, right? It's you know, your cutting board. You're not going to need your cutting board for every meal. You're not going to need that particular knife for every meal, but Ooh, probably a few times a week. It's going to be real nice to have the one that does the job that you want it to do just right. Mark: right. I haven't bought or made a ritual tool other than. And a femoral craft. That's going to be destroyed at some point or burned or something like that in many, many years, but there is a real satisfaction in knowing that you have all that stuff so that if you need to, if you feel the need to do a particular kind of ritual, you don't suddenly find yourself. Oh, but. This really requires a special knife and I don't have a special knife. Yucca: Yeah Mark: That kind of feeling. Oh, I did think of one other thing that you can do with a chalice. There are, I have two, I have two fun things to do with fire. So remember the part of, remember the part about the the fire extinguisher? The first one. And you can do this indoors. You just need to be careful. I, so propyl alcohol, 90% alcohol, not the 60% alcohol, but the 90% alcohol burns beautifully, and it burns at a very low temperature. So if you have a chalice or, you know, something else that can withstand heat, you can. A small amount of that in in that container and light it on fire and flames will leap up and make a beautiful dance until all the alcohol is burned away. It's, it's really pretty dramatic. And especially for banishing work for dispelling things. I've done rituals for other people where they really want something to go away. And boy, you know, you, if you slip the symbol of that into the, the chalice or, or font or whatever it is, pour that alcohol and then light it up and it's all leaping and going, they can really see that it's going away. Yucca: Oh, that sounds lovely. Mark: Yeah, it's cool. And the second trick, don't do this one indoors. Is the use of a handful of instant coffee creamer like coffee mate, which is basically just fat and sugar in a powdered form. And of course, powders and dusts are highly explosive because they have a lot of surface area. It powders and dust that are made of flammable material are explosive because they have so much surface area. They burn very, very quick. So tossing a handful of coffee creamer into a campfire we'll make these sort of fireball that will burst up from the flames. And, you know, if you're, if you're in the midst of invoking something important and it's time to, you know, here's the climax of the ritual and then boom, you throw this into the fire and Kapow, the giant burst of flame comes up. It's really dramatic. So it's one of my favorite ritual special effects. Yucca: Yes. Oh, that sounds fun. And again, I just cannot emphasize enough. My, my state is on fire right now and very right next to the. One of the largest fires we've ever had in the history of our state. So I'm just, just remember your fire safety, everybody fire is wonderful and incredible, and it can also just consume everything. So make sure that whatever you're doing, you thought out and you're doing safely. Mark: Right, right. Yeah. And candles candles particularly can be deceptive because the flame is so small, but you don't want to get them too close to anything else. Or the flame gets a lot better. Yucca: Yeah. Mark: Right. If you, if, if there's anything hanging over it put your hand. If, if there's anything over, you know, above The candle, put your hand underneath it. If you can't stand the heat. From the candle that you feel coming up, then move the candle because it's too close. There's too much heat coming up. That's a trick you can use to be safe. I usually use chimney candles on my focus because they're stable. They're enclosed inside a glass cylinder. And they burn down and get farther and farther away from the lip of that Yucca: The chimney are those like the St scandals. Mark: well. It's at these don't have any saints on them. They're just call them columnar Yucca: but it's the same. I like, you would often find them with saints, but this is, it's the same kind of concept. Mark: Yes. Just a glass, you know, a tone narrow cylindrical glass filled with wax and the WIC. Yucca: So one of those was sagging on them once, Mark: Oh, I know Yucca: make him roll and roll in his grave. Mark: there's a whole series of saints of science. And you can get other people to you. Can you get Ruth Bader Ginsburg? You can get Martin Luther king. There's a whole bunch of those. And I think that's pretty cool. I wouldn't mind having Ruth Bader Ginsburg on my focus right now. Yucca: Thank you. Someone gave my kids a little story book about her and they're really into it right now. They want to read, they want to read the Ruth book. So it was like, cool. Awesome. Mark: Nice. Yucca: So, we didn't, there's so much, there's so much more, we should probably wrap up because we've been gone for a while now, but just thinking about all the different, like types of things that you could use and rituals and things that you can make. And we didn't talk about braiding things and books and all kinds of things. Mark: Yeah. There, there is a lot to talk about. But the. core point of this podcast is, you know, look around and see what are the things that attract you? You know, a lot of times when we're pagans, we collect a lot of natural things, pine cones and bones and all that kind of stuff. Well, what can you make with those? What, what, what might you put together, or maybe you don't need to make them, maybe you just use them as ritual tools by themselves. Like my Redwood stick. But, you know, be, be imagining in a different way, what those things. are. Maybe they're not just decorative. Maybe there's something that can have a symbolic meaning for you as well. So, we need to tell you that next week is a very unusual Episode of the wonder, because we are going to be recording this at the century retreat that Yucca and I are going to next In Herson. Yucca: we'll only be a few feet away instead of a few thousand miles. Mark: It is, it is hard to imagine, but that's actually going to happen. And Yucca: of you listening, we know are going to be there as well. So really excited for that. Mark: You can, if, if you're in the atheopagan is on Facebook group, there's an event there for the Saturday mixer, which says, you know, pay attention. There's a different time for this particular week for the, for the 14th of May. And what you'll do is you'll log into the zoom. And you can participate with us as we record the podcast, we're going to do a Q and a session and kind of a report about what's going on at century retreat. But mostly we're going to interact with people who call in and just have a good time. So, and then the audio from that will be posted on Monday as usual, or maybe a little later, because we may not have the ability to do that until after you get home yet. Yucca: Well, yeah, so it might, it depends on what, I don't know what the technical setup is. You said that there's pretty good wifi there. Mark: There's pretty good wifi in the dining hall. Apparently it's a little spottier in the other buildings. Yucca: Yeah. So I'll, I'll bring everything and we'll, hopefully we'll get it up at our regular time. But if not, it'll probably be you know, Monday night when I get a drive back home. So it's, it'll be, hopefully it'll be the same time, but we'll, you'll get that. You'll get your little lit pop-up when it comes. So depending on what app you're listening on, so. Mark: All right. Well, I am really excited for that. It's been coming for a long time. We've been talking about it and it's finally upon us. Yucca: Yeah, you're about to leave too. Aren't you? Cause you've got a ways to drive to get, since it's in Colorado, near in Mark: In California. Yeah. I leave Wednesday morning early. So I've still got a little bit of time. We're recording this on Saturday as usual. So I've, I've still got a little bit of time, but there's oh, there's just so much to do between now and then it's it's very exciting. I'm just, I can't wait. Okay. Yucca: thank you so much, everyone. Mark: Yep. Thanks everybody. And hope to see you on this, on the live zoom call next week. We'll post it in the in the podcast notes for this podcast, Yucca: Cool. Mark: how to join next week. Yucca: Great. Yeah. So just look at that. It'll be right above the transcripts since as usual. And we look forward to seeing y'all Mark: Yeah. All right. Have a wonderful week.
We've been touting the benefits of long-range wide-area networks (WANs) for a long time now, but at what point do we say, “they've arrived”? And what does that arrival even look like? Those are the questions I asked Marc Pégulu, Vice President of IoT in the wireless and sensing products group at Semtech, a company that is driving force behind LoRaWAN, the most popular WAN version. Tune in to hear more in this week's Embedded Executives podcast.
Many organizations have abandoned insecure VPNs for Zero Trust Network Access to secure their fully remote workforces. But the fundamental “never trust, always verify” Zero Trust principle applies to more than remote users. As offices and corporate campuses re-open, ZTNA is not just for remote access and should extend secure access to local area networks (LANs) and wide area networks (WANs) for all users, devices and workloads, regardless of location. We discuss how security teams and network teams can work together to provide a unified policy engine and enhanced visibility to an entire company's ecosystem.Guests:Chris Scheels, VP, Product Marketing, Appgate; Greg Shields, Director, Product ManagementModerator:George Wilkes, VP of Demand Generation, AppgateFor more Zero Trust security resources, visit www.appgate.com.
In this episode we are going to look at Wide Area Network (WAN) Operations.We will be discussing WAN Standards, WANs in the OSI Model, Common WAN Terminology, WAN Devices, Serial Communication, Circuit-Switched Communication, Packet-Switched Communications, and finally SDH, SONET, and DWDM.Thank you so much for listening to this episode of my series on Enterprise Networking, Security, and Automation for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Enterprise Networking, Security, and Automation v3Episode 7 - WAN ConceptsPart B - WAN OperationsPodcast Number: 36-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Purpose of Wide Area Networks (WANs).We will be discussing LANs and WANs, Private and Public WANs, WAN Topologies, Carrier Connections, and Evolving Networks.Thank you so much for listening to this episode of my series on Enterprise Networking, Security, and Automation for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Enterprise Networking, Security, and Automation v3Episode 7 - WAN ConceptsPart A - Purpose of WANsPodcast Number: 35-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
Introduction to Networks with KevTechify on the Cisco Certified Network Associate (CCNA)
In this episode we are going to look at Common Types of Networks.We will be discussing Networks of Many Sizes, LANs and WANs, Internet, Intranets, and Extranets.Thank you so much for listening to this episode of my series on Introduction to Networks for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Introduction to Networks v1Episode 1 - Networking TodayPart D - Common Types of NetworksPodcast Number: 4-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
This week we fill in two blindspots on Bill's scorecard of film he missed with the Cult Classics "The Man Who Fell To Earth" and "The Devil Rides Out". Joe starts the Leprechaun series and god help him. Scott watches Netflix and "Wans" you to know about a new series he has been watching.
In this sponsored episode of Broadcast Dialogue - The Podcast, Tieline Technical Sales Associate Jacob Daniluck discusses The Gateway 4, a powerful DSP-based 1RU IP codec designed for live remote broadcasting applications, as well as STL or SSL links. The Gateway 4 enables transport of multiple channels of mono or stereo audio across the public internet or any QoS-enabled IP network, including T1 and T3 connections and private WANs with MPLS. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In dieser Folge spreche ich mit Timo Wans von myzelium. Myzelium ist ein Bildungs- und Kooperationsnetzwerk. Sie begleiten gemeinschaftsbasierte Gründungen und die Umstellung bestehender, marktbasierter Organisationen auf ihrem Weg. Myzelium möchte die Transformation vom Homooeconomicus zum Homocooperativus fördern. Dies bedeutet, ein Fabelwesen zu sein, welches selbst beginnt unternehmerisch zu denken und auf der anderen Seite kooperativ ist. Wie genau ihre Förderung aussieht, erzählt Timo in der Folge.
We went and saw Malignant, and It had me all turned around. I didn't know if this movie was coming or going. Wan is an experienced filmmaker, but this film makes me wonder if he had brain trauma since Aquaman. (1:27) - Intro(5:51) - Trailer(8:42) - Synopsis(9:07) - Review(15:42) - Score(25:50) - Spoilers(1:02:17) - Make it Better(1:18:01) - Outro Malignant can be found in theaters now and streaming on HBO Max until Oct 10 @dgoebel00 on Instagram provided this amazing artwork. Follow him and check out his website. Synopsis Malignant is about an abused wife, Madison (Annabelle Wallis), who after her husband is murdered, begins to see a figure in the shadows and having visions of murders. She finds out that these murders are real and that she has been witnessing them in real time. As police investigate the crimes, they seem to be tied together and related somehow to Madison's past. https://youtu.be/Gczt0fhawDs Review of Malignant (2021) James Wan, the director of Malignant is an accomplished horror director. Say what you want about The Conjuring, Saw, and … Aquaman? The truth is he is a competent director that has made some very enjoyable and successful movies. So much so, that entire franchises have been launched from his films. So the question is. How did Malignant happen? Is this a joke? I can only assume that Wan intentionally made a bad movie, because otherwise, the only explanation is head trauma. There are times when it shines with pure stupid fun -- mainly the opening and ending scenes -- but the majority of the movie seems to have poor footing with its tone. I could see some of these terrible lines of dialogue and ridiculous plotting work in a committed exaggerated campy horror film, But foolishly, everyone is playing it subdued and straight. I sat there watching the film, bored for most of it, desperately wanting a Bruce Campbell in Evil Dead 2 type actor to bring some levity and self awareness. Nope, just performances of the caliber that you would see on your mom's favorite c-tier CBS crime procedural. The influences are many and varied. I'm reminded of most of Wans career with elements of The Conjuring and Saw apparent, but also campy horror classics like Re-Animator and Basket Case. However, instead of taking disparate ingredients and making an enjoyable stew, we are treated more to a bachelor's feast of unrelated stale cold leftovers eaten out of tupperware containers. The film could have gone a number of ways to explain what is happening to Madison. It could be a haunting, a possession, a serial killer, psychic powers, etc. What it ends up being, is so dumb that you almost want to stand up and clap. I wish I could like this movie more, but the story in the middle of the film, and the characters are so boring, The ridiculous parts that I did enjoy couldn't overcome them. Score 3/10 Buy The Conjuring Nowon AmazonClick here to Buy Get a 30 day free trial at Shudder.com with code HMT. Get 13% Off your order at NightChannels.com when you use code HMT at checkout.
MP031 - Krise und Gemeinschaft mit Sina Wans
Dr. Simon Feeney's journey along the virtuous path of classical Chinese medicine and healing has been far from ordinary. His integrity and purist approach to everything he does, has successfully set a new standard for wholesale Chinese Herbs in Australia, with the establishment of his company/clinic Empirical Health six years ago. Purity, Quality, and Potency are the principle values of Empirical Health; The first and only Australian certified organic Chinese herb wholesaler dedicated to Dao Di principles. A Physician in Classical Chinese Medicine, Acupuncturist, extensively knowledgable herbalist, and ongoing devoted scholar (20 years) of ancient medical Burmese scriptures, Simon's passion for upholding essential ancient knowledge is evident in everything he does. Like all journeys of the heart, Simon's is full of incredible stories; Stories of ancient manuscripts with cures for Leprosy, herbal preparations to treat malaria, being held at gunpoint in the name of preserving ancient teachings, and quests of translating bygone measurements for 2000-year-old formulas used in the Han Dynasty. In this potent conversation, Simon and Mason discuss the preservation of Classical Chinese medicine through lineage, the institutionalisation of TCM (where it's lacking), concocting ancient formulas, species identification when it comes to Dao Di, and the reverence for classical Chinese medicine as a complete system. Tune in for ancient knowledge and so much more. "If that herb's not available, what are we going to do? How are we going to adapt? Chinese medicine's beautiful like that, all of a sudden new things evolve, and that's the nature of Chinese medicine. It's still evolving. But it's not evolving as the western mind thinks about evolving, in the sense of, "Right, all that stuff's behind me, I need to forge forward into the darkness. No, it's evolving based on history". - Dr. Simon Feeney Host and Guest discuss: Pulse diagnosis. The Han Dynasty. Chinese herbalism. Energetics of herbs. Availability of herbs. Plant identification. Administration techniques. Therapeutic alkaloid testing. Quality discernment of herbs. Dao Di (original growing region) principles The evolving nature of Chinese Medicine. Genetic testing and proper identification of herbs. The current Chinese medicine renaissance in the west. Dosage; The right dose, for the right person at the right time. Who is Simon Feeney? Empirical Health's Director, Simon Feeney continues to pursue his lifelong passion for the study of Traditional Medicine under a Theravadin Buddhist Monk, who has been guiding his learning for the past 20 years. Simon's commitment to fusing ancient knowledge with contemporary insight inspired his formal studies in Melbourne, Australia at the Southern School of Natural Therapies, where he completed his Bachelor's Degree of Chinese Herbal Medicine and Traditional Chinese Acupuncture. Along with his studies in the classical Chinese Medicine works of the Han Dynasty (200BC) and the refined art of Traditional Japanese Acupuncture, Simon is also a trained Bowen Therapist. Having studied intensively under one of Melbourne's leading Chinese Medicine gynaecologists. He has a special interest in chronic conditions, internal medicine, sub-clinical health, and other ‘hard to treat' conditions. For the last 20 years, Simon has been working closely with his teacher to understand a number of scriptures from Burma (now called Myanmar). These writings, dating as far back as 500 AD, largely pertain to monastic order as well as ancient medical knowledge and further underpin Simon's dedication to preserving the integrity of the ancient ways for modern application and translation. Simon has travelled extensively through Thailand and Myanmar in documenting these texts and assisting in the preservation of this essential ancient knowledge to understand, use, and appreciate in the modern world. Simon has completed an extensive post-graduate education including a specialist course in Canonical Chinese Medicine under the internationally acclaimed educator and physician Dr. Arnaud Versluys Ph.D. director of Institute of Classical East Asian Medicine (ICEAM). He is a member of the Australian Traditional Medicine Society and a registered member of the Australian Health Practitioners Registration Agency (AHPRA). His extensive knowledge as a herbalist came from him spending endless hours working through ancient texts identifying doses of various herbs, deciphering and translating those that were successfully used centuries ago into modern applications, yet have been largely lost in modern times. His growing prominence has now extended from Chinese Medicine physicians to also include a number of veterinarians who have sought out formulas for use in their animal clinics. Simon's life journey and his long-standing passion for helping people has also involved him working with a non-profit organisation and temple, that will help build a library to hold rare and ancient manuscripts. CLICK HERE TO LISTEN ON APPLE PODCAST Resources: Facebook Instagram Empirical Health Empirical Health Shop empiricalhealth.com Q: How Can I Support The SuperFeast Podcast? A: Tell all your friends and family and share online! We'd also love it if you could subscribe and review this podcast on iTunes. Or check us out on Stitcher, CastBox, iHeart RADIO:)! Plus we're on Spotify! Check Out The Transcript Here: Mason: (00:01) Simon, thanks so much for joining me. Simon Feeney: (00:03) You got it. Thanks for the invitation. Mason: (00:04) Absolute pleasure. In the flesh no less. Simon Feeney: (00:06) I know. First time, hey. Mason: (00:08) Yeah. Simon Feeney: (00:08) I don't know. Yeah. Mason: (00:09) You're coming down from Brisbane? Simon Feeney: (00:11) Yeah, just been up at a conference, so coming back down through here and thought I'd stop in and take up the invitation, and it all worked out beautifully. Mason: (00:18) Yeah, getting the practitioner gang back together. Simon Feeney: (00:20) Yes, exactly. Yeah, it's always good to be amongst some colleagues and shoot the breeze and connect after such a long time of separation, and so it's been very nice, very rewarding for everyone, I think. Mason: (00:32) So I love your company. Simon Feeney: (00:35) Thank you. Mason: (00:37) Yeah, I know- Simon Feeney: (00:38) Ditto. Mason: (00:38) Thank you. I don't know if it's an unusual friendship or not the... I was very curious about your company when it came up, and you've established it with such authority, and I have so many friends who are acupuncturists, and they were telling me when you first came on the scene, and just how relieved they were that you were bringing Chinese herbs of this quality to Australia because you go to Chinatown, you go and pick up your cistanche, whatever, anything you kind of like, or your formulas, and you're like, "I assume they're clean and pure." Simon Feeney: (01:21) Well, sometimes you have to pick out cigarette butts or a piece of plastic or something. That used to be what it was like, literally it was like that. I mean, when I trained with my first herbalist, he had his big display, and he was a real traditionalist so he said, "If you can't identify anything, you shouldn't be using it." So he had no names. It wasn't in alphabetical order. It was just depending on how much he used it. But it used to be that he had a bottle of, like a little container, that used to put all the bits that he found into the thing that was just rubbish. Mason: (01:53) That's amazing. Simon Feeney: (01:53) Yeah, because it was much less regulated back... There still is no regulation for the quality of Chinese herbs in Australia still to this day. Mason: (02:02) This is loose. Simon Feeney: (02:03) So we have to set our own standards. Mason: (02:06) I mean, I guess there are... Again, it sits in a grey area. Technically, it is regulated, but because it's such an underground world and operation in business, it's not really enforced. Simon Feeney: (02:22) No, it's not. That's right. I mean, the practise of it is, but the quality is not regulated. You've got these companies in Taiwan and in China now, but there is no official regulation for the quality, but once you start treating patients and you start wanting these herbs for, your kids are born and your wife is pregnant, then you want to have some sort of assurity that they are good quality, and that you're not doing any damage. Do no harm is the foundation of all clinical practise. That's what started the journey for me, so looking for that kind of quality. Mason: (03:06) And I guess the most obvious one that comes up is pesticides- Simon Feeney: (03:10) Huge [crosstalk 00:03:10]. Mason: (03:10) ... and I think everyone can relate to that in their immediate consciousness [crosstalk 00:03:15]- Simon Feeney: (03:15) Yes. Mason: (03:18) When I started the company I was obsessed, and so that's why I went and sourced herbs that I wanted, but then started to talk to people who, like this woman, she's pregnant. I want to give this to my mom who just had an aneurysm. Simon Feeney: (03:32) That's right. Mason: (03:33) All of a sudden, your level of... Simon Feeney: (03:34) That's serious stuff. Mason: (03:35) It's serious shit. Simon Feeney: (03:36) Yeah, it's really... Yeah. Mason: (03:36) Don't muck around. Simon Feeney: (03:37) Yeah. No, you're talking about young foetuses. You're talking about the beginning of life, so you don't want to be doing any damage whatsoever, and you want to be assured, assured 100% with no doubt, that what you're doing is safe and not only effective, but primarily safe. Mason: (03:56) One thing I'm liking though is the self-regulation that does come up because I know you've started out a couple of years ago, a few years ago, officially distributing? Simon Feeney: (04:06) We've been distributing for about six years or so now. Yeah, yeah. Mason: (04:11) Wow, and so what's been the uptake? Where have you guys... I guess it's because I've been tuned in to what you're doing. I've seen you grow exponentially, but was there a constant exponential growth in the beginning, or was it a mad slog going up against the big Chinese herb companies in Australia? Simon Feeney: (04:28) Well, like you said earlier, just coming in it with authority and that sort of certainty. I was never happy with... Basically, I started because it was just in my clinic and wanted to make formulas, so I wanted to make these old ancient formulas from the Han Dynasty, so 2000 year old formulas, figuring out how to make them is a whole 'nother level. I had to work out what a liang was, what a [zhu 00:04:52], what a [fen 00:04:53], what a [zhang 00:04:53], what are all these measurements that absolutely made no sense to what I learnt at university and was completely impractical in terms of figuring out. So I had to figure all that out, but then I had to look at the herbs and figure out all that. So then we're realising that you have all these adulterations in Chinese medicine, so incorrect species identifications, quality discernment, and then safety and purity of the herbs. Simon Feeney: (05:20) So that led me to kind of trying to find the better, better, better, better quality, and then looking for the paperwork that supported that. Some of it was there, it was kind of falsified. I found all these little things that you didn't want to find as a herbalist, you didn't want to know about, and it was like, "Well, I think I have to try to find the best I can possibly find in the world," and I asked my community internationally, the Chinese medicine community internationally, "Where's the best?" And they all pointed to this one guy in the US, Andrew Ellis. And so I contacted him and I was like, "I want to talk to you." About a year and a half later, he responded back to me on Facebook. Mason: (06:00) Whoa! Simon Feeney: (06:01) And then said... Yeah, and then literally I was on the phone with him that afternoon because he said, "What are you doing now?" And I was like, "Oh, man." I had a cancellation from a patient, and so I'm sitting there and all of a sudden it comes up. And then about an hour later on the phone, we started talking about all these ancient formulas, and then he said, "I'm going to Hangzhou in two weeks. Want to come?" Mason: (06:23) Holy shit. Simon Feeney: (06:23) And two weeks later, I was in Hangzhou meeting these, I mentioned to you earlier, these big Chinese companies and going out to farms and understanding all the testing, and the rest is history. And then I was like, "I want to bring that back to Australia," and I brought it back to Australia, and I told some of the suppliers and they got so upset with me. They were so upset with me. Some of them are not even talking to me still because I did that. So it was almost like a calling out, it's kind of like losing face for some of those people, which is a shame. Mason: (06:51) I mean, okay, so there's a couple of things. You've gone over, and you've started going to these meetings with these herb companies that based on the demand of you going, "Hey, I want to know that there's no pesticides. I'd like this testing to be done. I want genetic testing, or proper identification." Simon Feeney: (07:12) Yeah, yeah. The alkaloid testing and everything, that's what we want. Mason: (07:16) I can't remember where I've read these stories, but in regards to where this is unregulated... There's an element of upregulation on what is the highest quality herb, and I remember hearing the initial stories of when [Dedao 00:07:31] became relevant, or [Daode 00:07:34], been when all the trading routes became, those roads became really tended to, and all of a sudden you're getting Schisandra berry where Schisandra berry doesn't really grow and then people going, "Hang on. This isn't the excellent Schisandra that I'm used to. Where's it come from? Oh, it's actually coming from over here now because we can grow it more," and then that person that knew what they were talking about going, "No, I want that Schisandra berry from this region and grown this way," and all of a sudden, there's this born this invisible unregulated at just the highest quality. And it's been completely driven by people like yourself, like... was it Andrew? Simon Feeney: (08:13) Andrew Ellis, yeah. Andy Ellis, yeah. Mason: (08:16) But it's hard to communicate to people and then you've gone over there- Simon Feeney: (08:21) It's very complicated. Mason: (08:22) ... and met with these huge businesses that you've gone, and then driven by Andrew's demands, then furthered by your demands are going, "No. I need the herbs at this level." Simon Feeney: (08:31) The correct... I mean, the concept of this adulteration concept is very, very complicated, and as you mentioned, it comes all the way back to trade routes and all sorts of things. The principles of Daode are so complicated. You've got everything from completely incorrect species, like just one example is just Sheng Ma. So Sheng Ma's a herb that they use. I think in English it's like a Black Cohosh, and I think that's the English name for it. Anyway, we think about Sheng Ma and different kinds of Sheng Ma, but if you look at Sheng Ma, the actual herb, you can have something in the north called Sheng Ma and the south called Sheng Ma, but the north call that one [Ma Hua Toe 00:09:13], but in the south, they call it Sheng Ma. So, that can be one issue. Simon Feeney: (09:19) So when I went to Thailand, for example, I went into a wholesaler, I was looking for [Her Hung Hua 00:09:25], and they're like, "Here it is," and I'm like, "No, no, no. You've got it wrong," because what I was saying was [Her Hung Wa 00:09:29]." Simon Feeney: (09:30) It's like a special, like a flower. And then all of a sudden you realise, "No, no, no. You're using the wrong species." "No, you're not. You're using the wrong species." "But I've been using it in clinics for 10 years." "Well, I don't know, me too." "You've been using it for what purpose?" "I've been using it for this purpose." "Okay." So in some cases there's just incorrect species, so you just get a completely wrong species. In other instances you can have a different... And one thing does what it does therapeutically and the other one doesn't, and it's just been used for whatever reason, maybe it's got a mild action, but sometimes it just doesn't. It doesn't even have the marker, the therapeutic alkaloid in it, because you can measure these things now. That's the first example. Simon Feeney: (10:11) Second examples are where you have two different species of, same gene, it's different species with exactly the same function. An example of that's suan zao ren, so suan zao ren has two different kinds of suan zao ren, [foreign language 00:10:31] and spinose. So the spinose species is a little bit more effective, but this is for insomnia and that sort of stuff. But the [foreign language 00:10:40] is being used long enough in the history of Chinese medicine therapeutically and effectively in the clinic to say, "Yeah, it's kind of suan zao ren." Mason: (10:49) Far out. Simon Feeney: (10:49) Right? Mason: (10:51) Yeah. Simon Feeney: (10:52) And then you've got others. You got like a, and don't even get me started on chai hu bupleurum sinensis. I mean, bupleurum species. There's like 50 that are in use. But in the north the bei chai hu is different from the nan chai, so the bei chai hu is very good at venting shaoyang, so getting out pathologies in the system. This kind of lingering, they call it like a lingering pathogenic factor, but it's just kind of a TCM way of seeing this. It's basically stuck, like the shaoyang imbalance, we need to regulate shaoyang. Doesn't stop the flaring from it, but that's a different herb, [wan chin 00:11:29], but the chai hu doesn't... in the sinensis species does that. Simon Feeney: (11:35) But then the nan chai hu which is the southern chai hu, that vents and courses the liver. So if you're using those the opposite way around because they were written... It's complicated, sorry, if I get distracted. Mason: (11:49) Go for it. Simon Feeney: (11:50) The sinensis is used in all Shang Han Lun formulas, so the classical formulas to vent shaoyang. And in the modern one, the nan chai hu is used in Xiao Chai Hu Tang, which is a very common formula in Chinese medicine... Sorry, Xiao Yao San, to course liver chi and get rid of the stasis. When you swap those around and use them in the context of that formula, they can really cause problems. They can cause the adverse effects that you want. And people think, "Oh, it's me or it's something else." No, it's the species. And the complications of species identification is intense and when it comes to Daode the... I was talking to an indigenous guy, indigenous elder in South Australia, and I was asking about this concept. I was talking about this with him because I was talking about, oh, the way you decoct something. Simon Feeney: (12:41) And he said, "Oh, Simon, I'm going to bring you something." And he brought me this herb and he's like, "Try it, and see what you think," and he wanted to watch me taste it. I'm tasting it and I'm like "Oh, wow. This does this." And he's like, "Oh, good. Good." And I said, "We should get more of this, and teach me how to use it in clinic and I can apply it." And he said, "Oh... " I said, "Can you grow it?" And he said, "No, no, no. You totally missed the point. You totally don't understand. This is only therapeutically effective if it is on the north side of the river on a south-facing slope. If it's on the other side of the river, it doesn't have any function." So that's a whole 'nother level. So now we're talking about, this can actually be the correct species in the correct area, but it comes back to these really deep principles of Daode. Mason: (13:27) So I always try to get to the crux of why this comes about. Why we get all these problems and I can see, first of all, blaring the obvious is commercialization, extreme commercialization, taking away from the nature based element of this philosophy. Simon Feeney: (13:41) Yeah. Mason: (13:42) Then the other one, you're saying, you got all these people in clinic using a herb because it's in a textbook and you told that you can get this in a pulse, and that in tongue, that in a complexion, this is the formula you're going to be using. "Oh, it's not working." Well, something wrong with- Simon Feeney: (13:55) Something is wrong with me. Mason: (13:57) ... this person or the herb. Yeah, it's like, oh, yeah, me or... Simon Feeney: (13:58) Yeah, or Chinese medicine doesn't work. I've given up, I'm going to go and... Yeah. Mason: (14:01) Well, that's the most, I guess for me it's a funny frustrating thing because Chinese medicine is such a complete and ancient system- Simon Feeney: (14:10) It is. Mason: (14:10) ... that we know works. Simon Feeney: (14:11) It is. Mason: (14:12) Yet, the way it's been, I can see in Australia the frustration and of course when you see it get kind of very westernised. You see this belittling of Chinese medicine. If anyone comes in with cancer you need to send them to a big boy doctor, that's a western doctor because your system can't do it. Simon Feeney: (14:29) No, we can do a lot of stuff and it's definitely the bane of my existence. I mean, it comes back to the principles of... And it goes further. You talk about, first thing is, is basically plant identification. That's step one. So we can see already how complicated that is and we haven't really even gone into the... There's a reason that it happens in the first place, like it's not necessarily... It can be because of innocence. It could just be just not only misidentification but just availability, and availability, what's the... necessity is the mother of all creations. People just need that herb, it's just not available. What are we going to do? How are we going to adapt? Simon Feeney: (15:14) And so, Chinese medicine's beautiful like that and then all of a sudden new things evolve, and that is the nature of Chinese medicine. It is still evolving, but is evolving based on history. It's not evolving in the sense, like the western mind thinks about evolving in the sense of, "Right, all that stuff's behind me and I need to forge forward into the darkness." I learnt this from my teacher, Arnaud Versluys. Obviously, everyone says everything because they're "Who taught them before?" So I've got to acknowledge that this idea came from my teacher. Simon Feeney: (15:49) So in the west you forge forward into the darkness with your mind like, "Right, we're going to create new things." And the eastern way of thinking is the absolute opposite. It spins around, you're looking at the foundations of what you have and how they manifest into the future, and the future's often behind you and you're sitting in this present moment. That's a completely different way of looking into the future. And so, trying to get these foundations are very, very important so you've got this... Anyway, back to the [inaudible 00:16:18] process. So plant identification is one thing and then you get to the quality discernment of something, and then you're looking at, right, it's this, this grown this time of the year, it's got pungency, it's got this, it's got that, it's got all its nature, it's got its chi, it's got its signature, it's got its flavour. Simon Feeney: (16:33) And then you look at dosage, it's a whole 'nother thing and it's underpinning your point which is watering down and diluting the efficacy of the medicine. If you're not using the right dose for the right person at the right time, you can't blame the medicine. And then administration techniques, so different administration techniques are being completely ignored during the course of Chinese medicine. It's very interesting to look at. Simon Feeney: (17:04) An example like qinghao, so Artemisia annua. What was the name? The lady's name? She got a nobel prize for a science in which she went back to the history of where she started testing qinghao for malaria. So she tested it as an extract or as a granule, and she tested it as a powder, she tested it as a decoction, she tested the level in which she was able to break down these malaria strains. And eventually, she kept following her way back, back, back into the history of Chinese medicine. Simon Feeney: (17:41) She eventually went and came back to this guy called Ge Hong who was the first person to talk about qinghao, and what did he say? "Read the subtext," he says. "Do a cold water extraction." So take the thing and actually take it, wring it out in cold water and beat it 100 times, all right? And then they tested it and it just... just demolished, just demolished. I get goosebumps thinking about it, the malarial strains, and I've seen it effective on the Thai-Burmese border when we're working there, like it's just so effective. But if you don't do it, the correct administration, you don't use the correct administration technique, you're not going to get that purpose. So every step of the way, identification, quality, dosage, administration, all these steps are very... any of those that are lacking. you're going to get an inferior clinical result. Mason: (18:33) Okay, because I love to jump in because it frustrates me when people are going and getting acupuncture. We talk about, a lot here about finding someone practising a classical Chinese medicine verse just straight out of the western taught model and it's a distinction I think is quite, I think it's quite stark. Someone like yourself is going, "Okay. I'm going to now have to go and study by myself after I've gotten trained." Tahnee, my wife, knew your name because I think podcasts you've been on talking about dose, so I really want to hear about that. But you just bring up a couple of things I think are just super significant in terms of when you're working with a practitioner. Mason: (19:21) One, we've brought up the fact that someone could be using a herb and that's any... Of course, we can do that, but it also speaks to the quality of practitioner that we're producing that you not able to get into the mindset and question and understand and see, "Okay, I'm going to be able to chop and change and find what is that energetic of that herb that's not working in this situation, and being able to feel, and be present and be tactile." And you encapsulated that in being able to look, by looking behind you to why the history of this medicine and knowing that the answer's going to be there somewhere if you can not just forge into the darkness. Simon Feeney: (20:03) No, we shouldn't be making... We're not making this stuff up. We are using the history of that medicine. It's the foundation of what we're doing, and I think it's very hard for, because we have huge egos in the west, like we want to be seen as this guru or we want to be seen as these things and I see it every day in Chinese medicine. You see, "Oh, he was wrong and she's wrong," like, man, we're all part of this. We're all part of this medicine and the only way we can make it better is if we work together, we unify and we basically... Mason: (20:40) Everyone needs to listen to a little bit of Vanilla Ice, "Stop. Collaborate and listen." Simon Feeney: (20:44) I wasn't expecting that. Mason: (20:50) It comes up in my head so much because I can't think of the word collaborate without- Simon Feeney: (20:54) Oh, without, oh, that's your relationship. Mason: (20:54) ... singing that to myself. Simon Feeney: (20:54) Yeah, yeah. Nice. Mason: (20:57) And I mean it's the same for me in business. I'm a very reluctant businessman and watching other people come up in the medicinal mushroom space and the tonic herb space, and watching myself that perhaps at times kind of, like I just observe what my reaction to that is, especially when you see such a lack of collaboration going on. And every time I dip into the Chinese doctor world, the herbalist world, acupuncturist world, and I can see there's a lot of passion without collaboration a lot of the time. Everyone's just bickering at each other and bickering about like, "Well, this text says this and my lineage says this," and it's like, I mean... Simon Feeney: (21:41) I mean, we do have that division. I mean, it's just human nature I guess. Politics is in everything. There's politics in an elevator. So that is an issue. It's very much like the martial arts world. This technique doesn't work better, but guess what happens, eventually you kind of get better and better and better. That's the nature of I guess competition in a sense. It was very much like that. They're all, "This guy's next to this guy." If you look at the way it was, like they had booze outside hospitals, just a guy waiting to take your pulse and write your script and get a little bit of money to feed his family. So he had to be good, or he or she had to be good. Simon Feeney: (22:22) And they're always, "Oh... " And I guess the difference is badmouthing other people as opposed to just being good. So you can spend a lot of time, that's what Andy taught me. I said to him, "Oh, I'm so frustrated. Everyone's saying they've got this pesticide test, and said they got this and they got that. They're saying they got the same stuff as us, but I know they don't." And he's like, "Simon. Simon, just let your herbs speak for themselves." Mason: (22:45) Great advice. Simon Feeney: (22:45) I was like, oh, awesome advice. Awesome advice. And that's what it comes down to. Mason: (22:51) And that's walking the path. Simon Feeney: (22:52) It is walking... Yeah, it is. It's tough- Mason: (22:54) I love coming across people like that. Simon Feeney: (22:56) Yeah. Yeah. Mason: (22:57) Because it's tough when you're getting triggered by your shadows. You get up and there's all these mirrors for yourself when you get into business, and if you can rise above, let your herbs speak for themselves, go, "There's more than enough for anyone. I'm championing the lineage. I'm championing people being well." All of a sudden- Simon Feeney: (23:15) Yeah. You're bringing awareness to these issues and it's great. It's what we need. It's what everyone needs. Mason: (23:21) I'm really- Simon Feeney: (23:21) We're trying to get people well. Mason: (23:23) I mean, that's ultimately- Simon Feeney: (23:26) It's for our community, yeah. Mason: (23:26) That's where I slap my palm on my head when everyone starts like, when people reporting each other, going after each other, stealing from each other, getting sneaky covert calls, and then we figure out what's going on and we're like, "Dude, just call us." We help so many young businesses and I talk to people who are bigger than me. I ask them advice all the time, and it's so nice when you can get out of that, there's that combative nature because we're trying to get everyone well. Simon Feeney: (23:59) Yes, absolutely we are. And I think, as you must experience it, it's difficult when you're coming from your perspective, and I think you were mentioning before people are saying, "But you're not this, and you're not that." Mason: (24:12) Not a herbalist. Simon Feeney: (24:13) "You're not this and you're not that." It's tough. People spend a lot of time training and they get protective. Same things happening in our acupuncture industry at the moment. There's people spending five years studying their butts off, taking time away from their families. They're living really meagerly to get their degree in acupuncture and they come out, and then a dry needler opens up nextdoor to them and says, "Oh, acupuncture's not safe," or something, and then they give someone a pneumothorax, and then it's, what happens? An acupuncture needle did this. Yeah, but who was holding the acupuncture needle? Some person who's... Mason: (24:58) What you're talking to there is when there's someone, like there's someone with herbs saying they got the same thing. It's hard if you know someone's potentially going to do damage, like that's if you get out and you know you're in a system and it's one thing to ignore if someone's just doing something measly, but if you know that's going to do damage, how do you not get combative and triggered? Simon Feeney: (25:20) Yeah, yeah. Yeah. So... Mason: (25:21) Because I know dry needle, it's always funny... Well, for me, verse the ultimate institutional herbal practise. This is why I enjoy going out and seeking these conversations with practitioners, with people like yourself that are such experts in the system of healing. And I've learnt how to not justify my existence but yet acknowledge that there's this part of me that is so... I've always been called to just stay away from becoming a practitioner and be... I love being folky. Okay, cool, we've identified, there's like a rise of, [inaudible 00:26:07] identified that this works in a very lifestyle kind of space potentially to keep us out of the practitioner office and then cultivate an ability to respect when something goes beyond your expertise, and then go and interact with a practitioner. I mean, I don't know if you [inaudible 00:26:22]- Simon Feeney: (26:21) Yeah, definitely. I mean, it reminds me of when I... In my 20s, we used to hang out with this Buddhist monk. For years and years, we travelled Southeast Asia unearthing these old manuscripts, and I would spend years... He's one of only two people in the world who can read this stuff, and we would... The stuff that we saw, and I sometimes would bring the script to him and say, "Oh, [Bunty 00:26:48], this one looks really old, is this good?" He's like, "Oh, yeah. That's a thousand years old." And all this stuff was just getting eaten by insects and some of it is just, pertains to really interesting information. This is what started my whole journey. Simon Feeney: (27:01) So one day I gave him... Normally the texts are about two foot long and they're all on palm leaf or etched by hand. This one was only about 20cm long, and I opened it up and it had all these graphs on it and pictures of the body and all these sort of astrological symbols and stuff. And I said, "Bunty, what is this?" And he's like, "Oh, it's a medical text. The reason it's so small is that the monks used to pop it in their robes and then travel with them, " and they couldn't take the big ones because they would stay at the monastery and they would study them. They would study monastic culture... Oh, sorry, the monastic order and things like that. Anyway, spend a lot of time with him and that, and then I said, "What's on it?" And he said, "Oh, this is for, what's that herb? What's the condition where your skin's falling off?" I'm like "Leprosy?" "Yeah, yeah. This formula's for leprosy." "What?! There's a formula here for leprosy in this stuff?" "Oh, there's a lot of stuff in that, Simon. You have no idea, there's a lot of stuff in that." "This has to be known." Simon Feeney: (27:54) So I spent a lot of time hanging with him and learning about all the individual herbs and all the formulations and did all this stuff at a very grassroots level. It came to the point where he said to me, and I tried to raise all this capital through this big project to get all this funding to help him get this medicine protected, get these manuscripts into museums, all this stuff. We digitalized. I spent many, many days and nights getting smashed by mosquitoes digitizing these things, smuggled them out of Burma, all sorts of stuff, and arrested at gunpoint, it was hectic. And it got to a point where no one would take me seriously. No one would take me seriously. Mason: (28:34) Why? Simon Feeney: (28:35) Because I didn't have any credentials. I said, "Bunty, I'm so frustrated that this project would say, Alan, this person wants to know, our investors want to know this or our project coordinator, to get the funding from this we need to have some sort of legitimacy to you." Mason: (28:53) This is when you're going into the healing of disease state. Simon Feeney: (28:56) So I'm working into that. Yes. Mason: (28:56) That kind of thing with these formulas. Simon Feeney: (28:59) Yes. Yeah, and also sort of building projects to support them as a culture as well in terms of books and just... I mean, legitimization basicallY. And so, my teacher said, "Ah, Simon, you go and get paper." And I was like, "What do you mean, Bunty?" "You, I teach you enough for here. You go get paper" So I was like, "Okay." Everything he's ever said to me I've just listened to, and it's good to have someone like that in life. And then I left and I got my... I spent five years getting a piece of paper. Mason: (29:34) Here? Simon Feeney: (29:36) Yeah, in Australia. Yeah. And that's kind of what that was my path, and it depends on which path you're going and I certainly think that there is room for everybody and there's room for being... I think that's... It's just a different path. Mason: (29:52) Yeah, I definitely did... That story's insane. [inaudible 00:29:57]. Simon Feeney: (29:58) Oh, there's lots more. Yeah. Mason: (30:00) Well, let's go, like I'd love to go lots more. I mean, there's a crossroad and I can definitely relate to that crossroad. When you're looking at leprosy and you're looking at these, this is a formula classically done and doses classically done. This information needs to get out there. If you want to go out and start talking about that, you need a piece of paper behind you for sure. Simon Feeney: (30:25) Yes, you do. Yeah, yeah. And it's not for everyone, and I respect people who don't do that just as much. Like Chinese medicine is built on all kinds of people. Actually, the foundations of it come from aesthetics, come from people like [Shen Nung 00:30:40]. Anyway, this guy didn't have a piece of paper, so I'm not saying it's important- Mason: (30:45) You just had a translucent [crosstalk 00:30:46]. Simon Feeney: (30:46) I did have a translucent [inaudible 00:30:48]. And just lots and lots of meditation and lots of time in a cave. Mason: (30:53) Yeah. I mean, I feel like- Simon Feeney: (30:55) There's room for everything. Mason: (30:57) Yeah. I mean, for me, I, at one point, like I'm walking that line where you've got, like I'm going I want to step out of practitioner, and so there's a level of what grandma and grandpa says like, "Oh, no. Take that. It makes you strong." I'm at that point where I'm like for the least this little bit of my path I'm happy just going, "Yeah, makes you strong. Yeah, that'll get you thinking a bit sharper." I don't want to say anything more than that. I'm going to have to know if we've got TGA products where we can only say immunity and those kinds of things, or actually we're able to say like cultivate Jing and things like that. Mason: (31:38) But nonetheless, I'm really enjoying, for me, being at that point where I just sit literally within the kitchen household, and then I had all these, for me, then all of a sudden that opens me up to getting really curious and inviting folks like yourself onto the podcast. And then going, I feel like I can go on an adventure with you. I know my place, and I think that's something that I've liked in going forward with tonic herbalism, non-institutionalised kind of like style of herbal, like it's shoot from the hip, it's grassroots and it's chaotic and archaic, and I kind of like that. But the collaboration at some point needs to happen and they need to get humbled, and I think the tonic or herbal world needs to realise where its edges are. Simon Feeney: (32:33) Yeah, and same with everything. Same with Chinese medicine. I know that I share this with a lot of practitioners whatever they come from, I mean everything from western surgeons to Chinese medicine practitioners is that you have to know the limitations of that. When you come out you're like, "I can treat everything with Chinese medicine." I'm thinking this, right, as a new graduate. There is nothing this medicine can't do, and then you treat it once and it works, and you treat it twice and it works, and you treat it the third time, I've totally got this, and then it doesn't work. Simon Feeney: (33:12) Right, okay. Well, go back to my training, go back to my [inaudible 00:33:16] again. Try this, try that, try this, try that, do more training, you're upset with yourself. You're like, "Why doesn't this work?" Okay, factor all these things in. Yeah, all this, got the best quality herbs, got the best... You can do all this and be the best you possibly did 100%, got this pulse right, I've nailed it. Still can't get a result, why? Don't know. The person might need surgery. So to come to that realisation that... It's a really good realisation, a very humbling experience because you say, "Right, just there is a time and place for everything." Simon Feeney: (33:47) I had a patient with terminal cancer, and I had to say goodbye. That was really tough for the first time it happens. It's so sad when your first patient dies. It's really, really difficult because you think that... I mean, coming from the [Daoist 00:34:11] point of view, you're trying to create everlasting life. Mason: (34:16) Immortality. Simon Feeney: (34:16) Immortality, maybe. And then all of a sudden that happens and it's devastating. It's devastating, but it's very humbling and it just makes you do what you can do. Mason: (34:31) Let's go, I want to hear more about these gooey adventures that you go on where you've gone out of like... You've kind of gone from the diagnostic Chinese... Are you all right? Simon Feeney: (34:42) Yes, yes, yes. Mason: (34:42) Yeah? Chinese medicine too... and there's times when you have limitations and then obviously there's... But you've looked and gone, yeah, but we're not being as effective as we can be because we're not dosing say correctly or there's this... There's not this, like bricks and mortar, it's not just bricks and mortar style Chinese medicine. There's obviously something else back in the classics that you're wanting to bring to the forefront, particular formulas, dosage, or maybe there's something like a tactile, like being more agile within your clinic where you actually face backwards to the past, and therefore you've actually got your finger on the pulse in a sense where you can move rather than just following the textbook and have that kind of skill. Mason: (35:29) I'm curious about that, like I don't know if that's even appropriate what I'm bringing up there, but I get the sense of you... There's this movement and you're part of it going back to these classics which makes you more of a personal... brings more of a humanness and this greater agile skillset to yourself in clinic with that patient. I don't know if that makes sense in that statement. Simon Feeney: (35:50) Sort of, yeah. So I think there is a renaissance in Chinese medicine currently. It's from the west. The west is guiding this because I mean, I could just think of literally like two days ago I got lectured. I'm not sure if I want to bring this up, but look, this is the truth of what happened. I got a lecture. I consider myself a very, not a specialist by any means, but certainly an obsessive, I'm obsessed with the classics. I'm obsessed with this kind of administration, I'm obsessed with understanding these texts, and I was lectured by this lady... Actually, no, I'm not going to talk about that. So, I'm going to change the topic. Mason: (36:40) I don't know even if it helps in that context not talking about that specific situation, but let's see on not with you but in a broader sense maybe bring up where's the clashing of the heads between the renaissance and what's maybe been really institutionalised in Australia in the west and China. Simon Feeney: (36:59) Yeah, definitely. So the way that the TCM model is being taught currently, it's lacking. It's lacking the clinical application. It wasn't until I met my teacher, Arnaud Versluys that I really realised, "Wow. This is really, really good medicine," and I talked to people about his level of pulse diagnosis that he has taught us in Australia to other people who are super experienced and they're like, "That's impossible. You can't have two people feeling the same pulse and coming up with the same conclusion." I'm like, "No, no, no." I've seen it time and time again. I can give you an example, if you like? Mason: (37:35) Yeah, please. Simon Feeney: (37:36) First time I met Arnaud, we had 50 students on either side feeling each pulse. So 50 students feeling the right pulse, and 50 students feeling the left pulse, and he felt both- Mason: (37:47) I can just imagine. Simon Feeney: (37:47) It was awesome. It was awesome. And so, he's just in the centre figure feeling these people's pulses. He's feeling the pulse, writing the script, giving it to them, to the patient. The patient's going over sitting there, and then everyone's trying to feel what he felt, and this is part of the training and part of his training, it's called pulse calibration. So what we're trying to calibrate our fingers to feel exactly what he's feeling. Simon Feeney: (38:06) One of his top students was there and anyway, so there's a patient sitting down and she comes over to the patient and says to the student that's feeling her pulse, "Would you mind if I just quickly feel the pulse? Just wanted to jump in." "Course, no worries. You're the... " So she feels the pulse, and he's like, "Would you like to see the formula?" And she goes "Oh, no, no. It's fine. I just want to check." And then she said the formula name [foreign language 00:38:28]. And he said "Oh, wow. That was pretty good." The student said to her, "Wow, I bet you don't know the dosages," which is kind of being a bit condescending to her. And she's like, "Well... " blah-blah-blah. And she said about one of the doses, she said the [Che Bai 00:38:45] was at 48g. And he goes "No, 24". He thought she got one thing wrong and that was enough to say that she wasn't legitimate, like that was already just super, super... I was just going, "Wow, whatever. I want to learn this." But then she goes, "Oh... " And she didn't take offence to it. Simon Feeney: (39:08) She in fact just went and took the opportunity to feel the pulse to figure out what she'd done wrong, and then she feels the pulse and she's like, "Really? I thought he would have done 48." And he's like... And she said, "Can I see the paper?" "Yeah" The student had written 24. She said "Excuse me, Arnaud. This patient, did you do Che Bai at 24 or 48g?" And he goes through his notes and he goes, "48," and she looked down at the student. She said, "Maybe you need to check your notes." And I was just blown away. I've never seen anything like that in pulse diagnosis, to be able to replicate that, and that's what Chinese medicine is, is replication. But that information and trying to replicate it without diluting it, it takes a lot of effort to say the least. It's hard. It's hard to keep that level of quality going. Anyway, off tangent but... Mason: (40:07) Well, I mean, it's on tangent because I think we are... I mean, especially on the podcast and the people that tune in, we're such, for me, I'm such a fan of Chinese medicine and I'm such a fan of clinical acupuncture, and to see it flail sometimes is really heartbreaking. Simon Feeney: (40:29) Yes, yes. Mason: (40:30) And to hear something like that, it's such a transformation. Immediately, it transforms me into a way of seeing the world that I always, I move towards. I feel like there's a sense, when you look at the classics and you look at the metaphor and the story there's a sense of animism that emerges in me and I can feel the world view and the skillset that a practitioner's going to need in order to be able to come up with the same pulse diagnosis every single time, and I think, what happened? We took out the story, the love, the animism and everyone goes, "Yeah, but that's going to be good because it's going to be [inaudible 00:41:14], we cut out all the shit that's not... " Cut the spirit out basically, and we're going to get more consistency. Simon Feeney: (41:20) Yeah. That's what happened. Mason: (41:20) And the opposite happened. Simon Feeney: (41:20) Yeah. Well, I mean the TCM model is still being taught every day. Look, if you talk to some incredible acupuncturist like David White here in Australia, and these guys are bringing back some of that old acupuncture system, but it died, like it was killed. They killed it. It was dead. Luckily, we had actually had it for herbalism, Chinese herbalism, we had an actual physical thing to touch and to measure. So during the cultural evolution that was actually an opportunity to grow. It was then institutionalised obviously, but some of that old stuff survived. It survived in Taiwan, really. That's really what's made that survival. But it survived in practitioners like my teacher's teacher's teacher, Dr. Tian. Simon Feeney: (42:14) So he lived till 98 basically treating 300 patients a day, and passed it onto a few students and one of those students was my teacher's teacher. And he survived with that same thing even though he went through that period, but he just kept practising the classic, kept practising the classic, practised what his teachers practised and he managed to pass it onto Arnaud, and now Arnaud is passing it onto us. But most of it definitely has been lost to a degree, very much similar to what happened in western herbalism. I remember talking to Jimi, I heard you interview Jimi and he's- Mason: (42:49) Love him. Simon Feeney: (42:50) He's a great guy. Yeah. He- Mason: (42:52) That's Jimi Wollumbin, everybody. Simon Feeney: (42:54) Yeah. Mason: (42:54) Yeah. Simon Feeney: (42:54) Yeah, he called me up one day just out of the blue and we just started talking, and I was like, "Wow, I could talk to this guy for a long, long time." So, yeah, very interesting, and I think he was sort of illustrating that as well, kind of that massive loss of herbalism, and then I think people like him are really kind of bringing that back to western herbalism, seems to me. Mason: (43:15) Yeah. Simon Feeney: (43:16) Seems to me. It's needed. Mason: (43:16) And likewise yourself. Simon Feeney: (43:17) Yeah. Mason: (43:18) Having these conversations when... Well, I mean for you especially, and I know we won't go too much into it, you're really playing in both worlds. Simon Feeney: (43:26) Yes. Mason: (43:26) You really got your foot... You're rubbing up against the way that TCM is being taught here. Simon Feeney: (43:32) Yeah. Mason: (43:34) Directly with the new- Simon Feeney: (43:35) Yeah, a lot of people get upset with me, unfortunately. Yeah. Yeah. Mason: (43:37) It's kind of fun, isn't it? Simon Feeney: (43:38) So you're thinking, welcome to my world. Mason: (43:39) [crosstalk 00:43:39] world. I mean, I kind of tell people regularly. They're like, "How often does it happen that you have someone contacting you and getting upset?" I'm like, "I don't know why, not often." Simon Feeney: (43:53) Oh, good, good. Yeah. Mason: (43:55) But I don't know why. I think because I was beaten by the press and I think and try and have a conversation with myself to be like, "What am I doing that rubs up against the wrong way of... " and it's the TCM people, or even my classical acupuncturist. He gets upset at me sometimes because he's moved away now so, people, you can't ask me for his name because everyone's looking for that classic like, "Oh my God, you got a classical acupuncturist in the area? Can I have his name?" You know, for having like a few individual herbs, and I'm like, "I get it." I'll sit down and have a discussion of my rationale or where I was when I brought them into the range and now, how they're being used and how practitioners are using, so on and so forth. But I would much prefer to have it than leave that conversation in the shadows. Simon Feeney: (44:47) Yeah. I think it's probably just jealousy for other people. I think they're probably just jealous of your success and that's not very attractive for those people. Mason: (44:58) It's weird. Simon Feeney: (44:59) But I think bringing this awareness to people in Australia is necessary. I think it's great what you've done, what you've achieved. I've seen your place now, it's really great. Well done. Yeah. I think it's great, yeah. Mason: (45:12) Thank you very much. I really appreciate it. I think part of the mission is on the sidelines it can be the joker scallywag bringing attention to what you're talking about, to what Jimi Wollumbin is talking about. Do you know Rhonda Chang? Simon Feeney: (45:25) I don't, no. Mason: (45:25) I'm going to see if I've got a spare one of her books to give you. She's got a book called Chinese Medicine Masquerading as Yi. Simon Feeney: (45:33) As? Mason: (45:33) Yi. Simon Feeney: (45:33) Oh, yeah. Okay. Mason: (45:38) Blows it out, like documenting exactly how this new TCM is an invention that came about in the 50s. Simon Feeney: (45:46) Yes, yes. Yeah. Mason: (45:48) And I'm sure none of it's going to be news to you. Simon Feeney: (45:50) Yeah. Well, it's funny, I was talking about the, even on the weekend someone was talking about some basic concepts like chi, people still think it's energy. You look at the translation, it's really fair. So these kinds of ideas are very new to the western Chinese medicine practitioners. It's very hard to understand that, because a lot of people come into the medicine with a very romantic view of what Chinese medicine is and can do. I was the same. I was very, how herbalism they can treat all this stuff, but then when you really start to practise and you realise it's not as... You've got to be very pragmatic about it, you've got to be very systematic about it, you've got to approach it with a clinical mindset. It's a very different thing, a very different way of thinking about it. Simon Feeney: (46:47) But when you see how it connects with natural phenomena then you can actually reconnect with that whole idea. When you start to understand that, for example, you learn about different conformations, or just the translations. So for example, like the six, they call the six channels, they used to call the six channels or the six meridians or the six systems or the six warps. It just gives you a... It's very planned, and you can learn it like that. I'm talking about Tai Yang, Yang Min, Shao Yang, et cetera. When you translate it a different way, which is we translate it as conformations which is the way my teacher, Arnaud, translates it. It takes on a whole different perspective. Simon Feeney: (47:29) So a conformation is something that's... It's vessels that are conforming to natural phenomena. So all of a sudden you're looking at it from a natural perspective and you're looking from a metaphoric, you're using natural metaphors to understand the body because we are just the microcosm of the macrocosm. And then you can get that whole romantic perspective and artistic perspective of what the medicine is. It returns, but it's only due to this renaissance that we're going through at the moment. It doesn't happen in the current model that's taught, but it's like everything, probably the same as accounting, I don't know. Mason: (48:15) I mean, the world of numbers, I know there's a... I know, I've got friends that are sacred mathematicians [crosstalk 00:48:22]- Simon Feeney: (48:21) Yes, exactly. There you go. Well done, exactly. Well said, yeah. Mason: (48:27) Yeah. It is exciting. It is exciting feeling the story-telling and the metaphor and the alive, spiritually alive world can- Simon Feeney: (48:38) It is. It's living and breathing. You feel it when the pulse changes. When you give someone a formula and their pulse changes and you go, "Whoa!" Or the seasons change, you feel it in their pulse. It's awesome. Mason: (48:48) I mean, and I know what happened to the water. Simon Feeney: (48:51) Yes. Yes. Mason: (48:51) I can feel that. Was it like- Simon Feeney: (48:52) Yes, it changes. Things change. Everything courses and lives and breathes. Mason: (48:59) It's nice to see that, it's so simple. It's something that's so, it's so looked down on to have that romantic, that animism, yet you should have that with extreme structure and discipline at the same time. Simon Feeney: (49:17) It does. It's both of those things simultaneously, and that Daoist medicine. That is the interaction and the mutual exchange of yin and yang and the cosmos, it's good. Mason: (49:31) And the people that feel it, they feel the lineage. Simon Feeney: (49:34) Yeah, it's very, very... It's in you. Yeah, absolutely. You practise it, and that's why it's kind of protected. Mason: (49:42) I'd love to just go down that rabbit hole maybe hear some more adventures along the way, especially around the dosing. As I said, Tahnee knew you. Simon Feeney: (49:51) Yes. Dosage stuff, yeah. Mason: (49:53) Yeah, heard your stuff and I mean, if anything can go to the difference between something not working clinically and working clinically... Simon Feeney: (50:01) Yeah. Mason: (50:02) Transformational. Simon Feeney: (50:03) Yes, it's huge. Yeah. So that whole dosage journey started when I started to make those classical pills. So a good example is MaZiRenWan. It's a hemp seed pill that's used for chronic constipation and inflammation in the small intestine, and that formula when I was trying to physically make it, because this is what I was trying to do. I wanted to use the, this back to this kind of original dosage but as an administration technique, so I was trying to use the administration techniques to be the way they were originally used. As I mentioned before with Artemisia, these kinds of factors are really, really huge. Simon Feeney: (50:41) So you have Tang, Sans and Wans. So Tang's a decoction, so it's much more for sorting the organs clean, a very acute medicine. Sans are the powders, and they're for things that you need a little bit of hydrochloric acid to absorb into the body. And then Wans are pills, so they're much more chronic issues that have to be gently administered into the body or you want them to slowly get into the bloodstream. So you use honey, acts like a slow-release mechanism so it helps the herbs to stabilise, not get affected by the hydrochloric acid and absorb through the walls of the small intestine, straight into the bloodstream, straight into the liver, and then systematically. Simon Feeney: (51:20) So, I didn't want to use Wans as Tangs and Tangs as Sans and Sans as Tangs or Wans. I wanted to use them according to the classics, so then I have to make them. So, go to the textbook, go to make them, read the current dosages, like this gramme equal this liang, this is this gramme, make it, slop. What's going on? Try a different formula, totally dry. How am I going to roll this into a pill? Simon Feeney: (51:51) Now, I'd made medicine with my teacher on the border in Burma and Thailand, and I made boiled pills with him. I'd seen everyone, I'd hang out with the monks in the temples, breaking, grinding up herbs. I'd been doing that for years, learning all these techniques. I went "This is not right. Something's not right here." So, then I went "Okay, well, like you do, foundational medicine. Go back to the foundations." Went back to the foundations, what were the dosages? Oh, it's one liang of this, I have no idea what that is. It's half a jin. Well, I don't know what that is. It's one jin. Well, at least I know that half a jin, if I figure out what a jin is, I can figure out what half a jin is. A zhang? Don't even know, that's like a volume measurement? And then a [chur 00:52:35]. A chur is just a foot of something. I'm like, what the hell am I doing? How am I going to make this formula? Simon Feeney: (52:43) So, okay, what is a liang? Because I knew that eight liang is one jin, half a jin will be four liang, et cetera, et cetera. Then you have these fen measurements and zhu measurements, and all these old measurements. I read every book I can find about this measurement stuff, and then I start going to the people who I feel like know the most in the English world, and even found some Chinese text. One liang equals 15.625g, and I'm like, "That's pretty precise." Simon Feeney: (53:17) My dad's a PhD in algebra and he taught me at a very age about all sorts of mathematical things, so I was obsessed. How come everything thinks it's 3g when he's saying, and these people are like the authority, it's 15.625. So find out that, I mean how much do you want to know? Do you want me to... Am I boring you? Mason: (53:37) I mean, I'm fascinated. Simon Feeney: (53:40) Okay. Mason: (53:40) Screw everyone listening, I want to hear you. Simon Feeney: (53:43) I'm not sure this is right for your audience, but even if it's just for me and you... Yes, I mean, I don't care if you- Mason: (53:47) No, go for it. You'll be surprised at how much they'll be loving this. Simon Feeney: (53:53) Okay. So, yeah, 15.625g. So it turns out that this weight system comes off an old measurement system, so it's this old bell and you need to use a pitch pipe to tune the bell and it's called a Huang bell, and you use this pitch pipe that's cut with a particular size of bamboo. You know, how you got the knots in the bamboo and the gap? So then they create this at different sizes, and would create a different tune, right, when you "hoo". You... whatever, blow on it, right? Mason: (54:20) When you hoedown on it. Simon Feeney: (54:23) So in order to figure out how high that had to be, it was based on putting pieces of broomcorn millet inside this thing, and 1200 of those would be where you cut it off to make the pitch for the bell, this is a ceremonial bell. Turns out 1200 of that is 12 zhu, and 24 zhu is one liang. So I went and became a specialist in black broomcorn millet because of course that's what you do. Mason: (54:56) Of course, that seems so obvious. Simon Feeney: (54:58) Then I counted... It was such an obvious conclusion, right. So I had to find not only that but I had to find black broomcorn millet that was produced in the Han dynasty, which was an interesting process. Counted them all out, 1200, weighed them all out, 7.8g, right, 15.625, that's how they came up with the conclusion. So I was certain that's what that dose was. Mason: (55:17) There's no industry for this in the Han... Where did you say was it? Simon Feeney: (55:20) In the Han dynasty. Mason: (55:21) In the Han... Simon Feeney: (55:22) Yeah. Oh, sorry. Mason: (55:22) Like where were you sourcing the millet? Where did you say you had to go and source it somewhere in China? Simon Feeney: (55:26) Oh, basically just research. Yeah, just extensive research into the growth patterns of black broomcorn... because I didn't want to know that the size was different. Like the wheat grain had changed, it's different. The size, so if I'm counting them individually... Mason: (55:39) That's what I'm thinking, yeah. Simon Feeney: (55:40) Yeah, yeah, yeah. So we're talking about a volume measurement with something that could be potentially bigger or smaller. So, long story short, I started to figure out what a liang was. Then I could find out what a jin was, and half a jin was, and then this, and a zhu and a zhang. Put it all together based on those weights, perfect pills. Mason: (55:59) Do you know where the- Simon Feeney: (56:00) Like, yeah! Mason: (56:01) Like that is [crosstalk 00:56:01] I'm feeling [crosstalk 00:56:02]. Simon Feeney: (56:03) Yeah. It was good moment. Mason: (56:05) You're looking at your dad about how elated he was when he got like a massive formulation and you're like, "I get it." Simon Feeney: (56:11) Yeah. It was a revelation, yeah. Mason: (56:15) Where was the crux point where it's gone away from these forms of measurements? Where has the standardisation occurred that led to such dramatic poor translations on the formulas? Simon Feeney: (56:28) What an awesome question. I mean, gosh that's complicated. So many factors. I mean, every factor from... As we mentioned earlier, quality to so many species differentiation, change in the environment, change in climate, lifestyle, people's... In the Han dynasty [inaudible 00:56:48] are living in huts versus living in air conditioned housing, so the strength of someone's digestive system that could cope with that compared to now. So that's one theory why it kind of got reinterpreted, but then if you look back through the dynasties each measurement system sort of changed, and then there's conflicting arguments, and then it kind of... and let's just all, just a big discussion. Simon Feeney: (57:15) And so, there's sti
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 50 today we are discussing about Switches.Now hubs were originally used to connect devices on a network.All of the devices will be connected to a hub,and anytime something went into one port of the hub,it would then repeat that out all of the other ports.This was known as a broadcast message.Now this is because hubs were dumb.They had no intelligence.As networks got larger,hubs caused a lot of collisions and slowed down the network.To solve this problem,something came along called a bridge,and this was used to separate physical LANs or WANs into two logical networks,or connect two logical networks together.Now switches are the evolution of hubs and bridges.Essentially every single port on a switch acts as if it was a bridged hub on each one.This means that it improves the data transfer and security through the intelligent use of MAC addresses.Being able to figure out where a device is and only sending the information out that particular port of the switch and ignoring the rest.This reduces traffic and increases security.Now switches are subject to three main types of attack though.They are subject to MAC flooding, MAC spoofing,and physical tampering.This is because they're trying to overcome that logic and intelligence that the switch has.MAC flooding is an attempt to overwhelm the limited switch memory that's set aside to store the MAC addresses for each port,and this is known as the content addressable memory,or CAM table.Now if a switch is flooded, it can fail-open and begin to start acting like a hub and broadcasting data out every single port.This is a problem that can start causing confidentiality to be breached inside your local network.Now MAC spoofing, on the other hand,occurs when an attacker masks their own MAC address to pretend that they are having the MAC address of some other machine on the network.For example, wireless access points may use MAC filtering to prevent devices that are unknown from joining the wireless network.They do this my looking at their MAC address that's being reported,and if it's not inside their access control list,they'll block it from connecting.Now if I switch my MAC address to a known or allowed device,I can gain access to that network though by spoofing.I pretend that I am an authorized device using a known good MAC address,and I pass right through that ACL.MAC spoofing is also sometimes combined with ARP spoofing.ARP is an address resolution protocol,and it relies on the MAC addresses as a way of combining what MAC address goes to which IP,and which IP goes to which MAC address.So they often combine a MAC address spoof with an ARP spoof as an attempt to be able to have the attacker appear that they are the destination that somebody is trying to send information to,and use that as a way to steal that information.Now to prevent this,you have to configure your switch to accept limited numbers of static MAC addresses,limit the duration of time that an ARP entry is allowed on a host,and conduct ARP inspections.To keep track of what ARP is being used with which MAC address and which IPs.The third type of way to overwhelm a switch is to use physical tampering.Physical tampering occurs when an attacker attempts to gain physical access to the switch,because if you can touch a device,you can pretty much configure it to do whatever you want.Now to prevent physical tampering,the switch should be locked up in a network rack, or a network closet,or behind closed doors so that, that room is secure using good physical security practices.
WHO YOU GONNA CALL? DIE WARRENS!1982 treffen die Dämonologen Ed und Lorraine Warren bei einem Auftrag in Brookfield, Connecticut, auf etwas, das sie noch nie zuvor gesehen haben: Nach dem herausfordernden Exorzismus des achtjährigen David Glatzel begann Arne Johnson, der Freund von Debbie Glatzel, ein immer seltsameres Verhalten zu zeigen. Wenige Wochen später gabelt eine Polizeistreife den jungen Mann blutverschmiert mitten auf der Straße auf. Er wird inhaftiert, da ihm der Mord an Debbies Chef vorgeworfen wird. Vor Gericht sagt er jedoch aus, der Teufel habe ihn dazu gezwungen. Nun liegt es an den Warrens, auf die Suche nach dem diabolischen Ursprung für Arnes Taten zu gehen.Man kann wohl ohne Zweifel sagen: Zwischen 2003 und 2013 hat sich JAMES WAN mit Franchises wie SAW, INSIDIOUS und CONJURING in die Herzen der Horror-Fangemeinde geschauert. Letzteres haben die Warner Studios sich als Kassenheilsbringer des Mainstream-Horrorkinos auserkoren und neben zwei Hauptteilen bisher schon fünf(!!) Spinoff-Ableger aus dem CONJURING-Universum auf die Menschheit losgelassen, dass Wans einst für seine atmosphärische Auffrischung traditioneller Geisterhausspielereien gelobte Arbeit wohl nur noch Gelegenheitsgrusler hinter dem Ofen hervorlocken konnte. Doch die Hoffnung stirbt zuletzt: Im Juni 2021 konnte endlich nach monatelangem Aufschieben THE CONJURING: THE DEVIL MADE ME DO IT in den US-Kinos anlaufen - und auch in Deutschland schielen Fans hoffnungsvoll auf eine Kinoauswertung am 1. Juli 2021 (unter dem Alternativtitel CONJURING 3: IM BANN DES TEUFELS).Kann nach den seelenlosen Spinoffs der dritte Hauptteil das CONJURING-Franchise wiederbeleben?Erfahrt alles dazu in der neuesten Folge vom Trashtaucher, dem Trashfilm-Podcast!*WARNUNG: DIESES REVIEW ENTHÄLT SPOILER!*Bildmaterial: © Warner Bros. Entertainment Inc/michael-chaves.comIntro-/Outro-Song: © Aidan Finnegan (https://soundcloud.com/triadaudioofficial)
Welcome to the latest episode of Check-in, where we're discussing ‘wide area networks', or ‘WAN' as they say in the IT industry. WANs are used to link multiple sites (for example businesses and universities) and are different to the ‘local area networks' that we have in our homes. In a nutshell, it's all about users being able to share resources and communicate more efficiently, so to help us get a better understanding of how WANs can make an impact at airports, Vanderlande's Darren Durham joins us on the line.
Nesta segunda é dia de Insight com a presença de Daniel Carvalho Luz e também Wan Piess que fala sobre andar a pé, saúde, memória e história. Ouça e compartilhe.
Simon previews an Inspiring Minds event this weekend featuring Terrell Edmunds, Jim Tressel and more. See omnystudio.com/listener for privacy information.
25th episode of Packets and Bolts: The podcast about technology, life, philosophy, and everything in between. Tonight we discuss Software Defined Wide-Area-Networking (SD-WAN). Does your WAN seem tired, worn out, dull? Then SD-WAN might be for you. Love to sink a lot of cash into buzz words? Then SD-WAN is right up your alley... Set your network monitoring to auto pilot and grab a drink. Let's talk about WANs.... *** Packets and Bolts - Bringing AM radio to Podcasting since 2019...
Charlie Gawley, Tieline VP of Sales, joins David Rusch of Audio Broadcast Canada on this sponsored edition of Broadcast Dialogue - The Podcast. The Tieline Gateway is a powerful DSP-based 1RU IP codec enabling transport of multiple mono or stereo audio channels across the public internet and any QoS-enabled IP network, including T1 and T3 connections and private WANs with MPLS. The Gateway streams up to 16 IP audio channels with support for AES67, ST 2110-30, AES3 and analog I/O as standard.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In 10 o'clock hour, Brendan King talks to Pat Boylan about the Pacers game against the Suns Saturday night. Bryan Sullivan from WANS talks New Albany's 49-37 win over Jeffersonville and John Herrick calls to talk about the Mt Vernon Marauder's 67-52 victory over Greenfield Central. Also Heritage Hills coach Nate Hawkins joins the show to discuss their win over Gibson Southern 73-39. Colts insider Kevin Bowen also calls Brendan King to talk the Colts Playoff matchup against the Bills on Saturday and get an update on the injury report. Plus the play by play voice for the Indy Fuel Andrew Smith talks the Fuel's season to this point and their overtime win over Greenville 6-5. Plus Smith talks the upcoming NHL season. See omnystudio.com/listener for privacy information.
What is the Difference Between LAN, WAN, and MAN Networks? Network systems is a computer technology that enables computers in a local or a wide area to communicate with each other. This technology is divided into some definitions according to the area it covers and the type of physical connection. These are LAN (Local Area Network), MAN (Metropolitan Area Network), and WAN (Wide Area Network). Local Area Network (LAN) It is a type of private network consisting of a group of computers and network devices within a small geographic area. Often an office is used to describe a network of computers located several buildings away from each other. The criterion here is that the computers are close to each other in general, rather than how many computers the network consists of. Home, office, school, hospital networks can be examples of local area networks. Twisted (ethernet) or coaxial cables are generally used in local area networks. Since the distance is short, the speed is high and the noise ratio is lower. Metropolitan Area Network (MAN) MAN is a type of network that covers more areas than LANs and less than WANs. It is a type of network that connects networks that are usually hosted in the same cities but in different geographic regions. Networks covered by Internet Service Providers (ISPs) in a city can be an example of a MAN. Due to their location in different geographical areas, their speed will be lower than LAN. Wide Area Network (WAN) It defines a network created by connecting many LANs to each other via the Internet over a wide geography. Internet service providers perform the task of connecting multiple Local Area Networks. The local area networks mentioned here can be in many different parts of the world. Optical cables or satellites can be used for transmission. To compare, WAN covers a much larger area than LAN and MAN. It is more difficult to design and maintain than LAN. Since it can send information to much more distant geographic locations, its speed is slower than LAN and MAN and its error probability is higher. LAN has exclusive use. It is faster than others and less likely to fail. It is easier to install, maintain, and manage. MAN sits in the middle of the LAN and the WAN in terms of coverage and speed. More Podcasts The LAN Network in Google Podcast The WAN Network in Google Podcast The Internet in Google Podcast The WAN in iHeart Podcast
WE.ARE.NOT.SCIENTISTS - THE PODCAST FOR THE INFINITELY CURIOUS Join verified non-scientists LP, Krystel and Simon as each episode they tackle one topic of discussion related to space and science. In Episode 4, the W.A.N.S. gang discuss all things TIME.....impossible to do in under 25 minutes? You be the judge..... If you have a cosmic quandary or brain scratcher you'd like to ask LP (and get mention in an episode - woooo!), email us at wearenotscientists2001@gmail.com or follow @wans2001 on Twitter. Check out our fun promo! twitter.com/wans2001/status/1372212773640417
What is WAN (Wide Area Network)? A wide area network, WAN, is a network established for the communication of more than one device in a wide area. It covers a much larger area and often a lot more devices than a LAN connection. The most popular of this network, which covers cities and even countries, is the Internet. In general, most WANs are connected to the Internet. However, in some special cases, private WAN can be used. We can think of WAN connections as a combination of LAN connections. Local links join together to form larger-scale connections. However, when making this combination, connections such as link antennas, gateways, satellite connections are required. As with other network types, the most basic usage purposes are data sharing. To be more precise, it is to facilitate and speed up data sharing Otherwise, data transfer was provided before these network systems. Data transferred with different external devices can now be transferred with the help of a single button. One of the disadvantages of the Wide Area Network is that it is usually a little slower than the Local Area Network. The most important reason for this is the high number of users. In the Local Area Connection (LAN), there is a more limited number of users and naturally a more limited operation. However, the same is not the case for WANs that are installed in a very large area. The more users and transactions are made, the more the system slows down. There are various solutions to these slowdowns. You can increase the user capacity of the network by increasing the bandwidth. However, it is difficult to reach any LAN connection speed. More Podcasts Podcast, the LAN Definition in Anchor Podcast, the Internet Definition in Anchor Podcast, the Ubuntu Definition in Anchor Podcast, the Ubuntu OS in Apple Podcast, the Linux OS in Apple
WE.ARE.NOT.SCIENTISTS - THE PODCAST FOR THE INFINITELY CURIOUS Join verified non-scientists LP, Krystel and Simon as each episode they tackle one topic of discussion related to space and science. In Episode 3 we discuss all things MOON. Well, all things Earth Moon anyway. And Simon finds out the perils of stepping out onto its surface in just his shorts and t-shirt - and flip flops. If you have a cosmic quandary or brain scratcher you'd like to ask LP (and get mention in an episode - woooo!), email us at wearenotscientists2001@gmail.com or follow @wans2001 on Twitter. Check out our fun promo! twitter.com/wans2001/status/1372212773640417
WE.ARE.NOT.SCIENTISTS - THE PODCAST FOR THE INFINITELY CURIOUS Join verified non-scientists LP, Krystel and Simon as each episode they tackle one topic of discussion related to space and science. In EPISODE 2 we discuss all things androids. What are they? How will they impact the future? As always, LP has all the answers..... If you have a cosmic quandary or brain scratcher you'd like to ask LP (and get mention in an episode - woooo!), email us at wearenotscientists2001@gmail.com or follow @wans2001 on Twitter. Check out our fun promo! twitter.com/wans2001/status/1372212773640417
WE.ARE.NOT.SCIENTISTS - THE PODCAST FOR THE INFINITELY CURIOUS Join verified non-scientists LP, Krystel and Simon as each episode they tackle one topic of discussion related to space and science. In EPISODE 1 we discuss a nice, cuddly subject, 'Animals in Space'. Plus we learn about how being a fan of dystopian stories can make you better prepared in times of crisis, and also find out if LP knows his mice from his fruit flies. If you have a cosmic quandary or brain scratcher you'd like to ask LP (and get mention in an episode - woooo!), email us at wearenotscientists2001@gmail.com or follow @wans2001 on Twitter. Check out our fun promo! twitter.com/wans2001/status/1372212773640417
Dowcha Donie is driving the posh wans mad horny with his chain, and much more…
As the lockdown progresses, the material required for an entertaining podcast continues to be hard found, but we'll keep at it.
Differences between genders, an Indian sweets tier list, and Cars. Just a standard discussion on a live-stream, been a bit since we did an episode like this. Hope you enjoy this minor throwback. https://www.instagram.com/maadwans/
MONEY FM 89.3 - Prime Time with Howie Lim, Bernard Lim & Finance Presenter JP Ong
Over 70% of Asian companies surveyed by Robert Walters are looking to internationalise in the coming three years. In Singapore, according to an SBF survey, 71% of businesses have scaled their operations to markets worldwide and they recognise that innovation is vital to stay ahead of the curve. Cloud is driving the digital transformation journey for almost every organisation in business today and for the future. An enterprise wide area network (WAN) is one of the first areas of a business that will feel the impact. At the most fundamental level, any downtime of the network is money lost. For example, if a company with employees in Singapore holds a video conference across its three ASEAN offices concurrently on a traditional WAN, a consistent good user experience is not guaranteed. How can businesses rethink their WANs to quickly bring new overseas branches online, improve speed to market and enhance user-experience? David Hughes is CEO and founder of Silverpeak, which develops products for Wide Area Networks and he joins us today.
It's all about the Art of Networking, and no, we’re not talking about computers, LANs, and WANs. This show is all about about human - or business - networking. Is it worth it? A waste of time and/or money? Sarah Phipps joins Chris and Josey this week to discuss all things involving human networking. TOPICS - Different types of networking - The costs, both in time and money - Do we need to network? - Should employees of larger companies network (question from our live audience) - How to get started - ....and more! MUSIC FROM THE CCMIXTER COMMUNITY Snazzy Intro: On Top of the World by texasradiofish (c) copyright 2015 Licensed under a Creative Commons Attribution Noncommercial (3.0) license. http://dig.ccmixter.org/files/texasradiofish/50478 Ft: John Fletcher, Patricia Edwards, ElRon XChile, Speck, alexplaysguitar Live Show Starting Soon: cdk - Sunday by Analog By Nature (c) copyright 2016 Licensed under a Creative Commons Attribution (3.0) license. http://dig.ccmixter.org/files/cdk/53755 Live Show Outro: MILLENNIALS by Analog By Nature (c) copyright 2018 Licensed under a Creative Commons Attribution (3.0) license. http://dig.ccmixter.org/files/cdk/57150 Special Guest: Sarah Phipps.
This week on the podcast, we bring in networking guru Richard Scheffenegger to discuss how networking performance over long distance WANs is crazy fast thanks to the implementation of CUBIC TCP in ONTAP 9.6. Dan Isaacs also joins us for a discussion with Richard about RDMA.
Wide Area Networks (WANs) served as the trusted means for connecting across long distances that joined organizations’ data centers with their remote branch offices. While the complexities, costs and limitations of WANs hasn’t changed over the last three decades, the enterprises’ needs have. Today, businesses operate critical applications in the cloud, have bandwidth-hungry and latency-intolerant real-time communications and collaboration, and need to control communication. And they need to do all that securely, efficiently and cost effectively. Enter SD-WAN – or software-defined wide area networks – a technology that resolves the WAN challenge by providing the dynamic controls that truly put the network at the service of the business. In this episode of the Ask Selma podcast, we’ll explore not just how it works but why it works for organizations that need a better way to connect their systems and their data. Selma Wei, Citrix Chris Gonsalves, The 2112 Group Special Guest: Ronan Murray, Director at Edge7 Networks
Cloud and Cloud computing is in the news and we'll talk about what is going on and what to expect Do you sell things online off a website? If so, you have to listen in to find out what the IRS is doing, right now, it's going to drive you crazy. It's update time! Microsoft is out with their April update, known as 1903 or 19h1. It has some nice Windows Update policy features. What are Cybercriminals up to now? They are using new tactics that bypass traditional email security, So listen in to find out more It's bad enough that cybercriminals are attacking us and stealing out information but now these Bad guys are stealing money right out of bank accounts. Do you know what a Denial-of-Service or a Distributed Denial-of-Service attacks are? Well, the FBI and Secret Service trying to shut down criminal organizations who are using them in a big way, we'll talk about what they are doing today. Are you a C-level executive? It is time to remove your cybersecurity blinders -- Cybersecurity is no longer an IT problem it is a boardroom level problem and scary one when you get right down to it. Cybercriminals are using brand impersonation now and it's it costing companies a lot of money For all this and more tech tips, news, and updates visit - CraigPeterson.com --- Transcript: Below is a rush transcript of this segment; it might contain errors. Airing date: 04/06/2019 FBI Shuts Down Denial Of Service Attacks - Supreme Court Ruling Will Affect Every Business Craig Peterson 0:00 Hey, hello, everybody, Craig Peterson here. And it looks like my math was wrong. You know, last week I said, I thought we were coming up to the 1,000th week of being on the air. Actually, we weren't coming up on it, it was the 1000th week. So this is our One Thousand and One weeks of broadcasting, and this week, we're going to have a few different radio appearances, as I usually do all be on with Jack Heath on Monday, but because I'm going to be busy this week, as well, actually, I guess, this week? No, I'm not going to be on with Jack on Monday. But I am going to be on on other stations Tuesday and Wednesday. Okay. So anyhow, we passed 1000 weeks, you can do the math, that's a lot of years on the air. I don't know if that makes me old. It's certainly kind that makes me feel old. But you guys, man, I appreciate you. I appreciate everyone who listens, and everyone who subscribes to my podcast. And you can do that quite easily by going to http://CraigPeterson.com/iTunes. Leave a comment. Hopefully, I've earned a five star from you guys. And that'll help get the show out so more people are aware of it. Craig 1:26 So let's get right into the articles this week. as is true every week, I send these things out on Saturday morning. So you should get my show notes-newsletter, and that'll keep you up to date. Let you know about the latest security problems that have arisen this last week and other things in the tech biz and tech world that I think are interesting. So number one this week is from Infosecurity Magazine. And it's talking about cloud and cloud computing, we'll get to that in a few minutes. The U.S, man, if you have a website, if you're selling things online, you got to hear what the IRS is doing right now. Craig 2:08 And man, the internet tax stuff, it's going to drive you crazy. There is a new update here for Windows coming on. Well, it's the April update. And it's known as version 1903 or 19h1. Craig 2:26 But it's going to have a new Windows Update policy. And it's going to let you if you are a big organization that is using the group policy editor, basically, you have an Active Directory server and you have group policies for your various accounts. Craig 2:46 Excuse me, this, the policy is supposed to allow you now to specify deadlines for automatic updates, and restarts. Now if you don't have the Windows 10 professional, you're kind of stuck as it is right now because you can not, I repeat, can not specify when you want updates to be applied and how long you might want to wait. And we've certainly talked about that on the show before. But it's going to give IT admins a lot more control, especially when managing larger fleets really of devices, number of Windows devices, so it should be pretty good. And I have some details on where you'll find it in the menus there on my website at http://CraigPeterson.com. And Softpedia has really quite a nice little thing about the whole thing. But basically, you as an admin can set a deadline for installing updates as high as 30 days. Usually, I recommend about seven days, five to seven days, because that lets you get past the initial problems that often accompany these updates from our friends at Microsoft. And the auto reboot can be anywhere from zero to seven days following that. Craig 4:08 Now, this feature is something that was available only in the pro version. And now it's available across the board if you are using group policies, okay? The latest tactics used by cybercriminals will talk about this. And this is bypassing traditional email security. Craig 4:27 And where do most IT professionals feel vulnerable when it comes to bad guys and attacks and stealing our information, stealing money literally right out of bank accounts. Well, we'll talk about that too. But first, I want to get to an article I love the title of this. This is out of the UK, it's from The Register. It's called Silence of the WANs, which I thought was just very clever. The FBI has been working hard to shut down criminal organizations, so has the Secret Service. I've talked with both of them before about what they're doing and how effective they have been. And one of the problems we talked about in my cybersecurity course, was something called a denial of service attack and distributed denial of service attack. And we talked about how to prevent them, how to stop them, and how to make your life so much easier. And we, of course, concluded that class, it's not open, you can't get into it right now, because I'm not conducting it right now. But denial of service attacks is absolutely huge. And the FBI just busted a massive attack and network about two weeks ago. Craig 5:45 And this was just amazing. Because the traffic loads plummeted after the FBI took these guys out. And some of them were right here in the US. You think most of the time that there may be in Russia or, you know, some Eastern European country, maybe India, you know, the normal places these things come from. But the December of 2018, the FBI really started pushing trying to figure out who was running the distributed denial of service attacks. Now, here's what how a DOS works, the denial of service attack. Craig 6:25 Someone, usually it's either a competitor or more often, it's someone that disagrees with your company. So a company that maybe has some sort of a political stance or donated to a charity that somebody doesn't like, they will start sending dozens, hundreds, thousands of requests to a web server, this is just a simple explanation, okay. So they'll send all of these to the web server, the web server becomes overloaded. It may crash or may not crash doesn't really matter. But because it has so many requests coming in, it cannot serve the normal users. So, people who are coming to your website to find out more about you may be to place an order, maybe to get some of the information that you're providing, they cannot get there because of the denial of service attack that's going on. Well, there is a worse type of denial of service attack, and it's called a distributed denial of service attack. Because bottom line, if there's only one machine that's attacking you, it's pretty darn easy to put a filter in place to block that machine from getting to you. That makes sense, right? Well, if you have 100, or thousand machines that are all sending data to you becomes much more difficult to stop. And that's the whole idea behind distributed denial of service attacks. Craig 7:55 So they FBI worked with a mitigation provider called Nexusguard. And they've been tracking this stuff. And they're saying both the overall number of attacks and the volume of the data fired at the targets to overwhelm them is down and it's measurably down because the FBI wiped out 15 of these denials of service mercenary sites. Some of them are run in America, some of them are run overseas, but they allowed people to purchase the temporary use of the massive button that's of compromised devices. Right? Isn't that what I'm always warning you guys about? That's part of the reason you got to keep his machine safe. Because millions of machines have been compromised. They have remote controllers on them. The owners of the machines just aren't aware of this because they're not paying any attention to security. And then they hire your machine now to use to attack a third party. They use your machine to mine for Bitcoin to make money for them. They use your machine to distribute kiddie porn, pictures and videos of Americans being beheaded. Okay, how many times we have to talk about this everybody? So these massive botnets were in turn commanded to create massive loads of network traffic and targeted websites and different types of services, which ultimately overload them and knock some offline. Craig 9:27 Now, it seems according to The Register that these 15 denial-of-service groups were so prolific that simply taking them offline has caused a noticeable drop in global activity for the entire fourth quarter of 2018. We're talking about an estimate from the FBI of more than 300,000 attacks over the last five years from these guys. And Nexusguard is saying the number of attacks fell by 11%. And the size of each attack, which is the low directed at the target took a nosedive with the average rate dropping 85% and the maximum size down 24% from a year previous to that. So that's really good. The huge dip and attacks may not last, because it's so easy to set up a botnet because so many people haven't properly secured their computers, okay. And somebody else is going to come along and take over, fill in that void. There's going to be nude and distributed denial of services for higher services popping up. Craig 10:33 Many of these Internet of Things (IoT) devices are now being used for botnets. So you're smart light there on the factory floor that isn't properly secured, are not only being used to attack you and get the information from your servers. But they're also being used now too, to a direct these denial-of-service attacks. The number of these IoT devices that are used in the amplification attacks, which is a specific type, but they were up over 3,000% from last year and their accounting for more than half of all the taxing in the last quarter of 2018. So again, you know, we covered this in detail in the DIY cybersecurity, make sure you segment your network, if you have IoT devices, make sure they cannot get out of your network, except to the control nodes, the legitimate ones, right? Craig 11:34 The ones that are for the manufacturer to make sure they get security upgrades. And make sure you do the security updates, make sure they get the security updates, make sure it's all working. Because it's no longer you buy a light bulb from the local Home Depot store for a buck and plug it in. And you don't ever look at that light bulb again until it burns out. Craig 11:57 Now with the Internet of Things who the smart bulbs in the smart everything, you know, thermostats, any of this stuff, those smart devices now are your responsibility. It's just like a friend of mine, who we've been providing DNS services to for 20 years, probably 15, 20 years, well, more than 20 years. And he called us up he says, Hey, listen, why aren't you guys providing DNS for us anymore, you know, from my little network. And we were and we dug into it. And we found out guess what? Craig 12:32 His home address block that was assigned to him by in this case he has Comcast was used to access the dark web. Yeah, pretty big deal. Craig 12:50 And so now he's running around trying to figure out why now we have automatic systems in place that saw, wait a minute, the side dark web block. So all of our stuff worked perfectly. It was great. And that's how we protect our customer's websites. And that's how we set up the networks for all of our customers. Just automatic. If it's not automatic. It's not going to happen, right? So we had automatically blocked him now he's trying to figure out why what IoT device, what light switch whatever, went out to the dark web, and was being used as a tor exit point, even. It's crazy. It's crazy what's happening. So make sure you know what you're doing, find some good courses, whether they're mine or somebody else's, and understand how to do this. And I have free master classes that we're offering from time to time, make sure you're on my email list, http://CraigPeterson.com/subscribe. That way, you'll get my show notes, you'll also get some of the more urgent alerts that come out. And I'll let you know about the free master classes and other training that I'm doing. Okay. So http://CraigPeterson.com/subscribe, and keep listening to this radio show. Because I do get stuff out here. Although, you know, when you talk about master classes, they can go easily an hour, hour and a half or even longer, you know, the courses can take you six weeks to get through. But you know, stay up to date, do the right thing. Craig 14:24 Now, let's talk about the number one problem that IT security professionals are looking at right now. 91%, this is according to Insider Threats, 91% of it and security professionals feel vulnerable to insider threats. And 75% believe the biggest risks lie in cloud applications like popular file storage, email solutions. You know, we talked about them before, they're worried about the Dropbox, Gmail, Google Drive, OneDrive. All of those things, right. So it is very, very concerning to IT professionals. And it's, you know, 91% of them being worried about the insider threats is huge. And that's why again, I have included in the DIY cybersecurity course, a whole set of policies and procedures that can go into the HR manuals as well as things that you should be doing in your business. Now BetterCloud surveyed nearly 500 IT network security professionals, and you can find this online. It's called The State of Insider Threats in the Digital Workspace 2019. So here are the key findings amongst again IT network security professionals, nearly all of them surveyed, 91%, feel vulnerable to insider threats. And that means things like people opening an email clicking on the wrong link, maybe doing something malicious because I got fired they got a bad review. Right. Those are all insider threats. 62% of them believe the biggest security threat comes from the well-meaning but negligent end user. That number fits in with other stats I've seen solids probably pretty legit. 75% believe the biggest risks lie in cloud storage and email solutions, which is really big. And I'm going to talk about an email security article here in a minute and about how the cybercriminals are changing their tactics. 46% of IT leaders which means, you know, the IT managers and above believe that the rise of software-as-a-service applications makes them the most vulnerable. And man, I'm seeing that all of the time, especially in regulated industries. And we're helping out some of these health care providers and legal and public companies. Man, they're using SaaS, software as a service. In other words, caught applications like that going on style, and they're not checking them. We've even done audits on restaurant chains, just small local chains, and found incredible liability that they're facing. 40% of them believe they're most vulnerable to exposure of confidential business information. That's financial information, customer list, personally identifiable information. And only 26% of C level executives say they've invested enough to mitigate the risk of insider threats, versus 44% of IT managers. Craig 17:31 So in other words, the C level executives are running around with blinders on. Kind of scary isn't it when you get right down to it. So let's get into the latest tactics that are being used by the cybercriminals to bypass email security. And I've got this article up again on http://CraigPeterson.com and this is from Industry News. And they're saying that cybercriminals are using brand impersonation now in 83% of spear phishing attacks. Now, remember, these types of phishing attacks against businesses called business email compromise is kind of a general term to cover most of them. 83% of the time, this is what's used, and it's already accounting for about a little more than $12 billion worth of stolen funds, not wasted time, not cost to recovery, right. $12 billion in stolen funds. In the last couple of years according to the FBI, on the worldwide statistics. It is huge. Craig 18:37 One in three of the spear phishing attacks is launched from Gmail accounts. Craig 18:47 20% of them occur on Tuesdays. About 20% on Wednesday, 20% on Thursday, and it drops off to 5% on the weekends, with the slightly lower numbers on Mondays and Fridays. So no big surprise there. I've had people contact me, just texting me, you know, my 855-385-5553 number about these extortion scams. I've gotten one or two of them myself. And I know you guys have gotten them because you've contacted me, you've texted me about it. And and I've gone back and forth to kind of explain what's going on. But still sextortion scams, these are a form of blackmail. And right now it's making up about 10% of all spear phishing attacks. And it's expected to increase even more because it is on an increasing line right now. And employees are also twice as likely to be the target of blackmail, than of a business email compromise. So, that's a change from last year. And this is from a report released by Barracuda and it's called Spearphishing Top Threats and Trends if you want to look it out. And they looked at about 360,000 spear phishing emails. Craig 20:08 So let's get some closer look here. Impersonating Microsoft is one of the more common techniques used by hackers to try and take over accounts, financial institutions. Impersonating nearly one in five attacks. Finance department employees are heavily targeted in obviously banks and other financial institutions as well. Majority of subject lines on sextortion emails contain some form of security alert attackers often include victims email address or password. Subject lines on more than 70% of the business email compromise attacks are trying to establish rapport, sense of urgency. Scammers are using name spoofing techniques, which they've used for years, changing the display name on Gmail and other employee accounts to make it look like it's coming from a company employee. So here's the top subject lines and number the two top 54% say security alert and 34% say change password. Okay. Very big deal. You'll see this article up on my website. And we'll have to try and do a master class on this one because I think this is important for people. I'm going to set these two aside and I'll let you know any anyone who's on my email list. I'll let you know about it. These are always free, will do a deeper dive into it. Craig 21:30 Make sure you subscribe http://CraigPeterson.com/subscribe if you haven't already. The US according to Forbes magazine has stepped up its tax collections here. And if you're selling software in the US, you've got a whole new problem coming your way, you know that we've had for a long time now, protection from the federal government saying the local authorities state and local cannot tax internet sales. And it has expanded a bit you've had massive companies like Amazon, who said yeah, we'll pay sales tax, state and local. And if you ask me, the reason they're doing that is to stomp the little guy into the ground. And the reason I say that is Amazon can deal with it. There are estimated to be over 9,000 different tax regulating entities in the United States. 9,000 of them. You have to comply with all of these 9000 across the board. How can you use a small business so that you can't, right? Amazon can. Well, there are going to be companies that are popping up there already are a few of them out there right now that are trying to take care of this problem for you where they'll collect all of the taxes. Craig 22:56 And what it is resulting in, however, is many businesses is saying listen with all the European Union rules. They've got their GAFA rules are cooking up right now> GAFA, gaffer standing for Google, Apple, Facebook, and Amazon tax. Craig 23:10 It's a kind of a VAT tax and supply, it's not supply driven. It's crazy. But there is a decision from the Supreme Court last year about a dispute between Wayfair now this is that online furniture company and the State of South Dakota and South Dakota wanted to collect taxes and Wayfair said no don't need to sell the Supreme Court overturned a law on not taxing companies with no physical presence in the taxing state. Because that legally is called legal nexus. So if you had operations in New Hampshire, you had to, well New Hampshire is a bad example, because we have no income tax. And we have no sales tax. Okay. But let's say you're in Massachusetts, which is a terrible state when it comes to taxes. You're in Massachusetts, if you sell something to someone in Mass., you have to click Mass. taxes. And if you sell something to someone in another state, you didn't necessarily have to collect the tax as well. Now you are going to. Any company selling online, this is more than just software companies, it's going to hit businesses across the board. And it's going to hit you hard. Craig 24:25 Okay. South Dakota, has rules that say if you have more than 200, individual sales, or more than a hundred thousand revenues, there are other states that say more than 100 sales, or 50,000 in revenue, some of them have 4.7%, some of them have as much as 13.5%, and the thresholds for spending in the state span from 100,000 and $500,000. And there might be 100 transactions a year it might be 500 and might be 2000 transactions a year. Whoa, okay. This is going to be a huge burden. 52 new tax codes on the individual states plus sir taxes that are introduced by counties, by cities, not just in the US, but 30 countries in Europe, along with Australia, Japan, South Africa, South Korea, Norway, India, the list just goes on and on. Hundreds of countries. More than a hundred out there. And US states have highlighted software in SaaS products as explicitly liable for sales tax. So remember too that we're talking about different taxes and different tax rates. You look in Massachusetts, they have a different tax rate for different types of IT services, they have different rates for software as a service in different categories, this is going to be a nightmare. So there's companies out there like Avalara and TaxJar that will outsource and take care of a lot of this stuff for you. Many companies are saying "forget about it." I know companies in Canada that are just pulling their hair out just dealing with Canadian tax codes. Craig 26:10 And many of them are just saying forget it, I'll just wait for the bill to come from the tax collector basically. So rather than charging you the appropriate sales tax, they fill out the state's forms that cross your fingers that they collected enough from you that they had enough in revenue to pay that state sales taxes. Craig 26:29 This is why the federal government passed a law saying no internet sales taxes because it will be a nightmare. Now, it is going to help local small businesses because now they're going to compete on a more even footing where they have to collect the sales tax. So do the bigger companies, right? And so to the people, even small guys who are selling online, and it's going to help companies like eBay and Amazon, where you just sell your product on one of those sites veil worry about all of the sales tax and collecting that. And they'll take their cut and just pass it back to you. So yeah, well, this is going to be big. It's in. You heard it here first. Thank you, Supreme Court. Craig 27:18 Anyhow, I hope you enjoyed today's show. You can read all of these articles plus the ones I missed today, including cloud adoption and what IT pros are concerned about. This 2019 state of enterprise cloud container adoption security that was published here recently, all of that in this morning's newsletter. If you didn't get it, make sure you get the future ones. http://CraigPeterson.com/subscribe, and I will keep you up to date and you can find out about this and, of course, a whole lot more. I have now thousands of articles I published up there my website, because we're over a thousand shows right now was this show 1001 weekly. Craig 28:02 This is week 1001, not show 1001. Man, that's a lot of the time on the air. Anyhow, thanks for listening. Make sure you subscribe, http://CraigPeterson.com/subscribe and have a great week. Talk to you next week. Bye-bye --- Related articles: Windows 10 April 2019 Update Introduces a New Windows Update Policy Latest Tactics Used By Cybercriminals To Bypass Traditional Email Security Cloud Adoption On The Rise, It Pros Unsure Of Risk The US Has Stepped Up Its Tax Game. You Will Want To Read This If You’re Selling Online Most IT And Security Professionals Feel Vulnerable To Insider Threats Silence Of The Wans: FBI DDoS-For-Hire Takedowns Slash Web Flood Attacks ‘By 11%’ --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553
Software-defined WANs are continuously upgrading application performance to enable people in branch offices, stores, and clinics to operate at peak efficiency. With the recently announced integration of Viptela software into IOS XE, it’s time to explore how Cisco is expanding Viptela SD-WAN capabilities across the ISR/ASR router family. Listen in as Robb Boyd, TechWise TV Host, is joined by Sumanth Kakaraparthi, Director of Product Management for SD-WAN & Branch Security, discuss why this is a perfect union of two powerful technologies as well as latest updates in availability for the Cisco SD-WAN solution. For more on this topic, click http://cs.co/9001DfU8T
Analytics for the real world WAN using agents to provide deeper visibility. Also Campus LANs and Wireless so you can build QOE dashboard. The post BiB 51 Nyansa Networks Analytics for SD-WANs and Campus appeared first on Packet Pushers.
Analytics for the real world WAN using agents to provide deeper visibility. Also Campus LANs and Wireless so you can build QOE dashboard. The post BiB 51 Nyansa Networks Analytics for SD-WANs and Campus appeared first on Packet Pushers.
Analytics for the real world WAN using agents to provide deeper visibility. Also Campus LANs and Wireless so you can build QOE dashboard. The post BiB 51 Nyansa Networks Analytics for SD-WANs and Campus appeared first on Packet Pushers.
In a new protocol deep-dive series, Nick Russo and Russ White return to discuss MPLS. In part one, we discuss the primary use cases for MPLS, label allocation, and what SD-WAN means for the future of MPLS. Show Notes: MPLS solves 3 fundamental problems, individually or in concert Multi-tenancy/VPNs Traffic engineering Fast reroute 4 bytes in a shim header, technically not a label, but we call it that 20 bits for label value, 2^20 ~= 1 million values (this is important) 3 bits for EXP, QoS really 1 S-bit to signal bottom of stack 8 bits TTL Label depth is theoretically infinite, but some HW platforms have a tolerance Many ways to allocate labels LDP transport LDP pseudowire BGP labeled unicast BGP based IP VPNs (VPNv4/v6) BGP pseudowire SR (really built into OSPF and ISIS for distribution) RSVP-TE Some forward rules are worth mentioning (basic LDP/BGP-LU environment) If route learned via IGP/static, LDP label must be used If route learned via BGP, BGP label must be used No exceptions Penultimate Hop Popping: second to last hop removes topmost label when signaled with imp-null from last hop along a given LSP, saves a lookup Is MPLS is a tunnel or not: Nick says always Russ says sometimes, depending on label depth Dispel rumor: MPLS is a technology, not a service. It's incorrect to ask “Will SD-WAN supplant MPLS?” This is akin to saying “Will pizza delivery service supplant water?” A more reasonable question would be “Will SD-WAN supplant private WANs?” Russ White Guest Nicholas Russo Guest Jordan Martin Co-Host Eyvonne Sharp Co-Host Outro Music: Danger Storm Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/ The post Episode 25 – MPLS Part 1 appeared first on Network Collective.
How do dosage ratios and cooking methods help avoid adverse reactions to many herbs and formulas?How many grams can or should you use of Chai Hu in XCHT? What about 125g?Simon Feeney takes us on a journey from 20yrs ago, when he met a monk who became his friend and teacher. This monk introduced Simon to herbal medicine, inspiring his studies in Chinese medicine and the Shang Han Za Bing Lun.Simon's investigations into classical Chinese herbal dosages, with the help of ancient texts, has led to some really interesting and useful insights. Yielding strong clinical results, as well as some funny stories of passion and effort.Have you heard Simon puts more Gui Zhi and Sheng Jiang in his porridge than you do in your Gui Zhi Tang?Simon's clinic is Empirical Health and is based in Port Macquarie, in NSW Australia.He has just released a Shang Hang Za Bing Lun app called “Chinese Medicine Classics” to help you with his immense herbal knowledge, and passion for clinical results with Chinese herbal medicine.You can also check out Simon's exceptional classical herbal range of Sans (powders), Wans (real honey pills) and Tangs at Empirical Health, and his high quality range of organic herbs.Get the app via the apple store or for androidWe'd love to hear your comments and feedback on this episode. Please drop by our Facebook page to let us know what you think on this topic!
Is masturbation gay? Did Linkin Park save metal? What would you do if you found out someone you know was sliding in your girl's DMs?
Charles Anderson from Charles Reed Anderson & Associates joined us in a conversation on lower power wide area networks aka WANs in Asia Pacific and its significance to smart cities & Internet of things. Charles dissect the three major players: NB-IoT, LoRA & SigFox and their backers & operators behind the scenes and explained the The post Episode 156: Low Power Wide Area Networks in Asia Pacific with Charles Anderson appeared first on Analyse Asia.
23. Okt. 2015 - Hybride Infrastrukturen aus einer Kombination von On-Premise, SaaS- und Cloud-based Applications benötigen IT-seitig mehr Transparenz und Kontrolle...
Attack of the Killer Soundtrack #20 - Attack of Purple Rain 2 We’re back to round out this year, the 30th (Pearl) anniversary of the movie Purple Rain, by assembling the second half of our massive retrospective on Prince and the iconic soundtrack for the film. And since this has been a year-long on-going process, we check in with several previous guests to get their thoughts on the Purple Rain soundtrack. Special guests include: Lisa Loeb, Zak Appleby and Shane Cody from Houndmouth, Simon, Mark and Thomas from The Wans, Sarah Teeple Swain and Jaxon Swain from The Ladybirds as well as many other performers and Prince fans from ARTFM’s 30th anniversary party. Together we share memories of seeing the movie and experiencing Prince over the years. And as usual, along the way, we also build an amazing, personalized soundtrack. And somewhere around when our host declares himself the Viceroy of Rock and Roll, we also mention… the dynamic vortex of energy, 1984, an ethereal Hobbit, Diamonds and Pearls, similar but equally different, something like Star Search, the guitar never came down, more then life itself, maybe that lady will hook up with me, cassette tape, Showcase Cinemas, Zappa, Under the Cherry Moon, slightly out of tune bells, you might end up with a baby… or blueberry pancakes, oddly way too sensual, the secret knock, what would you even say his particular genre is? Sexy, grind-pop with lace cuffs, Raspberry Beret, Little Red Corvette, everyone’s got a single tear in their eye, hissy fits, popping the top, that’s how we gett off, weird erotic, getting into the fort, the king of rock pop and soul, Sweden, While My Guitar Gently Weeps, I hope he sees this and he’ll marry me, man panties, writing on the ground, picked up the phone… dropped it on the floor, 1999, He’s got a really good color palette, she always got to the cool stuff a little before me, Hendricks, everything about him feels a little like a cartoon, annals of rock and roll, technologically challenging and a Prince neck tattoo. “I recall seeing it in middle school and it really pretty much blew my suburban mind. And I’ve loved Prince ever since.”
Attack of the Killer Soundtrack #15 - Attack of The Wans This we we’re back "live" from Forecastle 2014 as we bring you our continuing coverage including our segment with “The Wans”. And as we bask in the sun of the grassy knoll, we also discuss… reverberating through the ambionic fluid, who’s that lady, The Kinks, Physical Graffiti, Fried Green Tomatoes, The Beatles, Van Morrison, Richard Pryor, areas to throw Frisbees and take naps, sounding like Jack White, Zombies, Average White Band, The White Album, Antz, Guy Ritchie, a huge Hunter S. Thompson, Jackie Chan's First Strike, having a reward system, What About Bob?, Gene Wilder, scampering up a tree, with a VHS player, Finding Nemo, picking up litter, writing together, Neil Diamond, riding around in an awesome van, gin and tonic, The Specials, Homeward Bound, Dirty Dancing, The Grand Budapest Hotel, having a giant director’s chair, and questions you don’t want to ask about Milo and Otis. “I really wanted to figure out who that lady was…” “The Wans” new album comes out Sept. 9th, preorder yours now! - http://thewans.bandcamp.com/
…
…
GCSE ICT Revision Podcast on networks LANs and WANs. Also takes a look at topologies.