Podcasts about what that means

  • 41PODCASTS
  • 102EPISODES
  • 53mAVG DURATION
  • 1WEEKLY EPISODE
  • Sep 3, 2021LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about what that means

Latest podcast episodes about what that means

TIME's The Brief
After Hurricane Ida, New Orleans Police Focused on Looting. Some Hear Echoes of Katrina... and More Stories

TIME's The Brief

Play Episode Listen Later Sep 3, 2021 28:00


Included in this episode: 1. After Hurricane Ida, New Orleans Police Focused on Looting. Some Hear Echoes of Katrina 2. Japan's Prime Minister Yoshihide Suga Is Resigning. Here's What That Means 3. ‘A Decision Was Made.' Biden Faces the Fallout for His Chaotic Retreat in Afghanistan 4. The 5 Best New TV Shows Our Critic Watched in August 2021 .

Cyber Security Inside
53. What That Means with Camille: Medical Devices

Cyber Security Inside

Play Episode Listen Later Aug 31, 2021 31:15


As we continue to navigate a global pandemic, the security of medical devices and hospitals is especially pertinent. Camille explores this timely topic in the latest episode of What That Means; she is joined by three well-versed guests to dig in - Matt Russo, who is Senior Director of Product Security at Medtronic, a major medical device manufacturer, as well as Priya Upendra, who is Senior Director of Customer Success at Asimily, a medical device cybersecurity risk management company, and Stephanie Domas, who's Director of Security Communications in Intel's Product Assurance Division. Tune in for the full scoop.   They cover: - The various kinds of medical devices you might expect to find in any given setting, whether in a hospital, the home, or anywhere in between -  How security is evolving as biology and technology become more and more deeply linked - The threats that come with increased automation and connectivity in a medical setting - What sorts of regulations governments are developing as it becomes impossible not to integrate cybersecurity with healthcare  - How vulnerabilities are thought about and addressed as devices are developed and maintained - How an increasing trend towards telehealth and remote physician monitoring is impacted by cybersecurity threats ... and more!   Check it out!   The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.   Here are some key take-aways: -  While most people think about medical devices in a hospital setting, there are many other places one might find them, whether in outside clinics, the home, or even inside the body as implants. -  A big challenge hospitals and medical providers face is the potential for a creative hacker to exploit these highly connected devices. -  You cannot have a safe medical device if it's not also a secure medical device. -  Because there's no prescriptive approach to security, the guidelines are frequently changing and evolving on the journey to maturity. -  Addressing threats needs to be a highly coordinated and holistic effort between manufacturers, healthcare providers, regulatory bodies and security researchers.   Some interesting quotes from today's episode: “We've seen a lot of those devices become much more technology enabled over time as we start to think about different types of therapies that those products are providing, whether that's diagnostic, just trying to monitor something, or trying to improve a patient's condition that be managing someone's pain, infusing a drug into their body that they need to get better, or even regulating their heart rate.”   “Now we have a set of hardware and software components that go into building a medical device. And what that's doing is taking in a lot of the physiological data at the patient's bedside, and then making it available in a very seamless manner to the provider to make decisions about diagnosis, treatment, and also monitoring the patient's condition and well being.”   “Hospitals have the challenge where we have all this interconnectivity, but we don't have the right infrastructure or the right security controls to make sure that there are no backdoors into those legacy systems or those proprietary systems from a creative hacker.”   “What we've seen over the last several years is evolution and the acceptance that security is innately intertwined with safety, that you cannot have a safe medical device if you do not also have a reasonably secure medical device.”   “What you've seen is this evolving guidance where they're really trying to lead the industry through that risk based decision process without stifling creativity.”   “What we supporters of medical devices need to do is also coordinate better with manufacturers, with regulatory bodies, with security researchers, and then make sure that we're managing risks in a very holistic manner now.” “Even if a manufacturer puts out a patch very promptly, if hospitals can't apply the patch in an equally prompt manner, we still have a fleet of unprotected medical devices.”

Cyber Security Inside
51. What That Means with Camille: Responsible AI

Cyber Security Inside

Play Episode Listen Later Aug 17, 2021 23:15


In this episode of What That Means, Camille is joined by Chloe Autio, who works in the Public Policy Group at Intel; she sheds light on the concept of responsible AI, a governance framework that takes ethics into account in the development and regulation of emerging technologies. A fascinating and timely topic, so be sure to tune in.   We cover: - What is meant by the term "Responsible AI," and why it's phrased that way -  Why diverse stakeholdership is vital to mitigate harm and make technology more inclusive  -  Who the technologies are responsible to -  The kinds of considerations that need to be taken into account during the development process, including looking toward the past -  Why AI shouldn't be considered purely good or purely bad - The importance of transparency ... and more!  Give it a listen!   The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.   Here are some key take-aways: -  Responsible AI is essentially the idea that there is a shared collective responsibility in developing and regulating emerging technologies. -  Having a diverse stakeholdership boosts inclusivity and fairness throughout the entire AI lifecycle, and also mitigates harm. -  Thinking about the context in which a technology will be used or deployed is crucial to determine where the most significant impact will be felt. -  It's also important to understand the past so that we don't perpetuate harmful structures in the future through these technologies. -  Transparency is key to development, because it connotes a level of accountability.   Some interesting quotes from today's episode: “I feel like the term ethics doesn't quite encompass all of the issues that we're talking about when we're thinking about governing or making AI more responsible. And for that reason, I really prefer the term responsible AI.”   “Safety, privacy, inclusivity, fairness. What I think is meant by responsible AI is everyone having a shared responsibility to think about all of those issues from the beginning to the end of the AI lifecycle.”   “I think part of this work is really trying to figure out and understand both the good and the evil to make the good all that much better and the evil all that much less.”   “When we're thinking about responsibility in this space, as we move forward, we really need to think about and understand the past and how to make interventions and corrections to some of the structures and systems that have foundations that we, as a society, aren't very proud of.”   “You can't have the explainability without the transparency.”   “When we're thinking about Responsible AI and, particularly the responsibility component, I think the term transparency is so much more critical, because it also has an element of accountability.”

Cyber Security Inside
49. What Than Means with Camille: Secure Development Lifecycle (SDL)

Cyber Security Inside

Play Episode Listen Later Aug 3, 2021 26:39


In this episode of What That Means, Vernetta Dorsey, a Product Security Staff Engineer at Intel, and Diana Carroll, a Product Security Expert, get to the heart of the secure development lifecycle (SDL) with Camille. Whether this is a brand new topic to you or you're looking to scale up your existing SDL, they give fantastic insight across the board.   We cover: -  What the secure development lifecycle is and why it is so essential to get right from the beginning -  Why forward-thinking, integrated partnerships are meaningful when it comes to SDL -  How someone might effectively go about scaling up a secure development lifecycle across an organization -  Additional support systems and processes to consider for your secure development lifecycle -  The similarities and differences between SDL as it applies to hardware and software ...and more.  Check it out!   The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.   Here are some key take-aways: -  A security development lifecycle (SDL) is what companies in the industry utilize to make better products.  -  SDL is most effective when security attributes are incorporated from the get-go. However, even after your product has been released, you still need to focus on maintaining it due to the ever-changing nature of the industry landscape and emerging threats. -  It's crucial to know how long you want to support your product so that you can adapt as needed. -  Companies should always be thinking about worst-case scenarios to prevent them from happening. -  It's important to form an integrated partnership between those developing the products and a security or product assurance organization so that no detail goes overlooked. -  Automation can be a great labor-saver, but that doesn't mean AI can do everything for you, and you have to be sure you're putting in the proper maintenance. -  Scaling up a secure development lifecycle should be a gradual and collaborative process because rushing it, especially if people aren't aligned, tends to go poorly.   Some interesting quotes from today's episode: “When we talk about the security development lifecycle, we're talking about certain attributes, assessment tasks or activities that one would want to include in their product development lifecycle.”   “One of the things that we've learned over the years is that it's much easier and more cost-effective if you start incorporating your security attributes in at the beginning, rather than trying to tack them on later, after the fact.”   “We find the most issues when people don't think about the ultimate, the bad case. And that's why it's critically important that this fits within the actual development and engineering teams.”   “Nobody knows a product better than the people that are building it. And that can be their biggest strength. And sometimes a weakness too, because the thing about not seeing the forest for the trees kind of comes into effect. Sometimes somebody is so focused down in the details, that they need somebody to help them zoom out and look at that bigger picture, that broader forest, of how it needs to interact with all these other parts of the ecosystem.”   “Automation can be very valuable. Because from a developer's perspective, or a validator's perspective, I would often find myself in the spot where if I had to do something more than two or three times, I would rather write a script to do it for me and focus on something else.”   “One of the things I have seen is when somebody builds out this great automation system, and then they don't maintain it for a few years, it can go from becoming a great helper to a handicap.”   “If you don't have that expertise in-house, today, there are places you can go to help build that out.”   “If you try to go from zero to 100 miles per hour all at once, it's going to be a shock to the system. And that's often tended not to go so well. I would say pick a place to start and focus on incrementally adding and improving and expanding the scope of what you're doing.”   “You have to really know your company culture, know your development engineers, to understand which lever you would need to engage and to get everyone on board to where you want to go.”   “If you don't have the validation systems, and the ability to update products after you've shipped them out, or things like that, that impacts not only your overall quality, but also your ability to respond and improve your security and products as well.”   “It's really important to get your architecture right because once you burn something in, you can't fix it, versus the software where you have the capability to make updates and changes much later in the process.”   “Regardless of whether you're talking hardware or software, or even different types of software, context is key.”   “If we're not thinking about it, that means the hackers or the bad actors have more opportunities to take this thing that someone's making for the good of humanity and use it in a way that was not intended.”

The Travelers Blueprint
TTB 149: July Travel Bites

The Travelers Blueprint

Play Episode Listen Later Aug 2, 2021 29:44


In this episode we discuss some of the recent travel related news we found interesting or relevant over the month of July! We break down our favorite different news articles, including:  https://www.usatoday.com/story/travel/2021/07/15/delta-variant-new-international-travel-restrictions-covid-spread/7986226002/ (Delta Variant and Travel) https://www.travelandleisure.com/travel-news/regent-seven-seas-world-cruise-sells-out (This Luxurious 132-night World Cruise Costs $73,000 a Ticket — and It Sold Out Within 3 Hours) https://www.cnbc.com/2021/07/02/boeing-cargo-plane-makes-emergency-landing-in-ocean-off-honolulu-coast-faa-says.html (Boeing cargo plane makes emergency landing in ocean near Honolulu, both pilots rescued) https://www.bbc.com/news/technology-57651843 (Flying car completes test flight between airports) https://www.bbc.com/news/business-57724779 (Four-day week 'an overwhelming success' in Iceland) https://www.bbc.com/future/article/20210721-the-quest-for-a-galactic-civilisation-that-saves-humanity (The long-term quest to build a 'galactic civilisation') https://www.travelandleisure.com/cruises/win-best-of-antarctic-cruise-with-intrepid-travel (Intrepid Is Giving Away an 11-day Cruise to Antarctica for 2 — Here's How to Enter) https://www.travelandleisure.com/airlines-airports/airline-improvements-2021-new-planes-routes-rewards (How the Airline Industry Is Improving This Year — and What That Means for Your Next Flight) Up This Month:  James Asquith on traveling during COVID and airline industry insight  Jonty Yamisha on saving the lost language of circasun and creating optilingo Michael Wedda on how you can travel more often for less  A Travel Around Table discussion on the Relevance of History to Travel The Travelers Blueprint is more than just a podcast with consulting services that allow you to Become Your Own Travel Agent! Take a moment to rate us! Screenshot your review, email us the screenshot with your name and address and we will send you a FREE travel sticker! TheTravelersBlueprint@gmail.com FREE Travel Cheat Sheet! Just sign up for all the latest TTB news and guest information at http://www.thetravelersblueprint@gmail.com (www.thetravelersblueprint.com) For Travel Consulting Services w/ Bob: https://thetravelersblueprint.com/travel-consulting (https://thetravelersblueprint.com/travel-consulting) Our Private Community on Facebook is a great way to have your travel questions be heard and speak directly to us. Join here: https://www.facebook.com/groups/260677938112800 (The Travelers Blueprint Community) For less than a cup of coffee you can be a major supporter of our time and efforts in producing this podcast. Please consider becoming a Patron by signing up here: https://www.patreon.com/join/thetravelersblueprint (https://www.patreon.com/join/thetravelersblueprint) Follow Us on Social Media: https://www.instagram.com/the_travelers_blueprint/ (Instagram) - https://www.facebook.com/TheTravelersBlueprint18/ (Facebook) - https://twitter.com/ttblueprint?lang=en (Twitter) - https://www.youtube.com/channel/UCyB8gPEriEPYP92Q1DHHkbg (YouTube) This podcast uses the following third-party services for analysis: Podcorn - https://podcorn.com/privacy Chartable - https://chartable.com/privacy Support this podcast

Marketing School - Digital Marketing and Online Marketing Tips
Student Athletes Can Now Make Money Through Endorsements (Here's What That Means) #1802

Marketing School - Digital Marketing and Online Marketing Tips

Play Episode Listen Later Jul 21, 2021 5:09


In episode #1802, we talk about how student athletes can now make money through endorsements, and what that actually means. Tuning in, you'll learn how endorsements used to work in the past and how this didn't reflect fairly for the student athletes who were putting their bodies on the line. We also discuss some of the implications of the new regulations and how you can get involved. Tune in today! TIME-STAMPED SHOW NOTES: [00:19] Today's topic: Student Athletes Can Now Make Money Through Endorsements (Here's What That Means). [00:30] An example of how endorsements used to work in the past. [01:16] The implications of the new regulations for student athletes. [02:50] How to sponsor your favorite player through endorsements and the ripple effects of that. [03:52] Viewing student athletes as a type of influencer marketers. [03:20] That's it for today! [04:26] Go to marketingschool.io/live to join our virtual and live events.   Leave Some Feedback:     What should we talk about next? Please let us know in the comments below Did you enjoy this episode? If so, please leave a short review.     Connect with Us:    Neilpatel.com Quick Sprout  Growth Everywhere Single Grain Twitter @neilpatel  Twitter @ericosiu

Marketing School - Digital Marketing and Online Marketing Tips
Student Athletes Can Now Make Money Through Endorsements (Here's What That Means) #1802

Marketing School - Digital Marketing and Online Marketing Tips

Play Episode Listen Later Jul 21, 2021 5:09


In episode #1802, we talk about how student athletes can now make money through endorsements, and what that actually means. Tuning in, you'll learn how endorsements used to work in the past and how this didn't reflect fairly for the student athletes who were putting their bodies on the line. We also discuss some of the implications of the new regulations and how you can get involved. Tune in today! TIME-STAMPED SHOW NOTES: [00:19] Today's topic: Student Athletes Can Now Make Money Through Endorsements (Here's What That Means). [00:30] An example of how endorsements used to work in the past. [01:16] The implications of the new regulations for student athletes. [02:50] How to sponsor your favorite player through endorsements and the ripple effects of that. [03:52] Viewing student athletes as a type of influencer marketers. [03:20] That's it for today! [04:26] Go to marketingschool.io/live to join our virtual and live events.   Leave Some Feedback:     What should we talk about next? Please let us know in the comments below Did you enjoy this episode? If so, please leave a short review.     Connect with Us:    Neilpatel.com Quick Sprout  Growth Everywhere Single Grain Twitter @neilpatel  Twitter @ericosiu

Cyber Security Inside
47. What That Means with Camille: Cryptographic Services

Cyber Security Inside

Play Episode Listen Later Jul 21, 2021 27:04


In the previous episode of What That Means, Camille delved into the world of post-quantum cryptography. Today, she explores cryptographic services with Eduardo Cabre, who is a Principal Engineer with the Intel Product Assurance and Security Division; they discuss the future threats organizations will face and possible preventions. We cover: -  The difference between the two kinds of cryptography - symmetric and asymmetric -  What exactly is meant by attestation -  What “keys” are and how they're generated -  Why encryption is crucial for protecting things like biometrics -  How much of a threat quantum computing could pose to public and private keys in the future -  What kinds of new cryptographic services are in development ... and more   Be sure to tune in, and also check out WTM Episode 46 if you haven't already for a great companion piece!   The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.   Here are some key take-aways: -  Cryptographic services are essential to securing data in computing devices. -  There are two types of cryptography - symmetric cryptography and asymmetric cryptography; symmetric cryptography deals with the process of encrypting data (typically in very large volumes), while asymmetric cryptography can be used (for example) to authenticate to a remote system using TLS or some other authentication protocol. -  Cryptocurrency uses asymmetric cryptography. -  Quantum computers are good at breaking asymmetric cryptography, quantum-resistant algorithms are in development through organizations like NIST to combat this threat. -  The cryptography system is implemented at a very, very low-level hardware trust level, and is not happening in your CPU.   Some interesting quotes from today's episode: “Users expect computing devices to protect their data against unauthorized access, and to do so, cryptography is a very critical tool.”   “The device changes hands a number of times prior to being deployed, and so certainly attestation can be utilized to confirm that the device that you purchase is the device that you received. But in addition to that, attestation can really be executed at any point in time you want.”    “Certainly the private key is the most sensitive part of the key, and so you want to protect it as best you can. If that key leaks, then whoever obtains access to the key can then impersonate that device.”    “As long as the key that is used to encrypt that data resides locally on your device, the encrypted data could live anywhere.”   “Anybody that has access to the public key and a quantum computer will be able to reverse engineer your private key. And that's bad news when that happens.”   “Basically, most network security protocols are based on public key cryptography, and all of those will break effectively. Right? So no more TLS, no more MCTP. All those protocols that utilize asymmetric cryptography for the underlying security will break.”   “We're going to be going from hundreds of millions or billions of keys to dozens of billions of keys in the next few years.”   “The other thing is there is a new concept of platform root of trust, where the platform internally has the ability to interrogate all of its components, obtain evidence that each one of its components is operating in a trustworthy way before the platform boots.”

Cyber Security Inside
46. What That Means with Camille: Post-Quantum Cryptography

Cyber Security Inside

Play Episode Listen Later Jul 20, 2021 28:02


Trying to wrap your head around quantum computing and post-quantum cryptography? You've come to the right place! The brilliant Rafael Misoczki, Cryptography Engineer at Google, joins Camille for today's episode of What That Means to shed some light, offering accessible insight into what might seem intimidating concepts. We cover: -  What post-quantum cryptography is -  The usefulness and weaknesses of quantum computing -  Why businesses should change crypto algorithms sooner rather than later - An underlooked form of cyber attack that could heavily affect people in the future -  When we can expect quantum computers to become more mainstream ... and more!   Be sure to tune in!   The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.   Here are some key take-aways: -  When you're dealing with quantum computing, you're visiting both nodes (0 and 1) simultaneously. -  Quantum computing is great for solving some problems, but not all. -  Changing a crypto algorithm takes a significant amount of time, so businesses should consider transitioning as soon as possible. -  Adversaries may be harvesting encrypted data right now with the intention of breaking it later. -  We could reasonably expect to see quantum computers adept at breaking RSA arrive on the scene within the decade; for that reason, companies should be motivated to start planning and transitioning.   Some interesting quotes from today's episode: “Quantum computing will be very good to solve some very specific computational problems, but not all.”   “It's all about finding, detecting or creating new computational problems that can resist quantum attacks and then build crypto systems on top of that.”   “We are dealing with quantum phenomena all the time, right?  But there are several layers of interpretation of this phenomena. And my understanding is that what the previous generation could see was only one layer above.”   “If you are using a quantum computer, you are essentially visiting both nodes, 0 and 1 at the same time. And if you keep doing this for several layers, you start gaining what we call an exponential speed up because you are not going at every layer, you're going from one node, to two, then four, then eight...all powers of two. And this provides an exponential speed up. You can verify many more nodes than you would be able to using classical computing.”   “Crypto agility is really just a set of techniques that make systems more easily updatable. And this is definitely something that architects now can do, no need to wait.”   “The process of changing the crypto algorithm is something that takes a long time. So these markets and industries should start looking into this transition as soon as possible, because it's a long process. It's a multi-year (if not a decade-long) process to change a crypto algorithm.”   “There is also another attack that actually is relevant, which is that some adversaries might be now harvesting encrypted data to break it later. That's what we call store-now-break-it-later.”   “This would be a crypto apocalypse, because we wouldn't be able to trust our banking systems, our governments and information systems, in general.”

Cyber Security Inside
44. What That Means with Camille: Socio-Technical Systems

Cyber Security Inside

Play Episode Listen Later Jul 6, 2021 28:51


In this episode of What That Means, Camille gets the definition, meaning, and importance of socio-technical systems from Intel Fellow and Chief Architect of socio-technical Systems, Maria Bezaitis.    The conversation covers important questions like:  - Why does the overlap of social and tech matter?  - How does it impact how we should be thinking about security and product design? ...and more! Don't miss it!   Here are some key take-aways: - While socio-technical isn't a new term or concept, it is new to tech. - For most of the developed world, social and tech are inextricably linked.   - The brevity of some interactions (like those in the IOT space) is not new. What the Internet and the tech evolution have done is increase the diversity and depth of those encounters.  -  We love cities because they allow for more chance encounters, more shared experiences. But now, many of those chance encounters, those shared experiences, are happening online. We're sort of co-creating worlds. -  With the younger generations, there's less of a distinction between the online world and the ‘real' world. There's less consideration given to what gets shared online vs. what remains offline. They see the link between social and tech much more clearly and the two are virtually inseparable in their minds.  -  We want to believe security and privacy can be concepts with fixed rules and regulations. But humans show us it's not that simple. We're constantly making trade-offs. So, what we need are real-time, responsive solutions.  -  We can no longer only think about what's best for tech or driving tech forward. When making decisions, product design engineers need to think more and more about who they're designing the product for and how it will be used.     Some interesting quotes from today's episode:“The phrase has been used for years in areas like organizational design and workplace research. I'm bringing it to the fore for tech in part because our lives are no longer strictly social, nor are they exclusively focused around technology. And yet, technology companies, I think, are still working towards the importance of that intersection.”“When we're talking and thinking about technical and technical requirements, we really need to understand the social as inextricably linked. And when we look at our own lives as social entities on the planet, it's really hard, at least if you're in a lot of the developed world, to really think about them as somehow without technology or outside of technology.”   “Which is to say, there are layers to this problem. Individuals exist in contexts, which include places and environments and other people. And technologies do as well. In order to understand how these things evolve, we really need to be looking at the intersection and the coevolution of people together with technology.”   “If you happen to have teenagers at home, which I do, you know that the people that they're interacting with aren't just people that they know.”“This is why we love cities, because cities have always been these incredible environments for chance encounters, and for very quickly moving us into places and into moments that somehow are not foreseen by the trajectory of our lives.”   “That early moment of a potential for something new, and a potential for encountering something different, was absolutely present and important. And actually, I think that in some respects, we're likely to encounter that again, as more and more parts of our lives are sourced from what we're doing online.”   “I grew up in the 70s, and 80s, and we still operate with this notion that our lives are better without tech. There is a fundamental assumption that it's important to tell your child to park the device, put it away. That it's important to imagine leisure time or time off from technology. I don't think that that's mirrored at all in younger generations. And I'm not sure that's just because they're teens or preteens. Technology is occupying a very different kind of terrain for them.”   “Their world is organized around communities and places and activities that are sourced from a digital world. And of course, COVID has deepened all of that for them.”“I think we still see people making all sorts of trade-offs against privacy all the time. What we know for sure, is that privacy has never been and will likely never be a concept or a practice that has fixed rules and protocols for people. We are always negotiating our privacy in the same way that we're always negotiating our security, which is what makes humans and communities of humans a really great place to look for thinking differently about both privacy and security. Technologists would like to think that those things lend themselves very easily to rules and guidelines and regulations. I think humans show us that it's not that simple.”“Once you remove yourself from the mindset that privacy or security is something that can be fixed – that can be defined and then implemented – and you move into this space where you can think about those concepts as much more dynamic and much more responsive, then I think you enter into a space where you're really thinking differently about the kinds of technologies that might make sense.”“You're not mapping technologies anymore to behaviors or workloads that are fixed or rigid, but you're able to maybe identify vulnerabilities and holes in a much more responsive, real-time manner. And that, I think, creates space for thinking about change quickly, and in real time.”   “I'd like to see ethics move in the same vein that we're trying to move social research, which is that it's not something that ultimately lives outside. It doesn't necessarily require extra processes and tools and governing boards, but that it becomes much more integral. And I think anyone working in that space today would say that's exactly what we're trying to get done. But just like the general face of social science work in product development, and in tech specifically, that's going to take some time.”   “I think our job as researchers who are working in the tech sector, is to make sure that those conversations have a landing zone, to bring them inside our companies, and then work with the right partners inside our companies to change how things get made.”

Hacks & Wonks
Week in Review: June 25, 2021

Hacks & Wonks

Play Episode Listen Later Jun 26, 2021 34:36


Today Crystal and local political consultant Heather Weiner discuss the record-breaking heatwave we're going to experience this weekend, how we can support our unhoused neighbors through these dangerous heat conditions, Uber paying a historic wage theft settlement, Amazon being taken on by the Teamsters union, developments in the mayoral race, AND the organizers of Capitol Hill Pride submitting a fragility-infused complaint against Taking B(l)ack Pride, resulting in major backlash and several cancelations for Capitol Hill Pride. ALSO: See resources below for locations to cool down this weekend and how you can support our unhoused neighbors in this heat. As always, a full text transcript of the show is available below and at officialhacksandwonks.com. Find the host, Crystal Fincher on Twitter at @finchfrii and find today's co-host, Heather Weiner, at @hlweinder. More info is available at officialhacksandwonks.com.   Resources Excessive Heat Warning: Cooling Centers Open Across Seattle https://alert.seattle.gov/2021/06/25/excessive-heat-warning-cooling-centers-open-across-seattle/ Cooling centers in King County: https://kcemergency.com/2021/06/24/cooling-centers-in-king-county/ Find cooling locations, open libraries with air conditioning, and other ways available to cool down here: https://durkan.seattle.gov/2021/06/city-of-seattle-opens-additional-cooling-centers-and-updated-guidance-for-staying-cool-in-extreme-heat%e2%80%af/  “Western heat wave threatens health in vulnerable communities” by Anita Snow: https://www.seattletimes.com/seattle-news/health/western-heat-wave-threatens-health-in-vulnerable-communities/  “City Prepares For Extreme Heat By Opening Cooling Shelters, Finally Getting Around To Fixing Water Fountains” by Carolyn Bick: https://southseattleemerald.com/2021/06/24/city-prepares-for-extreme-heat-by-opening-cooling-shelters-finally-getting-around-to-fixing-water-fountains/  CID Mutual Aid: https://twitter.com/CIDMutualAid/status/1407774391551860739 Transit Riders Union Solidarity Fund: https://data.transitriders.org/forms/tru-solidarity-fund/ “Uber to pay $3.4M in settlement for 15,000 Seattle drivers' unpaid sick leave, back wages” by Mike Lewis: https://www.geekwire.com/2021/uber-pay-3-4m-settlement-seattle-drivers-unpaid-sick-leave-back-wages/  “The Teamsters Want To Unionize Amazon Workers. Here's What That Means” by Andrea Hsu: https://www.npr.org/2021/06/22/1009213361/the-teamsters-want-to-unionize-amazon-workers-heres-what-that-means  “Amazon employees accuse the company of union-busting after it removes workers from an internal directory” by Jason Del Rey: https://www.vox.com/recode/22348389/amazon-union-phone-tool-warehouse-workers-tier-1-staff-directory  “Meet Seattle's 2021 candidates for mayor” from The Seattle Times: https://projects.seattletimes.com/2021/seattle-mayor-candidates-primary-mayoral-election-guide/  “Homeless Advocates Launch Campaign Against ‘Compassion Seattle' Charter Amendment” by Natalie Bicknell: https://www.theurbanist.org/2021/05/28/homeless-advocates-campaign-against-compassion-seattle/  “Seattle Eviction Moratorium Extended As Council Passes More Renter Protections” by Jack Russillo: https://southseattleemerald.com/2021/06/22/seattle-eviction-moratorium-extended-as-council-passes-more-renter-protections/  “BIPOC Pride event gets support after ‘reparations fee' complaint” by Venice Buhain: https://crosscut.com/news/2021/06/bipoc-pride-event-gets-support-after-reparations-fee-complaint  TAKING B(L)ACK PRIDE: https://www.seattlepride.org/events/taking-black-pride    Transcript Full transcript will be added in the next 48 hours.

Cyber Security Inside
42. What That Means with Camille: Zero Trust

Cyber Security Inside

Play Episode Listen Later Jun 22, 2021 24:09


Even as some aspects of life return to “normal” in 2021, security modeling will never go back to a pre-pandemic state. In this episode of What That Means, Camille and guest Cathy Spence, Senior Principal Engineer at Intel, discuss the importance of zero trust adoption as more and more people work from home. The conversation covers: •  The basic facets of the zero trust model, and how those can be compared those against older concepts like digital rights management and IDAM (Identity and Access Management) •  How the pandemic accelerated the use of more modern provisioning models, and why zero trust is so important when so many people are working remotely •  The kinds of vulnerabilities people face outside the firewall •  What the workplace could look like post-pandemic, as well as predictions about the future of AI ... and more!  Listen in on the fascinating discussion!   The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.   Here are some key take-aways: •  As more and more people work from home, and management tools become more cloud-based than on-premise based, zero trust securities become especially vital; if one device becomes infected, you don't want it to affect the entire network. •  Currently, threat modeling is largely “cloud-first”, but in the future, it's likely to be “AI-first”. •  As new solutions are implemented, it will be key to find the right balance between tracking and preserving people's privacy. •  The general consensus is that adopting zero trust models is the way forward for data and asset protection as the world becomes less predictable. •  Things will not go back to the way they were, and so it's crucial to fully adopt and embrace new models.   Some interesting quotes from today's episode:   “2021 is the year for zero trust, of people really fully embracing the zero trust kind of model, and it's because of these challenges that are beyond basic security hygiene.”   “When the pandemic struck, it really accelerated a move to modern [management techniques], and some companies were better positioned than others to survive in this environment.”   “Security is always an arms race, because as you address certain security problems, the attackers find a way to get around those, and you have to keep upping your game. This kind of approach really provides a great foundation for you to protect yourself.”   “It's really about setting yourself up so that you can take better advantage of AI. What the pandemic has taught us is that the world's becoming less and less predictable.”   “We're very sensitive about privacy at Intel. We have a process for that. We check ourselves, we go through a privacy review, and we make sure we're doing the right thing when it comes to people's privacy.”   “We're not going to go back to working the way that we used to work, we're not going to look backward to the old security models. If you don't really implement the full model, and you let certain applications or certain things skirt the guidelines of zero trust, then it really does fall apart. You really want to embrace that.”

Cyber Security Inside
40. What That Means with Camille: Governance and Audit

Cyber Security Inside

Play Episode Listen Later Jun 8, 2021 29:15


In today's episode of What That Means, Camille speaks with Thomas LaLevee, Chief Internal Auditor chez China Construction Bank S.A. He sheds light on the implications of an increasingly digitized world when it comes to assessing cybersecurity risk in governance and audit, and offers great insight into what traits and discussions will be necessary in future board meetings.    The conversation covers: -  What makes a good internal auditor -  Why the tone from the top is important -  The need for adequate information to be provided to the board in developing cybersecurity protection strategies and the kinds of discussions that are needed as governance models are developed -  How digitalization trends will impact governance and audit   ...and more  Tune in and join us for this incredibly important discussion!   The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.   Here are some key take-aways: -  While governance is one of the most complex topics in a company, in simple terms it's about risk management, protecting the culture and reputation of the company, as well as protecting company assets. Internal audits, meanwhile, involve adding value to the company through the development of recommendations for risk management and mitigation. -  While an out-of-the-box approach might seem like it doesn't belong in the realm of internal audits, a mix of traditional and innovative risk thinking is key to being able to provide better information to the board. -  Whether they like it or not, banks will have to adapt to cryptocurrencies for better strategic integration in the future. -  As we increasingly shift towards a digitized world and automate processes along the way, we increase potential security breaches that come with huge sanctions. This means that each department has to have its own governance that must be audited in a specific way. -  In selecting independent directors, it's important to consider competence, but it's also important to source people working in other companies that are trained in digitalization; this way, they have a good understanding of what's happening in the world. -  In developing governance strategies, it's important to focus on the human impact of cybersecurity risks in addition to the potential financial consequences; reputation is often more difficult to recover. -  Now more than ever, it's crucial to bridge the language gap between IT and the board in order to convey the complex technical issues dealing with digitalization and cybersecurity.   Some interesting quotes from today's episode: “It's really important for me, the CIA, to do a mix between traditional risk thinking and thinking out of the box in order to give better information to the board and also to help them make better decisions.”   “If you do not develop a good strategy now, notably if you're working as a private banking industry, then you can definitely lose lots of clients in the coming years.”   “Definitely one of the most important topics is also reactivity, because it can be the response to cyber risk; as I mentioned, we work in a way more dynamic environment than before. The concept of risk awareness is definitely extremely important.”   “We have to adapt our risk analysis so that we're sure our audits are adapted to this new world. I think one extremely important thing is that IT, more than ever before, will be a central function inside of the company.” “One main word in our job is humility. And I think that more than before we'll need the help of specialists to help us ensure that we analyze the company in the best way. Humility.”

Cyber Security Inside
35. What That Means with Camille: Social Equity and Data Protection

Cyber Security Inside

Play Episode Listen Later May 18, 2021 26:07


In this episode of What That Means, Camille talks with Rhonda Foxx (Head of Social Equity Policies & Engagement at Intel) and Monica Mahay (Head of Cybersecurity, Data & Privacy Legal for EMEA at Intel) about social equity and the corporate role. What do businesses need to be doing to ensure diversity, fairness, and inclusion in the workplace? Are we working towards an end goal or is this an ongoing journey that requires us to consistently monitor and adjust? The conversation covers: •  Code switching •  DEI (Diversity, Equity & Inclusion) •  Data protection •  Social, tech, and education equity •  Imposter syndrome •  Authenticity   And more. This is a must-listen for businesses in and outside of the tech space. Don’t miss it!   Here are some key take-aways: •  Social equity is about ensuring that we’re all treated equally and fairly, and that we’re not discriminated against in some way because of the way we look, where we live, etc. It’s about fairness and inclusion.  •  Data protection is responsible and accountable use of data that relates to individuals. This encompasses things like transparency and security.  •  Diversity alone isn’t the end goal. We don’t just want all people represented in our companies – we also want all people to be treated equally, to be invited to the same table, and to have the same experience.  •  DEI (Diversity, Equity & Inclusion) is an evolution, not an end destination. •  Technology is not the great equalizer because not everyone has access to the same technology. Many of us sit in a place of privilege and have advantages that others don’t. Data shows that women in particular are at a tech disadvantage and less likely to have access to the Internet. •  Because of disparities in access to education, Internet, and the technology needed to connect and learn in the socially isolating WFH/home-school environment brought on by the pandemic, those without the means are falling behind. There are programs out there to assist families and individuals, but help came a bit late.  •  Tech companies are leaning into social equity because there’s a realization that if we don’t have tech equity, we’re going to leave people behind. When we lean into equity, it’s the right thing to do – but it’s also imperative for business.  •  We need to be looking at our own technologies and making sure we’re not creating bigger divides. We also need to be looking at pay equity – ensuring we’re paying our employees equally and investing in suppliers, vendors, and businesses that align with our DEI goals.  •  While things need to change at the policy level, we can’t afford to wait for laws to change. We have to do our part to push important issues forward because they matter to our employees and our communities.  •  We also need to look at who’s setting the tone and culture in our workplaces. Is everyone represented? Our employees should be able to bring their authentic selves to work, but many don’t feel like they can. For example, in the Black community, there are concerns about how hair should be worn to work, and what’s considered a ‘professional’ or ‘unprofessional’ look. Our employees shouldn’t have to worry about fitting into a mold or reflecting an image that was created without them in mind.     Some interesting quotes from today’s episode: “Social equity for me is fairness and it's inclusion, not predicated upon what I look like.”    “Well, I think at its fundamental core, fairness is about equity. You're not going to get to a place of fairness if we're not looking at how can we be more equitable, how can we be more inclusive to have greater equality?”    “The concept of separate but equal is a discriminatory thought in and of itself. Why on earth would we be separate? And if you are separate, how on earth could you be equal?”    “So, we've got to take people's uniqueness into consideration, and take diversity and inclusion and make it more about intersectionality of all of our different complexities to get to a baseline of equity.”   “DEI is an evolution, not just a finite.”   “Many of us will sit around, watch Netflix and listen to podcasts and eBooks, and we have access to next day, same day delivery of games, clothes, food, online gaming, and we can call family and friends through a video call and see their faces. But despite all of these advantages, we still suffer from feelings of isolation and mental health issues. But imagine going through the pandemic with no access to the Internet or with very limited access to the Internet.”   “Right now, there's still a huge divide in access to technology. And it is also generally worse for women…”   “We've got to double down on our commitment to be responsible, to be inclusive, and to be sustainable, because we have no choice but to, because it's the right thing to do. But it’s also the business imperative as well.”   “But now we’re going a step further and we’re saying, You know what? We're never going to have equity, we're never going to have diversity and inclusion goals met internally, if we don't go all the way back to the basics.”   “We know you're never going to be on the right path to compete for tech opportunities if you're not given education on an equitable level at your earliest point.”   “[There’s] this perception that because something happens online, it kind of doesn't matter, you can turn the computer off, that it actually doesn't affect your ‘real life.’ But actually, impacts of online abuse are very real.”   “It's going to hit a point where, if we really want to get into equity and equality, we're going to have to knock down some systems and some structures and rebuild.”

Cyber Security Inside
33. What That Means with Camille: Wireless Communications

Cyber Security Inside

Play Episode Listen Later May 4, 2021 21:38


In this episode of What That Means, Camille talks wireless communications with Vida Ilderem, VP at Intel Labs in charge of wireless communications research. Vida has 27 patents, including one on beam forming, and she’s the perfect person to get the definition and evolution of wireless communications from.    The convo covers: •  3G, 4G, 5G and 5G+ •  IOT •  Wi-Fi and Bluetooth •  Computing at the edge •  Interoperability  •  Reliability •  Liable low-latency com •  LTE •  Beam forming ...and more. Don’t miss it!   Here are some key take-aways: •  Wireless communication is the transmission of information over networks, without the use of wires. It’s about communication and the connectivity needed. •  5G stands for the fifth generation of communication.  •  Wi-Fi and Bluetooth are examples of protocols for wireless communication. •  As machines come online, ultra-reliability and low-latency becomes even more important – especially in mission critical applications like surgery.  •  The human needs and machine needs of wireless communication are different. Making wireless communication reliable means finding that balance of human and machine needs. •  The more things on your network, the greater your attack surface. The challenge of securing all of these things is an ongoing one that’s not as simple as we’d all like it to be. One reason is that we want our devices to talk to each other, regardless of what company they’re from. Making that inoperability possible while keeping everything secure is inherently difficult.  •  Reliability is another challenge of wireless communications, because wireless, by nature, is not reliable.  •  Introducing a new generation of wireless communication doesn’t mean you can stop supporting previous generations. Not all devices will rely on the latest generation and being able to fall back on another generation when a connection is lost improves reliability.  •  Beam forming is a way of using antennas to transmit information directly to users by forming directional beams. The benefit is that it extends the distance, increases capacity, and increases the number of users.   Some interesting quotes from today’s episode: “5G stands for fifth generation of communication. The first generation was analog -- you must have human communication. The second generation was about going digital on it -- there's voice communication. The third generation was when they introduced data -- more people loading images. The fourth generation was allowing people to do more streaming and added mobility. And fifth generation is about, not only getting higher data rates and throughputs, but also bringing the machine and instrumenting the devices -- so giving rise to Internet of Things.  These all become possible because of wireless communication.”    “There can be licensed spectrums like cellular or unlicensed spectrums like Wi-Fi and Bluetooth.”   “Then there is the ultra-reliable, low-latency communication for very mission critical applications. And that's where the concept of edge comes in, because you need to bring the compute closer to the data. From the cloud computing all the way to the edge computing. Because the machines or the applications which are coming online now, they need that ultra-reliable, low-latency requirement you have to meet.”    “We want to make sure we get the data when we need the data -- anywhere, any device. That's the human side of it.”   “As you’re increasing the number of things which are instrumented (i.e., they have an IP address and they're joining the network), you're increasing the attack surface. I mean, look at your home. How many sensors do we have now that talk to the Wi-Fi router in your home? And many of these are not necessarily secure today. It is a big task and a challenge that is still being addressed.”   “Wireless link by nature is not reliable. We can drop it because the charge works through the air. So, you can lose the link.”   “The other thing with wireless communication is, as you’re introducing a generation, you still are supporting previous generations.”   “There’s also a lot of re-use going on. Again, as I said, you're not throwing out the old to add the new. We still need the old -- you build up on that. So, it's more of an integration challenge.”

Money
Money News You'll Really Use: April 30th, 2021

Money

Play Episode Listen Later Apr 30, 2021 37:44


Nearly every day there's news that affects you and your money. From politics and taxes to markets and interest rates, things are happening that affect your savings and your future -- so many things, in fact, it's hard to keep up with them all. Problem solved. I track everything that's happening every day. And every couple of weeks, I condense it all and report everything you need to know in a special edition of the "Money!" podcast. In addition to recapping the news, we check in on my personal investments, and discuss ideas and suggestions to make you smarter and richer, all without boring you to death in the process.  Want more information? Check out these resources: Wall Street Journal: Landmen Who Once Staked Claims for Oil and Gas Now Hunt Wind and Sun Wall Street Journal: Top Republican Says Senate GOP Could Be Open to Smaller Infrastructure Bill CNN: Remote workers can get paid $12,000 to move to West Virginia Bloomberg: House Passes Marijuana Banking Bill With Bipartisan Support Marketwatch: Stock-market sentiment shifts after investor euphoria pushed U.S. equities to record highs Barron's: Company Insiders Are Selling Stocks. Others Are Buying. What That Means for the Market. Marketwatch: Is the U.S. housing market heading for a crash? Here's what the experts say Bloomberg: India Records World's Highest One-Day Surge in Covid Cases CNBC: Supreme Court limits the FTC's authority to return money to consumers duped by deceptive business practices Barron's This Bull Market Is Far From Over, Pros Say. Where They're Investing Now Barron's: Inflation Is Coming. 5 Stocks to Buy Now. Money Talks News' savings account search tool Subscribe to the Money Talks News newsletter Take our The Only Retirement Guide You'll Ever Need course Take our Money Made Simple course Hosts: MoneyTalksNews MirandaMarquit.com Become a member: https://www.moneytalksnews.com/members/ See omnystudio.com/listener for privacy information.

Cyber Security Inside
31. What That Means: Fearless Computing

Cyber Security Inside

Play Episode Listen Later Apr 21, 2021 23:32


In this episode of What That Means, Camille has Abhilasha Bhargav-Spantzel, principal engineer at Intel, on the show to discuss Fearless Computing. In addition to her work at Intel, Abhilasha is also working with the kids who will be tomorrow’s engineers, and the conversation touches on: •  What fearless computing is •  Why kids are naturally better at fearless computing •  Fearless computing in the time of COVID •  Biometrics and privacy •  Identity, cryptography, and security •  Multi-factor authentication •  Virtualization •  Hypervisors   ... and more!  Don’t miss it!   Here are some key take-aways: •  Computers are no longer just tools for tasks – they’re an integral part of our lives. But there’s a lot of fear around being hacked or downloading the wrong thing. Fearless computing is about eradicating that fear. About making it possible to innovate, experiment, and try new things, without that constant fear.  •  Kids are great with fearless computing because they question everything. Adults are often more trusting, but kids often start with a sense of distrust.  •  Biometrics rely on more than just an image to determine legitimacy and authentication.  •  Multi-factor authentication relies on multiple different things (i.e. voice, how you speak, how you type, etc.) for verification that you are, in fact, who you say you are.  •  The cloud is already virtualized. Now, we’re working on virtualizing the client/computer. When you virtualize a PC, you can isolate your applications and workspaces. •  Virtualizing workspaces allows you to create partitions that prevent the spread of malware to entire systems. That way, you can try new things within workspaces with more confidence, privacy, and security. Virtualization also allows you to try new things, without being tied to a specific operating system.  •  With remote learning, WFH, and telehealth, we don’t have big firewalls or intrusion detection systems protecting us. We have to rely a lot more on our PCs to do the protecting, which is why we’re (at Intel and elsewhere) starting to build more of these capabilities into the actual systems. •  To learn more about cybersecurity programs for kids – like the ones discussed during this episode –  check out Fuse Breakers and Echelon Catapult.    Some interesting quotes from today’s episode: “My experience, working with the kids, is that they start from scratch. They're not afraid of anything, which is what we want to continue.”   “I like to tell the kids, ‘Think bad, but do good.’ So, think what else could go wrong, but at the same time, see how you can protect yourself better and protect others.”   “It's about local authentication, not releasing this information. Your PC, for example, is in your control. It's not going anywhere and not too many people will have access to it and potentially use it in ways that you did not expect it to be used. But if that same information was in the cloud somewhere, just fundamentally, by design, you don't have control. You’re just trusting that the cloud entity that has collected this information is only going to use it for that purpose and nothing else.”   “Server-side, as you say, the cloud is already virtualized. And they did it primarily for consolidation and using applications in a much more efficient way, scaling the cloud. But on the client side, this is the new thing that is happening, which is: just like the server, we are working on virtualizing the client itself.”    “When you virtualize the system, there are actual partitions that allow you to work on different types of workloads and isolate them. Fundamentally, they're isolated. So, if something goes wrong in one, it doesn't impact the other.”   “It [malware] loves to spread. It loves to find its way into every application, down into the kernel levels and across the systems that it can reach. And if you isolate them fundamentally, its reach has already been contained.”   “Virtualization not only brings you the security through isolation, but it can also basically allow you to do a lot more experimentation and creativity, like we talked about. You can try new things and you're not tied to an operating system environment. And that's another benefit.”    “All of us became remote workers in a day's time. And a lot of the times, there was a break the glass scenario, where we just needed the users to be able to access these contained applications in some way or fashion. And that's not sustainable, because the threat landscape continued to grow. Nobody was waiting for things to stabilize before they can start trying to attack the systems.” “That's what we want to do is to build this next generation of citizens and engineers who have security mindset and [are] doing the right things for the community.”

Katie Couric
Dr. Sanjay Gupta on how to build a better brain

Katie Couric

Play Episode Listen Later Apr 15, 2021 67:01


This past (very long) year, Dr. Sanjay Gupta has been immersed in all things COVID-19, as CNN’s Chief Medical Correspondent reporting on the front lines of this novel virus. “All I think about is COVID,” he told Katie, “Viral transmission, how people evaluate risk, social behavior. There’s no part of our society that hasn’t been touched in some way.” But Sanjay is also a neuroscientist and in addition to his on-air work and a daily podcast (Coronavirus: Fact vs Fiction), Sanjay has somehow found the time to write a new book called “Keep Sharp: Building a Better Brain at Any Age,” which is out now. On this episode of Next Question with Katie Couric, Katie and Sanjay talk about how to keep the brain healthy with tips you can use right now to protect and improve your brain. But Katie starts the conversation by asking the COVID about the status of the pandemic and if we’re truly out of the woods.  Find out more from this episode Read: Keep Sharp: Building a Better Brain at Any Age, by Dr. Sanjay Gupta Why Zebras Don’t Get Ulcers, The Acclaimed Guide to Stress, Stress-Related Diseases, and Coping, by Robert M. Sapolsky iGen: Why Today’s Super-Connected Kids are Growing Up Less Rebellious, More Tolerant, Less Happy — and Completely Unprepared for Adulthood — and What That Means for the Rest of Us, by Jean M. Twenge Listen: Coronavirus: Fact vs. Fiction with Dr. Sanjay Gupta Learn more about your ad-choices at https://www.iheartpodcastnetwork.com

Cyber Security Inside
29. What That Means with Camille: Corporate Responsibility

Cyber Security Inside

Play Episode Listen Later Apr 13, 2021 23:30


In this episode of What That Means, Camille chats with Suzanne Fallender, Director of Corporate Responsibility at Intel, about what corporate responsibility *really* is. Is it doing the right thing? Is it not doing the wrong thing? And is there really a business benefit?    The conversation covers: •  What corporate responsibility is (in 3 mins or less, of course) •  ESG, sustainability & social responsibility  •  Transparency & truth •  Integrated reporting •  Inclusion & diversity •   Corporate responsibility goal setting •  What happens when you don’t meet your corporate responsibility goals   ...and more. Don’t miss it!     Here are some key take-aways: •  Corporate responsibility is about more than just ‘doing the right thing.’ It’s a management approach that looks at and proactively manages things like diversity, inclusion, supply chain responsibility, environmental compliance, and more.  •  There’s a societal value and a business value to corporate responsibility. Proactively managing these factors ultimately reduces risk and is ‘good’ for business.  •  When setting corporate responsibility goals, it’s good to set goals that are ambitious. Even if you don’t meet them all, you’ll likely make significant steps towards meeting them. It’ll give your team something to strive for.  •  Transparency isn’t necessarily a proxy for truth.  •  In order to incorporate corporate responsibility info into your processes, you need reliable, accurate data and third-party assurance over your corporate responsibility reports. •  There’s a shift, an evolution in the corporate responsibility space. Companies are realizing that many of these things do impact the bottom line. They impact how customers feel about the company and how employees feel about working for the company.  •  Global companies, in particular, have shifted their thinking. Many are introducing voluntary initiatives in an attempt to get out ahead of requirements that impact business.  •  10 years ago, leadership in corporate responsibility was about ‘doing less bad’ and individual corporate accountability. 10 years from now, it will be more about ‘doing more good’ collaboratively and leveraging each company’s unique skills for the greater good.  •  Cyber security will play a role in many solutions to global challenges — like electrifying the grid, digital access, and autonomous driving — as well as in things like governance and risk management.   Some interesting quotes from today’s episode:   “One of the key things in corporate responsibility — and it's been developing for a number of decades now — is about transparency in reporting on your performance, but also about setting ambitious goals and then being able to report on those goals.”   “When we set the 2020 goals that we've included in our most recent corporate responsibility report that's on our website, the thinking behind setting these goals is, you're setting goals that are ambitious. And I actually tell people internally, it’s actually, I think, more credible if you don't hit a couple of your goals, because it meant that you didn't just set out goals that you knew that you could meet.”   “The financial reporting standards and audit standards have evolved over decades. I think we have seen a similar conversation evolving on the ESG topics and the corporate responsibility reporting.”   "Now really it's all the leading financial services firms that have policies on ESG and are looking at this data. And for them to be able to incorporate this information into their investment processes, they need reliable, accurate data.  So there is much more of a robust discussion happening about how do you standardize this data more? How do you make sure there's that third-party assurance over the data points?”   “I think that there are a lot of these ‘non-financial’ factors that do impact performance and financial performance. It may be hard to measure and quantify exactly how those are impacting, or it could be a time horizon question. They may not show up really in the short-term, but they can really have significant hidden costs in the long-term.”    “We've seen this shift in terms of who do employees want to work for and how does this connect with employee engagement and kind of pride and engagement with who you're working for.”   “10 years from now…leadership will be about convening people together to drive forward on these issues, and really leveraging the skills and the expertise of different businesses in the right way.”   “I think if everyone just keeps doing things on their own, we're not gonna make as much progress as if we have that kind of industry collaboration or kind of that broader kind of innovation focus, especially around the role that technology can play.”   “For Intel, yes, we make chips. But our purpose is to create world-changing technology that enriches the lives of every person on earth. Really aspirational, really kind of hard to measure sometimes from a really data-centric and engineering company. But that purpose is really, I think, what guides these new global challenges that we set out.”

Mind Pump: Raw Fitness Truth
1523: The Difference Between Training for Strength Vs. Muscle Gain, Losing Body Fat Without Counting Calories, the Dangers of SARMS & More

Mind Pump: Raw Fitness Truth

Play Episode Listen Later Apr 2, 2021 79:53


In this episode of Quah (Q & A), Sal, Adam & Justin answer Pump Head questions about the difference between strength gains and muscle gains, how people who already have a lot of muscle can lose body fat without tracking calories, SARMS, and good guidelines for someone who wants to compete in a fitness show. The various methods the guys use to avoid speeding tickets. (3:34) Making the case for the value of bullies. (9:14) Barstool versus Michael Rapaport. (22:38) The guys speculate on Nike's response to the Lil Nas X ‘Satan Shoes' controversy. (24:45) Fun Facts with Justin: Where does the term ‘thug' derive from? (30:04) A little-known fact about chicken nuggets. (34:14) The #1 risk factor to contract COVID that no one wants to hear about. (35:55) Creepy or Cool? 3D portraits created from stranger's DNA. (39:22) The science behind how hickeys are made. (42:20) #Quah question #1 – What is the difference between strength gains and muscle gains? (46:41) #Quah question #2 – For people with a lot of muscle already, how can they lose body fat without tracking calories? (51:27) #Quah question #3 – What is all this hype around SARMS? (58:43) #Quah question #4 – What are good guidelines for someone who wants to compete in a fitness show? (1:06:42) Related Links/Products Mentioned April Specials: MAPS Anabolic or Shredded Summer Bundle 50% off!  **Promo code “APRILSPECIAL” at checkout** Bad Trip | Netflix Official Site Michael Rapaport's Suit Against Barstool Sports Continues Even as Defamation Claims Dismissed Nike is suing over Lil Nas X's 'Satan Shoes' containing human blood iGen: Why Today's Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy–and Completely Unprepared for Adulthood–and What That Means for the Rest of Us Thuggees - the Cult Assassins of India | Ancient Origins Watch Waco: The Rules of Engagement | Prime Video This Little Known Fact About McDonald's Chicken Nuggets Stuns Customers Jamie Oliver Saves the World - Eater Jamie's Dream School | Jamie vs. Nuggets CDC study finds about 78% of people hospitalized for Covid were overweight or obese About 40% of US adults are obese, government survey finds DNA from Cigarette Butts Turned into 3D Printed Portraits Visit Joovv for an exclusive offer for Mind Pump listeners! Mind Pump #1207: Five Ways To Lose Weight Without Counting Calories Forks over Spoons: The Impact of Cutlery on Calorie Estimates Big Fat Disconnect: 90% of Us Think Our Diets Are Healthy The Ultimate Goal to Intuitive Eating – Mind Pump Blog Selective Androgen Receptor Modulators (SARMs) | USADA Mind Pump #1507: Everything You Need To Know About Steroids With John Romano Mind Pump #1387: Turning Your Body Into A Fat-Burning Machine Mind Pump Podcast – YouTube Mind Pump Free Resources People Mentioned Michael Rapaport (@michaelrapaport)  Instagram Dave Portnoy (@stoolpresidente)  Instagram Adam Sedlack (@ufcgymperez)  Instagram Ben Greenfield Fitness (@bengreenfieldfitness)  Instagram Sonny Webster (@sonnywebstergb)  Instagram Melissa Wolf WBFF BIKINI PRO (@meliwolff)  Instagram

Cyber Security Inside
27. What That Means: Carbon Neutral Computing

Cyber Security Inside

Play Episode Listen Later Mar 31, 2021 19:21


In this episode of What That Means, Camille dives into the topic of carbon neutral computing with Director of Strategy and Business Development in the Server Group at Intel, John Miranda.   The conversation is a fascinating one, and covers things like: •  The three R’s of sustainable computing   •  The unpredictability of supply and demand + the problems it poses for renewable energy   •  Why you can’t store renewable energy   •  What some companies are doing to try to reduce their energy footprints   •  How a carbon-aware laptop might operate to use more green energy and less fossil fuel   •  How time shifting can help with sustainability, while saving companies and consumers money   • Space shifting   ...and a lot more. This is one fascinating convo you don’t want to miss. Have a listen!   Here are some key take-aways: •  In the future, our laptops and other devices in the home may be carbon-aware and able to assertively reduce fossil-fuel use and increase renewable energy use.   •  One of the challenges in sustainable compute is that with renewable energy, there’s less consistency and predictability in terms of supply and demand.    •  At scale, it’s too expensive to store renewable energy. But we can use time shifting and space shifting to ‘chase’ the sun and wind.   •  The three R’s of sustainable compute: reduce, reuse, recycle.   Some interesting quotes from today’s episode: •  “Because at the end of the day, it’s not how much energy compute requires; it’s how much fossil energy does compute burn. ‘Cause that’s what’s creating the carbon footprint.”    •  “As you make the grid substations more kind of intelligent, if you will, you can start forecasting weather conditions, and you can start empowering IoT devices, data centers, and so on and so forth, to understand what are the upcoming energy conditions — where they can then optimize their operations accordingly.”   •  “It’s use it or lose it. If you can’t generate demand, the grid cannot accept energy.”   •  “Imagine the idea that you can get paid to use power at certain times of the day. So now, if you can make your operations more agile and carbon-aware, it can translate into an OPEX savings.”

Cyber Security Inside
26. What That Means with Camille: Crowdsourced Security and Bug Bounty

Cyber Security Inside

Play Episode Listen Later Mar 24, 2021 29:31


In this episode of What That Means, we’re talking crowdsourced security and bug bounty, and we’ve got a treat for you: double the brilliance with Katie Noble and Alexander Romero (RoRo). Both are Directors of PSIRT at Intel and both have extensive experience in cyber security as DC veterans (think Department of Homeland Security and the Pentagon).   Our convo covers: •  The flavors of bug bounties   •  Crowdsourced security   •  Vulnerability Disclosure Programs (VDPs)   •  Security Technical Implementation Guides (STIGs)   •  CSIRT & PSIRT   •  Hackcidents    •  Red teams, blue teams, purple teams   •  IoT   ...and more!  Join me for an interesting and insightful conversation.    Here are some key take-aways:   •  Crowdsourced security relies on the wisdom of the crowd to find vulnerabilities in systems that might otherwise be missed.    •  Bug bounties differ from VDPs in that they’re more of an invitation to find vulnerabilities and report back to the vendor. With bug bounties, there’s also an incentive (sometimes financial, sometimes not).   •  Bug bounty incentives can include money, airline miles, lunch with important people, pieces of hardware, and other things.   •  Static bug bounty programs are often open to all products and all people. Proactive bug bounty programs may be time-sensitive and only open to specific products and specific researchers.    •  Bug bounty programs aren’t for everyone. There are some steps you need to take beforehand, like deciding what you’re asking people to look at. You also need to have a strong VDP in place first, so you can deal with the submissions and effectively mitigate problems.    •  Problems and vulnerabilities with products are reported to PSIRT. Problems and vulnerabilities with infrastructure are reported to CSIRT.    •  There are legal coverage considerations that you must think of with a bounty. The scope should be well understood, but you also need to allow for the reality that you might not know everything that the system touches.    •  If you start with an internal bug bounty program, you need to teach your internal team to have a different mindset, a hacker mindset. The mindset of a builder is typically much different from the mindset of a breaker.    •  Until we get to a place where we understand that there is only one world now, there's so much attack structure that is being left unsecured.   Some interesting quotes from today’s episode:   “We had our own tools and our own way of looking at problems, but when you bring somebody from the outside in, they have a different view of the world, different frame, different lens, and that's very helpful at times to kind of see things from the perspective of an adversary or an actual criminal hacker.”   “There is this compliance checklist, for example. We call these Security Technical Implementation Guides — STIGs. And if you follow these, you should be secure. But that's not really always the truth. Sometimes there are other things, some other interactions between software or the services that you're using, that then lead to vulnerability.”   "But researchers had never really been given the opportunity to talk directly to the DoD in that form before. And it turns out they had other vulnerabilities that they were aware of, that they wanted to tell us about, but we didn't have a good way to accept those.”   “A bug bounty, for better or for worse, is going to pull attention towards your product or your company.”   “Bug Bounties are not appropriate for everybody. There is kind of a push, like a ‘fear of missing out’ kind of deal. Like ‘Everyone has a bug bounty and I want one, too.’ But that may not be appropriate for your business. There are other steps that you probably need to think about before you start with a bug bounty.”   “You need to be able to decide, what is it you want people to look at? Are you asking them to look at your products or are you asking them to look at you? That's going to be different.”   “I would say you need to have a strong vulnerability disclosure process in place…You need to be able to deal with those submissions. You need to be able to respond effectively, mitigate the problems. All of that takes policy, process, procedure, infrastructure. It's not something that is an overnight sort of deal.”   “You need to have a method of receiving that information, triaging that information, mitigating it, and then communicating back out to the researcher that you've done those things.”   “I would recommend that every organization start out with a sort of ‘internal bounty’ first. So have your engineers, have your folks who understand the system, try to find vulnerabilities. And if they don’t, still pretend as though they did, and then run it through your process that way — so you can find areas where your process might have holes, or you don't know who the system owner is, or who can take action on it. At the end of the day, that’s what you're trying to do.”    “A lot of times when folks have designed the system, they're looking at it from that perspective. And it’s hard to switch over to kind of an adversarial mindset, which is what these researchers bring.”   “Also, things change, implementations change all the time. So it wasn't necessarily a flaw when the product was designed, or a weakness — it was something that was meant to be that way. But then a product changed or was implemented in a way that the original engineer didn't anticipate.”   “The role of the PSIRT is to facilitate. It's to be the coordinator. It's to be the balanced voice in the room that's kind of trying to move things along. We're not tied to one perspective or another perspective. We're willing to be open-minded and see all the perspectives. And you definitely need all the perspectives.”   “The goal is always to protect the user, and it doesn't matter if you're in government or if you're in private sector. The goal is to keep the eyes on the prize, protect the end user, make this as strong as we can.”

Invest Smarter
(Ep. 23) Cathie Wood's Capacity Problem, Bitcoin's Green Problem, and... the Metaverse?

Invest Smarter

Play Episode Listen Later Mar 22, 2021 53:56


This week's episode was a blast to record. We start off by covering a great piece from Morningstar about the challenges Cathie Wood and her Ark funds are likely to face now that her funds are enormous. We chat about the Fed and what Jerome Powell said to make markets happy. We discuss a great 2020 and 2021 outlook from legend Howard Marks from Oaktree Capital Management. We discuss some interesting Bitcoin facts, particularly as it relates to environmental concerns. We also look at how there is truth to the idea that investing in stocks a monkey picks by throwing darts at a stock dartboard is potentially a better option than a cap-weighted index fund. And we wrap up trying to figure out NFTs and Metaverses! Enjoy! Articles Discussed: Morningstar: No Room on the Ark? Here's what changed in the new Fed statement Fed sees the stronger economy and higher inflation, but no rate hikes Howard Marks 2020 Review The Nasdaq Is Acting Strange. What That Means for Stocks. The Flaws of Capital Asset Pricing Model (CAPM) BofA Global Research: 10 Surprising Facts About Bitcoin - The Big Picture Commodities Supercycle Looks Like a Stretch - WSJ

Mind Pump: Raw Fitness Truth
1514: Ways to Increase Testosterone Levels Naturally, How to Correct Imbalances Between Both Sides of the Body, Tips for Preventing Injuries When Lifting Heavy & More (Listener Live Coaching)

Mind Pump: Raw Fitness Truth

Play Episode Listen Later Mar 20, 2021 86:36


In this episode of Quah (Q & A), Sal, Adam & Justin answer four Pump Head questions via Zoom. Name that popular movie quote. (3:26) Adam responds differently to certain nootropics. (6:30) How bodybuilder pumping reps may build more muscle than full-range of motion ones. (13:13) Why lifting tempo doesn't matter. (17:53) How Sal is finding gray hair in other places. (22:18) Cakes and weights. (23:38) Why Justin is experimenting with the DuckDuckGo search engine. (25:08) Italy is heading into another lockdown. (29:34) Obesity versus smoking, which is worse for your health? (32:24) The game-changing benefits of drinking LMNT. (41:17) The ultimate all-in-one health monitor wearable coming soon?! (42:36) #Quah question #1 – Do you have any advice on how to correct imbalances between both sides of my body when doing the big lifts? (49:15) #Quah question #2 – What are some ways you can increase your testosterone levels naturally? (55:30) #Quah question #3 – How can I promote longevity through powerlifting and address muscle imbalances? (1:09:45) #Quah question #4 – How can I break the plateau I am experiencing with my bodyweight squat? (1:16:31) Related Links/Products Mentioned March Specials: Get in Shape for Summer! MAPS HIIT, MAPS Spilt, and the Bikini Bundle all half off! – Promo code “SPRINGBREAK” at checkout Visit Organifi for the exclusive offer for Mind Pump listeners! **Code “mindpump” at checkout* Occlusion Training Guide - Mind Pump Media Occlusion Training Tutorial- How to Increase Muscle Size Using Blood Flow Restriction - Mind Pump TV Why You Need to Mix Rep Ranges After Periods of Training – Mind Pump Blog Why Your Tempo Matters When You Workout! - Mind Pump TV A year after COVID-19 slammed Italy, a third wave is making it deja vu all over again More countries suspend AstraZeneca vaccinations over blood clot fears: What we know so far iGen: Why Today's Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy–and Completely Unprepared for Adulthood–and What That Means for the Rest of Us Art of Happiness Podcast - An Epidemic of Loneliness The U.S. Obesity Rate Now Tops 40% Visit Drink LMNT for an exclusive offer for Mind Pump listeners! New skin patch brings us closer to wearable, all-in-one health monitor Single Arm Cable Row (DO THIS BACK WORKOUT) | Mind Pump TV Why Can't I Feel the Right Muscles Working? - Mind Pump Blog How Men Can Naturally Increase Their Testosterone – Mind Pump Blog Common Signs of Low Testosterone – Mind Pump Blog Visit Joovv for an exclusive offer for Mind Pump listeners! MAPS Fitness Prime | Muscle Adaptation Programming System MAPS Prime Webinar MAPS Prime Pro Webinar Mind Pump TV - YouTube MAPS Fitness Prime Pro | Muscle Adaptation Programming System Mind Pump Podcast – YouTube Mind Pump Free Resources People Mentioned Craig Capurso (@craigcapurso)  Instagram Arthur Brooks (@arthurcbrooks)  Instagram Paul J. Fabritz (@pjfperformance)  Instagram

Cyber Security Inside
25. What That Means with Camille: Privacy and Its Policy

Cyber Security Inside

Play Episode Listen Later Mar 17, 2021 22:23


On this episode of What That Means, Camille talks cyber security privacy and policymaking with Claire Vishik, an Intel fellow and Chief Technology Officer of the Government Markets and Trade division at Intel. Her work focuses on artificial intelligence, hardware, and network security, trusted computing, privacy enhancing technologies, some aspects of cryptography and related global policy and trade issues.  Claire is also on the board of directors of the Trusted Computing Group and TDL, otherwise known as Trust in Digital Life. She's co-chair of the IEEE effort on blockchain and advisor on numerous international research and policy initiatives.   This episode covers:   •  Various definitions of “Privacy” shared by Claire to fuel your thoughts on privacy and security   •  How different international standard bodies establish different frameworks and guidelines to protect individual’s privacy   •  US vs. Europe: Both communities’ approach to privacy are very differently   Some interesting quotes from this episode: “[Each standard body] is using their own definition of the privacy space that is necessary for them to work in this area. There is no disagreement and really no multiple views. What we lack is some kind of high-level definition that will define privacy in all these very different aspects.” “In Europe the foundation is in the principle that privacy is a fundamental human right… In the US, we do not have a federal privacy law.  We have a hodgepodge of different privacy regulations in states that aren’t harmonized approach, different areas of privacy.”

Mind Pump: Raw Fitness Truth
1511: How to Properly Use Creatine, How to Weigh Meat When Tracking Macros, the Truth About Cholesterol & More

Mind Pump: Raw Fitness Truth

Play Episode Listen Later Mar 17, 2021 74:38


In this episode of Quah (Q & A), Sal, Adam & Justin answer Pump Head questions about how much creatine to consume, whether high cholesterol is still the demon it was once thought to be, whether you should weigh your meat raw or cooked, and movements that help older people build strength. Mind Pump on dirty song lyrics of their youth. (4:22) Burger King is a marketing genius. (12:09) Addressing the hip thrust versus back squat controversy from a previous episode. (16:54) Does the use of anabolic steroids cause long-term testosterone production damage? (20:42) Ned's new product ‘Mello' is blowing the guy's minds! (24:09) How success breeds more success. (29:00) Mind Pump's theories on the recent non-fungible token (NFT) craze. (34:10) Did you know there is an approved surgery to make you taller?! (39:35) What will the long-term effects of masks be? (42:10) How the Public Goods membership service works. (48:41) #Quah question #1 - How much creatine should I consume and when? (51:00) #Quah question #2 – Is high cholesterol still the demon we once thought it was? Such as having high LDL, but also having high HDL? (55:47) #Quah question #3 – When using a food scale to track ounces of meat, should you measure raw or cooked? (1:03:08) #Quah question #4 – Lots of people have older family members they care for. If you were to recommend a few movements that would help them build some strength, what would they be? (1:05:57) Related Links/Products Mentioned March Specials: Get in Shape for Summer! MAPS HIIT, MAPS Spilt, and the Bikini Bundle all half off! - Promo code “SPRINGBREAK” at checkout iGen: Why Today's Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy–and Completely Unprepared for Adulthood–and What That Means for the Rest of Us Burger King apologizes for saying 'women belong in the kitchen' in a tweet advertising a new scholarship for female chefs Back Squat vs. Hip Thrust Resistance-training Programs in Well-trained Women – PubMed Bodybuilding steroids linked to long-term testicular damage, study finds - CNN Mind Pump #1507: Everything You Need To Know About Steroids With John Romano What Does Magnesium Do For Your Body? Visit NED for an exclusive offer for Mind Pump listeners! Visit Drink LMNT for an exclusive offer for Mind Pump listeners! The Millionaire Next Door: The Surprising Secrets of America's Wealthy Digital art by Beeple sells for $69.4 million amid NFT boom What's An NFT? And Why Are People Paying Millions To Buy Them? Men are paying $76,000 for a limb-extending surgery that involves breaking leg bones and inserting nails and screws Erase the Face: How to Dehumanize an Entire Population Visit Public Goods for an exclusive offer for Mind Pump listeners! **Receive $15 off your first Public Goods order with NO MINIMUM purchase** Photobiomodulation in human muscle tissue: an advantage in sports performance? Cholesterol For Muscle Gains – Mind Pump Blog New federal guidelines may lift dietary cholesterol limits MAPS Macro Calculator Mind Pump Podcast – YouTube Mind Pump Free Resources People Mentioned Connor Murphy (@connormurphyofficial)  Instagram

TIME's The Brief
The Fight Against Child Poverty in America Finally Takes a Big Step Forward... and More Stories

TIME's The Brief

Play Episode Listen Later Mar 14, 2021 41:36


Included in this episode: 1. The Fight Against Child Poverty in America Finally Takes a Big Step Forward 2. Brazil’s Bolsonaro Denied COVID-19 Was a Problem. Now He’s Embracing Vaccines. Here’s What Changed 3. 'We've Had Enough.' Australian Women Force a Reckoning on Sexism After a Rape Allegation in the Government 4. As Many Americans Get COVID-19 Vaccines and Financial Support, Undocumented Immigrants Keep Falling Through the Cracks 5. Mortgage Rates Hit 3% for the First Time in Months. Here’s What That Means for You .

Mind Pump: Raw Fitness Truth
1504: Balancing Fat Loss & Muscle Gain Goals, What to Do When You Hit a Plateau, When to Change up Your Workout & More (Listener Live Coaching)

Mind Pump: Raw Fitness Truth

Play Episode Listen Later Mar 6, 2021 74:10


New UFC Gym Grand Opening in Mind Pump's neck of the woods. (3:45) Mind Pump Reminisces: The old school culture of creating successful gyms. (5:58) The growing trend of ‘helicopter parenting' and the dangerous consequences from it. (19:18) How Adam has been using the ChiliPad to wake up naturally in the morning. (24:03) Weird News with Sal: Whale vomit is worth how much?! (25:58) Caldera is a HIT with men! (30:36) Micro-dosing and self-awareness. (31:41) #Quah question #1 – How can I break out of a plateau? (42:55) #Quah question #2 – How can I balance fat loss while maintaining my muscle-building goals? (50:56) #Quah question #3 – Advice on when to know it's time to change up my programming and nutrition? (59:18) #Quah question #4 – How can I get to my goal of 14% body fat the right way? (1:06:33) Related Links/Products Mentioned March Promotion: Get in Shape for Summer – Promo code: “SPRINGBREAK” at checkout Mind Pump #1390: The State Of The Gym Industry With UFC Gym President Adam Sedlack Mind Pump #985: Mark Mastrov- Fitness Industry Empire Builder, NBA Owner & Original Mind Pump Mentor iGen: Why Today's Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy--and Completely Unprepared for Adulthood--and What That Means for the Rest of Us The Coddling of the American Mind: How Good Intentions and Bad Ideas Are Setting Up a Generation for Failure Visit ChiliPad for an exclusive offer for Mind Pump listeners! Best Mattress Cooling Pads From Consumer Reports' Tests Thailand woman finds whale vomit worth Rs 2 crore while walking along the beach Visit Caldera Labs for an exclusive offer for Mind Pump listeners! **Code “mindpump” at checkout for the discount** Columbia professor: I do heroin regularly for ‘work-life balance' #1593 - Dr. Carl Hart - The Joe Rogan Experience - Spotify MAPS Powerlift | Muscular Adaptation Programming System MAPS Fitness Prime Pro | Muscle Adaptation Programming System The Hip Airplane - Squat University MAPS Fitness Anabolic | Muscle Adaptation Programming System Macro Guidelines for Building Muscle – Mind Pump Blog Intuitive Nutrition Guide | MAPS Fitness Products MAPS Fitness Performance | Muscle Adaptation Programming System MAPS Fitness Anywhere | Muscle Adaptation Programming System Mind Pump Podcast – YouTube Mind Pump Free Resources People Mentioned Dr. Carl Hart (@carlhart)  Instagram

Cyber Security Inside
23. What That Means with Camille: Deep Learning and AI Ethics

Cyber Security Inside

Play Episode Listen Later Mar 3, 2021 27:52


On this episode of What That Means, Camille welcomes Ria Cheruvu on the show to discuss deep learning and AI ethics. Ria is the Lead Architect for AI Ethics at Intel's Internet of Things Group. She has a Master’s in Data Science from Harvard University and her research at Intel focuses on artificial security and ethics, uncertain AI robotics, deep learning for the Internet of Things, and computational models of intelligence. Oh, did we mention that Ria is only 16?   Oh, did we mention that Ria is only 16?  This is one convo you don’t want to miss.    The convo covers: •  How AI and DL are related  •  Supervised and unsupervised learning •  Generative models •  Adversarial networks •  AI ethics •  GPT3 •  Deep learning as it relates to cyber security •  Model extraction •  Red team penetration testing •  Differential privacy •  Model unlearning •  Federated learning ... and more!   Here are some key take-aways: •  Deep learning is a subset of artificial intelligence. There are different ways to use artificial intelligence and one form of deployment is deep learning.  •  The goal of deep learning is to parallel or mimic human intelligence so that high-level functions can be performed. •  Deep learning includes multiple algorithms and sub-applications, like reinforcement learning, supervised learning, unsupervised learning, active learning, and more.  •  Supervised learning requires that data scientists supervise and correct the computer as it learns. This enables pattern recognition and can be used for everything from cat/dog detection to self-driving cars. •  Unsupervised learning allows for an exploratory analysis of data, without a defined input/output. This type of learning does not rely on human correction. Some applications include: deep fakes, generative art, and 3D objection reconstruction/construction from a single image. •  The major difference between supervised and unsupervised learning is that in the former, the machine is trying to predict an output, whereas with the latter, the machine is trying to create an output.  •  Even in unsupervised learning, there is a need for humans to be involved in the process, for ethical and safety reasons.  •  Deep learning can be used to improve security threat detection and response by recognizing anomalies and patterns in user behavior.  •  Hackers can use deep learning to identify the cyber security defenses of an organization, and also to break the IP of the AI and DL models that the organization is using. •  Ethics and security can be interconnected in some situations and contentious in others.    Some interesting quotes from today’s episode:   “To summarize it, deep learning is our best attempt at trying to mimic human intelligence using algorithms and computational models.”   “In the case of deep fakes, we have issues with AI safety and ethics. Who is going to control the creation of this algorithm? Where are we going to publish its outputs? How do we let the public know that this was generated by an AI algorithm and not by a human?”   “We're starting to build algorithms that don't require as much data, and that can work with small data rather than big data, and still form interesting extrapolations and find interesting patterns.”   “In this cyber security domain, especially, more data is very beneficial for tasks such as malware detection or being able to predict user behavior and anomalies, etc. In these types of situations, there are two different approaches that can leverage deep learning. One is detection and the other is response.”    “The idea here is that just by querying the system and by getting the outputs of the AI model and its confidence scores, you can start to reconstruct that model or even learn more about it.”    “If we can kind of anticipate those problems beforehand using these techniques like red teaming or penetration testing, then I think that that would be a great step forward.”   “I mentioned predictions in retail, which is kind of vague. But the idea is, you’re able to form marketing based on certain data that you're recognizing from your environment.”   "We want to make sure that this data is being encrypted. It's sensitive. It's not being sent to a server, but I'm still providing the user with the insights that they want to know or tailoring the product to their needs.”   “The whole idea with AI security is that we want an end-to-end security solution…All of these techniques could interact with each other, potentially, and are important for securing the entire AI pipeline.”

Cyber Security Inside
21. What That Means with Camille: Diversity and Inclusion

Cyber Security Inside

Play Episode Listen Later Feb 17, 2021 24:51


In this episode of What That Means, Camille talks diversity and inclusion in cyber security with Isaura Gaeta. Isaura is the Vice President of Security Research at Intel, a 5-time winner of The Intel Achievement Award, and an international speaker on diversity and inclusion in the tech workplace. Tune in for a great convo around: •  What diversity and inclusion is •  Why diversity and inclusion matter in cyber security •  Why diverse teams lead to better innovation •  What neurodiversity is •  The importance of updated and inclusive language in tech And more. Don’t miss it!   Here are some key take-aways: •  Diversity refers to the unique attributes that we all bring to the workplace. Inclusion is about getting the mix of unique attributes to work together. •  A diverse and inclusive workforce allows us to bring more perspectives (and more solutions) to the challenges we face.  •  It’s important to remember that one single approach is not going to solve every problem. An inclusive environment is a flexible environment that makes room for different points of view and different approaches. •  In tech, a curious mindset is common amongst team members. A manager’s job is to give guardrails and then let the curious minds get to work within those guardrails.  •  Neurodiversity is about recognizing that we all have different abilities and approaches. It’s about being aware that the ways we prefer to work and the environments we need to do that work may be different.  •  As a manager in the tech space, it’s your job to create an environment that allows everyone on your team to be successful. •  There are outdated terms in the tech space that can be triggering for many people. There’s a need to update engineering terminology to be more inclusive.    Some interesting quotes from today’s episode: “By bringing people in that see the problem in a little bit of a different way, you may come up with something you hadn't thought of yourself or something that like-minded individuals may not come up with by themselves. As you bring in these different perspectives, someone might say, ‘What about this?’ Or ‘What about that?’ And suddenly, a breakthrough and new innovation can really come.”  “If you're a technology company, if you're doing anything in technology, you definitely want to make sure that you have a very diverse workforce, because it will lead to better innovation. And of course, better innovation leads to better products, better sales.” “In cyber security, we really need professionals that know how to break things. It's actually a different way, cognitively, to approach the problem. So what are the weaknesses in this product that I just designed? What did I forget to think about? What did I forget to secure? What is it that is the weakness in this particular design? Someone that can approach a problem in that regard is highly valuable, because as an engineer, I don't see that perspective. I build it to the specifications and I'm done. And without that different perspective, I just don't know what I don't know."  “For me, the learning as a manager has been to not add too many rules. Just give guardrails.” “People operate differently and in cyber security you might find a few more people that are neurodiverse than you might in the general population.” “But as you expand and broaden the workforce, some of those terms feel different. So if I hear ‘master slave,’ and I came from an environment, for example, where those terms are very traumatic or it's tied to my heritage, to my family, when I see them show up in engineering terminology, it's hard for me to overlook it.”  “The terms that we're really trying to avoid are terms that hurt people.” “I think 2020 really opened eyes for a lot of people of inequities that we have. We have inequities in the corporate system, inequities in society. And if we can feel comfortable to bring up things that we see that are not equitable, and when we bring them up, that management, that leadership is receptive to make those changes, then we're going in the right direction.”

Cyber Security Inside
18. What That Means with Camille: Orchestration at the Edge

Cyber Security Inside

Play Episode Listen Later Feb 3, 2021 23:47


In this episode of What That Means, Camille’s tackling the big and broad topic of orchestration at the edge with guest Abdul Bailey, a Principal Engineer with Intel’s Internet of Things Group.    Their convo touches on things like: What is included in the concept of orchestration What the ‘edge’ is How and why the security model changes with orchestration at the edge ATM’s POS, programmable logic controllers, windmills, oil rigs, and other uses Network connectivity issues Workload prioritization The Cloud Native Computing Foundation Machine learning Computer vision   And more. Don’t miss it!   Here are some key take-aways: There’s a complexity in an orchestration at the edge conversation that you won’t find in a data center style conversation because the security model is different. Orchestration at the edge requires greater security because everything isn’t protected behind a wall. Some resources are out in the real world, away from those secure data centers.  A higher level of intelligence, reaction time, and redundancy needs to be built in with orchestration at the edge. So that when a ‘parent’ device fails, another device in the area can take over that role immediately.  Orchestration requires something that describes the workload. But it’s the tools that take over and get that work done.  You can’t apply the same security that’s used at the data center to the edge. You have to look at the differences and identify what needs to change.  The edge orchestration software space is projected to grow to a $513 million worldwide market opportunity by 2023.    Some interesting quotes from today’s episode: “Orchestration is everything really. It's the culmination of bringing together the compute, the networking, the storage, the software, the services, everything together, such that it can support that dynamic environment, where you can take workloads that have been containerized, and maybe the micro-services associated with those workloads, which have been containerized, and have the ability to distribute them across the environment.”   “The security model changes when you talk about orchestration at the edge. Because you've got the cars in the data center, you've got everything behind a wall, guarded, and there's plenty of security. But now you're talking about ATM’s that are sitting out in your local store. You've got digital displays that are sitting at the airport. So your security model has now changed.”   “You definitely have workloads that need to be done. But you need to have those workloads constructed in such a way that they're one, containerized — meaning that all of the resources needed to execute that workload are in that container and you don't have a heavy dependency on a bunch of patches to the operating system to make it work. And once you've got things containerized, you want to be able to have that flexibility to understand what those resources are at that edge, and then determine where to send them to be executed.”   “We talked about a windmill or an oil and gas rig that's sitting out in the middle of nowhere. If network connectivity goes down, do you want that workload—that analytics workload — to stop working just because it can't talk to something? No. You want it to be intelligent enough so that the windmills in the area or the oil rigs in the area can continue to talk and execute their workloads, and share the analytics across them so that everything just doesn’t come to a screeching halt.”   “When you talk about orchestration and a data center, you're typically leaning on more of a central server and devices connected to that central server model. But when you talk about it at the edge, you're talking about like you described — that distributed environment.”   “I think we are going to continue to evolve and grow the conversation and orchestration at the edge, so that we can get to that ant farm-like model that you just described. Where there isn't a need for a central device to constantly be telling everything in the environment what to do.”   “So you're talking about different security protocols, different methods of authenticating the security that's running on one device before it talks to another device. All of these things create a different security paradigm, and if you don't take those into consideration, you could introduce vulnerabilities into your network.”

Mind Pump: Raw Fitness Truth
1481: The Truth About Fat Burners, How to Improve Ankle Mobility, the Importance of Setting Fitness Goals & More

Mind Pump: Raw Fitness Truth

Play Episode Listen Later Feb 3, 2021 69:46


In this episode of Quah (Q & A), Sal, Adam & Justin answer Pump Head questions about when to switch-up trigger session exercises, why ankle mobility is so slow to change, when fat burners are recommended, and the importance of having a goal in fitness. Why Sal believes his son is SUPER advanced. (5:43) The guy's first cars they ever owned. (9:40) How social media may be enhancing mob mentality. (22:10) When Jordan Shallow pokes fun at Mind Pump. (32:31) Updates on the Mind Pump team workouts and how they are adjusting their nutrition/training. (33:54) Happy Birthday, Justin! (37:34) Why even with all the natural disasters, Justin loves his home. (41:29) The differences between brilliant people and down to earth people. (43:49) #Quah question #1 - How often should you switch-up your exercises used for trigger sessions? Should you always be doing trigger sessions or phase them in and out of your daily routine? (48:17) #Quah question #2 – I've been working out on the combat stretch for over six months, as well as other ankle mobility drills, and it seems like my ankle mobility has barely changed. Why? (54:01) #Quah question #3 – Is there any scenario where you would recommend a fat burner? (58:09) #Quah question #4 – How important is it to have a goal in fitness? Such as fat loss, competition, or aesthetics? (1:03:08) Related Links/Products Mentioned February Promotion: Phase II Bundle iGen: Why Today's Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy--and Completely Unprepared for Adulthood--and What That Means for the Rest of Us The History Behind 'Mob' Mentality - The New York Times The Psychology of Mob Mentality | Psychology Today The Science Behind Why People Follow the Crowd Mind Pump #1480: How To Find Peace & Meaning Amid Chaos With Bishop Robert Barron Visit Felix Gray for an exclusive offer for Mind Pump listeners! Visit Legion Athletics for the exclusive offer for Mind Pump listeners! **Code “mindpump” at checkout** Elon Musk VS Jeff Bezos in the race for satellite internet The Most Overlooked Muscle Building Principle – Mind Pump Blog Adam Schafer's DEEP Squat Mobility Secrets | Behind The Scenes at Mind Pump MAPS Prime Pro Webinar Mind Pump #1462: Setting New Year's Resolutions That Actually Work Mind Pump Podcast – YouTube Mind Pump Free Resources People Mentioned Bishop Robert Barron (@bishopbarron)  Instagram Jordan Shallow D.C (@the_muscle_doc)  Instagram

Cyber Security Inside
16. WTM with Camille: 3D Printing, Additive Manufacturing, Distributed Manufacturing

Cyber Security Inside

Play Episode Listen Later Jan 20, 2021 21:17


What That Means: 3D Printing, Additive Manufacturing & Distributed Manufacturing   In this episode of What That Means, Camille gets into the current uses and future possibilities of 3D printing — plus, what security might look like — with Dr. Irene Petrick, Senior Director of Industrial Innovation in the Internet of Things group at Intel.    The discussion covers things like:    Where 3D printing is being used and what materials are used The hallmarks of 3D printing What’s hindering 3D printing adoption How design approach has to change with 3D printing The role blockchain may play in ensuring security and quality in 3D printing The shift in tracking and liability required with 3D printing   And more. Check it out.    Here are some key take-aways:   For the most part, 3D printing, additive manufacturing & distributed manufacturing are interchangeable terms — but audience matters. A major advantage of 3D printing is that it reduces waste and scrap. Rather than having to invest in large blocks of costly materials like titanium and then cutting away what’s not needed, you lay down, layer by layer, exactly what you do need. When doing 3D printing, you can’t simply reverse engineer a traditional part. You have to approach design from a different perspective.  The dental and medical fields are currently making great use of 3D printing, printing things like teeth, joints, and more. 3D printing is not about large scale production, but rather about creating small, customized “products.”    Some interesting quotes from today’s episode:   “The difference between a traditional manufacturing and production and 3D printing is I'm really reducing scrap because I'm not laying down material I don't need.” “The challenge becomes making sure that that layered by layered part has the same attributes as one where I've used subtractive manufacturing.” “One of the things that's hindering 3D printing adoption right now, is there aren't enough engineers trained or designers trained to think about a different way of designing and a different way of using materials, to what's called ‘functionally graded’.” “3D printing isn’t ever going to be aimed at large-scale volumes.” “I'm basically shipping digital files. And so tracking the provenance of those digital files is going to be a bit different.” “What we're talking about, ultimately in the industrial space, is a method of creating small numbers of parts that can be highly customized.”

Cyber Security Inside
14. What That Means: Blockchain

Cyber Security Inside

Play Episode Listen Later Jan 6, 2021 22:49


In this episode of What That Means, we’re talking blockchain with the blockchain god: Mic Bowman, of Intel Labs.    We cover: The differences between blockchain, Bitcoin, and distributed ledger technology What people are arguing about in the blockchain world How blockchain acts as a substitute for inter-organizational trust What cryptokitties are going for these days Hashing What smart contracts are When blockchain is the right decision Blockchain in a box And lots more. Check it out!   Here are some key take-aways: With blockchain, you have to think about the application. What’s the problem you’re trying to solve? Blockchain acts as a substitute for organizational trust and allows us to have an authority that’s outside any given organization. With Bitcoin, whatever the record says is truth, whether it really happened or not.  There are trade-offs between trustworthiness and computability.    Some interesting quotes from today’s episode: “Really there's no delete. There's no removing something from the record. There may be reversing it, but removing from the records very, very difficult.” “The specifics of the technology have to do with the applications.” “Blockchain is a useful technology for addressing some problems. But it’s not the solution for all problems.” “Agreement is not always truth, but for the purposes of things like digital assets and cryptocurrencies, agreement is truth…”

Cyber Security Inside
13. What That Means: Homomorphic Encryption

Cyber Security Inside

Play Episode Listen Later Dec 30, 2020 18:44


In this episode of What That Means, Camille tasks Principal Engineer at Intel Labs, Rosario (Ro) Cammarota, with defining homomorphic encryption in three minutes or less. And yes, he nails it.  The convo is an interesting one and covers things like: What homomorphic encryption is and why it’s considered the ‘Holy Grail’ of cryptography What the security advantages of homomorphic encryption are  Where traditional encryption is vulnerable to attacks How homomorphic encryption raises the bar of protection in healthcare and other uses cases Why not all data would be encrypted with homomorphic encryption How homomorphic encryption can be used in clinical trials to bring drugs to market faster The barriers and challenges in the evolution and adoption of homomorphic encryption And more. Listen now.    Here are some key take-aways: The concept of processing data while in their encrypted form is not a new concept.  The advantages of homomorphic encryption are that: 1. The data is never decrypted through its lifecycle, and 2. The decryption keys that are used in traditional encryption techniques to access the content of the data don’t need to be stored on the system.  Homomorphic encryption is something that can be used in combination with other protocols, like blockchain and distributed ledger technology.   When multiple entities are collaborating on data, homomorphic encryption increases confidence that: third party data aren’t being leaked and that privacy aspects inherent with the data aren’t being violated. The adoption of standardized cryptography is needed. Because the ciphertext of homomorphic encryption procedure is so much larger than the original data type, you wouldn’t encrypt all of your data.   The term homomorphic encryption describes a family of cryptographic schemes. The most efficient homomorphic encryption schemes are based on lattice-based cryptography constructions.   Some interesting quotes from today’s episode: “Homomorphic encryption defines a set of encryption techniques and rules that allow you to perform a computation on the content of the encrypted envelope, without the decryption.”   “Homomorphic encryption, specifically, is considered the Holy Grail of cryptography, just because it has this capacity of computing on encrypted data.” “Homomorphic encryption raises the bar of protection by protecting the data also from the tenant.”  “Any time you need to process data within a trusted execution, you need to decrypt the data.” “Homomorphic encryption is very computational expensive. And just the encryption procedure compared to traditional encryption also is relatively inefficient.” “This idea that you can compute on encrypted data without decrypting, may be puzzling, to say the least.” “My guess is that in the future, we will see the deployment of a hybrid type of schemes.”

Cyber Security Inside
12. What That Means: PSIRT

Cyber Security Inside

Play Episode Listen Later Dec 23, 2020 21:48


In this episode of What That Means, Camille invites Lisa Bradley, Director of Product and Application Security at Dell Technologies, onto the show to talk Product Security Incident Response Teams (PSIRT).  Their convo covers things like: The job of PSIRTs The relationship between PSIRT and Secure Development Lifecycle (SDL) The difference between a weakness and a vulnerability How PSIRTs measure themselves What a CVD is How response timelines are set Transparency and trust Where smaller companies should start when setting up a PSIRT And lots more. Check it out.   Here are some key take-aways: No company, old or new, will ever stop uncovering vulnerabilities.  You need to make sure your company understands the importance of security and that sometimes security updates can be more important than feature updates. Establishing a good working relationship with researchers is really important. Be smart about when you’re disclosing vulnerabilities, especially if there’s nothing a customer or anyone else can do about it at the time. A lot of customers will say, ‘We want to know about a vulnerability right away!’ But it's actually not a good industry practice.   Some interesting quotes from today’s episode: “Security at times can be more important than doing feature updates. But that's very difficult for teams to hear, because they think that profit comes from features.”  “Lately, we're seeing a lot of customers that won't sign contracts or buy our product lines unless we have the right security practices in place. So security is somewhat a selling point, even though we don't make any money to address vulnerabilities.” “I think that we're going to see this continued trend of actually more vulnerabilities, until we go to more of a flatline. But they'll never go away.” “Do I want to say to every company that’s starting ‘Have security in the back of your mind, know that it's going to be there, know that you need to start early’? Yes. But is that the reality when you're financially not set to do more?”  “I would say if you were looking at a company, and they weren't putting any security updates out at all, that there's a problem.”  “It's really important to make sure if you're somebody who’s starting off, to have an email address, to establish relationships with researchers, to make sure they know how to get ahold of you. So that you could work with people before they want to publicly disclose something on you without having it patched.”

Cyber Security Inside
10. What That Means: Human Factors

Cyber Security Inside

Play Episode Listen Later Dec 9, 2020 17:46


On today’s show we discuss Human Factors--both in the traditional sense and in cyber security specifically--with Margaret Cunningham. Margaret has a PhD in Applied Experimental Psychology. She's a member of Forcepoint's X-Labs as the behavioral scientist subject matter expert. X-Labs develops scalable human-centric, security solutions. In this episode of What That Means, Camille has Margaret Cunningham of Forcepoint on to talk about the intersection of Human Factors and Cybersecurity. They cover a lot of ground, like: The intent of human factors practitioners Where the fields of human factors and cybersecurity intersect The questions guiding human factors practitioners  Why people break the rules How human factors can be used to improve training How you measure a person And more. Have a listen.   Here are some key take-aways: Human factors practitioners focus on the evaluation and design of everything, with the intent to optimize human performance.  Human factors can be broken down into different areas of interest like physical environments, cognitive function, systemic issues, etc.  Factors like culture, language, and geography can impact design. The link between the two fields of cybersecurity and human factors is relatively new. Human factors practitioners are now able to use behavioral analytics to highlight anomalous past behaviors with much more specificity.  We learn how to break the rules from other people, so behavioral analytics tends to uncover clusters of bad actors.   Some interesting quotes from today’s episode: “We have to know the limits of people, whether it’s a cognitive or a physical limit doesn’t matter.”   “People are amazing, but we’re not really good at everything. So what can we understand about what we’re designing to improve human performance in areas where we’re weak, while also capitalizing on what we’re good at?”   “We really are starting to use behavioral analytics in a much more sophisticated way, where we’re building an understanding of people’s past rule-breaking or their past exploration that doesn’t really fit with their peers.”   “A lot of times, we learn how to break rules from other people. We learn what the implicit rules are versus the explicit rules from our managers or supervisors or our peers. And in that case, we can start seeing that there are clusters or groups of bad apples. And that can be very meaningful in terms of understanding organizational exposure.”   “I think that people who truly understand how to build metrics that can capture human behavior are going to be making great strides in this industry.”

Cyber Security Inside
8. What That Means: Artificial Intelligence

Cyber Security Inside

Play Episode Listen Later Nov 23, 2020 19:27


In our first ever episode of What That Means — the Cliff’s Notes companion to the Cybersecurity Inside podcast — Camille is tasking Rita Wouhaybi, Principal Engineer for Industrial Solutions in the IoT group at Intel, with defining Artificial Intelligence in under three minutes. (Spoiler: she nails it.)   Plus, Camille and Rita cover:    - The Turing Test + how we measure intelligence in a computer or machine- Explainable AI/Biases in learning- The questions we should be asking as consumers and/or implementors of AI- Deciding what AI techniques to use and what to use them for- The confidence levels of AI- The one thing to keep in mind about AI- Why AI is not going to solve all our problems- What AI competition is doing for the industry   Check it out!Here are some key take-aways:  If you feed AI bias, it’s going to spit out bias.  AI is not definitive. Every answer that AI gives you is going to have a confidence level. AI is not going to solve all your problems. So pick the problem that makes the most sense. Some interesting quotes from today’s episode:   “It’s based on some cognitive ideas, where you see information, or actually you see more like data, raw data, and you distill information out of it. And as humans, as well as animals, we do that all the time. So it’s the idea of creating a computer program that is capable of doing it.” “I would even argue that to a large extent, when you have a child growing in a biased environment, that child will be biased as a child. And it’s going to take them to go out of that environment and expand their horizon — either through reading or experiencing other individuals — to widen that scope and get rid of that bias and reexamine it. And I think that could happen in AI, too.”    “AI is never 100% sure. The trick is, where is your tolerance? Do you want AI to make sure that if it sees something bad, to tell you about it, with the assumption that some of those might actually be good? Or the opposite? Which one matters more? So, if you are a medical doctor, would you rather have an AI that says, ‘Oh, I think this one has lung cancer’ higher and ask for further testing, or miss a few lung cancer diagnoses? Where do you want that error to wiggle? Do you want it to wiggle on crying wolf? Or do you want it to be very conservative and miss some diagnoses? Those are very important questions.”

Cyber Security Inside
7. Trailer: Our New Companion Podcast "What That Means"

Cyber Security Inside

Play Episode Listen Later Nov 20, 2020 2:19


Ever wished there was a companion series to Cyber Security Inside? Then you have to check out Camille’s new podcast, What That Means, launching next week.  Each episode, Camille will focus on one topic or term related to what we’re covering over here at Cyber Security Inside. She’ll chat with top technical experts in the industry and get the definitions directly from those who are defining them. So you can get a refresher and go a little deeper with the best of the best. What types of topics can you look forward to on What That Means?  AI Blockchain Sustainable computing Human factors Gaming Just to name a few. Be on the lookout for the first episode!

The Long View
Karsten Jeske: Cracking the Code on Retirement Spending Rates

The Long View

Play Episode Listen Later Oct 14, 2020 48:25


Our guest on the podcast today is Karsten Jeske, the founder of the website EarlyRetirementNow and a thoughtful and technically proficient member of the Financial Independence, Retire Early (FIRE) community. In 2018, Karsten retired in his early 40s, after a career in the financial world. He served as Director of Asset Allocation Research for Mellon Capital Management from 2008 through 2018, and before that, was a research economist at the Federal Reserve Bank of Atlanta for a decade. Karsten has his PhD in economics from the University of Minnesota and has taught undergraduate and PhD-level economics at Emory University. He's also a chartered financial analyst.BackgroundKarsten Jeske BioEarly Retirement NowFIRE DefinitionThe Pandemic’s Impact on the FIRE Movement“The Shortest Recession Ever? My Thoughts on the State of the Economy,” by Karsten Jenke, EarlyRetirementNow.com, Aug. 25, 2020.“Tanja Hester: The Pandemic Will Stoke Interest in Early Retirement,” by Christine Benz and Jeffrey Ptak, The Long View, June 3, 2020. “The Coronavirus Pandemic and Retirement Security,” by Mark Miller, Morningstar.com, Aug. 24, 2020.“Retiring During a Pandemic,” by Christine Benz and Maria Bruno, Morningstar.com, Aug. 14, 2020. “Can You Retire Early? Should You?” by Christine Benz and Susan Dziubinski, Aug. 7, 2020. Early Withdrawal Rates for Early RetireesThe Trinity StudyThe Safe Withdrawal Rate Series--A Guide for First-Time Readers“Do We Really Have to Lower our Safe Withdrawal Rate to 0.5% Now?” by Karsten Jeske, EarlyRetirementNow.com, Aug. 31, 2020.Shiller P/E Ratio Definition“Who’s Afraid of a Bear Market?” by Karsten Jeske, EarlyRetirementNow.com, Oct. 30, 2019. Low Bond Yields and Withdrawal Rates“Jamie Hopkins: How Low Bond Yields, Recession Impact Retirement Planning,” by Christine Benz and Jeffrey Ptak, The Long View, July 14, 2020. “Wade Pfau: The 4% Rule is No Longer Safe,” by Christine Benz and Jeffrey Ptak, The Long View, April 29, 2020. “What Ultralow Yields Mean for Your Financial and Retirement Plan,” by Christine Benz, Morningstar.com, May 4, 2020. “Low Rates Aren’t Going Anywhere. Here’s What That Means for Retirement Planning,” by David Blanchett, ThinkAdvisor.com, Aug. 14, 2020.IRA Required Minimum Distribution Worksheet Bogleheads’ Variable Percentage WithdrawalSequence of Return Risk/Asset AllocationSequence Risk Definition “The Extraordinary Upside Potential of Sequence of Return Risk in Retirement,” by Michael Kitces, kitces.com, Feb. 20, 2019. “The Pros and Cons of Rising Equity Glide Paths in Retirement,” by Wade Pfau, forbes.com, May 4, 2017.“The Portfolio Size Effect and Using a Bond Tent to Navigate the Retirement Danger Zone,” by Michael Kitces, Kitces.com, Oct. 5, 2016. “Cut Stocks or Add to Them? A Key Dilemma to Your Retirement Plan,” by Christine Benz, morningstar.com, July 25, 2019.“How to Determine Asset Allocation in a Retirement Portfolio,” interview with Christine Benz and David Blanchett, Morningstar.com, April 29, 2015.“The Yield Illusion: How Can a High-Dividend Portfolio Exacerbate Sequence Risk?” by Karsten Jeske, EarlyRetirementNow.com, Feb. 13, 2019.Healthcare and the FIRE Movement“Top 3 Health Insurance Options If You Retire Early,” by Thom Tracy, Investopedia.com, April 14, 2020.“How Does the F.I.R.E Movement Affect Insurance?” by Brianna Slattery, clearsurance.com, Jan. 23, 2020.“The Ten Commandments of Whole Life Insurance,” by Karsten Jeske, EarlyRetirementNow.com, Sept. 26, 2018.Health Care Sharing Ministry Affordable Care Act Social Security “Taxation of Social Security: The Tax Torpedo & Roth Conversion Tightrope,” by Karsten Jeske, EarlyRetirementNow.com, Nov. 13, 2019.“Social Security Benefits: Early or Late Retirement?” ssa.gov. Networking & Socializing in Retirement“Work, Retirement, and Social Networks at Older Ages,” by Eleonora Patacchini and Gary V. Engelhardt, Center for Retirement Research at Boston College, November 2016.“Why It’s Important to Stay Social in Retirement and How to Do It,” by Rob Pascale, forbes.com, Oct. 31, 2019.

Mind Pump: Raw Fitness Truth
1381: Why Planks Can Train Bad Posture, Correctional Exercises for Knock Knees, the Benefits of Float Therapy & More

Mind Pump: Raw Fitness Truth

Play Episode Listen Later Sep 16, 2020 75:01


Morning workouts are NOT for Adam and Justin. (6:39) Weird news with Sal. (9:11) Mind Pump Recommends (Un)well on Netflix. (12:00) Why you should handle the BIG rocks first when it comes to your health. (13:39) Mind Pump Recommends the Social Dilemma on Netflix. (19:11) Mind Pump approves a Presidential Debate hosted by Joe Rogan. (35:37) Mind Pump Conversations: The future of the gym space. (37:45) How to get enough nutrients in when calories are low. (46:59) #Quah question #1 – I have heard some trainers say that they are anti-plank, due to them training bad posture. What is your opinion on that? (49:57) #Quah question #2 – NASM teaches flexibility training before strength. You guys have said you train your clients for strength first, so now I am confused? (55:56) #Quah question #3 – What correctional exercises would you recommend for clients with knocking knees? (1:02:02) #Quah question #4 – What do you think about float therapy? (1:08:17) Related Links/Products Mentioned MAPS Fitness Products Man's Penis Bitten by 4-Foot Snake While Sitting on Toilet (Un)Well | Netflix Official Site Bee sting venom could provide treatment for arthritis Visit Felix Gray for an exclusive offer for Mind Pump listeners! The Social Dilemma | Netflix Official Site iGen: Why Today's Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy--and Completely Unprepared for Adulthood--and What That Means for the Rest of Us Mind Pump #1140: Nir Eyal The Flip Side Trump says he's interested in debate hosted by Joe Rogan Joe Rogan Experience #1535 - Tim Kennedy The Peloton threat: Gyms have a plan to get Americans working out again The future of fitness is together but alone Fitness Training Center San Jose - Red Dot Fitness Website Jillian Michaels reveals she recently had coronavirus, warns about going to reopened public gyms Visit Legion Athletics for the exclusive offer for Mind Pump listeners! **Code “mindpump” at checkout** Mind Pump TV - YouTube How to do a PROPER Plank – Mind Pump TV MAPS Prime Webinar MAPS Prime Pro Webinar Prime Bundle | MAPS Fitness Products - Mind Pump Media Mind Pump Podcast - YouTube Mind Pump Free Resources People Mentioned Joe Rogan (@joerogan)  Instagram Justin Brink DC (@dr.justinbrink)  Instagram

Chad Cargill's ACT Test Prep
Episode 28: What Top HS College and Career Counselors Say to Mentor Students and Parents

Chad Cargill's ACT Test Prep

Play Episode Listen Later Aug 20, 2020 71:14


Join Tulsa Union HS College and Career counselors Chanda Gibson and Emily Ashley as they share a wealth of knowlege to help you navigate scholarships, careers, and ACTs. This episode is loaded with information for students, parents, and fellow counselors. Resource links from this episode: occf.org tulsacf.org cfok.org scholarships.chadcargill.com College Point Advising https://www.collegepoint.info College Essay Guy - Ethan Sawyer https://www.collegeessayguy.com Books mentioned on the show: College Essay Essentials by Ethan Sawyer https://www.collegeessayguy.com Heretics for Armchair Theologians by Justo Gonzalez iGen: Why Today's Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy--and Completely Unprepared for Adulthood--and What That Means for the Rest of Us by Jean M. Twenge PhD The Broken Way: A Daring Path into the Abundant Life by Ann Voskamp Bonhoeffer: Pastor, Martyr, Prophet, Spy by Eric Metaxas Amazing Grace: William Wilberforce and the Heroic Campaign to End Slavery by Eric Metaxas Martin Luther: The Man Who Rediscovered God and Changed the World by Eric Metaxas Be the Bridge: Pursuing God's Heart for Racial Reconciliation by Latasha Morrison , Jennie Allen , et al. Tulsa Union College and Career Center https://www.unionps.org/231918_2 Special Guests: Chanda Gibson and Dr. Jeanie Webb.

Fundraising Freedom Podcast with Mary Valloni
Episode 167 | The Industries That Are Booming During COVID-19 and What That Means for Your Cause

Fundraising Freedom Podcast with Mary Valloni

Play Episode Listen Later Aug 11, 2020 32:50


In the past few months, we have been talking about how to navigate this new “normal” as we walk through the season of a pandemic. Over the course of these last several months, you’ve had to make a shift. You’ve had to start looking at different ways of running your fundraising efforts. And so today,…Continue reading Episode 167 | The Industries That Are Booming During COVID-19 and What That Means for Your Cause

The Kim Monson Show
Cooperation and Coercion:  How Busybodies Became Busybullies and What That Means for Economics and Politics

The Kim Monson Show

Play Episode Listen Later Jun 24, 2020


Guest Antony Davis, associate professor of economics at Duquesne University and co-author of Cooperation and Coercion:  How Busybodies Became Busybullies and What That Means for Economics and Politics, joins Kim in a discussion regarding cooperation vs. coercion. Tim McCormack, candidate for District Attorney for Adams and Broomfield Counties, states that this office is about protecting and serving the community, and not about politicizing it for a specific agenda. The post Cooperation and Coercion:  How Busybodies Became Busybullies and What That Means for Economics and Politics appeared first on The Kim Monson Show.

Freedom Mindset Radio
Busybodies and Busybullies: Freedom, cooperation, and coercion

Freedom Mindset Radio

Play Episode Listen Later Jun 10, 2020 59:08


In today’s episode, Curt interviews Antony Davies & James Harrigan, author of the new book, "Cooperation and Coercion: How Busybodies Became Busybullies and What That Means for Economics and Politics." Antony Davies is the Milton Friedman Distinguished Fellow at the Foundation for Economic Education (FEE) and associate professor of economics at Duquesne University. The cohost of the weekly podcast Words & Numbers, he writes frequently for the Philadelphia Inquirer and the Pittsburgh Tribune-Review, and he also has written for the Wall Street Journal, the Los Angeles Times, the Washington Post, and many other publications.  James R. Harrigan is the F. A. Hayek Distinguished Fellow at the Foundation for Economic Education (FEE) and director of education at the Freedom Center at the University of Arizona. He cohosts the Words & Numbers podcast and has written for the Wall Street Journal, USA Today, the Philadelphia Inquirer, and a host of other outlets. Previously, Dr. Harrigan served as dean of the American University of Iraq, Sulaimani; director of academic programs at the Institute for Humane Studies; and senior research fellow at Strata.

Freedom Mindset Radio
Freedom is our birthright

Freedom Mindset Radio

Play Episode Listen Later Jun 8, 2020 7:15


Is freedom something that is given to individuals, and thus can be taken away, or is it something with which we were born? “Freedom is your birthright,” said James R. Harrigan, director of the Freedom Center at the University of Arizona. “But you have to actually want it and you have to earn it. You have to deserve it.” Harrigan, along with Antony Davies, associate professor of economics at Duquesne University, co-authored the new book, “Coercion and Cooperation: How Busybodies Became Busybullies and What That Means for Economics and Politics.” Davies and Harrigan sat down for an interview with Freedom Mindset Radio host Curt Mercadante about the new book. Mercadante asked the co-authors if freedom “is our default state when we're born and then it's a matter of how much coercion and restrictions there are on our freedom?” “Look, freedom is your birthright as a human being, whether you're born with it or not is a separate and distinct question,” replied Harrigan. “The vast majority of human beings who have lived on this planet have not been born in a condition of freedom. That doesn't mean it wasn't their birthright, but they weren't born in that condition. Freedom is something that has to be earned absolutely by collections of people over time.”

The Tom Woods Show
Ep. 1615 How the State Makes Busybodies into Busybullies

The Tom Woods Show

Play Episode Listen Later Mar 20, 2020 33:18


Economist Antony Davies and political scientist James Harrigan join me to discuss their new book "Cooperation and Coercion: How Busybodies Became Busybullies and What That Means for Economics and Politics". We talk about how the state thrives on wars on poverty, drugs, terror, etc., the cooperation that is at the center of the market economy, and a lot more.

Mind Pump: Raw Fitness Truth
1158: Factors that Stall Fat Loss & Muscle Growth, How Often to Change Up Workout Program to Keep Progressing, Exercises that Work Multiple Muscles & MORE

Mind Pump: Raw Fitness Truth

Play Episode Listen Later Nov 8, 2019 80:50


In this episode of Quah (Q & A), Sal, Adam & Justin answer Pump Head questions about how to define a set when multiple muscles are working at once, downsides of repeating the same workout plan for an extended period of time, what to do if you are not seeing results from your diet and workout, and times they struggled with confidence during their personal training career.  Kai Greene jumping on that vegan train a little too quickly. (4:51) Sal drinking beet juice for better pumps. (7:02) The effect of pornography on the brain. (10:16) Mind Pump's first take on Kanye West's new album. (14:58) The fascinating phenomenon of reality tv. (17:05) Robb Wolf triggering the vegan community left and right. (20:54) How the worst thing for the environment is to have unhealthy humans: Interesting facts of grass-fed vs grain-fed meat and the value of companies like Butcher Box (21:40) The athleisure wear market is exploding! (26:52) Updates from Adam on Week 2 of MAPS Powerlift. (29:31) Richard Gere is the man! (33:30) How the Joker isn't the only film depicting the powerful message of mental illness. (35:51) Will the 4-day work week become the thing? (37:25) Increased screen time usage now linked to lower brain development: The importance of looking at things with a grain of salt. (42:12) #Quah question #1 – I understand you say 9-18 sets per muscle group/per week, but what do you define as a set when multiple muscles are working at once? For example, would 5 sets of regular bench press count as 5 sets of tricep work as the triceps are still working? (49:54) #Quah question #2 – Can one stay on the MAPS Anabolic program for a couple of years and still see changes in their body and strength? (55:43) #Quah question #3 – I will be 60 in two months, weight training 3-5 times a week and also walk 12 to 15,000 steps per day. I have been on a fitness journey for 20 years and count my macros, but I am struggling to reduce my body fat and increase my muscle mass. I hired a personal trainer a year ago and have increased my weights consistently. I am also following MAPS Anabolic. I am not sure if it's my age, but I'm just not seeing results. I tend to over train, work a high stress 60 hour a week desk job and wonder if stress is playing into it? I watch my sleep and get consistent 7 hours per night. Any suggestions? (1:01:57) #Quah question #4 – Were there ever times during your personal training career where you struggled with confidence? (1:09:55) People Mentioned Kai Greene (@kaigreene)  Instagram Robb Wolf (@dasrobbwolf)  Instagram   Related Links/Products Mentioned November Promotion: MAPS Performance ½ off!! **Code “GREEN50” at checkout** Acute ingestion of beetroot juice increases exhaled nitric oxide in healthy individuals. With beetroot juice before exercise, aging brains look ‘younger' Pornography addiction: A neuroscience perspective The scary effects of pornography: how the 21st century's acute addiction is rewiring our brains Is Grass-Fed Beef Really Better For The Planet? Here's The Science Visit Butcher Box for this month's exclusive Mind Pump offer! More Signs The Athleisure Trend Isn't Slowing Anytime Soon Visit Vuori Clothing for an exclusive offer for Mind Pump listeners! Falling Down (1993) - Rotten Tomatoes Microsoft tried a 4-day work week — and productivity soared MRIs show screen time linked to lower brain development in preschoolers iGen: Why Today's Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy--and Completely Unprepared for Adulthood--and What That Means for the Rest of Us - Book by Jean Twenge Irresistible: The Rise of Addictive Technology and the Business of Keeping Us Hooked - Book by Adam Alter Mind Pump 1140: Nir Eyal Mind Pump 1157: Seven Ways Functional Training Burns Fat & Builds Muscle Super Bundle | MAPS Fitness Products The health benefits of strong relationships Mind Pump Free Resources

Mind Pump: Raw Fitness Truth
1140: Nir Eyal

Mind Pump: Raw Fitness Truth

Play Episode Listen Later Oct 14, 2019 62:39


Interview Nir Eyal  Making the case why technology is NOT irresistible. (3:08) What is the definition of distraction and traction? (7:55) Why do we do anything? Understanding the nature of human emotion. (9:06) Technology is the tool: It's all about how we USE IT. (11:07) The technique of using tech against tech: #1 - Social antibodies. (19:50) Making time for traction: Technique #2. (24:44) Hacking back the external triggers: Technique #3. (26:29) Preventing distraction with packs: Technique #4. (27:19) The 3 concepts of social competence and wellbeing when it comes to our children. (28:37) What are some things he agrees with his fellow researchers and what do they disagree on? (35:27) Understanding what your values are and turning those into time. (38:50) What's the role of dopamine in the brain? (40:05) How technology can be ADDICTIVE, but not affect everyone: The nature of addiction. (41:50) What is his take on the future of technology? (46:10) Why ‘filter bubbles' is nothing new. (53:03) The importance of having a conversation rather than fear-mongering. (56:56) Featured Guest/People Mentioned  Nir Eyal (@neyal99)  Instagram Nir Eyal (@nireyal)  Twitter Website Adam Alter (@adamleealter) Twitter Jean Twenge (@jean_twenge)  Twitter Jonathan Haidt (@JonHaidt)  Twitter Related Links/Products Mentioned October Promotion: MAPS Anabolic ½ off!! **Code “RED50” at checkout** Nir Eyal - Books Nir Eyal Ted Talk - What makes technology so habit-forming? Irresistible: The Rise of Addictive Technology and the Business of Keeping Us Hooked - Book by Adam Alter iGen: Why Today's Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy--and Completely Unprepared for Adulthood--and What That Means for the Rest of Us - Book by Jean Twenge Paul Virilio - VICE Forest App The Kids (Who Use Tech) Seem to Be All Right The Decline of Play and the Rise of Psychopathology in Children and Adolescents Parents in trouble again for letting kids walk alone The Coddling of the American Mind - Book by Greg Lukianoff and Jonathan Haidt Change Your Mind HumanProgress.org The Truth about Kids and Tech: Jean Twenge (iGen) and Nir Eyal (Hooked) - Debate

Mind Pump: Raw Fitness Truth
1053: How to Stop Bingeing, Whole Body Workouts vs Body Part Splits, the Impact of Alcohol on Workouts & MORE!

Mind Pump: Raw Fitness Truth

Play Episode Listen Later Jun 14, 2019 103:42


In this episode of Quah, sponsored by MAPS Fitness Products (www.mapsfitnessproducts.com), Sal, Adam & Justin answer Pump Head questions about influencers and bodybuilders who use body part splits instead of whole body workouts, the best way to stop bingeing, how alcohol affects workouts, and if they would ever do a powerlifting competition. Mind Pump: Preparing you for the end of the world. (5:07) Mind Pump's newest sponsor providing the audience their BEST night's sleep, ChiliPad. (10:17) The myths surrounding the percentage of marriages that end in divorce. (18:45) ‘Mukbang' the new YouTube sensation! (30:28) How Spotify pursues emotional surveillance for global profit. Going down the rabbit hole of the future of marketing/advertising with Mind Pump. (34:05) Beverly Hills becomes the first U.S. city to ban tobacco sales. (44:30) The importance of taking sleep seriously and testing your levels when it comes to your gains. (48:10) At what point will eating fish not be considered healthy? Monterey Bay littered with tiny plastic pieces, a new study finds. (52:57) Mind Pump pop culture hour. (55:14) #Quah question #1 – You have talked about why whole-body workouts tend to be superior to splits, but it seems all the influencers and bodybuilders on social media utilize a body part split and look amazing. Can you speak to this? I am someone wants to transform my body. (1:00:05) #Quah question #2 – What's the best way to stop or help with a pretty bad bingeing problem? My relationship with food has been so bad for so long, I just can't seem to figure out how to fix it. (1:11:58) #Quah question #3 – How does alcohol affect your gym routine? (1:24:01) #Quah question #4 - Would you guys ever do a powerlifting competition? Why or why a not? (1:33:27) People Mentioned Ben Greenfield (@bengreenfieldfitness)  Instagram Sandra Lee, MD, FAAD, FAACS (@drpimplepopper)  Instagram Related Links/Products Mentioned June Promotion: MAPS Strong ½ off!! **Code “STRONG50” at checkout** Visit ChiliPad for an exclusive offer for Mind Pump listeners! **Code “MPOOLER” at checkout** iGen: Why Today's Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy--and Completely Unprepared for Adulthood--and What That Means for the Rest of Us – Book by Jean M. Twenge PhD What Is the Divorce Rate, Really? Mukbang Millionaire: Inside the slurp-tacular success of a shellfish-sucking superstar Spotify turns our emotions into data, and then profits off of them Visit Brain.fm for an exclusive offer for Mind Pump listeners. Laws Governing Subliminal Messages in Advertisements | Chron.com Beverly Hills becomes first U.S. city to ban tobacco sales Visit Everly Well for an exclusive offer for Mind Pump listeners! **Code “mindpump” at checkout** Swings in dad's testosterone affects the family -- for better or worse -- after baby arrives Levels of plastic pollution in Monterey Bay rival those in Great Pacific Garbage Patch Big Little Lies - Official Website for the HBO Series - HBO.com Mind Pump Free Resources