A bi-weekly podcast from The Breach featuring sharp commentary on politics and movements in Canada.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
The Breachside Broadcast contains all the Wyrd audio you could want. Tales of Malifaux explores the primary mysteries and developments within Malifaux City and the adventures of your favorite characters through the breach. Earthside Echoes explores the developments following the emergence of the Burning Man on Earth. Chronicles revisits the history of Malifaux and tells the stories of the people and places off the beaten path.
…
continue reading
Explore life's depths and unlock the secrets of mental well-being on "Breach Your Mind." Join us as we navigate the intricacies of the human experience, offering insights, inspiration, and practical strategies for a fulfilling life. Get ready to breach the barriers of conventional thinking, embrace self-discovery, and nurture your mental health. Let's embark on a transformative journey together. Welcome to Breach Your Mind.
…
continue reading
Welcome to After the Breach, a podcast for whale enthusiasts by whale enthusiasts. Join professional guides and whale watch captains Jeff Friedman and Sara Shimazu as they share their passion and love for whales.
…
continue reading
Welcome to the "Zero Breach Zone," where we delve into the vital mission of fortifying K-12 schools against breaches and phishing threats. Hosts Andy Lombardo and Phil Hintz lead insightful conversations with top experts in cybersecurity, education, and technology, uncovering strategies to protect our schools. From breaking down the latest digital threats to sharing actionable security measures, this podcast empowers educators, administrators, and parents with the tools they need to safeguar ...
…
continue reading
Each episode of Breached highlights a different issue that has been traditionally framed as an essential element of any American social contract. Over ten episodes, the podcast explores areas of American life where some sort of bargain between us – either explicit or implicit – no longer seems to stand.
…
continue reading
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
…
continue reading
Pop culture talk, among other things
…
continue reading
Breaching Extinction is an investigative podcast evaluating the complexities of the declining Southern Resident Killer Whale population in an effort to better understand the trials they currently face, and find solutions through conversation and connection.
…
continue reading
Step into The Breach as we expose and explore abuses of power in our government. Part of the Rewire News Group podcast network.
…
continue reading
Small time guy, with small time opinions on Magic the Gathering
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
Starring Jameela Jamil and Manny Jacinto! After crash-landing on a mysterious planet with no memory and a sentient AI implant in his brain keeping him alive, a soldier searches for answers about his past. There are only four things Lucan knows with certainty: his name, his rank, that the droll AI implant speaking to him inside his mind is named Ven, and finally, that she is the only thing keeping him from dying. With no other memories or connection to their pasts, Lucan and Ven must navigate ...
…
continue reading
A podcast designed to share thoughts and feelings of a major cyber security event from an insiders perspective. I will be talking through the events, thoughts and emotions that I navigated through during the "breach" that I presided over from March - October, 2016.
…
continue reading
Church militant happenings (headlines), phone-a-friends, scripture probably, faith, love, hope, support, advice, inspiration and family shenanigans! Learn more about the battle at http://bit.ly/ITBpodcast 📿 Support this podcast: https://podcasters.spotify.com/pod/show/intothebreach/support
…
continue reading
Top notch gaming podcast hosted by Get Flanked, Prodigio Pete and Rogue-9. If you are a Rainbow Six Siege or first person shooter fan, this podcast is definitely for you!
…
continue reading
A podcast from two third-year law students who don’t have enough on their plate already. Listen as we try to navigate being a twenty-something in law school and provide advice (warnings) to prospective and current students.
…
continue reading
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
…
continue reading
Irascible man-about-town, Tom McCartan, is here to help you mind your manners and artfully dodge society's faux pas. Toilets, fashion, the Internet - no venue is left untouched. Check your deportment gauges as we dive into the vortex of what makes civilization so damned civilized.
…
continue reading
Soulstory is an actual play role playing game podcast (RPG) set in the world of Malifaux. Join us as our Fatemaster guides her four players into a story where steam power and magic meet horror cliché's and fairy tales. If you want to know more about Malifaux, be sure to stick around. Each episode is followed by a cast member sharing some tidbits and lore about the universe. Come for the story but be careful. Bad things happen.
…
continue reading
Welcome to my Podcast. I'm Edwin Perez, a pastor, author, blogger and just a man who is passionate about the Gospel. Here you will find topics, interviews, devotionals, theological discussions, music and more. Check out my website for blogs, articles and teachings at http://www.eddieperez.me
…
continue reading
We're a group of four Malifaux enthusiasts that help new players with advice, personal experience, and entertainment in the steampunk streets.
…
continue reading
Truth centered audio series. Torah based. Every change that takes place on Earth impacts and shapes our very lives. Ohadah’s intention is to bring a conscious awareness to the fact that the world we live in, is in need of the Truth. The 21st century is compelling our generation to reverse the old trend and write a new story. Ohadah hopes to inspire the listener to reach for their highest potential to contribute a change. If one adapts righteous thoughts and habits, the Truth has the Power to ...
…
continue reading
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
…
continue reading
Winston Churchill famously stated that, “Those who fail to learn from history are doomed to repeat it.” His concerns about applying lessons learned to post WWII foreign policy initiatives rings just as true in the current cybersecurity climate. So, in an effort to ensure we repeat as few of 2024’s mistakes in 2025, we’re going to take a look at som…
…
continue reading
1
Meet the Hosts – Why Cybersecurity Matters in K-12 Education, (Re-air)
28:43
28:43
Na później
Na później
Listy
Polub
Polubione
28:43
As we round out the year 2024, we wanted to reintroduce you to our hosts Andy Lombardo & Phil Hintz and remind you why the Zero Breach Zone is a vital resource for K-12 cybersecurity. Welcome to the debut episode of Zero Breach Zone! In this episode, hosts Andy Lombardo and Phil Hintz introduce the podcast, focused on the critical importance of cyb…
…
continue reading
In the wake of Chrystia Freeland’s explosive departure from the Liberal cabinet, Martin Lukacs and El Jones discuss the establishment media’s infatuation with Ottawa’s palace intrigue and what the future for a hobbled Trudeau government might look like. Plus, we answer listener questions just in time for the holidays.…
…
continue reading
1
Episode 35 - Alexandra Morton: From Whales to Salmon and Back Again
1:04:49
1:04:49
Na później
Na później
Listy
Polub
Polubione
1:04:49
Joining us on episode 35 of After the Breach podcast is special guest Alexandra Morton. She has been called "the Jane Goodall of Canada" because of her incredible thirty-year fight to save British Columbia's wild salmon. She joins hosts Sara and Jeff to talk about her journey from whale researcher to wild salmon activist and back to whale researche…
…
continue reading
1
Overcoming the Odds: Jared Reston's Story of Survival and Resilience
31:42
31:42
Na później
Na później
Listy
Polub
Polubione
31:42
Send us a text Can you imagine facing a life-threatening situation and emerging not only alive but more determined than ever? This gripping episode of our Resilience Series on the Breach Your Mind podcast features the astounding story of Jared Reston, a law enforcement officer who survived being shot seven times. Jared's incredible journey of recov…
…
continue reading
In part one of "Madness of Malifaux," Governor General Marlow takes stock of the damage wrought by the Burning Man and Damian Ravencroft receives an illicit package from Colette Du Bois. Read by: Ian Travis Announced by: Julian Smith Music: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth C…
…
continue reading
As we begin to close out 2024 and look ahead to 2025, I couldn’t resist the urge to revisit some of my favorite guests from the last couple of months. While I’m grateful for everyone we’ve had on the show, and all the support we continue to receive from the industrial cybersecurity community, I felt these comments were worth another listen, with sp…
…
continue reading
1
Why this Canadian mayor is criticizing her city’s spiralling police budget
17:56
17:56
Na później
Na później
Listy
Polub
Polubione
17:56
Mississauga Mayor Carolyn Parrish recently generated headlines when she stepped down from her local police services board, calling the city’s escalating police budget “out of control.” Desmond Cole visits her office to discuss her resignation and the alternatives to policing.
…
continue reading
1
Tech Tales & Security Talks: A Rural School Adventure with Jason Yaw Osei
34:08
34:08
Na później
Na później
Listy
Polub
Polubione
34:08
Welcome to Episode 6 of the Zero Breach Zone! In this episode, hosts Phil Hintz and Andy Lombardo welcome Jason Yaw Osei, Tech Director of Technology and Cybersecurity at Campbell ISD in Texas, for a fun and engaging discussion about cybersecurity in education and innovative training approaches. Yaw's infectious energy and passion for all things te…
…
continue reading
1
AI Is Exposing Your Most Vulnerable Attack Surface
35:18
35:18
Na później
Na później
Listy
Polub
Polubione
35:18
According to Fortinet’s 2024 State of Operational Technology and Cybersecurity Report, 43 percent of those surveyed reported a loss of business critical data or intellectual property so far in 2024– a number this is up nearly 10 percent from last year. And we all know what happens with this hijacked data. Per the World Economic Forum’s May 2024 whi…
…
continue reading
Episode Description: In part six of "Malifaux Burns," we reach the conclusion of a tale that will leave Malifaux changed forever. This final installment follows Ulix Turner, Reva Cortinas, Gretchen Janus, and Lucius Mattheson. Read by: Ian TravisAnnounced by: Julian SmithMusic: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" Gara…
…
continue reading
1
A weekend at the Davos of warmongering
27:38
27:38
Na później
Na później
Listy
Polub
Polubione
27:38
It was a big week for the military-industrial complex in Canada, with the west’s war-making establishment convening in Halifax for the annual International Security Forum (then hopping over to Montreal for a NATO summit). El Jones fills Martin Lukacs in on her attempts to report on the Security Forum, where the hand towels were plush, the security …
…
continue reading
1
Episode 34 - The Legacy of Captain Jim Maya
49:57
49:57
Na później
Na później
Listy
Polub
Polubione
49:57
Episode 34 brings to the podcast a long overdue and special guest, the legendary Captain Jim Maya, to tell his stories, talk about his whale watching experience on the Salish Sea dating back to 1996, and the legacy he has created. Captain Jim is an epic story teller, teacher, whale and wildlife enthusiast, and the ultimate connector. He has connect…
…
continue reading
Welcome to Episode 5 of Zero Breach Zone! In this episode, hosts Phil and Andy speak to the core of what this podcast is all about: making cybersecurity accessible and actionable for the entire education technology community. They share key insights from their recent cybersecurity and education technology conference experience at RTM. Phil and Andy…
…
continue reading
1
Little Nazi-sympathizing surveillance state on the prairie
25:03
25:03
Na później
Na później
Listy
Polub
Polubione
25:03
Independent journalist Duncan Kinney of Progress Report was charged with mischief for allegedly spraypainting two monuments dedicated to Nazis and their collaborators—a charge he says the Edmonton Police have used to surveil and silence him. Kinney sits down with Desmond Cole to discuss his case. To donate to Kinney's legal fund: https://www.gofund…
…
continue reading
1
Minimizing Hacks by Focusing on Uptime
38:35
38:35
Na później
Na później
Listy
Polub
Polubione
38:35
Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing …
…
continue reading
In part five of "Malifaux Burns," Misaki consolidates her power as Oyabun of the Ten Thunders, Kaeris fights for her life against Witchling Thralls, and Parker Barrows faces execution at the gallows. Read by: Ian TravisAnnounced by: Julian SmithMusic: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat…
…
continue reading
1
What Cybersecurity Can Learn from Tom Brady
52:41
52:41
Na później
Na później
Listy
Polub
Polubione
52:41
We assembled some "nerds from the basement" to cover a key strategy in combatting evolving threats. Today’s episode is going to take on a little different flavor, as we’re going to show you one particular tool that can impact a number of your security planning, training and discovery strategies. While table top exercises are nothing new, we’re goin…
…
continue reading
1
UN expert on how Canada helps shield Israel from accountability
19:42
19:42
Na później
Na później
Listy
Polub
Polubione
19:42
Francesca Albanese, the United Nations Special Rapporteur on the Occupied Palestinian Territories, sits down with Desmond Cole to discuss Canada’s ‘crystal clear’ complicity in the Israeli destruction of Gaza and the ‘hope that remains in this darkness.’
…
continue reading
1
The Entrepreneur's Learning Curve with Oliver Page
33:34
33:34
Na później
Na później
Listy
Polub
Polubione
33:34
Welcome to Episode 4 of the Zero Breach Zone! In this episode, we sit down with Oliver Page, CEO and founder of CyberNut, for an inspiring conversation about entrepreneurship and cybersecurity in education. Oliver shares his journey as a serial entrepreneur, including his experience founding NutKase, a successful K-12 device case manufacturer that …
…
continue reading
1
Episode 33 - Killer Whale Rescues: T46C2, T73B & T109A3A
1:18:42
1:18:42
Na później
Na później
Listy
Polub
Polubione
1:18:42
After a fall hiatus while our co-hosts, Jeff and Sara, were busy on the water, the dynamic duo is back with Episode 33! Joining them is returning guest, Jared Towers, from Bay Cetology. Jared last visited to chat about the rescue of T51 “Roswell” and T49A2 “Jude” from Barnes Lake in Alaska on Episode 19 and he is back now to talk about more killer …
…
continue reading
For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, we’re going to look at some of the key insights previous guests have offered on the evolving threat landscape – from increased risks emanating from technological integrations and an uptick in automation, to the more traditional adversaries res…
…
continue reading
In "Unappreciated in My Time," a guest at an all-night party takes a suspiciously well-informed interest in recent murders. Read By: Henrietta Meire Announced by: Julian Smith Music: "Terror Theme" by Hakan ErikssonAutor: Wyrd Miniatures, LLC
…
continue reading
1
Incident Response - better safe than sorry
1:01:48
1:01:48
Na później
Na później
Listy
Polub
Polubione
1:01:48
Incident Response - better safe than sorry! After so much good feedback on our first podcast episode, Rense and I tried to get the second episode done as soon as possible. As promised, we sat down and talked about common learnings from incident response cases we are working on. Enjoy the conversation: Which preparations are really useful Why you ca…
…
continue reading
1
Cybersecurity in 2024: Predictions from Security Leaders
1:00:01
1:00:01
Na później
Na później
Listy
Polub
Polubione
1:00:01
Tailored for security leaders, our on-demand webinar covers key topics that include: Top Priorities In Maintaining Compliance: Addressing compliance challenges in the ever-evolving cybersecurity landscape Evolving With AI: How industry leaders are leveraging AI to enhance their security measures. Adapting To New Risk Factors: How to adapt cybersecu…
…
continue reading
1
NCUA PANEL: INFOSEC & CYBERSECURITY IN 2024
1:00:58
1:00:58
Na później
Na później
Listy
Polub
Polubione
1:00:58
Ensure your credit union is compliant & secure in 2024. Hear from a panel of NCUA auditors about infosec & cybersecurity best practices for your credit union.Autor: Rivial Data Security
…
continue reading
1
NIST CSF 2.0 Insight for Financial Institutions
43:26
43:26
Na później
Na później
Listy
Polub
Polubione
43:26
Join our insightful webinar as we dive into the latest updates of NIST CSF 2.0. Gain a comprehensive understanding of its governance frameworks and discover key takeaways crucial for financial institutions. Topics we’ll cover include: Cybersecurity Defense Matrix: Explore strategic cybersecurity defense approaches, encompassing both proactive measu…
…
continue reading
While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true. We know that the frequency of attacks will continue to increase. We know that it’s not if your ICS will be probed, but when. And we also know that asset and connection visibility is an ongoing challenge due to the im…
…
continue reading
1
Trump vs Harris, the view from Canada
27:38
27:38
Na później
Na później
Listy
Polub
Polubione
27:38
As Americans hit the polls next Tuesday, El Jones and Martin Lukacs hash out the U.S. election campaign, the folly of pandering to the right, neoliberal identity politics, the implications for Palestine, the threat of Trump, and their respective halloween costumes.
…
continue reading
1
From AT&T to K12: No Organization is Too Big (or Too Small) to Skip Security
25:51
25:51
Na później
Na później
Listy
Polub
Polubione
25:51
Welcome to Episode 3 of Zero Breach Zone! In this episode, hosts Phil and Andy set the stage for what this podcast is all about: making cybersecurity accessible and actionable for the entire education technology community. Starting with the recent AT&T data breach as a springboard, our hosts demonstrate how cybersecurity vulnerabilities affect ever…
…
continue reading
1
Phishing Attack Defense 'Not Rocket Science'
22:22
22:22
Na później
Na później
Listy
Polub
Polubione
22:22
Maybe you’re sick of hearing about phishing schemes and the way hackers are using this strategy to infiltrate your networks, access intellectual data, shut down production, or hold your assets for ransom. If that’s the case, then you’ve made a lot of hackers very happy. And based on Proofpoint’s 2024 State of Phish report, protecting against phishi…
…
continue reading
1
How movements can organize to defeat Pierre Poilievre
1:11:41
1:11:41
Na później
Na później
Listy
Polub
Polubione
1:11:41
With a potential Pierre Poilievre Conservative government on the horizon, Martin Lukacs, Anjali Appadurai, Syed Hussan, Judy Rebick, and Laura Walton discuss how to organize in the face of a surging right.
…
continue reading
In part four of "Malifaux Burns," the notorious outlaw Parker Barrows faces justice, Maxine Agassiz makes a startling discovery, and Governor General Marlow faces a world on fire. Read by: Ian TravisAnnounced by: Julian SmithMusic: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (In…
…
continue reading
In the first episode of "The Breach Report," we highlight that many cybersecurity breaches arise from simple lack of oversights, referencing a Google/Mandiant report on swift zero-day vulnerabilities and the need for strong incident response.Autor: Robert Wortmann, Rense Buijen
…
continue reading
1
Legacy Mindsets Are Helping Hackers Weaponize Networks
42:09
42:09
Na później
Na później
Listy
Polub
Polubione
42:09
So, my daughters like to give me a hard time about growing old. Said another way, I’m a legacy asset - just like most of the devices many of you observe, manage and secure every day. Your machines are still in place because they work. While the technology around these assets has evolved, their core functionality and value to the production process …
…
continue reading
1
AI, Cybersecurity, and EdTech Innovation: Transformative Insights from ISTE 2024
42:03
42:03
Na później
Na później
Listy
Polub
Polubione
42:03
Welcome to Episode 2 of Zero Breach Zone! In this episode, hosts Andy Lombardo and Phil Hintz recap the latest from the ISTE conference, where education and technology converge to shape the future of learning. We explore the major announcements, including the launch of EdTechIndex.org, a new resource for educators to find vetted educational apps th…
…
continue reading
1
The high price of protesting for Palestine
43:30
43:30
Na później
Na później
Listy
Polub
Polubione
43:30
El Jones and Martin Lukacs discuss the worst and weirdest examples of the crackdown on the Palestine solidarity movement in Canada over the past year—and how to understand why it has been so severe and widespread. Plus: why the elite are worried about Canadians identifying as “settlers.”
…
continue reading
1
The MOST Important Relationship | Are you abandoning it?
1:02:42
1:02:42
Na później
Na później
Listy
Polub
Polubione
1:02:42
Everyone talks about the challenges in their relationships with others, but who’s going to make this relationship—the one with God—relevant? How often do we truly reflect on our intimate relationship with God? What does it look like, how do we nurture it, and is it grounded in reality or just superficial? In this discussion, Ohadah shares her perso…
…
continue reading
In "Black Betty," one of Colette's showgirls receives an unwelcome visitor at the Star Theater. Read By: Henrietta Meire Announced by: Julian Smith Music: "Terror Theme" by Hakan ErikssonAutor: Wyrd Miniatures, LLC
…
continue reading
1
Using Force Multipliers to Protect Against Next-Gen Stuxnet
39:43
39:43
Na później
Na później
Listy
Polub
Polubione
39:43
While the justifications for additional cybersecurity spending is easy to explain, getting buy-in at the C-level can be difficult. However, some recent research might help you win over those controlling the purse strings. SonicWall’s Mid-Year Cyber Threat Report found that their firewalls were under attack 125 percent of the time during a 40-hour w…
…
continue reading
One of the most common topics we explore here on Security Breach is the ongoing challenge of asset visibility in the OT landscape. It's frustrating because it would seem that the solution starts with basic inventory management approaches, i.e. the first step in developing frameworks and plans for everything from tool selection to attack response. O…
…
continue reading
1
3 DISTRACTIONS that are making you a BAD person.
31:53
31:53
Na później
Na później
Listy
Polub
Polubione
31:53
Though it may seem difficult to stay righteous in a society filled with immorality, I am honored to encourage both youth and peers to pursue what is right. I've also come to realize that there are deliberate distractions in our world that hinder individuals from reaching their true righteous potential. In this discussion, we will explore 3 key dist…
…
continue reading
1
Meet the Hosts – Why Cybersecurity Matters in K-12 Education
28:43
28:43
Na później
Na później
Listy
Polub
Polubione
28:43
Welcome to the debut episode of Zero Breach Zone! In this episode, hosts Andy Lombardo and Phil Hintz introduce the podcast, focused on the critical importance of cybersecurity in K-12 education. Drawing from their backgrounds in education and technology, they share their personal experiences with cyber attacks and discuss why striving for a “zero …
…
continue reading
1
Finding Your 'Creative Maliciousness'
38:38
38:38
Na później
Na później
Listy
Polub
Polubione
38:38
According to Veeam’s 2024 Ransomware Trends Report, cyber victims stated that they were unable to restore 43 percent of whatever data was affected by ransomware attacks. This reaffirms what a number of Security Breach guests have stated about trusting hackers after paying their extortion demands. Another finding shows that 63 percent of ransomware …
…
continue reading
In part three of "Malifaux Burns," follow an intrepid reporter as she tries to gain access to a crime scene and an arcanist lieutenant as she infiltrates a secret lab. Read by: Ian TravisAnnounced by: Julian SmithMusic: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (Interstitial)…
…
continue reading
Welcome to the Zero Breach Zone—the podcast dedicated to fortifying K-12 schools against digital threats like breaches, phishing attacks, and everything in between. Join hosts Andy Lombardo and Phil Hintz for conversations and interviews with top experts in cybersecurity, education, and technology, as they share crucial insights and strategies to k…
…
continue reading
1
What “I’m right here, bro” says about Canadian politics
22:35
22:35
Na później
Na później
Listy
Polub
Polubione
22:35
El Jones and Martin Lukacs dissect a viral confrontation NDP leader Jagmeet Singh had with far-right wing protesters on Parliament Hill—and unlike everyone else, they’re not cheering. Plus: the crisis management firm that defends the “rich and guilty.”
…
continue reading
1
Getting Past the Whack-A-Mole Approach
35:31
35:31
Na później
Na później
Listy
Polub
Polubione
35:31
The ongoing theme in industrial cybersecurity centers on two competing dynamics – the desire to expand our implementation of automation and Industry 4.0 technologies with the goal of using more and faster connections, along with the decision-making data each generates to improve the efficiency and quality of production. However, these goals now nee…
…
continue reading
1
Breaking the Silence on Domestic Violence: A Public Safety Perspective
38:44
38:44
Na później
Na później
Listy
Polub
Polubione
38:44
Send us a text In this powerful episode, we dive into one of the most critical issues affecting our society today—domestic violence. With 18 years of experience in public safety, Bryan Shearouse shares his deeply personal encounters and insights into the impact domestic violence has on victims, families, and, particularly, children. Bryan discusses…
…
continue reading
In "The True Meaning of Chugmugs," a pair of cantankerous gremlins attempts to ruin the bayou holiday of Chugmugs. Read By: Henrietta MeireAnnounced by: Julian SmithMusic: "Terror Theme" by Hakan ErikssonAutor: Wyrd Miniatures, LLC
…
continue reading