35 Burst results for "Ip Address"

Podcast Prefix Analytics Explained

Sounds Profitable

02:03 min | 2 months ago

Podcast Prefix Analytics Explained

"I wrote an article all about podcast prefix analytic and their value. It's in the description for you to check out. But i never really got into who was four and how useful this data can be for johnny pot gasser. So he spoke to karo. Chuck lasts chargeable to get into the nitty gritty of how these analytics are not just for the big podcasters but for anyone with the desire to learn and take the lead. Thank you so much for the opportunity that with you about this. Thank you so much for the in. By congratulations on your success. It's amazing to see what you've done in such a little time. And and i can't wait to see what happens in the coming months with ya. That news on. I know the context of this is kind of like an extension of that article. You wrote about analytic prefixes. The article does a really good job of explaining what it is right. And i think. I've explained it more times than almost the entire city of pasadena's fingers and toes right so i think if you don't mind just kind of reiterating that might kinda get picture right. The analytic prefixed. The way i always explain. It's a piece of code goes on the rss feed reason why that's important. Rss feed is distributed essentially everywhere right more or less prefixes acting as a redirect so what's happening is regardless of device or player when a user clicks player download right however with that analytic prefix ping's that prefix that piece of code and redirects download information. Somewhere and my case chargeable right but still passes through the request of the end user receives the mp three fall asleep right the key things to know what is download at the end of the day right. So ip address user agent user agent means you know ios fourteen apple. Podcasts iphone. Twelve the main reason why i wanted to kind of hit on that definition is because you know we're touching on the key thing there which is it's a it's allowing us to see what's going on with regards to the download and then be of course what what makes up the download the ip address which is so important

Johnny Pot Gasser Karo Chuck Pasadena Apple
Audacity to Share App Analytics Data

podnews

00:28 sec | 2 months ago

Audacity to Share App Analytics Data

"Old casati an open source of audio at his to share limited analytic states with that company in kaliningrad in russia. It's announced the data shed which you don't appear to be able to opt out of include your ip address but doesn't include your name address or email. The app was acquired by newsgroup a company based in cyprus in may they've also requested open source developers sign a license agreements to contribute new code

Casati Kaliningrad Russia Newsgroup Cyprus
The End of IP Address Targeting

The Big Story

01:44 min | 3 months ago

The End of IP Address Targeting

"Joining me. Today is our resident apple identity and privacy expert alison schiff who tuned into the event. Hi i'm blushing and joining. Us is senior editor james hersher. Who was doing a follow up story about apple's changes obfuscating email information as part of its privacy. Updates is there to fund one. Alson you tune dan. So how did apple reveal that. It was pulling ip addresses. Okay so i'll set the scene. Craig federici it's apples. Svp of software engineering. He's in a a well lit section of apple park in cupertino. The sun is shining brightly and pouring in through floor to ceiling curved windows. He's got this big smile on his face because he's talking about ipad. Os and all the cool things you can do. And then all of a sudden his whole demeanor changes he says next. Let's get into privacy. And then he steps on what looks like a button embedded in the floor that opens up into like a man hole in the floor that he jumps into. And then all of a sudden he's in the dark windowless chamber with a black screen behind him and the only word written on it is privacy and then it is very serious tone. He goes into the whole like at apple. We believe privacy is a fundamental human right. You that whole spiel. And then to privacy engineers step out from the darkness from behind the screen and get into some of the details about apple's specific privacy announcements. It was a little telegraphed. He jumped into dark bunker to talk about the evils of ad. Tech data brokers

Apple Alison Schiff James Hersher Alson Craig Federici Cupertino DAN United States
Understanding Lift Reports

Sounds Profitable

02:23 min | 3 months ago

Understanding Lift Reports

"So me amount of had a long history together. We were a part of the founding team of barometric that was acquired by claratyne and still kicking around in the attribution space big fans of theirs as well and matt helped me a lot with my two part series on understanding lift reports because lift reports is an extension of campaign. Attribution are really important right there. The pretty visual at the end of it that can be used to optimize the campaign or honestly for a lot of you out there that hopefully will find value. And it's the type of thing that you send to the brand or you sent your boss to say like hey thumbs up. We did good so you know matt. Let's let's go over a few quick definitions here to make sure everybody's up to speed. So how'd you define attribution in podcasts. Advertising attribution very simply put the act of identifying if podcasts media exposures is driving a conversion or whatever the kpi or key performance indicator is for that particular advertiser cool. So this podcast. We have ads on here and if you know we mentioned like hey checkout pods sites dot com if there's a pixel in here what it's doing it's grabbing your ip address and it's trying to identify as much as they can about that had matched up for the exposure and then there's a pixel in the pod sites website. So when you visit. They're trying to learn as much about your visit there as well. Match at your device crap and try and link to to say the person visit. The website definitely was the person or even the household. More likely that. Listen to the yet right. Exa- exactly right why and what you're describing now is pixel based attribution right. Originally we talk about just general podcasts attribution. I would argue that. Those terms include the. How did you hear about us. Survey the vanity hurrell coupon code and things like that which you know to be very transparent on how we feel about that a pod sites then i would argue everybody else in the the pixel based attribution space feels is that the vast majority of advertisers. It's just not good enough. I know here. A lot of. I would say chatter around this idea of. Hey like seventy five eighty five percent of people that convert actually fill out that. How did you hear about a survey and then the next question is like what do you believe what they said. And that's always my biggest question is if i'm scrolling through the thousand indoor so shows that exists on some of these how did you hear about a surveys is my finger gonna get tired of is gonna stop and click on whatever. Am i going to find a show that i really like that. I want to give the credit and just select and then move on or did i actually hear the add on that show

Matt
What Is OXT Coin?

InPennyStock | Penny Stock Trader

02:08 min | 4 months ago

What Is OXT Coin?

"Hey guys mubarak here. In penny stock and crypto theory. Hope you're doing well in this episode. I wanna talk to you guys about orkid or o x t and y. It's popping off what it does. Add kind of the reasoning behind. Why this should potentially be on your watchlist. Alright you're listening. You've probably seen that. It's popping off right now. In general you know what we do here. At crypto theory is trying to make a focus on understanding and getting a grasp as to which projects and which crypto currencies are actually successful. Or i because there's a lot of different kinds. There's a lot of one's coming up almost on a daily basis and it's important to know where and how you should utilize them whether it's something you want to just us for the fun because of the blockchain or more specifically i bet if you're listening to this it's more so because you're interested in trading them. They're seeing the amount of prophets that can be made. And you wanna kinda take advantage of that. So this is on the orchid website. Right will we want to talk about here is what even is orchid. Alright so essentially what it is you can see is that it's a vpn. Now that's a virtual private network. Essentially at its crypto power till the purpose of it is essentially you know virtual private networks have been used by people around the world for while in order to kind of mask their ip address so they can Engage in behavior that they don't want tracked are because nowadays with everything with cookies with the ability for people to kind of just pick up information and everything is tracked by google facebook social media every think or get allows you to kind of go through on a decentralised. Vpn because at the end of the day even the virtual private networks. You're still working with that company specifically wherever it has providing you that virtual private network so there are still some traceability and so oh t orchid basically use is What's referred to as your twenty staking token so that's off of the ethereal chain But it's still more contract concept

Mubarak Facebook Google
P

WSJ Tech News Briefing

01:27 min | 5 months ago

P

"We've been reporting that apple is planning a software update in the coming weeks that will require app developers to get permission from users before tracking them and how some ad tech firms have pushed back against the update thing it'll kneecap their ability to tailor content to users. Now we report that proctor and gamble worked with chinese firms to develop a way around. Apple's new privacy rules. Here's our patients haggen with more p. and g. is part of a trade association in china. That's working on a way to do what's called device. Fingerprinting it's a method where they rely on the signals that are inevitably passed between your phone and the apps including the ip address. They track as many of those signals as they can. And they use that to create an id to identify the user on an ongoing basis. They're doing it to try to figure out a way to keep being able to track consumers and reach consumers with ads even if those consumers opt out of sharing their their. Id declined to provide additional details about the program including whether they'll use the technology the company said in a statement that its involvement with consistent with its goal of delivering quote useful content. That consumers want in a way that prioritizes data privacy transparency and consent. a spokesman for apple said absent disregard. Its privacy rules would be rejected from the app store.

Apple Proctor Gamble China App Store
North Korean hackers target security researchers

Cyber Security Headlines

02:28 min | 6 months ago

North Korean hackers target security researchers

"North korean hackers targeting security researchers. Google threatened houses group. One that north korean government sponsored hackers are again targeting security researchers on social media something previously seen back in january. The attackers use fake twitter and lincoln. Social media accounts and of set up a fake website for the company securely climbing to offer offensive security services site hasn't yet been set up to deliver malicious content but has been edited. Google safe browsing as a precaution with known fake profiles reported by google and now removed the similar effort. Back in january attempted to install back doors into security researchers machines using zero day vulnerabilities and says it's likely the group has news zero days to exploit if they're trying the approach again report details data sent from mobile operating systems professor. Douglas j. life from trinity college at the university of dublin published a report looking at the telemetry data sent by an android devices on the os level. Finding that both os has sent data even opting out and not logged in. I m hardware serial numbers cookies and ip addresses. Were among the information sent with iowa sending some location data although up more data overall roughly one megabyte every twelve hours compared to fifty two kilobytes on both platforms transmitted data. Roughly every four point five minutes in response to the findings apple said the report misunderstands. How personal location data is protected. Google disputed the papers methodology and said it will release public documentation on the telemetry data. Collected does have the resources to succeed. Congress created the cyber security and infrastructure security agency inside the department of homeland security roughly two years ago in the wake of russian interference in the twenty sixteen election dedicated to focusing defensive cybersecurity. However recent interviews with current and former staff by politico found the roughly two thousand person agency maybe to stretch recovering from recent high profile breaches to prepare for future ones. The agency already had its hands. Full helping state and local election officials protect their systems ahead of the twenty twenty election before the solomons supply chain attack and recent microsoft exchange server. Exploits came to light. Current staffers report being somewhat exhausted with not enough personnel to fill out threat hunting. An incident response teams staffers. Acc is able to largely meet the security needs of other federal agencies but is struggling to provide support to private sector infrastructure companies. Still staff reports morale remains generally high with confidence a can fulfill its mission an energized by recent political appointees to dhs

North Korean Government Google Douglas J University Of Dublin Cyber Security And Infrastruct Trinity College Lincoln Twitter Iowa Department Of Homeland Securit Politico Apple Congress Microsoft ACC DHS
Netflix Is Cracking Down On Password Sharing

Techmeme Ride Home

02:18 min | 6 months ago

Netflix Is Cracking Down On Password Sharing

"The free ride is over and seemingly. Half of america is going to have to awkwardly cutoff. That boyfriend or girlfriend. They haven't spoken to in five years because netflix's apparently running a test that cracks down on password sharing prompting users to get their own account. If they don't live with the owner of an account cutting the struggle in the prompt customers are told that if you don't live with the owner of this account you need your own account to keep watching in order to continue. They need to verify the account with an email or text code or create a new account within a thirty day free trial. We've heard the test right. Now is only on tv devices. A net flicks. Most person told the stream abo- quote. This test is designed to help ensure that people using netflix accounts are authorized to do so. It isn't clear if users in the tests all need to be on the same. Ip address to be considered in the same household according to net flix terms and account can only be shared with members of your household. Quote the netflix service and any content viewed through our service are for your personal noncommercial use only and may not be shared with individuals beyond your household and quote until now. Netflix says not done anything to police. This except set limits on simultaneous streaming. Their basic plan allows streaming on a single device while the standard plan offers streaming on up to two devices and the premium plan on up to four devices. However they don't limit you on the number of devices a single account can be logged into. There has been talk. That companies will become more aggressive on password sharing as the industry becomes more mature and quote. Yeah we've known for years. That netflix has been aware for years. Just how much password sharing was actually going on. Don't think you were being that clever. So the interesting thing now is why. Now why is this the time that netflix's decides to do something about all this. Although some research suggests that the number of people digitally squatting as it were on other people's netflix account could be as high as a third of the net flicks user base. So you know that's not an insignificant number potentially tens of millions of users. Netflix could suddenly monetize for the very first

Netflix America
Brave to Launch Privacy-Focused Search Engine

Daily Tech Headlines

00:20 sec | 7 months ago

Brave to Launch Privacy-Focused Search Engine

"The privacy. Focus browser brave and the acquisition of the open source tail. Cat search engine. Developed the clicks team with plans a brave search engine by this summer. This'll be presented with other search providers when you select default search option with brave saying. It's engine won't collect ip addresses or use personally identifiable information to improve search results.

Unpacking The Challenges of Geotargeting

Sounds Profitable

08:27 min | 8 months ago

Unpacking The Challenges of Geotargeting

"Where is your target going. What's the next stage of this tool talk about it. I brought in a super knowledgeable guy on the topic jason hansen. Here's what he had to say. So jason thank you so much for joining me today on the first recorded episode that we've done so far when i introduce you a little bit so i met jason when i was working at barometric Jason works at rapa by that is a gig economy ad platform and they're very performance driven. So why don't you tell us a little bit about yourself and about ratify. Hey i thanks for having me as as we were joking about earlier I'm setting the bar low so your guests are only gonna get better from there to listen to this journey that you're on but it really fascinating what you're doing in the focusing on podcasting. It's just such in the early stages. And i'm a fan so i'm i'm looking forward to it as as a a listener to your show. So thanks for having me ratify to trapper fiber. You mentioned it where gig economy ad platform. So we're what we do. Is we match. Where advertisers want to reach. Based on the demographics are targeting in a specific market we press a button in that source that campaign zone sources drivers so whether uber drivers lift drivers jordache postmates. What have you it. Sources drivers that drive in that area in. We put ads on their cars. And then there's a whole way that we we measure attribution which. I'm sure we'll get into a little bit but not to pitch rapper fi but just talking about how we use location data to deliver that to our advertisers But our goal is taking. This is a very old school medium out of home. We've been doing it ever since we're drawing putting paintings on walls We're caveman and we're gonna take this this this old school medium. That's out in the real world and bring it into the digital space. Can we measure attribution. Can we make it more digital. Yeah and that's exactly why. I wanted to have you on the show. I appreciate you not doing the full pitch and all that but the the truth is that have a really great background. First off. you started in radio and second rapa fees auto home. which is you know. The subject of this episode is related to the geo location article that i wrote and in podcasting we get showed little information to do any sort of lookout and for geo the only thing we get his ip address and so with ratify. I kind of wanted to hear like what data you guys get. How you do g look and then kind of turn on and see what you could do with a little bit less like what is what does that world look like. Yeah i think there's some great correlations there really are model. We've we've we've started this We started this methodology for attribution on. It's been about two years now. And it's really scratching the surface as far as what data were getting and howard turning it into as close as we can get factual results that our clients see so what we're doing is we're taking the latte. Longitude of our drivers in were matching that with mobile add. Id's of folks. Who are within fifty feet of those vehicles so we partner with data providers that have collected device. Id's through optin. So it's folks who have given up the right to to share their location now. It's we don't collect any personal information but were able we take that that ad. Id and our goal is not. We know we're not going to capture everyone because we're just we're not at that point as a society yet where everyone is traceable. We wanna build up a large enough sample size to say okay in this campaign zone in atlanta for example here is a a large enough sample size of folks who were around these wrapped vehicles and then we want to measure did they take intended action. But what's interesting is we take those device. Id's and this is where we worked together before we would match those device id's with an ip address at their at their house in linking to other devices at their home. Because we know out of home in. It's actually the same with radio. And i would say even the same with podcast to an extent people. Your potential clients aren't taking that action right than in there because they just wanted to listen to what they just wanted to. Listen to joe rogan. They didn't necessarily wanted to go by t or some. You know some software at that moment. But that's why the importance of linking to device ideas at the home. We want to measure. Did they eventually take that intended. Action through the repetition of of seeing the ad on on the road or podcast in which is really interesting You hear the same add enough from you. Think of the godfathers of advertisers mail ship. How many podcast they did they sponsor and you hear it enough what we wanna do is we wanna see. Taking those ip addresses. Did that household eventually. Take the intended action now. There are limits there as reading. Your article really fascinating. I'd love to hear you dive into a little bit. Because i think there are similarities. The limits that ip address supplies to us in the out of home space. What is supplies to podcast advertisers. In your space yes so. Ip is really interesting. Because i did a test in that article and i connected through my home wifi which had me within one kilometer physical address and it and it said it could get up to ten kilometers away but cellular depending on if it was i. Ip b. six or p four had me anywhere from an hour and a half to three hours away. And i think that a lot of people look at chiyo with a mindset different than what you just said which was really cool. Because we're both kind of in mediums that don't have a click right and so when somebody sees an auto home advertisement or listening to a podcast. Add there's nothing to click. They're not gonna go to it immediately. And the focus of that part is that it's more about where the user is at the time that they see it and the proximity or here and the proximity to the action. Right if it's online geo doesn't normally matter. Anybody can hear an ad anybody can see an ad and then go online and find it right. If you're wrapping carso amazon. Or you're telling you're doing a podcast for it but when we were talking a little bit earlier before the show you made a comment about local and i think local such a big thing. That podcast needs to take advantage of that. It's less about. Were they within that ten kilometer radius. That i'm trying to target or more. Are they in a realistic driving. Radius from the car dealership that we're advertising. And i think that people in podcasting trying to emulate digital so much and. I'm sure you have that battle to on your end that it's not necessarily about the ad being physically close to that location. You're trying to drive people to but within the maximum radius that you guys believe will acquire that that lead. Yeah and i'm going to take you to the dinner table. Just as here's how i look at the media mix when you're eating dinner and you have a stake you have sides you have a drink. Maybe you have a salad and the soup. You have several different applications for each of those items. I'm not going to have Oh yeah i just need honey. Just let's just use a bowl put everything in a bowl unless i'm making a dinner smoothie and using a bowl for every single food element you have a bowl for the soup. You have a salad plate. You have a stake on a plate and then you have a fork knife that you use for that stake in a separate like i. I can go too far. I love lucy analogies. Come to me quickly. But we as marketers and advertisers. We love to try to take every medium in morph in that. It has to be the same thing as a google ad. Words like the what we what we get or what we how we apply google ad words. Okay now we have to have the same methodologies and the same results as we would want in podcasting or out of home every medium served. Its own purpose. And it's up to the advertiser to figure out. How does this affect the buyer's journey in. How can i get the most out of it for this segment of the buyer's

Jason Hansen Jason Joe Rogan Howard Atlanta Amazon Lucy Google
Safe-Inet: VPN service for cybercriminals taken down in law enforcement bust

Daily Tech News Show

01:07 min | 9 months ago

Safe-Inet: VPN service for cybercriminals taken down in law enforcement bust

"Law enforcement agencies from the us. Germany france switzerland and the netherlands have seized the web domains and server infrastructure across five countries of vpn services in sorgi dot org safe dash line dot com and safe dash line dot net. The three are believed to be operated by the same individual or group and widely advertised on both russian and english speaking forums. The us department of justice in europol claim. The three companies servers masks the identities of ransomware gangs web skimmers fishers and hackers involved in account takeovers. Europol said it plans to analyze the collected information and begin to take action against some of the services users not something that's going to really impact your daily life. These aren't vpn's that you're likely to have been subscribed to or using They are very specifically used by people. Who want to engage in illicit activity and keep it hidden they are. They are so called because proof. Vpn's that that means the operators will change customers ip addresses or or move the servers So that when they're asked to cooperate with law enforcement they don't cooperate

Us Department Of Justice Europol The Netherlands Switzerland Germany France United States
Andrew Song: Whisper.ai and a Novel Approach to Hearing Aids

Future Ear Radio

05:57 min | 10 months ago

Andrew Song: Whisper.ai and a Novel Approach to Hearing Aids

"I wanna kind of get into you know so k- obviously you have this personal background story And i know you've worked in silicon valley. It sounds like you were working at facebook Can you just speak to you know whether it be facebook specifically or or any of the other ventures that you were doing. I'm just very very curious. To like what in your background ending your other fellow co-founders backed backgrounds Along with the personal side of things led you to the point where you decided. I wanna take totally novel approach to how a hearing aid might look and feel in your twenty twenty for sure. It's a really interesting story I would say that for myself. And my co founders. We all have our own unique story. About what our inspiration was to hearing a book for all three of us it it it involves different family members And that was kind of independently. You know it wasn't dinner table. Conversation are Let's go grab a beer. Conversation depend on. We all felt that. And i think the thing that you learn at any you see and really experience at any company in technology companies especially here in the san francisco bay area and silicon valley is what the opportunity for change really is and that You have everyone really has an opportunity to bring something new to the table If there's if there's value at the end of the day for for the for a customer and customer in this case could be either here in a professional or an end user and so we all sort of at a high level understood this problem especially Especially dwight curl who i met at facebook. And there's a lot of interest back. When this was all being thought of especially from dwight i would say a brown how artificial intelligence would really change everyday stinks and artificial intelligence itself. Sort of a kind of like magical incantations. I like to. I like to say that it's actually batches very much how we We as a society spoke about the internet in the nineties when we talked about the internet in the nineties you talked about modems and ip addresses and servers and that's sort of the language use the ai version of that language but when we talk about the internet today we talked about what we wanna to do. We talk about being able to meet remotely. We use a lot. We talked about listening to music or sending money or messaging our friends. That's we don't talk about ip addresses. Every day i was going to go through that that similar transformation dwight's background. He worked at facebook on a lot of on the lot of marketing and advertising products. But he got to facebook because i'm facebook acquired his last company which was using ai to accomplish a lot of these similar types of goals I took maybe a more traditional route out of school Studying software studying computer science studying mathematics and being really interested in working on a lot of products that had a lot of positive impact on people. You know working with facebook frigging on facebook messenger for a number of years and leading the core consumer product team and we met shlomo has a very similar background. His experience personally with hearing loss was through his family so he understood that he had started a number of companies before the very successful worked on a number of different hardware applications. Originally you know his his experience goes all the way back to To to israel where he was originally from working on a lot of the technology that ended up in the xbox is where you can move dance in front of them. Play those games that that's one of the first types of technologies you've worked on. Yeah the xbox connect and so we all had this idea and this understanding of how we could put something together to make a difference in this industry. But i think it's naive to think it starts there. It's naive to think. Well i have this technology. I have this idea. I'm going to change the a lot of the early days of the company and this may speak to why we work so closely with hearing care professionals hours passionate about that is really just understanding the the problems And the the challenges that people have with hearing. It's not just my grandfather but you know as an industry And and there's there's a a number of them Some are related to product performance. Some are related to image ones image when using hearing loss on the professional side Direct to consumer was a really big challenge. But you really start to understand that this idea that we have that we could make a hearing aid. That's going to get better over time that we could use artificial intelligence to Improve the sound processing on the hearing directly Not not not artificial intelligence so that you're my grandfather could use siri that. My grandfather doesn't really syria that much so it's wasn't wasn't super important. We didn't hear a lot of people who said i really wanted to syria like go us to do that. What they really said it. I want it to sound better care a lot about noise performance. People buy these things and they spend money on them because they really want to want to not just hear things but connect with the world. They want to have a conversation with people. They want to have in debt that independence and so that's the path that we that we set off on When we really felt like hey this is a this is a real thing. And we've been really fortunate. I would say to have great investor support to build this company. Because as i'm sure all of your listeners know building hearing it from the ground up is not necessarily the easiest thing. It takes a really talented team with a bunch of different diverse skills but it also takes great investor support and that's why we've been really happy at the partnerships we've had there not just to have the money in the funding to do this but also have the support and the vision that we can really make a difference in myspace.

Facebook Silicon Valley Dwight Curl Dwight San Francisco Bay Shlomo Syria Israel Myspace
Bootstrapping a Commodity SaaS

Startups For the Rest of Us

05:40 min | 10 months ago

Bootstrapping a Commodity SaaS

"You are. The co founders of gio khodyo which you're h one reads hassle-free geo coding straightforward and easy to use geo coding reverse geo coding and data matching for. Us and canadian addresses for folks. Who don't know you can enter an address or you can enter like a latitude. Longitude and it'll give you back the opposite one and i'm guessing that's probably how the service started way back in the day but at this point you have integrations to where you will correct misspellings and us. Canadian census data congressional districts state legislative district school districts timezones all. That kind of stuff. Is that something. That i'm imagining. That didn't come on day. One and you've built that out all out over the years. Yeah that's been added slowly. How we often describe it. Is that a computer doesn't understand and address. It only understands the coordinates or do you codes. And so what we do at a very basic level is converting an address into coordinate. So a computer can understand it and coordinates into an address so a human can understand it and then where our niche in the market is. There's a lot of data that is only unlocked by having the coordinates so as you mentioned time zones for example you can only get that data if you have the coordinates so you may be using coordinates to make a map online for example but you may not even care about maps and you may just want to know the time zone for particular location and that makes a lot of sense and you know a service like gio. Khodyo is is something. That my co-founder derek. And i when we were running drip we wanted to give people the ability to say like had an author who was going to go on a book tour and he was going to go to san francisco and la these various cities and he asked us. They're away i can go into drip and query you'll which email subscribers within sixty miles you know hundred mile radius of san francisco and of course we would have needed either their address or their. I mean you can turn an ip address into a quote unquote location. Not exact but it would probably good enough for this purpose and so we did actually look into two services like this. We never want a building that feature out. But that gives folks. If you're listening to this one particular use case of why you may want to use a geo. Coding service and so you guys launched it six and a half years ago in january of two thousand fourteen as a side project. Essentially on hacker. News is what i see. My sister producer. Found the original hacker news thread which was generally positive. Sometimes those things go really sideways. There was a comment or two. About how because you were saying. Hey geo cody is aimed at developers and it's less expensive way to do this and someone came in kind of little bit. No it all comment of like. Oh if you use. I don't remember what service was. It'll be this inexpensive blah blah blah and pretty quickly both chimed in with with factual data and references. Like no. actually. We are less expensive and we don't have restrictions on your data and you don't have to use their maps as you want and that it was a pretty elegant interaction. I'm curious did you guys come away from that launch feeling. Pretty good about the reception. Well there's definitely a love constructive feedback threat but also as you said a love positive comments and i think the biggest takeaway we had was wo- we aren't really the only people with this problem to be want to get solved. We didn't realize how big potential market would be. I think is really showed us that there are some potential year. Yeah i remember. We got hundreds of emails from people after that threat. It was what i remember that day. Just being absolutely wild. Like i think everybody does. When you put something on hacker news you send it to your friends and you're like hey up voters and then if he gets five votes and you get ten people visiting your product you feel pretty good about it and so seeing that kind of sit on the front page all day we it was just unbelievable and and then we got so much feedback from people about everything from things they wish we did two complaints about our competitors and how they were so glad to see something like this we even had. The emanate team from a major product. Reach out to us because they were unhappy with their coating. And of course you when we launched our product really. Wasn't that great context. It was really really terrible. Product will be launched it and it was barely something we could actually use ourselves like. We only use it as because we just couldn't have fallen feels really right but it was. It was really not a very good product like you wasn't that like the data wasn't very high quality high accuracy and things like that. We've come a long way since then just so cool to see that. Even despite if a crappy prototype there are still so much interest in this right. And i think as you said rob some of those commenters pointed out that with jakoda. Yes the the accuracy of the locations is important. But what really differentiates us from. Many other services is that people can use the data without restrictions. They're allowed to store it in their database. There aren't these overly cumbersome cashing limitations and requirements about using it with a particular brand of map public facing only and more expensive pricing. If it's private facing only all of these things and kind of developers are those really. That's that's annoying and nobody wants to deal with that and we don't want to deal with that and then perspective of of being the customers ourselves is something that we have carried with us

Haunted Virtual Meetings

The CyberWire

00:49 sec | 10 months ago

Haunted Virtual Meetings

"Ibm researchers have found and disclosed vulnerability insists goes widely used webex video conferencing service. Ibm says it's a major user of webex itself which is why it looked into the code. The vulnerability amounts to the potential for hunting. Someone could join a meeting as a ghost on-scene among the participants but with full access to audio video chat and screen sharing capabilities. The ghost could remain in the form of an audio connection even after being detected and expelled and the ghost collect information on meeting. Attendees full names. Email addresses and ip addresses without even being admitted to the conference cisco has patched the vulnerability and users should apply the fix

IBM Cisco
Give Analysts Exactly What They Want with Paul Battista CEO of Polarity

Recorded Future - Inside Threat Intelligence for Cyber Security

03:25 min | 11 months ago

Give Analysts Exactly What They Want with Paul Battista CEO of Polarity

"Your elevator pitch on polarity for us. It it's around thoroughness and speed so we recognized and this goes back to our time in as well annan penetration testing when we're consultants right. You have the the to kind of prototypical analysis you have. The analyst who is really thorough dives down every rabbit hole looks and fines for every path. It's possible but they take a long time to get it done right. This is the person that would go back to that whiteboard and check every single time of the new comes in. They're checking every single one to make sure they're doing extra thorough job and then you have. The other analysts is probably where i tell you. Have the other animals without rates. I'm instinct lot not one hundred percent thorough because the job done much quicker But it's not too busy installing lennox right. Yeah when he's sitting right right. Yeah so yeah that analysts and so for us we said well how can we take the qualities of that first analyst instead of making their thoroughness ninety percent or ninety nine percent. Let's make him a hundred percent thorough on the data they care about and speed them up while we do it. So instead of you know that decision usually costing time let's let's give them a productivity boost so we can make some Thorough and faster the same time. That's extremely valuable to an industry and information security where. We're understaffed It's hard to find a fine fine talent. That type of data we deal with was was meant for machines to know and recognize things like file hashes in ip addresses. Either more machine readable than they are human readable. So let's let's let's really enable those folks. Are there any lessons that you've learned along the way as the product has been put in front of users based on their feedback. Have you had any sorta Moments like oh people are people are using this in perhaps ways. We hadn't expected or you know. We need to make some adjustments here to to maximize You know the the value they get out of this. Yeah i mean lots of moments along the way both Ha moments from a. We didn't think folks would use it that way. In in the kind of use cases come out were the success stories. Come out so. I always love hearing customer success stories where you know we. We surprise them and they didn't expect polarity was going to highlight something. It highlighted something in it changed their their belief on that thing whether it's kicking off a new investigation or or the way they handle investigation to to handle it Slightly different and then yeah. Learning from a what enables analysts perspective. So one of the things that we haven't crossed the line or we have tested crossing wine but learned to to really really hold. The line was not being too much of a suggestion. Engine so you can. You can guess at what analysts want. But we've found that the better path is let analysts subscribe to the exact data. They care about in. Give them exactly what they want. And don't try to be more on the a suggestion side of things Because you could end up being a distraction even if you're right and give them great information eighty percent of the time or ninety percent of the time that ten percents still distractions going slow them down so let the analysts choose the data. They care about an give them exactly that data when they need it.

Cloudflare's free, privacy-first web analytics solution

Talketer Podcast

02:08 min | 1 year ago

Cloudflare's free, privacy-first web analytics solution

"Cloudflare released a free privacy first web analytics solution cloudflare is based in San Francisco and they provide services like CDN, which is a content-delivery network DDOS mitigation Internet Security et cetera. They released a blog post on the corporate blog saying there are free analytics tools out there, but they come at a cost not money. But your users privacy. They were not to say the most popular analytics services available were built to help ad-supported sites sell more ads. Now this is clearly a shot at Google analytics and how they track users across the web in order to provide marketers better information for advice. Cloudflare doesn't sell ads so they have no incentive to track everybody's movement around the web. Their new privacy first web analytics system will not track. It will not track individual users overtime for the purposes of serving ads. They don't use client-side State like cookies or local storage for the purposes of tracking users. And they won't fingerprint individuals via their IP address user agent string or any other data for the purposes of displaying Analytics. This Google analytics competitor will focus its analytics on the concept of a visit instead of unique users, which requires cookies other features will include a choice by country visits by Source hosts, click pass browser browsers device types. So this is a really interesting. New free web analytics solution. From cloudflare check it out today. For a privacy-focused privacy first web analytics solution

Cloudflare San Francisco Source
DoH coming to Chrome for Android

Security Now

06:27 min | 1 year ago

DoH coming to Chrome for Android

"Does not going to be able to type it in. DO H. is coming to chrome for. android. Although the desktop releases of chrome? have offered the enhanced security and privacy that many of us love offered by DNS over https. which appeared in chrome three two. Major versions ago? It wasn't added to the IOS or Android wins back then but last Wednesday's chromium blog was titled a safer and more private browsing experience on Android with secure DNS. And I think I would argue that that's a good place to have D- DNS over https. Paraphrasing from Google posting for the sake of Brevity, and to skip a bunch of stuff that we all already know they said. With, Chrome eighty-five. We're extending support of secure DNS in chrome to Android as we did for the launch of D. O. H. on chrome for desktop platforms will progressively roll out do H. on chrome for Android to ensure the feature stability and performance as well as an I think this was significant to help do H. providers scale their services accordingly. As we've talked about the fact that that arguably. Setting up. Persistent. https connections to DNS servers is a significantly more burdensome process for the server than just fielding UDP packets DNS you know traditionally over UDP is incomes a packet and A reply. https involves the whole T. L. S. handshake to set it up, and then you're maintaining persistent session and I don't want to have to do that every time you make a DNS query or a be way slower and nobody wants a performance hit when you get authentication and privacy. But still you're you have to maintain state over at the server end in order to offer this service and that can require the PRI- The providers to scale in order to make that happen. So presumably, there are gonNA be keeping an eye on how well this does and in fact, they talk about that a little bit about the possible need to fall back they they said. android chrome will automatically switch to DNS over https if your current DNS provider is known to support it. And I just hit the space bar by mistake of scrolled. This also applies to your current android private. DNS. That's DNS over. If you have configured one, they said this approach means that we can preserve any extra services provided by your configured DNS service provider such as family safe filtering, and therefore avoid breaking the users expectations making it transparent. They said in this automatic mode chrome will also fall back to the regular DNS service of the users current provider. For example, if you had configured DNS over T. L. S.. In order to avoid any disruption while periodically re trying to secure DNS communication. So presumably, as I said if the provider were become overloaded or stop offering the services for a while, it'll just smoothly drop back to traditional DNS. They said in case this default behaviour isn't suitable to your needs. Chrome also provides manual configuration options allowing you to use a specific provider without. As. Well as the ability to completely disabled feature. They said if you're an IT administrator, chrome will disable secure DNS. If it detects a managed environment via the presence of one or more enterprise policies, we've also added new DNS over https enterprise policies to allow for a managed configuration of security and s and encourage it administrators to look into deploying DNS over https for their users. So anyway, basically, it's what we've what we've seen before. By. well by by chrome and pretty much now, all of the browsers who who are wanting to move their clients and and users from DNS over UDP traditional DNS over to https. So it's just gonNA happen seamlessly chrome will start supporting it if they see that you're using and it comes with a list of known providers. If they see that you've already switched your DNS there than they, they will just upgrade you to. To that provider if that provider is known to offer the service and because it'll be an automatic grade if there's a problem, they'll back you out of it and then in addition once that's provided under chrome for Android, you can also switch it to. Sort of a non automatic mode, provide the IP address and other URL requirements for http or for for D dns over https and start using it so again. To be I think that makes a lot of sense especially when at a mobile devices out roaming around more you're away from home where you're dns has only going essentially never even going. Public at all, it's just to to your own local provider in order to get resolution. So. Good to see this happening, and of course, we've talked about how this is also being rolled out for windows

It Administrator Google D. O. H. L. S.
16-year-old arrested for hacking Miami Dade school system

Glenn Beck

00:22 sec | 1 year ago

16-year-old arrested for hacking Miami Dade school system

"Year old student under arrest for some of the cyber attacks on the Miami Dade County school system. Police say that junior at South Miami senior High School admitted to orchestrating eight so called denial of service attacks that disrupted the systems online Learning platform. This week, school police traced an IP address used in the attacks leading to the arrest of the student, identified as David Oliveros. A two

South Miami Senior High School Miami Dade County School David Oliveros
"ip address" Discussed on The B2B Revenue Leadership Show

The B2B Revenue Leadership Show

01:53 min | 3 years ago

"ip address" Discussed on The B2B Revenue Leadership Show

"We do it at you mentioned ip address we do this at a company levels wells part of our ocoee that we own sides the nop engine and and all the disc as that goes those behind it as you also have our own ip to domain map so we can actually identify which companies around the world are looking at what types of contents and were propensity and if those companies are doing a lot more research than usual on a particular topic and as you could see that because really valuable so it's all of the above and and there's a lot more a lot more to it the problem we can get into an in a quick interview look at another time rock q so do the eight yeah exactly so how do you guys now take this and you know your customers who were they so that's a a we've we've really to as well the two business unit you will there's the digital side were were making this data available in a programmatic or cookie side of things where were agencies and and martyrs or are buying howard gatiss that can digitally target users with the with the split rats that's your typical now they want to target users on on any of the uh the the channels uh by her by programmatic add right they want to target business users were interested in a certain topped right so that that's that's a big putter business and the customers they're really we saw through the channel so we sell our did available in blue cairo the trade desperate media mathur app nexus rights are all of the standard places that you would buy data for programmatic advertising our data is available myself a channel so we don't a lot of times will have a direct relationship with a marketer agency will be buying its we have some we have agency rather to talk to the agencies and show them were hurt our data could be applicable to their clients in shanghai.

ip address blue cairo shanghai howard
"ip address" Discussed on The Tech Guy

The Tech Guy

02:14 min | 3 years ago

"ip address" Discussed on The Tech Guy

"Or enough to jia locate you or your where you are in claire more than ever mapped much most likely and is your internet service provider in where were you get in dallas right that's pretty far away the the funny funny thing thing is is that might tie in with another play in that when i go shopping and i might get on sam's club boot yup wall art and it'll say okay here it is the church door in its plano texas yes yeah so that's it's doing that by ip address so there's another database uh maintained by another company that says these ip addresses belong to this location but at that's a very uh inaccurate system in in probably what they're getting up i would i'm almost gonna betcha who's your internet service providers headquarters is in plano and probably in that's that's the best they can do they say well that ip address belongs to this internet service provider this is where it's located that's as close as we're gonna get elliot tonight prompted something about cuts burski real put you you certainly may you heard me talking about the irish fans about it yeah i i had and i see your point about out of viruses but i by up listening to another radio see there's your mistake right there well i don't listen those other people at okay go ahead all right all right up and then then all the news came about that they were tied in with the russian government uh but i start so i'm gonna take it all get rid of it yes well the only thing i could take you don't find to take it off with was a removal the program i'm chris first yes and and you say how safe is that that unfortunately is the case with most any viruses is and this is to protect you right they don't you don't want wanna virus to be able to un install the antivirus so they make them hard ones uninstalled norton does the same thing you have to go to norton to get an anti virus removal tool and that's just extra secure uk economy have to kinda sorta trust it staff but you're right there's that i raised a good point.

dallas sam plano ip address ip addresses elliot texas internet service providers chris uk
"ip address" Discussed on The Tech Guy

The Tech Guy

01:36 min | 3 years ago

"ip address" Discussed on The Tech Guy

"When you log into a website uber log in with one in exactly one you can't log in with two you know when you show up on a web address you get you have a unique number it's yours and only yours i don't know where they be seeing a second number and less it's possible and a again because you don't have the air message i it's hard for me to cristobal this but it's possible that you've log into coin base with that same account in the past from a different ip address not yours perhaps an may so first thing i would do is change your coin base password in case you know somebody's a compromise your coin base account may be what they're telling you you can't log illinois would address maybe what they're telling you as you know two hours ago you logged in with his other address and we don't like that address or maybe you know it are you log in him with two different uh devices at the same time i don't know in the frankly daesh there they shouldn't be blocking by ip address any way because uh ip addresses are fungible they don't you can you you're ip address can change at any time unless you specifically pay for a static ip address it's assigned to you in general buy it from a pool of numbers that you're in it service provider owns so somebody's up to no good uh with an ip address its own by your internet service provider and you're showing up by that address will the first thing i do's call internet service provider and see if you can get some clarity from them however.

ip address illinois ip addresses two hours
"ip address" Discussed on The Tech Guy

The Tech Guy

01:53 min | 3 years ago

"ip address" Discussed on The Tech Guy

"Baby you can grab ma co wale the point the tech guy eighty eight eighty eight asked lee of the phone number line three mike woodland hills california hi mike a deal yes sir um my ip address has been compromised every time i try to log on to the coin base to work out there uh cooked to change the one could joke change to that uh showed the exactly we're another ip address was attached to mind minded should i have to look that up because one that was that was in mind and it was a a real corrupt one so how do i get rid of it there's only logjam to my idea groups when i'm trying to do something financial were you can't have two ip addresses so i'm not shown little logged on exactly next to mine it i had mina my my ip address in his ip address and i looked up his ipr one of the most corrupt and uh on on the website yeah what a doesn't uh i i'm wondering what the message from coin base was what do you can't i can't remember yeah says so here's the deal your ip address doesn't you don't own your ip address the uh the internet service provider owns the ip address their granted a block of internet addresses this is that unique kind of like your it's really actually a lot like your phone number that unique number that a your internet service uh has and you have numbers of computers sharing it because y'all in many cases because you have a router but to the outside world you look like that.

lee ip address the deal log on ip addresses
"ip address" Discussed on The Kevin Rose Show

The Kevin Rose Show

02:02 min | 4 years ago

"ip address" Discussed on The Kevin Rose Show

"Other cryptocurrency um i'm trying to go out in find these initial nodes when i launched this clients those are known right so exactly someone's like looking at and in monitoring the traffic would say okay this person at this ip address sitting in this house has a cryptocurrency client running and is trying to connect you're saying that with a demean fronting that that's not the case how does is it doing a proxy server what is it doing there were actually actively a few different solutions to this but yeah that would be one pollution it to make it to make it look like your traffic is coming from the morale or going somewhere else i should say on note there are a number of belushi do not and we actually will probably implement a few different pipe just to make it even more private but we haven't done termed which act we're gonna we're gonna take on that brought up at an active already project it we have won thirteen by up to work right now that's a really cool projects of love to see that working yeah i i i think it's a really important project now some other things that we we thought we were kind of necessary work well it's formed economics perspective i think what's the toshi did with big wind was brilliant but he he only got the economics right i think for the mining consensus brought this you know how your can blocks civil ledger is beautifully aligns economic incentives but there were plenty of other stakeholders in that this um and what we saw was the not all these other stakeholders uh had a fait or even had an economic and fence if properly aligned with the system so for instance what we want this view then we broke out to other stakeholder groups uh initially one is this network of full know doc writers that actually use them half security protocol one thing that we did actually wh which is the first in the industry was relieved feel latin tour protocol where we have now is actually claim to note decryption uh just to make the entire process you know more more private and then for the future.

ip address proxy server belushi
"ip address" Discussed on The Kevin and Ryan Show

The Kevin and Ryan Show

02:02 min | 4 years ago

"ip address" Discussed on The Kevin and Ryan Show

"Other cryptocurrency um i'm trying to go out in find these initial nodes when i launched this clients those are known right so exactly someone's like looking at and in monitoring the traffic would say okay this person at this ip address sitting in this house has a cryptocurrency client running and is trying to connect you're saying that with a demean fronting that that's not the case how does is it doing a proxy server what is it doing there were actually actively a few different solutions to this but yeah that would be one pollution it to make it to make it look like your traffic is coming from the morale or going somewhere else i should say on note there are a number of belushi do not and we actually will probably implement a few different pipe just to make it even more private but we haven't done termed which act we're gonna we're gonna take on that brought up at an active already project it we have won thirteen by up to work right now that's a really cool projects of love to see that working yeah i i i think it's a really important project now some other things that we we thought we were kind of necessary work well it's formed economics perspective i think what's the toshi did with big wind was brilliant but he he only got the economics right i think for the mining consensus brought this you know how your can blocks civil ledger is beautifully aligns economic incentives but there were plenty of other stakeholders in that this um and what we saw was the not all these other stakeholders uh had a fait or even had an economic and fence if properly aligned with the system so for instance what we want this view then we broke out to other stakeholder groups uh initially one is this network of full know doc writers that actually use them half security protocol one thing that we did actually wh which is the first in the industry was relieved feel latin tour protocol where we have now is actually claim to note decryption uh just to make the entire process you know more more private and then for the future.

ip address proxy server belushi
"ip address" Discussed on Security Now

Security Now

02:29 min | 4 years ago

"ip address" Discussed on Security Now

"Which outbound link to forward that package two um i call them a address prefixes because you you you couldn't n you wouldn't want every single ip address on the internet is a not just for the not for the time being sd restrict i p v four for the sake of ease and an explanation you doubt there's four point three billion i p v for it addresses so it would be impractical to have every ip address associated with which interface it goes out of and it's not necessary because one of the cleverest things at one of the many clever things about the internet is that is that networks are groups of adjacent numbered i peas so for example uh and we we've talked about this a h p once upon a time had fifteen dot everything in other words they had the entire they had every ip address maybe i think it was fifteen and fourteen kabila think of it stay at every ip address beginning with fifteen or fourteen which which meant that anywhere else in the world if a packet was bound for and ip address beginning with fourteen or fifteen it could be sent toward palo alto back sps say that when hp was only in palo alto the point being that one tree in a row terror in the routing table of every route or in the world was able to to just aim essentially if it was too i peast fourteen of fifteen that would be one one hundred twenty eight of the entire address space which is two two aifp's in class a of the first bite one one hundred twenty eight at a single location dramatically simplifying the challenge of routing all four point three billion i pease to their destination so so this is.

ip address hp kabila palo alto class a
"ip address" Discussed on Tech Policy Podcast

Tech Policy Podcast

02:16 min | 4 years ago

"ip address" Discussed on Tech Policy Podcast

"At the most the most probably salient i example i can think that kind of gives at an example of both ram would be our trend neck case which was against a company that sold home security cameras that were used for baby monitors or for home security among the claims on the advertising and on the packaging were that the the product was secure and so there was a claim there about the product and then but what what turned out is that the in our complaint we alleged that the cameras anybody with the ip address of the camera could see the video feed and so white ended up happening is that hackers who discovered this were posing live feeds of hundreds of consumers cameras watching their kid in the crib or you know just monitoring their home and so our complaint alleged both deceptive practices in that the the company claimed that the cameras were secure and they didn't even meet a bare minimum of security and then and unfairness claim where the injury to consumers in their in their the invasion of their their private home was substantial it wasn't outweighed by any benefits because the cost to securities cameras was not high that's one of the examples that you might consider as a factor it was and it would be quite reasonable to to secure them with the password in effect with software updates i believe the company eventually did that and then it wasn't it wasn't avoidable because consumers weren't aware that the camera had this this substantial as security flaws yeah no one would expect in buying host security system that anybody could look at had like maybe you expect that the company that sold it to you can look at it because that's part of the benefit right it's that if if someone's breaking in they can may be co go and see the brake in and called the police but no one would ever reasonably expect that i'm buying this security camera i'm buying a mac book and anybody who knows my address which could be anybody ivory addresses is fairly public can just tap into the feet i mean that's that's kind of crazy yet so and and in that case we had very specific examples i mean we had evidence this wasn't a theoretical thing that could happen.

ip address software updates mac
"ip address" Discussed on Packet Pushers - Datanauts

Packet Pushers - Datanauts

01:35 min | 4 years ago

"ip address" Discussed on Packet Pushers - Datanauts

"From then it'll be fairly easy to go to the next step in trump's of okay once you understand how it works what in a daytoday operations what do i do and manage i'm not going to be giving up ip addresses or speedingup containers those days are gone automated but when the natural traffic is going on i need to know was the visibility a what's the analytics went up deleting sees one is the dependency map who talking to who who have the right far walling controls in place that did to michael services which are not supposed to talk to each other are talking to each other and how do i stop them how does that auto scaling work what do i need to have in terms of the resources so that as a traffic grows what my network and the application in since his automatically girl okay you just outlined so many things that really prove the point that emi networking yes but i mean everybody that's in the it organisation needs to be working together to deploy this thing because there's a lot of complex enter workings underneath in sure you can just kinda let it run like it did in the lab without thinking about it too hard editor work for a while and then as the environment grows it it could turn into an absolute disaster so getting in front of it and designing it and then deploying it is the way you want to go and networking certainly as one of the key components of that the other things i've been reading about that are you even beyond the complexities of what you said a sheesh about whether or not a containers exposed to the internet or not and what proxies at hides behind unworthy ip address translation is a done and how that tracked and so on it's really a big deal.

trump ip addresses michael editor ip address
"ip address" Discussed on Software Engineering Daily

Software Engineering Daily

01:58 min | 4 years ago

"ip address" Discussed on Software Engineering Daily

"Mm from your website it says why would you have people monitor an imprecise map of one network when you could have computers monitor the entire internet he just said you communicate with every ip address on the internet when you say you're monitoring the entire internet what does that mean what exactly you doing so this involves a sending out a variety of different signals so packets to every ip address in the world in then of recording the responses so let's be clear it's kind of like radar we send things out and then we observe what returns back to us we are not monitoring traffic or anything like that it's it's it's it's a what what response on the internet to signals that we send that are over a wide variety of standards and protocols and this will allows us to understand for the things that respond the soffer that's running there the protocols they ski and from that information were able to deduce a lot about both what's sprang there is it vulnerable or is it potentially vulnerable and who owns of her who who who is ultimately responsible for this and by thai and all those together for all organisations in the world essentially in real time we can provide them with a set of all of their exposures across all of their computer networks and the important thing is that this is done independently of the view that day have of themselves and there are a lot of good reasons why using only older technologies they're going to be very limited in what they can do and get limited visibility that we don't have those limitations and therefore for every single arbor customers we have been a super set of information that they have had about their own assets and the runs assets status kelly understand how that works if you're paying the entire internet with the signals that you can get from.

ip address real time
"ip address" Discussed on The Tech Guy

The Tech Guy

01:41 min | 4 years ago

"ip address" Discussed on The Tech Guy

"Or a secondary address or something the only thing that was different was that i signed in from a different state i had traveled with my laptop as they see that they go off that's not right and the you know she's on an ip address we don't know but did you ever use your phone or something else to access your yahoo mail account that may be okay if you're back home and you used it before they may not did you go to that second level of urgency in which case you can log in and quickly before anybody knows his change that phone number yeah tried that cannot support o k still they don't wanna send me i fact i just did it now with the regular sign and while you're on the phone with me they still send me call with the code and they give the phone number so frustrating and the the phone number you know it who'd gone is gone there are ya who co support emails and phone numbers uh i guess at this point this is what you need to do um and then ultimately would i would suggest is you switch to g male or some other service and have your that icing but bill as it will collect your mail from yahoo male so people who still he male you a yahoo mail you can and as i always advise people in the long run the best thing to do is to own your email address register a domain name it's about ten bucks a year making your family name or whatever but own your email address almost all the registrars will do that will let you bounce any male the comes to that address to g male or yahoo something else but the thing is you can you know if you say oh i can't get myo academy more than you can go in and say from now on forward at the g male and you won't lose any male.

ip address yahoo mail domain name yahoo
"ip address" Discussed on Packet Pushers - Datanauts

Packet Pushers - Datanauts

01:42 min | 4 years ago

"ip address" Discussed on Packet Pushers - Datanauts

"In the containerised environment will you would you tend to do is give every container its own ip address on a container network so the port number can be hard coded the other way of doing it if if you don't have containers if you don't have the idea of an ip per service people get into port mapping so they you know if they if they need to run two or three things that would all otherwise rome let's say porty they need to map the maybe the them too eighty one eighty two eighty three and now they need some kind of way of finding out oh why map this one to port 84 so that's a that's a function that gets labelled service discovery if you working in that kind of a way than you're you're central means of figuring out which poor to particular thing is listening on is your service discovery mechanism in the container space give every container its own ip address you really don't need to worry about ports denies can do both but the way that it does ports is is in s rv records that's okay with quite a rare beast not really used certainly not common to find klein software that can deal with an esa rv record and so it's it's very much easier to work in a container mode where the only thing you wanna look up as the pierre dress and then you can use regular dna you know you send in a name and it sends back and ip address and everybody knows how to do the you know everybody speaks tns already straightforward quite a record look up yet base there's there's no there's no heavy lifting involved you can assumed that sort of technology is a wander stood and be somewhere within the software stagnant why reinvent the wheel that makes sense to me.

ip address klein
"ip address" Discussed on The Tech Guy

The Tech Guy

01:33 min | 4 years ago

"ip address" Discussed on The Tech Guy

"Well i've got it yeah it's wide into the router okay uh for some reason at all for some reason it's renewing the uh connection through the router and for some reason the rounders giving it a different number the you know ranters don't guarantee the uh ip address of a device inside your network but you can do two things to a lock it down which is we of course what you probably wanna do it depends on how your hb set up you know it is possible to set up a printer to print too and i pee address but or a computer to print to an ip address more typically it'll use zero can fig apple calls at bonjour to discover the printer on the network and print to wherever it is so you have a few options here one is to reconfigure the hp to not print to a specific ip address go back and remove the printer from the printer settings and when you set it up don't search for it as an ip but search for it on the windows network and it'll do it it'll do it in it by name as opposed to ip address that's one possibility the other and of course you probably been doing this all along and they'd never changed as address so didn't care but all of a sudden for some reason the route or is decided to reassign who thing you can do in some routers you can reserve ip addresses you could say this thing this thing here should always be 190 twotoone 68 that one the one hundred always yeah and a failing all of that the last year lastditch is to give the a printer what we call a static ip address in other words you tell the printer this is your address.

ip address hp ip addresses apple windows
"ip address" Discussed on Google Cloud Platform Podcast

Google Cloud Platform Podcast

01:35 min | 4 years ago

"ip address" Discussed on Google Cloud Platform Podcast

"Is there something of that that you can share they is not topsecret or something here so one of the things i think that um one of the reasons we are a platinum customer is the scale at which we run is such that we periodically are able to expose the sort of the fact that the cloud is not actually unlimited um so in one example you know we were using to mini cpap users in that particular region and we had to be very strategic with google about where to move those workloads there was another situation last year where we in in using all of those preemptive move eoms that we were using we managed to consume most of the ip address resources and in particular region and so we went down a very strategic route with google not only tactically trying to solve the immediate problem but basically you're trying to redesign our application and um with google to to make it so that we didn't need to use so many external ip addresses and integral it wasn't like five or ten like seat i address more than that tens of thousands and and so you know one of our applications needs to speak to the internet and so while many of googlers resources like storage are available using internal ip addresses if that same machine needs to talk to leg docker hub for example than it it or something near it needs to have a public eye peace so.

google ip addresses ip address
"ip address" Discussed on The Tech Guy

The Tech Guy

01:36 min | 4 years ago

"ip address" Discussed on The Tech Guy

"Uh we have a scheduled for twenty seventy you'll find that it gives wisdom tv thank you get a hug anybody take care by here to los angeles we go steven is on the line high steven welcome hello uh i wonder if you could explain something to me all right uh i have e indian company that has been working on my computer for years and tuning it up at cetera titter about six months ago i got a virus and uh i paid a lot of money for them to add new software on my computer to take off the virus then two months later i got another virus and uh they took it off and they said he'll never have to pay any more money to uh get anything uh taken off a several now i got another virus and they're saying to me well they're getting into your computer through your ip address and that's the and if you wanna get uh you need new software to getting you i t address time to cut the court with these guys okay that's what i wanted to know and is the can you recommend a uh a company that could check my computer is there a company that you feel is uh will company challenge because there yeah i don't i i i don't know there are companies hutus the problem is almost anybody it's worse than psychotherapy psychotherapy anybody can hang up his shingle and say yeah all off your councillor.

los angeles ip address steven six months two months
"ip address" Discussed on The Tech Guy

The Tech Guy

01:54 min | 4 years ago

"ip address" Discussed on The Tech Guy

"I think that might help do you notice a fiamma yet yeah i don't know you notice of the amahs changing ip address uh yes well i mean not not would it drops up the change ip address others when it when it reverted to the modem by sinn finn is keeping that they might be that's an interesting question i do think lee rose phone support is very good so how if if you if if you can't figure it out i would call aero they've been i've found them a try tested the my i got the euro with a bunch of questions or quite good all right i i did call them already regarding some rain doorbells that i have and they're able to sorted out pretty quickly and reserves might be addresses for them to the same thing right yeah i think it might be might be one way of doing it so then things are hopping around as much subtracting yeah there is a eero compatibility lists will put a lincoln the show notes but you can fight of easily uh the shows what hardware it does is known to work well with um i use euro with my ring in it's fine but you know it's funny things things happen i don't i don't know it's 'cause in my opinion because these these systems are managed by remote remotely by euro right and i think they do funny things the interesting thing about the rain is it the ring is it like the two point with its point four that's where you get problems via if you're if you're euro as too closely rang at tries to get onto the folly that's right that's right i think that's where you get problems so yo to the degree that you can say to a device snow this is your ip address this is your banned this is your tell the mess with it i think that will probably help you i ring works fine which is weird because it's not on the compatibility list uh i've never had trouble with my ring oddly enough.

sinn finn lincoln ip address lee rose
"ip address" Discussed on MSNBC Rachel Maddow (audio)

MSNBC Rachel Maddow (audio)

01:36 min | 4 years ago

"ip address" Discussed on MSNBC Rachel Maddow (audio)

"Well in october for the election department of homeland security sent out an alert to local election officials around the country telling them that day the homeland security department had identified a concerted effort to hack into election systems around the country and homeland security distributed a list of about six hundred suspicious ip addresses specific computer addresses basically from which these attacks were being launched and they told election officials all over the country that they should stay in their systems locally to see if there was any evidence of these ip addresses to see if there's been any attempts at intrusion or hacking from any of these specific ip addresses and they sent them out in a big long list six hundred of them last week dallas counties election administrator said that they did that they followed that advice she said when when she and her staff skinned dallas counties systems in october to see if they'd been hit by any of those ip addresses on that list of six hundred that have been sent out by homeland security they got seventeen hits seventeen of those ip address has had in fact made an effort to attack the dallas county motorola's they worked with federal authorities federal 30s apparently told the county that at least some of those seventeen ip addresses from which hacking attempts have been launched against dallas counties voter rolls at least some of those seventeen definitively were computers in russia now what the hack attempt was there was not on computer systems that were used to tabulate the vote.

homeland security department ip addresses administrator ip address motorola russia department of homeland dallas