The robots are handling it
I get into the topic of how AI is now getting used to study sleeping habbits.
Saved by the voice recognition software
I begin by wondering if I need an intern. Then, after saying hello to a new listener and a returning listener I talk about how I am now on Feedburner. Please share the following link:
Also go to feedage.com, search for Kevin's Consulting Live and you will find me there. After all of that is out of the way I get into how somebody tried to scam me and how a layer of security helped me to stop it.
Robots on wheels and quantum cryptography
I start out by talking about the fact that I am now on Stitcher. The link to my show on Stitcher is:
I then say hello to some new listeners and jump right into the topic of self-driving cars and the possibility of smart bikes. Finally I talk about how China plans to have a quantum network put in place by 2030 and I almost get political.
The world of questionable audio quality and virtual machines
I start out by saying hello to some new listeners. After that, I get to some listener feedback reguarding the audio. Finally, after talking about the show's production process I talk a bit about virtual machines.
I begin by going over some listener stats and jump right into s2oS, the operating system built from the ground up with security in mind.
DDoS attacks and firewalls
I start out saying hello to the new listeners after talking about the 4th of July. I then go into the topic of DDoS (denial of service) attacks. I finish by talking a little about firewalls.
All about botnets
Just as the title suggests, I tell you all about botnets
Let's talk about Hidden Cobra
I begin by saying hello to some new listeners. I then launch into the topic of Hidden Cobra. The link to the government's report is:
AI, Networking lag, and processing lag
I start out by giving listeners a reminder to update software. After this, I talk about how Microsoft researchers are working with AI which leads to a lecture on AI. I then talk about networking lag and processing lag.
Ports, and printers, and routers, oh my!
We begin by listening to the sounds of summer. After that I say hello to some new listeners and the topic turns to how some printers are getting hacked which leads to a lecture about ports. I then talk about research done on how routers leak data via the LED lights.
A New York handful of minutes
I begin by talking about my trip into NYC. I then talk about a shockingly on-point article from the New York Times talking about AI
I jump right into the topic of my technology, VirtualShield. I then tell a little story about a rude person at the store and do some complaining about the thought police. My actual proposal for VirtualShield is as follows:
Other countries have taken online attacks to the next level. It's time for the U S to take antispyware and antimalware software to the next level. We even need to combat fileless attacks! This is why I have come up with Virtual Shield. This software turns your machine into a virtual router. If enough people do this, we can create a P2P virtual routing network. You can view commented code, read the readme, and run the shield included with the zip file by visiting: