title

Gordon And Mike's ICT Podcast

Gordon F Snyder Jr and Michael Qaissaunee

0
Followers
0
Plays
Gordon And Mike's ICT Podcast

Gordon And Mike's ICT Podcast

Gordon F Snyder Jr and Michael Qaissaunee

0
Followers
0
Plays
OVERVIEWEPISODESYOU MAY ALSO LIKE

Details

About Us

National Center for Telecommunications Technologies Director Gordon F Snyder Jr and Mid Atlantic Institute for Telecommunications Technologies Director Mike Qaissaunee take a weekly look at the Networking, Information and Communications Technologies and how they affect the world of business, industry and education.

Latest Episodes

Ten Minutes with OP-TEC Webmaster Ian Anderson

The National Center for Optics and Photonics Education, OP-TEC, is a consortium of two-year colleges, high schools, universities, national laboratories, industry partners, and professional societies funded by the National Science Foundation’s Advanced Technological Education (ATE) program. The participating entities of OP-TEC have joined forces to create secondary-to-postsecondary as well as returning adult “pipelines” of highly qualified and strongly motivated students and to empower two-year colleges to prepare technicians in optics and photonics.

9 MIN2017 APR 10
Comments
Ten Minutes with OP-TEC Webmaster Ian Anderson

Hacking Car Anti-collision Systems [19:08]

Hacking Car Anti-collision Systems, August 28, 2016 A group of researchers presenting at this month’s Def Conhacker conferenceshowed how they were able totrick Tesla's sophisticated anti-collision sensors to make a car hit an object it would normally detect in its path. Before we start on the cars – you went to Def Con this year Mike – how was it? So let’s get to the cars now – who did this research? The group consisted of Chen Yan,a PhD student at Zhejiang University, Jianhao Liu, a senior security consultant at Qihoo 360, and Wenyuan Xu, a professor at Zhejiang University and The University of South Carolina. So can you give a quicker overview of what they did? They discoveredmethods for "quieting" sensors to diminish or hide obstacles in a car's path, "spoofing" them to make an object appear farther or closer than it actually is, and jamming, which, Yansaid, renders the sensor useless as it's "overwhelmed by noise." Could this be done now? I mean, if someone is driving a Tes...

19 MIN2016 AUG 29
Comments
Hacking Car Anti-collision Systems [19:08]

Lock It and Still Lose It [24:11]

Q: Could you tell us a little about how this research began? A: Actually in 2013 Flavio Garcia, a computer scientist at University of Birmingham, and a team of researchers were about to reveal a vulnerability in the ignition of Volkswagen cars that allowed them to start the car and drive off without a key. This vulnerability was present in millions of VWs. Q: You say “about to reveal”? A: Yes, they were sued, which delayed the publication of the work for 2 years. They used that time to continue their research into vulnerabilities with VW cars. Q: So did they find anything new? A: They sure did. The paper they just published identifies flaws not only with the ignition system, but also with the keyless entry system. Q: How many cars are we talking about? A: The researchers claim that every Volkswagen sold since 1995 is affected. The estimate is nearly 100 million cars! Q: Which cars are affected? A: There are two distinct attacks – one impacts Audi and Škoda cars; the other Alfa ...

24 MIN2016 AUG 16
Comments
Lock It and Still Lose It [24:11]

Intro To Pokemon Go [31:14]

References: http://www.usatoday.com/story/tech/gaming/2016/07/15/beginners-guide-pokmon-go/87133450/ http://www.theregister.co.uk/2016/07/19/hacker_46_months_db_breach/

31 MIN2016 JUL 25
Comments
Intro To Pokemon Go [31:14]

4K Ultra High Definition Television [22:37]

Title: 4K Ultra High Definition Television Introduction High definition has meant 1080p (1,920 by 1,080) resolution for years now, and it's ready for an upgrade. That's where 4K, also called ultra high-definition, or UHD, television comes in. 4K is finally a mature, accessible technology. In this podcast we take a close look at UHD 4K technology referencing a PC Magazine post. Updates First some continued bad news on the security front … Businesses pay $100,000 to DDoS extortionists who never DDoS anyone – Dan Goodin http://arstechnica.com/security/2016/04/businesses-pay-100000-to-ddos-extortionists-who-never-ddos-anyone/ Out-of-date apps put 3 million servers at risk of crypto ransomware infections – Dan Goodin http://arstechnica.com/security/2016/04/3-million-servers-are-sitting-ducks-for-crypto-ransomware-infection/ Now for a little good news … Petya Ransomware's Encryption Defeated and Password Generator Released – Lawrence Abrams http://www.bleepingcomputer.com/news/securi...

22 MIN2016 MAY 8
Comments
4K Ultra High Definition Television [22:37]

Engineering Technology and Engineering Degrees – What is the Difference [20:30]

Questions we try to answer in the podcast: 1.What is the difference between an Engineering Technology degree and a Bachelor of Science in Engineering? 2.Can you also get an AS or AAS degree in Engineering Technology at a Community College? 3. What is the career path for an Engineering Technology degree holder versus a Bachelor of Science inEngineering? 4. What should you be doing in high school if you are interested in an Engineering Technology or Bachelor of Science in Engineering degree? 5. What courses will you likely take in college if you pursue an Engineering Technology degree? 6.What courses will you likely take in college if you pursue a Bachelor of Science in Engineering degree? 7. What interests are common to engineering technology degree and engineering bachelor of science degree pursuers? Reference: https://floridapolytechnic.org/engineering-technology-degree/

20 MIN2016 APR 30
Comments
Engineering Technology and Engineering Degrees – What is the Difference [20:30]

FCC Spectrum Auction 2016 [32:00]

Intro On Wednesday, March 30, 2016 the Federal Communications Commission (FCC) started a three-year process of making our mobile internet even faster and better. The government is buying underused TV airwaves and selling it to mobile carriers for billions of dollars. These radio waves—also known as spectrum—will shape mobile US connectivity as streaming video continues to swallow up bandwidth across the country and as weinch closer to 5G internet speeds. In this podcast, we discuss the auction process. Updates Ransomware Evolution is Really Bad News - Angela Alcorn Recently, 10 hospitals in Maryland operated without access to their central network because their domain servers were locked by a ransomware known as Samsam http://www.makeuseof.com/tag/ransomware-evolution-is-really-bad-news-microsoft-edge-will-intelligently-pause-flash-tech-news-digest/ Victims paid more than $24 million to ransomware criminals in 2015 — and that's just the beginning –Dan Turkel The DOJ revealed tha...

31 MIN2016 APR 11
Comments
FCC Spectrum Auction 2016 [32:00]

What You Need to Know About Ransomware [32:04]

On March 31st, 2016 the US Computer Emergency Readiness Team or US-CERT released alert TA 16-091A titled “Ransomware and Recent Variants”. Ransomware is a type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it. Already in 2016, destructive ransomware variants such as Locky and Samas were observed infecting the computers of individuals and businesses – even hospitals and healthcare facilities. The purpose of this Alert is to provide further information on ransomware, its main characteristics, its prevalence, variants that may be proliferating, and how users can prevent and mitigate against ransomware. References: https://en.wikipedia.org/wiki/Ransomware_(malware) https://www.us-cert.gov/ncas/alerts/TA16-091A

32 MIN2016 APR 4
Comments
What You Need to Know About Ransomware [32:04]

Big Data Introduction

We’ve hear the term “big data” used a lot lately. The term itself makes us thing about lots and lots of information. Sure there’s lots of information but what most important to an organization is what is done with the data. In this podcast we take an introductory look at what big data is, discuss how it is being used, and refer to an excellent document at SAS.com

21 MIN2016 MAR 3
Comments
Big Data Introduction

Conducting Social Media Research Part 1 [16:48]

As part of a National Science Foundation grant received by the Educational Development Corporation in Massachusetts, Mike and I have been involved with a group of small business social media experts from around the country defining a step-by-step social media process for Social Technology Enabled Professionals. These small business people build, maintain, manage and leverages online social networks to engage with customers, business partners, employees and key influencers with the goal of building organizational success. In this podcast, we cover part one of the first duty and discuss some of the tasks involved.

16 MIN2014 JUL 8
Comments
Conducting Social Media Research Part 1 [16:48]

Latest Episodes

Ten Minutes with OP-TEC Webmaster Ian Anderson

The National Center for Optics and Photonics Education, OP-TEC, is a consortium of two-year colleges, high schools, universities, national laboratories, industry partners, and professional societies funded by the National Science Foundation’s Advanced Technological Education (ATE) program. The participating entities of OP-TEC have joined forces to create secondary-to-postsecondary as well as returning adult “pipelines” of highly qualified and strongly motivated students and to empower two-year colleges to prepare technicians in optics and photonics.

9 MIN2017 APR 10
Comments
Ten Minutes with OP-TEC Webmaster Ian Anderson

Hacking Car Anti-collision Systems [19:08]

Hacking Car Anti-collision Systems, August 28, 2016 A group of researchers presenting at this month’s Def Conhacker conferenceshowed how they were able totrick Tesla's sophisticated anti-collision sensors to make a car hit an object it would normally detect in its path. Before we start on the cars – you went to Def Con this year Mike – how was it? So let’s get to the cars now – who did this research? The group consisted of Chen Yan,a PhD student at Zhejiang University, Jianhao Liu, a senior security consultant at Qihoo 360, and Wenyuan Xu, a professor at Zhejiang University and The University of South Carolina. So can you give a quicker overview of what they did? They discoveredmethods for "quieting" sensors to diminish or hide obstacles in a car's path, "spoofing" them to make an object appear farther or closer than it actually is, and jamming, which, Yansaid, renders the sensor useless as it's "overwhelmed by noise." Could this be done now? I mean, if someone is driving a Tes...

19 MIN2016 AUG 29
Comments
Hacking Car Anti-collision Systems [19:08]

Lock It and Still Lose It [24:11]

Q: Could you tell us a little about how this research began? A: Actually in 2013 Flavio Garcia, a computer scientist at University of Birmingham, and a team of researchers were about to reveal a vulnerability in the ignition of Volkswagen cars that allowed them to start the car and drive off without a key. This vulnerability was present in millions of VWs. Q: You say “about to reveal”? A: Yes, they were sued, which delayed the publication of the work for 2 years. They used that time to continue their research into vulnerabilities with VW cars. Q: So did they find anything new? A: They sure did. The paper they just published identifies flaws not only with the ignition system, but also with the keyless entry system. Q: How many cars are we talking about? A: The researchers claim that every Volkswagen sold since 1995 is affected. The estimate is nearly 100 million cars! Q: Which cars are affected? A: There are two distinct attacks – one impacts Audi and Škoda cars; the other Alfa ...

24 MIN2016 AUG 16
Comments
Lock It and Still Lose It [24:11]

Intro To Pokemon Go [31:14]

References: http://www.usatoday.com/story/tech/gaming/2016/07/15/beginners-guide-pokmon-go/87133450/ http://www.theregister.co.uk/2016/07/19/hacker_46_months_db_breach/

31 MIN2016 JUL 25
Comments
Intro To Pokemon Go [31:14]

4K Ultra High Definition Television [22:37]

Title: 4K Ultra High Definition Television Introduction High definition has meant 1080p (1,920 by 1,080) resolution for years now, and it's ready for an upgrade. That's where 4K, also called ultra high-definition, or UHD, television comes in. 4K is finally a mature, accessible technology. In this podcast we take a close look at UHD 4K technology referencing a PC Magazine post. Updates First some continued bad news on the security front … Businesses pay $100,000 to DDoS extortionists who never DDoS anyone – Dan Goodin http://arstechnica.com/security/2016/04/businesses-pay-100000-to-ddos-extortionists-who-never-ddos-anyone/ Out-of-date apps put 3 million servers at risk of crypto ransomware infections – Dan Goodin http://arstechnica.com/security/2016/04/3-million-servers-are-sitting-ducks-for-crypto-ransomware-infection/ Now for a little good news … Petya Ransomware's Encryption Defeated and Password Generator Released – Lawrence Abrams http://www.bleepingcomputer.com/news/securi...

22 MIN2016 MAY 8
Comments
4K Ultra High Definition Television [22:37]

Engineering Technology and Engineering Degrees – What is the Difference [20:30]

Questions we try to answer in the podcast: 1.What is the difference between an Engineering Technology degree and a Bachelor of Science in Engineering? 2.Can you also get an AS or AAS degree in Engineering Technology at a Community College? 3. What is the career path for an Engineering Technology degree holder versus a Bachelor of Science inEngineering? 4. What should you be doing in high school if you are interested in an Engineering Technology or Bachelor of Science in Engineering degree? 5. What courses will you likely take in college if you pursue an Engineering Technology degree? 6.What courses will you likely take in college if you pursue a Bachelor of Science in Engineering degree? 7. What interests are common to engineering technology degree and engineering bachelor of science degree pursuers? Reference: https://floridapolytechnic.org/engineering-technology-degree/

20 MIN2016 APR 30
Comments
Engineering Technology and Engineering Degrees – What is the Difference [20:30]

FCC Spectrum Auction 2016 [32:00]

Intro On Wednesday, March 30, 2016 the Federal Communications Commission (FCC) started a three-year process of making our mobile internet even faster and better. The government is buying underused TV airwaves and selling it to mobile carriers for billions of dollars. These radio waves—also known as spectrum—will shape mobile US connectivity as streaming video continues to swallow up bandwidth across the country and as weinch closer to 5G internet speeds. In this podcast, we discuss the auction process. Updates Ransomware Evolution is Really Bad News - Angela Alcorn Recently, 10 hospitals in Maryland operated without access to their central network because their domain servers were locked by a ransomware known as Samsam http://www.makeuseof.com/tag/ransomware-evolution-is-really-bad-news-microsoft-edge-will-intelligently-pause-flash-tech-news-digest/ Victims paid more than $24 million to ransomware criminals in 2015 — and that's just the beginning –Dan Turkel The DOJ revealed tha...

31 MIN2016 APR 11
Comments
FCC Spectrum Auction 2016 [32:00]

What You Need to Know About Ransomware [32:04]

On March 31st, 2016 the US Computer Emergency Readiness Team or US-CERT released alert TA 16-091A titled “Ransomware and Recent Variants”. Ransomware is a type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it. Already in 2016, destructive ransomware variants such as Locky and Samas were observed infecting the computers of individuals and businesses – even hospitals and healthcare facilities. The purpose of this Alert is to provide further information on ransomware, its main characteristics, its prevalence, variants that may be proliferating, and how users can prevent and mitigate against ransomware. References: https://en.wikipedia.org/wiki/Ransomware_(malware) https://www.us-cert.gov/ncas/alerts/TA16-091A

32 MIN2016 APR 4
Comments
What You Need to Know About Ransomware [32:04]

Big Data Introduction

We’ve hear the term “big data” used a lot lately. The term itself makes us thing about lots and lots of information. Sure there’s lots of information but what most important to an organization is what is done with the data. In this podcast we take an introductory look at what big data is, discuss how it is being used, and refer to an excellent document at SAS.com

21 MIN2016 MAR 3
Comments
Big Data Introduction

Conducting Social Media Research Part 1 [16:48]

As part of a National Science Foundation grant received by the Educational Development Corporation in Massachusetts, Mike and I have been involved with a group of small business social media experts from around the country defining a step-by-step social media process for Social Technology Enabled Professionals. These small business people build, maintain, manage and leverages online social networks to engage with customers, business partners, employees and key influencers with the goal of building organizational success. In this podcast, we cover part one of the first duty and discuss some of the tasks involved.

16 MIN2014 JUL 8
Comments
Conducting Social Media Research Part 1 [16:48]
hmly
himalayaプレミアムへようこそ聴き放題のオーディオブックをお楽しみください。